CMUNATTACH(0xffffffffffffffff, 0x89e1, 0xffffffffffffffff) getsockopt$inet_sctp_SCTP_PEER_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1a, &(0x7f0000000380)={0x0, 0x80, "f29c5b753353d9c7798811e57823354f32d6cb0899a53381003e4f8dbbb1ea469076c8e175a20b45443f885afb38b83813d5e013d4fad662f1582b23328b4ed70ad9d7d4d0052d0147d8b0ac4910985bec8aa8956c599d291a7da55fec010801d8f02dcff373f52f59f867378c13f4a080938c965846a7e8229b410b3ea0f9ce"}, &(0x7f00000002c0)=0x88) socket$igmp6(0xa, 0x3, 0x2) perf_event_open(&(0x7f0000000500)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x15, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) close(0xffffffffffffffff) socket$inet_mptcp(0x2, 0x1, 0x106) connect$can_bcm(0xffffffffffffffff, &(0x7f0000000000), 0x10) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, 0x0) bind$unix(r0, &(0x7f00000005c0)=@abs={0x1, 0x0, 0x4e23}, 0x6e) syz_clone(0x40000000, &(0x7f00000000c0), 0x0, 0x0, &(0x7f00000001c0), 0x0) 12:21:11 executing program 3: r0 = open(&(0x7f0000000180)='./file0\x00', 0x4042, 0x0) ioctl$EVIOCSABS0(r0, 0x401845c0, 0x0) 12:21:11 executing program 1: syz_mount_image$ext4(&(0x7f0000000740)='ext4\x00', &(0x7f0000000100)='./bus\x00', 0x804810, &(0x7f0000000180)=ANY=[@ANYBLOB="0061021d307a961da7401271e3fa98008000001d3902ccfd562158cb15c016093893c9e4abd02bc4f1492514fa2dfebc8001000080000000008a1049ca0000"], 0x1, 0x73b, &(0x7f0000000780)="$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") chdir(&(0x7f0000000080)='./file0\x00') open(&(0x7f00000000c0)='./bus\x00', 0x14da42, 0x0) mount(&(0x7f0000000380)=@loop={'/dev/loop', 0x0}, &(0x7f00000003c0)='./bus\x00', 0x0, 0x1000, 0x0) r0 = open(&(0x7f0000000400)='./bus\x00', 0x0, 0x0) ioctl$LOOP_SET_STATUS(r0, 0x4c02, &(0x7f00000001c0)={0x0, {}, 0x0, {}, 0xff, 0x0, 0x0, 0x0, "be8176c9e6755a48a3c0230dd390efe12f8306bed95b2afd402aae879978d959ff9009eec610d9108ea036456bb79e26ee42d0a34968c1fdbb33e8ad5860f632", "b948757aa008fae13adca739a9f126462ab528ea52e90ce2cf50a4ef2568375b"}) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='blkio.throttle.io_service_bytes\x00', 0x275a, 0x804) 12:21:11 executing program 4: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x82, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket(0x10, 0x803, 0x0) sendto(r0, &(0x7f00000000c0)="120000001200e7ef007b00000000000000a1", 0x12, 0x0, 0x0, 0x0) recvmmsg(r0, &(0x7f00000037c0)=[{{&(0x7f00000004c0)=@ethernet={0x0, @random}, 0x80, &(0x7f0000000380)=[{&(0x7f0000000040)=""/95, 0x5f}, {&(0x7f0000000140)=""/85, 0x55}, {&(0x7f0000000fc0)=""/4096, 0x1000}, {&(0x7f0000000400)=""/106, 0x6a}, {&(0x7f0000000740)=""/73, 0x49}, {&(0x7f0000000200)=""/77, 0x4d}, {0x0, 0x1a000}], 0x7, &(0x7f0000000600)=""/191, 0xbf}}], 0x1, 0x0, &(0x7f0000003700)={0x77359400}) 12:21:11 executing program 2: open(&(0x7f0000000400)='./bus\x00', 0x14103e, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$L2TP_CMD_SESSION_MODIFY(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000080)={0x14, r1, 0x1, 0x0, 0x0, {}, [@L2TP_ATTR_SEND_SEQ={0x5}, @L2TP_ATTR_IFNAME={0x14, 0x8, 'veth1_to_hsr\x00'}]}, 0x30}}, 0x0) 12:21:11 executing program 2: open(&(0x7f0000000400)='./bus\x00', 0x14103e, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$L2TP_CMD_SESSION_MODIFY(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000080)={0xc0, r1, 0x1, 0x0, 0x0, {}, [@L2TP_ATTR_SEND_SEQ={0x5}, @L2TP_ATTR_IFNAME={0x14, 0x8, 'veth1_to_hsr\x00'}]}, 0x30}}, 0x0) 12:21:11 executing program 3: r0 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000540), 0x0, 0x0) syz_clone3(&(0x7f0000002280)={0x200000000, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0, 0x0, {r0}}, 0x58) [ 979.933257][ T2964] loop1: detected capacity change from 0 to 2048 [ 980.033757][ T2964] EXT4-fs (loop1): mounted filesystem 00000000-0000-0000-0000-000000000000 without journal. Quota mode: none. [ 980.071871][ T2964] ext4 filesystem being mounted at /root/syzkaller-testdir1539738704/syzkaller.ao1jj3/3742/bus supports timestamps until 2038 (0x7fffffff) 12:21:11 executing program 5: r0 = socket$unix(0x1, 0x2, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f0000000100)={'vcan0\x00'}) r1 = socket$can_bcm(0x1d, 0x2, 0x2) connect$can_bcm(r1, &(0x7f0000000000), 0x10) ioctl$sock_kcm_SIOCKCMUNATTACH(0xffffffffffffffff, 0x89e1, 0xffffffffffffffff) ioctl$sock_SIOCSPGRP(0xffffffffffffffff, 0x8902, 0x0) sendmsg$can_bcm(r1, &(0x7f0000000480)={&(0x7f0000000340)={0x1d, 0x0, 0x3f420f00}, 0x10, &(0x7f0000000040)={&(0x7f0000000580)=ANY=[@ANYBLOB="01000000d7fe68ca0000e9ffffff0000", @ANYRES64=0x0, @ANYRES64=0x0, @ANYRES64=0x0, @ANYRES64=r0, @ANYBLOB="3bf81bb9f1"], 0x20000600}}, 0x0) r2 = socket(0x23, 0x800, 0x40000) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r2, 0x541b, &(0x7f00000000c0)={'ip6_vti0\x00', 0x0}) sendmsg$IPCTNL_MSG_EXP_DELETE(r2, &(0x7f00000004c0)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x40000040}, 0xc, &(0x7f0000000440)={&(0x7f00000006c0)={0x1d0, 0x2, 0x2, 0x201, 0x0, 0x0, {0xa}, [@CTA_EXPECT_NAT={0xc0, 0xa, 0x0, 0x1, [@CTA_EXPECT_NAT_TUPLE={0xc, 0x2, 0x0, 0x1, [@CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x1}]}, @CTA_EXPECT_NAT_TUPLE={0x70, 0x2, 0x0, 0x1, [@CTA_TUPLE_IP={0x2c, 0x1, 0x0, 0x1, @ipv6={{0x14, 0x3, @loopback}, {0x14, 0x4, @private0}}}, @CTA_TUPLE_IP={0x14, 0x1, 0x0, 0x1, @ipv4={{0x8, 0x1, @empty}, {0x8, 0x2, @initdev={0xac, 0x1e, 0x1, 0x0}}}}, @CTA_TUPLE_IP={0x14, 0x1, 0x0, 0x1, @ipv4={{0x8, 0x1, @local}, {0x8, 0x2, @loopback}}}, @CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x4}, @CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x3}, @CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x1}]}, @CTA_EXPECT_NAT_TUPLE={0x38, 0x2, 0x0, 0x1, [@CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5, 0x1, 0x88}}, @CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x3}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5, 0x1, 0x21}}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5, 0x1, 0x1}}, @CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x3}]}, @CTA_EXPECT_NAT_DIR={0x8}]}, @CTA_EXPECT_MASTER={0x20, 0x1, 0x0, 0x1, [@CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x1}, @CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x2}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5, 0x1, 0x84}}]}, @CTA_EXPECT_MASTER={0xdc, 0x1, 0x0, 0x1, [@CTA_TUPLE_IP={0x14, 0x1, 0x0, 0x1, @ipv4={{0x8, 0x1, @multicast1}, {0x8, 0x2, @dev={0xac, 0x14, 0x14, 0x3a}}}}, @CTA_TUPLE_ZONE={0x6}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5, 0x1, 0x21}}, @CTA_TUPLE_IP={0x14, 0x1, 0x0, 0x1, @ipv4={{0x8, 0x1, @empty}, {0x8, 0x2, @local}}}, @CTA_TUPLE_IP={0x2c, 0x1, 0x0, 0x1, @ipv6={{0x14, 0x3, @private1={0xfc, 0x1, '\x00', 0x1}}, {0x14, 0x4, @rand_addr=' \x01\x00'}}}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5, 0x1, 0x1}}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5, 0x1, 0x88}}, @CTA_TUPLE_IP={0x2c, 0x1, 0x0, 0x1, @ipv6={{0x14, 0x3, @empty}, {0x14, 0x4, @dev={0xfe, 0x80, '\x00', 0x21}}}}, @CTA_TUPLE_IP={0x2c, 0x1, 0x0, 0x1, @ipv6={{0x14, 0x3, @local}, {0x14, 0x4, @ipv4={'\x00', '\xff\xff', @rand_addr=0x64010100}}}}]}]}, 0x1d0}}, 0x48000) perf_event_open(&(0x7f0000000500)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x15, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$binfmt_elf32(0xffffffffffffffff, &(0x7f0000000040)=ANY=[], 0x69) connect$can_bcm(0xffffffffffffffff, &(0x7f0000000000), 0x10) sendmsg$can_bcm(0xffffffffffffffff, &(0x7f0000000480)={&(0x7f0000000340)={0x1d, 0x0, 0x3f420f00}, 0x10, &(0x7f0000000040)={&(0x7f0000000580)=ANY=[@ANYBLOB="01000000d7fe68ca0000e9ffffff0000", @ANYRES64=0x0, @ANYRES64=0x0, @ANYRES64=0x0, @ANYRES64], 0x20000600}}, 0x0) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(0xffffffffffffffff, 0x89f0, &(0x7f0000000280)={'gretap0\x00', &(0x7f0000000240)={'ip_vti0\x00', 0x0, 0x7, 0x80, 0xfffffff7, 0x7, {{0x8, 0x4, 0x0, 0x5, 0x20, 0x67, 0x0, 0xc0, 0x29, 0x0, @local, @empty, {[@timestamp={0x44, 0xc, 0x8, 0x0, 0x2, [0x7f, 0x1]}]}}}}}) socket(0x10, 0x3, 0x0) process_mrelease(0xffffffffffffffff, 0x0) r3 = socket$packet(0x11, 0x2, 0x300) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, 0x0) getsockopt$inet_sctp_SCTP_RECVNXTINFO(r2, 0x84, 0x21, &(0x7f0000000140), &(0x7f0000000200)=0x4) bind$unix(r0, &(0x7f00000005c0)=@abs={0x1, 0x0, 0x4e23}, 0x6e) syz_clone(0x40000000, &(0x7f00000000c0), 0x0, 0x0, &(0x7f00000001c0), 0x0) 12:21:11 executing program 2: open(&(0x7f0000000400)='./bus\x00', 0x14103e, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$L2TP_CMD_SESSION_MODIFY(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000080)={0xec0, r1, 0x1, 0x0, 0x0, {}, [@L2TP_ATTR_SEND_SEQ={0x5}, @L2TP_ATTR_IFNAME={0x14, 0x8, 'veth1_to_hsr\x00'}]}, 0x30}}, 0x0) 12:21:11 executing program 3: open(0x0, 0x0, 0x0) openat$vcsa(0xffffffffffffff9c, &(0x7f00000003c0), 0x402, 0x0) 12:21:11 executing program 4: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x82, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket(0x10, 0x803, 0x0) sendto(r0, &(0x7f00000000c0)="120000001200e7ef007b00000000000000a1", 0x12, 0x0, 0x0, 0x0) recvmmsg(r0, &(0x7f00000037c0)=[{{&(0x7f00000004c0)=@ethernet={0x0, @random}, 0x80, &(0x7f0000000380)=[{&(0x7f0000000040)=""/95, 0x5f}, {&(0x7f0000000140)=""/85, 0x55}, {&(0x7f0000000fc0)=""/4096, 0x1000}, {&(0x7f0000000400)=""/106, 0x6a}, {&(0x7f0000000740)=""/73, 0x49}, {&(0x7f0000000200)=""/77, 0x4d}, {0x0, 0x34000}], 0x7, &(0x7f0000000600)=""/191, 0xbf}}], 0x1, 0x0, &(0x7f0000003700)={0x77359400}) 12:21:11 executing program 1: syz_mount_image$ext4(&(0x7f0000000740)='ext4\x00', &(0x7f0000000100)='./bus\x00', 0x804810, &(0x7f0000000180)=ANY=[@ANYBLOB="0061021d307a961da7401271e3fa98008000001d3902ccfd562158cb15c016093893c9e4abd02bc4f1492514fa2dfebc8001000080000000008a1049ca0000"], 0x1, 0x73b, &(0x7f0000000780)="$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") chdir(&(0x7f0000000080)='./file0\x00') open(&(0x7f00000000c0)='./bus\x00', 0x14da42, 0x0) mount(&(0x7f0000000380)=@loop={'/dev/loop', 0x0}, &(0x7f00000003c0)='./bus\x00', 0x0, 0x1000, 0x0) r0 = open(&(0x7f0000000400)='./bus\x00', 0x0, 0x0) ioctl$LOOP_SET_STATUS(r0, 0x4c02, &(0x7f00000001c0)={0x0, {}, 0x0, {}, 0xff, 0x0, 0x0, 0x0, "be8176c9e6755a48a3c0230dd390efe12f8306bed95b2afd402aae879978d959ff9009eec610d9108ea036456bb79e26ee42d0a34968c1fdbb33e8ad5860f632", "b948757aa008fae13adca739a9f126462ab528ea52e90ce2cf50a4ef2568375b"}) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='blkio.throttle.io_service_bytes\x00', 0x275a, 0x900) [ 980.121839][ T2964] loop1: detected capacity change from 2048 to 2047 [ 980.152390][ T3128] EXT4-fs (loop1): unmounting filesystem 00000000-0000-0000-0000-000000000000. [ 980.280797][ T2987] loop1: detected capacity change from 0 to 2048 [ 980.345155][ T2987] EXT4-fs (loop1): mounted filesystem 00000000-0000-0000-0000-000000000000 without journal. Quota mode: none. [ 980.386592][ T2987] ext4 filesystem being mounted at /root/syzkaller-testdir1539738704/syzkaller.ao1jj3/3743/bus supports timestamps until 2038 (0x7fffffff) [ 980.461883][ T2987] loop1: detected capacity change from 2048 to 2047 [ 980.482446][ T2992] EXT4-fs error (device loop1): ext4_find_dest_de:2093: inode #12: block 80: comm syz-executor.1: bad entry in directory: rec_len is smaller than minimal - offset=0, inode=0, rec_len=0, size=4096 fake=0 [ 980.567159][ T3128] EXT4-fs (loop1): unmounting filesystem 00000000-0000-0000-0000-000000000000. 12:21:12 executing program 0: r0 = socket$unix(0x1, 0x2, 0x0) r1 = socket$can_bcm(0x1d, 0x2, 0x2) connect$can_bcm(r1, 0x0, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(0xffffffffffffffff, 0x89e1, 0xffffffffffffffff) getsockopt$inet_sctp_SCTP_PEER_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1a, &(0x7f0000000380)={0x0, 0x80, "f29c5b753353d9c7798811e57823354f32d6cb0899a53381003e4f8dbbb1ea469076c8e175a20b45443f885afb38b83813d5e013d4fad662f1582b23328b4ed70ad9d7d4d0052d0147d8b0ac4910985bec8aa8956c599d291a7da55fec010801d8f02dcff373f52f59f867378c13f4a080938c965846a7e8229b410b3ea0f9ce"}, &(0x7f00000002c0)=0x88) socket$igmp6(0xa, 0x3, 0x2) perf_event_open(&(0x7f0000000500)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x15, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) close(0xffffffffffffffff) socket$inet_mptcp(0x2, 0x1, 0x106) connect$can_bcm(0xffffffffffffffff, &(0x7f0000000000), 0x10) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, 0x0) bind$unix(r0, &(0x7f00000005c0)=@abs={0x1, 0x0, 0x4e23}, 0x6e) syz_clone(0x40000000, &(0x7f00000000c0), 0x0, 0x0, &(0x7f00000001c0), 0x0) 12:21:12 executing program 3: syz_open_dev$vcsu(&(0x7f0000000380), 0x70390d31, 0x0) 12:21:12 executing program 2: open(&(0x7f0000000400)='./bus\x00', 0x14103e, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$L2TP_CMD_SESSION_MODIFY(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000080)={0x33fe0, r1, 0x1, 0x0, 0x0, {}, [@L2TP_ATTR_SEND_SEQ={0x5}, @L2TP_ATTR_IFNAME={0x14, 0x8, 'veth1_to_hsr\x00'}]}, 0x30}}, 0x0) 12:21:12 executing program 4: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x82, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket(0x10, 0x803, 0x0) sendto(r0, &(0x7f00000000c0)="120000001200e7ef007b00000000000000a1", 0x12, 0x0, 0x0, 0x0) recvmmsg(r0, &(0x7f00000037c0)=[{{&(0x7f00000004c0)=@ethernet={0x0, @random}, 0x80, &(0x7f0000000380)=[{&(0x7f0000000040)=""/95, 0x5f}, {&(0x7f0000000140)=""/85, 0x55}, {&(0x7f0000000fc0)=""/4096, 0x1000}, {&(0x7f0000000400)=""/106, 0x6a}, {&(0x7f0000000740)=""/73, 0x49}, {&(0x7f0000000200)=""/77, 0x4d}, {0x0, 0x200000}], 0x7, &(0x7f0000000600)=""/191, 0xbf}}], 0x1, 0x0, &(0x7f0000003700)={0x77359400}) 12:21:12 executing program 1: syz_mount_image$ext4(&(0x7f0000000740)='ext4\x00', &(0x7f0000000100)='./bus\x00', 0x804810, &(0x7f0000000180)=ANY=[@ANYBLOB="0061021d307a961da7401271e3fa98008000001d3902ccfd562158cb15c016093893c9e4abd02bc4f1492514fa2dfebc8001000080000000008a1049ca0000"], 0x1, 0x73b, &(0x7f0000000780)="$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") chdir(&(0x7f0000000080)='./file0\x00') open(&(0x7f00000000c0)='./bus\x00', 0x14da42, 0x0) mount(&(0x7f0000000380)=@loop={'/dev/loop', 0x0}, &(0x7f00000003c0)='./bus\x00', 0x0, 0x1000, 0x0) r0 = open(&(0x7f0000000400)='./bus\x00', 0x0, 0x0) ioctl$LOOP_SET_STATUS(r0, 0x4c02, &(0x7f00000001c0)={0x0, {}, 0x0, {}, 0xff, 0x0, 0x0, 0x0, "be8176c9e6755a48a3c0230dd390efe12f8306bed95b2afd402aae879978d959ff9009eec610d9108ea036456bb79e26ee42d0a34968c1fdbb33e8ad5860f632", "b948757aa008fae13adca739a9f126462ab528ea52e90ce2cf50a4ef2568375b"}) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='blkio.throttle.io_service_bytes\x00', 0x275a, 0xa00) 12:21:12 executing program 2: open(&(0x7f0000000400)='./bus\x00', 0x14103e, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$L2TP_CMD_SESSION_MODIFY(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000080)={0x7ffff000, r1, 0x1, 0x0, 0x0, {}, [@L2TP_ATTR_SEND_SEQ={0x5}, @L2TP_ATTR_IFNAME={0x14, 0x8, 'veth1_to_hsr\x00'}]}, 0x30}}, 0x0) 12:21:12 executing program 3: syz_clone3(&(0x7f0000000600)={0x90003000, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) [ 980.783811][ T2996] loop1: detected capacity change from 0 to 2048 [ 980.838019][ T2996] EXT4-fs (loop1): mounted filesystem 00000000-0000-0000-0000-000000000000 without journal. Quota mode: none. [ 980.878534][ T2996] ext4 filesystem being mounted at /root/syzkaller-testdir1539738704/syzkaller.ao1jj3/3744/bus supports timestamps until 2038 (0x7fffffff) [ 980.977516][ T2996] loop1: detected capacity change from 2048 to 2047 [ 981.015831][ T3128] EXT4-fs (loop1): unmounting filesystem 00000000-0000-0000-0000-000000000000. 12:21:12 executing program 5: r0 = socket$unix(0x1, 0x2, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f0000000100)={'vcan0\x00', 0x0}) r2 = socket$can_bcm(0x1d, 0x2, 0x2) connect$can_bcm(r2, &(0x7f0000000000), 0x10) ioctl$sock_kcm_SIOCKCMUNATTACH(0xffffffffffffffff, 0x89e1, 0xffffffffffffffff) ioctl$sock_SIOCSPGRP(0xffffffffffffffff, 0x8902, 0x0) sendmsg$can_bcm(r2, &(0x7f0000000480)={&(0x7f0000000340)={0x1d, r1, 0x3f420f00}, 0x10, 0x0}, 0x0) r3 = socket(0x23, 0x800, 0x40000) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r3, 0x541b, &(0x7f00000000c0)={'ip6_vti0\x00', 0x0}) sendmsg$IPCTNL_MSG_EXP_DELETE(r3, &(0x7f00000004c0)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x40000040}, 0xc, &(0x7f0000000440)={&(0x7f00000006c0)={0x1d0, 0x2, 0x2, 0x201, 0x0, 0x0, {0xa}, [@CTA_EXPECT_NAT={0xc0, 0xa, 0x0, 0x1, [@CTA_EXPECT_NAT_TUPLE={0xc, 0x2, 0x0, 0x1, [@CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x1}]}, @CTA_EXPECT_NAT_TUPLE={0x70, 0x2, 0x0, 0x1, [@CTA_TUPLE_IP={0x2c, 0x1, 0x0, 0x1, @ipv6={{0x14, 0x3, @loopback}, {0x14, 0x4, @private0}}}, @CTA_TUPLE_IP={0x14, 0x1, 0x0, 0x1, @ipv4={{0x8, 0x1, @empty}, {0x8, 0x2, @initdev={0xac, 0x1e, 0x1, 0x0}}}}, @CTA_TUPLE_IP={0x14, 0x1, 0x0, 0x1, @ipv4={{0x8, 0x1, @local}, {0x8, 0x2, @loopback}}}, @CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x4}, @CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x3}, @CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x1}]}, @CTA_EXPECT_NAT_TUPLE={0x38, 0x2, 0x0, 0x1, [@CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5, 0x1, 0x88}}, @CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x3}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5, 0x1, 0x21}}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5, 0x1, 0x1}}, @CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x3}]}, @CTA_EXPECT_NAT_DIR={0x8}]}, @CTA_EXPECT_MASTER={0x20, 0x1, 0x0, 0x1, [@CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x1}, @CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x2}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5, 0x1, 0x84}}]}, @CTA_EXPECT_MASTER={0xdc, 0x1, 0x0, 0x1, [@CTA_TUPLE_IP={0x14, 0x1, 0x0, 0x1, @ipv4={{0x8, 0x1, @multicast1}, {0x8, 0x2, @dev={0xac, 0x14, 0x14, 0x3a}}}}, @CTA_TUPLE_ZONE={0x6}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5, 0x1, 0x21}}, @CTA_TUPLE_IP={0x14, 0x1, 0x0, 0x1, @ipv4={{0x8, 0x1, @empty}, {0x8, 0x2, @local}}}, @CTA_TUPLE_IP={0x2c, 0x1, 0x0, 0x1, @ipv6={{0x14, 0x3, @private1={0xfc, 0x1, '\x00', 0x1}}, {0x14, 0x4, @rand_addr=' \x01\x00'}}}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5, 0x1, 0x1}}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5, 0x1, 0x88}}, @CTA_TUPLE_IP={0x2c, 0x1, 0x0, 0x1, @ipv6={{0x14, 0x3, @empty}, {0x14, 0x4, @dev={0xfe, 0x80, '\x00', 0x21}}}}, @CTA_TUPLE_IP={0x2c, 0x1, 0x0, 0x1, @ipv6={{0x14, 0x3, @local}, {0x14, 0x4, @ipv4={'\x00', '\xff\xff', @rand_addr=0x64010100}}}}]}]}, 0x1d0}}, 0x48000) perf_event_open(&(0x7f0000000500)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x15, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$binfmt_elf32(0xffffffffffffffff, &(0x7f0000000040)=ANY=[], 0x69) connect$can_bcm(0xffffffffffffffff, &(0x7f0000000000), 0x10) sendmsg$can_bcm(0xffffffffffffffff, &(0x7f0000000480)={&(0x7f0000000340)={0x1d, 0x0, 0x3f420f00}, 0x10, &(0x7f0000000040)={&(0x7f0000000580)=ANY=[@ANYBLOB="01000000d7fe68ca0000e9ffffff0000", @ANYRES64=0x0, @ANYRES64=0x0, @ANYRES64=0x0, @ANYRES64], 0x20000600}}, 0x0) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(0xffffffffffffffff, 0x89f0, &(0x7f0000000280)={'gretap0\x00', &(0x7f0000000240)={'ip_vti0\x00', 0x0, 0x7, 0x80, 0xfffffff7, 0x7, {{0x8, 0x4, 0x0, 0x5, 0x20, 0x67, 0x0, 0xc0, 0x29, 0x0, @local, @empty, {[@timestamp={0x44, 0xc, 0x8, 0x0, 0x2, [0x7f, 0x1]}]}}}}}) socket(0x10, 0x3, 0x0) process_mrelease(0xffffffffffffffff, 0x0) r4 = socket$packet(0x11, 0x2, 0x300) ioctl$sock_SIOCGIFINDEX(r4, 0x8933, 0x0) getsockopt$inet_sctp_SCTP_RECVNXTINFO(r3, 0x84, 0x21, &(0x7f0000000140), &(0x7f0000000200)=0x4) bind$unix(r0, &(0x7f00000005c0)=@abs={0x1, 0x0, 0x4e23}, 0x6e) syz_clone(0x40000000, &(0x7f00000000c0), 0x0, 0x0, &(0x7f00000001c0), 0x0) 12:21:12 executing program 2: open(&(0x7f0000000400)='./bus\x00', 0x14103e, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$L2TP_CMD_SESSION_MODIFY(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000080)={0xfffffdef, r1, 0x1, 0x0, 0x0, {}, [@L2TP_ATTR_SEND_SEQ={0x5}, @L2TP_ATTR_IFNAME={0x14, 0x8, 'veth1_to_hsr\x00'}]}, 0x30}}, 0x0) 12:21:12 executing program 4: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x82, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket(0x10, 0x803, 0x0) sendto(r0, &(0x7f00000000c0)="120000001200e7ef007b00000000000000a1", 0x12, 0x0, 0x0, 0x0) recvmmsg(r0, &(0x7f00000037c0)=[{{&(0x7f00000004c0)=@ethernet={0x0, @random}, 0x80, &(0x7f0000000380)=[{&(0x7f0000000040)=""/95, 0x5f}, {&(0x7f0000000140)=""/85, 0x55}, {&(0x7f0000000fc0)=""/4096, 0x1000}, {&(0x7f0000000400)=""/106, 0x6a}, {&(0x7f0000000740)=""/73, 0x49}, {&(0x7f0000000200)=""/77, 0x4d}, {0x0, 0x400300}], 0x7, &(0x7f0000000600)=""/191, 0xbf}}], 0x1, 0x0, &(0x7f0000003700)={0x77359400}) 12:21:12 executing program 3: r0 = msgget(0x1, 0x200) r1 = msgget$private(0x0, 0x208) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f00000002c0)=0x0) msgctl$IPC_SET(r1, 0x1, &(0x7f0000000300)={{0x1, 0xee00, 0xee00, 0xffffffffffffffff, 0x0, 0x140}, 0x0, 0x0, 0x3000000000, 0xfffffffffffffffe, 0x0, 0xccd4, 0x8000, 0xfab9, 0x1, 0x9, 0x0, r2}) getresgid(&(0x7f0000000040)=0x0, 0x0, 0x0) getresgid(&(0x7f0000000180)=0x0, &(0x7f00000001c0)=0x0, &(0x7f0000000200)) msgctl$IPC_SET(r0, 0x1, &(0x7f0000000240)={{0x1, 0xee01, r3, 0xee01, r5, 0x8, 0x7}, 0x0, 0x0, 0x1, 0x7, 0x1, 0x9, 0x39c3, 0x4, 0x200, 0x2, 0x0, 0xffffffffffffffff}) msgctl$IPC_SET(r0, 0x1, &(0x7f00000009c0)={{0x2, 0x0, 0x0, 0x0, r4, 0x4, 0x7}, 0x0, 0x0, 0xffff, 0x8, 0x2, 0x59f4, 0x3ff, 0x0, 0x1, 0x7, r2, r2}) pselect6(0x40, &(0x7f0000000000)={0x5, 0x0, 0x0, 0x0, 0x3, 0x40, 0x60759de0, 0x8}, 0x0, &(0x7f0000000080)={0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x4}, &(0x7f00000000c0)={0x77359400}, 0x0) syz_open_dev$char_usb(0xc, 0xb4, 0x0) getuid() msgget(0x3, 0x10) getuid() syz_clone3(0x0, 0x0) syz_clone(0x89020100, &(0x7f0000000680)="e7b538fd41938fa756eb9c20722920259ad837bba5ac743364d5b725dbe9c67885520771f8eca9597736c5ab39e1582a692ac86b3664db5bde2eedaff05abc1dcce0dd40fecc78440f185edaccdc9ba486c22f26e9b8fe4fda2fb899b9e7bb4929ce268d1b837b2b18a548ec2f41e667644b985fc8e0e748ebf701d029f03ea459532f1d8ec2b1dda3ef85af57f23a66e4366a85483e069ac5a0519501adcaec28f003c3641dfd9430b649e56af9e872a810c50ef0f4b96ea09ab11465933b2a278fec1128ba8204aaba92f95271f75a", 0xd0, &(0x7f0000000780), &(0x7f00000007c0), &(0x7f0000000800)="bf7fbd4f5542d44e3c5ceef4825e43bbf3fd2fc426b0ed765490a09fb3c3e38dd17486f4df2c9f105dce5486300b81bdbdaa06922a8997b8c0134a6edf4e12309e0f6a5bc62cc81dbb8645409501aa2e056106321385851389896fe905e73a3dc9abe5a0fd06") 12:21:12 executing program 1: syz_mount_image$ext4(&(0x7f0000000740)='ext4\x00', &(0x7f0000000100)='./bus\x00', 0x804810, &(0x7f0000000180)=ANY=[@ANYBLOB="0061021d307a961da7401271e3fa98008000001d3902ccfd562158cb15c016093893c9e4abd02bc4f1492514fa2dfebc8001000080000000008a1049ca0000"], 0x1, 0x73b, &(0x7f0000000780)="$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") chdir(&(0x7f0000000080)='./file0\x00') open(&(0x7f00000000c0)='./bus\x00', 0x14da42, 0x0) mount(&(0x7f0000000380)=@loop={'/dev/loop', 0x0}, &(0x7f00000003c0)='./bus\x00', 0x0, 0x1000, 0x0) r0 = open(&(0x7f0000000400)='./bus\x00', 0x0, 0x0) ioctl$LOOP_SET_STATUS(r0, 0x4c02, &(0x7f00000001c0)={0x0, {}, 0x0, {}, 0xff, 0x0, 0x0, 0x0, "be8176c9e6755a48a3c0230dd390efe12f8306bed95b2afd402aae879978d959ff9009eec610d9108ea036456bb79e26ee42d0a34968c1fdbb33e8ad5860f632", "b948757aa008fae13adca739a9f126462ab528ea52e90ce2cf50a4ef2568375b"}) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='blkio.throttle.io_service_bytes\x00', 0x275a, 0xb00) [ 981.251100][ T3020] loop1: detected capacity change from 0 to 2048 [ 981.277056][ T3020] EXT4-fs (loop1): mounted filesystem 00000000-0000-0000-0000-000000000000 without journal. Quota mode: none. [ 981.291766][ T3020] ext4 filesystem being mounted at /root/syzkaller-testdir1539738704/syzkaller.ao1jj3/3745/bus supports timestamps until 2038 (0x7fffffff) [ 981.361854][ T3020] loop1: detected capacity change from 2048 to 2047 [ 981.380424][ T3128] EXT4-fs (loop1): unmounting filesystem 00000000-0000-0000-0000-000000000000. 12:21:13 executing program 0: r0 = socket$unix(0x1, 0x2, 0x0) r1 = socket$can_bcm(0x1d, 0x2, 0x2) connect$can_bcm(r1, &(0x7f0000000000), 0x10) ioctl$sock_kcm_SIOCKCMUNATTACH(0xffffffffffffffff, 0x89e1, 0xffffffffffffffff) getsockopt$inet_sctp_SCTP_PEER_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1a, 0x0, &(0x7f00000002c0)) socket$igmp6(0xa, 0x3, 0x2) perf_event_open(&(0x7f0000000500)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x15, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) close(0xffffffffffffffff) socket$inet_mptcp(0x2, 0x1, 0x106) connect$can_bcm(0xffffffffffffffff, &(0x7f0000000000), 0x10) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, 0x0) bind$unix(r0, &(0x7f00000005c0)=@abs={0x1, 0x0, 0x4e23}, 0x6e) syz_clone(0x40000000, &(0x7f00000000c0), 0x0, 0x0, &(0x7f00000001c0), 0x0) 12:21:13 executing program 2: open(&(0x7f0000000400)='./bus\x00', 0x14103e, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$L2TP_CMD_SESSION_MODIFY(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000080)={0x30, r1, 0x2, 0x0, 0x0, {}, [@L2TP_ATTR_SEND_SEQ={0x5}, @L2TP_ATTR_IFNAME={0x14, 0x8, 'veth1_to_hsr\x00'}]}, 0x30}}, 0x0) 12:21:13 executing program 1: syz_mount_image$ext4(&(0x7f0000000740)='ext4\x00', &(0x7f0000000100)='./bus\x00', 0x804810, &(0x7f0000000180)=ANY=[@ANYBLOB="0061021d307a961da7401271e3fa98008000001d3902ccfd562158cb15c016093893c9e4abd02bc4f1492514fa2dfebc8001000080000000008a1049ca0000"], 0x1, 0x73b, &(0x7f0000000780)="$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") chdir(&(0x7f0000000080)='./file0\x00') open(&(0x7f00000000c0)='./bus\x00', 0x14da42, 0x0) mount(&(0x7f0000000380)=@loop={'/dev/loop', 0x0}, &(0x7f00000003c0)='./bus\x00', 0x0, 0x1000, 0x0) r0 = open(&(0x7f0000000400)='./bus\x00', 0x0, 0x0) ioctl$LOOP_SET_STATUS(r0, 0x4c02, &(0x7f00000001c0)={0x0, {}, 0x0, {}, 0xff, 0x0, 0x0, 0x0, "be8176c9e6755a48a3c0230dd390efe12f8306bed95b2afd402aae879978d959ff9009eec610d9108ea036456bb79e26ee42d0a34968c1fdbb33e8ad5860f632", "b948757aa008fae13adca739a9f126462ab528ea52e90ce2cf50a4ef2568375b"}) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='blkio.throttle.io_service_bytes\x00', 0x275a, 0xc00) 12:21:13 executing program 4: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x82, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket(0x10, 0x803, 0x0) sendto(r0, &(0x7f00000000c0)="120000001200e7ef007b00000000000000a1", 0x12, 0x0, 0x0, 0x0) recvmmsg(r0, &(0x7f00000037c0)=[{{&(0x7f00000004c0)=@ethernet={0x0, @random}, 0x80, &(0x7f0000000380)=[{&(0x7f0000000040)=""/95, 0x5f}, {&(0x7f0000000140)=""/85, 0x55}, {&(0x7f0000000fc0)=""/4096, 0x1000}, {&(0x7f0000000400)=""/106, 0x6a}, {&(0x7f0000000740)=""/73, 0x49}, {&(0x7f0000000200)=""/77, 0x4d}, {0x0, 0xa00100}], 0x7, &(0x7f0000000600)=""/191, 0xbf}}], 0x1, 0x0, &(0x7f0000003700)={0x77359400}) 12:21:13 executing program 5: r0 = socket$unix(0x1, 0x2, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f0000000100)={'vcan0\x00', 0x0}) r2 = socket$can_bcm(0x1d, 0x2, 0x2) connect$can_bcm(r2, &(0x7f0000000000), 0x10) ioctl$sock_kcm_SIOCKCMUNATTACH(0xffffffffffffffff, 0x89e1, 0xffffffffffffffff) ioctl$sock_SIOCSPGRP(0xffffffffffffffff, 0x8902, 0x0) sendmsg$can_bcm(r2, &(0x7f0000000480)={&(0x7f0000000340)={0x1d, r1, 0x3f420f00}, 0x10, 0x0}, 0x0) r3 = socket(0x23, 0x800, 0x40000) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r3, 0x541b, &(0x7f00000000c0)={'ip6_vti0\x00', 0x0}) sendmsg$IPCTNL_MSG_EXP_DELETE(r3, &(0x7f00000004c0)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x40000040}, 0xc, &(0x7f0000000440)={&(0x7f00000006c0)={0x1d0, 0x2, 0x2, 0x201, 0x0, 0x0, {0xa}, [@CTA_EXPECT_NAT={0xc0, 0xa, 0x0, 0x1, [@CTA_EXPECT_NAT_TUPLE={0xc, 0x2, 0x0, 0x1, [@CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x1}]}, @CTA_EXPECT_NAT_TUPLE={0x70, 0x2, 0x0, 0x1, [@CTA_TUPLE_IP={0x2c, 0x1, 0x0, 0x1, @ipv6={{0x14, 0x3, @loopback}, {0x14, 0x4, @private0}}}, @CTA_TUPLE_IP={0x14, 0x1, 0x0, 0x1, @ipv4={{0x8, 0x1, @empty}, {0x8, 0x2, @initdev={0xac, 0x1e, 0x1, 0x0}}}}, @CTA_TUPLE_IP={0x14, 0x1, 0x0, 0x1, @ipv4={{0x8, 0x1, @local}, {0x8, 0x2, @loopback}}}, @CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x4}, @CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x3}, @CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x1}]}, @CTA_EXPECT_NAT_TUPLE={0x38, 0x2, 0x0, 0x1, [@CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5, 0x1, 0x88}}, @CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x3}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5, 0x1, 0x21}}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5, 0x1, 0x1}}, @CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x3}]}, @CTA_EXPECT_NAT_DIR={0x8}]}, @CTA_EXPECT_MASTER={0x20, 0x1, 0x0, 0x1, [@CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x1}, @CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x2}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5, 0x1, 0x84}}]}, @CTA_EXPECT_MASTER={0xdc, 0x1, 0x0, 0x1, [@CTA_TUPLE_IP={0x14, 0x1, 0x0, 0x1, @ipv4={{0x8, 0x1, @multicast1}, {0x8, 0x2, @dev={0xac, 0x14, 0x14, 0x3a}}}}, @CTA_TUPLE_ZONE={0x6}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5, 0x1, 0x21}}, @CTA_TUPLE_IP={0x14, 0x1, 0x0, 0x1, @ipv4={{0x8, 0x1, @empty}, {0x8, 0x2, @local}}}, @CTA_TUPLE_IP={0x2c, 0x1, 0x0, 0x1, @ipv6={{0x14, 0x3, @private1={0xfc, 0x1, '\x00', 0x1}}, {0x14, 0x4, @rand_addr=' \x01\x00'}}}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5, 0x1, 0x1}}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5, 0x1, 0x88}}, @CTA_TUPLE_IP={0x2c, 0x1, 0x0, 0x1, @ipv6={{0x14, 0x3, @empty}, {0x14, 0x4, @dev={0xfe, 0x80, '\x00', 0x21}}}}, @CTA_TUPLE_IP={0x2c, 0x1, 0x0, 0x1, @ipv6={{0x14, 0x3, @local}, {0x14, 0x4, @ipv4={'\x00', '\xff\xff', @rand_addr=0x64010100}}}}]}]}, 0x1d0}}, 0x48000) perf_event_open(&(0x7f0000000500)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x15, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$binfmt_elf32(0xffffffffffffffff, &(0x7f0000000040)=ANY=[], 0x69) connect$can_bcm(0xffffffffffffffff, &(0x7f0000000000), 0x10) sendmsg$can_bcm(0xffffffffffffffff, &(0x7f0000000480)={&(0x7f0000000340)={0x1d, 0x0, 0x3f420f00}, 0x10, &(0x7f0000000040)={&(0x7f0000000580)=ANY=[@ANYBLOB="01000000d7fe68ca0000e9ffffff0000", @ANYRES64=0x0, @ANYRES64=0x0, @ANYRES64=0x0, @ANYRES64], 0x20000600}}, 0x0) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(0xffffffffffffffff, 0x89f0, &(0x7f0000000280)={'gretap0\x00', &(0x7f0000000240)={'ip_vti0\x00', 0x0, 0x7, 0x80, 0xfffffff7, 0x7, {{0x8, 0x4, 0x0, 0x5, 0x20, 0x67, 0x0, 0xc0, 0x29, 0x0, @local, @empty, {[@timestamp={0x44, 0xc, 0x8, 0x0, 0x2, [0x7f, 0x1]}]}}}}}) socket(0x10, 0x3, 0x0) process_mrelease(0xffffffffffffffff, 0x0) r4 = socket$packet(0x11, 0x2, 0x300) ioctl$sock_SIOCGIFINDEX(r4, 0x8933, 0x0) getsockopt$inet_sctp_SCTP_RECVNXTINFO(r3, 0x84, 0x21, &(0x7f0000000140), &(0x7f0000000200)=0x4) bind$unix(r0, &(0x7f00000005c0)=@abs={0x1, 0x0, 0x4e23}, 0x6e) syz_clone(0x40000000, &(0x7f00000000c0), 0x0, 0x0, &(0x7f00000001c0), 0x0) 12:21:13 executing program 2: open(&(0x7f0000000400)='./bus\x00', 0x14103e, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$L2TP_CMD_SESSION_MODIFY(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000080)={0x30, r1, 0x3, 0x0, 0x0, {}, [@L2TP_ATTR_SEND_SEQ={0x5}, @L2TP_ATTR_IFNAME={0x14, 0x8, 'veth1_to_hsr\x00'}]}, 0x30}}, 0x0) 12:21:13 executing program 4: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x82, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket(0x10, 0x803, 0x0) sendto(r0, &(0x7f00000000c0)="120000001200e7ef007b00000000000000a1", 0x12, 0x0, 0x0, 0x0) recvmmsg(r0, &(0x7f00000037c0)=[{{&(0x7f00000004c0)=@ethernet={0x0, @random}, 0x80, &(0x7f0000000380)=[{&(0x7f0000000040)=""/95, 0x5f}, {&(0x7f0000000140)=""/85, 0x55}, {&(0x7f0000000fc0)=""/4096, 0x1000}, {&(0x7f0000000400)=""/106, 0x6a}, {&(0x7f0000000740)=""/73, 0x49}, {&(0x7f0000000200)=""/77, 0x4d}, {0x0, 0xca9a3b}], 0x7, &(0x7f0000000600)=""/191, 0xbf}}], 0x1, 0x0, &(0x7f0000003700)={0x77359400}) 12:21:13 executing program 2: open(&(0x7f0000000400)='./bus\x00', 0x14103e, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$L2TP_CMD_SESSION_MODIFY(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000080)={0x30, r1, 0x5, 0x0, 0x0, {}, [@L2TP_ATTR_SEND_SEQ={0x5}, @L2TP_ATTR_IFNAME={0x14, 0x8, 'veth1_to_hsr\x00'}]}, 0x30}}, 0x0) 12:21:13 executing program 2: open(&(0x7f0000000400)='./bus\x00', 0x14103e, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$L2TP_CMD_SESSION_MODIFY(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000080)={0x30, r1, 0x6, 0x0, 0x0, {}, [@L2TP_ATTR_SEND_SEQ={0x5}, @L2TP_ATTR_IFNAME={0x14, 0x8, 'veth1_to_hsr\x00'}]}, 0x30}}, 0x0) [ 981.773769][ T3036] loop1: detected capacity change from 0 to 2048 12:21:13 executing program 2: open(&(0x7f0000000400)='./bus\x00', 0x14103e, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$L2TP_CMD_SESSION_MODIFY(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000080)={0x30, r1, 0x7, 0x0, 0x0, {}, [@L2TP_ATTR_SEND_SEQ={0x5}, @L2TP_ATTR_IFNAME={0x14, 0x8, 'veth1_to_hsr\x00'}]}, 0x30}}, 0x0) [ 981.838611][ T3036] EXT4-fs (loop1): mounted filesystem 00000000-0000-0000-0000-000000000000 without journal. Quota mode: none. [ 981.878279][ T3036] ext4 filesystem being mounted at /root/syzkaller-testdir1539738704/syzkaller.ao1jj3/3746/bus supports timestamps until 2038 (0x7fffffff) [ 981.961980][ T3036] loop1: detected capacity change from 2048 to 2047 [ 982.003155][ T3128] EXT4-fs (loop1): unmounting filesystem 00000000-0000-0000-0000-000000000000. 12:21:13 executing program 3: keyctl$clear(0x7, 0xfffffffffffffffd) r0 = add_key$keyring(&(0x7f00000007c0), &(0x7f0000000800)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffb) add_key$keyring(&(0x7f0000000740), 0x0, 0x0, 0x0, r0) 12:21:13 executing program 4: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x82, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket(0x10, 0x803, 0x0) sendto(r0, &(0x7f00000000c0)="120000001200e7ef007b00000000000000a1", 0x12, 0x0, 0x0, 0x0) recvmmsg(r0, &(0x7f00000037c0)=[{{&(0x7f00000004c0)=@ethernet={0x0, @random}, 0x80, &(0x7f0000000380)=[{&(0x7f0000000040)=""/95, 0x5f}, {&(0x7f0000000140)=""/85, 0x55}, {&(0x7f0000000fc0)=""/4096, 0x1000}, {&(0x7f0000000400)=""/106, 0x6a}, {&(0x7f0000000740)=""/73, 0x49}, {&(0x7f0000000200)=""/77, 0x4d}, {0x0, 0x1000000}], 0x7, &(0x7f0000000600)=""/191, 0xbf}}], 0x1, 0x0, &(0x7f0000003700)={0x77359400}) 12:21:13 executing program 1: syz_mount_image$ext4(&(0x7f0000000740)='ext4\x00', &(0x7f0000000100)='./bus\x00', 0x804810, &(0x7f0000000180)=ANY=[@ANYBLOB="0061021d307a961da7401271e3fa98008000001d3902ccfd562158cb15c016093893c9e4abd02bc4f1492514fa2dfebc8001000080000000008a1049ca0000"], 0x1, 0x73b, &(0x7f0000000780)="$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") chdir(&(0x7f0000000080)='./file0\x00') open(&(0x7f00000000c0)='./bus\x00', 0x14da42, 0x0) mount(&(0x7f0000000380)=@loop={'/dev/loop', 0x0}, &(0x7f00000003c0)='./bus\x00', 0x0, 0x1000, 0x0) r0 = open(&(0x7f0000000400)='./bus\x00', 0x0, 0x0) ioctl$LOOP_SET_STATUS(r0, 0x4c02, &(0x7f00000001c0)={0x0, {}, 0x0, {}, 0xff, 0x0, 0x0, 0x0, "be8176c9e6755a48a3c0230dd390efe12f8306bed95b2afd402aae879978d959ff9009eec610d9108ea036456bb79e26ee42d0a34968c1fdbb33e8ad5860f632", "b948757aa008fae13adca739a9f126462ab528ea52e90ce2cf50a4ef2568375b"}) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='blkio.throttle.io_service_bytes\x00', 0x275a, 0xd00) 12:21:13 executing program 2: open(&(0x7f0000000400)='./bus\x00', 0x14103e, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$L2TP_CMD_SESSION_MODIFY(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000080)={0x30, r1, 0x8, 0x0, 0x0, {}, [@L2TP_ATTR_SEND_SEQ={0x5}, @L2TP_ATTR_IFNAME={0x14, 0x8, 'veth1_to_hsr\x00'}]}, 0x30}}, 0x0) 12:21:13 executing program 3: r0 = msgget(0x3, 0x0) msgctl$IPC_SET(r0, 0x1, &(0x7f0000001480)={{0x3, 0xee00, 0xee01, 0x0, 0xee00}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}) 12:21:13 executing program 0: r0 = socket$unix(0x1, 0x2, 0x0) r1 = socket$can_bcm(0x1d, 0x2, 0x2) connect$can_bcm(r1, &(0x7f0000000000), 0x10) ioctl$sock_kcm_SIOCKCMUNATTACH(0xffffffffffffffff, 0x89e1, 0xffffffffffffffff) getsockopt$inet_sctp_SCTP_PEER_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1a, 0x0, &(0x7f00000002c0)) socket$igmp6(0xa, 0x3, 0x2) perf_event_open(&(0x7f0000000500)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x15, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) close(0xffffffffffffffff) socket$inet_mptcp(0x2, 0x1, 0x106) connect$can_bcm(0xffffffffffffffff, &(0x7f0000000000), 0x10) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, 0x0) bind$unix(r0, &(0x7f00000005c0)=@abs={0x1, 0x0, 0x4e23}, 0x6e) syz_clone(0x40000000, &(0x7f00000000c0), 0x0, 0x0, &(0x7f00000001c0), 0x0) [ 982.459890][ T3064] loop1: detected capacity change from 0 to 2048 12:21:14 executing program 5: r0 = socket$unix(0x1, 0x2, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f0000000100)={'vcan0\x00', 0x0}) r2 = socket$can_bcm(0x1d, 0x2, 0x2) connect$can_bcm(r2, &(0x7f0000000000), 0x10) ioctl$sock_kcm_SIOCKCMUNATTACH(0xffffffffffffffff, 0x89e1, 0xffffffffffffffff) ioctl$sock_SIOCSPGRP(0xffffffffffffffff, 0x8902, 0x0) sendmsg$can_bcm(r2, &(0x7f0000000480)={&(0x7f0000000340)={0x1d, r1, 0x3f420f00}, 0x10, 0x0}, 0x0) r3 = socket(0x23, 0x800, 0x40000) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r3, 0x541b, &(0x7f00000000c0)={'ip6_vti0\x00', 0x0}) sendmsg$IPCTNL_MSG_EXP_DELETE(r3, &(0x7f00000004c0)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x40000040}, 0xc, &(0x7f0000000440)={&(0x7f00000006c0)={0x1d0, 0x2, 0x2, 0x201, 0x0, 0x0, {0xa}, [@CTA_EXPECT_NAT={0xc0, 0xa, 0x0, 0x1, [@CTA_EXPECT_NAT_TUPLE={0xc, 0x2, 0x0, 0x1, [@CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x1}]}, @CTA_EXPECT_NAT_TUPLE={0x70, 0x2, 0x0, 0x1, [@CTA_TUPLE_IP={0x2c, 0x1, 0x0, 0x1, @ipv6={{0x14, 0x3, @loopback}, {0x14, 0x4, @private0}}}, @CTA_TUPLE_IP={0x14, 0x1, 0x0, 0x1, @ipv4={{0x8, 0x1, @empty}, {0x8, 0x2, @initdev={0xac, 0x1e, 0x1, 0x0}}}}, @CTA_TUPLE_IP={0x14, 0x1, 0x0, 0x1, @ipv4={{0x8, 0x1, @local}, {0x8, 0x2, @loopback}}}, @CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x4}, @CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x3}, @CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x1}]}, @CTA_EXPECT_NAT_TUPLE={0x38, 0x2, 0x0, 0x1, [@CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5, 0x1, 0x88}}, @CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x3}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5, 0x1, 0x21}}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5, 0x1, 0x1}}, @CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x3}]}, @CTA_EXPECT_NAT_DIR={0x8}]}, @CTA_EXPECT_MASTER={0x20, 0x1, 0x0, 0x1, [@CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x1}, @CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x2}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5, 0x1, 0x84}}]}, @CTA_EXPECT_MASTER={0xdc, 0x1, 0x0, 0x1, [@CTA_TUPLE_IP={0x14, 0x1, 0x0, 0x1, @ipv4={{0x8, 0x1, @multicast1}, {0x8, 0x2, @dev={0xac, 0x14, 0x14, 0x3a}}}}, @CTA_TUPLE_ZONE={0x6}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5, 0x1, 0x21}}, @CTA_TUPLE_IP={0x14, 0x1, 0x0, 0x1, @ipv4={{0x8, 0x1, @empty}, {0x8, 0x2, @local}}}, @CTA_TUPLE_IP={0x2c, 0x1, 0x0, 0x1, @ipv6={{0x14, 0x3, @private1={0xfc, 0x1, '\x00', 0x1}}, {0x14, 0x4, @rand_addr=' \x01\x00'}}}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5, 0x1, 0x1}}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5, 0x1, 0x88}}, @CTA_TUPLE_IP={0x2c, 0x1, 0x0, 0x1, @ipv6={{0x14, 0x3, @empty}, {0x14, 0x4, @dev={0xfe, 0x80, '\x00', 0x21}}}}, @CTA_TUPLE_IP={0x2c, 0x1, 0x0, 0x1, @ipv6={{0x14, 0x3, @local}, {0x14, 0x4, @ipv4={'\x00', '\xff\xff', @rand_addr=0x64010100}}}}]}]}, 0x1d0}}, 0x48000) perf_event_open(&(0x7f0000000500)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x15, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$binfmt_elf32(0xffffffffffffffff, &(0x7f0000000040)=ANY=[], 0x69) connect$can_bcm(0xffffffffffffffff, &(0x7f0000000000), 0x10) sendmsg$can_bcm(0xffffffffffffffff, &(0x7f0000000480)={&(0x7f0000000340)={0x1d, 0x0, 0x3f420f00}, 0x10, &(0x7f0000000040)={&(0x7f0000000580)=ANY=[@ANYBLOB="01000000d7fe68ca0000e9ffffff0000", @ANYRES64=0x0, @ANYRES64=0x0, @ANYRES64=0x0, @ANYRES64], 0x20000600}}, 0x0) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(0xffffffffffffffff, 0x89f0, &(0x7f0000000280)={'gretap0\x00', &(0x7f0000000240)={'ip_vti0\x00', 0x0, 0x7, 0x80, 0xfffffff7, 0x7, {{0x8, 0x4, 0x0, 0x5, 0x20, 0x67, 0x0, 0xc0, 0x29, 0x0, @local, @empty, {[@timestamp={0x44, 0xc, 0x8, 0x0, 0x2, [0x7f, 0x1]}]}}}}}) socket(0x10, 0x3, 0x0) process_mrelease(0xffffffffffffffff, 0x0) r4 = socket$packet(0x11, 0x2, 0x300) ioctl$sock_SIOCGIFINDEX(r4, 0x8933, 0x0) getsockopt$inet_sctp_SCTP_RECVNXTINFO(r3, 0x84, 0x21, &(0x7f0000000140), &(0x7f0000000200)=0x4) bind$unix(r0, &(0x7f00000005c0)=@abs={0x1, 0x0, 0x4e23}, 0x6e) syz_clone(0x40000000, &(0x7f00000000c0), 0x0, 0x0, &(0x7f00000001c0), 0x0) 12:21:14 executing program 4: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x82, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket(0x10, 0x803, 0x0) sendto(r0, &(0x7f00000000c0)="120000001200e7ef007b00000000000000a1", 0x12, 0x0, 0x0, 0x0) recvmmsg(r0, &(0x7f00000037c0)=[{{&(0x7f00000004c0)=@ethernet={0x0, @random}, 0x80, &(0x7f0000000380)=[{&(0x7f0000000040)=""/95, 0x5f}, {&(0x7f0000000140)=""/85, 0x55}, {&(0x7f0000000fc0)=""/4096, 0x1000}, {&(0x7f0000000400)=""/106, 0x6a}, {&(0x7f0000000740)=""/73, 0x49}, {&(0x7f0000000200)=""/77, 0x4d}, {0x0, 0x2000000}], 0x7, &(0x7f0000000600)=""/191, 0xbf}}], 0x1, 0x0, &(0x7f0000003700)={0x77359400}) 12:21:14 executing program 2: open(&(0x7f0000000400)='./bus\x00', 0x14103e, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$L2TP_CMD_SESSION_MODIFY(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000080)={0x30, r1, 0x9, 0x0, 0x0, {}, [@L2TP_ATTR_SEND_SEQ={0x5}, @L2TP_ATTR_IFNAME={0x14, 0x8, 'veth1_to_hsr\x00'}]}, 0x30}}, 0x0) 12:21:14 executing program 3: request_key(&(0x7f0000000240)='dns_resolver\x00', 0x0, 0x0, 0xfffffffffffffffb) syz_open_procfs$namespace(0xffffffffffffffff, &(0x7f0000000500)='ns/uts\x00') 12:21:14 executing program 4: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x82, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket(0x10, 0x803, 0x0) sendto(r0, &(0x7f00000000c0)="120000001200e7ef007b00000000000000a1", 0x12, 0x0, 0x0, 0x0) recvmmsg(r0, &(0x7f00000037c0)=[{{&(0x7f00000004c0)=@ethernet={0x0, @random}, 0x80, &(0x7f0000000380)=[{&(0x7f0000000040)=""/95, 0x5f}, {&(0x7f0000000140)=""/85, 0x55}, {&(0x7f0000000fc0)=""/4096, 0x1000}, {&(0x7f0000000400)=""/106, 0x6a}, {&(0x7f0000000740)=""/73, 0x49}, {&(0x7f0000000200)=""/77, 0x4d}, {0x0, 0x3000000}], 0x7, &(0x7f0000000600)=""/191, 0xbf}}], 0x1, 0x0, &(0x7f0000003700)={0x77359400}) 12:21:14 executing program 2: open(&(0x7f0000000400)='./bus\x00', 0x14103e, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$L2TP_CMD_SESSION_MODIFY(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000080)={0x30, r1, 0xa, 0x0, 0x0, {}, [@L2TP_ATTR_SEND_SEQ={0x5}, @L2TP_ATTR_IFNAME={0x14, 0x8, 'veth1_to_hsr\x00'}]}, 0x30}}, 0x0) 12:21:14 executing program 3: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000001780)={0x18, 0x4, &(0x7f0000000180)=@framed={{}, [@alu={0x4}]}, &(0x7f0000001680)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x1000000, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) [ 982.556151][ T3064] EXT4-fs (loop1): mounted filesystem 00000000-0000-0000-0000-000000000000 without journal. Quota mode: none. 12:21:14 executing program 2: open(&(0x7f0000000400)='./bus\x00', 0x14103e, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$L2TP_CMD_SESSION_MODIFY(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000080)={0x30, r1, 0xb, 0x0, 0x0, {}, [@L2TP_ATTR_SEND_SEQ={0x5}, @L2TP_ATTR_IFNAME={0x14, 0x8, 'veth1_to_hsr\x00'}]}, 0x30}}, 0x0) [ 982.656596][ T3064] ext4 filesystem being mounted at /root/syzkaller-testdir1539738704/syzkaller.ao1jj3/3747/bus supports timestamps until 2038 (0x7fffffff) 12:21:14 executing program 1: syz_mount_image$ext4(&(0x7f0000000740)='ext4\x00', &(0x7f0000000100)='./bus\x00', 0x804810, &(0x7f0000000180)=ANY=[@ANYBLOB="0061021d307a961da7401271e3fa98008000001d3902ccfd562158cb15c016093893c9e4abd02bc4f1492514fa2dfebc8001000080000000008a1049ca0000"], 0x1, 0x73b, &(0x7f0000000780)="$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") chdir(&(0x7f0000000080)='./file0\x00') open(&(0x7f00000000c0)='./bus\x00', 0x14da42, 0x0) mount(&(0x7f0000000380)=@loop={'/dev/loop', 0x0}, &(0x7f00000003c0)='./bus\x00', 0x0, 0x1000, 0x0) r0 = open(&(0x7f0000000400)='./bus\x00', 0x0, 0x0) ioctl$LOOP_SET_STATUS(r0, 0x4c02, &(0x7f00000001c0)={0x0, {}, 0x0, {}, 0xff, 0x0, 0x0, 0x0, "be8176c9e6755a48a3c0230dd390efe12f8306bed95b2afd402aae879978d959ff9009eec610d9108ea036456bb79e26ee42d0a34968c1fdbb33e8ad5860f632", "b948757aa008fae13adca739a9f126462ab528ea52e90ce2cf50a4ef2568375b"}) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='blkio.throttle.io_service_bytes\x00', 0x275a, 0xd60) 12:21:14 executing program 4: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x82, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket(0x10, 0x803, 0x0) sendto(r0, &(0x7f00000000c0)="120000001200e7ef007b00000000000000a1", 0x12, 0x0, 0x0, 0x0) recvmmsg(r0, &(0x7f00000037c0)=[{{&(0x7f00000004c0)=@ethernet={0x0, @random}, 0x80, &(0x7f0000000380)=[{&(0x7f0000000040)=""/95, 0x5f}, {&(0x7f0000000140)=""/85, 0x55}, {&(0x7f0000000fc0)=""/4096, 0x1000}, {&(0x7f0000000400)=""/106, 0x6a}, {&(0x7f0000000740)=""/73, 0x49}, {&(0x7f0000000200)=""/77, 0x4d}, {0x0, 0x4000000}], 0x7, &(0x7f0000000600)=""/191, 0xbf}}], 0x1, 0x0, &(0x7f0000003700)={0x77359400}) 12:21:14 executing program 3: socketpair(0x29, 0x0, 0x0, &(0x7f0000002100)) [ 982.767314][ T3064] loop1: detected capacity change from 2048 to 2047 [ 982.807575][ T3128] EXT4-fs (loop1): unmounting filesystem 00000000-0000-0000-0000-000000000000. [ 982.930879][ T3103] loop1: detected capacity change from 0 to 2048 [ 982.972940][ T3103] EXT4-fs (loop1): mounted filesystem 00000000-0000-0000-0000-000000000000 without journal. Quota mode: none. [ 982.991561][ T3103] ext4 filesystem being mounted at /root/syzkaller-testdir1539738704/syzkaller.ao1jj3/3748/bus supports timestamps until 2038 (0x7fffffff) [ 983.072037][ T3103] loop1: detected capacity change from 2048 to 2047 [ 983.112331][ T3128] EXT4-fs (loop1): unmounting filesystem 00000000-0000-0000-0000-000000000000. 12:21:15 executing program 0: r0 = socket$unix(0x1, 0x2, 0x0) r1 = socket$can_bcm(0x1d, 0x2, 0x2) connect$can_bcm(r1, &(0x7f0000000000), 0x10) ioctl$sock_kcm_SIOCKCMUNATTACH(0xffffffffffffffff, 0x89e1, 0xffffffffffffffff) getsockopt$inet_sctp_SCTP_PEER_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1a, 0x0, &(0x7f00000002c0)) socket$igmp6(0xa, 0x3, 0x2) perf_event_open(&(0x7f0000000500)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x15, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) close(0xffffffffffffffff) socket$inet_mptcp(0x2, 0x1, 0x106) connect$can_bcm(0xffffffffffffffff, &(0x7f0000000000), 0x10) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, 0x0) bind$unix(r0, &(0x7f00000005c0)=@abs={0x1, 0x0, 0x4e23}, 0x6e) syz_clone(0x40000000, &(0x7f00000000c0), 0x0, 0x0, &(0x7f00000001c0), 0x0) 12:21:15 executing program 2: open(&(0x7f0000000400)='./bus\x00', 0x14103e, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$L2TP_CMD_SESSION_MODIFY(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000080)={0x30, r1, 0x10, 0x0, 0x0, {}, [@L2TP_ATTR_SEND_SEQ={0x5}, @L2TP_ATTR_IFNAME={0x14, 0x8, 'veth1_to_hsr\x00'}]}, 0x30}}, 0x0) 12:21:15 executing program 3: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000001780)={0x18, 0x4, &(0x7f0000000180)=@framed={{}, [@alu={0x4, 0x1}]}, &(0x7f0000001680)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x1000000, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 12:21:15 executing program 4: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x82, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket(0x10, 0x803, 0x0) sendto(r0, &(0x7f00000000c0)="120000001200e7ef007b00000000000000a1", 0x12, 0x0, 0x0, 0x0) recvmmsg(r0, &(0x7f00000037c0)=[{{&(0x7f00000004c0)=@ethernet={0x0, @random}, 0x80, &(0x7f0000000380)=[{&(0x7f0000000040)=""/95, 0x5f}, {&(0x7f0000000140)=""/85, 0x55}, {&(0x7f0000000fc0)=""/4096, 0x1000}, {&(0x7f0000000400)=""/106, 0x6a}, {&(0x7f0000000740)=""/73, 0x49}, {&(0x7f0000000200)=""/77, 0x4d}, {0x0, 0x5000000}], 0x7, &(0x7f0000000600)=""/191, 0xbf}}], 0x1, 0x0, &(0x7f0000003700)={0x77359400}) 12:21:15 executing program 1: syz_mount_image$ext4(&(0x7f0000000740)='ext4\x00', &(0x7f0000000100)='./bus\x00', 0x804810, &(0x7f0000000180)=ANY=[@ANYBLOB="0061021d307a961da7401271e3fa98008000001d3902ccfd562158cb15c016093893c9e4abd02bc4f1492514fa2dfebc8001000080000000008a1049ca0000"], 0x1, 0x73b, &(0x7f0000000780)="$eJzs3M9rHHUbAPBnptn+zPtuXngP6kGEFloonSTNpT0ZL94KhYLXGpJJCJlkQ3ZTm1iw9SzU5qIgiN49ehVK/QO8SUHBuyBa40G8rMxmk9q4u922Sbeknw9M5/nOj32epzv5ZgcyG8BL643ynyRiOCIuR0S1vT2NiMOt6GjEza3jNh/cmC6XJJrNK78m5Wmx2azuvFbSXp+I1inxSkTcq0Sc/fDfeetr6wtTRZGvtMejjcXl0fra+rn5xam5fC5fGp+4OHZhYuLC2MSe9XrqnYvH7nz39sbG9183br8+dC6JyVbf0e5tzxL9w9b/SSUmd21f2o9kA5QMugAAAPpSfs4/FBFDrU+p1TjUigAAAICDpHmkCQAAABx4SQy6AgAAAGB/bf8dwPazvfv1HGw3v7wVESOd8g+1niGOOBqViDi+mTzyZEKydRo8k5u3IuLuZIfrL2lff09vbNfYM9Ivnrvl/DPZaf5Jd+af6DD/DG1/d8Iz6j7/Pcx/qMv8d7nPHN98/mqla/5bEa8Ndcqf7ORPuuR/t8/8tzc+utNtX/PLiNMdf/8kj+Tq8f0Qo7PzRc8frXt/nbnfq//j3fInvftf7rP/9zd/X+g2l5T5z5zs/f53yl9eEx+360gj4k57XY43duU4ufjDt736n+nS/+Pe/y/67P+nr45c7/NQAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAaEkjYjiSNNuJ0zTLIk5ExP/jeFrU6o2zs7XVpZlyX8RIVNLZ+SIfi4jq1jgpx+Ot+OH4/K7xRET878djW0nnizybrhUzg24eAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAACAHSciYjiSNIuINCL+qKZplg26KgAAAGDPjQy6AAAAAGDfuf8HAACAg+9p7/+TPa4DAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAONAuX7pULs3NBzemy/HMtbXVhdq1czN5fSFbXJ3Opmsry9lcrTZX5Nl0bfFxr1fUasvjF2P1+mgjrzdG62vrVxdrq0uNq/OLU3P51bzyXLoCAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAADgSQ23liTNIiJtxWmaZRH/iYiRqCSz80U+FhH/jYj71cqRcjw+6KIBAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAADYc/W19YWposhXBALBcws+iIgXoIwewaBnJgAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAABqG+tr4wVRT5Sn3QlQAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAADBY6c9JRJTL6eqp4d17Dyd/VlvriHjvsyufXJ9qNFbGy+2/7WxvfNrefn4Q9QMAAMBL4c0nOXj7Pn37Ph4AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAKBf9bX1hamiyFf2MRh0jwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAwNP5OwAA//9JjsXQ") chdir(&(0x7f0000000080)='./file0\x00') open(&(0x7f00000000c0)='./bus\x00', 0x14da42, 0x0) mount(&(0x7f0000000380)=@loop={'/dev/loop', 0x0}, &(0x7f00000003c0)='./bus\x00', 0x0, 0x1000, 0x0) r0 = open(&(0x7f0000000400)='./bus\x00', 0x0, 0x0) ioctl$LOOP_SET_STATUS(r0, 0x4c02, &(0x7f00000001c0)={0x0, {}, 0x0, {}, 0xff, 0x0, 0x0, 0x0, "be8176c9e6755a48a3c0230dd390efe12f8306bed95b2afd402aae879978d959ff9009eec610d9108ea036456bb79e26ee42d0a34968c1fdbb33e8ad5860f632", "b948757aa008fae13adca739a9f126462ab528ea52e90ce2cf50a4ef2568375b"}) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='blkio.throttle.io_service_bytes\x00', 0x275a, 0xd98) 12:21:15 executing program 5: r0 = socket$unix(0x1, 0x2, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f0000000100)={'vcan0\x00', 0x0}) r2 = socket$can_bcm(0x1d, 0x2, 0x2) connect$can_bcm(r2, &(0x7f0000000000), 0x10) ioctl$sock_kcm_SIOCKCMUNATTACH(0xffffffffffffffff, 0x89e1, 0xffffffffffffffff) ioctl$sock_SIOCSPGRP(0xffffffffffffffff, 0x8902, 0x0) sendmsg$can_bcm(r2, &(0x7f0000000480)={&(0x7f0000000340)={0x1d, r1, 0x3f420f00}, 0x10, &(0x7f0000000040)={0x0, 0x20000600}}, 0x0) r3 = socket(0x23, 0x800, 0x40000) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r3, 0x541b, &(0x7f00000000c0)={'ip6_vti0\x00', 0x0}) sendmsg$IPCTNL_MSG_EXP_DELETE(r3, &(0x7f00000004c0)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x40000040}, 0xc, &(0x7f0000000440)={&(0x7f00000006c0)={0x1d0, 0x2, 0x2, 0x201, 0x0, 0x0, {0xa}, [@CTA_EXPECT_NAT={0xc0, 0xa, 0x0, 0x1, [@CTA_EXPECT_NAT_TUPLE={0xc, 0x2, 0x0, 0x1, [@CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x1}]}, @CTA_EXPECT_NAT_TUPLE={0x70, 0x2, 0x0, 0x1, [@CTA_TUPLE_IP={0x2c, 0x1, 0x0, 0x1, @ipv6={{0x14, 0x3, @loopback}, {0x14, 0x4, @private0}}}, @CTA_TUPLE_IP={0x14, 0x1, 0x0, 0x1, @ipv4={{0x8, 0x1, @empty}, {0x8, 0x2, @initdev={0xac, 0x1e, 0x1, 0x0}}}}, @CTA_TUPLE_IP={0x14, 0x1, 0x0, 0x1, @ipv4={{0x8, 0x1, @local}, {0x8, 0x2, @loopback}}}, @CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x4}, @CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x3}, @CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x1}]}, @CTA_EXPECT_NAT_TUPLE={0x38, 0x2, 0x0, 0x1, [@CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5, 0x1, 0x88}}, @CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x3}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5, 0x1, 0x21}}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5, 0x1, 0x1}}, @CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x3}]}, @CTA_EXPECT_NAT_DIR={0x8}]}, @CTA_EXPECT_MASTER={0x20, 0x1, 0x0, 0x1, [@CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x1}, @CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x2}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5, 0x1, 0x84}}]}, @CTA_EXPECT_MASTER={0xdc, 0x1, 0x0, 0x1, [@CTA_TUPLE_IP={0x14, 0x1, 0x0, 0x1, @ipv4={{0x8, 0x1, @multicast1}, {0x8, 0x2, @dev={0xac, 0x14, 0x14, 0x3a}}}}, @CTA_TUPLE_ZONE={0x6}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5, 0x1, 0x21}}, @CTA_TUPLE_IP={0x14, 0x1, 0x0, 0x1, @ipv4={{0x8, 0x1, @empty}, {0x8, 0x2, @local}}}, @CTA_TUPLE_IP={0x2c, 0x1, 0x0, 0x1, @ipv6={{0x14, 0x3, @private1={0xfc, 0x1, '\x00', 0x1}}, {0x14, 0x4, @rand_addr=' \x01\x00'}}}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5, 0x1, 0x1}}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5, 0x1, 0x88}}, @CTA_TUPLE_IP={0x2c, 0x1, 0x0, 0x1, @ipv6={{0x14, 0x3, @empty}, {0x14, 0x4, @dev={0xfe, 0x80, '\x00', 0x21}}}}, @CTA_TUPLE_IP={0x2c, 0x1, 0x0, 0x1, @ipv6={{0x14, 0x3, @local}, {0x14, 0x4, @ipv4={'\x00', '\xff\xff', @rand_addr=0x64010100}}}}]}]}, 0x1d0}}, 0x48000) perf_event_open(&(0x7f0000000500)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x15, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$binfmt_elf32(0xffffffffffffffff, &(0x7f0000000040)=ANY=[], 0x69) connect$can_bcm(0xffffffffffffffff, &(0x7f0000000000), 0x10) sendmsg$can_bcm(0xffffffffffffffff, &(0x7f0000000480)={&(0x7f0000000340)={0x1d, 0x0, 0x3f420f00}, 0x10, &(0x7f0000000040)={&(0x7f0000000580)=ANY=[@ANYBLOB="01000000d7fe68ca0000e9ffffff0000", @ANYRES64=0x0, @ANYRES64=0x0, @ANYRES64=0x0, @ANYRES64], 0x20000600}}, 0x0) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(0xffffffffffffffff, 0x89f0, &(0x7f0000000280)={'gretap0\x00', &(0x7f0000000240)={'ip_vti0\x00', 0x0, 0x7, 0x80, 0xfffffff7, 0x7, {{0x8, 0x4, 0x0, 0x5, 0x20, 0x67, 0x0, 0xc0, 0x29, 0x0, @local, @empty, {[@timestamp={0x44, 0xc, 0x8, 0x0, 0x2, [0x7f, 0x1]}]}}}}}) socket(0x10, 0x3, 0x0) process_mrelease(0xffffffffffffffff, 0x0) r4 = socket$packet(0x11, 0x2, 0x300) ioctl$sock_SIOCGIFINDEX(r4, 0x8933, 0x0) getsockopt$inet_sctp_SCTP_RECVNXTINFO(r3, 0x84, 0x21, &(0x7f0000000140), &(0x7f0000000200)=0x4) bind$unix(r0, &(0x7f00000005c0)=@abs={0x1, 0x0, 0x4e23}, 0x6e) syz_clone(0x40000000, &(0x7f00000000c0), 0x0, 0x0, &(0x7f00000001c0), 0x0) 12:21:15 executing program 2: open(&(0x7f0000000400)='./bus\x00', 0x14103e, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$L2TP_CMD_SESSION_MODIFY(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000080)={0x30, r1, 0x11, 0x0, 0x0, {}, [@L2TP_ATTR_SEND_SEQ={0x5}, @L2TP_ATTR_IFNAME={0x14, 0x8, 'veth1_to_hsr\x00'}]}, 0x30}}, 0x0) 12:21:15 executing program 3: getgroups(0x3, &(0x7f0000000000)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]) setfsgid(r0) 12:21:15 executing program 4: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x82, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket(0x10, 0x803, 0x0) sendto(r0, &(0x7f00000000c0)="120000001200e7ef007b00000000000000a1", 0x12, 0x0, 0x0, 0x0) recvmmsg(r0, &(0x7f00000037c0)=[{{&(0x7f00000004c0)=@ethernet={0x0, @random}, 0x80, &(0x7f0000000380)=[{&(0x7f0000000040)=""/95, 0x5f}, {&(0x7f0000000140)=""/85, 0x55}, {&(0x7f0000000fc0)=""/4096, 0x1000}, {&(0x7f0000000400)=""/106, 0x6a}, {&(0x7f0000000740)=""/73, 0x49}, {&(0x7f0000000200)=""/77, 0x4d}, {0x0, 0x6000000}], 0x7, &(0x7f0000000600)=""/191, 0xbf}}], 0x1, 0x0, &(0x7f0000003700)={0x77359400}) 12:21:15 executing program 3: syz_open_dev$MSR(&(0x7f0000000000), 0x3, 0x0) 12:21:15 executing program 2: open(&(0x7f0000000400)='./bus\x00', 0x14103e, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$L2TP_CMD_SESSION_MODIFY(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000080)={0x30, r1, 0x13, 0x0, 0x0, {}, [@L2TP_ATTR_SEND_SEQ={0x5}, @L2TP_ATTR_IFNAME={0x14, 0x8, 'veth1_to_hsr\x00'}]}, 0x30}}, 0x0) [ 984.284493][ T3115] loop1: detected capacity change from 0 to 2048 12:21:15 executing program 4: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x82, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket(0x10, 0x803, 0x0) sendto(r0, &(0x7f00000000c0)="120000001200e7ef007b00000000000000a1", 0x12, 0x0, 0x0, 0x0) recvmmsg(r0, &(0x7f00000037c0)=[{{&(0x7f00000004c0)=@ethernet={0x0, @random}, 0x80, &(0x7f0000000380)=[{&(0x7f0000000040)=""/95, 0x5f}, {&(0x7f0000000140)=""/85, 0x55}, {&(0x7f0000000fc0)=""/4096, 0x1000}, {&(0x7f0000000400)=""/106, 0x6a}, {&(0x7f0000000740)=""/73, 0x49}, {&(0x7f0000000200)=""/77, 0x4d}, {0x0, 0x8000000}], 0x7, &(0x7f0000000600)=""/191, 0xbf}}], 0x1, 0x0, &(0x7f0000003700)={0x77359400}) [ 984.367779][ T3115] EXT4-fs (loop1): mounted filesystem 00000000-0000-0000-0000-000000000000 without journal. Quota mode: none. [ 984.411444][ T3115] ext4 filesystem being mounted at /root/syzkaller-testdir1539738704/syzkaller.ao1jj3/3749/bus supports timestamps until 2038 (0x7fffffff) [ 984.473414][ T3115] loop1: detected capacity change from 2048 to 2047 [ 984.494706][ T3128] EXT4-fs (loop1): unmounting filesystem 00000000-0000-0000-0000-000000000000. 12:21:16 executing program 0: r0 = socket$unix(0x1, 0x2, 0x0) r1 = socket$can_bcm(0x1d, 0x2, 0x2) connect$can_bcm(r1, &(0x7f0000000000), 0x10) ioctl$sock_kcm_SIOCKCMUNATTACH(0xffffffffffffffff, 0x89e1, 0xffffffffffffffff) getsockopt$inet_sctp_SCTP_PEER_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1a, &(0x7f0000000380), &(0x7f00000002c0)=0x8) socket$igmp6(0xa, 0x3, 0x2) perf_event_open(&(0x7f0000000500)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x15, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) close(0xffffffffffffffff) socket$inet_mptcp(0x2, 0x1, 0x106) connect$can_bcm(0xffffffffffffffff, &(0x7f0000000000), 0x10) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, 0x0) bind$unix(r0, &(0x7f00000005c0)=@abs={0x1, 0x0, 0x4e23}, 0x6e) syz_clone(0x40000000, &(0x7f00000000c0), 0x0, 0x0, &(0x7f00000001c0), 0x0) 12:21:16 executing program 3: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$F2FS_IOC_RESIZE_FS(r0, 0x4008f510, 0x0) 12:21:16 executing program 2: open(&(0x7f0000000400)='./bus\x00', 0x14103e, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$L2TP_CMD_SESSION_MODIFY(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000080)={0x30, r1, 0x300, 0x0, 0x0, {}, [@L2TP_ATTR_SEND_SEQ={0x5}, @L2TP_ATTR_IFNAME={0x14, 0x8, 'veth1_to_hsr\x00'}]}, 0x30}}, 0x0) 12:21:16 executing program 4: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x82, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket(0x10, 0x803, 0x0) sendto(r0, &(0x7f00000000c0)="120000001200e7ef007b00000000000000a1", 0x12, 0x0, 0x0, 0x0) recvmmsg(r0, &(0x7f00000037c0)=[{{&(0x7f00000004c0)=@ethernet={0x0, @random}, 0x80, &(0x7f0000000380)=[{&(0x7f0000000040)=""/95, 0x5f}, {&(0x7f0000000140)=""/85, 0x55}, {&(0x7f0000000fc0)=""/4096, 0x1000}, {&(0x7f0000000400)=""/106, 0x6a}, {&(0x7f0000000740)=""/73, 0x49}, {&(0x7f0000000200)=""/77, 0x4d}, {0x0, 0x9000000}], 0x7, &(0x7f0000000600)=""/191, 0xbf}}], 0x1, 0x0, &(0x7f0000003700)={0x77359400}) 12:21:16 executing program 1: syz_mount_image$ext4(&(0x7f0000000740)='ext4\x00', &(0x7f0000000100)='./bus\x00', 0x804810, &(0x7f0000000180)=ANY=[@ANYBLOB="0061021d307a961da7401271e3fa98008000001d3902ccfd562158cb15c016093893c9e4abd02bc4f1492514fa2dfebc8001000080000000008a1049ca0000"], 0x1, 0x73b, &(0x7f0000000780)="$eJzs3M9rHHUbAPBnptn+zPtuXngP6kGEFloonSTNpT0ZL94KhYLXGpJJCJlkQ3ZTm1iw9SzU5qIgiN49ehVK/QO8SUHBuyBa40G8rMxmk9q4u922Sbeknw9M5/nOj32epzv5ZgcyG8BL643ynyRiOCIuR0S1vT2NiMOt6GjEza3jNh/cmC6XJJrNK78m5Wmx2azuvFbSXp+I1inxSkTcq0Sc/fDfeetr6wtTRZGvtMejjcXl0fra+rn5xam5fC5fGp+4OHZhYuLC2MSe9XrqnYvH7nz39sbG9183br8+dC6JyVbf0e5tzxL9w9b/SSUmd21f2o9kA5QMugAAAPpSfs4/FBFDrU+p1TjUigAAAICDpHmkCQAAABx4SQy6AgAAAGB/bf8dwPazvfv1HGw3v7wVESOd8g+1niGOOBqViDi+mTzyZEKydRo8k5u3IuLuZIfrL2lff09vbNfYM9Ivnrvl/DPZaf5Jd+af6DD/DG1/d8Iz6j7/Pcx/qMv8d7nPHN98/mqla/5bEa8Ndcqf7ORPuuR/t8/8tzc+utNtX/PLiNMdf/8kj+Tq8f0Qo7PzRc8frXt/nbnfq//j3fInvftf7rP/9zd/X+g2l5T5z5zs/f53yl9eEx+360gj4k57XY43duU4ufjDt736n+nS/+Pe/y/67P+nr45c7/NQAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAaEkjYjiSNNuJ0zTLIk5ExP/jeFrU6o2zs7XVpZlyX8RIVNLZ+SIfi4jq1jgpx+Ot+OH4/K7xRET878djW0nnizybrhUzg24eAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAACAHSciYjiSNIuINCL+qKZplg26KgAAAGDPjQy6AAAAAGDfuf8HAACAg+9p7/+TPa4DAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAONAuX7pULs3NBzemy/HMtbXVhdq1czN5fSFbXJ3Opmsry9lcrTZX5Nl0bfFxr1fUasvjF2P1+mgjrzdG62vrVxdrq0uNq/OLU3P51bzyXLoCAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAADgSQ23liTNIiJtxWmaZRH/iYiRqCSz80U+FhH/jYj71cqRcjw+6KIBAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAADYc/W19YWposhXBALBcws+iIgXoIwewaBnJgAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAABqG+tr4wVRT5Sn3QlQAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAADBY6c9JRJTL6eqp4d17Dyd/VlvriHjvsyufXJ9qNFbGy+2/7WxvfNrefn4Q9QMAAMBL4c0nOXj7Pn37Ph4AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAKBf9bX1hamiyFf2MRh0jwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAwNP5OwAA//9JjsXQ") chdir(&(0x7f0000000080)='./file0\x00') open(&(0x7f00000000c0)='./bus\x00', 0x14da42, 0x0) mount(&(0x7f0000000380)=@loop={'/dev/loop', 0x0}, &(0x7f00000003c0)='./bus\x00', 0x0, 0x1000, 0x0) r0 = open(&(0x7f0000000400)='./bus\x00', 0x0, 0x0) ioctl$LOOP_SET_STATUS(r0, 0x4c02, &(0x7f00000001c0)={0x0, {}, 0x0, {}, 0xff, 0x0, 0x0, 0x0, "be8176c9e6755a48a3c0230dd390efe12f8306bed95b2afd402aae879978d959ff9009eec610d9108ea036456bb79e26ee42d0a34968c1fdbb33e8ad5860f632", "b948757aa008fae13adca739a9f126462ab528ea52e90ce2cf50a4ef2568375b"}) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='blkio.throttle.io_service_bytes\x00', 0x275a, 0xdda) 12:21:16 executing program 5: r0 = socket$unix(0x1, 0x2, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f0000000100)={'vcan0\x00', 0x0}) r2 = socket$can_bcm(0x1d, 0x2, 0x2) connect$can_bcm(r2, &(0x7f0000000000), 0x10) ioctl$sock_kcm_SIOCKCMUNATTACH(0xffffffffffffffff, 0x89e1, 0xffffffffffffffff) ioctl$sock_SIOCSPGRP(0xffffffffffffffff, 0x8902, 0x0) sendmsg$can_bcm(r2, &(0x7f0000000480)={&(0x7f0000000340)={0x1d, r1, 0x3f420f00}, 0x10, &(0x7f0000000040)={0x0, 0x20000600}}, 0x0) r3 = socket(0x23, 0x800, 0x40000) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r3, 0x541b, &(0x7f00000000c0)={'ip6_vti0\x00', 0x0}) sendmsg$IPCTNL_MSG_EXP_DELETE(r3, &(0x7f00000004c0)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x40000040}, 0xc, &(0x7f0000000440)={&(0x7f00000006c0)={0x1d0, 0x2, 0x2, 0x201, 0x0, 0x0, {0xa}, [@CTA_EXPECT_NAT={0xc0, 0xa, 0x0, 0x1, [@CTA_EXPECT_NAT_TUPLE={0xc, 0x2, 0x0, 0x1, [@CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x1}]}, @CTA_EXPECT_NAT_TUPLE={0x70, 0x2, 0x0, 0x1, [@CTA_TUPLE_IP={0x2c, 0x1, 0x0, 0x1, @ipv6={{0x14, 0x3, @loopback}, {0x14, 0x4, @private0}}}, @CTA_TUPLE_IP={0x14, 0x1, 0x0, 0x1, @ipv4={{0x8, 0x1, @empty}, {0x8, 0x2, @initdev={0xac, 0x1e, 0x1, 0x0}}}}, @CTA_TUPLE_IP={0x14, 0x1, 0x0, 0x1, @ipv4={{0x8, 0x1, @local}, {0x8, 0x2, @loopback}}}, @CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x4}, @CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x3}, @CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x1}]}, @CTA_EXPECT_NAT_TUPLE={0x38, 0x2, 0x0, 0x1, [@CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5, 0x1, 0x88}}, @CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x3}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5, 0x1, 0x21}}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5, 0x1, 0x1}}, @CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x3}]}, @CTA_EXPECT_NAT_DIR={0x8}]}, @CTA_EXPECT_MASTER={0x20, 0x1, 0x0, 0x1, [@CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x1}, @CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x2}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5, 0x1, 0x84}}]}, @CTA_EXPECT_MASTER={0xdc, 0x1, 0x0, 0x1, [@CTA_TUPLE_IP={0x14, 0x1, 0x0, 0x1, @ipv4={{0x8, 0x1, @multicast1}, {0x8, 0x2, @dev={0xac, 0x14, 0x14, 0x3a}}}}, @CTA_TUPLE_ZONE={0x6}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5, 0x1, 0x21}}, @CTA_TUPLE_IP={0x14, 0x1, 0x0, 0x1, @ipv4={{0x8, 0x1, @empty}, {0x8, 0x2, @local}}}, @CTA_TUPLE_IP={0x2c, 0x1, 0x0, 0x1, @ipv6={{0x14, 0x3, @private1={0xfc, 0x1, '\x00', 0x1}}, {0x14, 0x4, @rand_addr=' \x01\x00'}}}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5, 0x1, 0x1}}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5, 0x1, 0x88}}, @CTA_TUPLE_IP={0x2c, 0x1, 0x0, 0x1, @ipv6={{0x14, 0x3, @empty}, {0x14, 0x4, @dev={0xfe, 0x80, '\x00', 0x21}}}}, @CTA_TUPLE_IP={0x2c, 0x1, 0x0, 0x1, @ipv6={{0x14, 0x3, @local}, {0x14, 0x4, @ipv4={'\x00', '\xff\xff', @rand_addr=0x64010100}}}}]}]}, 0x1d0}}, 0x48000) perf_event_open(&(0x7f0000000500)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x15, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$binfmt_elf32(0xffffffffffffffff, &(0x7f0000000040)=ANY=[], 0x69) connect$can_bcm(0xffffffffffffffff, &(0x7f0000000000), 0x10) sendmsg$can_bcm(0xffffffffffffffff, &(0x7f0000000480)={&(0x7f0000000340)={0x1d, 0x0, 0x3f420f00}, 0x10, &(0x7f0000000040)={&(0x7f0000000580)=ANY=[@ANYBLOB="01000000d7fe68ca0000e9ffffff0000", @ANYRES64=0x0, @ANYRES64=0x0, @ANYRES64=0x0, @ANYRES64], 0x20000600}}, 0x0) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(0xffffffffffffffff, 0x89f0, &(0x7f0000000280)={'gretap0\x00', &(0x7f0000000240)={'ip_vti0\x00', 0x0, 0x7, 0x80, 0xfffffff7, 0x7, {{0x8, 0x4, 0x0, 0x5, 0x20, 0x67, 0x0, 0xc0, 0x29, 0x0, @local, @empty, {[@timestamp={0x44, 0xc, 0x8, 0x0, 0x2, [0x7f, 0x1]}]}}}}}) socket(0x10, 0x3, 0x0) process_mrelease(0xffffffffffffffff, 0x0) r4 = socket$packet(0x11, 0x2, 0x300) ioctl$sock_SIOCGIFINDEX(r4, 0x8933, 0x0) getsockopt$inet_sctp_SCTP_RECVNXTINFO(r3, 0x84, 0x21, &(0x7f0000000140), &(0x7f0000000200)=0x4) bind$unix(r0, &(0x7f00000005c0)=@abs={0x1, 0x0, 0x4e23}, 0x6e) syz_clone(0x40000000, &(0x7f00000000c0), 0x0, 0x0, &(0x7f00000001c0), 0x0) 12:21:16 executing program 3: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x2) accept$inet6(r0, 0x0, 0x0) 12:21:16 executing program 4: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x82, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket(0x10, 0x803, 0x0) sendto(r0, &(0x7f00000000c0)="120000001200e7ef007b00000000000000a1", 0x12, 0x0, 0x0, 0x0) recvmmsg(r0, &(0x7f00000037c0)=[{{&(0x7f00000004c0)=@ethernet={0x0, @random}, 0x80, &(0x7f0000000380)=[{&(0x7f0000000040)=""/95, 0x5f}, {&(0x7f0000000140)=""/85, 0x55}, {&(0x7f0000000fc0)=""/4096, 0x1000}, {&(0x7f0000000400)=""/106, 0x6a}, {&(0x7f0000000740)=""/73, 0x49}, {&(0x7f0000000200)=""/77, 0x4d}, {0x0, 0xa000000}], 0x7, &(0x7f0000000600)=""/191, 0xbf}}], 0x1, 0x0, &(0x7f0000003700)={0x77359400}) 12:21:16 executing program 2: open(&(0x7f0000000400)='./bus\x00', 0x14103e, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$L2TP_CMD_SESSION_MODIFY(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000080)={0x30, r1, 0x1, 0x0, 0x0, {}, [@L2TP_ATTR_SEND_SEQ={0x5}, @L2TP_ATTR_IFNAME={0x14, 0x8, 'veth1_to_hsr\x00'}]}, 0x30}}, 0x0) 12:21:16 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x20, &(0x7f0000000140)={@ipv4={'\x00', '\xff\xff', @multicast1}, 0x0, 0x0, 0x0, 0x6}, 0x20) 12:21:16 executing program 4: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x82, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket(0x10, 0x803, 0x0) sendto(r0, &(0x7f00000000c0)="120000001200e7ef007b00000000000000a1", 0x12, 0x0, 0x0, 0x0) recvmmsg(r0, &(0x7f00000037c0)=[{{&(0x7f00000004c0)=@ethernet={0x0, @random}, 0x80, &(0x7f0000000380)=[{&(0x7f0000000040)=""/95, 0x5f}, {&(0x7f0000000140)=""/85, 0x55}, {&(0x7f0000000fc0)=""/4096, 0x1000}, {&(0x7f0000000400)=""/106, 0x6a}, {&(0x7f0000000740)=""/73, 0x49}, {&(0x7f0000000200)=""/77, 0x4d}, {0x0, 0xc000000}], 0x7, &(0x7f0000000600)=""/191, 0xbf}}], 0x1, 0x0, &(0x7f0000003700)={0x77359400}) [ 984.715626][ T3158] loop1: detected capacity change from 0 to 2048 12:21:16 executing program 2: open(&(0x7f0000000400)='./bus\x00', 0x14103e, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$L2TP_CMD_SESSION_MODIFY(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000080)={0x30, r1, 0x1, 0x2, 0x0, {}, [@L2TP_ATTR_SEND_SEQ={0x5}, @L2TP_ATTR_IFNAME={0x14, 0x8, 'veth1_to_hsr\x00'}]}, 0x30}}, 0x0) [ 984.789810][ T3177] Can not set IPV6_FL_F_REFLECT if flowlabel_consistency sysctl is enable [ 984.808057][ T3158] EXT4-fs (loop1): mounted filesystem 00000000-0000-0000-0000-000000000000 without journal. Quota mode: none. [ 984.896218][ T3158] ext4 filesystem being mounted at /root/syzkaller-testdir1539738704/syzkaller.ao1jj3/3750/bus supports timestamps until 2038 (0x7fffffff) [ 985.012061][ T3158] loop1: detected capacity change from 2048 to 2047 [ 985.032524][ T3128] EXT4-fs (loop1): unmounting filesystem 00000000-0000-0000-0000-000000000000. 12:21:16 executing program 0: r0 = socket$unix(0x1, 0x2, 0x0) r1 = socket$can_bcm(0x1d, 0x2, 0x2) connect$can_bcm(r1, &(0x7f0000000000), 0x10) ioctl$sock_kcm_SIOCKCMUNATTACH(0xffffffffffffffff, 0x89e1, 0xffffffffffffffff) getsockopt$inet_sctp_SCTP_PEER_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1a, &(0x7f0000000380), &(0x7f00000002c0)=0x8) socket$igmp6(0xa, 0x3, 0x2) perf_event_open(&(0x7f0000000500)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x15, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) close(0xffffffffffffffff) socket$inet_mptcp(0x2, 0x1, 0x106) connect$can_bcm(0xffffffffffffffff, &(0x7f0000000000), 0x10) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, 0x0) bind$unix(r0, &(0x7f00000005c0)=@abs={0x1, 0x0, 0x4e23}, 0x6e) syz_clone(0x40000000, &(0x7f00000000c0), 0x0, 0x0, &(0x7f00000001c0), 0x0) 12:21:16 executing program 2: open(&(0x7f0000000400)='./bus\x00', 0x14103e, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$L2TP_CMD_SESSION_MODIFY(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000080)={0x30, r1, 0x1, 0x3, 0x0, {}, [@L2TP_ATTR_SEND_SEQ={0x5}, @L2TP_ATTR_IFNAME={0x14, 0x8, 'veth1_to_hsr\x00'}]}, 0x30}}, 0x0) 12:21:16 executing program 3: add_key(&(0x7f0000001040)='blacklist\x00', &(0x7f0000001080)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffc) 12:21:16 executing program 4: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x82, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket(0x10, 0x803, 0x0) sendto(r0, &(0x7f00000000c0)="120000001200e7ef007b00000000000000a1", 0x12, 0x0, 0x0, 0x0) recvmmsg(r0, &(0x7f00000037c0)=[{{&(0x7f00000004c0)=@ethernet={0x0, @random}, 0x80, &(0x7f0000000380)=[{&(0x7f0000000040)=""/95, 0x5f}, {&(0x7f0000000140)=""/85, 0x55}, {&(0x7f0000000fc0)=""/4096, 0x1000}, {&(0x7f0000000400)=""/106, 0x6a}, {&(0x7f0000000740)=""/73, 0x49}, {&(0x7f0000000200)=""/77, 0x4d}, {0x0, 0xd000000}], 0x7, &(0x7f0000000600)=""/191, 0xbf}}], 0x1, 0x0, &(0x7f0000003700)={0x77359400}) 12:21:16 executing program 1: syz_mount_image$ext4(&(0x7f0000000740)='ext4\x00', &(0x7f0000000100)='./bus\x00', 0x804810, &(0x7f0000000180)=ANY=[@ANYBLOB="0061021d307a961da7401271e3fa98008000001d3902ccfd562158cb15c016093893c9e4abd02bc4f1492514fa2dfebc8001000080000000008a1049ca0000"], 0x1, 0x73b, &(0x7f0000000780)="$eJzs3M9rHHUbAPBnptn+zPtuXngP6kGEFloonSTNpT0ZL94KhYLXGpJJCJlkQ3ZTm1iw9SzU5qIgiN49ehVK/QO8SUHBuyBa40G8rMxmk9q4u922Sbeknw9M5/nOj32epzv5ZgcyG8BL643ynyRiOCIuR0S1vT2NiMOt6GjEza3jNh/cmC6XJJrNK78m5Wmx2azuvFbSXp+I1inxSkTcq0Sc/fDfeetr6wtTRZGvtMejjcXl0fra+rn5xam5fC5fGp+4OHZhYuLC2MSe9XrqnYvH7nz39sbG9183br8+dC6JyVbf0e5tzxL9w9b/SSUmd21f2o9kA5QMugAAAPpSfs4/FBFDrU+p1TjUigAAAICDpHmkCQAAABx4SQy6AgAAAGB/bf8dwPazvfv1HGw3v7wVESOd8g+1niGOOBqViDi+mTzyZEKydRo8k5u3IuLuZIfrL2lff09vbNfYM9Ivnrvl/DPZaf5Jd+af6DD/DG1/d8Iz6j7/Pcx/qMv8d7nPHN98/mqla/5bEa8Ndcqf7ORPuuR/t8/8tzc+utNtX/PLiNMdf/8kj+Tq8f0Qo7PzRc8frXt/nbnfq//j3fInvftf7rP/9zd/X+g2l5T5z5zs/f53yl9eEx+360gj4k57XY43duU4ufjDt736n+nS/+Pe/y/67P+nr45c7/NQAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAaEkjYjiSNNuJ0zTLIk5ExP/jeFrU6o2zs7XVpZlyX8RIVNLZ+SIfi4jq1jgpx+Ot+OH4/K7xRET878djW0nnizybrhUzg24eAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAACAHSciYjiSNIuINCL+qKZplg26KgAAAGDPjQy6AAAAAGDfuf8HAACAg+9p7/+TPa4DAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAONAuX7pULs3NBzemy/HMtbXVhdq1czN5fSFbXJ3Opmsry9lcrTZX5Nl0bfFxr1fUasvjF2P1+mgjrzdG62vrVxdrq0uNq/OLU3P51bzyXLoCAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAADgSQ23liTNIiJtxWmaZRH/iYiRqCSz80U+FhH/jYj71cqRcjw+6KIBAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAADYc/W19YWposhXBALBcws+iIgXoIwewaBnJgAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAABqG+tr4wVRT5Sn3QlQAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAADBY6c9JRJTL6eqp4d17Dyd/VlvriHjvsyufXJ9qNFbGy+2/7WxvfNrefn4Q9QMAAMBL4c0nOXj7Pn37Ph4AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAKBf9bX1hamiyFf2MRh0jwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAwNP5OwAA//9JjsXQ") chdir(&(0x7f0000000080)='./file0\x00') open(&(0x7f00000000c0)='./bus\x00', 0x14da42, 0x0) mount(&(0x7f0000000380)=@loop={'/dev/loop', 0x0}, &(0x7f00000003c0)='./bus\x00', 0x0, 0x1000, 0x0) r0 = open(&(0x7f0000000400)='./bus\x00', 0x0, 0x0) ioctl$LOOP_SET_STATUS(r0, 0x4c02, &(0x7f00000001c0)={0x0, {}, 0x0, {}, 0xff, 0x0, 0x0, 0x0, "be8176c9e6755a48a3c0230dd390efe12f8306bed95b2afd402aae879978d959ff9009eec610d9108ea036456bb79e26ee42d0a34968c1fdbb33e8ad5860f632", "b948757aa008fae13adca739a9f126462ab528ea52e90ce2cf50a4ef2568375b"}) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='blkio.throttle.io_service_bytes\x00', 0x275a, 0xf00) 12:21:16 executing program 5: r0 = socket$unix(0x1, 0x2, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f0000000100)={'vcan0\x00', 0x0}) r2 = socket$can_bcm(0x1d, 0x2, 0x2) connect$can_bcm(r2, &(0x7f0000000000), 0x10) ioctl$sock_kcm_SIOCKCMUNATTACH(0xffffffffffffffff, 0x89e1, 0xffffffffffffffff) ioctl$sock_SIOCSPGRP(0xffffffffffffffff, 0x8902, 0x0) sendmsg$can_bcm(r2, &(0x7f0000000480)={&(0x7f0000000340)={0x1d, r1, 0x3f420f00}, 0x10, &(0x7f0000000040)={0x0, 0x20000600}}, 0x0) r3 = socket(0x23, 0x800, 0x40000) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r3, 0x541b, &(0x7f00000000c0)={'ip6_vti0\x00', 0x0}) sendmsg$IPCTNL_MSG_EXP_DELETE(r3, &(0x7f00000004c0)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x40000040}, 0xc, &(0x7f0000000440)={&(0x7f00000006c0)={0x1d0, 0x2, 0x2, 0x201, 0x0, 0x0, {0xa}, [@CTA_EXPECT_NAT={0xc0, 0xa, 0x0, 0x1, [@CTA_EXPECT_NAT_TUPLE={0xc, 0x2, 0x0, 0x1, [@CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x1}]}, @CTA_EXPECT_NAT_TUPLE={0x70, 0x2, 0x0, 0x1, [@CTA_TUPLE_IP={0x2c, 0x1, 0x0, 0x1, @ipv6={{0x14, 0x3, @loopback}, {0x14, 0x4, @private0}}}, @CTA_TUPLE_IP={0x14, 0x1, 0x0, 0x1, @ipv4={{0x8, 0x1, @empty}, {0x8, 0x2, @initdev={0xac, 0x1e, 0x1, 0x0}}}}, @CTA_TUPLE_IP={0x14, 0x1, 0x0, 0x1, @ipv4={{0x8, 0x1, @local}, {0x8, 0x2, @loopback}}}, @CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x4}, @CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x3}, @CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x1}]}, @CTA_EXPECT_NAT_TUPLE={0x38, 0x2, 0x0, 0x1, [@CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5, 0x1, 0x88}}, @CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x3}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5, 0x1, 0x21}}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5, 0x1, 0x1}}, @CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x3}]}, @CTA_EXPECT_NAT_DIR={0x8}]}, @CTA_EXPECT_MASTER={0x20, 0x1, 0x0, 0x1, [@CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x1}, @CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x2}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5, 0x1, 0x84}}]}, @CTA_EXPECT_MASTER={0xdc, 0x1, 0x0, 0x1, [@CTA_TUPLE_IP={0x14, 0x1, 0x0, 0x1, @ipv4={{0x8, 0x1, @multicast1}, {0x8, 0x2, @dev={0xac, 0x14, 0x14, 0x3a}}}}, @CTA_TUPLE_ZONE={0x6}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5, 0x1, 0x21}}, @CTA_TUPLE_IP={0x14, 0x1, 0x0, 0x1, @ipv4={{0x8, 0x1, @empty}, {0x8, 0x2, @local}}}, @CTA_TUPLE_IP={0x2c, 0x1, 0x0, 0x1, @ipv6={{0x14, 0x3, @private1={0xfc, 0x1, '\x00', 0x1}}, {0x14, 0x4, @rand_addr=' \x01\x00'}}}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5, 0x1, 0x1}}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5, 0x1, 0x88}}, @CTA_TUPLE_IP={0x2c, 0x1, 0x0, 0x1, @ipv6={{0x14, 0x3, @empty}, {0x14, 0x4, @dev={0xfe, 0x80, '\x00', 0x21}}}}, @CTA_TUPLE_IP={0x2c, 0x1, 0x0, 0x1, @ipv6={{0x14, 0x3, @local}, {0x14, 0x4, @ipv4={'\x00', '\xff\xff', @rand_addr=0x64010100}}}}]}]}, 0x1d0}}, 0x48000) perf_event_open(&(0x7f0000000500)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x15, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$binfmt_elf32(0xffffffffffffffff, &(0x7f0000000040)=ANY=[], 0x69) connect$can_bcm(0xffffffffffffffff, &(0x7f0000000000), 0x10) sendmsg$can_bcm(0xffffffffffffffff, &(0x7f0000000480)={&(0x7f0000000340)={0x1d, 0x0, 0x3f420f00}, 0x10, &(0x7f0000000040)={&(0x7f0000000580)=ANY=[@ANYBLOB="01000000d7fe68ca0000e9ffffff0000", @ANYRES64=0x0, @ANYRES64=0x0, @ANYRES64=0x0, @ANYRES64], 0x20000600}}, 0x0) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(0xffffffffffffffff, 0x89f0, &(0x7f0000000280)={'gretap0\x00', &(0x7f0000000240)={'ip_vti0\x00', 0x0, 0x7, 0x80, 0xfffffff7, 0x7, {{0x8, 0x4, 0x0, 0x5, 0x20, 0x67, 0x0, 0xc0, 0x29, 0x0, @local, @empty, {[@timestamp={0x44, 0xc, 0x8, 0x0, 0x2, [0x7f, 0x1]}]}}}}}) socket(0x10, 0x3, 0x0) process_mrelease(0xffffffffffffffff, 0x0) r4 = socket$packet(0x11, 0x2, 0x300) ioctl$sock_SIOCGIFINDEX(r4, 0x8933, 0x0) getsockopt$inet_sctp_SCTP_RECVNXTINFO(r3, 0x84, 0x21, &(0x7f0000000140), &(0x7f0000000200)=0x4) bind$unix(r0, &(0x7f00000005c0)=@abs={0x1, 0x0, 0x4e23}, 0x6e) syz_clone(0x40000000, &(0x7f00000000c0), 0x0, 0x0, &(0x7f00000001c0), 0x0) 12:21:16 executing program 3: r0 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000040)='/sys/block/loop0', 0x101001, 0x0) writev(r0, &(0x7f0000000080)=[{&(0x7f0000000000)="1b2f264689282c19a7b61b6ceb857da620", 0x11}], 0x1) 12:21:16 executing program 2: open(&(0x7f0000000400)='./bus\x00', 0x14103e, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$L2TP_CMD_SESSION_MODIFY(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000080)={0x30, r1, 0x1, 0x4, 0x0, {}, [@L2TP_ATTR_SEND_SEQ={0x5}, @L2TP_ATTR_IFNAME={0x14, 0x8, 'veth1_to_hsr\x00'}]}, 0x30}}, 0x0) 12:21:16 executing program 4: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x82, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket(0x10, 0x803, 0x0) sendto(r0, &(0x7f00000000c0)="120000001200e7ef007b00000000000000a1", 0x12, 0x0, 0x0, 0x0) recvmmsg(r0, &(0x7f00000037c0)=[{{&(0x7f00000004c0)=@ethernet={0x0, @random}, 0x80, &(0x7f0000000380)=[{&(0x7f0000000040)=""/95, 0x5f}, {&(0x7f0000000140)=""/85, 0x55}, {&(0x7f0000000fc0)=""/4096, 0x1000}, {&(0x7f0000000400)=""/106, 0x6a}, {&(0x7f0000000740)=""/73, 0x49}, {&(0x7f0000000200)=""/77, 0x4d}, {0x0, 0xf000000}], 0x7, &(0x7f0000000600)=""/191, 0xbf}}], 0x1, 0x0, &(0x7f0000003700)={0x77359400}) 12:21:16 executing program 3: r0 = openat$tun(0xffffffffffffff9c, &(0x7f00000006c0), 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000040)={'bridge_slave_0\x00', 0x1}) [ 985.407507][ T3195] loop1: detected capacity change from 0 to 2048 12:21:16 executing program 2: open(&(0x7f0000000400)='./bus\x00', 0x14103e, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$L2TP_CMD_SESSION_MODIFY(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000080)={0x30, r1, 0x1, 0x5, 0x0, {}, [@L2TP_ATTR_SEND_SEQ={0x5}, @L2TP_ATTR_IFNAME={0x14, 0x8, 'veth1_to_hsr\x00'}]}, 0x30}}, 0x0) 12:21:17 executing program 3: socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f00000009c0)) recvmsg(0xffffffffffffffff, 0x0, 0x0) [ 985.495871][ T3195] EXT4-fs (loop1): mounted filesystem 00000000-0000-0000-0000-000000000000 without journal. Quota mode: none. [ 985.672354][ T3195] ext4 filesystem being mounted at /root/syzkaller-testdir1539738704/syzkaller.ao1jj3/3751/bus supports timestamps until 2038 (0x7fffffff) [ 985.741864][ T3195] loop1: detected capacity change from 2048 to 2047 [ 985.796960][ T3128] EXT4-fs (loop1): unmounting filesystem 00000000-0000-0000-0000-000000000000. 12:21:17 executing program 0: r0 = socket$unix(0x1, 0x2, 0x0) r1 = socket$can_bcm(0x1d, 0x2, 0x2) connect$can_bcm(r1, &(0x7f0000000000), 0x10) ioctl$sock_kcm_SIOCKCMUNATTACH(0xffffffffffffffff, 0x89e1, 0xffffffffffffffff) getsockopt$inet_sctp_SCTP_PEER_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1a, &(0x7f0000000380), &(0x7f00000002c0)=0x8) socket$igmp6(0xa, 0x3, 0x2) perf_event_open(&(0x7f0000000500)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x15, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) close(0xffffffffffffffff) socket$inet_mptcp(0x2, 0x1, 0x106) connect$can_bcm(0xffffffffffffffff, &(0x7f0000000000), 0x10) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, 0x0) bind$unix(r0, &(0x7f00000005c0)=@abs={0x1, 0x0, 0x4e23}, 0x6e) syz_clone(0x40000000, &(0x7f00000000c0), 0x0, 0x0, &(0x7f00000001c0), 0x0) 12:21:17 executing program 4: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x82, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket(0x10, 0x803, 0x0) sendto(r0, &(0x7f00000000c0)="120000001200e7ef007b00000000000000a1", 0x12, 0x0, 0x0, 0x0) recvmmsg(r0, &(0x7f00000037c0)=[{{&(0x7f00000004c0)=@ethernet={0x0, @random}, 0x80, &(0x7f0000000380)=[{&(0x7f0000000040)=""/95, 0x5f}, {&(0x7f0000000140)=""/85, 0x55}, {&(0x7f0000000fc0)=""/4096, 0x1000}, {&(0x7f0000000400)=""/106, 0x6a}, {&(0x7f0000000740)=""/73, 0x49}, {&(0x7f0000000200)=""/77, 0x4d}, {0x0, 0x10000000}], 0x7, &(0x7f0000000600)=""/191, 0xbf}}], 0x1, 0x0, &(0x7f0000003700)={0x77359400}) 12:21:17 executing program 3: bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000640)={@cgroup, 0xffffffffffffffff, 0xb}, 0x10) 12:21:17 executing program 2: open(&(0x7f0000000400)='./bus\x00', 0x14103e, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$L2TP_CMD_SESSION_MODIFY(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000080)={0x30, r1, 0x1, 0x6, 0x0, {}, [@L2TP_ATTR_SEND_SEQ={0x5}, @L2TP_ATTR_IFNAME={0x14, 0x8, 'veth1_to_hsr\x00'}]}, 0x30}}, 0x0) 12:21:17 executing program 1: syz_mount_image$ext4(&(0x7f0000000740)='ext4\x00', &(0x7f0000000100)='./bus\x00', 0x804810, &(0x7f0000000180)=ANY=[@ANYBLOB="0061021d307a961da7401271e3fa98008000001d3902ccfd562158cb15c016093893c9e4abd02bc4f1492514fa2dfebc8001000080000000008a1049ca0000"], 0x1, 0x73b, &(0x7f0000000780)="$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") chdir(&(0x7f0000000080)='./file0\x00') open(&(0x7f00000000c0)='./bus\x00', 0x14da42, 0x0) mount(&(0x7f0000000380)=@loop={'/dev/loop', 0x0}, &(0x7f00000003c0)='./bus\x00', 0x0, 0x1000, 0x0) r0 = open(&(0x7f0000000400)='./bus\x00', 0x0, 0x0) ioctl$LOOP_SET_STATUS(r0, 0x4c02, &(0x7f00000001c0)={0x0, {}, 0x0, {}, 0xff, 0x0, 0x0, 0x0, "be8176c9e6755a48a3c0230dd390efe12f8306bed95b2afd402aae879978d959ff9009eec610d9108ea036456bb79e26ee42d0a34968c1fdbb33e8ad5860f632", "b948757aa008fae13adca739a9f126462ab528ea52e90ce2cf50a4ef2568375b"}) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='blkio.throttle.io_service_bytes\x00', 0x275a, 0x1100) [ 986.032175][ T3245] loop1: detected capacity change from 0 to 2048 [ 986.087071][ T3245] EXT4-fs (loop1): mounted filesystem 00000000-0000-0000-0000-000000000000 without journal. Quota mode: none. [ 986.141363][ T3245] ext4 filesystem being mounted at /root/syzkaller-testdir1539738704/syzkaller.ao1jj3/3752/bus supports timestamps until 2038 (0x7fffffff) [ 986.279241][ T3245] loop1: detected capacity change from 2048 to 2047 [ 986.324257][ T3128] EXT4-fs (loop1): unmounting filesystem 00000000-0000-0000-0000-000000000000. 12:21:17 executing program 5: r0 = socket$unix(0x1, 0x2, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f0000000100)={'vcan0\x00', 0x0}) r2 = socket$can_bcm(0x1d, 0x2, 0x2) connect$can_bcm(r2, &(0x7f0000000000), 0x10) ioctl$sock_kcm_SIOCKCMUNATTACH(0xffffffffffffffff, 0x89e1, 0xffffffffffffffff) ioctl$sock_SIOCSPGRP(0xffffffffffffffff, 0x8902, 0x0) sendmsg$can_bcm(r2, &(0x7f0000000480)={&(0x7f0000000340)={0x1d, r1, 0x3f420f00}, 0x10, &(0x7f0000000040)={&(0x7f0000000580)=ANY=[@ANYBLOB="01000000d7fe68ca0000e9ffffff0000", @ANYRES64=0x0, @ANYRES64=0x0, @ANYRES64=0x0, @ANYRES64=r0], 0x20000600}}, 0x0) r3 = socket(0x23, 0x800, 0x40000) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r3, 0x541b, &(0x7f00000000c0)={'ip6_vti0\x00', 0x0}) sendmsg$IPCTNL_MSG_EXP_DELETE(r3, &(0x7f00000004c0)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x40000040}, 0xc, &(0x7f0000000440)={&(0x7f00000006c0)={0x1d0, 0x2, 0x2, 0x201, 0x0, 0x0, {0xa}, [@CTA_EXPECT_NAT={0xc0, 0xa, 0x0, 0x1, [@CTA_EXPECT_NAT_TUPLE={0xc, 0x2, 0x0, 0x1, [@CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x1}]}, @CTA_EXPECT_NAT_TUPLE={0x70, 0x2, 0x0, 0x1, [@CTA_TUPLE_IP={0x2c, 0x1, 0x0, 0x1, @ipv6={{0x14, 0x3, @loopback}, {0x14, 0x4, @private0}}}, @CTA_TUPLE_IP={0x14, 0x1, 0x0, 0x1, @ipv4={{0x8, 0x1, @empty}, {0x8, 0x2, @initdev={0xac, 0x1e, 0x1, 0x0}}}}, @CTA_TUPLE_IP={0x14, 0x1, 0x0, 0x1, @ipv4={{0x8, 0x1, @local}, {0x8, 0x2, @loopback}}}, @CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x4}, @CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x3}, @CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x1}]}, @CTA_EXPECT_NAT_TUPLE={0x38, 0x2, 0x0, 0x1, [@CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5, 0x1, 0x88}}, @CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x3}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5, 0x1, 0x21}}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5, 0x1, 0x1}}, @CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x3}]}, @CTA_EXPECT_NAT_DIR={0x8}]}, @CTA_EXPECT_MASTER={0x20, 0x1, 0x0, 0x1, [@CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x1}, @CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x2}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5, 0x1, 0x84}}]}, @CTA_EXPECT_MASTER={0xdc, 0x1, 0x0, 0x1, [@CTA_TUPLE_IP={0x14, 0x1, 0x0, 0x1, @ipv4={{0x8, 0x1, @multicast1}, {0x8, 0x2, @dev={0xac, 0x14, 0x14, 0x3a}}}}, @CTA_TUPLE_ZONE={0x6}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5, 0x1, 0x21}}, @CTA_TUPLE_IP={0x14, 0x1, 0x0, 0x1, @ipv4={{0x8, 0x1, @empty}, {0x8, 0x2, @local}}}, @CTA_TUPLE_IP={0x2c, 0x1, 0x0, 0x1, @ipv6={{0x14, 0x3, @private1={0xfc, 0x1, '\x00', 0x1}}, {0x14, 0x4, @rand_addr=' \x01\x00'}}}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5, 0x1, 0x1}}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5, 0x1, 0x88}}, @CTA_TUPLE_IP={0x2c, 0x1, 0x0, 0x1, @ipv6={{0x14, 0x3, @empty}, {0x14, 0x4, @dev={0xfe, 0x80, '\x00', 0x21}}}}, @CTA_TUPLE_IP={0x2c, 0x1, 0x0, 0x1, @ipv6={{0x14, 0x3, @local}, {0x14, 0x4, @ipv4={'\x00', '\xff\xff', @rand_addr=0x64010100}}}}]}]}, 0x1d0}}, 0x48000) perf_event_open(&(0x7f0000000500)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x15, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$binfmt_elf32(0xffffffffffffffff, &(0x7f0000000040)=ANY=[], 0x69) connect$can_bcm(0xffffffffffffffff, &(0x7f0000000000), 0x10) sendmsg$can_bcm(0xffffffffffffffff, &(0x7f0000000480)={&(0x7f0000000340)={0x1d, 0x0, 0x3f420f00}, 0x10, &(0x7f0000000040)={&(0x7f0000000580)=ANY=[@ANYBLOB="01000000d7fe68ca0000e9ffffff0000", @ANYRES64=0x0, @ANYRES64=0x0, @ANYRES64=0x0, @ANYRES64], 0x20000600}}, 0x0) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(0xffffffffffffffff, 0x89f0, &(0x7f0000000280)={'gretap0\x00', &(0x7f0000000240)={'ip_vti0\x00', 0x0, 0x7, 0x80, 0xfffffff7, 0x7, {{0x8, 0x4, 0x0, 0x5, 0x20, 0x67, 0x0, 0xc0, 0x29, 0x0, @local, @empty, {[@timestamp={0x44, 0xc, 0x8, 0x0, 0x2, [0x7f, 0x1]}]}}}}}) socket(0x10, 0x3, 0x0) process_mrelease(0xffffffffffffffff, 0x0) r4 = socket$packet(0x11, 0x2, 0x300) ioctl$sock_SIOCGIFINDEX(r4, 0x8933, 0x0) getsockopt$inet_sctp_SCTP_RECVNXTINFO(r3, 0x84, 0x21, &(0x7f0000000140), &(0x7f0000000200)=0x4) bind$unix(r0, &(0x7f00000005c0)=@abs={0x1, 0x0, 0x4e23}, 0x6e) syz_clone(0x40000000, &(0x7f00000000c0), 0x0, 0x0, &(0x7f00000001c0), 0x0) 12:21:17 executing program 3: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000001d80)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$inet(r0, &(0x7f0000000380)={0x0, 0x0, &(0x7f00000002c0)=[{0x0}, {&(0x7f0000000240)='U', 0x1}], 0x2}, 0x0) 12:21:17 executing program 2: open(&(0x7f0000000400)='./bus\x00', 0x14103e, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$L2TP_CMD_SESSION_MODIFY(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000080)={0x30, r1, 0x1, 0x7, 0x0, {}, [@L2TP_ATTR_SEND_SEQ={0x5}, @L2TP_ATTR_IFNAME={0x14, 0x8, 'veth1_to_hsr\x00'}]}, 0x30}}, 0x0) 12:21:17 executing program 4: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x82, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket(0x10, 0x803, 0x0) sendto(r0, &(0x7f00000000c0)="120000001200e7ef007b00000000000000a1", 0x12, 0x0, 0x0, 0x0) recvmmsg(r0, &(0x7f00000037c0)=[{{&(0x7f00000004c0)=@ethernet={0x0, @random}, 0x80, &(0x7f0000000380)=[{&(0x7f0000000040)=""/95, 0x5f}, {&(0x7f0000000140)=""/85, 0x55}, {&(0x7f0000000fc0)=""/4096, 0x1000}, {&(0x7f0000000400)=""/106, 0x6a}, {&(0x7f0000000740)=""/73, 0x49}, {&(0x7f0000000200)=""/77, 0x4d}, {0x0, 0x3b9aca00}], 0x7, &(0x7f0000000600)=""/191, 0xbf}}], 0x1, 0x0, &(0x7f0000003700)={0x77359400}) 12:21:17 executing program 1: syz_mount_image$ext4(&(0x7f0000000740)='ext4\x00', &(0x7f0000000100)='./bus\x00', 0x804810, &(0x7f0000000180)=ANY=[@ANYBLOB="0061021d307a961da7401271e3fa98008000001d3902ccfd562158cb15c016093893c9e4abd02bc4f1492514fa2dfebc8001000080000000008a1049ca0000"], 0x1, 0x73b, &(0x7f0000000780)="$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") chdir(&(0x7f0000000080)='./file0\x00') open(&(0x7f00000000c0)='./bus\x00', 0x14da42, 0x0) mount(&(0x7f0000000380)=@loop={'/dev/loop', 0x0}, &(0x7f00000003c0)='./bus\x00', 0x0, 0x1000, 0x0) r0 = open(&(0x7f0000000400)='./bus\x00', 0x0, 0x0) ioctl$LOOP_SET_STATUS(r0, 0x4c02, &(0x7f00000001c0)={0x0, {}, 0x0, {}, 0xff, 0x0, 0x0, 0x0, "be8176c9e6755a48a3c0230dd390efe12f8306bed95b2afd402aae879978d959ff9009eec610d9108ea036456bb79e26ee42d0a34968c1fdbb33e8ad5860f632", "b948757aa008fae13adca739a9f126462ab528ea52e90ce2cf50a4ef2568375b"}) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='blkio.throttle.io_service_bytes\x00', 0x275a, 0x12dc) 12:21:17 executing program 3: bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000240)=@bpf_ext={0x1c, 0x3, &(0x7f0000000000)=@framed, &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x18dba}, 0x80) 12:21:17 executing program 2: open(&(0x7f0000000400)='./bus\x00', 0x14103e, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$L2TP_CMD_SESSION_MODIFY(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000080)={0x30, r1, 0x1, 0x8, 0x0, {}, [@L2TP_ATTR_SEND_SEQ={0x5}, @L2TP_ATTR_IFNAME={0x14, 0x8, 'veth1_to_hsr\x00'}]}, 0x30}}, 0x0) [ 986.518783][ T3260] loop1: detected capacity change from 0 to 2048 [ 986.571729][ T3260] EXT4-fs (loop1): mounted filesystem 00000000-0000-0000-0000-000000000000 without journal. Quota mode: none. [ 986.598529][ T3260] ext4 filesystem being mounted at /root/syzkaller-testdir1539738704/syzkaller.ao1jj3/3753/bus supports timestamps until 2038 (0x7fffffff) [ 986.682184][ T3260] loop1: detected capacity change from 2048 to 2047 [ 986.729914][ T3128] EXT4-fs (loop1): unmounting filesystem 00000000-0000-0000-0000-000000000000. 12:21:18 executing program 0: r0 = socket$unix(0x1, 0x2, 0x0) r1 = socket$can_bcm(0x1d, 0x2, 0x2) connect$can_bcm(r1, &(0x7f0000000000), 0x10) ioctl$sock_kcm_SIOCKCMUNATTACH(0xffffffffffffffff, 0x89e1, 0xffffffffffffffff) getsockopt$inet_sctp_SCTP_PEER_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1a, &(0x7f0000000380)={0x0, 0x40, "f29c5b753353d9c7798811e57823354f32d6cb0899a53381003e4f8dbbb1ea469076c8e175a20b45443f885afb38b83813d5e013d4fad662f1582b23328b4ed7"}, &(0x7f00000002c0)=0x48) socket$igmp6(0xa, 0x3, 0x2) perf_event_open(&(0x7f0000000500)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x15, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) close(0xffffffffffffffff) socket$inet_mptcp(0x2, 0x1, 0x106) connect$can_bcm(0xffffffffffffffff, &(0x7f0000000000), 0x10) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, 0x0) bind$unix(r0, &(0x7f00000005c0)=@abs={0x1, 0x0, 0x4e23}, 0x6e) syz_clone(0x40000000, &(0x7f00000000c0), 0x0, 0x0, &(0x7f00000001c0), 0x0) 12:21:18 executing program 4: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x82, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket(0x10, 0x803, 0x0) sendto(r0, &(0x7f00000000c0)="120000001200e7ef007b00000000000000a1", 0x12, 0x0, 0x0, 0x0) recvmmsg(r0, &(0x7f00000037c0)=[{{&(0x7f00000004c0)=@ethernet={0x0, @random}, 0x80, &(0x7f0000000380)=[{&(0x7f0000000040)=""/95, 0x5f}, {&(0x7f0000000140)=""/85, 0x55}, {&(0x7f0000000fc0)=""/4096, 0x1000}, {&(0x7f0000000400)=""/106, 0x6a}, {&(0x7f0000000740)=""/73, 0x49}, {&(0x7f0000000200)=""/77, 0x4d}, {0x0, 0x40000000}], 0x7, &(0x7f0000000600)=""/191, 0xbf}}], 0x1, 0x0, &(0x7f0000003700)={0x77359400}) 12:21:18 executing program 3: bpf$MAP_CREATE(0x0, &(0x7f0000000880)=@base={0x0, 0x0, 0x0, 0x0, 0x8c, 0x1}, 0x48) 12:21:18 executing program 2: open(&(0x7f0000000400)='./bus\x00', 0x14103e, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$L2TP_CMD_SESSION_MODIFY(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000080)={0x30, r1, 0x1, 0x9, 0x0, {}, [@L2TP_ATTR_SEND_SEQ={0x5}, @L2TP_ATTR_IFNAME={0x14, 0x8, 'veth1_to_hsr\x00'}]}, 0x30}}, 0x0) 12:21:18 executing program 1: syz_mount_image$ext4(&(0x7f0000000740)='ext4\x00', &(0x7f0000000100)='./bus\x00', 0x804810, &(0x7f0000000180)=ANY=[@ANYBLOB="0061021d307a961da7401271e3fa98008000001d3902ccfd562158cb15c016093893c9e4abd02bc4f1492514fa2dfebc8001000080000000008a1049ca0000"], 0x1, 0x73b, &(0x7f0000000780)="$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") chdir(&(0x7f0000000080)='./file0\x00') open(&(0x7f00000000c0)='./bus\x00', 0x14da42, 0x0) mount(&(0x7f0000000380)=@loop={'/dev/loop', 0x0}, &(0x7f00000003c0)='./bus\x00', 0x0, 0x1000, 0x0) r0 = open(&(0x7f0000000400)='./bus\x00', 0x0, 0x0) ioctl$LOOP_SET_STATUS(r0, 0x4c02, &(0x7f00000001c0)={0x0, {}, 0x0, {}, 0xff, 0x0, 0x0, 0x0, "be8176c9e6755a48a3c0230dd390efe12f8306bed95b2afd402aae879978d959ff9009eec610d9108ea036456bb79e26ee42d0a34968c1fdbb33e8ad5860f632", "b948757aa008fae13adca739a9f126462ab528ea52e90ce2cf50a4ef2568375b"}) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='blkio.throttle.io_service_bytes\x00', 0x275a, 0x1800) [ 986.987655][ T3277] loop1: detected capacity change from 0 to 2048 12:21:18 executing program 5: r0 = socket$unix(0x1, 0x2, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f0000000100)={'vcan0\x00', 0x0}) r2 = socket$can_bcm(0x1d, 0x2, 0x2) connect$can_bcm(r2, &(0x7f0000000000), 0x10) ioctl$sock_kcm_SIOCKCMUNATTACH(0xffffffffffffffff, 0x89e1, 0xffffffffffffffff) ioctl$sock_SIOCSPGRP(0xffffffffffffffff, 0x8902, 0x0) sendmsg$can_bcm(r2, &(0x7f0000000480)={&(0x7f0000000340)={0x1d, r1, 0x3f420f00}, 0x10, &(0x7f0000000040)={&(0x7f0000000580)=ANY=[@ANYBLOB="01000000d7fe68ca0000e9ffffff0000", @ANYRES64=0x0, @ANYRES64=0x0, @ANYRES64=0x0, @ANYRES64=r0], 0x20000600}}, 0x0) r3 = socket(0x23, 0x800, 0x40000) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r3, 0x541b, &(0x7f00000000c0)={'ip6_vti0\x00', 0x0}) sendmsg$IPCTNL_MSG_EXP_DELETE(r3, &(0x7f00000004c0)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x40000040}, 0xc, &(0x7f0000000440)={&(0x7f00000006c0)={0x1d0, 0x2, 0x2, 0x201, 0x0, 0x0, {0xa}, [@CTA_EXPECT_NAT={0xc0, 0xa, 0x0, 0x1, [@CTA_EXPECT_NAT_TUPLE={0xc, 0x2, 0x0, 0x1, [@CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x1}]}, @CTA_EXPECT_NAT_TUPLE={0x70, 0x2, 0x0, 0x1, [@CTA_TUPLE_IP={0x2c, 0x1, 0x0, 0x1, @ipv6={{0x14, 0x3, @loopback}, {0x14, 0x4, @private0}}}, @CTA_TUPLE_IP={0x14, 0x1, 0x0, 0x1, @ipv4={{0x8, 0x1, @empty}, {0x8, 0x2, @initdev={0xac, 0x1e, 0x1, 0x0}}}}, @CTA_TUPLE_IP={0x14, 0x1, 0x0, 0x1, @ipv4={{0x8, 0x1, @local}, {0x8, 0x2, @loopback}}}, @CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x4}, @CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x3}, @CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x1}]}, @CTA_EXPECT_NAT_TUPLE={0x38, 0x2, 0x0, 0x1, [@CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5, 0x1, 0x88}}, @CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x3}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5, 0x1, 0x21}}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5, 0x1, 0x1}}, @CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x3}]}, @CTA_EXPECT_NAT_DIR={0x8}]}, @CTA_EXPECT_MASTER={0x20, 0x1, 0x0, 0x1, [@CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x1}, @CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x2}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5, 0x1, 0x84}}]}, @CTA_EXPECT_MASTER={0xdc, 0x1, 0x0, 0x1, [@CTA_TUPLE_IP={0x14, 0x1, 0x0, 0x1, @ipv4={{0x8, 0x1, @multicast1}, {0x8, 0x2, @dev={0xac, 0x14, 0x14, 0x3a}}}}, @CTA_TUPLE_ZONE={0x6}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5, 0x1, 0x21}}, @CTA_TUPLE_IP={0x14, 0x1, 0x0, 0x1, @ipv4={{0x8, 0x1, @empty}, {0x8, 0x2, @local}}}, @CTA_TUPLE_IP={0x2c, 0x1, 0x0, 0x1, @ipv6={{0x14, 0x3, @private1={0xfc, 0x1, '\x00', 0x1}}, {0x14, 0x4, @rand_addr=' \x01\x00'}}}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5, 0x1, 0x1}}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5, 0x1, 0x88}}, @CTA_TUPLE_IP={0x2c, 0x1, 0x0, 0x1, @ipv6={{0x14, 0x3, @empty}, {0x14, 0x4, @dev={0xfe, 0x80, '\x00', 0x21}}}}, @CTA_TUPLE_IP={0x2c, 0x1, 0x0, 0x1, @ipv6={{0x14, 0x3, @local}, {0x14, 0x4, @ipv4={'\x00', '\xff\xff', @rand_addr=0x64010100}}}}]}]}, 0x1d0}}, 0x48000) perf_event_open(&(0x7f0000000500)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x15, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$binfmt_elf32(0xffffffffffffffff, &(0x7f0000000040)=ANY=[], 0x69) connect$can_bcm(0xffffffffffffffff, &(0x7f0000000000), 0x10) sendmsg$can_bcm(0xffffffffffffffff, &(0x7f0000000480)={&(0x7f0000000340)={0x1d, 0x0, 0x3f420f00}, 0x10, &(0x7f0000000040)={&(0x7f0000000580)=ANY=[@ANYBLOB="01000000d7fe68ca0000e9ffffff0000", @ANYRES64=0x0, @ANYRES64=0x0, @ANYRES64=0x0, @ANYRES64], 0x20000600}}, 0x0) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(0xffffffffffffffff, 0x89f0, &(0x7f0000000280)={'gretap0\x00', &(0x7f0000000240)={'ip_vti0\x00', 0x0, 0x7, 0x80, 0xfffffff7, 0x7, {{0x8, 0x4, 0x0, 0x5, 0x20, 0x67, 0x0, 0xc0, 0x29, 0x0, @local, @empty, {[@timestamp={0x44, 0xc, 0x8, 0x0, 0x2, [0x7f, 0x1]}]}}}}}) socket(0x10, 0x3, 0x0) process_mrelease(0xffffffffffffffff, 0x0) r4 = socket$packet(0x11, 0x2, 0x300) ioctl$sock_SIOCGIFINDEX(r4, 0x8933, 0x0) getsockopt$inet_sctp_SCTP_RECVNXTINFO(r3, 0x84, 0x21, &(0x7f0000000140), &(0x7f0000000200)=0x4) bind$unix(r0, &(0x7f00000005c0)=@abs={0x1, 0x0, 0x4e23}, 0x6e) syz_clone(0x40000000, &(0x7f00000000c0), 0x0, 0x0, &(0x7f00000001c0), 0x0) 12:21:18 executing program 2: open(&(0x7f0000000400)='./bus\x00', 0x14103e, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$L2TP_CMD_SESSION_MODIFY(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000080)={0x30, r1, 0x1, 0xf, 0x0, {}, [@L2TP_ATTR_SEND_SEQ={0x5}, @L2TP_ATTR_IFNAME={0x14, 0x8, 'veth1_to_hsr\x00'}]}, 0x30}}, 0x0) 12:21:18 executing program 3: socketpair(0x2a, 0x2, 0x0, &(0x7f0000000600)) 12:21:18 executing program 4: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x82, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket(0x10, 0x803, 0x0) sendto(r0, &(0x7f00000000c0)="120000001200e7ef007b00000000000000a1", 0x12, 0x0, 0x0, 0x0) recvmmsg(r0, &(0x7f00000037c0)=[{{&(0x7f00000004c0)=@ethernet={0x0, @random}, 0x80, &(0x7f0000000380)=[{&(0x7f0000000040)=""/95, 0x5f}, {&(0x7f0000000140)=""/85, 0x55}, {&(0x7f0000000fc0)=""/4096, 0x1000}, {&(0x7f0000000400)=""/106, 0x6a}, {&(0x7f0000000740)=""/73, 0x49}, {&(0x7f0000000200)=""/77, 0x4d}, {0x0, 0x4cdeff7f}], 0x7, &(0x7f0000000600)=""/191, 0xbf}}], 0x1, 0x0, &(0x7f0000003700)={0x77359400}) 12:21:18 executing program 2: open(&(0x7f0000000400)='./bus\x00', 0x14103e, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$L2TP_CMD_SESSION_MODIFY(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000080)={0x30, r1, 0x1, 0x13, 0x0, {}, [@L2TP_ATTR_SEND_SEQ={0x5}, @L2TP_ATTR_IFNAME={0x14, 0x8, 'veth1_to_hsr\x00'}]}, 0x30}}, 0x0) 12:21:18 executing program 3: socketpair(0x25, 0x1, 0x0, &(0x7f0000000180)) 12:21:18 executing program 2: open(&(0x7f0000000400)='./bus\x00', 0x14103e, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$L2TP_CMD_SESSION_MODIFY(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000080)={0x30, r1, 0x1, 0x60, 0x0, {}, [@L2TP_ATTR_SEND_SEQ={0x5}, @L2TP_ATTR_IFNAME={0x14, 0x8, 'veth1_to_hsr\x00'}]}, 0x30}}, 0x0) [ 987.039897][ T3277] EXT4-fs (loop1): mounted filesystem 00000000-0000-0000-0000-000000000000 without journal. Quota mode: none. [ 987.067358][ T3277] ext4 filesystem being mounted at /root/syzkaller-testdir1539738704/syzkaller.ao1jj3/3754/bus supports timestamps until 2038 (0x7fffffff) [ 987.132108][ T3277] loop1: detected capacity change from 2048 to 2047 [ 987.156515][ T3128] EXT4-fs (loop1): unmounting filesystem 00000000-0000-0000-0000-000000000000. 12:21:19 executing program 0: r0 = socket$unix(0x1, 0x2, 0x0) r1 = socket$can_bcm(0x1d, 0x2, 0x2) connect$can_bcm(r1, &(0x7f0000000000), 0x10) ioctl$sock_kcm_SIOCKCMUNATTACH(0xffffffffffffffff, 0x89e1, 0xffffffffffffffff) getsockopt$inet_sctp_SCTP_PEER_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1a, &(0x7f0000000380)={0x0, 0x40, "f29c5b753353d9c7798811e57823354f32d6cb0899a53381003e4f8dbbb1ea469076c8e175a20b45443f885afb38b83813d5e013d4fad662f1582b23328b4ed7"}, &(0x7f00000002c0)=0x48) socket$igmp6(0xa, 0x3, 0x2) perf_event_open(&(0x7f0000000500)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x15, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) close(0xffffffffffffffff) socket$inet_mptcp(0x2, 0x1, 0x106) connect$can_bcm(0xffffffffffffffff, &(0x7f0000000000), 0x10) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, 0x0) bind$unix(r0, &(0x7f00000005c0)=@abs={0x1, 0x0, 0x4e23}, 0x6e) syz_clone(0x40000000, &(0x7f00000000c0), 0x0, 0x0, &(0x7f00000001c0), 0x0) 12:21:19 executing program 2: open(&(0x7f0000000400)='./bus\x00', 0x14103e, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$L2TP_CMD_SESSION_MODIFY(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000080)={0x30, r1, 0x1, 0x300, 0x0, {}, [@L2TP_ATTR_SEND_SEQ={0x5}, @L2TP_ATTR_IFNAME={0x14, 0x8, 'veth1_to_hsr\x00'}]}, 0x30}}, 0x0) 12:21:19 executing program 1: syz_mount_image$ext4(&(0x7f0000000740)='ext4\x00', &(0x7f0000000100)='./bus\x00', 0x804810, &(0x7f0000000180)=ANY=[@ANYBLOB="0061021d307a961da7401271e3fa98008000001d3902ccfd562158cb15c016093893c9e4abd02bc4f1492514fa2dfebc8001000080000000008a1049ca0000"], 0x1, 0x73b, &(0x7f0000000780)="$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") chdir(&(0x7f0000000080)='./file0\x00') open(&(0x7f00000000c0)='./bus\x00', 0x14da42, 0x0) mount(&(0x7f0000000380)=@loop={'/dev/loop', 0x0}, &(0x7f00000003c0)='./bus\x00', 0x0, 0x1000, 0x0) r0 = open(&(0x7f0000000400)='./bus\x00', 0x0, 0x0) ioctl$LOOP_SET_STATUS(r0, 0x4c02, &(0x7f00000001c0)={0x0, {}, 0x0, {}, 0xff, 0x0, 0x0, 0x0, "be8176c9e6755a48a3c0230dd390efe12f8306bed95b2afd402aae879978d959ff9009eec610d9108ea036456bb79e26ee42d0a34968c1fdbb33e8ad5860f632", "b948757aa008fae13adca739a9f126462ab528ea52e90ce2cf50a4ef2568375b"}) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='blkio.throttle.io_service_bytes\x00', 0x275a, 0x2000) 12:21:19 executing program 4: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x82, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket(0x10, 0x803, 0x0) sendto(r0, &(0x7f00000000c0)="120000001200e7ef007b00000000000000a1", 0x12, 0x0, 0x0, 0x0) recvmmsg(r0, &(0x7f00000037c0)=[{{&(0x7f00000004c0)=@ethernet={0x0, @random}, 0x80, &(0x7f0000000380)=[{&(0x7f0000000040)=""/95, 0x5f}, {&(0x7f0000000140)=""/85, 0x55}, {&(0x7f0000000fc0)=""/4096, 0x1000}, {&(0x7f0000000400)=""/106, 0x6a}, {&(0x7f0000000740)=""/73, 0x49}, {&(0x7f0000000200)=""/77, 0x4d}, {0x0, 0x60000000}], 0x7, &(0x7f0000000600)=""/191, 0xbf}}], 0x1, 0x0, &(0x7f0000003700)={0x77359400}) 12:21:19 executing program 3: r0 = socket$inet6_dccp(0xa, 0x6, 0x0) sendmsg$inet6(r0, &(0x7f0000002b80)={&(0x7f0000000000)={0xa, 0x0, 0x0, @loopback}, 0x1c, &(0x7f0000000240)=[{0x0}, {0x0}], 0x2}, 0x0) 12:21:19 executing program 5: r0 = socket$unix(0x1, 0x2, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f0000000100)={'vcan0\x00', 0x0}) r2 = socket$can_bcm(0x1d, 0x2, 0x2) connect$can_bcm(r2, &(0x7f0000000000), 0x10) ioctl$sock_kcm_SIOCKCMUNATTACH(0xffffffffffffffff, 0x89e1, 0xffffffffffffffff) ioctl$sock_SIOCSPGRP(0xffffffffffffffff, 0x8902, 0x0) sendmsg$can_bcm(r2, &(0x7f0000000480)={&(0x7f0000000340)={0x1d, r1, 0x3f420f00}, 0x10, &(0x7f0000000040)={&(0x7f0000000580)=ANY=[@ANYBLOB="01000000d7fe68ca0000e9ffffff0000", @ANYRES64=0x0, @ANYRES64=0x0, @ANYRES64=0x0, @ANYRES64=r0], 0x20000600}}, 0x0) r3 = socket(0x23, 0x800, 0x40000) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r3, 0x541b, &(0x7f00000000c0)={'ip6_vti0\x00', 0x0}) sendmsg$IPCTNL_MSG_EXP_DELETE(r3, &(0x7f00000004c0)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x40000040}, 0xc, &(0x7f0000000440)={&(0x7f00000006c0)={0x1d0, 0x2, 0x2, 0x201, 0x0, 0x0, {0xa}, [@CTA_EXPECT_NAT={0xc0, 0xa, 0x0, 0x1, [@CTA_EXPECT_NAT_TUPLE={0xc, 0x2, 0x0, 0x1, [@CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x1}]}, @CTA_EXPECT_NAT_TUPLE={0x70, 0x2, 0x0, 0x1, [@CTA_TUPLE_IP={0x2c, 0x1, 0x0, 0x1, @ipv6={{0x14, 0x3, @loopback}, {0x14, 0x4, @private0}}}, @CTA_TUPLE_IP={0x14, 0x1, 0x0, 0x1, @ipv4={{0x8, 0x1, @empty}, {0x8, 0x2, @initdev={0xac, 0x1e, 0x1, 0x0}}}}, @CTA_TUPLE_IP={0x14, 0x1, 0x0, 0x1, @ipv4={{0x8, 0x1, @local}, {0x8, 0x2, @loopback}}}, @CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x4}, @CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x3}, @CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x1}]}, @CTA_EXPECT_NAT_TUPLE={0x38, 0x2, 0x0, 0x1, [@CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5, 0x1, 0x88}}, @CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x3}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5, 0x1, 0x21}}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5, 0x1, 0x1}}, @CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x3}]}, @CTA_EXPECT_NAT_DIR={0x8}]}, @CTA_EXPECT_MASTER={0x20, 0x1, 0x0, 0x1, [@CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x1}, @CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x2}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5, 0x1, 0x84}}]}, @CTA_EXPECT_MASTER={0xdc, 0x1, 0x0, 0x1, [@CTA_TUPLE_IP={0x14, 0x1, 0x0, 0x1, @ipv4={{0x8, 0x1, @multicast1}, {0x8, 0x2, @dev={0xac, 0x14, 0x14, 0x3a}}}}, @CTA_TUPLE_ZONE={0x6}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5, 0x1, 0x21}}, @CTA_TUPLE_IP={0x14, 0x1, 0x0, 0x1, @ipv4={{0x8, 0x1, @empty}, {0x8, 0x2, @local}}}, @CTA_TUPLE_IP={0x2c, 0x1, 0x0, 0x1, @ipv6={{0x14, 0x3, @private1={0xfc, 0x1, '\x00', 0x1}}, {0x14, 0x4, @rand_addr=' \x01\x00'}}}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5, 0x1, 0x1}}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5, 0x1, 0x88}}, @CTA_TUPLE_IP={0x2c, 0x1, 0x0, 0x1, @ipv6={{0x14, 0x3, @empty}, {0x14, 0x4, @dev={0xfe, 0x80, '\x00', 0x21}}}}, @CTA_TUPLE_IP={0x2c, 0x1, 0x0, 0x1, @ipv6={{0x14, 0x3, @local}, {0x14, 0x4, @ipv4={'\x00', '\xff\xff', @rand_addr=0x64010100}}}}]}]}, 0x1d0}}, 0x48000) perf_event_open(&(0x7f0000000500)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x15, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$binfmt_elf32(0xffffffffffffffff, &(0x7f0000000040)=ANY=[], 0x69) connect$can_bcm(0xffffffffffffffff, &(0x7f0000000000), 0x10) sendmsg$can_bcm(0xffffffffffffffff, &(0x7f0000000480)={&(0x7f0000000340)={0x1d, 0x0, 0x3f420f00}, 0x10, &(0x7f0000000040)={&(0x7f0000000580)=ANY=[@ANYBLOB="01000000d7fe68ca0000e9ffffff0000", @ANYRES64=0x0, @ANYRES64=0x0, @ANYRES64=0x0, @ANYRES64], 0x20000600}}, 0x0) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(0xffffffffffffffff, 0x89f0, &(0x7f0000000280)={'gretap0\x00', &(0x7f0000000240)={'ip_vti0\x00', 0x0, 0x7, 0x80, 0xfffffff7, 0x7, {{0x8, 0x4, 0x0, 0x5, 0x20, 0x67, 0x0, 0xc0, 0x29, 0x0, @local, @empty, {[@timestamp={0x44, 0xc, 0x8, 0x0, 0x2, [0x7f, 0x1]}]}}}}}) socket(0x10, 0x3, 0x0) process_mrelease(0xffffffffffffffff, 0x0) r4 = socket$packet(0x11, 0x2, 0x300) ioctl$sock_SIOCGIFINDEX(r4, 0x8933, 0x0) getsockopt$inet_sctp_SCTP_RECVNXTINFO(r3, 0x84, 0x21, &(0x7f0000000140), &(0x7f0000000200)=0x4) bind$unix(r0, &(0x7f00000005c0)=@abs={0x1, 0x0, 0x4e23}, 0x6e) syz_clone(0x40000000, &(0x7f00000000c0), 0x0, 0x0, &(0x7f00000001c0), 0x0) 12:21:19 executing program 2: open(&(0x7f0000000400)='./bus\x00', 0x14103e, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$L2TP_CMD_SESSION_MODIFY(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000080)={0x30, r1, 0x1, 0x500, 0x0, {}, [@L2TP_ATTR_SEND_SEQ={0x5}, @L2TP_ATTR_IFNAME={0x14, 0x8, 'veth1_to_hsr\x00'}]}, 0x30}}, 0x0) 12:21:19 executing program 3: r0 = socket$netlink(0x10, 0x3, 0x14) sendmsg$BATADV_CMD_SET_HARDIF(r0, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000300)={&(0x7f00000002c0)={0xc0}, 0x14}}, 0x0) 12:21:19 executing program 4: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x82, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket(0x10, 0x803, 0x0) sendto(r0, &(0x7f00000000c0)="120000001200e7ef007b00000000000000a1", 0x12, 0x0, 0x0, 0x0) recvmmsg(r0, &(0x7f00000037c0)=[{{&(0x7f00000004c0)=@ethernet={0x0, @random}, 0x80, &(0x7f0000000380)=[{&(0x7f0000000040)=""/95, 0x5f}, {&(0x7f0000000140)=""/85, 0x55}, {&(0x7f0000000fc0)=""/4096, 0x1000}, {&(0x7f0000000400)=""/106, 0x6a}, {&(0x7f0000000740)=""/73, 0x49}, {&(0x7f0000000200)=""/77, 0x4d}, {0x0, 0x65580000}], 0x7, &(0x7f0000000600)=""/191, 0xbf}}], 0x1, 0x0, &(0x7f0000003700)={0x77359400}) 12:21:19 executing program 2: open(&(0x7f0000000400)='./bus\x00', 0x14103e, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$L2TP_CMD_SESSION_MODIFY(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000080)={0x30, r1, 0x1, 0x600, 0x0, {}, [@L2TP_ATTR_SEND_SEQ={0x5}, @L2TP_ATTR_IFNAME={0x14, 0x8, 'veth1_to_hsr\x00'}]}, 0x30}}, 0x0) 12:21:19 executing program 3: r0 = socket$l2tp(0x2, 0x2, 0x73) ioctl$sock_SIOCGIFINDEX_80211(r0, 0x8924, &(0x7f0000000080)={'wlan1\x00'}) [ 987.832448][ T3305] loop1: detected capacity change from 0 to 2048 12:21:19 executing program 2: open(&(0x7f0000000400)='./bus\x00', 0x14103e, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$L2TP_CMD_SESSION_MODIFY(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000080)={0x30, r1, 0x1, 0x700, 0x0, {}, [@L2TP_ATTR_SEND_SEQ={0x5}, @L2TP_ATTR_IFNAME={0x14, 0x8, 'veth1_to_hsr\x00'}]}, 0x30}}, 0x0) [ 987.960083][ T3305] EXT4-fs (loop1): mounted filesystem 00000000-0000-0000-0000-000000000000 without journal. Quota mode: none. [ 987.988849][ T3305] ext4 filesystem being mounted at /root/syzkaller-testdir1539738704/syzkaller.ao1jj3/3755/bus supports timestamps until 2038 (0x7fffffff) [ 988.061890][ T3305] loop1: detected capacity change from 2048 to 2047 [ 988.082643][ T3128] EXT4-fs (loop1): unmounting filesystem 00000000-0000-0000-0000-000000000000. 