0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x74) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='ext4_es_lookup_extent_exit\x00', r1}, 0x10) r2 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x11, 0x3, &(0x7f00000000c0)=@framed, 0x0, 0x4, 0x8f, &(0x7f00000002c0)=""/143, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x74) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='ext4_es_lookup_extent_exit\x00', r2}, 0x10) 06:18:47 executing program 3: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x0, 0x12, r0, 0x0) preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x9, 0x0) mmap(&(0x7f0000000000/0xa000)=nil, 0xa000, 0x2, 0x2172, 0xffffffffffffffff, 0x0) r1 = openat$khugepaged_scan(0xffffff9c, &(0x7f0000000080), 0x1, 0x0) close(r1) 06:18:47 executing program 2: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800004, 0x12, r0, 0x0) preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x9, 0x0) mmap(&(0x7f0000000000/0xa000)=nil, 0xa000, 0x2, 0x2172, 0xffffffffffffffff, 0x0) r1 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x11, 0x3, &(0x7f00000000c0)=@framed, &(0x7f00000001c0)='syzkaller\x00', 0x4, 0x8f, &(0x7f00000002c0)=""/143, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x74) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='ext4_es_lookup_extent_exit\x00', r1}, 0x10) r2 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x11, 0x3, &(0x7f00000000c0)=@framed, 0x0, 0x4, 0x8f, &(0x7f00000002c0)=""/143, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x74) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='ext4_es_lookup_extent_exit\x00', r2}, 0x10) 06:18:47 executing program 1: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800004, 0x10, r0, 0x0) preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x9, 0x0) mmap(&(0x7f0000000000/0xa000)=nil, 0xa000, 0x2, 0x2172, 0xffffffffffffffff, 0x0) socketpair(0x29, 0x80005, 0x0, &(0x7f0000000340)={0x0, 0x0}) [ 330.151205][T14375] loop0: detected capacity change from 0 to 8 06:18:47 executing program 3: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x0, 0x12, r0, 0x0) preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x9, 0x0) mmap(&(0x7f0000000000/0xa000)=nil, 0xa000, 0x2, 0x2172, 0xffffffffffffffff, 0x0) r1 = openat$khugepaged_scan(0xffffff9c, &(0x7f0000000080), 0x1, 0x0) close(r1) 06:18:47 executing program 1: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800004, 0x10, r0, 0x0) preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x9, 0x0) mmap(&(0x7f0000000000/0xa000)=nil, 0xa000, 0x2, 0x2172, 0xffffffffffffffff, 0x0) socketpair(0x29, 0x80005, 0x0, &(0x7f0000000340)={0x0, 0x0}) 06:18:47 executing program 3: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800004, 0x10, r0, 0x0) preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x9, 0x0) mmap(&(0x7f0000000000/0xa000)=nil, 0xa000, 0x2, 0x2172, 0xffffffffffffffff, 0x0) r1 = openat$khugepaged_scan(0xffffff9c, &(0x7f0000000080), 0x1, 0x0) close(r1) 06:18:47 executing program 0: mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800004, 0x12, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f00000001c0)=[{0x0}], 0x1, 0x9, 0x0) mmap(&(0x7f0000000000/0xa000)=nil, 0xa000, 0x2, 0x2172, 0xffffffffffffffff, 0x0) syz_mount_image$nilfs2(&(0x7f0000000180), &(0x7f0000000200)='./file0\x00', 0xd85, 0x7, &(0x7f00000006c0)=[{&(0x7f0000000240)="997c7e90471ec6786b6aa37fd8fbf290c011bee5642707bf7b126c36024e5e8f0d3d514aa1538eb70908eb3ac1a8a52e0ba29dab8884c189c9b68415aa0226e7c6a7ccf48ad20543b10360ab7ee9b247e4304d92f0ec7c0ba06d8160095660a0f12836e2033baed6228d464479ce22f2fadce176d0750fdc6ab1004eb9c4440707be1dc31c1ce11815d12f0d50eef6477341b3f6a4f364a1fccd68e2bcd2dba76227338cd6a1835a44", 0xa9, 0x8}, {&(0x7f0000000380)="3a79b76eed8bb53c1f5217cb4d40694fa75675b28af54d40304f697a1d04373a7ef7b09d46fa6365d222516dcc92d004bc937a22980c404bb5b5669f3dfd0e569079c03b2855be3337944aea4b03b03a3eb6d7", 0x53, 0x3}, {&(0x7f0000000400)="c8213af91316be74099fc072cc912017e77b8709c846cf00eb99c7c03cee58e25602e6ec0b4b42c8709e4447b0d23296a71661cdb6ea9b13d35ed3206f67e5559840f063e554ed7fcb842ab9b072197358b7a617cb0825abfabe3da9b022ecbe28ebcc22bd651a40dfcf4782be0c0c6d8adb8fdd7afce8c8659cc9eef1483eceb26a223fa9d591e28633e6bf6facd75e4295341e2ef3788284fc4482db16cab37de0c1adbf7fa07ad161ae875284778f49e15a052d875e", 0xb7, 0x80}, {&(0x7f00000004c0)="056b3e2d287f817e74a518293ea19b1196cccb376ac73cd7bbeccaced6f43aa9706b33d8ec56c58be0febb03dadec48add6a378f07f9053f1b6f33fe63a960502ad48232f0bee4a41509d7063d478768ab8ee0a90ebdb7c9bc326d54c8edad7e9d59641faf45c171e35f77f8c38a7563e1555c331a5a3e4da1ce59c0c697ebe071d527f24563165dafd23b45186c3d55251c825d0d7fd16b0f13a2f1321cddbcf231b398a88b19e3915ee544692c3559f42a", 0xb2, 0x6}, {&(0x7f0000000580)="8023d53ac815f8a84b84350b859e8673ed208a78bbfec2e35d6d4927707d5dd61106eb0321af3709c17fe7661323c51575e9c18d7b834c138636224eb1a7d75dd59d5c5d7411bdd4c2b07cf727643f52b1ca3e1680cde001be2f8334303e9f4191c2f9425472ca1ee6bac17fde09f0ce5fdf2e70d3c1a38b2d3e0e804f7df817b6a03e5e1ffea1ca7cd7", 0x8a, 0x8}, {&(0x7f0000000300)="fae83b83fc781c7715", 0x9, 0x8fe}, {&(0x7f0000000640)="96f1e3c89318e48db56867032dd1ba9b0ffeec69eb34236bd93b937c6bb7447840dc021e536b89aad4fe89ca2317f4fe2b36cbbdd8d72d841aee6f7b7be258352406775f169573cbf4da0bcf856f825233c5387a3a7cde778c057d591f2133c10e8b5bdb164577f492130acfc7", 0x6d, 0x5}], 0x802010, &(0x7f0000000740)={[{@order_relaxed}], [{@fsname}, {@fsuuid={'fsuuid', 0x3d, {[0x36, 0x38, 0x61, 0x64, 0x39, 0x38, 0x31, 0x37], 0x2d, [0x62, 0x61, 0x61, 0x63], 0x2d, [0x62, 0x39, 0x33, 0x35], 0x2d, [0x32, 0x37, 0x33, 0x61], 0x2d, [0x61, 0x39, 0x64, 0x65, 0x31, 0x8eb4bab6ccebb2ed, 0x64, 0x62]}}}]}) 06:18:47 executing program 2: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800004, 0x12, r0, 0x0) preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x9, 0x0) mmap(&(0x7f0000000000/0xa000)=nil, 0xa000, 0x2, 0x2172, 0xffffffffffffffff, 0x0) r1 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x11, 0x3, &(0x7f00000000c0)=@framed, &(0x7f00000001c0)='syzkaller\x00', 0x4, 0x8f, &(0x7f00000002c0)=""/143, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x74) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='ext4_es_lookup_extent_exit\x00', r1}, 0x10) r2 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x11, 0x3, &(0x7f00000000c0)=@framed, 0x0, 0x4, 0x8f, &(0x7f00000002c0)=""/143, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x74) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='ext4_es_lookup_extent_exit\x00', r2}, 0x10) 06:18:47 executing program 1: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800004, 0x12, 0xffffffffffffffff, 0x0) preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x9, 0x0) mmap(&(0x7f0000000000/0xa000)=nil, 0xa000, 0x2, 0x2172, 0xffffffffffffffff, 0x0) socketpair(0x29, 0x80005, 0x0, &(0x7f0000000340)={0x0, 0x0}) 06:18:47 executing program 2: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800004, 0x12, r0, 0x0) preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x9, 0x0) mmap(&(0x7f0000000000/0xa000)=nil, 0xa000, 0x2, 0x2172, 0xffffffffffffffff, 0x0) r1 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x11, 0x3, &(0x7f00000000c0)=@framed, &(0x7f00000001c0)='syzkaller\x00', 0x4, 0x8f, &(0x7f00000002c0)=""/143, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x74) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='ext4_es_lookup_extent_exit\x00', r1}, 0x10) r2 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x11, 0x3, &(0x7f00000000c0)=@framed, &(0x7f00000001c0)='syzkaller\x00', 0x0, 0x8f, &(0x7f00000002c0)=""/143, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x74) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='ext4_es_lookup_extent_exit\x00', r2}, 0x10) 06:18:47 executing program 3: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800004, 0x10, r0, 0x0) preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x9, 0x0) mmap(&(0x7f0000000000/0xa000)=nil, 0xa000, 0x2, 0x2172, 0xffffffffffffffff, 0x0) r1 = openat$khugepaged_scan(0xffffff9c, &(0x7f0000000080), 0x1, 0x0) close(r1) [ 330.350385][T14395] loop0: detected capacity change from 0 to 8 06:18:47 executing program 1: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800004, 0x12, 0xffffffffffffffff, 0x0) preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x9, 0x0) mmap(&(0x7f0000000000/0xa000)=nil, 0xa000, 0x2, 0x2172, 0xffffffffffffffff, 0x0) socketpair(0x29, 0x80005, 0x0, &(0x7f0000000340)={0x0, 0x0}) 06:18:48 executing program 3: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800004, 0x10, r0, 0x0) preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x9, 0x0) mmap(&(0x7f0000000000/0xa000)=nil, 0xa000, 0x2, 0x2172, 0xffffffffffffffff, 0x0) r1 = openat$khugepaged_scan(0xffffff9c, &(0x7f0000000080), 0x1, 0x0) close(r1) 06:18:48 executing program 2: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800004, 0x12, r0, 0x0) preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x9, 0x0) mmap(&(0x7f0000000000/0xa000)=nil, 0xa000, 0x2, 0x2172, 0xffffffffffffffff, 0x0) r1 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x11, 0x3, &(0x7f00000000c0)=@framed, &(0x7f00000001c0)='syzkaller\x00', 0x4, 0x8f, &(0x7f00000002c0)=""/143, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x74) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='ext4_es_lookup_extent_exit\x00', r1}, 0x10) r2 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x11, 0x3, &(0x7f00000000c0)=@framed, &(0x7f00000001c0)='syzkaller\x00', 0x0, 0x8f, &(0x7f00000002c0)=""/143, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x74) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='ext4_es_lookup_extent_exit\x00', r2}, 0x10) 06:18:48 executing program 0: mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800004, 0x12, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f00000001c0)=[{0x0}], 0x1, 0x9, 0x0) mmap(&(0x7f0000000000/0xa000)=nil, 0xa000, 0x2, 0x2172, 0xffffffffffffffff, 0x0) syz_mount_image$nilfs2(&(0x7f0000000180), &(0x7f0000000200)='./file0\x00', 0xd85, 0x7, &(0x7f00000006c0)=[{&(0x7f0000000240)="997c7e90471ec6786b6aa37fd8fbf290c011bee5642707bf7b126c36024e5e8f0d3d514aa1538eb70908eb3ac1a8a52e0ba29dab8884c189c9b68415aa0226e7c6a7ccf48ad20543b10360ab7ee9b247e4304d92f0ec7c0ba06d8160095660a0f12836e2033baed6228d464479ce22f2fadce176d0750fdc6ab1004eb9c4440707be1dc31c1ce11815d12f0d50eef6477341b3f6a4f364a1fccd68e2bcd2dba76227338cd6a1835a44", 0xa9, 0x8}, {&(0x7f0000000380)="3a79b76eed8bb53c1f5217cb4d40694fa75675b28af54d40304f697a1d04373a7ef7b09d46fa6365d222516dcc92d004bc937a22980c404bb5b5669f3dfd0e569079c03b2855be3337944aea4b03b03a3eb6d7", 0x53, 0x3}, {&(0x7f0000000400)="c8213af91316be74099fc072cc912017e77b8709c846cf00eb99c7c03cee58e25602e6ec0b4b42c8709e4447b0d23296a71661cdb6ea9b13d35ed3206f67e5559840f063e554ed7fcb842ab9b072197358b7a617cb0825abfabe3da9b022ecbe28ebcc22bd651a40dfcf4782be0c0c6d8adb8fdd7afce8c8659cc9eef1483eceb26a223fa9d591e28633e6bf6facd75e4295341e2ef3788284fc4482db16cab37de0c1adbf7fa07ad161ae875284778f49e15a052d875e", 0xb7, 0x80}, {&(0x7f00000004c0)="056b3e2d287f817e74a518293ea19b1196cccb376ac73cd7bbeccaced6f43aa9706b33d8ec56c58be0febb03dadec48add6a378f07f9053f1b6f33fe63a960502ad48232f0bee4a41509d7063d478768ab8ee0a90ebdb7c9bc326d54c8edad7e9d59641faf45c171e35f77f8c38a7563e1555c331a5a3e4da1ce59c0c697ebe071d527f24563165dafd23b45186c3d55251c825d0d7fd16b0f13a2f1321cddbcf231b398a88b19e3915ee544692c3559f42a", 0xb2, 0x6}, {&(0x7f0000000580)="8023d53ac815f8a84b84350b859e8673ed208a78bbfec2e35d6d4927707d5dd61106eb0321af3709c17fe7661323c51575e9c18d7b834c138636224eb1a7d75dd59d5c5d7411bdd4c2b07cf727643f52b1ca3e1680cde001be2f8334303e9f4191c2f9425472ca1ee6bac17fde09f0ce5fdf2e70d3c1a38b2d3e0e804f7df817b6a03e5e1ffea1ca7cd7", 0x8a, 0x8}, {&(0x7f0000000300)="fae83b83fc781c7715", 0x9, 0x8fe}, {&(0x7f0000000640)="96f1e3c89318e48db56867032dd1ba9b0ffeec69eb34236bd93b937c6bb7447840dc021e536b89aad4fe89ca2317f4fe2b36cbbdd8d72d841aee6f7b7be258352406775f169573cbf4da0bcf856f825233c5387a3a7cde778c057d591f2133c10e8b5bdb164577f492130acfc7", 0x6d, 0x5}], 0x802010, &(0x7f0000000740)={[{@order_relaxed}], [{@fsname}, {@fsuuid={'fsuuid', 0x3d, {[0x36, 0x38, 0x61, 0x64, 0x39, 0x38, 0x31, 0x37], 0x2d, [0x62, 0x61, 0x61, 0x63], 0x2d, [0x62, 0x39, 0x33, 0x35], 0x2d, [0x32, 0x37, 0x33, 0x61], 0x2d, [0x61, 0x39, 0x64, 0x65, 0x31, 0x8eb4bab6ccebb2ed, 0x64, 0x62]}}}]}) 06:18:48 executing program 2: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800004, 0x12, r0, 0x0) preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x9, 0x0) mmap(&(0x7f0000000000/0xa000)=nil, 0xa000, 0x2, 0x2172, 0xffffffffffffffff, 0x0) r1 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x11, 0x3, &(0x7f00000000c0)=@framed, &(0x7f00000001c0)='syzkaller\x00', 0x4, 0x8f, &(0x7f00000002c0)=""/143, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x74) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='ext4_es_lookup_extent_exit\x00', r1}, 0x10) r2 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x11, 0x3, &(0x7f00000000c0)=@framed, &(0x7f00000001c0)='syzkaller\x00', 0x0, 0x8f, &(0x7f00000002c0)=""/143, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x74) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='ext4_es_lookup_extent_exit\x00', r2}, 0x10) 06:18:48 executing program 3: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800004, 0x12, 0xffffffffffffffff, 0x0) preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x9, 0x0) mmap(&(0x7f0000000000/0xa000)=nil, 0xa000, 0x2, 0x2172, 0xffffffffffffffff, 0x0) r1 = openat$khugepaged_scan(0xffffff9c, &(0x7f0000000080), 0x1, 0x0) close(r1) [ 330.475381][T14412] loop0: detected capacity change from 0 to 8 06:18:48 executing program 1: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800004, 0x12, 0xffffffffffffffff, 0x0) preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x9, 0x0) mmap(&(0x7f0000000000/0xa000)=nil, 0xa000, 0x2, 0x2172, 0xffffffffffffffff, 0x0) socketpair(0x29, 0x80005, 0x0, &(0x7f0000000340)={0x0, 0x0}) 06:18:48 executing program 3: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800004, 0x12, 0xffffffffffffffff, 0x0) preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x9, 0x0) mmap(&(0x7f0000000000/0xa000)=nil, 0xa000, 0x2, 0x2172, 0xffffffffffffffff, 0x0) r1 = openat$khugepaged_scan(0xffffff9c, &(0x7f0000000080), 0x1, 0x0) close(r1) 06:18:48 executing program 2: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800004, 0x12, r0, 0x0) preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x9, 0x0) mmap(&(0x7f0000000000/0xa000)=nil, 0xa000, 0x2, 0x2172, 0xffffffffffffffff, 0x0) r1 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x11, 0x3, &(0x7f00000000c0)=@framed, &(0x7f00000001c0)='syzkaller\x00', 0x4, 0x8f, &(0x7f00000002c0)=""/143, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x74) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='ext4_es_lookup_extent_exit\x00', r1}, 0x10) r2 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x11, 0x3, &(0x7f00000000c0)=@framed, &(0x7f00000001c0)='syzkaller\x00', 0x4, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x74) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='ext4_es_lookup_extent_exit\x00', r2}, 0x10) 06:18:48 executing program 1: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800004, 0x12, r0, 0x0) preadv(0xffffffffffffffff, &(0x7f00000001c0)=[{0x0}], 0x1, 0x9, 0x0) mmap(&(0x7f0000000000/0xa000)=nil, 0xa000, 0x2, 0x2172, 0xffffffffffffffff, 0x0) socketpair(0x29, 0x80005, 0x0, &(0x7f0000000340)={0x0, 0x0}) 06:18:48 executing program 0: r0 = openat(0xffffffffffffffff, 0x0, 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800004, 0x12, r0, 0x0) preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x9, 0x0) mmap(&(0x7f0000000000/0xa000)=nil, 0xa000, 0x2, 0x2172, 0xffffffffffffffff, 0x0) syz_mount_image$nilfs2(&(0x7f0000000180), &(0x7f0000000200)='./file0\x00', 0xd85, 0x7, &(0x7f00000006c0)=[{&(0x7f0000000240)="997c7e90471ec6786b6aa37fd8fbf290c011bee5642707bf7b126c36024e5e8f0d3d514aa1538eb70908eb3ac1a8a52e0ba29dab8884c189c9b68415aa0226e7c6a7ccf48ad20543b10360ab7ee9b247e4304d92f0ec7c0ba06d8160095660a0f12836e2033baed6228d464479ce22f2fadce176d0750fdc6ab1004eb9c4440707be1dc31c1ce11815d12f0d50eef6477341b3f6a4f364a1fccd68e2bcd2dba76227338cd6a1835a44", 0xa9, 0x8}, {&(0x7f0000000380)="3a79b76eed8bb53c1f5217cb4d40694fa75675b28af54d40304f697a1d04373a7ef7b09d46fa6365d222516dcc92d004bc937a22980c404bb5b5669f3dfd0e569079c03b2855be3337944aea4b03b03a3eb6d7", 0x53, 0x3}, {&(0x7f0000000400)="c8213af91316be74099fc072cc912017e77b8709c846cf00eb99c7c03cee58e25602e6ec0b4b42c8709e4447b0d23296a71661cdb6ea9b13d35ed3206f67e5559840f063e554ed7fcb842ab9b072197358b7a617cb0825abfabe3da9b022ecbe28ebcc22bd651a40dfcf4782be0c0c6d8adb8fdd7afce8c8659cc9eef1483eceb26a223fa9d591e28633e6bf6facd75e4295341e2ef3788284fc4482db16cab37de0c1adbf7fa07ad161ae875284778f49e15a052d875e", 0xb7, 0x80}, {&(0x7f00000004c0)="056b3e2d287f817e74a518293ea19b1196cccb376ac73cd7bbeccaced6f43aa9706b33d8ec56c58be0febb03dadec48add6a378f07f9053f1b6f33fe63a960502ad48232f0bee4a41509d7063d478768ab8ee0a90ebdb7c9bc326d54c8edad7e9d59641faf45c171e35f77f8c38a7563e1555c331a5a3e4da1ce59c0c697ebe071d527f24563165dafd23b45186c3d55251c825d0d7fd16b0f13a2f1321cddbcf231b398a88b19e3915ee544692c3559f42a", 0xb2, 0x6}, {&(0x7f0000000580)="8023d53ac815f8a84b84350b859e8673ed208a78bbfec2e35d6d4927707d5dd61106eb0321af3709c17fe7661323c51575e9c18d7b834c138636224eb1a7d75dd59d5c5d7411bdd4c2b07cf727643f52b1ca3e1680cde001be2f8334303e9f4191c2f9425472ca1ee6bac17fde09f0ce5fdf2e70d3c1a38b2d3e0e804f7df817b6a03e5e1ffea1ca7cd7", 0x8a, 0x8}, {&(0x7f0000000300)="fae83b83fc781c7715", 0x9, 0x8fe}, {&(0x7f0000000640)="96f1e3c89318e48db56867032dd1ba9b0ffeec69eb34236bd93b937c6bb7447840dc021e536b89aad4fe89ca2317f4fe2b36cbbdd8d72d841aee6f7b7be258352406775f169573cbf4da0bcf856f825233c5387a3a7cde778c057d591f2133c10e8b5bdb164577f492130acfc7", 0x6d, 0x5}], 0x802010, &(0x7f0000000740)={[{@order_relaxed}], [{@fsname}, {@fsuuid={'fsuuid', 0x3d, {[0x36, 0x38, 0x61, 0x64, 0x39, 0x38, 0x31, 0x37], 0x2d, [0x62, 0x61, 0x61, 0x63], 0x2d, [0x62, 0x39, 0x33, 0x35], 0x2d, [0x32, 0x37, 0x33, 0x61], 0x2d, [0x61, 0x39, 0x64, 0x65, 0x31, 0x8eb4bab6ccebb2ed, 0x64, 0x62]}}}]}) 06:18:48 executing program 1: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800004, 0x12, r0, 0x0) preadv(0xffffffffffffffff, &(0x7f00000001c0)=[{0x0}], 0x1, 0x9, 0x0) mmap(&(0x7f0000000000/0xa000)=nil, 0xa000, 0x2, 0x2172, 0xffffffffffffffff, 0x0) socketpair(0x29, 0x80005, 0x0, &(0x7f0000000340)={0x0, 0x0}) 06:18:48 executing program 3: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800004, 0x12, 0xffffffffffffffff, 0x0) preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x9, 0x0) mmap(&(0x7f0000000000/0xa000)=nil, 0xa000, 0x2, 0x2172, 0xffffffffffffffff, 0x0) r1 = openat$khugepaged_scan(0xffffff9c, &(0x7f0000000080), 0x1, 0x0) close(r1) [ 330.608700][T14429] loop0: detected capacity change from 0 to 8 06:18:48 executing program 2: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800004, 0x12, r0, 0x0) preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x9, 0x0) mmap(&(0x7f0000000000/0xa000)=nil, 0xa000, 0x2, 0x2172, 0xffffffffffffffff, 0x0) r1 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x11, 0x3, &(0x7f00000000c0)=@framed, &(0x7f00000001c0)='syzkaller\x00', 0x4, 0x8f, &(0x7f00000002c0)=""/143, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x74) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='ext4_es_lookup_extent_exit\x00', r1}, 0x10) r2 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x11, 0x3, &(0x7f00000000c0)=@framed, &(0x7f00000001c0)='syzkaller\x00', 0x4, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x74) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='ext4_es_lookup_extent_exit\x00', r2}, 0x10) 06:18:48 executing program 3: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800004, 0x12, r0, 0x0) preadv(0xffffffffffffffff, &(0x7f00000001c0)=[{0x0}], 0x1, 0x9, 0x0) mmap(&(0x7f0000000000/0xa000)=nil, 0xa000, 0x2, 0x2172, 0xffffffffffffffff, 0x0) r1 = openat$khugepaged_scan(0xffffff9c, &(0x7f0000000080), 0x1, 0x0) close(r1) 06:18:48 executing program 1: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800004, 0x12, r0, 0x0) preadv(0xffffffffffffffff, &(0x7f00000001c0)=[{0x0}], 0x1, 0x9, 0x0) mmap(&(0x7f0000000000/0xa000)=nil, 0xa000, 0x2, 0x2172, 0xffffffffffffffff, 0x0) socketpair(0x29, 0x80005, 0x0, &(0x7f0000000340)={0x0, 0x0}) 06:18:48 executing program 0: r0 = openat(0xffffffffffffffff, 0x0, 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800004, 0x12, r0, 0x0) preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x9, 0x0) mmap(&(0x7f0000000000/0xa000)=nil, 0xa000, 0x2, 0x2172, 0xffffffffffffffff, 0x0) syz_mount_image$nilfs2(&(0x7f0000000180), &(0x7f0000000200)='./file0\x00', 0xd85, 0x7, &(0x7f00000006c0)=[{&(0x7f0000000240)="997c7e90471ec6786b6aa37fd8fbf290c011bee5642707bf7b126c36024e5e8f0d3d514aa1538eb70908eb3ac1a8a52e0ba29dab8884c189c9b68415aa0226e7c6a7ccf48ad20543b10360ab7ee9b247e4304d92f0ec7c0ba06d8160095660a0f12836e2033baed6228d464479ce22f2fadce176d0750fdc6ab1004eb9c4440707be1dc31c1ce11815d12f0d50eef6477341b3f6a4f364a1fccd68e2bcd2dba76227338cd6a1835a44", 0xa9, 0x8}, {&(0x7f0000000380)="3a79b76eed8bb53c1f5217cb4d40694fa75675b28af54d40304f697a1d04373a7ef7b09d46fa6365d222516dcc92d004bc937a22980c404bb5b5669f3dfd0e569079c03b2855be3337944aea4b03b03a3eb6d7", 0x53, 0x3}, {&(0x7f0000000400)="c8213af91316be74099fc072cc912017e77b8709c846cf00eb99c7c03cee58e25602e6ec0b4b42c8709e4447b0d23296a71661cdb6ea9b13d35ed3206f67e5559840f063e554ed7fcb842ab9b072197358b7a617cb0825abfabe3da9b022ecbe28ebcc22bd651a40dfcf4782be0c0c6d8adb8fdd7afce8c8659cc9eef1483eceb26a223fa9d591e28633e6bf6facd75e4295341e2ef3788284fc4482db16cab37de0c1adbf7fa07ad161ae875284778f49e15a052d875e", 0xb7, 0x80}, {&(0x7f00000004c0)="056b3e2d287f817e74a518293ea19b1196cccb376ac73cd7bbeccaced6f43aa9706b33d8ec56c58be0febb03dadec48add6a378f07f9053f1b6f33fe63a960502ad48232f0bee4a41509d7063d478768ab8ee0a90ebdb7c9bc326d54c8edad7e9d59641faf45c171e35f77f8c38a7563e1555c331a5a3e4da1ce59c0c697ebe071d527f24563165dafd23b45186c3d55251c825d0d7fd16b0f13a2f1321cddbcf231b398a88b19e3915ee544692c3559f42a", 0xb2, 0x6}, {&(0x7f0000000580)="8023d53ac815f8a84b84350b859e8673ed208a78bbfec2e35d6d4927707d5dd61106eb0321af3709c17fe7661323c51575e9c18d7b834c138636224eb1a7d75dd59d5c5d7411bdd4c2b07cf727643f52b1ca3e1680cde001be2f8334303e9f4191c2f9425472ca1ee6bac17fde09f0ce5fdf2e70d3c1a38b2d3e0e804f7df817b6a03e5e1ffea1ca7cd7", 0x8a, 0x8}, {&(0x7f0000000300)="fae83b83fc781c7715", 0x9, 0x8fe}, {&(0x7f0000000640)="96f1e3c89318e48db56867032dd1ba9b0ffeec69eb34236bd93b937c6bb7447840dc021e536b89aad4fe89ca2317f4fe2b36cbbdd8d72d841aee6f7b7be258352406775f169573cbf4da0bcf856f825233c5387a3a7cde778c057d591f2133c10e8b5bdb164577f492130acfc7", 0x6d, 0x5}], 0x802010, &(0x7f0000000740)={[{@order_relaxed}], [{@fsname}, {@fsuuid={'fsuuid', 0x3d, {[0x36, 0x38, 0x61, 0x64, 0x39, 0x38, 0x31, 0x37], 0x2d, [0x62, 0x61, 0x61, 0x63], 0x2d, [0x62, 0x39, 0x33, 0x35], 0x2d, [0x32, 0x37, 0x33, 0x61], 0x2d, [0x61, 0x39, 0x64, 0x65, 0x31, 0x8eb4bab6ccebb2ed, 0x64, 0x62]}}}]}) 06:18:48 executing program 2: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800004, 0x12, r0, 0x0) preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x9, 0x0) mmap(&(0x7f0000000000/0xa000)=nil, 0xa000, 0x2, 0x2172, 0xffffffffffffffff, 0x0) r1 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x11, 0x3, &(0x7f00000000c0)=@framed, &(0x7f00000001c0)='syzkaller\x00', 0x4, 0x8f, &(0x7f00000002c0)=""/143, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x74) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='ext4_es_lookup_extent_exit\x00', r1}, 0x10) r2 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x11, 0x3, &(0x7f00000000c0)=@framed, &(0x7f00000001c0)='syzkaller\x00', 0x4, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x74) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='ext4_es_lookup_extent_exit\x00', r2}, 0x10) 06:18:48 executing program 1: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800004, 0x12, r0, 0x0) preadv(r0, 0x0, 0x0, 0x9, 0x0) mmap(&(0x7f0000000000/0xa000)=nil, 0xa000, 0x2, 0x2172, 0xffffffffffffffff, 0x0) socketpair(0x29, 0x80005, 0x0, &(0x7f0000000340)={0x0, 0x0}) 06:18:48 executing program 3: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800004, 0x12, r0, 0x0) preadv(0xffffffffffffffff, &(0x7f00000001c0)=[{0x0}], 0x1, 0x9, 0x0) mmap(&(0x7f0000000000/0xa000)=nil, 0xa000, 0x2, 0x2172, 0xffffffffffffffff, 0x0) r1 = openat$khugepaged_scan(0xffffff9c, &(0x7f0000000080), 0x1, 0x0) close(r1) [ 330.756383][T14446] loop0: detected capacity change from 0 to 8 06:18:48 executing program 1: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800004, 0x12, r0, 0x0) preadv(r0, 0x0, 0x0, 0x9, 0x0) mmap(&(0x7f0000000000/0xa000)=nil, 0xa000, 0x2, 0x2172, 0xffffffffffffffff, 0x0) socketpair(0x29, 0x80005, 0x0, &(0x7f0000000340)={0x0, 0x0}) 06:18:48 executing program 2: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800004, 0x12, r0, 0x0) preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x9, 0x0) mmap(&(0x7f0000000000/0xa000)=nil, 0xa000, 0x2, 0x2172, 0xffffffffffffffff, 0x0) r1 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x11, 0x3, &(0x7f00000000c0)=@framed, &(0x7f00000001c0)='syzkaller\x00', 0x4, 0x8f, &(0x7f00000002c0)=""/143, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x74) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='ext4_es_lookup_extent_exit\x00', r1}, 0x10) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x11, 0x3, &(0x7f00000000c0)=@framed, &(0x7f00000001c0)='syzkaller\x00', 0x4, 0x8f, &(0x7f00000002c0)=""/143, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x74) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) 06:18:48 executing program 3: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800004, 0x12, r0, 0x0) preadv(0xffffffffffffffff, &(0x7f00000001c0)=[{0x0}], 0x1, 0x9, 0x0) mmap(&(0x7f0000000000/0xa000)=nil, 0xa000, 0x2, 0x2172, 0xffffffffffffffff, 0x0) r1 = openat$khugepaged_scan(0xffffff9c, &(0x7f0000000080), 0x1, 0x0) close(r1) 06:18:48 executing program 0: r0 = openat(0xffffffffffffffff, 0x0, 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800004, 0x12, r0, 0x0) preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x9, 0x0) mmap(&(0x7f0000000000/0xa000)=nil, 0xa000, 0x2, 0x2172, 0xffffffffffffffff, 0x0) syz_mount_image$nilfs2(&(0x7f0000000180), &(0x7f0000000200)='./file0\x00', 0xd85, 0x7, &(0x7f00000006c0)=[{&(0x7f0000000240)="997c7e90471ec6786b6aa37fd8fbf290c011bee5642707bf7b126c36024e5e8f0d3d514aa1538eb70908eb3ac1a8a52e0ba29dab8884c189c9b68415aa0226e7c6a7ccf48ad20543b10360ab7ee9b247e4304d92f0ec7c0ba06d8160095660a0f12836e2033baed6228d464479ce22f2fadce176d0750fdc6ab1004eb9c4440707be1dc31c1ce11815d12f0d50eef6477341b3f6a4f364a1fccd68e2bcd2dba76227338cd6a1835a44", 0xa9, 0x8}, {&(0x7f0000000380)="3a79b76eed8bb53c1f5217cb4d40694fa75675b28af54d40304f697a1d04373a7ef7b09d46fa6365d222516dcc92d004bc937a22980c404bb5b5669f3dfd0e569079c03b2855be3337944aea4b03b03a3eb6d7", 0x53, 0x3}, {&(0x7f0000000400)="c8213af91316be74099fc072cc912017e77b8709c846cf00eb99c7c03cee58e25602e6ec0b4b42c8709e4447b0d23296a71661cdb6ea9b13d35ed3206f67e5559840f063e554ed7fcb842ab9b072197358b7a617cb0825abfabe3da9b022ecbe28ebcc22bd651a40dfcf4782be0c0c6d8adb8fdd7afce8c8659cc9eef1483eceb26a223fa9d591e28633e6bf6facd75e4295341e2ef3788284fc4482db16cab37de0c1adbf7fa07ad161ae875284778f49e15a052d875e", 0xb7, 0x80}, {&(0x7f00000004c0)="056b3e2d287f817e74a518293ea19b1196cccb376ac73cd7bbeccaced6f43aa9706b33d8ec56c58be0febb03dadec48add6a378f07f9053f1b6f33fe63a960502ad48232f0bee4a41509d7063d478768ab8ee0a90ebdb7c9bc326d54c8edad7e9d59641faf45c171e35f77f8c38a7563e1555c331a5a3e4da1ce59c0c697ebe071d527f24563165dafd23b45186c3d55251c825d0d7fd16b0f13a2f1321cddbcf231b398a88b19e3915ee544692c3559f42a", 0xb2, 0x6}, {&(0x7f0000000580)="8023d53ac815f8a84b84350b859e8673ed208a78bbfec2e35d6d4927707d5dd61106eb0321af3709c17fe7661323c51575e9c18d7b834c138636224eb1a7d75dd59d5c5d7411bdd4c2b07cf727643f52b1ca3e1680cde001be2f8334303e9f4191c2f9425472ca1ee6bac17fde09f0ce5fdf2e70d3c1a38b2d3e0e804f7df817b6a03e5e1ffea1ca7cd7", 0x8a, 0x8}, {&(0x7f0000000300)="fae83b83fc781c7715", 0x9, 0x8fe}, {&(0x7f0000000640)="96f1e3c89318e48db56867032dd1ba9b0ffeec69eb34236bd93b937c6bb7447840dc021e536b89aad4fe89ca2317f4fe2b36cbbdd8d72d841aee6f7b7be258352406775f169573cbf4da0bcf856f825233c5387a3a7cde778c057d591f2133c10e8b5bdb164577f492130acfc7", 0x6d, 0x5}], 0x802010, &(0x7f0000000740)={[{@order_relaxed}], [{@fsname}, {@fsuuid={'fsuuid', 0x3d, {[0x36, 0x38, 0x61, 0x64, 0x39, 0x38, 0x31, 0x37], 0x2d, [0x62, 0x61, 0x61, 0x63], 0x2d, [0x62, 0x39, 0x33, 0x35], 0x2d, [0x32, 0x37, 0x33, 0x61], 0x2d, [0x61, 0x39, 0x64, 0x65, 0x31, 0x8eb4bab6ccebb2ed, 0x64, 0x62]}}}]}) 06:18:48 executing program 2: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800004, 0x12, r0, 0x0) preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x9, 0x0) mmap(&(0x7f0000000000/0xa000)=nil, 0xa000, 0x2, 0x2172, 0xffffffffffffffff, 0x0) r1 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x11, 0x3, &(0x7f00000000c0)=@framed, &(0x7f00000001c0)='syzkaller\x00', 0x4, 0x8f, &(0x7f00000002c0)=""/143, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x74) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='ext4_es_lookup_extent_exit\x00', r1}, 0x10) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x11, 0x3, &(0x7f00000000c0)=@framed, &(0x7f00000001c0)='syzkaller\x00', 0x4, 0x8f, &(0x7f00000002c0)=""/143, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x74) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) 06:18:48 executing program 3: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800004, 0x12, r0, 0x0) preadv(r0, 0x0, 0x0, 0x9, 0x0) mmap(&(0x7f0000000000/0xa000)=nil, 0xa000, 0x2, 0x2172, 0xffffffffffffffff, 0x0) r1 = openat$khugepaged_scan(0xffffff9c, &(0x7f0000000080), 0x1, 0x0) close(r1) 06:18:48 executing program 1: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800004, 0x12, r0, 0x0) preadv(r0, 0x0, 0x0, 0x9, 0x0) mmap(&(0x7f0000000000/0xa000)=nil, 0xa000, 0x2, 0x2172, 0xffffffffffffffff, 0x0) socketpair(0x29, 0x80005, 0x0, &(0x7f0000000340)={0x0, 0x0}) [ 330.934864][T14463] loop0: detected capacity change from 0 to 8 06:18:48 executing program 1: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800004, 0x12, r0, 0x0) preadv(r0, &(0x7f00000001c0), 0x0, 0x9, 0x0) mmap(&(0x7f0000000000/0xa000)=nil, 0xa000, 0x2, 0x2172, 0xffffffffffffffff, 0x0) socketpair(0x29, 0x80005, 0x0, &(0x7f0000000340)={0x0, 0x0}) 06:18:48 executing program 3: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800004, 0x12, r0, 0x0) preadv(r0, 0x0, 0x0, 0x9, 0x0) mmap(&(0x7f0000000000/0xa000)=nil, 0xa000, 0x2, 0x2172, 0xffffffffffffffff, 0x0) r1 = openat$khugepaged_scan(0xffffff9c, &(0x7f0000000080), 0x1, 0x0) close(r1) 06:18:48 executing program 2: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800004, 0x12, r0, 0x0) preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x9, 0x0) mmap(&(0x7f0000000000/0xa000)=nil, 0xa000, 0x2, 0x2172, 0xffffffffffffffff, 0x0) r1 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x11, 0x3, &(0x7f00000000c0)=@framed, &(0x7f00000001c0)='syzkaller\x00', 0x4, 0x8f, &(0x7f00000002c0)=""/143, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x74) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='ext4_es_lookup_extent_exit\x00', r1}, 0x10) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x11, 0x3, &(0x7f00000000c0)=@framed, &(0x7f00000001c0)='syzkaller\x00', 0x4, 0x8f, &(0x7f00000002c0)=""/143, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x74) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) 06:18:48 executing program 0: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x0, 0x12, r0, 0x0) preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x9, 0x0) mmap(&(0x7f0000000000/0xa000)=nil, 0xa000, 0x2, 0x2172, 0xffffffffffffffff, 0x0) syz_mount_image$nilfs2(&(0x7f0000000180), &(0x7f0000000200)='./file0\x00', 0xd85, 0x7, &(0x7f00000006c0)=[{&(0x7f0000000240)="997c7e90471ec6786b6aa37fd8fbf290c011bee5642707bf7b126c36024e5e8f0d3d514aa1538eb70908eb3ac1a8a52e0ba29dab8884c189c9b68415aa0226e7c6a7ccf48ad20543b10360ab7ee9b247e4304d92f0ec7c0ba06d8160095660a0f12836e2033baed6228d464479ce22f2fadce176d0750fdc6ab1004eb9c4440707be1dc31c1ce11815d12f0d50eef6477341b3f6a4f364a1fccd68e2bcd2dba76227338cd6a1835a44", 0xa9, 0x8}, {&(0x7f0000000380)="3a79b76eed8bb53c1f5217cb4d40694fa75675b28af54d40304f697a1d04373a7ef7b09d46fa6365d222516dcc92d004bc937a22980c404bb5b5669f3dfd0e569079c03b2855be3337944aea4b03b03a3eb6d7", 0x53, 0x3}, {&(0x7f0000000400)="c8213af91316be74099fc072cc912017e77b8709c846cf00eb99c7c03cee58e25602e6ec0b4b42c8709e4447b0d23296a71661cdb6ea9b13d35ed3206f67e5559840f063e554ed7fcb842ab9b072197358b7a617cb0825abfabe3da9b022ecbe28ebcc22bd651a40dfcf4782be0c0c6d8adb8fdd7afce8c8659cc9eef1483eceb26a223fa9d591e28633e6bf6facd75e4295341e2ef3788284fc4482db16cab37de0c1adbf7fa07ad161ae875284778f49e15a052d875e", 0xb7, 0x80}, {&(0x7f00000004c0)="056b3e2d287f817e74a518293ea19b1196cccb376ac73cd7bbeccaced6f43aa9706b33d8ec56c58be0febb03dadec48add6a378f07f9053f1b6f33fe63a960502ad48232f0bee4a41509d7063d478768ab8ee0a90ebdb7c9bc326d54c8edad7e9d59641faf45c171e35f77f8c38a7563e1555c331a5a3e4da1ce59c0c697ebe071d527f24563165dafd23b45186c3d55251c825d0d7fd16b0f13a2f1321cddbcf231b398a88b19e3915ee544692c3559f42a", 0xb2, 0x6}, {&(0x7f0000000580)="8023d53ac815f8a84b84350b859e8673ed208a78bbfec2e35d6d4927707d5dd61106eb0321af3709c17fe7661323c51575e9c18d7b834c138636224eb1a7d75dd59d5c5d7411bdd4c2b07cf727643f52b1ca3e1680cde001be2f8334303e9f4191c2f9425472ca1ee6bac17fde09f0ce5fdf2e70d3c1a38b2d3e0e804f7df817b6a03e5e1ffea1ca7cd7", 0x8a, 0x8}, {&(0x7f0000000300)="fae83b83fc781c7715", 0x9, 0x8fe}, {&(0x7f0000000640)="96f1e3c89318e48db56867032dd1ba9b0ffeec69eb34236bd93b937c6bb7447840dc021e536b89aad4fe89ca2317f4fe2b36cbbdd8d72d841aee6f7b7be258352406775f169573cbf4da0bcf856f825233c5387a3a7cde778c057d591f2133c10e8b5bdb164577f492130acfc7", 0x6d, 0x5}], 0x802010, &(0x7f0000000740)={[{@order_relaxed}], [{@fsname}, {@fsuuid={'fsuuid', 0x3d, {[0x36, 0x38, 0x61, 0x64, 0x39, 0x38, 0x31, 0x37], 0x2d, [0x62, 0x61, 0x61, 0x63], 0x2d, [0x62, 0x39, 0x33, 0x35], 0x2d, [0x32, 0x37, 0x33, 0x61], 0x2d, [0x61, 0x39, 0x64, 0x65, 0x31, 0x8eb4bab6ccebb2ed, 0x64, 0x62]}}}]}) 06:18:48 executing program 1: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800004, 0x12, r0, 0x0) preadv(r0, &(0x7f00000001c0), 0x0, 0x9, 0x0) mmap(&(0x7f0000000000/0xa000)=nil, 0xa000, 0x2, 0x2172, 0xffffffffffffffff, 0x0) socketpair(0x29, 0x80005, 0x0, &(0x7f0000000340)={0x0, 0x0}) 06:18:48 executing program 3: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800004, 0x12, r0, 0x0) preadv(r0, 0x0, 0x0, 0x9, 0x0) mmap(&(0x7f0000000000/0xa000)=nil, 0xa000, 0x2, 0x2172, 0xffffffffffffffff, 0x0) r1 = openat$khugepaged_scan(0xffffff9c, &(0x7f0000000080), 0x1, 0x0) close(r1) [ 331.080823][T14480] loop0: detected capacity change from 0 to 8 06:18:48 executing program 1: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800004, 0x12, r0, 0x0) preadv(r0, &(0x7f00000001c0), 0x0, 0x9, 0x0) mmap(&(0x7f0000000000/0xa000)=nil, 0xa000, 0x2, 0x2172, 0xffffffffffffffff, 0x0) socketpair(0x29, 0x80005, 0x0, &(0x7f0000000340)={0x0, 0x0}) 06:18:48 executing program 2: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800004, 0x12, r0, 0x0) preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x9, 0x0) mmap(&(0x7f0000000000/0xa000)=nil, 0xa000, 0x2, 0x2172, 0xffffffffffffffff, 0x0) r1 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x11, 0x3, &(0x7f00000000c0)=@framed, &(0x7f00000001c0)='syzkaller\x00', 0x4, 0x8f, &(0x7f00000002c0)=""/143, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x74) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='ext4_es_lookup_extent_exit\x00', r1}, 0x10) r2 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x11, 0x3, &(0x7f00000000c0)=@framed, &(0x7f00000001c0)='syzkaller\x00', 0x4, 0x8f, &(0x7f00000002c0)=""/143, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x74) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={0x0, r2}, 0x10) 06:18:48 executing program 3: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800004, 0x12, r0, 0x0) preadv(r0, &(0x7f00000001c0), 0x0, 0x9, 0x0) mmap(&(0x7f0000000000/0xa000)=nil, 0xa000, 0x2, 0x2172, 0xffffffffffffffff, 0x0) r1 = openat$khugepaged_scan(0xffffff9c, &(0x7f0000000080), 0x1, 0x0) close(r1) 06:18:48 executing program 1: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800004, 0x12, r0, 0x0) preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x0, 0x0) mmap(&(0x7f0000000000/0xa000)=nil, 0xa000, 0x2, 0x2172, 0xffffffffffffffff, 0x0) socketpair(0x29, 0x80005, 0x0, &(0x7f0000000340)={0x0, 0x0}) 06:18:48 executing program 2: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800004, 0x12, r0, 0x0) preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x9, 0x0) mmap(&(0x7f0000000000/0xa000)=nil, 0xa000, 0x2, 0x2172, 0xffffffffffffffff, 0x0) r1 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x11, 0x3, &(0x7f00000000c0)=@framed, &(0x7f00000001c0)='syzkaller\x00', 0x4, 0x8f, &(0x7f00000002c0)=""/143, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x74) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='ext4_es_lookup_extent_exit\x00', r1}, 0x10) r2 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x11, 0x3, &(0x7f00000000c0)=@framed, &(0x7f00000001c0)='syzkaller\x00', 0x4, 0x8f, &(0x7f00000002c0)=""/143, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x74) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={0x0, r2}, 0x10) 06:18:48 executing program 0: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x0, 0x12, r0, 0x0) preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x9, 0x0) mmap(&(0x7f0000000000/0xa000)=nil, 0xa000, 0x2, 0x2172, 0xffffffffffffffff, 0x0) syz_mount_image$nilfs2(&(0x7f0000000180), &(0x7f0000000200)='./file0\x00', 0xd85, 0x7, &(0x7f00000006c0)=[{&(0x7f0000000240)="997c7e90471ec6786b6aa37fd8fbf290c011bee5642707bf7b126c36024e5e8f0d3d514aa1538eb70908eb3ac1a8a52e0ba29dab8884c189c9b68415aa0226e7c6a7ccf48ad20543b10360ab7ee9b247e4304d92f0ec7c0ba06d8160095660a0f12836e2033baed6228d464479ce22f2fadce176d0750fdc6ab1004eb9c4440707be1dc31c1ce11815d12f0d50eef6477341b3f6a4f364a1fccd68e2bcd2dba76227338cd6a1835a44", 0xa9, 0x8}, {&(0x7f0000000380)="3a79b76eed8bb53c1f5217cb4d40694fa75675b28af54d40304f697a1d04373a7ef7b09d46fa6365d222516dcc92d004bc937a22980c404bb5b5669f3dfd0e569079c03b2855be3337944aea4b03b03a3eb6d7", 0x53, 0x3}, {&(0x7f0000000400)="c8213af91316be74099fc072cc912017e77b8709c846cf00eb99c7c03cee58e25602e6ec0b4b42c8709e4447b0d23296a71661cdb6ea9b13d35ed3206f67e5559840f063e554ed7fcb842ab9b072197358b7a617cb0825abfabe3da9b022ecbe28ebcc22bd651a40dfcf4782be0c0c6d8adb8fdd7afce8c8659cc9eef1483eceb26a223fa9d591e28633e6bf6facd75e4295341e2ef3788284fc4482db16cab37de0c1adbf7fa07ad161ae875284778f49e15a052d875e", 0xb7, 0x80}, {&(0x7f00000004c0)="056b3e2d287f817e74a518293ea19b1196cccb376ac73cd7bbeccaced6f43aa9706b33d8ec56c58be0febb03dadec48add6a378f07f9053f1b6f33fe63a960502ad48232f0bee4a41509d7063d478768ab8ee0a90ebdb7c9bc326d54c8edad7e9d59641faf45c171e35f77f8c38a7563e1555c331a5a3e4da1ce59c0c697ebe071d527f24563165dafd23b45186c3d55251c825d0d7fd16b0f13a2f1321cddbcf231b398a88b19e3915ee544692c3559f42a", 0xb2, 0x6}, {&(0x7f0000000580)="8023d53ac815f8a84b84350b859e8673ed208a78bbfec2e35d6d4927707d5dd61106eb0321af3709c17fe7661323c51575e9c18d7b834c138636224eb1a7d75dd59d5c5d7411bdd4c2b07cf727643f52b1ca3e1680cde001be2f8334303e9f4191c2f9425472ca1ee6bac17fde09f0ce5fdf2e70d3c1a38b2d3e0e804f7df817b6a03e5e1ffea1ca7cd7", 0x8a, 0x8}, {&(0x7f0000000300)="fae83b83fc781c7715", 0x9, 0x8fe}, {&(0x7f0000000640)="96f1e3c89318e48db56867032dd1ba9b0ffeec69eb34236bd93b937c6bb7447840dc021e536b89aad4fe89ca2317f4fe2b36cbbdd8d72d841aee6f7b7be258352406775f169573cbf4da0bcf856f825233c5387a3a7cde778c057d591f2133c10e8b5bdb164577f492130acfc7", 0x6d, 0x5}], 0x802010, &(0x7f0000000740)={[{@order_relaxed}], [{@fsname}, {@fsuuid={'fsuuid', 0x3d, {[0x36, 0x38, 0x61, 0x64, 0x39, 0x38, 0x31, 0x37], 0x2d, [0x62, 0x61, 0x61, 0x63], 0x2d, [0x62, 0x39, 0x33, 0x35], 0x2d, [0x32, 0x37, 0x33, 0x61], 0x2d, [0x61, 0x39, 0x64, 0x65, 0x31, 0x8eb4bab6ccebb2ed, 0x64, 0x62]}}}]}) 06:18:48 executing program 3: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800004, 0x12, r0, 0x0) preadv(r0, &(0x7f00000001c0), 0x0, 0x9, 0x0) mmap(&(0x7f0000000000/0xa000)=nil, 0xa000, 0x2, 0x2172, 0xffffffffffffffff, 0x0) r1 = openat$khugepaged_scan(0xffffff9c, &(0x7f0000000080), 0x1, 0x0) close(r1) 06:18:48 executing program 3: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800004, 0x12, r0, 0x0) preadv(r0, &(0x7f00000001c0), 0x0, 0x9, 0x0) mmap(&(0x7f0000000000/0xa000)=nil, 0xa000, 0x2, 0x2172, 0xffffffffffffffff, 0x0) r1 = openat$khugepaged_scan(0xffffff9c, &(0x7f0000000080), 0x1, 0x0) close(r1) [ 331.290996][T14502] loop0: detected capacity change from 0 to 8 06:18:48 executing program 1: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800004, 0x12, r0, 0x0) preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x0, 0x0) mmap(&(0x7f0000000000/0xa000)=nil, 0xa000, 0x2, 0x2172, 0xffffffffffffffff, 0x0) socketpair(0x29, 0x80005, 0x0, &(0x7f0000000340)={0x0, 0x0}) 06:18:48 executing program 3: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800004, 0x12, r0, 0x0) preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x0, 0x0) mmap(&(0x7f0000000000/0xa000)=nil, 0xa000, 0x2, 0x2172, 0xffffffffffffffff, 0x0) r1 = openat$khugepaged_scan(0xffffff9c, &(0x7f0000000080), 0x1, 0x0) close(r1) 06:18:48 executing program 2: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800004, 0x12, r0, 0x0) preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x9, 0x0) mmap(&(0x7f0000000000/0xa000)=nil, 0xa000, 0x2, 0x2172, 0xffffffffffffffff, 0x0) r1 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x11, 0x3, &(0x7f00000000c0)=@framed, &(0x7f00000001c0)='syzkaller\x00', 0x4, 0x8f, &(0x7f00000002c0)=""/143, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x74) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='ext4_es_lookup_extent_exit\x00', r1}, 0x10) r2 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x11, 0x3, &(0x7f00000000c0)=@framed, &(0x7f00000001c0)='syzkaller\x00', 0x4, 0x8f, &(0x7f00000002c0)=""/143, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x74) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={0x0, r2}, 0x10) 06:18:49 executing program 0: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x0, 0x12, r0, 0x0) preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x9, 0x0) mmap(&(0x7f0000000000/0xa000)=nil, 0xa000, 0x2, 0x2172, 0xffffffffffffffff, 0x0) syz_mount_image$nilfs2(&(0x7f0000000180), &(0x7f0000000200)='./file0\x00', 0xd85, 0x7, &(0x7f00000006c0)=[{&(0x7f0000000240)="997c7e90471ec6786b6aa37fd8fbf290c011bee5642707bf7b126c36024e5e8f0d3d514aa1538eb70908eb3ac1a8a52e0ba29dab8884c189c9b68415aa0226e7c6a7ccf48ad20543b10360ab7ee9b247e4304d92f0ec7c0ba06d8160095660a0f12836e2033baed6228d464479ce22f2fadce176d0750fdc6ab1004eb9c4440707be1dc31c1ce11815d12f0d50eef6477341b3f6a4f364a1fccd68e2bcd2dba76227338cd6a1835a44", 0xa9, 0x8}, {&(0x7f0000000380)="3a79b76eed8bb53c1f5217cb4d40694fa75675b28af54d40304f697a1d04373a7ef7b09d46fa6365d222516dcc92d004bc937a22980c404bb5b5669f3dfd0e569079c03b2855be3337944aea4b03b03a3eb6d7", 0x53, 0x3}, {&(0x7f0000000400)="c8213af91316be74099fc072cc912017e77b8709c846cf00eb99c7c03cee58e25602e6ec0b4b42c8709e4447b0d23296a71661cdb6ea9b13d35ed3206f67e5559840f063e554ed7fcb842ab9b072197358b7a617cb0825abfabe3da9b022ecbe28ebcc22bd651a40dfcf4782be0c0c6d8adb8fdd7afce8c8659cc9eef1483eceb26a223fa9d591e28633e6bf6facd75e4295341e2ef3788284fc4482db16cab37de0c1adbf7fa07ad161ae875284778f49e15a052d875e", 0xb7, 0x80}, {&(0x7f00000004c0)="056b3e2d287f817e74a518293ea19b1196cccb376ac73cd7bbeccaced6f43aa9706b33d8ec56c58be0febb03dadec48add6a378f07f9053f1b6f33fe63a960502ad48232f0bee4a41509d7063d478768ab8ee0a90ebdb7c9bc326d54c8edad7e9d59641faf45c171e35f77f8c38a7563e1555c331a5a3e4da1ce59c0c697ebe071d527f24563165dafd23b45186c3d55251c825d0d7fd16b0f13a2f1321cddbcf231b398a88b19e3915ee544692c3559f42a", 0xb2, 0x6}, {&(0x7f0000000580)="8023d53ac815f8a84b84350b859e8673ed208a78bbfec2e35d6d4927707d5dd61106eb0321af3709c17fe7661323c51575e9c18d7b834c138636224eb1a7d75dd59d5c5d7411bdd4c2b07cf727643f52b1ca3e1680cde001be2f8334303e9f4191c2f9425472ca1ee6bac17fde09f0ce5fdf2e70d3c1a38b2d3e0e804f7df817b6a03e5e1ffea1ca7cd7", 0x8a, 0x8}, {&(0x7f0000000300)="fae83b83fc781c7715", 0x9, 0x8fe}, {&(0x7f0000000640)="96f1e3c89318e48db56867032dd1ba9b0ffeec69eb34236bd93b937c6bb7447840dc021e536b89aad4fe89ca2317f4fe2b36cbbdd8d72d841aee6f7b7be258352406775f169573cbf4da0bcf856f825233c5387a3a7cde778c057d591f2133c10e8b5bdb164577f492130acfc7", 0x6d, 0x5}], 0x802010, &(0x7f0000000740)={[{@order_relaxed}], [{@fsname}, {@fsuuid={'fsuuid', 0x3d, {[0x36, 0x38, 0x61, 0x64, 0x39, 0x38, 0x31, 0x37], 0x2d, [0x62, 0x61, 0x61, 0x63], 0x2d, [0x62, 0x39, 0x33, 0x35], 0x2d, [0x32, 0x37, 0x33, 0x61], 0x2d, [0x61, 0x39, 0x64, 0x65, 0x31, 0x8eb4bab6ccebb2ed, 0x64, 0x62]}}}]}) 06:18:49 executing program 1: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800004, 0x12, r0, 0x0) preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x0, 0x0) mmap(&(0x7f0000000000/0xa000)=nil, 0xa000, 0x2, 0x2172, 0xffffffffffffffff, 0x0) socketpair(0x29, 0x80005, 0x0, &(0x7f0000000340)={0x0, 0x0}) 06:18:49 executing program 3: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800004, 0x12, r0, 0x0) preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x0, 0x0) mmap(&(0x7f0000000000/0xa000)=nil, 0xa000, 0x2, 0x2172, 0xffffffffffffffff, 0x0) r1 = openat$khugepaged_scan(0xffffff9c, &(0x7f0000000080), 0x1, 0x0) close(r1) [ 331.495525][T14521] loop0: detected capacity change from 0 to 8 06:18:49 executing program 1: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800004, 0x12, r0, 0x0) preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x9, 0x0) mmap(&(0x7f0000000000/0xa000)=nil, 0xa000, 0x0, 0x2172, 0xffffffffffffffff, 0x0) socketpair(0x29, 0x80005, 0x0, &(0x7f0000000340)={0x0, 0x0}) 06:18:49 executing program 3: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800004, 0x12, r0, 0x0) preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x0, 0x0) mmap(&(0x7f0000000000/0xa000)=nil, 0xa000, 0x2, 0x2172, 0xffffffffffffffff, 0x0) r1 = openat$khugepaged_scan(0xffffff9c, &(0x7f0000000080), 0x1, 0x0) close(r1) 06:18:49 executing program 2: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800004, 0x12, r0, 0x0) preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x9, 0x0) mmap(&(0x7f0000000000/0xa000)=nil, 0xa000, 0x2, 0x2172, 0xffffffffffffffff, 0x0) r1 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x11, 0x3, &(0x7f00000000c0)=@framed, &(0x7f00000001c0)='syzkaller\x00', 0x4, 0x8f, &(0x7f00000002c0)=""/143, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x74) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='ext4_es_lookup_extent_exit\x00', r1}, 0x10) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x11, 0x3, &(0x7f00000000c0)=@framed, &(0x7f00000001c0)='syzkaller\x00', 0x4, 0x8f, &(0x7f00000002c0)=""/143, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x74) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='ext4_es_lookup_extent_exit\x00'}, 0x10) 06:18:49 executing program 1: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800004, 0x12, r0, 0x0) preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x9, 0x0) mmap(&(0x7f0000000000/0xa000)=nil, 0xa000, 0x0, 0x2172, 0xffffffffffffffff, 0x0) socketpair(0x29, 0x80005, 0x0, &(0x7f0000000340)={0x0, 0x0}) 06:18:49 executing program 0: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800004, 0x10, r0, 0x0) preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x9, 0x0) mmap(&(0x7f0000000000/0xa000)=nil, 0xa000, 0x2, 0x2172, 0xffffffffffffffff, 0x0) syz_mount_image$nilfs2(&(0x7f0000000180), &(0x7f0000000200)='./file0\x00', 0xd85, 0x7, &(0x7f00000006c0)=[{&(0x7f0000000240)="997c7e90471ec6786b6aa37fd8fbf290c011bee5642707bf7b126c36024e5e8f0d3d514aa1538eb70908eb3ac1a8a52e0ba29dab8884c189c9b68415aa0226e7c6a7ccf48ad20543b10360ab7ee9b247e4304d92f0ec7c0ba06d8160095660a0f12836e2033baed6228d464479ce22f2fadce176d0750fdc6ab1004eb9c4440707be1dc31c1ce11815d12f0d50eef6477341b3f6a4f364a1fccd68e2bcd2dba76227338cd6a1835a44", 0xa9, 0x8}, {&(0x7f0000000380)="3a79b76eed8bb53c1f5217cb4d40694fa75675b28af54d40304f697a1d04373a7ef7b09d46fa6365d222516dcc92d004bc937a22980c404bb5b5669f3dfd0e569079c03b2855be3337944aea4b03b03a3eb6d7", 0x53, 0x3}, {&(0x7f0000000400)="c8213af91316be74099fc072cc912017e77b8709c846cf00eb99c7c03cee58e25602e6ec0b4b42c8709e4447b0d23296a71661cdb6ea9b13d35ed3206f67e5559840f063e554ed7fcb842ab9b072197358b7a617cb0825abfabe3da9b022ecbe28ebcc22bd651a40dfcf4782be0c0c6d8adb8fdd7afce8c8659cc9eef1483eceb26a223fa9d591e28633e6bf6facd75e4295341e2ef3788284fc4482db16cab37de0c1adbf7fa07ad161ae875284778f49e15a052d875e", 0xb7, 0x80}, {&(0x7f00000004c0)="056b3e2d287f817e74a518293ea19b1196cccb376ac73cd7bbeccaced6f43aa9706b33d8ec56c58be0febb03dadec48add6a378f07f9053f1b6f33fe63a960502ad48232f0bee4a41509d7063d478768ab8ee0a90ebdb7c9bc326d54c8edad7e9d59641faf45c171e35f77f8c38a7563e1555c331a5a3e4da1ce59c0c697ebe071d527f24563165dafd23b45186c3d55251c825d0d7fd16b0f13a2f1321cddbcf231b398a88b19e3915ee544692c3559f42a", 0xb2, 0x6}, {&(0x7f0000000580)="8023d53ac815f8a84b84350b859e8673ed208a78bbfec2e35d6d4927707d5dd61106eb0321af3709c17fe7661323c51575e9c18d7b834c138636224eb1a7d75dd59d5c5d7411bdd4c2b07cf727643f52b1ca3e1680cde001be2f8334303e9f4191c2f9425472ca1ee6bac17fde09f0ce5fdf2e70d3c1a38b2d3e0e804f7df817b6a03e5e1ffea1ca7cd7", 0x8a, 0x8}, {&(0x7f0000000300)="fae83b83fc781c7715", 0x9, 0x8fe}, {&(0x7f0000000640)="96f1e3c89318e48db56867032dd1ba9b0ffeec69eb34236bd93b937c6bb7447840dc021e536b89aad4fe89ca2317f4fe2b36cbbdd8d72d841aee6f7b7be258352406775f169573cbf4da0bcf856f825233c5387a3a7cde778c057d591f2133c10e8b5bdb164577f492130acfc7", 0x6d, 0x5}], 0x802010, &(0x7f0000000740)={[{@order_relaxed}], [{@fsname}, {@fsuuid={'fsuuid', 0x3d, {[0x36, 0x38, 0x61, 0x64, 0x39, 0x38, 0x31, 0x37], 0x2d, [0x62, 0x61, 0x61, 0x63], 0x2d, [0x62, 0x39, 0x33, 0x35], 0x2d, [0x32, 0x37, 0x33, 0x61], 0x2d, [0x61, 0x39, 0x64, 0x65, 0x31, 0x8eb4bab6ccebb2ed, 0x64, 0x62]}}}]}) 06:18:49 executing program 3: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800004, 0x12, r0, 0x0) preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x9, 0x0) mmap(&(0x7f0000000000/0xa000)=nil, 0xa000, 0x0, 0x2172, 0xffffffffffffffff, 0x0) r1 = openat$khugepaged_scan(0xffffff9c, &(0x7f0000000080), 0x1, 0x0) close(r1) [ 331.633639][T14533] loop0: detected capacity change from 0 to 8 06:18:49 executing program 2: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800004, 0x12, r0, 0x0) preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x9, 0x0) mmap(&(0x7f0000000000/0xa000)=nil, 0xa000, 0x2, 0x2172, 0xffffffffffffffff, 0x0) r1 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x11, 0x3, &(0x7f00000000c0)=@framed, &(0x7f00000001c0)='syzkaller\x00', 0x4, 0x8f, &(0x7f00000002c0)=""/143, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x74) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='ext4_es_lookup_extent_exit\x00', r1}, 0x10) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x11, 0x3, &(0x7f00000000c0)=@framed, &(0x7f00000001c0)='syzkaller\x00', 0x4, 0x8f, &(0x7f00000002c0)=""/143, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x74) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='ext4_es_lookup_extent_exit\x00'}, 0x10) 06:18:49 executing program 1: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800004, 0x12, r0, 0x0) preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x9, 0x0) mmap(&(0x7f0000000000/0xa000)=nil, 0xa000, 0x0, 0x2172, 0xffffffffffffffff, 0x0) socketpair(0x29, 0x80005, 0x0, &(0x7f0000000340)={0x0, 0x0}) 06:18:49 executing program 3: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800004, 0x12, r0, 0x0) preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x9, 0x0) mmap(&(0x7f0000000000/0xa000)=nil, 0xa000, 0x0, 0x2172, 0xffffffffffffffff, 0x0) r1 = openat$khugepaged_scan(0xffffff9c, &(0x7f0000000080), 0x1, 0x0) close(r1) 06:18:49 executing program 0: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800004, 0x10, r0, 0x0) preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x9, 0x0) mmap(&(0x7f0000000000/0xa000)=nil, 0xa000, 0x2, 0x2172, 0xffffffffffffffff, 0x0) syz_mount_image$nilfs2(&(0x7f0000000180), &(0x7f0000000200)='./file0\x00', 0xd85, 0x7, &(0x7f00000006c0)=[{&(0x7f0000000240)="997c7e90471ec6786b6aa37fd8fbf290c011bee5642707bf7b126c36024e5e8f0d3d514aa1538eb70908eb3ac1a8a52e0ba29dab8884c189c9b68415aa0226e7c6a7ccf48ad20543b10360ab7ee9b247e4304d92f0ec7c0ba06d8160095660a0f12836e2033baed6228d464479ce22f2fadce176d0750fdc6ab1004eb9c4440707be1dc31c1ce11815d12f0d50eef6477341b3f6a4f364a1fccd68e2bcd2dba76227338cd6a1835a44", 0xa9, 0x8}, {&(0x7f0000000380)="3a79b76eed8bb53c1f5217cb4d40694fa75675b28af54d40304f697a1d04373a7ef7b09d46fa6365d222516dcc92d004bc937a22980c404bb5b5669f3dfd0e569079c03b2855be3337944aea4b03b03a3eb6d7", 0x53, 0x3}, {&(0x7f0000000400)="c8213af91316be74099fc072cc912017e77b8709c846cf00eb99c7c03cee58e25602e6ec0b4b42c8709e4447b0d23296a71661cdb6ea9b13d35ed3206f67e5559840f063e554ed7fcb842ab9b072197358b7a617cb0825abfabe3da9b022ecbe28ebcc22bd651a40dfcf4782be0c0c6d8adb8fdd7afce8c8659cc9eef1483eceb26a223fa9d591e28633e6bf6facd75e4295341e2ef3788284fc4482db16cab37de0c1adbf7fa07ad161ae875284778f49e15a052d875e", 0xb7, 0x80}, {&(0x7f00000004c0)="056b3e2d287f817e74a518293ea19b1196cccb376ac73cd7bbeccaced6f43aa9706b33d8ec56c58be0febb03dadec48add6a378f07f9053f1b6f33fe63a960502ad48232f0bee4a41509d7063d478768ab8ee0a90ebdb7c9bc326d54c8edad7e9d59641faf45c171e35f77f8c38a7563e1555c331a5a3e4da1ce59c0c697ebe071d527f24563165dafd23b45186c3d55251c825d0d7fd16b0f13a2f1321cddbcf231b398a88b19e3915ee544692c3559f42a", 0xb2, 0x6}, {&(0x7f0000000580)="8023d53ac815f8a84b84350b859e8673ed208a78bbfec2e35d6d4927707d5dd61106eb0321af3709c17fe7661323c51575e9c18d7b834c138636224eb1a7d75dd59d5c5d7411bdd4c2b07cf727643f52b1ca3e1680cde001be2f8334303e9f4191c2f9425472ca1ee6bac17fde09f0ce5fdf2e70d3c1a38b2d3e0e804f7df817b6a03e5e1ffea1ca7cd7", 0x8a, 0x8}, {&(0x7f0000000300)="fae83b83fc781c7715", 0x9, 0x8fe}, {&(0x7f0000000640)="96f1e3c89318e48db56867032dd1ba9b0ffeec69eb34236bd93b937c6bb7447840dc021e536b89aad4fe89ca2317f4fe2b36cbbdd8d72d841aee6f7b7be258352406775f169573cbf4da0bcf856f825233c5387a3a7cde778c057d591f2133c10e8b5bdb164577f492130acfc7", 0x6d, 0x5}], 0x802010, &(0x7f0000000740)={[{@order_relaxed}], [{@fsname}, {@fsuuid={'fsuuid', 0x3d, {[0x36, 0x38, 0x61, 0x64, 0x39, 0x38, 0x31, 0x37], 0x2d, [0x62, 0x61, 0x61, 0x63], 0x2d, [0x62, 0x39, 0x33, 0x35], 0x2d, [0x32, 0x37, 0x33, 0x61], 0x2d, [0x61, 0x39, 0x64, 0x65, 0x31, 0x8eb4bab6ccebb2ed, 0x64, 0x62]}}}]}) 06:18:49 executing program 1: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800004, 0x12, r0, 0x0) preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x9, 0x0) mmap(&(0x7f0000000000/0xa000)=nil, 0xa000, 0x2, 0x10, 0xffffffffffffffff, 0x0) socketpair(0x29, 0x80005, 0x0, &(0x7f0000000340)={0x0, 0x0}) 06:18:49 executing program 3: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800004, 0x12, r0, 0x0) preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x9, 0x0) mmap(&(0x7f0000000000/0xa000)=nil, 0xa000, 0x0, 0x2172, 0xffffffffffffffff, 0x0) r1 = openat$khugepaged_scan(0xffffff9c, &(0x7f0000000080), 0x1, 0x0) close(r1) 06:18:49 executing program 2: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800004, 0x12, r0, 0x0) preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x9, 0x0) mmap(&(0x7f0000000000/0xa000)=nil, 0xa000, 0x2, 0x2172, 0xffffffffffffffff, 0x0) r1 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x11, 0x3, &(0x7f00000000c0)=@framed, &(0x7f00000001c0)='syzkaller\x00', 0x4, 0x8f, &(0x7f00000002c0)=""/143, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x74) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='ext4_es_lookup_extent_exit\x00', r1}, 0x10) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x11, 0x3, &(0x7f00000000c0)=@framed, &(0x7f00000001c0)='syzkaller\x00', 0x4, 0x8f, &(0x7f00000002c0)=""/143, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x74) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='ext4_es_lookup_extent_exit\x00'}, 0x10) 06:18:49 executing program 1: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800004, 0x12, r0, 0x0) preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x9, 0x0) mmap(&(0x7f0000000000/0xa000)=nil, 0xa000, 0x2, 0x10, 0xffffffffffffffff, 0x0) socketpair(0x29, 0x80005, 0x0, &(0x7f0000000340)={0x0, 0x0}) [ 331.835838][T14551] loop0: detected capacity change from 0 to 8 06:18:49 executing program 3: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800004, 0x12, r0, 0x0) preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x9, 0x0) mmap(&(0x7f0000000000/0xa000)=nil, 0xa000, 0x2, 0x10, 0xffffffffffffffff, 0x0) r1 = openat$khugepaged_scan(0xffffff9c, &(0x7f0000000080), 0x1, 0x0) close(r1) 06:18:49 executing program 0: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800004, 0x10, r0, 0x0) preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x9, 0x0) mmap(&(0x7f0000000000/0xa000)=nil, 0xa000, 0x2, 0x2172, 0xffffffffffffffff, 0x0) syz_mount_image$nilfs2(&(0x7f0000000180), &(0x7f0000000200)='./file0\x00', 0xd85, 0x7, &(0x7f00000006c0)=[{&(0x7f0000000240)="997c7e90471ec6786b6aa37fd8fbf290c011bee5642707bf7b126c36024e5e8f0d3d514aa1538eb70908eb3ac1a8a52e0ba29dab8884c189c9b68415aa0226e7c6a7ccf48ad20543b10360ab7ee9b247e4304d92f0ec7c0ba06d8160095660a0f12836e2033baed6228d464479ce22f2fadce176d0750fdc6ab1004eb9c4440707be1dc31c1ce11815d12f0d50eef6477341b3f6a4f364a1fccd68e2bcd2dba76227338cd6a1835a44", 0xa9, 0x8}, {&(0x7f0000000380)="3a79b76eed8bb53c1f5217cb4d40694fa75675b28af54d40304f697a1d04373a7ef7b09d46fa6365d222516dcc92d004bc937a22980c404bb5b5669f3dfd0e569079c03b2855be3337944aea4b03b03a3eb6d7", 0x53, 0x3}, {&(0x7f0000000400)="c8213af91316be74099fc072cc912017e77b8709c846cf00eb99c7c03cee58e25602e6ec0b4b42c8709e4447b0d23296a71661cdb6ea9b13d35ed3206f67e5559840f063e554ed7fcb842ab9b072197358b7a617cb0825abfabe3da9b022ecbe28ebcc22bd651a40dfcf4782be0c0c6d8adb8fdd7afce8c8659cc9eef1483eceb26a223fa9d591e28633e6bf6facd75e4295341e2ef3788284fc4482db16cab37de0c1adbf7fa07ad161ae875284778f49e15a052d875e", 0xb7, 0x80}, {&(0x7f00000004c0)="056b3e2d287f817e74a518293ea19b1196cccb376ac73cd7bbeccaced6f43aa9706b33d8ec56c58be0febb03dadec48add6a378f07f9053f1b6f33fe63a960502ad48232f0bee4a41509d7063d478768ab8ee0a90ebdb7c9bc326d54c8edad7e9d59641faf45c171e35f77f8c38a7563e1555c331a5a3e4da1ce59c0c697ebe071d527f24563165dafd23b45186c3d55251c825d0d7fd16b0f13a2f1321cddbcf231b398a88b19e3915ee544692c3559f42a", 0xb2, 0x6}, {&(0x7f0000000580)="8023d53ac815f8a84b84350b859e8673ed208a78bbfec2e35d6d4927707d5dd61106eb0321af3709c17fe7661323c51575e9c18d7b834c138636224eb1a7d75dd59d5c5d7411bdd4c2b07cf727643f52b1ca3e1680cde001be2f8334303e9f4191c2f9425472ca1ee6bac17fde09f0ce5fdf2e70d3c1a38b2d3e0e804f7df817b6a03e5e1ffea1ca7cd7", 0x8a, 0x8}, {&(0x7f0000000300)="fae83b83fc781c7715", 0x9, 0x8fe}, {&(0x7f0000000640)="96f1e3c89318e48db56867032dd1ba9b0ffeec69eb34236bd93b937c6bb7447840dc021e536b89aad4fe89ca2317f4fe2b36cbbdd8d72d841aee6f7b7be258352406775f169573cbf4da0bcf856f825233c5387a3a7cde778c057d591f2133c10e8b5bdb164577f492130acfc7", 0x6d, 0x5}], 0x802010, &(0x7f0000000740)={[{@order_relaxed}], [{@fsname}, {@fsuuid={'fsuuid', 0x3d, {[0x36, 0x38, 0x61, 0x64, 0x39, 0x38, 0x31, 0x37], 0x2d, [0x62, 0x61, 0x61, 0x63], 0x2d, [0x62, 0x39, 0x33, 0x35], 0x2d, [0x32, 0x37, 0x33, 0x61], 0x2d, [0x61, 0x39, 0x64, 0x65, 0x31, 0x8eb4bab6ccebb2ed, 0x64, 0x62]}}}]}) 06:18:49 executing program 1: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800004, 0x12, r0, 0x0) preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x9, 0x0) mmap(&(0x7f0000000000/0xa000)=nil, 0xa000, 0x2, 0x10, 0xffffffffffffffff, 0x0) socketpair(0x29, 0x80005, 0x0, &(0x7f0000000340)={0x0, 0x0}) 06:18:49 executing program 2: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800004, 0x12, r0, 0x0) preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x9, 0x0) mmap(&(0x7f0000000000/0xa000)=nil, 0xa000, 0x2, 0x10, 0xffffffffffffffff, 0x0) socketpair(0x29, 0x80005, 0x0, &(0x7f0000000340)={0x0, 0x0}) 06:18:49 executing program 3: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800004, 0x12, r0, 0x0) preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x9, 0x0) mmap(&(0x7f0000000000/0xa000)=nil, 0xa000, 0x2, 0x10, 0xffffffffffffffff, 0x0) r1 = openat$khugepaged_scan(0xffffff9c, &(0x7f0000000080), 0x1, 0x0) close(r1) [ 332.011124][T14565] loop0: detected capacity change from 0 to 8 06:18:49 executing program 2: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800004, 0x12, r0, 0x0) preadv(r0, &(0x7f00000001c0), 0x0, 0x9, 0x0) mmap(&(0x7f0000000000/0xa000)=nil, 0xa000, 0x2, 0x2172, 0xffffffffffffffff, 0x0) r1 = openat$khugepaged_scan(0xffffff9c, &(0x7f0000000080), 0x1, 0x0) close(r1) 06:18:49 executing program 1: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800004, 0x12, r0, 0x0) preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x9, 0x0) mmap(&(0x7f0000000000/0xa000)=nil, 0xa000, 0x2, 0x2172, 0xffffffffffffffff, 0x0) socketpair(0x0, 0x80005, 0x0, &(0x7f0000000340)={0x0, 0x0}) 06:18:49 executing program 0: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800004, 0x12, 0xffffffffffffffff, 0x0) preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x9, 0x0) mmap(&(0x7f0000000000/0xa000)=nil, 0xa000, 0x2, 0x2172, 0xffffffffffffffff, 0x0) syz_mount_image$nilfs2(&(0x7f0000000180), &(0x7f0000000200)='./file0\x00', 0xd85, 0x7, &(0x7f00000006c0)=[{&(0x7f0000000240)="997c7e90471ec6786b6aa37fd8fbf290c011bee5642707bf7b126c36024e5e8f0d3d514aa1538eb70908eb3ac1a8a52e0ba29dab8884c189c9b68415aa0226e7c6a7ccf48ad20543b10360ab7ee9b247e4304d92f0ec7c0ba06d8160095660a0f12836e2033baed6228d464479ce22f2fadce176d0750fdc6ab1004eb9c4440707be1dc31c1ce11815d12f0d50eef6477341b3f6a4f364a1fccd68e2bcd2dba76227338cd6a1835a44", 0xa9, 0x8}, {&(0x7f0000000380)="3a79b76eed8bb53c1f5217cb4d40694fa75675b28af54d40304f697a1d04373a7ef7b09d46fa6365d222516dcc92d004bc937a22980c404bb5b5669f3dfd0e569079c03b2855be3337944aea4b03b03a3eb6d7", 0x53, 0x3}, {&(0x7f0000000400)="c8213af91316be74099fc072cc912017e77b8709c846cf00eb99c7c03cee58e25602e6ec0b4b42c8709e4447b0d23296a71661cdb6ea9b13d35ed3206f67e5559840f063e554ed7fcb842ab9b072197358b7a617cb0825abfabe3da9b022ecbe28ebcc22bd651a40dfcf4782be0c0c6d8adb8fdd7afce8c8659cc9eef1483eceb26a223fa9d591e28633e6bf6facd75e4295341e2ef3788284fc4482db16cab37de0c1adbf7fa07ad161ae875284778f49e15a052d875e", 0xb7, 0x80}, {&(0x7f00000004c0)="056b3e2d287f817e74a518293ea19b1196cccb376ac73cd7bbeccaced6f43aa9706b33d8ec56c58be0febb03dadec48add6a378f07f9053f1b6f33fe63a960502ad48232f0bee4a41509d7063d478768ab8ee0a90ebdb7c9bc326d54c8edad7e9d59641faf45c171e35f77f8c38a7563e1555c331a5a3e4da1ce59c0c697ebe071d527f24563165dafd23b45186c3d55251c825d0d7fd16b0f13a2f1321cddbcf231b398a88b19e3915ee544692c3559f42a", 0xb2, 0x6}, {&(0x7f0000000580)="8023d53ac815f8a84b84350b859e8673ed208a78bbfec2e35d6d4927707d5dd61106eb0321af3709c17fe7661323c51575e9c18d7b834c138636224eb1a7d75dd59d5c5d7411bdd4c2b07cf727643f52b1ca3e1680cde001be2f8334303e9f4191c2f9425472ca1ee6bac17fde09f0ce5fdf2e70d3c1a38b2d3e0e804f7df817b6a03e5e1ffea1ca7cd7", 0x8a, 0x8}, {&(0x7f0000000300)="fae83b83fc781c7715", 0x9, 0x8fe}, {&(0x7f0000000640)="96f1e3c89318e48db56867032dd1ba9b0ffeec69eb34236bd93b937c6bb7447840dc021e536b89aad4fe89ca2317f4fe2b36cbbdd8d72d841aee6f7b7be258352406775f169573cbf4da0bcf856f825233c5387a3a7cde778c057d591f2133c10e8b5bdb164577f492130acfc7", 0x6d, 0x5}], 0x802010, &(0x7f0000000740)={[{@order_relaxed}], [{@fsname}, {@fsuuid={'fsuuid', 0x3d, {[0x36, 0x38, 0x61, 0x64, 0x39, 0x38, 0x31, 0x37], 0x2d, [0x62, 0x61, 0x61, 0x63], 0x2d, [0x62, 0x39, 0x33, 0x35], 0x2d, [0x32, 0x37, 0x33, 0x61], 0x2d, [0x61, 0x39, 0x64, 0x65, 0x31, 0x8eb4bab6ccebb2ed, 0x64, 0x62]}}}]}) 06:18:49 executing program 3: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800004, 0x12, r0, 0x0) preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x9, 0x0) mmap(&(0x7f0000000000/0xa000)=nil, 0xa000, 0x2, 0x10, 0xffffffffffffffff, 0x0) r1 = openat$khugepaged_scan(0xffffff9c, &(0x7f0000000080), 0x1, 0x0) close(r1) [ 332.143896][T14578] loop0: detected capacity change from 0 to 8 06:18:49 executing program 2: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800004, 0x12, 0xffffffffffffffff, 0x0) preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x9, 0x0) mmap(&(0x7f0000000000/0xa000)=nil, 0xa000, 0x2, 0x2172, 0xffffffffffffffff, 0x0) r1 = openat$khugepaged_scan(0xffffff9c, &(0x7f0000000080), 0x1, 0x0) close(r1) 06:18:49 executing program 1: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800004, 0x12, r0, 0x0) preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x9, 0x0) mmap(&(0x7f0000000000/0xa000)=nil, 0xa000, 0x2, 0x2172, 0xffffffffffffffff, 0x0) socketpair(0x0, 0x80005, 0x0, &(0x7f0000000340)={0x0, 0x0}) 06:18:49 executing program 3: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800004, 0x12, r0, 0x0) preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x9, 0x0) mmap(&(0x7f0000000000/0xa000)=nil, 0xa000, 0x2, 0x2172, 0xffffffffffffffff, 0x0) r1 = openat$khugepaged_scan(0xffffff9c, 0x0, 0x1, 0x0) close(r1) 06:18:49 executing program 2: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800004, 0x12, 0xffffffffffffffff, 0x0) preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x9, 0x0) mmap(&(0x7f0000000000/0xa000)=nil, 0xa000, 0x2, 0x2172, 0xffffffffffffffff, 0x0) r1 = openat$khugepaged_scan(0xffffff9c, &(0x7f0000000080), 0x1, 0x0) close(r1) 06:18:49 executing program 3: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800004, 0x12, r0, 0x0) preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x9, 0x0) mmap(&(0x7f0000000000/0xa000)=nil, 0xa000, 0x2, 0x2172, 0xffffffffffffffff, 0x0) r1 = openat$khugepaged_scan(0xffffff9c, 0x0, 0x1, 0x0) close(r1) 06:18:49 executing program 0: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800004, 0x12, 0xffffffffffffffff, 0x0) preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x9, 0x0) mmap(&(0x7f0000000000/0xa000)=nil, 0xa000, 0x2, 0x2172, 0xffffffffffffffff, 0x0) syz_mount_image$nilfs2(&(0x7f0000000180), &(0x7f0000000200)='./file0\x00', 0xd85, 0x7, &(0x7f00000006c0)=[{&(0x7f0000000240)="997c7e90471ec6786b6aa37fd8fbf290c011bee5642707bf7b126c36024e5e8f0d3d514aa1538eb70908eb3ac1a8a52e0ba29dab8884c189c9b68415aa0226e7c6a7ccf48ad20543b10360ab7ee9b247e4304d92f0ec7c0ba06d8160095660a0f12836e2033baed6228d464479ce22f2fadce176d0750fdc6ab1004eb9c4440707be1dc31c1ce11815d12f0d50eef6477341b3f6a4f364a1fccd68e2bcd2dba76227338cd6a1835a44", 0xa9, 0x8}, {&(0x7f0000000380)="3a79b76eed8bb53c1f5217cb4d40694fa75675b28af54d40304f697a1d04373a7ef7b09d46fa6365d222516dcc92d004bc937a22980c404bb5b5669f3dfd0e569079c03b2855be3337944aea4b03b03a3eb6d7", 0x53, 0x3}, {&(0x7f0000000400)="c8213af91316be74099fc072cc912017e77b8709c846cf00eb99c7c03cee58e25602e6ec0b4b42c8709e4447b0d23296a71661cdb6ea9b13d35ed3206f67e5559840f063e554ed7fcb842ab9b072197358b7a617cb0825abfabe3da9b022ecbe28ebcc22bd651a40dfcf4782be0c0c6d8adb8fdd7afce8c8659cc9eef1483eceb26a223fa9d591e28633e6bf6facd75e4295341e2ef3788284fc4482db16cab37de0c1adbf7fa07ad161ae875284778f49e15a052d875e", 0xb7, 0x80}, {&(0x7f00000004c0)="056b3e2d287f817e74a518293ea19b1196cccb376ac73cd7bbeccaced6f43aa9706b33d8ec56c58be0febb03dadec48add6a378f07f9053f1b6f33fe63a960502ad48232f0bee4a41509d7063d478768ab8ee0a90ebdb7c9bc326d54c8edad7e9d59641faf45c171e35f77f8c38a7563e1555c331a5a3e4da1ce59c0c697ebe071d527f24563165dafd23b45186c3d55251c825d0d7fd16b0f13a2f1321cddbcf231b398a88b19e3915ee544692c3559f42a", 0xb2, 0x6}, {&(0x7f0000000580)="8023d53ac815f8a84b84350b859e8673ed208a78bbfec2e35d6d4927707d5dd61106eb0321af3709c17fe7661323c51575e9c18d7b834c138636224eb1a7d75dd59d5c5d7411bdd4c2b07cf727643f52b1ca3e1680cde001be2f8334303e9f4191c2f9425472ca1ee6bac17fde09f0ce5fdf2e70d3c1a38b2d3e0e804f7df817b6a03e5e1ffea1ca7cd7", 0x8a, 0x8}, {&(0x7f0000000300)="fae83b83fc781c7715", 0x9, 0x8fe}, {&(0x7f0000000640)="96f1e3c89318e48db56867032dd1ba9b0ffeec69eb34236bd93b937c6bb7447840dc021e536b89aad4fe89ca2317f4fe2b36cbbdd8d72d841aee6f7b7be258352406775f169573cbf4da0bcf856f825233c5387a3a7cde778c057d591f2133c10e8b5bdb164577f492130acfc7", 0x6d, 0x5}], 0x802010, &(0x7f0000000740)={[{@order_relaxed}], [{@fsname}, {@fsuuid={'fsuuid', 0x3d, {[0x36, 0x38, 0x61, 0x64, 0x39, 0x38, 0x31, 0x37], 0x2d, [0x62, 0x61, 0x61, 0x63], 0x2d, [0x62, 0x39, 0x33, 0x35], 0x2d, [0x32, 0x37, 0x33, 0x61], 0x2d, [0x61, 0x39, 0x64, 0x65, 0x31, 0x8eb4bab6ccebb2ed, 0x64, 0x62]}}}]}) 06:18:49 executing program 1: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800004, 0x12, r0, 0x0) preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x9, 0x0) mmap(&(0x7f0000000000/0xa000)=nil, 0xa000, 0x2, 0x2172, 0xffffffffffffffff, 0x0) socketpair(0x0, 0x80005, 0x0, &(0x7f0000000340)={0x0, 0x0}) [ 332.336930][T14598] loop0: detected capacity change from 0 to 8 06:18:49 executing program 3: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800004, 0x12, r0, 0x0) preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x9, 0x0) mmap(&(0x7f0000000000/0xa000)=nil, 0xa000, 0x2, 0x2172, 0xffffffffffffffff, 0x0) r1 = openat$khugepaged_scan(0xffffff9c, 0x0, 0x1, 0x0) close(r1) 06:18:49 executing program 2: mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800004, 0x12, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f00000001c0)=[{0x0}], 0x1, 0x9, 0x0) mmap(&(0x7f0000000000/0xa000)=nil, 0xa000, 0x2, 0x2172, 0xffffffffffffffff, 0x0) syz_mount_image$nilfs2(&(0x7f0000000180), &(0x7f0000000200)='./file0\x00', 0xd85, 0x7, &(0x7f00000006c0)=[{&(0x7f0000000240)="997c7e90471ec6786b6aa37fd8fbf290c011bee5642707bf7b126c36024e5e8f0d3d514aa1538eb70908eb3ac1a8a52e0ba29dab8884c189c9b68415aa0226e7c6a7ccf48ad20543b10360ab7ee9b247e4304d92f0ec7c0ba06d8160095660a0f12836e2033baed6228d464479ce22f2fadce176d0750fdc6ab1004eb9c4440707be1dc31c1ce11815d12f0d50eef6477341b3f6a4f364a1fccd68e2bcd2dba76227338cd6a1835a44", 0xa9, 0x8}, {&(0x7f0000000380)="3a79b76eed8bb53c1f5217cb4d40694fa75675b28af54d40304f697a1d04373a7ef7b09d46fa6365d222516dcc92d004bc937a22980c404bb5b5669f3dfd0e569079c03b2855be3337944aea4b03b03a3eb6d7", 0x53, 0x3}, {&(0x7f0000000400)="c8213af91316be74099fc072cc912017e77b8709c846cf00eb99c7c03cee58e25602e6ec0b4b42c8709e4447b0d23296a71661cdb6ea9b13d35ed3206f67e5559840f063e554ed7fcb842ab9b072197358b7a617cb0825abfabe3da9b022ecbe28ebcc22bd651a40dfcf4782be0c0c6d8adb8fdd7afce8c8659cc9eef1483eceb26a223fa9d591e28633e6bf6facd75e4295341e2ef3788284fc4482db16cab37de0c1adbf7fa07ad161ae875284778f49e15a052d875e", 0xb7, 0x80}, {&(0x7f00000004c0)="056b3e2d287f817e74a518293ea19b1196cccb376ac73cd7bbeccaced6f43aa9706b33d8ec56c58be0febb03dadec48add6a378f07f9053f1b6f33fe63a960502ad48232f0bee4a41509d7063d478768ab8ee0a90ebdb7c9bc326d54c8edad7e9d59641faf45c171e35f77f8c38a7563e1555c331a5a3e4da1ce59c0c697ebe071d527f24563165dafd23b45186c3d55251c825d0d7fd16b0f13a2f1321cddbcf231b398a88b19e3915ee544692c3559f42a", 0xb2, 0x6}, {&(0x7f0000000580)="8023d53ac815f8a84b84350b859e8673ed208a78bbfec2e35d6d4927707d5dd61106eb0321af3709c17fe7661323c51575e9c18d7b834c138636224eb1a7d75dd59d5c5d7411bdd4c2b07cf727643f52b1ca3e1680cde001be2f8334303e9f4191c2f9425472ca1ee6bac17fde09f0ce5fdf2e70d3c1a38b2d3e0e804f7df817b6a03e5e1ffea1ca7cd7", 0x8a, 0x8}, {&(0x7f0000000300)="fae83b83fc781c7715", 0x9, 0x8fe}, {&(0x7f0000000640)="96f1e3c89318e48db56867032dd1ba9b0ffeec69eb34236bd93b937c6bb7447840dc021e536b89aad4fe89ca2317f4fe2b36cbbdd8d72d841aee6f7b7be258352406775f169573cbf4da0bcf856f825233c5387a3a7cde778c057d591f2133c10e8b5bdb164577f492130acfc7", 0x6d, 0x5}], 0x802010, &(0x7f0000000740)={[{@order_relaxed}], [{@fsname}, {@fsuuid={'fsuuid', 0x3d, {[0x36, 0x38, 0x61, 0x64, 0x39, 0x38, 0x31, 0x37], 0x2d, [0x62, 0x61, 0x61, 0x63], 0x2d, [0x62, 0x39, 0x33, 0x35], 0x2d, [0x32, 0x37, 0x33, 0x61], 0x2d, [0x61, 0x39, 0x64, 0x65, 0x31, 0x8eb4bab6ccebb2ed, 0x64, 0x62]}}}]}) 06:18:50 executing program 0: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800004, 0x12, 0xffffffffffffffff, 0x0) preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x9, 0x0) mmap(&(0x7f0000000000/0xa000)=nil, 0xa000, 0x2, 0x2172, 0xffffffffffffffff, 0x0) syz_mount_image$nilfs2(&(0x7f0000000180), &(0x7f0000000200)='./file0\x00', 0xd85, 0x7, &(0x7f00000006c0)=[{&(0x7f0000000240)="997c7e90471ec6786b6aa37fd8fbf290c011bee5642707bf7b126c36024e5e8f0d3d514aa1538eb70908eb3ac1a8a52e0ba29dab8884c189c9b68415aa0226e7c6a7ccf48ad20543b10360ab7ee9b247e4304d92f0ec7c0ba06d8160095660a0f12836e2033baed6228d464479ce22f2fadce176d0750fdc6ab1004eb9c4440707be1dc31c1ce11815d12f0d50eef6477341b3f6a4f364a1fccd68e2bcd2dba76227338cd6a1835a44", 0xa9, 0x8}, {&(0x7f0000000380)="3a79b76eed8bb53c1f5217cb4d40694fa75675b28af54d40304f697a1d04373a7ef7b09d46fa6365d222516dcc92d004bc937a22980c404bb5b5669f3dfd0e569079c03b2855be3337944aea4b03b03a3eb6d7", 0x53, 0x3}, {&(0x7f0000000400)="c8213af91316be74099fc072cc912017e77b8709c846cf00eb99c7c03cee58e25602e6ec0b4b42c8709e4447b0d23296a71661cdb6ea9b13d35ed3206f67e5559840f063e554ed7fcb842ab9b072197358b7a617cb0825abfabe3da9b022ecbe28ebcc22bd651a40dfcf4782be0c0c6d8adb8fdd7afce8c8659cc9eef1483eceb26a223fa9d591e28633e6bf6facd75e4295341e2ef3788284fc4482db16cab37de0c1adbf7fa07ad161ae875284778f49e15a052d875e", 0xb7, 0x80}, {&(0x7f00000004c0)="056b3e2d287f817e74a518293ea19b1196cccb376ac73cd7bbeccaced6f43aa9706b33d8ec56c58be0febb03dadec48add6a378f07f9053f1b6f33fe63a960502ad48232f0bee4a41509d7063d478768ab8ee0a90ebdb7c9bc326d54c8edad7e9d59641faf45c171e35f77f8c38a7563e1555c331a5a3e4da1ce59c0c697ebe071d527f24563165dafd23b45186c3d55251c825d0d7fd16b0f13a2f1321cddbcf231b398a88b19e3915ee544692c3559f42a", 0xb2, 0x6}, {&(0x7f0000000580)="8023d53ac815f8a84b84350b859e8673ed208a78bbfec2e35d6d4927707d5dd61106eb0321af3709c17fe7661323c51575e9c18d7b834c138636224eb1a7d75dd59d5c5d7411bdd4c2b07cf727643f52b1ca3e1680cde001be2f8334303e9f4191c2f9425472ca1ee6bac17fde09f0ce5fdf2e70d3c1a38b2d3e0e804f7df817b6a03e5e1ffea1ca7cd7", 0x8a, 0x8}, {&(0x7f0000000300)="fae83b83fc781c7715", 0x9, 0x8fe}, {&(0x7f0000000640)="96f1e3c89318e48db56867032dd1ba9b0ffeec69eb34236bd93b937c6bb7447840dc021e536b89aad4fe89ca2317f4fe2b36cbbdd8d72d841aee6f7b7be258352406775f169573cbf4da0bcf856f825233c5387a3a7cde778c057d591f2133c10e8b5bdb164577f492130acfc7", 0x6d, 0x5}], 0x802010, &(0x7f0000000740)={[{@order_relaxed}], [{@fsname}, {@fsuuid={'fsuuid', 0x3d, {[0x36, 0x38, 0x61, 0x64, 0x39, 0x38, 0x31, 0x37], 0x2d, [0x62, 0x61, 0x61, 0x63], 0x2d, [0x62, 0x39, 0x33, 0x35], 0x2d, [0x32, 0x37, 0x33, 0x61], 0x2d, [0x61, 0x39, 0x64, 0x65, 0x31, 0x8eb4bab6ccebb2ed, 0x64, 0x62]}}}]}) [ 332.421705][T14609] loop2: detected capacity change from 0 to 8 06:18:50 executing program 1: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800004, 0x12, r0, 0x0) preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x9, 0x0) mmap(&(0x7f0000000000/0xa000)=nil, 0xa000, 0x2, 0x2172, 0xffffffffffffffff, 0x0) socketpair(0x29, 0x0, 0x0, &(0x7f0000000340)={0x0, 0x0}) 06:18:50 executing program 3: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800004, 0x12, r0, 0x0) preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x9, 0x0) mmap(&(0x7f0000000000/0xa000)=nil, 0xa000, 0x2, 0x2172, 0xffffffffffffffff, 0x0) openat$khugepaged_scan(0xffffff9c, &(0x7f0000000080), 0x1, 0x0) close(0xffffffffffffffff) [ 332.474220][T14613] loop0: detected capacity change from 0 to 8 06:18:50 executing program 1: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800004, 0x12, r0, 0x0) preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x9, 0x0) mmap(&(0x7f0000000000/0xa000)=nil, 0xa000, 0x2, 0x2172, 0xffffffffffffffff, 0x0) socketpair(0x29, 0x0, 0x0, &(0x7f0000000340)={0x0, 0x0}) 06:18:50 executing program 3: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800004, 0x12, r0, 0x0) preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x9, 0x0) mmap(&(0x7f0000000000/0xa000)=nil, 0xa000, 0x2, 0x2172, 0xffffffffffffffff, 0x0) openat$khugepaged_scan(0xffffff9c, &(0x7f0000000080), 0x1, 0x0) close(0xffffffffffffffff) 06:18:50 executing program 2: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800004, 0x10, r0, 0x0) preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x9, 0x0) mmap(&(0x7f0000000000/0xa000)=nil, 0xa000, 0x2, 0x2172, 0xffffffffffffffff, 0x0) r1 = openat$khugepaged_scan(0xffffff9c, &(0x7f0000000080), 0x1, 0x0) close(r1) 06:18:50 executing program 1: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800004, 0x12, r0, 0x0) preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x9, 0x0) mmap(&(0x7f0000000000/0xa000)=nil, 0xa000, 0x2, 0x2172, 0xffffffffffffffff, 0x0) socketpair(0x29, 0x0, 0x0, &(0x7f0000000340)={0x0, 0x0}) 06:18:50 executing program 0: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800004, 0x12, r0, 0x0) preadv(0xffffffffffffffff, &(0x7f00000001c0)=[{0x0}], 0x1, 0x9, 0x0) mmap(&(0x7f0000000000/0xa000)=nil, 0xa000, 0x2, 0x2172, 0xffffffffffffffff, 0x0) syz_mount_image$nilfs2(&(0x7f0000000180), &(0x7f0000000200)='./file0\x00', 0xd85, 0x7, &(0x7f00000006c0)=[{&(0x7f0000000240)="997c7e90471ec6786b6aa37fd8fbf290c011bee5642707bf7b126c36024e5e8f0d3d514aa1538eb70908eb3ac1a8a52e0ba29dab8884c189c9b68415aa0226e7c6a7ccf48ad20543b10360ab7ee9b247e4304d92f0ec7c0ba06d8160095660a0f12836e2033baed6228d464479ce22f2fadce176d0750fdc6ab1004eb9c4440707be1dc31c1ce11815d12f0d50eef6477341b3f6a4f364a1fccd68e2bcd2dba76227338cd6a1835a44", 0xa9, 0x8}, {&(0x7f0000000380)="3a79b76eed8bb53c1f5217cb4d40694fa75675b28af54d40304f697a1d04373a7ef7b09d46fa6365d222516dcc92d004bc937a22980c404bb5b5669f3dfd0e569079c03b2855be3337944aea4b03b03a3eb6d7", 0x53, 0x3}, {&(0x7f0000000400)="c8213af91316be74099fc072cc912017e77b8709c846cf00eb99c7c03cee58e25602e6ec0b4b42c8709e4447b0d23296a71661cdb6ea9b13d35ed3206f67e5559840f063e554ed7fcb842ab9b072197358b7a617cb0825abfabe3da9b022ecbe28ebcc22bd651a40dfcf4782be0c0c6d8adb8fdd7afce8c8659cc9eef1483eceb26a223fa9d591e28633e6bf6facd75e4295341e2ef3788284fc4482db16cab37de0c1adbf7fa07ad161ae875284778f49e15a052d875e", 0xb7, 0x80}, {&(0x7f00000004c0)="056b3e2d287f817e74a518293ea19b1196cccb376ac73cd7bbeccaced6f43aa9706b33d8ec56c58be0febb03dadec48add6a378f07f9053f1b6f33fe63a960502ad48232f0bee4a41509d7063d478768ab8ee0a90ebdb7c9bc326d54c8edad7e9d59641faf45c171e35f77f8c38a7563e1555c331a5a3e4da1ce59c0c697ebe071d527f24563165dafd23b45186c3d55251c825d0d7fd16b0f13a2f1321cddbcf231b398a88b19e3915ee544692c3559f42a", 0xb2, 0x6}, {&(0x7f0000000580)="8023d53ac815f8a84b84350b859e8673ed208a78bbfec2e35d6d4927707d5dd61106eb0321af3709c17fe7661323c51575e9c18d7b834c138636224eb1a7d75dd59d5c5d7411bdd4c2b07cf727643f52b1ca3e1680cde001be2f8334303e9f4191c2f9425472ca1ee6bac17fde09f0ce5fdf2e70d3c1a38b2d3e0e804f7df817b6a03e5e1ffea1ca7cd7", 0x8a, 0x8}, {&(0x7f0000000300)="fae83b83fc781c7715", 0x9, 0x8fe}, {&(0x7f0000000640)="96f1e3c89318e48db56867032dd1ba9b0ffeec69eb34236bd93b937c6bb7447840dc021e536b89aad4fe89ca2317f4fe2b36cbbdd8d72d841aee6f7b7be258352406775f169573cbf4da0bcf856f825233c5387a3a7cde778c057d591f2133c10e8b5bdb164577f492130acfc7", 0x6d, 0x5}], 0x802010, &(0x7f0000000740)={[{@order_relaxed}], [{@fsname}, {@fsuuid={'fsuuid', 0x3d, {[0x36, 0x38, 0x61, 0x64, 0x39, 0x38, 0x31, 0x37], 0x2d, [0x62, 0x61, 0x61, 0x63], 0x2d, [0x62, 0x39, 0x33, 0x35], 0x2d, [0x32, 0x37, 0x33, 0x61], 0x2d, [0x61, 0x39, 0x64, 0x65, 0x31, 0x8eb4bab6ccebb2ed, 0x64, 0x62]}}}]}) 06:18:50 executing program 3: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800004, 0x12, r0, 0x0) preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x9, 0x0) mmap(&(0x7f0000000000/0xa000)=nil, 0xa000, 0x2, 0x2172, 0xffffffffffffffff, 0x0) openat$khugepaged_scan(0xffffff9c, &(0x7f0000000080), 0x1, 0x0) close(0xffffffffffffffff) [ 332.596518][T14632] loop0: detected capacity change from 0 to 8 06:18:50 executing program 2: r0 = openat(0xffffffffffffffff, 0x0, 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800004, 0x12, r0, 0x0) preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x9, 0x0) mmap(&(0x7f0000000000/0xa000)=nil, 0xa000, 0x2, 0x2172, 0xffffffffffffffff, 0x0) socketpair(0x29, 0x80005, 0x0, &(0x7f0000000340)={0x0, 0x0}) 06:18:50 executing program 1: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800004, 0x12, r0, 0x0) preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x9, 0x0) mmap(&(0x7f0000000000/0xa000)=nil, 0xa000, 0x2, 0x2172, 0xffffffffffffffff, 0x0) socketpair(0x29, 0x80005, 0x0, 0x0) 06:18:50 executing program 3: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x9, 0x0) mmap(&(0x7f0000000000/0xa000)=nil, 0xa000, 0x2, 0x2172, 0xffffffffffffffff, 0x0) r1 = openat$khugepaged_scan(0xffffff9c, &(0x7f0000000080), 0x1, 0x0) close(r1) 06:18:50 executing program 2: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800004, 0x12, r0, 0x0) preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x9, 0x0) r1 = openat$khugepaged_scan(0xffffff9c, &(0x7f0000000080), 0x1, 0x0) close(r1) 06:18:50 executing program 1: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800004, 0x12, r0, 0x0) preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x9, 0x0) mmap(&(0x7f0000000000/0xa000)=nil, 0xa000, 0x2, 0x2172, 0xffffffffffffffff, 0x0) socketpair(0x29, 0x80005, 0x0, 0x0) 06:18:50 executing program 0: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800004, 0x12, r0, 0x0) preadv(0xffffffffffffffff, &(0x7f00000001c0)=[{0x0}], 0x1, 0x9, 0x0) mmap(&(0x7f0000000000/0xa000)=nil, 0xa000, 0x2, 0x2172, 0xffffffffffffffff, 0x0) syz_mount_image$nilfs2(&(0x7f0000000180), &(0x7f0000000200)='./file0\x00', 0xd85, 0x7, &(0x7f00000006c0)=[{&(0x7f0000000240)="997c7e90471ec6786b6aa37fd8fbf290c011bee5642707bf7b126c36024e5e8f0d3d514aa1538eb70908eb3ac1a8a52e0ba29dab8884c189c9b68415aa0226e7c6a7ccf48ad20543b10360ab7ee9b247e4304d92f0ec7c0ba06d8160095660a0f12836e2033baed6228d464479ce22f2fadce176d0750fdc6ab1004eb9c4440707be1dc31c1ce11815d12f0d50eef6477341b3f6a4f364a1fccd68e2bcd2dba76227338cd6a1835a44", 0xa9, 0x8}, {&(0x7f0000000380)="3a79b76eed8bb53c1f5217cb4d40694fa75675b28af54d40304f697a1d04373a7ef7b09d46fa6365d222516dcc92d004bc937a22980c404bb5b5669f3dfd0e569079c03b2855be3337944aea4b03b03a3eb6d7", 0x53, 0x3}, {&(0x7f0000000400)="c8213af91316be74099fc072cc912017e77b8709c846cf00eb99c7c03cee58e25602e6ec0b4b42c8709e4447b0d23296a71661cdb6ea9b13d35ed3206f67e5559840f063e554ed7fcb842ab9b072197358b7a617cb0825abfabe3da9b022ecbe28ebcc22bd651a40dfcf4782be0c0c6d8adb8fdd7afce8c8659cc9eef1483eceb26a223fa9d591e28633e6bf6facd75e4295341e2ef3788284fc4482db16cab37de0c1adbf7fa07ad161ae875284778f49e15a052d875e", 0xb7, 0x80}, {&(0x7f00000004c0)="056b3e2d287f817e74a518293ea19b1196cccb376ac73cd7bbeccaced6f43aa9706b33d8ec56c58be0febb03dadec48add6a378f07f9053f1b6f33fe63a960502ad48232f0bee4a41509d7063d478768ab8ee0a90ebdb7c9bc326d54c8edad7e9d59641faf45c171e35f77f8c38a7563e1555c331a5a3e4da1ce59c0c697ebe071d527f24563165dafd23b45186c3d55251c825d0d7fd16b0f13a2f1321cddbcf231b398a88b19e3915ee544692c3559f42a", 0xb2, 0x6}, {&(0x7f0000000580)="8023d53ac815f8a84b84350b859e8673ed208a78bbfec2e35d6d4927707d5dd61106eb0321af3709c17fe7661323c51575e9c18d7b834c138636224eb1a7d75dd59d5c5d7411bdd4c2b07cf727643f52b1ca3e1680cde001be2f8334303e9f4191c2f9425472ca1ee6bac17fde09f0ce5fdf2e70d3c1a38b2d3e0e804f7df817b6a03e5e1ffea1ca7cd7", 0x8a, 0x8}, {&(0x7f0000000300)="fae83b83fc781c7715", 0x9, 0x8fe}, {&(0x7f0000000640)="96f1e3c89318e48db56867032dd1ba9b0ffeec69eb34236bd93b937c6bb7447840dc021e536b89aad4fe89ca2317f4fe2b36cbbdd8d72d841aee6f7b7be258352406775f169573cbf4da0bcf856f825233c5387a3a7cde778c057d591f2133c10e8b5bdb164577f492130acfc7", 0x6d, 0x5}], 0x802010, &(0x7f0000000740)={[{@order_relaxed}], [{@fsname}, {@fsuuid={'fsuuid', 0x3d, {[0x36, 0x38, 0x61, 0x64, 0x39, 0x38, 0x31, 0x37], 0x2d, [0x62, 0x61, 0x61, 0x63], 0x2d, [0x62, 0x39, 0x33, 0x35], 0x2d, [0x32, 0x37, 0x33, 0x61], 0x2d, [0x61, 0x39, 0x64, 0x65, 0x31, 0x8eb4bab6ccebb2ed, 0x64, 0x62]}}}]}) 06:18:50 executing program 2: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800004, 0x12, r0, 0x0) preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x9, 0x0) r1 = socket$unix(0x1, 0x1, 0x0) bind$unix(r1, &(0x7f00000001c0)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x56) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x100000a, 0x13, r1, 0x285ad000) r2 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x11, 0x4, &(0x7f00000000c0)=ANY=[@ANYBLOB="18000000000000000000000000000000850000007b0000009500000000000000"], &(0x7f00000001c0)='syzkaller\x00', 0x4, 0x8f, &(0x7f00000002c0)=""/143, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='ext4_es_lookup_extent_exit\x00', r2}, 0x10) write$binfmt_elf32(r2, &(0x7f0000000380)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x2, 0x7, 0x1f, 0x6, 0x2, 0x3e, 0x70cc, 0x277, 0x34, 0x238, 0x3, 0x0, 0x20, 0x1, 0x4, 0x5, 0x3}, [{0x6474e551, 0x40, 0x2, 0x40000000, 0x1, 0x80, 0x1, 0xffffffff}, {0x6474e551, 0x8, 0x68, 0x80000000, 0x1, 0xffffffc0, 0x5, 0x3}], "cddb2636616f9eedd3ce3c19a74d64f8494bea4c266ec1b74ba94ea1db55171a67253dcdb1b481cbddefc51afc5d4a3b4bd6ac5cff43552908ce38a9d109838616661728584955ac29706dea357d03b160d088c8a1b9c8c32b5174fc52891f4dba0cfc1580d661a2c3bba7fa88a03b787b023710c6255c4cf55d599c23d6c7985832d8e9aa0628ac3b2e0338", ['\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00']}, 0x900) mmap(&(0x7f0000000000/0xa000)=nil, 0xa000, 0x2, 0x2172, 0xffffffffffffffff, 0x0) socketpair(0x29, 0x80005, 0x0, &(0x7f0000000340)={0x0, 0x0}) 06:18:50 executing program 3: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800004, 0x12, r0, 0x0) preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x9, 0x0) mmap(&(0x7f0000000000/0xa000)=nil, 0xa000, 0x2, 0x2172, 0xffffffffffffffff, 0x0) socketpair(0x1e, 0x80005, 0x0, &(0x7f0000000340)={0x0, 0x0}) close(r1) r3 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) ioctl$FS_IOC_SETVERSION(r3, 0x40047602, &(0x7f0000000040)=0xfffd) syz_mount_image$nilfs2(&(0x7f0000000180), &(0x7f0000000200)='./file0\x00', 0xd85, 0x7, &(0x7f00000006c0)=[{&(0x7f0000000240)="997c7e90471ec6786b6aa37fd8fbf290c011bee5642707bf7b126c36024e5e8f0d3d514aa1538eb70908eb3ac1a8a52e0ba29dab8884c189c9b68415aa0226e7c6a7ccf48ad20543b10360ab7ee9b247e4304d92f0ec7c0ba06d8160095660a0f12836e2033baed6228d464479ce22f2fadce176d0750fdc6ab1004eb9c4440707be1dc31c1ce11815d12f0d50eef6477341b3f6a4f364a1fccd68e2bcd2dba76227338cd6a1835a44", 0xa9, 0x8}, {&(0x7f0000000380)="3a79b76eed8bb53c1f5217cb4d40694fa75675b28af54d40304f697a1d04373a7ef7b09d46fa6365d222516dcc92d004bc937a22980c404bb5b5669f3dfd0e569079c03b2855be3337944aea4b03b03a3eb6d7", 0x53, 0x3}, {&(0x7f0000000400)="c8213af91316be74099fc072cc912017e77b8709c846cf00eb99c7c03cee58e25602e6ec0b4b42c8709e4447b0d23296a71661cdb6ea9b13d35ed3206f67e5559840f063e554ed7fcb842ab9b072197358b7a617cb0825abfabe3da9b022ecbe28ebcc22bd651a40dfcf4782be0c0c6d8adb8fdd7afce8c8659cc9eef1483eceb26a223fa9d591e28633e6bf6facd75e4295341e2ef3788284fc4482db16cab37de0c1adbf7fa07ad161ae875284778f49e15a052d875e", 0xb7, 0x80}, {&(0x7f00000004c0)="056b3e2d287f817e74a518293ea19b1196cccb376ac73cd7bbeccaced6f43aa9706b33d8ec56c58be0febb03dadec48add6a378f07f9053f1b6f33fe63a960502ad48232f0bee4a41509d7063d478768ab8ee0a90ebdb7c9bc326d54c8edad7e9d59641faf45c171e35f77f8c38a7563e1555c331a5a3e4da1ce59c0c697ebe071d527f24563165dafd23b45186c3d55251c825d0d7fd16b0f13a2f1321cddbcf231b398a88b19e3915ee544692c3559f42a", 0xb2, 0x6}, {&(0x7f0000000580)="8023d53ac815f8a84b84350b859e8673ed208a78bbfec2e35d6d4927707d5dd61106eb0321af3709c17fe7661323c51575e9c18d7b834c138636224eb1a7d75dd59d5c5d7411bdd4c2b07cf727643f52b1ca3e1680cde001be2f8334303e9f4191c2f9425472ca1ee6bac17fde09f0ce5fdf2e70d3c1a38b2d3e0e804f7df817b6a03e5e1ffea1ca7cd7", 0x8a, 0x8}, {&(0x7f0000000300)="fae83b83fc781c7715", 0x9, 0x8fe}, {&(0x7f0000000640)="96f1e3c89318e48db56867032dd1ba9b0ffeec69eb34236bd93b937c6bb7447840dc021e536b89aad4fe89ca2317f4fe2b36cbbdd8d72d841aee6f7b7be258352406775f169573cbf4da0bcf856f825233c5387a3a7cde778c057d591f2133c10e8b5bdb164577f492130acfc7", 0x6d, 0x5}], 0x802010, &(0x7f0000000740)={[{@order_relaxed}], [{@fsname}, {@fsuuid={'fsuuid', 0x3d, {[0x36, 0x38, 0x61, 0x64, 0x39, 0x38, 0x31, 0x37], 0x2d, [0x62, 0x61, 0x61, 0x63], 0x2d, [0x62, 0x39, 0x33, 0x35], 0x2d, [0x32, 0x37, 0x33, 0x61], 0x2d, [0x61, 0x39, 0x64, 0x65, 0x31, 0x8eb4bab6ccebb2ed, 0x64, 0x62]}}}]}) ioctl$sock_SIOCETHTOOL(r2, 0x8946, &(0x7f0000000140)={'veth1_to_bridge\x00', &(0x7f0000000100)=@ethtool_pauseparam={0x12, 0x6, 0x8, 0x1}}) r4 = openat$khugepaged_scan(0xffffff9c, &(0x7f0000000080), 0x1, 0x0) close(r4) 06:18:50 executing program 1: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800004, 0x12, r0, 0x0) preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x9, 0x0) mmap(&(0x7f0000000000/0xa000)=nil, 0xa000, 0x2, 0x2172, 0xffffffffffffffff, 0x0) socketpair(0x29, 0x80005, 0x0, 0x0) [ 332.750631][T14648] loop0: detected capacity change from 0 to 8 [ 332.790418][T14654] loop3: detected capacity change from 0 to 8 06:18:50 executing program 2: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800004, 0x12, r0, 0x0) preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x9, 0x0) r1 = socket$unix(0x1, 0x1, 0x0) bind$unix(r1, &(0x7f00000001c0)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x56) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x100000a, 0x13, r1, 0x285ad000) r2 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x11, 0x4, &(0x7f00000000c0)=ANY=[@ANYBLOB="18000000000000000000000000000000850000007b0000009500000000000000"], &(0x7f00000001c0)='syzkaller\x00', 0x4, 0x8f, &(0x7f00000002c0)=""/143, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='ext4_es_lookup_extent_exit\x00', r2}, 0x10) write$binfmt_elf32(r2, &(0x7f0000000380)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x2, 0x7, 0x1f, 0x6, 0x2, 0x3e, 0x70cc, 0x277, 0x34, 0x238, 0x3, 0x0, 0x20, 0x1, 0x4, 0x5, 0x3}, [{0x6474e551, 0x40, 0x2, 0x40000000, 0x1, 0x80, 0x1, 0xffffffff}, {0x6474e551, 0x8, 0x68, 0x80000000, 0x1, 0xffffffc0, 0x5, 0x3}], "cddb2636616f9eedd3ce3c19a74d64f8494bea4c266ec1b74ba94ea1db55171a67253dcdb1b481cbddefc51afc5d4a3b4bd6ac5cff43552908ce38a9d109838616661728584955ac29706dea357d03b160d088c8a1b9c8c32b5174fc52891f4dba0cfc1580d661a2c3bba7fa88a03b787b023710c6255c4cf55d599c23d6c7985832d8e9aa0628ac3b2e0338", ['\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00']}, 0x900) mmap(&(0x7f0000000000/0xa000)=nil, 0xa000, 0x2, 0x2172, 0xffffffffffffffff, 0x0) socketpair(0x29, 0x80005, 0x0, &(0x7f0000000340)={0x0, 0x0}) 06:18:50 executing program 1: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800004, 0x12, r0, 0x0) preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x9, 0x0) vmsplice(r0, &(0x7f0000000240)=[{&(0x7f0000000080)="4ab1b8694a30bc0b64f0bf0fa59d6d6310a9fca4f5ca7242c45a43a3f790f1bb52f7d713fdc0e6dfa75a5fa7f39f0c693511ea6a67b64b56fa4550fb865102551e0de8881e54887a6391bc4677137a4e433d75874a6619ff219d8ab89c1fdd9fe0d5ae7f1b35994210b3700e36625640f808", 0x72}, {&(0x7f0000000100)="b4346c01f32075d5cdbe81dc2919a8983c8e9f197195a027c0b95dec78d35df6ebeb63bff0423813616d67337c30bab5b6fb29da1bb7c014982cb6715df37902afa71736216374d5265195d9de49c7b08ac58de319c21a5fd49d6a39aecbae4bd0f079aab13eb24843b657b3b9e2f1e2d0731f5e00a4bafcf845d00e210b9ebf51a2303fbc02c70c9d4c62d4849f61727ffdac8e7a0e5b4b92dc03aa3ec3e37067eda1f5ee14cea961ae21f23d6678", 0xaf}], 0x2, 0xd) ioctl$EXT4_IOC_MIGRATE(r0, 0x6609) mmap(&(0x7f0000000000/0xa000)=nil, 0xa000, 0x2, 0x2172, 0xffffffffffffffff, 0x0) socketpair(0x1e, 0x80005, 0x0, &(0x7f0000000340)={0x0, 0x0}) ioctl$BTRFS_IOC_SCRUB_PROGRESS(r1, 0xc400941d, &(0x7f0000000680)={0x0, 0x1000, 0x7, 0xb84d75b96df9382e}) r2 = socket$unix(0x1, 0x1, 0x0) bind$unix(r2, &(0x7f00000001c0)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x56) ioctl$sock_SIOCETHTOOL(r2, 0x8946, &(0x7f0000000040)={'bond_slave_0\x00', &(0x7f0000000380)=@ethtool_per_queue_op={0x4b, 0xe, [0x7ff, 0x3, 0x101, 0xd28f, 0x4, 0x1, 0x3, 0x4, 0x1, 0x80000001, 0x24d, 0xffffff81, 0x81, 0x4, 0x0, 0x5, 0x1, 0x6, 0x6, 0x9, 0x3c43ddd5, 0x6, 0x7fff, 0x101, 0x3, 0x3f, 0xffffffff, 0x27, 0x9, 0x8, 0x0, 0xffff, 0x6, 0x80000001, 0x5, 0xc14, 0x200, 0x1f, 0x2ef677ce, 0x401, 0x9, 0x5, 0x401, 0x3, 0x17b, 0x3ff, 0xfffff245, 0x6, 0xfffffffb, 0x5, 0x400, 0x80000000, 0xd8, 0x179, 0xfa20000, 0x8, 0x6, 0x0, 0x1, 0x7, 0x5, 0x20, 0x3ff, 0x8, 0x6, 0x3, 0x1, 0x3, 0x3, 0x1ff, 0xff00, 0x0, 0x2ac, 0x2, 0x1ff, 0x0, 0x5, 0x6, 0xfff, 0x7, 0xff, 0x84e, 0xcb, 0x0, 0xd89, 0x2, 0x0, 0x0, 0x7, 0x10000, 0xdb, 0x6, 0x9, 0x0, 0x1f, 0xe9f, 0x9150, 0xffffffff, 0x3, 0x101, 0x9, 0x0, 0xfe29, 0x1, 0x1, 0x1, 0x8, 0x5, 0x5a, 0x1, 0x2, 0x9, 0xa0, 0xffffff24, 0xd3d2, 0x32, 0x80, 0x82, 0x4, 0xf89, 0x4000000, 0x98a, 0x7ff, 0x400, 0x7, 0x2, 0xfff, 0x1], "0b889191f8d8cb46a1b7145bf8f9cc66d6a3c8c5af0b3708251e07524ebaed1d511baacedaaffe5d2cfcf40404978dd5282f82a18e4796daad638fc7a4f044b3f156076b71ea4d6729246da871797e2c13d659610b545658546383f48bb1b06b4cb53fa50d16e43b4c14e144e6814e3c3f2adb174374ae762ba13910e60d8afed3763a3ffe847b79f2e04aea7d045159b703e8182c29799afdd0746aa14e71c3f8fd755f6a7e70bce5ee4e3122339d1119866eb3a730464a86ad90a34ddc0fbe3d49e4304b26c9f3c76c469c8c2e132ada1a7480ee41e4977e9ba9e0bda8fbd70c92e8c6262fd154abeb524c9d79344210457cb5"}}) close(r1) 06:18:50 executing program 0: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800004, 0x12, r0, 0x0) preadv(0xffffffffffffffff, &(0x7f00000001c0)=[{0x0}], 0x1, 0x9, 0x0) mmap(&(0x7f0000000000/0xa000)=nil, 0xa000, 0x2, 0x2172, 0xffffffffffffffff, 0x0) syz_mount_image$nilfs2(&(0x7f0000000180), &(0x7f0000000200)='./file0\x00', 0xd85, 0x7, &(0x7f00000006c0)=[{&(0x7f0000000240)="997c7e90471ec6786b6aa37fd8fbf290c011bee5642707bf7b126c36024e5e8f0d3d514aa1538eb70908eb3ac1a8a52e0ba29dab8884c189c9b68415aa0226e7c6a7ccf48ad20543b10360ab7ee9b247e4304d92f0ec7c0ba06d8160095660a0f12836e2033baed6228d464479ce22f2fadce176d0750fdc6ab1004eb9c4440707be1dc31c1ce11815d12f0d50eef6477341b3f6a4f364a1fccd68e2bcd2dba76227338cd6a1835a44", 0xa9, 0x8}, {&(0x7f0000000380)="3a79b76eed8bb53c1f5217cb4d40694fa75675b28af54d40304f697a1d04373a7ef7b09d46fa6365d222516dcc92d004bc937a22980c404bb5b5669f3dfd0e569079c03b2855be3337944aea4b03b03a3eb6d7", 0x53, 0x3}, {&(0x7f0000000400)="c8213af91316be74099fc072cc912017e77b8709c846cf00eb99c7c03cee58e25602e6ec0b4b42c8709e4447b0d23296a71661cdb6ea9b13d35ed3206f67e5559840f063e554ed7fcb842ab9b072197358b7a617cb0825abfabe3da9b022ecbe28ebcc22bd651a40dfcf4782be0c0c6d8adb8fdd7afce8c8659cc9eef1483eceb26a223fa9d591e28633e6bf6facd75e4295341e2ef3788284fc4482db16cab37de0c1adbf7fa07ad161ae875284778f49e15a052d875e", 0xb7, 0x80}, {&(0x7f00000004c0)="056b3e2d287f817e74a518293ea19b1196cccb376ac73cd7bbeccaced6f43aa9706b33d8ec56c58be0febb03dadec48add6a378f07f9053f1b6f33fe63a960502ad48232f0bee4a41509d7063d478768ab8ee0a90ebdb7c9bc326d54c8edad7e9d59641faf45c171e35f77f8c38a7563e1555c331a5a3e4da1ce59c0c697ebe071d527f24563165dafd23b45186c3d55251c825d0d7fd16b0f13a2f1321cddbcf231b398a88b19e3915ee544692c3559f42a", 0xb2, 0x6}, {&(0x7f0000000580)="8023d53ac815f8a84b84350b859e8673ed208a78bbfec2e35d6d4927707d5dd61106eb0321af3709c17fe7661323c51575e9c18d7b834c138636224eb1a7d75dd59d5c5d7411bdd4c2b07cf727643f52b1ca3e1680cde001be2f8334303e9f4191c2f9425472ca1ee6bac17fde09f0ce5fdf2e70d3c1a38b2d3e0e804f7df817b6a03e5e1ffea1ca7cd7", 0x8a, 0x8}, {&(0x7f0000000300)="fae83b83fc781c7715", 0x9, 0x8fe}, {&(0x7f0000000640)="96f1e3c89318e48db56867032dd1ba9b0ffeec69eb34236bd93b937c6bb7447840dc021e536b89aad4fe89ca2317f4fe2b36cbbdd8d72d841aee6f7b7be258352406775f169573cbf4da0bcf856f825233c5387a3a7cde778c057d591f2133c10e8b5bdb164577f492130acfc7", 0x6d, 0x5}], 0x802010, &(0x7f0000000740)={[{@order_relaxed}], [{@fsname}, {@fsuuid={'fsuuid', 0x3d, {[0x36, 0x38, 0x61, 0x64, 0x39, 0x38, 0x31, 0x37], 0x2d, [0x62, 0x61, 0x61, 0x63], 0x2d, [0x62, 0x39, 0x33, 0x35], 0x2d, [0x32, 0x37, 0x33, 0x61], 0x2d, [0x61, 0x39, 0x64, 0x65, 0x31, 0x8eb4bab6ccebb2ed, 0x64, 0x62]}}}]}) [ 332.876639][T14664] loop0: detected capacity change from 0 to 8 06:18:50 executing program 2: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800004, 0x12, r0, 0x0) preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x9, 0x0) r1 = socket$unix(0x1, 0x1, 0x0) bind$unix(r1, &(0x7f00000001c0)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x56) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x100000a, 0x13, r1, 0x285ad000) r2 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x11, 0x4, &(0x7f00000000c0)=ANY=[@ANYBLOB="18000000000000000000000000000000850000007b0000009500000000000000"], &(0x7f00000001c0)='syzkaller\x00', 0x4, 0x8f, &(0x7f00000002c0)=""/143, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='ext4_es_lookup_extent_exit\x00', r2}, 0x10) write$binfmt_elf32(r2, &(0x7f0000000380)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x2, 0x7, 0x1f, 0x6, 0x2, 0x3e, 0x70cc, 0x277, 0x34, 0x238, 0x3, 0x0, 0x20, 0x1, 0x4, 0x5, 0x3}, [{0x6474e551, 0x40, 0x2, 0x40000000, 0x1, 0x80, 0x1, 0xffffffff}, {0x6474e551, 0x8, 0x68, 0x80000000, 0x1, 0xffffffc0, 0x5, 0x3}], "cddb2636616f9eedd3ce3c19a74d64f8494bea4c266ec1b74ba94ea1db55171a67253dcdb1b481cbddefc51afc5d4a3b4bd6ac5cff43552908ce38a9d109838616661728584955ac29706dea357d03b160d088c8a1b9c8c32b5174fc52891f4dba0cfc1580d661a2c3bba7fa88a03b787b023710c6255c4cf55d599c23d6c7985832d8e9aa0628ac3b2e0338", ['\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00']}, 0x900) mmap(&(0x7f0000000000/0xa000)=nil, 0xa000, 0x2, 0x2172, 0xffffffffffffffff, 0x0) socketpair(0x29, 0x80005, 0x0, &(0x7f0000000340)={0x0, 0x0}) 06:18:50 executing program 3: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f00002cf000/0x3000)=nil, 0x3000, 0x2000001, 0x8010, r0, 0xfffff000) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000001c0), 0x0, 0x0) epoll_ctl$EPOLL_CTL_ADD(r0, 0x1, 0xffffffffffffffff, &(0x7f00000000c0)={0x10002001}) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$TIOCSETD(r2, 0x5423, &(0x7f0000000140)=0x1) ioctl$sock_ipv6_tunnel_SIOCCHGTUNNEL(r2, 0x89f3, &(0x7f0000000180)={'syztnl2\x00', 0x0}) preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x9, 0x0) mmap(&(0x7f0000000000/0xa000)=nil, 0xa000, 0x2, 0x2172, 0xffffffffffffffff, 0x0) r3 = socket$inet_udp(0x2, 0x2, 0x0) mmap(&(0x7f00003ff000/0x3000)=nil, 0x3000, 0x300000e, 0x10010, r3, 0xeefac000) socketpair(0x1, 0x2, 0x100007ff, &(0x7f0000000340)={0x0, 0x0}) r4 = syz_open_dev$mouse(&(0x7f0000000040), 0x5, 0x484002) setsockopt$kcm_KCM_RECV_DISABLE(r4, 0x119, 0x1, &(0x7f0000000080)=0x4, 0x4) r5 = bpf$LINK_GET_FD_BY_ID(0x1e, &(0x7f0000000200), 0x4) r6 = syz_init_net_socket$nl_rdma(0x10, 0x3, 0x10) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='ext4_es_lookup_extent_exit\x00'}, 0x10) close(0xffffffffffffffff) setsockopt$SO_BINDTODEVICE(r6, 0x1, 0x19, &(0x7f0000000100)='veth1_macvtap\x00', 0x10) fcntl$setstatus(r5, 0x4, 0xc00) 06:18:50 executing program 1: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800004, 0x12, r0, 0x0) preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x9, 0x0) vmsplice(r0, &(0x7f0000000240)=[{&(0x7f0000000080)="4ab1b8694a30bc0b64f0bf0fa59d6d6310a9fca4f5ca7242c45a43a3f790f1bb52f7d713fdc0e6dfa75a5fa7f39f0c693511ea6a67b64b56fa4550fb865102551e0de8881e54887a6391bc4677137a4e433d75874a6619ff219d8ab89c1fdd9fe0d5ae7f1b35994210b3700e36625640f808", 0x72}, {&(0x7f0000000100)="b4346c01f32075d5cdbe81dc2919a8983c8e9f197195a027c0b95dec78d35df6ebeb63bff0423813616d67337c30bab5b6fb29da1bb7c014982cb6715df37902afa71736216374d5265195d9de49c7b08ac58de319c21a5fd49d6a39aecbae4bd0f079aab13eb24843b657b3b9e2f1e2d0731f5e00a4bafcf845d00e210b9ebf51a2303fbc02c70c9d4c62d4849f61727ffdac8e7a0e5b4b92dc03aa3ec3e37067eda1f5ee14cea961ae21f23d6678", 0xaf}], 0x2, 0xd) ioctl$EXT4_IOC_MIGRATE(r0, 0x6609) mmap(&(0x7f0000000000/0xa000)=nil, 0xa000, 0x2, 0x2172, 0xffffffffffffffff, 0x0) socketpair(0x1e, 0x80005, 0x0, &(0x7f0000000340)={0x0, 0x0}) ioctl$BTRFS_IOC_SCRUB_PROGRESS(r1, 0xc400941d, &(0x7f0000000680)={0x0, 0x1000, 0x7, 0xb84d75b96df9382e}) r2 = socket$unix(0x1, 0x1, 0x0) bind$unix(r2, &(0x7f00000001c0)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x56) ioctl$sock_SIOCETHTOOL(r2, 0x8946, &(0x7f0000000040)={'bond_slave_0\x00', &(0x7f0000000380)=@ethtool_per_queue_op={0x4b, 0xe, [0x7ff, 0x3, 0x101, 0xd28f, 0x4, 0x1, 0x3, 0x4, 0x1, 0x80000001, 0x24d, 0xffffff81, 0x81, 0x4, 0x0, 0x5, 0x1, 0x6, 0x6, 0x9, 0x3c43ddd5, 0x6, 0x7fff, 0x101, 0x3, 0x3f, 0xffffffff, 0x27, 0x9, 0x8, 0x0, 0xffff, 0x6, 0x80000001, 0x5, 0xc14, 0x200, 0x1f, 0x2ef677ce, 0x401, 0x9, 0x5, 0x401, 0x3, 0x17b, 0x3ff, 0xfffff245, 0x6, 0xfffffffb, 0x5, 0x400, 0x80000000, 0xd8, 0x179, 0xfa20000, 0x8, 0x6, 0x0, 0x1, 0x7, 0x5, 0x20, 0x3ff, 0x8, 0x6, 0x3, 0x1, 0x3, 0x3, 0x1ff, 0xff00, 0x0, 0x2ac, 0x2, 0x1ff, 0x0, 0x5, 0x6, 0xfff, 0x7, 0xff, 0x84e, 0xcb, 0x0, 0xd89, 0x2, 0x0, 0x0, 0x7, 0x10000, 0xdb, 0x6, 0x9, 0x0, 0x1f, 0xe9f, 0x9150, 0xffffffff, 0x3, 0x101, 0x9, 0x0, 0xfe29, 0x1, 0x1, 0x1, 0x8, 0x5, 0x5a, 0x1, 0x2, 0x9, 0xa0, 0xffffff24, 0xd3d2, 0x32, 0x80, 0x82, 0x4, 0xf89, 0x4000000, 0x98a, 0x7ff, 0x400, 0x7, 0x2, 0xfff, 0x1], "0b889191f8d8cb46a1b7145bf8f9cc66d6a3c8c5af0b3708251e07524ebaed1d511baacedaaffe5d2cfcf40404978dd5282f82a18e4796daad638fc7a4f044b3f156076b71ea4d6729246da871797e2c13d659610b545658546383f48bb1b06b4cb53fa50d16e43b4c14e144e6814e3c3f2adb174374ae762ba13910e60d8afed3763a3ffe847b79f2e04aea7d045159b703e8182c29799afdd0746aa14e71c3f8fd755f6a7e70bce5ee4e3122339d1119866eb3a730464a86ad90a34ddc0fbe3d49e4304b26c9f3c76c469c8c2e132ada1a7480ee41e4977e9ba9e0bda8fbd70c92e8c6262fd154abeb524c9d79344210457cb5"}}) close(r1) 06:18:50 executing program 0: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800004, 0x12, r0, 0x0) preadv(r0, 0x0, 0x0, 0x9, 0x0) mmap(&(0x7f0000000000/0xa000)=nil, 0xa000, 0x2, 0x2172, 0xffffffffffffffff, 0x0) syz_mount_image$nilfs2(&(0x7f0000000180), &(0x7f0000000200)='./file0\x00', 0xd85, 0x7, &(0x7f00000006c0)=[{&(0x7f0000000240)="997c7e90471ec6786b6aa37fd8fbf290c011bee5642707bf7b126c36024e5e8f0d3d514aa1538eb70908eb3ac1a8a52e0ba29dab8884c189c9b68415aa0226e7c6a7ccf48ad20543b10360ab7ee9b247e4304d92f0ec7c0ba06d8160095660a0f12836e2033baed6228d464479ce22f2fadce176d0750fdc6ab1004eb9c4440707be1dc31c1ce11815d12f0d50eef6477341b3f6a4f364a1fccd68e2bcd2dba76227338cd6a1835a44", 0xa9, 0x8}, {&(0x7f0000000380)="3a79b76eed8bb53c1f5217cb4d40694fa75675b28af54d40304f697a1d04373a7ef7b09d46fa6365d222516dcc92d004bc937a22980c404bb5b5669f3dfd0e569079c03b2855be3337944aea4b03b03a3eb6d7", 0x53, 0x3}, {&(0x7f0000000400)="c8213af91316be74099fc072cc912017e77b8709c846cf00eb99c7c03cee58e25602e6ec0b4b42c8709e4447b0d23296a71661cdb6ea9b13d35ed3206f67e5559840f063e554ed7fcb842ab9b072197358b7a617cb0825abfabe3da9b022ecbe28ebcc22bd651a40dfcf4782be0c0c6d8adb8fdd7afce8c8659cc9eef1483eceb26a223fa9d591e28633e6bf6facd75e4295341e2ef3788284fc4482db16cab37de0c1adbf7fa07ad161ae875284778f49e15a052d875e", 0xb7, 0x80}, {&(0x7f00000004c0)="056b3e2d287f817e74a518293ea19b1196cccb376ac73cd7bbeccaced6f43aa9706b33d8ec56c58be0febb03dadec48add6a378f07f9053f1b6f33fe63a960502ad48232f0bee4a41509d7063d478768ab8ee0a90ebdb7c9bc326d54c8edad7e9d59641faf45c171e35f77f8c38a7563e1555c331a5a3e4da1ce59c0c697ebe071d527f24563165dafd23b45186c3d55251c825d0d7fd16b0f13a2f1321cddbcf231b398a88b19e3915ee544692c3559f42a", 0xb2, 0x6}, {&(0x7f0000000580)="8023d53ac815f8a84b84350b859e8673ed208a78bbfec2e35d6d4927707d5dd61106eb0321af3709c17fe7661323c51575e9c18d7b834c138636224eb1a7d75dd59d5c5d7411bdd4c2b07cf727643f52b1ca3e1680cde001be2f8334303e9f4191c2f9425472ca1ee6bac17fde09f0ce5fdf2e70d3c1a38b2d3e0e804f7df817b6a03e5e1ffea1ca7cd7", 0x8a, 0x8}, {&(0x7f0000000300)="fae83b83fc781c7715", 0x9, 0x8fe}, {&(0x7f0000000640)="96f1e3c89318e48db56867032dd1ba9b0ffeec69eb34236bd93b937c6bb7447840dc021e536b89aad4fe89ca2317f4fe2b36cbbdd8d72d841aee6f7b7be258352406775f169573cbf4da0bcf856f825233c5387a3a7cde778c057d591f2133c10e8b5bdb164577f492130acfc7", 0x6d, 0x5}], 0x802010, &(0x7f0000000740)={[{@order_relaxed}], [{@fsname}, {@fsuuid={'fsuuid', 0x3d, {[0x36, 0x38, 0x61, 0x64, 0x39, 0x38, 0x31, 0x37], 0x2d, [0x62, 0x61, 0x61, 0x63], 0x2d, [0x62, 0x39, 0x33, 0x35], 0x2d, [0x32, 0x37, 0x33, 0x61], 0x2d, [0x61, 0x39, 0x64, 0x65, 0x31, 0x8eb4bab6ccebb2ed, 0x64, 0x62]}}}]}) 06:18:50 executing program 2: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800004, 0x12, r0, 0x0) preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x9, 0x0) r1 = socket$unix(0x1, 0x1, 0x0) bind$unix(r1, &(0x7f00000001c0)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x56) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x100000a, 0x13, r1, 0x285ad000) r2 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x11, 0x4, &(0x7f00000000c0)=ANY=[@ANYBLOB="18000000000000000000000000000000850000007b0000009500000000000000"], &(0x7f00000001c0)='syzkaller\x00', 0x4, 0x8f, &(0x7f00000002c0)=""/143, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='ext4_es_lookup_extent_exit\x00', r2}, 0x10) write$binfmt_elf32(r2, &(0x7f0000000380)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x2, 0x7, 0x1f, 0x6, 0x2, 0x3e, 0x70cc, 0x277, 0x34, 0x238, 0x3, 0x0, 0x20, 0x1, 0x4, 0x5, 0x3}, [{0x6474e551, 0x40, 0x2, 0x40000000, 0x1, 0x80, 0x1, 0xffffffff}, {0x6474e551, 0x8, 0x68, 0x80000000, 0x1, 0xffffffc0, 0x5, 0x3}], "cddb2636616f9eedd3ce3c19a74d64f8494bea4c266ec1b74ba94ea1db55171a67253dcdb1b481cbddefc51afc5d4a3b4bd6ac5cff43552908ce38a9d109838616661728584955ac29706dea357d03b160d088c8a1b9c8c32b5174fc52891f4dba0cfc1580d661a2c3bba7fa88a03b787b023710c6255c4cf55d599c23d6c7985832d8e9aa0628ac3b2e0338", ['\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00']}, 0x900) socketpair(0x29, 0x80005, 0x0, &(0x7f0000000340)={0x0, 0x0}) [ 333.037289][T14689] loop0: detected capacity change from 0 to 8 06:18:50 executing program 2: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800004, 0x12, r0, 0x0) preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x9, 0x0) r1 = socket$unix(0x1, 0x1, 0x0) bind$unix(r1, &(0x7f00000001c0)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x56) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x100000a, 0x13, r1, 0x285ad000) r2 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x11, 0x4, &(0x7f00000000c0)=ANY=[@ANYBLOB="18000000000000000000000000000000850000007b0000009500000000000000"], &(0x7f00000001c0)='syzkaller\x00', 0x4, 0x8f, &(0x7f00000002c0)=""/143, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='ext4_es_lookup_extent_exit\x00', r2}, 0x10) write$binfmt_elf32(r2, &(0x7f0000000380)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x2, 0x7, 0x1f, 0x6, 0x2, 0x3e, 0x70cc, 0x277, 0x34, 0x238, 0x3, 0x0, 0x20, 0x1, 0x4, 0x5, 0x3}, [{0x6474e551, 0x40, 0x2, 0x40000000, 0x1, 0x80, 0x1, 0xffffffff}, {0x6474e551, 0x8, 0x68, 0x80000000, 0x1, 0xffffffc0, 0x5, 0x3}], "cddb2636616f9eedd3ce3c19a74d64f8494bea4c266ec1b74ba94ea1db55171a67253dcdb1b481cbddefc51afc5d4a3b4bd6ac5cff43552908ce38a9d109838616661728584955ac29706dea357d03b160d088c8a1b9c8c32b5174fc52891f4dba0cfc1580d661a2c3bba7fa88a03b787b023710c6255c4cf55d599c23d6c7985832d8e9aa0628ac3b2e0338", ['\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00']}, 0x900) socketpair(0x29, 0x80005, 0x0, &(0x7f0000000340)={0x0, 0x0}) 06:18:50 executing program 1: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800004, 0x12, r0, 0x0) preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x9, 0x0) vmsplice(r0, &(0x7f0000000240)=[{&(0x7f0000000080)="4ab1b8694a30bc0b64f0bf0fa59d6d6310a9fca4f5ca7242c45a43a3f790f1bb52f7d713fdc0e6dfa75a5fa7f39f0c693511ea6a67b64b56fa4550fb865102551e0de8881e54887a6391bc4677137a4e433d75874a6619ff219d8ab89c1fdd9fe0d5ae7f1b35994210b3700e36625640f808", 0x72}, {&(0x7f0000000100)="b4346c01f32075d5cdbe81dc2919a8983c8e9f197195a027c0b95dec78d35df6ebeb63bff0423813616d67337c30bab5b6fb29da1bb7c014982cb6715df37902afa71736216374d5265195d9de49c7b08ac58de319c21a5fd49d6a39aecbae4bd0f079aab13eb24843b657b3b9e2f1e2d0731f5e00a4bafcf845d00e210b9ebf51a2303fbc02c70c9d4c62d4849f61727ffdac8e7a0e5b4b92dc03aa3ec3e37067eda1f5ee14cea961ae21f23d6678", 0xaf}], 0x2, 0xd) ioctl$EXT4_IOC_MIGRATE(r0, 0x6609) mmap(&(0x7f0000000000/0xa000)=nil, 0xa000, 0x2, 0x2172, 0xffffffffffffffff, 0x0) socketpair(0x1e, 0x80005, 0x0, &(0x7f0000000340)={0x0, 0x0}) ioctl$BTRFS_IOC_SCRUB_PROGRESS(r1, 0xc400941d, &(0x7f0000000680)={0x0, 0x1000, 0x7, 0xb84d75b96df9382e}) r2 = socket$unix(0x1, 0x1, 0x0) bind$unix(r2, &(0x7f00000001c0)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x56) ioctl$sock_SIOCETHTOOL(r2, 0x8946, &(0x7f0000000040)={'bond_slave_0\x00', &(0x7f0000000380)=@ethtool_per_queue_op={0x4b, 0xe, [0x7ff, 0x3, 0x101, 0xd28f, 0x4, 0x1, 0x3, 0x4, 0x1, 0x80000001, 0x24d, 0xffffff81, 0x81, 0x4, 0x0, 0x5, 0x1, 0x6, 0x6, 0x9, 0x3c43ddd5, 0x6, 0x7fff, 0x101, 0x3, 0x3f, 0xffffffff, 0x27, 0x9, 0x8, 0x0, 0xffff, 0x6, 0x80000001, 0x5, 0xc14, 0x200, 0x1f, 0x2ef677ce, 0x401, 0x9, 0x5, 0x401, 0x3, 0x17b, 0x3ff, 0xfffff245, 0x6, 0xfffffffb, 0x5, 0x400, 0x80000000, 0xd8, 0x179, 0xfa20000, 0x8, 0x6, 0x0, 0x1, 0x7, 0x5, 0x20, 0x3ff, 0x8, 0x6, 0x3, 0x1, 0x3, 0x3, 0x1ff, 0xff00, 0x0, 0x2ac, 0x2, 0x1ff, 0x0, 0x5, 0x6, 0xfff, 0x7, 0xff, 0x84e, 0xcb, 0x0, 0xd89, 0x2, 0x0, 0x0, 0x7, 0x10000, 0xdb, 0x6, 0x9, 0x0, 0x1f, 0xe9f, 0x9150, 0xffffffff, 0x3, 0x101, 0x9, 0x0, 0xfe29, 0x1, 0x1, 0x1, 0x8, 0x5, 0x5a, 0x1, 0x2, 0x9, 0xa0, 0xffffff24, 0xd3d2, 0x32, 0x80, 0x82, 0x4, 0xf89, 0x4000000, 0x98a, 0x7ff, 0x400, 0x7, 0x2, 0xfff, 0x1], "0b889191f8d8cb46a1b7145bf8f9cc66d6a3c8c5af0b3708251e07524ebaed1d511baacedaaffe5d2cfcf40404978dd5282f82a18e4796daad638fc7a4f044b3f156076b71ea4d6729246da871797e2c13d659610b545658546383f48bb1b06b4cb53fa50d16e43b4c14e144e6814e3c3f2adb174374ae762ba13910e60d8afed3763a3ffe847b79f2e04aea7d045159b703e8182c29799afdd0746aa14e71c3f8fd755f6a7e70bce5ee4e3122339d1119866eb3a730464a86ad90a34ddc0fbe3d49e4304b26c9f3c76c469c8c2e132ada1a7480ee41e4977e9ba9e0bda8fbd70c92e8c6262fd154abeb524c9d79344210457cb5"}}) close(r1) 06:18:50 executing program 3: r0 = openat(0xffffffffffffffff, &(0x7f0000000300)='./file0\x00', 0x0, 0x6) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800004, 0x12, r0, 0x0) preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x9, 0x0) mmap(&(0x7f0000008000/0x3000)=nil, 0x3000, 0x2, 0x11, 0xffffffffffffffff, 0x0) r1 = openat$sequencer2(0xffffff9c, &(0x7f0000000040), 0x0, 0x0) ppoll(&(0x7f0000000080)=[{r0, 0x200}, {r1, 0x2400}], 0x2, &(0x7f00000000c0), &(0x7f0000000100)={[0x0, 0x4]}, 0x8) socketpair(0x1e, 0x80005, 0x0, &(0x7f0000000340)={0x0, 0x0}) close(r2) r3 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x11, 0x4, &(0x7f0000000440)=@framed={{0x18, 0x0, 0x0, 0x0, 0x3}, [@call={0x85, 0x0, 0x0, 0x78}]}, &(0x7f00000001c0)='syzkaller\x00', 0x4, 0x8f, &(0x7f0000000480)=""/143, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x74) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='ext4_es_lookup_extent_exit\x00', r3}, 0x10) close(r3) ioctl$TUNGETIFF(r0, 0x800454d2, &(0x7f00000002c0)={'wg1\x00'}) socket$phonet_pipe(0x23, 0x5, 0x2) accept4(r2, &(0x7f0000000140)=@nfc_llcp, &(0x7f0000000200)=0x80, 0x80800) 06:18:50 executing program 2: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800004, 0x12, r0, 0x0) preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x9, 0x0) r1 = socket$unix(0x1, 0x1, 0x0) bind$unix(r1, &(0x7f00000001c0)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x56) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x100000a, 0x13, r1, 0x285ad000) r2 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x11, 0x4, &(0x7f00000000c0)=ANY=[@ANYBLOB="18000000000000000000000000000000850000007b0000009500000000000000"], &(0x7f00000001c0)='syzkaller\x00', 0x4, 0x8f, &(0x7f00000002c0)=""/143, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='ext4_es_lookup_extent_exit\x00', r2}, 0x10) write$binfmt_elf32(r2, &(0x7f0000000380)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x2, 0x7, 0x1f, 0x6, 0x2, 0x3e, 0x70cc, 0x277, 0x34, 0x238, 0x3, 0x0, 0x20, 0x1, 0x4, 0x5, 0x3}, [{0x6474e551, 0x40, 0x2, 0x40000000, 0x1, 0x80, 0x1, 0xffffffff}, {0x6474e551, 0x8, 0x68, 0x80000000, 0x1, 0xffffffc0, 0x5, 0x3}], "cddb2636616f9eedd3ce3c19a74d64f8494bea4c266ec1b74ba94ea1db55171a67253dcdb1b481cbddefc51afc5d4a3b4bd6ac5cff43552908ce38a9d109838616661728584955ac29706dea357d03b160d088c8a1b9c8c32b5174fc52891f4dba0cfc1580d661a2c3bba7fa88a03b787b023710c6255c4cf55d599c23d6c7985832d8e9aa0628ac3b2e0338", ['\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00']}, 0x900) socketpair(0x29, 0x80005, 0x0, &(0x7f0000000340)={0x0, 0x0}) 06:18:50 executing program 0: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800004, 0x12, r0, 0x0) preadv(r0, 0x0, 0x0, 0x9, 0x0) mmap(&(0x7f0000000000/0xa000)=nil, 0xa000, 0x2, 0x2172, 0xffffffffffffffff, 0x0) syz_mount_image$nilfs2(&(0x7f0000000180), &(0x7f0000000200)='./file0\x00', 0xd85, 0x7, &(0x7f00000006c0)=[{&(0x7f0000000240)="997c7e90471ec6786b6aa37fd8fbf290c011bee5642707bf7b126c36024e5e8f0d3d514aa1538eb70908eb3ac1a8a52e0ba29dab8884c189c9b68415aa0226e7c6a7ccf48ad20543b10360ab7ee9b247e4304d92f0ec7c0ba06d8160095660a0f12836e2033baed6228d464479ce22f2fadce176d0750fdc6ab1004eb9c4440707be1dc31c1ce11815d12f0d50eef6477341b3f6a4f364a1fccd68e2bcd2dba76227338cd6a1835a44", 0xa9, 0x8}, {&(0x7f0000000380)="3a79b76eed8bb53c1f5217cb4d40694fa75675b28af54d40304f697a1d04373a7ef7b09d46fa6365d222516dcc92d004bc937a22980c404bb5b5669f3dfd0e569079c03b2855be3337944aea4b03b03a3eb6d7", 0x53, 0x3}, {&(0x7f0000000400)="c8213af91316be74099fc072cc912017e77b8709c846cf00eb99c7c03cee58e25602e6ec0b4b42c8709e4447b0d23296a71661cdb6ea9b13d35ed3206f67e5559840f063e554ed7fcb842ab9b072197358b7a617cb0825abfabe3da9b022ecbe28ebcc22bd651a40dfcf4782be0c0c6d8adb8fdd7afce8c8659cc9eef1483eceb26a223fa9d591e28633e6bf6facd75e4295341e2ef3788284fc4482db16cab37de0c1adbf7fa07ad161ae875284778f49e15a052d875e", 0xb7, 0x80}, {&(0x7f00000004c0)="056b3e2d287f817e74a518293ea19b1196cccb376ac73cd7bbeccaced6f43aa9706b33d8ec56c58be0febb03dadec48add6a378f07f9053f1b6f33fe63a960502ad48232f0bee4a41509d7063d478768ab8ee0a90ebdb7c9bc326d54c8edad7e9d59641faf45c171e35f77f8c38a7563e1555c331a5a3e4da1ce59c0c697ebe071d527f24563165dafd23b45186c3d55251c825d0d7fd16b0f13a2f1321cddbcf231b398a88b19e3915ee544692c3559f42a", 0xb2, 0x6}, {&(0x7f0000000580)="8023d53ac815f8a84b84350b859e8673ed208a78bbfec2e35d6d4927707d5dd61106eb0321af3709c17fe7661323c51575e9c18d7b834c138636224eb1a7d75dd59d5c5d7411bdd4c2b07cf727643f52b1ca3e1680cde001be2f8334303e9f4191c2f9425472ca1ee6bac17fde09f0ce5fdf2e70d3c1a38b2d3e0e804f7df817b6a03e5e1ffea1ca7cd7", 0x8a, 0x8}, {&(0x7f0000000300)="fae83b83fc781c7715", 0x9, 0x8fe}, {&(0x7f0000000640)="96f1e3c89318e48db56867032dd1ba9b0ffeec69eb34236bd93b937c6bb7447840dc021e536b89aad4fe89ca2317f4fe2b36cbbdd8d72d841aee6f7b7be258352406775f169573cbf4da0bcf856f825233c5387a3a7cde778c057d591f2133c10e8b5bdb164577f492130acfc7", 0x6d, 0x5}], 0x802010, &(0x7f0000000740)={[{@order_relaxed}], [{@fsname}, {@fsuuid={'fsuuid', 0x3d, {[0x36, 0x38, 0x61, 0x64, 0x39, 0x38, 0x31, 0x37], 0x2d, [0x62, 0x61, 0x61, 0x63], 0x2d, [0x62, 0x39, 0x33, 0x35], 0x2d, [0x32, 0x37, 0x33, 0x61], 0x2d, [0x61, 0x39, 0x64, 0x65, 0x31, 0x8eb4bab6ccebb2ed, 0x64, 0x62]}}}]}) 06:18:50 executing program 3: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800004, 0x12, r0, 0x0) r1 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x11, 0x4, &(0x7f00000000c0)=@framed={{}, [@call={0x85, 0x0, 0x0, 0x7b}]}, &(0x7f00000001c0)='syzkaller\x00', 0x4, 0x8f, &(0x7f00000002c0)=""/143, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='ext4_es_lookup_extent_exit\x00', r1}, 0x10) preadv(r1, &(0x7f00000001c0)=[{0x0}], 0x1, 0x8, 0x0) mmap(&(0x7f0000000000/0xa000)=nil, 0xa000, 0x2, 0x2172, 0xffffffffffffffff, 0x0) socketpair(0x1e, 0x80005, 0x0, &(0x7f0000000340)={0x0, 0x0}) 06:18:50 executing program 1: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800004, 0x12, r0, 0x0) preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x9, 0x0) vmsplice(r0, &(0x7f0000000240)=[{&(0x7f0000000080)="4ab1b8694a30bc0b64f0bf0fa59d6d6310a9fca4f5ca7242c45a43a3f790f1bb52f7d713fdc0e6dfa75a5fa7f39f0c693511ea6a67b64b56fa4550fb865102551e0de8881e54887a6391bc4677137a4e433d75874a6619ff219d8ab89c1fdd9fe0d5ae7f1b35994210b3700e36625640f808", 0x72}, {&(0x7f0000000100)="b4346c01f32075d5cdbe81dc2919a8983c8e9f197195a027c0b95dec78d35df6ebeb63bff0423813616d67337c30bab5b6fb29da1bb7c014982cb6715df37902afa71736216374d5265195d9de49c7b08ac58de319c21a5fd49d6a39aecbae4bd0f079aab13eb24843b657b3b9e2f1e2d0731f5e00a4bafcf845d00e210b9ebf51a2303fbc02c70c9d4c62d4849f61727ffdac8e7a0e5b4b92dc03aa3ec3e37067eda1f5ee14cea961ae21f23d6678", 0xaf}], 0x2, 0xd) ioctl$EXT4_IOC_MIGRATE(r0, 0x6609) mmap(&(0x7f0000000000/0xa000)=nil, 0xa000, 0x2, 0x2172, 0xffffffffffffffff, 0x0) socketpair(0x1e, 0x80005, 0x0, &(0x7f0000000340)={0x0, 0x0}) ioctl$BTRFS_IOC_SCRUB_PROGRESS(r1, 0xc400941d, &(0x7f0000000680)={0x0, 0x1000, 0x7, 0xb84d75b96df9382e}) r2 = socket$unix(0x1, 0x1, 0x0) bind$unix(r2, &(0x7f00000001c0)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x56) ioctl$sock_SIOCETHTOOL(r2, 0x8946, &(0x7f0000000040)={'bond_slave_0\x00', &(0x7f0000000380)=@ethtool_per_queue_op={0x4b, 0xe, [0x7ff, 0x3, 0x101, 0xd28f, 0x4, 0x1, 0x3, 0x4, 0x1, 0x80000001, 0x24d, 0xffffff81, 0x81, 0x4, 0x0, 0x5, 0x1, 0x6, 0x6, 0x9, 0x3c43ddd5, 0x6, 0x7fff, 0x101, 0x3, 0x3f, 0xffffffff, 0x27, 0x9, 0x8, 0x0, 0xffff, 0x6, 0x80000001, 0x5, 0xc14, 0x200, 0x1f, 0x2ef677ce, 0x401, 0x9, 0x5, 0x401, 0x3, 0x17b, 0x3ff, 0xfffff245, 0x6, 0xfffffffb, 0x5, 0x400, 0x80000000, 0xd8, 0x179, 0xfa20000, 0x8, 0x6, 0x0, 0x1, 0x7, 0x5, 0x20, 0x3ff, 0x8, 0x6, 0x3, 0x1, 0x3, 0x3, 0x1ff, 0xff00, 0x0, 0x2ac, 0x2, 0x1ff, 0x0, 0x5, 0x6, 0xfff, 0x7, 0xff, 0x84e, 0xcb, 0x0, 0xd89, 0x2, 0x0, 0x0, 0x7, 0x10000, 0xdb, 0x6, 0x9, 0x0, 0x1f, 0xe9f, 0x9150, 0xffffffff, 0x3, 0x101, 0x9, 0x0, 0xfe29, 0x1, 0x1, 0x1, 0x8, 0x5, 0x5a, 0x1, 0x2, 0x9, 0xa0, 0xffffff24, 0xd3d2, 0x32, 0x80, 0x82, 0x4, 0xf89, 0x4000000, 0x98a, 0x7ff, 0x400, 0x7, 0x2, 0xfff, 0x1], "0b889191f8d8cb46a1b7145bf8f9cc66d6a3c8c5af0b3708251e07524ebaed1d511baacedaaffe5d2cfcf40404978dd5282f82a18e4796daad638fc7a4f044b3f156076b71ea4d6729246da871797e2c13d659610b545658546383f48bb1b06b4cb53fa50d16e43b4c14e144e6814e3c3f2adb174374ae762ba13910e60d8afed3763a3ffe847b79f2e04aea7d045159b703e8182c29799afdd0746aa14e71c3f8fd755f6a7e70bce5ee4e3122339d1119866eb3a730464a86ad90a34ddc0fbe3d49e4304b26c9f3c76c469c8c2e132ada1a7480ee41e4977e9ba9e0bda8fbd70c92e8c6262fd154abeb524c9d79344210457cb5"}}) [ 333.232704][T14707] loop0: detected capacity change from 0 to 8 06:18:50 executing program 2: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800004, 0x12, r0, 0x0) preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x9, 0x0) r1 = socket$unix(0x1, 0x1, 0x0) bind$unix(r1, &(0x7f00000001c0)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x56) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x100000a, 0x13, r1, 0x285ad000) r2 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x11, 0x4, &(0x7f00000000c0)=ANY=[@ANYBLOB="18000000000000000000000000000000850000007b0000009500000000000000"], &(0x7f00000001c0)='syzkaller\x00', 0x4, 0x8f, &(0x7f00000002c0)=""/143, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='ext4_es_lookup_extent_exit\x00', r2}, 0x10) mmap(&(0x7f0000000000/0xa000)=nil, 0xa000, 0x2, 0x2172, 0xffffffffffffffff, 0x0) socketpair(0x29, 0x80005, 0x0, &(0x7f0000000340)={0x0, 0x0}) 06:18:50 executing program 3: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800004, 0x12, r0, 0x0) r1 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x11, 0x4, &(0x7f00000000c0)=@framed={{}, [@call={0x85, 0x0, 0x0, 0x7b}]}, &(0x7f00000001c0)='syzkaller\x00', 0x4, 0x8f, &(0x7f00000002c0)=""/143, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='ext4_es_lookup_extent_exit\x00', r1}, 0x10) preadv(r1, &(0x7f00000001c0)=[{0x0}], 0x1, 0x8, 0x0) mmap(&(0x7f0000000000/0xa000)=nil, 0xa000, 0x2, 0x2172, 0xffffffffffffffff, 0x0) socketpair(0x1e, 0x80005, 0x0, &(0x7f0000000340)={0x0, 0x0}) 06:18:50 executing program 1: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800004, 0x12, r0, 0x0) preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x9, 0x0) vmsplice(r0, &(0x7f0000000240)=[{&(0x7f0000000080)="4ab1b8694a30bc0b64f0bf0fa59d6d6310a9fca4f5ca7242c45a43a3f790f1bb52f7d713fdc0e6dfa75a5fa7f39f0c693511ea6a67b64b56fa4550fb865102551e0de8881e54887a6391bc4677137a4e433d75874a6619ff219d8ab89c1fdd9fe0d5ae7f1b35994210b3700e36625640f808", 0x72}, {&(0x7f0000000100)="b4346c01f32075d5cdbe81dc2919a8983c8e9f197195a027c0b95dec78d35df6ebeb63bff0423813616d67337c30bab5b6fb29da1bb7c014982cb6715df37902afa71736216374d5265195d9de49c7b08ac58de319c21a5fd49d6a39aecbae4bd0f079aab13eb24843b657b3b9e2f1e2d0731f5e00a4bafcf845d00e210b9ebf51a2303fbc02c70c9d4c62d4849f61727ffdac8e7a0e5b4b92dc03aa3ec3e37067eda1f5ee14cea961ae21f23d6678", 0xaf}], 0x2, 0xd) ioctl$EXT4_IOC_MIGRATE(r0, 0x6609) mmap(&(0x7f0000000000/0xa000)=nil, 0xa000, 0x2, 0x2172, 0xffffffffffffffff, 0x0) socketpair(0x1e, 0x80005, 0x0, &(0x7f0000000340)={0x0, 0x0}) ioctl$BTRFS_IOC_SCRUB_PROGRESS(r1, 0xc400941d, &(0x7f0000000680)={0x0, 0x1000, 0x7, 0xb84d75b96df9382e}) r2 = socket$unix(0x1, 0x1, 0x0) bind$unix(r2, &(0x7f00000001c0)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x56) 06:18:50 executing program 3: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800004, 0x12, r0, 0x0) preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x9, 0x0) mmap(&(0x7f0000000000/0xa000)=nil, 0xa000, 0x2, 0x2172, 0xffffffffffffffff, 0x0) r1 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x11, 0x4, &(0x7f00000000c0)=@framed={{}, [@call={0x85, 0x0, 0x0, 0x7b}]}, &(0x7f00000001c0)='syzkaller\x00', 0x4, 0x8f, &(0x7f00000002c0)=""/143, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='ext4_es_lookup_extent_exit\x00', r1}, 0x10) preadv(r1, &(0x7f0000000080)=[{&(0x7f0000000040)=""/12, 0xc}], 0x1, 0x36, 0x401) socketpair(0x1e, 0x80005, 0x0, &(0x7f0000000340)={0x0, 