0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x74)
bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='ext4_es_lookup_extent_exit\x00', r1}, 0x10)
r2 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x11, 0x3, &(0x7f00000000c0)=@framed, 0x0, 0x4, 0x8f, &(0x7f00000002c0)=""/143, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x74)
bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='ext4_es_lookup_extent_exit\x00', r2}, 0x10)

06:18:47 executing program 3:
r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0)
mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x0, 0x12, r0, 0x0)
preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x9, 0x0)
mmap(&(0x7f0000000000/0xa000)=nil, 0xa000, 0x2, 0x2172, 0xffffffffffffffff, 0x0)
r1 = openat$khugepaged_scan(0xffffff9c, &(0x7f0000000080), 0x1, 0x0)
close(r1)

06:18:47 executing program 2:
r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0)
mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800004, 0x12, r0, 0x0)
preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x9, 0x0)
mmap(&(0x7f0000000000/0xa000)=nil, 0xa000, 0x2, 0x2172, 0xffffffffffffffff, 0x0)
r1 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x11, 0x3, &(0x7f00000000c0)=@framed, &(0x7f00000001c0)='syzkaller\x00', 0x4, 0x8f, &(0x7f00000002c0)=""/143, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x74)
bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='ext4_es_lookup_extent_exit\x00', r1}, 0x10)
r2 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x11, 0x3, &(0x7f00000000c0)=@framed, 0x0, 0x4, 0x8f, &(0x7f00000002c0)=""/143, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x74)
bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='ext4_es_lookup_extent_exit\x00', r2}, 0x10)

06:18:47 executing program 1:
r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0)
mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800004, 0x10, r0, 0x0)
preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x9, 0x0)
mmap(&(0x7f0000000000/0xa000)=nil, 0xa000, 0x2, 0x2172, 0xffffffffffffffff, 0x0)
socketpair(0x29, 0x80005, 0x0, &(0x7f0000000340)={0x0, 0x0})

[  330.151205][T14375] loop0: detected capacity change from 0 to 8
06:18:47 executing program 3:
r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0)
mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x0, 0x12, r0, 0x0)
preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x9, 0x0)
mmap(&(0x7f0000000000/0xa000)=nil, 0xa000, 0x2, 0x2172, 0xffffffffffffffff, 0x0)
r1 = openat$khugepaged_scan(0xffffff9c, &(0x7f0000000080), 0x1, 0x0)
close(r1)

06:18:47 executing program 1:
r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0)
mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800004, 0x10, r0, 0x0)
preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x9, 0x0)
mmap(&(0x7f0000000000/0xa000)=nil, 0xa000, 0x2, 0x2172, 0xffffffffffffffff, 0x0)
socketpair(0x29, 0x80005, 0x0, &(0x7f0000000340)={0x0, 0x0})

06:18:47 executing program 3:
r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0)
mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800004, 0x10, r0, 0x0)
preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x9, 0x0)
mmap(&(0x7f0000000000/0xa000)=nil, 0xa000, 0x2, 0x2172, 0xffffffffffffffff, 0x0)
r1 = openat$khugepaged_scan(0xffffff9c, &(0x7f0000000080), 0x1, 0x0)
close(r1)

06:18:47 executing program 0:
mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800004, 0x12, 0xffffffffffffffff, 0x0)
preadv(0xffffffffffffffff, &(0x7f00000001c0)=[{0x0}], 0x1, 0x9, 0x0)
mmap(&(0x7f0000000000/0xa000)=nil, 0xa000, 0x2, 0x2172, 0xffffffffffffffff, 0x0)
syz_mount_image$nilfs2(&(0x7f0000000180), &(0x7f0000000200)='./file0\x00', 0xd85, 0x7, &(0x7f00000006c0)=[{&(0x7f0000000240)="997c7e90471ec6786b6aa37fd8fbf290c011bee5642707bf7b126c36024e5e8f0d3d514aa1538eb70908eb3ac1a8a52e0ba29dab8884c189c9b68415aa0226e7c6a7ccf48ad20543b10360ab7ee9b247e4304d92f0ec7c0ba06d8160095660a0f12836e2033baed6228d464479ce22f2fadce176d0750fdc6ab1004eb9c4440707be1dc31c1ce11815d12f0d50eef6477341b3f6a4f364a1fccd68e2bcd2dba76227338cd6a1835a44", 0xa9, 0x8}, {&(0x7f0000000380)="3a79b76eed8bb53c1f5217cb4d40694fa75675b28af54d40304f697a1d04373a7ef7b09d46fa6365d222516dcc92d004bc937a22980c404bb5b5669f3dfd0e569079c03b2855be3337944aea4b03b03a3eb6d7", 0x53, 0x3}, {&(0x7f0000000400)="c8213af91316be74099fc072cc912017e77b8709c846cf00eb99c7c03cee58e25602e6ec0b4b42c8709e4447b0d23296a71661cdb6ea9b13d35ed3206f67e5559840f063e554ed7fcb842ab9b072197358b7a617cb0825abfabe3da9b022ecbe28ebcc22bd651a40dfcf4782be0c0c6d8adb8fdd7afce8c8659cc9eef1483eceb26a223fa9d591e28633e6bf6facd75e4295341e2ef3788284fc4482db16cab37de0c1adbf7fa07ad161ae875284778f49e15a052d875e", 0xb7, 0x80}, {&(0x7f00000004c0)="056b3e2d287f817e74a518293ea19b1196cccb376ac73cd7bbeccaced6f43aa9706b33d8ec56c58be0febb03dadec48add6a378f07f9053f1b6f33fe63a960502ad48232f0bee4a41509d7063d478768ab8ee0a90ebdb7c9bc326d54c8edad7e9d59641faf45c171e35f77f8c38a7563e1555c331a5a3e4da1ce59c0c697ebe071d527f24563165dafd23b45186c3d55251c825d0d7fd16b0f13a2f1321cddbcf231b398a88b19e3915ee544692c3559f42a", 0xb2, 0x6}, {&(0x7f0000000580)="8023d53ac815f8a84b84350b859e8673ed208a78bbfec2e35d6d4927707d5dd61106eb0321af3709c17fe7661323c51575e9c18d7b834c138636224eb1a7d75dd59d5c5d7411bdd4c2b07cf727643f52b1ca3e1680cde001be2f8334303e9f4191c2f9425472ca1ee6bac17fde09f0ce5fdf2e70d3c1a38b2d3e0e804f7df817b6a03e5e1ffea1ca7cd7", 0x8a, 0x8}, {&(0x7f0000000300)="fae83b83fc781c7715", 0x9, 0x8fe}, {&(0x7f0000000640)="96f1e3c89318e48db56867032dd1ba9b0ffeec69eb34236bd93b937c6bb7447840dc021e536b89aad4fe89ca2317f4fe2b36cbbdd8d72d841aee6f7b7be258352406775f169573cbf4da0bcf856f825233c5387a3a7cde778c057d591f2133c10e8b5bdb164577f492130acfc7", 0x6d, 0x5}], 0x802010, &(0x7f0000000740)={[{@order_relaxed}], [{@fsname}, {@fsuuid={'fsuuid', 0x3d, {[0x36, 0x38, 0x61, 0x64, 0x39, 0x38, 0x31, 0x37], 0x2d, [0x62, 0x61, 0x61, 0x63], 0x2d, [0x62, 0x39, 0x33, 0x35], 0x2d, [0x32, 0x37, 0x33, 0x61], 0x2d, [0x61, 0x39, 0x64, 0x65, 0x31, 0x8eb4bab6ccebb2ed, 0x64, 0x62]}}}]})

06:18:47 executing program 2:
r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0)
mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800004, 0x12, r0, 0x0)
preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x9, 0x0)
mmap(&(0x7f0000000000/0xa000)=nil, 0xa000, 0x2, 0x2172, 0xffffffffffffffff, 0x0)
r1 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x11, 0x3, &(0x7f00000000c0)=@framed, &(0x7f00000001c0)='syzkaller\x00', 0x4, 0x8f, &(0x7f00000002c0)=""/143, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x74)
bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='ext4_es_lookup_extent_exit\x00', r1}, 0x10)
r2 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x11, 0x3, &(0x7f00000000c0)=@framed, 0x0, 0x4, 0x8f, &(0x7f00000002c0)=""/143, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x74)
bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='ext4_es_lookup_extent_exit\x00', r2}, 0x10)

06:18:47 executing program 1:
r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0)
mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800004, 0x12, 0xffffffffffffffff, 0x0)
preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x9, 0x0)
mmap(&(0x7f0000000000/0xa000)=nil, 0xa000, 0x2, 0x2172, 0xffffffffffffffff, 0x0)
socketpair(0x29, 0x80005, 0x0, &(0x7f0000000340)={0x0, 0x0})

06:18:47 executing program 2:
r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0)
mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800004, 0x12, r0, 0x0)
preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x9, 0x0)
mmap(&(0x7f0000000000/0xa000)=nil, 0xa000, 0x2, 0x2172, 0xffffffffffffffff, 0x0)
r1 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x11, 0x3, &(0x7f00000000c0)=@framed, &(0x7f00000001c0)='syzkaller\x00', 0x4, 0x8f, &(0x7f00000002c0)=""/143, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x74)
bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='ext4_es_lookup_extent_exit\x00', r1}, 0x10)
r2 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x11, 0x3, &(0x7f00000000c0)=@framed, &(0x7f00000001c0)='syzkaller\x00', 0x0, 0x8f, &(0x7f00000002c0)=""/143, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x74)
bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='ext4_es_lookup_extent_exit\x00', r2}, 0x10)

06:18:47 executing program 3:
r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0)
mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800004, 0x10, r0, 0x0)
preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x9, 0x0)
mmap(&(0x7f0000000000/0xa000)=nil, 0xa000, 0x2, 0x2172, 0xffffffffffffffff, 0x0)
r1 = openat$khugepaged_scan(0xffffff9c, &(0x7f0000000080), 0x1, 0x0)
close(r1)

[  330.350385][T14395] loop0: detected capacity change from 0 to 8
06:18:47 executing program 1:
r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0)
mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800004, 0x12, 0xffffffffffffffff, 0x0)
preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x9, 0x0)
mmap(&(0x7f0000000000/0xa000)=nil, 0xa000, 0x2, 0x2172, 0xffffffffffffffff, 0x0)
socketpair(0x29, 0x80005, 0x0, &(0x7f0000000340)={0x0, 0x0})

06:18:48 executing program 3:
r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0)
mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800004, 0x10, r0, 0x0)
preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x9, 0x0)
mmap(&(0x7f0000000000/0xa000)=nil, 0xa000, 0x2, 0x2172, 0xffffffffffffffff, 0x0)
r1 = openat$khugepaged_scan(0xffffff9c, &(0x7f0000000080), 0x1, 0x0)
close(r1)