12:21:20 executing program 0: r0 = socket$unix(0x1, 0x2, 0x0) r1 = socket$can_bcm(0x1d, 0x2, 0x2) connect$can_bcm(r1, &(0x7f0000000000), 0x10) ioctl$sock_kcm_SIOCKCMUNATTACH(0xffffffffffffffff, 0x89e1, 0xffffffffffffffff) getsockopt$inet_sctp_SCTP_PEER_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1a, &(0x7f0000000380)={0x0, 0x40, "f29c5b753353d9c7798811e57823354f32d6cb0899a53381003e4f8dbbb1ea469076c8e175a20b45443f885afb38b83813d5e013d4fad662f1582b23328b4ed7"}, &(0x7f00000002c0)=0x48) socket$igmp6(0xa, 0x3, 0x2) perf_event_open(&(0x7f0000000500)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x15, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) close(0xffffffffffffffff) socket$inet_mptcp(0x2, 0x1, 0x106) connect$can_bcm(0xffffffffffffffff, &(0x7f0000000000), 0x10) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, 0x0) bind$unix(r0, &(0x7f00000005c0)=@abs={0x1, 0x0, 0x4e23}, 0x6e) syz_clone(0x40000000, &(0x7f00000000c0), 0x0, 0x0, &(0x7f00000001c0), 0x0) 12:21:20 executing program 4: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x82, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket(0x10, 0x803, 0x0) sendto(r0, &(0x7f00000000c0)="120000001200e7ef007b00000000000000a1", 0x12, 0x0, 0x0, 0x0) recvmmsg(r0, &(0x7f00000037c0)=[{{&(0x7f00000004c0)=@ethernet={0x0, @random}, 0x80, &(0x7f0000000380)=[{&(0x7f0000000040)=""/95, 0x5f}, {&(0x7f0000000140)=""/85, 0x55}, {&(0x7f0000000fc0)=""/4096, 0x1000}, {&(0x7f0000000400)=""/106, 0x6a}, {&(0x7f0000000740)=""/73, 0x49}, {&(0x7f0000000200)=""/77, 0x4d}, {0x0, 0x7fffde4c}], 0x7, &(0x7f0000000600)=""/191, 0xbf}}], 0x1, 0x0, &(0x7f0000003700)={0x77359400}) 12:21:20 executing program 2: open(&(0x7f0000000400)='./bus\x00', 0x14103e, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$L2TP_CMD_SESSION_MODIFY(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000080)={0x30, r1, 0x1, 0x900, 0x0, {}, [@L2TP_ATTR_SEND_SEQ={0x5}, @L2TP_ATTR_IFNAME={0x14, 0x8, 'veth1_to_hsr\x00'}]}, 0x30}}, 0x0) 12:21:20 executing program 3: r0 = socket$l2tp(0x2, 0x2, 0x73) ioctl$sock_SIOCGIFINDEX_80211(r0, 0x8921, &(0x7f0000000080)={'wlan1\x00'}) 12:21:20 executing program 1: syz_mount_image$ext4(&(0x7f0000000740)='ext4\x00', &(0x7f0000000100)='./bus\x00', 0x804810, &(0x7f0000000180)=ANY=[@ANYBLOB="0061021d307a961da7401271e3fa98008000001d3902ccfd562158cb15c016093893c9e4abd02bc4f1492514fa2dfebc8001000080000000008a1049ca0000"], 0x1, 0x73b, &(0x7f0000000780)="$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") chdir(&(0x7f0000000080)='./file0\x00') open(&(0x7f00000000c0)='./bus\x00', 0x14da42, 0x0) mount(&(0x7f0000000380)=@loop={'/dev/loop', 0x0}, &(0x7f00000003c0)='./bus\x00', 0x0, 0x1000, 0x0) r0 = open(&(0x7f0000000400)='./bus\x00', 0x0, 0x0) ioctl$LOOP_SET_STATUS(r0, 0x4c02, &(0x7f00000001c0)={0x0, {}, 0x0, {}, 0xff, 0x0, 0x0, 0x0, "be8176c9e6755a48a3c0230dd390efe12f8306bed95b2afd402aae879978d959ff9009eec610d9108ea036456bb79e26ee42d0a34968c1fdbb33e8ad5860f632", "b948757aa008fae13adca739a9f126462ab528ea52e90ce2cf50a4ef2568375b"}) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='blkio.throttle.io_service_bytes\x00', 0x275a, 0x2200) 12:21:20 executing program 5: r0 = socket$unix(0x1, 0x2, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f0000000100)={'vcan0\x00', 0x0}) r2 = socket$can_bcm(0x1d, 0x2, 0x2) connect$can_bcm(r2, &(0x7f0000000000), 0x10) ioctl$sock_kcm_SIOCKCMUNATTACH(0xffffffffffffffff, 0x89e1, 0xffffffffffffffff) ioctl$sock_SIOCSPGRP(0xffffffffffffffff, 0x8902, 0x0) sendmsg$can_bcm(r2, &(0x7f0000000480)={&(0x7f0000000340)={0x1d, r1, 0x3f420f00}, 0x10, &(0x7f0000000040)={&(0x7f0000000580)=ANY=[@ANYBLOB="01000000d7fe68ca0000e9ffffff0000", @ANYRES64=0x0, @ANYRES64=0x0, @ANYRES64=0x0, @ANYRES64=r0, @ANYBLOB], 0x20000600}}, 0x0) r3 = socket(0x23, 0x800, 0x40000) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r3, 0x541b, &(0x7f00000000c0)={'ip6_vti0\x00', 0x0}) sendmsg$IPCTNL_MSG_EXP_DELETE(r3, &(0x7f00000004c0)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x40000040}, 0xc, &(0x7f0000000440)={&(0x7f00000006c0)={0x1d0, 0x2, 0x2, 0x201, 0x0, 0x0, {0xa}, [@CTA_EXPECT_NAT={0xc0, 0xa, 0x0, 0x1, [@CTA_EXPECT_NAT_TUPLE={0xc, 0x2, 0x0, 0x1, [@CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x1}]}, @CTA_EXPECT_NAT_TUPLE={0x70, 0x2, 0x0, 0x1, [@CTA_TUPLE_IP={0x2c, 0x1, 0x0, 0x1, @ipv6={{0x14, 0x3, @loopback}, {0x14, 0x4, @private0}}}, @CTA_TUPLE_IP={0x14, 0x1, 0x0, 0x1, @ipv4={{0x8, 0x1, @empty}, {0x8, 0x2, @initdev={0xac, 0x1e, 0x1, 0x0}}}}, @CTA_TUPLE_IP={0x14, 0x1, 0x0, 0x1, @ipv4={{0x8, 0x1, @local}, {0x8, 0x2, @loopback}}}, @CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x4}, @CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x3}, @CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x1}]}, @CTA_EXPECT_NAT_TUPLE={0x38, 0x2, 0x0, 0x1, [@CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5, 0x1, 0x88}}, @CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x3}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5, 0x1, 0x21}}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5, 0x1, 0x1}}, @CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x3}]}, @CTA_EXPECT_NAT_DIR={0x8}]}, @CTA_EXPECT_MASTER={0x20, 0x1, 0x0, 0x1, [@CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x1}, @CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x2}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5, 0x1, 0x84}}]}, @CTA_EXPECT_MASTER={0xdc, 0x1, 0x0, 0x1, [@CTA_TUPLE_IP={0x14, 0x1, 0x0, 0x1, @ipv4={{0x8, 0x1, @multicast1}, {0x8, 0x2, @dev={0xac, 0x14, 0x14, 0x3a}}}}, @CTA_TUPLE_ZONE={0x6}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5, 0x1, 0x21}}, @CTA_TUPLE_IP={0x14, 0x1, 0x0, 0x1, @ipv4={{0x8, 0x1, @empty}, {0x8, 0x2, @local}}}, @CTA_TUPLE_IP={0x2c, 0x1, 0x0, 0x1, @ipv6={{0x14, 0x3, @private1={0xfc, 0x1, '\x00', 0x1}}, {0x14, 0x4, @rand_addr=' \x01\x00'}}}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5, 0x1, 0x1}}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5, 0x1, 0x88}}, @CTA_TUPLE_IP={0x2c, 0x1, 0x0, 0x1, @ipv6={{0x14, 0x3, @empty}, {0x14, 0x4, @dev={0xfe, 0x80, '\x00', 0x21}}}}, @CTA_TUPLE_IP={0x2c, 0x1, 0x0, 0x1, @ipv6={{0x14, 0x3, @local}, {0x14, 0x4, @ipv4={'\x00', '\xff\xff', @rand_addr=0x64010100}}}}]}]}, 0x1d0}}, 0x48000) perf_event_open(&(0x7f0000000500)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x15, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$binfmt_elf32(0xffffffffffffffff, &(0x7f0000000040)=ANY=[], 0x69) connect$can_bcm(0xffffffffffffffff, &(0x7f0000000000), 0x10) sendmsg$can_bcm(0xffffffffffffffff, &(0x7f0000000480)={&(0x7f0000000340)={0x1d, 0x0, 0x3f420f00}, 0x10, &(0x7f0000000040)={&(0x7f0000000580)=ANY=[@ANYBLOB="01000000d7fe68ca0000e9ffffff0000", @ANYRES64=0x0, @ANYRES64=0x0, @ANYRES64=0x0, @ANYRES64], 0x20000600}}, 0x0) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(0xffffffffffffffff, 0x89f0, &(0x7f0000000280)={'gretap0\x00', &(0x7f0000000240)={'ip_vti0\x00', 0x0, 0x7, 0x80, 0xfffffff7, 0x7, {{0x8, 0x4, 0x0, 0x5, 0x20, 0x67, 0x0, 0xc0, 0x29, 0x0, @local, @empty, {[@timestamp={0x44, 0xc, 0x8, 0x0, 0x2, [0x7f, 0x1]}]}}}}}) socket(0x10, 0x3, 0x0) process_mrelease(0xffffffffffffffff, 0x0) r4 = socket$packet(0x11, 0x2, 0x300) ioctl$sock_SIOCGIFINDEX(r4, 0x8933, 0x0) getsockopt$inet_sctp_SCTP_RECVNXTINFO(r3, 0x84, 0x21, &(0x7f0000000140), &(0x7f0000000200)=0x4) bind$unix(r0, &(0x7f00000005c0)=@abs={0x1, 0x0, 0x4e23}, 0x6e) syz_clone(0x40000000, &(0x7f00000000c0), 0x0, 0x0, &(0x7f00000001c0), 0x0) 12:21:20 executing program 2: open(&(0x7f0000000400)='./bus\x00', 0x14103e, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$L2TP_CMD_SESSION_MODIFY(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000080)={0x30, r1, 0x1, 0xf00, 0x0, {}, [@L2TP_ATTR_SEND_SEQ={0x5}, @L2TP_ATTR_IFNAME={0x14, 0x8, 'veth1_to_hsr\x00'}]}, 0x30}}, 0x0) 12:21:20 executing program 4: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x82, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket(0x10, 0x803, 0x0) sendto(r0, &(0x7f00000000c0)="120000001200e7ef007b00000000000000a1", 0x12, 0x0, 0x0, 0x0) recvmmsg(r0, &(0x7f00000037c0)=[{{&(0x7f00000004c0)=@ethernet={0x0, @random}, 0x80, &(0x7f0000000380)=[{&(0x7f0000000040)=""/95, 0x5f}, {&(0x7f0000000140)=""/85, 0x55}, {&(0x7f0000000fc0)=""/4096, 0x1000}, {&(0x7f0000000400)=""/106, 0x6a}, {&(0x7f0000000740)=""/73, 0x49}, {&(0x7f0000000200)=""/77, 0x4d}, {0x0, 0x81000000}], 0x7, &(0x7f0000000600)=""/191, 0xbf}}], 0x1, 0x0, &(0x7f0000003700)={0x77359400}) 12:21:20 executing program 2: open(&(0x7f0000000400)='./bus\x00', 0x14103e, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$L2TP_CMD_SESSION_MODIFY(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000080)={0x30, r1, 0x1, 0x1300, 0x0, {}, [@L2TP_ATTR_SEND_SEQ={0x5}, @L2TP_ATTR_IFNAME={0x14, 0x8, 'veth1_to_hsr\x00'}]}, 0x30}}, 0x0) 12:21:20 executing program 3: syz_emit_ethernet(0x46, &(0x7f0000000080)={@multicast, @dev, @void, {@ipv6={0x86dd, @dccp_packet={0x0, 0x6, "0796ec", 0x10, 0x21, 0x0, @remote, @local, {[], {{0x0, 0x0, 0x4, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, "adf5fe", 0x0, "becda6"}}}}}}}, 0x0) [ 988.545651][ T3342] loop1: detected capacity change from 0 to 2048 12:21:20 executing program 4: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x82, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket(0x10, 0x803, 0x0) sendto(r0, &(0x7f00000000c0)="120000001200e7ef007b00000000000000a1", 0x12, 0x0, 0x0, 0x0) recvmmsg(r0, &(0x7f00000037c0)=[{{&(0x7f00000004c0)=@ethernet={0x0, @random}, 0x80, &(0x7f0000000380)=[{&(0x7f0000000040)=""/95, 0x5f}, {&(0x7f0000000140)=""/85, 0x55}, {&(0x7f0000000fc0)=""/4096, 0x1000}, {&(0x7f0000000400)=""/106, 0x6a}, {&(0x7f0000000740)=""/73, 0x49}, {&(0x7f0000000200)=""/77, 0x4d}, {0x0, 0x88470000}], 0x7, &(0x7f0000000600)=""/191, 0xbf}}], 0x1, 0x0, &(0x7f0000003700)={0x77359400}) [ 988.620412][ T3342] EXT4-fs (loop1): mounted filesystem 00000000-0000-0000-0000-000000000000 without journal. Quota mode: none. 12:21:20 executing program 2: open(&(0x7f0000000400)='./bus\x00', 0x14103e, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$L2TP_CMD_SESSION_MODIFY(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000080)={0x30, r1, 0x1, 0x25d1, 0x0, {}, [@L2TP_ATTR_SEND_SEQ={0x5}, @L2TP_ATTR_IFNAME={0x14, 0x8, 'veth1_to_hsr\x00'}]}, 0x30}}, 0x0) [ 988.661917][ T3342] ext4 filesystem being mounted at /root/syzkaller-testdir1539738704/syzkaller.ao1jj3/3756/bus supports timestamps until 2038 (0x7fffffff) [ 988.781854][ T3342] loop1: detected capacity change from 2048 to 2047 [ 988.811191][ T3128] EXT4-fs (loop1): unmounting filesystem 00000000-0000-0000-0000-000000000000. 12:21:20 executing program 0: r0 = socket$unix(0x1, 0x2, 0x0) r1 = socket$can_bcm(0x1d, 0x2, 0x2) connect$can_bcm(r1, &(0x7f0000000000), 0x10) ioctl$sock_kcm_SIOCKCMUNATTACH(0xffffffffffffffff, 0x89e1, 0xffffffffffffffff) getsockopt$inet_sctp_SCTP_PEER_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1a, &(0x7f0000000380)={0x0, 0x60, "f29c5b753353d9c7798811e57823354f32d6cb0899a53381003e4f8dbbb1ea469076c8e175a20b45443f885afb38b83813d5e013d4fad662f1582b23328b4ed70ad9d7d4d0052d0147d8b0ac4910985bec8aa8956c599d291a7da55fec010801"}, &(0x7f00000002c0)=0x68) socket$igmp6(0xa, 0x3, 0x2) perf_event_open(&(0x7f0000000500)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x15, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) close(0xffffffffffffffff) socket$inet_mptcp(0x2, 0x1, 0x106) connect$can_bcm(0xffffffffffffffff, &(0x7f0000000000), 0x10) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, 0x0) bind$unix(r0, &(0x7f00000005c0)=@abs={0x1, 0x0, 0x4e23}, 0x6e) syz_clone(0x40000000, &(0x7f00000000c0), 0x0, 0x0, &(0x7f00000001c0), 0x0) 12:21:20 executing program 3: openat$full(0xffffffffffffff9c, &(0x7f0000000040), 0x1, 0x0) 12:21:20 executing program 4: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x82, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket(0x10, 0x803, 0x0) sendto(r0, &(0x7f00000000c0)="120000001200e7ef007b00000000000000a1", 0x12, 0x0, 0x0, 0x0) recvmmsg(r0, &(0x7f00000037c0)=[{{&(0x7f00000004c0)=@ethernet={0x0, @random}, 0x80, &(0x7f0000000380)=[{&(0x7f0000000040)=""/95, 0x5f}, {&(0x7f0000000140)=""/85, 0x55}, {&(0x7f0000000fc0)=""/4096, 0x1000}, {&(0x7f0000000400)=""/106, 0x6a}, {&(0x7f0000000740)=""/73, 0x49}, {&(0x7f0000000200)=""/77, 0x4d}, {0x0, 0x88480000}], 0x7, &(0x7f0000000600)=""/191, 0xbf}}], 0x1, 0x0, &(0x7f0000003700)={0x77359400}) 12:21:20 executing program 2: open(&(0x7f0000000400)='./bus\x00', 0x14103e, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$L2TP_CMD_SESSION_MODIFY(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000080)={0x30, r1, 0x1, 0x6000, 0x0, {}, [@L2TP_ATTR_SEND_SEQ={0x5}, @L2TP_ATTR_IFNAME={0x14, 0x8, 'veth1_to_hsr\x00'}]}, 0x30}}, 0x0) 12:21:20 executing program 1: syz_mount_image$ext4(&(0x7f0000000740)='ext4\x00', &(0x7f0000000100)='./bus\x00', 0x804810, &(0x7f0000000180)=ANY=[@ANYBLOB="0061021d307a961da7401271e3fa98008000001d3902ccfd562158cb15c016093893c9e4abd02bc4f1492514fa2dfebc8001000080000000008a1049ca0000"], 0x1, 0x73b, &(0x7f0000000780)="$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") chdir(&(0x7f0000000080)='./file0\x00') open(&(0x7f00000000c0)='./bus\x00', 0x14da42, 0x0) mount(&(0x7f0000000380)=@loop={'/dev/loop', 0x0}, &(0x7f00000003c0)='./bus\x00', 0x0, 0x1000, 0x0) r0 = open(&(0x7f0000000400)='./bus\x00', 0x0, 0x0) ioctl$LOOP_SET_STATUS(r0, 0x4c02, &(0x7f00000001c0)={0x0, {}, 0x0, {}, 0xff, 0x0, 0x0, 0x0, "be8176c9e6755a48a3c0230dd390efe12f8306bed95b2afd402aae879978d959ff9009eec610d9108ea036456bb79e26ee42d0a34968c1fdbb33e8ad5860f632", "b948757aa008fae13adca739a9f126462ab528ea52e90ce2cf50a4ef2568375b"}) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='blkio.throttle.io_service_bytes\x00', 0x275a, 0x3f00) 12:21:20 executing program 5: r0 = socket$unix(0x1, 0x2, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f0000000100)={'vcan0\x00', 0x0}) r2 = socket$can_bcm(0x1d, 0x2, 0x2) connect$can_bcm(r2, &(0x7f0000000000), 0x10) ioctl$sock_kcm_SIOCKCMUNATTACH(0xffffffffffffffff, 0x89e1, 0xffffffffffffffff) ioctl$sock_SIOCSPGRP(0xffffffffffffffff, 0x8902, 0x0) sendmsg$can_bcm(r2, &(0x7f0000000480)={&(0x7f0000000340)={0x1d, r1, 0x3f420f00}, 0x10, &(0x7f0000000040)={&(0x7f0000000580)=ANY=[@ANYBLOB="01000000d7fe68ca0000e9ffffff0000", @ANYRES64=0x0, @ANYRES64=0x0, @ANYRES64=0x0, @ANYRES64=r0, @ANYBLOB], 0x20000600}}, 0x0) r3 = socket(0x23, 0x800, 0x40000) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r3, 0x541b, &(0x7f00000000c0)={'ip6_vti0\x00', 0x0}) sendmsg$IPCTNL_MSG_EXP_DELETE(r3, &(0x7f00000004c0)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x40000040}, 0xc, &(0x7f0000000440)={&(0x7f00000006c0)={0x1d0, 0x2, 0x2, 0x201, 0x0, 0x0, {0xa}, [@CTA_EXPECT_NAT={0xc0, 0xa, 0x0, 0x1, [@CTA_EXPECT_NAT_TUPLE={0xc, 0x2, 0x0, 0x1, [@CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x1}]}, @CTA_EXPECT_NAT_TUPLE={0x70, 0x2, 0x0, 0x1, [@CTA_TUPLE_IP={0x2c, 0x1, 0x0, 0x1, @ipv6={{0x14, 0x3, @loopback}, {0x14, 0x4, @private0}}}, @CTA_TUPLE_IP={0x14, 0x1, 0x0, 0x1, @ipv4={{0x8, 0x1, @empty}, {0x8, 0x2, @initdev={0xac, 0x1e, 0x1, 0x0}}}}, @CTA_TUPLE_IP={0x14, 0x1, 0x0, 0x1, @ipv4={{0x8, 0x1, @local}, {0x8, 0x2, @loopback}}}, @CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x4}, @CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x3}, @CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x1}]}, @CTA_EXPECT_NAT_TUPLE={0x38, 0x2, 0x0, 0x1, [@CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5, 0x1, 0x88}}, @CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x3}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5, 0x1, 0x21}}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5, 0x1, 0x1}}, @CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x3}]}, @CTA_EXPECT_NAT_DIR={0x8}]}, @CTA_EXPECT_MASTER={0x20, 0x1, 0x0, 0x1, [@CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x1}, @CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x2}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5, 0x1, 0x84}}]}, @CTA_EXPECT_MASTER={0xdc, 0x1, 0x0, 0x1, [@CTA_TUPLE_IP={0x14, 0x1, 0x0, 0x1, @ipv4={{0x8, 0x1, @multicast1}, {0x8, 0x2, @dev={0xac, 0x14, 0x14, 0x3a}}}}, @CTA_TUPLE_ZONE={0x6}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5, 0x1, 0x21}}, @CTA_TUPLE_IP={0x14, 0x1, 0x0, 0x1, @ipv4={{0x8, 0x1, @empty}, {0x8, 0x2, @local}}}, @CTA_TUPLE_IP={0x2c, 0x1, 0x0, 0x1, @ipv6={{0x14, 0x3, @private1={0xfc, 0x1, '\x00', 0x1}}, {0x14, 0x4, @rand_addr=' \x01\x00'}}}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5, 0x1, 0x1}}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5, 0x1, 0x88}}, @CTA_TUPLE_IP={0x2c, 0x1, 0x0, 0x1, @ipv6={{0x14, 0x3, @empty}, {0x14, 0x4, @dev={0xfe, 0x80, '\x00', 0x21}}}}, @CTA_TUPLE_IP={0x2c, 0x1, 0x0, 0x1, @ipv6={{0x14, 0x3, @local}, {0x14, 0x4, @ipv4={'\x00', '\xff\xff', @rand_addr=0x64010100}}}}]}]}, 0x1d0}}, 0x48000) perf_event_open(&(0x7f0000000500)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x15, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$binfmt_elf32(0xffffffffffffffff, &(0x7f0000000040)=ANY=[], 0x69) connect$can_bcm(0xffffffffffffffff, &(0x7f0000000000), 0x10) sendmsg$can_bcm(0xffffffffffffffff, &(0x7f0000000480)={&(0x7f0000000340)={0x1d, 0x0, 0x3f420f00}, 0x10, &(0x7f0000000040)={&(0x7f0000000580)=ANY=[@ANYBLOB="01000000d7fe68ca0000e9ffffff0000", @ANYRES64=0x0, @ANYRES64=0x0, @ANYRES64=0x0, @ANYRES64], 0x20000600}}, 0x0) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(0xffffffffffffffff, 0x89f0, &(0x7f0000000280)={'gretap0\x00', &(0x7f0000000240)={'ip_vti0\x00', 0x0, 0x7, 0x80, 0xfffffff7, 0x7, {{0x8, 0x4, 0x0, 0x5, 0x20, 0x67, 0x0, 0xc0, 0x29, 0x0, @local, @empty, {[@timestamp={0x44, 0xc, 0x8, 0x0, 0x2, [0x7f, 0x1]}]}}}}}) socket(0x10, 0x3, 0x0) process_mrelease(0xffffffffffffffff, 0x0) r4 = socket$packet(0x11, 0x2, 0x300) ioctl$sock_SIOCGIFINDEX(r4, 0x8933, 0x0) getsockopt$inet_sctp_SCTP_RECVNXTINFO(r3, 0x84, 0x21, &(0x7f0000000140), &(0x7f0000000200)=0x4) bind$unix(r0, &(0x7f00000005c0)=@abs={0x1, 0x0, 0x4e23}, 0x6e) syz_clone(0x40000000, &(0x7f00000000c0), 0x0, 0x0, &(0x7f00000001c0), 0x0) 12:21:20 executing program 3: syz_emit_ethernet(0x4a, &(0x7f0000000040)={@local, @dev, @void, {@ipv4={0x800, @dccp={{0xb, 0x4, 0x0, 0x0, 0x3c, 0x0, 0x0, 0x0, 0x21, 0x0, @dev, @remote, {[@cipso={0x86, 0x18, 0xffffffffffffffff, [{0x0, 0x2}, {0x0, 0x10, "9b7b454c092c9ad80e0a920e0cc5"}]}]}}, {{0x0, 0x0, 0x4, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, "966aef", 0x0, "bf0cc8"}}}}}}, 0x0) 12:21:20 executing program 4: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x82, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket(0x10, 0x803, 0x0) sendto(r0, &(0x7f00000000c0)="120000001200e7ef007b00000000000000a1", 0x12, 0x0, 0x0, 0x0) recvmmsg(r0, &(0x7f00000037c0)=[{{&(0x7f00000004c0)=@ethernet={0x0, @random}, 0x80, &(0x7f0000000380)=[{&(0x7f0000000040)=""/95, 0x5f}, {&(0x7f0000000140)=""/85, 0x55}, {&(0x7f0000000fc0)=""/4096, 0x1000}, {&(0x7f0000000400)=""/106, 0x6a}, {&(0x7f0000000740)=""/73, 0x49}, {&(0x7f0000000200)=""/77, 0x4d}, {0x0, 0x88a8ffff}], 0x7, &(0x7f0000000600)=""/191, 0xbf}}], 0x1, 0x0, &(0x7f0000003700)={0x77359400}) 12:21:20 executing program 2: open(&(0x7f0000000400)='./bus\x00', 0x14103e, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$L2TP_CMD_SESSION_MODIFY(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000080)={0x30, r1, 0x1, 0xd125, 0x0, {}, [@L2TP_ATTR_SEND_SEQ={0x5}, @L2TP_ATTR_IFNAME={0x14, 0x8, 'veth1_to_hsr\x00'}]}, 0x30}}, 0x0) 12:21:20 executing program 3: syz_emit_ethernet(0x4a, &(0x7f0000000040)={@local, @dev, @void, {@ipv4={0x800, @dccp={{0xb, 0x4, 0x0, 0x0, 0x3c, 0x0, 0x0, 0x0, 0x21, 0x0, @dev, @remote, {[@cipso={0x86, 0x18, 0xffffffffffffffff, [{0x0, 0x2}, {0x0, 0x10, "9b7b454c092c9ad80e0a920e0cc5"}]}]}}, {{0x0, 0x0, 0x4, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, "966aef", 0x0, "bf0cc8"}}}}}}, 0x0) 12:21:20 executing program 3: syz_emit_ethernet(0x4a, &(0x7f0000000040)={@local, @dev, @void, {@ipv4={0x800, @dccp={{0xb, 0x4, 0x0, 0x0, 0x3c, 0x0, 0x0, 0x0, 0x21, 0x0, @dev, @remote, {[@cipso={0x86, 0x18, 0xffffffffffffffff, [{0x0, 0x2}, {0x0, 0x10, "9b7b454c092c9ad80e0a920e0cc5"}]}]}}, {{0x0, 0x0, 0x4, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, "966aef", 0x0, "bf0cc8"}}}}}}, 0x0) [ 989.344663][ T3372] loop1: detected capacity change from 0 to 2048 12:21:20 executing program 2: open(&(0x7f0000000400)='./bus\x00', 0x14103e, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$L2TP_CMD_SESSION_MODIFY(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000080)={0x30, r1, 0x1, 0x30000, 0x0, {}, [@L2TP_ATTR_SEND_SEQ={0x5}, @L2TP_ATTR_IFNAME={0x14, 0x8, 'veth1_to_hsr\x00'}]}, 0x30}}, 0x0) [ 989.430143][ T3372] EXT4-fs (loop1): mounted filesystem 00000000-0000-0000-0000-000000000000 without journal. Quota mode: none. [ 989.491517][ T3372] ext4 filesystem being mounted at /root/syzkaller-testdir1539738704/syzkaller.ao1jj3/3757/bus supports timestamps until 2038 (0x7fffffff) [ 989.651853][ T3372] loop1: detected capacity change from 2048 to 2047 [ 989.683659][ T3128] EXT4-fs (loop1): unmounting filesystem 00000000-0000-0000-0000-000000000000. 12:21:21 executing program 0: r0 = socket$unix(0x1, 0x2, 0x0) r1 = socket$can_bcm(0x1d, 0x2, 0x2) connect$can_bcm(r1, &(0x7f0000000000), 0x10) ioctl$sock_kcm_SIOCKCMUNATTACH(0xffffffffffffffff, 0x89e1, 0xffffffffffffffff) getsockopt$inet_sctp_SCTP_PEER_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1a, &(0x7f0000000380)={0x0, 0x60, "f29c5b753353d9c7798811e57823354f32d6cb0899a53381003e4f8dbbb1ea469076c8e175a20b45443f885afb38b83813d5e013d4fad662f1582b23328b4ed70ad9d7d4d0052d0147d8b0ac4910985bec8aa8956c599d291a7da55fec010801"}, &(0x7f00000002c0)=0x68) socket$igmp6(0xa, 0x3, 0x2) perf_event_open(&(0x7f0000000500)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x15, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) close(0xffffffffffffffff) socket$inet_mptcp(0x2, 0x1, 0x106) connect$can_bcm(0xffffffffffffffff, &(0x7f0000000000), 0x10) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, 0x0) bind$unix(r0, &(0x7f00000005c0)=@abs={0x1, 0x0, 0x4e23}, 0x6e) syz_clone(0x40000000, &(0x7f00000000c0), 0x0, 0x0, &(0x7f00000001c0), 0x0) 12:21:21 executing program 4: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x82, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket(0x10, 0x803, 0x0) sendto(r0, &(0x7f00000000c0)="120000001200e7ef007b00000000000000a1", 0x12, 0x0, 0x0, 0x0) recvmmsg(r0, &(0x7f00000037c0)=[{{&(0x7f00000004c0)=@ethernet={0x0, @random}, 0x80, &(0x7f0000000380)=[{&(0x7f0000000040)=""/95, 0x5f}, {&(0x7f0000000140)=""/85, 0x55}, {&(0x7f0000000fc0)=""/4096, 0x1000}, {&(0x7f0000000400)=""/106, 0x6a}, {&(0x7f0000000740)=""/73, 0x49}, {&(0x7f0000000200)=""/77, 0x4d}, {0x0, 0xb4110000}], 0x7, &(0x7f0000000600)=""/191, 0xbf}}], 0x1, 0x0, &(0x7f0000003700)={0x77359400}) 12:21:21 executing program 3: syz_emit_ethernet(0x4a, &(0x7f0000000040)={@local, @dev, @void, {@ipv4={0x800, @dccp={{0xb, 0x4, 0x0, 0x0, 0x3c, 0x0, 0x0, 0x0, 0x21, 0x0, @dev, @remote, {[@cipso={0x86, 0x18, 0xffffffffffffffff, [{0x0, 0x2}, {0x0, 0x10, "9b7b454c092c9ad80e0a920e0cc5"}]}]}}, {{0x0, 0x0, 0x4, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, "966aef", 0x0, "bf0cc8"}}}}}}, 0x0) 12:21:21 executing program 2: open(&(0x7f0000000400)='./bus\x00', 0x14103e, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$L2TP_CMD_SESSION_MODIFY(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000080)={0x30, r1, 0x1, 0x34000, 0x0, {}, [@L2TP_ATTR_SEND_SEQ={0x5}, @L2TP_ATTR_IFNAME={0x14, 0x8, 'veth1_to_hsr\x00'}]}, 0x30}}, 0x0) 12:21:21 executing program 1: syz_mount_image$ext4(&(0x7f0000000740)='ext4\x00', &(0x7f0000000100)='./bus\x00', 0x804810, &(0x7f0000000180)=ANY=[@ANYBLOB="0061021d307a961da7401271e3fa98008000001d3902ccfd562158cb15c016093893c9e4abd02bc4f1492514fa2dfebc8001000080000000008a1049ca0000"], 0x1, 0x73b, &(0x7f0000000780)="$eJzs3M9rHHUbAPBnptn+zPtuXngP6kGEFloonSTNpT0ZL94KhYLXGpJJCJlkQ3ZTm1iw9SzU5qIgiN49ehVK/QO8SUHBuyBa40G8rMxmk9q4u922Sbeknw9M5/nOj32epzv5ZgcyG8BL643ynyRiOCIuR0S1vT2NiMOt6GjEza3jNh/cmC6XJJrNK78m5Wmx2azuvFbSXp+I1inxSkTcq0Sc/fDfeetr6wtTRZGvtMejjcXl0fra+rn5xam5fC5fGp+4OHZhYuLC2MSe9XrqnYvH7nz39sbG9183br8+dC6JyVbf0e5tzxL9w9b/SSUmd21f2o9kA5QMugAAAPpSfs4/FBFDrU+p1TjUigAAAICDpHmkCQAAABx4SQy6AgAAAGB/bf8dwPazvfv1HGw3v7wVESOd8g+1niGOOBqViDi+mTzyZEKydRo8k5u3IuLuZIfrL2lff09vbNfYM9Ivnrvl/DPZaf5Jd+af6DD/DG1/d8Iz6j7/Pcx/qMv8d7nPHN98/mqla/5bEa8Ndcqf7ORPuuR/t8/8tzc+utNtX/PLiNMdf/8kj+Tq8f0Qo7PzRc8frXt/nbnfq//j3fInvftf7rP/9zd/X+g2l5T5z5zs/f53yl9eEx+360gj4k57XY43duU4ufjDt736n+nS/+Pe/y/67P+nr45c7/NQAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAaEkjYjiSNNuJ0zTLIk5ExP/jeFrU6o2zs7XVpZlyX8RIVNLZ+SIfi4jq1jgpx+Ot+OH4/K7xRET878djW0nnizybrhUzg24eAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAACAHSciYjiSNIuINCL+qKZplg26KgAAAGDPjQy6AAAAAGDfuf8HAACAg+9p7/+TPa4DAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAONAuX7pULs3NBzemy/HMtbXVhdq1czN5fSFbXJ3Opmsry9lcrTZX5Nl0bfFxr1fUasvjF2P1+mgjrzdG62vrVxdrq0uNq/OLU3P51bzyXLoCAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAADgSQ23liTNIiJtxWmaZRH/iYiRqCSz80U+FhH/jYj71cqRcjw+6KIBAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAADYc/W19YWposhXBALBcws+iIgXoIwewaBnJgAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAABqG+tr4wVRT5Sn3QlQAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAADBY6c9JRJTL6eqp4d17Dyd/VlvriHjvsyufXJ9qNFbGy+2/7WxvfNrefn4Q9QMAAMBL4c0nOXj7Pn37Ph4AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAKBf9bX1hamiyFf2MRh0jwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAwNP5OwAA//9JjsXQ") chdir(&(0x7f0000000080)='./file0\x00') open(&(0x7f00000000c0)='./bus\x00', 0x14da42, 0x0) mount(&(0x7f0000000380)=@loop={'/dev/loop', 0x0}, &(0x7f00000003c0)='./bus\x00', 0x0, 0x1000, 0x0) r0 = open(&(0x7f0000000400)='./bus\x00', 0x0, 0x0) ioctl$LOOP_SET_STATUS(r0, 0x4c02, &(0x7f00000001c0)={0x0, {}, 0x0, {}, 0xff, 0x0, 0x0, 0x0, "be8176c9e6755a48a3c0230dd390efe12f8306bed95b2afd402aae879978d959ff9009eec610d9108ea036456bb79e26ee42d0a34968c1fdbb33e8ad5860f632", "b948757aa008fae13adca739a9f126462ab528ea52e90ce2cf50a4ef2568375b"}) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='blkio.throttle.io_service_bytes\x00', 0x275a, 0x4000) 12:21:21 executing program 5: r0 = socket$unix(0x1, 0x2, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f0000000100)={'vcan0\x00', 0x0}) r2 = socket$can_bcm(0x1d, 0x2, 0x2) connect$can_bcm(r2, &(0x7f0000000000), 0x10) ioctl$sock_kcm_SIOCKCMUNATTACH(0xffffffffffffffff, 0x89e1, 0xffffffffffffffff) ioctl$sock_SIOCSPGRP(0xffffffffffffffff, 0x8902, 0x0) sendmsg$can_bcm(r2, &(0x7f0000000480)={&(0x7f0000000340)={0x1d, r1, 0x3f420f00}, 0x10, &(0x7f0000000040)={&(0x7f0000000580)=ANY=[@ANYBLOB="01000000d7fe68ca0000e9ffffff0000", @ANYRES64=0x0, @ANYRES64=0x0, @ANYRES64=0x0, @ANYRES64=r0, @ANYBLOB], 0x20000600}}, 0x0) r3 = socket(0x23, 0x800, 0x40000) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r3, 0x541b, &(0x7f00000000c0)={'ip6_vti0\x00', 0x0}) sendmsg$IPCTNL_MSG_EXP_DELETE(r3, &(0x7f00000004c0)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x40000040}, 0xc, &(0x7f0000000440)={&(0x7f00000006c0)={0x1d0, 0x2, 0x2, 0x201, 0x0, 0x0, {0xa}, [@CTA_EXPECT_NAT={0xc0, 0xa, 0x0, 0x1, [@CTA_EXPECT_NAT_TUPLE={0xc, 0x2, 0x0, 0x1, [@CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x1}]}, @CTA_EXPECT_NAT_TUPLE={0x70, 0x2, 0x0, 0x1, [@CTA_TUPLE_IP={0x2c, 0x1, 0x0, 0x1, @ipv6={{0x14, 0x3, @loopback}, {0x14, 0x4, @private0}}}, @CTA_TUPLE_IP={0x14, 0x1, 0x0, 0x1, @ipv4={{0x8, 0x1, @empty}, {0x8, 0x2, @initdev={0xac, 0x1e, 0x1, 0x0}}}}, @CTA_TUPLE_IP={0x14, 0x1, 0x0, 0x1, @ipv4={{0x8, 0x1, @local}, {0x8, 0x2, @loopback}}}, @CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x4}, @CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x3}, @CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x1}]}, @CTA_EXPECT_NAT_TUPLE={0x38, 0x2, 0x0, 0x1, [@CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5, 0x1, 0x88}}, @CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x3}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5, 0x1, 0x21}}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5, 0x1, 0x1}}, @CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x3}]}, @CTA_EXPECT_NAT_DIR={0x8}]}, @CTA_EXPECT_MASTER={0x20, 0x1, 0x0, 0x1, [@CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x1}, @CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x2}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5, 0x1, 0x84}}]}, @CTA_EXPECT_MASTER={0xdc, 0x1, 0x0, 0x1, [@CTA_TUPLE_IP={0x14, 0x1, 0x0, 0x1, @ipv4={{0x8, 0x1, @multicast1}, {0x8, 0x2, @dev={0xac, 0x14, 0x14, 0x3a}}}}, @CTA_TUPLE_ZONE={0x6}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5, 0x1, 0x21}}, @CTA_TUPLE_IP={0x14, 0x1, 0x0, 0x1, @ipv4={{0x8, 0x1, @empty}, {0x8, 0x2, @local}}}, @CTA_TUPLE_IP={0x2c, 0x1, 0x0, 0x1, @ipv6={{0x14, 0x3, @private1={0xfc, 0x1, '\x00', 0x1}}, {0x14, 0x4, @rand_addr=' \x01\x00'}}}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5, 0x1, 0x1}}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5, 0x1, 0x88}}, @CTA_TUPLE_IP={0x2c, 0x1, 0x0, 0x1, @ipv6={{0x14, 0x3, @empty}, {0x14, 0x4, @dev={0xfe, 0x80, '\x00', 0x21}}}}, @CTA_TUPLE_IP={0x2c, 0x1, 0x0, 0x1, @ipv6={{0x14, 0x3, @local}, {0x14, 0x4, @ipv4={'\x00', '\xff\xff', @rand_addr=0x64010100}}}}]}]}, 0x1d0}}, 0x48000) perf_event_open(&(0x7f0000000500)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x15, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$binfmt_elf32(0xffffffffffffffff, &(0x7f0000000040)=ANY=[], 0x69) connect$can_bcm(0xffffffffffffffff, &(0x7f0000000000), 0x10) sendmsg$can_bcm(0xffffffffffffffff, &(0x7f0000000480)={&(0x7f0000000340)={0x1d, 0x0, 0x3f420f00}, 0x10, &(0x7f0000000040)={&(0x7f0000000580)=ANY=[@ANYBLOB="01000000d7fe68ca0000e9ffffff0000", @ANYRES64=0x0, @ANYRES64=0x0, @ANYRES64=0x0, @ANYRES64], 0x20000600}}, 0x0) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(0xffffffffffffffff, 0x89f0, &(0x7f0000000280)={'gretap0\x00', &(0x7f0000000240)={'ip_vti0\x00', 0x0, 0x7, 0x80, 0xfffffff7, 0x7, {{0x8, 0x4, 0x0, 0x5, 0x20, 0x67, 0x0, 0xc0, 0x29, 0x0, @local, @empty, {[@timestamp={0x44, 0xc, 0x8, 0x0, 0x2, [0x7f, 0x1]}]}}}}}) socket(0x10, 0x3, 0x0) process_mrelease(0xffffffffffffffff, 0x0) r4 = socket$packet(0x11, 0x2, 0x300) ioctl$sock_SIOCGIFINDEX(r4, 0x8933, 0x0) getsockopt$inet_sctp_SCTP_RECVNXTINFO(r3, 0x84, 0x21, &(0x7f0000000140), &(0x7f0000000200)=0x4) bind$unix(r0, &(0x7f00000005c0)=@abs={0x1, 0x0, 0x4e23}, 0x6e) syz_clone(0x40000000, &(0x7f00000000c0), 0x0, 0x0, &(0x7f00000001c0), 0x0) 12:21:21 executing program 2: open(&(0x7f0000000400)='./bus\x00', 0x14103e, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$L2TP_CMD_SESSION_MODIFY(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000080)={0x30, r1, 0x1, 0x400300, 0x0, {}, [@L2TP_ATTR_SEND_SEQ={0x5}, @L2TP_ATTR_IFNAME={0x14, 0x8, 'veth1_to_hsr\x00'}]}, 0x30}}, 0x0) 12:21:21 executing program 3: syz_emit_ethernet(0xea, &(0x7f00000000c0)={@local, @dev, @void, {@ipv4={0x800, @gre={{0x26, 0x4, 0x0, 0x0, 0xdc, 0x0, 0x0, 0x0, 0x2f, 0x0, @broadcast, @rand_addr, {[@end, @ssrr={0x89, 0xb, 0x0, [@private=0xa010101, @local]}, @timestamp_addr={0x44, 0x14, 0x0, 0x1, 0x0, [{@private}, {@initdev={0xac, 0x1e, 0x0, 0x0}}]}, @generic={0x0, 0x6, "7d9d7fa8"}, @timestamp_addr={0x44, 0x24, 0x0, 0x1, 0x0, [{@private}, {@initdev={0xac, 0x1e, 0x0, 0x0}}, {@empty}, {@initdev={0xac, 0x1e, 0x0, 0x0}}]}, @timestamp_prespec={0x44, 0x14, 0x0, 0x3, 0x0, [{@loopback}, {@private}]}, @timestamp_prespec={0x44, 0x24, 0x0, 0x3, 0x0, [{@dev}, {@local}, {@private}, {@multicast2}]}]}}}}}}, 0x0) 12:21:21 executing program 4: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x82, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket(0x10, 0x803, 0x0) sendto(r0, &(0x7f00000000c0)="120000001200e7ef007b00000000000000a1", 0x12, 0x0, 0x0, 0x0) recvmmsg(r0, &(0x7f00000037c0)=[{{&(0x7f00000004c0)=@ethernet={0x0, @random}, 0x80, &(0x7f0000000380)=[{&(0x7f0000000040)=""/95, 0x5f}, {&(0x7f0000000140)=""/85, 0x55}, {&(0x7f0000000fc0)=""/4096, 0x1000}, {&(0x7f0000000400)=""/106, 0x6a}, {&(0x7f0000000740)=""/73, 0x49}, {&(0x7f0000000200)=""/77, 0x4d}, {0x0, 0xc3ffffff}], 0x7, &(0x7f0000000600)=""/191, 0xbf}}], 0x1, 0x0, &(0x7f0000003700)={0x77359400}) 12:21:21 executing program 2: open(&(0x7f0000000400)='./bus\x00', 0x14103e, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$L2TP_CMD_SESSION_MODIFY(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000080)={0x30, r1, 0x1, 0x1000000, 0x0, {}, [@L2TP_ATTR_SEND_SEQ={0x5}, @L2TP_ATTR_IFNAME={0x14, 0x8, 'veth1_to_hsr\x00'}]}, 0x30}}, 0x0) 12:21:21 executing program 3: syz_emit_ethernet(0x32, &(0x7f0000000040)={@local, @dev, @void, {@ipv4={0x800, @dccp={{0x5, 0x4, 0x0, 0x0, 0x24, 0x0, 0x0, 0x0, 0x3c, 0x0, @dev, @remote}, {{0x0, 0x0, 0x4, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, "966aef", 0x0, "bf0cc8"}}}}}}, 0x0) [ 990.236818][ T3409] loop1: detected capacity change from 0 to 2048 12:21:21 executing program 2: open(&(0x7f0000000400)='./bus\x00', 0x14103e, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$L2TP_CMD_SESSION_MODIFY(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000080)={0x30, r1, 0x1, 0x2000000, 0x0, {}, [@L2TP_ATTR_SEND_SEQ={0x5}, @L2TP_ATTR_IFNAME={0x14, 0x8, 'veth1_to_hsr\x00'}]}, 0x30}}, 0x0) [ 990.362426][ T3409] EXT4-fs (loop1): mounted filesystem 00000000-0000-0000-0000-000000000000 without journal. Quota mode: none. [ 990.398515][ T3409] ext4 filesystem being mounted at /root/syzkaller-testdir1539738704/syzkaller.ao1jj3/3758/bus supports timestamps until 2038 (0x7fffffff) [ 990.531985][ T3409] loop1: detected capacity change from 2048 to 2047 [ 990.565581][ T3128] EXT4-fs (loop1): unmounting filesystem 00000000-0000-0000-0000-000000000000. 12:21:22 executing program 0: r0 = socket$unix(0x1, 0x2, 0x0) r1 = socket$can_bcm(0x1d, 0x2, 0x2) connect$can_bcm(r1, &(0x7f0000000000), 0x10) ioctl$sock_kcm_SIOCKCMUNATTACH(0xffffffffffffffff, 0x89e1, 0xffffffffffffffff) getsockopt$inet_sctp_SCTP_PEER_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1a, &(0x7f0000000380)={0x0, 0x60, "f29c5b753353d9c7798811e57823354f32d6cb0899a53381003e4f8dbbb1ea469076c8e175a20b45443f885afb38b83813d5e013d4fad662f1582b23328b4ed70ad9d7d4d0052d0147d8b0ac4910985bec8aa8956c599d291a7da55fec010801"}, &(0x7f00000002c0)=0x68) socket$igmp6(0xa, 0x3, 0x2) perf_event_open(&(0x7f0000000500)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x15, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) close(0xffffffffffffffff) socket$inet_mptcp(0x2, 0x1, 0x106) connect$can_bcm(0xffffffffffffffff, &(0x7f0000000000), 0x10) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, 0x0) bind$unix(r0, &(0x7f00000005c0)=@abs={0x1, 0x0, 0x4e23}, 0x6e) syz_clone(0x40000000, &(0x7f00000000c0), 0x0, 0x0, &(0x7f00000001c0), 0x0) 12:21:22 executing program 3: syz_emit_ethernet(0x3e, &(0x7f0000000040)={@local, @dev, @void, {@ipv4={0x800, @dccp={{0x8, 0x4, 0x0, 0x0, 0x30, 0x0, 0x0, 0x0, 0x21, 0x0, @dev, @remote, {[@cipso={0x86, 0x8, 0xffffffffffffffff, [{0x0, 0x2}, {0x0, 0x2}]}]}}, {{0x0, 0x0, 0x4, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, "966aef", 0x0, "bf0cc8"}}}}}}, 0x0) 12:21:22 executing program 4: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x82, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket(0x10, 0x803, 0x0) sendto(r0, &(0x7f00000000c0)="120000001200e7ef007b00000000000000a1", 0x12, 0x0, 0x0, 0x0) recvmmsg(r0, &(0x7f00000037c0)=[{{&(0x7f00000004c0)=@ethernet={0x0, @random}, 0x80, &(0x7f0000000380)=[{&(0x7f0000000040)=""/95, 0x5f}, {&(0x7f0000000140)=""/85, 0x55}, {&(0x7f0000000fc0)=""/4096, 0x1000}, {&(0x7f0000000400)=""/106, 0x6a}, {&(0x7f0000000740)=""/73, 0x49}, {&(0x7f0000000200)=""/77, 0x4d}, {0x0, 0xffffa888}], 0x7, &(0x7f0000000600)=""/191, 0xbf}}], 0x1, 0x0, &(0x7f0000003700)={0x77359400}) 12:21:22 executing program 2: open(&(0x7f0000000400)='./bus\x00', 0x14103e, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$L2TP_CMD_SESSION_MODIFY(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000080)={0x30, r1, 0x1, 0x3000000, 0x0, {}, [@L2TP_ATTR_SEND_SEQ={0x5}, @L2TP_ATTR_IFNAME={0x14, 0x8, 'veth1_to_hsr\x00'}]}, 0x30}}, 0x0) 12:21:22 executing program 1: syz_mount_image$ext4(&(0x7f0000000740)='ext4\x00', &(0x7f0000000100)='./bus\x00', 0x804810, &(0x7f0000000180)=ANY=[@ANYBLOB="0061021d307a961da7401271e3fa98008000001d3902ccfd562158cb15c016093893c9e4abd02bc4f1492514fa2dfebc8001000080000000008a1049ca0000"], 0x1, 0x73b, &(0x7f0000000780)="$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") chdir(&(0x7f0000000080)='./file0\x00') open(&(0x7f00000000c0)='./bus\x00', 0x14da42, 0x0) mount(&(0x7f0000000380)=@loop={'/dev/loop', 0x0}, &(0x7f00000003c0)='./bus\x00', 0x0, 0x1000, 0x0) r0 = open(&(0x7f0000000400)='./bus\x00', 0x0, 0x0) ioctl$LOOP_SET_STATUS(r0, 0x4c02, &(0x7f00000001c0)={0x0, {}, 0x0, {}, 0xff, 0x0, 0x0, 0x0, "be8176c9e6755a48a3c0230dd390efe12f8306bed95b2afd402aae879978d959ff9009eec610d9108ea036456bb79e26ee42d0a34968c1fdbb33e8ad5860f632", "b948757aa008fae13adca739a9f126462ab528ea52e90ce2cf50a4ef2568375b"}) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='blkio.throttle.io_service_bytes\x00', 0x275a, 0x5000) 12:21:22 executing program 5: r0 = socket$unix(0x1, 0x2, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f0000000100)={'vcan0\x00', 0x0}) r2 = socket$can_bcm(0x1d, 0x2, 0x2) connect$can_bcm(r2, &(0x7f0000000000), 0x10) ioctl$sock_kcm_SIOCKCMUNATTACH(0xffffffffffffffff, 0x89e1, 0xffffffffffffffff) ioctl$sock_SIOCSPGRP(0xffffffffffffffff, 0x8902, 0x0) sendmsg$can_bcm(r2, &(0x7f0000000480)={&(0x7f0000000340)={0x1d, r1, 0x3f420f00}, 0x10, &(0x7f0000000040)={&(0x7f0000000580)=ANY=[@ANYBLOB="01000000d7fe68ca0000e9ffffff0000", @ANYRES64=0x0, @ANYRES64=0x0, @ANYRES64=0x0, @ANYRES64=r0, @ANYBLOB="3bf81b"], 0x20000600}}, 0x0) r3 = socket(0x23, 0x800, 0x40000) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r3, 0x541b, &(0x7f00000000c0)={'ip6_vti0\x00', 0x0}) sendmsg$IPCTNL_MSG_EXP_DELETE(r3, &(0x7f00000004c0)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x40000040}, 0xc, &(0x7f0000000440)={&(0x7f00000006c0)={0x1d0, 0x2, 0x2, 0x201, 0x0, 0x0, {0xa}, [@CTA_EXPECT_NAT={0xc0, 0xa, 0x0, 0x1, [@CTA_EXPECT_NAT_TUPLE={0xc, 0x2, 0x0, 0x1, [@CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x1}]}, @CTA_EXPECT_NAT_TUPLE={0x70, 0x2, 0x0, 0x1, [@CTA_TUPLE_IP={0x2c, 0x1, 0x0, 0x1, @ipv6={{0x14, 0x3, @loopback}, {0x14, 0x4, @private0}}}, @CTA_TUPLE_IP={0x14, 0x1, 0x0, 0x1, @ipv4={{0x8, 0x1, @empty}, {0x8, 0x2, @initdev={0xac, 0x1e, 0x1, 0x0}}}}, @CTA_TUPLE_IP={0x14, 0x1, 0x0, 0x1, @ipv4={{0x8, 0x1, @local}, {0x8, 0x2, @loopback}}}, @CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x4}, @CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x3}, @CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x1}]}, @CTA_EXPECT_NAT_TUPLE={0x38, 0x2, 0x0, 0x1, [@CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5, 0x1, 0x88}}, @CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x3}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5, 0x1, 0x21}}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5, 0x1, 0x1}}, @CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x3}]}, @CTA_EXPECT_NAT_DIR={0x8}]}, @CTA_EXPECT_MASTER={0x20, 0x1, 0x0, 0x1, [@CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x1}, @CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x2}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5, 0x1, 0x84}}]}, @CTA_EXPECT_MASTER={0xdc, 0x1, 0x0, 0x1, [@CTA_TUPLE_IP={0x14, 0x1, 0x0, 0x1, @ipv4={{0x8, 0x1, @multicast1}, {0x8, 0x2, @dev={0xac, 0x14, 0x14, 0x3a}}}}, @CTA_TUPLE_ZONE={0x6}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5, 0x1, 0x21}}, @CTA_TUPLE_IP={0x14, 0x1, 0x0, 0x1, @ipv4={{0x8, 0x1, @empty}, {0x8, 0x2, @local}}}, @CTA_TUPLE_IP={0x2c, 0x1, 0x0, 0x1, @ipv6={{0x14, 0x3, @private1={0xfc, 0x1, '\x00', 0x1}}, {0x14, 0x4, @rand_addr=' \x01\x00'}}}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5, 0x1, 0x1}}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5, 0x1, 0x88}}, @CTA_TUPLE_IP={0x2c, 0x1, 0x0, 0x1, @ipv6={{0x14, 0x3, @empty}, {0x14, 0x4, @dev={0xfe, 0x80, '\x00', 0x21}}}}, @CTA_TUPLE_IP={0x2c, 0x1, 0x0, 0x1, @ipv6={{0x14, 0x3, @local}, {0x14, 0x4, @ipv4={'\x00', '\xff\xff', @rand_addr=0x64010100}}}}]}]}, 0x1d0}}, 0x48000) perf_event_open(&(0x7f0000000500)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x15, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$binfmt_elf32(0xffffffffffffffff, &(0x7f0000000040)=ANY=[], 0x69) connect$can_bcm(0xffffffffffffffff, &(0x7f0000000000), 0x10) sendmsg$can_bcm(0xffffffffffffffff, &(0x7f0000000480)={&(0x7f0000000340)={0x1d, 0x0, 0x3f420f00}, 0x10, &(0x7f0000000040)={&(0x7f0000000580)=ANY=[@ANYBLOB="01000000d7fe68ca0000e9ffffff0000", @ANYRES64=0x0, @ANYRES64=0x0, @ANYRES64=0x0, @ANYRES64], 0x20000600}}, 0x0) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(0xffffffffffffffff, 0x89f0, &(0x7f0000000280)={'gretap0\x00', &(0x7f0000000240)={'ip_vti0\x00', 0x0, 0x7, 0x80, 0xfffffff7, 0x7, {{0x8, 0x4, 0x0, 0x5, 0x20, 0x67, 0x0, 0xc0, 0x29, 0x0, @local, @empty, {[@timestamp={0x44, 0xc, 0x8, 0x0, 0x2, [0x7f, 0x1]}]}}}}}) socket(0x10, 0x3, 0x0) process_mrelease(0xffffffffffffffff, 0x0) r4 = socket$packet(0x11, 0x2, 0x300) ioctl$sock_SIOCGIFINDEX(r4, 0x8933, 0x0) getsockopt$inet_sctp_SCTP_RECVNXTINFO(r3, 0x84, 0x21, &(0x7f0000000140), &(0x7f0000000200)=0x4) bind$unix(r0, &(0x7f00000005c0)=@abs={0x1, 0x0, 0x4e23}, 0x6e) syz_clone(0x40000000, &(0x7f00000000c0), 0x0, 0x0, &(0x7f00000001c0), 0x0) 12:21:22 executing program 2: open(&(0x7f0000000400)='./bus\x00', 0x14103e, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$L2TP_CMD_SESSION_MODIFY(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000080)={0x30, r1, 0x1, 0x4000000, 0x0, {}, [@L2TP_ATTR_SEND_SEQ={0x5}, @L2TP_ATTR_IFNAME={0x14, 0x8, 'veth1_to_hsr\x00'}]}, 0x30}}, 0x0) 12:21:22 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_TCP_QUEUE_SEQ(r0, 0x6, 0xa, &(0x7f0000000bc0), 0x4) 12:21:22 executing program 4: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x82, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket(0x10, 0x803, 0x0) sendto(r0, &(0x7f00000000c0)="120000001200e7ef007b00000000000000a1", 0x12, 0x0, 0x0, 0x0) recvmmsg(r0, &(0x7f00000037c0)=[{{&(0x7f00000004c0)=@ethernet={0x0, @random}, 0x80, &(0x7f0000000380)=[{&(0x7f0000000040)=""/95, 0x5f}, {&(0x7f0000000140)=""/85, 0x55}, {&(0x7f0000000fc0)=""/4096, 0x1000}, {&(0x7f0000000400)=""/106, 0x6a}, {&(0x7f0000000740)=""/73, 0x49}, {&(0x7f0000000200)=""/77, 0x4d}, {0x0, 0xffffffc3}], 0x7, &(0x7f0000000600)=""/191, 0xbf}}], 0x1, 0x0, &(0x7f0000003700)={0x77359400}) 12:21:22 executing program 2: open(&(0x7f0000000400)='./bus\x00', 0x14103e, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$L2TP_CMD_SESSION_MODIFY(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000080)={0x30, r1, 0x1, 0x5000000, 0x0, {}, [@L2TP_ATTR_SEND_SEQ={0x5}, @L2TP_ATTR_IFNAME={0x14, 0x8, 'veth1_to_hsr\x00'}]}, 0x30}}, 0x0) 12:21:22 executing program 4: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x82, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket(0x10, 0x803, 0x0) sendto(r0, &(0x7f00000000c0)="120000001200e7ef007b00000000000000a1", 0x12, 0x0, 0x0, 0x0) recvmmsg(r0, &(0x7f00000037c0)=[{{&(0x7f00000004c0)=@ethernet={0x0, @random}, 0x80, &(0x7f0000000380)=[{&(0x7f0000000040)=""/95, 0x5f}, {&(0x7f0000000140)=""/85, 0x55}, {&(0x7f0000000fc0)=""/4096, 0x1000}, {&(0x7f0000000400)=""/106, 0x6a}, {&(0x7f0000000740)=""/73, 0x49}, {&(0x7f0000000200)=""/77, 0x4d}, {0x0, 0x7ffffffff000}], 0x7, &(0x7f0000000600)=""/191, 0xbf}}], 0x1, 0x0, &(0x7f0000003700)={0x77359400}) [ 990.947592][ T3439] loop1: detected capacity change from 0 to 2048 12:21:22 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000200), 0xffffffffffffffff) sendmsg$NL80211_CMD_SET_COALESCE(r0, &(0x7f0000001640)={0x0, 0x0, &(0x7f0000001600)={&(0x7f0000000480)={0x38, r1, 0x1, 0x0, 0x0, {{}, {@void, @val={0xc}}}, [@NL80211_ATTR_COALESCE_RULE_PKT_PATTERN={0x18, 0xa, 0x0, 0x1, [{0x14, 0x0, 0x0, 0x1, @NL80211_PKTPAT_MASK={0xd, 0x1, "370c11293aba495b28"}}]}]}, 0x38}}, 0x0) [ 991.017296][ T3439] EXT4-fs (loop1): mounted filesystem 00000000-0000-0000-0000-000000000000 without journal. Quota mode: none. [ 991.061532][ T3439] ext4 filesystem being mounted at /root/syzkaller-testdir1539738704/syzkaller.ao1jj3/3759/bus supports timestamps until 2038 (0x7fffffff) [ 991.147613][ T3439] loop1: detected capacity change from 2048 to 2047 [ 991.180685][ T3128] EXT4-fs (loop1): unmounting filesystem 00000000-0000-0000-0000-000000000000. 12:21:23 executing program 0: r0 = socket$unix(0x1, 0x2, 0x0) r1 = socket$can_bcm(0x1d, 0x2, 0x2) connect$can_bcm(r1, &(0x7f0000000000), 0x10) ioctl$sock_kcm_SIOCKCMUNATTACH(0xffffffffffffffff, 0x89e1, 0xffffffffffffffff) getsockopt$inet_sctp_SCTP_PEER_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1a, &(0x7f0000000380)={0x0, 0x70, "f29c5b753353d9c7798811e57823354f32d6cb0899a53381003e4f8dbbb1ea469076c8e175a20b45443f885afb38b83813d5e013d4fad662f1582b23328b4ed70ad9d7d4d0052d0147d8b0ac4910985bec8aa8956c599d291a7da55fec010801d8f02dcff373f52f59f867378c13f4a0"}, &(0x7f00000002c0)=0x78) socket$igmp6(0xa, 0x3, 0x2) perf_event_open(&(0x7f0000000500)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x15, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) close(0xffffffffffffffff) socket$inet_mptcp(0x2, 0x1, 0x106) connect$can_bcm(0xffffffffffffffff, &(0x7f0000000000), 0x10) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, 0x0) bind$unix(r0, &(0x7f00000005c0)=@abs={0x1, 0x0, 0x4e23}, 0x6e) syz_clone(0x40000000, &(0x7f00000000c0), 0x0, 0x0, &(0x7f00000001c0), 0x0) 12:21:23 executing program 2: open(&(0x7f0000000400)='./bus\x00', 0x14103e, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$L2TP_CMD_SESSION_MODIFY(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000080)={0x30, r1, 0x1, 0x6000000, 0x0, {}, [@L2TP_ATTR_SEND_SEQ={0x5}, @L2TP_ATTR_IFNAME={0x14, 0x8, 'veth1_to_hsr\x00'}]}, 0x30}}, 0x0) 12:21:23 executing program 3: r0 = epoll_create(0x1) r1 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) epoll_ctl$EPOLL_CTL_ADD(r0, 0x1, r1, &(0x7f0000000000)={0x4}) 12:21:23 executing program 4: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x82, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket(0x10, 0x803, 0x0) sendto(r0, &(0x7f00000000c0)="120000001200e7ef007b00000000000000a1", 0x12, 0x0, 0x0, 0x0) recvmmsg(r0, &(0x7f00000037c0)=[{{&(0x7f00000004c0)=@ethernet={0x0, @random}, 0x80, &(0x7f0000000380)=[{&(0x7f0000000040)=""/95, 0x5f}, {&(0x7f0000000140)=""/85, 0x55}, {&(0x7f0000000fc0)=""/4096, 0x1000}, {&(0x7f0000000400)=""/106, 0x6a}, {&(0x7f0000000740)=""/73, 0x49}, {&(0x7f0000000200)=""/77, 0x4d}, {0x0, 0x20000000000000}], 0x7, &(0x7f0000000600)=""/191, 0xbf}}], 0x1, 0x0, &(0x7f0000003700)={0x77359400}) 12:21:23 executing program 1: syz_mount_image$ext4(&(0x7f0000000740)='ext4\x00', &(0x7f0000000100)='./bus\x00', 0x804810, &(0x7f0000000180)=ANY=[@ANYBLOB="0061021d307a961da7401271e3fa98008000001d3902ccfd562158cb15c016093893c9e4abd02bc4f1492514fa2dfebc8001000080000000008a1049ca0000"], 0x1, 0x73b, &(0x7f0000000780)="$eJzs3M9rHHUbAPBnptn+zPtuXngP6kGEFloonSTNpT0ZL94KhYLXGpJJCJlkQ3ZTm1iw9SzU5qIgiN49ehVK/QO8SUHBuyBa40G8rMxmk9q4u922Sbeknw9M5/nOj32epzv5ZgcyG8BL643ynyRiOCIuR0S1vT2NiMOt6GjEza3jNh/cmC6XJJrNK78m5Wmx2azuvFbSXp+I1inxSkTcq0Sc/fDfeetr6wtTRZGvtMejjcXl0fra+rn5xam5fC5fGp+4OHZhYuLC2MSe9XrqnYvH7nz39sbG9183br8+dC6JyVbf0e5tzxL9w9b/SSUmd21f2o9kA5QMugAAAPpSfs4/FBFDrU+p1TjUigAAAICDpHmkCQAAABx4SQy6AgAAAGB/bf8dwPazvfv1HGw3v7wVESOd8g+1niGOOBqViDi+mTzyZEKydRo8k5u3IuLuZIfrL2lff09vbNfYM9Ivnrvl/DPZaf5Jd+af6DD/DG1/d8Iz6j7/Pcx/qMv8d7nPHN98/mqla/5bEa8Ndcqf7ORPuuR/t8/8tzc+utNtX/PLiNMdf/8kj+Tq8f0Qo7PzRc8frXt/nbnfq//j3fInvftf7rP/9zd/X+g2l5T5z5zs/f53yl9eEx+360gj4k57XY43duU4ufjDt736n+nS/+Pe/y/67P+nr45c7/NQAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAaEkjYjiSNNuJ0zTLIk5ExP/jeFrU6o2zs7XVpZlyX8RIVNLZ+SIfi4jq1jgpx+Ot+OH4/K7xRET878djW0nnizybrhUzg24eAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAACAHSciYjiSNIuINCL+qKZplg26KgAAAGDPjQy6AAAAAGDfuf8HAACAg+9p7/+TPa4DAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAONAuX7pULs3NBzemy/HMtbXVhdq1czN5fSFbXJ3Opmsry9lcrTZX5Nl0bfFxr1fUasvjF2P1+mgjrzdG62vrVxdrq0uNq/OLU3P51bzyXLoCAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAADgSQ23liTNIiJtxWmaZRH/iYiRqCSz80U+FhH/jYj71cqRcjw+6KIBAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAADYc/W19YWposhXBALBcws+iIgXoIwewaBnJgAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAABqG+tr4wVRT5Sn3QlQAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAADBY6c9JRJTL6eqp4d17Dyd/VlvriHjvsyufXJ9qNFbGy+2/7WxvfNrefn4Q9QMAAMBL4c0nOXj7Pn37Ph4AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAKBf9bX1hamiyFf2MRh0jwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAwNP5OwAA//9JjsXQ") chdir(&(0x7f0000000080)='./file0\x00') open(&(0x7f00000000c0)='./bus\x00', 0x14da42, 0x0) mount(&(0x7f0000000380)=@loop={'/dev/loop', 0x0}, &(0x7f00000003c0)='./bus\x00', 0x0, 0x1000, 0x0) r0 = open(&(0x7f0000000400)='./bus\x00', 0x0, 0x0) ioctl$LOOP_SET_STATUS(r0, 0x4c02, &(0x7f00000001c0)={0x0, {}, 0x0, {}, 0xff, 0x0, 0x0, 0x0, "be8176c9e6755a48a3c0230dd390efe12f8306bed95b2afd402aae879978d959ff9009eec610d9108ea036456bb79e26ee42d0a34968c1fdbb33e8ad5860f632", "b948757aa008fae13adca739a9f126462ab528ea52e90ce2cf50a4ef2568375b"}) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='blkio.throttle.io_service_bytes\x00', 0x275a, 0x600d) [ 991.815612][ T3465] loop1: detected capacity change from 0 to 2048 12:21:23 executing program 5: r0 = socket$unix(0x1, 0x2, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f0000000100)={'vcan0\x00', 0x0}) r2 = socket$can_bcm(0x1d, 0x2, 0x2) connect$can_bcm(r2, &(0x7f0000000000), 0x10) ioctl$sock_kcm_SIOCKCMUNATTACH(0xffffffffffffffff, 0x89e1, 0xffffffffffffffff) ioctl$sock_SIOCSPGRP(0xffffffffffffffff, 0x8902, 0x0) sendmsg$can_bcm(r2, &(0x7f0000000480)={&(0x7f0000000340)={0x1d, r1, 0x3f420f00}, 0x10, &(0x7f0000000040)={&(0x7f0000000580)=ANY=[@ANYBLOB="01000000d7fe68ca0000e9ffffff0000", @ANYRES64=0x0, @ANYRES64=0x0, @ANYRES64=0x0, @ANYRES64=r0, @ANYBLOB="3bf81b"], 0x20000600}}, 0x0) r3 = socket(0x23, 0x800, 0x40000) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r3, 0x541b, &(0x7f00000000c0)={'ip6_vti0\x00', 0x0}) sendmsg$IPCTNL_MSG_EXP_DELETE(r3, &(0x7f00000004c0)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x40000040}, 0xc, &(0x7f0000000440)={&(0x7f00000006c0)={0x1d0, 0x2, 0x2, 0x201, 0x0, 0x0, {0xa}, [@CTA_EXPECT_NAT={0xc0, 0xa, 0x0, 0x1, [@CTA_EXPECT_NAT_TUPLE={0xc, 0x2, 0x0, 0x1, [@CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x1}]}, @CTA_EXPECT_NAT_TUPLE={0x70, 0x2, 0x0, 0x1, [@CTA_TUPLE_IP={0x2c, 0x1, 0x0, 0x1, @ipv6={{0x14, 0x3, @loopback}, {0x14, 0x4, @private0}}}, @CTA_TUPLE_IP={0x14, 0x1, 0x0, 0x1, @ipv4={{0x8, 0x1, @empty}, {0x8, 0x2, @initdev={0xac, 0x1e, 0x1, 0x0}}}}, @CTA_TUPLE_IP={0x14, 0x1, 0x0, 0x1, @ipv4={{0x8, 0x1, @local}, {0x8, 0x2, @loopback}}}, @CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x4}, @CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x3}, @CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x1}]}, @CTA_EXPECT_NAT_TUPLE={0x38, 0x2, 0x0, 0x1, [@CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5, 0x1, 0x88}}, @CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x3}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5, 0x1, 0x21}}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5, 0x1, 0x1}}, @CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x3}]}, @CTA_EXPECT_NAT_DIR={0x8}]}, @CTA_EXPECT_MASTER={0x20, 0x1, 0x0, 0x1, [@CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x1}, @CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x2}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5, 0x1, 0x84}}]}, @CTA_EXPECT_MASTER={0xdc, 0x1, 0x0, 0x1, [@CTA_TUPLE_IP={0x14, 0x1, 0x0, 0x1, @ipv4={{0x8, 0x1, @multicast1}, {0x8, 0x2, @dev={0xac, 0x14, 0x14, 0x3a}}}}, @CTA_TUPLE_ZONE={0x6}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5, 0x1, 0x21}}, @CTA_TUPLE_IP={0x14, 0x1, 0x0, 0x1, @ipv4={{0x8, 0x1, @empty}, {0x8, 0x2, @local}}}, @CTA_TUPLE_IP={0x2c, 0x1, 0x0, 0x1, @ipv6={{0x14, 0x3, @private1={0xfc, 0x1, '\x00', 0x1}}, {0x14, 0x4, @rand_addr=' \x01\x00'}}}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5, 0x1, 0x1}}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5, 0x1, 0x88}}, @CTA_TUPLE_IP={0x2c, 0x1, 0x0, 0x1, @ipv6={{0x14, 0x3, @empty}, {0x14, 0x4, @dev={0xfe, 0x80, '\x00', 0x21}}}}, @CTA_TUPLE_IP={0x2c, 0x1, 0x0, 0x1, @ipv6={{0x14, 0x3, @local}, {0x14, 0x4, @ipv4={'\x00', '\xff\xff', @rand_addr=0x64010100}}}}]}]}, 0x1d0}}, 0x48000) perf_event_open(&(0x7f0000000500)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x15, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$binfmt_elf32(0xffffffffffffffff, &(0x7f0000000040)=ANY=[], 0x69) connect$can_bcm(0xffffffffffffffff, &(0x7f0000000000), 0x10) sendmsg$can_bcm(0xffffffffffffffff, &(0x7f0000000480)={&(0x7f0000000340)={0x1d, 0x0, 0x3f420f00}, 0x10, &(0x7f0000000040)={&(0x7f0000000580)=ANY=[@ANYBLOB="01000000d7fe68ca0000e9ffffff0000", @ANYRES64=0x0, @ANYRES64=0x0, @ANYRES64=0x0, @ANYRES64], 0x20000600}}, 0x0) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(0xffffffffffffffff, 0x89f0, &(0x7f0000000280)={'gretap0\x00', &(0x7f0000000240)={'ip_vti0\x00', 0x0, 0x7, 0x80, 0xfffffff7, 0x7, {{0x8, 0x4, 0x0, 0x5, 0x20, 0x67, 0x0, 0xc0, 0x29, 0x0, @local, @empty, {[@timestamp={0x44, 0xc, 0x8, 0x0, 0x2, [0x7f, 0x1]}]}}}}}) socket(0x10, 0x3, 0x0) process_mrelease(0xffffffffffffffff, 0x0) r4 = socket$packet(0x11, 0x2, 0x300) ioctl$sock_SIOCGIFINDEX(r4, 0x8933, 0x0) getsockopt$inet_sctp_SCTP_RECVNXTINFO(r3, 0x84, 0x21, &(0x7f0000000140), &(0x7f0000000200)=0x4) bind$unix(r0, &(0x7f00000005c0)=@abs={0x1, 0x0, 0x4e23}, 0x6e) syz_clone(0x40000000, &(0x7f00000000c0), 0x0, 0x0, &(0x7f00000001c0), 0x0) 12:21:23 executing program 3: bpf$PROG_LOAD_XDP(0x5, &(0x7f00000017c0)={0x6, 0x2, &(0x7f00000006c0)=@framed, &(0x7f0000000700)='syzkaller\x00', 0x5, 0x1000, &(0x7f0000000740)=""/4096, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 12:21:23 executing program 2: open(&(0x7f0000000400)='./bus\x00', 0x14103e, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$L2TP_CMD_SESSION_MODIFY(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000080)={0x30, r1, 0x1, 0x7000000, 0x0, {}, [@L2TP_ATTR_SEND_SEQ={0x5}, @L2TP_ATTR_IFNAME={0x14, 0x8, 'veth1_to_hsr\x00'}]}, 0x30}}, 0x0) 12:21:23 executing program 4: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x82, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket(0x10, 0x803, 0x0) sendto(r0, &(0x7f00000000c0)="120000001200e7ef007b00000000000000a1", 0x12, 0x0, 0x0, 0x0) recvmmsg(r0, &(0x7f00000037c0)=[{{&(0x7f00000004c0)=@ethernet={0x0, @random}, 0x80, &(0x7f0000000380)=[{&(0x7f0000000040)=""/95, 0x5f}, {&(0x7f0000000140)=""/85, 0x55}, {&(0x7f0000000fc0)=""/4096, 0x1000}, {&(0x7f0000000400)=""/106, 0x6a}, {&(0x7f0000000740)=""/73, 0x49}, {&(0x7f0000000200)=""/77, 0x4d}, {0x0, 0x40030000000000}], 0x7, &(0x7f0000000600)=""/191, 0xbf}}], 0x1, 0x0, &(0x7f0000003700)={0x77359400}) [ 991.868949][ T3465] EXT4-fs (loop1): mounted filesystem 00000000-0000-0000-0000-000000000000 without journal. Quota mode: none. [ 991.892034][ T3465] ext4 filesystem being mounted at /root/syzkaller-testdir1539738704/syzkaller.ao1jj3/3760/bus supports timestamps until 2038 (0x7fffffff) 12:21:23 executing program 3: socket$nl_generic(0x10, 0x3, 0x10) openat$binderfs(0xffffffffffffff9c, &(0x7f0000000340)='./binderfs/binder0\x00', 0x0, 0x0) 12:21:23 executing program 2: open(&(0x7f0000000400)='./bus\x00', 0x14103e, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$L2TP_CMD_SESSION_MODIFY(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000080)={0x30, r1, 0x1, 0x8000000, 0x0, {}, [@L2TP_ATTR_SEND_SEQ={0x5}, @L2TP_ATTR_IFNAME={0x14, 0x8, 'veth1_to_hsr\x00'}]}, 0x30}}, 0x0) 12:21:23 executing program 4: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x82, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket(0x10, 0x803, 0x0) sendto(r0, &(0x7f00000000c0)="120000001200e7ef007b00000000000000a1", 0x12, 0x0, 0x0, 0x0) recvmmsg(r0, &(0x7f00000037c0)=[{{&(0x7f00000004c0)=@ethernet={0x0, @random}, 0x80, &(0x7f0000000380)=[{&(0x7f0000000040)=""/95, 0x5f}, {&(0x7f0000000140)=""/85, 0x55}, {&(0x7f0000000fc0)=""/4096, 0x1000}, {&(0x7f0000000400)=""/106, 0x6a}, {&(0x7f0000000740)=""/73, 0x49}, {&(0x7f0000000200)=""/77, 0x4d}, {0x0, 0xa0010000000000}], 0x7, &(0x7f0000000600)=""/191, 0xbf}}], 0x1, 0x0, &(0x7f0000003700)={0x77359400}) [ 991.962819][ T3465] loop1: detected capacity change from 2048 to 2047 [ 992.032746][ T3128] EXT4-fs (loop1): unmounting filesystem 00000000-0000-0000-0000-000000000000. 12:21:23 executing program 0: r0 = socket$unix(0x1, 0x2, 0x0) r1 = socket$can_bcm(0x1d, 0x2, 0x2) connect$can_bcm(r1, &(0x7f0000000000), 0x10) ioctl$sock_kcm_SIOCKCMUNATTACH(0xffffffffffffffff, 0x89e1, 0xffffffffffffffff) getsockopt$inet_sctp_SCTP_PEER_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1a, &(0x7f0000000380)={0x0, 0x70, "f29c5b753353d9c7798811e57823354f32d6cb0899a53381003e4f8dbbb1ea469076c8e175a20b45443f885afb38b83813d5e013d4fad662f1582b23328b4ed70ad9d7d4d0052d0147d8b0ac4910985bec8aa8956c599d291a7da55fec010801d8f02dcff373f52f59f867378c13f4a0"}, &(0x7f00000002c0)=0x78) socket$igmp6(0xa, 0x3, 0x2) perf_event_open(&(0x7f0000000500)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x15, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) close(0xffffffffffffffff) socket$inet_mptcp(0x2, 0x1, 0x106) connect$can_bcm(0xffffffffffffffff, &(0x7f0000000000), 0x10) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, 0x0) bind$unix(r0, &(0x7f00000005c0)=@abs={0x1, 0x0, 0x4e23}, 0x6e) syz_clone(0x40000000, &(0x7f00000000c0), 0x0, 0x0, &(0x7f00000001c0), 0x0) 12:21:23 executing program 1: syz_mount_image$ext4(&(0x7f0000000740)='ext4\x00', &(0x7f0000000100)='./bus\x00', 0x804810, &(0x7f0000000180)=ANY=[@ANYBLOB="0061021d307a961da7401271e3fa98008000001d3902ccfd562158cb15c016093893c9e4abd02bc4f1492514fa2dfebc8001000080000000008a1049ca0000"], 0x1, 0x73b, &(0x7f0000000780)="$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") chdir(&(0x7f0000000080)='./file0\x00') open(&(0x7f00000000c0)='./bus\x00', 0x14da42, 0x0) mount(&(0x7f0000000380)=@loop={'/dev/loop', 0x0}, &(0x7f00000003c0)='./bus\x00', 0x0, 0x1000, 0x0) r0 = open(&(0x7f0000000400)='./bus\x00', 0x0, 0x0) ioctl$LOOP_SET_STATUS(r0, 0x4c02, &(0x7f00000001c0)={0x0, {}, 0x0, {}, 0xff, 0x0, 0x0, 0x0, "be8176c9e6755a48a3c0230dd390efe12f8306bed95b2afd402aae879978d959ff9009eec610d9108ea036456bb79e26ee42d0a34968c1fdbb33e8ad5860f632", "b948757aa008fae13adca739a9f126462ab528ea52e90ce2cf50a4ef2568375b"}) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='blkio.throttle.io_service_bytes\x00', 0x275a, 0x980d) 12:21:23 executing program 2: open(&(0x7f0000000400)='./bus\x00', 0x14103e, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$L2TP_CMD_SESSION_MODIFY(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000080)={0x30, r1, 0x1, 0x9000000, 0x0, {}, [@L2TP_ATTR_SEND_SEQ={0x5}, @L2TP_ATTR_IFNAME={0x14, 0x8, 'veth1_to_hsr\x00'}]}, 0x30}}, 0x0) 12:21:23 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000200), 0xffffffffffffffff) sendmsg$NL80211_CMD_SET_COALESCE(r0, &(0x7f0000001640)={0x0, 0x0, &(0x7f0000001600)={&(0x7f0000000480)={0x58, r1, 0x1, 0x0, 0x0, {{}, {@void, @val={0xc}}}, [@NL80211_ATTR_COALESCE_RULE_PKT_PATTERN={0x65, 0x3, 0x0, 0x1, [{0x34, 0x0, 0x0, 0x1, @NL80211_PKTPAT_MASK={0x2d, 0x1, "370c11293aba495b2844271bbf90f207179390df03d42b05f4f65eabbc828422a87a9fa554dafe7a14"}}]}]}, 0x58}}, 0x0) 12:21:23 executing program 4: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x82, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket(0x10, 0x803, 0x0) sendto(r0, &(0x7f00000000c0)="120000001200e7ef007b00000000000000a1", 0x12, 0x0, 0x0, 0x0) recvmmsg(r0, &(0x7f00000037c0)=[{{&(0x7f00000004c0)=@ethernet={0x0, @random}, 0x80, &(0x7f0000000380)=[{&(0x7f0000000040)=""/95, 0x5f}, {&(0x7f0000000140)=""/85, 0x55}, {&(0x7f0000000fc0)=""/4096, 0x1000}, {&(0x7f0000000400)=""/106, 0x6a}, {&(0x7f0000000740)=""/73, 0x49}, {&(0x7f0000000200)=""/77, 0x4d}, {0x0, 0xca9a3b00000000}], 0x7, &(0x7f0000000600)=""/191, 0xbf}}], 0x1, 0x0, &(0x7f0000003700)={0x77359400}) [ 992.423116][ T3498] netlink: 56 bytes leftover after parsing attributes in process `syz-executor.3'. [ 992.446751][ T3495] loop1: detected capacity change from 0 to 2048 12:21:24 executing program 5: r0 = socket$unix(0x1, 0x2, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f0000000100)={'vcan0\x00', 0x0}) r2 = socket$can_bcm(0x1d, 0x2, 0x2) connect$can_bcm(r2, &(0x7f0000000000), 0x10) ioctl$sock_kcm_SIOCKCMUNATTACH(0xffffffffffffffff, 0x89e1, 0xffffffffffffffff) ioctl$sock_SIOCSPGRP(0xffffffffffffffff, 0x8902, 0x0) sendmsg$can_bcm(r2, &(0x7f0000000480)={&(0x7f0000000340)={0x1d, r1, 0x3f420f00}, 0x10, &(0x7f0000000040)={&(0x7f0000000580)=ANY=[@ANYBLOB="01000000d7fe68ca0000e9ffffff0000", @ANYRES64=0x0, @ANYRES64=0x0, @ANYRES64=0x0, @ANYRES64=r0, @ANYBLOB="3bf81b"], 0x20000600}}, 0x0) r3 = socket(0x23, 0x800, 0x40000) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r3, 0x541b, &(0x7f00000000c0)={'ip6_vti0\x00', 0x0}) sendmsg$IPCTNL_MSG_EXP_DELETE(r3, &(0x7f00000004c0)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x40000040}, 0xc, &(0x7f0000000440)={&(0x7f00000006c0)={0x1d0, 0x2, 0x2, 0x201, 0x0, 0x0, {0xa}, [@CTA_EXPECT_NAT={0xc0, 0xa, 0x0, 0x1, [@CTA_EXPECT_NAT_TUPLE={0xc, 0x2, 0x0, 0x1, [@CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x1}]}, @CTA_EXPECT_NAT_TUPLE={0x70, 0x2, 0x0, 0x1, [@CTA_TUPLE_IP={0x2c, 0x1, 0x0, 0x1, @ipv6={{0x14, 0x3, @loopback}, {0x14, 0x4, @private0}}}, @CTA_TUPLE_IP={0x14, 0x1, 0x0, 0x1, @ipv4={{0x8, 0x1, @empty}, {0x8, 0x2, @initdev={0xac, 0x1e, 0x1, 0x0}}}}, @CTA_TUPLE_IP={0x14, 0x1, 0x0, 0x1, @ipv4={{0x8, 0x1, @local}, {0x8, 0x2, @loopback}}}, @CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x4}, @CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x3}, @CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x1}]}, @CTA_EXPECT_NAT_TUPLE={0x38, 0x2, 0x0, 0x1, [@CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5, 0x1, 0x88}}, @CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x3}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5, 0x1, 0x21}}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5, 0x1, 0x1}}, @CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x3}]}, @CTA_EXPECT_NAT_DIR={0x8}]}, @CTA_EXPECT_MASTER={0x20, 0x1, 0x0, 0x1, [@CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x1}, @CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x2}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5, 0x1, 0x84}}]}, @CTA_EXPECT_MASTER={0xdc, 0x1, 0x0, 0x1, [@CTA_TUPLE_IP={0x14, 0x1, 0x0, 0x1, @ipv4={{0x8, 0x1, @multicast1}, {0x8, 0x2, @dev={0xac, 0x14, 0x14, 0x3a}}}}, @CTA_TUPLE_ZONE={0x6}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5, 0x1, 0x21}}, @CTA_TUPLE_IP={0x14, 0x1, 0x0, 0x1, @ipv4={{0x8, 0x1, @empty}, {0x8, 0x2, @local}}}, @CTA_TUPLE_IP={0x2c, 0x1, 0x0, 0x1, @ipv6={{0x14, 0x3, @private1={0xfc, 0x1, '\x00', 0x1}}, {0x14, 0x4, @rand_addr=' \x01\x00'}}}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5, 0x1, 0x1}}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5, 0x1, 0x88}}, @CTA_TUPLE_IP={0x2c, 0x1, 0x0, 0x1, @ipv6={{0x14, 0x3, @empty}, {0x14, 0x4, @dev={0xfe, 0x80, '\x00', 0x21}}}}, @CTA_TUPLE_IP={0x2c, 0x1, 0x0, 0x1, @ipv6={{0x14, 0x3, @local}, {0x14, 0x4, @ipv4={'\x00', '\xff\xff', @rand_addr=0x64010100}}}}]}]}, 0x1d0}}, 0x48000) perf_event_open(&(0x7f0000000500)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x15, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$binfmt_elf32(0xffffffffffffffff, &(0x7f0000000040)=ANY=[], 0x69) connect$can_bcm(0xffffffffffffffff, &(0x7f0000000000), 0x10) sendmsg$can_bcm(0xffffffffffffffff, &(0x7f0000000480)={&(0x7f0000000340)={0x1d, 0x0, 0x3f420f00}, 0x10, &(0x7f0000000040)={&(0x7f0000000580)=ANY=[@ANYBLOB="01000000d7fe68ca0000e9ffffff0000", @ANYRES64=0x0, @ANYRES64=0x0, @ANYRES64=0x0, @ANYRES64], 0x20000600}}, 0x0) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(0xffffffffffffffff, 0x89f0, &(0x7f0000000280)={'gretap0\x00', &(0x7f0000000240)={'ip_vti0\x00', 0x0, 0x7, 0x80, 0xfffffff7, 0x7, {{0x8, 0x4, 0x0, 0x5, 0x20, 0x67, 0x0, 0xc0, 0x29, 0x0, @local, @empty, {[@timestamp={0x44, 0xc, 0x8, 0x0, 0x2, [0x7f, 0x1]}]}}}}}) socket(0x10, 0x3, 0x0) process_mrelease(0xffffffffffffffff, 0x0) r4 = socket$packet(0x11, 0x2, 0x300) ioctl$sock_SIOCGIFINDEX(r4, 0x8933, 0x0) getsockopt$inet_sctp_SCTP_RECVNXTINFO(r3, 0x84, 0x21, &(0x7f0000000140), &(0x7f0000000200)=0x4) bind$unix(r0, &(0x7f00000005c0)=@abs={0x1, 0x0, 0x4e23}, 0x6e) syz_clone(0x40000000, &(0x7f00000000c0), 0x0, 0x0, &(0x7f00000001c0), 0x0) 12:21:24 executing program 2: open(&(0x7f0000000400)='./bus\x00', 0x14103e, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$L2TP_CMD_SESSION_MODIFY(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000080)={0x30, r1, 0x1, 0xf000000, 0x0, {}, [@L2TP_ATTR_SEND_SEQ={0x5}, @L2TP_ATTR_IFNAME={0x14, 0x8, 'veth1_to_hsr\x00'}]}, 0x30}}, 0x0) 12:21:24 executing program 3: r0 = seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0xa, &(0x7f0000000380)={0x1, &(0x7f0000000280)=[{0x6}]}) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_ID_VALID(r0, 0x40082102, &(0x7f00000003c0)) 12:21:24 executing program 4: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x82, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket(0x10, 0x803, 0x0) sendto(r0, &(0x7f00000000c0)="120000001200e7ef007b00000000000000a1", 0x12, 0x0, 0x0, 0x0) recvmmsg(r0, &(0x7f00000037c0)=[{{&(0x7f00000004c0)=@ethernet={0x0, @random}, 0x80, &(0x7f0000000380)=[{&(0x7f0000000040)=""/95, 0x5f}, {&(0x7f0000000140)=""/85, 0x55}, {&(0x7f0000000fc0)=""/4096, 0x1000}, {&(0x7f0000000400)=""/106, 0x6a}, {&(0x7f0000000740)=""/73, 0x49}, {&(0x7f0000000200)=""/77, 0x4d}, {0x0, 0xf0ffffff7f0000}], 0x7, &(0x7f0000000600)=""/191, 0xbf}}], 0x1, 0x0, &(0x7f0000003700)={0x77359400}) [ 992.531988][ T3495] EXT4-fs (loop1): mounted filesystem 00000000-0000-0000-0000-000000000000 without journal. Quota mode: none. 12:21:24 executing program 2: open(&(0x7f0000000400)='./bus\x00', 0x14103e, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$L2TP_CMD_SESSION_MODIFY(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000080)={0x30, r1, 0x1, 0x13000000, 0x0, {}, [@L2TP_ATTR_SEND_SEQ={0x5}, @L2TP_ATTR_IFNAME={0x14, 0x8, 'veth1_to_hsr\x00'}]}, 0x30}}, 0x0) 12:21:24 executing program 2: open(&(0x7f0000000400)='./bus\x00', 0x14103e, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$L2TP_CMD_SESSION_MODIFY(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000080)={0x30, r1, 0x1, 0x60000000, 0x0, {}, [@L2TP_ATTR_SEND_SEQ={0x5}, @L2TP_ATTR_IFNAME={0x14, 0x8, 'veth1_to_hsr\x00'}]}, 0x30}}, 0x0) [ 992.566373][ T23] audit: type=1326 audit(1674822084.067:612): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3507 comm="syz-executor.3" exe="/root/syz-executor.3" sig=31 arch=c000003e syscall=202 compat=0 ip=0x7f2547c1f0c9 code=0x0 12:21:24 executing program 2: open(&(0x7f0000000400)='./bus\x00', 0x14103e, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$L2TP_CMD_SESSION_MODIFY(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000080)={0x30, r1, 0x1, 0x9effffff, 0x0, {}, [@L2TP_ATTR_SEND_SEQ={0x5}, @L2TP_ATTR_IFNAME={0x14, 0x8, 'veth1_to_hsr\x00'}]}, 0x30}}, 0x0) [ 992.651012][ T3495] ext4 filesystem being mounted at /root/syzkaller-testdir1539738704/syzkaller.ao1jj3/3761/bus supports timestamps until 2038 (0x7fffffff) [ 992.801834][ T3495] loop1: detected capacity change from 2048 to 2047 [ 992.832188][ T3128] EXT4-fs (loop1): unmounting filesystem 00000000-0000-0000-0000-000000000000. 12:21:24 executing program 0: r0 = socket$unix(0x1, 0x2, 0x0) r1 = socket$can_bcm(0x1d, 0x2, 0x2) connect$can_bcm(r1, &(0x7f0000000000), 0x10) ioctl$sock_kcm_SIOCKCMUNATTACH(0xffffffffffffffff, 0x89e1, 0xffffffffffffffff) getsockopt$inet_sctp_SCTP_PEER_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1a, &(0x7f0000000380)={0x0, 0x70, "f29c5b753353d9c7798811e57823354f32d6cb0899a53381003e4f8dbbb1ea469076c8e175a20b45443f885afb38b83813d5e013d4fad662f1582b23328b4ed70ad9d7d4d0052d0147d8b0ac4910985bec8aa8956c599d291a7da55fec010801d8f02dcff373f52f59f867378c13f4a0"}, &(0x7f00000002c0)=0x78) socket$igmp6(0xa, 0x3, 0x2) perf_event_open(&(0x7f0000000500)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x15, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) close(0xffffffffffffffff) socket$inet_mptcp(0x2, 0x1, 0x106) connect$can_bcm(0xffffffffffffffff, &(0x7f0000000000), 0x10) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, 0x0) bind$unix(r0, &(0x7f00000005c0)=@abs={0x1, 0x0, 0x4e23}, 0x6e) syz_clone(0x40000000, &(0x7f00000000c0), 0x0, 0x0, &(0x7f00000001c0), 0x0) 12:21:24 executing program 2: open(&(0x7f0000000400)='./bus\x00', 0x14103e, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$L2TP_CMD_SESSION_MODIFY(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000080)={0x30, r1, 0x1, 0xd1250000, 0x0, {}, [@L2TP_ATTR_SEND_SEQ={0x5}, @L2TP_ATTR_IFNAME={0x14, 0x8, 'veth1_to_hsr\x00'}]}, 0x30}}, 0x0) 12:21:24 executing program 4: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x82, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket(0x10, 0x803, 0x0) sendto(r0, &(0x7f00000000c0)="120000001200e7ef007b00000000000000a1", 0x12, 0x0, 0x0, 0x0) recvmmsg(r0, &(0x7f00000037c0)=[{{&(0x7f00000004c0)=@ethernet={0x0, @random}, 0x80, &(0x7f0000000380)=[{&(0x7f0000000040)=""/95, 0x5f}, {&(0x7f0000000140)=""/85, 0x55}, {&(0x7f0000000fc0)=""/4096, 0x1000}, {&(0x7f0000000400)=""/106, 0x6a}, {&(0x7f0000000740)=""/73, 0x49}, {&(0x7f0000000200)=""/77, 0x4d}, {0x0, 0x100000000000000}], 0x7, &(0x7f0000000600)=""/191, 0xbf}}], 0x1, 0x0, &(0x7f0000003700)={0x77359400}) 12:21:24 executing program 1: syz_mount_image$ext4(&(0x7f0000000740)='ext4\x00', &(0x7f0000000100)='./bus\x00', 0x804810, &(0x7f0000000180)=ANY=[@ANYBLOB="0061021d307a961da7401271e3fa98008000001d3902ccfd562158cb15c016093893c9e4abd02bc4f1492514fa2dfebc8001000080000000008a1049ca0000"], 0x1, 0x73b, &(0x7f0000000780)="$eJzs3M9rHHUbAPBnptn+zPtuXngP6kGEFloonSTNpT0ZL94KhYLXGpJJCJlkQ3ZTm1iw9SzU5qIgiN49ehVK/QO8SUHBuyBa40G8rMxmk9q4u922Sbeknw9M5/nOj32epzv5ZgcyG8BL643ynyRiOCIuR0S1vT2NiMOt6GjEza3jNh/cmC6XJJrNK78m5Wmx2azuvFbSXp+I1inxSkTcq0Sc/fDfeetr6wtTRZGvtMejjcXl0fra+rn5xam5fC5fGp+4OHZhYuLC2MSe9XrqnYvH7nz39sbG9183br8+dC6JyVbf0e5tzxL9w9b/SSUmd21f2o9kA5QMugAAAPpSfs4/FBFDrU+p1TjUigAAAICDpHmkCQAAABx4SQy6AgAAAGB/bf8dwPazvfv1HGw3v7wVESOd8g+1niGOOBqViDi+mTzyZEKydRo8k5u3IuLuZIfrL2lff09vbNfYM9Ivnrvl/DPZaf5Jd+af6DD/DG1/d8Iz6j7/Pcx/qMv8d7nPHN98/mqla/5bEa8Ndcqf7ORPuuR/t8/8tzc+utNtX/PLiNMdf/8kj+Tq8f0Qo7PzRc8frXt/nbnfq//j3fInvftf7rP/9zd/X+g2l5T5z5zs/f53yl9eEx+360gj4k57XY43duU4ufjDt736n+nS/+Pe/y/67P+nr45c7/NQAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAaEkjYjiSNNuJ0zTLIk5ExP/jeFrU6o2zs7XVpZlyX8RIVNLZ+SIfi4jq1jgpx+Ot+OH4/K7xRET878djW0nnizybrhUzg24eAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAACAHSciYjiSNIuINCL+qKZplg26KgAAAGDPjQy6AAAAAGDfuf8HAACAg+9p7/+TPa4DAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAONAuX7pULs3NBzemy/HMtbXVhdq1czN5fSFbXJ3Opmsry9lcrTZX5Nl0bfFxr1fUasvjF2P1+mgjrzdG62vrVxdrq0uNq/OLU3P51bzyXLoCAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAADgSQ23liTNIiJtxWmaZRH/iYiRqCSz80U+FhH/jYj71cqRcjw+6KIBAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAADYc/W19YWposhXBALBcws+iIgXoIwewaBnJgAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAABqG+tr4wVRT5Sn3QlQAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAADBY6c9JRJTL6eqp4d17Dyd/VlvriHjvsyufXJ9qNFbGy+2/7WxvfNrefn4Q9QMAAMBL4c0nOXj7Pn37Ph4AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAKBf9bX1hamiyFf2MRh0jwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAwNP5OwAA//9JjsXQ") chdir(&(0x7f0000000080)='./file0\x00') open(&(0x7f00000000c0)='./bus\x00', 0x14da42, 0x0) mount(&(0x7f0000000380)=@loop={'/dev/loop', 0x0}, &(0x7f00000003c0)='./bus\x00', 0x0, 0x1000, 0x0) r0 = open(&(0x7f0000000400)='./bus\x00', 0x0, 0x0) ioctl$LOOP_SET_STATUS(r0, 0x4c02, &(0x7f00000001c0)={0x0, {}, 0x0, {}, 0xff, 0x0, 0x0, 0x0, "be8176c9e6755a48a3c0230dd390efe12f8306bed95b2afd402aae879978d959ff9009eec610d9108ea036456bb79e26ee42d0a34968c1fdbb33e8ad5860f632", "b948757aa008fae13adca739a9f126462ab528ea52e90ce2cf50a4ef2568375b"}) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='blkio.throttle.io_service_bytes\x00', 0x275a, 0xba00) 12:21:24 executing program 2: open(&(0x7f0000000400)='./bus\x00', 0x14103e, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$L2TP_CMD_SESSION_MODIFY(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000080)={0x30, r1, 0x1, 0xefffffff, 0x0, {}, [@L2TP_ATTR_SEND_SEQ={0x5}, @L2TP_ATTR_IFNAME={0x14, 0x8, 'veth1_to_hsr\x00'}]}, 0x30}}, 0x0) [ 993.218280][ T3529] loop1: detected capacity change from 0 to 2048 12:21:24 executing program 5: r0 = socket$unix(0x1, 0x2, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f0000000100)={'vcan0\x00', 0x0}) r2 = socket$can_bcm(0x1d, 0x2, 0x2) connect$can_bcm(r2, &(0x7f0000000000), 0x10) ioctl$sock_kcm_SIOCKCMUNATTACH(0xffffffffffffffff, 0x89e1, 0xffffffffffffffff) ioctl$sock_SIOCSPGRP(0xffffffffffffffff, 0x8902, 0x0) sendmsg$can_bcm(r2, &(0x7f0000000480)={&(0x7f0000000340)={0x1d, r1, 0x3f420f00}, 0x10, &(0x7f0000000040)={&(0x7f0000000580)=ANY=[@ANYBLOB="01000000d7fe68ca0000e9ffffff0000", @ANYRES64=0x0, @ANYRES64=0x0, @ANYRES64=0x0, @ANYRES64=r0, @ANYBLOB="3bf81bb9"], 0x20000600}}, 0x0) r3 = socket(0x23, 0x800, 0x40000) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r3, 0x541b, &(0x7f00000000c0)={'ip6_vti0\x00', 0x0}) sendmsg$IPCTNL_MSG_EXP_DELETE(r3, &(0x7f00000004c0)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x40000040}, 0xc, &(0x7f0000000440)={&(0x7f00000006c0)={0x1d0, 0x2, 0x2, 0x201, 0x0, 0x0, {0xa}, [@CTA_EXPECT_NAT={0xc0, 0xa, 0x0, 0x1, [@CTA_EXPECT_NAT_TUPLE={0xc, 0x2, 0x0, 0x1, [@CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x1}]}, @CTA_EXPECT_NAT_TUPLE={0x70, 0x2, 0x0, 0x1, [@CTA_TUPLE_IP={0x2c, 0x1, 0x0, 0x1, @ipv6={{0x14, 0x3, @loopback}, {0x14, 0x4, @private0}}}, @CTA_TUPLE_IP={0x14, 0x1, 0x0, 0x1, @ipv4={{0x8, 0x1, @empty}, {0x8, 0x2, @initdev={0xac, 0x1e, 0x1, 0x0}}}}, @CTA_TUPLE_IP={0x14, 0x1, 0x0, 0x1, @ipv4={{0x8, 0x1, @local}, {0x8, 0x2, @loopback}}}, @CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x4}, @CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x3}, @CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x1}]}, @CTA_EXPECT_NAT_TUPLE={0x38, 0x2, 0x0, 0x1, [@CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5, 0x1, 0x88}}, @CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x3}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5, 0x1, 0x21}}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5, 0x1, 0x1}}, @CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x3}]}, @CTA_EXPECT_NAT_DIR={0x8}]}, @CTA_EXPECT_MASTER={0x20, 0x1, 0x0, 0x1, [@CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x1}, @CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x2}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5, 0x1, 0x84}}]}, @CTA_EXPECT_MASTER={0xdc, 0x1, 0x0, 0x1, [@CTA_TUPLE_IP={0x14, 0x1, 0x0, 0x1, @ipv4={{0x8, 0x1, @multicast1}, {0x8, 0x2, @dev={0xac, 0x14, 0x14, 0x3a}}}}, @CTA_TUPLE_ZONE={0x6}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5, 0x1, 0x21}}, @CTA_TUPLE_IP={0x14, 0x1, 0x0, 0x1, @ipv4={{0x8, 0x1, @empty}, {0x8, 0x2, @local}}}, @CTA_TUPLE_IP={0x2c, 0x1, 0x0, 0x1, @ipv6={{0x14, 0x3, @private1={0xfc, 0x1, '\x00', 0x1}}, {0x14, 0x4, @rand_addr=' \x01\x00'}}}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5, 0x1, 0x1}}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5, 0x1, 0x88}}, @CTA_TUPLE_IP={0x2c, 0x1, 0x0, 0x1, @ipv6={{0x14, 0x3, @empty}, {0x14, 0x4, @dev={0xfe, 0x80, '\x00', 0x21}}}}, @CTA_TUPLE_IP={0x2c, 0x1, 0x0, 0x1, @ipv6={{0x14, 0x3, @local}, {0x14, 0x4, @ipv4={'\x00', '\xff\xff', @rand_addr=0x64010100}}}}]}]}, 0x1d0}}, 0x48000) perf_event_open(&(0x7f0000000500)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x15, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$binfmt_elf32(0xffffffffffffffff, &(0x7f0000000040)=ANY=[], 0x69) connect$can_bcm(0xffffffffffffffff, &(0x7f0000000000), 0x10) sendmsg$can_bcm(0xffffffffffffffff, &(0x7f0000000480)={&(0x7f0000000340)={0x1d, 0x0, 0x3f420f00}, 0x10, &(0x7f0000000040)={&(0x7f0000000580)=ANY=[@ANYBLOB="01000000d7fe68ca0000e9ffffff0000", @ANYRES64=0x0, @ANYRES64=0x0, @ANYRES64=0x0, @ANYRES64], 0x20000600}}, 0x0) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(0xffffffffffffffff, 0x89f0, &(0x7f0000000280)={'gretap0\x00', &(0x7f0000000240)={'ip_vti0\x00', 0x0, 0x7, 0x80, 0xfffffff7, 0x7, {{0x8, 0x4, 0x0, 0x5, 0x20, 0x67, 0x0, 0xc0, 0x29, 0x0, @local, @empty, {[@timestamp={0x44, 0xc, 0x8, 0x0, 0x2, [0x7f, 0x1]}]}}}}}) socket(0x10, 0x3, 0x0) process_mrelease(0xffffffffffffffff, 0x0) r4 = socket$packet(0x11, 0x2, 0x300) ioctl$sock_SIOCGIFINDEX(r4, 0x8933, 0x0) getsockopt$inet_sctp_SCTP_RECVNXTINFO(r3, 0x84, 0x21, &(0x7f0000000140), &(0x7f0000000200)=0x4) bind$unix(r0, &(0x7f00000005c0)=@abs={0x1, 0x0, 0x4e23}, 0x6e) syz_clone(0x40000000, &(0x7f00000000c0), 0x0, 0x0, &(0x7f00000001c0), 0x0) 12:21:24 executing program 2: open(&(0x7f0000000400)='./bus\x00', 0x14103e, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$L2TP_CMD_SESSION_MODIFY(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000080)={0x30, r1, 0x1, 0xf0ffffff, 0x0, {}, [@L2TP_ATTR_SEND_SEQ={0x5}, @L2TP_ATTR_IFNAME={0x14, 0x8, 'veth1_to_hsr\x00'}]}, 0x30}}, 0x0) [ 993.264796][ T3529] EXT4-fs (loop1): mounted filesystem 00000000-0000-0000-0000-000000000000 without journal. Quota mode: none. [ 993.321171][ T3529] ext4 filesystem being mounted at /root/syzkaller-testdir1539738704/syzkaller.ao1jj3/3762/bus supports timestamps until 2038 (0x7fffffff) 12:21:24 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmmsg$inet(r0, &(0x7f00000007c0)=[{{0x0, 0x0, &(0x7f0000000c40)=[{0x0}, {&(0x7f0000000480)=':', 0x1}, {0x0}, {&(0x7f0000000580)="14", 0x1}], 0x4}}], 0x1, 0x0) 12:21:24 executing program 4: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x82, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket(0x10, 0x803, 0x0) sendto(r0, &(0x7f00000000c0)="120000001200e7ef007b00000000000000a1", 0x12, 0x0, 0x0, 0x0) recvmmsg(r0, &(0x7f00000037c0)=[{{&(0x7f00000004c0)=@ethernet={0x0, @random}, 0x80, &(0x7f0000000380)=[{&(0x7f0000000040)=""/95, 0x5f}, {&(0x7f0000000140)=""/85, 0x55}, {&(0x7f0000000fc0)=""/4096, 0x1000}, {&(0x7f0000000400)=""/106, 0x6a}, {&(0x7f0000000740)=""/73, 0x49}, {&(0x7f0000000200)=""/77, 0x4d}, {0x0, 0x200000000000000}], 0x7, &(0x7f0000000600)=""/191, 0xbf}}], 0x1, 0x0, &(0x7f0000003700)={0x77359400}) 12:21:24 executing program 2: open(&(0x7f0000000400)='./bus\x00', 0x14103e, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$L2TP_CMD_SESSION_MODIFY(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000080)={0x30, r1, 0x1, 0xffffff7f, 0x0, {}, [@L2TP_ATTR_SEND_SEQ={0x5}, @L2TP_ATTR_IFNAME={0x14, 0x8, 'veth1_to_hsr\x00'}]}, 0x30}}, 0x0) 12:21:24 executing program 2: open(&(0x7f0000000400)='./bus\x00', 0x14103e, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$L2TP_CMD_SESSION_MODIFY(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000080)={0x30, r1, 0x1, 0xffffff9e, 0x0, {}, [@L2TP_ATTR_SEND_SEQ={0x5}, @L2TP_ATTR_IFNAME={0x14, 0x8, 'veth1_to_hsr\x00'}]}, 0x30}}, 0x0) 12:21:24 executing program 4: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x82, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket(0x10, 0x803, 0x0) sendto(r0, &(0x7f00000000c0)="120000001200e7ef007b00000000000000a1", 0x12, 0x0, 0x0, 0x0) recvmmsg(r0, &(0x7f00000037c0)=[{{&(0x7f00000004c0)=@ethernet={0x0, @random}, 0x80, &(0x7f0000000380)=[{&(0x7f0000000040)=""/95, 0x5f}, {&(0x7f0000000140)=""/85, 0x55}, {&(0x7f0000000fc0)=""/4096, 0x1000}, {&(0x7f0000000400)=""/106, 0x6a}, {&(0x7f0000000740)=""/73, 0x49}, {&(0x7f0000000200)=""/77, 0x4d}, {0x0, 0x300000000000000}], 0x7, &(0x7f0000000600)=""/191, 0xbf}}], 0x1, 0x0, &(0x7f0000003700)={0x77359400}) [ 993.441925][ T3529] loop1: detected capacity change from 2048 to 2047 [ 993.489204][ T3128] EXT4-fs (loop1): unmounting filesystem 00000000-0000-0000-0000-000000000000. 12:21:25 executing program 0: r0 = socket$unix(0x1, 0x2, 0x0) r1 = socket$can_bcm(0x1d, 0x2, 0x2) connect$can_bcm(r1, &(0x7f0000000000), 0x10) ioctl$sock_kcm_SIOCKCMUNATTACH(0xffffffffffffffff, 0x89e1, 0xffffffffffffffff) getsockopt$inet_sctp_SCTP_PEER_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1a, &(0x7f0000000380)={0x0, 0x78, "f29c5b753353d9c7798811e57823354f32d6cb0899a53381003e4f8dbbb1ea469076c8e175a20b45443f885afb38b83813d5e013d4fad662f1582b23328b4ed70ad9d7d4d0052d0147d8b0ac4910985bec8aa8956c599d291a7da55fec010801d8f02dcff373f52f59f867378c13f4a080938c965846a7e8"}, &(0x7f00000002c0)=0x80) socket$igmp6(0xa, 0x3, 0x2) perf_event_open(&(0x7f0000000500)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x15, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) close(0xffffffffffffffff) socket$inet_mptcp(0x2, 0x1, 0x106) connect$can_bcm(0xffffffffffffffff, &(0x7f0000000000), 0x10) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, 0x0) bind$unix(r0, &(0x7f00000005c0)=@abs={0x1, 0x0, 0x4e23}, 0x6e) syz_clone(0x40000000, &(0x7f00000000c0), 0x0, 0x0, &(0x7f00000001c0), 0x0) 12:21:25 executing program 3: bpf$BPF_PROG_WITH_BTFID_LOAD(0x9, &(0x7f0000000940)=@bpf_ext={0x1c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 12:21:25 executing program 1: syz_mount_image$ext4(&(0x7f0000000740)='ext4\x00', &(0x7f0000000100)='./bus\x00', 0x804810, &(0x7f0000000180)=ANY=[@ANYBLOB="0061021d307a961da7401271e3fa98008000001d3902ccfd562158cb15c016093893c9e4abd02bc4f1492514fa2dfebc8001000080000000008a1049ca0000"], 0x1, 0x73b, &(0x7f0000000780)="$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") chdir(&(0x7f0000000080)='./file0\x00') open(&(0x7f00000000c0)='./bus\x00', 0x14da42, 0x0) mount(&(0x7f0000000380)=@loop={'/dev/loop', 0x0}, &(0x7f00000003c0)='./bus\x00', 0x0, 0x1000, 0x0) r0 = open(&(0x7f0000000400)='./bus\x00', 0x0, 0x0) ioctl$LOOP_SET_STATUS(r0, 0x4c02, &(0x7f00000001c0)={0x0, {}, 0x0, {}, 0xff, 0x0, 0x0, 0x0, "be8176c9e6755a48a3c0230dd390efe12f8306bed95b2afd402aae879978d959ff9009eec610d9108ea036456bb79e26ee42d0a34968c1fdbb33e8ad5860f632", "b948757aa008fae13adca739a9f126462ab528ea52e90ce2cf50a4ef2568375b"}) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='blkio.throttle.io_service_bytes\x00', 0x275a, 0xda0d) 12:21:25 executing program 2: open(&(0x7f0000000400)='./bus\x00', 0x14103e, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$L2TP_CMD_SESSION_MODIFY(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000080)={0x30, r1, 0x1, 0xffffffef, 0x0, {}, [@L2TP_ATTR_SEND_SEQ={0x5}, @L2TP_ATTR_IFNAME={0x14, 0x8, 'veth1_to_hsr\x00'}]}, 0x30}}, 0x0) 12:21:25 executing program 4: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x82, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket(0x10, 0x803, 0x0) sendto(r0, &(0x7f00000000c0)="120000001200e7ef007b00000000000000a1", 0x12, 0x0, 0x0, 0x0) recvmmsg(r0, &(0x7f00000037c0)=[{{&(0x7f00000004c0)=@ethernet={0x0, @random}, 0x80, &(0x7f0000000380)=[{&(0x7f0000000040)=""/95, 0x5f}, {&(0x7f0000000140)=""/85, 0x55}, {&(0x7f0000000fc0)=""/4096, 0x1000}, {&(0x7f0000000400)=""/106, 0x6a}, {&(0x7f0000000740)=""/73, 0x49}, {&(0x7f0000000200)=""/77, 0x4d}, {0x0, 0x400000000000000}], 0x7, &(0x7f0000000600)=""/191, 0xbf}}], 0x1, 0x0, &(0x7f0000003700)={0x77359400}) 12:21:25 executing program 5: r0 = socket$unix(0x1, 0x2, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f0000000100)={'vcan0\x00', 0x0}) r2 = socket$can_bcm(0x1d, 0x2, 0x2) connect$can_bcm(r2, &(0x7f0000000000), 0x10) ioctl$sock_kcm_SIOCKCMUNATTACH(0xffffffffffffffff, 0x89e1, 0xffffffffffffffff) ioctl$sock_SIOCSPGRP(0xffffffffffffffff, 0x8902, 0x0) sendmsg$can_bcm(r2, &(0x7f0000000480)={&(0x7f0000000340)={0x1d, r1, 0x3f420f00}, 0x10, &(0x7f0000000040)={&(0x7f0000000580)=ANY=[@ANYBLOB="01000000d7fe68ca0000e9ffffff0000", @ANYRES64=0x0, @ANYRES64=0x0, @ANYRES64=0x0, @ANYRES64=r0, @ANYBLOB="3bf81bb9"], 0x20000600}}, 0x0) r3 = socket(0x23, 0x800, 0x40000) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r3, 0x541b, &(0x7f00000000c0)={'ip6_vti0\x00', 0x0}) sendmsg$IPCTNL_MSG_EXP_DELETE(r3, &(0x7f00000004c0)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x40000040}, 0xc, &(0x7f0000000440)={&(0x7f00000006c0)={0x1d0, 0x2, 0x2, 0x201, 0x0, 0x0, {0xa}, [@CTA_EXPECT_NAT={0xc0, 0xa, 0x0, 0x1, [@CTA_EXPECT_NAT_TUPLE={0xc, 0x2, 0x0, 0x1, [@CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x1}]}, @CTA_EXPECT_NAT_TUPLE={0x70, 0x2, 0x0, 0x1, [@CTA_TUPLE_IP={0x2c, 0x1, 0x0, 0x1, @ipv6={{0x14, 0x3, @loopback}, {0x14, 0x4, @private0}}}, @CTA_TUPLE_IP={0x14, 0x1, 0x0, 0x1, @ipv4={{0x8, 0x1, @empty}, {0x8, 0x2, @initdev={0xac, 0x1e, 0x1, 0x0}}}}, @CTA_TUPLE_IP={0x14, 0x1, 0x0, 0x1, @ipv4={{0x8, 0x1, @local}, {0x8, 0x2, @loopback}}}, @CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x4}, @CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x3}, @CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x1}]}, @CTA_EXPECT_NAT_TUPLE={0x38, 0x2, 0x0, 0x1, [@CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5, 0x1, 0x88}}, @CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x3}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5, 0x1, 0x21}}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5, 0x1, 0x1}}, @CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x3}]}, @CTA_EXPECT_NAT_DIR={0x8}]}, @CTA_EXPECT_MASTER={0x20, 0x1, 0x0, 0x1, [@CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x1}, @CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x2}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5, 0x1, 0x84}}]}, @CTA_EXPECT_MASTER={0xdc, 0x1, 0x0, 0x1, [@CTA_TUPLE_IP={0x14, 0x1, 0x0, 0x1, @ipv4={{0x8, 0x1, @multicast1}, {0x8, 0x2, @dev={0xac, 0x14, 0x14, 0x3a}}}}, @CTA_TUPLE_ZONE={0x6}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5, 0x1, 0x21}}, @CTA_TUPLE_IP={0x14, 0x1, 0x0, 0x1, @ipv4={{0x8, 0x1, @empty}, {0x8, 0x2, @local}}}, @CTA_TUPLE_IP={0x2c, 0x1, 0x0, 0x1, @ipv6={{0x14, 0x3, @private1={0xfc, 0x1, '\x00', 0x1}}, {0x14, 0x4, @rand_addr=' \x01\x00'}}}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5, 0x1, 0x1}}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5, 0x1, 0x88}}, @CTA_TUPLE_IP={0x2c, 0x1, 0x0, 0x1, @ipv6={{0x14, 0x3, @empty}, {0x14, 0x4, @dev={0xfe, 0x80, '\x00', 0x21}}}}, @CTA_TUPLE_IP={0x2c, 0x1, 0x0, 0x1, @ipv6={{0x14, 0x3, @local}, {0x14, 0x4, @ipv4={'\x00', '\xff\xff', @rand_addr=0x64010100}}}}]}]}, 0x1d0}}, 0x48000) perf_event_open(&(0x7f0000000500)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x15, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$binfmt_elf32(0xffffffffffffffff, &(0x7f0000000040)=ANY=[], 0x69) connect$can_bcm(0xffffffffffffffff, &(0x7f0000000000), 0x10) sendmsg$can_bcm(0xffffffffffffffff, &(0x7f0000000480)={&(0x7f0000000340)={0x1d, 0x0, 0x3f420f00}, 0x10, &(0x7f0000000040)={&(0x7f0000000580)=ANY=[@ANYBLOB="01000000d7fe68ca0000e9ffffff0000", @ANYRES64=0x0, @ANYRES64=0x0, @ANYRES64=0x0, @ANYRES64], 0x20000600}}, 0x0) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(0xffffffffffffffff, 0x89f0, &(0x7f0000000280)={'gretap0\x00', &(0x7f0000000240)={'ip_vti0\x00', 0x0, 0x7, 0x80, 0xfffffff7, 0x7, {{0x8, 0x4, 0x0, 0x5, 0x20, 0x67, 0x0, 0xc0, 0x29, 0x0, @local, @empty, {[@timestamp={0x44, 0xc, 0x8, 0x0, 0x2, [0x7f, 0x1]}]}}}}}) socket(0x10, 0x3, 0x0) process_mrelease(0xffffffffffffffff, 0x0) r4 = socket$packet(0x11, 0x2, 0x300) ioctl$sock_SIOCGIFINDEX(r4, 0x8933, 0x0) getsockopt$inet_sctp_SCTP_RECVNXTINFO(r3, 0x84, 0x21, &(0x7f0000000140), &(0x7f0000000200)=0x4) bind$unix(r0, &(0x7f00000005c0)=@abs={0x1, 0x0, 0x4e23}, 0x6e) syz_clone(0x40000000, &(0x7f00000000c0), 0x0, 0x0, &(0x7f00000001c0), 0x0) 12:21:25 executing program 3: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000240)='yeah\x00', 0x5) accept4(r0, 0x0, 0x0, 0x0) 12:21:25 executing program 2: open(&(0x7f0000000400)='./bus\x00', 0x14103e, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$L2TP_CMD_SESSION_MODIFY(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000080)={0x30, r1, 0x1, 0xfffffff0, 0x0, {}, [@L2TP_ATTR_SEND_SEQ={0x5}, @L2TP_ATTR_IFNAME={0x14, 0x8, 'veth1_to_hsr\x00'}]}, 0x30}}, 0x0) 12:21:25 executing program 4: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x82, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket(0x10, 0x803, 0x0) sendto(r0, &(0x7f00000000c0)="120000001200e7ef007b00000000000000a1", 0x12, 0x0, 0x0, 0x0) recvmmsg(r0, &(0x7f00000037c0)=[{{&(0x7f00000004c0)=@ethernet={0x0, @random}, 0x80, &(0x7f0000000380)=[{&(0x7f0000000040)=""/95, 0x5f}, {&(0x7f0000000140)=""/85, 0x55}, {&(0x7f0000000fc0)=""/4096, 0x1000}, {&(0x7f0000000400)=""/106, 0x6a}, {&(0x7f0000000740)=""/73, 0x49}, {&(0x7f0000000200)=""/77, 0x4d}, {0x0, 0x500000000000000}], 0x7, &(0x7f0000000600)=""/191, 0xbf}}], 0x1, 0x0, &(0x7f0000003700)={0x77359400}) 12:21:25 executing program 3: bpf$BPF_PROG_WITH_BTFID_LOAD(0x16, &(0x7f0000000940)=@bpf_ext={0x1c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 12:21:25 executing program 2: open(&(0x7f0000000400)='./bus\x00', 0x14103e, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$L2TP_CMD_SESSION_MODIFY(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000080)={0x30, r1, 0x1, 0x0, 0x0, {}, [@L2TP_ATTR_SEND_SEQ={0x5}, @L2TP_ATTR_IFNAME={0x14, 0x8, 'veth1_to_hsr\x00'}]}, 0x30}}, 0x0) 12:21:25 executing program 4: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x82, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket(0x10, 0x803, 0x0) sendto(r0, &(0x7f00000000c0)="120000001200e7ef007b00000000000000a1", 0x12, 0x0, 0x0, 0x0) recvmmsg(r0, &(0x7f00000037c0)=[{{&(0x7f00000004c0)=@ethernet={0x0, @random}, 0x80, &(0x7f0000000380)=[{&(0x7f0000000040)=""/95, 0x5f}, {&(0x7f0000000140)=""/85, 0x55}, {&(0x7f0000000fc0)=""/4096, 0x1000}, {&(0x7f0000000400)=""/106, 0x6a}, {&(0x7f0000000740)=""/73, 0x49}, {&(0x7f0000000200)=""/77, 0x4d}, {0x0, 0x600000000000000}], 0x7, &(0x7f0000000600)=""/191, 0xbf}}], 0x1, 0x0, &(0x7f0000003700)={0x77359400}) [ 993.994599][ T3558] loop1: detected capacity change from 0 to 2048 [ 994.068045][ T3558] EXT4-fs (loop1): mounted filesystem 00000000-0000-0000-0000-000000000000 without journal. Quota mode: none. [ 994.135345][ T3558] ext4 filesystem being mounted at /root/syzkaller-testdir1539738704/syzkaller.ao1jj3/3763/bus supports timestamps until 2038 (0x7fffffff) [ 994.236844][ T3558] loop1: detected capacity change from 2048 to 2047 [ 994.277266][ T3128] EXT4-fs (loop1): unmounting filesystem 00000000-0000-0000-0000-000000000000. 12:21:26 executing program 0: r0 = socket$unix(0x1, 0x2, 0x0) r1 = socket$can_bcm(0x1d, 0x2, 0x2) connect$can_bcm(r1, &(0x7f0000000000), 0x10) ioctl$sock_kcm_SIOCKCMUNATTACH(0xffffffffffffffff, 0x89e1, 0xffffffffffffffff) getsockopt$inet_sctp_SCTP_PEER_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1a, &(0x7f0000000380)={0x0, 0x78, "f29c5b753353d9c7798811e57823354f32d6cb0899a53381003e4f8dbbb1ea469076c8e175a20b45443f885afb38b83813d5e013d4fad662f1582b23328b4ed70ad9d7d4d0052d0147d8b0ac4910985bec8aa8956c599d291a7da55fec010801d8f02dcff373f52f59f867378c13f4a080938c965846a7e8"}, &(0x7f00000002c0)=0x80) socket$igmp6(0xa, 0x3, 0x2) perf_event_open(&(0x7f0000000500)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x15, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) close(0xffffffffffffffff) socket$inet_mptcp(0x2, 0x1, 0x106) connect$can_bcm(0xffffffffffffffff, &(0x7f0000000000), 0x10) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, 0x0) bind$unix(r0, &(0x7f00000005c0)=@abs={0x1, 0x0, 0x4e23}, 0x6e) syz_clone(0x40000000, &(0x7f00000000c0), 0x0, 0x0, &(0x7f00000001c0), 0x0) 12:21:26 executing program 3: r0 = syz_io_uring_setup(0x5946, &(0x7f0000000280), &(0x7f0000ffa000/0x4000)=nil, &(0x7f0000ffd000/0x3000)=nil, &(0x7f0000000140), &(0x7f0000000300)) io_uring_register$IORING_REGISTER_BUFFERS2(r0, 0xf, &(0x7f00000006c0)={0x2, 0x0, 0x0, &(0x7f0000000640)=[{0x0}, {&(0x7f0000000440)=""/146, 0x92}], 0x0}, 0x20) 12:21:26 executing program 2: open(&(0x7f0000000400)='./bus\x00', 0x14103e, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$L2TP_CMD_SESSION_MODIFY(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000080)={0x30, r1, 0x1, 0x0, 0x2, {}, [@L2TP_ATTR_SEND_SEQ={0x5}, @L2TP_ATTR_IFNAME={0x14, 0x8, 'veth1_to_hsr\x00'}]}, 0x30}}, 0x0) 12:21:26 executing program 4: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x82, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket(0x10, 0x803, 0x0) sendto(r0, &(0x7f00000000c0)="120000001200e7ef007b00000000000000a1", 0x12, 0x0, 0x0, 0x0) recvmmsg(r0, &(0x7f00000037c0)=[{{&(0x7f00000004c0)=@ethernet={0x0, @random}, 0x80, &(0x7f0000000380)=[{&(0x7f0000000040)=""/95, 0x5f}, {&(0x7f0000000140)=""/85, 0x55}, {&(0x7f0000000fc0)=""/4096, 0x1000}, {&(0x7f0000000400)=""/106, 0x6a}, {&(0x7f0000000740)=""/73, 0x49}, {&(0x7f0000000200)=""/77, 0x4d}, {0x0, 0x800000000000000}], 0x7, &(0x7f0000000600)=""/191, 0xbf}}], 0x1, 0x0, &(0x7f0000003700)={0x77359400}) 12:21:26 executing program 1: syz_mount_image$ext4(&(0x7f0000000740)='ext4\x00', &(0x7f0000000100)='./bus\x00', 0x804810, &(0x7f0000000180)=ANY=[@ANYBLOB="0061021d307a961da7401271e3fa98008000001d3902ccfd562158cb15c016093893c9e4abd02bc4f1492514fa2dfebc8001000080000000008a1049ca0000"], 0x1, 0x73b, &(0x7f0000000780)="$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") chdir(&(0x7f0000000080)='./file0\x00') open(&(0x7f00000000c0)='./bus\x00', 0x14da42, 0x0) mount(&(0x7f0000000380)=@loop={'/dev/loop', 0x0}, &(0x7f00000003c0)='./bus\x00', 0x0, 0x1000, 0x0) r0 = open(&(0x7f0000000400)='./bus\x00', 0x0, 0x0) ioctl$LOOP_SET_STATUS(r0, 0x4c02, &(0x7f00000001c0)={0x0, {}, 0x0, {}, 0xff, 0x0, 0x0, 0x0, "be8176c9e6755a48a3c0230dd390efe12f8306bed95b2afd402aae879978d959ff9009eec610d9108ea036456bb79e26ee42d0a34968c1fdbb33e8ad5860f632", "b948757aa008fae13adca739a9f126462ab528ea52e90ce2cf50a4ef2568375b"}) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='blkio.throttle.io_service_bytes\x00', 0x275a, 0xdc12) [ 994.863410][ T3590] loop1: detected capacity change from 0 to 2048 [ 994.927099][ T3590] EXT4-fs (loop1): mounted filesystem 00000000-0000-0000-0000-000000000000 without journal. Quota mode: none. [ 994.956664][ T3590] ext4 filesystem being mounted at /root/syzkaller-testdir1539738704/syzkaller.ao1jj3/3764/bus supports timestamps until 2038 (0x7fffffff) 12:21:26 executing program 5: r0 = socket$unix(0x1, 0x2, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f0000000100)={'vcan0\x00', 0x0}) r2 = socket$can_bcm(0x1d, 0x2, 0x2) connect$can_bcm(r2, &(0x7f0000000000), 0x10) ioctl$sock_kcm_SIOCKCMUNATTACH(0xffffffffffffffff, 0x89e1, 0xffffffffffffffff) ioctl$sock_SIOCSPGRP(0xffffffffffffffff, 0x8902, 0x0) sendmsg$can_bcm(r2, &(0x7f0000000480)={&(0x7f0000000340)={0x1d, r1, 0x3f420f00}, 0x10, &(0x7f0000000040)={&(0x7f0000000580)=ANY=[@ANYBLOB="01000000d7fe68ca0000e9ffffff0000", @ANYRES64=0x0, @ANYRES64=0x0, @ANYRES64=0x0, @ANYRES64=r0, @ANYBLOB="3bf81bb9"], 0x20000600}}, 0x0) r3 = socket(0x23, 0x800, 0x40000) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r3, 0x541b, &(0x7f00000000c0)={'ip6_vti0\x00', 0x0}) sendmsg$IPCTNL_MSG_EXP_DELETE(r3, &(0x7f00000004c0)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x40000040}, 0xc, &(0x7f0000000440)={&(0x7f00000006c0)={0x1d0, 0x2, 0x2, 0x201, 0x0, 0x0, {0xa}, [@CTA_EXPECT_NAT={0xc0, 0xa, 0x0, 0x1, [@CTA_EXPECT_NAT_TUPLE={0xc, 0x2, 0x0, 0x1, [@CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x1}]}, @CTA_EXPECT_NAT_TUPLE={0x70, 0x2, 0x0, 0x1, [@CTA_TUPLE_IP={0x2c, 0x1, 0x0, 0x1, @ipv6={{0x14, 0x3, @loopback}, {0x14, 0x4, @private0}}}, @CTA_TUPLE_IP={0x14, 0x1, 0x0, 0x1, @ipv4={{0x8, 0x1, @empty}, {0x8, 0x2, @initdev={0xac, 0x1e, 0x1, 0x0}}}}, @CTA_TUPLE_IP={0x14, 0x1, 0x0, 0x1, @ipv4={{0x8, 0x1, @local}, {0x8, 0x2, @loopback}}}, @CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x4}, @CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x3}, @CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x1}]}, @CTA_EXPECT_NAT_TUPLE={0x38, 0x2, 0x0, 0x1, [@CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5, 0x1, 0x88}}, @CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x3}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5, 0x1, 0x21}}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5, 0x1, 0x1}}, @CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x3}]}, @CTA_EXPECT_NAT_DIR={0x8}]}, @CTA_EXPECT_MASTER={0x20, 0x1, 0x0, 0x1, [@CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x1}, @CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x2}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5, 0x1, 0x84}}]}, @CTA_EXPECT_MASTER={0xdc, 0x1, 0x0, 0x1, [@CTA_TUPLE_IP={0x14, 0x1, 0x0, 0x1, @ipv4={{0x8, 0x1, @multicast1}, {0x8, 0x2, @dev={0xac, 0x14, 0x14, 0x3a}}}}, @CTA_TUPLE_ZONE={0x6}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5, 0x1, 0x21}}, @CTA_TUPLE_IP={0x14, 0x1, 0x0, 0x1, @ipv4={{0x8, 0x1, @empty}, {0x8, 0x2, @local}}}, @CTA_TUPLE_IP={0x2c, 0x1, 0x0, 0x1, @ipv6={{0x14, 0x3, @private1={0xfc, 0x1, '\x00', 0x1}}, {0x14, 0x4, @rand_addr=' \x01\x00'}}}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5, 0x1, 0x1}}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5, 0x1, 0x88}}, @CTA_TUPLE_IP={0x2c, 0x1, 0x0, 0x1, @ipv6={{0x14, 0x3, @empty}, {0x14, 0x4, @dev={0xfe, 0x80, '\x00', 0x21}}}}, @CTA_TUPLE_IP={0x2c, 0x1, 0x0, 0x1, @ipv6={{0x14, 0x3, @local}, {0x14, 0x4, @ipv4={'\x00', '\xff\xff', @rand_addr=0x64010100}}}}]}]}, 0x1d0}}, 0x48000) perf_event_open(&(0x7f0000000500)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x15, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$binfmt_elf32(0xffffffffffffffff, &(0x7f0000000040)=ANY=[], 0x69) connect$can_bcm(0xffffffffffffffff, &(0x7f0000000000), 0x10) sendmsg$can_bcm(0xffffffffffffffff, &(0x7f0000000480)={&(0x7f0000000340)={0x1d, 0x0, 0x3f420f00}, 0x10, &(0x7f0000000040)={&(0x7f0000000580)=ANY=[@ANYBLOB="01000000d7fe68ca0000e9ffffff0000", @ANYRES64=0x0, @ANYRES64=0x0, @ANYRES64=0x0, @ANYRES64], 0x20000600}}, 0x0) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(0xffffffffffffffff, 0x89f0, &(0x7f0000000280)={'gretap0\x00', &(0x7f0000000240)={'ip_vti0\x00', 0x0, 0x7, 0x80, 0xfffffff7, 0x7, {{0x8, 0x4, 0x0, 0x5, 0x20, 0x67, 0x0, 0xc0, 0x29, 0x0, @local, @empty, {[@timestamp={0x44, 0xc, 0x8, 0x0, 0x2, [0x7f, 0x1]}]}}}}}) socket(0x10, 0x3, 0x0) process_mrelease(0xffffffffffffffff, 0x0) r4 = socket$packet(0x11, 0x2, 0x300) ioctl$sock_SIOCGIFINDEX(r4, 0x8933, 0x0) getsockopt$inet_sctp_SCTP_RECVNXTINFO(r3, 0x84, 0x21, &(0x7f0000000140), &(0x7f0000000200)=0x4) bind$unix(r0, &(0x7f00000005c0)=@abs={0x1, 0x0, 0x4e23}, 0x6e) syz_clone(0x40000000, &(0x7f00000000c0), 0x0, 0x0, &(0x7f00000001c0), 0x0) 12:21:26 executing program 2: open(&(0x7f0000000400)='./bus\x00', 0x14103e, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$L2TP_CMD_SESSION_MODIFY(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000080)={0x30, r1, 0x1, 0x0, 0x3, {}, [@L2TP_ATTR_SEND_SEQ={0x5}, @L2TP_ATTR_IFNAME={0x14, 0x8, 'veth1_to_hsr\x00'}]}, 0x30}}, 0x0) 12:21:26 executing program 4: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x82, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket(0x10, 0x803, 0x0) sendto(r0, &(0x7f00000000c0)="120000001200e7ef007b00000000000000a1", 0x12, 0x0, 0x0, 0x0) recvmmsg(r0, &(0x7f00000037c0)=[{{&(0x7f00000004c0)=@ethernet={0x0, @random}, 0x80, &(0x7f0000000380)=[{&(0x7f0000000040)=""/95, 0x5f}, {&(0x7f0000000140)=""/85, 0x55}, {&(0x7f0000000fc0)=""/4096, 0x1000}, {&(0x7f0000000400)=""/106, 0x6a}, {&(0x7f0000000740)=""/73, 0x49}, {&(0x7f0000000200)=""/77, 0x4d}, {0x0, 0x900000000000000}], 0x7, &(0x7f0000000600)=""/191, 0xbf}}], 0x1, 0x0, &(0x7f0000003700)={0x77359400}) 12:21:26 executing program 3: bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000280)=@bpf_lsm={0x1d, 0x1, &(0x7f0000000000)=@raw=[@jmp], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 12:21:26 executing program 3: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) getsockopt$inet6_opts(r0, 0x29, 0x37, 0x0, &(0x7f0000000400)) 12:21:26 executing program 2: open(&(0x7f0000000400)='./bus\x00', 0x14103e, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$L2TP_CMD_SESSION_MODIFY(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000080)={0x30, r1, 0x1, 0x0, 0x4, {}, [@L2TP_ATTR_SEND_SEQ={0x5}, @L2TP_ATTR_IFNAME={0x14, 0x8, 'veth1_to_hsr\x00'}]}, 0x30}}, 0x0) 12:21:26 executing program 2: open(&(0x7f0000000400)='./bus\x00', 0x14103e, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$L2TP_CMD_SESSION_MODIFY(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000080)={0x30, r1, 0x1, 0x0, 0x5, {}, [@L2TP_ATTR_SEND_SEQ={0x5}, @L2TP_ATTR_IFNAME={0x14, 0x8, 'veth1_to_hsr\x00'}]}, 0x30}}, 0x0) [ 995.075230][ T3590] loop1: detected capacity change from 2048 to 2047 [ 995.152619][ T3128] EXT4-fs (loop1): unmounting filesystem 00000000-0000-0000-0000-000000000000. 12:21:27 executing program 0: r0 = socket$unix(0x1, 0x2, 0x0) r1 = socket$can_bcm(0x1d, 0x2, 0x2) connect$can_bcm(r1, &(0x7f0000000000), 0x10) ioctl$sock_kcm_SIOCKCMUNATTACH(0xffffffffffffffff, 0x89e1, 0xffffffffffffffff) getsockopt$inet_sctp_SCTP_PEER_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1a, &(0x7f0000000380)={0x0, 0x78, "f29c5b753353d9c7798811e57823354f32d6cb0899a53381003e4f8dbbb1ea469076c8e175a20b45443f885afb38b83813d5e013d4fad662f1582b23328b4ed70ad9d7d4d0052d0147d8b0ac4910985bec8aa8956c599d291a7da55fec010801d8f02dcff373f52f59f867378c13f4a080938c965846a7e8"}, &(0x7f00000002c0)=0x80) socket$igmp6(0xa, 0x3, 0x2) perf_event_open(&(0x7f0000000500)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x15, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) close(0xffffffffffffffff) socket$inet_mptcp(0x2, 0x1, 0x106) connect$can_bcm(0xffffffffffffffff, &(0x7f0000000000), 0x10) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, 0x0) bind$unix(r0, &(0x7f00000005c0)=@abs={0x1, 0x0, 0x4e23}, 0x6e) syz_clone(0x40000000, &(0x7f00000000c0), 0x0, 0x0, &(0x7f00000001c0), 0x0) 12:21:27 executing program 3: r0 = syz_io_uring_setup(0xb43, &(0x7f0000001a80), &(0x7f0000ffe000/0x2000)=nil, &(0x7f0000fff000/0x1000)=nil, &(0x7f00000018c0), &(0x7f0000001b00)) io_uring_register$IORING_REGISTER_BUFFERS2(r0, 0xf, &(0x7f0000001dc0)={0x1, 0x0, 0x0, &(0x7f0000001d40)=[{&(0x7f0000001b40)=""/95, 0x5f}], 0x0}, 0x20) 12:21:27 executing program 1: syz_mount_image$ext4(&(0x7f0000000740)='ext4\x00', &(0x7f0000000100)='./bus\x00', 0x804810, &(0x7f0000000180)=ANY=[@ANYBLOB="0061021d307a961da7401271e3fa98008000001d3902ccfd562158cb15c016093893c9e4abd02bc4f1492514fa2dfebc8001000080000000008a1049ca0000"], 0x1, 0x73b, &(0x7f0000000780)="$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") chdir(&(0x7f0000000080)='./file0\x00') open(&(0x7f00000000c0)='./bus\x00', 0x14da42, 0x0) mount(&(0x7f0000000380)=@loop={'/dev/loop', 0x0}, &(0x7f00000003c0)='./bus\x00', 0x0, 0x1000, 0x0) r0 = open(&(0x7f0000000400)='./bus\x00', 0x0, 0x0) ioctl$LOOP_SET_STATUS(r0, 0x4c02, &(0x7f00000001c0)={0x0, {}, 0x0, {}, 0xff, 0x0, 0x0, 0x0, "be8176c9e6755a48a3c0230dd390efe12f8306bed95b2afd402aae879978d959ff9009eec610d9108ea036456bb79e26ee42d0a34968c1fdbb33e8ad5860f632", "b948757aa008fae13adca739a9f126462ab528ea52e90ce2cf50a4ef2568375b"}) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='blkio.throttle.io_service_bytes\x00', 0x275a, 0xff0f) 12:21:27 executing program 4: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x82, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket(0x10, 0x803, 0x0) sendto(r0, &(0x7f00000000c0)="120000001200e7ef007b00000000000000a1", 0x12, 0x0, 0x0, 0x0) recvmmsg(r0, &(0x7f00000037c0)=[{{&(0x7f00000004c0)=@ethernet={0x0, @random}, 0x80, &(0x7f0000000380)=[{&(0x7f0000000040)=""/95, 0x5f}, {&(0x7f0000000140)=""/85, 0x55}, {&(0x7f0000000fc0)=""/4096, 0x1000}, {&(0x7f0000000400)=""/106, 0x6a}, {&(0x7f0000000740)=""/73, 0x49}, {&(0x7f0000000200)=""/77, 0x4d}, {0x0, 0xa00000000000000}], 0x7, &(0x7f0000000600)=""/191, 0xbf}}], 0x1, 0x0, &(0x7f0000003700)={0x77359400}) 12:21:27 executing program 2: open(&(0x7f0000000400)='./bus\x00', 0x14103e, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$L2TP_CMD_SESSION_MODIFY(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000080)={0x30, r1, 0x1, 0x0, 0x6, {}, [@L2TP_ATTR_SEND_SEQ={0x5}, @L2TP_ATTR_IFNAME={0x14, 0x8, 'veth1_to_hsr\x00'}]}, 0x30}}, 0x0) [ 995.659072][ T3623] loop1: detected capacity change from 0 to 2048 [ 995.727124][ T3623] EXT4-fs (loop1): mounted filesystem 00000000-0000-0000-0000-000000000000 without journal. Quota mode: none. [ 995.740552][ T3623] ext4 filesystem being mounted at /root/syzkaller-testdir1539738704/syzkaller.ao1jj3/3765/bus supports timestamps until 2038 (0x7fffffff) 12:21:27 executing program 5: r0 = socket$unix(0x1, 0x2, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f0000000100)={'vcan0\x00', 0x0}) r2 = socket$can_bcm(0x1d, 0x2, 0x2) connect$can_bcm(r2, &(0x7f0000000000), 0x10) ioctl$sock_kcm_SIOCKCMUNATTACH(0xffffffffffffffff, 0x89e1, 0xffffffffffffffff) ioctl$sock_SIOCSPGRP(0xffffffffffffffff, 0x8902, 0x0) sendmsg$can_bcm(r2, &(0x7f0000000480)={&(0x7f0000000340)={0x1d, r1, 0x3f420f00}, 0x10, &(0x7f0000000040)={&(0x7f0000000580)=ANY=[@ANYBLOB="01000000d7fe68ca0000e9ffffff0000", @ANYRES64=0x0, @ANYRES64=0x0, @ANYRES64=0x0, @ANYBLOB="3bf81bb9f1"], 0x20000600}}, 0x0) r3 = socket(0x23, 0x800, 0x40000) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r3, 0x541b, &(0x7f00000000c0)={'ip6_vti0\x00', 0x0}) sendmsg$IPCTNL_MSG_EXP_DELETE(r3, &(0x7f00000004c0)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x40000040}, 0xc, &(0x7f0000000440)={&(0x7f00000006c0)={0x1d0, 0x2, 0x2, 0x201, 0x0, 0x0, {0xa}, [@CTA_EXPECT_NAT={0xc0, 0xa, 0x0, 0x1, [@CTA_EXPECT_NAT_TUPLE={0xc, 0x2, 0x0, 0x1, [@CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x1}]}, @CTA_EXPECT_NAT_TUPLE={0x70, 0x2, 0x0, 0x1, [@CTA_TUPLE_IP={0x2c, 0x1, 0x0, 0x1, @ipv6={{0x14, 0x3, @loopback}, {0x14, 0x4, @private0}}}, @CTA_TUPLE_IP={0x14, 0x1, 0x0, 0x1, @ipv4={{0x8, 0x1, @empty}, {0x8, 0x2, @initdev={0xac, 0x1e, 0x1, 0x0}}}}, @CTA_TUPLE_IP={0x14, 0x1, 0x0, 0x1, @ipv4={{0x8, 0x1, @local}, {0x8, 0x2, @loopback}}}, @CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x4}, @CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x3}, @CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x1}]}, @CTA_EXPECT_NAT_TUPLE={0x38, 0x2, 0x0, 0x1, [@CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5, 0x1, 0x88}}, @CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x3}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5, 0x1, 0x21}}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5, 0x1, 0x1}}, @CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x3}]}, @CTA_EXPECT_NAT_DIR={0x8}]}, @CTA_EXPECT_MASTER={0x20, 0x1, 0x0, 0x1, [@CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x1}, @CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x2}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5, 0x1, 0x84}}]}, @CTA_EXPECT_MASTER={0xdc, 0x1, 0x0, 0x1, [@CTA_TUPLE_IP={0x14, 0x1, 0x0, 0x1, @ipv4={{0x8, 0x1, @multicast1}, {0x8, 0x2, @dev={0xac, 0x14, 0x14, 0x3a}}}}, @CTA_TUPLE_ZONE={0x6}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5, 0x1, 0x21}}, @CTA_TUPLE_IP={0x14, 0x1, 0x0, 0x1, @ipv4={{0x8, 0x1, @empty}, {0x8, 0x2, @local}}}, @CTA_TUPLE_IP={0x2c, 0x1, 0x0, 0x1, @ipv6={{0x14, 0x3, @private1={0xfc, 0x1, '\x00', 0x1}}, {0x14, 0x4, @rand_addr=' \x01\x00'}}}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5, 0x1, 0x1}}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5, 0x1, 0x88}}, @CTA_TUPLE_IP={0x2c, 0x1, 0x0, 0x1, @ipv6={{0x14, 0x3, @empty}, {0x14, 0x4, @dev={0xfe, 0x80, '\x00', 0x21}}}}, @CTA_TUPLE_IP={0x2c, 0x1, 0x0, 0x1, @ipv6={{0x14, 0x3, @local}, {0x14, 0x4, @ipv4={'\x00', '\xff\xff', @rand_addr=0x64010100}}}}]}]}, 0x1d0}}, 0x48000) perf_event_open(&(0x7f0000000500)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x15, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$binfmt_elf32(0xffffffffffffffff, &(0x7f0000000040)=ANY=[], 0x69) connect$can_bcm(0xffffffffffffffff, &(0x7f0000000000), 0x10) sendmsg$can_bcm(0xffffffffffffffff, &(0x7f0000000480)={&(0x7f0000000340)={0x1d, 0x0, 0x3f420f00}, 0x10, &(0x7f0000000040)={&(0x7f0000000580)=ANY=[@ANYBLOB="01000000d7fe68ca0000e9ffffff0000", @ANYRES64=0x0, @ANYRES64=0x0, @ANYRES64=0x0, @ANYRES64], 0x20000600}}, 0x0) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(0xffffffffffffffff, 0x89f0, &(0x7f0000000280)={'gretap0\x00', &(0x7f0000000240)={'ip_vti0\x00', 0x0, 0x7, 0x80, 0xfffffff7, 0x7, {{0x8, 0x4, 0x0, 0x5, 0x20, 0x67, 0x0, 0xc0, 0x29, 0x0, @local, @empty, {[@timestamp={0x44, 0xc, 0x8, 0x0, 0x2, [0x7f, 0x1]}]}}}}}) socket(0x10, 0x3, 0x0) process_mrelease(0xffffffffffffffff, 0x0) r4 = socket$packet(0x11, 0x2, 0x300) ioctl$sock_SIOCGIFINDEX(r4, 0x8933, 0x0) getsockopt$inet_sctp_SCTP_RECVNXTINFO(r3, 0x84, 0x21, &(0x7f0000000140), &(0x7f0000000200)=0x4) bind$unix(r0, &(0x7f00000005c0)=@abs={0x1, 0x0, 0x4e23}, 0x6e) syz_clone(0x40000000, &(0x7f00000000c0), 0x0, 0x0, &(0x7f00000001c0), 0x0) 12:21:27 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmmsg$inet(r0, &(0x7f00000007c0)=[{{0x0, 0x0, &(0x7f0000000c40)=[{&(0x7f00000003c0)="e6", 0x1}, {&(0x7f0000000480)=':', 0x1}, {&(0x7f0000000540)='s', 0x1}, {&(0x7f0000000580)="14", 0x1}], 0x4, &(0x7f0000000cc0)=[@ip_retopts={{0xc}}, @ip_tos_int={{0x10}}], 0x1c}}], 0x1, 0x0) 12:21:27 executing program 2: open(&(0x7f0000000400)='./bus\x00', 0x14103e, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$L2TP_CMD_SESSION_MODIFY(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000080)={0x30, r1, 0x1, 0x0, 0x7, {}, [@L2TP_ATTR_SEND_SEQ={0x5}, @L2TP_ATTR_IFNAME={0x14, 0x8, 'veth1_to_hsr\x00'}]}, 0x30}}, 0x0) 12:21:27 executing program 4: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x82, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket(0x10, 0x803, 0x0) sendto(r0, &(0x7f00000000c0)="120000001200e7ef007b00000000000000a1", 0x12, 0x0, 0x0, 0x0) recvmmsg(r0, &(0x7f00000037c0)=[{{&(0x7f00000004c0)=@ethernet={0x0, @random}, 0x80, &(0x7f0000000380)=[{&(0x7f0000000040)=""/95, 0x5f}, {&(0x7f0000000140)=""/85, 0x55}, {&(0x7f0000000fc0)=""/4096, 0x1000}, {&(0x7f0000000400)=""/106, 0x6a}, {&(0x7f0000000740)=""/73, 0x49}, {&(0x7f0000000200)=""/77, 0x4d}, {0x0, 0xc00000000000000}], 0x7, &(0x7f0000000600)=""/191, 0xbf}}], 0x1, 0x0, &(0x7f0000003700)={0x77359400}) 12:21:27 executing program 1: syz_mount_image$ext4(&(0x7f0000000740)='ext4\x00', &(0x7f0000000100)='./bus\x00', 0x804810, &(0x7f0000000180)=ANY=[@ANYBLOB="0061021d307a961da7401271e3fa98008000001d3902ccfd562158cb15c016093893c9e4abd02bc4f1492514fa2dfebc8001000080000000008a1049ca0000"], 0x1, 0x73b, &(0x7f0000000780)="$eJzs3M9rHHUbAPBnptn+zPtuXngP6kGEFloonSTNpT0ZL94KhYLXGpJJCJlkQ3ZTm1iw9SzU5qIgiN49ehVK/QO8SUHBuyBa40G8rMxmk9q4u922Sbeknw9M5/nOj32epzv5ZgcyG8BL643ynyRiOCIuR0S1vT2NiMOt6GjEza3jNh/cmC6XJJrNK78m5Wmx2azuvFbSXp+I1inxSkTcq0Sc/fDfeetr6wtTRZGvtMejjcXl0fra+rn5xam5fC5fGp+4OHZhYuLC2MSe9XrqnYvH7nz39sbG9183br8+dC6JyVbf0e5tzxL9w9b/SSUmd21f2o9kA5QMugAAAPpSfs4/FBFDrU+p1TjUigAAAICDpHmkCQAAABx4SQy6AgAAAGB/bf8dwPazvfv1HGw3v7wVESOd8g+1niGOOBqViDi+mTzyZEKydRo8k5u3IuLuZIfrL2lff09vbNfYM9Ivnrvl/DPZaf5Jd+af6DD/DG1/d8Iz6j7/Pcx/qMv8d7nPHN98/mqla/5bEa8Ndcqf7ORPuuR/t8/8tzc+utNtX/PLiNMdf/8kj+Tq8f0Qo7PzRc8frXt/nbnfq//j3fInvftf7rP/9zd/X+g2l5T5z5zs/f53yl9eEx+360gj4k57XY43duU4ufjDt736n+nS/+Pe/y/67P+nr45c7/NQAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAaEkjYjiSNNuJ0zTLIk5ExP/jeFrU6o2zs7XVpZlyX8RIVNLZ+SIfi4jq1jgpx+Ot+OH4/K7xRET878djW0nnizybrhUzg24eAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAACAHSciYjiSNIuINCL+qKZplg26KgAAAGDPjQy6AAAAAGDfuf8HAACAg+9p7/+TPa4DAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAONAuX7pULs3NBzemy/HMtbXVhdq1czN5fSFbXJ3Opmsry9lcrTZX5Nl0bfFxr1fUasvjF2P1+mgjrzdG62vrVxdrq0uNq/OLU3P51bzyXLoCAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAADgSQ23liTNIiJtxWmaZRH/iYiRqCSz80U+FhH/jYj71cqRcjw+6KIBAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAADYc/W19YWposhXBALBcws+iIgXoIwewaBnJgAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAABqG+tr4wVRT5Sn3QlQAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAADBY6c9JRJTL6eqp4d17Dyd/VlvriHjvsyufXJ9qNFbGy+2/7WxvfNrefn4Q9QMAAMBL4c0nOXj7Pn37Ph4AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAKBf9bX1hamiyFf2MRh0jwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAwNP5OwAA//9JjsXQ") chdir(&(0x7f0000000080)='./file0\x00') open(&(0x7f00000000c0)='./bus\x00', 0x14da42, 0x0) mount(&(0x7f0000000380)=@loop={'/dev/loop', 0x0}, &(0x7f00000003c0)='./bus\x00', 0x0, 0x1000, 0x0) r0 = open(&(0x7f0000000400)='./bus\x00', 0x0, 0x0) ioctl$LOOP_SET_STATUS(r0, 0x4c02, &(0x7f00000001c0)={0x0, {}, 0x0, {}, 0xff, 0x0, 0x0, 0x0, "be8176c9e6755a48a3c0230dd390efe12f8306bed95b2afd402aae879978d959ff9009eec610d9108ea036456bb79e26ee42d0a34968c1fdbb33e8ad5860f632", "b948757aa008fae13adca739a9f126462ab528ea52e90ce2cf50a4ef2568375b"}) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='blkio.throttle.io_service_bytes\x00', 0x275a, 0x80040) [ 995.801839][ T3623] loop1: detected capacity change from 2048 to 2047 [ 995.818639][ T3128] EXT4-fs (loop1): unmounting filesystem 00000000-0000-0000-0000-000000000000. 