0x0}) close(r2) r3 = socket$unix(0x1, 0x1, 0x0) bind$unix(r3, &(0x7f00000001c0)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x56) ioctl$sock_SIOCOUTQNSD(r3, 0x894b, &(0x7f0000000100)) ioctl$RTC_PIE_OFF(r0, 0x7006) r4 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800004, 0x12, r4, 0x0) preadv(r4, &(0x7f00000001c0)=[{0x0}], 0x1, 0x9, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r4, 0x0) r5 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x11, 0x9, &(0x7f0000000380)=@raw=[@initr0={0x18, 0x0, 0x0, 0x0, 0x10000, 0x0, 0x0, 0x0, 0x3}, @ldst={0x2, 0x1, 0x3, 0x7196d1492be6837c, 0x4, 0xfffffffffffffff4, 0x10}, @jmp={0x5, 0x1, 0xa, 0x6, 0x7, 0x75, 0x1}, @map={0x18, 0xa, 0x1, 0x0, r4}, @map, @ldst={0x1, 0x3, 0x2, 0x0, 0x6, 0x50}], &(0x7f00000001c0)='syzkaller\x00', 0x4, 0x8f, &(0x7f00000002c0)=""/143, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x74) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='ext4_es_lookup_extent_exit\x00', r5}, 0x10) mmap(&(0x7f00006fe000/0x2000)=nil, 0x2000, 0x1000006, 0x50, r5, 0x6fdfe000) 06:18:50 executing program 2: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800004, 0x12, r0, 0x0) preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x9, 0x0) r1 = socket$unix(0x1, 0x1, 0x0) bind$unix(r1, &(0x7f00000001c0)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x56) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x100000a, 0x13, r1, 0x285ad000) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x11, 0x4, &(0x7f00000000c0)=ANY=[@ANYBLOB="18000000000000000000000000000000850000007b0000009500000000000000"], &(0x7f00000001c0)='syzkaller\x00', 0x4, 0x8f, &(0x7f00000002c0)=""/143, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) mmap(&(0x7f0000000000/0xa000)=nil, 0xa000, 0x2, 0x2172, 0xffffffffffffffff, 0x0) socketpair(0x29, 0x80005, 0x0, &(0x7f0000000340)={0x0, 0x0}) 06:18:50 executing program 0: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800004, 0x12, r0, 0x0) preadv(r0, 0x0, 0x0, 0x9, 0x0) mmap(&(0x7f0000000000/0xa000)=nil, 0xa000, 0x2, 0x2172, 0xffffffffffffffff, 0x0) syz_mount_image$nilfs2(&(0x7f0000000180), &(0x7f0000000200)='./file0\x00', 0xd85, 0x7, &(0x7f00000006c0)=[{&(0x7f0000000240)="997c7e90471ec6786b6aa37fd8fbf290c011bee5642707bf7b126c36024e5e8f0d3d514aa1538eb70908eb3ac1a8a52e0ba29dab8884c189c9b68415aa0226e7c6a7ccf48ad20543b10360ab7ee9b247e4304d92f0ec7c0ba06d8160095660a0f12836e2033baed6228d464479ce22f2fadce176d0750fdc6ab1004eb9c4440707be1dc31c1ce11815d12f0d50eef6477341b3f6a4f364a1fccd68e2bcd2dba76227338cd6a1835a44", 0xa9, 0x8}, {&(0x7f0000000380)="3a79b76eed8bb53c1f5217cb4d40694fa75675b28af54d40304f697a1d04373a7ef7b09d46fa6365d222516dcc92d004bc937a22980c404bb5b5669f3dfd0e569079c03b2855be3337944aea4b03b03a3eb6d7", 0x53, 0x3}, {&(0x7f0000000400)="c8213af91316be74099fc072cc912017e77b8709c846cf00eb99c7c03cee58e25602e6ec0b4b42c8709e4447b0d23296a71661cdb6ea9b13d35ed3206f67e5559840f063e554ed7fcb842ab9b072197358b7a617cb0825abfabe3da9b022ecbe28ebcc22bd651a40dfcf4782be0c0c6d8adb8fdd7afce8c8659cc9eef1483eceb26a223fa9d591e28633e6bf6facd75e4295341e2ef3788284fc4482db16cab37de0c1adbf7fa07ad161ae875284778f49e15a052d875e", 0xb7, 0x80}, {&(0x7f00000004c0)="056b3e2d287f817e74a518293ea19b1196cccb376ac73cd7bbeccaced6f43aa9706b33d8ec56c58be0febb03dadec48add6a378f07f9053f1b6f33fe63a960502ad48232f0bee4a41509d7063d478768ab8ee0a90ebdb7c9bc326d54c8edad7e9d59641faf45c171e35f77f8c38a7563e1555c331a5a3e4da1ce59c0c697ebe071d527f24563165dafd23b45186c3d55251c825d0d7fd16b0f13a2f1321cddbcf231b398a88b19e3915ee544692c3559f42a", 0xb2, 0x6}, {&(0x7f0000000580)="8023d53ac815f8a84b84350b859e8673ed208a78bbfec2e35d6d4927707d5dd61106eb0321af3709c17fe7661323c51575e9c18d7b834c138636224eb1a7d75dd59d5c5d7411bdd4c2b07cf727643f52b1ca3e1680cde001be2f8334303e9f4191c2f9425472ca1ee6bac17fde09f0ce5fdf2e70d3c1a38b2d3e0e804f7df817b6a03e5e1ffea1ca7cd7", 0x8a, 0x8}, {&(0x7f0000000300)="fae83b83fc781c7715", 0x9, 0x8fe}, {&(0x7f0000000640)="96f1e3c89318e48db56867032dd1ba9b0ffeec69eb34236bd93b937c6bb7447840dc021e536b89aad4fe89ca2317f4fe2b36cbbdd8d72d841aee6f7b7be258352406775f169573cbf4da0bcf856f825233c5387a3a7cde778c057d591f2133c10e8b5bdb164577f492130acfc7", 0x6d, 0x5}], 0x802010, &(0x7f0000000740)={[{@order_relaxed}], [{@fsname}, {@fsuuid={'fsuuid', 0x3d, {[0x36, 0x38, 0x61, 0x64, 0x39, 0x38, 0x31, 0x37], 0x2d, [0x62, 0x61, 0x61, 0x63], 0x2d, [0x62, 0x39, 0x33, 0x35], 0x2d, [0x32, 0x37, 0x33, 0x61], 0x2d, [0x61, 0x39, 0x64, 0x65, 0x31, 0x8eb4bab6ccebb2ed, 0x64, 0x62]}}}]}) [ 333.425129][T14725] loop0: detected capacity change from 0 to 8 06:18:51 executing program 1: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800004, 0x12, r0, 0x0) preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x9, 0x0) vmsplice(r0, &(0x7f0000000240)=[{&(0x7f0000000080)="4ab1b8694a30bc0b64f0bf0fa59d6d6310a9fca4f5ca7242c45a43a3f790f1bb52f7d713fdc0e6dfa75a5fa7f39f0c693511ea6a67b64b56fa4550fb865102551e0de8881e54887a6391bc4677137a4e433d75874a6619ff219d8ab89c1fdd9fe0d5ae7f1b35994210b3700e36625640f808", 0x72}, {&(0x7f0000000100)="b4346c01f32075d5cdbe81dc2919a8983c8e9f197195a027c0b95dec78d35df6ebeb63bff0423813616d67337c30bab5b6fb29da1bb7c014982cb6715df37902afa71736216374d5265195d9de49c7b08ac58de319c21a5fd49d6a39aecbae4bd0f079aab13eb24843b657b3b9e2f1e2d0731f5e00a4bafcf845d00e210b9ebf51a2303fbc02c70c9d4c62d4849f61727ffdac8e7a0e5b4b92dc03aa3ec3e37067eda1f5ee14cea961ae21f23d6678", 0xaf}], 0x2, 0xd) ioctl$EXT4_IOC_MIGRATE(r0, 0x6609) mmap(&(0x7f0000000000/0xa000)=nil, 0xa000, 0x2, 0x2172, 0xffffffffffffffff, 0x0) socketpair(0x1e, 0x80005, 0x0, &(0x7f0000000340)={0x0, 0x0}) ioctl$BTRFS_IOC_SCRUB_PROGRESS(r1, 0xc400941d, &(0x7f0000000680)={0x0, 0x1000, 0x7, 0xb84d75b96df9382e}) socket$unix(0x1, 0x1, 0x0) 06:18:51 executing program 2: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800004, 0x12, r0, 0x0) preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x9, 0x0) r1 = socket$unix(0x1, 0x1, 0x0) bind$unix(r1, &(0x7f00000001c0)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x56) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x100000a, 0x13, r1, 0x285ad000) mmap(&(0x7f0000000000/0xa000)=nil, 0xa000, 0x2, 0x2172, 0xffffffffffffffff, 0x0) socketpair(0x29, 0x80005, 0x0, &(0x7f0000000340)={0x0, 0x0}) 06:18:51 executing program 3: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800004, 0x12, r0, 0x0) preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x9, 0x0) mmap(&(0x7f0000000000/0xa000)=nil, 0xa000, 0x2, 0x2172, 0xffffffffffffffff, 0x0) r1 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x11, 0x4, &(0x7f00000000c0)=@framed={{}, [@call={0x85, 0x0, 0x0, 0x7b}]}, &(0x7f00000001c0)='syzkaller\x00', 0x4, 0x8f, &(0x7f00000002c0)=""/143, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='ext4_es_lookup_extent_exit\x00', r1}, 0x10) preadv(r1, &(0x7f0000000080)=[{&(0x7f0000000040)=""/12, 0xc}], 0x1, 0x36, 0x401) socketpair(0x1e, 0x80005, 0x0, &(0x7f0000000340)={0x0, 0x0}) close(r2) r3 = socket$unix(0x1, 0x1, 0x0) bind$unix(r3, &(0x7f00000001c0)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x56) ioctl$sock_SIOCOUTQNSD(r3, 0x894b, &(0x7f0000000100)) ioctl$RTC_PIE_OFF(r0, 0x7006) r4 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800004, 0x12, r4, 0x0) preadv(r4, &(0x7f00000001c0)=[{0x0}], 0x1, 0x9, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r4, 0x0) r5 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x11, 0x9, &(0x7f0000000380)=@raw=[@initr0={0x18, 0x0, 0x0, 0x0, 0x10000, 0x0, 0x0, 0x0, 0x3}, @ldst={0x2, 0x1, 0x3, 0x7196d1492be6837c, 0x4, 0xfffffffffffffff4, 0x10}, @jmp={0x5, 0x1, 0xa, 0x6, 0x7, 0x75, 0x1}, @map={0x18, 0xa, 0x1, 0x0, r4}, @map, @ldst={0x1, 0x3, 0x2, 0x0, 0x6, 0x50}], &(0x7f00000001c0)='syzkaller\x00', 0x4, 0x8f, &(0x7f00000002c0)=""/143, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x74) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='ext4_es_lookup_extent_exit\x00', r5}, 0x10) mmap(&(0x7f00006fe000/0x2000)=nil, 0x2000, 0x1000006, 0x50, r5, 0x6fdfe000) 06:18:51 executing program 1: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800004, 0x12, r0, 0x0) preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x9, 0x0) vmsplice(r0, &(0x7f0000000240)=[{&(0x7f0000000080)="4ab1b8694a30bc0b64f0bf0fa59d6d6310a9fca4f5ca7242c45a43a3f790f1bb52f7d713fdc0e6dfa75a5fa7f39f0c693511ea6a67b64b56fa4550fb865102551e0de8881e54887a6391bc4677137a4e433d75874a6619ff219d8ab89c1fdd9fe0d5ae7f1b35994210b3700e36625640f808", 0x72}, {&(0x7f0000000100)="b4346c01f32075d5cdbe81dc2919a8983c8e9f197195a027c0b95dec78d35df6ebeb63bff0423813616d67337c30bab5b6fb29da1bb7c014982cb6715df37902afa71736216374d5265195d9de49c7b08ac58de319c21a5fd49d6a39aecbae4bd0f079aab13eb24843b657b3b9e2f1e2d0731f5e00a4bafcf845d00e210b9ebf51a2303fbc02c70c9d4c62d4849f61727ffdac8e7a0e5b4b92dc03aa3ec3e37067eda1f5ee14cea961ae21f23d6678", 0xaf}], 0x2, 0xd) ioctl$EXT4_IOC_MIGRATE(r0, 0x6609) mmap(&(0x7f0000000000/0xa000)=nil, 0xa000, 0x2, 0x2172, 0xffffffffffffffff, 0x0) socketpair(0x1e, 0x80005, 0x0, &(0x7f0000000340)={0x0, 0x0}) ioctl$BTRFS_IOC_SCRUB_PROGRESS(r1, 0xc400941d, &(0x7f0000000680)={0x0, 0x1000, 0x7, 0xb84d75b96df9382e}) 06:18:51 executing program 0: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800004, 0x12, r0, 0x0) preadv(r0, &(0x7f00000001c0), 0x0, 0x9, 0x0) mmap(&(0x7f0000000000/0xa000)=nil, 0xa000, 0x2, 0x2172, 0xffffffffffffffff, 0x0) syz_mount_image$nilfs2(&(0x7f0000000180), &(0x7f0000000200)='./file0\x00', 0xd85, 0x7, &(0x7f00000006c0)=[{&(0x7f0000000240)="997c7e90471ec6786b6aa37fd8fbf290c011bee5642707bf7b126c36024e5e8f0d3d514aa1538eb70908eb3ac1a8a52e0ba29dab8884c189c9b68415aa0226e7c6a7ccf48ad20543b10360ab7ee9b247e4304d92f0ec7c0ba06d8160095660a0f12836e2033baed6228d464479ce22f2fadce176d0750fdc6ab1004eb9c4440707be1dc31c1ce11815d12f0d50eef6477341b3f6a4f364a1fccd68e2bcd2dba76227338cd6a1835a44", 0xa9, 0x8}, {&(0x7f0000000380)="3a79b76eed8bb53c1f5217cb4d40694fa75675b28af54d40304f697a1d04373a7ef7b09d46fa6365d222516dcc92d004bc937a22980c404bb5b5669f3dfd0e569079c03b2855be3337944aea4b03b03a3eb6d7", 0x53, 0x3}, {&(0x7f0000000400)="c8213af91316be74099fc072cc912017e77b8709c846cf00eb99c7c03cee58e25602e6ec0b4b42c8709e4447b0d23296a71661cdb6ea9b13d35ed3206f67e5559840f063e554ed7fcb842ab9b072197358b7a617cb0825abfabe3da9b022ecbe28ebcc22bd651a40dfcf4782be0c0c6d8adb8fdd7afce8c8659cc9eef1483eceb26a223fa9d591e28633e6bf6facd75e4295341e2ef3788284fc4482db16cab37de0c1adbf7fa07ad161ae875284778f49e15a052d875e", 0xb7, 0x80}, {&(0x7f00000004c0)="056b3e2d287f817e74a518293ea19b1196cccb376ac73cd7bbeccaced6f43aa9706b33d8ec56c58be0febb03dadec48add6a378f07f9053f1b6f33fe63a960502ad48232f0bee4a41509d7063d478768ab8ee0a90ebdb7c9bc326d54c8edad7e9d59641faf45c171e35f77f8c38a7563e1555c331a5a3e4da1ce59c0c697ebe071d527f24563165dafd23b45186c3d55251c825d0d7fd16b0f13a2f1321cddbcf231b398a88b19e3915ee544692c3559f42a", 0xb2, 0x6}, {&(0x7f0000000580)="8023d53ac815f8a84b84350b859e8673ed208a78bbfec2e35d6d4927707d5dd61106eb0321af3709c17fe7661323c51575e9c18d7b834c138636224eb1a7d75dd59d5c5d7411bdd4c2b07cf727643f52b1ca3e1680cde001be2f8334303e9f4191c2f9425472ca1ee6bac17fde09f0ce5fdf2e70d3c1a38b2d3e0e804f7df817b6a03e5e1ffea1ca7cd7", 0x8a, 0x8}, {&(0x7f0000000300)="fae83b83fc781c7715", 0x9, 0x8fe}, {&(0x7f0000000640)="96f1e3c89318e48db56867032dd1ba9b0ffeec69eb34236bd93b937c6bb7447840dc021e536b89aad4fe89ca2317f4fe2b36cbbdd8d72d841aee6f7b7be258352406775f169573cbf4da0bcf856f825233c5387a3a7cde778c057d591f2133c10e8b5bdb164577f492130acfc7", 0x6d, 0x5}], 0x802010, &(0x7f0000000740)={[{@order_relaxed}], [{@fsname}, {@fsuuid={'fsuuid', 0x3d, {[0x36, 0x38, 0x61, 0x64, 0x39, 0x38, 0x31, 0x37], 0x2d, [0x62, 0x61, 0x61, 0x63], 0x2d, [0x62, 0x39, 0x33, 0x35], 0x2d, [0x32, 0x37, 0x33, 0x61], 0x2d, [0x61, 0x39, 0x64, 0x65, 0x31, 0x8eb4bab6ccebb2ed, 0x64, 0x62]}}}]}) 06:18:51 executing program 2: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800004, 0x12, r0, 0x0) preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x9, 0x0) r1 = socket$unix(0x1, 0x1, 0x0) bind$unix(r1, &(0x7f00000001c0)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x56) mmap(&(0x7f0000000000/0xa000)=nil, 0xa000, 0x2, 0x2172, 0xffffffffffffffff, 0x0) socketpair(0x29, 0x80005, 0x0, &(0x7f0000000340)={0x0, 0x0}) 06:18:51 executing program 3: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800004, 0x12, r0, 0x0) preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x9, 0x0) mmap(&(0x7f0000000000/0xa000)=nil, 0xa000, 0x2, 0x2172, 0xffffffffffffffff, 0x0) r1 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x11, 0x4, &(0x7f00000000c0)=@framed={{}, [@call={0x85, 0x0, 0x0, 0x7b}]}, &(0x7f00000001c0)='syzkaller\x00', 0x4, 0x8f, &(0x7f00000002c0)=""/143, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='ext4_es_lookup_extent_exit\x00', r1}, 0x10) preadv(r1, &(0x7f0000000080)=[{&(0x7f0000000040)=""/12, 0xc}], 0x1, 0x36, 0x401) socketpair(0x1e, 0x80005, 0x0, &(0x7f0000000340)={0x0, 0x0}) close(r2) r3 = socket$unix(0x1, 0x1, 0x0) bind$unix(r3, &(0x7f00000001c0)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x56) ioctl$sock_SIOCOUTQNSD(r3, 0x894b, &(0x7f0000000100)) ioctl$RTC_PIE_OFF(r0, 0x7006) r4 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800004, 0x12, r4, 0x0) preadv(r4, &(0x7f00000001c0)=[{0x0}], 0x1, 0x9, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r4, 0x0) r5 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x11, 0x9, &(0x7f0000000380)=@raw=[@initr0={0x18, 0x0, 0x0, 0x0, 0x10000, 0x0, 0x0, 0x0, 0x3}, @ldst={0x2, 0x1, 0x3, 0x7196d1492be6837c, 0x4, 0xfffffffffffffff4, 0x10}, @jmp={0x5, 0x1, 0xa, 0x6, 0x7, 0x75, 0x1}, @map={0x18, 0xa, 0x1, 0x0, r4}, @map, @ldst={0x1, 0x3, 0x2, 0x0, 0x6, 0x50}], &(0x7f00000001c0)='syzkaller\x00', 0x4, 0x8f, &(0x7f00000002c0)=""/143, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x74) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='ext4_es_lookup_extent_exit\x00', r5}, 0x10) mmap(&(0x7f00006fe000/0x2000)=nil, 0x2000, 0x1000006, 0x50, r5, 0x6fdfe000) 06:18:51 executing program 1: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800004, 0x12, r0, 0x0) preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x9, 0x0) vmsplice(r0, &(0x7f0000000240)=[{&(0x7f0000000080)="4ab1b8694a30bc0b64f0bf0fa59d6d6310a9fca4f5ca7242c45a43a3f790f1bb52f7d713fdc0e6dfa75a5fa7f39f0c693511ea6a67b64b56fa4550fb865102551e0de8881e54887a6391bc4677137a4e433d75874a6619ff219d8ab89c1fdd9fe0d5ae7f1b35994210b3700e36625640f808", 0x72}, {&(0x7f0000000100)="b4346c01f32075d5cdbe81dc2919a8983c8e9f197195a027c0b95dec78d35df6ebeb63bff0423813616d67337c30bab5b6fb29da1bb7c014982cb6715df37902afa71736216374d5265195d9de49c7b08ac58de319c21a5fd49d6a39aecbae4bd0f079aab13eb24843b657b3b9e2f1e2d0731f5e00a4bafcf845d00e210b9ebf51a2303fbc02c70c9d4c62d4849f61727ffdac8e7a0e5b4b92dc03aa3ec3e37067eda1f5ee14cea961ae21f23d6678", 0xaf}], 0x2, 0xd) ioctl$EXT4_IOC_MIGRATE(r0, 0x6609) mmap(&(0x7f0000000000/0xa000)=nil, 0xa000, 0x2, 0x2172, 0xffffffffffffffff, 0x0) socketpair(0x1e, 0x80005, 0x0, &(0x7f0000000340)={0x0, 0x0}) [ 333.593175][T14741] loop0: detected capacity change from 0 to 8 06:18:51 executing program 2: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800004, 0x12, r0, 0x0) preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x9, 0x0) socket$unix(0x1, 0x1, 0x0) mmap(&(0x7f0000000000/0xa000)=nil, 0xa000, 0x2, 0x2172, 0xffffffffffffffff, 0x0) socketpair(0x29, 0x80005, 0x0, &(0x7f0000000340)={0x0, 0x0}) 06:18:51 executing program 1: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800004, 0x12, r0, 0x0) preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x9, 0x0) vmsplice(r0, &(0x7f0000000240)=[{&(0x7f0000000080)="4ab1b8694a30bc0b64f0bf0fa59d6d6310a9fca4f5ca7242c45a43a3f790f1bb52f7d713fdc0e6dfa75a5fa7f39f0c693511ea6a67b64b56fa4550fb865102551e0de8881e54887a6391bc4677137a4e433d75874a6619ff219d8ab89c1fdd9fe0d5ae7f1b35994210b3700e36625640f808", 0x72}, {&(0x7f0000000100)="b4346c01f32075d5cdbe81dc2919a8983c8e9f197195a027c0b95dec78d35df6ebeb63bff0423813616d67337c30bab5b6fb29da1bb7c014982cb6715df37902afa71736216374d5265195d9de49c7b08ac58de319c21a5fd49d6a39aecbae4bd0f079aab13eb24843b657b3b9e2f1e2d0731f5e00a4bafcf845d00e210b9ebf51a2303fbc02c70c9d4c62d4849f61727ffdac8e7a0e5b4b92dc03aa3ec3e37067eda1f5ee14cea961ae21f23d6678", 0xaf}], 0x2, 0xd) ioctl$EXT4_IOC_MIGRATE(r0, 0x6609) mmap(&(0x7f0000000000/0xa000)=nil, 0xa000, 0x2, 0x2172, 0xffffffffffffffff, 0x0) 06:18:51 executing program 0: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800004, 0x12, r0, 0x0) preadv(r0, &(0x7f00000001c0), 0x0, 0x9, 0x0) mmap(&(0x7f0000000000/0xa000)=nil, 0xa000, 0x2, 0x2172, 0xffffffffffffffff, 0x0) syz_mount_image$nilfs2(&(0x7f0000000180), &(0x7f0000000200)='./file0\x00', 0xd85, 0x7, &(0x7f00000006c0)=[{&(0x7f0000000240)="997c7e90471ec6786b6aa37fd8fbf290c011bee5642707bf7b126c36024e5e8f0d3d514aa1538eb70908eb3ac1a8a52e0ba29dab8884c189c9b68415aa0226e7c6a7ccf48ad20543b10360ab7ee9b247e4304d92f0ec7c0ba06d8160095660a0f12836e2033baed6228d464479ce22f2fadce176d0750fdc6ab1004eb9c4440707be1dc31c1ce11815d12f0d50eef6477341b3f6a4f364a1fccd68e2bcd2dba76227338cd6a1835a44", 0xa9, 0x8}, {&(0x7f0000000380)="3a79b76eed8bb53c1f5217cb4d40694fa75675b28af54d40304f697a1d04373a7ef7b09d46fa6365d222516dcc92d004bc937a22980c404bb5b5669f3dfd0e569079c03b2855be3337944aea4b03b03a3eb6d7", 0x53, 0x3}, {&(0x7f0000000400)="c8213af91316be74099fc072cc912017e77b8709c846cf00eb99c7c03cee58e25602e6ec0b4b42c8709e4447b0d23296a71661cdb6ea9b13d35ed3206f67e5559840f063e554ed7fcb842ab9b072197358b7a617cb0825abfabe3da9b022ecbe28ebcc22bd651a40dfcf4782be0c0c6d8adb8fdd7afce8c8659cc9eef1483eceb26a223fa9d591e28633e6bf6facd75e4295341e2ef3788284fc4482db16cab37de0c1adbf7fa07ad161ae875284778f49e15a052d875e", 0xb7, 0x80}, {&(0x7f00000004c0)="056b3e2d287f817e74a518293ea19b1196cccb376ac73cd7bbeccaced6f43aa9706b33d8ec56c58be0febb03dadec48add6a378f07f9053f1b6f33fe63a960502ad48232f0bee4a41509d7063d478768ab8ee0a90ebdb7c9bc326d54c8edad7e9d59641faf45c171e35f77f8c38a7563e1555c331a5a3e4da1ce59c0c697ebe071d527f24563165dafd23b45186c3d55251c825d0d7fd16b0f13a2f1321cddbcf231b398a88b19e3915ee544692c3559f42a", 0xb2, 0x6}, {&(0x7f0000000580)="8023d53ac815f8a84b84350b859e8673ed208a78bbfec2e35d6d4927707d5dd61106eb0321af3709c17fe7661323c51575e9c18d7b834c138636224eb1a7d75dd59d5c5d7411bdd4c2b07cf727643f52b1ca3e1680cde001be2f8334303e9f4191c2f9425472ca1ee6bac17fde09f0ce5fdf2e70d3c1a38b2d3e0e804f7df817b6a03e5e1ffea1ca7cd7", 0x8a, 0x8}, {&(0x7f0000000300)="fae83b83fc781c7715", 0x9, 0x8fe}, {&(0x7f0000000640)="96f1e3c89318e48db56867032dd1ba9b0ffeec69eb34236bd93b937c6bb7447840dc021e536b89aad4fe89ca2317f4fe2b36cbbdd8d72d841aee6f7b7be258352406775f169573cbf4da0bcf856f825233c5387a3a7cde778c057d591f2133c10e8b5bdb164577f492130acfc7", 0x6d, 0x5}], 0x802010, &(0x7f0000000740)={[{@order_relaxed}], [{@fsname}, {@fsuuid={'fsuuid', 0x3d, {[0x36, 0x38, 0x61, 0x64, 0x39, 0x38, 0x31, 0x37], 0x2d, [0x62, 0x61, 0x61, 0x63], 0x2d, [0x62, 0x39, 0x33, 0x35], 0x2d, [0x32, 0x37, 0x33, 0x61], 0x2d, [0x61, 0x39, 0x64, 0x65, 0x31, 0x8eb4bab6ccebb2ed, 0x64, 0x62]}}}]}) 06:18:51 executing program 2: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800004, 0x12, r0, 0x0) preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x9, 0x0) mmap(&(0x7f0000000000/0xa000)=nil, 0xa000, 0x2, 0x2172, 0xffffffffffffffff, 0x0) socketpair(0x29, 0x80005, 0x0, &(0x7f0000000340)={0x0, 0x0}) 06:18:51 executing program 3: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800004, 0x12, r0, 0x0) preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x9, 0x0) vmsplice(r0, &(0x7f0000000240)=[{&(0x7f0000000080)="4ab1b8694a30bc0b64f0bf0fa59d6d6310a9fca4f5ca7242c45a43a3f790f1bb52f7d713fdc0e6dfa75a5fa7f39f0c693511ea6a67b64b56fa4550fb865102551e0de8881e54887a6391bc4677137a4e433d75874a6619ff219d8ab89c1fdd9fe0d5ae7f1b35994210b3700e36625640f808", 0x72}, {&(0x7f0000000100)="b4346c01f32075d5cdbe81dc2919a8983c8e9f197195a027c0b95dec78d35df6ebeb63bff0423813616d67337c30bab5b6fb29da1bb7c014982cb6715df37902afa71736216374d5265195d9de49c7b08ac58de319c21a5fd49d6a39aecbae4bd0f079aab13eb24843b657b3b9e2f1e2d0731f5e00a4bafcf845d00e210b9ebf51a2303fbc02c70c9d4c62d4849f61727ffdac8e7a0e5b4b92dc03aa3ec3e37067eda1f5ee14cea961ae21f23d6678", 0xaf}], 0x2, 0xd) ioctl$EXT4_IOC_MIGRATE(r0, 0x6609) mmap(&(0x7f0000000000/0xa000)=nil, 0xa000, 0x2, 0x2172, 0xffffffffffffffff, 0x0) socketpair(0x1e, 0x80005, 0x0, &(0x7f0000000340)={0x0, 0x0}) 06:18:51 executing program 1: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800004, 0x12, r0, 0x0) preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x9, 0x0) vmsplice(r0, &(0x7f0000000240)=[{&(0x7f0000000080)="4ab1b8694a30bc0b64f0bf0fa59d6d6310a9fca4f5ca7242c45a43a3f790f1bb52f7d713fdc0e6dfa75a5fa7f39f0c693511ea6a67b64b56fa4550fb865102551e0de8881e54887a6391bc4677137a4e433d75874a6619ff219d8ab89c1fdd9fe0d5ae7f1b35994210b3700e36625640f808", 0x72}, {&(0x7f0000000100)="b4346c01f32075d5cdbe81dc2919a8983c8e9f197195a027c0b95dec78d35df6ebeb63bff0423813616d67337c30bab5b6fb29da1bb7c014982cb6715df37902afa71736216374d5265195d9de49c7b08ac58de319c21a5fd49d6a39aecbae4bd0f079aab13eb24843b657b3b9e2f1e2d0731f5e00a4bafcf845d00e210b9ebf51a2303fbc02c70c9d4c62d4849f61727ffdac8e7a0e5b4b92dc03aa3ec3e37067eda1f5ee14cea961ae21f23d6678", 0xaf}], 0x2, 0xd) ioctl$EXT4_IOC_MIGRATE(r0, 0x6609) [ 333.734966][T14756] loop0: detected capacity change from 0 to 8 06:18:51 executing program 2: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800004, 0x12, r0, 0x0) mmap(&(0x7f0000000000/0xa000)=nil, 0xa000, 0x2, 0x2172, 0xffffffffffffffff, 0x0) socketpair(0x29, 0x80005, 0x0, &(0x7f0000000340)={0x0, 0x0}) 06:18:51 executing program 3: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800004, 0x12, r0, 0x0) preadv(r0, 0x0, 0x0, 0x9, 0x0) mmap(&(0x7f0000000000/0xa000)=nil, 0xa000, 0x2, 0x2172, 0xffffffffffffffff, 0x0) syz_mount_image$nilfs2(&(0x7f0000000180), &(0x7f0000000200)='./file0\x00', 0xd85, 0x7, &(0x7f00000006c0)=[{&(0x7f0000000240)="997c7e90471ec6786b6aa37fd8fbf290c011bee5642707bf7b126c36024e5e8f0d3d514aa1538eb70908eb3ac1a8a52e0ba29dab8884c189c9b68415aa0226e7c6a7ccf48ad20543b10360ab7ee9b247e4304d92f0ec7c0ba06d8160095660a0f12836e2033baed6228d464479ce22f2fadce176d0750fdc6ab1004eb9c4440707be1dc31c1ce11815d12f0d50eef6477341b3f6a4f364a1fccd68e2bcd2dba76227338cd6a1835a44", 0xa9, 0x8}, {&(0x7f0000000380)="3a79b76eed8bb53c1f5217cb4d40694fa75675b28af54d40304f697a1d04373a7ef7b09d46fa6365d222516dcc92d004bc937a22980c404bb5b5669f3dfd0e569079c03b2855be3337944aea4b03b03a3eb6d7", 0x53, 0x3}, {&(0x7f0000000400)="c8213af91316be74099fc072cc912017e77b8709c846cf00eb99c7c03cee58e25602e6ec0b4b42c8709e4447b0d23296a71661cdb6ea9b13d35ed3206f67e5559840f063e554ed7fcb842ab9b072197358b7a617cb0825abfabe3da9b022ecbe28ebcc22bd651a40dfcf4782be0c0c6d8adb8fdd7afce8c8659cc9eef1483eceb26a223fa9d591e28633e6bf6facd75e4295341e2ef3788284fc4482db16cab37de0c1adbf7fa07ad161ae875284778f49e15a052d875e", 0xb7, 0x80}, {&(0x7f00000004c0)="056b3e2d287f817e74a518293ea19b1196cccb376ac73cd7bbeccaced6f43aa9706b33d8ec56c58be0febb03dadec48add6a378f07f9053f1b6f33fe63a960502ad48232f0bee4a41509d7063d478768ab8ee0a90ebdb7c9bc326d54c8edad7e9d59641faf45c171e35f77f8c38a7563e1555c331a5a3e4da1ce59c0c697ebe071d527f24563165dafd23b45186c3d55251c825d0d7fd16b0f13a2f1321cddbcf231b398a88b19e3915ee544692c3559f42a", 0xb2, 0x6}, {&(0x7f0000000580)="8023d53ac815f8a84b84350b859e8673ed208a78bbfec2e35d6d4927707d5dd61106eb0321af3709c17fe7661323c51575e9c18d7b834c138636224eb1a7d75dd59d5c5d7411bdd4c2b07cf727643f52b1ca3e1680cde001be2f8334303e9f4191c2f9425472ca1ee6bac17fde09f0ce5fdf2e70d3c1a38b2d3e0e804f7df817b6a03e5e1ffea1ca7cd7", 0x8a, 0x8}, {&(0x7f0000000300)="fae83b83fc781c7715", 0x9, 0x8fe}, {&(0x7f0000000640)="96f1e3c89318e48db56867032dd1ba9b0ffeec69eb34236bd93b937c6bb7447840dc021e536b89aad4fe89ca2317f4fe2b36cbbdd8d72d841aee6f7b7be258352406775f169573cbf4da0bcf856f825233c5387a3a7cde778c057d591f2133c10e8b5bdb164577f492130acfc7", 0x6d, 0x5}], 0x802010, &(0x7f0000000740)={[{@order_relaxed}], [{@fsname}, {@fsuuid={'fsuuid', 0x3d, {[0x36, 0x38, 0x61, 0x64, 0x39, 0x38, 0x31, 0x37], 0x2d, [0x62, 0x61, 0x61, 0x63], 0x2d, [0x62, 0x39, 0x33, 0x35], 0x2d, [0x32, 0x37, 0x33, 0x61], 0x2d, [0x61, 0x39, 0x64, 0x65, 0x31, 0x8eb4bab6ccebb2ed, 0x64, 0x62]}}}]}) 06:18:51 executing program 1: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800004, 0x12, r0, 0x0) preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x9, 0x0) vmsplice(r0, &(0x7f0000000240)=[{&(0x7f0000000080)="4ab1b8694a30bc0b64f0bf0fa59d6d6310a9fca4f5ca7242c45a43a3f790f1bb52f7d713fdc0e6dfa75a5fa7f39f0c693511ea6a67b64b56fa4550fb865102551e0de8881e54887a6391bc4677137a4e433d75874a6619ff219d8ab89c1fdd9fe0d5ae7f1b35994210b3700e36625640f808", 0x72}, {&(0x7f0000000100)="b4346c01f32075d5cdbe81dc2919a8983c8e9f197195a027c0b95dec78d35df6ebeb63bff0423813616d67337c30bab5b6fb29da1bb7c014982cb6715df37902afa71736216374d5265195d9de49c7b08ac58de319c21a5fd49d6a39aecbae4bd0f079aab13eb24843b657b3b9e2f1e2d0731f5e00a4bafcf845d00e210b9ebf51a2303fbc02c70c9d4c62d4849f61727ffdac8e7a0e5b4b92dc03aa3ec3e37067eda1f5ee14cea961ae21f23d6678", 0xaf}], 0x2, 0xd) 06:18:51 executing program 2: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800004, 0x12, r0, 0x0) mmap(&(0x7f0000000000/0xa000)=nil, 0xa000, 0x2, 0x2172, 0xffffffffffffffff, 0x0) socketpair(0x29, 0x80005, 0x0, &(0x7f0000000340)={0x0, 0x0}) [ 333.866210][T14767] loop3: detected capacity change from 0 to 8 06:18:51 executing program 0: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800004, 0x12, r0, 0x0) preadv(r0, &(0x7f00000001c0), 0x0, 0x9, 0x0) mmap(&(0x7f0000000000/0xa000)=nil, 0xa000, 0x2, 0x2172, 0xffffffffffffffff, 0x0) syz_mount_image$nilfs2(&(0x7f0000000180), &(0x7f0000000200)='./file0\x00', 0xd85, 0x7, &(0x7f00000006c0)=[{&(0x7f0000000240)="997c7e90471ec6786b6aa37fd8fbf290c011bee5642707bf7b126c36024e5e8f0d3d514aa1538eb70908eb3ac1a8a52e0ba29dab8884c189c9b68415aa0226e7c6a7ccf48ad20543b10360ab7ee9b247e4304d92f0ec7c0ba06d8160095660a0f12836e2033baed6228d464479ce22f2fadce176d0750fdc6ab1004eb9c4440707be1dc31c1ce11815d12f0d50eef6477341b3f6a4f364a1fccd68e2bcd2dba76227338cd6a1835a44", 0xa9, 0x8}, {&(0x7f0000000380)="3a79b76eed8bb53c1f5217cb4d40694fa75675b28af54d40304f697a1d04373a7ef7b09d46fa6365d222516dcc92d004bc937a22980c404bb5b5669f3dfd0e569079c03b2855be3337944aea4b03b03a3eb6d7", 0x53, 0x3}, {&(0x7f0000000400)="c8213af91316be74099fc072cc912017e77b8709c846cf00eb99c7c03cee58e25602e6ec0b4b42c8709e4447b0d23296a71661cdb6ea9b13d35ed3206f67e5559840f063e554ed7fcb842ab9b072197358b7a617cb0825abfabe3da9b022ecbe28ebcc22bd651a40dfcf4782be0c0c6d8adb8fdd7afce8c8659cc9eef1483eceb26a223fa9d591e28633e6bf6facd75e4295341e2ef3788284fc4482db16cab37de0c1adbf7fa07ad161ae875284778f49e15a052d875e", 0xb7, 0x80}, {&(0x7f00000004c0)="056b3e2d287f817e74a518293ea19b1196cccb376ac73cd7bbeccaced6f43aa9706b33d8ec56c58be0febb03dadec48add6a378f07f9053f1b6f33fe63a960502ad48232f0bee4a41509d7063d478768ab8ee0a90ebdb7c9bc326d54c8edad7e9d59641faf45c171e35f77f8c38a7563e1555c331a5a3e4da1ce59c0c697ebe071d527f24563165dafd23b45186c3d55251c825d0d7fd16b0f13a2f1321cddbcf231b398a88b19e3915ee544692c3559f42a", 0xb2, 0x6}, {&(0x7f0000000580)="8023d53ac815f8a84b84350b859e8673ed208a78bbfec2e35d6d4927707d5dd61106eb0321af3709c17fe7661323c51575e9c18d7b834c138636224eb1a7d75dd59d5c5d7411bdd4c2b07cf727643f52b1ca3e1680cde001be2f8334303e9f4191c2f9425472ca1ee6bac17fde09f0ce5fdf2e70d3c1a38b2d3e0e804f7df817b6a03e5e1ffea1ca7cd7", 0x8a, 0x8}, {&(0x7f0000000300)="fae83b83fc781c7715", 0x9, 0x8fe}, {&(0x7f0000000640)="96f1e3c89318e48db56867032dd1ba9b0ffeec69eb34236bd93b937c6bb7447840dc021e536b89aad4fe89ca2317f4fe2b36cbbdd8d72d841aee6f7b7be258352406775f169573cbf4da0bcf856f825233c5387a3a7cde778c057d591f2133c10e8b5bdb164577f492130acfc7", 0x6d, 0x5}], 0x802010, &(0x7f0000000740)={[{@order_relaxed}], [{@fsname}, {@fsuuid={'fsuuid', 0x3d, {[0x36, 0x38, 0x61, 0x64, 0x39, 0x38, 0x31, 0x37], 0x2d, [0x62, 0x61, 0x61, 0x63], 0x2d, [0x62, 0x39, 0x33, 0x35], 0x2d, [0x32, 0x37, 0x33, 0x61], 0x2d, [0x61, 0x39, 0x64, 0x65, 0x31, 0x8eb4bab6ccebb2ed, 0x64, 0x62]}}}]}) 06:18:51 executing program 2: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800004, 0x12, r0, 0x0) mmap(&(0x7f0000000000/0xa000)=nil, 0xa000, 0x2, 0x2172, 0xffffffffffffffff, 0x0) socketpair(0x29, 0x80005, 0x0, &(0x7f0000000340)={0x0, 0x0}) 06:18:51 executing program 1: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800004, 0x12, r0, 0x0) vmsplice(r0, &(0x7f0000000240)=[{&(0x7f0000000080)="4ab1b8694a30bc0b64f0bf0fa59d6d6310a9fca4f5ca7242c45a43a3f790f1bb52f7d713fdc0e6dfa75a5fa7f39f0c693511ea6a67b64b56fa4550fb865102551e0de8881e54887a6391bc4677137a4e433d75874a6619ff219d8ab89c1fdd9fe0d5ae7f1b35994210b3700e36625640f808", 0x72}, {&(0x7f0000000100)="b4346c01f32075d5cdbe81dc2919a8983c8e9f197195a027c0b95dec78d35df6ebeb63bff0423813616d67337c30bab5b6fb29da1bb7c014982cb6715df37902afa71736216374d5265195d9de49c7b08ac58de319c21a5fd49d6a39aecbae4bd0f079aab13eb24843b657b3b9e2f1e2d0731f5e00a4bafcf845d00e210b9ebf51a2303fbc02c70c9d4c62d4849f61727ffdac8e7a0e5b4b92dc03aa3ec3e37067eda1f5ee14cea961ae21f23d6678", 0xaf}], 0x2, 0xd) 06:18:51 executing program 3: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800004, 0x12, r0, 0x0) preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x9, 0x0) mmap(&(0x7f0000000000/0xa000)=nil, 0xa000, 0x2, 0x2172, 0xffffffffffffffff, 0x0) r1 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x11, 0x4, &(0x7f00000000c0)=@framed={{}, [@call={0x85, 0x0, 0x0, 0x7b}]}, &(0x7f00000001c0)='syzkaller\x00', 0x4, 0x8f, &(0x7f00000002c0)=""/143, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='ext4_es_lookup_extent_exit\x00', r1}, 0x10) preadv(r1, &(0x7f0000000080)=[{&(0x7f0000000040)=""/12, 0xc}], 0x1, 0x36, 0x401) socketpair(0x1e, 0x80005, 0x0, &(0x7f0000000340)={0x0, 0x0}) close(r2) r3 = socket$unix(0x1, 0x1, 0x0) bind$unix(r3, &(0x7f00000001c0)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x56) ioctl$sock_SIOCOUTQNSD(r3, 0x894b, &(0x7f0000000100)) ioctl$RTC_PIE_OFF(r0, 0x7006) r4 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800004, 0x12, r4, 0x0) preadv(r4, &(0x7f00000001c0)=[{0x0}], 0x1, 0x9, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r4, 0x0) r5 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x11, 0x9, &(0x7f0000000380)=@raw=[@initr0={0x18, 0x0, 0x0, 0x0, 0x10000, 0x0, 0x0, 0x0, 0x3}, @ldst={0x2, 0x1, 0x3, 0x7196d1492be6837c, 0x4, 0xfffffffffffffff4, 0x10}, @jmp={0x5, 0x1, 0xa, 0x6, 0x7, 0x75, 0x1}, @map={0x18, 0xa, 0x1, 0x0, r4}, @map, @ldst={0x1, 0x3, 0x2, 0x0, 0x6, 0x50}], &(0x7f00000001c0)='syzkaller\x00', 0x4, 0x8f, &(0x7f00000002c0)=""/143, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x74) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='ext4_es_lookup_extent_exit\x00', r5}, 0x10) mmap(&(0x7f00006fe000/0x2000)=nil, 0x2000, 0x1000006, 0x50, r5, 0x6fdfe000) [ 334.015516][T14780] loop0: detected capacity change from 0 to 8 06:18:51 executing program 2: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x9, 0x0) mmap(&(0x7f0000000000/0xa000)=nil, 0xa000, 0x2, 0x2172, 0xffffffffffffffff, 0x0) socketpair(0x29, 0x80005, 0x0, &(0x7f0000000340)={0x0, 0x0}) 06:18:51 executing program 1: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800004, 0x12, r0, 0x0) vmsplice(r0, &(0x7f0000000240)=[{&(0x7f0000000080)="4ab1b8694a30bc0b64f0bf0fa59d6d6310a9fca4f5ca7242c45a43a3f790f1bb52f7d713fdc0e6dfa75a5fa7f39f0c693511ea6a67b64b56fa4550fb865102551e0de8881e54887a6391bc4677137a4e433d75874a6619ff219d8ab89c1fdd9fe0d5ae7f1b35994210b3700e36625640f808", 0x72}, {&(0x7f0000000100)="b4346c01f32075d5cdbe81dc2919a8983c8e9f197195a027c0b95dec78d35df6ebeb63bff0423813616d67337c30bab5b6fb29da1bb7c014982cb6715df37902afa71736216374d5265195d9de49c7b08ac58de319c21a5fd49d6a39aecbae4bd0f079aab13eb24843b657b3b9e2f1e2d0731f5e00a4bafcf845d00e210b9ebf51a2303fbc02c70c9d4c62d4849f61727ffdac8e7a0e5b4b92dc03aa3ec3e37067eda1f5ee14cea961ae21f23d6678", 0xaf}], 0x2, 0xd) 06:18:51 executing program 1: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800004, 0x12, r0, 0x0) vmsplice(r0, &(0x7f0000000240)=[{&(0x7f0000000080)="4ab1b8694a30bc0b64f0bf0fa59d6d6310a9fca4f5ca7242c45a43a3f790f1bb52f7d713fdc0e6dfa75a5fa7f39f0c693511ea6a67b64b56fa4550fb865102551e0de8881e54887a6391bc4677137a4e433d75874a6619ff219d8ab89c1fdd9fe0d5ae7f1b35994210b3700e36625640f808", 0x72}, {&(0x7f0000000100)="b4346c01f32075d5cdbe81dc2919a8983c8e9f197195a027c0b95dec78d35df6ebeb63bff0423813616d67337c30bab5b6fb29da1bb7c014982cb6715df37902afa71736216374d5265195d9de49c7b08ac58de319c21a5fd49d6a39aecbae4bd0f079aab13eb24843b657b3b9e2f1e2d0731f5e00a4bafcf845d00e210b9ebf51a2303fbc02c70c9d4c62d4849f61727ffdac8e7a0e5b4b92dc03aa3ec3e37067eda1f5ee14cea961ae21f23d6678", 0xaf}], 0x2, 0xd) 06:18:51 executing program 3: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800004, 0x12, r0, 0x0) preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x9, 0x0) mmap(&(0x7f0000000000/0xa000)=nil, 0xa000, 0x2, 0x2172, 0xffffffffffffffff, 0x0) r1 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x11, 0x4, &(0x7f00000000c0)=@framed={{}, [@call={0x85, 0x0, 0x0, 0x7b}]}, &(0x7f00000001c0)='syzkaller\x00', 0x4, 0x8f, &(0x7f00000002c0)=""/143, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='ext4_es_lookup_extent_exit\x00', r1}, 0x10) preadv(r1, &(0x7f0000000080)=[{&(0x7f0000000040)=""/12, 0xc}], 0x1, 0x36, 0x401) socketpair(0x1e, 0x80005, 0x0, &(0x7f0000000340)={0x0, 0x0}) close(r2) r3 = socket$unix(0x1, 0x1, 0x0) bind$unix(r3, &(0x7f00000001c0)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x56) ioctl$sock_SIOCOUTQNSD(r3, 0x894b, &(0x7f0000000100)) ioctl$RTC_PIE_OFF(r0, 0x7006) r4 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800004, 0x12, r4, 0x0) preadv(r4, &(0x7f00000001c0)=[{0x0}], 0x1, 0x9, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r4, 0x0) r5 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x11, 0x9, &(0x7f0000000380)=@raw=[@initr0={0x18, 0x0, 0x0, 0x0, 0x10000, 0x0, 0x0, 0x0, 0x3}, @ldst={0x2, 0x1, 0x3, 0x7196d1492be6837c, 0x4, 0xfffffffffffffff4, 0x10}, @jmp={0x5, 0x1, 0xa, 0x6, 0x7, 0x75, 0x1}, @map={0x18, 0xa, 0x1, 0x0, r4}, @map, @ldst={0x1, 0x3, 0x2, 0x0, 0x6, 0x50}], &(0x7f00000001c0)='syzkaller\x00', 0x4, 0x8f, &(0x7f00000002c0)=""/143, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x74) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='ext4_es_lookup_extent_exit\x00', r5}, 0x10) mmap(&(0x7f00006fe000/0x2000)=nil, 0x2000, 0x1000006, 0x50, r5, 0x6fdfe000) 06:18:51 executing program 0: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800004, 0x12, r0, 0x0) preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x0, 0x0) mmap(&(0x7f0000000000/0xa000)=nil, 0xa000, 0x2, 0x2172, 0xffffffffffffffff, 0x0) syz_mount_image$nilfs2(&(0x7f0000000180), &(0x7f0000000200)='./file0\x00', 0xd85, 0x7, &(0x7f00000006c0)=[{&(0x7f0000000240)="997c7e90471ec6786b6aa37fd8fbf290c011bee5642707bf7b126c36024e5e8f0d3d514aa1538eb70908eb3ac1a8a52e0ba29dab8884c189c9b68415aa0226e7c6a7ccf48ad20543b10360ab7ee9b247e4304d92f0ec7c0ba06d8160095660a0f12836e2033baed6228d464479ce22f2fadce176d0750fdc6ab1004eb9c4440707be1dc31c1ce11815d12f0d50eef6477341b3f6a4f364a1fccd68e2bcd2dba76227338cd6a1835a44", 0xa9, 0x8}, {&(0x7f0000000380)="3a79b76eed8bb53c1f5217cb4d40694fa75675b28af54d40304f697a1d04373a7ef7b09d46fa6365d222516dcc92d004bc937a22980c404bb5b5669f3dfd0e569079c03b2855be3337944aea4b03b03a3eb6d7", 0x53, 0x3}, {&(0x7f0000000400)="c8213af91316be74099fc072cc912017e77b8709c846cf00eb99c7c03cee58e25602e6ec0b4b42c8709e4447b0d23296a71661cdb6ea9b13d35ed3206f67e5559840f063e554ed7fcb842ab9b072197358b7a617cb0825abfabe3da9b022ecbe28ebcc22bd651a40dfcf4782be0c0c6d8adb8fdd7afce8c8659cc9eef1483eceb26a223fa9d591e28633e6bf6facd75e4295341e2ef3788284fc4482db16cab37de0c1adbf7fa07ad161ae875284778f49e15a052d875e", 0xb7, 0x80}, {&(0x7f00000004c0)="056b3e2d287f817e74a518293ea19b1196cccb376ac73cd7bbeccaced6f43aa9706b33d8ec56c58be0febb03dadec48add6a378f07f9053f1b6f33fe63a960502ad48232f0bee4a41509d7063d478768ab8ee0a90ebdb7c9bc326d54c8edad7e9d59641faf45c171e35f77f8c38a7563e1555c331a5a3e4da1ce59c0c697ebe071d527f24563165dafd23b45186c3d55251c825d0d7fd16b0f13a2f1321cddbcf231b398a88b19e3915ee544692c3559f42a", 0xb2, 0x6}, {&(0x7f0000000580)="8023d53ac815f8a84b84350b859e8673ed208a78bbfec2e35d6d4927707d5dd61106eb0321af3709c17fe7661323c51575e9c18d7b834c138636224eb1a7d75dd59d5c5d7411bdd4c2b07cf727643f52b1ca3e1680cde001be2f8334303e9f4191c2f9425472ca1ee6bac17fde09f0ce5fdf2e70d3c1a38b2d3e0e804f7df817b6a03e5e1ffea1ca7cd7", 0x8a, 0x8}, {&(0x7f0000000300)="fae83b83fc781c7715", 0x9, 0x8fe}, {&(0x7f0000000640)="96f1e3c89318e48db56867032dd1ba9b0ffeec69eb34236bd93b937c6bb7447840dc021e536b89aad4fe89ca2317f4fe2b36cbbdd8d72d841aee6f7b7be258352406775f169573cbf4da0bcf856f825233c5387a3a7cde778c057d591f2133c10e8b5bdb164577f492130acfc7", 0x6d, 0x5}], 0x802010, &(0x7f0000000740)={[{@order_relaxed}], [{@fsname}, {@fsuuid={'fsuuid', 0x3d, {[0x36, 0x38, 0x61, 0x64, 0x39, 0x38, 0x31, 0x37], 0x2d, [0x62, 0x61, 0x61, 0x63], 0x2d, [0x62, 0x39, 0x33, 0x35], 0x2d, [0x32, 0x37, 0x33, 0x61], 0x2d, [0x61, 0x39, 0x64, 0x65, 0x31, 0x8eb4bab6ccebb2ed, 0x64, 0x62]}}}]}) 06:18:51 executing program 2: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x9, 0x0) mmap(&(0x7f0000000000/0xa000)=nil, 0xa000, 0x2, 0x2172, 0xffffffffffffffff, 0x0) socketpair(0x29, 0x80005, 0x0, &(0x7f0000000340)={0x0, 0x0}) 06:18:51 executing program 1: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x9, 0x0) vmsplice(r0, &(0x7f0000000240)=[{&(0x7f0000000080)="4ab1b8694a30bc0b64f0bf0fa59d6d6310a9fca4f5ca7242c45a43a3f790f1bb52f7d713fdc0e6dfa75a5fa7f39f0c693511ea6a67b64b56fa4550fb865102551e0de8881e54887a6391bc4677137a4e433d75874a6619ff219d8ab89c1fdd9fe0d5ae7f1b35994210b3700e36625640f808", 0x72}, {&(0x7f0000000100)="b4346c01f32075d5cdbe81dc2919a8983c8e9f197195a027c0b95dec78d35df6ebeb63bff0423813616d67337c30bab5b6fb29da1bb7c014982cb6715df37902afa71736216374d5265195d9de49c7b08ac58de319c21a5fd49d6a39aecbae4bd0f079aab13eb24843b657b3b9e2f1e2d0731f5e00a4bafcf845d00e210b9ebf51a2303fbc02c70c9d4c62d4849f61727ffdac8e7a0e5b4b92dc03aa3ec3e37067eda1f5ee14cea961ae21f23d6678", 0xaf}], 0x2, 0xd) [ 334.166370][T14799] loop0: detected capacity change from 0 to 8 06:18:51 executing program 2: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x9, 0x0) mmap(&(0x7f0000000000/0xa000)=nil, 0xa000, 0x2, 0x2172, 0xffffffffffffffff, 0x0) socketpair(0x29, 0x80005, 0x0, &(0x7f0000000340)={0x0, 0x0}) 06:18:51 executing program 0: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800004, 0x12, r0, 0x0) preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x0, 0x0) mmap(&(0x7f0000000000/0xa000)=nil, 0xa000, 0x2, 0x2172, 0xffffffffffffffff, 0x0) syz_mount_image$nilfs2(&(0x7f0000000180), &(0x7f0000000200)='./file0\x00', 0xd85, 0x7, &(0x7f00000006c0)=[{&(0x7f0000000240)="997c7e90471ec6786b6aa37fd8fbf290c011bee5642707bf7b126c36024e5e8f0d3d514aa1538eb70908eb3ac1a8a52e0ba29dab8884c189c9b68415aa0226e7c6a7ccf48ad20543b10360ab7ee9b247e4304d92f0ec7c0ba06d8160095660a0f12836e2033baed6228d464479ce22f2fadce176d0750fdc6ab1004eb9c4440707be1dc31c1ce11815d12f0d50eef6477341b3f6a4f364a1fccd68e2bcd2dba76227338cd6a1835a44", 0xa9, 0x8}, {&(0x7f0000000380)="3a79b76eed8bb53c1f5217cb4d40694fa75675b28af54d40304f697a1d04373a7ef7b09d46fa6365d222516dcc92d004bc937a22980c404bb5b5669f3dfd0e569079c03b2855be3337944aea4b03b03a3eb6d7", 0x53, 0x3}, {&(0x7f0000000400)="c8213af91316be74099fc072cc912017e77b8709c846cf00eb99c7c03cee58e25602e6ec0b4b42c8709e4447b0d23296a71661cdb6ea9b13d35ed3206f67e5559840f063e554ed7fcb842ab9b072197358b7a617cb0825abfabe3da9b022ecbe28ebcc22bd651a40dfcf4782be0c0c6d8adb8fdd7afce8c8659cc9eef1483eceb26a223fa9d591e28633e6bf6facd75e4295341e2ef3788284fc4482db16cab37de0c1adbf7fa07ad161ae875284778f49e15a052d875e", 0xb7, 0x80}, {&(0x7f00000004c0)="056b3e2d287f817e74a518293ea19b1196cccb376ac73cd7bbeccaced6f43aa9706b33d8ec56c58be0febb03dadec48add6a378f07f9053f1b6f33fe63a960502ad48232f0bee4a41509d7063d478768ab8ee0a90ebdb7c9bc326d54c8edad7e9d59641faf45c171e35f77f8c38a7563e1555c331a5a3e4da1ce59c0c697ebe071d527f24563165dafd23b45186c3d55251c825d0d7fd16b0f13a2f1321cddbcf231b398a88b19e3915ee544692c3559f42a", 0xb2, 0x6}, {&(0x7f0000000580)="8023d53ac815f8a84b84350b859e8673ed208a78bbfec2e35d6d4927707d5dd61106eb0321af3709c17fe7661323c51575e9c18d7b834c138636224eb1a7d75dd59d5c5d7411bdd4c2b07cf727643f52b1ca3e1680cde001be2f8334303e9f4191c2f9425472ca1ee6bac17fde09f0ce5fdf2e70d3c1a38b2d3e0e804f7df817b6a03e5e1ffea1ca7cd7", 0x8a, 0x8}, {&(0x7f0000000300)="fae83b83fc781c7715", 0x9, 0x8fe}, {&(0x7f0000000640)="96f1e3c89318e48db56867032dd1ba9b0ffeec69eb34236bd93b937c6bb7447840dc021e536b89aad4fe89ca2317f4fe2b36cbbdd8d72d841aee6f7b7be258352406775f169573cbf4da0bcf856f825233c5387a3a7cde778c057d591f2133c10e8b5bdb164577f492130acfc7", 0x6d, 0x5}], 0x802010, &(0x7f0000000740)={[{@order_relaxed}], [{@fsname}, {@fsuuid={'fsuuid', 0x3d, {[0x36, 0x38, 0x61, 0x64, 0x39, 0x38, 0x31, 0x37], 0x2d, [0x62, 0x61, 0x61, 0x63], 0x2d, [0x62, 0x39, 0x33, 0x35], 0x2d, [0x32, 0x37, 0x33, 0x61], 0x2d, [0x61, 0x39, 0x64, 0x65, 0x31, 0x8eb4bab6ccebb2ed, 0x64, 0x62]}}}]}) 06:18:51 executing program 3: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800004, 0x12, r0, 0x0) preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x9, 0x0) mmap(&(0x7f0000000000/0xa000)=nil, 0xa000, 0x2, 0x2172, 0xffffffffffffffff, 0x0) r1 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x11, 0x4, &(0x7f00000000c0)=@framed={{}, [@call={0x85, 0x0, 0x0, 0x7b}]}, &(0x7f00000001c0)='syzkaller\x00', 0x4, 0x8f, &(0x7f00000002c0)=""/143, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='ext4_es_lookup_extent_exit\x00', r1}, 0x10) preadv(r1, &(0x7f0000000080)=[{&(0x7f0000000040)=""/12, 0xc}], 0x1, 0x36, 0x401) socketpair(0x1e, 0x80005, 0x0, &(0x7f0000000340)={0x0, 0x0}) close(r2) r3 = socket$unix(0x1, 0x1, 0x0) bind$unix(r3, &(0x7f00000001c0)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x56) ioctl$sock_SIOCOUTQNSD(r3, 0x894b, &(0x7f0000000100)) ioctl$RTC_PIE_OFF(r0, 0x7006) r4 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800004, 0x12, r4, 0x0) preadv(r4, &(0x7f00000001c0)=[{0x0}], 0x1, 0x9, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r4, 0x0) r5 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x11, 0x9, &(0x7f0000000380)=@raw=[@initr0={0x18, 0x0, 0x0, 0x0, 0x10000, 0x0, 0x0, 0x0, 0x3}, @ldst={0x2, 0x1, 0x3, 0x7196d1492be6837c, 0x4, 0xfffffffffffffff4, 0x10}, @jmp={0x5, 0x1, 0xa, 0x6, 0x7, 0x75, 0x1}, @map={0x18, 0xa, 0x1, 0x0, r4}, @map, @ldst={0x1, 0x3, 0x2, 0x0, 0x6, 0x50}], &(0x7f00000001c0)='syzkaller\x00', 0x4, 0x8f, &(0x7f00000002c0)=""/143, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x74) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='ext4_es_lookup_extent_exit\x00', r5}, 0x10) mmap(&(0x7f00006fe000/0x2000)=nil, 0x2000, 0x1000006, 0x50, r5, 0x6fdfe000) 06:18:51 executing program 2: mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800004, 0x12, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f00000001c0)=[{0x0}], 0x1, 0x9, 0x0) mmap(&(0x7f0000000000/0xa000)=nil, 0xa000, 0x2, 0x2172, 0xffffffffffffffff, 0x0) socketpair(0x29, 0x80005, 0x0, &(0x7f0000000340)={0x0, 0x0}) 06:18:51 executing program 1: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x9, 0x0) vmsplice(r0, &(0x7f0000000240)=[{&(0x7f0000000080)="4ab1b8694a30bc0b64f0bf0fa59d6d6310a9fca4f5ca7242c45a43a3f790f1bb52f7d713fdc0e6dfa75a5fa7f39f0c693511ea6a67b64b56fa4550fb865102551e0de8881e54887a6391bc4677137a4e433d75874a6619ff219d8ab89c1fdd9fe0d5ae7f1b35994210b3700e36625640f808", 0x72}, {&(0x7f0000000100)="b4346c01f32075d5cdbe81dc2919a8983c8e9f197195a027c0b95dec78d35df6ebeb63bff0423813616d67337c30bab5b6fb29da1bb7c014982cb6715df37902afa71736216374d5265195d9de49c7b08ac58de319c21a5fd49d6a39aecbae4bd0f079aab13eb24843b657b3b9e2f1e2d0731f5e00a4bafcf845d00e210b9ebf51a2303fbc02c70c9d4c62d4849f61727ffdac8e7a0e5b4b92dc03aa3ec3e37067eda1f5ee14cea961ae21f23d6678", 0xaf}], 0x2, 0xd) [ 334.319500][T14810] loop0: detected capacity change from 0 to 8 06:18:51 executing program 2: mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800004, 0x12, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f00000001c0)=[{0x0}], 0x1, 0x9, 0x0) mmap(&(0x7f0000000000/0xa000)=nil, 0xa000, 0x2, 0x2172, 0xffffffffffffffff, 0x0) socketpair(0x29, 0x80005, 0x0, &(0x7f0000000340)={0x0, 0x0}) 06:18:51 executing program 1: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x9, 0x0) vmsplice(r0, &(0x7f0000000240)=[{&(0x7f0000000080)="4ab1b8694a30bc0b64f0bf0fa59d6d6310a9fca4f5ca7242c45a43a3f790f1bb52f7d713fdc0e6dfa75a5fa7f39f0c693511ea6a67b64b56fa4550fb865102551e0de8881e54887a6391bc4677137a4e433d75874a6619ff219d8ab89c1fdd9fe0d5ae7f1b35994210b3700e36625640f808", 0x72}, {&(0x7f0000000100)="b4346c01f32075d5cdbe81dc2919a8983c8e9f197195a027c0b95dec78d35df6ebeb63bff0423813616d67337c30bab5b6fb29da1bb7c014982cb6715df37902afa71736216374d5265195d9de49c7b08ac58de319c21a5fd49d6a39aecbae4bd0f079aab13eb24843b657b3b9e2f1e2d0731f5e00a4bafcf845d00e210b9ebf51a2303fbc02c70c9d4c62d4849f61727ffdac8e7a0e5b4b92dc03aa3ec3e37067eda1f5ee14cea961ae21f23d6678", 0xaf}], 0x2, 0xd) 06:18:52 executing program 2: mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800004, 0x12, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f00000001c0)=[{0x0}], 0x1, 0x9, 0x0) mmap(&(0x7f0000000000/0xa000)=nil, 0xa000, 0x2, 0x2172, 0xffffffffffffffff, 0x0) socketpair(0x29, 0x80005, 0x0, &(0x7f0000000340)={0x0, 0x0}) 06:18:52 executing program 3: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800004, 0x12, r0, 0x0) preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x9, 0x0) mmap(&(0x7f0000000000/0xa000)=nil, 0xa000, 0x2, 0x2172, 0xffffffffffffffff, 0x0) r1 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x11, 0x4, &(0x7f00000000c0)=@framed={{}, [@call={0x85, 0x0, 0x0, 0x7b}]}, &(0x7f00000001c0)='syzkaller\x00', 0x4, 0x8f, &(0x7f00000002c0)=""/143, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='ext4_es_lookup_extent_exit\x00', r1}, 0x10) preadv(r1, &(0x7f0000000080)=[{&(0x7f0000000040)=""/12, 0xc}], 0x1, 0x36, 0x401) socketpair(0x1e, 0x80005, 0x0, &(0x7f0000000340)={0x0, 0x0}) close(r2) r3 = socket$unix(0x1, 0x1, 0x0) bind$unix(r3, &(0x7f00000001c0)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x56) ioctl$sock_SIOCOUTQNSD(r3, 0x894b, &(0x7f0000000100)) ioctl$RTC_PIE_OFF(r0, 0x7006) r4 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800004, 0x12, r4, 0x0) preadv(r4, &(0x7f00000001c0)=[{0x0}], 0x1, 0x9, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r4, 0x0) r5 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x11, 0x9, &(0x7f0000000380)=@raw=[@initr0={0x18, 0x0, 0x0, 0x0, 0x10000, 0x0, 0x0, 0x0, 0x3}, @ldst={0x2, 0x1, 0x3, 0x7196d1492be6837c, 0x4, 0xfffffffffffffff4, 0x10}, @jmp={0x5, 0x1, 0xa, 0x6, 0x7, 0x75, 0x1}, @map={0x18, 0xa, 0x1, 0x0, r4}, @map, @ldst={0x1, 0x3, 0x2, 0x0, 0x6, 0x50}], &(0x7f00000001c0)='syzkaller\x00', 0x4, 0x8f, &(0x7f00000002c0)=""/143, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x74) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='ext4_es_lookup_extent_exit\x00', r5}, 0x10) 06:18:52 executing program 0: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800004, 0x12, r0, 0x0) preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x0, 0x0) mmap(&(0x7f0000000000/0xa000)=nil, 0xa000, 0x2, 0x2172, 0xffffffffffffffff, 0x0) syz_mount_image$nilfs2(&(0x7f0000000180), &(0x7f0000000200)='./file0\x00', 0xd85, 0x7, &(0x7f00000006c0)=[{&(0x7f0000000240)="997c7e90471ec6786b6aa37fd8fbf290c011bee5642707bf7b126c36024e5e8f0d3d514aa1538eb70908eb3ac1a8a52e0ba29dab8884c189c9b68415aa0226e7c6a7ccf48ad20543b10360ab7ee9b247e4304d92f0ec7c0ba06d8160095660a0f12836e2033baed6228d464479ce22f2fadce176d0750fdc6ab1004eb9c4440707be1dc31c1ce11815d12f0d50eef6477341b3f6a4f364a1fccd68e2bcd2dba76227338cd6a1835a44", 0xa9, 0x8}, {&(0x7f0000000380)="3a79b76eed8bb53c1f5217cb4d40694fa75675b28af54d40304f697a1d04373a7ef7b09d46fa6365d222516dcc92d004bc937a22980c404bb5b5669f3dfd0e569079c03b2855be3337944aea4b03b03a3eb6d7", 0x53, 0x3}, {&(0x7f0000000400)="c8213af91316be74099fc072cc912017e77b8709c846cf00eb99c7c03cee58e25602e6ec0b4b42c8709e4447b0d23296a71661cdb6ea9b13d35ed3206f67e5559840f063e554ed7fcb842ab9b072197358b7a617cb0825abfabe3da9b022ecbe28ebcc22bd651a40dfcf4782be0c0c6d8adb8fdd7afce8c8659cc9eef1483eceb26a223fa9d591e28633e6bf6facd75e4295341e2ef3788284fc4482db16cab37de0c1adbf7fa07ad161ae875284778f49e15a052d875e", 0xb7, 0x80}, {&(0x7f00000004c0)="056b3e2d287f817e74a518293ea19b1196cccb376ac73cd7bbeccaced6f43aa9706b33d8ec56c58be0febb03dadec48add6a378f07f9053f1b6f33fe63a960502ad48232f0bee4a41509d7063d478768ab8ee0a90ebdb7c9bc326d54c8edad7e9d59641faf45c171e35f77f8c38a7563e1555c331a5a3e4da1ce59c0c697ebe071d527f24563165dafd23b45186c3d55251c825d0d7fd16b0f13a2f1321cddbcf231b398a88b19e3915ee544692c3559f42a", 0xb2, 0x6}, {&(0x7f0000000580)="8023d53ac815f8a84b84350b859e8673ed208a78bbfec2e35d6d4927707d5dd61106eb0321af3709c17fe7661323c51575e9c18d7b834c138636224eb1a7d75dd59d5c5d7411bdd4c2b07cf727643f52b1ca3e1680cde001be2f8334303e9f4191c2f9425472ca1ee6bac17fde09f0ce5fdf2e70d3c1a38b2d3e0e804f7df817b6a03e5e1ffea1ca7cd7", 0x8a, 0x8}, {&(0x7f0000000300)="fae83b83fc781c7715", 0x9, 0x8fe}, {&(0x7f0000000640)="96f1e3c89318e48db56867032dd1ba9b0ffeec69eb34236bd93b937c6bb7447840dc021e536b89aad4fe89ca2317f4fe2b36cbbdd8d72d841aee6f7b7be258352406775f169573cbf4da0bcf856f825233c5387a3a7cde778c057d591f2133c10e8b5bdb164577f492130acfc7", 0x6d, 0x5}], 0x802010, &(0x7f0000000740)={[{@order_relaxed}], [{@fsname}, {@fsuuid={'fsuuid', 0x3d, {[0x36, 0x38, 0x61, 0x64, 0x39, 0x38, 0x31, 0x37], 0x2d, [0x62, 0x61, 0x61, 0x63], 0x2d, [0x62, 0x39, 0x33, 0x35], 0x2d, [0x32, 0x37, 0x33, 0x61], 0x2d, [0x61, 0x39, 0x64, 0x65, 0x31, 0x8eb4bab6ccebb2ed, 0x64, 0x62]}}}]}) 06:18:52 executing program 1: mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800004, 0x12, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f00000001c0)=[{0x0}], 0x1, 0x9, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000240)=[{&(0x7f0000000080)="4ab1b8694a30bc0b64f0bf0fa59d6d6310a9fca4f5ca7242c45a43a3f790f1bb52f7d713fdc0e6dfa75a5fa7f39f0c693511ea6a67b64b56fa4550fb865102551e0de8881e54887a6391bc4677137a4e433d75874a6619ff219d8ab89c1fdd9fe0d5ae7f1b35994210b3700e36625640f808", 0x72}, {&(0x7f0000000100)="b4346c01f32075d5cdbe81dc2919a8983c8e9f197195a027c0b95dec78d35df6ebeb63bff0423813616d67337c30bab5b6fb29da1bb7c014982cb6715df37902afa71736216374d5265195d9de49c7b08ac58de319c21a5fd49d6a39aecbae4bd0f079aab13eb24843b657b3b9e2f1e2d0731f5e00a4bafcf845d00e210b9ebf51a2303fbc02c70c9d4c62d4849f61727ffdac8e7a0e5b4b92dc03aa3ec3e37067eda1f5ee14cea961ae21f23d6678", 0xaf}], 0x2, 0xd) 06:18:52 executing program 3: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800004, 0x12, r0, 0x0) preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x9, 0x0) mmap(&(0x7f0000000000/0xa000)=nil, 0xa000, 0x2, 0x2172, 0xffffffffffffffff, 0x0) r1 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x11, 0x4, &(0x7f00000000c0)=@framed={{}, [@call={0x85, 0x0, 0x0, 0x7b}]}, &(0x7f00000001c0)='syzkaller\x00', 0x4, 0x8f, &(0x7f00000002c0)=""/143, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='ext4_es_lookup_extent_exit\x00', r1}, 0x10) preadv(r1, &(0x7f0000000080)=[{&(0x7f0000000040)=""/12, 0xc}], 0x1, 0x36, 0x401) socketpair(0x1e, 0x80005, 0x0, &(0x7f0000000340)={0x0, 0x0}) close(r2) r3 = socket$unix(0x1, 0x1, 0x0) bind$unix(r3, &(0x7f00000001c0)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x56) ioctl$sock_SIOCOUTQNSD(r3, 0x894b, &(0x7f0000000100)) ioctl$RTC_PIE_OFF(r0, 0x7006) r4 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800004, 0x12, r4, 0x0) preadv(r4, &(0x7f00000001c0)=[{0x0}], 0x1, 0x9, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r4, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x11, 0x9, &(0x7f0000000380)=@raw=[@initr0={0x18, 0x0, 0x0, 0x0, 0x10000, 0x0, 0x0, 0x0, 0x3}, @ldst={0x2, 0x1, 0x3, 0x7196d1492be6837c, 0x4, 0xfffffffffffffff4, 0x10}, @jmp={0x5, 0x1, 0xa, 0x6, 0x7, 0x75, 0x1}, @map={0x18, 0xa, 0x1, 0x0, r4}, @map, @ldst={0x1, 0x3, 0x2, 0x0, 0x6, 0x50}], &(0x7f00000001c0)='syzkaller\x00', 0x4, 0x8f, &(0x7f00000002c0)=""/143, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x74) [ 334.487283][T14827] loop0: detected capacity change from 0 to 8 06:18:52 executing program 2: r0 = openat(0xffffffffffffffff, 0x0, 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800004, 0x12, r0, 0x0) preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x9, 0x0) mmap(&(0x7f0000000000/0xa000)=nil, 0xa000, 0x2, 0x2172, 0xffffffffffffffff, 0x0) socketpair(0x29, 0x80005, 0x0, &(0x7f0000000340)={0x0, 0x0}) 06:18:52 executing program 1: mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800004, 0x12, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f00000001c0)=[{0x0}], 0x1, 0x9, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000240)=[{&(0x7f0000000080)="4ab1b8694a30bc0b64f0bf0fa59d6d6310a9fca4f5ca7242c45a43a3f790f1bb52f7d713fdc0e6dfa75a5fa7f39f0c693511ea6a67b64b56fa4550fb865102551e0de8881e54887a6391bc4677137a4e433d75874a6619ff219d8ab89c1fdd9fe0d5ae7f1b35994210b3700e36625640f808", 0x72}, {&(0x7f0000000100)="b4346c01f32075d5cdbe81dc2919a8983c8e9f197195a027c0b95dec78d35df6ebeb63bff0423813616d67337c30bab5b6fb29da1bb7c014982cb6715df37902afa71736216374d5265195d9de49c7b08ac58de319c21a5fd49d6a39aecbae4bd0f079aab13eb24843b657b3b9e2f1e2d0731f5e00a4bafcf845d00e210b9ebf51a2303fbc02c70c9d4c62d4849f61727ffdac8e7a0e5b4b92dc03aa3ec3e37067eda1f5ee14cea961ae21f23d6678", 0xaf}], 0x2, 0xd) 06:18:52 executing program 2: r0 = openat(0xffffffffffffffff, 0x0, 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800004, 0x12, r0, 0x0) preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x9, 0x0) mmap(&(0x7f0000000000/0xa000)=nil, 0xa000, 0x2, 0x2172, 0xffffffffffffffff, 0x0) socketpair(0x29, 0x80005, 0x0, &(0x7f0000000340)={0x0, 0x0}) 06:18:52 executing program 0: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800004, 0x12, r0, 0x0) preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x9, 0x0) mmap(&(0x7f0000000000/0xa000)=nil, 0xa000, 0x0, 0x2172, 0xffffffffffffffff, 0x0) syz_mount_image$nilfs2(&(0x7f0000000180), &(0x7f0000000200)='./file0\x00', 0xd85, 0x7, &(0x7f00000006c0)=[{&(0x7f0000000240)="997c7e90471ec6786b6aa37fd8fbf290c011bee5642707bf7b126c36024e5e8f0d3d514aa1538eb70908eb3ac1a8a52e0ba29dab8884c189c9b68415aa0226e7c6a7ccf48ad20543b10360ab7ee9b247e4304d92f0ec7c0ba06d8160095660a0f12836e2033baed6228d464479ce22f2fadce176d0750fdc6ab1004eb9c4440707be1dc31c1ce11815d12f0d50eef6477341b3f6a4f364a1fccd68e2bcd2dba76227338cd6a1835a44", 0xa9, 0x8}, {&(0x7f0000000380)="3a79b76eed8bb53c1f5217cb4d40694fa75675b28af54d40304f697a1d04373a7ef7b09d46fa6365d222516dcc92d004bc937a22980c404bb5b5669f3dfd0e569079c03b2855be3337944aea4b03b03a3eb6d7", 0x53, 0x3}, {&(0x7f0000000400)="c8213af91316be74099fc072cc912017e77b8709c846cf00eb99c7c03cee58e25602e6ec0b4b42c8709e4447b0d23296a71661cdb6ea9b13d35ed3206f67e5559840f063e554ed7fcb842ab9b072197358b7a617cb0825abfabe3da9b022ecbe28ebcc22bd651a40dfcf4782be0c0c6d8adb8fdd7afce8c8659cc9eef1483eceb26a223fa9d591e28633e6bf6facd75e4295341e2ef3788284fc4482db16cab37de0c1adbf7fa07ad161ae875284778f49e15a052d875e", 0xb7, 0x80}, {&(0x7f00000004c0)="056b3e2d287f817e74a518293ea19b1196cccb376ac73cd7bbeccaced6f43aa9706b33d8ec56c58be0febb03dadec48add6a378f07f9053f1b6f33fe63a960502ad48232f0bee4a41509d7063d478768ab8ee0a90ebdb7c9bc326d54c8edad7e9d59641faf45c171e35f77f8c38a7563e1555c331a5a3e4da1ce59c0c697ebe071d527f24563165dafd23b45186c3d55251c825d0d7fd16b0f13a2f1321cddbcf231b398a88b19e3915ee544692c3559f42a", 0xb2, 0x6}, {&(0x7f0000000580)="8023d53ac815f8a84b84350b859e8673ed208a78bbfec2e35d6d4927707d5dd61106eb0321af3709c17fe7661323c51575e9c18d7b834c138636224eb1a7d75dd59d5c5d7411bdd4c2b07cf727643f52b1ca3e1680cde001be2f8334303e9f4191c2f9425472ca1ee6bac17fde09f0ce5fdf2e70d3c1a38b2d3e0e804f7df817b6a03e5e1ffea1ca7cd7", 0x8a, 0x8}, {&(0x7f0000000300)="fae83b83fc781c7715", 0x9, 0x8fe}, {&(0x7f0000000640)="96f1e3c89318e48db56867032dd1ba9b0ffeec69eb34236bd93b937c6bb7447840dc021e536b89aad4fe89ca2317f4fe2b36cbbdd8d72d841aee6f7b7be258352406775f169573cbf4da0bcf856f825233c5387a3a7cde778c057d591f2133c10e8b5bdb164577f492130acfc7", 0x6d, 0x5}], 0x802010, &(0x7f0000000740)={[{@order_relaxed}], [{@fsname}, {@fsuuid={'fsuuid', 0x3d, {[0x36, 0x38, 0x61, 0x64, 0x39, 0x38, 0x31, 0x37], 0x2d, [0x62, 0x61, 0x61, 0x63], 0x2d, [0x62, 0x39, 0x33, 0x35], 0x2d, [0x32, 0x37, 0x33, 0x61], 0x2d, [0x61, 0x39, 0x64, 0x65, 0x31, 0x8eb4bab6ccebb2ed, 0x64, 0x62]}}}]}) 06:18:52 executing program 3: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800004, 0x12, r0, 0x0) preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x9, 0x0) mmap(&(0x7f0000000000/0xa000)=nil, 0xa000, 0x2, 0x2172, 0xffffffffffffffff, 0x0) r1 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x11, 0x4, &(0x7f00000000c0)=@framed={{}, [@call={0x85, 0x0, 0x0, 0x7b}]}, &(0x7f00000001c0)='syzkaller\x00', 0x4, 0x8f, &(0x7f00000002c0)=""/143, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='ext4_es_lookup_extent_exit\x00', r1}, 0x10) preadv(r1, &(0x7f0000000080)=[{&(0x7f0000000040)=""/12, 0xc}], 0x1, 0x36, 0x401) socketpair(0x1e, 0x80005, 0x0, &(0x7f0000000340)={0x0, 0x0}) close(r2) r3 = socket$unix(0x1, 0x1, 0x0) bind$unix(r3, &(0x7f00000001c0)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x56) ioctl$sock_SIOCOUTQNSD(r3, 0x894b, &(0x7f0000000100)) ioctl$RTC_PIE_OFF(r0, 0x7006) r4 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800004, 0x12, r4, 0x0) preadv(r4, &(0x7f00000001c0)=[{0x0}], 0x1, 0x9, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r4, 0x0) 06:18:52 executing program 2: r0 = openat(0xffffffffffffffff, 0x0, 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800004, 0x12, r0, 0x0) preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x9, 0x0) mmap(&(0x7f0000000000/0xa000)=nil, 0xa000, 0x2, 0x2172, 0xffffffffffffffff, 0x0) socketpair(0x29, 0x80005, 0x0, &(0x7f0000000340)={0x0, 0x0}) 06:18:52 executing program 1: mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800004, 0x12, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f00000001c0)=[{0x0}], 0x1, 0x9, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000240)=[{&(0x7f0000000080)="4ab1b8694a30bc0b64f0bf0fa59d6d6310a9fca4f5ca7242c45a43a3f790f1bb52f7d713fdc0e6dfa75a5fa7f39f0c693511ea6a67b64b56fa4550fb865102551e0de8881e54887a6391bc4677137a4e433d75874a6619ff219d8ab89c1fdd9fe0d5ae7f1b35994210b3700e36625640f808", 0x72}, {&(0x7f0000000100)="b4346c01f32075d5cdbe81dc2919a8983c8e9f197195a027c0b95dec78d35df6ebeb63bff0423813616d67337c30bab5b6fb29da1bb7c014982cb6715df37902afa71736216374d5265195d9de49c7b08ac58de319c21a5fd49d6a39aecbae4bd0f079aab13eb24843b657b3b9e2f1e2d0731f5e00a4bafcf845d00e210b9ebf51a2303fbc02c70c9d4c62d4849f61727ffdac8e7a0e5b4b92dc03aa3ec3e37067eda1f5ee14cea961ae21f23d6678", 0xaf}], 0x2, 0xd) 06:18:52 executing program 0: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800004, 0x12, r0, 0x0) preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x9, 0x0) mmap(&(0x7f0000000000/0xa000)=nil, 0xa000, 0x0, 0x2172, 0xffffffffffffffff, 0x0) syz_mount_image$nilfs2(&(0x7f0000000180), &(0x7f0000000200)='./file0\x00', 0xd85, 0x7, &(0x7f00000006c0)=[{&(0x7f0000000240)="997c7e90471ec6786b6aa37fd8fbf290c011bee5642707bf7b126c36024e5e8f0d3d514aa1538eb70908eb3ac1a8a52e0ba29dab8884c189c9b68415aa0226e7c6a7ccf48ad20543b10360ab7ee9b247e4304d92f0ec7c0ba06d8160095660a0f12836e2033baed6228d464479ce22f2fadce176d0750fdc6ab1004eb9c4440707be1dc31c1ce11815d12f0d50eef6477341b3f6a4f364a1fccd68e2bcd2dba76227338cd6a1835a44", 0xa9, 0x8}, {&(0x7f0000000380)="3a79b76eed8bb53c1f5217cb4d40694fa75675b28af54d40304f697a1d04373a7ef7b09d46fa6365d222516dcc92d004bc937a22980c404bb5b5669f3dfd0e569079c03b2855be3337944aea4b03b03a3eb6d7", 0x53, 0x3}, {&(0x7f0000000400)="c8213af91316be74099fc072cc912017e77b8709c846cf00eb99c7c03cee58e25602e6ec0b4b42c8709e4447b0d23296a71661cdb6ea9b13d35ed3206f67e5559840f063e554ed7fcb842ab9b072197358b7a617cb0825abfabe3da9b022ecbe28ebcc22bd651a40dfcf4782be0c0c6d8adb8fdd7afce8c8659cc9eef1483eceb26a223fa9d591e28633e6bf6facd75e4295341e2ef3788284fc4482db16cab37de0c1adbf7fa07ad161ae875284778f49e15a052d875e", 0xb7, 0x80}, {&(0x7f00000004c0)="056b3e2d287f817e74a518293ea19b1196cccb376ac73cd7bbeccaced6f43aa9706b33d8ec56c58be0febb03dadec48add6a378f07f9053f1b6f33fe63a960502ad48232f0bee4a41509d7063d478768ab8ee0a90ebdb7c9bc326d54c8edad7e9d59641faf45c171e35f77f8c38a7563e1555c331a5a3e4da1ce59c0c697ebe071d527f24563165dafd23b45186c3d55251c825d0d7fd16b0f13a2f1321cddbcf231b398a88b19e3915ee544692c3559f42a", 0xb2, 0x6}, {&(0x7f0000000580)="8023d53ac815f8a84b84350b859e8673ed208a78bbfec2e35d6d4927707d5dd61106eb0321af3709c17fe7661323c51575e9c18d7b834c138636224eb1a7d75dd59d5c5d7411bdd4c2b07cf727643f52b1ca3e1680cde001be2f8334303e9f4191c2f9425472ca1ee6bac17fde09f0ce5fdf2e70d3c1a38b2d3e0e804f7df817b6a03e5e1ffea1ca7cd7", 0x8a, 0x8}, {&(0x7f0000000300)="fae83b83fc781c7715", 0x9, 0x8fe}, {&(0x7f0000000640)="96f1e3c89318e48db56867032dd1ba9b0ffeec69eb34236bd93b937c6bb7447840dc021e536b89aad4fe89ca2317f4fe2b36cbbdd8d72d841aee6f7b7be258352406775f169573cbf4da0bcf856f825233c5387a3a7cde778c057d591f2133c10e8b5bdb164577f492130acfc7", 0x6d, 0x5}], 0x802010, &(0x7f0000000740)={[{@order_relaxed}], [{@fsname}, {@fsuuid={'fsuuid', 0x3d, {[0x36, 0x38, 0x61, 0x64, 0x39, 0x38, 0x31, 0x37], 0x2d, [0x62, 0x61, 0x61, 0x63], 0x2d, [0x62, 0x39, 0x33, 0x35], 0x2d, [0x32, 0x37, 0x33, 0x61], 0x2d, [0x61, 0x39, 0x64, 0x65, 0x31, 0x8eb4bab6ccebb2ed, 0x64, 0x62]}}}]}) 06:18:52 executing program 3: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800004, 0x12, r0, 0x0) preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x9, 0x0) mmap(&(0x7f0000000000/0xa000)=nil, 0xa000, 0x2, 0x2172, 0xffffffffffffffff, 0x0) r1 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x11, 0x4, &(0x7f00000000c0)=@framed={{}, [@call={0x85, 0x0, 0x0, 0x7b}]}, &(0x7f00000001c0)='syzkaller\x00', 0x4, 0x8f, &(0x7f00000002c0)=""/143, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='ext4_es_lookup_extent_exit\x00', r1}, 0x10) preadv(r1, &(0x7f0000000080)=[{&(0x7f0000000040)=""/12, 0xc}], 0x1, 0x36, 0x401) socketpair(0x1e, 0x80005, 0x0, &(0x7f0000000340)={0x0, 0x0}) close(r2) r3 = socket$unix(0x1, 0x1, 0x0) bind$unix(r3, &(0x7f00000001c0)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x56) ioctl$sock_SIOCOUTQNSD(r3, 0x894b, &(0x7f0000000100)) ioctl$RTC_PIE_OFF(r0, 0x7006) r4 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800004, 0x12, r4, 0x0) preadv(r4, &(0x7f00000001c0)=[{0x0}], 0x1, 0x9, 0x0) 06:18:52 executing program 2: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x0, 0x12, r0, 0x0) preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x9, 0x0) mmap(&(0x7f0000000000/0xa000)=nil, 0xa000, 0x2, 0x2172, 0xffffffffffffffff, 0x0) socketpair(0x29, 0x80005, 0x0, &(0x7f0000000340)={0x0, 0x0}) 06:18:52 executing program 1: r0 = openat(0xffffffffffffffff, 0x0, 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800004, 0x12, r0, 0x0) preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x9, 0x0) vmsplice(r0, &(0x7f0000000240)=[{&(0x7f0000000080)="4ab1b8694a30bc0b64f0bf0fa59d6d6310a9fca4f5ca7242c45a43a3f790f1bb52f7d713fdc0e6dfa75a5fa7f39f0c693511ea6a67b64b56fa4550fb865102551e0de8881e54887a6391bc4677137a4e433d75874a6619ff219d8ab89c1fdd9fe0d5ae7f1b35994210b3700e36625640f808", 0x72}, {&(0x7f0000000100)="b4346c01f32075d5cdbe81dc2919a8983c8e9f197195a027c0b95dec78d35df6ebeb63bff0423813616d67337c30bab5b6fb29da1bb7c014982cb6715df37902afa71736216374d5265195d9de49c7b08ac58de319c21a5fd49d6a39aecbae4bd0f079aab13eb24843b657b3b9e2f1e2d0731f5e00a4bafcf845d00e210b9ebf51a2303fbc02c70c9d4c62d4849f61727ffdac8e7a0e5b4b92dc03aa3ec3e37067eda1f5ee14cea961ae21f23d6678", 0xaf}], 0x2, 0xd) 06:18:52 executing program 0: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800004, 0x12, r0, 0x0) preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x9, 0x0) mmap(&(0x7f0000000000/0xa000)=nil, 0xa000, 0x0, 0x2172, 0xffffffffffffffff, 0x0) syz_mount_image$nilfs2(&(0x7f0000000180), &(0x7f0000000200)='./file0\x00', 0xd85, 0x7, &(0x7f00000006c0)=[{&(0x7f0000000240)="997c7e90471ec6786b6aa37fd8fbf290c011bee5642707bf7b126c36024e5e8f0d3d514aa1538eb70908eb3ac1a8a52e0ba29dab8884c189c9b68415aa0226e7c6a7ccf48ad20543b10360ab7ee9b247e4304d92f0ec7c0ba06d8160095660a0f12836e2033baed6228d464479ce22f2fadce176d0750fdc6ab1004eb9c4440707be1dc31c1ce11815d12f0d50eef6477341b3f6a4f364a1fccd68e2bcd2dba76227338cd6a1835a44", 0xa9, 0x8}, {&(0x7f0000000380)="3a79b76eed8bb53c1f5217cb4d40694fa75675b28af54d40304f697a1d04373a7ef7b09d46fa6365d222516dcc92d004bc937a22980c404bb5b5669f3dfd0e569079c03b2855be3337944aea4b03b03a3eb6d7", 0x53, 0x3}, {&(0x7f0000000400)="c8213af91316be74099fc072cc912017e77b8709c846cf00eb99c7c03cee58e25602e6ec0b4b42c8709e4447b0d23296a71661cdb6ea9b13d35ed3206f67e5559840f063e554ed7fcb842ab9b072197358b7a617cb0825abfabe3da9b022ecbe28ebcc22bd651a40dfcf4782be0c0c6d8adb8fdd7afce8c8659cc9eef1483eceb26a223fa9d591e28633e6bf6facd75e4295341e2ef3788284fc4482db16cab37de0c1adbf7fa07ad161ae875284778f49e15a052d875e", 0xb7, 0x80}, {&(0x7f00000004c0)="056b3e2d287f817e74a518293ea19b1196cccb376ac73cd7bbeccaced6f43aa9706b33d8ec56c58be0febb03dadec48add6a378f07f9053f1b6f33fe63a960502ad48232f0bee4a41509d7063d478768ab8ee0a90ebdb7c9bc326d54c8edad7e9d59641faf45c171e35f77f8c38a7563e1555c331a5a3e4da1ce59c0c697ebe071d527f24563165dafd23b45186c3d55251c825d0d7fd16b0f13a2f1321cddbcf231b398a88b19e3915ee544692c3559f42a", 0xb2, 0x6}, {&(0x7f0000000580)="8023d53ac815f8a84b84350b859e8673ed208a78bbfec2e35d6d4927707d5dd61106eb0321af3709c17fe7661323c51575e9c18d7b834c138636224eb1a7d75dd59d5c5d7411bdd4c2b07cf727643f52b1ca3e1680cde001be2f8334303e9f4191c2f9425472ca1ee6bac17fde09f0ce5fdf2e70d3c1a38b2d3e0e804f7df817b6a03e5e1ffea1ca7cd7", 0x8a, 0x8}, {&(0x7f0000000300)="fae83b83fc781c7715", 0x9, 0x8fe}, {&(0x7f0000000640)="96f1e3c89318e48db56867032dd1ba9b0ffeec69eb34236bd93b937c6bb7447840dc021e536b89aad4fe89ca2317f4fe2b36cbbdd8d72d841aee6f7b7be258352406775f169573cbf4da0bcf856f825233c5387a3a7cde778c057d591f2133c10e8b5bdb164577f492130acfc7", 0x6d, 0x5}], 0x802010, &(0x7f0000000740)={[{@order_relaxed}], [{@fsname}, {@fsuuid={'fsuuid', 0x3d, {[0x36, 0x38, 0x61, 0x64, 0x39, 0x38, 0x31, 0x37], 0x2d, [0x62, 0x61, 0x61, 0x63], 0x2d, [0x62, 0x39, 0x33, 0x35], 0x2d, [0x32, 0x37, 0x33, 0x61], 0x2d, [0x61, 0x39, 0x64, 0x65, 0x31, 0x8eb4bab6ccebb2ed, 0x64, 0x62]}}}]}) 06:18:52 executing program 1: r0 = openat(0xffffffffffffffff, 0x0, 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800004, 0x12, r0, 0x0) preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x9, 0x0) vmsplice(r0, &(0x7f0000000240)=[{&(0x7f0000000080)="4ab1b8694a30bc0b64f0bf0fa59d6d6310a9fca4f5ca7242c45a43a3f790f1bb52f7d713fdc0e6dfa75a5fa7f39f0c693511ea6a67b64b56fa4550fb865102551e0de8881e54887a6391bc4677137a4e433d75874a6619ff219d8ab89c1fdd9fe0d5ae7f1b35994210b3700e36625640f808", 0x72}, {&(0x7f0000000100)="b4346c01f32075d5cdbe81dc2919a8983c8e9f197195a027c0b95dec78d35df6ebeb63bff0423813616d67337c30bab5b6fb29da1bb7c014982cb6715df37902afa71736216374d5265195d9de49c7b08ac58de319c21a5fd49d6a39aecbae4bd0f079aab13eb24843b657b3b9e2f1e2d0731f5e00a4bafcf845d00e210b9ebf51a2303fbc02c70c9d4c62d4849f61727ffdac8e7a0e5b4b92dc03aa3ec3e37067eda1f5ee14cea961ae21f23d6678", 0xaf}], 0x2, 0xd) 06:18:52 executing program 2: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x0, 0x12, r0, 0x0) preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x9, 0x0) mmap(&(0x7f0000000000/0xa000)=nil, 0xa000, 0x2, 0x2172, 0xffffffffffffffff, 0x0) socketpair(0x29, 0x80005, 0x0, &(0x7f0000000340)={0x0, 0x0}) 06:18:52 executing program 0: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800004, 0x12, r0, 0x0) preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x9, 0x0) mmap(&(0x7f0000000000/0xa000)=nil, 0xa000, 0x2, 0x10, 0xffffffffffffffff, 0x0) syz_mount_image$nilfs2(&(0x7f0000000180), &(0x7f0000000200)='./file0\x00', 0xd85, 0x7, &(0x7f00000006c0)=[{&(0x7f0000000240)="997c7e90471ec6786b6aa37fd8fbf290c011bee5642707bf7b126c36024e5e8f0d3d514aa1538eb70908eb3ac1a8a52e0ba29dab8884c189c9b68415aa0226e7c6a7ccf48ad20543b10360ab7ee9b247e4304d92f0ec7c0ba06d8160095660a0f12836e2033baed6228d464479ce22f2fadce176d0750fdc6ab1004eb9c4440707be1dc31c1ce11815d12f0d50eef6477341b3f6a4f364a1fccd68e2bcd2dba76227338cd6a1835a44", 0xa9, 0x8}, {&(0x7f0000000380)="3a79b76eed8bb53c1f5217cb4d40694fa75675b28af54d40304f697a1d04373a7ef7b09d46fa6365d222516dcc92d004bc937a22980c404bb5b5669f3dfd0e569079c03b2855be3337944aea4b03b03a3eb6d7", 0x53, 0x3}, {&(0x7f0000000400)="c8213af91316be74099fc072cc912017e77b8709c846cf00eb99c7c03cee58e25602e6ec0b4b42c8709e4447b0d23296a71661cdb6ea9b13d35ed3206f67e5559840f063e554ed7fcb842ab9b072197358b7a617cb0825abfabe3da9b022ecbe28ebcc22bd651a40dfcf4782be0c0c6d8adb8fdd7afce8c8659cc9eef1483eceb26a223fa9d591e28633e6bf6facd75e4295341e2ef3788284fc4482db16cab37de0c1adbf7fa07ad161ae875284778f49e15a052d875e", 0xb7, 0x80}, {&(0x7f00000004c0)="056b3e2d287f817e74a518293ea19b1196cccb376ac73cd7bbeccaced6f43aa9706b33d8ec56c58be0febb03dadec48add6a378f07f9053f1b6f33fe63a960502ad48232f0bee4a41509d7063d478768ab8ee0a90ebdb7c9bc326d54c8edad7e9d59641faf45c171e35f77f8c38a7563e1555c331a5a3e4da1ce59c0c697ebe071d527f24563165dafd23b45186c3d55251c825d0d7fd16b0f13a2f1321cddbcf231b398a88b19e3915ee544692c3559f42a", 0xb2, 0x6}, {&(0x7f0000000580)="8023d53ac815f8a84b84350b859e8673ed208a78bbfec2e35d6d4927707d5dd61106eb0321af3709c17fe7661323c51575e9c18d7b834c138636224eb1a7d75dd59d5c5d7411bdd4c2b07cf727643f52b1ca3e1680cde001be2f8334303e9f4191c2f9425472ca1ee6bac17fde09f0ce5fdf2e70d3c1a38b2d3e0e804f7df817b6a03e5e1ffea1ca7cd7", 0x8a, 0x8}, {&(0x7f0000000300)="fae83b83fc781c7715", 0x9, 0x8fe}, {&(0x7f0000000640)="96f1e3c89318e48db56867032dd1ba9b0ffeec69eb34236bd93b937c6bb7447840dc021e536b89aad4fe89ca2317f4fe2b36cbbdd8d72d841aee6f7b7be258352406775f169573cbf4da0bcf856f825233c5387a3a7cde778c057d591f2133c10e8b5bdb164577f492130acfc7", 0x6d, 0x5}], 0x802010, &(0x7f0000000740)={[{@order_relaxed}], [{@fsname}, {@fsuuid={'fsuuid', 0x3d, {[0x36, 0x38, 0x61, 0x64, 0x39, 0x38, 0x31, 0x37], 0x2d, [0x62, 0x61, 0x61, 0x63], 0x2d, [0x62, 0x39, 0x33, 0x35], 0x2d, [0x32, 0x37, 0x33, 0x61], 0x2d, [0x61, 0x39, 0x64, 0x65, 0x31, 0x8eb4bab6ccebb2ed, 0x64, 0x62]}}}]}) 06:18:52 executing program 1: r0 = openat(0xffffffffffffffff, 0x0, 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800004, 0x12, r0, 0x0) preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x9, 0x0) vmsplice(r0, &(0x7f0000000240)=[{&(0x7f0000000080)="4ab1b8694a30bc0b64f0bf0fa59d6d6310a9fca4f5ca7242c45a43a3f790f1bb52f7d713fdc0e6dfa75a5fa7f39f0c693511ea6a67b64b56fa4550fb865102551e0de8881e54887a6391bc4677137a4e433d75874a6619ff219d8ab89c1fdd9fe0d5ae7f1b35994210b3700e36625640f808", 0x72}, {&(0x7f0000000100)="b4346c01f32075d5cdbe81dc2919a8983c8e9f197195a027c0b95dec78d35df6ebeb63bff0423813616d67337c30bab5b6fb29da1bb7c014982cb6715df37902afa71736216374d5265195d9de49c7b08ac58de319c21a5fd49d6a39aecbae4bd0f079aab13eb24843b657b3b9e2f1e2d0731f5e00a4bafcf845d00e210b9ebf51a2303fbc02c70c9d4c62d4849f61727ffdac8e7a0e5b4b92dc03aa3ec3e37067eda1f5ee14cea961ae21f23d6678", 0xaf}], 0x2, 0xd) 06:18:52 executing program 3: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800004, 0x12, r0, 0x0) preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x9, 0x0) mmap(&(0x7f0000000000/0xa000)=nil, 0xa000, 0x2, 0x2172, 0xffffffffffffffff, 0x0) r1 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x11, 0x4, &(0x7f00000000c0)=@framed={{}, [@call={0x85, 0x0, 0x0, 0x7b}]}, &(0x7f00000001c0)='syzkaller\x00', 0x4, 0x8f, &(0x7f00000002c0)=""/143, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='ext4_es_lookup_extent_exit\x00', r1}, 0x10) preadv(r1, &(0x7f0000000080)=[{&(0x7f0000000040)=""/12, 0xc}], 0x1, 0x36, 0x401) socketpair(0x1e, 0x80005, 0x0, &(0x7f0000000340)={0x0, 0x0}) close(r2) r3 = socket$unix(0x1, 0x1, 0x0) bind$unix(r3, &(0x7f00000001c0)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x56) ioctl$sock_SIOCOUTQNSD(r3, 0x894b, &(0x7f0000000100)) ioctl$RTC_PIE_OFF(r0, 0x7006) r4 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800004, 0x12, r4, 0x0) 06:18:52 executing program 2: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x0, 0x12, r0, 0x0) preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x9, 0x0) mmap(&(0x7f0000000000/0xa000)=nil, 0xa000, 0x2, 0x2172, 0xffffffffffffffff, 0x0) socketpair(0x29, 0x80005, 0x0, &(0x7f0000000340)={0x0, 0x0}) 06:18:52 executing program 0: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800004, 0x12, r0, 0x0) preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x9, 0x0) mmap(&(0x7f0000000000/0xa000)=nil, 0xa000, 0x2, 0x10, 0xffffffffffffffff, 0x0) syz_mount_image$nilfs2(&(0x7f0000000180), &(0x7f0000000200)='./file0\x00', 0xd85, 0x7, &(0x7f00000006c0)=[{&(0x7f0000000240)="997c7e90471ec6786b6aa37fd8fbf290c011bee5642707bf7b126c36024e5e8f0d3d514aa1538eb70908eb3ac1a8a52e0ba29dab8884c189c9b68415aa0226e7c6a7ccf48ad20543b10360ab7ee9b247e4304d92f0ec7c0ba06d8160095660a0f12836e2033baed6228d464479ce22f2fadce176d0750fdc6ab1004eb9c4440707be1dc31c1ce11815d12f0d50eef6477341b3f6a4f364a1fccd68e2bcd2dba76227338cd6a1835a44", 0xa9, 0x8}, {&(0x7f0000000380)="3a79b76eed8bb53c1f5217cb4d40694fa75675b28af54d40304f697a1d04373a7ef7b09d46fa6365d222516dcc92d004bc937a22980c404bb5b5669f3dfd0e569079c03b2855be3337944aea4b03b03a3eb6d7", 0x53, 0x3}, {&(0x7f0000000400)="c8213af91316be74099fc072cc912017e77b8709c846cf00eb99c7c03cee58e25602e6ec0b4b42c8709e4447b0d23296a71661cdb6ea9b13d35ed3206f67e5559840f063e554ed7fcb842ab9b072197358b7a617cb0825abfabe3da9b022ecbe28ebcc22bd651a40dfcf4782be0c0c6d8adb8fdd7afce8c8659cc9eef1483eceb26a223fa9d591e28633e6bf6facd75e4295341e2ef3788284fc4482db16cab37de0c1adbf7fa07ad161ae875284778f49e15a052d875e", 0xb7, 0x80}, {&(0x7f00000004c0)="056b3e2d287f817e74a518293ea19b1196cccb376ac73cd7bbeccaced6f43aa9706b33d8ec56c58be0febb03dadec48add6a378f07f9053f1b6f33fe63a960502ad48232f0bee4a41509d7063d478768ab8ee0a90ebdb7c9bc326d54c8edad7e9d59641faf45c171e35f77f8c38a7563e1555c331a5a3e4da1ce59c0c697ebe071d527f24563165dafd23b45186c3d55251c825d0d7fd16b0f13a2f1321cddbcf231b398a88b19e3915ee544692c3559f42a", 0xb2, 0x6}, {&(0x7f0000000580)="8023d53ac815f8a84b84350b859e8673ed208a78bbfec2e35d6d4927707d5dd61106eb0321af3709c17fe7661323c51575e9c18d7b834c138636224eb1a7d75dd59d5c5d7411bdd4c2b07cf727643f52b1ca3e1680cde001be2f8334303e9f4191c2f9425472ca1ee6bac17fde09f0ce5fdf2e70d3c1a38b2d3e0e804f7df817b6a03e5e1ffea1ca7cd7", 0x8a, 0x8}, {&(0x7f0000000300)="fae83b83fc781c7715", 0x9, 0x8fe}, {&(0x7f0000000640)="96f1e3c89318e48db56867032dd1ba9b0ffeec69eb34236bd93b937c6bb7447840dc021e536b89aad4fe89ca2317f4fe2b36cbbdd8d72d841aee6f7b7be258352406775f169573cbf4da0bcf856f825233c5387a3a7cde778c057d591f2133c10e8b5bdb164577f492130acfc7", 0x6d, 0x5}], 0x802010, &(0x7f0000000740)={[{@order_relaxed}], [{@fsname}, {@fsuuid={'fsuuid', 0x3d, {[0x36, 0x38, 0x61, 0x64, 0x39, 0x38, 0x31, 0x37], 0x2d, [0x62, 0x61, 0x61, 0x63], 0x2d, [0x62, 0x39, 0x33, 0x35], 0x2d, [0x32, 0x37, 0x33, 0x61], 0x2d, [0x61, 0x39, 0x64, 0x65, 0x31, 0x8eb4bab6ccebb2ed, 0x64, 0x62]}}}]}) 06:18:52 executing program 1: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x0, 0x12, r0, 0x0) preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x9, 0x0) vmsplice(r0, &(0x7f0000000240)=[{&(0x7f0000000080)="4ab1b8694a30bc0b64f0bf0fa59d6d6310a9fca4f5ca7242c45a43a3f790f1bb52f7d713fdc0e6dfa75a5fa7f39f0c693511ea6a67b64b56fa4550fb865102551e0de8881e54887a6391bc4677137a4e433d75874a6619ff219d8ab89c1fdd9fe0d5ae7f1b35994210b3700e36625640f808", 0x72}, {&(0x7f0000000100)="b4346c01f32075d5cdbe81dc2919a8983c8e9f197195a027c0b95dec78d35df6ebeb63bff0423813616d67337c30bab5b6fb29da1bb7c014982cb6715df37902afa71736216374d5265195d9de49c7b08ac58de319c21a5fd49d6a39aecbae4bd0f079aab13eb24843b657b3b9e2f1e2d0731f5e00a4bafcf845d00e210b9ebf51a2303fbc02c70c9d4c62d4849f61727ffdac8e7a0e5b4b92dc03aa3ec3e37067eda1f5ee14cea961ae21f23d6678", 0xaf}], 0x2, 0xd) 06:18:52 executing program 2: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800004, 0x10, r0, 0x0) preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x9, 0x0) mmap(&(0x7f0000000000/0xa000)=nil, 0xa000, 0x2, 0x2172, 0xffffffffffffffff, 0x0) socketpair(0x29, 0x80005, 0x0, &(0x7f0000000340)={0x0, 0x0}) 06:18:52 executing program 0: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800004, 0x12, r0, 0x0) preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x9, 0x0) mmap(&(0x7f0000000000/0xa000)=nil, 0xa000, 0x2, 0x10, 0xffffffffffffffff, 0x0) syz_mount_image$nilfs2(&(0x7f0000000180), &(0x7f0000000200)='./file0\x00', 0xd85, 0x7, &(0x7f00000006c0)=[{&(0x7f0000000240)="997c7e90471ec6786b6aa37fd8fbf290c011bee5642707bf7b126c36024e5e8f0d3d514aa1538eb70908eb3ac1a8a52e0ba29dab8884c189c9b68415aa0226e7c6a7ccf48ad20543b10360ab7ee9b247e4304d92f0ec7c0ba06d8160095660a0f12836e2033baed6228d464479ce22f2fadce176d0750fdc6ab1004eb9c4440707be1dc31c1ce11815d12f0d50eef6477341b3f6a4f364a1fccd68e2bcd2dba76227338cd6a1835a44", 0xa9, 0x8}, {&(0x7f0000000380)="3a79b76eed8bb53c1f5217cb4d40694fa75675b28af54d40304f697a1d04373a7ef7b09d46fa6365d222516dcc92d004bc937a22980c404bb5b5669f3dfd0e569079c03b2855be3337944aea4b03b03a3eb6d7", 0x53, 0x3}, {&(0x7f0000000400)="c8213af91316be74099fc072cc912017e77b8709c846cf00eb99c7c03cee58e25602e6ec0b4b42c8709e4447b0d23296a71661cdb6ea9b13d35ed3206f67e5559840f063e554ed7fcb842ab9b072197358b7a617cb0825abfabe3da9b022ecbe28ebcc22bd651a40dfcf4782be0c0c6d8adb8fdd7afce8c8659cc9eef1483eceb26a223fa9d591e28633e6bf6facd75e4295341e2ef3788284fc4482db16cab37de0c1adbf7fa07ad161ae875284778f49e15a052d875e", 0xb7, 0x80}, {&(0x7f00000004c0)="056b3e2d287f817e74a518293ea19b1196cccb376ac73cd7bbeccaced6f43aa9706b33d8ec56c58be0febb03dadec48add6a378f07f9053f1b6f33fe63a960502ad48232f0bee4a41509d7063d478768ab8ee0a90ebdb7c9bc326d54c8edad7e9d59641faf45c171e35f77f8c38a7563e1555c331a5a3e4da1ce59c0c697ebe071d527f24563165dafd23b45186c3d55251c825d0d7fd16b0f13a2f1321cddbcf231b398a88b19e3915ee544692c3559f42a", 0xb2, 0x6}, {&(0x7f0000000580)="8023d53ac815f8a84b84350b859e8673ed208a78bbfec2e35d6d4927707d5dd61106eb0321af3709c17fe7661323c51575e9c18d7b834c138636224eb1a7d75dd59d5c5d7411bdd4c2b07cf727643f52b1ca3e1680cde001be2f8334303e9f4191c2f9425472ca1ee6bac17fde09f0ce5fdf2e70d3c1a38b2d3e0e804f7df817b6a03e5e1ffea1ca7cd7", 0x8a, 0x8}, {&(0x7f0000000300)="fae83b83fc781c7715", 0x9, 0x8fe}, {&(0x7f0000000640)="96f1e3c89318e48db56867032dd1ba9b0ffeec69eb34236bd93b937c6bb7447840dc021e536b89aad4fe89ca2317f4fe2b36cbbdd8d72d841aee6f7b7be258352406775f169573cbf4da0bcf856f825233c5387a3a7cde778c057d591f2133c10e8b5bdb164577f492130acfc7", 0x6d, 0x5}], 0x802010, &(0x7f0000000740)={[{@order_relaxed}], [{@fsname}, {@fsuuid={'fsuuid', 0x3d, {[0x36, 0x38, 0x61, 0x64, 0x39, 0x38, 0x31, 0x37], 0x2d, [0x62, 0x61, 0x61, 0x63], 0x2d, [0x62, 0x39, 0x33, 0x35], 0x2d, [0x32, 0x37, 0x33, 0x61], 0x2d, [0x61, 0x39, 0x64, 0x65, 0x31, 0x8eb4bab6ccebb2ed, 0x64, 0x62]}}}]}) 06:18:52 executing program 3: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800004, 0x12, r0, 0x0) preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x9, 0x0) mmap(&(0x7f0000000000/0xa000)=nil, 0xa000, 0x2, 0x2172, 0xffffffffffffffff, 0x0) r1 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x11, 0x4, &(0x7f00000000c0)=@framed={{}, [@call={0x85, 0x0, 0x0, 0x7b}]}, &(0x7f00000001c0)='syzkaller\x00', 0x4, 0x8f, &(0x7f00000002c0)=""/143, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='ext4_es_lookup_extent_exit\x00', r1}, 0x10) preadv(r1, &(0x7f0000000080)=[{&(0x7f0000000040)=""/12, 0xc}], 0x1, 0x36, 0x401) socketpair(0x1e, 0x80005, 0x0, &(0x7f0000000340)={0x0, 0x0}) close(r2) r3 = socket$unix(0x1, 0x1, 0x0) bind$unix(r3, &(0x7f00000001c0)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x56) ioctl$sock_SIOCOUTQNSD(r3, 0x894b, &(0x7f0000000100)) ioctl$RTC_PIE_OFF(r0, 0x7006) openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) 06:18:52 executing program 2: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800004, 0x10, r0, 0x0) preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x9, 0x0) mmap(&(0x7f0000000000/0xa000)=nil, 0xa000, 0x2, 0x2172, 0xffffffffffffffff, 0x0) socketpair(0x29, 0x80005, 0x0, &(0x7f0000000340)={0x0, 0x0}) 06:18:52 executing program 1: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x0, 0x12, r0, 0x0) preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x9, 0x0) vmsplice(r0, &(0x7f0000000240)=[{&(0x7f0000000080)="4ab1b8694a30bc0b64f0bf0fa59d6d6310a9fca4f5ca7242c45a43a3f790f1bb52f7d713fdc0e6dfa75a5fa7f39f0c693511ea6a67b64b56fa4550fb865102551e0de8881e54887a6391bc4677137a4e433d75874a6619ff219d8ab89c1fdd9fe0d5ae7f1b35994210b3700e36625640f808", 0x72}, {&(0x7f0000000100)="b4346c01f32075d5cdbe81dc2919a8983c8e9f197195a027c0b95dec78d35df6ebeb63bff0423813616d67337c30bab5b6fb29da1bb7c014982cb6715df37902afa71736216374d5265195d9de49c7b08ac58de319c21a5fd49d6a39aecbae4bd0f079aab13eb24843b657b3b9e2f1e2d0731f5e00a4bafcf845d00e210b9ebf51a2303fbc02c70c9d4c62d4849f61727ffdac8e7a0e5b4b92dc03aa3ec3e37067eda1f5ee14cea961ae21f23d6678", 0xaf}], 0x2, 0xd) 06:18:52 executing program 3: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800004, 0x12, r0, 0x0) preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x9, 0x0) mmap(&(0x7f0000000000/0xa000)=nil, 0xa000, 0x2, 0x2172, 0xffffffffffffffff, 0x0) r1 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x11, 0x4, &(0x7f00000000c0)=@framed={{}, [@call={0x85, 0x0, 0x0, 0x7b}]}, &(0x7f00000001c0)='syzkaller\x00', 0x4, 0x8f, &(0x7f00000002c0)=""/143, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='ext4_es_lookup_extent_exit\x00', r1}, 0x10) preadv(r1, &(0x7f0000000080)=[{&(0x7f0000000040)=""/12, 0xc}], 0x1, 0x36, 0x401) socketpair(0x1e, 0x80005, 0x0, &(0x7f0000000340)={0x0, 0x0}) close(r2) r3 = socket$unix(0x1, 0x1, 0x0) bind$unix(r3, &(0x7f00000001c0)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x56) ioctl$sock_SIOCOUTQNSD(r3, 0x894b, &(0x7f0000000100)) ioctl$RTC_PIE_OFF(r0, 0x7006) 06:18:52 executing program 0: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800004, 0x12, r0, 0x0) preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x9, 0x0) mmap(&(0x7f0000000000/0xa000)=nil, 0xa000, 0x2, 0x2172, 0xffffffffffffffff, 0x0) syz_mount_image$nilfs2(0x0, &(0x7f0000000200)='./file0\x00', 0xd85, 0x7, &(0x7f00000006c0)=[{&(0x7f0000000240)="997c7e90471ec6786b6aa37fd8fbf290c011bee5642707bf7b126c36024e5e8f0d3d514aa1538eb70908eb3ac1a8a52e0ba29dab8884c189c9b68415aa0226e7c6a7ccf48ad20543b10360ab7ee9b247e4304d92f0ec7c0ba06d8160095660a0f12836e2033baed6228d464479ce22f2fadce176d0750fdc6ab1004eb9c4440707be1dc31c1ce11815d12f0d50eef6477341b3f6a4f364a1fccd68e2bcd2dba76227338cd6a1835a44", 0xa9, 0x8}, {&(0x7f0000000380)="3a79b76eed8bb53c1f5217cb4d40694fa75675b28af54d40304f697a1d04373a7ef7b09d46fa6365d222516dcc92d004bc937a22980c404bb5b5669f3dfd0e569079c03b2855be3337944aea4b03b03a3eb6d7", 0x53, 0x3}, {&(0x7f0000000400)="c8213af91316be74099fc072cc912017e77b8709c846cf00eb99c7c03cee58e25602e6ec0b4b42c8709e4447b0d23296a71661cdb6ea9b13d35ed3206f67e5559840f063e554ed7fcb842ab9b072197358b7a617cb0825abfabe3da9b022ecbe28ebcc22bd651a40dfcf4782be0c0c6d8adb8fdd7afce8c8659cc9eef1483eceb26a223fa9d591e28633e6bf6facd75e4295341e2ef3788284fc4482db16cab37de0c1adbf7fa07ad161ae875284778f49e15a052d875e", 0xb7, 0x80}, {&(0x7f00000004c0)="056b3e2d287f817e74a518293ea19b1196cccb376ac73cd7bbeccaced6f43aa9706b33d8ec56c58be0febb03dadec48add6a378f07f9053f1b6f33fe63a960502ad48232f0bee4a41509d7063d478768ab8ee0a90ebdb7c9bc326d54c8edad7e9d59641faf45c171e35f77f8c38a7563e1555c331a5a3e4da1ce59c0c697ebe071d527f24563165dafd23b45186c3d55251c825d0d7fd16b0f13a2f1321cddbcf231b398a88b19e3915ee544692c3559f42a", 0xb2, 0x6}, {&(0x7f0000000580)="8023d53ac815f8a84b84350b859e8673ed208a78bbfec2e35d6d4927707d5dd61106eb0321af3709c17fe7661323c51575e9c18d7b834c138636224eb1a7d75dd59d5c5d7411bdd4c2b07cf727643f52b1ca3e1680cde001be2f8334303e9f4191c2f9425472ca1ee6bac17fde09f0ce5fdf2e70d3c1a38b2d3e0e804f7df817b6a03e5e1ffea1ca7cd7", 0x8a, 0x8}, {&(0x7f0000000300)="fae83b83fc781c7715", 0x9, 0x8fe}, {&(0x7f0000000640)="96f1e3c89318e48db56867032dd1ba9b0ffeec69eb34236bd93b937c6bb7447840dc021e536b89aad4fe89ca2317f4fe2b36cbbdd8d72d841aee6f7b7be258352406775f169573cbf4da0bcf856f825233c5387a3a7cde778c057d591f2133c10e8b5bdb164577f492130acfc7", 0x6d, 0x5}], 0x802010, &(0x7f0000000740)={[{@order_relaxed}], [{@fsname}, {@fsuuid={'fsuuid', 0x3d, {[0x36, 0x38, 0x61, 0x64, 0x39, 0x38, 0x31, 0x37], 0x2d, [0x62, 0x61, 0x61, 0x63], 0x2d, [0x62, 0x39, 0x33, 0x35], 0x2d, [0x32, 0x37, 0x33, 0x61], 0x2d, [0x61, 0x39, 0x64, 0x65, 0x31, 0x8eb4bab6ccebb2ed, 0x64, 0x62]}}}]}) [ 335.070688][T14890] loop0: detected capacity change from 0 to 8 06:18:52 executing program 2: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800004, 0x10, r0, 0x0) preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x9, 0x0) mmap(&(0x7f0000000000/0xa000)=nil, 0xa000, 0x2, 0x2172, 0xffffffffffffffff, 0x0) socketpair(0x29, 0x80005, 0x0, &(0x7f0000000340)={0x0, 0x0}) 06:18:52 executing program 1: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x0, 0x12, r0, 0x0) preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x9, 0x0) vmsplice(r0, &(0x7f0000000240)=[{&(0x7f0000000080)="4ab1b8694a30bc0b64f0bf0fa59d6d6310a9fca4f5ca7242c45a43a3f790f1bb52f7d713fdc0e6dfa75a5fa7f39f0c693511ea6a67b64b56fa4550fb865102551e0de8881e54887a6391bc4677137a4e433d75874a6619ff219d8ab89c1fdd9fe0d5ae7f1b35994210b3700e36625640f808", 0x72}, {&(0x7f0000000100)="b4346c01f32075d5cdbe81dc2919a8983c8e9f197195a027c0b95dec78d35df6ebeb63bff0423813616d67337c30bab5b6fb29da1bb7c014982cb6715df37902afa71736216374d5265195d9de49c7b08ac58de319c21a5fd49d6a39aecbae4bd0f079aab13eb24843b657b3b9e2f1e2d0731f5e00a4bafcf845d00e210b9ebf51a2303fbc02c70c9d4c62d4849f61727ffdac8e7a0e5b4b92dc03aa3ec3e37067eda1f5ee14cea961ae21f23d6678", 0xaf}], 0x2, 0xd) 06:18:52 executing program 2: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800004, 0x12, 0xffffffffffffffff, 0x0) preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x9, 0x0) mmap(&(0x7f0000000000/0xa000)=nil, 0xa000, 0x2, 0x2172, 0xffffffffffffffff, 0x0) socketpair(0x29, 0x80005, 0x0, &(0x7f0000000340)={0x0, 0x0}) 06:18:52 executing program 3: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800004, 0x12, r0, 0x0) preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x9, 0x0) mmap(&(0x7f0000000000/0xa000)=nil, 0xa000, 0x2, 0x2172, 0xffffffffffffffff, 0x0) r1 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x11, 0x4, &(0x7f00000000c0)=@framed={{}, [@call={0x85, 0x0, 0x0, 0x7b}]}, &(0x7f00000001c0)='syzkaller\x00', 0x4, 0x8f, &(0x7f00000002c0)=""/143, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='ext4_es_lookup_extent_exit\x00', r1}, 0x10) preadv(r1, &(0x7f0000000080)=[{&(0x7f0000000040)=""/12, 0xc}], 0x1, 0x36, 0x401) socketpair(0x1e, 0x80005, 0x0, &(0x7f0000000340)={0x0, 0x0}) close(r2) r3 = socket$unix(0x1, 0x1, 0x0) bind$unix(r3, &(0x7f00000001c0)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x56) ioctl$sock_SIOCOUTQNSD(r3, 0x894b, &(0x7f0000000100)) 06:18:52 executing program 1: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800004, 0x10, r0, 0x0) preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x9, 0x0) vmsplice(r0, &(0x7f0000000240)=[{&(0x7f0000000080)="4ab1b8694a30bc0b64f0bf0fa59d6d6310a9fca4f5ca7242c45a43a3f790f1bb52f7d713fdc0e6dfa75a5fa7f39f0c693511ea6a67b64b56fa4550fb865102551e0de8881e54887a6391bc4677137a4e433d75874a6619ff219d8ab89c1fdd9fe0d5ae7f1b35994210b3700e36625640f808", 0x72}, {&(0x7f0000000100)="b4346c01f32075d5cdbe81dc2919a8983c8e9f197195a027c0b95dec78d35df6ebeb63bff0423813616d67337c30bab5b6fb29da1bb7c014982cb6715df37902afa71736216374d5265195d9de49c7b08ac58de319c21a5fd49d6a39aecbae4bd0f079aab13eb24843b657b3b9e2f1e2d0731f5e00a4bafcf845d00e210b9ebf51a2303fbc02c70c9d4c62d4849f61727ffdac8e7a0e5b4b92dc03aa3ec3e37067eda1f5ee14cea961ae21f23d6678", 0xaf}], 0x2, 0xd) 06:18:52 executing program 0: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800004, 0x12, r0, 0x0) preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x9, 0x0) mmap(&(0x7f0000000000/0xa000)=nil, 0xa000, 0x2, 0x2172, 0xffffffffffffffff, 0x0) syz_mount_image$nilfs2(0x0, &(0x7f0000000200)='./file0\x00', 0xd85, 0x7, &(0x7f00000006c0)=[{&(0x7f0000000240)="997c7e90471ec6786b6aa37fd8fbf290c011bee5642707bf7b126c36024e5e8f0d3d514aa1538eb70908eb3ac1a8a52e0ba29dab8884c189c9b68415aa0226e7c6a7ccf48ad20543b10360ab7ee9b247e4304d92f0ec7c0ba06d8160095660a0f12836e2033baed6228d464479ce22f2fadce176d0750fdc6ab1004eb9c4440707be1dc31c1ce11815d12f0d50eef6477341b3f6a4f364a1fccd68e2bcd2dba76227338cd6a1835a44", 0xa9, 0x8}, {&(0x7f0000000380)="3a79b76eed8bb53c1f5217cb4d40694fa75675b28af54d40304f697a1d04373a7ef7b09d46fa6365d222516dcc92d004bc937a22980c404bb5b5669f3dfd0e569079c03b2855be3337944aea4b03b03a3eb6d7", 0x53, 0x3}, {&(0x7f0000000400)="c8213af91316be74099fc072cc912017e77b8709c846cf00eb99c7c03cee58e25602e6ec0b4b42c8709e4447b0d23296a71661cdb6ea9b13d35ed3206f67e5559840f063e554ed7fcb842ab9b072197358b7a617cb0825abfabe3da9b022ecbe28ebcc22bd651a40dfcf4782be0c0c6d8adb8fdd7afce8c8659cc9eef1483eceb26a223fa9d591e28633e6bf6facd75e4295341e2ef3788284fc4482db16cab37de0c1adbf7fa07ad161ae875284778f49e15a052d875e", 0xb7, 0x80}, {&(0x7f00000004c0)="056b3e2d287f817e74a518293ea19b1196cccb376ac73cd7bbeccaced6f43aa9706b33d8ec56c58be0febb03dadec48add6a378f07f9053f1b6f33fe63a960502ad48232f0bee4a41509d7063d478768ab8ee0a90ebdb7c9bc326d54c8edad7e9d59641faf45c171e35f77f8c38a7563e1555c331a5a3e4da1ce59c0c697ebe071d527f24563165dafd23b45186c3d55251c825d0d7fd16b0f13a2f1321cddbcf231b398a88b19e3915ee544692c3559f42a", 0xb2, 0x6}, {&(0x7f0000000580)="8023d53ac815f8a84b84350b859e8673ed208a78bbfec2e35d6d4927707d5dd61106eb0321af3709c17fe7661323c51575e9c18d7b834c138636224eb1a7d75dd59d5c5d7411bdd4c2b07cf727643f52b1ca3e1680cde001be2f8334303e9f4191c2f9425472ca1ee6bac17fde09f0ce5fdf2e70d3c1a38b2d3e0e804f7df817b6a03e5e1ffea1ca7cd7", 0x8a, 0x8}, {&(0x7f0000000300)="fae83b83fc781c7715", 0x9, 0x8fe}, {&(0x7f0000000640)="96f1e3c89318e48db56867032dd1ba9b0ffeec69eb34236bd93b937c6bb7447840dc021e536b89aad4fe89ca2317f4fe2b36cbbdd8d72d841aee6f7b7be258352406775f169573cbf4da0bcf856f825233c5387a3a7cde778c057d591f2133c10e8b5bdb164577f492130acfc7", 0x6d, 0x5}], 0x802010, &(0x7f0000000740)={[{@order_relaxed}], [{@fsname}, {@fsuuid={'fsuuid', 0x3d, {[0x36, 0x38, 0x61, 0x64, 0x39, 0x38, 0x31, 0x37], 0x2d, [0x62, 0x61, 0x61, 0x63], 0x2d, [0x62, 0x39, 0x33, 0x35], 0x2d, [0x32, 0x37, 0x33, 0x61], 0x2d, [0x61, 0x39, 0x64, 0x65, 0x31, 0x8eb4bab6ccebb2ed, 0x64, 0x62]}}}]}) 06:18:52 executing program 2: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800004, 0x12, 0xffffffffffffffff, 0x0) preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x9, 0x0) mmap(&(0x7f0000000000/0xa000)=nil, 0xa000, 0x2, 0x2172, 0xffffffffffffffff, 0x0) socketpair(0x29, 0x80005, 0x0, &(0x7f0000000340)={0x0, 0x0}) 06:18:52 executing program 1: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800004, 0x10, r0, 0x0) preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x9, 0x0) vmsplice(r0, &(0x7f0000000240)=[{&(0x7f0000000080)="4ab1b8694a30bc0b64f0bf0fa59d6d6310a9fca4f5ca7242c45a43a3f790f1bb52f7d713fdc0e6dfa75a5fa7f39f0c693511ea6a67b64b56fa4550fb865102551e0de8881e54887a6391bc4677137a4e433d75874a6619ff219d8ab89c1fdd9fe0d5ae7f1b35994210b3700e36625640f808", 0x72}, {&(0x7f0000000100)="b4346c01f32075d5cdbe81dc2919a8983c8e9f197195a027c0b95dec78d35df6ebeb63bff0423813616d67337c30bab5b6fb29da1bb7c014982cb6715df37902afa71736216374d5265195d9de49c7b08ac58de319c21a5fd49d6a39aecbae4bd0f079aab13eb24843b657b3b9e2f1e2d0731f5e00a4bafcf845d00e210b9ebf51a2303fbc02c70c9d4c62d4849f61727ffdac8e7a0e5b4b92dc03aa3ec3e37067eda1f5ee14cea961ae21f23d6678", 0xaf}], 0x2, 0xd) 06:18:52 executing program 3: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800004, 0x12, r0, 0x0) preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x9, 0x0) mmap(&(0x7f0000000000/0xa000)=nil, 0xa000, 0x2, 0x2172, 0xffffffffffffffff, 0x0) r1 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x11, 0x4, &(0x7f00000000c0)=@framed={{}, [@call={0x85, 0x0, 0x0, 0x7b}]}, &(0x7f00000001c0)='syzkaller\x00', 0x4, 0x8f, &(0x7f00000002c0)=""/143, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='ext4_es_lookup_extent_exit\x00', r1}, 0x10) preadv(r1, &(0x7f0000000080)=[{&(0x7f0000000040)=""/12, 0xc}], 0x1, 0x36, 0x401) socketpair(0x1e, 0x80005, 0x0, &(0x7f0000000340)={0x0, 0x0}) close(r2) r3 = socket$unix(0x1, 0x1, 0x0) bind$unix(r3, &(0x7f00000001c0)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x56) 06:18:52 executing program 2: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800004, 0x12, 0xffffffffffffffff, 0x0) preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x9, 0x0) mmap(&(0x7f0000000000/0xa000)=nil, 0xa000, 0x2, 0x2172, 0xffffffffffffffff, 0x0) socketpair(0x29, 0x80005, 0x0, &(0x7f0000000340)={0x0, 0x0}) 06:18:52 executing program 1: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800004, 0x10, r0, 0x0) preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x9, 0x0) vmsplice(r0, &(0x7f0000000240)=[{&(0x7f0000000080)="4ab1b8694a30bc0b64f0bf0fa59d6d6310a9fca4f5ca7242c45a43a3f790f1bb52f7d713fdc0e6dfa75a5fa7f39f0c693511ea6a67b64b56fa4550fb865102551e0de8881e54887a6391bc4677137a4e433d75874a6619ff219d8ab89c1fdd9fe0d5ae7f1b35994210b3700e36625640f808", 0x72}, {&(0x7f0000000100)="b4346c01f32075d5cdbe81dc2919a8983c8e9f197195a027c0b95dec78d35df6ebeb63bff0423813616d67337c30bab5b6fb29da1bb7c014982cb6715df37902afa71736216374d5265195d9de49c7b08ac58de319c21a5fd49d6a39aecbae4bd0f079aab13eb24843b657b3b9e2f1e2d0731f5e00a4bafcf845d00e210b9ebf51a2303fbc02c70c9d4c62d4849f61727ffdac8e7a0e5b4b92dc03aa3ec3e37067eda1f5ee14cea961ae21f23d6678", 0xaf}], 0x2, 0xd) 06:18:52 executing program 2: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800004, 0x12, r0, 0x0) preadv(0xffffffffffffffff, &(0x7f00000001c0)=[{0x0}], 0x1, 0x9, 0x0) mmap(&(0x7f0000000000/0xa000)=nil, 0xa000, 0x2, 0x2172, 0xffffffffffffffff, 0x0) socketpair(0x29, 0x80005, 0x0, &(0x7f0000000340)={0x0, 0x0}) 06:18:52 executing program 3: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800004, 0x12, r0, 0x0) preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x9, 0x0) mmap(&(0x7f0000000000/0xa000)=nil, 0xa000, 0x2, 0x2172, 0xffffffffffffffff, 0x0) r1 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x11, 0x4, &(0x7f00000000c0)=@framed={{}, [@call={0x85, 0x0, 0x0, 0x7b}]}, &(0x7f00000001c0)='syzkaller\x00', 0x4, 0x8f, &(0x7f00000002c0)=""/143, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='ext4_es_lookup_extent_exit\x00', r1}, 0x10) preadv(r1, &(0x7f0000000080)=[{&(0x7f0000000040)=""/12, 0xc}], 0x1, 0x36, 0x401) socketpair(0x1e, 0x80005, 0x0, &(0x7f0000000340)={0x0, 0x0}) close(r2) bind$unix(0xffffffffffffffff, &(0x7f00000001c0)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x56) [ 335.314923][T14918] loop0: detected capacity change from 0 to 8 06:18:53 executing program 1: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800004, 0x12, 0xffffffffffffffff, 0x0) preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x9, 0x0) vmsplice(r0, &(0x7f0000000240)=[{&(0x7f0000000080)="4ab1b8694a30bc0b64f0bf0fa59d6d6310a9fca4f5ca7242c45a43a3f790f1bb52f7d713fdc0e6dfa75a5fa7f39f0c693511ea6a67b64b56fa4550fb865102551e0de8881e54887a6391bc4677137a4e433d75874a6619ff219d8ab89c1fdd9fe0d5ae7f1b35994210b3700e36625640f808", 0x72}, {&(0x7f0000000100)="b4346c01f32075d5cdbe81dc2919a8983c8e9f197195a027c0b95dec78d35df6ebeb63bff0423813616d67337c30bab5b6fb29da1bb7c014982cb6715df37902afa71736216374d5265195d9de49c7b08ac58de319c21a5fd49d6a39aecbae4bd0f079aab13eb24843b657b3b9e2f1e2d0731f5e00a4bafcf845d00e210b9ebf51a2303fbc02c70c9d4c62d4849f61727ffdac8e7a0e5b4b92dc03aa3ec3e37067eda1f5ee14cea961ae21f23d6678", 0xaf}], 0x2, 0xd) 06:18:53 executing program 2: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800004, 0x12, r0, 0x0) preadv(0xffffffffffffffff, &(0x7f00000001c0)=[{0x0}], 0x1, 0x9, 0x0) mmap(&(0x7f0000000000/0xa000)=nil, 0xa000, 0x2, 0x2172, 0xffffffffffffffff, 0x0) socketpair(0x29, 0x80005, 0x0, &(0x7f0000000340)={0x0, 0x0}) 06:18:53 executing program 3: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800004, 0x12, r0, 0x0) preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x9, 0x0) mmap(&(0x7f0000000000/0xa000)=nil, 0xa000, 0x2, 0x2172, 0xffffffffffffffff, 0x0) r1 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x11, 0x4, &(0x7f00000000c0)=@framed={{}, [@call={0x85, 0x0, 0x0, 0x7b}]}, &(0x7f00000001c0)='syzkaller\x00', 0x4, 0x8f, &(0x7f00000002c0)=""/143, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='ext4_es_lookup_extent_exit\x00', r1}, 0x10) preadv(r1, &(0x7f0000000080)=[{&(0x7f0000000040)=""/12, 0xc}], 0x1, 0x36, 0x401) socketpair(0x1e, 0x80005, 0x0, &(0x7f0000000340)={0x0, 0x0}) close(r2) bind$unix(0xffffffffffffffff, &(0x7f00000001c0)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x56) 06:18:53 executing program 0: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800004, 0x12, r0, 0x0) preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x9, 0x0) mmap(&(0x7f0000000000/0xa000)=nil, 0xa000, 0x2, 0x2172, 0xffffffffffffffff, 0x0) syz_mount_image$nilfs2(0x0, &(0x7f0000000200)='./file0\x00', 0xd85, 0x7, &(0x7f00000006c0)=[{&(0x7f0000000240)="997c7e90471ec6786b6aa37fd8fbf290c011bee5642707bf7b126c36024e5e8f0d3d514aa1538eb70908eb3ac1a8a52e0ba29dab8884c189c9b68415aa0226e7c6a7ccf48ad20543b10360ab7ee9b247e4304d92f0ec7c0ba06d8160095660a0f12836e2033baed6228d464479ce22f2fadce176d0750fdc6ab1004eb9c4440707be1dc31c1ce11815d12f0d50eef6477341b3f6a4f364a1fccd68e2bcd2dba76227338cd6a1835a44", 0xa9, 0x8}, {&(0x7f0000000380)="3a79b76eed8bb53c1f5217cb4d40694fa75675b28af54d40304f697a1d04373a7ef7b09d46fa6365d222516dcc92d004bc937a22980c404bb5b5669f3dfd0e569079c03b2855be3337944aea4b03b03a3eb6d7", 0x53, 0x3}, {&(0x7f0000000400)="c8213af91316be74099fc072cc912017e77b8709c846cf00eb99c7c03cee58e25602e6ec0b4b42c8709e4447b0d23296a71661cdb6ea9b13d35ed3206f67e5559840f063e554ed7fcb842ab9b072197358b7a617cb0825abfabe3da9b022ecbe28ebcc22bd651a40dfcf4782be0c0c6d8adb8fdd7afce8c8659cc9eef1483eceb26a223fa9d591e28633e6bf6facd75e4295341e2ef3788284fc4482db16cab37de0c1adbf7fa07ad161ae875284778f49e15a052d875e", 0xb7, 0x80}, {&(0x7f00000004c0)="056b3e2d287f817e74a518293ea19b1196cccb376ac73cd7bbeccaced6f43aa9706b33d8ec56c58be0febb03dadec48add6a378f07f9053f1b6f33fe63a960502ad48232f0bee4a41509d7063d478768ab8ee0a90ebdb7c9bc326d54c8edad7e9d59641faf45c171e35f77f8c38a7563e1555c331a5a3e4da1ce59c0c697ebe071d527f24563165dafd23b45186c3d55251c825d0d7fd16b0f13a2f1321cddbcf231b398a88b19e3915ee544692c3559f42a", 0xb2, 0x6}, {&(0x7f0000000580)="8023d53ac815f8a84b84350b859e8673ed208a78bbfec2e35d6d4927707d5dd61106eb0321af3709c17fe7661323c51575e9c18d7b834c138636224eb1a7d75dd59d5c5d7411bdd4c2b07cf727643f52b1ca3e1680cde001be2f8334303e9f4191c2f9425472ca1ee6bac17fde09f0ce5fdf2e70d3c1a38b2d3e0e804f7df817b6a03e5e1ffea1ca7cd7", 0x8a, 0x8}, {&(0x7f0000000300)="fae83b83fc781c7715", 0x9, 0x8fe}, {&(0x7f0000000640)="96f1e3c89318e48db56867032dd1ba9b0ffeec69eb34236bd93b937c6bb7447840dc021e536b89aad4fe89ca2317f4fe2b36cbbdd8d72d841aee6f7b7be258352406775f169573cbf4da0bcf856f825233c5387a3a7cde778c057d591f2133c10e8b5bdb164577f492130acfc7", 0x6d, 0x5}], 0x802010, &(0x7f0000000740)={[{@order_relaxed}], [{@fsname}, {@fsuuid={'fsuuid', 0x3d, {[0x36, 0x38, 0x61, 0x64, 0x39, 0x38, 0x31, 0x37], 0x2d, [0x62, 0x61, 0x61, 0x63], 0x2d, [0x62, 0x39, 0x33, 0x35], 0x2d, [0x32, 0x37, 0x33, 0x61], 0x2d, [0x61, 0x39, 0x64, 0x65, 0x31, 0x8eb4bab6ccebb2ed, 0x64, 0x62]}}}]}) 06:18:53 executing program 2: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800004, 0x12, r0, 0x0) preadv(0xffffffffffffffff, &(0x7f00000001c0)=[{0x0}], 0x1, 0x9, 0x0) mmap(&(0x7f0000000000/0xa000)=nil, 0xa000, 0x2, 0x2172, 0xffffffffffffffff, 0x0) socketpair(0x29, 0x80005, 0x0, &(0x7f0000000340)={0x0, 0x0}) 06:18:53 executing program 3: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800004, 0x12, r0, 0x0) preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x9, 0x0) mmap(&(0x7f0000000000/0xa000)=nil, 0xa000, 0x2, 0x2172, 0xffffffffffffffff, 0x0) r1 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x11, 0x4, &(0x7f00000000c0)=@framed={{}, [@call={0x85, 0x0, 0x0, 0x7b}]}, &(0x7f00000001c0)='syzkaller\x00', 0x4, 0x8f, &(0x7f00000002c0)=""/143, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='ext4_es_lookup_extent_exit\x00', r1}, 0x10) preadv(r1, &(0x7f0000000080)=[{&(0x7f0000000040)=""/12, 0xc}], 0x1, 0x36, 0x401) socketpair(0x1e, 0x80005, 0x0, &(0x7f0000000340)={0x0, 0x0}) close(r2) bind$unix(0xffffffffffffffff, &(0x7f00000001c0)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x56) 06:18:53 executing program 1: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800004, 0x12, 0xffffffffffffffff, 0x0) preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x9, 0x0) vmsplice(r0, &(0x7f0000000240)=[{&(0x7f0000000080)="4ab1b8694a30bc0b64f0bf0fa59d6d6310a9fca4f5ca7242c45a43a3f790f1bb52f7d713fdc0e6dfa75a5fa7f39f0c693511ea6a67b64b56fa4550fb865102551e0de8881e54887a6391bc4677137a4e433d75874a6619ff219d8ab89c1fdd9fe0d5ae7f1b35994210b3700e36625640f808", 0x72}, {&(0x7f0000000100)="b4346c01f32075d5cdbe81dc2919a8983c8e9f197195a027c0b95dec78d35df6ebeb63bff0423813616d67337c30bab5b6fb29da1bb7c014982cb6715df37902afa71736216374d5265195d9de49c7b08ac58de319c21a5fd49d6a39aecbae4bd0f079aab13eb24843b657b3b9e2f1e2d0731f5e00a4bafcf845d00e210b9ebf51a2303fbc02c70c9d4c62d4849f61727ffdac8e7a0e5b4b92dc03aa3ec3e37067eda1f5ee14cea961ae21f23d6678", 0xaf}], 0x2, 0xd) [ 335.527292][T14935] loop0: detected capacity change from 0 to 8 06:18:53 executing program 3: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800004, 0x12, r0, 0x0) preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x9, 0x0) mmap(&(0x7f0000000000/0xa000)=nil, 0xa000, 0x2, 0x2172, 0xffffffffffffffff, 0x0) r1 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x11, 0x4, &(0x7f00000000c0)=@framed={{}, [@call={0x85, 0x0, 0x0, 0x7b}]}, &(0x7f00000001c0)='syzkaller\x00', 0x4, 0x8f, &(0x7f00000002c0)=""/143, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='ext4_es_lookup_extent_exit\x00', r1}, 0x10) preadv(r1, &(0x7f0000000080)=[{&(0x7f0000000040)=""/12, 0xc}], 0x1, 0x36, 0x401) socketpair(0x1e, 0x80005, 0x0, &(0x7f0000000340)={0x0, 0x0}) r2 = socket$unix(0x1, 0x1, 0x0) bind$unix(r2, &(0x7f00000001c0)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x56) 06:18:53 executing program 1: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800004, 0x12, 0xffffffffffffffff, 0x0) preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x9, 0x0) vmsplice(r0, &(0x7f0000000240)=[{&(0x7f0000000080)="4ab1b8694a30bc0b64f0bf0fa59d6d6310a9fca4f5ca7242c45a43a3f790f1bb52f7d713fdc0e6dfa75a5fa7f39f0c693511ea6a67b64b56fa4550fb865102551e0de8881e54887a6391bc4677137a4e433d75874a6619ff219d8ab89c1fdd9fe0d5ae7f1b35994210b3700e36625640f808", 0x72}, {&(0x7f0000000100)="b4346c01f32075d5cdbe81dc2919a8983c8e9f197195a027c0b95dec78d35df6ebeb63bff0423813616d67337c30bab5b6fb29da1bb7c014982cb6715df37902afa71736216374d5265195d9de49c7b08ac58de319c21a5fd49d6a39aecbae4bd0f079aab13eb24843b657b3b9e2f1e2d0731f5e00a4bafcf845d00e210b9ebf51a2303fbc02c70c9d4c62d4849f61727ffdac8e7a0e5b4b92dc03aa3ec3e37067eda1f5ee14cea961ae21f23d6678", 0xaf}], 0x2, 0xd) 06:18:53 executing program 2: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800004, 0x12, r0, 0x0) preadv(r0, 0x0, 0x0, 0x9, 0x0) mmap(&(0x7f0000000000/0xa000)=nil, 0xa000, 0x2, 0x2172, 0xffffffffffffffff, 0x0) socketpair(0x29, 0x80005, 0x0, &(0x7f0000000340)={0x0, 0x0}) 06:18:53 executing program 3: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800004, 0x12, r0, 0x0) preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x9, 0x0) mmap(&(0x7f0000000000/0xa000)=nil, 0xa000, 0x2, 0x2172, 0xffffffffffffffff, 0x0) r1 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x11, 0x4, &(0x7f00000000c0)=@framed={{}, [@call={0x85, 0x0, 0x0, 0x7b}]}, &(0x7f00000001c0)='syzkaller\x00', 0x4, 0x8f, &(0x7f00000002c0)=""/143, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='ext4_es_lookup_extent_exit\x00', r1}, 0x10) preadv(r1, &(0x7f0000000080)=[{&(0x7f0000000040)=""/12, 0xc}], 0x1, 0x36, 0x401) r2 = socket$unix(0x1, 0x1, 0x0) bind$unix(r2, &(0x7f00000001c0)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x56) 06:18:53 executing program 0: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800004, 0x12, r0, 0x0) preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x9, 0x0) mmap(&(0x7f0000000000/0xa000)=nil, 0xa000, 0x2, 0x2172, 0xffffffffffffffff, 0x0) syz_mount_image$nilfs2(&(0x7f0000000180), 0x0, 0xd85, 0x7, &(0x7f00000006c0)=[{&(0x7f0000000240)="997c7e90471ec6786b6aa37fd8fbf290c011bee5642707bf7b126c36024e5e8f0d3d514aa1538eb70908eb3ac1a8a52e0ba29dab8884c189c9b68415aa0226e7c6a7ccf48ad20543b10360ab7ee9b247e4304d92f0ec7c0ba06d8160095660a0f12836e2033baed6228d464479ce22f2fadce176d0750fdc6ab1004eb9c4440707be1dc31c1ce11815d12f0d50eef6477341b3f6a4f364a1fccd68e2bcd2dba76227338cd6a1835a44", 0xa9, 0x8}, {&(0x7f0000000380)="3a79b76eed8bb53c1f5217cb4d40694fa75675b28af54d40304f697a1d04373a7ef7b09d46fa6365d222516dcc92d004bc937a22980c404bb5b5669f3dfd0e569079c03b2855be3337944aea4b03b03a3eb6d7", 0x53, 0x3}, {&(0x7f0000000400)="c8213af91316be74099fc072cc912017e77b8709c846cf00eb99c7c03cee58e25602e6ec0b4b42c8709e4447b0d23296a71661cdb6ea9b13d35ed3206f67e5559840f063e554ed7fcb842ab9b072197358b7a617cb0825abfabe3da9b022ecbe28ebcc22bd651a40dfcf4782be0c0c6d8adb8fdd7afce8c8659cc9eef1483eceb26a223fa9d591e28633e6bf6facd75e4295341e2ef3788284fc4482db16cab37de0c1adbf7fa07ad161ae875284778f49e15a052d875e", 0xb7, 0x80}, {&(0x7f00000004c0)="056b3e2d287f817e74a518293ea19b1196cccb376ac73cd7bbeccaced6f43aa9706b33d8ec56c58be0febb03dadec48add6a378f07f9053f1b6f33fe63a960502ad48232f0bee4a41509d7063d478768ab8ee0a90ebdb7c9bc326d54c8edad7e9d59641faf45c171e35f77f8c38a7563e1555c331a5a3e4da1ce59c0c697ebe071d527f24563165dafd23b45186c3d55251c825d0d7fd16b0f13a2f1321cddbcf231b398a88b19e3915ee544692c3559f42a", 0xb2, 0x6}, {&(0x7f0000000580)="8023d53ac815f8a84b84350b859e8673ed208a78bbfec2e35d6d4927707d5dd61106eb0321af3709c17fe7661323c51575e9c18d7b834c138636224eb1a7d75dd59d5c5d7411bdd4c2b07cf727643f52b1ca3e1680cde001be2f8334303e9f4191c2f9425472ca1ee6bac17fde09f0ce5fdf2e70d3c1a38b2d3e0e804f7df817b6a03e5e1ffea1ca7cd7", 0x8a, 0x8}, {&(0x7f0000000300)="fae83b83fc781c7715", 0x9, 0x8fe}, {&(0x7f0000000640)="96f1e3c89318e48db56867032dd1ba9b0ffeec69eb34236bd93b937c6bb7447840dc021e536b89aad4fe89ca2317f4fe2b36cbbdd8d72d841aee6f7b7be258352406775f169573cbf4da0bcf856f825233c5387a3a7cde778c057d591f2133c10e8b5bdb164577f492130acfc7", 0x6d, 0x5}], 0x802010, &(0x7f0000000740)={[{@order_relaxed}], [{@fsname}, {@fsuuid={'fsuuid', 0x3d, {[0x36, 0x38, 0x61, 0x64, 0x39, 0x38, 0x31, 0x37], 0x2d, [0x62, 0x61, 0x61, 0x63], 0x2d, [0x62, 0x39, 0x33, 0x35], 0x2d, [0x32, 0x37, 0x33, 0x61], 0x2d, [0x61, 0x39, 0x64, 0x65, 0x31, 0x8eb4bab6ccebb2ed, 0x64, 0x62]}}}]}) 06:18:53 executing program 1: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800004, 0x12, r0, 0x0) preadv(0xffffffffffffffff, &(0x7f00000001c0)=[{0x0}], 0x1, 0x9, 0x0) vmsplice(r0, &(0x7f0000000240)=[{&(0x7f0000000080)="4ab1b8694a30bc0b64f0bf0fa59d6d6310a9fca4f5ca7242c45a43a3f790f1bb52f7d713fdc0e6dfa75a5fa7f39f0c693511ea6a67b64b56fa4550fb865102551e0de8881e54887a6391bc4677137a4e433d75874a6619ff219d8ab89c1fdd9fe0d5ae7f1b35994210b3700e36625640f808", 0x72}, {&(0x7f0000000100)="b4346c01f32075d5cdbe81dc2919a8983c8e9f197195a027c0b95dec78d35df6ebeb63bff0423813616d67337c30bab5b6fb29da1bb7c014982cb6715df37902afa71736216374d5265195d9de49c7b08ac58de319c21a5fd49d6a39aecbae4bd0f079aab13eb24843b657b3b9e2f1e2d0731f5e00a4bafcf845d00e210b9ebf51a2303fbc02c70c9d4c62d4849f61727ffdac8e7a0e5b4b92dc03aa3ec3e37067eda1f5ee14cea961ae21f23d6678", 0xaf}], 0x2, 0xd) 06:18:53 executing program 2: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800004, 0x12, r0, 0x0) preadv(r0, 0x0, 0x0, 0x9, 0x0) mmap(&(0x7f0000000000/0xa000)=nil, 0xa000, 0x2, 0x2172, 0xffffffffffffffff, 0x0) socketpair(0x29, 0x80005, 0x0, &(0x7f0000000340)={0x0, 0x0}) 06:18:53 executing program 1: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800004, 0x12, r0, 0x0) preadv(0xffffffffffffffff, &(0x7f00000001c0)=[{0x0}], 0x1, 0x9, 0x0) vmsplice(r0, &(0x7f0000000240)=[{&(0x7f0000000080)="4ab1b8694a30bc0b64f0bf0fa59d6d6310a9fca4f5ca7242c45a43a3f790f1bb52f7d713fdc0e6dfa75a5fa7f39f0c693511ea6a67b64b56fa4550fb865102551e0de8881e54887a6391bc4677137a4e433d75874a6619ff219d8ab89c1fdd9fe0d5ae7f1b35994210b3700e36625640f808", 0x72}, {&(0x7f0000000100)="b4346c01f32075d5cdbe81dc2919a8983c8e9f197195a027c0b95dec78d35df6ebeb63bff0423813616d67337c30bab5b6fb29da1bb7c014982cb6715df37902afa71736216374d5265195d9de49c7b08ac58de319c21a5fd49d6a39aecbae4bd0f079aab13eb24843b657b3b9e2f1e2d0731f5e00a4bafcf845d00e210b9ebf51a2303fbc02c70c9d4c62d4849f61727ffdac8e7a0e5b4b92dc03aa3ec3e37067eda1f5ee14cea961ae21f23d6678", 0xaf}], 0x2, 0xd) 06:18:53 executing program 3: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800004, 0x12, r0, 0x0) preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x9, 0x0) mmap(&(0x7f0000000000/0xa000)=nil, 0xa000, 0x2, 0x2172, 0xffffffffffffffff, 0x0) r1 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x11, 0x4, &(0x7f00000000c0)=@framed={{}, [@call={0x85, 0x0, 0x0, 0x7b}]}, &(0x7f00000001c0)='syzkaller\x00', 0x4, 0x8f, &(0x7f00000002c0)=""/143, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='ext4_es_lookup_extent_exit\x00', r1}, 0x10) r2 = socket$unix(0x1, 0x1, 0x0) bind$unix(r2, &(0x7f00000001c0)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x56) [ 335.733683][T14956] loop0: detected capacity change from 0 to 8 06:18:53 executing program 2: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800004, 0x12, r0, 0x0) preadv(r0, 0x0, 0x0, 0x9, 0x0) mmap(&(0x7f0000000000/0xa000)=nil, 0xa000, 0x2, 0x2172, 0xffffffffffffffff, 0x0) socketpair(0x29, 0x80005, 0x0, &(0x7f0000000340)={0x0, 0x0}) 06:18:53 executing program 1: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800004, 0x12, r0, 0x0) preadv(0xffffffffffffffff, &(0x7f00000001c0)=[{0x0}], 0x1, 0x9, 0x0) vmsplice(r0, &(0x7f0000000240)=[{&(0x7f0000000080)="4ab1b8694a30bc0b64f0bf0fa59d6d6310a9fca4f5ca7242c45a43a3f790f1bb52f7d713fdc0e6dfa75a5fa7f39f0c693511ea6a67b64b56fa4550fb865102551e0de8881e54887a6391bc4677137a4e433d75874a6619ff219d8ab89c1fdd9fe0d5ae7f1b35994210b3700e36625640f808", 0x72}, {&(0x7f0000000100)="b4346c01f32075d5cdbe81dc2919a8983c8e9f197195a027c0b95dec78d35df6ebeb63bff0423813616d67337c30bab5b6fb29da1bb7c014982cb6715df37902afa71736216374d5265195d9de49c7b08ac58de319c21a5fd49d6a39aecbae4bd0f079aab13eb24843b657b3b9e2f1e2d0731f5e00a4bafcf845d00e210b9ebf51a2303fbc02c70c9d4c62d4849f61727ffdac8e7a0e5b4b92dc03aa3ec3e37067eda1f5ee14cea961ae21f23d6678", 0xaf}], 0x2, 0xd) 06:18:53 executing program 3: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800004, 0x12, r0, 0x0) preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x9, 0x0) mmap(&(0x7f0000000000/0xa000)=nil, 0xa000, 0x2, 0x2172, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x11, 0x4, &(0x7f00000000c0)=@framed={{}, [@call={0x85, 0x0, 0x0, 0x7b}]}, &(0x7f00000001c0)='syzkaller\x00', 0x4, 0x8f, &(0x7f00000002c0)=""/143, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) r1 = socket$unix(0x1, 0x1, 0x0) bind$unix(r1, &(0x7f00000001c0)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x56) 06:18:53 executing program 0: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800004, 0x12, r0, 0x0) preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x9, 0x0) mmap(&(0x7f0000000000/0xa000)=nil, 0xa000, 0x2, 0x2172, 0xffffffffffffffff, 0x0) syz_mount_image$nilfs2(&(0x7f0000000180), 0x0, 0xd85, 0x7, &(0x7f00000006c0)=[{&(0x7f0000000240)="997c7e90471ec6786b6aa37fd8fbf290c011bee5642707bf7b126c36024e5e8f0d3d514aa1538eb70908eb3ac1a8a52e0ba29dab8884c189c9b68415aa0226e7c6a7ccf48ad20543b10360ab7ee9b247e4304d92f0ec7c0ba06d8160095660a0f12836e2033baed6228d464479ce22f2fadce176d0750fdc6ab1004eb9c4440707be1dc31c1ce11815d12f0d50eef6477341b3f6a4f364a1fccd68e2bcd2dba76227338cd6a1835a44", 0xa9, 0x8}, {&(0x7f0000000380)="3a79b76eed8bb53c1f5217cb4d40694fa75675b28af54d40304f697a1d04373a7ef7b09d46fa6365d222516dcc92d004bc937a22980c404bb5b5669f3dfd0e569079c03b2855be3337944aea4b03b03a3eb6d7", 0x53, 0x3}, {&(0x7f0000000400)="c8213af91316be74099fc072cc912017e77b8709c846cf00eb99c7c03cee58e25602e6ec0b4b42c8709e4447b0d23296a71661cdb6ea9b13d35ed3206f67e5559840f063e554ed7fcb842ab9b072197358b7a617cb0825abfabe3da9b022ecbe28ebcc22bd651a40dfcf4782be0c0c6d8adb8fdd7afce8c8659cc9eef1483eceb26a223fa9d591e28633e6bf6facd75e4295341e2ef3788284fc4482db16cab37de0c1adbf7fa07ad161ae875284778f49e15a052d875e", 0xb7, 0x80}, {&(0x7f00000004c0)="056b3e2d287f817e74a518293ea19b1196cccb376ac73cd7bbeccaced6f43aa9706b33d8ec56c58be0febb03dadec48add6a378f07f9053f1b6f33fe63a960502ad48232f0bee4a41509d7063d478768ab8ee0a90ebdb7c9bc326d54c8edad7e9d59641faf45c171e35f77f8c38a7563e1555c331a5a3e4da1ce59c0c697ebe071d527f24563165dafd23b45186c3d55251c825d0d7fd16b0f13a2f1321cddbcf231b398a88b19e3915ee544692c3559f42a", 0xb2, 0x6}, {&(0x7f0000000580)="8023d53ac815f8a84b84350b859e8673ed208a78bbfec2e35d6d4927707d5dd61106eb0321af3709c17fe7661323c51575e9c18d7b834c138636224eb1a7d75dd59d5c5d7411bdd4c2b07cf727643f52b1ca3e1680cde001be2f8334303e9f4191c2f9425472ca1ee6bac17fde09f0ce5fdf2e70d3c1a38b2d3e0e804f7df817b6a03e5e1ffea1ca7cd7", 0x8a, 0x8}, {&(0x7f0000000300)="fae83b83fc781c7715", 0x9, 0x8fe}, {&(0x7f0000000640)="96f1e3c89318e48db56867032dd1ba9b0ffeec69eb34236bd93b937c6bb7447840dc021e536b89aad4fe89ca2317f4fe2b36cbbdd8d72d841aee6f7b7be258352406775f169573cbf4da0bcf856f825233c5387a3a7cde778c057d591f2133c10e8b5bdb164577f492130acfc7", 0x6d, 0x5}], 0x802010, &(0x7f0000000740)={[{@order_relaxed}], [{@fsname}, {@fsuuid={'fsuuid', 0x3d, {[0x36, 0x38, 0x61, 0x64, 0x39, 0x38, 0x31, 0x37], 0x2d, [0x62, 0x61, 0x61, 0x63], 0x2d, [0x62, 0x39, 0x33, 0x35], 0x2d, [0x32, 0x37, 0x33, 0x61], 0x2d, [0x61, 0x39, 0x64, 0x65, 0x31, 0x8eb4bab6ccebb2ed, 0x64, 0x62]}}}]}) 06:18:53 executing program 3: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800004, 0x12, r0, 0x0) preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x9, 0x0) mmap(&(0x7f0000000000/0xa000)=nil, 0xa000, 0x2, 0x2172, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x11, 0x4, &(0x7f00000000c0)=@framed={{}, [@call={0x85, 0x0, 0x0, 0x7b}]}, &(0x7f00000001c0)='syzkaller\x00', 0x4, 0x8f, &(0x7f00000002c0)=""/143, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) r1 = socket$unix(0x1, 0x1, 0x0) bind$unix(r1, &(0x7f00000001c0)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x56) 06:18:53 executing program 1: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800004, 0x12, r0, 0x0) preadv(r0, 0x0, 0x0, 0x9, 0x0) vmsplice(r0, &(0x7f0000000240)=[{&(0x7f0000000080)="4ab1b8694a30bc0b64f0bf0fa59d6d6310a9fca4f5ca7242c45a43a3f790f1bb52f7d713fdc0e6dfa75a5fa7f39f0c693511ea6a67b64b56fa4550fb865102551e0de8881e54887a6391bc4677137a4e433d75874a6619ff219d8ab89c1fdd9fe0d5ae7f1b35994210b3700e36625640f808", 0x72}, {&(0x7f0000000100)="b4346c01f32075d5cdbe81dc2919a8983c8e9f197195a027c0b95dec78d35df6ebeb63bff0423813616d67337c30bab5b6fb29da1bb7c014982cb6715df37902afa71736216374d5265195d9de49c7b08ac58de319c21a5fd49d6a39aecbae4bd0f079aab13eb24843b657b3b9e2f1e2d0731f5e00a4bafcf845d00e210b9ebf51a2303fbc02c70c9d4c62d4849f61727ffdac8e7a0e5b4b92dc03aa3ec3e37067eda1f5ee14cea961ae21f23d6678", 0xaf}], 0x2, 0xd) 06:18:53 executing program 2: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800004, 0x12, r0, 0x0) preadv(r0, &(0x7f00000001c0), 0x0, 0x9, 0x0) mmap(&(0x7f0000000000/0xa000)=nil, 0xa000, 0x2, 0x2172, 0xffffffffffffffff, 0x0) socketpair(0x29, 0x80005, 0x0, &(0x7f0000000340)={0x0, 0x0}) [ 335.902154][T14976] loop0: detected capacity change from 0 to 8 06:18:53 executing program 1: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800004, 0x12, r0, 0x0) preadv(r0, 0x0, 0x0, 0x9, 0x0) vmsplice(r0, &(0x7f0000000240)=[{&(0x7f0000000080)="4ab1b8694a30bc0b64f0bf0fa59d6d6310a9fca4f5ca7242c45a43a3f790f1bb52f7d713fdc0e6dfa75a5fa7f39f0c693511ea6a67b64b56fa4550fb865102551e0de8881e54887a6391bc4677137a4e433d75874a6619ff219d8ab89c1fdd9fe0d5ae7f1b35994210b3700e36625640f808", 0x72}, {&(0x7f0000000100)="b4346c01f32075d5cdbe81dc2919a8983c8e9f197195a027c0b95dec78d35df6ebeb63bff0423813616d67337c30bab5b6fb29da1bb7c014982cb6715df37902afa71736216374d5265195d9de49c7b08ac58de319c21a5fd49d6a39aecbae4bd0f079aab13eb24843b657b3b9e2f1e2d0731f5e00a4bafcf845d00e210b9ebf51a2303fbc02c70c9d4c62d4849f61727ffdac8e7a0e5b4b92dc03aa3ec3e37067eda1f5ee14cea961ae21f23d6678", 0xaf}], 0x2, 0xd) 06:18:53 executing program 2: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800004, 0x12, r0, 0x0) preadv(r0, &(0x7f00000001c0), 0x0, 0x9, 0x0) mmap(&(0x7f0000000000/0xa000)=nil, 0xa000, 0x2, 0x2172, 0xffffffffffffffff, 0x0) socketpair(0x29, 0x80005, 0x0, &(0x7f0000000340)={0x0, 0x0}) 06:18:53 executing program 0: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800004, 0x12, r0, 0x0) preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x9, 0x0) mmap(&(0x7f0000000000/0xa000)=nil, 0xa000, 0x2, 0x2172, 0xffffffffffffffff, 0x0) syz_mount_image$nilfs2(&(0x7f0000000180), 0x0, 0xd85, 0x7, &(0x7f00000006c0)=[{&(0x7f0000000240)="997c7e90471ec6786b6aa37fd8fbf290c011bee5642707bf7b126c36024e5e8f0d3d514aa1538eb70908eb3ac1a8a52e0ba29dab8884c189c9b68415aa0226e7c6a7ccf48ad20543b10360ab7ee9b247e4304d92f0ec7c0ba06d8160095660a0f12836e2033baed6228d464479ce22f2fadce176d0750fdc6ab1004eb9c4440707be1dc31c1ce11815d12f0d50eef6477341b3f6a4f364a1fccd68e2bcd2dba76227338cd6a1835a44", 0xa9, 0x8}, {&(0x7f0000000380)="3a79b76eed8bb53c1f5217cb4d40694fa75675b28af54d40304f697a1d04373a7ef7b09d46fa6365d222516dcc92d004bc937a22980c404bb5b5669f3dfd0e569079c03b2855be3337944aea4b03b03a3eb6d7", 0x53, 0x3}, {&(0x7f0000000400)="c8213af91316be74099fc072cc912017e77b8709c846cf00eb99c7c03cee58e25602e6ec0b4b42c8709e4447b0d23296a71661cdb6ea9b13d35ed3206f67e5559840f063e554ed7fcb842ab9b072197358b7a617cb0825abfabe3da9b022ecbe28ebcc22bd651a40dfcf4782be0c0c6d8adb8fdd7afce8c8659cc9eef1483eceb26a223fa9d591e28633e6bf6facd75e4295341e2ef3788284fc4482db16cab37de0c1adbf7fa07ad161ae875284778f49e15a052d875e", 0xb7, 0x80}, {&(0x7f00000004c0)="056b3e2d287f817e74a518293ea19b1196cccb376ac73cd7bbeccaced6f43aa9706b33d8ec56c58be0febb03dadec48add6a378f07f9053f1b6f33fe63a960502ad48232f0bee4a41509d7063d478768ab8ee0a90ebdb7c9bc326d54c8edad7e9d59641faf45c171e35f77f8c38a7563e1555c331a5a3e4da1ce59c0c697ebe071d527f24563165dafd23b45186c3d55251c825d0d7fd16b0f13a2f1321cddbcf231b398a88b19e3915ee544692c3559f42a", 0xb2, 0x6}, {&(0x7f0000000580)="8023d53ac815f8a84b84350b859e8673ed208a78bbfec2e35d6d4927707d5dd61106eb0321af3709c17fe7661323c51575e9c18d7b834c138636224eb1a7d75dd59d5c5d7411bdd4c2b07cf727643f52b1ca3e1680cde001be2f8334303e9f4191c2f9425472ca1ee6bac17fde09f0ce5fdf2e70d3c1a38b2d3e0e804f7df817b6a03e5e1ffea1ca7cd7", 0x8a, 0x8}, {&(0x7f0000000300)="fae83b83fc781c7715", 0x9, 0x8fe}, {&(0x7f0000000640)="96f1e3c89318e48db56867032dd1ba9b0ffeec69eb34236bd93b937c6bb7447840dc021e536b89aad4fe89ca2317f4fe2b36cbbdd8d72d841aee6f7b7be258352406775f169573cbf4da0bcf856f825233c5387a3a7cde778c057d591f2133c10e8b5bdb164577f492130acfc7", 0x6d, 0x5}], 0x802010, &(0x7f0000000740)={[{@order_relaxed}], [{@fsname}, {@fsuuid={'fsuuid', 0x3d, {[0x36, 0x38, 0x61, 0x64, 0x39, 0x38, 0x31, 0x37], 0x2d, [0x62, 0x61, 0x61, 0x63], 0x2d, [0x62, 0x39, 0x33, 0x35], 0x2d, [0x32, 0x37, 0x33, 0x61], 0x2d, [0x61, 0x39, 0x64, 0x65, 0x31, 0x8eb4bab6ccebb2ed, 0x64, 0x62]}}}]}) 06:18:53 executing program 3: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800004, 0x12, r0, 0x0) preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x9, 0x0) mmap(&(0x7f0000000000/0xa000)=nil, 0xa000, 0x2, 0x2172, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x11, 0x4, &(0x7f00000000c0)=@framed={{}, [@call={0x85, 0x0, 0x0, 0x7b}]}, &(0x7f00000001c0)='syzkaller\x00', 0x4, 0x8f, &(0x7f00000002c0)=""/143, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) r1 = socket$unix(0x1, 0x1, 0x0) bind$unix(r1, &(0x7f00000001c0)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x56) 06:18:53 executing program 2: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800004, 0x12, r0, 0x0) preadv(r0, &(0x7f00000001c0), 0x0, 0x9, 0x0) mmap(&(0x7f0000000000/0xa000)=nil, 0xa000, 0x2, 0x2172, 0xffffffffffffffff, 0x0) socketpair(0x29, 0x80005, 0x0, &(0x7f0000000340)={0x0, 0x0}) [ 336.034983][T14989] loop0: detected capacity change from 0 to 8 06:18:53 executing program 1: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800004, 0x12, r0, 0x0) preadv(r0, 0x0, 0x0, 0x9, 0x0) vmsplice(r0, &(0x7f0000000240)=[{&(0x7f0000000080)="4ab1b8694a30bc0b64f0bf0fa59d6d6310a9fca4f5ca7242c45a43a3f790f1bb52f7d713fdc0e6dfa75a5fa7f39f0c693511ea6a67b64b56fa4550fb865102551e0de8881e54887a6391bc4677137a4e433d75874a6619ff219d8ab89c1fdd9fe0d5ae7f1b35994210b3700e36625640f808", 0x72}, {&(0x7f0000000100)="b4346c01f32075d5cdbe81dc2919a8983c8e9f197195a027c0b95dec78d35df6ebeb63bff0423813616d67337c30bab5b6fb29da1bb7c014982cb6715df37902afa71736216374d5265195d9de49c7b08ac58de319c21a5fd49d6a39aecbae4bd0f079aab13eb24843b657b3b9e2f1e2d0731f5e00a4bafcf845d00e210b9ebf51a2303fbc02c70c9d4c62d4849f61727ffdac8e7a0e5b4b92dc03aa3ec3e37067eda1f5ee14cea961ae21f23d6678", 0xaf}], 0x2, 0xd) 06:18:53 executing program 3: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800004, 0x12, r0, 0x0) preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x9, 0x0) mmap(&(0x7f0000000000/0xa000)=nil, 0xa000, 0x2, 0x2172, 0xffffffffffffffff, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='ext4_es_lookup_extent_exit\x00'}, 0x10) r1 = socket$unix(0x1, 0x1, 0x0) bind$unix(r1, &(0x7f00000001c0)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x56) 06:18:53 executing program 2: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800004, 0x12, r0, 0x0) preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x0, 0x0) mmap(&(0x7f0000000000/0xa000)=nil, 0xa000, 0x2, 0x2172, 0xffffffffffffffff, 0x0) socketpair(0x29, 0x80005, 