06:18:48 executing program 2:
r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0)
mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800004, 0x12, r0, 0x0)
preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x9, 0x0)
mmap(&(0x7f0000000000/0xa000)=nil, 0xa000, 0x2, 0x2172, 0xffffffffffffffff, 0x0)
r1 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x11, 0x3, &(0x7f00000000c0)=@framed, &(0x7f00000001c0)='syzkaller\x00', 0x4, 0x8f, &(0x7f00000002c0)=""/143, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x74)
bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='ext4_es_lookup_extent_exit\x00', r1}, 0x10)
r2 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x11, 0x3, &(0x7f00000000c0)=@framed, &(0x7f00000001c0)='syzkaller\x00', 0x0, 0x8f, &(0x7f00000002c0)=""/143, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x74)
bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='ext4_es_lookup_extent_exit\x00', r2}, 0x10)

06:18:48 executing program 0:
mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800004, 0x12, 0xffffffffffffffff, 0x0)
preadv(0xffffffffffffffff, &(0x7f00000001c0)=[{0x0}], 0x1, 0x9, 0x0)
mmap(&(0x7f0000000000/0xa000)=nil, 0xa000, 0x2, 0x2172, 0xffffffffffffffff, 0x0)
syz_mount_image$nilfs2(&(0x7f0000000180), &(0x7f0000000200)='./file0\x00', 0xd85, 0x7, &(0x7f00000006c0)=[{&(0x7f0000000240)="997c7e90471ec6786b6aa37fd8fbf290c011bee5642707bf7b126c36024e5e8f0d3d514aa1538eb70908eb3ac1a8a52e0ba29dab8884c189c9b68415aa0226e7c6a7ccf48ad20543b10360ab7ee9b247e4304d92f0ec7c0ba06d8160095660a0f12836e2033baed6228d464479ce22f2fadce176d0750fdc6ab1004eb9c4440707be1dc31c1ce11815d12f0d50eef6477341b3f6a4f364a1fccd68e2bcd2dba76227338cd6a1835a44", 0xa9, 0x8}, {&(0x7f0000000380)="3a79b76eed8bb53c1f5217cb4d40694fa75675b28af54d40304f697a1d04373a7ef7b09d46fa6365d222516dcc92d004bc937a22980c404bb5b5669f3dfd0e569079c03b2855be3337944aea4b03b03a3eb6d7", 0x53, 0x3}, {&(0x7f0000000400)="c8213af91316be74099fc072cc912017e77b8709c846cf00eb99c7c03cee58e25602e6ec0b4b42c8709e4447b0d23296a71661cdb6ea9b13d35ed3206f67e5559840f063e554ed7fcb842ab9b072197358b7a617cb0825abfabe3da9b022ecbe28ebcc22bd651a40dfcf4782be0c0c6d8adb8fdd7afce8c8659cc9eef1483eceb26a223fa9d591e28633e6bf6facd75e4295341e2ef3788284fc4482db16cab37de0c1adbf7fa07ad161ae875284778f49e15a052d875e", 0xb7, 0x80}, {&(0x7f00000004c0)="056b3e2d287f817e74a518293ea19b1196cccb376ac73cd7bbeccaced6f43aa9706b33d8ec56c58be0febb03dadec48add6a378f07f9053f1b6f33fe63a960502ad48232f0bee4a41509d7063d478768ab8ee0a90ebdb7c9bc326d54c8edad7e9d59641faf45c171e35f77f8c38a7563e1555c331a5a3e4da1ce59c0c697ebe071d527f24563165dafd23b45186c3d55251c825d0d7fd16b0f13a2f1321cddbcf231b398a88b19e3915ee544692c3559f42a", 0xb2, 0x6}, {&(0x7f0000000580)="8023d53ac815f8a84b84350b859e8673ed208a78bbfec2e35d6d4927707d5dd61106eb0321af3709c17fe7661323c51575e9c18d7b834c138636224eb1a7d75dd59d5c5d7411bdd4c2b07cf727643f52b1ca3e1680cde001be2f8334303e9f4191c2f9425472ca1ee6bac17fde09f0ce5fdf2e70d3c1a38b2d3e0e804f7df817b6a03e5e1ffea1ca7cd7", 0x8a, 0x8}, {&(0x7f0000000300)="fae83b83fc781c7715", 0x9, 0x8fe}, {&(0x7f0000000640)="96f1e3c89318e48db56867032dd1ba9b0ffeec69eb34236bd93b937c6bb7447840dc021e536b89aad4fe89ca2317f4fe2b36cbbdd8d72d841aee6f7b7be258352406775f169573cbf4da0bcf856f825233c5387a3a7cde778c057d591f2133c10e8b5bdb164577f492130acfc7", 0x6d, 0x5}], 0x802010, &(0x7f0000000740)={[{@order_relaxed}], [{@fsname}, {@fsuuid={'fsuuid', 0x3d, {[0x36, 0x38, 0x61, 0x64, 0x39, 0x38, 0x31, 0x37], 0x2d, [0x62, 0x61, 0x61, 0x63], 0x2d, [0x62, 0x39, 0x33, 0x35], 0x2d, [0x32, 0x37, 0x33, 0x61], 0x2d, [0x61, 0x39, 0x64, 0x65, 0x31, 0x8eb4bab6ccebb2ed, 0x64, 0x62]}}}]})

06:18:48 executing program 2:
r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0)
mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800004, 0x12, r0, 0x0)
preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x9, 0x0)
mmap(&(0x7f0000000000/0xa000)=nil, 0xa000, 0x2, 0x2172, 0xffffffffffffffff, 0x0)
r1 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x11, 0x3, &(0x7f00000000c0)=@framed, &(0x7f00000001c0)='syzkaller\x00', 0x4, 0x8f, &(0x7f00000002c0)=""/143, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x74)
bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='ext4_es_lookup_extent_exit\x00', r1}, 0x10)
r2 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x11, 0x3, &(0x7f00000000c0)=@framed, &(0x7f00000001c0)='syzkaller\x00', 0x0, 0x8f, &(0x7f00000002c0)=""/143, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x74)
bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='ext4_es_lookup_extent_exit\x00', r2}, 0x10)

06:18:48 executing program 3:
r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0)
mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800004, 0x12, 0xffffffffffffffff, 0x0)
preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x9, 0x0)
mmap(&(0x7f0000000000/0xa000)=nil, 0xa000, 0x2, 0x2172, 0xffffffffffffffff, 0x0)
r1 = openat$khugepaged_scan(0xffffff9c, &(0x7f0000000080), 0x1, 0x0)
close(r1)

[  330.475381][T14412] loop0: detected capacity change from 0 to 8
06:18:48 executing program 1:
r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0)
mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800004, 0x12, 0xffffffffffffffff, 0x0)
preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x9, 0x0)
mmap(&(0x7f0000000000/0xa000)=nil, 0xa000, 0x2, 0x2172, 0xffffffffffffffff, 0x0)
socketpair(0x29, 0x80005, 0x0, &(0x7f0000000340)={0x0, 0x0})

06:18:48 executing program 3:
r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0)
mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800004, 0x12, 0xffffffffffffffff, 0x0)
preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x9, 0x0)
mmap(&(0x7f0000000000/0xa000)=nil, 0xa000, 0x2, 0x2172, 0xffffffffffffffff, 0x0)
r1 = openat$khugepaged_scan(0xffffff9c, &(0x7f0000000080), 0x1, 0x0)
close(r1)

06:18:48 executing program 2:
r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0)
mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800004, 0x12, r0, 0x0)
preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x9, 0x0)
mmap(&(0x7f0000000000/0xa000)=nil, 0xa000, 0x2, 0x2172, 0xffffffffffffffff, 0x0)
r1 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x11, 0x3, &(0x7f00000000c0)=@framed, &(0x7f00000001c0)='syzkaller\x00', 0x4, 0x8f, &(0x7f00000002c0)=""/143, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x74)
bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='ext4_es_lookup_extent_exit\x00', r1}, 0x10)
r2 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x11, 0x3, &(0x7f00000000c0)=@framed, &(0x7f00000001c0)='syzkaller\x00', 0x4, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x74)
bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='ext4_es_lookup_extent_exit\x00', r2}, 0x10)

06:18:48 executing program 1:
r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0)
mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800004, 0x12, r0, 0x0)
preadv(0xffffffffffffffff, &(0x7f00000001c0)=[{0x0}], 0x1, 0x9, 0x0)
mmap(&(0x7f0000000000/0xa000)=nil, 0xa000, 0x2, 0x2172, 0xffffffffffffffff, 0x0)
socketpair(0x29, 0x80005, 0x0, &(0x7f0000000340)={0x0, 0x0})