12:21:27 executing program 2: open(&(0x7f0000000400)='./bus\x00', 0x14103e, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$L2TP_CMD_SESSION_MODIFY(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000080)={0x30, r1, 0x1, 0x0, 0x8, {}, [@L2TP_ATTR_SEND_SEQ={0x5}, @L2TP_ATTR_IFNAME={0x14, 0x8, 'veth1_to_hsr\x00'}]}, 0x30}}, 0x0) 12:21:27 executing program 3: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r0, 0x8949, &(0x7f0000000600)={'ip6gre0\x00', 0x0}) [ 996.003774][ T3643] loop1: detected capacity change from 0 to 2048 [ 996.062728][ T3643] EXT4-fs (loop1): mounted filesystem 00000000-0000-0000-0000-000000000000 without journal. Quota mode: none. [ 996.105964][ T3643] ext4 filesystem being mounted at /root/syzkaller-testdir1539738704/syzkaller.ao1jj3/3766/bus supports timestamps until 2038 (0x7fffffff) [ 996.271839][ T3643] loop1: detected capacity change from 2048 to 2047 [ 996.329026][ T3128] EXT4-fs (loop1): unmounting filesystem 00000000-0000-0000-0000-000000000000. 12:21:28 executing program 0: r0 = socket$unix(0x1, 0x2, 0x0) r1 = socket$can_bcm(0x1d, 0x2, 0x2) connect$can_bcm(r1, &(0x7f0000000000), 0x10) ioctl$sock_kcm_SIOCKCMUNATTACH(0xffffffffffffffff, 0x89e1, 0xffffffffffffffff) getsockopt$inet_sctp_SCTP_PEER_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1a, &(0x7f0000000380)={0x0, 0x7c, "f29c5b753353d9c7798811e57823354f32d6cb0899a53381003e4f8dbbb1ea469076c8e175a20b45443f885afb38b83813d5e013d4fad662f1582b23328b4ed70ad9d7d4d0052d0147d8b0ac4910985bec8aa8956c599d291a7da55fec010801d8f02dcff373f52f59f867378c13f4a080938c965846a7e8229b410b"}, &(0x7f00000002c0)=0x84) socket$igmp6(0xa, 0x3, 0x2) perf_event_open(&(0x7f0000000500)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x15, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) close(0xffffffffffffffff) socket$inet_mptcp(0x2, 0x1, 0x106) connect$can_bcm(0xffffffffffffffff, &(0x7f0000000000), 0x10) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, 0x0) bind$unix(r0, &(0x7f00000005c0)=@abs={0x1, 0x0, 0x4e23}, 0x6e) syz_clone(0x40000000, &(0x7f00000000c0), 0x0, 0x0, &(0x7f00000001c0), 0x0) 12:21:28 executing program 2: open(&(0x7f0000000400)='./bus\x00', 0x14103e, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$L2TP_CMD_SESSION_MODIFY(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000080)={0x30, r1, 0x1, 0x0, 0x9, {}, [@L2TP_ATTR_SEND_SEQ={0x5}, @L2TP_ATTR_IFNAME={0x14, 0x8, 'veth1_to_hsr\x00'}]}, 0x30}}, 0x0) 12:21:28 executing program 3: bpf$MAP_LOOKUP_BATCH(0x18, &(0x7f0000002e00)={0x0, 0x0, 0x0, 0x0}, 0x38) 12:21:28 executing program 4: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x82, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket(0x10, 0x803, 0x0) sendto(r0, &(0x7f00000000c0)="120000001200e7ef007b00000000000000a1", 0x12, 0x0, 0x0, 0x0) recvmmsg(r0, &(0x7f00000037c0)=[{{&(0x7f00000004c0)=@ethernet={0x0, @random}, 0x80, &(0x7f0000000380)=[{&(0x7f0000000040)=""/95, 0x5f}, {&(0x7f0000000140)=""/85, 0x55}, {&(0x7f0000000fc0)=""/4096, 0x1000}, {&(0x7f0000000400)=""/106, 0x6a}, {&(0x7f0000000740)=""/73, 0x49}, {&(0x7f0000000200)=""/77, 0x4d}, {0x0, 0xd00000000000000}], 0x7, &(0x7f0000000600)=""/191, 0xbf}}], 0x1, 0x0, &(0x7f0000003700)={0x77359400}) 12:21:28 executing program 1: syz_mount_image$ext4(&(0x7f0000000740)='ext4\x00', &(0x7f0000000100)='./bus\x00', 0x804810, &(0x7f0000000180)=ANY=[@ANYBLOB="0061021d307a961da7401271e3fa98008000001d3902ccfd562158cb15c016093893c9e4abd02bc4f1492514fa2dfebc8001000080000000008a1049ca0000"], 0x1, 0x73b, &(0x7f0000000780)="$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") chdir(&(0x7f0000000080)='./file0\x00') open(&(0x7f00000000c0)='./bus\x00', 0x14da42, 0x0) mount(&(0x7f0000000380)=@loop={'/dev/loop', 0x0}, &(0x7f00000003c0)='./bus\x00', 0x0, 0x1000, 0x0) r0 = open(&(0x7f0000000400)='./bus\x00', 0x0, 0x0) ioctl$LOOP_SET_STATUS(r0, 0x4c02, &(0x7f00000001c0)={0x0, {}, 0x0, {}, 0xff, 0x0, 0x0, 0x0, "be8176c9e6755a48a3c0230dd390efe12f8306bed95b2afd402aae879978d959ff9009eec610d9108ea036456bb79e26ee42d0a34968c1fdbb33e8ad5860f632", "b948757aa008fae13adca739a9f126462ab528ea52e90ce2cf50a4ef2568375b"}) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='blkio.throttle.io_service_bytes\x00', 0x275a, 0x100000) [ 996.565869][ T3655] loop1: detected capacity change from 0 to 2048 [ 996.614252][ T3655] EXT4-fs (loop1): mounted filesystem 00000000-0000-0000-0000-000000000000 without journal. Quota mode: none. [ 996.643553][ T3655] ext4 filesystem being mounted at /root/syzkaller-testdir1539738704/syzkaller.ao1jj3/3767/bus supports timestamps until 2038 (0x7fffffff) 12:21:28 executing program 5: r0 = socket$unix(0x1, 0x2, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f0000000100)={'vcan0\x00', 0x0}) r2 = socket$can_bcm(0x1d, 0x2, 0x2) connect$can_bcm(r2, &(0x7f0000000000), 0x10) ioctl$sock_kcm_SIOCKCMUNATTACH(0xffffffffffffffff, 0x89e1, 0xffffffffffffffff) ioctl$sock_SIOCSPGRP(0xffffffffffffffff, 0x8902, 0x0) sendmsg$can_bcm(r2, &(0x7f0000000480)={&(0x7f0000000340)={0x1d, r1, 0x3f420f00}, 0x10, &(0x7f0000000040)={&(0x7f0000000580)=ANY=[@ANYBLOB="01000000d7fe68ca0000e9ffffff0000", @ANYRES64=0x0, @ANYRES64=0x0, @ANYRES64=0x0, @ANYBLOB="3bf81bb9f1"], 0x20000600}}, 0x0) r3 = socket(0x23, 0x800, 0x40000) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r3, 0x541b, &(0x7f00000000c0)={'ip6_vti0\x00', 0x0}) sendmsg$IPCTNL_MSG_EXP_DELETE(r3, &(0x7f00000004c0)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x40000040}, 0xc, &(0x7f0000000440)={&(0x7f00000006c0)={0x1d0, 0x2, 0x2, 0x201, 0x0, 0x0, {0xa}, [@CTA_EXPECT_NAT={0xc0, 0xa, 0x0, 0x1, [@CTA_EXPECT_NAT_TUPLE={0xc, 0x2, 0x0, 0x1, [@CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x1}]}, @CTA_EXPECT_NAT_TUPLE={0x70, 0x2, 0x0, 0x1, [@CTA_TUPLE_IP={0x2c, 0x1, 0x0, 0x1, @ipv6={{0x14, 0x3, @loopback}, {0x14, 0x4, @private0}}}, @CTA_TUPLE_IP={0x14, 0x1, 0x0, 0x1, @ipv4={{0x8, 0x1, @empty}, {0x8, 0x2, @initdev={0xac, 0x1e, 0x1, 0x0}}}}, @CTA_TUPLE_IP={0x14, 0x1, 0x0, 0x1, @ipv4={{0x8, 0x1, @local}, {0x8, 0x2, @loopback}}}, @CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x4}, @CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x3}, @CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x1}]}, @CTA_EXPECT_NAT_TUPLE={0x38, 0x2, 0x0, 0x1, [@CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5, 0x1, 0x88}}, @CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x3}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5, 0x1, 0x21}}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5, 0x1, 0x1}}, @CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x3}]}, @CTA_EXPECT_NAT_DIR={0x8}]}, @CTA_EXPECT_MASTER={0x20, 0x1, 0x0, 0x1, [@CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x1}, @CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x2}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5, 0x1, 0x84}}]}, @CTA_EXPECT_MASTER={0xdc, 0x1, 0x0, 0x1, [@CTA_TUPLE_IP={0x14, 0x1, 0x0, 0x1, @ipv4={{0x8, 0x1, @multicast1}, {0x8, 0x2, @dev={0xac, 0x14, 0x14, 0x3a}}}}, @CTA_TUPLE_ZONE={0x6}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5, 0x1, 0x21}}, @CTA_TUPLE_IP={0x14, 0x1, 0x0, 0x1, @ipv4={{0x8, 0x1, @empty}, {0x8, 0x2, @local}}}, @CTA_TUPLE_IP={0x2c, 0x1, 0x0, 0x1, @ipv6={{0x14, 0x3, @private1={0xfc, 0x1, '\x00', 0x1}}, {0x14, 0x4, @rand_addr=' \x01\x00'}}}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5, 0x1, 0x1}}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5, 0x1, 0x88}}, @CTA_TUPLE_IP={0x2c, 0x1, 0x0, 0x1, @ipv6={{0x14, 0x3, @empty}, {0x14, 0x4, @dev={0xfe, 0x80, '\x00', 0x21}}}}, @CTA_TUPLE_IP={0x2c, 0x1, 0x0, 0x1, @ipv6={{0x14, 0x3, @local}, {0x14, 0x4, @ipv4={'\x00', '\xff\xff', @rand_addr=0x64010100}}}}]}]}, 0x1d0}}, 0x48000) perf_event_open(&(0x7f0000000500)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x15, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$binfmt_elf32(0xffffffffffffffff, &(0x7f0000000040)=ANY=[], 0x69) connect$can_bcm(0xffffffffffffffff, &(0x7f0000000000), 0x10) sendmsg$can_bcm(0xffffffffffffffff, &(0x7f0000000480)={&(0x7f0000000340)={0x1d, 0x0, 0x3f420f00}, 0x10, &(0x7f0000000040)={&(0x7f0000000580)=ANY=[@ANYBLOB="01000000d7fe68ca0000e9ffffff0000", @ANYRES64=0x0, @ANYRES64=0x0, @ANYRES64=0x0, @ANYRES64], 0x20000600}}, 0x0) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(0xffffffffffffffff, 0x89f0, &(0x7f0000000280)={'gretap0\x00', &(0x7f0000000240)={'ip_vti0\x00', 0x0, 0x7, 0x80, 0xfffffff7, 0x7, {{0x8, 0x4, 0x0, 0x5, 0x20, 0x67, 0x0, 0xc0, 0x29, 0x0, @local, @empty, {[@timestamp={0x44, 0xc, 0x8, 0x0, 0x2, [0x7f, 0x1]}]}}}}}) socket(0x10, 0x3, 0x0) process_mrelease(0xffffffffffffffff, 0x0) r4 = socket$packet(0x11, 0x2, 0x300) ioctl$sock_SIOCGIFINDEX(r4, 0x8933, 0x0) getsockopt$inet_sctp_SCTP_RECVNXTINFO(r3, 0x84, 0x21, &(0x7f0000000140), &(0x7f0000000200)=0x4) bind$unix(r0, &(0x7f00000005c0)=@abs={0x1, 0x0, 0x4e23}, 0x6e) syz_clone(0x40000000, &(0x7f00000000c0), 0x0, 0x0, &(0x7f00000001c0), 0x0) 12:21:28 executing program 3: syz_open_dev$vcsu(&(0x7f0000000040), 0x0, 0x0) set_mempolicy(0x0, &(0x7f0000000000), 0x5bee) 12:21:28 executing program 4: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x82, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket(0x10, 0x803, 0x0) sendto(r0, &(0x7f00000000c0)="120000001200e7ef007b00000000000000a1", 0x12, 0x0, 0x0, 0x0) recvmmsg(r0, &(0x7f00000037c0)=[{{&(0x7f00000004c0)=@ethernet={0x0, @random}, 0x80, &(0x7f0000000380)=[{&(0x7f0000000040)=""/95, 0x5f}, {&(0x7f0000000140)=""/85, 0x55}, {&(0x7f0000000fc0)=""/4096, 0x1000}, {&(0x7f0000000400)=""/106, 0x6a}, {&(0x7f0000000740)=""/73, 0x49}, {&(0x7f0000000200)=""/77, 0x4d}, {0x0, 0xf00000000000000}], 0x7, &(0x7f0000000600)=""/191, 0xbf}}], 0x1, 0x0, &(0x7f0000003700)={0x77359400}) 12:21:28 executing program 2: open(&(0x7f0000000400)='./bus\x00', 0x14103e, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$L2TP_CMD_SESSION_MODIFY(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000080)={0x30, r1, 0x1, 0x0, 0xf, {}, [@L2TP_ATTR_SEND_SEQ={0x5}, @L2TP_ATTR_IFNAME={0x14, 0x8, 'veth1_to_hsr\x00'}]}, 0x30}}, 0x0) 12:21:28 executing program 1: syz_mount_image$ext4(&(0x7f0000000740)='ext4\x00', &(0x7f0000000100)='./bus\x00', 0x804810, &(0x7f0000000180)=ANY=[@ANYBLOB="0061021d307a961da7401271e3fa98008000001d3902ccfd562158cb15c016093893c9e4abd02bc4f1492514fa2dfebc8001000080000000008a1049ca0000"], 0x1, 0x73b, &(0x7f0000000780)="$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") chdir(&(0x7f0000000080)='./file0\x00') open(&(0x7f00000000c0)='./bus\x00', 0x14da42, 0x0) mount(&(0x7f0000000380)=@loop={'/dev/loop', 0x0}, &(0x7f00000003c0)='./bus\x00', 0x0, 0x1000, 0x0) r0 = open(&(0x7f0000000400)='./bus\x00', 0x0, 0x0) ioctl$LOOP_SET_STATUS(r0, 0x4c02, &(0x7f00000001c0)={0x0, {}, 0x0, {}, 0xff, 0x0, 0x0, 0x0, "be8176c9e6755a48a3c0230dd390efe12f8306bed95b2afd402aae879978d959ff9009eec610d9108ea036456bb79e26ee42d0a34968c1fdbb33e8ad5860f632", "b948757aa008fae13adca739a9f126462ab528ea52e90ce2cf50a4ef2568375b"}) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='blkio.throttle.io_service_bytes\x00', 0x275a, 0x200000) 12:21:28 executing program 2: open(&(0x7f0000000400)='./bus\x00', 0x14103e, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$L2TP_CMD_SESSION_MODIFY(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000080)={0x30, r1, 0x1, 0x0, 0x13, {}, [@L2TP_ATTR_SEND_SEQ={0x5}, @L2TP_ATTR_IFNAME={0x14, 0x8, 'veth1_to_hsr\x00'}]}, 0x30}}, 0x0) [ 996.748561][ T3655] loop1: detected capacity change from 2048 to 2047 12:21:28 executing program 3: r0 = socket$inet(0x2, 0xa, 0x0) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(r0, 0x89f1, 0x0) [ 996.807279][ T3128] EXT4-fs (loop1): unmounting filesystem 00000000-0000-0000-0000-000000000000. [ 996.910750][ T3677] loop1: detected capacity change from 0 to 2048 [ 996.993230][ T3677] EXT4-fs (loop1): mounted filesystem 00000000-0000-0000-0000-000000000000 without journal. Quota mode: none. [ 997.026379][ T3677] ext4 filesystem being mounted at /root/syzkaller-testdir1539738704/syzkaller.ao1jj3/3768/bus supports timestamps until 2038 (0x7fffffff) [ 997.112026][ T3677] loop1: detected capacity change from 2048 to 2047 [ 997.173185][ T3128] EXT4-fs (loop1): unmounting filesystem 00000000-0000-0000-0000-000000000000. 12:21:28 executing program 0: r0 = socket$unix(0x1, 0x2, 0x0) r1 = socket$can_bcm(0x1d, 0x2, 0x2) connect$can_bcm(r1, &(0x7f0000000000), 0x10) ioctl$sock_kcm_SIOCKCMUNATTACH(0xffffffffffffffff, 0x89e1, 0xffffffffffffffff) getsockopt$inet_sctp_SCTP_PEER_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1a, &(0x7f0000000380)={0x0, 0x7c, "f29c5b753353d9c7798811e57823354f32d6cb0899a53381003e4f8dbbb1ea469076c8e175a20b45443f885afb38b83813d5e013d4fad662f1582b23328b4ed70ad9d7d4d0052d0147d8b0ac4910985bec8aa8956c599d291a7da55fec010801d8f02dcff373f52f59f867378c13f4a080938c965846a7e8229b410b"}, &(0x7f00000002c0)=0x84) socket$igmp6(0xa, 0x3, 0x2) perf_event_open(&(0x7f0000000500)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x15, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) close(0xffffffffffffffff) socket$inet_mptcp(0x2, 0x1, 0x106) connect$can_bcm(0xffffffffffffffff, &(0x7f0000000000), 0x10) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, 0x0) bind$unix(r0, &(0x7f00000005c0)=@abs={0x1, 0x0, 0x4e23}, 0x6e) syz_clone(0x40000000, &(0x7f00000000c0), 0x0, 0x0, &(0x7f00000001c0), 0x0) 12:21:28 executing program 2: open(&(0x7f0000000400)='./bus\x00', 0x14103e, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$L2TP_CMD_SESSION_MODIFY(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000080)={0x30, r1, 0x1, 0x0, 0x60, {}, [@L2TP_ATTR_SEND_SEQ={0x5}, @L2TP_ATTR_IFNAME={0x14, 0x8, 'veth1_to_hsr\x00'}]}, 0x30}}, 0x0) 12:21:28 executing program 4: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x82, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket(0x10, 0x803, 0x0) sendto(r0, &(0x7f00000000c0)="120000001200e7ef007b00000000000000a1", 0x12, 0x0, 0x0, 0x0) recvmmsg(r0, &(0x7f00000037c0)=[{{&(0x7f00000004c0)=@ethernet={0x0, @random}, 0x80, &(0x7f0000000380)=[{&(0x7f0000000040)=""/95, 0x5f}, {&(0x7f0000000140)=""/85, 0x55}, {&(0x7f0000000fc0)=""/4096, 0x1000}, {&(0x7f0000000400)=""/106, 0x6a}, {&(0x7f0000000740)=""/73, 0x49}, {&(0x7f0000000200)=""/77, 0x4d}, {0x0, 0x1000000000000000}], 0x7, &(0x7f0000000600)=""/191, 0xbf}}], 0x1, 0x0, &(0x7f0000003700)={0x77359400}) 12:21:28 executing program 3: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r0, 0x402c582a, 0x0) 12:21:28 executing program 1: syz_mount_image$ext4(&(0x7f0000000740)='ext4\x00', &(0x7f0000000100)='./bus\x00', 0x804810, &(0x7f0000000180)=ANY=[@ANYBLOB="0061021d307a961da7401271e3fa98008000001d3902ccfd562158cb15c016093893c9e4abd02bc4f1492514fa2dfebc8001000080000000008a1049ca0000"], 0x1, 0x73b, &(0x7f0000000780)="$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") chdir(&(0x7f0000000080)='./file0\x00') open(&(0x7f00000000c0)='./bus\x00', 0x14da42, 0x0) mount(&(0x7f0000000380)=@loop={'/dev/loop', 0x0}, &(0x7f00000003c0)='./bus\x00', 0x0, 0x1000, 0x0) r0 = open(&(0x7f0000000400)='./bus\x00', 0x0, 0x0) ioctl$LOOP_SET_STATUS(r0, 0x4c02, &(0x7f00000001c0)={0x0, {}, 0x0, {}, 0xff, 0x0, 0x0, 0x0, "be8176c9e6755a48a3c0230dd390efe12f8306bed95b2afd402aae879978d959ff9009eec610d9108ea036456bb79e26ee42d0a34968c1fdbb33e8ad5860f632", "b948757aa008fae13adca739a9f126462ab528ea52e90ce2cf50a4ef2568375b"}) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='blkio.throttle.io_service_bytes\x00', 0x275a, 0x1000000) [ 997.381378][ T3688] loop1: detected capacity change from 0 to 2048 [ 997.415415][ T3688] EXT4-fs (loop1): mounted filesystem 00000000-0000-0000-0000-000000000000 without journal. Quota mode: none. [ 997.463365][ T3688] ext4 filesystem being mounted at /root/syzkaller-testdir1539738704/syzkaller.ao1jj3/3769/bus supports timestamps until 2038 (0x7fffffff) [ 997.544783][ T3688] loop1: detected capacity change from 2048 to 2047 12:21:29 executing program 2: open(&(0x7f0000000400)='./bus\x00', 0x14103e, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$L2TP_CMD_SESSION_MODIFY(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000080)={0x30, r1, 0x1, 0x0, 0x300, {}, [@L2TP_ATTR_SEND_SEQ={0x5}, @L2TP_ATTR_IFNAME={0x14, 0x8, 'veth1_to_hsr\x00'}]}, 0x30}}, 0x0) 12:21:29 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000040)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x10, 0x10, 0x2, [@int]}}, &(0x7f0000000080)=""/170, 0x2a, 0xaa, 0x1}, 0x20) 12:21:29 executing program 4: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x82, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket(0x10, 0x803, 0x0) sendto(r0, &(0x7f00000000c0)="120000001200e7ef007b00000000000000a1", 0x12, 0x0, 0x0, 0x0) recvmmsg(r0, &(0x7f00000037c0)=[{{&(0x7f00000004c0)=@ethernet={0x0, @random}, 0x80, &(0x7f0000000380)=[{&(0x7f0000000040)=""/95, 0x5f}, {&(0x7f0000000140)=""/85, 0x55}, {&(0x7f0000000fc0)=""/4096, 0x1000}, {&(0x7f0000000400)=""/106, 0x6a}, {&(0x7f0000000740)=""/73, 0x49}, {&(0x7f0000000200)=""/77, 0x4d}, {0x0, 0x4000000000000000}], 0x7, &(0x7f0000000600)=""/191, 0xbf}}], 0x1, 0x0, &(0x7f0000003700)={0x77359400}) 12:21:29 executing program 5: r0 = socket$unix(0x1, 0x2, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f0000000100)={'vcan0\x00', 0x0}) r2 = socket$can_bcm(0x1d, 0x2, 0x2) connect$can_bcm(r2, &(0x7f0000000000), 0x10) ioctl$sock_kcm_SIOCKCMUNATTACH(0xffffffffffffffff, 0x89e1, 0xffffffffffffffff) ioctl$sock_SIOCSPGRP(0xffffffffffffffff, 0x8902, 0x0) sendmsg$can_bcm(r2, &(0x7f0000000480)={&(0x7f0000000340)={0x1d, r1, 0x3f420f00}, 0x10, &(0x7f0000000040)={&(0x7f0000000580)=ANY=[@ANYBLOB="01000000d7fe68ca0000e9ffffff0000", @ANYRES64=0x0, @ANYRES64=0x0, @ANYRES64=0x0, @ANYBLOB="3bf81bb9f1"], 0x20000600}}, 0x0) r3 = socket(0x23, 0x800, 0x40000) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r3, 0x541b, &(0x7f00000000c0)={'ip6_vti0\x00', 0x0}) sendmsg$IPCTNL_MSG_EXP_DELETE(r3, &(0x7f00000004c0)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x40000040}, 0xc, &(0x7f0000000440)={&(0x7f00000006c0)={0x1d0, 0x2, 0x2, 0x201, 0x0, 0x0, {0xa}, [@CTA_EXPECT_NAT={0xc0, 0xa, 0x0, 0x1, [@CTA_EXPECT_NAT_TUPLE={0xc, 0x2, 0x0, 0x1, [@CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x1}]}, @CTA_EXPECT_NAT_TUPLE={0x70, 0x2, 0x0, 0x1, [@CTA_TUPLE_IP={0x2c, 0x1, 0x0, 0x1, @ipv6={{0x14, 0x3, @loopback}, {0x14, 0x4, @private0}}}, @CTA_TUPLE_IP={0x14, 0x1, 0x0, 0x1, @ipv4={{0x8, 0x1, @empty}, {0x8, 0x2, @initdev={0xac, 0x1e, 0x1, 0x0}}}}, @CTA_TUPLE_IP={0x14, 0x1, 0x0, 0x1, @ipv4={{0x8, 0x1, @local}, {0x8, 0x2, @loopback}}}, @CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x4}, @CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x3}, @CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x1}]}, @CTA_EXPECT_NAT_TUPLE={0x38, 0x2, 0x0, 0x1, [@CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5, 0x1, 0x88}}, @CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x3}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5, 0x1, 0x21}}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5, 0x1, 0x1}}, @CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x3}]}, @CTA_EXPECT_NAT_DIR={0x8}]}, @CTA_EXPECT_MASTER={0x20, 0x1, 0x0, 0x1, [@CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x1}, @CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x2}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5, 0x1, 0x84}}]}, @CTA_EXPECT_MASTER={0xdc, 0x1, 0x0, 0x1, [@CTA_TUPLE_IP={0x14, 0x1, 0x0, 0x1, @ipv4={{0x8, 0x1, @multicast1}, {0x8, 0x2, @dev={0xac, 0x14, 0x14, 0x3a}}}}, @CTA_TUPLE_ZONE={0x6}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5, 0x1, 0x21}}, @CTA_TUPLE_IP={0x14, 0x1, 0x0, 0x1, @ipv4={{0x8, 0x1, @empty}, {0x8, 0x2, @local}}}, @CTA_TUPLE_IP={0x2c, 0x1, 0x0, 0x1, @ipv6={{0x14, 0x3, @private1={0xfc, 0x1, '\x00', 0x1}}, {0x14, 0x4, @rand_addr=' \x01\x00'}}}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5, 0x1, 0x1}}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5, 0x1, 0x88}}, @CTA_TUPLE_IP={0x2c, 0x1, 0x0, 0x1, @ipv6={{0x14, 0x3, @empty}, {0x14, 0x4, @dev={0xfe, 0x80, '\x00', 0x21}}}}, @CTA_TUPLE_IP={0x2c, 0x1, 0x0, 0x1, @ipv6={{0x14, 0x3, @local}, {0x14, 0x4, @ipv4={'\x00', '\xff\xff', @rand_addr=0x64010100}}}}]}]}, 0x1d0}}, 0x48000) perf_event_open(&(0x7f0000000500)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x15, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$binfmt_elf32(0xffffffffffffffff, &(0x7f0000000040)=ANY=[], 0x69) connect$can_bcm(0xffffffffffffffff, &(0x7f0000000000), 0x10) sendmsg$can_bcm(0xffffffffffffffff, &(0x7f0000000480)={&(0x7f0000000340)={0x1d, 0x0, 0x3f420f00}, 0x10, &(0x7f0000000040)={&(0x7f0000000580)=ANY=[@ANYBLOB="01000000d7fe68ca0000e9ffffff0000", @ANYRES64=0x0, @ANYRES64=0x0, @ANYRES64=0x0, @ANYRES64], 0x20000600}}, 0x0) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(0xffffffffffffffff, 0x89f0, &(0x7f0000000280)={'gretap0\x00', &(0x7f0000000240)={'ip_vti0\x00', 0x0, 0x7, 0x80, 0xfffffff7, 0x7, {{0x8, 0x4, 0x0, 0x5, 0x20, 0x67, 0x0, 0xc0, 0x29, 0x0, @local, @empty, {[@timestamp={0x44, 0xc, 0x8, 0x0, 0x2, [0x7f, 0x1]}]}}}}}) socket(0x10, 0x3, 0x0) process_mrelease(0xffffffffffffffff, 0x0) r4 = socket$packet(0x11, 0x2, 0x300) ioctl$sock_SIOCGIFINDEX(r4, 0x8933, 0x0) getsockopt$inet_sctp_SCTP_RECVNXTINFO(r3, 0x84, 0x21, &(0x7f0000000140), &(0x7f0000000200)=0x4) bind$unix(r0, &(0x7f00000005c0)=@abs={0x1, 0x0, 0x4e23}, 0x6e) syz_clone(0x40000000, &(0x7f00000000c0), 0x0, 0x0, &(0x7f00000001c0), 0x0) 12:21:29 executing program 1: syz_mount_image$ext4(&(0x7f0000000740)='ext4\x00', &(0x7f0000000100)='./bus\x00', 0x804810, &(0x7f0000000180)=ANY=[@ANYBLOB="0061021d307a961da7401271e3fa98008000001d3902ccfd562158cb15c016093893c9e4abd02bc4f1492514fa2dfebc8001000080000000008a1049ca0000"], 0x1, 0x73b, &(0x7f0000000780)="$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") chdir(&(0x7f0000000080)='./file0\x00') open(&(0x7f00000000c0)='./bus\x00', 0x14da42, 0x0) mount(&(0x7f0000000380)=@loop={'/dev/loop', 0x0}, &(0x7f00000003c0)='./bus\x00', 0x0, 0x1000, 0x0) r0 = open(&(0x7f0000000400)='./bus\x00', 0x0, 0x0) ioctl$LOOP_SET_STATUS(r0, 0x4c02, &(0x7f00000001c0)={0x0, {}, 0x0, {}, 0xff, 0x0, 0x0, 0x0, "be8176c9e6755a48a3c0230dd390efe12f8306bed95b2afd402aae879978d959ff9009eec610d9108ea036456bb79e26ee42d0a34968c1fdbb33e8ad5860f632", "b948757aa008fae13adca739a9f126462ab528ea52e90ce2cf50a4ef2568375b"}) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='blkio.throttle.io_service_bytes\x00', 0x275a, 0x2000000) 12:21:29 executing program 2: open(&(0x7f0000000400)='./bus\x00', 0x14103e, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$L2TP_CMD_SESSION_MODIFY(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000080)={0x30, r1, 0x1, 0x0, 0x500, {}, [@L2TP_ATTR_SEND_SEQ={0x5}, @L2TP_ATTR_IFNAME={0x14, 0x8, 'veth1_to_hsr\x00'}]}, 0x30}}, 0x0) 12:21:29 executing program 3: fsopen(&(0x7f0000000280)='proc\x00', 0x0) [ 997.586384][ T3128] EXT4-fs (loop1): unmounting filesystem 00000000-0000-0000-0000-000000000000. [ 997.704414][ T3709] loop1: detected capacity change from 0 to 2048 [ 997.757465][ T3709] ext4 filesystem being mounted at /root/syzkaller-testdir1539738704/syzkaller.ao1jj3/3770/bus supports timestamps until 2038 (0x7fffffff) [ 997.815075][ T3709] loop1: detected capacity change from 2048 to 2047 12:21:29 executing program 0: r0 = socket$unix(0x1, 0x2, 0x0) r1 = socket$can_bcm(0x1d, 0x2, 0x2) connect$can_bcm(r1, &(0x7f0000000000), 0x10) ioctl$sock_kcm_SIOCKCMUNATTACH(0xffffffffffffffff, 0x89e1, 0xffffffffffffffff) getsockopt$inet_sctp_SCTP_PEER_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1a, &(0x7f0000000380)={0x0, 0x7c, "f29c5b753353d9c7798811e57823354f32d6cb0899a53381003e4f8dbbb1ea469076c8e175a20b45443f885afb38b83813d5e013d4fad662f1582b23328b4ed70ad9d7d4d0052d0147d8b0ac4910985bec8aa8956c599d291a7da55fec010801d8f02dcff373f52f59f867378c13f4a080938c965846a7e8229b410b"}, &(0x7f00000002c0)=0x84) socket$igmp6(0xa, 0x3, 0x2) perf_event_open(&(0x7f0000000500)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x15, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) close(0xffffffffffffffff) socket$inet_mptcp(0x2, 0x1, 0x106) connect$can_bcm(0xffffffffffffffff, &(0x7f0000000000), 0x10) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, 0x0) bind$unix(r0, &(0x7f00000005c0)=@abs={0x1, 0x0, 0x4e23}, 0x6e) syz_clone(0x40000000, &(0x7f00000000c0), 0x0, 0x0, &(0x7f00000001c0), 0x0) 12:21:29 executing program 4: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x82, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket(0x10, 0x803, 0x0) sendto(r0, &(0x7f00000000c0)="120000001200e7ef007b00000000000000a1", 0x12, 0x0, 0x0, 0x0) recvmmsg(r0, &(0x7f00000037c0)=[{{&(0x7f00000004c0)=@ethernet={0x0, @random}, 0x80, &(0x7f0000000380)=[{&(0x7f0000000040)=""/95, 0x5f}, {&(0x7f0000000140)=""/85, 0x55}, {&(0x7f0000000fc0)=""/4096, 0x1000}, {&(0x7f0000000400)=""/106, 0x6a}, {&(0x7f0000000740)=""/73, 0x49}, {&(0x7f0000000200)=""/77, 0x4d}, {0x0, 0x4cdeff7f00000000}], 0x7, &(0x7f0000000600)=""/191, 0xbf}}], 0x1, 0x0, &(0x7f0000003700)={0x77359400}) 12:21:29 executing program 2: open(&(0x7f0000000400)='./bus\x00', 0x14103e, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$L2TP_CMD_SESSION_MODIFY(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000080)={0x30, r1, 0x1, 0x0, 0x600, {}, [@L2TP_ATTR_SEND_SEQ={0x5}, @L2TP_ATTR_IFNAME={0x14, 0x8, 'veth1_to_hsr\x00'}]}, 0x30}}, 0x0) 12:21:29 executing program 3: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r0, 0x894a, &(0x7f0000000600)={'ip6gre0\x00', 0x0}) 12:21:29 executing program 1: syz_mount_image$ext4(&(0x7f0000000740)='ext4\x00', &(0x7f0000000100)='./bus\x00', 0x804810, &(0x7f0000000180)=ANY=[@ANYBLOB="0061021d307a961da7401271e3fa98008000001d3902ccfd562158cb15c016093893c9e4abd02bc4f1492514fa2dfebc8001000080000000008a1049ca0000"], 0x1, 0x73b, &(0x7f0000000780)="$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") chdir(&(0x7f0000000080)='./file0\x00') open(&(0x7f00000000c0)='./bus\x00', 0x14da42, 0x0) mount(&(0x7f0000000380)=@loop={'/dev/loop', 0x0}, &(0x7f00000003c0)='./bus\x00', 0x0, 0x1000, 0x0) r0 = open(&(0x7f0000000400)='./bus\x00', 0x0, 0x0) ioctl$LOOP_SET_STATUS(r0, 0x4c02, &(0x7f00000001c0)={0x0, {}, 0x0, {}, 0xff, 0x0, 0x0, 0x0, "be8176c9e6755a48a3c0230dd390efe12f8306bed95b2afd402aae879978d959ff9009eec610d9108ea036456bb79e26ee42d0a34968c1fdbb33e8ad5860f632", "b948757aa008fae13adca739a9f126462ab528ea52e90ce2cf50a4ef2568375b"}) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='blkio.throttle.io_service_bytes\x00', 0x275a, 0x2040000) 12:21:29 executing program 2: open(&(0x7f0000000400)='./bus\x00', 0x14103e, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$L2TP_CMD_SESSION_MODIFY(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000080)={0x30, r1, 0x1, 0x0, 0x700, {}, [@L2TP_ATTR_SEND_SEQ={0x5}, @L2TP_ATTR_IFNAME={0x14, 0x8, 'veth1_to_hsr\x00'}]}, 0x30}}, 0x0) 12:21:29 executing program 3: r0 = openat$nvram(0xffffff9c, &(0x7f0000000080), 0x0, 0x0) read$msr(r0, &(0x7f00000000c0)=""/167, 0xa7) 12:21:29 executing program 4: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x82, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket(0x10, 0x803, 0x0) sendto(r0, &(0x7f00000000c0)="120000001200e7ef007b00000000000000a1", 0x12, 0x0, 0x0, 0x0) recvmmsg(r0, &(0x7f00000037c0)=[{{&(0x7f00000004c0)=@ethernet={0x0, @random}, 0x80, &(0x7f0000000380)=[{&(0x7f0000000040)=""/95, 0x5f}, {&(0x7f0000000140)=""/85, 0x55}, {&(0x7f0000000fc0)=""/4096, 0x1000}, {&(0x7f0000000400)=""/106, 0x6a}, {&(0x7f0000000740)=""/73, 0x49}, {&(0x7f0000000200)=""/77, 0x4d}, {0x0, 0x6000000000000000}], 0x7, &(0x7f0000000600)=""/191, 0xbf}}], 0x1, 0x0, &(0x7f0000003700)={0x77359400}) [ 998.152785][ T3719] loop1: detected capacity change from 0 to 2048 [ 998.210589][ T3719] ext4 filesystem being mounted at /root/syzkaller-testdir1539738704/syzkaller.ao1jj3/3771/bus supports timestamps until 2038 (0x7fffffff) [ 998.292317][ T3719] loop1: detected capacity change from 2048 to 2047 12:21:29 executing program 5: r0 = socket$unix(0x1, 0x2, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f0000000100)={'vcan0\x00', 0x0}) r2 = socket$can_bcm(0x1d, 0x2, 0x2) connect$can_bcm(r2, &(0x7f0000000000), 0x10) ioctl$sock_kcm_SIOCKCMUNATTACH(0xffffffffffffffff, 0x89e1, 0xffffffffffffffff) ioctl$sock_SIOCSPGRP(0xffffffffffffffff, 0x8902, 0x0) sendmsg$can_bcm(r2, &(0x7f0000000480)={&(0x7f0000000340)={0x1d, r1, 0x3f420f00}, 0x10, &(0x7f0000000040)={&(0x7f0000000580)=ANY=[@ANYBLOB="01000000d7fe68ca0000e9ffffff0000", @ANYRES64=0x0, @ANYRES64=0x0, @ANYRES64=0x0, @ANYRES64, @ANYBLOB="3bf81bb9f1"], 0x20000600}}, 0x0) r3 = socket(0x23, 0x800, 0x40000) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r3, 0x541b, &(0x7f00000000c0)={'ip6_vti0\x00', 0x0}) sendmsg$IPCTNL_MSG_EXP_DELETE(r3, &(0x7f00000004c0)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x40000040}, 0xc, &(0x7f0000000440)={&(0x7f00000006c0)={0x1d0, 0x2, 0x2, 0x201, 0x0, 0x0, {0xa}, [@CTA_EXPECT_NAT={0xc0, 0xa, 0x0, 0x1, [@CTA_EXPECT_NAT_TUPLE={0xc, 0x2, 0x0, 0x1, [@CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x1}]}, @CTA_EXPECT_NAT_TUPLE={0x70, 0x2, 0x0, 0x1, [@CTA_TUPLE_IP={0x2c, 0x1, 0x0, 0x1, @ipv6={{0x14, 0x3, @loopback}, {0x14, 0x4, @private0}}}, @CTA_TUPLE_IP={0x14, 0x1, 0x0, 0x1, @ipv4={{0x8, 0x1, @empty}, {0x8, 0x2, @initdev={0xac, 0x1e, 0x1, 0x0}}}}, @CTA_TUPLE_IP={0x14, 0x1, 0x0, 0x1, @ipv4={{0x8, 0x1, @local}, {0x8, 0x2, @loopback}}}, @CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x4}, @CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x3}, @CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x1}]}, @CTA_EXPECT_NAT_TUPLE={0x38, 0x2, 0x0, 0x1, [@CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5, 0x1, 0x88}}, @CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x3}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5, 0x1, 0x21}}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5, 0x1, 0x1}}, @CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x3}]}, @CTA_EXPECT_NAT_DIR={0x8}]}, @CTA_EXPECT_MASTER={0x20, 0x1, 0x0, 0x1, [@CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x1}, @CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x2}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5, 0x1, 0x84}}]}, @CTA_EXPECT_MASTER={0xdc, 0x1, 0x0, 0x1, [@CTA_TUPLE_IP={0x14, 0x1, 0x0, 0x1, @ipv4={{0x8, 0x1, @multicast1}, {0x8, 0x2, @dev={0xac, 0x14, 0x14, 0x3a}}}}, @CTA_TUPLE_ZONE={0x6}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5, 0x1, 0x21}}, @CTA_TUPLE_IP={0x14, 0x1, 0x0, 0x1, @ipv4={{0x8, 0x1, @empty}, {0x8, 0x2, @local}}}, @CTA_TUPLE_IP={0x2c, 0x1, 0x0, 0x1, @ipv6={{0x14, 0x3, @private1={0xfc, 0x1, '\x00', 0x1}}, {0x14, 0x4, @rand_addr=' \x01\x00'}}}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5, 0x1, 0x1}}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5, 0x1, 0x88}}, @CTA_TUPLE_IP={0x2c, 0x1, 0x0, 0x1, @ipv6={{0x14, 0x3, @empty}, {0x14, 0x4, @dev={0xfe, 0x80, '\x00', 0x21}}}}, @CTA_TUPLE_IP={0x2c, 0x1, 0x0, 0x1, @ipv6={{0x14, 0x3, @local}, {0x14, 0x4, @ipv4={'\x00', '\xff\xff', @rand_addr=0x64010100}}}}]}]}, 0x1d0}}, 0x48000) perf_event_open(&(0x7f0000000500)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x15, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$binfmt_elf32(0xffffffffffffffff, &(0x7f0000000040)=ANY=[], 0x69) connect$can_bcm(0xffffffffffffffff, &(0x7f0000000000), 0x10) sendmsg$can_bcm(0xffffffffffffffff, &(0x7f0000000480)={&(0x7f0000000340)={0x1d, 0x0, 0x3f420f00}, 0x10, &(0x7f0000000040)={&(0x7f0000000580)=ANY=[@ANYBLOB="01000000d7fe68ca0000e9ffffff0000", @ANYRES64=0x0, @ANYRES64=0x0, @ANYRES64=0x0, @ANYRES64], 0x20000600}}, 0x0) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(0xffffffffffffffff, 0x89f0, &(0x7f0000000280)={'gretap0\x00', &(0x7f0000000240)={'ip_vti0\x00', 0x0, 0x7, 0x80, 0xfffffff7, 0x7, {{0x8, 0x4, 0x0, 0x5, 0x20, 0x67, 0x0, 0xc0, 0x29, 0x0, @local, @empty, {[@timestamp={0x44, 0xc, 0x8, 0x0, 0x2, [0x7f, 0x1]}]}}}}}) socket(0x10, 0x3, 0x0) process_mrelease(0xffffffffffffffff, 0x0) r4 = socket$packet(0x11, 0x2, 0x300) ioctl$sock_SIOCGIFINDEX(r4, 0x8933, 0x0) getsockopt$inet_sctp_SCTP_RECVNXTINFO(r3, 0x84, 0x21, &(0x7f0000000140), &(0x7f0000000200)=0x4) bind$unix(r0, &(0x7f00000005c0)=@abs={0x1, 0x0, 0x4e23}, 0x6e) syz_clone(0x40000000, &(0x7f00000000c0), 0x0, 0x0, &(0x7f00000001c0), 0x0) 12:21:29 executing program 2: open(&(0x7f0000000400)='./bus\x00', 0x14103e, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$L2TP_CMD_SESSION_MODIFY(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000080)={0x30, r1, 0x1, 0x0, 0x900, {}, [@L2TP_ATTR_SEND_SEQ={0x5}, @L2TP_ATTR_IFNAME={0x14, 0x8, 'veth1_to_hsr\x00'}]}, 0x30}}, 0x0) 12:21:29 executing program 3: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r0, 0x8904, &(0x7f0000000600)={'ip6gre0\x00', 0x0}) 12:21:29 executing program 4: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x82, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket(0x10, 0x803, 0x0) sendto(r0, &(0x7f00000000c0)="120000001200e7ef007b00000000000000a1", 0x12, 0x0, 0x0, 0x0) recvmmsg(r0, &(0x7f00000037c0)=[{{&(0x7f00000004c0)=@ethernet={0x0, @random}, 0x80, &(0x7f0000000380)=[{&(0x7f0000000040)=""/95, 0x5f}, {&(0x7f0000000140)=""/85, 0x55}, {&(0x7f0000000fc0)=""/4096, 0x1000}, {&(0x7f0000000400)=""/106, 0x6a}, {&(0x7f0000000740)=""/73, 0x49}, {&(0x7f0000000200)=""/77, 0x4d}, {0x0, 0x6558000000000000}], 0x7, &(0x7f0000000600)=""/191, 0xbf}}], 0x1, 0x0, &(0x7f0000003700)={0x77359400}) 12:21:30 executing program 0: r0 = socket$unix(0x1, 0x2, 0x0) r1 = socket$can_bcm(0x1d, 0x2, 0x2) connect$can_bcm(r1, &(0x7f0000000000), 0x10) ioctl$sock_kcm_SIOCKCMUNATTACH(0xffffffffffffffff, 0x89e1, 0xffffffffffffffff) getsockopt$inet_sctp_SCTP_PEER_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1a, &(0x7f0000000380)={0x0, 0x7e, "f29c5b753353d9c7798811e57823354f32d6cb0899a53381003e4f8dbbb1ea469076c8e175a20b45443f885afb38b83813d5e013d4fad662f1582b23328b4ed70ad9d7d4d0052d0147d8b0ac4910985bec8aa8956c599d291a7da55fec010801d8f02dcff373f52f59f867378c13f4a080938c965846a7e8229b410b3ea0"}, &(0x7f00000002c0)=0x86) socket$igmp6(0xa, 0x3, 0x2) perf_event_open(&(0x7f0000000500)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x15, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) close(0xffffffffffffffff) socket$inet_mptcp(0x2, 0x1, 0x106) connect$can_bcm(0xffffffffffffffff, &(0x7f0000000000), 0x10) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, 0x0) bind$unix(r0, &(0x7f00000005c0)=@abs={0x1, 0x0, 0x4e23}, 0x6e) syz_clone(0x40000000, &(0x7f00000000c0), 0x0, 0x0, &(0x7f00000001c0), 0x0) 12:21:30 executing program 1: syz_mount_image$ext4(&(0x7f0000000740)='ext4\x00', &(0x7f0000000100)='./bus\x00', 0x804810, &(0x7f0000000180)=ANY=[@ANYBLOB="0061021d307a961da7401271e3fa98008000001d3902ccfd562158cb15c016093893c9e4abd02bc4f1492514fa2dfebc8001000080000000008a1049ca0000"], 0x1, 0x73b, &(0x7f0000000780)="$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") chdir(&(0x7f0000000080)='./file0\x00') open(&(0x7f00000000c0)='./bus\x00', 0x14da42, 0x0) mount(&(0x7f0000000380)=@loop={'/dev/loop', 0x0}, &(0x7f00000003c0)='./bus\x00', 0x0, 0x1000, 0x0) r0 = open(&(0x7f0000000400)='./bus\x00', 0x0, 0x0) ioctl$LOOP_SET_STATUS(r0, 0x4c02, &(0x7f00000001c0)={0x0, {}, 0x0, {}, 0xff, 0x0, 0x0, 0x0, "be8176c9e6755a48a3c0230dd390efe12f8306bed95b2afd402aae879978d959ff9009eec610d9108ea036456bb79e26ee42d0a34968c1fdbb33e8ad5860f632", "b948757aa008fae13adca739a9f126462ab528ea52e90ce2cf50a4ef2568375b"}) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='blkio.throttle.io_service_bytes\x00', 0x275a, 0x3000000) 12:21:30 executing program 2: open(&(0x7f0000000400)='./bus\x00', 0x14103e, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$L2TP_CMD_SESSION_MODIFY(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000080)={0x30, r1, 0x1, 0x0, 0xf00, {}, [@L2TP_ATTR_SEND_SEQ={0x5}, @L2TP_ATTR_IFNAME={0x14, 0x8, 'veth1_to_hsr\x00'}]}, 0x30}}, 0x0) 12:21:30 executing program 3: bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000280)=@bpf_lsm={0x1b, 0x3, &(0x7f0000000000)=@framed, &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 12:21:30 executing program 4: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x82, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket(0x10, 0x803, 0x0) sendto(r0, &(0x7f00000000c0)="120000001200e7ef007b00000000000000a1", 0x12, 0x0, 0x0, 0x0) recvmmsg(r0, &(0x7f00000037c0)=[{{&(0x7f00000004c0)=@ethernet={0x0, @random}, 0x80, &(0x7f0000000380)=[{&(0x7f0000000040)=""/95, 0x5f}, {&(0x7f0000000140)=""/85, 0x55}, {&(0x7f0000000fc0)=""/4096, 0x1000}, {&(0x7f0000000400)=""/106, 0x6a}, {&(0x7f0000000740)=""/73, 0x49}, {&(0x7f0000000200)=""/77, 0x4d}, {0x0, 0x8100000000000000}], 0x7, &(0x7f0000000600)=""/191, 0xbf}}], 0x1, 0x0, &(0x7f0000003700)={0x77359400}) 12:21:30 executing program 3: openat$vsock(0xffffff9c, &(0x7f0000000000), 0x0, 0x0) waitid$P_PIDFD(0x3, 0xffffffffffffffff, &(0x7f0000001500), 0x2, 0x0) 12:21:30 executing program 2: open(&(0x7f0000000400)='./bus\x00', 0x14103e, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$L2TP_CMD_SESSION_MODIFY(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000080)={0x30, r1, 0x1, 0x0, 0x1300, {}, [@L2TP_ATTR_SEND_SEQ={0x5}, @L2TP_ATTR_IFNAME={0x14, 0x8, 'veth1_to_hsr\x00'}]}, 0x30}}, 0x0) 12:21:30 executing program 3: getresgid(&(0x7f00000010c0), 0x0, 0x0) [ 998.795583][ T3750] loop1: detected capacity change from 0 to 2048 [ 998.863264][ T3750] ext4 filesystem being mounted at /root/syzkaller-testdir1539738704/syzkaller.ao1jj3/3772/bus supports timestamps until 2038 (0x7fffffff) [ 998.951904][ T3750] loop1: detected capacity change from 2048 to 2047 12:21:30 executing program 2: open(&(0x7f0000000400)='./bus\x00', 0x14103e, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$L2TP_CMD_SESSION_MODIFY(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000080)={0x30, r1, 0x1, 0x0, 0x25d1, {}, [@L2TP_ATTR_SEND_SEQ={0x5}, @L2TP_ATTR_IFNAME={0x14, 0x8, 'veth1_to_hsr\x00'}]}, 0x30}}, 0x0) 12:21:30 executing program 4: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x82, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket(0x10, 0x803, 0x0) sendto(r0, &(0x7f00000000c0)="120000001200e7ef007b00000000000000a1", 0x12, 0x0, 0x0, 0x0) recvmmsg(r0, &(0x7f00000037c0)=[{{&(0x7f00000004c0)=@ethernet={0x0, @random}, 0x80, &(0x7f0000000380)=[{&(0x7f0000000040)=""/95, 0x5f}, {&(0x7f0000000140)=""/85, 0x55}, {&(0x7f0000000fc0)=""/4096, 0x1000}, {&(0x7f0000000400)=""/106, 0x6a}, {&(0x7f0000000740)=""/73, 0x49}, {&(0x7f0000000200)=""/77, 0x4d}, {0x0, 0x8847000000000000}], 0x7, &(0x7f0000000600)=""/191, 0xbf}}], 0x1, 0x0, &(0x7f0000003700)={0x77359400}) 12:21:30 executing program 3: bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000280)=@bpf_lsm={0x1a, 0x3, &(0x7f0000000000)=@framed, &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 12:21:30 executing program 5: r0 = socket$unix(0x1, 0x2, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f0000000100)={'vcan0\x00', 0x0}) r2 = socket$can_bcm(0x1d, 0x2, 0x2) connect$can_bcm(r2, &(0x7f0000000000), 0x10) ioctl$sock_kcm_SIOCKCMUNATTACH(0xffffffffffffffff, 0x89e1, 0xffffffffffffffff) ioctl$sock_SIOCSPGRP(0xffffffffffffffff, 0x8902, 0x0) sendmsg$can_bcm(r2, &(0x7f0000000480)={&(0x7f0000000340)={0x1d, r1, 0x3f420f00}, 0x10, &(0x7f0000000040)={&(0x7f0000000580)=ANY=[@ANYBLOB="01000000d7fe68ca0000e9ffffff0000", @ANYRES64=0x0, @ANYRES64=0x0, @ANYRES64=0x0, @ANYRES64, @ANYBLOB="3bf81bb9f1"], 0x20000600}}, 0x0) r3 = socket(0x23, 0x800, 0x40000) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r3, 0x541b, &(0x7f00000000c0)={'ip6_vti0\x00', 0x0}) sendmsg$IPCTNL_MSG_EXP_DELETE(r3, &(0x7f00000004c0)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x40000040}, 0xc, &(0x7f0000000440)={&(0x7f00000006c0)={0x1d0, 0x2, 0x2, 0x201, 0x0, 0x0, {0xa}, [@CTA_EXPECT_NAT={0xc0, 0xa, 0x0, 0x1, [@CTA_EXPECT_NAT_TUPLE={0xc, 0x2, 0x0, 0x1, [@CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x1}]}, @CTA_EXPECT_NAT_TUPLE={0x70, 0x2, 0x0, 0x1, [@CTA_TUPLE_IP={0x2c, 0x1, 0x0, 0x1, @ipv6={{0x14, 0x3, @loopback}, {0x14, 0x4, @private0}}}, @CTA_TUPLE_IP={0x14, 0x1, 0x0, 0x1, @ipv4={{0x8, 0x1, @empty}, {0x8, 0x2, @initdev={0xac, 0x1e, 0x1, 0x0}}}}, @CTA_TUPLE_IP={0x14, 0x1, 0x0, 0x1, @ipv4={{0x8, 0x1, @local}, {0x8, 0x2, @loopback}}}, @CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x4}, @CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x3}, @CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x1}]}, @CTA_EXPECT_NAT_TUPLE={0x38, 0x2, 0x0, 0x1, [@CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5, 0x1, 0x88}}, @CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x3}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5, 0x1, 0x21}}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5, 0x1, 0x1}}, @CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x3}]}, @CTA_EXPECT_NAT_DIR={0x8}]}, @CTA_EXPECT_MASTER={0x20, 0x1, 0x0, 0x1, [@CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x1}, @CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x2}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5, 0x1, 0x84}}]}, @CTA_EXPECT_MASTER={0xdc, 0x1, 0x0, 0x1, [@CTA_TUPLE_IP={0x14, 0x1, 0x0, 0x1, @ipv4={{0x8, 0x1, @multicast1}, {0x8, 0x2, @dev={0xac, 0x14, 0x14, 0x3a}}}}, @CTA_TUPLE_ZONE={0x6}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5, 0x1, 0x21}}, @CTA_TUPLE_IP={0x14, 0x1, 0x0, 0x1, @ipv4={{0x8, 0x1, @empty}, {0x8, 0x2, @local}}}, @CTA_TUPLE_IP={0x2c, 0x1, 0x0, 0x1, @ipv6={{0x14, 0x3, @private1={0xfc, 0x1, '\x00', 0x1}}, {0x14, 0x4, @rand_addr=' \x01\x00'}}}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5, 0x1, 0x1}}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5, 0x1, 0x88}}, @CTA_TUPLE_IP={0x2c, 0x1, 0x0, 0x1, @ipv6={{0x14, 0x3, @empty}, {0x14, 0x4, @dev={0xfe, 0x80, '\x00', 0x21}}}}, @CTA_TUPLE_IP={0x2c, 0x1, 0x0, 0x1, @ipv6={{0x14, 0x3, @local}, {0x14, 0x4, @ipv4={'\x00', '\xff\xff', @rand_addr=0x64010100}}}}]}]}, 0x1d0}}, 0x48000) perf_event_open(&(0x7f0000000500)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x15, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$binfmt_elf32(0xffffffffffffffff, &(0x7f0000000040)=ANY=[], 0x69) connect$can_bcm(0xffffffffffffffff, &(0x7f0000000000), 0x10) sendmsg$can_bcm(0xffffffffffffffff, &(0x7f0000000480)={&(0x7f0000000340)={0x1d, 0x0, 0x3f420f00}, 0x10, &(0x7f0000000040)={&(0x7f0000000580)=ANY=[@ANYBLOB="01000000d7fe68ca0000e9ffffff0000", @ANYRES64=0x0, @ANYRES64=0x0, @ANYRES64=0x0, @ANYRES64], 0x20000600}}, 0x0) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(0xffffffffffffffff, 0x89f0, &(0x7f0000000280)={'gretap0\x00', &(0x7f0000000240)={'ip_vti0\x00', 0x0, 0x7, 0x80, 0xfffffff7, 0x7, {{0x8, 0x4, 0x0, 0x5, 0x20, 0x67, 0x0, 0xc0, 0x29, 0x0, @local, @empty, {[@timestamp={0x44, 0xc, 0x8, 0x0, 0x2, [0x7f, 0x1]}]}}}}}) socket(0x10, 0x3, 0x0) process_mrelease(0xffffffffffffffff, 0x0) r4 = socket$packet(0x11, 0x2, 0x300) ioctl$sock_SIOCGIFINDEX(r4, 0x8933, 0x0) getsockopt$inet_sctp_SCTP_RECVNXTINFO(r3, 0x84, 0x21, &(0x7f0000000140), &(0x7f0000000200)=0x4) bind$unix(r0, &(0x7f00000005c0)=@abs={0x1, 0x0, 0x4e23}, 0x6e) syz_clone(0x40000000, &(0x7f00000000c0), 0x0, 0x0, &(0x7f00000001c0), 0x0) 12:21:31 executing program 0: r0 = socket$unix(0x1, 0x2, 0x0) r1 = socket$can_bcm(0x1d, 0x2, 0x2) connect$can_bcm(r1, &(0x7f0000000000), 0x10) ioctl$sock_kcm_SIOCKCMUNATTACH(0xffffffffffffffff, 0x89e1, 0xffffffffffffffff) getsockopt$inet_sctp_SCTP_PEER_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1a, &(0x7f0000000380)={0x0, 0x7e, "f29c5b753353d9c7798811e57823354f32d6cb0899a53381003e4f8dbbb1ea469076c8e175a20b45443f885afb38b83813d5e013d4fad662f1582b23328b4ed70ad9d7d4d0052d0147d8b0ac4910985bec8aa8956c599d291a7da55fec010801d8f02dcff373f52f59f867378c13f4a080938c965846a7e8229b410b3ea0"}, &(0x7f00000002c0)=0x86) socket$igmp6(0xa, 0x3, 0x2) perf_event_open(&(0x7f0000000500)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x15, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) close(0xffffffffffffffff) socket$inet_mptcp(0x2, 0x1, 0x106) connect$can_bcm(0xffffffffffffffff, &(0x7f0000000000), 0x10) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, 0x0) bind$unix(r0, &(0x7f00000005c0)=@abs={0x1, 0x0, 0x4e23}, 0x6e) syz_clone(0x40000000, &(0x7f00000000c0), 0x0, 0x0, &(0x7f00000001c0), 0x0) 12:21:31 executing program 1: syz_mount_image$ext4(&(0x7f0000000740)='ext4\x00', &(0x7f0000000100)='./bus\x00', 0x804810, &(0x7f0000000180)=ANY=[@ANYBLOB="0061021d307a961da7401271e3fa98008000001d3902ccfd562158cb15c016093893c9e4abd02bc4f1492514fa2dfebc8001000080000000008a1049ca0000"], 0x1, 0x73b, &(0x7f0000000780)="$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") chdir(&(0x7f0000000080)='./file0\x00') open(&(0x7f00000000c0)='./bus\x00', 0x14da42, 0x0) mount(&(0x7f0000000380)=@loop={'/dev/loop', 0x0}, &(0x7f00000003c0)='./bus\x00', 0x0, 0x1000, 0x0) r0 = open(&(0x7f0000000400)='./bus\x00', 0x0, 0x0) ioctl$LOOP_SET_STATUS(r0, 0x4c02, &(0x7f00000001c0)={0x0, {}, 0x0, {}, 0xff, 0x0, 0x0, 0x0, "be8176c9e6755a48a3c0230dd390efe12f8306bed95b2afd402aae879978d959ff9009eec610d9108ea036456bb79e26ee42d0a34968c1fdbb33e8ad5860f632", "b948757aa008fae13adca739a9f126462ab528ea52e90ce2cf50a4ef2568375b"}) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='blkio.throttle.io_service_bytes\x00', 0x275a, 0x4000000) 12:21:31 executing program 2: open(&(0x7f0000000400)='./bus\x00', 0x14103e, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$L2TP_CMD_SESSION_MODIFY(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000080)={0x30, r1, 0x1, 0x0, 0x6000, {}, [@L2TP_ATTR_SEND_SEQ={0x5}, @L2TP_ATTR_IFNAME={0x14, 0x8, 'veth1_to_hsr\x00'}]}, 0x30}}, 0x0) 12:21:31 executing program 3: r0 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_SIOCGIFVLAN_GET_VLAN_REALDEV_NAME_CMD(r0, 0x8982, &(0x7f0000000000)={0x8, 'virt_wifi0\x00', {'hsr0\x00'}}) 12:21:31 executing program 4: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x82, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket(0x10, 0x803, 0x0) sendto(r0, &(0x7f00000000c0)="120000001200e7ef007b00000000000000a1", 0x12, 0x0, 0x0, 0x0) recvmmsg(r0, &(0x7f00000037c0)=[{{&(0x7f00000004c0)=@ethernet={0x0, @random}, 0x80, &(0x7f0000000380)=[{&(0x7f0000000040)=""/95, 0x5f}, {&(0x7f0000000140)=""/85, 0x55}, {&(0x7f0000000fc0)=""/4096, 0x1000}, {&(0x7f0000000400)=""/106, 0x6a}, {&(0x7f0000000740)=""/73, 0x49}, {&(0x7f0000000200)=""/77, 0x4d}, {0x0, 0x8848000000000000}], 0x7, &(0x7f0000000600)=""/191, 0xbf}}], 0x1, 0x0, &(0x7f0000003700)={0x77359400}) 12:21:31 executing program 2: open(&(0x7f0000000400)='./bus\x00', 0x14103e, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$L2TP_CMD_SESSION_MODIFY(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000080)={0x30, r1, 0x1, 0x0, 0xd125, {}, [@L2TP_ATTR_SEND_SEQ={0x5}, @L2TP_ATTR_IFNAME={0x14, 0x8, 'veth1_to_hsr\x00'}]}, 0x30}}, 0x0) 12:21:31 executing program 2: open(&(0x7f0000000400)='./bus\x00', 0x14103e, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$L2TP_CMD_SESSION_MODIFY(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000080)={0x30, r1, 0x1, 0x0, 0x30000, {}, [@L2TP_ATTR_SEND_SEQ={0x5}, @L2TP_ATTR_IFNAME={0x14, 0x8, 'veth1_to_hsr\x00'}]}, 0x30}}, 0x0) 12:21:31 executing program 2: open(&(0x7f0000000400)='./bus\x00', 0x14103e, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$L2TP_CMD_SESSION_MODIFY(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000080)={0x30, r1, 0x1, 0x0, 0x34000, {}, [@L2TP_ATTR_SEND_SEQ={0x5}, @L2TP_ATTR_IFNAME={0x14, 0x8, 'veth1_to_hsr\x00'}]}, 0x30}}, 0x0) [ 999.812132][ T3784] loop1: detected capacity change from 0 to 2048 12:21:31 executing program 2: open(&(0x7f0000000400)='./bus\x00', 0x14103e, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$L2TP_CMD_SESSION_MODIFY(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000080)={0x30, r1, 0x1, 0x0, 0x400300, {}, [@L2TP_ATTR_SEND_SEQ={0x5}, @L2TP_ATTR_IFNAME={0x14, 0x8, 'veth1_to_hsr\x00'}]}, 0x30}}, 0x0) 12:21:31 executing program 2: open(&(0x7f0000000400)='./bus\x00', 0x14103e, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$L2TP_CMD_SESSION_MODIFY(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000080)={0x30, r1, 0x1, 0x0, 0x1000000, {}, [@L2TP_ATTR_SEND_SEQ={0x5}, @L2TP_ATTR_IFNAME={0x14, 0x8, 'veth1_to_hsr\x00'}]}, 0x30}}, 0x0) [ 999.877125][ T3784] ext4 filesystem being mounted at /root/syzkaller-testdir1539738704/syzkaller.ao1jj3/3773/bus supports timestamps until 2038 (0x7fffffff) 12:21:31 executing program 3: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_TCP_REPAIR_OPTIONS(r0, 0x6, 0x16, &(0x7f0000000080)=[@mss, @timestamp, @mss, @mss], 0x4) [ 999.942021][ T3784] loop1: detected capacity change from 2048 to 2047 12:21:31 executing program 5: r0 = socket$unix(0x1, 0x2, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f0000000100)={'vcan0\x00', 0x0}) r2 = socket$can_bcm(0x1d, 0x2, 0x2) connect$can_bcm(r2, &(0x7f0000000000), 0x10) ioctl$sock_kcm_SIOCKCMUNATTACH(0xffffffffffffffff, 0x89e1, 0xffffffffffffffff) ioctl$sock_SIOCSPGRP(0xffffffffffffffff, 0x8902, 0x0) sendmsg$can_bcm(r2, &(0x7f0000000480)={&(0x7f0000000340)={0x1d, r1, 0x3f420f00}, 0x10, &(0x7f0000000040)={&(0x7f0000000580)=ANY=[@ANYBLOB="01000000d7fe68ca0000e9ffffff0000", @ANYRES64=0x0, @ANYRES64=0x0, @ANYRES64=0x0, @ANYRES64, @ANYBLOB="3bf81bb9f1"], 0x20000600}}, 0x0) r3 = socket(0x23, 0x800, 0x40000) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r3, 0x541b, &(0x7f00000000c0)={'ip6_vti0\x00', 0x0}) sendmsg$IPCTNL_MSG_EXP_DELETE(r3, &(0x7f00000004c0)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x40000040}, 0xc, &(0x7f0000000440)={&(0x7f00000006c0)={0x1d0, 0x2, 0x2, 0x201, 0x0, 0x0, {0xa}, [@CTA_EXPECT_NAT={0xc0, 0xa, 0x0, 0x1, [@CTA_EXPECT_NAT_TUPLE={0xc, 0x2, 0x0, 0x1, [@CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x1}]}, @CTA_EXPECT_NAT_TUPLE={0x70, 0x2, 0x0, 0x1, [@CTA_TUPLE_IP={0x2c, 0x1, 0x0, 0x1, @ipv6={{0x14, 0x3, @loopback}, {0x14, 0x4, @private0}}}, @CTA_TUPLE_IP={0x14, 0x1, 0x0, 0x1, @ipv4={{0x8, 0x1, @empty}, {0x8, 0x2, @initdev={0xac, 0x1e, 0x1, 0x0}}}}, @CTA_TUPLE_IP={0x14, 0x1, 0x0, 0x1, @ipv4={{0x8, 0x1, @local}, {0x8, 0x2, @loopback}}}, @CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x4}, @CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x3}, @CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x1}]}, @CTA_EXPECT_NAT_TUPLE={0x38, 0x2, 0x0, 0x1, [@CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5, 0x1, 0x88}}, @CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x3}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5, 0x1, 0x21}}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5, 0x1, 0x1}}, @CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x3}]}, @CTA_EXPECT_NAT_DIR={0x8}]}, @CTA_EXPECT_MASTER={0x20, 0x1, 0x0, 0x1, [@CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x1}, @CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x2}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5, 0x1, 0x84}}]}, @CTA_EXPECT_MASTER={0xdc, 0x1, 0x0, 0x1, [@CTA_TUPLE_IP={0x14, 0x1, 0x0, 0x1, @ipv4={{0x8, 0x1, @multicast1}, {0x8, 0x2, @dev={0xac, 0x14, 0x14, 0x3a}}}}, @CTA_TUPLE_ZONE={0x6}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5, 0x1, 0x21}}, @CTA_TUPLE_IP={0x14, 0x1, 0x0, 0x1, @ipv4={{0x8, 0x1, @empty}, {0x8, 0x2, @local}}}, @CTA_TUPLE_IP={0x2c, 0x1, 0x0, 0x1, @ipv6={{0x14, 0x3, @private1={0xfc, 0x1, '\x00', 0x1}}, {0x14, 0x4, @rand_addr=' \x01\x00'}}}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5, 0x1, 0x1}}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5, 0x1, 0x88}}, @CTA_TUPLE_IP={0x2c, 0x1, 0x0, 0x1, @ipv6={{0x14, 0x3, @empty}, {0x14, 0x4, @dev={0xfe, 0x80, '\x00', 0x21}}}}, @CTA_TUPLE_IP={0x2c, 0x1, 0x0, 0x1, @ipv6={{0x14, 0x3, @local}, {0x14, 0x4, @ipv4={'\x00', '\xff\xff', @rand_addr=0x64010100}}}}]}]}, 0x1d0}}, 0x48000) perf_event_open(&(0x7f0000000500)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x15, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$binfmt_elf32(0xffffffffffffffff, &(0x7f0000000040)=ANY=[], 0x69) connect$can_bcm(0xffffffffffffffff, &(0x7f0000000000), 0x10) sendmsg$can_bcm(0xffffffffffffffff, &(0x7f0000000480)={&(0x7f0000000340)={0x1d, 0x0, 0x3f420f00}, 0x10, &(0x7f0000000040)={&(0x7f0000000580)=ANY=[@ANYBLOB="01000000d7fe68ca0000e9ffffff0000", @ANYRES64=0x0, @ANYRES64=0x0, @ANYRES64=0x0, @ANYRES64], 0x20000600}}, 0x0) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(0xffffffffffffffff, 0x89f0, &(0x7f0000000280)={'gretap0\x00', &(0x7f0000000240)={'ip_vti0\x00', 0x0, 0x7, 0x80, 0xfffffff7, 0x7, {{0x8, 0x4, 0x0, 0x5, 0x20, 0x67, 0x0, 0xc0, 0x29, 0x0, @local, @empty, {[@timestamp={0x44, 0xc, 0x8, 0x0, 0x2, [0x7f, 0x1]}]}}}}}) socket(0x10, 0x3, 0x0) process_mrelease(0xffffffffffffffff, 0x0) r4 = socket$packet(0x11, 0x2, 0x300) ioctl$sock_SIOCGIFINDEX(r4, 0x8933, 0x0) getsockopt$inet_sctp_SCTP_RECVNXTINFO(r3, 0x84, 0x21, &(0x7f0000000140), &(0x7f0000000200)=0x4) bind$unix(r0, &(0x7f00000005c0)=@abs={0x1, 0x0, 0x4e23}, 0x6e) syz_clone(0x40000000, &(0x7f00000000c0), 0x0, 0x0, &(0x7f00000001c0), 0x0) 12:21:31 executing program 0: r0 = socket$unix(0x1, 0x2, 0x0) r1 = socket$can_bcm(0x1d, 0x2, 0x2) connect$can_bcm(r1, &(0x7f0000000000), 0x10) ioctl$sock_kcm_SIOCKCMUNATTACH(0xffffffffffffffff, 0x89e1, 0xffffffffffffffff) getsockopt$inet_sctp_SCTP_PEER_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1a, &(0x7f0000000380)={0x0, 0x7e, "f29c5b753353d9c7798811e57823354f32d6cb0899a53381003e4f8dbbb1ea469076c8e175a20b45443f885afb38b83813d5e013d4fad662f1582b23328b4ed70ad9d7d4d0052d0147d8b0ac4910985bec8aa8956c599d291a7da55fec010801d8f02dcff373f52f59f867378c13f4a080938c965846a7e8229b410b3ea0"}, &(0x7f00000002c0)=0x86) socket$igmp6(0xa, 0x3, 0x2) perf_event_open(&(0x7f0000000500)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x15, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) close(0xffffffffffffffff) socket$inet_mptcp(0x2, 0x1, 0x106) connect$can_bcm(0xffffffffffffffff, &(0x7f0000000000), 0x10) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, 0x0) bind$unix(r0, &(0x7f00000005c0)=@abs={0x1, 0x0, 0x4e23}, 0x6e) syz_clone(0x40000000, &(0x7f00000000c0), 0x0, 0x0, &(0x7f00000001c0), 0x0) 12:21:31 executing program 4: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x82, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket(0x10, 0x803, 0x0) sendto(r0, &(0x7f00000000c0)="120000001200e7ef007b00000000000000a1", 0x12, 0x0, 0x0, 0x0) recvmmsg(r0, &(0x7f00000037c0)=[{{&(0x7f00000004c0)=@ethernet={0x0, @random}, 0x80, &(0x7f0000000380)=[{&(0x7f0000000040)=""/95, 0x5f}, {&(0x7f0000000140)=""/85, 0x55}, {&(0x7f0000000fc0)=""/4096, 0x1000}, {&(0x7f0000000400)=""/106, 0x6a}, {&(0x7f0000000740)=""/73, 0x49}, {&(0x7f0000000200)=""/77, 0x4d}, {0x0, 0x88a8ffff00000000}], 0x7, &(0x7f0000000600)=""/191, 0xbf}}], 0x1, 0x0, &(0x7f0000003700)={0x77359400}) 12:21:31 executing program 3: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r0, 0x8932, &(0x7f0000000600)={'ip6gre0\x00', 0x0}) 12:21:31 executing program 1: syz_mount_image$ext4(&(0x7f0000000740)='ext4\x00', &(0x7f0000000100)='./bus\x00', 0x804810, &(0x7f0000000180)=ANY=[@ANYBLOB="0061021d307a961da7401271e3fa98008000001d3902ccfd562158cb15c016093893c9e4abd02bc4f1492514fa2dfebc8001000080000000008a1049ca0000"], 0x1, 0x73b, &(0x7f0000000780)="$eJzs3M9rHHUbAPBnptn+zPtuXngP6kGEFloonSTNpT0ZL94KhYLXGpJJCJlkQ3ZTm1iw9SzU5qIgiN49ehVK/QO8SUHBuyBa40G8rMxmk9q4u922Sbeknw9M5/nOj32epzv5ZgcyG8BL643ynyRiOCIuR0S1vT2NiMOt6GjEza3jNh/cmC6XJJrNK78m5Wmx2azuvFbSXp+I1inxSkTcq0Sc/fDfeetr6wtTRZGvtMejjcXl0fra+rn5xam5fC5fGp+4OHZhYuLC2MSe9XrqnYvH7nz39sbG9183br8+dC6JyVbf0e5tzxL9w9b/SSUmd21f2o9kA5QMugAAAPpSfs4/FBFDrU+p1TjUigAAAICDpHmkCQAAABx4SQy6AgAAAGB/bf8dwPazvfv1HGw3v7wVESOd8g+1niGOOBqViDi+mTzyZEKydRo8k5u3IuLuZIfrL2lff09vbNfYM9Ivnrvl/DPZaf5Jd+af6DD/DG1/d8Iz6j7/Pcx/qMv8d7nPHN98/mqla/5bEa8Ndcqf7ORPuuR/t8/8tzc+utNtX/PLiNMdf/8kj+Tq8f0Qo7PzRc8frXt/nbnfq//j3fInvftf7rP/9zd/X+g2l5T5z5zs/f53yl9eEx+360gj4k57XY43duU4ufjDt736n+nS/+Pe/y/67P+nr45c7/NQAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAaEkjYjiSNNuJ0zTLIk5ExP/jeFrU6o2zs7XVpZlyX8RIVNLZ+SIfi4jq1jgpx+Ot+OH4/K7xRET878djW0nnizybrhUzg24eAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAACAHSciYjiSNIuINCL+qKZplg26KgAAAGDPjQy6AAAAAGDfuf8HAACAg+9p7/+TPa4DAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAONAuX7pULs3NBzemy/HMtbXVhdq1czN5fSFbXJ3Opmsry9lcrTZX5Nl0bfFxr1fUasvjF2P1+mgjrzdG62vrVxdrq0uNq/OLU3P51bzyXLoCAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAADgSQ23liTNIiJtxWmaZRH/iYiRqCSz80U+FhH/jYj71cqRcjw+6KIBAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAADYc/W19YWposhXBALBcws+iIgXoIwewaBnJgAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAABqG+tr4wVRT5Sn3QlQAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAADBY6c9JRJTL6eqp4d17Dyd/VlvriHjvsyufXJ9qNFbGy+2/7WxvfNrefn4Q9QMAAMBL4c0nOXj7Pn37Ph4AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAKBf9bX1hamiyFf2MRh0jwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAwNP5OwAA//9JjsXQ") chdir(&(0x7f0000000080)='./file0\x00') open(&(0x7f00000000c0)='./bus\x00', 0x14da42, 0x0) mount(&(0x7f0000000380)=@loop={'/dev/loop', 0x0}, &(0x7f00000003c0)='./bus\x00', 0x0, 0x1000, 0x0) r0 = open(&(0x7f0000000400)='./bus\x00', 0x0, 0x0) ioctl$LOOP_SET_STATUS(r0, 0x4c02, &(0x7f00000001c0)={0x0, {}, 0x0, {}, 0xff, 0x0, 0x0, 0x0, "be8176c9e6755a48a3c0230dd390efe12f8306bed95b2afd402aae879978d959ff9009eec610d9108ea036456bb79e26ee42d0a34968c1fdbb33e8ad5860f632", "b948757aa008fae13adca739a9f126462ab528ea52e90ce2cf50a4ef2568375b"}) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='blkio.throttle.io_service_bytes\x00', 0x275a, 0x5000000) 12:21:31 executing program 2: open(&(0x7f0000000400)='./bus\x00', 0x14103e, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$L2TP_CMD_SESSION_MODIFY(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000080)={0x30, r1, 0x1, 0x0, 0x2000000, {}, [@L2TP_ATTR_SEND_SEQ={0x5}, @L2TP_ATTR_IFNAME={0x14, 0x8, 'veth1_to_hsr\x00'}]}, 0x30}}, 0x0) 12:21:31 executing program 2: open(&(0x7f0000000400)='./bus\x00', 0x14103e, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$L2TP_CMD_SESSION_MODIFY(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000080)={0x30, r1, 0x1, 0x0, 0x3000000, {}, [@L2TP_ATTR_SEND_SEQ={0x5}, @L2TP_ATTR_IFNAME={0x14, 0x8, 'veth1_to_hsr\x00'}]}, 0x30}}, 0x0) 12:21:31 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$wireguard(&(0x7f0000000080), r0) sendmsg$WG_CMD_GET_DEVICE(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000480)=ANY=[@ANYBLOB='$\x00\x00\x00', @ANYRES16, @ANYBLOB="04"], 0x24}}, 0x0) syz_genetlink_get_family_id$batadv(&(0x7f00000001c0), r0) 12:21:31 executing program 3: bpf$BPF_PROG_WITH_BTFID_LOAD(0x10, &(0x7f0000000940)=@bpf_ext={0x1c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 12:21:31 executing program 2: open(&(0x7f0000000400)='./bus\x00', 0x14103e, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$L2TP_CMD_SESSION_MODIFY(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000080)={0x30, r1, 0x1, 0x0, 0x4000000, {}, [@L2TP_ATTR_SEND_SEQ={0x5}, @L2TP_ATTR_IFNAME={0x14, 0x8, 'veth1_to_hsr\x00'}]}, 0x30}}, 0x0) 12:21:31 executing program 4: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x82, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket(0x10, 0x803, 0x0) sendto(r0, &(0x7f00000000c0)="120000001200e7ef007b00000000000000a1", 0x12, 0x0, 0x0, 0x0) recvmmsg(r0, &(0x7f00000037c0)=[{{&(0x7f00000004c0)=@ethernet={0x0, @random}, 0x80, &(0x7f0000000380)=[{&(0x7f0000000040)=""/95, 0x5f}, {&(0x7f0000000140)=""/85, 0x55}, {&(0x7f0000000fc0)=""/4096, 0x1000}, {&(0x7f0000000400)=""/106, 0x6a}, {&(0x7f0000000740)=""/73, 0x49}, {&(0x7f0000000200)=""/77, 0x4d}, {0x0, 0xb411000000000000}], 0x7, &(0x7f0000000600)=""/191, 0xbf}}], 0x1, 0x0, &(0x7f0000003700)={0x77359400}) [ 1000.319857][ T3814] loop1: detected capacity change from 0 to 2048 12:21:31 executing program 3: bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000940)=@bpf_lsm={0x1d, 0x3, &(0x7f00000000c0)=@framed, &(0x7f0000000100)='syzkaller\x00', 0x0, 0x40, &(0x7f0000000140)=""/64, 0x0, 0x0, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) [ 1000.417299][ T3814] ext4 filesystem being mounted at /root/syzkaller-testdir1539738704/syzkaller.ao1jj3/3774/bus supports timestamps until 2038 (0x7fffffff) [ 1000.521991][ T3814] loop1: detected capacity change from 2048 to 2047 12:21:32 executing program 5: r0 = socket$unix(0x1, 0x2, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f0000000100)={'vcan0\x00', 0x0}) r2 = socket$can_bcm(0x1d, 0x2, 0x2) connect$can_bcm(r2, &(0x7f0000000000), 0x10) ioctl$sock_kcm_SIOCKCMUNATTACH(0xffffffffffffffff, 0x89e1, 0xffffffffffffffff) ioctl$sock_SIOCSPGRP(0xffffffffffffffff, 0x8902, 0x0) sendmsg$can_bcm(r2, &(0x7f0000000480)={&(0x7f0000000340)={0x1d, r1, 0x3f420f00}, 0x10, &(0x7f0000000040)={&(0x7f0000000580)=ANY=[@ANYBLOB="01000000d7fe68ca0000e9ffffff0000", @ANYRES64=0x0, @ANYRES64=0x0, @ANYRES64=r0, @ANYBLOB="3bf81bb9f1"], 0x20000600}}, 0x0) r3 = socket(0x23, 0x800, 0x40000) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r3, 0x541b, &(0x7f00000000c0)={'ip6_vti0\x00', 0x0}) sendmsg$IPCTNL_MSG_EXP_DELETE(r3, &(0x7f00000004c0)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x40000040}, 0xc, &(0x7f0000000440)={&(0x7f00000006c0)={0x1d0, 0x2, 0x2, 0x201, 0x0, 0x0, {0xa}, [@CTA_EXPECT_NAT={0xc0, 0xa, 0x0, 0x1, [@CTA_EXPECT_NAT_TUPLE={0xc, 0x2, 0x0, 0x1, [@CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x1}]}, @CTA_EXPECT_NAT_TUPLE={0x70, 0x2, 0x0, 0x1, [@CTA_TUPLE_IP={0x2c, 0x1, 0x0, 0x1, @ipv6={{0x14, 0x3, @loopback}, {0x14, 0x4, @private0}}}, @CTA_TUPLE_IP={0x14, 0x1, 0x0, 0x1, @ipv4={{0x8, 0x1, @empty}, {0x8, 0x2, @initdev={0xac, 0x1e, 0x1, 0x0}}}}, @CTA_TUPLE_IP={0x14, 0x1, 0x0, 0x1, @ipv4={{0x8, 0x1, @local}, {0x8, 0x2, @loopback}}}, @CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x4}, @CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x3}, @CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x1}]}, @CTA_EXPECT_NAT_TUPLE={0x38, 0x2, 0x0, 0x1, [@CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5, 0x1, 0x88}}, @CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x3}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5, 0x1, 0x21}}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5, 0x1, 0x1}}, @CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x3}]}, @CTA_EXPECT_NAT_DIR={0x8}]}, @CTA_EXPECT_MASTER={0x20, 0x1, 0x0, 0x1, [@CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x1}, @CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x2}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5, 0x1, 0x84}}]}, @CTA_EXPECT_MASTER={0xdc, 0x1, 0x0, 0x1, [@CTA_TUPLE_IP={0x14, 0x1, 0x0, 0x1, @ipv4={{0x8, 0x1, @multicast1}, {0x8, 0x2, @dev={0xac, 0x14, 0x14, 0x3a}}}}, @CTA_TUPLE_ZONE={0x6}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5, 0x1, 0x21}}, @CTA_TUPLE_IP={0x14, 0x1, 0x0, 0x1, @ipv4={{0x8, 0x1, @empty}, {0x8, 0x2, @local}}}, @CTA_TUPLE_IP={0x2c, 0x1, 0x0, 0x1, @ipv6={{0x14, 0x3, @private1={0xfc, 0x1, '\x00', 0x1}}, {0x14, 0x4, @rand_addr=' \x01\x00'}}}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5, 0x1, 0x1}}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5, 0x1, 0x88}}, @CTA_TUPLE_IP={0x2c, 0x1, 0x0, 0x1, @ipv6={{0x14, 0x3, @empty}, {0x14, 0x4, @dev={0xfe, 0x80, '\x00', 0x21}}}}, @CTA_TUPLE_IP={0x2c, 0x1, 0x0, 0x1, @ipv6={{0x14, 0x3, @local}, {0x14, 0x4, @ipv4={'\x00', '\xff\xff', @rand_addr=0x64010100}}}}]}]}, 0x1d0}}, 0x48000) perf_event_open(&(0x7f0000000500)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x15, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$binfmt_elf32(0xffffffffffffffff, &(0x7f0000000040)=ANY=[], 0x69) connect$can_bcm(0xffffffffffffffff, &(0x7f0000000000), 0x10) sendmsg$can_bcm(0xffffffffffffffff, &(0x7f0000000480)={&(0x7f0000000340)={0x1d, 0x0, 0x3f420f00}, 0x10, &(0x7f0000000040)={&(0x7f0000000580)=ANY=[@ANYBLOB="01000000d7fe68ca0000e9ffffff0000", @ANYRES64=0x0, @ANYRES64=0x0, @ANYRES64=0x0, @ANYRES64], 0x20000600}}, 0x0) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(0xffffffffffffffff, 0x89f0, &(0x7f0000000280)={'gretap0\x00', &(0x7f0000000240)={'ip_vti0\x00', 0x0, 0x7, 0x80, 0xfffffff7, 0x7, {{0x8, 0x4, 0x0, 0x5, 0x20, 0x67, 0x0, 0xc0, 0x29, 0x0, @local, @empty, {[@timestamp={0x44, 0xc, 0x8, 0x0, 0x2, [0x7f, 0x1]}]}}}}}) socket(0x10, 0x3, 0x0) process_mrelease(0xffffffffffffffff, 0x0) r4 = socket$packet(0x11, 0x2, 0x300) ioctl$sock_SIOCGIFINDEX(r4, 0x8933, 0x0) getsockopt$inet_sctp_SCTP_RECVNXTINFO(r3, 0x84, 0x21, &(0x7f0000000140), &(0x7f0000000200)=0x4) bind$unix(r0, &(0x7f00000005c0)=@abs={0x1, 0x0, 0x4e23}, 0x6e) syz_clone(0x40000000, &(0x7f00000000c0), 0x0, 0x0, &(0x7f00000001c0), 0x0) 12:21:32 executing program 2: open(&(0x7f0000000400)='./bus\x00', 0x14103e, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$L2TP_CMD_SESSION_MODIFY(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000080)={0x30, r1, 0x1, 0x0, 0x5000000, {}, [@L2TP_ATTR_SEND_SEQ={0x5}, @L2TP_ATTR_IFNAME={0x14, 0x8, 'veth1_to_hsr\x00'}]}, 0x30}}, 0x0) 12:21:32 executing program 3: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r0, 0x8927, &(0x7f0000000600)={'ip6gre0\x00', 0x0}) 12:21:32 executing program 4: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x82, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket(0x10, 0x803, 0x0) sendto(r0, &(0x7f00000000c0)="120000001200e7ef007b00000000000000a1", 0x12, 0x0, 0x0, 0x0) recvmmsg(r0, &(0x7f00000037c0)=[{{&(0x7f00000004c0)=@ethernet={0x0, @random}, 0x80, &(0x7f0000000380)=[{&(0x7f0000000040)=""/95, 0x5f}, {&(0x7f0000000140)=""/85, 0x55}, {&(0x7f0000000fc0)=""/4096, 0x1000}, {&(0x7f0000000400)=""/106, 0x6a}, {&(0x7f0000000740)=""/73, 0x49}, {&(0x7f0000000200)=""/77, 0x4d}, {0x0, 0xc3ffffff00000000}], 0x7, &(0x7f0000000600)=""/191, 0xbf}}], 0x1, 0x0, &(0x7f0000003700)={0x77359400}) 12:21:32 executing program 1: syz_mount_image$ext4(&(0x7f0000000740)='ext4\x00', &(0x7f0000000100)='./bus\x00', 0x804810, &(0x7f0000000180)=ANY=[@ANYBLOB="0061021d307a961da7401271e3fa98008000001d3902ccfd562158cb15c016093893c9e4abd02bc4f1492514fa2dfebc8001000080000000008a1049ca0000"], 0x1, 0x73b, &(0x7f0000000780)="$eJzs3M9rHHUbAPBnptn+zPtuXngP6kGEFloonSTNpT0ZL94KhYLXGpJJCJlkQ3ZTm1iw9SzU5qIgiN49ehVK/QO8SUHBuyBa40G8rMxmk9q4u922Sbeknw9M5/nOj32epzv5ZgcyG8BL643ynyRiOCIuR0S1vT2NiMOt6GjEza3jNh/cmC6XJJrNK78m5Wmx2azuvFbSXp+I1inxSkTcq0Sc/fDfeetr6wtTRZGvtMejjcXl0fra+rn5xam5fC5fGp+4OHZhYuLC2MSe9XrqnYvH7nz39sbG9183br8+dC6JyVbf0e5tzxL9w9b/SSUmd21f2o9kA5QMugAAAPpSfs4/FBFDrU+p1TjUigAAAICDpHmkCQAAABx4SQy6AgAAAGB/bf8dwPazvfv1HGw3v7wVESOd8g+1niGOOBqViDi+mTzyZEKydRo8k5u3IuLuZIfrL2lff09vbNfYM9Ivnrvl/DPZaf5Jd+af6DD/DG1/d8Iz6j7/Pcx/qMv8d7nPHN98/mqla/5bEa8Ndcqf7ORPuuR/t8/8tzc+utNtX/PLiNMdf/8kj+Tq8f0Qo7PzRc8frXt/nbnfq//j3fInvftf7rP/9zd/X+g2l5T5z5zs/f53yl9eEx+360gj4k57XY43duU4ufjDt736n+nS/+Pe/y/67P+nr45c7/NQAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAaEkjYjiSNNuJ0zTLIk5ExP/jeFrU6o2zs7XVpZlyX8RIVNLZ+SIfi4jq1jgpx+Ot+OH4/K7xRET878djW0nnizybrhUzg24eAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAACAHSciYjiSNIuINCL+qKZplg26KgAAAGDPjQy6AAAAAGDfuf8HAACAg+9p7/+TPa4DAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAONAuX7pULs3NBzemy/HMtbXVhdq1czN5fSFbXJ3Opmsry9lcrTZX5Nl0bfFxr1fUasvjF2P1+mgjrzdG62vrVxdrq0uNq/OLU3P51bzyXLoCAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAADgSQ23liTNIiJtxWmaZRH/iYiRqCSz80U+FhH/jYj71cqRcjw+6KIBAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAADYc/W19YWposhXBALBcws+iIgXoIwewaBnJgAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAABqG+tr4wVRT5Sn3QlQAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAADBY6c9JRJTL6eqp4d17Dyd/VlvriHjvsyufXJ9qNFbGy+2/7WxvfNrefn4Q9QMAAMBL4c0nOXj7Pn37Ph4AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAKBf9bX1hamiyFf2MRh0jwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAwNP5OwAA//9JjsXQ") chdir(&(0x7f0000000080)='./file0\x00') open(&(0x7f00000000c0)='./bus\x00', 0x14da42, 0x0) mount(&(0x7f0000000380)=@loop={'/dev/loop', 0x0}, &(0x7f00000003c0)='./bus\x00', 0x0, 0x1000, 0x0) r0 = open(&(0x7f0000000400)='./bus\x00', 0x0, 0x0) ioctl$LOOP_SET_STATUS(r0, 0x4c02, &(0x7f00000001c0)={0x0, {}, 0x0, {}, 0xff, 0x0, 0x0, 0x0, "be8176c9e6755a48a3c0230dd390efe12f8306bed95b2afd402aae879978d959ff9009eec610d9108ea036456bb79e26ee42d0a34968c1fdbb33e8ad5860f632", "b948757aa008fae13adca739a9f126462ab528ea52e90ce2cf50a4ef2568375b"}) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='blkio.throttle.io_service_bytes\x00', 0x275a, 0x6000000) 12:21:32 executing program 0: r0 = socket$unix(0x1, 0x2, 0x0) r1 = socket$can_bcm(0x1d, 0x2, 0x2) connect$can_bcm(r1, &(0x7f0000000000), 0x10) ioctl$sock_kcm_SIOCKCMUNATTACH(0xffffffffffffffff, 0x89e1, 0xffffffffffffffff) getsockopt$inet_sctp_SCTP_PEER_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1a, &(0x7f0000000380)={0x0, 0x7f, "f29c5b753353d9c7798811e57823354f32d6cb0899a53381003e4f8dbbb1ea469076c8e175a20b45443f885afb38b83813d5e013d4fad662f1582b23328b4ed70ad9d7d4d0052d0147d8b0ac4910985bec8aa8956c599d291a7da55fec010801d8f02dcff373f52f59f867378c13f4a080938c965846a7e8229b410b3ea0f9"}, &(0x7f00000002c0)=0x87) socket$igmp6(0xa, 0x3, 0x2) perf_event_open(&(0x7f0000000500)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x15, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) close(0xffffffffffffffff) socket$inet_mptcp(0x2, 0x1, 0x106) connect$can_bcm(0xffffffffffffffff, &(0x7f0000000000), 0x10) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, 0x0) bind$unix(r0, &(0x7f00000005c0)=@abs={0x1, 0x0, 0x4e23}, 0x6e) syz_clone(0x40000000, &(0x7f00000000c0), 0x0, 0x0, &(0x7f00000001c0), 0x0) 12:21:32 executing program 3: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r0, 0x4020940d, &(0x7f0000000600)={'ip6gre0\x00', 0x0}) 12:21:32 executing program 2: open(&(0x7f0000000400)='./bus\x00', 0x14103e, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$L2TP_CMD_SESSION_MODIFY(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000080)={0x30, r1, 0x1, 0x0, 0x6000000, {}, [@L2TP_ATTR_SEND_SEQ={0x5}, @L2TP_ATTR_IFNAME={0x14, 0x8, 'veth1_to_hsr\x00'}]}, 0x30}}, 0x0) 12:21:32 executing program 4: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x82, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket(0x10, 0x803, 0x0) sendto(r0, &(0x7f00000000c0)="120000001200e7ef007b00000000000000a1", 0x12, 0x0, 0x0, 0x0) recvmmsg(r0, &(0x7f00000037c0)=[{{&(0x7f00000004c0)=@ethernet={0x0, @random}, 0x80, &(0x7f0000000380)=[{&(0x7f0000000040)=""/95, 0x5f}, {&(0x7f0000000140)=""/85, 0x55}, {&(0x7f0000000fc0)=""/4096, 0x1000}, {&(0x7f0000000400)=""/106, 0x6a}, {&(0x7f0000000740)=""/73, 0x49}, {&(0x7f0000000200)=""/77, 0x4d}, {0x0, 0xffffffff00000000}], 0x7, &(0x7f0000000600)=""/191, 0xbf}}], 0x1, 0x0, &(0x7f0000003700)={0x77359400}) 12:21:32 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) sendmmsg$inet(r0, &(0x7f00000006c0)=[{{&(0x7f0000000200)={0x2, 0x4e21, @empty}, 0x10, &(0x7f0000000580)=[{&(0x7f0000000240)='D', 0x1}, {&(0x7f00000002c0)="a55cafb59673b39453c453fb1d66dbf041522792cc26feeddd63fe294696193618bc0759fd2ceab07ee092d27d0847bf64491677f00cdda1ae610f201eb0ddb528000eb2fe326771874f040022e406eac8378f864672dee48b0adcd03d28d7385002e10356297c2bc87963800cdb6a6a529b7d4b2078d03474a3047229982bf5f81c0b98634636dddea5c15e3ca03b378ae5d43ee4ed93279481f5bdb34dcb2bb80392d030ce4b1a272b4a3420c4899f6b6ad52505e735e4f6d9", 0xba}, {&(0x7f0000000380)="9dc8b94038316226cbd89a4cd3ce8dc5b3283ef9d67bd9ae6260e925eedb47b70b10bc0249827efc5367b317c7ef0b76a951aa53fe9636099b1e3cedd7dd79f6bc4714d43ccbb63600ea765099ad9a678dfbe042afb883f06efcfbcf83fdf0310a73132d7df09c7974377969b43e2578284ccc61a39e550c20fdba6eac75c06363e98980e464682cc52825ea51e2a279682c1cefddb81a2adc33954e18035e0b3e2e754c7b3c8a5d5c32af430e039d3784397c986666713a81ab1adc481ea559569e75ddc12657a97492c8575e", 0xcd}], 0x3}}], 0x1, 0x0) [ 1001.161220][ T3842] loop1: detected capacity change from 0 to 2048 12:21:32 executing program 3: r0 = openat$vsock(0xffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r0, 0x89f1, 0x0) 12:21:32 executing program 4: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x82, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket(0x10, 0x803, 0x0) sendto(r0, &(0x7f00000000c0)="120000001200e7ef007b00000000000000a1", 0x12, 0x0, 0x0, 0x0) recvmmsg(r0, &(0x7f00000037c0)=[{{&(0x7f00000004c0)=@ethernet={0x0, @random}, 0x80, &(0x7f0000000380)=[{&(0x7f0000000040)=""/95, 0x5f}, {&(0x7f0000000140)=""/85, 0x55}, {&(0x7f0000000fc0)=""/4096, 0x1000}, {&(0x7f0000000400)=""/106, 0x6a}, {&(0x7f0000000740)=""/73, 0x49}, {&(0x7f0000000200)=""/77, 0x4d}, {0x0}], 0x8, &(0x7f0000000600)=""/191, 0xbf}}], 0x1, 0x0, &(0x7f0000003700)={0x77359400}) [ 1001.335290][ T3842] ext4 filesystem being mounted at /root/syzkaller-testdir1539738704/syzkaller.ao1jj3/3775/bus supports timestamps until 2038 (0x7fffffff) [ 1001.432130][ T3842] loop1: detected capacity change from 2048 to 2047 12:21:33 executing program 5: r0 = socket$unix(0x1, 0x2, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f0000000100)={'vcan0\x00', 0x0}) r2 = socket$can_bcm(0x1d, 0x2, 0x2) connect$can_bcm(r2, &(0x7f0000000000), 0x10) ioctl$sock_kcm_SIOCKCMUNATTACH(0xffffffffffffffff, 0x89e1, 0xffffffffffffffff) ioctl$sock_SIOCSPGRP(0xffffffffffffffff, 0x8902, 0x0) sendmsg$can_bcm(r2, &(0x7f0000000480)={&(0x7f0000000340)={0x1d, r1, 0x3f420f00}, 0x10, &(0x7f0000000040)={&(0x7f0000000580)=ANY=[@ANYBLOB="01000000d7fe68ca0000e9ffffff0000", @ANYRES64=0x0, @ANYRES64=0x0, @ANYRES64=r0, @ANYBLOB="3bf81bb9f1"], 0x20000600}}, 0x0) r3 = socket(0x23, 0x800, 0x40000) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r3, 0x541b, &(0x7f00000000c0)={'ip6_vti0\x00', 0x0}) sendmsg$IPCTNL_MSG_EXP_DELETE(r3, &(0x7f00000004c0)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x40000040}, 0xc, &(0x7f0000000440)={&(0x7f00000006c0)={0x1d0, 0x2, 0x2, 0x201, 0x0, 0x0, {0xa}, [@CTA_EXPECT_NAT={0xc0, 0xa, 0x0, 0x1, [@CTA_EXPECT_NAT_TUPLE={0xc, 0x2, 0x0, 0x1, [@CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x1}]}, @CTA_EXPECT_NAT_TUPLE={0x70, 0x2, 0x0, 0x1, [@CTA_TUPLE_IP={0x2c, 0x1, 0x0, 0x1, @ipv6={{0x14, 0x3, @loopback}, {0x14, 0x4, @private0}}}, @CTA_TUPLE_IP={0x14, 0x1, 0x0, 0x1, @ipv4={{0x8, 0x1, @empty}, {0x8, 0x2, @initdev={0xac, 0x1e, 0x1, 0x0}}}}, @CTA_TUPLE_IP={0x14, 0x1, 0x0, 0x1, @ipv4={{0x8, 0x1, @local}, {0x8, 0x2, @loopback}}}, @CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x4}, @CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x3}, @CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x1}]}, @CTA_EXPECT_NAT_TUPLE={0x38, 0x2, 0x0, 0x1, [@CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5, 0x1, 0x88}}, @CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x3}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5, 0x1, 0x21}}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5, 0x1, 0x1}}, @CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x3}]}, @CTA_EXPECT_NAT_DIR={0x8}]}, @CTA_EXPECT_MASTER={0x20, 0x1, 0x0, 0x1, [@CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x1}, @CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x2}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5, 0x1, 0x84}}]}, @CTA_EXPECT_MASTER={0xdc, 0x1, 0x0, 0x1, [@CTA_TUPLE_IP={0x14, 0x1, 0x0, 0x1, @ipv4={{0x8, 0x1, @multicast1}, {0x8, 0x2, @dev={0xac, 0x14, 0x14, 0x3a}}}}, @CTA_TUPLE_ZONE={0x6}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5, 0x1, 0x21}}, @CTA_TUPLE_IP={0x14, 0x1, 0x0, 0x1, @ipv4={{0x8, 0x1, @empty}, {0x8, 0x2, @local}}}, @CTA_TUPLE_IP={0x2c, 0x1, 0x0, 0x1, @ipv6={{0x14, 0x3, @private1={0xfc, 0x1, '\x00', 0x1}}, {0x14, 0x4, @rand_addr=' \x01\x00'}}}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5, 0x1, 0x1}}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5, 0x1, 0x88}}, @CTA_TUPLE_IP={0x2c, 0x1, 0x0, 0x1, @ipv6={{0x14, 0x3, @empty}, {0x14, 0x4, @dev={0xfe, 0x80, '\x00', 0x21}}}}, @CTA_TUPLE_IP={0x2c, 0x1, 0x0, 0x1, @ipv6={{0x14, 0x3, @local}, {0x14, 0x4, @ipv4={'\x00', '\xff\xff', @rand_addr=0x64010100}}}}]}]}, 0x1d0}}, 0x48000) perf_event_open(&(0x7f0000000500)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x15, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$binfmt_elf32(0xffffffffffffffff, &(0x7f0000000040)=ANY=[], 0x69) connect$can_bcm(0xffffffffffffffff, &(0x7f0000000000), 0x10) sendmsg$can_bcm(0xffffffffffffffff, &(0x7f0000000480)={&(0x7f0000000340)={0x1d, 0x0, 0x3f420f00}, 0x10, &(0x7f0000000040)={&(0x7f0000000580)=ANY=[@ANYBLOB="01000000d7fe68ca0000e9ffffff0000", @ANYRES64=0x0, @ANYRES64=0x0, @ANYRES64=0x0, @ANYRES64], 0x20000600}}, 0x0) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(0xffffffffffffffff, 0x89f0, &(0x7f0000000280)={'gretap0\x00', &(0x7f0000000240)={'ip_vti0\x00', 0x0, 0x7, 0x80, 0xfffffff7, 0x7, {{0x8, 0x4, 0x0, 0x5, 0x20, 0x67, 0x0, 0xc0, 0x29, 0x0, @local, @empty, {[@timestamp={0x44, 0xc, 0x8, 0x0, 0x2, [0x7f, 0x1]}]}}}}}) socket(0x10, 0x3, 0x0) process_mrelease(0xffffffffffffffff, 0x0) r4 = socket$packet(0x11, 0x2, 0x300) ioctl$sock_SIOCGIFINDEX(r4, 0x8933, 0x0) getsockopt$inet_sctp_SCTP_RECVNXTINFO(r3, 0x84, 0x21, &(0x7f0000000140), &(0x7f0000000200)=0x4) bind$unix(r0, &(0x7f00000005c0)=@abs={0x1, 0x0, 0x4e23}, 0x6e) syz_clone(0x40000000, &(0x7f00000000c0), 0x0, 0x0, &(0x7f00000001c0), 0x0) 12:21:33 executing program 2: open(&(0x7f0000000400)='./bus\x00', 0x14103e, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$L2TP_CMD_SESSION_MODIFY(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000080)={0x30, r1, 0x1, 0x0, 0x7000000, {}, [@L2TP_ATTR_SEND_SEQ={0x5}, @L2TP_ATTR_IFNAME={0x14, 0x8, 'veth1_to_hsr\x00'}]}, 0x30}}, 0x0) 12:21:33 executing program 4: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x82, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket(0x10, 0x803, 0x0) sendto(r0, &(0x7f00000000c0)="120000001200e7ef007b00000000000000a1", 0x12, 0x0, 0x0, 0x0) recvmmsg(r0, &(0x7f00000037c0)=[{{&(0x7f00000004c0)=@ethernet={0x0, @random}, 0x80, &(0x7f0000000380)=[{&(0x7f0000000040)=""/95, 0x5f}, {&(0x7f0000000140)=""/85, 0x55}, {&(0x7f0000000fc0)=""/4096, 0x1000}, {&(0x7f0000000400)=""/106, 0x6a}, {&(0x7f0000000740)=""/73, 0x49}, {&(0x7f0000000200)=""/77, 0x4d}, {0x0}], 0x7, &(0x7f0000000600)=""/191, 0xbf}}], 0x1, 0x0, &(0x7f0000003700)={0x77359400}) 12:21:33 executing program 3: bpf$BPF_BTF_GET_NEXT_ID(0x17, &(0x7f0000000200)={0x0, 0x0}, 0x8) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000280)=@bpf_lsm={0x1d, 0x1, &(0x7f00000000c0)=@raw=[@kfunc], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, r0}, 0x80) 12:21:33 executing program 1: syz_mount_image$ext4(&(0x7f0000000740)='ext4\x00', &(0x7f0000000100)='./bus\x00', 0x804810, &(0x7f0000000180)=ANY=[@ANYBLOB="0061021d307a961da7401271e3fa98008000001d3902ccfd562158cb15c016093893c9e4abd02bc4f1492514fa2dfebc8001000080000000008a1049ca0000"], 0x1, 0x73b, &(0x7f0000000780)="$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") chdir(&(0x7f0000000080)='./file0\x00') open(&(0x7f00000000c0)='./bus\x00', 0x14da42, 0x0) mount(&(0x7f0000000380)=@loop={'/dev/loop', 0x0}, &(0x7f00000003c0)='./bus\x00', 0x0, 0x1000, 0x0) r0 = open(&(0x7f0000000400)='./bus\x00', 0x0, 0x0) ioctl$LOOP_SET_STATUS(r0, 0x4c02, &(0x7f00000001c0)={0x0, {}, 0x0, {}, 0xff, 0x0, 0x0, 0x0, "be8176c9e6755a48a3c0230dd390efe12f8306bed95b2afd402aae879978d959ff9009eec610d9108ea036456bb79e26ee42d0a34968c1fdbb33e8ad5860f632", "b948757aa008fae13adca739a9f126462ab528ea52e90ce2cf50a4ef2568375b"}) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='blkio.throttle.io_service_bytes\x00', 0x275a, 0x6040000) 12:21:33 executing program 0: r0 = socket$unix(0x1, 0x2, 0x0) r1 = socket$can_bcm(0x1d, 0x2, 0x2) connect$can_bcm(r1, &(0x7f0000000000), 0x10) ioctl$sock_kcm_SIOCKCMUNATTACH(0xffffffffffffffff, 0x89e1, 0xffffffffffffffff) getsockopt$inet_sctp_SCTP_PEER_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1a, &(0x7f0000000380)={0x0, 0x7f, "f29c5b753353d9c7798811e57823354f32d6cb0899a53381003e4f8dbbb1ea469076c8e175a20b45443f885afb38b83813d5e013d4fad662f1582b23328b4ed70ad9d7d4d0052d0147d8b0ac4910985bec8aa8956c599d291a7da55fec010801d8f02dcff373f52f59f867378c13f4a080938c965846a7e8229b410b3ea0f9"}, &(0x7f00000002c0)=0x87) socket$igmp6(0xa, 0x3, 0x2) perf_event_open(&(0x7f0000000500)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x15, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) close(0xffffffffffffffff) socket$inet_mptcp(0x2, 0x1, 0x106) connect$can_bcm(0xffffffffffffffff, &(0x7f0000000000), 0x10) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, 0x0) bind$unix(r0, &(0x7f00000005c0)=@abs={0x1, 0x0, 0x4e23}, 0x6e) syz_clone(0x40000000, &(0x7f00000000c0), 0x0, 0x0, &(0x7f00000001c0), 0x0) 12:21:33 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) sendmmsg$inet(r0, &(0x7f00000006c0)=[{{&(0x7f0000000200)={0x2, 0x4e21, @empty}, 0x10, &(0x7f0000000580)=[{&(0x7f0000000240)="44eb8dbaed38f7caba5596a202213ca422b34179818b49730153e4c98f91f31cca2a31d32beb90a33563039d637e020747069894526ff9ab4f", 0x39}, {&(0x7f0000000380)="9dc8b94038316226cbd89a4cd3ce8dc5b3283ef9d67bd9ae6260e925eedb47b70b10bc0249827efc5367b317c7ef0b76a951aa53fe9636099b1e3cedd7dd79f6bc4714d43ccbb63600ea765099ad9a678dfbe042afb883f06efcfbcf83fdf0310a73132d7df09c7974377969b43e2578", 0x70}], 0x2}}], 0x1, 0x0) 12:21:33 executing program 2: open(&(0x7f0000000400)='./bus\x00', 0x14103e, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$L2TP_CMD_SESSION_MODIFY(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000080)={0x30, r1, 0x1, 0x0, 0x8000000, {}, [@L2TP_ATTR_SEND_SEQ={0x5}, @L2TP_ATTR_IFNAME={0x14, 0x8, 'veth1_to_hsr\x00'}]}, 0x30}}, 0x0) 12:21:33 executing program 4: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x82, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket(0x10, 0x803, 0x0) sendto(r0, &(0x7f00000000c0)="120000001200e7ef007b00000000000000a1", 0x12, 0x0, 0x0, 0x0) recvmmsg(r0, &(0x7f00000037c0)=[{{&(0x7f00000004c0)=@ethernet={0x0, @random}, 0x80, &(0x7f0000000380)=[{&(0x7f0000000040)=""/95, 0x5f}, {&(0x7f0000000140)=""/85, 0x55}, {&(0x7f0000000fc0)=""/4096, 0x1000}, {&(0x7f0000000400)=""/106, 0x6a}, {&(0x7f0000000740)=""/73, 0x49}, {&(0x7f0000000200)=""/77, 0x4d}, {0x0}], 0x7, &(0x7f0000000600)=""/191, 0xbf, 0x2}}], 0x1, 0x0, &(0x7f0000003700)={0x77359400}) 12:21:33 executing program 3: io_uring_setup(0x74d1, &(0x7f0000000080)={0x0, 0x0, 0x20}) 12:21:33 executing program 2: open(&(0x7f0000000400)='./bus\x00', 0x14103e, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$L2TP_CMD_SESSION_MODIFY(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000080)={0x30, r1, 0x1, 0x0, 0x9000000, {}, [@L2TP_ATTR_SEND_SEQ={0x5}, @L2TP_ATTR_IFNAME={0x14, 0x8, 'veth1_to_hsr\x00'}]}, 0x30}}, 0x0) [ 1001.747506][ T3873] loop1: detected capacity change from 0 to 2048 12:21:33 executing program 4: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x82, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket(0x10, 0x803, 0x0) sendto(r0, &(0x7f00000000c0)="120000001200e7ef007b00000000000000a1", 0x12, 0x0, 0x0, 0x0) recvmmsg(r0, &(0x7f00000037c0)=[{{&(0x7f00000004c0)=@ethernet={0x0, @random}, 0x80, &(0x7f0000000380)=[{&(0x7f0000000040)=""/95, 0x5f}, {&(0x7f0000000140)=""/85, 0x55}, {&(0x7f0000000fc0)=""/4096, 0x1000}, {&(0x7f0000000400)=""/106, 0x6a}, {&(0x7f0000000740)=""/73, 0x49}, {&(0x7f0000000200)=""/77, 0x4d}, {0x0}], 0x7, &(0x7f0000000600)=""/191, 0xbf, 0x3}}], 0x1, 0x0, &(0x7f0000003700)={0x77359400}) [ 1001.834036][ T3873] ext4 filesystem being mounted at /root/syzkaller-testdir1539738704/syzkaller.ao1jj3/3776/bus supports timestamps until 2038 (0x7fffffff) [ 1001.921872][ T3873] loop1: detected capacity change from 2048 to 2047 12:21:33 executing program 5: r0 = socket$unix(0x1, 0x2, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f0000000100)={'vcan0\x00', 0x0}) r2 = socket$can_bcm(0x1d, 0x2, 0x2) connect$can_bcm(r2, &(0x7f0000000000), 0x10) ioctl$sock_kcm_SIOCKCMUNATTACH(0xffffffffffffffff, 0x89e1, 0xffffffffffffffff) ioctl$sock_SIOCSPGRP(0xffffffffffffffff, 0x8902, 0x0) sendmsg$can_bcm(r2, &(0x7f0000000480)={&(0x7f0000000340)={0x1d, r1, 0x3f420f00}, 0x10, &(0x7f0000000040)={&(0x7f0000000580)=ANY=[@ANYBLOB="01000000d7fe68ca0000e9ffffff0000", @ANYRES64=0x0, @ANYRES64=0x0, @ANYRES64=r0, @ANYBLOB="3bf81bb9f1"], 0x20000600}}, 0x0) r3 = socket(0x23, 0x800, 0x40000) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r3, 0x541b, &(0x7f00000000c0)={'ip6_vti0\x00', 0x0}) sendmsg$IPCTNL_MSG_EXP_DELETE(r3, &(0x7f00000004c0)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x40000040}, 0xc, &(0x7f0000000440)={&(0x7f00000006c0)={0x1d0, 0x2, 0x2, 0x201, 0x0, 0x0, {0xa}, [@CTA_EXPECT_NAT={0xc0, 0xa, 0x0, 0x1, [@CTA_EXPECT_NAT_TUPLE={0xc, 0x2, 0x0, 0x1, [@CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x1}]}, @CTA_EXPECT_NAT_TUPLE={0x70, 0x2, 0x0, 0x1, [@CTA_TUPLE_IP={0x2c, 0x1, 0x0, 0x1, @ipv6={{0x14, 0x3, @loopback}, {0x14, 0x4, @private0}}}, @CTA_TUPLE_IP={0x14, 0x1, 0x0, 0x1, @ipv4={{0x8, 0x1, @empty}, {0x8, 0x2, @initdev={0xac, 0x1e, 0x1, 0x0}}}}, @CTA_TUPLE_IP={0x14, 0x1, 0x0, 0x1, @ipv4={{0x8, 0x1, @local}, {0x8, 0x2, @loopback}}}, @CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x4}, @CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x3}, @CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x1}]}, @CTA_EXPECT_NAT_TUPLE={0x38, 0x2, 0x0, 0x1, [@CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5, 0x1, 0x88}}, @CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x3}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5, 0x1, 0x21}}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5, 0x1, 0x1}}, @CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x3}]}, @CTA_EXPECT_NAT_DIR={0x8}]}, @CTA_EXPECT_MASTER={0x20, 0x1, 0x0, 0x1, [@CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x1}, @CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x2}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5, 0x1, 0x84}}]}, @CTA_EXPECT_MASTER={0xdc, 0x1, 0x0, 0x1, [@CTA_TUPLE_IP={0x14, 0x1, 0x0, 0x1, @ipv4={{0x8, 0x1, @multicast1}, {0x8, 0x2, @dev={0xac, 0x14, 0x14, 0x3a}}}}, @CTA_TUPLE_ZONE={0x6}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5, 0x1, 0x21}}, @CTA_TUPLE_IP={0x14, 0x1, 0x0, 0x1, @ipv4={{0x8, 0x1, @empty}, {0x8, 0x2, @local}}}, @CTA_TUPLE_IP={0x2c, 0x1, 0x0, 0x1, @ipv6={{0x14, 0x3, @private1={0xfc, 0x1, '\x00', 0x1}}, {0x14, 0x4, @rand_addr=' \x01\x00'}}}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5, 0x1, 0x1}}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5, 0x1, 0x88}}, @CTA_TUPLE_IP={0x2c, 0x1, 0x0, 0x1, @ipv6={{0x14, 0x3, @empty}, {0x14, 0x4, @dev={0xfe, 0x80, '\x00', 0x21}}}}, @CTA_TUPLE_IP={0x2c, 0x1, 0x0, 0x1, @ipv6={{0x14, 0x3, @local}, {0x14, 0x4, @ipv4={'\x00', '\xff\xff', @rand_addr=0x64010100}}}}]}]}, 0x1d0}}, 0x48000) perf_event_open(&(0x7f0000000500)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x15, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$binfmt_elf32(0xffffffffffffffff, &(0x7f0000000040)=ANY=[], 0x69) connect$can_bcm(0xffffffffffffffff, &(0x7f0000000000), 0x10) sendmsg$can_bcm(0xffffffffffffffff, &(0x7f0000000480)={&(0x7f0000000340)={0x1d, 0x0, 0x3f420f00}, 0x10, &(0x7f0000000040)={&(0x7f0000000580)=ANY=[@ANYBLOB="01000000d7fe68ca0000e9ffffff0000", @ANYRES64=0x0, @ANYRES64=0x0, @ANYRES64=0x0, @ANYRES64], 0x20000600}}, 0x0) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(0xffffffffffffffff, 0x89f0, &(0x7f0000000280)={'gretap0\x00', &(0x7f0000000240)={'ip_vti0\x00', 0x0, 0x7, 0x80, 0xfffffff7, 0x7, {{0x8, 0x4, 0x0, 0x5, 0x20, 0x67, 0x0, 0xc0, 0x29, 0x0, @local, @empty, {[@timestamp={0x44, 0xc, 0x8, 0x0, 0x2, [0x7f, 0x1]}]}}}}}) socket(0x10, 0x3, 0x0) process_mrelease(0xffffffffffffffff, 0x0) r4 = socket$packet(0x11, 0x2, 0x300) ioctl$sock_SIOCGIFINDEX(r4, 0x8933, 0x0) getsockopt$inet_sctp_SCTP_RECVNXTINFO(r3, 0x84, 0x21, &(0x7f0000000140), &(0x7f0000000200)=0x4) bind$unix(r0, &(0x7f00000005c0)=@abs={0x1, 0x0, 0x4e23}, 0x6e) syz_clone(0x40000000, &(0x7f00000000c0), 0x0, 0x0, &(0x7f00000001c0), 0x0) 12:21:33 executing program 3: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r0, 0x80108907, 0x0) 12:21:33 executing program 2: open(&(0x7f0000000400)='./bus\x00', 0x14103e, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$L2TP_CMD_SESSION_MODIFY(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000080)={0x30, r1, 0x1, 0x0, 0xf000000, {}, [@L2TP_ATTR_SEND_SEQ={0x5}, @L2TP_ATTR_IFNAME={0x14, 0x8, 'veth1_to_hsr\x00'}]}, 0x30}}, 0x0) 12:21:33 executing program 4: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x82, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket(0x10, 0x803, 0x0) sendto(r0, &(0x7f00000000c0)="120000001200e7ef007b00000000000000a1", 0x12, 0x0, 0x0, 0x0) recvmmsg(r0, &(0x7f00000037c0)=[{{&(0x7f00000004c0)=@ethernet={0x0, @random}, 0x80, &(0x7f0000000380)=[{&(0x7f0000000040)=""/95, 0x5f}, {&(0x7f0000000140)=""/85, 0x55}, {&(0x7f0000000fc0)=""/4096, 0x1000}, {&(0x7f0000000400)=""/106, 0x6a}, {&(0x7f0000000740)=""/73, 0x49}, {&(0x7f0000000200)=""/77, 0x4d}, {0x0}], 0x7, &(0x7f0000000600)=""/191, 0xbf, 0x4}}], 0x1, 0x0, &(0x7f0000003700)={0x77359400}) 12:21:33 executing program 1: syz_mount_image$ext4(&(0x7f0000000740)='ext4\x00', &(0x7f0000000100)='./bus\x00', 0x804810, &(0x7f0000000180)=ANY=[@ANYBLOB="0061021d307a961da7401271e3fa98008000001d3902ccfd562158cb15c016093893c9e4abd02bc4f1492514fa2dfebc8001000080000000008a1049ca0000"], 0x1, 0x73b, &(0x7f0000000780)="$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") chdir(&(0x7f0000000080)='./file0\x00') open(&(0x7f00000000c0)='./bus\x00', 0x14da42, 0x0) mount(&(0x7f0000000380)=@loop={'/dev/loop', 0x0}, &(0x7f00000003c0)='./bus\x00', 0x0, 0x1000, 0x0) r0 = open(&(0x7f0000000400)='./bus\x00', 0x0, 0x0) ioctl$LOOP_SET_STATUS(r0, 0x4c02, &(0x7f00000001c0)={0x0, {}, 0x0, {}, 0xff, 0x0, 0x0, 0x0, "be8176c9e6755a48a3c0230dd390efe12f8306bed95b2afd402aae879978d959ff9009eec610d9108ea036456bb79e26ee42d0a34968c1fdbb33e8ad5860f632", "b948757aa008fae13adca739a9f126462ab528ea52e90ce2cf50a4ef2568375b"}) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='blkio.throttle.io_service_bytes\x00', 0x275a, 0x8000000) 12:21:33 executing program 0: r0 = socket$unix(0x1, 0x2, 0x0) r1 = socket$can_bcm(0x1d, 0x2, 0x2) connect$can_bcm(r1, &(0x7f0000000000), 0x10) ioctl$sock_kcm_SIOCKCMUNATTACH(0xffffffffffffffff, 0x89e1, 0xffffffffffffffff) getsockopt$inet_sctp_SCTP_PEER_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1a, &(0x7f0000000380)={0x0, 0x7f, "f29c5b753353d9c7798811e57823354f32d6cb0899a53381003e4f8dbbb1ea469076c8e175a20b45443f885afb38b83813d5e013d4fad662f1582b23328b4ed70ad9d7d4d0052d0147d8b0ac4910985bec8aa8956c599d291a7da55fec010801d8f02dcff373f52f59f867378c13f4a080938c965846a7e8229b410b3ea0f9"}, &(0x7f00000002c0)=0x87) socket$igmp6(0xa, 0x3, 0x2) perf_event_open(&(0x7f0000000500)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x15, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) close(0xffffffffffffffff) socket$inet_mptcp(0x2, 0x1, 0x106) connect$can_bcm(0xffffffffffffffff, &(0x7f0000000000), 0x10) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, 0x0) bind$unix(r0, &(0x7f00000005c0)=@abs={0x1, 0x0, 0x4e23}, 0x6e) syz_clone(0x40000000, &(0x7f00000000c0), 0x0, 0x0, &(0x7f00000001c0), 0x0) 12:21:33 executing program 2: open(&(0x7f0000000400)='./bus\x00', 0x14103e, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$L2TP_CMD_SESSION_MODIFY(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000080)={0x30, r1, 0x1, 0x0, 0x13000000, {}, [@L2TP_ATTR_SEND_SEQ={0x5}, @L2TP_ATTR_IFNAME={0x14, 0x8, 'veth1_to_hsr\x00'}]}, 0x30}}, 0x0) 12:21:33 executing program 3: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r0, 0x402c582b, 0x0) 12:21:33 executing program 2: open(&(0x7f0000000400)='./bus\x00', 0x14103e, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$L2TP_CMD_SESSION_MODIFY(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000080)={0x30, r1, 0x1, 0x0, 0x60000000, {}, [@L2TP_ATTR_SEND_SEQ={0x5}, @L2TP_ATTR_IFNAME={0x14, 0x8, 'veth1_to_hsr\x00'}]}, 0x30}}, 0x0) 12:21:33 executing program 4: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x82, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket(0x10, 0x803, 0x0) sendto(r0, &(0x7f00000000c0)="120000001200e7ef007b00000000000000a1", 0x12, 0x0, 0x0, 0x0) recvmmsg(r0, &(0x7f00000037c0)=[{{&(0x7f00000004c0)=@ethernet={0x0, @random}, 0x80, &(0x7f0000000380)=[{&(0x7f0000000040)=""/95, 0x5f}, {&(0x7f0000000140)=""/85, 0x55}, {&(0x7f0000000fc0)=""/4096, 0x1000}, {&(0x7f0000000400)=""/106, 0x6a}, {&(0x7f0000000740)=""/73, 0x49}, {&(0x7f0000000200)=""/77, 0x4d}, {0x0}], 0x7, &(0x7f0000000600)=""/191, 0xbf, 0x5}}], 0x1, 0x0, &(0x7f0000003700)={0x77359400}) 12:21:34 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) sendmmsg$inet(r0, &(0x7f00000006c0)=[{{&(0x7f0000000200)={0x2, 0x4e21, @empty}, 0x10, &(0x7f0000000580)=[{&(0x7f0000000240)="44eb8dbaed38f7ca", 0x8}], 0x1}}], 0x1, 0x0) 12:21:34 executing program 2: open(&(0x7f0000000400)='./bus\x00', 0x14103e, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$L2TP_CMD_SESSION_MODIFY(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000080)={0x30, r1, 0x1, 0x0, 0x9effffff, {}, [@L2TP_ATTR_SEND_SEQ={0x5}, @L2TP_ATTR_IFNAME={0x14, 0x8, 'veth1_to_hsr\x00'}]}, 0x30}}, 0x0) [ 1002.469923][ T3905] loop1: detected capacity change from 0 to 2048 [ 1002.551260][ T3905] ext4 filesystem being mounted at /root/syzkaller-testdir1539738704/syzkaller.ao1jj3/3777/bus supports timestamps until 2038 (0x7fffffff) [ 1002.641868][ T3905] loop1: detected capacity change from 2048 to 2047 12:21:34 executing program 5: r0 = socket$unix(0x1, 0x2, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f0000000100)={'vcan0\x00', 0x0}) r2 = socket$can_bcm(0x1d, 0x2, 0x2) connect$can_bcm(r2, &(0x7f0000000000), 0x10) ioctl$sock_kcm_SIOCKCMUNATTACH(0xffffffffffffffff, 0x89e1, 0xffffffffffffffff) ioctl$sock_SIOCSPGRP(0xffffffffffffffff, 0x8902, 0x0) sendmsg$can_bcm(r2, &(0x7f0000000480)={&(0x7f0000000340)={0x1d, r1, 0x3f420f00}, 0x10, &(0x7f0000000040)={&(0x7f0000000580)=ANY=[@ANYBLOB="01000000d7fe68ca0000e9ffffff0000", @ANYRES64=0x0, @ANYRES64=0x0, @ANYRES64=r0, @ANYBLOB="3bf81bb9f1"], 0x20000600}}, 0x0) r3 = socket(0x23, 0x800, 0x40000) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r3, 0x541b, &(0x7f00000000c0)={'ip6_vti0\x00', 0x0}) sendmsg$IPCTNL_MSG_EXP_DELETE(r3, &(0x7f00000004c0)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x40000040}, 0xc, &(0x7f0000000440)={&(0x7f00000006c0)={0x1d0, 0x2, 0x2, 0x201, 0x0, 0x0, {0xa}, [@CTA_EXPECT_NAT={0xc0, 0xa, 0x0, 0x1, [@CTA_EXPECT_NAT_TUPLE={0xc, 0x2, 0x0, 0x1, [@CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x1}]}, @CTA_EXPECT_NAT_TUPLE={0x70, 0x2, 0x0, 0x1, [@CTA_TUPLE_IP={0x2c, 0x1, 0x0, 0x1, @ipv6={{0x14, 0x3, @loopback}, {0x14, 0x4, @private0}}}, @CTA_TUPLE_IP={0x14, 0x1, 0x0, 0x1, @ipv4={{0x8, 0x1, @empty}, {0x8, 0x2, @initdev={0xac, 0x1e, 0x1, 0x0}}}}, @CTA_TUPLE_IP={0x14, 0x1, 0x0, 0x1, @ipv4={{0x8, 0x1, @local}, {0x8, 0x2, @loopback}}}, @CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x4}, @CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x3}, @CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x1}]}, @CTA_EXPECT_NAT_TUPLE={0x38, 0x2, 0x0, 0x1, [@CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5, 0x1, 0x88}}, @CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x3}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5, 0x1, 0x21}}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5, 0x1, 0x1}}, @CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x3}]}, @CTA_EXPECT_NAT_DIR={0x8}]}, @CTA_EXPECT_MASTER={0x20, 0x1, 0x0, 0x1, [@CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x1}, @CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x2}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5, 0x1, 0x84}}]}, @CTA_EXPECT_MASTER={0xdc, 0x1, 0x0, 0x1, [@CTA_TUPLE_IP={0x14, 0x1, 0x0, 0x1, @ipv4={{0x8, 0x1, @multicast1}, {0x8, 0x2, @dev={0xac, 0x14, 0x14, 0x3a}}}}, @CTA_TUPLE_ZONE={0x6}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5, 0x1, 0x21}}, @CTA_TUPLE_IP={0x14, 0x1, 0x0, 0x1, @ipv4={{0x8, 0x1, @empty}, {0x8, 0x2, @local}}}, @CTA_TUPLE_IP={0x2c, 0x1, 0x0, 0x1, @ipv6={{0x14, 0x3, @private1={0xfc, 0x1, '\x00', 0x1}}, {0x14, 0x4, @rand_addr=' \x01\x00'}}}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5, 0x1, 0x1}}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5, 0x1, 0x88}}, @CTA_TUPLE_IP={0x2c, 0x1, 0x0, 0x1, @ipv6={{0x14, 0x3, @empty}, {0x14, 0x4, @dev={0xfe, 0x80, '\x00', 0x21}}}}, @CTA_TUPLE_IP={0x2c, 0x1, 0x0, 0x1, @ipv6={{0x14, 0x3, @local}, {0x14, 0x4, @ipv4={'\x00', '\xff\xff', @rand_addr=0x64010100}}}}]}]}, 0x1d0}}, 0x48000) perf_event_open(&(0x7f0000000500)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x15, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$binfmt_elf32(0xffffffffffffffff, &(0x7f0000000040)=ANY=[], 0x69) connect$can_bcm(0xffffffffffffffff, &(0x7f0000000000), 0x10) sendmsg$can_bcm(0xffffffffffffffff, &(0x7f0000000480)={&(0x7f0000000340)={0x1d, 0x0, 0x3f420f00}, 0x10, &(0x7f0000000040)={&(0x7f0000000580)=ANY=[@ANYBLOB="01000000d7fe68ca0000e9ffffff0000", @ANYRES64=0x0, @ANYRES64=0x0, @ANYRES64=0x0, @ANYRES64], 0x20000600}}, 0x0) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(0xffffffffffffffff, 0x89f0, &(0x7f0000000280)={'gretap0\x00', &(0x7f0000000240)={'ip_vti0\x00', 0x0, 0x7, 0x80, 0xfffffff7, 0x7, {{0x8, 0x4, 0x0, 0x5, 0x20, 0x67, 0x0, 0xc0, 0x29, 0x0, @local, @empty, {[@timestamp={0x44, 0xc, 0x8, 0x0, 0x2, [0x7f, 0x1]}]}}}}}) socket(0x10, 0x3, 0x0) process_mrelease(0xffffffffffffffff, 0x0) r4 = socket$packet(0x11, 0x2, 0x300) ioctl$sock_SIOCGIFINDEX(r4, 0x8933, 0x0) getsockopt$inet_sctp_SCTP_RECVNXTINFO(r3, 0x84, 0x21, &(0x7f0000000140), &(0x7f0000000200)=0x4) bind$unix(r0, &(0x7f00000005c0)=@abs={0x1, 0x0, 0x4e23}, 0x6e) syz_clone(0x40000000, &(0x7f00000000c0), 0x0, 0x0, &(0x7f00000001c0), 0x0) 12:21:34 executing program 2: open(&(0x7f0000000400)='./bus\x00', 0x14103e, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$L2TP_CMD_SESSION_MODIFY(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000080)={0x30, r1, 0x1, 0x0, 0xd1250000, {}, [@L2TP_ATTR_SEND_SEQ={0x5}, @L2TP_ATTR_IFNAME={0x14, 0x8, 'veth1_to_hsr\x00'}]}, 0x30}}, 0x0) 12:21:34 executing program 1: syz_mount_image$ext4(&(0x7f0000000740)='ext4\x00', &(0x7f0000000100)='./bus\x00', 0x804810, &(0x7f0000000180)=ANY=[@ANYBLOB="0061021d307a961da7401271e3fa98008000001d3902ccfd562158cb15c016093893c9e4abd02bc4f1492514fa2dfebc8001000080000000008a1049ca0000"], 0x1, 0x73b, &(0x7f0000000780)="$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") chdir(&(0x7f0000000080)='./file0\x00') open(&(0x7f00000000c0)='./bus\x00', 0x14da42, 0x0) mount(&(0x7f0000000380)=@loop={'/dev/loop', 0x0}, &(0x7f00000003c0)='./bus\x00', 0x0, 0x1000, 0x0) r0 = open(&(0x7f0000000400)='./bus\x00', 0x0, 0x0) ioctl$LOOP_SET_STATUS(r0, 0x4c02, &(0x7f00000001c0)={0x0, {}, 0x0, {}, 0xff, 0x0, 0x0, 0x0, "be8176c9e6755a48a3c0230dd390efe12f8306bed95b2afd402aae879978d959ff9009eec610d9108ea036456bb79e26ee42d0a34968c1fdbb33e8ad5860f632", "b948757aa008fae13adca739a9f126462ab528ea52e90ce2cf50a4ef2568375b"}) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='blkio.throttle.io_service_bytes\x00', 0x275a, 0x8040000) 12:21:34 executing program 4: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x82, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket(0x10, 0x803, 0x0) sendto(r0, &(0x7f00000000c0)="120000001200e7ef007b00000000000000a1", 0x12, 0x0, 0x0, 0x0) recvmmsg(r0, &(0x7f00000037c0)=[{{&(0x7f00000004c0)=@ethernet={0x0, @random}, 0x80, &(0x7f0000000380)=[{&(0x7f0000000040)=""/95, 0x5f}, {&(0x7f0000000140)=""/85, 0x55}, {&(0x7f0000000fc0)=""/4096, 0x1000}, {&(0x7f0000000400)=""/106, 0x6a}, {&(0x7f0000000740)=""/73, 0x49}, {&(0x7f0000000200)=""/77, 0x4d}, {0x0}], 0x7, &(0x7f0000000600)=""/191, 0xbf, 0x6}}], 0x1, 0x0, &(0x7f0000003700)={0x77359400}) 12:21:34 executing program 3: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000300)={0x18, 0x1, &(0x7f0000000000)=@raw=[@alu={0x6}], &(0x7f0000000080)='GPL\x00', 0x6, 0xb0, &(0x7f00000000c0)=""/176, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 12:21:34 executing program 0: r0 = socket$unix(0x1, 0x2, 0x0) r1 = socket$can_bcm(0x1d, 0x2, 0x2) connect$can_bcm(r1, &(0x7f0000000000), 0x10) ioctl$sock_kcm_SIOCKCMUNATTACH(0xffffffffffffffff, 0x89e1, 0xffffffffffffffff) getsockopt$inet_sctp_SCTP_PEER_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1a, &(0x7f0000000380)={0x0, 0x80, "f29c5b753353d9c7798811e57823354f32d6cb0899a53381003e4f8dbbb1ea469076c8e175a20b45443f885afb38b83813d5e013d4fad662f1582b23328b4ed70ad9d7d4d0052d0147d8b0ac4910985bec8aa8956c599d291a7da55fec010801d8f02dcff373f52f59f867378c13f4a080938c965846a7e8229b410b3ea0f9ce"}, 0x0) socket$igmp6(0xa, 0x3, 0x2) perf_event_open(&(0x7f0000000500)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x15, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) close(0xffffffffffffffff) socket$inet_mptcp(0x2, 0x1, 0x106) connect$can_bcm(0xffffffffffffffff, &(0x7f0000000000), 0x10) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, 0x0) bind$unix(r0, &(0x7f00000005c0)=@abs={0x1, 0x0, 0x4e23}, 0x6e) syz_clone(0x40000000, &(0x7f00000000c0), 0x0, 0x0, &(0x7f00000001c0), 0x0) 12:21:34 executing program 3: bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000280)=@bpf_lsm={0x15, 0x3, &(0x7f0000000000)=@framed, &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 12:21:34 executing program 2: open(&(0x7f0000000400)='./bus\x00', 0x14103e, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$L2TP_CMD_SESSION_MODIFY(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000080)={0x30, r1, 0x1, 0x0, 0xefffffff, {}, [@L2TP_ATTR_SEND_SEQ={0x5}, @L2TP_ATTR_IFNAME={0x14, 0x8, 'veth1_to_hsr\x00'}]}, 0x30}}, 0x0) 12:21:34 executing program 4: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x82, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket(0x10, 0x803, 0x0) sendto(r0, &(0x7f00000000c0)="120000001200e7ef007b00000000000000a1", 0x12, 0x0, 0x0, 0x0) recvmmsg(r0, &(0x7f00000037c0)=[{{&(0x7f00000004c0)=@ethernet={0x0, @random}, 0x80, &(0x7f0000000380)=[{&(0x7f0000000040)=""/95, 0x5f}, {&(0x7f0000000140)=""/85, 0x55}, {&(0x7f0000000fc0)=""/4096, 0x1000}, {&(0x7f0000000400)=""/106, 0x6a}, {&(0x7f0000000740)=""/73, 0x49}, {&(0x7f0000000200)=""/77, 0x4d}, {0x0}], 0x7, &(0x7f0000000600)=""/191, 0xbf, 0x8}}], 0x1, 0x0, &(0x7f0000003700)={0x77359400}) 12:21:34 executing program 3: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_TCP_FASTOPEN_KEY(r0, 0x6, 0x21, &(0x7f0000000000)="454eeb31da3873dc31bb08b6612f8175", 0x10) 12:21:34 executing program 4: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x82, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket(0x10, 0x803, 0x0) sendto(r0, &(0x7f00000000c0)="120000001200e7ef007b00000000000000a1", 0x12, 0x0, 0x0, 0x0) recvmmsg(r0, &(0x7f00000037c0)=[{{&(0x7f00000004c0)=@ethernet={0x0, @random}, 0x80, &(0x7f0000000380)=[{&(0x7f0000000040)=""/95, 0x5f}, {&(0x7f0000000140)=""/85, 0x55}, {&(0x7f0000000fc0)=""/4096, 0x1000}, {&(0x7f0000000400)=""/106, 0x6a}, {&(0x7f0000000740)=""/73, 0x49}, {&(0x7f0000000200)=""/77, 0x4d}, {0x0}], 0x7, &(0x7f0000000600)=""/191, 0xbf, 0x9}}], 0x1, 0x0, &(0x7f0000003700)={0x77359400}) 12:21:34 executing program 2: open(&(0x7f0000000400)='./bus\x00', 0x14103e, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$L2TP_CMD_SESSION_MODIFY(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000080)={0x30, r1, 0x1, 0x0, 0xf0ffffff, {}, [@L2TP_ATTR_SEND_SEQ={0x5}, @L2TP_ATTR_IFNAME={0x14, 0x8, 'veth1_to_hsr\x00'}]}, 0x30}}, 0x0) [ 1003.243783][ T3937] loop1: detected capacity change from 0 to 2048 [ 1003.330691][ T3937] ext4 filesystem being mounted at /root/syzkaller-testdir1539738704/syzkaller.ao1jj3/3778/bus supports timestamps until 2038 (0x7fffffff) [ 1003.458354][ T3937] loop1: detected capacity change from 2048 to 2047 12:21:35 executing program 5: r0 = socket$unix(0x1, 0x2, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f0000000100)={'vcan0\x00', 0x0}) r2 = socket$can_bcm(0x1d, 0x2, 0x2) connect$can_bcm(r2, &(0x7f0000000000), 0x10) ioctl$sock_kcm_SIOCKCMUNATTACH(0xffffffffffffffff, 0x89e1, 0xffffffffffffffff) ioctl$sock_SIOCSPGRP(0xffffffffffffffff, 0x8902, 0x0) sendmsg$can_bcm(r2, &(0x7f0000000480)={&(0x7f0000000340)={0x1d, r1, 0x3f420f00}, 0x10, &(0x7f0000000040)={&(0x7f0000000580)=ANY=[@ANYBLOB="01000000d7fe68ca0000e9ffffff0000", @ANYRES64=0x0, @ANYRES64=0x0, @ANYRES64=r0, @ANYBLOB="3bf81bb9f1"], 0x20000600}}, 0x0) r3 = socket(0x23, 0x800, 0x40000) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r3, 0x541b, &(0x7f00000000c0)={'ip6_vti0\x00', 0x0}) sendmsg$IPCTNL_MSG_EXP_DELETE(r3, &(0x7f00000004c0)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x40000040}, 0xc, &(0x7f0000000440)={&(0x7f00000006c0)={0x1d0, 0x2, 0x2, 0x201, 0x0, 0x0, {0xa}, [@CTA_EXPECT_NAT={0xc0, 0xa, 0x0, 0x1, [@CTA_EXPECT_NAT_TUPLE={0xc, 0x2, 0x0, 0x1, [@CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x1}]}, @CTA_EXPECT_NAT_TUPLE={0x70, 0x2, 0x0, 0x1, [@CTA_TUPLE_IP={0x2c, 0x1, 0x0, 0x1, @ipv6={{0x14, 0x3, @loopback}, {0x14, 0x4, @private0}}}, @CTA_TUPLE_IP={0x14, 0x1, 0x0, 0x1, @ipv4={{0x8, 0x1, @empty}, {0x8, 0x2, @initdev={0xac, 0x1e, 0x1, 0x0}}}}, @CTA_TUPLE_IP={0x14, 0x1, 0x0, 0x1, @ipv4={{0x8, 0x1, @local}, {0x8, 0x2, @loopback}}}, @CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x4}, @CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x3}, @CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x1}]}, @CTA_EXPECT_NAT_TUPLE={0x38, 