0x0, &(0x7f0000000340)={0x0, 0x0}) 06:18:53 executing program 1: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800004, 0x12, r0, 0x0) preadv(r0, &(0x7f00000001c0), 0x0, 0x9, 0x0) vmsplice(r0, &(0x7f0000000240)=[{&(0x7f0000000080)="4ab1b8694a30bc0b64f0bf0fa59d6d6310a9fca4f5ca7242c45a43a3f790f1bb52f7d713fdc0e6dfa75a5fa7f39f0c693511ea6a67b64b56fa4550fb865102551e0de8881e54887a6391bc4677137a4e433d75874a6619ff219d8ab89c1fdd9fe0d5ae7f1b35994210b3700e36625640f808", 0x72}, {&(0x7f0000000100)="b4346c01f32075d5cdbe81dc2919a8983c8e9f197195a027c0b95dec78d35df6ebeb63bff0423813616d67337c30bab5b6fb29da1bb7c014982cb6715df37902afa71736216374d5265195d9de49c7b08ac58de319c21a5fd49d6a39aecbae4bd0f079aab13eb24843b657b3b9e2f1e2d0731f5e00a4bafcf845d00e210b9ebf51a2303fbc02c70c9d4c62d4849f61727ffdac8e7a0e5b4b92dc03aa3ec3e37067eda1f5ee14cea961ae21f23d6678", 0xaf}], 0x2, 0xd) 06:18:53 executing program 0: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800004, 0x12, r0, 0x0) preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x9, 0x0) mmap(&(0x7f0000000000/0xa000)=nil, 0xa000, 0x2, 0x2172, 0xffffffffffffffff, 0x0) syz_mount_image$nilfs2(&(0x7f0000000180), &(0x7f0000000200)='./file0\x00', 0x0, 0x7, &(0x7f00000006c0)=[{&(0x7f0000000240)="997c7e90471ec6786b6aa37fd8fbf290c011bee5642707bf7b126c36024e5e8f0d3d514aa1538eb70908eb3ac1a8a52e0ba29dab8884c189c9b68415aa0226e7c6a7ccf48ad20543b10360ab7ee9b247e4304d92f0ec7c0ba06d8160095660a0f12836e2033baed6228d464479ce22f2fadce176d0750fdc6ab1004eb9c4440707be1dc31c1ce11815d12f0d50eef6477341b3f6a4f364a1fccd68e2bcd2dba76227338cd6a1835a44", 0xa9, 0x8}, {&(0x7f0000000380)="3a79b76eed8bb53c1f5217cb4d40694fa75675b28af54d40304f697a1d04373a7ef7b09d46fa6365d222516dcc92d004bc937a22980c404bb5b5669f3dfd0e569079c03b2855be3337944aea4b03b03a3eb6d7", 0x53, 0x3}, {&(0x7f0000000400)="c8213af91316be74099fc072cc912017e77b8709c846cf00eb99c7c03cee58e25602e6ec0b4b42c8709e4447b0d23296a71661cdb6ea9b13d35ed3206f67e5559840f063e554ed7fcb842ab9b072197358b7a617cb0825abfabe3da9b022ecbe28ebcc22bd651a40dfcf4782be0c0c6d8adb8fdd7afce8c8659cc9eef1483eceb26a223fa9d591e28633e6bf6facd75e4295341e2ef3788284fc4482db16cab37de0c1adbf7fa07ad161ae875284778f49e15a052d875e", 0xb7, 0x80}, {&(0x7f00000004c0)="056b3e2d287f817e74a518293ea19b1196cccb376ac73cd7bbeccaced6f43aa9706b33d8ec56c58be0febb03dadec48add6a378f07f9053f1b6f33fe63a960502ad48232f0bee4a41509d7063d478768ab8ee0a90ebdb7c9bc326d54c8edad7e9d59641faf45c171e35f77f8c38a7563e1555c331a5a3e4da1ce59c0c697ebe071d527f24563165dafd23b45186c3d55251c825d0d7fd16b0f13a2f1321cddbcf231b398a88b19e3915ee544692c3559f42a", 0xb2, 0x6}, {&(0x7f0000000580)="8023d53ac815f8a84b84350b859e8673ed208a78bbfec2e35d6d4927707d5dd61106eb0321af3709c17fe7661323c51575e9c18d7b834c138636224eb1a7d75dd59d5c5d7411bdd4c2b07cf727643f52b1ca3e1680cde001be2f8334303e9f4191c2f9425472ca1ee6bac17fde09f0ce5fdf2e70d3c1a38b2d3e0e804f7df817b6a03e5e1ffea1ca7cd7", 0x8a, 0x8}, {&(0x7f0000000300)="fae83b83fc781c7715", 0x9, 0x8fe}, {&(0x7f0000000640)="96f1e3c89318e48db56867032dd1ba9b0ffeec69eb34236bd93b937c6bb7447840dc021e536b89aad4fe89ca2317f4fe2b36cbbdd8d72d841aee6f7b7be258352406775f169573cbf4da0bcf856f825233c5387a3a7cde778c057d591f2133c10e8b5bdb164577f492130acfc7", 0x6d, 0x5}], 0x802010, &(0x7f0000000740)={[{@order_relaxed}], [{@fsname}, {@fsuuid={'fsuuid', 0x3d, {[0x36, 0x38, 0x61, 0x64, 0x39, 0x38, 0x31, 0x37], 0x2d, [0x62, 0x61, 0x61, 0x63], 0x2d, [0x62, 0x39, 0x33, 0x35], 0x2d, [0x32, 0x37, 0x33, 0x61], 0x2d, [0x61, 0x39, 0x64, 0x65, 0x31, 0x8eb4bab6ccebb2ed, 0x64, 0x62]}}}]}) 06:18:53 executing program 2: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800004, 0x12, r0, 0x0) preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x0, 0x0) mmap(&(0x7f0000000000/0xa000)=nil, 0xa000, 0x2, 0x2172, 0xffffffffffffffff, 0x0) socketpair(0x29, 0x80005, 0x0, &(0x7f0000000340)={0x0, 0x0}) 06:18:53 executing program 3: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800004, 0x12, r0, 0x0) preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x9, 0x0) mmap(&(0x7f0000000000/0xa000)=nil, 0xa000, 0x2, 0x2172, 0xffffffffffffffff, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='ext4_es_lookup_extent_exit\x00'}, 0x10) r1 = socket$unix(0x1, 0x1, 0x0) bind$unix(r1, &(0x7f00000001c0)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x56) 06:18:53 executing program 1: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800004, 0x12, r0, 0x0) preadv(r0, &(0x7f00000001c0), 0x0, 0x9, 0x0) vmsplice(r0, &(0x7f0000000240)=[{&(0x7f0000000080)="4ab1b8694a30bc0b64f0bf0fa59d6d6310a9fca4f5ca7242c45a43a3f790f1bb52f7d713fdc0e6dfa75a5fa7f39f0c693511ea6a67b64b56fa4550fb865102551e0de8881e54887a6391bc4677137a4e433d75874a6619ff219d8ab89c1fdd9fe0d5ae7f1b35994210b3700e36625640f808", 0x72}, {&(0x7f0000000100)="b4346c01f32075d5cdbe81dc2919a8983c8e9f197195a027c0b95dec78d35df6ebeb63bff0423813616d67337c30bab5b6fb29da1bb7c014982cb6715df37902afa71736216374d5265195d9de49c7b08ac58de319c21a5fd49d6a39aecbae4bd0f079aab13eb24843b657b3b9e2f1e2d0731f5e00a4bafcf845d00e210b9ebf51a2303fbc02c70c9d4c62d4849f61727ffdac8e7a0e5b4b92dc03aa3ec3e37067eda1f5ee14cea961ae21f23d6678", 0xaf}], 0x2, 0xd) [ 336.205291][T15006] loop0: detected capacity change from 0 to 8 06:18:53 executing program 3: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800004, 0x12, r0, 0x0) preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x9, 0x0) mmap(&(0x7f0000000000/0xa000)=nil, 0xa000, 0x2, 0x2172, 0xffffffffffffffff, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='ext4_es_lookup_extent_exit\x00'}, 0x10) r1 = socket$unix(0x1, 0x1, 0x0) bind$unix(r1, &(0x7f00000001c0)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x56) 06:18:53 executing program 2: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800004, 0x12, r0, 0x0) preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x0, 0x0) mmap(&(0x7f0000000000/0xa000)=nil, 0xa000, 0x2, 0x2172, 0xffffffffffffffff, 0x0) socketpair(0x29, 0x80005, 0x0, &(0x7f0000000340)={0x0, 0x0}) 06:18:53 executing program 2: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800004, 0x12, r0, 0x0) preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x9, 0x0) mmap(&(0x7f0000000000/0xa000)=nil, 0xa000, 0x0, 0x2172, 0xffffffffffffffff, 0x0) socketpair(0x29, 0x80005, 0x0, &(0x7f0000000340)={0x0, 0x0}) 06:18:53 executing program 1: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800004, 0x12, r0, 0x0) preadv(r0, &(0x7f00000001c0), 0x0, 0x9, 0x0) vmsplice(r0, &(0x7f0000000240)=[{&(0x7f0000000080)="4ab1b8694a30bc0b64f0bf0fa59d6d6310a9fca4f5ca7242c45a43a3f790f1bb52f7d713fdc0e6dfa75a5fa7f39f0c693511ea6a67b64b56fa4550fb865102551e0de8881e54887a6391bc4677137a4e433d75874a6619ff219d8ab89c1fdd9fe0d5ae7f1b35994210b3700e36625640f808", 0x72}, {&(0x7f0000000100)="b4346c01f32075d5cdbe81dc2919a8983c8e9f197195a027c0b95dec78d35df6ebeb63bff0423813616d67337c30bab5b6fb29da1bb7c014982cb6715df37902afa71736216374d5265195d9de49c7b08ac58de319c21a5fd49d6a39aecbae4bd0f079aab13eb24843b657b3b9e2f1e2d0731f5e00a4bafcf845d00e210b9ebf51a2303fbc02c70c9d4c62d4849f61727ffdac8e7a0e5b4b92dc03aa3ec3e37067eda1f5ee14cea961ae21f23d6678", 0xaf}], 0x2, 0xd) 06:18:53 executing program 0: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800004, 0x12, r0, 0x0) preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x9, 0x0) mmap(&(0x7f0000000000/0xa000)=nil, 0xa000, 0x2, 0x2172, 0xffffffffffffffff, 0x0) syz_mount_image$nilfs2(&(0x7f0000000180), &(0x7f0000000200)='./file0\x00', 0x0, 0x0, 0x0, 0x802010, &(0x7f0000000740)={[{@order_relaxed}], [{@fsname}, {@fsuuid={'fsuuid', 0x3d, {[0x36, 0x38, 0x61, 0x64, 0x39, 0x38, 0x31, 0x37], 0x2d, [0x62, 0x61, 0x61, 0x63], 0x2d, [0x62, 0x39, 0x33, 0x35], 0x2d, [0x32, 0x37, 0x33, 0x61], 0x2d, [0x61, 0x39, 0x64, 0x65, 0x31, 0x8eb4bab6ccebb2ed, 0x64, 0x62]}}}]}) 06:18:53 executing program 3: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800004, 0x12, r0, 0x0) preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x9, 0x0) r1 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x11, 0x4, &(0x7f00000000c0)=@framed={{}, [@call={0x85, 0x0, 0x0, 0x7b}]}, &(0x7f00000001c0)='syzkaller\x00', 0x4, 0x8f, &(0x7f00000002c0)=""/143, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='ext4_es_lookup_extent_exit\x00', r1}, 0x10) r2 = socket$unix(0x1, 0x1, 0x0) bind$unix(r2, &(0x7f00000001c0)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x56) 06:18:53 executing program 2: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800004, 0x12, r0, 0x0) preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x9, 0x0) mmap(&(0x7f0000000000/0xa000)=nil, 0xa000, 0x0, 0x2172, 0xffffffffffffffff, 0x0) socketpair(0x29, 0x80005, 0x0, &(0x7f0000000340)={0x0, 0x0}) 06:18:53 executing program 3: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800004, 0x12, r0, 0x0) preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x9, 0x0) r1 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x11, 0x4, &(0x7f00000000c0)=@framed={{}, [@call={0x85, 0x0, 0x0, 0x7b}]}, &(0x7f00000001c0)='syzkaller\x00', 0x4, 0x8f, &(0x7f00000002c0)=""/143, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='ext4_es_lookup_extent_exit\x00', r1}, 0x10) r2 = socket$unix(0x1, 0x1, 0x0) bind$unix(r2, &(0x7f00000001c0)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x56) 06:18:53 executing program 1: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800004, 0x12, r0, 0x0) preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x0, 0x0) vmsplice(r0, &(0x7f0000000240)=[{&(0x7f0000000080)="4ab1b8694a30bc0b64f0bf0fa59d6d6310a9fca4f5ca7242c45a43a3f790f1bb52f7d713fdc0e6dfa75a5fa7f39f0c693511ea6a67b64b56fa4550fb865102551e0de8881e54887a6391bc4677137a4e433d75874a6619ff219d8ab89c1fdd9fe0d5ae7f1b35994210b3700e36625640f808", 0x72}, {&(0x7f0000000100)="b4346c01f32075d5cdbe81dc2919a8983c8e9f197195a027c0b95dec78d35df6ebeb63bff0423813616d67337c30bab5b6fb29da1bb7c014982cb6715df37902afa71736216374d5265195d9de49c7b08ac58de319c21a5fd49d6a39aecbae4bd0f079aab13eb24843b657b3b9e2f1e2d0731f5e00a4bafcf845d00e210b9ebf51a2303fbc02c70c9d4c62d4849f61727ffdac8e7a0e5b4b92dc03aa3ec3e37067eda1f5ee14cea961ae21f23d6678", 0xaf}], 0x2, 0xd) 06:18:54 executing program 0: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800004, 0x12, r0, 0x0) preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x9, 0x0) mmap(&(0x7f0000000000/0xa000)=nil, 0xa000, 0x2, 0x2172, 0xffffffffffffffff, 0x0) syz_mount_image$nilfs2(&(0x7f0000000180), &(0x7f0000000200)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000740)={[{@order_relaxed}], [{@fsname}, {@fsuuid={'fsuuid', 0x3d, {[0x36, 0x38, 0x61, 0x64, 0x39, 0x38, 0x31, 0x37], 0x2d, [0x62, 0x61, 0x61, 0x63], 0x2d, [0x62, 0x39, 0x33, 0x35], 0x2d, [0x32, 0x37, 0x33, 0x61], 0x2d, [0x61, 0x39, 0x64, 0x65, 0x31, 0x8eb4bab6ccebb2ed, 0x64, 0x62]}}}]}) 06:18:54 executing program 2: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800004, 0x12, r0, 0x0) preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x9, 0x0) mmap(&(0x7f0000000000/0xa000)=nil, 0xa000, 0x0, 0x2172, 0xffffffffffffffff, 0x0) socketpair(0x29, 0x80005, 0x0, &(0x7f0000000340)={0x0, 0x0}) 06:18:54 executing program 3: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800004, 0x12, r0, 0x0) preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x9, 0x0) r1 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x11, 0x4, &(0x7f00000000c0)=@framed={{}, [@call={0x85, 0x0, 0x0, 0x7b}]}, &(0x7f00000001c0)='syzkaller\x00', 0x4, 0x8f, &(0x7f00000002c0)=""/143, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='ext4_es_lookup_extent_exit\x00', r1}, 0x10) r2 = socket$unix(0x1, 0x1, 0x0) bind$unix(r2, &(0x7f00000001c0)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x56) 06:18:54 executing program 1: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800004, 0x12, r0, 0x0) preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x0, 0x0) vmsplice(r0, &(0x7f0000000240)=[{&(0x7f0000000080)="4ab1b8694a30bc0b64f0bf0fa59d6d6310a9fca4f5ca7242c45a43a3f790f1bb52f7d713fdc0e6dfa75a5fa7f39f0c693511ea6a67b64b56fa4550fb865102551e0de8881e54887a6391bc4677137a4e433d75874a6619ff219d8ab89c1fdd9fe0d5ae7f1b35994210b3700e36625640f808", 0x72}, {&(0x7f0000000100)="b4346c01f32075d5cdbe81dc2919a8983c8e9f197195a027c0b95dec78d35df6ebeb63bff0423813616d67337c30bab5b6fb29da1bb7c014982cb6715df37902afa71736216374d5265195d9de49c7b08ac58de319c21a5fd49d6a39aecbae4bd0f079aab13eb24843b657b3b9e2f1e2d0731f5e00a4bafcf845d00e210b9ebf51a2303fbc02c70c9d4c62d4849f61727ffdac8e7a0e5b4b92dc03aa3ec3e37067eda1f5ee14cea961ae21f23d6678", 0xaf}], 0x2, 0xd) 06:18:54 executing program 0: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800004, 0x12, r0, 0x0) preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x9, 0x0) mmap(&(0x7f0000000000/0xa000)=nil, 0xa000, 0x2, 0x2172, 0xffffffffffffffff, 0x0) syz_mount_image$nilfs2(&(0x7f0000000180), &(0x7f0000000200)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000740)={[{@order_relaxed}], [{@fsname}, {@fsuuid={'fsuuid', 0x3d, {[0x36, 0x38, 0x61, 0x64, 0x39, 0x38, 0x31, 0x37], 0x2d, [0x62, 0x61, 0x61, 0x63], 0x2d, [0x62, 0x39, 0x33, 0x35], 0x2d, [0x32, 0x37, 0x33, 0x61], 0x2d, [0x61, 0x39, 0x64, 0x65, 0x31, 0x8eb4bab6ccebb2ed, 0x64, 0x62]}}}]}) 06:18:54 executing program 2: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800004, 0x12, r0, 0x0) preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x9, 0x0) mmap(&(0x7f0000000000/0xa000)=nil, 0xa000, 0x2, 0x10, 0xffffffffffffffff, 0x0) socketpair(0x29, 0x80005, 0x0, &(0x7f0000000340)={0x0, 0x0}) 06:18:54 executing program 1: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800004, 0x12, r0, 0x0) preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x0, 0x0) vmsplice(r0, &(0x7f0000000240)=[{&(0x7f0000000080)="4ab1b8694a30bc0b64f0bf0fa59d6d6310a9fca4f5ca7242c45a43a3f790f1bb52f7d713fdc0e6dfa75a5fa7f39f0c693511ea6a67b64b56fa4550fb865102551e0de8881e54887a6391bc4677137a4e433d75874a6619ff219d8ab89c1fdd9fe0d5ae7f1b35994210b3700e36625640f808", 0x72}, {&(0x7f0000000100)="b4346c01f32075d5cdbe81dc2919a8983c8e9f197195a027c0b95dec78d35df6ebeb63bff0423813616d67337c30bab5b6fb29da1bb7c014982cb6715df37902afa71736216374d5265195d9de49c7b08ac58de319c21a5fd49d6a39aecbae4bd0f079aab13eb24843b657b3b9e2f1e2d0731f5e00a4bafcf845d00e210b9ebf51a2303fbc02c70c9d4c62d4849f61727ffdac8e7a0e5b4b92dc03aa3ec3e37067eda1f5ee14cea961ae21f23d6678", 0xaf}], 0x2, 0xd) 06:18:54 executing program 3: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800004, 0x12, r0, 0x0) mmap(&(0x7f0000000000/0xa000)=nil, 0xa000, 0x2, 0x2172, 0xffffffffffffffff, 0x0) r1 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x11, 0x4, &(0x7f00000000c0)=@framed={{}, [@call={0x85, 0x0, 0x0, 0x7b}]}, &(0x7f00000001c0)='syzkaller\x00', 0x4, 0x8f, &(0x7f00000002c0)=""/143, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='ext4_es_lookup_extent_exit\x00', r1}, 0x10) r2 = socket$unix(0x1, 0x1, 0x0) bind$unix(r2, &(0x7f00000001c0)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x56) 06:18:54 executing program 0: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800004, 0x12, r0, 0x0) preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x9, 0x0) mmap(&(0x7f0000000000/0xa000)=nil, 0xa000, 0x2, 0x2172, 0xffffffffffffffff, 0x0) syz_mount_image$nilfs2(&(0x7f0000000180), &(0x7f0000000200)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000740)={[{@order_relaxed}], [{@fsname}, {@fsuuid={'fsuuid', 0x3d, {[0x36, 0x38, 0x61, 0x64, 0x39, 0x38, 0x31, 0x37], 0x2d, [0x62, 0x61, 0x61, 0x63], 0x2d, [0x62, 0x39, 0x33, 0x35], 0x2d, [0x32, 0x37, 0x33, 0x61], 0x2d, [0x61, 0x39, 0x64, 0x65, 0x31, 0x8eb4bab6ccebb2ed, 0x64, 0x62]}}}]}) 06:18:54 executing program 2: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800004, 0x12, r0, 0x0) preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x9, 0x0) mmap(&(0x7f0000000000/0xa000)=nil, 0xa000, 0x2, 0x10, 0xffffffffffffffff, 0x0) socketpair(0x29, 0x80005, 0x0, &(0x7f0000000340)={0x0, 0x0}) 06:18:54 executing program 1: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800004, 0x12, r0, 0x0) preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x9, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000240)=[{&(0x7f0000000080)="4ab1b8694a30bc0b64f0bf0fa59d6d6310a9fca4f5ca7242c45a43a3f790f1bb52f7d713fdc0e6dfa75a5fa7f39f0c693511ea6a67b64b56fa4550fb865102551e0de8881e54887a6391bc4677137a4e433d75874a6619ff219d8ab89c1fdd9fe0d5ae7f1b35994210b3700e36625640f808", 0x72}, {&(0x7f0000000100)="b4346c01f32075d5cdbe81dc2919a8983c8e9f197195a027c0b95dec78d35df6ebeb63bff0423813616d67337c30bab5b6fb29da1bb7c014982cb6715df37902afa71736216374d5265195d9de49c7b08ac58de319c21a5fd49d6a39aecbae4bd0f079aab13eb24843b657b3b9e2f1e2d0731f5e00a4bafcf845d00e210b9ebf51a2303fbc02c70c9d4c62d4849f61727ffdac8e7a0e5b4b92dc03aa3ec3e37067eda1f5ee14cea961ae21f23d6678", 0xaf}], 0x2, 0xd) 06:18:54 executing program 3: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800004, 0x12, r0, 0x0) mmap(&(0x7f0000000000/0xa000)=nil, 0xa000, 0x2, 0x2172, 0xffffffffffffffff, 0x0) r1 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x11, 0x4, &(0x7f00000000c0)=@framed={{}, [@call={0x85, 0x0, 0x0, 0x7b}]}, &(0x7f00000001c0)='syzkaller\x00', 0x4, 0x8f, &(0x7f00000002c0)=""/143, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='ext4_es_lookup_extent_exit\x00', r1}, 0x10) r2 = socket$unix(0x1, 0x1, 0x0) bind$unix(r2, &(0x7f00000001c0)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x56) 06:18:54 executing program 2: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800004, 0x12, r0, 0x0) preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x9, 0x0) mmap(&(0x7f0000000000/0xa000)=nil, 0xa000, 0x2, 0x10, 0xffffffffffffffff, 0x0) socketpair(0x29, 0x80005, 0x0, &(0x7f0000000340)={0x0, 0x0}) 06:18:54 executing program 0: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800004, 0x12, r0, 0x0) preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x9, 0x0) mmap(&(0x7f0000000000/0xa000)=nil, 0xa000, 0x2, 0x2172, 0xffffffffffffffff, 0x0) syz_mount_image$nilfs2(&(0x7f0000000180), &(0x7f0000000200)='./file0\x00', 0x0, 0x0, 0x0, 0x802010, 0x0) 06:18:54 executing program 1: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800004, 0x12, r0, 0x0) preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x9, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000240)=[{&(0x7f0000000080)="4ab1b8694a30bc0b64f0bf0fa59d6d6310a9fca4f5ca7242c45a43a3f790f1bb52f7d713fdc0e6dfa75a5fa7f39f0c693511ea6a67b64b56fa4550fb865102551e0de8881e54887a6391bc4677137a4e433d75874a6619ff219d8ab89c1fdd9fe0d5ae7f1b35994210b3700e36625640f808", 0x72}, {&(0x7f0000000100)="b4346c01f32075d5cdbe81dc2919a8983c8e9f197195a027c0b95dec78d35df6ebeb63bff0423813616d67337c30bab5b6fb29da1bb7c014982cb6715df37902afa71736216374d5265195d9de49c7b08ac58de319c21a5fd49d6a39aecbae4bd0f079aab13eb24843b657b3b9e2f1e2d0731f5e00a4bafcf845d00e210b9ebf51a2303fbc02c70c9d4c62d4849f61727ffdac8e7a0e5b4b92dc03aa3ec3e37067eda1f5ee14cea961ae21f23d6678", 0xaf}], 0x2, 0xd) 06:18:54 executing program 0: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800004, 0x12, r0, 0x0) preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x9, 0x0) mmap(&(0x7f0000000000/0xa000)=nil, 0xa000, 0x2, 0x2172, 0xffffffffffffffff, 0x0) syz_mount_image$nilfs2(&(0x7f0000000180), &(0x7f0000000200)='./file0\x00', 0x0, 0x0, 0x0, 0x802010, 0x0) 06:18:54 executing program 2: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800004, 0x12, r0, 0x0) preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x9, 0x0) mmap(&(0x7f0000000000/0xa000)=nil, 0xa000, 0x2, 0x2172, 0xffffffffffffffff, 0x0) socketpair(0x0, 0x80005, 0x0, &(0x7f0000000340)={0x0, 0x0}) 06:18:54 executing program 0: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800004, 0x12, r0, 0x0) preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x9, 0x0) mmap(&(0x7f0000000000/0xa000)=nil, 0xa000, 0x2, 0x2172, 0xffffffffffffffff, 0x0) syz_mount_image$nilfs2(&(0x7f0000000180), &(0x7f0000000200)='./file0\x00', 0x0, 0x0, 0x0, 0x802010, 0x0) 06:18:54 executing program 1: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800004, 0x12, r0, 0x0) preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x9, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000240)=[{&(0x7f0000000080)="4ab1b8694a30bc0b64f0bf0fa59d6d6310a9fca4f5ca7242c45a43a3f790f1bb52f7d713fdc0e6dfa75a5fa7f39f0c693511ea6a67b64b56fa4550fb865102551e0de8881e54887a6391bc4677137a4e433d75874a6619ff219d8ab89c1fdd9fe0d5ae7f1b35994210b3700e36625640f808", 0x72}, {&(0x7f0000000100)="b4346c01f32075d5cdbe81dc2919a8983c8e9f197195a027c0b95dec78d35df6ebeb63bff0423813616d67337c30bab5b6fb29da1bb7c014982cb6715df37902afa71736216374d5265195d9de49c7b08ac58de319c21a5fd49d6a39aecbae4bd0f079aab13eb24843b657b3b9e2f1e2d0731f5e00a4bafcf845d00e210b9ebf51a2303fbc02c70c9d4c62d4849f61727ffdac8e7a0e5b4b92dc03aa3ec3e37067eda1f5ee14cea961ae21f23d6678", 0xaf}], 0x2, 0xd) 06:18:54 executing program 3: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800004, 0x12, r0, 0x0) mmap(&(0x7f0000000000/0xa000)=nil, 0xa000, 0x2, 0x2172, 0xffffffffffffffff, 0x0) r1 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x11, 0x4, &(0x7f00000000c0)=@framed={{}, [@call={0x85, 0x0, 0x0, 0x7b}]}, &(0x7f00000001c0)='syzkaller\x00', 0x4, 0x8f, &(0x7f00000002c0)=""/143, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='ext4_es_lookup_extent_exit\x00', r1}, 0x10) r2 = socket$unix(0x1, 0x1, 0x0) bind$unix(r2, &(0x7f00000001c0)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x56) 06:18:54 executing program 1: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800004, 0x12, r0, 0x0) preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x9, 0x0) vmsplice(r0, 0x0, 0x0, 0xd) 06:18:54 executing program 0: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800004, 0x12, r0, 0x0) preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x9, 0x0) mmap(&(0x7f0000000000/0xa000)=nil, 0xa000, 0x2, 0x2172, 0xffffffffffffffff, 0x0) syz_mount_image$nilfs2(&(0x7f0000000180), &(0x7f0000000200)='./file0\x00', 0x0, 0x0, 0x0, 0x802010, &(0x7f0000000740)={[], [{@fsname}, {@fsuuid={'fsuuid', 0x3d, {[0x36, 0x38, 0x61, 0x64, 0x39, 0x38, 0x31, 0x37], 0x2d, [0x62, 0x61, 0x61, 0x63], 0x2d, [0x62, 0x39, 0x33, 0x35], 0x2d, [0x32, 0x37, 0x33, 0x61], 0x2d, [0x61, 0x39, 0x64, 0x65, 0x31, 0x8eb4bab6ccebb2ed, 0x64, 0x62]}}}]}) 06:18:54 executing program 2: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800004, 0x12, r0, 0x0) preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x9, 0x0) mmap(&(0x7f0000000000/0xa000)=nil, 0xa000, 0x2, 0x2172, 0xffffffffffffffff, 0x0) socketpair(0x0, 0x80005, 0x0, &(0x7f0000000340)={0x0, 0x0}) 06:18:54 executing program 3: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x9, 0x0) mmap(&(0x7f0000000000/0xa000)=nil, 0xa000, 0x2, 0x2172, 0xffffffffffffffff, 0x0) r1 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x11, 0x4, &(0x7f00000000c0)=@framed={{}, [@call={0x85, 0x0, 0x0, 0x7b}]}, &(0x7f00000001c0)='syzkaller\x00', 0x4, 0x8f, &(0x7f00000002c0)=""/143, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='ext4_es_lookup_extent_exit\x00', r1}, 0x10) r2 = socket$unix(0x1, 0x1, 0x0) bind$unix(r2, &(0x7f00000001c0)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x56) 06:18:54 executing program 1: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800004, 0x12, r0, 0x0) preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x9, 0x0) vmsplice(r0, 0x0, 0x0, 0x0) 06:18:54 executing program 0: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800004, 0x12, r0, 0x0) preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x9, 0x0) mmap(&(0x7f0000000000/0xa000)=nil, 0xa000, 0x2, 0x2172, 0xffffffffffffffff, 0x0) syz_mount_image$nilfs2(&(0x7f0000000180), &(0x7f0000000200)='./file0\x00', 0x0, 0x0, 0x0, 0x802010, &(0x7f0000000740)={[], [{@fsname}]}) 06:18:54 executing program 1: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800004, 0x12, r0, 0x0) preadv(r0, 0x0, 0x0, 0x9, 0x0) mmap(&(0x7f0000000000/0xa000)=nil, 0xa000, 0x2, 0x2172, 0xffffffffffffffff, 0x0) socketpair(0x29, 0x80005, 0x0, &(0x7f0000000340)={0x0, 0x0}) 06:18:54 executing program 3: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x9, 0x0) mmap(&(0x7f0000000000/0xa000)=nil, 0xa000, 0x2, 0x2172, 0xffffffffffffffff, 0x0) r1 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x11, 0x4, &(0x7f00000000c0)=@framed={{}, [@call={0x85, 0x0, 0x0, 0x7b}]}, &(0x7f00000001c0)='syzkaller\x00', 0x4, 0x8f, &(0x7f00000002c0)=""/143, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='ext4_es_lookup_extent_exit\x00', r1}, 0x10) r2 = socket$unix(0x1, 0x1, 0x0) bind$unix(r2, &(0x7f00000001c0)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x56) 06:18:54 executing program 2: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800004, 0x12, r0, 0x0) preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x9, 0x0) mmap(&(0x7f0000000000/0xa000)=nil, 0xa000, 0x2, 0x2172, 0xffffffffffffffff, 0x0) socketpair(0x0, 0x80005, 0x0, &(0x7f0000000340)={0x0, 0x0}) 06:18:54 executing program 0: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800004, 0x12, r0, 0x0) preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x9, 0x0) mmap(&(0x7f0000000000/0xa000)=nil, 0xa000, 0x2, 0x2172, 0xffffffffffffffff, 0x0) syz_mount_image$nilfs2(&(0x7f0000000180), &(0x7f0000000200)='./file0\x00', 0x0, 0x0, 0x0, 0x802010, &(0x7f0000000740)) 06:18:54 executing program 2: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800004, 0x12, r0, 0x0) preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x9, 0x0) mmap(&(0x7f0000000000/0xa000)=nil, 0xa000, 0x2, 0x2172, 0xffffffffffffffff, 0x0) socketpair(0x29, 0x0, 0x0, &(0x7f0000000340)={0x0, 0x0}) 06:18:54 executing program 3: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x9, 0x0) mmap(&(0x7f0000000000/0xa000)=nil, 0xa000, 0x2, 0x2172, 0xffffffffffffffff, 0x0) r1 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x11, 0x4, &(0x7f00000000c0)=@framed={{}, [@call={0x85, 0x0, 0x0, 0x7b}]}, &(0x7f00000001c0)='syzkaller\x00', 0x4, 0x8f, &(0x7f00000002c0)=""/143, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='ext4_es_lookup_extent_exit\x00', r1}, 0x10) r2 = socket$unix(0x1, 0x1, 0x0) bind$unix(r2, &(0x7f00000001c0)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x56) 06:18:54 executing program 1: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800004, 0x12, r0, 0x0) preadv(r0, 0x0, 0x0, 0x9, 0x0) mmap(&(0x7f0000000000/0xa000)=nil, 0xa000, 0x2, 0x2172, 0xffffffffffffffff, 0x0) socketpair(0x29, 0x80005, 0x0, &(0x7f0000000340)={0x0, 0x0}) 06:18:55 executing program 0: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800004, 0x12, r0, 0x0) preadv(0xffffffffffffffff, &(0x7f00000001c0)=[{0x0}], 0x1, 0x9, 0x0) mmap(&(0x7f0000000000/0xa000)=nil, 0xa000, 0x2, 0x2172, 0xffffffffffffffff, 0x0) socketpair(0x29, 0x80005, 0x0, &(0x7f0000000340)={0x0, 0x0}) 06:18:55 executing program 3: mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800004, 0x12, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f00000001c0)=[{0x0}], 0x1, 0x9, 0x0) mmap(&(0x7f0000000000/0xa000)=nil, 0xa000, 0x2, 0x2172, 0xffffffffffffffff, 0x0) r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x11, 0x4, &(0x7f00000000c0)=@framed={{}, [@call={0x85, 0x0, 0x0, 0x7b}]}, &(0x7f00000001c0)='syzkaller\x00', 0x4, 0x8f, &(0x7f00000002c0)=""/143, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='ext4_es_lookup_extent_exit\x00', r0}, 0x10) r1 = socket$unix(0x1, 0x1, 0x0) bind$unix(r1, &(0x7f00000001c0)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x56) 06:18:55 executing program 1: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x9, 0x0) mmap(&(0x7f0000000000/0xa000)=nil, 0xa000, 0x2, 0x2172, 0xffffffffffffffff, 0x0) r1 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x11, 0x4, &(0x7f00000000c0)=@framed={{}, [@call={0x85, 0x0, 0x0, 0x7b}]}, &(0x7f00000001c0)='syzkaller\x00', 0x4, 0x8f, &(0x7f00000002c0)=""/143, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='ext4_es_lookup_extent_exit\x00', r1}, 0x10) r2 = socket$unix(0x1, 0x1, 0x0) bind$unix(r2, &(0x7f00000001c0)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x56) 06:18:55 executing program 2: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800004, 0x12, r0, 0x0) preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x9, 0x0) mmap(&(0x7f0000000000/0xa000)=nil, 0xa000, 0x2, 0x2172, 0xffffffffffffffff, 0x0) socketpair(0x29, 0x0, 0x0, &(0x7f0000000340)={0x0, 0x0}) 06:18:55 executing program 0: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800004, 0x10, r0, 0x0) preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x9, 0x0) mmap(&(0x7f0000000000/0xa000)=nil, 0xa000, 0x2, 0x2172, 0xffffffffffffffff, 0x0) socketpair(0x29, 0x80005, 0x0, &(0x7f0000000340)={0x0, 0x0}) 06:18:55 executing program 3: mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800004, 0x12, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f00000001c0)=[{0x0}], 0x1, 0x9, 0x0) mmap(&(0x7f0000000000/0xa000)=nil, 0xa000, 0x2, 0x2172, 0xffffffffffffffff, 0x0) r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x11, 0x4, &(0x7f00000000c0)=@framed={{}, [@call={0x85, 0x0, 0x0, 0x7b}]}, &(0x7f00000001c0)='syzkaller\x00', 0x4, 0x8f, &(0x7f00000002c0)=""/143, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='ext4_es_lookup_extent_exit\x00', r0}, 0x10) r1 = socket$unix(0x1, 0x1, 0x0) bind$unix(r1, &(0x7f00000001c0)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x56) 06:18:55 executing program 0: r0 = openat(0xffffffffffffffff, &(0x7f0000000300)='./file0\x00', 0x0, 0x6) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800004, 0x12, r0, 0x0) preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x9, 0x0) mmap(&(0x7f0000008000/0x3000)=nil, 0x3000, 0x2, 0x11, 0xffffffffffffffff, 0x0) r1 = openat$sequencer2(0xffffff9c, &(0x7f0000000040), 0x0, 0x0) ppoll(&(0x7f0000000080)=[{r0, 0x200}, {r1, 0x2400}], 0x2, &(0x7f00000000c0), &(0x7f0000000100)={[0x0, 0x4]}, 0x8) socketpair(0x1e, 0x80005, 0x0, &(0x7f0000000340)={0x0, 0x0}) close(r2) r3 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x11, 0x4, &(0x7f0000000440)=@framed={{0x18, 0x0, 0x0, 0x0, 0x3}, [@call={0x85, 0x0, 0x0, 0x78}]}, &(0x7f00000001c0)='syzkaller\x00', 0x4, 0x8f, &(0x7f0000000480)=""/143, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x74) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='ext4_es_lookup_extent_exit\x00', r3}, 0x10) close(r3) ioctl$TUNGETIFF(r0, 0x800454d2, &(0x7f00000002c0)={'wg1\x00'}) socket$phonet_pipe(0x23, 0x5, 0x2) accept4(r2, &(0x7f0000000140)=@nfc_llcp, &(0x7f0000000200)=0x80, 0x80800) r4 = getpgrp(0x0) perf_event_open(&(0x7f0000000540)={0x0, 0x80, 0x0, 0x6, 0x3, 0xc5, 0x0, 0x6, 0x40, 0x8, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x3, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x8001, 0x1, @perf_config_ext={0x100, 0x3}, 0x10902, 0x4, 0x3, 0x0, 0x2, 0x6, 0x7f, 0x0, 0x0, 0x0, 0x401}, r4, 0x2, 0xffffffffffffffff, 0xa) r5 = socket$unix(0x1, 0x1, 0x0) bind$unix(r5, &(0x7f00000001c0)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x56) poll(&(0x7f0000000000)=[{r5, 0x80}, {r1, 0x20}, {r1, 0x5604}], 0x3, 0x9) 06:18:55 executing program 2: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800004, 0x12, r0, 0x0) preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x9, 0x0) mmap(&(0x7f0000000000/0xa000)=nil, 0xa000, 0x2, 0x2172, 0xffffffffffffffff, 0x0) socketpair(0x29, 0x0, 0x0, &(0x7f0000000340)={0x0, 0x0}) 06:18:55 executing program 1: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800004, 0x12, r0, 0x0) r1 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x11, 0x4, &(0x7f00000000c0)=@framed={{}, [@call={0x85, 0x0, 0x0, 0x7b}]}, &(0x7f00000001c0)='syzkaller\x00', 0x4, 0x8f, &(0x7f00000002c0)=""/143, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='ext4_es_lookup_extent_exit\x00', r1}, 0x10) ioctl$FS_IOC_FSGETXATTR(r1, 0x801c581f, &(0x7f0000000040)={0x106c, 0x80000001, 0xe0000000, 0x1, 0x101}) preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x9, 0x0) mmap(&(0x7f0000000000/0xa000)=nil, 0xa000, 0x2, 0x2172, 0xffffffffffffffff, 0x0) r2 = socket$unix(0x1, 0x1, 0x0) r3 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800004, 0x12, r3, 0x0) preadv(r3, &(0x7f00000001c0)=[{0x0}], 0x1, 0x9, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r3, 0x0) openat(r3, &(0x7f0000000140)='\xe9\x1fq\x89Y\x1e\x923aK\x00', 0x400, 0x41) bind$unix(r2, &(0x7f00000001c0)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x56) ioctl$BTRFS_IOC_WAIT_SYNC(r2, 0x40089416, &(0x7f0000000100)) socketpair(0x1e, 0x80005, 0x0, &(0x7f0000000340)={0x0, 0x0}) bpf$BPF_BTF_GET_NEXT_ID(0x17, &(0x7f0000000580)={0x8, 0x0}, 0x8) r5 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x11, 0x4, &(0x7f00000000c0)=@framed={{}, [@call={0x85, 0x0, 0x0, 0x7b}]}, &(0x7f00000001c0)='syzkaller\x00', 0x4, 0x8f, &(0x7f00000002c0)=""/143, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='ext4_es_lookup_extent_exit\x00', r5}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0xd, 0x5, &(0x7f0000000380)=@raw=[@map={0x18, 0x4}, @map={0x18, 0xb, 0x1, 0x0, r0}, @call={0x85, 0x0, 0x0, 0x1a}], &(0x7f00000003c0)='GPL\x00', 0xfffffffe, 0xc2, &(0x7f0000000400)=""/194, 0x40f00, 0x9, '\x00', 0x0, 0x24, 0xffffffffffffffff, 0x8, &(0x7f0000000500)={0x9}, 0x8, 0x10, &(0x7f0000000540)={0x0, 0xf, 0x0, 0x401}, 0x10, r4, r5}, 0x74) 06:18:55 executing program 3: mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800004, 0x12, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f00000001c0)=[{0x0}], 0x1, 0x9, 0x0) mmap(&(0x7f0000000000/0xa000)=nil, 0xa000, 0x2, 0x2172, 0xffffffffffffffff, 0x0) r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x11, 0x4, &(0x7f00000000c0)=@framed={{}, [@call={0x85, 0x0, 0x0, 0x7b}]}, &(0x7f00000001c0)='syzkaller\x00', 0x4, 0x8f, &(0x7f00000002c0)=""/143, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='ext4_es_lookup_extent_exit\x00', r0}, 0x10) r1 = socket$unix(0x1, 0x1, 0x0) bind$unix(r1, &(0x7f00000001c0)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x56) 06:18:55 executing program 2: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800004, 0x12, r0, 0x0) preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x9, 0x0) mmap(&(0x7f0000000000/0xa000)=nil, 0xa000, 0x2, 0x2172, 0xffffffffffffffff, 0x0) socketpair(0x29, 0x80005, 0x0, 0x0) 06:18:55 executing program 3: r0 = openat(0xffffffffffffffff, 0x0, 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800004, 0x12, r0, 0x0) preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x9, 0x0) mmap(&(0x7f0000000000/0xa000)=nil, 0xa000, 0x2, 0x2172, 0xffffffffffffffff, 0x0) r1 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x11, 0x4, &(0x7f00000000c0)=@framed={{}, [@call={0x85, 0x0, 0x0, 0x7b}]}, &(0x7f00000001c0)='syzkaller\x00', 0x4, 0x8f, &(0x7f00000002c0)=""/143, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='ext4_es_lookup_extent_exit\x00', r1}, 0x10) r2 = socket$unix(0x1, 0x1, 0x0) bind$unix(r2, &(0x7f00000001c0)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x56) 06:18:55 executing program 2: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800004, 0x12, r0, 0x0) preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x9, 0x0) mmap(&(0x7f0000000000/0xa000)=nil, 0xa000, 0x2, 0x2172, 0xffffffffffffffff, 0x0) socketpair(0x29, 0x80005, 0x0, 0x0) 06:18:55 executing program 0: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800004, 0x12, r0, 0x0) preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x9, 0x0) mmap(&(0x7f0000000000/0xa000)=nil, 0xa000, 0x2, 0x2172, 0xffffffffffffffff, 0x0) close(0xffffffffffffffff) 06:18:55 executing program 1: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800004, 0x12, r0, 0x0) preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x9, 0x0) mmap(&(0x7f0000000000/0xa000)=nil, 0xa000, 0x2, 0x2172, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x11, 0x4, &(0x7f00000000c0)=@framed={{}, [@call={0x85, 0x0, 0x0, 0x7b}]}, 0x0, 0x4, 0x8f, &(0x7f00000002c0)=""/143, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x74) 06:18:55 executing program 2: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800004, 0x12, r0, 0x0) preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x9, 0x0) mmap(&(0x7f0000000000/0xa000)=nil, 0xa000, 0x2, 0x2172, 0xffffffffffffffff, 0x0) socketpair(0x29, 0x80005, 0x0, 0x0) 06:18:55 executing program 3: r0 = openat(0xffffffffffffffff, 0x0, 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800004, 0x12, r0, 0x0) preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x9, 0x0) mmap(&(0x7f0000000000/0xa000)=nil, 0xa000, 0x2, 0x2172, 0xffffffffffffffff, 0x0) r1 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x11, 0x4, &(0x7f00000000c0)=@framed={{}, [@call={0x85, 0x0, 0x0, 0x7b}]}, &(0x7f00000001c0)='syzkaller\x00', 0x4, 0x8f, &(0x7f00000002c0)=""/143, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='ext4_es_lookup_extent_exit\x00', r1}, 0x10) r2 = socket$unix(0x1, 0x1, 0x0) bind$unix(r2, &(0x7f00000001c0)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x56) 06:18:55 executing program 0: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800004, 0x12, r0, 0x0) preadv(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)=""/179, 0xb3}], 0x1, 0x3, 0xaee) preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x9, 0x0) mmap(&(0x7f0000000000/0xa000)=nil, 0xa000, 0x2, 0x2172, 0xffffffffffffffff, 0x0) ioctl$KVM_CREATE_PIT2(r0, 0x4040ae77, &(0x7f0000000200)={0x6}) socketpair(0x1e, 0x80005, 0x0, &(0x7f0000000340)={0x0, 0x0}) close(r1) r2 = getuid() syz_mount_image$reiserfs(&(0x7f0000000140), &(0x7f0000000180)='./file0\x00', 0x8000, 0x3, &(0x7f0000000300)=[{&(0x7f0000000540)="21d37ef07e82e237fbe1b40158d20e242c5ea1f9d9edc6b9395250085d6dfa486982e82d4ce1a5e2bc00d29383bae640de", 0x31, 0x7}, {&(0x7f0000000240)="c43f281f483aa6cd83e40e59d53f177299d285bbe5d90aab2b56a76f9db49d86afa5a0f601ba9b3502de5f3724f3ec00927151f928f668b362052950a2e8f16baec29875fdad59395e86a1050c368933e3ed5a17d76bd7bded793436ea207885f395ace3fc12126c205b170be392c1645233ef01f9661090706a65f63b4845dc2884a20711a8024ad4af44aeec9db33991dae38d95cdb7132970d0d4dec58b9d46d378", 0xa3, 0x6}, {&(0x7f0000000380)="05f82c760d277896dd8c9891a41aafe24124891a32a238c3c78696d112aa09f3ae5c54b0c08676da5db7f358c72dfaca9a5d90860b4ae363c9a921c47965d339c23408a6d9b31a23aee27822f0a140d8e4ec9475a740113f2b9923b46333110e528e0a513151aad34aee1b5310fcf62c1982349253003d6d53aebbe09cf5918668ee682be93b6a671bbc", 0x8a, 0x3}], 0x2000400, &(0x7f0000000440)={[{@balloc_no_unhash_reloc}, {@nolargeio}, {@grpjquota}], [{@obj_role={'obj_role', 0x3d, '^'}}, {@hash}, {@uid_lt={'uid<', r2}}, {@mask={'mask', 0x3d, 'MAY_EXEC'}}, {@uid_lt={'uid<', 0xee00}}, {@smackfsfloor={'smackfsfloor', 0x3d, ':%#[@'}}, {@obj_user={'obj_user', 0x3d, ',\\*),i'}}, {@uid_eq={'uid', 0x3d, 0xee00}}, {@seclabel}, {@uid_lt={'uid<', 0xee00}}]}) 06:18:55 executing program 1: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800004, 0x12, r0, 0x0) preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x9, 0x0) mmap(&(0x7f0000000000/0xa000)=nil, 0xa000, 0x2, 0x2172, 0xffffffffffffffff, 0x0) socketpair(0x1e, 0x80005, 0x0, &(0x7f0000000340)={0x0, 0x0}) close(r1) r2 = bpf$LINK_GET_FD_BY_ID(0x1e, &(0x7f0000000040)=0xffffffffffffffff, 0x4) ioctl$F2FS_IOC_COMMIT_ATOMIC_WRITE(r2, 0xf502, 0x0) 06:18:55 executing program 3: r0 = openat(0xffffffffffffffff, 0x0, 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800004, 0x12, r0, 0x0) preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x9, 0x0) mmap(&(0x7f0000000000/0xa000)=nil, 0xa000, 0x2, 0x2172, 0xffffffffffffffff, 0x0) r1 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x11, 0x4, &(0x7f00000000c0)=@framed={{}, [@call={0x85, 0x0, 0x0, 0x7b}]}, &(0x7f00000001c0)='syzkaller\x00', 0x4, 0x8f, &(0x7f00000002c0)=""/143, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='ext4_es_lookup_extent_exit\x00', r1}, 0x10) r2 = socket$unix(0x1, 0x1, 0x0) bind$unix(r2, &(0x7f00000001c0)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x56) 06:18:55 executing program 2: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800004, 0x12, r0, 0x0) preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x9, 0x0) mmap(&(0x7f0000000000/0xa000)=nil, 0xa000, 0x2, 0x2172, 0xffffffffffffffff, 0x0) socketpair(0x1e, 0x80005, 0x0, &(0x7f0000000340)={0x0, 0x0}) close(r1) r2 = bpf$LINK_GET_FD_BY_ID(0x1e, &(0x7f0000000040)=0xffffffffffffffff, 0x4) ioctl$F2FS_IOC_COMMIT_ATOMIC_WRITE(r2, 0xf502, 0x0) [ 337.933334][T15157] loop0: detected capacity change from 0 to 64 06:18:55 executing program 1: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800004, 0x12, r0, 0x0) preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x9, 0x0) mmap(&(0x7f0000000000/0xa000)=nil, 0xa000, 0x2, 0x2172, 0xffffffffffffffff, 0x0) socketpair(0x1e, 0x80005, 0x0, &(0x7f0000000340)={0x0, 0x0}) close(r1) r2 = bpf$LINK_GET_FD_BY_ID(0x1e, &(0x7f0000000040)=0xffffffffffffffff, 0x4) ioctl$F2FS_IOC_COMMIT_ATOMIC_WRITE(r2, 0xf502, 0x0) [ 337.995221][T15157] REISERFS warning (device loop0): super-6504 reiserfs_getopt: the option "nolargeio" requires an argument [ 337.995221][T15157] 06:18:55 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000400)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000440)=ANY=[@ANYBLOB="3400000011000100000000000000000002000000", @ANYRES32=0x0, @ANYBLOB="081f0000000000000000030062726964676530000000000000000000"], 0x34}}, 0x0) r1 = openat(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800004, 0x12, r1, 0x0) preadv(r1, &(0x7f00000001c0)=[{0x0}], 0x1, 0x9, 0x0) openat$cgroup_ro(r1, &(0x7f0000000040)='cpuacct.usage_sys\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0xa000)=nil, 0xa000, 0x2, 0x2172, 0xffffffffffffffff, 0x0) socketpair(0x1e, 0x80005, 0x0, &(0x7f0000000340)={0x0, 0x0}) 06:18:55 executing program 3: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x0, 0x12, r0, 0x0) preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x9, 0x0) mmap(&(0x7f0000000000/0xa000)=nil, 0xa000, 0x2, 0x2172, 0xffffffffffffffff, 0x0) r1 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x11, 0x4, &(0x7f00000000c0)=@framed={{}, [@call={0x85, 0x0, 0x0, 0x7b}]}, &(0x7f00000001c0)='syzkaller\x00', 0x4, 0x8f, &(0x7f00000002c0)=""/143, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='ext4_es_lookup_extent_exit\x00', r1}, 0x10) r2 = socket$unix(0x1, 0x1, 0x0) bind$unix(r2, &(0x7f00000001c0)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x56) [ 338.050772][T15170] netlink: 20 bytes leftover after parsing attributes in process `syz-executor.2'. 06:18:55 executing program 1: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800004, 0x12, r0, 0x0) preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x9, 0x0) mmap(&(0x7f0000000000/0xa000)=nil, 0xa000, 0x2, 0x2172, 0xffffffffffffffff, 0x0) socketpair(0x1e, 0x80005, 0x0, &(0x7f0000000340)={0x0, 0x0}) close(r1) r2 = bpf$LINK_GET_FD_BY_ID(0x1e, &(0x7f0000000040)=0xffffffffffffffff, 0x4) ioctl$F2FS_IOC_COMMIT_ATOMIC_WRITE(r2, 0xf502, 0x0) 06:18:55 executing program 3: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x0, 0x12, r0, 0x0) preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x9, 0x0) mmap(&(0x7f0000000000/0xa000)=nil, 0xa000, 0x2, 0x2172, 0xffffffffffffffff, 0x0) r1 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x11, 0x4, &(0x7f00000000c0)=@framed={{}, [@call={0x85, 0x0, 0x0, 0x7b}]}, &(0x7f00000001c0)='syzkaller\x00', 0x4, 0x8f, &(0x7f00000002c0)=""/143, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='ext4_es_lookup_extent_exit\x00', r1}, 0x10) r2 = socket$unix(0x1, 0x1, 0x0) bind$unix(r2, &(0x7f00000001c0)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x56) 06:18:55 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000400)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000440)=ANY=[@ANYBLOB="3400000011000100000000000000000002000000", @ANYRES32=0x0, @ANYBLOB="081f0000000000000000030062726964676530000000000000000000"], 0x34}}, 0x0) r1 = openat(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800004, 0x12, r1, 0x0) preadv(r1, &(0x7f00000001c0)=[{0x0}], 0x1, 0x9, 0x0) openat$cgroup_ro(r1, &(0x7f0000000040)='cpuacct.usage_sys\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0xa000)=nil, 0xa000, 0x2, 0x2172, 0xffffffffffffffff, 0x0) socketpair(0x1e, 0x80005, 0x0, &(0x7f0000000340)={0x0, 0x0}) 06:18:55 executing program 1: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800004, 0x12, r0, 0x0) preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x9, 0x0) mmap(&(0x7f0000000000/0xa000)=nil, 0xa000, 0x2, 0x2172, 0xffffffffffffffff, 0x0) socketpair(0x1e, 0x80005, 0x0, &(0x7f0000000340)={0x0, 0x0}) close(r1) bpf$LINK_GET_FD_BY_ID(0x1e, &(0x7f0000000040)=0xffffffffffffffff, 0x4) 06:18:55 executing program 0: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800004, 0x12, r0, 0x0) preadv(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)=""/179, 0xb3}], 0x1, 0x3, 0xaee) preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x9, 0x0) mmap(&(0x7f0000000000/0xa000)=nil, 0xa000, 0x2, 0x2172, 0xffffffffffffffff, 0x0) ioctl$KVM_CREATE_PIT2(r0, 0x4040ae77, &(0x7f0000000200)={0x6}) socketpair(0x1e, 0x80005, 0x0, &(0x7f0000000340)={0x0, 0x0}) close(r1) r2 = getuid() syz_mount_image$reiserfs(&(0x7f0000000140), &(0x7f0000000180)='./file0\x00', 0x8000, 0x3, &(0x7f0000000300)=[{&(0x7f0000000540)="21d37ef07e82e237fbe1b40158d20e242c5ea1f9d9edc6b9395250085d6dfa486982e82d4ce1a5e2bc00d29383bae640de", 0x31, 0x7}, {&(0x7f0000000240)="c43f281f483aa6cd83e40e59d53f177299d285bbe5d90aab2b56a76f9db49d86afa5a0f601ba9b3502de5f3724f3ec00927151f928f668b362052950a2e8f16baec29875fdad59395e86a1050c368933e3ed5a17d76bd7bded793436ea207885f395ace3fc12126c205b170be392c1645233ef01f9661090706a65f63b4845dc2884a20711a8024ad4af44aeec9db33991dae38d95cdb7132970d0d4dec58b9d46d378", 0xa3, 0x6}, {&(0x7f0000000380)="05f82c760d277896dd8c9891a41aafe24124891a32a238c3c78696d112aa09f3ae5c54b0c08676da5db7f358c72dfaca9a5d90860b4ae363c9a921c47965d339c23408a6d9b31a23aee27822f0a140d8e4ec9475a740113f2b9923b46333110e528e0a513151aad34aee1b5310fcf62c1982349253003d6d53aebbe09cf5918668ee682be93b6a671bbc", 0x8a, 0x3}], 0x2000400, &(0x7f0000000440)={[{@balloc_no_unhash_reloc}, {@nolargeio}, {@grpjquota}], [{@obj_role={'obj_role', 0x3d, '^'}}, {@hash}, {@uid_lt={'uid<', r2}}, {@mask={'mask', 0x3d, 'MAY_EXEC'}}, {@uid_lt={'uid<', 0xee00}}, {@smackfsfloor={'smackfsfloor', 0x3d, ':%#[@'}}, {@obj_user={'obj_user', 0x3d, ',\\*),i'}}, {@uid_eq={'uid', 0x3d, 0xee00}}, {@seclabel}, {@uid_lt={'uid<', 0xee00}}]}) [ 338.172017][T15180] netlink: 20 bytes leftover after parsing attributes in process `syz-executor.2'. 06:18:55 executing program 3: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x0, 0x12, r0, 0x0) preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x9, 0x0) mmap(&(0x7f0000000000/0xa000)=nil, 0xa000, 0x2, 0x2172, 0xffffffffffffffff, 0x0) r1 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x11, 0x4, &(0x7f00000000c0)=@framed={{}, [@call={0x85, 0x0, 0x0, 0x7b}]}, &(0x7f00000001c0)='syzkaller\x00', 0x4, 0x8f, &(0x7f00000002c0)=""/143, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='ext4_es_lookup_extent_exit\x00', r1}, 0x10) r2 = socket$unix(0x1, 0x1, 0x0) bind$unix(r2, &(0x7f00000001c0)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x56) [ 338.234652][T15184] loop0: detected capacity change from 0 to 64 [ 338.261802][T15184] REISERFS warning (device loop0): super-6504 reiserfs_getopt: the option "nolargeio" requires an argument [ 338.261802][T15184] 06:18:55 executing program 1: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800004, 0x12, r0, 0x0) preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x9, 0x0) mmap(&(0x7f0000000000/0xa000)=nil, 0xa000, 0x2, 0x2172, 0xffffffffffffffff, 0x0) socketpair(0x1e, 0x80005, 0x0, &(0x7f0000000340)={0x0, 0x0}) bpf$LINK_GET_FD_BY_ID(0x1e, &(0x7f0000000040)=0xffffffffffffffff, 0x4) 06:18:55 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000400)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000440)=ANY=[@ANYBLOB="3400000011000100000000000000000002000000", @ANYRES32=0x0, @ANYBLOB="081f0000000000000000030062726964676530000000000000000000"], 0x34}}, 0x0) r1 = openat(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800004, 0x12, r1, 0x0) preadv(r1, &(0x7f00000001c0)=[{0x0}], 0x1, 0x9, 0x0) openat$cgroup_ro(r1, &(0x7f0000000040)='cpuacct.usage_sys\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0xa000)=nil, 0xa000, 0x2, 0x2172, 0xffffffffffffffff, 0x0) socketpair(0x1e, 0x80005, 0x0, &(0x7f0000000340)={0x0, 0x0}) [ 338.305177][T15192] netlink: 20 bytes leftover after parsing attributes in process `syz-executor.2'. 06:18:55 executing program 1: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800004, 0x12, r0, 0x0) preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x9, 0x0) mmap(&(0x7f0000000000/0xa000)=nil, 0xa000, 0x2, 0x2172, 0xffffffffffffffff, 0x0) bpf$LINK_GET_FD_BY_ID(0x1e, &(0x7f0000000040)=0xffffffffffffffff, 0x4) 06:18:55 executing program 3: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800004, 0x10, r0, 0x0) preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x9, 0x0) mmap(&(0x7f0000000000/0xa000)=nil, 0xa000, 0x2, 0x2172, 0xffffffffffffffff, 0x0) r1 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x11, 0x4, &(0x7f00000000c0)=@framed={{}, [@call={0x85, 0x0, 0x0, 0x7b}]}, &(0x7f00000001c0)='syzkaller\x00', 0x4, 0x8f, &(0x7f00000002c0)=""/143, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='ext4_es_lookup_extent_exit\x00', r1}, 0x10) r2 = socket$unix(0x1, 0x1, 0x0) bind$unix(r2, &(0x7f00000001c0)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x56) 06:18:56 executing program 0: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800004, 0x12, r0, 0x0) preadv(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)=""/179, 0xb3}], 0x1, 0x3, 0xaee) preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x9, 0x0) mmap(&(0x7f0000000000/0xa000)=nil, 0xa000, 0x2, 0x2172, 0xffffffffffffffff, 0x0) ioctl$KVM_CREATE_PIT2(r0, 0x4040ae77, &(0x7f0000000200)={0x6}) socketpair(0x1e, 0x80005, 0x0, &(0x7f0000000340)={0x0, 0x0}) close(r1) r2 = getuid() syz_mount_image$reiserfs(&(0x7f0000000140), &(0x7f0000000180)='./file0\x00', 0x8000, 0x3, &(0x7f0000000300)=[{&(0x7f0000000540)="21d37ef07e82e237fbe1b40158d20e242c5ea1f9d9edc6b9395250085d6dfa486982e82d4ce1a5e2bc00d29383bae640de", 0x31, 0x7}, {&(0x7f0000000240)="c43f281f483aa6cd83e40e59d53f177299d285bbe5d90aab2b56a76f9db49d86afa5a0f601ba9b3502de5f3724f3ec00927151f928f668b362052950a2e8f16baec29875fdad59395e86a1050c368933e3ed5a17d76bd7bded793436ea207885f395ace3fc12126c205b170be392c1645233ef01f9661090706a65f63b4845dc2884a20711a8024ad4af44aeec9db33991dae38d95cdb7132970d0d4dec58b9d46d378", 0xa3, 0x6}, {&(0x7f0000000380)="05f82c760d277896dd8c9891a41aafe24124891a32a238c3c78696d112aa09f3ae5c54b0c08676da5db7f358c72dfaca9a5d90860b4ae363c9a921c47965d339c23408a6d9b31a23aee27822f0a140d8e4ec9475a740113f2b9923b46333110e528e0a513151aad34aee1b5310fcf62c1982349253003d6d53aebbe09cf5918668ee682be93b6a671bbc", 0x8a, 0x3}], 0x2000400, &(0x7f0000000440)={[{@balloc_no_unhash_reloc}, {@nolargeio}, {@grpjquota}], [{@obj_role={'obj_role', 0x3d, '^'}}, {@hash}, {@uid_lt={'uid<', r2}}, {@mask={'mask', 0x3d, 'MAY_EXEC'}}, {@uid_lt={'uid<', 0xee00}}, {@smackfsfloor={'smackfsfloor', 0x3d, ':%#[@'}}, {@obj_user={'obj_user', 0x3d, ',\\*),i'}}, {@uid_eq={'uid', 0x3d, 0xee00}}, {@seclabel}, {@uid_lt={'uid<', 0xee00}}]}) 06:18:56 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000400)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000440)=ANY=[@ANYBLOB="3400000011000100000000000000000002000000", @ANYRES32=0x0, @ANYBLOB="081f0000000000000000030062726964676530000000000000000000"], 0x34}}, 0x0) r1 = openat(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800004, 0x12, r1, 0x0) preadv(r1, &(0x7f00000001c0)=[{0x0}], 0x1, 0x9, 0x0) openat$cgroup_ro(r1, &(0x7f0000000040)='cpuacct.usage_sys\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0xa000)=nil, 0xa000, 0x2, 0x2172, 0xffffffffffffffff, 0x0) 06:18:56 executing program 3: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800004, 0x10, r0, 0x0) preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x9, 0x0) mmap(&(0x7f0000000000/0xa000)=nil, 0xa000, 0x2, 0x2172, 0xffffffffffffffff, 0x0) r1 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x11, 0x4, &(0x7f00000000c0)=@framed={{}, [@call={0x85, 0x0, 0x0, 0x7b}]}, &(0x7f00000001c0)='syzkaller\x00', 0x4, 0x8f, &(0x7f00000002c0)=""/143, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='ext4_es_lookup_extent_exit\x00', r1}, 0x10) r2 = socket$unix(0x1, 0x1, 0x0) bind$unix(r2, &(0x7f00000001c0)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x56) 06:18:56 executing program 1: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800004, 0x12, r0, 0x0) preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x9, 0x0) bpf$LINK_GET_FD_BY_ID(0x1e, &(0x7f0000000040)=0xffffffffffffffff, 0x4) [ 338.436557][T15200] netlink: 20 bytes leftover after parsing attributes in process `syz-executor.2'. 06:18:56 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000400)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000440)=ANY=[@ANYBLOB="3400000011000100000000000000000002000000", @ANYRES32=0x0, @ANYBLOB="081f0000000000000000030062726964676530000000000000000000"], 0x34}}, 0x0) r1 = openat(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800004, 0x12, r1, 0x0) preadv(r1, &(0x7f00000001c0)=[{0x0}], 0x1, 0x9, 0x0) openat$cgroup_ro(r1, &(0x7f0000000040)='cpuacct.usage_sys\x00', 0x0, 0x0) [ 338.493455][T15205] loop0: detected capacity change from 0 to 64 06:18:56 executing program 1: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800004, 0x12, r0, 0x0) bpf$LINK_GET_FD_BY_ID(0x1e, &(0x7f0000000040)=0xffffffffffffffff, 0x4) [ 338.537142][T15205] REISERFS warning (device loop0): super-6504 reiserfs_getopt: the option "nolargeio" requires an argument [ 338.537142][T15205] 06:18:56 executing program 3: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800004, 0x10, r0, 0x0) preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x9, 0x0) mmap(&(0x7f0000000000/0xa000)=nil, 0xa000, 0x2, 0x2172, 0xffffffffffffffff, 0x0) r1 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x11, 0x4, &(0x7f00000000c0)=@framed={{}, [@call={0x85, 0x0, 0x0, 0x7b}]}, &(0x7f00000001c0)='syzkaller\x00', 0x4, 0x8f, &(0x7f00000002c0)=""/143, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='ext4_es_lookup_extent_exit\x00', r1}, 0x10) r2 = socket$unix(0x1, 0x1, 0x0) bind$unix(r2, &(0x7f00000001c0)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x56) [ 338.542835][T15211] netlink: 20 bytes leftover after parsing attributes in process `syz-executor.2'. 06:18:56 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000400)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000440)=ANY=[@ANYBLOB="3400000011000100000000000000000002000000", @ANYRES32=0x0, @ANYBLOB="081f0000000000000000030062726964676530000000000000000000"], 0x34}}, 0x0) r1 = openat(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800004, 0x12, r1, 0x0) preadv(r1, &(0x7f00000001c0)=[{0x0}], 0x1, 0x9, 0x0) [ 338.655972][T15218] netlink: 20 bytes leftover after parsing attributes in process `syz-executor.2'. 06:18:56 executing program 0: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800004, 0x12, r0, 0x0) preadv(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)=""/179, 0xb3}], 0x1, 0x3, 0xaee) preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x9, 0x0) mmap(&(0x7f0000000000/0xa000)=nil, 0xa000, 0x2, 0x2172, 0xffffffffffffffff, 0x0) ioctl$KVM_CREATE_PIT2(r0, 0x4040ae77, &(0x7f0000000200)={0x6}) socketpair(0x1e, 0x80005, 0x0, &(0x7f0000000340)={0x0, 0x0}) close(r1) syz_mount_image$reiserfs(&(0x7f0000000140), &(0x7f0000000180)='./file0\x00', 0x8000, 0x3, &(0x7f0000000300)=[{&(0x7f0000000540)="21d37ef07e82e237fbe1b40158d20e242c5ea1f9d9edc6b9395250085d6dfa486982e82d4ce1a5e2bc00d29383bae640de", 0x31, 0x7}, {&(0x7f0000000240)="c43f281f483aa6cd83e40e59d53f177299d285bbe5d90aab2b56a76f9db49d86afa5a0f601ba9b3502de5f3724f3ec00927151f928f668b362052950a2e8f16baec29875fdad59395e86a1050c368933e3ed5a17d76bd7bded793436ea207885f395ace3fc12126c205b170be392c1645233ef01f9661090706a65f63b4845dc2884a20711a8024ad4af44aeec9db33991dae38d95cdb7132970d0d4dec58b9d46d378", 0xa3, 0x6}, {&(0x7f0000000380)="05f82c760d277896dd8c9891a41aafe24124891a32a238c3c78696d112aa09f3ae5c54b0c08676da5db7f358c72dfaca9a5d90860b4ae363c9a921c47965d339c23408a6d9b31a23aee27822f0a140d8e4ec9475a740113f2b9923b46333110e528e0a513151aad34aee1b5310fcf62c1982349253003d6d53aebbe09cf5918668ee682be93b6a671bbc", 0x8a, 0x3}], 0x2000400, &(0x7f0000000440)={[{@balloc_no_unhash_reloc}, {@nolargeio}, {@grpjquota}], [{@obj_role={'obj_role', 0x3d, '^'}}, {@hash}, {@uid_lt}, {@mask={'mask', 0x3d, 'MAY_EXEC'}}, {@uid_lt={'uid<', 0xee00}}, {@smackfsfloor={'smackfsfloor', 0x3d, ':%#[@'}}, {@obj_user={'obj_user', 0x3d, ',\\*),i'}}, {@uid_eq={'uid', 0x3d, 0xee00}}, {@seclabel}, {@uid_lt={'uid<', 0xee00}}]}) 06:18:56 executing program 1: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800004, 0x12, r0, 0x0) bpf$LINK_GET_FD_BY_ID(0x1e, &(0x7f0000000040)=0xffffffffffffffff, 0x4) 06:18:56 executing program 3: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800004, 0x12, 0xffffffffffffffff, 0x0) preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x9, 0x0) mmap(&(0x7f0000000000/0xa000)=nil, 0xa000, 0x2, 0x2172, 0xffffffffffffffff, 0x0) r1 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x11, 0x4, &(0x7f00000000c0)=@framed={{}, [@call={0x85, 0x0, 0x0, 0x7b}]}, &(0x7f00000001c0)='syzkaller\x00', 0x4, 0x8f, &(0x7f00000002c0)=""/143, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='ext4_es_lookup_extent_exit\x00', r1}, 0x10) r2 = socket$unix(0x1, 0x1, 0x0) bind$unix(r2, &(0x7f00000001c0)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x56) 06:18:56 executing program 1: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800004, 0x12, r0, 0x0) bpf$LINK_GET_FD_BY_ID(0x1e, &(0x7f0000000040)=0xffffffffffffffff, 0x4) 06:18:56 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000400)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000440)=ANY=[@ANYBLOB="3400000011000100000000000000000002000000", @ANYRES32=0x0, @ANYBLOB="081f0000000000000000030062726964676530000000000000000000"], 0x34}}, 0x0) r1 = openat(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800004, 0x12, r1, 0x0) 06:18:56 executing program 3: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800004, 0x12, 0xffffffffffffffff, 0x0) preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x9, 0x0) mmap(&(0x7f0000000000/0xa000)=nil, 0xa000, 0x2, 0x2172, 0xffffffffffffffff, 0x0) r1 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x11, 0x4, &(0x7f00000000c0)=@framed={{}, [@call={0x85, 0x0, 0x0, 0x7b}]}, &(0x7f00000001c0)='syzkaller\x00', 0x4, 0x8f, &(0x7f00000002c0)=""/143, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='ext4_es_lookup_extent_exit\x00', r1}, 0x10) r2 = socket$unix(0x1, 0x1, 0x0) bind$unix(r2, &(0x7f00000001c0)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x56) [ 338.771880][T15229] loop0: detected capacity change from 0 to 64 06:18:56 executing program 1: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x9, 0x0) bpf$LINK_GET_FD_BY_ID(0x1e, &(0x7f0000000040)=0xffffffffffffffff, 0x4) [ 338.792592][T15231] netlink: 20 bytes leftover after parsing attributes in process `syz-executor.2'. [ 338.803754][T15229] REISERFS warning (device loop0): super-6504 reiserfs_getopt: the option "nolargeio" requires an argument [ 338.803754][T15229] 06:18:56 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000400)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000440)=ANY=[@ANYBLOB="3400000011000100000000000000000002000000", @ANYRES32=0x0, @ANYBLOB="081f0000000000000000030062726964676530000000000000000000"], 0x34}}, 0x0) openat(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0x0, 0x0) [ 338.879518][T15240] netlink: 20 bytes leftover after parsing attributes in process `syz-executor.2'. 06:18:56 executing program 0: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800004, 0x12, r0, 0x0) preadv(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)=""/179, 0xb3}], 0x1, 0x3, 0xaee) preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x9, 0x0) mmap(&(0x7f0000000000/0xa000)=nil, 0xa000, 0x2, 0x2172, 0xffffffffffffffff, 0x0) ioctl$KVM_CREATE_PIT2(r0, 0x4040ae77, &(0x7f0000000200)={0x6}) socketpair(0x1e, 0x80005, 0x0, &(0x7f0000000340)={0x0, 0x0}) syz_mount_image$reiserfs(&(0x7f0000000140), &(0x7f0000000180)='./file0\x00', 0x8000, 0x3, &(0x7f0000000300)=[{&(0x7f0000000540)="21d37ef07e82e237fbe1b40158d20e242c5ea1f9d9edc6b9395250085d6dfa486982e82d4ce1a5e2bc00d29383bae640de", 0x31, 0x7}, {&(0x7f0000000240)="c43f281f483aa6cd83e40e59d53f177299d285bbe5d90aab2b56a76f9db49d86afa5a0f601ba9b3502de5f3724f3ec00927151f928f668b362052950a2e8f16baec29875fdad59395e86a1050c368933e3ed5a17d76bd7bded793436ea207885f395ace3fc12126c205b170be392c1645233ef01f9661090706a65f63b4845dc2884a20711a8024ad4af44aeec9db33991dae38d95cdb7132970d0d4dec58b9d46d378", 0xa3, 0x6}, {&(0x7f0000000380)="05f82c760d277896dd8c9891a41aafe24124891a32a238c3c78696d112aa09f3ae5c54b0c08676da5db7f358c72dfaca9a5d90860b4ae363c9a921c47965d339c23408a6d9b31a23aee27822f0a140d8e4ec9475a740113f2b9923b46333110e528e0a513151aad34aee1b5310fcf62c1982349253003d6d53aebbe09cf5918668ee682be93b6a671bbc", 0x8a, 0x3}], 0x2000400, &(0x7f0000000440)={[{@balloc_no_unhash_reloc}, {@nolargeio}, {@grpjquota}], [{@obj_role={'obj_role', 0x3d, '^'}}, {@hash}, {@uid_lt}, {@mask={'mask', 0x3d, 'MAY_EXEC'}}, {@uid_lt={'uid<', 0xee00}}, {@smackfsfloor={'smackfsfloor', 0x3d, ':%#[@'}}, {@obj_user={'obj_user', 0x3d, ',\\*),i'}}, {@uid_eq={'uid', 0x3d, 0xee00}}, {@seclabel}, {@uid_lt={'uid<', 0xee00}}]}) 06:18:56 executing program 1: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x9, 0x0) bpf$LINK_GET_FD_BY_ID(0x1e, &(0x7f0000000040)=0xffffffffffffffff, 0x4) 06:18:56 executing program 3: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800004, 0x12, 0xffffffffffffffff, 0x0) preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x9, 0x0) mmap(&(0x7f0000000000/0xa000)=nil, 0xa000, 0x2, 0x2172, 0xffffffffffffffff, 0x0) r1 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x11, 0x4, &(0x7f00000000c0)=@framed={{}, [@call={0x85, 0x0, 0x0, 0x7b}]}, &(0x7f00000001c0)='syzkaller\x00', 0x4, 0x8f, &(0x7f00000002c0)=""/143, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='ext4_es_lookup_extent_exit\x00', r1}, 0x10) r2 = socket$unix(0x1, 0x1, 0x0) bind$unix(r2, &(0x7f00000001c0)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x56) 06:18:56 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000400)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000440)=ANY=[@ANYBLOB="3400000011000100000000000000000002000000", @ANYRES32=0x0, @ANYBLOB="081f0000000000000000030062726964676530000000000000000000"], 0x34}}, 0x0) [ 338.954240][T15249] netlink: 20 bytes leftover after parsing attributes in process `syz-executor.2'. [ 338.959676][T15248] loop0: detected capacity change from 0 to 64 06:18:56 executing program 2: sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000400)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000440)=ANY=[@ANYBLOB="3400000011000100000000000000000002000000", @ANYRES32=0x0, @ANYBLOB="081f0000000000000000030062726964676530000000000000000000"], 0x34}}, 0x0) [ 339.004072][T15248] REISERFS warning (device loop0): super-6504 reiserfs_getopt: the option "nolargeio" requires an argument [ 339.004072][T15248] 06:18:56 executing program 1: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x9, 0x0) bpf$LINK_GET_FD_BY_ID(0x1e, &(0x7f0000000040)=0xffffffffffffffff, 0x4) 06:18:56 executing program 3: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800004, 0x12, r0, 0x0) preadv(0xffffffffffffffff, &(0x7f00000001c0)=[{0x0}], 0x1, 0x9, 0x0) mmap(&(0x7f0000000000/0xa000)=nil, 0xa000, 0x2, 0x2172, 0xffffffffffffffff, 0x0) r1 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x11, 0x4, &(0x7f00000000c0)=@framed={{}, [@call={0x85, 0x0, 0x0, 0x7b}]}, &(0x7f00000001c0)='syzkaller\x00', 0x4, 0x8f, &(0x7f00000002c0)=""/143, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='ext4_es_lookup_extent_exit\x00', r1}, 0x10) r2 = socket$unix(0x1, 0x1, 0x0) bind$unix(r2, &(0x7f00000001c0)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x56) 06:18:56 executing program 0: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800004, 0x12, r0, 0x0) preadv(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)=""/179, 0xb3}], 0x1, 0x3, 0xaee) preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x9, 0x0) mmap(&(0x7f0000000000/0xa000)=nil, 0xa000, 0x2, 0x2172, 0xffffffffffffffff, 0x0) ioctl$KVM_CREATE_PIT2(r0, 0x4040ae77, &(0x7f0000000200)={0x6}) syz_mount_image$reiserfs(&(0x7f0000000140), &(0x7f0000000180)='./file0\x00', 0x8000, 0x3, &(0x7f0000000300)=[{&(0x7f0000000540)="21d37ef07e82e237fbe1b40158d20e242c5ea1f9d9edc6b9395250085d6dfa486982e82d4ce1a5e2bc00d29383bae640de", 0x31, 0x7}, {&(0x7f0000000240)="c43f281f483aa6cd83e40e59d53f177299d285bbe5d90aab2b56a76f9db49d86afa5a0f601ba9b3502de5f3724f3ec00927151f928f668b362052950a2e8f16baec29875fdad59395e86a1050c368933e3ed5a17d76bd7bded793436ea207885f395ace3fc12126c205b170be392c1645233ef01f9661090706a65f63b4845dc2884a20711a8024ad4af44aeec9db33991dae38d95cdb7132970d0d4dec58b9d46d378", 0xa3, 0x6}, {&(0x7f0000000380)="05f82c760d277896dd8c9891a41aafe24124891a32a238c3c78696d112aa09f3ae5c54b0c08676da5db7f358c72dfaca9a5d90860b4ae363c9a921c47965d339c23408a6d9b31a23aee27822f0a140d8e4ec9475a740113f2b9923b46333110e528e0a513151aad34aee1b5310fcf62c1982349253003d6d53aebbe09cf5918668ee682be93b6a671bbc", 0x8a, 0x3}], 0x2000400, &(0x7f0000000440)={[{@balloc_no_unhash_reloc}, {@nolargeio}, {@grpjquota}], [{@obj_role={'obj_role', 0x3d, '^'}}, {@hash}, {@uid_lt}, {@mask={'mask', 0x3d, 'MAY_EXEC'}}, {@uid_lt={'uid<', 0xee00}}, {@smackfsfloor={'smackfsfloor', 0x3d, ':%#[@'}}, {@obj_user={'obj_user', 0x3d, ',\\*),i'}}, {@uid_eq={'uid', 0x3d, 0xee00}}, {@seclabel}, {@uid_lt={'uid<', 0xee00}}]}) 06:18:56 executing program 2: sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000400)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000440)=ANY=[@ANYBLOB="3400000011000100000000000000000002000000", @ANYRES32=0x0, @ANYBLOB="081f0000000000000000030062726964676530000000000000000000"], 0x34}}, 0x0) 06:18:56 executing program 1: mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800004, 0x12, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f00000001c0)=[{0x0}], 0x1, 0x9, 0x0) bpf$LINK_GET_FD_BY_ID(0x1e, &(0x7f0000000040)=0xffffffffffffffff, 0x4) [ 339.122698][T15260] loop0: detected capacity change from 0 to 64 06:18:56 executing program 2: sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000400)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000440)=ANY=[@ANYBLOB="3400000011000100000000000000000002000000", @ANYRES32=0x0, @ANYBLOB="081f0000000000000000030062726964676530000000000000000000"], 0x34}}, 0x0) 06:18:56 executing program 3: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800004, 0x12, r0, 0x0) preadv(0xffffffffffffffff, &(0x7f00000001c0)=[{0x0}], 0x1, 0x9, 0x0) mmap(&(0x7f0000000000/0xa000)=nil, 0xa000, 0x2, 0x2172, 0xffffffffffffffff, 0x0) r1 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x11, 0x4, &(0x7f00000000c0)=@framed={{}, [@call={0x85, 0x0, 0x0, 0x7b}]}, &(0x7f00000001c0)='syzkaller\x00', 0x4, 0x8f, &(0x7f00000002c0)=""/143, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='ext4_es_lookup_extent_exit\x00', r1}, 0x10) r2 = socket$unix(0x1, 0x1, 0x0) bind$unix(r2, &(0x7f00000001c0)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x56) [ 339.140899][T15260] REISERFS warning (device loop0): super-6504 reiserfs_getopt: the option "nolargeio" requires an argument [ 339.140899][T15260] 06:18:56 executing program 1: mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800004, 0x12, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f00000001c0)=[{0x0}], 0x1, 0x9, 0x0) bpf$LINK_GET_FD_BY_ID(0x1e, &(0x7f0000000040)=0xffffffffffffffff, 0x4) 06:18:56 executing program 3: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800004, 0x12, r0, 0x0) preadv(0xffffffffffffffff, &(0x7f00000001c0)=[{0x0}], 0x1, 0x9, 0x0) mmap(&(0x7f0000000000/0xa000)=nil, 0xa000, 0x2, 0x2172, 0xffffffffffffffff, 0x0) r1 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x11, 0x4, &(0x7f00000000c0)=@framed={{}, [@call={0x85, 0x0, 0x0, 0x7b}]}, &(0x7f00000001c0)='syzkaller\x00', 0x4, 0x8f, &(0x7f00000002c0)=""/143, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='ext4_es_lookup_extent_exit\x00', r1}, 0x10) r2 = socket$unix(0x1, 0x1, 0x0) bind$unix(r2, &(0x7f00000001c0)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x56) 06:18:56 executing program 2: socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000400)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000440)=ANY=[@ANYBLOB="3400000011000100000000000000000002000000", @ANYRES32=0x0, @ANYBLOB="081f0000000000000000030062726964676530000000000000000000"], 0x34}}, 0x0) 06:18:56 executing program 0: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800004, 0x12, r0, 0x0) preadv(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)=""/179, 0xb3}], 0x1, 0x3, 0xaee) preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x9, 0x0) mmap(&(0x7f0000000000/0xa000)=nil, 0xa000, 0x2, 0x2172, 0xffffffffffffffff, 0x0) syz_mount_image$reiserfs(&(0x7f0000000140), &(0x7f0000000180)='./file0\x00', 0x8000, 0x3, &(0x7f0000000300)=[{&(0x7f0000000540)="21d37ef07e82e237fbe1b40158d20e242c5ea1f9d9edc6b9395250085d6dfa486982e82d4ce1a5e2bc00d29383bae640de", 0x31, 0x7}, {&(0x7f0000000240)="c43f281f483aa6cd83e40e59d53f177299d285bbe5d90aab2b56a76f9db49d86afa5a0f601ba9b3502de5f3724f3ec00927151f928f668b362052950a2e8f16baec29875fdad59395e86a1050c368933e3ed5a17d76bd7bded793436ea207885f395ace3fc12126c205b170be392c1645233ef01f9661090706a65f63b4845dc2884a20711a8024ad4af44aeec9db33991dae38d95cdb7132970d0d4dec58b9d46d378", 0xa3, 0x6}, {&(0x7f0000000380)="05f82c760d277896dd8c9891a41aafe24124891a32a238c3c78696d112aa09f3ae5c54b0c08676da5db7f358c72dfaca9a5d90860b4ae363c9a921c47965d339c23408a6d9b31a23aee27822f0a140d8e4ec9475a740113f2b9923b46333110e528e0a513151aad34aee1b5310fcf62c1982349253003d6d53aebbe09cf5918668ee682be93b6a671bbc", 0x8a, 0x3}], 0x2000400, &(0x7f0000000440)={[{@balloc_no_unhash_reloc}, {@nolargeio}, {@grpjquota}], [{@obj_role={'obj_role', 0x3d, '^'}}, {@hash}, {@uid_lt}, {@mask={'mask', 0x3d, 'MAY_EXEC'}}, {@uid_lt={'uid<', 0xee00}}, {@smackfsfloor={'smackfsfloor', 0x3d, ':%#[@'}}, {@obj_user={'obj_user', 0x3d, ',\\*),i'}}, {@uid_eq={'uid', 0x3d, 0xee00}}, {@seclabel}, {@uid_lt={'uid<', 0xee00}}]}) 06:18:56 executing program 1: mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800004, 0x12, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f00000001c0)=[{0x0}], 0x1, 0x9, 0x0) bpf$LINK_GET_FD_BY_ID(0x1e, &(0x7f0000000040)=0xffffffffffffffff, 0x4) 06:18:56 executing program 2: socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000400)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000440)=ANY=[@ANYBLOB="3400000011000100000000000000000002000000", @ANYRES32=0x0, @ANYBLOB="081f0000000000000000030062726964676530000000000000000000"], 0x34}}, 0x0) [ 339.288363][T15280] loop0: detected capacity change from 0 to 64 06:18:56 executing program 3: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800004, 0x12, r0, 0x0) preadv(r0, 0x0, 0x0, 0x9, 0x0) mmap(&(0x7f0000000000/0xa000)=nil, 0xa000, 0x2, 0x2172, 0xffffffffffffffff, 0x0) r1 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x11, 0x4, &(0x7f00000000c0)=@framed={{}, [@call={0x85, 0x0, 0x0, 0x7b}]}, &(0x7f00000001c0)='syzkaller\x00', 0x4, 0x8f, &(0x7f00000002c0)=""/143, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='ext4_es_lookup_extent_exit\x00', r1}, 0x10) r2 = socket$unix(0x1, 0x1, 0x0) bind$unix(r2, &(0x7f00000001c0)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x56) [ 339.300356][T15280] REISERFS warning (device loop0): super-6504 reiserfs_getopt: the option "nolargeio" requires an argument [ 339.300356][T15280] 06:18:56 executing program 1: r0 = openat(0xffffffffffffffff, 0x0, 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800004, 0x12, r0, 0x0) preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x9, 0x0) bpf$LINK_GET_FD_BY_ID(0x1e, &(0x7f0000000040)=0xffffffffffffffff, 0x4) 06:18:56 executing program 2: socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000400)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000440)=ANY=[@ANYBLOB="3400000011000100000000000000000002000000", @ANYRES32=0x0, @ANYBLOB="081f0000000000000000030062726964676530000000000000000000"], 0x34}}, 0x0) 06:18:56 executing program 1: r0 = openat(0xffffffffffffffff, 0x0, 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800004, 0x12, r0, 0x0) preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x9, 0x0) bpf$LINK_GET_FD_BY_ID(0x1e, &(0x7f0000000040)=0xffffffffffffffff, 0x4) 06:18:56 executing program 3: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800004, 0x12, r0, 0x0) preadv(r0, 0x0, 0x0, 0x9, 0x0) mmap(&(0x7f0000000000/0xa000)=nil, 0xa000, 0x2, 0x2172, 0xffffffffffffffff, 0x0) r1 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x11, 0x4, &(0x7f00000000c0)=@framed={{}, [@call={0x85, 0x0, 0x0, 0x7b}]}, &(0x7f00000001c0)='syzkaller\x00', 0x4, 0x8f, &(0x7f00000002c0)=""/143, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='ext4_es_lookup_extent_exit\x00', r1}, 0x10) r2 = socket$unix(0x1, 0x1, 0x0) bind$unix(r2, &(0x7f00000001c0)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x56) 06:18:57 executing program 0: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800004, 0x12, r0, 0x0) preadv(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)=""/179, 0xb3}], 0x1, 0x3, 0xaee) preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x9, 0x0) syz_mount_image$reiserfs(&(0x7f0000000140), &(0x7f0000000180)='./file0\x00', 0x8000, 0x3, &(0x7f0000000300)=[{&(0x7f0000000540)="21d37ef07e82e237fbe1b40158d20e242c5ea1f9d9edc6b9395250085d6dfa486982e82d4ce1a5e2bc00d29383bae640de", 0x31, 0x7}, {&(0x7f0000000240)="c43f281f483aa6cd83e40e59d53f177299d285bbe5d90aab2b56a76f9db49d86afa5a0f601ba9b3502de5f3724f3ec00927151f928f668b362052950a2e8f16baec29875fdad59395e86a1050c368933e3ed5a17d76bd7bded793436ea207885f395ace3fc12126c205b170be392c1645233ef01f9661090706a65f63b4845dc2884a20711a8024ad4af44aeec9db33991dae38d95cdb7132970d0d4dec58b9d46d378", 0xa3, 0x6}, {&(0x7f0000000380)="05f82c760d277896dd8c9891a41aafe24124891a32a238c3c78696d112aa09f3ae5c54b0c08676da5db7f358c72dfaca9a5d90860b4ae363c9a921c47965d339c23408a6d9b31a23aee27822f0a140d8e4ec9475a740113f2b9923b46333110e528e0a513151aad34aee1b5310fcf62c1982349253003d6d53aebbe09cf5918668ee682be93b6a671bbc", 0x8a, 0x3}], 0x2000400, &(0x7f0000000440)={[{@balloc_no_unhash_reloc}, {@nolargeio}, {@grpjquota}], [{@obj_role={'obj_role', 0x3d, '^'}}, {@hash}, {@uid_lt}, {@mask={'mask', 0x3d, 'MAY_EXEC'}}, {@uid_lt={'uid<', 0xee00}}, {@smackfsfloor={'smackfsfloor', 0x3d, ':%#[@'}}, {@obj_user={'obj_user', 0x3d, ',\\*),i'}}, {@uid_eq={'uid', 0x3d, 0xee00}}, {@seclabel}, {@uid_lt={'uid<', 0xee00}}]}) 06:18:57 executing program 1: r0 = openat(0xffffffffffffffff, 0x0, 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800004, 0x12, r0, 0x0) preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x9, 0x0) bpf$LINK_GET_FD_BY_ID(0x1e, &(0x7f0000000040)=0xffffffffffffffff, 0x4) 06:18:57 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, 0x0, 0x0) 06:18:57 executing program 3: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800004, 0x12, r0, 0x0) preadv(r0, 0x0, 0x0, 0x9, 0x0) mmap(&(0x7f0000000000/0xa000)=nil, 0xa000, 0x2, 0x2172, 0xffffffffffffffff, 0x0) r1 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x11, 0x4, &(0x7f00000000c0)=@framed={{}, [@call={0x85, 0x0, 0x0, 0x7b}]}, &(0x7f00000001c0)='syzkaller\x00', 0x4, 0x8f, &(0x7f00000002c0)=""/143, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='ext4_es_lookup_extent_exit\x00', r1}, 0x10) r2 = socket$unix(0x1, 0x1, 0x0) bind$unix(r2, &(0x7f00000001c0)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x56) 06:18:57 executing program 1: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x0, 0x12, r0, 0x0) preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x9, 0x0) bpf$LINK_GET_FD_BY_ID(0x1e, &(0x7f0000000040)=0xffffffffffffffff, 0x4) 06:18:57 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, 0x0, 0x0) 06:18:57 executing program 0: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800004, 0x12, r0, 0x0) preadv(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)=""/179, 0xb3}], 0x1, 0x3, 0xaee) preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x9, 0x0) syz_mount_image$reiserfs(&(0x7f0000000140), &(0x7f0000000180)='./file0\x00', 0x8000, 0x3, &(0x7f0000000300)=[{&(0x7f0000000540)="21d37ef07e82e237fbe1b40158d20e242c5ea1f9d9edc6b9395250085d6dfa486982e82d4ce1a5e2bc00d29383bae640de", 0x31, 0x7}, {&(0x7f0000000240)="c43f281f483aa6cd83e40e59d53f177299d285bbe5d90aab2b56a76f9db49d86afa5a0f601ba9b3502de5f3724f3ec00927151f928f668b362052950a2e8f16baec29875fdad59395e86a1050c368933e3ed5a17d76bd7bded793436ea207885f395ace3fc12126c205b170be392c1645233ef01f9661090706a65f63b4845dc2884a20711a8024ad4af44aeec9db33991dae38d95cdb7132970d0d4dec58b9d46d378", 0xa3, 0x6}, {&(0x7f0000000380)="05f82c760d277896dd8c9891a41aafe24124891a32a238c3c78696d112aa09f3ae5c54b0c08676da5db7f358c72dfaca9a5d90860b4ae363c9a921c47965d339c23408a6d9b31a23aee27822f0a140d8e4ec9475a740113f2b9923b46333110e528e0a513151aad34aee1b5310fcf62c1982349253003d6d53aebbe09cf5918668ee682be93b6a671bbc", 0x8a, 0x3}], 0x2000400, &(0x7f0000000440)={[{@balloc_no_unhash_reloc}, {@nolargeio}, {@grpjquota}], [{@obj_role={'obj_role', 0x3d, '^'}}, {@hash}, {@uid_lt}, {@mask={'mask', 0x3d, 'MAY_EXEC'}}, {@uid_lt={'uid<', 0xee00}}, {@smackfsfloor={'smackfsfloor', 0x3d, ':%#[@'}}, {@obj_user={'obj_user', 0x3d, ',\\*),i'}}, {@uid_eq={'uid', 0x3d, 0xee00}}, {@seclabel}, {@uid_lt={'uid<', 0xee00}}]}) 06:18:57 executing program 1: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x0, 0x12, r0, 0x0) preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x9, 0x0) bpf$LINK_GET_FD_BY_ID(0x1e, &(0x7f0000000040)=0xffffffffffffffff, 0x4) 06:18:57 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, 0x0, 0x0) 06:18:57 executing program 3: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800004, 0x12, r0, 0x0) preadv(r0, &(0x7f00000001c0), 0x0, 0x9, 0x0) mmap(&(0x7f0000000000/0xa000)=nil, 0xa000, 0x2, 0x2172, 0xffffffffffffffff, 0x0) r1 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x11, 0x4, &(0x7f00000000c0)=@framed={{}, [@call={0x85, 0x0, 0x0, 0x7b}]}, &(0x7f00000001c0)='syzkaller\x00', 0x4, 0x8f, &(0x7f00000002c0)=""/143, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='ext4_es_lookup_extent_exit\x00', r1}, 0x10) r2 = socket$unix(0x1, 0x1, 0x0) bind$unix(r2, &(0x7f00000001c0)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x56) 06:18:57 executing program 0: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800004, 0x12, r0, 0x0) preadv(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)=""/179, 0xb3}], 0x1, 0x3, 0xaee) preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x9, 0x0) syz_mount_image$reiserfs(&(0x7f0000000140), &(0x7f0000000180)='./file0\x00', 0x8000, 0x3, &(0x7f0000000300)=[{&(0x7f0000000540)="21d37ef07e82e237fbe1b40158d20e242c5ea1f9d9edc6b9395250085d6dfa486982e82d4ce1a5e2bc00d29383bae640de", 0x31, 0x7}, {&(0x7f0000000240)="c43f281f483aa6cd83e40e59d53f177299d285bbe5d90aab2b56a76f9db49d86afa5a0f601ba9b3502de5f3724f3ec00927151f928f668b362052950a2e8f16baec29875fdad59395e86a1050c368933e3ed5a17d76bd7bded793436ea207885f395ace3fc12126c205b170be392c1645233ef01f9661090706a65f63b4845dc2884a20711a8024ad4af44aeec9db33991dae38d95cdb7132970d0d4dec58b9d46d378", 0xa3, 0x6}, {&(0x7f0000000380)="05f82c760d277896dd8c9891a41aafe24124891a32a238c3c78696d112aa09f3ae5c54b0c08676da5db7f358c72dfaca9a5d90860b4ae363c9a921c47965d339c23408a6d9b31a23aee27822f0a140d8e4ec9475a740113f2b9923b46333110e528e0a513151aad34aee1b5310fcf62c1982349253003d6d53aebbe09cf5918668ee682be93b6a671bbc", 0x8a, 0x3}], 0x2000400, &(0x7f0000000440)={[{@balloc_no_unhash_reloc}, {@nolargeio}, {@grpjquota}], [{@obj_role={'obj_role', 0x3d, '^'}}, {@hash}, {@uid_lt}, {@mask={'mask', 0x3d, 'MAY_EXEC'}}, {@uid_lt={'uid<', 0xee00}}, {@smackfsfloor={'smackfsfloor', 0x3d, ':%#[@'}}, {@obj_user={'obj_user', 0x3d, ',\\*),i'}}, {@uid_eq={'uid', 0x3d, 0xee00}}, {@seclabel}, {@uid_lt={'uid<', 0xee00}}]}) 06:18:57 executing program 3: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800004, 0x12, r0, 0x0) preadv(r0, &(0x7f00000001c0), 0x0, 0x9, 0x0) mmap(&(0x7f0000000000/0xa000)=nil, 0xa000, 0x2, 0x2172, 0xffffffffffffffff, 0x0) r1 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x11, 0x4, &(0x7f00000000c0)=@framed={{}, [@call={0x85, 0x0, 0x0, 0x7b}]}, &(0x7f00000001c0)='syzkaller\x00', 0x4, 0x8f, &(0x7f00000002c0)=""/143, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='ext4_es_lookup_extent_exit\x00', r1}, 0x10) r2 = socket$unix(0x1, 0x1, 0x0) bind$unix(r2, &(0x7f00000001c0)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x56) 06:18:57 executing program 1: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x0, 0x12, r0, 0x0) preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x9, 0x0) bpf$LINK_GET_FD_BY_ID(0x1e, &(0x7f0000000040)=0xffffffffffffffff, 0x4) 06:18:57 executing program 0: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800004, 0x12, r0, 0x0) preadv(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)=""/179, 0xb3}], 0x1, 0x3, 0xaee) mmap(&(0x7f0000000000/0xa000)=nil, 0xa000, 0x2, 0x2172, 0xffffffffffffffff, 0x0) syz_mount_image$reiserfs(&(0x7f0000000140), &(0x7f0000000180)='./file0\x00', 0x8000, 0x3, &(0x7f0000000300)=[{&(0x7f0000000540)="21d37ef07e82e237fbe1b40158d20e242c5ea1f9d9edc6b9395250085d6dfa486982e82d4ce1a5e2bc00d29383bae640de", 0x31, 0x7}, {&(0x7f0000000240)="c43f281f483aa6cd83e40e59d53f177299d285bbe5d90aab2b56a76f9db49d86afa5a0f601ba9b3502de5f3724f3ec00927151f928f668b362052950a2e8f16baec29875fdad59395e86a1050c368933e3ed5a17d76bd7bded793436ea207885f395ace3fc12126c205b170be392c1645233ef01f9661090706a65f63b4845dc2884a20711a8024ad4af44aeec9db33991dae38d95cdb7132970d0d4dec58b9d46d378", 0xa3, 0x6}, {&(0x7f0000000380)="05f82c760d277896dd8c9891a41aafe24124891a32a238c3c78696d112aa09f3ae5c54b0c08676da5db7f358c72dfaca9a5d90860b4ae363c9a921c47965d339c23408a6d9b31a23aee27822f0a140d8e4ec9475a740113f2b9923b46333110e528e0a513151aad34aee1b5310fcf62c1982349253003d6d53aebbe09cf5918668ee682be93b6a671bbc", 0x8a, 0x3}], 0x2000400, &(0x7f0000000440)={[{@balloc_no_unhash_reloc}, {@nolargeio}, {@grpjquota}], [{@obj_role={'obj_role', 0x3d, '^'}}, {@hash}, {@uid_lt}, {@mask={'mask', 0x3d, 'MAY_EXEC'}}, {@uid_lt={'uid<', 0xee00}}, {@smackfsfloor={'smackfsfloor', 0x3d, ':%#[@'}}, {@obj_user={'obj_user', 0x3d, ',\\*),i'}}, {@uid_eq={'uid', 0x3d, 0xee00}}, {@seclabel}, {@uid_lt={'uid<', 0xee00}}]}) 06:18:57 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000400)={0x0, 0x0, 0x0}, 0x0) 06:18:57 executing program 1: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800004, 0x10, r0, 0x0) preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x9, 0x0) bpf$LINK_GET_FD_BY_ID(0x1e, &(0x7f0000000040)=0xffffffffffffffff, 0x4) [ 339.750661][T15332] loop0: detected capacity change from 0 to 64 06:18:57 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000400)={0x0, 0x0, 0x0}, 0x0) [ 339.776828][T15332] REISERFS warning (device loop0): super-6504 reiserfs_getopt: the option "nolargeio" requires an argument [ 339.776828][T15332] 06:18:57 executing program 3: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800004, 0x12, r0, 0x0) preadv(r0, &(0x7f00000001c0), 0x0, 0x9, 0x0) mmap(&(0x7f0000000000/0xa000)=nil, 0xa000, 0x2, 0x2172, 0xffffffffffffffff, 0x0) r1 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x11, 0x4, &(0x7f00000000c0)=@framed={{}, [@call={0x85, 0x0, 0x0, 0x7b}]}, &(0x7f00000001c0)='syzkaller\x00', 0x4, 0x8f, &(0x7f00000002c0)=""/143, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='ext4_es_lookup_extent_exit\x00', r1}, 0x10) r2 = socket$unix(0x1, 0x1, 0x0) bind$unix(r2, &(0x7f00000001c0)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x56) 06:18:57 executing program 1: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800004, 0x10, r0, 0x0) preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x9, 0x0) bpf$LINK_GET_FD_BY_ID(0x1e, &(0x7f0000000040)=0xffffffffffffffff, 0x4) 06:18:57 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000400)={0x0, 0x0, 0x0}, 0x0) 06:18:57 executing program 1: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800004, 0x10, r0, 0x0) preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x9, 0x0) bpf$LINK_GET_FD_BY_ID(0x1e, &(0x7f0000000040)=0xffffffffffffffff, 0x4) 06:18:57 executing program 0: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800004, 0x12, r0, 0x0) preadv(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)=""/179, 0xb3}], 0x1, 0x3, 0xaee) mmap(&(0x7f0000000000/0xa000)=nil, 0xa000, 0x2, 0x2172, 0xffffffffffffffff, 0x0) syz_mount_image$reiserfs(&(0x7f0000000140), &(0x7f0000000180)='./file0\x00', 0x8000, 0x3, &(0x7f0000000300)=[{&(0x7f0000000540)="21d37ef07e82e237fbe1b40158d20e242c5ea1f9d9edc6b9395250085d6dfa486982e82d4ce1a5e2bc00d29383bae640de", 0x31, 0x7}, {&(0x7f0000000240)="c43f281f483aa6cd83e40e59d53f177299d285bbe5d90aab2b56a76f9db49d86afa5a0f601ba9b3502de5f3724f3ec00927151f928f668b362052950a2e8f16baec29875fdad59395e86a1050c368933e3ed5a17d76bd7bded793436ea207885f395ace3fc12126c205b170be392c1645233ef01f9661090706a65f63b4845dc2884a20711a8024ad4af44aeec9db33991dae38d95cdb7132970d0d4dec58b9d46d378", 0xa3, 0x6}, {&(0x7f0000000380)="05f82c760d277896dd8c9891a41aafe24124891a32a238c3c78696d112aa09f3ae5c54b0c08676da5db7f358c72dfaca9a5d90860b4ae363c9a921c47965d339c23408a6d9b31a23aee27822f0a140d8e4ec9475a740113f2b9923b46333110e528e0a513151aad34aee1b5310fcf62c1982349253003d6d53aebbe09cf5918668ee682be93b6a671bbc", 0x8a, 0x3}], 0x2000400, &(0x7f0000000440)={[{@balloc_no_unhash_reloc}, {@nolargeio}, {@grpjquota}], [{@obj_role={'obj_role', 0x3d, '^'}}, {@hash}, {@uid_lt}, {@mask={'mask', 0x3d, 'MAY_EXEC'}}, {@uid_lt={'uid<', 0xee00}}, {@smackfsfloor={'smackfsfloor', 0x3d, ':%#[@'}}, {@obj_user={'obj_user', 0x3d, ',\\*),i'}}, {@uid_eq={'uid', 0x3d, 0xee00}}, {@seclabel}, {@uid_lt={'uid<', 0xee00}}]}) 06:18:57 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000400)={0x0, 0x0, &(0x7f0000000100)={0x0, 0x34}}, 0x0) 06:18:57 executing program 3: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800004, 0x12, r0, 0x0) preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x0, 0x0) mmap(&(0x7f0000000000/0xa000)=nil, 0xa000, 0x2, 0x2172, 0xffffffffffffffff, 0x0) r1 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x11, 0x4, &(0x7f00000000c0)=@framed={{}, [@call={0x85, 0x0, 0x0, 0x7b}]}, &(0x7f00000001c0)='syzkaller\x00', 0x4, 0x8f, &(0x7f00000002c0)=""/143, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='ext4_es_lookup_extent_exit\x00', r1}, 0x10) r2 = socket$unix(0x1, 0x1, 0x0) bind$unix(r2, &(0x7f00000001c0)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x56) 06:18:57 executing program 1: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800004, 0x12, 0xffffffffffffffff, 0x0) preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x9, 0x0) bpf$LINK_GET_FD_BY_ID(0x1e, &(0x7f0000000040)=0xffffffffffffffff, 0x4) 06:18:57 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000400)={0x0, 0x0, &(0x7f0000000100)={0x0, 0x34}}, 0x0) [ 339.985451][T15358] loop0: detected capacity change from 0 to 64 06:18:57 executing program 1: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800004, 0x12, 0xffffffffffffffff, 0x0) preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x9, 0x0) bpf$LINK_GET_FD_BY_ID(0x1e, &(0x7f0000000040)=0xffffffffffffffff, 0x4) 06:18:57 executing program 3: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800004, 0x12, r0, 0x0) preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x0, 0x0) mmap(&(0x7f0000000000/0xa000)=nil, 0xa000, 0x2, 0x2172, 0xffffffffffffffff, 0x0) r1 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x11, 0x4, &(0x7f00000000c0)=@framed={{}, [@call={0x85, 0x0, 0x0, 0x7b}]}, &(0x7f00000001c0)='syzkaller\x00', 0x4, 0x8f, &(0x7f00000002c0)=""/143, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='ext4_es_lookup_extent_exit\x00', r1}, 0x10) r2 = socket$unix(0x1, 0x1, 0x0) bind$unix(r2, &(0x7f00000001c0)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x56) [ 340.048497][T15358] REISERFS warning (device loop0): super-6504 reiserfs_getopt: the option "nolargeio" requires an argument [ 340.048497][T15358] 06:18:57 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000400)={0x0, 0x0, &(0x7f0000000100)={0x0, 0x34}}, 0x0) 06:18:57 executing program 0: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800004, 0x12, r0, 0x0) preadv(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)=""/179, 0xb3}], 0x1, 0x3, 0xaee) mmap(&(0x7f0000000000/0xa000)=nil, 0xa000, 0x2, 0x2172, 0xffffffffffffffff, 0x0) syz_mount_image$reiserfs(&(0x7f0000000140), &(0x7f0000000180)='./file0\x00', 0x8000, 0x3, &(0x7f0000000300)=[{&(0x7f0000000540)="21d37ef07e82e237fbe1b40158d20e242c5ea1f9d9edc6b9395250085d6dfa486982e82d4ce1a5e2bc00d29383bae640de", 0x31, 0x7}, {&(0x7f0000000240)="c43f281f483aa6cd83e40e59d53f177299d285bbe5d90aab2b56a76f9db49d86afa5a0f601ba9b3502de5f3724f3ec00927151f928f668b362052950a2e8f16baec29875fdad59395e86a1050c368933e3ed5a17d76bd7bded793436ea207885f395ace3fc12126c205b170be392c1645233ef01f9661090706a65f63b4845dc2884a20711a8024ad4af44aeec9db33991dae38d95cdb7132970d0d4dec58b9d46d378", 0xa3, 0x6}, {&(0x7f0000000380)="05f82c760d277896dd8c9891a41aafe24124891a32a238c3c78696d112aa09f3ae5c54b0c08676da5db7f358c72dfaca9a5d90860b4ae363c9a921c47965d339c23408a6d9b31a23aee27822f0a140d8e4ec9475a740113f2b9923b46333110e528e0a513151aad34aee1b5310fcf62c1982349253003d6d53aebbe09cf5918668ee682be93b6a671bbc", 0x8a, 0x3}], 0x2000400, &(0x7f0000000440)={[{@balloc_no_unhash_reloc}, {@nolargeio}, {@grpjquota}], [{@obj_role={'obj_role', 0x3d, '^'}}, {@hash}, {@uid_lt}, {@mask={'mask', 0x3d, 'MAY_EXEC'}}, {@uid_lt={'uid<', 0xee00}}, {@smackfsfloor={'smackfsfloor', 0x3d, ':%#[@'}}, {@obj_user={'obj_user', 0x3d, ',\\*),i'}}, {@uid_eq={'uid', 0x3d, 0xee00}}, {@seclabel}, {@uid_lt={'uid<', 0xee00}}]}) 06:18:57 executing program 1: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800004, 0x12, 0xffffffffffffffff, 0x0) preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x9, 0x0) bpf$LINK_GET_FD_BY_ID(0x1e, &(0x7f0000000040)=0xffffffffffffffff, 0x4) [ 340.187559][T15373] loop0: detected capacity change from 0 to 64 06:18:57 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000400)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000440)=ANY=[@ANYBLOB="3400000011000100000000000000000002000000", @ANYRES32=0x0], 0x34}}, 0x0) 06:18:57 executing program 1: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800004, 0x12, r0, 0x0) preadv(0xffffffffffffffff, &(0x7f00000001c0)=[{0x0}], 0x1, 0x9, 0x0) bpf$LINK_GET_FD_BY_ID(0x1e, &(0x7f0000000040)=0xffffffffffffffff, 0x4) 06:18:57 executing program 3: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800004, 0x12, r0, 0x0) preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x0, 0x0) mmap(&(0x7f0000000000/0xa000)=nil, 0xa000, 0x2, 0x2172, 0xffffffffffffffff, 0x0) r1 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x11, 0x4, &(0x7f00000000c0)=@framed={{}, [@call={0x85, 0x0, 0x0, 0x7b}]}, &(0x7f00000001c0)='syzkaller\x00', 0x4, 0x8f, &(0x7f00000002c0)=""/143, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='ext4_es_lookup_extent_exit\x00', r1}, 0x10) r2 = socket$unix(0x1, 0x1, 0x0) bind$unix(r2, &(0x7f00000001c0)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x56) [ 340.231620][T15373] REISERFS warning (device loop0): super-6504 reiserfs_getopt: the option "nolargeio" requires an argument [ 340.231620][T15373] [ 340.242558][T15379] netlink: 20 bytes leftover after parsing attributes in process `syz-executor.2'. 06:18:57 executing program 1: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800004, 0x12, r0, 0x0) preadv(0xffffffffffffffff, &(0x7f00000001c0)=[{0x0}], 0x1, 0x9, 0x0) bpf$LINK_GET_FD_BY_ID(0x1e, &(0x7f0000000040)=0xffffffffffffffff, 0x4) 06:18:57 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000400)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000440)=ANY=[@ANYBLOB="3400000011000100000000000000000002000000"], 0x34}}, 0x0) 06:18:57 executing program 3: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800004, 0x12, r0, 0x0) preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x9, 0x0) mmap(&(0x7f0000000000/0xa000)=nil, 0xa000, 0x0, 0x2172, 0xffffffffffffffff, 0x0) r1 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x11, 0x4, &(0x7f00000000c0)=@framed={{}, [@call={0x85, 0x0, 0x0, 0x7b}]}, &(0x7f00000001c0)='syzkaller\x00', 0x4, 0x8f, &(0x7f00000002c0)=""/143, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='ext4_es_lookup_extent_exit\x00', r1}, 0x10) r2 = socket$unix(0x1, 0x1, 0x0) bind$unix(r2, &(0x7f00000001c0)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x56) 06:18:57 executing program 0: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800004, 0x12, r0, 0x0) preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x9, 0x0) mmap(&(0x7f0000000000/0xa000)=nil, 0xa000, 0x2, 0x2172, 0xffffffffffffffff, 0x0) syz_mount_image$reiserfs(&(0x7f0000000140), &(0x7f0000000180)='./file0\x00', 0x8000, 0x3, &(0x7f0000000300)=[{&(0x7f0000000540)="21d37ef07e82e237fbe1b40158d20e242c5ea1f9d9edc6b9395250085d6dfa486982e82d4ce1a5e2bc00d29383bae640de", 0x31, 0x7}, {&(0x7f0000000240)="c43f281f483aa6cd83e40e59d53f177299d285bbe5d90aab2b56a76f9db49d86afa5a0f601ba9b3502de5f3724f3ec00927151f928f668b362052950a2e8f16baec29875fdad59395e86a1050c368933e3ed5a17d76bd7bded793436ea207885f395ace3fc12126c205b170be392c1645233ef01f9661090706a65f63b4845dc2884a20711a8024ad4af44aeec9db33991dae38d95cdb7132970d0d4dec58b9d46d378", 0xa3, 0x6}, {&(0x7f0000000380)="05f82c760d277896dd8c9891a41aafe24124891a32a238c3c78696d112aa09f3ae5c54b0c08676da5db7f358c72dfaca9a5d90860b4ae363c9a921c47965d339c23408a6d9b31a23aee27822f0a140d8e4ec9475a740113f2b9923b46333110e528e0a513151aad34aee1b5310fcf62c1982349253003d6d53aebbe09cf5918668ee682be93b6a671bbc", 0x8a, 0x3}], 0x2000400, &(0x7f0000000440)={[{@balloc_no_unhash_reloc}, {@nolargeio}, {@grpjquota}], [{@obj_role={'obj_role', 0x3d, '^'}}, {@hash}, {@uid_lt}, {@mask={'mask', 0x3d, 'MAY_EXEC'}}, {@uid_lt={'uid<', 0xee00}}, {@smackfsfloor={'smackfsfloor', 0x3d, ':%#[@'}}, {@obj_user={'obj_user', 0x3d, ',\\*),i'}}, {@uid_eq={'uid', 0x3d, 0xee00}}, {@seclabel}, {@uid_lt={'uid<', 0xee00}}]}) 06:18:57 executing program 1: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800004, 0x12, r0, 0x0) preadv(0xffffffffffffffff, &(0x7f00000001c0)=[{0x0}], 0x1, 0x9, 0x0) bpf$LINK_GET_FD_BY_ID(0x1e, &(0x7f0000000040)=0xffffffffffffffff, 0x4) 06:18:57 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000400)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000440)=ANY=[], 0x34}}, 0x0) 06:18:58 executing program 3: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800004, 0x12, r0, 0x0) preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x9, 0x0) mmap(&(0x7f0000000000/0xa000)=nil, 0xa000, 0x0, 0x2172, 0xffffffffffffffff, 0x0) r1 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x11, 0x4, &(0x7f00000000c0)=@framed={{}, [@call={0x85, 0x0, 0x0, 0x7b}]}, &(0x7f00000001c0)='syzkaller\x00', 0x4, 0x8f, &(0x7f00000002c0)=""/143, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='ext4_es_lookup_extent_exit\x00', r1}, 0x10) r2 = socket$unix(0x1, 0x1, 0x0) bind$unix(r2, &(0x7f00000001c0)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x56) [ 340.416391][T15396] loop0: detected capacity change from 0 to 64 [ 340.434198][T15396] REISERFS warning (device loop0): super-6504 reiserfs_getopt: the option "nolargeio" requires an argument [ 340.434198][T15396] 06:18:58 executing program 1: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800004, 0x12, r0, 0x0) preadv(r0, 0x0, 0x0, 0x9, 0x0) bpf$LINK_GET_FD_BY_ID(0x1e, &(0x7f0000000040)=0xffffffffffffffff, 0x4) 06:18:58 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000400)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000440)=ANY=[], 0x34}}, 0x0) 06:18:58 executing program 3: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800004, 0x12, r0, 0x0) preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x9, 0x0) mmap(&(0x7f0000000000/0xa000)=nil, 0xa000, 0x0, 0x2172, 0xffffffffffffffff, 0x0) r1 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x11, 0x4, &(0x7f00000000c0)=@framed={{}, [@call={0x85, 0x0, 0x0, 0x7b}]}, &(0x7f00000001c0)='syzkaller\x00', 0x4, 0x8f, &(0x7f00000002c0)=""/143, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='ext4_es_lookup_extent_exit\x00', r1}, 0x10) r2 = socket$unix(0x1, 0x1, 0x0) bind$unix(r2, &(0x7f00000001c0)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x56) 06:18:58 executing program 1: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800004, 0x12, r0, 0x0) preadv(r0, 0x0, 0x0, 0x9, 0x0) bpf$LINK_GET_FD_BY_ID(0x1e, &(0x7f0000000040)=0xffffffffffffffff, 0x4) 06:18:58 executing program 0: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x9, 0x0) mmap(&(0x7f0000000000/0xa000)=nil, 0xa000, 0x2, 0x2172, 0xffffffffffffffff, 0x0) syz_mount_image$reiserfs(&(0x7f0000000140), &(0x7f0000000180)='./file0\x00', 0x8000, 0x3, &(0x7f0000000300)=[{&(0x7f0000000540)="21d37ef07e82e237fbe1b40158d20e242c5ea1f9d9edc6b9395250085d6dfa486982e82d4ce1a5e2bc00d29383bae640de", 0x31, 0x7}, {&(0x7f0000000240)="c43f281f483aa6cd83e40e59d53f177299d285bbe5d90aab2b56a76f9db49d86afa5a0f601ba9b3502de5f3724f3ec00927151f928f668b362052950a2e8f16baec29875fdad59395e86a1050c368933e3ed5a17d76bd7bded793436ea207885f395ace3fc12126c205b170be392c1645233ef01f9661090706a65f63b4845dc2884a20711a8024ad4af44aeec9db33991dae38d95cdb7132970d0d4dec58b9d46d378", 0xa3, 0x6}, {&(0x7f0000000380)="05f82c760d277896dd8c9891a41aafe24124891a32a238c3c78696d112aa09f3ae5c54b0c08676da5db7f358c72dfaca9a5d90860b4ae363c9a921c47965d339c23408a6d9b31a23aee27822f0a140d8e4ec9475a740113f2b9923b46333110e528e0a513151aad34aee1b5310fcf62c1982349253003d6d53aebbe09cf5918668ee682be93b6a671bbc", 0x8a, 0x3}], 0x2000400, &(0x7f0000000440)={[{@balloc_no_unhash_reloc}, {@nolargeio}, {@grpjquota}], [{@obj_role={'obj_role', 0x3d, '^'}}, {@hash}, {@uid_lt}, {@mask={'mask', 0x3d, 'MAY_EXEC'}}, {@uid_lt={'uid<', 0xee00}}, {@smackfsfloor={'smackfsfloor', 0x3d, ':%#[@'}}, {@obj_user={'obj_user', 0x3d, ',\\*),i'}}, {@uid_eq={'uid', 0x3d, 0xee00}}, {@seclabel}, {@uid_lt={'uid<', 0xee00}}]}) 06:18:58 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000400)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000440)=ANY=[], 0x34}}, 0x0) 06:18:58 executing program 3: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800004, 0x12, r0, 0x0) preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x9, 0x0) mmap(&(0x7f0000000000/0xa000)=nil, 0xa000, 0x2, 0x10, 0xffffffffffffffff, 0x0) r1 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x11, 0x4, &(0x7f00000000c0)=@framed={{}, [@call={0x85, 0x0, 0x0, 0x7b}]}, &(0x7f00000001c0)='syzkaller\x00', 0x4, 0x8f, &(0x7f00000002c0)=""/143, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='ext4_es_lookup_extent_exit\x00', r1}, 0x10) r2 = socket$unix(0x1, 0x1, 0x0) bind$unix(r2, &(0x7f00000001c0)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x56) [ 340.598030][T15417] loop0: detected capacity change from 0 to 64 06:18:58 executing program 1: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800004, 0x12, r0, 0x0) preadv(r0, 0x0, 0x0, 0x9, 0x0) bpf$LINK_GET_FD_BY_ID(0x1e, &(0x7f0000000040)=0xffffffffffffffff, 0x4) 06:18:58 executing program 3: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800004, 0x12, r0, 0x0) preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x9, 0x0) mmap(&(0x7f0000000000/0xa000)=nil, 0xa000, 0x2, 0x10, 0xffffffffffffffff, 0x0) r1 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x11, 0x4, &(0x7f00000000c0)=@framed={{}, [@call={0x85, 0x0, 0x0, 0x7b}]}, &(0x7f00000001c0)='syzkaller\x00', 0x4, 0x8f, &(0x7f00000002c0)=""/143, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='ext4_es_lookup_extent_exit\x00', r1}, 0x10) r2 = socket$unix(0x1, 0x1, 0x0) bind$unix(r2, &(0x7f00000001c0)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x56) [ 340.622849][T15417] REISERFS warning (device loop0): super-6504 reiserfs_getopt: the option "nolargeio" requires an argument [ 340.622849][T15417] 06:18:58 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000400)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000440)=ANY=[@ANYBLOB], 0x34}}, 0x0) 06:18:58 executing program 1: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800004, 0x12, r0, 0x0) preadv(r0, &(0x7f00000001c0), 0x0, 0x9, 0x0) bpf$LINK_GET_FD_BY_ID(0x1e, &(0x7f0000000040)=0xffffffffffffffff, 0x4) 06:18:58 executing program 3: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800004, 0x12, r0, 0x0) preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x9, 0x0) mmap(&(0x7f0000000000/0xa000)=nil, 0xa000, 0x2, 0x10, 0xffffffffffffffff, 0x0) r1 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x11, 0x4, &(0x7f00000000c0)=@framed={{}, [@call={0x85, 0x0, 0x0, 0x7b}]}, &(0x7f00000001c0)='syzkaller\x00', 0x4, 0x8f, &(0x7f00000002c0)=""/143, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='ext4_es_lookup_extent_exit\x00', r1}, 0x10) r2 = socket$unix(0x1, 0x1, 0x0) bind$unix(r2, &(0x7f00000001c0)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x56) 06:18:58 executing program 0: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x9, 0x0) mmap(&(0x7f0000000000/0xa000)=nil, 0xa000, 0x2, 0x2172, 0xffffffffffffffff, 0x0) syz_mount_image$reiserfs(&(0x7f0000000140), &(0x7f0000000180)='./file0\x00', 0x8000, 0x3, &(0x7f0000000300)=[{&(0x7f0000000540)="21d37ef07e82e237fbe1b40158d20e242c5ea1f9d9edc6b9395250085d6dfa486982e82d4ce1a5e2bc00d29383bae640de", 0x31, 0x7}, {&(0x7f0000000240)="c43f281f483aa6cd83e40e59d53f177299d285bbe5d90aab2b56a76f9db49d86afa5a0f601ba9b3502de5f3724f3ec00927151f928f668b362052950a2e8f16baec29875fdad59395e86a1050c368933e3ed5a17d76bd7bded793436ea207885f395ace3fc12126c205b170be392c1645233ef01f9661090706a65f63b4845dc2884a20711a8024ad4af44aeec9db33991dae38d95cdb7132970d0d4dec58b9d46d378", 0xa3, 0x6}, {&(0x7f0000000380)="05f82c760d277896dd8c9891a41aafe24124891a32a238c3c78696d112aa09f3ae5c54b0c08676da5db7f358c72dfaca9a5d90860b4ae363c9a921c47965d339c23408a6d9b31a23aee27822f0a140d8e4ec9475a740113f2b9923b46333110e528e0a513151aad34aee1b5310fcf62c1982349253003d6d53aebbe09cf5918668ee682be93b6a671bbc", 0x8a, 0x3}], 0x2000400, &(0x7f0000000440)={[{@balloc_no_unhash_reloc}, {@nolargeio}, {@grpjquota}], [{@obj_role={'obj_role', 0x3d, '^'}}, {@hash}, {@uid_lt}, {@mask={'mask', 0x3d, 'MAY_EXEC'}}, {@uid_lt={'uid<', 0xee00}}, {@smackfsfloor={'smackfsfloor', 0x3d, ':%#[@'}}, {@obj_user={'obj_user', 0x3d, ',\\*),i'}}, {@uid_eq={'uid', 0x3d, 0xee00}}, {@seclabel}, {@uid_lt={'uid<', 0xee00}}]}) 06:18:58 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000400)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000440)=ANY=[@ANYBLOB], 0x34}}, 0x0) 06:18:58 executing program 1: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800004, 0x12, r0, 0x0) preadv(r0, &(0x7f00000001c0), 0x0, 0x9, 0x0) bpf$LINK_GET_FD_BY_ID(0x1e, &(0x7f0000000040)=0xffffffffffffffff, 0x4) [ 340.791949][T15437] loop0: detected capacity change from 0 to 64 [ 340.811680][T15437] REISERFS warning (device loop0): super-6504 reiserfs_getopt: the option "nolargeio" requires an argument [ 340.811680][T15437] 06:18:58 executing program 3: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800004, 0x12, r0, 0x0) preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x9, 0x0) mmap(&(0x7f0000000000/0xa000)=nil, 0xa000, 0x2, 0x2172, 0xffffffffffffffff, 0x0) r1 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='ext4_es_lookup_extent_exit\x00', r1}, 0x10) r2 = socket$unix(0x1, 0x1, 0x0) bind$unix(r2, &(0x7f00000001c0)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x56) 06:18:58 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000400)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000440)=ANY=[@ANYBLOB], 0x34}}, 0x0) 06:18:58 executing program 1: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800004, 0x12, r0, 0x0) preadv(r0, &(0x7f00000001c0), 0x0, 0x9, 0x0) bpf$LINK_GET_FD_BY_ID(0x1e, &(0x7f0000000040)=0xffffffffffffffff, 0x4) 06:18:58 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000400)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000440)=ANY=[@ANYBLOB="34000000110001000000"], 0x34}}, 0x0) 06:18:58 executing program 1: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800004, 0x12, r0, 0x0) preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x0, 0x0) bpf$LINK_GET_FD_BY_ID(0x1e, &(0x7f0000000040)=0xffffffffffffffff, 0x4) 06:18:58 executing program 0: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x9, 0x0) mmap(&(0x7f0000000000/0xa000)=nil, 0xa000, 0x2, 0x2172, 0xffffffffffffffff, 0x0) syz_mount_image$reiserfs(&(0x7f0000000140), &(0x7f0000000180)='./file0\x00', 0x8000, 0x3, &(0x7f0000000300)=[{&(0x7f0000000540)="21d37ef07e82e237fbe1b40158d20e242c5ea1f9d9edc6b9395250085d6dfa486982e82d4ce1a5e2bc00d29383bae640de", 0x31, 0x7}, {&(0x7f0000000240)="c43f281f483aa6cd83e40e59d53f177299d285bbe5d90aab2b56a76f9db49d86afa5a0f601ba9b3502de5f3724f3ec00927151f928f668b362052950a2e8f16baec29875fdad59395e86a1050c368933e3ed5a17d76bd7bded793436ea207885f395ace3fc12126c205b170be392c1645233ef01f9661090706a65f63b4845dc2884a20711a8024ad4af44aeec9db33991dae38d95cdb7132970d0d4dec58b9d46d378", 0xa3, 0x6}, {&(0x7f0000000380)="05f82c760d277896dd8c9891a41aafe24124891a32a238c3c78696d112aa09f3ae5c54b0c08676da5db7f358c72dfaca9a5d90860b4ae363c9a921c47965d339c23408a6d9b31a23aee27822f0a140d8e4ec9475a740113f2b9923b46333110e528e0a513151aad34aee1b5310fcf62c1982349253003d6d53aebbe09cf5918668ee682be93b6a671bbc", 0x8a, 0x3}], 0x2000400, &(0x7f0000000440)={[{@balloc_no_unhash_reloc}, {@nolargeio}, {@grpjquota}], [{@obj_role={'obj_role', 0x3d, '^'}}, {@hash}, {@uid_lt}, {@mask={'mask', 0x3d, 'MAY_EXEC'}}, {@uid_lt={'uid<', 0xee00}}, {@smackfsfloor={'smackfsfloor', 0x3d, ':%#[@'}}, {@obj_user={'obj_user', 0x3d, ',\\*),i'}}, {@uid_eq={'uid', 0x3d, 0xee00}}, {@seclabel}, {@uid_lt={'uid<', 0xee00}}]}) 06:18:58 executing program 3: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800004, 0x12, r0, 0x0) preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x9, 0x0) mmap(&(0x7f0000000000/0xa000)=nil, 0xa000, 0x2, 0x2172, 0xffffffffffffffff, 0x0) r1 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='ext4_es_lookup_extent_exit\x00', r1}, 0x10) r2 = socket$unix(0x1, 0x1, 0x0) bind$unix(r2, &(0x7f00000001c0)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x56) 06:18:58 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000400)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000440)=ANY=[@ANYBLOB], 0x34}}, 0x0) 06:18:58 executing program 1: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800004, 0x12, r0, 0x0) preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x0, 0x0) bpf$LINK_GET_FD_BY_ID(0x1e, &(0x7f0000000040)=0xffffffffffffffff, 0x4) 06:18:58 executing program 3: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800004, 0x12, r0, 0x0) preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x9, 0x0) mmap(&(0x7f0000000000/0xa000)=nil, 0xa000, 0x2, 0x2172, 0xffffffffffffffff, 0x0) r1 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='ext4_es_lookup_extent_exit\x00', r1}, 0x10) r2 = socket$unix(0x1, 0x1, 0x0) bind$unix(r2, &(0x7f00000001c0)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x56) [ 341.008905][T15457] loop0: detected capacity change from 0 to 64 [ 341.020951][T15457] REISERFS warning (device loop0): super-6504 reiserfs_getopt: the option "nolargeio" requires an argument 06:18:58 executing program 1: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800004, 0x12, r0, 0x0) preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x0, 0x0) bpf$LINK_GET_FD_BY_ID(0x1e, &(0x7f0000000040)=0xffffffffffffffff, 0x4) [ 341.020951][T15457] 06:18:58 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000400)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000440)=ANY=[@ANYBLOB], 0x34}}, 0x0) 06:18:58 executing program 1: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800004, 0x12, r0, 0x0) preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x9, 0x0) bpf$LINK_GET_FD_BY_ID(0x1e, 0x0, 0x0) 06:18:58 executing program 0: mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800004, 0x12, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f00000001c0)=[{0x0}], 0x1, 0x9, 0x0) mmap(&(0x7f0000000000/0xa000)=nil, 0xa000, 0x2, 0x2172, 0xffffffffffffffff, 0x0) syz_mount_image$reiserfs(&(0x7f0000000140), &(0x7f0000000180)='./file0\x00', 0x8000, 0x3, &(0x7f0000000300)=[{&(0x7f0000000540)="21d37ef07e82e237fbe1b40158d20e242c5ea1f9d9edc6b9395250085d6dfa486982e82d4ce1a5e2bc00d29383bae640de", 0x31, 0x7}, {&(0x7f0000000240)="c43f281f483aa6cd83e40e59d53f177299d285bbe5d90aab2b56a76f9db49d86afa5a0f601ba9b3502de5f3724f3ec00927151f928f668b362052950a2e8f16baec29875fdad59395e86a1050c368933e3ed5a17d76bd7bded793436ea207885f395ace3fc12126c205b170be392c1645233ef01f9661090706a65f63b4845dc2884a20711a8024ad4af44aeec9db33991dae38d95cdb7132970d0d4dec58b9d46d378", 0xa3, 0x6}, {&(0x7f0000000380)="05f82c760d277896dd8c9891a41aafe24124891a32a238c3c78696d112aa09f3ae5c54b0c08676da5db7f358c72dfaca9a5d90860b4ae363c9a921c47965d339c23408a6d9b31a23aee27822f0a140d8e4ec9475a740113f2b9923b46333110e528e0a513151aad34aee1b5310fcf62c1982349253003d6d53aebbe09cf5918668ee682be93b6a671bbc", 0x8a, 0x3}], 0x2000400, &(0x7f0000000440)={[{@balloc_no_unhash_reloc}, {@nolargeio}, {@grpjquota}], [{@obj_role={'obj_role', 0x3d, '^'}}, {@hash}, {@uid_lt}, {@mask={'mask', 0x3d, 'MAY_EXEC'}}, {@uid_lt={'uid<', 0xee00}}, {@smackfsfloor={'smackfsfloor', 0x3d, ':%#[@'}}, {@obj_user={'obj_user', 0x3d, ',\\*),i'}}, {@uid_eq={'uid', 0x3d, 0xee00}}, {@seclabel}, {@uid_lt={'uid<', 0xee00}}]}) 06:18:58 executing program 3: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800004, 0x12, r0, 0x0) preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x9, 0x0) mmap(&(0x7f0000000000/0xa000)=nil, 0xa000, 0x2, 0x2172, 0xffffffffffffffff, 0x0) r1 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x0, 0x4, &(0x7f00000000c0)=@framed={{}, [@call={0x85, 0x0, 0x0, 0x7b}]}, &(0x7f00000001c0)='syzkaller\x00', 0x4, 0x8f, &(0x7f00000002c0)=""/143, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='ext4_es_lookup_extent_exit\x00', r1}, 0x10) r2 = socket$unix(0x1, 0x1, 0x0) bind$unix(r2, &(0x7f00000001c0)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x56) 06:18:58 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000400)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000440)=ANY=[@ANYBLOB], 0x34}}, 0x0) 06:18:58 executing program 1: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x9, 0x0) mmap(&(0x7f0000000000/0xa000)=nil, 0xa000, 0x2, 0x2172, 0xffffffffffffffff, 0x0) syz_mount_image$reiserfs(&(0x7f0000000140), &(0x7f0000000180)='./file0\x00', 0x8000, 0x3, &(0x7f0000000300)=[{&(0x7f0000000540)="21d37ef07e82e237fbe1b40158d20e242c5ea1f9d9edc6b9395250085d6dfa486982e82d4ce1a5e2bc00d29383bae640de", 0x31, 0x7}, {&(0x7f0000000240)="c43f281f483aa6cd83e40e59d53f177299d285bbe5d90aab2b56a76f9db49d86afa5a0f601ba9b3502de5f3724f3ec00927151f928f668b362052950a2e8f16baec29875fdad59395e86a1050c368933e3ed5a17d76bd7bded793436ea207885f395ace3fc12126c205b170be392c1645233ef01f9661090706a65f63b4845dc2884a20711a8024ad4af44aeec9db33991dae38d95cdb7132970d0d4dec58b9d46d378", 0xa3, 0x6}, {&(0x7f0000000380)="05f82c760d277896dd8c9891a41aafe24124891a32a238c3c78696d112aa09f3ae5c54b0c08676da5db7f358c72dfaca9a5d90860b4ae363c9a921c47965d339c23408a6d9b31a23aee27822f0a140d8e4ec9475a740113f2b9923b46333110e528e0a513151aad34aee1b5310fcf62c1982349253003d6d53aebbe09cf5918668ee682be93b6a671bbc", 0x8a, 0x3}], 0x2000400, &(0x7f0000000440)={[{@balloc_no_unhash_reloc}, {@nolargeio}, {@grpjquota}], [{@obj_role={'obj_role', 0x3d, '^'}}, {@hash}, {@uid_lt}, {@mask={'mask', 0x3d, 'MAY_EXEC'}}, {@uid_lt={'uid<', 0xee00}}, {@smackfsfloor={'smackfsfloor', 0x3d, ':%#[@'}}, {@obj_user={'obj_user', 0x3d, ',\\*),i'}}, {@uid_eq={'uid', 0x3d, 0xee00}}, {@seclabel}, {@uid_lt={'uid<', 0xee00}}]}) [ 341.167556][T15477] loop0: detected capacity change from 0 to 64 [ 341.194441][T15482] loop1: detected capacity change from 0 to 64 06:18:58 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000400)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000440)=ANY=[@ANYBLOB="3400000011"], 0x34}}, 0x0) 06:18:58 executing program 3: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800004, 0x12, r0, 0x0) preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x9, 0x0) mmap(&(0x7f0000000000/0xa000)=nil, 0xa000, 0x2, 0x2172, 0xffffffffffffffff, 0x0) r1 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x0, 0x4, &(0x7f00000000c0)=@framed={{}, [@call={0x85, 0x0, 0x0, 0x7b}]}, &(0x7f00000001c0)='syzkaller\x00', 0x4, 0x8f, &(0x7f00000002c0)=""/143, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='ext4_es_lookup_extent_exit\x00', r1}, 0x10) r2 = socket$unix(0x1, 0x1, 0x0) bind$unix(r2, &(0x7f00000001c0)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x56) [ 341.212830][T15482] REISERFS warning (device loop1): super-6504 reiserfs_getopt: the option "nolargeio" requires an argument [ 341.212830][T15482] [ 341.238512][T15477] REISERFS warning (device loop0): super-6504 reiserfs_getopt: the option "nolargeio" requires an argument [ 341.238512][T15477] 06:18:58 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000400)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000440)=ANY=[@ANYBLOB="3400000011"], 0x34}}, 0x0) 06:18:58 executing program 3: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800004, 0x12, r0, 0x0) preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x9, 0x0) mmap(&(0x7f0000000000/0xa000)=nil, 0xa000, 0x2, 0x2172, 0xffffffffffffffff, 0x0) r1 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x0, 0x4, &(0x7f00000000c0)=@framed={{}, [@call={0x85, 0x0, 0x0, 0x7b}]}, &(0x7f00000001c0)='syzkaller\x00', 0x4, 0x8f, &(0x7f00000002c0)=""/143, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='ext4_es_lookup_extent_exit\x00', r1}, 0x10) r2 = socket$unix(0x1, 0x1, 0x0) bind$unix(r2, &(0x7f00000001c0)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x56) 06:18:58 executing program 0: mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800004, 0x12, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f00000001c0)=[{0x0}], 0x1, 0x9, 0x0) mmap(&(0x7f0000000000/0xa000)=nil, 0xa000, 0x2, 0x2172, 0xffffffffffffffff, 0x0) syz_mount_image$reiserfs(&(0x7f0000000140), &(0x7f0000000180)='./file0\x00', 0x8000, 0x3, &(0x7f0000000300)=[{&(0x7f0000000540)="21d37ef07e82e237fbe1b40158d20e242c5ea1f9d9edc6b9395250085d6dfa486982e82d4ce1a5e2bc00d29383bae640de", 0x31, 0x7}, {&(0x7f0000000240)="c43f281f483aa6cd83e40e59d53f177299d285bbe5d90aab2b56a76f9db49d86afa5a0f601ba9b3502de5f3724f3ec00927151f928f668b362052950a2e8f16baec29875fdad59395e86a1050c368933e3ed5a17d76bd7bded793436ea207885f395ace3fc12126c205b170be392c1645233ef01f9661090706a65f63b4845dc2884a20711a8024ad4af44aeec9db33991dae38d95cdb7132970d0d4dec58b9d46d378", 0xa3, 0x6}, {&(0x7f0000000380)="05f82c760d277896dd8c9891a41aafe24124891a32a238c3c78696d112aa09f3ae5c54b0c08676da5db7f358c72dfaca9a5d90860b4ae363c9a921c47965d339c23408a6d9b31a23aee27822f0a140d8e4ec9475a740113f2b9923b46333110e528e0a513151aad34aee1b5310fcf62c1982349253003d6d53aebbe09cf5918668ee682be93b6a671bbc", 0x8a, 0x3}], 0x2000400, &(0x7f0000000440)={[{@balloc_no_unhash_reloc}, {@nolargeio}, {@grpjquota}], [{@obj_role={'obj_role', 0x3d, '^'}}, {@hash}, {@uid_lt}, {@mask={'mask', 0x3d, 'MAY_EXEC'}}, {@uid_lt={'uid<', 0xee00}}, {@smackfsfloor={'smackfsfloor', 0x3d, ':%#[@'}}, {@obj_user={'obj_user', 0x3d, ',\\*),i'}}, {@uid_eq={'uid', 0x3d, 0xee00}}, {@seclabel}, {@uid_lt={'uid<', 0xee00}}]}) 06:18:58 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000400)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000440)=ANY=[@ANYBLOB="3400000011"], 0x34}}, 0x0) 06:18:58 executing program 1: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800004, 0x12, r0, 0x0) preadv(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)=""/179, 0xb3}], 0x1, 0x3, 0xaee) mmap(&(0x7f0000000000/0xa000)=nil, 0xa000, 0x2, 0x2172, 0xffffffffffffffff, 0x0) syz_mount_image$reiserfs(&(0x7f0000000140), &(0x7f0000000180)='./file0\x00', 0x8000, 0x3, &(0x7f0000000300)=[{&(0x7f0000000540)="21d37ef07e82e237fbe1b40158d20e242c5ea1f9d9edc6b9395250085d6dfa486982e82d4ce1a5e2bc00d29383bae640de", 0x31, 0x7}, {&(0x7f0000000240)="c43f281f483aa6cd83e40e59d53f177299d285bbe5d90aab2b56a76f9db49d86afa5a0f601ba9b3502de5f3724f3ec00927151f928f668b362052950a2e8f16baec29875fdad59395e86a1050c368933e3ed5a17d76bd7bded793436ea207885f395ace3fc12126c205b170be392c1645233ef01f9661090706a65f63b4845dc2884a20711a8024ad4af44aeec9db33991dae38d95cdb7132970d0d4dec58b9d46d378", 0xa3, 0x6}, {&(0x7f0000000380)="05f82c760d277896dd8c9891a41aafe24124891a32a238c3c78696d112aa09f3ae5c54b0c08676da5db7f358c72dfaca9a5d90860b4ae363c9a921c47965d339c23408a6d9b31a23aee27822f0a140d8e4ec9475a740113f2b9923b46333110e528e0a513151aad34aee1b5310fcf62c1982349253003d6d53aebbe09cf5918668ee682be93b6a671bbc", 0x8a, 0x3}], 0x2000400, &(0x7f0000000440)={[{@balloc_no_unhash_reloc}, {@nolargeio}, {@grpjquota}], [{@obj_role={'obj_role', 0x3d, '^'}}, {@hash}, {@uid_lt}, {@mask={'mask', 0x3d, 'MAY_EXEC'}}, {@uid_lt={'uid<', 0xee00}}, {@smackfsfloor={'smackfsfloor', 0x3d, ':%#[@'}}, {@obj_user={'obj_user', 0x3d, ',\\*),i'}}, {@uid_eq={'uid', 0x3d, 0xee00}}, {@seclabel}, {@uid_lt={'uid<', 0xee00}}]}) 06:18:58 executing program 3: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800004, 0x12, r0, 0x0) preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x9, 0x0) mmap(&(0x7f0000000000/0xa000)=nil, 0xa000, 0x2, 0x2172, 0xffffffffffffffff, 0x0) r1 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x11, 0x0, 0x0, &(0x7f00000001c0)='syzkaller\x00', 0x4, 0x8f, &(0x7f00000002c0)=""/143, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x74) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='ext4_es_lookup_extent_exit\x00', r1}, 0x10) r2 = socket$unix(0x1, 0x1, 0x0) bind$unix(r2, &(0x7f00000001c0)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x56) [ 341.416581][T15504] loop1: detected capacity change from 0 to 64 [ 341.431016][T15504] REISERFS warning (device loop1): super-6504 reiserfs_getopt: the option "nolargeio" requires an argument [ 341.431016][T15504] 06:18:59 executing program 3: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800004, 0x12, r0, 0x0) preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x9, 0x0) mmap(&(0x7f0000000000/0xa000)=nil, 0xa000, 0x2, 0x2172, 0xffffffffffffffff, 0x0) r1 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x11, 0x0, 0x0, &(0x7f00000001c0)='syzkaller\x00', 0x4, 0x8f, &(0x7f00000002c0)=""/143, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x74) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='ext4_es_lookup_extent_exit\x00', r1}, 0x10) r2 = socket$unix(0x1, 0x1, 0x0) bind$unix(r2, &(0x7f00000001c0)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x56) 06:18:59 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000400)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000440)=ANY=[@ANYBLOB="3400000011000100"], 0x34}}, 0x0) [ 341.454119][T15506] loop0: detected capacity change from 0 to 64 [ 341.485432][T15506] REISERFS warning (device loop0): super-6504 reiserfs_getopt: the option "nolargeio" requires an argument [ 341.485432][T15506] 06:18:59 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000400)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000440)=ANY=[@ANYBLOB="340000001100"], 0x34}}, 0x0) 06:18:59 executing program 3: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800004, 0x12, r0, 0x0) preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x9, 0x0) mmap(&(0x7f0000000000/0xa000)=nil, 0xa000, 0x2, 0x2172, 0xffffffffffffffff, 0x0) r1 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x11, 0x0, 0x0, &(0x7f00000001c0)='syzkaller\x00', 0x4, 0x8f, &(0x7f00000002c0)=""/143, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x74) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='ext4_es_lookup_extent_exit\x00', r1}, 0x10) r2 = socket$unix(0x1, 0x1, 0x0) bind$unix(r2, &(0x7f00000001c0)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x56) 06:18:59 executing program 0: mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800004, 0x12, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f00000001c0)=[{0x0}], 0x1, 0x9, 0x0) mmap(&(0x7f0000000000/0xa000)=nil, 0xa000, 0x2, 0x2172, 0xffffffffffffffff, 0x0) syz_mount_image$reiserfs(&(0x7f0000000140), &(0x7f0000000180)='./file0\x00', 0x8000, 0x3, &(0x7f0000000300)=[{&(0x7f0000000540)="21d37ef07e82e237fbe1b40158d20e242c5ea1f9d9edc6b9395250085d6dfa486982e82d4ce1a5e2bc00d29383bae640de", 0x31, 0x7}, {&(0x7f0000000240)="c43f281f483aa6cd83e40e59d53f177299d285bbe5d90aab2b56a76f9db49d86afa5a0f601ba9b3502de5f3724f3ec00927151f928f668b362052950a2e8f16baec29875fdad59395e86a1050c368933e3ed5a17d76bd7bded793436ea207885f395ace3fc12126c205b170be392c1645233ef01f9661090706a65f63b4845dc2884a20711a8024ad4af44aeec9db33991dae38d95cdb7132970d0d4dec58b9d46d378", 0xa3, 