06:18:48 executing program 0:
r0 = openat(0xffffffffffffffff, 0x0, 0x0, 0x0)
mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800004, 0x12, r0, 0x0)
preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x9, 0x0)
mmap(&(0x7f0000000000/0xa000)=nil, 0xa000, 0x2, 0x2172, 0xffffffffffffffff, 0x0)
syz_mount_image$nilfs2(&(0x7f0000000180), &(0x7f0000000200)='./file0\x00', 0xd85, 0x7, &(0x7f00000006c0)=[{&(0x7f0000000240)="997c7e90471ec6786b6aa37fd8fbf290c011bee5642707bf7b126c36024e5e8f0d3d514aa1538eb70908eb3ac1a8a52e0ba29dab8884c189c9b68415aa0226e7c6a7ccf48ad20543b10360ab7ee9b247e4304d92f0ec7c0ba06d8160095660a0f12836e2033baed6228d464479ce22f2fadce176d0750fdc6ab1004eb9c4440707be1dc31c1ce11815d12f0d50eef6477341b3f6a4f364a1fccd68e2bcd2dba76227338cd6a1835a44", 0xa9, 0x8}, {&(0x7f0000000380)="3a79b76eed8bb53c1f5217cb4d40694fa75675b28af54d40304f697a1d04373a7ef7b09d46fa6365d222516dcc92d004bc937a22980c404bb5b5669f3dfd0e569079c03b2855be3337944aea4b03b03a3eb6d7", 0x53, 0x3}, {&(0x7f0000000400)="c8213af91316be74099fc072cc912017e77b8709c846cf00eb99c7c03cee58e25602e6ec0b4b42c8709e4447b0d23296a71661cdb6ea9b13d35ed3206f67e5559840f063e554ed7fcb842ab9b072197358b7a617cb0825abfabe3da9b022ecbe28ebcc22bd651a40dfcf4782be0c0c6d8adb8fdd7afce8c8659cc9eef1483eceb26a223fa9d591e28633e6bf6facd75e4295341e2ef3788284fc4482db16cab37de0c1adbf7fa07ad161ae875284778f49e15a052d875e", 0xb7, 0x80}, {&(0x7f00000004c0)="056b3e2d287f817e74a518293ea19b1196cccb376ac73cd7bbeccaced6f43aa9706b33d8ec56c58be0febb03dadec48add6a378f07f9053f1b6f33fe63a960502ad48232f0bee4a41509d7063d478768ab8ee0a90ebdb7c9bc326d54c8edad7e9d59641faf45c171e35f77f8c38a7563e1555c331a5a3e4da1ce59c0c697ebe071d527f24563165dafd23b45186c3d55251c825d0d7fd16b0f13a2f1321cddbcf231b398a88b19e3915ee544692c3559f42a", 0xb2, 0x6}, {&(0x7f0000000580)="8023d53ac815f8a84b84350b859e8673ed208a78bbfec2e35d6d4927707d5dd61106eb0321af3709c17fe7661323c51575e9c18d7b834c138636224eb1a7d75dd59d5c5d7411bdd4c2b07cf727643f52b1ca3e1680cde001be2f8334303e9f4191c2f9425472ca1ee6bac17fde09f0ce5fdf2e70d3c1a38b2d3e0e804f7df817b6a03e5e1ffea1ca7cd7", 0x8a, 0x8}, {&(0x7f0000000300)="fae83b83fc781c7715", 0x9, 0x8fe}, {&(0x7f0000000640)="96f1e3c89318e48db56867032dd1ba9b0ffeec69eb34236bd93b937c6bb7447840dc021e536b89aad4fe89ca2317f4fe2b36cbbdd8d72d841aee6f7b7be258352406775f169573cbf4da0bcf856f825233c5387a3a7cde778c057d591f2133c10e8b5bdb164577f492130acfc7", 0x6d, 0x5}], 0x802010, &(0x7f0000000740)={[{@order_relaxed}], [{@fsname}, {@fsuuid={'fsuuid', 0x3d, {[0x36, 0x38, 0x61, 0x64, 0x39, 0x38, 0x31, 0x37], 0x2d, [0x62, 0x61, 0x61, 0x63], 0x2d, [0x62, 0x39, 0x33, 0x35], 0x2d, [0x32, 0x37, 0x33, 0x61], 0x2d, [0x61, 0x39, 0x64, 0x65, 0x31, 0x8eb4bab6ccebb2ed, 0x64, 0x62]}}}]})

06:18:48 executing program 1:
r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0)
mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800004, 0x12, r0, 0x0)
preadv(0xffffffffffffffff, &(0x7f00000001c0)=[{0x0}], 0x1, 0x9, 0x0)
mmap(&(0x7f0000000000/0xa000)=nil, 0xa000, 0x2, 0x2172, 0xffffffffffffffff, 0x0)
socketpair(0x29, 0x80005, 0x0, &(0x7f0000000340)={0x0, 0x0})

06:18:48 executing program 3:
r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0)
mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800004, 0x12, 0xffffffffffffffff, 0x0)
preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x9, 0x0)
mmap(&(0x7f0000000000/0xa000)=nil, 0xa000, 0x2, 0x2172, 0xffffffffffffffff, 0x0)
r1 = openat$khugepaged_scan(0xffffff9c, &(0x7f0000000080), 0x1, 0x0)
close(r1)

[  330.608700][T14429] loop0: detected capacity change from 0 to 8
06:18:48 executing program 2:
r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0)
mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800004, 0x12, r0, 0x0)
preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x9, 0x0)
mmap(&(0x7f0000000000/0xa000)=nil, 0xa000, 0x2, 0x2172, 0xffffffffffffffff, 0x0)
r1 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x11, 0x3, &(0x7f00000000c0)=@framed, &(0x7f00000001c0)='syzkaller\x00', 0x4, 0x8f, &(0x7f00000002c0)=""/143, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x74)
bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='ext4_es_lookup_extent_exit\x00', r1}, 0x10)
r2 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x11, 0x3, &(0x7f00000000c0)=@framed, &(0x7f00000001c0)='syzkaller\x00', 0x4, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x74)
bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='ext4_es_lookup_extent_exit\x00', r2}, 0x10)

06:18:48 executing program 3:
r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0)
mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800004, 0x12, r0, 0x0)
preadv(0xffffffffffffffff, &(0x7f00000001c0)=[{0x0}], 0x1, 0x9, 0x0)
mmap(&(0x7f0000000000/0xa000)=nil, 0xa000, 0x2, 0x2172, 0xffffffffffffffff, 0x0)
r1 = openat$khugepaged_scan(0xffffff9c, &(0x7f0000000080), 0x1, 0x0)
close(r1)

06:18:48 executing program 1:
r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0)
mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800004, 0x12, r0, 0x0)
preadv(0xffffffffffffffff, &(0x7f00000001c0)=[{0x0}], 0x1, 0x9, 0x0)
mmap(&(0x7f0000000000/0xa000)=nil, 0xa000, 0x2, 0x2172, 0xffffffffffffffff, 0x0)
socketpair(0x29, 0x80005, 0x0, &(0x7f0000000340)={0x0, 0x0})

06:18:48 executing program 0:
r0 = openat(0xffffffffffffffff, 0x0, 0x0, 0x0)
mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800004, 0x12, r0, 0x0)
preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x9, 0x0)
mmap(&(0x7f0000000000/0xa000)=nil, 0xa000, 0x2, 0x2172, 0xffffffffffffffff, 0x0)
syz_mount_image$nilfs2(&(0x7f0000000180), &(0x7f0000000200)='./file0\x00', 0xd85, 0x7, &(0x7f00000006c0)=[{&(0x7f0000000240)="997c7e90471ec6786b6aa37fd8fbf290c011bee5642707bf7b126c36024e5e8f0d3d514aa1538eb70908eb3ac1a8a52e0ba29dab8884c189c9b68415aa0226e7c6a7ccf48ad20543b10360ab7ee9b247e4304d92f0ec7c0ba06d8160095660a0f12836e2033baed6228d464479ce22f2fadce176d0750fdc6ab1004eb9c4440707be1dc31c1ce11815d12f0d50eef6477341b3f6a4f364a1fccd68e2bcd2dba76227338cd6a1835a44", 0xa9, 0x8}, {&(0x7f0000000380)="3a79b76eed8bb53c1f5217cb4d40694fa75675b28af54d40304f697a1d04373a7ef7b09d46fa6365d222516dcc92d004bc937a22980c404bb5b5669f3dfd0e569079c03b2855be3337944aea4b03b03a3eb6d7", 0x53, 0x3}, {&(0x7f0000000400)="c8213af91316be74099fc072cc912017e77b8709c846cf00eb99c7c03cee58e25602e6ec0b4b42c8709e4447b0d23296a71661cdb6ea9b13d35ed3206f67e5559840f063e554ed7fcb842ab9b072197358b7a617cb0825abfabe3da9b022ecbe28ebcc22bd651a40dfcf4782be0c0c6d8adb8fdd7afce8c8659cc9eef1483eceb26a223fa9d591e28633e6bf6facd75e4295341e2ef3788284fc4482db16cab37de0c1adbf7fa07ad161ae875284778f49e15a052d875e", 0xb7, 0x80}, {&(0x7f00000004c0)="056b3e2d287f817e74a518293ea19b1196cccb376ac73cd7bbeccaced6f43aa9706b33d8ec56c58be0febb03dadec48add6a378f07f9053f1b6f33fe63a960502ad48232f0bee4a41509d7063d478768ab8ee0a90ebdb7c9bc326d54c8edad7e9d59641faf45c171e35f77f8c38a7563e1555c331a5a3e4da1ce59c0c697ebe071d527f24563165dafd23b45186c3d55251c825d0d7fd16b0f13a2f1321cddbcf231b398a88b19e3915ee544692c3559f42a", 0xb2, 0x6}, {&(0x7f0000000580)="8023d53ac815f8a84b84350b859e8673ed208a78bbfec2e35d6d4927707d5dd61106eb0321af3709c17fe7661323c51575e9c18d7b834c138636224eb1a7d75dd59d5c5d7411bdd4c2b07cf727643f52b1ca3e1680cde001be2f8334303e9f4191c2f9425472ca1ee6bac17fde09f0ce5fdf2e70d3c1a38b2d3e0e804f7df817b6a03e5e1ffea1ca7cd7", 0x8a, 0x8}, {&(0x7f0000000300)="fae83b83fc781c7715", 0x9, 0x8fe}, {&(0x7f0000000640)="96f1e3c89318e48db56867032dd1ba9b0ffeec69eb34236bd93b937c6bb7447840dc021e536b89aad4fe89ca2317f4fe2b36cbbdd8d72d841aee6f7b7be258352406775f169573cbf4da0bcf856f825233c5387a3a7cde778c057d591f2133c10e8b5bdb164577f492130acfc7", 0x6d, 0x5}], 0x802010, &(0x7f0000000740)={[{@order_relaxed}], [{@fsname}, {@fsuuid={'fsuuid', 0x3d, {[0x36, 0x38, 0x61, 0x64, 0x39, 0x38, 0x31, 0x37], 0x2d, [0x62, 0x61, 0x61, 0x63], 0x2d, [0x62, 0x39, 0x33, 0x35], 0x2d, [0x32, 0x37, 0x33, 0x61], 0x2d, [0x61, 0x39, 0x64, 0x65, 0x31, 0x8eb4bab6ccebb2ed, 0x64, 0x62]}}}]})

06:18:48 executing program 2:
r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0)
mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800004, 0x12, r0, 0x0)
preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x9, 0x0)
mmap(&(0x7f0000000000/0xa000)=nil, 0xa000, 0x2, 0x2172, 0xffffffffffffffff, 0x0)
r1 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x11, 0x3, &(0x7f00000000c0)=@framed, &(0x7f00000001c0)='syzkaller\x00', 0x4, 0x8f, &(0x7f00000002c0)=""/143, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x74)
bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='ext4_es_lookup_extent_exit\x00', r1}, 0x10)
r2 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x11, 0x3, &(0x7f00000000c0)=@framed, &(0x7f00000001c0)='syzkaller\x00', 0x4, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x74)
bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='ext4_es_lookup_extent_exit\x00', r2}, 0x10)

06:18:48 executing program 1:
r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0)
mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800004, 0x12, r0, 0x0)
preadv(r0, 0x0, 0x0, 0x9, 0x0)
mmap(&(0x7f0000000000/0xa000)=nil, 0xa000, 0x2, 0x2172, 0xffffffffffffffff, 0x0)
socketpair(0x29, 0x80005, 0x0, &(0x7f0000000340)={0x0, 0x0})