0x2, 0x0, 0x1, [@CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5, 0x1, 0x88}}, @CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x3}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5, 0x1, 0x21}}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5, 0x1, 0x1}}, @CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x3}]}, @CTA_EXPECT_NAT_DIR={0x8}]}, @CTA_EXPECT_MASTER={0x20, 0x1, 0x0, 0x1, [@CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x1}, @CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x2}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5, 0x1, 0x84}}]}, @CTA_EXPECT_MASTER={0xdc, 0x1, 0x0, 0x1, [@CTA_TUPLE_IP={0x14, 0x1, 0x0, 0x1, @ipv4={{0x8, 0x1, @multicast1}, {0x8, 0x2, @dev={0xac, 0x14, 0x14, 0x3a}}}}, @CTA_TUPLE_ZONE={0x6}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5, 0x1, 0x21}}, @CTA_TUPLE_IP={0x14, 0x1, 0x0, 0x1, @ipv4={{0x8, 0x1, @empty}, {0x8, 0x2, @local}}}, @CTA_TUPLE_IP={0x2c, 0x1, 0x0, 0x1, @ipv6={{0x14, 0x3, @private1={0xfc, 0x1, '\x00', 0x1}}, {0x14, 0x4, @rand_addr=' \x01\x00'}}}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5, 0x1, 0x1}}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5, 0x1, 0x88}}, @CTA_TUPLE_IP={0x2c, 0x1, 0x0, 0x1, @ipv6={{0x14, 0x3, @empty}, {0x14, 0x4, @dev={0xfe, 0x80, '\x00', 0x21}}}}, @CTA_TUPLE_IP={0x2c, 0x1, 0x0, 0x1, @ipv6={{0x14, 0x3, @local}, {0x14, 0x4, @ipv4={'\x00', '\xff\xff', @rand_addr=0x64010100}}}}]}]}, 0x1d0}}, 0x48000) perf_event_open(&(0x7f0000000500)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x15, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$binfmt_elf32(0xffffffffffffffff, &(0x7f0000000040)=ANY=[], 0x69) connect$can_bcm(0xffffffffffffffff, &(0x7f0000000000), 0x10) sendmsg$can_bcm(0xffffffffffffffff, &(0x7f0000000480)={&(0x7f0000000340)={0x1d, 0x0, 0x3f420f00}, 0x10, &(0x7f0000000040)={&(0x7f0000000580)=ANY=[@ANYBLOB="01000000d7fe68ca0000e9ffffff0000", @ANYRES64=0x0, @ANYRES64=0x0, @ANYRES64=0x0, @ANYRES64], 0x20000600}}, 0x0) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(0xffffffffffffffff, 0x89f0, &(0x7f0000000280)={'gretap0\x00', &(0x7f0000000240)={'ip_vti0\x00', 0x0, 0x7, 0x80, 0xfffffff7, 0x7, {{0x8, 0x4, 0x0, 0x5, 0x20, 0x67, 0x0, 0xc0, 0x29, 0x0, @local, @empty, {[@timestamp={0x44, 0xc, 0x8, 0x0, 0x2, [0x7f, 0x1]}]}}}}}) socket(0x10, 0x3, 0x0) process_mrelease(0xffffffffffffffff, 0x0) r4 = socket$packet(0x11, 0x2, 0x300) ioctl$sock_SIOCGIFINDEX(r4, 0x8933, 0x0) getsockopt$inet_sctp_SCTP_RECVNXTINFO(r3, 0x84, 0x21, &(0x7f0000000140), &(0x7f0000000200)=0x4) bind$unix(r0, &(0x7f00000005c0)=@abs={0x1, 0x0, 0x4e23}, 0x6e) syz_clone(0x40000000, &(0x7f00000000c0), 0x0, 0x0, &(0x7f00000001c0), 0x0) 12:21:35 executing program 3: syz_clone3(&(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) 12:21:35 executing program 0: r0 = socket$unix(0x1, 0x2, 0x0) r1 = socket$can_bcm(0x1d, 0x2, 0x2) connect$can_bcm(r1, &(0x7f0000000000), 0x10) ioctl$sock_kcm_SIOCKCMUNATTACH(0xffffffffffffffff, 0x89e1, 0xffffffffffffffff) getsockopt$inet_sctp_SCTP_PEER_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1a, &(0x7f0000000380)={0x0, 0x80, "f29c5b753353d9c7798811e57823354f32d6cb0899a53381003e4f8dbbb1ea469076c8e175a20b45443f885afb38b83813d5e013d4fad662f1582b23328b4ed70ad9d7d4d0052d0147d8b0ac4910985bec8aa8956c599d291a7da55fec010801d8f02dcff373f52f59f867378c13f4a080938c965846a7e8229b410b3ea0f9ce"}, 0x0) socket$igmp6(0xa, 0x3, 0x2) perf_event_open(&(0x7f0000000500)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x15, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) close(0xffffffffffffffff) socket$inet_mptcp(0x2, 0x1, 0x106) connect$can_bcm(0xffffffffffffffff, &(0x7f0000000000), 0x10) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, 0x0) bind$unix(r0, &(0x7f00000005c0)=@abs={0x1, 0x0, 0x4e23}, 0x6e) syz_clone(0x40000000, &(0x7f00000000c0), 0x0, 0x0, &(0x7f00000001c0), 0x0) 12:21:35 executing program 4: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x82, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket(0x10, 0x803, 0x0) sendto(r0, &(0x7f00000000c0)="120000001200e7ef007b00000000000000a1", 0x12, 0x0, 0x0, 0x0) recvmmsg(r0, &(0x7f00000037c0)=[{{&(0x7f00000004c0)=@ethernet={0x0, @random}, 0x80, &(0x7f0000000380)=[{&(0x7f0000000040)=""/95, 0x5f}, {&(0x7f0000000140)=""/85, 0x55}, {&(0x7f0000000fc0)=""/4096, 0x1000}, {&(0x7f0000000400)=""/106, 0x6a}, {&(0x7f0000000740)=""/73, 0x49}, {&(0x7f0000000200)=""/77, 0x4d}, {0x0}], 0x7, &(0x7f0000000600)=""/191, 0xbf, 0xa}}], 0x1, 0x0, &(0x7f0000003700)={0x77359400}) 12:21:35 executing program 2: open(&(0x7f0000000400)='./bus\x00', 0x14103e, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$L2TP_CMD_SESSION_MODIFY(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000080)={0x30, r1, 0x1, 0x0, 0xffffff7f, {}, [@L2TP_ATTR_SEND_SEQ={0x5}, @L2TP_ATTR_IFNAME={0x14, 0x8, 'veth1_to_hsr\x00'}]}, 0x30}}, 0x0) 12:21:35 executing program 1: syz_mount_image$ext4(&(0x7f0000000740)='ext4\x00', &(0x7f0000000100)='./bus\x00', 0x804810, &(0x7f0000000180)=ANY=[@ANYBLOB="0061021d307a961da7401271e3fa98008000001d3902ccfd562158cb15c016093893c9e4abd02bc4f1492514fa2dfebc8001000080000000008a1049ca0000"], 0x1, 0x73b, &(0x7f0000000780)="$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") chdir(&(0x7f0000000080)='./file0\x00') open(&(0x7f00000000c0)='./bus\x00', 0x14da42, 0x0) mount(&(0x7f0000000380)=@loop={'/dev/loop', 0x0}, &(0x7f00000003c0)='./bus\x00', 0x0, 0x1000, 0x0) r0 = open(&(0x7f0000000400)='./bus\x00', 0x0, 0x0) ioctl$LOOP_SET_STATUS(r0, 0x4c02, &(0x7f00000001c0)={0x0, {}, 0x0, {}, 0xff, 0x0, 0x0, 0x0, "be8176c9e6755a48a3c0230dd390efe12f8306bed95b2afd402aae879978d959ff9009eec610d9108ea036456bb79e26ee42d0a34968c1fdbb33e8ad5860f632", "b948757aa008fae13adca739a9f126462ab528ea52e90ce2cf50a4ef2568375b"}) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='blkio.throttle.io_service_bytes\x00', 0x275a, 0x9000000) 12:21:35 executing program 2: open(&(0x7f0000000400)='./bus\x00', 0x14103e, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$L2TP_CMD_SESSION_MODIFY(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000080)={0x30, r1, 0x1, 0x0, 0xffffff9e, {}, [@L2TP_ATTR_SEND_SEQ={0x5}, @L2TP_ATTR_IFNAME={0x14, 0x8, 'veth1_to_hsr\x00'}]}, 0x30}}, 0x0) 12:21:35 executing program 3: clock_gettime(0x0, &(0x7f0000000000)) clock_gettime(0x5, &(0x7f0000000340)) 12:21:35 executing program 4: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x82, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket(0x10, 0x803, 0x0) sendto(r0, &(0x7f00000000c0)="120000001200e7ef007b00000000000000a1", 0x12, 0x0, 0x0, 0x0) recvmmsg(r0, &(0x7f00000037c0)=[{{&(0x7f00000004c0)=@ethernet={0x0, @random}, 0x80, &(0x7f0000000380)=[{&(0x7f0000000040)=""/95, 0x5f}, {&(0x7f0000000140)=""/85, 0x55}, {&(0x7f0000000fc0)=""/4096, 0x1000}, {&(0x7f0000000400)=""/106, 0x6a}, {&(0x7f0000000740)=""/73, 0x49}, {&(0x7f0000000200)=""/77, 0x4d}, {0x0}], 0x7, &(0x7f0000000600)=""/191, 0xbf, 0xc}}], 0x1, 0x0, &(0x7f0000003700)={0x77359400}) 12:21:35 executing program 3: syz_emit_ethernet(0x26, &(0x7f0000000040)={@local, @multicast, @val={@void}, {@arp={0x806, @generic={0x0, 0x0, 0x6, 0x0, 0x0, @remote, "", @local}}}}, 0x0) 12:21:35 executing program 2: open(&(0x7f0000000400)='./bus\x00', 0x14103e, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$L2TP_CMD_SESSION_MODIFY(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000080)={0x30, r1, 0x1, 0x0, 0xffffffef, {}, [@L2TP_ATTR_SEND_SEQ={0x5}, @L2TP_ATTR_IFNAME={0x14, 0x8, 'veth1_to_hsr\x00'}]}, 0x30}}, 0x0) [ 1004.124856][ T3964] loop1: detected capacity change from 0 to 2048 12:21:35 executing program 4: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x82, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket(0x10, 0x803, 0x0) sendto(r0, &(0x7f00000000c0)="120000001200e7ef007b00000000000000a1", 0x12, 0x0, 0x0, 0x0) recvmmsg(r0, &(0x7f00000037c0)=[{{&(0x7f00000004c0)=@ethernet={0x0, @random}, 0x80, &(0x7f0000000380)=[{&(0x7f0000000040)=""/95, 0x5f}, {&(0x7f0000000140)=""/85, 0x55}, {&(0x7f0000000fc0)=""/4096, 0x1000}, {&(0x7f0000000400)=""/106, 0x6a}, {&(0x7f0000000740)=""/73, 0x49}, {&(0x7f0000000200)=""/77, 0x4d}, {0x0}], 0x7, &(0x7f0000000600)=""/191, 0xbf, 0xd}}], 0x1, 0x0, &(0x7f0000003700)={0x77359400}) [ 1004.201210][ T3964] ext4 filesystem being mounted at /root/syzkaller-testdir1539738704/syzkaller.ao1jj3/3779/bus supports timestamps until 2038 (0x7fffffff) [ 1004.321931][ T3964] loop1: detected capacity change from 2048 to 2047 12:21:36 executing program 5: r0 = socket$unix(0x1, 0x2, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f0000000100)={'vcan0\x00', 0x0}) r2 = socket$can_bcm(0x1d, 0x2, 0x2) connect$can_bcm(r2, &(0x7f0000000000), 0x10) ioctl$sock_kcm_SIOCKCMUNATTACH(0xffffffffffffffff, 0x89e1, 0xffffffffffffffff) ioctl$sock_SIOCSPGRP(0xffffffffffffffff, 0x8902, 0x0) sendmsg$can_bcm(r2, &(0x7f0000000480)={&(0x7f0000000340)={0x1d, r1, 0x3f420f00}, 0x10, &(0x7f0000000040)={&(0x7f0000000580)=ANY=[@ANYBLOB="01000000d7fe68ca0000e9ffffff0000", @ANYRES64=0x0, @ANYRES64=0x0, @ANYRES64=r0, @ANYBLOB="3bf81bb9f1"], 0x20000600}}, 0x0) r3 = socket(0x23, 0x800, 0x40000) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r3, 0x541b, &(0x7f00000000c0)={'ip6_vti0\x00', 0x0}) sendmsg$IPCTNL_MSG_EXP_DELETE(r3, &(0x7f00000004c0)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x40000040}, 0xc, &(0x7f0000000440)={&(0x7f00000006c0)={0x1d0, 0x2, 0x2, 0x201, 0x0, 0x0, {0xa}, [@CTA_EXPECT_NAT={0xc0, 0xa, 0x0, 0x1, [@CTA_EXPECT_NAT_TUPLE={0xc, 0x2, 0x0, 0x1, [@CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x1}]}, @CTA_EXPECT_NAT_TUPLE={0x70, 0x2, 0x0, 0x1, [@CTA_TUPLE_IP={0x2c, 0x1, 0x0, 0x1, @ipv6={{0x14, 0x3, @loopback}, {0x14, 0x4, @private0}}}, @CTA_TUPLE_IP={0x14, 0x1, 0x0, 0x1, @ipv4={{0x8, 0x1, @empty}, {0x8, 0x2, @initdev={0xac, 0x1e, 0x1, 0x0}}}}, @CTA_TUPLE_IP={0x14, 0x1, 0x0, 0x1, @ipv4={{0x8, 0x1, @local}, {0x8, 0x2, @loopback}}}, @CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x4}, @CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x3}, @CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x1}]}, @CTA_EXPECT_NAT_TUPLE={0x38, 0x2, 0x0, 0x1, [@CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5, 0x1, 0x88}}, @CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x3}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5, 0x1, 0x21}}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5, 0x1, 0x1}}, @CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x3}]}, @CTA_EXPECT_NAT_DIR={0x8}]}, @CTA_EXPECT_MASTER={0x20, 0x1, 0x0, 0x1, [@CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x1}, @CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x2}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5, 0x1, 0x84}}]}, @CTA_EXPECT_MASTER={0xdc, 0x1, 0x0, 0x1, [@CTA_TUPLE_IP={0x14, 0x1, 0x0, 0x1, @ipv4={{0x8, 0x1, @multicast1}, {0x8, 0x2, @dev={0xac, 0x14, 0x14, 0x3a}}}}, @CTA_TUPLE_ZONE={0x6}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5, 0x1, 0x21}}, @CTA_TUPLE_IP={0x14, 0x1, 0x0, 0x1, @ipv4={{0x8, 0x1, @empty}, {0x8, 0x2, @local}}}, @CTA_TUPLE_IP={0x2c, 0x1, 0x0, 0x1, @ipv6={{0x14, 0x3, @private1={0xfc, 0x1, '\x00', 0x1}}, {0x14, 0x4, @rand_addr=' \x01\x00'}}}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5, 0x1, 0x1}}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5, 0x1, 0x88}}, @CTA_TUPLE_IP={0x2c, 0x1, 0x0, 0x1, @ipv6={{0x14, 0x3, @empty}, {0x14, 0x4, @dev={0xfe, 0x80, '\x00', 0x21}}}}, @CTA_TUPLE_IP={0x2c, 0x1, 0x0, 0x1, @ipv6={{0x14, 0x3, @local}, {0x14, 0x4, @ipv4={'\x00', '\xff\xff', @rand_addr=0x64010100}}}}]}]}, 0x1d0}}, 0x48000) perf_event_open(&(0x7f0000000500)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x15, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$binfmt_elf32(0xffffffffffffffff, &(0x7f0000000040)=ANY=[], 0x69) connect$can_bcm(0xffffffffffffffff, &(0x7f0000000000), 0x10) sendmsg$can_bcm(0xffffffffffffffff, &(0x7f0000000480)={&(0x7f0000000340)={0x1d, 0x0, 0x3f420f00}, 0x10, &(0x7f0000000040)={&(0x7f0000000580)=ANY=[@ANYBLOB="01000000d7fe68ca0000e9ffffff0000", @ANYRES64=0x0, @ANYRES64=0x0, @ANYRES64=0x0, @ANYRES64], 0x20000600}}, 0x0) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(0xffffffffffffffff, 0x89f0, &(0x7f0000000280)={'gretap0\x00', &(0x7f0000000240)={'ip_vti0\x00', 0x0, 0x7, 0x80, 0xfffffff7, 0x7, {{0x8, 0x4, 0x0, 0x5, 0x20, 0x67, 0x0, 0xc0, 0x29, 0x0, @local, @empty, {[@timestamp={0x44, 0xc, 0x8, 0x0, 0x2, [0x7f, 0x1]}]}}}}}) socket(0x10, 0x3, 0x0) process_mrelease(0xffffffffffffffff, 0x0) r4 = socket$packet(0x11, 0x2, 0x300) ioctl$sock_SIOCGIFINDEX(r4, 0x8933, 0x0) getsockopt$inet_sctp_SCTP_RECVNXTINFO(r3, 0x84, 0x21, &(0x7f0000000140), &(0x7f0000000200)=0x4) bind$unix(r0, &(0x7f00000005c0)=@abs={0x1, 0x0, 0x4e23}, 0x6e) syz_clone(0x40000000, &(0x7f00000000c0), 0x0, 0x0, &(0x7f00000001c0), 0x0) 12:21:36 executing program 3: bpf$BPF_PROG_WITH_BTFID_LOAD(0x23, &(0x7f0000000940)=@bpf_ext={0x1c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 12:21:36 executing program 2: open(&(0x7f0000000400)='./bus\x00', 0x14103e, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$L2TP_CMD_SESSION_MODIFY(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000080)={0x30, r1, 0x1, 0x0, 0xfffffff0, {}, [@L2TP_ATTR_SEND_SEQ={0x5}, @L2TP_ATTR_IFNAME={0x14, 0x8, 'veth1_to_hsr\x00'}]}, 0x30}}, 0x0) 12:21:36 executing program 4: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x82, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket(0x10, 0x803, 0x0) sendto(r0, &(0x7f00000000c0)="120000001200e7ef007b00000000000000a1", 0x12, 0x0, 0x0, 0x0) recvmmsg(r0, &(0x7f00000037c0)=[{{&(0x7f00000004c0)=@ethernet={0x0, @random}, 0x80, &(0x7f0000000380)=[{&(0x7f0000000040)=""/95, 0x5f}, {&(0x7f0000000140)=""/85, 0x55}, {&(0x7f0000000fc0)=""/4096, 0x1000}, {&(0x7f0000000400)=""/106, 0x6a}, {&(0x7f0000000740)=""/73, 0x49}, {&(0x7f0000000200)=""/77, 0x4d}, {0x0}], 0x7, &(0x7f0000000600)=""/191, 0xbf, 0xf}}], 0x1, 0x0, &(0x7f0000003700)={0x77359400}) 12:21:36 executing program 1: syz_mount_image$ext4(&(0x7f0000000740)='ext4\x00', &(0x7f0000000100)='./bus\x00', 0x804810, &(0x7f0000000180)=ANY=[@ANYBLOB="0061021d307a961da7401271e3fa98008000001d3902ccfd562158cb15c016093893c9e4abd02bc4f1492514fa2dfebc8001000080000000008a1049ca0000"], 0x1, 0x73b, &(0x7f0000000780)="$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") chdir(&(0x7f0000000080)='./file0\x00') open(&(0x7f00000000c0)='./bus\x00', 0x14da42, 0x0) mount(&(0x7f0000000380)=@loop={'/dev/loop', 0x0}, &(0x7f00000003c0)='./bus\x00', 0x0, 0x1000, 0x0) r0 = open(&(0x7f0000000400)='./bus\x00', 0x0, 0x0) ioctl$LOOP_SET_STATUS(r0, 0x4c02, &(0x7f00000001c0)={0x0, {}, 0x0, {}, 0xff, 0x0, 0x0, 0x0, "be8176c9e6755a48a3c0230dd390efe12f8306bed95b2afd402aae879978d959ff9009eec610d9108ea036456bb79e26ee42d0a34968c1fdbb33e8ad5860f632", "b948757aa008fae13adca739a9f126462ab528ea52e90ce2cf50a4ef2568375b"}) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='blkio.throttle.io_service_bytes\x00', 0x275a, 0xa000000) 12:21:36 executing program 0: r0 = socket$unix(0x1, 0x2, 0x0) r1 = socket$can_bcm(0x1d, 0x2, 0x2) connect$can_bcm(r1, &(0x7f0000000000), 0x10) ioctl$sock_kcm_SIOCKCMUNATTACH(0xffffffffffffffff, 0x89e1, 0xffffffffffffffff) getsockopt$inet_sctp_SCTP_PEER_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1a, &(0x7f0000000380)={0x0, 0x80, "f29c5b753353d9c7798811e57823354f32d6cb0899a53381003e4f8dbbb1ea469076c8e175a20b45443f885afb38b83813d5e013d4fad662f1582b23328b4ed70ad9d7d4d0052d0147d8b0ac4910985bec8aa8956c599d291a7da55fec010801d8f02dcff373f52f59f867378c13f4a080938c965846a7e8229b410b3ea0f9ce"}, 0x0) socket$igmp6(0xa, 0x3, 0x2) perf_event_open(&(0x7f0000000500)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x15, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) close(0xffffffffffffffff) socket$inet_mptcp(0x2, 0x1, 0x106) connect$can_bcm(0xffffffffffffffff, &(0x7f0000000000), 0x10) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, 0x0) bind$unix(r0, &(0x7f00000005c0)=@abs={0x1, 0x0, 0x4e23}, 0x6e) syz_clone(0x40000000, &(0x7f00000000c0), 0x0, 0x0, &(0x7f00000001c0), 0x0) 12:21:36 executing program 2: open(&(0x7f0000000400)='./bus\x00', 0x14103e, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$L2TP_CMD_SESSION_MODIFY(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000080)={0x30, r1, 0x1, 0x0, 0x0, {0x2}, [@L2TP_ATTR_SEND_SEQ={0x5}, @L2TP_ATTR_IFNAME={0x14, 0x8, 'veth1_to_hsr\x00'}]}, 0x30}}, 0x0) 12:21:36 executing program 3: r0 = syz_open_dev$loop(&(0x7f0000000000), 0x0, 0x0) ioctl$HDIO_GETGEO(r0, 0x301, &(0x7f0000000080)) 12:21:36 executing program 4: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x82, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket(0x10, 0x803, 0x0) sendto(r0, &(0x7f00000000c0)="120000001200e7ef007b00000000000000a1", 0x12, 0x0, 0x0, 0x0) recvmmsg(r0, &(0x7f00000037c0)=[{{&(0x7f00000004c0)=@ethernet={0x0, @random}, 0x80, &(0x7f0000000380)=[{&(0x7f0000000040)=""/95, 0x5f}, {&(0x7f0000000140)=""/85, 0x55}, {&(0x7f0000000fc0)=""/4096, 0x1000}, {&(0x7f0000000400)=""/106, 0x6a}, {&(0x7f0000000740)=""/73, 0x49}, {&(0x7f0000000200)=""/77, 0x4d}, {0x0}], 0x7, &(0x7f0000000600)=""/191, 0xbf, 0x10}}], 0x1, 0x0, &(0x7f0000003700)={0x77359400}) 12:21:36 executing program 2: open(&(0x7f0000000400)='./bus\x00', 0x14103e, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$L2TP_CMD_SESSION_MODIFY(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000080)={0x30, r1, 0x1, 0x0, 0x0, {0x3}, [@L2TP_ATTR_SEND_SEQ={0x5}, @L2TP_ATTR_IFNAME={0x14, 0x8, 'veth1_to_hsr\x00'}]}, 0x30}}, 0x0) 12:21:36 executing program 3: bpf$BPF_PROG_WITH_BTFID_LOAD(0x6, &(0x7f0000000940)=@bpf_ext={0x1c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) [ 1004.949740][ T3998] loop1: detected capacity change from 0 to 2048 12:21:36 executing program 4: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x82, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket(0x10, 0x803, 0x0) sendto(r0, &(0x7f00000000c0)="120000001200e7ef007b00000000000000a1", 0x12, 0x0, 0x0, 0x0) recvmmsg(r0, &(0x7f00000037c0)=[{{&(0x7f00000004c0)=@ethernet={0x0, @random}, 0x80, &(0x7f0000000380)=[{&(0x7f0000000040)=""/95, 0x5f}, {&(0x7f0000000140)=""/85, 0x55}, {&(0x7f0000000fc0)=""/4096, 0x1000}, {&(0x7f0000000400)=""/106, 0x6a}, {&(0x7f0000000740)=""/73, 0x49}, {&(0x7f0000000200)=""/77, 0x4d}, {0x0}], 0x7, &(0x7f0000000600)=""/191, 0xbf, 0x60}}], 0x1, 0x0, &(0x7f0000003700)={0x77359400}) [ 1005.055095][ T3998] ext4 filesystem being mounted at /root/syzkaller-testdir1539738704/syzkaller.ao1jj3/3780/bus supports timestamps until 2038 (0x7fffffff) [ 1005.141906][ T3998] loop1: detected capacity change from 2048 to 2047 12:21:37 executing program 5: r0 = socket$unix(0x1, 0x2, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f0000000100)={'vcan0\x00', 0x0}) r2 = socket$can_bcm(0x1d, 0x2, 0x2) connect$can_bcm(r2, &(0x7f0000000000), 0x10) ioctl$sock_kcm_SIOCKCMUNATTACH(0xffffffffffffffff, 0x89e1, 0xffffffffffffffff) ioctl$sock_SIOCSPGRP(0xffffffffffffffff, 0x8902, 0x0) sendmsg$can_bcm(r2, &(0x7f0000000480)={&(0x7f0000000340)={0x1d, r1, 0x3f420f00}, 0x10, &(0x7f0000000040)={&(0x7f0000000580)=ANY=[@ANYBLOB="01000000d7fe68ca0000e9ffffff0000", @ANYRES64=0x0, @ANYRES64=0x0, @ANYRES64=r0, @ANYBLOB="3bf81bb9f1"], 0x20000600}}, 0x0) r3 = socket(0x23, 0x800, 0x40000) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r3, 0x541b, &(0x7f00000000c0)={'ip6_vti0\x00', 0x0}) sendmsg$IPCTNL_MSG_EXP_DELETE(r3, &(0x7f00000004c0)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x40000040}, 0xc, &(0x7f0000000440)={&(0x7f00000006c0)={0x1d0, 0x2, 0x2, 0x201, 0x0, 0x0, {0xa}, [@CTA_EXPECT_NAT={0xc0, 0xa, 0x0, 0x1, [@CTA_EXPECT_NAT_TUPLE={0xc, 0x2, 0x0, 0x1, [@CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x1}]}, @CTA_EXPECT_NAT_TUPLE={0x70, 0x2, 0x0, 0x1, [@CTA_TUPLE_IP={0x2c, 0x1, 0x0, 0x1, @ipv6={{0x14, 0x3, @loopback}, {0x14, 0x4, @private0}}}, @CTA_TUPLE_IP={0x14, 0x1, 0x0, 0x1, @ipv4={{0x8, 0x1, @empty}, {0x8, 0x2, @initdev={0xac, 0x1e, 0x1, 0x0}}}}, @CTA_TUPLE_IP={0x14, 0x1, 0x0, 0x1, @ipv4={{0x8, 0x1, @local}, {0x8, 0x2, @loopback}}}, @CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x4}, @CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x3}, @CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x1}]}, @CTA_EXPECT_NAT_TUPLE={0x38, 0x2, 0x0, 0x1, [@CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5, 0x1, 0x88}}, @CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x3}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5, 0x1, 0x21}}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5, 0x1, 0x1}}, @CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x3}]}, @CTA_EXPECT_NAT_DIR={0x8}]}, @CTA_EXPECT_MASTER={0x20, 0x1, 0x0, 0x1, [@CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x1}, @CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x2}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5, 0x1, 0x84}}]}, @CTA_EXPECT_MASTER={0xdc, 0x1, 0x0, 0x1, [@CTA_TUPLE_IP={0x14, 0x1, 0x0, 0x1, @ipv4={{0x8, 0x1, @multicast1}, {0x8, 0x2, @dev={0xac, 0x14, 0x14, 0x3a}}}}, @CTA_TUPLE_ZONE={0x6}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5, 0x1, 0x21}}, @CTA_TUPLE_IP={0x14, 0x1, 0x0, 0x1, @ipv4={{0x8, 0x1, @empty}, {0x8, 0x2, @local}}}, @CTA_TUPLE_IP={0x2c, 0x1, 0x0, 0x1, @ipv6={{0x14, 0x3, @private1={0xfc, 0x1, '\x00', 0x1}}, {0x14, 0x4, @rand_addr=' \x01\x00'}}}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5, 0x1, 0x1}}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5, 0x1, 0x88}}, @CTA_TUPLE_IP={0x2c, 0x1, 0x0, 0x1, @ipv6={{0x14, 0x3, @empty}, {0x14, 0x4, @dev={0xfe, 0x80, '\x00', 0x21}}}}, @CTA_TUPLE_IP={0x2c, 0x1, 0x0, 0x1, @ipv6={{0x14, 0x3, @local}, {0x14, 0x4, @ipv4={'\x00', '\xff\xff', @rand_addr=0x64010100}}}}]}]}, 0x1d0}}, 0x48000) perf_event_open(&(0x7f0000000500)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x15, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$binfmt_elf32(0xffffffffffffffff, &(0x7f0000000040)=ANY=[], 0x69) connect$can_bcm(0xffffffffffffffff, &(0x7f0000000000), 0x10) sendmsg$can_bcm(0xffffffffffffffff, &(0x7f0000000480)={&(0x7f0000000340)={0x1d, 0x0, 0x3f420f00}, 0x10, &(0x7f0000000040)={&(0x7f0000000580)=ANY=[@ANYBLOB="01000000d7fe68ca0000e9ffffff0000", @ANYRES64=0x0, @ANYRES64=0x0, @ANYRES64=0x0, @ANYRES64], 0x20000600}}, 0x0) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(0xffffffffffffffff, 0x89f0, &(0x7f0000000280)={'gretap0\x00', &(0x7f0000000240)={'ip_vti0\x00', 0x0, 0x7, 0x80, 0xfffffff7, 0x7, {{0x8, 0x4, 0x0, 0x5, 0x20, 0x67, 0x0, 0xc0, 0x29, 0x0, @local, @empty, {[@timestamp={0x44, 0xc, 0x8, 0x0, 0x2, [0x7f, 0x1]}]}}}}}) socket(0x10, 0x3, 0x0) process_mrelease(0xffffffffffffffff, 0x0) r4 = socket$packet(0x11, 0x2, 0x300) ioctl$sock_SIOCGIFINDEX(r4, 0x8933, 0x0) getsockopt$inet_sctp_SCTP_RECVNXTINFO(r3, 0x84, 0x21, &(0x7f0000000140), &(0x7f0000000200)=0x4) bind$unix(r0, &(0x7f00000005c0)=@abs={0x1, 0x0, 0x4e23}, 0x6e) syz_clone(0x40000000, &(0x7f00000000c0), 0x0, 0x0, &(0x7f00000001c0), 0x0) 12:21:37 executing program 3: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000100)={0x2, &(0x7f00000000c0)=[{}, {0x8}]}, 0x8) 12:21:37 executing program 4: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x82, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket(0x10, 0x803, 0x0) sendto(r0, &(0x7f00000000c0)="120000001200e7ef007b00000000000000a1", 0x12, 0x0, 0x0, 0x0) recvmmsg(r0, &(0x7f00000037c0)=[{{&(0x7f00000004c0)=@ethernet={0x0, @random}, 0x80, &(0x7f0000000380)=[{&(0x7f0000000040)=""/95, 0x5f}, {&(0x7f0000000140)=""/85, 0x55}, {&(0x7f0000000fc0)=""/4096, 0x1000}, {&(0x7f0000000400)=""/106, 0x6a}, {&(0x7f0000000740)=""/73, 0x49}, {&(0x7f0000000200)=""/77, 0x4d}, {0x0}], 0x7, &(0x7f0000000600)=""/191, 0xbf, 0x300}}], 0x1, 0x0, &(0x7f0000003700)={0x77359400}) 12:21:37 executing program 2: open(&(0x7f0000000400)='./bus\x00', 0x14103e, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$L2TP_CMD_SESSION_MODIFY(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000080)={0x30, r1, 0x1, 0x0, 0x0, {0x4}, [@L2TP_ATTR_SEND_SEQ={0x5}, @L2TP_ATTR_IFNAME={0x14, 0x8, 'veth1_to_hsr\x00'}]}, 0x30}}, 0x0) 12:21:37 executing program 1: syz_mount_image$ext4(&(0x7f0000000740)='ext4\x00', &(0x7f0000000100)='./bus\x00', 0x804810, &(0x7f0000000180)=ANY=[@ANYBLOB="0061021d307a961da7401271e3fa98008000001d3902ccfd562158cb15c016093893c9e4abd02bc4f1492514fa2dfebc8001000080000000008a1049ca0000"], 0x1, 0x73b, &(0x7f0000000780)="$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") chdir(&(0x7f0000000080)='./file0\x00') open(&(0x7f00000000c0)='./bus\x00', 0x14da42, 0x0) mount(&(0x7f0000000380)=@loop={'/dev/loop', 0x0}, &(0x7f00000003c0)='./bus\x00', 0x0, 0x1000, 0x0) r0 = open(&(0x7f0000000400)='./bus\x00', 0x0, 0x0) ioctl$LOOP_SET_STATUS(r0, 0x4c02, &(0x7f00000001c0)={0x0, {}, 0x0, {}, 0xff, 0x0, 0x0, 0x0, "be8176c9e6755a48a3c0230dd390efe12f8306bed95b2afd402aae879978d959ff9009eec610d9108ea036456bb79e26ee42d0a34968c1fdbb33e8ad5860f632", "b948757aa008fae13adca739a9f126462ab528ea52e90ce2cf50a4ef2568375b"}) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='blkio.throttle.io_service_bytes\x00', 0x275a, 0xb000000) [ 1005.609083][ T4027] loop1: detected capacity change from 0 to 2048 12:21:37 executing program 0: r0 = socket$unix(0x1, 0x2, 0x0) r1 = socket$can_bcm(0x1d, 0x2, 0x2) connect$can_bcm(r1, &(0x7f0000000000), 0x10) ioctl$sock_kcm_SIOCKCMUNATTACH(0xffffffffffffffff, 0x89e1, 0xffffffffffffffff) getsockopt$inet_sctp_SCTP_PEER_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1a, &(0x7f0000000380)={0x0, 0x80, "f29c5b753353d9c7798811e57823354f32d6cb0899a53381003e4f8dbbb1ea469076c8e175a20b45443f885afb38b83813d5e013d4fad662f1582b23328b4ed70ad9d7d4d0052d0147d8b0ac4910985bec8aa8956c599d291a7da55fec010801d8f02dcff373f52f59f867378c13f4a080938c965846a7e8229b410b3ea0f9ce"}, &(0x7f00000002c0)=0x88) socket$igmp6(0xa, 0x3, 0x2) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) close(0xffffffffffffffff) socket$inet_mptcp(0x2, 0x1, 0x106) connect$can_bcm(0xffffffffffffffff, &(0x7f0000000000), 0x10) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, 0x0) bind$unix(r0, &(0x7f00000005c0)=@abs={0x1, 0x0, 0x4e23}, 0x6e) syz_clone(0x40000000, &(0x7f00000000c0), 0x0, 0x0, &(0x7f00000001c0), 0x0) 12:21:37 executing program 3: socket(0x39, 0x0, 0x0) 12:21:37 executing program 2: open(&(0x7f0000000400)='./bus\x00', 0x14103e, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$L2TP_CMD_SESSION_MODIFY(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000080)={0x30, r1, 0x1, 0x0, 0x0, {0x5}, [@L2TP_ATTR_SEND_SEQ={0x5}, @L2TP_ATTR_IFNAME={0x14, 0x8, 'veth1_to_hsr\x00'}]}, 0x30}}, 0x0) 12:21:37 executing program 4: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x82, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket(0x10, 0x803, 0x0) sendto(r0, &(0x7f00000000c0)="120000001200e7ef007b00000000000000a1", 0x12, 0x0, 0x0, 0x0) recvmmsg(r0, &(0x7f00000037c0)=[{{&(0x7f00000004c0)=@ethernet={0x0, @random}, 0x80, &(0x7f0000000380)=[{&(0x7f0000000040)=""/95, 0x5f}, {&(0x7f0000000140)=""/85, 0x55}, {&(0x7f0000000fc0)=""/4096, 0x1000}, {&(0x7f0000000400)=""/106, 0x6a}, {&(0x7f0000000740)=""/73, 0x49}, {&(0x7f0000000200)=""/77, 0x4d}, {0x0}], 0x7, &(0x7f0000000600)=""/191, 0xbf, 0x500}}], 0x1, 0x0, &(0x7f0000003700)={0x77359400}) 12:21:37 executing program 3: r0 = syz_genetlink_get_family_id$batadv(&(0x7f0000000040), 0xffffffffffffffff) r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$BATADV_CMD_GET_VLAN(r1, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000200)={0x1c, r0, 0x1, 0x0, 0x0, {}, [@BATADV_ATTR_MESH_IFINDEX={0x8}]}, 0x1c}}, 0x0) 12:21:37 executing program 2: open(&(0x7f0000000400)='./bus\x00', 0x14103e, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$L2TP_CMD_SESSION_MODIFY(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000080)={0x30, r1, 0x1, 0x0, 0x0, {0x6}, [@L2TP_ATTR_SEND_SEQ={0x5}, @L2TP_ATTR_IFNAME={0x14, 0x8, 'veth1_to_hsr\x00'}]}, 0x30}}, 0x0) 12:21:37 executing program 3: uname(&(0x7f0000000340)=""/106) [ 1005.708178][ T4027] ext4 filesystem being mounted at /root/syzkaller-testdir1539738704/syzkaller.ao1jj3/3781/bus supports timestamps until 2038 (0x7fffffff) [ 1005.879218][ T4027] loop1: detected capacity change from 2048 to 2047 12:21:37 executing program 5: r0 = socket$unix(0x1, 0x2, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f0000000100)={'vcan0\x00', 0x0}) r2 = socket$can_bcm(0x1d, 0x2, 0x2) connect$can_bcm(r2, &(0x7f0000000000), 0x10) ioctl$sock_kcm_SIOCKCMUNATTACH(0xffffffffffffffff, 0x89e1, 0xffffffffffffffff) ioctl$sock_SIOCSPGRP(0xffffffffffffffff, 0x8902, 0x0) sendmsg$can_bcm(r2, &(0x7f0000000480)={&(0x7f0000000340)={0x1d, r1, 0x3f420f00}, 0x10, &(0x7f0000000040)={&(0x7f0000000580)=ANY=[@ANYBLOB="01000000d7fe68ca0000e9ffffff0000", @ANYRES64=0x0, @ANYRES64=0x0, @ANYRES64=r0, @ANYBLOB="3bf81bb9f1"], 0x20000600}}, 0x0) r3 = socket(0x23, 0x800, 0x40000) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r3, 0x541b, &(0x7f00000000c0)={'ip6_vti0\x00', 0x0}) sendmsg$IPCTNL_MSG_EXP_DELETE(r3, &(0x7f00000004c0)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x40000040}, 0xc, &(0x7f0000000440)={&(0x7f00000006c0)={0x1d0, 0x2, 0x2, 0x201, 0x0, 0x0, {0xa}, [@CTA_EXPECT_NAT={0xc0, 0xa, 0x0, 0x1, [@CTA_EXPECT_NAT_TUPLE={0xc, 0x2, 0x0, 0x1, [@CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x1}]}, @CTA_EXPECT_NAT_TUPLE={0x70, 0x2, 0x0, 0x1, [@CTA_TUPLE_IP={0x2c, 0x1, 0x0, 0x1, @ipv6={{0x14, 0x3, @loopback}, {0x14, 0x4, @private0}}}, @CTA_TUPLE_IP={0x14, 0x1, 0x0, 0x1, @ipv4={{0x8, 0x1, @empty}, {0x8, 0x2, @initdev={0xac, 0x1e, 0x1, 0x0}}}}, @CTA_TUPLE_IP={0x14, 0x1, 0x0, 0x1, @ipv4={{0x8, 0x1, @local}, {0x8, 0x2, @loopback}}}, @CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x4}, @CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x3}, @CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x1}]}, @CTA_EXPECT_NAT_TUPLE={0x38, 0x2, 0x0, 0x1, [@CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5, 0x1, 0x88}}, @CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x3}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5, 0x1, 0x21}}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5, 0x1, 0x1}}, @CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x3}]}, @CTA_EXPECT_NAT_DIR={0x8}]}, @CTA_EXPECT_MASTER={0x20, 0x1, 0x0, 0x1, [@CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x1}, @CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x2}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5, 0x1, 0x84}}]}, @CTA_EXPECT_MASTER={0xdc, 0x1, 0x0, 0x1, [@CTA_TUPLE_IP={0x14, 0x1, 0x0, 0x1, @ipv4={{0x8, 0x1, @multicast1}, {0x8, 0x2, @dev={0xac, 0x14, 0x14, 0x3a}}}}, @CTA_TUPLE_ZONE={0x6}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5, 0x1, 0x21}}, @CTA_TUPLE_IP={0x14, 0x1, 0x0, 0x1, @ipv4={{0x8, 0x1, @empty}, {0x8, 0x2, @local}}}, @CTA_TUPLE_IP={0x2c, 0x1, 0x0, 0x1, @ipv6={{0x14, 0x3, @private1={0xfc, 0x1, '\x00', 0x1}}, {0x14, 0x4, @rand_addr=' \x01\x00'}}}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5, 0x1, 0x1}}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5, 0x1, 0x88}}, @CTA_TUPLE_IP={0x2c, 0x1, 0x0, 0x1, @ipv6={{0x14, 0x3, @empty}, {0x14, 0x4, @dev={0xfe, 0x80, '\x00', 0x21}}}}, @CTA_TUPLE_IP={0x2c, 0x1, 0x0, 0x1, @ipv6={{0x14, 0x3, @local}, {0x14, 0x4, @ipv4={'\x00', '\xff\xff', @rand_addr=0x64010100}}}}]}]}, 0x1d0}}, 0x48000) perf_event_open(&(0x7f0000000500)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x15, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$binfmt_elf32(0xffffffffffffffff, &(0x7f0000000040)=ANY=[], 0x69) connect$can_bcm(0xffffffffffffffff, &(0x7f0000000000), 0x10) sendmsg$can_bcm(0xffffffffffffffff, &(0x7f0000000480)={&(0x7f0000000340)={0x1d, 0x0, 0x3f420f00}, 0x10, &(0x7f0000000040)={&(0x7f0000000580)=ANY=[@ANYBLOB="01000000d7fe68ca0000e9ffffff0000", @ANYRES64=0x0, @ANYRES64=0x0, @ANYRES64=0x0, @ANYRES64], 0x20000600}}, 0x0) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(0xffffffffffffffff, 0x89f0, &(0x7f0000000280)={'gretap0\x00', &(0x7f0000000240)={'ip_vti0\x00', 0x0, 0x7, 0x80, 0xfffffff7, 0x7, {{0x8, 0x4, 0x0, 0x5, 0x20, 0x67, 0x0, 0xc0, 0x29, 0x0, @local, @empty, {[@timestamp={0x44, 0xc, 0x8, 0x0, 0x2, [0x7f, 0x1]}]}}}}}) socket(0x10, 0x3, 0x0) process_mrelease(0xffffffffffffffff, 0x0) r4 = socket$packet(0x11, 0x2, 0x300) ioctl$sock_SIOCGIFINDEX(r4, 0x8933, 0x0) getsockopt$inet_sctp_SCTP_RECVNXTINFO(r3, 0x84, 0x21, &(0x7f0000000140), &(0x7f0000000200)=0x4) bind$unix(r0, &(0x7f00000005c0)=@abs={0x1, 0x0, 0x4e23}, 0x6e) syz_clone(0x40000000, &(0x7f00000000c0), 0x0, 0x0, &(0x7f00000001c0), 0x0) 12:21:37 executing program 4: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x82, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket(0x10, 0x803, 0x0) sendto(r0, &(0x7f00000000c0)="120000001200e7ef007b00000000000000a1", 0x12, 0x0, 0x0, 0x0) recvmmsg(r0, &(0x7f00000037c0)=[{{&(0x7f00000004c0)=@ethernet={0x0, @random}, 0x80, &(0x7f0000000380)=[{&(0x7f0000000040)=""/95, 0x5f}, {&(0x7f0000000140)=""/85, 0x55}, {&(0x7f0000000fc0)=""/4096, 0x1000}, {&(0x7f0000000400)=""/106, 0x6a}, {&(0x7f0000000740)=""/73, 0x49}, {&(0x7f0000000200)=""/77, 0x4d}, {0x0}], 0x7, &(0x7f0000000600)=""/191, 0xbf, 0x600}}], 0x1, 0x0, &(0x7f0000003700)={0x77359400}) 12:21:37 executing program 2: open(&(0x7f0000000400)='./bus\x00', 0x14103e, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$L2TP_CMD_SESSION_MODIFY(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000080)={0x30, r1, 0x1, 0x0, 0x0, {0x9}, [@L2TP_ATTR_SEND_SEQ={0x5}, @L2TP_ATTR_IFNAME={0x14, 0x8, 'veth1_to_hsr\x00'}]}, 0x30}}, 0x0) 12:21:37 executing program 3: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000380)={0x2, &(0x7f0000000280)=[{0x4}, {0x6}]}) 12:21:37 executing program 1: syz_mount_image$ext4(&(0x7f0000000740)='ext4\x00', &(0x7f0000000100)='./bus\x00', 0x804810, &(0x7f0000000180)=ANY=[@ANYBLOB="0061021d307a961da7401271e3fa98008000001d3902ccfd562158cb15c016093893c9e4abd02bc4f1492514fa2dfebc8001000080000000008a1049ca0000"], 0x1, 0x73b, &(0x7f0000000780)="$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") chdir(&(0x7f0000000080)='./file0\x00') open(&(0x7f00000000c0)='./bus\x00', 0x14da42, 0x0) mount(&(0x7f0000000380)=@loop={'/dev/loop', 0x0}, &(0x7f00000003c0)='./bus\x00', 0x0, 0x1000, 0x0) r0 = open(&(0x7f0000000400)='./bus\x00', 0x0, 0x0) ioctl$LOOP_SET_STATUS(r0, 0x4c02, &(0x7f00000001c0)={0x0, {}, 0x0, {}, 0xff, 0x0, 0x0, 0x0, "be8176c9e6755a48a3c0230dd390efe12f8306bed95b2afd402aae879978d959ff9009eec610d9108ea036456bb79e26ee42d0a34968c1fdbb33e8ad5860f632", "b948757aa008fae13adca739a9f126462ab528ea52e90ce2cf50a4ef2568375b"}) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='blkio.throttle.io_service_bytes\x00', 0x275a, 0xc000000) 12:21:37 executing program 0: r0 = socket$unix(0x1, 0x2, 0x0) r1 = socket$can_bcm(0x1d, 0x2, 0x2) connect$can_bcm(r1, &(0x7f0000000000), 0x10) ioctl$sock_kcm_SIOCKCMUNATTACH(0xffffffffffffffff, 0x89e1, 0xffffffffffffffff) getsockopt$inet_sctp_SCTP_PEER_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1a, &(0x7f0000000380)={0x0, 0x80, "f29c5b753353d9c7798811e57823354f32d6cb0899a53381003e4f8dbbb1ea469076c8e175a20b45443f885afb38b83813d5e013d4fad662f1582b23328b4ed70ad9d7d4d0052d0147d8b0ac4910985bec8aa8956c599d291a7da55fec010801d8f02dcff373f52f59f867378c13f4a080938c965846a7e8229b410b3ea0f9ce"}, &(0x7f00000002c0)=0x88) socket$igmp6(0xa, 0x3, 0x2) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) close(0xffffffffffffffff) socket$inet_mptcp(0x2, 0x1, 0x106) connect$can_bcm(0xffffffffffffffff, &(0x7f0000000000), 0x10) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, 0x0) bind$unix(r0, &(0x7f00000005c0)=@abs={0x1, 0x0, 0x4e23}, 0x6e) syz_clone(0x40000000, &(0x7f00000000c0), 0x0, 0x0, &(0x7f00000001c0), 0x0) 12:21:37 executing program 2: open(&(0x7f0000000400)='./bus\x00', 0x14103e, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$L2TP_CMD_SESSION_MODIFY(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000080)={0x30, r1, 0x1, 0x0, 0x0, {}, [@L2TP_ATTR_SEND_SEQ={0x5}, @L2TP_ATTR_IFNAME={0x14, 0x8, 'veth1_to_hsr\x00'}]}, 0x30}}, 0x0) 12:21:37 executing program 3: socket$inet6(0xa, 0xe, 0x0) [ 1006.375700][ T23] audit: type=1326 audit(1674822097.867:613): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4055 comm="syz-executor.3" exe="/root/syz-executor.3" sig=31 arch=c000003e syscall=202 compat=0 ip=0x7f2547c1f0c9 code=0x0 12:21:37 executing program 4: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x82, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket(0x10, 0x803, 0x0) sendto(r0, &(0x7f00000000c0)="120000001200e7ef007b00000000000000a1", 0x12, 0x0, 0x0, 0x0) recvmmsg(r0, &(0x7f00000037c0)=[{{&(0x7f00000004c0)=@ethernet={0x0, @random}, 0x80, &(0x7f0000000380)=[{&(0x7f0000000040)=""/95, 0x5f}, {&(0x7f0000000140)=""/85, 0x55}, {&(0x7f0000000fc0)=""/4096, 0x1000}, {&(0x7f0000000400)=""/106, 0x6a}, {&(0x7f0000000740)=""/73, 0x49}, {&(0x7f0000000200)=""/77, 0x4d}, {0x0}], 0x7, &(0x7f0000000600)=""/191, 0xbf, 0x900}}], 0x1, 0x0, &(0x7f0000003700)={0x77359400}) 12:21:37 executing program 3: openat$vsock(0xffffff9c, &(0x7f00000001c0), 0x0, 0x0) bpf$BPF_GET_MAP_INFO(0xf, 0x0, 0x0) 12:21:37 executing program 2: open(&(0x7f0000000400)='./bus\x00', 0x14103e, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$L2TP_CMD_SESSION_MODIFY(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000080)={0x30, r1, 0x1, 0x0, 0x0, {0x7, 0x2}, [@L2TP_ATTR_SEND_SEQ={0x5}, @L2TP_ATTR_IFNAME={0x14, 0x8, 'veth1_to_hsr\x00'}]}, 0x30}}, 0x0) 12:21:38 executing program 2: open(&(0x7f0000000400)='./bus\x00', 0x14103e, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$L2TP_CMD_SESSION_MODIFY(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000080)={0x30, r1, 0x1, 0x0, 0x0, {0x7, 0x3}, [@L2TP_ATTR_SEND_SEQ={0x5}, @L2TP_ATTR_IFNAME={0x14, 0x8, 'veth1_to_hsr\x00'}]}, 0x30}}, 0x0) [ 1006.436994][ T4057] loop1: detected capacity change from 0 to 2048 [ 1006.514652][ T4057] ext4 filesystem being mounted at /root/syzkaller-testdir1539738704/syzkaller.ao1jj3/3782/bus supports timestamps until 2038 (0x7fffffff) [ 1006.644956][ T4057] loop1: detected capacity change from 2048 to 2047 12:21:38 executing program 5: r0 = socket$unix(0x1, 0x2, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f0000000100)={'vcan0\x00', 0x0}) r2 = socket$can_bcm(0x1d, 0x2, 0x2) connect$can_bcm(r2, &(0x7f0000000000), 0x10) ioctl$sock_kcm_SIOCKCMUNATTACH(0xffffffffffffffff, 0x89e1, 0xffffffffffffffff) ioctl$sock_SIOCSPGRP(0xffffffffffffffff, 0x8902, 0x0) sendmsg$can_bcm(r2, &(0x7f0000000480)={&(0x7f0000000340)={0x1d, r1, 0x3f420f00}, 0x10, &(0x7f0000000040)={&(0x7f0000000580)=ANY=[@ANYBLOB="01000000d7fe68ca0000e9ffffff0000", @ANYRES64=0x0, @ANYRES64=0x0, @ANYRES64=r0, @ANYBLOB="3bf81bb9f1"], 0x20000600}}, 0x0) r3 = socket(0x23, 0x800, 0x40000) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r3, 0x541b, &(0x7f00000000c0)={'ip6_vti0\x00', 0x0}) sendmsg$IPCTNL_MSG_EXP_DELETE(r3, &(0x7f00000004c0)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x40000040}, 0xc, &(0x7f0000000440)={&(0x7f00000006c0)={0x1d0, 0x2, 0x2, 0x201, 0x0, 0x0, {0xa}, [@CTA_EXPECT_NAT={0xc0, 0xa, 0x0, 0x1, [@CTA_EXPECT_NAT_TUPLE={0xc, 0x2, 0x0, 0x1, [@CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x1}]}, @CTA_EXPECT_NAT_TUPLE={0x70, 0x2, 0x0, 0x1, [@CTA_TUPLE_IP={0x2c, 0x1, 0x0, 0x1, @ipv6={{0x14, 0x3, @loopback}, {0x14, 0x4, @private0}}}, @CTA_TUPLE_IP={0x14, 0x1, 0x0, 0x1, @ipv4={{0x8, 0x1, @empty}, {0x8, 0x2, @initdev={0xac, 0x1e, 0x1, 0x0}}}}, @CTA_TUPLE_IP={0x14, 0x1, 0x0, 0x1, @ipv4={{0x8, 0x1, @local}, {0x8, 0x2, @loopback}}}, @CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x4}, @CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x3}, @CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x1}]}, @CTA_EXPECT_NAT_TUPLE={0x38, 0x2, 0x0, 0x1, [@CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5, 0x1, 0x88}}, @CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x3}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5, 0x1, 0x21}}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5, 0x1, 0x1}}, @CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x3}]}, @CTA_EXPECT_NAT_DIR={0x8}]}, @CTA_EXPECT_MASTER={0x20, 0x1, 0x0, 0x1, [@CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x1}, @CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x2}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5, 0x1, 0x84}}]}, @CTA_EXPECT_MASTER={0xdc, 0x1, 0x0, 0x1, [@CTA_TUPLE_IP={0x14, 0x1, 0x0, 0x1, @ipv4={{0x8, 0x1, @multicast1}, {0x8, 0x2, @dev={0xac, 0x14, 0x14, 0x3a}}}}, @CTA_TUPLE_ZONE={0x6}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5, 0x1, 0x21}}, @CTA_TUPLE_IP={0x14, 0x1, 0x0, 0x1, @ipv4={{0x8, 0x1, @empty}, {0x8, 0x2, @local}}}, @CTA_TUPLE_IP={0x2c, 0x1, 0x0, 0x1, @ipv6={{0x14, 0x3, @private1={0xfc, 0x1, '\x00', 0x1}}, {0x14, 0x4, @rand_addr=' \x01\x00'}}}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5, 0x1, 0x1}}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5, 0x1, 0x88}}, @CTA_TUPLE_IP={0x2c, 0x1, 0x0, 0x1, @ipv6={{0x14, 0x3, @empty}, {0x14, 0x4, @dev={0xfe, 0x80, '\x00', 0x21}}}}, @CTA_TUPLE_IP={0x2c, 0x1, 0x0, 0x1, @ipv6={{0x14, 0x3, @local}, {0x14, 0x4, @ipv4={'\x00', '\xff\xff', @rand_addr=0x64010100}}}}]}]}, 0x1d0}}, 0x48000) perf_event_open(&(0x7f0000000500)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x15, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$binfmt_elf32(0xffffffffffffffff, &(0x7f0000000040)=ANY=[], 0x69) connect$can_bcm(0xffffffffffffffff, &(0x7f0000000000), 0x10) sendmsg$can_bcm(0xffffffffffffffff, &(0x7f0000000480)={&(0x7f0000000340)={0x1d, 0x0, 0x3f420f00}, 0x10, &(0x7f0000000040)={&(0x7f0000000580)=ANY=[@ANYBLOB="01000000d7fe68ca0000e9ffffff0000", @ANYRES64=0x0, @ANYRES64=0x0, @ANYRES64=0x0, @ANYRES64], 0x20000600}}, 0x0) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(0xffffffffffffffff, 0x89f0, &(0x7f0000000280)={'gretap0\x00', &(0x7f0000000240)={'ip_vti0\x00', 0x0, 0x7, 0x80, 0xfffffff7, 0x7, {{0x8, 0x4, 0x0, 0x5, 0x20, 0x67, 0x0, 0xc0, 0x29, 0x0, @local, @empty, {[@timestamp={0x44, 0xc, 0x8, 0x0, 0x2, [0x7f, 0x1]}]}}}}}) socket(0x10, 0x3, 0x0) process_mrelease(0xffffffffffffffff, 0x0) r4 = socket$packet(0x11, 0x2, 0x300) ioctl$sock_SIOCGIFINDEX(r4, 0x8933, 0x0) getsockopt$inet_sctp_SCTP_RECVNXTINFO(r3, 0x84, 0x21, &(0x7f0000000140), &(0x7f0000000200)=0x4) bind$unix(r0, &(0x7f00000005c0)=@abs={0x1, 0x0, 0x4e23}, 0x6e) syz_clone(0x40000000, &(0x7f00000000c0), 0x0, 0x0, &(0x7f00000001c0), 0x0) 12:21:38 executing program 4: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x82, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket(0x10, 0x803, 0x0) sendto(r0, &(0x7f00000000c0)="120000001200e7ef007b00000000000000a1", 0x12, 0x0, 0x0, 0x0) recvmmsg(r0, &(0x7f00000037c0)=[{{&(0x7f00000004c0)=@ethernet={0x0, @random}, 0x80, &(0x7f0000000380)=[{&(0x7f0000000040)=""/95, 0x5f}, {&(0x7f0000000140)=""/85, 0x55}, {&(0x7f0000000fc0)=""/4096, 0x1000}, {&(0x7f0000000400)=""/106, 0x6a}, {&(0x7f0000000740)=""/73, 0x49}, {&(0x7f0000000200)=""/77, 0x4d}, {0x0}], 0x7, &(0x7f0000000600)=""/191, 0xbf, 0xa00}}], 0x1, 0x0, &(0x7f0000003700)={0x77359400}) 12:21:38 executing program 2: open(&(0x7f0000000400)='./bus\x00', 0x14103e, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$L2TP_CMD_SESSION_MODIFY(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000080)={0x30, r1, 0x1, 0x0, 0x0, {0x7, 0x4}, [@L2TP_ATTR_SEND_SEQ={0x5}, @L2TP_ATTR_IFNAME={0x14, 0x8, 'veth1_to_hsr\x00'}]}, 0x30}}, 0x0) 12:21:38 executing program 3: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r0, 0x891f, &(0x7f0000000600)={'ip6gre0\x00', 0x0}) 12:21:38 executing program 1: syz_mount_image$ext4(&(0x7f0000000740)='ext4\x00', &(0x7f0000000100)='./bus\x00', 0x804810, &(0x7f0000000180)=ANY=[@ANYBLOB="0061021d307a961da7401271e3fa98008000001d3902ccfd562158cb15c016093893c9e4abd02bc4f1492514fa2dfebc8001000080000000008a1049ca0000"], 0x1, 0x73b, &(0x7f0000000780)="$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") chdir(&(0x7f0000000080)='./file0\x00') open(&(0x7f00000000c0)='./bus\x00', 0x14da42, 0x0) mount(&(0x7f0000000380)=@loop={'/dev/loop', 0x0}, &(0x7f00000003c0)='./bus\x00', 0x0, 0x1000, 0x0) r0 = open(&(0x7f0000000400)='./bus\x00', 0x0, 0x0) ioctl$LOOP_SET_STATUS(r0, 0x4c02, &(0x7f00000001c0)={0x0, {}, 0x0, {}, 0xff, 0x0, 0x0, 0x0, "be8176c9e6755a48a3c0230dd390efe12f8306bed95b2afd402aae879978d959ff9009eec610d9108ea036456bb79e26ee42d0a34968c1fdbb33e8ad5860f632", "b948757aa008fae13adca739a9f126462ab528ea52e90ce2cf50a4ef2568375b"}) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='blkio.throttle.io_service_bytes\x00', 0x275a, 0xd000000) 12:21:38 executing program 0: r0 = socket$unix(0x1, 0x2, 0x0) r1 = socket$can_bcm(0x1d, 0x2, 0x2) connect$can_bcm(r1, &(0x7f0000000000), 0x10) ioctl$sock_kcm_SIOCKCMUNATTACH(0xffffffffffffffff, 0x89e1, 0xffffffffffffffff) getsockopt$inet_sctp_SCTP_PEER_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1a, &(0x7f0000000380)={0x0, 0x80, "f29c5b753353d9c7798811e57823354f32d6cb0899a53381003e4f8dbbb1ea469076c8e175a20b45443f885afb38b83813d5e013d4fad662f1582b23328b4ed70ad9d7d4d0052d0147d8b0ac4910985bec8aa8956c599d291a7da55fec010801d8f02dcff373f52f59f867378c13f4a080938c965846a7e8229b410b3ea0f9ce"}, &(0x7f00000002c0)=0x88) socket$igmp6(0xa, 0x3, 0x2) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) close(0xffffffffffffffff) socket$inet_mptcp(0x2, 0x1, 0x106) connect$can_bcm(0xffffffffffffffff, &(0x7f0000000000), 0x10) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, 0x0) bind$unix(r0, &(0x7f00000005c0)=@abs={0x1, 0x0, 0x4e23}, 0x6e) syz_clone(0x40000000, &(0x7f00000000c0), 0x0, 0x0, &(0x7f00000001c0), 0x0) 12:21:38 executing program 3: symlinkat(&(0x7f0000000040)='./file0\x00', 0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00') open$dir(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) 12:21:38 executing program 2: open(&(0x7f0000000400)='./bus\x00', 0x14103e, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$L2TP_CMD_SESSION_MODIFY(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000080)={0x30, r1, 0x1, 0x0, 0x0, {0x7, 0x5}, [@L2TP_ATTR_SEND_SEQ={0x5}, @L2TP_ATTR_IFNAME={0x14, 0x8, 'veth1_to_hsr\x00'}]}, 0x30}}, 0x0) 12:21:38 executing program 2: open(&(0x7f0000000400)='./bus\x00', 0x14103e, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$L2TP_CMD_SESSION_MODIFY(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000080)={0x30, r1, 0x1, 0x0, 0x0, {0x7, 0x6}, [@L2TP_ATTR_SEND_SEQ={0x5}, @L2TP_ATTR_IFNAME={0x14, 0x8, 'veth1_to_hsr\x00'}]}, 0x30}}, 0x0) 12:21:38 executing program 4: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x82, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket(0x10, 0x803, 0x0) sendto(r0, &(0x7f00000000c0)="120000001200e7ef007b00000000000000a1", 0x12, 0x0, 0x0, 0x0) recvmmsg(r0, &(0x7f00000037c0)=[{{&(0x7f00000004c0)=@ethernet={0x0, @random}, 0x80, &(0x7f0000000380)=[{&(0x7f0000000040)=""/95, 0x5f}, {&(0x7f0000000140)=""/85, 0x55}, {&(0x7f0000000fc0)=""/4096, 0x1000}, {&(0x7f0000000400)=""/106, 0x6a}, {&(0x7f0000000740)=""/73, 0x49}, {&(0x7f0000000200)=""/77, 0x4d}, {0x0}], 0x7, &(0x7f0000000600)=""/191, 0xbf, 0xc00}}], 0x1, 0x0, &(0x7f0000003700)={0x77359400}) 12:21:38 executing program 3: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r0, 0x8916, &(0x7f0000000600)={'ip6gre0\x00', 0x0}) 12:21:38 executing program 2: open(&(0x7f0000000400)='./bus\x00', 0x14103e, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$L2TP_CMD_SESSION_MODIFY(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000080)={0x30, r1, 0x1, 0x0, 0x0, {0x7, 0x7}, [@L2TP_ATTR_SEND_SEQ={0x5}, @L2TP_ATTR_IFNAME={0x14, 0x8, 'veth1_to_hsr\x00'}]}, 0x30}}, 0x0) [ 1007.100263][ T4088] loop1: detected capacity change from 0 to 2048 [ 1007.202429][ T4088] ext4 filesystem being mounted at /root/syzkaller-testdir1539738704/syzkaller.ao1jj3/3783/bus supports timestamps until 2038 (0x7fffffff) [ 1007.283166][ T4088] loop1: detected capacity change from 2048 to 2047 [ 1007.308995][ T3128] EXT4-fs unmount: 27 callbacks suppressed [ 1007.309009][ T3128] EXT4-fs (loop1): unmounting filesystem 00000000-0000-0000-0000-000000000000. 12:21:39 executing program 5: r0 = socket$unix(0x1, 0x2, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f0000000100)={'vcan0\x00', 0x0}) r2 = socket$can_bcm(0x1d, 0x2, 0x2) connect$can_bcm(r2, &(0x7f0000000000), 0x10) ioctl$sock_kcm_SIOCKCMUNATTACH(0xffffffffffffffff, 0x89e1, 0xffffffffffffffff) ioctl$sock_SIOCSPGRP(0xffffffffffffffff, 0x8902, 0x0) sendmsg$can_bcm(r2, &(0x7f0000000480)={&(0x7f0000000340)={0x1d, r1, 0x3f420f00}, 0x10, &(0x7f0000000040)={&(0x7f0000000580)=ANY=[@ANYRES64=0x0, @ANYRES64=0x0, @ANYRES64=0x0, @ANYRES64=r0, @ANYBLOB="3bf81bb9f1"], 0x20000600}}, 0x0) r3 = socket(0x23, 0x800, 0x40000) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r3, 0x541b, &(0x7f00000000c0)={'ip6_vti0\x00', 0x0}) sendmsg$IPCTNL_MSG_EXP_DELETE(r3, &(0x7f00000004c0)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x40000040}, 0xc, &(0x7f0000000440)={&(0x7f00000006c0)={0x1d0, 0x2, 0x2, 0x201, 0x0, 0x0, {0xa}, [@CTA_EXPECT_NAT={0xc0, 0xa, 0x0, 0x1, [@CTA_EXPECT_NAT_TUPLE={0xc, 0x2, 0x0, 0x1, [@CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x1}]}, @CTA_EXPECT_NAT_TUPLE={0x70, 0x2, 0x0, 0x1, [@CTA_TUPLE_IP={0x2c, 0x1, 0x0, 0x1, @ipv6={{0x14, 0x3, @loopback}, {0x14, 0x4, @private0}}}, @CTA_TUPLE_IP={0x14, 0x1, 0x0, 0x1, @ipv4={{0x8, 0x1, @empty}, {0x8, 0x2, @initdev={0xac, 0x1e, 0x1, 0x0}}}}, @CTA_TUPLE_IP={0x14, 0x1, 0x0, 0x1, @ipv4={{0x8, 0x1, @local}, {0x8, 0x2, @loopback}}}, @CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x4}, @CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x3}, @CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x1}]}, @CTA_EXPECT_NAT_TUPLE={0x38, 0x2, 0x0, 0x1, [@CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5, 0x1, 0x88}}, @CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x3}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5, 0x1, 0x21}}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5, 0x1, 0x1}}, @CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x3}]}, @CTA_EXPECT_NAT_DIR={0x8}]}, @CTA_EXPECT_MASTER={0x20, 0x1, 0x0, 0x1, [@CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x1}, @CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x2}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5, 0x1, 0x84}}]}, @CTA_EXPECT_MASTER={0xdc, 0x1, 0x0, 0x1, [@CTA_TUPLE_IP={0x14, 0x1, 0x0, 0x1, @ipv4={{0x8, 0x1, @multicast1}, {0x8, 0x2, @dev={0xac, 0x14, 0x14, 0x3a}}}}, @CTA_TUPLE_ZONE={0x6}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5, 0x1, 0x21}}, @CTA_TUPLE_IP={0x14, 0x1, 0x0, 0x1, @ipv4={{0x8, 0x1, @empty}, {0x8, 0x2, @local}}}, @CTA_TUPLE_IP={0x2c, 0x1, 0x0, 0x1, @ipv6={{0x14, 0x3, @private1={0xfc, 0x1, '\x00', 0x1}}, {0x14, 0x4, @rand_addr=' \x01\x00'}}}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5, 0x1, 0x1}}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5, 0x1, 0x88}}, @CTA_TUPLE_IP={0x2c, 0x1, 0x0, 0x1, @ipv6={{0x14, 0x3, @empty}, {0x14, 0x4, @dev={0xfe, 0x80, '\x00', 0x21}}}}, @CTA_TUPLE_IP={0x2c, 0x1, 0x0, 0x1, @ipv6={{0x14, 0x3, @local}, {0x14, 0x4, @ipv4={'\x00', '\xff\xff', @rand_addr=0x64010100}}}}]}]}, 0x1d0}}, 0x48000) perf_event_open(&(0x7f0000000500)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x15, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$binfmt_elf32(0xffffffffffffffff, &(0x7f0000000040)=ANY=[], 0x69) connect$can_bcm(0xffffffffffffffff, &(0x7f0000000000), 0x10) sendmsg$can_bcm(0xffffffffffffffff, &(0x7f0000000480)={&(0x7f0000000340)={0x1d, 0x0, 0x3f420f00}, 0x10, &(0x7f0000000040)={&(0x7f0000000580)=ANY=[@ANYBLOB="01000000d7fe68ca0000e9ffffff0000", @ANYRES64=0x0, @ANYRES64=0x0, @ANYRES64=0x0, @ANYRES64], 0x20000600}}, 0x0) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(0xffffffffffffffff, 0x89f0, &(0x7f0000000280)={'gretap0\x00', &(0x7f0000000240)={'ip_vti0\x00', 0x0, 0x7, 0x80, 0xfffffff7, 0x7, {{0x8, 0x4, 0x0, 0x5, 0x20, 0x67, 0x0, 0xc0, 0x29, 0x0, @local, @empty, {[@timestamp={0x44, 0xc, 0x8, 0x0, 0x2, [0x7f, 0x1]}]}}}}}) socket(0x10, 0x3, 0x0) process_mrelease(0xffffffffffffffff, 0x0) r4 = socket$packet(0x11, 0x2, 0x300) ioctl$sock_SIOCGIFINDEX(r4, 0x8933, 0x0) getsockopt$inet_sctp_SCTP_RECVNXTINFO(r3, 0x84, 0x21, &(0x7f0000000140), &(0x7f0000000200)=0x4) bind$unix(r0, &(0x7f00000005c0)=@abs={0x1, 0x0, 0x4e23}, 0x6e) syz_clone(0x40000000, &(0x7f00000000c0), 0x0, 0x0, &(0x7f00000001c0), 0x0) 12:21:39 executing program 4: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x82, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket(0x10, 0x803, 0x0) sendto(r0, &(0x7f00000000c0)="120000001200e7ef007b00000000000000a1", 0x12, 0x0, 0x0, 0x0) recvmmsg(r0, &(0x7f00000037c0)=[{{&(0x7f00000004c0)=@ethernet={0x0, @random}, 0x80, &(0x7f0000000380)=[{&(0x7f0000000040)=""/95, 0x5f}, {&(0x7f0000000140)=""/85, 0x55}, {&(0x7f0000000fc0)=""/4096, 0x1000}, {&(0x7f0000000400)=""/106, 0x6a}, {&(0x7f0000000740)=""/73, 0x49}, {&(0x7f0000000200)=""/77, 0x4d}, {0x0}], 0x7, &(0x7f0000000600)=""/191, 0xbf, 0xd00}}], 0x1, 0x0, &(0x7f0000003700)={0x77359400}) 12:21:39 executing program 2: open(&(0x7f0000000400)='./bus\x00', 0x14103e, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$L2TP_CMD_SESSION_MODIFY(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000080)={0x30, r1, 0x1, 0x0, 0x0, {0x7, 0x8}, [@L2TP_ATTR_SEND_SEQ={0x5}, @L2TP_ATTR_IFNAME={0x14, 0x8, 'veth1_to_hsr\x00'}]}, 0x30}}, 0x0) 12:21:39 executing program 3: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000240)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x40}, 0xc, &(0x7f0000000200)={&(0x7f0000000140)=@gettfilter={0x34, 0x2e, 0x1, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, {}, {}, {0x0, 0xfff9}}, [{0x8}, {0x8}]}, 0x34}}, 0x0) 12:21:39 executing program 1: syz_mount_image$ext4(&(0x7f0000000740)='ext4\x00', &(0x7f0000000100)='./bus\x00', 0x804810, &(0x7f0000000180)=ANY=[@ANYBLOB="0061021d307a961da7401271e3fa98008000001d3902ccfd562158cb15c016093893c9e4abd02bc4f1492514fa2dfebc8001000080000000008a1049ca0000"], 0x1, 0x73b, &(0x7f0000000780)="$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") chdir(&(0x7f0000000080)='./file0\x00') open(&(0x7f00000000c0)='./bus\x00', 0x14da42, 0x0) mount(&(0x7f0000000380)=@loop={'/dev/loop', 0x0}, &(0x7f00000003c0)='./bus\x00', 0x0, 0x1000, 0x0) r0 = open(&(0x7f0000000400)='./bus\x00', 0x0, 0x0) ioctl$LOOP_SET_STATUS(r0, 0x4c02, &(0x7f00000001c0)={0x0, {}, 0x0, {}, 0xff, 0x0, 0x0, 0x0, "be8176c9e6755a48a3c0230dd390efe12f8306bed95b2afd402aae879978d959ff9009eec610d9108ea036456bb79e26ee42d0a34968c1fdbb33e8ad5860f632", "b948757aa008fae13adca739a9f126462ab528ea52e90ce2cf50a4ef2568375b"}) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='blkio.throttle.io_service_bytes\x00', 0x275a, 0xf000000) 12:21:39 executing program 0: r0 = socket$unix(0x1, 0x2, 0x0) r1 = socket$can_bcm(0x1d, 0x2, 0x2) connect$can_bcm(r1, &(0x7f0000000000), 0x10) ioctl$sock_kcm_SIOCKCMUNATTACH(0xffffffffffffffff, 0x89e1, 0xffffffffffffffff) getsockopt$inet_sctp_SCTP_PEER_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1a, &(0x7f0000000380)={0x0, 0x80, "f29c5b753353d9c7798811e57823354f32d6cb0899a53381003e4f8dbbb1ea469076c8e175a20b45443f885afb38b83813d5e013d4fad662f1582b23328b4ed70ad9d7d4d0052d0147d8b0ac4910985bec8aa8956c599d291a7da55fec010801d8f02dcff373f52f59f867378c13f4a080938c965846a7e8229b410b3ea0f9ce"}, &(0x7f00000002c0)=0x88) socket$igmp6(0xa, 0x3, 0x2) perf_event_open(&(0x7f0000000500)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x15, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) close(0xffffffffffffffff) socket$inet_mptcp(0x2, 0x1, 0x106) connect$can_bcm(0xffffffffffffffff, &(0x7f0000000000), 0x10) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, 0x0) bind$unix(r0, &(0x7f00000005c0)=@abs={0x1, 0x0, 0x4e23}, 0x6e) syz_clone(0x40000000, &(0x7f00000000c0), 0x0, 0x0, &(0x7f00000001c0), 0x0) 12:21:39 executing program 4: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x82, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket(0x10, 0x803, 0x0) sendto(r0, &(0x7f00000000c0)="120000001200e7ef007b00000000000000a1", 0x12, 0x0, 0x0, 0x0) recvmmsg(r0, &(0x7f00000037c0)=[{{&(0x7f00000004c0)=@ethernet={0x0, @random}, 0x80, &(0x7f0000000380)=[{&(0x7f0000000040)=""/95, 0x5f}, {&(0x7f0000000140)=""/85, 0x55}, {&(0x7f0000000fc0)=""/4096, 0x1000}, {&(0x7f0000000400)=""/106, 0x6a}, {&(0x7f0000000740)=""/73, 0x49}, {&(0x7f0000000200)=""/77, 0x4d}, {0x0}], 0x7, &(0x7f0000000600)=""/191, 0xbf, 0xf00}}], 0x1, 0x0, &(0x7f0000003700)={0x77359400}) 12:21:39 executing program 3: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r0, 0x89f1, &(0x7f0000000240)={'ip6tnl0\x00', &(0x7f00000001c0)={'syztnl1\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @rand_addr=' \x01\x00', @private2}}) 12:21:39 executing program 2: open(&(0x7f0000000400)='./bus\x00', 0x14103e, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$L2TP_CMD_SESSION_MODIFY(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000080)={0x30, r1, 0x1, 0x0, 0x0, {0x7, 0x9}, [@L2TP_ATTR_SEND_SEQ={0x5}, @L2TP_ATTR_IFNAME={0x14, 0x8, 'veth1_to_hsr\x00'}]}, 0x30}}, 0x0) 12:21:39 executing program 3: r0 = socket$inet(0x2, 0xa, 0x0) sendmmsg$inet(r0, &(0x7f0000004500)=[{{0x0, 0x0, &(0x7f0000000140)=[{0x0}, {0x0}], 0x2}}], 0x1, 0x0) [ 1007.758911][ T4116] loop1: detected capacity change from 0 to 2048 12:21:39 executing program 4: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x82, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket(0x10, 0x803, 0x0) sendto(r0, &(0x7f00000000c0)="120000001200e7ef007b00000000000000a1", 0x12, 0x0, 0x0, 0x0) recvmmsg(r0, &(0x7f00000037c0)=[{{&(0x7f00000004c0)=@ethernet={0x0, @random}, 0x80, &(0x7f0000000380)=[{&(0x7f0000000040)=""/95, 0x5f}, {&(0x7f0000000140)=""/85, 0x55}, {&(0x7f0000000fc0)=""/4096, 0x1000}, {&(0x7f0000000400)=""/106, 0x6a}, {&(0x7f0000000740)=""/73, 0x49}, {&(0x7f0000000200)=""/77, 0x4d}, {0x0}], 0x7, &(0x7f0000000600)=""/191, 0xbf, 0x11b4}}], 0x1, 0x0, &(0x7f0000003700)={0x77359400}) 12:21:39 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$batadv(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$BATADV_CMD_GET_TRANSTABLE_LOCAL(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f00000000c0)={0x14, r1, 0x45cefcebc1887be5}, 0x14}}, 0x0) [ 1007.918445][ T4116] EXT4-fs (loop1): mounted filesystem 00000000-0000-0000-0000-000000000000 without journal. Quota mode: none. [ 1008.005838][ T4116] ext4 filesystem being mounted at /root/syzkaller-testdir1539738704/syzkaller.ao1jj3/3784/bus supports timestamps until 2038 (0x7fffffff) [ 1008.142069][ T4116] loop1: detected capacity change from 2048 to 2047 [ 1008.163848][ T3128] EXT4-fs (loop1): unmounting filesystem 00000000-0000-0000-0000-000000000000. 12:21:40 executing program 5: r0 = socket$unix(0x1, 0x2, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f0000000100)={'vcan0\x00', 0x0}) r2 = socket$can_bcm(0x1d, 0x2, 0x2) connect$can_bcm(r2, &(0x7f0000000000), 0x10) ioctl$sock_kcm_SIOCKCMUNATTACH(0xffffffffffffffff, 0x89e1, 0xffffffffffffffff) ioctl$sock_SIOCSPGRP(0xffffffffffffffff, 0x8902, 0x0) sendmsg$can_bcm(r2, &(0x7f0000000480)={&(0x7f0000000340)={0x1d, r1, 0x3f420f00}, 0x10, &(0x7f0000000040)={&(0x7f0000000580)=ANY=[@ANYRES64=0x0, @ANYRES64=0x0, @ANYRES64=0x0, @ANYRES64=r0, @ANYBLOB="3bf81bb9f1"], 0x20000600}}, 0x0) r3 = socket(0x23, 0x800, 0x40000) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r3, 0x541b, &(0x7f00000000c0)={'ip6_vti0\x00', 0x0}) sendmsg$IPCTNL_MSG_EXP_DELETE(r3, &(0x7f00000004c0)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x40000040}, 0xc, &(0x7f0000000440)={&(0x7f00000006c0)={0x1d0, 0x2, 0x2, 0x201, 0x0, 0x0, {0xa}, [@CTA_EXPECT_NAT={0xc0, 0xa, 0x0, 0x1, [@CTA_EXPECT_NAT_TUPLE={0xc, 0x2, 0x0, 0x1, [@CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x1}]}, @CTA_EXPECT_NAT_TUPLE={0x70, 0x2, 0x0, 0x1, [@CTA_TUPLE_IP={0x2c, 0x1, 0x0, 0x1, @ipv6={{0x14, 0x3, @loopback}, {0x14, 0x4, @private0}}}, @CTA_TUPLE_IP={0x14, 0x1, 0x0, 0x1, @ipv4={{0x8, 0x1, @empty}, {0x8, 0x2, @initdev={0xac, 0x1e, 0x1, 0x0}}}}, @CTA_TUPLE_IP={0x14, 0x1, 0x0, 0x1, @ipv4={{0x8, 0x1, @local}, {0x8, 0x2, @loopback}}}, @CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x4}, @CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x3}, @CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x1}]}, @CTA_EXPECT_NAT_TUPLE={0x38, 0x2, 0x0, 0x1, [@CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5, 0x1, 0x88}}, @CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x3}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5, 0x1, 0x21}}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5, 0x1, 0x1}}, @CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x3}]}, @CTA_EXPECT_NAT_DIR={0x8}]}, @CTA_EXPECT_MASTER={0x20, 0x1, 0x0, 0x1, [@CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x1}, @CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x2}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5, 0x1, 0x84}}]}, @CTA_EXPECT_MASTER={0xdc, 0x1, 0x0, 0x1, [@CTA_TUPLE_IP={0x14, 0x1, 0x0, 0x1, @ipv4={{0x8, 0x1, @multicast1}, {0x8, 0x2, @dev={0xac, 0x14, 0x14, 0x3a}}}}, @CTA_TUPLE_ZONE={0x6}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5, 0x1, 0x21}}, @CTA_TUPLE_IP={0x14, 0x1, 0x0, 0x1, @ipv4={{0x8, 0x1, @empty}, {0x8, 0x2, @local}}}, @CTA_TUPLE_IP={0x2c, 0x1, 0x0, 0x1, @ipv6={{0x14, 0x3, @private1={0xfc, 0x1, '\x00', 0x1}}, {0x14, 0x4, @rand_addr=' \x01\x00'}}}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5, 0x1, 0x1}}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5, 0x1, 0x88}}, @CTA_TUPLE_IP={0x2c, 0x1, 0x0, 0x1, @ipv6={{0x14, 0x3, @empty}, {0x14, 0x4, @dev={0xfe, 0x80, '\x00', 0x21}}}}, @CTA_TUPLE_IP={0x2c, 0x1, 0x0, 0x1, @ipv6={{0x14, 0x3, @local}, {0x14, 0x4, @ipv4={'\x00', '\xff\xff', @rand_addr=0x64010100}}}}]}]}, 0x1d0}}, 0x48000) perf_event_open(&(0x7f0000000500)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x15, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$binfmt_elf32(0xffffffffffffffff, &(0x7f0000000040)=ANY=[], 0x69) connect$can_bcm(0xffffffffffffffff, &(0x7f0000000000), 0x10) sendmsg$can_bcm(0xffffffffffffffff, &(0x7f0000000480)={&(0x7f0000000340)={0x1d, 0x0, 0x3f420f00}, 0x10, &(0x7f0000000040)={&(0x7f0000000580)=ANY=[@ANYBLOB="01000000d7fe68ca0000e9ffffff0000", @ANYRES64=0x0, @ANYRES64=0x0, @ANYRES64=0x0, @ANYRES64], 0x20000600}}, 0x0) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(0xffffffffffffffff, 0x89f0, &(0x7f0000000280)={'gretap0\x00', &(0x7f0000000240)={'ip_vti0\x00', 0x0, 0x7, 0x80, 0xfffffff7, 0x7, {{0x8, 0x4, 0x0, 0x5, 0x20, 0x67, 0x0, 0xc0, 0x29, 0x0, @local, @empty, {[@timestamp={0x44, 0xc, 0x8, 0x0, 0x2, [0x7f, 0x1]}]}}}}}) socket(0x10, 0x3, 0x0) process_mrelease(0xffffffffffffffff, 0x0) r4 = socket$packet(0x11, 0x2, 0x300) ioctl$sock_SIOCGIFINDEX(r4, 0x8933, 0x0) getsockopt$inet_sctp_SCTP_RECVNXTINFO(r3, 0x84, 0x21, &(0x7f0000000140), &(0x7f0000000200)=0x4) bind$unix(r0, &(0x7f00000005c0)=@abs={0x1, 0x0, 0x4e23}, 0x6e) syz_clone(0x40000000, &(0x7f00000000c0), 0x0, 0x0, &(0x7f00000001c0), 0x0) 12:21:40 executing program 2: open(&(0x7f0000000400)='./bus\x00', 0x14103e, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$L2TP_CMD_SESSION_MODIFY(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000080)={0x30, r1, 0x1, 0x0, 0x0, {0x7, 0xf}, [@L2TP_ATTR_SEND_SEQ={0x5}, @L2TP_ATTR_IFNAME={0x14, 0x8, 'veth1_to_hsr\x00'}]}, 0x30}}, 0x0) 12:21:40 executing program 4: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x82, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket(0x10, 0x803, 0x0) sendto(r0, &(0x7f00000000c0)="120000001200e7ef007b00000000000000a1", 0x12, 0x0, 0x0, 0x0) recvmmsg(r0, &(0x7f00000037c0)=[{{&(0x7f00000004c0)=@ethernet={0x0, @random}, 0x80, &(0x7f0000000380)=[{&(0x7f0000000040)=""/95, 0x5f}, {&(0x7f0000000140)=""/85, 0x55}, {&(0x7f0000000fc0)=""/4096, 0x1000}, {&(0x7f0000000400)=""/106, 0x6a}, {&(0x7f0000000740)=""/73, 0x49}, {&(0x7f0000000200)=""/77, 0x4d}, {0x0}], 0x7, &(0x7f0000000600)=""/191, 0xbf, 0x2000}}], 0x1, 0x0, &(0x7f0000003700)={0x77359400}) 12:21:40 executing program 3: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r0, 0x89f1, &(0x7f0000000600)={'ip6gre0\x00', &(0x7f0000000580)={'ip6tnl0\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @ipv4={'\x00', '\xff\xff', @multicast2}, @empty, 0x0, 0x7800}}) 12:21:40 executing program 0: r0 = socket$unix(0x1, 0x2, 0x0) r1 = socket$can_bcm(0x1d, 0x2, 0x2) connect$can_bcm(r1, &(0x7f0000000000), 0x10) ioctl$sock_kcm_SIOCKCMUNATTACH(0xffffffffffffffff, 0x89e1, 0xffffffffffffffff) getsockopt$inet_sctp_SCTP_PEER_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1a, &(0x7f0000000380)={0x0, 0x80, "f29c5b753353d9c7798811e57823354f32d6cb0899a53381003e4f8dbbb1ea469076c8e175a20b45443f885afb38b83813d5e013d4fad662f1582b23328b4ed70ad9d7d4d0052d0147d8b0ac4910985bec8aa8956c599d291a7da55fec010801d8f02dcff373f52f59f867378c13f4a080938c965846a7e8229b410b3ea0f9ce"}, &(0x7f00000002c0)=0x88) socket$igmp6(0xa, 0x3, 0x2) perf_event_open(&(0x7f0000000500)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x15, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) close(0xffffffffffffffff) socket$inet_mptcp(0x2, 0x1, 0x106) connect$can_bcm(0xffffffffffffffff, &(0x7f0000000000), 0x10) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, 0x0) bind$unix(r0, &(0x7f00000005c0)=@abs={0x1, 0x0, 0x4e23}, 0x6e) syz_clone(0x40000000, &(0x7f00000000c0), 0x0, 0x0, &(0x7f00000001c0), 0x0) 12:21:40 executing program 1: syz_mount_image$ext4(&(0x7f0000000740)='ext4\x00', &(0x7f0000000100)='./bus\x00', 0x804810, &(0x7f0000000180)=ANY=[@ANYBLOB="0061021d307a961da7401271e3fa98008000001d3902ccfd562158cb15c016093893c9e4abd02bc4f1492514fa2dfebc8001000080000000008a1049ca0000"], 0x1, 0x73b, &(0x7f0000000780)="$eJzs3M9rHHUbAPBnptn+zPtuXngP6kGEFloonSTNpT0ZL94KhYLXGpJJCJlkQ3ZTm1iw9SzU5qIgiN49ehVK/QO8SUHBuyBa40G8rMxmk9q4u922Sbeknw9M5/nOj32epzv5ZgcyG8BL643ynyRiOCIuR0S1vT2NiMOt6GjEza3jNh/cmC6XJJrNK78m5Wmx2azuvFbSXp+I1inxSkTcq0Sc/fDfeetr6wtTRZGvtMejjcXl0fra+rn5xam5fC5fGp+4OHZhYuLC2MSe9XrqnYvH7nz39sbG9183br8+dC6JyVbf0e5tzxL9w9b/SSUmd21f2o9kA5QMugAAAPpSfs4/FBFDrU+p1TjUigAAAICDpHmkCQAAABx4SQy6AgAAAGB/bf8dwPazvfv1HGw3v7wVESOd8g+1niGOOBqViDi+mTzyZEKydRo8k5u3IuLuZIfrL2lff09vbNfYM9Ivnrvl/DPZaf5Jd+af6DD/DG1/d8Iz6j7/Pcx/qMv8d7nPHN98/mqla/5bEa8Ndcqf7ORPuuR/t8/8tzc+utNtX/PLiNMdf/8kj+Tq8f0Qo7PzRc8frXt/nbnfq//j3fInvftf7rP/9zd/X+g2l5T5z5zs/f53yl9eEx+360gj4k57XY43duU4ufjDt736n+nS/+Pe/y/67P+nr45c7/NQAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAaEkjYjiSNNuJ0zTLIk5ExP/jeFrU6o2zs7XVpZlyX8RIVNLZ+SIfi4jq1jgpx+Ot+OH4/K7xRET878djW0nnizybrhUzg24eAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAACAHSciYjiSNIuINCL+qKZplg26KgAAAGDPjQy6AAAAAGDfuf8HAACAg+9p7/+TPa4DAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAONAuX7pULs3NBzemy/HMtbXVhdq1czN5fSFbXJ3Opmsry9lcrTZX5Nl0bfFxr1fUasvjF2P1+mgjrzdG62vrVxdrq0uNq/OLU3P51bzyXLoCAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAADgSQ23liTNIiJtxWmaZRH/iYiRqCSz80U+FhH/jYj71cqRcjw+6KIBAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAADYc/W19YWposhXBALBcws+iIgXoIwewaBnJgAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAABqG+tr4wVRT5Sn3QlQAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAADBY6c9JRJTL6eqp4d17Dyd/VlvriHjvsyufXJ9qNFbGy+2/7WxvfNrefn4Q9QMAAMBL4c0nOXj7Pn37Ph4AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAKBf9bX1hamiyFf2MRh0jwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAwNP5OwAA//9JjsXQ") chdir(&(0x7f0000000080)='./file0\x00') open(&(0x7f00000000c0)='./bus\x00', 0x14da42, 0x0) mount(&(0x7f0000000380)=@loop={'/dev/loop', 0x0}, &(0x7f00000003c0)='./bus\x00', 0x0, 0x1000, 0x0) r0 = open(&(0x7f0000000400)='./bus\x00', 0x0, 0x0) ioctl$LOOP_SET_STATUS(r0, 0x4c02, &(0x7f00000001c0)={0x0, {}, 0x0, {}, 0xff, 0x0, 0x0, 0x0, "be8176c9e6755a48a3c0230dd390efe12f8306bed95b2afd402aae879978d959ff9009eec610d9108ea036456bb79e26ee42d0a34968c1fdbb33e8ad5860f632", "b948757aa008fae13adca739a9f126462ab528ea52e90ce2cf50a4ef2568375b"}) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='blkio.throttle.io_service_bytes\x00', 0x275a, 0x11000000) 12:21:40 executing program 2: open(&(0x7f0000000400)='./bus\x00', 0x14103e, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$L2TP_CMD_SESSION_MODIFY(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000080)={0x30, r1, 0x1, 0x0, 0x0, {0x7, 0x13}, [@L2TP_ATTR_SEND_SEQ={0x5}, @L2TP_ATTR_IFNAME={0x14, 0x8, 'veth1_to_hsr\x00'}]}, 0x30}}, 0x0) 12:21:40 executing program 3: symlinkat(&(0x7f0000000040)='./file0\x00', 0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00') utimensat(0xffffffffffffff9c, &(0x7f00000002c0)='./file0\x00', &(0x7f0000000340)={{}, {0x0, 0xea60}}, 0x100) 12:21:40 executing program 4: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x82, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket(0x10, 0x803, 0x0) sendto(r0, &(0x7f00000000c0)="120000001200e7ef007b00000000000000a1", 0x12, 0x0, 0x0, 0x0) recvmmsg(r0, &(0x7f00000037c0)=[{{&(0x7f00000004c0)=@ethernet={0x0, @random}, 0x80, &(0x7f0000000380)=[{&(0x7f0000000040)=""/95, 0x5f}, {&(0x7f0000000140)=""/85, 0x55}, {&(0x7f0000000fc0)=""/4096, 0x1000}, {&(0x7f0000000400)=""/106, 0x6a}, {&(0x7f0000000740)=""/73, 0x49}, {&(0x7f0000000200)=""/77, 0x4d}, {0x0}], 0x7, &(0x7f0000000600)=""/191, 0xbf, 0x4000}}], 0x1, 0x0, &(0x7f0000003700)={0x77359400}) [ 1008.801000][ T4149] loop1: detected capacity change from 0 to 2048 12:21:40 executing program 2: open(&(0x7f0000000400)='./bus\x00', 0x14103e, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$L2TP_CMD_SESSION_MODIFY(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000080)={0x30, r1, 0x1, 0x0, 0x0, {0x7, 0x60}, [@L2TP_ATTR_SEND_SEQ={0x5}, @L2TP_ATTR_IFNAME={0x14, 0x8, 'veth1_to_hsr\x00'}]}, 0x30}}, 0x0) 12:21:40 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$batadv(&(0x7f0000000200), 0xffffffffffffffff) sendmsg$BATADV_CMD_GET_MESH(r0, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000240)={0x14, r1, 0x72d}, 0x14}}, 0x0) 12:21:40 executing program 4: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x82, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket(0x10, 0x803, 0x0) sendto(r0, &(0x7f00000000c0)="120000001200e7ef007b00000000000000a1", 0x12, 0x0, 0x0, 0x0) recvmmsg(r0, &(0x7f00000037c0)=[{{&(0x7f00000004c0)=@ethernet={0x0, @random}, 0x80, &(0x7f0000000380)=[{&(0x7f0000000040)=""/95, 0x5f}, {&(0x7f0000000140)=""/85, 0x55}, {&(0x7f0000000fc0)=""/4096, 0x1000}, {&(0x7f0000000400)=""/106, 0x6a}, {&(0x7f0000000740)=""/73, 0x49}, {&(0x7f0000000200)=""/77, 0x4d}, {0x0}], 0x7, &(0x7f0000000600)=""/191, 0xbf, 0x4788}}], 0x1, 0x0, &(0x7f0000003700)={0x77359400}) [ 1008.900467][ T4149] EXT4-fs (loop1): mounted filesystem 00000000-0000-0000-0000-000000000000 without journal. Quota mode: none. [ 1009.009673][ T4149] ext4 filesystem being mounted at /root/syzkaller-testdir1539738704/syzkaller.ao1jj3/3785/bus supports timestamps until 2038 (0x7fffffff) [ 1009.071842][ T4149] loop1: detected capacity change from 2048 to 2047 [ 1009.104559][ T3128] EXT4-fs (loop1): unmounting filesystem 00000000-0000-0000-0000-000000000000. 12:21:40 executing program 5: r0 = socket$unix(0x1, 0x2, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f0000000100)={'vcan0\x00', 0x0}) r2 = socket$can_bcm(0x1d, 0x2, 0x2) connect$can_bcm(r2, &(0x7f0000000000), 0x10) ioctl$sock_kcm_SIOCKCMUNATTACH(0xffffffffffffffff, 0x89e1, 0xffffffffffffffff) ioctl$sock_SIOCSPGRP(0xffffffffffffffff, 0x8902, 0x0) sendmsg$can_bcm(r2, &(0x7f0000000480)={&(0x7f0000000340)={0x1d, r1, 0x3f420f00}, 0x10, &(0x7f0000000040)={&(0x7f0000000580)=ANY=[@ANYRES64=0x0, @ANYRES64=0x0, @ANYRES64=0x0, @ANYRES64=r0, @ANYBLOB="3bf81bb9f1"], 0x20000600}}, 0x0) r3 = socket(0x23, 0x800, 0x40000) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r3, 0x541b, &(0x7f00000000c0)={'ip6_vti0\x00', 0x0}) sendmsg$IPCTNL_MSG_EXP_DELETE(r3, &(0x7f00000004c0)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x40000040}, 0xc, &(0x7f0000000440)={&(0x7f00000006c0)={0x1d0, 0x2, 0x2, 0x201, 0x0, 0x0, {0xa}, [@CTA_EXPECT_NAT={0xc0, 0xa, 0x0, 0x1, [@CTA_EXPECT_NAT_TUPLE={0xc, 0x2, 0x0, 0x1, [@CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x1}]}, @CTA_EXPECT_NAT_TUPLE={0x70, 0x2, 0x0, 0x1, [@CTA_TUPLE_IP={0x2c, 0x1, 0x0, 0x1, @ipv6={{0x14, 0x3, @loopback}, {0x14, 0x4, @private0}}}, @CTA_TUPLE_IP={0x14, 0x1, 0x0, 0x1, @ipv4={{0x8, 0x1, @empty}, {0x8, 0x2, @initdev={0xac, 0x1e, 0x1, 0x0}}}}, @CTA_TUPLE_IP={0x14, 0x1, 0x0, 0x1, @ipv4={{0x8, 0x1, @local}, {0x8, 0x2, @loopback}}}, @CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x4}, @CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x3}, @CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x1}]}, @CTA_EXPECT_NAT_TUPLE={0x38, 0x2, 0x0, 0x1, [@CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5, 0x1, 0x88}}, @CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x3}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5, 0x1, 0x21}}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5, 0x1, 0x1}}, @CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x3}]}, @CTA_EXPECT_NAT_DIR={0x8}]}, @CTA_EXPECT_MASTER={0x20, 0x1, 0x0, 0x1, [@CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x1}, @CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x2}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5, 0x1, 0x84}}]}, @CTA_EXPECT_MASTER={0xdc, 0x1, 0x0, 0x1, [@CTA_TUPLE_IP={0x14, 0x1, 0x0, 0x1, @ipv4={{0x8, 0x1, @multicast1}, {0x8, 0x2, @dev={0xac, 0x14, 0x14, 0x3a}}}}, @CTA_TUPLE_ZONE={0x6}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5, 0x1, 0x21}}, @CTA_TUPLE_IP={0x14, 0x1, 0x0, 0x1, @ipv4={{0x8, 0x1, @empty}, {0x8, 0x2, @local}}}, @CTA_TUPLE_IP={0x2c, 0x1, 0x0, 0x1, @ipv6={{0x14, 0x3, @private1={0xfc, 0x1, '\x00', 0x1}}, {0x14, 0x4, @rand_addr=' \x01\x00'}}}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5, 0x1, 0x1}}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5, 0x1, 0x88}}, @CTA_TUPLE_IP={0x2c, 0x1, 0x0, 0x1, @ipv6={{0x14, 0x3, @empty}, {0x14, 0x4, @dev={0xfe, 0x80, '\x00', 0x21}}}}, @CTA_TUPLE_IP={0x2c, 0x1, 0x0, 0x1, @ipv6={{0x14, 0x3, @local}, {0x14, 0x4, @ipv4={'\x00', '\xff\xff', @rand_addr=0x64010100}}}}]}]}, 0x1d0}}, 0x48000) perf_event_open(&(0x7f0000000500)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x15, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$binfmt_elf32(0xffffffffffffffff, &(0x7f0000000040)=ANY=[], 0x69) connect$can_bcm(0xffffffffffffffff, &(0x7f0000000000), 0x10) sendmsg$can_bcm(0xffffffffffffffff, &(0x7f0000000480)={&(0x7f0000000340)={0x1d, 0x0, 0x3f420f00}, 0x10, &(0x7f0000000040)={&(0x7f0000000580)=ANY=[@ANYBLOB="01000000d7fe68ca0000e9ffffff0000", @ANYRES64=0x0, @ANYRES64=0x0, @ANYRES64=0x0, @ANYRES64], 0x20000600}}, 0x0) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(0xffffffffffffffff, 0x89f0, &(0x7f0000000280)={'gretap0\x00', &(0x7f0000000240)={'ip_vti0\x00', 0x0, 0x7, 0x80, 0xfffffff7, 0x7, {{0x8, 0x4, 0x0, 0x5, 0x20, 0x67, 0x0, 0xc0, 0x29, 0x0, @local, @empty, {[@timestamp={0x44, 0xc, 0x8, 0x0, 0x2, [0x7f, 0x1]}]}}}}}) socket(0x10, 0x3, 0x0) process_mrelease(0xffffffffffffffff, 0x0) r4 = socket$packet(0x11, 0x2, 0x300) ioctl$sock_SIOCGIFINDEX(r4, 0x8933, 0x0) getsockopt$inet_sctp_SCTP_RECVNXTINFO(r3, 0x84, 0x21, &(0x7f0000000140), &(0x7f0000000200)=0x4) bind$unix(r0, &(0x7f00000005c0)=@abs={0x1, 0x0, 0x4e23}, 0x6e) syz_clone(0x40000000, &(0x7f00000000c0), 0x0, 0x0, &(0x7f00000001c0), 0x0) 12:21:40 executing program 2: open(&(0x7f0000000400)='./bus\x00', 0x14103e, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$L2TP_CMD_SESSION_MODIFY(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000080)={0x30, r1, 0x1, 0x0, 0x0, {}, [@L2TP_ATTR_SEND_SEQ={0x5}, @L2TP_ATTR_IFNAME={0x14, 0x8, 'veth1_to_hsr\x00'}]}, 0x30}}, 0x0) 12:21:40 executing program 4: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x82, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket(0x10, 0x803, 0x0) sendto(r0, &(0x7f00000000c0)="120000001200e7ef007b00000000000000a1", 0x12, 0x0, 0x0, 0x0) recvmmsg(r0, &(0x7f00000037c0)=[{{&(0x7f00000004c0)=@ethernet={0x0, @random}, 0x80, &(0x7f0000000380)=[{&(0x7f0000000040)=""/95, 0x5f}, {&(0x7f0000000140)=""/85, 0x55}, {&(0x7f0000000fc0)=""/4096, 0x1000}, {&(0x7f0000000400)=""/106, 0x6a}, {&(0x7f0000000740)=""/73, 0x49}, {&(0x7f0000000200)=""/77, 0x4d}, {0x0}], 0x7, &(0x7f0000000600)=""/191, 0xbf, 0x4888}}], 0x1, 0x0, &(0x7f0000003700)={0x77359400}) 12:21:40 executing program 3: mmap$IORING_OFF_SQ_RING(&(0x7f0000fff000/0x1000)=nil, 0x1000, 0x0, 0x30, 0xffffffffffffffff, 0x0) 12:21:40 executing program 1: syz_mount_image$ext4(&(0x7f0000000740)='ext4\x00', &(0x7f0000000100)='./bus\x00', 0x804810, &(0x7f0000000180)=ANY=[@ANYBLOB="0061021d307a961da7401271e3fa98008000001d3902ccfd562158cb15c016093893c9e4abd02bc4f1492514fa2dfebc8001000080000000008a1049ca0000"], 0x1, 0x73b, &(0x7f0000000780)="$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") chdir(&(0x7f0000000080)='./file0\x00') open(&(0x7f00000000c0)='./bus\x00', 0x14da42, 0x0) mount(&(0x7f0000000380)=@loop={'/dev/loop', 0x0}, &(0x7f00000003c0)='./bus\x00', 0x0, 0x1000, 0x0) r0 = open(&(0x7f0000000400)='./bus\x00', 0x0, 0x0) ioctl$LOOP_SET_STATUS(r0, 0x4c02, &(0x7f00000001c0)={0x0, {}, 0x0, {}, 0xff, 0x0, 0x0, 0x0, "be8176c9e6755a48a3c0230dd390efe12f8306bed95b2afd402aae879978d959ff9009eec610d9108ea036456bb79e26ee42d0a34968c1fdbb33e8ad5860f632", "b948757aa008fae13adca739a9f126462ab528ea52e90ce2cf50a4ef2568375b"}) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='blkio.throttle.io_service_bytes\x00', 0x275a, 0x18000000) 12:21:40 executing program 0: r0 = socket$unix(0x1, 0x2, 0x0) r1 = socket$can_bcm(0x1d, 0x2, 0x2) connect$can_bcm(r1, &(0x7f0000000000), 0x10) ioctl$sock_kcm_SIOCKCMUNATTACH(0xffffffffffffffff, 0x89e1, 0xffffffffffffffff) getsockopt$inet_sctp_SCTP_PEER_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1a, &(0x7f0000000380)={0x0, 0x80, "f29c5b753353d9c7798811e57823354f32d6cb0899a53381003e4f8dbbb1ea469076c8e175a20b45443f885afb38b83813d5e013d4fad662f1582b23328b4ed70ad9d7d4d0052d0147d8b0ac4910985bec8aa8956c599d291a7da55fec010801d8f02dcff373f52f59f867378c13f4a080938c965846a7e8229b410b3ea0f9ce"}, &(0x7f00000002c0)=0x88) socket$igmp6(0xa, 0x3, 0x2) perf_event_open(&(0x7f0000000500)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x15, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) close(0xffffffffffffffff) socket$inet_mptcp(0x2, 0x1, 0x106) connect$can_bcm(0xffffffffffffffff, &(0x7f0000000000), 0x10) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, 0x0) bind$unix(r0, &(0x7f00000005c0)=@abs={0x1, 0x0, 0x4e23}, 0x6e) syz_clone(0x40000000, &(0x7f00000000c0), 0x0, 0x0, &(0x7f00000001c0), 0x0) 12:21:40 executing program 3: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r0, 0x8971, 0x0) 12:21:40 executing program 2: open(&(0x7f0000000400)='./bus\x00', 0x14103e, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$L2TP_CMD_SESSION_MODIFY(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000080)={0x30, r1, 0x1, 0x0, 0x0, {0x7, 0x0, 0x2}, [@L2TP_ATTR_SEND_SEQ={0x5}, @L2TP_ATTR_IFNAME={0x14, 0x8, 'veth1_to_hsr\x00'}]}, 0x30}}, 0x0) 12:21:40 executing program 4: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x82, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket(0x10, 0x803, 0x0) sendto(r0, &(0x7f00000000c0)="120000001200e7ef007b00000000000000a1", 0x12, 0x0, 0x0, 0x0) recvmmsg(r0, &(0x7f00000037c0)=[{{&(0x7f00000004c0)=@ethernet={0x0, @random}, 0x80, &(0x7f0000000380)=[{&(0x7f0000000040)=""/95, 0x5f}, {&(0x7f0000000140)=""/85, 0x55}, {&(0x7f0000000fc0)=""/4096, 0x1000}, {&(0x7f0000000400)=""/106, 0x6a}, {&(0x7f0000000740)=""/73, 0x49}, {&(0x7f0000000200)=""/77, 0x4d}, {0x0}], 0x7, &(0x7f0000000600)=""/191, 0xbf, 0x5865}}], 0x1, 0x0, &(0x7f0000003700)={0x77359400}) 12:21:40 executing program 3: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r0, 0x8970, &(0x7f0000000600)={'ip6gre0\x00', 0x0}) [ 1009.412985][ T4179] loop1: detected capacity change from 0 to 2048 12:21:40 executing program 2: open(&(0x7f0000000400)='./bus\x00', 0x14103e, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$L2TP_CMD_SESSION_MODIFY(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000080)={0x30, r1, 0x1, 0x0, 0x0, {0x7, 0x0, 0x3}, [@L2TP_ATTR_SEND_SEQ={0x5}, @L2TP_ATTR_IFNAME={0x14, 0x8, 'veth1_to_hsr\x00'}]}, 0x30}}, 0x0) 12:21:40 executing program 3: r0 = syz_io_uring_setup(0x51fd, &(0x7f0000000100)={0x0, 0xeebf}, &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000ffb000/0x2000)=nil, &(0x7f0000000200), &(0x7f0000000240)) io_uring_register$IORING_UNREGISTER_FILES(r0, 0x3, 0x0, 0x0) [ 1009.459057][ T4179] EXT4-fs (loop1): mounted filesystem 00000000-0000-0000-0000-000000000000 without journal. Quota mode: none. [ 1009.547225][ T4179] ext4 filesystem being mounted at /root/syzkaller-testdir1539738704/syzkaller.ao1jj3/3786/bus supports timestamps until 2038 (0x7fffffff) [ 1009.671859][ T4179] loop1: detected capacity change from 2048 to 2047 [ 1009.716251][ T3128] EXT4-fs (loop1): unmounting filesystem 00000000-0000-0000-0000-000000000000. 12:21:41 executing program 5: r0 = socket$unix(0x1, 0x2, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f0000000100)={'vcan0\x00', 0x0}) r2 = socket$can_bcm(0x1d, 0x2, 0x2) connect$can_bcm(r2, &(0x7f0000000000), 0x10) ioctl$sock_kcm_SIOCKCMUNATTACH(0xffffffffffffffff, 0x89e1, 0xffffffffffffffff) ioctl$sock_SIOCSPGRP(0xffffffffffffffff, 0x8902, 0x0) sendmsg$can_bcm(r2, &(0x7f0000000480)={&(0x7f0000000340)={0x1d, r1, 0x3f420f00}, 0x10, &(0x7f0000000040)={&(0x7f0000000580)=ANY=[@ANYBLOB, @ANYRES64=0x0, @ANYRES64=0x0, @ANYRES64=0x0, @ANYRES64=r0, @ANYBLOB="3bf81bb9f1"], 0x20000600}}, 0x0) r3 = socket(0x23, 0x800, 0x40000) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r3, 0x541b, &(0x7f00000000c0)={'ip6_vti0\x00', 0x0}) sendmsg$IPCTNL_MSG_EXP_DELETE(r3, &(0x7f00000004c0)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x40000040}, 0xc, &(0x7f0000000440)={&(0x7f00000006c0)={0x1d0, 0x2, 0x2, 0x201, 0x0, 0x0, {0xa}, [@CTA_EXPECT_NAT={0xc0, 0xa, 0x0, 0x1, [@CTA_EXPECT_NAT_TUPLE={0xc, 0x2, 0x0, 0x1, [@CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x1}]}, @CTA_EXPECT_NAT_TUPLE={0x70, 0x2, 0x0, 0x1, [@CTA_TUPLE_IP={0x2c, 0x1, 0x0, 0x1, @ipv6={{0x14, 0x3, @loopback}, {0x14, 0x4, @private0}}}, @CTA_TUPLE_IP={0x14, 0x1, 0x0, 0x1, @ipv4={{0x8, 0x1, @empty}, {0x8, 0x2, @initdev={0xac, 0x1e, 0x1, 0x0}}}}, @CTA_TUPLE_IP={0x14, 0x1, 0x0, 0x1, @ipv4={{0x8, 0x1, @local}, {0x8, 0x2, @loopback}}}, @CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x4}, @CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x3}, @CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x1}]}, @CTA_EXPECT_NAT_TUPLE={0x38, 0x2, 0x0, 0x1, [@CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5, 0x1, 0x88}}, @CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x3}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5, 0x1, 0x21}}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5, 0x1, 0x1}}, @CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x3}]}, @CTA_EXPECT_NAT_DIR={0x8}]}, @CTA_EXPECT_MASTER={0x20, 0x1, 0x0, 0x1, [@CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x1}, @CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x2}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5, 0x1, 0x84}}]}, @CTA_EXPECT_MASTER={0xdc, 0x1, 0x0, 0x1, [@CTA_TUPLE_IP={0x14, 0x1, 0x0, 0x1, @ipv4={{0x8, 0x1, @multicast1}, {0x8, 0x2, @dev={0xac, 0x14, 0x14, 0x3a}}}}, @CTA_TUPLE_ZONE={0x6}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5, 0x1, 0x21}}, @CTA_TUPLE_IP={0x14, 0x1, 0x0, 0x1, @ipv4={{0x8, 0x1, @empty}, {0x8, 0x2, @local}}}, @CTA_TUPLE_IP={0x2c, 0x1, 0x0, 0x1, @ipv6={{0x14, 0x3, @private1={0xfc, 0x1, '\x00', 0x1}}, {0x14, 0x4, @rand_addr=' \x01\x00'}}}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5, 0x1, 0x1}}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5, 0x1, 0x88}}, @CTA_TUPLE_IP={0x2c, 0x1, 0x0, 0x1, @ipv6={{0x14, 0x3, @empty}, {0x14, 0x4, @dev={0xfe, 0x80, '\x00', 0x21}}}}, @CTA_TUPLE_IP={0x2c, 0x1, 0x0, 0x1, @ipv6={{0x14, 0x3, @local}, {0x14, 0x4, @ipv4={'\x00', '\xff\xff', @rand_addr=0x64010100}}}}]}]}, 0x1d0}}, 0x48000) perf_event_open(&(0x7f0000000500)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x15, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$binfmt_elf32(0xffffffffffffffff, &(0x7f0000000040)=ANY=[], 0x69) connect$can_bcm(0xffffffffffffffff, &(0x7f0000000000), 0x10) sendmsg$can_bcm(0xffffffffffffffff, &(0x7f0000000480)={&(0x7f0000000340)={0x1d, 0x0, 0x3f420f00}, 0x10, &(0x7f0000000040)={&(0x7f0000000580)=ANY=[@ANYBLOB="01000000d7fe68ca0000e9ffffff0000", @ANYRES64=0x0, @ANYRES64=0x0, @ANYRES64=0x0, @ANYRES64], 0x20000600}}, 0x0) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(0xffffffffffffffff, 0x89f0, &(0x7f0000000280)={'gretap0\x00', &(0x7f0000000240)={'ip_vti0\x00', 0x0, 0x7, 0x80, 0xfffffff7, 0x7, {{0x8, 0x4, 0x0, 0x5, 0x20, 0x67, 0x0, 0xc0, 0x29, 0x0, @local, @empty, {[@timestamp={0x44, 0xc, 0x8, 0x0, 0x2, [0x7f, 0x1]}]}}}}}) socket(0x10, 0x3, 0x0) process_mrelease(0xffffffffffffffff, 0x0) r4 = socket$packet(0x11, 0x2, 0x300) ioctl$sock_SIOCGIFINDEX(r4, 0x8933, 0x0) getsockopt$inet_sctp_SCTP_RECVNXTINFO(r3, 0x84, 0x21, &(0x7f0000000140), &(0x7f0000000200)=0x4) bind$unix(r0, &(0x7f00000005c0)=@abs={0x1, 0x0, 0x4e23}, 0x6e) syz_clone(0x40000000, &(0x7f00000000c0), 0x0, 0x0, &(0x7f00000001c0), 0x0) 12:21:41 executing program 2: open(&(0x7f0000000400)='./bus\x00', 0x14103e, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$L2TP_CMD_SESSION_MODIFY(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000080)={0x30, r1, 0x1, 0x0, 0x0, {0x7, 0x0, 0x4}, [@L2TP_ATTR_SEND_SEQ={0x5}, @L2TP_ATTR_IFNAME={0x14, 0x8, 'veth1_to_hsr\x00'}]}, 0x30}}, 0x0) 12:21:41 executing program 3: bpf$MAP_CREATE(0x0, &(0x7f00000005c0)=@base={0xa, 0x1, 0x7, 0x53b}, 0x48) 12:21:41 executing program 0: r0 = socket$unix(0x1, 0x2, 0x0) r1 = socket$can_bcm(0x1d, 0x2, 0x2) connect$can_bcm(r1, &(0x7f0000000000), 0x10) ioctl$sock_kcm_SIOCKCMUNATTACH(0xffffffffffffffff, 0x89e1, 0xffffffffffffffff) getsockopt$inet_sctp_SCTP_PEER_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1a, &(0x7f0000000380)={0x0, 0x80, "f29c5b753353d9c7798811e57823354f32d6cb0899a53381003e4f8dbbb1ea469076c8e175a20b45443f885afb38b83813d5e013d4fad662f1582b23328b4ed70ad9d7d4d0052d0147d8b0ac4910985bec8aa8956c599d291a7da55fec010801d8f02dcff373f52f59f867378c13f4a080938c965846a7e8229b410b3ea0f9ce"}, &(0x7f00000002c0)=0x88) socket$igmp6(0xa, 0x3, 0x2) perf_event_open(&(0x7f0000000500)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x15, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) close(0xffffffffffffffff) socket$inet_mptcp(0x2, 0x1, 0x106) connect$can_bcm(0xffffffffffffffff, &(0x7f0000000000), 0x10) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, 0x0) bind$unix(r0, &(0x7f00000005c0)=@abs={0x1, 0x0, 0x4e23}, 0x6e) syz_clone(0x40000000, &(0x7f00000000c0), 0x0, 0x0, &(0x7f00000001c0), 0x0) 12:21:41 executing program 4: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x82, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket(0x10, 0x803, 0x0) sendto(r0, &(0x7f00000000c0)="120000001200e7ef007b00000000000000a1", 0x12, 0x0, 0x0, 0x0) recvmmsg(r0, &(0x7f00000037c0)=[{{&(0x7f00000004c0)=@ethernet={0x0, @random}, 0x80, &(0x7f0000000380)=[{&(0x7f0000000040)=""/95, 0x5f}, {&(0x7f0000000140)=""/85, 0x55}, {&(0x7f0000000fc0)=""/4096, 0x1000}, {&(0x7f0000000400)=""/106, 0x6a}, {&(0x7f0000000740)=""/73, 0x49}, {&(0x7f0000000200)=""/77, 0x4d}, {0x0}], 0x7, &(0x7f0000000600)=""/191, 0xbf, 0x6000}}], 0x1, 0x0, &(0x7f0000003700)={0x77359400}) 12:21:41 executing program 1: syz_mount_image$ext4(&(0x7f0000000740)='ext4\x00', &(0x7f0000000100)='./bus\x00', 0x804810, &(0x7f0000000180)=ANY=[@ANYBLOB="0061021d307a961da7401271e3fa98008000001d3902ccfd562158cb15c016093893c9e4abd02bc4f1492514fa2dfebc8001000080000000008a1049ca0000"], 0x1, 0x73b, &(0x7f0000000780)="$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") chdir(&(0x7f0000000080)='./file0\x00') open(&(0x7f00000000c0)='./bus\x00', 0x14da42, 0x0) mount(&(0x7f0000000380)=@loop={'/dev/loop', 0x0}, &(0x7f00000003c0)='./bus\x00', 0x0, 0x1000, 0x0) r0 = open(&(0x7f0000000400)='./bus\x00', 0x0, 0x0) ioctl$LOOP_SET_STATUS(r0, 0x4c02, &(0x7f00000001c0)={0x0, {}, 0x0, {}, 0xff, 0x0, 0x0, 0x0, "be8176c9e6755a48a3c0230dd390efe12f8306bed95b2afd402aae879978d959ff9009eec610d9108ea036456bb79e26ee42d0a34968c1fdbb33e8ad5860f632", "b948757aa008fae13adca739a9f126462ab528ea52e90ce2cf50a4ef2568375b"}) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='blkio.throttle.io_service_bytes\x00', 0x275a, 0x20000000) 12:21:41 executing program 2: open(&(0x7f0000000400)='./bus\x00', 0x14103e, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$L2TP_CMD_SESSION_MODIFY(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000080)={0x30, r1, 0x1, 0x0, 0x0, {0x7, 0x0, 0x5}, [@L2TP_ATTR_SEND_SEQ={0x5}, @L2TP_ATTR_IFNAME={0x14, 0x8, 'veth1_to_hsr\x00'}]}, 0x30}}, 0x0) 12:21:41 executing program 2: open(&(0x7f0000000400)='./bus\x00', 0x14103e, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$L2TP_CMD_SESSION_MODIFY(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000080)={0x30, r1, 0x1, 0x0, 0x0, {0x7, 0x0, 0x6}, [@L2TP_ATTR_SEND_SEQ={0x5}, @L2TP_ATTR_IFNAME={0x14, 0x8, 'veth1_to_hsr\x00'}]}, 0x30}}, 0x0) 12:21:41 executing program 4: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x82, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket(0x10, 0x803, 0x0) sendto(r0, &(0x7f00000000c0)="120000001200e7ef007b00000000000000a1", 0x12, 0x0, 0x0, 0x0) recvmmsg(r0, &(0x7f00000037c0)=[{{&(0x7f00000004c0)=@ethernet={0x0, @random}, 0x80, &(0x7f0000000380)=[{&(0x7f0000000040)=""/95, 0x5f}, {&(0x7f0000000140)=""/85, 0x55}, {&(0x7f0000000fc0)=""/4096, 0x1000}, {&(0x7f0000000400)=""/106, 0x6a}, {&(0x7f0000000740)=""/73, 0x49}, {&(0x7f0000000200)=""/77, 0x4d}, {0x0}], 0x7, &(0x7f0000000600)=""/191, 0xbf, 0x6558}}], 0x1, 0x0, &(0x7f0000003700)={0x77359400}) 12:21:41 executing program 2: open(&(0x7f0000000400)='./bus\x00', 0x14103e, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$L2TP_CMD_SESSION_MODIFY(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000080)={0x30, r1, 0x1, 0x0, 0x0, {0x7, 0x0, 0x7}, [@L2TP_ATTR_SEND_SEQ={0x5}, @L2TP_ATTR_IFNAME={0x14, 0x8, 'veth1_to_hsr\x00'}]}, 0x30}}, 0x0) [ 1010.216279][ T4209] loop1: detected capacity change from 0 to 2048 12:21:41 executing program 2: open(&(0x7f0000000400)='./bus\x00', 0x14103e, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$L2TP_CMD_SESSION_MODIFY(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000080)={0x30, r1, 0x1, 0x0, 0x0, {0x7, 0x0, 0x8}, [@L2TP_ATTR_SEND_SEQ={0x5}, @L2TP_ATTR_IFNAME={0x14, 0x8, 'veth1_to_hsr\x00'}]}, 0x30}}, 0x0) 12:21:41 executing program 2: open(&(0x7f0000000400)='./bus\x00', 0x14103e, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$L2TP_CMD_SESSION_MODIFY(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000080)={0x30, r1, 0x1, 0x0, 0x0, {0x7, 0x0, 0x9}, [@L2TP_ATTR_SEND_SEQ={0x5}, @L2TP_ATTR_IFNAME={0x14, 0x8, 'veth1_to_hsr\x00'}]}, 0x30}}, 0x0) [ 1010.310944][ T4209] EXT4-fs (loop1): mounted filesystem 00000000-0000-0000-0000-000000000000 without journal. Quota mode: none. [ 1010.383208][ T4209] ext4 filesystem being mounted at /root/syzkaller-testdir1539738704/syzkaller.ao1jj3/3787/bus supports timestamps until 2038 (0x7fffffff) [ 1010.492094][ T4209] loop1: detected capacity change from 2048 to 2047 [ 1010.509914][ T3128] EXT4-fs (loop1): unmounting filesystem 00000000-0000-0000-0000-000000000000. 12:21:42 executing program 5: r0 = socket$unix(0x1, 0x2, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f0000000100)={'vcan0\x00', 0x0}) r2 = socket$can_bcm(0x1d, 0x2, 0x2) connect$can_bcm(r2, &(0x7f0000000000), 0x10) ioctl$sock_kcm_SIOCKCMUNATTACH(0xffffffffffffffff, 0x89e1, 0xffffffffffffffff) ioctl$sock_SIOCSPGRP(0xffffffffffffffff, 0x8902, 0x0) sendmsg$can_bcm(r2, &(0x7f0000000480)={&(0x7f0000000340)={0x1d, r1, 0x3f420f00}, 0x10, &(0x7f0000000040)={&(0x7f0000000580)=ANY=[@ANYBLOB, @ANYRES64=0x0, @ANYRES64=0x0, @ANYRES64=0x0, @ANYRES64=r0, @ANYBLOB="3bf81bb9f1"], 0x20000600}}, 0x0) r3 = socket(0x23, 0x800, 0x40000) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r3, 0x541b, &(0x7f00000000c0)={'ip6_vti0\x00', 0x0}) sendmsg$IPCTNL_MSG_EXP_DELETE(r3, &(0x7f00000004c0)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x40000040}, 0xc, &(0x7f0000000440)={&(0x7f00000006c0)={0x1d0, 0x2, 0x2, 0x201, 0x0, 0x0, {0xa}, [@CTA_EXPECT_NAT={0xc0, 0xa, 0x0, 0x1, [@CTA_EXPECT_NAT_TUPLE={0xc, 0x2, 0x0, 0x1, [@CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x1}]}, @CTA_EXPECT_NAT_TUPLE={0x70, 0x2, 0x0, 0x1, [@CTA_TUPLE_IP={0x2c, 0x1, 0x0, 0x1, @ipv6={{0x14, 0x3, @loopback}, {0x14, 0x4, @private0}}}, @CTA_TUPLE_IP={0x14, 0x1, 0x0, 0x1, @ipv4={{0x8, 0x1, @empty}, {0x8, 0x2, @initdev={0xac, 0x1e, 0x1, 0x0}}}}, @CTA_TUPLE_IP={0x14, 0x1, 0x0, 0x1, @ipv4={{0x8, 0x1, @local}, {0x8, 0x2, @loopback}}}, @CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x4}, @CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x3}, @CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x1}]}, @CTA_EXPECT_NAT_TUPLE={0x38, 0x2, 0x0, 0x1, [@CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5, 0x1, 0x88}}, @CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x3}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5, 0x1, 0x21}}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5, 0x1, 0x1}}, @CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x3}]}, @CTA_EXPECT_NAT_DIR={0x8}]}, @CTA_EXPECT_MASTER={0x20, 0x1, 0x0, 0x1, [@CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x1}, @CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x2}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5, 0x1, 0x84}}]}, @CTA_EXPECT_MASTER={0xdc, 0x1, 0x0, 0x1, [@CTA_TUPLE_IP={0x14, 0x1, 0x0, 0x1, @ipv4={{0x8, 0x1, @multicast1}, {0x8, 0x2, @dev={0xac, 0x14, 0x14, 0x3a}}}}, @CTA_TUPLE_ZONE={0x6}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5, 0x1, 0x21}}, @CTA_TUPLE_IP={0x14, 0x1, 0x0, 0x1, @ipv4={{0x8, 0x1, @empty}, {0x8, 0x2, @local}}}, @CTA_TUPLE_IP={0x2c, 0x1, 0x0, 0x1, @ipv6={{0x14, 0x3, @private1={0xfc, 0x1, '\x00', 0x1}}, {0x14, 0x4, @rand_addr=' \x01\x00'}}}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5, 0x1, 0x1}}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5, 0x1, 0x88}}, @CTA_TUPLE_IP={0x2c, 0x1, 0x0, 0x1, @ipv6={{0x14, 0x3, @empty}, {0x14, 0x4, @dev={0xfe, 0x80, '\x00', 0x21}}}}, @CTA_TUPLE_IP={0x2c, 0x1, 0x0, 0x1, @ipv6={{0x14, 0x3, @local}, {0x14, 0x4, @ipv4={'\x00', '\xff\xff', @rand_addr=0x64010100}}}}]}]}, 0x1d0}}, 0x48000) perf_event_open(&(0x7f0000000500)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x15, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$binfmt_elf32(0xffffffffffffffff, &(0x7f0000000040)=ANY=[], 0x69) connect$can_bcm(0xffffffffffffffff, &(0x7f0000000000), 0x10) sendmsg$can_bcm(0xffffffffffffffff, &(0x7f0000000480)={&(0x7f0000000340)={0x1d, 0x0, 0x3f420f00}, 0x10, &(0x7f0000000040)={&(0x7f0000000580)=ANY=[@ANYBLOB="01000000d7fe68ca0000e9ffffff0000", @ANYRES64=0x0, @ANYRES64=0x0, @ANYRES64=0x0, @ANYRES64], 0x20000600}}, 0x0) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(0xffffffffffffffff, 0x89f0, &(0x7f0000000280)={'gretap0\x00', &(0x7f0000000240)={'ip_vti0\x00', 0x0, 0x7, 0x80, 0xfffffff7, 0x7, {{0x8, 0x4, 0x0, 0x5, 0x20, 0x67, 0x0, 0xc0, 0x29, 0x0, @local, @empty, {[@timestamp={0x44, 0xc, 0x8, 0x0, 0x2, [0x7f, 0x1]}]}}}}}) socket(0x10, 0x3, 0x0) process_mrelease(0xffffffffffffffff, 0x0) r4 = socket$packet(0x11, 0x2, 0x300) ioctl$sock_SIOCGIFINDEX(r4, 0x8933, 0x0) getsockopt$inet_sctp_SCTP_RECVNXTINFO(r3, 0x84, 0x21, &(0x7f0000000140), &(0x7f0000000200)=0x4) bind$unix(r0, &(0x7f00000005c0)=@abs={0x1, 0x0, 0x4e23}, 0x6e) syz_clone(0x40000000, &(0x7f00000000c0), 0x0, 0x0, &(0x7f00000001c0), 0x0) 12:21:42 executing program 4: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x82, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket(0x10, 0x803, 0x0) sendto(r0, &(0x7f00000000c0)="120000001200e7ef007b00000000000000a1", 0x12, 0x0, 0x0, 0x0) recvmmsg(r0, &(0x7f00000037c0)=[{{&(0x7f00000004c0)=@ethernet={0x0, @random}, 0x80, &(0x7f0000000380)=[{&(0x7f0000000040)=""/95, 0x5f}, {&(0x7f0000000140)=""/85, 0x55}, {&(0x7f0000000fc0)=""/4096, 0x1000}, {&(0x7f0000000400)=""/106, 0x6a}, {&(0x7f0000000740)=""/73, 0x49}, {&(0x7f0000000200)=""/77, 0x4d}, {0x0}], 0x7, &(0x7f0000000600)=""/191, 0xbf, 0x8100}}], 0x1, 0x0, &(0x7f0000003700)={0x77359400}) 12:21:42 executing program 2: open(&(0x7f0000000400)='./bus\x00', 0x14103e, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$L2TP_CMD_SESSION_MODIFY(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000080)={0x30, r1, 0x1, 0x0, 0x0, {0x7, 0x0, 0xf}, [@L2TP_ATTR_SEND_SEQ={0x5}, @L2TP_ATTR_IFNAME={0x14, 0x8, 'veth1_to_hsr\x00'}]}, 0x30}}, 0x0) 12:21:42 executing program 3: bpf$BPF_BTF_GET_NEXT_ID(0x17, &(0x7f0000000200)={0x0, 0x0}, 0x8) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000280)=@bpf_lsm={0x9, 0x3, &(0x7f0000000000)=@framed, &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, r0}, 0x80) 12:21:42 executing program 1: syz_mount_image$ext4(&(0x7f0000000740)='ext4\x00', &(0x7f0000000100)='./bus\x00', 0x804810, &(0x7f0000000180)=ANY=[@ANYBLOB="0061021d307a961da7401271e3fa98008000001d3902ccfd562158cb15c016093893c9e4abd02bc4f1492514fa2dfebc8001000080000000008a1049ca0000"], 0x1, 0x73b, &(0x7f0000000780)="$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") chdir(&(0x7f0000000080)='./file0\x00') open(&(0x7f00000000c0)='./bus\x00', 0x14da42, 0x0) mount(&(0x7f0000000380)=@loop={'/dev/loop', 0x0}, &(0x7f00000003c0)='./bus\x00', 0x0, 0x1000, 0x0) r0 = open(&(0x7f0000000400)='./bus\x00', 0x0, 0x0) ioctl$LOOP_SET_STATUS(r0, 0x4c02, &(0x7f00000001c0)={0x0, {}, 0x0, {}, 0xff, 0x0, 0x0, 0x0, "be8176c9e6755a48a3c0230dd390efe12f8306bed95b2afd402aae879978d959ff9009eec610d9108ea036456bb79e26ee42d0a34968c1fdbb33e8ad5860f632", "b948757aa008fae13adca739a9f126462ab528ea52e90ce2cf50a4ef2568375b"}) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='blkio.throttle.io_service_bytes\x00', 0x275a, 0x22000000) 12:21:42 executing program 0: r0 = socket$unix(0x1, 0x2, 0x0) r1 = socket$can_bcm(0x1d, 0x2, 0x2) connect$can_bcm(r1, &(0x7f0000000000), 0x10) ioctl$sock_kcm_SIOCKCMUNATTACH(0xffffffffffffffff, 0x89e1, 0xffffffffffffffff) getsockopt$inet_sctp_SCTP_PEER_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1a, &(0x7f0000000380)={0x0, 0x80, "f29c5b753353d9c7798811e57823354f32d6cb0899a53381003e4f8dbbb1ea469076c8e175a20b45443f885afb38b83813d5e013d4fad662f1582b23328b4ed70ad9d7d4d0052d0147d8b0ac4910985bec8aa8956c599d291a7da55fec010801d8f02dcff373f52f59f867378c13f4a080938c965846a7e8229b410b3ea0f9ce"}, &(0x7f00000002c0)=0x88) socket$igmp6(0xa, 0x3, 0x2) perf_event_open(&(0x7f0000000500)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x15, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) close(0xffffffffffffffff) socket$inet_mptcp(0x2, 0x1, 0x106) connect$can_bcm(0xffffffffffffffff, &(0x7f0000000000), 0x10) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, 0x0) bind$unix(r0, &(0x7f00000005c0)=@abs={0x1, 0x0, 0x4e23}, 0x6e) syz_clone(0x40000000, &(0x7f00000000c0), 0x0, 0x0, &(0x7f00000001c0), 0x0) 12:21:42 executing program 3: bpf$BPF_PROG_WITH_BTFID_LOAD(0x21, &(0x7f0000000940)=@bpf_ext={0x1c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 12:21:42 executing program 4: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x82, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket(0x10, 0x803, 0x0) sendto(r0, &(0x7f00000000c0)="120000001200e7ef007b00000000000000a1", 0x12, 0x0, 0x0, 0x0) recvmmsg(r0, &(0x7f00000037c0)=[{{&(0x7f00000004c0)=@ethernet={0x0, @random}, 0x80, &(0x7f0000000380)=[{&(0x7f0000000040)=""/95, 0x5f}, {&(0x7f0000000140)=""/85, 0x55}, {&(0x7f0000000fc0)=""/4096, 0x1000}, {&(0x7f0000000400)=""/106, 0x6a}, {&(0x7f0000000740)=""/73, 0x49}, {&(0x7f0000000200)=""/77, 0x4d}, {0x0}], 0x7, &(0x7f0000000600)=""/191, 0xbf, 0x8847}}], 0x1, 0x0, &(0x7f0000003700)={0x77359400}) 12:21:42 executing program 2: open(&(0x7f0000000400)='./bus\x00', 0x14103e, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$L2TP_CMD_SESSION_MODIFY(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000080)={0x30, r1, 0x1, 0x0, 0x0, {0x7, 0x0, 0x13}, [@L2TP_ATTR_SEND_SEQ={0x5}, @L2TP_ATTR_IFNAME={0x14, 0x8, 'veth1_to_hsr\x00'}]}, 0x30}}, 0x0) 12:21:42 executing program 0: r0 = socket$unix(0x1, 0x2, 0x0) r1 = socket$can_bcm(0x1d, 0x2, 0x2) connect$can_bcm(r1, &(0x7f0000000000), 0x10) ioctl$sock_kcm_SIOCKCMUNATTACH(0xffffffffffffffff, 0x89e1, 0xffffffffffffffff) getsockopt$inet_sctp_SCTP_PEER_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1a, &(0x7f0000000380)={0x0, 0x80, "f29c5b753353d9c7798811e57823354f32d6cb0899a53381003e4f8dbbb1ea469076c8e175a20b45443f885afb38b83813d5e013d4fad662f1582b23328b4ed70ad9d7d4d0052d0147d8b0ac4910985bec8aa8956c599d291a7da55fec010801d8f02dcff373f52f59f867378c13f4a080938c965846a7e8229b410b3ea0f9ce"}, &(0x7f00000002c0)=0x88) socket$igmp6(0xa, 0x3, 0x2) perf_event_open(&(0x7f0000000500)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x15, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) close(0xffffffffffffffff) socket$inet_mptcp(0x2, 0x1, 0x106) connect$can_bcm(0xffffffffffffffff, &(0x7f0000000000), 0x10) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, 0x0) bind$unix(r0, &(0x7f00000005c0)=@abs={0x1, 0x0, 0x4e23}, 0x6e) syz_clone(0x40000000, &(0x7f00000000c0), 0x0, 0x0, &(0x7f00000001c0), 0x0) 12:21:42 executing program 4: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x82, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket(0x10, 0x803, 0x0) sendto(r0, &(0x7f00000000c0)="120000001200e7ef007b00000000000000a1", 0x12, 0x0, 0x0, 0x0) recvmmsg(r0, &(0x7f00000037c0)=[{{&(0x7f00000004c0)=@ethernet={0x0, @random}, 0x80, &(0x7f0000000380)=[{&(0x7f0000000040)=""/95, 0x5f}, {&(0x7f0000000140)=""/85, 0x55}, {&(0x7f0000000fc0)=""/4096, 0x1000}, {&(0x7f0000000400)=""/106, 0x6a}, {&(0x7f0000000740)=""/73, 0x49}, {&(0x7f0000000200)=""/77, 0x4d}, {0x0}], 0x7, &(0x7f0000000600)=""/191, 0xbf, 0x8848}}], 0x1, 0x0, &(0x7f0000003700)={0x77359400}) 12:21:42 executing program 3: io_uring_setup(0xef2, &(0x7f00000000c0)) [ 1011.140870][ T4239] loop1: detected capacity change from 0 to 2048 [ 1011.235715][ T4239] EXT4-fs (loop1): mounted filesystem 00000000-0000-0000-0000-000000000000 without journal. Quota mode: none. [ 1011.253283][ T4239] ext4 filesystem being mounted at /root/syzkaller-testdir1539738704/syzkaller.ao1jj3/3788/bus supports timestamps until 2038 (0x7fffffff) [ 1011.402175][ T4239] loop1: detected capacity change from 2048 to 2047 [ 1011.435326][ T3128] EXT4-fs (loop1): unmounting filesystem 00000000-0000-0000-0000-000000000000. 12:21:43 executing program 5: r0 = socket$unix(0x1, 0x2, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f0000000100)={'vcan0\x00', 0x0}) r2 = socket$can_bcm(0x1d, 0x2, 0x2) connect$can_bcm(r2, &(0x7f0000000000), 0x10) ioctl$sock_kcm_SIOCKCMUNATTACH(0xffffffffffffffff, 0x89e1, 0xffffffffffffffff) ioctl$sock_SIOCSPGRP(0xffffffffffffffff, 0x8902, 0x0) sendmsg$can_bcm(r2, &(0x7f0000000480)={&(0x7f0000000340)={0x1d, r1, 0x3f420f00}, 0x10, &(0x7f0000000040)={&(0x7f0000000580)=ANY=[@ANYBLOB, @ANYRES64=0x0, @ANYRES64=0x0, @ANYRES64=0x0, @ANYRES64=r0, @ANYBLOB="3bf81bb9f1"], 0x20000600}}, 0x0) r3 = socket(0x23, 0x800, 0x40000) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r3, 0x541b, &(0x7f00000000c0)={'ip6_vti0\x00', 0x0}) sendmsg$IPCTNL_MSG_EXP_DELETE(r3, &(0x7f00000004c0)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x40000040}, 0xc, &(0x7f0000000440)={&(0x7f00000006c0)={0x1d0, 0x2, 0x2, 0x201, 0x0, 0x0, {0xa}, [@CTA_EXPECT_NAT={0xc0, 0xa, 0x0, 0x1, [@CTA_EXPECT_NAT_TUPLE={0xc, 0x2, 0x0, 0x1, [@CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x1}]}, @CTA_EXPECT_NAT_TUPLE={0x70, 0x2, 0x0, 0x1, [@CTA_TUPLE_IP={0x2c, 0x1, 0x0, 0x1, @ipv6={{0x14, 0x3, @loopback}, {0x14, 0x4, @private0}}}, @CTA_TUPLE_IP={0x14, 0x1, 0x0, 0x1, @ipv4={{0x8, 0x1, @empty}, {0x8, 0x2, @initdev={0xac, 0x1e, 0x1, 0x0}}}}, @CTA_TUPLE_IP={0x14, 0x1, 0x0, 0x1, @ipv4={{0x8, 0x1, @local}, {0x8, 0x2, @loopback}}}, @CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x4}, @CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x3}, @CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x1}]}, @CTA_EXPECT_NAT_TUPLE={0x38, 0x2, 0x0, 0x1, [@CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5, 0x1, 0x88}}, @CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x3}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5, 0x1, 0x21}}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5, 0x1, 0x1}}, @CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x3}]}, @CTA_EXPECT_NAT_DIR={0x8}]}, @CTA_EXPECT_MASTER={0x20, 0x1, 0x0, 0x1, [@CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x1}, @CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x2}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5, 0x1, 0x84}}]}, @CTA_EXPECT_MASTER={0xdc, 0x1, 0x0, 0x1, [@CTA_TUPLE_IP={0x14, 0x1, 0x0, 0x1, @ipv4={{0x8, 0x1, @multicast1}, {0x8, 0x2, @dev={0xac, 0x14, 0x14, 0x3a}}}}, @CTA_TUPLE_ZONE={0x6}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5, 0x1, 0x21}}, @CTA_TUPLE_IP={0x14, 0x1, 0x0, 0x1, @ipv4={{0x8, 0x1, @empty}, {0x8, 0x2, @local}}}, @CTA_TUPLE_IP={0x2c, 0x1, 0x0, 0x1, @ipv6={{0x14, 0x3, @private1={0xfc, 0x1, '\x00', 0x1}}, {0x14, 0x4, @rand_addr=' \x01\x00'}}}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5, 0x1, 0x1}}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5, 0x1, 0x88}}, @CTA_TUPLE_IP={0x2c, 0x1, 0x0, 0x1, @ipv6={{0x14, 0x3, @empty}, {0x14, 0x4, @dev={0xfe, 0x80, '\x00', 0x21}}}}, @CTA_TUPLE_IP={0x2c, 0x1, 0x0, 0x1, @ipv6={{0x14, 0x3, @local}, {0x14, 0x4, @ipv4={'\x00', '\xff\xff', @rand_addr=0x64010100}}}}]}]}, 0x1d0}}, 0x48000) perf_event_open(&(0x7f0000000500)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x15, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$binfmt_elf32(0xffffffffffffffff, &(0x7f0000000040)=ANY=[], 0x69) connect$can_bcm(0xffffffffffffffff, &(0x7f0000000000), 0x10) sendmsg$can_bcm(0xffffffffffffffff, &(0x7f0000000480)={&(0x7f0000000340)={0x1d, 0x0, 0x3f420f00}, 0x10, &(0x7f0000000040)={&(0x7f0000000580)=ANY=[@ANYBLOB="01000000d7fe68ca0000e9ffffff0000", @ANYRES64=0x0, @ANYRES64=0x0, @ANYRES64=0x0, @ANYRES64], 0x20000600}}, 0x0) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(0xffffffffffffffff, 0x89f0, &(0x7f0000000280)={'gretap0\x00', &(0x7f0000000240)={'ip_vti0\x00', 0x0, 0x7, 0x80, 0xfffffff7, 0x7, {{0x8, 0x4, 0x0, 0x5, 0x20, 0x67, 0x0, 0xc0, 0x29, 0x0, @local, @empty, {[@timestamp={0x44, 0xc, 0x8, 0x0, 0x2, [0x7f, 0x1]}]}}}}}) socket(0x10, 0x3, 0x0) process_mrelease(0xffffffffffffffff, 0x0) r4 = socket$packet(0x11, 0x2, 0x300) ioctl$sock_SIOCGIFINDEX(r4, 0x8933, 0x0) getsockopt$inet_sctp_SCTP_RECVNXTINFO(r3, 0x84, 0x21, &(0x7f0000000140), &(0x7f0000000200)=0x4) bind$unix(r0, &(0x7f00000005c0)=@abs={0x1, 0x0, 0x4e23}, 0x6e) syz_clone(0x40000000, &(0x7f00000000c0), 0x0, 0x0, &(0x7f00000001c0), 0x0) 12:21:43 executing program 2: open(&(0x7f0000000400)='./bus\x00', 0x14103e, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$L2TP_CMD_SESSION_MODIFY(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000080)={0x30, r1, 0x1, 0x0, 0x0, {0x7, 0x0, 0x60}, [@L2TP_ATTR_SEND_SEQ={0x5}, @L2TP_ATTR_IFNAME={0x14, 0x8, 'veth1_to_hsr\x00'}]}, 0x30}}, 0x0) 12:21:43 executing program 3: mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu/syz1\x00', 0x1ff) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r1 = openat$cgroup_int(r0, &(0x7f0000000040)='cpuset.mems\x00', 0x2, 0x0) sendfile(r1, r1, 0x0, 0x2) 12:21:43 executing program 1: syz_mount_image$ext4(&(0x7f0000000740)='ext4\x00', &(0x7f0000000100)='./bus\x00', 0x804810, &(0x7f0000000180)=ANY=[@ANYBLOB="0061021d307a961da7401271e3fa98008000001d3902ccfd562158cb15c016093893c9e4abd02bc4f1492514fa2dfebc8001000080000000008a1049ca0000"], 0x1, 0x73b, &(0x7f0000000780)="$eJzs3M9rHHUbAPBnptn+zPtuXngP6kGEFloonSTNpT0ZL94KhYLXGpJJCJlkQ3ZTm1iw9SzU5qIgiN49ehVK/QO8SUHBuyBa40G8rMxmk9q4u922Sbeknw9M5/nOj32epzv5ZgcyG8BL643ynyRiOCIuR0S1vT2NiMOt6GjEza3jNh/cmC6XJJrNK78m5Wmx2azuvFbSXp+I1inxSkTcq0Sc/fDfeetr6wtTRZGvtMejjcXl0fra+rn5xam5fC5fGp+4OHZhYuLC2MSe9XrqnYvH7nz39sbG9183br8+dC6JyVbf0e5tzxL9w9b/SSUmd21f2o9kA5QMugAAAPpSfs4/FBFDrU+p1TjUigAAAICDpHmkCQAAABx4SQy6AgAAAGB/bf8dwPazvfv1HGw3v7wVESOd8g+1niGOOBqViDi+mTzyZEKydRo8k5u3IuLuZIfrL2lff09vbNfYM9Ivnrvl/DPZaf5Jd+af6DD/DG1/d8Iz6j7/Pcx/qMv8d7nPHN98/mqla/5bEa8Ndcqf7ORPuuR/t8/8tzc+utNtX/PLiNMdf/8kj+Tq8f0Qo7PzRc8frXt/nbnfq//j3fInvftf7rP/9zd/X+g2l5T5z5zs/f53yl9eEx+360gj4k57XY43duU4ufjDt736n+nS/+Pe/y/67P+nr45c7/NQAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAaEkjYjiSNNuJ0zTLIk5ExP/jeFrU6o2zs7XVpZlyX8RIVNLZ+SIfi4jq1jgpx+Ot+OH4/K7xRET878djW0nnizybrhUzg24eAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAACAHSciYjiSNIuINCL+qKZplg26KgAAAGDPjQy6AAAAAGDfuf8HAACAg+9p7/+TPa4DAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAONAuX7pULs3NBzemy/HMtbXVhdq1czN5fSFbXJ3Opmsry9lcrTZX5Nl0bfFxr1fUasvjF2P1+mgjrzdG62vrVxdrq0uNq/OLU3P51bzyXLoCAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAADgSQ23liTNIiJtxWmaZRH/iYiRqCSz80U+FhH/jYj71cqRcjw+6KIBAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAADYc/W19YWposhXBALBcws+iIgXoIwewaBnJgAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAABqG+tr4wVRT5Sn3QlQAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAADBY6c9JRJTL6eqp4d17Dyd/VlvriHjvsyufXJ9qNFbGy+2/7WxvfNrefn4Q9QMAAMBL4c0nOXj7Pn37Ph4AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAKBf9bX1hamiyFf2MRh0jwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAwNP5OwAA//9JjsXQ") chdir(&(0x7f0000000080)='./file0\x00') open(&(0x7f00000000c0)='./bus\x00', 0x14da42, 0x0) mount(&(0x7f0000000380)=@loop={'/dev/loop', 0x0}, &(0x7f00000003c0)='./bus\x00', 0x0, 0x1000, 0x0) r0 = open(&(0x7f0000000400)='./bus\x00', 0x0, 0x0) ioctl$LOOP_SET_STATUS(r0, 0x4c02, &(0x7f00000001c0)={0x0, {}, 0x0, {}, 0xff, 0x0, 0x0, 0x0, "be8176c9e6755a48a3c0230dd390efe12f8306bed95b2afd402aae879978d959ff9009eec610d9108ea036456bb79e26ee42d0a34968c1fdbb33e8ad5860f632", "b948757aa008fae13adca739a9f126462ab528ea52e90ce2cf50a4ef2568375b"}) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='blkio.throttle.io_service_bytes\x00', 0x275a, 0x3f000000) 12:21:43 executing program 4: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x82, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket(0x10, 0x803, 0x0) sendto(r0, &(0x7f00000000c0)="120000001200e7ef007b00000000000000a1", 0x12, 0x0, 0x0, 0x0) recvmmsg(r0, &(0x7f00000037c0)=[{{&(0x7f00000004c0)=@ethernet={0x0, @random}, 0x80, &(0x7f0000000380)=[{&(0x7f0000000040)=""/95, 0x5f}, {&(0x7f0000000140)=""/85, 0x55}, {&(0x7f0000000fc0)=""/4096, 0x1000}, {&(0x7f0000000400)=""/106, 0x6a}, {&(0x7f0000000740)=""/73, 0x49}, {&(0x7f0000000200)=""/77, 0x4d}, {0x0}], 0x7, &(0x7f0000000600)=""/191, 0xbf, 0xb411}}], 0x1, 0x0, &(0x7f0000003700)={0x77359400}) 12:21:43 executing program 0: r0 = socket$unix(0x1, 0x2, 0x0) r1 = socket$can_bcm(0x1d, 0x2, 0x2) connect$can_bcm(r1, &(0x7f0000000000), 0x10) ioctl$sock_kcm_SIOCKCMUNATTACH(0xffffffffffffffff, 0x89e1, 0xffffffffffffffff) getsockopt$inet_sctp_SCTP_PEER_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1a, &(0x7f0000000380)={0x0, 0x80, "f29c5b753353d9c7798811e57823354f32d6cb0899a53381003e4f8dbbb1ea469076c8e175a20b45443f885afb38b83813d5e013d4fad662f1582b23328b4ed70ad9d7d4d0052d0147d8b0ac4910985bec8aa8956c599d291a7da55fec010801d8f02dcff373f52f59f867378c13f4a080938c965846a7e8229b410b3ea0f9ce"}, &(0x7f00000002c0)=0x88) socket$igmp6(0xa, 0x3, 0x2) perf_event_open(&(0x7f0000000500)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) close(0xffffffffffffffff) socket$inet_mptcp(0x2, 0x1, 0x106) connect$can_bcm(0xffffffffffffffff, &(0x7f0000000000), 0x10) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, 0x0) bind$unix(r0, &(0x7f00000005c0)=@abs={0x1, 0x0, 0x4e23}, 0x6e) syz_clone(0x40000000, &(0x7f00000000c0), 0x0, 0x0, &(0x7f00000001c0), 0x0) 12:21:43 executing program 4: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x82, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket(0x10, 0x803, 0x0) sendto(r0, &(0x7f00000000c0)="120000001200e7ef007b00000000000000a1", 0x12, 0x0, 0x0, 0x0) recvmmsg(r0, &(0x7f00000037c0)=[{{&(0x7f00000004c0)=@ethernet={0x0, @random}, 0x80, &(0x7f0000000380)=[{&(0x7f0000000040)=""/95, 0x5f}, {&(0x7f0000000140)=""/85, 0x55}, {&(0x7f0000000fc0)=""/4096, 0x1000}, {&(0x7f0000000400)=""/106, 0x6a}, {&(0x7f0000000740)=""/73, 0x49}, {&(0x7f0000000200)=""/77, 0x4d}, {0x0}], 0x7, &(0x7f0000000600)=""/191, 0xbf, 0x1a000}}], 0x1, 0x0, &(0x7f0000003700)={0x77359400}) 12:21:43 executing program 3: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r0, 0x5452, 0x0) 12:21:43 executing program 2: open(&(0x7f0000000400)='./bus\x00', 0x14103e, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$L2TP_CMD_SESSION_MODIFY(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000080)={0x30, r1, 0x1, 0x0, 0x0, {0x7, 0x0, 0x300}, [@L2TP_ATTR_SEND_SEQ={0x5}, @L2TP_ATTR_IFNAME={0x14, 0x8, 'veth1_to_hsr\x00'}]}, 0x30}}, 0x0) 12:21:43 executing program 2: open(&(0x7f0000000400)='./bus\x00', 0x14103e, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$L2TP_CMD_SESSION_MODIFY(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000080)={0x30, r1, 0x1, 0x0, 0x0, {0x7, 0x0, 0x500}, [@L2TP_ATTR_SEND_SEQ={0x5}, @L2TP_ATTR_IFNAME={0x14, 0x8, 'veth1_to_hsr\x00'}]}, 0x30}}, 0x0) 12:21:43 executing program 4: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x82, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket(0x10, 0x803, 0x0) sendto(r0, &(0x7f00000000c0)="120000001200e7ef007b00000000000000a1", 0x12, 0x0, 0x0, 0x0) recvmmsg(r0, &(0x7f00000037c0)=[{{&(0x7f00000004c0)=@ethernet={0x0, @random}, 0x80, &(0x7f0000000380)=[{&(0x7f0000000040)=""/95, 0x5f}, {&(0x7f0000000140)=""/85, 0x55}, {&(0x7f0000000fc0)=""/4096, 0x1000}, {&(0x7f0000000400)=""/106, 0x6a}, {&(0x7f0000000740)=""/73, 0x49}, {&(0x7f0000000200)=""/77, 0x4d}, {0x0}], 0x7, &(0x7f0000000600)=""/191, 0xbf, 0x34000}}], 0x1, 0x0, &(0x7f0000003700)={0x77359400}) 12:21:43 executing program 3: bpf$MAP_CREATE(0x0, &(0x7f0000000300)=@base={0x1b, 0x0, 0x0, 0x0, 0x10a0}, 0x48) [ 1012.041059][ T4269] loop1: detected capacity change from 0 to 2048 [ 1012.121779][ T4269] EXT4-fs (loop1): mounted filesystem 00000000-0000-0000-0000-000000000000 without journal. Quota mode: none. [ 1012.181996][ T4269] ext4 filesystem being mounted at /root/syzkaller-testdir1539738704/syzkaller.ao1jj3/3789/bus supports timestamps until 2038 (0x7fffffff) [ 1012.321984][ T4269] loop1: detected capacity change from 2048 to 2047 [ 1012.353569][ T3128] EXT4-fs (loop1): unmounting filesystem 00000000-0000-0000-0000-000000000000. 