0x6}, {&(0x7f0000000380)="05f82c760d277896dd8c9891a41aafe24124891a32a238c3c78696d112aa09f3ae5c54b0c08676da5db7f358c72dfaca9a5d90860b4ae363c9a921c47965d339c23408a6d9b31a23aee27822f0a140d8e4ec9475a740113f2b9923b46333110e528e0a513151aad34aee1b5310fcf62c1982349253003d6d53aebbe09cf5918668ee682be93b6a671bbc", 0x8a, 0x3}], 0x2000400, &(0x7f0000000440)={[{@balloc_no_unhash_reloc}, {@nolargeio}, {@grpjquota}], [{@obj_role={'obj_role', 0x3d, '^'}}, {@hash}, {@uid_lt}, {@mask={'mask', 0x3d, 'MAY_EXEC'}}, {@uid_lt={'uid<', 0xee00}}, {@smackfsfloor={'smackfsfloor', 0x3d, ':%#[@'}}, {@obj_user={'obj_user', 0x3d, ',\\*),i'}}, {@uid_eq={'uid', 0x3d, 0xee00}}, {@seclabel}, {@uid_lt={'uid<', 0xee00}}]}) 06:18:59 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000400)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000440)=ANY=[@ANYBLOB="340000001100"], 0x34}}, 0x0) 06:18:59 executing program 3: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800004, 0x12, r0, 0x0) preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x9, 0x0) mmap(&(0x7f0000000000/0xa000)=nil, 0xa000, 0x2, 0x2172, 0xffffffffffffffff, 0x0) r1 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x11, 0x3, &(0x7f00000000c0)=@framed, &(0x7f00000001c0)='syzkaller\x00', 0x4, 0x8f, &(0x7f00000002c0)=""/143, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x74) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='ext4_es_lookup_extent_exit\x00', r1}, 0x10) r2 = socket$unix(0x1, 0x1, 0x0) bind$unix(r2, &(0x7f00000001c0)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x56) 06:18:59 executing program 1: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800004, 0x12, r0, 0x0) preadv(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)=""/179, 0xb3}], 0x1, 0x3, 0xaee) mmap(&(0x7f0000000000/0xa000)=nil, 0xa000, 0x2, 0x2172, 0xffffffffffffffff, 0x0) syz_mount_image$reiserfs(&(0x7f0000000140), &(0x7f0000000180)='./file0\x00', 0x8000, 0x3, &(0x7f0000000300)=[{&(0x7f0000000540)="21d37ef07e82e237fbe1b40158d20e242c5ea1f9d9edc6b9395250085d6dfa486982e82d4ce1a5e2bc00d29383bae640de", 0x31, 0x7}, {&(0x7f0000000240)="c43f281f483aa6cd83e40e59d53f177299d285bbe5d90aab2b56a76f9db49d86afa5a0f601ba9b3502de5f3724f3ec00927151f928f668b362052950a2e8f16baec29875fdad59395e86a1050c368933e3ed5a17d76bd7bded793436ea207885f395ace3fc12126c205b170be392c1645233ef01f9661090706a65f63b4845dc2884a20711a8024ad4af44aeec9db33991dae38d95cdb7132970d0d4dec58b9d46d378", 0xa3, 0x6}, {&(0x7f0000000380)="05f82c760d277896dd8c9891a41aafe24124891a32a238c3c78696d112aa09f3ae5c54b0c08676da5db7f358c72dfaca9a5d90860b4ae363c9a921c47965d339c23408a6d9b31a23aee27822f0a140d8e4ec9475a740113f2b9923b46333110e528e0a513151aad34aee1b5310fcf62c1982349253003d6d53aebbe09cf5918668ee682be93b6a671bbc", 0x8a, 0x3}], 0x2000400, &(0x7f0000000440)={[{@balloc_no_unhash_reloc}, {@nolargeio}, {@grpjquota}], [{@obj_role={'obj_role', 0x3d, '^'}}, {@hash}, {@uid_lt}, {@mask={'mask', 0x3d, 'MAY_EXEC'}}, {@uid_lt={'uid<', 0xee00}}, {@smackfsfloor={'smackfsfloor', 0x3d, ':%#[@'}}, {@obj_user={'obj_user', 0x3d, ',\\*),i'}}, {@uid_eq={'uid', 0x3d, 0xee00}}, {@seclabel}, {@uid_lt={'uid<', 0xee00}}]}) 06:18:59 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000400)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000440)=ANY=[@ANYBLOB="340000001100"], 0x34}}, 0x0) [ 341.648677][T15529] loop1: detected capacity change from 0 to 64 [ 341.670253][T15530] loop0: detected capacity change from 0 to 64 [ 341.682980][T15529] REISERFS warning (device loop1): super-6504 reiserfs_getopt: the option "nolargeio" requires an argument [ 341.682980][T15529] [ 341.697396][T15530] REISERFS warning (device loop0): super-6504 reiserfs_getopt: the option "nolargeio" requires an argument [ 341.697396][T15530] 06:18:59 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000400)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000440)=ANY=[@ANYBLOB="34000000110001"], 0x34}}, 0x0) 06:18:59 executing program 3: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800004, 0x12, r0, 0x0) preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x9, 0x0) mmap(&(0x7f0000000000/0xa000)=nil, 0xa000, 0x2, 0x2172, 0xffffffffffffffff, 0x0) r1 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x11, 0x3, &(0x7f00000000c0)=@framed, 0x0, 0x4, 0x8f, &(0x7f00000002c0)=""/143, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x74) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='ext4_es_lookup_extent_exit\x00', r1}, 0x10) r2 = socket$unix(0x1, 0x1, 0x0) bind$unix(r2, &(0x7f00000001c0)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x56) 06:18:59 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000400)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000440)=ANY=[@ANYBLOB="340000001100"], 0x34}}, 0x0) 06:18:59 executing program 0: r0 = openat(0xffffffffffffffff, 0x0, 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800004, 0x12, r0, 0x0) preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x9, 0x0) mmap(&(0x7f0000000000/0xa000)=nil, 0xa000, 0x2, 0x2172, 0xffffffffffffffff, 0x0) syz_mount_image$reiserfs(&(0x7f0000000140), &(0x7f0000000180)='./file0\x00', 0x8000, 0x3, &(0x7f0000000300)=[{&(0x7f0000000540)="21d37ef07e82e237fbe1b40158d20e242c5ea1f9d9edc6b9395250085d6dfa486982e82d4ce1a5e2bc00d29383bae640de", 0x31, 0x7}, {&(0x7f0000000240)="c43f281f483aa6cd83e40e59d53f177299d285bbe5d90aab2b56a76f9db49d86afa5a0f601ba9b3502de5f3724f3ec00927151f928f668b362052950a2e8f16baec29875fdad59395e86a1050c368933e3ed5a17d76bd7bded793436ea207885f395ace3fc12126c205b170be392c1645233ef01f9661090706a65f63b4845dc2884a20711a8024ad4af44aeec9db33991dae38d95cdb7132970d0d4dec58b9d46d378", 0xa3, 0x6}, {&(0x7f0000000380)="05f82c760d277896dd8c9891a41aafe24124891a32a238c3c78696d112aa09f3ae5c54b0c08676da5db7f358c72dfaca9a5d90860b4ae363c9a921c47965d339c23408a6d9b31a23aee27822f0a140d8e4ec9475a740113f2b9923b46333110e528e0a513151aad34aee1b5310fcf62c1982349253003d6d53aebbe09cf5918668ee682be93b6a671bbc", 0x8a, 0x3}], 0x2000400, &(0x7f0000000440)={[{@balloc_no_unhash_reloc}, {@nolargeio}, {@grpjquota}], [{@obj_role={'obj_role', 0x3d, '^'}}, {@hash}, {@uid_lt}, {@mask={'mask', 0x3d, 'MAY_EXEC'}}, {@uid_lt={'uid<', 0xee00}}, {@smackfsfloor={'smackfsfloor', 0x3d, ':%#[@'}}, {@obj_user={'obj_user', 0x3d, ',\\*),i'}}, {@uid_eq={'uid', 0x3d, 0xee00}}, {@seclabel}, {@uid_lt={'uid<', 0xee00}}]}) 06:18:59 executing program 1: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800004, 0x12, r0, 0x0) preadv(r0, &(0x7f00000001c0), 0x0, 0x9, 0x0) mmap(&(0x7f0000000000/0xa000)=nil, 0xa000, 0x2, 0x2172, 0xffffffffffffffff, 0x0) r1 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x11, 0x4, &(0x7f00000000c0)=@framed={{}, [@call={0x85, 0x0, 0x0, 0x7b}]}, &(0x7f00000001c0)='syzkaller\x00', 0x4, 0x8f, &(0x7f00000002c0)=""/143, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='ext4_es_lookup_extent_exit\x00', r1}, 0x10) r2 = socket$unix(0x1, 0x1, 0x0) bind$unix(r2, &(0x7f00000001c0)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x56) 06:18:59 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000400)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000440)=ANY=[@ANYBLOB="340000001100"], 0x34}}, 0x0) 06:18:59 executing program 3: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800004, 0x12, r0, 0x0) preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x9, 0x0) mmap(&(0x7f0000000000/0xa000)=nil, 0xa000, 0x2, 0x2172, 0xffffffffffffffff, 0x0) r1 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x11, 0x3, &(0x7f00000000c0)=@framed, 0x0, 0x4, 0x8f, &(0x7f00000002c0)=""/143, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x74) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='ext4_es_lookup_extent_exit\x00', r1}, 0x10) r2 = socket$unix(0x1, 0x1, 0x0) bind$unix(r2, &(0x7f00000001c0)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x56) [ 341.886088][T15551] loop0: detected capacity change from 0 to 64 06:18:59 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000400)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000440)=ANY=[@ANYBLOB="340000001100"], 0x34}}, 0x0) [ 341.908702][T15551] REISERFS warning (device loop0): super-6504 reiserfs_getopt: the option "nolargeio" requires an argument [ 341.908702][T15551] 06:18:59 executing program 3: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800004, 0x12, r0, 0x0) preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x9, 0x0) mmap(&(0x7f0000000000/0xa000)=nil, 0xa000, 0x2, 0x2172, 0xffffffffffffffff, 0x0) r1 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x11, 0x3, &(0x7f00000000c0)=@framed, 0x0, 0x4, 0x8f, &(0x7f00000002c0)=""/143, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x74) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='ext4_es_lookup_extent_exit\x00', r1}, 0x10) r2 = socket$unix(0x1, 0x1, 0x0) bind$unix(r2, &(0x7f00000001c0)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x56) 06:18:59 executing program 1: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800004, 0x12, r0, 0x0) preadv(r0, 0x0, 0x0, 0x9, 0x0) mmap(&(0x7f0000000000/0xa000)=nil, 0xa000, 0x2, 0x2172, 0xffffffffffffffff, 0x0) r1 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x11, 0x4, &(0x7f00000000c0)=@framed={{}, [@call={0x85, 0x0, 0x0, 0x7b}]}, &(0x7f00000001c0)='syzkaller\x00', 0x4, 0x8f, &(0x7f00000002c0)=""/143, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='ext4_es_lookup_extent_exit\x00', r1}, 0x10) r2 = socket$unix(0x1, 0x1, 0x0) bind$unix(r2, &(0x7f00000001c0)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x56) 06:18:59 executing program 2: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800004, 0x12, r0, 0x0) preadv(r0, 0x0, 0x0, 0x9, 0x0) mmap(&(0x7f0000000000/0xa000)=nil, 0xa000, 0x2, 0x2172, 0xffffffffffffffff, 0x0) r1 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x11, 0x4, &(0x7f00000000c0)=@framed={{}, [@call={0x85, 0x0, 0x0, 0x7b}]}, &(0x7f00000001c0)='syzkaller\x00', 0x4, 0x8f, &(0x7f00000002c0)=""/143, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='ext4_es_lookup_extent_exit\x00', r1}, 0x10) r2 = socket$unix(0x1, 0x1, 0x0) bind$unix(r2, &(0x7f00000001c0)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x56) 06:18:59 executing program 0: r0 = openat(0xffffffffffffffff, 0x0, 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800004, 0x12, r0, 0x0) preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x9, 0x0) mmap(&(0x7f0000000000/0xa000)=nil, 0xa000, 0x2, 0x2172, 0xffffffffffffffff, 0x0) syz_mount_image$reiserfs(&(0x7f0000000140), &(0x7f0000000180)='./file0\x00', 0x8000, 0x3, &(0x7f0000000300)=[{&(0x7f0000000540)="21d37ef07e82e237fbe1b40158d20e242c5ea1f9d9edc6b9395250085d6dfa486982e82d4ce1a5e2bc00d29383bae640de", 0x31, 0x7}, {&(0x7f0000000240)="c43f281f483aa6cd83e40e59d53f177299d285bbe5d90aab2b56a76f9db49d86afa5a0f601ba9b3502de5f3724f3ec00927151f928f668b362052950a2e8f16baec29875fdad59395e86a1050c368933e3ed5a17d76bd7bded793436ea207885f395ace3fc12126c205b170be392c1645233ef01f9661090706a65f63b4845dc2884a20711a8024ad4af44aeec9db33991dae38d95cdb7132970d0d4dec58b9d46d378", 0xa3, 0x6}, {&(0x7f0000000380)="05f82c760d277896dd8c9891a41aafe24124891a32a238c3c78696d112aa09f3ae5c54b0c08676da5db7f358c72dfaca9a5d90860b4ae363c9a921c47965d339c23408a6d9b31a23aee27822f0a140d8e4ec9475a740113f2b9923b46333110e528e0a513151aad34aee1b5310fcf62c1982349253003d6d53aebbe09cf5918668ee682be93b6a671bbc", 0x8a, 0x3}], 0x2000400, &(0x7f0000000440)={[{@balloc_no_unhash_reloc}, {@nolargeio}, {@grpjquota}], [{@obj_role={'obj_role', 0x3d, '^'}}, {@hash}, {@uid_lt}, {@mask={'mask', 0x3d, 'MAY_EXEC'}}, {@uid_lt={'uid<', 0xee00}}, {@smackfsfloor={'smackfsfloor', 0x3d, ':%#[@'}}, {@obj_user={'obj_user', 0x3d, ',\\*),i'}}, {@uid_eq={'uid', 0x3d, 0xee00}}, {@seclabel}, {@uid_lt={'uid<', 0xee00}}]}) 06:18:59 executing program 3: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800004, 0x12, r0, 0x0) preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x9, 0x0) mmap(&(0x7f0000000000/0xa000)=nil, 0xa000, 0x2, 0x2172, 0xffffffffffffffff, 0x0) r1 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x11, 0x3, &(0x7f00000000c0)=@framed, &(0x7f00000001c0)='syzkaller\x00', 0x0, 0x8f, &(0x7f00000002c0)=""/143, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x74) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='ext4_es_lookup_extent_exit\x00', r1}, 0x10) r2 = socket$unix(0x1, 0x1, 0x0) bind$unix(r2, &(0x7f00000001c0)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x56) 06:18:59 executing program 2: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800004, 0x12, r0, 0x0) preadv(r0, 0x0, 0x0, 0x9, 0x0) mmap(&(0x7f0000000000/0xa000)=nil, 0xa000, 0x2, 0x2172, 0xffffffffffffffff, 0x0) r1 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x11, 0x4, &(0x7f00000000c0)=@framed={{}, [@call={0x85, 0x0, 0x0, 0x7b}]}, &(0x7f00000001c0)='syzkaller\x00', 0x4, 0x8f, &(0x7f00000002c0)=""/143, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='ext4_es_lookup_extent_exit\x00', r1}, 0x10) r2 = socket$unix(0x1, 0x1, 0x0) bind$unix(r2, &(0x7f00000001c0)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x56) 06:18:59 executing program 3: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800004, 0x12, r0, 0x0) preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x9, 0x0) mmap(&(0x7f0000000000/0xa000)=nil, 0xa000, 0x2, 0x2172, 0xffffffffffffffff, 0x0) r1 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x11, 0x3, &(0x7f00000000c0)=@framed, &(0x7f00000001c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x74) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='ext4_es_lookup_extent_exit\x00', r1}, 0x10) r2 = socket$unix(0x1, 0x1, 0x0) bind$unix(r2, &(0x7f00000001c0)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x56) 06:18:59 executing program 1: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800004, 0x12, r0, 0x0) preadv(0xffffffffffffffff, &(0x7f00000001c0)=[{0x0}], 0x1, 0x9, 0x0) mmap(&(0x7f0000000000/0xa000)=nil, 0xa000, 0x2, 0x2172, 0xffffffffffffffff, 0x0) r1 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x11, 0x4, &(0x7f00000000c0)=@framed={{}, [@call={0x85, 0x0, 0x0, 0x7b}]}, &(0x7f00000001c0)='syzkaller\x00', 0x4, 0x8f, &(0x7f00000002c0)=""/143, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='ext4_es_lookup_extent_exit\x00', r1}, 0x10) r2 = socket$unix(0x1, 0x1, 0x0) bind$unix(r2, &(0x7f00000001c0)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x56) [ 342.104078][T15572] loop0: detected capacity change from 0 to 64 [ 342.121067][T15572] REISERFS warning (device loop0): super-6504 reiserfs_getopt: the option "nolargeio" requires an argument [ 342.121067][T15572] 06:18:59 executing program 0: r0 = openat(0xffffffffffffffff, 0x0, 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800004, 0x12, r0, 0x0) preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x9, 0x0) mmap(&(0x7f0000000000/0xa000)=nil, 0xa000, 0x2, 0x2172, 0xffffffffffffffff, 0x0) syz_mount_image$reiserfs(&(0x7f0000000140), &(0x7f0000000180)='./file0\x00', 0x8000, 0x3, &(0x7f0000000300)=[{&(0x7f0000000540)="21d37ef07e82e237fbe1b40158d20e242c5ea1f9d9edc6b9395250085d6dfa486982e82d4ce1a5e2bc00d29383bae640de", 0x31, 0x7}, {&(0x7f0000000240)="c43f281f483aa6cd83e40e59d53f177299d285bbe5d90aab2b56a76f9db49d86afa5a0f601ba9b3502de5f3724f3ec00927151f928f668b362052950a2e8f16baec29875fdad59395e86a1050c368933e3ed5a17d76bd7bded793436ea207885f395ace3fc12126c205b170be392c1645233ef01f9661090706a65f63b4845dc2884a20711a8024ad4af44aeec9db33991dae38d95cdb7132970d0d4dec58b9d46d378", 0xa3, 0x6}, {&(0x7f0000000380)="05f82c760d277896dd8c9891a41aafe24124891a32a238c3c78696d112aa09f3ae5c54b0c08676da5db7f358c72dfaca9a5d90860b4ae363c9a921c47965d339c23408a6d9b31a23aee27822f0a140d8e4ec9475a740113f2b9923b46333110e528e0a513151aad34aee1b5310fcf62c1982349253003d6d53aebbe09cf5918668ee682be93b6a671bbc", 0x8a, 0x3}], 0x2000400, &(0x7f0000000440)={[{@balloc_no_unhash_reloc}, {@nolargeio}, {@grpjquota}], [{@obj_role={'obj_role', 0x3d, '^'}}, {@hash}, {@uid_lt}, {@mask={'mask', 0x3d, 'MAY_EXEC'}}, {@uid_lt={'uid<', 0xee00}}, {@smackfsfloor={'smackfsfloor', 0x3d, ':%#[@'}}, {@obj_user={'obj_user', 0x3d, ',\\*),i'}}, {@uid_eq={'uid', 0x3d, 0xee00}}, {@seclabel}, {@uid_lt={'uid<', 0xee00}}]}) 06:18:59 executing program 3: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800004, 0x12, r0, 0x0) preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x9, 0x0) mmap(&(0x7f0000000000/0xa000)=nil, 0xa000, 0x2, 0x2172, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x11, 0x3, &(0x7f00000000c0)=@framed, &(0x7f00000001c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x74) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) r1 = socket$unix(0x1, 0x1, 0x0) bind$unix(r1, &(0x7f00000001c0)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x56) 06:18:59 executing program 2: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800004, 0x12, 0xffffffffffffffff, 0x0) preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x9, 0x0) mmap(&(0x7f0000000000/0xa000)=nil, 0xa000, 0x2, 0x2172, 0xffffffffffffffff, 0x0) r1 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x11, 0x4, &(0x7f00000000c0)=@framed={{}, [@call={0x85, 0x0, 0x0, 0x7b}]}, &(0x7f00000001c0)='syzkaller\x00', 0x4, 0x8f, &(0x7f00000002c0)=""/143, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='ext4_es_lookup_extent_exit\x00', r1}, 0x10) r2 = socket$unix(0x1, 0x1, 0x0) bind$unix(r2, &(0x7f00000001c0)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x56) 06:18:59 executing program 1: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800004, 0x12, 0xffffffffffffffff, 0x0) preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x9, 0x0) mmap(&(0x7f0000000000/0xa000)=nil, 0xa000, 0x2, 0x2172, 0xffffffffffffffff, 0x0) r1 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x11, 0x4, &(0x7f00000000c0)=@framed={{}, [@call={0x85, 0x0, 0x0, 0x7b}]}, &(0x7f00000001c0)='syzkaller\x00', 0x4, 0x8f, &(0x7f00000002c0)=""/143, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='ext4_es_lookup_extent_exit\x00', r1}, 0x10) r2 = socket$unix(0x1, 0x1, 0x0) bind$unix(r2, &(0x7f00000001c0)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x56) [ 342.280716][T15581] loop0: detected capacity change from 0 to 64 06:18:59 executing program 3: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800004, 0x12, r0, 0x0) preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x9, 0x0) mmap(&(0x7f0000000000/0xa000)=nil, 0xa000, 0x2, 0x2172, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x11, 0x3, &(0x7f00000000c0)=@framed, &(0x7f00000001c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x74) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) r1 = socket$unix(0x1, 0x1, 0x0) bind$unix(r1, &(0x7f00000001c0)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x56) [ 342.300904][T15581] REISERFS warning (device loop0): super-6504 reiserfs_getopt: the option "nolargeio" requires an argument [ 342.300904][T15581] 06:18:59 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000400)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000440)=ANY=[@ANYBLOB="3400000011000100000000000000000002000000", @ANYRES32=0x0, @ANYBLOB="081f0000000000000000030062726964676530000000000000000000"], 0x34}}, 0x0) r1 = openat(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800004, 0x12, r1, 0x0) 06:18:59 executing program 1: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800004, 0x12, 0xffffffffffffffff, 0x0) preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x9, 0x0) mmap(&(0x7f0000000000/0xa000)=nil, 0xa000, 0x2, 0x2172, 0xffffffffffffffff, 0x0) r1 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x11, 0x4, &(0x7f00000000c0)=@framed={{}, [@call={0x85, 0x0, 0x0, 0x7b}]}, &(0x7f00000001c0)='syzkaller\x00', 0x4, 0x8f, &(0x7f00000002c0)=""/143, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='ext4_es_lookup_extent_exit\x00', r1}, 0x10) r2 = socket$unix(0x1, 0x1, 0x0) bind$unix(r2, &(0x7f00000001c0)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x56) 06:18:59 executing program 3: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800004, 0x12, r0, 0x0) preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x9, 0x0) mmap(&(0x7f0000000000/0xa000)=nil, 0xa000, 0x2, 0x2172, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x11, 0x3, &(0x7f00000000c0)=@framed, &(0x7f00000001c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x74) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) r1 = socket$unix(0x1, 0x1, 0x0) bind$unix(r1, &(0x7f00000001c0)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x56) 06:19:00 executing program 0: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x0, 0x12, r0, 0x0) preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x9, 0x0) mmap(&(0x7f0000000000/0xa000)=nil, 0xa000, 0x2, 0x2172, 0xffffffffffffffff, 0x0) syz_mount_image$reiserfs(&(0x7f0000000140), &(0x7f0000000180)='./file0\x00', 0x8000, 0x3, &(0x7f0000000300)=[{&(0x7f0000000540)="21d37ef07e82e237fbe1b40158d20e242c5ea1f9d9edc6b9395250085d6dfa486982e82d4ce1a5e2bc00d29383bae640de", 0x31, 0x7}, {&(0x7f0000000240)="c43f281f483aa6cd83e40e59d53f177299d285bbe5d90aab2b56a76f9db49d86afa5a0f601ba9b3502de5f3724f3ec00927151f928f668b362052950a2e8f16baec29875fdad59395e86a1050c368933e3ed5a17d76bd7bded793436ea207885f395ace3fc12126c205b170be392c1645233ef01f9661090706a65f63b4845dc2884a20711a8024ad4af44aeec9db33991dae38d95cdb7132970d0d4dec58b9d46d378", 0xa3, 0x6}, {&(0x7f0000000380)="05f82c760d277896dd8c9891a41aafe24124891a32a238c3c78696d112aa09f3ae5c54b0c08676da5db7f358c72dfaca9a5d90860b4ae363c9a921c47965d339c23408a6d9b31a23aee27822f0a140d8e4ec9475a740113f2b9923b46333110e528e0a513151aad34aee1b5310fcf62c1982349253003d6d53aebbe09cf5918668ee682be93b6a671bbc", 0x8a, 0x3}], 0x2000400, &(0x7f0000000440)={[{@balloc_no_unhash_reloc}, {@nolargeio}, {@grpjquota}], [{@obj_role={'obj_role', 0x3d, '^'}}, {@hash}, {@uid_lt}, {@mask={'mask', 0x3d, 'MAY_EXEC'}}, {@uid_lt={'uid<', 0xee00}}, {@smackfsfloor={'smackfsfloor', 0x3d, ':%#[@'}}, {@obj_user={'obj_user', 0x3d, ',\\*),i'}}, {@uid_eq={'uid', 0x3d, 0xee00}}, {@seclabel}, {@uid_lt={'uid<', 0xee00}}]}) 06:19:00 executing program 2: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x0, 0x12, r0, 0x0) preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x9, 0x0) mmap(&(0x7f0000000000/0xa000)=nil, 0xa000, 0x2, 0x2172, 0xffffffffffffffff, 0x0) r1 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x11, 0x4, &(0x7f00000000c0)=@framed={{}, [@call={0x85, 0x0, 0x0, 0x7b}]}, &(0x7f00000001c0)='syzkaller\x00', 0x4, 0x8f, &(0x7f00000002c0)=""/143, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='ext4_es_lookup_extent_exit\x00', r1}, 0x10) r2 = socket$unix(0x1, 0x1, 0x0) bind$unix(r2, &(0x7f00000001c0)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x56) 06:19:00 executing program 1: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800004, 0x12, r0, 0x0) preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x9, 0x0) mmap(&(0x7f0000000000/0xa000)=nil, 0xa000, 0x2, 0x2172, 0xffffffffffffffff, 0x0) socketpair(0x1e, 0x80005, 0x0, &(0x7f0000000340)={0x0, 0x0}) r1 = socket$unix(0x1, 0x1, 0x0) bind$unix(r1, &(0x7f00000001c0)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x56) close(r1) [ 342.462675][T15602] loop0: detected capacity change from 0 to 64 [ 342.477548][T15602] REISERFS warning (device loop0): super-6504 reiserfs_getopt: the option "nolargeio" requires an argument [ 342.477548][T15602] 06:19:00 executing program 3: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800004, 0x12, r0, 0x0) preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x9, 0x0) mmap(&(0x7f0000000000/0xa000)=nil, 0xa000, 0x2, 0x2172, 0xffffffffffffffff, 0x0) r1 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x11, 0x3, &(0x7f00000000c0)=@framed, &(0x7f00000001c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x74) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={0x0, r1}, 0x10) r2 = socket$unix(0x1, 0x1, 0x0) bind$unix(r2, &(0x7f00000001c0)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x56) 06:19:00 executing program 1: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800004, 0x12, r0, 0x0) preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x9, 0x0) mmap(&(0x7f0000000000/0xa000)=nil, 0xa000, 0x2, 0x2172, 0xffffffffffffffff, 0x0) socketpair(0x1e, 0x80005, 0x0, &(0x7f0000000340)={0x0, 0x0}) r1 = socket$unix(0x1, 0x1, 0x0) bind$unix(r1, &(0x7f00000001c0)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x56) close(r1) 06:19:00 executing program 2: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800004, 0x12, r0, 0x0) preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x0, 0x0) mmap(&(0x7f0000000000/0xa000)=nil, 0xa000, 0x2, 0x2172, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x11, 0x4, &(0x7f00000000c0)=@framed={{}, [@call={0x85, 0x0, 0x0, 0x7b}]}, &(0x7f00000001c0)='syzkaller\x00', 0x4, 0x8f, &(0x7f00000002c0)=""/143, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) 06:19:00 executing program 0: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x0, 0x12, r0, 0x0) preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x9, 0x0) mmap(&(0x7f0000000000/0xa000)=nil, 0xa000, 0x2, 0x2172, 0xffffffffffffffff, 0x0) syz_mount_image$reiserfs(&(0x7f0000000140), &(0x7f0000000180)='./file0\x00', 0x8000, 0x3, &(0x7f0000000300)=[{&(0x7f0000000540)="21d37ef07e82e237fbe1b40158d20e242c5ea1f9d9edc6b9395250085d6dfa486982e82d4ce1a5e2bc00d29383bae640de", 0x31, 0x7}, {&(0x7f0000000240)="c43f281f483aa6cd83e40e59d53f177299d285bbe5d90aab2b56a76f9db49d86afa5a0f601ba9b3502de5f3724f3ec00927151f928f668b362052950a2e8f16baec29875fdad59395e86a1050c368933e3ed5a17d76bd7bded793436ea207885f395ace3fc12126c205b170be392c1645233ef01f9661090706a65f63b4845dc2884a20711a8024ad4af44aeec9db33991dae38d95cdb7132970d0d4dec58b9d46d378", 0xa3, 0x6}, {&(0x7f0000000380)="05f82c760d277896dd8c9891a41aafe24124891a32a238c3c78696d112aa09f3ae5c54b0c08676da5db7f358c72dfaca9a5d90860b4ae363c9a921c47965d339c23408a6d9b31a23aee27822f0a140d8e4ec9475a740113f2b9923b46333110e528e0a513151aad34aee1b5310fcf62c1982349253003d6d53aebbe09cf5918668ee682be93b6a671bbc", 0x8a, 0x3}], 0x2000400, &(0x7f0000000440)={[{@balloc_no_unhash_reloc}, {@nolargeio}, {@grpjquota}], [{@obj_role={'obj_role', 0x3d, '^'}}, {@hash}, {@uid_lt}, {@mask={'mask', 0x3d, 'MAY_EXEC'}}, {@uid_lt={'uid<', 0xee00}}, {@smackfsfloor={'smackfsfloor', 0x3d, ':%#[@'}}, {@obj_user={'obj_user', 0x3d, ',\\*),i'}}, {@uid_eq={'uid', 0x3d, 0xee00}}, {@seclabel}, {@uid_lt={'uid<', 0xee00}}]}) 06:19:00 executing program 3: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800004, 0x12, r0, 0x0) preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x9, 0x0) mmap(&(0x7f0000000000/0xa000)=nil, 0xa000, 0x2, 0x2172, 0xffffffffffffffff, 0x0) r1 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x11, 0x3, &(0x7f00000000c0)=@framed, &(0x7f00000001c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x74) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={0x0, r1}, 0x10) r2 = socket$unix(0x1, 0x1, 0x0) bind$unix(r2, &(0x7f00000001c0)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x56) 06:19:00 executing program 1: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800004, 0x12, r0, 0x0) preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x9, 0x0) mmap(&(0x7f0000000000/0xa000)=nil, 0xa000, 0x2, 0x2172, 0xffffffffffffffff, 0x0) socketpair(0x1e, 0x80005, 0x0, &(0x7f0000000340)={0x0, 0x0}) r1 = socket$unix(0x1, 0x1, 0x0) bind$unix(r1, &(0x7f00000001c0)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x56) close(r1) 06:19:00 executing program 2: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x0, 0x12, r0, 0x0) preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x9, 0x0) mmap(&(0x7f0000000000/0xa000)=nil, 0xa000, 0x2, 0x2172, 0xffffffffffffffff, 0x0) syz_mount_image$reiserfs(&(0x7f0000000140), &(0x7f0000000180)='./file0\x00', 0x8000, 0x3, &(0x7f0000000300)=[{&(0x7f0000000540)="21d37ef07e82e237fbe1b40158d20e242c5ea1f9d9edc6b9395250085d6dfa486982e82d4ce1a5e2bc00d29383bae640de", 0x31, 0x7}, {&(0x7f0000000240)="c43f281f483aa6cd83e40e59d53f177299d285bbe5d90aab2b56a76f9db49d86afa5a0f601ba9b3502de5f3724f3ec00927151f928f668b362052950a2e8f16baec29875fdad59395e86a1050c368933e3ed5a17d76bd7bded793436ea207885f395ace3fc12126c205b170be392c1645233ef01f9661090706a65f63b4845dc2884a20711a8024ad4af44aeec9db33991dae38d95cdb7132970d0d4dec58b9d46d378", 0xa3, 0x6}, {&(0x7f0000000380)="05f82c760d277896dd8c9891a41aafe24124891a32a238c3c78696d112aa09f3ae5c54b0c08676da5db7f358c72dfaca9a5d90860b4ae363c9a921c47965d339c23408a6d9b31a23aee27822f0a140d8e4ec9475a740113f2b9923b46333110e528e0a513151aad34aee1b5310fcf62c1982349253003d6d53aebbe09cf5918668ee682be93b6a671bbc", 0x8a, 0x3}], 0x2000400, &(0x7f0000000440)={[{@balloc_no_unhash_reloc}, {@nolargeio}, {@grpjquota}], [{@obj_role={'obj_role', 0x3d, '^'}}, {@hash}, {@uid_lt}, {@mask={'mask', 0x3d, 'MAY_EXEC'}}, {@uid_lt={'uid<', 0xee00}}, {@smackfsfloor={'smackfsfloor', 0x3d, ':%#[@'}}, {@obj_user={'obj_user', 0x3d, ',\\*),i'}}, {@uid_eq={'uid', 0x3d, 0xee00}}, {@seclabel}, {@uid_lt={'uid<', 0xee00}}]}) [ 342.660421][T15620] loop0: detected capacity change from 0 to 64 [ 342.687353][T15620] REISERFS warning (device loop0): super-6504 reiserfs_getopt: the option "nolargeio" requires an argument [ 342.687353][T15620] 06:19:00 executing program 3: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800004, 0x12, r0, 0x0) preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x9, 0x0) mmap(&(0x7f0000000000/0xa000)=nil, 0xa000, 0x2, 0x2172, 0xffffffffffffffff, 0x0) r1 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x11, 0x3, &(0x7f00000000c0)=@framed, &(0x7f00000001c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x74) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={0x0, r1}, 0x10) r2 = socket$unix(0x1, 0x1, 0x0) bind$unix(r2, &(0x7f00000001c0)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x56) 06:19:00 executing program 1: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800004, 0x12, r0, 0x0) preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x9, 0x0) mmap(&(0x7f0000000000/0xa000)=nil, 0xa000, 0x2, 0x2172, 0xffffffffffffffff, 0x0) socketpair(0x1e, 0x80005, 0x0, &(0x7f0000000340)={0x0, 0x0}) r1 = socket$unix(0x1, 0x1, 0x0) close(r1) [ 342.758273][T15627] loop2: detected capacity change from 0 to 64 06:19:00 executing program 3: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800004, 0x12, r0, 0x0) preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x9, 0x0) mmap(&(0x7f0000000000/0xa000)=nil, 0xa000, 0x2, 0x2172, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x11, 0x3, &(0x7f00000000c0)=@framed, &(0x7f00000001c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x74) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='ext4_es_lookup_extent_exit\x00'}, 0x10) r1 = socket$unix(0x1, 0x1, 0x0) bind$unix(r1, &(0x7f00000001c0)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x56) [ 342.805107][T15627] REISERFS warning (device loop2): super-6504 reiserfs_getopt: the option "nolargeio" requires an argument [ 342.805107][T15627] 06:19:00 executing program 0: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x0, 0x12, r0, 0x0) preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x9, 0x0) mmap(&(0x7f0000000000/0xa000)=nil, 0xa000, 0x2, 0x2172, 0xffffffffffffffff, 0x0) syz_mount_image$reiserfs(&(0x7f0000000140), &(0x7f0000000180)='./file0\x00', 0x8000, 0x3, &(0x7f0000000300)=[{&(0x7f0000000540)="21d37ef07e82e237fbe1b40158d20e242c5ea1f9d9edc6b9395250085d6dfa486982e82d4ce1a5e2bc00d29383bae640de", 0x31, 0x7}, {&(0x7f0000000240)="c43f281f483aa6cd83e40e59d53f177299d285bbe5d90aab2b56a76f9db49d86afa5a0f601ba9b3502de5f3724f3ec00927151f928f668b362052950a2e8f16baec29875fdad59395e86a1050c368933e3ed5a17d76bd7bded793436ea207885f395ace3fc12126c205b170be392c1645233ef01f9661090706a65f63b4845dc2884a20711a8024ad4af44aeec9db33991dae38d95cdb7132970d0d4dec58b9d46d378", 0xa3, 0x6}, {&(0x7f0000000380)="05f82c760d277896dd8c9891a41aafe24124891a32a238c3c78696d112aa09f3ae5c54b0c08676da5db7f358c72dfaca9a5d90860b4ae363c9a921c47965d339c23408a6d9b31a23aee27822f0a140d8e4ec9475a740113f2b9923b46333110e528e0a513151aad34aee1b5310fcf62c1982349253003d6d53aebbe09cf5918668ee682be93b6a671bbc", 0x8a, 0x3}], 0x2000400, &(0x7f0000000440)={[{@balloc_no_unhash_reloc}, {@nolargeio}, {@grpjquota}], [{@obj_role={'obj_role', 0x3d, '^'}}, {@hash}, {@uid_lt}, {@mask={'mask', 0x3d, 'MAY_EXEC'}}, {@uid_lt={'uid<', 0xee00}}, {@smackfsfloor={'smackfsfloor', 0x3d, ':%#[@'}}, {@obj_user={'obj_user', 0x3d, ',\\*),i'}}, {@uid_eq={'uid', 0x3d, 0xee00}}, {@seclabel}, {@uid_lt={'uid<', 0xee00}}]}) 06:19:00 executing program 1: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800004, 0x12, r0, 0x0) preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x9, 0x0) mmap(&(0x7f0000000000/0xa000)=nil, 0xa000, 0x2, 0x2172, 0xffffffffffffffff, 0x0) socketpair(0x1e, 0x80005, 0x0, &(0x7f0000000340)={0x0, 0x0}) r1 = socket$unix(0x1, 0x1, 0x0) close(r1) 06:19:00 executing program 3: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800004, 0x12, r0, 0x0) preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x9, 0x0) mmap(&(0x7f0000000000/0xa000)=nil, 0xa000, 0x2, 0x2172, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x11, 0x3, &(0x7f00000000c0)=@framed, &(0x7f00000001c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x74) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='ext4_es_lookup_extent_exit\x00'}, 0x10) r1 = socket$unix(0x1, 0x1, 0x0) bind$unix(r1, &(0x7f00000001c0)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x56) [ 342.886228][T15640] loop0: detected capacity change from 0 to 64 [ 342.900994][T15640] REISERFS warning (device loop0): super-6504 reiserfs_getopt: the option "nolargeio" requires an argument [ 342.900994][T15640] 06:19:00 executing program 1: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800004, 0x12, r0, 0x0) preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x9, 0x0) mmap(&(0x7f0000000000/0xa000)=nil, 0xa000, 0x2, 0x2172, 0xffffffffffffffff, 0x0) socketpair(0x1e, 0x80005, 0x0, &(0x7f0000000340)={0x0, 0x0}) r1 = socket$unix(0x1, 0x1, 0x0) close(r1) 06:19:00 executing program 2: r0 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000680), 0xffffffffffffffff) ioctl$sock_SIOCGIFINDEX_80211(0xffffffffffffffff, 0x8933, &(0x7f0000000c00)={'wlan1\x00'}) r1 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX_80211(r1, 0x8933, &(0x7f0000000e40)={'wlan0\x00', 0x0}) sendmsg$NL80211_CMD_TRIGGER_SCAN(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000f40)={&(0x7f0000000000)=ANY=[@ANYBLOB='$\x00\x00\x00', @ANYRES16=r0, @ANYBLOB="010000000000000000002100000008000300", @ANYRES32=r2, @ANYBLOB="08009e"], 0x24}}, 0x0) sendmsg$NL80211_CMD_FRAME(0xffffffffffffffff, &(0x7f0000000100)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f00000000c0)={&(0x7f0000000c40)=ANY=[@ANYBLOB="2000000059c89a20a00fadf00ada0277887124d85c2b6f27e866a2f2434f0213672fd63827c4c50f5346d89412d5351da4a233d419db04d5f089f764866116182e7757ccfd", @ANYRES16=r0, @ANYBLOB="00022dbd7000fedbdf253b0000000c0099007f000000470000000c00cd001f000400070000ff04008e00"], 0x30}, 0x1, 0x0, 0x0, 0x44}, 0x40000) r3 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800004, 0x12, r3, 0x0) preadv(r3, &(0x7f00000001c0)=[{0x0}], 0x1, 0x9, 0x0) mmap(&(0x7f0000000000/0xa000)=nil, 0xa000, 0x2, 0x2172, 0xffffffffffffffff, 0x0) r4 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000180), 0xffffffffffffffff) ioctl$sock_SIOCGIFINDEX_80211(r3, 0x8933, &(0x7f0000000200)={'wlan0\x00', 0x0}) sendmsg$NL80211_CMD_REGISTER_FRAME(r3, &(0x7f0000000300)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x2000}, 0xc, &(0x7f00000002c0)={&(0x7f0000000240)={0x60, r4, 0x100, 0x70bd29, 0x25dfdbfc, {{}, {@val={0x8, 0x3, r5}, @val={0xc, 0x99, {0x9de00000, 0x6b}}}}, [@NL80211_ATTR_FRAME_TYPE={0x6}, @NL80211_ATTR_FRAME_TYPE={0x6, 0x65, 0x7f}, @NL80211_ATTR_FRAME_TYPE={0x6, 0x65, 0x8}, @NL80211_ATTR_FRAME_TYPE={0x6}, @NL80211_ATTR_FRAME_TYPE={0x6, 0x65, 0xc0}, @NL80211_ATTR_FRAME_TYPE={0x6, 0x65, 0x2e30}, @NL80211_ATTR_FRAME_TYPE={0x6, 0x65, 0x6}]}, 0x60}, 0x1, 0x0, 0x0, 0x10}, 0x4) r6 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r6, &(0x7f0000000380)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x80, 0x1, 0x9, 0x1, 0x2, 0x3e, 0x7ff, 0x1f2, 0x40, 0x1f4, 0xbfa, 0x3, 0x38, 0x1, 0x5, 0x4, 0x4}, [{0x5, 0x9, 0x6, 0x101, 0x6, 0x4, 0x9, 0x6}, {0x5, 0x3, 0x5e61, 0x80000000, 0xcc3, 0x9, 0x7, 0x8}], "d1660f10e0ac4a6edbf3aa53803c8f57ef2a12069e82553332d2b96d67f2dbc5b04959dad57c303d876233684f5e9ad402a193da791e11122f2cccbf10d6d499f5e16385d09f63891a965d80bcb68b551fabffb4bf0b5c372b4d69cdefac988201a40429a8d0dc699820193afcab08070fde89c22e16b43dde5e37d9a3df0cd352e8667f163774d9dc3c79571e5100046281", ['\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00']}, 0x842) socketpair(0x1e, 0x80005, 0x0, &(0x7f0000000340)={0x0, 0x0}) 06:19:00 executing program 3: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800004, 0x12, r0, 0x0) preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x9, 0x0) mmap(&(0x7f0000000000/0xa000)=nil, 0xa000, 0x2, 0x2172, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x11, 0x3, &(0x7f00000000c0)=@framed, &(0x7f00000001c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x74) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='ext4_es_lookup_extent_exit\x00'}, 0x10) r1 = socket$unix(0x1, 0x1, 0x0) bind$unix(r1, &(0x7f00000001c0)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x56) 06:19:00 executing program 1: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800004, 0x12, r0, 0x0) preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x9, 0x0) mmap(&(0x7f0000000000/0xa000)=nil, 0xa000, 0x2, 0x2172, 0xffffffffffffffff, 0x0) socketpair(0x1e, 0x80005, 0x0, &(0x7f0000000340)={0x0, 0x0}) bind$unix(0xffffffffffffffff, &(0x7f00000001c0)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x56) close(0xffffffffffffffff) 06:19:00 executing program 0: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800004, 0x10, r0, 0x0) preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x9, 0x0) mmap(&(0x7f0000000000/0xa000)=nil, 0xa000, 0x2, 0x2172, 0xffffffffffffffff, 0x0) syz_mount_image$reiserfs(&(0x7f0000000140), &(0x7f0000000180)='./file0\x00', 0x8000, 0x3, &(0x7f0000000300)=[{&(0x7f0000000540)="21d37ef07e82e237fbe1b40158d20e242c5ea1f9d9edc6b9395250085d6dfa486982e82d4ce1a5e2bc00d29383bae640de", 0x31, 0x7}, {&(0x7f0000000240)="c43f281f483aa6cd83e40e59d53f177299d285bbe5d90aab2b56a76f9db49d86afa5a0f601ba9b3502de5f3724f3ec00927151f928f668b362052950a2e8f16baec29875fdad59395e86a1050c368933e3ed5a17d76bd7bded793436ea207885f395ace3fc12126c205b170be392c1645233ef01f9661090706a65f63b4845dc2884a20711a8024ad4af44aeec9db33991dae38d95cdb7132970d0d4dec58b9d46d378", 0xa3, 0x6}, {&(0x7f0000000380)="05f82c760d277896dd8c9891a41aafe24124891a32a238c3c78696d112aa09f3ae5c54b0c08676da5db7f358c72dfaca9a5d90860b4ae363c9a921c47965d339c23408a6d9b31a23aee27822f0a140d8e4ec9475a740113f2b9923b46333110e528e0a513151aad34aee1b5310fcf62c1982349253003d6d53aebbe09cf5918668ee682be93b6a671bbc", 0x8a, 0x3}], 0x2000400, &(0x7f0000000440)={[{@balloc_no_unhash_reloc}, {@nolargeio}, {@grpjquota}], [{@obj_role={'obj_role', 0x3d, '^'}}, {@hash}, {@uid_lt}, {@mask={'mask', 0x3d, 'MAY_EXEC'}}, {@uid_lt={'uid<', 0xee00}}, {@smackfsfloor={'smackfsfloor', 0x3d, ':%#[@'}}, {@obj_user={'obj_user', 0x3d, ',\\*),i'}}, {@uid_eq={'uid', 0x3d, 0xee00}}, {@seclabel}, {@uid_lt={'uid<', 0xee00}}]}) 06:19:00 executing program 3: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800004, 0x12, r0, 0x0) preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x9, 0x0) mmap(&(0x7f0000000000/0xa000)=nil, 0xa000, 0x2, 0x2172, 0xffffffffffffffff, 0x0) r1 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x11, 0x3, &(0x7f00000000c0)=@framed, &(0x7f00000001c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x74) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='ext4_es_lookup_extent_exit\x00', r1}, 0x10) r2 = socket$unix(0x1, 0x0, 0x0) bind$unix(r2, &(0x7f00000001c0)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x56) 06:19:00 executing program 1: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800004, 0x12, r0, 0x0) preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x9, 0x0) mmap(&(0x7f0000000000/0xa000)=nil, 0xa000, 0x2, 0x2172, 0xffffffffffffffff, 0x0) socketpair(0x1e, 0x80005, 0x0, &(0x7f0000000340)={0x0, 0x0}) bind$unix(0xffffffffffffffff, &(0x7f00000001c0)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x56) close(0xffffffffffffffff) [ 343.108029][T15664] loop0: detected capacity change from 0 to 64 06:19:00 executing program 3: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800004, 0x12, r0, 0x0) preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x9, 0x0) mmap(&(0x7f0000000000/0xa000)=nil, 0xa000, 0x2, 0x2172, 0xffffffffffffffff, 0x0) r1 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x11, 0x3, &(0x7f00000000c0)=@framed, &(0x7f00000001c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x74) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='ext4_es_lookup_extent_exit\x00', r1}, 0x10) r2 = socket$unix(0x1, 0x0, 0x0) bind$unix(r2, &(0x7f00000001c0)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x56) 06:19:00 executing program 1: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800004, 0x12, r0, 0x0) preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x9, 0x0) mmap(&(0x7f0000000000/0xa000)=nil, 0xa000, 0x2, 0x2172, 0xffffffffffffffff, 0x0) socketpair(0x1e, 0x80005, 0x0, &(0x7f0000000340)={0x0, 0x0}) bind$unix(0xffffffffffffffff, &(0x7f00000001c0)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x56) close(0xffffffffffffffff) [ 343.176831][T15664] REISERFS warning (device loop0): super-6504 reiserfs_getopt: the option "nolargeio" requires an argument [ 343.176831][T15664] 06:19:01 executing program 2: r0 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000680), 0xffffffffffffffff) ioctl$sock_SIOCGIFINDEX_80211(0xffffffffffffffff, 0x8933, &(0x7f0000000c00)={'wlan1\x00'}) r1 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX_80211(r1, 0x8933, &(0x7f0000000e40)={'wlan0\x00', 0x0}) sendmsg$NL80211_CMD_TRIGGER_SCAN(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000f40)={&(0x7f0000000000)=ANY=[@ANYBLOB='$\x00\x00\x00', @ANYRES16=r0, @ANYBLOB="010000000000000000002100000008000300", @ANYRES32=r2, @ANYBLOB="08009e"], 0x24}}, 0x0) sendmsg$NL80211_CMD_FRAME(0xffffffffffffffff, &(0x7f0000000100)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f00000000c0)={&(0x7f0000000c40)=ANY=[@ANYBLOB="2000000059c89a20a00fadf00ada0277887124d85c2b6f27e866a2f2434f0213672fd63827c4c50f5346d89412d5351da4a233d419db04d5f089f764866116182e7757ccfd", @ANYRES16=r0, @ANYBLOB="00022dbd7000fedbdf253b0000000c0099007f000000470000000c00cd001f000400070000ff04008e00"], 0x30}, 0x1, 0x0, 0x0, 0x44}, 0x40000) r3 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800004, 0x12, r3, 0x0) preadv(r3, &(0x7f00000001c0)=[{0x0}], 0x1, 0x9, 0x0) mmap(&(0x7f0000000000/0xa000)=nil, 0xa000, 0x2, 0x2172, 0xffffffffffffffff, 0x0) r4 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000180), 0xffffffffffffffff) ioctl$sock_SIOCGIFINDEX_80211(r3, 0x8933, &(0x7f0000000200)={'wlan0\x00', 0x0}) sendmsg$NL80211_CMD_REGISTER_FRAME(r3, &(0x7f0000000300)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x2000}, 0xc, &(0x7f00000002c0)={&(0x7f0000000240)={0x60, r4, 0x100, 0x70bd29, 0x25dfdbfc, {{}, {@val={0x8, 0x3, r5}, @val={0xc, 0x99, {0x9de00000, 0x6b}}}}, [@NL80211_ATTR_FRAME_TYPE={0x6}, @NL80211_ATTR_FRAME_TYPE={0x6, 0x65, 0x7f}, @NL80211_ATTR_FRAME_TYPE={0x6, 0x65, 0x8}, @NL80211_ATTR_FRAME_TYPE={0x6}, @NL80211_ATTR_FRAME_TYPE={0x6, 0x65, 0xc0}, @NL80211_ATTR_FRAME_TYPE={0x6, 0x65, 0x2e30}, @NL80211_ATTR_FRAME_TYPE={0x6, 0x65, 0x6}]}, 0x60}, 0x1, 0x0, 0x0, 0x10}, 0x4) r6 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r6, &(0x7f0000000380)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x80, 0x1, 0x9, 0x1, 0x2, 0x3e, 0x7ff, 0x1f2, 0x40, 0x1f4, 0xbfa, 0x3, 0x38, 0x1, 0x5, 0x4, 0x4}, [{0x5, 0x9, 0x6, 0x101, 0x6, 0x4, 0x9, 0x6}, {0x5, 0x3, 0x5e61, 0x80000000, 0xcc3, 0x9, 0x7, 0x8}], "d1660f10e0ac4a6edbf3aa53803c8f57ef2a12069e82553332d2b96d67f2dbc5b04959dad57c303d876233684f5e9ad402a193da791e11122f2cccbf10d6d499f5e16385d09f63891a965d80bcb68b551fabffb4bf0b5c372b4d69cdefac988201a40429a8d0dc699820193afcab08070fde89c22e16b43dde5e37d9a3df0cd352e8667f163774d9dc3c79571e5100046281", ['\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00']}, 0x842) socketpair(0x1e, 0x80005, 0x0, &(0x7f0000000340)={0x0, 0x0}) 06:19:01 executing program 3: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800004, 0x12, r0, 0x0) preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x9, 0x0) mmap(&(0x7f0000000000/0xa000)=nil, 0xa000, 0x2, 0x2172, 0xffffffffffffffff, 0x0) r1 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x11, 0x3, &(0x7f00000000c0)=@framed, &(0x7f00000001c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x74) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='ext4_es_lookup_extent_exit\x00', r1}, 0x10) r2 = socket$unix(0x1, 0x0, 0x0) bind$unix(r2, &(0x7f00000001c0)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x56) 06:19:01 executing program 1: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800004, 0x12, r0, 0x0) preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x9, 0x0) mmap(&(0x7f0000000000/0xa000)=nil, 0xa000, 0x2, 0x2172, 0xffffffffffffffff, 0x0) r1 = socket$unix(0x1, 0x1, 0x0) bind$unix(r1, &(0x7f00000001c0)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x56) close(r1) 06:19:01 executing program 0: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800004, 0x10, r0, 0x0) preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x9, 0x0) mmap(&(0x7f0000000000/0xa000)=nil, 0xa000, 0x2, 0x2172, 0xffffffffffffffff, 0x0) syz_mount_image$reiserfs(&(0x7f0000000140), &(0x7f0000000180)='./file0\x00', 0x8000, 0x3, &(0x7f0000000300)=[{&(0x7f0000000540)="21d37ef07e82e237fbe1b40158d20e242c5ea1f9d9edc6b9395250085d6dfa486982e82d4ce1a5e2bc00d29383bae640de", 0x31, 0x7}, {&(0x7f0000000240)="c43f281f483aa6cd83e40e59d53f177299d285bbe5d90aab2b56a76f9db49d86afa5a0f601ba9b3502de5f3724f3ec00927151f928f668b362052950a2e8f16baec29875fdad59395e86a1050c368933e3ed5a17d76bd7bded793436ea207885f395ace3fc12126c205b170be392c1645233ef01f9661090706a65f63b4845dc2884a20711a8024ad4af44aeec9db33991dae38d95cdb7132970d0d4dec58b9d46d378", 0xa3, 0x6}, {&(0x7f0000000380)="05f82c760d277896dd8c9891a41aafe24124891a32a238c3c78696d112aa09f3ae5c54b0c08676da5db7f358c72dfaca9a5d90860b4ae363c9a921c47965d339c23408a6d9b31a23aee27822f0a140d8e4ec9475a740113f2b9923b46333110e528e0a513151aad34aee1b5310fcf62c1982349253003d6d53aebbe09cf5918668ee682be93b6a671bbc", 0x8a, 0x3}], 0x2000400, &(0x7f0000000440)={[{@balloc_no_unhash_reloc}, {@nolargeio}, {@grpjquota}], [{@obj_role={'obj_role', 0x3d, '^'}}, {@hash}, {@uid_lt}, {@mask={'mask', 0x3d, 'MAY_EXEC'}}, {@uid_lt={'uid<', 0xee00}}, {@smackfsfloor={'smackfsfloor', 0x3d, ':%#[@'}}, {@obj_user={'obj_user', 0x3d, ',\\*),i'}}, {@uid_eq={'uid', 0x3d, 0xee00}}, {@seclabel}, {@uid_lt={'uid<', 0xee00}}]}) [ 343.899929][T15681] loop0: detected capacity change from 0 to 64 06:19:01 executing program 3: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800004, 0x12, r0, 0x0) preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x9, 0x0) mmap(&(0x7f0000000000/0xa000)=nil, 0xa000, 0x2, 0x2172, 0xffffffffffffffff, 0x0) r1 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x11, 0x3, &(0x7f00000000c0)=@framed, &(0x7f00000001c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x74) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='ext4_es_lookup_extent_exit\x00', r1}, 0x10) socket$unix(0x1, 0x1, 0x0) bind$unix(0xffffffffffffffff, &(0x7f00000001c0)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x56) [ 343.955085][T15681] REISERFS warning (device loop0): super-6504 reiserfs_getopt: the option "nolargeio" requires an argument [ 343.955085][T15681] 06:19:01 executing program 1: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800004, 0x12, r0, 0x0) preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x9, 0x0) r1 = socket$unix(0x1, 0x1, 0x0) bind$unix(r1, &(0x7f00000001c0)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x56) close(r1) 06:19:01 executing program 0: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800004, 0x10, r0, 0x0) preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x9, 0x0) mmap(&(0x7f0000000000/0xa000)=nil, 0xa000, 0x2, 0x2172, 0xffffffffffffffff, 0x0) syz_mount_image$reiserfs(&(0x7f0000000140), &(0x7f0000000180)='./file0\x00', 0x8000, 0x3, &(0x7f0000000300)=[{&(0x7f0000000540)="21d37ef07e82e237fbe1b40158d20e242c5ea1f9d9edc6b9395250085d6dfa486982e82d4ce1a5e2bc00d29383bae640de", 0x31, 0x7}, {&(0x7f0000000240)="c43f281f483aa6cd83e40e59d53f177299d285bbe5d90aab2b56a76f9db49d86afa5a0f601ba9b3502de5f3724f3ec00927151f928f668b362052950a2e8f16baec29875fdad59395e86a1050c368933e3ed5a17d76bd7bded793436ea207885f395ace3fc12126c205b170be392c1645233ef01f9661090706a65f63b4845dc2884a20711a8024ad4af44aeec9db33991dae38d95cdb7132970d0d4dec58b9d46d378", 0xa3, 0x6}, {&(0x7f0000000380)="05f82c760d277896dd8c9891a41aafe24124891a32a238c3c78696d112aa09f3ae5c54b0c08676da5db7f358c72dfaca9a5d90860b4ae363c9a921c47965d339c23408a6d9b31a23aee27822f0a140d8e4ec9475a740113f2b9923b46333110e528e0a513151aad34aee1b5310fcf62c1982349253003d6d53aebbe09cf5918668ee682be93b6a671bbc", 0x8a, 0x3}], 0x2000400, &(0x7f0000000440)={[{@balloc_no_unhash_reloc}, {@nolargeio}, {@grpjquota}], [{@obj_role={'obj_role', 0x3d, '^'}}, {@hash}, {@uid_lt}, {@mask={'mask', 0x3d, 'MAY_EXEC'}}, {@uid_lt={'uid<', 0xee00}}, {@smackfsfloor={'smackfsfloor', 0x3d, ':%#[@'}}, {@obj_user={'obj_user', 0x3d, ',\\*),i'}}, {@uid_eq={'uid', 0x3d, 0xee00}}, {@seclabel}, {@uid_lt={'uid<', 0xee00}}]}) 06:19:01 executing program 3: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800004, 0x12, r0, 0x0) preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x9, 0x0) mmap(&(0x7f0000000000/0xa000)=nil, 0xa000, 0x2, 0x2172, 0xffffffffffffffff, 0x0) r1 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x11, 0x3, &(0x7f00000000c0)=@framed, &(0x7f00000001c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x74) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='ext4_es_lookup_extent_exit\x00', r1}, 0x10) socket$unix(0x1, 0x1, 0x0) bind$unix(0xffffffffffffffff, &(0x7f00000001c0)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x56) [ 344.101215][T15697] loop0: detected capacity change from 0 to 64 [ 344.128770][T15697] REISERFS warning (device loop0): super-6504 reiserfs_getopt: the option "nolargeio" requires an argument [ 344.128770][T15697] 06:19:02 executing program 2: r0 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000680), 0xffffffffffffffff) ioctl$sock_SIOCGIFINDEX_80211(0xffffffffffffffff, 0x8933, &(0x7f0000000c00)={'wlan1\x00'}) r1 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX_80211(r1, 0x8933, &(0x7f0000000e40)={'wlan0\x00', 0x0}) sendmsg$NL80211_CMD_TRIGGER_SCAN(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000f40)={&(0x7f0000000000)=ANY=[@ANYBLOB='$\x00\x00\x00', @ANYRES16=r0, @ANYBLOB="010000000000000000002100000008000300", @ANYRES32=r2, @ANYBLOB="08009e"], 0x24}}, 0x0) sendmsg$NL80211_CMD_FRAME(0xffffffffffffffff, &(0x7f0000000100)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f00000000c0)={&(0x7f0000000c40)=ANY=[@ANYBLOB="2000000059c89a20a00fadf00ada0277887124d85c2b6f27e866a2f2434f0213672fd63827c4c50f5346d89412d5351da4a233d419db04d5f089f764866116182e7757ccfd", @ANYRES16=r0, @ANYBLOB="00022dbd7000fedbdf253b0000000c0099007f000000470000000c00cd001f000400070000ff04008e00"], 0x30}, 0x1, 0x0, 0x0, 0x44}, 0x40000) r3 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800004, 0x12, r3, 0x0) preadv(r3, &(0x7f00000001c0)=[{0x0}], 0x1, 0x9, 0x0) mmap(&(0x7f0000000000/0xa000)=nil, 0xa000, 0x2, 0x2172, 0xffffffffffffffff, 0x0) r4 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000180), 0xffffffffffffffff) ioctl$sock_SIOCGIFINDEX_80211(r3, 0x8933, &(0x7f0000000200)={'wlan0\x00', 0x0}) sendmsg$NL80211_CMD_REGISTER_FRAME(r3, &(0x7f0000000300)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x2000}, 0xc, &(0x7f00000002c0)={&(0x7f0000000240)={0x60, r4, 0x100, 0x70bd29, 0x25dfdbfc, {{}, {@val={0x8, 0x3, r5}, @val={0xc, 0x99, {0x9de00000, 0x6b}}}}, [@NL80211_ATTR_FRAME_TYPE={0x6}, @NL80211_ATTR_FRAME_TYPE={0x6, 0x65, 0x7f}, @NL80211_ATTR_FRAME_TYPE={0x6, 0x65, 0x8}, @NL80211_ATTR_FRAME_TYPE={0x6}, @NL80211_ATTR_FRAME_TYPE={0x6, 0x65, 0xc0}, @NL80211_ATTR_FRAME_TYPE={0x6, 0x65, 0x2e30}, @NL80211_ATTR_FRAME_TYPE={0x6, 0x65, 0x6}]}, 0x60}, 0x1, 0x0, 0x0, 0x10}, 0x4) r6 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r6, &(0x7f0000000380)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x80, 0x1, 0x9, 0x1, 0x2, 0x3e, 0x7ff, 0x1f2, 0x40, 0x1f4, 0xbfa, 0x3, 0x38, 0x1, 0x5, 0x4, 0x4}, [{0x5, 0x9, 0x6, 0x101, 0x6, 0x4, 0x9, 0x6}, {0x5, 0x3, 0x5e61, 0x80000000, 0xcc3, 0x9, 0x7, 0x8}], "d1660f10e0ac4a6edbf3aa53803c8f57ef2a12069e82553332d2b96d67f2dbc5b04959dad57c303d876233684f5e9ad402a193da791e11122f2cccbf10d6d499f5e16385d09f63891a965d80bcb68b551fabffb4bf0b5c372b4d69cdefac988201a40429a8d0dc699820193afcab08070fde89c22e16b43dde5e37d9a3df0cd352e8667f163774d9dc3c79571e5100046281", ['\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00']}, 0x842) socketpair(0x1e, 0x80005, 0x0, &(0x7f0000000340)={0x0, 0x0}) 06:19:02 executing program 1: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800004, 0x12, r0, 0x0) preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x9, 0x0) r1 = socket$unix(0x1, 0x1, 0x0) bind$unix(r1, &(0x7f00000001c0)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x56) close(r1) 06:19:02 executing program 3: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800004, 0x12, r0, 0x0) preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x9, 0x0) mmap(&(0x7f0000000000/0xa000)=nil, 0xa000, 0x2, 0x2172, 0xffffffffffffffff, 0x0) r1 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x11, 0x3, &(0x7f00000000c0)=@framed, &(0x7f00000001c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x74) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='ext4_es_lookup_extent_exit\x00', r1}, 0x10) socket$unix(0x1, 0x1, 0x0) bind$unix(0xffffffffffffffff, &(0x7f00000001c0)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x56) 06:19:02 executing program 0: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800004, 0x12, 0xffffffffffffffff, 0x0) preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x9, 0x0) mmap(&(0x7f0000000000/0xa000)=nil, 0xa000, 0x2, 0x2172, 0xffffffffffffffff, 0x0) syz_mount_image$reiserfs(&(0x7f0000000140), &(0x7f0000000180)='./file0\x00', 0x8000, 0x3, &(0x7f0000000300)=[{&(0x7f0000000540)="21d37ef07e82e237fbe1b40158d20e242c5ea1f9d9edc6b9395250085d6dfa486982e82d4ce1a5e2bc00d29383bae640de", 0x31, 0x7}, {&(0x7f0000000240)="c43f281f483aa6cd83e40e59d53f177299d285bbe5d90aab2b56a76f9db49d86afa5a0f601ba9b3502de5f3724f3ec00927151f928f668b362052950a2e8f16baec29875fdad59395e86a1050c368933e3ed5a17d76bd7bded793436ea207885f395ace3fc12126c205b170be392c1645233ef01f9661090706a65f63b4845dc2884a20711a8024ad4af44aeec9db33991dae38d95cdb7132970d0d4dec58b9d46d378", 0xa3, 0x6}, {&(0x7f0000000380)="05f82c760d277896dd8c9891a41aafe24124891a32a238c3c78696d112aa09f3ae5c54b0c08676da5db7f358c72dfaca9a5d90860b4ae363c9a921c47965d339c23408a6d9b31a23aee27822f0a140d8e4ec9475a740113f2b9923b46333110e528e0a513151aad34aee1b5310fcf62c1982349253003d6d53aebbe09cf5918668ee682be93b6a671bbc", 0x8a, 0x3}], 0x2000400, &(0x7f0000000440)={[{@balloc_no_unhash_reloc}, {@nolargeio}, {@grpjquota}], [{@obj_role={'obj_role', 0x3d, '^'}}, {@hash}, {@uid_lt}, {@mask={'mask', 0x3d, 'MAY_EXEC'}}, {@uid_lt={'uid<', 0xee00}}, {@smackfsfloor={'smackfsfloor', 0x3d, ':%#[@'}}, {@obj_user={'obj_user', 0x3d, ',\\*),i'}}, {@uid_eq={'uid', 0x3d, 0xee00}}, {@seclabel}, {@uid_lt={'uid<', 0xee00}}]}) [ 344.851661][T15708] loop0: detected capacity change from 0 to 64 06:19:02 executing program 3: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800004, 0x12, r0, 0x0) preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x9, 0x0) mmap(&(0x7f0000000000/0xa000)=nil, 0xa000, 0x2, 0x2172, 0xffffffffffffffff, 0x0) r1 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x11, 0x3, &(0x7f00000000c0)=@framed, &(0x7f00000001c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x74) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='ext4_es_lookup_extent_exit\x00', r1}, 0x10) r2 = socket$unix(0x1, 0x1, 0x0) bind$unix(r2, 0x0, 0x0) 06:19:02 executing program 1: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800004, 0x12, r0, 0x0) preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x9, 0x0) r1 = socket$unix(0x1, 0x1, 0x0) bind$unix(r1, &(0x7f00000001c0)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x56) close(r1) [ 344.890163][T15708] REISERFS warning (device loop0): super-6504 reiserfs_getopt: the option "nolargeio" requires an argument [ 344.890163][T15708] 06:19:02 executing program 1: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800004, 0x12, r0, 0x0) mmap(&(0x7f0000000000/0xa000)=nil, 0xa000, 0x2, 0x2172, 0xffffffffffffffff, 0x0) r1 = socket$unix(0x1, 0x1, 0x0) bind$unix(r1, &(0x7f00000001c0)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x56) close(r1) 06:19:02 executing program 3: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800004, 0x12, r0, 0x0) preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x9, 0x0) mmap(&(0x7f0000000000/0xa000)=nil, 0xa000, 0x2, 0x2172, 0xffffffffffffffff, 0x0) r1 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x11, 0x3, &(0x7f00000000c0)=@framed, &(0x7f00000001c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x74) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='ext4_es_lookup_extent_exit\x00', r1}, 0x10) r2 = socket$unix(0x1, 0x1, 0x0) bind$unix(r2, 0x0, 0x0) 06:19:03 executing program 2: r0 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000680), 0xffffffffffffffff) ioctl$sock_SIOCGIFINDEX_80211(0xffffffffffffffff, 0x8933, &(0x7f0000000c00)={'wlan1\x00'}) r1 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX_80211(r1, 0x8933, &(0x7f0000000e40)={'wlan0\x00', 0x0}) sendmsg$NL80211_CMD_TRIGGER_SCAN(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000f40)={&(0x7f0000000000)=ANY=[@ANYBLOB='$\x00\x00\x00', @ANYRES16=r0, @ANYBLOB="010000000000000000002100000008000300", @ANYRES32=r2, @ANYBLOB="08009e"], 0x24}}, 0x0) sendmsg$NL80211_CMD_FRAME(0xffffffffffffffff, &(0x7f0000000100)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f00000000c0)={&(0x7f0000000c40)=ANY=[@ANYBLOB="2000000059c89a20a00fadf00ada0277887124d85c2b6f27e866a2f2434f0213672fd63827c4c50f5346d89412d5351da4a233d419db04d5f089f764866116182e7757ccfd", @ANYRES16=r0, @ANYBLOB="00022dbd7000fedbdf253b0000000c0099007f000000470000000c00cd001f000400070000ff04008e00"], 0x30}, 0x1, 0x0, 0x0, 0x44}, 0x40000) r3 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800004, 0x12, r3, 0x0) preadv(r3, &(0x7f00000001c0)=[{0x0}], 0x1, 0x9, 0x0) mmap(&(0x7f0000000000/0xa000)=nil, 0xa000, 0x2, 0x2172, 0xffffffffffffffff, 0x0) r4 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000180), 0xffffffffffffffff) ioctl$sock_SIOCGIFINDEX_80211(r3, 0x8933, &(0x7f0000000200)={'wlan0\x00', 0x0}) sendmsg$NL80211_CMD_REGISTER_FRAME(r3, &(0x7f0000000300)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x2000}, 0xc, &(0x7f00000002c0)={&(0x7f0000000240)={0x60, r4, 0x100, 0x70bd29, 0x25dfdbfc, {{}, {@val={0x8, 0x3, r5}, @val={0xc, 0x99, {0x9de00000, 0x6b}}}}, [@NL80211_ATTR_FRAME_TYPE={0x6}, @NL80211_ATTR_FRAME_TYPE={0x6, 0x65, 0x7f}, @NL80211_ATTR_FRAME_TYPE={0x6, 0x65, 0x8}, @NL80211_ATTR_FRAME_TYPE={0x6}, @NL80211_ATTR_FRAME_TYPE={0x6, 0x65, 0xc0}, @NL80211_ATTR_FRAME_TYPE={0x6, 0x65, 0x2e30}, @NL80211_ATTR_FRAME_TYPE={0x6, 0x65, 0x6}]}, 0x60}, 0x1, 0x0, 0x0, 0x10}, 0x4) r6 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r6, &(0x7f0000000380)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x80, 0x1, 0x9, 0x1, 0x2, 0x3e, 0x7ff, 0x1f2, 0x40, 0x1f4, 0xbfa, 0x3, 0x38, 0x1, 0x5, 0x4, 0x4}, [{0x5, 0x9, 0x6, 0x101, 0x6, 0x4, 0x9, 0x6}, {0x5, 0x3, 0x5e61, 0x80000000, 0xcc3, 0x9, 0x7, 0x8}], "d1660f10e0ac4a6edbf3aa53803c8f57ef2a12069e82553332d2b96d67f2dbc5b04959dad57c303d876233684f5e9ad402a193da791e11122f2cccbf10d6d499f5e16385d09f63891a965d80bcb68b551fabffb4bf0b5c372b4d69cdefac988201a40429a8d0dc699820193afcab08070fde89c22e16b43dde5e37d9a3df0cd352e8667f163774d9dc3c79571e5100046281", ['\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00']}, 0x842) 06:19:03 executing program 0: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800004, 0x12, 0xffffffffffffffff, 0x0) preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x9, 0x0) mmap(&(0x7f0000000000/0xa000)=nil, 0xa000, 0x2, 0x2172, 0xffffffffffffffff, 0x0) syz_mount_image$reiserfs(&(0x7f0000000140), &(0x7f0000000180)='./file0\x00', 0x8000, 0x3, &(0x7f0000000300)=[{&(0x7f0000000540)="21d37ef07e82e237fbe1b40158d20e242c5ea1f9d9edc6b9395250085d6dfa486982e82d4ce1a5e2bc00d29383bae640de", 0x31, 0x7}, {&(0x7f0000000240)="c43f281f483aa6cd83e40e59d53f177299d285bbe5d90aab2b56a76f9db49d86afa5a0f601ba9b3502de5f3724f3ec00927151f928f668b362052950a2e8f16baec29875fdad59395e86a1050c368933e3ed5a17d76bd7bded793436ea207885f395ace3fc12126c205b170be392c1645233ef01f9661090706a65f63b4845dc2884a20711a8024ad4af44aeec9db33991dae38d95cdb7132970d0d4dec58b9d46d378", 0xa3, 0x6}, {&(0x7f0000000380)="05f82c760d277896dd8c9891a41aafe24124891a32a238c3c78696d112aa09f3ae5c54b0c08676da5db7f358c72dfaca9a5d90860b4ae363c9a921c47965d339c23408a6d9b31a23aee27822f0a140d8e4ec9475a740113f2b9923b46333110e528e0a513151aad34aee1b5310fcf62c1982349253003d6d53aebbe09cf5918668ee682be93b6a671bbc", 0x8a, 0x3}], 0x2000400, &(0x7f0000000440)={[{@balloc_no_unhash_reloc}, {@nolargeio}, {@grpjquota}], [{@obj_role={'obj_role', 0x3d, '^'}}, {@hash}, {@uid_lt}, {@mask={'mask', 0x3d, 'MAY_EXEC'}}, {@uid_lt={'uid<', 0xee00}}, {@smackfsfloor={'smackfsfloor', 0x3d, ':%#[@'}}, {@obj_user={'obj_user', 0x3d, ',\\*),i'}}, {@uid_eq={'uid', 0x3d, 0xee00}}, {@seclabel}, {@uid_lt={'uid<', 0xee00}}]}) 06:19:03 executing program 1: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800004, 0x12, r0, 0x0) mmap(&(0x7f0000000000/0xa000)=nil, 0xa000, 0x2, 0x2172, 0xffffffffffffffff, 0x0) r1 = socket$unix(0x1, 0x1, 0x0) bind$unix(r1, &(0x7f00000001c0)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x56) close(r1) 06:19:03 executing program 3: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800004, 0x12, r0, 0x0) preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x9, 0x0) mmap(&(0x7f0000000000/0xa000)=nil, 0xa000, 0x2, 0x2172, 0xffffffffffffffff, 0x0) r1 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x11, 0x3, &(0x7f00000000c0)=@framed, &(0x7f00000001c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x74) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='ext4_es_lookup_extent_exit\x00', r1}, 0x10) r2 = socket$unix(0x1, 0x1, 0x0) bind$unix(r2, 0x0, 0x0) [ 345.766648][T15731] loop0: detected capacity change from 0 to 64 [ 345.781182][T15731] REISERFS warning (device loop0): super-6504 reiserfs_getopt: the option "nolargeio" requires an argument [ 345.781182][T15731] 06:19:03 executing program 1: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800004, 0x12, r0, 0x0) mmap(&(0x7f0000000000/0xa000)=nil, 0xa000, 0x2, 0x2172, 0xffffffffffffffff, 0x0) r1 = socket$unix(0x1, 0x1, 0x0) bind$unix(r1, &(0x7f00000001c0)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x56) close(r1) 06:19:03 executing program 3: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800004, 0x12, r0, 0x0) preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x9, 0x0) mmap(&(0x7f0000000000/0xa000)=nil, 0xa000, 0x2, 0x2172, 0xffffffffffffffff, 0x0) r1 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x11, 0x3, &(0x7f00000000c0)=@framed, &(0x7f00000001c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x74) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='ext4_es_lookup_extent_exit\x00', r1}, 0x10) r2 = socket$unix(0x1, 0x1, 0x0) bind$unix(r2, &(0x7f00000001c0)=@file={0x0, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x56) 06:19:03 executing program 1: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x9, 0x0) mmap(&(0x7f0000000000/0xa000)=nil, 0xa000, 0x2, 0x2172, 0xffffffffffffffff, 0x0) r1 = socket$unix(0x1, 0x1, 0x0) bind$unix(r1, &(0x7f00000001c0)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x56) close(r1) 06:19:03 executing program 0: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800004, 0x12, 0xffffffffffffffff, 0x0) preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x9, 0x0) mmap(&(0x7f0000000000/0xa000)=nil, 0xa000, 0x2, 0x2172, 0xffffffffffffffff, 0x0) syz_mount_image$reiserfs(&(0x7f0000000140), &(0x7f0000000180)='./file0\x00', 0x8000, 0x3, &(0x7f0000000300)=[{&(0x7f0000000540)="21d37ef07e82e237fbe1b40158d20e242c5ea1f9d9edc6b9395250085d6dfa486982e82d4ce1a5e2bc00d29383bae640de", 0x31, 0x7}, {&(0x7f0000000240)="c43f281f483aa6cd83e40e59d53f177299d285bbe5d90aab2b56a76f9db49d86afa5a0f601ba9b3502de5f3724f3ec00927151f928f668b362052950a2e8f16baec29875fdad59395e86a1050c368933e3ed5a17d76bd7bded793436ea207885f395ace3fc12126c205b170be392c1645233ef01f9661090706a65f63b4845dc2884a20711a8024ad4af44aeec9db33991dae38d95cdb7132970d0d4dec58b9d46d378", 0xa3, 0x6}, {&(0x7f0000000380)="05f82c760d277896dd8c9891a41aafe24124891a32a238c3c78696d112aa09f3ae5c54b0c08676da5db7f358c72dfaca9a5d90860b4ae363c9a921c47965d339c23408a6d9b31a23aee27822f0a140d8e4ec9475a740113f2b9923b46333110e528e0a513151aad34aee1b5310fcf62c1982349253003d6d53aebbe09cf5918668ee682be93b6a671bbc", 0x8a, 0x3}], 0x2000400, &(0x7f0000000440)={[{@balloc_no_unhash_reloc}, {@nolargeio}, {@grpjquota}], [{@obj_role={'obj_role', 0x3d, '^'}}, {@hash}, {@uid_lt}, {@mask={'mask', 0x3d, 'MAY_EXEC'}}, {@uid_lt={'uid<', 0xee00}}, {@smackfsfloor={'smackfsfloor', 0x3d, ':%#[@'}}, {@obj_user={'obj_user', 0x3d, ',\\*),i'}}, {@uid_eq={'uid', 0x3d, 0xee00}}, {@seclabel}, {@uid_lt={'uid<', 0xee00}}]}) [ 346.010753][T15747] loop0: detected capacity change from 0 to 64 [ 346.040250][T15747] REISERFS warning (device loop0): super-6504 reiserfs_getopt: the option "nolargeio" requires an argument [ 346.040250][T15747] 06:19:04 executing program 2: r0 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000680), 0xffffffffffffffff) ioctl$sock_SIOCGIFINDEX_80211(0xffffffffffffffff, 0x8933, &(0x7f0000000c00)={'wlan1\x00'}) r1 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX_80211(r1, 0x8933, &(0x7f0000000e40)={'wlan0\x00', 0x0}) sendmsg$NL80211_CMD_TRIGGER_SCAN(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000f40)={&(0x7f0000000000)=ANY=[@ANYBLOB='$\x00\x00\x00', @ANYRES16=r0, @ANYBLOB="010000000000000000002100000008000300", @ANYRES32=r2, @ANYBLOB="08009e"], 0x24}}, 0x0) sendmsg$NL80211_CMD_FRAME(0xffffffffffffffff, &(0x7f0000000100)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f00000000c0)={&(0x7f0000000c40)=ANY=[@ANYBLOB="2000000059c89a20a00fadf00ada0277887124d85c2b6f27e866a2f2434f0213672fd63827c4c50f5346d89412d5351da4a233d419db04d5f089f764866116182e7757ccfd", @ANYRES16=r0, @ANYBLOB="00022dbd7000fedbdf253b0000000c0099007f000000470000000c00cd001f000400070000ff04008e00"], 0x30}, 0x1, 0x0, 0x0, 0x44}, 0x40000) r3 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800004, 0x12, r3, 0x0) preadv(r3, &(0x7f00000001c0)=[{0x0}], 0x1, 0x9, 0x0) mmap(&(0x7f0000000000/0xa000)=nil, 0xa000, 0x2, 0x2172, 0xffffffffffffffff, 0x0) r4 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000180), 0xffffffffffffffff) ioctl$sock_SIOCGIFINDEX_80211(r3, 0x8933, &(0x7f0000000200)={'wlan0\x00', 0x0}) sendmsg$NL80211_CMD_REGISTER_FRAME(r3, &(0x7f0000000300)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x2000}, 0xc, &(0x7f00000002c0)={&(0x7f0000000240)={0x60, r4, 0x100, 0x70bd29, 0x25dfdbfc, {{}, {@val={0x8, 0x3, r5}, @val={0xc, 0x99, {0x9de00000, 0x6b}}}}, [@NL80211_ATTR_FRAME_TYPE={0x6}, @NL80211_ATTR_FRAME_TYPE={0x6, 0x65, 0x7f}, @NL80211_ATTR_FRAME_TYPE={0x6, 0x65, 0x8}, @NL80211_ATTR_FRAME_TYPE={0x6}, @NL80211_ATTR_FRAME_TYPE={0x6, 0x65, 0xc0}, @NL80211_ATTR_FRAME_TYPE={0x6, 0x65, 0x2e30}, @NL80211_ATTR_FRAME_TYPE={0x6, 0x65, 0x6}]}, 0x60}, 0x1, 0x0, 0x0, 0x10}, 0x4) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000380)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x80, 0x1, 0x9, 0x1, 0x2, 0x3e, 0x7ff, 0x1f2, 0x40, 0x1f4, 0xbfa, 0x3, 0x38, 0x1, 0x5, 0x4, 0x4}, [{0x5, 0x9, 0x6, 0x101, 0x6, 0x4, 0x9, 0x6}, {0x5, 0x3, 0x5e61, 0x80000000, 0xcc3, 0x9, 0x7, 0x8}], "d1660f10e0ac4a6edbf3aa53803c8f57ef2a12069e82553332d2b96d67f2dbc5b04959dad57c303d876233684f5e9ad402a193da791e11122f2cccbf10d6d499f5e16385d09f63891a965d80bcb68b551fabffb4bf0b5c372b4d69cdefac988201a40429a8d0dc699820193afcab08070fde89c22e16b43dde5e37d9a3df0cd352e8667f163774d9dc3c79571e5100046281", ['\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00']}, 0x842) 06:19:04 executing program 3: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800004, 0x12, r0, 0x0) preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x9, 0x0) mmap(&(0x7f0000000000/0xa000)=nil, 0xa000, 0x2, 0x2172, 0xffffffffffffffff, 0x0) r1 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x11, 0x3, &(0x7f00000000c0)=@framed, &(0x7f00000001c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x74) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='ext4_es_lookup_extent_exit\x00', r1}, 0x10) r2 = socket$unix(0x1, 0x1, 0x0) bind$unix(r2, &(0x7f00000001c0)=@file={0x0, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x56) 06:19:04 executing program 1: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x9, 0x0) mmap(&(0x7f0000000000/0xa000)=nil, 0xa000, 0x2, 0x2172, 0xffffffffffffffff, 0x0) r1 = socket$unix(0x1, 0x1, 0x0) bind$unix(r1, &(0x7f00000001c0)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x56) close(r1) 06:19:04 executing program 0: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800004, 0x12, r0, 0x0) preadv(0xffffffffffffffff, &(0x7f00000001c0)=[{0x0}], 0x1, 0x9, 0x0) mmap(&(0x7f0000000000/0xa000)=nil, 0xa000, 0x2, 0x2172, 0xffffffffffffffff, 0x0) syz_mount_image$reiserfs(&(0x7f0000000140), &(0x7f0000000180)='./file0\x00', 0x8000, 0x3, &(0x7f0000000300)=[{&(0x7f0000000540)="21d37ef07e82e237fbe1b40158d20e242c5ea1f9d9edc6b9395250085d6dfa486982e82d4ce1a5e2bc00d29383bae640de", 0x31, 0x7}, {&(0x7f0000000240)="c43f281f483aa6cd83e40e59d53f177299d285bbe5d90aab2b56a76f9db49d86afa5a0f601ba9b3502de5f3724f3ec00927151f928f668b362052950a2e8f16baec29875fdad59395e86a1050c368933e3ed5a17d76bd7bded793436ea207885f395ace3fc12126c205b170be392c1645233ef01f9661090706a65f63b4845dc2884a20711a8024ad4af44aeec9db33991dae38d95cdb7132970d0d4dec58b9d46d378", 0xa3, 0x6}, {&(0x7f0000000380)="05f82c760d277896dd8c9891a41aafe24124891a32a238c3c78696d112aa09f3ae5c54b0c08676da5db7f358c72dfaca9a5d90860b4ae363c9a921c47965d339c23408a6d9b31a23aee27822f0a140d8e4ec9475a740113f2b9923b46333110e528e0a513151aad34aee1b5310fcf62c1982349253003d6d53aebbe09cf5918668ee682be93b6a671bbc", 0x8a, 0x3}], 0x2000400, &(0x7f0000000440)={[{@balloc_no_unhash_reloc}, {@nolargeio}, {@grpjquota}], [{@obj_role={'obj_role', 0x3d, '^'}}, {@hash}, {@uid_lt}, {@mask={'mask', 0x3d, 'MAY_EXEC'}}, {@uid_lt={'uid<', 0xee00}}, {@smackfsfloor={'smackfsfloor', 0x3d, ':%#[@'}}, {@obj_user={'obj_user', 0x3d, ',\\*),i'}}, {@uid_eq={'uid', 0x3d, 0xee00}}, {@seclabel}, {@uid_lt={'uid<', 0xee00}}]}) [ 346.685831][T15758] loop0: detected capacity change from 0 to 64 [ 346.727768][T15758] REISERFS warning (device loop0): super-6504 reiserfs_getopt: the option "nolargeio" requires an argument [ 346.727768][T15758] 06:19:04 executing program 2: r0 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000680), 0xffffffffffffffff) ioctl$sock_SIOCGIFINDEX_80211(0xffffffffffffffff, 0x8933, &(0x7f0000000c00)={'wlan1\x00'}) r1 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX_80211(r1, 0x8933, &(0x7f0000000e40)={'wlan0\x00', 0x0}) sendmsg$NL80211_CMD_TRIGGER_SCAN(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000f40)={&(0x7f0000000000)=ANY=[@ANYBLOB='$\x00\x00\x00', @ANYRES16=r0, @ANYBLOB="010000000000000000002100000008000300", @ANYRES32=r2, @ANYBLOB="08009e"], 0x24}}, 0x0) sendmsg$NL80211_CMD_FRAME(0xffffffffffffffff, &(0x7f0000000100)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f00000000c0)={&(0x7f0000000c40)=ANY=[@ANYBLOB="2000000059c89a20a00fadf00ada0277887124d85c2b6f27e866a2f2434f0213672fd63827c4c50f5346d89412d5351da4a233d419db04d5f089f764866116182e7757ccfd", @ANYRES16=r0, @ANYBLOB="00022dbd7000fedbdf253b0000000c0099007f000000470000000c00cd001f000400070000ff04008e00"], 0x30}, 0x1, 0x0, 0x0, 0x44}, 0x40000) r3 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800004, 0x12, r3, 0x0) preadv(r3, &(0x7f00000001c0)=[{0x0}], 0x1, 0x9, 0x0) mmap(&(0x7f0000000000/0xa000)=nil, 0xa000, 0x2, 0x2172, 0xffffffffffffffff, 0x0) r4 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000180), 0xffffffffffffffff) ioctl$sock_SIOCGIFINDEX_80211(r3, 0x8933, &(0x7f0000000200)={'wlan0\x00', 0x0}) sendmsg$NL80211_CMD_REGISTER_FRAME(r3, &(0x7f0000000300)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x2000}, 0xc, &(0x7f00000002c0)={&(0x7f0000000240)={0x60, r4, 0x100, 0x70bd29, 0x25dfdbfc, {{}, {@val={0x8, 0x3, r5}, @val={0xc, 0x99, {0x9de00000, 0x6b}}}}, [@NL80211_ATTR_FRAME_TYPE={0x6}, @NL80211_ATTR_FRAME_TYPE={0x6, 0x65, 0x7f}, @NL80211_ATTR_FRAME_TYPE={0x6, 0x65, 0x8}, @NL80211_ATTR_FRAME_TYPE={0x6}, @NL80211_ATTR_FRAME_TYPE={0x6, 0x65, 0xc0}, @NL80211_ATTR_FRAME_TYPE={0x6, 0x65, 0x2e30}, @NL80211_ATTR_FRAME_TYPE={0x6, 0x65, 0x6}]}, 0x60}, 0x1, 0x0, 0x0, 0x10}, 0x4) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000380)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x80, 0x1, 0x9, 0x1, 0x2, 0x3e, 0x7ff, 0x1f2, 0x40, 0x1f4, 0xbfa, 0x3, 0x38, 0x1, 0x5, 0x4, 0x4}, [{0x5, 0x9, 0x6, 0x101, 0x6, 0x4, 0x9, 0x6}, {0x5, 0x3, 0x5e61, 0x80000000, 0xcc3, 0x9, 0x7, 0x8}], "d1660f10e0ac4a6edbf3aa53803c8f57ef2a12069e82553332d2b96d67f2dbc5b04959dad57c303d876233684f5e9ad402a193da791e11122f2cccbf10d6d499f5e16385d09f63891a965d80bcb68b551fabffb4bf0b5c372b4d69cdefac988201a40429a8d0dc699820193afcab08070fde89c22e16b43dde5e37d9a3df0cd352e8667f163774d9dc3c79571e5100046281", ['\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00']}, 0x842) 06:19:04 executing program 1: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x9, 0x0) mmap(&(0x7f0000000000/0xa000)=nil, 0xa000, 0x2, 0x2172, 0xffffffffffffffff, 0x0) r1 = socket$unix(0x1, 0x1, 0x0) bind$unix(r1, &(0x7f00000001c0)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x56) close(r1) 06:19:04 executing program 0: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800004, 0x12, r0, 0x0) preadv(0xffffffffffffffff, &(0x7f00000001c0)=[{0x0}], 0x1, 0x9, 0x0) mmap(&(0x7f0000000000/0xa000)=nil, 0xa000, 0x2, 0x2172, 0xffffffffffffffff, 0x0) syz_mount_image$reiserfs(&(0x7f0000000140), &(0x7f0000000180)='./file0\x00', 0x8000, 0x3, &(0x7f0000000300)=[{&(0x7f0000000540)="21d37ef07e82e237fbe1b40158d20e242c5ea1f9d9edc6b9395250085d6dfa486982e82d4ce1a5e2bc00d29383bae640de", 0x31, 0x7}, {&(0x7f0000000240)="c43f281f483aa6cd83e40e59d53f177299d285bbe5d90aab2b56a76f9db49d86afa5a0f601ba9b3502de5f3724f3ec00927151f928f668b362052950a2e8f16baec29875fdad59395e86a1050c368933e3ed5a17d76bd7bded793436ea207885f395ace3fc12126c205b170be392c1645233ef01f9661090706a65f63b4845dc2884a20711a8024ad4af44aeec9db33991dae38d95cdb7132970d0d4dec58b9d46d378", 0xa3, 0x6}, {&(0x7f0000000380)="05f82c760d277896dd8c9891a41aafe24124891a32a238c3c78696d112aa09f3ae5c54b0c08676da5db7f358c72dfaca9a5d90860b4ae363c9a921c47965d339c23408a6d9b31a23aee27822f0a140d8e4ec9475a740113f2b9923b46333110e528e0a513151aad34aee1b5310fcf62c1982349253003d6d53aebbe09cf5918668ee682be93b6a671bbc", 0x8a, 0x3}], 0x2000400, &(0x7f0000000440)={[{@balloc_no_unhash_reloc}, {@nolargeio}, {@grpjquota}], [{@obj_role={'obj_role', 0x3d, '^'}}, {@hash}, {@uid_lt}, {@mask={'mask', 0x3d, 'MAY_EXEC'}}, {@uid_lt={'uid<', 0xee00}}, {@smackfsfloor={'smackfsfloor', 0x3d, ':%#[@'}}, {@obj_user={'obj_user', 0x3d, ',\\*),i'}}, {@uid_eq={'uid', 0x3d, 0xee00}}, {@seclabel}, {@uid_lt={'uid<', 0xee00}}]}) 06:19:04 executing program 3: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800004, 0x12, r0, 0x0) preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x9, 0x0) mmap(&(0x7f0000000000/0xa000)=nil, 0xa000, 0x2, 0x2172, 0xffffffffffffffff, 0x0) r1 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x11, 0x3, &(0x7f00000000c0)=@framed, &(0x7f00000001c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x74) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='ext4_es_lookup_extent_exit\x00', r1}, 0x10) r2 = socket$unix(0x1, 0x1, 0x0) bind$unix(r2, &(0x7f00000001c0)=@file={0x0, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x56) 06:19:04 executing program 1: mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800004, 0x12, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f00000001c0)=[{0x0}], 0x1, 0x9, 0x0) mmap(&(0x7f0000000000/0xa000)=nil, 0xa000, 0x2, 0x2172, 0xffffffffffffffff, 0x0) r0 = socket$unix(0x1, 0x1, 0x0) bind$unix(r0, &(0x7f00000001c0)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x56) close(r0) 06:19:04 executing program 2: r0 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000680), 0xffffffffffffffff) ioctl$sock_SIOCGIFINDEX_80211(0xffffffffffffffff, 0x8933, &(0x7f0000000c00)={'wlan1\x00'}) r1 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX_80211(r1, 0x8933, &(0x7f0000000e40)={'wlan0\x00', 0x0}) sendmsg$NL80211_CMD_TRIGGER_SCAN(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000f40)={&(0x7f0000000000)=ANY=[@ANYBLOB='$\x00\x00\x00', @ANYRES16=r0, @ANYBLOB="010000000000000000002100000008000300", @ANYRES32=r2, @ANYBLOB="08009e"], 0x24}}, 0x0) sendmsg$NL80211_CMD_FRAME(0xffffffffffffffff, &(0x7f0000000100)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f00000000c0)={&(0x7f0000000c40)=ANY=[@ANYBLOB="2000000059c89a20a00fadf00ada0277887124d85c2b6f27e866a2f2434f0213672fd63827c4c50f5346d89412d5351da4a233d419db04d5f089f764866116182e7757ccfd", @ANYRES16=r0, @ANYBLOB="00022dbd7000fedbdf253b0000000c0099007f000000470000000c00cd001f000400070000ff04008e00"], 0x30}, 0x1, 0x0, 0x0, 0x44}, 0x40000) r3 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800004, 0x12, r3, 0x0) preadv(r3, &(0x7f00000001c0)=[{0x0}], 0x1, 0x9, 0x0) mmap(&(0x7f0000000000/0xa000)=nil, 0xa000, 0x2, 0x2172, 0xffffffffffffffff, 0x0) r4 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000180), 0xffffffffffffffff) ioctl$sock_SIOCGIFINDEX_80211(r3, 0x8933, &(0x7f0000000200)={'wlan0\x00', 0x0}) sendmsg$NL80211_CMD_REGISTER_FRAME(r3, &(0x7f0000000300)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x2000}, 0xc, &(0x7f00000002c0)={&(0x7f0000000240)={0x60, r4, 0x100, 0x70bd29, 0x25dfdbfc, {{}, {@val={0x8, 0x3, r5}, @val={0xc, 0x99, {0x9de00000, 0x6b}}}}, [@NL80211_ATTR_FRAME_TYPE={0x6}, @NL80211_ATTR_FRAME_TYPE={0x6, 0x65, 0x7f}, @NL80211_ATTR_FRAME_TYPE={0x6, 0x65, 0x8}, @NL80211_ATTR_FRAME_TYPE={0x6}, @NL80211_ATTR_FRAME_TYPE={0x6, 0x65, 0xc0}, @NL80211_ATTR_FRAME_TYPE={0x6, 0x65, 0x2e30}, @NL80211_ATTR_FRAME_TYPE={0x6, 0x65, 0x6}]}, 0x60}, 0x1, 0x0, 0x0, 0x10}, 0x4) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000380)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x80, 0x1, 0x9, 0x1, 0x2, 0x3e, 0x7ff, 0x1f2, 0x40, 0x1f4, 0xbfa, 0x3, 0x38, 0x1, 0x5, 0x4, 0x4}, [{0x5, 0x9, 0x6, 0x101, 0x6, 0x4, 0x9, 0x6}, {0x5, 0x3, 0x5e61, 0x80000000, 0xcc3, 0x9, 0x7, 0x8}], "d1660f10e0ac4a6edbf3aa53803c8f57ef2a12069e82553332d2b96d67f2dbc5b04959dad57c303d876233684f5e9ad402a193da791e11122f2cccbf10d6d499f5e16385d09f63891a965d80bcb68b551fabffb4bf0b5c372b4d69cdefac988201a40429a8d0dc699820193afcab08070fde89c22e16b43dde5e37d9a3df0cd352e8667f163774d9dc3c79571e5100046281", ['\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00']}, 0x842) [ 347.017506][T15778] loop0: detected capacity change from 0 to 64 [ 347.033649][T15778] REISERFS warning (device loop0): super-6504 reiserfs_getopt: the option "nolargeio" requires an argument [ 347.033649][T15778] 06:19:04 executing program 2: r0 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000680), 0xffffffffffffffff) ioctl$sock_SIOCGIFINDEX_80211(0xffffffffffffffff, 0x8933, &(0x7f0000000c00)={'wlan1\x00'}) r1 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX_80211(r1, 0x8933, &(0x7f0000000e40)={'wlan0\x00', 0x0}) sendmsg$NL80211_CMD_TRIGGER_SCAN(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000f40)={&(0x7f0000000000)=ANY=[@ANYBLOB='$\x00\x00\x00', @ANYRES16=r0, @ANYBLOB="010000000000000000002100000008000300", @ANYRES32=r2, @ANYBLOB="08009e"], 0x24}}, 0x0) sendmsg$NL80211_CMD_FRAME(0xffffffffffffffff, &(0x7f0000000100)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f00000000c0)={&(0x7f0000000c40)=ANY=[@ANYBLOB="2000000059c89a20a00fadf00ada0277887124d85c2b6f27e866a2f2434f0213672fd63827c4c50f5346d89412d5351da4a233d419db04d5f089f764866116182e7757ccfd", @ANYRES16=r0, @ANYBLOB="00022dbd7000fedbdf253b0000000c0099007f000000470000000c00cd001f000400070000ff04008e00"], 0x30}, 0x1, 0x0, 0x0, 0x44}, 0x40000) r3 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800004, 0x12, r3, 0x0) preadv(r3, &(0x7f00000001c0)=[{0x0}], 0x1, 0x9, 0x0) mmap(&(0x7f0000000000/0xa000)=nil, 0xa000, 0x2, 0x2172, 0xffffffffffffffff, 0x0) syz_genetlink_get_family_id$nl80211(&(0x7f0000000180), 0xffffffffffffffff) ioctl$sock_SIOCGIFINDEX_80211(r3, 0x8933, &(0x7f0000000200)={'wlan0\x00'}) r4 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r4, &(0x7f0000000380)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x80, 0x1, 0x9, 0x1, 0x2, 0x3e, 0x7ff, 0x1f2, 0x40, 0x1f4, 0xbfa, 0x3, 0x38, 0x1, 0x5, 0x4, 0x4}, [{0x5, 0x9, 0x6, 0x101, 0x6, 0x4, 0x9, 0x6}, {0x5, 0x3, 0x5e61, 0x80000000, 0xcc3, 0x9, 0x7, 0x8}], "d1660f10e0ac4a6edbf3aa53803c8f57ef2a12069e82553332d2b96d67f2dbc5b04959dad57c303d876233684f5e9ad402a193da791e11122f2cccbf10d6d499f5e16385d09f63891a965d80bcb68b551fabffb4bf0b5c372b4d69cdefac988201a40429a8d0dc699820193afcab08070fde89c22e16b43dde5e37d9a3df0cd352e8667f163774d9dc3c79571e5100046281", ['\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00']}, 0x842) 06:19:04 executing program 3: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800004, 0x12, r0, 0x0) mmap(&(0x7f0000000000/0xa000)=nil, 0xa000, 0x2, 0x2172, 0xffffffffffffffff, 0x0) r1 = socket$unix(0x1, 0x1, 0x0) bind$unix(r1, &(0x7f00000001c0)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x56) close(r1) 06:19:04 executing program 1: mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800004, 0x12, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f00000001c0)=[{0x0}], 0x1, 0x9, 0x0) mmap(&(0x7f0000000000/0xa000)=nil, 0xa000, 0x2, 0x2172, 0xffffffffffffffff, 0x0) r0 = socket$unix(0x1, 0x1, 0x0) bind$unix(r0, &(0x7f00000001c0)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x56) close(r0) 06:19:04 executing program 0: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800004, 0x12, r0, 0x0) preadv(0xffffffffffffffff, &(0x7f00000001c0)=[{0x0}], 0x1, 0x9, 0x0) mmap(&(0x7f0000000000/0xa000)=nil, 0xa000, 0x2, 0x2172, 0xffffffffffffffff, 0x0) syz_mount_image$reiserfs(&(0x7f0000000140), &(0x7f0000000180)='./file0\x00', 0x8000, 0x3, &(0x7f0000000300)=[{&(0x7f0000000540)="21d37ef07e82e237fbe1b40158d20e242c5ea1f9d9edc6b9395250085d6dfa486982e82d4ce1a5e2bc00d29383bae640de", 0x31, 0x7}, {&(0x7f0000000240)="c43f281f483aa6cd83e40e59d53f177299d285bbe5d90aab2b56a76f9db49d86afa5a0f601ba9b3502de5f3724f3ec00927151f928f668b362052950a2e8f16baec29875fdad59395e86a1050c368933e3ed5a17d76bd7bded793436ea207885f395ace3fc12126c205b170be392c1645233ef01f9661090706a65f63b4845dc2884a20711a8024ad4af44aeec9db33991dae38d95cdb7132970d0d4dec58b9d46d378", 0xa3, 0x6}, {&(0x7f0000000380)="05f82c760d277896dd8c9891a41aafe24124891a32a238c3c78696d112aa09f3ae5c54b0c08676da5db7f358c72dfaca9a5d90860b4ae363c9a921c47965d339c23408a6d9b31a23aee27822f0a140d8e4ec9475a740113f2b9923b46333110e528e0a513151aad34aee1b5310fcf62c1982349253003d6d53aebbe09cf5918668ee682be93b6a671bbc", 0x8a, 0x3}], 0x2000400, &(0x7f0000000440)={[{@balloc_no_unhash_reloc}, {@nolargeio}, {@grpjquota}], [{@obj_role={'obj_role', 0x3d, '^'}}, {@hash}, {@uid_lt}, {@mask={'mask', 0x3d, 'MAY_EXEC'}}, {@uid_lt={'uid<', 0xee00}}, {@smackfsfloor={'smackfsfloor', 0x3d, ':%#[@'}}, {@obj_user={'obj_user', 0x3d, ',\\*),i'}}, {@uid_eq={'uid', 0x3d, 0xee00}}, {@seclabel}, {@uid_lt={'uid<', 0xee00}}]}) 06:19:04 executing program 3: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800004, 0x12, r0, 0x0) preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x9, 0x0) r1 = socket$unix(0x1, 0x1, 0x0) bind$unix(r1, &(0x7f00000001c0)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x56) close(r1) [ 347.293539][T15792] loop0: detected capacity change from 0 to 64 [ 347.310381][T15792] REISERFS warning (device loop0): super-6504 reiserfs_getopt: the option "nolargeio" requires an argument [ 347.310381][T15792] 06:19:04 executing program 3: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800004, 0x12, r0, 0x0) preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x9, 0x0) r1 = socket$unix(0x1, 0x1, 0x0) bind$unix(r1, &(0x7f00000001c0)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x56) close(r1) 06:19:04 executing program 1: mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800004, 0x12, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f00000001c0)=[{0x0}], 0x1, 0x9, 0x0) mmap(&(0x7f0000000000/0xa000)=nil, 0xa000, 0x2, 0x2172, 0xffffffffffffffff, 0x0) r0 = socket$unix(0x1, 0x1, 0x0) bind$unix(r0, &(0x7f00000001c0)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x56) close(r0) 06:19:05 executing program 0: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800004, 0x12, r0, 0x0) preadv(r0, 0x0, 0x0, 0x9, 0x0) mmap(&(0x7f0000000000/0xa000)=nil, 0xa000, 0x2, 0x2172, 0xffffffffffffffff, 0x0) syz_mount_image$reiserfs(&(0x7f0000000140), &(0x7f0000000180)='./file0\x00', 0x8000, 0x3, &(0x7f0000000300)=[{&(0x7f0000000540)="21d37ef07e82e237fbe1b40158d20e242c5ea1f9d9edc6b9395250085d6dfa486982e82d4ce1a5e2bc00d29383bae640de", 0x31, 0x7}, {&(0x7f0000000240)="c43f281f483aa6cd83e40e59d53f177299d285bbe5d90aab2b56a76f9db49d86afa5a0f601ba9b3502de5f3724f3ec00927151f928f668b362052950a2e8f16baec29875fdad59395e86a1050c368933e3ed5a17d76bd7bded793436ea207885f395ace3fc12126c205b170be392c1645233ef01f9661090706a65f63b4845dc2884a20711a8024ad4af44aeec9db33991dae38d95cdb7132970d0d4dec58b9d46d378", 0xa3, 0x6}, {&(0x7f0000000380)="05f82c760d277896dd8c9891a41aafe24124891a32a238c3c78696d112aa09f3ae5c54b0c08676da5db7f358c72dfaca9a5d90860b4ae363c9a921c47965d339c23408a6d9b31a23aee27822f0a140d8e4ec9475a740113f2b9923b46333110e528e0a513151aad34aee1b5310fcf62c1982349253003d6d53aebbe09cf5918668ee682be93b6a671bbc", 0x8a, 0x3}], 0x2000400, &(0x7f0000000440)={[{@balloc_no_unhash_reloc}, {@nolargeio}, {@grpjquota}], [{@obj_role={'obj_role', 0x3d, '^'}}, {@hash}, {@uid_lt}, {@mask={'mask', 0x3d, 'MAY_EXEC'}}, {@uid_lt={'uid<', 0xee00}}, {@smackfsfloor={'smackfsfloor', 0x3d, ':%#[@'}}, {@obj_user={'obj_user', 0x3d, ',\\*),i'}}, {@uid_eq={'uid', 0x3d, 0xee00}}, {@seclabel}, {@uid_lt={'uid<', 0xee00}}]}) [ 347.494664][T15805] loop0: detected capacity change from 0 to 64 [ 347.513660][T15805] REISERFS warning (device loop0): super-6504 reiserfs_getopt: the option "nolargeio" requires an argument [ 347.513660][T15805] 06:19:05 executing program 2: r0 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000680), 0xffffffffffffffff) ioctl$sock_SIOCGIFINDEX_80211(0xffffffffffffffff, 0x8933, &(0x7f0000000c00)={'wlan1\x00'}) r1 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX_80211(r1, 0x8933, &(0x7f0000000e40)={'wlan0\x00', 0x0}) sendmsg$NL80211_CMD_TRIGGER_SCAN(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000f40)={&(0x7f0000000000)=ANY=[@ANYBLOB='$\x00\x00\x00', @ANYRES16=r0, @ANYBLOB="010000000000000000002100000008000300", @ANYRES32=r2, @ANYBLOB="08009e"], 0x24}}, 0x0) sendmsg$NL80211_CMD_FRAME(0xffffffffffffffff, &(0x7f0000000100)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f00000000c0)={&(0x7f0000000c40)=ANY=[@ANYBLOB="2000000059c89a20a00fadf00ada0277887124d85c2b6f27e866a2f2434f0213672fd63827c4c50f5346d89412d5351da4a233d419db04d5f089f764866116182e7757ccfd", @ANYRES16=r0, @ANYBLOB="00022dbd7000fedbdf253b0000000c0099007f000000470000000c00cd001f000400070000ff04008e00"], 0x30}, 0x1, 0x0, 0x0, 0x44}, 0x40000) r3 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800004, 0x12, r3, 0x0) preadv(r3, &(0x7f00000001c0)=[{0x0}], 0x1, 0x9, 0x0) mmap(&(0x7f0000000000/0xa000)=nil, 0xa000, 0x2, 0x2172, 0xffffffffffffffff, 0x0) syz_genetlink_get_family_id$nl80211(&(0x7f0000000180), 0xffffffffffffffff) r4 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r4, &(0x7f0000000380)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x80, 0x1, 0x9, 0x1, 0x2, 0x3e, 0x7ff, 0x1f2, 0x40, 0x1f4, 0xbfa, 0x3, 0x38, 0x1, 0x5, 0x4, 0x4}, [{0x5, 0x9, 0x6, 0x101, 0x6, 0x4, 0x9, 0x6}, {0x5, 0x3, 0x5e61, 0x80000000, 0xcc3, 0x9, 0x7, 0x8}], "d1660f10e0ac4a6edbf3aa53803c8f57ef2a12069e82553332d2b96d67f2dbc5b04959dad57c303d876233684f5e9ad402a193da791e11122f2cccbf10d6d499f5e16385d09f63891a965d80bcb68b551fabffb4bf0b5c372b4d69cdefac988201a40429a8d0dc699820193afcab08070fde89c22e16b43dde5e37d9a3df0cd352e8667f163774d9dc3c79571e5100046281", ['\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00']}, 0x842) 06:19:05 executing program 3: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800004, 0x12, r0, 0x0) preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x9, 0x0) r1 = socket$unix(0x1, 0x1, 0x0) bind$unix(r1, &(0x7f00000001c0)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x56) close(r1) 06:19:05 executing program 1: r0 = openat(0xffffffffffffffff, 0x0, 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800004, 0x12, r0, 0x0) preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x9, 0x0) mmap(&(0x7f0000000000/0xa000)=nil, 0xa000, 0x2, 0x2172, 0xffffffffffffffff, 0x0) r1 = socket$unix(0x1, 0x1, 0x0) bind$unix(r1, &(0x7f00000001c0)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x56) close(r1) 06:19:05 executing program 0: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800004, 0x12, r0, 0x0) preadv(r0, 0x0, 0x0, 0x9, 0x0) mmap(&(0x7f0000000000/0xa000)=nil, 0xa000, 0x2, 0x2172, 0xffffffffffffffff, 0x0) syz_mount_image$reiserfs(&(0x7f0000000140), &(0x7f0000000180)='./file0\x00', 0x8000, 0x3, &(0x7f0000000300)=[{&(0x7f0000000540)="21d37ef07e82e237fbe1b40158d20e242c5ea1f9d9edc6b9395250085d6dfa486982e82d4ce1a5e2bc00d29383bae640de", 0x31, 0x7}, {&(0x7f0000000240)="c43f281f483aa6cd83e40e59d53f177299d285bbe5d90aab2b56a76f9db49d86afa5a0f601ba9b3502de5f3724f3ec00927151f928f668b362052950a2e8f16baec29875fdad59395e86a1050c368933e3ed5a17d76bd7bded793436ea207885f395ace3fc12126c205b170be392c1645233ef01f9661090706a65f63b4845dc2884a20711a8024ad4af44aeec9db33991dae38d95cdb7132970d0d4dec58b9d46d378", 0xa3, 0x6}, {&(0x7f0000000380)="05f82c760d277896dd8c9891a41aafe24124891a32a238c3c78696d112aa09f3ae5c54b0c08676da5db7f358c72dfaca9a5d90860b4ae363c9a921c47965d339c23408a6d9b31a23aee27822f0a140d8e4ec9475a740113f2b9923b46333110e528e0a513151aad34aee1b5310fcf62c1982349253003d6d53aebbe09cf5918668ee682be93b6a671bbc", 0x8a, 0x3}], 0x2000400, &(0x7f0000000440)={[{@balloc_no_unhash_reloc}, {@nolargeio}, {@grpjquota}], [{@obj_role={'obj_role', 0x3d, '^'}}, {@hash}, {@uid_lt}, {@mask={'mask', 0x3d, 'MAY_EXEC'}}, {@uid_lt={'uid<', 0xee00}}, {@smackfsfloor={'smackfsfloor', 0x3d, ':%#[@'}}, {@obj_user={'obj_user', 0x3d, ',\\*),i'}}, {@uid_eq={'uid', 0x3d, 0xee00}}, {@seclabel}, {@uid_lt={'uid<', 0xee00}}]}) [ 348.063887][T15815] loop0: detected capacity change from 0 to 64 [ 348.097219][T15815] REISERFS warning (device loop0): super-6504 reiserfs_getopt: the option "nolargeio" requires an argument [ 348.097219][T15815] 06:19:05 executing program 3: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800004, 0x12, r0, 0x0) preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x9, 0x0) r1 = socket$unix(0x1, 0x1, 0x0) close(r1) 06:19:05 executing program 1: r0 = openat(0xffffffffffffffff, 0x0, 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800004, 0x12, r0, 0x0) preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x9, 0x0) mmap(&(0x7f0000000000/0xa000)=nil, 0xa000, 0x2, 0x2172, 0xffffffffffffffff, 0x0) r1 = socket$unix(0x1, 0x1, 0x0) bind$unix(r1, &(0x7f00000001c0)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x56) close(r1) 06:19:05 executing program 0: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800004, 0x12, r0, 0x0) preadv(r0, 0x0, 0x0, 0x9, 0x0) mmap(&(0x7f0000000000/0xa000)=nil, 0xa000, 0x2, 0x2172, 0xffffffffffffffff, 0x0) syz_mount_image$reiserfs(&(0x7f0000000140), &(0x7f0000000180)='./file0\x00', 0x8000, 0x3, &(0x7f0000000300)=[{&(0x7f0000000540)="21d37ef07e82e237fbe1b40158d20e242c5ea1f9d9edc6b9395250085d6dfa486982e82d4ce1a5e2bc00d29383bae640de", 0x31, 0x7}, {&(0x7f0000000240)="c43f281f483aa6cd83e40e59d53f177299d285bbe5d90aab2b56a76f9db49d86afa5a0f601ba9b3502de5f3724f3ec00927151f928f668b362052950a2e8f16baec29875fdad59395e86a1050c368933e3ed5a17d76bd7bded793436ea207885f395ace3fc12126c205b170be392c1645233ef01f9661090706a65f63b4845dc2884a20711a8024ad4af44aeec9db33991dae38d95cdb7132970d0d4dec58b9d46d378", 0xa3, 0x6}, {&(0x7f0000000380)="05f82c760d277896dd8c9891a41aafe24124891a32a238c3c78696d112aa09f3ae5c54b0c08676da5db7f358c72dfaca9a5d90860b4ae363c9a921c47965d339c23408a6d9b31a23aee27822f0a140d8e4ec9475a740113f2b9923b46333110e528e0a513151aad34aee1b5310fcf62c1982349253003d6d53aebbe09cf5918668ee682be93b6a671bbc", 0x8a, 0x3}], 0x2000400, &(0x7f0000000440)={[{@balloc_no_unhash_reloc}, {@nolargeio}, {@grpjquota}], [{@obj_role={'obj_role', 0x3d, '^'}}, {@hash}, {@uid_lt}, {@mask={'mask', 0x3d, 'MAY_EXEC'}}, {@uid_lt={'uid<', 0xee00}}, {@smackfsfloor={'smackfsfloor', 0x3d, ':%#[@'}}, {@obj_user={'obj_user', 0x3d, ',\\*),i'}}, {@uid_eq={'uid', 0x3d, 0xee00}}, {@seclabel}, {@uid_lt={'uid<', 0xee00}}]}) 06:19:05 executing program 1: r0 = openat(0xffffffffffffffff, 0x0, 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800004, 0x12, r0, 0x0) preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x9, 0x0) mmap(&(0x7f0000000000/0xa000)=nil, 0xa000, 0x2, 0x2172, 0xffffffffffffffff, 0x0) r1 = socket$unix(0x1, 0x1, 0x0) bind$unix(r1, &(0x7f00000001c0)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x56) close(r1) [ 348.248852][T15830] loop0: detected capacity change from 0 to 64 [ 348.278945][T15830] REISERFS warning (device loop0): super-6504 reiserfs_getopt: the option "nolargeio" requires an argument [ 348.278945][T15830] [ 348.692863][ T3408] ieee802154 phy0 wpan0: encryption failed: -22 [ 348.701551][ T3408] ieee802154 phy1 wpan1: encryption failed: -22 06:19:06 executing program 2: r0 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000680), 0xffffffffffffffff) ioctl$sock_SIOCGIFINDEX_80211(0xffffffffffffffff, 0x8933, &(0x7f0000000c00)={'wlan1\x00'}) r1 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX_80211(r1, 0x8933, &(0x7f0000000e40)={'wlan0\x00', 0x0}) sendmsg$NL80211_CMD_TRIGGER_SCAN(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000f40)={&(0x7f0000000000)=ANY=[@ANYBLOB='$\x00\x00\x00', @ANYRES16=r0, @ANYBLOB="010000000000000000002100000008000300", @ANYRES32=r2, @ANYBLOB="08009e"], 0x24}}, 0x0) sendmsg$NL80211_CMD_FRAME(0xffffffffffffffff, &(0x7f0000000100)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f00000000c0)={&(0x7f0000000c40)=ANY=[@ANYBLOB="2000000059c89a20a00fadf00ada0277887124d85c2b6f27e866a2f2434f0213672fd63827c4c50f5346d89412d5351da4a233d419db04d5f089f764866116182e7757ccfd", @ANYRES16=r0, @ANYBLOB="00022dbd7000fedbdf253b0000000c0099007f000000470000000c00cd001f000400070000ff04008e00"], 0x30}, 0x1, 0x0, 0x0, 0x44}, 0x40000) r3 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800004, 0x12, r3, 0x0) preadv(r3, &(0x7f00000001c0)=[{0x0}], 0x1, 0x9, 0x0) mmap(&(0x7f0000000000/0xa000)=nil, 0xa000, 0x2, 0x2172, 0xffffffffffffffff, 0x0) r4 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r4, &(0x7f0000000380)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x80, 0x1, 0x9, 0x1, 0x2, 0x3e, 0x7ff, 0x1f2, 0x40, 0x1f4, 0xbfa, 0x3, 0x38, 0x1, 0x5, 0x4, 0x4}, [{0x5, 0x9, 0x6, 0x101, 0x6, 0x4, 0x9, 0x6}, {0x5, 0x3, 0x5e61, 0x80000000, 0xcc3, 0x9, 0x7, 0x8}], "d1660f10e0ac4a6edbf3aa53803c8f57ef2a12069e82553332d2b96d67f2dbc5b04959dad57c303d876233684f5e9ad402a193da791e11122f2cccbf10d6d499f5e16385d09f63891a965d80bcb68b551fabffb4bf0b5c372b4d69cdefac988201a40429a8d0dc699820193afcab08070fde89c22e16b43dde5e37d9a3df0cd352e8667f163774d9dc3c79571e5100046281", ['\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00']}, 0x842) 06:19:06 executing program 0: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800004, 0x12, r0, 0x0) preadv(r0, &(0x7f00000001c0), 0x0, 0x9, 0x0) mmap(&(0x7f0000000000/0xa000)=nil, 0xa000, 0x2, 0x2172, 0xffffffffffffffff, 0x0) syz_mount_image$reiserfs(&(0x7f0000000140), &(0x7f0000000180)='./file0\x00', 0x8000, 0x3, &(0x7f0000000300)=[{&(0x7f0000000540)="21d37ef07e82e237fbe1b40158d20e242c5ea1f9d9edc6b9395250085d6dfa486982e82d4ce1a5e2bc00d29383bae640de", 0x31, 0x7}, {&(0x7f0000000240)="c43f281f483aa6cd83e40e59d53f177299d285bbe5d90aab2b56a76f9db49d86afa5a0f601ba9b3502de5f3724f3ec00927151f928f668b362052950a2e8f16baec29875fdad59395e86a1050c368933e3ed5a17d76bd7bded793436ea207885f395ace3fc12126c205b170be392c1645233ef01f9661090706a65f63b4845dc2884a20711a8024ad4af44aeec9db33991dae38d95cdb7132970d0d4dec58b9d46d378", 0xa3, 0x6}, {&(0x7f0000000380)="05f82c760d277896dd8c9891a41aafe24124891a32a238c3c78696d112aa09f3ae5c54b0c08676da5db7f358c72dfaca9a5d90860b4ae363c9a921c47965d339c23408a6d9b31a23aee27822f0a140d8e4ec9475a740113f2b9923b46333110e528e0a513151aad34aee1b5310fcf62c1982349253003d6d53aebbe09cf5918668ee682be93b6a671bbc", 0x8a, 0x3}], 0x2000400, &(0x7f0000000440)={[{@balloc_no_unhash_reloc}, {@nolargeio}, {@grpjquota}], [{@obj_role={'obj_role', 0x3d, '^'}}, {@hash}, {@uid_lt}, {@mask={'mask', 0x3d, 'MAY_EXEC'}}, {@uid_lt={'uid<', 0xee00}}, {@smackfsfloor={'smackfsfloor', 0x3d, ':%#[@'}}, {@obj_user={'obj_user', 0x3d, ',\\*),i'}}, {@uid_eq={'uid', 0x3d, 0xee00}}, {@seclabel}, {@uid_lt={'uid<', 0xee00}}]}) 06:19:06 executing program 3: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800004, 0x12, r0, 0x0) preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x9, 0x0) close(0xffffffffffffffff) 06:19:06 executing program 1: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x0, 0x12, r0, 0x0) preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x9, 0x0) mmap(&(0x7f0000000000/0xa000)=nil, 0xa000, 0x2, 0x2172, 0xffffffffffffffff, 0x0) r1 = socket$unix(0x1, 0x1, 0x0) bind$unix(r1, &(0x7f00000001c0)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x56) close(r1) [ 349.024822][T15841] loop0: detected capacity change from 0 to 64 [ 349.058313][T15841] REISERFS warning (device loop0): super-6504 reiserfs_getopt: the option "nolargeio" requires an argument [ 349.058313][T15841] 06:19:06 executing program 3: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800004, 0x12, r0, 0x0) preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x9, 0x0) close(0xffffffffffffffff) 06:19:06 executing program 1: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x0, 0x12, r0, 0x0) preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x9, 0x0) mmap(&(0x7f0000000000/0xa000)=nil, 0xa000, 0x2, 0x2172, 0xffffffffffffffff, 0x0) r1 = socket$unix(0x1, 0x1, 0x0) bind$unix(r1, &(0x7f00000001c0)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x56) close(r1) 06:19:06 executing program 3: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800004, 0x12, r0, 0x0) preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x9, 0x0) close(0xffffffffffffffff) 06:19:06 executing program 0: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800004, 0x12, r0, 0x0) preadv(r0, &(0x7f00000001c0), 0x0, 0x9, 0x0) mmap(&(0x7f0000000000/0xa000)=nil, 0xa000, 0x2, 0x2172, 0xffffffffffffffff, 0x0) syz_mount_image$reiserfs(&(0x7f0000000140), &(0x7f0000000180)='./file0\x00', 0x8000, 0x3, &(0x7f0000000300)=[{&(0x7f0000000540)="21d37ef07e82e237fbe1b40158d20e242c5ea1f9d9edc6b9395250085d6dfa486982e82d4ce1a5e2bc00d29383bae640de", 0x31, 0x7}, {&(0x7f0000000240)="c43f281f483aa6cd83e40e59d53f177299d285bbe5d90aab2b56a76f9db49d86afa5a0f601ba9b3502de5f3724f3ec00927151f928f668b362052950a2e8f16baec29875fdad59395e86a1050c368933e3ed5a17d76bd7bded793436ea207885f395ace3fc12126c205b170be392c1645233ef01f9661090706a65f63b4845dc2884a20711a8024ad4af44aeec9db33991dae38d95cdb7132970d0d4dec58b9d46d378", 0xa3, 0x6}, {&(0x7f0000000380)="05f82c760d277896dd8c9891a41aafe24124891a32a238c3c78696d112aa09f3ae5c54b0c08676da5db7f358c72dfaca9a5d90860b4ae363c9a921c47965d339c23408a6d9b31a23aee27822f0a140d8e4ec9475a740113f2b9923b46333110e528e0a513151aad34aee1b5310fcf62c1982349253003d6d53aebbe09cf5918668ee682be93b6a671bbc", 0x8a, 0x3}], 0x2000400, &(0x7f0000000440)={[{@balloc_no_unhash_reloc}, {@nolargeio}, {@grpjquota}], [{@obj_role={'obj_role', 0x3d, '^'}}, {@hash}, {@uid_lt}, {@mask={'mask', 0x3d, 'MAY_EXEC'}}, {@uid_lt={'uid<', 0xee00}}, {@smackfsfloor={'smackfsfloor', 0x3d, ':%#[@'}}, {@obj_user={'obj_user', 0x3d, ',\\*),i'}}, {@uid_eq={'uid', 0x3d, 0xee00}}, {@seclabel}, {@uid_lt={'uid<', 0xee00}}]}) [ 349.262526][T15857] loop0: detected capacity change from 0 to 64 [ 349.290184][T15857] REISERFS warning (device loop0): super-6504 reiserfs_getopt: the option "nolargeio" requires an argument [ 349.290184][T15857] 06:19:07 executing program 2: r0 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000680), 0xffffffffffffffff) ioctl$sock_SIOCGIFINDEX_80211(0xffffffffffffffff, 0x8933, &(0x7f0000000c00)={'wlan1\x00'}) r1 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX_80211(r1, 0x8933, &(0x7f0000000e40)={'wlan0\x00', 0x0}) sendmsg$NL80211_CMD_TRIGGER_SCAN(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000f40)={&(0x7f0000000000)=ANY=[@ANYBLOB='$\x00\x00\x00', @ANYRES16=r0, @ANYBLOB="010000000000000000002100000008000300", @ANYRES32=r2, @ANYBLOB="08009e"], 0x24}}, 0x0) sendmsg$NL80211_CMD_FRAME(0xffffffffffffffff, &(0x7f0000000100)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f00000000c0)={&(0x7f0000000c40)=ANY=[@ANYBLOB="2000000059c89a20a00fadf00ada0277887124d85c2b6f27e866a2f2434f0213672fd63827c4c50f5346d89412d5351da4a233d419db04d5f089f764866116182e7757ccfd", @ANYRES16=r0, @ANYBLOB="00022dbd7000fedbdf253b0000000c0099007f000000470000000c00cd001f000400070000ff04008e00"], 0x30}, 0x1, 0x0, 0x0, 0x44}, 0x40000) r3 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800004, 0x12, r3, 0x0) preadv(r3, &(0x7f00000001c0)=[{0x0}], 0x1, 0x9, 0x0) r4 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r4, &(0x7f0000000380)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x80, 0x1, 0x9, 0x1, 0x2, 0x3e, 0x7ff, 0x1f2, 0x40, 0x1f4, 0xbfa, 0x3, 0x38, 0x1, 0x5, 0x4, 0x4}, [{0x5, 0x9, 0x6, 0x101, 0x6, 0x4, 0x9, 0x6}, {0x5, 0x3, 0x5e61, 0x80000000, 0xcc3, 0x9, 0x7, 0x8}], "d1660f10e0ac4a6edbf3aa53803c8f57ef2a12069e82553332d2b96d67f2dbc5b04959dad57c303d876233684f5e9ad402a193da791e11122f2cccbf10d6d499f5e16385d09f63891a965d80bcb68b551fabffb4bf0b5c372b4d69cdefac988201a40429a8d0dc699820193afcab08070fde89c22e16b43dde5e37d9a3df0cd352e8667f163774d9dc3c79571e5100046281", ['\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00']}, 0x842) 06:19:07 executing program 1: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x0, 0x12, r0, 0x0) preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x9, 0x0) mmap(&(0x7f0000000000/0xa000)=nil, 0xa000, 0x2, 0x2172, 0xffffffffffffffff, 0x0) r1 = socket$unix(0x1, 0x1, 0x0) bind$unix(r1, &(0x7f00000001c0)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x56) close(r1) 06:19:07 executing program 3: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800004, 0x12, r0, 0x0) r1 = socket$unix(0x1, 0x1, 0x0) close(r1) 06:19:07 executing program 0: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800004, 0x12, r0, 0x0) preadv(r0, &(0x7f00000001c0), 0x0, 0x9, 0x0) mmap(&(0x7f0000000000/0xa000)=nil, 0xa000, 0x2, 0x2172, 0xffffffffffffffff, 0x0) syz_mount_image$reiserfs(&(0x7f0000000140), &(0x7f0000000180)='./file0\x00', 0x8000, 0x3, &(0x7f0000000300)=[{&(0x7f0000000540)="21d37ef07e82e237fbe1b40158d20e242c5ea1f9d9edc6b9395250085d6dfa486982e82d4ce1a5e2bc00d29383bae640de", 0x31, 0x7}, {&(0x7f0000000240)="c43f281f483aa6cd83e40e59d53f177299d285bbe5d90aab2b56a76f9db49d86afa5a0f601ba9b3502de5f3724f3ec00927151f928f668b362052950a2e8f16baec29875fdad59395e86a1050c368933e3ed5a17d76bd7bded793436ea207885f395ace3fc12126c205b170be392c1645233ef01f9661090706a65f63b4845dc2884a20711a8024ad4af44aeec9db33991dae38d95cdb7132970d0d4dec58b9d46d378", 0xa3, 0x6}, {&(0x7f0000000380)="05f82c760d277896dd8c9891a41aafe24124891a32a238c3c78696d112aa09f3ae5c54b0c08676da5db7f358c72dfaca9a5d90860b4ae363c9a921c47965d339c23408a6d9b31a23aee27822f0a140d8e4ec9475a740113f2b9923b46333110e528e0a513151aad34aee1b5310fcf62c1982349253003d6d53aebbe09cf5918668ee682be93b6a671bbc", 0x8a, 0x3}], 0x2000400, &(0x7f0000000440)={[{@balloc_no_unhash_reloc}, {@nolargeio}, {@grpjquota}], [{@obj_role={'obj_role', 0x3d, '^'}}, {@hash}, {@uid_lt}, {@mask={'mask', 0x3d, 'MAY_EXEC'}}, {@uid_lt={'uid<', 0xee00}}, {@smackfsfloor={'smackfsfloor', 0x3d, ':%#[@'}}, {@obj_user={'obj_user', 0x3d, ',\\*),i'}}, {@uid_eq={'uid', 0x3d, 0xee00}}, {@seclabel}, {@uid_lt={'uid<', 0xee00}}]}) 06:19:07 executing program 1: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800004, 0x10, r0, 0x0) preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x9, 0x0) mmap(&(0x7f0000000000/0xa000)=nil, 0xa000, 0x2, 0x2172, 0xffffffffffffffff, 0x0) r1 = socket$unix(0x1, 0x1, 0x0) bind$unix(r1, &(0x7f00000001c0)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x56) close(r1) [ 350.033573][T15871] loop0: detected capacity change from 0 to 64 [ 350.049645][T15871] REISERFS warning (device loop0): super-6504 reiserfs_getopt: the option "nolargeio" requires an argument [ 350.049645][T15871] 06:19:07 executing program 3: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800004, 0x12, r0, 0x0) r1 = socket$unix(0x1, 0x1, 0x0) close(r1) 06:19:07 executing program 1: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800004, 0x10, r0, 0x0) preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x9, 0x0) mmap(&(0x7f0000000000/0xa000)=nil, 0xa000, 0x2, 0x2172, 0xffffffffffffffff, 0x0) r1 = socket$unix(0x1, 0x1, 0x0) bind$unix(r1, &(0x7f00000001c0)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x56) close(r1) 06:19:07 executing program 3: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800004, 0x12, r0, 0x0) r1 = socket$unix(0x1, 0x1, 0x0) close(r1) 06:19:08 executing program 2: r0 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000680), 0xffffffffffffffff) ioctl$sock_SIOCGIFINDEX_80211(0xffffffffffffffff, 0x8933, &(0x7f0000000c00)={'wlan1\x00'}) r1 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX_80211(r1, 0x8933, &(0x7f0000000e40)={'wlan0\x00', 0x0}) sendmsg$NL80211_CMD_TRIGGER_SCAN(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000f40)={&(0x7f0000000000)=ANY=[@ANYBLOB='$\x00\x00\x00', @ANYRES16=r0, @ANYBLOB="010000000000000000002100000008000300", @ANYRES32=r2, @ANYBLOB="08009e"], 0x24}}, 0x0) sendmsg$NL80211_CMD_FRAME(0xffffffffffffffff, &(0x7f0000000100)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f00000000c0)={&(0x7f0000000c40)=ANY=[@ANYBLOB="2000000059c89a20a00fadf00ada0277887124d85c2b6f27e866a2f2434f0213672fd63827c4c50f5346d89412d5351da4a233d419db04d5f089f764866116182e7757ccfd", @ANYRES16=r0, @ANYBLOB="00022dbd7000fedbdf253b0000000c0099007f000000470000000c00cd001f000400070000ff04008e00"], 0x30}, 0x1, 0x0, 0x0, 0x44}, 0x40000) r3 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800004, 0x12, r3, 0x0) r4 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r4, &(0x7f0000000380)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x80, 0x1, 0x9, 0x1, 0x2, 0x3e, 0x7ff, 0x1f2, 0x40, 0x1f4, 0xbfa, 0x3, 0x38, 0x1, 0x5, 0x4, 0x4}, [{0x5, 0x9, 0x6, 0x101, 0x6, 0x4, 0x9, 0x6}, {0x5, 0x3, 0x5e61, 0x80000000, 0xcc3, 0x9, 0x7, 0x8}], "d1660f10e0ac4a6edbf3aa53803c8f57ef2a12069e82553332d2b96d67f2dbc5b04959dad57c303d876233684f5e9ad402a193da791e11122f2cccbf10d6d499f5e16385d09f63891a965d80bcb68b551fabffb4bf0b5c372b4d69cdefac988201a40429a8d0dc699820193afcab08070fde89c22e16b43dde5e37d9a3df0cd352e8667f163774d9dc3c79571e5100046281", ['\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00']}, 0x842) 06:19:08 executing program 0: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800004, 0x12, r0, 0x0) preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x0, 0x0) mmap(&(0x7f0000000000/0xa000)=nil, 0xa000, 0x2, 0x2172, 0xffffffffffffffff, 0x0) syz_mount_image$reiserfs(&(0x7f0000000140), &(0x7f0000000180)='./file0\x00', 0x8000, 0x3, &(0x7f0000000300)=[{&(0x7f0000000540)="21d37ef07e82e237fbe1b40158d20e242c5ea1f9d9edc6b9395250085d6dfa486982e82d4ce1a5e2bc00d29383bae640de", 0x31, 0x7}, {&(0x7f0000000240)="c43f281f483aa6cd83e40e59d53f177299d285bbe5d90aab2b56a76f9db49d86afa5a0f601ba9b3502de5f3724f3ec00927151f928f668b362052950a2e8f16baec29875fdad59395e86a1050c368933e3ed5a17d76bd7bded793436ea207885f395ace3fc12126c205b170be392c1645233ef01f9661090706a65f63b4845dc2884a20711a8024ad4af44aeec9db33991dae38d95cdb7132970d0d4dec58b9d46d378", 0xa3, 0x6}, {&(0x7f0000000380)="05f82c760d277896dd8c9891a41aafe24124891a32a238c3c78696d112aa09f3ae5c54b0c08676da5db7f358c72dfaca9a5d90860b4ae363c9a921c47965d339c23408a6d9b31a23aee27822f0a140d8e4ec9475a740113f2b9923b46333110e528e0a513151aad34aee1b5310fcf62c1982349253003d6d53aebbe09cf5918668ee682be93b6a671bbc", 0x8a, 0x3}], 0x2000400, &(0x7f0000000440)={[{@balloc_no_unhash_reloc}, {@nolargeio}, {@grpjquota}], [{@obj_role={'obj_role', 0x3d, '^'}}, {@hash}, {@uid_lt}, {@mask={'mask', 0x3d, 'MAY_EXEC'}}, {@uid_lt={'uid<', 0xee00}}, {@smackfsfloor={'smackfsfloor', 0x3d, ':%#[@'}}, {@obj_user={'obj_user', 0x3d, ',\\*),i'}}, {@uid_eq={'uid', 0x3d, 0xee00}}, {@seclabel}, {@uid_lt={'uid<', 0xee00}}]}) 06:19:08 executing program 1: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800004, 0x10, r0, 0x0) preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x9, 0x0) mmap(&(0x7f0000000000/0xa000)=nil, 0xa000, 0x2, 0x2172, 0xffffffffffffffff, 0x0) r1 = socket$unix(0x1, 0x1, 0x0) bind$unix(r1, &(0x7f00000001c0)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x56) close(r1) 06:19:08 executing program 3: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x9, 0x0) r1 = socket$unix(0x1, 0x1, 0x0) close(r1) [ 350.935654][T15894] loop0: detected capacity change from 0 to 64 06:19:08 executing program 3: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x9, 0x0) r1 = socket$unix(0x1, 0x1, 0x0) close(r1) [ 350.959151][T15894] REISERFS warning (device loop0): super-6504 reiserfs_getopt: the option "nolargeio" requires an argument [ 350.959151][T15894] 06:19:08 executing program 1: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800004, 0x12, 0xffffffffffffffff, 0x0) preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x9, 0x0) mmap(&(0x7f0000000000/0xa000)=nil, 0xa000, 0x2, 0x2172, 0xffffffffffffffff, 0x0) r1 = socket$unix(0x1, 0x1, 0x0) bind$unix(r1, &(0x7f00000001c0)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x56) close(r1) 06:19:08 executing program 3: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x9, 0x0) r1 = socket$unix(0x1, 0x1, 0x0) close(r1) 06:19:08 executing program 1: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800004, 0x12, 0xffffffffffffffff, 0x0) preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x9, 0x0) mmap(&(0x7f0000000000/0xa000)=nil, 0xa000, 0x2, 0x2172, 0xffffffffffffffff, 0x0) r1 = socket$unix(0x1, 0x1, 0x0) bind$unix(r1, &(0x7f00000001c0)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x56) close(r1) 06:19:09 executing program 2: r0 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000680), 0xffffffffffffffff) ioctl$sock_SIOCGIFINDEX_80211(0xffffffffffffffff, 0x8933, &(0x7f0000000c00)={'wlan1\x00'}) r1 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX_80211(r1, 0x8933, &(0x7f0000000e40)={'wlan0\x00', 0x0}) sendmsg$NL80211_CMD_TRIGGER_SCAN(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000f40)={&(0x7f0000000000)=ANY=[@ANYBLOB='$\x00\x00\x00', @ANYRES16=r0, @ANYBLOB="010000000000000000002100000008000300", @ANYRES32=r2, @ANYBLOB="08009e"], 0x24}}, 0x0) sendmsg$NL80211_CMD_FRAME(0xffffffffffffffff, &(0x7f0000000100)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f00000000c0)={&(0x7f0000000c40)=ANY=[@ANYBLOB="2000000059c89a20a00fadf00ada0277887124d85c2b6f27e866a2f2434f0213672fd63827c4c50f5346d89412d5351da4a233d419db04d5f089f764866116182e7757ccfd", @ANYRES16=r0, @ANYBLOB="00022dbd7000fedbdf253b0000000c0099007f000000470000000c00cd001f000400070000ff04008e00"], 0x30}, 0x1, 0x0, 0x0, 0x44}, 0x40000) r3 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800004, 0x12, r3, 0x0) r4 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r4, &(0x7f0000000380)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x80, 0x1, 0x9, 0x1, 0x2, 0x3e, 0x7ff, 0x1f2, 0x40, 0x1f4, 0xbfa, 0x3, 0x38, 0x1, 0x5, 0x4, 0x4}, [{0x5, 0x9, 0x6, 0x101, 0x6, 0x4, 0x9, 0x6}, {0x5, 0x3, 0x5e61, 0x80000000, 0xcc3, 0x9, 0x7, 0x8}], "d1660f10e0ac4a6edbf3aa53803c8f57ef2a12069e82553332d2b96d67f2dbc5b04959dad57c303d876233684f5e9ad402a193da791e11122f2cccbf10d6d499f5e16385d09f63891a965d80bcb68b551fabffb4bf0b5c372b4d69cdefac988201a40429a8d0dc699820193afcab08070fde89c22e16b43dde5e37d9a3df0cd352e8667f163774d9dc3c79571e5100046281", ['\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00']}, 0x842) 06:19:09 executing program 0: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800004, 0x12, r0, 0x0) preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x0, 0x0) mmap(&(0x7f0000000000/0xa000)=nil, 0xa000, 0x2, 0x2172, 0xffffffffffffffff, 0x0) syz_mount_image$reiserfs(&(0x7f0000000140), &(0x7f0000000180)='./file0\x00', 0x8000, 0x3, &(0x7f0000000300)=[{&(0x7f0000000540)="21d37ef07e82e237fbe1b40158d20e242c5ea1f9d9edc6b9395250085d6dfa486982e82d4ce1a5e2bc00d29383bae640de", 0x31, 0x7}, {&(0x7f0000000240)="c43f281f483aa6cd83e40e59d53f177299d285bbe5d90aab2b56a76f9db49d86afa5a0f601ba9b3502de5f3724f3ec00927151f928f668b362052950a2e8f16baec29875fdad59395e86a1050c368933e3ed5a17d76bd7bded793436ea207885f395ace3fc12126c205b170be392c1645233ef01f9661090706a65f63b4845dc2884a20711a8024ad4af44aeec9db33991dae38d95cdb7132970d0d4dec58b9d46d378", 0xa3, 0x6}, {&(0x7f0000000380)="05f82c760d277896dd8c9891a41aafe24124891a32a238c3c78696d112aa09f3ae5c54b0c08676da5db7f358c72dfaca9a5d90860b4ae363c9a921c47965d339c23408a6d9b31a23aee27822f0a140d8e4ec9475a740113f2b9923b46333110e528e0a513151aad34aee1b5310fcf62c1982349253003d6d53aebbe09cf5918668ee682be93b6a671bbc", 0x8a, 0x3}], 0x2000400, &(0x7f0000000440)={[{@balloc_no_unhash_reloc}, {@nolargeio}, {@grpjquota}], [{@obj_role={'obj_role', 0x3d, '^'}}, {@hash}, {@uid_lt}, {@mask={'mask', 0x3d, 'MAY_EXEC'}}, {@uid_lt={'uid<', 0xee00}}, {@smackfsfloor={'smackfsfloor', 0x3d, ':%#[@'}}, {@obj_user={'obj_user', 0x3d, ',\\*),i'}}, {@uid_eq={'uid', 0x3d, 0xee00}}, {@seclabel}, {@uid_lt={'uid<', 0xee00}}]}) 06:19:09 executing program 3: mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800004, 0x12, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f00000001c0)=[{0x0}], 0x1, 0x9, 0x0) r0 = socket$unix(0x1, 0x1, 0x0) close(r0) 06:19:09 executing program 1: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800004, 0x12, 0xffffffffffffffff, 0x0) preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x9, 0x0) mmap(&(0x7f0000000000/0xa000)=nil, 0xa000, 0x2, 0x2172, 0xffffffffffffffff, 0x0) r1 = socket$unix(0x1, 0x1, 0x0) bind$unix(r1, &(0x7f00000001c0)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x56) close(r1) [ 351.843292][T15916] loop0: detected capacity change from 0 to 64 06:19:09 executing program 3: mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800004, 0x12, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f00000001c0)=[{0x0}], 0x1, 0x9, 0x0) r0 = socket$unix(0x1, 0x1, 0x0) close(r0) [ 351.875076][T15916] REISERFS warning (device loop0): super-6504 reiserfs_getopt: the option "nolargeio" requires an argument [ 351.875076][T15916] 06:19:09 executing program 1: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800004, 0x12, r0, 0x0) preadv(0xffffffffffffffff, &(0x7f00000001c0)=[{0x0}], 0x1, 0x9, 0x0) mmap(&(0x7f0000000000/0xa000)=nil, 0xa000, 0x2, 0x2172, 0xffffffffffffffff, 0x0) r1 = socket$unix(0x1, 0x1, 0x0) bind$unix(r1, &(0x7f00000001c0)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x56) close(r1) 06:19:09 executing program 3: mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800004, 0x12, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f00000001c0)=[{0x0}], 0x1, 0x9, 0x0) r0 = socket$unix(0x1, 0x1, 0x0) close(r0) 06:19:09 executing program 0: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800004, 0x12, r0, 0x0) preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x0, 0x0) mmap(&(0x7f0000000000/0xa000)=nil, 0xa000, 0x2, 0x2172, 0xffffffffffffffff, 0x0) syz_mount_image$reiserfs(&(0x7f0000000140), &(0x7f0000000180)='./file0\x00', 0x8000, 0x3, &(0x7f0000000300)=[{&(0x7f0000000540)="21d37ef07e82e237fbe1b40158d20e242c5ea1f9d9edc6b9395250085d6dfa486982e82d4ce1a5e2bc00d29383bae640de", 0x31, 0x7}, {&(0x7f0000000240)="c43f281f483aa6cd83e40e59d53f177299d285bbe5d90aab2b56a76f9db49d86afa5a0f601ba9b3502de5f3724f3ec00927151f928f668b362052950a2e8f16baec29875fdad59395e86a1050c368933e3ed5a17d76bd7bded793436ea207885f395ace3fc12126c205b170be392c1645233ef01f9661090706a65f63b4845dc2884a20711a8024ad4af44aeec9db33991dae38d95cdb7132970d0d4dec58b9d46d378", 0xa3, 0x6}, {&(0x7f0000000380)="05f82c760d277896dd8c9891a41aafe24124891a32a238c3c78696d112aa09f3ae5c54b0c08676da5db7f358c72dfaca9a5d90860b4ae363c9a921c47965d339c23408a6d9b31a23aee27822f0a140d8e4ec9475a740113f2b9923b46333110e528e0a513151aad34aee1b5310fcf62c1982349253003d6d53aebbe09cf5918668ee682be93b6a671bbc", 0x8a, 0x3}], 0x2000400, &(0x7f0000000440)={[{@balloc_no_unhash_reloc}, {@nolargeio}, {@grpjquota}], [{@obj_role={'obj_role', 0x3d, '^'}}, {@hash}, {@uid_lt}, {@mask={'mask', 0x3d, 'MAY_EXEC'}}, {@uid_lt={'uid<', 0xee00}}, {@smackfsfloor={'smackfsfloor', 0x3d, ':%#[@'}}, {@obj_user={'obj_user', 0x3d, ',\\*),i'}}, {@uid_eq={'uid', 0x3d, 0xee00}}, {@seclabel}, {@uid_lt={'uid<', 0xee00}}]}) [ 352.035977][T15931] loop0: detected capacity change from 0 to 64 [ 352.050510][T15931] REISERFS warning (device loop0): super-6504 reiserfs_getopt: the option "nolargeio" requires an argument [ 352.050510][T15931] 06:19:10 executing program 2: r0 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000680), 0xffffffffffffffff) ioctl$sock_SIOCGIFINDEX_80211(0xffffffffffffffff, 0x8933, &(0x7f0000000c00)={'wlan1\x00'}) r1 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX_80211(r1, 0x8933, &(0x7f0000000e40)={'wlan0\x00', 0x0}) sendmsg$NL80211_CMD_TRIGGER_SCAN(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000f40)={&(0x7f0000000000)=ANY=[@ANYBLOB='$\x00\x00\x00', @ANYRES16=r0, @ANYBLOB="010000000000000000002100000008000300", @ANYRES32=r2, @ANYBLOB="08009e"], 0x24}}, 0x0) sendmsg$NL80211_CMD_FRAME(0xffffffffffffffff, &(0x7f0000000100)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f00000000c0)={&(0x7f0000000c40)=ANY=[@ANYBLOB="2000000059c89a20a00fadf00ada0277887124d85c2b6f27e866a2f2434f0213672fd63827c4c50f5346d89412d5351da4a233d419db04d5f089f764866116182e7757ccfd", @ANYRES16=r0, @ANYBLOB="00022dbd7000fedbdf253b0000000c0099007f000000470000000c00cd001f000400070000ff04008e00"], 0x30}, 0x1, 0x0, 0x0, 0x44}, 0x40000) r3 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800004, 0x12, r3, 0x0) r4 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r4, &(0x7f0000000380)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x80, 0x1, 0x9, 0x1, 0x2, 0x3e, 0x7ff, 0x1f2, 0x40, 0x1f4, 0xbfa, 0x3, 0x38, 0x1, 0x5, 0x4, 0x4}, [{0x5, 0x9, 0x6, 0x101, 0x6, 0x4, 0x9, 0x6}, {0x5, 0x3, 0x5e61, 0x80000000, 0xcc3, 0x9, 0x7, 0x8}], "d1660f10e0ac4a6edbf3aa53803c8f57ef2a12069e82553332d2b96d67f2dbc5b04959dad57c303d876233684f5e9ad402a193da791e11122f2cccbf10d6d499f5e16385d09f63891a965d80bcb68b551fabffb4bf0b5c372b4d69cdefac988201a40429a8d0dc699820193afcab08070fde89c22e16b43dde5e37d9a3df0cd352e8667f163774d9dc3c79571e5100046281", ['\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00']}, 0x842) 06:19:10 executing program 1: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800004, 0x12, r0, 0x0) preadv(0xffffffffffffffff, &(0x7f00000001c0)=[{0x0}], 0x1, 0x9, 0x0) mmap(&(0x7f0000000000/0xa000)=nil, 0xa000, 0x2, 0x2172, 0xffffffffffffffff, 0x0) r1 = socket$unix(0x1, 0x1, 0x0) bind$unix(r1, &(0x7f00000001c0)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x56) close(r1) 06:19:10 executing program 3: r0 = openat(0xffffffffffffffff, 0x0, 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800004, 0x12, r0, 0x0) preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x9, 0x0) r1 = socket$unix(0x1, 0x1, 0x0) close(r1) 06:19:10 executing program 0: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800004, 0x12, r0, 0x0) preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x9, 0x0) mmap(&(0x7f0000000000/0xa000)=nil, 0xa000, 0x0, 0x2172, 0xffffffffffffffff, 0x0) syz_mount_image$reiserfs(&(0x7f0000000140), &(0x7f0000000180)='./file0\x00', 0x8000, 0x3, &(0x7f0000000300)=[{&(0x7f0000000540)="21d37ef07e82e237fbe1b40158d20e242c5ea1f9d9edc6b9395250085d6dfa486982e82d4ce1a5e2bc00d29383bae640de", 0x31, 0x7}, {&(0x7f0000000240)="c43f281f483aa6cd83e40e59d53f177299d285bbe5d90aab2b56a76f9db49d86afa5a0f601ba9b3502de5f3724f3ec00927151f928f668b362052950a2e8f16baec29875fdad59395e86a1050c368933e3ed5a17d76bd7bded793436ea207885f395ace3fc12126c205b170be392c1645233ef01f9661090706a65f63b4845dc2884a20711a8024ad4af44aeec9db33991dae38d95cdb7132970d0d4dec58b9d46d378", 