06:18:48 executing program 3:
r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0)
mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800004, 0x12, r0, 0x0)
preadv(0xffffffffffffffff, &(0x7f00000001c0)=[{0x0}], 0x1, 0x9, 0x0)
mmap(&(0x7f0000000000/0xa000)=nil, 0xa000, 0x2, 0x2172, 0xffffffffffffffff, 0x0)
r1 = openat$khugepaged_scan(0xffffff9c, &(0x7f0000000080), 0x1, 0x0)
close(r1)

[  330.756383][T14446] loop0: detected capacity change from 0 to 8
06:18:48 executing program 1:
r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0)
mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800004, 0x12, r0, 0x0)
preadv(r0, 0x0, 0x0, 0x9, 0x0)
mmap(&(0x7f0000000000/0xa000)=nil, 0xa000, 0x2, 0x2172, 0xffffffffffffffff, 0x0)
socketpair(0x29, 0x80005, 0x0, &(0x7f0000000340)={0x0, 0x0})

06:18:48 executing program 2:
r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0)
mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800004, 0x12, r0, 0x0)
preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x9, 0x0)
mmap(&(0x7f0000000000/0xa000)=nil, 0xa000, 0x2, 0x2172, 0xffffffffffffffff, 0x0)
r1 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x11, 0x3, &(0x7f00000000c0)=@framed, &(0x7f00000001c0)='syzkaller\x00', 0x4, 0x8f, &(0x7f00000002c0)=""/143, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x74)
bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='ext4_es_lookup_extent_exit\x00', r1}, 0x10)
bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x11, 0x3, &(0x7f00000000c0)=@framed, &(0x7f00000001c0)='syzkaller\x00', 0x4, 0x8f, &(0x7f00000002c0)=""/143, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x74)
bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0)

06:18:48 executing program 3:
r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0)
mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800004, 0x12, r0, 0x0)
preadv(0xffffffffffffffff, &(0x7f00000001c0)=[{0x0}], 0x1, 0x9, 0x0)
mmap(&(0x7f0000000000/0xa000)=nil, 0xa000, 0x2, 0x2172, 0xffffffffffffffff, 0x0)
r1 = openat$khugepaged_scan(0xffffff9c, &(0x7f0000000080), 0x1, 0x0)
close(r1)

06:18:48 executing program 0:
r0 = openat(0xffffffffffffffff, 0x0, 0x0, 0x0)
mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800004, 0x12, r0, 0x0)
preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x9, 0x0)
mmap(&(0x7f0000000000/0xa000)=nil, 0xa000, 0x2, 0x2172, 0xffffffffffffffff, 0x0)
syz_mount_image$nilfs2(&(0x7f0000000180), &(0x7f0000000200)='./file0\x00', 0xd85, 0x7, &(0x7f00000006c0)=[{&(0x7f0000000240)="997c7e90471ec6786b6aa37fd8fbf290c011bee5642707bf7b126c36024e5e8f0d3d514aa1538eb70908eb3ac1a8a52e0ba29dab8884c189c9b68415aa0226e7c6a7ccf48ad20543b10360ab7ee9b247e4304d92f0ec7c0ba06d8160095660a0f12836e2033baed6228d464479ce22f2fadce176d0750fdc6ab1004eb9c4440707be1dc31c1ce11815d12f0d50eef6477341b3f6a4f364a1fccd68e2bcd2dba76227338cd6a1835a44", 0xa9, 0x8}, {&(0x7f0000000380)="3a79b76eed8bb53c1f5217cb4d40694fa75675b28af54d40304f697a1d04373a7ef7b09d46fa6365d222516dcc92d004bc937a22980c404bb5b5669f3dfd0e569079c03b2855be3337944aea4b03b03a3eb6d7", 0x53, 0x3}, {&(0x7f0000000400)="c8213af91316be74099fc072cc912017e77b8709c846cf00eb99c7c03cee58e25602e6ec0b4b42c8709e4447b0d23296a71661cdb6ea9b13d35ed3206f67e5559840f063e554ed7fcb842ab9b072197358b7a617cb0825abfabe3da9b022ecbe28ebcc22bd651a40dfcf4782be0c0c6d8adb8fdd7afce8c8659cc9eef1483eceb26a223fa9d591e28633e6bf6facd75e4295341e2ef3788284fc4482db16cab37de0c1adbf7fa07ad161ae875284778f49e15a052d875e", 0xb7, 0x80}, {&(0x7f00000004c0)="056b3e2d287f817e74a518293ea19b1196cccb376ac73cd7bbeccaced6f43aa9706b33d8ec56c58be0febb03dadec48add6a378f07f9053f1b6f33fe63a960502ad48232f0bee4a41509d7063d478768ab8ee0a90ebdb7c9bc326d54c8edad7e9d59641faf45c171e35f77f8c38a7563e1555c331a5a3e4da1ce59c0c697ebe071d527f24563165dafd23b45186c3d55251c825d0d7fd16b0f13a2f1321cddbcf231b398a88b19e3915ee544692c3559f42a", 0xb2, 0x6}, {&(0x7f0000000580)="8023d53ac815f8a84b84350b859e8673ed208a78bbfec2e35d6d4927707d5dd61106eb0321af3709c17fe7661323c51575e9c18d7b834c138636224eb1a7d75dd59d5c5d7411bdd4c2b07cf727643f52b1ca3e1680cde001be2f8334303e9f4191c2f9425472ca1ee6bac17fde09f0ce5fdf2e70d3c1a38b2d3e0e804f7df817b6a03e5e1ffea1ca7cd7", 0x8a, 0x8}, {&(0x7f0000000300)="fae83b83fc781c7715", 0x9, 0x8fe}, {&(0x7f0000000640)="96f1e3c89318e48db56867032dd1ba9b0ffeec69eb34236bd93b937c6bb7447840dc021e536b89aad4fe89ca2317f4fe2b36cbbdd8d72d841aee6f7b7be258352406775f169573cbf4da0bcf856f825233c5387a3a7cde778c057d591f2133c10e8b5bdb164577f492130acfc7", 0x6d, 0x5}], 0x802010, &(0x7f0000000740)={[{@order_relaxed}], [{@fsname}, {@fsuuid={'fsuuid', 0x3d, {[0x36, 0x38, 0x61, 0x64, 0x39, 0x38, 0x31, 0x37], 0x2d, [0x62, 0x61, 0x61, 0x63], 0x2d, [0x62, 0x39, 0x33, 0x35], 0x2d, [0x32, 0x37, 0x33, 0x61], 0x2d, [0x61, 0x39, 0x64, 0x65, 0x31, 0x8eb4bab6ccebb2ed, 0x64, 0x62]}}}]})

06:18:48 executing program 2:
r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0)
mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800004, 0x12, r0, 0x0)
preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x9, 0x0)
mmap(&(0x7f0000000000/0xa000)=nil, 0xa000, 0x2, 0x2172, 0xffffffffffffffff, 0x0)
r1 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x11, 0x3, &(0x7f00000000c0)=@framed, &(0x7f00000001c0)='syzkaller\x00', 0x4, 0x8f, &(0x7f00000002c0)=""/143, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x74)
bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='ext4_es_lookup_extent_exit\x00', r1}, 0x10)
bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x11, 0x3, &(0x7f00000000c0)=@framed, &(0x7f00000001c0)='syzkaller\x00', 0x4, 0x8f, &(0x7f00000002c0)=""/143, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x74)
bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0)

06:18:48 executing program 3:
r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0)
mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800004, 0x12, r0, 0x0)
preadv(r0, 0x0, 0x0, 0x9, 0x0)
mmap(&(0x7f0000000000/0xa000)=nil, 0xa000, 0x2, 0x2172, 0xffffffffffffffff, 0x0)
r1 = openat$khugepaged_scan(0xffffff9c, &(0x7f0000000080), 0x1, 0x0)
close(r1)

06:18:48 executing program 1:
r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0)
mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800004, 0x12, r0, 0x0)
preadv(r0, 0x0, 0x0, 0x9, 0x0)
mmap(&(0x7f0000000000/0xa000)=nil, 0xa000, 0x2, 0x2172, 0xffffffffffffffff, 0x0)
socketpair(0x29, 0x80005, 0x0, &(0x7f0000000340)={0x0, 0x0})

[  330.934864][T14463] loop0: detected capacity change from 0 to 8
06:18:48 executing program 1:
r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0)
mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800004, 0x12, r0, 0x0)
preadv(r0, &(0x7f00000001c0), 0x0, 0x9, 0x0)
mmap(&(0x7f0000000000/0xa000)=nil, 0xa000, 0x2, 0x2172, 0xffffffffffffffff, 0x0)
socketpair(0x29, 0x80005, 0x0, &(0x7f0000000340)={0x0, 0x0})

06:18:48 executing program 3:
r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0)
mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800004, 0x12, r0, 0x0)
preadv(r0, 0x0, 0x0, 0x9, 0x0)
mmap(&(0x7f0000000000/0xa000)=nil, 0xa000, 0x2, 0x2172, 0xffffffffffffffff, 0x0)
r1 = openat$khugepaged_scan(0xffffff9c, &(0x7f0000000080), 0x1, 0x0)
close(r1)

06:18:48 executing program 2:
r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0)
mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800004, 0x12, r0, 0x0)
preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x9, 0x0)
mmap(&(0x7f0000000000/0xa000)=nil, 0xa000, 0x2, 0x2172, 0xffffffffffffffff, 0x0)
r1 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x11, 0x3, &(0x7f00000000c0)=@framed, &(0x7f00000001c0)='syzkaller\x00', 0x4, 0x8f, &(0x7f00000002c0)=""/143, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x74)
bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='ext4_es_lookup_extent_exit\x00', r1}, 0x10)
bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x11, 0x3, &(0x7f00000000c0)=@framed, &(0x7f00000001c0)='syzkaller\x00', 0x4, 0x8f, &(0x7f00000002c0)=""/143, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x74)
bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0)