12:21:44 executing program 5: r0 = socket$unix(0x1, 0x2, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f0000000100)={'vcan0\x00', 0x0}) r2 = socket$can_bcm(0x1d, 0x2, 0x2) connect$can_bcm(r2, &(0x7f0000000000), 0x10) ioctl$sock_kcm_SIOCKCMUNATTACH(0xffffffffffffffff, 0x89e1, 0xffffffffffffffff) ioctl$sock_SIOCSPGRP(0xffffffffffffffff, 0x8902, 0x0) sendmsg$can_bcm(r2, &(0x7f0000000480)={&(0x7f0000000340)={0x1d, r1, 0x3f420f00}, 0x10, &(0x7f0000000040)={&(0x7f0000000580)=ANY=[@ANYBLOB="01000000d7fe68ca", @ANYRES64=0x0, @ANYRES64=0x0, @ANYRES64=0x0, @ANYRES64=r0, @ANYBLOB="3bf81bb9f1"], 0x20000600}}, 0x0) r3 = socket(0x23, 0x800, 0x40000) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r3, 0x541b, &(0x7f00000000c0)={'ip6_vti0\x00', 0x0}) sendmsg$IPCTNL_MSG_EXP_DELETE(r3, &(0x7f00000004c0)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x40000040}, 0xc, &(0x7f0000000440)={&(0x7f00000006c0)={0x1d0, 0x2, 0x2, 0x201, 0x0, 0x0, {0xa}, [@CTA_EXPECT_NAT={0xc0, 0xa, 0x0, 0x1, [@CTA_EXPECT_NAT_TUPLE={0xc, 0x2, 0x0, 0x1, [@CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x1}]}, @CTA_EXPECT_NAT_TUPLE={0x70, 0x2, 0x0, 0x1, [@CTA_TUPLE_IP={0x2c, 0x1, 0x0, 0x1, @ipv6={{0x14, 0x3, @loopback}, {0x14, 0x4, @private0}}}, @CTA_TUPLE_IP={0x14, 0x1, 0x0, 0x1, @ipv4={{0x8, 0x1, @empty}, {0x8, 0x2, @initdev={0xac, 0x1e, 0x1, 0x0}}}}, @CTA_TUPLE_IP={0x14, 0x1, 0x0, 0x1, @ipv4={{0x8, 0x1, @local}, {0x8, 0x2, @loopback}}}, @CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x4}, @CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x3}, @CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x1}]}, @CTA_EXPECT_NAT_TUPLE={0x38, 0x2, 0x0, 0x1, [@CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5, 0x1, 0x88}}, @CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x3}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5, 0x1, 0x21}}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5, 0x1, 0x1}}, @CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x3}]}, @CTA_EXPECT_NAT_DIR={0x8}]}, @CTA_EXPECT_MASTER={0x20, 0x1, 0x0, 0x1, [@CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x1}, @CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x2}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5, 0x1, 0x84}}]}, @CTA_EXPECT_MASTER={0xdc, 0x1, 0x0, 0x1, [@CTA_TUPLE_IP={0x14, 0x1, 0x0, 0x1, @ipv4={{0x8, 0x1, @multicast1}, {0x8, 0x2, @dev={0xac, 0x14, 0x14, 0x3a}}}}, @CTA_TUPLE_ZONE={0x6}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5, 0x1, 0x21}}, @CTA_TUPLE_IP={0x14, 0x1, 0x0, 0x1, @ipv4={{0x8, 0x1, @empty}, {0x8, 0x2, @local}}}, @CTA_TUPLE_IP={0x2c, 0x1, 0x0, 0x1, @ipv6={{0x14, 0x3, @private1={0xfc, 0x1, '\x00', 0x1}}, {0x14, 0x4, @rand_addr=' \x01\x00'}}}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5, 0x1, 0x1}}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5, 0x1, 0x88}}, @CTA_TUPLE_IP={0x2c, 0x1, 0x0, 0x1, @ipv6={{0x14, 0x3, @empty}, {0x14, 0x4, @dev={0xfe, 0x80, '\x00', 0x21}}}}, @CTA_TUPLE_IP={0x2c, 0x1, 0x0, 0x1, @ipv6={{0x14, 0x3, @local}, {0x14, 0x4, @ipv4={'\x00', '\xff\xff', @rand_addr=0x64010100}}}}]}]}, 0x1d0}}, 0x48000) perf_event_open(&(0x7f0000000500)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x15, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$binfmt_elf32(0xffffffffffffffff, &(0x7f0000000040)=ANY=[], 0x69) connect$can_bcm(0xffffffffffffffff, &(0x7f0000000000), 0x10) sendmsg$can_bcm(0xffffffffffffffff, &(0x7f0000000480)={&(0x7f0000000340)={0x1d, 0x0, 0x3f420f00}, 0x10, &(0x7f0000000040)={&(0x7f0000000580)=ANY=[@ANYBLOB="01000000d7fe68ca0000e9ffffff0000", @ANYRES64=0x0, @ANYRES64=0x0, @ANYRES64=0x0, @ANYRES64], 0x20000600}}, 0x0) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(0xffffffffffffffff, 0x89f0, &(0x7f0000000280)={'gretap0\x00', &(0x7f0000000240)={'ip_vti0\x00', 0x0, 0x7, 0x80, 0xfffffff7, 0x7, {{0x8, 0x4, 0x0, 0x5, 0x20, 0x67, 0x0, 0xc0, 0x29, 0x0, @local, @empty, {[@timestamp={0x44, 0xc, 0x8, 0x0, 0x2, [0x7f, 0x1]}]}}}}}) socket(0x10, 0x3, 0x0) process_mrelease(0xffffffffffffffff, 0x0) r4 = socket$packet(0x11, 0x2, 0x300) ioctl$sock_SIOCGIFINDEX(r4, 0x8933, 0x0) getsockopt$inet_sctp_SCTP_RECVNXTINFO(r3, 0x84, 0x21, &(0x7f0000000140), &(0x7f0000000200)=0x4) bind$unix(r0, &(0x7f00000005c0)=@abs={0x1, 0x0, 0x4e23}, 0x6e) syz_clone(0x40000000, &(0x7f00000000c0), 0x0, 0x0, &(0x7f00000001c0), 0x0) 12:21:44 executing program 3: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IPT_SO_SET_REPLACE(r0, 0x0, 0x40, &(0x7f00000001c0)=@filter={'filter\x00', 0xe, 0x4, 0x310, 0xffffffff, 0xb8, 0x0, 0x1d8, 0xffffffff, 0xffffffff, 0x27c, 0x27c, 0x27c, 0xffffffff, 0x4, 0x0, {[{{@uncond, 0x0, 0x94, 0xb8, 0x0, {}, [@common=@icmp={{0x24}, {0x0, "e154"}}]}, @REJECT={0x24}}, {{@uncond, 0x0, 0xc0, 0x120, 0x0, {}, [@common=@osf={{0x50}, {'syz0\x00'}}]}, @common=@SET={0x60}}, {{@uncond, 0x0, 0x70, 0xa4}, @common=@inet=@SET3={0x34}}], {{'\x00', 0x0, 0x70, 0x94}, {0x24}}}}, 0x36c) 12:21:44 executing program 4: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x82, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket(0x10, 0x803, 0x0) sendto(r0, &(0x7f00000000c0)="120000001200e7ef007b00000000000000a1", 0x12, 0x0, 0x0, 0x0) recvmmsg(r0, &(0x7f00000037c0)=[{{&(0x7f00000004c0)=@ethernet={0x0, @random}, 0x80, &(0x7f0000000380)=[{&(0x7f0000000040)=""/95, 0x5f}, {&(0x7f0000000140)=""/85, 0x55}, {&(0x7f0000000fc0)=""/4096, 0x1000}, {&(0x7f0000000400)=""/106, 0x6a}, {&(0x7f0000000740)=""/73, 0x49}, {&(0x7f0000000200)=""/77, 0x4d}, {0x0}], 0x7, &(0x7f0000000600)=""/191, 0xbf, 0x200000}}], 0x1, 0x0, &(0x7f0000003700)={0x77359400}) 12:21:44 executing program 2: open(&(0x7f0000000400)='./bus\x00', 0x14103e, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$L2TP_CMD_SESSION_MODIFY(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000080)={0x30, r1, 0x1, 0x0, 0x0, {0x7, 0x0, 0x600}, [@L2TP_ATTR_SEND_SEQ={0x5}, @L2TP_ATTR_IFNAME={0x14, 0x8, 'veth1_to_hsr\x00'}]}, 0x30}}, 0x0) 12:21:44 executing program 1: syz_mount_image$ext4(&(0x7f0000000740)='ext4\x00', &(0x7f0000000100)='./bus\x00', 0x804810, &(0x7f0000000180)=ANY=[@ANYBLOB="0061021d307a961da7401271e3fa98008000001d3902ccfd562158cb15c016093893c9e4abd02bc4f1492514fa2dfebc8001000080000000008a1049ca0000"], 0x1, 0x73b, &(0x7f0000000780)="$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") chdir(&(0x7f0000000080)='./file0\x00') open(&(0x7f00000000c0)='./bus\x00', 0x14da42, 0x0) mount(&(0x7f0000000380)=@loop={'/dev/loop', 0x0}, &(0x7f00000003c0)='./bus\x00', 0x0, 0x1000, 0x0) r0 = open(&(0x7f0000000400)='./bus\x00', 0x0, 0x0) ioctl$LOOP_SET_STATUS(r0, 0x4c02, &(0x7f00000001c0)={0x0, {}, 0x0, {}, 0xff, 0x0, 0x0, 0x0, "be8176c9e6755a48a3c0230dd390efe12f8306bed95b2afd402aae879978d959ff9009eec610d9108ea036456bb79e26ee42d0a34968c1fdbb33e8ad5860f632", "b948757aa008fae13adca739a9f126462ab528ea52e90ce2cf50a4ef2568375b"}) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='blkio.throttle.io_service_bytes\x00', 0x275a, 0x40000000) [ 1012.596964][ T4298] loop1: detected capacity change from 0 to 2048 [ 1012.644940][ T4298] EXT4-fs (loop1): mounted filesystem 00000000-0000-0000-0000-000000000000 without journal. Quota mode: none. [ 1012.671908][ T4298] ext4 filesystem being mounted at /root/syzkaller-testdir1539738704/syzkaller.ao1jj3/3790/bus supports timestamps until 2038 (0x7fffffff) [ 1012.742030][ T4298] loop1: detected capacity change from 2048 to 2047 [ 1012.792499][ T3128] EXT4-fs (loop1): unmounting filesystem 00000000-0000-0000-0000-000000000000. 12:21:44 executing program 0: r0 = socket$unix(0x1, 0x2, 0x0) r1 = socket$can_bcm(0x1d, 0x2, 0x2) connect$can_bcm(r1, &(0x7f0000000000), 0x10) ioctl$sock_kcm_SIOCKCMUNATTACH(0xffffffffffffffff, 0x89e1, 0xffffffffffffffff) getsockopt$inet_sctp_SCTP_PEER_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1a, &(0x7f0000000380)={0x0, 0x80, "f29c5b753353d9c7798811e57823354f32d6cb0899a53381003e4f8dbbb1ea469076c8e175a20b45443f885afb38b83813d5e013d4fad662f1582b23328b4ed70ad9d7d4d0052d0147d8b0ac4910985bec8aa8956c599d291a7da55fec010801d8f02dcff373f52f59f867378c13f4a080938c965846a7e8229b410b3ea0f9ce"}, &(0x7f00000002c0)=0x88) socket$igmp6(0xa, 0x3, 0x2) perf_event_open(&(0x7f0000000500)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) close(0xffffffffffffffff) socket$inet_mptcp(0x2, 0x1, 0x106) connect$can_bcm(0xffffffffffffffff, &(0x7f0000000000), 0x10) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, 0x0) bind$unix(r0, &(0x7f00000005c0)=@abs={0x1, 0x0, 0x4e23}, 0x6e) syz_clone(0x40000000, &(0x7f00000000c0), 0x0, 0x0, &(0x7f00000001c0), 0x0) 12:21:44 executing program 3: r0 = socket$phonet_pipe(0x23, 0x5, 0x2) setsockopt$PNPIPE_HANDLE(r0, 0x113, 0x3, &(0x7f0000000000)=0xffffff92, 0x4) 12:21:44 executing program 2: open(&(0x7f0000000400)='./bus\x00', 0x14103e, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$L2TP_CMD_SESSION_MODIFY(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000080)={0x30, r1, 0x1, 0x0, 0x0, {0x7, 0x0, 0x700}, [@L2TP_ATTR_SEND_SEQ={0x5}, @L2TP_ATTR_IFNAME={0x14, 0x8, 'veth1_to_hsr\x00'}]}, 0x30}}, 0x0) 12:21:44 executing program 4: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x82, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket(0x10, 0x803, 0x0) sendto(r0, &(0x7f00000000c0)="120000001200e7ef007b00000000000000a1", 0x12, 0x0, 0x0, 0x0) recvmmsg(r0, &(0x7f00000037c0)=[{{&(0x7f00000004c0)=@ethernet={0x0, @random}, 0x80, &(0x7f0000000380)=[{&(0x7f0000000040)=""/95, 0x5f}, {&(0x7f0000000140)=""/85, 0x55}, {&(0x7f0000000fc0)=""/4096, 0x1000}, {&(0x7f0000000400)=""/106, 0x6a}, {&(0x7f0000000740)=""/73, 0x49}, {&(0x7f0000000200)=""/77, 0x4d}, {0x0}], 0x7, &(0x7f0000000600)=""/191, 0xbf, 0x400300}}], 0x1, 0x0, &(0x7f0000003700)={0x77359400}) 12:21:44 executing program 1: syz_mount_image$ext4(&(0x7f0000000740)='ext4\x00', &(0x7f0000000100)='./bus\x00', 0x804810, &(0x7f0000000180)=ANY=[@ANYBLOB="0061021d307a961da7401271e3fa98008000001d3902ccfd562158cb15c016093893c9e4abd02bc4f1492514fa2dfebc8001000080000000008a1049ca0000"], 0x1, 0x73b, &(0x7f0000000780)="$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") chdir(&(0x7f0000000080)='./file0\x00') open(&(0x7f00000000c0)='./bus\x00', 0x14da42, 0x0) mount(&(0x7f0000000380)=@loop={'/dev/loop', 0x0}, &(0x7f00000003c0)='./bus\x00', 0x0, 0x1000, 0x0) r0 = open(&(0x7f0000000400)='./bus\x00', 0x0, 0x0) ioctl$LOOP_SET_STATUS(r0, 0x4c02, &(0x7f00000001c0)={0x0, {}, 0x0, {}, 0xff, 0x0, 0x0, 0x0, "be8176c9e6755a48a3c0230dd390efe12f8306bed95b2afd402aae879978d959ff9009eec610d9108ea036456bb79e26ee42d0a34968c1fdbb33e8ad5860f632", "b948757aa008fae13adca739a9f126462ab528ea52e90ce2cf50a4ef2568375b"}) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='blkio.throttle.io_service_bytes\x00', 0x275a, 0x40000800) 12:21:44 executing program 2: open(&(0x7f0000000400)='./bus\x00', 0x14103e, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$L2TP_CMD_SESSION_MODIFY(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000080)={0x30, r1, 0x1, 0x0, 0x0, {0x7, 0x0, 0x900}, [@L2TP_ATTR_SEND_SEQ={0x5}, @L2TP_ATTR_IFNAME={0x14, 0x8, 'veth1_to_hsr\x00'}]}, 0x30}}, 0x0) 12:21:44 executing program 4: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x82, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket(0x10, 0x803, 0x0) sendto(r0, &(0x7f00000000c0)="120000001200e7ef007b00000000000000a1", 0x12, 0x0, 0x0, 0x0) recvmmsg(r0, &(0x7f00000037c0)=[{{&(0x7f00000004c0)=@ethernet={0x0, @random}, 0x80, &(0x7f0000000380)=[{&(0x7f0000000040)=""/95, 0x5f}, {&(0x7f0000000140)=""/85, 0x55}, {&(0x7f0000000fc0)=""/4096, 0x1000}, {&(0x7f0000000400)=""/106, 0x6a}, {&(0x7f0000000740)=""/73, 0x49}, {&(0x7f0000000200)=""/77, 0x4d}, {0x0}], 0x7, &(0x7f0000000600)=""/191, 0xbf, 0xa00100}}], 0x1, 0x0, &(0x7f0000003700)={0x77359400}) [ 1012.893596][ T23] audit: type=1400 audit(1674822104.397:614): avc: denied { setopt } for pid=4310 comm="syz-executor.3" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=phonet_socket permissive=1 [ 1012.904839][ T4315] loop1: detected capacity change from 0 to 2048 [ 1013.007798][ T4315] EXT4-fs (loop1): mounted filesystem 00000000-0000-0000-0000-000000000000 without journal. Quota mode: none. [ 1013.044625][ T4315] ext4 filesystem being mounted at /root/syzkaller-testdir1539738704/syzkaller.ao1jj3/3791/bus supports timestamps until 2038 (0x7fffffff) [ 1013.162354][ T4315] loop1: detected capacity change from 2048 to 2047 [ 1013.189275][ T3128] EXT4-fs (loop1): unmounting filesystem 00000000-0000-0000-0000-000000000000. 12:21:44 executing program 5: r0 = socket$unix(0x1, 0x2, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f0000000100)={'vcan0\x00', 0x0}) r2 = socket$can_bcm(0x1d, 0x2, 0x2) connect$can_bcm(r2, &(0x7f0000000000), 0x10) ioctl$sock_kcm_SIOCKCMUNATTACH(0xffffffffffffffff, 0x89e1, 0xffffffffffffffff) ioctl$sock_SIOCSPGRP(0xffffffffffffffff, 0x8902, 0x0) sendmsg$can_bcm(r2, &(0x7f0000000480)={&(0x7f0000000340)={0x1d, r1, 0x3f420f00}, 0x10, &(0x7f0000000040)={&(0x7f0000000580)=ANY=[@ANYBLOB="01000000d7fe68ca", @ANYRES64=0x0, @ANYRES64=0x0, @ANYRES64=0x0, @ANYRES64=r0, @ANYBLOB="3bf81bb9f1"], 0x20000600}}, 0x0) r3 = socket(0x23, 0x800, 0x40000) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r3, 0x541b, &(0x7f00000000c0)={'ip6_vti0\x00', 0x0}) sendmsg$IPCTNL_MSG_EXP_DELETE(r3, &(0x7f00000004c0)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x40000040}, 0xc, &(0x7f0000000440)={&(0x7f00000006c0)={0x1d0, 0x2, 0x2, 0x201, 0x0, 0x0, {0xa}, [@CTA_EXPECT_NAT={0xc0, 0xa, 0x0, 0x1, [@CTA_EXPECT_NAT_TUPLE={0xc, 0x2, 0x0, 0x1, [@CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x1}]}, @CTA_EXPECT_NAT_TUPLE={0x70, 0x2, 0x0, 0x1, [@CTA_TUPLE_IP={0x2c, 0x1, 0x0, 0x1, @ipv6={{0x14, 0x3, @loopback}, {0x14, 0x4, @private0}}}, @CTA_TUPLE_IP={0x14, 0x1, 0x0, 0x1, @ipv4={{0x8, 0x1, @empty}, {0x8, 0x2, @initdev={0xac, 0x1e, 0x1, 0x0}}}}, @CTA_TUPLE_IP={0x14, 0x1, 0x0, 0x1, @ipv4={{0x8, 0x1, @local}, {0x8, 0x2, @loopback}}}, @CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x4}, @CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x3}, @CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x1}]}, @CTA_EXPECT_NAT_TUPLE={0x38, 0x2, 0x0, 0x1, [@CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5, 0x1, 0x88}}, @CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x3}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5, 0x1, 0x21}}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5, 0x1, 0x1}}, @CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x3}]}, @CTA_EXPECT_NAT_DIR={0x8}]}, @CTA_EXPECT_MASTER={0x20, 0x1, 0x0, 0x1, [@CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x1}, @CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x2}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5, 0x1, 0x84}}]}, @CTA_EXPECT_MASTER={0xdc, 0x1, 0x0, 0x1, [@CTA_TUPLE_IP={0x14, 0x1, 0x0, 0x1, @ipv4={{0x8, 0x1, @multicast1}, {0x8, 0x2, @dev={0xac, 0x14, 0x14, 0x3a}}}}, @CTA_TUPLE_ZONE={0x6}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5, 0x1, 0x21}}, @CTA_TUPLE_IP={0x14, 0x1, 0x0, 0x1, @ipv4={{0x8, 0x1, @empty}, {0x8, 0x2, @local}}}, @CTA_TUPLE_IP={0x2c, 0x1, 0x0, 0x1, @ipv6={{0x14, 0x3, @private1={0xfc, 0x1, '\x00', 0x1}}, {0x14, 0x4, @rand_addr=' \x01\x00'}}}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5, 0x1, 0x1}}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5, 0x1, 0x88}}, @CTA_TUPLE_IP={0x2c, 0x1, 0x0, 0x1, @ipv6={{0x14, 0x3, @empty}, {0x14, 0x4, @dev={0xfe, 0x80, '\x00', 0x21}}}}, @CTA_TUPLE_IP={0x2c, 0x1, 0x0, 0x1, @ipv6={{0x14, 0x3, @local}, {0x14, 0x4, @ipv4={'\x00', '\xff\xff', @rand_addr=0x64010100}}}}]}]}, 0x1d0}}, 0x48000) perf_event_open(&(0x7f0000000500)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x15, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$binfmt_elf32(0xffffffffffffffff, &(0x7f0000000040)=ANY=[], 0x69) connect$can_bcm(0xffffffffffffffff, &(0x7f0000000000), 0x10) sendmsg$can_bcm(0xffffffffffffffff, &(0x7f0000000480)={&(0x7f0000000340)={0x1d, 0x0, 0x3f420f00}, 0x10, &(0x7f0000000040)={&(0x7f0000000580)=ANY=[@ANYBLOB="01000000d7fe68ca0000e9ffffff0000", @ANYRES64=0x0, @ANYRES64=0x0, @ANYRES64=0x0, @ANYRES64], 0x20000600}}, 0x0) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(0xffffffffffffffff, 0x89f0, &(0x7f0000000280)={'gretap0\x00', &(0x7f0000000240)={'ip_vti0\x00', 0x0, 0x7, 0x80, 0xfffffff7, 0x7, {{0x8, 0x4, 0x0, 0x5, 0x20, 0x67, 0x0, 0xc0, 0x29, 0x0, @local, @empty, {[@timestamp={0x44, 0xc, 0x8, 0x0, 0x2, [0x7f, 0x1]}]}}}}}) socket(0x10, 0x3, 0x0) process_mrelease(0xffffffffffffffff, 0x0) r4 = socket$packet(0x11, 0x2, 0x300) ioctl$sock_SIOCGIFINDEX(r4, 0x8933, 0x0) getsockopt$inet_sctp_SCTP_RECVNXTINFO(r3, 0x84, 0x21, &(0x7f0000000140), &(0x7f0000000200)=0x4) bind$unix(r0, &(0x7f00000005c0)=@abs={0x1, 0x0, 0x4e23}, 0x6e) syz_clone(0x40000000, &(0x7f00000000c0), 0x0, 0x0, &(0x7f00000001c0), 0x0) 12:21:44 executing program 3: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$ieee802154(&(0x7f0000000180), r0) r2 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$IEEE802154_ASSOCIATE_REQ(r2, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000280)={0x34, r1, 0x1, 0x0, 0x0, {}, [@IEEE802154_ATTR_COORD_SHORT_ADDR={0x6}, @IEEE802154_ATTR_CAPABILITY={0x5}, @IEEE802154_ATTR_COORD_PAN_ID={0x6}, @IEEE802154_ATTR_CHANNEL={0x5}]}, 0x34}}, 0x0) 12:21:44 executing program 4: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x82, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket(0x10, 0x803, 0x0) sendto(r0, &(0x7f00000000c0)="120000001200e7ef007b00000000000000a1", 0x12, 0x0, 0x0, 0x0) recvmmsg(r0, &(0x7f00000037c0)=[{{&(0x7f00000004c0)=@ethernet={0x0, @random}, 0x80, &(0x7f0000000380)=[{&(0x7f0000000040)=""/95, 0x5f}, {&(0x7f0000000140)=""/85, 0x55}, {&(0x7f0000000fc0)=""/4096, 0x1000}, {&(0x7f0000000400)=""/106, 0x6a}, {&(0x7f0000000740)=""/73, 0x49}, {&(0x7f0000000200)=""/77, 0x4d}, {0x0}], 0x7, &(0x7f0000000600)=""/191, 0xbf, 0xca9a3b}}], 0x1, 0x0, &(0x7f0000003700)={0x77359400}) 12:21:44 executing program 2: open(&(0x7f0000000400)='./bus\x00', 0x14103e, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$L2TP_CMD_SESSION_MODIFY(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000080)={0x30, r1, 0x1, 0x0, 0x0, {0x7, 0x0, 0xf00}, [@L2TP_ATTR_SEND_SEQ={0x5}, @L2TP_ATTR_IFNAME={0x14, 0x8, 'veth1_to_hsr\x00'}]}, 0x30}}, 0x0) 12:21:44 executing program 1: syz_mount_image$ext4(&(0x7f0000000740)='ext4\x00', &(0x7f0000000100)='./bus\x00', 0x804810, &(0x7f0000000180)=ANY=[@ANYBLOB="0061021d307a961da7401271e3fa98008000001d3902ccfd562158cb15c016093893c9e4abd02bc4f1492514fa2dfebc8001000080000000008a1049ca0000"], 0x1, 0x73b, &(0x7f0000000780)="$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") chdir(&(0x7f0000000080)='./file0\x00') open(&(0x7f00000000c0)='./bus\x00', 0x14da42, 0x0) mount(&(0x7f0000000380)=@loop={'/dev/loop', 0x0}, &(0x7f00000003c0)='./bus\x00', 0x0, 0x1000, 0x0) r0 = open(&(0x7f0000000400)='./bus\x00', 0x0, 0x0) ioctl$LOOP_SET_STATUS(r0, 0x4c02, &(0x7f00000001c0)={0x0, {}, 0x0, {}, 0xff, 0x0, 0x0, 0x0, "be8176c9e6755a48a3c0230dd390efe12f8306bed95b2afd402aae879978d959ff9009eec610d9108ea036456bb79e26ee42d0a34968c1fdbb33e8ad5860f632", "b948757aa008fae13adca739a9f126462ab528ea52e90ce2cf50a4ef2568375b"}) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='blkio.throttle.io_service_bytes\x00', 0x275a, 0x50000000) [ 1013.340069][ T4329] loop1: detected capacity change from 0 to 2048 [ 1013.395394][ T4329] EXT4-fs (loop1): mounted filesystem 00000000-0000-0000-0000-000000000000 without journal. Quota mode: none. [ 1013.470235][ T4329] ext4 filesystem being mounted at /root/syzkaller-testdir1539738704/syzkaller.ao1jj3/3792/bus supports timestamps until 2038 (0x7fffffff) [ 1013.562941][ T4329] loop1: detected capacity change from 2048 to 2047 [ 1013.616857][ T3128] EXT4-fs (loop1): unmounting filesystem 00000000-0000-0000-0000-000000000000. 12:21:45 executing program 0: r0 = socket$unix(0x1, 0x2, 0x0) r1 = socket$can_bcm(0x1d, 0x2, 0x2) connect$can_bcm(r1, &(0x7f0000000000), 0x10) ioctl$sock_kcm_SIOCKCMUNATTACH(0xffffffffffffffff, 0x89e1, 0xffffffffffffffff) getsockopt$inet_sctp_SCTP_PEER_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1a, &(0x7f0000000380)={0x0, 0x80, "f29c5b753353d9c7798811e57823354f32d6cb0899a53381003e4f8dbbb1ea469076c8e175a20b45443f885afb38b83813d5e013d4fad662f1582b23328b4ed70ad9d7d4d0052d0147d8b0ac4910985bec8aa8956c599d291a7da55fec010801d8f02dcff373f52f59f867378c13f4a080938c965846a7e8229b410b3ea0f9ce"}, &(0x7f00000002c0)=0x88) socket$igmp6(0xa, 0x3, 0x2) perf_event_open(&(0x7f0000000500)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) close(0xffffffffffffffff) socket$inet_mptcp(0x2, 0x1, 0x106) connect$can_bcm(0xffffffffffffffff, &(0x7f0000000000), 0x10) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, 0x0) bind$unix(r0, &(0x7f00000005c0)=@abs={0x1, 0x0, 0x4e23}, 0x6e) syz_clone(0x40000000, &(0x7f00000000c0), 0x0, 0x0, &(0x7f00000001c0), 0x0) 12:21:45 executing program 2: open(&(0x7f0000000400)='./bus\x00', 0x14103e, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$L2TP_CMD_SESSION_MODIFY(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000080)={0x30, r1, 0x1, 0x0, 0x0, {0x7, 0x0, 0x1300}, [@L2TP_ATTR_SEND_SEQ={0x5}, @L2TP_ATTR_IFNAME={0x14, 0x8, 'veth1_to_hsr\x00'}]}, 0x30}}, 0x0) 12:21:45 executing program 3: syz_genetlink_get_family_id$nl802154(&(0x7f0000000700), 0xffffffffffffffff) semget$private(0x0, 0x0, 0x0) 12:21:45 executing program 4: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x82, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket(0x10, 0x803, 0x0) sendto(r0, &(0x7f00000000c0)="120000001200e7ef007b00000000000000a1", 0x12, 0x0, 0x0, 0x0) recvmmsg(r0, &(0x7f00000037c0)=[{{&(0x7f00000004c0)=@ethernet={0x0, @random}, 0x80, &(0x7f0000000380)=[{&(0x7f0000000040)=""/95, 0x5f}, {&(0x7f0000000140)=""/85, 0x55}, {&(0x7f0000000fc0)=""/4096, 0x1000}, {&(0x7f0000000400)=""/106, 0x6a}, {&(0x7f0000000740)=""/73, 0x49}, {&(0x7f0000000200)=""/77, 0x4d}, {0x0}], 0x7, &(0x7f0000000600)=""/191, 0xbf, 0x1000000}}], 0x1, 0x0, &(0x7f0000003700)={0x77359400}) 12:21:45 executing program 1: syz_mount_image$ext4(&(0x7f0000000740)='ext4\x00', &(0x7f0000000100)='./bus\x00', 0x804810, &(0x7f0000000180)=ANY=[@ANYBLOB="0061021d307a961da7401271e3fa98008000001d3902ccfd562158cb15c016093893c9e4abd02bc4f1492514fa2dfebc8001000080000000008a1049ca0000"], 0x1, 0x73b, &(0x7f0000000780)="$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") chdir(&(0x7f0000000080)='./file0\x00') open(&(0x7f00000000c0)='./bus\x00', 0x14da42, 0x0) mount(&(0x7f0000000380)=@loop={'/dev/loop', 0x0}, &(0x7f00000003c0)='./bus\x00', 0x0, 0x1000, 0x0) r0 = open(&(0x7f0000000400)='./bus\x00', 0x0, 0x0) ioctl$LOOP_SET_STATUS(r0, 0x4c02, &(0x7f00000001c0)={0x0, {}, 0x0, {}, 0xff, 0x0, 0x0, 0x0, "be8176c9e6755a48a3c0230dd390efe12f8306bed95b2afd402aae879978d959ff9009eec610d9108ea036456bb79e26ee42d0a34968c1fdbb33e8ad5860f632", "b948757aa008fae13adca739a9f126462ab528ea52e90ce2cf50a4ef2568375b"}) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='blkio.throttle.io_service_bytes\x00', 0x275a, 0x600d0000) 12:21:45 executing program 3: bpf$OBJ_GET_MAP(0x7, &(0x7f0000000240)={0x0, 0x0, 0x18}, 0x10) 12:21:45 executing program 2: open(&(0x7f0000000400)='./bus\x00', 0x14103e, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$L2TP_CMD_SESSION_MODIFY(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000080)={0x30, r1, 0x1, 0x0, 0x0, {0x7, 0x0, 0x25d1}, [@L2TP_ATTR_SEND_SEQ={0x5}, @L2TP_ATTR_IFNAME={0x14, 0x8, 'veth1_to_hsr\x00'}]}, 0x30}}, 0x0) [ 1013.782988][ T4348] loop1: detected capacity change from 0 to 2048 [ 1013.828459][ T4348] EXT4-fs (loop1): mounted filesystem 00000000-0000-0000-0000-000000000000 without journal. Quota mode: none. [ 1013.865018][ T4348] ext4 filesystem being mounted at /root/syzkaller-testdir1539738704/syzkaller.ao1jj3/3793/bus supports timestamps until 2038 (0x7fffffff) [ 1013.931896][ T4348] loop1: detected capacity change from 2048 to 2047 [ 1013.972259][ T3128] EXT4-fs (loop1): unmounting filesystem 00000000-0000-0000-0000-000000000000. 12:21:45 executing program 5: r0 = socket$unix(0x1, 0x2, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f0000000100)={'vcan0\x00', 0x0}) r2 = socket$can_bcm(0x1d, 0x2, 0x2) connect$can_bcm(r2, &(0x7f0000000000), 0x10) ioctl$sock_kcm_SIOCKCMUNATTACH(0xffffffffffffffff, 0x89e1, 0xffffffffffffffff) ioctl$sock_SIOCSPGRP(0xffffffffffffffff, 0x8902, 0x0) sendmsg$can_bcm(r2, &(0x7f0000000480)={&(0x7f0000000340)={0x1d, r1, 0x3f420f00}, 0x10, &(0x7f0000000040)={&(0x7f0000000580)=ANY=[@ANYBLOB="01000000d7fe68ca", @ANYRES64=0x0, @ANYRES64=0x0, @ANYRES64=0x0, @ANYRES64=r0, @ANYBLOB="3bf81bb9f1"], 0x20000600}}, 0x0) r3 = socket(0x23, 0x800, 0x40000) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r3, 0x541b, &(0x7f00000000c0)={'ip6_vti0\x00', 0x0}) sendmsg$IPCTNL_MSG_EXP_DELETE(r3, &(0x7f00000004c0)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x40000040}, 0xc, &(0x7f0000000440)={&(0x7f00000006c0)={0x1d0, 0x2, 0x2, 0x201, 0x0, 0x0, {0xa}, [@CTA_EXPECT_NAT={0xc0, 0xa, 0x0, 0x1, [@CTA_EXPECT_NAT_TUPLE={0xc, 0x2, 0x0, 0x1, [@CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x1}]}, @CTA_EXPECT_NAT_TUPLE={0x70, 0x2, 0x0, 0x1, [@CTA_TUPLE_IP={0x2c, 0x1, 0x0, 0x1, @ipv6={{0x14, 0x3, @loopback}, {0x14, 0x4, @private0}}}, @CTA_TUPLE_IP={0x14, 0x1, 0x0, 0x1, @ipv4={{0x8, 0x1, @empty}, {0x8, 0x2, @initdev={0xac, 0x1e, 0x1, 0x0}}}}, @CTA_TUPLE_IP={0x14, 0x1, 0x0, 0x1, @ipv4={{0x8, 0x1, @local}, {0x8, 0x2, @loopback}}}, @CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x4}, @CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x3}, @CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x1}]}, @CTA_EXPECT_NAT_TUPLE={0x38, 0x2, 0x0, 0x1, [@CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5, 0x1, 0x88}}, @CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x3}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5, 0x1, 0x21}}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5, 0x1, 0x1}}, @CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x3}]}, @CTA_EXPECT_NAT_DIR={0x8}]}, @CTA_EXPECT_MASTER={0x20, 0x1, 0x0, 0x1, [@CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x1}, @CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x2}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5, 0x1, 0x84}}]}, @CTA_EXPECT_MASTER={0xdc, 0x1, 0x0, 0x1, [@CTA_TUPLE_IP={0x14, 0x1, 0x0, 0x1, @ipv4={{0x8, 0x1, @multicast1}, {0x8, 0x2, @dev={0xac, 0x14, 0x14, 0x3a}}}}, @CTA_TUPLE_ZONE={0x6}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5, 0x1, 0x21}}, @CTA_TUPLE_IP={0x14, 0x1, 0x0, 0x1, @ipv4={{0x8, 0x1, @empty}, {0x8, 0x2, @local}}}, @CTA_TUPLE_IP={0x2c, 0x1, 0x0, 0x1, @ipv6={{0x14, 0x3, @private1={0xfc, 0x1, '\x00', 0x1}}, {0x14, 0x4, @rand_addr=' \x01\x00'}}}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5, 0x1, 0x1}}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5, 0x1, 0x88}}, @CTA_TUPLE_IP={0x2c, 0x1, 0x0, 0x1, @ipv6={{0x14, 0x3, @empty}, {0x14, 0x4, @dev={0xfe, 0x80, '\x00', 0x21}}}}, @CTA_TUPLE_IP={0x2c, 0x1, 0x0, 0x1, @ipv6={{0x14, 0x3, @local}, {0x14, 0x4, @ipv4={'\x00', '\xff\xff', @rand_addr=0x64010100}}}}]}]}, 0x1d0}}, 0x48000) perf_event_open(&(0x7f0000000500)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x15, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$binfmt_elf32(0xffffffffffffffff, &(0x7f0000000040)=ANY=[], 0x69) connect$can_bcm(0xffffffffffffffff, &(0x7f0000000000), 0x10) sendmsg$can_bcm(0xffffffffffffffff, &(0x7f0000000480)={&(0x7f0000000340)={0x1d, 0x0, 0x3f420f00}, 0x10, &(0x7f0000000040)={&(0x7f0000000580)=ANY=[@ANYBLOB="01000000d7fe68ca0000e9ffffff0000", @ANYRES64=0x0, @ANYRES64=0x0, @ANYRES64=0x0, @ANYRES64], 0x20000600}}, 0x0) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(0xffffffffffffffff, 0x89f0, &(0x7f0000000280)={'gretap0\x00', &(0x7f0000000240)={'ip_vti0\x00', 0x0, 0x7, 0x80, 0xfffffff7, 0x7, {{0x8, 0x4, 0x0, 0x5, 0x20, 0x67, 0x0, 0xc0, 0x29, 0x0, @local, @empty, {[@timestamp={0x44, 0xc, 0x8, 0x0, 0x2, [0x7f, 0x1]}]}}}}}) socket(0x10, 0x3, 0x0) process_mrelease(0xffffffffffffffff, 0x0) r4 = socket$packet(0x11, 0x2, 0x300) ioctl$sock_SIOCGIFINDEX(r4, 0x8933, 0x0) getsockopt$inet_sctp_SCTP_RECVNXTINFO(r3, 0x84, 0x21, &(0x7f0000000140), &(0x7f0000000200)=0x4) bind$unix(r0, &(0x7f00000005c0)=@abs={0x1, 0x0, 0x4e23}, 0x6e) syz_clone(0x40000000, &(0x7f00000000c0), 0x0, 0x0, &(0x7f00000001c0), 0x0) 12:21:45 executing program 3: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r0, 0x894b, &(0x7f0000000600)={'ip6gre0\x00', 0x0}) 12:21:45 executing program 4: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x82, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket(0x10, 0x803, 0x0) sendto(r0, &(0x7f00000000c0)="120000001200e7ef007b00000000000000a1", 0x12, 0x0, 0x0, 0x0) recvmmsg(r0, &(0x7f00000037c0)=[{{&(0x7f00000004c0)=@ethernet={0x0, @random}, 0x80, &(0x7f0000000380)=[{&(0x7f0000000040)=""/95, 0x5f}, {&(0x7f0000000140)=""/85, 0x55}, {&(0x7f0000000fc0)=""/4096, 0x1000}, {&(0x7f0000000400)=""/106, 0x6a}, {&(0x7f0000000740)=""/73, 0x49}, {&(0x7f0000000200)=""/77, 0x4d}, {0x0}], 0x7, &(0x7f0000000600)=""/191, 0xbf, 0x2000000}}], 0x1, 0x0, &(0x7f0000003700)={0x77359400}) 12:21:45 executing program 2: open(&(0x7f0000000400)='./bus\x00', 0x14103e, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$L2TP_CMD_SESSION_MODIFY(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000080)={0x30, r1, 0x1, 0x0, 0x0, {0x7, 0x0, 0x6000}, [@L2TP_ATTR_SEND_SEQ={0x5}, @L2TP_ATTR_IFNAME={0x14, 0x8, 'veth1_to_hsr\x00'}]}, 0x30}}, 0x0) 12:21:45 executing program 1: syz_mount_image$ext4(&(0x7f0000000740)='ext4\x00', &(0x7f0000000100)='./bus\x00', 0x804810, &(0x7f0000000180)=ANY=[@ANYBLOB="0061021d307a961da7401271e3fa98008000001d3902ccfd562158cb15c016093893c9e4abd02bc4f1492514fa2dfebc8001000080000000008a1049ca0000"], 0x1, 0x73b, &(0x7f0000000780)="$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") chdir(&(0x7f0000000080)='./file0\x00') open(&(0x7f00000000c0)='./bus\x00', 0x14da42, 0x0) mount(&(0x7f0000000380)=@loop={'/dev/loop', 0x0}, &(0x7f00000003c0)='./bus\x00', 0x0, 0x1000, 0x0) r0 = open(&(0x7f0000000400)='./bus\x00', 0x0, 0x0) ioctl$LOOP_SET_STATUS(r0, 0x4c02, &(0x7f00000001c0)={0x0, {}, 0x0, {}, 0xff, 0x0, 0x0, 0x0, "be8176c9e6755a48a3c0230dd390efe12f8306bed95b2afd402aae879978d959ff9009eec610d9108ea036456bb79e26ee42d0a34968c1fdbb33e8ad5860f632", "b948757aa008fae13adca739a9f126462ab528ea52e90ce2cf50a4ef2568375b"}) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='blkio.throttle.io_service_bytes\x00', 0x275a, 0x980d0000) 12:21:45 executing program 0: r0 = socket$unix(0x1, 0x2, 0x0) r1 = socket$can_bcm(0x1d, 0x2, 0x2) connect$can_bcm(r1, &(0x7f0000000000), 0x10) ioctl$sock_kcm_SIOCKCMUNATTACH(0xffffffffffffffff, 0x89e1, 0xffffffffffffffff) getsockopt$inet_sctp_SCTP_PEER_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1a, &(0x7f0000000380)={0x0, 0x80, "f29c5b753353d9c7798811e57823354f32d6cb0899a53381003e4f8dbbb1ea469076c8e175a20b45443f885afb38b83813d5e013d4fad662f1582b23328b4ed70ad9d7d4d0052d0147d8b0ac4910985bec8aa8956c599d291a7da55fec010801d8f02dcff373f52f59f867378c13f4a080938c965846a7e8229b410b3ea0f9ce"}, &(0x7f00000002c0)=0x88) socket$igmp6(0xa, 0x3, 0x2) perf_event_open(&(0x7f0000000500)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x15, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(0xffffffffffffffff) socket$inet_mptcp(0x2, 0x1, 0x106) connect$can_bcm(0xffffffffffffffff, &(0x7f0000000000), 0x10) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, 0x0) bind$unix(r0, &(0x7f00000005c0)=@abs={0x1, 0x0, 0x4e23}, 0x6e) syz_clone(0x40000000, &(0x7f00000000c0), 0x0, 0x0, &(0x7f00000001c0), 0x0) 12:21:45 executing program 2: open(&(0x7f0000000400)='./bus\x00', 0x14103e, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$L2TP_CMD_SESSION_MODIFY(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000080)={0x30, r1, 0x1, 0x0, 0x0, {0x7, 0x0, 0xd125}, [@L2TP_ATTR_SEND_SEQ={0x5}, @L2TP_ATTR_IFNAME={0x14, 0x8, 'veth1_to_hsr\x00'}]}, 0x30}}, 0x0) 12:21:45 executing program 3: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r0, 0x894c, 0x0) 12:21:45 executing program 4: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x82, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket(0x10, 0x803, 0x0) sendto(r0, &(0x7f00000000c0)="120000001200e7ef007b00000000000000a1", 0x12, 0x0, 0x0, 0x0) recvmmsg(r0, &(0x7f00000037c0)=[{{&(0x7f00000004c0)=@ethernet={0x0, @random}, 0x80, &(0x7f0000000380)=[{&(0x7f0000000040)=""/95, 0x5f}, {&(0x7f0000000140)=""/85, 0x55}, {&(0x7f0000000fc0)=""/4096, 0x1000}, {&(0x7f0000000400)=""/106, 0x6a}, {&(0x7f0000000740)=""/73, 0x49}, {&(0x7f0000000200)=""/77, 0x4d}, {0x0}], 0x7, &(0x7f0000000600)=""/191, 0xbf, 0x3000000}}], 0x1, 0x0, &(0x7f0000003700)={0x77359400}) [ 1014.383242][ T4369] loop1: detected capacity change from 0 to 2048 12:21:45 executing program 2: open(&(0x7f0000000400)='./bus\x00', 0x14103e, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$L2TP_CMD_SESSION_MODIFY(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000080)={0x30, r1, 0x1, 0x0, 0x0, {}, [@L2TP_ATTR_SEND_SEQ={0x4}, @L2TP_ATTR_IFNAME={0x14, 0x8, 'veth1_to_hsr\x00'}]}, 0x30}}, 0x0) 12:21:46 executing program 3: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$ieee802154(&(0x7f0000000880), r1) sendmsg$IEEE802154_LLSEC_GETPARAMS(r0, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f0000000440)={0x20, r2, 0x1, 0x0, 0x0, {}, [@IEEE802154_ATTR_DEV_NAME={0xa, 0x1, 'wpan4\x00'}]}, 0x20}}, 0x0) [ 1014.449539][ T4369] EXT4-fs (loop1): mounted filesystem 00000000-0000-0000-0000-000000000000 without journal. Quota mode: none. 12:21:46 executing program 4: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x82, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket(0x10, 0x803, 0x0) sendto(r0, &(0x7f00000000c0)="120000001200e7ef007b00000000000000a1", 0x12, 0x0, 0x0, 0x0) recvmmsg(r0, &(0x7f00000037c0)=[{{&(0x7f00000004c0)=@ethernet={0x0, @random}, 0x80, &(0x7f0000000380)=[{&(0x7f0000000040)=""/95, 0x5f}, {&(0x7f0000000140)=""/85, 0x55}, {&(0x7f0000000fc0)=""/4096, 0x1000}, {&(0x7f0000000400)=""/106, 0x6a}, {&(0x7f0000000740)=""/73, 0x49}, {&(0x7f0000000200)=""/77, 0x4d}, {0x0}], 0x7, &(0x7f0000000600)=""/191, 0xbf, 0x4000000}}], 0x1, 0x0, &(0x7f0000003700)={0x77359400}) [ 1014.530352][ T4381] netlink: 'syz-executor.2': attribute type 19 has an invalid length. [ 1014.548572][ T4369] ext4 filesystem being mounted at /root/syzkaller-testdir1539738704/syzkaller.ao1jj3/3794/bus supports timestamps until 2038 (0x7fffffff) [ 1014.607700][ T4369] loop1: detected capacity change from 2048 to 2047 [ 1014.656643][ T3128] EXT4-fs (loop1): unmounting filesystem 00000000-0000-0000-0000-000000000000. 12:21:46 executing program 5: r0 = socket$unix(0x1, 0x2, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f0000000100)={'vcan0\x00', 0x0}) r2 = socket$can_bcm(0x1d, 0x2, 0x2) connect$can_bcm(r2, &(0x7f0000000000), 0x10) ioctl$sock_kcm_SIOCKCMUNATTACH(0xffffffffffffffff, 0x89e1, 0xffffffffffffffff) ioctl$sock_SIOCSPGRP(0xffffffffffffffff, 0x8902, 0x0) sendmsg$can_bcm(r2, &(0x7f0000000480)={&(0x7f0000000340)={0x1d, r1, 0x3f420f00}, 0x10, &(0x7f0000000040)={&(0x7f0000000580)=ANY=[@ANYBLOB="01000000d7fe68ca0000e9ff", @ANYRES64=0x0, @ANYRES64=0x0, @ANYRES64=0x0, @ANYRES64=r0, @ANYBLOB="3bf81bb9f1"], 0x20000600}}, 0x0) r3 = socket(0x23, 0x800, 0x40000) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r3, 0x541b, &(0x7f00000000c0)={'ip6_vti0\x00', 0x0}) sendmsg$IPCTNL_MSG_EXP_DELETE(r3, &(0x7f00000004c0)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x40000040}, 0xc, &(0x7f0000000440)={&(0x7f00000006c0)={0x1d0, 0x2, 0x2, 0x201, 0x0, 0x0, {0xa}, [@CTA_EXPECT_NAT={0xc0, 0xa, 0x0, 0x1, [@CTA_EXPECT_NAT_TUPLE={0xc, 0x2, 0x0, 0x1, [@CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x1}]}, @CTA_EXPECT_NAT_TUPLE={0x70, 0x2, 0x0, 0x1, [@CTA_TUPLE_IP={0x2c, 0x1, 0x0, 0x1, @ipv6={{0x14, 0x3, @loopback}, {0x14, 0x4, @private0}}}, @CTA_TUPLE_IP={0x14, 0x1, 0x0, 0x1, @ipv4={{0x8, 0x1, @empty}, {0x8, 0x2, @initdev={0xac, 0x1e, 0x1, 0x0}}}}, @CTA_TUPLE_IP={0x14, 0x1, 0x0, 0x1, @ipv4={{0x8, 0x1, @local}, {0x8, 0x2, @loopback}}}, @CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x4}, @CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x3}, @CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x1}]}, @CTA_EXPECT_NAT_TUPLE={0x38, 0x2, 0x0, 0x1, [@CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5, 0x1, 0x88}}, @CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x3}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5, 0x1, 0x21}}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5, 0x1, 0x1}}, @CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x3}]}, @CTA_EXPECT_NAT_DIR={0x8}]}, @CTA_EXPECT_MASTER={0x20, 0x1, 0x0, 0x1, [@CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x1}, @CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x2}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5, 0x1, 0x84}}]}, @CTA_EXPECT_MASTER={0xdc, 0x1, 0x0, 0x1, [@CTA_TUPLE_IP={0x14, 0x1, 0x0, 0x1, @ipv4={{0x8, 0x1, @multicast1}, {0x8, 0x2, @dev={0xac, 0x14, 0x14, 0x3a}}}}, @CTA_TUPLE_ZONE={0x6}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5, 0x1, 0x21}}, @CTA_TUPLE_IP={0x14, 0x1, 0x0, 0x1, @ipv4={{0x8, 0x1, @empty}, {0x8, 0x2, @local}}}, @CTA_TUPLE_IP={0x2c, 0x1, 0x0, 0x1, @ipv6={{0x14, 0x3, @private1={0xfc, 0x1, '\x00', 0x1}}, {0x14, 0x4, @rand_addr=' \x01\x00'}}}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5, 0x1, 0x1}}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5, 0x1, 0x88}}, @CTA_TUPLE_IP={0x2c, 0x1, 0x0, 0x1, @ipv6={{0x14, 0x3, @empty}, {0x14, 0x4, @dev={0xfe, 0x80, '\x00', 0x21}}}}, @CTA_TUPLE_IP={0x2c, 0x1, 0x0, 0x1, @ipv6={{0x14, 0x3, @local}, {0x14, 0x4, @ipv4={'\x00', '\xff\xff', @rand_addr=0x64010100}}}}]}]}, 0x1d0}}, 0x48000) perf_event_open(&(0x7f0000000500)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x15, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$binfmt_elf32(0xffffffffffffffff, &(0x7f0000000040)=ANY=[], 0x69) connect$can_bcm(0xffffffffffffffff, &(0x7f0000000000), 0x10) sendmsg$can_bcm(0xffffffffffffffff, &(0x7f0000000480)={&(0x7f0000000340)={0x1d, 0x0, 0x3f420f00}, 0x10, &(0x7f0000000040)={&(0x7f0000000580)=ANY=[@ANYBLOB="01000000d7fe68ca0000e9ffffff0000", @ANYRES64=0x0, @ANYRES64=0x0, @ANYRES64=0x0, @ANYRES64], 0x20000600}}, 0x0) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(0xffffffffffffffff, 0x89f0, &(0x7f0000000280)={'gretap0\x00', &(0x7f0000000240)={'ip_vti0\x00', 0x0, 0x7, 0x80, 0xfffffff7, 0x7, {{0x8, 0x4, 0x0, 0x5, 0x20, 0x67, 0x0, 0xc0, 0x29, 0x0, @local, @empty, {[@timestamp={0x44, 0xc, 0x8, 0x0, 0x2, [0x7f, 0x1]}]}}}}}) socket(0x10, 0x3, 0x0) process_mrelease(0xffffffffffffffff, 0x0) r4 = socket$packet(0x11, 0x2, 0x300) ioctl$sock_SIOCGIFINDEX(r4, 0x8933, 0x0) getsockopt$inet_sctp_SCTP_RECVNXTINFO(r3, 0x84, 0x21, &(0x7f0000000140), &(0x7f0000000200)=0x4) bind$unix(r0, &(0x7f00000005c0)=@abs={0x1, 0x0, 0x4e23}, 0x6e) syz_clone(0x40000000, &(0x7f00000000c0), 0x0, 0x0, &(0x7f00000001c0), 0x0) 12:21:46 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_ipv6_tunnel_SIOCGET6RD(r0, 0x89f8, &(0x7f0000000300)={'gre0\x00', &(0x7f0000000000)=ANY=[@ANYBLOB="7475080000000000000000000000008bae7fd5ec1c63"]}) 12:21:46 executing program 4: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x82, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket(0x10, 0x803, 0x0) sendto(r0, &(0x7f00000000c0)="120000001200e7ef007b00000000000000a1", 0x12, 0x0, 0x0, 0x0) recvmmsg(r0, &(0x7f00000037c0)=[{{&(0x7f00000004c0)=@ethernet={0x0, @random}, 0x80, &(0x7f0000000380)=[{&(0x7f0000000040)=""/95, 0x5f}, {&(0x7f0000000140)=""/85, 0x55}, {&(0x7f0000000fc0)=""/4096, 0x1000}, {&(0x7f0000000400)=""/106, 0x6a}, {&(0x7f0000000740)=""/73, 0x49}, {&(0x7f0000000200)=""/77, 0x4d}, {0x0}], 0x7, &(0x7f0000000600)=""/191, 0xbf, 0x5000000}}], 0x1, 0x0, &(0x7f0000003700)={0x77359400}) 12:21:46 executing program 2: open(&(0x7f0000000400)='./bus\x00', 0x14103e, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$L2TP_CMD_SESSION_MODIFY(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000080)={0x30, r1, 0x1, 0x0, 0x0, {}, [@L2TP_ATTR_SEND_SEQ={0x7}, @L2TP_ATTR_IFNAME={0x14, 0x8, 'veth1_to_hsr\x00'}]}, 0x30}}, 0x0) 12:21:46 executing program 1: syz_mount_image$ext4(&(0x7f0000000740)='ext4\x00', &(0x7f0000000100)='./bus\x00', 0x804810, &(0x7f0000000180)=ANY=[@ANYBLOB="0061021d307a961da7401271e3fa98008000001d3902ccfd562158cb15c016093893c9e4abd02bc4f1492514fa2dfebc8001000080000000008a1049ca0000"], 0x1, 0x73b, &(0x7f0000000780)="$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") chdir(&(0x7f0000000080)='./file0\x00') open(&(0x7f00000000c0)='./bus\x00', 0x14da42, 0x0) mount(&(0x7f0000000380)=@loop={'/dev/loop', 0x0}, &(0x7f00000003c0)='./bus\x00', 0x0, 0x1000, 0x0) r0 = open(&(0x7f0000000400)='./bus\x00', 0x0, 0x0) ioctl$LOOP_SET_STATUS(r0, 0x4c02, &(0x7f00000001c0)={0x0, {}, 0x0, {}, 0xff, 0x0, 0x0, 0x0, "be8176c9e6755a48a3c0230dd390efe12f8306bed95b2afd402aae879978d959ff9009eec610d9108ea036456bb79e26ee42d0a34968c1fdbb33e8ad5860f632", "b948757aa008fae13adca739a9f126462ab528ea52e90ce2cf50a4ef2568375b"}) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='blkio.throttle.io_service_bytes\x00', 0x275a, 0xba000000) 12:21:46 executing program 0: r0 = socket$unix(0x1, 0x2, 0x0) r1 = socket$can_bcm(0x1d, 0x2, 0x2) connect$can_bcm(r1, &(0x7f0000000000), 0x10) ioctl$sock_kcm_SIOCKCMUNATTACH(0xffffffffffffffff, 0x89e1, 0xffffffffffffffff) getsockopt$inet_sctp_SCTP_PEER_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1a, &(0x7f0000000380)={0x0, 0x80, "f29c5b753353d9c7798811e57823354f32d6cb0899a53381003e4f8dbbb1ea469076c8e175a20b45443f885afb38b83813d5e013d4fad662f1582b23328b4ed70ad9d7d4d0052d0147d8b0ac4910985bec8aa8956c599d291a7da55fec010801d8f02dcff373f52f59f867378c13f4a080938c965846a7e8229b410b3ea0f9ce"}, &(0x7f00000002c0)=0x88) socket$igmp6(0xa, 0x3, 0x2) perf_event_open(&(0x7f0000000500)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x15, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(0xffffffffffffffff) socket$inet_mptcp(0x2, 0x1, 0x106) connect$can_bcm(0xffffffffffffffff, &(0x7f0000000000), 0x10) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, 0x0) bind$unix(r0, &(0x7f00000005c0)=@abs={0x1, 0x0, 0x4e23}, 0x6e) syz_clone(0x40000000, &(0x7f00000000c0), 0x0, 0x0, &(0x7f00000001c0), 0x0) 12:21:46 executing program 3: socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000400)={0xffffffffffffffff}) getsockopt$TIPC_NODE_RECVQ_DEPTH(r0, 0x10f, 0x83, 0x0, &(0x7f0000000480)) 12:21:46 executing program 2: open(&(0x7f0000000400)='./bus\x00', 0x14103e, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$L2TP_CMD_SESSION_MODIFY(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000080)={0x30, r1, 0x1, 0x0, 0x0, {}, [@L2TP_ATTR_SEND_SEQ={0x1c}, @L2TP_ATTR_IFNAME={0x14, 0x8, 'veth1_to_hsr\x00'}]}, 0x30}}, 0x0) [ 1015.140606][ T4397] netlink: 'syz-executor.2': attribute type 19 has an invalid length. 12:21:46 executing program 4: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x82, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket(0x10, 0x803, 0x0) sendto(r0, &(0x7f00000000c0)="120000001200e7ef007b00000000000000a1", 0x12, 0x0, 0x0, 0x0) recvmmsg(r0, &(0x7f00000037c0)=[{{&(0x7f00000004c0)=@ethernet={0x0, @random}, 0x80, &(0x7f0000000380)=[{&(0x7f0000000040)=""/95, 0x5f}, {&(0x7f0000000140)=""/85, 0x55}, {&(0x7f0000000fc0)=""/4096, 0x1000}, {&(0x7f0000000400)=""/106, 0x6a}, {&(0x7f0000000740)=""/73, 0x49}, {&(0x7f0000000200)=""/77, 0x4d}, {0x0}], 0x7, &(0x7f0000000600)=""/191, 0xbf, 0x6000000}}], 0x1, 0x0, &(0x7f0000003700)={0x77359400}) 12:21:46 executing program 2: open(&(0x7f0000000400)='./bus\x00', 0x14103e, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$L2TP_CMD_SESSION_MODIFY(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000080)={0x30, r1, 0x1, 0x0, 0x0, {}, [@L2TP_ATTR_SEND_SEQ={0x25}, @L2TP_ATTR_IFNAME={0x14, 0x8, 'veth1_to_hsr\x00'}]}, 0x30}}, 0x0) 12:21:46 executing program 3: r0 = socket$tipc(0x1e, 0x5, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f00000001c0)={'vxcan0\x00'}) [ 1015.207727][ T4405] netlink: 'syz-executor.2': attribute type 19 has an invalid length. [ 1015.237747][ T4399] loop1: detected capacity change from 0 to 2048 12:21:46 executing program 4: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x82, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket(0x10, 0x803, 0x0) sendto(r0, &(0x7f00000000c0)="120000001200e7ef007b00000000000000a1", 0x12, 0x0, 0x0, 0x0) recvmmsg(r0, &(0x7f00000037c0)=[{{&(0x7f00000004c0)=@ethernet={0x0, @random}, 0x80, &(0x7f0000000380)=[{&(0x7f0000000040)=""/95, 0x5f}, {&(0x7f0000000140)=""/85, 0x55}, {&(0x7f0000000fc0)=""/4096, 0x1000}, {&(0x7f0000000400)=""/106, 0x6a}, {&(0x7f0000000740)=""/73, 0x49}, {&(0x7f0000000200)=""/77, 0x4d}, {0x0}], 0x7, &(0x7f0000000600)=""/191, 0xbf, 0x8000000}}], 0x1, 0x0, &(0x7f0000003700)={0x77359400}) [ 1015.268331][ T4408] netlink: 28 bytes leftover after parsing attributes in process `syz-executor.2'. [ 1015.331646][ T4399] EXT4-fs (loop1): mounted filesystem 00000000-0000-0000-0000-000000000000 without journal. Quota mode: none. [ 1015.358558][ T4399] ext4 filesystem being mounted at /root/syzkaller-testdir1539738704/syzkaller.ao1jj3/3795/bus supports timestamps until 2038 (0x7fffffff) [ 1015.491877][ T4399] loop1: detected capacity change from 2048 to 2047 [ 1015.524589][ T3128] EXT4-fs (loop1): unmounting filesystem 00000000-0000-0000-0000-000000000000. 12:21:47 executing program 5: r0 = socket$unix(0x1, 0x2, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f0000000100)={'vcan0\x00', 0x0}) r2 = socket$can_bcm(0x1d, 0x2, 0x2) connect$can_bcm(r2, &(0x7f0000000000), 0x10) ioctl$sock_kcm_SIOCKCMUNATTACH(0xffffffffffffffff, 0x89e1, 0xffffffffffffffff) ioctl$sock_SIOCSPGRP(0xffffffffffffffff, 0x8902, 0x0) sendmsg$can_bcm(r2, &(0x7f0000000480)={&(0x7f0000000340)={0x1d, r1, 0x3f420f00}, 0x10, &(0x7f0000000040)={&(0x7f0000000580)=ANY=[@ANYBLOB="01000000d7fe68ca0000e9ff", @ANYRES64=0x0, @ANYRES64=0x0, @ANYRES64=0x0, @ANYRES64=r0, @ANYBLOB="3bf81bb9f1"], 0x20000600}}, 0x0) r3 = socket(0x23, 0x800, 0x40000) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r3, 0x541b, &(0x7f00000000c0)={'ip6_vti0\x00', 0x0}) sendmsg$IPCTNL_MSG_EXP_DELETE(r3, &(0x7f00000004c0)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x40000040}, 0xc, &(0x7f0000000440)={&(0x7f00000006c0)={0x1d0, 0x2, 0x2, 0x201, 0x0, 0x0, {0xa}, [@CTA_EXPECT_NAT={0xc0, 0xa, 0x0, 0x1, [@CTA_EXPECT_NAT_TUPLE={0xc, 0x2, 0x0, 0x1, [@CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x1}]}, @CTA_EXPECT_NAT_TUPLE={0x70, 0x2, 0x0, 0x1, [@CTA_TUPLE_IP={0x2c, 0x1, 0x0, 0x1, @ipv6={{0x14, 0x3, @loopback}, {0x14, 0x4, @private0}}}, @CTA_TUPLE_IP={0x14, 0x1, 0x0, 0x1, @ipv4={{0x8, 0x1, @empty}, {0x8, 0x2, @initdev={0xac, 0x1e, 0x1, 0x0}}}}, @CTA_TUPLE_IP={0x14, 0x1, 0x0, 0x1, @ipv4={{0x8, 0x1, @local}, {0x8, 0x2, @loopback}}}, @CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x4}, @CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x3}, @CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x1}]}, @CTA_EXPECT_NAT_TUPLE={0x38, 0x2, 0x0, 0x1, [@CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5, 0x1, 0x88}}, @CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x3}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5, 0x1, 0x21}}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5, 0x1, 0x1}}, @CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x3}]}, @CTA_EXPECT_NAT_DIR={0x8}]}, @CTA_EXPECT_MASTER={0x20, 0x1, 0x0, 0x1, [@CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x1}, @CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x2}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5, 0x1, 0x84}}]}, @CTA_EXPECT_MASTER={0xdc, 0x1, 0x0, 0x1, [@CTA_TUPLE_IP={0x14, 0x1, 0x0, 0x1, @ipv4={{0x8, 0x1, @multicast1}, {0x8, 0x2, @dev={0xac, 0x14, 0x14, 0x3a}}}}, @CTA_TUPLE_ZONE={0x6}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5, 0x1, 0x21}}, @CTA_TUPLE_IP={0x14, 0x1, 0x0, 0x1, @ipv4={{0x8, 0x1, @empty}, {0x8, 0x2, @local}}}, @CTA_TUPLE_IP={0x2c, 0x1, 0x0, 0x1, @ipv6={{0x14, 0x3, @private1={0xfc, 0x1, '\x00', 0x1}}, {0x14, 0x4, @rand_addr=' \x01\x00'}}}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5, 0x1, 0x1}}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5, 0x1, 0x88}}, @CTA_TUPLE_IP={0x2c, 0x1, 0x0, 0x1, @ipv6={{0x14, 0x3, @empty}, {0x14, 0x4, @dev={0xfe, 0x80, '\x00', 0x21}}}}, @CTA_TUPLE_IP={0x2c, 0x1, 0x0, 0x1, @ipv6={{0x14, 0x3, @local}, {0x14, 0x4, @ipv4={'\x00', '\xff\xff', @rand_addr=0x64010100}}}}]}]}, 0x1d0}}, 0x48000) perf_event_open(&(0x7f0000000500)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x15, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$binfmt_elf32(0xffffffffffffffff, &(0x7f0000000040)=ANY=[], 0x69) connect$can_bcm(0xffffffffffffffff, &(0x7f0000000000), 0x10) sendmsg$can_bcm(0xffffffffffffffff, &(0x7f0000000480)={&(0x7f0000000340)={0x1d, 0x0, 0x3f420f00}, 0x10, &(0x7f0000000040)={&(0x7f0000000580)=ANY=[@ANYBLOB="01000000d7fe68ca0000e9ffffff0000", @ANYRES64=0x0, @ANYRES64=0x0, @ANYRES64=0x0, @ANYRES64], 0x20000600}}, 0x0) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(0xffffffffffffffff, 0x89f0, &(0x7f0000000280)={'gretap0\x00', &(0x7f0000000240)={'ip_vti0\x00', 0x0, 0x7, 0x80, 0xfffffff7, 0x7, {{0x8, 0x4, 0x0, 0x5, 0x20, 0x67, 0x0, 0xc0, 0x29, 0x0, @local, @empty, {[@timestamp={0x44, 0xc, 0x8, 0x0, 0x2, [0x7f, 0x1]}]}}}}}) socket(0x10, 0x3, 0x0) process_mrelease(0xffffffffffffffff, 0x0) r4 = socket$packet(0x11, 0x2, 0x300) ioctl$sock_SIOCGIFINDEX(r4, 0x8933, 0x0) getsockopt$inet_sctp_SCTP_RECVNXTINFO(r3, 0x84, 0x21, &(0x7f0000000140), &(0x7f0000000200)=0x4) bind$unix(r0, &(0x7f00000005c0)=@abs={0x1, 0x0, 0x4e23}, 0x6e) syz_clone(0x40000000, &(0x7f00000000c0), 0x0, 0x0, &(0x7f00000001c0), 0x0) 12:21:47 executing program 3: connect$tipc(0xffffffffffffffff, &(0x7f0000000240)=@name={0x1e, 0x2, 0x0, {{0x0, 0x1}}}, 0x10) r0 = socket$igmp(0x2, 0x3, 0x2) setsockopt$MRT_ADD_MFC(r0, 0x0, 0xcc, &(0x7f0000000200)={@multicast2, @local, 0xffffffffffffffff, "91fa5af2a99a482f6491573a8417e0503ed5245112b175bdfff6f2422f5b1317", 0x67e769c8, 0x800, 0x3}, 0x3c) setsockopt$MRT_DEL_VIF(r0, 0x0, 0xcb, &(0x7f0000000480)={0x0, 0x0, 0x0, 0x0, @vifc_lcl_ifindex, @loopback}, 0x10) bpf$MAP_CREATE(0x0, &(0x7f0000000040)=@base={0x3, 0x0, 0xfffffffd, 0x6, 0x100, 0xffffffffffffffff, 0x2, '\x00', 0x0, 0xffffffffffffffff, 0x2, 0x0, 0x5}, 0x48) setsockopt$MRT_ADD_VIF(r0, 0x0, 0xca, &(0x7f00000000c0)={0x0, 0x1, 0x1f, 0x0, @vifc_lcl_addr=@multicast2, @local}, 0x10) socketpair$tipc(0x1e, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff}) getsockopt$TIPC_DEST_DROPPABLE(r1, 0x10f, 0x81, &(0x7f0000000140), &(0x7f0000000180)=0x4) 12:21:47 executing program 4: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x82, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket(0x10, 0x803, 0x0) sendto(r0, &(0x7f00000000c0)="120000001200e7ef007b00000000000000a1", 0x12, 0x0, 0x0, 0x0) recvmmsg(r0, &(0x7f00000037c0)=[{{&(0x7f00000004c0)=@ethernet={0x0, @random}, 0x80, &(0x7f0000000380)=[{&(0x7f0000000040)=""/95, 0x5f}, {&(0x7f0000000140)=""/85, 0x55}, {&(0x7f0000000fc0)=""/4096, 0x1000}, {&(0x7f0000000400)=""/106, 0x6a}, {&(0x7f0000000740)=""/73, 0x49}, {&(0x7f0000000200)=""/77, 0x4d}, {0x0}], 0x7, &(0x7f0000000600)=""/191, 0xbf, 0x9000000}}], 0x1, 0x0, &(0x7f0000003700)={0x77359400}) 12:21:47 executing program 2: open(&(0x7f0000000400)='./bus\x00', 0x14103e, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$L2TP_CMD_SESSION_MODIFY(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000080)={0x30, r1, 0x1, 0x0, 0x0, {}, [@L2TP_ATTR_SEND_SEQ={0x45}, @L2TP_ATTR_IFNAME={0x14, 0x8, 'veth1_to_hsr\x00'}]}, 0x30}}, 0x0) 12:21:47 executing program 1: syz_mount_image$ext4(&(0x7f0000000740)='ext4\x00', &(0x7f0000000100)='./bus\x00', 0x804810, &(0x7f0000000180)=ANY=[@ANYBLOB="0061021d307a961da7401271e3fa98008000001d3902ccfd562158cb15c016093893c9e4abd02bc4f1492514fa2dfebc8001000080000000008a1049ca0000"], 0x1, 0x73b, &(0x7f0000000780)="$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") chdir(&(0x7f0000000080)='./file0\x00') open(&(0x7f00000000c0)='./bus\x00', 0x14da42, 0x0) mount(&(0x7f0000000380)=@loop={'/dev/loop', 0x0}, &(0x7f00000003c0)='./bus\x00', 0x0, 0x1000, 0x0) r0 = open(&(0x7f0000000400)='./bus\x00', 0x0, 0x0) ioctl$LOOP_SET_STATUS(r0, 0x4c02, &(0x7f00000001c0)={0x0, {}, 0x0, {}, 0xff, 0x0, 0x0, 0x0, "be8176c9e6755a48a3c0230dd390efe12f8306bed95b2afd402aae879978d959ff9009eec610d9108ea036456bb79e26ee42d0a34968c1fdbb33e8ad5860f632", "b948757aa008fae13adca739a9f126462ab528ea52e90ce2cf50a4ef2568375b"}) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='blkio.throttle.io_service_bytes\x00', 0x275a, 0xda0d0000) [ 1015.857652][ T4428] netlink: 28 bytes leftover after parsing attributes in process `syz-executor.2'. [ 1015.891552][ T4427] loop1: detected capacity change from 0 to 2048 [ 1015.961544][ T4427] EXT4-fs (loop1): mounted filesystem 00000000-0000-0000-0000-000000000000 without journal. Quota mode: none. 12:21:47 executing program 0: r0 = socket$unix(0x1, 0x2, 0x0) r1 = socket$can_bcm(0x1d, 0x2, 0x2) connect$can_bcm(r1, &(0x7f0000000000), 0x10) ioctl$sock_kcm_SIOCKCMUNATTACH(0xffffffffffffffff, 0x89e1, 0xffffffffffffffff) getsockopt$inet_sctp_SCTP_PEER_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1a, &(0x7f0000000380)={0x0, 0x80, "f29c5b753353d9c7798811e57823354f32d6cb0899a53381003e4f8dbbb1ea469076c8e175a20b45443f885afb38b83813d5e013d4fad662f1582b23328b4ed70ad9d7d4d0052d0147d8b0ac4910985bec8aa8956c599d291a7da55fec010801d8f02dcff373f52f59f867378c13f4a080938c965846a7e8229b410b3ea0f9ce"}, &(0x7f00000002c0)=0x88) socket$igmp6(0xa, 0x3, 0x2) perf_event_open(&(0x7f0000000500)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x15, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(0xffffffffffffffff) socket$inet_mptcp(0x2, 0x1, 0x106) connect$can_bcm(0xffffffffffffffff, &(0x7f0000000000), 0x10) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, 0x0) bind$unix(r0, &(0x7f00000005c0)=@abs={0x1, 0x0, 0x4e23}, 0x6e) syz_clone(0x40000000, &(0x7f00000000c0), 0x0, 0x0, &(0x7f00000001c0), 0x0) 12:21:47 executing program 2: open(&(0x7f0000000400)='./bus\x00', 0x14103e, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$L2TP_CMD_SESSION_MODIFY(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000080)={0x30, r1, 0x1, 0x0, 0x0, {}, [@L2TP_ATTR_SEND_SEQ={0x5, 0x23}, @L2TP_ATTR_IFNAME={0x14, 0x8, 'veth1_to_hsr\x00'}]}, 0x30}}, 0x0) 12:21:47 executing program 3: connect$l2tp6(0xffffffffffffffff, 0x0, 0x0) 12:21:47 executing program 4: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x82, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket(0x10, 0x803, 0x0) sendto(r0, &(0x7f00000000c0)="120000001200e7ef007b00000000000000a1", 0x12, 0x0, 0x0, 0x0) recvmmsg(r0, &(0x7f00000037c0)=[{{&(0x7f00000004c0)=@ethernet={0x0, @random}, 0x80, &(0x7f0000000380)=[{&(0x7f0000000040)=""/95, 0x5f}, {&(0x7f0000000140)=""/85, 0x55}, {&(0x7f0000000fc0)=""/4096, 0x1000}, {&(0x7f0000000400)=""/106, 0x6a}, {&(0x7f0000000740)=""/73, 0x49}, {&(0x7f0000000200)=""/77, 0x4d}, {0x0}], 0x7, &(0x7f0000000600)=""/191, 0xbf, 0xa000000}}], 0x1, 0x0, &(0x7f0000003700)={0x77359400}) [ 1016.001918][ T4427] ext4 filesystem being mounted at /root/syzkaller-testdir1539738704/syzkaller.ao1jj3/3796/bus supports timestamps until 2038 (0x7fffffff) 12:21:47 executing program 2: open(&(0x7f0000000400)='./bus\x00', 0x14103e, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$L2TP_CMD_SESSION_MODIFY(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000080)={0x30, r1, 0x1, 0x0, 0x0, {}, [@L2TP_ATTR_SEND_SEQ={0x5}, @L2TP_ATTR_IFNAME={0x14, 0x8, 'veth1_to_hsr\x00'}]}, 0x30}}, 0x0) 12:21:47 executing program 3: socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) connect$tipc(r0, 0x0, 0x14) 12:21:47 executing program 4: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x82, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket(0x10, 0x803, 0x0) sendto(r0, &(0x7f00000000c0)="120000001200e7ef007b00000000000000a1", 0x12, 0x0, 0x0, 0x0) recvmmsg(r0, &(0x7f00000037c0)=[{{&(0x7f00000004c0)=@ethernet={0x0, @random}, 0x80, &(0x7f0000000380)=[{&(0x7f0000000040)=""/95, 0x5f}, {&(0x7f0000000140)=""/85, 0x55}, {&(0x7f0000000fc0)=""/4096, 0x1000}, {&(0x7f0000000400)=""/106, 0x6a}, {&(0x7f0000000740)=""/73, 0x49}, {&(0x7f0000000200)=""/77, 0x4d}, {0x0}], 0x7, &(0x7f0000000600)=""/191, 0xbf, 0xc000000}}], 0x1, 0x0, &(0x7f0000003700)={0x77359400}) [ 1016.142897][ T4427] loop1: detected capacity change from 2048 to 2047 [ 1016.168885][ T3128] EXT4-fs (loop1): unmounting filesystem 00000000-0000-0000-0000-000000000000. 12:21:48 executing program 5: r0 = socket$unix(0x1, 0x2, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f0000000100)={'vcan0\x00', 0x0}) r2 = socket$can_bcm(0x1d, 0x2, 0x2) connect$can_bcm(r2, &(0x7f0000000000), 0x10) ioctl$sock_kcm_SIOCKCMUNATTACH(0xffffffffffffffff, 0x89e1, 0xffffffffffffffff) ioctl$sock_SIOCSPGRP(0xffffffffffffffff, 0x8902, 0x0) sendmsg$can_bcm(r2, &(0x7f0000000480)={&(0x7f0000000340)={0x1d, r1, 0x3f420f00}, 0x10, &(0x7f0000000040)={&(0x7f0000000580)=ANY=[@ANYBLOB="01000000d7fe68ca0000e9ff", @ANYRES64=0x0, @ANYRES64=0x0, @ANYRES64=0x0, @ANYRES64=r0, @ANYBLOB="3bf81bb9f1"], 0x20000600}}, 0x0) r3 = socket(0x23, 0x800, 0x40000) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r3, 0x541b, &(0x7f00000000c0)={'ip6_vti0\x00', 0x0}) sendmsg$IPCTNL_MSG_EXP_DELETE(r3, &(0x7f00000004c0)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x40000040}, 0xc, &(0x7f0000000440)={&(0x7f00000006c0)={0x1d0, 0x2, 0x2, 0x201, 0x0, 0x0, {0xa}, [@CTA_EXPECT_NAT={0xc0, 0xa, 0x0, 0x1, [@CTA_EXPECT_NAT_TUPLE={0xc, 0x2, 0x0, 0x1, [@CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x1}]}, @CTA_EXPECT_NAT_TUPLE={0x70, 0x2, 0x0, 0x1, [@CTA_TUPLE_IP={0x2c, 0x1, 0x0, 0x1, @ipv6={{0x14, 0x3, @loopback}, {0x14, 0x4, @private0}}}, @CTA_TUPLE_IP={0x14, 0x1, 0x0, 0x1, @ipv4={{0x8, 0x1, @empty}, {0x8, 0x2, @initdev={0xac, 0x1e, 0x1, 0x0}}}}, @CTA_TUPLE_IP={0x14, 0x1, 0x0, 0x1, @ipv4={{0x8, 0x1, @local}, {0x8, 0x2, @loopback}}}, @CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x4}, @CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x3}, @CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x1}]}, @CTA_EXPECT_NAT_TUPLE={0x38, 0x2, 0x0, 0x1, [@CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5, 0x1, 0x88}}, @CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x3}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5, 0x1, 0x21}}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5, 0x1, 0x1}}, @CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x3}]}, @CTA_EXPECT_NAT_DIR={0x8}]}, @CTA_EXPECT_MASTER={0x20, 0x1, 0x0, 0x1, [@CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x1}, @CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x2}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5, 0x1, 0x84}}]}, @CTA_EXPECT_MASTER={0xdc, 0x1, 0x0, 0x1, [@CTA_TUPLE_IP={0x14, 0x1, 0x0, 0x1, @ipv4={{0x8, 0x1, @multicast1}, {0x8, 0x2, @dev={0xac, 0x14, 0x14, 0x3a}}}}, @CTA_TUPLE_ZONE={0x6}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5, 0x1, 0x21}}, @CTA_TUPLE_IP={0x14, 0x1, 0x0, 0x1, @ipv4={{0x8, 0x1, @empty}, {0x8, 0x2, @local}}}, @CTA_TUPLE_IP={0x2c, 0x1, 0x0, 0x1, @ipv6={{0x14, 0x3, @private1={0xfc, 0x1, '\x00', 0x1}}, {0x14, 0x4, @rand_addr=' \x01\x00'}}}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5, 0x1, 0x1}}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5, 0x1, 0x88}}, @CTA_TUPLE_IP={0x2c, 0x1, 0x0, 0x1, @ipv6={{0x14, 0x3, @empty}, {0x14, 0x4, @dev={0xfe, 0x80, '\x00', 0x21}}}}, @CTA_TUPLE_IP={0x2c, 0x1, 0x0, 0x1, @ipv6={{0x14, 0x3, @local}, {0x14, 0x4, @ipv4={'\x00', '\xff\xff', @rand_addr=0x64010100}}}}]}]}, 0x1d0}}, 0x48000) perf_event_open(&(0x7f0000000500)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x15, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$binfmt_elf32(0xffffffffffffffff, &(0x7f0000000040)=ANY=[], 0x69) connect$can_bcm(0xffffffffffffffff, &(0x7f0000000000), 0x10) sendmsg$can_bcm(0xffffffffffffffff, &(0x7f0000000480)={&(0x7f0000000340)={0x1d, 0x0, 0x3f420f00}, 0x10, &(0x7f0000000040)={&(0x7f0000000580)=ANY=[@ANYBLOB="01000000d7fe68ca0000e9ffffff0000", @ANYRES64=0x0, @ANYRES64=0x0, @ANYRES64=0x0, @ANYRES64], 0x20000600}}, 0x0) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(0xffffffffffffffff, 0x89f0, &(0x7f0000000280)={'gretap0\x00', &(0x7f0000000240)={'ip_vti0\x00', 0x0, 0x7, 0x80, 0xfffffff7, 0x7, {{0x8, 0x4, 0x0, 0x5, 0x20, 0x67, 0x0, 0xc0, 0x29, 0x0, @local, @empty, {[@timestamp={0x44, 0xc, 0x8, 0x0, 0x2, [0x7f, 0x1]}]}}}}}) socket(0x10, 0x3, 0x0) process_mrelease(0xffffffffffffffff, 0x0) r4 = socket$packet(0x11, 0x2, 0x300) ioctl$sock_SIOCGIFINDEX(r4, 0x8933, 0x0) getsockopt$inet_sctp_SCTP_RECVNXTINFO(r3, 0x84, 0x21, &(0x7f0000000140), &(0x7f0000000200)=0x4) bind$unix(r0, &(0x7f00000005c0)=@abs={0x1, 0x0, 0x4e23}, 0x6e) syz_clone(0x40000000, &(0x7f00000000c0), 0x0, 0x0, &(0x7f00000001c0), 0x0) 12:21:48 executing program 2: open(&(0x7f0000000400)='./bus\x00', 0x14103e, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$L2TP_CMD_SESSION_MODIFY(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000080)={0x30, r1, 0x1, 0x0, 0x0, {}, [@L2TP_ATTR_SEND_SEQ={0x5, 0x13, 0x2}, @L2TP_ATTR_IFNAME={0x14, 0x8, 'veth1_to_hsr\x00'}]}, 0x30}}, 0x0) 12:21:48 executing program 1: syz_mount_image$ext4(&(0x7f0000000740)='ext4\x00', &(0x7f0000000100)='./bus\x00', 0x804810, &(0x7f0000000180)=ANY=[@ANYBLOB="0061021d307a961da7401271e3fa98008000001d3902ccfd562158cb15c016093893c9e4abd02bc4f1492514fa2dfebc8001000080000000008a1049ca0000"], 0x1, 0x73b, &(0x7f0000000780)="$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") chdir(&(0x7f0000000080)='./file0\x00') open(&(0x7f00000000c0)='./bus\x00', 0x14da42, 0x0) mount(&(0x7f0000000380)=@loop={'/dev/loop', 0x0}, &(0x7f00000003c0)='./bus\x00', 0x0, 0x1000, 0x0) r0 = open(&(0x7f0000000400)='./bus\x00', 0x0, 0x0) ioctl$LOOP_SET_STATUS(r0, 0x4c02, &(0x7f00000001c0)={0x0, {}, 0x0, {}, 0xff, 0x0, 0x0, 0x0, "be8176c9e6755a48a3c0230dd390efe12f8306bed95b2afd402aae879978d959ff9009eec610d9108ea036456bb79e26ee42d0a34968c1fdbb33e8ad5860f632", "b948757aa008fae13adca739a9f126462ab528ea52e90ce2cf50a4ef2568375b"}) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='blkio.throttle.io_service_bytes\x00', 0x275a, 0xdc120000) 12:21:48 executing program 3: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NLBL_CIPSOV4_C_LISTALL(r0, &(0x7f0000001800)={&(0x7f0000001640), 0xc, &(0x7f00000017c0)={&(0x7f0000001680)={0x14}, 0x14}}, 0x0) 12:21:48 executing program 4: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x82, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket(0x10, 0x803, 0x0) sendto(r0, &(0x7f00000000c0)="120000001200e7ef007b00000000000000a1", 0x12, 0x0, 0x0, 0x0) recvmmsg(r0, &(0x7f00000037c0)=[{{&(0x7f00000004c0)=@ethernet={0x0, @random}, 0x80, &(0x7f0000000380)=[{&(0x7f0000000040)=""/95, 0x5f}, {&(0x7f0000000140)=""/85, 0x55}, {&(0x7f0000000fc0)=""/4096, 0x1000}, {&(0x7f0000000400)=""/106, 0x6a}, {&(0x7f0000000740)=""/73, 0x49}, {&(0x7f0000000200)=""/77, 0x4d}, {0x0}], 0x7, &(0x7f0000000600)=""/191, 0xbf, 0xd000000}}], 0x1, 0x0, &(0x7f0000003700)={0x77359400}) 12:21:48 executing program 0: r0 = socket$unix(0x1, 0x2, 0x0) r1 = socket$can_bcm(0x1d, 0x2, 0x2) connect$can_bcm(r1, &(0x7f0000000000), 0x10) ioctl$sock_kcm_SIOCKCMUNATTACH(0xffffffffffffffff, 0x89e1, 0xffffffffffffffff) getsockopt$inet_sctp_SCTP_PEER_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1a, &(0x7f0000000380)={0x0, 0x80, "f29c5b753353d9c7798811e57823354f32d6cb0899a53381003e4f8dbbb1ea469076c8e175a20b45443f885afb38b83813d5e013d4fad662f1582b23328b4ed70ad9d7d4d0052d0147d8b0ac4910985bec8aa8956c599d291a7da55fec010801d8f02dcff373f52f59f867378c13f4a080938c965846a7e8229b410b3ea0f9ce"}, &(0x7f00000002c0)=0x88) socket$igmp6(0xa, 0x3, 0x2) perf_event_open(&(0x7f0000000500)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x15, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) close(0xffffffffffffffff) socket$inet_mptcp(0x2, 0x1, 0x106) connect$can_bcm(0xffffffffffffffff, 0x0, 0x0) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, 0x0) bind$unix(r0, &(0x7f00000005c0)=@abs={0x1, 0x0, 0x4e23}, 0x6e) syz_clone(0x40000000, &(0x7f00000000c0), 0x0, 0x0, &(0x7f00000001c0), 0x0) 12:21:48 executing program 3: add_key(&(0x7f0000000000)='cifs.spnego\x00', &(0x7f0000000040)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffe) 12:21:48 executing program 2: open(&(0x7f0000000400)='./bus\x00', 0x14103e, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$L2TP_CMD_SESSION_MODIFY(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000080)={0x30, r1, 0x1, 0x0, 0x0, {}, [@L2TP_ATTR_SEND_SEQ={0x5, 0x13, 0x3}, @L2TP_ATTR_IFNAME={0x14, 0x8, 'veth1_to_hsr\x00'}]}, 0x30}}, 0x0) 12:21:48 executing program 4: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x82, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket(0x10, 0x803, 0x0) sendto(r0, &(0x7f00000000c0)="120000001200e7ef007b00000000000000a1", 0x12, 0x0, 0x0, 0x0) recvmmsg(r0, &(0x7f00000037c0)=[{{&(0x7f00000004c0)=@ethernet={0x0, @random}, 0x80, &(0x7f0000000380)=[{&(0x7f0000000040)=""/95, 0x5f}, {&(0x7f0000000140)=""/85, 0x55}, {&(0x7f0000000fc0)=""/4096, 0x1000}, {&(0x7f0000000400)=""/106, 0x6a}, {&(0x7f0000000740)=""/73, 0x49}, {&(0x7f0000000200)=""/77, 0x4d}, {0x0}], 0x7, &(0x7f0000000600)=""/191, 0xbf, 0xf000000}}], 0x1, 0x0, &(0x7f0000003700)={0x77359400}) 12:21:48 executing program 2: open(&(0x7f0000000400)='./bus\x00', 0x14103e, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$L2TP_CMD_SESSION_MODIFY(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000080)={0x30, r1, 0x1, 0x0, 0x0, {}, [@L2TP_ATTR_SEND_SEQ={0x5, 0x13, 0x4}, @L2TP_ATTR_IFNAME={0x14, 0x8, 'veth1_to_hsr\x00'}]}, 0x30}}, 0x0) 12:21:48 executing program 3: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$netlbl_cipso(&(0x7f0000000740), r0) 12:21:48 executing program 4: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x82, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket(0x10, 0x803, 0x0) sendto(r0, &(0x7f00000000c0)="120000001200e7ef007b00000000000000a1", 0x12, 0x0, 0x0, 0x0) recvmmsg(r0, &(0x7f00000037c0)=[{{&(0x7f00000004c0)=@ethernet={0x0, @random}, 0x80, &(0x7f0000000380)=[{&(0x7f0000000040)=""/95, 0x5f}, {&(0x7f0000000140)=""/85, 0x55}, {&(0x7f0000000fc0)=""/4096, 0x1000}, {&(0x7f0000000400)=""/106, 0x6a}, {&(0x7f0000000740)=""/73, 0x49}, {&(0x7f0000000200)=""/77, 0x4d}, {0x0}], 0x7, &(0x7f0000000600)=""/191, 0xbf, 0x10000000}}], 0x1, 0x0, &(0x7f0000003700)={0x77359400}) [ 1016.899048][ T4464] loop1: detected capacity change from 0 to 2048 [ 1016.970111][ T4464] EXT4-fs (loop1): mounted filesystem 00000000-0000-0000-0000-000000000000 without journal. Quota mode: none. [ 1016.993308][ T4464] ext4 filesystem being mounted at /root/syzkaller-testdir1539738704/syzkaller.ao1jj3/3797/bus supports timestamps until 2038 (0x7fffffff) [ 1017.063046][ T4464] loop1: detected capacity change from 2048 to 2047 [ 1017.102284][ T3128] EXT4-fs (loop1): unmounting filesystem 00000000-0000-0000-0000-000000000000. 12:21:49 executing program 5: r0 = socket$unix(0x1, 0x2, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f0000000100)={'vcan0\x00', 0x0}) r2 = socket$can_bcm(0x1d, 0x2, 0x2) connect$can_bcm(r2, &(0x7f0000000000), 0x10) ioctl$sock_kcm_SIOCKCMUNATTACH(0xffffffffffffffff, 0x89e1, 0xffffffffffffffff) ioctl$sock_SIOCSPGRP(0xffffffffffffffff, 0x8902, 0x0) sendmsg$can_bcm(r2, &(0x7f0000000480)={&(0x7f0000000340)={0x1d, r1, 0x3f420f00}, 0x10, &(0x7f0000000040)={&(0x7f0000000580)=ANY=[@ANYBLOB="01000000d7fe68ca0000e9ffffff", @ANYRES64=0x0, @ANYRES64=0x0, @ANYRES64=0x0, @ANYRES64=r0, @ANYBLOB="3bf81bb9f1"], 0x20000600}}, 0x0) r3 = socket(0x23, 0x800, 0x40000) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r3, 0x541b, &(0x7f00000000c0)={'ip6_vti0\x00', 0x0}) sendmsg$IPCTNL_MSG_EXP_DELETE(r3, &(0x7f00000004c0)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x40000040}, 0xc, &(0x7f0000000440)={&(0x7f00000006c0)={0x1d0, 0x2, 0x2, 0x201, 0x0, 0x0, {0xa}, [@CTA_EXPECT_NAT={0xc0, 0xa, 0x0, 0x1, [@CTA_EXPECT_NAT_TUPLE={0xc, 0x2, 0x0, 0x1, [@CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x1}]}, @CTA_EXPECT_NAT_TUPLE={0x70, 0x2, 0x0, 0x1, [@CTA_TUPLE_IP={0x2c, 0x1, 0x0, 0x1, @ipv6={{0x14, 0x3, @loopback}, {0x14, 0x4, @private0}}}, @CTA_TUPLE_IP={0x14, 0x1, 0x0, 0x1, @ipv4={{0x8, 0x1, @empty}, {0x8, 0x2, @initdev={0xac, 0x1e, 0x1, 0x0}}}}, @CTA_TUPLE_IP={0x14, 0x1, 0x0, 0x1, @ipv4={{0x8, 0x1, @local}, {0x8, 0x2, @loopback}}}, @CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x4}, @CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x3}, @CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x1}]}, @CTA_EXPECT_NAT_TUPLE={0x38, 0x2, 0x0, 0x1, [@CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5, 0x1, 0x88}}, @CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x3}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5, 0x1, 0x21}}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5, 0x1, 0x1}}, @CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x3}]}, @CTA_EXPECT_NAT_DIR={0x8}]}, @CTA_EXPECT_MASTER={0x20, 0x1, 0x0, 0x1, [@CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x1}, @CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x2}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5, 0x1, 0x84}}]}, @CTA_EXPECT_MASTER={0xdc, 0x1, 0x0, 0x1, [@CTA_TUPLE_IP={0x14, 0x1, 0x0, 0x1, @ipv4={{0x8, 0x1, @multicast1}, {0x8, 0x2, @dev={0xac, 0x14, 0x14, 0x3a}}}}, @CTA_TUPLE_ZONE={0x6}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5, 0x1, 0x21}}, @CTA_TUPLE_IP={0x14, 0x1, 0x0, 0x1, @ipv4={{0x8, 0x1, @empty}, {0x8, 0x2, @local}}}, @CTA_TUPLE_IP={0x2c, 0x1, 0x0, 0x1, @ipv6={{0x14, 0x3, @private1={0xfc, 0x1, '\x00', 0x1}}, {0x14, 0x4, @rand_addr=' \x01\x00'}}}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5, 0x1, 0x1}}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5, 0x1, 0x88}}, @CTA_TUPLE_IP={0x2c, 0x1, 0x0, 0x1, @ipv6={{0x14, 0x3, @empty}, {0x14, 0x4, @dev={0xfe, 0x80, '\x00', 0x21}}}}, @CTA_TUPLE_IP={0x2c, 0x1, 0x0, 0x1, @ipv6={{0x14, 0x3, @local}, {0x14, 0x4, @ipv4={'\x00', '\xff\xff', @rand_addr=0x64010100}}}}]}]}, 0x1d0}}, 0x48000) perf_event_open(&(0x7f0000000500)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x15, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$binfmt_elf32(0xffffffffffffffff, &(0x7f0000000040)=ANY=[], 0x69) connect$can_bcm(0xffffffffffffffff, &(0x7f0000000000), 0x10) sendmsg$can_bcm(0xffffffffffffffff, &(0x7f0000000480)={&(0x7f0000000340)={0x1d, 0x0, 0x3f420f00}, 0x10, &(0x7f0000000040)={&(0x7f0000000580)=ANY=[@ANYBLOB="01000000d7fe68ca0000e9ffffff0000", @ANYRES64=0x0, @ANYRES64=0x0, @ANYRES64=0x0, @ANYRES64], 0x20000600}}, 0x0) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(0xffffffffffffffff, 0x89f0, &(0x7f0000000280)={'gretap0\x00', &(0x7f0000000240)={'ip_vti0\x00', 0x0, 0x7, 0x80, 0xfffffff7, 0x7, {{0x8, 0x4, 0x0, 0x5, 0x20, 0x67, 0x0, 0xc0, 0x29, 0x0, @local, @empty, {[@timestamp={0x44, 0xc, 0x8, 0x0, 0x2, [0x7f, 0x1]}]}}}}}) socket(0x10, 0x3, 0x0) process_mrelease(0xffffffffffffffff, 0x0) r4 = socket$packet(0x11, 0x2, 0x300) ioctl$sock_SIOCGIFINDEX(r4, 0x8933, 0x0) getsockopt$inet_sctp_SCTP_RECVNXTINFO(r3, 0x84, 0x21, &(0x7f0000000140), &(0x7f0000000200)=0x4) bind$unix(r0, &(0x7f00000005c0)=@abs={0x1, 0x0, 0x4e23}, 0x6e) syz_clone(0x40000000, &(0x7f00000000c0), 0x0, 0x0, &(0x7f00000001c0), 0x0) 12:21:49 executing program 3: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_INITMSG(r0, 0x84, 0x2, &(0x7f0000000640)={0x0, 0x5}, 0x8) 12:21:49 executing program 2: open(&(0x7f0000000400)='./bus\x00', 0x14103e, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$L2TP_CMD_SESSION_MODIFY(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000080)={0x30, r1, 0x1, 0x0, 0x0, {}, [@L2TP_ATTR_SEND_SEQ={0x5, 0x13, 0x5}, @L2TP_ATTR_IFNAME={0x14, 0x8, 'veth1_to_hsr\x00'}]}, 0x30}}, 0x0) 12:21:49 executing program 4: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x82, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket(0x10, 0x803, 0x0) sendto(r0, &(0x7f00000000c0)="120000001200e7ef007b00000000000000a1", 0x12, 0x0, 0x0, 0x0) recvmmsg(r0, &(0x7f00000037c0)=[{{&(0x7f00000004c0)=@ethernet={0x0, @random}, 0x80, &(0x7f0000000380)=[{&(0x7f0000000040)=""/95, 0x5f}, {&(0x7f0000000140)=""/85, 0x55}, {&(0x7f0000000fc0)=""/4096, 0x1000}, {&(0x7f0000000400)=""/106, 0x6a}, {&(0x7f0000000740)=""/73, 0x49}, {&(0x7f0000000200)=""/77, 0x4d}, {0x0}], 0x7, &(0x7f0000000600)=""/191, 0xbf, 0x3b9aca00}}], 0x1, 0x0, &(0x7f0000003700)={0x77359400}) 12:21:49 executing program 1: syz_mount_image$ext4(&(0x7f0000000740)='ext4\x00', &(0x7f0000000100)='./bus\x00', 0x804810, &(0x7f0000000180)=ANY=[@ANYBLOB="0061021d307a961da7401271e3fa98008000001d3902ccfd562158cb15c016093893c9e4abd02bc4f1492514fa2dfebc8001000080000000008a1049ca0000"], 0x1, 0x73b, &(0x7f0000000780)="$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") chdir(&(0x7f0000000080)='./file0\x00') open(&(0x7f00000000c0)='./bus\x00', 0x14da42, 0x0) mount(&(0x7f0000000380)=@loop={'/dev/loop', 0x0}, &(0x7f00000003c0)='./bus\x00', 0x0, 0x1000, 0x0) r0 = open(&(0x7f0000000400)='./bus\x00', 0x0, 0x0) ioctl$LOOP_SET_STATUS(r0, 0x4c02, &(0x7f00000001c0)={0x0, {}, 0x0, {}, 0xff, 0x0, 0x0, 0x0, "be8176c9e6755a48a3c0230dd390efe12f8306bed95b2afd402aae879978d959ff9009eec610d9108ea036456bb79e26ee42d0a34968c1fdbb33e8ad5860f632", "b948757aa008fae13adca739a9f126462ab528ea52e90ce2cf50a4ef2568375b"}) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='blkio.throttle.io_service_bytes\x00', 0x275a, 0xf6ffffff) [ 1017.587709][ T4491] loop1: detected capacity change from 0 to 2048 [ 1017.640063][ T4491] EXT4-fs (loop1): mounted filesystem 00000000-0000-0000-0000-000000000000 without journal. Quota mode: none. [ 1017.710204][ T4491] ext4 filesystem being mounted at /root/syzkaller-testdir1539738704/syzkaller.ao1jj3/3798/bus supports timestamps until 2038 (0x7fffffff) 12:21:49 executing program 0: r0 = socket$unix(0x1, 0x2, 0x0) r1 = socket$can_bcm(0x1d, 0x2, 0x2) connect$can_bcm(r1, &(0x7f0000000000), 0x10) ioctl$sock_kcm_SIOCKCMUNATTACH(0xffffffffffffffff, 0x89e1, 0xffffffffffffffff) getsockopt$inet_sctp_SCTP_PEER_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1a, &(0x7f0000000380)={0x0, 0x80, "f29c5b753353d9c7798811e57823354f32d6cb0899a53381003e4f8dbbb1ea469076c8e175a20b45443f885afb38b83813d5e013d4fad662f1582b23328b4ed70ad9d7d4d0052d0147d8b0ac4910985bec8aa8956c599d291a7da55fec010801d8f02dcff373f52f59f867378c13f4a080938c965846a7e8229b410b3ea0f9ce"}, &(0x7f00000002c0)=0x88) socket$igmp6(0xa, 0x3, 0x2) perf_event_open(&(0x7f0000000500)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x15, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) close(0xffffffffffffffff) socket$inet_mptcp(0x2, 0x1, 0x106) connect$can_bcm(0xffffffffffffffff, 0x0, 0x0) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, 0x0) bind$unix(r0, &(0x7f00000005c0)=@abs={0x1, 0x0, 0x4e23}, 0x6e) syz_clone(0x40000000, &(0x7f00000000c0), 0x0, 0x0, &(0x7f00000001c0), 0x0) 12:21:49 executing program 2: open(&(0x7f0000000400)='./bus\x00', 0x14103e, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$L2TP_CMD_SESSION_MODIFY(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000080)={0x30, r1, 0x1, 0x0, 0x0, {}, [@L2TP_ATTR_SEND_SEQ={0x5, 0x13, 0x6}, @L2TP_ATTR_IFNAME={0x14, 0x8, 'veth1_to_hsr\x00'}]}, 0x30}}, 0x0) 12:21:49 executing program 3: r0 = mq_open(&(0x7f0000000080)=')}!)*]#\xf6\x00', 0x0, 0x0, 0x0) mq_timedsend(r0, 0x0, 0x0, 0x0, 0x0) 12:21:49 executing program 4: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x82, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket(0x10, 0x803, 0x0) sendto(r0, &(0x7f00000000c0)="120000001200e7ef007b00000000000000a1", 0x12, 0x0, 0x0, 0x0) recvmmsg(r0, &(0x7f00000037c0)=[{{&(0x7f00000004c0)=@ethernet={0x0, @random}, 0x80, &(0x7f0000000380)=[{&(0x7f0000000040)=""/95, 0x5f}, {&(0x7f0000000140)=""/85, 0x55}, {&(0x7f0000000fc0)=""/4096, 0x1000}, {&(0x7f0000000400)=""/106, 0x6a}, {&(0x7f0000000740)=""/73, 0x49}, {&(0x7f0000000200)=""/77, 0x4d}, {0x0}], 0x7, &(0x7f0000000600)=""/191, 0xbf, 0x40000000}}], 0x1, 0x0, &(0x7f0000003700)={0x77359400}) 12:21:49 executing program 1: syz_mount_image$ext4(&(0x7f0000000740)='ext4\x00', &(0x7f0000000100)='./bus\x00', 0x804810, &(0x7f0000000180)=ANY=[@ANYBLOB="0061021d307a961da7401271e3fa98008000001d3902ccfd562158cb15c016093893c9e4abd02bc4f1492514fa2dfebc8001000080000000008a1049ca0000"], 0x1, 0x73b, &(0x7f0000000780)="$eJzs3M9rHHUbAPBnptn+zPtuXngP6kGEFloonSTNpT0ZL94KhYLXGpJJCJlkQ3ZTm1iw9SzU5qIgiN49ehVK/QO8SUHBuyBa40G8rMxmk9q4u922Sbeknw9M5/nOj32epzv5ZgcyG8BL643ynyRiOCIuR0S1vT2NiMOt6GjEza3jNh/cmC6XJJrNK78m5Wmx2azuvFbSXp+I1inxSkTcq0Sc/fDfeetr6wtTRZGvtMejjcXl0fra+rn5xam5fC5fGp+4OHZhYuLC2MSe9XrqnYvH7nz39sbG9183br8+dC6JyVbf0e5tzxL9w9b/SSUmd21f2o9kA5QMugAAAPpSfs4/FBFDrU+p1TjUigAAAICDpHmkCQAAABx4SQy6AgAAAGB/bf8dwPazvfv1HGw3v7wVESOd8g+1niGOOBqViDi+mTzyZEKydRo8k5u3IuLuZIfrL2lff09vbNfYM9Ivnrvl/DPZaf5Jd+af6DD/DG1/d8Iz6j7/Pcx/qMv8d7nPHN98/mqla/5bEa8Ndcqf7ORPuuR/t8/8tzc+utNtX/PLiNMdf/8kj+Tq8f0Qo7PzRc8frXt/nbnfq//j3fInvftf7rP/9zd/X+g2l5T5z5zs/f53yl9eEx+360gj4k57XY43duU4ufjDt736n+nS/+Pe/y/67P+nr45c7/NQAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAaEkjYjiSNNuJ0zTLIk5ExP/jeFrU6o2zs7XVpZlyX8RIVNLZ+SIfi4jq1jgpx+Ot+OH4/K7xRET878djW0nnizybrhUzg24eAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAACAHSciYjiSNIuINCL+qKZplg26KgAAAGDPjQy6AAAAAGDfuf8HAACAg+9p7/+TPa4DAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAONAuX7pULs3NBzemy/HMtbXVhdq1czN5fSFbXJ3Opmsry9lcrTZX5Nl0bfFxr1fUasvjF2P1+mgjrzdG62vrVxdrq0uNq/OLU3P51bzyXLoCAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAADgSQ23liTNIiJtxWmaZRH/iYiRqCSz80U+FhH/jYj71cqRcjw+6KIBAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAADYc/W19YWposhXBALBcws+iIgXoIwewaBnJgAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAABqG+tr4wVRT5Sn3QlQAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAADBY6c9JRJTL6eqp4d17Dyd/VlvriHjvsyufXJ9qNFbGy+2/7WxvfNrefn4Q9QMAAMBL4c0nOXj7Pn37Ph4AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAKBf9bX1hamiyFf2MRh0jwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAwNP5OwAA//9JjsXQ") chdir(&(0x7f0000000080)='./file0\x00') open(&(0x7f00000000c0)='./bus\x00', 0x14da42, 0x0) mount(&(0x7f0000000380)=@loop={'/dev/loop', 0x0}, &(0x7f00000003c0)='./bus\x00', 0x0, 0x1000, 0x0) r0 = open(&(0x7f0000000400)='./bus\x00', 0x0, 0x0) ioctl$LOOP_SET_STATUS(r0, 0x4c02, &(0x7f00000001c0)={0x0, {}, 0x0, {}, 0xff, 0x0, 0x0, 0x0, "be8176c9e6755a48a3c0230dd390efe12f8306bed95b2afd402aae879978d959ff9009eec610d9108ea036456bb79e26ee42d0a34968c1fdbb33e8ad5860f632", "b948757aa008fae13adca739a9f126462ab528ea52e90ce2cf50a4ef2568375b"}) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='blkio.throttle.io_service_bytes\x00', 0x275a, 0xfeffffff) 12:21:49 executing program 2: open(&(0x7f0000000400)='./bus\x00', 0x14103e, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$L2TP_CMD_SESSION_MODIFY(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000080)={0x30, r1, 0x1, 0x0, 0x0, {}, [@L2TP_ATTR_SEND_SEQ={0x5, 0x13, 0x7}, @L2TP_ATTR_IFNAME={0x14, 0x8, 'veth1_to_hsr\x00'}]}, 0x30}}, 0x0) 12:21:49 executing program 3: r0 = socket$can_bcm(0x1d, 0x2, 0x2) connect$can_bcm(r0, &(0x7f0000000780), 0x10) [ 1017.817873][ T4491] loop1: detected capacity change from 2048 to 2047 [ 1017.854527][ T3128] EXT4-fs (loop1): unmounting filesystem 00000000-0000-0000-0000-000000000000. [ 1017.968694][ T4515] loop1: detected capacity change from 0 to 2048 [ 1017.994007][ T4515] EXT4-fs (loop1): mounted filesystem 00000000-0000-0000-0000-000000000000 without journal. Quota mode: none. [ 1018.054521][ T4515] ext4 filesystem being mounted at /root/syzkaller-testdir1539738704/syzkaller.ao1jj3/3799/bus supports timestamps until 2038 (0x7fffffff) [ 1018.166467][ T4515] loop1: detected capacity change from 2048 to 2047 [ 1018.197930][ T3128] EXT4-fs (loop1): unmounting filesystem 00000000-0000-0000-0000-000000000000. 12:21:50 executing program 5: r0 = socket$unix(0x1, 0x2, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f0000000100)={'vcan0\x00', 0x0}) r2 = socket$can_bcm(0x1d, 0x2, 0x2) connect$can_bcm(r2, &(0x7f0000000000), 0x10) ioctl$sock_kcm_SIOCKCMUNATTACH(0xffffffffffffffff, 0x89e1, 0xffffffffffffffff) ioctl$sock_SIOCSPGRP(0xffffffffffffffff, 0x8902, 0x0) sendmsg$can_bcm(r2, &(0x7f0000000480)={&(0x7f0000000340)={0x1d, r1, 0x3f420f00}, 0x10, &(0x7f0000000040)={&(0x7f0000000580)=ANY=[@ANYBLOB="01000000d7fe68ca0000e9ffffff", @ANYRES64=0x0, @ANYRES64=0x0, @ANYRES64=0x0, @ANYRES64=r0, @ANYBLOB="3bf81bb9f1"], 0x20000600}}, 0x0) r3 = socket(0x23, 0x800, 0x40000) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r3, 0x541b, &(0x7f00000000c0)={'ip6_vti0\x00', 0x0}) sendmsg$IPCTNL_MSG_EXP_DELETE(r3, &(0x7f00000004c0)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x40000040}, 0xc, &(0x7f0000000440)={&(0x7f00000006c0)={0x1d0, 0x2, 0x2, 0x201, 0x0, 0x0, {0xa}, [@CTA_EXPECT_NAT={0xc0, 0xa, 0x0, 0x1, [@CTA_EXPECT_NAT_TUPLE={0xc, 0x2, 0x0, 0x1, [@CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x1}]}, @CTA_EXPECT_NAT_TUPLE={0x70, 0x2, 0x0, 0x1, [@CTA_TUPLE_IP={0x2c, 0x1, 0x0, 0x1, @ipv6={{0x14, 0x3, @loopback}, {0x14, 0x4, @private0}}}, @CTA_TUPLE_IP={0x14, 0x1, 0x0, 0x1, @ipv4={{0x8, 0x1, @empty}, {0x8, 0x2, @initdev={0xac, 0x1e, 0x1, 0x0}}}}, @CTA_TUPLE_IP={0x14, 0x1, 0x0, 0x1, @ipv4={{0x8, 0x1, @local}, {0x8, 0x2, @loopback}}}, @CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x4}, @CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x3}, @CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x1}]}, @CTA_EXPECT_NAT_TUPLE={0x38, 0x2, 0x0, 0x1, [@CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5, 0x1, 0x88}}, @CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x3}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5, 0x1, 0x21}}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5, 0x1, 0x1}}, @CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x3}]}, @CTA_EXPECT_NAT_DIR={0x8}]}, @CTA_EXPECT_MASTER={0x20, 0x1, 0x0, 0x1, [@CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x1}, @CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x2}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5, 0x1, 0x84}}]}, @CTA_EXPECT_MASTER={0xdc, 0x1, 0x0, 0x1, [@CTA_TUPLE_IP={0x14, 0x1, 0x0, 0x1, @ipv4={{0x8, 0x1, @multicast1}, {0x8, 0x2, @dev={0xac, 0x14, 0x14, 0x3a}}}}, @CTA_TUPLE_ZONE={0x6}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5, 0x1, 0x21}}, @CTA_TUPLE_IP={0x14, 0x1, 0x0, 0x1, @ipv4={{0x8, 0x1, @empty}, {0x8, 0x2, @local}}}, @CTA_TUPLE_IP={0x2c, 0x1, 0x0, 0x1, @ipv6={{0x14, 0x3, @private1={0xfc, 0x1, '\x00', 0x1}}, {0x14, 0x4, @rand_addr=' \x01\x00'}}}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5, 0x1, 0x1}}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5, 0x1, 0x88}}, @CTA_TUPLE_IP={0x2c, 0x1, 0x0, 0x1, @ipv6={{0x14, 0x3, @empty}, {0x14, 0x4, @dev={0xfe, 0x80, '\x00', 0x21}}}}, @CTA_TUPLE_IP={0x2c, 0x1, 0x0, 0x1, @ipv6={{0x14, 0x3, @local}, {0x14, 0x4, @ipv4={'\x00', '\xff\xff', @rand_addr=0x64010100}}}}]}]}, 0x1d0}}, 0x48000) perf_event_open(&(0x7f0000000500)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x15, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$binfmt_elf32(0xffffffffffffffff, &(0x7f0000000040)=ANY=[], 0x69) connect$can_bcm(0xffffffffffffffff, &(0x7f0000000000), 0x10) sendmsg$can_bcm(0xffffffffffffffff, &(0x7f0000000480)={&(0x7f0000000340)={0x1d, 0x0, 0x3f420f00}, 0x10, &(0x7f0000000040)={&(0x7f0000000580)=ANY=[@ANYBLOB="01000000d7fe68ca0000e9ffffff0000", @ANYRES64=0x0, @ANYRES64=0x0, @ANYRES64=0x0, @ANYRES64], 0x20000600}}, 0x0) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(0xffffffffffffffff, 0x89f0, &(0x7f0000000280)={'gretap0\x00', &(0x7f0000000240)={'ip_vti0\x00', 0x0, 0x7, 0x80, 0xfffffff7, 0x7, {{0x8, 0x4, 0x0, 0x5, 0x20, 0x67, 0x0, 0xc0, 0x29, 0x0, @local, @empty, {[@timestamp={0x44, 0xc, 0x8, 0x0, 0x2, [0x7f, 0x1]}]}}}}}) socket(0x10, 0x3, 0x0) process_mrelease(0xffffffffffffffff, 0x0) r4 = socket$packet(0x11, 0x2, 0x300) ioctl$sock_SIOCGIFINDEX(r4, 0x8933, 0x0) getsockopt$inet_sctp_SCTP_RECVNXTINFO(r3, 0x84, 0x21, &(0x7f0000000140), &(0x7f0000000200)=0x4) bind$unix(r0, &(0x7f00000005c0)=@abs={0x1, 0x0, 0x4e23}, 0x6e) syz_clone(0x40000000, &(0x7f00000000c0), 0x0, 0x0, &(0x7f00000001c0), 0x0) 12:21:50 executing program 2: open(&(0x7f0000000400)='./bus\x00', 0x14103e, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$L2TP_CMD_SESSION_MODIFY(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000080)={0x30, r1, 0x1, 0x0, 0x0, {}, [@L2TP_ATTR_SEND_SEQ={0x5, 0x13, 0x8}, @L2TP_ATTR_IFNAME={0x14, 0x8, 'veth1_to_hsr\x00'}]}, 0x30}}, 0x0) 12:21:50 executing program 3: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_RECVRCVINFO(r0, 0x84, 0x20, &(0x7f0000000000), 0x4) 12:21:50 executing program 1: syz_mount_image$ext4(&(0x7f0000000740)='ext4\x00', &(0x7f0000000100)='./bus\x00', 0x804810, &(0x7f0000000180)=ANY=[@ANYBLOB="0061021d307a961da7401271e3fa98008000001d3902ccfd562158cb15c016093893c9e4abd02bc4f1492514fa2dfebc8001000080000000008a1049ca0000"], 0x1, 0x73b, &(0x7f0000000780)="$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") chdir(&(0x7f0000000080)='./file0\x00') open(&(0x7f00000000c0)='./bus\x00', 0x14da42, 0x0) mount(&(0x7f0000000380)=@loop={'/dev/loop', 0x0}, &(0x7f00000003c0)='./bus\x00', 0x0, 0x1000, 0x0) r0 = open(&(0x7f0000000400)='./bus\x00', 0x0, 0x0) ioctl$LOOP_SET_STATUS(r0, 0x4c02, &(0x7f00000001c0)={0x0, {}, 0x0, {}, 0xff, 0x0, 0x0, 0x0, "be8176c9e6755a48a3c0230dd390efe12f8306bed95b2afd402aae879978d959ff9009eec610d9108ea036456bb79e26ee42d0a34968c1fdbb33e8ad5860f632", "b948757aa008fae13adca739a9f126462ab528ea52e90ce2cf50a4ef2568375b"}) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='blkio.throttle.io_service_bytes\x00', 0x275a, 0xff0f0000) 12:21:50 executing program 0: r0 = socket$unix(0x1, 0x2, 0x0) r1 = socket$can_bcm(0x1d, 0x2, 0x2) connect$can_bcm(r1, &(0x7f0000000000), 0x10) ioctl$sock_kcm_SIOCKCMUNATTACH(0xffffffffffffffff, 0x89e1, 0xffffffffffffffff) getsockopt$inet_sctp_SCTP_PEER_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1a, &(0x7f0000000380)={0x0, 0x80, "f29c5b753353d9c7798811e57823354f32d6cb0899a53381003e4f8dbbb1ea469076c8e175a20b45443f885afb38b83813d5e013d4fad662f1582b23328b4ed70ad9d7d4d0052d0147d8b0ac4910985bec8aa8956c599d291a7da55fec010801d8f02dcff373f52f59f867378c13f4a080938c965846a7e8229b410b3ea0f9ce"}, &(0x7f00000002c0)=0x88) socket$igmp6(0xa, 0x3, 0x2) perf_event_open(&(0x7f0000000500)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x15, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) close(0xffffffffffffffff) socket$inet_mptcp(0x2, 0x1, 0x106) connect$can_bcm(0xffffffffffffffff, 0x0, 0x0) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, 0x0) bind$unix(r0, &(0x7f00000005c0)=@abs={0x1, 0x0, 0x4e23}, 0x6e) syz_clone(0x40000000, &(0x7f00000000c0), 0x0, 0x0, &(0x7f00000001c0), 0x0) 12:21:50 executing program 4: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x82, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket(0x10, 0x803, 0x0) sendto(r0, &(0x7f00000000c0)="120000001200e7ef007b00000000000000a1", 0x12, 0x0, 0x0, 0x0) recvmmsg(r0, &(0x7f00000037c0)=[{{&(0x7f00000004c0)=@ethernet={0x0, @random}, 0x80, &(0x7f0000000380)=[{&(0x7f0000000040)=""/95, 0x5f}, {&(0x7f0000000140)=""/85, 0x55}, {&(0x7f0000000fc0)=""/4096, 0x1000}, {&(0x7f0000000400)=""/106, 0x6a}, {&(0x7f0000000740)=""/73, 0x49}, {&(0x7f0000000200)=""/77, 0x4d}, {0x0}], 0x7, &(0x7f0000000600)=""/191, 0xbf, 0x4cdeff7f}}], 0x1, 0x0, &(0x7f0000003700)={0x77359400}) 12:21:50 executing program 2: open(&(0x7f0000000400)='./bus\x00', 0x14103e, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$L2TP_CMD_SESSION_MODIFY(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000080)={0x30, r1, 0x1, 0x0, 0x0, {}, [@L2TP_ATTR_SEND_SEQ={0x5, 0x13, 0x9}, @L2TP_ATTR_IFNAME={0x14, 0x8, 'veth1_to_hsr\x00'}]}, 0x30}}, 0x0) 12:21:50 executing program 3: socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff}) setsockopt$TIPC_MCAST_BROADCAST(r0, 0x10f, 0x85) 12:21:50 executing program 4: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x82, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket(0x10, 0x803, 0x0) sendto(r0, &(0x7f00000000c0)="120000001200e7ef007b00000000000000a1", 0x12, 0x0, 0x0, 0x0) recvmmsg(r0, &(0x7f00000037c0)=[{{&(0x7f00000004c0)=@ethernet={0x0, @random}, 0x80, &(0x7f0000000380)=[{&(0x7f0000000040)=""/95, 0x5f}, {&(0x7f0000000140)=""/85, 0x55}, {&(0x7f0000000fc0)=""/4096, 0x1000}, {&(0x7f0000000400)=""/106, 0x6a}, {&(0x7f0000000740)=""/73, 0x49}, {&(0x7f0000000200)=""/77, 0x4d}, {0x0}], 0x7, &(0x7f0000000600)=""/191, 0xbf, 0x60000000}}], 0x1, 0x0, &(0x7f0000003700)={0x77359400}) 12:21:50 executing program 2: open(&(0x7f0000000400)='./bus\x00', 0x14103e, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$L2TP_CMD_SESSION_MODIFY(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000080)={0x30, r1, 0x1, 0x0, 0x0, {}, [@L2TP_ATTR_SEND_SEQ={0x5, 0x13, 0xf}, @L2TP_ATTR_IFNAME={0x14, 0x8, 'veth1_to_hsr\x00'}]}, 0x30}}, 0x0) [ 1018.572927][ T4525] loop1: detected capacity change from 0 to 2048 [ 1018.630703][ T4525] EXT4-fs (loop1): mounted filesystem 00000000-0000-0000-0000-000000000000 without journal. Quota mode: none. 12:21:50 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$IPVS_CMD_GET_CONFIG(r0, &(0x7f0000000200)={&(0x7f0000000000), 0xc, 0x0}, 0x0) 12:21:50 executing program 3: add_key(&(0x7f00000000c0)='asymmetric\x00', 0x0, 0x0, 0x0, 0xffffffffffffffff) [ 1018.678133][ T4525] ext4 filesystem being mounted at /root/syzkaller-testdir1539738704/syzkaller.ao1jj3/3800/bus supports timestamps until 2038 (0x7fffffff) [ 1018.769219][ T4525] loop1: detected capacity change from 2048 to 2047 [ 1018.801140][ T3128] EXT4-fs (loop1): unmounting filesystem 00000000-0000-0000-0000-000000000000. 12:21:50 executing program 5: r0 = socket$unix(0x1, 0x2, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f0000000100)={'vcan0\x00', 0x0}) r2 = socket$can_bcm(0x1d, 0x2, 0x2) connect$can_bcm(r2, &(0x7f0000000000), 0x10) ioctl$sock_kcm_SIOCKCMUNATTACH(0xffffffffffffffff, 0x89e1, 0xffffffffffffffff) ioctl$sock_SIOCSPGRP(0xffffffffffffffff, 0x8902, 0x0) sendmsg$can_bcm(r2, &(0x7f0000000480)={&(0x7f0000000340)={0x1d, r1, 0x3f420f00}, 0x10, &(0x7f0000000040)={&(0x7f0000000580)=ANY=[@ANYBLOB="01000000d7fe68ca0000e9ffffff", @ANYRES64=0x0, @ANYRES64=0x0, @ANYRES64=0x0, @ANYRES64=r0, @ANYBLOB="3bf81bb9f1"], 0x20000600}}, 0x0) r3 = socket(0x23, 0x800, 0x40000) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r3, 0x541b, &(0x7f00000000c0)={'ip6_vti0\x00', 0x0}) sendmsg$IPCTNL_MSG_EXP_DELETE(r3, &(0x7f00000004c0)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x40000040}, 0xc, &(0x7f0000000440)={&(0x7f00000006c0)={0x1d0, 0x2, 0x2, 0x201, 0x0, 0x0, {0xa}, [@CTA_EXPECT_NAT={0xc0, 0xa, 0x0, 0x1, [@CTA_EXPECT_NAT_TUPLE={0xc, 0x2, 0x0, 0x1, [@CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x1}]}, @CTA_EXPECT_NAT_TUPLE={0x70, 0x2, 0x0, 0x1, [@CTA_TUPLE_IP={0x2c, 0x1, 0x0, 0x1, @ipv6={{0x14, 0x3, @loopback}, {0x14, 0x4, @private0}}}, @CTA_TUPLE_IP={0x14, 0x1, 0x0, 0x1, @ipv4={{0x8, 0x1, @empty}, {0x8, 0x2, @initdev={0xac, 0x1e, 0x1, 0x0}}}}, @CTA_TUPLE_IP={0x14, 0x1, 0x0, 0x1, @ipv4={{0x8, 0x1, @local}, {0x8, 0x2, @loopback}}}, @CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x4}, @CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x3}, @CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x1}]}, @CTA_EXPECT_NAT_TUPLE={0x38, 0x2, 0x0, 0x1, [@CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5, 0x1, 0x88}}, @CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x3}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5, 0x1, 0x21}}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5, 0x1, 0x1}}, @CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x3}]}, @CTA_EXPECT_NAT_DIR={0x8}]}, @CTA_EXPECT_MASTER={0x20, 0x1, 0x0, 0x1, [@CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x1}, @CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x2}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5, 0x1, 0x84}}]}, @CTA_EXPECT_MASTER={0xdc, 0x1, 0x0, 0x1, [@CTA_TUPLE_IP={0x14, 0x1, 0x0, 0x1, @ipv4={{0x8, 0x1, @multicast1}, {0x8, 0x2, @dev={0xac, 0x14, 0x14, 0x3a}}}}, @CTA_TUPLE_ZONE={0x6}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5, 0x1, 0x21}}, @CTA_TUPLE_IP={0x14, 0x1, 0x0, 0x1, @ipv4={{0x8, 0x1, @empty}, {0x8, 0x2, @local}}}, @CTA_TUPLE_IP={0x2c, 0x1, 0x0, 0x1, @ipv6={{0x14, 0x3, @private1={0xfc, 0x1, '\x00', 0x1}}, {0x14, 0x4, @rand_addr=' \x01\x00'}}}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5, 0x1, 0x1}}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5, 0x1, 0x88}}, @CTA_TUPLE_IP={0x2c, 0x1, 0x0, 0x1, @ipv6={{0x14, 0x3, @empty}, {0x14, 0x4, @dev={0xfe, 0x80, '\x00', 0x21}}}}, @CTA_TUPLE_IP={0x2c, 0x1, 0x0, 0x1, @ipv6={{0x14, 0x3, @local}, {0x14, 0x4, @ipv4={'\x00', '\xff\xff', @rand_addr=0x64010100}}}}]}]}, 0x1d0}}, 0x48000) perf_event_open(&(0x7f0000000500)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x15, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$binfmt_elf32(0xffffffffffffffff, &(0x7f0000000040)=ANY=[], 0x69) connect$can_bcm(0xffffffffffffffff, &(0x7f0000000000), 0x10) sendmsg$can_bcm(0xffffffffffffffff, &(0x7f0000000480)={&(0x7f0000000340)={0x1d, 0x0, 0x3f420f00}, 0x10, &(0x7f0000000040)={&(0x7f0000000580)=ANY=[@ANYBLOB="01000000d7fe68ca0000e9ffffff0000", @ANYRES64=0x0, @ANYRES64=0x0, @ANYRES64=0x0, @ANYRES64], 0x20000600}}, 0x0) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(0xffffffffffffffff, 0x89f0, &(0x7f0000000280)={'gretap0\x00', &(0x7f0000000240)={'ip_vti0\x00', 0x0, 0x7, 0x80, 0xfffffff7, 0x7, {{0x8, 0x4, 0x0, 0x5, 0x20, 0x67, 0x0, 0xc0, 0x29, 0x0, @local, @empty, {[@timestamp={0x44, 0xc, 0x8, 0x0, 0x2, [0x7f, 0x1]}]}}}}}) socket(0x10, 0x3, 0x0) process_mrelease(0xffffffffffffffff, 0x0) r4 = socket$packet(0x11, 0x2, 0x300) ioctl$sock_SIOCGIFINDEX(r4, 0x8933, 0x0) getsockopt$inet_sctp_SCTP_RECVNXTINFO(r3, 0x84, 0x21, &(0x7f0000000140), &(0x7f0000000200)=0x4) bind$unix(r0, &(0x7f00000005c0)=@abs={0x1, 0x0, 0x4e23}, 0x6e) syz_clone(0x40000000, &(0x7f00000000c0), 0x0, 0x0, &(0x7f00000001c0), 0x0) 12:21:50 executing program 3: r0 = socket$igmp(0x2, 0x3, 0x2) getsockopt$MRT(r0, 0x0, 0xce, 0x0, 0xfffffffffffffffd) 12:21:50 executing program 2: open(&(0x7f0000000400)='./bus\x00', 0x14103e, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$L2TP_CMD_SESSION_MODIFY(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000080)={0x30, r1, 0x1, 0x0, 0x0, {}, [@L2TP_ATTR_SEND_SEQ={0x5, 0x13, 0x13}, @L2TP_ATTR_IFNAME={0x14, 0x8, 'veth1_to_hsr\x00'}]}, 0x30}}, 0x0) 12:21:50 executing program 4: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x82, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket(0x10, 0x803, 0x0) sendto(r0, &(0x7f00000000c0)="120000001200e7ef007b00000000000000a1", 0x12, 0x0, 0x0, 0x0) recvmmsg(r0, &(0x7f00000037c0)=[{{&(0x7f00000004c0)=@ethernet={0x0, @random}, 0x80, &(0x7f0000000380)=[{&(0x7f0000000040)=""/95, 0x5f}, {&(0x7f0000000140)=""/85, 0x55}, {&(0x7f0000000fc0)=""/4096, 0x1000}, {&(0x7f0000000400)=""/106, 0x6a}, {&(0x7f0000000740)=""/73, 0x49}, {&(0x7f0000000200)=""/77, 0x4d}, {0x0}], 0x7, &(0x7f0000000600)=""/191, 0xbf, 0x65580000}}], 0x1, 0x0, &(0x7f0000003700)={0x77359400}) 12:21:50 executing program 1: syz_mount_image$ext4(&(0x7f0000000740)='ext4\x00', &(0x7f0000000100)='./bus\x00', 0x804810, &(0x7f0000000180)=ANY=[@ANYBLOB="0061021d307a961da7401271e3fa98008000001d3902ccfd562158cb15c016093893c9e4abd02bc4f1492514fa2dfebc8001000080000000008a1049ca0000"], 0x1, 0x73b, &(0x7f0000000780)="$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") chdir(&(0x7f0000000080)='./file0\x00') open(&(0x7f00000000c0)='./bus\x00', 0x14da42, 0x0) mount(&(0x7f0000000380)=@loop={'/dev/loop', 0x0}, &(0x7f00000003c0)='./bus\x00', 0x0, 0x1000, 0x0) r0 = open(&(0x7f0000000400)='./bus\x00', 0x0, 0x0) ioctl$LOOP_SET_STATUS(r0, 0x4c02, &(0x7f00000001c0)={0x0, {}, 0x0, {}, 0xff, 0x0, 0x0, 0x0, "be8176c9e6755a48a3c0230dd390efe12f8306bed95b2afd402aae879978d959ff9009eec610d9108ea036456bb79e26ee42d0a34968c1fdbb33e8ad5860f632", "b948757aa008fae13adca739a9f126462ab528ea52e90ce2cf50a4ef2568375b"}) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='blkio.throttle.io_service_bytes\x00', 0x275a, 0xffefffff) [ 1019.195723][ T4554] loop1: detected capacity change from 0 to 2048 [ 1019.243190][ T4554] EXT4-fs (loop1): mounted filesystem 00000000-0000-0000-0000-000000000000 without journal. Quota mode: none. 12:21:50 executing program 0: socket$unix(0x1, 0x2, 0x0) r0 = socket$can_bcm(0x1d, 0x2, 0x2) connect$can_bcm(r0, &(0x7f0000000000), 0x10) ioctl$sock_kcm_SIOCKCMUNATTACH(0xffffffffffffffff, 0x89e1, 0xffffffffffffffff) getsockopt$inet_sctp_SCTP_PEER_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1a, &(0x7f0000000380)={0x0, 0x80, "f29c5b753353d9c7798811e57823354f32d6cb0899a53381003e4f8dbbb1ea469076c8e175a20b45443f885afb38b83813d5e013d4fad662f1582b23328b4ed70ad9d7d4d0052d0147d8b0ac4910985bec8aa8956c599d291a7da55fec010801d8f02dcff373f52f59f867378c13f4a080938c965846a7e8229b410b3ea0f9ce"}, &(0x7f00000002c0)=0x88) socket$igmp6(0xa, 0x3, 0x2) perf_event_open(&(0x7f0000000500)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x15, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) close(0xffffffffffffffff) socket$inet_mptcp(0x2, 0x1, 0x106) connect$can_bcm(0xffffffffffffffff, &(0x7f0000000000), 0x10) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, 0x0) bind$unix(0xffffffffffffffff, &(0x7f00000005c0)=@abs={0x1, 0x0, 0x4e23}, 0x6e) syz_clone(0x40000000, &(0x7f00000000c0), 0x0, 0x0, &(0x7f00000001c0), 0x0) 12:21:50 executing program 3: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) getsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, 0x0, &(0x7f0000000b80)) 12:21:50 executing program 2: open(&(0x7f0000000400)='./bus\x00', 0x14103e, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$L2TP_CMD_SESSION_MODIFY(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000080)={0x30, r1, 0x1, 0x0, 0x0, {}, [@L2TP_ATTR_SEND_SEQ={0x5, 0x13, 0x60}, @L2TP_ATTR_IFNAME={0x14, 0x8, 'veth1_to_hsr\x00'}]}, 0x30}}, 0x0) 12:21:50 executing program 4: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x82, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket(0x10, 0x803, 0x0) sendto(r0, &(0x7f00000000c0)="120000001200e7ef007b00000000000000a1", 0x12, 0x0, 0x0, 0x0) recvmmsg(r0, &(0x7f00000037c0)=[{{&(0x7f00000004c0)=@ethernet={0x0, @random}, 0x80, &(0x7f0000000380)=[{&(0x7f0000000040)=""/95, 0x5f}, {&(0x7f0000000140)=""/85, 0x55}, {&(0x7f0000000fc0)=""/4096, 0x1000}, {&(0x7f0000000400)=""/106, 0x6a}, {&(0x7f0000000740)=""/73, 0x49}, {&(0x7f0000000200)=""/77, 0x4d}, {0x0}], 0x7, &(0x7f0000000600)=""/191, 0xbf, 0x7fffde4c}}], 0x1, 0x0, &(0x7f0000003700)={0x77359400}) [ 1019.292057][ T4554] ext4 filesystem being mounted at /root/syzkaller-testdir1539738704/syzkaller.ao1jj3/3801/bus supports timestamps until 2038 (0x7fffffff) 12:21:50 executing program 3: r0 = socket$igmp(0x2, 0x3, 0x2) r1 = socket$igmp(0x2, 0x3, 0x2) setsockopt$MRT_DEL_VIF(r1, 0x0, 0xcb, &(0x7f0000000480)={0x0, 0x0, 0x0, 0x0, @vifc_lcl_ifindex, @loopback}, 0x10) ioctl$SIOCGETMIFCNT_IN6(r1, 0x89e0, &(0x7f0000000080)) setsockopt$MRT_DEL_VIF(r0, 0x0, 0xcb, &(0x7f0000000480)={0x0, 0x0, 0x0, 0x0, @vifc_lcl_ifindex, @loopback}, 0x10) socket$igmp(0x2, 0x3, 0x2) ioctl$USBDEVFS_BULK(0xffffffffffffffff, 0xc0185502, &(0x7f0000000040)={{{0xf, 0x1}}, 0x2a, 0xabd6, &(0x7f0000000000)="a231f2cf0bb83e5d84d6478a39c01e6d366e34014375160ea8890009bbd699fc15a94091154168893e51"}) 12:21:50 executing program 2: open(&(0x7f0000000400)='./bus\x00', 0x14103e, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$L2TP_CMD_SESSION_MODIFY(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000080)={0x30, r1, 0x1, 0x0, 0x0, {}, [@L2TP_ATTR_SEND_SEQ={0x5}, @L2TP_ATTR_IFNAME={0x4, 0x8, 'veth1_to_hsr\x00'}]}, 0x30}}, 0x0) 12:21:50 executing program 4: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x82, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket(0x10, 0x803, 0x0) sendto(r0, &(0x7f00000000c0)="120000001200e7ef007b00000000000000a1", 0x12, 0x0, 0x0, 0x0) recvmmsg(r0, &(0x7f00000037c0)=[{{&(0x7f00000004c0)=@ethernet={0x0, @random}, 0x80, &(0x7f0000000380)=[{&(0x7f0000000040)=""/95, 0x5f}, {&(0x7f0000000140)=""/85, 0x55}, {&(0x7f0000000fc0)=""/4096, 0x1000}, {&(0x7f0000000400)=""/106, 0x6a}, {&(0x7f0000000740)=""/73, 0x49}, {&(0x7f0000000200)=""/77, 0x4d}, {0x0}], 0x7, &(0x7f0000000600)=""/191, 0xbf, 0x81000000}}], 0x1, 0x0, &(0x7f0000003700)={0x77359400}) [ 1019.440643][ T4571] EXT4-fs error (device loop1): ext4_find_dest_de:2093: inode #2: block 16: comm syz-executor.1: bad entry in directory: rec_len is smaller than minimal - offset=108, inode=646161, rec_len=0, size=4096 fake=0 [ 1019.539652][ T3128] EXT4-fs (loop1): unmounting filesystem 00000000-0000-0000-0000-000000000000. 