0xa3, 0x6}, {&(0x7f0000000380)="05f82c760d277896dd8c9891a41aafe24124891a32a238c3c78696d112aa09f3ae5c54b0c08676da5db7f358c72dfaca9a5d90860b4ae363c9a921c47965d339c23408a6d9b31a23aee27822f0a140d8e4ec9475a740113f2b9923b46333110e528e0a513151aad34aee1b5310fcf62c1982349253003d6d53aebbe09cf5918668ee682be93b6a671bbc", 0x8a, 0x3}], 0x2000400, &(0x7f0000000440)={[{@balloc_no_unhash_reloc}, {@nolargeio}, {@grpjquota}], [{@obj_role={'obj_role', 0x3d, '^'}}, {@hash}, {@uid_lt}, {@mask={'mask', 0x3d, 'MAY_EXEC'}}, {@uid_lt={'uid<', 0xee00}}, {@smackfsfloor={'smackfsfloor', 0x3d, ':%#[@'}}, {@obj_user={'obj_user', 0x3d, ',\\*),i'}}, {@uid_eq={'uid', 0x3d, 0xee00}}, {@seclabel}, {@uid_lt={'uid<', 0xee00}}]}) 06:19:10 executing program 1: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800004, 0x12, r0, 0x0) preadv(0xffffffffffffffff, &(0x7f00000001c0)=[{0x0}], 0x1, 0x9, 0x0) mmap(&(0x7f0000000000/0xa000)=nil, 0xa000, 0x2, 0x2172, 0xffffffffffffffff, 0x0) r1 = socket$unix(0x1, 0x1, 0x0) bind$unix(r1, &(0x7f00000001c0)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x56) close(r1) 06:19:10 executing program 0: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800004, 0x12, r0, 0x0) preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x9, 0x0) mmap(&(0x7f0000000000/0xa000)=nil, 0xa000, 0x0, 0x2172, 0xffffffffffffffff, 0x0) syz_mount_image$reiserfs(&(0x7f0000000140), &(0x7f0000000180)='./file0\x00', 0x8000, 0x3, &(0x7f0000000300)=[{&(0x7f0000000540)="21d37ef07e82e237fbe1b40158d20e242c5ea1f9d9edc6b9395250085d6dfa486982e82d4ce1a5e2bc00d29383bae640de", 0x31, 0x7}, {&(0x7f0000000240)="c43f281f483aa6cd83e40e59d53f177299d285bbe5d90aab2b56a76f9db49d86afa5a0f601ba9b3502de5f3724f3ec00927151f928f668b362052950a2e8f16baec29875fdad59395e86a1050c368933e3ed5a17d76bd7bded793436ea207885f395ace3fc12126c205b170be392c1645233ef01f9661090706a65f63b4845dc2884a20711a8024ad4af44aeec9db33991dae38d95cdb7132970d0d4dec58b9d46d378", 0xa3, 0x6}, {&(0x7f0000000380)="05f82c760d277896dd8c9891a41aafe24124891a32a238c3c78696d112aa09f3ae5c54b0c08676da5db7f358c72dfaca9a5d90860b4ae363c9a921c47965d339c23408a6d9b31a23aee27822f0a140d8e4ec9475a740113f2b9923b46333110e528e0a513151aad34aee1b5310fcf62c1982349253003d6d53aebbe09cf5918668ee682be93b6a671bbc", 0x8a, 0x3}], 0x2000400, &(0x7f0000000440)={[{@balloc_no_unhash_reloc}, {@nolargeio}, {@grpjquota}], [{@obj_role={'obj_role', 0x3d, '^'}}, {@hash}, {@uid_lt}, {@mask={'mask', 0x3d, 'MAY_EXEC'}}, {@uid_lt={'uid<', 0xee00}}, {@smackfsfloor={'smackfsfloor', 0x3d, ':%#[@'}}, {@obj_user={'obj_user', 0x3d, ',\\*),i'}}, {@uid_eq={'uid', 0x3d, 0xee00}}, {@seclabel}, {@uid_lt={'uid<', 0xee00}}]}) 06:19:10 executing program 3: r0 = openat(0xffffffffffffffff, 0x0, 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800004, 0x12, r0, 0x0) preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x9, 0x0) r1 = socket$unix(0x1, 0x1, 0x0) close(r1) 06:19:10 executing program 0: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800004, 0x12, r0, 0x0) preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x9, 0x0) mmap(&(0x7f0000000000/0xa000)=nil, 0xa000, 0x0, 0x2172, 0xffffffffffffffff, 0x0) syz_mount_image$reiserfs(&(0x7f0000000140), &(0x7f0000000180)='./file0\x00', 0x8000, 0x3, &(0x7f0000000300)=[{&(0x7f0000000540)="21d37ef07e82e237fbe1b40158d20e242c5ea1f9d9edc6b9395250085d6dfa486982e82d4ce1a5e2bc00d29383bae640de", 0x31, 0x7}, {&(0x7f0000000240)="c43f281f483aa6cd83e40e59d53f177299d285bbe5d90aab2b56a76f9db49d86afa5a0f601ba9b3502de5f3724f3ec00927151f928f668b362052950a2e8f16baec29875fdad59395e86a1050c368933e3ed5a17d76bd7bded793436ea207885f395ace3fc12126c205b170be392c1645233ef01f9661090706a65f63b4845dc2884a20711a8024ad4af44aeec9db33991dae38d95cdb7132970d0d4dec58b9d46d378", 0xa3, 0x6}, {&(0x7f0000000380)="05f82c760d277896dd8c9891a41aafe24124891a32a238c3c78696d112aa09f3ae5c54b0c08676da5db7f358c72dfaca9a5d90860b4ae363c9a921c47965d339c23408a6d9b31a23aee27822f0a140d8e4ec9475a740113f2b9923b46333110e528e0a513151aad34aee1b5310fcf62c1982349253003d6d53aebbe09cf5918668ee682be93b6a671bbc", 0x8a, 0x3}], 0x2000400, &(0x7f0000000440)={[{@balloc_no_unhash_reloc}, {@nolargeio}, {@grpjquota}], [{@obj_role={'obj_role', 0x3d, '^'}}, {@hash}, {@uid_lt}, {@mask={'mask', 0x3d, 'MAY_EXEC'}}, {@uid_lt={'uid<', 0xee00}}, {@smackfsfloor={'smackfsfloor', 0x3d, ':%#[@'}}, {@obj_user={'obj_user', 0x3d, ',\\*),i'}}, {@uid_eq={'uid', 0x3d, 0xee00}}, {@seclabel}, {@uid_lt={'uid<', 0xee00}}]}) 06:19:11 executing program 1: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800004, 0x12, r0, 0x0) preadv(r0, 0x0, 0x0, 0x9, 0x0) mmap(&(0x7f0000000000/0xa000)=nil, 0xa000, 0x2, 0x2172, 0xffffffffffffffff, 0x0) r1 = socket$unix(0x1, 0x1, 0x0) bind$unix(r1, &(0x7f00000001c0)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x56) close(r1) 06:19:11 executing program 0: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800004, 0x12, r0, 0x0) preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x9, 0x0) mmap(&(0x7f0000000000/0xa000)=nil, 0xa000, 0x2, 0x10, 0xffffffffffffffff, 0x0) syz_mount_image$reiserfs(&(0x7f0000000140), &(0x7f0000000180)='./file0\x00', 0x8000, 0x3, &(0x7f0000000300)=[{&(0x7f0000000540)="21d37ef07e82e237fbe1b40158d20e242c5ea1f9d9edc6b9395250085d6dfa486982e82d4ce1a5e2bc00d29383bae640de", 0x31, 0x7}, {&(0x7f0000000240)="c43f281f483aa6cd83e40e59d53f177299d285bbe5d90aab2b56a76f9db49d86afa5a0f601ba9b3502de5f3724f3ec00927151f928f668b362052950a2e8f16baec29875fdad59395e86a1050c368933e3ed5a17d76bd7bded793436ea207885f395ace3fc12126c205b170be392c1645233ef01f9661090706a65f63b4845dc2884a20711a8024ad4af44aeec9db33991dae38d95cdb7132970d0d4dec58b9d46d378", 0xa3, 0x6}, {&(0x7f0000000380)="05f82c760d277896dd8c9891a41aafe24124891a32a238c3c78696d112aa09f3ae5c54b0c08676da5db7f358c72dfaca9a5d90860b4ae363c9a921c47965d339c23408a6d9b31a23aee27822f0a140d8e4ec9475a740113f2b9923b46333110e528e0a513151aad34aee1b5310fcf62c1982349253003d6d53aebbe09cf5918668ee682be93b6a671bbc", 0x8a, 0x3}], 0x2000400, &(0x7f0000000440)={[{@balloc_no_unhash_reloc}, {@nolargeio}, {@grpjquota}], [{@obj_role={'obj_role', 0x3d, '^'}}, {@hash}, {@uid_lt}, {@mask={'mask', 0x3d, 'MAY_EXEC'}}, {@uid_lt={'uid<', 0xee00}}, {@smackfsfloor={'smackfsfloor', 0x3d, ':%#[@'}}, {@obj_user={'obj_user', 0x3d, ',\\*),i'}}, {@uid_eq={'uid', 0x3d, 0xee00}}, {@seclabel}, {@uid_lt={'uid<', 0xee00}}]}) 06:19:11 executing program 2: r0 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000680), 0xffffffffffffffff) ioctl$sock_SIOCGIFINDEX_80211(0xffffffffffffffff, 0x8933, &(0x7f0000000c00)={'wlan1\x00'}) r1 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX_80211(r1, 0x8933, &(0x7f0000000e40)={'wlan0\x00', 0x0}) sendmsg$NL80211_CMD_TRIGGER_SCAN(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000f40)={&(0x7f0000000000)=ANY=[@ANYBLOB='$\x00\x00\x00', @ANYRES16=r0, @ANYBLOB="010000000000000000002100000008000300", @ANYRES32=r2, @ANYBLOB="08009e"], 0x24}}, 0x0) sendmsg$NL80211_CMD_FRAME(0xffffffffffffffff, &(0x7f0000000100)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f00000000c0)={&(0x7f0000000c40)=ANY=[@ANYBLOB="2000000059c89a20a00fadf00ada0277887124d85c2b6f27e866a2f2434f0213672fd63827c4c50f5346d89412d5351da4a233d419db04d5f089f764866116182e7757ccfd", @ANYRES16=r0, @ANYBLOB="00022dbd7000fedbdf253b0000000c0099007f000000470000000c00cd001f000400070000ff04008e00"], 0x30}, 0x1, 0x0, 0x0, 0x44}, 0x40000) r3 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) preadv(r3, &(0x7f00000001c0)=[{0x0}], 0x1, 0x9, 0x0) r4 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r4, &(0x7f0000000380)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x80, 0x1, 0x9, 0x1, 0x2, 0x3e, 0x7ff, 0x1f2, 0x40, 0x1f4, 0xbfa, 0x3, 0x38, 0x1, 0x5, 0x4, 0x4}, [{0x5, 0x9, 0x6, 0x101, 0x6, 0x4, 0x9, 0x6}, {0x5, 0x3, 0x5e61, 0x80000000, 0xcc3, 0x9, 0x7, 0x8}], "d1660f10e0ac4a6edbf3aa53803c8f57ef2a12069e82553332d2b96d67f2dbc5b04959dad57c303d876233684f5e9ad402a193da791e11122f2cccbf10d6d499f5e16385d09f63891a965d80bcb68b551fabffb4bf0b5c372b4d69cdefac988201a40429a8d0dc699820193afcab08070fde89c22e16b43dde5e37d9a3df0cd352e8667f163774d9dc3c79571e5100046281", ['\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00']}, 0x842) 06:19:11 executing program 3: r0 = openat(0xffffffffffffffff, 0x0, 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800004, 0x12, r0, 0x0) preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x9, 0x0) r1 = socket$unix(0x1, 0x1, 0x0) close(r1) 06:19:11 executing program 1: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800004, 0x12, r0, 0x0) preadv(r0, 0x0, 0x0, 0x9, 0x0) mmap(&(0x7f0000000000/0xa000)=nil, 0xa000, 0x2, 0x2172, 0xffffffffffffffff, 0x0) r1 = socket$unix(0x1, 0x1, 0x0) bind$unix(r1, &(0x7f00000001c0)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x56) close(r1) 06:19:11 executing program 0: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800004, 0x12, r0, 0x0) preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x9, 0x0) mmap(&(0x7f0000000000/0xa000)=nil, 0xa000, 0x2, 0x10, 0xffffffffffffffff, 0x0) syz_mount_image$reiserfs(&(0x7f0000000140), &(0x7f0000000180)='./file0\x00', 0x8000, 0x3, &(0x7f0000000300)=[{&(0x7f0000000540)="21d37ef07e82e237fbe1b40158d20e242c5ea1f9d9edc6b9395250085d6dfa486982e82d4ce1a5e2bc00d29383bae640de", 0x31, 0x7}, {&(0x7f0000000240)="c43f281f483aa6cd83e40e59d53f177299d285bbe5d90aab2b56a76f9db49d86afa5a0f601ba9b3502de5f3724f3ec00927151f928f668b362052950a2e8f16baec29875fdad59395e86a1050c368933e3ed5a17d76bd7bded793436ea207885f395ace3fc12126c205b170be392c1645233ef01f9661090706a65f63b4845dc2884a20711a8024ad4af44aeec9db33991dae38d95cdb7132970d0d4dec58b9d46d378", 0xa3, 0x6}, {&(0x7f0000000380)="05f82c760d277896dd8c9891a41aafe24124891a32a238c3c78696d112aa09f3ae5c54b0c08676da5db7f358c72dfaca9a5d90860b4ae363c9a921c47965d339c23408a6d9b31a23aee27822f0a140d8e4ec9475a740113f2b9923b46333110e528e0a513151aad34aee1b5310fcf62c1982349253003d6d53aebbe09cf5918668ee682be93b6a671bbc", 0x8a, 0x3}], 0x2000400, &(0x7f0000000440)={[{@balloc_no_unhash_reloc}, {@nolargeio}, {@grpjquota}], [{@obj_role={'obj_role', 0x3d, '^'}}, {@hash}, {@uid_lt}, {@mask={'mask', 0x3d, 'MAY_EXEC'}}, {@uid_lt={'uid<', 0xee00}}, {@smackfsfloor={'smackfsfloor', 0x3d, ':%#[@'}}, {@obj_user={'obj_user', 0x3d, ',\\*),i'}}, {@uid_eq={'uid', 0x3d, 0xee00}}, {@seclabel}, {@uid_lt={'uid<', 0xee00}}]}) 06:19:11 executing program 3: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x0, 0x12, r0, 0x0) preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x9, 0x0) r1 = socket$unix(0x1, 0x1, 0x0) close(r1) 06:19:11 executing program 3: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x0, 0x12, r0, 0x0) preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x9, 0x0) r1 = socket$unix(0x1, 0x1, 0x0) close(r1) 06:19:11 executing program 0: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800004, 0x12, r0, 0x0) preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x9, 0x0) mmap(&(0x7f0000000000/0xa000)=nil, 0xa000, 0x2, 0x10, 0xffffffffffffffff, 0x0) syz_mount_image$reiserfs(&(0x7f0000000140), &(0x7f0000000180)='./file0\x00', 0x8000, 0x3, &(0x7f0000000300)=[{&(0x7f0000000540)="21d37ef07e82e237fbe1b40158d20e242c5ea1f9d9edc6b9395250085d6dfa486982e82d4ce1a5e2bc00d29383bae640de", 0x31, 0x7}, {&(0x7f0000000240)="c43f281f483aa6cd83e40e59d53f177299d285bbe5d90aab2b56a76f9db49d86afa5a0f601ba9b3502de5f3724f3ec00927151f928f668b362052950a2e8f16baec29875fdad59395e86a1050c368933e3ed5a17d76bd7bded793436ea207885f395ace3fc12126c205b170be392c1645233ef01f9661090706a65f63b4845dc2884a20711a8024ad4af44aeec9db33991dae38d95cdb7132970d0d4dec58b9d46d378", 0xa3, 0x6}, {&(0x7f0000000380)="05f82c760d277896dd8c9891a41aafe24124891a32a238c3c78696d112aa09f3ae5c54b0c08676da5db7f358c72dfaca9a5d90860b4ae363c9a921c47965d339c23408a6d9b31a23aee27822f0a140d8e4ec9475a740113f2b9923b46333110e528e0a513151aad34aee1b5310fcf62c1982349253003d6d53aebbe09cf5918668ee682be93b6a671bbc", 0x8a, 0x3}], 0x2000400, &(0x7f0000000440)={[{@balloc_no_unhash_reloc}, {@nolargeio}, {@grpjquota}], [{@obj_role={'obj_role', 0x3d, '^'}}, {@hash}, {@uid_lt}, {@mask={'mask', 0x3d, 'MAY_EXEC'}}, {@uid_lt={'uid<', 0xee00}}, {@smackfsfloor={'smackfsfloor', 0x3d, ':%#[@'}}, {@obj_user={'obj_user', 0x3d, ',\\*),i'}}, {@uid_eq={'uid', 0x3d, 0xee00}}, {@seclabel}, {@uid_lt={'uid<', 0xee00}}]}) 06:19:11 executing program 1: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800004, 0x12, r0, 0x0) preadv(r0, 0x0, 0x0, 0x9, 0x0) mmap(&(0x7f0000000000/0xa000)=nil, 0xa000, 0x2, 0x2172, 0xffffffffffffffff, 0x0) r1 = socket$unix(0x1, 0x1, 0x0) bind$unix(r1, &(0x7f00000001c0)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x56) close(r1) 06:19:12 executing program 2: r0 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000680), 0xffffffffffffffff) ioctl$sock_SIOCGIFINDEX_80211(0xffffffffffffffff, 0x8933, &(0x7f0000000c00)={'wlan1\x00'}) r1 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX_80211(r1, 0x8933, &(0x7f0000000e40)={'wlan0\x00', 0x0}) sendmsg$NL80211_CMD_TRIGGER_SCAN(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000f40)={&(0x7f0000000000)=ANY=[@ANYBLOB='$\x00\x00\x00', @ANYRES16=r0, @ANYBLOB="010000000000000000002100000008000300", @ANYRES32=r2, @ANYBLOB="08009e"], 0x24}}, 0x0) sendmsg$NL80211_CMD_FRAME(0xffffffffffffffff, &(0x7f0000000100)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f00000000c0)={&(0x7f0000000c40)=ANY=[@ANYBLOB="2000000059c89a20a00fadf00ada0277887124d85c2b6f27e866a2f2434f0213672fd63827c4c50f5346d89412d5351da4a233d419db04d5f089f764866116182e7757ccfd", @ANYRES16=r0, @ANYBLOB="00022dbd7000fedbdf253b0000000c0099007f000000470000000c00cd001f000400070000ff04008e00"], 0x30}, 0x1, 0x0, 0x0, 0x44}, 0x40000) r3 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) preadv(r3, &(0x7f00000001c0)=[{0x0}], 0x1, 0x9, 0x0) r4 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r4, &(0x7f0000000380)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x80, 0x1, 0x9, 0x1, 0x2, 0x3e, 0x7ff, 0x1f2, 0x40, 0x1f4, 0xbfa, 0x3, 0x38, 0x1, 0x5, 0x4, 0x4}, [{0x5, 0x9, 0x6, 0x101, 0x6, 0x4, 0x9, 0x6}, {0x5, 0x3, 0x5e61, 0x80000000, 0xcc3, 0x9, 0x7, 0x8}], "d1660f10e0ac4a6edbf3aa53803c8f57ef2a12069e82553332d2b96d67f2dbc5b04959dad57c303d876233684f5e9ad402a193da791e11122f2cccbf10d6d499f5e16385d09f63891a965d80bcb68b551fabffb4bf0b5c372b4d69cdefac988201a40429a8d0dc699820193afcab08070fde89c22e16b43dde5e37d9a3df0cd352e8667f163774d9dc3c79571e5100046281", ['\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00']}, 0x842) 06:19:12 executing program 3: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x0, 0x12, r0, 0x0) preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x9, 0x0) r1 = socket$unix(0x1, 0x1, 0x0) close(r1) 06:19:12 executing program 1: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800004, 0x12, r0, 0x0) preadv(r0, &(0x7f00000001c0), 0x0, 0x9, 0x0) mmap(&(0x7f0000000000/0xa000)=nil, 0xa000, 0x2, 0x2172, 0xffffffffffffffff, 0x0) r1 = socket$unix(0x1, 0x1, 0x0) bind$unix(r1, &(0x7f00000001c0)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x56) close(r1) 06:19:12 executing program 0: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800004, 0x12, r0, 0x0) preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x9, 0x0) mmap(&(0x7f0000000000/0xa000)=nil, 0xa000, 0x2, 0x2172, 0xffffffffffffffff, 0x0) syz_mount_image$reiserfs(0x0, &(0x7f0000000180)='./file0\x00', 0x8000, 0x3, &(0x7f0000000300)=[{&(0x7f0000000540)="21d37ef07e82e237fbe1b40158d20e242c5ea1f9d9edc6b9395250085d6dfa486982e82d4ce1a5e2bc00d29383bae640de", 0x31, 0x7}, {&(0x7f0000000240)="c43f281f483aa6cd83e40e59d53f177299d285bbe5d90aab2b56a76f9db49d86afa5a0f601ba9b3502de5f3724f3ec00927151f928f668b362052950a2e8f16baec29875fdad59395e86a1050c368933e3ed5a17d76bd7bded793436ea207885f395ace3fc12126c205b170be392c1645233ef01f9661090706a65f63b4845dc2884a20711a8024ad4af44aeec9db33991dae38d95cdb7132970d0d4dec58b9d46d378", 0xa3, 0x6}, {&(0x7f0000000380)="05f82c760d277896dd8c9891a41aafe24124891a32a238c3c78696d112aa09f3ae5c54b0c08676da5db7f358c72dfaca9a5d90860b4ae363c9a921c47965d339c23408a6d9b31a23aee27822f0a140d8e4ec9475a740113f2b9923b46333110e528e0a513151aad34aee1b5310fcf62c1982349253003d6d53aebbe09cf5918668ee682be93b6a671bbc", 0x8a, 0x3}], 0x2000400, &(0x7f0000000440)={[{@balloc_no_unhash_reloc}, {@nolargeio}, {@grpjquota}], [{@obj_role={'obj_role', 0x3d, '^'}}, {@hash}, {@uid_lt}, {@mask={'mask', 0x3d, 'MAY_EXEC'}}, {@uid_lt={'uid<', 0xee00}}, {@smackfsfloor={'smackfsfloor', 0x3d, ':%#[@'}}, {@obj_user={'obj_user', 0x3d, ',\\*),i'}}, {@uid_eq={'uid', 0x3d, 0xee00}}, {@seclabel}, {@uid_lt={'uid<', 0xee00}}]}) [ 354.664043][T15989] loop0: detected capacity change from 0 to 64 06:19:12 executing program 3: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800004, 0x10, r0, 0x0) preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x9, 0x0) r1 = socket$unix(0x1, 0x1, 0x0) close(r1) 06:19:12 executing program 1: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800004, 0x12, r0, 0x0) preadv(r0, &(0x7f00000001c0), 0x0, 0x9, 0x0) mmap(&(0x7f0000000000/0xa000)=nil, 0xa000, 0x2, 0x2172, 0xffffffffffffffff, 0x0) r1 = socket$unix(0x1, 0x1, 0x0) bind$unix(r1, &(0x7f00000001c0)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x56) close(r1) 06:19:12 executing program 0: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800004, 0x12, r0, 0x0) preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x9, 0x0) mmap(&(0x7f0000000000/0xa000)=nil, 0xa000, 0x2, 0x2172, 0xffffffffffffffff, 0x0) syz_mount_image$reiserfs(0x0, &(0x7f0000000180)='./file0\x00', 0x8000, 0x3, &(0x7f0000000300)=[{&(0x7f0000000540)="21d37ef07e82e237fbe1b40158d20e242c5ea1f9d9edc6b9395250085d6dfa486982e82d4ce1a5e2bc00d29383bae640de", 0x31, 0x7}, {&(0x7f0000000240)="c43f281f483aa6cd83e40e59d53f177299d285bbe5d90aab2b56a76f9db49d86afa5a0f601ba9b3502de5f3724f3ec00927151f928f668b362052950a2e8f16baec29875fdad59395e86a1050c368933e3ed5a17d76bd7bded793436ea207885f395ace3fc12126c205b170be392c1645233ef01f9661090706a65f63b4845dc2884a20711a8024ad4af44aeec9db33991dae38d95cdb7132970d0d4dec58b9d46d378", 0xa3, 0x6}, {&(0x7f0000000380)="05f82c760d277896dd8c9891a41aafe24124891a32a238c3c78696d112aa09f3ae5c54b0c08676da5db7f358c72dfaca9a5d90860b4ae363c9a921c47965d339c23408a6d9b31a23aee27822f0a140d8e4ec9475a740113f2b9923b46333110e528e0a513151aad34aee1b5310fcf62c1982349253003d6d53aebbe09cf5918668ee682be93b6a671bbc", 0x8a, 0x3}], 0x2000400, &(0x7f0000000440)={[{@balloc_no_unhash_reloc}, {@nolargeio}, {@grpjquota}], [{@obj_role={'obj_role', 0x3d, '^'}}, {@hash}, {@uid_lt}, {@mask={'mask', 0x3d, 'MAY_EXEC'}}, {@uid_lt={'uid<', 0xee00}}, {@smackfsfloor={'smackfsfloor', 0x3d, ':%#[@'}}, {@obj_user={'obj_user', 0x3d, ',\\*),i'}}, {@uid_eq={'uid', 0x3d, 0xee00}}, {@seclabel}, {@uid_lt={'uid<', 0xee00}}]}) 06:19:12 executing program 3: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800004, 0x10, r0, 0x0) preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x9, 0x0) r1 = socket$unix(0x1, 0x1, 0x0) close(r1) [ 355.010278][T16004] loop0: detected capacity change from 0 to 64 06:19:13 executing program 2: r0 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000680), 0xffffffffffffffff) ioctl$sock_SIOCGIFINDEX_80211(0xffffffffffffffff, 0x8933, &(0x7f0000000c00)={'wlan1\x00'}) r1 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX_80211(r1, 0x8933, &(0x7f0000000e40)={'wlan0\x00', 0x0}) sendmsg$NL80211_CMD_TRIGGER_SCAN(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000f40)={&(0x7f0000000000)=ANY=[@ANYBLOB='$\x00\x00\x00', @ANYRES16=r0, @ANYBLOB="010000000000000000002100000008000300", @ANYRES32=r2, @ANYBLOB="08009e"], 0x24}}, 0x0) sendmsg$NL80211_CMD_FRAME(0xffffffffffffffff, &(0x7f0000000100)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f00000000c0)={&(0x7f0000000c40)=ANY=[@ANYBLOB="2000000059c89a20a00fadf00ada0277887124d85c2b6f27e866a2f2434f0213672fd63827c4c50f5346d89412d5351da4a233d419db04d5f089f764866116182e7757ccfd", @ANYRES16=r0, @ANYBLOB="00022dbd7000fedbdf253b0000000c0099007f000000470000000c00cd001f000400070000ff04008e00"], 0x30}, 0x1, 0x0, 0x0, 0x44}, 0x40000) r3 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) preadv(r3, &(0x7f00000001c0)=[{0x0}], 0x1, 0x9, 0x0) r4 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r4, &(0x7f0000000380)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x80, 0x1, 0x9, 0x1, 0x2, 0x3e, 0x7ff, 0x1f2, 0x40, 0x1f4, 0xbfa, 0x3, 0x38, 0x1, 0x5, 0x4, 0x4}, [{0x5, 0x9, 0x6, 0x101, 0x6, 0x4, 0x9, 0x6}, {0x5, 0x3, 0x5e61, 0x80000000, 0xcc3, 0x9, 0x7, 0x8}], "d1660f10e0ac4a6edbf3aa53803c8f57ef2a12069e82553332d2b96d67f2dbc5b04959dad57c303d876233684f5e9ad402a193da791e11122f2cccbf10d6d499f5e16385d09f63891a965d80bcb68b551fabffb4bf0b5c372b4d69cdefac988201a40429a8d0dc699820193afcab08070fde89c22e16b43dde5e37d9a3df0cd352e8667f163774d9dc3c79571e5100046281", ['\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00']}, 0x842) 06:19:13 executing program 1: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800004, 0x12, r0, 0x0) preadv(r0, &(0x7f00000001c0), 0x0, 0x9, 0x0) mmap(&(0x7f0000000000/0xa000)=nil, 0xa000, 0x2, 0x2172, 0xffffffffffffffff, 0x0) r1 = socket$unix(0x1, 0x1, 0x0) bind$unix(r1, &(0x7f00000001c0)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x56) close(r1) 06:19:13 executing program 3: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800004, 0x10, r0, 0x0) preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x9, 0x0) r1 = socket$unix(0x1, 0x1, 0x0) close(r1) 06:19:13 executing program 0: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800004, 0x12, r0, 0x0) preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x9, 0x0) mmap(&(0x7f0000000000/0xa000)=nil, 0xa000, 0x2, 0x2172, 0xffffffffffffffff, 0x0) syz_mount_image$reiserfs(0x0, &(0x7f0000000180)='./file0\x00', 0x8000, 0x3, &(0x7f0000000300)=[{&(0x7f0000000540)="21d37ef07e82e237fbe1b40158d20e242c5ea1f9d9edc6b9395250085d6dfa486982e82d4ce1a5e2bc00d29383bae640de", 0x31, 0x7}, {&(0x7f0000000240)="c43f281f483aa6cd83e40e59d53f177299d285bbe5d90aab2b56a76f9db49d86afa5a0f601ba9b3502de5f3724f3ec00927151f928f668b362052950a2e8f16baec29875fdad59395e86a1050c368933e3ed5a17d76bd7bded793436ea207885f395ace3fc12126c205b170be392c1645233ef01f9661090706a65f63b4845dc2884a20711a8024ad4af44aeec9db33991dae38d95cdb7132970d0d4dec58b9d46d378", 0xa3, 0x6}, {&(0x7f0000000380)="05f82c760d277896dd8c9891a41aafe24124891a32a238c3c78696d112aa09f3ae5c54b0c08676da5db7f358c72dfaca9a5d90860b4ae363c9a921c47965d339c23408a6d9b31a23aee27822f0a140d8e4ec9475a740113f2b9923b46333110e528e0a513151aad34aee1b5310fcf62c1982349253003d6d53aebbe09cf5918668ee682be93b6a671bbc", 0x8a, 0x3}], 0x2000400, &(0x7f0000000440)={[{@balloc_no_unhash_reloc}, {@nolargeio}, {@grpjquota}], [{@obj_role={'obj_role', 0x3d, '^'}}, {@hash}, {@uid_lt}, {@mask={'mask', 0x3d, 'MAY_EXEC'}}, {@uid_lt={'uid<', 0xee00}}, {@smackfsfloor={'smackfsfloor', 0x3d, ':%#[@'}}, {@obj_user={'obj_user', 0x3d, ',\\*),i'}}, {@uid_eq={'uid', 0x3d, 0xee00}}, {@seclabel}, {@uid_lt={'uid<', 0xee00}}]}) 06:19:13 executing program 3: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800004, 0x12, 0xffffffffffffffff, 0x0) preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x9, 0x0) r1 = socket$unix(0x1, 0x1, 0x0) close(r1) 06:19:13 executing program 1: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800004, 0x12, r0, 0x0) preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x0, 0x0) mmap(&(0x7f0000000000/0xa000)=nil, 0xa000, 0x2, 0x2172, 0xffffffffffffffff, 0x0) r1 = socket$unix(0x1, 0x1, 0x0) bind$unix(r1, &(0x7f00000001c0)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x56) close(r1) [ 355.670950][T16017] loop0: detected capacity change from 0 to 64 06:19:13 executing program 1: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800004, 0x12, r0, 0x0) preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x0, 0x0) mmap(&(0x7f0000000000/0xa000)=nil, 0xa000, 0x2, 0x2172, 0xffffffffffffffff, 0x0) r1 = socket$unix(0x1, 0x1, 0x0) bind$unix(r1, &(0x7f00000001c0)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x56) close(r1) 06:19:13 executing program 3: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800004, 0x12, 0xffffffffffffffff, 0x0) preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x9, 0x0) r1 = socket$unix(0x1, 0x1, 0x0) close(r1) 06:19:14 executing program 2: r0 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000680), 0xffffffffffffffff) ioctl$sock_SIOCGIFINDEX_80211(0xffffffffffffffff, 0x8933, &(0x7f0000000c00)={'wlan1\x00'}) r1 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX_80211(r1, 0x8933, &(0x7f0000000e40)={'wlan0\x00', 0x0}) sendmsg$NL80211_CMD_TRIGGER_SCAN(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000f40)={&(0x7f0000000000)=ANY=[@ANYBLOB='$\x00\x00\x00', @ANYRES16=r0, @ANYBLOB="010000000000000000002100000008000300", @ANYRES32=r2, @ANYBLOB="08009e"], 0x24}}, 0x0) sendmsg$NL80211_CMD_FRAME(0xffffffffffffffff, &(0x7f0000000100)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f00000000c0)={&(0x7f0000000c40)=ANY=[@ANYBLOB="2000000059c89a20a00fadf00ada0277887124d85c2b6f27e866a2f2434f0213672fd63827c4c50f5346d89412d5351da4a233d419db04d5f089f764866116182e7757ccfd", @ANYRES16=r0, @ANYBLOB="00022dbd7000fedbdf253b0000000c0099007f000000470000000c00cd001f000400070000ff04008e00"], 0x30}, 0x1, 0x0, 0x0, 0x44}, 0x40000) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800004, 0x12, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f00000001c0)=[{0x0}], 0x1, 0x9, 0x0) r3 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r3, &(0x7f0000000380)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x80, 0x1, 0x9, 0x1, 0x2, 0x3e, 0x7ff, 0x1f2, 0x40, 0x1f4, 0xbfa, 0x3, 0x38, 0x1, 0x5, 0x4, 0x4}, [{0x5, 0x9, 0x6, 0x101, 0x6, 0x4, 0x9, 0x6}, {0x5, 0x3, 0x5e61, 0x80000000, 0xcc3, 0x9, 0x7, 0x8}], "d1660f10e0ac4a6edbf3aa53803c8f57ef2a12069e82553332d2b96d67f2dbc5b04959dad57c303d876233684f5e9ad402a193da791e11122f2cccbf10d6d499f5e16385d09f63891a965d80bcb68b551fabffb4bf0b5c372b4d69cdefac988201a40429a8d0dc699820193afcab08070fde89c22e16b43dde5e37d9a3df0cd352e8667f163774d9dc3c79571e5100046281", ['\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00']}, 0x842) 06:19:14 executing program 0: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800004, 0x12, r0, 0x0) preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x9, 0x0) mmap(&(0x7f0000000000/0xa000)=nil, 0xa000, 0x2, 0x2172, 0xffffffffffffffff, 0x0) syz_mount_image$reiserfs(&(0x7f0000000140), 0x0, 0x8000, 0x3, &(0x7f0000000300)=[{&(0x7f0000000540)="21d37ef07e82e237fbe1b40158d20e242c5ea1f9d9edc6b9395250085d6dfa486982e82d4ce1a5e2bc00d29383bae640de", 0x31, 0x7}, {&(0x7f0000000240)="c43f281f483aa6cd83e40e59d53f177299d285bbe5d90aab2b56a76f9db49d86afa5a0f601ba9b3502de5f3724f3ec00927151f928f668b362052950a2e8f16baec29875fdad59395e86a1050c368933e3ed5a17d76bd7bded793436ea207885f395ace3fc12126c205b170be392c1645233ef01f9661090706a65f63b4845dc2884a20711a8024ad4af44aeec9db33991dae38d95cdb7132970d0d4dec58b9d46d378", 0xa3, 0x6}, {&(0x7f0000000380)="05f82c760d277896dd8c9891a41aafe24124891a32a238c3c78696d112aa09f3ae5c54b0c08676da5db7f358c72dfaca9a5d90860b4ae363c9a921c47965d339c23408a6d9b31a23aee27822f0a140d8e4ec9475a740113f2b9923b46333110e528e0a513151aad34aee1b5310fcf62c1982349253003d6d53aebbe09cf5918668ee682be93b6a671bbc", 0x8a, 0x3}], 0x2000400, &(0x7f0000000440)={[{@balloc_no_unhash_reloc}, {@nolargeio}, {@grpjquota}], [{@obj_role={'obj_role', 0x3d, '^'}}, {@hash}, {@uid_lt}, {@mask={'mask', 0x3d, 'MAY_EXEC'}}, {@uid_lt={'uid<', 0xee00}}, {@smackfsfloor={'smackfsfloor', 0x3d, ':%#[@'}}, {@obj_user={'obj_user', 0x3d, ',\\*),i'}}, {@uid_eq={'uid', 0x3d, 0xee00}}, {@seclabel}, {@uid_lt={'uid<', 0xee00}}]}) 06:19:14 executing program 1: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800004, 0x12, r0, 0x0) preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x0, 0x0) mmap(&(0x7f0000000000/0xa000)=nil, 0xa000, 0x2, 0x2172, 0xffffffffffffffff, 0x0) r1 = socket$unix(0x1, 0x1, 0x0) bind$unix(r1, &(0x7f00000001c0)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x56) close(r1) 06:19:14 executing program 3: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800004, 0x12, 0xffffffffffffffff, 0x0) preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x9, 0x0) r1 = socket$unix(0x1, 0x1, 0x0) close(r1) [ 356.510639][T16035] loop0: detected capacity change from 0 to 64 06:19:14 executing program 3: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800004, 0x12, r0, 0x0) preadv(0xffffffffffffffff, &(0x7f00000001c0)=[{0x0}], 0x1, 0x9, 0x0) r1 = socket$unix(0x1, 0x1, 0x0) close(r1) 06:19:14 executing program 0: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800004, 0x12, r0, 0x0) preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x9, 0x0) mmap(&(0x7f0000000000/0xa000)=nil, 0xa000, 0x2, 0x2172, 0xffffffffffffffff, 0x0) syz_mount_image$reiserfs(&(0x7f0000000140), 0x0, 0x8000, 0x3, &(0x7f0000000300)=[{&(0x7f0000000540)="21d37ef07e82e237fbe1b40158d20e242c5ea1f9d9edc6b9395250085d6dfa486982e82d4ce1a5e2bc00d29383bae640de", 0x31, 0x7}, {&(0x7f0000000240)="c43f281f483aa6cd83e40e59d53f177299d285bbe5d90aab2b56a76f9db49d86afa5a0f601ba9b3502de5f3724f3ec00927151f928f668b362052950a2e8f16baec29875fdad59395e86a1050c368933e3ed5a17d76bd7bded793436ea207885f395ace3fc12126c205b170be392c1645233ef01f9661090706a65f63b4845dc2884a20711a8024ad4af44aeec9db33991dae38d95cdb7132970d0d4dec58b9d46d378", 0xa3, 0x6}, {&(0x7f0000000380)="05f82c760d277896dd8c9891a41aafe24124891a32a238c3c78696d112aa09f3ae5c54b0c08676da5db7f358c72dfaca9a5d90860b4ae363c9a921c47965d339c23408a6d9b31a23aee27822f0a140d8e4ec9475a740113f2b9923b46333110e528e0a513151aad34aee1b5310fcf62c1982349253003d6d53aebbe09cf5918668ee682be93b6a671bbc", 0x8a, 0x3}], 0x2000400, &(0x7f0000000440)={[{@balloc_no_unhash_reloc}, {@nolargeio}, {@grpjquota}], [{@obj_role={'obj_role', 0x3d, '^'}}, {@hash}, {@uid_lt}, {@mask={'mask', 0x3d, 'MAY_EXEC'}}, {@uid_lt={'uid<', 0xee00}}, {@smackfsfloor={'smackfsfloor', 0x3d, ':%#[@'}}, {@obj_user={'obj_user', 0x3d, ',\\*),i'}}, {@uid_eq={'uid', 0x3d, 0xee00}}, {@seclabel}, {@uid_lt={'uid<', 0xee00}}]}) 06:19:14 executing program 1: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800004, 0x12, r0, 0x0) preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x9, 0x0) mmap(&(0x7f0000000000/0xa000)=nil, 0xa000, 0x0, 0x2172, 0xffffffffffffffff, 0x0) r1 = socket$unix(0x1, 0x1, 0x0) bind$unix(r1, &(0x7f00000001c0)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x56) close(r1) 06:19:14 executing program 3: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800004, 0x12, r0, 0x0) preadv(0xffffffffffffffff, &(0x7f00000001c0)=[{0x0}], 0x1, 0x9, 0x0) r1 = socket$unix(0x1, 0x1, 0x0) close(r1) [ 356.804532][T16049] loop0: detected capacity change from 0 to 64 06:19:15 executing program 2: r0 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000680), 0xffffffffffffffff) ioctl$sock_SIOCGIFINDEX_80211(0xffffffffffffffff, 0x8933, &(0x7f0000000c00)={'wlan1\x00'}) r1 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX_80211(r1, 0x8933, &(0x7f0000000e40)={'wlan0\x00', 0x0}) sendmsg$NL80211_CMD_TRIGGER_SCAN(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000f40)={&(0x7f0000000000)=ANY=[@ANYBLOB='$\x00\x00\x00', @ANYRES16=r0, @ANYBLOB="010000000000000000002100000008000300", @ANYRES32=r2, @ANYBLOB="08009e"], 0x24}}, 0x0) sendmsg$NL80211_CMD_FRAME(0xffffffffffffffff, &(0x7f0000000100)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f00000000c0)={&(0x7f0000000c40)=ANY=[@ANYBLOB="2000000059c89a20a00fadf00ada0277887124d85c2b6f27e866a2f2434f0213672fd63827c4c50f5346d89412d5351da4a233d419db04d5f089f764866116182e7757ccfd", @ANYRES16=r0, @ANYBLOB="00022dbd7000fedbdf253b0000000c0099007f000000470000000c00cd001f000400070000ff04008e00"], 0x30}, 0x1, 0x0, 0x0, 0x44}, 0x40000) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800004, 0x12, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f00000001c0)=[{0x0}], 0x1, 0x9, 0x0) r3 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r3, &(0x7f0000000380)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x80, 0x1, 0x9, 0x1, 0x2, 0x3e, 0x7ff, 0x1f2, 0x40, 0x1f4, 0xbfa, 0x3, 0x38, 0x1, 0x5, 0x4, 0x4}, [{0x5, 0x9, 0x6, 0x101, 0x6, 0x4, 0x9, 0x6}, {0x5, 0x3, 0x5e61, 0x80000000, 0xcc3, 0x9, 0x7, 0x8}], "d1660f10e0ac4a6edbf3aa53803c8f57ef2a12069e82553332d2b96d67f2dbc5b04959dad57c303d876233684f5e9ad402a193da791e11122f2cccbf10d6d499f5e16385d09f63891a965d80bcb68b551fabffb4bf0b5c372b4d69cdefac988201a40429a8d0dc699820193afcab08070fde89c22e16b43dde5e37d9a3df0cd352e8667f163774d9dc3c79571e5100046281", ['\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00']}, 0x842) 06:19:15 executing program 1: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800004, 0x12, r0, 0x0) preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x9, 0x0) mmap(&(0x7f0000000000/0xa000)=nil, 0xa000, 0x0, 0x2172, 0xffffffffffffffff, 0x0) r1 = socket$unix(0x1, 0x1, 0x0) bind$unix(r1, &(0x7f00000001c0)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x56) close(r1) 06:19:15 executing program 0: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800004, 0x12, r0, 0x0) preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x9, 0x0) mmap(&(0x7f0000000000/0xa000)=nil, 0xa000, 0x2, 0x2172, 0xffffffffffffffff, 0x0) syz_mount_image$reiserfs(&(0x7f0000000140), 0x0, 0x8000, 0x3, &(0x7f0000000300)=[{&(0x7f0000000540)="21d37ef07e82e237fbe1b40158d20e242c5ea1f9d9edc6b9395250085d6dfa486982e82d4ce1a5e2bc00d29383bae640de", 0x31, 0x7}, {&(0x7f0000000240)="c43f281f483aa6cd83e40e59d53f177299d285bbe5d90aab2b56a76f9db49d86afa5a0f601ba9b3502de5f3724f3ec00927151f928f668b362052950a2e8f16baec29875fdad59395e86a1050c368933e3ed5a17d76bd7bded793436ea207885f395ace3fc12126c205b170be392c1645233ef01f9661090706a65f63b4845dc2884a20711a8024ad4af44aeec9db33991dae38d95cdb7132970d0d4dec58b9d46d378", 0xa3, 0x6}, {&(0x7f0000000380)="05f82c760d277896dd8c9891a41aafe24124891a32a238c3c78696d112aa09f3ae5c54b0c08676da5db7f358c72dfaca9a5d90860b4ae363c9a921c47965d339c23408a6d9b31a23aee27822f0a140d8e4ec9475a740113f2b9923b46333110e528e0a513151aad34aee1b5310fcf62c1982349253003d6d53aebbe09cf5918668ee682be93b6a671bbc", 0x8a, 0x3}], 0x2000400, &(0x7f0000000440)={[{@balloc_no_unhash_reloc}, {@nolargeio}, {@grpjquota}], [{@obj_role={'obj_role', 0x3d, '^'}}, {@hash}, {@uid_lt}, {@mask={'mask', 0x3d, 'MAY_EXEC'}}, {@uid_lt={'uid<', 0xee00}}, {@smackfsfloor={'smackfsfloor', 0x3d, ':%#[@'}}, {@obj_user={'obj_user', 0x3d, ',\\*),i'}}, {@uid_eq={'uid', 0x3d, 0xee00}}, {@seclabel}, {@uid_lt={'uid<', 0xee00}}]}) 06:19:15 executing program 3: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800004, 0x12, r0, 0x0) preadv(0xffffffffffffffff, &(0x7f00000001c0)=[{0x0}], 0x1, 0x9, 0x0) r1 = socket$unix(0x1, 0x1, 0x0) close(r1) [ 357.506941][T16061] loop0: detected capacity change from 0 to 64 06:19:15 executing program 1: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800004, 0x12, r0, 0x0) preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x9, 0x0) mmap(&(0x7f0000000000/0xa000)=nil, 0xa000, 0x0, 0x2172, 0xffffffffffffffff, 0x0) r1 = socket$unix(0x1, 0x1, 0x0) bind$unix(r1, &(0x7f00000001c0)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x56) close(r1) 06:19:15 executing program 3: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800004, 0x12, r0, 0x0) preadv(r0, 0x0, 0x0, 0x9, 0x0) r1 = socket$unix(0x1, 0x1, 0x0) close(r1) 06:19:15 executing program 0: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800004, 0x12, r0, 0x0) preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x9, 0x0) mmap(&(0x7f0000000000/0xa000)=nil, 0xa000, 0x2, 0x2172, 0xffffffffffffffff, 0x0) syz_mount_image$reiserfs(&(0x7f0000000140), &(0x7f0000000180)='./file0\x00', 0x0, 0x3, &(0x7f0000000300)=[{&(0x7f0000000540)="21d37ef07e82e237fbe1b40158d20e242c5ea1f9d9edc6b9395250085d6dfa486982e82d4ce1a5e2bc00d29383bae640de", 0x31, 0x7}, {&(0x7f0000000240)="c43f281f483aa6cd83e40e59d53f177299d285bbe5d90aab2b56a76f9db49d86afa5a0f601ba9b3502de5f3724f3ec00927151f928f668b362052950a2e8f16baec29875fdad59395e86a1050c368933e3ed5a17d76bd7bded793436ea207885f395ace3fc12126c205b170be392c1645233ef01f9661090706a65f63b4845dc2884a20711a8024ad4af44aeec9db33991dae38d95cdb7132970d0d4dec58b9d46d378", 0xa3, 0x6}, {&(0x7f0000000380)="05f82c760d277896dd8c9891a41aafe24124891a32a238c3c78696d112aa09f3ae5c54b0c08676da5db7f358c72dfaca9a5d90860b4ae363c9a921c47965d339c23408a6d9b31a23aee27822f0a140d8e4ec9475a740113f2b9923b46333110e528e0a513151aad34aee1b5310fcf62c1982349253003d6d53aebbe09cf5918668ee682be93b6a671bbc", 0x8a, 0x3}], 0x2000400, &(0x7f0000000440)={[{@balloc_no_unhash_reloc}, {@nolargeio}, {@grpjquota}], [{@obj_role={'obj_role', 0x3d, '^'}}, {@hash}, {@uid_lt}, {@mask={'mask', 0x3d, 'MAY_EXEC'}}, {@uid_lt={'uid<', 0xee00}}, {@smackfsfloor={'smackfsfloor', 0x3d, ':%#[@'}}, {@obj_user={'obj_user', 0x3d, ',\\*),i'}}, {@uid_eq={'uid', 0x3d, 0xee00}}, {@seclabel}, {@uid_lt={'uid<', 0xee00}}]}) 06:19:15 executing program 1: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800004, 0x12, r0, 0x0) preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x9, 0x0) mmap(&(0x7f0000000000/0xa000)=nil, 0xa000, 0x2, 0x10, 0xffffffffffffffff, 0x0) r1 = socket$unix(0x1, 0x1, 0x0) bind$unix(r1, &(0x7f00000001c0)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x56) close(r1) [ 357.691943][T16073] REISERFS warning (device loop0): super-6504 reiserfs_getopt: the option "nolargeio" requires an argument [ 357.691943][T16073] 06:19:16 executing program 3: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800004, 0x12, r0, 0x0) preadv(r0, 0x0, 0x0, 0x9, 0x0) r1 = socket$unix(0x1, 0x1, 0x0) close(r1) 06:19:16 executing program 1: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800004, 0x12, r0, 0x0) preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x9, 0x0) mmap(&(0x7f0000000000/0xa000)=nil, 0xa000, 0x2, 0x10, 0xffffffffffffffff, 0x0) r1 = socket$unix(0x1, 0x1, 0x0) bind$unix(r1, &(0x7f00000001c0)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x56) close(r1) 06:19:16 executing program 2: r0 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000680), 0xffffffffffffffff) ioctl$sock_SIOCGIFINDEX_80211(0xffffffffffffffff, 0x8933, &(0x7f0000000c00)={'wlan1\x00'}) r1 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX_80211(r1, 0x8933, &(0x7f0000000e40)={'wlan0\x00', 0x0}) sendmsg$NL80211_CMD_TRIGGER_SCAN(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000f40)={&(0x7f0000000000)=ANY=[@ANYBLOB='$\x00\x00\x00', @ANYRES16=r0, @ANYBLOB="010000000000000000002100000008000300", @ANYRES32=r2, @ANYBLOB="08009e"], 0x24}}, 0x0) sendmsg$NL80211_CMD_FRAME(0xffffffffffffffff, &(0x7f0000000100)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f00000000c0)={&(0x7f0000000c40)=ANY=[@ANYBLOB="2000000059c89a20a00fadf00ada0277887124d85c2b6f27e866a2f2434f0213672fd63827c4c50f5346d89412d5351da4a233d419db04d5f089f764866116182e7757ccfd", @ANYRES16=r0, @ANYBLOB="00022dbd7000fedbdf253b0000000c0099007f000000470000000c00cd001f000400070000ff04008e00"], 0x30}, 0x1, 0x0, 0x0, 0x44}, 0x40000) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800004, 0x12, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f00000001c0)=[{0x0}], 0x1, 0x9, 0x0) r3 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r3, &(0x7f0000000380)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x80, 0x1, 0x9, 0x1, 0x2, 0x3e, 0x7ff, 0x1f2, 0x40, 0x1f4, 0xbfa, 0x3, 0x38, 0x1, 0x5, 0x4, 0x4}, [{0x5, 0x9, 0x6, 0x101, 0x6, 0x4, 0x9, 0x6}, {0x5, 0x3, 0x5e61, 0x80000000, 0xcc3, 0x9, 0x7, 0x8}], "d1660f10e0ac4a6edbf3aa53803c8f57ef2a12069e82553332d2b96d67f2dbc5b04959dad57c303d876233684f5e9ad402a193da791e11122f2cccbf10d6d499f5e16385d09f63891a965d80bcb68b551fabffb4bf0b5c372b4d69cdefac988201a40429a8d0dc699820193afcab08070fde89c22e16b43dde5e37d9a3df0cd352e8667f163774d9dc3c79571e5100046281", ['\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00']}, 0x842) 06:19:16 executing program 0: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800004, 0x12, r0, 0x0) preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x9, 0x0) mmap(&(0x7f0000000000/0xa000)=nil, 0xa000, 0x2, 0x2172, 0xffffffffffffffff, 0x0) syz_mount_image$reiserfs(&(0x7f0000000140), &(0x7f0000000180)='./file0\x00', 0x0, 0x0, 0x0, 0x2000400, &(0x7f0000000440)={[{@balloc_no_unhash_reloc}, {@nolargeio}, {@grpjquota}], [{@obj_role={'obj_role', 0x3d, '^'}}, {@hash}, {@uid_lt}, {@mask={'mask', 0x3d, 'MAY_EXEC'}}, {@uid_lt={'uid<', 0xee00}}, {@smackfsfloor={'smackfsfloor', 0x3d, ':%#[@'}}, {@obj_user={'obj_user', 0x3d, ',\\*),i'}}, {@uid_eq={'uid', 0x3d, 0xee00}}, {@seclabel}, {@uid_lt={'uid<', 0xee00}}]}) 06:19:16 executing program 1: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800004, 0x12, r0, 0x0) preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x9, 0x0) mmap(&(0x7f0000000000/0xa000)=nil, 0xa000, 0x2, 0x10, 0xffffffffffffffff, 0x0) r1 = socket$unix(0x1, 0x1, 0x0) bind$unix(r1, &(0x7f00000001c0)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x56) close(r1) 06:19:16 executing program 0: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800004, 0x12, r0, 0x0) preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x9, 0x0) mmap(&(0x7f0000000000/0xa000)=nil, 0xa000, 0x2, 0x2172, 0xffffffffffffffff, 0x0) syz_mount_image$reiserfs(&(0x7f0000000140), &(0x7f0000000180)='./file0\x00', 0x0, 0x0, 0x0, 0x2000400, &(0x7f0000000440)={[{@balloc_no_unhash_reloc}, {@nolargeio}, {@grpjquota}], [{@obj_role={'obj_role', 0x3d, '^'}}, {@hash}, {@uid_lt}, {@mask={'mask', 0x3d, 'MAY_EXEC'}}, {@uid_lt={'uid<', 0xee00}}, {@smackfsfloor={'smackfsfloor', 0x3d, ':%#[@'}}, {@obj_user={'obj_user', 0x3d, ',\\*),i'}}, {@uid_eq={'uid', 0x3d, 0xee00}}, {@seclabel}, {@uid_lt={'uid<', 0xee00}}]}) 06:19:16 executing program 3: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800004, 0x12, r0, 0x0) preadv(r0, 0x0, 0x0, 0x9, 0x0) r1 = socket$unix(0x1, 0x1, 0x0) close(r1) 06:19:16 executing program 3: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800004, 0x12, r0, 0x0) preadv(r0, &(0x7f00000001c0), 0x0, 0x9, 0x0) r1 = socket$unix(0x1, 0x1, 0x0) close(r1) 06:19:16 executing program 3: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800004, 0x12, r0, 0x0) preadv(r0, &(0x7f00000001c0), 0x0, 0x9, 0x0) r1 = socket$unix(0x1, 0x1, 0x0) close(r1) 06:19:16 executing program 0: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800004, 0x12, r0, 0x0) preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x9, 0x0) mmap(&(0x7f0000000000/0xa000)=nil, 0xa000, 0x2, 0x2172, 0xffffffffffffffff, 0x0) syz_mount_image$reiserfs(&(0x7f0000000140), &(0x7f0000000180)='./file0\x00', 0x0, 0x0, 0x0, 0x2000400, &(0x7f0000000440)={[{@balloc_no_unhash_reloc}, {@nolargeio}, {@grpjquota}], [{@obj_role={'obj_role', 0x3d, '^'}}, {@hash}, {@uid_lt}, {@mask={'mask', 0x3d, 'MAY_EXEC'}}, {@uid_lt={'uid<', 0xee00}}, {@smackfsfloor={'smackfsfloor', 0x3d, ':%#[@'}}, {@obj_user={'obj_user', 0x3d, ',\\*),i'}}, {@uid_eq={'uid', 0x3d, 0xee00}}, {@seclabel}, {@uid_lt={'uid<', 0xee00}}]}) 06:19:16 executing program 2: r0 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000680), 0xffffffffffffffff) ioctl$sock_SIOCGIFINDEX_80211(0xffffffffffffffff, 0x8933, &(0x7f0000000c00)={'wlan1\x00'}) r1 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX_80211(r1, 0x8933, &(0x7f0000000e40)={'wlan0\x00', 0x0}) sendmsg$NL80211_CMD_TRIGGER_SCAN(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000f40)={&(0x7f0000000000)=ANY=[@ANYBLOB='$\x00\x00\x00', @ANYRES16=r0, @ANYBLOB="010000000000000000002100000008000300", @ANYRES32=r2, @ANYBLOB="08009e"], 0x24}}, 0x0) r3 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800004, 0x12, r3, 0x0) preadv(r3, &(0x7f00000001c0)=[{0x0}], 0x1, 0x9, 0x0) r4 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r4, &(0x7f0000000380)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x80, 0x1, 0x9, 0x1, 0x2, 0x3e, 0x7ff, 0x1f2, 0x40, 0x1f4, 0xbfa, 0x3, 0x38, 0x1, 0x5, 0x4, 0x4}, [{0x5, 0x9, 0x6, 0x101, 0x6, 0x4, 0x9, 0x6}, {0x5, 0x3, 0x5e61, 0x80000000, 0xcc3, 0x9, 0x7, 0x8}], "d1660f10e0ac4a6edbf3aa53803c8f57ef2a12069e82553332d2b96d67f2dbc5b04959dad57c303d876233684f5e9ad402a193da791e11122f2cccbf10d6d499f5e16385d09f63891a965d80bcb68b551fabffb4bf0b5c372b4d69cdefac988201a40429a8d0dc699820193afcab08070fde89c22e16b43dde5e37d9a3df0cd352e8667f163774d9dc3c79571e5100046281", ['\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00']}, 0x842) 06:19:16 executing program 1: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800004, 0x12, r0, 0x0) preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x9, 0x0) mmap(&(0x7f0000000000/0xa000)=nil, 0xa000, 0x2, 0x2172, 0xffffffffffffffff, 0x0) r1 = socket$unix(0x1, 0x0, 0x0) bind$unix(r1, &(0x7f00000001c0)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x56) close(r1) 06:19:16 executing program 3: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800004, 0x12, r0, 0x0) preadv(r0, &(0x7f00000001c0), 0x0, 0x9, 0x0) r1 = socket$unix(0x1, 0x1, 0x0) close(r1) 06:19:16 executing program 0: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800004, 0x12, r0, 0x0) preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x9, 0x0) mmap(&(0x7f0000000000/0xa000)=nil, 0xa000, 0x2, 0x2172, 0xffffffffffffffff, 0x0) syz_mount_image$reiserfs(&(0x7f0000000140), &(0x7f0000000180)='./file0\x00', 0x0, 0x2, &(0x7f0000000300)=[{&(0x7f0000000540)="21d37ef07e82e237fbe1b40158d20e242c5ea1f9d9edc6b9395250085d6dfa486982e82d4ce1a5e2bc00d29383bae640de", 0x31, 0x7}, {&(0x7f0000000240)="c43f281f483aa6cd83e40e59d53f177299d285bbe5d90aab2b56a76f9db49d86afa5a0f601ba9b3502de5f3724f3ec00927151f928f668b362052950a2e8f16baec29875fdad59395e86a1050c368933e3ed5a17d76bd7bded793436ea207885f395ace3fc12126c205b170be392c1645233ef01f9661090706a65f63b4845dc2884a20711a8024ad4af44aeec9db33991dae38d95cdb7132970d0d4dec58b9d46d378", 0xa3, 0x6}], 0x2000400, &(0x7f0000000440)={[{@balloc_no_unhash_reloc}, {@nolargeio}, {@grpjquota}], [{@obj_role={'obj_role', 0x3d, '^'}}, {@hash}, {@uid_lt}, {@mask={'mask', 0x3d, 'MAY_EXEC'}}, {@uid_lt={'uid<', 0xee00}}, {@smackfsfloor={'smackfsfloor', 0x3d, ':%#[@'}}, {@obj_user={'obj_user', 0x3d, ',\\*),i'}}, {@uid_eq={'uid', 0x3d, 0xee00}}, {@seclabel}, {@uid_lt={'uid<', 0xee00}}]}) 06:19:17 executing program 1: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800004, 0x12, r0, 0x0) preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x9, 0x0) mmap(&(0x7f0000000000/0xa000)=nil, 0xa000, 0x2, 0x2172, 0xffffffffffffffff, 0x0) r1 = socket$unix(0x1, 0x0, 0x0) bind$unix(r1, &(0x7f00000001c0)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x56) close(r1) [ 359.413759][T16121] REISERFS warning (device loop0): super-6504 reiserfs_getopt: the option "nolargeio" requires an argument [ 359.413759][T16121] 06:19:17 executing program 3: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800004, 0x12, r0, 0x0) preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x0, 0x0) r1 = socket$unix(0x1, 0x1, 0x0) close(r1) 06:19:17 executing program 0: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800004, 0x12, r0, 0x0) preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x9, 0x0) mmap(&(0x7f0000000000/0xa000)=nil, 0xa000, 0x2, 0x2172, 0xffffffffffffffff, 0x0) syz_mount_image$reiserfs(&(0x7f0000000140), &(0x7f0000000180)='./file0\x00', 0x0, 0x1, &(0x7f0000000300)=[{&(0x7f0000000540)="21d37ef07e82e237fbe1b40158d20e242c5ea1f9d9edc6b9395250085d6dfa486982e82d4ce1a5e2bc00d29383bae640de", 0x31, 0x7}], 0x2000400, &(0x7f0000000440)={[{@balloc_no_unhash_reloc}, {@nolargeio}, {@grpjquota}], [{@obj_role={'obj_role', 0x3d, '^'}}, {@hash}, {@uid_lt}, {@mask={'mask', 0x3d, 'MAY_EXEC'}}, {@uid_lt={'uid<', 0xee00}}, {@smackfsfloor={'smackfsfloor', 0x3d, ':%#[@'}}, {@obj_user={'obj_user', 0x3d, ',\\*),i'}}, {@uid_eq={'uid', 0x3d, 0xee00}}, {@seclabel}, {@uid_lt={'uid<', 0xee00}}]}) 06:19:17 executing program 1: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800004, 0x12, r0, 0x0) preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x9, 0x0) mmap(&(0x7f0000000000/0xa000)=nil, 0xa000, 0x2, 0x2172, 0xffffffffffffffff, 0x0) r1 = socket$unix(0x1, 0x0, 0x0) bind$unix(r1, &(0x7f00000001c0)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x56) close(r1) [ 359.635152][T16132] REISERFS warning (device loop0): super-6504 reiserfs_getopt: the option "nolargeio" requires an argument [ 359.635152][T16132] 06:19:17 executing program 2: syz_genetlink_get_family_id$nl80211(&(0x7f0000000680), 0xffffffffffffffff) ioctl$sock_SIOCGIFINDEX_80211(0xffffffffffffffff, 0x8933, &(0x7f0000000c00)={'wlan1\x00'}) r0 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX_80211(r0, 0x8933, &(0x7f0000000e40)={'wlan0\x00'}) r1 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800004, 0x12, r1, 0x0) preadv(r1, &(0x7f00000001c0)=[{0x0}], 0x1, 0x9, 0x0) r2 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r2, &(0x7f0000000380)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x80, 0x1, 0x9, 0x1, 0x2, 0x3e, 0x7ff, 0x1f2, 0x40, 0x1f4, 0xbfa, 0x3, 0x38, 0x1, 0x5, 0x4, 0x4}, [{0x5, 0x9, 0x6, 0x101, 0x6, 0x4, 0x9, 0x6}, {0x5, 0x3, 0x5e61, 0x80000000, 0xcc3, 0x9, 0x7, 0x8}], "d1660f10e0ac4a6edbf3aa53803c8f57ef2a12069e82553332d2b96d67f2dbc5b04959dad57c303d876233684f5e9ad402a193da791e11122f2cccbf10d6d499f5e16385d09f63891a965d80bcb68b551fabffb4bf0b5c372b4d69cdefac988201a40429a8d0dc699820193afcab08070fde89c22e16b43dde5e37d9a3df0cd352e8667f163774d9dc3c79571e5100046281", ['\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00']}, 0x842) 06:19:17 executing program 3: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800004, 0x12, r0, 0x0) preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x0, 0x0) r1 = socket$unix(0x1, 0x1, 0x0) close(r1) 06:19:17 executing program 1: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800004, 0x12, r0, 0x0) preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x9, 0x0) mmap(&(0x7f0000000000/0xa000)=nil, 0xa000, 0x2, 0x2172, 0xffffffffffffffff, 0x0) r1 = socket$unix(0x1, 0x1, 0x0) bind$unix(0xffffffffffffffff, &(0x7f00000001c0)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x56) close(r1) 06:19:17 executing program 0: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800004, 0x12, r0, 0x0) preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x9, 0x0) mmap(&(0x7f0000000000/0xa000)=nil, 0xa000, 0x2, 0x2172, 0xffffffffffffffff, 0x0) syz_mount_image$reiserfs(&(0x7f0000000140), &(0x7f0000000180)='./file0\x00', 0x0, 0x0, &(0x7f0000000300), 0x2000400, &(0x7f0000000440)={[{@balloc_no_unhash_reloc}, {@nolargeio}, {@grpjquota}], [{@obj_role={'obj_role', 0x3d, '^'}}, {@hash}, {@uid_lt}, {@mask={'mask', 0x3d, 'MAY_EXEC'}}, {@uid_lt={'uid<', 0xee00}}, {@smackfsfloor={'smackfsfloor', 0x3d, ':%#[@'}}, {@obj_user={'obj_user', 0x3d, ',\\*),i'}}, {@uid_eq={'uid', 0x3d, 0xee00}}, {@seclabel}, {@uid_lt={'uid<', 0xee00}}]}) [ 360.256537][T16146] REISERFS warning (device loop0): super-6504 reiserfs_getopt: the option "nolargeio" requires an argument [ 360.256537][T16146] 06:19:17 executing program 3: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800004, 0x12, r0, 0x0) preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x0, 0x0) r1 = socket$unix(0x1, 0x1, 0x0) close(r1) 06:19:17 executing program 1: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800004, 0x12, r0, 0x0) preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x9, 0x0) mmap(&(0x7f0000000000/0xa000)=nil, 0xa000, 0x2, 0x2172, 0xffffffffffffffff, 0x0) r1 = socket$unix(0x1, 0x1, 0x0) bind$unix(0xffffffffffffffff, &(0x7f00000001c0)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x56) close(r1) 06:19:17 executing program 3: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800004, 0x12, r0, 0x0) preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x9, 0x0) r1 = socket$unix(0x1, 0x0, 0x0) close(r1) 06:19:17 executing program 0: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800004, 0x12, r0, 0x0) preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x9, 0x0) mmap(&(0x7f0000000000/0xa000)=nil, 0xa000, 0x2, 0x2172, 0xffffffffffffffff, 0x0) syz_mount_image$reiserfs(&(0x7f0000000140), &(0x7f0000000180)='./file0\x00', 0x0, 0x0, &(0x7f0000000300), 0x0, &(0x7f0000000440)={[{@balloc_no_unhash_reloc}, {@nolargeio}, {@grpjquota}], [{@obj_role={'obj_role', 0x3d, '^'}}, {@hash}, {@uid_lt}, {@mask={'mask', 0x3d, 'MAY_EXEC'}}, {@uid_lt={'uid<', 0xee00}}, {@smackfsfloor={'smackfsfloor', 0x3d, ':%#[@'}}, {@obj_user={'obj_user', 0x3d, ',\\*),i'}}, {@uid_eq={'uid', 0x3d, 0xee00}}, {@seclabel}, {@uid_lt={'uid<', 0xee00}}]}) [ 360.442331][T16165] REISERFS warning (device loop0): super-6504 reiserfs_getopt: the option "nolargeio" requires an argument [ 360.442331][T16165] 06:19:18 executing program 2: syz_genetlink_get_family_id$nl80211(&(0x7f0000000680), 0xffffffffffffffff) ioctl$sock_SIOCGIFINDEX_80211(0xffffffffffffffff, 0x8933, &(0x7f0000000c00)={'wlan1\x00'}) socket$nl_generic(0x10, 0x3, 0x10) r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800004, 0x12, r0, 0x0) preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x9, 0x0) r1 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r1, &(0x7f0000000380)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x80, 0x1, 0x9, 0x1, 0x2, 0x3e, 0x7ff, 0x1f2, 0x40, 0x1f4, 0xbfa, 0x3, 0x38, 0x1, 0x5, 0x4, 0x4}, [{0x5, 0x9, 0x6, 0x101, 0x6, 0x4, 0x9, 0x6}, {0x5, 0x3, 0x5e61, 0x80000000, 0xcc3, 0x9, 0x7, 0x8}], "d1660f10e0ac4a6edbf3aa53803c8f57ef2a12069e82553332d2b96d67f2dbc5b04959dad57c303d876233684f5e9ad402a193da791e11122f2cccbf10d6d499f5e16385d09f63891a965d80bcb68b551fabffb4bf0b5c372b4d69cdefac988201a40429a8d0dc699820193afcab08070fde89c22e16b43dde5e37d9a3df0cd352e8667f163774d9dc3c79571e5100046281", ['\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00']}, 0x842) 06:19:18 executing program 1: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800004, 0x12, r0, 0x0) preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x9, 0x0) mmap(&(0x7f0000000000/0xa000)=nil, 0xa000, 0x2, 0x2172, 0xffffffffffffffff, 0x0) r1 = socket$unix(0x1, 0x1, 0x0) bind$unix(0xffffffffffffffff, &(0x7f00000001c0)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x56) close(r1) 06:19:18 executing program 3: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800004, 0x12, r0, 0x0) preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x9, 0x0) r1 = socket$unix(0x1, 0x0, 0x0) close(r1) 06:19:18 executing program 0: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800004, 0x12, r0, 0x0) preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x9, 0x0) mmap(&(0x7f0000000000/0xa000)=nil, 0xa000, 0x2, 0x2172, 0xffffffffffffffff, 0x0) syz_mount_image$reiserfs(&(0x7f0000000140), &(0x7f0000000180)='./file0\x00', 0x0, 0x0, &(0x7f0000000300), 0x0, 0x0) 06:19:18 executing program 3: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800004, 0x12, r0, 0x0) preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x9, 0x0) r1 = socket$unix(0x1, 0x0, 0x0) close(r1) 06:19:18 executing program 1: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800004, 0x12, r0, 0x0) preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x9, 0x0) mmap(&(0x7f0000000000/0xa000)=nil, 0xa000, 0x2, 0x2172, 0xffffffffffffffff, 0x0) r1 = socket$unix(0x1, 0x1, 0x0) bind$unix(r1, 0x0, 0x0) close(r1) 06:19:18 executing program 3: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800004, 0x12, r0, 0x0) preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x9, 0x0) socket$unix(0x1, 0x1, 0x0) close(0xffffffffffffffff) 06:19:18 executing program 0: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800004, 0x12, r0, 0x0) preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x9, 0x0) mmap(&(0x7f0000000000/0xa000)=nil, 0xa000, 0x2, 0x2172, 0xffffffffffffffff, 0x0) syz_mount_image$reiserfs(&(0x7f0000000140), &(0x7f0000000180)='./file0\x00', 0x0, 0x0, &(0x7f0000000300), 0x0, 0x0) 06:19:19 executing program 2: syz_genetlink_get_family_id$nl80211(&(0x7f0000000680), 0xffffffffffffffff) ioctl$sock_SIOCGIFINDEX_80211(0xffffffffffffffff, 0x8933, &(0x7f0000000c00)={'wlan1\x00'}) r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800004, 0x12, r0, 0x0) preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x9, 0x0) r1 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r1, &(0x7f0000000380)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x80, 0x1, 0x9, 0x1, 0x2, 0x3e, 0x7ff, 0x1f2, 0x40, 0x1f4, 0xbfa, 0x3, 0x38, 0x1, 0x5, 0x4, 0x4}, [{0x5, 0x9, 0x6, 0x101, 0x6, 0x4, 0x9, 0x6}, {0x5, 0x3, 0x5e61, 0x80000000, 0xcc3, 0x9, 0x7, 0x8}], "d1660f10e0ac4a6edbf3aa53803c8f57ef2a12069e82553332d2b96d67f2dbc5b04959dad57c303d876233684f5e9ad402a193da791e11122f2cccbf10d6d499f5e16385d09f63891a965d80bcb68b551fabffb4bf0b5c372b4d69cdefac988201a40429a8d0dc699820193afcab08070fde89c22e16b43dde5e37d9a3df0cd352e8667f163774d9dc3c79571e5100046281", ['\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00']}, 0x842) 06:19:19 executing program 3: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800004, 0x12, r0, 0x0) preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x9, 0x0) socket$unix(0x1, 0x1, 0x0) close(0xffffffffffffffff) 06:19:19 executing program 1: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800004, 0x12, r0, 0x0) preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x9, 0x0) mmap(&(0x7f0000000000/0xa000)=nil, 0xa000, 0x2, 0x2172, 0xffffffffffffffff, 0x0) r1 = socket$unix(0x1, 0x1, 0x0) bind$unix(r1, 0x0, 0x0) close(r1) 06:19:19 executing program 0: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800004, 0x12, r0, 0x0) preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x9, 0x0) mmap(&(0x7f0000000000/0xa000)=nil, 0xa000, 0x2, 0x2172, 0xffffffffffffffff, 0x0) syz_mount_image$reiserfs(&(0x7f0000000140), &(0x7f0000000180)='./file0\x00', 0x0, 0x0, &(0x7f0000000300), 0x0, 0x0) 06:19:19 executing program 1: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800004, 0x12, r0, 0x0) preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x9, 0x0) mmap(&(0x7f0000000000/0xa000)=nil, 0xa000, 0x2, 0x2172, 0xffffffffffffffff, 0x0) r1 = socket$unix(0x1, 0x1, 0x0) bind$unix(r1, 0x0, 0x0) close(r1) 06:19:19 executing program 0: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800004, 0x12, r0, 0x0) preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x9, 0x0) mmap(&(0x7f0000000000/0xa000)=nil, 0xa000, 0x2, 0x2172, 0xffffffffffffffff, 0x0) syz_mount_image$reiserfs(&(0x7f0000000140), &(0x7f0000000180)='./file0\x00', 0x0, 0x0, &(0x7f0000000300), 0x0, &(0x7f0000000440)={[{@balloc_no_unhash_reloc}, {@nolargeio}], [{@obj_role={'obj_role', 0x3d, '^'}}, {@hash}, {@uid_lt}, {@mask={'mask', 0x3d, 'MAY_EXEC'}}, {@uid_lt={'uid<', 0xee00}}, {@smackfsfloor={'smackfsfloor', 0x3d, ':%#[@'}}, {@obj_user={'obj_user', 0x3d, ',\\*),i'}}, {@uid_eq={'uid', 0x3d, 0xee00}}, {@seclabel}, {@uid_lt={'uid<', 0xee00}}]}) 06:19:19 executing program 1: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800004, 0x12, r0, 0x0) preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x9, 0x0) mmap(&(0x7f0000000000/0xa000)=nil, 0xa000, 0x2, 0x2172, 0xffffffffffffffff, 0x0) r1 = socket$unix(0x1, 0x1, 0x0) bind$unix(r1, &(0x7f00000001c0)=@file={0x0, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x56) close(r1) 06:19:19 executing program 3: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800004, 0x12, r0, 0x0) preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x9, 0x0) socket$unix(0x1, 0x1, 0x0) close(0xffffffffffffffff) [ 362.325000][T16224] REISERFS warning (device loop0): super-6504 reiserfs_getopt: the option "nolargeio" requires an argument [ 362.325000][T16224] 06:19:20 executing program 2: syz_genetlink_get_family_id$nl80211(&(0x7f0000000680), 0xffffffffffffffff) r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800004, 0x12, r0, 0x0) preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x9, 0x0) r1 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r1, &(0x7f0000000380)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x80, 0x1, 0x9, 0x1, 0x2, 0x3e, 0x7ff, 0x1f2, 0x40, 0x1f4, 0xbfa, 0x3, 0x38, 0x1, 0x5, 0x4, 0x4}, [{0x5, 0x9, 0x6, 0x101, 0x6, 0x4, 0x9, 0x6}, {0x5, 0x3, 0x5e61, 0x80000000, 0xcc3, 0x9, 0x7, 0x8}], "d1660f10e0ac4a6edbf3aa53803c8f57ef2a12069e82553332d2b96d67f2dbc5b04959dad57c303d876233684f5e9ad402a193da791e11122f2cccbf10d6d499f5e16385d09f63891a965d80bcb68b551fabffb4bf0b5c372b4d69cdefac988201a40429a8d0dc699820193afcab08070fde89c22e16b43dde5e37d9a3df0cd352e8667f163774d9dc3c79571e5100046281", ['\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00']}, 0x842) 06:19:20 executing program 1: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800004, 0x12, r0, 0x0) preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x9, 0x0) mmap(&(0x7f0000000000/0xa000)=nil, 0xa000, 0x2, 0x2172, 0xffffffffffffffff, 0x0) r1 = socket$unix(0x1, 0x1, 0x0) bind$unix(r1, &(0x7f00000001c0)=@file={0x0, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x56) close(r1) 06:19:20 executing program 3: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800004, 0x12, r0, 0x0) preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x9, 0x0) mmap(&(0x7f0000000000/0xa000)=nil, 0xa000, 0x2, 0x2172, 0xffffffffffffffff, 0x0) syz_mount_image$reiserfs(&(0x7f0000000140), 0x0, 0x8000, 0x3, &(0x7f0000000300)=[{&(0x7f0000000540)="21d37ef07e82e237fbe1b40158d20e242c5ea1f9d9edc6b9395250085d6dfa486982e82d4ce1a5e2bc00d29383bae640de", 0x31, 0x7}, {&(0x7f0000000240)="c43f281f483aa6cd83e40e59d53f177299d285bbe5d90aab2b56a76f9db49d86afa5a0f601ba9b3502de5f3724f3ec00927151f928f668b362052950a2e8f16baec29875fdad59395e86a1050c368933e3ed5a17d76bd7bded793436ea207885f395ace3fc12126c205b170be392c1645233ef01f9661090706a65f63b4845dc2884a20711a8024ad4af44aeec9db33991dae38d95cdb7132970d0d4dec58b9d46d378", 0xa3, 0x6}, {&(0x7f0000000380)="05f82c760d277896dd8c9891a41aafe24124891a32a238c3c78696d112aa09f3ae5c54b0c08676da5db7f358c72dfaca9a5d90860b4ae363c9a921c47965d339c23408a6d9b31a23aee27822f0a140d8e4ec9475a740113f2b9923b46333110e528e0a513151aad34aee1b5310fcf62c1982349253003d6d53aebbe09cf5918668ee682be93b6a671bbc", 0x8a, 0x3}], 0x2000400, &(0x7f0000000440)={[{@balloc_no_unhash_reloc}, {@nolargeio}, {@grpjquota}], [{@obj_role={'obj_role', 0x3d, '^'}}, {@hash}, {@uid_lt}, {@mask={'mask', 0x3d, 'MAY_EXEC'}}, {@uid_lt={'uid<', 0xee00}}, {@smackfsfloor={'smackfsfloor', 0x3d, ':%#[@'}}, {@obj_user={'obj_user', 0x3d, ',\\*),i'}}, {@uid_eq={'uid', 0x3d, 0xee00}}, {@seclabel}, {@uid_lt={'uid<', 0xee00}}]}) 06:19:20 executing program 0: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800004, 0x12, r0, 0x0) preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x9, 0x0) mmap(&(0x7f0000000000/0xa000)=nil, 0xa000, 0x2, 0x2172, 0xffffffffffffffff, 0x0) syz_mount_image$reiserfs(&(0x7f0000000140), &(0x7f0000000180)='./file0\x00', 0x0, 0x0, &(0x7f0000000300), 0x0, &(0x7f0000000440)={[{@balloc_no_unhash_reloc}], [{@obj_role={'obj_role', 0x3d, '^'}}, {@hash}, {@uid_lt}, {@mask={'mask', 0x3d, 'MAY_EXEC'}}, {@uid_lt={'uid<', 0xee00}}, {@smackfsfloor={'smackfsfloor', 0x3d, ':%#[@'}}, {@obj_user={'obj_user', 0x3d, ',\\*),i'}}, {@uid_eq={'uid', 0x3d, 0xee00}}, {@seclabel}, {@uid_lt={'uid<', 0xee00}}]}) [ 363.036475][T16240] loop3: detected capacity change from 0 to 64 [ 363.058345][T16236] REISERFS warning (device loop0): super-6502 reiserfs_getopt: unknown mount option "obj_role=^" 06:19:20 executing program 1: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800004, 0x12, r0, 0x0) preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x9, 0x0) mmap(&(0x7f0000000000/0xa000)=nil, 0xa000, 0x2, 0x2172, 0xffffffffffffffff, 0x0) r1 = socket$unix(0x1, 0x1, 0x0) bind$unix(r1, &(0x7f00000001c0)=@file={0x0, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x56) close(r1) 06:19:20 executing program 3: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800004, 0x12, 0xffffffffffffffff, 0x0) preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x9, 0x0) r1 = socket$unix(0x1, 0x1, 0x0) close(r1) 06:19:20 executing program 1: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800004, 0x12, r0, 0x0) preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x9, 0x0) mmap(&(0x7f0000000000/0xa000)=nil, 0xa000, 0x2, 0x2172, 0xffffffffffffffff, 0x0) r1 = socket$unix(0x1, 0x1, 0x0) bind$unix(r1, &(0x7f00000001c0)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x56) close(0xffffffffffffffff) 06:19:20 executing program 0: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800004, 0x12, r0, 0x0) preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x9, 0x0) mmap(&(0x7f0000000000/0xa000)=nil, 0xa000, 0x2, 0x2172, 0xffffffffffffffff, 0x0) syz_mount_image$reiserfs(&(0x7f0000000140), &(0x7f0000000180)='./file0\x00', 0x0, 0x0, &(0x7f0000000300), 0x0, &(0x7f0000000440)={[{@balloc_no_unhash_reloc}], [{@obj_role={'obj_role', 0x3d, '^'}}, {@hash}, {@uid_lt}, {@mask={'mask', 0x3d, 'MAY_EXEC'}}, {@uid_lt={'uid<', 0xee00}}, {@smackfsfloor={'smackfsfloor', 0x3d, ':%#[@'}}, {@obj_user={'obj_user', 0x3d, ',\\*),i'}}, {@uid_eq={'uid', 0x3d, 0xee00}}, {@seclabel}, {@uid_lt={'uid<', 0xee00}}]}) [ 363.331586][T16256] REISERFS warning (device loop0): super-6502 reiserfs_getopt: unknown mount option "obj_role=^" 06:19:21 executing program 3: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800004, 0x12, r0, 0x0) preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x9, 0x0) mmap(&(0x7f0000000000/0xa000)=nil, 0xa000, 0x2, 0x2172, 0xffffffffffffffff, 0x0) syz_mount_image$reiserfs(&(0x7f0000000140), &(0x7f0000000180)='./file0\x00', 0x0, 0x0, &(0x7f0000000300), 0x0, &(0x7f0000000440)={[{@balloc_no_unhash_reloc}], [{@obj_role={'obj_role', 0x3d, '^'}}, {@hash}, {@uid_lt}, {@mask={'mask', 0x3d, 'MAY_EXEC'}}, {@uid_lt={'uid<', 0xee00}}, {@smackfsfloor={'smackfsfloor', 0x3d, ':%#[@'}}, {@obj_user={'obj_user', 0x3d, ',\\*),i'}}, {@uid_eq={'uid', 0x3d, 0xee00}}, {@seclabel}, {@uid_lt={'uid<', 0xee00}}]}) 06:19:21 executing program 1: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800004, 0x12, r0, 0x0) preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x9, 0x0) mmap(&(0x7f0000000000/0xa000)=nil, 0xa000, 0x2, 0x2172, 0xffffffffffffffff, 0x0) r1 = socket$unix(0x1, 0x1, 0x0) bind$unix(r1, &(0x7f00000001c0)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x56) close(0xffffffffffffffff) 06:19:21 executing program 0: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800004, 0x12, r0, 0x0) preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x9, 0x0) mmap(&(0x7f0000000000/0xa000)=nil, 0xa000, 0x2, 0x2172, 0xffffffffffffffff, 0x0) syz_mount_image$reiserfs(&(0x7f0000000140), &(0x7f0000000180)='./file0\x00', 0x0, 0x0, &(0x7f0000000300), 0x0, &(0x7f0000000440)={[{@balloc_no_unhash_reloc}], [{@obj_role={'obj_role', 0x3d, '^'}}, {@hash}, {@uid_lt}, {@mask={'mask', 0x3d, 'MAY_EXEC'}}, {@uid_lt={'uid<', 0xee00}}, {@smackfsfloor={'smackfsfloor', 0x3d, ':%#[@'}}, {@obj_user={'obj_user', 0x3d, ',\\*),i'}}, {@uid_eq={'uid', 0x3d, 0xee00}}, {@seclabel}, {@uid_lt={'uid<', 0xee00}}]}) 06:19:21 executing program 2: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800004, 0x12, r0, 0x0) preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x9, 0x0) r1 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r1, &(0x7f0000000380)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x80, 0x1, 0x9, 0x1, 0x2, 0x3e, 0x7ff, 0x1f2, 0x40, 0x1f4, 0xbfa, 0x3, 0x38, 0x1, 0x5, 0x4, 0x4}, [{0x5, 0x9, 0x6, 0x101, 0x6, 0x4, 0x9, 0x6}, {0x5, 0x3, 0x5e61, 0x80000000, 0xcc3, 0x9, 0x7, 0x8}], "d1660f10e0ac4a6edbf3aa53803c8f57ef2a12069e82553332d2b96d67f2dbc5b04959dad57c303d876233684f5e9ad402a193da791e11122f2cccbf10d6d499f5e16385d09f63891a965d80bcb68b551fabffb4bf0b5c372b4d69cdefac988201a40429a8d0dc699820193afcab08070fde89c22e16b43dde5e37d9a3df0cd352e8667f163774d9dc3c79571e5100046281", ['\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00']}, 0x842) [ 363.957326][T16269] REISERFS warning (device loop0): super-6502 reiserfs_getopt: unknown mount option "obj_role=^" [ 363.974978][T16268] REISERFS warning (device loop3): super-6502 reiserfs_getopt: unknown mount option "obj_role=^" 06:19:21 executing program 1: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800004, 0x12, r0, 0x0) preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x9, 0x0) mmap(&(0x7f0000000000/0xa000)=nil, 0xa000, 0x2, 0x2172, 0xffffffffffffffff, 0x0) r1 = socket$unix(0x1, 0x1, 0x0) bind$unix(r1, &(0x7f00000001c0)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x56) close(0xffffffffffffffff) 06:19:21 executing program 1: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800004, 0x12, r0, 0x0) preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x9, 0x0) mmap(&(0x7f0000000000/0xa000)=nil, 0xa000, 0x2, 0x2172, 0xffffffffffffffff, 0x0) syz_mount_image$reiserfs(0x0, &(0x7f0000000180)='./file0\x00', 0x8000, 0x3, &(0x7f0000000300)=[{&(0x7f0000000540)="21d37ef07e82e237fbe1b40158d20e242c5ea1f9d9edc6b9395250085d6dfa486982e82d4ce1a5e2bc00d29383bae640de", 0x31, 0x7}, {&(0x7f0000000240)="c43f281f483aa6cd83e40e59d53f177299d285bbe5d90aab2b56a76f9db49d86afa5a0f601ba9b3502de5f3724f3ec00927151f928f668b362052950a2e8f16baec29875fdad59395e86a1050c368933e3ed5a17d76bd7bded793436ea207885f395ace3fc12126c205b170be392c1645233ef01f9661090706a65f63b4845dc2884a20711a8024ad4af44aeec9db33991dae38d95cdb7132970d0d4dec58b9d46d378", 0xa3, 0x6}, {&(0x7f0000000380)="05f82c760d277896dd8c9891a41aafe24124891a32a238c3c78696d112aa09f3ae5c54b0c08676da5db7f358c72dfaca9a5d90860b4ae363c9a921c47965d339c23408a6d9b31a23aee27822f0a140d8e4ec9475a740113f2b9923b46333110e528e0a513151aad34aee1b5310fcf62c1982349253003d6d53aebbe09cf5918668ee682be93b6a671bbc", 0x8a, 0x3}], 0x2000400, &(0x7f0000000440)={[{@balloc_no_unhash_reloc}, {@nolargeio}, {@grpjquota}], [{@obj_role={'obj_role', 0x3d, '^'}}, {@hash}, {@uid_lt}, {@mask={'mask', 0x3d, 'MAY_EXEC'}}, {@uid_lt={'uid<', 0xee00}}, {@smackfsfloor={'smackfsfloor', 0x3d, ':%#[@'}}, {@obj_user={'obj_user', 0x3d, ',\\*),i'}}, {@uid_eq={'uid', 0x3d, 0xee00}}, {@seclabel}, {@uid_lt={'uid<', 0xee00}}]}) 06:19:21 executing program 0: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800004, 0x12, r0, 0x0) preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x9, 0x0) mmap(&(0x7f0000000000/0xa000)=nil, 0xa000, 0x2, 0x2172, 0xffffffffffffffff, 0x0) syz_mount_image$reiserfs(&(0x7f0000000140), &(0x7f0000000180)='./file0\x00', 0x0, 0x0, &(0x7f0000000300), 0x0, &(0x7f0000000440)={[{@nolargeio}], [{@obj_role={'obj_role', 0x3d, '^'}}, {@hash}, {@uid_lt}, {@mask={'mask', 0x3d, 'MAY_EXEC'}}, {@uid_lt={'uid<', 0xee00}}, {@smackfsfloor={'smackfsfloor', 0x3d, ':%#[@'}}, {@obj_user={'obj_user', 0x3d, ',\\*),i'}}, {@uid_eq={'uid', 0x3d, 0xee00}}, {@seclabel}, {@uid_lt={'uid<', 0xee00}}]}) 06:19:21 executing program 3: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800004, 0x12, r0, 0x0) preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x9, 0x0) mmap(&(0x7f0000000000/0xa000)=nil, 0xa000, 0x2, 0x2172, 0xffffffffffffffff, 0x0) syz_mount_image$reiserfs(&(0x7f0000000140), &(0x7f0000000180)='./file0\x00', 0x0, 0x0, &(0x7f0000000300), 0x0, &(0x7f0000000440)={[{@balloc_no_unhash_reloc}], [{@obj_role={'obj_role', 0x3d, '^'}}, {@hash}, {@uid_lt}, {@mask={'mask', 0x3d, 'MAY_EXEC'}}, {@uid_lt={'uid<', 0xee00}}, {@smackfsfloor={'smackfsfloor', 0x3d, ':%#[@'}}, {@obj_user={'obj_user', 0x3d, ',\\*),i'}}, {@uid_eq={'uid', 0x3d, 0xee00}}, {@seclabel}, {@uid_lt={'uid<', 0xee00}}]}) [ 364.157695][T16285] loop1: detected capacity change from 0 to 64 [ 364.186524][T16290] REISERFS warning (device loop0): super-6504 reiserfs_getopt: the option "nolargeio" requires an argument [ 364.186524][T16290] [ 364.206444][T16294] REISERFS warning (device loop3): super-6502 reiserfs_getopt: unknown mount option "obj_role=^" 06:19:21 executing program 1: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800004, 0x12, r0, 0x0) preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x9, 0x0) mmap(&(0x7f0000000000/0xa000)=nil, 0xa000, 0x2, 0x2172, 0xffffffffffffffff, 0x0) syz_mount_image$reiserfs(0x0, &(0x7f0000000180)='./file0\x00', 0x8000, 0x3, &(0x7f0000000300)=[{&(0x7f0000000540)="21d37ef07e82e237fbe1b40158d20e242c5ea1f9d9edc6b9395250085d6dfa486982e82d4ce1a5e2bc00d29383bae640de", 0x31, 0x7}, {&(0x7f0000000240)="c43f281f483aa6cd83e40e59d53f177299d285bbe5d90aab2b56a76f9db49d86afa5a0f601ba9b3502de5f3724f3ec00927151f928f668b362052950a2e8f16baec29875fdad59395e86a1050c368933e3ed5a17d76bd7bded793436ea207885f395ace3fc12126c205b170be392c1645233ef01f9661090706a65f63b4845dc2884a20711a8024ad4af44aeec9db33991dae38d95cdb7132970d0d4dec58b9d46d378", 0xa3, 0x6}, {&(0x7f0000000380)="05f82c760d277896dd8c9891a41aafe24124891a32a238c3c78696d112aa09f3ae5c54b0c08676da5db7f358c72dfaca9a5d90860b4ae363c9a921c47965d339c23408a6d9b31a23aee27822f0a140d8e4ec9475a740113f2b9923b46333110e528e0a513151aad34aee1b5310fcf62c1982349253003d6d53aebbe09cf5918668ee682be93b6a671bbc", 0x8a, 0x3}], 0x2000400, &(0x7f0000000440)={[{@balloc_no_unhash_reloc}, {@nolargeio}, {@grpjquota}], [{@obj_role={'obj_role', 0x3d, '^'}}, {@hash}, {@uid_lt}, {@mask={'mask', 0x3d, 'MAY_EXEC'}}, {@uid_lt={'uid<', 0xee00}}, {@smackfsfloor={'smackfsfloor', 0x3d, ':%#[@'}}, {@obj_user={'obj_user', 0x3d, ',\\*),i'}}, {@uid_eq={'uid', 0x3d, 0xee00}}, {@seclabel}, {@uid_lt={'uid<', 0xee00}}]}) 06:19:21 executing program 3: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800004, 0x12, r0, 0x0) preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x9, 0x0) mmap(&(0x7f0000000000/0xa000)=nil, 0xa000, 0x2, 0x2172, 0xffffffffffffffff, 0x0) syz_mount_image$reiserfs(&(0x7f0000000140), &(0x7f0000000180)='./file0\x00', 0x0, 0x0, &(0x7f0000000300), 0x0, &(0x7f0000000440)={[{@balloc_no_unhash_reloc}], [{@obj_role={'obj_role', 0x3d, '^'}}, {@hash}, {@uid_lt}, {@mask={'mask', 0x3d, 'MAY_EXEC'}}, {@uid_lt={'uid<', 0xee00}}, {@smackfsfloor={'smackfsfloor', 0x3d, ':%#[@'}}, {@obj_user={'obj_user', 0x3d, ',\\*),i'}}, {@uid_eq={'uid', 0x3d, 0xee00}}, {@seclabel}, {@uid_lt={'uid<', 0xee00}}]}) 06:19:21 executing program 0: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800004, 0x12, r0, 0x0) preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x9, 0x0) mmap(&(0x7f0000000000/0xa000)=nil, 0xa000, 0x2, 0x2172, 0xffffffffffffffff, 0x0) syz_mount_image$reiserfs(&(0x7f0000000140), &(0x7f0000000180)='./file0\x00', 0x0, 0x0, &(0x7f0000000300), 0x0, &(0x7f0000000440)={[{@nolargeio}], [{@obj_role={'obj_role', 0x3d, '^'}}, {@hash}, {@uid_lt}, {@mask={'mask', 0x3d, 'MAY_EXEC'}}, {@uid_lt={'uid<', 0xee00}}, {@smackfsfloor={'smackfsfloor', 0x3d, ':%#[@'}}, {@obj_user={'obj_user', 0x3d, ',\\*),i'}}, {@uid_eq={'uid', 0x3d, 0xee00}}, {@seclabel}, {@uid_lt={'uid<', 0xee00}}]}) [ 364.350824][T16302] loop1: detected capacity change from 0 to 64 [ 364.388023][T16306] REISERFS warning (device loop3): super-6502 reiserfs_getopt: unknown mount option "obj_role=^" [ 364.398764][T16307] REISERFS warning (device loop0): super-6504 reiserfs_getopt: the option "nolargeio" requires an argument [ 364.398764][T16307] 06:19:22 executing program 2: r0 = openat(0xffffffffffffffff, 0x0, 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800004, 0x12, r0, 0x0) preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x9, 0x0) r1 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r1, &(0x7f0000000380)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x80, 0x1, 0x9, 0x1, 0x2, 0x3e, 0x7ff, 0x1f2, 0x40, 0x1f4, 0xbfa, 0x3, 0x38, 0x1, 0x5, 0x4, 0x4}, [{0x5, 0x9, 0x6, 0x101, 0x6, 0x4, 0x9, 0x6}, {0x5, 0x3, 0x5e61, 0x80000000, 0xcc3, 0x9, 0x7, 0x8}], "d1660f10e0ac4a6edbf3aa53803c8f57ef2a12069e82553332d2b96d67f2dbc5b04959dad57c303d876233684f5e9ad402a193da791e11122f2cccbf10d6d499f5e16385d09f63891a965d80bcb68b551fabffb4bf0b5c372b4d69cdefac988201a40429a8d0dc699820193afcab08070fde89c22e16b43dde5e37d9a3df0cd352e8667f163774d9dc3c79571e5100046281", ['\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00']}, 0x842) 06:19:22 executing program 1: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800004, 0x12, r0, 0x0) preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x9, 0x0) mmap(&(0x7f0000000000/0xa000)=nil, 0xa000, 0x2, 0x2172, 0xffffffffffffffff, 0x0) syz_mount_image$reiserfs(0x0, &(0x7f0000000180)='./file0\x00', 0x8000, 0x3, &(0x7f0000000300)=[{&(0x7f0000000540)="21d37ef07e82e237fbe1b40158d20e242c5ea1f9d9edc6b9395250085d6dfa486982e82d4ce1a5e2bc00d29383bae640de", 0x31, 0x7}, {&(0x7f0000000240)="c43f281f483aa6cd83e40e59d53f177299d285bbe5d90aab2b56a76f9db49d86afa5a0f601ba9b3502de5f3724f3ec00927151f928f668b362052950a2e8f16baec29875fdad59395e86a1050c368933e3ed5a17d76bd7bded793436ea207885f395ace3fc12126c205b170be392c1645233ef01f9661090706a65f63b4845dc2884a20711a8024ad4af44aeec9db33991dae38d95cdb7132970d0d4dec58b9d46d378", 0xa3, 0x6}, {&(0x7f0000000380)="05f82c760d277896dd8c9891a41aafe24124891a32a238c3c78696d112aa09f3ae5c54b0c08676da5db7f358c72dfaca9a5d90860b4ae363c9a921c47965d339c23408a6d9b31a23aee27822f0a140d8e4ec9475a740113f2b9923b46333110e528e0a513151aad34aee1b5310fcf62c1982349253003d6d53aebbe09cf5918668ee682be93b6a671bbc", 0x8a, 0x3}], 0x2000400, &(0x7f0000000440)={[{@balloc_no_unhash_reloc}, {@nolargeio}, {@grpjquota}], [{@obj_role={'obj_role', 0x3d, '^'}}, {@hash}, {@uid_lt}, {@mask={'mask', 0x3d, 'MAY_EXEC'}}, {@uid_lt={'uid<', 0xee00}}, {@smackfsfloor={'smackfsfloor', 0x3d, ':%#[@'}}, {@obj_user={'obj_user', 0x3d, ',\\*),i'}}, {@uid_eq={'uid', 0x3d, 0xee00}}, {@seclabel}, {@uid_lt={'uid<', 0xee00}}]}) 06:19:22 executing program 0: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800004, 0x12, r0, 0x0) preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x9, 0x0) mmap(&(0x7f0000000000/0xa000)=nil, 0xa000, 0x2, 0x2172, 0xffffffffffffffff, 0x0) syz_mount_image$reiserfs(&(0x7f0000000140), &(0x7f0000000180)='./file0\x00', 0x0, 0x0, &(0x7f0000000300), 0x0, &(0x7f0000000440)={[{@nolargeio}], [{@obj_role={'obj_role', 0x3d, '^'}}, {@hash}, {@uid_lt}, {@mask={'mask', 0x3d, 'MAY_EXEC'}}, {@uid_lt={'uid<', 0xee00}}, {@smackfsfloor={'smackfsfloor', 0x3d, ':%#[@'}}, {@obj_user={'obj_user', 0x3d, ',\\*),i'}}, {@uid_eq={'uid', 0x3d, 0xee00}}, {@seclabel}, {@uid_lt={'uid<', 0xee00}}]}) 06:19:22 executing program 3: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800004, 0x12, r0, 0x0) preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x9, 0x0) syz_mount_image$reiserfs(&(0x7f0000000140), &(0x7f0000000180)='./file0\x00', 0x0, 0x0, &(0x7f0000000300), 0x0, &(0x7f0000000440)={[{@balloc_no_unhash_reloc}], [{@obj_role={'obj_role', 0x3d, '^'}}, {@hash}, {@uid_lt}, {@mask={'mask', 0x3d, 'MAY_EXEC'}}, {@uid_lt={'uid<', 0xee00}}, {@smackfsfloor={'smackfsfloor', 0x3d, ':%#[@'}}, {@obj_user={'obj_user', 0x3d, ',\\*),i'}}, {@uid_eq={'uid', 0x3d, 0xee00}}, {@seclabel}, {@uid_lt={'uid<', 0xee00}}]}) [ 364.869177][T16323] REISERFS warning (device loop0): super-6504 reiserfs_getopt: the option "nolargeio" requires an argument [ 364.869177][T16323] [ 364.874005][T16327] loop1: detected capacity change from 0 to 64 06:19:22 executing program 0: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800004, 0x12, r0, 0x0) preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x9, 0x0) mmap(&(0x7f0000000000/0xa000)=nil, 0xa000, 0x2, 0x2172, 0xffffffffffffffff, 0x0) syz_mount_image$reiserfs(&(0x7f0000000140), &(0x7f0000000180)='./file0\x00', 0x0, 0x0, &(0x7f0000000300), 0x0, &(0x7f0000000440)={[{@balloc_no_unhash_reloc}, {@nolargeio}], [{@obj_role={'obj_role', 0x3d, '^'}}, {@hash}, {@uid_lt}, {@mask={'mask', 0x3d, 'MAY_EXEC'}}, {@uid_lt={'uid<', 0xee00}}, {@smackfsfloor={'smackfsfloor', 0x3d, ':%#[@'}}, {@obj_user={'obj_user', 0x3d, ',\\*),i'}}, {@uid_eq={'uid', 0x3d, 0xee00}}, {@seclabel}]}) 06:19:22 executing program 1: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800004, 0x12, r0, 0x0) preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x9, 0x0) syz_mount_image$reiserfs(0x0, &(0x7f0000000180)='./file0\x00', 0x8000, 0x3, &(0x7f0000000300)=[{&(0x7f0000000540)="21d37ef07e82e237fbe1b40158d20e242c5ea1f9d9edc6b9395250085d6dfa486982e82d4ce1a5e2bc00d29383bae640de", 0x31, 0x7}, {&(0x7f0000000240)="c43f281f483aa6cd83e40e59d53f177299d285bbe5d90aab2b56a76f9db49d86afa5a0f601ba9b3502de5f3724f3ec00927151f928f668b362052950a2e8f16baec29875fdad59395e86a1050c368933e3ed5a17d76bd7bded793436ea207885f395ace3fc12126c205b170be392c1645233ef01f9661090706a65f63b4845dc2884a20711a8024ad4af44aeec9db33991dae38d95cdb7132970d0d4dec58b9d46d378", 0xa3, 0x6}, {&(0x7f0000000380)="05f82c760d277896dd8c9891a41aafe24124891a32a238c3c78696d112aa09f3ae5c54b0c08676da5db7f358c72dfaca9a5d90860b4ae363c9a921c47965d339c23408a6d9b31a23aee27822f0a140d8e4ec9475a740113f2b9923b46333110e528e0a513151aad34aee1b5310fcf62c1982349253003d6d53aebbe09cf5918668ee682be93b6a671bbc", 0x8a, 0x3}], 0x2000400, &(0x7f0000000440)={[{@balloc_no_unhash_reloc}, {@nolargeio}, {@grpjquota}], [{@obj_role={'obj_role', 0x3d, '^'}}, {@hash}, {@uid_lt}, {@mask={'mask', 0x3d, 'MAY_EXEC'}}, {@uid_lt={'uid<', 0xee00}}, {@smackfsfloor={'smackfsfloor', 0x3d, ':%#[@'}}, {@obj_user={'obj_user', 0x3d, ',\\*),i'}}, {@uid_eq={'uid', 0x3d, 0xee00}}, {@seclabel}, {@uid_lt={'uid<', 0xee00}}]}) 06:19:22 executing program 3: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800004, 0x12, r0, 0x0) preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x9, 0x0) syz_mount_image$reiserfs(&(0x7f0000000140), &(0x7f0000000180)='./file0\x00', 0x0, 0x0, &(0x7f0000000300), 0x0, &(0x7f0000000440)={[{@balloc_no_unhash_reloc}], [{@obj_role={'obj_role', 0x3d, '^'}}, {@hash}, {@uid_lt}, {@mask={'mask', 0x3d, 'MAY_EXEC'}}, {@uid_lt={'uid<', 0xee00}}, {@smackfsfloor={'smackfsfloor', 0x3d, ':%#[@'}}, {@obj_user={'obj_user', 0x3d, ',\\*),i'}}, {@uid_eq={'uid', 0x3d, 0xee00}}, {@seclabel}, {@uid_lt={'uid<', 0xee00}}]}) [ 365.015484][T16337] REISERFS warning (device loop0): super-6504 reiserfs_getopt: the option "nolargeio" requires an argument [ 365.015484][T16337] 06:19:22 executing program 0: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800004, 0x12, r0, 0x0) preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x9, 0x0) mmap(&(0x7f0000000000/0xa000)=nil, 0xa000, 0x2, 0x2172, 0xffffffffffffffff, 0x0) syz_mount_image$reiserfs(&(0x7f0000000140), &(0x7f0000000180)='./file0\x00', 0x0, 0x0, &(0x7f0000000300), 0x0, &(0x7f0000000440)={[{@balloc_no_unhash_reloc}, {@nolargeio}], [{@obj_role={'obj_role', 0x3d, '^'}}, {@hash}, {@uid_lt}, {@mask={'mask', 0x3d, 'MAY_EXEC'}}, {@uid_lt={'uid<', 0xee00}}, {@smackfsfloor={'smackfsfloor', 0x3d, ':%#[@'}}, {@obj_user={'obj_user', 0x3d, ',\\*),i'}}, {@uid_eq={'uid', 0x3d, 0xee00}}]}) 06:19:22 executing program 1: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800004, 0x12, r0, 0x0) preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x9, 0x0) syz_mount_image$reiserfs(0x0, &(0x7f0000000180)='./file0\x00', 0x8000, 0x3, &(0x7f0000000300)=[{&(0x7f0000000540)="21d37ef07e82e237fbe1b40158d20e242c5ea1f9d9edc6b9395250085d6dfa486982e82d4ce1a5e2bc00d29383bae640de", 0x31, 0x7}, {&(0x7f0000000240)="c43f281f483aa6cd83e40e59d53f177299d285bbe5d90aab2b56a76f9db49d86afa5a0f601ba9b3502de5f3724f3ec00927151f928f668b362052950a2e8f16baec29875fdad59395e86a1050c368933e3ed5a17d76bd7bded793436ea207885f395ace3fc12126c205b170be392c1645233ef01f9661090706a65f63b4845dc2884a20711a8024ad4af44aeec9db33991dae38d95cdb7132970d0d4dec58b9d46d378", 0xa3, 0x6}, {&(0x7f0000000380)="05f82c760d277896dd8c9891a41aafe24124891a32a238c3c78696d112aa09f3ae5c54b0c08676da5db7f358c72dfaca9a5d90860b4ae363c9a921c47965d339c23408a6d9b31a23aee27822f0a140d8e4ec9475a740113f2b9923b46333110e528e0a513151aad34aee1b5310fcf62c1982349253003d6d53aebbe09cf5918668ee682be93b6a671bbc", 0x8a, 0x3}], 0x2000400, &(0x7f0000000440)={[{@balloc_no_unhash_reloc}, {@nolargeio}, {@grpjquota}], [{@obj_role={'obj_role', 0x3d, '^'}}, {@hash}, {@uid_lt}, {@mask={'mask', 0x3d, 'MAY_EXEC'}}, {@uid_lt={'uid<', 0xee00}}, {@smackfsfloor={'smackfsfloor', 0x3d, ':%#[@'}}, {@obj_user={'obj_user', 0x3d, ',\\*),i'}}, {@uid_eq={'uid', 0x3d, 0xee00}}, {@seclabel}, {@uid_lt={'uid<', 0xee00}}]}) [ 365.197330][T16352] REISERFS warning (device loop0): super-6504 reiserfs_getopt: the option "nolargeio" requires an argument [ 365.197330][T16352] 06:19:23 executing program 3: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800004, 0x12, r0, 0x0) preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x9, 0x0) syz_mount_image$reiserfs(&(0x7f0000000140), &(0x7f0000000180)='./file0\x00', 0x0, 0x0, &(0x7f0000000300), 0x0, &(0x7f0000000440)={[{@balloc_no_unhash_reloc}], [{@obj_role={'obj_role', 0x3d, '^'}}, {@hash}, {@uid_lt}, {@mask={'mask', 0x3d, 'MAY_EXEC'}}, {@uid_lt={'uid<', 0xee00}}, {@smackfsfloor={'smackfsfloor', 0x3d, ':%#[@'}}, {@obj_user={'obj_user', 0x3d, ',\\*),i'}}, {@uid_eq={'uid', 0x3d, 0xee00}}, {@seclabel}, {@uid_lt={'uid<', 0xee00}}]}) 06:19:23 executing program 2: r0 = openat(0xffffffffffffffff, 0x0, 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800004, 0x12, r0, 0x0) preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x9, 0x0) r1 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r1, &(0x7f0000000380)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x80, 0x1, 0x9, 0x1, 0x2, 0x3e, 0x7ff, 0x1f2, 0x40, 0x1f4, 0xbfa, 0x3, 0x38, 0x1, 0x5, 0x4, 0x4}, [{0x5, 0x9, 0x6, 0x101, 0x6, 0x4, 0x9, 0x6}, {0x5, 0x3, 0x5e61, 0x80000000, 0xcc3, 0x9, 0x7, 0x8}], "d1660f10e0ac4a6edbf3aa53803c8f57ef2a12069e82553332d2b96d67f2dbc5b04959dad57c303d876233684f5e9ad402a193da791e11122f2cccbf10d6d499f5e16385d09f63891a965d80bcb68b551fabffb4bf0b5c372b4d69cdefac988201a40429a8d0dc699820193afcab08070fde89c22e16b43dde5e37d9a3df0cd352e8667f163774d9dc3c79571e5100046281", ['\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00']}, 0x842) 06:19:23 executing program 1: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800004, 0x12, r0, 0x0) preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x9, 0x0) syz_mount_image$reiserfs(0x0, &(0x7f0000000180)='./file0\x00', 0x8000, 0x3, &(0x7f0000000300)=[{&(0x7f0000000540)="21d37ef07e82e237fbe1b40158d20e242c5ea1f9d9edc6b9395250085d6dfa486982e82d4ce1a5e2bc00d29383bae640de", 0x31, 0x7}, {&(0x7f0000000240)="c43f281f483aa6cd83e40e59d53f177299d285bbe5d90aab2b56a76f9db49d86afa5a0f601ba9b3502de5f3724f3ec00927151f928f668b362052950a2e8f16baec29875fdad59395e86a1050c368933e3ed5a17d76bd7bded793436ea207885f395ace3fc12126c205b170be392c1645233ef01f9661090706a65f63b4845dc2884a20711a8024ad4af44aeec9db33991dae38d95cdb7132970d0d4dec58b9d46d378", 0xa3, 0x6}, {&(0x7f0000000380)="05f82c760d277896dd8c9891a41aafe24124891a32a238c3c78696d112aa09f3ae5c54b0c08676da5db7f358c72dfaca9a5d90860b4ae363c9a921c47965d339c23408a6d9b31a23aee27822f0a140d8e4ec9475a740113f2b9923b46333110e528e0a513151aad34aee1b5310fcf62c1982349253003d6d53aebbe09cf5918668ee682be93b6a671bbc", 0x8a, 0x3}], 0x2000400, &(0x7f0000000440)={[{@balloc_no_unhash_reloc}, {@nolargeio}, {@grpjquota}], [{@obj_role={'obj_role', 0x3d, '^'}}, {@hash}, {@uid_lt}, {@mask={'mask', 0x3d, 'MAY_EXEC'}}, {@uid_lt={'uid<', 0xee00}}, {@smackfsfloor={'smackfsfloor', 0x3d, ':%#[@'}}, {@obj_user={'obj_user', 0x3d, ',\\*),i'}}, {@uid_eq={'uid', 0x3d, 0xee00}}, {@seclabel}, {@uid_lt={'uid<', 0xee00}}]}) 06:19:23 executing program 0: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800004, 0x12, r0, 0x0) preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x9, 0x0) mmap(&(0x7f0000000000/0xa000)=nil, 0xa000, 0x2, 0x2172, 0xffffffffffffffff, 0x0) syz_mount_image$reiserfs(&(0x7f0000000140), &(0x7f0000000180)='./file0\x00', 0x0, 0x0, &(0x7f0000000300), 0x0, &(0x7f0000000440)={[{@balloc_no_unhash_reloc}, {@nolargeio}], [{@obj_role={'obj_role', 0x3d, '^'}}, {@hash}, {@uid_lt}, {@mask={'mask', 0x3d, 'MAY_EXEC'}}, {@uid_lt={'uid<', 0xee00}}, {@smackfsfloor={'smackfsfloor', 0x3d, ':%#[@'}}, {@obj_user={'obj_user', 0x3d, ',\\*),i'}}]}) [ 365.787687][T16370] REISERFS warning (device loop0): super-6504 reiserfs_getopt: the option "nolargeio" requires an argument [ 365.787687][T16370] 06:19:23 executing program 1: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800004, 0x12, r0, 0x0) mmap(&(0x7f0000000000/0xa000)=nil, 0xa000, 0x2, 0x2172, 0xffffffffffffffff, 0x0) syz_mount_image$reiserfs(0x0, &(0x7f0000000180)='./file0\x00', 0x8000, 0x3, &(0x7f0000000300)=[{&(0x7f0000000540)="21d37ef07e82e237fbe1b40158d20e242c5ea1f9d9edc6b9395250085d6dfa486982e82d4ce1a5e2bc00d29383bae640de", 0x31, 0x7}, {&(0x7f0000000240)="c43f281f483aa6cd83e40e59d53f177299d285bbe5d90aab2b56a76f9db49d86afa5a0f601ba9b3502de5f3724f3ec00927151f928f668b362052950a2e8f16baec29875fdad59395e86a1050c368933e3ed5a17d76bd7bded793436ea207885f395ace3fc12126c205b170be392c1645233ef01f9661090706a65f63b4845dc2884a20711a8024ad4af44aeec9db33991dae38d95cdb7132970d0d4dec58b9d46d378", 0xa3, 0x6}, {&(0x7f0000000380)="05f82c760d277896dd8c9891a41aafe24124891a32a238c3c78696d112aa09f3ae5c54b0c08676da5db7f358c72dfaca9a5d90860b4ae363c9a921c47965d339c23408a6d9b31a23aee27822f0a140d8e4ec9475a740113f2b9923b46333110e528e0a513151aad34aee1b5310fcf62c1982349253003d6d53aebbe09cf5918668ee682be93b6a671bbc", 0x8a, 0x3}], 0x2000400, &(0x7f0000000440)={[{@balloc_no_unhash_reloc}, {@nolargeio}, {@grpjquota}], [{@obj_role={'obj_role', 0x3d, '^'}}, {@hash}, {@uid_lt}, {@mask={'mask', 0x3d, 'MAY_EXEC'}}, {@uid_lt={'uid<', 0xee00}}, {@smackfsfloor={'smackfsfloor', 0x3d, ':%#[@'}}, {@obj_user={'obj_user', 0x3d, ',\\*),i'}}, {@uid_eq={'uid', 0x3d, 0xee00}}, {@seclabel}, {@uid_lt={'uid<', 0xee00}}]}) [ 365.845223][T16376] loop1: detected capacity change from 0 to 64 06:19:23 executing program 0: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800004, 0x12, r0, 0x0) preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x9, 0x0) mmap(&(0x7f0000000000/0xa000)=nil, 0xa000, 0x2, 0x2172, 0xffffffffffffffff, 0x0) syz_mount_image$reiserfs(&(0x7f0000000140), &(0x7f0000000180)='./file0\x00', 0x0, 0x0, &(0x7f0000000300), 0x0, &(0x7f0000000440)={[{@balloc_no_unhash_reloc}, {@nolargeio}], [{@obj_role={'obj_role', 0x3d, '^'}}, {@hash}, {@uid_lt}, {@mask={'mask', 0x3d, 'MAY_EXEC'}}, {@uid_lt={'uid<', 0xee00}}, {@smackfsfloor={'smackfsfloor', 0x3d, ':%#[@'}}]}) 06:19:23 executing program 3: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800004, 0x12, r0, 0x0) mmap(&(0x7f0000000000/0xa000)=nil, 0xa000, 0x2, 0x2172, 0xffffffffffffffff, 0x0) syz_mount_image$reiserfs(&(0x7f0000000140), &(0x7f0000000180)='./file0\x00', 0x0, 0x0, &(0x7f0000000300), 0x0, &(0x7f0000000440)={[{@balloc_no_unhash_reloc}], [{@obj_role={'obj_role', 0x3d, '^'}}, {@hash}, {@uid_lt}, {@mask={'mask', 0x3d, 'MAY_EXEC'}}, {@uid_lt={'uid<', 0xee00}}, {@smackfsfloor={'smackfsfloor', 0x3d, ':%#[@'}}, {@obj_user={'obj_user', 0x3d, ',\\*),i'}}, {@uid_eq={'uid', 0x3d, 0xee00}}, {@seclabel}, {@uid_lt={'uid<', 0xee00}}]}) [ 365.963932][T16385] REISERFS warning (device loop0): super-6504 reiserfs_getopt: the option "nolargeio" requires an argument [ 365.963932][T16385] 06:19:23 executing program 1: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800004, 0x12, r0, 0x0) mmap(&(0x7f0000000000/0xa000)=nil, 0xa000, 0x2, 0x2172, 0xffffffffffffffff, 0x0) syz_mount_image$reiserfs(0x0, &(0x7f0000000180)='./file0\x00', 0x8000, 0x3, &(0x7f0000000300)=[{&(0x7f0000000540)="21d37ef07e82e237fbe1b40158d20e242c5ea1f9d9edc6b9395250085d6dfa486982e82d4ce1a5e2bc00d29383bae640de", 0x31, 0x7}, {&(0x7f0000000240)="c43f281f483aa6cd83e40e59d53f177299d285bbe5d90aab2b56a76f9db49d86afa5a0f601ba9b3502de5f3724f3ec00927151f928f668b362052950a2e8f16baec29875fdad59395e86a1050c368933e3ed5a17d76bd7bded793436ea207885f395ace3fc12126c205b170be392c1645233ef01f9661090706a65f63b4845dc2884a20711a8024ad4af44aeec9db33991dae38d95cdb7132970d0d4dec58b9d46d378", 0xa3, 0x6}, {&(0x7f0000000380)="05f82c760d277896dd8c9891a41aafe24124891a32a238c3c78696d112aa09f3ae5c54b0c08676da5db7f358c72dfaca9a5d90860b4ae363c9a921c47965d339c23408a6d9b31a23aee27822f0a140d8e4ec9475a740113f2b9923b46333110e528e0a513151aad34aee1b5310fcf62c1982349253003d6d53aebbe09cf5918668ee682be93b6a671bbc", 0x8a, 0x3}], 0x2000400, &(0x7f0000000440)={[{@balloc_no_unhash_reloc}, {@nolargeio}, {@grpjquota}], [{@obj_role={'obj_role', 0x3d, '^'}}, {@hash}, {@uid_lt}, {@mask={'mask', 0x3d, 'MAY_EXEC'}}, {@uid_lt={'uid<', 0xee00}}, {@smackfsfloor={'smackfsfloor', 0x3d, ':%#[@'}}, {@obj_user={'obj_user', 0x3d, ',\\*),i'}}, {@uid_eq={'uid', 0x3d, 0xee00}}, {@seclabel}, {@uid_lt={'uid<', 0xee00}}]}) [ 366.021929][T16388] REISERFS warning (device loop3): super-6502 reiserfs_getopt: unknown mount option "obj_role=^" 06:19:23 executing program 0: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800004, 0x12, r0, 0x0) preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x9, 0x0) mmap(&(0x7f0000000000/0xa000)=nil, 0xa000, 0x2, 0x2172, 0xffffffffffffffff, 0x0) syz_mount_image$reiserfs(&(0x7f0000000140), &(0x7f0000000180)='./file0\x00', 0x0, 0x0, &(0x7f0000000300), 0x0, &(0x7f0000000440)={[{@balloc_no_unhash_reloc}, {@nolargeio}], [{@obj_role={'obj_role', 0x3d, '^'}}, {@hash}, {@uid_lt}, {@mask={'mask', 0x3d, 'MAY_EXEC'}}, {@uid_lt={'uid<', 0xee00}}]}) [ 366.153321][T16396] loop1: detected capacity change from 0 to 64 [ 366.260517][T16401] REISERFS warning (device loop0): super-6504 reiserfs_getopt: the option "nolargeio" requires an argument [ 366.260517][T16401] 06:19:24 executing program 3: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800004, 0x12, r0, 0x0) mmap(&(0x7f0000000000/0xa000)=nil, 0xa000, 0x2, 0x2172, 0xffffffffffffffff, 0x0) syz_mount_image$reiserfs(&(0x7f0000000140), &(0x7f0000000180)='./file0\x00', 0x0, 0x0, &(0x7f0000000300), 0x0, &(0x7f0000000440)={[{@balloc_no_unhash_reloc}], [{@obj_role={'obj_role', 0x3d, '^'}}, {@hash}, {@uid_lt}, {@mask={'mask', 0x3d, 'MAY_EXEC'}}, {@uid_lt={'uid<', 0xee00}}, {@smackfsfloor={'smackfsfloor', 0x3d, ':%#[@'}}, {@obj_user={'obj_user', 0x3d, ',\\*),i'}}, {@uid_eq={'uid', 0x3d, 0xee00}}, {@seclabel}, {@uid_lt={'uid<', 0xee00}}]}) 06:19:24 executing program 1: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800004, 0x12, r0, 0x0) mmap(&(0x7f0000000000/0xa000)=nil, 0xa000, 0x2, 0x2172, 0xffffffffffffffff, 0x0) syz_mount_image$reiserfs(0x0, &(0x7f0000000180)='./file0\x00', 0x8000, 0x3, &(0x7f0000000300)=[{&(0x7f0000000540)="21d37ef07e82e237fbe1b40158d20e242c5ea1f9d9edc6b9395250085d6dfa486982e82d4ce1a5e2bc00d29383bae640de", 0x31, 0x7}, {&(0x7f0000000240)="c43f281f483aa6cd83e40e59d53f177299d285bbe5d90aab2b56a76f9db49d86afa5a0f601ba9b3502de5f3724f3ec00927151f928f668b362052950a2e8f16baec29875fdad59395e86a1050c368933e3ed5a17d76bd7bded793436ea207885f395ace3fc12126c205b170be392c1645233ef01f9661090706a65f63b4845dc2884a20711a8024ad4af44aeec9db33991dae38d95cdb7132970d0d4dec58b9d46d378", 0xa3, 0x6}, {&(0x7f0000000380)="05f82c760d277896dd8c9891a41aafe24124891a32a238c3c78696d112aa09f3ae5c54b0c08676da5db7f358c72dfaca9a5d90860b4ae363c9a921c47965d339c23408a6d9b31a23aee27822f0a140d8e4ec9475a740113f2b9923b46333110e528e0a513151aad34aee1b5310fcf62c1982349253003d6d53aebbe09cf5918668ee682be93b6a671bbc", 0x8a, 0x3}], 0x2000400, &(0x7f0000000440)={[{@balloc_no_unhash_reloc}, {@nolargeio}, {@grpjquota}], [{@obj_role={'obj_role', 0x3d, '^'}}, {@hash}, {@uid_lt}, {@mask={'mask', 0x3d, 'MAY_EXEC'}}, {@uid_lt={'uid<', 0xee00}}, {@smackfsfloor={'smackfsfloor', 0x3d, ':%#[@'}}, {@obj_user={'obj_user', 0x3d, ',\\*),i'}}, {@uid_eq={'uid', 0x3d, 0xee00}}, {@seclabel}, {@uid_lt={'uid<', 0xee00}}]}) 06:19:24 executing program 2: r0 = openat(0xffffffffffffffff, 0x0, 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800004, 0x12, r0, 0x0) preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x9, 0x0) r1 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r1, &(0x7f0000000380)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x80, 0x1, 0x9, 0x1, 0x2, 0x3e, 0x7ff, 0x1f2, 0x40, 0x1f4, 0xbfa, 0x3, 0x38, 0x1, 0x5, 0x4, 0x4}, [{0x5, 0x9, 0x6, 0x101, 0x6, 0x4, 0x9, 0x6}, {0x5, 0x3, 0x5e61, 0x80000000, 0xcc3, 0x9, 0x7, 0x8}], "d1660f10e0ac4a6edbf3aa53803c8f57ef2a12069e82553332d2b96d67f2dbc5b04959dad57c303d876233684f5e9ad402a193da791e11122f2cccbf10d6d499f5e16385d09f63891a965d80bcb68b551fabffb4bf0b5c372b4d69cdefac988201a40429a8d0dc699820193afcab08070fde89c22e16b43dde5e37d9a3df0cd352e8667f163774d9dc3c79571e5100046281", ['\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00']}, 0x842) 06:19:24 executing program 0: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800004, 0x12, r0, 0x0) preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x9, 0x0) mmap(&(0x7f0000000000/0xa000)=nil, 0xa000, 0x2, 0x2172, 0xffffffffffffffff, 0x0) syz_mount_image$reiserfs(&(0x7f0000000140), &(0x7f0000000180)='./file0\x00', 0x0, 0x0, &(0x7f0000000300), 0x0, &(0x7f0000000440)={[{@balloc_no_unhash_reloc}, {@nolargeio}], [{@obj_role={'obj_role', 0x3d, '^'}}, {@hash}, {@uid_lt}, {@mask={'mask', 0x3d, 'MAY_EXEC'}}]}) [ 366.700198][T16415] loop1: detected capacity change from 0 to 64 [ 366.723063][T16416] REISERFS warning (device loop3): super-6502 reiserfs_getopt: unknown mount option "obj_role=^" [ 366.727124][T16418] REISERFS warning (device loop0): super-6504 reiserfs_getopt: the option "nolargeio" requires an argument [ 366.727124][T16418] 06:19:24 executing program 1: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x9, 0x0) mmap(&(0x7f0000000000/0xa000)=nil, 0xa000, 0x2, 0x2172, 0xffffffffffffffff, 0x0) syz_mount_image$reiserfs(0x0, &(0x7f0000000180)='./file0\x00', 0x8000, 0x3, &(0x7f0000000300)=[{&(0x7f0000000540)="21d37ef07e82e237fbe1b40158d20e242c5ea1f9d9edc6b9395250085d6dfa486982e82d4ce1a5e2bc00d29383bae640de", 0x31, 0x7}, {&(0x7f0000000240)="c43f281f483aa6cd83e40e59d53f177299d285bbe5d90aab2b56a76f9db49d86afa5a0f601ba9b3502de5f3724f3ec00927151f928f668b362052950a2e8f16baec29875fdad59395e86a1050c368933e3ed5a17d76bd7bded793436ea207885f395ace3fc12126c205b170be392c1645233ef01f9661090706a65f63b4845dc2884a20711a8024ad4af44aeec9db33991dae38d95cdb7132970d0d4dec58b9d46d378", 0xa3, 0x6}, {&(0x7f0000000380)="05f82c760d277896dd8c9891a41aafe24124891a32a238c3c78696d112aa09f3ae5c54b0c08676da5db7f358c72dfaca9a5d90860b4ae363c9a921c47965d339c23408a6d9b31a23aee27822f0a140d8e4ec9475a740113f2b9923b46333110e528e0a513151aad34aee1b5310fcf62c1982349253003d6d53aebbe09cf5918668ee682be93b6a671bbc", 0x8a, 0x3}], 0x2000400, &(0x7f0000000440)={[{@balloc_no_unhash_reloc}, {@nolargeio}, {@grpjquota}], [{@obj_role={'obj_role', 0x3d, '^'}}, {@hash}, {@uid_lt}, {@mask={'mask', 0x3d, 'MAY_EXEC'}}, {@uid_lt={'uid<', 0xee00}}, {@smackfsfloor={'smackfsfloor', 0x3d, ':%#[@'}}, {@obj_user={'obj_user', 0x3d, ',\\*),i'}}, {@uid_eq={'uid', 0x3d, 0xee00}}, {@seclabel}, {@uid_lt={'uid<', 0xee00}}]}) 06:19:24 executing program 0: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800004, 0x12, r0, 0x0) preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x9, 0x0) mmap(&(0x7f0000000000/0xa000)=nil, 0xa000, 0x2, 0x2172, 0xffffffffffffffff, 0x0) syz_mount_image$reiserfs(&(0x7f0000000140), &(0x7f0000000180)='./file0\x00', 0x0, 0x0, &(0x7f0000000300), 0x0, &(0x7f0000000440)={[{@balloc_no_unhash_reloc}, {@nolargeio}], [{@obj_role={'obj_role', 0x3d, '^'}}, {@hash}, {@uid_lt}]}) 06:19:24 executing program 3: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800004, 0x12, r0, 0x0) mmap(&(0x7f0000000000/0xa000)=nil, 0xa000, 0x2, 0x2172, 0xffffffffffffffff, 0x0) syz_mount_image$reiserfs(&(0x7f0000000140), &(0x7f0000000180)='./file0\x00', 0x0, 0x0, &(0x7f0000000300), 0x0, &(0x7f0000000440)={[{@balloc_no_unhash_reloc}], [{@obj_role={'obj_role', 0x3d, '^'}}, {@hash}, {@uid_lt}, {@mask={'mask', 0x3d, 'MAY_EXEC'}}, {@uid_lt={'uid<', 0xee00}}, {@smackfsfloor={'smackfsfloor', 0x3d, ':%#[@'}}, {@obj_user={'obj_user', 0x3d, ',\\*),i'}}, {@uid_eq={'uid', 0x3d, 0xee00}}, {@seclabel}, {@uid_lt={'uid<', 0xee00}}]}) [ 366.914976][T16429] loop1: detected capacity change from 0 to 64 [ 366.950089][T16433] REISERFS warning (device loop3): super-6502 reiserfs_getopt: unknown mount option "obj_role=^" 06:19:24 executing program 1: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x9, 0x0) mmap(&(0x7f0000000000/0xa000)=nil, 0xa000, 0x2, 0x2172, 0xffffffffffffffff, 0x0) syz_mount_image$reiserfs(0x0, &(0x7f0000000180)='./file0\x00', 0x8000, 0x3, &(0x7f0000000300)=[{&(0x7f0000000540)="21d37ef07e82e237fbe1b40158d20e242c5ea1f9d9edc6b9395250085d6dfa486982e82d4ce1a5e2bc00d29383bae640de", 0x31, 0x7}, {&(0x7f0000000240)="c43f281f483aa6cd83e40e59d53f177299d285bbe5d90aab2b56a76f9db49d86afa5a0f601ba9b3502de5f3724f3ec00927151f928f668b362052950a2e8f16baec29875fdad59395e86a1050c368933e3ed5a17d76bd7bded793436ea207885f395ace3fc12126c205b170be392c1645233ef01f9661090706a65f63b4845dc2884a20711a8024ad4af44aeec9db33991dae38d95cdb7132970d0d4dec58b9d46d378", 0xa3, 0x6}, {&(0x7f0000000380)="05f82c760d277896dd8c9891a41aafe24124891a32a238c3c78696d112aa09f3ae5c54b0c08676da5db7f358c72dfaca9a5d90860b4ae363c9a921c47965d339c23408a6d9b31a23aee27822f0a140d8e4ec9475a740113f2b9923b46333110e528e0a513151aad34aee1b5310fcf62c1982349253003d6d53aebbe09cf5918668ee682be93b6a671bbc", 0x8a, 0x3}], 0x2000400, &(0x7f0000000440)={[{@balloc_no_unhash_reloc}, {@nolargeio}, {@grpjquota}], [{@obj_role={'obj_role', 0x3d, '^'}}, {@hash}, {@uid_lt}, {@mask={'mask', 0x3d, 'MAY_EXEC'}}, {@uid_lt={'uid<', 0xee00}}, {@smackfsfloor={'smackfsfloor', 0x3d, ':%#[@'}}, {@obj_user={'obj_user', 0x3d, ',\\*),i'}}, {@uid_eq={'uid', 0x3d, 0xee00}}, {@seclabel}, {@uid_lt={'uid<', 0xee00}}]}) 06:19:24 executing program 3: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x9, 0x0) mmap(&(0x7f0000000000/0xa000)=nil, 0xa000, 0x2, 0x2172, 0xffffffffffffffff, 0x0) syz_mount_image$reiserfs(&(0x7f0000000140), &(0x7f0000000180)='./file0\x00', 0x0, 0x0, &(0x7f0000000300), 0x0, &(0x7f0000000440)={[{@balloc_no_unhash_reloc}], [{@obj_role={'obj_role', 0x3d, '^'}}, {@hash}, {@uid_lt}, {@mask={'mask', 0x3d, 'MAY_EXEC'}}, {@uid_lt={'uid<', 0xee00}}, {@smackfsfloor={'smackfsfloor', 0x3d, ':%#[@'}}, {@obj_user={'obj_user', 0x3d, ',\\*),i'}}, {@uid_eq={'uid', 0x3d, 0xee00}}, {@seclabel}, {@uid_lt={'uid<', 0xee00}}]}) [ 367.022855][T16438] REISERFS warning (device loop0): super-6504 reiserfs_getopt: the option "nolargeio" requires an argument [ 367.022855][T16438] 06:19:24 executing program 0: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800004, 0x12, r0, 0x0) preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x9, 0x0) mmap(&(0x7f0000000000/0xa000)=nil, 0xa000, 0x2, 0x2172, 0xffffffffffffffff, 0x0) syz_mount_image$reiserfs(&(0x7f0000000140), &(0x7f0000000180)='./file0\x00', 0x0, 0x0, &(0x7f0000000300), 0x0, &(0x7f0000000440)={[{@balloc_no_unhash_reloc}, {@nolargeio}], [{@obj_role={'obj_role', 0x3d, '^'}}, {@hash}]}) [ 367.106845][T16444] REISERFS warning (device loop3): super-6502 reiserfs_getopt: unknown mount option "obj_role=^" [ 367.188323][T16452] loop1: detected capacity change from 0 to 64 [ 367.191578][T16449] REISERFS warning (device loop0): super-6504 reiserfs_getopt: the option "nolargeio" requires an argument [ 367.191578][T16449] 06:19:25 executing program 3: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x9, 0x0) mmap(&(0x7f0000000000/0xa000)=nil, 0xa000, 0x2, 0x2172, 0xffffffffffffffff, 0x0) syz_mount_image$reiserfs(&(0x7f0000000140), &(0x7f0000000180)='./file0\x00', 0x0, 0x0, &(0x7f0000000300), 0x0, &(0x7f0000000440)={[{@balloc_no_unhash_reloc}], [{@obj_role={'obj_role', 0x3d, '^'}}, {@hash}, {@uid_lt}, {@mask={'mask', 0x3d, 'MAY_EXEC'}}, {@uid_lt={'uid<', 0xee00}}, {@smackfsfloor={'smackfsfloor', 0x3d, ':%#[@'}}, {@obj_user={'obj_user', 0x3d, ',\\*),i'}}, {@uid_eq={'uid', 0x3d, 0xee00}}, {@seclabel}, {@uid_lt={'uid<', 0xee00}}]}) 06:19:25 executing program 1: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x9, 0x0) mmap(&(0x7f0000000000/0xa000)=nil, 0xa000, 0x2, 0x2172, 0xffffffffffffffff, 0x0) syz_mount_image$reiserfs(0x0, &(0x7f0000000180)='./file0\x00', 0x8000, 0x3, &(0x7f0000000300)=[{&(0x7f0000000540)="21d37ef07e82e237fbe1b40158d20e242c5ea1f9d9edc6b9395250085d6dfa486982e82d4ce1a5e2bc00d29383bae640de", 0x31, 0x7}, {&(0x7f0000000240)="c43f281f483aa6cd83e40e59d53f177299d285bbe5d90aab2b56a76f9db49d86afa5a0f601ba9b3502de5f3724f3ec00927151f928f668b362052950a2e8f16baec29875fdad59395e86a1050c368933e3ed5a17d76bd7bded793436ea207885f395ace3fc12126c205b170be392c1645233ef01f9661090706a65f63b4845dc2884a20711a8024ad4af44aeec9db33991dae38d95cdb7132970d0d4dec58b9d46d378", 0xa3, 0x6}, {&(0x7f0000000380)="05f82c760d277896dd8c9891a41aafe24124891a32a238c3c78696d112aa09f3ae5c54b0c08676da5db7f358c72dfaca9a5d90860b4ae363c9a921c47965d339c23408a6d9b31a23aee27822f0a140d8e4ec9475a740113f2b9923b46333110e528e0a513151aad34aee1b5310fcf62c1982349253003d6d53aebbe09cf5918668ee682be93b6a671bbc", 0x8a, 0x3}], 0x2000400, &(0x7f0000000440)={[{@balloc_no_unhash_reloc}, {@nolargeio}, {@grpjquota}], [{@obj_role={'obj_role', 0x3d, '^'}}, {@hash}, {@uid_lt}, {@mask={'mask', 0x3d, 'MAY_EXEC'}}, {@uid_lt={'uid<', 0xee00}}, {@smackfsfloor={'smackfsfloor', 0x3d, ':%#[@'}}, {@obj_user={'obj_user', 0x3d, ',\\*),i'}}, {@uid_eq={'uid', 0x3d, 0xee00}}, {@seclabel}, {@uid_lt={'uid<', 0xee00}}]}) 06:19:25 executing program 2: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x0, 0x12, r0, 0x0) preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x9, 0x0) r1 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r1, &(0x7f0000000380)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x80, 0x1, 0x9, 0x1, 0x2, 0x3e, 0x7ff, 0x1f2, 0x40, 0x1f4, 0xbfa, 0x3, 0x38, 0x1, 0x5, 0x4, 0x4}, [{0x5, 0x9, 0x6, 0x101, 0x6, 0x4, 0x9, 0x6}, {0x5, 0x3, 0x5e61, 0x80000000, 0xcc3, 0x9, 0x7, 0x8}], "d1660f10e0ac4a6edbf3aa53803c8f57ef2a12069e82553332d2b96d67f2dbc5b04959dad57c303d876233684f5e9ad402a193da791e11122f2cccbf10d6d499f5e16385d09f63891a965d80bcb68b551fabffb4bf0b5c372b4d69cdefac988201a40429a8d0dc699820193afcab08070fde89c22e16b43dde5e37d9a3df0cd352e8667f163774d9dc3c79571e5100046281", ['\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00']}, 0x842) 06:19:25 executing program 0: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800004, 0x12, r0, 0x0) preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x9, 0x0) mmap(&(0x7f0000000000/0xa000)=nil, 0xa000, 0x2, 0x2172, 0xffffffffffffffff, 0x0) syz_mount_image$reiserfs(&(0x7f0000000140), &(0x7f0000000180)='./file0\x00', 0x0, 0x0, &(0x7f0000000300), 0x0, &(0x7f0000000440)={[{@balloc_no_unhash_reloc}, {@nolargeio}], [{@obj_role={'obj_role', 0x3d, '^'}}]}) [ 367.617302][T16463] loop1: detected capacity change from 0 to 64 [ 367.631937][T16464] REISERFS warning (device loop0): super-6504 reiserfs_getopt: the option "nolargeio" requires an argument [ 367.631937][T16464] [ 367.652085][T16468] REISERFS warning (device loop3): super-6502 reiserfs_getopt: unknown mount option "obj_role=^" 06:19:25 executing program 1: mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800004, 0x12, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f00000001c0)=[{0x0}], 0x1, 0x9, 0x0) mmap(&(0x7f0000000000/0xa000)=nil, 0xa000, 0x2, 0x2172, 0xffffffffffffffff, 0x0) syz_mount_image$reiserfs(0x0, &(0x7f0000000180)='./file0\x00', 0x8000, 0x3, &(0x7f0000000300)=[{&(0x7f0000000540)="21d37ef07e82e237fbe1b40158d20e242c5ea1f9d9edc6b9395250085d6dfa486982e82d4ce1a5e2bc00d29383bae640de", 0x31, 0x7}, {&(0x7f0000000240)="c43f281f483aa6cd83e40e59d53f177299d285bbe5d90aab2b56a76f9db49d86afa5a0f601ba9b3502de5f3724f3ec00927151f928f668b362052950a2e8f16baec29875fdad59395e86a1050c368933e3ed5a17d76bd7bded793436ea207885f395ace3fc12126c205b170be392c1645233ef01f9661090706a65f63b4845dc2884a20711a8024ad4af44aeec9db33991dae38d95cdb7132970d0d4dec58b9d46d378", 0xa3, 0x6}, {&(0x7f0000000380)="05f82c760d277896dd8c9891a41aafe24124891a32a238c3c78696d112aa09f3ae5c54b0c08676da5db7f358c72dfaca9a5d90860b4ae363c9a921c47965d339c23408a6d9b31a23aee27822f0a140d8e4ec9475a740113f2b9923b46333110e528e0a513151aad34aee1b5310fcf62c1982349253003d6d53aebbe09cf5918668ee682be93b6a671bbc", 0x8a, 0x3}], 0x2000400, &(0x7f0000000440)={[{@balloc_no_unhash_reloc}, {@nolargeio}, {@grpjquota}], [{@obj_role={'obj_role', 0x3d, '^'}}, {@hash}, {@uid_lt}, {@mask={'mask', 0x3d, 'MAY_EXEC'}}, {@uid_lt={'uid<', 0xee00}}, {@smackfsfloor={'smackfsfloor', 0x3d, ':%#[@'}}, {@obj_user={'obj_user', 0x3d, ',\\*),i'}}, {@uid_eq={'uid', 0x3d, 0xee00}}, {@seclabel}, {@uid_lt={'uid<', 0xee00}}]}) 06:19:25 executing program 2: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x0, 0x12, r0, 0x0) preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x9, 0x0) r1 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r1, &(0x7f0000000380)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x80, 0x1, 0x9, 0x1, 0x2, 0x3e, 0x7ff, 0x1f2, 0x40, 0x1f4, 0xbfa, 0x3, 0x38, 0x1, 0x5, 0x4, 0x4}, [{0x5, 0x9, 0x6, 0x101, 0x6, 0x4, 0x9, 0x6}, {0x5, 0x3, 0x5e61, 0x80000000, 0xcc3, 0x9, 0x7, 0x8}], "d1660f10e0ac4a6edbf3aa53803c8f57ef2a12069e82553332d2b96d67f2dbc5b04959dad57c303d876233684f5e9ad402a193da791e11122f2cccbf10d6d499f5e16385d09f63891a965d80bcb68b551fabffb4bf0b5c372b4d69cdefac988201a40429a8d0dc699820193afcab08070fde89c22e16b43dde5e37d9a3df0cd352e8667f163774d9dc3c79571e5100046281", ['\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00']}, 0x842) 06:19:25 executing program 0: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800004, 0x12, r0, 0x0) preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x9, 0x0) mmap(&(0x7f0000000000/0xa000)=nil, 0xa000, 0x2, 0x2172, 0xffffffffffffffff, 0x0) syz_mount_image$reiserfs(&(0x7f0000000140), &(0x7f0000000180)='./file0\x00', 0x0, 0x0, &(0x7f0000000300), 0x0, &(0x7f0000000440)={[{@balloc_no_unhash_reloc}, {@nolargeio}]}) 06:19:25 executing program 3: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x9, 0x0) mmap(&(0x7f0000000000/0xa000)=nil, 0xa000, 0x2, 0x2172, 0xffffffffffffffff, 0x0) syz_mount_image$reiserfs(&(0x7f0000000140), &(0x7f0000000180)='./file0\x00', 0x0, 0x0, &(0x7f0000000300), 0x0, &(0x7f0000000440)={[{@balloc_no_unhash_reloc}], [{@obj_role={'obj_role', 0x3d, '^'}}, {@hash}, {@uid_lt}, {@mask={'mask', 0x3d, 'MAY_EXEC'}}, {@uid_lt={'uid<', 0xee00}}, {@smackfsfloor={'smackfsfloor', 0x3d, ':%#[@'}}, {@obj_user={'obj_user', 0x3d, ',\\*),i'}}, {@uid_eq={'uid', 0x3d, 0xee00}}, {@seclabel}, {@uid_lt={'uid<', 0xee00}}]}) 06:19:25 executing program 2: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x0, 0x12, r0, 0x0) preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x9, 0x0) r1 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r1, &(0x7f0000000380)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x80, 0x1, 0x9, 0x1, 0x2, 0x3e, 0x7ff, 0x1f2, 0x40, 0x1f4, 0xbfa, 0x3, 0x38, 0x1, 0x5, 0x4, 0x4}, [{0x5, 0x9, 0x6, 0x101, 0x6, 0x4, 0x9, 0x6}, {0x5, 0x3, 0x5e61, 0x80000000, 0xcc3, 0x9, 0x7, 0x8}], "d1660f10e0ac4a6edbf3aa53803c8f57ef2a12069e82553332d2b96d67f2dbc5b04959dad57c303d876233684f5e9ad402a193da791e11122f2cccbf10d6d499f5e16385d09f63891a965d80bcb68b551fabffb4bf0b5c372b4d69cdefac988201a40429a8d0dc699820193afcab08070fde89c22e16b43dde5e37d9a3df0cd352e8667f163774d9dc3c79571e5100046281", ['\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00']}, 0x842) [ 367.837003][T16480] REISERFS warning (device loop0): super-6504 reiserfs_getopt: the option "nolargeio" requires an argument [ 367.837003][T16480] [ 367.878911][T16485] loop1: detected capacity change from 0 to 64 [ 367.915522][T16487] REISERFS warning (device loop3): super-6502 reiserfs_getopt: unknown mount option "obj_role=^" 06:19:25 executing program 2: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800004, 0x10, r0, 0x0) preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x9, 0x0) r1 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r1, &(0x7f0000000380)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x80, 0x1, 0x9, 0x1, 0x2, 0x3e, 0x7ff, 0x1f2, 0x40, 0x1f4, 0xbfa, 0x3, 0x38, 0x1, 0x5, 0x4, 0x4}, [{0x5, 0x9, 0x6, 0x101, 0x6, 0x4, 0x9, 0x6}, {0x5, 0x3, 0x5e61, 0x80000000, 0xcc3, 0x9, 0x7, 0x8}], "d1660f10e0ac4a6edbf3aa53803c8f57ef2a12069e82553332d2b96d67f2dbc5b04959dad57c303d876233684f5e9ad402a193da791e11122f2cccbf10d6d499f5e16385d09f63891a965d80bcb68b551fabffb4bf0b5c372b4d69cdefac988201a40429a8d0dc699820193afcab08070fde89c22e16b43dde5e37d9a3df0cd352e8667f163774d9dc3c79571e5100046281", ['\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00']}, 0x842) 06:19:25 executing program 0: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x9, 0x0) mmap(&(0x7f0000000000/0xa000)=nil, 0xa000, 0x2, 0x2172, 0xffffffffffffffff, 0x0) syz_mount_image$reiserfs(&(0x7f0000000140), &(0x7f0000000180)='./file0\x00', 0x0, 0x0, &(0x7f0000000300), 0x0, &(0x7f0000000440)={[{@balloc_no_unhash_reloc}], [{@obj_role={'obj_role', 0x3d, '^'}}, {@hash}, {@uid_lt}, {@mask={'mask', 0x3d, 'MAY_EXEC'}}, {@uid_lt={'uid<', 0xee00}}, {@smackfsfloor={'smackfsfloor', 0x3d, ':%#[@'}}, {@obj_user={'obj_user', 0x3d, ',\\*),i'}}, {@uid_eq={'uid', 0x3d, 0xee00}}, {@seclabel}, {@uid_lt={'uid<', 0xee00}}]}) 06:19:25 executing program 1: mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800004, 0x12, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f00000001c0)=[{0x0}], 0x1, 0x9, 0x0) mmap(&(0x7f0000000000/0xa000)=nil, 0xa000, 0x2, 0x2172, 0xffffffffffffffff, 0x0) syz_mount_image$reiserfs(0x0, &(0x7f0000000180)='./file0\x00', 0x8000, 0x3, &(0x7f0000000300)=[{&(0x7f0000000540)="21d37ef07e82e237fbe1b40158d20e242c5ea1f9d9edc6b9395250085d6dfa486982e82d4ce1a5e2bc00d29383bae640de", 0x31, 0x7}, {&(0x7f0000000240)="c43f281f483aa6cd83e40e59d53f177299d285bbe5d90aab2b56a76f9db49d86afa5a0f601ba9b3502de5f3724f3ec00927151f928f668b362052950a2e8f16baec29875fdad59395e86a1050c368933e3ed5a17d76bd7bded793436ea207885f395ace3fc12126c205b170be392c1645233ef01f9661090706a65f63b4845dc2884a20711a8024ad4af44aeec9db33991dae38d95cdb7132970d0d4dec58b9d46d378", 0xa3, 0x6}, {&(0x7f0000000380)="05f82c760d277896dd8c9891a41aafe24124891a32a238c3c78696d112aa09f3ae5c54b0c08676da5db7f358c72dfaca9a5d90860b4ae363c9a921c47965d339c23408a6d9b31a23aee27822f0a140d8e4ec9475a740113f2b9923b46333110e528e0a513151aad34aee1b5310fcf62c1982349253003d6d53aebbe09cf5918668ee682be93b6a671bbc", 0x8a, 0x3}], 0x2000400, &(0x7f0000000440)={[{@balloc_no_unhash_reloc}, {@nolargeio}, {@grpjquota}], [{@obj_role={'obj_role', 0x3d, '^'}}, {@hash}, {@uid_lt}, {@mask={'mask', 0x3d, 'MAY_EXEC'}}, {@uid_lt={'uid<', 0xee00}}, {@smackfsfloor={'smackfsfloor', 0x3d, ':%#[@'}}, {@obj_user={'obj_user', 0x3d, ',\\*),i'}}, {@uid_eq={'uid', 0x3d, 0xee00}}, {@seclabel}, {@uid_lt={'uid<', 0xee00}}]}) 06:19:25 executing program 3: mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800004, 0x12, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f00000001c0)=[{0x0}], 0x1, 0x9, 0x0) mmap(&(0x7f0000000000/0xa000)=nil, 0xa000, 0x2, 0x2172, 0xffffffffffffffff, 0x0) syz_mount_image$reiserfs(&(0x7f0000000140), &(0x7f0000000180)='./file0\x00', 0x0, 0x0, &(0x7f0000000300), 0x0, &(0x7f0000000440)={[{@balloc_no_unhash_reloc}], [{@obj_role={'obj_role', 0x3d, '^'}}, {@hash}, {@uid_lt}, {@mask={'mask', 0x3d, 'MAY_EXEC'}}, {@uid_lt={'uid<', 0xee00}}, {@smackfsfloor={'smackfsfloor', 0x3d, ':%#[@'}}, {@obj_user={'obj_user', 0x3d, ',\\*),i'}}, {@uid_eq={'uid', 0x3d, 0xee00}}, {@seclabel}, {@uid_lt={'uid<', 0xee00}}]}) [ 368.098462][T16498] REISERFS warning (device loop0): super-6502 reiserfs_getopt: unknown mount option "obj_role=^" [ 368.136940][T16503] REISERFS warning (device loop3): super-6502 reiserfs_getopt: unknown mount option "obj_role=^" [ 368.154163][T16507] loop1: detected capacity change from 0 to 64 06:19:25 executing program 0: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800004, 0x12, r0, 0x0) preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x9, 0x0) syz_mount_image$reiserfs(&(0x7f0000000140), &(0x7f0000000180)='./file0\x00', 0x0, 0x0, &(0x7f0000000300), 0x0, &(0x7f0000000440)={[{@balloc_no_unhash_reloc}], [{@obj_role={'obj_role', 0x3d, '^'}}, {@hash}, {@uid_lt}, {@mask={'mask', 0x3d, 'MAY_EXEC'}}, {@uid_lt={'uid<', 0xee00}}, {@smackfsfloor={'smackfsfloor', 0x3d, ':%#[@'}}, {@obj_user={'obj_user', 0x3d, ',\\*),i'}}, {@uid_eq={'uid', 0x3d, 0xee00}}, {@seclabel}, {@uid_lt={'uid<', 0xee00}}]}) 06:19:25 executing program 1: mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800004, 0x12, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f00000001c0)=[{0x0}], 0x1, 0x9, 0x0) mmap(&(0x7f0000000000/0xa000)=nil, 0xa000, 0x2, 0x2172, 0xffffffffffffffff, 0x0) syz_mount_image$reiserfs(0x0, &(0x7f0000000180)='./file0\x00', 0x8000, 0x3, &(0x7f0000000300)=[{&(0x7f0000000540)="21d37ef07e82e237fbe1b40158d20e242c5ea1f9d9edc6b9395250085d6dfa486982e82d4ce1a5e2bc00d29383bae640de", 0x31, 0x7}, {&(0x7f0000000240)="c43f281f483aa6cd83e40e59d53f177299d285bbe5d90aab2b56a76f9db49d86afa5a0f601ba9b3502de5f3724f3ec00927151f928f668b362052950a2e8f16baec29875fdad59395e86a1050c368933e3ed5a17d76bd7bded793436ea207885f395ace3fc12126c205b170be392c1645233ef01f9661090706a65f63b4845dc2884a20711a8024ad4af44aeec9db33991dae38d95cdb7132970d0d4dec58b9d46d378", 0xa3, 0x6}, {&(0x7f0000000380)="05f82c760d277896dd8c9891a41aafe24124891a32a238c3c78696d112aa09f3ae5c54b0c08676da5db7f358c72dfaca9a5d90860b4ae363c9a921c47965d339c23408a6d9b31a23aee27822f0a140d8e4ec9475a740113f2b9923b46333110e528e0a513151aad34aee1b5310fcf62c1982349253003d6d53aebbe09cf5918668ee682be93b6a671bbc", 0x8a, 0x3}], 0x2000400, &(0x7f0000000440)={[{@balloc_no_unhash_reloc}, {@nolargeio}, {@grpjquota}], [{@obj_role={'obj_role', 0x3d, '^'}}, {@hash}, {@uid_lt}, {@mask={'mask', 0x3d, 'MAY_EXEC'}}, {@uid_lt={'uid<', 0xee00}}, {@smackfsfloor={'smackfsfloor', 0x3d, ':%#[@'}}, {@obj_user={'obj_user', 0x3d, ',\\*),i'}}, {@uid_eq={'uid', 0x3d, 0xee00}}, {@seclabel}, {@uid_lt={'uid<', 0xee00}}]}) 06:19:25 executing program 3: mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800004, 0x12, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f00000001c0)=[{0x0}], 0x1, 0x9, 0x0) mmap(&(0x7f0000000000/0xa000)=nil, 0xa000, 0x2, 0x2172, 0xffffffffffffffff, 0x0) syz_mount_image$reiserfs(&(0x7f0000000140), &(0x7f0000000180)='./file0\x00', 0x0, 0x0, &(0x7f0000000300), 0x0, &(0x7f0000000440)={[{@balloc_no_unhash_reloc}], [{@obj_role={'obj_role', 0x3d, '^'}}, {@hash}, {@uid_lt}, {@mask={'mask', 0x3d, 'MAY_EXEC'}}, {@uid_lt={'uid<', 0xee00}}, {@smackfsfloor={'smackfsfloor', 0x3d, ':%#[@'}}, {@obj_user={'obj_user', 0x3d, ',\\*),i'}}, {@uid_eq={'uid', 0x3d, 0xee00}}, {@seclabel}, {@uid_lt={'uid<', 0xee00}}]}) [ 368.312007][T16514] REISERFS warning (device loop3): super-6502 reiserfs_getopt: unknown mount option "obj_role=^" [ 368.388596][T16524] loop1: detected capacity change from 0 to 64 06:19:26 executing program 3: mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800004, 0x12, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f00000001c0)=[{0x0}], 0x1, 0x9, 0x0) mmap(&(0x7f0000000000/0xa000)=nil, 0xa000, 0x2, 0x2172, 0xffffffffffffffff, 0x0) syz_mount_image$reiserfs(&(0x7f0000000140), &(0x7f0000000180)='./file0\x00', 0x0, 0x0, &(0x7f0000000300), 0x0, &(0x7f0000000440)={[{@balloc_no_unhash_reloc}], [{@obj_role={'obj_role', 0x3d, '^'}}, {@hash}, {@uid_lt}, {@mask={'mask', 0x3d, 'MAY_EXEC'}}, {@uid_lt={'uid<', 0xee00}}, {@smackfsfloor={'smackfsfloor', 0x3d, ':%#[@'}}, {@obj_user={'obj_user', 0x3d, ',\\*),i'}}, {@uid_eq={'uid', 0x3d, 0xee00}}, {@seclabel}, {@uid_lt={'uid<', 0xee00}}]}) [ 368.542842][T16530] REISERFS warning (device loop3): super-6502 reiserfs_getopt: unknown mount option "obj_role=^" 06:19:26 executing program 0: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800004, 0x12, r0, 0x0) preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x9, 0x0) syz_mount_image$reiserfs(&(0x7f0000000140), &(0x7f0000000180)='./file0\x00', 0x0, 0x0, &(0x7f0000000300), 0x0, &(0x7f0000000440)={[{@balloc_no_unhash_reloc}], [{@obj_role={'obj_role', 0x3d, '^'}}, {@hash}, {@uid_lt}, {@mask={'mask', 0x3d, 'MAY_EXEC'}}, {@uid_lt={'uid<', 0xee00}}, {@smackfsfloor={'smackfsfloor', 0x3d, ':%#[@'}}, {@obj_user={'obj_user', 0x3d, ',\\*),i'}}, {@uid_eq={'uid', 0x3d, 0xee00}}, {@seclabel}, {@uid_lt={'uid<', 0xee00}}]}) 06:19:26 executing program 2: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800004, 0x10, r0, 0x0) preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x9, 0x0) r1 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r1, &(0x7f0000000380)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x80, 0x1, 0x9, 0x1, 0x2, 0x3e, 0x7ff, 0x1f2, 0x40, 0x1f4, 0xbfa, 0x3, 0x38, 0x1, 0x5, 0x4, 0x4}, [{0x5, 0x9, 0x6, 0x101, 0x6, 0x4, 0x9, 0x6}, {0x5, 0x3, 0x5e61, 0x80000000, 0xcc3, 0x9, 0x7, 0x8}], "d1660f10e0ac4a6edbf3aa53803c8f57ef2a12069e82553332d2b96d67f2dbc5b04959dad57c303d876233684f5e9ad402a193da791e11122f2cccbf10d6d499f5e16385d09f63891a965d80bcb68b551fabffb4bf0b5c372b4d69cdefac988201a40429a8d0dc699820193afcab08070fde89c22e16b43dde5e37d9a3df0cd352e8667f163774d9dc3c79571e5100046281", ['\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00']}, 0x842) 06:19:26 executing program 3: r0 = openat(0xffffffffffffffff, 0x0, 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800004, 0x12, r0, 0x0) preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x9, 0x0) mmap(&(0x7f0000000000/0xa000)=nil, 0xa000, 0x2, 0x2172, 0xffffffffffffffff, 0x0) syz_mount_image$reiserfs(&(0x7f0000000140), &(0x7f0000000180)='./file0\x00', 0x0, 0x0, &(0x7f0000000300), 0x0, &(0x7f0000000440)={[{@balloc_no_unhash_reloc}], [{@obj_role={'obj_role', 0x3d, '^'}}, {@hash}, {@uid_lt}, {@mask={'mask', 0x3d, 'MAY_EXEC'}}, {@uid_lt={'uid<', 0xee00}}, {@smackfsfloor={'smackfsfloor', 0x3d, ':%#[@'}}, {@obj_user={'obj_user', 0x3d, ',\\*),i'}}, {@uid_eq={'uid', 0x3d, 0xee00}}, {@seclabel}, {@uid_lt={'uid<', 0xee00}}]}) 06:19:26 executing program 1: r0 = openat(0xffffffffffffffff, 0x0, 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800004, 0x12, r0, 0x0) preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x9, 0x0) mmap(&(0x7f0000000000/0xa000)=nil, 0xa000, 0x2, 0x2172, 0xffffffffffffffff, 0x0) syz_mount_image$reiserfs(0x0, &(0x7f0000000180)='./file0\x00', 0x8000, 0x3, &(0x7f0000000300)=[{&(0x7f0000000540)="21d37ef07e82e237fbe1b40158d20e242c5ea1f9d9edc6b9395250085d6dfa486982e82d4ce1a5e2bc00d29383bae640de", 0x31, 