06:18:48 executing program 0:
r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0)
mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x0, 0x12, r0, 0x0)
preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x9, 0x0)
mmap(&(0x7f0000000000/0xa000)=nil, 0xa000, 0x2, 0x2172, 0xffffffffffffffff, 0x0)
syz_mount_image$nilfs2(&(0x7f0000000180), &(0x7f0000000200)='./file0\x00', 0xd85, 0x7, &(0x7f00000006c0)=[{&(0x7f0000000240)="997c7e90471ec6786b6aa37fd8fbf290c011bee5642707bf7b126c36024e5e8f0d3d514aa1538eb70908eb3ac1a8a52e0ba29dab8884c189c9b68415aa0226e7c6a7ccf48ad20543b10360ab7ee9b247e4304d92f0ec7c0ba06d8160095660a0f12836e2033baed6228d464479ce22f2fadce176d0750fdc6ab1004eb9c4440707be1dc31c1ce11815d12f0d50eef6477341b3f6a4f364a1fccd68e2bcd2dba76227338cd6a1835a44", 0xa9, 0x8}, {&(0x7f0000000380)="3a79b76eed8bb53c1f5217cb4d40694fa75675b28af54d40304f697a1d04373a7ef7b09d46fa6365d222516dcc92d004bc937a22980c404bb5b5669f3dfd0e569079c03b2855be3337944aea4b03b03a3eb6d7", 0x53, 0x3}, {&(0x7f0000000400)="c8213af91316be74099fc072cc912017e77b8709c846cf00eb99c7c03cee58e25602e6ec0b4b42c8709e4447b0d23296a71661cdb6ea9b13d35ed3206f67e5559840f063e554ed7fcb842ab9b072197358b7a617cb0825abfabe3da9b022ecbe28ebcc22bd651a40dfcf4782be0c0c6d8adb8fdd7afce8c8659cc9eef1483eceb26a223fa9d591e28633e6bf6facd75e4295341e2ef3788284fc4482db16cab37de0c1adbf7fa07ad161ae875284778f49e15a052d875e", 0xb7, 0x80}, {&(0x7f00000004c0)="056b3e2d287f817e74a518293ea19b1196cccb376ac73cd7bbeccaced6f43aa9706b33d8ec56c58be0febb03dadec48add6a378f07f9053f1b6f33fe63a960502ad48232f0bee4a41509d7063d478768ab8ee0a90ebdb7c9bc326d54c8edad7e9d59641faf45c171e35f77f8c38a7563e1555c331a5a3e4da1ce59c0c697ebe071d527f24563165dafd23b45186c3d55251c825d0d7fd16b0f13a2f1321cddbcf231b398a88b19e3915ee544692c3559f42a", 0xb2, 0x6}, {&(0x7f0000000580)="8023d53ac815f8a84b84350b859e8673ed208a78bbfec2e35d6d4927707d5dd61106eb0321af3709c17fe7661323c51575e9c18d7b834c138636224eb1a7d75dd59d5c5d7411bdd4c2b07cf727643f52b1ca3e1680cde001be2f8334303e9f4191c2f9425472ca1ee6bac17fde09f0ce5fdf2e70d3c1a38b2d3e0e804f7df817b6a03e5e1ffea1ca7cd7", 0x8a, 0x8}, {&(0x7f0000000300)="fae83b83fc781c7715", 0x9, 0x8fe}, {&(0x7f0000000640)="96f1e3c89318e48db56867032dd1ba9b0ffeec69eb34236bd93b937c6bb7447840dc021e536b89aad4fe89ca2317f4fe2b36cbbdd8d72d841aee6f7b7be258352406775f169573cbf4da0bcf856f825233c5387a3a7cde778c057d591f2133c10e8b5bdb164577f492130acfc7", 0x6d, 0x5}], 0x802010, &(0x7f0000000740)={[{@order_relaxed}], [{@fsname}, {@fsuuid={'fsuuid', 0x3d, {[0x36, 0x38, 0x61, 0x64, 0x39, 0x38, 0x31, 0x37], 0x2d, [0x62, 0x61, 0x61, 0x63], 0x2d, [0x62, 0x39, 0x33, 0x35], 0x2d, [0x32, 0x37, 0x33, 0x61], 0x2d, [0x61, 0x39, 0x64, 0x65, 0x31, 0x8eb4bab6ccebb2ed, 0x64, 0x62]}}}]})

06:18:48 executing program 1:
r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0)
mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800004, 0x12, r0, 0x0)
preadv(r0, &(0x7f00000001c0), 0x0, 0x9, 0x0)
mmap(&(0x7f0000000000/0xa000)=nil, 0xa000, 0x2, 0x2172, 0xffffffffffffffff, 0x0)
socketpair(0x29, 0x80005, 0x0, &(0x7f0000000340)={0x0, 0x0})

06:18:48 executing program 3:
r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0)
mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800004, 0x12, r0, 0x0)
preadv(r0, 0x0, 0x0, 0x9, 0x0)
mmap(&(0x7f0000000000/0xa000)=nil, 0xa000, 0x2, 0x2172, 0xffffffffffffffff, 0x0)
r1 = openat$khugepaged_scan(0xffffff9c, &(0x7f0000000080), 0x1, 0x0)
close(r1)

[  331.080823][T14480] loop0: detected capacity change from 0 to 8
06:18:48 executing program 1:
r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0)
mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800004, 0x12, r0, 0x0)
preadv(r0, &(0x7f00000001c0), 0x0, 0x9, 0x0)
mmap(&(0x7f0000000000/0xa000)=nil, 0xa000, 0x2, 0x2172, 0xffffffffffffffff, 0x0)
socketpair(0x29, 0x80005, 0x0, &(0x7f0000000340)={0x0, 0x0})

06:18:48 executing program 2:
r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0)
mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800004, 0x12, r0, 0x0)
preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x9, 0x0)
mmap(&(0x7f0000000000/0xa000)=nil, 0xa000, 0x2, 0x2172, 0xffffffffffffffff, 0x0)
r1 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x11, 0x3, &(0x7f00000000c0)=@framed, &(0x7f00000001c0)='syzkaller\x00', 0x4, 0x8f, &(0x7f00000002c0)=""/143, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x74)
bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='ext4_es_lookup_extent_exit\x00', r1}, 0x10)
r2 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x11, 0x3, &(0x7f00000000c0)=@framed, &(0x7f00000001c0)='syzkaller\x00', 0x4, 0x8f, &(0x7f00000002c0)=""/143, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x74)
bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={0x0, r2}, 0x10)

06:18:48 executing program 3:
r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0)
mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800004, 0x12, r0, 0x0)
preadv(r0, &(0x7f00000001c0), 0x0, 0x9, 0x0)
mmap(&(0x7f0000000000/0xa000)=nil, 0xa000, 0x2, 0x2172, 0xffffffffffffffff, 0x0)
r1 = openat$khugepaged_scan(0xffffff9c, &(0x7f0000000080), 0x1, 0x0)
close(r1)

06:18:48 executing program 1:
r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0)
mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800004, 0x12, r0, 0x0)
preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x0, 0x0)
mmap(&(0x7f0000000000/0xa000)=nil, 0xa000, 0x2, 0x2172, 0xffffffffffffffff, 0x0)
socketpair(0x29, 0x80005, 0x0, &(0x7f0000000340)={0x0, 0x0})

06:18:48 executing program 2:
r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0)
mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800004, 0x12, r0, 0x0)
preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x9, 0x0)
mmap(&(0x7f0000000000/0xa000)=nil, 0xa000, 0x2, 0x2172, 0xffffffffffffffff, 0x0)
r1 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x11, 0x3, &(0x7f00000000c0)=@framed, &(0x7f00000001c0)='syzkaller\x00', 0x4, 0x8f, &(0x7f00000002c0)=""/143, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x74)
bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='ext4_es_lookup_extent_exit\x00', r1}, 0x10)
r2 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x11, 0x3, &(0x7f00000000c0)=@framed, &(0x7f00000001c0)='syzkaller\x00', 0x4, 0x8f, &(0x7f00000002c0)=""/143, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x74)
bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={0x0, r2}, 0x10)

06:18:48 executing program 0:
r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0)
mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x0, 0x12, r0, 0x0)
preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x9, 0x0)
mmap(&(0x7f0000000000/0xa000)=nil, 0xa000, 0x2, 0x2172, 0xffffffffffffffff, 0x0)
syz_mount_image$nilfs2(&(0x7f0000000180), &(0x7f0000000200)='./file0\x00', 0xd85, 0x7, &(0x7f00000006c0)=[{&(0x7f0000000240)="997c7e90471ec6786b6aa37fd8fbf290c011bee5642707bf7b126c36024e5e8f0d3d514aa1538eb70908eb3ac1a8a52e0ba29dab8884c189c9b68415aa0226e7c6a7ccf48ad20543b10360ab7ee9b247e4304d92f0ec7c0ba06d8160095660a0f12836e2033baed6228d464479ce22f2fadce176d0750fdc6ab1004eb9c4440707be1dc31c1ce11815d12f0d50eef6477341b3f6a4f364a1fccd68e2bcd2dba76227338cd6a1835a44", 0xa9, 0x8}, {&(0x7f0000000380)="3a79b76eed8bb53c1f5217cb4d40694fa75675b28af54d40304f697a1d04373a7ef7b09d46fa6365d222516dcc92d004bc937a22980c404bb5b5669f3dfd0e569079c03b2855be3337944aea4b03b03a3eb6d7", 0x53, 0x3}, {&(0x7f0000000400)="c8213af91316be74099fc072cc912017e77b8709c846cf00eb99c7c03cee58e25602e6ec0b4b42c8709e4447b0d23296a71661cdb6ea9b13d35ed3206f67e5559840f063e554ed7fcb842ab9b072197358b7a617cb0825abfabe3da9b022ecbe28ebcc22bd651a40dfcf4782be0c0c6d8adb8fdd7afce8c8659cc9eef1483eceb26a223fa9d591e28633e6bf6facd75e4295341e2ef3788284fc4482db16cab37de0c1adbf7fa07ad161ae875284778f49e15a052d875e", 0xb7, 0x80}, {&(0x7f00000004c0)="056b3e2d287f817e74a518293ea19b1196cccb376ac73cd7bbeccaced6f43aa9706b33d8ec56c58be0febb03dadec48add6a378f07f9053f1b6f33fe63a960502ad48232f0bee4a41509d7063d478768ab8ee0a90ebdb7c9bc326d54c8edad7e9d59641faf45c171e35f77f8c38a7563e1555c331a5a3e4da1ce59c0c697ebe071d527f24563165dafd23b45186c3d55251c825d0d7fd16b0f13a2f1321cddbcf231b398a88b19e3915ee544692c3559f42a", 0xb2, 0x6}, {&(0x7f0000000580)="8023d53ac815f8a84b84350b859e8673ed208a78bbfec2e35d6d4927707d5dd61106eb0321af3709c17fe7661323c51575e9c18d7b834c138636224eb1a7d75dd59d5c5d7411bdd4c2b07cf727643f52b1ca3e1680cde001be2f8334303e9f4191c2f9425472ca1ee6bac17fde09f0ce5fdf2e70d3c1a38b2d3e0e804f7df817b6a03e5e1ffea1ca7cd7", 0x8a, 0x8}, {&(0x7f0000000300)="fae83b83fc781c7715", 0x9, 0x8fe}, {&(0x7f0000000640)="96f1e3c89318e48db56867032dd1ba9b0ffeec69eb34236bd93b937c6bb7447840dc021e536b89aad4fe89ca2317f4fe2b36cbbdd8d72d841aee6f7b7be258352406775f169573cbf4da0bcf856f825233c5387a3a7cde778c057d591f2133c10e8b5bdb164577f492130acfc7", 0x6d, 0x5}], 0x802010, &(0x7f0000000740)={[{@order_relaxed}], [{@fsname}, {@fsuuid={'fsuuid', 0x3d, {[0x36, 0x38, 0x61, 0x64, 0x39, 0x38, 0x31, 0x37], 0x2d, [0x62, 0x61, 0x61, 0x63], 0x2d, [0x62, 0x39, 0x33, 0x35], 0x2d, [0x32, 0x37, 0x33, 0x61], 0x2d, [0x61, 0x39, 0x64, 0x65, 0x31, 0x8eb4bab6ccebb2ed, 0x64, 0x62]}}}]})