12:21:51 executing program 5: r0 = socket$unix(0x1, 0x2, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f0000000100)={'vcan0\x00', 0x0}) r2 = socket$can_bcm(0x1d, 0x2, 0x2) connect$can_bcm(r2, &(0x7f0000000000), 0x10) ioctl$sock_kcm_SIOCKCMUNATTACH(0xffffffffffffffff, 0x89e1, 0xffffffffffffffff) ioctl$sock_SIOCSPGRP(0xffffffffffffffff, 0x8902, 0x0) sendmsg$can_bcm(r2, &(0x7f0000000480)={&(0x7f0000000340)={0x1d, r1, 0x3f420f00}, 0x10, &(0x7f0000000040)={&(0x7f0000000580)=ANY=[@ANYBLOB="01000000d7fe68ca0000e9ffffff00", @ANYRES64=0x0, @ANYRES64=0x0, @ANYRES64=0x0, @ANYRES64=r0, @ANYBLOB="3bf81bb9f1"], 0x20000600}}, 0x0) r3 = socket(0x23, 0x800, 0x40000) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r3, 0x541b, &(0x7f00000000c0)={'ip6_vti0\x00', 0x0}) sendmsg$IPCTNL_MSG_EXP_DELETE(r3, &(0x7f00000004c0)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x40000040}, 0xc, &(0x7f0000000440)={&(0x7f00000006c0)={0x1d0, 0x2, 0x2, 0x201, 0x0, 0x0, {0xa}, [@CTA_EXPECT_NAT={0xc0, 0xa, 0x0, 0x1, [@CTA_EXPECT_NAT_TUPLE={0xc, 0x2, 0x0, 0x1, [@CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x1}]}, @CTA_EXPECT_NAT_TUPLE={0x70, 0x2, 0x0, 0x1, [@CTA_TUPLE_IP={0x2c, 0x1, 0x0, 0x1, @ipv6={{0x14, 0x3, @loopback}, {0x14, 0x4, @private0}}}, @CTA_TUPLE_IP={0x14, 0x1, 0x0, 0x1, @ipv4={{0x8, 0x1, @empty}, {0x8, 0x2, @initdev={0xac, 0x1e, 0x1, 0x0}}}}, @CTA_TUPLE_IP={0x14, 0x1, 0x0, 0x1, @ipv4={{0x8, 0x1, @local}, {0x8, 0x2, @loopback}}}, @CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x4}, @CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x3}, @CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x1}]}, @CTA_EXPECT_NAT_TUPLE={0x38, 0x2, 0x0, 0x1, [@CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5, 0x1, 0x88}}, @CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x3}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5, 0x1, 0x21}}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5, 0x1, 0x1}}, @CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x3}]}, @CTA_EXPECT_NAT_DIR={0x8}]}, @CTA_EXPECT_MASTER={0x20, 0x1, 0x0, 0x1, [@CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x1}, @CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x2}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5, 0x1, 0x84}}]}, @CTA_EXPECT_MASTER={0xdc, 0x1, 0x0, 0x1, [@CTA_TUPLE_IP={0x14, 0x1, 0x0, 0x1, @ipv4={{0x8, 0x1, @multicast1}, {0x8, 0x2, @dev={0xac, 0x14, 0x14, 0x3a}}}}, @CTA_TUPLE_ZONE={0x6}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5, 0x1, 0x21}}, @CTA_TUPLE_IP={0x14, 0x1, 0x0, 0x1, @ipv4={{0x8, 0x1, @empty}, {0x8, 0x2, @local}}}, @CTA_TUPLE_IP={0x2c, 0x1, 0x0, 0x1, @ipv6={{0x14, 0x3, @private1={0xfc, 0x1, '\x00', 0x1}}, {0x14, 0x4, @rand_addr=' \x01\x00'}}}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5, 0x1, 0x1}}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5, 0x1, 0x88}}, @CTA_TUPLE_IP={0x2c, 0x1, 0x0, 0x1, @ipv6={{0x14, 0x3, @empty}, {0x14, 0x4, @dev={0xfe, 0x80, '\x00', 0x21}}}}, @CTA_TUPLE_IP={0x2c, 0x1, 0x0, 0x1, @ipv6={{0x14, 0x3, @local}, {0x14, 0x4, @ipv4={'\x00', '\xff\xff', @rand_addr=0x64010100}}}}]}]}, 0x1d0}}, 0x48000) perf_event_open(&(0x7f0000000500)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x15, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$binfmt_elf32(0xffffffffffffffff, &(0x7f0000000040)=ANY=[], 0x69) connect$can_bcm(0xffffffffffffffff, &(0x7f0000000000), 0x10) sendmsg$can_bcm(0xffffffffffffffff, &(0x7f0000000480)={&(0x7f0000000340)={0x1d, 0x0, 0x3f420f00}, 0x10, &(0x7f0000000040)={&(0x7f0000000580)=ANY=[@ANYBLOB="01000000d7fe68ca0000e9ffffff0000", @ANYRES64=0x0, @ANYRES64=0x0, @ANYRES64=0x0, @ANYRES64], 0x20000600}}, 0x0) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(0xffffffffffffffff, 0x89f0, &(0x7f0000000280)={'gretap0\x00', &(0x7f0000000240)={'ip_vti0\x00', 0x0, 0x7, 0x80, 0xfffffff7, 0x7, {{0x8, 0x4, 0x0, 0x5, 0x20, 0x67, 0x0, 0xc0, 0x29, 0x0, @local, @empty, {[@timestamp={0x44, 0xc, 0x8, 0x0, 0x2, [0x7f, 0x1]}]}}}}}) socket(0x10, 0x3, 0x0) process_mrelease(0xffffffffffffffff, 0x0) r4 = socket$packet(0x11, 0x2, 0x300) ioctl$sock_SIOCGIFINDEX(r4, 0x8933, 0x0) getsockopt$inet_sctp_SCTP_RECVNXTINFO(r3, 0x84, 0x21, &(0x7f0000000140), &(0x7f0000000200)=0x4) bind$unix(r0, &(0x7f00000005c0)=@abs={0x1, 0x0, 0x4e23}, 0x6e) syz_clone(0x40000000, &(0x7f00000000c0), 0x0, 0x0, &(0x7f00000001c0), 0x0) 12:21:51 executing program 2: open(&(0x7f0000000400)='./bus\x00', 0x14103e, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$L2TP_CMD_SESSION_MODIFY(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000080)={0x30, r1, 0x1, 0x0, 0x0, {}, [@L2TP_ATTR_SEND_SEQ={0x5}, @L2TP_ATTR_IFNAME={0x5, 0x8, 'veth1_to_hsr\x00'}]}, 0x30}}, 0x0) 12:21:51 executing program 4: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x82, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket(0x10, 0x803, 0x0) sendto(r0, &(0x7f00000000c0)="120000001200e7ef007b00000000000000a1", 0x12, 0x0, 0x0, 0x0) recvmmsg(r0, &(0x7f00000037c0)=[{{&(0x7f00000004c0)=@ethernet={0x0, @random}, 0x80, &(0x7f0000000380)=[{&(0x7f0000000040)=""/95, 0x5f}, {&(0x7f0000000140)=""/85, 0x55}, {&(0x7f0000000fc0)=""/4096, 0x1000}, {&(0x7f0000000400)=""/106, 0x6a}, {&(0x7f0000000740)=""/73, 0x49}, {&(0x7f0000000200)=""/77, 0x4d}, {0x0}], 0x7, &(0x7f0000000600)=""/191, 0xbf, 0x88470000}}], 0x1, 0x0, &(0x7f0000003700)={0x77359400}) 12:21:51 executing program 3: r0 = socket$can_raw(0x1d, 0x3, 0x1) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r0, 0x8933, &(0x7f0000000600)) 12:21:51 executing program 1: syz_mount_image$ext4(&(0x7f0000000740)='ext4\x00', &(0x7f0000000100)='./bus\x00', 0x804810, &(0x7f0000000180)=ANY=[@ANYBLOB="0061021d307a961da7401271e3fa98008000001d3902ccfd562158cb15c016093893c9e4abd02bc4f1492514fa2dfebc8001000080000000008a1049ca0000"], 0x1, 0x73b, &(0x7f0000000780)="$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") chdir(&(0x7f0000000080)='./file0\x00') open(&(0x7f00000000c0)='./bus\x00', 0x14da42, 0x0) mount(&(0x7f0000000380)=@loop={'/dev/loop', 0x0}, &(0x7f00000003c0)='./bus\x00', 0x0, 0x1000, 0x0) r0 = open(&(0x7f0000000400)='./bus\x00', 0x0, 0x0) ioctl$LOOP_SET_STATUS(r0, 0x4c02, &(0x7f00000001c0)={0x0, {}, 0x0, {}, 0xff, 0x0, 0x0, 0x0, "be8176c9e6755a48a3c0230dd390efe12f8306bed95b2afd402aae879978d959ff9009eec610d9108ea036456bb79e26ee42d0a34968c1fdbb33e8ad5860f632", "b948757aa008fae13adca739a9f126462ab528ea52e90ce2cf50a4ef2568375b"}) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='blkio.throttle.io_service_bytes\x00', 0x275a, 0xffffefff) [ 1019.952250][ T4586] loop1: detected capacity change from 0 to 2048 12:21:51 executing program 0: socket$unix(0x1, 0x2, 0x0) r0 = socket$can_bcm(0x1d, 0x2, 0x2) connect$can_bcm(r0, &(0x7f0000000000), 0x10) ioctl$sock_kcm_SIOCKCMUNATTACH(0xffffffffffffffff, 0x89e1, 0xffffffffffffffff) getsockopt$inet_sctp_SCTP_PEER_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1a, &(0x7f0000000380)={0x0, 0x80, "f29c5b753353d9c7798811e57823354f32d6cb0899a53381003e4f8dbbb1ea469076c8e175a20b45443f885afb38b83813d5e013d4fad662f1582b23328b4ed70ad9d7d4d0052d0147d8b0ac4910985bec8aa8956c599d291a7da55fec010801d8f02dcff373f52f59f867378c13f4a080938c965846a7e8229b410b3ea0f9ce"}, &(0x7f00000002c0)=0x88) socket$igmp6(0xa, 0x3, 0x2) perf_event_open(&(0x7f0000000500)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x15, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) close(0xffffffffffffffff) socket$inet_mptcp(0x2, 0x1, 0x106) connect$can_bcm(0xffffffffffffffff, &(0x7f0000000000), 0x10) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, 0x0) bind$unix(0xffffffffffffffff, &(0x7f00000005c0)=@abs={0x1, 0x0, 0x4e23}, 0x6e) syz_clone(0x40000000, &(0x7f00000000c0), 0x0, 0x0, &(0x7f00000001c0), 0x0) 12:21:51 executing program 3: r0 = syz_open_dev$evdev(&(0x7f0000000040), 0x0, 0x103381) write$evdev(r0, &(0x7f0000000140)=[{}], 0x18) 12:21:51 executing program 2: open(&(0x7f0000000400)='./bus\x00', 0x14103e, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$L2TP_CMD_SESSION_MODIFY(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000080)={0x30, r1, 0x1, 0x0, 0x0, {}, [@L2TP_ATTR_SEND_SEQ={0x5}, @L2TP_ATTR_IFNAME={0x30, 0x8, 'veth1_to_hsr\x00'}]}, 0x30}}, 0x0) 12:21:51 executing program 4: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x82, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket(0x10, 0x803, 0x0) sendto(r0, &(0x7f00000000c0)="120000001200e7ef007b00000000000000a1", 0x12, 0x0, 0x0, 0x0) recvmmsg(r0, &(0x7f00000037c0)=[{{&(0x7f00000004c0)=@ethernet={0x0, @random}, 0x80, &(0x7f0000000380)=[{&(0x7f0000000040)=""/95, 0x5f}, {&(0x7f0000000140)=""/85, 0x55}, {&(0x7f0000000fc0)=""/4096, 0x1000}, {&(0x7f0000000400)=""/106, 0x6a}, {&(0x7f0000000740)=""/73, 0x49}, {&(0x7f0000000200)=""/77, 0x4d}, {0x0}], 0x7, &(0x7f0000000600)=""/191, 0xbf, 0x88480000}}], 0x1, 0x0, &(0x7f0000003700)={0x77359400}) [ 1020.032144][ T4586] EXT4-fs (loop1): mounted filesystem 00000000-0000-0000-0000-000000000000 without journal. Quota mode: none. [ 1020.064135][ T4586] ext4 filesystem being mounted at /root/syzkaller-testdir1539738704/syzkaller.ao1jj3/3802/bus supports timestamps until 2038 (0x7fffffff) 12:21:51 executing program 3: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000240), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000003c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000380)={0xffffffffffffffff}, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_SET_OPTION(r0, &(0x7f0000000600)={0xe, 0x18, 0xfa00, @id_tos={0x0, r1}}, 0x20) 12:21:51 executing program 4: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x82, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket(0x10, 0x803, 0x0) sendto(r0, &(0x7f00000000c0)="120000001200e7ef007b00000000000000a1", 0x12, 0x0, 0x0, 0x0) recvmmsg(r0, &(0x7f00000037c0)=[{{&(0x7f00000004c0)=@ethernet={0x0, @random}, 0x80, &(0x7f0000000380)=[{&(0x7f0000000040)=""/95, 0x5f}, {&(0x7f0000000140)=""/85, 0x55}, {&(0x7f0000000fc0)=""/4096, 0x1000}, {&(0x7f0000000400)=""/106, 0x6a}, {&(0x7f0000000740)=""/73, 0x49}, {&(0x7f0000000200)=""/77, 0x4d}, {0x0}], 0x7, &(0x7f0000000600)=""/191, 0xbf, 0x88a8ffff}}], 0x1, 0x0, &(0x7f0000003700)={0x77359400}) [ 1020.124610][ T4599] netlink: 20 bytes leftover after parsing attributes in process `syz-executor.2'. 12:21:51 executing program 3: r0 = openat$random(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$RNDADDENTROPY(r0, 0x40085203, &(0x7f0000000000)={0xfffffffd}) [ 1020.183386][ T4586] loop1: detected capacity change from 2048 to 2047 [ 1020.218539][ T3128] EXT4-fs (loop1): unmounting filesystem 00000000-0000-0000-0000-000000000000. 12:21:52 executing program 5: r0 = socket$unix(0x1, 0x2, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f0000000100)={'vcan0\x00', 0x0}) r2 = socket$can_bcm(0x1d, 0x2, 0x2) connect$can_bcm(r2, &(0x7f0000000000), 0x10) ioctl$sock_kcm_SIOCKCMUNATTACH(0xffffffffffffffff, 0x89e1, 0xffffffffffffffff) ioctl$sock_SIOCSPGRP(0xffffffffffffffff, 0x8902, 0x0) sendmsg$can_bcm(r2, &(0x7f0000000480)={&(0x7f0000000340)={0x1d, r1, 0x3f420f00}, 0x10, &(0x7f0000000040)={&(0x7f0000000580)=ANY=[@ANYBLOB="01000000d7fe68ca0000e9ffffff00", @ANYRES64=0x0, @ANYRES64=0x0, @ANYRES64=0x0, @ANYRES64=r0, @ANYBLOB="3bf81bb9f1"], 0x20000600}}, 0x0) r3 = socket(0x23, 0x800, 0x40000) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r3, 0x541b, &(0x7f00000000c0)={'ip6_vti0\x00', 0x0}) sendmsg$IPCTNL_MSG_EXP_DELETE(r3, &(0x7f00000004c0)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x40000040}, 0xc, &(0x7f0000000440)={&(0x7f00000006c0)={0x1d0, 0x2, 0x2, 0x201, 0x0, 0x0, {0xa}, [@CTA_EXPECT_NAT={0xc0, 0xa, 0x0, 0x1, [@CTA_EXPECT_NAT_TUPLE={0xc, 0x2, 0x0, 0x1, [@CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x1}]}, @CTA_EXPECT_NAT_TUPLE={0x70, 0x2, 0x0, 0x1, [@CTA_TUPLE_IP={0x2c, 0x1, 0x0, 0x1, @ipv6={{0x14, 0x3, @loopback}, {0x14, 0x4, @private0}}}, @CTA_TUPLE_IP={0x14, 0x1, 0x0, 0x1, @ipv4={{0x8, 0x1, @empty}, {0x8, 0x2, @initdev={0xac, 0x1e, 0x1, 0x0}}}}, @CTA_TUPLE_IP={0x14, 0x1, 0x0, 0x1, @ipv4={{0x8, 0x1, @local}, {0x8, 0x2, @loopback}}}, @CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x4}, @CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x3}, @CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x1}]}, @CTA_EXPECT_NAT_TUPLE={0x38, 0x2, 0x0, 0x1, [@CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5, 0x1, 0x88}}, @CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x3}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5, 0x1, 0x21}}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5, 0x1, 0x1}}, @CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x3}]}, @CTA_EXPECT_NAT_DIR={0x8}]}, @CTA_EXPECT_MASTER={0x20, 0x1, 0x0, 0x1, [@CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x1}, @CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x2}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5, 0x1, 0x84}}]}, @CTA_EXPECT_MASTER={0xdc, 0x1, 0x0, 0x1, [@CTA_TUPLE_IP={0x14, 0x1, 0x0, 0x1, @ipv4={{0x8, 0x1, @multicast1}, {0x8, 0x2, @dev={0xac, 0x14, 0x14, 0x3a}}}}, @CTA_TUPLE_ZONE={0x6}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5, 0x1, 0x21}}, @CTA_TUPLE_IP={0x14, 0x1, 0x0, 0x1, @ipv4={{0x8, 0x1, @empty}, {0x8, 0x2, @local}}}, @CTA_TUPLE_IP={0x2c, 0x1, 0x0, 0x1, @ipv6={{0x14, 0x3, @private1={0xfc, 0x1, '\x00', 0x1}}, {0x14, 0x4, @rand_addr=' \x01\x00'}}}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5, 0x1, 0x1}}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5, 0x1, 0x88}}, @CTA_TUPLE_IP={0x2c, 0x1, 0x0, 0x1, @ipv6={{0x14, 0x3, @empty}, {0x14, 0x4, @dev={0xfe, 0x80, '\x00', 0x21}}}}, @CTA_TUPLE_IP={0x2c, 0x1, 0x0, 0x1, @ipv6={{0x14, 0x3, @local}, {0x14, 0x4, @ipv4={'\x00', '\xff\xff', @rand_addr=0x64010100}}}}]}]}, 0x1d0}}, 0x48000) perf_event_open(&(0x7f0000000500)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x15, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$binfmt_elf32(0xffffffffffffffff, &(0x7f0000000040)=ANY=[], 0x69) connect$can_bcm(0xffffffffffffffff, &(0x7f0000000000), 0x10) sendmsg$can_bcm(0xffffffffffffffff, &(0x7f0000000480)={&(0x7f0000000340)={0x1d, 0x0, 0x3f420f00}, 0x10, &(0x7f0000000040)={&(0x7f0000000580)=ANY=[@ANYBLOB="01000000d7fe68ca0000e9ffffff0000", @ANYRES64=0x0, @ANYRES64=0x0, @ANYRES64=0x0, @ANYRES64], 0x20000600}}, 0x0) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(0xffffffffffffffff, 0x89f0, &(0x7f0000000280)={'gretap0\x00', &(0x7f0000000240)={'ip_vti0\x00', 0x0, 0x7, 0x80, 0xfffffff7, 0x7, {{0x8, 0x4, 0x0, 0x5, 0x20, 0x67, 0x0, 0xc0, 0x29, 0x0, @local, @empty, {[@timestamp={0x44, 0xc, 0x8, 0x0, 0x2, [0x7f, 0x1]}]}}}}}) socket(0x10, 0x3, 0x0) process_mrelease(0xffffffffffffffff, 0x0) r4 = socket$packet(0x11, 0x2, 0x300) ioctl$sock_SIOCGIFINDEX(r4, 0x8933, 0x0) getsockopt$inet_sctp_SCTP_RECVNXTINFO(r3, 0x84, 0x21, &(0x7f0000000140), &(0x7f0000000200)=0x4) bind$unix(r0, &(0x7f00000005c0)=@abs={0x1, 0x0, 0x4e23}, 0x6e) syz_clone(0x40000000, &(0x7f00000000c0), 0x0, 0x0, &(0x7f00000001c0), 0x0) 12:21:52 executing program 1: syz_mount_image$ext4(&(0x7f0000000740)='ext4\x00', &(0x7f0000000100)='./bus\x00', 0x804810, &(0x7f0000000180)=ANY=[@ANYBLOB="0061021d307a961da7401271e3fa98008000001d3902ccfd562158cb15c016093893c9e4abd02bc4f1492514fa2dfebc8001000080000000008a1049ca0000"], 0x1, 0x73b, &(0x7f0000000780)="$eJzs3M9rHHUbAPBnptn+zPtuXngP6kGEFloonSTNpT0ZL94KhYLXGpJJCJlkQ3ZTm1iw9SzU5qIgiN49ehVK/QO8SUHBuyBa40G8rMxmk9q4u922Sbeknw9M5/nOj32epzv5ZgcyG8BL643ynyRiOCIuR0S1vT2NiMOt6GjEza3jNh/cmC6XJJrNK78m5Wmx2azuvFbSXp+I1inxSkTcq0Sc/fDfeetr6wtTRZGvtMejjcXl0fra+rn5xam5fC5fGp+4OHZhYuLC2MSe9XrqnYvH7nz39sbG9183br8+dC6JyVbf0e5tzxL9w9b/SSUmd21f2o9kA5QMugAAAPpSfs4/FBFDrU+p1TjUigAAAICDpHmkCQAAABx4SQy6AgAAAGB/bf8dwPazvfv1HGw3v7wVESOd8g+1niGOOBqViDi+mTzyZEKydRo8k5u3IuLuZIfrL2lff09vbNfYM9Ivnrvl/DPZaf5Jd+af6DD/DG1/d8Iz6j7/Pcx/qMv8d7nPHN98/mqla/5bEa8Ndcqf7ORPuuR/t8/8tzc+utNtX/PLiNMdf/8kj+Tq8f0Qo7PzRc8frXt/nbnfq//j3fInvftf7rP/9zd/X+g2l5T5z5zs/f53yl9eEx+360gj4k57XY43duU4ufjDt736n+nS/+Pe/y/67P+nr45c7/NQAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAaEkjYjiSNNuJ0zTLIk5ExP/jeFrU6o2zs7XVpZlyX8RIVNLZ+SIfi4jq1jgpx+Ot+OH4/K7xRET878djW0nnizybrhUzg24eAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAACAHSciYjiSNIuINCL+qKZplg26KgAAAGDPjQy6AAAAAGDfuf8HAACAg+9p7/+TPa4DAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAONAuX7pULs3NBzemy/HMtbXVhdq1czN5fSFbXJ3Opmsry9lcrTZX5Nl0bfFxr1fUasvjF2P1+mgjrzdG62vrVxdrq0uNq/OLU3P51bzyXLoCAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAADgSQ23liTNIiJtxWmaZRH/iYiRqCSz80U+FhH/jYj71cqRcjw+6KIBAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAADYc/W19YWposhXBALBcws+iIgXoIwewaBnJgAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAABqG+tr4wVRT5Sn3QlQAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAADBY6c9JRJTL6eqp4d17Dyd/VlvriHjvsyufXJ9qNFbGy+2/7WxvfNrefn4Q9QMAAMBL4c0nOXj7Pn37Ph4AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAKBf9bX1hamiyFf2MRh0jwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAwNP5OwAA//9JjsXQ") chdir(&(0x7f0000000080)='./file0\x00') open(&(0x7f00000000c0)='./bus\x00', 0x14da42, 0x0) mount(&(0x7f0000000380)=@loop={'/dev/loop', 0x0}, &(0x7f00000003c0)='./bus\x00', 0x0, 0x1000, 0x0) r0 = open(&(0x7f0000000400)='./bus\x00', 0x0, 0x0) ioctl$LOOP_SET_STATUS(r0, 0x4c02, &(0x7f00000001c0)={0x0, {}, 0x0, {}, 0xff, 0x0, 0x0, 0x0, "be8176c9e6755a48a3c0230dd390efe12f8306bed95b2afd402aae879978d959ff9009eec610d9108ea036456bb79e26ee42d0a34968c1fdbb33e8ad5860f632", "b948757aa008fae13adca739a9f126462ab528ea52e90ce2cf50a4ef2568375b"}) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='blkio.throttle.io_service_bytes\x00', 0x275a, 0xfffffff6) 12:21:52 executing program 2: open(&(0x7f0000000400)='./bus\x00', 0x14103e, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$L2TP_CMD_SESSION_MODIFY(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000080)={0x30, r1, 0x1, 0x0, 0x0, {}, [@L2TP_ATTR_SEND_SEQ={0x5}, @L2TP_ATTR_IFNAME={0x14, 0x23, 'veth1_to_hsr\x00'}]}, 0x30}}, 0x0) 12:21:52 executing program 4: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x82, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket(0x10, 0x803, 0x0) sendto(r0, &(0x7f00000000c0)="120000001200e7ef007b00000000000000a1", 0x12, 0x0, 0x0, 0x0) recvmmsg(r0, &(0x7f00000037c0)=[{{&(0x7f00000004c0)=@ethernet={0x0, @random}, 0x80, &(0x7f0000000380)=[{&(0x7f0000000040)=""/95, 0x5f}, {&(0x7f0000000140)=""/85, 0x55}, {&(0x7f0000000fc0)=""/4096, 0x1000}, {&(0x7f0000000400)=""/106, 0x6a}, {&(0x7f0000000740)=""/73, 0x49}, {&(0x7f0000000200)=""/77, 0x4d}, {0x0}], 0x7, &(0x7f0000000600)=""/191, 0xbf, 0xb4110000}}], 0x1, 0x0, &(0x7f0000003700)={0x77359400}) 12:21:52 executing program 3: r0 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f0000000180)={0x0, 0x2003}, 0x4) 12:21:52 executing program 0: socket$unix(0x1, 0x2, 0x0) r0 = socket$can_bcm(0x1d, 0x2, 0x2) connect$can_bcm(r0, &(0x7f0000000000), 0x10) ioctl$sock_kcm_SIOCKCMUNATTACH(0xffffffffffffffff, 0x89e1, 0xffffffffffffffff) getsockopt$inet_sctp_SCTP_PEER_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1a, &(0x7f0000000380)={0x0, 0x80, "f29c5b753353d9c7798811e57823354f32d6cb0899a53381003e4f8dbbb1ea469076c8e175a20b45443f885afb38b83813d5e013d4fad662f1582b23328b4ed70ad9d7d4d0052d0147d8b0ac4910985bec8aa8956c599d291a7da55fec010801d8f02dcff373f52f59f867378c13f4a080938c965846a7e8229b410b3ea0f9ce"}, &(0x7f00000002c0)=0x88) socket$igmp6(0xa, 0x3, 0x2) perf_event_open(&(0x7f0000000500)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x15, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) close(0xffffffffffffffff) socket$inet_mptcp(0x2, 0x1, 0x106) connect$can_bcm(0xffffffffffffffff, &(0x7f0000000000), 0x10) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, 0x0) bind$unix(0xffffffffffffffff, &(0x7f00000005c0)=@abs={0x1, 0x0, 0x4e23}, 0x6e) syz_clone(0x40000000, &(0x7f00000000c0), 0x0, 0x0, &(0x7f00000001c0), 0x0) 12:21:52 executing program 3: r0 = add_key$keyring(&(0x7f0000000240), &(0x7f0000000280)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffd) r1 = add_key$keyring(&(0x7f0000001100), &(0x7f0000001140)={'syz', 0x2}, 0x0, 0x0, r0) keyctl$restrict_keyring(0x1d, r1, &(0x7f0000001180)='logon\x00', &(0x7f00000011c0)=',#:#{*(*((\x00') 12:21:52 executing program 4: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x82, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket(0x10, 0x803, 0x0) sendto(r0, &(0x7f00000000c0)="120000001200e7ef007b00000000000000a1", 0x12, 0x0, 0x0, 0x0) recvmmsg(r0, &(0x7f00000037c0)=[{{&(0x7f00000004c0)=@ethernet={0x0, @random}, 0x80, &(0x7f0000000380)=[{&(0x7f0000000040)=""/95, 0x5f}, {&(0x7f0000000140)=""/85, 0x55}, {&(0x7f0000000fc0)=""/4096, 0x1000}, {&(0x7f0000000400)=""/106, 0x6a}, {&(0x7f0000000740)=""/73, 0x49}, {&(0x7f0000000200)=""/77, 0x4d}, {0x0}], 0x7, &(0x7f0000000600)=""/191, 0xbf, 0xc3ffffff}}], 0x1, 0x0, &(0x7f0000003700)={0x77359400}) 12:21:52 executing program 2: open(&(0x7f0000000400)='./bus\x00', 0x14103e, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$L2TP_CMD_SESSION_MODIFY(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000080)={0x30, r1, 0x1, 0x0, 0x0, {}, [@L2TP_ATTR_SEND_SEQ={0x5}, @L2TP_ATTR_IFNAME={0x14, 0x8, 'veth1_to_hsr\x00'}]}, 0xf}}, 0x0) [ 1020.842604][ T4613] loop1: detected capacity change from 0 to 2048 12:21:52 executing program 3: getpid() syz_clone(0x18120080, &(0x7f0000000040), 0x0, 0x0, 0x0, 0x0) 12:21:52 executing program 2: open(&(0x7f0000000400)='./bus\x00', 0x14103e, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$L2TP_CMD_SESSION_MODIFY(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000080)={0x30, r1, 0x1, 0x0, 0x0, {}, [@L2TP_ATTR_SEND_SEQ={0x5}, @L2TP_ATTR_IFNAME={0x14, 0x8, 'veth1_to_hsr\x00'}]}, 0x10}}, 0x0) 12:21:52 executing program 4: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x82, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket(0x10, 0x803, 0x0) sendto(r0, &(0x7f00000000c0)="120000001200e7ef007b00000000000000a1", 0x12, 0x0, 0x0, 0x0) recvmmsg(r0, &(0x7f00000037c0)=[{{&(0x7f00000004c0)=@ethernet={0x0, @random}, 0x80, &(0x7f0000000380)=[{&(0x7f0000000040)=""/95, 0x5f}, {&(0x7f0000000140)=""/85, 0x55}, {&(0x7f0000000fc0)=""/4096, 0x1000}, {&(0x7f0000000400)=""/106, 0x6a}, {&(0x7f0000000740)=""/73, 0x49}, {&(0x7f0000000200)=""/77, 0x4d}, {0x0}], 0x7, &(0x7f0000000600)=""/191, 0xbf, 0xffffa888}}], 0x1, 0x0, &(0x7f0000003700)={0x77359400}) [ 1020.917315][ T4613] EXT4-fs (loop1): mounted filesystem 00000000-0000-0000-0000-000000000000 without journal. Quota mode: none. [ 1020.933755][ T4613] ext4 filesystem being mounted at /root/syzkaller-testdir1539738704/syzkaller.ao1jj3/3803/bus supports timestamps until 2038 (0x7fffffff) [ 1021.002054][ T4613] loop1: detected capacity change from 2048 to 2047 [ 1021.079097][ T3128] EXT4-fs (loop1): unmounting filesystem 00000000-0000-0000-0000-000000000000. 12:21:54 executing program 5: r0 = socket$unix(0x1, 0x2, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f0000000100)={'vcan0\x00', 0x0}) r2 = socket$can_bcm(0x1d, 0x2, 0x2) connect$can_bcm(r2, &(0x7f0000000000), 0x10) ioctl$sock_kcm_SIOCKCMUNATTACH(0xffffffffffffffff, 0x89e1, 0xffffffffffffffff) ioctl$sock_SIOCSPGRP(0xffffffffffffffff, 0x8902, 0x0) sendmsg$can_bcm(r2, &(0x7f0000000480)={&(0x7f0000000340)={0x1d, r1, 0x3f420f00}, 0x10, &(0x7f0000000040)={&(0x7f0000000580)=ANY=[@ANYBLOB="01000000d7fe68ca0000e9ffffff00", @ANYRES64=0x0, @ANYRES64=0x0, @ANYRES64=0x0, @ANYRES64=r0, @ANYBLOB="3bf81bb9f1"], 0x20000600}}, 0x0) r3 = socket(0x23, 0x800, 0x40000) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r3, 0x541b, &(0x7f00000000c0)={'ip6_vti0\x00', 0x0}) sendmsg$IPCTNL_MSG_EXP_DELETE(r3, &(0x7f00000004c0)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x40000040}, 0xc, &(0x7f0000000440)={&(0x7f00000006c0)={0x1d0, 0x2, 0x2, 0x201, 0x0, 0x0, {0xa}, [@CTA_EXPECT_NAT={0xc0, 0xa, 0x0, 0x1, [@CTA_EXPECT_NAT_TUPLE={0xc, 0x2, 0x0, 0x1, [@CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x1}]}, @CTA_EXPECT_NAT_TUPLE={0x70, 0x2, 0x0, 0x1, [@CTA_TUPLE_IP={0x2c, 0x1, 0x0, 0x1, @ipv6={{0x14, 0x3, @loopback}, {0x14, 0x4, @private0}}}, @CTA_TUPLE_IP={0x14, 0x1, 0x0, 0x1, @ipv4={{0x8, 0x1, @empty}, {0x8, 0x2, @initdev={0xac, 0x1e, 0x1, 0x0}}}}, @CTA_TUPLE_IP={0x14, 0x1, 0x0, 0x1, @ipv4={{0x8, 0x1, @local}, {0x8, 0x2, @loopback}}}, @CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x4}, @CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x3}, @CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x1}]}, @CTA_EXPECT_NAT_TUPLE={0x38, 0x2, 0x0, 0x1, [@CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5, 0x1, 0x88}}, @CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x3}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5, 0x1, 0x21}}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5, 0x1, 0x1}}, @CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x3}]}, @CTA_EXPECT_NAT_DIR={0x8}]}, @CTA_EXPECT_MASTER={0x20, 0x1, 0x0, 0x1, [@CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x1}, @CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x2}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5, 0x1, 0x84}}]}, @CTA_EXPECT_MASTER={0xdc, 0x1, 0x0, 0x1, [@CTA_TUPLE_IP={0x14, 0x1, 0x0, 0x1, @ipv4={{0x8, 0x1, @multicast1}, {0x8, 0x2, @dev={0xac, 0x14, 0x14, 0x3a}}}}, @CTA_TUPLE_ZONE={0x6}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5, 0x1, 0x21}}, @CTA_TUPLE_IP={0x14, 0x1, 0x0, 0x1, @ipv4={{0x8, 0x1, @empty}, {0x8, 0x2, @local}}}, @CTA_TUPLE_IP={0x2c, 0x1, 0x0, 0x1, @ipv6={{0x14, 0x3, @private1={0xfc, 0x1, '\x00', 0x1}}, {0x14, 0x4, @rand_addr=' \x01\x00'}}}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5, 0x1, 0x1}}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5, 0x1, 0x88}}, @CTA_TUPLE_IP={0x2c, 0x1, 0x0, 0x1, @ipv6={{0x14, 0x3, @empty}, {0x14, 0x4, @dev={0xfe, 0x80, '\x00', 0x21}}}}, @CTA_TUPLE_IP={0x2c, 0x1, 0x0, 0x1, @ipv6={{0x14, 0x3, @local}, {0x14, 0x4, @ipv4={'\x00', '\xff\xff', @rand_addr=0x64010100}}}}]}]}, 0x1d0}}, 0x48000) perf_event_open(&(0x7f0000000500)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x15, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$binfmt_elf32(0xffffffffffffffff, &(0x7f0000000040)=ANY=[], 0x69) connect$can_bcm(0xffffffffffffffff, &(0x7f0000000000), 0x10) sendmsg$can_bcm(0xffffffffffffffff, &(0x7f0000000480)={&(0x7f0000000340)={0x1d, 0x0, 0x3f420f00}, 0x10, &(0x7f0000000040)={&(0x7f0000000580)=ANY=[@ANYBLOB="01000000d7fe68ca0000e9ffffff0000", @ANYRES64=0x0, @ANYRES64=0x0, @ANYRES64=0x0, @ANYRES64], 0x20000600}}, 0x0) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(0xffffffffffffffff, 0x89f0, &(0x7f0000000280)={'gretap0\x00', &(0x7f0000000240)={'ip_vti0\x00', 0x0, 0x7, 0x80, 0xfffffff7, 0x7, {{0x8, 0x4, 0x0, 0x5, 0x20, 0x67, 0x0, 0xc0, 0x29, 0x0, @local, @empty, {[@timestamp={0x44, 0xc, 0x8, 0x0, 0x2, [0x7f, 0x1]}]}}}}}) socket(0x10, 0x3, 0x0) process_mrelease(0xffffffffffffffff, 0x0) r4 = socket$packet(0x11, 0x2, 0x300) ioctl$sock_SIOCGIFINDEX(r4, 0x8933, 0x0) getsockopt$inet_sctp_SCTP_RECVNXTINFO(r3, 0x84, 0x21, &(0x7f0000000140), &(0x7f0000000200)=0x4) bind$unix(r0, &(0x7f00000005c0)=@abs={0x1, 0x0, 0x4e23}, 0x6e) syz_clone(0x40000000, &(0x7f00000000c0), 0x0, 0x0, &(0x7f00000001c0), 0x0) 12:21:54 executing program 3: socket(0x1d, 0x0, 0x200) 12:21:54 executing program 2: open(&(0x7f0000000400)='./bus\x00', 0x14103e, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$L2TP_CMD_SESSION_MODIFY(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000080)={0x30, r1, 0x1, 0x0, 0x0, {}, [@L2TP_ATTR_SEND_SEQ={0x5}, @L2TP_ATTR_IFNAME={0x14, 0x8, 'veth1_to_hsr\x00'}]}, 0x14}}, 0x0) 12:21:54 executing program 1: syz_mount_image$ext4(&(0x7f0000000740)='ext4\x00', &(0x7f0000000100)='./bus\x00', 0x804810, &(0x7f0000000180)=ANY=[@ANYBLOB="0061021d307a961da7401271e3fa98008000001d3902ccfd562158cb15c016093893c9e4abd02bc4f1492514fa2dfebc8001000080000000008a1049ca0000"], 0x1, 0x73b, &(0x7f0000000780)="$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") chdir(&(0x7f0000000080)='./file0\x00') open(&(0x7f00000000c0)='./bus\x00', 0x14da42, 0x0) mount(&(0x7f0000000380)=@loop={'/dev/loop', 0x0}, &(0x7f00000003c0)='./bus\x00', 0x0, 0x1000, 0x0) r0 = open(&(0x7f0000000400)='./bus\x00', 0x0, 0x0) ioctl$LOOP_SET_STATUS(r0, 0x4c02, &(0x7f00000001c0)={0x0, {}, 0x0, {}, 0xff, 0x0, 0x0, 0x0, "be8176c9e6755a48a3c0230dd390efe12f8306bed95b2afd402aae879978d959ff9009eec610d9108ea036456bb79e26ee42d0a34968c1fdbb33e8ad5860f632", "b948757aa008fae13adca739a9f126462ab528ea52e90ce2cf50a4ef2568375b"}) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='blkio.throttle.io_service_bytes\x00', 0x275a, 0xfffffffe) 12:21:54 executing program 4: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x82, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket(0x10, 0x803, 0x0) sendto(r0, &(0x7f00000000c0)="120000001200e7ef007b00000000000000a1", 0x12, 0x0, 0x0, 0x0) recvmmsg(r0, &(0x7f00000037c0)=[{{&(0x7f00000004c0)=@ethernet={0x0, @random}, 0x80, &(0x7f0000000380)=[{&(0x7f0000000040)=""/95, 0x5f}, {&(0x7f0000000140)=""/85, 0x55}, {&(0x7f0000000fc0)=""/4096, 0x1000}, {&(0x7f0000000400)=""/106, 0x6a}, {&(0x7f0000000740)=""/73, 0x49}, {&(0x7f0000000200)=""/77, 0x4d}, {0x0}], 0x7, &(0x7f0000000600)=""/191, 0xbf, 0xffffffc3}}], 0x1, 0x0, &(0x7f0000003700)={0x77359400}) 12:21:54 executing program 0: r0 = socket$unix(0x1, 0x2, 0x0) r1 = socket$can_bcm(0x1d, 0x2, 0x2) connect$can_bcm(r1, &(0x7f0000000000), 0x10) ioctl$sock_kcm_SIOCKCMUNATTACH(0xffffffffffffffff, 0x89e1, 0xffffffffffffffff) getsockopt$inet_sctp_SCTP_PEER_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1a, &(0x7f0000000380)={0x0, 0x80, "f29c5b753353d9c7798811e57823354f32d6cb0899a53381003e4f8dbbb1ea469076c8e175a20b45443f885afb38b83813d5e013d4fad662f1582b23328b4ed70ad9d7d4d0052d0147d8b0ac4910985bec8aa8956c599d291a7da55fec010801d8f02dcff373f52f59f867378c13f4a080938c965846a7e8229b410b3ea0f9ce"}, &(0x7f00000002c0)=0x88) socket$igmp6(0xa, 0x3, 0x2) perf_event_open(&(0x7f0000000500)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x15, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) close(0xffffffffffffffff) socket$inet_mptcp(0x2, 0x1, 0x106) connect$can_bcm(0xffffffffffffffff, &(0x7f0000000000), 0x10) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, 0x0) bind$unix(r0, 0x0, 0x0) syz_clone(0x40000000, &(0x7f00000000c0), 0x0, 0x0, &(0x7f00000001c0), 0x0) 12:21:54 executing program 3: r0 = add_key$keyring(&(0x7f0000000240), &(0x7f0000000280)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffd) r1 = add_key$keyring(&(0x7f0000001100), &(0x7f0000001140)={'syz', 0x2}, 0x0, 0x0, r0) add_key(&(0x7f0000000180)='ceph\x00', 0x0, 0x0, 0x0, r1) 12:21:54 executing program 2: open(&(0x7f0000000400)='./bus\x00', 0x14103e, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$L2TP_CMD_SESSION_MODIFY(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000080)={0x30, r1, 0x1, 0x0, 0x0, {}, [@L2TP_ATTR_SEND_SEQ={0x5}, @L2TP_ATTR_IFNAME={0x14, 0x8, 'veth1_to_hsr\x00'}]}, 0xc0}}, 0x0) 12:21:54 executing program 4: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x82, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket(0x10, 0x803, 0x0) sendto(r0, &(0x7f00000000c0)="120000001200e7ef007b00000000000000a1", 0x12, 0x0, 0x0, 0x0) recvmmsg(r0, &(0x7f00000037c0)=[{{&(0x7f00000004c0)=@ethernet={0x0, @random}, 0x80, &(0x7f0000000380)=[{&(0x7f0000000040)=""/95, 0x5f}, {&(0x7f0000000140)=""/85, 0x55}, {&(0x7f0000000fc0)=""/4096, 0x1000}, {&(0x7f0000000400)=""/106, 0x6a}, {&(0x7f0000000740)=""/73, 0x49}, {&(0x7f0000000200)=""/77, 0x4d}, {0x0}], 0x7, &(0x7f0000000600)=""/191, 0xbf}}], 0x1, 0x0, &(0x7f0000003700)={0x77359400}) 12:21:54 executing program 2: open(&(0x7f0000000400)='./bus\x00', 0x14103e, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$L2TP_CMD_SESSION_MODIFY(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000080)={0x30, r1, 0x1, 0x0, 0x0, {}, [@L2TP_ATTR_SEND_SEQ={0x5}, @L2TP_ATTR_IFNAME={0x14, 0x8, 'veth1_to_hsr\x00'}]}, 0xec0}}, 0x0) 12:21:54 executing program 3: pselect6(0x0, 0x0, 0x0, 0x0, &(0x7f0000000680), &(0x7f0000000700)={&(0x7f00000006c0)={[0x5]}, 0x8}) 12:21:54 executing program 4: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x82, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket(0x10, 0x803, 0x0) sendto(r0, &(0x7f00000000c0)="120000001200e7ef007b00000000000000a1", 0x12, 0x0, 0x0, 0x0) recvmmsg(r0, &(0x7f00000037c0)=[{{&(0x7f00000004c0)=@ethernet={0x0, @random}, 0x80, &(0x7f0000000380)=[{&(0x7f0000000040)=""/95, 0x5f}, {&(0x7f0000000140)=""/85, 0x55}, {&(0x7f0000000fc0)=""/4096, 0x1000}, {&(0x7f0000000400)=""/106, 0x6a}, {&(0x7f0000000740)=""/73, 0x49}, {&(0x7f0000000200)=""/77, 0x4d}, {0x0}], 0x7, &(0x7f0000000600)=""/191, 0xbf}, 0x2}], 0x1, 0x0, &(0x7f0000003700)={0x77359400}) [ 1022.696812][ T4650] loop1: detected capacity change from 0 to 2048 [ 1022.747626][ T4650] EXT4-fs (loop1): mounted filesystem 00000000-0000-0000-0000-000000000000 without journal. Quota mode: none. [ 1022.779647][ T4650] ext4 filesystem being mounted at /root/syzkaller-testdir1539738704/syzkaller.ao1jj3/3804/bus supports timestamps until 2038 (0x7fffffff) [ 1022.851904][ T4650] loop1: detected capacity change from 2048 to 2047 [ 1022.870903][ T3128] EXT4-fs (loop1): unmounting filesystem 00000000-0000-0000-0000-000000000000. 12:21:54 executing program 5: r0 = socket$unix(0x1, 0x2, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f0000000100)={'vcan0\x00', 0x0}) r2 = socket$can_bcm(0x1d, 0x2, 0x2) connect$can_bcm(r2, &(0x7f0000000000), 0x10) ioctl$sock_kcm_SIOCKCMUNATTACH(0xffffffffffffffff, 0x89e1, 0xffffffffffffffff) ioctl$sock_SIOCSPGRP(0xffffffffffffffff, 0x8902, 0x0) sendmsg$can_bcm(r2, &(0x7f0000000480)={&(0x7f0000000340)={0x1d, r1, 0x3f420f00}, 0x10, &(0x7f0000000040)={&(0x7f0000000580)=ANY=[@ANYBLOB="01000000d7fe68ca0000e9ffffff0000", @ANYRES64=0x0, @ANYRES64=0x0, @ANYRES64=0x0, @ANYRES64=r0, @ANYBLOB="3bf81bb9f1"], 0x20000600}}, 0x0) r3 = socket(0x0, 0x800, 0x40000) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r3, 0x541b, &(0x7f00000000c0)={'ip6_vti0\x00', 0x0}) sendmsg$IPCTNL_MSG_EXP_DELETE(r3, &(0x7f00000004c0)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x40000040}, 0xc, &(0x7f0000000440)={&(0x7f00000006c0)={0x1d0, 0x2, 0x2, 0x201, 0x0, 0x0, {0xa}, [@CTA_EXPECT_NAT={0xc0, 0xa, 0x0, 0x1, [@CTA_EXPECT_NAT_TUPLE={0xc, 0x2, 0x0, 0x1, [@CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x1}]}, @CTA_EXPECT_NAT_TUPLE={0x70, 0x2, 0x0, 0x1, [@CTA_TUPLE_IP={0x2c, 0x1, 0x0, 0x1, @ipv6={{0x14, 0x3, @loopback}, {0x14, 0x4, @private0}}}, @CTA_TUPLE_IP={0x14, 0x1, 0x0, 0x1, @ipv4={{0x8, 0x1, @empty}, {0x8, 0x2, @initdev={0xac, 0x1e, 0x1, 0x0}}}}, @CTA_TUPLE_IP={0x14, 0x1, 0x0, 0x1, @ipv4={{0x8, 0x1, @local}, {0x8, 0x2, @loopback}}}, @CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x4}, @CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x3}, @CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x1}]}, @CTA_EXPECT_NAT_TUPLE={0x38, 0x2, 0x0, 0x1, [@CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5, 0x1, 0x88}}, @CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x3}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5, 0x1, 0x21}}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5, 0x1, 0x1}}, @CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x3}]}, @CTA_EXPECT_NAT_DIR={0x8}]}, @CTA_EXPECT_MASTER={0x20, 0x1, 0x0, 0x1, [@CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x1}, @CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x2}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5, 0x1, 0x84}}]}, @CTA_EXPECT_MASTER={0xdc, 0x1, 0x0, 0x1, [@CTA_TUPLE_IP={0x14, 0x1, 0x0, 0x1, @ipv4={{0x8, 0x1, @multicast1}, {0x8, 0x2, @dev={0xac, 0x14, 0x14, 0x3a}}}}, @CTA_TUPLE_ZONE={0x6}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5, 0x1, 0x21}}, @CTA_TUPLE_IP={0x14, 0x1, 0x0, 0x1, @ipv4={{0x8, 0x1, @empty}, {0x8, 0x2, @local}}}, @CTA_TUPLE_IP={0x2c, 0x1, 0x0, 0x1, @ipv6={{0x14, 0x3, @private1={0xfc, 0x1, '\x00', 0x1}}, {0x14, 0x4, @rand_addr=' \x01\x00'}}}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5, 0x1, 0x1}}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5, 0x1, 0x88}}, @CTA_TUPLE_IP={0x2c, 0x1, 0x0, 0x1, @ipv6={{0x14, 0x3, @empty}, {0x14, 0x4, @dev={0xfe, 0x80, '\x00', 0x21}}}}, @CTA_TUPLE_IP={0x2c, 0x1, 0x0, 0x1, @ipv6={{0x14, 0x3, @local}, {0x14, 0x4, @ipv4={'\x00', '\xff\xff', @rand_addr=0x64010100}}}}]}]}, 0x1d0}}, 0x48000) perf_event_open(&(0x7f0000000500)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x15, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$binfmt_elf32(0xffffffffffffffff, &(0x7f0000000040)=ANY=[], 0x69) connect$can_bcm(0xffffffffffffffff, &(0x7f0000000000), 0x10) sendmsg$can_bcm(0xffffffffffffffff, &(0x7f0000000480)={&(0x7f0000000340)={0x1d, 0x0, 0x3f420f00}, 0x10, &(0x7f0000000040)={&(0x7f0000000580)=ANY=[@ANYBLOB="01000000d7fe68ca0000e9ffffff0000", @ANYRES64=0x0, @ANYRES64=0x0, @ANYRES64=0x0, @ANYRES64], 0x20000600}}, 0x0) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(0xffffffffffffffff, 0x89f0, &(0x7f0000000280)={'gretap0\x00', &(0x7f0000000240)={'ip_vti0\x00', 0x0, 0x7, 0x80, 0xfffffff7, 0x7, {{0x8, 0x4, 0x0, 0x5, 0x20, 0x67, 0x0, 0xc0, 0x29, 0x0, @local, @empty, {[@timestamp={0x44, 0xc, 0x8, 0x0, 0x2, [0x7f, 0x1]}]}}}}}) socket(0x10, 0x3, 0x0) process_mrelease(0xffffffffffffffff, 0x0) r4 = socket$packet(0x11, 0x2, 0x300) ioctl$sock_SIOCGIFINDEX(r4, 0x8933, 0x0) getsockopt$inet_sctp_SCTP_RECVNXTINFO(r3, 0x84, 0x21, &(0x7f0000000140), &(0x7f0000000200)=0x4) bind$unix(r0, &(0x7f00000005c0)=@abs={0x1, 0x0, 0x4e23}, 0x6e) syz_clone(0x40000000, &(0x7f00000000c0), 0x0, 0x0, &(0x7f00000001c0), 0x0) 12:21:54 executing program 2: open(&(0x7f0000000400)='./bus\x00', 0x14103e, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$L2TP_CMD_SESSION_MODIFY(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000080)={0x30, r1, 0x1, 0x0, 0x0, {}, [@L2TP_ATTR_SEND_SEQ={0x5}, @L2TP_ATTR_IFNAME={0x14, 0x8, 'veth1_to_hsr\x00'}]}, 0x33fe0}}, 0x0) 12:21:54 executing program 4: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x82, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket(0x10, 0x803, 0x0) sendto(r0, &(0x7f00000000c0)="120000001200e7ef007b00000000000000a1", 0x12, 0x0, 0x0, 0x0) recvmmsg(r0, &(0x7f00000037c0)=[{{&(0x7f00000004c0)=@ethernet={0x0, @random}, 0x80, &(0x7f0000000380)=[{&(0x7f0000000040)=""/95, 0x5f}, {&(0x7f0000000140)=""/85, 0x55}, {&(0x7f0000000fc0)=""/4096, 0x1000}, {&(0x7f0000000400)=""/106, 0x6a}, {&(0x7f0000000740)=""/73, 0x49}, {&(0x7f0000000200)=""/77, 0x4d}, {0x0}], 0x7, &(0x7f0000000600)=""/191, 0xbf}, 0x3}], 0x1, 0x0, &(0x7f0000003700)={0x77359400}) 12:21:54 executing program 3: semtimedop(0x0, &(0x7f0000000d80)=[{}, {0x0, 0x0, 0x1800}], 0x2, 0x0) 12:21:54 executing program 1: syz_mount_image$ext4(&(0x7f0000000740)='ext4\x00', &(0x7f0000000100)='./bus\x00', 0x804810, &(0x7f0000000180)=ANY=[@ANYBLOB="0061021d307a961da7401271e3fa98008000001d3902ccfd562158cb15c016093893c9e4abd02bc4f1492514fa2dfebc8001000080000000008a1049ca0000"], 0x1, 0x73b, &(0x7f0000000780)="$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") chdir(&(0x7f0000000080)='./file0\x00') open(&(0x7f00000000c0)='./bus\x00', 0x14da42, 0x0) mount(&(0x7f0000000380)=@loop={'/dev/loop', 0x0}, &(0x7f00000003c0)='./bus\x00', 0x0, 0x1000, 0x0) r0 = open(&(0x7f0000000400)='./bus\x00', 0x0, 0x0) ioctl$LOOP_SET_STATUS(r0, 0x4c02, &(0x7f00000001c0)={0x0, {}, 0x0, {}, 0xff, 0x0, 0x0, 0x0, "be8176c9e6755a48a3c0230dd390efe12f8306bed95b2afd402aae879978d959ff9009eec610d9108ea036456bb79e26ee42d0a34968c1fdbb33e8ad5860f632", "b948757aa008fae13adca739a9f126462ab528ea52e90ce2cf50a4ef2568375b"}) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='blkio.throttle.io_service_bytes\x00', 0x275a, 0x1000000000000) 12:21:54 executing program 0: r0 = socket$unix(0x1, 0x2, 0x0) r1 = socket$can_bcm(0x1d, 0x2, 0x2) connect$can_bcm(r1, &(0x7f0000000000), 0x10) ioctl$sock_kcm_SIOCKCMUNATTACH(0xffffffffffffffff, 0x89e1, 0xffffffffffffffff) getsockopt$inet_sctp_SCTP_PEER_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1a, &(0x7f0000000380)={0x0, 0x80, "f29c5b753353d9c7798811e57823354f32d6cb0899a53381003e4f8dbbb1ea469076c8e175a20b45443f885afb38b83813d5e013d4fad662f1582b23328b4ed70ad9d7d4d0052d0147d8b0ac4910985bec8aa8956c599d291a7da55fec010801d8f02dcff373f52f59f867378c13f4a080938c965846a7e8229b410b3ea0f9ce"}, &(0x7f00000002c0)=0x88) socket$igmp6(0xa, 0x3, 0x2) perf_event_open(&(0x7f0000000500)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x15, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) close(0xffffffffffffffff) socket$inet_mptcp(0x2, 0x1, 0x106) connect$can_bcm(0xffffffffffffffff, &(0x7f0000000000), 0x10) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, 0x0) bind$unix(r0, 0x0, 0x0) syz_clone(0x40000000, &(0x7f00000000c0), 0x0, 0x0, &(0x7f00000001c0), 0x0) 12:21:54 executing program 2: open(&(0x7f0000000400)='./bus\x00', 0x14103e, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$L2TP_CMD_SESSION_MODIFY(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000080)={0x30, r1, 0x1, 0x0, 0x0, {}, [@L2TP_ATTR_SEND_SEQ={0x5}, @L2TP_ATTR_IFNAME={0x14, 0x8, 'veth1_to_hsr\x00'}]}, 0x7ffff000}}, 0x0) 12:21:54 executing program 4: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x82, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket(0x10, 0x803, 0x0) sendto(r0, &(0x7f00000000c0)="120000001200e7ef007b00000000000000a1", 0x12, 0x0, 0x0, 0x0) recvmmsg(r0, &(0x7f00000037c0)=[{{&(0x7f00000004c0)=@ethernet={0x0, @random}, 0x80, &(0x7f0000000380)=[{&(0x7f0000000040)=""/95, 0x5f}, {&(0x7f0000000140)=""/85, 0x55}, {&(0x7f0000000fc0)=""/4096, 0x1000}, {&(0x7f0000000400)=""/106, 0x6a}, {&(0x7f0000000740)=""/73, 0x49}, {&(0x7f0000000200)=""/77, 0x4d}, {0x0}], 0x7, &(0x7f0000000600)=""/191, 0xbf}, 0x4}], 0x1, 0x0, &(0x7f0000003700)={0x77359400}) 12:21:54 executing program 2: open(&(0x7f0000000400)='./bus\x00', 0x14103e, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$L2TP_CMD_SESSION_MODIFY(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000080)={0x30, r1, 0x1, 0x0, 0x0, {}, [@L2TP_ATTR_SEND_SEQ={0x5}, @L2TP_ATTR_IFNAME={0x14, 0x8, 'veth1_to_hsr\x00'}]}, 0xfffffdef}}, 0x0) [ 1023.023766][ T4678] loop1: detected capacity change from 0 to 2048 12:21:54 executing program 4: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x82, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket(0x10, 0x803, 0x0) sendto(r0, &(0x7f00000000c0)="120000001200e7ef007b00000000000000a1", 0x12, 0x0, 0x0, 0x0) recvmmsg(r0, &(0x7f00000037c0)=[{{&(0x7f00000004c0)=@ethernet={0x0, @random}, 0x80, &(0x7f0000000380)=[{&(0x7f0000000040)=""/95, 0x5f}, {&(0x7f0000000140)=""/85, 0x55}, {&(0x7f0000000fc0)=""/4096, 0x1000}, {&(0x7f0000000400)=""/106, 0x6a}, {&(0x7f0000000740)=""/73, 0x49}, {&(0x7f0000000200)=""/77, 0x4d}, {0x0}], 0x7, &(0x7f0000000600)=""/191, 0xbf}, 0x5}], 0x1, 0x0, &(0x7f0000003700)={0x77359400}) [ 1023.082650][ T4678] EXT4-fs (loop1): mounted filesystem 00000000-0000-0000-0000-000000000000 without journal. Quota mode: none. 12:21:54 executing program 2: open(&(0x7f0000000400)='./bus\x00', 0x14103e, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$L2TP_CMD_SESSION_MODIFY(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000080)={0x30, r1, 0x1, 0x0, 0x0, {}, [@L2TP_ATTR_SEND_SEQ={0x5}, @L2TP_ATTR_IFNAME={0x14, 0x8, 'veth1_to_hsr\x00'}]}, 0x7ffffffff000}}, 0x0) 12:21:54 executing program 4: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x82, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket(0x10, 0x803, 0x0) sendto(r0, &(0x7f00000000c0)="120000001200e7ef007b00000000000000a1", 0x12, 0x0, 0x0, 0x0) recvmmsg(r0, &(0x7f00000037c0)=[{{&(0x7f00000004c0)=@ethernet={0x0, @random}, 0x80, &(0x7f0000000380)=[{&(0x7f0000000040)=""/95, 0x5f}, {&(0x7f0000000140)=""/85, 0x55}, {&(0x7f0000000fc0)=""/4096, 0x1000}, {&(0x7f0000000400)=""/106, 0x6a}, {&(0x7f0000000740)=""/73, 0x49}, {&(0x7f0000000200)=""/77, 0x4d}, {0x0}], 0x7, &(0x7f0000000600)=""/191, 0xbf}, 0x6}], 0x1, 0x0, &(0x7f0000003700)={0x77359400}) [ 1023.194867][ T4678] ext4 filesystem being mounted at /root/syzkaller-testdir1539738704/syzkaller.ao1jj3/3805/bus supports timestamps until 2038 (0x7fffffff) [ 1023.296448][ T4678] loop1: detected capacity change from 2048 to 2047 [ 1023.330626][ T3128] EXT4-fs (loop1): unmounting filesystem 00000000-0000-0000-0000-000000000000. 12:21:55 executing program 5: r0 = socket$unix(0x1, 0x2, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f0000000100)={'vcan0\x00', 0x0}) r2 = socket$can_bcm(0x1d, 0x2, 0x2) connect$can_bcm(r2, &(0x7f0000000000), 0x10) ioctl$sock_kcm_SIOCKCMUNATTACH(0xffffffffffffffff, 0x89e1, 0xffffffffffffffff) ioctl$sock_SIOCSPGRP(0xffffffffffffffff, 0x8902, 0x0) sendmsg$can_bcm(r2, &(0x7f0000000480)={&(0x7f0000000340)={0x1d, r1, 0x3f420f00}, 0x10, &(0x7f0000000040)={&(0x7f0000000580)=ANY=[@ANYBLOB="01000000d7fe68ca0000e9ffffff0000", @ANYRES64=0x0, @ANYRES64=0x0, @ANYRES64=0x0, @ANYRES64=r0, @ANYBLOB="3bf81bb9f1"], 0x20000600}}, 0x0) r3 = socket(0x0, 0x800, 0x40000) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r3, 0x541b, &(0x7f00000000c0)={'ip6_vti0\x00', 0x0}) sendmsg$IPCTNL_MSG_EXP_DELETE(r3, &(0x7f00000004c0)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x40000040}, 0xc, &(0x7f0000000440)={&(0x7f00000006c0)={0x1d0, 0x2, 0x2, 0x201, 0x0, 0x0, {0xa}, [@CTA_EXPECT_NAT={0xc0, 0xa, 0x0, 0x1, [@CTA_EXPECT_NAT_TUPLE={0xc, 0x2, 0x0, 0x1, [@CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x1}]}, @CTA_EXPECT_NAT_TUPLE={0x70, 0x2, 0x0, 0x1, [@CTA_TUPLE_IP={0x2c, 0x1, 0x0, 0x1, @ipv6={{0x14, 0x3, @loopback}, {0x14, 0x4, @private0}}}, @CTA_TUPLE_IP={0x14, 0x1, 0x0, 0x1, @ipv4={{0x8, 0x1, @empty}, {0x8, 0x2, @initdev={0xac, 0x1e, 0x1, 0x0}}}}, @CTA_TUPLE_IP={0x14, 0x1, 0x0, 0x1, @ipv4={{0x8, 0x1, @local}, {0x8, 0x2, @loopback}}}, @CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x4}, @CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x3}, @CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x1}]}, @CTA_EXPECT_NAT_TUPLE={0x38, 0x2, 0x0, 0x1, [@CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5, 0x1, 0x88}}, @CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x3}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5, 0x1, 0x21}}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5, 0x1, 0x1}}, @CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x3}]}, @CTA_EXPECT_NAT_DIR={0x8}]}, @CTA_EXPECT_MASTER={0x20, 0x1, 0x0, 0x1, [@CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x1}, @CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x2}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5, 0x1, 0x84}}]}, @CTA_EXPECT_MASTER={0xdc, 0x1, 0x0, 0x1, [@CTA_TUPLE_IP={0x14, 0x1, 0x0, 0x1, @ipv4={{0x8, 0x1, @multicast1}, {0x8, 0x2, @dev={0xac, 0x14, 0x14, 0x3a}}}}, @CTA_TUPLE_ZONE={0x6}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5, 0x1, 0x21}}, @CTA_TUPLE_IP={0x14, 0x1, 0x0, 0x1, @ipv4={{0x8, 0x1, @empty}, {0x8, 0x2, @local}}}, @CTA_TUPLE_IP={0x2c, 0x1, 0x0, 0x1, @ipv6={{0x14, 0x3, @private1={0xfc, 0x1, '\x00', 0x1}}, {0x14, 0x4, @rand_addr=' \x01\x00'}}}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5, 0x1, 0x1}}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5, 0x1, 0x88}}, @CTA_TUPLE_IP={0x2c, 0x1, 0x0, 0x1, @ipv6={{0x14, 0x3, @empty}, {0x14, 0x4, @dev={0xfe, 0x80, '\x00', 0x21}}}}, @CTA_TUPLE_IP={0x2c, 0x1, 0x0, 0x1, @ipv6={{0x14, 0x3, @local}, {0x14, 0x4, @ipv4={'\x00', '\xff\xff', @rand_addr=0x64010100}}}}]}]}, 0x1d0}}, 0x48000) perf_event_open(&(0x7f0000000500)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x15, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$binfmt_elf32(0xffffffffffffffff, &(0x7f0000000040)=ANY=[], 0x69) connect$can_bcm(0xffffffffffffffff, &(0x7f0000000000), 0x10) sendmsg$can_bcm(0xffffffffffffffff, &(0x7f0000000480)={&(0x7f0000000340)={0x1d, 0x0, 0x3f420f00}, 0x10, &(0x7f0000000040)={&(0x7f0000000580)=ANY=[@ANYBLOB="01000000d7fe68ca0000e9ffffff0000", @ANYRES64=0x0, @ANYRES64=0x0, @ANYRES64=0x0, @ANYRES64], 0x20000600}}, 0x0) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(0xffffffffffffffff, 0x89f0, &(0x7f0000000280)={'gretap0\x00', &(0x7f0000000240)={'ip_vti0\x00', 0x0, 0x7, 0x80, 0xfffffff7, 0x7, {{0x8, 0x4, 0x0, 0x5, 0x20, 0x67, 0x0, 0xc0, 0x29, 0x0, @local, @empty, {[@timestamp={0x44, 0xc, 0x8, 0x0, 0x2, [0x7f, 0x1]}]}}}}}) socket(0x10, 0x3, 0x0) process_mrelease(0xffffffffffffffff, 0x0) r4 = socket$packet(0x11, 0x2, 0x300) ioctl$sock_SIOCGIFINDEX(r4, 0x8933, 0x0) getsockopt$inet_sctp_SCTP_RECVNXTINFO(r3, 0x84, 0x21, &(0x7f0000000140), &(0x7f0000000200)=0x4) bind$unix(r0, &(0x7f00000005c0)=@abs={0x1, 0x0, 0x4e23}, 0x6e) syz_clone(0x40000000, &(0x7f00000000c0), 0x0, 0x0, &(0x7f00000001c0), 0x0) 12:21:55 executing program 2: open(&(0x7f0000000400)='./bus\x00', 0x14103e, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$L2TP_CMD_SESSION_MODIFY(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000080)={0x30, r1, 0x1, 0x0, 0x0, {}, [@L2TP_ATTR_SEND_SEQ={0x5}, @L2TP_ATTR_IFNAME={0x14, 0x8, 'veth1_to_hsr\x00'}]}, 0x30}, 0x2}, 0x0) 12:21:55 executing program 1: syz_mount_image$ext4(&(0x7f0000000740)='ext4\x00', &(0x7f0000000100)='./bus\x00', 0x804810, &(0x7f0000000180)=ANY=[@ANYBLOB="0061021d307a961da7401271e3fa98008000001d3902ccfd562158cb15c016093893c9e4abd02bc4f1492514fa2dfebc8001000080000000008a1049ca0000"], 0x1, 0x73b, &(0x7f0000000780)="$eJzs3M9rHHUbAPBnptn+zPtuXngP6kGEFloonSTNpT0ZL94KhYLXGpJJCJlkQ3ZTm1iw9SzU5qIgiN49ehVK/QO8SUHBuyBa40G8rMxmk9q4u922Sbeknw9M5/nOj32epzv5ZgcyG8BL643ynyRiOCIuR0S1vT2NiMOt6GjEza3jNh/cmC6XJJrNK78m5Wmx2azuvFbSXp+I1inxSkTcq0Sc/fDfeetr6wtTRZGvtMejjcXl0fra+rn5xam5fC5fGp+4OHZhYuLC2MSe9XrqnYvH7nz39sbG9183br8+dC6JyVbf0e5tzxL9w9b/SSUmd21f2o9kA5QMugAAAPpSfs4/FBFDrU+p1TjUigAAAICDpHmkCQAAABx4SQy6AgAAAGB/bf8dwPazvfv1HGw3v7wVESOd8g+1niGOOBqViDi+mTzyZEKydRo8k5u3IuLuZIfrL2lff09vbNfYM9Ivnrvl/DPZaf5Jd+af6DD/DG1/d8Iz6j7/Pcx/qMv8d7nPHN98/mqla/5bEa8Ndcqf7ORPuuR/t8/8tzc+utNtX/PLiNMdf/8kj+Tq8f0Qo7PzRc8frXt/nbnfq//j3fInvftf7rP/9zd/X+g2l5T5z5zs/f53yl9eEx+360gj4k57XY43duU4ufjDt736n+nS/+Pe/y/67P+nr45c7/NQAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAaEkjYjiSNNuJ0zTLIk5ExP/jeFrU6o2zs7XVpZlyX8RIVNLZ+SIfi4jq1jgpx+Ot+OH4/K7xRET878djW0nnizybrhUzg24eAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAACAHSciYjiSNIuINCL+qKZplg26KgAAAGDPjQy6AAAAAGDfuf8HAACAg+9p7/+TPa4DAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAONAuX7pULs3NBzemy/HMtbXVhdq1czN5fSFbXJ3Opmsry9lcrTZX5Nl0bfFxr1fUasvjF2P1+mgjrzdG62vrVxdrq0uNq/OLU3P51bzyXLoCAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAADgSQ23liTNIiJtxWmaZRH/iYiRqCSz80U+FhH/jYj71cqRcjw+6KIBAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAADYc/W19YWposhXBALBcws+iIgXoIwewaBnJgAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAABqG+tr4wVRT5Sn3QlQAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAADBY6c9JRJTL6eqp4d17Dyd/VlvriHjvsyufXJ9qNFbGy+2/7WxvfNrefn4Q9QMAAMBL4c0nOXj7Pn37Ph4AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAKBf9bX1hamiyFf2MRh0jwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAwNP5OwAA//9JjsXQ") chdir(&(0x7f0000000080)='./file0\x00') open(&(0x7f00000000c0)='./bus\x00', 0x14da42, 0x0) mount(&(0x7f0000000380)=@loop={'/dev/loop', 0x0}, &(0x7f00000003c0)='./bus\x00', 0x0, 0x1000, 0x0) r0 = open(&(0x7f0000000400)='./bus\x00', 0x0, 0x0) ioctl$LOOP_SET_STATUS(r0, 0x4c02, &(0x7f00000001c0)={0x0, {}, 0x0, {}, 0xff, 0x0, 0x0, 0x0, "be8176c9e6755a48a3c0230dd390efe12f8306bed95b2afd402aae879978d959ff9009eec610d9108ea036456bb79e26ee42d0a34968c1fdbb33e8ad5860f632", "b948757aa008fae13adca739a9f126462ab528ea52e90ce2cf50a4ef2568375b"}) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='blkio.throttle.io_service_bytes\x00', 0x275a, 0x10000000000000) 12:21:55 executing program 4: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x82, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket(0x10, 0x803, 0x0) sendto(r0, &(0x7f00000000c0)="120000001200e7ef007b00000000000000a1", 0x12, 0x0, 0x0, 0x0) recvmmsg(r0, &(0x7f00000037c0)=[{{&(0x7f00000004c0)=@ethernet={0x0, @random}, 0x80, &(0x7f0000000380)=[{&(0x7f0000000040)=""/95, 0x5f}, {&(0x7f0000000140)=""/85, 0x55}, {&(0x7f0000000fc0)=""/4096, 0x1000}, {&(0x7f0000000400)=""/106, 0x6a}, {&(0x7f0000000740)=""/73, 0x49}, {&(0x7f0000000200)=""/77, 0x4d}, {0x0}], 0x7, &(0x7f0000000600)=""/191, 0xbf}, 0x8}], 0x1, 0x0, &(0x7f0000003700)={0x77359400}) 12:21:55 executing program 3: openat$ipvs(0xffffffffffffff9c, 0x0, 0x2, 0x0) syz_genetlink_get_family_id$devlink(&(0x7f0000001f80), 0xffffffffffffffff) [ 1024.004517][ T4705] loop1: detected capacity change from 0 to 2048 [ 1024.029068][ T4705] EXT4-fs (loop1): mounted filesystem 00000000-0000-0000-0000-000000000000 without journal. Quota mode: none. [ 1024.068994][ T4705] ext4 filesystem being mounted at /root/syzkaller-testdir1539738704/syzkaller.ao1jj3/3806/bus supports timestamps until 2038 (0x7fffffff) [ 1024.152249][ T4705] loop1: detected capacity change from 2048 to 2047 [ 1024.189257][ T3128] EXT4-fs (loop1): unmounting filesystem 00000000-0000-0000-0000-000000000000. 12:21:56 executing program 2: open(&(0x7f0000000400)='./bus\x00', 0x14103e, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$L2TP_CMD_SESSION_MODIFY(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000080)={0x30, r1, 0x1, 0x0, 0x0, {}, [@L2TP_ATTR_SEND_SEQ={0x5}, @L2TP_ATTR_IFNAME={0x14, 0x8, 'veth1_to_hsr\x00'}]}, 0x30}, 0x3}, 0x0) 12:21:56 executing program 3: r0 = socket$igmp(0x2, 0x3, 0x2) setsockopt$MRT_DEL_VIF(r0, 0x0, 0xcb, &(0x7f0000000480)={0x0, 0x0, 0x0, 0x0, @vifc_lcl_ifindex, @loopback}, 0x10) setsockopt$MRT_ADD_VIF(r0, 0x0, 0xca, &(0x7f00000000c0)={0x0, 0x1, 0x56, 0x0, @vifc_lcl_addr=@initdev={0xac, 0x1e, 0x0, 0x0}, @local}, 0x10) 12:21:56 executing program 4: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x82, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket(0x10, 0x803, 0x0) sendto(r0, &(0x7f00000000c0)="120000001200e7ef007b00000000000000a1", 0x12, 0x0, 0x0, 0x0) recvmmsg(r0, &(0x7f00000037c0)=[{{&(0x7f00000004c0)=@ethernet={0x0, @random}, 0x80, &(0x7f0000000380)=[{&(0x7f0000000040)=""/95, 0x5f}, {&(0x7f0000000140)=""/85, 0x55}, {&(0x7f0000000fc0)=""/4096, 0x1000}, {&(0x7f0000000400)=""/106, 0x6a}, {&(0x7f0000000740)=""/73, 0x49}, {&(0x7f0000000200)=""/77, 0x4d}, {0x0}], 0x7, &(0x7f0000000600)=""/191, 0xbf}, 0x9}], 0x1, 0x0, &(0x7f0000003700)={0x77359400}) 12:21:56 executing program 1: syz_mount_image$ext4(&(0x7f0000000740)='ext4\x00', &(0x7f0000000100)='./bus\x00', 0x804810, &(0x7f0000000180)=ANY=[@ANYBLOB="0061021d307a961da7401271e3fa98008000001d3902ccfd562158cb15c016093893c9e4abd02bc4f1492514fa2dfebc8001000080000000008a1049ca0000"], 0x1, 0x73b, &(0x7f0000000780)="$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") chdir(&(0x7f0000000080)='./file0\x00') open(&(0x7f00000000c0)='./bus\x00', 0x14da42, 0x0) mount(&(0x7f0000000380)=@loop={'/dev/loop', 0x0}, &(0x7f00000003c0)='./bus\x00', 0x0, 0x1000, 0x0) r0 = open(&(0x7f0000000400)='./bus\x00', 0x0, 0x0) ioctl$LOOP_SET_STATUS(r0, 0x4c02, &(0x7f00000001c0)={0x0, {}, 0x0, {}, 0xff, 0x0, 0x0, 0x0, "be8176c9e6755a48a3c0230dd390efe12f8306bed95b2afd402aae879978d959ff9009eec610d9108ea036456bb79e26ee42d0a34968c1fdbb33e8ad5860f632", "b948757aa008fae13adca739a9f126462ab528ea52e90ce2cf50a4ef2568375b"}) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='blkio.throttle.io_service_bytes\x00', 0x275a, 0x20000000000000) 12:21:56 executing program 0: r0 = socket$unix(0x1, 0x2, 0x0) r1 = socket$can_bcm(0x1d, 0x2, 0x2) connect$can_bcm(r1, &(0x7f0000000000), 0x10) ioctl$sock_kcm_SIOCKCMUNATTACH(0xffffffffffffffff, 0x89e1, 0xffffffffffffffff) getsockopt$inet_sctp_SCTP_PEER_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1a, &(0x7f0000000380)={0x0, 0x80, "f29c5b753353d9c7798811e57823354f32d6cb0899a53381003e4f8dbbb1ea469076c8e175a20b45443f885afb38b83813d5e013d4fad662f1582b23328b4ed70ad9d7d4d0052d0147d8b0ac4910985bec8aa8956c599d291a7da55fec010801d8f02dcff373f52f59f867378c13f4a080938c965846a7e8229b410b3ea0f9ce"}, &(0x7f00000002c0)=0x88) socket$igmp6(0xa, 0x3, 0x2) perf_event_open(&(0x7f0000000500)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x15, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) close(0xffffffffffffffff) socket$inet_mptcp(0x2, 0x1, 0x106) connect$can_bcm(0xffffffffffffffff, &(0x7f0000000000), 0x10) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, 0x0) bind$unix(r0, 0x0, 0x0) syz_clone(0x40000000, &(0x7f00000000c0), 0x0, 0x0, &(0x7f00000001c0), 0x0) 12:21:56 executing program 5: r0 = socket$unix(0x1, 0x2, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f0000000100)={'vcan0\x00', 0x0}) r2 = socket$can_bcm(0x1d, 0x2, 0x2) connect$can_bcm(r2, &(0x7f0000000000), 0x10) ioctl$sock_kcm_SIOCKCMUNATTACH(0xffffffffffffffff, 0x89e1, 0xffffffffffffffff) ioctl$sock_SIOCSPGRP(0xffffffffffffffff, 0x8902, 0x0) sendmsg$can_bcm(r2, &(0x7f0000000480)={&(0x7f0000000340)={0x1d, r1, 0x3f420f00}, 0x10, &(0x7f0000000040)={&(0x7f0000000580)=ANY=[@ANYBLOB="01000000d7fe68ca0000e9ffffff0000", @ANYRES64=0x0, @ANYRES64=0x0, @ANYRES64=0x0, @ANYRES64=r0, @ANYBLOB="3bf81bb9f1"], 0x20000600}}, 0x0) r3 = socket(0x0, 0x0, 0x40000) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r3, 0x541b, &(0x7f00000000c0)={'ip6_vti0\x00', 0x0}) sendmsg$IPCTNL_MSG_EXP_DELETE(r3, &(0x7f00000004c0)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x40000040}, 0xc, &(0x7f0000000440)={&(0x7f00000006c0)={0x1d0, 0x2, 0x2, 0x201, 0x0, 0x0, {0xa}, [@CTA_EXPECT_NAT={0xc0, 0xa, 0x0, 0x1, [@CTA_EXPECT_NAT_TUPLE={0xc, 0x2, 0x0, 0x1, [@CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x1}]}, @CTA_EXPECT_NAT_TUPLE={0x70, 0x2, 0x0, 0x1, [@CTA_TUPLE_IP={0x2c, 0x1, 0x0, 0x1, @ipv6={{0x14, 0x3, @loopback}, {0x14, 0x4, @private0}}}, @CTA_TUPLE_IP={0x14, 0x1, 0x0, 0x1, @ipv4={{0x8, 0x1, @empty}, {0x8, 0x2, @initdev={0xac, 0x1e, 0x1, 0x0}}}}, @CTA_TUPLE_IP={0x14, 0x1, 0x0, 0x1, @ipv4={{0x8, 0x1, @local}, {0x8, 0x2, @loopback}}}, @CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x4}, @CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x3}, @CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x1}]}, @CTA_EXPECT_NAT_TUPLE={0x38, 0x2, 0x0, 0x1, [@CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5, 0x1, 0x88}}, @CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x3}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5, 0x1, 0x21}}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5, 0x1, 0x1}}, @CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x3}]}, @CTA_EXPECT_NAT_DIR={0x8}]}, @CTA_EXPECT_MASTER={0x20, 0x1, 0x0, 0x1, [@CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x1}, @CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x2}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5, 0x1, 0x84}}]}, @CTA_EXPECT_MASTER={0xdc, 0x1, 0x0, 0x1, [@CTA_TUPLE_IP={0x14, 0x1, 0x0, 0x1, @ipv4={{0x8, 0x1, @multicast1}, {0x8, 0x2, @dev={0xac, 0x14, 0x14, 0x3a}}}}, @CTA_TUPLE_ZONE={0x6}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5, 0x1, 0x21}}, @CTA_TUPLE_IP={0x14, 0x1, 0x0, 0x1, @ipv4={{0x8, 0x1, @empty}, {0x8, 0x2, @local}}}, @CTA_TUPLE_IP={0x2c, 0x1, 0x0, 0x1, @ipv6={{0x14, 0x3, @private1={0xfc, 0x1, '\x00', 0x1}}, {0x14, 0x4, @rand_addr=' \x01\x00'}}}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5, 0x1, 0x1}}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5, 0x1, 0x88}}, @CTA_TUPLE_IP={0x2c, 0x1, 0x0, 0x1, @ipv6={{0x14, 0x3, @empty}, {0x14, 0x4, @dev={0xfe, 0x80, '\x00', 0x21}}}}, @CTA_TUPLE_IP={0x2c, 0x1, 0x0, 0x1, @ipv6={{0x14, 0x3, @local}, {0x14, 0x4, @ipv4={'\x00', '\xff\xff', @rand_addr=0x64010100}}}}]}]}, 0x1d0}}, 0x48000) perf_event_open(&(0x7f0000000500)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x15, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$binfmt_elf32(0xffffffffffffffff, &(0x7f0000000040)=ANY=[], 0x69) connect$can_bcm(0xffffffffffffffff, &(0x7f0000000000), 0x10) sendmsg$can_bcm(0xffffffffffffffff, &(0x7f0000000480)={&(0x7f0000000340)={0x1d, 0x0, 0x3f420f00}, 0x10, &(0x7f0000000040)={&(0x7f0000000580)=ANY=[@ANYBLOB="01000000d7fe68ca0000e9ffffff0000", @ANYRES64=0x0, @ANYRES64=0x0, @ANYRES64=0x0, @ANYRES64], 0x20000600}}, 0x0) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(0xffffffffffffffff, 0x89f0, &(0x7f0000000280)={'gretap0\x00', &(0x7f0000000240)={'ip_vti0\x00', 0x0, 0x7, 0x80, 0xfffffff7, 0x7, {{0x8, 0x4, 0x0, 0x5, 0x20, 0x67, 0x0, 0xc0, 0x29, 0x0, @local, @empty, {[@timestamp={0x44, 0xc, 0x8, 0x0, 0x2, [0x7f, 0x1]}]}}}}}) socket(0x10, 0x3, 0x0) process_mrelease(0xffffffffffffffff, 0x0) r4 = socket$packet(0x11, 0x2, 0x300) ioctl$sock_SIOCGIFINDEX(r4, 0x8933, 0x0) getsockopt$inet_sctp_SCTP_RECVNXTINFO(r3, 0x84, 0x21, &(0x7f0000000140), &(0x7f0000000200)=0x4) bind$unix(r0, &(0x7f00000005c0)=@abs={0x1, 0x0, 0x4e23}, 0x6e) syz_clone(0x40000000, &(0x7f00000000c0), 0x0, 0x0, &(0x7f00000001c0), 0x0) 12:21:56 executing program 3: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$ieee802154(&(0x7f0000000180), r1) sendmsg$IEEE802154_SCAN_REQ(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000040)=ANY=[@ANYBLOB="1c000000", @ANYRES16=r2, @ANYBLOB="0100000000000000000009f7ffff040013"], 0x1c}}, 0x0) 12:21:56 executing program 2: open(&(0x7f0000000400)='./bus\x00', 0x14103e, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$L2TP_CMD_SESSION_MODIFY(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000080)={0x30, r1, 0x1, 0x0, 0x0, {}, [@L2TP_ATTR_SEND_SEQ={0x5}, @L2TP_ATTR_IFNAME={0x14, 0x8, 'veth1_to_hsr\x00'}]}, 0x30}, 0x5}, 0x0) 12:21:56 executing program 4: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x82, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket(0x10, 0x803, 0x0) sendto(r0, &(0x7f00000000c0)="120000001200e7ef007b00000000000000a1", 0x12, 0x0, 0x0, 0x0) recvmmsg(r0, &(0x7f00000037c0)=[{{&(0x7f00000004c0)=@ethernet={0x0, @random}, 0x80, &(0x7f0000000380)=[{&(0x7f0000000040)=""/95, 0x5f}, {&(0x7f0000000140)=""/85, 0x55}, {&(0x7f0000000fc0)=""/4096, 0x1000}, {&(0x7f0000000400)=""/106, 0x6a}, {&(0x7f0000000740)=""/73, 0x49}, {&(0x7f0000000200)=""/77, 0x4d}, {0x0}], 0x7, &(0x7f0000000600)=""/191, 0xbf}, 0xa}], 0x1, 0x0, &(0x7f0000003700)={0x77359400}) 12:21:56 executing program 2: open(&(0x7f0000000400)='./bus\x00', 0x14103e, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$L2TP_CMD_SESSION_MODIFY(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000080)={0x30, r1, 0x1, 0x0, 0x0, {}, [@L2TP_ATTR_SEND_SEQ={0x5}, @L2TP_ATTR_IFNAME={0x14, 0x8, 'veth1_to_hsr\x00'}]}, 0x30}, 0x6}, 0x0) 12:21:56 executing program 4: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x82, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket(0x10, 0x803, 0x0) sendto(r0, &(0x7f00000000c0)="120000001200e7ef007b00000000000000a1", 0x12, 0x0, 0x0, 0x0) recvmmsg(r0, &(0x7f00000037c0)=[{{&(0x7f00000004c0)=@ethernet={0x0, @random}, 0x80, &(0x7f0000000380)=[{&(0x7f0000000040)=""/95, 0x5f}, {&(0x7f0000000140)=""/85, 0x55}, {&(0x7f0000000fc0)=""/4096, 0x1000}, {&(0x7f0000000400)=""/106, 0x6a}, {&(0x7f0000000740)=""/73, 0x49}, {&(0x7f0000000200)=""/77, 0x4d}, {0x0}], 0x7, &(0x7f0000000600)=""/191, 0xbf}, 0xc}], 0x1, 0x0, &(0x7f0000003700)={0x77359400}) 12:21:56 executing program 3: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$ieee802154(&(0x7f0000000180), r1) sendmsg$IEEE802154_LLSEC_LIST_SECLEVEL(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000200)={0x14, r2, 0xb11}, 0x14}}, 0x0) [ 1025.242560][ T4722] loop1: detected capacity change from 0 to 2048 [ 1025.269666][ T4733] netlink: 'syz-executor.3': attribute type 19 has an invalid length. 12:21:56 executing program 2: open(&(0x7f0000000400)='./bus\x00', 0x14103e, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$L2TP_CMD_SESSION_MODIFY(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000080)={0x30, r1, 0x1, 0x0, 0x0, {}, [@L2TP_ATTR_SEND_SEQ={0x5}, @L2TP_ATTR_IFNAME={0x14, 0x8, 'veth1_to_hsr\x00'}]}, 0x30}, 0x7}, 0x0) 12:21:56 executing program 3: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000400), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000001000)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000fc0)={0xffffffffffffffff}, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_ROUTE(r0, &(0x7f00000002c0)={0x4, 0x8, 0xfa00, {r1}}, 0x10) 12:21:56 executing program 4: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x82, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket(0x10, 0x803, 0x0) sendto(r0, &(0x7f00000000c0)="120000001200e7ef007b00000000000000a1", 0x12, 0x0, 0x0, 0x0) recvmmsg(r0, &(0x7f00000037c0)=[{{&(0x7f00000004c0)=@ethernet={0x0, @random}, 0x80, &(0x7f0000000380)=[{&(0x7f0000000040)=""/95, 0x5f}, {&(0x7f0000000140)=""/85, 0x55}, {&(0x7f0000000fc0)=""/4096, 0x1000}, {&(0x7f0000000400)=""/106, 0x6a}, {&(0x7f0000000740)=""/73, 0x49}, {&(0x7f0000000200)=""/77, 0x4d}, {0x0}], 0x7, &(0x7f0000000600)=""/191, 0xbf}, 0xd}], 0x1, 0x0, &(0x7f0000003700)={0x77359400}) [ 1025.329467][ T4722] EXT4-fs (loop1): mounted filesystem 00000000-0000-0000-0000-000000000000 without journal. Quota mode: none. [ 1025.363728][ T4722] ext4 filesystem being mounted at /root/syzkaller-testdir1539738704/syzkaller.ao1jj3/3807/bus supports timestamps until 2038 (0x7fffffff) 12:21:56 executing program 1: syz_mount_image$ext4(&(0x7f0000000740)='ext4\x00', &(0x7f0000000100)='./bus\x00', 0x804810, &(0x7f0000000180)=ANY=[@ANYBLOB="0061021d307a961da7401271e3fa98008000001d3902ccfd562158cb15c016093893c9e4abd02bc4f1492514fa2dfebc8001000080000000008a1049ca0000"], 0x1, 0x73b, &(0x7f0000000780)="$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") chdir(&(0x7f0000000080)='./file0\x00') open(&(0x7f00000000c0)='./bus\x00', 0x14da42, 0x0) mount(&(0x7f0000000380)=@loop={'/dev/loop', 0x0}, &(0x7f00000003c0)='./bus\x00', 0x0, 0x1000, 0x0) r0 = open(&(0x7f0000000400)='./bus\x00', 0x0, 0x0) ioctl$LOOP_SET_STATUS(r0, 0x4c02, &(0x7f00000001c0)={0x0, {}, 0x0, {}, 0xff, 0x0, 0x0, 0x0, "be8176c9e6755a48a3c0230dd390efe12f8306bed95b2afd402aae879978d959ff9009eec610d9108ea036456bb79e26ee42d0a34968c1fdbb33e8ad5860f632", "b948757aa008fae13adca739a9f126462ab528ea52e90ce2cf50a4ef2568375b"}) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='blkio.throttle.io_service_bytes\x00', 0x275a, 0x100000000000000) [ 1025.442278][ T4722] loop1: detected capacity change from 2048 to 2047 [ 1025.496859][ T3128] EXT4-fs (loop1): unmounting filesystem 00000000-0000-0000-0000-000000000000. [ 1025.662305][ T4753] loop1: detected capacity change from 0 to 2048 12:21:57 executing program 0: r0 = socket$unix(0x1, 0x2, 0x0) r1 = socket$can_bcm(0x1d, 0x2, 0x2) connect$can_bcm(r1, &(0x7f0000000000), 0x10) ioctl$sock_kcm_SIOCKCMUNATTACH(0xffffffffffffffff, 0x89e1, 0xffffffffffffffff) getsockopt$inet_sctp_SCTP_PEER_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1a, &(0x7f0000000380)={0x0, 0x80, "f29c5b753353d9c7798811e57823354f32d6cb0899a53381003e4f8dbbb1ea469076c8e175a20b45443f885afb38b83813d5e013d4fad662f1582b23328b4ed70ad9d7d4d0052d0147d8b0ac4910985bec8aa8956c599d291a7da55fec010801d8f02dcff373f52f59f867378c13f4a080938c965846a7e8229b410b3ea0f9ce"}, &(0x7f00000002c0)=0x88) socket$igmp6(0xa, 0x3, 0x2) perf_event_open(&(0x7f0000000500)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x15, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) close(0xffffffffffffffff) socket$inet_mptcp(0x2, 0x1, 0x106) connect$can_bcm(0xffffffffffffffff, &(0x7f0000000000), 0x10) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, 0x0) bind$unix(r0, &(0x7f00000005c0)=@abs={0x0, 0x0, 0x4e23}, 0x6e) syz_clone(0x40000000, &(0x7f00000000c0), 0x0, 0x0, &(0x7f00000001c0), 0x0) 12:21:57 executing program 3: shmctl$IPC_INFO(0x0, 0x3, &(0x7f0000000100)=""/226) 12:21:57 executing program 2: open(&(0x7f0000000400)='./bus\x00', 0x14103e, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$L2TP_CMD_SESSION_MODIFY(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000080)={0x30, r1, 0x1, 0x0, 0x0, {}, [@L2TP_ATTR_SEND_SEQ={0x5}, @L2TP_ATTR_IFNAME={0x14, 0x8, 'veth1_to_hsr\x00'}]}, 0x30}, 0x8}, 0x0) 12:21:57 executing program 4: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x82, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket(0x10, 0x803, 0x0) sendto(r0, &(0x7f00000000c0)="120000001200e7ef007b00000000000000a1", 0x12, 0x0, 0x0, 0x0) recvmmsg(r0, &(0x7f00000037c0)=[{{&(0x7f00000004c0)=@ethernet={0x0, @random}, 0x80, &(0x7f0000000380)=[{&(0x7f0000000040)=""/95, 0x5f}, {&(0x7f0000000140)=""/85, 0x55}, {&(0x7f0000000fc0)=""/4096, 0x1000}, {&(0x7f0000000400)=""/106, 0x6a}, {&(0x7f0000000740)=""/73, 0x49}, {&(0x7f0000000200)=""/77, 0x4d}, {0x0}], 0x7, &(0x7f0000000600)=""/191, 0xbf}, 0xf}], 0x1, 0x0, &(0x7f0000003700)={0x77359400}) 12:21:57 executing program 5: r0 = socket$unix(0x1, 0x2, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f0000000100)={'vcan0\x00', 0x0}) r2 = socket$can_bcm(0x1d, 0x2, 0x2) connect$can_bcm(r2, &(0x7f0000000000), 0x10) ioctl$sock_kcm_SIOCKCMUNATTACH(0xffffffffffffffff, 0x89e1, 0xffffffffffffffff) ioctl$sock_SIOCSPGRP(0xffffffffffffffff, 0x8902, 0x0) sendmsg$can_bcm(r2, &(0x7f0000000480)={&(0x7f0000000340)={0x1d, r1, 0x3f420f00}, 0x10, &(0x7f0000000040)={&(0x7f0000000580)=ANY=[@ANYBLOB="01000000d7fe68ca0000e9ffffff0000", @ANYRES64=0x0, @ANYRES64=0x0, @ANYRES64=0x0, @ANYRES64=r0, @ANYBLOB="3bf81bb9f1"], 0x20000600}}, 0x0) r3 = socket(0x0, 0x0, 0x40000) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r3, 0x541b, &(0x7f00000000c0)={'ip6_vti0\x00', 0x0}) sendmsg$IPCTNL_MSG_EXP_DELETE(r3, &(0x7f00000004c0)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x40000040}, 0xc, &(0x7f0000000440)={&(0x7f00000006c0)={0x1d0, 0x2, 0x2, 0x201, 0x0, 0x0, {0xa}, [@CTA_EXPECT_NAT={0xc0, 0xa, 0x0, 0x1, [@CTA_EXPECT_NAT_TUPLE={0xc, 0x2, 0x0, 0x1, [@CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x1}]}, @CTA_EXPECT_NAT_TUPLE={0x70, 0x2, 0x0, 0x1, [@CTA_TUPLE_IP={0x2c, 0x1, 0x0, 0x1, @ipv6={{0x14, 0x3, @loopback}, {0x14, 0x4, @private0}}}, @CTA_TUPLE_IP={0x14, 0x1, 0x0, 0x1, @ipv4={{0x8, 0x1, @empty}, {0x8, 0x2, @initdev={0xac, 0x1e, 0x1, 0x0}}}}, @CTA_TUPLE_IP={0x14, 0x1, 0x0, 0x1, @ipv4={{0x8, 0x1, @local}, {0x8, 0x2, @loopback}}}, @CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x4}, @CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x3}, @CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x1}]}, @CTA_EXPECT_NAT_TUPLE={0x38, 0x2, 0x0, 0x1, [@CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5, 0x1, 0x88}}, @CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x3}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5, 0x1, 0x21}}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5, 0x1, 0x1}}, @CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x3}]}, @CTA_EXPECT_NAT_DIR={0x8}]}, @CTA_EXPECT_MASTER={0x20, 0x1, 0x0, 0x1, [@CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x1}, @CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x2}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5, 0x1, 0x84}}]}, @CTA_EXPECT_MASTER={0xdc, 0x1, 0x0, 0x1, [@CTA_TUPLE_IP={0x14, 0x1, 0x0, 0x1, @ipv4={{0x8, 0x1, @multicast1}, {0x8, 0x2, @dev={0xac, 0x14, 0x14, 0x3a}}}}, @CTA_TUPLE_ZONE={0x6}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5, 0x1, 0x21}}, @CTA_TUPLE_IP={0x14, 0x1, 0x0, 0x1, @ipv4={{0x8, 0x1, @empty}, {0x8, 0x2, @local}}}, @CTA_TUPLE_IP={0x2c, 0x1, 0x0, 0x1, @ipv6={{0x14, 0x3, @private1={0xfc, 0x1, '\x00', 0x1}}, {0x14, 0x4, @rand_addr=' \x01\x00'}}}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5, 0x1, 0x1}}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5, 0x1, 0x88}}, @CTA_TUPLE_IP={0x2c, 0x1, 0x0, 0x1, @ipv6={{0x14, 0x3, @empty}, {0x14, 0x4, @dev={0xfe, 0x80, '\x00', 0x21}}}}, @CTA_TUPLE_IP={0x2c, 0x1, 0x0, 0x1, @ipv6={{0x14, 0x3, @local}, {0x14, 0x4, @ipv4={'\x00', '\xff\xff', @rand_addr=0x64010100}}}}]}]}, 0x1d0}}, 0x48000) perf_event_open(&(0x7f0000000500)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x15, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$binfmt_elf32(0xffffffffffffffff, &(0x7f0000000040)=ANY=[], 0x69) connect$can_bcm(0xffffffffffffffff, &(0x7f0000000000), 0x10) sendmsg$can_bcm(0xffffffffffffffff, &(0x7f0000000480)={&(0x7f0000000340)={0x1d, 0x0, 0x3f420f00}, 0x10, &(0x7f0000000040)={&(0x7f0000000580)=ANY=[@ANYBLOB="01000000d7fe68ca0000e9ffffff0000", @ANYRES64=0x0, @ANYRES64=0x0, @ANYRES64=0x0, @ANYRES64], 0x20000600}}, 0x0) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(0xffffffffffffffff, 0x89f0, &(0x7f0000000280)={'gretap0\x00', &(0x7f0000000240)={'ip_vti0\x00', 0x0, 0x7, 0x80, 0xfffffff7, 0x7, {{0x8, 0x4, 0x0, 0x5, 0x20, 0x67, 0x0, 0xc0, 0x29, 0x0, @local, @empty, {[@timestamp={0x44, 0xc, 0x8, 0x0, 0x2, [0x7f, 0x1]}]}}}}}) socket(0x10, 0x3, 0x0) process_mrelease(0xffffffffffffffff, 0x0) r4 = socket$packet(0x11, 0x2, 0x300) ioctl$sock_SIOCGIFINDEX(r4, 0x8933, 0x0) getsockopt$inet_sctp_SCTP_RECVNXTINFO(r3, 0x84, 0x21, &(0x7f0000000140), &(0x7f0000000200)=0x4) bind$unix(r0, &(0x7f00000005c0)=@abs={0x1, 0x0, 0x4e23}, 0x6e) syz_clone(0x40000000, &(0x7f00000000c0), 0x0, 0x0, &(0x7f00000001c0), 0x0) 12:21:57 executing program 3: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$ieee802154(&(0x7f0000000180), r1) sendmsg$IEEE802154_ADD_IFACE(r0, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000480)={&(0x7f0000000400)={0x2c, r2, 0x1, 0x0, 0x0, {}, [@IEEE802154_ATTR_DEV_NAME={0xa, 0x1, 'wpan1\x00'}, @IEEE802154_ATTR_PHY_NAME={0x9, 0x1f, 'phy3\x00'}]}, 0x2c}}, 0x0) 12:21:57 executing program 2: open(&(0x7f0000000400)='./bus\x00', 0x14103e, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$L2TP_CMD_SESSION_MODIFY(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000080)={0x30, r1, 0x1, 0x0, 0x0, {}, [@L2TP_ATTR_SEND_SEQ={0x5}, @L2TP_ATTR_IFNAME={0x14, 0x8, 'veth1_to_hsr\x00'}]}, 0x30}, 0x9}, 0x0) 12:21:57 executing program 4: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x82, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket(0x10, 0x803, 0x0) sendto(r0, &(0x7f00000000c0)="120000001200e7ef007b00000000000000a1", 0x12, 0x0, 0x0, 0x0) recvmmsg(r0, &(0x7f00000037c0)=[{{&(0x7f00000004c0)=@ethernet={0x0, @random}, 0x80, &(0x7f0000000380)=[{&(0x7f0000000040)=""/95, 0x5f}, {&(0x7f0000000140)=""/85, 0x55}, {&(0x7f0000000fc0)=""/4096, 0x1000}, {&(0x7f0000000400)=""/106, 0x6a}, {&(0x7f0000000740)=""/73, 0x49}, {&(0x7f0000000200)=""/77, 0x4d}, {0x0}], 0x7, &(0x7f0000000600)=""/191, 0xbf}, 0x10}], 0x1, 0x0, &(0x7f0000003700)={0x77359400}) 12:21:57 executing program 3: add_key(&(0x7f0000000080)='big_key\x00', &(0x7f00000000c0)={'syz', 0x1}, &(0x7f0000000100)="c4", 0x1, 0xfffffffffffffffc) 12:21:57 executing program 4: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x82, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket(0x10, 0x803, 0x0) sendto(r0, &(0x7f00000000c0)="120000001200e7ef007b00000000000000a1", 0x12, 0x0, 0x0, 0x0) recvmmsg(r0, &(0x7f00000037c0)=[{{&(0x7f00000004c0)=@ethernet={0x0, @random}, 0x80, &(0x7f0000000380)=[{&(0x7f0000000040)=""/95, 0x5f}, {&(0x7f0000000140)=""/85, 0x55}, {&(0x7f0000000fc0)=""/4096, 0x1000}, {&(0x7f0000000400)=""/106, 0x6a}, {&(0x7f0000000740)=""/73, 0x49}, {&(0x7f0000000200)=""/77, 0x4d}, {0x0}], 0x7, &(0x7f0000000600)=""/191, 0xbf}, 0x60}], 0x1, 0x0, &(0x7f0000003700)={0x77359400}) [ 1025.754146][ T4753] EXT4-fs (loop1): mounted filesystem 00000000-0000-0000-0000-000000000000 without journal. Quota mode: none. 12:21:57 executing program 2: open(&(0x7f0000000400)='./bus\x00', 0x14103e, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$L2TP_CMD_SESSION_MODIFY(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000080)={0x30, r1, 0x1, 0x0, 0x0, {}, [@L2TP_ATTR_SEND_SEQ={0x5}, @L2TP_ATTR_IFNAME={0x14, 0x8, 'veth1_to_hsr\x00'}]}, 0x30}, 0xa}, 0x0) [ 1025.842323][ T4753] ext4 filesystem being mounted at /root/syzkaller-testdir1539738704/syzkaller.ao1jj3/3808/bus supports timestamps until 2038 (0x7fffffff) 12:21:57 executing program 1: syz_mount_image$ext4(&(0x7f0000000740)='ext4\x00', &(0x7f0000000100)='./bus\x00', 0x804810, &(0x7f0000000180)=ANY=[@ANYBLOB="0061021d307a961da7401271e3fa98008000001d3902ccfd562158cb15c016093893c9e4abd02bc4f1492514fa2dfebc8001000080000000008a1049ca0000"], 0x1, 0x73b, &(0x7f0000000780)="$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") chdir(&(0x7f0000000080)='./file0\x00') open(&(0x7f00000000c0)='./bus\x00', 0x14da42, 0x0) mount(&(0x7f0000000380)=@loop={'/dev/loop', 0x0}, &(0x7f00000003c0)='./bus\x00', 0x0, 0x1000, 0x0) r0 = open(&(0x7f0000000400)='./bus\x00', 0x0, 0x0) ioctl$LOOP_SET_STATUS(r0, 0x4c02, &(0x7f00000001c0)={0x0, {}, 0x0, {}, 0xff, 0x0, 0x0, 0x0, "be8176c9e6755a48a3c0230dd390efe12f8306bed95b2afd402aae879978d959ff9009eec610d9108ea036456bb79e26ee42d0a34968c1fdbb33e8ad5860f632", "b948757aa008fae13adca739a9f126462ab528ea52e90ce2cf50a4ef2568375b"}) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='blkio.throttle.io_service_bytes\x00', 0x275a, 0x200000000000000) [ 1025.925506][ T4753] loop1: detected capacity change from 2048 to 2047 [ 1025.962037][ T3128] EXT4-fs (loop1): unmounting filesystem 00000000-0000-0000-0000-000000000000. [ 1026.077986][ T4783] loop1: detected capacity change from 0 to 2048 [ 1026.116822][ T4783] EXT4-fs (loop1): mounted filesystem 00000000-0000-0000-0000-000000000000 without journal. Quota mode: none. [ 1026.149097][ T4783] ext4 filesystem being mounted at /root/syzkaller-testdir1539738704/syzkaller.ao1jj3/3809/bus supports timestamps until 2038 (0x7fffffff) [ 1026.252224][ T4783] loop1: detected capacity change from 2048 to 2047 [ 1026.293260][ T3128] EXT4-fs (loop1): unmounting filesystem 00000000-0000-0000-0000-000000000000. 12:21:58 executing program 0: r0 = socket$unix(0x1, 0x2, 0x0) r1 = socket$can_bcm(0x1d, 0x2, 0x2) connect$can_bcm(r1, &(0x7f0000000000), 0x10) ioctl$sock_kcm_SIOCKCMUNATTACH(0xffffffffffffffff, 0x89e1, 0xffffffffffffffff) getsockopt$inet_sctp_SCTP_PEER_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1a, &(0x7f0000000380)={0x0, 0x80, "f29c5b753353d9c7798811e57823354f32d6cb0899a53381003e4f8dbbb1ea469076c8e175a20b45443f885afb38b83813d5e013d4fad662f1582b23328b4ed70ad9d7d4d0052d0147d8b0ac4910985bec8aa8956c599d291a7da55fec010801d8f02dcff373f52f59f867378c13f4a080938c965846a7e8229b410b3ea0f9ce"}, &(0x7f00000002c0)=0x88) socket$igmp6(0xa, 0x3, 0x2) perf_event_open(&(0x7f0000000500)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x15, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) close(0xffffffffffffffff) socket$inet_mptcp(0x2, 0x1, 0x106) connect$can_bcm(0xffffffffffffffff, &(0x7f0000000000), 0x10) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, 0x0) bind$unix(r0, &(0x7f00000005c0)=@abs={0x0, 0x0, 0x4e23}, 0x6e) syz_clone(0x40000000, &(0x7f00000000c0), 0x0, 0x0, &(0x7f00000001c0), 0x0) 12:21:58 executing program 3: perf_event_open(&(0x7f0000000600)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 12:21:58 executing program 2: open(&(0x7f0000000400)='./bus\x00', 0x14103e, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$L2TP_CMD_SESSION_MODIFY(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000080)={0x30, r1, 0x1, 0x0, 0x0, {}, [@L2TP_ATTR_SEND_SEQ={0x5}, @L2TP_ATTR_IFNAME={0x14, 0x8, 'veth1_to_hsr\x00'}]}, 0x30}, 0xb}, 0x0) 12:21:58 executing program 4: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x82, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket(0x10, 0x803, 0x0) sendto(r0, &(0x7f00000000c0)="120000001200e7ef007b00000000000000a1", 0x12, 0x0, 0x0, 0x0) recvmmsg(r0, &(0x7f00000037c0)=[{{&(0x7f00000004c0)=@ethernet={0x0, @random}, 0x80, &(0x7f0000000380)=[{&(0x7f0000000040)=""/95, 0x5f}, {&(0x7f0000000140)=""/85, 0x55}, {&(0x7f0000000fc0)=""/4096, 0x1000}, {&(0x7f0000000400)=""/106, 0x6a}, {&(0x7f0000000740)=""/73, 0x49}, {&(0x7f0000000200)=""/77, 0x4d}, {0x0}], 0x7, &(0x7f0000000600)=""/191, 0xbf}, 0x300}], 0x1, 0x0, &(0x7f0000003700)={0x77359400}) 12:22:00 executing program 3: add_key(&(0x7f0000000000)='cifs.spnego\x00', &(0x7f0000000040)={'syz', 0x1}, &(0x7f0000000080)='\f', 0x1, 0xfffffffffffffffe) 12:22:00 executing program 1: syz_mount_image$ext4(&(0x7f0000000740)='ext4\x00', &(0x7f0000000100)='./bus\x00', 0x804810, &(0x7f0000000180)=ANY=[@ANYBLOB="0061021d307a961da7401271e3fa98008000001d3902ccfd562158cb15c016093893c9e4abd02bc4f1492514fa2dfebc8001000080000000008a1049ca0000"], 0x1, 0x73b, &(0x7f0000000780)="$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") chdir(&(0x7f0000000080)='./file0\x00') open(&(0x7f00000000c0)='./bus\x00', 0x14da42, 0x0) mount(&(0x7f0000000380)=@loop={'/dev/loop', 0x0}, &(0x7f00000003c0)='./bus\x00', 0x0, 0x1000, 0x0) r0 = open(&(0x7f0000000400)='./bus\x00', 0x0, 0x0) ioctl$LOOP_SET_STATUS(r0, 0x4c02, &(0x7f00000001c0)={0x0, {}, 0x0, {}, 0xff, 0x0, 0x0, 0x0, "be8176c9e6755a48a3c0230dd390efe12f8306bed95b2afd402aae879978d959ff9009eec610d9108ea036456bb79e26ee42d0a34968c1fdbb33e8ad5860f632", "b948757aa008fae13adca739a9f126462ab528ea52e90ce2cf50a4ef2568375b"}) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='blkio.throttle.io_service_bytes\x00', 0x275a, 0x204000000000000) 12:22:00 executing program 4: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x82, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket(0x10, 0x803, 0x0) sendto(r0, &(0x7f00000000c0)="120000001200e7ef007b00000000000000a1", 0x12, 0x0, 0x0, 0x0) recvmmsg(r0, &(0x7f00000037c0)=[{{&(0x7f00000004c0)=@ethernet={0x0, @random}, 0x80, &(0x7f0000000380)=[{&(0x7f0000000040)=""/95, 0x5f}, {&(0x7f0000000140)=""/85, 0x55}, {&(0x7f0000000fc0)=""/4096, 0x1000}, {&(0x7f0000000400)=""/106, 0x6a}, {&(0x7f0000000740)=""/73, 0x49}, {&(0x7f0000000200)=""/77, 0x4d}, {0x0}], 0x7, &(0x7f0000000600)=""/191, 0xbf}, 0x500}], 0x1, 0x0, &(0x7f0000003700)={0x77359400}) 12:22:00 executing program 2: open(&(0x7f0000000400)='./bus\x00', 0x14103e, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$L2TP_CMD_SESSION_MODIFY(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000080)={0x30, r1, 0x1, 0x0, 0x0, {}, [@L2TP_ATTR_SEND_SEQ={0x5}, @L2TP_ATTR_IFNAME={0x14, 0x8, 'veth1_to_hsr\x00'}]}, 0x30}, 0x10}, 0x0) 12:22:00 executing program 5: r0 = socket$unix(0x1, 0x2, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f0000000100)={'vcan0\x00', 0x0}) r2 = socket$can_bcm(0x1d, 0x2, 0x2) connect$can_bcm(r2, &(0x7f0000000000), 0x10) ioctl$sock_kcm_SIOCKCMUNATTACH(0xffffffffffffffff, 0x89e1, 0xffffffffffffffff) ioctl$sock_SIOCSPGRP(0xffffffffffffffff, 0x8902, 0x0) sendmsg$can_bcm(r2, &(0x7f0000000480)={&(0x7f0000000340)={0x1d, r1, 0x3f420f00}, 0x10, &(0x7f0000000040)={&(0x7f0000000580)=ANY=[@ANYBLOB="01000000d7fe68ca0000e9ffffff0000", @ANYRES64=0x0, @ANYRES64=0x0, @ANYRES64=0x0, @ANYRES64=r0, @ANYBLOB="3bf81bb9f1"], 0x20000600}}, 0x0) r3 = socket(0x0, 0x0, 0x40000) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r3, 0x541b, &(0x7f00000000c0)={'ip6_vti0\x00', 0x0}) sendmsg$IPCTNL_MSG_EXP_DELETE(r3, &(0x7f00000004c0)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x40000040}, 0xc, &(0x7f0000000440)={&(0x7f00000006c0)={0x1d0, 0x2, 0x2, 0x201, 0x0, 0x0, {0xa}, [@CTA_EXPECT_NAT={0xc0, 0xa, 0x0, 0x1, [@CTA_EXPECT_NAT_TUPLE={0xc, 0x2, 0x0, 0x1, [@CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x1}]}, @CTA_EXPECT_NAT_TUPLE={0x70, 0x2, 0x0, 0x1, [@CTA_TUPLE_IP={0x2c, 0x1, 0x0, 0x1, @ipv6={{0x14, 0x3, @loopback}, {0x14, 0x4, @private0}}}, @CTA_TUPLE_IP={0x14, 0x1, 0x0, 0x1, @ipv4={{0x8, 0x1, @empty}, {0x8, 0x2, @initdev={0xac, 0x1e, 0x1, 0x0}}}}, @CTA_TUPLE_IP={0x14, 0x1, 0x0, 0x1, @ipv4={{0x8, 0x1, @local}, {0x8, 0x2, @loopback}}}, @CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x4}, @CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x3}, @CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x1}]}, @CTA_EXPECT_NAT_TUPLE={0x38, 0x2, 0x0, 0x1, [@CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5, 0x1, 0x88}}, @CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x3}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5, 0x1, 0x21}}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5, 0x1, 0x1}}, @CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x3}]}, @CTA_EXPECT_NAT_DIR={0x8}]}, @CTA_EXPECT_MASTER={0x20, 0x1, 0x0, 0x1, [@CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x1}, @CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x2}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5, 0x1, 0x84}}]}, @CTA_EXPECT_MASTER={0xdc, 0x1, 0x0, 0x1, [@CTA_TUPLE_IP={0x14, 0x1, 0x0, 0x1, @ipv4={{0x8, 0x1, @multicast1}, {0x8, 0x2, @dev={0xac, 0x14, 0x14, 0x3a}}}}, @CTA_TUPLE_ZONE={0x6}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5, 0x1, 0x21}}, @CTA_TUPLE_IP={0x14, 0x1, 0x0, 0x1, @ipv4={{0x8, 0x1, @empty}, {0x8, 0x2, @local}}}, @CTA_TUPLE_IP={0x2c, 0x1, 0x0, 0x1, @ipv6={{0x14, 0x3, @private1={0xfc, 0x1, '\x00', 0x1}}, {0x14, 0x4, @rand_addr=' \x01\x00'}}}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5, 0x1, 0x1}}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5, 0x1, 0x88}}, @CTA_TUPLE_IP={0x2c, 0x1, 0x0, 0x1, @ipv6={{0x14, 0x3, @empty}, {0x14, 0x4, @dev={0xfe, 0x80, '\x00', 0x21}}}}, @CTA_TUPLE_IP={0x2c, 0x1, 0x0, 0x1, @ipv6={{0x14, 0x3, @local}, {0x14, 0x4, @ipv4={'\x00', '\xff\xff', @rand_addr=0x64010100}}}}]}]}, 0x1d0}}, 0x48000) perf_event_open(&(0x7f0000000500)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x15, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$binfmt_elf32(0xffffffffffffffff, &(0x7f0000000040)=ANY=[], 0x69) connect$can_bcm(0xffffffffffffffff, &(0x7f0000000000), 0x10) sendmsg$can_bcm(0xffffffffffffffff, &(0x7f0000000480)={&(0x7f0000000340)={0x1d, 0x0, 0x3f420f00}, 0x10, &(0x7f0000000040)={&(0x7f0000000580)=ANY=[@ANYBLOB="01000000d7fe68ca0000e9ffffff0000", @ANYRES64=0x0, @ANYRES64=0x0, @ANYRES64=0x0, @ANYRES64], 0x20000600}}, 0x0) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(0xffffffffffffffff, 0x89f0, &(0x7f0000000280)={'gretap0\x00', &(0x7f0000000240)={'ip_vti0\x00', 0x0, 0x7, 0x80, 0xfffffff7, 0x7, {{0x8, 0x4, 0x0, 0x5, 0x20, 0x67, 0x0, 0xc0, 0x29, 0x0, @local, @empty, {[@timestamp={0x44, 0xc, 0x8, 0x0, 0x2, [0x7f, 0x1]}]}}}}}) socket(0x10, 0x3, 0x0) process_mrelease(0xffffffffffffffff, 0x0) r4 = socket$packet(0x11, 0x2, 0x300) ioctl$sock_SIOCGIFINDEX(r4, 0x8933, 0x0) getsockopt$inet_sctp_SCTP_RECVNXTINFO(r3, 0x84, 0x21, &(0x7f0000000140), &(0x7f0000000200)=0x4) bind$unix(r0, &(0x7f00000005c0)=@abs={0x1, 0x0, 0x4e23}, 0x6e) syz_clone(0x40000000, &(0x7f00000000c0), 0x0, 0x0, &(0x7f00000001c0), 0x0) 12:22:00 executing program 0: r0 = socket$unix(0x1, 0x2, 0x0) r1 = socket$can_bcm(0x1d, 0x2, 0x2) connect$can_bcm(r1, &(0x7f0000000000), 0x10) ioctl$sock_kcm_SIOCKCMUNATTACH(0xffffffffffffffff, 0x89e1, 0xffffffffffffffff) getsockopt$inet_sctp_SCTP_PEER_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1a, &(0x7f0000000380)={0x0, 0x80, "f29c5b753353d9c7798811e57823354f32d6cb0899a53381003e4f8dbbb1ea469076c8e175a20b45443f885afb38b83813d5e013d4fad662f1582b23328b4ed70ad9d7d4d0052d0147d8b0ac4910985bec8aa8956c599d291a7da55fec010801d8f02dcff373f52f59f867378c13f4a080938c965846a7e8229b410b3ea0f9ce"}, &(0x7f00000002c0)=0x88) socket$igmp6(0xa, 0x3, 0x2) perf_event_open(&(0x7f0000000500)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x15, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) close(0xffffffffffffffff) socket$inet_mptcp(0x2, 0x1, 0x106) connect$can_bcm(0xffffffffffffffff, &(0x7f0000000000), 0x10) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, 0x0) bind$unix(r0, &(0x7f00000005c0)=@abs={0x0, 0x0, 0x4e23}, 0x6e) syz_clone(0x40000000, &(0x7f00000000c0), 0x0, 0x0, &(0x7f00000001c0), 0x0) 12:22:00 executing program 3: add_key$keyring(&(0x7f0000000240), &(0x7f0000000280)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffd) add_key$keyring(&(0x7f0000008c80), &(0x7f0000008cc0)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffd) 12:22:00 executing program 2: open(&(0x7f0000000400)='./bus\x00', 0x14103e, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$L2TP_CMD_SESSION_MODIFY(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000080)={0x30, r1, 0x1, 0x0, 0x0, {}, [@L2TP_ATTR_SEND_SEQ={0x5}, @L2TP_ATTR_IFNAME={0x14, 0x8, 'veth1_to_hsr\x00'}]}, 0x30}, 0x11}, 0x0) 12:22:00 executing program 4: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x82, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket(0x10, 0x803, 0x0) sendto(r0, &(0x7f00000000c0)="120000001200e7ef007b00000000000000a1", 0x12, 0x0, 0x0, 0x0) recvmmsg(r0, &(0x7f00000037c0)=[{{&(0x7f00000004c0)=@ethernet={0x0, @random}, 0x80, &(0x7f0000000380)=[{&(0x7f0000000040)=""/95, 0x5f}, {&(0x7f0000000140)=""/85, 0x55}, {&(0x7f0000000fc0)=""/4096, 0x1000}, {&(0x7f0000000400)=""/106, 0x6a}, {&(0x7f0000000740)=""/73, 0x49}, {&(0x7f0000000200)=""/77, 0x4d}, {0x0}], 0x7, &(0x7f0000000600)=""/191, 0xbf}, 0x600}], 0x1, 0x0, &(0x7f0000003700)={0x77359400}) 12:22:00 executing program 3: socket$inet6_sctp(0xa, 0xcdae08951bc5a76f, 0x84) 12:22:00 executing program 2: open(&(0x7f0000000400)='./bus\x00', 0x14103e, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$L2TP_CMD_SESSION_MODIFY(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000080)={0x30, r1, 0x1, 0x0, 0x0, {}, [@L2TP_ATTR_SEND_SEQ={0x5}, @L2TP_ATTR_IFNAME={0x14, 0x8, 'veth1_to_hsr\x00'}]}, 0x30}, 0x13}, 0x0) 12:22:00 executing program 3: request_key(&(0x7f0000002080)='dns_resolver\x00', &(0x7f00000020c0)={'syz', 0x2}, &(0x7f0000002100)='%+:\x00', 0xfffffffffffffffb) 12:22:00 executing program 4: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x82, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket(0x10, 0x803, 0x0) sendto(r0, &(0x7f00000000c0)="120000001200e7ef007b00000000000000a1", 0x12, 0x0, 0x0, 0x0) recvmmsg(r0, &(0x7f00000037c0)=[{{&(0x7f00000004c0)=@ethernet={0x0, @random}, 0x80, &(0x7f0000000380)=[{&(0x7f0000000040)=""/95, 0x5f}, {&(0x7f0000000140)=""/85, 0x55}, {&(0x7f0000000fc0)=""/4096, 0x1000}, {&(0x7f0000000400)=""/106, 0x6a}, {&(0x7f0000000740)=""/73, 0x49}, {&(0x7f0000000200)=""/77, 0x4d}, {0x0}], 0x7, &(0x7f0000000600)=""/191, 0xbf}, 0x900}], 0x1, 0x0, &(0x7f0000003700)={0x77359400}) [ 1028.596658][ T4806] loop1: detected capacity change from 0 to 2048 [ 1028.692257][ T4806] EXT4-fs (loop1): mounted filesystem 00000000-0000-0000-0000-000000000000 without journal. Quota mode: none. [ 1028.716696][ T4806] ext4 filesystem being mounted at /root/syzkaller-testdir1539738704/syzkaller.ao1jj3/3810/bus supports timestamps until 2038 (0x7fffffff) 12:22:00 executing program 1: syz_mount_image$ext4(&(0x7f0000000740)='ext4\x00', &(0x7f0000000100)='./bus\x00', 0x804810, &(0x7f0000000180)=ANY=[@ANYBLOB="0061021d307a961da7401271e3fa98008000001d3902ccfd562158cb15c016093893c9e4abd02bc4f1492514fa2dfebc8001000080000000008a1049ca0000"], 0x1, 0x73b, &(0x7f0000000780)="$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") chdir(&(0x7f0000000080)='./file0\x00') open(&(0x7f00000000c0)='./bus\x00', 0x14da42, 0x0) mount(&(0x7f0000000380)=@loop={'/dev/loop', 0x0}, &(0x7f00000003c0)='./bus\x00', 0x0, 0x1000, 0x0) r0 = open(&(0x7f0000000400)='./bus\x00', 0x0, 0x0) ioctl$LOOP_SET_STATUS(r0, 0x4c02, &(0x7f00000001c0)={0x0, {}, 0x0, {}, 0xff, 0x0, 0x0, 0x0, "be8176c9e6755a48a3c0230dd390efe12f8306bed95b2afd402aae879978d959ff9009eec610d9108ea036456bb79e26ee42d0a34968c1fdbb33e8ad5860f632", "b948757aa008fae13adca739a9f126462ab528ea52e90ce2cf50a4ef2568375b"}) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='blkio.throttle.io_service_bytes\x00', 0x275a, 0x300000000000000) 12:22:00 executing program 2: open(&(0x7f0000000400)='./bus\x00', 0x14103e, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$L2TP_CMD_SESSION_MODIFY(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000080)={0x30, r1, 0x1, 0x0, 0x0, {}, [@L2TP_ATTR_SEND_SEQ={0x5}, @L2TP_ATTR_IFNAME={0x14, 0x8, 'veth1_to_hsr\x00'}]}, 0x30}, 0x300}, 0x0) 12:22:00 executing program 3: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000500), 0x2, 0x0) write$RDMA_USER_CM_CMD_NOTIFY(r0, &(0x7f0000000080)={0xf, 0x8}, 0x10) [ 1028.792045][ T4806] loop1: detected capacity change from 2048 to 2047 [ 1028.863459][ T3128] EXT4-fs (loop1): unmounting filesystem 00000000-0000-0000-0000-000000000000. [ 1028.944380][ T4835] loop1: detected capacity change from 0 to 2048 [ 1028.998999][ T4835] EXT4-fs (loop1): mounted filesystem 00000000-0000-0000-0000-000000000000 without journal. Quota mode: none. [ 1029.041926][ T4835] ext4 filesystem being mounted at /root/syzkaller-testdir1539738704/syzkaller.ao1jj3/3811/bus supports timestamps until 2038 (0x7fffffff) 12:22:00 executing program 5: r0 = socket$unix(0x1, 0x2, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f0000000100)={'vcan0\x00', 0x0}) r2 = socket$can_bcm(0x1d, 0x2, 0x2) connect$can_bcm(r2, &(0x7f0000000000), 0x10) ioctl$sock_kcm_SIOCKCMUNATTACH(0xffffffffffffffff, 0x89e1, 0xffffffffffffffff) ioctl$sock_SIOCSPGRP(0xffffffffffffffff, 0x8902, 0x0) sendmsg$can_bcm(r2, &(0x7f0000000480)={&(0x7f0000000340)={0x1d, r1, 0x3f420f00}, 0x10, &(0x7f0000000040)={&(0x7f0000000580)=ANY=[@ANYBLOB="01000000d7fe68ca0000e9ffffff0000", @ANYRES64=0x0, @ANYRES64=0x0, @ANYRES64=0x0, @ANYRES64=r0, @ANYBLOB="3bf81bb9f1"], 0x20000600}}, 0x0) r3 = socket(0x0, 0x800, 0x0) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r3, 0x541b, &(0x7f00000000c0)={'ip6_vti0\x00', 0x0}) sendmsg$IPCTNL_MSG_EXP_DELETE(r3, &(0x7f00000004c0)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x40000040}, 0xc, &(0x7f0000000440)={&(0x7f00000006c0)={0x1d0, 0x2, 0x2, 0x201, 0x0, 0x0, {0xa}, [@CTA_EXPECT_NAT={0xc0, 0xa, 0x0, 0x1, [@CTA_EXPECT_NAT_TUPLE={0xc, 0x2, 0x0, 0x1, [@CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x1}]}, @CTA_EXPECT_NAT_TUPLE={0x70, 0x2, 0x0, 0x1, [@CTA_TUPLE_IP={0x2c, 0x1, 0x0, 0x1, @ipv6={{0x14, 0x3, @loopback}, {0x14, 0x4, @private0}}}, @CTA_TUPLE_IP={0x14, 0x1, 0x0, 0x1, @ipv4={{0x8, 0x1, @empty}, {0x8, 0x2, @initdev={0xac, 0x1e, 0x1, 0x0}}}}, @CTA_TUPLE_IP={0x14, 0x1, 0x0, 0x1, @ipv4={{0x8, 0x1, @local}, {0x8, 0x2, @loopback}}}, @CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x4}, @CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x3}, @CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x1}]}, @CTA_EXPECT_NAT_TUPLE={0x38, 0x2, 0x0, 0x1, [@CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5, 0x1, 0x88}}, @CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x3}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5, 0x1, 0x21}}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5, 0x1, 0x1}}, @CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x3}]}, @CTA_EXPECT_NAT_DIR={0x8}]}, @CTA_EXPECT_MASTER={0x20, 0x1, 0x0, 0x1, [@CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x1}, @CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x2}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5, 0x1, 0x84}}]}, @CTA_EXPECT_MASTER={0xdc, 0x1, 0x0, 0x1, [@CTA_TUPLE_IP={0x14, 0x1, 0x0, 0x1, @ipv4={{0x8, 0x1, @multicast1}, {0x8, 0x2, @dev={0xac, 0x14, 0x14, 0x3a}}}}, @CTA_TUPLE_ZONE={0x6}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5, 0x1, 0x21}}, @CTA_TUPLE_IP={0x14, 0x1, 0x0, 0x1, @ipv4={{0x8, 0x1, @empty}, {0x8, 0x2, @local}}}, @CTA_TUPLE_IP={0x2c, 0x1, 0x0, 0x1, @ipv6={{0x14, 0x3, @private1={0xfc, 0x1, '\x00', 0x1}}, {0x14, 0x4, @rand_addr=' \x01\x00'}}}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5, 0x1, 0x1}}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5, 0x1, 0x88}}, @CTA_TUPLE_IP={0x2c, 0x1, 0x0, 0x1, @ipv6={{0x14, 0x3, @empty}, {0x14, 0x4, @dev={0xfe, 0x80, '\x00', 0x21}}}}, @CTA_TUPLE_IP={0x2c, 0x1, 0x0, 0x1, @ipv6={{0x14, 0x3, @local}, {0x14, 0x4, @ipv4={'\x00', '\xff\xff', @rand_addr=0x64010100}}}}]}]}, 0x1d0}}, 0x48000) perf_event_open(&(0x7f0000000500)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x15, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$binfmt_elf32(0xffffffffffffffff, &(0x7f0000000040)=ANY=[], 0x69) connect$can_bcm(0xffffffffffffffff, &(0x7f0000000000), 0x10) sendmsg$can_bcm(0xffffffffffffffff, &(0x7f0000000480)={&(0x7f0000000340)={0x1d, 0x0, 0x3f420f00}, 0x10, &(0x7f0000000040)={&(0x7f0000000580)=ANY=[@ANYBLOB="01000000d7fe68ca0000e9ffffff0000", @ANYRES64=0x0, @ANYRES64=0x0, @ANYRES64=0x0, @ANYRES64], 0x20000600}}, 0x0) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(0xffffffffffffffff, 0x89f0, &(0x7f0000000280)={'gretap0\x00', &(0x7f0000000240)={'ip_vti0\x00', 0x0, 0x7, 0x80, 0xfffffff7, 0x7, {{0x8, 0x4, 0x0, 0x5, 0x20, 0x67, 0x0, 0xc0, 0x29, 0x0, @local, @empty, {[@timestamp={0x44, 0xc, 0x8, 0x0, 0x2, [0x7f, 0x1]}]}}}}}) socket(0x10, 0x3, 0x0) process_mrelease(0xffffffffffffffff, 0x0) r4 = socket$packet(0x11, 0x2, 0x300) ioctl$sock_SIOCGIFINDEX(r4, 0x8933, 0x0) getsockopt$inet_sctp_SCTP_RECVNXTINFO(r3, 0x84, 0x21, &(0x7f0000000140), &(0x7f0000000200)=0x4) bind$unix(r0, &(0x7f00000005c0)=@abs={0x1, 0x0, 0x4e23}, 0x6e) syz_clone(0x40000000, &(0x7f00000000c0), 0x0, 0x0, &(0x7f00000001c0), 0x0) 12:22:00 executing program 4: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x82, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket(0x10, 0x803, 0x0) sendto(r0, &(0x7f00000000c0)="120000001200e7ef007b00000000000000a1", 0x12, 0x0, 0x0, 0x0) recvmmsg(r0, &(0x7f00000037c0)=[{{&(0x7f00000004c0)=@ethernet={0x0, @random}, 0x80, &(0x7f0000000380)=[{&(0x7f0000000040)=""/95, 0x5f}, {&(0x7f0000000140)=""/85, 0x55}, {&(0x7f0000000fc0)=""/4096, 0x1000}, {&(0x7f0000000400)=""/106, 0x6a}, {&(0x7f0000000740)=""/73, 0x49}, {&(0x7f0000000200)=""/77, 0x4d}, {0x0}], 0x7, &(0x7f0000000600)=""/191, 0xbf}, 0xa00}], 0x1, 0x0, &(0x7f0000003700)={0x77359400}) 12:22:00 executing program 3: r0 = add_key$keyring(&(0x7f0000000240), &(0x7f0000000280)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$link(0x8, 0x0, r0) 12:22:00 executing program 2: open(&(0x7f0000000400)='./bus\x00', 0x14103e, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$L2TP_CMD_SESSION_MODIFY(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000080)={0x30, r1, 0x1, 0x0, 0x0, {}, [@L2TP_ATTR_SEND_SEQ={0x5}, @L2TP_ATTR_IFNAME={0x14, 0x8, 'veth1_to_hsr\x00'}]}, 0x30}, 0x1, 0x2}, 0x0) 12:22:00 executing program 0: r0 = socket$unix(0x1, 0x2, 0x0) r1 = socket$can_bcm(0x1d, 0x2, 0x2) connect$can_bcm(r1, &(0x7f0000000000), 0x10) ioctl$sock_kcm_SIOCKCMUNATTACH(0xffffffffffffffff, 0x89e1, 0xffffffffffffffff) getsockopt$inet_sctp_SCTP_PEER_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1a, &(0x7f0000000380)={0x0, 0x80, "f29c5b753353d9c7798811e57823354f32d6cb0899a53381003e4f8dbbb1ea469076c8e175a20b45443f885afb38b83813d5e013d4fad662f1582b23328b4ed70ad9d7d4d0052d0147d8b0ac4910985bec8aa8956c599d291a7da55fec010801d8f02dcff373f52f59f867378c13f4a080938c965846a7e8229b410b3ea0f9ce"}, &(0x7f00000002c0)=0x88) socket$igmp6(0xa, 0x3, 0x2) perf_event_open(&(0x7f0000000500)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x15, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) close(0xffffffffffffffff) socket$inet_mptcp(0x2, 0x1, 0x106) connect$can_bcm(0xffffffffffffffff, &(0x7f0000000000), 0x10) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, 0x0) bind$unix(r0, &(0x7f00000005c0)=@abs={0x1}, 0x6e) syz_clone(0x40000000, &(0x7f00000000c0), 0x0, 0x0, &(0x7f00000001c0), 0x0) 12:22:00 executing program 3: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000240), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000040)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000000)={0xffffffffffffffff}, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_LISTEN(r0, &(0x7f0000000080)={0x7, 0x8, 0xfa00, {r1, 0x5}}, 0x10) 12:22:00 executing program 2: open(&(0x7f0000000400)='./bus\x00', 0x14103e, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$L2TP_CMD_SESSION_MODIFY(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000080)={0x30, r1, 0x1, 0x0, 0x0, {}, [@L2TP_ATTR_SEND_SEQ={0x5}, @L2TP_ATTR_IFNAME={0x14, 0x8, 'veth1_to_hsr\x00'}]}, 0x30}, 0x1, 0x3}, 0x0) 12:22:00 executing program 4: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x82, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket(0x10, 0x803, 0x0) sendto(r0, &(0x7f00000000c0)="120000001200e7ef007b00000000000000a1", 0x12, 0x0, 0x0, 0x0) recvmmsg(r0, &(0x7f00000037c0)=[{{&(0x7f00000004c0)=@ethernet={0x0, @random}, 0x80, &(0x7f0000000380)=[{&(0x7f0000000040)=""/95, 0x5f}, {&(0x7f0000000140)=""/85, 0x55}, {&(0x7f0000000fc0)=""/4096, 0x1000}, {&(0x7f0000000400)=""/106, 0x6a}, {&(0x7f0000000740)=""/73, 0x49}, {&(0x7f0000000200)=""/77, 0x4d}, {0x0}], 0x7, &(0x7f0000000600)=""/191, 0xbf}, 0xc00}], 0x1, 0x0, &(0x7f0000003700)={0x77359400}) 12:22:00 executing program 3: syz_open_dev$vcsn(&(0x7f00000006c0), 0x6, 0x200000) 12:22:00 executing program 1: syz_mount_image$ext4(&(0x7f0000000740)='ext4\x00', &(0x7f0000000100)='./bus\x00', 0x804810, &(0x7f0000000180)=ANY=[@ANYBLOB="0061021d307a961da7401271e3fa98008000001d3902ccfd562158cb15c016093893c9e4abd02bc4f1492514fa2dfebc8001000080000000008a1049ca0000"], 0x1, 0x73b, &(0x7f0000000780)="$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") chdir(&(0x7f0000000080)='./file0\x00') open(&(0x7f00000000c0)='./bus\x00', 0x14da42, 0x0) mount(&(0x7f0000000380)=@loop={'/dev/loop', 0x0}, &(0x7f00000003c0)='./bus\x00', 0x0, 0x1000, 0x0) r0 = open(&(0x7f0000000400)='./bus\x00', 0x0, 0x0) ioctl$LOOP_SET_STATUS(r0, 0x4c02, &(0x7f00000001c0)={0x0, {}, 0x0, {}, 0xff, 0x0, 0x0, 0x0, "be8176c9e6755a48a3c0230dd390efe12f8306bed95b2afd402aae879978d959ff9009eec610d9108ea036456bb79e26ee42d0a34968c1fdbb33e8ad5860f632", "b948757aa008fae13adca739a9f126462ab528ea52e90ce2cf50a4ef2568375b"}) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='blkio.throttle.io_service_bytes\x00', 0x275a, 0x400000000000000) 12:22:00 executing program 2: open(&(0x7f0000000400)='./bus\x00', 0x14103e, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$L2TP_CMD_SESSION_MODIFY(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000080)={0x30, r1, 0x1, 0x0, 0x0, {}, [@L2TP_ATTR_SEND_SEQ={0x5}, @L2TP_ATTR_IFNAME={0x14, 0x8, 'veth1_to_hsr\x00'}]}, 0x30}, 0x1, 0x4}, 0x0) [ 1029.210028][ T4835] loop1: detected capacity change from 2048 to 2047 12:22:00 executing program 3: r0 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000600), 0x0, 0x0) read$rfkill(r0, 0x0, 0x0) [ 1029.303203][ T3128] EXT4-fs (loop1): unmounting filesystem 00000000-0000-0000-0000-000000000000. [ 1029.435422][ T4865] loop1: detected capacity change from 0 to 2048 [ 1029.502229][ T4865] EXT4-fs (loop1): mounted filesystem 00000000-0000-0000-0000-000000000000 without journal. Quota mode: none. [ 1029.542370][ T4865] ext4 filesystem being mounted at /root/syzkaller-testdir1539738704/syzkaller.ao1jj3/3812/bus supports timestamps until 2038 (0x7fffffff) [ 1029.674127][ T4865] loop1: detected capacity change from 2048 to 2047 [ 1029.716827][ T3128] EXT4-fs (loop1): unmounting filesystem 00000000-0000-0000-0000-000000000000. 12:22:01 executing program 5: r0 = socket$unix(0x1, 0x2, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f0000000100)={'vcan0\x00', 0x0}) r2 = socket$can_bcm(0x1d, 0x2, 0x2) connect$can_bcm(r2, &(0x7f0000000000), 0x10) ioctl$sock_kcm_SIOCKCMUNATTACH(0xffffffffffffffff, 0x89e1, 0xffffffffffffffff) ioctl$sock_SIOCSPGRP(0xffffffffffffffff, 0x8902, 0x0) sendmsg$can_bcm(r2, &(0x7f0000000480)={&(0x7f0000000340)={0x1d, r1, 0x3f420f00}, 0x10, &(0x7f0000000040)={&(0x7f0000000580)=ANY=[@ANYBLOB="01000000d7fe68ca0000e9ffffff0000", @ANYRES64=0x0, @ANYRES64=0x0, @ANYRES64=0x0, @ANYRES64=r0, @ANYBLOB="3bf81bb9f1"], 0x20000600}}, 0x0) r3 = socket(0x0, 0x800, 0x0) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r3, 0x541b, &(0x7f00000000c0)={'ip6_vti0\x00', 0x0}) sendmsg$IPCTNL_MSG_EXP_DELETE(r3, &(0x7f00000004c0)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x40000040}, 0xc, &(0x7f0000000440)={&(0x7f00000006c0)={0x1d0, 0x2, 0x2, 0x201, 0x0, 0x0, {0xa}, [@CTA_EXPECT_NAT={0xc0, 0xa, 0x0, 0x1, [@CTA_EXPECT_NAT_TUPLE={0xc, 0x2, 0x0, 0x1, [@CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x1}]}, @CTA_EXPECT_NAT_TUPLE={0x70, 0x2, 0x0, 0x1, [@CTA_TUPLE_IP={0x2c, 0x1, 0x0, 0x1, @ipv6={{0x14, 0x3, @loopback}, {0x14, 0x4, @private0}}}, @CTA_TUPLE_IP={0x14, 0x1, 0x0, 0x1, @ipv4={{0x8, 0x1, @empty}, {0x8, 0x2, @initdev={0xac, 0x1e, 0x1, 0x0}}}}, @CTA_TUPLE_IP={0x14, 0x1, 0x0, 0x1, @ipv4={{0x8, 0x1, @local}, {0x8, 0x2, @loopback}}}, @CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x4}, @CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x3}, @CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x1}]}, @CTA_EXPECT_NAT_TUPLE={0x38, 0x2, 0x0, 0x1, [@CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5, 0x1, 0x88}}, @CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x3}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5, 0x1, 0x21}}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5, 0x1, 0x1}}, @CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x3}]}, @CTA_EXPECT_NAT_DIR={0x8}]}, @CTA_EXPECT_MASTER={0x20, 0x1, 0x0, 0x1, [@CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x1}, @CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x2}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5, 0x1, 0x84}}]}, @CTA_EXPECT_MASTER={0xdc, 0x1, 0x0, 0x1, [@CTA_TUPLE_IP={0x14, 0x1, 0x0, 0x1, @ipv4={{0x8, 0x1, @multicast1}, {0x8, 0x2, @dev={0xac, 0x14, 0x14, 0x3a}}}}, @CTA_TUPLE_ZONE={0x6}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5, 0x1, 0x21}}, @CTA_TUPLE_IP={0x14, 0x1, 0x0, 0x1, @ipv4={{0x8, 0x1, @empty}, {0x8, 0x2, @local}}}, @CTA_TUPLE_IP={0x2c, 0x1, 0x0, 0x1, @ipv6={{0x14, 0x3, @private1={0xfc, 0x1, '\x00', 0x1}}, {0x14, 0x4, @rand_addr=' \x01\x00'}}}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5, 0x1, 0x1}}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5, 0x1, 0x88}}, @CTA_TUPLE_IP={0x2c, 0x1, 0x0, 0x1, @ipv6={{0x14, 0x3, @empty}, {0x14, 0x4, @dev={0xfe, 0x80, '\x00', 0x21}}}}, @CTA_TUPLE_IP={0x2c, 0x1, 0x0, 0x1, @ipv6={{0x14, 0x3, @local}, {0x14, 0x4, @ipv4={'\x00', '\xff\xff', @rand_addr=0x64010100}}}}]}]}, 0x1d0}}, 0x48000) perf_event_open(&(0x7f0000000500)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x15, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$binfmt_elf32(0xffffffffffffffff, &(0x7f0000000040)=ANY=[], 0x69) connect$can_bcm(0xffffffffffffffff, &(0x7f0000000000), 0x10) sendmsg$can_bcm(0xffffffffffffffff, &(0x7f0000000480)={&(0x7f0000000340)={0x1d, 0x0, 0x3f420f00}, 0x10, &(0x7f0000000040)={&(0x7f0000000580)=ANY=[@ANYBLOB="01000000d7fe68ca0000e9ffffff0000", @ANYRES64=0x0, @ANYRES64=0x0, @ANYRES64=0x0, @ANYRES64], 0x20000600}}, 0x0) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(0xffffffffffffffff, 0x89f0, &(0x7f0000000280)={'gretap0\x00', &(0x7f0000000240)={'ip_vti0\x00', 0x0, 0x7, 0x80, 0xfffffff7, 0x7, {{0x8, 0x4, 0x0, 0x5, 0x20, 0x67, 0x0, 0xc0, 0x29, 0x0, @local, @empty, {[@timestamp={0x44, 0xc, 0x8, 0x0, 0x2, [0x7f, 0x1]}]}}}}}) socket(0x10, 0x3, 0x0) process_mrelease(0xffffffffffffffff, 0x0) r4 = socket$packet(0x11, 0x2, 0x300) ioctl$sock_SIOCGIFINDEX(r4, 0x8933, 0x0) getsockopt$inet_sctp_SCTP_RECVNXTINFO(r3, 0x84, 0x21, &(0x7f0000000140), &(0x7f0000000200)=0x4) bind$unix(r0, &(0x7f00000005c0)=@abs={0x1, 0x0, 0x4e23}, 0x6e) syz_clone(0x40000000, &(0x7f00000000c0), 0x0, 0x0, &(0x7f00000001c0), 0x0) 12:22:01 executing program 2: open(&(0x7f0000000400)='./bus\x00', 0x14103e, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$L2TP_CMD_SESSION_MODIFY(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000080)={0x30, r1, 0x1, 0x0, 0x0, {}, [@L2TP_ATTR_SEND_SEQ={0x5}, @L2TP_ATTR_IFNAME={0x14, 0x8, 'veth1_to_hsr\x00'}]}, 0x30}, 0x1, 0x5}, 0x0) 12:22:01 executing program 3: pselect6(0x40, &(0x7f0000000040)={0x7}, &(0x7f00000001c0)={0x2}, 0x0, &(0x7f0000000100)={0x77359400}, 0x0) 12:22:01 executing program 4: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x82, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket(0x10, 0x803, 0x0) sendto(r0, &(0x7f00000000c0)="120000001200e7ef007b00000000000000a1", 0x12, 0x0, 0x0, 0x0) recvmmsg(r0, &(0x7f00000037c0)=[{{&(0x7f00000004c0)=@ethernet={0x0, @random}, 0x80, &(0x7f0000000380)=[{&(0x7f0000000040)=""/95, 0x5f}, {&(0x7f0000000140)=""/85, 0x55}, {&(0x7f0000000fc0)=""/4096, 0x1000}, {&(0x7f0000000400)=""/106, 0x6a}, {&(0x7f0000000740)=""/73, 0x49}, {&(0x7f0000000200)=""/77, 0x4d}, {0x0}], 0x7, &(0x7f0000000600)=""/191, 0xbf}, 0xd00}], 0x1, 0x0, &(0x7f0000003700)={0x77359400}) 12:22:01 executing program 1: syz_mount_image$ext4(&(0x7f0000000740)='ext4\x00', &(0x7f0000000100)='./bus\x00', 0x804810, &(0x7f0000000180)=ANY=[@ANYBLOB="0061021d307a961da7401271e3fa98008000001d3902ccfd562158cb15c016093893c9e4abd02bc4f1492514fa2dfebc8001000080000000008a1049ca0000"], 0x1, 0x73b, &(0x7f0000000780)="$eJzs3M9rHHUbAPBnptn+zPtuXngP6kGEFloonSTNpT0ZL94KhYLXGpJJCJlkQ3ZTm1iw9SzU5qIgiN49ehVK/QO8SUHBuyBa40G8rMxmk9q4u922Sbeknw9M5/nOj32epzv5ZgcyG8BL643ynyRiOCIuR0S1vT2NiMOt6GjEza3jNh/cmC6XJJrNK78m5Wmx2azuvFbSXp+I1inxSkTcq0Sc/fDfeetr6wtTRZGvtMejjcXl0fra+rn5xam5fC5fGp+4OHZhYuLC2MSe9XrqnYvH7nz39sbG9183br8+dC6JyVbf0e5tzxL9w9b/SSUmd21f2o9kA5QMugAAAPpSfs4/FBFDrU+p1TjUigAAAICDpHmkCQAAABx4SQy6AgAAAGB/bf8dwPazvfv1HGw3v7wVESOd8g+1niGOOBqViDi+mTzyZEKydRo8k5u3IuLuZIfrL2lff09vbNfYM9Ivnrvl/DPZaf5Jd+af6DD/DG1/d8Iz6j7/Pcx/qMv8d7nPHN98/mqla/5bEa8Ndcqf7ORPuuR/t8/8tzc+utNtX/PLiNMdf/8kj+Tq8f0Qo7PzRc8frXt/nbnfq//j3fInvftf7rP/9zd/X+g2l5T5z5zs/f53yl9eEx+360gj4k57XY43duU4ufjDt736n+nS/+Pe/y/67P+nr45c7/NQAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAaEkjYjiSNNuJ0zTLIk5ExP/jeFrU6o2zs7XVpZlyX8RIVNLZ+SIfi4jq1jgpx+Ot+OH4/K7xRET878djW0nnizybrhUzg24eAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAACAHSciYjiSNIuINCL+qKZplg26KgAAAGDPjQy6AAAAAGDfuf8HAACAg+9p7/+TPa4DAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAONAuX7pULs3NBzemy/HMtbXVhdq1czN5fSFbXJ3Opmsry9lcrTZX5Nl0bfFxr1fUasvjF2P1+mgjrzdG62vrVxdrq0uNq/OLU3P51bzyXLoCAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAADgSQ23liTNIiJtxWmaZRH/iYiRqCSz80U+FhH/jYj71cqRcjw+6KIBAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAADYc/W19YWposhXBALBcws+iIgXoIwewaBnJgAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAABqG+tr4wVRT5Sn3QlQAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAADBY6c9JRJTL6eqp4d17Dyd/VlvriHjvsyufXJ9qNFbGy+2/7WxvfNrefn4Q9QMAAMBL4c0nOXj7Pn37Ph4AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAKBf9bX1hamiyFf2MRh0jwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAwNP5OwAA//9JjsXQ") chdir(&(0x7f0000000080)='./file0\x00') open(&(0x7f00000000c0)='./bus\x00', 0x14da42, 0x0) mount(&(0x7f0000000380)=@loop={'/dev/loop', 0x0}, &(0x7f00000003c0)='./bus\x00', 0x0, 0x1000, 0x0) r0 = open(&(0x7f0000000400)='./bus\x00', 0x0, 0x0) ioctl$LOOP_SET_STATUS(r0, 0x4c02, &(0x7f00000001c0)={0x0, {}, 0x0, {}, 0xff, 0x0, 0x0, 0x0, "be8176c9e6755a48a3c0230dd390efe12f8306bed95b2afd402aae879978d959ff9009eec610d9108ea036456bb79e26ee42d0a34968c1fdbb33e8ad5860f632", "b948757aa008fae13adca739a9f126462ab528ea52e90ce2cf50a4ef2568375b"}) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='blkio.throttle.io_service_bytes\x00', 0x275a, 0x500000000000000) 12:22:01 executing program 0: r0 = socket$unix(0x1, 0x2, 0x0) r1 = socket$can_bcm(0x1d, 0x2, 0x2) connect$can_bcm(r1, &(0x7f0000000000), 0x10) ioctl$sock_kcm_SIOCKCMUNATTACH(0xffffffffffffffff, 0x89e1, 0xffffffffffffffff) getsockopt$inet_sctp_SCTP_PEER_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1a, &(0x7f0000000380)={0x0, 0x80, "f29c5b753353d9c7798811e57823354f32d6cb0899a53381003e4f8dbbb1ea469076c8e175a20b45443f885afb38b83813d5e013d4fad662f1582b23328b4ed70ad9d7d4d0052d0147d8b0ac4910985bec8aa8956c599d291a7da55fec010801d8f02dcff373f52f59f867378c13f4a080938c965846a7e8229b410b3ea0f9ce"}, &(0x7f00000002c0)=0x88) socket$igmp6(0xa, 0x3, 0x2) perf_event_open(&(0x7f0000000500)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x15, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) close(0xffffffffffffffff) socket$inet_mptcp(0x2, 0x1, 0x106) connect$can_bcm(0xffffffffffffffff, &(0x7f0000000000), 0x10) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, 0x0) bind$unix(r0, &(0x7f00000005c0)=@abs={0x1}, 0x6e) syz_clone(0x40000000, &(0x7f00000000c0), 0x0, 0x0, &(0x7f00000001c0), 0x0) 12:22:01 executing program 3: socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000002380)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$tipc(r0, &(0x7f0000002600)={0x0, 0x0, 0x0}, 0x0) 12:22:01 executing program 2: open(&(0x7f0000000400)='./bus\x00', 0x14103e, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$L2TP_CMD_SESSION_MODIFY(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000080)={0x30, r1, 0x1, 0x0, 0x0, {}, [@L2TP_ATTR_SEND_SEQ={0x5}, @L2TP_ATTR_IFNAME={0x14, 0x8, 'veth1_to_hsr\x00'}]}, 0x30}, 0x1, 0x6}, 0x0) 12:22:01 executing program 4: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x82, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket(0x10, 0x803, 0x0) sendto(r0, &(0x7f00000000c0)="120000001200e7ef007b00000000000000a1", 0x12, 0x0, 0x0, 0x0) recvmmsg(r0, &(0x7f00000037c0)=[{{&(0x7f00000004c0)=@ethernet={0x0, @random}, 0x80, &(0x7f0000000380)=[{&(0x7f0000000040)=""/95, 0x5f}, {&(0x7f0000000140)=""/85, 0x55}, {&(0x7f0000000fc0)=""/4096, 0x1000}, {&(0x7f0000000400)=""/106, 0x6a}, {&(0x7f0000000740)=""/73, 0x49}, {&(0x7f0000000200)=""/77, 0x4d}, {0x0}], 0x7, &(0x7f0000000600)=""/191, 0xbf}, 0xf00}], 0x1, 0x0, &(0x7f0000003700)={0x77359400}) 12:22:01 executing program 3: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$ieee802154(&(0x7f0000000180), r0) r2 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$IEEE802154_ADD_IFACE(r2, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000380)={&(0x7f0000000340)={0x14, r1, 0x1}, 0x14}}, 0x0) [ 1030.138412][ T4879] loop1: detected capacity change from 0 to 2048 12:22:01 executing program 2: open(&(0x7f0000000400)='./bus\x00', 0x14103e, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$L2TP_CMD_SESSION_MODIFY(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000080)={0x30, r1, 0x1, 0x0, 0x0, {}, [@L2TP_ATTR_SEND_SEQ={0x5}, @L2TP_ATTR_IFNAME={0x14, 0x8, 'veth1_to_hsr\x00'}]}, 0x30}, 0x1, 0x7}, 0x0) 12:22:01 executing program 4: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x82, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket(0x10, 0x803, 0x0) sendto(r0, &(0x7f00000000c0)="120000001200e7ef007b00000000000000a1", 0x12, 0x0, 0x0, 0x0) recvmmsg(r0, &(0x7f00000037c0)=[{{&(0x7f00000004c0)=@ethernet={0x0, @random}, 0x80, &(0x7f0000000380)=[{&(0x7f0000000040)=""/95, 0x5f}, {&(0x7f0000000140)=""/85, 0x55}, {&(0x7f0000000fc0)=""/4096, 0x1000}, {&(0x7f0000000400)=""/106, 0x6a}, {&(0x7f0000000740)=""/73, 0x49}, {&(0x7f0000000200)=""/77, 0x4d}, {0x0}], 0x7, &(0x7f0000000600)=""/191, 0xbf}, 0x11b4}], 0x1, 0x0, &(0x7f0000003700)={0x77359400}) [ 1030.280695][ T4879] EXT4-fs (loop1): mounted filesystem 00000000-0000-0000-0000-000000000000 without journal. Quota mode: none. [ 1030.341888][ T4879] ext4 filesystem being mounted at /root/syzkaller-testdir1539738704/syzkaller.ao1jj3/3813/bus supports timestamps until 2038 (0x7fffffff) [ 1030.515081][ T3128] EXT4-fs (loop1): unmounting filesystem 00000000-0000-0000-0000-000000000000. 