0x7}, {&(0x7f0000000240)="c43f281f483aa6cd83e40e59d53f177299d285bbe5d90aab2b56a76f9db49d86afa5a0f601ba9b3502de5f3724f3ec00927151f928f668b362052950a2e8f16baec29875fdad59395e86a1050c368933e3ed5a17d76bd7bded793436ea207885f395ace3fc12126c205b170be392c1645233ef01f9661090706a65f63b4845dc2884a20711a8024ad4af44aeec9db33991dae38d95cdb7132970d0d4dec58b9d46d378", 0xa3, 0x6}, {&(0x7f0000000380)="05f82c760d277896dd8c9891a41aafe24124891a32a238c3c78696d112aa09f3ae5c54b0c08676da5db7f358c72dfaca9a5d90860b4ae363c9a921c47965d339c23408a6d9b31a23aee27822f0a140d8e4ec9475a740113f2b9923b46333110e528e0a513151aad34aee1b5310fcf62c1982349253003d6d53aebbe09cf5918668ee682be93b6a671bbc", 0x8a, 0x3}], 0x2000400, &(0x7f0000000440)={[{@balloc_no_unhash_reloc}, {@nolargeio}, {@grpjquota}], [{@obj_role={'obj_role', 0x3d, '^'}}, {@hash}, {@uid_lt}, {@mask={'mask', 0x3d, 'MAY_EXEC'}}, {@uid_lt={'uid<', 0xee00}}, {@smackfsfloor={'smackfsfloor', 0x3d, ':%#[@'}}, {@obj_user={'obj_user', 0x3d, ',\\*),i'}}, {@uid_eq={'uid', 0x3d, 0xee00}}, {@seclabel}, {@uid_lt={'uid<', 0xee00}}]}) [ 368.911670][T16540] loop1: detected capacity change from 0 to 64 [ 368.918268][T16405] blk_update_request: I/O error, dev loop1, sector 0 op 0x0:(READ) flags 0x80700 phys_seg 1 prio class 0 [ 368.937947][T16543] REISERFS warning (device loop3): super-6502 reiserfs_getopt: unknown mount option "obj_role=^" 06:19:26 executing program 1: r0 = openat(0xffffffffffffffff, 0x0, 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800004, 0x12, r0, 0x0) preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x9, 0x0) mmap(&(0x7f0000000000/0xa000)=nil, 0xa000, 0x2, 0x2172, 0xffffffffffffffff, 0x0) syz_mount_image$reiserfs(0x0, &(0x7f0000000180)='./file0\x00', 0x8000, 0x3, &(0x7f0000000300)=[{&(0x7f0000000540)="21d37ef07e82e237fbe1b40158d20e242c5ea1f9d9edc6b9395250085d6dfa486982e82d4ce1a5e2bc00d29383bae640de", 0x31, 0x7}, {&(0x7f0000000240)="c43f281f483aa6cd83e40e59d53f177299d285bbe5d90aab2b56a76f9db49d86afa5a0f601ba9b3502de5f3724f3ec00927151f928f668b362052950a2e8f16baec29875fdad59395e86a1050c368933e3ed5a17d76bd7bded793436ea207885f395ace3fc12126c205b170be392c1645233ef01f9661090706a65f63b4845dc2884a20711a8024ad4af44aeec9db33991dae38d95cdb7132970d0d4dec58b9d46d378", 0xa3, 0x6}, {&(0x7f0000000380)="05f82c760d277896dd8c9891a41aafe24124891a32a238c3c78696d112aa09f3ae5c54b0c08676da5db7f358c72dfaca9a5d90860b4ae363c9a921c47965d339c23408a6d9b31a23aee27822f0a140d8e4ec9475a740113f2b9923b46333110e528e0a513151aad34aee1b5310fcf62c1982349253003d6d53aebbe09cf5918668ee682be93b6a671bbc", 0x8a, 0x3}], 0x2000400, &(0x7f0000000440)={[{@balloc_no_unhash_reloc}, {@nolargeio}, {@grpjquota}], [{@obj_role={'obj_role', 0x3d, '^'}}, {@hash}, {@uid_lt}, {@mask={'mask', 0x3d, 'MAY_EXEC'}}, {@uid_lt={'uid<', 0xee00}}, {@smackfsfloor={'smackfsfloor', 0x3d, ':%#[@'}}, {@obj_user={'obj_user', 0x3d, ',\\*),i'}}, {@uid_eq={'uid', 0x3d, 0xee00}}, {@seclabel}, {@uid_lt={'uid<', 0xee00}}]}) 06:19:26 executing program 3: r0 = openat(0xffffffffffffffff, 0x0, 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800004, 0x12, r0, 0x0) preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x9, 0x0) mmap(&(0x7f0000000000/0xa000)=nil, 0xa000, 0x2, 0x2172, 0xffffffffffffffff, 0x0) syz_mount_image$reiserfs(&(0x7f0000000140), &(0x7f0000000180)='./file0\x00', 0x0, 0x0, &(0x7f0000000300), 0x0, &(0x7f0000000440)={[{@balloc_no_unhash_reloc}], [{@obj_role={'obj_role', 0x3d, '^'}}, {@hash}, {@uid_lt}, {@mask={'mask', 0x3d, 'MAY_EXEC'}}, {@uid_lt={'uid<', 0xee00}}, {@smackfsfloor={'smackfsfloor', 0x3d, ':%#[@'}}, {@obj_user={'obj_user', 0x3d, ',\\*),i'}}, {@uid_eq={'uid', 0x3d, 0xee00}}, {@seclabel}, {@uid_lt={'uid<', 0xee00}}]}) [ 369.103399][T16551] loop1: detected capacity change from 0 to 64 06:19:26 executing program 0: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800004, 0x12, r0, 0x0) preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x9, 0x0) syz_mount_image$reiserfs(&(0x7f0000000140), &(0x7f0000000180)='./file0\x00', 0x0, 0x0, &(0x7f0000000300), 0x0, &(0x7f0000000440)={[{@balloc_no_unhash_reloc}], [{@obj_role={'obj_role', 0x3d, '^'}}, {@hash}, {@uid_lt}, {@mask={'mask', 0x3d, 'MAY_EXEC'}}, {@uid_lt={'uid<', 0xee00}}, {@smackfsfloor={'smackfsfloor', 0x3d, ':%#[@'}}, {@obj_user={'obj_user', 0x3d, ',\\*),i'}}, {@uid_eq={'uid', 0x3d, 0xee00}}, {@seclabel}, {@uid_lt={'uid<', 0xee00}}]}) 06:19:26 executing program 1: r0 = openat(0xffffffffffffffff, 0x0, 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800004, 0x12, r0, 0x0) preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x9, 0x0) mmap(&(0x7f0000000000/0xa000)=nil, 0xa000, 0x2, 0x2172, 0xffffffffffffffff, 0x0) syz_mount_image$reiserfs(0x0, &(0x7f0000000180)='./file0\x00', 0x8000, 0x3, &(0x7f0000000300)=[{&(0x7f0000000540)="21d37ef07e82e237fbe1b40158d20e242c5ea1f9d9edc6b9395250085d6dfa486982e82d4ce1a5e2bc00d29383bae640de", 0x31, 0x7}, {&(0x7f0000000240)="c43f281f483aa6cd83e40e59d53f177299d285bbe5d90aab2b56a76f9db49d86afa5a0f601ba9b3502de5f3724f3ec00927151f928f668b362052950a2e8f16baec29875fdad59395e86a1050c368933e3ed5a17d76bd7bded793436ea207885f395ace3fc12126c205b170be392c1645233ef01f9661090706a65f63b4845dc2884a20711a8024ad4af44aeec9db33991dae38d95cdb7132970d0d4dec58b9d46d378", 0xa3, 0x6}, {&(0x7f0000000380)="05f82c760d277896dd8c9891a41aafe24124891a32a238c3c78696d112aa09f3ae5c54b0c08676da5db7f358c72dfaca9a5d90860b4ae363c9a921c47965d339c23408a6d9b31a23aee27822f0a140d8e4ec9475a740113f2b9923b46333110e528e0a513151aad34aee1b5310fcf62c1982349253003d6d53aebbe09cf5918668ee682be93b6a671bbc", 0x8a, 0x3}], 0x2000400, &(0x7f0000000440)={[{@balloc_no_unhash_reloc}, {@nolargeio}, {@grpjquota}], [{@obj_role={'obj_role', 0x3d, '^'}}, {@hash}, {@uid_lt}, {@mask={'mask', 0x3d, 'MAY_EXEC'}}, {@uid_lt={'uid<', 0xee00}}, {@smackfsfloor={'smackfsfloor', 0x3d, ':%#[@'}}, {@obj_user={'obj_user', 0x3d, ',\\*),i'}}, {@uid_eq={'uid', 0x3d, 0xee00}}, {@seclabel}, {@uid_lt={'uid<', 0xee00}}]}) 06:19:26 executing program 0: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800004, 0x12, r0, 0x0) syz_mount_image$reiserfs(&(0x7f0000000140), &(0x7f0000000180)='./file0\x00', 0x0, 0x0, &(0x7f0000000300), 0x0, &(0x7f0000000440)={[{@balloc_no_unhash_reloc}], [{@obj_role={'obj_role', 0x3d, '^'}}, {@hash}, {@uid_lt}, {@mask={'mask', 0x3d, 'MAY_EXEC'}}, {@uid_lt={'uid<', 0xee00}}, {@smackfsfloor={'smackfsfloor', 0x3d, ':%#[@'}}, {@obj_user={'obj_user', 0x3d, ',\\*),i'}}, {@uid_eq={'uid', 0x3d, 0xee00}}, {@seclabel}, {@uid_lt={'uid<', 0xee00}}]}) [ 369.271698][T16559] REISERFS warning (device loop3): super-6502 reiserfs_getopt: unknown mount option "obj_role=^" [ 369.349487][T16574] loop1: detected capacity change from 0 to 64 06:19:26 executing program 3: r0 = openat(0xffffffffffffffff, 0x0, 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800004, 0x12, r0, 0x0) preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x9, 0x0) mmap(&(0x7f0000000000/0xa000)=nil, 0xa000, 0x2, 0x2172, 0xffffffffffffffff, 0x0) syz_mount_image$reiserfs(&(0x7f0000000140), &(0x7f0000000180)='./file0\x00', 0x0, 0x0, &(0x7f0000000300), 0x0, &(0x7f0000000440)={[{@balloc_no_unhash_reloc}], [{@obj_role={'obj_role', 0x3d, '^'}}, {@hash}, {@uid_lt}, {@mask={'mask', 0x3d, 'MAY_EXEC'}}, {@uid_lt={'uid<', 0xee00}}, {@smackfsfloor={'smackfsfloor', 0x3d, ':%#[@'}}, {@obj_user={'obj_user', 0x3d, ',\\*),i'}}, {@uid_eq={'uid', 0x3d, 0xee00}}, {@seclabel}, {@uid_lt={'uid<', 0xee00}}]}) [ 369.479123][T16579] REISERFS warning (device loop3): super-6502 reiserfs_getopt: unknown mount option "obj_role=^" 06:19:27 executing program 2: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800004, 0x10, r0, 0x0) preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x9, 0x0) r1 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r1, &(0x7f0000000380)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x80, 0x1, 0x9, 0x1, 0x2, 0x3e, 0x7ff, 0x1f2, 0x40, 0x1f4, 0xbfa, 0x3, 0x38, 0x1, 0x5, 0x4, 0x4}, [{0x5, 0x9, 0x6, 0x101, 0x6, 0x4, 0x9, 0x6}, {0x5, 0x3, 0x5e61, 0x80000000, 0xcc3, 0x9, 0x7, 0x8}], "d1660f10e0ac4a6edbf3aa53803c8f57ef2a12069e82553332d2b96d67f2dbc5b04959dad57c303d876233684f5e9ad402a193da791e11122f2cccbf10d6d499f5e16385d09f63891a965d80bcb68b551fabffb4bf0b5c372b4d69cdefac988201a40429a8d0dc699820193afcab08070fde89c22e16b43dde5e37d9a3df0cd352e8667f163774d9dc3c79571e5100046281", ['\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00']}, 0x842) 06:19:27 executing program 0: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800004, 0x12, r0, 0x0) syz_mount_image$reiserfs(&(0x7f0000000140), &(0x7f0000000180)='./file0\x00', 0x0, 0x0, &(0x7f0000000300), 0x0, &(0x7f0000000440)={[{@balloc_no_unhash_reloc}], [{@obj_role={'obj_role', 0x3d, '^'}}, {@hash}, {@uid_lt}, {@mask={'mask', 0x3d, 'MAY_EXEC'}}, {@uid_lt={'uid<', 0xee00}}, {@smackfsfloor={'smackfsfloor', 0x3d, ':%#[@'}}, {@obj_user={'obj_user', 0x3d, ',\\*),i'}}, {@uid_eq={'uid', 0x3d, 0xee00}}, {@seclabel}, {@uid_lt={'uid<', 0xee00}}]}) 06:19:27 executing program 1: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x0, 0x12, r0, 0x0) preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x9, 0x0) mmap(&(0x7f0000000000/0xa000)=nil, 0xa000, 0x2, 0x2172, 0xffffffffffffffff, 0x0) syz_mount_image$reiserfs(0x0, &(0x7f0000000180)='./file0\x00', 0x8000, 0x3, &(0x7f0000000300)=[{&(0x7f0000000540)="21d37ef07e82e237fbe1b40158d20e242c5ea1f9d9edc6b9395250085d6dfa486982e82d4ce1a5e2bc00d29383bae640de", 0x31, 0x7}, {&(0x7f0000000240)="c43f281f483aa6cd83e40e59d53f177299d285bbe5d90aab2b56a76f9db49d86afa5a0f601ba9b3502de5f3724f3ec00927151f928f668b362052950a2e8f16baec29875fdad59395e86a1050c368933e3ed5a17d76bd7bded793436ea207885f395ace3fc12126c205b170be392c1645233ef01f9661090706a65f63b4845dc2884a20711a8024ad4af44aeec9db33991dae38d95cdb7132970d0d4dec58b9d46d378", 0xa3, 0x6}, {&(0x7f0000000380)="05f82c760d277896dd8c9891a41aafe24124891a32a238c3c78696d112aa09f3ae5c54b0c08676da5db7f358c72dfaca9a5d90860b4ae363c9a921c47965d339c23408a6d9b31a23aee27822f0a140d8e4ec9475a740113f2b9923b46333110e528e0a513151aad34aee1b5310fcf62c1982349253003d6d53aebbe09cf5918668ee682be93b6a671bbc", 0x8a, 0x3}], 0x2000400, &(0x7f0000000440)={[{@balloc_no_unhash_reloc}, {@nolargeio}, {@grpjquota}], [{@obj_role={'obj_role', 0x3d, '^'}}, {@hash}, {@uid_lt}, {@mask={'mask', 0x3d, 'MAY_EXEC'}}, {@uid_lt={'uid<', 0xee00}}, {@smackfsfloor={'smackfsfloor', 0x3d, ':%#[@'}}, {@obj_user={'obj_user', 0x3d, ',\\*),i'}}, {@uid_eq={'uid', 0x3d, 0xee00}}, {@seclabel}, {@uid_lt={'uid<', 0xee00}}]}) 06:19:27 executing program 3: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x0, 0x12, r0, 0x0) preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x9, 0x0) mmap(&(0x7f0000000000/0xa000)=nil, 0xa000, 0x2, 0x2172, 0xffffffffffffffff, 0x0) syz_mount_image$reiserfs(&(0x7f0000000140), &(0x7f0000000180)='./file0\x00', 0x0, 0x0, &(0x7f0000000300), 0x0, &(0x7f0000000440)={[{@balloc_no_unhash_reloc}], [{@obj_role={'obj_role', 0x3d, '^'}}, {@hash}, {@uid_lt}, {@mask={'mask', 0x3d, 'MAY_EXEC'}}, {@uid_lt={'uid<', 0xee00}}, {@smackfsfloor={'smackfsfloor', 0x3d, ':%#[@'}}, {@obj_user={'obj_user', 0x3d, ',\\*),i'}}, {@uid_eq={'uid', 0x3d, 0xee00}}, {@seclabel}, {@uid_lt={'uid<', 0xee00}}]}) [ 369.880366][T16591] loop1: detected capacity change from 0 to 64 [ 369.917792][T16594] REISERFS warning (device loop3): super-6502 reiserfs_getopt: unknown mount option "obj_role=^" 06:19:27 executing program 1: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x0, 0x12, r0, 0x0) preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x9, 0x0) mmap(&(0x7f0000000000/0xa000)=nil, 0xa000, 0x2, 0x2172, 0xffffffffffffffff, 0x0) syz_mount_image$reiserfs(0x0, &(0x7f0000000180)='./file0\x00', 0x8000, 0x3, &(0x7f0000000300)=[{&(0x7f0000000540)="21d37ef07e82e237fbe1b40158d20e242c5ea1f9d9edc6b9395250085d6dfa486982e82d4ce1a5e2bc00d29383bae640de", 0x31, 0x7}, {&(0x7f0000000240)="c43f281f483aa6cd83e40e59d53f177299d285bbe5d90aab2b56a76f9db49d86afa5a0f601ba9b3502de5f3724f3ec00927151f928f668b362052950a2e8f16baec29875fdad59395e86a1050c368933e3ed5a17d76bd7bded793436ea207885f395ace3fc12126c205b170be392c1645233ef01f9661090706a65f63b4845dc2884a20711a8024ad4af44aeec9db33991dae38d95cdb7132970d0d4dec58b9d46d378", 0xa3, 0x6}, {&(0x7f0000000380)="05f82c760d277896dd8c9891a41aafe24124891a32a238c3c78696d112aa09f3ae5c54b0c08676da5db7f358c72dfaca9a5d90860b4ae363c9a921c47965d339c23408a6d9b31a23aee27822f0a140d8e4ec9475a740113f2b9923b46333110e528e0a513151aad34aee1b5310fcf62c1982349253003d6d53aebbe09cf5918668ee682be93b6a671bbc", 0x8a, 0x3}], 0x2000400, &(0x7f0000000440)={[{@balloc_no_unhash_reloc}, {@nolargeio}, {@grpjquota}], [{@obj_role={'obj_role', 0x3d, '^'}}, {@hash}, {@uid_lt}, {@mask={'mask', 0x3d, 'MAY_EXEC'}}, {@uid_lt={'uid<', 0xee00}}, {@smackfsfloor={'smackfsfloor', 0x3d, ':%#[@'}}, {@obj_user={'obj_user', 0x3d, ',\\*),i'}}, {@uid_eq={'uid', 0x3d, 0xee00}}, {@seclabel}, {@uid_lt={'uid<', 0xee00}}]}) 06:19:27 executing program 0: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800004, 0x12, r0, 0x0) syz_mount_image$reiserfs(&(0x7f0000000140), &(0x7f0000000180)='./file0\x00', 0x0, 0x0, &(0x7f0000000300), 0x0, &(0x7f0000000440)={[{@balloc_no_unhash_reloc}], [{@obj_role={'obj_role', 0x3d, '^'}}, {@hash}, {@uid_lt}, {@mask={'mask', 0x3d, 'MAY_EXEC'}}, {@uid_lt={'uid<', 0xee00}}, {@smackfsfloor={'smackfsfloor', 0x3d, ':%#[@'}}, {@obj_user={'obj_user', 0x3d, ',\\*),i'}}, {@uid_eq={'uid', 0x3d, 0xee00}}, {@seclabel}, {@uid_lt={'uid<', 0xee00}}]}) 06:19:27 executing program 3: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x0, 0x12, r0, 0x0) preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x9, 0x0) mmap(&(0x7f0000000000/0xa000)=nil, 0xa000, 0x2, 0x2172, 0xffffffffffffffff, 0x0) syz_mount_image$reiserfs(&(0x7f0000000140), &(0x7f0000000180)='./file0\x00', 0x0, 0x0, &(0x7f0000000300), 0x0, &(0x7f0000000440)={[{@balloc_no_unhash_reloc}], [{@obj_role={'obj_role', 0x3d, '^'}}, {@hash}, {@uid_lt}, {@mask={'mask', 0x3d, 'MAY_EXEC'}}, {@uid_lt={'uid<', 0xee00}}, {@smackfsfloor={'smackfsfloor', 0x3d, ':%#[@'}}, {@obj_user={'obj_user', 0x3d, ',\\*),i'}}, {@uid_eq={'uid', 0x3d, 0xee00}}, {@seclabel}, {@uid_lt={'uid<', 0xee00}}]}) [ 370.102915][T16609] REISERFS warning (device loop3): super-6502 reiserfs_getopt: unknown mount option "obj_role=^" [ 370.134921][T16607] loop1: detected capacity change from 0 to 64 06:19:27 executing program 1: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x0, 0x12, r0, 0x0) preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x9, 0x0) mmap(&(0x7f0000000000/0xa000)=nil, 0xa000, 0x2, 0x2172, 0xffffffffffffffff, 0x0) syz_mount_image$reiserfs(0x0, &(0x7f0000000180)='./file0\x00', 0x8000, 0x3, &(0x7f0000000300)=[{&(0x7f0000000540)="21d37ef07e82e237fbe1b40158d20e242c5ea1f9d9edc6b9395250085d6dfa486982e82d4ce1a5e2bc00d29383bae640de", 0x31, 0x7}, {&(0x7f0000000240)="c43f281f483aa6cd83e40e59d53f177299d285bbe5d90aab2b56a76f9db49d86afa5a0f601ba9b3502de5f3724f3ec00927151f928f668b362052950a2e8f16baec29875fdad59395e86a1050c368933e3ed5a17d76bd7bded793436ea207885f395ace3fc12126c205b170be392c1645233ef01f9661090706a65f63b4845dc2884a20711a8024ad4af44aeec9db33991dae38d95cdb7132970d0d4dec58b9d46d378", 0xa3, 0x6}, {&(0x7f0000000380)="05f82c760d277896dd8c9891a41aafe24124891a32a238c3c78696d112aa09f3ae5c54b0c08676da5db7f358c72dfaca9a5d90860b4ae363c9a921c47965d339c23408a6d9b31a23aee27822f0a140d8e4ec9475a740113f2b9923b46333110e528e0a513151aad34aee1b5310fcf62c1982349253003d6d53aebbe09cf5918668ee682be93b6a671bbc", 0x8a, 0x3}], 0x2000400, &(0x7f0000000440)={[{@balloc_no_unhash_reloc}, {@nolargeio}, {@grpjquota}], [{@obj_role={'obj_role', 0x3d, '^'}}, {@hash}, {@uid_lt}, {@mask={'mask', 0x3d, 'MAY_EXEC'}}, {@uid_lt={'uid<', 0xee00}}, {@smackfsfloor={'smackfsfloor', 0x3d, ':%#[@'}}, {@obj_user={'obj_user', 0x3d, ',\\*),i'}}, {@uid_eq={'uid', 0x3d, 0xee00}}, {@seclabel}, {@uid_lt={'uid<', 0xee00}}]}) [ 370.356541][T16622] loop1: detected capacity change from 0 to 64 06:19:28 executing program 2: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800004, 0x12, 0xffffffffffffffff, 0x0) preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x9, 0x0) r1 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r1, &(0x7f0000000380)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x80, 0x1, 0x9, 0x1, 0x2, 0x3e, 0x7ff, 0x1f2, 0x40, 0x1f4, 0xbfa, 0x3, 0x38, 0x1, 0x5, 0x4, 0x4}, [{0x5, 0x9, 0x6, 0x101, 0x6, 0x4, 0x9, 0x6}, {0x5, 0x3, 0x5e61, 0x80000000, 0xcc3, 0x9, 0x7, 0x8}], "d1660f10e0ac4a6edbf3aa53803c8f57ef2a12069e82553332d2b96d67f2dbc5b04959dad57c303d876233684f5e9ad402a193da791e11122f2cccbf10d6d499f5e16385d09f63891a965d80bcb68b551fabffb4bf0b5c372b4d69cdefac988201a40429a8d0dc699820193afcab08070fde89c22e16b43dde5e37d9a3df0cd352e8667f163774d9dc3c79571e5100046281", ['\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00']}, 0x842) 06:19:28 executing program 0: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x9, 0x0) syz_mount_image$reiserfs(&(0x7f0000000140), &(0x7f0000000180)='./file0\x00', 0x0, 0x0, &(0x7f0000000300), 0x0, &(0x7f0000000440)={[{@balloc_no_unhash_reloc}], [{@obj_role={'obj_role', 0x3d, '^'}}, {@hash}, {@uid_lt}, {@mask={'mask', 0x3d, 'MAY_EXEC'}}, {@uid_lt={'uid<', 0xee00}}, {@smackfsfloor={'smackfsfloor', 0x3d, ':%#[@'}}, {@obj_user={'obj_user', 0x3d, ',\\*),i'}}, {@uid_eq={'uid', 0x3d, 0xee00}}, {@seclabel}, {@uid_lt={'uid<', 0xee00}}]}) 06:19:28 executing program 3: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x0, 0x12, r0, 0x0) preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x9, 0x0) mmap(&(0x7f0000000000/0xa000)=nil, 0xa000, 0x2, 0x2172, 0xffffffffffffffff, 0x0) syz_mount_image$reiserfs(&(0x7f0000000140), &(0x7f0000000180)='./file0\x00', 0x0, 0x0, &(0x7f0000000300), 0x0, &(0x7f0000000440)={[{@balloc_no_unhash_reloc}], [{@obj_role={'obj_role', 0x3d, '^'}}, {@hash}, {@uid_lt}, {@mask={'mask', 0x3d, 'MAY_EXEC'}}, {@uid_lt={'uid<', 0xee00}}, {@smackfsfloor={'smackfsfloor', 0x3d, ':%#[@'}}, {@obj_user={'obj_user', 0x3d, ',\\*),i'}}, {@uid_eq={'uid', 0x3d, 0xee00}}, {@seclabel}, {@uid_lt={'uid<', 0xee00}}]}) 06:19:28 executing program 1: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800004, 0x10, r0, 0x0) preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x9, 0x0) mmap(&(0x7f0000000000/0xa000)=nil, 0xa000, 0x2, 0x2172, 0xffffffffffffffff, 0x0) syz_mount_image$reiserfs(0x0, &(0x7f0000000180)='./file0\x00', 0x8000, 0x3, &(0x7f0000000300)=[{&(0x7f0000000540)="21d37ef07e82e237fbe1b40158d20e242c5ea1f9d9edc6b9395250085d6dfa486982e82d4ce1a5e2bc00d29383bae640de", 0x31, 0x7}, {&(0x7f0000000240)="c43f281f483aa6cd83e40e59d53f177299d285bbe5d90aab2b56a76f9db49d86afa5a0f601ba9b3502de5f3724f3ec00927151f928f668b362052950a2e8f16baec29875fdad59395e86a1050c368933e3ed5a17d76bd7bded793436ea207885f395ace3fc12126c205b170be392c1645233ef01f9661090706a65f63b4845dc2884a20711a8024ad4af44aeec9db33991dae38d95cdb7132970d0d4dec58b9d46d378", 0xa3, 0x6}, {&(0x7f0000000380)="05f82c760d277896dd8c9891a41aafe24124891a32a238c3c78696d112aa09f3ae5c54b0c08676da5db7f358c72dfaca9a5d90860b4ae363c9a921c47965d339c23408a6d9b31a23aee27822f0a140d8e4ec9475a740113f2b9923b46333110e528e0a513151aad34aee1b5310fcf62c1982349253003d6d53aebbe09cf5918668ee682be93b6a671bbc", 0x8a, 0x3}], 0x2000400, &(0x7f0000000440)={[{@balloc_no_unhash_reloc}, {@nolargeio}, {@grpjquota}], [{@obj_role={'obj_role', 0x3d, '^'}}, {@hash}, {@uid_lt}, {@mask={'mask', 0x3d, 'MAY_EXEC'}}, {@uid_lt={'uid<', 0xee00}}, {@smackfsfloor={'smackfsfloor', 0x3d, ':%#[@'}}, {@obj_user={'obj_user', 0x3d, ',\\*),i'}}, {@uid_eq={'uid', 0x3d, 0xee00}}, {@seclabel}, {@uid_lt={'uid<', 0xee00}}]}) [ 370.809133][T16631] loop1: detected capacity change from 0 to 64 [ 370.814535][T16630] REISERFS warning (device loop3): super-6502 reiserfs_getopt: unknown mount option "obj_role=^" [ 370.824054][T16632] REISERFS warning (device loop0): super-6502 reiserfs_getopt: unknown mount option "obj_role=^" 06:19:28 executing program 1: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800004, 0x10, r0, 0x0) preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x9, 0x0) mmap(&(0x7f0000000000/0xa000)=nil, 0xa000, 0x2, 0x2172, 0xffffffffffffffff, 0x0) syz_mount_image$reiserfs(0x0, &(0x7f0000000180)='./file0\x00', 0x8000, 0x3, &(0x7f0000000300)=[{&(0x7f0000000540)="21d37ef07e82e237fbe1b40158d20e242c5ea1f9d9edc6b9395250085d6dfa486982e82d4ce1a5e2bc00d29383bae640de", 0x31, 0x7}, {&(0x7f0000000240)="c43f281f483aa6cd83e40e59d53f177299d285bbe5d90aab2b56a76f9db49d86afa5a0f601ba9b3502de5f3724f3ec00927151f928f668b362052950a2e8f16baec29875fdad59395e86a1050c368933e3ed5a17d76bd7bded793436ea207885f395ace3fc12126c205b170be392c1645233ef01f9661090706a65f63b4845dc2884a20711a8024ad4af44aeec9db33991dae38d95cdb7132970d0d4dec58b9d46d378", 0xa3, 0x6}, {&(0x7f0000000380)="05f82c760d277896dd8c9891a41aafe24124891a32a238c3c78696d112aa09f3ae5c54b0c08676da5db7f358c72dfaca9a5d90860b4ae363c9a921c47965d339c23408a6d9b31a23aee27822f0a140d8e4ec9475a740113f2b9923b46333110e528e0a513151aad34aee1b5310fcf62c1982349253003d6d53aebbe09cf5918668ee682be93b6a671bbc", 0x8a, 0x3}], 0x2000400, &(0x7f0000000440)={[{@balloc_no_unhash_reloc}, {@nolargeio}, {@grpjquota}], [{@obj_role={'obj_role', 0x3d, '^'}}, {@hash}, {@uid_lt}, {@mask={'mask', 0x3d, 'MAY_EXEC'}}, {@uid_lt={'uid<', 0xee00}}, {@smackfsfloor={'smackfsfloor', 0x3d, ':%#[@'}}, {@obj_user={'obj_user', 0x3d, ',\\*),i'}}, {@uid_eq={'uid', 0x3d, 0xee00}}, {@seclabel}, {@uid_lt={'uid<', 0xee00}}]}) 06:19:28 executing program 3: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800004, 0x10, r0, 0x0) preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x9, 0x0) mmap(&(0x7f0000000000/0xa000)=nil, 0xa000, 0x2, 0x2172, 0xffffffffffffffff, 0x0) syz_mount_image$reiserfs(&(0x7f0000000140), &(0x7f0000000180)='./file0\x00', 0x0, 0x0, &(0x7f0000000300), 0x0, &(0x7f0000000440)={[{@balloc_no_unhash_reloc}], [{@obj_role={'obj_role', 0x3d, '^'}}, {@hash}, {@uid_lt}, {@mask={'mask', 0x3d, 'MAY_EXEC'}}, {@uid_lt={'uid<', 0xee00}}, {@smackfsfloor={'smackfsfloor', 0x3d, ':%#[@'}}, {@obj_user={'obj_user', 0x3d, ',\\*),i'}}, {@uid_eq={'uid', 0x3d, 0xee00}}, {@seclabel}, {@uid_lt={'uid<', 0xee00}}]}) 06:19:28 executing program 0: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x9, 0x0) syz_mount_image$reiserfs(&(0x7f0000000140), &(0x7f0000000180)='./file0\x00', 0x0, 0x0, &(0x7f0000000300), 0x0, &(0x7f0000000440)={[{@balloc_no_unhash_reloc}], [{@obj_role={'obj_role', 0x3d, '^'}}, {@hash}, {@uid_lt}, {@mask={'mask', 0x3d, 'MAY_EXEC'}}, {@uid_lt={'uid<', 0xee00}}, {@smackfsfloor={'smackfsfloor', 0x3d, ':%#[@'}}, {@obj_user={'obj_user', 0x3d, ',\\*),i'}}, {@uid_eq={'uid', 0x3d, 0xee00}}, {@seclabel}, {@uid_lt={'uid<', 0xee00}}]}) [ 370.988916][T16643] REISERFS warning (device loop3): super-6502 reiserfs_getopt: unknown mount option "obj_role=^" [ 371.038368][T16649] REISERFS warning (device loop0): super-6502 reiserfs_getopt: unknown mount option "obj_role=^" [ 371.048833][T16653] loop1: detected capacity change from 0 to 64 06:19:28 executing program 3: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800004, 0x10, r0, 0x0) preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x9, 0x0) mmap(&(0x7f0000000000/0xa000)=nil, 0xa000, 0x2, 0x2172, 0xffffffffffffffff, 0x0) syz_mount_image$reiserfs(&(0x7f0000000140), &(0x7f0000000180)='./file0\x00', 0x0, 0x0, &(0x7f0000000300), 0x0, &(0x7f0000000440)={[{@balloc_no_unhash_reloc}], [{@obj_role={'obj_role', 0x3d, '^'}}, {@hash}, {@uid_lt}, {@mask={'mask', 0x3d, 'MAY_EXEC'}}, {@uid_lt={'uid<', 0xee00}}, {@smackfsfloor={'smackfsfloor', 0x3d, ':%#[@'}}, {@obj_user={'obj_user', 0x3d, ',\\*),i'}}, {@uid_eq={'uid', 0x3d, 0xee00}}, {@seclabel}, {@uid_lt={'uid<', 0xee00}}]}) [ 371.158745][T16659] REISERFS warning (device loop3): super-6502 reiserfs_getopt: unknown mount option "obj_role=^" 06:19:29 executing program 1: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800004, 0x10, r0, 0x0) preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x9, 0x0) mmap(&(0x7f0000000000/0xa000)=nil, 0xa000, 0x2, 0x2172, 0xffffffffffffffff, 0x0) syz_mount_image$reiserfs(0x0, &(0x7f0000000180)='./file0\x00', 0x8000, 0x3, &(0x7f0000000300)=[{&(0x7f0000000540)="21d37ef07e82e237fbe1b40158d20e242c5ea1f9d9edc6b9395250085d6dfa486982e82d4ce1a5e2bc00d29383bae640de", 0x31, 0x7}, {&(0x7f0000000240)="c43f281f483aa6cd83e40e59d53f177299d285bbe5d90aab2b56a76f9db49d86afa5a0f601ba9b3502de5f3724f3ec00927151f928f668b362052950a2e8f16baec29875fdad59395e86a1050c368933e3ed5a17d76bd7bded793436ea207885f395ace3fc12126c205b170be392c1645233ef01f9661090706a65f63b4845dc2884a20711a8024ad4af44aeec9db33991dae38d95cdb7132970d0d4dec58b9d46d378", 0xa3, 0x6}, {&(0x7f0000000380)="05f82c760d277896dd8c9891a41aafe24124891a32a238c3c78696d112aa09f3ae5c54b0c08676da5db7f358c72dfaca9a5d90860b4ae363c9a921c47965d339c23408a6d9b31a23aee27822f0a140d8e4ec9475a740113f2b9923b46333110e528e0a513151aad34aee1b5310fcf62c1982349253003d6d53aebbe09cf5918668ee682be93b6a671bbc", 0x8a, 0x3}], 0x2000400, &(0x7f0000000440)={[{@balloc_no_unhash_reloc}, {@nolargeio}, {@grpjquota}], [{@obj_role={'obj_role', 0x3d, '^'}}, {@hash}, {@uid_lt}, {@mask={'mask', 0x3d, 'MAY_EXEC'}}, {@uid_lt={'uid<', 0xee00}}, {@smackfsfloor={'smackfsfloor', 0x3d, ':%#[@'}}, {@obj_user={'obj_user', 0x3d, ',\\*),i'}}, {@uid_eq={'uid', 0x3d, 0xee00}}, {@seclabel}, {@uid_lt={'uid<', 0xee00}}]}) 06:19:29 executing program 0: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x9, 0x0) syz_mount_image$reiserfs(&(0x7f0000000140), &(0x7f0000000180)='./file0\x00', 0x0, 0x0, &(0x7f0000000300), 0x0, &(0x7f0000000440)={[{@balloc_no_unhash_reloc}], [{@obj_role={'obj_role', 0x3d, '^'}}, {@hash}, {@uid_lt}, {@mask={'mask', 0x3d, 'MAY_EXEC'}}, {@uid_lt={'uid<', 0xee00}}, {@smackfsfloor={'smackfsfloor', 0x3d, ':%#[@'}}, {@obj_user={'obj_user', 0x3d, ',\\*),i'}}, {@uid_eq={'uid', 0x3d, 0xee00}}, {@seclabel}, {@uid_lt={'uid<', 0xee00}}]}) 06:19:29 executing program 2: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800004, 0x12, 0xffffffffffffffff, 0x0) preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x9, 0x0) r1 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r1, &(0x7f0000000380)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x80, 0x1, 0x9, 0x1, 0x2, 0x3e, 0x7ff, 0x1f2, 0x40, 0x1f4, 0xbfa, 0x3, 0x38, 0x1, 0x5, 0x4, 0x4}, [{0x5, 0x9, 0x6, 0x101, 0x6, 0x4, 0x9, 0x6}, {0x5, 0x3, 0x5e61, 0x80000000, 0xcc3, 0x9, 0x7, 0x8}], "d1660f10e0ac4a6edbf3aa53803c8f57ef2a12069e82553332d2b96d67f2dbc5b04959dad57c303d876233684f5e9ad402a193da791e11122f2cccbf10d6d499f5e16385d09f63891a965d80bcb68b551fabffb4bf0b5c372b4d69cdefac988201a40429a8d0dc699820193afcab08070fde89c22e16b43dde5e37d9a3df0cd352e8667f163774d9dc3c79571e5100046281", ['\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00']}, 0x842) 06:19:29 executing program 3: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800004, 0x10, r0, 0x0) preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x9, 0x0) mmap(&(0x7f0000000000/0xa000)=nil, 0xa000, 0x2, 0x2172, 0xffffffffffffffff, 0x0) syz_mount_image$reiserfs(&(0x7f0000000140), &(0x7f0000000180)='./file0\x00', 0x0, 0x0, &(0x7f0000000300), 0x0, &(0x7f0000000440)={[{@balloc_no_unhash_reloc}], [{@obj_role={'obj_role', 0x3d, '^'}}, {@hash}, {@uid_lt}, {@mask={'mask', 0x3d, 'MAY_EXEC'}}, {@uid_lt={'uid<', 0xee00}}, {@smackfsfloor={'smackfsfloor', 0x3d, ':%#[@'}}, {@obj_user={'obj_user', 0x3d, ',\\*),i'}}, {@uid_eq={'uid', 0x3d, 0xee00}}, {@seclabel}, {@uid_lt={'uid<', 0xee00}}]}) [ 371.760854][T16672] loop1: detected capacity change from 0 to 64 [ 371.779856][T16673] REISERFS warning (device loop3): super-6502 reiserfs_getopt: unknown mount option "obj_role=^" [ 371.787840][T16671] REISERFS warning (device loop0): super-6502 reiserfs_getopt: unknown mount option "obj_role=^" 06:19:29 executing program 1: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800004, 0x12, 0xffffffffffffffff, 0x0) preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x9, 0x0) mmap(&(0x7f0000000000/0xa000)=nil, 0xa000, 0x2, 0x2172, 0xffffffffffffffff, 0x0) syz_mount_image$reiserfs(0x0, &(0x7f0000000180)='./file0\x00', 0x8000, 0x3, &(0x7f0000000300)=[{&(0x7f0000000540)="21d37ef07e82e237fbe1b40158d20e242c5ea1f9d9edc6b9395250085d6dfa486982e82d4ce1a5e2bc00d29383bae640de", 0x31, 0x7}, {&(0x7f0000000240)="c43f281f483aa6cd83e40e59d53f177299d285bbe5d90aab2b56a76f9db49d86afa5a0f601ba9b3502de5f3724f3ec00927151f928f668b362052950a2e8f16baec29875fdad59395e86a1050c368933e3ed5a17d76bd7bded793436ea207885f395ace3fc12126c205b170be392c1645233ef01f9661090706a65f63b4845dc2884a20711a8024ad4af44aeec9db33991dae38d95cdb7132970d0d4dec58b9d46d378", 0xa3, 0x6}, {&(0x7f0000000380)="05f82c760d277896dd8c9891a41aafe24124891a32a238c3c78696d112aa09f3ae5c54b0c08676da5db7f358c72dfaca9a5d90860b4ae363c9a921c47965d339c23408a6d9b31a23aee27822f0a140d8e4ec9475a740113f2b9923b46333110e528e0a513151aad34aee1b5310fcf62c1982349253003d6d53aebbe09cf5918668ee682be93b6a671bbc", 0x8a, 0x3}], 0x2000400, &(0x7f0000000440)={[{@balloc_no_unhash_reloc}, {@nolargeio}, {@grpjquota}], [{@obj_role={'obj_role', 0x3d, '^'}}, {@hash}, {@uid_lt}, {@mask={'mask', 0x3d, 'MAY_EXEC'}}, {@uid_lt={'uid<', 0xee00}}, {@smackfsfloor={'smackfsfloor', 0x3d, ':%#[@'}}, {@obj_user={'obj_user', 0x3d, ',\\*),i'}}, {@uid_eq={'uid', 0x3d, 0xee00}}, {@seclabel}, {@uid_lt={'uid<', 0xee00}}]}) 06:19:29 executing program 3: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800004, 0x12, 0xffffffffffffffff, 0x0) preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x9, 0x0) mmap(&(0x7f0000000000/0xa000)=nil, 0xa000, 0x2, 0x2172, 0xffffffffffffffff, 0x0) syz_mount_image$reiserfs(&(0x7f0000000140), &(0x7f0000000180)='./file0\x00', 0x0, 0x0, &(0x7f0000000300), 0x0, &(0x7f0000000440)={[{@balloc_no_unhash_reloc}], [{@obj_role={'obj_role', 0x3d, '^'}}, {@hash}, {@uid_lt}, {@mask={'mask', 0x3d, 'MAY_EXEC'}}, {@uid_lt={'uid<', 0xee00}}, {@smackfsfloor={'smackfsfloor', 0x3d, ':%#[@'}}, {@obj_user={'obj_user', 0x3d, ',\\*),i'}}, {@uid_eq={'uid', 0x3d, 0xee00}}, {@seclabel}, {@uid_lt={'uid<', 0xee00}}]}) 06:19:29 executing program 0: mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800004, 0x12, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f00000001c0)=[{0x0}], 0x1, 0x9, 0x0) syz_mount_image$reiserfs(&(0x7f0000000140), &(0x7f0000000180)='./file0\x00', 0x0, 0x0, &(0x7f0000000300), 0x0, &(0x7f0000000440)={[{@balloc_no_unhash_reloc}], [{@obj_role={'obj_role', 0x3d, '^'}}, {@hash}, {@uid_lt}, {@mask={'mask', 0x3d, 'MAY_EXEC'}}, {@uid_lt={'uid<', 0xee00}}, {@smackfsfloor={'smackfsfloor', 0x3d, ':%#[@'}}, {@obj_user={'obj_user', 0x3d, ',\\*),i'}}, {@uid_eq={'uid', 0x3d, 0xee00}}, {@seclabel}, {@uid_lt={'uid<', 0xee00}}]}) [ 371.987423][T16685] REISERFS warning (device loop0): super-6502 reiserfs_getopt: unknown mount option "obj_role=^" [ 371.996709][T16691] loop1: detected capacity change from 0 to 64 [ 372.014947][T16688] REISERFS warning (device loop3): super-6502 reiserfs_getopt: unknown mount option "obj_role=^" 06:19:29 executing program 1: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800004, 0x12, 0xffffffffffffffff, 0x0) preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x9, 0x0) mmap(&(0x7f0000000000/0xa000)=nil, 0xa000, 0x2, 0x2172, 0xffffffffffffffff, 0x0) syz_mount_image$reiserfs(0x0, &(0x7f0000000180)='./file0\x00', 0x8000, 0x3, &(0x7f0000000300)=[{&(0x7f0000000540)="21d37ef07e82e237fbe1b40158d20e242c5ea1f9d9edc6b9395250085d6dfa486982e82d4ce1a5e2bc00d29383bae640de", 0x31, 0x7}, {&(0x7f0000000240)="c43f281f483aa6cd83e40e59d53f177299d285bbe5d90aab2b56a76f9db49d86afa5a0f601ba9b3502de5f3724f3ec00927151f928f668b362052950a2e8f16baec29875fdad59395e86a1050c368933e3ed5a17d76bd7bded793436ea207885f395ace3fc12126c205b170be392c1645233ef01f9661090706a65f63b4845dc2884a20711a8024ad4af44aeec9db33991dae38d95cdb7132970d0d4dec58b9d46d378", 0xa3, 0x6}, {&(0x7f0000000380)="05f82c760d277896dd8c9891a41aafe24124891a32a238c3c78696d112aa09f3ae5c54b0c08676da5db7f358c72dfaca9a5d90860b4ae363c9a921c47965d339c23408a6d9b31a23aee27822f0a140d8e4ec9475a740113f2b9923b46333110e528e0a513151aad34aee1b5310fcf62c1982349253003d6d53aebbe09cf5918668ee682be93b6a671bbc", 0x8a, 0x3}], 0x2000400, &(0x7f0000000440)={[{@balloc_no_unhash_reloc}, {@nolargeio}, {@grpjquota}], [{@obj_role={'obj_role', 0x3d, '^'}}, {@hash}, {@uid_lt}, {@mask={'mask', 0x3d, 'MAY_EXEC'}}, {@uid_lt={'uid<', 0xee00}}, {@smackfsfloor={'smackfsfloor', 0x3d, ':%#[@'}}, {@obj_user={'obj_user', 0x3d, ',\\*),i'}}, {@uid_eq={'uid', 0x3d, 0xee00}}, {@seclabel}, {@uid_lt={'uid<', 0xee00}}]}) 06:19:29 executing program 0: mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800004, 0x12, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f00000001c0)=[{0x0}], 0x1, 0x9, 0x0) syz_mount_image$reiserfs(&(0x7f0000000140), &(0x7f0000000180)='./file0\x00', 0x0, 0x0, &(0x7f0000000300), 0x0, &(0x7f0000000440)={[{@balloc_no_unhash_reloc}], [{@obj_role={'obj_role', 0x3d, '^'}}, {@hash}, {@uid_lt}, {@mask={'mask', 0x3d, 'MAY_EXEC'}}, {@uid_lt={'uid<', 0xee00}}, {@smackfsfloor={'smackfsfloor', 0x3d, ':%#[@'}}, {@obj_user={'obj_user', 0x3d, ',\\*),i'}}, {@uid_eq={'uid', 0x3d, 0xee00}}, {@seclabel}, {@uid_lt={'uid<', 0xee00}}]}) 06:19:29 executing program 3: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800004, 0x12, 0xffffffffffffffff, 0x0) preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x9, 0x0) mmap(&(0x7f0000000000/0xa000)=nil, 0xa000, 0x2, 0x2172, 0xffffffffffffffff, 0x0) syz_mount_image$reiserfs(&(0x7f0000000140), &(0x7f0000000180)='./file0\x00', 0x0, 0x0, &(0x7f0000000300), 0x0, &(0x7f0000000440)={[{@balloc_no_unhash_reloc}], [{@obj_role={'obj_role', 0x3d, '^'}}, {@hash}, {@uid_lt}, {@mask={'mask', 0x3d, 'MAY_EXEC'}}, {@uid_lt={'uid<', 0xee00}}, {@smackfsfloor={'smackfsfloor', 0x3d, ':%#[@'}}, {@obj_user={'obj_user', 0x3d, ',\\*),i'}}, {@uid_eq={'uid', 0x3d, 0xee00}}, {@seclabel}, {@uid_lt={'uid<', 0xee00}}]}) [ 372.177595][T16701] REISERFS warning (device loop0): super-6502 reiserfs_getopt: unknown mount option "obj_role=^" [ 372.201874][T16704] REISERFS warning (device loop3): super-6502 reiserfs_getopt: unknown mount option "obj_role=^" [ 372.266975][T16710] loop1: detected capacity change from 0 to 64 06:19:30 executing program 2: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800004, 0x12, 0xffffffffffffffff, 0x0) preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x9, 0x0) r1 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r1, &(0x7f0000000380)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x80, 0x1, 0x9, 0x1, 0x2, 0x3e, 0x7ff, 0x1f2, 0x40, 0x1f4, 0xbfa, 0x3, 0x38, 0x1, 0x5, 0x4, 0x4}, [{0x5, 0x9, 0x6, 0x101, 0x6, 0x4, 0x9, 0x6}, {0x5, 0x3, 0x5e61, 0x80000000, 0xcc3, 0x9, 0x7, 0x8}], "d1660f10e0ac4a6edbf3aa53803c8f57ef2a12069e82553332d2b96d67f2dbc5b04959dad57c303d876233684f5e9ad402a193da791e11122f2cccbf10d6d499f5e16385d09f63891a965d80bcb68b551fabffb4bf0b5c372b4d69cdefac988201a40429a8d0dc699820193afcab08070fde89c22e16b43dde5e37d9a3df0cd352e8667f163774d9dc3c79571e5100046281", ['\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00']}, 0x842) 06:19:30 executing program 3: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800004, 0x12, 0xffffffffffffffff, 0x0) preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x9, 0x0) mmap(&(0x7f0000000000/0xa000)=nil, 0xa000, 0x2, 0x2172, 0xffffffffffffffff, 0x0) syz_mount_image$reiserfs(&(0x7f0000000140), &(0x7f0000000180)='./file0\x00', 0x0, 0x0, &(0x7f0000000300), 0x0, &(0x7f0000000440)={[{@balloc_no_unhash_reloc}], [{@obj_role={'obj_role', 0x3d, '^'}}, {@hash}, {@uid_lt}, {@mask={'mask', 0x3d, 'MAY_EXEC'}}, {@uid_lt={'uid<', 0xee00}}, {@smackfsfloor={'smackfsfloor', 0x3d, ':%#[@'}}, {@obj_user={'obj_user', 0x3d, ',\\*),i'}}, {@uid_eq={'uid', 0x3d, 0xee00}}, {@seclabel}, {@uid_lt={'uid<', 0xee00}}]}) 06:19:30 executing program 0: mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800004, 0x12, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f00000001c0)=[{0x0}], 0x1, 0x9, 0x0) syz_mount_image$reiserfs(&(0x7f0000000140), &(0x7f0000000180)='./file0\x00', 0x0, 0x0, &(0x7f0000000300), 0x0, &(0x7f0000000440)={[{@balloc_no_unhash_reloc}], [{@obj_role={'obj_role', 0x3d, '^'}}, {@hash}, {@uid_lt}, {@mask={'mask', 0x3d, 'MAY_EXEC'}}, {@uid_lt={'uid<', 0xee00}}, {@smackfsfloor={'smackfsfloor', 0x3d, ':%#[@'}}, {@obj_user={'obj_user', 0x3d, ',\\*),i'}}, {@uid_eq={'uid', 0x3d, 0xee00}}, {@seclabel}, {@uid_lt={'uid<', 0xee00}}]}) 06:19:30 executing program 1: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800004, 0x12, 0xffffffffffffffff, 0x0) preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x9, 0x0) mmap(&(0x7f0000000000/0xa000)=nil, 0xa000, 0x2, 0x2172, 0xffffffffffffffff, 0x0) syz_mount_image$reiserfs(0x0, &(0x7f0000000180)='./file0\x00', 0x8000, 0x3, &(0x7f0000000300)=[{&(0x7f0000000540)="21d37ef07e82e237fbe1b40158d20e242c5ea1f9d9edc6b9395250085d6dfa486982e82d4ce1a5e2bc00d29383bae640de", 0x31, 0x7}, {&(0x7f0000000240)="c43f281f483aa6cd83e40e59d53f177299d285bbe5d90aab2b56a76f9db49d86afa5a0f601ba9b3502de5f3724f3ec00927151f928f668b362052950a2e8f16baec29875fdad59395e86a1050c368933e3ed5a17d76bd7bded793436ea207885f395ace3fc12126c205b170be392c1645233ef01f9661090706a65f63b4845dc2884a20711a8024ad4af44aeec9db33991dae38d95cdb7132970d0d4dec58b9d46d378", 0xa3, 0x6}, {&(0x7f0000000380)="05f82c760d277896dd8c9891a41aafe24124891a32a238c3c78696d112aa09f3ae5c54b0c08676da5db7f358c72dfaca9a5d90860b4ae363c9a921c47965d339c23408a6d9b31a23aee27822f0a140d8e4ec9475a740113f2b9923b46333110e528e0a513151aad34aee1b5310fcf62c1982349253003d6d53aebbe09cf5918668ee682be93b6a671bbc", 0x8a, 0x3}], 0x2000400, &(0x7f0000000440)={[{@balloc_no_unhash_reloc}, {@nolargeio}, {@grpjquota}], [{@obj_role={'obj_role', 0x3d, '^'}}, {@hash}, {@uid_lt}, {@mask={'mask', 0x3d, 'MAY_EXEC'}}, {@uid_lt={'uid<', 0xee00}}, {@smackfsfloor={'smackfsfloor', 0x3d, ':%#[@'}}, {@obj_user={'obj_user', 0x3d, ',\\*),i'}}, {@uid_eq={'uid', 0x3d, 0xee00}}, {@seclabel}, {@uid_lt={'uid<', 0xee00}}]}) [ 372.683195][T16724] REISERFS warning (device loop3): super-6502 reiserfs_getopt: unknown mount option "obj_role=^" [ 372.740071][T16727] loop1: detected capacity change from 0 to 64 [ 372.767985][T16728] REISERFS warning (device loop0): super-6502 reiserfs_getopt: unknown mount option "obj_role=^" 06:19:30 executing program 3: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800004, 0x12, r0, 0x0) preadv(0xffffffffffffffff, &(0x7f00000001c0)=[{0x0}], 0x1, 0x9, 0x0) mmap(&(0x7f0000000000/0xa000)=nil, 0xa000, 0x2, 0x2172, 0xffffffffffffffff, 0x0) syz_mount_image$reiserfs(&(0x7f0000000140), &(0x7f0000000180)='./file0\x00', 0x0, 0x0, &(0x7f0000000300), 0x0, &(0x7f0000000440)={[{@balloc_no_unhash_reloc}], [{@obj_role={'obj_role', 0x3d, '^'}}, {@hash}, {@uid_lt}, {@mask={'mask', 0x3d, 'MAY_EXEC'}}, {@uid_lt={'uid<', 0xee00}}, {@smackfsfloor={'smackfsfloor', 0x3d, ':%#[@'}}, {@obj_user={'obj_user', 0x3d, ',\\*),i'}}, {@uid_eq={'uid', 0x3d, 0xee00}}, {@seclabel}, {@uid_lt={'uid<', 0xee00}}]}) 06:19:30 executing program 1: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800004, 0x12, r0, 0x0) preadv(0xffffffffffffffff, &(0x7f00000001c0)=[{0x0}], 0x1, 0x9, 0x0) mmap(&(0x7f0000000000/0xa000)=nil, 0xa000, 0x2, 0x2172, 0xffffffffffffffff, 0x0) syz_mount_image$reiserfs(0x0, &(0x7f0000000180)='./file0\x00', 0x8000, 0x3, &(0x7f0000000300)=[{&(0x7f0000000540)="21d37ef07e82e237fbe1b40158d20e242c5ea1f9d9edc6b9395250085d6dfa486982e82d4ce1a5e2bc00d29383bae640de", 0x31, 0x7}, {&(0x7f0000000240)="c43f281f483aa6cd83e40e59d53f177299d285bbe5d90aab2b56a76f9db49d86afa5a0f601ba9b3502de5f3724f3ec00927151f928f668b362052950a2e8f16baec29875fdad59395e86a1050c368933e3ed5a17d76bd7bded793436ea207885f395ace3fc12126c205b170be392c1645233ef01f9661090706a65f63b4845dc2884a20711a8024ad4af44aeec9db33991dae38d95cdb7132970d0d4dec58b9d46d378", 0xa3, 0x6}, {&(0x7f0000000380)="05f82c760d277896dd8c9891a41aafe24124891a32a238c3c78696d112aa09f3ae5c54b0c08676da5db7f358c72dfaca9a5d90860b4ae363c9a921c47965d339c23408a6d9b31a23aee27822f0a140d8e4ec9475a740113f2b9923b46333110e528e0a513151aad34aee1b5310fcf62c1982349253003d6d53aebbe09cf5918668ee682be93b6a671bbc", 0x8a, 0x3}], 0x2000400, &(0x7f0000000440)={[{@balloc_no_unhash_reloc}, {@nolargeio}, {@grpjquota}], [{@obj_role={'obj_role', 0x3d, '^'}}, {@hash}, {@uid_lt}, {@mask={'mask', 0x3d, 'MAY_EXEC'}}, {@uid_lt={'uid<', 0xee00}}, {@smackfsfloor={'smackfsfloor', 0x3d, ':%#[@'}}, {@obj_user={'obj_user', 0x3d, ',\\*),i'}}, {@uid_eq={'uid', 0x3d, 0xee00}}, {@seclabel}, {@uid_lt={'uid<', 0xee00}}]}) [ 372.887874][T16735] REISERFS warning (device loop3): super-6502 reiserfs_getopt: unknown mount option "obj_role=^" 06:19:30 executing program 0: r0 = openat(0xffffffffffffffff, 0x0, 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800004, 0x12, r0, 0x0) preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x9, 0x0) syz_mount_image$reiserfs(&(0x7f0000000140), &(0x7f0000000180)='./file0\x00', 0x0, 0x0, &(0x7f0000000300), 0x0, &(0x7f0000000440)={[{@balloc_no_unhash_reloc}], [{@obj_role={'obj_role', 0x3d, '^'}}, {@hash}, {@uid_lt}, {@mask={'mask', 0x3d, 'MAY_EXEC'}}, {@uid_lt={'uid<', 0xee00}}, {@smackfsfloor={'smackfsfloor', 0x3d, ':%#[@'}}, {@obj_user={'obj_user', 0x3d, ',\\*),i'}}, {@uid_eq={'uid', 0x3d, 0xee00}}, {@seclabel}, {@uid_lt={'uid<', 0xee00}}]}) [ 372.949602][T16742] REISERFS warning (device loop0): super-6502 reiserfs_getopt: unknown mount option "obj_role=^" 06:19:30 executing program 3: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800004, 0x12, r0, 0x0) preadv(0xffffffffffffffff, &(0x7f00000001c0)=[{0x0}], 0x1, 0x9, 0x0) mmap(&(0x7f0000000000/0xa000)=nil, 0xa000, 0x2, 0x2172, 0xffffffffffffffff, 0x0) syz_mount_image$reiserfs(&(0x7f0000000140), &(0x7f0000000180)='./file0\x00', 0x0, 0x0, &(0x7f0000000300), 0x0, &(0x7f0000000440)={[{@balloc_no_unhash_reloc}], [{@obj_role={'obj_role', 0x3d, '^'}}, {@hash}, {@uid_lt}, {@mask={'mask', 0x3d, 'MAY_EXEC'}}, {@uid_lt={'uid<', 0xee00}}, {@smackfsfloor={'smackfsfloor', 0x3d, ':%#[@'}}, {@obj_user={'obj_user', 0x3d, ',\\*),i'}}, {@uid_eq={'uid', 0x3d, 0xee00}}, {@seclabel}, {@uid_lt={'uid<', 0xee00}}]}) [ 373.021620][T16748] loop1: detected capacity change from 0 to 64 [ 373.250106][T16755] REISERFS warning (device loop3): super-6502 reiserfs_getopt: unknown mount option "obj_role=^" 06:19:31 executing program 0: r0 = openat(0xffffffffffffffff, 0x0, 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800004, 0x12, r0, 0x0) preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x9, 0x0) syz_mount_image$reiserfs(&(0x7f0000000140), &(0x7f0000000180)='./file0\x00', 0x0, 0x0, &(0x7f0000000300), 0x0, &(0x7f0000000440)={[{@balloc_no_unhash_reloc}], [{@obj_role={'obj_role', 0x3d, '^'}}, {@hash}, {@uid_lt}, {@mask={'mask', 0x3d, 'MAY_EXEC'}}, {@uid_lt={'uid<', 0xee00}}, {@smackfsfloor={'smackfsfloor', 0x3d, ':%#[@'}}, {@obj_user={'obj_user', 0x3d, ',\\*),i'}}, {@uid_eq={'uid', 0x3d, 0xee00}}, {@seclabel}, {@uid_lt={'uid<', 0xee00}}]}) 06:19:31 executing program 2: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800004, 0x12, r0, 0x0) preadv(0xffffffffffffffff, &(0x7f00000001c0)=[{0x0}], 0x1, 0x9, 0x0) r1 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r1, &(0x7f0000000380)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x80, 0x1, 0x9, 0x1, 0x2, 0x3e, 0x7ff, 0x1f2, 0x40, 0x1f4, 0xbfa, 0x3, 0x38, 0x1, 0x5, 0x4, 0x4}, [{0x5, 0x9, 0x6, 0x101, 0x6, 0x4, 0x9, 0x6}, {0x5, 0x3, 0x5e61, 0x80000000, 0xcc3, 0x9, 0x7, 0x8}], "d1660f10e0ac4a6edbf3aa53803c8f57ef2a12069e82553332d2b96d67f2dbc5b04959dad57c303d876233684f5e9ad402a193da791e11122f2cccbf10d6d499f5e16385d09f63891a965d80bcb68b551fabffb4bf0b5c372b4d69cdefac988201a40429a8d0dc699820193afcab08070fde89c22e16b43dde5e37d9a3df0cd352e8667f163774d9dc3c79571e5100046281", ['\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00']}, 0x842) 06:19:31 executing program 1: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800004, 0x12, r0, 0x0) preadv(0xffffffffffffffff, &(0x7f00000001c0)=[{0x0}], 0x1, 0x9, 0x0) mmap(&(0x7f0000000000/0xa000)=nil, 0xa000, 0x2, 0x2172, 0xffffffffffffffff, 0x0) syz_mount_image$reiserfs(0x0, &(0x7f0000000180)='./file0\x00', 0x8000, 0x3, &(0x7f0000000300)=[{&(0x7f0000000540)="21d37ef07e82e237fbe1b40158d20e242c5ea1f9d9edc6b9395250085d6dfa486982e82d4ce1a5e2bc00d29383bae640de", 0x31, 0x7}, {&(0x7f0000000240)="c43f281f483aa6cd83e40e59d53f177299d285bbe5d90aab2b56a76f9db49d86afa5a0f601ba9b3502de5f3724f3ec00927151f928f668b362052950a2e8f16baec29875fdad59395e86a1050c368933e3ed5a17d76bd7bded793436ea207885f395ace3fc12126c205b170be392c1645233ef01f9661090706a65f63b4845dc2884a20711a8024ad4af44aeec9db33991dae38d95cdb7132970d0d4dec58b9d46d378", 0xa3, 0x6}, {&(0x7f0000000380)="05f82c760d277896dd8c9891a41aafe24124891a32a238c3c78696d112aa09f3ae5c54b0c08676da5db7f358c72dfaca9a5d90860b4ae363c9a921c47965d339c23408a6d9b31a23aee27822f0a140d8e4ec9475a740113f2b9923b46333110e528e0a513151aad34aee1b5310fcf62c1982349253003d6d53aebbe09cf5918668ee682be93b6a671bbc", 0x8a, 0x3}], 0x2000400, &(0x7f0000000440)={[{@balloc_no_unhash_reloc}, {@nolargeio}, {@grpjquota}], [{@obj_role={'obj_role', 0x3d, '^'}}, {@hash}, {@uid_lt}, {@mask={'mask', 0x3d, 'MAY_EXEC'}}, {@uid_lt={'uid<', 0xee00}}, {@smackfsfloor={'smackfsfloor', 0x3d, ':%#[@'}}, {@obj_user={'obj_user', 0x3d, ',\\*),i'}}, {@uid_eq={'uid', 0x3d, 0xee00}}, {@seclabel}, {@uid_lt={'uid<', 0xee00}}]}) 06:19:31 executing program 3: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800004, 0x12, r0, 0x0) preadv(0xffffffffffffffff, &(0x7f00000001c0)=[{0x0}], 0x1, 0x9, 0x0) mmap(&(0x7f0000000000/0xa000)=nil, 0xa000, 0x2, 0x2172, 0xffffffffffffffff, 0x0) syz_mount_image$reiserfs(&(0x7f0000000140), &(0x7f0000000180)='./file0\x00', 0x0, 0x0, &(0x7f0000000300), 0x0, &(0x7f0000000440)={[{@balloc_no_unhash_reloc}], [{@obj_role={'obj_role', 0x3d, '^'}}, {@hash}, {@uid_lt}, {@mask={'mask', 0x3d, 'MAY_EXEC'}}, {@uid_lt={'uid<', 0xee00}}, {@smackfsfloor={'smackfsfloor', 0x3d, ':%#[@'}}, {@obj_user={'obj_user', 0x3d, ',\\*),i'}}, {@uid_eq={'uid', 0x3d, 0xee00}}, {@seclabel}, {@uid_lt={'uid<', 0xee00}}]}) [ 373.541889][T16763] loop1: detected capacity change from 0 to 64 [ 373.584016][T16768] REISERFS warning (device loop3): super-6502 reiserfs_getopt: unknown mount option "obj_role=^" [ 373.588183][T16767] REISERFS warning (device loop0): super-6502 reiserfs_getopt: unknown mount option "obj_role=^" 06:19:31 executing program 1: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800004, 0x12, r0, 0x0) preadv(0xffffffffffffffff, &(0x7f00000001c0)=[{0x0}], 0x1, 0x9, 0x0) mmap(&(0x7f0000000000/0xa000)=nil, 0xa000, 0x2, 0x2172, 0xffffffffffffffff, 0x0) syz_mount_image$reiserfs(0x0, &(0x7f0000000180)='./file0\x00', 0x8000, 0x3, &(0x7f0000000300)=[{&(0x7f0000000540)="21d37ef07e82e237fbe1b40158d20e242c5ea1f9d9edc6b9395250085d6dfa486982e82d4ce1a5e2bc00d29383bae640de", 0x31, 0x7}, {&(0x7f0000000240)="c43f281f483aa6cd83e40e59d53f177299d285bbe5d90aab2b56a76f9db49d86afa5a0f601ba9b3502de5f3724f3ec00927151f928f668b362052950a2e8f16baec29875fdad59395e86a1050c368933e3ed5a17d76bd7bded793436ea207885f395ace3fc12126c205b170be392c1645233ef01f9661090706a65f63b4845dc2884a20711a8024ad4af44aeec9db33991dae38d95cdb7132970d0d4dec58b9d46d378", 0xa3, 0x6}, {&(0x7f0000000380)="05f82c760d277896dd8c9891a41aafe24124891a32a238c3c78696d112aa09f3ae5c54b0c08676da5db7f358c72dfaca9a5d90860b4ae363c9a921c47965d339c23408a6d9b31a23aee27822f0a140d8e4ec9475a740113f2b9923b46333110e528e0a513151aad34aee1b5310fcf62c1982349253003d6d53aebbe09cf5918668ee682be93b6a671bbc", 0x8a, 0x3}], 0x2000400, &(0x7f0000000440)={[{@balloc_no_unhash_reloc}, {@nolargeio}, {@grpjquota}], [{@obj_role={'obj_role', 0x3d, '^'}}, {@hash}, {@uid_lt}, {@mask={'mask', 0x3d, 'MAY_EXEC'}}, {@uid_lt={'uid<', 0xee00}}, {@smackfsfloor={'smackfsfloor', 0x3d, ':%#[@'}}, {@obj_user={'obj_user', 0x3d, ',\\*),i'}}, {@uid_eq={'uid', 0x3d, 0xee00}}, {@seclabel}, {@uid_lt={'uid<', 0xee00}}]}) 06:19:31 executing program 0: r0 = openat(0xffffffffffffffff, 0x0, 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800004, 0x12, r0, 0x0) preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x9, 0x0) syz_mount_image$reiserfs(&(0x7f0000000140), &(0x7f0000000180)='./file0\x00', 0x0, 0x0, &(0x7f0000000300), 0x0, &(0x7f0000000440)={[{@balloc_no_unhash_reloc}], [{@obj_role={'obj_role', 0x3d, '^'}}, {@hash}, {@uid_lt}, {@mask={'mask', 0x3d, 'MAY_EXEC'}}, {@uid_lt={'uid<', 0xee00}}, {@smackfsfloor={'smackfsfloor', 0x3d, ':%#[@'}}, {@obj_user={'obj_user', 0x3d, ',\\*),i'}}, {@uid_eq={'uid', 0x3d, 0xee00}}, {@seclabel}, {@uid_lt={'uid<', 0xee00}}]}) 06:19:31 executing program 3: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800004, 0x12, r0, 0x0) preadv(r0, 0x0, 0x0, 0x9, 0x0) mmap(&(0x7f0000000000/0xa000)=nil, 0xa000, 0x2, 0x2172, 0xffffffffffffffff, 0x0) syz_mount_image$reiserfs(&(0x7f0000000140), &(0x7f0000000180)='./file0\x00', 0x0, 0x0, &(0x7f0000000300), 0x0, &(0x7f0000000440)={[{@balloc_no_unhash_reloc}], [{@obj_role={'obj_role', 0x3d, '^'}}, {@hash}, {@uid_lt}, {@mask={'mask', 0x3d, 'MAY_EXEC'}}, {@uid_lt={'uid<', 0xee00}}, {@smackfsfloor={'smackfsfloor', 0x3d, ':%#[@'}}, {@obj_user={'obj_user', 0x3d, ',\\*),i'}}, {@uid_eq={'uid', 0x3d, 0xee00}}, {@seclabel}, {@uid_lt={'uid<', 0xee00}}]}) [ 373.789651][T16778] loop1: detected capacity change from 0 to 64 [ 373.844187][T16784] REISERFS warning (device loop3): super-6502 reiserfs_getopt: unknown mount option "obj_role=^" [ 373.852129][T16783] REISERFS warning (device loop0): super-6502 reiserfs_getopt: unknown mount option "obj_role=^" 06:19:31 executing program 1: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800004, 0x12, r0, 0x0) preadv(r0, 0x0, 0x0, 0x9, 0x0) mmap(&(0x7f0000000000/0xa000)=nil, 0xa000, 0x2, 0x2172, 0xffffffffffffffff, 0x0) syz_mount_image$reiserfs(0x0, &(0x7f0000000180)='./file0\x00', 0x8000, 0x3, &(0x7f0000000300)=[{&(0x7f0000000540)="21d37ef07e82e237fbe1b40158d20e242c5ea1f9d9edc6b9395250085d6dfa486982e82d4ce1a5e2bc00d29383bae640de", 0x31, 0x7}, {&(0x7f0000000240)="c43f281f483aa6cd83e40e59d53f177299d285bbe5d90aab2b56a76f9db49d86afa5a0f601ba9b3502de5f3724f3ec00927151f928f668b362052950a2e8f16baec29875fdad59395e86a1050c368933e3ed5a17d76bd7bded793436ea207885f395ace3fc12126c205b170be392c1645233ef01f9661090706a65f63b4845dc2884a20711a8024ad4af44aeec9db33991dae38d95cdb7132970d0d4dec58b9d46d378", 0xa3, 0x6}, {&(0x7f0000000380)="05f82c760d277896dd8c9891a41aafe24124891a32a238c3c78696d112aa09f3ae5c54b0c08676da5db7f358c72dfaca9a5d90860b4ae363c9a921c47965d339c23408a6d9b31a23aee27822f0a140d8e4ec9475a740113f2b9923b46333110e528e0a513151aad34aee1b5310fcf62c1982349253003d6d53aebbe09cf5918668ee682be93b6a671bbc", 0x8a, 0x3}], 0x2000400, &(0x7f0000000440)={[{@balloc_no_unhash_reloc}, {@nolargeio}, {@grpjquota}], [{@obj_role={'obj_role', 0x3d, '^'}}, {@hash}, {@uid_lt}, {@mask={'mask', 0x3d, 'MAY_EXEC'}}, {@uid_lt={'uid<', 0xee00}}, {@smackfsfloor={'smackfsfloor', 0x3d, ':%#[@'}}, {@obj_user={'obj_user', 0x3d, ',\\*),i'}}, {@uid_eq={'uid', 0x3d, 0xee00}}, {@seclabel}, {@uid_lt={'uid<', 0xee00}}]}) 06:19:31 executing program 3: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800004, 0x12, r0, 0x0) preadv(r0, 0x0, 0x0, 0x9, 0x0) mmap(&(0x7f0000000000/0xa000)=nil, 0xa000, 0x2, 0x2172, 0xffffffffffffffff, 0x0) syz_mount_image$reiserfs(&(0x7f0000000140), &(0x7f0000000180)='./file0\x00', 0x0, 0x0, &(0x7f0000000300), 0x0, &(0x7f0000000440)={[{@balloc_no_unhash_reloc}], [{@obj_role={'obj_role', 0x3d, '^'}}, {@hash}, {@uid_lt}, {@mask={'mask', 0x3d, 'MAY_EXEC'}}, {@uid_lt={'uid<', 0xee00}}, {@smackfsfloor={'smackfsfloor', 0x3d, ':%#[@'}}, {@obj_user={'obj_user', 0x3d, ',\\*),i'}}, {@uid_eq={'uid', 0x3d, 0xee00}}, {@seclabel}, {@uid_lt={'uid<', 0xee00}}]}) [ 374.010176][T16797] loop1: detected capacity change from 0 to 64 [ 374.010499][T16794] REISERFS warning (device loop3): super-6502 reiserfs_getopt: unknown mount option "obj_role=^" 06:19:32 executing program 2: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800004, 0x12, r0, 0x0) preadv(0xffffffffffffffff, &(0x7f00000001c0)=[{0x0}], 0x1, 0x9, 0x0) r1 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r1, &(0x7f0000000380)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x80, 0x1, 0x9, 0x1, 0x2, 0x3e, 0x7ff, 0x1f2, 0x40, 0x1f4, 0xbfa, 0x3, 0x38, 0x1, 0x5, 0x4, 0x4}, [{0x5, 0x9, 0x6, 0x101, 0x6, 0x4, 0x9, 0x6}, {0x5, 0x3, 0x5e61, 0x80000000, 0xcc3, 0x9, 0x7, 0x8}], "d1660f10e0ac4a6edbf3aa53803c8f57ef2a12069e82553332d2b96d67f2dbc5b04959dad57c303d876233684f5e9ad402a193da791e11122f2cccbf10d6d499f5e16385d09f63891a965d80bcb68b551fabffb4bf0b5c372b4d69cdefac988201a40429a8d0dc699820193afcab08070fde89c22e16b43dde5e37d9a3df0cd352e8667f163774d9dc3c79571e5100046281", ['\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00']}, 0x842) 06:19:32 executing program 0: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x0, 0x12, r0, 0x0) preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x9, 0x0) syz_mount_image$reiserfs(&(0x7f0000000140), &(0x7f0000000180)='./file0\x00', 0x0, 0x0, &(0x7f0000000300), 0x0, &(0x7f0000000440)={[{@balloc_no_unhash_reloc}], [{@obj_role={'obj_role', 0x3d, '^'}}, {@hash}, {@uid_lt}, {@mask={'mask', 0x3d, 'MAY_EXEC'}}, {@uid_lt={'uid<', 0xee00}}, {@smackfsfloor={'smackfsfloor', 0x3d, ':%#[@'}}, {@obj_user={'obj_user', 0x3d, ',\\*),i'}}, {@uid_eq={'uid', 0x3d, 0xee00}}, {@seclabel}, {@uid_lt={'uid<', 0xee00}}]}) 06:19:32 executing program 1: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800004, 0x12, r0, 0x0) preadv(r0, 0x0, 0x0, 0x9, 0x0) mmap(&(0x7f0000000000/0xa000)=nil, 0xa000, 0x2, 0x2172, 0xffffffffffffffff, 0x0) syz_mount_image$reiserfs(0x0, &(0x7f0000000180)='./file0\x00', 0x8000, 0x3, &(0x7f0000000300)=[{&(0x7f0000000540)="21d37ef07e82e237fbe1b40158d20e242c5ea1f9d9edc6b9395250085d6dfa486982e82d4ce1a5e2bc00d29383bae640de", 0x31, 0x7}, {&(0x7f0000000240)="c43f281f483aa6cd83e40e59d53f177299d285bbe5d90aab2b56a76f9db49d86afa5a0f601ba9b3502de5f3724f3ec00927151f928f668b362052950a2e8f16baec29875fdad59395e86a1050c368933e3ed5a17d76bd7bded793436ea207885f395ace3fc12126c205b170be392c1645233ef01f9661090706a65f63b4845dc2884a20711a8024ad4af44aeec9db33991dae38d95cdb7132970d0d4dec58b9d46d378", 0xa3, 0x6}, {&(0x7f0000000380)="05f82c760d277896dd8c9891a41aafe24124891a32a238c3c78696d112aa09f3ae5c54b0c08676da5db7f358c72dfaca9a5d90860b4ae363c9a921c47965d339c23408a6d9b31a23aee27822f0a140d8e4ec9475a740113f2b9923b46333110e528e0a513151aad34aee1b5310fcf62c1982349253003d6d53aebbe09cf5918668ee682be93b6a671bbc", 0x8a, 0x3}], 0x2000400, &(0x7f0000000440)={[{@balloc_no_unhash_reloc}, {@nolargeio}, {@grpjquota}], [{@obj_role={'obj_role', 0x3d, '^'}}, {@hash}, {@uid_lt}, {@mask={'mask', 0x3d, 'MAY_EXEC'}}, {@uid_lt={'uid<', 0xee00}}, {@smackfsfloor={'smackfsfloor', 0x3d, ':%#[@'}}, {@obj_user={'obj_user', 0x3d, ',\\*),i'}}, {@uid_eq={'uid', 0x3d, 0xee00}}, {@seclabel}, {@uid_lt={'uid<', 0xee00}}]}) 06:19:32 executing program 3: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800004, 0x12, r0, 0x0) preadv(r0, 0x0, 0x0, 0x9, 0x0) mmap(&(0x7f0000000000/0xa000)=nil, 0xa000, 0x2, 0x2172, 0xffffffffffffffff, 0x0) syz_mount_image$reiserfs(&(0x7f0000000140), &(0x7f0000000180)='./file0\x00', 0x0, 0x0, &(0x7f0000000300), 0x0, &(0x7f0000000440)={[{@balloc_no_unhash_reloc}], [{@obj_role={'obj_role', 0x3d, '^'}}, {@hash}, {@uid_lt}, {@mask={'mask', 0x3d, 'MAY_EXEC'}}, {@uid_lt={'uid<', 0xee00}}, {@smackfsfloor={'smackfsfloor', 0x3d, ':%#[@'}}, {@obj_user={'obj_user', 0x3d, ',\\*),i'}}, {@uid_eq={'uid', 0x3d, 0xee00}}, {@seclabel}, {@uid_lt={'uid<', 0xee00}}]}) [ 374.496126][T16808] loop1: detected capacity change from 0 to 64 06:19:32 executing program 1: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800004, 0x12, r0, 0x0) preadv(r0, 0x0, 0x0, 0x9, 0x0) mmap(&(0x7f0000000000/0xa000)=nil, 0xa000, 0x2, 0x2172, 0xffffffffffffffff, 0x0) syz_mount_image$reiserfs(0x0, &(0x7f0000000180)='./file0\x00', 0x8000, 0x3, &(0x7f0000000300)=[{&(0x7f0000000540)="21d37ef07e82e237fbe1b40158d20e242c5ea1f9d9edc6b9395250085d6dfa486982e82d4ce1a5e2bc00d29383bae640de", 0x31, 0x7}, {&(0x7f0000000240)="c43f281f483aa6cd83e40e59d53f177299d285bbe5d90aab2b56a76f9db49d86afa5a0f601ba9b3502de5f3724f3ec00927151f928f668b362052950a2e8f16baec29875fdad59395e86a1050c368933e3ed5a17d76bd7bded793436ea207885f395ace3fc12126c205b170be392c1645233ef01f9661090706a65f63b4845dc2884a20711a8024ad4af44aeec9db33991dae38d95cdb7132970d0d4dec58b9d46d378", 0xa3, 0x6}, {&(0x7f0000000380)="05f82c760d277896dd8c9891a41aafe24124891a32a238c3c78696d112aa09f3ae5c54b0c08676da5db7f358c72dfaca9a5d90860b4ae363c9a921c47965d339c23408a6d9b31a23aee27822f0a140d8e4ec9475a740113f2b9923b46333110e528e0a513151aad34aee1b5310fcf62c1982349253003d6d53aebbe09cf5918668ee682be93b6a671bbc", 0x8a, 0x3}], 0x2000400, &(0x7f0000000440)={[{@balloc_no_unhash_reloc}, {@nolargeio}, {@grpjquota}], [{@obj_role={'obj_role', 0x3d, '^'}}, {@hash}, {@uid_lt}, {@mask={'mask', 0x3d, 'MAY_EXEC'}}, {@uid_lt={'uid<', 0xee00}}, {@smackfsfloor={'smackfsfloor', 0x3d, ':%#[@'}}, {@obj_user={'obj_user', 0x3d, ',\\*),i'}}, {@uid_eq={'uid', 0x3d, 0xee00}}, {@seclabel}, {@uid_lt={'uid<', 0xee00}}]}) [ 374.634654][T16813] REISERFS warning (device loop3): super-6502 reiserfs_getopt: unknown mount option "obj_role=^" 06:19:32 executing program 0: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x0, 0x12, r0, 0x0) preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x9, 0x0) syz_mount_image$reiserfs(&(0x7f0000000140), &(0x7f0000000180)='./file0\x00', 0x0, 0x0, &(0x7f0000000300), 0x0, &(0x7f0000000440)={[{@balloc_no_unhash_reloc}], [{@obj_role={'obj_role', 0x3d, '^'}}, {@hash}, {@uid_lt}, {@mask={'mask', 0x3d, 'MAY_EXEC'}}, {@uid_lt={'uid<', 0xee00}}, {@smackfsfloor={'smackfsfloor', 0x3d, ':%#[@'}}, {@obj_user={'obj_user', 0x3d, ',\\*),i'}}, {@uid_eq={'uid', 0x3d, 0xee00}}, {@seclabel}, {@uid_lt={'uid<', 0xee00}}]}) 06:19:32 executing program 3: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800004, 0x12, r0, 0x0) preadv(r0, &(0x7f00000001c0), 0x0, 0x9, 0x0) mmap(&(0x7f0000000000/0xa000)=nil, 0xa000, 0x2, 0x2172, 0xffffffffffffffff, 0x0) syz_mount_image$reiserfs(&(0x7f0000000140), &(0x7f0000000180)='./file0\x00', 0x0, 0x0, &(0x7f0000000300), 0x0, &(0x7f0000000440)={[{@balloc_no_unhash_reloc}], [{@obj_role={'obj_role', 0x3d, '^'}}, {@hash}, {@uid_lt}, {@mask={'mask', 0x3d, 'MAY_EXEC'}}, {@uid_lt={'uid<', 0xee00}}, {@smackfsfloor={'smackfsfloor', 0x3d, ':%#[@'}}, {@obj_user={'obj_user', 0x3d, ',\\*),i'}}, {@uid_eq={'uid', 0x3d, 0xee00}}, {@seclabel}, {@uid_lt={'uid<', 0xee00}}]}) [ 374.780693][T16821] loop1: detected capacity change from 0 to 64 06:19:32 executing program 0: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x0, 0x12, r0, 0x0) preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x9, 0x0) syz_mount_image$reiserfs(&(0x7f0000000140), &(0x7f0000000180)='./file0\x00', 0x0, 0x0, &(0x7f0000000300), 0x0, &(0x7f0000000440)={[{@balloc_no_unhash_reloc}], [{@obj_role={'obj_role', 0x3d, '^'}}, {@hash}, {@uid_lt}, {@mask={'mask', 0x3d, 'MAY_EXEC'}}, {@uid_lt={'uid<', 0xee00}}, {@smackfsfloor={'smackfsfloor', 0x3d, ':%#[@'}}, {@obj_user={'obj_user', 0x3d, ',\\*),i'}}, {@uid_eq={'uid', 0x3d, 0xee00}}, {@seclabel}, {@uid_lt={'uid<', 0xee00}}]}) [ 374.872311][T16830] REISERFS warning (device loop3): super-6502 reiserfs_getopt: unknown mount option "obj_role=^" 06:19:33 executing program 2: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800004, 0x12, r0, 0x0) preadv(0xffffffffffffffff, &(0x7f00000001c0)=[{0x0}], 0x1, 0x9, 0x0) r1 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r1, &(0x7f0000000380)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x80, 0x1, 0x9, 0x1, 0x2, 0x3e, 0x7ff, 0x1f2, 0x40, 0x1f4, 0xbfa, 0x3, 0x38, 0x1, 0x5, 0x4, 0x4}, [{0x5, 0x9, 0x6, 0x101, 0x6, 0x4, 0x9, 0x6}, {0x5, 0x3, 0x5e61, 0x80000000, 0xcc3, 0x9, 0x7, 0x8}], "d1660f10e0ac4a6edbf3aa53803c8f57ef2a12069e82553332d2b96d67f2dbc5b04959dad57c303d876233684f5e9ad402a193da791e11122f2cccbf10d6d499f5e16385d09f63891a965d80bcb68b551fabffb4bf0b5c372b4d69cdefac988201a40429a8d0dc699820193afcab08070fde89c22e16b43dde5e37d9a3df0cd352e8667f163774d9dc3c79571e5100046281", ['\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00']}, 0x842) 06:19:33 executing program 1: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800004, 0x12, r0, 0x0) preadv(r0, &(0x7f00000001c0), 0x0, 0x9, 0x0) mmap(&(0x7f0000000000/0xa000)=nil, 0xa000, 0x2, 0x2172, 0xffffffffffffffff, 0x0) syz_mount_image$reiserfs(0x0, &(0x7f0000000180)='./file0\x00', 0x8000, 0x3, &(0x7f0000000300)=[{&(0x7f0000000540)="21d37ef07e82e237fbe1b40158d20e242c5ea1f9d9edc6b9395250085d6dfa486982e82d4ce1a5e2bc00d29383bae640de", 0x31, 0x7}, {&(0x7f0000000240)="c43f281f483aa6cd83e40e59d53f177299d285bbe5d90aab2b56a76f9db49d86afa5a0f601ba9b3502de5f3724f3ec00927151f928f668b362052950a2e8f16baec29875fdad59395e86a1050c368933e3ed5a17d76bd7bded793436ea207885f395ace3fc12126c205b170be392c1645233ef01f9661090706a65f63b4845dc2884a20711a8024ad4af44aeec9db33991dae38d95cdb7132970d0d4dec58b9d46d378", 0xa3, 0x6}, {&(0x7f0000000380)="05f82c760d277896dd8c9891a41aafe24124891a32a238c3c78696d112aa09f3ae5c54b0c08676da5db7f358c72dfaca9a5d90860b4ae363c9a921c47965d339c23408a6d9b31a23aee27822f0a140d8e4ec9475a740113f2b9923b46333110e528e0a513151aad34aee1b5310fcf62c1982349253003d6d53aebbe09cf5918668ee682be93b6a671bbc", 0x8a, 0x3}], 0x2000400, &(0x7f0000000440)={[{@balloc_no_unhash_reloc}, {@nolargeio}, {@grpjquota}], [{@obj_role={'obj_role', 0x3d, '^'}}, {@hash}, {@uid_lt}, {@mask={'mask', 0x3d, 'MAY_EXEC'}}, {@uid_lt={'uid<', 0xee00}}, {@smackfsfloor={'smackfsfloor', 0x3d, ':%#[@'}}, {@obj_user={'obj_user', 0x3d, ',\\*),i'}}, {@uid_eq={'uid', 0x3d, 0xee00}}, {@seclabel}, {@uid_lt={'uid<', 0xee00}}]}) 06:19:33 executing program 3: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800004, 0x12, r0, 0x0) preadv(r0, &(0x7f00000001c0), 0x0, 0x9, 0x0) mmap(&(0x7f0000000000/0xa000)=nil, 0xa000, 0x2, 0x2172, 0xffffffffffffffff, 0x0) syz_mount_image$reiserfs(&(0x7f0000000140), &(0x7f0000000180)='./file0\x00', 0x0, 0x0, &(0x7f0000000300), 0x0, &(0x7f0000000440)={[{@balloc_no_unhash_reloc}], [{@obj_role={'obj_role', 0x3d, '^'}}, {@hash}, {@uid_lt}, {@mask={'mask', 0x3d, 'MAY_EXEC'}}, {@uid_lt={'uid<', 0xee00}}, {@smackfsfloor={'smackfsfloor', 0x3d, ':%#[@'}}, {@obj_user={'obj_user', 0x3d, ',\\*),i'}}, {@uid_eq={'uid', 0x3d, 0xee00}}, {@seclabel}, {@uid_lt={'uid<', 0xee00}}]}) 06:19:33 executing program 0: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800004, 0x10, r0, 0x0) preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x9, 0x0) syz_mount_image$reiserfs(&(0x7f0000000140), &(0x7f0000000180)='./file0\x00', 0x0, 0x0, &(0x7f0000000300), 0x0, &(0x7f0000000440)={[{@balloc_no_unhash_reloc}], [{@obj_role={'obj_role', 0x3d, '^'}}, {@hash}, {@uid_lt}, {@mask={'mask', 0x3d, 'MAY_EXEC'}}, {@uid_lt={'uid<', 0xee00}}, {@smackfsfloor={'smackfsfloor', 0x3d, ':%#[@'}}, {@obj_user={'obj_user', 0x3d, ',\\*),i'}}, {@uid_eq={'uid', 0x3d, 0xee00}}, {@seclabel}, {@uid_lt={'uid<', 0xee00}}]}) [ 375.445780][T16847] REISERFS warning (device loop0): super-6502 reiserfs_getopt: unknown mount option "obj_role=^" [ 375.459213][T16849] loop1: detected capacity change from 0 to 64 [ 375.472535][T16846] REISERFS warning (device loop3): super-6502 reiserfs_getopt: unknown mount option "obj_role=^" 06:19:33 executing program 1: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800004, 0x12, r0, 0x0) preadv(r0, &(0x7f00000001c0), 0x0, 0x9, 0x0) mmap(&(0x7f0000000000/0xa000)=nil, 0xa000, 0x2, 0x2172, 0xffffffffffffffff, 0x0) syz_mount_image$reiserfs(0x0, &(0x7f0000000180)='./file0\x00', 0x8000, 0x3, &(0x7f0000000300)=[{&(0x7f0000000540)="21d37ef07e82e237fbe1b40158d20e242c5ea1f9d9edc6b9395250085d6dfa486982e82d4ce1a5e2bc00d29383bae640de", 0x31, 0x7}, {&(0x7f0000000240)="c43f281f483aa6cd83e40e59d53f177299d285bbe5d90aab2b56a76f9db49d86afa5a0f601ba9b3502de5f3724f3ec00927151f928f668b362052950a2e8f16baec29875fdad59395e86a1050c368933e3ed5a17d76bd7bded793436ea207885f395ace3fc12126c205b170be392c1645233ef01f9661090706a65f63b4845dc2884a20711a8024ad4af44aeec9db33991dae38d95cdb7132970d0d4dec58b9d46d378", 0xa3, 0x6}, {&(0x7f0000000380)="05f82c760d277896dd8c9891a41aafe24124891a32a238c3c78696d112aa09f3ae5c54b0c08676da5db7f358c72dfaca9a5d90860b4ae363c9a921c47965d339c23408a6d9b31a23aee27822f0a140d8e4ec9475a740113f2b9923b46333110e528e0a513151aad34aee1b5310fcf62c1982349253003d6d53aebbe09cf5918668ee682be93b6a671bbc", 0x8a, 0x3}], 0x2000400, &(0x7f0000000440)={[{@balloc_no_unhash_reloc}, {@nolargeio}, {@grpjquota}], [{@obj_role={'obj_role', 0x3d, '^'}}, {@hash}, {@uid_lt}, {@mask={'mask', 0x3d, 'MAY_EXEC'}}, {@uid_lt={'uid<', 0xee00}}, {@smackfsfloor={'smackfsfloor', 0x3d, ':%#[@'}}, {@obj_user={'obj_user', 0x3d, ',\\*),i'}}, {@uid_eq={'uid', 0x3d, 0xee00}}, {@seclabel}, {@uid_lt={'uid<', 0xee00}}]}) 06:19:33 executing program 0: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800004, 0x10, r0, 0x0) preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x9, 0x0) syz_mount_image$reiserfs(&(0x7f0000000140), &(0x7f0000000180)='./file0\x00', 0x0, 0x0, &(0x7f0000000300), 0x0, &(0x7f0000000440)={[{@balloc_no_unhash_reloc}], [{@obj_role={'obj_role', 0x3d, '^'}}, {@hash}, {@uid_lt}, {@mask={'mask', 0x3d, 'MAY_EXEC'}}, {@uid_lt={'uid<', 0xee00}}, {@smackfsfloor={'smackfsfloor', 0x3d, ':%#[@'}}, {@obj_user={'obj_user', 0x3d, ',\\*),i'}}, {@uid_eq={'uid', 0x3d, 0xee00}}, {@seclabel}, {@uid_lt={'uid<', 0xee00}}]}) 06:19:33 executing program 3: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800004, 0x12, r0, 0x0) preadv(r0, &(0x7f00000001c0), 0x0, 0x9, 0x0) mmap(&(0x7f0000000000/0xa000)=nil, 0xa000, 0x2, 0x2172, 0xffffffffffffffff, 0x0) syz_mount_image$reiserfs(&(0x7f0000000140), &(0x7f0000000180)='./file0\x00', 0x0, 0x0, &(0x7f0000000300), 0x0, &(0x7f0000000440)={[{@balloc_no_unhash_reloc}], [{@obj_role={'obj_role', 0x3d, '^'}}, {@hash}, {@uid_lt}, {@mask={'mask', 0x3d, 'MAY_EXEC'}}, {@uid_lt={'uid<', 0xee00}}, {@smackfsfloor={'smackfsfloor', 0x3d, ':%#[@'}}, {@obj_user={'obj_user', 0x3d, ',\\*),i'}}, {@uid_eq={'uid', 0x3d, 0xee00}}, {@seclabel}, {@uid_lt={'uid<', 0xee00}}]}) [ 375.687689][T16862] REISERFS warning (device loop0): super-6502 reiserfs_getopt: unknown mount option "obj_role=^" [ 375.719939][T16866] REISERFS warning (device loop3): super-6502 reiserfs_getopt: unknown mount option "obj_role=^" 06:19:33 executing program 1: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800004, 0x12, r0, 0x0) preadv(r0, &(0x7f00000001c0), 0x0, 0x9, 0x0) mmap(&(0x7f0000000000/0xa000)=nil, 0xa000, 0x2, 0x2172, 0xffffffffffffffff, 0x0) syz_mount_image$reiserfs(0x0, &(0x7f0000000180)='./file0\x00', 0x8000, 0x3, &(0x7f0000000300)=[{&(0x7f0000000540)="21d37ef07e82e237fbe1b40158d20e242c5ea1f9d9edc6b9395250085d6dfa486982e82d4ce1a5e2bc00d29383bae640de", 0x31, 0x7}, {&(0x7f0000000240)="c43f281f483aa6cd83e40e59d53f177299d285bbe5d90aab2b56a76f9db49d86afa5a0f601ba9b3502de5f3724f3ec00927151f928f668b362052950a2e8f16baec29875fdad59395e86a1050c368933e3ed5a17d76bd7bded793436ea207885f395ace3fc12126c205b170be392c1645233ef01f9661090706a65f63b4845dc2884a20711a8024ad4af44aeec9db33991dae38d95cdb7132970d0d4dec58b9d46d378", 0xa3, 0x6}, {&(0x7f0000000380)="05f82c760d277896dd8c9891a41aafe24124891a32a238c3c78696d112aa09f3ae5c54b0c08676da5db7f358c72dfaca9a5d90860b4ae363c9a921c47965d339c23408a6d9b31a23aee27822f0a140d8e4ec9475a740113f2b9923b46333110e528e0a513151aad34aee1b5310fcf62c1982349253003d6d53aebbe09cf5918668ee682be93b6a671bbc", 0x8a, 0x3}], 0x2000400, &(0x7f0000000440)={[{@balloc_no_unhash_reloc}, {@nolargeio}, {@grpjquota}], [{@obj_role={'obj_role', 0x3d, '^'}}, {@hash}, {@uid_lt}, {@mask={'mask', 0x3d, 'MAY_EXEC'}}, {@uid_lt={'uid<', 0xee00}}, {@smackfsfloor={'smackfsfloor', 0x3d, ':%#[@'}}, {@obj_user={'obj_user', 0x3d, ',\\*),i'}}, {@uid_eq={'uid', 0x3d, 0xee00}}, {@seclabel}, {@uid_lt={'uid<', 0xee00}}]}) [ 375.823801][T16873] loop1: detected capacity change from 0 to 64 [ 376.341604][ T5] Bluetooth: hci0: command 0x0406 tx timeout [ 376.341680][ T22] Bluetooth: hci2: command 0x0406 tx timeout [ 376.372513][ T5] Bluetooth: hci1: command 0x0406 tx timeout 06:19:33 executing program 2: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800004, 0x12, r0, 0x0) preadv(r0, 0x0, 0x0, 0x9, 0x0) r1 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r1, &(0x7f0000000380)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x80, 0x1, 0x9, 0x1, 0x2, 0x3e, 0x7ff, 0x1f2, 0x40, 0x1f4, 0xbfa, 0x3, 0x38, 0x1, 0x5, 0x4, 0x4}, [{0x5, 0x9, 0x6, 0x101, 0x6, 0x4, 0x9, 0x6}, {0x5, 0x3, 0x5e61, 0x80000000, 0xcc3, 0x9, 0x7, 0x8}], "d1660f10e0ac4a6edbf3aa53803c8f57ef2a12069e82553332d2b96d67f2dbc5b04959dad57c303d876233684f5e9ad402a193da791e11122f2cccbf10d6d499f5e16385d09f63891a965d80bcb68b551fabffb4bf0b5c372b4d69cdefac988201a40429a8d0dc699820193afcab08070fde89c22e16b43dde5e37d9a3df0cd352e8667f163774d9dc3c79571e5100046281", ['\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00']}, 0x842) 06:19:33 executing program 0: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800004, 0x10, r0, 0x0) preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x9, 0x0) syz_mount_image$reiserfs(&(0x7f0000000140), &(0x7f0000000180)='./file0\x00', 0x0, 0x0, &(0x7f0000000300), 0x0, &(0x7f0000000440)={[{@balloc_no_unhash_reloc}], [{@obj_role={'obj_role', 0x3d, '^'}}, {@hash}, {@uid_lt}, {@mask={'mask', 0x3d, 'MAY_EXEC'}}, {@uid_lt={'uid<', 0xee00}}, {@smackfsfloor={'smackfsfloor', 0x3d, ':%#[@'}}, {@obj_user={'obj_user', 0x3d, ',\\*),i'}}, {@uid_eq={'uid', 0x3d, 0xee00}}, {@seclabel}, {@uid_lt={'uid<', 0xee00}}]}) 06:19:33 executing program 1: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800004, 0x12, r0, 0x0) preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x0, 0x0) mmap(&(0x7f0000000000/0xa000)=nil, 0xa000, 0x2, 0x2172, 0xffffffffffffffff, 0x0) syz_mount_image$reiserfs(0x0, &(0x7f0000000180)='./file0\x00', 0x8000, 0x3, &(0x7f0000000300)=[{&(0x7f0000000540)="21d37ef07e82e237fbe1b40158d20e242c5ea1f9d9edc6b9395250085d6dfa486982e82d4ce1a5e2bc00d29383bae640de", 0x31, 0x7}, {&(0x7f0000000240)="c43f281f483aa6cd83e40e59d53f177299d285bbe5d90aab2b56a76f9db49d86afa5a0f601ba9b3502de5f3724f3ec00927151f928f668b362052950a2e8f16baec29875fdad59395e86a1050c368933e3ed5a17d76bd7bded793436ea207885f395ace3fc12126c205b170be392c1645233ef01f9661090706a65f63b4845dc2884a20711a8024ad4af44aeec9db33991dae38d95cdb7132970d0d4dec58b9d46d378", 0xa3, 0x6}, {&(0x7f0000000380)="05f82c760d277896dd8c9891a41aafe24124891a32a238c3c78696d112aa09f3ae5c54b0c08676da5db7f358c72dfaca9a5d90860b4ae363c9a921c47965d339c23408a6d9b31a23aee27822f0a140d8e4ec9475a740113f2b9923b46333110e528e0a513151aad34aee1b5310fcf62c1982349253003d6d53aebbe09cf5918668ee682be93b6a671bbc", 0x8a, 0x3}], 0x2000400, &(0x7f0000000440)={[{@balloc_no_unhash_reloc}, {@nolargeio}, {@grpjquota}], [{@obj_role={'obj_role', 0x3d, '^'}}, {@hash}, {@uid_lt}, {@mask={'mask', 0x3d, 'MAY_EXEC'}}, {@uid_lt={'uid<', 0xee00}}, {@smackfsfloor={'smackfsfloor', 0x3d, ':%#[@'}}, {@obj_user={'obj_user', 0x3d, ',\\*),i'}}, {@uid_eq={'uid', 0x3d, 0xee00}}, {@seclabel}, {@uid_lt={'uid<', 0xee00}}]}) 06:19:33 executing program 3: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800004, 0x12, r0, 0x0) preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x0, 0x0) mmap(&(0x7f0000000000/0xa000)=nil, 0xa000, 0x2, 0x2172, 0xffffffffffffffff, 0x0) syz_mount_image$reiserfs(&(0x7f0000000140), &(0x7f0000000180)='./file0\x00', 0x0, 0x0, &(0x7f0000000300), 0x0, &(0x7f0000000440)={[{@balloc_no_unhash_reloc}], [{@obj_role={'obj_role', 0x3d, '^'}}, {@hash}, {@uid_lt}, {@mask={'mask', 0x3d, 'MAY_EXEC'}}, {@uid_lt={'uid<', 0xee00}}, {@smackfsfloor={'smackfsfloor', 0x3d, ':%#[@'}}, {@obj_user={'obj_user', 0x3d, ',\\*),i'}}, {@uid_eq={'uid', 0x3d, 0xee00}}, {@seclabel}, {@uid_lt={'uid<', 0xee00}}]}) [ 376.384152][ T22] Bluetooth: hci3: command 0x0406 tx timeout [ 376.441232][T16884] REISERFS warning (device loop0): super-6502 reiserfs_getopt: unknown mount option "obj_role=^" [ 376.455363][T16887] REISERFS warning (device loop3): super-6502 reiserfs_getopt: unknown mount option "obj_role=^" [ 376.485503][T16891] loop1: detected capacity change from 0 to 64 06:19:34 executing program 1: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800004, 0x12, r0, 0x0) preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x0, 0x0) mmap(&(0x7f0000000000/0xa000)=nil, 0xa000, 0x2, 0x2172, 0xffffffffffffffff, 0x0) syz_mount_image$reiserfs(0x0, &(0x7f0000000180)='./file0\x00', 0x8000, 0x3, &(0x7f0000000300)=[{&(0x7f0000000540)="21d37ef07e82e237fbe1b40158d20e242c5ea1f9d9edc6b9395250085d6dfa486982e82d4ce1a5e2bc00d29383bae640de", 0x31, 0x7}, {&(0x7f0000000240)="c43f281f483aa6cd83e40e59d53f177299d285bbe5d90aab2b56a76f9db49d86afa5a0f601ba9b3502de5f3724f3ec00927151f928f668b362052950a2e8f16baec29875fdad59395e86a1050c368933e3ed5a17d76bd7bded793436ea207885f395ace3fc12126c205b170be392c1645233ef01f9661090706a65f63b4845dc2884a20711a8024ad4af44aeec9db33991dae38d95cdb7132970d0d4dec58b9d46d378", 0xa3, 0x6}, {&(0x7f0000000380)="05f82c760d277896dd8c9891a41aafe24124891a32a238c3c78696d112aa09f3ae5c54b0c08676da5db7f358c72dfaca9a5d90860b4ae363c9a921c47965d339c23408a6d9b31a23aee27822f0a140d8e4ec9475a740113f2b9923b46333110e528e0a513151aad34aee1b5310fcf62c1982349253003d6d53aebbe09cf5918668ee682be93b6a671bbc", 0x8a, 0x3}], 0x2000400, &(0x7f0000000440)={[{@balloc_no_unhash_reloc}, {@nolargeio}, {@grpjquota}], [{@obj_role={'obj_role', 0x3d, '^'}}, {@hash}, {@uid_lt}, {@mask={'mask', 0x3d, 'MAY_EXEC'}}, {@uid_lt={'uid<', 0xee00}}, {@smackfsfloor={'smackfsfloor', 0x3d, ':%#[@'}}, {@obj_user={'obj_user', 0x3d, ',\\*),i'}}, {@uid_eq={'uid', 0x3d, 0xee00}}, {@seclabel}, {@uid_lt={'uid<', 0xee00}}]}) 06:19:34 executing program 3: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800004, 0x12, r0, 0x0) preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x0, 0x0) mmap(&(0x7f0000000000/0xa000)=nil, 0xa000, 0x2, 0x2172, 0xffffffffffffffff, 0x0) syz_mount_image$reiserfs(&(0x7f0000000140), &(0x7f0000000180)='./file0\x00', 0x0, 0x0, &(0x7f0000000300), 0x0, &(0x7f0000000440)={[{@balloc_no_unhash_reloc}], [{@obj_role={'obj_role', 0x3d, '^'}}, {@hash}, {@uid_lt}, {@mask={'mask', 0x3d, 'MAY_EXEC'}}, {@uid_lt={'uid<', 0xee00}}, {@smackfsfloor={'smackfsfloor', 0x3d, ':%#[@'}}, {@obj_user={'obj_user', 0x3d, ',\\*),i'}}, {@uid_eq={'uid', 0x3d, 0xee00}}, {@seclabel}, {@uid_lt={'uid<', 0xee00}}]}) 06:19:34 executing program 0: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800004, 0x12, 0xffffffffffffffff, 0x0) preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x9, 0x0) syz_mount_image$reiserfs(&(0x7f0000000140), &(0x7f0000000180)='./file0\x00', 0x0, 0x0, &(0x7f0000000300), 0x0, &(0x7f0000000440)={[{@balloc_no_unhash_reloc}], [{@obj_role={'obj_role', 0x3d, '^'}}, {@hash}, {@uid_lt}, {@mask={'mask', 0x3d, 'MAY_EXEC'}}, {@uid_lt={'uid<', 0xee00}}, {@smackfsfloor={'smackfsfloor', 0x3d, ':%#[@'}}, {@obj_user={'obj_user', 0x3d, ',\\*),i'}}, {@uid_eq={'uid', 0x3d, 0xee00}}, {@seclabel}, {@uid_lt={'uid<', 0xee00}}]}) [ 376.654596][T16898] REISERFS warning (device loop3): super-6502 reiserfs_getopt: unknown mount option "obj_role=^" [ 376.671652][T16901] REISERFS warning (device loop0): super-6502 reiserfs_getopt: unknown mount option "obj_role=^" [ 376.708604][T16907] loop1: detected capacity change from 0 to 64 06:19:34 executing program 3: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800004, 0x12, r0, 0x0) preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x0, 0x0) mmap(&(0x7f0000000000/0xa000)=nil, 0xa000, 0x2, 0x2172, 0xffffffffffffffff, 0x0) syz_mount_image$reiserfs(&(0x7f0000000140), &(0x7f0000000180)='./file0\x00', 0x0, 0x0, &(0x7f0000000300), 0x0, &(0x7f0000000440)={[{@balloc_no_unhash_reloc}], [{@obj_role={'obj_role', 0x3d, '^'}}, {@hash}, {@uid_lt}, {@mask={'mask', 0x3d, 'MAY_EXEC'}}, {@uid_lt={'uid<', 0xee00}}, {@smackfsfloor={'smackfsfloor', 0x3d, ':%#[@'}}, {@obj_user={'obj_user', 0x3d, ',\\*),i'}}, {@uid_eq={'uid', 0x3d, 0xee00}}, {@seclabel}, {@uid_lt={'uid<', 0xee00}}]}) [ 376.867863][T16914] REISERFS warning (device loop3): super-6502 reiserfs_getopt: unknown mount option "obj_role=^" 06:19:34 executing program 2: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800004, 0x12, r0, 0x0) preadv(r0, 0x0, 0x0, 0x9, 0x0) r1 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r1, &(0x7f0000000380)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x80, 0x1, 0x9, 0x1, 0x2, 0x3e, 0x7ff, 0x1f2, 0x40, 0x1f4, 0xbfa, 0x3, 0x38, 0x1, 0x5, 0x4, 0x4}, [{0x5, 0x9, 0x6, 0x101, 0x6, 0x4, 0x9, 0x6}, {0x5, 0x3, 0x5e61, 0x80000000, 0xcc3, 0x9, 0x7, 0x8}], "d1660f10e0ac4a6edbf3aa53803c8f57ef2a12069e82553332d2b96d67f2dbc5b04959dad57c303d876233684f5e9ad402a193da791e11122f2cccbf10d6d499f5e16385d09f63891a965d80bcb68b551fabffb4bf0b5c372b4d69cdefac988201a40429a8d0dc699820193afcab08070fde89c22e16b43dde5e37d9a3df0cd352e8667f163774d9dc3c79571e5100046281", ['\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00']}, 0x842) 06:19:34 executing program 1: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800004, 0x12, r0, 0x0) preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x0, 0x0) mmap(&(0x7f0000000000/0xa000)=nil, 0xa000, 0x2, 0x2172, 0xffffffffffffffff, 0x0) syz_mount_image$reiserfs(0x0, &(0x7f0000000180)='./file0\x00', 0x8000, 0x3, &(0x7f0000000300)=[{&(0x7f0000000540)="21d37ef07e82e237fbe1b40158d20e242c5ea1f9d9edc6b9395250085d6dfa486982e82d4ce1a5e2bc00d29383bae640de", 0x31, 0x7}, {&(0x7f0000000240)="c43f281f483aa6cd83e40e59d53f177299d285bbe5d90aab2b56a76f9db49d86afa5a0f601ba9b3502de5f3724f3ec00927151f928f668b362052950a2e8f16baec29875fdad59395e86a1050c368933e3ed5a17d76bd7bded793436ea207885f395ace3fc12126c205b170be392c1645233ef01f9661090706a65f63b4845dc2884a20711a8024ad4af44aeec9db33991dae38d95cdb7132970d0d4dec58b9d46d378", 0xa3, 0x6}, {&(0x7f0000000380)="05f82c760d277896dd8c9891a41aafe24124891a32a238c3c78696d112aa09f3ae5c54b0c08676da5db7f358c72dfaca9a5d90860b4ae363c9a921c47965d339c23408a6d9b31a23aee27822f0a140d8e4ec9475a740113f2b9923b46333110e528e0a513151aad34aee1b5310fcf62c1982349253003d6d53aebbe09cf5918668ee682be93b6a671bbc", 0x8a, 0x3}], 0x2000400, &(0x7f0000000440)={[{@balloc_no_unhash_reloc}, {@nolargeio}, {@grpjquota}], [{@obj_role={'obj_role', 0x3d, '^'}}, {@hash}, {@uid_lt}, {@mask={'mask', 0x3d, 'MAY_EXEC'}}, {@uid_lt={'uid<', 0xee00}}, {@smackfsfloor={'smackfsfloor', 0x3d, ':%#[@'}}, {@obj_user={'obj_user', 0x3d, ',\\*),i'}}, {@uid_eq={'uid', 0x3d, 0xee00}}, {@seclabel}, {@uid_lt={'uid<', 0xee00}}]}) 06:19:34 executing program 0: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800004, 0x12, 0xffffffffffffffff, 0x0) preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x9, 0x0) syz_mount_image$reiserfs(&(0x7f0000000140), &(0x7f0000000180)='./file0\x00', 0x0, 0x0, &(0x7f0000000300), 0x0, &(0x7f0000000440)={[{@balloc_no_unhash_reloc}], [{@obj_role={'obj_role', 0x3d, '^'}}, {@hash}, {@uid_lt}, {@mask={'mask', 0x3d, 'MAY_EXEC'}}, {@uid_lt={'uid<', 0xee00}}, {@smackfsfloor={'smackfsfloor', 0x3d, ':%#[@'}}, {@obj_user={'obj_user', 0x3d, ',\\*),i'}}, {@uid_eq={'uid', 0x3d, 0xee00}}, {@seclabel}, {@uid_lt={'uid<', 0xee00}}]}) 06:19:34 executing program 3: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800004, 0x12, r0, 0x0) preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x9, 0x0) mmap(&(0x7f0000000000/0xa000)=nil, 0xa000, 0x0, 0x2172, 0xffffffffffffffff, 0x0) syz_mount_image$reiserfs(&(0x7f0000000140), &(0x7f0000000180)='./file0\x00', 0x0, 0x0, &(0x7f0000000300), 0x0, &(0x7f0000000440)={[{@balloc_no_unhash_reloc}], [{@obj_role={'obj_role', 0x3d, '^'}}, {@hash}, {@uid_lt}, {@mask={'mask', 0x3d, 'MAY_EXEC'}}, {@uid_lt={'uid<', 0xee00}}, {@smackfsfloor={'smackfsfloor', 0x3d, ':%#[@'}}, {@obj_user={'obj_user', 0x3d, ',\\*),i'}}, {@uid_eq={'uid', 0x3d, 0xee00}}, {@seclabel}, {@uid_lt={'uid<', 0xee00}}]}) [ 377.347105][T16925] loop1: detected capacity change from 0 to 64 [ 377.402772][T16930] REISERFS warning (device loop0): super-6502 reiserfs_getopt: unknown mount option "obj_role=^" 06:19:35 executing program 1: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800004, 0x12, r0, 0x0) preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x9, 0x0) mmap(&(0x7f0000000000/0xa000)=nil, 0xa000, 0x0, 0x2172, 0xffffffffffffffff, 0x0) syz_mount_image$reiserfs(0x0, &(0x7f0000000180)='./file0\x00', 0x8000, 0x3, &(0x7f0000000300)=[{&(0x7f0000000540)="21d37ef07e82e237fbe1b40158d20e242c5ea1f9d9edc6b9395250085d6dfa486982e82d4ce1a5e2bc00d29383bae640de", 0x31, 0x7}, {&(0x7f0000000240)="c43f281f483aa6cd83e40e59d53f177299d285bbe5d90aab2b56a76f9db49d86afa5a0f601ba9b3502de5f3724f3ec00927151f928f668b362052950a2e8f16baec29875fdad59395e86a1050c368933e3ed5a17d76bd7bded793436ea207885f395ace3fc12126c205b170be392c1645233ef01f9661090706a65f63b4845dc2884a20711a8024ad4af44aeec9db33991dae38d95cdb7132970d0d4dec58b9d46d378", 0xa3, 0x6}, {&(0x7f0000000380)="05f82c760d277896dd8c9891a41aafe24124891a32a238c3c78696d112aa09f3ae5c54b0c08676da5db7f358c72dfaca9a5d90860b4ae363c9a921c47965d339c23408a6d9b31a23aee27822f0a140d8e4ec9475a740113f2b9923b46333110e528e0a513151aad34aee1b5310fcf62c1982349253003d6d53aebbe09cf5918668ee682be93b6a671bbc", 0x8a, 0x3}], 0x2000400, &(0x7f0000000440)={[{@balloc_no_unhash_reloc}, {@nolargeio}, {@grpjquota}], [{@obj_role={'obj_role', 0x3d, '^'}}, {@hash}, {@uid_lt}, {@mask={'mask', 0x3d, 'MAY_EXEC'}}, {@uid_lt={'uid<', 0xee00}}, {@smackfsfloor={'smackfsfloor', 0x3d, ':%#[@'}}, {@obj_user={'obj_user', 0x3d, ',\\*),i'}}, {@uid_eq={'uid', 0x3d, 0xee00}}, {@seclabel}, {@uid_lt={'uid<', 0xee00}}]}) 06:19:35 executing program 3: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800004, 0x12, r0, 0x0) preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x9, 0x0) mmap(&(0x7f0000000000/0xa000)=nil, 0xa000, 0x0, 0x2172, 0xffffffffffffffff, 0x0) syz_mount_image$reiserfs(&(0x7f0000000140), &(0x7f0000000180)='./file0\x00', 0x0, 0x0, &(0x7f0000000300), 0x0, &(0x7f0000000440)={[{@balloc_no_unhash_reloc}], [{@obj_role={'obj_role', 0x3d, '^'}}, {@hash}, {@uid_lt}, {@mask={'mask', 0x3d, 'MAY_EXEC'}}, {@uid_lt={'uid<', 0xee00}}, {@smackfsfloor={'smackfsfloor', 0x3d, ':%#[@'}}, {@obj_user={'obj_user', 0x3d, ',\\*),i'}}, {@uid_eq={'uid', 0x3d, 0xee00}}, {@seclabel}, {@uid_lt={'uid<', 0xee00}}]}) 06:19:35 executing program 1: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800004, 0x12, r0, 0x0) preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x9, 0x0) mmap(&(0x7f0000000000/0xa000)=nil, 0xa000, 0x0, 0x2172, 0xffffffffffffffff, 0x0) syz_mount_image$reiserfs(0x0, &(0x7f0000000180)='./file0\x00', 0x8000, 0x3, &(0x7f0000000300)=[{&(0x7f0000000540)="21d37ef07e82e237fbe1b40158d20e242c5ea1f9d9edc6b9395250085d6dfa486982e82d4ce1a5e2bc00d29383bae640de", 0x31, 0x7}, {&(0x7f0000000240)="c43f281f483aa6cd83e40e59d53f177299d285bbe5d90aab2b56a76f9db49d86afa5a0f601ba9b3502de5f3724f3ec00927151f928f668b362052950a2e8f16baec29875fdad59395e86a1050c368933e3ed5a17d76bd7bded793436ea207885f395ace3fc12126c205b170be392c1645233ef01f9661090706a65f63b4845dc2884a20711a8024ad4af44aeec9db33991dae38d95cdb7132970d0d4dec58b9d46d378", 0xa3, 0x6}, {&(0x7f0000000380)="05f82c760d277896dd8c9891a41aafe24124891a32a238c3c78696d112aa09f3ae5c54b0c08676da5db7f358c72dfaca9a5d90860b4ae363c9a921c47965d339c23408a6d9b31a23aee27822f0a140d8e4ec9475a740113f2b9923b46333110e528e0a513151aad34aee1b5310fcf62c1982349253003d6d53aebbe09cf5918668ee682be93b6a671bbc", 0x8a, 0x3}], 0x2000400, &(0x7f0000000440)={[{@balloc_no_unhash_reloc}, {@nolargeio}, {@grpjquota}], [{@obj_role={'obj_role', 0x3d, '^'}}, {@hash}, {@uid_lt}, {@mask={'mask', 0x3d, 'MAY_EXEC'}}, {@uid_lt={'uid<', 0xee00}}, {@smackfsfloor={'smackfsfloor', 0x3d, ':%#[@'}}, {@obj_user={'obj_user', 0x3d, ',\\*),i'}}, {@uid_eq={'uid', 0x3d, 0xee00}}, {@seclabel}, {@uid_lt={'uid<', 0xee00}}]}) 06:19:35 executing program 0: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800004, 0x12, 0xffffffffffffffff, 0x0) preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x9, 0x0) syz_mount_image$reiserfs(&(0x7f0000000140), &(0x7f0000000180)='./file0\x00', 0x0, 0x0, &(0x7f0000000300), 0x0, &(0x7f0000000440)={[{@balloc_no_unhash_reloc}], [{@obj_role={'obj_role', 0x3d, '^'}}, {@hash}, {@uid_lt}, {@mask={'mask', 0x3d, 'MAY_EXEC'}}, {@uid_lt={'uid<', 0xee00}}, {@smackfsfloor={'smackfsfloor', 0x3d, ':%#[@'}}, {@obj_user={'obj_user', 0x3d, ',\\*),i'}}, {@uid_eq={'uid', 0x3d, 0xee00}}, {@seclabel}, {@uid_lt={'uid<', 0xee00}}]}) [ 377.658357][T16951] REISERFS warning (device loop0): super-6502 reiserfs_getopt: unknown mount option "obj_role=^" 06:19:35 executing program 1: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800004, 0x12, r0, 0x0) preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x9, 0x0) mmap(&(0x7f0000000000/0xa000)=nil, 0xa000, 0x0, 0x2172, 0xffffffffffffffff, 0x0) syz_mount_image$reiserfs(0x0, &(0x7f0000000180)='./file0\x00', 0x8000, 0x3, &(0x7f0000000300)=[{&(0x7f0000000540)="21d37ef07e82e237fbe1b40158d20e242c5ea1f9d9edc6b9395250085d6dfa486982e82d4ce1a5e2bc00d29383bae640de", 0x31, 0x7}, {&(0x7f0000000240)="c43f281f483aa6cd83e40e59d53f177299d285bbe5d90aab2b56a76f9db49d86afa5a0f601ba9b3502de5f3724f3ec00927151f928f668b362052950a2e8f16baec29875fdad59395e86a1050c368933e3ed5a17d76bd7bded793436ea207885f395ace3fc12126c205b170be392c1645233ef01f9661090706a65f63b4845dc2884a20711a8024ad4af44aeec9db33991dae38d95cdb7132970d0d4dec58b9d46d378", 0xa3, 0x6}, {&(0x7f0000000380)="05f82c760d277896dd8c9891a41aafe24124891a32a238c3c78696d112aa09f3ae5c54b0c08676da5db7f358c72dfaca9a5d90860b4ae363c9a921c47965d339c23408a6d9b31a23aee27822f0a140d8e4ec9475a740113f2b9923b46333110e528e0a513151aad34aee1b5310fcf62c1982349253003d6d53aebbe09cf5918668ee682be93b6a671bbc", 0x8a, 0x3}], 0x2000400, &(0x7f0000000440)={[{@balloc_no_unhash_reloc}, {@nolargeio}, {@grpjquota}], [{@obj_role={'obj_role', 0x3d, '^'}}, {@hash}, {@uid_lt}, {@mask={'mask', 0x3d, 'MAY_EXEC'}}, {@uid_lt={'uid<', 0xee00}}, {@smackfsfloor={'smackfsfloor', 0x3d, ':%#[@'}}, {@obj_user={'obj_user', 0x3d, ',\\*),i'}}, {@uid_eq={'uid', 0x3d, 0xee00}}, {@seclabel}, {@uid_lt={'uid<', 0xee00}}]}) 06:19:35 executing program 3: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800004, 0x12, r0, 0x0) preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x9, 0x0) mmap(&(0x7f0000000000/0xa000)=nil, 0xa000, 0x0, 0x2172, 0xffffffffffffffff, 0x0) syz_mount_image$reiserfs(&(0x7f0000000140), &(0x7f0000000180)='./file0\x00', 0x0, 0x0, &(0x7f0000000300), 0x0, &(0x7f0000000440)={[{@balloc_no_unhash_reloc}], [{@obj_role={'obj_role', 0x3d, '^'}}, {@hash}, {@uid_lt}, {@mask={'mask', 0x3d, 'MAY_EXEC'}}, {@uid_lt={'uid<', 0xee00}}, {@smackfsfloor={'smackfsfloor', 0x3d, ':%#[@'}}, {@obj_user={'obj_user', 0x3d, ',\\*),i'}}, {@uid_eq={'uid', 0x3d, 0xee00}}, {@seclabel}, {@uid_lt={'uid<', 0xee00}}]}) 06:19:35 executing program 2: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800004, 0x12, r0, 0x0) preadv(r0, 0x0, 0x0, 0x9, 0x0) r1 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r1, &(0x7f0000000380)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x80, 0x1, 0x9, 0x1, 0x2, 0x3e, 0x7ff, 0x1f2, 0x40, 0x1f4, 0xbfa, 0x3, 0x38, 0x1, 0x5, 0x4, 0x4}, [{0x5, 0x9, 0x6, 0x101, 0x6, 0x4, 0x9, 0x6}, {0x5, 0x3, 0x5e61, 0x80000000, 0xcc3, 0x9, 0x7, 0x8}], "d1660f10e0ac4a6edbf3aa53803c8f57ef2a12069e82553332d2b96d67f2dbc5b04959dad57c303d876233684f5e9ad402a193da791e11122f2cccbf10d6d499f5e16385d09f63891a965d80bcb68b551fabffb4bf0b5c372b4d69cdefac988201a40429a8d0dc699820193afcab08070fde89c22e16b43dde5e37d9a3df0cd352e8667f163774d9dc3c79571e5100046281", ['\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00']}, 0x842) 06:19:35 executing program 0: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800004, 0x12, r0, 0x0) preadv(0xffffffffffffffff, &(0x7f00000001c0)=[{0x0}], 0x1, 0x9, 0x0) syz_mount_image$reiserfs(&(0x7f0000000140), &(0x7f0000000180)='./file0\x00', 0x0, 0x0, &(0x7f0000000300), 0x0, &(0x7f0000000440)={[{@balloc_no_unhash_reloc}], [{@obj_role={'obj_role', 0x3d, '^'}}, {@hash}, {@uid_lt}, {@mask={'mask', 0x3d, 'MAY_EXEC'}}, {@uid_lt={'uid<', 0xee00}}, {@smackfsfloor={'smackfsfloor', 0x3d, ':%#[@'}}, {@obj_user={'obj_user', 0x3d, ',\\*),i'}}, {@uid_eq={'uid', 0x3d, 0xee00}}, {@seclabel}, {@uid_lt={'uid<', 0xee00}}]}) 06:19:35 executing program 3: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800004, 0x12, r0, 0x0) preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x9, 0x0) mmap(&(0x7f0000000000/0xa000)=nil, 0xa000, 0x2, 0x10, 0xffffffffffffffff, 0x0) syz_mount_image$reiserfs(&(0x7f0000000140), &(0x7f0000000180)='./file0\x00', 0x0, 0x0, &(0x7f0000000300), 0x0, &(0x7f0000000440)={[{@balloc_no_unhash_reloc}], [{@obj_role={'obj_role', 0x3d, '^'}}, {@hash}, {@uid_lt}, {@mask={'mask', 0x3d, 'MAY_EXEC'}}, {@uid_lt={'uid<', 0xee00}}, {@smackfsfloor={'smackfsfloor', 0x3d, ':%#[@'}}, {@obj_user={'obj_user', 0x3d, ',\\*),i'}}, {@uid_eq={'uid', 0x3d, 0xee00}}, {@seclabel}, {@uid_lt={'uid<', 0xee00}}]}) 06:19:35 executing program 1: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800004, 0x12, r0, 0x0) preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x9, 0x0) mmap(&(0x7f0000000000/0xa000)=nil, 0xa000, 0x2, 0x10, 0xffffffffffffffff, 0x0) syz_mount_image$reiserfs(0x0, &(0x7f0000000180)='./file0\x00', 0x8000, 0x3, &(0x7f0000000300)=[{&(0x7f0000000540)="21d37ef07e82e237fbe1b40158d20e242c5ea1f9d9edc6b9395250085d6dfa486982e82d4ce1a5e2bc00d29383bae640de", 0x31, 0x7}, {&(0x7f0000000240)="c43f281f483aa6cd83e40e59d53f177299d285bbe5d90aab2b56a76f9db49d86afa5a0f601ba9b3502de5f3724f3ec00927151f928f668b362052950a2e8f16baec29875fdad59395e86a1050c368933e3ed5a17d76bd7bded793436ea207885f395ace3fc12126c205b170be392c1645233ef01f9661090706a65f63b4845dc2884a20711a8024ad4af44aeec9db33991dae38d95cdb7132970d0d4dec58b9d46d378", 0xa3, 0x6}, {&(0x7f0000000380)="05f82c760d277896dd8c9891a41aafe24124891a32a238c3c78696d112aa09f3ae5c54b0c08676da5db7f358c72dfaca9a5d90860b4ae363c9a921c47965d339c23408a6d9b31a23aee27822f0a140d8e4ec9475a740113f2b9923b46333110e528e0a513151aad34aee1b5310fcf62c1982349253003d6d53aebbe09cf5918668ee682be93b6a671bbc", 0x8a, 0x3}], 0x2000400, &(0x7f0000000440)={[{@balloc_no_unhash_reloc}, {@nolargeio}, {@grpjquota}], [{@obj_role={'obj_role', 0x3d, '^'}}, {@hash}, {@uid_lt}, {@mask={'mask', 0x3d, 'MAY_EXEC'}}, {@uid_lt={'uid<', 0xee00}}, {@smackfsfloor={'smackfsfloor', 0x3d, ':%#[@'}}, {@obj_user={'obj_user', 0x3d, ',\\*),i'}}, {@uid_eq={'uid', 0x3d, 0xee00}}, {@seclabel}, {@uid_lt={'uid<', 0xee00}}]}) 06:19:36 executing program 0: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800004, 0x12, r0, 0x0) preadv(0xffffffffffffffff, &(0x7f00000001c0)=[{0x0}], 0x1, 0x9, 0x0) syz_mount_image$reiserfs(&(0x7f0000000140), &(0x7f0000000180)='./file0\x00', 0x0, 0x0, &(0x7f0000000300), 0x0, &(0x7f0000000440)={[{@balloc_no_unhash_reloc}], [{@obj_role={'obj_role', 0x3d, '^'}}, {@hash}, {@uid_lt}, {@mask={'mask', 0x3d, 'MAY_EXEC'}}, {@uid_lt={'uid<', 0xee00}}, {@smackfsfloor={'smackfsfloor', 0x3d, ':%#[@'}}, {@obj_user={'obj_user', 0x3d, ',\\*),i'}}, {@uid_eq={'uid', 0x3d, 0xee00}}, {@seclabel}, {@uid_lt={'uid<', 0xee00}}]}) 06:19:36 executing program 1: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800004, 0x12, r0, 0x0) preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x9, 0x0) mmap(&(0x7f0000000000/0xa000)=nil, 0xa000, 0x2, 0x10, 0xffffffffffffffff, 0x0) syz_mount_image$reiserfs(0x0, &(0x7f0000000180)='./file0\x00', 0x8000, 0x3, &(0x7f0000000300)=[{&(0x7f0000000540)="21d37ef07e82e237fbe1b40158d20e242c5ea1f9d9edc6b9395250085d6dfa486982e82d4ce1a5e2bc00d29383bae640de", 0x31, 0x7}, {&(0x7f0000000240)="c43f281f483aa6cd83e40e59d53f177299d285bbe5d90aab2b56a76f9db49d86afa5a0f601ba9b3502de5f3724f3ec00927151f928f668b362052950a2e8f16baec29875fdad59395e86a1050c368933e3ed5a17d76bd7bded793436ea207885f395ace3fc12126c205b170be392c1645233ef01f9661090706a65f63b4845dc2884a20711a8024ad4af44aeec9db33991dae38d95cdb7132970d0d4dec58b9d46d378", 0xa3, 0x6}, {&(0x7f0000000380)="05f82c760d277896dd8c9891a41aafe24124891a32a238c3c78696d112aa09f3ae5c54b0c08676da5db7f358c72dfaca9a5d90860b4ae363c9a921c47965d339c23408a6d9b31a23aee27822f0a140d8e4ec9475a740113f2b9923b46333110e528e0a513151aad34aee1b5310fcf62c1982349253003d6d53aebbe09cf5918668ee682be93b6a671bbc", 0x8a, 0x3}], 0x2000400, &(0x7f0000000440)={[{@balloc_no_unhash_reloc}, {@nolargeio}, {@grpjquota}], [{@obj_role={'obj_role', 0x3d, '^'}}, {@hash}, {@uid_lt}, {@mask={'mask', 0x3d, 'MAY_EXEC'}}, {@uid_lt={'uid<', 0xee00}}, {@smackfsfloor={'smackfsfloor', 0x3d, ':%#[@'}}, {@obj_user={'obj_user', 0x3d, ',\\*),i'}}, {@uid_eq={'uid', 0x3d, 0xee00}}, {@seclabel}, {@uid_lt={'uid<', 0xee00}}]}) 06:19:36 executing program 3: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800004, 0x12, r0, 0x0) preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x9, 0x0) mmap(&(0x7f0000000000/0xa000)=nil, 0xa000, 0x2, 0x10, 0xffffffffffffffff, 0x0) syz_mount_image$reiserfs(&(0x7f0000000140), &(0x7f0000000180)='./file0\x00', 0x0, 0x0, &(0x7f0000000300), 0x0, &(0x7f0000000440)={[{@balloc_no_unhash_reloc}], [{@obj_role={'obj_role', 0x3d, '^'}}, {@hash}, {@uid_lt}, {@mask={'mask', 0x3d, 'MAY_EXEC'}}, {@uid_lt={'uid<', 0xee00}}, {@smackfsfloor={'smackfsfloor', 0x3d, ':%#[@'}}, {@obj_user={'obj_user', 0x3d, ',\\*),i'}}, {@uid_eq={'uid', 0x3d, 0xee00}}, {@seclabel}, {@uid_lt={'uid<', 0xee00}}]}) 06:19:36 executing program 1: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800004, 0x12, r0, 0x0) preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x9, 0x0) mmap(&(0x7f0000000000/0xa000)=nil, 0xa000, 0x2, 0x10, 0xffffffffffffffff, 0x0) syz_mount_image$reiserfs(0x0, &(0x7f0000000180)='./file0\x00', 0x8000, 0x3, &(0x7f0000000300)=[{&(0x7f0000000540)="21d37ef07e82e237fbe1b40158d20e242c5ea1f9d9edc6b9395250085d6dfa486982e82d4ce1a5e2bc00d29383bae640de", 0x31, 0x7}, {&(0x7f0000000240)="c43f281f483aa6cd83e40e59d53f177299d285bbe5d90aab2b56a76f9db49d86afa5a0f601ba9b3502de5f3724f3ec00927151f928f668b362052950a2e8f16baec29875fdad59395e86a1050c368933e3ed5a17d76bd7bded793436ea207885f395ace3fc12126c205b170be392c1645233ef01f9661090706a65f63b4845dc2884a20711a8024ad4af44aeec9db33991dae38d95cdb7132970d0d4dec58b9d46d378", 0xa3, 0x6}, {&(0x7f0000000380)="05f82c760d277896dd8c9891a41aafe24124891a32a238c3c78696d112aa09f3ae5c54b0c08676da5db7f358c72dfaca9a5d90860b4ae363c9a921c47965d339c23408a6d9b31a23aee27822f0a140d8e4ec9475a740113f2b9923b46333110e528e0a513151aad34aee1b5310fcf62c1982349253003d6d53aebbe09cf5918668ee682be93b6a671bbc", 0x8a, 0x3}], 0x2000400, &(0x7f0000000440)={[{@balloc_no_unhash_reloc}, {@nolargeio}, {@grpjquota}], [{@obj_role={'obj_role', 0x3d, '^'}}, {@hash}, {@uid_lt}, {@mask={'mask', 0x3d, 'MAY_EXEC'}}, {@uid_lt={'uid<', 0xee00}}, {@smackfsfloor={'smackfsfloor', 0x3d, ':%#[@'}}, {@obj_user={'obj_user', 0x3d, ',\\*),i'}}, {@uid_eq={'uid', 0x3d, 0xee00}}, {@seclabel}, {@uid_lt={'uid<', 0xee00}}]}) 06:19:36 executing program 0: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800004, 0x12, r0, 0x0) preadv(0xffffffffffffffff, &(0x7f00000001c0)=[{0x0}], 0x1, 0x9, 0x0) syz_mount_image$reiserfs(&(0x7f0000000140), &(0x7f0000000180)='./file0\x00', 0x0, 0x0, &(0x7f0000000300), 0x0, &(0x7f0000000440)={[{@balloc_no_unhash_reloc}], [{@obj_role={'obj_role', 0x3d, '^'}}, {@hash}, {@uid_lt}, {@mask={'mask', 0x3d, 'MAY_EXEC'}}, {@uid_lt={'uid<', 0xee00}}, {@smackfsfloor={'smackfsfloor', 0x3d, ':%#[@'}}, {@obj_user={'obj_user', 0x3d, ',\\*),i'}}, {@uid_eq={'uid', 0x3d, 0xee00}}, {@seclabel}, {@uid_lt={'uid<', 0xee00}}]}) 06:19:36 executing program 1: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800004, 0x12, r0, 0x0) preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x9, 0x0) mmap(&(0x7f0000000000/0xa000)=nil, 0xa000, 0x2, 0x2172, 0xffffffffffffffff, 0x0) syz_mount_image$reiserfs(0x0, 0x0, 0x8000, 0x3, &(0x7f0000000300)=[{&(0x7f0000000540)="21d37ef07e82e237fbe1b40158d20e242c5ea1f9d9edc6b9395250085d6dfa486982e82d4ce1a5e2bc00d29383bae640de", 0x31, 0x7}, {&(0x7f0000000240)="c43f281f483aa6cd83e40e59d53f177299d285bbe5d90aab2b56a76f9db49d86afa5a0f601ba9b3502de5f3724f3ec00927151f928f668b362052950a2e8f16baec29875fdad59395e86a1050c368933e3ed5a17d76bd7bded793436ea207885f395ace3fc12126c205b170be392c1645233ef01f9661090706a65f63b4845dc2884a20711a8024ad4af44aeec9db33991dae38d95cdb7132970d0d4dec58b9d46d378", 0xa3, 0x6}, {&(0x7f0000000380)="05f82c760d277896dd8c9891a41aafe24124891a32a238c3c78696d112aa09f3ae5c54b0c08676da5db7f358c72dfaca9a5d90860b4ae363c9a921c47965d339c23408a6d9b31a23aee27822f0a140d8e4ec9475a740113f2b9923b46333110e528e0a513151aad34aee1b5310fcf62c1982349253003d6d53aebbe09cf5918668ee682be93b6a671bbc", 0x8a, 0x3}], 0x2000400, &(0x7f0000000440)={[{@balloc_no_unhash_reloc}, {@nolargeio}, {@grpjquota}], [{@obj_role={'obj_role', 0x3d, '^'}}, {@hash}, {@uid_lt}, {@mask={'mask', 0x3d, 'MAY_EXEC'}}, {@uid_lt={'uid<', 0xee00}}, {@smackfsfloor={'smackfsfloor', 0x3d, ':%#[@'}}, {@obj_user={'obj_user', 0x3d, ',\\*),i'}}, {@uid_eq={'uid', 0x3d, 0xee00}}, {@seclabel}, {@uid_lt={'uid<', 0xee00}}]}) 06:19:36 executing program 2: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800004, 0x12, r0, 0x0) preadv(r0, &(0x7f00000001c0), 0x0, 0x9, 0x0) r1 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r1, &(0x7f0000000380)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x80, 0x1, 0x9, 0x1, 0x2, 0x3e, 0x7ff, 0x1f2, 0x40, 0x1f4, 0xbfa, 0x3, 0x38, 0x1, 0x5, 0x4, 0x4}, [{0x5, 0x9, 0x6, 0x101, 0x6, 0x4, 0x9, 0x6}, {0x5, 0x3, 0x5e61, 0x80000000, 0xcc3, 0x9, 0x7, 0x8}], "d1660f10e0ac4a6edbf3aa53803c8f57ef2a12069e82553332d2b96d67f2dbc5b04959dad57c303d876233684f5e9ad402a193da791e11122f2cccbf10d6d499f5e16385d09f63891a965d80bcb68b551fabffb4bf0b5c372b4d69cdefac988201a40429a8d0dc699820193afcab08070fde89c22e16b43dde5e37d9a3df0cd352e8667f163774d9dc3c79571e5100046281", ['\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00']}, 0x842) 06:19:36 executing program 3: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800004, 0x12, r0, 0x0) preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x9, 0x0) mmap(&(0x7f0000000000/0xa000)=nil, 0xa000, 0x2, 0x10, 0xffffffffffffffff, 0x0) syz_mount_image$reiserfs(&(0x7f0000000140), &(0x7f0000000180)='./file0\x00', 0x0, 0x0, &(0x7f0000000300), 0x0, &(0x7f0000000440)={[{@balloc_no_unhash_reloc}], [{@obj_role={'obj_role', 0x3d, '^'}}, {@hash}, {@uid_lt}, {@mask={'mask', 0x3d, 'MAY_EXEC'}}, {@uid_lt={'uid<', 0xee00}}, {@smackfsfloor={'smackfsfloor', 0x3d, ':%#[@'}}, {@obj_user={'obj_user', 0x3d, ',\\*),i'}}, {@uid_eq={'uid', 0x3d, 0xee00}}, {@seclabel}, {@uid_lt={'uid<', 0xee00}}]}) [ 379.182911][T17010] loop1: detected capacity change from 0 to 64 06:19:36 executing program 3: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800004, 0x12, r0, 0x0) preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x9, 0x0) mmap(&(0x7f0000000000/0xa000)=nil, 0xa000, 0x2, 0x2172, 0xffffffffffffffff, 0x0) syz_mount_image$reiserfs(0x0, &(0x7f0000000180)='./file0\x00', 0x0, 0x0, &(0x7f0000000300), 0x0, &(0x7f0000000440)={[{@balloc_no_unhash_reloc}], [{@obj_role={'obj_role', 0x3d, '^'}}, {@hash}, {@uid_lt}, {@mask={'mask', 0x3d, 'MAY_EXEC'}}, {@uid_lt={'uid<', 0xee00}}, {@smackfsfloor={'smackfsfloor', 0x3d, ':%#[@'}}, {@obj_user={'obj_user', 0x3d, ',\\*),i'}}, {@uid_eq={'uid', 0x3d, 0xee00}}, {@seclabel}, {@uid_lt={'uid<', 0xee00}}]}) 06:19:36 executing program 1: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800004, 0x12, r0, 0x0) preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x9, 0x0) mmap(&(0x7f0000000000/0xa000)=nil, 0xa000, 0x2, 0x2172, 0xffffffffffffffff, 0x0) syz_mount_image$reiserfs(0x0, 0x0, 0x8000, 0x3, &(0x7f0000000300)=[{&(0x7f0000000540)="21d37ef07e82e237fbe1b40158d20e242c5ea1f9d9edc6b9395250085d6dfa486982e82d4ce1a5e2bc00d29383bae640de", 0x31, 0x7}, {&(0x7f0000000240)="c43f281f483aa6cd83e40e59d53f177299d285bbe5d90aab2b56a76f9db49d86afa5a0f601ba9b3502de5f3724f3ec00927151f928f668b362052950a2e8f16baec29875fdad59395e86a1050c368933e3ed5a17d76bd7bded793436ea207885f395ace3fc12126c205b170be392c1645233ef01f9661090706a65f63b4845dc2884a20711a8024ad4af44aeec9db33991dae38d95cdb7132970d0d4dec58b9d46d378", 0xa3, 0x6}, {&(0x7f0000000380)="05f82c760d277896dd8c9891a41aafe24124891a32a238c3c78696d112aa09f3ae5c54b0c08676da5db7f358c72dfaca9a5d90860b4ae363c9a921c47965d339c23408a6d9b31a23aee27822f0a140d8e4ec9475a740113f2b9923b46333110e528e0a513151aad34aee1b5310fcf62c1982349253003d6d53aebbe09cf5918668ee682be93b6a671bbc", 0x8a, 0x3}], 0x2000400, &(0x7f0000000440)={[{@balloc_no_unhash_reloc}, {@nolargeio}, {@grpjquota}], [{@obj_role={'obj_role', 0x3d, '^'}}, {@hash}, {@uid_lt}, {@mask={'mask', 0x3d, 'MAY_EXEC'}}, {@uid_lt={'uid<', 0xee00}}, {@smackfsfloor={'smackfsfloor', 0x3d, ':%#[@'}}, {@obj_user={'obj_user', 0x3d, ',\\*),i'}}, {@uid_eq={'uid', 0x3d, 0xee00}}, {@seclabel}, {@uid_lt={'uid<', 0xee00}}]}) 06:19:36 executing program 0: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800004, 0x12, r0, 0x0) preadv(r0, 0x0, 0x0, 0x9, 0x0) syz_mount_image$reiserfs(&(0x7f0000000140), &(0x7f0000000180)='./file0\x00', 0x0, 0x0, &(0x7f0000000300), 0x0, &(0x7f0000000440)={[{@balloc_no_unhash_reloc}], [{@obj_role={'obj_role', 0x3d, '^'}}, {@hash}, {@uid_lt}, {@mask={'mask', 0x3d, 'MAY_EXEC'}}, {@uid_lt={'uid<', 0xee00}}, {@smackfsfloor={'smackfsfloor', 0x3d, ':%#[@'}}, {@obj_user={'obj_user', 0x3d, ',\\*),i'}}, {@uid_eq={'uid', 0x3d, 0xee00}}, {@seclabel}, {@uid_lt={'uid<', 0xee00}}]}) [ 379.374871][T17030] loop1: detected capacity change from 0 to 64 06:19:37 executing program 3: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800004, 0x12, r0, 0x0) preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x9, 0x0) mmap(&(0x7f0000000000/0xa000)=nil, 0xa000, 0x2, 0x2172, 0xffffffffffffffff, 0x0) syz_mount_image$reiserfs(0x0, &(0x7f0000000180)='./file0\x00', 0x0, 0x0, &(0x7f0000000300), 0x0, &(0x7f0000000440)={[{@balloc_no_unhash_reloc}], [{@obj_role={'obj_role', 0x3d, '^'}}, {@hash}, {@uid_lt}, {@mask={'mask', 0x3d, 'MAY_EXEC'}}, {@uid_lt={'uid<', 0xee00}}, {@smackfsfloor={'smackfsfloor', 0x3d, ':%#[@'}}, {@obj_user={'obj_user', 0x3d, ',\\*),i'}}, {@uid_eq={'uid', 0x3d, 0xee00}}, {@seclabel}, {@uid_lt={'uid<', 0xee00}}]}) 06:19:37 executing program 0: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800004, 0x12, r0, 0x0) preadv(r0, 0x0, 0x0, 0x9, 0x0) syz_mount_image$reiserfs(&(0x7f0000000140), &(0x7f0000000180)='./file0\x00', 0x0, 0x0, &(0x7f0000000300), 0x0, &(0x7f0000000440)={[{@balloc_no_unhash_reloc}], [{@obj_role={'obj_role', 0x3d, '^'}}, {@hash}, {@uid_lt}, {@mask={'mask', 0x3d, 'MAY_EXEC'}}, {@uid_lt={'uid<', 0xee00}}, {@smackfsfloor={'smackfsfloor', 0x3d, ':%#[@'}}, {@obj_user={'obj_user', 0x3d, ',\\*),i'}}, {@uid_eq={'uid', 0x3d, 0xee00}}, {@seclabel}, {@uid_lt={'uid<', 0xee00}}]}) 06:19:37 executing program 1: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800004, 0x12, r0, 0x0) preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x9, 0x0) mmap(&(0x7f0000000000/0xa000)=nil, 0xa000, 0x2, 0x2172, 0xffffffffffffffff, 0x0) syz_mount_image$reiserfs(0x0, 0x0, 0x8000, 0x3, &(0x7f0000000300)=[{&(0x7f0000000540)="21d37ef07e82e237fbe1b40158d20e242c5ea1f9d9edc6b9395250085d6dfa486982e82d4ce1a5e2bc00d29383bae640de", 0x31, 0x7}, {&(0x7f0000000240)="c43f281f483aa6cd83e40e59d53f177299d285bbe5d90aab2b56a76f9db49d86afa5a0f601ba9b3502de5f3724f3ec00927151f928f668b362052950a2e8f16baec29875fdad59395e86a1050c368933e3ed5a17d76bd7bded793436ea207885f395ace3fc12126c205b170be392c1645233ef01f9661090706a65f63b4845dc2884a20711a8024ad4af44aeec9db33991dae38d95cdb7132970d0d4dec58b9d46d378", 0xa3, 0x6}, {&(0x7f0000000380)="05f82c760d277896dd8c9891a41aafe24124891a32a238c3c78696d112aa09f3ae5c54b0c08676da5db7f358c72dfaca9a5d90860b4ae363c9a921c47965d339c23408a6d9b31a23aee27822f0a140d8e4ec9475a740113f2b9923b46333110e528e0a513151aad34aee1b5310fcf62c1982349253003d6d53aebbe09cf5918668ee682be93b6a671bbc", 0x8a, 0x3}], 0x2000400, &(0x7f0000000440)={[{@balloc_no_unhash_reloc}, {@nolargeio}, {@grpjquota}], [{@obj_role={'obj_role', 0x3d, '^'}}, {@hash}, {@uid_lt}, {@mask={'mask', 0x3d, 'MAY_EXEC'}}, {@uid_lt={'uid<', 0xee00}}, {@smackfsfloor={'smackfsfloor', 0x3d, ':%#[@'}}, {@obj_user={'obj_user', 0x3d, ',\\*),i'}}, {@uid_eq={'uid', 0x3d, 0xee00}}, {@seclabel}, {@uid_lt={'uid<', 0xee00}}]}) [ 379.577364][T17043] loop1: detected capacity change from 0 to 64 06:19:37 executing program 2: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800004, 0x12, r0, 0x0) preadv(r0, &(0x7f00000001c0), 0x0, 0x9, 0x0) r1 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r1, &(0x7f0000000380)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x80, 0x1, 0x9, 0x1, 0x2, 0x3e, 0x7ff, 0x1f2, 0x40, 0x1f4, 0xbfa, 0x3, 0x38, 0x1, 0x5, 0x4, 0x4}, [{0x5, 0x9, 0x6, 0x101, 0x6, 0x4, 0x9, 0x6}, {0x5, 0x3, 0x5e61, 0x80000000, 0xcc3, 0x9, 0x7, 0x8}], "d1660f10e0ac4a6edbf3aa53803c8f57ef2a12069e82553332d2b96d67f2dbc5b04959dad57c303d876233684f5e9ad402a193da791e11122f2cccbf10d6d499f5e16385d09f63891a965d80bcb68b551fabffb4bf0b5c372b4d69cdefac988201a40429a8d0dc699820193afcab08070fde89c22e16b43dde5e37d9a3df0cd352e8667f163774d9dc3c79571e5100046281", ['\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00']}, 0x842) 06:19:37 executing program 0: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800004, 0x12, r0, 0x0) preadv(r0, 0x0, 0x0, 0x9, 0x0) syz_mount_image$reiserfs(&(0x7f0000000140), &(0x7f0000000180)='./file0\x00', 0x0, 0x0, &(0x7f0000000300), 0x0, &(0x7f0000000440)={[{@balloc_no_unhash_reloc}], [{@obj_role={'obj_role', 0x3d, '^'}}, {@hash}, {@uid_lt}, {@mask={'mask', 0x3d, 'MAY_EXEC'}}, {@uid_lt={'uid<', 0xee00}}, {@smackfsfloor={'smackfsfloor', 0x3d, ':%#[@'}}, {@obj_user={'obj_user', 0x3d, ',\\*),i'}}, {@uid_eq={'uid', 0x3d, 0xee00}}, {@seclabel}, {@uid_lt={'uid<', 0xee00}}]}) 06:19:37 executing program 3: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800004, 0x12, r0, 0x0) preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x9, 0x0) mmap(&(0x7f0000000000/0xa000)=nil, 0xa000, 0x2, 0x2172, 0xffffffffffffffff, 0x0) syz_mount_image$reiserfs(0x0, &(0x7f0000000180)='./file0\x00', 0x0, 0x0, &(0x7f0000000300), 0x0, &(0x7f0000000440)={[{@balloc_no_unhash_reloc}], [{@obj_role={'obj_role', 0x3d, '^'}}, {@hash}, {@uid_lt}, {@mask={'mask', 0x3d, 'MAY_EXEC'}}, {@uid_lt={'uid<', 0xee00}}, {@smackfsfloor={'smackfsfloor', 0x3d, ':%#[@'}}, {@obj_user={'obj_user', 0x3d, ',\\*),i'}}, {@uid_eq={'uid', 0x3d, 0xee00}}, {@seclabel}, {@uid_lt={'uid<', 0xee00}}]}) 06:19:37 executing program 1: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800004, 0x12, r0, 0x0) preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x9, 0x0) mmap(&(0x7f0000000000/0xa000)=nil, 0xa000, 0x2, 0x2172, 0xffffffffffffffff, 0x0) syz_mount_image$reiserfs(0x0, &(0x7f0000000180)='./file0\x00', 0x0, 0x3, &(0x7f0000000300)=[{&(0x7f0000000540)="21d37ef07e82e237fbe1b40158d20e242c5ea1f9d9edc6b9395250085d6dfa486982e82d4ce1a5e2bc00d29383bae640de", 0x31, 0x7}, {&(0x7f0000000240)="c43f281f483aa6cd83e40e59d53f177299d285bbe5d90aab2b56a76f9db49d86afa5a0f601ba9b3502de5f3724f3ec00927151f928f668b362052950a2e8f16baec29875fdad59395e86a1050c368933e3ed5a17d76bd7bded793436ea207885f395ace3fc12126c205b170be392c1645233ef01f9661090706a65f63b4845dc2884a20711a8024ad4af44aeec9db33991dae38d95cdb7132970d0d4dec58b9d46d378", 0xa3, 0x6}, {&(0x7f0000000380)="05f82c760d277896dd8c9891a41aafe24124891a32a238c3c78696d112aa09f3ae5c54b0c08676da5db7f358c72dfaca9a5d90860b4ae363c9a921c47965d339c23408a6d9b31a23aee27822f0a140d8e4ec9475a740113f2b9923b46333110e528e0a513151aad34aee1b5310fcf62c1982349253003d6d53aebbe09cf5918668ee682be93b6a671bbc", 0x8a, 0x3}], 0x2000400, &(0x7f0000000440)={[{@balloc_no_unhash_reloc}, {@nolargeio}, {@grpjquota}], [{@obj_role={'obj_role', 0x3d, '^'}}, {@hash}, {@uid_lt}, {@mask={'mask', 0x3d, 'MAY_EXEC'}}, {@uid_lt={'uid<', 0xee00}}, {@smackfsfloor={'smackfsfloor', 0x3d, ':%#[@'}}, {@obj_user={'obj_user', 0x3d, ',\\*),i'}}, {@uid_eq={'uid', 0x3d, 0xee00}}, {@seclabel}, {@uid_lt={'uid<', 0xee00}}]}) 06:19:37 executing program 3: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800004, 0x12, r0, 0x0) preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x9, 0x0) mmap(&(0x7f0000000000/0xa000)=nil, 0xa000, 0x2, 0x2172, 0xffffffffffffffff, 0x0) syz_mount_image$reiserfs(&(0x7f0000000140), 0x0, 0x0, 0x0, &(0x7f0000000300), 0x0, &(0x7f0000000440)={[{@balloc_no_unhash_reloc}], [{@obj_role={'obj_role', 0x3d, '^'}}, {@hash}, {@uid_lt}, {@mask={'mask', 0x3d, 'MAY_EXEC'}}, {@uid_lt={'uid<', 0xee00}}, {@smackfsfloor={'smackfsfloor', 0x3d, ':%#[@'}}, {@obj_user={'obj_user', 0x3d, ',\\*),i'}}, {@uid_eq={'uid', 0x3d, 0xee00}}, {@seclabel}, {@uid_lt={'uid<', 0xee00}}]}) 06:19:37 executing program 0: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800004, 0x12, r0, 0x0) preadv(r0, &(0x7f00000001c0), 0x0, 0x9, 0x0) syz_mount_image$reiserfs(&(0x7f0000000140), &(0x7f0000000180)='./file0\x00', 0x0, 0x0, &(0x7f0000000300), 0x0, &(0x7f0000000440)={[{@balloc_no_unhash_reloc}], [{@obj_role={'obj_role', 0x3d, '^'}}, {@hash}, {@uid_lt}, {@mask={'mask', 0x3d, 'MAY_EXEC'}}, {@uid_lt={'uid<', 0xee00}}, {@smackfsfloor={'smackfsfloor', 0x3d, ':%#[@'}}, {@obj_user={'obj_user', 0x3d, ',\\*),i'}}, {@uid_eq={'uid', 0x3d, 0xee00}}, {@seclabel}, {@uid_lt={'uid<', 0xee00}}]}) 06:19:37 executing program 1: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800004, 0x12, r0, 0x0) preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x9, 0x0) mmap(&(0x7f0000000000/0xa000)=nil, 0xa000, 0x2, 0x2172, 0xffffffffffffffff, 0x0) syz_mount_image$reiserfs(0x0, &(0x7f0000000180)='./file0\x00', 0x0, 0x3, &(0x7f0000000300)=[{&(0x7f0000000540)="21d37ef07e82e237fbe1b40158d20e242c5ea1f9d9edc6b9395250085d6dfa486982e82d4ce1a5e2bc00d29383bae640de", 0x31, 0x7}, {&(0x7f0000000240)="c43f281f483aa6cd83e40e59d53f177299d285bbe5d90aab2b56a76f9db49d86afa5a0f601ba9b3502de5f3724f3ec00927151f928f668b362052950a2e8f16baec29875fdad59395e86a1050c368933e3ed5a17d76bd7bded793436ea207885f395ace3fc12126c205b170be392c1645233ef01f9661090706a65f63b4845dc2884a20711a8024ad4af44aeec9db33991dae38d95cdb7132970d0d4dec58b9d46d378", 0xa3, 0x6}, {&(0x7f0000000380)="05f82c760d277896dd8c9891a41aafe24124891a32a238c3c78696d112aa09f3ae5c54b0c08676da5db7f358c72dfaca9a5d90860b4ae363c9a921c47965d339c23408a6d9b31a23aee27822f0a140d8e4ec9475a740113f2b9923b46333110e528e0a513151aad34aee1b5310fcf62c1982349253003d6d53aebbe09cf5918668ee682be93b6a671bbc", 0x8a, 0x3}], 0x2000400, &(0x7f0000000440)={[{@balloc_no_unhash_reloc}, {@nolargeio}, {@grpjquota}], [{@obj_role={'obj_role', 0x3d, '^'}}, {@hash}, {@uid_lt}, {@mask={'mask', 0x3d, 'MAY_EXEC'}}, {@uid_lt={'uid<', 0xee00}}, {@smackfsfloor={'smackfsfloor', 0x3d, ':%#[@'}}, {@obj_user={'obj_user', 0x3d, ',\\*),i'}}, {@uid_eq={'uid', 0x3d, 0xee00}}, {@seclabel}, {@uid_lt={'uid<', 0xee00}}]}) 06:19:37 executing program 3: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800004, 0x12, r0, 0x0) preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x9, 0x0) mmap(&(0x7f0000000000/0xa000)=nil, 0xa000, 0x2, 0x2172, 0xffffffffffffffff, 0x0) syz_mount_image$reiserfs(&(0x7f0000000140), 0x0, 0x0, 0x0, &(0x7f0000000300), 0x0, &(0x7f0000000440)={[{@balloc_no_unhash_reloc}], [{@obj_role={'obj_role', 0x3d, '^'}}, {@hash}, {@uid_lt}, {@mask={'mask', 0x3d, 'MAY_EXEC'}}, {@uid_lt={'uid<', 0xee00}}, {@smackfsfloor={'smackfsfloor', 0x3d, ':%#[@'}}, {@obj_user={'obj_user', 0x3d, ',\\*),i'}}, {@uid_eq={'uid', 0x3d, 0xee00}}, {@seclabel}, {@uid_lt={'uid<', 0xee00}}]}) 06:19:38 executing program 2: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800004, 0x12, r0, 0x0) preadv(r0, &(0x7f00000001c0), 0x0, 0x9, 0x0) r1 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r1, &(0x7f0000000380)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x80, 0x1, 0x9, 0x1, 0x2, 0x3e, 0x7ff, 0x1f2, 0x40, 0x1f4, 0xbfa, 0x3, 0x38, 0x1, 0x5, 0x4, 0x4}, [{0x5, 0x9, 0x6, 0x101, 0x6, 0x4, 0x9, 0x6}, {0x5, 0x3, 0x5e61, 0x80000000, 0xcc3, 0x9, 0x7, 0x8}], "d1660f10e0ac4a6edbf3aa53803c8f57ef2a12069e82553332d2b96d67f2dbc5b04959dad57c303d876233684f5e9ad402a193da791e11122f2cccbf10d6d499f5e16385d09f63891a965d80bcb68b551fabffb4bf0b5c372b4d69cdefac988201a40429a8d0dc699820193afcab08070fde89c22e16b43dde5e37d9a3df0cd352e8667f163774d9dc3c79571e5100046281", ['\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00']}, 0x842) 06:19:38 executing program 0: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800004, 0x12, r0, 0x0) preadv(r0, &(0x7f00000001c0), 0x0, 0x9, 0x0) syz_mount_image$reiserfs(&(0x7f0000000140), &(0x7f0000000180)='./file0\x00', 0x0, 0x0, &(0x7f0000000300), 0x0, &(0x7f0000000440)={[{@balloc_no_unhash_reloc}], [{@obj_role={'obj_role', 0x3d, '^'}}, {@hash}, {@uid_lt}, {@mask={'mask', 0x3d, 'MAY_EXEC'}}, {@uid_lt={'uid<', 0xee00}}, {@smackfsfloor={'smackfsfloor', 0x3d, ':%#[@'}}, {@obj_user={'obj_user', 0x3d, ',\\*),i'}}, {@uid_eq={'uid', 0x3d, 0xee00}}, {@seclabel}, {@uid_lt={'uid<', 0xee00}}]}) 06:19:38 executing program 1: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800004, 0x12, r0, 0x0) preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x9, 0x0) mmap(&(0x7f0000000000/0xa000)=nil, 0xa000, 0x2, 0x2172, 0xffffffffffffffff, 0x0) syz_mount_image$reiserfs(0x0, &(0x7f0000000180)='./file0\x00', 0x0, 0x3, &(0x7f0000000300)=[{&(0x7f0000000540)="21d37ef07e82e237fbe1b40158d20e242c5ea1f9d9edc6b9395250085d6dfa486982e82d4ce1a5e2bc00d29383bae640de", 0x31, 0x7}, {&(0x7f0000000240)="c43f281f483aa6cd83e40e59d53f177299d285bbe5d90aab2b56a76f9db49d86afa5a0f601ba9b3502de5f3724f3ec00927151f928f668b362052950a2e8f16baec29875fdad59395e86a1050c368933e3ed5a17d76bd7bded793436ea207885f395ace3fc12126c205b170be392c1645233ef01f9661090706a65f63b4845dc2884a20711a8024ad4af44aeec9db33991dae38d95cdb7132970d0d4dec58b9d46d378", 0xa3, 0x6}, {&(0x7f0000000380)="05f82c760d277896dd8c9891a41aafe24124891a32a238c3c78696d112aa09f3ae5c54b0c08676da5db7f358c72dfaca9a5d90860b4ae363c9a921c47965d339c23408a6d9b31a23aee27822f0a140d8e4ec9475a740113f2b9923b46333110e528e0a513151aad34aee1b5310fcf62c1982349253003d6d53aebbe09cf5918668ee682be93b6a671bbc", 0x8a, 0x3}], 0x2000400, &(0x7f0000000440)={[{@balloc_no_unhash_reloc}, {@nolargeio}, {@grpjquota}], [{@obj_role={'obj_role', 0x3d, '^'}}, {@hash}, {@uid_lt}, {@mask={'mask', 0x3d, 'MAY_EXEC'}}, {@uid_lt={'uid<', 0xee00}}, {@smackfsfloor={'smackfsfloor', 0x3d, ':%#[@'}}, {@obj_user={'obj_user', 0x3d, ',\\*),i'}}, {@uid_eq={'uid', 0x3d, 0xee00}}, {@seclabel}, {@uid_lt={'uid<', 0xee00}}]}) 06:19:38 executing program 3: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800004, 0x12, r0, 0x0) preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x9, 0x0) mmap(&(0x7f0000000000/0xa000)=nil, 0xa000, 0x2, 0x2172, 0xffffffffffffffff, 0x0) syz_mount_image$reiserfs(&(0x7f0000000140), 0x0, 0x0, 0x0, &(0x7f0000000300), 0x0, &(0x7f0000000440)={[{@balloc_no_unhash_reloc}], [{@obj_role={'obj_role', 0x3d, '^'}}, {@hash}, {@uid_lt}, {@mask={'mask', 0x3d, 'MAY_EXEC'}}, {@uid_lt={'uid<', 0xee00}}, {@smackfsfloor={'smackfsfloor', 0x3d, ':%#[@'}}, {@obj_user={'obj_user', 0x3d, ',\\*),i'}}, {@uid_eq={'uid', 0x3d, 0xee00}}, {@seclabel}, {@uid_lt={'uid<', 0xee00}}]}) 06:19:38 executing program 3: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800004, 0x12, r0, 0x0) preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x9, 0x0) mmap(&(0x7f0000000000/0xa000)=nil, 0xa000, 0x2, 0x2172, 0xffffffffffffffff, 0x0) syz_mount_image$reiserfs(&(0x7f0000000140), &(0x7f0000000180)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000440)={[{@balloc_no_unhash_reloc}], [{@obj_role={'obj_role', 0x3d, '^'}}, {@hash}, {@uid_lt}, {@mask={'mask', 0x3d, 'MAY_EXEC'}}, {@uid_lt={'uid<', 0xee00}}, {@smackfsfloor={'smackfsfloor', 0x3d, ':%#[@'}}, {@obj_user={'obj_user', 0x3d, ',\\*),i'}}, {@uid_eq={'uid', 0x3d, 0xee00}}, {@seclabel}, {@uid_lt={'uid<', 0xee00}}]}) 06:19:38 executing program 0: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800004, 0x12, r0, 0x0) preadv(r0, &(0x7f00000001c0), 0x0, 0x9, 0x0) syz_mount_image$reiserfs(&(0x7f0000000140), &(0x7f0000000180)='./file0\x00', 0x0, 0x0, &(0x7f0000000300), 0x0, &(0x7f0000000440)={[{@balloc_no_unhash_reloc}], [{@obj_role={'obj_role', 0x3d, '^'}}, {@hash}, {@uid_lt}, {@mask={'mask', 0x3d, 'MAY_EXEC'}}, {@uid_lt={'uid<', 0xee00}}, {@smackfsfloor={'smackfsfloor', 0x3d, ':%#[@'}}, {@obj_user={'obj_user', 0x3d, ',\\*),i'}}, {@uid_eq={'uid', 0x3d, 0xee00}}, {@seclabel}, {@uid_lt={'uid<', 0xee00}}]}) 06:19:38 executing program 1: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800004, 0x12, r0, 0x0) preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x9, 0x0) mmap(&(0x7f0000000000/0xa000)=nil, 0xa000, 0x2, 0x2172, 0xffffffffffffffff, 0x0) syz_mount_image$reiserfs(0x0, &(0x7f0000000180)='./file0\x00', 0x8000, 0x0, 0x0, 0x2000400, &(0x7f0000000440)={[{@balloc_no_unhash_reloc}, {@nolargeio}, {@grpjquota}], [{@obj_role={'obj_role', 0x3d, '^'}}, {@hash}, {@uid_lt}, {@mask={'mask', 0x3d, 'MAY_EXEC'}}, {@uid_lt={'uid<', 0xee00}}, {@smackfsfloor={'smackfsfloor', 0x3d, ':%#[@'}}, {@obj_user={'obj_user', 0x3d, ',\\*),i'}}, {@uid_eq={'uid', 0x3d, 0xee00}}, {@seclabel}, {@uid_lt={'uid<', 0xee00}}]}) 06:19:38 executing program 3: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800004, 0x12, r0, 0x0) preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x9, 0x0) mmap(&(0x7f0000000000/0xa000)=nil, 0xa000, 0x2, 0x2172, 0xffffffffffffffff, 0x0) syz_mount_image$reiserfs(&(0x7f0000000140), &(0x7f0000000180)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000440)={[{@balloc_no_unhash_reloc}], [{@obj_role={'obj_role', 0x3d, '^'}}, {@hash}, {@uid_lt}, {@mask={'mask', 0x3d, 'MAY_EXEC'}}, {@uid_lt={'uid<', 0xee00}}, {@smackfsfloor={'smackfsfloor', 0x3d, ':%#[@'}}, {@obj_user={'obj_user', 0x3d, ',\\*),i'}}, {@uid_eq={'uid', 0x3d, 0xee00}}, {@seclabel}, {@uid_lt={'uid<', 0xee00}}]}) 06:19:39 executing program 2: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800004, 0x12, r0, 0x0) preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x0, 0x0) r1 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r1, &(0x7f0000000380)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x80, 0x1, 0x9, 0x1, 0x2, 0x3e, 0x7ff, 0x1f2, 0x40, 0x1f4, 0xbfa, 0x3, 0x38, 0x1, 0x5, 0x4, 0x4}, [{0x5, 0x9, 0x6, 0x101, 0x6, 0x4, 0x9, 0x6}, {0x5, 0x3, 0x5e61, 0x80000000, 0xcc3, 0x9, 0x7, 0x8}], "d1660f10e0ac4a6edbf3aa53803c8f57ef2a12069e82553332d2b96d67f2dbc5b04959dad57c303d876233684f5e9ad402a193da791e11122f2cccbf10d6d499f5e16385d09f63891a965d80bcb68b551fabffb4bf0b5c372b4d69cdefac988201a40429a8d0dc699820193afcab08070fde89c22e16b43dde5e37d9a3df0cd352e8667f163774d9dc3c79571e5100046281", ['\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00']}, 0x842) 06:19:39 executing program 1: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800004, 0x12, r0, 0x0) preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x9, 0x0) mmap(&(0x7f0000000000/0xa000)=nil, 0xa000, 0x2, 0x2172, 0xffffffffffffffff, 0x0) syz_mount_image$reiserfs(0x0, &(0x7f0000000180)='./file0\x00', 0x8000, 0x0, 0x0, 0x2000400, &(0x7f0000000440)={[{@balloc_no_unhash_reloc}, {@nolargeio}, {@grpjquota}], [{@obj_role={'obj_role', 0x3d, '^'}}, {@hash}, {@uid_lt}, {@mask={'mask', 0x3d, 'MAY_EXEC'}}, {@uid_lt={'uid<', 0xee00}}, {@smackfsfloor={'smackfsfloor', 0x3d, ':%#[@'}}, {@obj_user={'obj_user', 0x3d, ',\\*),i'}}, {@uid_eq={'uid', 0x3d, 0xee00}}, {@seclabel}, {@uid_lt={'uid<', 0xee00}}]}) 06:19:39 executing program 3: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800004, 0x12, r0, 0x0) preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x9, 0x0) mmap(&(0x7f0000000000/0xa000)=nil, 0xa000, 0x2, 0x2172, 0xffffffffffffffff, 0x0) syz_mount_image$reiserfs(&(0x7f0000000140), &(0x7f0000000180)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000440)={[{@balloc_no_unhash_reloc}], [{@obj_role={'obj_role', 0x3d, '^'}}, {@hash}, {@uid_lt}, {@mask={'mask', 0x3d, 'MAY_EXEC'}}, {@uid_lt={'uid<', 0xee00}}, {@smackfsfloor={'smackfsfloor', 0x3d, ':%#[@'}}, {@obj_user={'obj_user', 0x3d, ',\\*),i'}}, {@uid_eq={'uid', 0x3d, 0xee00}}, {@seclabel}, {@uid_lt={'uid<', 0xee00}}]}) 06:19:39 executing program 0: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800004, 0x12, r0, 0x0) preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x0, 0x0) syz_mount_image$reiserfs(&(0x7f0000000140), &(0x7f0000000180)='./file0\x00', 0x0, 0x0, &(0x7f0000000300), 0x0, &(0x7f0000000440)={[{@balloc_no_unhash_reloc}], [{@obj_role={'obj_role', 0x3d, '^'}}, {@hash}, {@uid_lt}, {@mask={'mask', 0x3d, 'MAY_EXEC'}}, {@uid_lt={'uid<', 0xee00}}, {@smackfsfloor={'smackfsfloor', 0x3d, ':%#[@'}}, {@obj_user={'obj_user', 0x3d, ',\\*),i'}}, {@uid_eq={'uid', 0x3d, 0xee00}}, {@seclabel}, {@uid_lt={'uid<', 0xee00}}]}) 06:19:39 executing program 1: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800004, 0x12, r0, 0x0) preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x9, 0x0) mmap(&(0x7f0000000000/0xa000)=nil, 0xa000, 0x2, 0x2172, 0xffffffffffffffff, 0x0) syz_mount_image$reiserfs(0x0, &(0x7f0000000180)='./file0\x00', 0x8000, 0x0, 0x0, 0x2000400, &(0x7f0000000440)={[{@balloc_no_unhash_reloc}, {@nolargeio}, {@grpjquota}], [{@obj_role={'obj_role', 0x3d, '^'}}, {@hash}, {@uid_lt}, {@mask={'mask', 0x3d, 'MAY_EXEC'}}, {@uid_lt={'uid<', 0xee00}}, {@smackfsfloor={'smackfsfloor', 0x3d, ':%#[@'}}, {@obj_user={'obj_user', 0x3d, ',\\*),i'}}, {@uid_eq={'uid', 0x3d, 0xee00}}, {@seclabel}, {@uid_lt={'uid<', 0xee00}}]}) 06:19:39 executing program 3: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800004, 0x12, r0, 0x0) preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x9, 0x0) mmap(&(0x7f0000000000/0xa000)=nil, 0xa000, 0x2, 0x2172, 0xffffffffffffffff, 0x0) syz_mount_image$reiserfs(&(0x7f0000000140), &(0x7f0000000180)='./file0\x00', 0x0, 0x0, &(0x7f0000000300), 0x0, 0x0) 06:19:39 executing program 1: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800004, 0x12, r0, 0x0) preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x9, 0x0) mmap(&(0x7f0000000000/0xa000)=nil, 0xa000, 0x2, 0x2172, 0xffffffffffffffff, 0x0) syz_mount_image$reiserfs(0x0, &(0x7f0000000180)='./file0\x00', 0x8000, 0x2, &(0x7f0000000300)=[{&(0x7f0000000540)="21d37ef07e82e237fbe1b40158d20e242c5ea1f9d9edc6b9395250085d6dfa486982e82d4ce1a5e2bc00d29383bae640de", 