06:18:48 executing program 3:
r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0)
mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800004, 0x12, r0, 0x0)
preadv(r0, &(0x7f00000001c0), 0x0, 0x9, 0x0)
mmap(&(0x7f0000000000/0xa000)=nil, 0xa000, 0x2, 0x2172, 0xffffffffffffffff, 0x0)
r1 = openat$khugepaged_scan(0xffffff9c, &(0x7f0000000080), 0x1, 0x0)
close(r1)

06:18:48 executing program 3:
r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0)
mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800004, 0x12, r0, 0x0)
preadv(r0, &(0x7f00000001c0), 0x0, 0x9, 0x0)
mmap(&(0x7f0000000000/0xa000)=nil, 0xa000, 0x2, 0x2172, 0xffffffffffffffff, 0x0)
r1 = openat$khugepaged_scan(0xffffff9c, &(0x7f0000000080), 0x1, 0x0)
close(r1)

[  331.290996][T14502] loop0: detected capacity change from 0 to 8
06:18:48 executing program 1:
r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0)
mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800004, 0x12, r0, 0x0)
preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x0, 0x0)
mmap(&(0x7f0000000000/0xa000)=nil, 0xa000, 0x2, 0x2172, 0xffffffffffffffff, 0x0)
socketpair(0x29, 0x80005, 0x0, &(0x7f0000000340)={0x0, 0x0})

06:18:48 executing program 3:
r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0)
mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800004, 0x12, r0, 0x0)
preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x0, 0x0)
mmap(&(0x7f0000000000/0xa000)=nil, 0xa000, 0x2, 0x2172, 0xffffffffffffffff, 0x0)
r1 = openat$khugepaged_scan(0xffffff9c, &(0x7f0000000080), 0x1, 0x0)
close(r1)

06:18:48 executing program 2:
r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0)
mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800004, 0x12, r0, 0x0)
preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x9, 0x0)
mmap(&(0x7f0000000000/0xa000)=nil, 0xa000, 0x2, 0x2172, 0xffffffffffffffff, 0x0)
r1 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x11, 0x3, &(0x7f00000000c0)=@framed, &(0x7f00000001c0)='syzkaller\x00', 0x4, 0x8f, &(0x7f00000002c0)=""/143, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x74)
bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='ext4_es_lookup_extent_exit\x00', r1}, 0x10)
r2 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x11, 0x3, &(0x7f00000000c0)=@framed, &(0x7f00000001c0)='syzkaller\x00', 0x4, 0x8f, &(0x7f00000002c0)=""/143, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x74)
bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={0x0, r2}, 0x10)

06:18:49 executing program 0:
r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0)
mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x0, 0x12, r0, 0x0)
preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x9, 0x0)
mmap(&(0x7f0000000000/0xa000)=nil, 0xa000, 0x2, 0x2172, 0xffffffffffffffff, 0x0)
syz_mount_image$nilfs2(&(0x7f0000000180), &(0x7f0000000200)='./file0\x00', 0xd85, 0x7, &(0x7f00000006c0)=[{&(0x7f0000000240)="997c7e90471ec6786b6aa37fd8fbf290c011bee5642707bf7b126c36024e5e8f0d3d514aa1538eb70908eb3ac1a8a52e0ba29dab8884c189c9b68415aa0226e7c6a7ccf48ad20543b10360ab7ee9b247e4304d92f0ec7c0ba06d8160095660a0f12836e2033baed6228d464479ce22f2fadce176d0750fdc6ab1004eb9c4440707be1dc31c1ce11815d12f0d50eef6477341b3f6a4f364a1fccd68e2bcd2dba76227338cd6a1835a44", 0xa9, 0x8}, {&(0x7f0000000380)="3a79b76eed8bb53c1f5217cb4d40694fa75675b28af54d40304f697a1d04373a7ef7b09d46fa6365d222516dcc92d004bc937a22980c404bb5b5669f3dfd0e569079c03b2855be3337944aea4b03b03a3eb6d7", 0x53, 0x3}, {&(0x7f0000000400)="c8213af91316be74099fc072cc912017e77b8709c846cf00eb99c7c03cee58e25602e6ec0b4b42c8709e4447b0d23296a71661cdb6ea9b13d35ed3206f67e5559840f063e554ed7fcb842ab9b072197358b7a617cb0825abfabe3da9b022ecbe28ebcc22bd651a40dfcf4782be0c0c6d8adb8fdd7afce8c8659cc9eef1483eceb26a223fa9d591e28633e6bf6facd75e4295341e2ef3788284fc4482db16cab37de0c1adbf7fa07ad161ae875284778f49e15a052d875e", 0xb7, 0x80}, {&(0x7f00000004c0)="056b3e2d287f817e74a518293ea19b1196cccb376ac73cd7bbeccaced6f43aa9706b33d8ec56c58be0febb03dadec48add6a378f07f9053f1b6f33fe63a960502ad48232f0bee4a41509d7063d478768ab8ee0a90ebdb7c9bc326d54c8edad7e9d59641faf45c171e35f77f8c38a7563e1555c331a5a3e4da1ce59c0c697ebe071d527f24563165dafd23b45186c3d55251c825d0d7fd16b0f13a2f1321cddbcf231b398a88b19e3915ee544692c3559f42a", 0xb2, 0x6}, {&(0x7f0000000580)="8023d53ac815f8a84b84350b859e8673ed208a78bbfec2e35d6d4927707d5dd61106eb0321af3709c17fe7661323c51575e9c18d7b834c138636224eb1a7d75dd59d5c5d7411bdd4c2b07cf727643f52b1ca3e1680cde001be2f8334303e9f4191c2f9425472ca1ee6bac17fde09f0ce5fdf2e70d3c1a38b2d3e0e804f7df817b6a03e5e1ffea1ca7cd7", 0x8a, 0x8}, {&(0x7f0000000300)="fae83b83fc781c7715", 0x9, 0x8fe}, {&(0x7f0000000640)="96f1e3c89318e48db56867032dd1ba9b0ffeec69eb34236bd93b937c6bb7447840dc021e536b89aad4fe89ca2317f4fe2b36cbbdd8d72d841aee6f7b7be258352406775f169573cbf4da0bcf856f825233c5387a3a7cde778c057d591f2133c10e8b5bdb164577f492130acfc7", 0x6d, 0x5}], 0x802010, &(0x7f0000000740)={[{@order_relaxed}], [{@fsname}, {@fsuuid={'fsuuid', 0x3d, {[0x36, 0x38, 0x61, 0x64, 0x39, 0x38, 0x31, 0x37], 0x2d, [0x62, 0x61, 0x61, 0x63], 0x2d, [0x62, 0x39, 0x33, 0x35], 0x2d, [0x32, 0x37, 0x33, 0x61], 0x2d, [0x61, 0x39, 0x64, 0x65, 0x31, 0x8eb4bab6ccebb2ed, 0x64, 0x62]}}}]})

06:18:49 executing program 1:
r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0)
mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800004, 0x12, r0, 0x0)
preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x0, 0x0)
mmap(&(0x7f0000000000/0xa000)=nil, 0xa000, 0x2, 0x2172, 0xffffffffffffffff, 0x0)
socketpair(0x29, 0x80005, 0x0, &(0x7f0000000340)={0x0, 0x0})

06:18:49 executing program 3:
r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0)
mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800004, 0x12, r0, 0x0)
preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x0, 0x0)
mmap(&(0x7f0000000000/0xa000)=nil, 0xa000, 0x2, 0x2172, 0xffffffffffffffff, 0x0)
r1 = openat$khugepaged_scan(0xffffff9c, &(0x7f0000000080), 0x1, 0x0)
close(r1)

[  331.495525][T14521] loop0: detected capacity change from 0 to 8
06:18:49 executing program 1:
r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0)
mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800004, 0x12, r0, 0x0)
preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x9, 0x0)
mmap(&(0x7f0000000000/0xa000)=nil, 0xa000, 0x0, 0x2172, 0xffffffffffffffff, 0x0)
socketpair(0x29, 0x80005, 0x0, &(0x7f0000000340)={0x0, 0x0})

06:18:49 executing program 3:
r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0)
mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800004, 0x12, r0, 0x0)
preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x0, 0x0)
mmap(&(0x7f0000000000/0xa000)=nil, 0xa000, 0x2, 0x2172, 0xffffffffffffffff, 0x0)
r1 = openat$khugepaged_scan(0xffffff9c, &(0x7f0000000080), 0x1, 0x0)
close(r1)

06:18:49 executing program 2:
r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0)
mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800004, 0x12, r0, 0x0)
preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x9, 0x0)
mmap(&(0x7f0000000000/0xa000)=nil, 0xa000, 0x2, 0x2172, 0xffffffffffffffff, 0x0)
r1 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x11, 0x3, &(0x7f00000000c0)=@framed, &(0x7f00000001c0)='syzkaller\x00', 0x4, 0x8f, &(0x7f00000002c0)=""/143, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x74)
bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='ext4_es_lookup_extent_exit\x00', r1}, 0x10)
bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x11, 0x3, &(0x7f00000000c0)=@framed, &(0x7f00000001c0)='syzkaller\x00', 0x4, 0x8f, &(0x7f00000002c0)=""/143, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x74)
bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='ext4_es_lookup_extent_exit\x00'}, 0x10)

06:18:49 executing program 1:
r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0)
mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800004, 0x12, r0, 0x0)
preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x9, 0x0)
mmap(&(0x7f0000000000/0xa000)=nil, 0xa000, 0x0, 0x2172, 0xffffffffffffffff, 0x0)
socketpair(0x29, 0x80005, 0x0, &(0x7f0000000340)={0x0, 0x0})