12:22:02 executing program 5: r0 = socket$unix(0x1, 0x2, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f0000000100)={'vcan0\x00', 0x0}) r2 = socket$can_bcm(0x1d, 0x2, 0x2) connect$can_bcm(r2, &(0x7f0000000000), 0x10) ioctl$sock_kcm_SIOCKCMUNATTACH(0xffffffffffffffff, 0x89e1, 0xffffffffffffffff) ioctl$sock_SIOCSPGRP(0xffffffffffffffff, 0x8902, 0x0) sendmsg$can_bcm(r2, &(0x7f0000000480)={&(0x7f0000000340)={0x1d, r1, 0x3f420f00}, 0x10, &(0x7f0000000040)={&(0x7f0000000580)=ANY=[@ANYBLOB="01000000d7fe68ca0000e9ffffff0000", @ANYRES64=0x0, @ANYRES64=0x0, @ANYRES64=0x0, @ANYRES64=r0, @ANYBLOB="3bf81bb9f1"], 0x20000600}}, 0x0) r3 = socket(0x0, 0x800, 0x0) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r3, 0x541b, &(0x7f00000000c0)={'ip6_vti0\x00', 0x0}) sendmsg$IPCTNL_MSG_EXP_DELETE(r3, &(0x7f00000004c0)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x40000040}, 0xc, &(0x7f0000000440)={&(0x7f00000006c0)={0x1d0, 0x2, 0x2, 0x201, 0x0, 0x0, {0xa}, [@CTA_EXPECT_NAT={0xc0, 0xa, 0x0, 0x1, [@CTA_EXPECT_NAT_TUPLE={0xc, 0x2, 0x0, 0x1, [@CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x1}]}, @CTA_EXPECT_NAT_TUPLE={0x70, 0x2, 0x0, 0x1, [@CTA_TUPLE_IP={0x2c, 0x1, 0x0, 0x1, @ipv6={{0x14, 0x3, @loopback}, {0x14, 0x4, @private0}}}, @CTA_TUPLE_IP={0x14, 0x1, 0x0, 0x1, @ipv4={{0x8, 0x1, @empty}, {0x8, 0x2, @initdev={0xac, 0x1e, 0x1, 0x0}}}}, @CTA_TUPLE_IP={0x14, 0x1, 0x0, 0x1, @ipv4={{0x8, 0x1, @local}, {0x8, 0x2, @loopback}}}, @CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x4}, @CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x3}, @CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x1}]}, @CTA_EXPECT_NAT_TUPLE={0x38, 0x2, 0x0, 0x1, [@CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5, 0x1, 0x88}}, @CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x3}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5, 0x1, 0x21}}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5, 0x1, 0x1}}, @CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x3}]}, @CTA_EXPECT_NAT_DIR={0x8}]}, @CTA_EXPECT_MASTER={0x20, 0x1, 0x0, 0x1, [@CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x1}, @CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x2}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5, 0x1, 0x84}}]}, @CTA_EXPECT_MASTER={0xdc, 0x1, 0x0, 0x1, [@CTA_TUPLE_IP={0x14, 0x1, 0x0, 0x1, @ipv4={{0x8, 0x1, @multicast1}, {0x8, 0x2, @dev={0xac, 0x14, 0x14, 0x3a}}}}, @CTA_TUPLE_ZONE={0x6}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5, 0x1, 0x21}}, @CTA_TUPLE_IP={0x14, 0x1, 0x0, 0x1, @ipv4={{0x8, 0x1, @empty}, {0x8, 0x2, @local}}}, @CTA_TUPLE_IP={0x2c, 0x1, 0x0, 0x1, @ipv6={{0x14, 0x3, @private1={0xfc, 0x1, '\x00', 0x1}}, {0x14, 0x4, @rand_addr=' \x01\x00'}}}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5, 0x1, 0x1}}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5, 0x1, 0x88}}, @CTA_TUPLE_IP={0x2c, 0x1, 0x0, 0x1, @ipv6={{0x14, 0x3, @empty}, {0x14, 0x4, @dev={0xfe, 0x80, '\x00', 0x21}}}}, @CTA_TUPLE_IP={0x2c, 0x1, 0x0, 0x1, @ipv6={{0x14, 0x3, @local}, {0x14, 0x4, @ipv4={'\x00', '\xff\xff', @rand_addr=0x64010100}}}}]}]}, 0x1d0}}, 0x48000) perf_event_open(&(0x7f0000000500)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x15, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$binfmt_elf32(0xffffffffffffffff, &(0x7f0000000040)=ANY=[], 0x69) connect$can_bcm(0xffffffffffffffff, &(0x7f0000000000), 0x10) sendmsg$can_bcm(0xffffffffffffffff, &(0x7f0000000480)={&(0x7f0000000340)={0x1d, 0x0, 0x3f420f00}, 0x10, &(0x7f0000000040)={&(0x7f0000000580)=ANY=[@ANYBLOB="01000000d7fe68ca0000e9ffffff0000", @ANYRES64=0x0, @ANYRES64=0x0, @ANYRES64=0x0, @ANYRES64], 0x20000600}}, 0x0) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(0xffffffffffffffff, 0x89f0, &(0x7f0000000280)={'gretap0\x00', &(0x7f0000000240)={'ip_vti0\x00', 0x0, 0x7, 0x80, 0xfffffff7, 0x7, {{0x8, 0x4, 0x0, 0x5, 0x20, 0x67, 0x0, 0xc0, 0x29, 0x0, @local, @empty, {[@timestamp={0x44, 0xc, 0x8, 0x0, 0x2, [0x7f, 0x1]}]}}}}}) socket(0x10, 0x3, 0x0) process_mrelease(0xffffffffffffffff, 0x0) r4 = socket$packet(0x11, 0x2, 0x300) ioctl$sock_SIOCGIFINDEX(r4, 0x8933, 0x0) getsockopt$inet_sctp_SCTP_RECVNXTINFO(r3, 0x84, 0x21, &(0x7f0000000140), &(0x7f0000000200)=0x4) bind$unix(r0, &(0x7f00000005c0)=@abs={0x1, 0x0, 0x4e23}, 0x6e) syz_clone(0x40000000, &(0x7f00000000c0), 0x0, 0x0, &(0x7f00000001c0), 0x0) 12:22:02 executing program 3: futimesat(0xffffffffffffffff, 0x0, &(0x7f0000000640)={{}, {0x77359400}}) 12:22:02 executing program 4: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x82, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket(0x10, 0x803, 0x0) sendto(r0, &(0x7f00000000c0)="120000001200e7ef007b00000000000000a1", 0x12, 0x0, 0x0, 0x0) recvmmsg(r0, &(0x7f00000037c0)=[{{&(0x7f00000004c0)=@ethernet={0x0, @random}, 0x80, &(0x7f0000000380)=[{&(0x7f0000000040)=""/95, 0x5f}, {&(0x7f0000000140)=""/85, 0x55}, {&(0x7f0000000fc0)=""/4096, 0x1000}, {&(0x7f0000000400)=""/106, 0x6a}, {&(0x7f0000000740)=""/73, 0x49}, {&(0x7f0000000200)=""/77, 0x4d}, {0x0}], 0x7, &(0x7f0000000600)=""/191, 0xbf}, 0x2000}], 0x1, 0x0, &(0x7f0000003700)={0x77359400}) 12:22:02 executing program 2: open(&(0x7f0000000400)='./bus\x00', 0x14103e, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$L2TP_CMD_SESSION_MODIFY(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000080)={0x30, r1, 0x1, 0x0, 0x0, {}, [@L2TP_ATTR_SEND_SEQ={0x5}, @L2TP_ATTR_IFNAME={0x14, 0x8, 'veth1_to_hsr\x00'}]}, 0x30}, 0x1, 0x8}, 0x0) 12:22:02 executing program 1: syz_mount_image$ext4(&(0x7f0000000740)='ext4\x00', &(0x7f0000000100)='./bus\x00', 0x804810, &(0x7f0000000180)=ANY=[@ANYBLOB="0061021d307a961da7401271e3fa98008000001d3902ccfd562158cb15c016093893c9e4abd02bc4f1492514fa2dfebc8001000080000000008a1049ca0000"], 0x1, 0x73b, &(0x7f0000000780)="$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") chdir(&(0x7f0000000080)='./file0\x00') open(&(0x7f00000000c0)='./bus\x00', 0x14da42, 0x0) mount(&(0x7f0000000380)=@loop={'/dev/loop', 0x0}, &(0x7f00000003c0)='./bus\x00', 0x0, 0x1000, 0x0) r0 = open(&(0x7f0000000400)='./bus\x00', 0x0, 0x0) ioctl$LOOP_SET_STATUS(r0, 0x4c02, &(0x7f00000001c0)={0x0, {}, 0x0, {}, 0xff, 0x0, 0x0, 0x0, "be8176c9e6755a48a3c0230dd390efe12f8306bed95b2afd402aae879978d959ff9009eec610d9108ea036456bb79e26ee42d0a34968c1fdbb33e8ad5860f632", "b948757aa008fae13adca739a9f126462ab528ea52e90ce2cf50a4ef2568375b"}) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='blkio.throttle.io_service_bytes\x00', 0x275a, 0x600000000000000) [ 1031.040274][ T4908] loop1: detected capacity change from 0 to 2048 12:22:02 executing program 0: r0 = socket$unix(0x1, 0x2, 0x0) r1 = socket$can_bcm(0x1d, 0x2, 0x2) connect$can_bcm(r1, &(0x7f0000000000), 0x10) ioctl$sock_kcm_SIOCKCMUNATTACH(0xffffffffffffffff, 0x89e1, 0xffffffffffffffff) getsockopt$inet_sctp_SCTP_PEER_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1a, &(0x7f0000000380)={0x0, 0x80, "f29c5b753353d9c7798811e57823354f32d6cb0899a53381003e4f8dbbb1ea469076c8e175a20b45443f885afb38b83813d5e013d4fad662f1582b23328b4ed70ad9d7d4d0052d0147d8b0ac4910985bec8aa8956c599d291a7da55fec010801d8f02dcff373f52f59f867378c13f4a080938c965846a7e8229b410b3ea0f9ce"}, &(0x7f00000002c0)=0x88) socket$igmp6(0xa, 0x3, 0x2) perf_event_open(&(0x7f0000000500)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x15, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) close(0xffffffffffffffff) socket$inet_mptcp(0x2, 0x1, 0x106) connect$can_bcm(0xffffffffffffffff, &(0x7f0000000000), 0x10) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, 0x0) bind$unix(r0, &(0x7f00000005c0)=@abs={0x1}, 0x6e) syz_clone(0x40000000, &(0x7f00000000c0), 0x0, 0x0, &(0x7f00000001c0), 0x0) 12:22:02 executing program 3: r0 = add_key$keyring(&(0x7f0000000000), &(0x7f0000000040)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffd) r1 = add_key$keyring(&(0x7f0000000240), &(0x7f0000000280)={'syz', 0x2}, 0x0, 0x0, r0) keyctl$search(0xa, r1, &(0x7f0000000140)='logon\x00', &(0x7f0000000180)={'syz', 0x1}, 0x0) 12:22:02 executing program 2: open(&(0x7f0000000400)='./bus\x00', 0x14103e, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$L2TP_CMD_SESSION_MODIFY(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000080)={0x30, r1, 0x1, 0x0, 0x0, {}, [@L2TP_ATTR_SEND_SEQ={0x5}, @L2TP_ATTR_IFNAME={0x14, 0x8, 'veth1_to_hsr\x00'}]}, 0x30}, 0x1, 0x9}, 0x0) 12:22:02 executing program 4: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x82, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket(0x10, 0x803, 0x0) sendto(r0, &(0x7f00000000c0)="120000001200e7ef007b00000000000000a1", 0x12, 0x0, 0x0, 0x0) recvmmsg(r0, &(0x7f00000037c0)=[{{&(0x7f00000004c0)=@ethernet={0x0, @random}, 0x80, &(0x7f0000000380)=[{&(0x7f0000000040)=""/95, 0x5f}, {&(0x7f0000000140)=""/85, 0x55}, {&(0x7f0000000fc0)=""/4096, 0x1000}, {&(0x7f0000000400)=""/106, 0x6a}, {&(0x7f0000000740)=""/73, 0x49}, {&(0x7f0000000200)=""/77, 0x4d}, {0x0}], 0x7, &(0x7f0000000600)=""/191, 0xbf}, 0x4000}], 0x1, 0x0, &(0x7f0000003700)={0x77359400}) 12:22:02 executing program 3: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX(r0, 0x84, 0x6e, &(0x7f0000000000)=[@in={0x2, 0x0, @rand_addr=0x64010100}], 0x10) 12:22:02 executing program 2: open(&(0x7f0000000400)='./bus\x00', 0x14103e, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$L2TP_CMD_SESSION_MODIFY(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000080)={0x30, r1, 0x1, 0x0, 0x0, {}, [@L2TP_ATTR_SEND_SEQ={0x5}, @L2TP_ATTR_IFNAME={0x14, 0x8, 'veth1_to_hsr\x00'}]}, 0x30}, 0x1, 0xf}, 0x0) 12:22:02 executing program 4: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x82, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket(0x10, 0x803, 0x0) sendto(r0, &(0x7f00000000c0)="120000001200e7ef007b00000000000000a1", 0x12, 0x0, 0x0, 0x0) recvmmsg(r0, &(0x7f00000037c0)=[{{&(0x7f00000004c0)=@ethernet={0x0, @random}, 0x80, &(0x7f0000000380)=[{&(0x7f0000000040)=""/95, 0x5f}, {&(0x7f0000000140)=""/85, 0x55}, {&(0x7f0000000fc0)=""/4096, 0x1000}, {&(0x7f0000000400)=""/106, 0x6a}, {&(0x7f0000000740)=""/73, 0x49}, {&(0x7f0000000200)=""/77, 0x4d}, {0x0}], 0x7, &(0x7f0000000600)=""/191, 0xbf}, 0x4788}], 0x1, 0x0, &(0x7f0000003700)={0x77359400}) [ 1031.180927][ T4908] EXT4-fs (loop1): mounted filesystem 00000000-0000-0000-0000-000000000000 without journal. Quota mode: none. [ 1031.192890][ T4908] ext4 filesystem being mounted at /root/syzkaller-testdir1539738704/syzkaller.ao1jj3/3814/bus supports timestamps until 2038 (0x7fffffff) [ 1031.313283][ T4908] loop1: detected capacity change from 2048 to 2047 [ 1031.388712][ T3128] EXT4-fs (loop1): unmounting filesystem 00000000-0000-0000-0000-000000000000. 12:22:05 executing program 5: r0 = socket$unix(0x1, 0x2, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f0000000100)={'vcan0\x00', 0x0}) r2 = socket$can_bcm(0x1d, 0x2, 0x2) connect$can_bcm(r2, &(0x7f0000000000), 0x10) ioctl$sock_kcm_SIOCKCMUNATTACH(0xffffffffffffffff, 0x89e1, 0xffffffffffffffff) ioctl$sock_SIOCSPGRP(0xffffffffffffffff, 0x8902, 0x0) sendmsg$can_bcm(r2, &(0x7f0000000480)={&(0x7f0000000340)={0x1d, r1, 0x3f420f00}, 0x10, &(0x7f0000000040)={&(0x7f0000000580)=ANY=[@ANYBLOB="01000000d7fe68ca0000e9ffffff0000", @ANYRES64=0x0, @ANYRES64=0x0, @ANYRES64=0x0, @ANYRES64=r0, @ANYBLOB="3bf81bb9f1"], 0x20000600}}, 0x0) r3 = socket(0x0, 0x800, 0x40000) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(0xffffffffffffffff, 0x541b, &(0x7f00000000c0)={'ip6_vti0\x00', 0x0}) sendmsg$IPCTNL_MSG_EXP_DELETE(r3, &(0x7f00000004c0)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x40000040}, 0xc, &(0x7f0000000440)={&(0x7f00000006c0)={0x1d0, 0x2, 0x2, 0x201, 0x0, 0x0, {0xa}, [@CTA_EXPECT_NAT={0xc0, 0xa, 0x0, 0x1, [@CTA_EXPECT_NAT_TUPLE={0xc, 0x2, 0x0, 0x1, [@CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x1}]}, @CTA_EXPECT_NAT_TUPLE={0x70, 0x2, 0x0, 0x1, [@CTA_TUPLE_IP={0x2c, 0x1, 0x0, 0x1, @ipv6={{0x14, 0x3, @loopback}, {0x14, 0x4, @private0}}}, @CTA_TUPLE_IP={0x14, 0x1, 0x0, 0x1, @ipv4={{0x8, 0x1, @empty}, {0x8, 0x2, @initdev={0xac, 0x1e, 0x1, 0x0}}}}, @CTA_TUPLE_IP={0x14, 0x1, 0x0, 0x1, @ipv4={{0x8, 0x1, @local}, {0x8, 0x2, @loopback}}}, @CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x4}, @CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x3}, @CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x1}]}, @CTA_EXPECT_NAT_TUPLE={0x38, 0x2, 0x0, 0x1, [@CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5, 0x1, 0x88}}, @CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x3}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5, 0x1, 0x21}}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5, 0x1, 0x1}}, @CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x3}]}, @CTA_EXPECT_NAT_DIR={0x8}]}, @CTA_EXPECT_MASTER={0x20, 0x1, 0x0, 0x1, [@CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x1}, @CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x2}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5, 0x1, 0x84}}]}, @CTA_EXPECT_MASTER={0xdc, 0x1, 0x0, 0x1, [@CTA_TUPLE_IP={0x14, 0x1, 0x0, 0x1, @ipv4={{0x8, 0x1, @multicast1}, {0x8, 0x2, @dev={0xac, 0x14, 0x14, 0x3a}}}}, @CTA_TUPLE_ZONE={0x6}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5, 0x1, 0x21}}, @CTA_TUPLE_IP={0x14, 0x1, 0x0, 0x1, @ipv4={{0x8, 0x1, @empty}, {0x8, 0x2, @local}}}, @CTA_TUPLE_IP={0x2c, 0x1, 0x0, 0x1, @ipv6={{0x14, 0x3, @private1={0xfc, 0x1, '\x00', 0x1}}, {0x14, 0x4, @rand_addr=' \x01\x00'}}}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5, 0x1, 0x1}}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5, 0x1, 0x88}}, @CTA_TUPLE_IP={0x2c, 0x1, 0x0, 0x1, @ipv6={{0x14, 0x3, @empty}, {0x14, 0x4, @dev={0xfe, 0x80, '\x00', 0x21}}}}, @CTA_TUPLE_IP={0x2c, 0x1, 0x0, 0x1, @ipv6={{0x14, 0x3, @local}, {0x14, 0x4, @ipv4={'\x00', '\xff\xff', @rand_addr=0x64010100}}}}]}]}, 0x1d0}}, 0x48000) perf_event_open(&(0x7f0000000500)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x15, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$binfmt_elf32(0xffffffffffffffff, &(0x7f0000000040)=ANY=[], 0x69) connect$can_bcm(0xffffffffffffffff, &(0x7f0000000000), 0x10) sendmsg$can_bcm(0xffffffffffffffff, &(0x7f0000000480)={&(0x7f0000000340)={0x1d, 0x0, 0x3f420f00}, 0x10, &(0x7f0000000040)={&(0x7f0000000580)=ANY=[@ANYBLOB="01000000d7fe68ca0000e9ffffff0000", @ANYRES64=0x0, @ANYRES64=0x0, @ANYRES64=0x0, @ANYRES64], 0x20000600}}, 0x0) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(0xffffffffffffffff, 0x89f0, &(0x7f0000000280)={'gretap0\x00', &(0x7f0000000240)={'ip_vti0\x00', 0x0, 0x7, 0x80, 0xfffffff7, 0x7, {{0x8, 0x4, 0x0, 0x5, 0x20, 0x67, 0x0, 0xc0, 0x29, 0x0, @local, @empty, {[@timestamp={0x44, 0xc, 0x8, 0x0, 0x2, [0x7f, 0x1]}]}}}}}) socket(0x10, 0x3, 0x0) process_mrelease(0xffffffffffffffff, 0x0) r4 = socket$packet(0x11, 0x2, 0x300) ioctl$sock_SIOCGIFINDEX(r4, 0x8933, 0x0) getsockopt$inet_sctp_SCTP_RECVNXTINFO(r3, 0x84, 0x21, &(0x7f0000000140), &(0x7f0000000200)=0x4) bind$unix(r0, &(0x7f00000005c0)=@abs={0x1, 0x0, 0x4e23}, 0x6e) syz_clone(0x40000000, &(0x7f00000000c0), 0x0, 0x0, &(0x7f00000001c0), 0x0) 12:22:05 executing program 4: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x82, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket(0x10, 0x803, 0x0) sendto(r0, &(0x7f00000000c0)="120000001200e7ef007b00000000000000a1", 0x12, 0x0, 0x0, 0x0) recvmmsg(r0, &(0x7f00000037c0)=[{{&(0x7f00000004c0)=@ethernet={0x0, @random}, 0x80, &(0x7f0000000380)=[{&(0x7f0000000040)=""/95, 0x5f}, {&(0x7f0000000140)=""/85, 0x55}, {&(0x7f0000000fc0)=""/4096, 0x1000}, {&(0x7f0000000400)=""/106, 0x6a}, {&(0x7f0000000740)=""/73, 0x49}, {&(0x7f0000000200)=""/77, 0x4d}, {0x0}], 0x7, &(0x7f0000000600)=""/191, 0xbf}, 0x4888}], 0x1, 0x0, &(0x7f0000003700)={0x77359400}) 12:22:05 executing program 1: syz_mount_image$ext4(&(0x7f0000000740)='ext4\x00', &(0x7f0000000100)='./bus\x00', 0x804810, &(0x7f0000000180)=ANY=[@ANYBLOB="0061021d307a961da7401271e3fa98008000001d3902ccfd562158cb15c016093893c9e4abd02bc4f1492514fa2dfebc8001000080000000008a1049ca0000"], 0x1, 0x73b, &(0x7f0000000780)="$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") chdir(&(0x7f0000000080)='./file0\x00') open(&(0x7f00000000c0)='./bus\x00', 0x14da42, 0x0) mount(&(0x7f0000000380)=@loop={'/dev/loop', 0x0}, &(0x7f00000003c0)='./bus\x00', 0x0, 0x1000, 0x0) r0 = open(&(0x7f0000000400)='./bus\x00', 0x0, 0x0) ioctl$LOOP_SET_STATUS(r0, 0x4c02, &(0x7f00000001c0)={0x0, {}, 0x0, {}, 0xff, 0x0, 0x0, 0x0, "be8176c9e6755a48a3c0230dd390efe12f8306bed95b2afd402aae879978d959ff9009eec610d9108ea036456bb79e26ee42d0a34968c1fdbb33e8ad5860f632", "b948757aa008fae13adca739a9f126462ab528ea52e90ce2cf50a4ef2568375b"}) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='blkio.throttle.io_service_bytes\x00', 0x275a, 0x604000000000000) 12:22:05 executing program 2: open(&(0x7f0000000400)='./bus\x00', 0x14103e, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$L2TP_CMD_SESSION_MODIFY(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000080)={0x30, r1, 0x1, 0x0, 0x0, {}, [@L2TP_ATTR_SEND_SEQ={0x5}, @L2TP_ATTR_IFNAME={0x14, 0x8, 'veth1_to_hsr\x00'}]}, 0x30}, 0x1, 0x13}, 0x0) 12:22:05 executing program 3: socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000100)={0xffffffffffffffff}) connect$tipc(r0, &(0x7f0000000140), 0x10) 12:22:05 executing program 0: r0 = socket$unix(0x1, 0x2, 0x0) r1 = socket$can_bcm(0x1d, 0x2, 0x2) connect$can_bcm(r1, &(0x7f0000000000), 0x10) ioctl$sock_kcm_SIOCKCMUNATTACH(0xffffffffffffffff, 0x89e1, 0xffffffffffffffff) getsockopt$inet_sctp_SCTP_PEER_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1a, &(0x7f0000000380)={0x0, 0x80, "f29c5b753353d9c7798811e57823354f32d6cb0899a53381003e4f8dbbb1ea469076c8e175a20b45443f885afb38b83813d5e013d4fad662f1582b23328b4ed70ad9d7d4d0052d0147d8b0ac4910985bec8aa8956c599d291a7da55fec010801d8f02dcff373f52f59f867378c13f4a080938c965846a7e8229b410b3ea0f9ce"}, &(0x7f00000002c0)=0x88) socket$igmp6(0xa, 0x3, 0x2) perf_event_open(&(0x7f0000000500)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x15, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) close(0xffffffffffffffff) socket$inet_mptcp(0x2, 0x1, 0x106) connect$can_bcm(0xffffffffffffffff, &(0x7f0000000000), 0x10) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, 0x0) bind$unix(r0, &(0x7f00000005c0)=@abs={0x1, 0x0, 0x4e23}, 0x6e) syz_clone(0x0, &(0x7f00000000c0), 0x0, 0x0, &(0x7f00000001c0), 0x0) 12:22:05 executing program 2: open(&(0x7f0000000400)='./bus\x00', 0x14103e, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$L2TP_CMD_SESSION_MODIFY(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000080)={0x30, r1, 0x1, 0x0, 0x0, {}, [@L2TP_ATTR_SEND_SEQ={0x5}, @L2TP_ATTR_IFNAME={0x14, 0x8, 'veth1_to_hsr\x00'}]}, 0x30}, 0x1, 0x60}, 0x0) 12:22:05 executing program 3: sendmsg$TIPC_CMD_ENABLE_BEARER(0xffffffffffffffff, 0x0, 0x0) 12:22:05 executing program 2: open(&(0x7f0000000400)='./bus\x00', 0x14103e, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$L2TP_CMD_SESSION_MODIFY(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000080)={0x30, r1, 0x1, 0x0, 0x0, {}, [@L2TP_ATTR_SEND_SEQ={0x5}, @L2TP_ATTR_IFNAME={0x14, 0x8, 'veth1_to_hsr\x00'}]}, 0x30}, 0x1, 0x300}, 0x0) 12:22:05 executing program 4: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x82, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket(0x10, 0x803, 0x0) sendto(r0, &(0x7f00000000c0)="120000001200e7ef007b00000000000000a1", 0x12, 0x0, 0x0, 0x0) recvmmsg(r0, &(0x7f00000037c0)=[{{&(0x7f00000004c0)=@ethernet={0x0, @random}, 0x80, &(0x7f0000000380)=[{&(0x7f0000000040)=""/95, 0x5f}, {&(0x7f0000000140)=""/85, 0x55}, {&(0x7f0000000fc0)=""/4096, 0x1000}, {&(0x7f0000000400)=""/106, 0x6a}, {&(0x7f0000000740)=""/73, 0x49}, {&(0x7f0000000200)=""/77, 0x4d}, {0x0}], 0x7, &(0x7f0000000600)=""/191, 0xbf}, 0x5865}], 0x1, 0x0, &(0x7f0000003700)={0x77359400}) 12:22:05 executing program 2: open(&(0x7f0000000400)='./bus\x00', 0x14103e, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$L2TP_CMD_SESSION_MODIFY(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000080)={0x30, r1, 0x1, 0x0, 0x0, {}, [@L2TP_ATTR_SEND_SEQ={0x5}, @L2TP_ATTR_IFNAME={0x14, 0x8, 'veth1_to_hsr\x00'}]}, 0x30}, 0x1, 0x500}, 0x0) [ 1034.162767][ T4934] loop1: detected capacity change from 0 to 2048 12:22:05 executing program 3: r0 = socket$igmp(0x2, 0x3, 0x2) setsockopt$MRT_DEL_VIF(r0, 0x0, 0xcb, &(0x7f0000000480)={0x0, 0x0, 0x0, 0x0, @vifc_lcl_ifindex, @loopback}, 0x10) setsockopt$MRT_TABLE(r0, 0x0, 0xcf, &(0x7f0000000080)=0xfc, 0x4) [ 1034.235320][ T4934] EXT4-fs (loop1): mounted filesystem 00000000-0000-0000-0000-000000000000 without journal. Quota mode: none. [ 1034.253856][ T4934] ext4 filesystem being mounted at /root/syzkaller-testdir1539738704/syzkaller.ao1jj3/3815/bus supports timestamps until 2038 (0x7fffffff) [ 1034.405759][ T4934] loop1: detected capacity change from 2048 to 2047 12:22:06 executing program 5: r0 = socket$unix(0x1, 0x2, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f0000000100)={'vcan0\x00', 0x0}) r2 = socket$can_bcm(0x1d, 0x2, 0x2) connect$can_bcm(r2, &(0x7f0000000000), 0x10) ioctl$sock_kcm_SIOCKCMUNATTACH(0xffffffffffffffff, 0x89e1, 0xffffffffffffffff) ioctl$sock_SIOCSPGRP(0xffffffffffffffff, 0x8902, 0x0) sendmsg$can_bcm(r2, &(0x7f0000000480)={&(0x7f0000000340)={0x1d, r1, 0x3f420f00}, 0x10, &(0x7f0000000040)={&(0x7f0000000580)=ANY=[@ANYBLOB="01000000d7fe68ca0000e9ffffff0000", @ANYRES64=0x0, @ANYRES64=0x0, @ANYRES64=0x0, @ANYRES64=r0, @ANYBLOB="3bf81bb9f1"], 0x20000600}}, 0x0) r3 = socket(0x0, 0x800, 0x40000) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(0xffffffffffffffff, 0x541b, &(0x7f00000000c0)={'ip6_vti0\x00', 0x0}) sendmsg$IPCTNL_MSG_EXP_DELETE(r3, &(0x7f00000004c0)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x40000040}, 0xc, &(0x7f0000000440)={&(0x7f00000006c0)={0x1d0, 0x2, 0x2, 0x201, 0x0, 0x0, {0xa}, [@CTA_EXPECT_NAT={0xc0, 0xa, 0x0, 0x1, [@CTA_EXPECT_NAT_TUPLE={0xc, 0x2, 0x0, 0x1, [@CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x1}]}, @CTA_EXPECT_NAT_TUPLE={0x70, 0x2, 0x0, 0x1, [@CTA_TUPLE_IP={0x2c, 0x1, 0x0, 0x1, @ipv6={{0x14, 0x3, @loopback}, {0x14, 0x4, @private0}}}, @CTA_TUPLE_IP={0x14, 0x1, 0x0, 0x1, @ipv4={{0x8, 0x1, @empty}, {0x8, 0x2, @initdev={0xac, 0x1e, 0x1, 0x0}}}}, @CTA_TUPLE_IP={0x14, 0x1, 0x0, 0x1, @ipv4={{0x8, 0x1, @local}, {0x8, 0x2, @loopback}}}, @CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x4}, @CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x3}, @CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x1}]}, @CTA_EXPECT_NAT_TUPLE={0x38, 0x2, 0x0, 0x1, [@CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5, 0x1, 0x88}}, @CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x3}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5, 0x1, 0x21}}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5, 0x1, 0x1}}, @CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x3}]}, @CTA_EXPECT_NAT_DIR={0x8}]}, @CTA_EXPECT_MASTER={0x20, 0x1, 0x0, 0x1, [@CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x1}, @CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x2}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5, 0x1, 0x84}}]}, @CTA_EXPECT_MASTER={0xdc, 0x1, 0x0, 0x1, [@CTA_TUPLE_IP={0x14, 0x1, 0x0, 0x1, @ipv4={{0x8, 0x1, @multicast1}, {0x8, 0x2, @dev={0xac, 0x14, 0x14, 0x3a}}}}, @CTA_TUPLE_ZONE={0x6}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5, 0x1, 0x21}}, @CTA_TUPLE_IP={0x14, 0x1, 0x0, 0x1, @ipv4={{0x8, 0x1, @empty}, {0x8, 0x2, @local}}}, @CTA_TUPLE_IP={0x2c, 0x1, 0x0, 0x1, @ipv6={{0x14, 0x3, @private1={0xfc, 0x1, '\x00', 0x1}}, {0x14, 0x4, @rand_addr=' \x01\x00'}}}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5, 0x1, 0x1}}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5, 0x1, 0x88}}, @CTA_TUPLE_IP={0x2c, 0x1, 0x0, 0x1, @ipv6={{0x14, 0x3, @empty}, {0x14, 0x4, @dev={0xfe, 0x80, '\x00', 0x21}}}}, @CTA_TUPLE_IP={0x2c, 0x1, 0x0, 0x1, @ipv6={{0x14, 0x3, @local}, {0x14, 0x4, @ipv4={'\x00', '\xff\xff', @rand_addr=0x64010100}}}}]}]}, 0x1d0}}, 0x48000) perf_event_open(&(0x7f0000000500)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x15, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$binfmt_elf32(0xffffffffffffffff, &(0x7f0000000040)=ANY=[], 0x69) connect$can_bcm(0xffffffffffffffff, &(0x7f0000000000), 0x10) sendmsg$can_bcm(0xffffffffffffffff, &(0x7f0000000480)={&(0x7f0000000340)={0x1d, 0x0, 0x3f420f00}, 0x10, &(0x7f0000000040)={&(0x7f0000000580)=ANY=[@ANYBLOB="01000000d7fe68ca0000e9ffffff0000", @ANYRES64=0x0, @ANYRES64=0x0, @ANYRES64=0x0, @ANYRES64], 0x20000600}}, 0x0) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(0xffffffffffffffff, 0x89f0, &(0x7f0000000280)={'gretap0\x00', &(0x7f0000000240)={'ip_vti0\x00', 0x0, 0x7, 0x80, 0xfffffff7, 0x7, {{0x8, 0x4, 0x0, 0x5, 0x20, 0x67, 0x0, 0xc0, 0x29, 0x0, @local, @empty, {[@timestamp={0x44, 0xc, 0x8, 0x0, 0x2, [0x7f, 0x1]}]}}}}}) socket(0x10, 0x3, 0x0) process_mrelease(0xffffffffffffffff, 0x0) r4 = socket$packet(0x11, 0x2, 0x300) ioctl$sock_SIOCGIFINDEX(r4, 0x8933, 0x0) getsockopt$inet_sctp_SCTP_RECVNXTINFO(r3, 0x84, 0x21, &(0x7f0000000140), &(0x7f0000000200)=0x4) bind$unix(r0, &(0x7f00000005c0)=@abs={0x1, 0x0, 0x4e23}, 0x6e) syz_clone(0x40000000, &(0x7f00000000c0), 0x0, 0x0, &(0x7f00000001c0), 0x0) 12:22:06 executing program 4: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x82, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket(0x10, 0x803, 0x0) sendto(r0, &(0x7f00000000c0)="120000001200e7ef007b00000000000000a1", 0x12, 0x0, 0x0, 0x0) recvmmsg(r0, &(0x7f00000037c0)=[{{&(0x7f00000004c0)=@ethernet={0x0, @random}, 0x80, &(0x7f0000000380)=[{&(0x7f0000000040)=""/95, 0x5f}, {&(0x7f0000000140)=""/85, 0x55}, {&(0x7f0000000fc0)=""/4096, 0x1000}, {&(0x7f0000000400)=""/106, 0x6a}, {&(0x7f0000000740)=""/73, 0x49}, {&(0x7f0000000200)=""/77, 0x4d}, {0x0}], 0x7, &(0x7f0000000600)=""/191, 0xbf}, 0x6000}], 0x1, 0x0, &(0x7f0000003700)={0x77359400}) 12:22:06 executing program 2: open(&(0x7f0000000400)='./bus\x00', 0x14103e, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$L2TP_CMD_SESSION_MODIFY(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000080)={0x30, r1, 0x1, 0x0, 0x0, {}, [@L2TP_ATTR_SEND_SEQ={0x5}, @L2TP_ATTR_IFNAME={0x14, 0x8, 'veth1_to_hsr\x00'}]}, 0x30}, 0x1, 0x600}, 0x0) 12:22:06 executing program 3: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$ieee802154(&(0x7f0000000200), r0) sendmsg$IEEE802154_LLSEC_GETPARAMS(r1, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000240)={0x1c, r2, 0x1, 0x0, 0x0, {}, [@IEEE802154_ATTR_DEV_INDEX={0x8}]}, 0x1c}}, 0x0) 12:22:06 executing program 0: r0 = socket$unix(0x1, 0x2, 0x0) r1 = socket$can_bcm(0x1d, 0x2, 0x2) connect$can_bcm(r1, &(0x7f0000000000), 0x10) ioctl$sock_kcm_SIOCKCMUNATTACH(0xffffffffffffffff, 0x89e1, 0xffffffffffffffff) getsockopt$inet_sctp_SCTP_PEER_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1a, &(0x7f0000000380)={0x0, 0x80, "f29c5b753353d9c7798811e57823354f32d6cb0899a53381003e4f8dbbb1ea469076c8e175a20b45443f885afb38b83813d5e013d4fad662f1582b23328b4ed70ad9d7d4d0052d0147d8b0ac4910985bec8aa8956c599d291a7da55fec010801d8f02dcff373f52f59f867378c13f4a080938c965846a7e8229b410b3ea0f9ce"}, &(0x7f00000002c0)=0x88) socket$igmp6(0xa, 0x3, 0x2) perf_event_open(&(0x7f0000000500)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x15, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) close(0xffffffffffffffff) socket$inet_mptcp(0x2, 0x1, 0x106) connect$can_bcm(0xffffffffffffffff, &(0x7f0000000000), 0x10) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, 0x0) bind$unix(r0, &(0x7f00000005c0)=@abs={0x1, 0x0, 0x4e23}, 0x6e) syz_clone(0x0, &(0x7f00000000c0), 0x0, 0x0, &(0x7f00000001c0), 0x0) 12:22:06 executing program 1: syz_mount_image$ext4(&(0x7f0000000740)='ext4\x00', &(0x7f0000000100)='./bus\x00', 0x804810, &(0x7f0000000180)=ANY=[@ANYBLOB="0061021d307a961da7401271e3fa98008000001d3902ccfd562158cb15c016093893c9e4abd02bc4f1492514fa2dfebc8001000080000000008a1049ca0000"], 0x1, 0x73b, &(0x7f0000000780)="$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") chdir(&(0x7f0000000080)='./file0\x00') open(&(0x7f00000000c0)='./bus\x00', 0x14da42, 0x0) mount(&(0x7f0000000380)=@loop={'/dev/loop', 0x0}, &(0x7f00000003c0)='./bus\x00', 0x0, 0x1000, 0x0) r0 = open(&(0x7f0000000400)='./bus\x00', 0x0, 0x0) ioctl$LOOP_SET_STATUS(r0, 0x4c02, &(0x7f00000001c0)={0x0, {}, 0x0, {}, 0xff, 0x0, 0x0, 0x0, "be8176c9e6755a48a3c0230dd390efe12f8306bed95b2afd402aae879978d959ff9009eec610d9108ea036456bb79e26ee42d0a34968c1fdbb33e8ad5860f632", "b948757aa008fae13adca739a9f126462ab528ea52e90ce2cf50a4ef2568375b"}) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='blkio.throttle.io_service_bytes\x00', 0x275a, 0x800000000000000) 12:22:06 executing program 2: open(&(0x7f0000000400)='./bus\x00', 0x14103e, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$L2TP_CMD_SESSION_MODIFY(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000080)={0x30, r1, 0x1, 0x0, 0x0, {}, [@L2TP_ATTR_SEND_SEQ={0x5}, @L2TP_ATTR_IFNAME={0x14, 0x8, 'veth1_to_hsr\x00'}]}, 0x30}, 0x1, 0x700}, 0x0) 12:22:06 executing program 3: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) getsockopt$inet_sctp6_SCTP_MAX_BURST(r0, 0x84, 0x14, 0x0, &(0x7f0000000080)) 12:22:06 executing program 4: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x82, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket(0x10, 0x803, 0x0) sendto(r0, &(0x7f00000000c0)="120000001200e7ef007b00000000000000a1", 0x12, 0x0, 0x0, 0x0) recvmmsg(r0, &(0x7f00000037c0)=[{{&(0x7f00000004c0)=@ethernet={0x0, @random}, 0x80, &(0x7f0000000380)=[{&(0x7f0000000040)=""/95, 0x5f}, {&(0x7f0000000140)=""/85, 0x55}, {&(0x7f0000000fc0)=""/4096, 0x1000}, {&(0x7f0000000400)=""/106, 0x6a}, {&(0x7f0000000740)=""/73, 0x49}, {&(0x7f0000000200)=""/77, 0x4d}, {0x0}], 0x7, &(0x7f0000000600)=""/191, 0xbf}, 0x6558}], 0x1, 0x0, &(0x7f0000003700)={0x77359400}) 12:22:06 executing program 4: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x82, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket(0x10, 0x803, 0x0) sendto(r0, &(0x7f00000000c0)="120000001200e7ef007b00000000000000a1", 0x12, 0x0, 0x0, 0x0) recvmmsg(r0, &(0x7f00000037c0)=[{{&(0x7f00000004c0)=@ethernet={0x0, @random}, 0x80, &(0x7f0000000380)=[{&(0x7f0000000040)=""/95, 0x5f}, {&(0x7f0000000140)=""/85, 0x55}, {&(0x7f0000000fc0)=""/4096, 0x1000}, {&(0x7f0000000400)=""/106, 0x6a}, {&(0x7f0000000740)=""/73, 0x49}, {&(0x7f0000000200)=""/77, 0x4d}, {0x0}], 0x7, &(0x7f0000000600)=""/191, 0xbf}, 0x8100}], 0x1, 0x0, &(0x7f0000003700)={0x77359400}) 12:22:06 executing program 3: pselect6(0x48, &(0x7f0000000080)={0x5, 0x100000001, 0xfffffffffffffd71, 0xffffffff, 0x5, 0x7ff, 0x1, 0x1}, &(0x7f00000000c0)={0x2bc5, 0x8000, 0x4, 0xffffffffffffffff, 0x1, 0x0, 0x4}, &(0x7f0000000100)={0x3, 0x4e855e38, 0x7, 0x1000000000000004, 0x10001, 0x9, 0x0, 0x6}, &(0x7f0000000140)={0x77359400}, &(0x7f00000001c0)={&(0x7f0000000180)={[0x9]}, 0x8}) socket$inet6_udplite(0xa, 0x2, 0x88) syz_genetlink_get_family_id$tipc2(&(0x7f0000000280), 0xffffffffffffffff) [ 1034.681169][ T4970] loop1: detected capacity change from 0 to 2048 12:22:06 executing program 2: open(&(0x7f0000000400)='./bus\x00', 0x14103e, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$L2TP_CMD_SESSION_MODIFY(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000080)={0x30, r1, 0x1, 0x0, 0x0, {}, [@L2TP_ATTR_SEND_SEQ={0x5}, @L2TP_ATTR_IFNAME={0x14, 0x8, 'veth1_to_hsr\x00'}]}, 0x30}, 0x1, 0x900}, 0x0) [ 1034.779048][ T4970] ext4 filesystem being mounted at /root/syzkaller-testdir1539738704/syzkaller.ao1jj3/3816/bus supports timestamps until 2038 (0x7fffffff) [ 1034.871827][ T4970] loop1: detected capacity change from 2048 to 2047 12:22:06 executing program 5: r0 = socket$unix(0x1, 0x2, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f0000000100)={'vcan0\x00', 0x0}) r2 = socket$can_bcm(0x1d, 0x2, 0x2) connect$can_bcm(r2, &(0x7f0000000000), 0x10) ioctl$sock_kcm_SIOCKCMUNATTACH(0xffffffffffffffff, 0x89e1, 0xffffffffffffffff) ioctl$sock_SIOCSPGRP(0xffffffffffffffff, 0x8902, 0x0) sendmsg$can_bcm(r2, &(0x7f0000000480)={&(0x7f0000000340)={0x1d, r1, 0x3f420f00}, 0x10, &(0x7f0000000040)={&(0x7f0000000580)=ANY=[@ANYBLOB="01000000d7fe68ca0000e9ffffff0000", @ANYRES64=0x0, @ANYRES64=0x0, @ANYRES64=0x0, @ANYRES64=r0, @ANYBLOB="3bf81bb9f1"], 0x20000600}}, 0x0) r3 = socket(0x0, 0x800, 0x40000) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(0xffffffffffffffff, 0x541b, &(0x7f00000000c0)={'ip6_vti0\x00', 0x0}) sendmsg$IPCTNL_MSG_EXP_DELETE(r3, &(0x7f00000004c0)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x40000040}, 0xc, &(0x7f0000000440)={&(0x7f00000006c0)={0x1d0, 0x2, 0x2, 0x201, 0x0, 0x0, {0xa}, [@CTA_EXPECT_NAT={0xc0, 0xa, 0x0, 0x1, [@CTA_EXPECT_NAT_TUPLE={0xc, 0x2, 0x0, 0x1, [@CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x1}]}, @CTA_EXPECT_NAT_TUPLE={0x70, 0x2, 0x0, 0x1, [@CTA_TUPLE_IP={0x2c, 0x1, 0x0, 0x1, @ipv6={{0x14, 0x3, @loopback}, {0x14, 0x4, @private0}}}, @CTA_TUPLE_IP={0x14, 0x1, 0x0, 0x1, @ipv4={{0x8, 0x1, @empty}, {0x8, 0x2, @initdev={0xac, 0x1e, 0x1, 0x0}}}}, @CTA_TUPLE_IP={0x14, 0x1, 0x0, 0x1, @ipv4={{0x8, 0x1, @local}, {0x8, 0x2, @loopback}}}, @CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x4}, @CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x3}, @CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x1}]}, @CTA_EXPECT_NAT_TUPLE={0x38, 0x2, 0x0, 0x1, [@CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5, 0x1, 0x88}}, @CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x3}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5, 0x1, 0x21}}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5, 0x1, 0x1}}, @CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x3}]}, @CTA_EXPECT_NAT_DIR={0x8}]}, @CTA_EXPECT_MASTER={0x20, 0x1, 0x0, 0x1, [@CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x1}, @CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x2}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5, 0x1, 0x84}}]}, @CTA_EXPECT_MASTER={0xdc, 0x1, 0x0, 0x1, [@CTA_TUPLE_IP={0x14, 0x1, 0x0, 0x1, @ipv4={{0x8, 0x1, @multicast1}, {0x8, 0x2, @dev={0xac, 0x14, 0x14, 0x3a}}}}, @CTA_TUPLE_ZONE={0x6}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5, 0x1, 0x21}}, @CTA_TUPLE_IP={0x14, 0x1, 0x0, 0x1, @ipv4={{0x8, 0x1, @empty}, {0x8, 0x2, @local}}}, @CTA_TUPLE_IP={0x2c, 0x1, 0x0, 0x1, @ipv6={{0x14, 0x3, @private1={0xfc, 0x1, '\x00', 0x1}}, {0x14, 0x4, @rand_addr=' \x01\x00'}}}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5, 0x1, 0x1}}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5, 0x1, 0x88}}, @CTA_TUPLE_IP={0x2c, 0x1, 0x0, 0x1, @ipv6={{0x14, 0x3, @empty}, {0x14, 0x4, @dev={0xfe, 0x80, '\x00', 0x21}}}}, @CTA_TUPLE_IP={0x2c, 0x1, 0x0, 0x1, @ipv6={{0x14, 0x3, @local}, {0x14, 0x4, @ipv4={'\x00', '\xff\xff', @rand_addr=0x64010100}}}}]}]}, 0x1d0}}, 0x48000) perf_event_open(&(0x7f0000000500)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x15, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$binfmt_elf32(0xffffffffffffffff, &(0x7f0000000040)=ANY=[], 0x69) connect$can_bcm(0xffffffffffffffff, &(0x7f0000000000), 0x10) sendmsg$can_bcm(0xffffffffffffffff, &(0x7f0000000480)={&(0x7f0000000340)={0x1d, 0x0, 0x3f420f00}, 0x10, &(0x7f0000000040)={&(0x7f0000000580)=ANY=[@ANYBLOB="01000000d7fe68ca0000e9ffffff0000", @ANYRES64=0x0, @ANYRES64=0x0, @ANYRES64=0x0, @ANYRES64], 0x20000600}}, 0x0) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(0xffffffffffffffff, 0x89f0, &(0x7f0000000280)={'gretap0\x00', &(0x7f0000000240)={'ip_vti0\x00', 0x0, 0x7, 0x80, 0xfffffff7, 0x7, {{0x8, 0x4, 0x0, 0x5, 0x20, 0x67, 0x0, 0xc0, 0x29, 0x0, @local, @empty, {[@timestamp={0x44, 0xc, 0x8, 0x0, 0x2, [0x7f, 0x1]}]}}}}}) socket(0x10, 0x3, 0x0) process_mrelease(0xffffffffffffffff, 0x0) r4 = socket$packet(0x11, 0x2, 0x300) ioctl$sock_SIOCGIFINDEX(r4, 0x8933, 0x0) getsockopt$inet_sctp_SCTP_RECVNXTINFO(r3, 0x84, 0x21, &(0x7f0000000140), &(0x7f0000000200)=0x4) bind$unix(r0, &(0x7f00000005c0)=@abs={0x1, 0x0, 0x4e23}, 0x6e) syz_clone(0x40000000, &(0x7f00000000c0), 0x0, 0x0, &(0x7f00000001c0), 0x0) 12:22:06 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$IPVS_CMD_SET_SERVICE(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={0x0, 0x60}}, 0x0) 12:22:06 executing program 4: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x82, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket(0x10, 0x803, 0x0) sendto(r0, &(0x7f00000000c0)="120000001200e7ef007b00000000000000a1", 0x12, 0x0, 0x0, 0x0) recvmmsg(r0, &(0x7f00000037c0)=[{{&(0x7f00000004c0)=@ethernet={0x0, @random}, 0x80, &(0x7f0000000380)=[{&(0x7f0000000040)=""/95, 0x5f}, {&(0x7f0000000140)=""/85, 0x55}, {&(0x7f0000000fc0)=""/4096, 0x1000}, {&(0x7f0000000400)=""/106, 0x6a}, {&(0x7f0000000740)=""/73, 0x49}, {&(0x7f0000000200)=""/77, 0x4d}, {0x0}], 0x7, &(0x7f0000000600)=""/191, 0xbf}, 0x8847}], 0x1, 0x0, &(0x7f0000003700)={0x77359400}) 12:22:06 executing program 0: r0 = socket$unix(0x1, 0x2, 0x0) r1 = socket$can_bcm(0x1d, 0x2, 0x2) connect$can_bcm(r1, &(0x7f0000000000), 0x10) ioctl$sock_kcm_SIOCKCMUNATTACH(0xffffffffffffffff, 0x89e1, 0xffffffffffffffff) getsockopt$inet_sctp_SCTP_PEER_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1a, &(0x7f0000000380)={0x0, 0x80, "f29c5b753353d9c7798811e57823354f32d6cb0899a53381003e4f8dbbb1ea469076c8e175a20b45443f885afb38b83813d5e013d4fad662f1582b23328b4ed70ad9d7d4d0052d0147d8b0ac4910985bec8aa8956c599d291a7da55fec010801d8f02dcff373f52f59f867378c13f4a080938c965846a7e8229b410b3ea0f9ce"}, &(0x7f00000002c0)=0x88) socket$igmp6(0xa, 0x3, 0x2) perf_event_open(&(0x7f0000000500)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x15, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) close(0xffffffffffffffff) socket$inet_mptcp(0x2, 0x1, 0x106) connect$can_bcm(0xffffffffffffffff, &(0x7f0000000000), 0x10) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, 0x0) bind$unix(r0, &(0x7f00000005c0)=@abs={0x1, 0x0, 0x4e23}, 0x6e) syz_clone(0x0, &(0x7f00000000c0), 0x0, 0x0, &(0x7f00000001c0), 0x0) 12:22:06 executing program 2: open(&(0x7f0000000400)='./bus\x00', 0x14103e, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$L2TP_CMD_SESSION_MODIFY(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000080)={0x30, r1, 0x1, 0x0, 0x0, {}, [@L2TP_ATTR_SEND_SEQ={0x5}, @L2TP_ATTR_IFNAME={0x14, 0x8, 'veth1_to_hsr\x00'}]}, 0x30}, 0x1, 0xf00}, 0x0) 12:22:06 executing program 1: syz_mount_image$ext4(&(0x7f0000000740)='ext4\x00', &(0x7f0000000100)='./bus\x00', 0x804810, &(0x7f0000000180)=ANY=[@ANYBLOB="0061021d307a961da7401271e3fa98008000001d3902ccfd562158cb15c016093893c9e4abd02bc4f1492514fa2dfebc8001000080000000008a1049ca0000"], 0x1, 0x73b, &(0x7f0000000780)="$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") chdir(&(0x7f0000000080)='./file0\x00') open(&(0x7f00000000c0)='./bus\x00', 0x14da42, 0x0) mount(&(0x7f0000000380)=@loop={'/dev/loop', 0x0}, &(0x7f00000003c0)='./bus\x00', 0x0, 0x1000, 0x0) r0 = open(&(0x7f0000000400)='./bus\x00', 0x0, 0x0) ioctl$LOOP_SET_STATUS(r0, 0x4c02, &(0x7f00000001c0)={0x0, {}, 0x0, {}, 0xff, 0x0, 0x0, 0x0, "be8176c9e6755a48a3c0230dd390efe12f8306bed95b2afd402aae879978d959ff9009eec610d9108ea036456bb79e26ee42d0a34968c1fdbb33e8ad5860f632", "b948757aa008fae13adca739a9f126462ab528ea52e90ce2cf50a4ef2568375b"}) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='blkio.throttle.io_service_bytes\x00', 0x275a, 0x804000000000000) 12:22:06 executing program 2: open(&(0x7f0000000400)='./bus\x00', 0x14103e, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$L2TP_CMD_SESSION_MODIFY(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000080)={0x30, r1, 0x1, 0x0, 0x0, {}, [@L2TP_ATTR_SEND_SEQ={0x5}, @L2TP_ATTR_IFNAME={0x14, 0x8, 'veth1_to_hsr\x00'}]}, 0x30}, 0x1, 0x1300}, 0x0) 12:22:06 executing program 3: r0 = add_key$keyring(&(0x7f0000000240), &(0x7f0000000280)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffd) add_key$keyring(&(0x7f0000000240), &(0x7f0000000280)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$search(0xa, r0, &(0x7f0000000800)='id_legacy\x00', &(0x7f0000000840)={'syz', 0x2}, 0x0) 12:22:06 executing program 4: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x82, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket(0x10, 0x803, 0x0) sendto(r0, &(0x7f00000000c0)="120000001200e7ef007b00000000000000a1", 0x12, 0x0, 0x0, 0x0) recvmmsg(r0, &(0x7f00000037c0)=[{{&(0x7f00000004c0)=@ethernet={0x0, @random}, 0x80, &(0x7f0000000380)=[{&(0x7f0000000040)=""/95, 0x5f}, {&(0x7f0000000140)=""/85, 0x55}, {&(0x7f0000000fc0)=""/4096, 0x1000}, {&(0x7f0000000400)=""/106, 0x6a}, {&(0x7f0000000740)=""/73, 0x49}, {&(0x7f0000000200)=""/77, 0x4d}, {0x0}], 0x7, &(0x7f0000000600)=""/191, 0xbf}, 0x8848}], 0x1, 0x0, &(0x7f0000003700)={0x77359400}) 12:22:06 executing program 2: open(&(0x7f0000000400)='./bus\x00', 0x14103e, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$L2TP_CMD_SESSION_MODIFY(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000080)={0x30, r1, 0x1, 0x0, 0x0, {}, [@L2TP_ATTR_SEND_SEQ={0x5}, @L2TP_ATTR_IFNAME={0x14, 0x8, 'veth1_to_hsr\x00'}]}, 0x30}, 0x1, 0x25d1}, 0x0) 12:22:06 executing program 3: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NLBL_CIPSOV4_C_ADD(r0, &(0x7f00000000c0)={&(0x7f0000000000), 0x7, &(0x7f0000000080)={&(0x7f0000000040)={0x14}, 0x14}}, 0x0) 12:22:06 executing program 4: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x82, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket(0x10, 0x803, 0x0) sendto(r0, &(0x7f00000000c0)="120000001200e7ef007b00000000000000a1", 0x12, 0x0, 0x0, 0x0) recvmmsg(r0, &(0x7f00000037c0)=[{{&(0x7f00000004c0)=@ethernet={0x0, @random}, 0x80, &(0x7f0000000380)=[{&(0x7f0000000040)=""/95, 0x5f}, {&(0x7f0000000140)=""/85, 0x55}, {&(0x7f0000000fc0)=""/4096, 0x1000}, {&(0x7f0000000400)=""/106, 0x6a}, {&(0x7f0000000740)=""/73, 0x49}, {&(0x7f0000000200)=""/77, 0x4d}, {0x0}], 0x7, &(0x7f0000000600)=""/191, 0xbf}, 0xb411}], 0x1, 0x0, &(0x7f0000003700)={0x77359400}) [ 1035.181150][ T5000] loop1: detected capacity change from 0 to 2048 [ 1035.304465][ T5000] ext4 filesystem being mounted at /root/syzkaller-testdir1539738704/syzkaller.ao1jj3/3817/bus supports timestamps until 2038 (0x7fffffff) [ 1035.404184][ T5000] loop1: detected capacity change from 2048 to 2047 12:22:07 executing program 5: r0 = socket$unix(0x1, 0x2, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f0000000100)={'vcan0\x00', 0x0}) r2 = socket$can_bcm(0x1d, 0x2, 0x2) connect$can_bcm(r2, &(0x7f0000000000), 0x10) ioctl$sock_kcm_SIOCKCMUNATTACH(0xffffffffffffffff, 0x89e1, 0xffffffffffffffff) ioctl$sock_SIOCSPGRP(0xffffffffffffffff, 0x8902, 0x0) sendmsg$can_bcm(r2, &(0x7f0000000480)={&(0x7f0000000340)={0x1d, r1, 0x3f420f00}, 0x10, &(0x7f0000000040)={&(0x7f0000000580)=ANY=[@ANYBLOB="01000000d7fe68ca0000e9ffffff0000", @ANYRES64=0x0, @ANYRES64=0x0, @ANYRES64=0x0, @ANYRES64=r0, @ANYBLOB="3bf81bb9f1"], 0x20000600}}, 0x0) r3 = socket(0x0, 0x800, 0x40000) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r3, 0x541b, 0x0) sendmsg$IPCTNL_MSG_EXP_DELETE(r3, &(0x7f00000004c0)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x40000040}, 0xc, &(0x7f0000000440)={&(0x7f00000006c0)={0x1d0, 0x2, 0x2, 0x201, 0x0, 0x0, {0xa}, [@CTA_EXPECT_NAT={0xc0, 0xa, 0x0, 0x1, [@CTA_EXPECT_NAT_TUPLE={0xc, 0x2, 0x0, 0x1, [@CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x1}]}, @CTA_EXPECT_NAT_TUPLE={0x70, 0x2, 0x0, 0x1, [@CTA_TUPLE_IP={0x2c, 0x1, 0x0, 0x1, @ipv6={{0x14, 0x3, @loopback}, {0x14, 0x4, @private0}}}, @CTA_TUPLE_IP={0x14, 0x1, 0x0, 0x1, @ipv4={{0x8, 0x1, @empty}, {0x8, 0x2, @initdev={0xac, 0x1e, 0x1, 0x0}}}}, @CTA_TUPLE_IP={0x14, 0x1, 0x0, 0x1, @ipv4={{0x8, 0x1, @local}, {0x8, 0x2, @loopback}}}, @CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x4}, @CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x3}, @CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x1}]}, @CTA_EXPECT_NAT_TUPLE={0x38, 0x2, 0x0, 0x1, [@CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5, 0x1, 0x88}}, @CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x3}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5, 0x1, 0x21}}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5, 0x1, 0x1}}, @CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x3}]}, @CTA_EXPECT_NAT_DIR={0x8}]}, @CTA_EXPECT_MASTER={0x20, 0x1, 0x0, 0x1, [@CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x1}, @CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x2}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5, 0x1, 0x84}}]}, @CTA_EXPECT_MASTER={0xdc, 0x1, 0x0, 0x1, [@CTA_TUPLE_IP={0x14, 0x1, 0x0, 0x1, @ipv4={{0x8, 0x1, @multicast1}, {0x8, 0x2, @dev={0xac, 0x14, 0x14, 0x3a}}}}, @CTA_TUPLE_ZONE={0x6}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5, 0x1, 0x21}}, @CTA_TUPLE_IP={0x14, 0x1, 0x0, 0x1, @ipv4={{0x8, 0x1, @empty}, {0x8, 0x2, @local}}}, @CTA_TUPLE_IP={0x2c, 0x1, 0x0, 0x1, @ipv6={{0x14, 0x3, @private1={0xfc, 0x1, '\x00', 0x1}}, {0x14, 0x4, @rand_addr=' \x01\x00'}}}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5, 0x1, 0x1}}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5, 0x1, 0x88}}, @CTA_TUPLE_IP={0x2c, 0x1, 0x0, 0x1, @ipv6={{0x14, 0x3, @empty}, {0x14, 0x4, @dev={0xfe, 0x80, '\x00', 0x21}}}}, @CTA_TUPLE_IP={0x2c, 0x1, 0x0, 0x1, @ipv6={{0x14, 0x3, @local}, {0x14, 0x4, @ipv4={'\x00', '\xff\xff', @rand_addr=0x64010100}}}}]}]}, 0x1d0}}, 0x48000) perf_event_open(&(0x7f0000000500)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x15, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$binfmt_elf32(0xffffffffffffffff, &(0x7f0000000040)=ANY=[], 0x69) connect$can_bcm(0xffffffffffffffff, &(0x7f0000000000), 0x10) sendmsg$can_bcm(0xffffffffffffffff, &(0x7f0000000480)={&(0x7f0000000340)={0x1d, 0x0, 0x3f420f00}, 0x10, &(0x7f0000000040)={&(0x7f0000000580)=ANY=[@ANYBLOB="01000000d7fe68ca0000e9ffffff0000", @ANYRES64=0x0, @ANYRES64=0x0, @ANYRES64=0x0, @ANYRES64], 0x20000600}}, 0x0) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(0xffffffffffffffff, 0x89f0, &(0x7f0000000280)={'gretap0\x00', &(0x7f0000000240)={'ip_vti0\x00', 0x0, 0x7, 0x80, 0xfffffff7, 0x7, {{0x8, 0x4, 0x0, 0x5, 0x20, 0x67, 0x0, 0xc0, 0x29, 0x0, @local, @empty, {[@timestamp={0x44, 0xc, 0x8, 0x0, 0x2, [0x7f, 0x1]}]}}}}}) socket(0x10, 0x3, 0x0) process_mrelease(0xffffffffffffffff, 0x0) r4 = socket$packet(0x11, 0x2, 0x300) ioctl$sock_SIOCGIFINDEX(r4, 0x8933, 0x0) getsockopt$inet_sctp_SCTP_RECVNXTINFO(r3, 0x84, 0x21, &(0x7f0000000140), &(0x7f0000000200)=0x4) bind$unix(r0, &(0x7f00000005c0)=@abs={0x1, 0x0, 0x4e23}, 0x6e) syz_clone(0x40000000, &(0x7f00000000c0), 0x0, 0x0, &(0x7f00000001c0), 0x0) 12:22:07 executing program 3: setsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(0xffffffffffffffff, 0x84, 0x8, &(0x7f0000000200), 0x4) waitid(0xb3dcb71ad13460ed, 0x0, &(0x7f0000000000), 0x4, 0x0) 12:22:07 executing program 4: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x82, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket(0x10, 0x803, 0x0) sendto(r0, &(0x7f00000000c0)="120000001200e7ef007b00000000000000a1", 0x12, 0x0, 0x0, 0x0) recvmmsg(r0, &(0x7f00000037c0)=[{{&(0x7f00000004c0)=@ethernet={0x0, @random}, 0x80, &(0x7f0000000380)=[{&(0x7f0000000040)=""/95, 0x5f}, {&(0x7f0000000140)=""/85, 0x55}, {&(0x7f0000000fc0)=""/4096, 0x1000}, {&(0x7f0000000400)=""/106, 0x6a}, {&(0x7f0000000740)=""/73, 0x49}, {&(0x7f0000000200)=""/77, 0x4d}, {0x0}], 0x7, &(0x7f0000000600)=""/191, 0xbf}, 0x1a000}], 0x1, 0x0, &(0x7f0000003700)={0x77359400}) 12:22:07 executing program 2: open(&(0x7f0000000400)='./bus\x00', 0x14103e, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$L2TP_CMD_SESSION_MODIFY(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000080)={0x30, r1, 0x1, 0x0, 0x0, {}, [@L2TP_ATTR_SEND_SEQ={0x5}, @L2TP_ATTR_IFNAME={0x14, 0x8, 'veth1_to_hsr\x00'}]}, 0x30}, 0x1, 0x6000}, 0x0) 12:22:07 executing program 1: syz_mount_image$ext4(&(0x7f0000000740)='ext4\x00', &(0x7f0000000100)='./bus\x00', 0x804810, &(0x7f0000000180)=ANY=[@ANYBLOB="0061021d307a961da7401271e3fa98008000001d3902ccfd562158cb15c016093893c9e4abd02bc4f1492514fa2dfebc8001000080000000008a1049ca0000"], 0x1, 0x73b, &(0x7f0000000780)="$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") chdir(&(0x7f0000000080)='./file0\x00') open(&(0x7f00000000c0)='./bus\x00', 0x14da42, 0x0) mount(&(0x7f0000000380)=@loop={'/dev/loop', 0x0}, &(0x7f00000003c0)='./bus\x00', 0x0, 0x1000, 0x0) r0 = open(&(0x7f0000000400)='./bus\x00', 0x0, 0x0) ioctl$LOOP_SET_STATUS(r0, 0x4c02, &(0x7f00000001c0)={0x0, {}, 0x0, {}, 0xff, 0x0, 0x0, 0x0, "be8176c9e6755a48a3c0230dd390efe12f8306bed95b2afd402aae879978d959ff9009eec610d9108ea036456bb79e26ee42d0a34968c1fdbb33e8ad5860f632", "b948757aa008fae13adca739a9f126462ab528ea52e90ce2cf50a4ef2568375b"}) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='blkio.throttle.io_service_bytes\x00', 0x275a, 0x900000000000000) 12:22:07 executing program 0: r0 = socket$unix(0x1, 0x2, 0x0) r1 = socket$can_bcm(0x1d, 0x2, 0x2) connect$can_bcm(r1, &(0x7f0000000000), 0x10) ioctl$sock_kcm_SIOCKCMUNATTACH(0xffffffffffffffff, 0x89e1, 0xffffffffffffffff) getsockopt$inet_sctp_SCTP_PEER_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1a, &(0x7f0000000380)={0x0, 0x80, "f29c5b753353d9c7798811e57823354f32d6cb0899a53381003e4f8dbbb1ea469076c8e175a20b45443f885afb38b83813d5e013d4fad662f1582b23328b4ed70ad9d7d4d0052d0147d8b0ac4910985bec8aa8956c599d291a7da55fec010801d8f02dcff373f52f59f867378c13f4a080938c965846a7e8229b410b3ea0f9ce"}, &(0x7f00000002c0)=0x88) socket$igmp6(0xa, 0x3, 0x2) perf_event_open(&(0x7f0000000500)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x15, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) close(0xffffffffffffffff) socket$inet_mptcp(0x2, 0x1, 0x106) connect$can_bcm(0xffffffffffffffff, &(0x7f0000000000), 0x10) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, 0x0) bind$unix(r0, &(0x7f00000005c0)=@abs={0x1, 0x0, 0x4e23}, 0x6e) syz_clone(0x40000000, 0x0, 0x0, 0x0, &(0x7f00000001c0), 0x0) 12:22:07 executing program 2: open(&(0x7f0000000400)='./bus\x00', 0x14103e, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$L2TP_CMD_SESSION_MODIFY(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000080)={0x30, r1, 0x1, 0x0, 0x0, {}, [@L2TP_ATTR_SEND_SEQ={0x5}, @L2TP_ATTR_IFNAME={0x14, 0x8, 'veth1_to_hsr\x00'}]}, 0x30}, 0x1, 0xd125}, 0x0) 12:22:07 executing program 3: syz_open_dev$evdev(&(0x7f0000000080), 0x0, 0x4e000) 12:22:07 executing program 4: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x82, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket(0x10, 0x803, 0x0) sendto(r0, &(0x7f00000000c0)="120000001200e7ef007b00000000000000a1", 0x12, 0x0, 0x0, 0x0) recvmmsg(r0, &(0x7f00000037c0)=[{{&(0x7f00000004c0)=@ethernet={0x0, @random}, 0x80, &(0x7f0000000380)=[{&(0x7f0000000040)=""/95, 0x5f}, {&(0x7f0000000140)=""/85, 0x55}, {&(0x7f0000000fc0)=""/4096, 0x1000}, {&(0x7f0000000400)=""/106, 0x6a}, {&(0x7f0000000740)=""/73, 0x49}, {&(0x7f0000000200)=""/77, 0x4d}, {0x0}], 0x7, &(0x7f0000000600)=""/191, 0xbf}, 0x34000}], 0x1, 0x0, &(0x7f0000003700)={0x77359400}) [ 1035.984278][ T5031] loop1: detected capacity change from 0 to 2048 12:22:07 executing program 2: open(&(0x7f0000000400)='./bus\x00', 0x14103e, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$L2TP_CMD_SESSION_MODIFY(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000080)={0x30, r1, 0x1, 0x0, 0x0, {}, [@L2TP_ATTR_SEND_SEQ={0x5}, @L2TP_ATTR_IFNAME={0x14, 0x8, 'veth1_to_hsr\x00'}]}, 0x30}, 0x1, 0x30000}, 0x0) 12:22:07 executing program 3: syz_open_dev$evdev(&(0x7f0000000080), 0x0, 0x4002) 12:22:07 executing program 3: pselect6(0x40, &(0x7f0000000000), &(0x7f0000000040)={0x80000001}, 0x0, &(0x7f0000000100)={0x0, 0x989680}, &(0x7f0000000180)={&(0x7f0000000140)={[0x8]}, 0x8}) [ 1036.134164][ T5031] ext4 filesystem being mounted at /root/syzkaller-testdir1539738704/syzkaller.ao1jj3/3818/bus supports timestamps until 2038 (0x7fffffff) [ 1036.236058][ T5031] loop1: detected capacity change from 2048 to 2047 12:22:08 executing program 5: r0 = socket$unix(0x1, 0x2, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f0000000100)={'vcan0\x00', 0x0}) r2 = socket$can_bcm(0x1d, 0x2, 0x2) connect$can_bcm(r2, &(0x7f0000000000), 0x10) ioctl$sock_kcm_SIOCKCMUNATTACH(0xffffffffffffffff, 0x89e1, 0xffffffffffffffff) ioctl$sock_SIOCSPGRP(0xffffffffffffffff, 0x8902, 0x0) sendmsg$can_bcm(r2, &(0x7f0000000480)={&(0x7f0000000340)={0x1d, r1, 0x3f420f00}, 0x10, &(0x7f0000000040)={&(0x7f0000000580)=ANY=[@ANYBLOB="01000000d7fe68ca0000e9ffffff0000", @ANYRES64=0x0, @ANYRES64=0x0, @ANYRES64=0x0, @ANYRES64=r0, @ANYBLOB="3bf81bb9f1"], 0x20000600}}, 0x0) r3 = socket(0x0, 0x800, 0x40000) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r3, 0x541b, 0x0) sendmsg$IPCTNL_MSG_EXP_DELETE(r3, &(0x7f00000004c0)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x40000040}, 0xc, &(0x7f0000000440)={&(0x7f00000006c0)={0x1d0, 0x2, 0x2, 0x201, 0x0, 0x0, {0xa}, [@CTA_EXPECT_NAT={0xc0, 0xa, 0x0, 0x1, [@CTA_EXPECT_NAT_TUPLE={0xc, 0x2, 0x0, 0x1, [@CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x1}]}, @CTA_EXPECT_NAT_TUPLE={0x70, 0x2, 0x0, 0x1, [@CTA_TUPLE_IP={0x2c, 0x1, 0x0, 0x1, @ipv6={{0x14, 0x3, @loopback}, {0x14, 0x4, @private0}}}, @CTA_TUPLE_IP={0x14, 0x1, 0x0, 0x1, @ipv4={{0x8, 0x1, @empty}, {0x8, 0x2, @initdev={0xac, 0x1e, 0x1, 0x0}}}}, @CTA_TUPLE_IP={0x14, 0x1, 0x0, 0x1, @ipv4={{0x8, 0x1, @local}, {0x8, 0x2, @loopback}}}, @CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x4}, @CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x3}, @CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x1}]}, @CTA_EXPECT_NAT_TUPLE={0x38, 0x2, 0x0, 0x1, [@CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5, 0x1, 0x88}}, @CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x3}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5, 0x1, 0x21}}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5, 0x1, 0x1}}, @CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x3}]}, @CTA_EXPECT_NAT_DIR={0x8}]}, @CTA_EXPECT_MASTER={0x20, 0x1, 0x0, 0x1, [@CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x1}, @CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x2}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5, 0x1, 0x84}}]}, @CTA_EXPECT_MASTER={0xdc, 0x1, 0x0, 0x1, [@CTA_TUPLE_IP={0x14, 0x1, 0x0, 0x1, @ipv4={{0x8, 0x1, @multicast1}, {0x8, 0x2, @dev={0xac, 0x14, 0x14, 0x3a}}}}, @CTA_TUPLE_ZONE={0x6}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5, 0x1, 0x21}}, @CTA_TUPLE_IP={0x14, 0x1, 0x0, 0x1, @ipv4={{0x8, 0x1, @empty}, {0x8, 0x2, @local}}}, @CTA_TUPLE_IP={0x2c, 0x1, 0x0, 0x1, @ipv6={{0x14, 0x3, @private1={0xfc, 0x1, '\x00', 0x1}}, {0x14, 0x4, @rand_addr=' \x01\x00'}}}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5, 0x1, 0x1}}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5, 0x1, 0x88}}, @CTA_TUPLE_IP={0x2c, 0x1, 0x0, 0x1, @ipv6={{0x14, 0x3, @empty}, {0x14, 0x4, @dev={0xfe, 0x80, '\x00', 0x21}}}}, @CTA_TUPLE_IP={0x2c, 0x1, 0x0, 0x1, @ipv6={{0x14, 0x3, @local}, {0x14, 0x4, @ipv4={'\x00', '\xff\xff', @rand_addr=0x64010100}}}}]}]}, 0x1d0}}, 0x48000) perf_event_open(&(0x7f0000000500)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x15, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$binfmt_elf32(0xffffffffffffffff, &(0x7f0000000040)=ANY=[], 0x69) connect$can_bcm(0xffffffffffffffff, &(0x7f0000000000), 0x10) sendmsg$can_bcm(0xffffffffffffffff, &(0x7f0000000480)={&(0x7f0000000340)={0x1d, 0x0, 0x3f420f00}, 0x10, &(0x7f0000000040)={&(0x7f0000000580)=ANY=[@ANYBLOB="01000000d7fe68ca0000e9ffffff0000", @ANYRES64=0x0, @ANYRES64=0x0, @ANYRES64=0x0, @ANYRES64], 0x20000600}}, 0x0) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(0xffffffffffffffff, 0x89f0, &(0x7f0000000280)={'gretap0\x00', &(0x7f0000000240)={'ip_vti0\x00', 0x0, 0x7, 0x80, 0xfffffff7, 0x7, {{0x8, 0x4, 0x0, 0x5, 0x20, 0x67, 0x0, 0xc0, 0x29, 0x0, @local, @empty, {[@timestamp={0x44, 0xc, 0x8, 0x0, 0x2, [0x7f, 0x1]}]}}}}}) socket(0x10, 0x3, 0x0) process_mrelease(0xffffffffffffffff, 0x0) r4 = socket$packet(0x11, 0x2, 0x300) ioctl$sock_SIOCGIFINDEX(r4, 0x8933, 0x0) getsockopt$inet_sctp_SCTP_RECVNXTINFO(r3, 0x84, 0x21, &(0x7f0000000140), &(0x7f0000000200)=0x4) bind$unix(r0, &(0x7f00000005c0)=@abs={0x1, 0x0, 0x4e23}, 0x6e) syz_clone(0x40000000, &(0x7f00000000c0), 0x0, 0x0, &(0x7f00000001c0), 0x0) 12:22:08 executing program 4: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x82, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket(0x10, 0x803, 0x0) sendto(r0, &(0x7f00000000c0)="120000001200e7ef007b00000000000000a1", 0x12, 0x0, 0x0, 0x0) recvmmsg(r0, &(0x7f00000037c0)=[{{&(0x7f00000004c0)=@ethernet={0x0, @random}, 0x80, &(0x7f0000000380)=[{&(0x7f0000000040)=""/95, 0x5f}, {&(0x7f0000000140)=""/85, 0x55}, {&(0x7f0000000fc0)=""/4096, 0x1000}, {&(0x7f0000000400)=""/106, 0x6a}, {&(0x7f0000000740)=""/73, 0x49}, {&(0x7f0000000200)=""/77, 0x4d}, {0x0}], 0x7, &(0x7f0000000600)=""/191, 0xbf}, 0x200000}], 0x1, 0x0, &(0x7f0000003700)={0x77359400}) 12:22:08 executing program 3: r0 = openat$random(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r1 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000500), 0x2, 0x0) ioctl$RNDADDENTROPY(r0, 0x40085203, &(0x7f0000000040)=ANY=[@ANYRES32=r0, @ANYRES16, @ANYRES32=r1]) 12:22:08 executing program 2: open(&(0x7f0000000400)='./bus\x00', 0x14103e, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$L2TP_CMD_SESSION_MODIFY(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000080)={0x30, r1, 0x1, 0x0, 0x0, {}, [@L2TP_ATTR_SEND_SEQ={0x5}, @L2TP_ATTR_IFNAME={0x14, 0x8, 'veth1_to_hsr\x00'}]}, 0x30}, 0x1, 0x34000}, 0x0) 12:22:08 executing program 1: syz_mount_image$ext4(&(0x7f0000000740)='ext4\x00', &(0x7f0000000100)='./bus\x00', 0x804810, &(0x7f0000000180)=ANY=[@ANYBLOB="0061021d307a961da7401271e3fa98008000001d3902ccfd562158cb15c016093893c9e4abd02bc4f1492514fa2dfebc8001000080000000008a1049ca0000"], 0x1, 0x73b, &(0x7f0000000780)="$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") chdir(&(0x7f0000000080)='./file0\x00') open(&(0x7f00000000c0)='./bus\x00', 0x14da42, 0x0) mount(&(0x7f0000000380)=@loop={'/dev/loop', 0x0}, &(0x7f00000003c0)='./bus\x00', 0x0, 0x1000, 0x0) r0 = open(&(0x7f0000000400)='./bus\x00', 0x0, 0x0) ioctl$LOOP_SET_STATUS(r0, 0x4c02, &(0x7f00000001c0)={0x0, {}, 0x0, {}, 0xff, 0x0, 0x0, 0x0, "be8176c9e6755a48a3c0230dd390efe12f8306bed95b2afd402aae879978d959ff9009eec610d9108ea036456bb79e26ee42d0a34968c1fdbb33e8ad5860f632", "b948757aa008fae13adca739a9f126462ab528ea52e90ce2cf50a4ef2568375b"}) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='blkio.throttle.io_service_bytes\x00', 0x275a, 0xa00000000000000) 12:22:08 executing program 0: r0 = socket$unix(0x1, 0x2, 0x0) r1 = socket$can_bcm(0x1d, 0x2, 0x2) connect$can_bcm(r1, &(0x7f0000000000), 0x10) ioctl$sock_kcm_SIOCKCMUNATTACH(0xffffffffffffffff, 0x89e1, 0xffffffffffffffff) getsockopt$inet_sctp_SCTP_PEER_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1a, &(0x7f0000000380)={0x0, 0x80, "f29c5b753353d9c7798811e57823354f32d6cb0899a53381003e4f8dbbb1ea469076c8e175a20b45443f885afb38b83813d5e013d4fad662f1582b23328b4ed70ad9d7d4d0052d0147d8b0ac4910985bec8aa8956c599d291a7da55fec010801d8f02dcff373f52f59f867378c13f4a080938c965846a7e8229b410b3ea0f9ce"}, &(0x7f00000002c0)=0x88) socket$igmp6(0xa, 0x3, 0x2) perf_event_open(&(0x7f0000000500)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x15, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) close(0xffffffffffffffff) socket$inet_mptcp(0x2, 0x1, 0x106) connect$can_bcm(0xffffffffffffffff, &(0x7f0000000000), 0x10) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, 0x0) bind$unix(r0, &(0x7f00000005c0)=@abs={0x1, 0x0, 0x4e23}, 0x6e) syz_clone(0x40000000, 0x0, 0x0, 0x0, &(0x7f00000001c0), 0x0) 12:22:08 executing program 2: open(&(0x7f0000000400)='./bus\x00', 0x14103e, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$L2TP_CMD_SESSION_MODIFY(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000080)={0x30, r1, 0x1, 0x0, 0x0, {}, [@L2TP_ATTR_SEND_SEQ={0x5}, @L2TP_ATTR_IFNAME={0x14, 0x8, 'veth1_to_hsr\x00'}]}, 0x30}, 0x1, 0x400300}, 0x0) 12:22:08 executing program 4: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x82, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket(0x10, 0x803, 0x0) sendto(r0, &(0x7f00000000c0)="120000001200e7ef007b00000000000000a1", 0x12, 0x0, 0x0, 0x0) recvmmsg(r0, &(0x7f00000037c0)=[{{&(0x7f00000004c0)=@ethernet={0x0, @random}, 0x80, &(0x7f0000000380)=[{&(0x7f0000000040)=""/95, 0x5f}, {&(0x7f0000000140)=""/85, 0x55}, {&(0x7f0000000fc0)=""/4096, 0x1000}, {&(0x7f0000000400)=""/106, 0x6a}, {&(0x7f0000000740)=""/73, 0x49}, {&(0x7f0000000200)=""/77, 0x4d}, {0x0}], 0x7, &(0x7f0000000600)=""/191, 0xbf}, 0x400300}], 0x1, 0x0, &(0x7f0000003700)={0x77359400}) 12:22:08 executing program 3: add_key$keyring(&(0x7f0000000240), 0x0, 0x0, 0x0, 0xfffffffffffffffd) request_key(&(0x7f0000000080)='encrypted\x00', &(0x7f00000000c0)={'syz', 0x0}, &(0x7f0000000100)='!:\x00', 0xfffffffffffffffe) [ 1037.046609][ T5061] loop1: detected capacity change from 0 to 2048 12:22:08 executing program 2: open(&(0x7f0000000400)='./bus\x00', 0x14103e, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$L2TP_CMD_SESSION_MODIFY(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000080)={0x30, r1, 0x1, 0x0, 0x0, {}, [@L2TP_ATTR_SEND_SEQ={0x5}, @L2TP_ATTR_IFNAME={0x14, 0x8, 'veth1_to_hsr\x00'}]}, 0x30}, 0x1, 0x1000000}, 0x0) 12:22:08 executing program 4: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x82, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket(0x10, 0x803, 0x0) sendto(r0, &(0x7f00000000c0)="120000001200e7ef007b00000000000000a1", 0x12, 0x0, 0x0, 0x0) recvmmsg(r0, &(0x7f00000037c0)=[{{&(0x7f00000004c0)=@ethernet={0x0, @random}, 0x80, &(0x7f0000000380)=[{&(0x7f0000000040)=""/95, 0x5f}, {&(0x7f0000000140)=""/85, 0x55}, {&(0x7f0000000fc0)=""/4096, 0x1000}, {&(0x7f0000000400)=""/106, 0x6a}, {&(0x7f0000000740)=""/73, 0x49}, {&(0x7f0000000200)=""/77, 0x4d}, {0x0}], 0x7, &(0x7f0000000600)=""/191, 0xbf}, 0xa00100}], 0x1, 0x0, &(0x7f0000003700)={0x77359400}) 12:22:08 executing program 3: r0 = syz_open_dev$evdev(&(0x7f0000000080), 0x2, 0x0) ioctl$EVIOCSKEYCODE_V2(r0, 0x40284504, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, "6e5e2e8810ee5b3ecf83ee8d58010f0e7a0dea0afd4605daa7ae62bd5423fde5"}) [ 1037.177707][ T5061] ext4 filesystem being mounted at /root/syzkaller-testdir1539738704/syzkaller.ao1jj3/3819/bus supports timestamps until 2038 (0x7fffffff) [ 1037.232341][ T5061] loop1: detected capacity change from 2048 to 2047 12:22:09 executing program 5: r0 = socket$unix(0x1, 0x2, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f0000000100)={'vcan0\x00', 0x0}) r2 = socket$can_bcm(0x1d, 0x2, 0x2) connect$can_bcm(r2, &(0x7f0000000000), 0x10) ioctl$sock_kcm_SIOCKCMUNATTACH(0xffffffffffffffff, 0x89e1, 0xffffffffffffffff) ioctl$sock_SIOCSPGRP(0xffffffffffffffff, 0x8902, 0x0) sendmsg$can_bcm(r2, &(0x7f0000000480)={&(0x7f0000000340)={0x1d, r1, 0x3f420f00}, 0x10, &(0x7f0000000040)={&(0x7f0000000580)=ANY=[@ANYBLOB="01000000d7fe68ca0000e9ffffff0000", @ANYRES64=0x0, @ANYRES64=0x0, @ANYRES64=0x0, @ANYRES64=r0, @ANYBLOB="3bf81bb9f1"], 0x20000600}}, 0x0) r3 = socket(0x0, 0x800, 0x40000) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r3, 0x541b, 0x0) sendmsg$IPCTNL_MSG_EXP_DELETE(r3, &(0x7f00000004c0)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x40000040}, 0xc, &(0x7f0000000440)={&(0x7f00000006c0)={0x1d0, 0x2, 0x2, 0x201, 0x0, 0x0, {0xa}, [@CTA_EXPECT_NAT={0xc0, 0xa, 0x0, 0x1, [@CTA_EXPECT_NAT_TUPLE={0xc, 0x2, 0x0, 0x1, [@CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x1}]}, @CTA_EXPECT_NAT_TUPLE={0x70, 0x2, 0x0, 0x1, [@CTA_TUPLE_IP={0x2c, 0x1, 0x0, 0x1, @ipv6={{0x14, 0x3, @loopback}, {0x14, 0x4, @private0}}}, @CTA_TUPLE_IP={0x14, 0x1, 0x0, 0x1, @ipv4={{0x8, 0x1, @empty}, {0x8, 0x2, @initdev={0xac, 0x1e, 0x1, 0x0}}}}, @CTA_TUPLE_IP={0x14, 0x1, 0x0, 0x1, @ipv4={{0x8, 0x1, @local}, {0x8, 0x2, @loopback}}}, @CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x4}, @CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x3}, @CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x1}]}, @CTA_EXPECT_NAT_TUPLE={0x38, 0x2, 0x0, 0x1, [@CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5, 0x1, 0x88}}, @CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x3}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5, 0x1, 0x21}}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5, 0x1, 0x1}}, @CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x3}]}, @CTA_EXPECT_NAT_DIR={0x8}]}, @CTA_EXPECT_MASTER={0x20, 0x1, 0x0, 0x1, [@CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x1}, @CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x2}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5, 0x1, 0x84}}]}, @CTA_EXPECT_MASTER={0xdc, 0x1, 0x0, 0x1, [@CTA_TUPLE_IP={0x14, 0x1, 0x0, 0x1, @ipv4={{0x8, 0x1, @multicast1}, {0x8, 0x2, @dev={0xac, 0x14, 0x14, 0x3a}}}}, @CTA_TUPLE_ZONE={0x6}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5, 0x1, 0x21}}, @CTA_TUPLE_IP={0x14, 0x1, 0x0, 0x1, @ipv4={{0x8, 0x1, @empty}, {0x8, 0x2, @local}}}, @CTA_TUPLE_IP={0x2c, 0x1, 0x0, 0x1, @ipv6={{0x14, 0x3, @private1={0xfc, 0x1, '\x00', 0x1}}, {0x14, 0x4, @rand_addr=' \x01\x00'}}}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5, 0x1, 0x1}}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5, 0x1, 0x88}}, @CTA_TUPLE_IP={0x2c, 0x1, 0x0, 0x1, @ipv6={{0x14, 0x3, @empty}, {0x14, 0x4, @dev={0xfe, 0x80, '\x00', 0x21}}}}, @CTA_TUPLE_IP={0x2c, 0x1, 0x0, 0x1, @ipv6={{0x14, 0x3, @local}, {0x14, 0x4, @ipv4={'\x00', '\xff\xff', @rand_addr=0x64010100}}}}]}]}, 0x1d0}}, 0x48000) perf_event_open(&(0x7f0000000500)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x15, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$binfmt_elf32(0xffffffffffffffff, &(0x7f0000000040)=ANY=[], 0x69) connect$can_bcm(0xffffffffffffffff, &(0x7f0000000000), 0x10) sendmsg$can_bcm(0xffffffffffffffff, &(0x7f0000000480)={&(0x7f0000000340)={0x1d, 0x0, 0x3f420f00}, 0x10, &(0x7f0000000040)={&(0x7f0000000580)=ANY=[@ANYBLOB="01000000d7fe68ca0000e9ffffff0000", @ANYRES64=0x0, @ANYRES64=0x0, @ANYRES64=0x0, @ANYRES64], 0x20000600}}, 0x0) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(0xffffffffffffffff, 0x89f0, &(0x7f0000000280)={'gretap0\x00', &(0x7f0000000240)={'ip_vti0\x00', 0x0, 0x7, 0x80, 0xfffffff7, 0x7, {{0x8, 0x4, 0x0, 0x5, 0x20, 0x67, 0x0, 0xc0, 0x29, 0x0, @local, @empty, {[@timestamp={0x44, 0xc, 0x8, 0x0, 0x2, [0x7f, 0x1]}]}}}}}) socket(0x10, 0x3, 0x0) process_mrelease(0xffffffffffffffff, 0x0) r4 = socket$packet(0x11, 0x2, 0x300) ioctl$sock_SIOCGIFINDEX(r4, 0x8933, 0x0) getsockopt$inet_sctp_SCTP_RECVNXTINFO(r3, 0x84, 0x21, &(0x7f0000000140), &(0x7f0000000200)=0x4) bind$unix(r0, &(0x7f00000005c0)=@abs={0x1, 0x0, 0x4e23}, 0x6e) syz_clone(0x40000000, &(0x7f00000000c0), 0x0, 0x0, &(0x7f00000001c0), 0x0) 12:22:09 executing program 2: open(&(0x7f0000000400)='./bus\x00', 0x14103e, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$L2TP_CMD_SESSION_MODIFY(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000080)={0x30, r1, 0x1, 0x0, 0x0, {}, [@L2TP_ATTR_SEND_SEQ={0x5}, @L2TP_ATTR_IFNAME={0x14, 0x8, 'veth1_to_hsr\x00'}]}, 0x30}, 0x1, 0x2000000}, 0x0) 12:22:09 executing program 3: r0 = syz_open_dev$evdev(&(0x7f0000000080), 0x0, 0x0) ioctl$EVIOCSKEYCODE_V2(r0, 0x40284504, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, "129f850179e47734ff39805d24ec0c18bbf3dc41d97e56f97a163203941ef242"}) 12:22:09 executing program 4: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x82, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket(0x10, 0x803, 0x0) sendto(r0, &(0x7f00000000c0)="120000001200e7ef007b00000000000000a1", 0x12, 0x0, 0x0, 0x0) recvmmsg(r0, &(0x7f00000037c0)=[{{&(0x7f00000004c0)=@ethernet={0x0, @random}, 0x80, &(0x7f0000000380)=[{&(0x7f0000000040)=""/95, 0x5f}, {&(0x7f0000000140)=""/85, 0x55}, {&(0x7f0000000fc0)=""/4096, 0x1000}, {&(0x7f0000000400)=""/106, 0x6a}, {&(0x7f0000000740)=""/73, 0x49}, {&(0x7f0000000200)=""/77, 0x4d}, {0x0}], 0x7, &(0x7f0000000600)=""/191, 0xbf}, 0xca9a3b}], 0x1, 0x0, &(0x7f0000003700)={0x77359400}) 12:22:09 executing program 1: syz_mount_image$ext4(&(0x7f0000000740)='ext4\x00', &(0x7f0000000100)='./bus\x00', 0x804810, &(0x7f0000000180)=ANY=[@ANYBLOB="0061021d307a961da7401271e3fa98008000001d3902ccfd562158cb15c016093893c9e4abd02bc4f1492514fa2dfebc8001000080000000008a1049ca0000"], 0x1, 0x73b, &(0x7f0000000780)="$eJzs3M9rHHUbAPBnptn+zPtuXngP6kGEFloonSTNpT0ZL94KhYLXGpJJCJlkQ3ZTm1iw9SzU5qIgiN49ehVK/QO8SUHBuyBa40G8rMxmk9q4u922Sbeknw9M5/nOj32epzv5ZgcyG8BL643ynyRiOCIuR0S1vT2NiMOt6GjEza3jNh/cmC6XJJrNK78m5Wmx2azuvFbSXp+I1inxSkTcq0Sc/fDfeetr6wtTRZGvtMejjcXl0fra+rn5xam5fC5fGp+4OHZhYuLC2MSe9XrqnYvH7nz39sbG9183br8+dC6JyVbf0e5tzxL9w9b/SSUmd21f2o9kA5QMugAAAPpSfs4/FBFDrU+p1TjUigAAAICDpHmkCQAAABx4SQy6AgAAAGB/bf8dwPazvfv1HGw3v7wVESOd8g+1niGOOBqViDi+mTzyZEKydRo8k5u3IuLuZIfrL2lff09vbNfYM9Ivnrvl/DPZaf5Jd+af6DD/DG1/d8Iz6j7/Pcx/qMv8d7nPHN98/mqla/5bEa8Ndcqf7ORPuuR/t8/8tzc+utNtX/PLiNMdf/8kj+Tq8f0Qo7PzRc8frXt/nbnfq//j3fInvftf7rP/9zd/X+g2l5T5z5zs/f53yl9eEx+360gj4k57XY43duU4ufjDt736n+nS/+Pe/y/67P+nr45c7/NQAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAaEkjYjiSNNuJ0zTLIk5ExP/jeFrU6o2zs7XVpZlyX8RIVNLZ+SIfi4jq1jgpx+Ot+OH4/K7xRET878djW0nnizybrhUzg24eAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAACAHSciYjiSNIuINCL+qKZplg26KgAAAGDPjQy6AAAAAGDfuf8HAACAg+9p7/+TPa4DAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAONAuX7pULs3NBzemy/HMtbXVhdq1czN5fSFbXJ3Opmsry9lcrTZX5Nl0bfFxr1fUasvjF2P1+mgjrzdG62vrVxdrq0uNq/OLU3P51bzyXLoCAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAADgSQ23liTNIiJtxWmaZRH/iYiRqCSz80U+FhH/jYj71cqRcjw+6KIBAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAADYc/W19YWposhXBALBcws+iIgXoIwewaBnJgAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAABqG+tr4wVRT5Sn3QlQAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAADBY6c9JRJTL6eqp4d17Dyd/VlvriHjvsyufXJ9qNFbGy+2/7WxvfNrefn4Q9QMAAMBL4c0nOXj7Pn37Ph4AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAKBf9bX1hamiyFf2MRh0jwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAwNP5OwAA//9JjsXQ") chdir(&(0x7f0000000080)='./file0\x00') open(&(0x7f00000000c0)='./bus\x00', 0x14da42, 0x0) mount(&(0x7f0000000380)=@loop={'/dev/loop', 0x0}, &(0x7f00000003c0)='./bus\x00', 0x0, 0x1000, 0x0) r0 = open(&(0x7f0000000400)='./bus\x00', 0x0, 0x0) ioctl$LOOP_SET_STATUS(r0, 0x4c02, &(0x7f00000001c0)={0x0, {}, 0x0, {}, 0xff, 0x0, 0x0, 0x0, "be8176c9e6755a48a3c0230dd390efe12f8306bed95b2afd402aae879978d959ff9009eec610d9108ea036456bb79e26ee42d0a34968c1fdbb33e8ad5860f632", "b948757aa008fae13adca739a9f126462ab528ea52e90ce2cf50a4ef2568375b"}) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='blkio.throttle.io_service_bytes\x00', 0x275a, 0xb00000000000000) 12:22:09 executing program 0: r0 = socket$unix(0x1, 0x2, 0x0) r1 = socket$can_bcm(0x1d, 0x2, 0x2) connect$can_bcm(r1, &(0x7f0000000000), 0x10) ioctl$sock_kcm_SIOCKCMUNATTACH(0xffffffffffffffff, 0x89e1, 0xffffffffffffffff) getsockopt$inet_sctp_SCTP_PEER_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1a, &(0x7f0000000380)={0x0, 0x80, "f29c5b753353d9c7798811e57823354f32d6cb0899a53381003e4f8dbbb1ea469076c8e175a20b45443f885afb38b83813d5e013d4fad662f1582b23328b4ed70ad9d7d4d0052d0147d8b0ac4910985bec8aa8956c599d291a7da55fec010801d8f02dcff373f52f59f867378c13f4a080938c965846a7e8229b410b3ea0f9ce"}, &(0x7f00000002c0)=0x88) socket$igmp6(0xa, 0x3, 0x2) perf_event_open(&(0x7f0000000500)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x15, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) close(0xffffffffffffffff) socket$inet_mptcp(0x2, 0x1, 0x106) connect$can_bcm(0xffffffffffffffff, &(0x7f0000000000), 0x10) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, 0x0) bind$unix(r0, &(0x7f00000005c0)=@abs={0x1, 0x0, 0x4e23}, 0x6e) syz_clone(0x40000000, 0x0, 0x0, 0x0, &(0x7f00000001c0), 0x0) 12:22:09 executing program 3: r0 = syz_open_dev$evdev(&(0x7f0000000040), 0x0, 0x103381) write$evdev(r0, &(0x7f0000000140)=[{{}, 0x3}, {}], 0x30) 12:22:09 executing program 2: open(&(0x7f0000000400)='./bus\x00', 0x14103e, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$L2TP_CMD_SESSION_MODIFY(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000080)={0x30, r1, 0x1, 0x0, 0x0, {}, [@L2TP_ATTR_SEND_SEQ={0x5}, @L2TP_ATTR_IFNAME={0x14, 0x8, 'veth1_to_hsr\x00'}]}, 0x30}, 0x1, 0x3000000}, 0x0) 12:22:09 executing program 4: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x82, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket(0x10, 0x803, 0x0) sendto(r0, &(0x7f00000000c0)="120000001200e7ef007b00000000000000a1", 0x12, 0x0, 0x0, 0x0) recvmmsg(r0, &(0x7f00000037c0)=[{{&(0x7f00000004c0)=@ethernet={0x0, @random}, 0x80, &(0x7f0000000380)=[{&(0x7f0000000040)=""/95, 0x5f}, {&(0x7f0000000140)=""/85, 0x55}, {&(0x7f0000000fc0)=""/4096, 0x1000}, {&(0x7f0000000400)=""/106, 0x6a}, {&(0x7f0000000740)=""/73, 0x49}, {&(0x7f0000000200)=""/77, 0x4d}, {0x0}], 0x7, &(0x7f0000000600)=""/191, 0xbf}, 0x1000000}], 0x1, 0x0, &(0x7f0000003700)={0x77359400}) 12:22:09 executing program 3: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000000140)=[@in={0x2, 0x0, @broadcast}, @in6={0xa, 0x0, 0x0, @private2}], 0x2c) [ 1038.004433][ T5092] loop1: detected capacity change from 0 to 2048 12:22:09 executing program 4: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x82, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket(0x10, 0x803, 0x0) sendto(r0, &(0x7f00000000c0)="120000001200e7ef007b00000000000000a1", 0x12, 0x0, 0x0, 0x0) recvmmsg(r0, &(0x7f00000037c0)=[{{&(0x7f00000004c0)=@ethernet={0x0, @random}, 0x80, &(0x7f0000000380)=[{&(0x7f0000000040)=""/95, 0x5f}, {&(0x7f0000000140)=""/85, 0x55}, {&(0x7f0000000fc0)=""/4096, 0x1000}, {&(0x7f0000000400)=""/106, 0x6a}, {&(0x7f0000000740)=""/73, 0x49}, {&(0x7f0000000200)=""/77, 0x4d}, {0x0}], 0x7, &(0x7f0000000600)=""/191, 0xbf}, 0x2000000}], 0x1, 0x0, &(0x7f0000003700)={0x77359400}) 12:22:09 executing program 2: open(&(0x7f0000000400)='./bus\x00', 0x14103e, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$L2TP_CMD_SESSION_MODIFY(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000080)={0x30, r1, 0x1, 0x0, 0x0, {}, [@L2TP_ATTR_SEND_SEQ={0x5}, @L2TP_ATTR_IFNAME={0x14, 0x8, 'veth1_to_hsr\x00'}]}, 0x30}, 0x1, 0x4000000}, 0x0) [ 1038.088167][ T5092] EXT4-fs mount: 9 callbacks suppressed [ 1038.088182][ T5092] EXT4-fs (loop1): mounted filesystem 00000000-0000-0000-0000-000000000000 without journal. Quota mode: none. [ 1038.146486][ T5092] ext4 filesystem being mounted at /root/syzkaller-testdir1539738704/syzkaller.ao1jj3/3820/bus supports timestamps until 2038 (0x7fffffff) [ 1038.247095][ T5092] loop1: detected capacity change from 2048 to 2047 [ 1038.279362][ T3128] EXT4-fs (loop1): unmounting filesystem 00000000-0000-0000-0000-000000000000. 12:22:10 executing program 5: r0 = socket$unix(0x1, 0x2, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f0000000100)={'vcan0\x00', 0x0}) r2 = socket$can_bcm(0x1d, 0x2, 0x2) connect$can_bcm(r2, &(0x7f0000000000), 0x10) ioctl$sock_kcm_SIOCKCMUNATTACH(0xffffffffffffffff, 0x89e1, 0xffffffffffffffff) ioctl$sock_SIOCSPGRP(0xffffffffffffffff, 0x8902, 0x0) sendmsg$can_bcm(r2, &(0x7f0000000480)={&(0x7f0000000340)={0x1d, r1, 0x3f420f00}, 0x10, &(0x7f0000000040)={&(0x7f0000000580)=ANY=[@ANYBLOB="01000000d7fe68ca0000e9ffffff0000", @ANYRES64=0x0, @ANYRES64=0x0, @ANYRES64=0x0, @ANYRES64=r0, @ANYBLOB="3bf81bb9f1"], 0x20000600}}, 0x0) r3 = socket(0x0, 0x800, 0x40000) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r3, 0x541b, &(0x7f00000000c0)={'ip6_vti0\x00', 0x0}) sendmsg$IPCTNL_MSG_EXP_DELETE(0xffffffffffffffff, &(0x7f00000004c0)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x40000040}, 0xc, &(0x7f0000000440)={&(0x7f00000006c0)={0x1d0, 0x2, 0x2, 0x201, 0x0, 0x0, {0xa}, [@CTA_EXPECT_NAT={0xc0, 0xa, 0x0, 0x1, [@CTA_EXPECT_NAT_TUPLE={0xc, 0x2, 0x0, 0x1, [@CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x1}]}, @CTA_EXPECT_NAT_TUPLE={0x70, 0x2, 0x0, 0x1, [@CTA_TUPLE_IP={0x2c, 0x1, 0x0, 0x1, @ipv6={{0x14, 0x3, @loopback}, {0x14, 0x4, @private0}}}, @CTA_TUPLE_IP={0x14, 0x1, 0x0, 0x1, @ipv4={{0x8, 0x1, @empty}, {0x8, 0x2, @initdev={0xac, 0x1e, 0x1, 0x0}}}}, @CTA_TUPLE_IP={0x14, 0x1, 0x0, 0x1, @ipv4={{0x8, 0x1, @local}, {0x8, 0x2, @loopback}}}, @CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x4}, @CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x3}, @CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x1}]}, @CTA_EXPECT_NAT_TUPLE={0x38, 0x2, 0x0, 0x1, [@CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5, 0x1, 0x88}}, @CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x3}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5, 0x1, 0x21}}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5, 0x1, 0x1}}, @CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x3}]}, @CTA_EXPECT_NAT_DIR={0x8}]}, @CTA_EXPECT_MASTER={0x20, 0x1, 0x0, 0x1, [@CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x1}, @CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x2}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5, 0x1, 0x84}}]}, @CTA_EXPECT_MASTER={0xdc, 0x1, 0x0, 0x1, [@CTA_TUPLE_IP={0x14, 0x1, 0x0, 0x1, @ipv4={{0x8, 0x1, @multicast1}, {0x8, 0x2, @dev={0xac, 0x14, 0x14, 0x3a}}}}, @CTA_TUPLE_ZONE={0x6}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5, 0x1, 0x21}}, @CTA_TUPLE_IP={0x14, 0x1, 0x0, 0x1, @ipv4={{0x8, 0x1, @empty}, {0x8, 0x2, @local}}}, @CTA_TUPLE_IP={0x2c, 0x1, 0x0, 0x1, @ipv6={{0x14, 0x3, @private1={0xfc, 0x1, '\x00', 0x1}}, {0x14, 0x4, @rand_addr=' \x01\x00'}}}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5, 0x1, 0x1}}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5, 0x1, 0x88}}, @CTA_TUPLE_IP={0x2c, 0x1, 0x0, 0x1, @ipv6={{0x14, 0x3, @empty}, {0x14, 0x4, @dev={0xfe, 0x80, '\x00', 0x21}}}}, @CTA_TUPLE_IP={0x2c, 0x1, 0x0, 0x1, @ipv6={{0x14, 0x3, @local}, {0x14, 0x4, @ipv4={'\x00', '\xff\xff', @rand_addr=0x64010100}}}}]}]}, 0x1d0}}, 0x48000) perf_event_open(&(0x7f0000000500)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x15, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$binfmt_elf32(0xffffffffffffffff, &(0x7f0000000040)=ANY=[], 0x69) connect$can_bcm(0xffffffffffffffff, &(0x7f0000000000), 0x10) sendmsg$can_bcm(0xffffffffffffffff, &(0x7f0000000480)={&(0x7f0000000340)={0x1d, 0x0, 0x3f420f00}, 0x10, &(0x7f0000000040)={&(0x7f0000000580)=ANY=[@ANYBLOB="01000000d7fe68ca0000e9ffffff0000", @ANYRES64=0x0, @ANYRES64=0x0, @ANYRES64=0x0, @ANYRES64], 0x20000600}}, 0x0) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(0xffffffffffffffff, 0x89f0, &(0x7f0000000280)={'gretap0\x00', &(0x7f0000000240)={'ip_vti0\x00', 0x0, 0x7, 0x80, 0xfffffff7, 0x7, {{0x8, 0x4, 0x0, 0x5, 0x20, 0x67, 0x0, 0xc0, 0x29, 0x0, @local, @empty, {[@timestamp={0x44, 0xc, 0x8, 0x0, 0x2, [0x7f, 0x1]}]}}}}}) socket(0x10, 0x3, 0x0) process_mrelease(0xffffffffffffffff, 0x0) r4 = socket$packet(0x11, 0x2, 0x300) ioctl$sock_SIOCGIFINDEX(r4, 0x8933, 0x0) getsockopt$inet_sctp_SCTP_RECVNXTINFO(r3, 0x84, 0x21, &(0x7f0000000140), &(0x7f0000000200)=0x4) bind$unix(r0, &(0x7f00000005c0)=@abs={0x1, 0x0, 0x4e23}, 0x6e) syz_clone(0x40000000, &(0x7f00000000c0), 0x0, 0x0, &(0x7f00000001c0), 0x0) 12:22:10 executing program 4: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x82, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket(0x10, 0x803, 0x0) sendto(r0, &(0x7f00000000c0)="120000001200e7ef007b00000000000000a1", 0x12, 0x0, 0x0, 0x0) recvmmsg(r0, &(0x7f00000037c0)=[{{&(0x7f00000004c0)=@ethernet={0x0, @random}, 0x80, &(0x7f0000000380)=[{&(0x7f0000000040)=""/95, 0x5f}, {&(0x7f0000000140)=""/85, 0x55}, {&(0x7f0000000fc0)=""/4096, 0x1000}, {&(0x7f0000000400)=""/106, 0x6a}, {&(0x7f0000000740)=""/73, 0x49}, {&(0x7f0000000200)=""/77, 0x4d}, {0x0}], 0x7, &(0x7f0000000600)=""/191, 0xbf}, 0x3000000}], 0x1, 0x0, &(0x7f0000003700)={0x77359400}) 12:22:10 executing program 3: syz_open_dev$vcsn(&(0x7f0000000000), 0x10000, 0x84800) 12:22:10 executing program 2: open(&(0x7f0000000400)='./bus\x00', 0x14103e, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$L2TP_CMD_SESSION_MODIFY(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000080)={0x30, r1, 0x1, 0x0, 0x0, {}, [@L2TP_ATTR_SEND_SEQ={0x5}, @L2TP_ATTR_IFNAME={0x14, 0x8, 'veth1_to_hsr\x00'}]}, 0x30}, 0x1, 0x5000000}, 0x0) 12:22:10 executing program 1: syz_mount_image$ext4(&(0x7f0000000740)='ext4\x00', &(0x7f0000000100)='./bus\x00', 0x804810, &(0x7f0000000180)=ANY=[@ANYBLOB="0061021d307a961da7401271e3fa98008000001d3902ccfd562158cb15c016093893c9e4abd02bc4f1492514fa2dfebc8001000080000000008a1049ca0000"], 0x1, 0x73b, &(0x7f0000000780)="$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") chdir(&(0x7f0000000080)='./file0\x00') open(&(0x7f00000000c0)='./bus\x00', 0x14da42, 0x0) mount(&(0x7f0000000380)=@loop={'/dev/loop', 0x0}, &(0x7f00000003c0)='./bus\x00', 0x0, 0x1000, 0x0) r0 = open(&(0x7f0000000400)='./bus\x00', 0x0, 0x0) ioctl$LOOP_SET_STATUS(r0, 0x4c02, &(0x7f00000001c0)={0x0, {}, 0x0, {}, 0xff, 0x0, 0x0, 0x0, "be8176c9e6755a48a3c0230dd390efe12f8306bed95b2afd402aae879978d959ff9009eec610d9108ea036456bb79e26ee42d0a34968c1fdbb33e8ad5860f632", "b948757aa008fae13adca739a9f126462ab528ea52e90ce2cf50a4ef2568375b"}) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='blkio.throttle.io_service_bytes\x00', 0x275a, 0xc00000000000000) 12:22:10 executing program 0: r0 = socket$unix(0x1, 0x2, 0x0) r1 = socket$can_bcm(0x1d, 0x2, 0x2) connect$can_bcm(r1, &(0x7f0000000000), 0x10) ioctl$sock_kcm_SIOCKCMUNATTACH(0xffffffffffffffff, 0x89e1, 0xffffffffffffffff) getsockopt$inet_sctp_SCTP_PEER_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1a, &(0x7f0000000380)={0x0, 0x80, "f29c5b753353d9c7798811e57823354f32d6cb0899a53381003e4f8dbbb1ea469076c8e175a20b45443f885afb38b83813d5e013d4fad662f1582b23328b4ed70ad9d7d4d0052d0147d8b0ac4910985bec8aa8956c599d291a7da55fec010801d8f02dcff373f52f59f867378c13f4a080938c965846a7e8229b410b3ea0f9ce"}, &(0x7f00000002c0)=0x88) socket$igmp6(0xa, 0x3, 0x2) perf_event_open(&(0x7f0000000500)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x15, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) close(0xffffffffffffffff) socket$inet_mptcp(0x2, 0x1, 0x106) connect$can_bcm(0xffffffffffffffff, &(0x7f0000000000), 0x10) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, 0x0) bind$unix(r0, &(0x7f00000005c0)=@abs={0x1, 0x0, 0x4e23}, 0x6e) syz_clone(0x40000000, &(0x7f00000000c0), 0x0, 0x0, 0x0, 0x0) 12:22:10 executing program 3: select(0x40, &(0x7f0000000540), &(0x7f0000000600), &(0x7f0000000640)={0x1}, &(0x7f0000000680)) 12:22:10 executing program 2: open(&(0x7f0000000400)='./bus\x00', 0x14103e, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$L2TP_CMD_SESSION_MODIFY(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000080)={0x30, r1, 0x1, 0x0, 0x0, {}, [@L2TP_ATTR_SEND_SEQ={0x5}, @L2TP_ATTR_IFNAME={0x14, 0x8, 'veth1_to_hsr\x00'}]}, 0x30}, 0x1, 0x6000000}, 0x0) 12:22:10 executing program 4: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x82, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket(0x10, 0x803, 0x0) sendto(r0, &(0x7f00000000c0)="120000001200e7ef007b00000000000000a1", 0x12, 0x0, 0x0, 0x0) recvmmsg(r0, &(0x7f00000037c0)=[{{&(0x7f00000004c0)=@ethernet={0x0, @random}, 0x80, &(0x7f0000000380)=[{&(0x7f0000000040)=""/95, 0x5f}, {&(0x7f0000000140)=""/85, 0x55}, {&(0x7f0000000fc0)=""/4096, 0x1000}, {&(0x7f0000000400)=""/106, 0x6a}, {&(0x7f0000000740)=""/73, 0x49}, {&(0x7f0000000200)=""/77, 0x4d}, {0x0}], 0x7, &(0x7f0000000600)=""/191, 0xbf}, 0x4000000}], 0x1, 0x0, &(0x7f0000003700)={0x77359400}) [ 1038.709815][ T5120] loop1: detected capacity change from 0 to 2048 12:22:10 executing program 3: sendmsg$tipc(0xffffffffffffffff, 0x0, 0xda6381788fb65a2a) 12:22:10 executing program 2: open(&(0x7f0000000400)='./bus\x00', 0x14103e, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$L2TP_CMD_SESSION_MODIFY(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000080)={0x30, r1, 0x1, 0x0, 0x0, {}, [@L2TP_ATTR_SEND_SEQ={0x5}, @L2TP_ATTR_IFNAME={0x14, 0x8, 'veth1_to_hsr\x00'}]}, 0x30}, 0x1, 0x7000000}, 0x0) 12:22:10 executing program 4: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x82, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket(0x10, 0x803, 0x0) sendto(r0, &(0x7f00000000c0)="120000001200e7ef007b00000000000000a1", 0x12, 0x0, 0x0, 0x0) recvmmsg(r0, &(0x7f00000037c0)=[{{&(0x7f00000004c0)=@ethernet={0x0, @random}, 0x80, &(0x7f0000000380)=[{&(0x7f0000000040)=""/95, 0x5f}, {&(0x7f0000000140)=""/85, 0x55}, {&(0x7f0000000fc0)=""/4096, 0x1000}, {&(0x7f0000000400)=""/106, 0x6a}, {&(0x7f0000000740)=""/73, 0x49}, {&(0x7f0000000200)=""/77, 0x4d}, {0x0}], 0x7, &(0x7f0000000600)=""/191, 0xbf}, 0x5000000}], 0x1, 0x0, &(0x7f0000003700)={0x77359400}) [ 1038.891117][ T5120] EXT4-fs (loop1): mounted filesystem 00000000-0000-0000-0000-000000000000 without journal. Quota mode: none. [ 1038.958747][ T5120] ext4 filesystem being mounted at /root/syzkaller-testdir1539738704/syzkaller.ao1jj3/3821/bus supports timestamps until 2038 (0x7fffffff) [ 1039.091904][ T5120] loop1: detected capacity change from 2048 to 2047 [ 1039.129068][ T3128] EXT4-fs (loop1): unmounting filesystem 00000000-0000-0000-0000-000000000000. 12:22:10 executing program 5: r0 = socket$unix(0x1, 0x2, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f0000000100)={'vcan0\x00', 0x0}) r2 = socket$can_bcm(0x1d, 0x2, 0x2) connect$can_bcm(r2, &(0x7f0000000000), 0x10) ioctl$sock_kcm_SIOCKCMUNATTACH(0xffffffffffffffff, 0x89e1, 0xffffffffffffffff) ioctl$sock_SIOCSPGRP(0xffffffffffffffff, 0x8902, 0x0) sendmsg$can_bcm(r2, &(0x7f0000000480)={&(0x7f0000000340)={0x1d, r1, 0x3f420f00}, 0x10, &(0x7f0000000040)={&(0x7f0000000580)=ANY=[@ANYBLOB="01000000d7fe68ca0000e9ffffff0000", @ANYRES64=0x0, @ANYRES64=0x0, @ANYRES64=0x0, @ANYRES64=r0, @ANYBLOB="3bf81bb9f1"], 0x20000600}}, 0x0) r3 = socket(0x0, 0x800, 0x40000) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r3, 0x541b, &(0x7f00000000c0)={'ip6_vti0\x00', 0x0}) sendmsg$IPCTNL_MSG_EXP_DELETE(0xffffffffffffffff, &(0x7f00000004c0)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x40000040}, 0xc, &(0x7f0000000440)={&(0x7f00000006c0)={0x1d0, 0x2, 0x2, 0x201, 0x0, 0x0, {0xa}, [@CTA_EXPECT_NAT={0xc0, 0xa, 0x0, 0x1, [@CTA_EXPECT_NAT_TUPLE={0xc, 0x2, 0x0, 0x1, [@CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x1}]}, @CTA_EXPECT_NAT_TUPLE={0x70, 0x2, 0x0, 0x1, [@CTA_TUPLE_IP={0x2c, 0x1, 0x0, 0x1, @ipv6={{0x14, 0x3, @loopback}, {0x14, 0x4, @private0}}}, @CTA_TUPLE_IP={0x14, 0x1, 0x0, 0x1, @ipv4={{0x8, 0x1, @empty}, {0x8, 0x2, @initdev={0xac, 0x1e, 0x1, 0x0}}}}, @CTA_TUPLE_IP={0x14, 0x1, 0x0, 0x1, @ipv4={{0x8, 0x1, @local}, {0x8, 0x2, @loopback}}}, @CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x4}, @CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x3}, @CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x1}]}, @CTA_EXPECT_NAT_TUPLE={0x38, 0x2, 0x0, 0x1, [@CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5, 0x1, 0x88}}, @CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x3}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5, 0x1, 0x21}}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5, 0x1, 0x1}}, @CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x3}]}, @CTA_EXPECT_NAT_DIR={0x8}]}, @CTA_EXPECT_MASTER={0x20, 0x1, 0x0, 0x1, [@CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x1}, @CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x2}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5, 0x1, 0x84}}]}, @CTA_EXPECT_MASTER={0xdc, 0x1, 0x0, 0x1, [@CTA_TUPLE_IP={0x14, 0x1, 0x0, 0x1, @ipv4={{0x8, 0x1, @multicast1}, {0x8, 0x2, @dev={0xac, 0x14, 0x14, 0x3a}}}}, @CTA_TUPLE_ZONE={0x6}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5, 0x1, 0x21}}, @CTA_TUPLE_IP={0x14, 0x1, 0x0, 0x1, @ipv4={{0x8, 0x1, @empty}, {0x8, 0x2, @local}}}, @CTA_TUPLE_IP={0x2c, 0x1, 0x0, 0x1, @ipv6={{0x14, 0x3, @private1={0xfc, 0x1, '\x00', 0x1}}, {0x14, 0x4, @rand_addr=' \x01\x00'}}}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5, 0x1, 0x1}}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5, 0x1, 0x88}}, @CTA_TUPLE_IP={0x2c, 0x1, 0x0, 0x1, @ipv6={{0x14, 0x3, @empty}, {0x14, 0x4, @dev={0xfe, 0x80, '\x00', 0x21}}}}, @CTA_TUPLE_IP={0x2c, 0x1, 0x0, 0x1, @ipv6={{0x14, 0x3, @local}, {0x14, 0x4, @ipv4={'\x00', '\xff\xff', @rand_addr=0x64010100}}}}]}]}, 0x1d0}}, 0x48000) perf_event_open(&(0x7f0000000500)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x15, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$binfmt_elf32(0xffffffffffffffff, &(0x7f0000000040)=ANY=[], 0x69) connect$can_bcm(0xffffffffffffffff, &(0x7f0000000000), 0x10) sendmsg$can_bcm(0xffffffffffffffff, &(0x7f0000000480)={&(0x7f0000000340)={0x1d, 0x0, 0x3f420f00}, 0x10, &(0x7f0000000040)={&(0x7f0000000580)=ANY=[@ANYBLOB="01000000d7fe68ca0000e9ffffff0000", @ANYRES64=0x0, @ANYRES64=0x0, @ANYRES64=0x0, @ANYRES64], 0x20000600}}, 0x0) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(0xffffffffffffffff, 0x89f0, &(0x7f0000000280)={'gretap0\x00', &(0x7f0000000240)={'ip_vti0\x00', 0x0, 0x7, 0x80, 0xfffffff7, 0x7, {{0x8, 0x4, 0x0, 0x5, 0x20, 0x67, 0x0, 0xc0, 0x29, 0x0, @local, @empty, {[@timestamp={0x44, 0xc, 0x8, 0x0, 0x2, [0x7f, 0x1]}]}}}}}) socket(0x10, 0x3, 0x0) process_mrelease(0xffffffffffffffff, 0x0) r4 = socket$packet(0x11, 0x2, 0x300) ioctl$sock_SIOCGIFINDEX(r4, 0x8933, 0x0) getsockopt$inet_sctp_SCTP_RECVNXTINFO(r3, 0x84, 0x21, &(0x7f0000000140), &(0x7f0000000200)=0x4) bind$unix(r0, &(0x7f00000005c0)=@abs={0x1, 0x0, 0x4e23}, 0x6e) syz_clone(0x40000000, &(0x7f00000000c0), 0x0, 0x0, &(0x7f00000001c0), 0x0) 12:22:10 executing program 3: setsockopt$MRT_ADD_VIF(0xffffffffffffffff, 0x0, 0xca, 0x0, 0x0) r0 = socket$igmp(0x2, 0x3, 0x2) setsockopt$MRT_ADD_MFC(r0, 0x0, 0xcc, &(0x7f0000000000)={@dev, @empty, 0x0, "a31f0fc73789593aabe50964124ecf269704ada3ef94a60bce8905766f4fe674"}, 0x3c) 12:22:10 executing program 4: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x82, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket(0x10, 0x803, 0x0) sendto(r0, &(0x7f00000000c0)="120000001200e7ef007b00000000000000a1", 0x12, 0x0, 0x0, 0x0) recvmmsg(r0, &(0x7f00000037c0)=[{{&(0x7f00000004c0)=@ethernet={0x0, @random}, 0x80, &(0x7f0000000380)=[{&(0x7f0000000040)=""/95, 0x5f}, {&(0x7f0000000140)=""/85, 0x55}, {&(0x7f0000000fc0)=""/4096, 0x1000}, {&(0x7f0000000400)=""/106, 0x6a}, {&(0x7f0000000740)=""/73, 0x49}, {&(0x7f0000000200)=""/77, 0x4d}, {0x0}], 0x7, &(0x7f0000000600)=""/191, 0xbf}, 0x6000000}], 0x1, 0x0, &(0x7f0000003700)={0x77359400}) 12:22:10 executing program 2: open(&(0x7f0000000400)='./bus\x00', 0x14103e, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$L2TP_CMD_SESSION_MODIFY(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000080)={0x30, r1, 0x1, 0x0, 0x0, {}, [@L2TP_ATTR_SEND_SEQ={0x5}, @L2TP_ATTR_IFNAME={0x14, 0x8, 'veth1_to_hsr\x00'}]}, 0x30}, 0x1, 0x8000000}, 0x0) 12:22:10 executing program 1: syz_mount_image$ext4(&(0x7f0000000740)='ext4\x00', &(0x7f0000000100)='./bus\x00', 0x804810, &(0x7f0000000180)=ANY=[@ANYBLOB="0061021d307a961da7401271e3fa98008000001d3902ccfd562158cb15c016093893c9e4abd02bc4f1492514fa2dfebc8001000080000000008a1049ca0000"], 0x1, 0x73b, &(0x7f0000000780)="$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") chdir(&(0x7f0000000080)='./file0\x00') open(&(0x7f00000000c0)='./bus\x00', 0x14da42, 0x0) mount(&(0x7f0000000380)=@loop={'/dev/loop', 0x0}, &(0x7f00000003c0)='./bus\x00', 0x0, 0x1000, 0x0) r0 = open(&(0x7f0000000400)='./bus\x00', 0x0, 0x0) ioctl$LOOP_SET_STATUS(r0, 0x4c02, &(0x7f00000001c0)={0x0, {}, 0x0, {}, 0xff, 0x0, 0x0, 0x0, "be8176c9e6755a48a3c0230dd390efe12f8306bed95b2afd402aae879978d959ff9009eec610d9108ea036456bb79e26ee42d0a34968c1fdbb33e8ad5860f632", "b948757aa008fae13adca739a9f126462ab528ea52e90ce2cf50a4ef2568375b"}) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='blkio.throttle.io_service_bytes\x00', 0x275a, 0xd00000000000000) 12:22:10 executing program 0: r0 = socket$unix(0x1, 0x2, 0x0) r1 = socket$can_bcm(0x1d, 0x2, 0x2) connect$can_bcm(r1, &(0x7f0000000000), 0x10) ioctl$sock_kcm_SIOCKCMUNATTACH(0xffffffffffffffff, 0x89e1, 0xffffffffffffffff) getsockopt$inet_sctp_SCTP_PEER_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1a, &(0x7f0000000380)={0x0, 0x80, "f29c5b753353d9c7798811e57823354f32d6cb0899a53381003e4f8dbbb1ea469076c8e175a20b45443f885afb38b83813d5e013d4fad662f1582b23328b4ed70ad9d7d4d0052d0147d8b0ac4910985bec8aa8956c599d291a7da55fec010801d8f02dcff373f52f59f867378c13f4a080938c965846a7e8229b410b3ea0f9ce"}, &(0x7f00000002c0)=0x88) socket$igmp6(0xa, 0x3, 0x2) perf_event_open(&(0x7f0000000500)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x15, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) close(0xffffffffffffffff) socket$inet_mptcp(0x2, 0x1, 0x106) connect$can_bcm(0xffffffffffffffff, &(0x7f0000000000), 0x10) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, 0x0) bind$unix(r0, &(0x7f00000005c0)=@abs={0x1, 0x0, 0x4e23}, 0x6e) syz_clone(0x40000000, &(0x7f00000000c0), 0x0, 0x0, 0x0, 0x0) 12:22:10 executing program 2: open(&(0x7f0000000400)='./bus\x00', 0x14103e, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$L2TP_CMD_SESSION_MODIFY(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000080)={0x30, r1, 0x1, 0x0, 0x0, {}, [@L2TP_ATTR_SEND_SEQ={0x5}, @L2TP_ATTR_IFNAME={0x14, 0x8, 'veth1_to_hsr\x00'}]}, 0x30}, 0x1, 0x9000000}, 0x0) 12:22:10 executing program 3: socketpair$tipc(0x1e, 0x5, 0x0, &(0x7f0000000140)={0xffffffffffffffff}) connect$tipc(r0, 0x0, 0x0) 12:22:10 executing program 4: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x82, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket(0x10, 0x803, 0x0) sendto(r0, &(0x7f00000000c0)="120000001200e7ef007b00000000000000a1", 0x12, 0x0, 0x0, 0x0) recvmmsg(r0, &(0x7f00000037c0)=[{{&(0x7f00000004c0)=@ethernet={0x0, @random}, 0x80, &(0x7f0000000380)=[{&(0x7f0000000040)=""/95, 0x5f}, {&(0x7f0000000140)=""/85, 0x55}, {&(0x7f0000000fc0)=""/4096, 0x1000}, {&(0x7f0000000400)=""/106, 0x6a}, {&(0x7f0000000740)=""/73, 0x49}, {&(0x7f0000000200)=""/77, 0x4d}, {0x0}], 0x7, &(0x7f0000000600)=""/191, 0xbf}, 0x8000000}], 0x1, 0x0, &(0x7f0000003700)={0x77359400}) 12:22:10 executing program 3: r0 = openat$rfkill(0xffffffffffffff9c, &(0x7f0000000fc0), 0x0, 0x0) write$rfkill(r0, 0x0, 0x0) 12:22:10 executing program 2: open(&(0x7f0000000400)='./bus\x00', 0x14103e, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$L2TP_CMD_SESSION_MODIFY(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000080)={0x30, r1, 0x1, 0x0, 0x0, {}, [@L2TP_ATTR_SEND_SEQ={0x5}, @L2TP_ATTR_IFNAME={0x14, 0x8, 'veth1_to_hsr\x00'}]}, 0x30}, 0x1, 0xf000000}, 0x0) [ 1039.383275][ T5153] loop1: detected capacity change from 0 to 2048 12:22:10 executing program 2: open(&(0x7f0000000400)='./bus\x00', 0x14103e, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$L2TP_CMD_SESSION_MODIFY(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000080)={0x30, r1, 0x1, 0x0, 0x0, {}, [@L2TP_ATTR_SEND_SEQ={0x5}, @L2TP_ATTR_IFNAME={0x14, 0x8, 'veth1_to_hsr\x00'}]}, 0x30}, 0x1, 0x13000000}, 0x0) [ 1039.504715][ T5153] EXT4-fs (loop1): mounted filesystem 00000000-0000-0000-0000-000000000000 without journal. Quota mode: none. [ 1039.551277][ T5153] ext4 filesystem being mounted at /root/syzkaller-testdir1539738704/syzkaller.ao1jj3/3822/bus supports timestamps until 2038 (0x7fffffff) [ 1039.668294][ T5153] loop1: detected capacity change from 2048 to 2047 [ 1039.732591][ T3128] EXT4-fs (loop1): unmounting filesystem 00000000-0000-0000-0000-000000000000. 12:22:14 executing program 5: r0 = socket$unix(0x1, 0x2, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f0000000100)={'vcan0\x00', 0x0}) r2 = socket$can_bcm(0x1d, 0x2, 0x2) connect$can_bcm(r2, &(0x7f0000000000), 0x10) ioctl$sock_kcm_SIOCKCMUNATTACH(0xffffffffffffffff, 0x89e1, 0xffffffffffffffff) ioctl$sock_SIOCSPGRP(0xffffffffffffffff, 0x8902, 0x0) sendmsg$can_bcm(r2, &(0x7f0000000480)={&(0x7f0000000340)={0x1d, r1, 0x3f420f00}, 0x10, &(0x7f0000000040)={&(0x7f0000000580)=ANY=[@ANYBLOB="01000000d7fe68ca0000e9ffffff0000", @ANYRES64=0x0, @ANYRES64=0x0, @ANYRES64=0x0, @ANYRES64=r0, @ANYBLOB="3bf81bb9f1"], 0x20000600}}, 0x0) r3 = socket(0x0, 0x800, 0x40000) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r3, 0x541b, &(0x7f00000000c0)={'ip6_vti0\x00', 0x0}) sendmsg$IPCTNL_MSG_EXP_DELETE(0xffffffffffffffff, 0x0, 0x48000) perf_event_open(&(0x7f0000000500)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x15, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$binfmt_elf32(0xffffffffffffffff, &(0x7f0000000040)=ANY=[], 0x69) connect$can_bcm(0xffffffffffffffff, &(0x7f0000000000), 0x10) sendmsg$can_bcm(0xffffffffffffffff, &(0x7f0000000480)={&(0x7f0000000340)={0x1d, 0x0, 0x3f420f00}, 0x10, &(0x7f0000000040)={&(0x7f0000000580)=ANY=[@ANYBLOB="01000000d7fe68ca0000e9ffffff0000", @ANYRES64=0x0, @ANYRES64=0x0, @ANYRES64=0x0, @ANYRES64], 0x20000600}}, 0x0) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(0xffffffffffffffff, 0x89f0, &(0x7f0000000280)={'gretap0\x00', &(0x7f0000000240)={'ip_vti0\x00', 0x0, 0x7, 0x80, 0xfffffff7, 0x7, {{0x8, 0x4, 0x0, 0x5, 0x20, 0x67, 0x0, 0xc0, 0x29, 0x0, @local, @empty, {[@timestamp={0x44, 0xc, 0x8, 0x0, 0x2, [0x7f, 0x1]}]}}}}}) socket(0x10, 0x3, 0x0) process_mrelease(0xffffffffffffffff, 0x0) r4 = socket$packet(0x11, 0x2, 0x300) ioctl$sock_SIOCGIFINDEX(r4, 0x8933, 0x0) getsockopt$inet_sctp_SCTP_RECVNXTINFO(r3, 0x84, 0x21, &(0x7f0000000140), &(0x7f0000000200)=0x4) bind$unix(r0, &(0x7f00000005c0)=@abs={0x1, 0x0, 0x4e23}, 0x6e) syz_clone(0x40000000, &(0x7f00000000c0), 0x0, 0x0, &(0x7f00000001c0), 0x0) 12:22:14 executing program 3: add_key(&(0x7f0000000080)='.request_key_auth\x00', 0x0, 0x0, 0x0, 0xfffffffffffffffd) 12:22:14 executing program 4: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x82, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket(0x10, 0x803, 0x0) sendto(r0, &(0x7f00000000c0)="120000001200e7ef007b00000000000000a1", 0x12, 0x0, 0x0, 0x0) recvmmsg(r0, &(0x7f00000037c0)=[{{&(0x7f00000004c0)=@ethernet={0x0, @random}, 0x80, &(0x7f0000000380)=[{&(0x7f0000000040)=""/95, 0x5f}, {&(0x7f0000000140)=""/85, 0x55}, {&(0x7f0000000fc0)=""/4096, 0x1000}, {&(0x7f0000000400)=""/106, 0x6a}, {&(0x7f0000000740)=""/73, 0x49}, {&(0x7f0000000200)=""/77, 0x4d}, {0x0}], 0x7, &(0x7f0000000600)=""/191, 0xbf}, 0x9000000}], 0x1, 0x0, &(0x7f0000003700)={0x77359400}) 12:22:14 executing program 1: syz_mount_image$ext4(&(0x7f0000000740)='ext4\x00', &(0x7f0000000100)='./bus\x00', 0x804810, &(0x7f0000000180)=ANY=[@ANYBLOB="0061021d307a961da7401271e3fa98008000001d3902ccfd562158cb15c016093893c9e4abd02bc4f1492514fa2dfebc8001000080000000008a1049ca0000"], 0x1, 0x73b, &(0x7f0000000780)="$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") chdir(&(0x7f0000000080)='./file0\x00') open(&(0x7f00000000c0)='./bus\x00', 0x14da42, 0x0) mount(&(0x7f0000000380)=@loop={'/dev/loop', 0x0}, &(0x7f00000003c0)='./bus\x00', 0x0, 0x1000, 0x0) r0 = open(&(0x7f0000000400)='./bus\x00', 0x0, 0x0) ioctl$LOOP_SET_STATUS(r0, 0x4c02, &(0x7f00000001c0)={0x0, {}, 0x0, {}, 0xff, 0x0, 0x0, 0x0, "be8176c9e6755a48a3c0230dd390efe12f8306bed95b2afd402aae879978d959ff9009eec610d9108ea036456bb79e26ee42d0a34968c1fdbb33e8ad5860f632", "b948757aa008fae13adca739a9f126462ab528ea52e90ce2cf50a4ef2568375b"}) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='blkio.throttle.io_service_bytes\x00', 0x275a, 0xf00000000000000) 12:22:14 executing program 0: r0 = socket$unix(0x1, 0x2, 0x0) r1 = socket$can_bcm(0x1d, 0x2, 0x2) connect$can_bcm(r1, &(0x7f0000000000), 0x10) ioctl$sock_kcm_SIOCKCMUNATTACH(0xffffffffffffffff, 0x89e1, 0xffffffffffffffff) getsockopt$inet_sctp_SCTP_PEER_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1a, &(0x7f0000000380)={0x0, 0x80, "f29c5b753353d9c7798811e57823354f32d6cb0899a53381003e4f8dbbb1ea469076c8e175a20b45443f885afb38b83813d5e013d4fad662f1582b23328b4ed70ad9d7d4d0052d0147d8b0ac4910985bec8aa8956c599d291a7da55fec010801d8f02dcff373f52f59f867378c13f4a080938c965846a7e8229b410b3ea0f9ce"}, &(0x7f00000002c0)=0x88) socket$igmp6(0xa, 0x3, 0x2) perf_event_open(&(0x7f0000000500)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x15, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) close(0xffffffffffffffff) socket$inet_mptcp(0x2, 0x1, 0x106) connect$can_bcm(0xffffffffffffffff, &(0x7f0000000000), 0x10) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, 0x0) bind$unix(r0, &(0x7f00000005c0)=@abs={0x1, 0x0, 0x4e23}, 0x6e) syz_clone(0x40000000, &(0x7f00000000c0), 0x0, 0x0, 0x0, 0x0) 12:22:14 executing program 2: open(&(0x7f0000000400)='./bus\x00', 0x14103e, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$L2TP_CMD_SESSION_MODIFY(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000080)={0x30, r1, 0x1, 0x0, 0x0, {}, [@L2TP_ATTR_SEND_SEQ={0x5}, @L2TP_ATTR_IFNAME={0x14, 0x8, 'veth1_to_hsr\x00'}]}, 0x30}, 0x1, 0x60000000}, 0x0) 12:22:14 executing program 3: r0 = socket$packet(0x11, 0x3, 0x300) getsockopt$packet_int(r0, 0x107, 0xb, &(0x7f0000000080), &(0x7f00000000c0)=0x4) 12:22:14 executing program 2: open(&(0x7f0000000400)='./bus\x00', 0x14103e, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$L2TP_CMD_SESSION_MODIFY(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000080)={0x30, r1, 0x1, 0x0, 0x0, {}, [@L2TP_ATTR_SEND_SEQ={0x5}, @L2TP_ATTR_IFNAME={0x14, 0x8, 'veth1_to_hsr\x00'}]}, 0x30}, 0x1, 0x9effffff}, 0x0) 12:22:14 executing program 4: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x82, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket(0x10, 0x803, 0x0) sendto(r0, &(0x7f00000000c0)="120000001200e7ef007b00000000000000a1", 0x12, 0x0, 0x0, 0x0) recvmmsg(r0, &(0x7f00000037c0)=[{{&(0x7f00000004c0)=@ethernet={0x0, @random}, 0x80, &(0x7f0000000380)=[{&(0x7f0000000040)=""/95, 0x5f}, {&(0x7f0000000140)=""/85, 0x55}, {&(0x7f0000000fc0)=""/4096, 0x1000}, {&(0x7f0000000400)=""/106, 0x6a}, {&(0x7f0000000740)=""/73, 0x49}, {&(0x7f0000000200)=""/77, 0x4d}, {0x0}], 0x7, &(0x7f0000000600)=""/191, 0xbf}, 0xa000000}], 0x1, 0x0, &(0x7f0000003700)={0x77359400}) 12:22:14 executing program 2: open(&(0x7f0000000400)='./bus\x00', 0x14103e, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$L2TP_CMD_SESSION_MODIFY(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000080)={0x30, r1, 0x1, 0x0, 0x0, {}, [@L2TP_ATTR_SEND_SEQ={0x5}, @L2TP_ATTR_IFNAME={0x14, 0x8, 'veth1_to_hsr\x00'}]}, 0x30}, 0x1, 0xd1250000}, 0x0) [ 1042.827450][ T5176] loop1: detected capacity change from 0 to 2048 12:22:14 executing program 3: r0 = add_key$keyring(&(0x7f0000000240), &(0x7f0000000280)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$get_persistent(0x16, 0xffffffffffffffff, r0) 12:22:14 executing program 2: open(&(0x7f0000000400)='./bus\x00', 0x14103e, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$L2TP_CMD_SESSION_MODIFY(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000080)={0x30, r1, 0x1, 0x0, 0x0, {}, [@L2TP_ATTR_SEND_SEQ={0x5}, @L2TP_ATTR_IFNAME={0x14, 0x8, 'veth1_to_hsr\x00'}]}, 0x30}, 0x1, 0xefffffff}, 0x0) [ 1042.884069][ T5176] EXT4-fs (loop1): mounted filesystem 00000000-0000-0000-0000-000000000000 without journal. Quota mode: none. [ 1042.942662][ T5176] ext4 filesystem being mounted at /root/syzkaller-testdir1539738704/syzkaller.ao1jj3/3823/bus supports timestamps until 2038 (0x7fffffff) [ 1043.041846][ T5176] loop1: detected capacity change from 2048 to 2047 [ 1043.067905][ T3128] EXT4-fs (loop1): unmounting filesystem 00000000-0000-0000-0000-000000000000. 12:22:14 executing program 5: r0 = socket$unix(0x1, 0x2, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f0000000100)={'vcan0\x00', 0x0}) r2 = socket$can_bcm(0x1d, 0x2, 0x2) connect$can_bcm(r2, &(0x7f0000000000), 0x10) ioctl$sock_kcm_SIOCKCMUNATTACH(0xffffffffffffffff, 0x89e1, 0xffffffffffffffff) ioctl$sock_SIOCSPGRP(0xffffffffffffffff, 0x8902, 0x0) sendmsg$can_bcm(r2, &(0x7f0000000480)={&(0x7f0000000340)={0x1d, r1, 0x3f420f00}, 0x10, &(0x7f0000000040)={&(0x7f0000000580)=ANY=[@ANYBLOB="01000000d7fe68ca0000e9ffffff0000", @ANYRES64=0x0, @ANYRES64=0x0, @ANYRES64=0x0, @ANYRES64=r0, @ANYBLOB="3bf81bb9f1"], 0x20000600}}, 0x0) r3 = socket(0x0, 0x800, 0x40000) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r3, 0x541b, &(0x7f00000000c0)={'ip6_vti0\x00', 0x0}) sendmsg$IPCTNL_MSG_EXP_DELETE(0xffffffffffffffff, 0x0, 0x48000) perf_event_open(&(0x7f0000000500)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x15, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$binfmt_elf32(0xffffffffffffffff, &(0x7f0000000040)=ANY=[], 0x69) connect$can_bcm(0xffffffffffffffff, &(0x7f0000000000), 0x10) sendmsg$can_bcm(0xffffffffffffffff, &(0x7f0000000480)={&(0x7f0000000340)={0x1d, 0x0, 0x3f420f00}, 0x10, &(0x7f0000000040)={&(0x7f0000000580)=ANY=[@ANYBLOB="01000000d7fe68ca0000e9ffffff0000", @ANYRES64=0x0, @ANYRES64=0x0, @ANYRES64=0x0, @ANYRES64], 0x20000600}}, 0x0) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(0xffffffffffffffff, 0x89f0, &(0x7f0000000280)={'gretap0\x00', &(0x7f0000000240)={'ip_vti0\x00', 0x0, 0x7, 0x80, 0xfffffff7, 0x7, {{0x8, 0x4, 0x0, 0x5, 0x20, 0x67, 0x0, 0xc0, 0x29, 0x0, @local, @empty, {[@timestamp={0x44, 0xc, 0x8, 0x0, 0x2, [0x7f, 0x1]}]}}}}}) socket(0x10, 0x3, 0x0) process_mrelease(0xffffffffffffffff, 0x0) r4 = socket$packet(0x11, 0x2, 0x300) ioctl$sock_SIOCGIFINDEX(r4, 0x8933, 0x0) getsockopt$inet_sctp_SCTP_RECVNXTINFO(r3, 0x84, 0x21, &(0x7f0000000140), &(0x7f0000000200)=0x4) bind$unix(r0, &(0x7f00000005c0)=@abs={0x1, 0x0, 0x4e23}, 0x6e) syz_clone(0x40000000, &(0x7f00000000c0), 0x0, 0x0, &(0x7f00000001c0), 0x0) 12:22:14 executing program 1: syz_mount_image$ext4(&(0x7f0000000740)='ext4\x00', &(0x7f0000000100)='./bus\x00', 0x804810, &(0x7f0000000180)=ANY=[@ANYBLOB="0061021d307a961da7401271e3fa98008000001d3902ccfd562158cb15c016093893c9e4abd02bc4f1492514fa2dfebc8001000080000000008a1049ca0000"], 0x1, 0x73b, &(0x7f0000000780)="$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") chdir(&(0x7f0000000080)='./file0\x00') open(&(0x7f00000000c0)='./bus\x00', 0x14da42, 0x0) mount(&(0x7f0000000380)=@loop={'/dev/loop', 0x0}, &(0x7f00000003c0)='./bus\x00', 0x0, 0x1000, 0x0) r0 = open(&(0x7f0000000400)='./bus\x00', 0x0, 0x0) ioctl$LOOP_SET_STATUS(r0, 0x4c02, &(0x7f00000001c0)={0x0, {}, 0x0, {}, 0xff, 0x0, 0x0, 0x0, "be8176c9e6755a48a3c0230dd390efe12f8306bed95b2afd402aae879978d959ff9009eec610d9108ea036456bb79e26ee42d0a34968c1fdbb33e8ad5860f632", "b948757aa008fae13adca739a9f126462ab528ea52e90ce2cf50a4ef2568375b"}) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='blkio.throttle.io_service_bytes\x00', 0x275a, 0x1100000000000000) 12:22:14 executing program 3: r0 = openat$rfkill(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) read$rfkill(r0, 0x0, 0x0) 12:22:14 executing program 2: open(&(0x7f0000000400)='./bus\x00', 0x14103e, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$L2TP_CMD_SESSION_MODIFY(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000080)={0x30, r1, 0x1, 0x0, 0x0, {}, [@L2TP_ATTR_SEND_SEQ={0x5}, @L2TP_ATTR_IFNAME={0x14, 0x8, 'veth1_to_hsr\x00'}]}, 0x30}, 0x1, 0xf0ffffff}, 0x0) 12:22:14 executing program 4: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x82, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket(0x10, 0x803, 0x0) sendto(r0, &(0x7f00000000c0)="120000001200e7ef007b00000000000000a1", 0x12, 0x0, 0x0, 0x0) recvmmsg(r0, &(0x7f00000037c0)=[{{&(0x7f00000004c0)=@ethernet={0x0, @random}, 0x80, &(0x7f0000000380)=[{&(0x7f0000000040)=""/95, 0x5f}, {&(0x7f0000000140)=""/85, 0x55}, {&(0x7f0000000fc0)=""/4096, 0x1000}, {&(0x7f0000000400)=""/106, 0x6a}, {&(0x7f0000000740)=""/73, 0x49}, {&(0x7f0000000200)=""/77, 0x4d}, {0x0}], 0x7, &(0x7f0000000600)=""/191, 0xbf}, 0xc000000}], 0x1, 0x0, &(0x7f0000003700)={0x77359400}) 12:22:14 executing program 3: syz_genetlink_get_family_id$wireguard(&(0x7f0000000000), 0xffffffffffffffff) clock_gettime(0x0, &(0x7f0000000600)) 12:22:14 executing program 2: open(&(0x7f0000000400)='./bus\x00', 0x14103e, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$L2TP_CMD_SESSION_MODIFY(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000080)={0x30, r1, 0x1, 0x0, 0x0, {}, [@L2TP_ATTR_SEND_SEQ={0x5}, @L2TP_ATTR_IFNAME={0x14, 0x8, 'veth1_to_hsr\x00'}]}, 0x30}, 0x1, 0xffffff7f}, 0x0) 12:22:14 executing program 0: syz_open_dev$vcsn(&(0x7f0000000440), 0x0, 0x0) [ 1043.273995][ T5209] loop1: detected capacity change from 0 to 2048 12:22:14 executing program 3: socketpair$tipc(0x1e, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) getsockopt$TIPC_GROUP_JOIN(r0, 0x10f, 0x87, 0x0, &(0x7f0000000080)) 12:22:14 executing program 2: open(&(0x7f0000000400)='./bus\x00', 0x14103e, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$L2TP_CMD_SESSION_MODIFY(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000080)={0x30, r1, 0x1, 0x0, 0x0, {}, [@L2TP_ATTR_SEND_SEQ={0x5}, @L2TP_ATTR_IFNAME={0x14, 0x8, 'veth1_to_hsr\x00'}]}, 0x30}, 0x1, 0xffffff9e}, 0x0) 12:22:14 executing program 4: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x82, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket(0x10, 0x803, 0x0) sendto(r0, &(0x7f00000000c0)="120000001200e7ef007b00000000000000a1", 0x12, 0x0, 0x0, 0x0) recvmmsg(r0, &(0x7f00000037c0)=[{{&(0x7f00000004c0)=@ethernet={0x0, @random}, 0x80, &(0x7f0000000380)=[{&(0x7f0000000040)=""/95, 0x5f}, {&(0x7f0000000140)=""/85, 0x55}, {&(0x7f0000000fc0)=""/4096, 0x1000}, {&(0x7f0000000400)=""/106, 0x6a}, {&(0x7f0000000740)=""/73, 0x49}, {&(0x7f0000000200)=""/77, 0x4d}, {0x0}], 0x7, &(0x7f0000000600)=""/191, 0xbf}, 0xd000000}], 0x1, 0x0, &(0x7f0000003700)={0x77359400}) 12:22:14 executing program 2: open(&(0x7f0000000400)='./bus\x00', 0x14103e, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$L2TP_CMD_SESSION_MODIFY(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000080)={0x30, r1, 0x1, 0x0, 0x0, {}, [@L2TP_ATTR_SEND_SEQ={0x5}, @L2TP_ATTR_IFNAME={0x14, 0x8, 'veth1_to_hsr\x00'}]}, 0x30}, 0x1, 0xffffffef}, 0x0) [ 1043.391811][ T5209] EXT4-fs (loop1): mounted filesystem 00000000-0000-0000-0000-000000000000 without journal. Quota mode: none. [ 1043.448890][ T5209] ext4 filesystem being mounted at /root/syzkaller-testdir1539738704/syzkaller.ao1jj3/3824/bus supports timestamps until 2038 (0x7fffffff) [ 1043.655039][ T5209] loop1: detected capacity change from 2048 to 2047 [ 1043.689023][ T3128] EXT4-fs (loop1): unmounting filesystem 00000000-0000-0000-0000-000000000000. 