0x31, 0x7}, {&(0x7f0000000240)="c43f281f483aa6cd83e40e59d53f177299d285bbe5d90aab2b56a76f9db49d86afa5a0f601ba9b3502de5f3724f3ec00927151f928f668b362052950a2e8f16baec29875fdad59395e86a1050c368933e3ed5a17d76bd7bded793436ea207885f395ace3fc12126c205b170be392c1645233ef01f9661090706a65f63b4845dc2884a20711a8024ad4af44aeec9db33991dae38d95cdb7132970d0d4dec58b9d46d378", 0xa3, 0x6}], 0x2000400, &(0x7f0000000440)={[{@balloc_no_unhash_reloc}, {@nolargeio}, {@grpjquota}], [{@obj_role={'obj_role', 0x3d, '^'}}, {@hash}, {@uid_lt}, {@mask={'mask', 0x3d, 'MAY_EXEC'}}, {@uid_lt={'uid<', 0xee00}}, {@smackfsfloor={'smackfsfloor', 0x3d, ':%#[@'}}, {@obj_user={'obj_user', 0x3d, ',\\*),i'}}, {@uid_eq={'uid', 0x3d, 0xee00}}, {@seclabel}, {@uid_lt={'uid<', 0xee00}}]}) 06:19:39 executing program 0: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800004, 0x12, r0, 0x0) preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x0, 0x0) syz_mount_image$reiserfs(&(0x7f0000000140), &(0x7f0000000180)='./file0\x00', 0x0, 0x0, &(0x7f0000000300), 0x0, &(0x7f0000000440)={[{@balloc_no_unhash_reloc}], [{@obj_role={'obj_role', 0x3d, '^'}}, {@hash}, {@uid_lt}, {@mask={'mask', 0x3d, 'MAY_EXEC'}}, {@uid_lt={'uid<', 0xee00}}, {@smackfsfloor={'smackfsfloor', 0x3d, ':%#[@'}}, {@obj_user={'obj_user', 0x3d, ',\\*),i'}}, {@uid_eq={'uid', 0x3d, 0xee00}}, {@seclabel}, {@uid_lt={'uid<', 0xee00}}]}) [ 382.093718][T17143] loop1: detected capacity change from 0 to 64 06:19:40 executing program 2: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800004, 0x12, r0, 0x0) preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x0, 0x0) r1 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r1, &(0x7f0000000380)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x80, 0x1, 0x9, 0x1, 0x2, 0x3e, 0x7ff, 0x1f2, 0x40, 0x1f4, 0xbfa, 0x3, 0x38, 0x1, 0x5, 0x4, 0x4}, [{0x5, 0x9, 0x6, 0x101, 0x6, 0x4, 0x9, 0x6}, {0x5, 0x3, 0x5e61, 0x80000000, 0xcc3, 0x9, 0x7, 0x8}], "d1660f10e0ac4a6edbf3aa53803c8f57ef2a12069e82553332d2b96d67f2dbc5b04959dad57c303d876233684f5e9ad402a193da791e11122f2cccbf10d6d499f5e16385d09f63891a965d80bcb68b551fabffb4bf0b5c372b4d69cdefac988201a40429a8d0dc699820193afcab08070fde89c22e16b43dde5e37d9a3df0cd352e8667f163774d9dc3c79571e5100046281", ['\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00']}, 0x842) 06:19:40 executing program 3: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800004, 0x12, r0, 0x0) preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x9, 0x0) mmap(&(0x7f0000000000/0xa000)=nil, 0xa000, 0x2, 0x2172, 0xffffffffffffffff, 0x0) syz_mount_image$reiserfs(&(0x7f0000000140), &(0x7f0000000180)='./file0\x00', 0x0, 0x0, &(0x7f0000000300), 0x0, 0x0) 06:19:40 executing program 1: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800004, 0x12, r0, 0x0) preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x9, 0x0) mmap(&(0x7f0000000000/0xa000)=nil, 0xa000, 0x2, 0x2172, 0xffffffffffffffff, 0x0) syz_mount_image$reiserfs(0x0, &(0x7f0000000180)='./file0\x00', 0x8000, 0x1, &(0x7f0000000300)=[{&(0x7f0000000540)="21d37ef07e82e237fbe1b40158d20e242c5ea1f9d9edc6b9395250085d6dfa486982e82d4ce1a5e2bc00d29383bae640de", 0x31, 0x7}], 0x2000400, &(0x7f0000000440)={[{@balloc_no_unhash_reloc}, {@nolargeio}, {@grpjquota}], [{@obj_role={'obj_role', 0x3d, '^'}}, {@hash}, {@uid_lt}, {@mask={'mask', 0x3d, 'MAY_EXEC'}}, {@uid_lt={'uid<', 0xee00}}, {@smackfsfloor={'smackfsfloor', 0x3d, ':%#[@'}}, {@obj_user={'obj_user', 0x3d, ',\\*),i'}}, {@uid_eq={'uid', 0x3d, 0xee00}}, {@seclabel}, {@uid_lt={'uid<', 0xee00}}]}) 06:19:40 executing program 0: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800004, 0x12, r0, 0x0) preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x0, 0x0) syz_mount_image$reiserfs(&(0x7f0000000140), &(0x7f0000000180)='./file0\x00', 0x0, 0x0, &(0x7f0000000300), 0x0, &(0x7f0000000440)={[{@balloc_no_unhash_reloc}], [{@obj_role={'obj_role', 0x3d, '^'}}, {@hash}, {@uid_lt}, {@mask={'mask', 0x3d, 'MAY_EXEC'}}, {@uid_lt={'uid<', 0xee00}}, {@smackfsfloor={'smackfsfloor', 0x3d, ':%#[@'}}, {@obj_user={'obj_user', 0x3d, ',\\*),i'}}, {@uid_eq={'uid', 0x3d, 0xee00}}, {@seclabel}, {@uid_lt={'uid<', 0xee00}}]}) 06:19:40 executing program 0: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800004, 0x12, r0, 0x0) preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x9, 0x0) syz_mount_image$reiserfs(0x0, &(0x7f0000000180)='./file0\x00', 0x0, 0x0, &(0x7f0000000300), 0x0, &(0x7f0000000440)={[{@balloc_no_unhash_reloc}], [{@obj_role={'obj_role', 0x3d, '^'}}, {@hash}, {@uid_lt}, {@mask={'mask', 0x3d, 'MAY_EXEC'}}, {@uid_lt={'uid<', 0xee00}}, {@smackfsfloor={'smackfsfloor', 0x3d, ':%#[@'}}, {@obj_user={'obj_user', 0x3d, ',\\*),i'}}, {@uid_eq={'uid', 0x3d, 0xee00}}, {@seclabel}, {@uid_lt={'uid<', 0xee00}}]}) [ 382.899416][T17166] loop1: detected capacity change from 0 to 64 06:19:40 executing program 3: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800004, 0x12, r0, 0x0) preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x9, 0x0) mmap(&(0x7f0000000000/0xa000)=nil, 0xa000, 0x2, 0x2172, 0xffffffffffffffff, 0x0) syz_mount_image$reiserfs(&(0x7f0000000140), &(0x7f0000000180)='./file0\x00', 0x0, 0x0, &(0x7f0000000300), 0x0, 0x0) 06:19:40 executing program 1: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800004, 0x12, r0, 0x0) preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x9, 0x0) mmap(&(0x7f0000000000/0xa000)=nil, 0xa000, 0x2, 0x2172, 0xffffffffffffffff, 0x0) syz_mount_image$reiserfs(0x0, &(0x7f0000000180)='./file0\x00', 0x8000, 0x0, &(0x7f0000000300), 0x2000400, &(0x7f0000000440)={[{@balloc_no_unhash_reloc}, {@nolargeio}, {@grpjquota}], [{@obj_role={'obj_role', 0x3d, '^'}}, {@hash}, {@uid_lt}, {@mask={'mask', 0x3d, 'MAY_EXEC'}}, {@uid_lt={'uid<', 0xee00}}, {@smackfsfloor={'smackfsfloor', 0x3d, ':%#[@'}}, {@obj_user={'obj_user', 0x3d, ',\\*),i'}}, {@uid_eq={'uid', 0x3d, 0xee00}}, {@seclabel}, {@uid_lt={'uid<', 0xee00}}]}) 06:19:40 executing program 0: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800004, 0x12, r0, 0x0) preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x9, 0x0) syz_mount_image$reiserfs(0x0, &(0x7f0000000180)='./file0\x00', 0x0, 0x0, &(0x7f0000000300), 0x0, &(0x7f0000000440)={[{@balloc_no_unhash_reloc}], [{@obj_role={'obj_role', 0x3d, '^'}}, {@hash}, {@uid_lt}, {@mask={'mask', 0x3d, 'MAY_EXEC'}}, {@uid_lt={'uid<', 0xee00}}, {@smackfsfloor={'smackfsfloor', 0x3d, ':%#[@'}}, {@obj_user={'obj_user', 0x3d, ',\\*),i'}}, {@uid_eq={'uid', 0x3d, 0xee00}}, {@seclabel}, {@uid_lt={'uid<', 0xee00}}]}) [ 383.148885][T17179] loop1: detected capacity change from 0 to 64 06:19:41 executing program 3: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800004, 0x12, r0, 0x0) preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x9, 0x0) mmap(&(0x7f0000000000/0xa000)=nil, 0xa000, 0x2, 0x2172, 0xffffffffffffffff, 0x0) syz_mount_image$reiserfs(&(0x7f0000000140), &(0x7f0000000180)='./file0\x00', 0x0, 0x0, &(0x7f0000000300), 0x0, &(0x7f0000000440)={[], [{@obj_role={'obj_role', 0x3d, '^'}}, {@hash}, {@uid_lt}, {@mask={'mask', 0x3d, 'MAY_EXEC'}}, {@uid_lt={'uid<', 0xee00}}, {@smackfsfloor={'smackfsfloor', 0x3d, ':%#[@'}}, {@obj_user={'obj_user', 0x3d, ',\\*),i'}}, {@uid_eq={'uid', 0x3d, 0xee00}}, {@seclabel}, {@uid_lt={'uid<', 0xee00}}]}) 06:19:41 executing program 1: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800004, 0x12, r0, 0x0) preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x9, 0x0) mmap(&(0x7f0000000000/0xa000)=nil, 0xa000, 0x2, 0x2172, 0xffffffffffffffff, 0x0) syz_mount_image$reiserfs(0x0, &(0x7f0000000180)='./file0\x00', 0x8000, 0x0, &(0x7f0000000300), 0x0, &(0x7f0000000440)={[{@balloc_no_unhash_reloc}, {@nolargeio}, {@grpjquota}], [{@obj_role={'obj_role', 0x3d, '^'}}, {@hash}, {@uid_lt}, {@mask={'mask', 0x3d, 'MAY_EXEC'}}, {@uid_lt={'uid<', 0xee00}}, {@smackfsfloor={'smackfsfloor', 0x3d, ':%#[@'}}, {@obj_user={'obj_user', 0x3d, ',\\*),i'}}, {@uid_eq={'uid', 0x3d, 0xee00}}, {@seclabel}, {@uid_lt={'uid<', 0xee00}}]}) 06:19:41 executing program 2: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800004, 0x12, r0, 0x0) preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x0, 0x0) r1 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r1, &(0x7f0000000380)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x80, 0x1, 0x9, 0x1, 0x2, 0x3e, 0x7ff, 0x1f2, 0x40, 0x1f4, 0xbfa, 0x3, 0x38, 0x1, 0x5, 0x4, 0x4}, [{0x5, 0x9, 0x6, 0x101, 0x6, 0x4, 0x9, 0x6}, {0x5, 0x3, 0x5e61, 0x80000000, 0xcc3, 0x9, 0x7, 0x8}], "d1660f10e0ac4a6edbf3aa53803c8f57ef2a12069e82553332d2b96d67f2dbc5b04959dad57c303d876233684f5e9ad402a193da791e11122f2cccbf10d6d499f5e16385d09f63891a965d80bcb68b551fabffb4bf0b5c372b4d69cdefac988201a40429a8d0dc699820193afcab08070fde89c22e16b43dde5e37d9a3df0cd352e8667f163774d9dc3c79571e5100046281", ['\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00']}, 0x842) 06:19:41 executing program 0: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800004, 0x12, r0, 0x0) preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x9, 0x0) syz_mount_image$reiserfs(0x0, &(0x7f0000000180)='./file0\x00', 0x0, 0x0, &(0x7f0000000300), 0x0, &(0x7f0000000440)={[{@balloc_no_unhash_reloc}], [{@obj_role={'obj_role', 0x3d, '^'}}, {@hash}, {@uid_lt}, {@mask={'mask', 0x3d, 'MAY_EXEC'}}, {@uid_lt={'uid<', 0xee00}}, {@smackfsfloor={'smackfsfloor', 0x3d, ':%#[@'}}, {@obj_user={'obj_user', 0x3d, ',\\*),i'}}, {@uid_eq={'uid', 0x3d, 0xee00}}, {@seclabel}, {@uid_lt={'uid<', 0xee00}}]}) [ 383.796865][T17202] REISERFS warning (device loop3): super-6502 reiserfs_getopt: unknown mount option "obj_role=^" [ 383.798709][T17207] loop1: detected capacity change from 0 to 64 06:19:41 executing program 0: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800004, 0x12, r0, 0x0) preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x9, 0x0) syz_mount_image$reiserfs(&(0x7f0000000140), 0x0, 0x0, 0x0, &(0x7f0000000300), 0x0, &(0x7f0000000440)={[{@balloc_no_unhash_reloc}], [{@obj_role={'obj_role', 0x3d, '^'}}, {@hash}, {@uid_lt}, {@mask={'mask', 0x3d, 'MAY_EXEC'}}, {@uid_lt={'uid<', 0xee00}}, {@smackfsfloor={'smackfsfloor', 0x3d, ':%#[@'}}, {@obj_user={'obj_user', 0x3d, ',\\*),i'}}, {@uid_eq={'uid', 0x3d, 0xee00}}, {@seclabel}, {@uid_lt={'uid<', 0xee00}}]}) 06:19:41 executing program 1: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800004, 0x12, r0, 0x0) preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x9, 0x0) mmap(&(0x7f0000000000/0xa000)=nil, 0xa000, 0x2, 0x2172, 0xffffffffffffffff, 0x0) syz_mount_image$reiserfs(0x0, &(0x7f0000000180)='./file0\x00', 0x8000, 0x0, &(0x7f0000000300), 0x0, 0x0) 06:19:41 executing program 3: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800004, 0x12, r0, 0x0) preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x9, 0x0) mmap(&(0x7f0000000000/0xa000)=nil, 0xa000, 0x2, 0x2172, 0xffffffffffffffff, 0x0) syz_mount_image$reiserfs(&(0x7f0000000140), &(0x7f0000000180)='./file0\x00', 0x0, 0x0, &(0x7f0000000300), 0x0, &(0x7f0000000440)={[], [{@obj_role={'obj_role', 0x3d, '^'}}, {@hash}, {@uid_lt}, {@mask={'mask', 0x3d, 'MAY_EXEC'}}, {@uid_lt={'uid<', 0xee00}}, {@smackfsfloor={'smackfsfloor', 0x3d, ':%#[@'}}, {@obj_user={'obj_user', 0x3d, ',\\*),i'}}, {@uid_eq={'uid', 0x3d, 0xee00}}, {@seclabel}, {@uid_lt={'uid<', 0xee00}}]}) [ 384.020955][T17214] loop1: detected capacity change from 0 to 64 [ 384.056385][T17218] REISERFS warning (device loop3): super-6502 reiserfs_getopt: unknown mount option "obj_role=^" 06:19:41 executing program 3: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800004, 0x12, r0, 0x0) preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x9, 0x0) mmap(&(0x7f0000000000/0xa000)=nil, 0xa000, 0x2, 0x2172, 0xffffffffffffffff, 0x0) syz_mount_image$reiserfs(&(0x7f0000000140), &(0x7f0000000180)='./file0\x00', 0x0, 0x0, &(0x7f0000000300), 0x0, &(0x7f0000000440)={[], [{@obj_role={'obj_role', 0x3d, '^'}}, {@hash}, {@uid_lt}, {@mask={'mask', 0x3d, 'MAY_EXEC'}}, {@uid_lt={'uid<', 0xee00}}, {@smackfsfloor={'smackfsfloor', 0x3d, ':%#[@'}}, {@obj_user={'obj_user', 0x3d, ',\\*),i'}}, {@uid_eq={'uid', 0x3d, 0xee00}}, {@seclabel}, {@uid_lt={'uid<', 0xee00}}]}) 06:19:41 executing program 1: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800004, 0x12, r0, 0x0) preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x0, 0x0) mmap(&(0x7f0000000000/0xa000)=nil, 0xa000, 0x2, 0x2172, 0xffffffffffffffff, 0x0) syz_mount_image$reiserfs(0x0, &(0x7f0000000180)='./file0\x00', 0x8000, 0x3, &(0x7f0000000300)=[{&(0x7f0000000540)="21d37ef07e82e237fbe1b40158d20e242c5ea1f9d9edc6b9395250085d6dfa486982e82d4ce1a5e2bc00d29383bae640de", 0x31, 0x7}, {&(0x7f0000000240)="c43f281f483aa6cd83e40e59d53f177299d285bbe5d90aab2b56a76f9db49d86afa5a0f601ba9b3502de5f3724f3ec00927151f928f668b362052950a2e8f16baec29875fdad59395e86a1050c368933e3ed5a17d76bd7bded793436ea207885f395ace3fc12126c205b170be392c1645233ef01f9661090706a65f63b4845dc2884a20711a8024ad4af44aeec9db33991dae38d95cdb7132970d0d4dec58b9d46d378", 0xa3, 0x6}, {&(0x7f0000000380)="05f82c760d277896dd8c9891a41aafe24124891a32a238c3c78696d112aa09f3ae5c54b0c08676da5db7f358c72dfaca9a5d90860b4ae363c9a921c47965d339c23408a6d9b31a23aee27822f0a140d8e4ec9475a740113f2b9923b46333110e528e0a513151aad34aee1b5310fcf62c1982349253003d6d53aebbe09cf5918668ee682be93b6a671bbc", 0x8a, 0x3}], 0x2000400, &(0x7f0000000440)={[{@balloc_no_unhash_reloc}, {@nolargeio}, {@grpjquota}], [{@obj_role={'obj_role', 0x3d, '^'}}, {@hash}, {@uid_lt}, {@mask={'mask', 0x3d, 'MAY_EXEC'}}, {@uid_lt={'uid<', 0xee00}}, {@smackfsfloor={'smackfsfloor', 0x3d, ':%#[@'}}, {@obj_user={'obj_user', 0x3d, ',\\*),i'}}, {@uid_eq={'uid', 0x3d, 0xee00}}, {@seclabel}, {@uid_lt={'uid<', 0xee00}}]}) 06:19:41 executing program 0: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800004, 0x12, r0, 0x0) preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x9, 0x0) syz_mount_image$reiserfs(&(0x7f0000000140), 0x0, 0x0, 0x0, &(0x7f0000000300), 0x0, &(0x7f0000000440)={[{@balloc_no_unhash_reloc}], [{@obj_role={'obj_role', 0x3d, '^'}}, {@hash}, {@uid_lt}, {@mask={'mask', 0x3d, 'MAY_EXEC'}}, {@uid_lt={'uid<', 0xee00}}, {@smackfsfloor={'smackfsfloor', 0x3d, ':%#[@'}}, {@obj_user={'obj_user', 0x3d, ',\\*),i'}}, {@uid_eq={'uid', 0x3d, 0xee00}}, {@seclabel}, {@uid_lt={'uid<', 0xee00}}]}) [ 384.301528][T17228] REISERFS warning (device loop3): super-6502 reiserfs_getopt: unknown mount option "obj_role=^" [ 384.329878][T17233] loop1: detected capacity change from 0 to 64 06:19:42 executing program 0: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800004, 0x12, r0, 0x0) preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x9, 0x0) syz_mount_image$reiserfs(&(0x7f0000000140), 0x0, 0x0, 0x0, &(0x7f0000000300), 0x0, &(0x7f0000000440)={[{@balloc_no_unhash_reloc}], [{@obj_role={'obj_role', 0x3d, '^'}}, {@hash}, {@uid_lt}, {@mask={'mask', 0x3d, 'MAY_EXEC'}}, {@uid_lt={'uid<', 0xee00}}, {@smackfsfloor={'smackfsfloor', 0x3d, ':%#[@'}}, {@obj_user={'obj_user', 0x3d, ',\\*),i'}}, {@uid_eq={'uid', 0x3d, 0xee00}}, {@seclabel}, {@uid_lt={'uid<', 0xee00}}]}) 06:19:42 executing program 2: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800004, 0x12, r0, 0x0) preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x9, 0x0) r1 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r1, &(0x7f0000000380)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x80, 0x1, 0x9, 0x1, 0x2, 0x3e, 0x7ff, 0x1f2, 0x40, 0x1f4, 0xbfa, 0x3, 0x38, 0x1, 0x5, 0x4, 0x4}, [{0x5, 0x9, 0x6, 0x101, 0x6, 0x4, 0x9, 0x6}, {0x5, 0x3, 0x5e61, 0x80000000, 0xcc3, 0x9, 0x7, 0x8}], "d1660f10e0ac4a6edbf3aa53803c8f57ef2a12069e82553332d2b96d67f2dbc5b04959dad57c303d876233684f5e9ad402a193da791e11122f2cccbf10d6d499f5e16385d09f63891a965d80bcb68b551fabffb4bf0b5c372b4d69cdefac988201a40429a8d0dc699820193afcab08070fde89c22e16b43dde5e37d9a3df0cd352e8667f163774d9dc3c79571e5100046281", ['\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00']}, 0x842) 06:19:42 executing program 1: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800004, 0x12, r0, 0x0) preadv(r0, &(0x7f00000001c0), 0x0, 0x9, 0x0) mmap(&(0x7f0000000000/0xa000)=nil, 0xa000, 0x2, 0x2172, 0xffffffffffffffff, 0x0) syz_mount_image$reiserfs(0x0, &(0x7f0000000180)='./file0\x00', 0x8000, 0x3, &(0x7f0000000300)=[{&(0x7f0000000540)="21d37ef07e82e237fbe1b40158d20e242c5ea1f9d9edc6b9395250085d6dfa486982e82d4ce1a5e2bc00d29383bae640de", 0x31, 0x7}, {&(0x7f0000000240)="c43f281f483aa6cd83e40e59d53f177299d285bbe5d90aab2b56a76f9db49d86afa5a0f601ba9b3502de5f3724f3ec00927151f928f668b362052950a2e8f16baec29875fdad59395e86a1050c368933e3ed5a17d76bd7bded793436ea207885f395ace3fc12126c205b170be392c1645233ef01f9661090706a65f63b4845dc2884a20711a8024ad4af44aeec9db33991dae38d95cdb7132970d0d4dec58b9d46d378", 0xa3, 0x6}, {&(0x7f0000000380)="05f82c760d277896dd8c9891a41aafe24124891a32a238c3c78696d112aa09f3ae5c54b0c08676da5db7f358c72dfaca9a5d90860b4ae363c9a921c47965d339c23408a6d9b31a23aee27822f0a140d8e4ec9475a740113f2b9923b46333110e528e0a513151aad34aee1b5310fcf62c1982349253003d6d53aebbe09cf5918668ee682be93b6a671bbc", 0x8a, 0x3}], 0x2000400, &(0x7f0000000440)={[{@balloc_no_unhash_reloc}, {@nolargeio}, {@grpjquota}], [{@obj_role={'obj_role', 0x3d, '^'}}, {@hash}, {@uid_lt}, {@mask={'mask', 0x3d, 'MAY_EXEC'}}, {@uid_lt={'uid<', 0xee00}}, {@smackfsfloor={'smackfsfloor', 0x3d, ':%#[@'}}, {@obj_user={'obj_user', 0x3d, ',\\*),i'}}, {@uid_eq={'uid', 0x3d, 0xee00}}, {@seclabel}, {@uid_lt={'uid<', 0xee00}}]}) 06:19:42 executing program 3: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800004, 0x12, r0, 0x0) preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x9, 0x0) mmap(&(0x7f0000000000/0xa000)=nil, 0xa000, 0x2, 0x2172, 0xffffffffffffffff, 0x0) syz_mount_image$reiserfs(&(0x7f0000000140), &(0x7f0000000180)='./file0\x00', 0x0, 0x0, &(0x7f0000000300), 0x0, &(0x7f0000000440)={[{@balloc_no_unhash_reloc}], [{@obj_role={'obj_role', 0x3d, '^'}}, {@hash}, {@uid_lt}, {@mask={'mask', 0x3d, 'MAY_EXEC'}}, {@uid_lt={'uid<', 0xee00}}, {@smackfsfloor={'smackfsfloor', 0x3d, ':%#[@'}}, {@obj_user={'obj_user', 0x3d, ',\\*),i'}}, {@uid_eq={'uid', 0x3d, 0xee00}}, {@seclabel}]}) 06:19:42 executing program 0: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800004, 0x12, r0, 0x0) preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x9, 0x0) syz_mount_image$reiserfs(&(0x7f0000000140), &(0x7f0000000180)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000440)={[{@balloc_no_unhash_reloc}], [{@obj_role={'obj_role', 0x3d, '^'}}, {@hash}, {@uid_lt}, {@mask={'mask', 0x3d, 'MAY_EXEC'}}, {@uid_lt={'uid<', 0xee00}}, {@smackfsfloor={'smackfsfloor', 0x3d, ':%#[@'}}, {@obj_user={'obj_user', 0x3d, ',\\*),i'}}, {@uid_eq={'uid', 0x3d, 0xee00}}, {@seclabel}, {@uid_lt={'uid<', 0xee00}}]}) [ 384.725184][T17252] REISERFS warning (device loop3): super-6502 reiserfs_getopt: unknown mount option "obj_role=^" [ 384.739876][T17254] loop1: detected capacity change from 0 to 64 06:19:42 executing program 0: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800004, 0x12, r0, 0x0) preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x9, 0x0) syz_mount_image$reiserfs(&(0x7f0000000140), &(0x7f0000000180)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000440)={[{@balloc_no_unhash_reloc}], [{@obj_role={'obj_role', 0x3d, '^'}}, {@hash}, {@uid_lt}, {@mask={'mask', 0x3d, 'MAY_EXEC'}}, {@uid_lt={'uid<', 0xee00}}, {@smackfsfloor={'smackfsfloor', 0x3d, ':%#[@'}}, {@obj_user={'obj_user', 0x3d, ',\\*),i'}}, {@uid_eq={'uid', 0x3d, 0xee00}}, {@seclabel}, {@uid_lt={'uid<', 0xee00}}]}) 06:19:42 executing program 3: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800004, 0x12, r0, 0x0) preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x9, 0x0) mmap(&(0x7f0000000000/0xa000)=nil, 0xa000, 0x2, 0x2172, 0xffffffffffffffff, 0x0) syz_mount_image$reiserfs(&(0x7f0000000140), &(0x7f0000000180)='./file0\x00', 0x0, 0x0, &(0x7f0000000300), 0x0, &(0x7f0000000440)={[{@balloc_no_unhash_reloc}], [{@obj_role={'obj_role', 0x3d, '^'}}, {@hash}, {@uid_lt}, {@mask={'mask', 0x3d, 'MAY_EXEC'}}, {@uid_lt={'uid<', 0xee00}}, {@smackfsfloor={'smackfsfloor', 0x3d, ':%#[@'}}, {@obj_user={'obj_user', 0x3d, ',\\*),i'}}, {@uid_eq={'uid', 0x3d, 0xee00}}]}) 06:19:42 executing program 1: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800004, 0x12, r0, 0x0) preadv(r0, 0x0, 0x0, 0x9, 0x0) mmap(&(0x7f0000000000/0xa000)=nil, 0xa000, 0x2, 0x2172, 0xffffffffffffffff, 0x0) syz_mount_image$reiserfs(0x0, &(0x7f0000000180)='./file0\x00', 0x8000, 0x3, &(0x7f0000000300)=[{&(0x7f0000000540)="21d37ef07e82e237fbe1b40158d20e242c5ea1f9d9edc6b9395250085d6dfa486982e82d4ce1a5e2bc00d29383bae640de", 0x31, 0x7}, {&(0x7f0000000240)="c43f281f483aa6cd83e40e59d53f177299d285bbe5d90aab2b56a76f9db49d86afa5a0f601ba9b3502de5f3724f3ec00927151f928f668b362052950a2e8f16baec29875fdad59395e86a1050c368933e3ed5a17d76bd7bded793436ea207885f395ace3fc12126c205b170be392c1645233ef01f9661090706a65f63b4845dc2884a20711a8024ad4af44aeec9db33991dae38d95cdb7132970d0d4dec58b9d46d378", 0xa3, 0x6}, {&(0x7f0000000380)="05f82c760d277896dd8c9891a41aafe24124891a32a238c3c78696d112aa09f3ae5c54b0c08676da5db7f358c72dfaca9a5d90860b4ae363c9a921c47965d339c23408a6d9b31a23aee27822f0a140d8e4ec9475a740113f2b9923b46333110e528e0a513151aad34aee1b5310fcf62c1982349253003d6d53aebbe09cf5918668ee682be93b6a671bbc", 0x8a, 0x3}], 0x2000400, &(0x7f0000000440)={[{@balloc_no_unhash_reloc}, {@nolargeio}, {@grpjquota}], [{@obj_role={'obj_role', 0x3d, '^'}}, {@hash}, {@uid_lt}, {@mask={'mask', 0x3d, 'MAY_EXEC'}}, {@uid_lt={'uid<', 0xee00}}, {@smackfsfloor={'smackfsfloor', 0x3d, ':%#[@'}}, {@obj_user={'obj_user', 0x3d, ',\\*),i'}}, {@uid_eq={'uid', 0x3d, 0xee00}}, {@seclabel}, {@uid_lt={'uid<', 0xee00}}]}) [ 384.995806][T17268] REISERFS warning (device loop3): super-6502 reiserfs_getopt: unknown mount option "obj_role=^" 06:19:42 executing program 0: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800004, 0x12, r0, 0x0) preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x9, 0x0) syz_mount_image$reiserfs(&(0x7f0000000140), &(0x7f0000000180)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000440)={[{@balloc_no_unhash_reloc}], [{@obj_role={'obj_role', 0x3d, '^'}}, {@hash}, {@uid_lt}, {@mask={'mask', 0x3d, 'MAY_EXEC'}}, {@uid_lt={'uid<', 0xee00}}, {@smackfsfloor={'smackfsfloor', 0x3d, ':%#[@'}}, {@obj_user={'obj_user', 0x3d, ',\\*),i'}}, {@uid_eq={'uid', 0x3d, 0xee00}}, {@seclabel}, {@uid_lt={'uid<', 0xee00}}]}) [ 385.012588][T17273] loop1: detected capacity change from 0 to 64 06:19:43 executing program 1: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800004, 0x12, r0, 0x0) preadv(0xffffffffffffffff, &(0x7f00000001c0)=[{0x0}], 0x1, 0x9, 0x0) mmap(&(0x7f0000000000/0xa000)=nil, 0xa000, 0x2, 0x2172, 0xffffffffffffffff, 0x0) syz_mount_image$reiserfs(&(0x7f0000000140), &(0x7f0000000180)='./file0\x00', 0x0, 0x0, &(0x7f0000000300), 0x0, &(0x7f0000000440)={[{@balloc_no_unhash_reloc}], [{@obj_role={'obj_role', 0x3d, '^'}}, {@hash}, {@uid_lt}, {@mask={'mask', 0x3d, 'MAY_EXEC'}}, {@uid_lt={'uid<', 0xee00}}, {@smackfsfloor={'smackfsfloor', 0x3d, ':%#[@'}}, {@obj_user={'obj_user', 0x3d, ',\\*),i'}}, {@uid_eq={'uid', 0x3d, 0xee00}}, {@seclabel}, {@uid_lt={'uid<', 0xee00}}]}) 06:19:43 executing program 0: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800004, 0x12, r0, 0x0) preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x9, 0x0) syz_mount_image$reiserfs(&(0x7f0000000140), &(0x7f0000000180)='./file0\x00', 0x0, 0x0, &(0x7f0000000300), 0x0, 0x0) 06:19:43 executing program 2: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800004, 0x12, r0, 0x0) preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x9, 0x0) syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000380)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x80, 0x1, 0x9, 0x1, 0x2, 0x3e, 0x7ff, 0x1f2, 0x40, 0x1f4, 0xbfa, 0x3, 0x38, 0x1, 0x5, 0x4, 0x4}, [{0x5, 0x9, 0x6, 0x101, 0x6, 0x4, 0x9, 0x6}, {0x5, 0x3, 0x5e61, 0x80000000, 0xcc3, 0x9, 0x7, 0x8}], "d1660f10e0ac4a6edbf3aa53803c8f57ef2a12069e82553332d2b96d67f2dbc5b04959dad57c303d876233684f5e9ad402a193da791e11122f2cccbf10d6d499f5e16385d09f63891a965d80bcb68b551fabffb4bf0b5c372b4d69cdefac988201a40429a8d0dc699820193afcab08070fde89c22e16b43dde5e37d9a3df0cd352e8667f163774d9dc3c79571e5100046281", ['\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00']}, 0x842) 06:19:43 executing program 3: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800004, 0x12, r0, 0x0) preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x9, 0x0) mmap(&(0x7f0000000000/0xa000)=nil, 0xa000, 0x2, 0x2172, 0xffffffffffffffff, 0x0) syz_mount_image$reiserfs(&(0x7f0000000140), &(0x7f0000000180)='./file0\x00', 0x0, 0x0, &(0x7f0000000300), 0x0, &(0x7f0000000440)={[{@balloc_no_unhash_reloc}], [{@obj_role={'obj_role', 0x3d, '^'}}, {@hash}, {@uid_lt}, {@mask={'mask', 0x3d, 'MAY_EXEC'}}, {@uid_lt={'uid<', 0xee00}}, {@smackfsfloor={'smackfsfloor', 0x3d, ':%#[@'}}, {@obj_user={'obj_user', 0x3d, ',\\*),i'}}]}) [ 385.665284][T17287] REISERFS warning (device loop1): super-6502 reiserfs_getopt: unknown mount option "obj_role=^" [ 385.667630][T17288] REISERFS warning (device loop3): super-6502 reiserfs_getopt: unknown mount option "obj_role=^" 06:19:43 executing program 2: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800004, 0x12, r0, 0x0) preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x9, 0x0) syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000380)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x80, 0x1, 0x9, 0x1, 0x2, 0x3e, 0x7ff, 0x1f2, 0x40, 0x1f4, 0xbfa, 0x3, 0x38, 0x1, 0x5, 0x4, 0x4}, [{0x5, 0x9, 0x6, 0x101, 0x6, 0x4, 0x9, 0x6}, {0x5, 0x3, 0x5e61, 0x80000000, 0xcc3, 0x9, 0x7, 0x8}], "d1660f10e0ac4a6edbf3aa53803c8f57ef2a12069e82553332d2b96d67f2dbc5b04959dad57c303d876233684f5e9ad402a193da791e11122f2cccbf10d6d499f5e16385d09f63891a965d80bcb68b551fabffb4bf0b5c372b4d69cdefac988201a40429a8d0dc699820193afcab08070fde89c22e16b43dde5e37d9a3df0cd352e8667f163774d9dc3c79571e5100046281", ['\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00']}, 0x842) 06:19:43 executing program 3: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800004, 0x12, r0, 0x0) preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x9, 0x0) mmap(&(0x7f0000000000/0xa000)=nil, 0xa000, 0x2, 0x2172, 0xffffffffffffffff, 0x0) syz_mount_image$reiserfs(&(0x7f0000000140), &(0x7f0000000180)='./file0\x00', 0x0, 0x0, &(0x7f0000000300), 0x0, &(0x7f0000000440)={[{@balloc_no_unhash_reloc}], [{@obj_role={'obj_role', 0x3d, '^'}}, {@hash}, {@uid_lt}, {@mask={'mask', 0x3d, 'MAY_EXEC'}}, {@uid_lt={'uid<', 0xee00}}, {@smackfsfloor={'smackfsfloor', 0x3d, ':%#[@'}}]}) 06:19:43 executing program 2: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800004, 0x12, r0, 0x0) preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x9, 0x0) syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000380)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x80, 0x1, 0x9, 0x1, 0x2, 0x3e, 0x7ff, 0x1f2, 0x40, 0x1f4, 0xbfa, 0x3, 0x38, 0x1, 0x5, 0x4, 0x4}, [{0x5, 0x9, 0x6, 0x101, 0x6, 0x4, 0x9, 0x6}, {0x5, 0x3, 0x5e61, 0x80000000, 0xcc3, 0x9, 0x7, 0x8}], "d1660f10e0ac4a6edbf3aa53803c8f57ef2a12069e82553332d2b96d67f2dbc5b04959dad57c303d876233684f5e9ad402a193da791e11122f2cccbf10d6d499f5e16385d09f63891a965d80bcb68b551fabffb4bf0b5c372b4d69cdefac988201a40429a8d0dc699820193afcab08070fde89c22e16b43dde5e37d9a3df0cd352e8667f163774d9dc3c79571e5100046281", ['\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00']}, 0x842) 06:19:43 executing program 0: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800004, 0x12, r0, 0x0) preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x9, 0x0) syz_mount_image$reiserfs(&(0x7f0000000140), &(0x7f0000000180)='./file0\x00', 0x0, 0x0, &(0x7f0000000300), 0x0, 0x0) 06:19:43 executing program 1: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800004, 0x12, r0, 0x0) preadv(0xffffffffffffffff, &(0x7f00000001c0)=[{0x0}], 0x1, 0x9, 0x0) mmap(&(0x7f0000000000/0xa000)=nil, 0xa000, 0x2, 0x2172, 0xffffffffffffffff, 0x0) syz_mount_image$reiserfs(0x0, &(0x7f0000000180)='./file0\x00', 0x8000, 0x3, &(0x7f0000000300)=[{&(0x7f0000000540)="21d37ef07e82e237fbe1b40158d20e242c5ea1f9d9edc6b9395250085d6dfa486982e82d4ce1a5e2bc00d29383bae640de", 0x31, 0x7}, {&(0x7f0000000240)="c43f281f483aa6cd83e40e59d53f177299d285bbe5d90aab2b56a76f9db49d86afa5a0f601ba9b3502de5f3724f3ec00927151f928f668b362052950a2e8f16baec29875fdad59395e86a1050c368933e3ed5a17d76bd7bded793436ea207885f395ace3fc12126c205b170be392c1645233ef01f9661090706a65f63b4845dc2884a20711a8024ad4af44aeec9db33991dae38d95cdb7132970d0d4dec58b9d46d378", 0xa3, 0x6}, {&(0x7f0000000380)="05f82c760d277896dd8c9891a41aafe24124891a32a238c3c78696d112aa09f3ae5c54b0c08676da5db7f358c72dfaca9a5d90860b4ae363c9a921c47965d339c23408a6d9b31a23aee27822f0a140d8e4ec9475a740113f2b9923b46333110e528e0a513151aad34aee1b5310fcf62c1982349253003d6d53aebbe09cf5918668ee682be93b6a671bbc", 0x8a, 0x3}], 0x2000400, &(0x7f0000000440)={[{@balloc_no_unhash_reloc}, {@nolargeio}, {@grpjquota}], [{@obj_role={'obj_role', 0x3d, '^'}}, {@hash}, {@uid_lt}, {@mask={'mask', 0x3d, 'MAY_EXEC'}}, {@uid_lt={'uid<', 0xee00}}, {@smackfsfloor={'smackfsfloor', 0x3d, ':%#[@'}}, {@obj_user={'obj_user', 0x3d, ',\\*),i'}}, {@uid_eq={'uid', 0x3d, 0xee00}}, {@seclabel}, {@uid_lt={'uid<', 0xee00}}]}) [ 385.950336][T17307] REISERFS warning (device loop3): super-6502 reiserfs_getopt: unknown mount option "obj_role=^" [ 385.966445][T17311] loop1: detected capacity change from 0 to 64 06:19:43 executing program 2: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800004, 0x12, r0, 0x0) preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x9, 0x0) r1 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r1, 0x0, 0x0) 06:19:43 executing program 0: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800004, 0x12, r0, 0x0) preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x9, 0x0) syz_mount_image$reiserfs(&(0x7f0000000140), &(0x7f0000000180)='./file0\x00', 0x0, 0x0, &(0x7f0000000300), 0x0, 0x0) 06:19:43 executing program 2: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800004, 0x12, r0, 0x0) preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x9, 0x0) r1 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r1, 0x0, 0x0) 06:19:43 executing program 3: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800004, 0x12, r0, 0x0) preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x9, 0x0) mmap(&(0x7f0000000000/0xa000)=nil, 0xa000, 0x2, 0x2172, 0xffffffffffffffff, 0x0) syz_mount_image$reiserfs(&(0x7f0000000140), &(0x7f0000000180)='./file0\x00', 0x0, 0x0, &(0x7f0000000300), 0x0, &(0x7f0000000440)={[{@balloc_no_unhash_reloc}], [{@obj_role={'obj_role', 0x3d, '^'}}, {@hash}, {@uid_lt}, {@mask={'mask', 0x3d, 'MAY_EXEC'}}, {@uid_lt={'uid<', 0xee00}}]}) 06:19:43 executing program 1: mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800004, 0x12, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f00000001c0)=[{0x0}], 0x1, 0x9, 0x0) mmap(&(0x7f0000000000/0xa000)=nil, 0xa000, 0x2, 0x2172, 0xffffffffffffffff, 0x0) syz_mount_image$reiserfs(&(0x7f0000000140), &(0x7f0000000180)='./file0\x00', 0x0, 0x0, &(0x7f0000000300), 0x0, &(0x7f0000000440)={[{@balloc_no_unhash_reloc}], [{@obj_role={'obj_role', 0x3d, '^'}}, {@hash}, {@uid_lt}, {@mask={'mask', 0x3d, 'MAY_EXEC'}}, {@uid_lt={'uid<', 0xee00}}, {@smackfsfloor={'smackfsfloor', 0x3d, ':%#[@'}}, {@obj_user={'obj_user', 0x3d, ',\\*),i'}}, {@uid_eq={'uid', 0x3d, 0xee00}}, {@seclabel}, {@uid_lt={'uid<', 0xee00}}]}) [ 386.206664][T17326] REISERFS warning (device loop3): super-6502 reiserfs_getopt: unknown mount option "obj_role=^" 06:19:43 executing program 2: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800004, 0x12, r0, 0x0) preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x9, 0x0) r1 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r1, 0x0, 0x0) [ 386.262578][T17332] REISERFS warning (device loop1): super-6502 reiserfs_getopt: unknown mount option "obj_role=^" 06:19:43 executing program 0: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800004, 0x12, r0, 0x0) preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x9, 0x0) syz_mount_image$reiserfs(&(0x7f0000000140), &(0x7f0000000180)='./file0\x00', 0x0, 0x0, &(0x7f0000000300), 0x0, &(0x7f0000000440)={[], [{@obj_role={'obj_role', 0x3d, '^'}}, {@hash}, {@uid_lt}, {@mask={'mask', 0x3d, 'MAY_EXEC'}}, {@uid_lt={'uid<', 0xee00}}, {@smackfsfloor={'smackfsfloor', 0x3d, ':%#[@'}}, {@obj_user={'obj_user', 0x3d, ',\\*),i'}}, {@uid_eq={'uid', 0x3d, 0xee00}}, {@seclabel}, {@uid_lt={'uid<', 0xee00}}]}) 06:19:43 executing program 2: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800004, 0x12, r0, 0x0) preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x9, 0x0) r1 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r1, &(0x7f0000000380)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x1, 0x9, 0x1, 0x2, 0x3e, 0x7ff, 0x1f2, 0x40, 0x1f4, 0xbfa, 0x3, 0x38, 0x1, 0x5, 0x4, 0x4}, [{0x5, 0x9, 0x6, 0x101, 0x6, 0x4, 0x9, 0x6}, {0x5, 0x3, 0x5e61, 0x80000000, 0xcc3, 0x9, 0x7, 0x8}], "d1660f10e0ac4a6edbf3aa53803c8f57ef2a12069e82553332d2b96d67f2dbc5b04959dad57c303d876233684f5e9ad402a193da791e11122f2cccbf10d6d499f5e16385d09f63891a965d80bcb68b551fabffb4bf0b5c372b4d69cdefac988201a40429a8d0dc699820193afcab08070fde89c22e16b43dde5e37d9a3df0cd352e8667f163774d9dc3c79571e5100046281", ['\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00']}, 0x842) 06:19:44 executing program 3: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800004, 0x12, r0, 0x0) preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x9, 0x0) mmap(&(0x7f0000000000/0xa000)=nil, 0xa000, 0x2, 0x2172, 0xffffffffffffffff, 0x0) syz_mount_image$reiserfs(&(0x7f0000000140), &(0x7f0000000180)='./file0\x00', 0x0, 0x0, &(0x7f0000000300), 0x0, &(0x7f0000000440)={[{@balloc_no_unhash_reloc}], [{@obj_role={'obj_role', 0x3d, '^'}}, {@hash}, {@uid_lt}, {@mask={'mask', 0x3d, 'MAY_EXEC'}}]}) 06:19:44 executing program 1: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800004, 0x12, 0xffffffffffffffff, 0x0) preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x9, 0x0) mmap(&(0x7f0000000000/0xa000)=nil, 0xa000, 0x2, 0x2172, 0xffffffffffffffff, 0x0) r1 = socket$unix(0x1, 0x1, 0x0) bind$unix(r1, &(0x7f00000001c0)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x56) close(r1) [ 386.662314][T17350] REISERFS warning (device loop3): super-6502 reiserfs_getopt: unknown mount option "obj_role=^" 06:19:44 executing program 1: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800004, 0x12, r0, 0x0) preadv(r0, &(0x7f00000001c0), 0x0, 0x9, 0x0) mmap(&(0x7f0000000000/0xa000)=nil, 0xa000, 0x2, 0x2172, 0xffffffffffffffff, 0x0) syz_mount_image$reiserfs(&(0x7f0000000140), &(0x7f0000000180)='./file0\x00', 0x8000, 0x3, &(0x7f0000000300)=[{&(0x7f0000000540)="21d37ef07e82e237fbe1b40158d20e242c5ea1f9d9edc6b9395250085d6dfa486982e82d4ce1a5e2bc00d29383bae640de", 0x31, 0x7}, {&(0x7f0000000240)="c43f281f483aa6cd83e40e59d53f177299d285bbe5d90aab2b56a76f9db49d86afa5a0f601ba9b3502de5f3724f3ec00927151f928f668b362052950a2e8f16baec29875fdad59395e86a1050c368933e3ed5a17d76bd7bded793436ea207885f395ace3fc12126c205b170be392c1645233ef01f9661090706a65f63b4845dc2884a20711a8024ad4af44aeec9db33991dae38d95cdb7132970d0d4dec58b9d46d378", 0xa3, 0x6}, {&(0x7f0000000380)="05f82c760d277896dd8c9891a41aafe24124891a32a238c3c78696d112aa09f3ae5c54b0c08676da5db7f358c72dfaca9a5d90860b4ae363c9a921c47965d339c23408a6d9b31a23aee27822f0a140d8e4ec9475a740113f2b9923b46333110e528e0a513151aad34aee1b5310fcf62c1982349253003d6d53aebbe09cf5918668ee682be93b6a671bbc", 0x8a, 0x3}], 0x2000400, &(0x7f0000000440)={[{@balloc_no_unhash_reloc}, {@nolargeio}, {@grpjquota}], [{@obj_role={'obj_role', 0x3d, '^'}}, {@hash}, {@uid_lt}, {@mask={'mask', 0x3d, 'MAY_EXEC'}}, {@uid_lt={'uid<', 0xee00}}, {@smackfsfloor={'smackfsfloor', 0x3d, ':%#[@'}}, {@obj_user={'obj_user', 0x3d, ',\\*),i'}}, {@uid_eq={'uid', 0x3d, 0xee00}}, {@seclabel}, {@uid_lt={'uid<', 0xee00}}]}) 06:19:44 executing program 0: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800004, 0x12, r0, 0x0) preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x9, 0x0) syz_mount_image$reiserfs(&(0x7f0000000140), &(0x7f0000000180)='./file0\x00', 0x0, 0x0, &(0x7f0000000300), 0x0, &(0x7f0000000440)={[], [{@obj_role={'obj_role', 0x3d, '^'}}, {@hash}, {@uid_lt}, {@mask={'mask', 0x3d, 'MAY_EXEC'}}, {@uid_lt={'uid<', 0xee00}}, {@smackfsfloor={'smackfsfloor', 0x3d, ':%#[@'}}, {@obj_user={'obj_user', 0x3d, ',\\*),i'}}, {@uid_eq={'uid', 0x3d, 0xee00}}, {@seclabel}]}) 06:19:44 executing program 3: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800004, 0x12, r0, 0x0) preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x9, 0x0) mmap(&(0x7f0000000000/0xa000)=nil, 0xa000, 0x2, 0x2172, 0xffffffffffffffff, 0x0) syz_mount_image$reiserfs(&(0x7f0000000140), &(0x7f0000000180)='./file0\x00', 0x0, 0x0, &(0x7f0000000300), 0x0, &(0x7f0000000440)={[{@balloc_no_unhash_reloc}], [{@obj_role={'obj_role', 0x3d, '^'}}, {@hash}, {@uid_lt}]}) [ 386.775572][T17358] loop1: detected capacity change from 0 to 64 [ 386.794004][T17358] REISERFS warning (device loop1): super-6504 reiserfs_getopt: the option "nolargeio" requires an argument [ 386.794004][T17358] 06:19:44 executing program 0: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800004, 0x12, r0, 0x0) preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x9, 0x0) syz_mount_image$reiserfs(&(0x7f0000000140), &(0x7f0000000180)='./file0\x00', 0x0, 0x0, &(0x7f0000000300), 0x0, &(0x7f0000000440)={[], [{@obj_role={'obj_role', 0x3d, '^'}}, {@hash}, {@uid_lt}, {@mask={'mask', 0x3d, 'MAY_EXEC'}}, {@uid_lt={'uid<', 0xee00}}, {@smackfsfloor={'smackfsfloor', 0x3d, ':%#[@'}}, {@obj_user={'obj_user', 0x3d, ',\\*),i'}}, {@uid_eq={'uid', 0x3d, 0xee00}}]}) [ 386.860174][T17367] REISERFS warning (device loop3): super-6502 reiserfs_getopt: unknown mount option "obj_role=^" 06:19:44 executing program 1: r0 = openat(0xffffffffffffffff, 0x0, 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800004, 0x12, r0, 0x0) preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x9, 0x0) mmap(&(0x7f0000000000/0xa000)=nil, 0xa000, 0x2, 0x2172, 0xffffffffffffffff, 0x0) r1 = socket$unix(0x1, 0x1, 0x0) bind$unix(r1, &(0x7f00000001c0)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x56) close(r1) 06:19:45 executing program 2: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800004, 0x12, r0, 0x0) preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x9, 0x0) r1 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r1, &(0x7f0000000380)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x9, 0x1, 0x2, 0x3e, 0x7ff, 0x1f2, 0x40, 0x1f4, 0xbfa, 0x3, 0x38, 0x1, 0x5, 0x4, 0x4}, [{0x5, 0x9, 0x6, 0x101, 0x6, 0x4, 0x9, 0x6}, {0x5, 0x3, 0x5e61, 0x80000000, 0xcc3, 0x9, 0x7, 0x8}], "d1660f10e0ac4a6edbf3aa53803c8f57ef2a12069e82553332d2b96d67f2dbc5b04959dad57c303d876233684f5e9ad402a193da791e11122f2cccbf10d6d499f5e16385d09f63891a965d80bcb68b551fabffb4bf0b5c372b4d69cdefac988201a40429a8d0dc699820193afcab08070fde89c22e16b43dde5e37d9a3df0cd352e8667f163774d9dc3c79571e5100046281", ['\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00']}, 0x842) 06:19:45 executing program 3: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800004, 0x12, r0, 0x0) preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x9, 0x0) mmap(&(0x7f0000000000/0xa000)=nil, 0xa000, 0x2, 0x2172, 0xffffffffffffffff, 0x0) syz_mount_image$reiserfs(&(0x7f0000000140), &(0x7f0000000180)='./file0\x00', 0x0, 0x0, &(0x7f0000000300), 0x0, &(0x7f0000000440)={[{@balloc_no_unhash_reloc}], [{@obj_role={'obj_role', 0x3d, '^'}}, {@hash}]}) 06:19:45 executing program 0: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800004, 0x12, r0, 0x0) preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x9, 0x0) syz_mount_image$reiserfs(&(0x7f0000000140), &(0x7f0000000180)='./file0\x00', 0x0, 0x0, &(0x7f0000000300), 0x0, &(0x7f0000000440)={[], [{@obj_role={'obj_role', 0x3d, '^'}}, {@hash}, {@uid_lt}, {@mask={'mask', 0x3d, 'MAY_EXEC'}}, {@uid_lt={'uid<', 0xee00}}, {@smackfsfloor={'smackfsfloor', 0x3d, ':%#[@'}}, {@obj_user={'obj_user', 0x3d, ',\\*),i'}}]}) 06:19:45 executing program 1: r0 = openat(0xffffffffffffffff, 0x0, 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800004, 0x12, r0, 0x0) preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x9, 0x0) mmap(&(0x7f0000000000/0xa000)=nil, 0xa000, 0x2, 0x2172, 0xffffffffffffffff, 0x0) r1 = socket$unix(0x1, 0x1, 0x0) bind$unix(r1, &(0x7f00000001c0)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x56) close(r1) [ 387.520205][T17390] REISERFS warning (device loop3): super-6502 reiserfs_getopt: unknown mount option "obj_role=^" 06:19:45 executing program 1: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800004, 0x12, r0, 0x0) preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x9, 0x0) mmap(&(0x7f0000000000/0xa000)=nil, 0xa000, 0x2, 0x2172, 0xffffffffffffffff, 0x0) socketpair(0x1e, 0x80005, 0x0, &(0x7f0000000340)={0x0, 0x0}) r3 = syz_open_dev$hidraw(&(0x7f0000000040), 0xffff2859, 0x6080) r4 = socket$unix(0x1, 0x1, 0x0) bind$unix(r4, &(0x7f00000001c0)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x56) r5 = socket$unix(0x1, 0x1, 0x0) bind$unix(r5, &(0x7f00000001c0)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x56) r6 = syz_open_dev$loop(&(0x7f0000000080), 0x4, 0x4001) r7 = openat$khugepaged_scan(0xffffff9c, &(0x7f00000000c0), 0x1, 0x0) poll(&(0x7f0000000140)=[{r1, 0x3}, {r3, 0x10a2}, {r4, 0x1}, {r2, 0x64c}, {r5, 0x9041}, {r6, 0x140}, {r7, 0x10}], 0x7, 0xff) close(r1) 06:19:45 executing program 3: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800004, 0x12, r0, 0x0) preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x9, 0x0) mmap(&(0x7f0000000000/0xa000)=nil, 0xa000, 0x2, 0x2172, 0xffffffffffffffff, 0x0) syz_mount_image$reiserfs(&(0x7f0000000140), &(0x7f0000000180)='./file0\x00', 0x0, 0x0, &(0x7f0000000300), 0x0, &(0x7f0000000440)={[{@balloc_no_unhash_reloc}], [{@obj_role={'obj_role', 0x3d, '^'}}]}) 06:19:45 executing program 0: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800004, 0x12, r0, 0x0) preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x9, 0x0) syz_mount_image$reiserfs(&(0x7f0000000140), &(0x7f0000000180)='./file0\x00', 0x0, 0x0, &(0x7f0000000300), 0x0, &(0x7f0000000440)={[], [{@obj_role={'obj_role', 0x3d, '^'}}, {@hash}, {@uid_lt}, {@mask={'mask', 0x3d, 'MAY_EXEC'}}, {@uid_lt={'uid<', 0xee00}}, {@smackfsfloor={'smackfsfloor', 0x3d, ':%#[@'}}]}) [ 387.842327][T17404] REISERFS warning (device loop3): super-6502 reiserfs_getopt: unknown mount option "obj_role=^" 06:19:45 executing program 1: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800004, 0x12, r0, 0x0) preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x9, 0x0) mmap(&(0x7f0000000000/0xa000)=nil, 0xa000, 0x2, 0x2172, 0xffffffffffffffff, 0x0) socketpair(0x1e, 0x80005, 0x0, &(0x7f0000000340)={0x0, 0x0}) r3 = syz_open_dev$hidraw(&(0x7f0000000040), 0xffff2859, 0x6080) r4 = socket$unix(0x1, 0x1, 0x0) bind$unix(r4, &(0x7f00000001c0)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x56) r5 = socket$unix(0x1, 0x1, 0x0) bind$unix(r5, &(0x7f00000001c0)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x56) r6 = syz_open_dev$loop(&(0x7f0000000080), 0x4, 0x4001) r7 = openat$khugepaged_scan(0xffffff9c, &(0x7f00000000c0), 0x1, 0x0) poll(&(0x7f0000000140)=[{r1, 0x3}, {r3, 0x10a2}, {r4, 0x1}, {r2, 0x64c}, {r5, 0x9041}, {r6, 0x140}, {r7, 0x10}], 0x7, 0xff) close(r1) 06:19:45 executing program 0: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800004, 0x12, r0, 0x0) preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x9, 0x0) syz_mount_image$reiserfs(&(0x7f0000000140), &(0x7f0000000180)='./file0\x00', 0x0, 0x0, &(0x7f0000000300), 0x0, &(0x7f0000000440)={[], [{@obj_role={'obj_role', 0x3d, '^'}}, {@hash}, {@uid_lt}, {@mask={'mask', 0x3d, 'MAY_EXEC'}}, {@uid_lt={'uid<', 0xee00}}]}) 06:19:45 executing program 3: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800004, 0x12, r0, 0x0) preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x9, 0x0) mmap(&(0x7f0000000000/0xa000)=nil, 0xa000, 0x2, 0x2172, 0xffffffffffffffff, 0x0) syz_mount_image$reiserfs(&(0x7f0000000140), &(0x7f0000000180)='./file0\x00', 0x0, 0x0, &(0x7f0000000300), 0x0, &(0x7f0000000440)={[{@balloc_no_unhash_reloc}]}) 06:19:45 executing program 2: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800004, 0x12, r0, 0x0) preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x9, 0x0) r1 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r1, &(0x7f0000000380)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x1, 0x2, 0x3e, 0x7ff, 0x1f2, 0x40, 0x1f4, 0xbfa, 0x3, 0x38, 0x1, 0x5, 0x4, 0x4}, [{0x5, 0x9, 0x6, 0x101, 0x6, 0x4, 0x9, 0x6}, {0x5, 0x3, 0x5e61, 0x80000000, 0xcc3, 0x9, 0x7, 0x8}], "d1660f10e0ac4a6edbf3aa53803c8f57ef2a12069e82553332d2b96d67f2dbc5b04959dad57c303d876233684f5e9ad402a193da791e11122f2cccbf10d6d499f5e16385d09f63891a965d80bcb68b551fabffb4bf0b5c372b4d69cdefac988201a40429a8d0dc699820193afcab08070fde89c22e16b43dde5e37d9a3df0cd352e8667f163774d9dc3c79571e5100046281", ['\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00']}, 0x842) 06:19:45 executing program 1: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800004, 0x12, r0, 0x0) preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x9, 0x0) mmap(&(0x7f0000000000/0xa000)=nil, 0xa000, 0x2, 0x2172, 0xffffffffffffffff, 0x0) socketpair(0x1e, 0x80005, 0x0, &(0x7f0000000340)={0x0, 0x0}) r3 = syz_open_dev$hidraw(&(0x7f0000000040), 0xffff2859, 0x6080) r4 = socket$unix(0x1, 0x1, 0x0) bind$unix(r4, &(0x7f00000001c0)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x56) r5 = socket$unix(0x1, 0x1, 0x0) bind$unix(r5, &(0x7f00000001c0)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x56) r6 = syz_open_dev$loop(&(0x7f0000000080), 0x4, 0x4001) r7 = openat$khugepaged_scan(0xffffff9c, &(0x7f00000000c0), 0x1, 0x0) poll(&(0x7f0000000140)=[{r1, 0x3}, {r3, 0x10a2}, {r4, 0x1}, {r2, 0x64c}, {r5, 0x9041}, {r6, 0x140}, {r7, 0x10}], 0x7, 0xff) close(r1) [ 388.384949][T17421] REISERFS warning (device loop3): super-6502 reiserfs_getopt: unknown mount option "" 06:19:46 executing program 1: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800004, 0x12, r0, 0x0) preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x9, 0x0) mmap(&(0x7f0000000000/0xa000)=nil, 0xa000, 0x2, 0x2172, 0xffffffffffffffff, 0x0) socketpair(0x1e, 0x80005, 0x0, &(0x7f0000000340)={0x0, 0x0}) r3 = syz_open_dev$hidraw(&(0x7f0000000040), 0xffff2859, 0x6080) r4 = socket$unix(0x1, 0x1, 0x0) bind$unix(r4, &(0x7f00000001c0)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x56) r5 = socket$unix(0x1, 0x1, 0x0) bind$unix(r5, &(0x7f00000001c0)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x56) r6 = syz_open_dev$loop(&(0x7f0000000080), 0x4, 0x4001) r7 = openat$khugepaged_scan(0xffffff9c, &(0x7f00000000c0), 0x1, 0x0) poll(&(0x7f0000000140)=[{r1, 0x3}, {r3, 0x10a2}, {r4, 0x1}, {r2, 0x64c}, {r5, 0x9041}, {r6, 0x140}, {r7, 0x10}], 0x7, 0xff) 06:19:46 executing program 3: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800004, 0x12, r0, 0x0) preadv(r0, &(0x7f00000001c0), 0x0, 0x9, 0x0) mmap(&(0x7f0000000000/0xa000)=nil, 0xa000, 0x2, 0x2172, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x11, 0x4, &(0x7f00000000c0)=@framed={{}, [@call={0x85, 0x0, 0x0, 0x7b}]}, &(0x7f00000001c0)='syzkaller\x00', 0x4, 0x8f, &(0x7f00000002c0)=""/143, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) 06:19:46 executing program 0: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800004, 0x12, r0, 0x0) preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x9, 0x0) syz_mount_image$reiserfs(&(0x7f0000000140), &(0x7f0000000180)='./file0\x00', 0x0, 0x0, &(0x7f0000000300), 0x0, &(0x7f0000000440)={[], [{@obj_role={'obj_role', 0x3d, '^'}}, {@hash}, {@uid_lt}, {@mask={'mask', 0x3d, 'MAY_EXEC'}}]}) 06:19:46 executing program 1: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800004, 0x12, r0, 0x0) preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x9, 0x0) mmap(&(0x7f0000000000/0xa000)=nil, 0xa000, 0x2, 0x2172, 0xffffffffffffffff, 0x0) socketpair(0x1e, 0x80005, 0x0, &(0x7f0000000340)={0x0, 0x0}) r3 = syz_open_dev$hidraw(&(0x7f0000000040), 0xffff2859, 0x6080) r4 = socket$unix(0x1, 0x1, 0x0) bind$unix(r4, &(0x7f00000001c0)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x56) r5 = socket$unix(0x1, 0x1, 0x0) bind$unix(r5, &(0x7f00000001c0)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x56) r6 = syz_open_dev$loop(&(0x7f0000000080), 0x4, 0x4001) poll(&(0x7f0000000140)=[{r1, 0x3}, {r3, 0x10a2}, {r4, 0x1}, {r2, 0x64c}, {r5, 0x9041}, {r6, 0x140}, {0xffffffffffffffff, 0x10}], 0x7, 0xff) 06:19:46 executing program 0: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800004, 0x12, r0, 0x0) preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x9, 0x0) syz_mount_image$reiserfs(&(0x7f0000000140), &(0x7f0000000180)='./file0\x00', 0x0, 0x0, &(0x7f0000000300), 0x0, &(0x7f0000000440)={[], [{@obj_role={'obj_role', 0x3d, '^'}}, {@hash}, {@uid_lt}]}) 06:19:46 executing program 1: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800004, 0x12, r0, 0x0) preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x9, 0x0) mmap(&(0x7f0000000000/0xa000)=nil, 0xa000, 0x2, 0x2172, 0xffffffffffffffff, 0x0) socketpair(0x1e, 0x80005, 0x0, &(0x7f0000000340)={0x0, 0x0}) r3 = syz_open_dev$hidraw(&(0x7f0000000040), 0xffff2859, 0x6080) r4 = socket$unix(0x1, 0x1, 0x0) bind$unix(r4, &(0x7f00000001c0)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x56) r5 = socket$unix(0x1, 0x1, 0x0) bind$unix(r5, &(0x7f00000001c0)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x56) r6 = syz_open_dev$loop(&(0x7f0000000080), 0x4, 0x4001) poll(&(0x7f0000000140)=[{r1, 0x3}, {r3, 0x10a2}, {r4, 0x1}, {r2, 0x64c}, {r5, 0x9041}, {r6, 0x140}, {0xffffffffffffffff, 0x10}], 0x7, 0xff) 06:19:46 executing program 1: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800004, 0x12, r0, 0x0) preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x9, 0x0) mmap(&(0x7f0000000000/0xa000)=nil, 0xa000, 0x2, 0x2172, 0xffffffffffffffff, 0x0) socketpair(0x1e, 0x80005, 0x0, &(0x7f0000000340)={0x0, 0x0}) r3 = syz_open_dev$hidraw(&(0x7f0000000040), 0xffff2859, 0x6080) r4 = socket$unix(0x1, 0x1, 0x0) bind$unix(r4, &(0x7f00000001c0)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x56) r5 = socket$unix(0x1, 0x1, 0x0) bind$unix(r5, &(0x7f00000001c0)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x56) r6 = syz_open_dev$loop(&(0x7f0000000080), 0x4, 0x4001) poll(&(0x7f0000000140)=[{r1, 0x3}, {r3, 0x10a2}, {r4, 0x1}, {r2, 0x64c}, {r5, 0x9041}, {r6, 0x140}, {0xffffffffffffffff, 0x10}], 0x7, 0xff) 06:19:46 executing program 3: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800004, 0x12, r0, 0x0) preadv(r0, &(0x7f00000001c0), 0x0, 0x9, 0x0) mmap(&(0x7f0000000000/0xa000)=nil, 0xa000, 0x2, 0x2172, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x11, 0x4, &(0x7f00000000c0)=@framed={{}, [@call={0x85, 0x0, 0x0, 0x7b}]}, &(0x7f00000001c0)='syzkaller\x00', 0x4, 0x8f, &(0x7f00000002c0)=""/143, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) 06:19:46 executing program 2: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800004, 0x12, r0, 0x0) preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x9, 0x0) r1 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r1, &(0x7f0000000380)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x3e, 0x7ff, 0x1f2, 0x40, 0x1f4, 0xbfa, 0x3, 0x38, 0x1, 0x5, 0x4, 0x4}, [{0x5, 0x9, 0x6, 0x101, 0x6, 0x4, 0x9, 0x6}, {0x5, 0x3, 0x5e61, 0x80000000, 0xcc3, 0x9, 0x7, 0x8}], "d1660f10e0ac4a6edbf3aa53803c8f57ef2a12069e82553332d2b96d67f2dbc5b04959dad57c303d876233684f5e9ad402a193da791e11122f2cccbf10d6d499f5e16385d09f63891a965d80bcb68b551fabffb4bf0b5c372b4d69cdefac988201a40429a8d0dc699820193afcab08070fde89c22e16b43dde5e37d9a3df0cd352e8667f163774d9dc3c79571e5100046281", ['\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00']}, 0x842) 06:19:46 executing program 0: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800004, 0x12, r0, 0x0) preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x9, 0x0) syz_mount_image$reiserfs(&(0x7f0000000140), &(0x7f0000000180)='./file0\x00', 0x0, 0x0, &(0x7f0000000300), 0x0, &(0x7f0000000440)={[], [{@obj_role={'obj_role', 0x3d, '^'}}, {@hash}]}) 06:19:47 executing program 1: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800004, 0x12, r0, 0x0) preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x9, 0x0) mmap(&(0x7f0000000000/0xa000)=nil, 0xa000, 0x2, 0x2172, 0xffffffffffffffff, 0x0) socketpair(0x1e, 0x80005, 0x0, &(0x7f0000000340)={0x0, 0x0}) r3 = syz_open_dev$hidraw(&(0x7f0000000040), 0xffff2859, 0x6080) r4 = socket$unix(0x1, 0x1, 0x0) bind$unix(r4, &(0x7f00000001c0)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x56) r5 = socket$unix(0x1, 0x1, 0x0) bind$unix(r5, &(0x7f00000001c0)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x56) r6 = openat$khugepaged_scan(0xffffff9c, &(0x7f00000000c0), 0x1, 0x0) poll(&(0x7f0000000140)=[{r1, 0x3}, {r3, 0x10a2}, {r4, 0x1}, {r2, 0x64c}, {r5, 0x9041}, {0xffffffffffffffff, 0x140}, {r6, 0x10}], 0x7, 0xff) 06:19:47 executing program 3: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800004, 0x12, r0, 0x0) preadv(r0, 0x0, 0x0, 0x9, 0x0) mmap(&(0x7f0000000000/0xa000)=nil, 0xa000, 0x2, 0x2172, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x11, 0x4, &(0x7f00000000c0)=@framed={{}, [@call={0x85, 0x0, 0x0, 0x7b}]}, &(0x7f00000001c0)='syzkaller\x00', 0x4, 0x8f, &(0x7f00000002c0)=""/143, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) 06:19:47 executing program 0: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800004, 0x12, r0, 0x0) preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x9, 0x0) syz_mount_image$reiserfs(&(0x7f0000000140), &(0x7f0000000180)='./file0\x00', 0x0, 0x0, &(0x7f0000000300), 0x0, &(0x7f0000000440)={[], [{@obj_role={'obj_role', 0x3d, '^'}}]}) 06:19:47 executing program 1: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800004, 0x12, r0, 0x0) preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x9, 0x0) mmap(&(0x7f0000000000/0xa000)=nil, 0xa000, 0x2, 0x2172, 0xffffffffffffffff, 0x0) socketpair(0x1e, 0x80005, 0x0, &(0x7f0000000340)={0x0, 0x0}) r3 = syz_open_dev$hidraw(&(0x7f0000000040), 0xffff2859, 0x6080) r4 = socket$unix(0x1, 0x1, 0x0) bind$unix(r4, &(0x7f00000001c0)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x56) r5 = socket$unix(0x1, 0x1, 0x0) r6 = openat$khugepaged_scan(0xffffff9c, &(0x7f00000000c0), 0x1, 0x0) poll(&(0x7f0000000140)=[{r1, 0x3}, {r3, 0x10a2}, {r4, 0x1}, {r2, 0x64c}, {r5, 0x9041}, {0xffffffffffffffff, 0x140}, {r6, 0x10}], 0x7, 0xff) 06:19:47 executing program 3: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800004, 0x10, r0, 0x0) preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x9, 0x0) ioctl$CDROMPLAYBLK(r0, 0x5317, &(0x7f0000000040)={0x1, 0x1}) mmap(&(0x7f0000000000/0xa000)=nil, 0xa000, 0x2, 0x2172, 0xffffffffffffffff, 0x0) socketpair(0x1e, 0x80005, 0x0, &(0x7f0000000340)={0x0, 0x0}) close(r1) 06:19:47 executing program 1: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800004, 0x12, r0, 0x0) preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x9, 0x0) mmap(&(0x7f0000000000/0xa000)=nil, 0xa000, 0x2, 0x2172, 0xffffffffffffffff, 0x0) socketpair(0x1e, 0x80005, 0x0, &(0x7f0000000340)={0x0, 0x0}) r3 = syz_open_dev$hidraw(&(0x7f0000000040), 0xffff2859, 0x6080) r4 = socket$unix(0x1, 0x1, 0x0) bind$unix(r4, &(0x7f00000001c0)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x56) r5 = openat$khugepaged_scan(0xffffff9c, &(0x7f00000000c0), 0x1, 0x0) poll(&(0x7f0000000140)=[{r1, 0x3}, {r3, 0x10a2}, {r4, 0x1}, {r2, 0x64c}, {0xffffffffffffffff, 0x9041}, {0xffffffffffffffff, 0x140}, {r5, 0x10}], 0x7, 0xff) 06:19:47 executing program 3: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x18d000, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800004, 0x12, r0, 0x0) preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x9, 0x0) mmap(&(0x7f0000000000/0xa000)=nil, 0xa000, 0x2, 0x2172, 0xffffffffffffffff, 0x0) socketpair(0x1e, 0x80005, 0x0, &(0x7f0000000340)={0x0, 0x0}) 06:19:47 executing program 2: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800004, 0x12, r0, 0x0) preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x9, 0x0) r1 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r1, &(0x7f0000000380)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3e, 0x7ff, 0x1f2, 0x40, 0x1f4, 0xbfa, 0x3, 0x38, 0x1, 0x5, 0x4, 0x4}, [{0x5, 0x9, 0x6, 0x101, 0x6, 0x4, 0x9, 0x6}, {0x5, 0x3, 0x5e61, 0x80000000, 0xcc3, 0x9, 0x7, 0x8}], "d1660f10e0ac4a6edbf3aa53803c8f57ef2a12069e82553332d2b96d67f2dbc5b04959dad57c303d876233684f5e9ad402a193da791e11122f2cccbf10d6d499f5e16385d09f63891a965d80bcb68b551fabffb4bf0b5c372b4d69cdefac988201a40429a8d0dc699820193afcab08070fde89c22e16b43dde5e37d9a3df0cd352e8667f163774d9dc3c79571e5100046281", ['\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00']}, 0x842) 06:19:47 executing program 1: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800004, 0x12, r0, 0x0) preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x9, 0x0) mmap(&(0x7f0000000000/0xa000)=nil, 0xa000, 0x2, 0x2172, 0xffffffffffffffff, 0x0) socketpair(0x1e, 0x80005, 0x0, &(0x7f0000000340)={0x0, 0x0}) r3 = syz_open_dev$hidraw(&(0x7f0000000040), 0xffff2859, 0x6080) r4 = socket$unix(0x1, 0x1, 0x0) bind$unix(r4, &(0x7f00000001c0)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x56) r5 = openat$khugepaged_scan(0xffffff9c, &(0x7f00000000c0), 0x1, 0x0) poll(&(0x7f0000000140)=[{r1, 0x3}, {r3, 0x10a2}, {r4, 0x1}, {r2, 0x64c}, {0xffffffffffffffff, 0x9041}, {0xffffffffffffffff, 0x140}, {r5, 0x10}], 0x7, 0xff) 06:19:47 executing program 0: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800004, 0x12, r0, 0x0) preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x9, 0x0) syz_mount_image$reiserfs(&(0x7f0000000140), &(0x7f0000000180)='./file0\x00', 0x0, 0x0, &(0x7f0000000300), 0x0, &(0x7f0000000440)) 06:19:47 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='\xe9\x1fq\x89Y\x1e\x923aK\x00', 0x442600, 0x8b) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800004, 0x12, r0, 0x0) preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x9, 0x0) mmap(&(0x7f0000000000/0xa000)=nil, 0xa000, 0x2, 0x2172, 0xffffffffffffffff, 0x0) r1 = socket$unix(0x1, 0x1, 0x0) bind$unix(r1, &(0x7f00000001c0)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x56) mmap(&(0x7f0000356000/0x4000)=nil, 0x4000, 0x800002, 0x2010, r1, 0x6d366000) socketpair(0x1e, 0x80005, 0x0, &(0x7f0000000340)={0x0, 0x0}) mmap(&(0x7f00001bd000/0x4000)=nil, 0x4000, 0x0, 0x30, r3, 0x946ad000) close(r2) r4 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x11, 0x4, &(0x7f00000000c0)=@framed={{}, [@call={0x85, 0x0, 0x0, 0x7b}]}, &(0x7f00000001c0)='syzkaller\x00', 0x4, 0x8f, &(0x7f00000002c0)=""/143, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='ext4_es_lookup_extent_exit\x00', r4}, 0x10) preadv(r4, &(0x7f0000000140)=[{&(0x7f0000000040)=""/80, 0x50}, {&(0x7f00000000c0)=""/69, 0x45}], 0x2, 0x78, 0x65) 06:19:47 executing program 1: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800004, 0x12, r0, 0x0) preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x9, 0x0) mmap(&(0x7f0000000000/0xa000)=nil, 0xa000, 0x2, 0x2172, 0xffffffffffffffff, 0x0) socketpair(0x1e, 0x80005, 0x0, &(0x7f0000000340)={0x0, 0x0}) r3 = syz_open_dev$hidraw(&(0x7f0000000040), 0xffff2859, 0x6080) r4 = socket$unix(0x1, 0x1, 0x0) bind$unix(r4, &(0x7f00000001c0)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x56) r5 = openat$khugepaged_scan(0xffffff9c, &(0x7f00000000c0), 0x1, 0x0) poll(&(0x7f0000000140)=[{r1, 0x3}, {r3, 0x10a2}, {r4, 0x1}, {r2, 0x64c}, {0xffffffffffffffff, 0x9041}, {0xffffffffffffffff, 0x140}, {r5, 0x10}], 0x7, 0xff) 06:19:48 executing program 0: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800004, 0x12, r0, 0x0) preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x9, 0x0) mmap(&(0x7f0000000000/0xa000)=nil, 0xa000, 0x2, 0x2172, 0xffffffffffffffff, 0x0) socketpair(0x1e, 0x80005, 0x0, &(0x7f0000000340)={0x0, 0x0}) r3 = syz_open_dev$hidraw(&(0x7f0000000040), 0xffff2859, 0x6080) r4 = socket$unix(0x1, 0x1, 0x0) bind$unix(r4, &(0x7f00000001c0)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x56) r5 = openat$khugepaged_scan(0xffffff9c, &(0x7f00000000c0), 0x1, 0x0) poll(&(0x7f0000000140)=[{r1, 0x3}, {r3, 0x10a2}, {r4, 0x1}, {r2, 0x64c}, {0xffffffffffffffff, 0x9041}, {0xffffffffffffffff, 0x140}, {r5, 0x10}], 0x7, 0xff) 06:19:48 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='\xe9\x1fq\x89Y\x1e\x923aK\x00', 0x442600, 0x8b) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800004, 0x12, r0, 0x0) preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x9, 0x0) mmap(&(0x7f0000000000/0xa000)=nil, 0xa000, 0x2, 0x2172, 0xffffffffffffffff, 0x0) r1 = socket$unix(0x1, 0x1, 0x0) bind$unix(r1, &(0x7f00000001c0)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x56) mmap(&(0x7f0000356000/0x4000)=nil, 0x4000, 0x800002, 0x2010, r1, 0x6d366000) socketpair(0x1e, 0x80005, 0x0, &(0x7f0000000340)={0x0, 0x0}) mmap(&(0x7f00001bd000/0x4000)=nil, 0x4000, 0x0, 0x30, r3, 0x946ad000) close(r2) r4 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x11, 0x4, &(0x7f00000000c0)=@framed={{}, [@call={0x85, 0x0, 0x0, 0x7b}]}, &(0x7f00000001c0)='syzkaller\x00', 0x4, 0x8f, &(0x7f00000002c0)=""/143, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='ext4_es_lookup_extent_exit\x00', r4}, 0x10) preadv(r4, &(0x7f0000000140)=[{&(0x7f0000000040)=""/80, 0x50}, {&(0x7f00000000c0)=""/69, 0x45}], 0x2, 0x78, 0x65) 06:19:48 executing program 1: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800004, 0x12, r0, 0x0) preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x9, 0x0) mmap(&(0x7f0000000000/0xa000)=nil, 0xa000, 0x2, 0x2172, 0xffffffffffffffff, 0x0) socketpair(0x1e, 0x80005, 0x0, &(0x7f0000000340)={0x0, 0x0}) r3 = syz_open_dev$hidraw(&(0x7f0000000040), 0xffff2859, 0x6080) r4 = socket$unix(0x1, 0x1, 0x0) r5 = socket$unix(0x1, 0x1, 0x0) r6 = openat$khugepaged_scan(0xffffff9c, &(0x7f00000000c0), 0x1, 0x0) poll(&(0x7f0000000140)=[{r1, 0x3}, {r3, 0x10a2}, {r4, 0x1}, {r2, 0x64c}, {r5, 0x9041}, {0xffffffffffffffff, 0x140}, {r6, 0x10}], 0x7, 0xff) 06:19:48 executing program 2: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800004, 0x12, r0, 0x0) preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x9, 0x0) r1 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r1, &(0x7f0000000380)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7ff, 0x1f2, 0x40, 0x1f4, 0xbfa, 0x3, 0x38, 0x1, 0x5, 0x4, 0x4}, [{0x5, 0x9, 0x6, 0x101, 0x6, 0x4, 0x9, 0x6}, {0x5, 0x3, 0x5e61, 0x80000000, 0xcc3, 0x9, 0x7, 0x8}], "d1660f10e0ac4a6edbf3aa53803c8f57ef2a12069e82553332d2b96d67f2dbc5b04959dad57c303d876233684f5e9ad402a193da791e11122f2cccbf10d6d499f5e16385d09f63891a965d80bcb68b551fabffb4bf0b5c372b4d69cdefac988201a40429a8d0dc699820193afcab08070fde89c22e16b43dde5e37d9a3df0cd352e8667f163774d9dc3c79571e5100046281", ['\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00']}, 0x842) 06:19:48 executing program 0: mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800004, 0x12, 0xffffffffffffffff, 0x0) r0 = socket$unix(0x1, 0x1, 0x0) bind$unix(r0, &(0x7f00000001c0)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x56) preadv(r0, &(0x7f00000001c0), 0x0, 0x3a7, 0x0) mmap(&(0x7f0000000000/0xa000)=nil, 0xa000, 0x2, 0x2172, 0xffffffffffffffff, 0x0) socketpair(0x1e, 0x80005, 0x0, &(0x7f0000000340)={0x0, 0x0}) close(r1) 06:19:48 executing program 1: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800004, 0x12, r0, 0x0) preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x9, 0x0) mmap(&(0x7f0000000000/0xa000)=nil, 0xa000, 0x2, 0x2172, 0xffffffffffffffff, 0x0) socketpair(0x1e, 0x80005, 0x0, &(0x7f0000000340)={0x0, 0x0}) r3 = syz_open_dev$hidraw(&(0x7f0000000040), 0xffff2859, 0x6080) r4 = socket$unix(0x1, 0x1, 0x0) r5 = openat$khugepaged_scan(0xffffff9c, &(0x7f00000000c0), 0x1, 0x0) poll(&(0x7f0000000140)=[{r1, 0x3}, {r3, 0x10a2}, {0xffffffffffffffff, 0x1}, {r2, 0x64c}, {r4, 0x9041}, {0xffffffffffffffff, 0x140}, {r5, 0x10}], 0x7, 0xff) 06:19:48 executing program 3: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800004, 0x10, r0, 0x0) preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x9, 0x0) mmap(&(0x7f0000000000/0xa000)=nil, 0xa000, 0x2, 0x2172, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x11, 0x4, &(0x7f00000000c0)=@framed={{}, [@call={0x85, 0x0, 0x0, 0x7b}]}, &(0x7f00000001c0)='syzkaller\x00', 0x4, 0x8f, &(0x7f00000002c0)=""/143, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) 06:19:48 executing program 1: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800004, 0x12, r0, 0x0) preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x9, 0x0) mmap(&(0x7f0000000000/0xa000)=nil, 0xa000, 0x2, 0x2172, 0xffffffffffffffff, 0x0) socketpair(0x1e, 0x80005, 0x0, &(0x7f0000000340)={0x0, 0x0}) r3 = syz_open_dev$hidraw(&(0x7f0000000040), 0xffff2859, 0x6080) r4 = socket$unix(0x1, 0x1, 0x0) r5 = openat$khugepaged_scan(0xffffff9c, &(0x7f00000000c0), 0x1, 0x0) poll(&(0x7f0000000140)=[{r1, 0x3}, {r3, 0x10a2}, {0xffffffffffffffff, 0x1}, {r2, 0x64c}, {r4, 0x9041}, {0xffffffffffffffff, 0x140}, {r5, 0x10}], 0x7, 0xff) 06:19:48 executing program 0: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800004, 0x100010, r0, 0x0) preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x9, 0x0) mmap(&(0x7f000033f000/0x1000)=nil, 0x1000, 0x2, 0x2172, 0xffffffffffffffff, 0x0) ioctl$DRM_IOCTL_MODE_SETPROPERTY(r0, 0xc01064ab, &(0x7f0000000040)={0x3, 0x3ff, 0x3}) socketpair(0x1e, 0x80005, 0x0, &(0x7f0000000340)={0x0, 0x0}) close(r1) 06:19:48 executing program 3: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800004, 0x12, r0, 0x0) preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x9, 0x0) mmap(&(0x7f0000000000/0xa000)=nil, 0xa000, 0x2, 0x2172, 0xffffffffffffffff, 0x0) socketpair(0x1e, 0x80005, 0xfffff000, &(0x7f0000000340)={0x0, 0x0}) 06:19:48 executing program 0: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800004, 0x12, r0, 0x0) mmap(&(0x7f0000000000/0xa000)=nil, 0xa000, 0x2, 0x2172, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x11, 0x4, &(0x7f00000000c0)=@framed={{}, [@call={0x85, 0x0, 0x0, 0x7b}]}, &(0x7f00000001c0)='syzkaller\x00', 0x4, 0x8f, &(0x7f00000002c0)=""/143, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) 06:19:49 executing program 1: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800004, 0x12, r0, 0x0) preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x9, 0x0) mmap(&(0x7f0000000000/0xa000)=nil, 0xa000, 0x2, 0x2172, 0xffffffffffffffff, 0x0) socketpair(0x1e, 0x80005, 0x0, &(0x7f0000000340)={0x0, 0x0}) r3 = syz_open_dev$hidraw(&(0x7f0000000040), 0xffff2859, 0x6080) r4 = socket$unix(0x1, 0x1, 0x0) r5 = openat$khugepaged_scan(0xffffff9c, &(0x7f00000000c0), 0x1, 0x0) poll(&(0x7f0000000140)=[{r1, 0x3}, {r3, 0x10a2}, {0xffffffffffffffff, 0x1}, {r2, 0x64c}, {r4, 0x9041}, {0xffffffffffffffff, 0x140}, {r5, 0x10}], 0x7, 0xff) 06:19:49 executing program 3: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800004, 0x12, r0, 0x0) preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x9, 0x0) mmap(&(0x7f0000000000/0xa000)=nil, 0xa000, 0x2, 0x2172, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x11, 0x4, &(0x7f00000000c0)=@framed={{}, [@call={0x85, 0x0, 0x0, 0x7b}]}, &(0x7f00000001c0)='syzkaller\x00', 0x4, 0x8f, &(0x7f00000002c0)=""/143, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) 06:19:49 executing program 2: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800004, 0x12, r0, 0x0) preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x9, 0x0) r1 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r1, &(0x7f0000000380)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1f2, 0x40, 0x1f4, 0xbfa, 0x3, 0x38, 0x1, 0x5, 0x4, 0x4}, [{0x5, 0x9, 0x6, 0x101, 0x6, 0x4, 0x9, 0x6}, {0x5, 0x3, 0x5e61, 0x80000000, 0xcc3, 0x9, 0x7, 0x8}], "d1660f10e0ac4a6edbf3aa53803c8f57ef2a12069e82553332d2b96d67f2dbc5b04959dad57c303d876233684f5e9ad402a193da791e11122f2cccbf10d6d499f5e16385d09f63891a965d80bcb68b551fabffb4bf0b5c372b4d69cdefac988201a40429a8d0dc699820193afcab08070fde89c22e16b43dde5e37d9a3df0cd352e8667f163774d9dc3c79571e5100046281", ['\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00']}, 0x842) 06:19:49 executing program 0: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800004, 0x12, r0, 0x0) preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x9, 0x0) mmap(&(0x7f0000000000/0xa000)=nil, 0xa000, 0x2, 0x2172, 0xffffffffffffffff, 0x0) socketpair(0x1e, 0x80002, 0x0, &(0x7f0000000340)={0x0, 0x0}) 06:19:49 executing program 1: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800004, 0x12, r0, 0x0) preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x9, 0x0) mmap(&(0x7f0000000000/0xa000)=nil, 0xa000, 0x2, 0x2172, 0xffffffffffffffff, 0x0) socketpair(0x1e, 0x80005, 0x0, &(0x7f0000000340)={0x0, 0x0}) r3 = socket$unix(0x1, 0x1, 0x0) r4 = socket$unix(0x1, 0x1, 0x0) r5 = openat$khugepaged_scan(0xffffff9c, &(0x7f00000000c0), 0x1, 0x0) poll(&(0x7f0000000140)=[{r1, 0x3}, {0xffffffffffffffff, 0x10a2}, {r3, 0x1}, {r2, 0x64c}, {r4, 0x9041}, {0xffffffffffffffff, 0x140}, {r5, 0x10}], 0x7, 0xff) 06:19:49 executing program 0: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800004, 0x12, r0, 0x0) preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x9, 0x0) mmap(&(0x7f0000000000/0xa000)=nil, 0xa000, 0x2, 0x2172, 0xffffffffffffffff, 0x0) socketpair(0x1e, 0x80002, 0x0, &(0x7f0000000340)={0x0, 0x0}) 06:19:49 executing program 3: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x90) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800004, 0x12, r0, 0x0) preadv(r0, &(0x7f00000001c0), 0x20000000000000be, 0x9, 0x0) mmap(&(0x7f0000000000/0xa000)=nil, 0xa000, 0x2, 0x2172, 0xffffffffffffffff, 0x0) socketpair(0x1e, 0x80005, 0x0, &(0x7f0000000340)={0x0, 0x0}) close(r1) 06:19:49 executing program 1: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800004, 0x12, r0, 0x0) preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x9, 0x0) mmap(&(0x7f0000000000/0xa000)=nil, 0xa000, 0x2, 0x2172, 0xffffffffffffffff, 0x0) r1 = socket$unix(0x1, 0x1, 0x0) r2 = socket$unix(0x1, 0x1, 0x0) r3 = openat$khugepaged_scan(0xffffff9c, &(0x7f00000000c0), 0x1, 0x0) poll(&(0x7f0000000140)=[{0xffffffffffffffff, 0x3}, {0xffffffffffffffff, 0x10a2}, {r1, 0x1}, {0xffffffffffffffff, 0x64c}, {r2, 0x9041}, {0xffffffffffffffff, 0x140}, {r3, 0x10}], 0x7, 0xff) 06:19:49 executing program 0: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800004, 0x12, r0, 0x0) preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x9, 0x0) mmap(&(0x7f0000000000/0xa000)=nil, 0xa000, 0x2, 0x2172, 0xffffffffffffffff, 0x0) socketpair(0x1e, 0x80002, 0x0, &(0x7f0000000340)={0x0, 0x0}) 06:19:49 executing program 1: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800004, 0x12, r0, 0x0) preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x9, 0x0) mmap(&(0x7f0000000000/0xa000)=nil, 0xa000, 0x2, 0x2172, 0xffffffffffffffff, 0x0) r1 = socket$unix(0x1, 0x1, 0x0) r2 = socket$unix(0x1, 0x1, 0x0) r3 = openat$khugepaged_scan(0xffffff9c, &(0x7f00000000c0), 0x1, 0x0) poll(&(0x7f0000000140)=[{0xffffffffffffffff, 0x3}, {0xffffffffffffffff, 0x10a2}, {r1, 0x1}, {0xffffffffffffffff, 0x64c}, {r2, 0x9041}, {0xffffffffffffffff, 0x140}, {r3, 0x10}], 0x7, 0xff) 06:19:50 executing program 2: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800004, 0x12, r0, 0x0) preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x9, 0x0) r1 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r1, &(0x7f0000000380)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x1f4, 0xbfa, 0x3, 0x38, 0x1, 0x5, 0x4, 0x4}, [{0x5, 0x9, 0x6, 0x101, 0x6, 0x4, 0x9, 0x6}, {0x5, 0x3, 0x5e61, 0x80000000, 0xcc3, 0x9, 0x7, 0x8}], "d1660f10e0ac4a6edbf3aa53803c8f57ef2a12069e82553332d2b96d67f2dbc5b04959dad57c303d876233684f5e9ad402a193da791e11122f2cccbf10d6d499f5e16385d09f63891a965d80bcb68b551fabffb4bf0b5c372b4d69cdefac988201a40429a8d0dc699820193afcab08070fde89c22e16b43dde5e37d9a3df0cd352e8667f163774d9dc3c79571e5100046281", ['\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00']}, 0x842) 06:19:50 executing program 3 (fault-call:3 fault-nth:0): r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800004, 0x12, r0, 0x0) preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x9, 0x0) syz_mount_image$reiserfs(&(0x7f0000000140), &(0x7f0000000180)='./file0\x00', 0x0, 0x0, &(0x7f0000000300), 0x0, &(0x7f0000000440)) 06:19:50 executing program 0: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800004, 0x12, r0, 0x0) preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x9, 0x0) socketpair(0x1e, 0x80002, 0x0, &(0x7f0000000340)={0x0, 0x0}) 06:19:50 executing program 1: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800004, 0x12, r0, 0x0) preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x9, 0x0) mmap(&(0x7f0000000000/0xa000)=nil, 0xa000, 0x2, 0x2172, 0xffffffffffffffff, 0x0) r1 = socket$unix(0x1, 0x1, 0x0) r2 = socket$unix(0x1, 0x1, 0x0) r3 = openat$khugepaged_scan(0xffffff9c, &(0x7f00000000c0), 0x1, 0x0) poll(&(0x7f0000000140)=[{0xffffffffffffffff, 0x3}, {0xffffffffffffffff, 0x10a2}, {r1, 0x1}, {0xffffffffffffffff, 0x64c}, {r2, 0x9041}, {0xffffffffffffffff, 0x140}, {r3, 0x10}], 0x7, 0xff) [ 393.017201][T17571] FAULT_INJECTION: forcing a failure. 06:19:50 executing program 1: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800004, 0x12, r0, 0x0) preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x9, 0x0) socketpair(0x1e, 0x80005, 0x0, &(0x7f0000000340)={0x0, 0x0}) r3 = socket$unix(0x1, 0x1, 0x0) r4 = socket$unix(0x1, 0x1, 0x0) r5 = openat$khugepaged_scan(0xffffff9c, &(0x7f00000000c0), 0x1, 0x0) poll(&(0x7f0000000140)=[{r1, 0x3}, {0xffffffffffffffff, 0x10a2}, {r3, 0x1}, {r2, 0x64c}, {r4, 0x9041}, {0xffffffffffffffff, 0x140}, {r5, 0x10}], 0x7, 0xff) [ 393.017201][T17571] name failslab, interval 1, probability 0, space 0, times 0 [ 393.046000][T17571] CPU: 0 PID: 17571 Comm: syz-executor.3 Not tainted 5.14.0-rc2-syzkaller #0 [ 393.057028][T17571] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.14.0-2 04/01/2014 [ 393.071960][T17571] Call Trace: [ 393.077810][T17571] dump_stack_lvl+0xcd/0x134 [ 393.084933][T17571] should_fail.cold+0x5/0xa [ 393.091954][T17571] ? __do_sys_memfd_create+0xf7/0x5a0 [ 393.100268][T17571] should_failslab+0x5/0x10 [ 393.108566][T17571] __kmalloc+0x72/0x330 06:19:50 executing program 1: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800004, 0x12, r0, 0x0) preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x9, 0x0) socketpair(0x1e, 0x80005, 0x0, &(0x7f0000000340)={0x0, 0x0}) r3 = socket$unix(0x1, 0x1, 0x0) r4 = socket$unix(0x1, 0x1, 0x0) r5 = openat$khugepaged_scan(0xffffff9c, &(0x7f00000000c0), 0x1, 0x0) poll(&(0x7f0000000140)=[{r1, 0x3}, {0xffffffffffffffff, 0x10a2}, {r3, 0x1}, {r2, 0x64c}, {r4, 0x9041}, {0xffffffffffffffff, 0x140}, {r5, 0x10}], 0x7, 0xff) [ 393.114671][T17571] __do_sys_memfd_create+0xf7/0x5a0 [ 393.124821][T17571] ? hmm_vma_walk_hugetlb_entry+0x8b0/0x8b0 [ 393.135501][T17571] ? syscall_enter_from_user_mode_prepare+0x17/0x40 [ 393.147444][T17571] __do_fast_syscall_32+0x65/0xf0 [ 393.154733][T17571] do_fast_syscall_32+0x2f/0x70 [ 393.161920][T17571] entry_SYSENTER_compat_after_hwframe+0x4d/0x5c [ 393.172570][T17571] RIP: 0023:0xf7f3f549 [ 393.180208][T17571] Code: 03 74 c0 01 10 05 03 74 b8 01 10 06 03 74 b4 01 10 07 03 74 b0 01 10 08 03 74 d8 01 00 00 00 00 00 51 52 55 89 e5 0f 34 cd 80 <5d> 5a 59 c3 90 90 90 90 8d b4 26 00 00 00 00 8d b4 26 00 00 00 00 [ 393.216221][T17571] RSP: 002b:00000000f553940c EFLAGS: 00000296 ORIG_RAX: 0000000000000164 [ 393.229432][T17571] RAX: ffffffffffffffda RBX: 00000000080ea0f5 RCX: 0000000000000000 [ 393.240949][T17571] RDX: 00000000f553946c RSI: 0000000000000000 RDI: 0000000000000000 [ 393.255850][T17571] RBP: 0000000020000300 R08: 0000000000000000 R09: 0000000000000000 [ 393.270332][T17571] R10: 0000000000000000 R11: 0000000000000000 R12: 0000000000000000 [ 393.283631][T17571] R13: 0000000000000000 R14: 0000000000000000 R15: 0000000000000000 06:19:50 executing program 0: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800004, 0x12, r0, 0x0) preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x9, 0x0) socketpair(0x1e, 0x80002, 0x0, &(0x7f0000000340)={0x0, 0x0}) 06:19:50 executing program 1: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800004, 0x12, r0, 0x0) preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x9, 0x0) socketpair(0x1e, 0x80005, 0x0, &(0x7f0000000340)={0x0, 0x0}) r3 = socket$unix(0x1, 0x1, 0x0) r4 = socket$unix(0x1, 0x1, 0x0) r5 = openat$khugepaged_scan(0xffffff9c, &(0x7f00000000c0), 0x1, 0x0) poll(&(0x7f0000000140)=[{r1, 0x3}, {0xffffffffffffffff, 0x10a2}, {r3, 0x1}, {r2, 0x64c}, {r4, 0x9041}, {0xffffffffffffffff, 0x140}, {r5, 0x10}], 0x7, 0xff) 06:19:51 executing program 2: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800004, 0x12, r0, 0x0) preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x9, 0x0) r1 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r1, &(0x7f0000000380)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, 0xbfa, 0x3, 0x38, 0x1, 0x5, 0x4, 0x4}, [{0x5, 0x9, 0x6, 0x101, 0x6, 0x4, 0x9, 0x6}, {0x5, 0x3, 0x5e61, 0x80000000, 0xcc3, 0x9, 0x7, 0x8}], "d1660f10e0ac4a6edbf3aa53803c8f57ef2a12069e82553332d2b96d67f2dbc5b04959dad57c303d876233684f5e9ad402a193da791e11122f2cccbf10d6d499f5e16385d09f63891a965d80bcb68b551fabffb4bf0b5c372b4d69cdefac988201a40429a8d0dc699820193afcab08070fde89c22e16b43dde5e37d9a3df0cd352e8667f163774d9dc3c79571e5100046281", ['\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00']}, 0x842) 06:19:51 executing program 3 (fault-call:3 fault-nth:1): r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800004, 0x12, r0, 0x0) preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x9, 0x0) syz_mount_image$reiserfs(&(0x7f0000000140), &(0x7f0000000180)='./file0\x00', 0x0, 0x0, &(0x7f0000000300), 0x0, &(0x7f0000000440)) 06:19:51 executing program 0: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800004, 0x12, r0, 0x0) preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x9, 0x0) socketpair(0x1e, 0x80002, 0x0, &(0x7f0000000340)={0x0, 0x0}) 06:19:51 executing program 1: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800004, 0x12, r0, 0x0) mmap(&(0x7f0000000000/0xa000)=nil, 0xa000, 0x2, 0x2172, 0xffffffffffffffff, 0x0) socketpair(0x1e, 0x80005, 0x0, &(0x7f0000000340)={0x0, 0x0}) r3 = socket$unix(0x1, 0x1, 0x0) r4 = socket$unix(0x1, 0x1, 0x0) r5 = openat$khugepaged_scan(0xffffff9c, &(0x7f00000000c0), 0x1, 0x0) poll(&(0x7f0000000140)=[{r1, 0x3}, {0xffffffffffffffff, 0x10a2}, {r3, 0x1}, {r2, 0x64c}, {r4, 0x9041}, {0xffffffffffffffff, 0x140}, {r5, 0x10}], 0x7, 0xff) [ 393.933908][T17594] FAULT_INJECTION: forcing a failure. [ 393.933908][T17594] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 393.956881][T17594] CPU: 0 PID: 17594 Comm: syz-executor.3 Not tainted 5.14.0-rc2-syzkaller #0 [ 393.971408][T17594] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.14.0-2 04/01/2014 [ 393.985778][T17594] Call Trace: [ 393.991106][T17594] dump_stack_lvl+0xcd/0x134 [ 393.997281][T17594] should_fail.cold+0x5/0xa [ 394.004410][T17594] _copy_from_user+0x2c/0x180 06:19:51 executing program 1: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800004, 0x12, r0, 0x0) mmap(&(0x7f0000000000/0xa000)=nil, 0xa000, 0x2, 0x2172, 0xffffffffffffffff, 0x0) socketpair(0x1e, 0x80005, 0x0, &(0x7f0000000340)={0x0, 0x0}) r3 = socket$unix(0x1, 0x1, 0x0) r4 = socket$unix(0x1, 0x1, 0x0) r5 = openat$khugepaged_scan(0xffffff9c, &(0x7f00000000c0), 0x1, 0x0) poll(&(0x7f0000000140)=[{r1, 0x3}, {0xffffffffffffffff, 0x10a2}, {r3, 0x1}, {r2, 0x64c}, {r4, 0x9041}, {0xffffffffffffffff, 0x140}, {r5, 0x10}], 0x7, 0xff) [ 394.012687][T17594] __do_sys_memfd_create+0x169/0x5a0 [ 394.022890][T17594] ? hmm_vma_walk_hugetlb_entry+0x8b0/0x8b0 [ 394.022936][T17594] ? syscall_enter_from_user_mode_prepare+0x17/0x40 [ 394.022975][T17594] __do_fast_syscall_32+0x65/0xf0 [ 394.023021][T17594] do_fast_syscall_32+0x2f/0x70 [ 394.057754][T17594] entry_SYSENTER_compat_after_hwframe+0x4d/0x5c 06:19:51 executing program 0: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800004, 0x12, r0, 0x0) mmap(&(0x7f0000000000/0xa000)=nil, 0xa000, 0x2, 0x2172, 0xffffffffffffffff, 0x0) socketpair(0x1e, 0x80002, 0x0, &(0x7f0000000340)={0x0, 0x0}) [ 394.068680][T17594] RIP: 0023:0xf7f3f549 06:19:51 executing program 1: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800004, 0x12, r0, 0x0) mmap(&(0x7f0000000000/0xa000)=nil, 0xa000, 0x2, 0x2172, 0xffffffffffffffff, 0x0) socketpair(0x1e, 0x80005, 0x0, &(0x7f0000000340)={0x0, 0x0}) r3 = socket$unix(0x1, 0x1, 0x0) r4 = socket$unix(0x1, 0x1, 0x0) r5 = openat$khugepaged_scan(0xffffff9c, &(0x7f00000000c0), 0x1, 0x0) poll(&(0x7f0000000140)=[{r1, 0x3}, {0xffffffffffffffff, 0x10a2}, {r3, 0x1}, {r2, 0x64c}, {r4, 0x9041}, {0xffffffffffffffff, 0x140}, {r5, 0x10}], 0x7, 0xff) [ 394.081093][T17594] Code: 03 74 c0 01 10 05 03 74 b8 01 10 06 03 74 b4 01 10 07 03 74 b0 01 10 08 03 74 d8 01 00 00 00 00 00 51 52 55 89 e5 0f 34 cd 80 <5d> 5a 59 c3 90 90 90 90 8d b4 26 00 00 00 00 8d b4 26 00 00 00 00 [ 394.127273][T17594] RSP: 002b:00000000f553940c EFLAGS: 00000296 ORIG_RAX: 0000000000000164 [ 394.144089][T17594] RAX: ffffffffffffffda RBX: 00000000080ea0f5 RCX: 0000000000000000 06:19:51 executing program 0: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800004, 0x12, r0, 0x0) mmap(&(0x7f0000000000/0xa000)=nil, 0xa000, 0x2, 0x2172, 0xffffffffffffffff, 0x0) socketpair(0x1e, 0x80002, 0x0, &(0x7f0000000340)={0x0, 0x0}) [ 394.163484][T17594] RDX: 00000000f553946c RSI: 0000000000000000 RDI: 0000000000000000 [ 394.183324][T17594] RBP: 0000000020000300 R08: 0000000000000000 R09: 0000000000000000 [ 394.194168][T17594] R10: 0000000000000000 R11: 0000000000000000 R12: 0000000000000000 [ 394.204263][T17594] R13: 0000000000000000 R14: 0000000000000000 R15: 0000000000000000 06:19:52 executing program 2: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800004, 0x12, r0, 0x0) preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x9, 0x0) r1 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r1, &(0x7f0000000380)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, 0x0, 0x3, 0x38, 0x1, 0x5, 0x4, 0x4}, [{0x5, 0x9, 0x6, 0x101, 0x6, 0x4, 0x9, 0x6}, {0x5, 0x3, 0x5e61, 0x80000000, 0xcc3, 0x9, 0x7, 0x8}], "d1660f10e0ac4a6edbf3aa53803c8f57ef2a12069e82553332d2b96d67f2dbc5b04959dad57c303d876233684f5e9ad402a193da791e11122f2cccbf10d6d499f5e16385d09f63891a965d80bcb68b551fabffb4bf0b5c372b4d69cdefac988201a40429a8d0dc699820193afcab08070fde89c22e16b43dde5e37d9a3df0cd352e8667f163774d9dc3c79571e5100046281", ['\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00']}, 0x842) 06:19:52 executing program 3 (fault-call:3 fault-nth:2): r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800004, 0x12, r0, 0x0) preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x9, 0x0) syz_mount_image$reiserfs(&(0x7f0000000140), &(0x7f0000000180)='./file0\x00', 0x0, 0x0, &(0x7f0000000300), 0x0, &(0x7f0000000440)) 06:19:52 executing program 1: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x9, 0x0) mmap(&(0x7f0000000000/0xa000)=nil, 0xa000, 0x2, 0x2172, 0xffffffffffffffff, 0x0) socketpair(0x1e, 0x80005, 0x0, &(0x7f0000000340)={0x0, 0x0}) r3 = socket$unix(0x1, 0x1, 0x0) r4 = socket$unix(0x1, 0x1, 0x0) r5 = openat$khugepaged_scan(0xffffff9c, &(0x7f00000000c0), 0x1, 0x0) poll(&(0x7f0000000140)=[{r1, 0x3}, {0xffffffffffffffff, 0x10a2}, {r3, 0x1}, {r2, 0x64c}, {r4, 0x9041}, {0xffffffffffffffff, 0x140}, {r5, 0x10}], 0x7, 0xff) 06:19:52 executing program 0: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800004, 0x12, r0, 0x0) mmap(&(0x7f0000000000/0xa000)=nil, 0xa000, 0x2, 0x2172, 0xffffffffffffffff, 0x0) socketpair(0x1e, 0x80002, 0x0, &(0x7f0000000340)={0x0, 0x0}) [ 394.891064][T17621] FAULT_INJECTION: forcing a failure. [ 394.891064][T17621] name failslab, interval 1, probability 0, space 0, times 0 06:19:52 executing program 1: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x9, 0x0) mmap(&(0x7f0000000000/0xa000)=nil, 0xa000, 0x2, 0x2172, 0xffffffffffffffff, 0x0) socketpair(0x1e, 0x80005, 0x0, &(0x7f0000000340)={0x0, 0x0}) r3 = socket$unix(0x1, 0x1, 0x0) r4 = socket$unix(0x1, 0x1, 0x0) r5 = openat$khugepaged_scan(0xffffff9c, &(0x7f00000000c0), 0x1, 0x0) poll(&(0x7f0000000140)=[{r1, 0x3}, {0xffffffffffffffff, 0x10a2}, {r3, 0x1}, {r2, 0x64c}, {r4, 0x9041}, {0xffffffffffffffff, 0x140}, {r5, 0x10}], 0x7, 0xff) 06:19:52 executing program 0: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x9, 0x0) mmap(&(0x7f0000000000/0xa000)=nil, 0xa000, 0x2, 0x2172, 0xffffffffffffffff, 0x0) socketpair(0x1e, 0x80002, 0x0, &(0x7f0000000340)={0x0, 0x0}) [ 394.920929][T17621] CPU: 0 PID: 17621 Comm: syz-executor.3 Not tainted 5.14.0-rc2-syzkaller #0 [ 394.934937][T17621] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.14.0-2 04/01/2014 [ 394.949547][T17621] Call Trace: [ 394.954407][T17621] dump_stack_lvl+0xcd/0x134 [ 394.961752][T17621] should_fail.cold+0x5/0xa [ 394.969296][T17621] ? shmem_destroy_inode+0x70/0x70 [ 394.977443][T17621] ? shmem_alloc_inode+0x18/0x40 [ 394.985668][T17621] should_failslab+0x5/0x10 [ 394.985718][T17621] kmem_cache_alloc+0x5e/0x4a0 [ 394.985748][T17621] ? shmem_destroy_inode+0x70/0x70 [ 394.985777][T17621] shmem_alloc_inode+0x18/0x40 [ 395.012261][T17621] ? shmem_destroy_inode+0x70/0x70 [ 395.018545][T17621] alloc_inode+0x61/0x230 [ 395.024911][T17621] new_inode+0x27/0x2f0 [ 395.029921][T17621] shmem_get_inode+0x195/0xc20 [ 395.036791][T17621] __shmem_file_setup+0xb8/0x310 06:19:52 executing program 1: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x9, 0x0) mmap(&(0x7f0000000000/0xa000)=nil, 0xa000, 0x2, 0x2172, 0xffffffffffffffff, 0x0) socketpair(0x1e, 0x80005, 0x0, &(0x7f0000000340)={0x0, 0x0}) r3 = socket$unix(0x1, 0x1, 0x0) r4 = socket$unix(0x1, 0x1, 0x0) r5 = openat$khugepaged_scan(0xffffff9c, &(0x7f00000000c0), 0x1, 0x0) poll(&(0x7f0000000140)=[{r1, 0x3}, {0xffffffffffffffff, 0x10a2}, {r3, 0x1}, {r2, 0x64c}, {r4, 0x9041}, {0xffffffffffffffff, 0x140}, {r5, 0x10}], 0x7, 0xff) 06:19:52 executing program 0: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x9, 0x0) mmap(&(0x7f0000000000/0xa000)=nil, 0xa000, 0x2, 0x2172, 0xffffffffffffffff, 0x0) socketpair(0x1e, 0x80002, 0x0, &(0x7f0000000340)={0x0, 0x0}) [ 395.043995][T17621] ? __sanitizer_cov_trace_const_cmp8+0x1d/0x70 [ 395.056731][T17621] __do_sys_memfd_create+0x26b/0x5a0 [ 395.067923][T17621] ? hmm_vma_walk_hugetlb_entry+0x8b0/0x8b0 [ 395.076874][T17621] ? syscall_enter_from_user_mode_prepare+0x17/0x40 [ 395.086860][T17621] __do_fast_syscall_32+0x65/0xf0 [ 395.094643][T17621] do_fast_syscall_32+0x2f/0x70 [ 395.101776][T17621] entry_SYSENTER_compat_after_hwframe+0x4d/0x5c [ 395.111565][T17621] RIP: 0023:0xf7f3f549 [ 395.117851][T17621] Code: 03 74 c0 01 10 05 03 74 b8 01 10 06 03 74 b4 01 10 07 03 74 b0 01 10 08 03 74 d8 01 00 00 00 00 00 51 52 55 89 e5 0f 34 cd 80 <5d> 5a 59 c3 90 90 90 90 8d b4 26 00 00 00 00 8d b4 26 00 00 00 00 [ 395.147381][T17621] RSP: 002b:00000000f553940c EFLAGS: 00000296 ORIG_RAX: 0000000000000164 [ 395.160076][T17621] RAX: ffffffffffffffda RBX: 00000000080ea0f5 RCX: 0000000000000000 [ 395.170574][T17621] RDX: 00000000f553946c RSI: 0000000000000000 RDI: 0000000000000000 [ 395.181559][T17621] RBP: 0000000020000300 R08: 0000000000000000 R09: 0000000000000000 [ 395.192565][T17621] R10: 0000000000000000 R11: 0000000000000000 R12: 0000000000000000 [ 395.202520][T17621] R13: 0000000000000000 R14: 0000000000000000 R15: 0000000000000000 06:19:53 executing program 2: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800004, 0x12, r0, 0x0) preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x9, 0x0) r1 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r1, &(0x7f0000000380)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, 0x0, 0x0, 0x38, 0x1, 0x5, 0x4, 0x4}, [{0x5, 0x9, 0x6, 0x101, 0x6, 0x4, 0x9, 0x6}, {0x5, 0x3, 0x5e61, 0x80000000, 0xcc3, 0x9, 0x7, 0x8}], "d1660f10e0ac4a6edbf3aa53803c8f57ef2a12069e82553332d2b96d67f2dbc5b04959dad57c303d876233684f5e9ad402a193da791e11122f2cccbf10d6d499f5e16385d09f63891a965d80bcb68b551fabffb4bf0b5c372b4d69cdefac988201a40429a8d0dc699820193afcab08070fde89c22e16b43dde5e37d9a3df0cd352e8667f163774d9dc3c79571e5100046281", ['\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00']}, 0x842) 06:19:53 executing program 1: mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800004, 0x12, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f00000001c0)=[{0x0}], 0x1, 0x9, 0x0) mmap(&(0x7f0000000000/0xa000)=nil, 0xa000, 0x2, 0x2172, 0xffffffffffffffff, 0x0) socketpair(0x1e, 0x80005, 0x0, &(0x7f0000000340)={0x0, 0x0}) r2 = socket$unix(0x1, 0x1, 0x0) r3 = socket$unix(0x1, 0x1, 0x0) r4 = openat$khugepaged_scan(0xffffff9c, &(0x7f00000000c0), 0x1, 0x0) poll(&(0x7f0000000140)=[{r0, 0x3}, {0xffffffffffffffff, 0x10a2}, {r2, 0x1}, {r1, 0x64c}, {r3, 0x9041}, {0xffffffffffffffff, 0x140}, {r4, 0x10}], 0x7, 0xff) 06:19:53 executing program 0: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x9, 0x0) mmap(&(0x7f0000000000/0xa000)=nil, 0xa000, 0x2, 0x2172, 0xffffffffffffffff, 0x0) socketpair(0x1e, 0x80002, 0x0, &(0x7f0000000340)={0x0, 0x0}) 06:19:53 executing program 3 (fault-call:3 fault-nth:3): r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800004, 0x12, r0, 0x0) preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x9, 0x0) syz_mount_image$reiserfs(&(0x7f0000000140), &(0x7f0000000180)='./file0\x00', 0x0, 0x0, &(0x7f0000000300), 0x0, &(0x7f0000000440)) [ 395.857492][T17645] FAULT_INJECTION: forcing a failure. [ 395.857492][T17645] name failslab, interval 1, probability 0, space 0, times 0 [ 395.875903][T17645] CPU: 1 PID: 17645 Comm: syz-executor.3 Not tainted 5.14.0-rc2-syzkaller #0 [ 395.888138][T17645] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.14.0-2 04/01/2014 [ 395.900659][T17645] Call Trace: [ 395.900675][T17645] dump_stack_lvl+0xcd/0x134 [ 395.900734][T17645] should_fail.cold+0x5/0xa [ 395.900765][T17645] ? security_inode_alloc+0x34/0x160 [ 395.932079][T17645] should_failslab+0x5/0x10 [ 395.939713][T17645] kmem_cache_alloc+0x5e/0x4a0 [ 395.946608][T17645] security_inode_alloc+0x34/0x160 [ 395.954265][T17645] inode_init_always+0x5d8/0xd60 [ 395.961527][T17645] alloc_inode+0x82/0x230 [ 395.969241][T17645] new_inode+0x27/0x2f0 [ 395.975017][T17645] shmem_get_inode+0x195/0xc20 [ 395.981068][T17645] __shmem_file_setup+0xb8/0x310 [ 395.987276][T17645] ? __sanitizer_cov_trace_const_cmp8+0x1d/0x70 [ 395.995766][T17645] __do_sys_memfd_create+0x26b/0x5a0 [ 396.002129][T17645] ? hmm_vma_walk_hugetlb_entry+0x8b0/0x8b0 [ 396.009692][T17645] ? syscall_enter_from_user_mode_prepare+0x17/0x40 [ 396.019327][T17645] __do_fast_syscall_32+0x65/0xf0 [ 396.028574][T17645] do_fast_syscall_32+0x2f/0x70 06:19:53 executing program 1: mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800004, 0x12, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f00000001c0)=[{0x0}], 0x1, 0x9, 0x0) mmap(&(0x7f0000000000/0xa000)=nil, 0xa000, 0x2, 0x2172, 0xffffffffffffffff, 0x0) socketpair(0x1e, 0x80005, 0x0, &(0x7f0000000340)={0x0, 0x0}) r2 = socket$unix(0x1, 0x1, 0x0) r3 = socket$unix(0x1, 0x1, 0x0) r4 = openat$khugepaged_scan(0xffffff9c, &(0x7f00000000c0), 0x1, 0x0) poll(&(0x7f0000000140)=[{r0, 0x3}, {0xffffffffffffffff, 0x10a2}, {r2, 0x1}, {r1, 0x64c}, {r3, 0x9041}, {0xffffffffffffffff, 0x140}, {r4, 0x10}], 0x7, 0xff) [ 396.037064][T17645] entry_SYSENTER_compat_after_hwframe+0x4d/0x5c [ 396.046824][T17645] RIP: 0023:0xf7f3f549 [ 396.052652][T17645] Code: 03 74 c0 01 10 05 03 74 b8 01 10 06 03 74 b4 01 10 07 03 74 b0 01 10 08 03 74 d8 01 00 00 00 00 00 51 52 55 89 e5 0f 34 cd 80 <5d> 5a 59 c3 90 90 90 90 8d b4 26 00 00 00 00 8d b4 26 00 00 00 00 [ 396.081741][T17645] RSP: 002b:00000000f553940c EFLAGS: 00000296 ORIG_RAX: 0000000000000164 [ 396.093923][T17645] RAX: ffffffffffffffda RBX: 00000000080ea0f5 RCX: 0000000000000000 [ 396.104605][T17645] RDX: 00000000f553946c RSI: 0000000000000000 RDI: 0000000000000000 [ 396.115392][T17645] RBP: 0000000020000300 R08: 0000000000000000 R09: 0000000000000000 [ 396.127909][T17645] R10: 0000000000000000 R11: 0000000000000000 R12: 0000000000000000 [ 396.139105][T17645] R13: 0000000000000000 R14: 0000000000000000 R15: 0000000000000000 06:19:53 executing program 0: mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800004, 0x12, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f00000001c0)=[{0x0}], 0x1, 0x9, 0x0) mmap(&(0x7f0000000000/0xa000)=nil, 0xa000, 0x2, 0x2172, 0xffffffffffffffff, 0x0) socketpair(0x1e, 0x80002, 0x0, &(0x7f0000000340)={0x0, 0x0}) 06:19:53 executing program 3 (fault-call:3 fault-nth:4): r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800004, 0x12, r0, 0x0) preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x9, 0x0) syz_mount_image$reiserfs(&(0x7f0000000140), &(0x7f0000000180)='./file0\x00', 0x0, 0x0, &(0x7f0000000300), 0x0, &(0x7f0000000440)) 06:19:53 executing program 1: mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800004, 0x12, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f00000001c0)=[{0x0}], 0x1, 0x9, 0x0) mmap(&(0x7f0000000000/0xa000)=nil, 0xa000, 0x2, 0x2172, 0xffffffffffffffff, 0x0) socketpair(0x1e, 0x80005, 0x0, &(0x7f0000000340)={0x0, 0x0}) r2 = socket$unix(0x1, 0x1, 0x0) r3 = socket$unix(0x1, 0x1, 0x0) r4 = openat$khugepaged_scan(0xffffff9c, &(0x7f00000000c0), 0x1, 0x0) poll(&(0x7f0000000140)=[{r0, 0x3}, {0xffffffffffffffff, 0x10a2}, {r2, 0x1}, {r1, 0x64c}, {r3, 0x9041}, {0xffffffffffffffff, 0x140}, {r4, 0x10}], 0x7, 0xff) [ 396.262506][T17660] FAULT_INJECTION: forcing a failure. [ 396.262506][T17660] name failslab, interval 1, probability 0, space 0, times 0 [ 396.279649][T17660] CPU: 3 PID: 17660 Comm: syz-executor.3 Not tainted 5.14.0-rc2-syzkaller #0 [ 396.292964][T17660] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.14.0-2 04/01/2014 [ 396.306724][T17660] Call Trace: [ 396.311393][T17660] dump_stack_lvl+0xcd/0x134 [ 396.317700][T17660] should_fail.cold+0x5/0xa [ 396.323625][T17660] ? __d_alloc+0x2a/0x950 [ 396.329602][T17660] should_failslab+0x5/0x10 [ 396.335492][T17660] kmem_cache_alloc+0x5e/0x4a0 [ 396.342454][T17660] ? lockdep_hardirqs_on+0x79/0x100 [ 396.349385][T17660] __d_alloc+0x2a/0x950 [ 396.355447][T17660] d_alloc_pseudo+0x19/0x70 [ 396.361536][T17660] alloc_file_pseudo+0xc6/0x250 [ 396.368481][T17660] ? alloc_file+0x590/0x590 [ 396.375044][T17660] ? __sanitizer_cov_trace_const_cmp2+0x22/0x80 [ 396.385534][T17660] ? shmem_get_inode+0x59a/0xc20 [ 396.392574][T17660] __shmem_file_setup+0x144/0x310 [ 396.399943][T17660] ? __sanitizer_cov_trace_const_cmp8+0x1d/0x70 [ 396.410361][T17660] __do_sys_memfd_create+0x26b/0x5a0 [ 396.418312][T17660] ? hmm_vma_walk_hugetlb_entry+0x8b0/0x8b0 [ 396.426768][T17660] ? syscall_enter_from_user_mode_prepare+0x17/0x40 [ 396.436651][T17660] __do_fast_syscall_32+0x65/0xf0 [ 396.444441][T17660] do_fast_syscall_32+0x2f/0x70 [ 396.451556][T17660] entry_SYSENTER_compat_after_hwframe+0x4d/0x5c [ 396.461036][T17660] RIP: 0023:0xf7f3f549 [ 396.466633][T17660] Code: 03 74 c0 01 10 05 03 74 b8 01 10 06 03 74 b4 01 10 07 03 74 b0 01 10 08 03 74 d8 01 00 00 00 00 00 51 52 55 89 e5 0f 34 cd 80 <5d> 5a 59 c3 90 90 90 90 8d b4 26 00 00 00 00 8d b4 26 00 00 00 00 [ 396.496497][T17660] RSP: 002b:00000000f553940c EFLAGS: 00000296 ORIG_RAX: 0000000000000164 [ 396.507498][T17660] RAX: ffffffffffffffda RBX: 00000000080ea0f5 RCX: 0000000000000000 [ 396.517892][T17660] RDX: 00000000f553946c RSI: 0000000000000000 RDI: 0000000000000000 [ 396.528577][T17660] RBP: 0000000020000300 R08: 0000000000000000 R09: 0000000000000000 [ 396.539772][T17660] R10: 0000000000000000 R11: 0000000000000000 R12: 0000000000000000 [ 396.551986][T17660] R13: 0000000000000000 R14: 0000000000000000 R15: 0000000000000000 06:19:54 executing program 2: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800004, 0x12, r0, 0x0) preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x9, 0x0) r1 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r1, &(0x7f0000000380)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, 0x0, 0x0, 0x38, 0x0, 0x5, 0x4, 0x4}, [{0x5, 0x9, 0x6, 0x101, 0x6, 0x4, 0x9, 0x6}, {0x5, 0x3, 0x5e61, 0x80000000, 0xcc3, 0x9, 0x7, 0x8}], "d1660f10e0ac4a6edbf3aa53803c8f57ef2a12069e82553332d2b96d67f2dbc5b04959dad57c303d876233684f5e9ad402a193da791e11122f2cccbf10d6d499f5e16385d09f63891a965d80bcb68b551fabffb4bf0b5c372b4d69cdefac988201a40429a8d0dc699820193afcab08070fde89c22e16b43dde5e37d9a3df0cd352e8667f163774d9dc3c79571e5100046281", ['\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00']}, 0x842) 06:19:54 executing program 0: mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800004, 0x12, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f00000001c0)=[{0x0}], 0x1, 0x9, 0x0) mmap(&(0x7f0000000000/0xa000)=nil, 0xa000, 0x2, 0x2172, 0xffffffffffffffff, 0x0) socketpair(0x1e, 0x80002, 0x0, &(0x7f0000000340)={0x0, 0x0}) 06:19:54 executing program 1: r0 = openat(0xffffffffffffffff, 0x0, 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800004, 0x12, r0, 0x0) preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x9, 0x0) mmap(&(0x7f0000000000/0xa000)=nil, 0xa000, 0x2, 0x2172, 0xffffffffffffffff, 0x0) socketpair(0x1e, 0x80005, 0x0, &(0x7f0000000340)={0x0, 0x0}) r3 = socket$unix(0x1, 0x1, 0x0) r4 = socket$unix(0x1, 0x1, 0x0) r5 = openat$khugepaged_scan(0xffffff9c, &(0x7f00000000c0), 0x1, 0x0) poll(&(0x7f0000000140)=[{r1, 0x3}, {0xffffffffffffffff, 0x10a2}, {r3, 0x1}, {r2, 0x64c}, {r4, 0x9041}, {0xffffffffffffffff, 0x140}, {r5, 0x10}], 0x7, 0xff) 06:19:54 executing program 3 (fault-call:3 fault-nth:5): r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800004, 0x12, r0, 0x0) preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x9, 0x0) syz_mount_image$reiserfs(&(0x7f0000000140), &(0x7f0000000180)='./file0\x00', 0x0, 0x0, &(0x7f0000000300), 0x0, &(0x7f0000000440)) [ 396.784753][T17674] FAULT_INJECTION: forcing a failure. [ 396.784753][T17674] name failslab, interval 1, probability 0, space 0, times 0 [ 396.802175][T17674] CPU: 0 PID: 17674 Comm: syz-executor.3 Not tainted 5.14.0-rc2-syzkaller #0 [ 396.815027][T17674] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.14.0-2 04/01/2014 [ 396.815044][T17674] Call Trace: [ 396.815055][T17674] dump_stack_lvl+0xcd/0x134 [ 396.815095][T17674] should_fail.cold+0x5/0xa [ 396.815125][T17674] ? __alloc_file+0x21/0x280 [ 396.815149][T17674] should_failslab+0x5/0x10 [ 396.815175][T17674] kmem_cache_alloc+0x5e/0x4a0 [ 396.815204][T17674] __alloc_file+0x21/0x280 [ 396.815227][T17674] alloc_empty_file+0x6d/0x170 06:19:54 executing program 0: mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800004, 0x12, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f00000001c0)=[{0x0}], 0x1, 0x9, 0x0) mmap(&(0x7f0000000000/0xa000)=nil, 0xa000, 0x2, 0x2172, 0xffffffffffffffff, 0x0) socketpair(0x1e, 0x80002, 0x0, &(0x7f0000000340)={0x0, 0x0}) [ 396.882232][T17674] alloc_file+0x59/0x590 [ 396.890909][T17674] alloc_file_pseudo+0x165/0x250 [ 396.898782][T17674] ? alloc_file+0x590/0x590 [ 396.905308][T17674] ? __sanitizer_cov_trace_const_cmp2+0x22/0x80 [ 396.915227][T17674] ? shmem_get_inode+0x59a/0xc20 [ 396.922854][T17674] __shmem_file_setup+0x144/0x310 [ 396.931344][T17674] ? __sanitizer_cov_trace_const_cmp8+0x1d/0x70 [ 396.940191][T17674] __do_sys_memfd_create+0x26b/0x5a0 [ 396.947966][T17674] ? hmm_vma_walk_hugetlb_entry+0x8b0/0x8b0 [ 396.957388][T17674] ? syscall_enter_from_user_mode_prepare+0x17/0x40 [ 396.966905][T17674] __do_fast_syscall_32+0x65/0xf0 06:19:54 executing program 0: r0 = openat(0xffffffffffffffff, 0x0, 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800004, 0x12, r0, 0x0) preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x9, 0x0) mmap(&(0x7f0000000000/0xa000)=nil, 0xa000, 0x2, 0x2172, 0xffffffffffffffff, 0x0) socketpair(0x1e, 0x80002, 0x0, &(0x7f0000000340)={0x0, 0x0}) [ 396.974297][T17674] do_fast_syscall_32+0x2f/0x70 [ 396.982828][T17674] entry_SYSENTER_compat_after_hwframe+0x4d/0x5c [ 396.991895][T17674] RIP: 0023:0xf7f3f549 [ 396.997171][T17674] Code: 03 74 c0 01 10 05 03 74 b8 01 10 06 03 74 b4 01 10 07 03 74 b0 01 10 08 03 74 d8 01 00 00 00 00 00 51 52 55 89 e5 0f 34 cd 80 <5d> 5a 59 c3 90 90 90 90 8d b4 26 00 00 00 00 8d b4 26 00 00 00 00 [ 397.025543][T17674] RSP: 002b:00000000f553940c EFLAGS: 00000296 ORIG_RAX: 0000000000000164 [ 397.038304][T17674] RAX: ffffffffffffffda RBX: 00000000080ea0f5 RCX: 0000000000000000 [ 397.048796][T17674] RDX: 00000000f553946c RSI: 0000000000000000 RDI: 0000000000000000 [ 397.059016][T17674] RBP: 0000000020000300 R08: 0000000000000000 R09: 0000000000000000 [ 397.068168][T17674] R10: 0000000000000000 R11: 0000000000000000 R12: 0000000000000000 [ 397.079726][T17674] R13: 0000000000000000 R14: 0000000000000000 R15: 0000000000000000 06:19:54 executing program 0: r0 = openat(0xffffffffffffffff, 0x0, 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800004, 0x12, r0, 0x0) preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x9, 0x0) mmap(&(0x7f0000000000/0xa000)=nil, 0xa000, 0x2, 0x2172, 0xffffffffffffffff, 0x0) socketpair(0x1e, 0x80002, 0x0, &(0x7f0000000340)={0x0, 0x0}) 06:19:54 executing program 1: r0 = openat(0xffffffffffffffff, 0x0, 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800004, 0x12, r0, 0x0) preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x9, 0x0) mmap(&(0x7f0000000000/0xa000)=nil, 0xa000, 0x2, 0x2172, 0xffffffffffffffff, 0x0) socketpair(0x1e, 0x80005, 0x0, &(0x7f0000000340)={0x0, 0x0}) r3 = socket$unix(0x1, 0x1, 0x0) r4 = socket$unix(0x1, 0x1, 0x0) r5 = openat$khugepaged_scan(0xffffff9c, &(0x7f00000000c0), 0x1, 0x0) poll(&(0x7f0000000140)=[{r1, 0x3}, {0xffffffffffffffff, 0x10a2}, {r3, 0x1}, {r2, 0x64c}, {r4, 0x9041}, {0xffffffffffffffff, 0x140}, {r5, 0x10}], 0x7, 0xff) 06:19:55 executing program 2: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800004, 0x12, r0, 0x0) preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x9, 0x0) r1 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r1, &(0x7f0000000380)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, 0x0, 0x0, 0x38, 0x0, 0x0, 0x4, 0x4}, [{0x5, 0x9, 0x6, 0x101, 0x6, 0x4, 0x9, 0x6}, {0x5, 0x3, 0x5e61, 0x80000000, 0xcc3, 0x9, 0x7, 0x8}], "d1660f10e0ac4a6edbf3aa53803c8f57ef2a12069e82553332d2b96d67f2dbc5b04959dad57c303d876233684f5e9ad402a193da791e11122f2cccbf10d6d499f5e16385d09f63891a965d80bcb68b551fabffb4bf0b5c372b4d69cdefac988201a40429a8d0dc699820193afcab08070fde89c22e16b43dde5e37d9a3df0cd352e8667f163774d9dc3c79571e5100046281", ['\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00']}, 0x842) 06:19:55 executing program 3 (fault-call:3 fault-nth:6): r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800004, 0x12, r0, 0x0) preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x9, 0x0) syz_mount_image$reiserfs(&(0x7f0000000140), &(0x7f0000000180)='./file0\x00', 0x0, 0x0, &(0x7f0000000300), 0x0, &(0x7f0000000440)) 06:19:55 executing program 0: r0 = openat(0xffffffffffffffff, 0x0, 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800004, 0x12, r0, 0x0) preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x9, 0x0) mmap(&(0x7f0000000000/0xa000)=nil, 0xa000, 0x2, 0x2172, 0xffffffffffffffff, 0x0) socketpair(0x1e, 0x80002, 0x0, &(0x7f0000000340)={0x0, 0x0}) 06:19:55 executing program 1: r0 = openat(0xffffffffffffffff, 0x0, 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800004, 0x12, r0, 0x0) preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x9, 0x0) mmap(&(0x7f0000000000/0xa000)=nil, 0xa000, 0x2, 0x2172, 0xffffffffffffffff, 0x0) socketpair(0x1e, 0x80005, 0x0, &(0x7f0000000340)={0x0, 0x0}) r3 = socket$unix(0x1, 0x1, 0x0) r4 = socket$unix(0x1, 0x1, 0x0) r5 = openat$khugepaged_scan(0xffffff9c, &(0x7f00000000c0), 0x1, 0x0) poll(&(0x7f0000000140)=[{r1, 0x3}, {0xffffffffffffffff, 0x10a2}, {r3, 0x1}, {r2, 0x64c}, {r4, 0x9041}, {0xffffffffffffffff, 0x140}, {r5, 0x10}], 0x7, 0xff) [ 397.666727][T17697] FAULT_INJECTION: forcing a failure. [ 397.666727][T17697] name failslab, interval 1, probability 0, space 0, times 0 [ 397.690465][T17697] CPU: 0 PID: 17697 Comm: syz-executor.3 Not tainted 5.14.0-rc2-syzkaller #0 06:19:55 executing program 0: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x0, 0x12, r0, 0x0) preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x9, 0x0) mmap(&(0x7f0000000000/0xa000)=nil, 0xa000, 0x2, 0x2172, 0xffffffffffffffff, 0x0) socketpair(0x1e, 0x80002, 0x0, &(0x7f0000000340)={0x0, 0x0}) [ 397.704380][T17697] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.14.0-2 04/01/2014 06:19:55 executing program 1: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x0, 0x12, r0, 0x0) preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x9, 0x0) mmap(&(0x7f0000000000/0xa000)=nil, 0xa000, 0x2, 0x2172, 0xffffffffffffffff, 0x0) socketpair(0x1e, 0x80005, 0x0, &(0x7f0000000340)={0x0, 0x0}) r3 = socket$unix(0x1, 0x1, 0x0) r4 = socket$unix(0x1, 0x1, 0x0) r5 = openat$khugepaged_scan(0xffffff9c, &(0x7f00000000c0), 0x1, 0x0) poll(&(0x7f0000000140)=[{r1, 0x3}, {0xffffffffffffffff, 0x10a2}, {r3, 0x1}, {r2, 0x64c}, {r4, 0x9041}, {0xffffffffffffffff, 0x140}, {r5, 0x10}], 0x7, 0xff) [ 397.717665][T17697] Call Trace: [ 397.717912][T17697] dump_stack_lvl+0xcd/0x134 [ 397.718019][T17697] should_fail.cold+0x5/0xa 06:19:55 executing program 3 (fault-call:3 fault-nth:7): r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800004, 0x12, r0, 0x0) preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x9, 0x0) syz_mount_image$reiserfs(&(0x7f0000000140), &(0x7f0000000180)='./file0\x00', 0x0, 0x0, &(0x7f0000000300), 0x0, &(0x7f0000000440)) [ 397.718047][T17697] ? security_file_alloc+0x34/0x170 [ 397.718159][T17697] should_failslab+0x5/0x10 [ 397.718304][T17697] kmem_cache_alloc+0x5e/0x4a0 [ 397.718332][T17697] security_file_alloc+0x34/0x170 [ 397.718357][T17697] __alloc_file+0xd8/0x280 [ 397.718378][T17697] alloc_empty_file+0x6d/0x170 [ 397.718398][T17697] alloc_file+0x59/0x590 [ 397.718567][T17697] alloc_file_pseudo+0x165/0x250 [ 397.718591][T17697] ? alloc_file+0x590/0x590 [ 397.718610][T17697] ? __sanitizer_cov_trace_const_cmp2+0x22/0x80 [ 397.718722][T17697] ? shmem_get_inode+0x59a/0xc20 [ 397.718811][T17697] __shmem_file_setup+0x144/0x310 [ 397.718832][T17697] ? __sanitizer_cov_trace_const_cmp8+0x1d/0x70 06:19:55 executing program 1: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x0, 0x12, r0, 0x0) preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x9, 0x0) mmap(&(0x7f0000000000/0xa000)=nil, 0xa000, 0x2, 0x2172, 0xffffffffffffffff, 0x0) socketpair(0x1e, 0x80005, 0x0, &(0x7f0000000340)={0x0, 0x0}) r3 = socket$unix(0x1, 0x1, 0x0) r4 = socket$unix(0x1, 0x1, 0x0) r5 = openat$khugepaged_scan(0xffffff9c, &(0x7f00000000c0), 0x1, 0x0) poll(&(0x7f0000000140)=[{r1, 0x3}, {0xffffffffffffffff, 0x10a2}, {r3, 0x1}, {r2, 0x64c}, {r4, 0x9041}, {0xffffffffffffffff, 0x140}, {r5, 0x10}], 0x7, 0xff) [ 397.718945][T17697] __do_sys_memfd_create+0x26b/0x5a0 [ 397.719036][T17697] ? hmm_vma_walk_hugetlb_entry+0x8b0/0x8b0 [ 397.719060][T17697] ? syscall_enter_from_user_mode_prepare+0x17/0x40 [ 397.719156][T17697] __do_fast_syscall_32+0x65/0xf0 [ 397.719181][T17697] do_fast_syscall_32+0x2f/0x70 [ 397.719268][T17697] entry_SYSENTER_compat_after_hwframe+0x4d/0x5c [ 397.719290][T17697] RIP: 0023:0xf7f3f549 [ 397.719373][T17697] Code: 03 74 c0 01 10 05 03 74 b8 01 10 06 03 74 b4 01 10 07 03 74 b0 01 10 08 03 74 d8 01 00 00 00 00 00 51 52 55 89 e5 0f 34 cd 80 <5d> 5a 59 c3 90 90 90 90 8d b4 26 00 00 00 00 8d b4 26 00 00 00 00 [ 397.719394][T17697] RSP: 002b:00000000f553940c EFLAGS: 00000296 ORIG_RAX: 0000000000000164 [ 397.719506][T17697] RAX: ffffffffffffffda RBX: 00000000080ea0f5 RCX: 0000000000000000 [ 397.719520][T17697] RDX: 00000000f553946c RSI: 0000000000000000 RDI: 0000000000000000 [ 397.719534][T17697] RBP: 0000000020000300 R08: 0000000000000000 R09: 0000000000000000 [ 397.719609][T17697] R10: 0000000000000000 R11: 0000000000000000 R12: 0000000000000000 [ 397.719621][T17697] R13: 0000000000000000 R14: 0000000000000000 R15: 0000000000000000 [ 397.804703][T17707] FAULT_INJECTION: forcing a failure. [ 397.804703][T17707] name failslab, interval 1, probability 0, space 0, times 0 [ 398.062710][T17707] CPU: 1 PID: 17707 Comm: syz-executor.3 Not tainted 5.14.0-rc2-syzkaller #0 [ 398.074667][T17707] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.14.0-2 04/01/2014 [ 398.086747][T17707] Call Trace: [ 398.091638][T17707] dump_stack_lvl+0xcd/0x134 [ 398.112677][T17707] should_fail.cold+0x5/0xa [ 398.119526][T17707] ? tomoyo_realpath_from_path+0xc3/0x620 [ 398.128043][T17707] should_failslab+0x5/0x10 [ 398.133831][T17707] __kmalloc+0x72/0x330 [ 398.140064][T17707] tomoyo_realpath_from_path+0xc3/0x620 [ 398.148201][T17707] ? tomoyo_profile+0x42/0x50 [ 398.155440][T17707] tomoyo_path_perm+0x21b/0x400 [ 398.166943][T17707] ? tomoyo_path_perm+0x1c1/0x400 [ 398.174496][T17707] ? tomoyo_check_open_permission+0x380/0x380 [ 398.183134][T17707] ? find_held_lock+0x2d/0x110 [ 398.190530][T17707] security_path_truncate+0xcf/0x140 [ 398.198475][T17707] do_sys_ftruncate+0x4d8/0x8e0 [ 398.205248][T17707] __do_fast_syscall_32+0x65/0xf0 [ 398.212185][T17707] do_fast_syscall_32+0x2f/0x70 [ 398.218541][T17707] entry_SYSENTER_compat_after_hwframe+0x4d/0x5c [ 398.227222][T17707] RIP: 0023:0xf7f3f549 [ 398.233152][T17707] Code: 03 74 c0 01 10 05 03 74 b8 01 10 06 03 74 b4 01 10 07 03 74 b0 01 10 08 03 74 d8 01 00 00 00 00 00 51 52 55 89 e5 0f 34 cd 80 <5d> 5a 59 c3 90 90 90 90 8d b4 26 00 00 00 00 8d b4 26 00 00 00 00 [ 398.259780][T17707] RSP: 002b:00000000f5539418 EFLAGS: 00000292 ORIG_RAX: 000000000000005d [ 398.272223][T17707] RAX: ffffffffffffffda RBX: 0000000000000005 RCX: 0000000000000000 [ 398.282510][T17707] RDX: 00000000f553946c RSI: 0000000000000000 RDI: 000000000816c000 [ 398.293112][T17707] RBP: 0000000020000300 R08: 0000000000000000 R09: 0000000000000000 [ 398.304978][T17707] R10: 0000000000000000 R11: 0000000000000000 R12: 0000000000000000 [ 398.316583][T17707] R13: 0000000000000000 R14: 0000000000000000 R15: 0000000000000000 [ 398.329628][T17707] ERROR: Out of memory at tomoyo_realpath_from_path. 06:19:56 executing program 0: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x0, 0x12, r0, 0x0) preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x9, 0x0) mmap(&(0x7f0000000000/0xa000)=nil, 0xa000, 0x2, 0x2172, 0xffffffffffffffff, 0x0) socketpair(0x1e, 0x80002, 0x0, &(0x7f0000000340)={0x0, 0x0}) 06:19:56 executing program 1: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x0, 0x12, r0, 0x0) preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x9, 0x0) mmap(&(0x7f0000000000/0xa000)=nil, 0xa000, 0x2, 0x2172, 0xffffffffffffffff, 0x0) socketpair(0x1e, 0x80005, 0x0, &(0x7f0000000340)={0x0, 0x0}) r3 = socket$unix(0x1, 0x1, 0x0) r4 = socket$unix(0x1, 0x1, 0x0) r5 = openat$khugepaged_scan(0xffffff9c, &(0x7f00000000c0), 0x1, 0x0) poll(&(0x7f0000000140)=[{r1, 0x3}, {0xffffffffffffffff, 0x10a2}, {r3, 0x1}, {r2, 0x64c}, {r4, 0x9041}, {0xffffffffffffffff, 0x140}, {r5, 0x10}], 0x7, 0xff) 06:19:56 executing program 2: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800004, 0x12, r0, 0x0) preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x9, 0x0) r1 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r1, &(0x7f0000000380)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, 0x0, 0x0, 0x38, 0x0, 0x0, 0x0, 0x4}, [{0x5, 0x9, 0x6, 0x101, 0x6, 0x4, 0x9, 0x6}, {0x5, 0x3, 0x5e61, 0x80000000, 0xcc3, 0x9, 0x7, 0x8}], "d1660f10e0ac4a6edbf3aa53803c8f57ef2a12069e82553332d2b96d67f2dbc5b04959dad57c303d876233684f5e9ad402a193da791e11122f2cccbf10d6d499f5e16385d09f63891a965d80bcb68b551fabffb4bf0b5c372b4d69cdefac988201a40429a8d0dc699820193afcab08070fde89c22e16b43dde5e37d9a3df0cd352e8667f163774d9dc3c79571e5100046281", ['\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00']}, 0x842) 06:19:56 executing program 3 (fault-call:3 fault-nth:8): r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800004, 0x12, r0, 0x0) preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x9, 0x0) syz_mount_image$reiserfs(&(0x7f0000000140), &(0x7f0000000180)='./file0\x00', 0x0, 0x0, &(0x7f0000000300), 0x0, &(0x7f0000000440)) [ 398.621246][T17728] FAULT_INJECTION: forcing a failure. [ 398.621246][T17728] name failslab, interval 1, probability 0, space 0, times 0 06:19:56 executing program 1: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800004, 0x10, r0, 0x0) preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x9, 0x0) mmap(&(0x7f0000000000/0xa000)=nil, 0xa000, 0x2, 0x2172, 0xffffffffffffffff, 0x0) socketpair(0x1e, 0x80005, 0x0, &(0x7f0000000340)={0x0, 0x0}) r3 = socket$unix(0x1, 0x1, 0x0) r4 = socket$unix(0x1, 0x1, 0x0) r5 = openat$khugepaged_scan(0xffffff9c, &(0x7f00000000c0), 0x1, 0x0) poll(&(0x7f0000000140)=[{r1, 0x3}, {0xffffffffffffffff, 0x10a2}, {r3, 0x1}, {r2, 0x64c}, {r4, 0x9041}, {0xffffffffffffffff, 0x140}, {r5, 0x10}], 0x7, 0xff) 06:19:56 executing program 0: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x0, 0x12, r0, 0x0) preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x9, 0x0) mmap(&(0x7f0000000000/0xa000)=nil, 0xa000, 0x2, 0x2172, 0xffffffffffffffff, 0x0) socketpair(0x1e, 0x80002, 0x0, &(0x7f0000000340)={0x0, 0x0}) [ 398.647160][T17728] CPU: 1 PID: 17728 Comm: syz-executor.3 Not tainted 5.14.0-rc2-syzkaller #0 [ 398.659991][T17728] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.14.0-2 04/01/2014 [ 398.672501][T17728] Call Trace: [ 398.676988][T17728] dump_stack_lvl+0xcd/0x134 [ 398.683604][T17728] should_fail.cold+0x5/0xa [ 398.690160][T17728] ? tomoyo_encode2.part.0+0xe9/0x3a0 [ 398.697995][T17728] should_failslab+0x5/0x10 [ 398.704180][T17728] __kmalloc+0x72/0x330 [ 398.709990][T17728] tomoyo_encode2.part.0+0xe9/0x3a0 [ 398.716920][T17728] tomoyo_encode+0x28/0x50 [ 398.722986][T17728] tomoyo_realpath_from_path+0x186/0x620 [ 398.731005][T17728] ? tomoyo_profile+0x42/0x50 [ 398.737846][T17728] tomoyo_path_perm+0x21b/0x400 [ 398.744586][T17728] ? tomoyo_path_perm+0x1c1/0x400 [ 398.751790][T17728] ? tomoyo_check_open_permission+0x380/0x380 [ 398.760192][T17728] ? find_held_lock+0x2d/0x110 [ 398.766627][T17728] security_path_truncate+0xcf/0x140 [ 398.774329][T17728] do_sys_ftruncate+0x4d8/0x8e0 [ 398.780486][T17728] __do_fast_syscall_32+0x65/0xf0 [ 398.788537][T17728] do_fast_syscall_32+0x2f/0x70 [ 398.794670][T17728] entry_SYSENTER_compat_after_hwframe+0x4d/0x5c [ 398.803192][T17728] RIP: 0023:0xf7f3f549 [ 398.809156][T17728] Code: 03 74 c0 01 10 05 03 74 b8 01 10 06 03 74 b4 01 10 07 03 74 b0 01 10 08 03 74 d8 01 00 00 00 00 00 51 52 55 89 e5 0f 34 cd 80 <5d> 5a 59 c3 90 90 90 90 8d b4 26 00 00 00 00 8d b4 26 00 00 00 00 06:19:56 executing program 0: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800004, 0x10, r0, 0x0) preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x9, 0x0) mmap(&(0x7f0000000000/0xa000)=nil, 0xa000, 0x2, 0x2172, 0xffffffffffffffff, 0x0) socketpair(0x1e, 0x80002, 0x0, &(0x7f0000000340)={0x0, 0x0}) [ 398.832851][T17728] RSP: 002b:00000000f5539418 EFLAGS: 00000292 ORIG_RAX: 000000000000005d 06:19:56 executing program 1: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800004, 0x10, r0, 0x0) preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x9, 0x0) mmap(&(0x7f0000000000/0xa000)=nil, 0xa000, 0x2, 0x2172, 0xffffffffffffffff, 0x0) socketpair(0x1e, 0x80005, 0x0, &(0x7f0000000340)={0x0, 0x0}) r3 = socket$unix(0x1, 0x1, 0x0) r4 = socket$unix(0x1, 0x1, 0x0) r5 = openat$khugepaged_scan(0xffffff9c, &(0x7f00000000c0), 0x1, 0x0) poll(&(0x7f0000000140)=[{r1, 0x3}, {0xffffffffffffffff, 0x10a2}, {r3, 0x1}, {r2, 0x64c}, {r4, 0x9041}, {0xffffffffffffffff, 0x140}, {r5, 0x10}], 0x7, 0xff) [ 398.844658][T17728] RAX: ffffffffffffffda RBX: 0000000000000005 RCX: 0000000000000000 [ 398.855470][T17728] RDX: 00000000f553946c RSI: 0000000000000000 RDI: 000000000816c000 [ 398.866159][T17728] RBP: 0000000020000300 R08: 0000000000000000 R09: 0000000000000000 [ 398.876406][T17728] R10: 0000000000000000 R11: 0000000000000000 R12: 0000000000000000 [ 398.887143][T17728] R13: 0000000000000000 R14: 0000000000000000 R15: 0000000000000000 [ 398.908266][T17728] ERROR: Out of memory at tomoyo_realpath_from_path. 06:19:56 executing program 1: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800004, 0x10, r0, 0x0) preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x9, 0x0) mmap(&(0x7f0000000000/0xa000)=nil, 0xa000, 0x2, 0x2172, 0xffffffffffffffff, 0x0) socketpair(0x1e, 0x80005, 0x0, &(0x7f0000000340)={0x0, 0x0}) r3 = socket$unix(0x1, 0x1, 0x0) r4 = socket$unix(0x1, 0x1, 0x0) r5 = openat$khugepaged_scan(0xffffff9c, &(0x7f00000000c0), 0x1, 0x0) poll(&(0x7f0000000140)=[{r1, 0x3}, {0xffffffffffffffff, 0x10a2}, {r3, 0x1}, {r2, 0x64c}, {r4, 0x9041}, {0xffffffffffffffff, 0x140}, {r5, 0x10}], 0x7, 0xff) 06:19:56 executing program 0: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800004, 0x10, r0, 0x0) preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x9, 0x0) mmap(&(0x7f0000000000/0xa000)=nil, 0xa000, 0x2, 0x2172, 0xffffffffffffffff, 0x0) socketpair(0x1e, 0x80002, 0x0, &(0x7f0000000340)={0x0, 0x0}) 06:19:57 executing program 2: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800004, 0x12, r0, 0x0) preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x9, 0x0) r1 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r1, &(0x7f0000000380)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40}, [{0x5, 0x9, 0x6, 0x101, 0x6, 0x4, 0x9, 0x6}, {0x5, 0x3, 0x5e61, 0x80000000, 0xcc3, 0x9, 0x7, 0x8}], "d1660f10e0ac4a6edbf3aa53803c8f57ef2a12069e82553332d2b96d67f2dbc5b04959dad57c303d876233684f5e9ad402a193da791e11122f2cccbf10d6d499f5e16385d09f63891a965d80bcb68b551fabffb4bf0b5c372b4d69cdefac988201a40429a8d0dc699820193afcab08070fde89c22e16b43dde5e37d9a3df0cd352e8667f163774d9dc3c79571e5100046281", ['\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00']}, 0x842) 06:19:57 executing program 1: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800004, 0x12, 0xffffffffffffffff, 0x0) preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x9, 0x0) mmap(&(0x7f0000000000/0xa000)=nil, 0xa000, 0x2, 0x2172, 0xffffffffffffffff, 0x0) socketpair(0x1e, 0x80005, 0x0, &(0x7f0000000340)={0x0, 0x0}) r3 = socket$unix(0x1, 0x1, 0x0) r4 = socket$unix(0x1, 0x1, 0x0) r5 = openat$khugepaged_scan(0xffffff9c, &(0x7f00000000c0), 0x1, 0x0) poll(&(0x7f0000000140)=[{r1, 0x3}, {0xffffffffffffffff, 0x10a2}, {r3, 0x1}, {r2, 0x64c}, {r4, 0x9041}, {0xffffffffffffffff, 0x140}, {r5, 0x10}], 0x7, 0xff) 06:19:57 executing program 3 (fault-call:3 fault-nth:9): r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800004, 0x12, r0, 0x0) preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x9, 0x0) syz_mount_image$reiserfs(&(0x7f0000000140), &(0x7f0000000180)='./file0\x00', 0x0, 0x0, &(0x7f0000000300), 0x0, &(0x7f0000000440)) 06:19:57 executing program 0: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800004, 0x10, r0, 0x0) preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x9, 0x0) mmap(&(0x7f0000000000/0xa000)=nil, 0xa000, 0x2, 0x2172, 0xffffffffffffffff, 0x0) socketpair(0x1e, 0x80002, 0x0, &(0x7f0000000340)={0x0, 0x0}) [ 399.532989][T17758] FAULT_INJECTION: forcing a failure. [ 399.532989][T17758] name failslab, interval 1, probability 0, space 0, times 0 [ 399.553540][T17758] CPU: 1 PID: 17758 Comm: syz-executor.3 Not tainted 5.14.0-rc2-syzkaller #0 06:19:57 executing program 0: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800004, 0x12, 0xffffffffffffffff, 0x0) preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x9, 0x0) mmap(&(0x7f0000000000/0xa000)=nil, 0xa000, 0x2, 0x2172, 0xffffffffffffffff, 0x0) socketpair(0x1e, 0x80002, 0x0, &(0x7f0000000340)={0x0, 0x0}) [ 399.566838][T17758] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.14.0-2 04/01/2014 [ 399.581629][T17758] Call Trace: [ 399.588115][T17758] dump_stack_lvl+0xcd/0x134 [ 399.588166][T17758] should_fail.cold+0x5/0xa [ 399.588194][T17758] ? getname_flags.part.0+0x50/0x4f0 [ 399.588222][T17758] should_failslab+0x5/0x10 [ 399.623625][T17758] kmem_cache_alloc+0x5e/0x4a0 06:19:57 executing program 1: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800004, 0x12, 0xffffffffffffffff, 0x0) preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x9, 0x0) mmap(&(0x7f0000000000/0xa000)=nil, 0xa000, 0x2, 0x2172, 0xffffffffffffffff, 0x0) socketpair(0x1e, 0x80005, 0x0, &(0x7f0000000340)={0x0, 0x0}) r3 = socket$unix(0x1, 0x1, 0x0) r4 = socket$unix(0x1, 0x1, 0x0) r5 = openat$khugepaged_scan(0xffffff9c, &(0x7f00000000c0), 0x1, 0x0) poll(&(0x7f0000000140)=[{r1, 0x3}, {0xffffffffffffffff, 0x10a2}, {r3, 0x1}, {r2, 0x64c}, {r4, 0x9041}, {0xffffffffffffffff, 0x140}, {r5, 0x10}], 0x7, 0xff) [ 399.631452][T17758] getname_flags.part.0+0x50/0x4f0 [ 399.640229][T17758] ? lockdep_hardirqs_on_prepare+0x400/0x400 [ 399.649276][T17758] getname+0x8e/0xd0 [ 399.658665][T17758] do_sys_openat2+0xf5/0x420 [ 399.664868][T17758] ? build_open_flags+0x6f0/0x6f0 [ 399.671903][T17758] ? find_held_lock+0x2d/0x110 [ 399.677020][T17758] ? __context_tracking_exit+0xb8/0xe0 [ 399.683094][T17758] __ia32_compat_sys_openat+0x13f/0x1f0 [ 399.689409][T17758] ? __x64_compat_sys_open+0x1c0/0x1c0 [ 399.696865][T17758] ? syscall_enter_from_user_mode_prepare+0x17/0x40 [ 399.707158][T17758] __do_fast_syscall_32+0x65/0xf0 06:19:57 executing program 0: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800004, 0x12, 0xffffffffffffffff, 0x0) preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x9, 0x0) mmap(&(0x7f0000000000/0xa000)=nil, 0xa000, 0x2, 0x2172, 0xffffffffffffffff, 0x0) socketpair(0x1e, 0x80002, 0x0, &(0x7f0000000340)={0x0, 0x0}) [ 399.714556][T17758] do_fast_syscall_32+0x2f/0x70 [ 399.720857][T17758] entry_SYSENTER_compat_after_hwframe+0x4d/0x5c [ 399.729309][T17758] RIP: 0023:0xf7f3f549 [ 399.734189][T17758] Code: 03 74 c0 01 10 05 03 74 b8 01 10 06 03 74 b4 01 10 07 03 74 b0 01 10 08 03 74 d8 01 00 00 00 00 00 51 52 55 89 e5 0f 34 cd 80 <5d> 5a 59 c3 90 90 90 90 8d b4 26 00 00 00 00 8d b4 26 00 00 00 00 [ 399.759979][T17758] RSP: 002b:00000000f55393f0 EFLAGS: 00000282 ORIG_RAX: 0000000000000127 [ 399.770675][T17758] RAX: ffffffffffffffda RBX: 00000000ffffff9c RCX: 00000000f55394b0 [ 399.781262][T17758] RDX: 0000000000000002 RSI: 0000000000000000 RDI: 000000000816c000 [ 399.791890][T17758] RBP: 0000000000000000 R08: 0000000000000000 R09: 0000000000000000 [ 399.801878][T17758] R10: 0000000000000000 R11: 0000000000000000 R12: 0000000000000000 06:19:57 executing program 0: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800004, 0x12, 0xffffffffffffffff, 0x0) preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x9, 0x0) mmap(&(0x7f0000000000/0xa000)=nil, 0xa000, 0x2, 0x2172, 0xffffffffffffffff, 0x0) socketpair(0x1e, 0x80002, 0x0, &(0x7f0000000340)={0x0, 0x0}) [ 399.811726][T17758] R13: 0000000000000000 R14: 0000000000000000 R15: 0000000000000000 06:19:58 executing program 2: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800004, 0x12, r0, 0x0) preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x9, 0x0) r1 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r1, &(0x7f0000000380)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40}, [{0x5, 0x9, 0x6, 0x101, 0x6, 0x4, 0x9, 0x6}], "d1660f10e0ac4a6edbf3aa53803c8f57ef2a12069e82553332d2b96d67f2dbc5b04959dad57c303d876233684f5e9ad402a193da791e11122f2cccbf10d6d499f5e16385d09f63891a965d80bcb68b551fabffb4bf0b5c372b4d69cdefac988201a40429a8d0dc699820193afcab08070fde89c22e16b43dde5e37d9a3df0cd352e8667f163774d9dc3c79571e5100046281", ['\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00']}, 0x80a) 06:19:58 executing program 1: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800004, 0x12, 0xffffffffffffffff, 0x0) preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x9, 0x0) mmap(&(0x7f0000000000/0xa000)=nil, 0xa000, 0x2, 0x2172, 0xffffffffffffffff, 0x0) socketpair(0x1e, 0x80005, 0x0, &(0x7f0000000340)={0x0, 0x0}) r3 = socket$unix(0x1, 0x1, 0x0) r4 = socket$unix(0x1, 0x1, 0x0) r5 = openat$khugepaged_scan(0xffffff9c, &(0x7f00000000c0), 0x1, 0x0) poll(&(0x7f0000000140)=[{r1, 0x3}, {0xffffffffffffffff, 0x10a2}, {r3, 0x1}, {r2, 0x64c}, {r4, 0x9041}, {0xffffffffffffffff, 0x140}, {r5, 0x10}], 0x7, 0xff) 06:19:58 executing program 3 (fault-call:3 fault-nth:10): r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800004, 0x12, r0, 0x0) preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x9, 0x0) syz_mount_image$reiserfs(&(0x7f0000000140), &(0x7f0000000180)='./file0\x00', 0x0, 0x0, &(0x7f0000000300), 0x0, &(0x7f0000000440)) 06:19:58 executing program 0: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800004, 0x12, r0, 0x0) preadv(0xffffffffffffffff, &(0x7f00000001c0)=[{0x0}], 0x1, 0x9, 0x0) mmap(&(0x7f0000000000/0xa000)=nil, 0xa000, 0x2, 0x2172, 0xffffffffffffffff, 0x0) socketpair(0x1e, 0x80002, 0x0, &(0x7f0000000340)={0x0, 0x0}) [ 400.483626][T17785] FAULT_INJECTION: forcing a failure. 