06:18:49 executing program 0:
r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0)
mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800004, 0x10, r0, 0x0)
preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x9, 0x0)
mmap(&(0x7f0000000000/0xa000)=nil, 0xa000, 0x2, 0x2172, 0xffffffffffffffff, 0x0)
syz_mount_image$nilfs2(&(0x7f0000000180), &(0x7f0000000200)='./file0\x00', 0xd85, 0x7, &(0x7f00000006c0)=[{&(0x7f0000000240)="997c7e90471ec6786b6aa37fd8fbf290c011bee5642707bf7b126c36024e5e8f0d3d514aa1538eb70908eb3ac1a8a52e0ba29dab8884c189c9b68415aa0226e7c6a7ccf48ad20543b10360ab7ee9b247e4304d92f0ec7c0ba06d8160095660a0f12836e2033baed6228d464479ce22f2fadce176d0750fdc6ab1004eb9c4440707be1dc31c1ce11815d12f0d50eef6477341b3f6a4f364a1fccd68e2bcd2dba76227338cd6a1835a44", 0xa9, 0x8}, {&(0x7f0000000380)="3a79b76eed8bb53c1f5217cb4d40694fa75675b28af54d40304f697a1d04373a7ef7b09d46fa6365d222516dcc92d004bc937a22980c404bb5b5669f3dfd0e569079c03b2855be3337944aea4b03b03a3eb6d7", 0x53, 0x3}, {&(0x7f0000000400)="c8213af91316be74099fc072cc912017e77b8709c846cf00eb99c7c03cee58e25602e6ec0b4b42c8709e4447b0d23296a71661cdb6ea9b13d35ed3206f67e5559840f063e554ed7fcb842ab9b072197358b7a617cb0825abfabe3da9b022ecbe28ebcc22bd651a40dfcf4782be0c0c6d8adb8fdd7afce8c8659cc9eef1483eceb26a223fa9d591e28633e6bf6facd75e4295341e2ef3788284fc4482db16cab37de0c1adbf7fa07ad161ae875284778f49e15a052d875e", 0xb7, 0x80}, {&(0x7f00000004c0)="056b3e2d287f817e74a518293ea19b1196cccb376ac73cd7bbeccaced6f43aa9706b33d8ec56c58be0febb03dadec48add6a378f07f9053f1b6f33fe63a960502ad48232f0bee4a41509d7063d478768ab8ee0a90ebdb7c9bc326d54c8edad7e9d59641faf45c171e35f77f8c38a7563e1555c331a5a3e4da1ce59c0c697ebe071d527f24563165dafd23b45186c3d55251c825d0d7fd16b0f13a2f1321cddbcf231b398a88b19e3915ee544692c3559f42a", 0xb2, 0x6}, {&(0x7f0000000580)="8023d53ac815f8a84b84350b859e8673ed208a78bbfec2e35d6d4927707d5dd61106eb0321af3709c17fe7661323c51575e9c18d7b834c138636224eb1a7d75dd59d5c5d7411bdd4c2b07cf727643f52b1ca3e1680cde001be2f8334303e9f4191c2f9425472ca1ee6bac17fde09f0ce5fdf2e70d3c1a38b2d3e0e804f7df817b6a03e5e1ffea1ca7cd7", 0x8a, 0x8}, {&(0x7f0000000300)="fae83b83fc781c7715", 0x9, 0x8fe}, {&(0x7f0000000640)="96f1e3c89318e48db56867032dd1ba9b0ffeec69eb34236bd93b937c6bb7447840dc021e536b89aad4fe89ca2317f4fe2b36cbbdd8d72d841aee6f7b7be258352406775f169573cbf4da0bcf856f825233c5387a3a7cde778c057d591f2133c10e8b5bdb164577f492130acfc7", 0x6d, 0x5}], 0x802010, &(0x7f0000000740)={[{@order_relaxed}], [{@fsname}, {@fsuuid={'fsuuid', 0x3d, {[0x36, 0x38, 0x61, 0x64, 0x39, 0x38, 0x31, 0x37], 0x2d, [0x62, 0x61, 0x61, 0x63], 0x2d, [0x62, 0x39, 0x33, 0x35], 0x2d, [0x32, 0x37, 0x33, 0x61], 0x2d, [0x61, 0x39, 0x64, 0x65, 0x31, 0x8eb4bab6ccebb2ed, 0x64, 0x62]}}}]})

06:18:49 executing program 3:
r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0)
mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800004, 0x12, r0, 0x0)
preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x9, 0x0)
mmap(&(0x7f0000000000/0xa000)=nil, 0xa000, 0x0, 0x2172, 0xffffffffffffffff, 0x0)
r1 = openat$khugepaged_scan(0xffffff9c, &(0x7f0000000080), 0x1, 0x0)
close(r1)

[  331.633639][T14533] loop0: detected capacity change from 0 to 8
06:18:49 executing program 2:
r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0)
mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800004, 0x12, r0, 0x0)
preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x9, 0x0)
mmap(&(0x7f0000000000/0xa000)=nil, 0xa000, 0x2, 0x2172, 0xffffffffffffffff, 0x0)
r1 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x11, 0x3, &(0x7f00000000c0)=@framed, &(0x7f00000001c0)='syzkaller\x00', 0x4, 0x8f, &(0x7f00000002c0)=""/143, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x74)
bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='ext4_es_lookup_extent_exit\x00', r1}, 0x10)
bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x11, 0x3, &(0x7f00000000c0)=@framed, &(0x7f00000001c0)='syzkaller\x00', 0x4, 0x8f, &(0x7f00000002c0)=""/143, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x74)
bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='ext4_es_lookup_extent_exit\x00'}, 0x10)

06:18:49 executing program 1:
r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0)
mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800004, 0x12, r0, 0x0)
preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x9, 0x0)
mmap(&(0x7f0000000000/0xa000)=nil, 0xa000, 0x0, 0x2172, 0xffffffffffffffff, 0x0)
socketpair(0x29, 0x80005, 0x0, &(0x7f0000000340)={0x0, 0x0})

06:18:49 executing program 3:
r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0)
mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800004, 0x12, r0, 0x0)
preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x9, 0x0)
mmap(&(0x7f0000000000/0xa000)=nil, 0xa000, 0x0, 0x2172, 0xffffffffffffffff, 0x0)
r1 = openat$khugepaged_scan(0xffffff9c, &(0x7f0000000080), 0x1, 0x0)
close(r1)

06:18:49 executing program 0:
r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0)
mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800004, 0x10, r0, 0x0)
preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x9, 0x0)
mmap(&(0x7f0000000000/0xa000)=nil, 0xa000, 0x2, 0x2172, 0xffffffffffffffff, 0x0)
syz_mount_image$nilfs2(&(0x7f0000000180), &(0x7f0000000200)='./file0\x00', 0xd85, 0x7, &(0x7f00000006c0)=[{&(0x7f0000000240)="997c7e90471ec6786b6aa37fd8fbf290c011bee5642707bf7b126c36024e5e8f0d3d514aa1538eb70908eb3ac1a8a52e0ba29dab8884c189c9b68415aa0226e7c6a7ccf48ad20543b10360ab7ee9b247e4304d92f0ec7c0ba06d8160095660a0f12836e2033baed6228d464479ce22f2fadce176d0750fdc6ab1004eb9c4440707be1dc31c1ce11815d12f0d50eef6477341b3f6a4f364a1fccd68e2bcd2dba76227338cd6a1835a44", 0xa9, 0x8}, {&(0x7f0000000380)="3a79b76eed8bb53c1f5217cb4d40694fa75675b28af54d40304f697a1d04373a7ef7b09d46fa6365d222516dcc92d004bc937a22980c404bb5b5669f3dfd0e569079c03b2855be3337944aea4b03b03a3eb6d7", 0x53, 0x3}, {&(0x7f0000000400)="c8213af91316be74099fc072cc912017e77b8709c846cf00eb99c7c03cee58e25602e6ec0b4b42c8709e4447b0d23296a71661cdb6ea9b13d35ed3206f67e5559840f063e554ed7fcb842ab9b072197358b7a617cb0825abfabe3da9b022ecbe28ebcc22bd651a40dfcf4782be0c0c6d8adb8fdd7afce8c8659cc9eef1483eceb26a223fa9d591e28633e6bf6facd75e4295341e2ef3788284fc4482db16cab37de0c1adbf7fa07ad161ae875284778f49e15a052d875e", 0xb7, 0x80}, {&(0x7f00000004c0)="056b3e2d287f817e74a518293ea19b1196cccb376ac73cd7bbeccaced6f43aa9706b33d8ec56c58be0febb03dadec48add6a378f07f9053f1b6f33fe63a960502ad48232f0bee4a41509d7063d478768ab8ee0a90ebdb7c9bc326d54c8edad7e9d59641faf45c171e35f77f8c38a7563e1555c331a5a3e4da1ce59c0c697ebe071d527f24563165dafd23b45186c3d55251c825d0d7fd16b0f13a2f1321cddbcf231b398a88b19e3915ee544692c3559f42a", 0xb2, 0x6}, {&(0x7f0000000580)="8023d53ac815f8a84b84350b859e8673ed208a78bbfec2e35d6d4927707d5dd61106eb0321af3709c17fe7661323c51575e9c18d7b834c138636224eb1a7d75dd59d5c5d7411bdd4c2b07cf727643f52b1ca3e1680cde001be2f8334303e9f4191c2f9425472ca1ee6bac17fde09f0ce5fdf2e70d3c1a38b2d3e0e804f7df817b6a03e5e1ffea1ca7cd7", 0x8a, 0x8}, {&(0x7f0000000300)="fae83b83fc781c7715", 0x9, 0x8fe}, {&(0x7f0000000640)="96f1e3c89318e48db56867032dd1ba9b0ffeec69eb34236bd93b937c6bb7447840dc021e536b89aad4fe89ca2317f4fe2b36cbbdd8d72d841aee6f7b7be258352406775f169573cbf4da0bcf856f825233c5387a3a7cde778c057d591f2133c10e8b5bdb164577f492130acfc7", 0x6d, 0x5}], 0x802010, &(0x7f0000000740)={[{@order_relaxed}], [{@fsname}, {@fsuuid={'fsuuid', 0x3d, {[0x36, 0x38, 0x61, 0x64, 0x39, 0x38, 0x31, 0x37], 0x2d, [0x62, 0x61, 0x61, 0x63], 0x2d, [0x62, 0x39, 0x33, 0x35], 0x2d, [0x32, 0x37, 0x33, 0x61], 0x2d, [0x61, 0x39, 0x64, 0x65, 0x31, 0x8eb4bab6ccebb2ed, 0x64, 0x62]}}}]})

06:18:49 executing program 1:
r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0)
mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800004, 0x12, r0, 0x0)
preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x9, 0x0)
mmap(&(0x7f0000000000/0xa000)=nil, 0xa000, 0x2, 0x10, 0xffffffffffffffff, 0x0)
socketpair(0x29, 0x80005, 0x0, &(0x7f0000000340)={0x0, 0x0})

06:18:49 executing program 3:
r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0)
mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800004, 0x12, r0, 0x0)
preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x9, 0x0)
mmap(&(0x7f0000000000/0xa000)=nil, 0xa000, 0x0, 0x2172, 0xffffffffffffffff, 0x0)
r1 = openat$khugepaged_scan(0xffffff9c, &(0x7f0000000080), 0x1, 0x0)
close(r1)