12:22:15 executing program 5: r0 = socket$unix(0x1, 0x2, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f0000000100)={'vcan0\x00', 0x0}) r2 = socket$can_bcm(0x1d, 0x2, 0x2) connect$can_bcm(r2, &(0x7f0000000000), 0x10) ioctl$sock_kcm_SIOCKCMUNATTACH(0xffffffffffffffff, 0x89e1, 0xffffffffffffffff) ioctl$sock_SIOCSPGRP(0xffffffffffffffff, 0x8902, 0x0) sendmsg$can_bcm(r2, &(0x7f0000000480)={&(0x7f0000000340)={0x1d, r1, 0x3f420f00}, 0x10, &(0x7f0000000040)={&(0x7f0000000580)=ANY=[@ANYBLOB="01000000d7fe68ca0000e9ffffff0000", @ANYRES64=0x0, @ANYRES64=0x0, @ANYRES64=0x0, @ANYRES64=r0, @ANYBLOB="3bf81bb9f1"], 0x20000600}}, 0x0) r3 = socket(0x0, 0x800, 0x40000) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r3, 0x541b, &(0x7f00000000c0)={'ip6_vti0\x00', 0x0}) sendmsg$IPCTNL_MSG_EXP_DELETE(0xffffffffffffffff, 0x0, 0x48000) perf_event_open(&(0x7f0000000500)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x15, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$binfmt_elf32(0xffffffffffffffff, &(0x7f0000000040)=ANY=[], 0x69) connect$can_bcm(0xffffffffffffffff, &(0x7f0000000000), 0x10) sendmsg$can_bcm(0xffffffffffffffff, &(0x7f0000000480)={&(0x7f0000000340)={0x1d, 0x0, 0x3f420f00}, 0x10, &(0x7f0000000040)={&(0x7f0000000580)=ANY=[@ANYBLOB="01000000d7fe68ca0000e9ffffff0000", @ANYRES64=0x0, @ANYRES64=0x0, @ANYRES64=0x0, @ANYRES64], 0x20000600}}, 0x0) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(0xffffffffffffffff, 0x89f0, &(0x7f0000000280)={'gretap0\x00', &(0x7f0000000240)={'ip_vti0\x00', 0x0, 0x7, 0x80, 0xfffffff7, 0x7, {{0x8, 0x4, 0x0, 0x5, 0x20, 0x67, 0x0, 0xc0, 0x29, 0x0, @local, @empty, {[@timestamp={0x44, 0xc, 0x8, 0x0, 0x2, [0x7f, 0x1]}]}}}}}) socket(0x10, 0x3, 0x0) process_mrelease(0xffffffffffffffff, 0x0) r4 = socket$packet(0x11, 0x2, 0x300) ioctl$sock_SIOCGIFINDEX(r4, 0x8933, 0x0) getsockopt$inet_sctp_SCTP_RECVNXTINFO(r3, 0x84, 0x21, &(0x7f0000000140), &(0x7f0000000200)=0x4) bind$unix(r0, &(0x7f00000005c0)=@abs={0x1, 0x0, 0x4e23}, 0x6e) syz_clone(0x40000000, &(0x7f00000000c0), 0x0, 0x0, &(0x7f00000001c0), 0x0) 12:22:15 executing program 3: socketpair$tipc(0x1e, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) getsockopt$TIPC_GROUP_JOIN(r0, 0x10f, 0x87, 0x0, &(0x7f0000000080)) 12:22:15 executing program 4: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x82, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket(0x10, 0x803, 0x0) sendto(r0, &(0x7f00000000c0)="120000001200e7ef007b00000000000000a1", 0x12, 0x0, 0x0, 0x0) recvmmsg(r0, &(0x7f00000037c0)=[{{&(0x7f00000004c0)=@ethernet={0x0, @random}, 0x80, &(0x7f0000000380)=[{&(0x7f0000000040)=""/95, 0x5f}, {&(0x7f0000000140)=""/85, 0x55}, {&(0x7f0000000fc0)=""/4096, 0x1000}, {&(0x7f0000000400)=""/106, 0x6a}, {&(0x7f0000000740)=""/73, 0x49}, {&(0x7f0000000200)=""/77, 0x4d}, {0x0}], 0x7, &(0x7f0000000600)=""/191, 0xbf}, 0xf000000}], 0x1, 0x0, &(0x7f0000003700)={0x77359400}) 12:22:15 executing program 2: open(&(0x7f0000000400)='./bus\x00', 0x14103e, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$L2TP_CMD_SESSION_MODIFY(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000080)={0x30, r1, 0x1, 0x0, 0x0, {}, [@L2TP_ATTR_SEND_SEQ={0x5}, @L2TP_ATTR_IFNAME={0x14, 0x8, 'veth1_to_hsr\x00'}]}, 0x30}, 0x1, 0xfffffff0}, 0x0) 12:22:15 executing program 0: r0 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_ipv6_tunnel_SIOCCHGTUNNEL(r0, 0x89f3, &(0x7f0000000bc0)={'ip6_vti0\x00', &(0x7f0000000b40)={'syztnl1\x00', 0x0, 0x29, 0x0, 0x0, 0x0, 0x0, @mcast2, @ipv4={'\x00', '\xff\xff', @multicast1}}}) 12:22:15 executing program 1: syz_mount_image$ext4(&(0x7f0000000740)='ext4\x00', &(0x7f0000000100)='./bus\x00', 0x804810, &(0x7f0000000180)=ANY=[@ANYBLOB="0061021d307a961da7401271e3fa98008000001d3902ccfd562158cb15c016093893c9e4abd02bc4f1492514fa2dfebc8001000080000000008a1049ca0000"], 0x1, 0x73b, &(0x7f0000000780)="$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") chdir(&(0x7f0000000080)='./file0\x00') open(&(0x7f00000000c0)='./bus\x00', 0x14da42, 0x0) mount(&(0x7f0000000380)=@loop={'/dev/loop', 0x0}, &(0x7f00000003c0)='./bus\x00', 0x0, 0x1000, 0x0) r0 = open(&(0x7f0000000400)='./bus\x00', 0x0, 0x0) ioctl$LOOP_SET_STATUS(r0, 0x4c02, &(0x7f00000001c0)={0x0, {}, 0x0, {}, 0xff, 0x0, 0x0, 0x0, "be8176c9e6755a48a3c0230dd390efe12f8306bed95b2afd402aae879978d959ff9009eec610d9108ea036456bb79e26ee42d0a34968c1fdbb33e8ad5860f632", "b948757aa008fae13adca739a9f126462ab528ea52e90ce2cf50a4ef2568375b"}) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='blkio.throttle.io_service_bytes\x00', 0x275a, 0x1800000000000000) 12:22:15 executing program 2: open(&(0x7f0000000400)='./bus\x00', 0x14103e, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$L2TP_CMD_SESSION_MODIFY(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000080)={0x30, r1, 0x1, 0x0, 0x0, {}, [@L2TP_ATTR_SEND_SEQ={0x5}, @L2TP_ATTR_IFNAME={0x14, 0x8, 'veth1_to_hsr\x00'}]}, 0x30}, 0x1, 0x3000000000000}, 0x0) 12:22:15 executing program 3: socketpair$tipc(0x1e, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) getsockopt$TIPC_GROUP_JOIN(r0, 0x10f, 0x87, 0x0, &(0x7f0000000080)) 12:22:15 executing program 4: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x82, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket(0x10, 0x803, 0x0) sendto(r0, &(0x7f00000000c0)="120000001200e7ef007b00000000000000a1", 0x12, 0x0, 0x0, 0x0) recvmmsg(r0, &(0x7f00000037c0)=[{{&(0x7f00000004c0)=@ethernet={0x0, @random}, 0x80, &(0x7f0000000380)=[{&(0x7f0000000040)=""/95, 0x5f}, {&(0x7f0000000140)=""/85, 0x55}, {&(0x7f0000000fc0)=""/4096, 0x1000}, {&(0x7f0000000400)=""/106, 0x6a}, {&(0x7f0000000740)=""/73, 0x49}, {&(0x7f0000000200)=""/77, 0x4d}, {0x0}], 0x7, &(0x7f0000000600)=""/191, 0xbf}, 0x10000000}], 0x1, 0x0, &(0x7f0000003700)={0x77359400}) 12:22:15 executing program 2: open(&(0x7f0000000400)='./bus\x00', 0x14103e, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$L2TP_CMD_SESSION_MODIFY(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000080)={0x30, r1, 0x1, 0x0, 0x0, {}, [@L2TP_ATTR_SEND_SEQ={0x5}, @L2TP_ATTR_IFNAME={0x14, 0x8, 'veth1_to_hsr\x00'}]}, 0x30}, 0x1, 0x40030000000000}, 0x0) 12:22:15 executing program 3: socketpair$tipc(0x1e, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) getsockopt$TIPC_GROUP_JOIN(r0, 0x10f, 0x87, 0x0, &(0x7f0000000080)) [ 1044.265822][ T5242] loop1: detected capacity change from 0 to 2048 12:22:15 executing program 4: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x82, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket(0x10, 0x803, 0x0) sendto(r0, &(0x7f00000000c0)="120000001200e7ef007b00000000000000a1", 0x12, 0x0, 0x0, 0x0) recvmmsg(r0, &(0x7f00000037c0)=[{{&(0x7f00000004c0)=@ethernet={0x0, @random}, 0x80, &(0x7f0000000380)=[{&(0x7f0000000040)=""/95, 0x5f}, {&(0x7f0000000140)=""/85, 0x55}, {&(0x7f0000000fc0)=""/4096, 0x1000}, {&(0x7f0000000400)=""/106, 0x6a}, {&(0x7f0000000740)=""/73, 0x49}, {&(0x7f0000000200)=""/77, 0x4d}, {0x0}], 0x7, &(0x7f0000000600)=""/191, 0xbf}, 0x3b9aca00}], 0x1, 0x0, &(0x7f0000003700)={0x77359400}) [ 1044.408443][ T5242] EXT4-fs (loop1): mounted filesystem 00000000-0000-0000-0000-000000000000 without journal. Quota mode: none. [ 1044.467125][ T5242] ext4 filesystem being mounted at /root/syzkaller-testdir1539738704/syzkaller.ao1jj3/3825/bus supports timestamps until 2038 (0x7fffffff) [ 1044.622169][ T5242] loop1: detected capacity change from 2048 to 2047 [ 1044.656655][ T3128] EXT4-fs (loop1): unmounting filesystem 00000000-0000-0000-0000-000000000000. 12:22:17 executing program 5: r0 = socket$unix(0x1, 0x2, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f0000000100)={'vcan0\x00', 0x0}) r2 = socket$can_bcm(0x1d, 0x2, 0x2) connect$can_bcm(r2, &(0x7f0000000000), 0x10) ioctl$sock_kcm_SIOCKCMUNATTACH(0xffffffffffffffff, 0x89e1, 0xffffffffffffffff) ioctl$sock_SIOCSPGRP(0xffffffffffffffff, 0x8902, 0x0) sendmsg$can_bcm(r2, &(0x7f0000000480)={&(0x7f0000000340)={0x1d, r1, 0x3f420f00}, 0x10, &(0x7f0000000040)={&(0x7f0000000580)=ANY=[@ANYBLOB="01000000d7fe68ca0000e9ffffff0000", @ANYRES64=0x0, @ANYRES64=0x0, @ANYRES64=0x0, @ANYRES64=r0, @ANYBLOB="3bf81bb9f1"], 0x20000600}}, 0x0) r3 = socket(0x0, 0x800, 0x40000) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r3, 0x541b, &(0x7f00000000c0)={'ip6_vti0\x00', 0x0}) sendmsg$IPCTNL_MSG_EXP_DELETE(0xffffffffffffffff, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000440)={&(0x7f00000006c0)={0x1d0, 0x2, 0x2, 0x201, 0x0, 0x0, {0xa}, [@CTA_EXPECT_NAT={0xc0, 0xa, 0x0, 0x1, [@CTA_EXPECT_NAT_TUPLE={0xc, 0x2, 0x0, 0x1, [@CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x1}]}, @CTA_EXPECT_NAT_TUPLE={0x70, 0x2, 0x0, 0x1, [@CTA_TUPLE_IP={0x2c, 0x1, 0x0, 0x1, @ipv6={{0x14, 0x3, @loopback}, {0x14, 0x4, @private0}}}, @CTA_TUPLE_IP={0x14, 0x1, 0x0, 0x1, @ipv4={{0x8, 0x1, @empty}, {0x8, 0x2, @initdev={0xac, 0x1e, 0x1, 0x0}}}}, @CTA_TUPLE_IP={0x14, 0x1, 0x0, 0x1, @ipv4={{0x8, 0x1, @local}, {0x8, 0x2, @loopback}}}, @CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x4}, @CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x3}, @CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x1}]}, @CTA_EXPECT_NAT_TUPLE={0x38, 0x2, 0x0, 0x1, [@CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5, 0x1, 0x88}}, @CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x3}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5, 0x1, 0x21}}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5, 0x1, 0x1}}, @CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x3}]}, @CTA_EXPECT_NAT_DIR={0x8}]}, @CTA_EXPECT_MASTER={0x20, 0x1, 0x0, 0x1, [@CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x1}, @CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x2}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5, 0x1, 0x84}}]}, @CTA_EXPECT_MASTER={0xdc, 0x1, 0x0, 0x1, [@CTA_TUPLE_IP={0x14, 0x1, 0x0, 0x1, @ipv4={{0x8, 0x1, @multicast1}, {0x8, 0x2, @dev={0xac, 0x14, 0x14, 0x3a}}}}, @CTA_TUPLE_ZONE={0x6}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5, 0x1, 0x21}}, @CTA_TUPLE_IP={0x14, 0x1, 0x0, 0x1, @ipv4={{0x8, 0x1, @empty}, {0x8, 0x2, @local}}}, @CTA_TUPLE_IP={0x2c, 0x1, 0x0, 0x1, @ipv6={{0x14, 0x3, @private1={0xfc, 0x1, '\x00', 0x1}}, {0x14, 0x4, @rand_addr=' \x01\x00'}}}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5, 0x1, 0x1}}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5, 0x1, 0x88}}, @CTA_TUPLE_IP={0x2c, 0x1, 0x0, 0x1, @ipv6={{0x14, 0x3, @empty}, {0x14, 0x4, @dev={0xfe, 0x80, '\x00', 0x21}}}}, @CTA_TUPLE_IP={0x2c, 0x1, 0x0, 0x1, @ipv6={{0x14, 0x3, @local}, {0x14, 0x4, @ipv4={'\x00', '\xff\xff', @rand_addr=0x64010100}}}}]}]}, 0x1d0}}, 0x48000) perf_event_open(&(0x7f0000000500)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x15, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$binfmt_elf32(0xffffffffffffffff, &(0x7f0000000040)=ANY=[], 0x69) connect$can_bcm(0xffffffffffffffff, &(0x7f0000000000), 0x10) sendmsg$can_bcm(0xffffffffffffffff, &(0x7f0000000480)={&(0x7f0000000340)={0x1d, 0x0, 0x3f420f00}, 0x10, &(0x7f0000000040)={&(0x7f0000000580)=ANY=[@ANYBLOB="01000000d7fe68ca0000e9ffffff0000", @ANYRES64=0x0, @ANYRES64=0x0, @ANYRES64=0x0, @ANYRES64], 0x20000600}}, 0x0) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(0xffffffffffffffff, 0x89f0, &(0x7f0000000280)={'gretap0\x00', &(0x7f0000000240)={'ip_vti0\x00', 0x0, 0x7, 0x80, 0xfffffff7, 0x7, {{0x8, 0x4, 0x0, 0x5, 0x20, 0x67, 0x0, 0xc0, 0x29, 0x0, @local, @empty, {[@timestamp={0x44, 0xc, 0x8, 0x0, 0x2, [0x7f, 0x1]}]}}}}}) socket(0x10, 0x3, 0x0) process_mrelease(0xffffffffffffffff, 0x0) r4 = socket$packet(0x11, 0x2, 0x300) ioctl$sock_SIOCGIFINDEX(r4, 0x8933, 0x0) getsockopt$inet_sctp_SCTP_RECVNXTINFO(r3, 0x84, 0x21, &(0x7f0000000140), &(0x7f0000000200)=0x4) bind$unix(r0, &(0x7f00000005c0)=@abs={0x1, 0x0, 0x4e23}, 0x6e) syz_clone(0x40000000, &(0x7f00000000c0), 0x0, 0x0, &(0x7f00000001c0), 0x0) 12:22:17 executing program 4: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x82, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket(0x10, 0x803, 0x0) sendto(r0, &(0x7f00000000c0)="120000001200e7ef007b00000000000000a1", 0x12, 0x0, 0x0, 0x0) recvmmsg(r0, &(0x7f00000037c0)=[{{&(0x7f00000004c0)=@ethernet={0x0, @random}, 0x80, &(0x7f0000000380)=[{&(0x7f0000000040)=""/95, 0x5f}, {&(0x7f0000000140)=""/85, 0x55}, {&(0x7f0000000fc0)=""/4096, 0x1000}, {&(0x7f0000000400)=""/106, 0x6a}, {&(0x7f0000000740)=""/73, 0x49}, {&(0x7f0000000200)=""/77, 0x4d}, {0x0}], 0x7, &(0x7f0000000600)=""/191, 0xbf}, 0x40000000}], 0x1, 0x0, &(0x7f0000003700)={0x77359400}) 12:22:17 executing program 2: open(&(0x7f0000000400)='./bus\x00', 0x14103e, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$L2TP_CMD_SESSION_MODIFY(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000080)={0x30, r1, 0x1, 0x0, 0x0, {}, [@L2TP_ATTR_SEND_SEQ={0x5}, @L2TP_ATTR_IFNAME={0x14, 0x8, 'veth1_to_hsr\x00'}]}, 0x30}, 0x1, 0x100000000000000}, 0x0) 12:22:17 executing program 3: socketpair$tipc(0x1e, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) setsockopt$TIPC_SRC_DROPPABLE(r0, 0x10f, 0x80, &(0x7f0000000240), 0x4) 12:22:17 executing program 0: socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000400)={0xffffffffffffffff}) getsockopt$TIPC_NODE_RECVQ_DEPTH(r0, 0x10f, 0x83, 0x0, 0x0) 12:22:17 executing program 1: syz_mount_image$ext4(&(0x7f0000000740)='ext4\x00', &(0x7f0000000100)='./bus\x00', 0x804810, &(0x7f0000000180)=ANY=[@ANYBLOB="0061021d307a961da7401271e3fa98008000001d3902ccfd562158cb15c016093893c9e4abd02bc4f1492514fa2dfebc8001000080000000008a1049ca0000"], 0x1, 0x73b, &(0x7f0000000780)="$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") chdir(&(0x7f0000000080)='./file0\x00') open(&(0x7f00000000c0)='./bus\x00', 0x14da42, 0x0) mount(&(0x7f0000000380)=@loop={'/dev/loop', 0x0}, &(0x7f00000003c0)='./bus\x00', 0x0, 0x1000, 0x0) r0 = open(&(0x7f0000000400)='./bus\x00', 0x0, 0x0) ioctl$LOOP_SET_STATUS(r0, 0x4c02, &(0x7f00000001c0)={0x0, {}, 0x0, {}, 0xff, 0x0, 0x0, 0x0, "be8176c9e6755a48a3c0230dd390efe12f8306bed95b2afd402aae879978d959ff9009eec610d9108ea036456bb79e26ee42d0a34968c1fdbb33e8ad5860f632", "b948757aa008fae13adca739a9f126462ab528ea52e90ce2cf50a4ef2568375b"}) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='blkio.throttle.io_service_bytes\x00', 0x275a, 0x2000000000000000) 12:22:17 executing program 3: socket$inet6_udplite(0xa, 0x2, 0x88) bpf$OBJ_GET_PROG(0x7, &(0x7f00000005c0)={0x0, 0x0, 0x10}, 0x10) mount$9p_fd(0x0, &(0x7f0000000500)='./file0\x00', 0x0, 0x0, &(0x7f0000000600)) syz_genetlink_get_family_id$l2tp(&(0x7f0000000700), 0xffffffffffffffff) syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) 12:22:17 executing program 4: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x82, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket(0x10, 0x803, 0x0) sendto(r0, &(0x7f00000000c0)="120000001200e7ef007b00000000000000a1", 0x12, 0x0, 0x0, 0x0) recvmmsg(r0, &(0x7f00000037c0)=[{{&(0x7f00000004c0)=@ethernet={0x0, @random}, 0x80, &(0x7f0000000380)=[{&(0x7f0000000040)=""/95, 0x5f}, {&(0x7f0000000140)=""/85, 0x55}, {&(0x7f0000000fc0)=""/4096, 0x1000}, {&(0x7f0000000400)=""/106, 0x6a}, {&(0x7f0000000740)=""/73, 0x49}, {&(0x7f0000000200)=""/77, 0x4d}, {0x0}], 0x7, &(0x7f0000000600)=""/191, 0xbf}, 0x4cdeff7f}], 0x1, 0x0, &(0x7f0000003700)={0x77359400}) 12:22:17 executing program 2: open(&(0x7f0000000400)='./bus\x00', 0x14103e, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$L2TP_CMD_SESSION_MODIFY(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000080)={0x30, r1, 0x1, 0x0, 0x0, {}, [@L2TP_ATTR_SEND_SEQ={0x5}, @L2TP_ATTR_IFNAME={0x14, 0x8, 'veth1_to_hsr\x00'}]}, 0x30}, 0x1, 0x200000000000000}, 0x0) 12:22:17 executing program 0: r0 = mq_open(&(0x7f0000000080)=')}!)*]#\xf6\x00', 0x0, 0x0, 0x0) mq_getsetattr(r0, &(0x7f0000000000), &(0x7f0000000040)) 12:22:17 executing program 3: r0 = syz_open_dev$evdev(&(0x7f0000000040), 0x6, 0x103381) write$evdev(r0, &(0x7f0000000100)=[{{0x77359400}}, {}], 0xfffffffffffffd77) 12:22:17 executing program 0: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000540), 0x2, 0x0) write$RDMA_USER_CM_CMD_BIND(r0, &(0x7f0000000680)={0x14, 0x88, 0xfa00, {0xffffffffffffffff, 0x30, 0x0, @ib={0x1b, 0x0, 0x0, {"1beb97d8d8f73ec9435022d316486031"}}}}, 0x90) [ 1045.611088][ T5270] loop1: detected capacity change from 0 to 2048 [ 1045.727285][ T5270] EXT4-fs (loop1): mounted filesystem 00000000-0000-0000-0000-000000000000 without journal. Quota mode: none. [ 1045.786379][ T5270] ext4 filesystem being mounted at /root/syzkaller-testdir1539738704/syzkaller.ao1jj3/3826/bus supports timestamps until 2038 (0x7fffffff) [ 1045.904268][ T5270] loop1: detected capacity change from 2048 to 2047 [ 1045.960413][ T3128] EXT4-fs (loop1): unmounting filesystem 00000000-0000-0000-0000-000000000000. [ 1046.342060][T16533] ================================================================== [ 1046.350163][T16533] BUG: KCSAN: data-race in fprop_new_period / fprop_reflect_period_percpu [ 1046.358653][T16533] [ 1046.360961][T16533] read-write to 0xffffffff86f020c0 of 4 bytes by interrupt on cpu 0: [ 1046.369006][T16533] fprop_new_period+0xa6/0xd0 [ 1046.373693][T16533] writeout_period+0x55/0xe0 [ 1046.378276][T16533] call_timer_fn+0x2e/0x240 [ 1046.382768][T16533] expire_timers+0x11f/0x260 [ 1046.387336][T16533] __run_timers+0x350/0x400 [ 1046.391851][T16533] run_timer_softirq+0x56/0x60 [ 1046.396597][T16533] __do_softirq+0xf2/0x2c7 [ 1046.401000][T16533] irq_exit_rcu+0x41/0x70 [ 1046.405315][T16533] sysvec_apic_timer_interrupt+0x8d/0xb0 [ 1046.410931][T16533] asm_sysvec_apic_timer_interrupt+0x16/0x20 [ 1046.416900][T16533] kcsan_setup_watchpoint+0x3e9/0x3f0 [ 1046.422253][T16533] __radix_tree_replace+0x172/0x1c0 [ 1046.427434][T16533] radix_tree_iter_replace+0x33/0x40 [ 1046.432703][T16533] idr_alloc_cyclic+0x1e4/0x2e0 [ 1046.437548][T16533] __kernfs_new_node+0xb3/0x330 [ 1046.442423][T16533] kernfs_new_node+0x5b/0xd0 [ 1046.447013][T16533] __kernfs_create_file+0x45/0x180 [ 1046.452121][T16533] sysfs_add_file_mode_ns+0x10a/0x1d0 [ 1046.457487][T16533] internal_create_group+0x2ed/0x830 [ 1046.462767][T16533] sysfs_create_groups+0x3d/0xf0 [ 1046.467696][T16533] device_add_attrs+0x69/0x400 [ 1046.472542][T16533] device_add+0x4ef/0xb20 [ 1046.476860][T16533] netdev_register_kobject+0xfa/0x230 [ 1046.482217][T16533] register_netdevice+0xafd/0xe10 [ 1046.487239][T16533] __ip_tunnel_create+0x1c5/0x260 [ 1046.492431][T16533] ip_tunnel_init_net+0x18e/0x3d0 [ 1046.497463][T16533] vti_init_net+0x35/0xe0 [ 1046.501808][T16533] ops_init+0x215/0x2d0 [ 1046.505960][T16533] setup_net+0x39b/0x8e0 [ 1046.510226][T16533] copy_net_ns+0x29f/0x450 [ 1046.514645][T16533] create_new_namespaces+0x22c/0x450 [ 1046.519939][T16533] copy_namespaces+0x149/0x1a0 [ 1046.524691][T16533] copy_process+0xda6/0x2090 [ 1046.529266][T16533] kernel_clone+0x166/0x550 [ 1046.533755][T16533] __x64_sys_clone+0xc3/0xf0 [ 1046.538329][T16533] do_syscall_64+0x2b/0x70 [ 1046.542727][T16533] entry_SYSCALL_64_after_hwframe+0x63/0xcd [ 1046.548607][T16533] [ 1046.550912][T16533] read to 0xffffffff86f020c0 of 4 bytes by task 16533 on cpu 1: [ 1046.558518][T16533] fprop_reflect_period_percpu+0x22/0x1a0 [ 1046.564223][T16533] __fprop_add_percpu_max+0x54/0x180 [ 1046.569500][T16533] __wb_writeout_add+0x7e/0x1d0 [ 1046.574335][T16533] __folio_end_writeback+0x246/0x4d0 [ 1046.579624][T16533] folio_end_writeback+0x57/0x130 [ 1046.584647][T16533] end_page_writeback+0x3b/0xe0 [ 1046.589484][T16533] ext4_finish_bio+0x421/0x520 [ 1046.594318][T16533] ext4_release_io_end+0x98/0x200 [ 1046.599343][T16533] ext4_end_io_rsv_work+0x319/0x3a0 [ 1046.604523][T16533] process_one_work+0x3d3/0x720 [ 1046.609378][T16533] worker_thread+0x618/0xa70 [ 1046.613955][T16533] kthread+0x1a9/0x1e0 [ 1046.618011][T16533] ret_from_fork+0x1f/0x30 [ 1046.622426][T16533] [ 1046.624743][T16533] value changed: 0x00000149 -> 0x0000014a [ 1046.630454][T16533] [ 1046.632758][T16533] Reported by Kernel Concurrency Sanitizer on: [ 1046.638899][T16533] CPU: 1 PID: 16533 Comm: kworker/u4:20 Not tainted 6.2.0-rc5-syzkaller-00047-g7c46948a6e9c-dirty #0 [ 1046.649725][T16533] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/12/2023 [ 1046.659768][T16533] Workqueue: ext4-rsv-conversion ext4_end_io_rsv_work [ 1046.666517][T16533] ================================================================== 12:22:18 executing program 5: r0 = socket$unix(0x1, 0x2, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f0000000100)={'vcan0\x00', 0x0}) r2 = socket$can_bcm(0x1d, 0x2, 0x2) connect$can_bcm(r2, &(0x7f0000000000), 0x10) ioctl$sock_kcm_SIOCKCMUNATTACH(0xffffffffffffffff, 0x89e1, 0xffffffffffffffff) ioctl$sock_SIOCSPGRP(0xffffffffffffffff, 0x8902, 0x0) sendmsg$can_bcm(r2, &(0x7f0000000480)={&(0x7f0000000340)={0x1d, r1, 0x3f420f00}, 0x10, &(0x7f0000000040)={&(0x7f0000000580)=ANY=[@ANYBLOB="01000000d7fe68ca0000e9ffffff0000", @ANYRES64=0x0, @ANYRES64=0x0, @ANYRES64=0x0, @ANYRES64=r0, @ANYBLOB="3bf81bb9f1"], 0x20000600}}, 0x0) r3 = socket(0x0, 0x800, 0x40000) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r3, 0x541b, &(0x7f00000000c0)={'ip6_vti0\x00', 0x0}) sendmsg$IPCTNL_MSG_EXP_DELETE(0xffffffffffffffff, &(0x7f00000004c0)={0x0, 0x0, 0x0}, 0x48000) perf_event_open(&(0x7f0000000500)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x15, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$binfmt_elf32(0xffffffffffffffff, &(0x7f0000000040)=ANY=[], 0x69) connect$can_bcm(0xffffffffffffffff, &(0x7f0000000000), 0x10) sendmsg$can_bcm(0xffffffffffffffff, &(0x7f0000000480)={&(0x7f0000000340)={0x1d, 0x0, 0x3f420f00}, 0x10, &(0x7f0000000040)={&(0x7f0000000580)=ANY=[@ANYBLOB="01000000d7fe68ca0000e9ffffff0000", @ANYRES64=0x0, @ANYRES64=0x0, @ANYRES64=0x0, @ANYRES64], 0x20000600}}, 0x0) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(0xffffffffffffffff, 0x89f0, &(0x7f0000000280)={'gretap0\x00', &(0x7f0000000240)={'ip_vti0\x00', 0x0, 0x7, 0x80, 0xfffffff7, 0x7, {{0x8, 0x4, 0x0, 0x5, 0x20, 0x67, 0x0, 0xc0, 0x29, 0x0, @local, @empty, {[@timestamp={0x44, 0xc, 0x8, 0x0, 0x2, [0x7f, 0x1]}]}}}}}) socket(0x10, 0x3, 0x0) process_mrelease(0xffffffffffffffff, 0x0) r4 = socket$packet(0x11, 0x2, 0x300) ioctl$sock_SIOCGIFINDEX(r4, 0x8933, 0x0) getsockopt$inet_sctp_SCTP_RECVNXTINFO(r3, 0x84, 0x21, &(0x7f0000000140), &(0x7f0000000200)=0x4) bind$unix(r0, &(0x7f00000005c0)=@abs={0x1, 0x0, 0x4e23}, 0x6e) syz_clone(0x40000000, &(0x7f00000000c0), 0x0, 0x0, &(0x7f00000001c0), 0x0) 12:22:18 executing program 4: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x82, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket(0x10, 0x803, 0x0) sendto(r0, &(0x7f00000000c0)="120000001200e7ef007b00000000000000a1", 0x12, 0x0, 0x0, 0x0) recvmmsg(r0, &(0x7f00000037c0)=[{{&(0x7f00000004c0)=@ethernet={0x0, @random}, 0x80, &(0x7f0000000380)=[{&(0x7f0000000040)=""/95, 0x5f}, {&(0x7f0000000140)=""/85, 0x55}, {&(0x7f0000000fc0)=""/4096, 0x1000}, {&(0x7f0000000400)=""/106, 0x6a}, {&(0x7f0000000740)=""/73, 0x49}, {&(0x7f0000000200)=""/77, 0x4d}, {0x0}], 0x7, &(0x7f0000000600)=""/191, 0xbf}, 0x60000000}], 0x1, 0x0, &(0x7f0000003700)={0x77359400}) 12:22:18 executing program 3: r0 = add_key$keyring(&(0x7f0000000240), &(0x7f0000000280)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffd) r1 = add_key$keyring(&(0x7f0000001100), &(0x7f0000001140)={'syz', 0x2}, 0x0, 0x0, r0) add_key(&(0x7f0000000080)='user\x00', &(0x7f00000000c0)={'syz', 0x2}, &(0x7f0000000100)="d4", 0x1, r1) 12:22:18 executing program 2: open(&(0x7f0000000400)='./bus\x00', 0x14103e, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$L2TP_CMD_SESSION_MODIFY(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000080)={0x30, r1, 0x1, 0x0, 0x0, {}, [@L2TP_ATTR_SEND_SEQ={0x5}, @L2TP_ATTR_IFNAME={0x14, 0x8, 'veth1_to_hsr\x00'}]}, 0x30}, 0x1, 0x300000000000000}, 0x0) 12:22:18 executing program 0: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$ieee802154(&(0x7f0000000180), r1) sendmsg$IEEE802154_START_REQ(r0, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000280)={0x14, r2, 0x4d4998dc48679a0b}, 0x14}}, 0x0) 12:22:18 executing program 1: syz_mount_image$ext4(&(0x7f0000000740)='ext4\x00', &(0x7f0000000100)='./bus\x00', 0x804810, &(0x7f0000000180)=ANY=[@ANYBLOB="0061021d307a961da7401271e3fa98008000001d3902ccfd562158cb15c016093893c9e4abd02bc4f1492514fa2dfebc8001000080000000008a1049ca0000"], 0x1, 0x73b, &(0x7f0000000780)="$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") chdir(&(0x7f0000000080)='./file0\x00') open(&(0x7f00000000c0)='./bus\x00', 0x14da42, 0x0) mount(&(0x7f0000000380)=@loop={'/dev/loop', 0x0}, &(0x7f00000003c0)='./bus\x00', 0x0, 0x1000, 0x0) r0 = open(&(0x7f0000000400)='./bus\x00', 0x0, 0x0) ioctl$LOOP_SET_STATUS(r0, 0x4c02, &(0x7f00000001c0)={0x0, {}, 0x0, {}, 0xff, 0x0, 0x0, 0x0, "be8176c9e6755a48a3c0230dd390efe12f8306bed95b2afd402aae879978d959ff9009eec610d9108ea036456bb79e26ee42d0a34968c1fdbb33e8ad5860f632", "b948757aa008fae13adca739a9f126462ab528ea52e90ce2cf50a4ef2568375b"}) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='blkio.throttle.io_service_bytes\x00', 0x275a, 0x2200000000000000) 12:22:18 executing program 0: r0 = getpgrp(0xffffffffffffffff) waitid(0x2, r0, 0x0, 0x8, 0x0) 12:22:18 executing program 2: open(&(0x7f0000000400)='./bus\x00', 0x14103e, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$L2TP_CMD_SESSION_MODIFY(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000080)={0x30, r1, 0x1, 0x0, 0x0, {}, [@L2TP_ATTR_SEND_SEQ={0x5}, @L2TP_ATTR_IFNAME={0x14, 0x8, 'veth1_to_hsr\x00'}]}, 0x30}, 0x1, 0x400000000000000}, 0x0) 12:22:18 executing program 3: r0 = add_key$keyring(&(0x7f0000000240), &(0x7f0000000280)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffd) add_key(&(0x7f00000004c0)='rxrpc\x00', 0x0, &(0x7f0000000540)="a9ad0486c13d60a11d6318cc728cad96a9c26e69a78a6c3635b532ee44", 0x1d, r0) 12:22:18 executing program 4: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x82, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket(0x10, 0x803, 0x0) sendto(r0, &(0x7f00000000c0)="120000001200e7ef007b00000000000000a1", 0x12, 0x0, 0x0, 0x0) recvmmsg(r0, &(0x7f00000037c0)=[{{&(0x7f00000004c0)=@ethernet={0x0, @random}, 0x80, &(0x7f0000000380)=[{&(0x7f0000000040)=""/95, 0x5f}, {&(0x7f0000000140)=""/85, 0x55}, {&(0x7f0000000fc0)=""/4096, 0x1000}, {&(0x7f0000000400)=""/106, 0x6a}, {&(0x7f0000000740)=""/73, 0x49}, {&(0x7f0000000200)=""/77, 0x4d}, {0x0}], 0x7, &(0x7f0000000600)=""/191, 0xbf}, 0x65580000}], 0x1, 0x0, &(0x7f0000003700)={0x77359400}) 12:22:18 executing program 3: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000240), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000280)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000200)={0xffffffffffffffff}, 0x111}}, 0x20) write$RDMA_USER_CM_CMD_QUERY(r0, &(0x7f00000002c0)={0x13, 0x10, 0xfa00, {&(0x7f0000000000), r1, 0x2}}, 0x18) 12:22:18 executing program 0: r0 = add_key$keyring(&(0x7f0000008c80), &(0x7f0000008cc0)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffd) r1 = add_key$keyring(&(0x7f0000000240), &(0x7f0000000280)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$search(0xa, r1, &(0x7f0000000000)='dns_resolver\x00', &(0x7f0000000040)={'syz', 0x0}, r0) [ 1046.771775][ T5301] loop1: detected capacity change from 0 to 2048 [ 1046.856344][ T5301] EXT4-fs (loop1): mounted filesystem 00000000-0000-0000-0000-000000000000 without journal. Quota mode: none. [ 1046.882319][ T5301] ext4 filesystem being mounted at /root/syzkaller-testdir1539738704/syzkaller.ao1jj3/3827/bus supports timestamps until 2038 (0x7fffffff) [ 1046.957355][ T5301] loop1: detected capacity change from 2048 to 2047 [ 1046.987703][ T3128] EXT4-fs (loop1): unmounting filesystem 00000000-0000-0000-0000-000000000000. 12:22:18 executing program 5: r0 = socket$unix(0x1, 0x2, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f0000000100)={'vcan0\x00', 0x0}) r2 = socket$can_bcm(0x1d, 0x2, 0x2) connect$can_bcm(r2, &(0x7f0000000000), 0x10) ioctl$sock_kcm_SIOCKCMUNATTACH(0xffffffffffffffff, 0x89e1, 0xffffffffffffffff) ioctl$sock_SIOCSPGRP(0xffffffffffffffff, 0x8902, 0x0) sendmsg$can_bcm(r2, &(0x7f0000000480)={&(0x7f0000000340)={0x1d, r1, 0x3f420f00}, 0x10, &(0x7f0000000040)={&(0x7f0000000580)=ANY=[@ANYBLOB="01000000d7fe68ca0000e9ffffff0000", @ANYRES64=0x0, @ANYRES64=0x0, @ANYRES64=0x0, @ANYRES64=r0, @ANYBLOB="3bf81bb9f1"], 0x20000600}}, 0x0) r3 = socket(0x0, 0x800, 0x40000) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r3, 0x541b, &(0x7f00000000c0)={'ip6_vti0\x00', 0x0}) sendmsg$IPCTNL_MSG_EXP_DELETE(0xffffffffffffffff, &(0x7f00000004c0)={0x0, 0x0, 0x0}, 0x48000) perf_event_open(&(0x7f0000000500)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x15, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$binfmt_elf32(0xffffffffffffffff, &(0x7f0000000040)=ANY=[], 0x69) connect$can_bcm(0xffffffffffffffff, &(0x7f0000000000), 0x10) sendmsg$can_bcm(0xffffffffffffffff, &(0x7f0000000480)={&(0x7f0000000340)={0x1d, 0x0, 0x3f420f00}, 0x10, &(0x7f0000000040)={&(0x7f0000000580)=ANY=[@ANYBLOB="01000000d7fe68ca0000e9ffffff0000", @ANYRES64=0x0, @ANYRES64=0x0, @ANYRES64=0x0, @ANYRES64], 0x20000600}}, 0x0) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(0xffffffffffffffff, 0x89f0, &(0x7f0000000280)={'gretap0\x00', &(0x7f0000000240)={'ip_vti0\x00', 0x0, 0x7, 0x80, 0xfffffff7, 0x7, {{0x8, 0x4, 0x0, 0x5, 0x20, 0x67, 0x0, 0xc0, 0x29, 0x0, @local, @empty, {[@timestamp={0x44, 0xc, 0x8, 0x0, 0x2, [0x7f, 0x1]}]}}}}}) socket(0x10, 0x3, 0x0) process_mrelease(0xffffffffffffffff, 0x0) r4 = socket$packet(0x11, 0x2, 0x300) ioctl$sock_SIOCGIFINDEX(r4, 0x8933, 0x0) getsockopt$inet_sctp_SCTP_RECVNXTINFO(r3, 0x84, 0x21, &(0x7f0000000140), &(0x7f0000000200)=0x4) bind$unix(r0, &(0x7f00000005c0)=@abs={0x1, 0x0, 0x4e23}, 0x6e) syz_clone(0x40000000, &(0x7f00000000c0), 0x0, 0x0, &(0x7f00000001c0), 0x0) 12:22:18 executing program 2: open(&(0x7f0000000400)='./bus\x00', 0x14103e, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$L2TP_CMD_SESSION_MODIFY(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000080)={0x30, r1, 0x1, 0x0, 0x0, {}, [@L2TP_ATTR_SEND_SEQ={0x5}, @L2TP_ATTR_IFNAME={0x14, 0x8, 'veth1_to_hsr\x00'}]}, 0x30}, 0x1, 0x500000000000000}, 0x0) 12:22:18 executing program 3: openat$nvram(0xffffffffffffff9c, &(0x7f0000000600), 0x0, 0x0) 12:22:18 executing program 0: pselect6(0x40, &(0x7f0000000040), &(0x7f00000001c0)={0x2}, 0x0, 0x0, &(0x7f0000000180)={0x0}) 12:22:18 executing program 4: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x82, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket(0x10, 0x803, 0x0) sendto(r0, &(0x7f00000000c0)="120000001200e7ef007b00000000000000a1", 0x12, 0x0, 0x0, 0x0) recvmmsg(r0, &(0x7f00000037c0)=[{{&(0x7f00000004c0)=@ethernet={0x0, @random}, 0x80, &(0x7f0000000380)=[{&(0x7f0000000040)=""/95, 0x5f}, {&(0x7f0000000140)=""/85, 0x55}, {&(0x7f0000000fc0)=""/4096, 0x1000}, {&(0x7f0000000400)=""/106, 0x6a}, {&(0x7f0000000740)=""/73, 0x49}, {&(0x7f0000000200)=""/77, 0x4d}, {0x0}], 0x7, &(0x7f0000000600)=""/191, 0xbf}, 0x7fffde4c}], 0x1, 0x0, &(0x7f0000003700)={0x77359400}) 12:22:18 executing program 1: syz_mount_image$ext4(&(0x7f0000000740)='ext4\x00', &(0x7f0000000100)='./bus\x00', 0x804810, &(0x7f0000000180)=ANY=[@ANYBLOB="0061021d307a961da7401271e3fa98008000001d3902ccfd562158cb15c016093893c9e4abd02bc4f1492514fa2dfebc8001000080000000008a1049ca0000"], 0x1, 0x73b, &(0x7f0000000780)="$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") chdir(&(0x7f0000000080)='./file0\x00') open(&(0x7f00000000c0)='./bus\x00', 0x14da42, 0x0) mount(&(0x7f0000000380)=@loop={'/dev/loop', 0x0}, &(0x7f00000003c0)='./bus\x00', 0x0, 0x1000, 0x0) r0 = open(&(0x7f0000000400)='./bus\x00', 0x0, 0x0) ioctl$LOOP_SET_STATUS(r0, 0x4c02, &(0x7f00000001c0)={0x0, {}, 0x0, {}, 0xff, 0x0, 0x0, 0x0, "be8176c9e6755a48a3c0230dd390efe12f8306bed95b2afd402aae879978d959ff9009eec610d9108ea036456bb79e26ee42d0a34968c1fdbb33e8ad5860f632", "b948757aa008fae13adca739a9f126462ab528ea52e90ce2cf50a4ef2568375b"}) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='blkio.throttle.io_service_bytes\x00', 0x275a, 0x3f00000000000000) 12:22:18 executing program 3: pselect6(0x40, &(0x7f0000000180), &(0x7f00000001c0)={0x3}, 0x0, &(0x7f0000000240)={0x77359400}, 0x0) 12:22:18 executing program 2: open(&(0x7f0000000400)='./bus\x00', 0x14103e, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$L2TP_CMD_SESSION_MODIFY(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000080)={0x30, r1, 0x1, 0x0, 0x0, {}, [@L2TP_ATTR_SEND_SEQ={0x5}, @L2TP_ATTR_IFNAME={0x14, 0x8, 'veth1_to_hsr\x00'}]}, 0x30}, 0x1, 0x600000000000000}, 0x0) 12:22:18 executing program 0: r0 = socket$can_raw(0x1d, 0x3, 0x1) getsockopt$CAN_RAW_FILTER(r0, 0x65, 0x1, &(0x7f0000000300)=[{}], &(0x7f0000000340)=0x8) 12:22:18 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$IPVS_CMD_SET_SERVICE(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000180)=ANY=[@ANYBLOB="6000000070eead"], 0x60}}, 0x0) 12:22:18 executing program 4: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x82, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket(0x10, 0x803, 0x0) sendto(r0, &(0x7f00000000c0)="120000001200e7ef007b00000000000000a1", 0x12, 0x0, 0x0, 0x0) recvmmsg(r0, &(0x7f00000037c0)=[{{&(0x7f00000004c0)=@ethernet={0x0, @random}, 0x80, &(0x7f0000000380)=[{&(0x7f0000000040)=""/95, 0x5f}, {&(0x7f0000000140)=""/85, 0x55}, {&(0x7f0000000fc0)=""/4096, 0x1000}, {&(0x7f0000000400)=""/106, 0x6a}, {&(0x7f0000000740)=""/73, 0x49}, {&(0x7f0000000200)=""/77, 0x4d}, {0x0}], 0x7, &(0x7f0000000600)=""/191, 0xbf}, 0x81000000}], 0x1, 0x0, &(0x7f0000003700)={0x77359400}) 12:22:18 executing program 0: setsockopt$inet_sctp6_SCTP_HMAC_IDENT(0xffffffffffffffff, 0x84, 0x16, 0x0, 0x3422059d9c5bc198) [ 1047.130529][ T5332] loop1: detected capacity change from 0 to 2048 [ 1047.216920][ T5332] EXT4-fs (loop1): mounted filesystem 00000000-0000-0000-0000-000000000000 without journal. Quota mode: none. [ 1047.256324][ T5332] ext4 filesystem being mounted at /root/syzkaller-testdir1539738704/syzkaller.ao1jj3/3828/bus supports timestamps until 2038 (0x7fffffff) [ 1047.396344][ T5332] loop1: detected capacity change from 2048 to 2047 [ 1047.434972][ T3128] EXT4-fs (loop1): unmounting filesystem 00000000-0000-0000-0000-000000000000. 12:22:19 executing program 5: r0 = socket$unix(0x1, 0x2, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f0000000100)={'vcan0\x00', 0x0}) r2 = socket$can_bcm(0x1d, 0x2, 0x2) connect$can_bcm(r2, &(0x7f0000000000), 0x10) ioctl$sock_kcm_SIOCKCMUNATTACH(0xffffffffffffffff, 0x89e1, 0xffffffffffffffff) ioctl$sock_SIOCSPGRP(0xffffffffffffffff, 0x8902, 0x0) sendmsg$can_bcm(r2, &(0x7f0000000480)={&(0x7f0000000340)={0x1d, r1, 0x3f420f00}, 0x10, &(0x7f0000000040)={&(0x7f0000000580)=ANY=[@ANYBLOB="01000000d7fe68ca0000e9ffffff0000", @ANYRES64=0x0, @ANYRES64=0x0, @ANYRES64=0x0, @ANYRES64=r0, @ANYBLOB="3bf81bb9f1"], 0x20000600}}, 0x0) r3 = socket(0x0, 0x800, 0x40000) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r3, 0x541b, &(0x7f00000000c0)={'ip6_vti0\x00', 0x0}) sendmsg$IPCTNL_MSG_EXP_DELETE(0xffffffffffffffff, &(0x7f00000004c0)={0x0, 0x0, 0x0}, 0x48000) perf_event_open(&(0x7f0000000500)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x15, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$binfmt_elf32(0xffffffffffffffff, &(0x7f0000000040)=ANY=[], 0x69) connect$can_bcm(0xffffffffffffffff, &(0x7f0000000000), 0x10) sendmsg$can_bcm(0xffffffffffffffff, &(0x7f0000000480)={&(0x7f0000000340)={0x1d, 0x0, 0x3f420f00}, 0x10, &(0x7f0000000040)={&(0x7f0000000580)=ANY=[@ANYBLOB="01000000d7fe68ca0000e9ffffff0000", @ANYRES64=0x0, @ANYRES64=0x0, @ANYRES64=0x0, @ANYRES64], 0x20000600}}, 0x0) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(0xffffffffffffffff, 0x89f0, &(0x7f0000000280)={'gretap0\x00', &(0x7f0000000240)={'ip_vti0\x00', 0x0, 0x7, 0x80, 0xfffffff7, 0x7, {{0x8, 0x4, 0x0, 0x5, 0x20, 0x67, 0x0, 0xc0, 0x29, 0x0, @local, @empty, {[@timestamp={0x44, 0xc, 0x8, 0x0, 0x2, [0x7f, 0x1]}]}}}}}) socket(0x10, 0x3, 0x0) process_mrelease(0xffffffffffffffff, 0x0) r4 = socket$packet(0x11, 0x2, 0x300) ioctl$sock_SIOCGIFINDEX(r4, 0x8933, 0x0) getsockopt$inet_sctp_SCTP_RECVNXTINFO(r3, 0x84, 0x21, &(0x7f0000000140), &(0x7f0000000200)=0x4) bind$unix(r0, &(0x7f00000005c0)=@abs={0x1, 0x0, 0x4e23}, 0x6e) syz_clone(0x40000000, &(0x7f00000000c0), 0x0, 0x0, &(0x7f00000001c0), 0x0) 12:22:19 executing program 2: open(&(0x7f0000000400)='./bus\x00', 0x14103e, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$L2TP_CMD_SESSION_MODIFY(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000080)={0x30, r1, 0x1, 0x0, 0x0, {}, [@L2TP_ATTR_SEND_SEQ={0x5}, @L2TP_ATTR_IFNAME={0x14, 0x8, 'veth1_to_hsr\x00'}]}, 0x30}, 0x1, 0x700000000000000}, 0x0) 12:22:19 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NL80211_CMD_SET_WIPHY(r0, &(0x7f0000000100)={&(0x7f0000000000), 0xc, &(0x7f00000000c0)={&(0x7f0000000080)={0x18, 0x0, 0x0, 0x0, 0x0, {}, [@NL80211_ATTR_WIPHY_DYN_ACK={0x4}]}, 0xfffffffffffffe83}}, 0x0) 12:22:19 executing program 4: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x82, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket(0x10, 0x803, 0x0) sendto(r0, &(0x7f00000000c0)="120000001200e7ef007b00000000000000a1", 0x12, 0x0, 0x0, 0x0) recvmmsg(r0, &(0x7f00000037c0)=[{{&(0x7f00000004c0)=@ethernet={0x0, @random}, 0x80, &(0x7f0000000380)=[{&(0x7f0000000040)=""/95, 0x5f}, {&(0x7f0000000140)=""/85, 0x55}, {&(0x7f0000000fc0)=""/4096, 0x1000}, {&(0x7f0000000400)=""/106, 0x6a}, {&(0x7f0000000740)=""/73, 0x49}, {&(0x7f0000000200)=""/77, 0x4d}, {0x0}], 0x7, &(0x7f0000000600)=""/191, 0xbf}, 0x88470000}], 0x1, 0x0, &(0x7f0000003700)={0x77359400}) 12:22:19 executing program 0: bpf$OBJ_GET_PROG(0x7, &(0x7f00000005c0)={0x0, 0x0, 0x10}, 0x10) 12:22:19 executing program 1: syz_mount_image$ext4(&(0x7f0000000740)='ext4\x00', &(0x7f0000000100)='./bus\x00', 0x804810, &(0x7f0000000180)=ANY=[@ANYBLOB="0061021d307a961da7401271e3fa98008000001d3902ccfd562158cb15c016093893c9e4abd02bc4f1492514fa2dfebc8001000080000000008a1049ca0000"], 0x1, 0x73b, &(0x7f0000000780)="$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") chdir(&(0x7f0000000080)='./file0\x00') open(&(0x7f00000000c0)='./bus\x00', 0x14da42, 0x0) mount(&(0x7f0000000380)=@loop={'/dev/loop', 0x0}, &(0x7f00000003c0)='./bus\x00', 0x0, 0x1000, 0x0) r0 = open(&(0x7f0000000400)='./bus\x00', 0x0, 0x0) ioctl$LOOP_SET_STATUS(r0, 0x4c02, &(0x7f00000001c0)={0x0, {}, 0x0, {}, 0xff, 0x0, 0x0, 0x0, "be8176c9e6755a48a3c0230dd390efe12f8306bed95b2afd402aae879978d959ff9009eec610d9108ea036456bb79e26ee42d0a34968c1fdbb33e8ad5860f632", "b948757aa008fae13adca739a9f126462ab528ea52e90ce2cf50a4ef2568375b"}) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='blkio.throttle.io_service_bytes\x00', 0x275a, 0x4000000000000000) 12:22:19 executing program 3: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) getsockopt$inet_sctp6_SCTP_AUTO_ASCONF(r0, 0x84, 0x1e, &(0x7f0000000540), &(0x7f0000000040)=0x4) 12:22:19 executing program 0: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000000140)=[@in6={0xa, 0x0, 0x0, @private2}], 0x1c) 12:22:19 executing program 2: open(&(0x7f0000000400)='./bus\x00', 0x14103e, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$L2TP_CMD_SESSION_MODIFY(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000080)={0x30, r1, 0x1, 0x0, 0x0, {}, [@L2TP_ATTR_SEND_SEQ={0x5}, @L2TP_ATTR_IFNAME={0x14, 0x8, 'veth1_to_hsr\x00'}]}, 0x30}, 0x1, 0x800000000000000}, 0x0) 12:22:19 executing program 4: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x82, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket(0x10, 0x803, 0x0) sendto(r0, &(0x7f00000000c0)="120000001200e7ef007b00000000000000a1", 0x12, 0x0, 0x0, 0x0) recvmmsg(r0, &(0x7f00000037c0)=[{{&(0x7f00000004c0)=@ethernet={0x0, @random}, 0x80, &(0x7f0000000380)=[{&(0x7f0000000040)=""/95, 0x5f}, {&(0x7f0000000140)=""/85, 0x55}, {&(0x7f0000000fc0)=""/4096, 0x1000}, {&(0x7f0000000400)=""/106, 0x6a}, {&(0x7f0000000740)=""/73, 0x49}, {&(0x7f0000000200)=""/77, 0x4d}, {0x0}], 0x7, &(0x7f0000000600)=""/191, 0xbf}, 0x88480000}], 0x1, 0x0, &(0x7f0000003700)={0x77359400}) [ 1048.010262][ T5361] loop1: detected capacity change from 0 to 2048 12:22:19 executing program 3: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000000080)=[@in6={0xa, 0x4e23, 0x0, @ipv4={'\x00', '\xff\xff', @local}}, @in={0x2, 0x4e22, @remote}], 0x2c) 12:22:19 executing program 0: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$ieee802154(&(0x7f0000000180), r0) r2 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$IEEE802154_ASSOCIATE_REQ(r2, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000280)={0x1c, r1, 0x1, 0x0, 0x0, {}, [@IEEE802154_ATTR_CHANNEL={0x5}]}, 0x1c}}, 0x0) [ 1048.121021][ T5361] EXT4-fs (loop1): mounted filesystem 00000000-0000-0000-0000-000000000000 without journal. Quota mode: none. [ 1048.170820][ T5361] ext4 filesystem being mounted at /root/syzkaller-testdir1539738704/syzkaller.ao1jj3/3829/bus supports timestamps until 2038 (0x7fffffff) [ 1048.317370][ T5361] loop1: detected capacity change from 2048 to 2047 [ 1048.344269][ T3128] EXT4-fs (loop1): unmounting filesystem 00000000-0000-0000-0000-000000000000. 12:22:20 executing program 5: r0 = socket$unix(0x1, 0x2, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f0000000100)={'vcan0\x00', 0x0}) r2 = socket$can_bcm(0x1d, 0x2, 0x2) connect$can_bcm(r2, &(0x7f0000000000), 0x10) ioctl$sock_kcm_SIOCKCMUNATTACH(0xffffffffffffffff, 0x89e1, 0xffffffffffffffff) ioctl$sock_SIOCSPGRP(0xffffffffffffffff, 0x8902, 0x0) sendmsg$can_bcm(r2, &(0x7f0000000480)={&(0x7f0000000340)={0x1d, r1, 0x3f420f00}, 0x10, &(0x7f0000000040)={&(0x7f0000000580)=ANY=[@ANYBLOB="01000000d7fe68ca0000e9ffffff0000", @ANYRES64=0x0, @ANYRES64=0x0, @ANYRES64=0x0, @ANYRES64=r0, @ANYBLOB="3bf81bb9f1"], 0x20000600}}, 0x0) r3 = socket(0x0, 0x800, 0x40000) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r3, 0x541b, &(0x7f00000000c0)={'ip6_vti0\x00', 0x0}) sendmsg$IPCTNL_MSG_EXP_DELETE(0xffffffffffffffff, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000440)={0x0}}, 0x48000) perf_event_open(&(0x7f0000000500)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x15, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$binfmt_elf32(0xffffffffffffffff, &(0x7f0000000040)=ANY=[], 0x69) connect$can_bcm(0xffffffffffffffff, &(0x7f0000000000), 0x10) sendmsg$can_bcm(0xffffffffffffffff, &(0x7f0000000480)={&(0x7f0000000340)={0x1d, 0x0, 0x3f420f00}, 0x10, &(0x7f0000000040)={&(0x7f0000000580)=ANY=[@ANYBLOB="01000000d7fe68ca0000e9ffffff0000", @ANYRES64=0x0, @ANYRES64=0x0, @ANYRES64=0x0, @ANYRES64], 0x20000600}}, 0x0) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(0xffffffffffffffff, 0x89f0, &(0x7f0000000280)={'gretap0\x00', &(0x7f0000000240)={'ip_vti0\x00', 0x0, 0x7, 0x80, 0xfffffff7, 0x7, {{0x8, 0x4, 0x0, 0x5, 0x20, 0x67, 0x0, 0xc0, 0x29, 0x0, @local, @empty, {[@timestamp={0x44, 0xc, 0x8, 0x0, 0x2, [0x7f, 0x1]}]}}}}}) socket(0x10, 0x3, 0x0) process_mrelease(0xffffffffffffffff, 0x0) r4 = socket$packet(0x11, 0x2, 0x300) ioctl$sock_SIOCGIFINDEX(r4, 0x8933, 0x0) getsockopt$inet_sctp_SCTP_RECVNXTINFO(r3, 0x84, 0x21, &(0x7f0000000140), &(0x7f0000000200)=0x4) bind$unix(r0, &(0x7f00000005c0)=@abs={0x1, 0x0, 0x4e23}, 0x6e) syz_clone(0x40000000, &(0x7f00000000c0), 0x0, 0x0, &(0x7f00000001c0), 0x0) 12:22:20 executing program 2: open(&(0x7f0000000400)='./bus\x00', 0x14103e, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$L2TP_CMD_SESSION_MODIFY(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000080)={0x30, r1, 0x1, 0x0, 0x0, {}, [@L2TP_ATTR_SEND_SEQ={0x5}, @L2TP_ATTR_IFNAME={0x14, 0x8, 'veth1_to_hsr\x00'}]}, 0x30}, 0x1, 0x900000000000000}, 0x0) 12:22:20 executing program 0: r0 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r1 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000001a00)='/proc/sys/net/ipv4/vs/schedule_icmp\x00', 0x2, 0x0) ioctl$AUTOFS_DEV_IOCTL_CLOSEMOUNT(r0, 0xc0189375, &(0x7f0000000240)={{0x1, 0x1, 0x18, r1}, './file0\x00'}) 12:22:20 executing program 4: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x82, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket(0x10, 0x803, 0x0) sendto(r0, &(0x7f00000000c0)="120000001200e7ef007b00000000000000a1", 0x12, 0x0, 0x0, 0x0) recvmmsg(r0, &(0x7f00000037c0)=[{{&(0x7f00000004c0)=@ethernet={0x0, @random}, 0x80, &(0x7f0000000380)=[{&(0x7f0000000040)=""/95, 0x5f}, {&(0x7f0000000140)=""/85, 0x55}, {&(0x7f0000000fc0)=""/4096, 0x1000}, {&(0x7f0000000400)=""/106, 0x6a}, {&(0x7f0000000740)=""/73, 0x49}, {&(0x7f0000000200)=""/77, 0x4d}, {0x0}], 0x7, &(0x7f0000000600)=""/191, 0xbf}, 0x88a8ffff}], 0x1, 0x0, &(0x7f0000003700)={0x77359400}) 12:22:20 executing program 3: r0 = add_key$keyring(&(0x7f0000000240), &(0x7f0000000280)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffd) add_key(&(0x7f00000004c0)='rxrpc\x00', 0x0, 0x0, 0x0, r0) 12:22:20 executing program 1: syz_mount_image$ext4(&(0x7f0000000740)='ext4\x00', &(0x7f0000000100)='./bus\x00', 0x804810, &(0x7f0000000180)=ANY=[@ANYBLOB="0061021d307a961da7401271e3fa98008000001d3902ccfd562158cb15c016093893c9e4abd02bc4f1492514fa2dfebc8001000080000000008a1049ca0000"], 0x1, 0x73b, &(0x7f0000000780)="$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") chdir(&(0x7f0000000080)='./file0\x00') open(&(0x7f00000000c0)='./bus\x00', 0x14da42, 0x0) mount(&(0x7f0000000380)=@loop={'/dev/loop', 0x0}, &(0x7f00000003c0)='./bus\x00', 0x0, 0x1000, 0x0) r0 = open(&(0x7f0000000400)='./bus\x00', 0x0, 0x0) ioctl$LOOP_SET_STATUS(r0, 0x4c02, &(0x7f00000001c0)={0x0, {}, 0x0, {}, 0xff, 0x0, 0x0, 0x0, "be8176c9e6755a48a3c0230dd390efe12f8306bed95b2afd402aae879978d959ff9009eec610d9108ea036456bb79e26ee42d0a34968c1fdbb33e8ad5860f632", "b948757aa008fae13adca739a9f126462ab528ea52e90ce2cf50a4ef2568375b"}) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='blkio.throttle.io_service_bytes\x00', 0x275a, 0x4000080000000000) 12:22:20 executing program 0: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$IPVS_CMD_GET_CONFIG(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f00000008c0)={0x14}, 0x14}}, 0x0) 12:22:20 executing program 2: open(&(0x7f0000000400)='./bus\x00', 0x14103e, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$L2TP_CMD_SESSION_MODIFY(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000080)={0x30, r1, 0x1, 0x0, 0x0, {}, [@L2TP_ATTR_SEND_SEQ={0x5}, @L2TP_ATTR_IFNAME={0x14, 0x8, 'veth1_to_hsr\x00'}]}, 0x30}, 0x1, 0xf00000000000000}, 0x0) 12:22:20 executing program 3: timer_create(0x0, &(0x7f0000003240)={0x0, 0x0, 0x4, @thr={0x0, 0x0}}, 0x0) 12:22:20 executing program 4: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x82, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket(0x10, 0x803, 0x0) sendto(r0, &(0x7f00000000c0)="120000001200e7ef007b00000000000000a1", 0x12, 0x0, 0x0, 0x0) recvmmsg(r0, &(0x7f00000037c0)=[{{&(0x7f00000004c0)=@ethernet={0x0, @random}, 0x80, &(0x7f0000000380)=[{&(0x7f0000000040)=""/95, 0x5f}, {&(0x7f0000000140)=""/85, 0x55}, {&(0x7f0000000fc0)=""/4096, 0x1000}, {&(0x7f0000000400)=""/106, 0x6a}, {&(0x7f0000000740)=""/73, 0x49}, {&(0x7f0000000200)=""/77, 0x4d}, {0x0}], 0x7, &(0x7f0000000600)=""/191, 0xbf}, 0xb4110000}], 0x1, 0x0, &(0x7f0000003700)={0x77359400}) 12:22:20 executing program 2: open(&(0x7f0000000400)='./bus\x00', 0x14103e, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$L2TP_CMD_SESSION_MODIFY(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000080)={0x30, r1, 0x1, 0x0, 0x0, {}, [@L2TP_ATTR_SEND_SEQ={0x5}, @L2TP_ATTR_IFNAME={0x14, 0x8, 'veth1_to_hsr\x00'}]}, 0x30}, 0x1, 0x1300000000000000}, 0x0) 12:22:20 executing program 0: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000240), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000600)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000300)={0xffffffffffffffff}, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_LISTEN(r0, &(0x7f0000000640)={0x7, 0x8, 0xfa00, {r1, 0xffffffff}}, 0x10) [ 1048.850963][ T5389] loop1: detected capacity change from 0 to 2048 [ 1048.947517][ T5389] EXT4-fs (loop1): mounted filesystem 00000000-0000-0000-0000-000000000000 without journal. Quota mode: none. [ 1048.981859][ T5389] ext4 filesystem being mounted at /root/syzkaller-testdir1539738704/syzkaller.ao1jj3/3830/bus supports timestamps until 2038 (0x7fffffff) [ 1049.084546][ T5389] loop1: detected capacity change from 2048 to 2047 [ 1049.111081][ T5408] EXT4-fs error (device loop1): ext4_find_dest_de:2093: inode #12: block 80: comm syz-executor.1: bad entry in directory: rec_len is smaller than minimal - offset=0, inode=0, rec_len=0, size=4096 fake=0 [ 1049.206601][ T3128] EXT4-fs (loop1): unmounting filesystem 00000000-0000-0000-0000-000000000000. 12:22:21 executing program 5: r0 = socket$unix(0x1, 0x2, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f0000000100)={'vcan0\x00', 0x0}) r2 = socket$can_bcm(0x1d, 0x2, 0x2) connect$can_bcm(r2, &(0x7f0000000000), 0x10) ioctl$sock_kcm_SIOCKCMUNATTACH(0xffffffffffffffff, 0x89e1, 0xffffffffffffffff) ioctl$sock_SIOCSPGRP(0xffffffffffffffff, 0x8902, 0x0) sendmsg$can_bcm(r2, &(0x7f0000000480)={&(0x7f0000000340)={0x1d, r1, 0x3f420f00}, 0x10, &(0x7f0000000040)={&(0x7f0000000580)=ANY=[@ANYBLOB="01000000d7fe68ca0000e9ffffff0000", @ANYRES64=0x0, @ANYRES64=0x0, @ANYRES64=0x0, @ANYRES64=r0, @ANYBLOB="3bf81bb9f1"], 0x20000600}}, 0x0) r3 = socket(0x0, 0x800, 0x40000) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r3, 0x541b, &(0x7f00000000c0)={'ip6_vti0\x00', 0x0}) sendmsg$IPCTNL_MSG_EXP_DELETE(0xffffffffffffffff, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000440)={0x0}}, 0x48000) perf_event_open(&(0x7f0000000500)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x15, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$binfmt_elf32(0xffffffffffffffff, &(0x7f0000000040)=ANY=[], 0x69) connect$can_bcm(0xffffffffffffffff, &(0x7f0000000000), 0x10) sendmsg$can_bcm(0xffffffffffffffff, &(0x7f0000000480)={&(0x7f0000000340)={0x1d, 0x0, 0x3f420f00}, 0x10, &(0x7f0000000040)={&(0x7f0000000580)=ANY=[@ANYBLOB="01000000d7fe68ca0000e9ffffff0000", @ANYRES64=0x0, @ANYRES64=0x0, @ANYRES64=0x0, @ANYRES64], 0x20000600}}, 0x0) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(0xffffffffffffffff, 0x89f0, &(0x7f0000000280)={'gretap0\x00', &(0x7f0000000240)={'ip_vti0\x00', 0x0, 0x7, 0x80, 0xfffffff7, 0x7, {{0x8, 0x4, 0x0, 0x5, 0x20, 0x67, 0x0, 0xc0, 0x29, 0x0, @local, @empty, {[@timestamp={0x44, 0xc, 0x8, 0x0, 0x2, [0x7f, 0x1]}]}}}}}) socket(0x10, 0x3, 0x0) process_mrelease(0xffffffffffffffff, 0x0) r4 = socket$packet(0x11, 0x2, 0x300) ioctl$sock_SIOCGIFINDEX(r4, 0x8933, 0x0) getsockopt$inet_sctp_SCTP_RECVNXTINFO(r3, 0x84, 0x21, &(0x7f0000000140), &(0x7f0000000200)=0x4) bind$unix(r0, &(0x7f00000005c0)=@abs={0x1, 0x0, 0x4e23}, 0x6e) syz_clone(0x40000000, &(0x7f00000000c0), 0x0, 0x0, &(0x7f00000001c0), 0x0) 12:22:21 executing program 3: pselect6(0x40, &(0x7f0000000000)={0x5}, &(0x7f0000000040)={0x1}, 0x0, 0x0, 0x0) 12:22:21 executing program 0: socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000002380)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$tipc(r0, &(0x7f0000002600)={&(0x7f00000023c0)=@name, 0x10, 0x0, 0x0, &(0x7f0000002580)="244783f0147d9f5c31b2541577bc4d4040e22d5579150323bd07282f00f1afd4f46ef949eb", 0x25}, 0x0) 12:22:21 executing program 4: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x82, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket(0x10, 0x803, 0x0) sendto(r0, &(0x7f00000000c0)="120000001200e7ef007b00000000000000a1", 0x12, 0x0, 0x0, 0x0) recvmmsg(r0, &(0x7f00000037c0)=[{{&(0x7f00000004c0)=@ethernet={0x0, @random}, 0x80, &(0x7f0000000380)=[{&(0x7f0000000040)=""/95, 0x5f}, {&(0x7f0000000140)=""/85, 0x55}, {&(0x7f0000000fc0)=""/4096, 0x1000}, {&(0x7f0000000400)=""/106, 0x6a}, {&(0x7f0000000740)=""/73, 0x49}, {&(0x7f0000000200)=""/77, 0x4d}, {0x0}], 0x7, &(0x7f0000000600)=""/191, 0xbf}, 0xc3ffffff}], 0x1, 0x0, &(0x7f0000003700)={0x77359400}) 12:22:21 executing program 2: open(&(0x7f0000000400)='./bus\x00', 0x14103e, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$L2TP_CMD_SESSION_MODIFY(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000080)={0x30, r1, 0x1, 0x0, 0x0, {}, [@L2TP_ATTR_SEND_SEQ={0x5}, @L2TP_ATTR_IFNAME={0x14, 0x8, 'veth1_to_hsr\x00'}]}, 0x30}, 0x1, 0x6000000000000000}, 0x0) 12:22:21 executing program 1: syz_mount_image$ext4(&(0x7f0000000740)='ext4\x00', &(0x7f0000000100)='./bus\x00', 0x804810, &(0x7f0000000180)=ANY=[@ANYBLOB="0061021d307a961da7401271e3fa98008000001d3902ccfd562158cb15c016093893c9e4abd02bc4f1492514fa2dfebc8001000080000000008a1049ca0000"], 0x1, 0x73b, &(0x7f0000000780)="$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") chdir(&(0x7f0000000080)='./file0\x00') open(&(0x7f00000000c0)='./bus\x00', 0x14da42, 0x0) mount(&(0x7f0000000380)=@loop={'/dev/loop', 0x0}, &(0x7f00000003c0)='./bus\x00', 0x0, 0x1000, 0x0) r0 = open(&(0x7f0000000400)='./bus\x00', 0x0, 0x0) ioctl$LOOP_SET_STATUS(r0, 0x4c02, &(0x7f00000001c0)={0x0, {}, 0x0, {}, 0xff, 0x0, 0x0, 0x0, "be8176c9e6755a48a3c0230dd390efe12f8306bed95b2afd402aae879978d959ff9009eec610d9108ea036456bb79e26ee42d0a34968c1fdbb33e8ad5860f632", "b948757aa008fae13adca739a9f126462ab528ea52e90ce2cf50a4ef2568375b"}) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='blkio.throttle.io_service_bytes\x00', 0x275a, 0x5000000000000000) 12:22:21 executing program 0: add_key(&(0x7f0000000000)='rxrpc\x00', 0x0, &(0x7f0000000100)="dcedaa94e3ed6610309e6e5baee015d10077289c75c71d8b53bb2a8a37a0733c", 0x20, 0xfffffffffffffffc) 12:22:21 executing program 3: bpf$MAP_CREATE(0x0, &(0x7f0000001c00)=@bloom_filter={0x1e, 0x0, 0x7fff, 0x7}, 0x48) 12:22:21 executing program 2: open(&(0x7f0000000400)='./bus\x00', 0x14103e, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$L2TP_CMD_SESSION_MODIFY(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000080)={0x30, r1, 0x1, 0x0, 0x0, {}, [@L2TP_ATTR_SEND_SEQ={0x5}, @L2TP_ATTR_IFNAME={0x14, 0x8, 'veth1_to_hsr\x00'}]}, 0x30}, 0x1, 0x9effffff00000000}, 0x0) 12:22:21 executing program 4: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x82, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket(0x10, 0x803, 0x0) sendto(r0, &(0x7f00000000c0)="120000001200e7ef007b00000000000000a1", 0x12, 0x0, 0x0, 0x0) recvmmsg(r0, &(0x7f00000037c0)=[{{&(0x7f00000004c0)=@ethernet={0x0, @random}, 0x80, &(0x7f0000000380)=[{&(0x7f0000000040)=""/95, 0x5f}, {&(0x7f0000000140)=""/85, 0x55}, {&(0x7f0000000fc0)=""/4096, 0x1000}, {&(0x7f0000000400)=""/106, 0x6a}, {&(0x7f0000000740)=""/73, 0x49}, {&(0x7f0000000200)=""/77, 0x4d}, {0x0}], 0x7, &(0x7f0000000600)=""/191, 0xbf}, 0xffffa888}], 0x1, 0x0, &(0x7f0000003700)={0x77359400}) 12:22:21 executing program 3: r0 = socket$can_raw(0x1d, 0x3, 0x1) ioctl$sock_SIOCGIFINDEX_80211(r0, 0x8933, 0x0) 12:22:21 executing program 0: r0 = openat$autofs(0xffffffffffffff9c, &(0x7f00000002c0), 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_PROTOSUBVER(r0, 0xc0189373, &(0x7f00000000c0)={{0x1, 0x1, 0x18, r0}, './file0\x00'}) [ 1050.111417][ T5417] loop1: detected capacity change from 0 to 2048 [ 1050.237815][ T5417] EXT4-fs (loop1): mounted filesystem 00000000-0000-0000-0000-000000000000 without journal. Quota mode: none. [ 1050.251984][ T5417] ext4 filesystem being mounted at /root/syzkaller-testdir1539738704/syzkaller.ao1jj3/3831/bus supports timestamps until 2038 (0x7fffffff) [ 1050.344018][ T5417] loop1: detected capacity change from 2048 to 2047 [ 1050.392030][ T3128] EXT4-fs (loop1): unmounting filesystem 00000000-0000-0000-0000-000000000000. 12:22:22 executing program 5: r0 = socket$unix(0x1, 0x2, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f0000000100)={'vcan0\x00', 0x0}) r2 = socket$can_bcm(0x1d, 0x2, 0x2) connect$can_bcm(r2, &(0x7f0000000000), 0x10) ioctl$sock_kcm_SIOCKCMUNATTACH(0xffffffffffffffff, 0x89e1, 0xffffffffffffffff) ioctl$sock_SIOCSPGRP(0xffffffffffffffff, 0x8902, 0x0) sendmsg$can_bcm(r2, &(0x7f0000000480)={&(0x7f0000000340)={0x1d, r1, 0x3f420f00}, 0x10, &(0x7f0000000040)={&(0x7f0000000580)=ANY=[@ANYBLOB="01000000d7fe68ca0000e9ffffff0000", @ANYRES64=0x0, @ANYRES64=0x0, @ANYRES64=0x0, @ANYRES64=r0, @ANYBLOB="3bf81bb9f1"], 0x20000600}}, 0x0) r3 = socket(0x0, 0x800, 0x40000) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r3, 0x541b, &(0x7f00000000c0)={'ip6_vti0\x00', 0x0}) sendmsg$IPCTNL_MSG_EXP_DELETE(0xffffffffffffffff, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000440)={0x0}}, 0x48000) perf_event_open(&(0x7f0000000500)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x15, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$binfmt_elf32(0xffffffffffffffff, &(0x7f0000000040)=ANY=[], 0x69) connect$can_bcm(0xffffffffffffffff, &(0x7f0000000000), 0x10) sendmsg$can_bcm(0xffffffffffffffff, &(0x7f0000000480)={&(0x7f0000000340)={0x1d, 0x0, 0x3f420f00}, 0x10, &(0x7f0000000040)={&(0x7f0000000580)=ANY=[@ANYBLOB="01000000d7fe68ca0000e9ffffff0000", @ANYRES64=0x0, @ANYRES64=0x0, @ANYRES64=0x0, @ANYRES64], 0x20000600}}, 0x0) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(0xffffffffffffffff, 0x89f0, &(0x7f0000000280)={'gretap0\x00', &(0x7f0000000240)={'ip_vti0\x00', 0x0, 0x7, 0x80, 0xfffffff7, 0x7, {{0x8, 0x4, 0x0, 0x5, 0x20, 0x67, 0x0, 0xc0, 0x29, 0x0, @local, @empty, {[@timestamp={0x44, 0xc, 0x8, 0x0, 0x2, [0x7f, 0x1]}]}}}}}) socket(0x10, 0x3, 0x0) process_mrelease(0xffffffffffffffff, 0x0) r4 = socket$packet(0x11, 0x2, 0x300) ioctl$sock_SIOCGIFINDEX(r4, 0x8933, 0x0) getsockopt$inet_sctp_SCTP_RECVNXTINFO(r3, 0x84, 0x21, &(0x7f0000000140), &(0x7f0000000200)=0x4) bind$unix(r0, &(0x7f00000005c0)=@abs={0x1, 0x0, 0x4e23}, 0x6e) syz_clone(0x40000000, &(0x7f00000000c0), 0x0, 0x0, &(0x7f00000001c0), 0x0) 12:22:22 executing program 2: open(&(0x7f0000000400)='./bus\x00', 0x14103e, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$L2TP_CMD_SESSION_MODIFY(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000080)={0x30, r1, 0x1, 0x0, 0x0, {}, [@L2TP_ATTR_SEND_SEQ={0x5}, @L2TP_ATTR_IFNAME={0x14, 0x8, 'veth1_to_hsr\x00'}]}, 0x30}, 0x1, 0xd125000000000000}, 0x0) 12:22:22 executing program 3: timer_create(0x0, &(0x7f0000001080)={0x0, 0x0, 0x1, @thr={0x0, 0x0}}, &(0x7f00000010c0)) 12:22:22 executing program 4: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x82, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket(0x10, 0x803, 0x0) sendto(r0, &(0x7f00000000c0)="120000001200e7ef007b00000000000000a1", 0x12, 0x0, 0x0, 0x0) recvmmsg(r0, &(0x7f00000037c0)=[{{&(0x7f00000004c0)=@ethernet={0x0, @random}, 0x80, &(0x7f0000000380)=[{&(0x7f0000000040)=""/95, 0x5f}, {&(0x7f0000000140)=""/85, 0x55}, {&(0x7f0000000fc0)=""/4096, 0x1000}, {&(0x7f0000000400)=""/106, 0x6a}, {&(0x7f0000000740)=""/73, 0x49}, {&(0x7f0000000200)=""/77, 0x4d}, {0x0}], 0x7, &(0x7f0000000600)=""/191, 0xbf}, 0xffffffc3}], 0x1, 0x0, &(0x7f0000003700)={0x77359400}) 12:22:22 executing program 0: accept4$tipc(0xffffffffffffffff, 0x0, &(0x7f0000000040), 0x0) socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000400)) 12:22:22 executing program 1: syz_mount_image$ext4(&(0x7f0000000740)='ext4\x00', &(0x7f0000000100)='./bus\x00', 0x804810, &(0x7f0000000180)=ANY=[@ANYBLOB="0061021d307a961da7401271e3fa98008000001d3902ccfd562158cb15c016093893c9e4abd02bc4f1492514fa2dfebc8001000080000000008a1049ca0000"], 0x1, 0x73b, &(0x7f0000000780)="$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") chdir(&(0x7f0000000080)='./file0\x00') open(&(0x7f00000000c0)='./bus\x00', 0x14da42, 0x0) mount(&(0x7f0000000380)=@loop={'/dev/loop', 0x0}, &(0x7f00000003c0)='./bus\x00', 0x0, 0x1000, 0x0) r0 = open(&(0x7f0000000400)='./bus\x00', 0x0, 0x0) ioctl$LOOP_SET_STATUS(r0, 0x4c02, &(0x7f00000001c0)={0x0, {}, 0x0, {}, 0xff, 0x0, 0x0, 0x0, "be8176c9e6755a48a3c0230dd390efe12f8306bed95b2afd402aae879978d959ff9009eec610d9108ea036456bb79e26ee42d0a34968c1fdbb33e8ad5860f632", "b948757aa008fae13adca739a9f126462ab528ea52e90ce2cf50a4ef2568375b"}) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='blkio.throttle.io_service_bytes\x00', 0x275a, 0x600d000000000000) 12:22:22 executing program 0: mount$9p_fd(0x0, 0x0, 0x0, 0x0, 0x0) syz_genetlink_get_family_id$l2tp(&(0x7f0000000700), 0xffffffffffffffff) syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) socket$phonet_pipe(0x23, 0x5, 0x2) 12:22:22 executing program 3: r0 = add_key$keyring(&(0x7f0000000240), &(0x7f0000000280)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffd) r1 = add_key$keyring(&(0x7f0000000240), &(0x7f0000000280)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffd) add_key$keyring(&(0x7f0000001100), &(0x7f0000001140)={'syz', 0x2}, 0x0, 0x0, r1) keyctl$unlink(0x9, r0, r1) 12:22:22 executing program 2: open(&(0x7f0000000400)='./bus\x00', 0x14103e, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$L2TP_CMD_SESSION_MODIFY(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000080)={0x30, r1, 0x1, 0x0, 0x0, {}, [@L2TP_ATTR_SEND_SEQ={0x5}, @L2TP_ATTR_IFNAME={0x14, 0x8, 'veth1_to_hsr\x00'}]}, 0x30}, 0x1, 0xefffffff00000000}, 0x0) 12:22:22 executing program 4: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x82, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket(0x10, 0x803, 0x0) sendto(r0, &(0x7f00000000c0)="120000001200e7ef007b00000000000000a1", 0x12, 0x0, 0x0, 0x0) recvmmsg(r0, &(0x7f00000037c0)=[{{&(0x7f00000004c0)=@ethernet={0x0, @random}, 0x80, &(0x7f0000000380)=[{&(0x7f0000000040)=""/95, 0x5f}, {&(0x7f0000000140)=""/85, 0x55}, {&(0x7f0000000fc0)=""/4096, 0x1000}, {&(0x7f0000000400)=""/106, 0x6a}, {&(0x7f0000000740)=""/73, 0x49}, {&(0x7f0000000200)=""/77, 0x4d}, {0x0}], 0x7, &(0x7f0000000600)=""/191, 0xbf}}], 0x2, 0x0, &(0x7f0000003700)={0x77359400}) 12:22:22 executing program 3: keyctl$negate(0xd, 0x0, 0x0, 0xfffffffffffffff9) 12:22:22 executing program 0: r0 = syz_open_dev$evdev(&(0x7f0000000080), 0x0, 0x0) ioctl$EVIOCSCLOCKID(r0, 0x400445a0, 0x0) socket$igmp(0x2, 0x3, 0x2) r1 = socket$igmp(0x2, 0x3, 0x2) setsockopt$MRT_ADD_VIF(r1, 0x0, 0xca, &(0x7f0000000200)={0x0, 0x4, 0x2, 0x0, @vifc_lcl_ifindex, @multicast1}, 0x10) [ 1051.191583][ T5448] loop1: detected capacity change from 0 to 2048 [ 1051.327747][ T5448] EXT4-fs (loop1): mounted filesystem 00000000-0000-0000-0000-000000000000 without journal. Quota mode: none. [ 1051.350515][ T5448] ext4 filesystem being mounted at /root/syzkaller-testdir1539738704/syzkaller.ao1jj3/3832/bus supports timestamps until 2038 (0x7fffffff) [ 1051.431889][ T5448] loop1: detected capacity change from 2048 to 2047 [ 1051.454733][ T3128] EXT4-fs (loop1): unmounting filesystem 00000000-0000-0000-0000-000000000000. 12:22:23 executing program 5: r0 = socket$unix(0x1, 0x2, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f0000000100)={'vcan0\x00', 0x0}) r2 = socket$can_bcm(0x1d, 0x2, 0x2) connect$can_bcm(r2, &(0x7f0000000000), 0x10) ioctl$sock_kcm_SIOCKCMUNATTACH(0xffffffffffffffff, 0x89e1, 0xffffffffffffffff) ioctl$sock_SIOCSPGRP(0xffffffffffffffff, 0x8902, 0x0) sendmsg$can_bcm(r2, &(0x7f0000000480)={&(0x7f0000000340)={0x1d, r1, 0x3f420f00}, 0x10, &(0x7f0000000040)={&(0x7f0000000580)=ANY=[@ANYBLOB="01000000d7fe68ca0000e9ffffff0000", @ANYRES64=0x0, @ANYRES64=0x0, @ANYRES64=0x0, @ANYRES64=r0, @ANYBLOB="3bf81bb9f1"], 0x20000600}}, 0x0) r3 = socket(0x0, 0x800, 0x40000) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r3, 0x541b, &(0x7f00000000c0)={'ip6_vti0\x00', 0x0}) sendmsg$IPCTNL_MSG_EXP_DELETE(0xffffffffffffffff, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000440)={&(0x7f00000006c0)={0x1d0, 0x2, 0x2, 0x0, 0x0, 0x0, {0xa}, [@CTA_EXPECT_NAT={0xc0, 0xa, 0x0, 0x1, [@CTA_EXPECT_NAT_TUPLE={0xc, 0x2, 0x0, 0x1, [@CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x1}]}, @CTA_EXPECT_NAT_TUPLE={0x70, 0x2, 0x0, 0x1, [@CTA_TUPLE_IP={0x2c, 0x1, 0x0, 0x1, @ipv6={{0x14, 0x3, @loopback}, {0x14, 0x4, @private0}}}, @CTA_TUPLE_IP={0x14, 0x1, 0x0, 0x1, @ipv4={{0x8, 0x1, @empty}, {0x8, 0x2, @initdev={0xac, 0x1e, 0x1, 0x0}}}}, @CTA_TUPLE_IP={0x14, 0x1, 0x0, 0x1, @ipv4={{0x8, 0x1, @local}, {0x8, 0x2, @loopback}}}, @CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x4}, @CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x3}, @CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x1}]}, @CTA_EXPECT_NAT_TUPLE={0x38, 0x2, 0x0, 0x1, [@CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5, 0x1, 0x88}}, @CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x3}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5, 0x1, 0x21}}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5, 0x1, 0x1}}, @CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x3}]}, @CTA_EXPECT_NAT_DIR={0x8}]}, @CTA_EXPECT_MASTER={0x20, 0x1, 0x0, 0x1, [@CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x1}, @CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x2}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5, 0x1, 0x84}}]}, @CTA_EXPECT_MASTER={0xdc, 0x1, 0x0, 0x1, [@CTA_TUPLE_IP={0x14, 0x1, 0x0, 0x1, @ipv4={{0x8, 0x1, @multicast1}, {0x8, 0x2, @dev={0xac, 0x14, 0x14, 0x3a}}}}, @CTA_TUPLE_ZONE={0x6}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5, 0x1, 0x21}}, @CTA_TUPLE_IP={0x14, 0x1, 0x0, 0x1, @ipv4={{0x8, 0x1, @empty}, {0x8, 0x2, @local}}}, @CTA_TUPLE_IP={0x2c, 0x1, 0x0, 0x1, @ipv6={{0x14, 0x3, @private1={0xfc, 0x1, '\x00', 0x1}}, {0x14, 0x4, @rand_addr=' \x01\x00'}}}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5, 0x1, 0x1}}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5, 0x1, 0x88}}, @CTA_TUPLE_IP={0x2c, 0x1, 0x0, 0x1, @ipv6={{0x14, 0x3, @empty}, {0x14, 0x4, @dev={0xfe, 0x80, '\x00', 0x21}}}}, @CTA_TUPLE_IP={0x2c, 0x1, 0x0, 0x1, @ipv6={{0x14, 0x3, @local}, {0x14, 0x4, @ipv4={'\x00', '\xff\xff', @rand_addr=0x64010100}}}}]}]}, 0x1d0}}, 0x48000) perf_event_open(&(0x7f0000000500)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x15, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$binfmt_elf32(0xffffffffffffffff, &(0x7f0000000040)=ANY=[], 0x69) connect$can_bcm(0xffffffffffffffff, &(0x7f0000000000), 0x10) sendmsg$can_bcm(0xffffffffffffffff, &(0x7f0000000480)={&(0x7f0000000340)={0x1d, 0x0, 0x3f420f00}, 0x10, &(0x7f0000000040)={&(0x7f0000000580)=ANY=[@ANYBLOB="01000000d7fe68ca0000e9ffffff0000", @ANYRES64=0x0, @ANYRES64=0x0, @ANYRES64=0x0, @ANYRES64], 0x20000600}}, 0x0) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(0xffffffffffffffff, 0x89f0, &(0x7f0000000280)={'gretap0\x00', &(0x7f0000000240)={'ip_vti0\x00', 0x0, 0x7, 0x80, 0xfffffff7, 0x7, {{0x8, 0x4, 0x0, 0x5, 0x20, 0x67, 0x0, 0xc0, 0x29, 0x0, @local, @empty, {[@timestamp={0x44, 0xc, 0x8, 0x0, 0x2, [0x7f, 0x1]}]}}}}}) socket(0x10, 0x3, 0x0) process_mrelease(0xffffffffffffffff, 0x0) r4 = socket$packet(0x11, 0x2, 0x300) ioctl$sock_SIOCGIFINDEX(r4, 0x8933, 0x0) getsockopt$inet_sctp_SCTP_RECVNXTINFO(r3, 0x84, 0x21, &(0x7f0000000140), &(0x7f0000000200)=0x4) bind$unix(r0, &(0x7f00000005c0)=@abs={0x1, 0x0, 0x4e23}, 0x6e) syz_clone(0x40000000, &(0x7f00000000c0), 0x0, 0x0, &(0x7f00000001c0), 0x0) 12:22:23 executing program 2: open(&(0x7f0000000400)='./bus\x00', 0x14103e, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$L2TP_CMD_SESSION_MODIFY(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000080)={0x30, r1, 0x1, 0x0, 0x0, {}, [@L2TP_ATTR_SEND_SEQ={0x5}, @L2TP_ATTR_IFNAME={0x14, 0x8, 'veth1_to_hsr\x00'}]}, 0x30}, 0x1, 0xf0ffffff00000000}, 0x0) 12:22:23 executing program 4: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x82, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket(0x10, 0x803, 0x0) sendto(r0, &(0x7f00000000c0)="120000001200e7ef007b00000000000000a1", 0x12, 0x0, 0x0, 0x0) recvmmsg(r0, &(0x7f00000037c0)=[{{&(0x7f00000004c0)=@ethernet={0x0, @random}, 0x80, &(0x7f0000000380)=[{&(0x7f0000000040)=""/95, 0x5f}, {&(0x7f0000000140)=""/85, 0x55}, {&(0x7f0000000fc0)=""/4096, 0x1000}, {&(0x7f0000000400)=""/106, 0x6a}, {&(0x7f0000000740)=""/73, 0x49}, {&(0x7f0000000200)=""/77, 0x4d}, {0x0}], 0x7, &(0x7f0000000600)=""/191, 0xbf}}], 0x3, 0x0, &(0x7f0000003700)={0x77359400}) 12:22:23 executing program 3: syz_genetlink_get_family_id$ethtool(&(0x7f0000000cc0), 0xffffffffffffffff) 12:22:23 executing program 0: socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) getsockopt$TIPC_IMPORTANCE(r0, 0x10f, 0x7f, &(0x7f0000000100), &(0x7f0000000140)=0x4) 12:22:23 executing program 1: syz_mount_image$ext4(&(0x7f0000000740)='ext4\x00', &(0x7f0000000100)='./bus\x00', 0x804810, &(0x7f0000000180)=ANY=[@ANYBLOB="0061021d307a961da7401271e3fa98008000001d3902ccfd562158cb15c016093893c9e4abd02bc4f1492514fa2dfebc8001000080000000008a1049ca0000"], 0x1, 0x73b, &(0x7f0000000780)="$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") chdir(&(0x7f0000000080)='./file0\x00') open(&(0x7f00000000c0)='./bus\x00', 0x14da42, 0x0) mount(&(0x7f0000000380)=@loop={'/dev/loop', 0x0}, &(0x7f00000003c0)='./bus\x00', 0x0, 0x1000, 0x0) r0 = open(&(0x7f0000000400)='./bus\x00', 0x0, 0x0) ioctl$LOOP_SET_STATUS(r0, 0x4c02, &(0x7f00000001c0)={0x0, {}, 0x0, {}, 0xff, 0x0, 0x0, 0x0, "be8176c9e6755a48a3c0230dd390efe12f8306bed95b2afd402aae879978d959ff9009eec610d9108ea036456bb79e26ee42d0a34968c1fdbb33e8ad5860f632", "b948757aa008fae13adca739a9f126462ab528ea52e90ce2cf50a4ef2568375b"}) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='blkio.throttle.io_service_bytes\x00', 0x275a, 0x980d000000000000) 12:22:23 executing program 0: r0 = socket$tipc(0x1e, 0x5, 0x0) connect$tipc(r0, &(0x7f0000000140)=@id, 0x10) 12:22:23 executing program 3: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000000080)=[@in6={0xa, 0x0, 0x0, @ipv4={'\x00', '\xff\xff', @local}}], 0x1c) 12:22:23 executing program 2: open(&(0x7f0000000400)='./bus\x00', 0x14103e, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$L2TP_CMD_SESSION_MODIFY(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000080)={0x30, r1, 0x1, 0x0, 0x0, {}, [@L2TP_ATTR_SEND_SEQ={0x5}, @L2TP_ATTR_IFNAME={0x14, 0x8, 'veth1_to_hsr\x00'}]}, 0x30}, 0x1, 0xffffff7f00000000}, 0x0) 12:22:23 executing program 4: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x82, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket(0x10, 0x803, 0x0) sendto(r0, &(0x7f00000000c0)="120000001200e7ef007b00000000000000a1", 0x12, 0x0, 0x0, 0x0) recvmmsg(r0, &(0x7f00000037c0)=[{{&(0x7f00000004c0)=@ethernet={0x0, @random}, 0x80, &(0x7f0000000380)=[{&(0x7f0000000040)=""/95, 0x5f}, {&(0x7f0000000140)=""/85, 0x55}, {&(0x7f0000000fc0)=""/4096, 0x1000}, {&(0x7f0000000400)=""/106, 0x6a}, {&(0x7f0000000740)=""/73, 0x49}, {&(0x7f0000000200)=""/77, 0x4d}, {0x0}], 0x7, &(0x7f0000000600)=""/191, 0xbf}}], 0x5, 0x0, &(0x7f0000003700)={0x77359400}) 12:22:23 executing program 2: open(&(0x7f0000000400)='./bus\x00', 0x14103e, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$L2TP_CMD_SESSION_MODIFY(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000080)={0x30, r1, 0x1, 0x0, 0x0, {}, [@L2TP_ATTR_SEND_SEQ={0x5}, @L2TP_ATTR_IFNAME={0x14, 0x8, 'veth1_to_hsr\x00'}]}, 0x30}, 0x1, 0xffffffff00000000}, 0x0) [ 1051.586061][ T5481] ------------[ cut here ]------------ [ 1051.591621][ T5481] WARNING: CPU: 0 PID: 5481 at lib/iov_iter.c:629 _copy_from_iter+0x193/0x8e0 [ 1051.600652][ T5481] Modules linked in: [ 1051.604636][ T5481] CPU: 0 PID: 5481 Comm: syz-executor.0 Not tainted 6.2.0-rc5-syzkaller-00047-g7c46948a6e9c-dirty #0 [ 1051.615517][ T5481] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/12/2023 [ 1051.619633][ T5480] loop1: detected capacity change from 0 to 2048 12:22:23 executing program 2: open(&(0x7f0000000400)='./bus\x00', 0x14103e, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$L2TP_CMD_SESSION_MODIFY(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000080)={0x30, r1, 0x1, 0x0, 0x0, {}, [@L2TP_ATTR_SEND_SEQ={0x5}, @L2TP_ATTR_IFNAME={0x14, 0x8, 'veth1_to_hsr\x00'}]}, 0x30}, 0x1, 0x0, 0x2}, 0x0) [ 1051.625577][ T5481] RIP: 0010:_copy_from_iter+0x193/0x8e0 [ 1051.637581][ T5481] Code: 25 28 00 00 00 48 3b 44 24 78 0f 85 4f 07 00 00 4c 89 e0 48 81 c4 80 00 00 00 5b 41 5c 41 5d 41 5e 41 5f 5d c3 e8 fd 6f 82 ff <0f> 0b 45 31 e4 eb cb e8 f1 6f 82 ff 49 89 dc e9 ce fe ff ff e8 e4 [ 1051.657263][ T5481] RSP: 0018:ffffc900109abaf0 EFLAGS: 00010287 [ 1051.663351][ T5481] RAX: ffffffff81a5b3c3 RBX: 0000000000000000 RCX: 0000000000040000 [ 1051.671391][ T5481] RDX: ffffc9000b7cd000 RSI: 000000000000004d RDI: 000000000000004e [ 1051.679397][ T5481] RBP: ffff8881591f74d0 R08: ffffffff81a5b274 R09: 0000000000000000 [ 1051.687451][ T5481] R10: 0001ffffffffffff R11: 0001ffffffffffff R12: 0000000000000000 [ 1051.695489][ T5481] R13: 0000000000000000 R14: ffff8881591f74d0 R15: ffffc900109abdd0 [ 1051.703505][ T5481] FS: 00007f83820ef700(0000) GS:ffff888237c00000(0000) knlGS:0000000000000000 [ 1051.712472][ T5481] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 1051.719060][ T5481] CR2: 0000000020000140 CR3: 0000000155b95000 CR4: 00000000003506f0 [ 1051.727138][ T5481] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 [ 1051.735128][ T5481] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 [ 1051.743162][ T5481] Call Trace: [ 1051.746449][ T5481] [ 1051.749382][ T5481] ? tipc_msg_build+0xbd/0x8c0 [ 1051.754183][ T5481] ? __kmalloc_node_track_caller+0x92/0x190 [ 1051.760153][ T5481] ? __build_skb_around+0x196/0x1f0 [ 1051.765398][ T5481] ? tipc_msg_build+0xbd/0x8c0 [ 1051.770179][ T5481] ? __alloc_skb+0x26d/0x320 [ 1051.774787][ T5481] ? skb_put+0xb6/0x100 [ 1051.779028][ T5481] ? __check_object_size+0x160/0x200 [ 1051.784420][ T5481] tipc_msg_build+0x2cd/0x8c0 [ 1051.789174][ T5481] ? save_fpregs_to_fpstate+0xfa/0x140 [ 1051.794707][ T5481] ? __rcu_read_unlock+0x4a/0x70 [ 1051.799663][ T5481] __tipc_sendmsg+0x14c8/0x1be0 [ 1051.804589][ T5481] ? wait_woken+0x50/0x50 [ 1051.808984][ T5481] ? lock_sock_nested+0x106/0x130 [ 1051.814045][ T5481] ? __this_cpu_preempt_check+0xf/0x10 [ 1051.819519][ T5481] tipc_connect+0x339/0x3d0 [ 1051.824322][ T5481] ? tipc_bind+0x190/0x190 [ 1051.828805][ T5481] __sys_connect+0x197/0x1b0 [ 1051.833456][ T5481] __x64_sys_connect+0x3d/0x50 [ 1051.838262][ T5481] do_syscall_64+0x2b/0x70 [ 1051.842705][ T5481] entry_SYSCALL_64_after_hwframe+0x63/0xcd [ 1051.848613][ T5481] RIP: 0033:0x7f8382d7c0c9 [ 1051.853046][ T5481] Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 f1 19 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 1051.872730][ T5481] RSP: 002b:00007f83820ef168 EFLAGS: 00000246 ORIG_RAX: 000000000000002a [ 1051.881231][ T5481] RAX: ffffffffffffffda RBX: 00007f8382e9bf80 RCX: 00007f8382d7c0c9 [ 1051.889223][ T5481] RDX: 0000000000000010 RSI: 0000000020000140 RDI: 0000000000000003 [ 1051.897212][ T5481] RBP: 00007f8382dd7ae9 R08: 0000000000000000 R09: 0000000000000000 [ 1051.905213][ T5481] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000 [ 1051.913265][ T5481] R13: 00007ffd3293d64f R14: 00007f83820ef300 R15: 0000000000022000 [ 1051.921286][ T5481] [ 1051.924320][ T5481] ---[ end trace 0000000000000000 ]--- [ 1051.947150][ T5480] EXT4-fs (loop1): mounted filesystem 00000000-0000-0000-0000-000000000000 without journal. Quota mode: none. [ 1051.972009][ T5480] ext4 filesystem being mounted at /root/syzkaller-testdir1539738704/syzkaller.ao1jj3/3833/bus supports timestamps until 2038 (0x7fffffff) [ 1052.021873][ T5480] loop1: detected capacity change from 2048 to 2047 [ 1052.040343][ T3128] EXT4-fs (loop1): unmounting filesystem 00000000-0000-0000-0000-000000000000. 12:22:23 executing program 5: r0 = socket$unix(0x1, 0x2, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f0000000100)={'vcan0\x00', 0x0}) r2 = socket$can_bcm(0x1d, 0x2, 0x2) connect$can_bcm(r2, &(0x7f0000000000), 0x10) ioctl$sock_kcm_SIOCKCMUNATTACH(0xffffffffffffffff, 0x89e1, 0xffffffffffffffff) ioctl$sock_SIOCSPGRP(0xffffffffffffffff, 0x8902, 0x0) sendmsg$can_bcm(r2, &(0x7f0000000480)={&(0x7f0000000340)={0x1d, r1, 0x3f420f00}, 0x10, &(0x7f0000000040)={&(0x7f0000000580)=ANY=[@ANYBLOB="01000000d7fe68ca0000e9ffffff0000", @ANYRES64=0x0, @ANYRES64=0x0, @ANYRES64=0x0, @ANYRES64=r0, @ANYBLOB="3bf81bb9f1"], 0x20000600}}, 0x0) r3 = socket(0x0, 0x800, 0x40000) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r3, 0x541b, &(0x7f00000000c0)={'ip6_vti0\x00', 0x0}) sendmsg$IPCTNL_MSG_EXP_DELETE(0xffffffffffffffff, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000440)={&(0x7f00000006c0)={0x1d0, 0x2, 0x2, 0x0, 0x0, 0x0, {0xa}, [@CTA_EXPECT_NAT={0xc0, 0xa, 0x0, 0x1, [@CTA_EXPECT_NAT_TUPLE={0xc, 0x2, 0x0, 0x1, [@CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x1}]}, @CTA_EXPECT_NAT_TUPLE={0x70, 0x2, 0x0, 0x1, [@CTA_TUPLE_IP={0x2c, 0x1, 0x0, 0x1, @ipv6={{0x14, 0x3, @loopback}, {0x14, 0x4, @private0}}}, @CTA_TUPLE_IP={0x14, 0x1, 0x0, 0x1, @ipv4={{0x8, 0x1, @empty}, {0x8, 0x2, @initdev={0xac, 0x1e, 0x1, 0x0}}}}, @CTA_TUPLE_IP={0x14, 0x1, 0x0, 0x1, @ipv4={{0x8, 0x1, @local}, {0x8, 0x2, @loopback}}}, @CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x4}, @CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x3}, @CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x1}]}, @CTA_EXPECT_NAT_TUPLE={0x38, 0x2, 0x0, 0x1, [@CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5, 0x1, 0x88}}, @CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x3}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5, 0x1, 0x21}}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5, 0x1, 0x1}}, @CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x3}]}, @CTA_EXPECT_NAT_DIR={0x8}]}, @CTA_EXPECT_MASTER={0x20, 0x1, 0x0, 0x1, [@CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x1}, @CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x2}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5, 0x1, 0x84}}]}, @CTA_EXPECT_MASTER={0xdc, 0x1, 0x0, 0x1, [@CTA_TUPLE_IP={0x14, 0x1, 0x0, 0x1, @ipv4={{0x8, 0x1, @multicast1}, {0x8, 0x2, @dev={0xac, 0x14, 0x14, 0x3a}}}}, @CTA_TUPLE_ZONE={0x6}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5, 0x1, 0x21}}, @CTA_TUPLE_IP={0x14, 0x1, 0x0, 0x1, @ipv4={{0x8, 0x1, @empty}, {0x8, 0x2, @local}}}, @CTA_TUPLE_IP={0x2c, 0x1, 0x0, 0x1, @ipv6={{0x14, 0x3, @private1={0xfc, 0x1, '\x00', 0x1}}, {0x14, 0x4, @rand_addr=' \x01\x00'}}}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5, 0x1, 0x1}}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5, 0x1, 0x88}}, @CTA_TUPLE_IP={0x2c, 0x1, 0x0, 0x1, @ipv6={{0x14, 0x3, @empty}, {0x14, 0x4, @dev={0xfe, 0x80, '\x00', 0x21}}}}, @CTA_TUPLE_IP={0x2c, 0x1, 0x0, 0x1, @ipv6={{0x14, 0x3, @local}, {0x14, 0x4, @ipv4={'\x00', '\xff\xff', @rand_addr=0x64010100}}}}]}]}, 0x1d0}}, 0x48000) perf_event_open(&(0x7f0000000500)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x15, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$binfmt_elf32(0xffffffffffffffff, &(0x7f0000000040)=ANY=[], 0x69) connect$can_bcm(0xffffffffffffffff, &(0x7f0000000000), 0x10) sendmsg$can_bcm(0xffffffffffffffff, &(0x7f0000000480)={&(0x7f0000000340)={0x1d, 0x0, 0x3f420f00}, 0x10, &(0x7f0000000040)={&(0x7f0000000580)=ANY=[@ANYBLOB="01000000d7fe68ca0000e9ffffff0000", @ANYRES64=0x0, @ANYRES64=0x0, @ANYRES64=0x0, @ANYRES64], 0x20000600}}, 0x0) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(0xffffffffffffffff, 0x89f0, &(0x7f0000000280)={'gretap0\x00', &(0x7f0000000240)={'ip_vti0\x00', 0x0, 0x7, 0x80, 0xfffffff7, 0x7, {{0x8, 0x4, 0x0, 0x5, 0x20, 0x67, 0x0, 0xc0, 0x29, 0x0, @local, @empty, {[@timestamp={0x44, 0xc, 0x8, 0x0, 0x2, [0x7f, 0x1]}]}}}}}) socket(0x10, 0x3, 0x0) process_mrelease(0xffffffffffffffff, 0x0) r4 = socket$packet(0x11, 0x2, 0x300) ioctl$sock_SIOCGIFINDEX(r4, 0x8933, 0x0) getsockopt$inet_sctp_SCTP_RECVNXTINFO(r3, 0x84, 0x21, &(0x7f0000000140), &(0x7f0000000200)=0x4) bind$unix(r0, &(0x7f00000005c0)=@abs={0x1, 0x0, 0x4e23}, 0x6e) syz_clone(0x40000000, &(0x7f00000000c0), 0x0, 0x0, &(0x7f00000001c0), 0x0) 12:22:23 executing program 3: r0 = socket$igmp(0x2, 0x3, 0x2) setsockopt$MRT_DEL_VIF(r0, 0x0, 0xcb, &(0x7f0000000480)={0x0, 0x0, 0x0, 0x0, @vifc_lcl_ifindex, @loopback}, 0x10) r1 = socket$igmp(0x2, 0x3, 0x2) setsockopt$MRT_ADD_VIF(r1, 0x0, 0xca, &(0x7f00000001c0)={0x0, 0x1, 0x0, 0x0, @vifc_lcl_addr=@remote, @local}, 0x10) 12:22:23 executing program 0: pselect6(0x0, 0x0, 0x0, 0x0, &(0x7f0000000680), &(0x7f0000000700)={&(0x7f00000006c0), 0x8}) 12:22:23 executing program 2: open(&(0x7f0000000400)='./bus\x00', 0x14103e, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$L2TP_CMD_SESSION_MODIFY(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000080)={0x30, r1, 0x1, 0x0, 0x0, {}, [@L2TP_ATTR_SEND_SEQ={0x5}, @L2TP_ATTR_IFNAME={0x14, 0x8, 'veth1_to_hsr\x00'}]}, 0x30}, 0x1, 0x0, 0x3}, 0x0) 12:22:23 executing program 4: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x82, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket(0x10, 0x803, 0x0) sendto(r0, &(0x7f00000000c0)="120000001200e7ef007b00000000000000a1", 0x12, 0x0, 0x0, 0x0) recvmmsg(r0, &(0x7f00000037c0)=[{{&(0x7f00000004c0)=@ethernet={0x0, @random}, 0x80, &(0x7f0000000380)=[{&(0x7f0000000040)=""/95, 0x5f}, {&(0x7f0000000140)=""/85, 0x55}, {&(0x7f0000000fc0)=""/4096, 0x1000}, {&(0x7f0000000400)=""/106, 0x6a}, {&(0x7f0000000740)=""/73, 0x49}, {&(0x7f0000000200)=""/77, 0x4d}, {0x0}], 0x7, &(0x7f0000000600)=""/191, 0xbf}}], 0xd, 0x0, &(0x7f0000003700)={0x77359400}) 12:22:23 executing program 1: syz_mount_image$ext4(&(0x7f0000000740)='ext4\x00', &(0x7f0000000100)='./bus\x00', 0x804810, &(0x7f0000000180)=ANY=[@ANYBLOB="0061021d307a961da7401271e3fa98008000001d3902ccfd562158cb15c016093893c9e4abd02bc4f1492514fa2dfebc8001000080000000008a1049ca0000"], 0x1, 0x73b, &(0x7f0000000780)="$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") chdir(&(0x7f0000000080)='./file0\x00') open(&(0x7f00000000c0)='./bus\x00', 0x14da42, 0x0) mount(&(0x7f0000000380)=@loop={'/dev/loop', 0x0}, &(0x7f00000003c0)='./bus\x00', 0x0, 0x1000, 0x0) r0 = open(&(0x7f0000000400)='./bus\x00', 0x0, 0x0) ioctl$LOOP_SET_STATUS(r0, 0x4c02, &(0x7f00000001c0)={0x0, {}, 0x0, {}, 0xff, 0x0, 0x0, 0x0, "be8176c9e6755a48a3c0230dd390efe12f8306bed95b2afd402aae879978d959ff9009eec610d9108ea036456bb79e26ee42d0a34968c1fdbb33e8ad5860f632", "b948757aa008fae13adca739a9f126462ab528ea52e90ce2cf50a4ef2568375b"}) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='blkio.throttle.io_service_bytes\x00', 0x275a, 0xba00000000000000) 12:22:23 executing program 0: pipe2$9p(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$P9_RWRITE(r0, 0x0, 0x0) 12:22:23 executing program 2: open(&(0x7f0000000400)='./bus\x00', 0x14103e, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$L2TP_CMD_SESSION_MODIFY(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000080)={0x30, r1, 0x1, 0x0, 0x0, {}, [@L2TP_ATTR_SEND_SEQ={0x5}, @L2TP_ATTR_IFNAME={0x14, 0x8, 'veth1_to_hsr\x00'}]}, 0x30}, 0x1, 0x0, 0x4}, 0x0) 12:22:23 executing program 3: pselect6(0x40, &(0x7f0000000000), 0x0, &(0x7f0000000080)={0x7}, &(0x7f0000000100)={0x0, 0x989680}, 0x0) 12:22:23 executing program 0: r0 = openat$sndtimer(0xffffffffffffff9c, &(0x7f0000000240), 0x0) ioctl$SNDRV_TIMER_IOCTL_INFO(r0, 0x80e85411, 0x0) 12:22:23 executing program 4: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x82, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket(0x10, 0x803, 0x0) sendto(r0, &(0x7f00000000c0)="120000001200e7ef007b00000000000000a1", 0x12, 0x0, 0x0, 0x0) recvmmsg(r0, &(0x7f00000037c0)=[{{&(0x7f00000004c0)=@ethernet={0x0, @random}, 0x80, &(0x7f0000000380)=[{&(0x7f0000000040)=""/95, 0x5f}, {&(0x7f0000000140)=""/85, 0x55}, {&(0x7f0000000fc0)=""/4096, 0x1000}, {&(0x7f0000000400)=""/106, 0x6a}, {&(0x7f0000000740)=""/73, 0x49}, {&(0x7f0000000200)=""/77, 0x4d}, {0x0}], 0x7, &(0x7f0000000600)=""/191, 0xbf}}], 0x1, 0x2, &(0x7f0000003700)={0x77359400}) 12:22:23 executing program 2: open(&(0x7f0000000400)='./bus\x00', 0x14103e, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$L2TP_CMD_SESSION_MODIFY(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000080)={0x30, r1, 0x1, 0x0, 0x0, {}, [@L2TP_ATTR_SEND_SEQ={0x5}, @L2TP_ATTR_IFNAME={0x14, 0x8, 'veth1_to_hsr\x00'}]}, 0x30}, 0x1, 0x0, 0x5}, 0x0) [ 1052.260701][ T5525] loop1: detected capacity change from 0 to 2048 [ 1052.306515][ T5525] EXT4-fs (loop1): mounted filesystem 00000000-0000-0000-0000-000000000000 without journal. Quota mode: none. [ 1052.335152][ T5525] ext4 filesystem being mounted at /root/syzkaller-testdir1539738704/syzkaller.ao1jj3/3834/bus supports timestamps until 2038 (0x7fffffff) [ 1052.401831][ T5525] loop1: detected capacity change from 2048 to 2047 [ 1052.423436][ T3128] EXT4-fs (loop1): unmounting filesystem 00000000-0000-0000-0000-000000000000. 12:22:24 executing program 5: r0 = socket$unix(0x1, 0x2, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f0000000100)={'vcan0\x00', 0x0}) r2 = socket$can_bcm(0x1d, 0x2, 0x2) connect$can_bcm(r2, &(0x7f0000000000), 0x10) ioctl$sock_kcm_SIOCKCMUNATTACH(0xffffffffffffffff, 0x89e1, 0xffffffffffffffff) ioctl$sock_SIOCSPGRP(0xffffffffffffffff, 0x8902, 0x0) sendmsg$can_bcm(r2, &(0x7f0000000480)={&(0x7f0000000340)={0x1d, r1, 0x3f420f00}, 0x10, &(0x7f0000000040)={&(0x7f0000000580)=ANY=[@ANYBLOB="01000000d7fe68ca0000e9ffffff0000", @ANYRES64=0x0, @ANYRES64=0x0, @ANYRES64=0x0, @ANYRES64=r0, @ANYBLOB="3bf81bb9f1"], 0x20000600}}, 0x0) r3 = socket(0x0, 0x800, 0x40000) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r3, 0x541b, &(0x7f00000000c0)={'ip6_vti0\x00', 0x0}) sendmsg$IPCTNL_MSG_EXP_DELETE(0xffffffffffffffff, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000440)={&(0x7f00000006c0)={0x1d0, 0x2, 0x2, 0x0, 0x0, 0x0, {0xa}, [@CTA_EXPECT_NAT={0xc0, 0xa, 0x0, 0x1, [@CTA_EXPECT_NAT_TUPLE={0xc, 0x2, 0x0, 0x1, [@CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x1}]}, @CTA_EXPECT_NAT_TUPLE={0x70, 0x2, 0x0, 0x1, [@CTA_TUPLE_IP={0x2c, 0x1, 0x0, 0x1, @ipv6={{0x14, 0x3, @loopback}, {0x14, 0x4, @private0}}}, @CTA_TUPLE_IP={0x14, 0x1, 0x0, 0x1, @ipv4={{0x8, 0x1, @empty}, {0x8, 0x2, @initdev={0xac, 0x1e, 0x1, 0x0}}}}, @CTA_TUPLE_IP={0x14, 0x1, 0x0, 0x1, @ipv4={{0x8, 0x1, @local}, {0x8, 0x2, @loopback}}}, @CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x4}, @CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x3}, @CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x1}]}, @CTA_EXPECT_NAT_TUPLE={0x38, 0x2, 0x0, 0x1, [@CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5, 0x1, 0x88}}, @CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x3}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5, 0x1, 0x21}}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5, 0x1, 0x1}}, @CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x3}]}, @CTA_EXPECT_NAT_DIR={0x8}]}, @CTA_EXPECT_MASTER={0x20, 0x1, 0x0, 0x1, [@CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x1}, @CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x2}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5, 0x1, 0x84}}]}, @CTA_EXPECT_MASTER={0xdc, 0x1, 0x0, 0x1, [@CTA_TUPLE_IP={0x14, 0x1, 0x0, 0x1, @ipv4={{0x8, 0x1, @multicast1}, {0x8, 0x2, @dev={0xac, 0x14, 0x14, 0x3a}}}}, @CTA_TUPLE_ZONE={0x6}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5, 0x1, 0x21}}, @CTA_TUPLE_IP={0x14, 0x1, 0x0, 0x1, @ipv4={{0x8, 0x1, @empty}, {0x8, 0x2, @local}}}, @CTA_TUPLE_IP={0x2c, 0x1, 0x0, 0x1, @ipv6={{0x14, 0x3, @private1={0xfc, 0x1, '\x00', 0x1}}, {0x14, 0x4, @rand_addr=' \x01\x00'}}}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5, 0x1, 0x1}}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5, 0x1, 0x88}}, @CTA_TUPLE_IP={0x2c, 0x1, 0x0, 0x1, @ipv6={{0x14, 0x3, @empty}, {0x14, 0x4, @dev={0xfe, 0x80, '\x00', 0x21}}}}, @CTA_TUPLE_IP={0x2c, 0x1, 0x0, 0x1, @ipv6={{0x14, 0x3, @local}, {0x14, 0x4, @ipv4={'\x00', '\xff\xff', @rand_addr=0x64010100}}}}]}]}, 0x1d0}}, 0x48000) perf_event_open(&(0x7f0000000500)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x15, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$binfmt_elf32(0xffffffffffffffff, &(0x7f0000000040)=ANY=[], 0x69) connect$can_bcm(0xffffffffffffffff, &(0x7f0000000000), 0x10) sendmsg$can_bcm(0xffffffffffffffff, &(0x7f0000000480)={&(0x7f0000000340)={0x1d, 0x0, 0x3f420f00}, 0x10, &(0x7f0000000040)={&(0x7f0000000580)=ANY=[@ANYBLOB="01000000d7fe68ca0000e9ffffff0000", @ANYRES64=0x0, @ANYRES64=0x0, @ANYRES64=0x0, @ANYRES64], 0x20000600}}, 0x0) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(0xffffffffffffffff, 0x89f0, &(0x7f0000000280)={'gretap0\x00', &(0x7f0000000240)={'ip_vti0\x00', 0x0, 0x7, 0x80, 0xfffffff7, 0x7, {{0x8, 0x4, 0x0, 0x5, 0x20, 0x67, 0x0, 0xc0, 0x29, 0x0, @local, @empty, {[@timestamp={0x44, 0xc, 0x8, 0x0, 0x2, [0x7f, 0x1]}]}}}}}) socket(0x10, 0x3, 0x0) process_mrelease(0xffffffffffffffff, 0x0) r4 = socket$packet(0x11, 0x2, 0x300) ioctl$sock_SIOCGIFINDEX(r4, 0x8933, 0x0) getsockopt$inet_sctp_SCTP_RECVNXTINFO(r3, 0x84, 0x21, &(0x7f0000000140), &(0x7f0000000200)=0x4) bind$unix(r0, &(0x7f00000005c0)=@abs={0x1, 0x0, 0x4e23}, 0x6e) syz_clone(0x40000000, &(0x7f00000000c0), 0x0, 0x0, &(0x7f00000001c0), 0x0) 12:22:24 executing program 3: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_PARTIAL_DELIVERY_POINT(r0, 0x84, 0x13, &(0x7f0000000080)=0x80000000, 0x4) 12:22:24 executing program 2: open(&(0x7f0000000400)='./bus\x00', 0x14103e, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$L2TP_CMD_SESSION_MODIFY(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000080)={0x30, r1, 0x1, 0x0, 0x0, {}, [@L2TP_ATTR_SEND_SEQ={0x5}, @L2TP_ATTR_IFNAME={0x14, 0x8, 'veth1_to_hsr\x00'}]}, 0x30}, 0x1, 0x0, 0x6}, 0x0) 12:22:24 executing program 0: syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000140)='y') 12:22:24 executing program 4: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x82, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket(0x10, 0x803, 0x0) sendto(r0, &(0x7f00000000c0)="120000001200e7ef007b00000000000000a1", 0x12, 0x0, 0x0, 0x0) recvmmsg(r0, &(0x7f00000037c0)=[{{&(0x7f00000004c0)=@ethernet={0x0, @random}, 0x80, &(0x7f0000000380)=[{&(0x7f0000000040)=""/95, 0x5f}, {&(0x7f0000000140)=""/85, 0x55}, {&(0x7f0000000fc0)=""/4096, 0x1000}, {&(0x7f0000000400)=""/106, 0x6a}, {&(0x7f0000000740)=""/73, 0x49}, {&(0x7f0000000200)=""/77, 0x4d}, {0x0}], 0x7, &(0x7f0000000600)=""/191, 0xbf}}], 0x1, 0x3, &(0x7f0000003700)={0x77359400}) 12:22:24 executing program 1: syz_mount_image$ext4(&(0x7f0000000740)='ext4\x00', &(0x7f0000000100)='./bus\x00', 0x804810, &(0x7f0000000180)=ANY=[@ANYBLOB="0061021d307a961da7401271e3fa98008000001d3902ccfd562158cb15c016093893c9e4abd02bc4f1492514fa2dfebc8001000080000000008a1049ca0000"], 0x1, 0x73b, &(0x7f0000000780)="$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") chdir(&(0x7f0000000080)='./file0\x00') open(&(0x7f00000000c0)='./bus\x00', 0x14da42, 0x0) mount(&(0x7f0000000380)=@loop={'/dev/loop', 0x0}, &(0x7f00000003c0)='./bus\x00', 0x0, 0x1000, 0x0) r0 = open(&(0x7f0000000400)='./bus\x00', 0x0, 0x0) ioctl$LOOP_SET_STATUS(r0, 0x4c02, &(0x7f00000001c0)={0x0, {}, 0x0, {}, 0xff, 0x0, 0x0, 0x0, "be8176c9e6755a48a3c0230dd390efe12f8306bed95b2afd402aae879978d959ff9009eec610d9108ea036456bb79e26ee42d0a34968c1fdbb33e8ad5860f632", "b948757aa008fae13adca739a9f126462ab528ea52e90ce2cf50a4ef2568375b"}) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='blkio.throttle.io_service_bytes\x00', 0x275a, 0xda0d000000000000) 12:22:24 executing program 3: pselect6(0x40, &(0x7f0000000040), &(0x7f0000000080)={0xa7}, 0x0, 0x0, 0x0) 12:22:24 executing program 0: socket$packet(0x11, 0x3, 0x300) r0 = socket$igmp(0x2, 0x3, 0x2) setsockopt$MRT_DEL_VIF(r0, 0x0, 0xcb, &(0x7f0000000480)={0x0, 0x0, 0x0, 0x0, @vifc_lcl_ifindex, @loopback}, 0x10) setsockopt$MRT_ADD_VIF(r0, 0x0, 0xca, &(0x7f0000000200)={0x0, 0x4, 0x0, 0x0, @vifc_lcl_ifindex, @multicast1}, 0x10) 12:22:24 executing program 4: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x82, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket(0x10, 0x803, 0x0) sendto(r0, &(0x7f00000000c0)="120000001200e7ef007b00000000000000a1", 0x12, 0x0, 0x0, 0x0) recvmmsg(r0, &(0x7f00000037c0)=[{{&(0x7f00000004c0)=@ethernet={0x0, @random}, 0x80, &(0x7f0000000380)=[{&(0x7f0000000040)=""/95, 0x5f}, {&(0x7f0000000140)=""/85, 0x55}, {&(0x7f0000000fc0)=""/4096, 0x1000}, {&(0x7f0000000400)=""/106, 0x6a}, {&(0x7f0000000740)=""/73, 0x49}, {&(0x7f0000000200)=""/77, 0x4d}, {0x0}], 0x7, &(0x7f0000000600)=""/191, 0xbf}}], 0x1, 0x4, &(0x7f0000003700)={0x77359400}) 12:22:24 executing program 2: open(&(0x7f0000000400)='./bus\x00', 0x14103e, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$L2TP_CMD_SESSION_MODIFY(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000080)={0x30, r1, 0x1, 0x0, 0x0, {}, [@L2TP_ATTR_SEND_SEQ={0x5}, @L2TP_ATTR_IFNAME={0x14, 0x8, 'veth1_to_hsr\x00'}]}, 0x30}, 0x1, 0x0, 0x7}, 0x0) [ 1052.840879][ T5537] loop1: detected capacity change from 0 to 2048 12:22:24 executing program 4: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x82, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket(0x10, 0x803, 0x0) sendto(r0, &(0x7f00000000c0)="120000001200e7ef007b00000000000000a1", 0x12, 0x0, 0x0, 0x0) recvmmsg(r0, &(0x7f00000037c0)=[{{&(0x7f00000004c0)=@ethernet={0x0, @random}, 0x80, &(0x7f0000000380)=[{&(0x7f0000000040)=""/95, 0x5f}, {&(0x7f0000000140)=""/85, 0x55}, {&(0x7f0000000fc0)=""/4096, 0x1000}, {&(0x7f0000000400)=""/106, 0x6a}, {&(0x7f0000000740)=""/73, 0x49}, {&(0x7f0000000200)=""/77, 0x4d}, {0x0}], 0x7, &(0x7f0000000600)=""/191, 0xbf}}], 0x1, 0x5, &(0x7f0000003700)={0x77359400}) 12:22:24 executing program 3: request_key(&(0x7f0000002080)='dns_resolver\x00', 0x0, 0x0, 0xfffffffffffffffb) [ 1052.940444][ T5537] EXT4-fs (loop1): mounted filesystem 00000000-0000-0000-0000-000000000000 without journal. Quota mode: none. [ 1052.962837][ T5537] ext4 filesystem being mounted at /root/syzkaller-testdir1539738704/syzkaller.ao1jj3/3835/bus supports timestamps until 2038 (0x7fffffff) [ 1053.145760][ T5537] loop1: detected capacity change from 2048 to 2047 [ 1053.174328][ T3128] EXT4-fs (loop1): unmounting filesystem 00000000-0000-0000-0000-000000000000. 12:22:24 executing program 5: r0 = socket$unix(0x1, 0x2, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f0000000100)={'vcan0\x00', 0x0}) r2 = socket$can_bcm(0x1d, 0x2, 0x2) connect$can_bcm(r2, &(0x7f0000000000), 0x10) ioctl$sock_kcm_SIOCKCMUNATTACH(0xffffffffffffffff, 0x89e1, 0xffffffffffffffff) ioctl$sock_SIOCSPGRP(0xffffffffffffffff, 0x8902, 0x0) sendmsg$can_bcm(r2, &(0x7f0000000480)={&(0x7f0000000340)={0x1d, r1, 0x3f420f00}, 0x10, &(0x7f0000000040)={&(0x7f0000000580)=ANY=[@ANYBLOB="01000000d7fe68ca0000e9ffffff0000", @ANYRES64=0x0, @ANYRES64=0x0, @ANYRES64=0x0, @ANYRES64=r0, @ANYBLOB="3bf81bb9f1"], 0x20000600}}, 0x0) r3 = socket(0x0, 0x800, 0x40000) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r3, 0x541b, &(0x7f00000000c0)={'ip6_vti0\x00', 0x0}) sendmsg$IPCTNL_MSG_EXP_DELETE(0xffffffffffffffff, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000440)={&(0x7f00000006c0)={0x1d0, 0x2, 0x2, 0x201, 0x0, 0x0, {}, [@CTA_EXPECT_NAT={0xc0, 0xa, 0x0, 0x1, [@CTA_EXPECT_NAT_TUPLE={0xc, 0x2, 0x0, 0x1, [@CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x1}]}, @CTA_EXPECT_NAT_TUPLE={0x70, 0x2, 0x0, 0x1, [@CTA_TUPLE_IP={0x2c, 0x1, 0x0, 0x1, @ipv6={{0x14, 0x3, @loopback}, {0x14, 0x4, @private0}}}, @CTA_TUPLE_IP={0x14, 0x1, 0x0, 0x1, @ipv4={{0x8, 0x1, @empty}, {0x8, 0x2, @initdev={0xac, 0x1e, 0x1, 0x0}}}}, @CTA_TUPLE_IP={0x14, 0x1, 0x0, 0x1, @ipv4={{0x8, 0x1, @local}, {0x8, 0x2, @loopback}}}, @CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x4}, @CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x3}, @CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x1}]}, @CTA_EXPECT_NAT_TUPLE={0x38, 0x2, 0x0, 0x1, [@CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5, 0x1, 0x88}}, @CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x3}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5, 0x1, 0x21}}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5, 0x1, 0x1}}, @CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x3}]}, @CTA_EXPECT_NAT_DIR={0x8}]}, @CTA_EXPECT_MASTER={0x20, 0x1, 0x0, 0x1, [@CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x1}, @CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x2}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5, 0x1, 0x84}}]}, @CTA_EXPECT_MASTER={0xdc, 0x1, 0x0, 0x1, [@CTA_TUPLE_IP={0x14, 0x1, 0x0, 0x1, @ipv4={{0x8, 0x1, @multicast1}, {0x8, 0x2, @dev={0xac, 0x14, 0x14, 0x3a}}}}, @CTA_TUPLE_ZONE={0x6}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5, 0x1, 0x21}}, @CTA_TUPLE_IP={0x14, 0x1, 0x0, 0x1, @ipv4={{0x8, 0x1, @empty}, {0x8, 0x2, @local}}}, @CTA_TUPLE_IP={0x2c, 0x1, 0x0, 0x1, @ipv6={{0x14, 0x3, @private1={0xfc, 0x1, '\x00', 0x1}}, {0x14, 0x4, @rand_addr=' \x01\x00'}}}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5, 0x1, 0x1}}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5, 0x1, 0x88}}, @CTA_TUPLE_IP={0x2c, 0x1, 0x0, 0x1, @ipv6={{0x14, 0x3, @empty}, {0x14, 0x4, @dev={0xfe, 0x80, '\x00', 0x21}}}}, @CTA_TUPLE_IP={0x2c, 0x1, 0x0, 0x1, @ipv6={{0x14, 0x3, @local}, {0x14, 0x4, @ipv4={'\x00', '\xff\xff', @rand_addr=0x64010100}}}}]}]}, 0x1d0}}, 0x48000) perf_event_open(&(0x7f0000000500)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x15, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$binfmt_elf32(0xffffffffffffffff, &(0x7f0000000040)=ANY=[], 0x69) connect$can_bcm(0xffffffffffffffff, &(0x7f0000000000), 0x10) sendmsg$can_bcm(0xffffffffffffffff, &(0x7f0000000480)={&(0x7f0000000340)={0x1d, 0x0, 0x3f420f00}, 0x10, &(0x7f0000000040)={&(0x7f0000000580)=ANY=[@ANYBLOB="01000000d7fe68ca0000e9ffffff0000", @ANYRES64=0x0, @ANYRES64=0x0, @ANYRES64=0x0, @ANYRES64], 0x20000600}}, 0x0) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(0xffffffffffffffff, 0x89f0, &(0x7f0000000280)={'gretap0\x00', &(0x7f0000000240)={'ip_vti0\x00', 0x0, 0x7, 0x80, 0xfffffff7, 0x7, {{0x8, 0x4, 0x0, 0x5, 0x20, 0x67, 0x0, 0xc0, 0x29, 0x0, @local, @empty, {[@timestamp={0x44, 0xc, 0x8, 0x0, 0x2, [0x7f, 0x1]}]}}}}}) socket(0x10, 0x3, 0x0) process_mrelease(0xffffffffffffffff, 0x0) r4 = socket$packet(0x11, 0x2, 0x300) ioctl$sock_SIOCGIFINDEX(r4, 0x8933, 0x0) getsockopt$inet_sctp_SCTP_RECVNXTINFO(r3, 0x84, 0x21, &(0x7f0000000140), &(0x7f0000000200)=0x4) bind$unix(r0, &(0x7f00000005c0)=@abs={0x1, 0x0, 0x4e23}, 0x6e) syz_clone(0x40000000, &(0x7f00000000c0), 0x0, 0x0, &(0x7f00000001c0), 0x0) 12:22:24 executing program 2: open(&(0x7f0000000400)='./bus\x00', 0x14103e, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$L2TP_CMD_SESSION_MODIFY(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000080)={0x30, r1, 0x1, 0x0, 0x0, {}, [@L2TP_ATTR_SEND_SEQ={0x5}, @L2TP_ATTR_IFNAME={0x14, 0x8, 'veth1_to_hsr\x00'}]}, 0x30}, 0x1, 0x0, 0x8}, 0x0) 12:22:24 executing program 4: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x82, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket(0x10, 0x803, 0x0) sendto(r0, &(0x7f00000000c0)="120000001200e7ef007b00000000000000a1", 0x12, 0x0, 0x0, 0x0) recvmmsg(r0, &(0x7f00000037c0)=[{{&(0x7f00000004c0)=@ethernet={0x0, @random}, 0x80, &(0x7f0000000380)=[{&(0x7f0000000040)=""/95, 0x5f}, {&(0x7f0000000140)=""/85, 0x55}, {&(0x7f0000000fc0)=""/4096, 0x1000}, {&(0x7f0000000400)=""/106, 0x6a}, {&(0x7f0000000740)=""/73, 0x49}, {&(0x7f0000000200)=""/77, 0x4d}, {0x0}], 0x7, &(0x7f0000000600)=""/191, 0xbf}}], 0x1, 0x6, &(0x7f0000003700)={0x77359400}) 12:22:24 executing program 3: openat$rfkill(0xffffffffffffff9c, 0x0, 0x0, 0x0) 12:22:24 executing program 0: add_key$keyring(&(0x7f0000000240), &(0x7f0000000280)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffd) 12:22:24 executing program 1: syz_mount_image$ext4(&(0x7f0000000740)='ext4\x00', &(0x7f0000000100)='./bus\x00', 0x804810, &(0x7f0000000180)=ANY=[@ANYBLOB="0061021d307a961da7401271e3fa98008000001d3902ccfd562158cb15c016093893c9e4abd02bc4f1492514fa2dfebc8001000080000000008a1049ca0000"], 0x1, 0x73b, &(0x7f0000000780)="$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") chdir(&(0x7f0000000080)='./file0\x00') open(&(0x7f00000000c0)='./bus\x00', 0x14da42, 0x0) mount(&(0x7f0000000380)=@loop={'/dev/loop', 0x0}, &(0x7f00000003c0)='./bus\x00', 0x0, 0x1000, 0x0) r0 = open(&(0x7f0000000400)='./bus\x00', 0x0, 0x0) ioctl$LOOP_SET_STATUS(r0, 0x4c02, &(0x7f00000001c0)={0x0, {}, 0x0, {}, 0xff, 0x0, 0x0, 0x0, "be8176c9e6755a48a3c0230dd390efe12f8306bed95b2afd402aae879978d959ff9009eec610d9108ea036456bb79e26ee42d0a34968c1fdbb33e8ad5860f632", "b948757aa008fae13adca739a9f126462ab528ea52e90ce2cf50a4ef2568375b"}) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='blkio.throttle.io_service_bytes\x00', 0x275a, 0xdc12000000000000) 12:22:24 executing program 3: r0 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_ipv6_tunnel_SIOCCHGTUNNEL(r0, 0x89f3, &(0x7f0000000140)={'syztnl0\x00', 0x0}) 12:22:24 executing program 2: open(&(0x7f0000000400)='./bus\x00', 0x14103e, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$L2TP_CMD_SESSION_MODIFY(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000080)={0x30, r1, 0x1, 0x0, 0x0, {}, [@L2TP_ATTR_SEND_SEQ={0x5}, @L2TP_ATTR_IFNAME={0x14, 0x8, 'veth1_to_hsr\x00'}]}, 0x30}, 0x1, 0x0, 0x9}, 0x0) 12:22:24 executing program 0: syz_open_dev$evdev(0xfffffffffffffffd, 0x0, 0x0) 12:22:24 executing program 4: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x82, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket(0x10, 0x803, 0x0) sendto(r0, &(0x7f00000000c0)="120000001200e7ef007b00000000000000a1", 0x12, 0x0, 0x0, 0x0) recvmmsg(r0, &(0x7f00000037c0)=[{{&(0x7f00000004c0)=@ethernet={0x0, @random}, 0x80, &(0x7f0000000380)=[{&(0x7f0000000040)=""/95, 0x5f}, {&(0x7f0000000140)=""/85, 0x55}, {&(0x7f0000000fc0)=""/4096, 0x1000}, {&(0x7f0000000400)=""/106, 0x6a}, {&(0x7f0000000740)=""/73, 0x49}, {&(0x7f0000000200)=""/77, 0x4d}, {0x0}], 0x7, &(0x7f0000000600)=""/191, 0xbf}}], 0x1, 0x8, &(0x7f0000003700)={0x77359400}) 12:22:24 executing program 2: open(&(0x7f0000000400)='./bus\x00', 0x14103e, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$L2TP_CMD_SESSION_MODIFY(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000080)={0x30, r1, 0x1, 0x0, 0x0, {}, [@L2TP_ATTR_SEND_SEQ={0x5}, @L2TP_ATTR_IFNAME={0x14, 0x8, 'veth1_to_hsr\x00'}]}, 0x30}, 0x1, 0x0, 0xf}, 0x0) 12:22:24 executing program 0: request_key(&(0x7f0000000080)='dns_resolver\x00', &(0x7f00000000c0)={'syz', 0x1}, 0x0, 0xfffffffffffffffb) [ 1053.396452][ T5569] loop1: detected capacity change from 0 to 2048 [ 1053.462049][ T5569] EXT4-fs (loop1): mounted filesystem 00000000-0000-0000-0000-000000000000 without journal. Quota mode: none. [ 1053.505195][ T5569] ext4 filesystem being mounted at /root/syzkaller-testdir1539738704/syzkaller.ao1jj3/3836/bus supports timestamps until 2038 (0x7fffffff) [ 1053.571938][ T5569] loop1: detected capacity change from 2048 to 2047 [ 1053.601256][ T3128] EXT4-fs (loop1): unmounting filesystem 00000000-0000-0000-0000-000000000000. 12:22:25 executing program 5: r0 = socket$unix(0x1, 0x2, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f0000000100)={'vcan0\x00', 0x0}) r2 = socket$can_bcm(0x1d, 0x2, 0x2) connect$can_bcm(r2, &(0x7f0000000000), 0x10) ioctl$sock_kcm_SIOCKCMUNATTACH(0xffffffffffffffff, 0x89e1, 0xffffffffffffffff) ioctl$sock_SIOCSPGRP(0xffffffffffffffff, 0x8902, 0x0) sendmsg$can_bcm(r2, &(0x7f0000000480)={&(0x7f0000000340)={0x1d, r1, 0x3f420f00}, 0x10, &(0x7f0000000040)={&(0x7f0000000580)=ANY=[@ANYBLOB="01000000d7fe68ca0000e9ffffff0000", @ANYRES64=0x0, @ANYRES64=0x0, @ANYRES64=0x0, @ANYRES64=r0, @ANYBLOB="3bf81bb9f1"], 0x20000600}}, 0x0) r3 = socket(0x0, 0x800, 0x40000) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r3, 0x541b, &(0x7f00000000c0)={'ip6_vti0\x00', 0x0}) sendmsg$IPCTNL_MSG_EXP_DELETE(0xffffffffffffffff, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000440)={&(0x7f00000006c0)={0x1d0, 0x2, 0x2, 0x201, 0x0, 0x0, {}, [@CTA_EXPECT_NAT={0xc0, 0xa, 0x0, 0x1, [@CTA_EXPECT_NAT_TUPLE={0xc, 0x2, 0x0, 0x1, [@CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x1}]}, @CTA_EXPECT_NAT_TUPLE={0x70, 0x2, 0x0, 0x1, [@CTA_TUPLE_IP={0x2c, 0x1, 0x0, 0x1, @ipv6={{0x14, 0x3, @loopback}, {0x14, 0x4, @private0}}}, @CTA_TUPLE_IP={0x14, 0x1, 0x0, 0x1, @ipv4={{0x8, 0x1, @empty}, {0x8, 0x2, @initdev={0xac, 0x1e, 0x1, 0x0}}}}, @CTA_TUPLE_IP={0x14, 0x1, 0x0, 0x1, @ipv4={{0x8, 0x1, @local}, {0x8, 0x2, @loopback}}}, @CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x4}, @CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x3}, @CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x1}]}, @CTA_EXPECT_NAT_TUPLE={0x38, 0x2, 0x0, 0x1, [@CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5, 0x1, 0x88}}, @CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x3}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5, 0x1, 0x21}}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5, 0x1, 0x1}}, @CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x3}]}, @CTA_EXPECT_NAT_DIR={0x8}]}, @CTA_EXPECT_MASTER={0x20, 0x1, 0x0, 0x1, [@CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x1}, @CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x2}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5, 0x1, 0x84}}]}, @CTA_EXPECT_MASTER={0xdc, 0x1, 0x0, 0x1, [@CTA_TUPLE_IP={0x14, 0x1, 0x0, 0x1, @ipv4={{0x8, 0x1, @multicast1}, {0x8, 0x2, @dev={0xac, 0x14, 0x14, 0x3a}}}}, @CTA_TUPLE_ZONE={0x6}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5, 0x1, 0x21}}, @CTA_TUPLE_IP={0x14, 0x1, 0x0, 0x1, @ipv4={{0x8, 0x1, @empty}, {0x8, 0x2, @local}}}, @CTA_TUPLE_IP={0x2c, 0x1, 0x0, 0x1, @ipv6={{0x14, 0x3, @private1={0xfc, 0x1, '\x00', 0x1}}, {0x14, 0x4, @rand_addr=' \x01\x00'}}}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5, 0x1, 0x1}}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5, 0x1, 0x88}}, @CTA_TUPLE_IP={0x2c, 0x1, 0x0, 0x1, @ipv6={{0x14, 0x3, @empty}, {0x14, 0x4, @dev={0xfe, 0x80, '\x00', 0x21}}}}, @CTA_TUPLE_IP={0x2c, 0x1, 0x0, 0x1, @ipv6={{0x14, 0x3, @local}, {0x14, 0x4, @ipv4={'\x00', '\xff\xff', @rand_addr=0x64010100}}}}]}]}, 0x1d0}}, 0x48000) perf_event_open(&(0x7f0000000500)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x15, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$binfmt_elf32(0xffffffffffffffff, &(0x7f0000000040)=ANY=[], 0x69) connect$can_bcm(0xffffffffffffffff, &(0x7f0000000000), 0x10) sendmsg$can_bcm(0xffffffffffffffff, &(0x7f0000000480)={&(0x7f0000000340)={0x1d, 0x0, 0x3f420f00}, 0x10, &(0x7f0000000040)={&(0x7f0000000580)=ANY=[@ANYBLOB="01000000d7fe68ca0000e9ffffff0000", @ANYRES64=0x0, @ANYRES64=0x0, @ANYRES64=0x0, @ANYRES64], 0x20000600}}, 0x0) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(0xffffffffffffffff, 0x89f0, &(0x7f0000000280)={'gretap0\x00', &(0x7f0000000240)={'ip_vti0\x00', 0x0, 0x7, 0x80, 0xfffffff7, 0x7, {{0x8, 0x4, 0x0, 0x5, 0x20, 0x67, 0x0, 0xc0, 0x29, 0x0, @local, @empty, {[@timestamp={0x44, 0xc, 0x8, 0x0, 0x2, [0x7f, 0x1]}]}}}}}) socket(0x10, 0x3, 0x0) process_mrelease(0xffffffffffffffff, 0x0) r4 = socket$packet(0x11, 0x2, 0x300) ioctl$sock_SIOCGIFINDEX(r4, 0x8933, 0x0) getsockopt$inet_sctp_SCTP_RECVNXTINFO(r3, 0x84, 0x21, &(0x7f0000000140), &(0x7f0000000200)=0x4) bind$unix(r0, &(0x7f00000005c0)=@abs={0x1, 0x0, 0x4e23}, 0x6e) syz_clone(0x40000000, &(0x7f00000000c0), 0x0, 0x0, &(0x7f00000001c0), 0x0) 12:22:25 executing program 4: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x82, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket(0x10, 0x803, 0x0) sendto(r0, &(0x7f00000000c0)="120000001200e7ef007b00000000000000a1", 0x12, 0x0, 0x0, 0x0) recvmmsg(r0, &(0x7f00000037c0)=[{{&(0x7f00000004c0)=@ethernet={0x0, @random}, 0x80, &(0x7f0000000380)=[{&(0x7f0000000040)=""/95, 0x5f}, {&(0x7f0000000140)=""/85, 0x55}, {&(0x7f0000000fc0)=""/4096, 0x1000}, {&(0x7f0000000400)=""/106, 0x6a}, {&(0x7f0000000740)=""/73, 0x49}, {&(0x7f0000000200)=""/77, 0x4d}, {0x0}], 0x7, &(0x7f0000000600)=""/191, 0xbf}}], 0x1, 0x9, &(0x7f0000003700)={0x77359400}) 12:22:25 executing program 3: openat$cgroup_procs(0xffffffffffffffff, &(0x7f00000008c0)='tasks\x00', 0x2, 0x0) 12:22:25 executing program 2: open(&(0x7f0000000400)='./bus\x00', 0x14103e, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$L2TP_CMD_SESSION_MODIFY(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000080)={0x30, r1, 0x1, 0x0, 0x0, {}, [@L2TP_ATTR_SEND_SEQ={0x5}, @L2TP_ATTR_IFNAME={0x14, 0x8, 'veth1_to_hsr\x00'}]}, 0x30}, 0x1, 0x0, 0x13}, 0x0) 12:22:25 executing program 0: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000000080)=[@in6={0xa, 0x0, 0x0, @ipv4={'\x00', '\xff\xff', @local}}, @in={0x2, 0x0, @remote}], 0x2c) 12:22:25 executing program 1: syz_mount_image$ext4(&(0x7f0000000740)='ext4\x00', &(0x7f0000000100)='./bus\x00', 0x804810, &(0x7f0000000180)=ANY=[@ANYBLOB="0061021d307a961da7401271e3fa98008000001d3902ccfd562158cb15c016093893c9e4abd02bc4f1492514fa2dfebc8001000080000000008a1049ca0000"], 0x1, 0x73b, &(0x7f0000000780)="$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") chdir(&(0x7f0000000080)='./file0\x00') open(&(0x7f00000000c0)='./bus\x00', 0x14da42, 0x0) mount(&(0x7f0000000380)=@loop={'/dev/loop', 0x0}, &(0x7f00000003c0)='./bus\x00', 0x0, 0x1000, 0x0) r0 = open(&(0x7f0000000400)='./bus\x00', 0x0, 0x0) ioctl$LOOP_SET_STATUS(r0, 0x4c02, &(0x7f00000001c0)={0x0, {}, 0x0, {}, 0xff, 0x0, 0x0, 0x0, "be8176c9e6755a48a3c0230dd390efe12f8306bed95b2afd402aae879978d959ff9009eec610d9108ea036456bb79e26ee42d0a34968c1fdbb33e8ad5860f632", "b948757aa008fae13adca739a9f126462ab528ea52e90ce2cf50a4ef2568375b"}) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='blkio.throttle.io_service_bytes\x00', 0x275a, 0xf6ffffff00000000) 12:22:25 executing program 0: r0 = socket$l2tp6(0xa, 0x2, 0x73) sendto$l2tp6(r0, &(0x7f0000000140)="bf", 0x1, 0x8080, &(0x7f0000000180)={0xa, 0x0, 0x3, @remote, 0x5, 0x3}, 0x20) 12:22:25 executing program 2: open(&(0x7f0000000400)='./bus\x00', 0x14103e, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$L2TP_CMD_SESSION_MODIFY(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000080)={0x30, r1, 0x1, 0x0, 0x0, {}, [@L2TP_ATTR_SEND_SEQ={0x5}, @L2TP_ATTR_IFNAME={0x14, 0x8, 'veth1_to_hsr\x00'}]}, 0x30}, 0x1, 0x0, 0x60}, 0x0) 12:22:25 executing program 4: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x82, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket(0x10, 0x803, 0x0) sendto(r0, &(0x7f00000000c0)="120000001200e7ef007b00000000000000a1", 0x12, 0x0, 0x0, 0x0) recvmmsg(r0, &(0x7f00000037c0)=[{{&(0x7f00000004c0)=@ethernet={0x0, @random}, 0x80, &(0x7f0000000380)=[{&(0x7f0000000040)=""/95, 0x5f}, {&(0x7f0000000140)=""/85, 0x55}, {&(0x7f0000000fc0)=""/4096, 0x1000}, {&(0x7f0000000400)=""/106, 0x6a}, {&(0x7f0000000740)=""/73, 0x49}, {&(0x7f0000000200)=""/77, 0x4d}, {0x0}], 0x7, &(0x7f0000000600)=""/191, 0xbf}}], 0x1, 0xa, &(0x7f0000003700)={0x77359400}) 12:22:25 executing program 3: r0 = socket$igmp(0x2, 0x3, 0x2) setsockopt$MRT_DEL_VIF(r0, 0x0, 0xcb, &(0x7f0000000480)={0x0, 0x0, 0x0, 0x0, @vifc_lcl_ifindex, @loopback}, 0x10) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(0xffffffffffffffff, 0x89f0, &(0x7f0000000000)={'gre0\x00', &(0x7f00000004c0)=ANY=[@ANYBLOB]}) setsockopt$MRT_ADD_VIF(r0, 0x0, 0xca, &(0x7f00000000c0)={0x0, 0x1, 0x0, 0x0, @vifc_lcl_addr=@multicast2, @local}, 0x10) [ 1054.125013][ T5598] loop1: detected capacity change from 0 to 2048 12:22:25 executing program 2: open(&(0x7f0000000400)='./bus\x00', 0x14103e, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$L2TP_CMD_SESSION_MODIFY(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000080)={0x30, r1, 0x1, 0x0, 0x0, {}, [@L2TP_ATTR_SEND_SEQ={0x5}, @L2TP_ATTR_IFNAME={0x14, 0x8, 'veth1_to_hsr\x00'}]}, 0x30}, 0x1, 0x0, 0x300}, 0x0) 12:22:25 executing program 0: add_key(&(0x7f0000000000)='cifs.spnego\x00', 0x0, 0x0, 0x0, 0xfffffffffffffffe) [ 1054.230220][ T5598] EXT4-fs (loop1): mounted filesystem 00000000-0000-0000-0000-000000000000 without journal. Quota mode: none. [ 1054.261870][ T5598] ext4 filesystem being mounted at /root/syzkaller-testdir1539738704/syzkaller.ao1jj3/3837/bus supports timestamps until 2038 (0x7fffffff) [ 1054.393511][ T5598] loop1: detected capacity change from 2048 to 2047 [ 1054.452443][ T3128] EXT4-fs (loop1): unmounting filesystem 00000000-0000-0000-0000-000000000000. 12:22:27 executing program 5: r0 = socket$unix(0x1, 0x2, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f0000000100)={'vcan0\x00', 0x0}) r2 = socket$can_bcm(0x1d, 0x2, 0x2) connect$can_bcm(r2, &(0x7f0000000000), 0x10) ioctl$sock_kcm_SIOCKCMUNATTACH(0xffffffffffffffff, 0x89e1, 0xffffffffffffffff) ioctl$sock_SIOCSPGRP(0xffffffffffffffff, 0x8902, 0x0) sendmsg$can_bcm(r2, &(0x7f0000000480)={&(0x7f0000000340)={0x1d, r1, 0x3f420f00}, 0x10, &(0