06:19:58 executing program 1: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800004, 0x12, r0, 0x0) preadv(0xffffffffffffffff, &(0x7f00000001c0)=[{0x0}], 0x1, 0x9, 0x0) mmap(&(0x7f0000000000/0xa000)=nil, 0xa000, 0x2, 0x2172, 0xffffffffffffffff, 0x0) socketpair(0x1e, 0x80005, 0x0, &(0x7f0000000340)={0x0, 0x0}) r3 = socket$unix(0x1, 0x1, 0x0) r4 = socket$unix(0x1, 0x1, 0x0) r5 = openat$khugepaged_scan(0xffffff9c, &(0x7f00000000c0), 0x1, 0x0) poll(&(0x7f0000000140)=[{r1, 0x3}, {0xffffffffffffffff, 0x10a2}, {r3, 0x1}, {r2, 0x64c}, {r4, 0x9041}, {0xffffffffffffffff, 0x140}, {r5, 0x10}], 0x7, 0xff) [ 400.483626][T17785] name fail_page_alloc, interval 1, probability 0, space 0, times 1 [ 400.512338][T17785] CPU: 1 PID: 17785 Comm: syz-executor.3 Not tainted 5.14.0-rc2-syzkaller #0 [ 400.526150][T17785] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.14.0-2 04/01/2014 [ 400.538160][T17785] Call Trace: [ 400.544012][T17785] dump_stack_lvl+0xcd/0x134 06:19:58 executing program 1: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800004, 0x12, r0, 0x0) preadv(0xffffffffffffffff, &(0x7f00000001c0)=[{0x0}], 0x1, 0x9, 0x0) mmap(&(0x7f0000000000/0xa000)=nil, 0xa000, 0x2, 0x2172, 0xffffffffffffffff, 0x0) socketpair(0x1e, 0x80005, 0x0, &(0x7f0000000340)={0x0, 0x0}) r3 = socket$unix(0x1, 0x1, 0x0) r4 = socket$unix(0x1, 0x1, 0x0) r5 = openat$khugepaged_scan(0xffffff9c, &(0x7f00000000c0), 0x1, 0x0) poll(&(0x7f0000000140)=[{r1, 0x3}, {0xffffffffffffffff, 0x10a2}, {r3, 0x1}, {r2, 0x64c}, {r4, 0x9041}, {0xffffffffffffffff, 0x140}, {r5, 0x10}], 0x7, 0xff) [ 400.551472][T17785] should_fail.cold+0x5/0xa [ 400.551517][T17785] prepare_alloc_pages+0x17b/0x580 [ 400.551585][T17785] __alloc_pages+0x12f/0x500 [ 400.551611][T17785] ? __alloc_pages_slowpath.constprop.0+0x21b0/0x21b0 06:19:58 executing program 1: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800004, 0x12, r0, 0x0) preadv(0xffffffffffffffff, &(0x7f00000001c0)=[{0x0}], 0x1, 0x9, 0x0) mmap(&(0x7f0000000000/0xa000)=nil, 0xa000, 0x2, 0x2172, 0xffffffffffffffff, 0x0) socketpair(0x1e, 0x80005, 0x0, &(0x7f0000000340)={0x0, 0x0}) r3 = socket$unix(0x1, 0x1, 0x0) r4 = socket$unix(0x1, 0x1, 0x0) r5 = openat$khugepaged_scan(0xffffff9c, &(0x7f00000000c0), 0x1, 0x0) poll(&(0x7f0000000140)=[{r1, 0x3}, {0xffffffffffffffff, 0x10a2}, {r3, 0x1}, {r2, 0x64c}, {r4, 0x9041}, {0xffffffffffffffff, 0x140}, {r5, 0x10}], 0x7, 0xff) [ 400.551640][T17785] ? __lock_acquire+0x162f/0x54a0 06:19:58 executing program 0: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800004, 0x12, r0, 0x0) preadv(0xffffffffffffffff, &(0x7f00000001c0)=[{0x0}], 0x1, 0x9, 0x0) mmap(&(0x7f0000000000/0xa000)=nil, 0xa000, 0x2, 0x2172, 0xffffffffffffffff, 0x0) socketpair(0x1e, 0x80002, 0x0, &(0x7f0000000340)={0x0, 0x0}) [ 400.551677][T17785] alloc_pages+0x18c/0x2a0 [ 400.551710][T17785] allocate_slab+0x32e/0x4b0 [ 400.551742][T17785] ___slab_alloc+0x4ba/0x820 [ 400.551768][T17785] ? find_held_lock+0x2d/0x110 [ 400.551798][T17785] ? getname_flags.part.0+0x50/0x4f0 [ 400.551829][T17785] ? fs_reclaim_release+0x9c/0xf0 [ 400.551858][T17785] ? __slab_alloc.constprop.0+0x7b/0xf0 [ 400.551889][T17785] ? getname_flags.part.0+0x50/0x4f0 [ 400.551915][T17785] ? __slab_alloc.constprop.0+0xa7/0xf0 [ 400.551940][T17785] __slab_alloc.constprop.0+0xa7/0xf0 [ 400.551992][T17785] ? getname_flags.part.0+0x50/0x4f0 [ 400.552028][T17785] kmem_cache_alloc+0x3e1/0x4a0 [ 400.552064][T17785] getname_flags.part.0+0x50/0x4f0 [ 400.552095][T17785] ? lockdep_hardirqs_on_prepare+0x400/0x400 [ 400.552129][T17785] getname+0x8e/0xd0 [ 400.552159][T17785] do_sys_openat2+0xf5/0x420 [ 400.552188][T17785] ? build_open_flags+0x6f0/0x6f0 [ 400.552221][T17785] ? find_held_lock+0x2d/0x110 [ 400.552258][T17785] ? __context_tracking_exit+0xb8/0xe0 [ 400.552297][T17785] __ia32_compat_sys_openat+0x13f/0x1f0 [ 400.552337][T17785] ? __x64_compat_sys_open+0x1c0/0x1c0 [ 400.552376][T17785] ? syscall_enter_from_user_mode_prepare+0x17/0x40 [ 400.552414][T17785] __do_fast_syscall_32+0x65/0xf0 [ 400.552443][T17785] do_fast_syscall_32+0x2f/0x70 [ 400.552470][T17785] entry_SYSENTER_compat_after_hwframe+0x4d/0x5c [ 400.552498][T17785] RIP: 0023:0xf7f3f549 [ 400.552519][T17785] Code: 03 74 c0 01 10 05 03 74 b8 01 10 06 03 74 b4 01 10 07 03 74 b0 01 10 08 03 74 d8 01 00 00 00 00 00 51 52 55 89 e5 0f 34 cd 80 <5d> 5a 59 c3 90 90 90 90 8d b4 26 00 00 00 00 8d b4 26 00 00 00 00 [ 400.552544][T17785] RSP: 002b:00000000f55393f0 EFLAGS: 00000282 ORIG_RAX: 0000000000000127 [ 400.552571][T17785] RAX: ffffffffffffffda RBX: 00000000ffffff9c RCX: 00000000f55394b0 [ 400.552589][T17785] RDX: 0000000000000002 RSI: 0000000000000000 RDI: 000000000816c000 [ 400.552605][T17785] RBP: 0000000000000000 R08: 0000000000000000 R09: 0000000000000000 [ 400.552621][T17785] R10: 0000000000000000 R11: 0000000000000000 R12: 0000000000000000 [ 400.552635][T17785] R13: 0000000000000000 R14: 0000000000000000 R15: 0000000000000000 06:19:58 executing program 2: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800004, 0x12, r0, 0x0) preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x9, 0x0) r1 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r1, &(0x7f0000000380)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40}, [{0x0, 0x9, 0x6, 0x101, 0x6, 0x4, 0x9, 0x6}], "d1660f10e0ac4a6edbf3aa53803c8f57ef2a12069e82553332d2b96d67f2dbc5b04959dad57c303d876233684f5e9ad402a193da791e11122f2cccbf10d6d499f5e16385d09f63891a965d80bcb68b551fabffb4bf0b5c372b4d69cdefac988201a40429a8d0dc699820193afcab08070fde89c22e16b43dde5e37d9a3df0cd352e8667f163774d9dc3c79571e5100046281", ['\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00']}, 0x80a) 06:19:58 executing program 3 (fault-call:3 fault-nth:11): r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800004, 0x12, r0, 0x0) preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x9, 0x0) syz_mount_image$reiserfs(&(0x7f0000000140), &(0x7f0000000180)='./file0\x00', 0x0, 0x0, &(0x7f0000000300), 0x0, &(0x7f0000000440)) 06:19:58 executing program 0: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800004, 0x12, r0, 0x0) preadv(0xffffffffffffffff, &(0x7f00000001c0)=[{0x0}], 0x1, 0x9, 0x0) mmap(&(0x7f0000000000/0xa000)=nil, 0xa000, 0x2, 0x2172, 0xffffffffffffffff, 0x0) socketpair(0x1e, 0x80002, 0x0, &(0x7f0000000340)={0x0, 0x0}) 06:19:58 executing program 1: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800004, 0x12, r0, 0x0) preadv(r0, 0x0, 0x0, 0x9, 0x0) mmap(&(0x7f0000000000/0xa000)=nil, 0xa000, 0x2, 0x2172, 0xffffffffffffffff, 0x0) socketpair(0x1e, 0x80005, 0x0, &(0x7f0000000340)={0x0, 0x0}) r3 = socket$unix(0x1, 0x1, 0x0) r4 = socket$unix(0x1, 0x1, 0x0) r5 = openat$khugepaged_scan(0xffffff9c, &(0x7f00000000c0), 0x1, 0x0) poll(&(0x7f0000000140)=[{r1, 0x3}, {0xffffffffffffffff, 0x10a2}, {r3, 0x1}, {r2, 0x64c}, {r4, 0x9041}, {0xffffffffffffffff, 0x140}, {r5, 0x10}], 0x7, 0xff) [ 401.398089][T17812] FAULT_INJECTION: forcing a failure. [ 401.398089][T17812] name failslab, interval 1, probability 0, space 0, times 0 [ 401.426765][T17812] CPU: 2 PID: 17812 Comm: syz-executor.3 Not tainted 5.14.0-rc2-syzkaller #0 [ 401.441679][T17812] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.14.0-2 04/01/2014 [ 401.455219][T17812] Call Trace: [ 401.460278][T17812] dump_stack_lvl+0xcd/0x134 [ 401.466548][T17812] should_fail.cold+0x5/0xa [ 401.473542][T17812] ? __alloc_file+0x21/0x280 [ 401.479580][T17812] should_failslab+0x5/0x10 [ 401.485984][T17812] kmem_cache_alloc+0x5e/0x4a0 [ 401.486034][T17812] __alloc_file+0x21/0x280 [ 401.486066][T17812] alloc_empty_file+0x6d/0x170 [ 401.486101][T17812] path_openat+0xde/0x27f0 [ 401.510840][T17812] ? __lock_acquire+0x162f/0x54a0 [ 401.517656][T17812] ? path_lookupat+0x860/0x860 [ 401.525522][T17812] ? lockdep_hardirqs_on_prepare+0x400/0x400 [ 401.534440][T17812] do_filp_open+0x1aa/0x400 [ 401.540815][T17812] ? may_open_dev+0xf0/0xf0 [ 401.546921][T17812] ? alloc_fd+0x2f0/0x670 [ 401.553655][T17812] ? lock_downgrade+0x6e0/0x6e0 [ 401.560717][T17812] ? rwlock_bug.part.0+0x90/0x90 [ 401.567012][T17812] ? __sanitizer_cov_trace_const_cmp8+0x1d/0x70 [ 401.574845][T17812] ? _find_next_bit+0x1e3/0x260 [ 401.582162][T17812] ? _raw_spin_unlock+0x24/0x40 06:19:59 executing program 0: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800004, 0x12, r0, 0x0) preadv(r0, 0x0, 0x0, 0x9, 0x0) mmap(&(0x7f0000000000/0xa000)=nil, 0xa000, 0x2, 0x2172, 0xffffffffffffffff, 0x0) socketpair(0x1e, 0x80002, 0x0, &(0x7f0000000340)={0x0, 0x0}) 06:19:59 executing program 0: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800004, 0x12, r0, 0x0) preadv(r0, 0x0, 0x0, 0x9, 0x0) mmap(&(0x7f0000000000/0xa000)=nil, 0xa000, 0x2, 0x2172, 0xffffffffffffffff, 0x0) socketpair(0x1e, 0x80002, 0x0, &(0x7f0000000340)={0x0, 0x0}) [ 401.589057][T17812] ? alloc_fd+0x2f0/0x670 [ 401.603744][T17812] do_sys_openat2+0x16d/0x420 [ 401.609588][T17812] ? build_open_flags+0x6f0/0x6f0 [ 401.625351][T17812] ? find_held_lock+0x2d/0x110 [ 401.635340][T17812] ? __context_tracking_exit+0xb8/0xe0 [ 401.643227][T17812] __ia32_compat_sys_openat+0x13f/0x1f0 [ 401.652676][T17812] ? __x64_compat_sys_open+0x1c0/0x1c0 [ 401.662897][T17812] ? syscall_enter_from_user_mode_prepare+0x17/0x40 [ 401.672263][T17812] __do_fast_syscall_32+0x65/0xf0 [ 401.680025][T17812] do_fast_syscall_32+0x2f/0x70 [ 401.687534][T17812] entry_SYSENTER_compat_after_hwframe+0x4d/0x5c [ 401.711237][T17812] RIP: 0023:0xf7f3f549 [ 401.716483][T17812] Code: 03 74 c0 01 10 05 03 74 b8 01 10 06 03 74 b4 01 10 07 03 74 b0 01 10 08 03 74 d8 01 00 00 00 00 00 51 52 55 89 e5 0f 34 cd 80 <5d> 5a 59 c3 90 90 90 90 8d b4 26 00 00 00 00 8d b4 26 00 00 00 00 06:19:59 executing program 0: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800004, 0x12, r0, 0x0) preadv(r0, 0x0, 0x0, 0x9, 0x0) mmap(&(0x7f0000000000/0xa000)=nil, 0xa000, 0x2, 0x2172, 0xffffffffffffffff, 0x0) socketpair(0x1e, 0x80002, 0x0, &(0x7f0000000340)={0x0, 0x0}) 06:19:59 executing program 0: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800004, 0x12, r0, 0x0) preadv(r0, &(0x7f00000001c0), 0x0, 0x9, 0x0) mmap(&(0x7f0000000000/0xa000)=nil, 0xa000, 0x2, 0x2172, 0xffffffffffffffff, 0x0) socketpair(0x1e, 0x80002, 0x0, &(0x7f0000000340)={0x0, 0x0}) [ 401.742708][T17812] RSP: 002b:00000000f55393f0 EFLAGS: 00000282 ORIG_RAX: 0000000000000127 [ 401.757800][T17812] RAX: ffffffffffffffda RBX: 00000000ffffff9c RCX: 00000000f55394b0 [ 401.770328][T17812] RDX: 0000000000000002 RSI: 0000000000000000 RDI: 000000000816c000 [ 401.782497][T17812] RBP: 0000000000000000 R08: 0000000000000000 R09: 0000000000000000 [ 401.794309][T17812] R10: 0000000000000000 R11: 0000000000000000 R12: 0000000000000000 [ 401.804087][T17812] R13: 0000000000000000 R14: 0000000000000000 R15: 0000000000000000 06:19:59 executing program 2: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800004, 0x12, r0, 0x0) preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x9, 0x0) r1 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r1, &(0x7f0000000380)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40}, [{0x0, 0x0, 0x6, 0x101, 0x6, 0x4, 0x9, 0x6}], "d1660f10e0ac4a6edbf3aa53803c8f57ef2a12069e82553332d2b96d67f2dbc5b04959dad57c303d876233684f5e9ad402a193da791e11122f2cccbf10d6d499f5e16385d09f63891a965d80bcb68b551fabffb4bf0b5c372b4d69cdefac988201a40429a8d0dc699820193afcab08070fde89c22e16b43dde5e37d9a3df0cd352e8667f163774d9dc3c79571e5100046281", ['\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00']}, 0x80a) 06:19:59 executing program 0: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800004, 0x12, r0, 0x0) preadv(r0, &(0x7f00000001c0), 0x0, 0x9, 0x0) mmap(&(0x7f0000000000/0xa000)=nil, 0xa000, 0x2, 0x2172, 0xffffffffffffffff, 0x0) socketpair(0x1e, 0x80002, 0x0, &(0x7f0000000340)={0x0, 0x0}) 06:19:59 executing program 1: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800004, 0x12, r0, 0x0) preadv(r0, 0x0, 0x0, 0x9, 0x0) mmap(&(0x7f0000000000/0xa000)=nil, 0xa000, 0x2, 0x2172, 0xffffffffffffffff, 0x0) socketpair(0x1e, 0x80005, 0x0, &(0x7f0000000340)={0x0, 0x0}) r3 = socket$unix(0x1, 0x1, 0x0) r4 = socket$unix(0x1, 0x1, 0x0) r5 = openat$khugepaged_scan(0xffffff9c, &(0x7f00000000c0), 0x1, 0x0) poll(&(0x7f0000000140)=[{r1, 0x3}, {0xffffffffffffffff, 0x10a2}, {r3, 0x1}, {r2, 0x64c}, {r4, 0x9041}, {0xffffffffffffffff, 0x140}, {r5, 0x10}], 0x7, 0xff) 06:19:59 executing program 3 (fault-call:3 fault-nth:12): r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800004, 0x12, r0, 0x0) preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x9, 0x0) syz_mount_image$reiserfs(&(0x7f0000000140), &(0x7f0000000180)='./file0\x00', 0x0, 0x0, &(0x7f0000000300), 0x0, &(0x7f0000000440)) [ 402.378917][T17838] FAULT_INJECTION: forcing a failure. [ 402.378917][T17838] name failslab, interval 1, probability 0, space 0, times 0 06:20:00 executing program 0: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800004, 0x12, r0, 0x0) preadv(r0, &(0x7f00000001c0), 0x0, 0x9, 0x0) mmap(&(0x7f0000000000/0xa000)=nil, 0xa000, 0x2, 0x2172, 0xffffffffffffffff, 0x0) socketpair(0x1e, 0x80002, 0x0, &(0x7f0000000340)={0x0, 0x0}) [ 402.403677][T17838] CPU: 0 PID: 17838 Comm: syz-executor.3 Not tainted 5.14.0-rc2-syzkaller #0 [ 402.418049][T17838] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.14.0-2 04/01/2014 [ 402.429929][T17838] Call Trace: [ 402.429945][T17838] dump_stack_lvl+0xcd/0x134 [ 402.429990][T17838] should_fail.cold+0x5/0xa [ 402.430029][T17838] ? security_file_alloc+0x34/0x170 [ 402.430059][T17838] should_failslab+0x5/0x10 [ 402.430087][T17838] kmem_cache_alloc+0x5e/0x4a0 [ 402.468823][T17838] security_file_alloc+0x34/0x170 [ 402.474792][T17838] __alloc_file+0xd8/0x280 [ 402.480519][T17838] alloc_empty_file+0x6d/0x170 [ 402.485874][T17838] path_openat+0xde/0x27f0 [ 402.490978][T17838] ? __lock_acquire+0x162f/0x54a0 [ 402.496436][T17838] ? path_lookupat+0x860/0x860 [ 402.502812][T17838] ? lockdep_hardirqs_on_prepare+0x400/0x400 [ 402.510168][T17838] do_filp_open+0x1aa/0x400 [ 402.515737][T17838] ? may_open_dev+0xf0/0xf0 [ 402.521362][T17838] ? alloc_fd+0x2f0/0x670 [ 402.527716][T17838] ? lock_downgrade+0x6e0/0x6e0 [ 402.534270][T17838] ? rwlock_bug.part.0+0x90/0x90 [ 402.541883][T17838] ? __sanitizer_cov_trace_const_cmp8+0x1d/0x70 [ 402.550582][T17838] ? _find_next_bit+0x1e3/0x260 [ 402.557058][T17838] ? _raw_spin_unlock+0x24/0x40 [ 402.563917][T17838] ? alloc_fd+0x2f0/0x670 [ 402.570758][T17838] do_sys_openat2+0x16d/0x420 [ 402.577643][T17838] ? build_open_flags+0x6f0/0x6f0 [ 402.584346][T17838] ? find_held_lock+0x2d/0x110 [ 402.591370][T17838] ? __context_tracking_exit+0xb8/0xe0 [ 402.598966][T17838] __ia32_compat_sys_openat+0x13f/0x1f0 [ 402.607079][T17838] ? __x64_compat_sys_open+0x1c0/0x1c0 [ 402.614849][T17838] ? syscall_enter_from_user_mode_prepare+0x17/0x40 [ 402.623166][T17838] __do_fast_syscall_32+0x65/0xf0 [ 402.629457][T17838] do_fast_syscall_32+0x2f/0x70 [ 402.635938][T17838] entry_SYSENTER_compat_after_hwframe+0x4d/0x5c [ 402.644255][T17838] RIP: 0023:0xf7f3f549 [ 402.649408][T17838] Code: 03 74 c0 01 10 05 03 74 b8 01 10 06 03 74 b4 01 10 07 03 74 b0 01 10 08 03 74 d8 01 00 00 00 00 00 51 52 55 89 e5 0f 34 cd 80 <5d> 5a 59 c3 90 90 90 90 8d b4 26 00 00 00 00 8d b4 26 00 00 00 00 [ 402.676188][T17838] RSP: 002b:00000000f55393f0 EFLAGS: 00000282 ORIG_RAX: 0000000000000127 [ 402.688214][T17838] RAX: ffffffffffffffda RBX: 00000000ffffff9c RCX: 00000000f55394b0 [ 402.699039][T17838] RDX: 0000000000000002 RSI: 0000000000000000 RDI: 000000000816c000 [ 402.709492][T17838] RBP: 0000000000000000 R08: 0000000000000000 R09: 0000000000000000 [ 402.720340][T17838] R10: 0000000000000000 R11: 0000000000000000 R12: 0000000000000000 [ 402.732056][T17838] R13: 0000000000000000 R14: 0000000000000000 R15: 0000000000000000 06:20:00 executing program 1: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800004, 0x12, r0, 0x0) preadv(r0, 0x0, 0x0, 0x9, 0x0) mmap(&(0x7f0000000000/0xa000)=nil, 0xa000, 0x2, 0x2172, 0xffffffffffffffff, 0x0) socketpair(0x1e, 0x80005, 0x0, &(0x7f0000000340)={0x0, 0x0}) r3 = socket$unix(0x1, 0x1, 0x0) r4 = socket$unix(0x1, 0x1, 0x0) r5 = openat$khugepaged_scan(0xffffff9c, &(0x7f00000000c0), 0x1, 0x0) poll(&(0x7f0000000140)=[{r1, 0x3}, {0xffffffffffffffff, 0x10a2}, {r3, 0x1}, {r2, 0x64c}, {r4, 0x9041}, {0xffffffffffffffff, 0x140}, {r5, 0x10}], 0x7, 0xff) 06:20:00 executing program 1: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800004, 0x12, r0, 0x0) preadv(r0, &(0x7f00000001c0), 0x0, 0x9, 0x0) mmap(&(0x7f0000000000/0xa000)=nil, 0xa000, 0x2, 0x2172, 0xffffffffffffffff, 0x0) socketpair(0x1e, 0x80005, 0x0, &(0x7f0000000340)={0x0, 0x0}) r3 = socket$unix(0x1, 0x1, 0x0) r4 = socket$unix(0x1, 0x1, 0x0) r5 = openat$khugepaged_scan(0xffffff9c, &(0x7f00000000c0), 0x1, 0x0) poll(&(0x7f0000000140)=[{r1, 0x3}, {0xffffffffffffffff, 0x10a2}, {r3, 0x1}, {r2, 0x64c}, {r4, 0x9041}, {0xffffffffffffffff, 0x140}, {r5, 0x10}], 0x7, 0xff) 06:20:00 executing program 1: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800004, 0x12, r0, 0x0) preadv(r0, &(0x7f00000001c0), 0x0, 0x9, 0x0) mmap(&(0x7f0000000000/0xa000)=nil, 0xa000, 0x2, 0x2172, 0xffffffffffffffff, 0x0) socketpair(0x1e, 0x80005, 0x0, &(0x7f0000000340)={0x0, 0x0}) r3 = socket$unix(0x1, 0x1, 0x0) r4 = socket$unix(0x1, 0x1, 0x0) r5 = openat$khugepaged_scan(0xffffff9c, &(0x7f00000000c0), 0x1, 0x0) poll(&(0x7f0000000140)=[{r1, 0x3}, {0xffffffffffffffff, 0x10a2}, {r3, 0x1}, {r2, 0x64c}, {r4, 0x9041}, {0xffffffffffffffff, 0x140}, {r5, 0x10}], 0x7, 0xff) 06:20:00 executing program 2: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800004, 0x12, r0, 0x0) preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x9, 0x0) r1 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r1, &(0x7f0000000380)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40}, [{0x0, 0x0, 0x0, 0x101, 0x6, 0x4, 0x9, 0x6}], "d1660f10e0ac4a6edbf3aa53803c8f57ef2a12069e82553332d2b96d67f2dbc5b04959dad57c303d876233684f5e9ad402a193da791e11122f2cccbf10d6d499f5e16385d09f63891a965d80bcb68b551fabffb4bf0b5c372b4d69cdefac988201a40429a8d0dc699820193afcab08070fde89c22e16b43dde5e37d9a3df0cd352e8667f163774d9dc3c79571e5100046281", ['\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00']}, 0x80a) 06:20:00 executing program 1: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800004, 0x12, r0, 0x0) preadv(r0, &(0x7f00000001c0), 0x0, 0x9, 0x0) mmap(&(0x7f0000000000/0xa000)=nil, 0xa000, 0x2, 0x2172, 0xffffffffffffffff, 0x0) socketpair(0x1e, 0x80005, 0x0, &(0x7f0000000340)={0x0, 0x0}) r3 = socket$unix(0x1, 0x1, 0x0) r4 = socket$unix(0x1, 0x1, 0x0) r5 = openat$khugepaged_scan(0xffffff9c, &(0x7f00000000c0), 0x1, 0x0) poll(&(0x7f0000000140)=[{r1, 0x3}, {0xffffffffffffffff, 0x10a2}, {r3, 0x1}, {r2, 0x64c}, {r4, 0x9041}, {0xffffffffffffffff, 0x140}, {r5, 0x10}], 0x7, 0xff) 06:20:00 executing program 3 (fault-call:3 fault-nth:13): r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800004, 0x12, r0, 0x0) preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x9, 0x0) syz_mount_image$reiserfs(&(0x7f0000000140), &(0x7f0000000180)='./file0\x00', 0x0, 0x0, &(0x7f0000000300), 0x0, &(0x7f0000000440)) 06:20:00 executing program 0: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800004, 0x12, r0, 0x0) preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x0, 0x0) mmap(&(0x7f0000000000/0xa000)=nil, 0xa000, 0x2, 0x2172, 0xffffffffffffffff, 0x0) socketpair(0x1e, 0x80002, 0x0, &(0x7f0000000340)={0x0, 0x0}) [ 403.271289][T17862] FAULT_INJECTION: forcing a failure. [ 403.271289][T17862] name failslab, interval 1, probability 0, space 0, times 0 [ 403.292663][T17862] CPU: 0 PID: 17862 Comm: syz-executor.3 Not tainted 5.14.0-rc2-syzkaller #0 [ 403.305104][T17862] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.14.0-2 04/01/2014 [ 403.318407][T17862] Call Trace: [ 403.323515][T17862] dump_stack_lvl+0xcd/0x134 [ 403.331298][T17862] should_fail.cold+0x5/0xa 06:20:00 executing program 0: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800004, 0x12, r0, 0x0) preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x0, 0x0) mmap(&(0x7f0000000000/0xa000)=nil, 0xa000, 0x2, 0x2172, 0xffffffffffffffff, 0x0) socketpair(0x1e, 0x80002, 0x0, &(0x7f0000000340)={0x0, 0x0}) 06:20:00 executing program 1: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800004, 0x12, r0, 0x0) preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x0, 0x0) mmap(&(0x7f0000000000/0xa000)=nil, 0xa000, 0x2, 0x2172, 0xffffffffffffffff, 0x0) socketpair(0x1e, 0x80005, 0x0, &(0x7f0000000340)={0x0, 0x0}) r3 = socket$unix(0x1, 0x1, 0x0) r4 = socket$unix(0x1, 0x1, 0x0) r5 = openat$khugepaged_scan(0xffffff9c, &(0x7f00000000c0), 0x1, 0x0) poll(&(0x7f0000000140)=[{r1, 0x3}, {0xffffffffffffffff, 0x10a2}, {r3, 0x1}, {r2, 0x64c}, {r4, 0x9041}, {0xffffffffffffffff, 0x140}, {r5, 0x10}], 0x7, 0xff) [ 403.338376][T17862] ? tomoyo_realpath_from_path+0xc3/0x620 06:20:00 executing program 0: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800004, 0x12, r0, 0x0) preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x0, 0x0) mmap(&(0x7f0000000000/0xa000)=nil, 0xa000, 0x2, 0x2172, 0xffffffffffffffff, 0x0) socketpair(0x1e, 0x80002, 0x0, &(0x7f0000000340)={0x0, 0x0}) [ 403.351629][T17862] should_failslab+0x5/0x10 [ 403.351679][T17862] __kmalloc+0x72/0x330 [ 403.351706][T17862] tomoyo_realpath_from_path+0xc3/0x620 06:20:00 executing program 1: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800004, 0x12, r0, 0x0) preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x0, 0x0) mmap(&(0x7f0000000000/0xa000)=nil, 0xa000, 0x2, 0x2172, 0xffffffffffffffff, 0x0) socketpair(0x1e, 0x80005, 0x0, &(0x7f0000000340)={0x0, 0x0}) r3 = socket$unix(0x1, 0x1, 0x0) r4 = socket$unix(0x1, 0x1, 0x0) r5 = openat$khugepaged_scan(0xffffff9c, &(0x7f00000000c0), 0x1, 0x0) poll(&(0x7f0000000140)=[{r1, 0x3}, {0xffffffffffffffff, 0x10a2}, {r3, 0x1}, {r2, 0x64c}, {r4, 0x9041}, {0xffffffffffffffff, 0x140}, {r5, 0x10}], 0x7, 0xff) [ 403.351734][T17862] ? __sanitizer_cov_trace_const_cmp1+0x22/0x80 [ 403.351761][T17862] tomoyo_check_open_permission+0x272/0x380 [ 403.351785][T17862] ? tomoyo_path_number_perm+0x590/0x590 [ 403.351813][T17862] ? lockdep_hardirqs_on_prepare+0x400/0x400 [ 403.351849][T17862] ? path_get+0x5d/0x80 [ 403.351867][T17862] ? lock_downgrade+0x6e0/0x6e0 [ 403.351886][T17862] ? do_raw_spin_lock+0x120/0x2b0 [ 403.351910][T17862] tomoyo_file_open+0xa3/0xd0 [ 403.351974][T17862] security_file_open+0x52/0x4f0 [ 403.352001][T17862] do_dentry_open+0x353/0x11d0 [ 403.352027][T17862] ? __sanitizer_cov_trace_const_cmp4+0x1c/0x70 [ 403.352048][T17862] ? may_open+0x1f6/0x420 [ 403.352068][T17862] path_openat+0x1c23/0x27f0 [ 403.352094][T17862] ? path_lookupat+0x860/0x860 [ 403.352115][T17862] ? lockdep_hardirqs_on_prepare+0x400/0x400 [ 403.352142][T17862] do_filp_open+0x1aa/0x400 [ 403.352161][T17862] ? may_open_dev+0xf0/0xf0 [ 403.352188][T17862] ? rwlock_bug.part.0+0x90/0x90 [ 403.352207][T17862] ? __sanitizer_cov_trace_const_cmp8+0x1d/0x70 [ 403.352226][T17862] ? _find_next_bit+0x1e3/0x260 [ 403.352254][T17862] ? _raw_spin_unlock+0x24/0x40 [ 403.352277][T17862] ? alloc_fd+0x2f0/0x670 [ 403.352343][T17862] do_sys_openat2+0x16d/0x420 [ 403.352368][T17862] ? build_open_flags+0x6f0/0x6f0 [ 403.352390][T17862] ? find_held_lock+0x2d/0x110 [ 403.352420][T17862] ? __context_tracking_exit+0xb8/0xe0 [ 403.352448][T17862] __ia32_compat_sys_openat+0x13f/0x1f0 [ 403.352470][T17862] ? __x64_compat_sys_open+0x1c0/0x1c0 [ 403.352498][T17862] ? syscall_enter_from_user_mode_prepare+0x17/0x40 [ 403.352525][T17862] __do_fast_syscall_32+0x65/0xf0 [ 403.352546][T17862] do_fast_syscall_32+0x2f/0x70 [ 403.352566][T17862] entry_SYSENTER_compat_after_hwframe+0x4d/0x5c [ 403.352587][T17862] RIP: 0023:0xf7f3f549 [ 403.352604][T17862] Code: 03 74 c0 01 10 05 03 74 b8 01 10 06 03 74 b4 01 10 07 03 74 b0 01 10 08 03 74 d8 01 00 00 00 00 00 51 52 55 89 e5 0f 34 cd 80 <5d> 5a 59 c3 90 90 90 90 8d b4 26 00 00 00 00 8d b4 26 00 00 00 00 [ 403.352624][T17862] RSP: 002b:00000000f55393f0 EFLAGS: 00000282 ORIG_RAX: 0000000000000127 [ 403.352646][T17862] RAX: ffffffffffffffda RBX: 00000000ffffff9c RCX: 00000000f55394b0 [ 403.352660][T17862] RDX: 0000000000000002 RSI: 0000000000000000 RDI: 000000000816c000 [ 403.352673][T17862] RBP: 0000000000000000 R08: 0000000000000000 R09: 0000000000000000 [ 403.352692][T17862] R10: 0000000000000000 R11: 0000000000000000 R12: 0000000000000000 [ 403.352705][T17862] R13: 0000000000000000 R14: 0000000000000000 R15: 0000000000000000 [ 403.355003][T17862] ERROR: Out of memory at tomoyo_realpath_from_path. 06:20:01 executing program 2: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800004, 0x12, r0, 0x0) preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x9, 0x0) r1 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r1, &(0x7f0000000380)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40}, [{0x0, 0x0, 0x0, 0x0, 0x6, 0x4, 0x9, 0x6}], "d1660f10e0ac4a6edbf3aa53803c8f57ef2a12069e82553332d2b96d67f2dbc5b04959dad57c303d876233684f5e9ad402a193da791e11122f2cccbf10d6d499f5e16385d09f63891a965d80bcb68b551fabffb4bf0b5c372b4d69cdefac988201a40429a8d0dc699820193afcab08070fde89c22e16b43dde5e37d9a3df0cd352e8667f163774d9dc3c79571e5100046281", ['\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00']}, 0x80a) 06:20:01 executing program 0: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800004, 0x12, r0, 0x0) preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x9, 0x0) mmap(&(0x7f0000000000/0xa000)=nil, 0xa000, 0x0, 0x2172, 0xffffffffffffffff, 0x0) socketpair(0x1e, 0x80002, 0x0, &(0x7f0000000340)={0x0, 0x0}) 06:20:01 executing program 3 (fault-call:3 fault-nth:14): r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800004, 0x12, r0, 0x0) preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x9, 0x0) syz_mount_image$reiserfs(&(0x7f0000000140), &(0x7f0000000180)='./file0\x00', 0x0, 0x0, &(0x7f0000000300), 0x0, &(0x7f0000000440)) 06:20:01 executing program 1: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800004, 0x12, r0, 0x0) preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x0, 0x0) mmap(&(0x7f0000000000/0xa000)=nil, 0xa000, 0x2, 0x2172, 0xffffffffffffffff, 0x0) socketpair(0x1e, 0x80005, 0x0, &(0x7f0000000340)={0x0, 0x0}) r3 = socket$unix(0x1, 0x1, 0x0) r4 = socket$unix(0x1, 0x1, 0x0) r5 = openat$khugepaged_scan(0xffffff9c, &(0x7f00000000c0), 0x1, 0x0) poll(&(0x7f0000000140)=[{r1, 0x3}, {0xffffffffffffffff, 0x10a2}, {r3, 0x1}, {r2, 0x64c}, {r4, 0x9041}, {0xffffffffffffffff, 0x140}, {r5, 0x10}], 0x7, 0xff) [ 404.241273][T17892] FAULT_INJECTION: forcing a failure. 06:20:01 executing program 0: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800004, 0x12, r0, 0x0) preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x9, 0x0) mmap(&(0x7f0000000000/0xa000)=nil, 0xa000, 0x0, 0x2172, 0xffffffffffffffff, 0x0) socketpair(0x1e, 0x80002, 0x0, &(0x7f0000000340)={0x0, 0x0}) [ 404.241273][T17892] name failslab, interval 1, probability 0, space 0, times 0 [ 404.271641][T17892] CPU: 2 PID: 17892 Comm: syz-executor.3 Not tainted 5.14.0-rc2-syzkaller #0 [ 404.286295][T17892] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.14.0-2 04/01/2014 [ 404.298567][T17892] Call Trace: [ 404.302143][T17892] dump_stack_lvl+0xcd/0x134 [ 404.307193][T17892] should_fail.cold+0x5/0xa [ 404.312534][T17892] ? tomoyo_encode2.part.0+0xe9/0x3a0 [ 404.318821][T17892] should_failslab+0x5/0x10 06:20:01 executing program 1: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800004, 0x12, r0, 0x0) preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x9, 0x0) mmap(&(0x7f0000000000/0xa000)=nil, 0xa000, 0x0, 0x2172, 0xffffffffffffffff, 0x0) socketpair(0x1e, 0x80005, 0x0, &(0x7f0000000340)={0x0, 0x0}) r3 = socket$unix(0x1, 0x1, 0x0) r4 = socket$unix(0x1, 0x1, 0x0) r5 = openat$khugepaged_scan(0xffffff9c, &(0x7f00000000c0), 0x1, 0x0) poll(&(0x7f0000000140)=[{r1, 0x3}, {0xffffffffffffffff, 0x10a2}, {r3, 0x1}, {r2, 0x64c}, {r4, 0x9041}, {0xffffffffffffffff, 0x140}, {r5, 0x10}], 0x7, 0xff) [ 404.323613][T17892] __kmalloc+0x72/0x330 [ 404.329106][T17892] tomoyo_encode2.part.0+0xe9/0x3a0 [ 404.335628][T17892] tomoyo_encode+0x28/0x50 [ 404.341556][T17892] tomoyo_realpath_from_path+0x186/0x620 [ 404.349557][T17892] tomoyo_check_open_permission+0x272/0x380 [ 404.357652][T17892] ? tomoyo_path_number_perm+0x590/0x590 [ 404.365060][T17892] ? lockdep_hardirqs_on_prepare+0x400/0x400 06:20:01 executing program 0: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800004, 0x12, r0, 0x0) preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x9, 0x0) mmap(&(0x7f0000000000/0xa000)=nil, 0xa000, 0x0, 0x2172, 0xffffffffffffffff, 0x0) socketpair(0x1e, 0x80002, 0x0, &(0x7f0000000340)={0x0, 0x0}) [ 404.372327][T17892] ? path_get+0x5d/0x80 [ 404.379226][T17892] ? lock_downgrade+0x6e0/0x6e0 06:20:01 executing program 1: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800004, 0x12, r0, 0x0) preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x9, 0x0) mmap(&(0x7f0000000000/0xa000)=nil, 0xa000, 0x0, 0x2172, 0xffffffffffffffff, 0x0) socketpair(0x1e, 0x80005, 0x0, &(0x7f0000000340)={0x0, 0x0}) r3 = socket$unix(0x1, 0x1, 0x0) r4 = socket$unix(0x1, 0x1, 0x0) r5 = openat$khugepaged_scan(0xffffff9c, &(0x7f00000000c0), 0x1, 0x0) poll(&(0x7f0000000140)=[{r1, 0x3}, {0xffffffffffffffff, 0x10a2}, {r3, 0x1}, {r2, 0x64c}, {r4, 0x9041}, {0xffffffffffffffff, 0x140}, {r5, 0x10}], 0x7, 0xff) [ 404.385740][T17892] ? do_raw_spin_lock+0x120/0x2b0 [ 404.398238][T17892] tomoyo_file_open+0xa3/0xd0 [ 404.403439][T17892] security_file_open+0x52/0x4f0 [ 404.409692][T17892] do_dentry_open+0x353/0x11d0 [ 404.416630][T17892] ? __sanitizer_cov_trace_const_cmp4+0x1c/0x70 [ 404.426120][T17892] ? may_open+0x1f6/0x420 [ 404.432476][T17892] path_openat+0x1c23/0x27f0 [ 404.438650][T17892] ? path_lookupat+0x860/0x860 [ 404.444672][T17892] ? lockdep_hardirqs_on_prepare+0x400/0x400 [ 404.452676][T17892] do_filp_open+0x1aa/0x400 [ 404.457912][T17892] ? may_open_dev+0xf0/0xf0 [ 404.463412][T17892] ? rwlock_bug.part.0+0x90/0x90 [ 404.470091][T17892] ? __sanitizer_cov_trace_const_cmp8+0x1d/0x70 [ 404.477931][T17892] ? _find_next_bit+0x1e3/0x260 [ 404.483957][T17892] ? _raw_spin_unlock+0x24/0x40 [ 404.489880][T17892] ? alloc_fd+0x2f0/0x670 [ 404.495674][T17892] do_sys_openat2+0x16d/0x420 [ 404.502889][T17892] ? build_open_flags+0x6f0/0x6f0 [ 404.509701][T17892] ? find_held_lock+0x2d/0x110 [ 404.516164][T17892] ? __context_tracking_exit+0xb8/0xe0 [ 404.524388][T17892] __ia32_compat_sys_openat+0x13f/0x1f0 [ 404.532386][T17892] ? __x64_compat_sys_open+0x1c0/0x1c0 [ 404.540220][T17892] ? syscall_enter_from_user_mode_prepare+0x17/0x40 [ 404.549311][T17892] __do_fast_syscall_32+0x65/0xf0 [ 404.556482][T17892] do_fast_syscall_32+0x2f/0x70 [ 404.563454][T17892] entry_SYSENTER_compat_after_hwframe+0x4d/0x5c [ 404.572725][T17892] RIP: 0023:0xf7f3f549 [ 404.578558][T17892] Code: 03 74 c0 01 10 05 03 74 b8 01 10 06 03 74 b4 01 10 07 03 74 b0 01 10 08 03 74 d8 01 00 00 00 00 00 51 52 55 89 e5 0f 34 cd 80 <5d> 5a 59 c3 90 90 90 90 8d b4 26 00 00 00 00 8d b4 26 00 00 00 00 [ 404.606379][T17892] RSP: 002b:00000000f55393f0 EFLAGS: 00000282 ORIG_RAX: 0000000000000127 [ 404.619494][T17892] RAX: ffffffffffffffda RBX: 00000000ffffff9c RCX: 00000000f55394b0 [ 404.630071][T17892] RDX: 0000000000000002 RSI: 0000000000000000 RDI: 000000000816c000 [ 404.641790][T17892] RBP: 0000000000000000 R08: 0000000000000000 R09: 0000000000000000 [ 404.653616][T17892] R10: 0000000000000000 R11: 0000000000000000 R12: 0000000000000000 [ 404.664480][T17892] R13: 0000000000000000 R14: 0000000000000000 R15: 0000000000000000 [ 404.701238][T17892] ERROR: Out of memory at tomoyo_realpath_from_path. 06:20:02 executing program 1: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800004, 0x12, r0, 0x0) preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x9, 0x0) mmap(&(0x7f0000000000/0xa000)=nil, 0xa000, 0x0, 0x2172, 0xffffffffffffffff, 0x0) socketpair(0x1e, 0x80005, 0x0, &(0x7f0000000340)={0x0, 0x0}) r3 = socket$unix(0x1, 0x1, 0x0) r4 = socket$unix(0x1, 0x1, 0x0) r5 = openat$khugepaged_scan(0xffffff9c, &(0x7f00000000c0), 0x1, 0x0) poll(&(0x7f0000000140)=[{r1, 0x3}, {0xffffffffffffffff, 0x10a2}, {r3, 0x1}, {r2, 0x64c}, {r4, 0x9041}, {0xffffffffffffffff, 0x140}, {r5, 0x10}], 0x7, 0xff) 06:20:02 executing program 0: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800004, 0x12, r0, 0x0) preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x9, 0x0) mmap(&(0x7f0000000000/0xa000)=nil, 0xa000, 0x2, 0x10, 0xffffffffffffffff, 0x0) socketpair(0x1e, 0x80002, 0x0, &(0x7f0000000340)={0x0, 0x0}) 06:20:02 executing program 2: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800004, 0x12, r0, 0x0) preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x9, 0x0) r1 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r1, &(0x7f0000000380)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40}, [{0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x9, 0x6}], "d1660f10e0ac4a6edbf3aa53803c8f57ef2a12069e82553332d2b96d67f2dbc5b04959dad57c303d876233684f5e9ad402a193da791e11122f2cccbf10d6d499f5e16385d09f63891a965d80bcb68b551fabffb4bf0b5c372b4d69cdefac988201a40429a8d0dc699820193afcab08070fde89c22e16b43dde5e37d9a3df0cd352e8667f163774d9dc3c79571e5100046281", ['\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00']}, 0x80a) 06:20:02 executing program 3 (fault-call:3 fault-nth:15): r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800004, 0x12, r0, 0x0) preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x9, 0x0) syz_mount_image$reiserfs(&(0x7f0000000140), &(0x7f0000000180)='./file0\x00', 0x0, 0x0, &(0x7f0000000300), 0x0, &(0x7f0000000440)) [ 405.119171][T17920] FAULT_INJECTION: forcing a failure. [ 405.119171][T17920] name failslab, interval 1, probability 0, space 0, times 0 [ 405.140912][T17920] CPU: 2 PID: 17920 Comm: syz-executor.3 Not tainted 5.14.0-rc2-syzkaller #0 [ 405.154540][T17920] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.14.0-2 04/01/2014 [ 405.167804][T17920] Call Trace: [ 405.172621][T17920] dump_stack_lvl+0xcd/0x134 [ 405.180101][T17920] should_fail.cold+0x5/0xa 06:20:02 executing program 1: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800004, 0x12, r0, 0x0) preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x9, 0x0) mmap(&(0x7f0000000000/0xa000)=nil, 0xa000, 0x2, 0x10, 0xffffffffffffffff, 0x0) socketpair(0x1e, 0x80005, 0x0, &(0x7f0000000340)={0x0, 0x0}) r3 = socket$unix(0x1, 0x1, 0x0) r4 = socket$unix(0x1, 0x1, 0x0) r5 = openat$khugepaged_scan(0xffffff9c, &(0x7f00000000c0), 0x1, 0x0) poll(&(0x7f0000000140)=[{r1, 0x3}, {0xffffffffffffffff, 0x10a2}, {r3, 0x1}, {r2, 0x64c}, {r4, 0x9041}, {0xffffffffffffffff, 0x140}, {r5, 0x10}], 0x7, 0xff) [ 405.187052][T17920] ? tomoyo_realpath_from_path+0xc3/0x620 [ 405.195831][T17920] should_failslab+0x5/0x10 06:20:02 executing program 0: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800004, 0x12, r0, 0x0) preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x9, 0x0) mmap(&(0x7f0000000000/0xa000)=nil, 0xa000, 0x2, 0x10, 0xffffffffffffffff, 0x0) socketpair(0x1e, 0x80002, 0x0, &(0x7f0000000340)={0x0, 0x0}) [ 405.202283][T17920] __kmalloc+0x72/0x330 [ 405.209668][T17920] tomoyo_realpath_from_path+0xc3/0x620 [ 405.217276][T17920] ? tomoyo_profile+0x42/0x50 [ 405.223951][T17920] tomoyo_path_number_perm+0x1d5/0x590 [ 405.231169][T17920] ? tomoyo_path_number_perm+0x18d/0x590 [ 405.239393][T17920] ? tomoyo_execute_permission+0x4a0/0x4a0 [ 405.247373][T17920] ? lock_downgrade+0x6e0/0x6e0 [ 405.254625][T17920] ? find_held_lock+0x2d/0x110 [ 405.261658][T17920] ? __fget_files+0x23d/0x3e0 [ 405.268770][T17920] security_file_ioctl+0x50/0xb0 [ 405.275669][T17920] __do_compat_sys_ioctl+0x4e/0x290 [ 405.284382][T17920] __do_fast_syscall_32+0x65/0xf0 [ 405.292049][T17920] do_fast_syscall_32+0x2f/0x70 [ 405.299122][T17920] entry_SYSENTER_compat_after_hwframe+0x4d/0x5c [ 405.310714][T17920] RIP: 0023:0xf7f3f549 [ 405.310747][T17920] Code: 03 74 c0 01 10 05 03 74 b8 01 10 06 03 74 b4 01 10 07 03 74 b0 01 10 08 03 74 d8 01 00 00 00 00 00 51 52 55 89 e5 0f 34 cd 80 <5d> 5a 59 c3 90 90 90 90 8d b4 26 00 00 00 00 8d b4 26 00 00 00 00 [ 405.310823][T17920] RSP: 002b:00000000f5539418 EFLAGS: 00000296 ORIG_RAX: 0000000000000036 06:20:02 executing program 1: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800004, 0x12, r0, 0x0) preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x9, 0x0) mmap(&(0x7f0000000000/0xa000)=nil, 0xa000, 0x2, 0x10, 0xffffffffffffffff, 0x0) socketpair(0x1e, 0x80005, 0x0, &(0x7f0000000340)={0x0, 0x0}) r3 = socket$unix(0x1, 0x1, 0x0) r4 = socket$unix(0x1, 0x1, 0x0) r5 = openat$khugepaged_scan(0xffffff9c, &(0x7f00000000c0), 0x1, 0x0) poll(&(0x7f0000000140)=[{r1, 0x3}, {0xffffffffffffffff, 0x10a2}, {r3, 0x1}, {r2, 0x64c}, {r4, 0x9041}, {0xffffffffffffffff, 0x140}, {r5, 0x10}], 0x7, 0xff) [ 405.310851][T17920] RAX: ffffffffffffffda RBX: 0000000000000006 RCX: 0000000000004c00 [ 405.366621][T17920] RDX: 0000000000000005 RSI: 0000000000000006 RDI: 000000000816c000 [ 405.378566][T17920] RBP: 0000000000000005 R08: 0000000000000000 R09: 0000000000000000 [ 405.391188][T17920] R10: 0000000000000000 R11: 0000000000000000 R12: 0000000000000000 [ 405.403092][T17920] R13: 0000000000000000 R14: 0000000000000000 R15: 0000000000000000 [ 405.443569][T17920] ERROR: Out of memory at tomoyo_realpath_from_path. 06:20:03 executing program 0: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800004, 0x12, r0, 0x0) preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x9, 0x0) mmap(&(0x7f0000000000/0xa000)=nil, 0xa000, 0x2, 0x10, 0xffffffffffffffff, 0x0) socketpair(0x1e, 0x80002, 0x0, &(0x7f0000000340)={0x0, 0x0}) 06:20:03 executing program 1: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800004, 0x12, r0, 0x0) preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x9, 0x0) mmap(&(0x7f0000000000/0xa000)=nil, 0xa000, 0x2, 0x10, 0xffffffffffffffff, 0x0) socketpair(0x1e, 0x80005, 0x0, &(0x7f0000000340)={0x0, 0x0}) r3 = socket$unix(0x1, 0x1, 0x0) r4 = socket$unix(0x1, 0x1, 0x0) r5 = openat$khugepaged_scan(0xffffff9c, &(0x7f00000000c0), 0x1, 0x0) poll(&(0x7f0000000140)=[{r1, 0x3}, {0xffffffffffffffff, 0x10a2}, {r3, 0x1}, {r2, 0x64c}, {r4, 0x9041}, {0xffffffffffffffff, 0x140}, {r5, 0x10}], 0x7, 0xff) 06:20:03 executing program 0: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800004, 0x12, r0, 0x0) preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x9, 0x0) mmap(&(0x7f0000000000/0xa000)=nil, 0xa000, 0x2, 0x2172, 0xffffffffffffffff, 0x0) socketpair(0x0, 0x80002, 0x0, &(0x7f0000000340)={0x0, 0x0}) 06:20:03 executing program 2: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800004, 0x12, r0, 0x0) preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x9, 0x0) r1 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r1, &(0x7f0000000380)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40}, [{0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x9, 0x6}], "d1660f10e0ac4a6edbf3aa53803c8f57ef2a12069e82553332d2b96d67f2dbc5b04959dad57c303d876233684f5e9ad402a193da791e11122f2cccbf10d6d499f5e16385d09f63891a965d80bcb68b551fabffb4bf0b5c372b4d69cdefac988201a40429a8d0dc699820193afcab08070fde89c22e16b43dde5e37d9a3df0cd352e8667f163774d9dc3c79571e5100046281", ['\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00']}, 0x80a) 06:20:03 executing program 1: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800004, 0x12, r0, 0x0) preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x9, 0x0) mmap(&(0x7f0000000000/0xa000)=nil, 0xa000, 0x2, 0x2172, 0xffffffffffffffff, 0x0) socketpair(0x0, 0x80005, 0x0, &(0x7f0000000340)={0x0, 0x0}) r3 = socket$unix(0x1, 0x1, 0x0) r4 = socket$unix(0x1, 0x1, 0x0) r5 = openat$khugepaged_scan(0xffffff9c, &(0x7f00000000c0), 0x1, 0x0) poll(&(0x7f0000000140)=[{r1, 0x3}, {0xffffffffffffffff, 0x10a2}, {r3, 0x1}, {r2, 0x64c}, {r4, 0x9041}, {0xffffffffffffffff, 0x140}, {r5, 0x10}], 0x7, 0xff) 06:20:03 executing program 3 (fault-call:3 fault-nth:16): r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800004, 0x12, r0, 0x0) preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x9, 0x0) syz_mount_image$reiserfs(&(0x7f0000000140), &(0x7f0000000180)='./file0\x00', 0x0, 0x0, &(0x7f0000000300), 0x0, &(0x7f0000000440)) 06:20:03 executing program 0: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800004, 0x12, r0, 0x0) preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x9, 0x0) mmap(&(0x7f0000000000/0xa000)=nil, 0xa000, 0x2, 0x2172, 0xffffffffffffffff, 0x0) socketpair(0x0, 0x80002, 0x0, &(0x7f0000000340)={0x0, 0x0}) [ 406.168283][T17959] FAULT_INJECTION: forcing a failure. [ 406.168283][T17959] name failslab, interval 1, probability 0, space 0, times 0 06:20:03 executing program 1: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800004, 0x12, r0, 0x0) preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x9, 0x0) mmap(&(0x7f0000000000/0xa000)=nil, 0xa000, 0x2, 0x2172, 0xffffffffffffffff, 0x0) socketpair(0x0, 0x80005, 0x0, &(0x7f0000000340)={0x0, 0x0}) r3 = socket$unix(0x1, 0x1, 0x0) r4 = socket$unix(0x1, 0x1, 0x0) r5 = openat$khugepaged_scan(0xffffff9c, &(0x7f00000000c0), 0x1, 0x0) poll(&(0x7f0000000140)=[{r1, 0x3}, {0xffffffffffffffff, 0x10a2}, {r3, 0x1}, {r2, 0x64c}, {r4, 0x9041}, {0xffffffffffffffff, 0x140}, {r5, 0x10}], 0x7, 0xff) 06:20:03 executing program 0: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800004, 0x12, r0, 0x0) preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x9, 0x0) mmap(&(0x7f0000000000/0xa000)=nil, 0xa000, 0x2, 0x2172, 0xffffffffffffffff, 0x0) socketpair(0x0, 0x80002, 0x0, &(0x7f0000000340)={0x0, 0x0}) [ 406.224722][T17959] CPU: 0 PID: 17959 Comm: syz-executor.3 Not tainted 5.14.0-rc2-syzkaller #0 [ 406.238438][T17959] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.14.0-2 04/01/2014 [ 406.252911][T17959] Call Trace: [ 406.258065][T17959] dump_stack_lvl+0xcd/0x134 [ 406.265161][T17959] should_fail.cold+0x5/0xa [ 406.270865][T17959] ? tomoyo_encode2.part.0+0xe9/0x3a0 [ 406.276910][T17959] should_failslab+0x5/0x10 [ 406.283331][T17959] __kmalloc+0x72/0x330 [ 406.289564][T17959] tomoyo_encode2.part.0+0xe9/0x3a0 [ 406.296981][T17959] tomoyo_encode+0x28/0x50 [ 406.303617][T17959] tomoyo_realpath_from_path+0x186/0x620 [ 406.311415][T17959] tomoyo_path_number_perm+0x1d5/0x590 [ 406.319549][T17959] ? tomoyo_path_number_perm+0x18d/0x590 [ 406.327551][T17959] ? tomoyo_execute_permission+0x4a0/0x4a0 [ 406.336231][T17959] ? lock_downgrade+0x6e0/0x6e0 [ 406.343056][T17959] ? find_held_lock+0x2d/0x110 [ 406.350669][T17959] ? __fget_files+0x23d/0x3e0 [ 406.357852][T17959] security_file_ioctl+0x50/0xb0 [ 406.366454][T17959] __do_compat_sys_ioctl+0x4e/0x290 [ 406.374488][T17959] __do_fast_syscall_32+0x65/0xf0 [ 406.381035][T17959] do_fast_syscall_32+0x2f/0x70 [ 406.389808][T17959] entry_SYSENTER_compat_after_hwframe+0x4d/0x5c [ 406.399603][T17959] RIP: 0023:0xf7f3f549 [ 406.406115][T17959] Code: 03 74 c0 01 10 05 03 74 b8 01 10 06 03 74 b4 01 10 07 03 74 b0 01 10 08 03 74 d8 01 00 00 00 00 00 51 52 55 89 e5 0f 34 cd 80 <5d> 5a 59 c3 90 90 90 90 8d b4 26 00 00 00 00 8d b4 26 00 00 00 00 [ 406.448606][T17959] RSP: 002b:00000000f5539418 EFLAGS: 00000296 ORIG_RAX: 0000000000000036 [ 406.459580][T17959] RAX: ffffffffffffffda RBX: 0000000000000006 RCX: 0000000000004c00 [ 406.469411][T17959] RDX: 0000000000000005 RSI: 0000000000000006 RDI: 000000000816c000 [ 406.479448][T17959] RBP: 0000000000000005 R08: 0000000000000000 R09: 0000000000000000 [ 406.490077][T17959] R10: 0000000000000000 R11: 0000000000000000 R12: 0000000000000000 [ 406.500919][T17959] R13: 0000000000000000 R14: 0000000000000000 R15: 0000000000000000 [ 406.517204][T17959] ERROR: Out of memory at tomoyo_realpath_from_path. 06:20:04 executing program 1: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800004, 0x12, r0, 0x0) preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x9, 0x0) mmap(&(0x7f0000000000/0xa000)=nil, 0xa000, 0x2, 0x2172, 0xffffffffffffffff, 0x0) socketpair(0x0, 0x80005, 0x0, &(0x7f0000000340)={0x0, 0x0}) r3 = socket$unix(0x1, 0x1, 0x0) r4 = socket$unix(0x1, 0x1, 0x0) r5 = openat$khugepaged_scan(0xffffff9c, &(0x7f00000000c0), 0x1, 0x0) poll(&(0x7f0000000140)=[{r1, 0x3}, {0xffffffffffffffff, 0x10a2}, {r3, 0x1}, {r2, 0x64c}, {r4, 0x9041}, {0xffffffffffffffff, 0x140}, {r5, 0x10}], 0x7, 0xff) 06:20:04 executing program 0: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800004, 0x12, r0, 0x0) preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x9, 0x0) mmap(&(0x7f0000000000/0xa000)=nil, 0xa000, 0x2, 0x2172, 0xffffffffffffffff, 0x0) socketpair(0x1e, 0x0, 0x0, &(0x7f0000000340)={0x0, 0x0}) 06:20:04 executing program 2: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800004, 0x12, r0, 0x0) preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x9, 0x0) r1 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r1, &(0x7f0000000380)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40}, [{0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x6}], "d1660f10e0ac4a6edbf3aa53803c8f57ef2a12069e82553332d2b96d67f2dbc5b04959dad57c303d876233684f5e9ad402a193da791e11122f2cccbf10d6d499f5e16385d09f63891a965d80bcb68b551fabffb4bf0b5c372b4d69cdefac988201a40429a8d0dc699820193afcab08070fde89c22e16b43dde5e37d9a3df0cd352e8667f163774d9dc3c79571e5100046281", ['\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00']}, 0x80a) 06:20:04 executing program 3 (fault-call:3 fault-nth:17): r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800004, 0x12, r0, 0x0) preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x9, 0x0) syz_mount_image$reiserfs(&(0x7f0000000140), &(0x7f0000000180)='./file0\x00', 0x0, 0x0, &(0x7f0000000300), 0x0, &(0x7f0000000440)) 06:20:04 executing program 1: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800004, 0x12, r0, 0x0) preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x9, 0x0) mmap(&(0x7f0000000000/0xa000)=nil, 0xa000, 0x2, 0x2172, 0xffffffffffffffff, 0x0) socketpair(0x1e, 0x0, 0x0, &(0x7f0000000340)={0x0, 0x0}) r3 = socket$unix(0x1, 0x1, 0x0) r4 = socket$unix(0x1, 0x1, 0x0) r5 = openat$khugepaged_scan(0xffffff9c, &(0x7f00000000c0), 0x1, 0x0) poll(&(0x7f0000000140)=[{r1, 0x3}, {0xffffffffffffffff, 0x10a2}, {r3, 0x1}, {r2, 0x64c}, {r4, 0x9041}, {0xffffffffffffffff, 0x140}, {r5, 0x10}], 0x7, 0xff) 06:20:04 executing program 0: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800004, 0x12, r0, 0x0) preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x9, 0x0) mmap(&(0x7f0000000000/0xa000)=nil, 0xa000, 0x2, 0x2172, 0xffffffffffffffff, 0x0) socketpair(0x1e, 0x0, 0x0, &(0x7f0000000340)={0x0, 0x0}) [ 407.102057][T17994] FAULT_INJECTION: forcing a failure. [ 407.102057][T17994] name failslab, interval 1, probability 0, space 0, times 0 [ 407.134415][T17994] CPU: 0 PID: 17994 Comm: syz-executor.3 Not tainted 5.14.0-rc2-syzkaller #0 [ 407.148221][T17994] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.14.0-2 04/01/2014 [ 407.160692][T17994] Call Trace: [ 407.165964][T17994] dump_stack_lvl+0xcd/0x134 [ 407.172436][T17994] should_fail.cold+0x5/0xa [ 407.178744][T17994] ? alloc_workqueue+0x16d/0xef0 [ 407.185027][T17994] should_failslab+0x5/0x10 [ 407.191774][T17994] __kmalloc+0x72/0x330 [ 407.197782][T17994] alloc_workqueue+0x16d/0xef0 [ 407.204366][T17994] ? __mutex_lock+0x5bf/0x10a0 [ 407.211440][T17994] ? _raw_spin_unlock+0x24/0x40 [ 407.218140][T17994] ? loop_configure+0xc2/0x1580 06:20:04 executing program 0: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800004, 0x12, r0, 0x0) preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x9, 0x0) mmap(&(0x7f0000000000/0xa000)=nil, 0xa000, 0x2, 0x2172, 0xffffffffffffffff, 0x0) socketpair(0x1e, 0x0, 0x0, &(0x7f0000000340)={0x0, 0x0}) 06:20:04 executing program 1: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800004, 0x12, r0, 0x0) preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x9, 0x0) mmap(&(0x7f0000000000/0xa000)=nil, 0xa000, 0x2, 0x2172, 0xffffffffffffffff, 0x0) socketpair(0x1e, 0x0, 0x0, &(0x7f0000000340)={0x0, 0x0}) r3 = socket$unix(0x1, 0x1, 0x0) r4 = socket$unix(0x1, 0x1, 0x0) r5 = openat$khugepaged_scan(0xffffff9c, &(0x7f00000000c0), 0x1, 0x0) poll(&(0x7f0000000140)=[{r1, 0x3}, {0xffffffffffffffff, 0x10a2}, {r3, 0x1}, {r2, 0x64c}, {r4, 0x9041}, {0xffffffffffffffff, 0x140}, {r5, 0x10}], 0x7, 0xff) [ 407.224803][T17994] ? loop_set_status_from_info+0xa60/0xa60 [ 407.233822][T17994] ? workqueue_sysfs_register+0x3e0/0x3e0 06:20:04 executing program 0: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800004, 0x12, r0, 0x0) preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x9, 0x0) mmap(&(0x7f0000000000/0xa000)=nil, 0xa000, 0x2, 0x2172, 0xffffffffffffffff, 0x0) socketpair(0x1e, 0x80002, 0x0, 0x0) [ 407.241163][T17994] ? mutex_lock_io_nested+0xf00/0xf00 [ 407.249019][T17994] ? memcpy+0x39/0x60 [ 407.255303][T17994] ? loop_configure+0x416/0x1580 [ 407.262922][T17994] loop_configure+0x4d8/0x1580 [ 407.270187][T17994] lo_ioctl+0x403/0x1600 [ 407.277707][T17994] ? loop_set_status_old+0x250/0x250 [ 407.285003][T17994] ? find_held_lock+0x2d/0x110 06:20:04 executing program 1: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800004, 0x12, r0, 0x0) preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x9, 0x0) mmap(&(0x7f0000000000/0xa000)=nil, 0xa000, 0x2, 0x2172, 0xffffffffffffffff, 0x0) socketpair(0x1e, 0x0, 0x0, &(0x7f0000000340)={0x0, 0x0}) r3 = socket$unix(0x1, 0x1, 0x0) r4 = socket$unix(0x1, 0x1, 0x0) r5 = openat$khugepaged_scan(0xffffff9c, &(0x7f00000000c0), 0x1, 0x0) poll(&(0x7f0000000140)=[{r1, 0x3}, {0xffffffffffffffff, 0x10a2}, {r3, 0x1}, {r2, 0x64c}, {r4, 0x9041}, {0xffffffffffffffff, 0x140}, {r5, 0x10}], 0x7, 0xff) [ 407.291450][T17994] ? tomoyo_path_number_perm+0x204/0x590 [ 407.299063][T17994] ? lock_downgrade+0x6e0/0x6e0 [ 407.307667][T17994] ? kfree+0xeb/0x650 [ 407.314075][T17994] ? tomoyo_path_number_perm+0x441/0x590 [ 407.323234][T17994] ? __sanitizer_cov_trace_const_cmp1+0x22/0x80 [ 407.332571][T17994] ? tomoyo_path_number_perm+0x24e/0x590 [ 407.341224][T17994] ? lock_downgrade+0x6e0/0x6e0 [ 407.349784][T17994] lo_compat_ioctl+0xb1/0x110 [ 407.356913][T17994] compat_blkdev_ioctl+0x3c2/0x870 [ 407.365553][T17994] ? lo_ioctl+0x1600/0x1600 [ 407.371310][T17994] ? blkdev_ioctl+0x6d0/0x6d0 [ 407.378080][T17994] ? __sanitizer_cov_trace_const_cmp4+0x1c/0x70 [ 407.389436][T17994] ? blkdev_ioctl+0x6d0/0x6d0 [ 407.397101][T17994] __do_compat_sys_ioctl+0x1c7/0x290 [ 407.406370][T17994] __do_fast_syscall_32+0x65/0xf0 [ 407.416241][T17994] do_fast_syscall_32+0x2f/0x70 [ 407.424283][T17994] entry_SYSENTER_compat_after_hwframe+0x4d/0x5c [ 407.434509][T17994] RIP: 0023:0xf7f3f549 [ 407.440739][T17994] Code: 03 74 c0 01 10 05 03 74 b8 01 10 06 03 74 b4 01 10 07 03 74 b0 01 10 08 03 74 d8 01 00 00 00 00 00 51 52 55 89 e5 0f 34 cd 80 <5d> 5a 59 c3 90 90 90 90 8d b4 26 00 00 00 00 8d b4 26 00 00 00 00 [ 407.479686][T17994] RSP: 002b:00000000f5539418 EFLAGS: 00000296 ORIG_RAX: 0000000000000036 [ 407.479732][T17994] RAX: ffffffffffffffda RBX: 0000000000000006 RCX: 0000000000004c00 [ 407.479759][T17994] RDX: 0000000000000005 RSI: 0000000000000006 RDI: 000000000816c000 [ 407.479785][T17994] RBP: 0000000000000005 R08: 0000000000000000 R09: 0000000000000000 [ 407.479810][T17994] R10: 0000000000000000 R11: 0000000000000000 R12: 0000000000000000 [ 407.479834][T17994] R13: 0000000000000000 R14: 0000000000000000 R15: 0000000000000000 06:20:05 executing program 2: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800004, 0x12, r0, 0x0) preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x9, 0x0) r1 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r1, &(0x7f0000000380)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40}, [{0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6}], "d1660f10e0ac4a6edbf3aa53803c8f57ef2a12069e82553332d2b96d67f2dbc5b04959dad57c303d876233684f5e9ad402a193da791e11122f2cccbf10d6d499f5e16385d09f63891a965d80bcb68b551fabffb4bf0b5c372b4d69cdefac988201a40429a8d0dc699820193afcab08070fde89c22e16b43dde5e37d9a3df0cd352e8667f163774d9dc3c79571e5100046281", ['\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00']}, 0x80a) 06:20:05 executing program 0: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800004, 0x12, r0, 0x0) preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x9, 0x0) mmap(&(0x7f0000000000/0xa000)=nil, 0xa000, 0x2, 0x2172, 0xffffffffffffffff, 0x0) socketpair(0x1e, 0x80002, 0x0, 0x0) 06:20:05 executing program 3 (fault-call:3 fault-nth:18): r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800004, 0x12, r0, 0x0) preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x9, 0x0) syz_mount_image$reiserfs(&(0x7f0000000140), &(0x7f0000000180)='./file0\x00', 0x0, 0x0, &(0x7f0000000300), 0x0, &(0x7f0000000440)) 06:20:05 executing program 1: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800004, 0x12, r0, 0x0) preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x9, 0x0) mmap(&(0x7f0000000000/0xa000)=nil, 0xa000, 0x2, 0x2172, 0xffffffffffffffff, 0x0) socketpair(0x1e, 0x80005, 0x0, 0x0) r1 = socket$unix(0x1, 0x1, 0x0) r2 = socket$unix(0x1, 0x1, 0x0) r3 = openat$khugepaged_scan(0xffffff9c, &(0x7f00000000c0), 0x1, 0x0) poll(&(0x7f0000000140)=[{0xffffffffffffffff, 0x3}, {0xffffffffffffffff, 0x10a2}, {r1, 0x1}, {0xffffffffffffffff, 0x64c}, {r2, 0x9041}, {0xffffffffffffffff, 0x140}, {r3, 0x10}], 0x7, 0xff) 06:20:05 executing program 0: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800004, 0x12, r0, 0x0) preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x9, 0x0) mmap(&(0x7f0000000000/0xa000)=nil, 0xa000, 0x2, 0x2172, 0xffffffffffffffff, 0x0) socketpair(0x1e, 0x80002, 0x0, 0x0) [ 408.377656][T18023] FAULT_INJECTION: forcing a failure. [ 408.377656][T18023] name failslab, interval 1, probability 0, space 0, times 0 06:20:06 executing program 1: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800004, 0x12, r0, 0x0) preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x9, 0x0) mmap(&(0x7f0000000000/0xa000)=nil, 0xa000, 0x2, 0x2172, 0xffffffffffffffff, 0x0) socketpair(0x1e, 0x80005, 0x0, 0x0) r1 = socket$unix(0x1, 0x1, 0x0) r2 = socket$unix(0x1, 0x1, 0x0) r3 = openat$khugepaged_scan(0xffffff9c, &(0x7f00000000c0), 0x1, 0x0) poll(&(0x7f0000000140)=[{0xffffffffffffffff, 0x3}, {0xffffffffffffffff, 0x10a2}, {r1, 0x1}, {0xffffffffffffffff, 0x64c}, {r2, 0x9041}, {0xffffffffffffffff, 0x140}, {r3, 0x10}], 0x7, 0xff) [ 408.401978][T18023] CPU: 2 PID: 18023 Comm: syz-executor.3 Not tainted 5.14.0-rc2-syzkaller #0 [ 408.425863][T18023] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.14.0-2 04/01/2014 [ 408.438266][T18023] Call Trace: [ 408.442624][T18023] dump_stack_lvl+0xcd/0x134 [ 408.449197][T18023] should_fail.cold+0x5/0xa [ 408.455518][T18023] ? alloc_workqueue_attrs+0x38/0x80 [ 408.462875][T18023] should_failslab+0x5/0x10 [ 408.468674][T18023] kmem_cache_alloc_trace+0x55/0x3c0 [ 408.475653][T18023] alloc_workqueue_attrs+0x38/0x80 06:20:06 executing program 1: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800004, 0x12, r0, 0x0) preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x9, 0x0) mmap(&(0x7f0000000000/0xa000)=nil, 0xa000, 0x2, 0x2172, 0xffffffffffffffff, 0x0) socketpair(0x1e, 0x80005, 0x0, 0x0) r1 = socket$unix(0x1, 0x1, 0x0) r2 = socket$unix(0x1, 0x1, 0x0) r3 = openat$khugepaged_scan(0xffffff9c, &(0x7f00000000c0), 0x1, 0x0) poll(&(0x7f0000000140)=[{0xffffffffffffffff, 0x3}, {0xffffffffffffffff, 0x10a2}, {r1, 0x1}, {0xffffffffffffffff, 0x64c}, {r2, 0x9041}, {0xffffffffffffffff, 0x140}, {r3, 0x10}], 0x7, 0xff) [ 408.482618][T18023] alloc_workqueue+0x192/0xef0 [ 408.488819][T18023] ? __mutex_lock+0x5bf/0x10a0 [ 408.494392][T18023] ? _raw_spin_unlock+0x24/0x40 [ 408.499747][T18023] ? loop_configure+0xc2/0x1580 06:20:06 executing program 0: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800004, 0x12, r0, 0x0) preadv(r0, 0x0, 0x0, 0x9, 0x0) mmap(&(0x7f0000000000/0xa000)=nil, 0xa000, 0x2, 0x2172, 0xffffffffffffffff, 0x0) socketpair(0x1e, 0x80002, 0x0, &(0x7f0000000340)={0x0, 0x0}) [ 408.505138][T18023] ? loop_set_status_from_info+0xa60/0xa60 [ 408.512369][T18023] ? workqueue_sysfs_register+0x3e0/0x3e0 [ 408.524619][T18023] ? mutex_lock_io_nested+0xf00/0xf00 [ 408.532237][T18023] ? memcpy+0x39/0x60 [ 408.545230][T18023] ? loop_configure+0x416/0x1580 [ 408.552744][T18023] loop_configure+0x4d8/0x1580 [ 408.560035][T18023] lo_ioctl+0x403/0x1600 [ 408.567124][T18023] ? loop_set_status_old+0x250/0x250 [ 408.574799][T18023] ? find_held_lock+0x2d/0x110 [ 408.581861][T18023] ? tomoyo_path_number_perm+0x204/0x590 [ 408.590035][T18023] ? lock_downgrade+0x6e0/0x6e0 [ 408.596648][T18023] ? kfree+0xeb/0x650 [ 408.602121][T18023] ? tomoyo_path_number_perm+0x441/0x590 [ 408.609873][T18023] ? __sanitizer_cov_trace_const_cmp1+0x22/0x80 [ 408.619594][T18023] ? tomoyo_path_number_perm+0x24e/0x590 [ 408.629003][T18023] ? lock_downgrade+0x6e0/0x6e0 [ 408.636829][T18023] lo_compat_ioctl+0xb1/0x110 [ 408.644230][T18023] compat_blkdev_ioctl+0x3c2/0x870 [ 408.652502][T18023] ? lo_ioctl+0x1600/0x1600 [ 408.660259][T18023] ? blkdev_ioctl+0x6d0/0x6d0 [ 408.668953][T18023] ? __sanitizer_cov_trace_const_cmp4+0x1c/0x70 [ 408.677498][T18023] ? blkdev_ioctl+0x6d0/0x6d0 [ 408.683576][T18023] __do_compat_sys_ioctl+0x1c7/0x290 [ 408.690710][T18023] __do_fast_syscall_32+0x65/0xf0 [ 408.697390][T18023] do_fast_syscall_32+0x2f/0x70 [ 408.703168][T18023] entry_SYSENTER_compat_after_hwframe+0x4d/0x5c [ 408.711266][T18023] RIP: 0023:0xf7f3f549 [ 408.716882][T18023] Code: 03 74 c0 01 10 05 03 74 b8 01 10 06 03 74 b4 01 10 07 03 74 b0 01 10 08 03 74 d8 01 00 00 00 00 00 51 52 55 89 e5 0f 34 cd 80 <5d> 5a 59 c3 90 90 90 90 8d b4 26 00 00 00 00 8d b4 26 00 00 00 00 [ 408.746214][T18023] RSP: 002b:00000000f5539418 EFLAGS: 00000296 ORIG_RAX: 0000000000000036 [ 408.758484][T18023] RAX: ffffffffffffffda RBX: 0000000000000006 RCX: 0000000000004c00 [ 408.770361][T18023] RDX: 0000000000000005 RSI: 0000000000000006 RDI: 000000000816c000 [ 408.791201][T18023] RBP: 0000000000000005 R08: 0000000000000000 R09: 0000000000000000 [ 408.800410][T18023] R10: 0000000000000000 R11: 0000000000000000 R12: 0000000000000000 [ 408.812008][T18023] R13: 0000000000000000 R14: 0000000000000000 R15: 0000000000000000 06:20:06 executing program 2: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800004, 0x12, r0, 0x0) preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x9, 0x0) r1 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r1, &(0x7f0000000380)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40}, [{}], "d1660f10e0ac4a6edbf3aa53803c8f57ef2a12069e82553332d2b96d67f2dbc5b04959dad57c303d876233684f5e9ad402a193da791e11122f2cccbf10d6d499f5e16385d09f63891a965d80bcb68b551fabffb4bf0b5c372b4d69cdefac988201a40429a8d0dc699820193afcab08070fde89c22e16b43dde5e37d9a3df0cd352e8667f163774d9dc3c79571e5100046281", ['\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00']}, 0x80a) 06:20:06 executing program 0: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800004, 0x12, r0, 0x0) preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x9, 0x0) r1 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r1, &(0x7f0000000380)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, 0x0, 0x0, 0x38, 0x0, 0x0, 0x4, 0x4}, [{0x5, 0x9, 0x6, 0x101, 0x6, 0x4, 0x9, 0x6}, {0x5, 0x3, 0x5e61, 0x80000000, 0xcc3, 0x9, 0x7, 0x8}], "d1660f10e0ac4a6edbf3aa53803c8f57ef2a12069e82553332d2b96d67f2dbc5b04959dad57c303d876233684f5e9ad402a193da791e11122f2cccbf10d6d499f5e16385d09f63891a965d80bcb68b551fabffb4bf0b5c372b4d69cdefac988201a40429a8d0dc699820193afcab08070fde89c22e16b43dde5e37d9a3df0cd352e8667f163774d9dc3c79571e5100046281", ['\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00']}, 0x842) 06:20:06 executing program 1: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800004, 0x12, r0, 0x0) preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x9, 0x0) mmap(&(0x7f0000000000/0xa000)=nil, 0xa000, 0x2, 0x2172, 0xffffffffffffffff, 0x0) socketpair(0x1e, 0x80005, 0x0, &(0x7f0000000340)={0x0, 0x0}) r3 = socket$unix(0x1, 0x0, 0x0) r4 = socket$unix(0x1, 0x1, 0x0) r5 = openat$khugepaged_scan(0xffffff9c, &(0x7f00000000c0), 0x1, 0x0) poll(&(0x7f0000000140)=[{r1, 0x3}, {0xffffffffffffffff, 0x10a2}, {r3, 0x1}, {r2, 0x64c}, {r4, 0x9041}, {0xffffffffffffffff, 0x140}, {r5, 0x10}], 0x7, 0xff) 06:20:06 executing program 3 (fault-call:3 fault-nth:19): r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800004, 0x12, r0, 0x0) preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x9, 0x0) syz_mount_image$reiserfs(&(0x7f0000000140), &(0x7f0000000180)='./file0\x00', 0x0, 0x0, &(0x7f0000000300), 0x0, &(0x7f0000000440)) [ 409.258121][T18043] FAULT_INJECTION: forcing a failure. [ 409.258121][T18043] name failslab, interval 1, probability 0, space 0, times 0 [ 409.281026][T18043] CPU: 2 PID: 18043 Comm: syz-executor.3 Not tainted 5.14.0-rc2-syzkaller #0 [ 409.295127][T18043] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.14.0-2 04/01/2014 [ 409.308648][T18043] Call Trace: [ 409.314094][T18043] dump_stack_lvl+0xcd/0x134 [ 409.321211][T18043] should_fail.cold+0x5/0xa [ 409.326832][T18043] should_failslab+0x5/0x10 [ 409.332497][T18043] __kmalloc_track_caller+0x79/0x320 06:20:06 executing program 1: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800004, 0x12, r0, 0x0) preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x9, 0x0) mmap(&(0x7f0000000000/0xa000)=nil, 0xa000, 0x2, 0x2172, 0xffffffffffffffff, 0x0) socketpair(0x1e, 0x80005, 0x0, &(0x7f0000000340)={0x0, 0x0}) r3 = socket$unix(0x1, 0x0, 0x0) r4 = socket$unix(0x1, 0x1, 0x0) r5 = openat$khugepaged_scan(0xffffff9c, &(0x7f00000000c0), 0x1, 0x0) poll(&(0x7f0000000140)=[{r1, 0x3}, {0xffffffffffffffff, 0x10a2}, {r3, 0x1}, {r2, 0x64c}, {r4, 0x9041}, {0xffffffffffffffff, 0x140}, {r5, 0x10}], 0x7, 0xff) [ 409.340009][T18043] ? kasprintf+0xbb/0xf0 [ 409.346671][T18043] kvasprintf+0xb5/0x150 [ 409.352620][T18043] ? bust_spinlocks+0xe0/0xe0 [ 409.358492][T18043] kasprintf+0xbb/0xf0 [ 409.365041][T18043] ? kvasprintf_const+0x190/0x190 [ 409.372703][T18043] ? call_rcu_zapped+0xb0/0xb0 [ 409.380754][T18043] ? lockdep_unlock+0x11c/0x290 [ 409.386981][T18043] alloc_workqueue+0x45d/0xef0 [ 409.393448][T18043] ? __mutex_lock+0x5bf/0x10a0 [ 409.414679][T18043] ? _raw_spin_unlock+0x24/0x40 [ 409.422135][T18043] ? loop_configure+0xc2/0x1580 [ 409.428677][T18043] ? loop_set_status_from_info+0xa60/0xa60 [ 409.436818][T18043] ? workqueue_sysfs_register+0x3e0/0x3e0 [ 409.444734][T18043] ? memcpy+0x39/0x60 [ 409.452167][T18043] ? loop_configure+0x416/0x1580 06:20:07 executing program 1: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800004, 0x12, r0, 0x0) preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x9, 0x0) mmap(&(0x7f0000000000/0xa000)=nil, 0xa000, 0x2, 0x2172, 0xffffffffffffffff, 0x0) socketpair(0x1e, 0x80005, 0x0, &(0x7f0000000340)={0x0, 0x0}) r3 = socket$unix(0x1, 0x0, 0x0) r4 = socket$unix(0x1, 0x1, 0x0) r5 = openat$khugepaged_scan(0xffffff9c, &(0x7f00000000c0), 0x1, 0x0) poll(&(0x7f0000000140)=[{r1, 0x3}, {0xffffffffffffffff, 0x10a2}, {r3, 0x1}, {r2, 0x64c}, {r4, 0x9041}, {0xffffffffffffffff, 0x140}, {r5, 0x10}], 0x7, 0xff) [ 409.459671][T18043] loop_configure+0x4d8/0x1580 [ 409.467193][T18043] lo_ioctl+0x403/0x1600 [ 409.474030][T18043] ? loop_set_status_old+0x250/0x250 [ 409.483292][T18043] ? find_held_lock+0x2d/0x110 [ 409.490580][T18043] ? tomoyo_path_number_perm+0x204/0x590 [ 409.498857][T18043] ? lock_downgrade+0x6e0/0x6e0 [ 409.506037][T18043] ? kfree+0xeb/0x650 [ 409.511916][T18043] ? tomoyo_path_number_perm+0x441/0x590 [ 409.519089][T18043] ? __sanitizer_cov_trace_const_cmp1+0x22/0x80 [ 409.527487][T18043] ? tomoyo_path_number_perm+0x24e/0x590 [ 409.535457][T18043] ? lock_downgrade+0x6e0/0x6e0 [ 409.541340][T18043] lo_compat_ioctl+0xb1/0x110 [ 409.549233][T18043] compat_blkdev_ioctl+0x3c2/0x870 [ 409.556312][T18043] ? lo_ioctl+0x1600/0x1600 [ 409.563455][T18043] ? blkdev_ioctl+0x6d0/0x6d0 [ 409.569917][T18043] ? __sanitizer_cov_trace_const_cmp4+0x1c/0x70 [ 409.579188][T18043] ? blkdev_ioctl+0x6d0/0x6d0 [ 409.585841][T18043] __do_compat_sys_ioctl+0x1c7/0x290 06:20:07 executing program 1: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800004, 0x12, r0, 0x0) preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x9, 0x0) mmap(&(0x7f0000000000/0xa000)=nil, 0xa000, 0x2, 0x2172, 0xffffffffffffffff, 0x0) socketpair(0x1e, 0x80005, 0x0, &(0x7f0000000340)={0x0, 0x0}) r3 = socket$unix(0x1, 0x1, 0x0) r4 = socket$unix(0x1, 0x0, 0x0) r5 = openat$khugepaged_scan(0xffffff9c, &(0x7f00000000c0), 0x1, 0x0) poll(&(0x7f0000000140)=[{r1, 0x3}, {0xffffffffffffffff, 0x10a2}, {r3, 0x1}, {r2, 0x64c}, {r4, 0x9041}, {0xffffffffffffffff, 0x140}, {r5, 0x10}], 0x7, 0xff) [ 409.592956][T18043] __do_fast_syscall_32+0x65/0xf0 [ 409.603977][T18043] do_fast_syscall_32+0x2f/0x70 [ 409.610632][T18043] entry_SYSENTER_compat_after_hwframe+0x4d/0x5c [ 409.618757][T18043] RIP: 0023:0xf7f3f549 [ 409.623980][T18043] Code: 03 74 c0 01 10 05 03 74 b8 01 10 06 03 74 b4 01 10 07 03 74 b0 01 10 08 03 74 d8 01 00 00 00 00 00 51 52 55 89 e5 0f 34 cd 80 <5d> 5a 59 c3 90 90 90 90 8d b4 26 00 00 00 00 8d b4 26 00 00 00 00 [ 409.648395][T18043] RSP: 002b:00000000f5539418 EFLAGS: 00000296 ORIG_RAX: 0000000000000036 [ 409.659015][T18043] RAX: ffffffffffffffda RBX: 0000000000000006 RCX: 0000000000004c00 06:20:07 executing program 1: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800004, 0x12, r0, 0x0) preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x9, 0x0) mmap(&(0x7f0000000000/0xa000)=nil, 0xa000, 0x2, 0x2172, 0xffffffffffffffff, 0x0) socketpair(0x1e, 0x80005, 0x0, &(0x7f0000000340)={0x0, 0x0}) r3 = socket$unix(0x1, 0x1, 0x0) r4 = socket$unix(0x1, 0x0, 0x0) r5 = openat$khugepaged_scan(0xffffff9c, &(0x7f00000000c0), 0x1, 0x0) poll(&(0x7f0000000140)=[{r1, 0x3}, {0xffffffffffffffff, 0x10a2}, {r3, 0x1}, {r2, 0x64c}, {r4, 0x9041}, {0xffffffffffffffff, 0x140}, {r5, 0x10}], 0x7, 0xff) [ 409.668836][T18043] RDX: 0000000000000005 RSI: 0000000000000006 RDI: 000000000816c000 [ 409.681386][T18043] RBP: 0000000000000005 R08: 0000000000000000 R09: 0000000000000000 [ 409.692233][T18043] R10: 0000000000000000 R11: 0000000000000000 R12: 0000000000000000 [ 409.705252][T18043] R13: 0000000000000000 R14: 0000000000000000 R15: 0000000000000000 [ 410.113953][ T3408] ieee802154 phy0 wpan0: encryption failed: -22 [ 410.123286][ T3408] ieee802154 phy1 wpan1: encryption failed: -22 06:20:07 executing program 1: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800004, 0x12, r0, 0x0) preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x9, 0x0) mmap(&(0x7f0000000000/0xa000)=nil, 0xa000, 0x2, 0x2172, 0xffffffffffffffff, 0x0) socketpair(0x1e, 0x80005, 0x0, &(0x7f0000000340)={0x0, 0x0}) r3 = socket$unix(0x1, 0x1, 0x0) r4 = socket$unix(0x1, 0x0, 0x0) r5 = openat$khugepaged_scan(0xffffff9c, &(0x7f00000000c0), 0x1, 0x0) poll(&(0x7f0000000140)=[{r1, 0x3}, {0xffffffffffffffff, 0x10a2}, {r3, 0x1}, {r2, 0x64c}, {r4, 0x9041}, {0xffffffffffffffff, 0x140}, {r5, 0x10}], 0x7, 0xff) 06:20:07 executing program 3 (fault-call:3 fault-nth:20): r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800004, 0x12, r0, 0x0) preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x9, 0x0) syz_mount_image$reiserfs(&(0x7f0000000140), &(0x7f0000000180)='./file0\x00', 0x0, 0x0, &(0x7f0000000300), 0x0, &(0x7f0000000440)) 06:20:07 executing program 2: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800004, 0x12, r0, 0x0) preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x9, 0x0) r1 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r1, &(0x7f0000000380)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40}, [{}], "d1660f10e0ac4a6edbf3aa53803c8f57ef2a12069e82553332d2b96d67f2dbc5b04959dad57c303d876233684f5e9ad402a193da791e11122f2cccbf10d6d499f5e16385d09f63891a965d80bcb68b551fabffb4bf0b5c372b4d69cdefac988201a40429a8d0dc699820193afcab08070fde89c22e16b43dde5e37d9a3df0cd352e8667f163774d9dc3c79571e5100046281", ['\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00']}, 0x80a) 06:20:07 executing program 0: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800004, 0x12, r0, 0x0) preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x9, 0x0) r1 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r1, &(0x7f0000000380)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, 0x0, 0x0, 0x38, 0x0, 0x0, 0x4, 0x4}, [{0x5, 0x9, 0x6, 0x101, 0x6, 0x4, 0x9, 0x6}, {0x5, 0x3, 0x5e61, 0x80000000, 0xcc3, 0x9, 0x7, 0x8}], "d1660f10e0ac4a6edbf3aa53803c8f57ef2a12069e82553332d2b96d67f2dbc5b04959dad57c303d876233684f5e9ad402a193da791e11122f2cccbf10d6d499f5e16385d09f63891a965d80bcb68b551fabffb4bf0b5c372b4d69cdefac988201a40429a8d0dc699820193afcab08070fde89c22e16b43dde5e37d9a3df0cd352e8667f163774d9dc3c79571e5100046281", ['\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00']}, 0x842) [ 410.219389][T18075] FAULT_INJECTION: forcing a failure. [ 410.219389][T18075] name failslab, interval 1, probability 0, space 0, times 0 [ 410.236498][T18075] CPU: 2 PID: 18075 Comm: syz-executor.3 Not tainted 5.14.0-rc2-syzkaller #0 [ 410.247626][T18075] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.14.0-2 04/01/2014 [ 410.260994][T18075] Call Trace: [ 410.265398][T18075] dump_stack_lvl+0xcd/0x134 [ 410.271991][T18075] should_fail.cold+0x5/0xa 06:20:07 executing program 1: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800004, 0x12, r0, 0x0) preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x9, 0x0) mmap(&(0x7f0000000000/0xa000)=nil, 0xa000, 0x2, 0x2172, 0xffffffffffffffff, 0x0) socketpair(0x1e, 0x80005, 0x0, &(0x7f0000000340)={0x0, 0x0}) r3 = socket$unix(0x1, 0x1, 0x0) r4 = socket$unix(0x1, 0x1, 0x0) r5 = openat$khugepaged_scan(0xffffff9c, 0x0, 0x1, 0x0) poll(&(0x7f0000000140)=[{r1, 0x3}, {0xffffffffffffffff, 0x10a2}, {r3, 0x1}, {r2, 0x64c}, {r4, 0x9041}, {0xffffffffffffffff, 0x140}, {r5, 0x10}], 0x7, 0xff) [ 410.278590][T18075] ? apply_wqattrs_prepare+0xac/0x890 [ 410.286769][T18075] should_failslab+0x5/0x10 [ 410.293630][T18075] __kmalloc+0x72/0x330 [ 410.300690][T18075] apply_wqattrs_prepare+0xac/0x890 [ 410.308180][T18075] apply_workqueue_attrs_locked+0xc1/0x140 [ 410.323678][T18075] alloc_workqueue+0xafb/0xef0 [ 410.330417][T18075] ? _raw_spin_unlock+0x24/0x40 [ 410.336874][T18075] ? workqueue_sysfs_register+0x3e0/0x3e0 [ 410.345181][T18075] ? memcpy+0x39/0x60 [ 410.352040][T18075] ? loop_configure+0x416/0x1580 [ 410.359870][T18075] loop_configure+0x4d8/0x1580 [ 410.367741][T18075] lo_ioctl+0x403/0x1600 [ 410.373732][T18075] ? loop_set_status_old+0x250/0x250 [ 410.381117][T18075] ? find_held_lock+0x2d/0x110 [ 410.387506][T18075] ? tomoyo_path_number_perm+0x204/0x590 [ 410.396774][T18075] ? lock_downgrade+0x6e0/0x6e0 [ 410.403183][T18075] ? kfree+0xeb/0x650 [ 410.409604][T18075] ? tomoyo_path_number_perm+0x441/0x590 [ 410.418070][T18075] ? __sanitizer_cov_trace_const_cmp1+0x22/0x80 [ 410.428105][T18075] ? tomoyo_path_number_perm+0x24e/0x590 [ 410.437137][T18075] ? lock_downgrade+0x6e0/0x6e0 [ 410.444603][T18075] lo_compat_ioctl+0xb1/0x110 06:20:08 executing program 1: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800004, 0x12, r0, 0x0) preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x9, 0x0) mmap(&(0x7f0000000000/0xa000)=nil, 0xa000, 0x2, 0x2172, 0xffffffffffffffff, 0x0) socketpair(0x1e, 0x80005, 0x0, &(0x7f0000000340)={0x0, 0x0}) r3 = socket$unix(0x1, 0x1, 0x0) r4 = socket$unix(0x1, 0x1, 0x0) r5 = openat$khugepaged_scan(0xffffff9c, 0x0, 0x1, 0x0) poll(&(0x7f0000000140)=[{r1, 0x3}, {0xffffffffffffffff, 0x10a2}, {r3, 0x1}, {r2, 0x64c}, {r4, 0x9041}, {0xffffffffffffffff, 0x140}, {r5, 0x10}], 0x7, 0xff) [ 410.450893][T18075] compat_blkdev_ioctl+0x3c2/0x870 [ 410.459846][T18075] ? lo_ioctl+0x1600/0x1600 [ 410.466461][T18075] ? blkdev_ioctl+0x6d0/0x6d0 [ 410.473648][T18075] ? __sanitizer_cov_trace_const_cmp4+0x1c/0x70 [ 410.483140][T18075] ? blkdev_ioctl+0x6d0/0x6d0 [ 410.489780][T18075] __do_compat_sys_ioctl+0x1c7/0x290 [ 410.497205][T18075] __do_fast_syscall_32+0x65/0xf0 [ 410.504835][T18075] do_fast_syscall_32+0x2f/0x70 [ 410.511979][T18075] entry_SYSENTER_compat_after_hwframe+0x4d/0x5c [ 410.521655][T18075] RIP: 0023:0xf7f3f549 [ 410.527844][T18075] Code: 03 74 c0 01 10 05 03 74 b8 01 10 06 03 74 b4 01 10 07 03 74 b0 01 10 08 03 74 d8 01 00 00 00 00 00 51 52 55 89 e5 0f 34 cd 80 <5d> 5a 59 c3 90 90 90 90 8d b4 26 00 00 00 00 8d b4 26 00 00 00 00 [ 410.554229][T18075] RSP: 002b:00000000f5539418 EFLAGS: 00000296 ORIG_RAX: 0000000000000036 [ 410.565780][T18075] RAX: ffffffffffffffda RBX: 0000000000000006 RCX: 0000000000004c00 [ 410.578606][T18075] RDX: 0000000000000005 RSI: 0000000000000006 RDI: 000000000816c000 [ 410.589271][T18075] RBP: 0000000000000005 R08: 0000000000000000 R09: 0000000000000000 [ 410.602010][T18075] R10: 0000000000000000 R11: 0000000000000000 R12: 0000000000000000 06:20:08 executing program 1: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800004, 0x12, r0, 0x0) preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x9, 0x0) mmap(&(0x7f0000000000/0xa000)=nil, 0xa000, 0x2, 0x2172, 0xffffffffffffffff, 0x0) socketpair(0x1e, 0x80005, 0x0, &(0x7f0000000340)={0x0, 0x0}) r3 = socket$unix(0x1, 0x1, 0x0) r4 = socket$unix(0x1, 0x1, 0x0) r5 = openat$khugepaged_scan(0xffffff9c, 0x0, 0x1, 0x0) poll(&(0x7f0000000140)=[{r1, 0x3}, {0xffffffffffffffff, 0x10a2}, {r3, 0x1}, {r2, 0x64c}, {r4, 0x9041}, {0xffffffffffffffff, 0x140}, {r5, 0x10}], 0x7, 0xff) [ 410.613194][T18075] R13: 0000000000000000 R14: 0000000000000000 R15: 0000000000000000 06:20:08 executing program 3 (fault-call:3 fault-nth:21): r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800004, 0x12, r0, 0x0) preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x9, 0x0) syz_mount_image$reiserfs(&(0x7f0000000140), &(0x7f0000000180)='./file0\x00', 0x0, 0x0, &(0x7f0000000300), 0x0, &(0x7f0000000440)) 06:20:08 executing program 1: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800004, 0x12, r0, 0x0) preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x9, 0x0) mmap(&(0x7f0000000000/0xa000)=nil, 0xa000, 0x2, 0x2172, 0xffffffffffffffff, 0x0) socketpair(0x1e, 0x80005, 0x0, &(0x7f0000000340)={0x0, 0x0}) socket$unix(0x1, 0x1, 0x0) socket$unix(0x1, 0x1, 0x0) openat$khugepaged_scan(0xffffff9c, &(0x7f00000000c0), 0x1, 0x0) poll(0x0, 0x0, 0xff) [ 410.759937][T18091] FAULT_INJECTION: forcing a failure. [ 410.759937][T18091] name failslab, interval 1, probability 0, space 0, times 0 [ 410.789488][T18091] CPU: 1 PID: 18091 Comm: syz-executor.3 Not tainted 5.14.0-rc2-syzkaller #0 [ 410.804587][T18091] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.14.0-2 04/01/2014 [ 410.818392][T18091] Call Trace: [ 410.823700][T18091] dump_stack_lvl+0xcd/0x134 [ 410.831491][T18091] should_fail.cold+0x5/0xa [ 410.837362][T18091] ? alloc_workqueue_attrs+0x38/0x80 [ 410.844622][T18091] should_failslab+0x5/0x10 [ 410.850862][T18091] kmem_cache_alloc_trace+0x55/0x3c0 [ 410.858018][T18091] alloc_workqueue_attrs+0x38/0x80 [ 410.865172][T18091] apply_wqattrs_prepare+0xb4/0x890 [ 410.872432][T18091] apply_workqueue_attrs_locked+0xc1/0x140 [ 410.880091][T18091] alloc_workqueue+0xafb/0xef0 [ 410.887155][T18091] ? _raw_spin_unlock+0x24/0x40 [ 410.895902][T18091] ? workqueue_sysfs_register+0x3e0/0x3e0 [ 410.905917][T18091] ? memcpy+0x39/0x60 [ 410.911998][T18091] ? loop_configure+0x416/0x1580 [ 410.918826][T18091] loop_configure+0x4d8/0x1580 [ 410.926351][T18091] lo_ioctl+0x403/0x1600 [ 410.932912][T18091] ? loop_set_status_old+0x250/0x250 [ 410.941465][T18091] ? find_held_lock+0x2d/0x110 [ 410.947787][T18091] ? tomoyo_path_number_perm+0x204/0x590 [ 410.955447][T18091] ? lock_downgrade+0x6e0/0x6e0 [ 410.962965][T18091] ? kfree+0xeb/0x650 [ 410.968899][T18091] ? tomoyo_path_number_perm+0x441/0x590 [ 410.976441][T18091] ? __sanitizer_cov_trace_const_cmp1+0x22/0x80 [ 410.985843][T18091] ? tomoyo_path_number_perm+0x24e/0x590 [ 410.994692][T18091] ? lock_downgrade+0x6e0/0x6e0 [ 411.001861][T18091] lo_compat_ioctl+0xb1/0x110 [ 411.007182][T18091] compat_blkdev_ioctl+0x3c2/0x870 [ 411.014138][T18091] ? lo_ioctl+0x1600/0x1600 [ 411.020203][T18091] ? blkdev_ioctl+0x6d0/0x6d0 [ 411.027089][T18091] ? __sanitizer_cov_trace_const_cmp4+0x1c/0x70 [ 411.037478][T18091] ? blkdev_ioctl+0x6d0/0x6d0 [ 411.046368][T18091] __do_compat_sys_ioctl+0x1c7/0x290 [ 411.054977][T18091] __do_fast_syscall_32+0x65/0xf0 [ 411.062351][T18091] do_fast_syscall_32+0x2f/0x70 [ 411.070484][T18091] entry_SYSENTER_compat_after_hwframe+0x4d/0x5c [ 411.081129][T18091] RIP: 0023:0xf7f3f549 06:20:08 executing program 1: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800004, 0x12, r0, 0x0) preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x9, 0x0) mmap(&(0x7f0000000000/0xa000)=nil, 0xa000, 0x2, 0x2172, 0xffffffffffffffff, 0x0) socketpair(0x1e, 0x80005, 0x0, &(0x7f0000000340)={0x0, 0x0}) socket$unix(0x1, 0x1, 0x0) socket$unix(0x1, 0x1, 0x0) openat$khugepaged_scan(0xffffff9c, &(0x7f00000000c0), 0x1, 0x0) poll(0x0, 0x0, 0xff) [ 411.087975][T18091] Code: 03 74 c0 01 10 05 03 74 b8 01 10 06 03 74 b4 01 10 07 03 74 b0 01 10 08 03 74 d8 01 00 00 00 00 00 51 52 55 89 e5 0f 34 cd 80 <5d> 5a 59 c3 90 90 90 90 8d b4 26 00 00 00 00 8d b4 26 00 00 00 00 [ 411.116779][T18091] RSP: 002b:00000000f5539418 EFLAGS: 00000296 ORIG_RAX: 0000000000000036 [ 411.131598][T18091] RAX: ffffffffffffffda RBX: 0000000000000006 RCX: 0000000000004c00 [ 411.144605][T18091] RDX: 0000000000000005 RSI: 0000000000000006 RDI: 000000000816c000 [ 411.156193][T18091] RBP: 0000000000000005 R08: 0000000000000000 R09: 0000000000000000 [ 411.168611][T18091] R10: 0000000000000000 R11: 0000000000000000 R12: 0000000000000000 [ 411.180398][T18091] R13: 0000000000000000 R14: 0000000000000000 R15: 0000000000000000 06:20:08 executing program 2: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800004, 0x12, r0, 0x0) preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x9, 0x0) r1 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r1, &(0x7f0000000380)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40}, [{}], "", ['\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00']}, 0x778) 06:20:08 executing program 0: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800004, 0x12, r0, 0x0) preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x9, 0x0) r1 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r1, &(0x7f0000000380)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40}, [{}], "d1660f10e0ac4a6edbf3aa53803c8f57ef2a12069e82553332d2b96d67f2dbc5b04959dad57c303d876233684f5e9ad402a193da791e11122f2cccbf10d6d499f5e16385d09f63891a965d80bcb68b551fabffb4bf0b5c372b4d69cdefac988201a40429a8d0dc699820193afcab08070fde89c22e16b43dde5e37d9a3df0cd352e8667f163774d9dc3c79571e5100046281", ['\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00']}, 0x80a) 06:20:08 executing program 3 (fault-call:3 fault-nth:22): r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800004, 0x12, r0, 0x0) preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x9, 0x0) syz_mount_image$reiserfs(&(0x7f0000000140), &(0x7f0000000180)='./file0\x00', 0x0, 0x0, &(0x7f0000000300), 0x0, &(0x7f0000000440)) 06:20:09 executing program 1: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800004, 0x12, r0, 0x0) preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x9, 0x0) mmap(&(0x7f0000000000/0xa000)=nil, 0xa000, 0x2, 0x2172, 0xffffffffffffffff, 0x0) socketpair(0x1e, 0x80005, 0x0, &(0x7f0000000340)={0x0, 0x0}) socket$unix(0x1, 0x1, 0x0) socket$unix(0x1, 0x1, 0x0) openat$khugepaged_scan(0xffffff9c, &(0x7f00000000c0), 0x1, 0x0) poll(0x0, 0x0, 0xff) [ 411.469690][T18102] FAULT_INJECTION: forcing a failure. [ 411.469690][T18102] name failslab, interval 1, probability 0, space 0, times 0 [ 411.494244][T18102] CPU: 3 PID: 18102 Comm: syz-executor.3 Not tainted 5.14.0-rc2-syzkaller #0 [ 411.510239][T18102] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.14.0-2 04/01/2014 [ 411.527748][T18102] Call Trace: [ 411.532922][T18102] dump_stack_lvl+0xcd/0x134 [ 411.539526][T18102] should_fail.cold+0x5/0xa [ 411.545664][T18102] ? alloc_workqueue_attrs+0x38/0x80 [ 411.552207][T18102] should_failslab+0x5/0x10 [ 411.558246][T18102] kmem_cache_alloc_trace+0x55/0x3c0 [ 411.567080][T18102] alloc_workqueue_attrs+0x38/0x80 [ 411.574886][T18102] apply_wqattrs_prepare+0xbc/0x890 [ 411.582327][T18102] apply_workqueue_attrs_locked+0xc1/0x140 [ 411.592333][T18102] alloc_workqueue+0xafb/0xef0 [ 411.600628][T18102] ? _raw_spin_unlock+0x24/0x40 [ 411.608343][T18102] ? workqueue_sysfs_register+0x3e0/0x3e0 [ 411.617288][T18102] ? memcpy+0x39/0x60 [ 411.623542][T18102] ? loop_configure+0x416/0x1580 [ 411.630517][T18102] loop_configure+0x4d8/0x1580 [ 411.636920][T18102] lo_ioctl+0x403/0x1600 [ 411.642598][T18102] ? loop_set_status_old+0x250/0x250 [ 411.649577][T18102] ? find_held_lock+0x2d/0x110 [ 411.659011][T18102] ? tomoyo_path_number_perm+0x204/0x590 [ 411.668737][T18102] ? lock_downgrade+0x6e0/0x6e0 [ 411.674176][T18102] ? kfree+0xeb/0x650 [ 411.678833][T18102] ? tomoyo_path_number_perm+0x441/0x590 [ 411.686438][T18102] ? __sanitizer_cov_trace_const_cmp1+0x22/0x80 [ 411.708102][T18102] ? tomoyo_path_number_perm+0x24e/0x590 [ 411.717081][T18102] ? lock_downgrade+0x6e0/0x6e0 [ 411.724623][T18102] lo_compat_ioctl+0xb1/0x110 [ 411.730485][T18102] compat_blkdev_ioctl+0x3c2/0x870 [ 411.737211][T18102] ? lo_ioctl+0x1600/0x1600 [ 411.743445][T18102] ? blkdev_ioctl+0x6d0/0x6d0 [ 411.749317][T18102] ? __sanitizer_cov_trace_const_cmp4+0x1c/0x70 [ 411.758233][T18102] ? blkdev_ioctl+0x6d0/0x6d0 [ 411.764988][T18102] __do_compat_sys_ioctl+0x1c7/0x290 [ 411.772083][T18102] __do_fast_syscall_32+0x65/0xf0 [ 411.779442][T18102] do_fast_syscall_32+0x2f/0x70 [ 411.787062][T18102] entry_SYSENTER_compat_after_hwframe+0x4d/0x5c [ 411.795901][T18102] RIP: 0023:0xf7f3f549 [ 411.801337][T18102] Code: 03 74 c0 01 10 05 03 74 b8 01 10 06 03 74 b4 01 10 07 03 74 b0 01 10 08 03 74 d8 01 00 00 00 00 00 51 52 55 89 e5 0f 34 cd 80 <5d> 5a 59 c3 90 90 90 90 8d b4 26 00 00 00 00 8d b4 26 00 00 00 00 [ 411.831247][T18102] RSP: 002b:00000000f5539418 EFLAGS: 00000296 ORIG_RAX: 0000000000000036 [ 411.843057][T18102] RAX: ffffffffffffffda RBX: 0000000000000006 RCX: 0000000000004c00 [ 411.855973][T18102] RDX: 0000000000000005 RSI: 0000000000000006 RDI: 000000000816c000 [ 411.868652][T18102] RBP: 0000000000000005 R08: 0000000000000000 R09: 0000000000000000 [ 411.880194][T18102] R10: 0000000000000000 R11: 0000000000000000 R12: 0000000000000000 06:20:09 executing program 1: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800004, 0x12, r0, 0x0) preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x9, 0x0) mmap(&(0x7f0000000000/0xa000)=nil, 0xa000, 0x2, 0x2172, 0xffffffffffffffff, 0x0) socketpair(0x1e, 0x80005, 0x0, &(0x7f0000000340)={0x0, 0x0}) r3 = socket$unix(0x1, 0x1, 0x0) r4 = socket$unix(0x1, 0x1, 0x0) openat$khugepaged_scan(0xffffff9c, &(0x7f00000000c0), 0x1, 0x0) poll(&(0x7f0000000140)=[{r1, 0x3}, {0xffffffffffffffff, 0x10a2}, {r3, 0x1}, {r2, 0x64c}, {r4, 0x9041}, {0xffffffffffffffff, 0x140}], 0x6, 0xff) [ 411.892747][T18102] R13: 0000000000000000 R14: 0000000000000000 R15: 0000000000000000 06:20:09 executing program 3 (fault-call:3 fault-nth:23): r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800004, 0x12, r0, 0x0) preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x9, 0x0) syz_mount_image$reiserfs(&(0x7f0000000140), &(0x7f0000000180)='./file0\x00', 0x0, 0x0, &(0x7f0000000300), 0x0, &(0x7f0000000440)) 06:20:09 executing program 1: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800004, 0x12, r0, 0x0) preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x9, 0x0) mmap(&(0x7f0000000000/0xa000)=nil, 0xa000, 0x2, 0x2172, 0xffffffffffffffff, 0x0) socketpair(0x1e, 0x80005, 0x0, &(0x7f0000000340)={0x0, 0x0}) r3 = socket$unix(0x1, 0x1, 0x0) r4 = socket$unix(0x1, 0x1, 0x0) openat$khugepaged_scan(0xffffff9c, &(0x7f00000000c0), 0x1, 0x0) poll(&(0x7f0000000140)=[{r1, 0x3}, {0xffffffffffffffff, 0x10a2}, {r3, 0x1}, {r2, 0x64c}, {r4, 0x9041}, {0xffffffffffffffff, 0x140}], 0x6, 0xff) [ 412.008817][T18113] FAULT_INJECTION: forcing a failure. [ 412.008817][T18113] name failslab, interval 1, probability 0, space 0, times 0 [ 412.030304][T18113] CPU: 3 PID: 18113 Comm: syz-executor.3 Not tainted 5.14.0-rc2-syzkaller #0 [ 412.044381][T18113] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.14.0-2 04/01/2014 [ 412.055685][T18113] Call Trace: [ 412.060693][T18113] dump_stack_lvl+0xcd/0x134 [ 412.067042][T18113] should_fail.cold+0x5/0xa [ 412.074403][T18113] should_failslab+0x5/0x10 [ 412.082107][T18113] kmem_cache_alloc_node+0x65/0x3e0 [ 412.091153][T18113] ? alloc_unbound_pwq+0x4a5/0xcd0 [ 412.098906][T18113] alloc_unbound_pwq+0x4a5/0xcd0 06:20:09 executing program 1: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800004, 0x12, r0, 0x0) preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x9, 0x0) mmap(&(0x7f0000000000/0xa000)=nil, 0xa000, 0x2, 0x2172, 0xffffffffffffffff, 0x0) socketpair(0x1e, 0x80005, 0x0, &(0x7f0000000340)={0x0, 0x0}) r3 = socket$unix(0x1, 0x1, 0x0) r4 = socket$unix(0x1, 0x1, 0x0) openat$khugepaged_scan(0xffffff9c, &(0x7f00000000c0), 0x1, 0x0) poll(&(0x7f0000000140)=[{r1, 0x3}, {0xffffffffffffffff, 0x10a2}, {r3, 0x1}, {r2, 0x64c}, {r4, 0x9041}, {0xffffffffffffffff, 0x140}], 0x6, 0xff) [ 412.106799][T18113] apply_wqattrs_prepare+0x2b6/0x890 [ 412.115767][T18113] apply_workqueue_attrs_locked+0xc1/0x140 [ 412.122152][T18113] alloc_workqueue+0xafb/0xef0 [ 412.128497][T18113] ? _raw_spin_unlock+0x24/0x40 [ 412.135659][T18113] ? workqueue_sysfs_register+0x3e0/0x3e0 [ 412.155536][T18113] ? memcpy+0x39/0x60 [ 412.162637][T18113] ? loop_configure+0x416/0x1580 [ 412.170279][T18113] loop_configure+0x4d8/0x1580 [ 412.179013][T18113] lo_ioctl+0x403/0x1600 [ 412.179108][T18113] ? loop_set_status_old+0x250/0x250 [ 412.179142][T18113] ? find_held_lock+0x2d/0x110 [ 412.179181][T18113] ? tomoyo_path_number_perm+0x204/0x590 [ 412.179211][T18113] ? lock_downgrade+0x6e0/0x6e0 [ 412.215753][T18113] ? kfree+0xeb/0x650 [ 412.220886][T18113] ? tomoyo_path_number_perm+0x441/0x590 [ 412.229227][T18113] ? __sanitizer_cov_trace_const_cmp1+0x22/0x80 [ 412.238751][T18113] ? tomoyo_path_number_perm+0x24e/0x590 [ 412.247180][T18113] ? lock_downgrade+0x6e0/0x6e0 [ 412.254607][T18113] lo_compat_ioctl+0xb1/0x110 [ 412.261563][T18113] compat_blkdev_ioctl+0x3c2/0x870 [ 412.268964][T18113] ? lo_ioctl+0x1600/0x1600 [ 412.275445][T18113] ? blkdev_ioctl+0x6d0/0x6d0 [ 412.283956][T18113] ? __sanitizer_cov_trace_const_cmp4+0x1c/0x70 [ 412.292609][T18113] ? blkdev_ioctl+0x6d0/0x6d0 [ 412.299591][T18113] __do_compat_sys_ioctl+0x1c7/0x290 [ 412.306843][T18113] __do_fast_syscall_32+0x65/0xf0 [ 412.313822][T18113] do_fast_syscall_32+0x2f/0x70 [ 412.321197][T18113] entry_SYSENTER_compat_after_hwframe+0x4d/0x5c [ 412.330930][T18113] RIP: 0023:0xf7f3f549 [ 412.337138][T18113] Code: 03 74 c0 01 10 05 03 74 b8 01 10 06 03 74 b4 01 10 07 03 74 b0 01 10 08 03 74 d8 01 00 00 00 00 00 51 52 55 89 e5 0f 34 cd 80 <5d> 5a 59 c3 90 90 90 90 8d b4 26 00 00 00 00 8d b4 26 00 00 00 00 [ 412.365072][T18113] RSP: 002b:00000000f5539418 EFLAGS: 00000296 ORIG_RAX: 0000000000000036 [ 412.394444][T18113] RAX: ffffffffffffffda RBX: 0000000000000006 RCX: 0000000000004c00 [ 412.411092][T18113] RDX: 0000000000000005 RSI: 0000000000000006 RDI: 000000000816c000 [ 412.425105][T18113] RBP: 0000000000000005 R08: 0000000000000000 R09: 0000000000000000 [ 412.435084][T18113] R10: 0000000000000000 R11: 0000000000000000 R12: 0000000000000000 [ 412.446249][T18113] R13: 0000000000000000 R14: 0000000000000000 R15: 0000000000000000 06:20:09 executing program 2: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800004, 0x12, r0, 0x0) preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x9, 0x0) r1 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r1, &(0x7f0000000380)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40}, [{}], "", ['\x00', '\x00', '\x00', '\x00', '\x00', '\x00']}, 0x678) 06:20:10 executing program 0: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800004, 0x12, r0, 0x0) preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x9, 0x0) mmap(&(0x7f0000000000/0xa000)=nil, 0xa000, 0x2, 0x2172, 0xffffffffffffffff, 0x0) socketpair(0x1e, 0x80005, 0x0, &(0x7f0000000340)={0x0, 0x0}) r3 = socket$unix(0x1, 0x1, 0x0) r4 = socket$unix(0x1, 0x1, 0x0) openat$khugepaged_scan(0xffffff9c, &(0x7f00000000c0), 0x1, 0x0) poll(&(0x7f0000000140)=[{r1, 0x3}, {0xffffffffffffffff, 0x10a2}, {r3, 0x1}, {r2, 0x64c}, {r4, 0x9041}, {0xffffffffffffffff, 0x140}], 0x6, 0xff) 06:20:10 executing program 1: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800004, 0x12, r0, 0x0) preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x9, 0x0) mmap(&(0x7f0000000000/0xa000)=nil, 0xa000, 0x2, 0x2172, 0xffffffffffffffff, 0x0) socketpair(0x1e, 0x80005, 0x0, &(0x7f0000000340)={0x0, 0x0}) r3 = socket$unix(0x1, 0x1, 0x0) r4 = socket$unix(0x1, 0x1, 0x0) openat$khugepaged_scan(0xffffff9c, &(0x7f00000000c0), 0x1, 0x0) poll(&(0x7f0000000140)=[{r1, 0x3}, {0xffffffffffffffff, 0x10a2}, {r3, 0x1}, {r2, 0x64c}, {r4, 0x9041}, {0xffffffffffffffff, 0x140}, {0xffffffffffffffff, 0x10}], 0x7, 0xff) 06:20:10 executing program 3 (fault-call:3 fault-nth:24): r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800004, 0x12, r0, 0x0) preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x9, 0x0) syz_mount_image$reiserfs(&(0x7f0000000140), &(0x7f0000000180)='./file0\x00', 0x0, 0x0, &(0x7f0000000300), 0x0, &(0x7f0000000440)) 06:20:10 executing program 1: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800004, 0x12, r0, 0x0) preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x9, 0x0) mmap(&(0x7f0000000000/0xa000)=nil, 0xa000, 0x2, 0x2172, 0xffffffffffffffff, 0x0) socketpair(0x1e, 0x80005, 0x0, &(0x7f0000000340)={0x0, 0x0}) r3 = socket$unix(0x1, 0x1, 0x0) r4 = socket$unix(0x1, 0x1, 0x0) openat$khugepaged_scan(0xffffff9c, &(0x7f00000000c0), 0x1, 0x0) poll(&(0x7f0000000140)=[{r1, 0x3}, {0xffffffffffffffff, 0x10a2}, {r3, 0x1}, {r2, 0x64c}, {r4, 0x9041}, {0xffffffffffffffff, 0x140}, {0xffffffffffffffff, 0x10}], 0x7, 0xff) 06:20:10 executing program 0: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x0, 0x12, r0, 0x0) preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x9, 0x0) mmap(&(0x7f0000000000/0xa000)=nil, 0xa000, 0x2, 0x2172, 0xffffffffffffffff, 0x0) socketpair(0x1e, 0x80005, 0x0, &(0x7f0000000340)={0x0, 0x0}) r3 = socket$unix(0x1, 0x1, 0x0) r4 = socket$unix(0x1, 0x1, 0x0) r5 = openat$khugepaged_scan(0xffffff9c, &(0x7f00000000c0), 0x1, 0x0) poll(&(0x7f0000000140)=[{r1, 0x3}, {0xffffffffffffffff, 0x10a2}, {r3, 0x1}, {r2, 0x64c}, {r4, 0x9041}, {0xffffffffffffffff, 0x140}, {r5, 0x10}], 0x7, 0xff) [ 412.717244][T18128] FAULT_INJECTION: forcing a failure. [ 412.717244][T18128] name failslab, interval 1, probability 0, space 0, times 0 [ 412.743019][T18128] CPU: 0 PID: 18128 Comm: syz-executor.3 Not tainted 5.14.0-rc2-syzkaller #0 [ 412.756481][T18128] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.14.0-2 04/01/2014 [ 412.768521][T18128] Call Trace: [ 412.773687][T18128] dump_stack_lvl+0xcd/0x134 [ 412.780007][T18128] should_fail.cold+0x5/0xa [ 412.786966][T18128] should_failslab+0x5/0x10 [ 412.795017][T18128] kmem_cache_alloc_node+0x65/0x3e0 [ 412.801888][T18128] ? alloc_unbound_pwq+0x4a5/0xcd0 [ 412.808646][T18128] alloc_unbound_pwq+0x4a5/0xcd0 [ 412.815534][T18128] apply_wqattrs_prepare+0x2b6/0x890 [ 412.822668][T18128] apply_workqueue_attrs_locked+0xc1/0x140 [ 412.830783][T18128] alloc_workqueue+0xafb/0xef0 [ 412.836917][T18128] ? _raw_spin_unlock+0x24/0x40 [ 412.843061][T18128] ? workqueue_sysfs_register+0x3e0/0x3e0 [ 412.850883][T18128] ? memcpy+0x39/0x60 [ 412.856920][T18128] ? loop_configure+0x416/0x1580 [ 412.864809][T18128] loop_configure+0x4d8/0x1580 [ 412.871871][T18128] lo_ioctl+0x403/0x1600 [ 412.877719][T18128] ? loop_set_status_old+0x250/0x250 [ 412.886716][T18128] ? find_held_lock+0x2d/0x110 [ 412.893657][T18128] ? tomoyo_path_number_perm+0x204/0x590 [ 412.901581][T18128] ? lock_downgrade+0x6e0/0x6e0 [ 412.908576][T18128] ? kfree+0xeb/0x650 06:20:10 executing program 0: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x0, 0x12, r0, 0x0) preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x9, 0x0) mmap(&(0x7f0000000000/0xa000)=nil, 0xa000, 0x2, 0x2172, 0xffffffffffffffff, 0x0) socketpair(0x1e, 0x80005, 0x0, &(0x7f0000000340)={0x0, 0x0}) r3 = socket$unix(0x1, 0x1, 0x0) r4 = socket$unix(0x1, 0x1, 0x0) r5 = openat$khugepaged_scan(0xffffff9c, &(0x7f00000000c0), 0x1, 0x0) poll(&(0x7f0000000140)=[{r1, 0x3}, {0xffffffffffffffff, 0x10a2}, {r3, 0x1}, {r2, 0x64c}, {r4, 0x9041}, {0xffffffffffffffff, 0x140}, {r5, 0x10}], 0x7, 0xff) [ 412.913913][T18128] ? tomoyo_path_number_perm+0x441/0x590 [ 412.922223][T18128] ? __sanitizer_cov_trace_const_cmp1+0x22/0x80 [ 412.930329][T18128] ? tomoyo_path_number_perm+0x24e/0x590 [ 412.939364][T18128] ? lock_downgrade+0x6e0/0x6e0 [ 412.946326][T18128] lo_compat_ioctl+0xb1/0x110 [ 412.953063][T18128] compat_blkdev_ioctl+0x3c2/0x870 [ 412.959917][T18128] ? lo_ioctl+0x1600/0x1600 [ 412.966529][T18128] ? blkdev_ioctl+0x6d0/0x6d0 [ 412.973401][T18128] ? __sanitizer_cov_trace_const_cmp4+0x1c/0x70 [ 412.981617][T18128] ? blkdev_ioctl+0x6d0/0x6d0 [ 412.988148][T18128] __do_compat_sys_ioctl+0x1c7/0x290 [ 412.996274][T18128] __do_fast_syscall_32+0x65/0xf0 [ 413.003599][T18128] do_fast_syscall_32+0x2f/0x70 [ 413.011189][T18128] entry_SYSENTER_compat_after_hwframe+0x4d/0x5c [ 413.020360][T18128] RIP: 0023:0xf7f3f549 [ 413.027810][T18128] Code: 03 74 c0 01 10 05 03 74 b8 01 10 06 03 74 b4 01 10 07 03 74 b0 01 10 08 03 74 d8 01 00 00 00 00 00 51 52 55 89 e5 0f 34 cd 80 <5d> 5a 59 c3 90 90 90 90 8d b4 26 00 00 00 00 8d b4 26 00 00 00 00 [ 413.055687][T18128] RSP: 002b:00000000f5539418 EFLAGS: 00000296 ORIG_RAX: 0000000000000036 [ 413.066655][T18128] RAX: ffffffffffffffda RBX: 0000000000000006 RCX: 0000000000004c00 [ 413.079053][T18128] RDX: 0000000000000005 RSI: 0000000000000006 RDI: 000000000816c000 [ 413.092670][T18128] RBP: 0000000000000005 R08: 0000000000000000 R09: 0000000000000000 [ 413.107343][T18128] R10: 0000000000000000 R11: 0000000000000000 R12: 0000000000000000 [ 413.142914][T18128] R13: 0000000000000000 R14: 0000000000000000 R15: 0000000000000000 06:20:10 executing program 0: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x0, 0x12, r0, 0x0) preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x9, 0x0) mmap(&(0x7f0000000000/0xa000)=nil, 0xa000, 0x2, 0x2172, 0xffffffffffffffff, 0x0) socketpair(0x1e, 0x80005, 0x0, &(0x7f0000000340)={0x0, 0x0}) r3 = socket$unix(0x1, 0x1, 0x0) r4 = socket$unix(0x1, 0x1, 0x0) r5 = openat$khugepaged_scan(0xffffff9c, &(0x7f00000000c0), 0x1, 0x0) poll(&(0x7f0000000140)=[{r1, 0x3}, {0xffffffffffffffff, 0x10a2}, {r3, 0x1}, {r2, 0x64c}, {r4, 0x9041}, {0xffffffffffffffff, 0x140}, {r5, 0x10}], 0x7, 0xff) 06:20:10 executing program 2: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800004, 0x12, r0, 0x0) preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x9, 0x0) r1 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r1, &(0x7f0000000380)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40}, [{}], "", ['\x00', '\x00', '\x00', '\x00', '\x00']}, 0x578) 06:20:10 executing program 0: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x9, 0x0) mmap(&(0x7f0000000000/0xa000)=nil, 0xa000, 0x2, 0x2172, 0xffffffffffffffff, 0x0) socketpair(0x1e, 0x80005, 0x0, &(0x7f0000000340)={0x0, 0x0}) r3 = socket$unix(0x1, 0x1, 0x0) r4 = socket$unix(0x1, 0x1, 0x0) r5 = openat$khugepaged_scan(0xffffff9c, &(0x7f00000000c0), 0x1, 0x0) poll(&(0x7f0000000140)=[{r1, 0x3}, {0xffffffffffffffff, 0x10a2}, {r3, 0x1}, {r2, 0x64c}, {r4, 0x9041}, {0xffffffffffffffff, 0x140}, {r5, 0x10}], 0x7, 0xff) 06:20:10 executing program 1: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800004, 0x12, r0, 0x0) preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x9, 0x0) mmap(&(0x7f0000000000/0xa000)=nil, 0xa000, 0x2, 0x2172, 0xffffffffffffffff, 0x0) socketpair(0x1e, 0x80005, 0x0, &(0x7f0000000340)={0x0, 0x0}) r3 = socket$unix(0x1, 0x1, 0x0) r4 = socket$unix(0x1, 0x1, 0x0) openat$khugepaged_scan(0xffffff9c, &(0x7f00000000c0), 0x1, 0x0) poll(&(0x7f0000000140)=[{r1, 0x3}, {0xffffffffffffffff, 0x10a2}, {r3, 0x1}, {r2, 0x64c}, {r4, 0x9041}, {0xffffffffffffffff, 0x140}, {0xffffffffffffffff, 0x10}], 0x7, 0xff) 06:20:10 executing program 3 (fault-call:3 fault-nth:25): r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800004, 0x12, r0, 0x0) preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x9, 0x0) syz_mount_image$reiserfs(&(0x7f0000000140), &(0x7f0000000180)='./file0\x00', 0x0, 0x0, &(0x7f0000000300), 0x0, &(0x7f0000000440)) 06:20:10 executing program 0: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800004, 0x12, r0, 0x0) preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x9, 0x0) r1 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r1, &(0x7f0000000380)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40}, [{}], "", ['\x00', '\x00', '\x00', '\x00', '\x00', '\x00']}, 0x678) [ 413.337135][T18147] FAULT_INJECTION: forcing a failure. [ 413.337135][T18147] name failslab, interval 1, probability 0, space 0, times 0 [ 413.358832][T18147] CPU: 3 PID: 18147 Comm: syz-executor.3 Not tainted 5.14.0-rc2-syzkaller #0 06:20:10 executing program 1: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800004, 0x12, r0, 0x0) preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x9, 0x0) mmap(&(0x7f0000000000/0xa000)=nil, 0xa000, 0x2, 0x2172, 0xffffffffffffffff, 0x0) socketpair(0x1e, 0x80005, 0x0, &(0x7f0000000340)={0x0, 0x0}) r3 = socket$unix(0x1, 0x1, 0x0) r4 = socket$unix(0x1, 0x1, 0x0) r5 = openat$khugepaged_scan(0xffffff9c, &(0x7f00000000c0), 0x1, 0x0) poll(&(0x7f0000000140)=[{r1, 0x3}, {0xffffffffffffffff, 0x10a2}, {r3, 0x1}, {r2, 0x64c}, {r4, 0x9041}, {0xffffffffffffffff, 0x140}, {r5}], 0x7, 0xff) [ 413.371013][T18147] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.14.0-2 04/01/2014 [ 413.389800][T18147] Call Trace: [ 413.394042][T18147] dump_stack_lvl+0xcd/0x134 [ 413.399919][T18147] should_fail.cold+0x5/0xa [ 413.407783][T18147] should_failslab+0x5/0x10 [ 413.415730][T18147] kmem_cache_alloc_node+0x65/0x3e0 [ 413.423542][T18147] ? alloc_unbound_pwq+0x4a5/0xcd0 [ 413.430775][T18147] alloc_unbound_pwq+0x4a5/0xcd0 [ 413.438504][T18147] apply_wqattrs_prepare+0x624/0x890 [ 413.447221][T18147] apply_workqueue_attrs_locked+0xc1/0x140 [ 413.458027][T18147] alloc_workqueue+0xafb/0xef0 [ 413.467140][T18147] ? _raw_spin_unlock+0x24/0x40 [ 413.474152][T18147] ? workqueue_sysfs_register+0x3e0/0x3e0 [ 413.483407][T18147] ? memcpy+0x39/0x60 [ 413.490237][T18147] ? loop_configure+0x416/0x1580 [ 413.498169][T18147] loop_configure+0x4d8/0x1580 [ 413.506196][T18147] lo_ioctl+0x403/0x1600 [ 413.513865][T18147] ? loop_set_status_old+0x250/0x250 [ 413.521484][T18147] ? find_held_lock+0x2d/0x110 [ 413.529324][T18147] ? tomoyo_path_number_perm+0x204/0x590 [ 413.538315][T18147] ? lock_downgrade+0x6e0/0x6e0 [ 413.544997][T18147] ? kfree+0xeb/0x650 [ 413.550734][T18147] ? tomoyo_path_number_perm+0x441/0x590 [ 413.558723][T18147] ? __sanitizer_cov_trace_const_cmp1+0x22/0x80 [ 413.567123][T18147] ? tomoyo_path_number_perm+0x24e/0x590 [ 413.575837][T18147] ? lock_downgrade+0x6e0/0x6e0 [ 413.583917][T18147] lo_compat_ioctl+0xb1/0x110 [ 413.591240][T18147] compat_blkdev_ioctl+0x3c2/0x870 [ 413.598002][T18147] ? lo_ioctl+0x1600/0x1600 [ 413.604599][T18147] ? blkdev_ioctl+0x6d0/0x6d0 [ 413.612410][T18147] ? __sanitizer_cov_trace_const_cmp4+0x1c/0x70 [ 413.627366][T18147] ? blkdev_ioctl+0x6d0/0x6d0 [ 413.638529][T18147] __do_compat_sys_ioctl+0x1c7/0x290 [ 413.650251][T18147] __do_fast_syscall_32+0x65/0xf0 [ 413.657300][T18147] do_fast_syscall_32+0x2f/0x70 [ 413.664309][T18147] entry_SYSENTER_compat_after_hwframe+0x4d/0x5c [ 413.673471][T18147] RIP: 0023:0xf7f3f549 [ 413.678972][T18147] Code: 03 74 c0 01 10 05 03 74 b8 01 10 06 03 74 b4 01 10 07 03 74 b0 01 10 08 03 74 d8 01 00 00 00 00 00 51 52 55 89 e5 0f 34 cd 80 <5d> 5a 59 c3 90 90 90 90 8d b4 26 00 00 00 00 8d b4 26 00 00 00 00 [ 413.708063][T18147] RSP: 002b:00000000f5539418 EFLAGS: 00000296 ORIG_RAX: 0000000000000036 [ 413.719349][T18147] RAX: ffffffffffffffda RBX: 0000000000000006 RCX: 0000000000004c00 06:20:11 executing program 1: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800004, 0x12, r0, 0x0) preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x9, 0x0) mmap(&(0x7f0000000000/0xa000)=nil, 0xa000, 0x2, 0x2172, 0xffffffffffffffff, 0x0) socketpair(0x1e, 0x80005, 0x0, &(0x7f0000000340)={0x0, 0x0}) r3 = socket$unix(0x1, 0x1, 0x0) r4 = socket$unix(0x1, 0x1, 0x0) r5 = openat$khugepaged_scan(0xffffff9c, &(0x7f00000000c0), 0x1, 0x0) poll(&(0x7f0000000140)=[{r1, 0x3}, {0xffffffffffffffff, 0x10a2}, {r3, 0x1}, {r2, 0x64c}, {r4, 0x9041}, {r5}], 0x6, 0xff) 06:20:11 executing program 1: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800004, 0x12, r0, 0x0) preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x9, 0x0) mmap(&(0x7f0000000000/0xa000)=nil, 0xa000, 0x2, 0x2172, 0xffffffffffffffff, 0x0) socketpair(0x1e, 0x80005, 0x0, &(0x7f0000000340)={0x0, 0x0}) r3 = socket$unix(0x1, 0x1, 0x0) r4 = socket$unix(0x1, 0x1, 0x0) openat$khugepaged_scan(0xffffff9c, &(0x7f00000000c0), 0x1, 0x0) poll(&(0x7f0000000140)=[{r1, 0x3}, {0xffffffffffffffff, 0x10a2}, {r3, 0x1}, {r2, 0x64c}, {r4, 0x9041}, {}], 0x6, 0xff) [ 413.730825][T18147] RDX: 0000000000000005 RSI: 0000000000000006 RDI: 000000000816c000 [ 413.741213][T18147] RBP: 0000000000000005 R08: 0000000000000000 R09: 0000000000000000 [ 413.751594][T18147] R10: 0000000000000000 R11: 0000000000000000 R12: 0000000000000000 [ 413.762232][T18147] R13: 0000000000000000 R14: 0000000000000000 R15: 0000000000000000 [ 413.810262][T18147] ------------[ cut here ]------------ [ 413.819156][T18147] WARNING: CPU: 3 PID: 18147 at kernel/locking/lockdep.c:6305 lockdep_unregister_key+0x19a/0x250 [ 413.833993][T18147] Modules linked in: [ 413.859430][T18147] CPU: 3 PID: 18147 Comm: syz-executor.3 Not tainted 5.14.0-rc2-syzkaller #0 [ 413.884805][T18147] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.14.0-2 04/01/2014 [ 413.896559][T18147] RIP: 0010:lockdep_unregister_key+0x19a/0x250 [ 413.907246][T18147] Code: 00 00 fc ff df 48 89 fa 48 c1 ea 03 80 3c 02 00 0f 85 8f 00 00 00 4d 89 7d 08 48 b8 22 01 00 00 00 00 ad de 48 89 43 08 eb 02 <0f> 0b 4c 89 f7 ba 01 00 00 00 48 89 ee e8 44 fd ff ff 4c 89 f7 e8 [ 413.937263][T18147] RSP: 0018:ffffc9002988f8a8 EFLAGS: 00010046 [ 413.945334][T18147] RAX: dffffc0000000000 RBX: 0000000000000000 RCX: 1ffffffff1ad8ffd [ 413.956623][T18147] RDX: 1ffffffff1fca217 RSI: 0000000000000004 RDI: ffffffff8fe510b8 [ 413.967536][T18147] RBP: ffff888029bc9128 R08: 0000000000000001 R09: 0000000000000003 [ 413.978943][T18147] R10: fffff52005311f0b R11: 0000000000000001 R12: 0000000000000246 [ 413.990334][T18147] R13: dffffc0000000000 R14: ffffffff8fcc8858 R15: ffff888029bc9020 [ 413.999127][T18147] FS: 0000000000000000(0000) GS:ffff88802cd00000(0063) knlGS:00000000f5539b40 [ 414.011877][T18147] CS: 0010 DS: 002b ES: 002b CR0: 0000000080050033 [ 414.021579][T18147] CR2: 00000000f5538fe4 CR3: 000000002051c000 CR4: 0000000000150ee0 [ 414.033241][T18147] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 [ 414.044436][T18147] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 [ 414.055821][T18147] Call Trace: [ 414.060159][T18147] alloc_workqueue+0xb31/0xef0 [ 414.067070][T18147] ? _raw_spin_unlock+0x24/0x40 [ 414.073598][T18147] ? workqueue_sysfs_register+0x3e0/0x3e0 [ 414.081034][T18147] ? memcpy+0x39/0x60 [ 414.086585][T18147] ? loop_configure+0x416/0x1580 [ 414.092590][T18147] loop_configure+0x4d8/0x1580 [ 414.099362][T18147] lo_ioctl+0x403/0x1600 [ 414.104936][T18147] ? loop_set_status_old+0x250/0x250 [ 414.111905][T18147] ? find_held_lock+0x2d/0x110 [ 414.118401][T18147] ? tomoyo_path_number_perm+0x204/0x590 [ 414.127548][T18147] ? lock_downgrade+0x6e0/0x6e0 [ 414.127599][T18147] ? kfree+0xeb/0x650 06:20:11 executing program 2: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800004, 0x12, r0, 0x0) preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x9, 0x0) r1 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r1, &(0x7f0000000380)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40}, [{}], "", ['\x00', '\x00', '\x00', '\x00']}, 0x478) 06:20:11 executing program 1: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800004, 0x12, r0, 0x0) preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x9, 0x0) mmap(&(0x7f0000000000/0xa000)=nil, 0xa000, 0x2, 0x2172, 0xffffffffffffffff, 0x0) socketpair(0x1e, 0x80005, 0x0, &(0x7f0000000340)={0x0, 0x0}) r3 = socket$unix(0x1, 0x1, 0x0) r4 = socket$unix(0x1, 0x1, 0x0) openat$khugepaged_scan(0xffffff9c, &(0x7f00000000c0), 0x1, 0x0) poll(&(0x7f0000000140)=[{r1, 0x3}, {0xffffffffffffffff, 0x10a2}, {r3, 0x1}, {r2, 0x64c}, {r4, 0x9041}, {}], 0x6, 0xff) [ 414.127628][T18147] ? tomoyo_path_number_perm+0x441/0x590 [ 414.127665][T18147] ? __sanitizer_cov_trace_const_cmp1+0x22/0x80 [ 414.127698][T18147] ? tomoyo_path_number_perm+0x24e/0x590 [ 414.127750][T18147] ? lock_downgrade+0x6e0/0x6e0 [ 414.127778][T18147] lo_compat_ioctl+0xb1/0x110 [ 414.127810][T18147] compat_blkdev_ioctl+0x3c2/0x870 [ 414.127836][T18147] ? lo_ioctl+0x1600/0x1600 [ 414.127857][T18147] ? blkdev_ioctl+0x6d0/0x6d0 [ 414.127881][T18147] ? __sanitizer_cov_trace_const_cmp4+0x1c/0x70 [ 414.127904][T18147] ? blkdev_ioctl+0x6d0/0x6d0 [ 414.127926][T18147] __do_compat_sys_ioctl+0x1c7/0x290 [ 414.127955][T18147] __do_fast_syscall_32+0x65/0xf0 [ 414.270264][T18147] do_fast_syscall_32+0x2f/0x70 [ 414.276402][T18147] entry_SYSENTER_compat_after_hwframe+0x4d/0x5c [ 414.284706][T18147] RIP: 0023:0xf7f3f549 [ 414.290173][T18147] Code: 03 74 c0 01 10 05 03 74 b8 01 10 06 03 74 b4 01 10 07 03 74 b0 01 10 08 03 74 d8 01 00 00 00 00 00 51 52 55 89 e5 0f 34 cd 80 <5d> 5a 59 c3 90 90 90 90 8d b4 26 00 00 00 00 8d b4 26 00 00 00 00 [ 414.345073][T18147] RSP: 002b:00000000f5539418 EFLAGS: 00000296 ORIG_RAX: 0000000000000036 [ 414.356879][T18147] RAX: ffffffffffffffda RBX: 0000000000000006 RCX: 0000000000004c00 [ 414.367726][T18147] RDX: 0000000000000005 RSI: 0000000000000006 RDI: 000000000816c000 [ 414.379076][T18147] RBP: 0000000000000005 R08: 0000000000000000 R09: 0000000000000000 [ 414.391775][T18147] R10: 0000000000000000 R11: 0000000000000000 R12: 0000000000000000 [ 414.403092][T18147] R13: 0000000000000000 R14: 0000000000000000 R15: 0000000000000000 [ 414.415118][T18147] Kernel panic - not syncing: panic_on_warn set ... [ 414.452867][T18147] CPU: 3 PID: 18147 Comm: syz-executor.3 Not tainted 5.14.0-rc2-syzkaller #0 [ 414.465471][T18147] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.14.0-2 04/01/2014 [ 414.492904][T18147] Call Trace: [ 414.497649][T18147] dump_stack_lvl+0xcd/0x134 [ 414.504764][T18147] panic+0x306/0x73d [ 414.511371][T18147] ? __warn_printk+0xf3/0xf3 [ 414.519309][T18147] ? __warn.cold+0x1a/0x44 [ 414.526481][T18147] ? lockdep_unregister_key+0x19a/0x250 [ 414.534826][T18147] __warn.cold+0x35/0x44 [ 414.541384][T18147] ? lockdep_unregister_key+0x19a/0x250 [ 414.549448][T18147] report_bug+0x1bd/0x210 [ 414.555718][T18147] handle_bug+0x3c/0x60 [ 414.562662][T18147] exc_invalid_op+0x14/0x40 [ 414.569210][T18147] asm_exc_invalid_op+0x12/0x20 [ 414.576491][T18147] RIP: 0010:lockdep_unregister_key+0x19a/0x250 [ 414.585123][T18147] Code: 00 00 fc ff df 48 89 fa 48 c1 ea 03 80 3c 02 00 0f 85 8f 00 00 00 4d 89 7d 08 48 b8 22 01 00 00 00 00 ad de 48 89 43 08 eb 02 <0f> 0b 4c 89 f7 ba 01 00 00 00 48 89 ee e8 44 fd ff ff 4c 89 f7 e8 [ 414.613010][T18147] RSP: 0018:ffffc9002988f8a8 EFLAGS: 00010046 [ 414.622417][T18147] RAX: dffffc0000000000 RBX: 0000000000000000 RCX: 1ffffffff1ad8ffd [ 414.633085][T18147] RDX: 1ffffffff1fca217 RSI: 0000000000000004 RDI: ffffffff8fe510b8 [ 414.643752][T18147] RBP: ffff888029bc9128 R08: 0000000000000001 R09: 0000000000000003 [ 414.655128][T18147] R10: fffff52005311f0b R11: 0000000000000001 R12: 0000000000000246 [ 414.664859][T18147] R13: dffffc0000000000 R14: ffffffff8fcc8858 R15: ffff888029bc9020 [ 414.675837][T18147] ? lockdep_unregister_key+0x3e/0x250 [ 414.682525][T18147] alloc_workqueue+0xb31/0xef0 [ 414.688556][T18147] ? _raw_spin_unlock+0x24/0x40 [ 414.694936][T18147] ? workqueue_sysfs_register+0x3e0/0x3e0 [ 414.703371][T18147] ? memcpy+0x39/0x60 [ 414.708924][T18147] ? loop_configure+0x416/0x1580 [ 414.715914][T18147] loop_configure+0x4d8/0x1580 [ 414.723044][T18147] lo_ioctl+0x403/0x1600 [ 414.728378][T18147] ? loop_set_status_old+0x250/0x250 [ 414.736778][T18147] ? find_held_lock+0x2d/0x110 [ 414.743298][T18147] ? tomoyo_path_number_perm+0x204/0x590 [ 414.751145][T18147] ? lock_downgrade+0x6e0/0x6e0 [ 414.758386][T18147] ? kfree+0xeb/0x650 [ 414.764539][T18147] ? tomoyo_path_number_perm+0x441/0x590 [ 414.773220][T18147] ? __sanitizer_cov_trace_const_cmp1+0x22/0x80 [ 414.782638][T18147] ? tomoyo_path_number_perm+0x24e/0x590 [ 414.792864][T18147] ? lock_downgrade+0x6e0/0x6e0 [ 414.800074][T18147] lo_compat_ioctl+0xb1/0x110 [ 414.806414][T18147] compat_blkdev_ioctl+0x3c2/0x870 [ 414.813077][T18147] ? lo_ioctl+0x1600/0x1600 [ 414.819193][T18147] ? blkdev_ioctl+0x6d0/0x6d0 [ 414.826237][T18147] ? __sanitizer_cov_trace_const_cmp4+0x1c/0x70 [ 414.834814][T18147] ? blkdev_ioctl+0x6d0/0x6d0 [ 414.841441][T18147] __do_compat_sys_ioctl+0x1c7/0x290 [ 414.849078][T18147] __do_fast_syscall_32+0x65/0xf0 [ 414.855780][T18147] do_fast_syscall_32+0x2f/0x70 [ 414.862270][T18147] entry_SYSENTER_compat_after_hwframe+0x4d/0x5c [ 414.870642][T18147] RIP: 0023:0xf7f3f549 [ 414.875662][T18147] Code: 03 74 c0 01 10 05 03 74 b8 01 10 06 03 74 b4 01 10 07 03 74 b0 01 10 08 03 74 d8 01 00 00 00 00 00 51 52 55 89 e5 0f 34 cd 80 <5d> 5a 59 c3 90 90 90 90 8d b4 26 00 00 00 00 8d b4 26 00 00 00 00 [ 414.901800][T18147] RSP: 002b:00000000f5539418 EFLAGS: 00000296 ORIG_RAX: 0000000000000036 [ 414.913447][T18147] RAX: ffffffffffffffda RBX: 0000000000000006 RCX: 0000000000004c00 [ 414.925184][T18147] RDX: 0000000000000005 RSI: 0000000000000006 RDI: 000000000816c000 [ 414.936325][T18147] RBP: 0000000000000005 R08: 0000000000000000 R09: 0000000000000000 [ 414.947295][T18147] R10: 0000000000000000 R11: 0000000000000000 R12: 0000000000000000 [ 414.958124][T18147] R13: 0000000000000000 R14: 0000000000000000 R15: 0000000000000000 [ 416.127758][T18147] Shutting down cpus with NMI [ 416.135742][T18147] Kernel Offset: disabled [ 416.142344][T18147] Rebooting in 86400 seconds.. VM DIAGNOSIS: 06:20:12 Registers: info registers vcpu 0 RAX=0000000000000000 RBX=0000000000000009 RCX=0000000000000000 RDX=ffff888014ca54c0 RSI=ffffffff839edfc1 RDI=0000000000000003 RBP=ffff88807832e080 RSP=ffffc90000eb7850 R8 =0000000000000000 R9 =0000000000000009 R10=ffffffff839edffa R11=0000000000000010 R12=0000000000000100 R13=000000000000018d R14=dffffc0000000000 R15=0000000000000001 RIP=ffffffff8175892c RFL=00000293 [--S-A-C] CPL=0 II=0 A20=1 SMM=0 HLT=0 ES =002b 0000000000000000 ffffffff 00c0f300 DPL=3 DS [-WA] CS =0010 0000000000000000 ffffffff 00a09b00 DPL=0 CS64 [-RA] SS =0018 0000000000000000 ffffffff 00c09300 DPL=0 DS [-WA] DS =002b 0000000000000000 ffffffff 00c0f300 DPL=3 DS [-WA] FS =0000 0000000000000000 ffffffff 00c00000 GS =0063 ffff88802ca00000 ffffffff 00d0f300 DPL=3 DS [-WA] LDT=0000 0000000000000000 ffffffff 00c00000 TR =0040 fffffe0000003000 00004087 00008b00 DPL=0 TSS64-busy GDT= fffffe0000001000 0000007f IDT= fffffe0000000000 00000fff CR0=80050033 CR2=000000002c027000 CR3=000000006e99a000 CR4=00150ef0 DR0=0000000000000000 DR1=0000000000000000 DR2=0000000000000000 DR3=0000000000000000 DR6=00000000fffe0ff0 DR7=0000000000000400 EFER=0000000000000d01 FCW=037f FSW=0000 [ST=0] FTW=00 MXCSR=00001f80 FPR0=0000000000000000 0000 FPR1=0000000000000000 0000 FPR2=0000000000000000 0000 FPR3=0000000000000000 0000 FPR4=0000000000000000 0000 FPR5=0000000000000000 0000 FPR6=0000000000000000 0000 FPR7=0000000000000000 0000 XMM00=00000000000000000000000000000000 XMM01=00000000000000000000000000000052 XMM02=00000000000000000000000000000000 XMM03=00000000000000000000000000000000 XMM04=00000000000000000000000000000000 XMM05=00000000000000000000000000000000 XMM06=00000000000000000000000000000000 XMM07=00000000000000000000000000000000 XMM08=00000000000000000000000000000000 XMM09=00000000000000000000000000000000 XMM10=00000000000000000000000000000000 XMM11=00000000000000000000000000000000 XMM12=00000000000000000000000000000000 XMM13=00000000000000000000000000000000 XMM14=00000000000000000000000000000000 XMM15=00000000000000000000000000000000 info registers vcpu 1 RAX=ffffffff813285d0 RBX=ffffffff8b313a60 RCX=ffffffff8132f27d RDX=1ffffffff166274d RSI=0000000000000000 RDI=00000000000000b0 RBP=0000000000000000 RSP=ffffc90000508fd0 R8 =0000000000000001 R9 =ffff88802cb1f40f R10=ffffed1005963e81 R11=0000000000000001 R12=0000000000000001 R13=0000000000000000 R14=0000000000000000 R15=0000000000000000 RIP=ffffffff813285d8 RFL=00010046 [---Z-P-] CPL=0 II=0 A20=1 SMM=0 HLT=0 ES =0000 0000000000000000 ffffffff 00c00000 CS =0010 0000000000000000 ffffffff 00a09b00 DPL=0 CS64 [-RA] SS =0018 0000000000000000 ffffffff 00c09300 DPL=0 DS [-WA] DS =0000 0000000000000000 ffffffff 00c00000 FS =0000 0000000000000000 ffffffff 00c00000 GS =0000 ffff88802cb00000 ffffffff 00c00000 LDT=0000 0000000000000000 00000000 00000000 TR =0040 fffffe000003e000 00004087 00008b00 DPL=0 TSS64-busy GDT= fffffe000003c000 0000007f IDT= fffffe0000000000 00000fff CR0=80050033 CR2=00000000ffc95e48 CR3=000000006e99a000 CR4=00150ee0 DR0=0000000000000000 DR1=0000000000000000 DR2=0000000000000000 DR3=0000000000000000 DR6=00000000fffe0ff0 DR7=0000000000000400 EFER=0000000000000d01 FCW=037f FSW=0000 [ST=0] FTW=00 MXCSR=00001f80 FPR0=0000000000000000 0000 FPR1=0000000000000000 0000 FPR2=0000000000000000 0000 FPR3=0000000000000000 0000 FPR4=0000000000000000 0000 FPR5=0000000000000000 0000 FPR6=0000000000000000 0000 FPR7=0000000000000000 0000 XMM00=00000000000000000000000000000000 XMM01=00000000000000000000000000000052 XMM02=00000000000000000000000000000000 XMM03=00000000000000000000000000000000 XMM04=00000000000000000000000000000000 XMM05=00000000000000000000000000000000 XMM06=00000000000000000000000000000000 XMM07=00000000000000000000000000000000 XMM08=00000000000000000000000000000000 XMM09=00000000000000000000000000000000 XMM10=00000000000000000000000000000000 XMM11=00000000000000000000000000000000 XMM12=00000000000000000000000000000000 XMM13=00000000000000000000000000000000 XMM14=00000000000000000000000000000000 XMM15=00000000000000000000000000000000 info registers vcpu 2 RAX=0000000000000003 RBX=0000000000000000 RCX=dffffc0000000000 RDX=0000000000000000 RSI=0000000000000003 RDI=ffffffff901dae80 RBP=ffffffff901dae80 RSP=ffffc90000657b48 R8 =0000000000000001 R9 =0000000000000000 R10=fffffbfff203b5d0 R11=0000000000086088 R12=0000000000000000 R13=fffffbfff203b5d0 R14=0000000000000001 R15=ffff88802cc52880 RIP=ffffffff813305fb RFL=00000046 [---Z-P-] CPL=0 II=0 A20=1 SMM=0 HLT=1 ES =0000 0000000000000000 ffffffff 00000000 CS =0010 0000000000000000 ffffffff 00a09b00 DPL=0 CS64 [-RA] SS =0018 0000000000000000 ffffffff 00c09300 DPL=0 DS [-WA] DS =0000 0000000000000000 ffffffff 00000000 FS =0000 0000000000000000 ffffffff 00000000 GS =0000 ffff88802cc00000 ffffffff 00000000 LDT=0000 0000000000000000 00000000 00000000 TR =0040 fffffe0000079000 00004087 00008b00 DPL=0 TSS64-busy GDT= fffffe0000077000 0000007f IDT= fffffe0000000000 00000fff CR0=80050033 CR2=00007f7b8c4fa000 CR3=000000002051c000 CR4=00150ee0 DR0=0000000000000000 DR1=0000000000000000 DR2=0000000000000000 DR3=0000000000000000 DR6=00000000fffe0ff0 DR7=0000000000000400 EFER=0000000000000d01 FCW=037f FSW=0000 [ST=0] FTW=00 MXCSR=00009fc0 FPR0=0000000000000000 0000 FPR1=0000000000000000 0000 FPR2=0000000000000000 0000 FPR3=0000000000000000 0000 FPR4=0000000000000000 0000 FPR5=0000000000000000 0000 FPR6=0000000000000000 0000 FPR7=0000000000000000 0000 XMM00=5837fe9dc1c91f3200000000000402f8 XMM01=8ca0b852b1c7c8e10000000000040498 XMM02=f1c1a81e7e6f168700000000000406e8 XMM03=ac8bc31478ec851100000000000434c0 XMM04=947eeba90970166000000000001a9b28 XMM05=d3fdd5f48436fbd70000000000040790 XMM06=00f4ad095d54c93e0000000000040648 XMM07=a1fcdcf819d7e1e50000000000040408 XMM08=a327dee6f1208e4d00000000002bb2a8 XMM09=07070707505151515151685b050f2311 XMM10=00226b07070707070707070707505151 XMM11=00000000000000000000000000000000 XMM12=00000000000000000000000000000000 XMM13=00000000000000000000000000000000 XMM14=00000000000000000000000000000000 XMM15=00000000000000000000000000000000 info registers vcpu 3 RAX=dffffc0000000060 RBX=00000000000003fd RCX=0000000000000000 RDX=00000000000003fd RSI=ffffffff8432cbcc RDI=ffffffff904e5660 RBP=ffffffff904e5620 RSP=ffffc9002988f220 R8 =000000000000002a R9 =0000000000000000 R10=ffffffff8432cbbd R11=000000000000001f R12=0000000000000000 R13=fffffbfff209cb17 R14=fffffbfff209cace R15=dffffc0000000000 RIP=ffffffff8432cbf2 RFL=00000002 [-------] CPL=0 II=0 A20=1 SMM=0 HLT=0 ES =002b 0000000000000000 ffffffff 00c0f300 DPL=3 DS [-WA] CS =0010 0000000000000000 ffffffff 00a09b00 DPL=0 CS64 [-RA] SS =0018 0000000000000000 ffffffff 00c09300 DPL=0 DS [-WA] DS =002b 0000000000000000 ffffffff 00c0f300 DPL=3 DS [-WA] FS =0000 0000000000000000 ffffffff 00c00000 GS =0063 ffff88802cd00000 ffffffff 00d0f300 DPL=3 DS [-WA] LDT=0000 0000000000000000 00000000 00000000 TR =0040 fffffe00000b4000 00004087 00008b00 DPL=0 TSS64-busy GDT= fffffe00000b2000 0000007f IDT= fffffe0000000000 00000fff CR0=80050033 CR2=00000000f5538fe4 CR3=000000002051c000 CR4=00150ee0 DR0=0000000000000000 DR1=0000000000000000 DR2=0000000000000000 DR3=0000000000000000 DR6=00000000fffe0ff0 DR7=0000000000000400 EFER=0000000000000d01 FCW=037f FSW=0000 [ST=0] FTW=00 MXCSR=00001f80 FPR0=0000000000000000 0000 FPR1=0000000000000000 0000 FPR2=0000000000000000 0000 FPR3=0000000000000000 0000 FPR4=0000000000000000 0000 FPR5=0000000000000000 0000 FPR6=0000000000000000 0000 FPR7=0000000000000000 0000 XMM00=00000000000000000000000000000000 XMM01=00000000000000000000000000000002 XMM02=00000050000000000000000100000000 XMM03=00000000000000000000000000000000 XMM04=00000000000000000000000000000000 XMM05=00000000000000000000000000000000 XMM06=00000000000000000000000000000000 XMM07=00000000000000000000000000000000 XMM08=00000000000000000000000000000000 XMM09=00000000000000000000000000000000 XMM10=00000000000000000000000000000000 XMM11=00000000000000000000000000000000 XMM12=00000000000000000000000000000000 XMM13=00000000000000000000000000000000 XMM14=00000000000000000000000000000000 XMM15=00000000000000000000000000000000