06:18:49 executing program 2:
r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0)
mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800004, 0x12, r0, 0x0)
preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x9, 0x0)
mmap(&(0x7f0000000000/0xa000)=nil, 0xa000, 0x2, 0x2172, 0xffffffffffffffff, 0x0)
r1 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x11, 0x3, &(0x7f00000000c0)=@framed, &(0x7f00000001c0)='syzkaller\x00', 0x4, 0x8f, &(0x7f00000002c0)=""/143, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x74)
bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='ext4_es_lookup_extent_exit\x00', r1}, 0x10)
bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x11, 0x3, &(0x7f00000000c0)=@framed, &(0x7f00000001c0)='syzkaller\x00', 0x4, 0x8f, &(0x7f00000002c0)=""/143, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x74)
bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='ext4_es_lookup_extent_exit\x00'}, 0x10)

06:18:49 executing program 1:
r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0)
mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800004, 0x12, r0, 0x0)
preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x9, 0x0)
mmap(&(0x7f0000000000/0xa000)=nil, 0xa000, 0x2, 0x10, 0xffffffffffffffff, 0x0)
socketpair(0x29, 0x80005, 0x0, &(0x7f0000000340)={0x0, 0x0})

[  331.835838][T14551] loop0: detected capacity change from 0 to 8
06:18:49 executing program 3:
r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0)
mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800004, 0x12, r0, 0x0)
preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x9, 0x0)
mmap(&(0x7f0000000000/0xa000)=nil, 0xa000, 0x2, 0x10, 0xffffffffffffffff, 0x0)
r1 = openat$khugepaged_scan(0xffffff9c, &(0x7f0000000080), 0x1, 0x0)
close(r1)

06:18:49 executing program 0:
r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0)
mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800004, 0x10, r0, 0x0)
preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x9, 0x0)
mmap(&(0x7f0000000000/0xa000)=nil, 0xa000, 0x2, 0x2172, 0xffffffffffffffff, 0x0)
syz_mount_image$nilfs2(&(0x7f0000000180), &(0x7f0000000200)='./file0\x00', 0xd85, 0x7, &(0x7f00000006c0)=[{&(0x7f0000000240)="997c7e90471ec6786b6aa37fd8fbf290c011bee5642707bf7b126c36024e5e8f0d3d514aa1538eb70908eb3ac1a8a52e0ba29dab8884c189c9b68415aa0226e7c6a7ccf48ad20543b10360ab7ee9b247e4304d92f0ec7c0ba06d8160095660a0f12836e2033baed6228d464479ce22f2fadce176d0750fdc6ab1004eb9c4440707be1dc31c1ce11815d12f0d50eef6477341b3f6a4f364a1fccd68e2bcd2dba76227338cd6a1835a44", 0xa9, 0x8}, {&(0x7f0000000380)="3a79b76eed8bb53c1f5217cb4d40694fa75675b28af54d40304f697a1d04373a7ef7b09d46fa6365d222516dcc92d004bc937a22980c404bb5b5669f3dfd0e569079c03b2855be3337944aea4b03b03a3eb6d7", 0x53, 0x3}, {&(0x7f0000000400)="c8213af91316be74099fc072cc912017e77b8709c846cf00eb99c7c03cee58e25602e6ec0b4b42c8709e4447b0d23296a71661cdb6ea9b13d35ed3206f67e5559840f063e554ed7fcb842ab9b072197358b7a617cb0825abfabe3da9b022ecbe28ebcc22bd651a40dfcf4782be0c0c6d8adb8fdd7afce8c8659cc9eef1483eceb26a223fa9d591e28633e6bf6facd75e4295341e2ef3788284fc4482db16cab37de0c1adbf7fa07ad161ae875284778f49e15a052d875e", 0xb7, 0x80}, {&(0x7f00000004c0)="056b3e2d287f817e74a518293ea19b1196cccb376ac73cd7bbeccaced6f43aa9706b33d8ec56c58be0febb03dadec48add6a378f07f9053f1b6f33fe63a960502ad48232f0bee4a41509d7063d478768ab8ee0a90ebdb7c9bc326d54c8edad7e9d59641faf45c171e35f77f8c38a7563e1555c331a5a3e4da1ce59c0c697ebe071d527f24563165dafd23b45186c3d55251c825d0d7fd16b0f13a2f1321cddbcf231b398a88b19e3915ee544692c3559f42a", 0xb2, 0x6}, {&(0x7f0000000580)="8023d53ac815f8a84b84350b859e8673ed208a78bbfec2e35d6d4927707d5dd61106eb0321af3709c17fe7661323c51575e9c18d7b834c138636224eb1a7d75dd59d5c5d7411bdd4c2b07cf727643f52b1ca3e1680cde001be2f8334303e9f4191c2f9425472ca1ee6bac17fde09f0ce5fdf2e70d3c1a38b2d3e0e804f7df817b6a03e5e1ffea1ca7cd7", 0x8a, 0x8}, {&(0x7f0000000300)="fae83b83fc781c7715", 0x9, 0x8fe}, {&(0x7f0000000640)="96f1e3c89318e48db56867032dd1ba9b0ffeec69eb34236bd93b937c6bb7447840dc021e536b89aad4fe89ca2317f4fe2b36cbbdd8d72d841aee6f7b7be258352406775f169573cbf4da0bcf856f825233c5387a3a7cde778c057d591f2133c10e8b5bdb164577f492130acfc7", 0x6d, 0x5}], 0x802010, &(0x7f0000000740)={[{@order_relaxed}], [{@fsname}, {@fsuuid={'fsuuid', 0x3d, {[0x36, 0x38, 0x61, 0x64, 0x39, 0x38, 0x31, 0x37], 0x2d, [0x62, 0x61, 0x61, 0x63], 0x2d, [0x62, 0x39, 0x33, 0x35], 0x2d, [0x32, 0x37, 0x33, 0x61], 0x2d, [0x61, 0x39, 0x64, 0x65, 0x31, 0x8eb4bab6ccebb2ed, 0x64, 0x62]}}}]})

06:18:49 executing program 1:
r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0)
mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800004, 0x12, r0, 0x0)
preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x9, 0x0)
mmap(&(0x7f0000000000/0xa000)=nil, 0xa000, 0x2, 0x10, 0xffffffffffffffff, 0x0)
socketpair(0x29, 0x80005, 0x0, &(0x7f0000000340)={0x0, 0x0})

06:18:49 executing program 2:
r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0)
mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800004, 0x12, r0, 0x0)
preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x9, 0x0)
mmap(&(0x7f0000000000/0xa000)=nil, 0xa000, 0x2, 0x10, 0xffffffffffffffff, 0x0)
socketpair(0x29, 0x80005, 0x0, &(0x7f0000000340)={0x0, 0x0})

06:18:49 executing program 3:
r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0)
mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800004, 0x12, r0, 0x0)
preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x9, 0x0)
mmap(&(0x7f0000000000/0xa000)=nil, 0xa000, 0x2, 0x10, 0xffffffffffffffff, 0x0)
r1 = openat$khugepaged_scan(0xffffff9c, &(0x7f0000000080), 0x1, 0x0)
close(r1)

[  332.011124][T14565] loop0: detected capacity change from 0 to 8
06:18:49 executing program 2:
r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0)
mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800004, 0x12, r0, 0x0)
preadv(r0, &(0x7f00000001c0), 0x0, 0x9, 0x0)
mmap(&(0x7f0000000000/0xa000)=nil, 0xa000, 0x2, 0x2172, 0xffffffffffffffff, 0x0)
r1 = openat$khugepaged_scan(0xffffff9c, &(0x7f0000000080), 0x1, 0x0)
close(r1)

06:18:49 executing program 1:
r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0)
mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800004, 0x12, r0, 0x0)
preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x9, 0x0)
mmap(&(0x7f0000000000/0xa000)=nil, 0xa000, 0x2, 0x2172, 0xffffffffffffffff, 0x0)
socketpair(0x0, 0x80005, 0x0, &(0x7f0000000340)={0x0, 0x0})

06:18:49 executing program 0:
r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0)
mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800004, 0x12, 0xffffffffffffffff, 0x0)
preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x9, 0x0)
mmap(&(0x7f0000000000/0xa000)=nil, 0xa000, 0x2, 0x2172, 0xffffffffffffffff, 0x0)
syz_mount_image$nilfs2(&(0x7f0000000180), &(0x7f0000000200)='./file0\x00', 0xd85, 0x7, &(0x7f00000006c0)=[{&(0x7f0000000240)="997c7e90471ec6786b6aa37fd8fbf290c011bee5642707bf7b126c36024e5e8f0d3d514aa1538eb70908eb3ac1a8a52e0ba29dab8884c189c9b68415aa0226e7c6a7ccf48ad20543b10360ab7ee9b247e4304d92f0ec7c0ba06d8160095660a0f12836e2033baed6228d464479ce22f2fadce176d0750fdc6ab1004eb9c4440707be1dc31c1ce11815d12f0d50eef6477341b3f6a4f364a1fccd68e2bcd2dba76227338cd6a1835a44", 0xa9, 0x8}, {&(0x7f0000000380)="3a79b76eed8bb53c1f5217cb4d40694fa75675b28af54d40304f697a1d04373a7ef7b09d46fa6365d222516dcc92d004bc937a22980c404bb5b5669f3dfd0e569079c03b2855be3337944aea4b03b03a3eb6d7", 0x53, 0x3}, {&(0x7f0000000400)="c8213af91316be74099fc072cc912017e77b8709c846cf00eb99c7c03cee58e25602e6ec0b4b42c8709e4447b0d23296a71661cdb6ea9b13d35ed3206f67e5559840f063e554ed7fcb842ab9b072197358b7a617cb0825abfabe3da9b022ecbe28ebcc22bd651a40dfcf4782be0c0c6d8adb8fdd7afce8c8659cc9eef1483eceb26a223fa9d591e28633e6bf6facd75e4295341e2ef3788284fc4482db16cab37de0c1adbf7fa07ad161ae875284778f49e15a052d875e", 0xb7, 0x80}, {&(0x7f00000004c0)="056b3e2d287f817e74a518293ea19b1196cccb376ac73cd7bbeccaced6f43aa9706b33d8ec56c58be0febb03dadec48add6a378f07f9053f1b6f33fe63a960502ad48232f0bee4a41509d7063d478768ab8ee0a90ebdb7c9bc326d54c8edad7e9d59641faf45c171e35f77f8c38a7563e1555c331a5a3e4da1ce59c0c697ebe071d527f24563165dafd23b45186c3d55251c825d0d7fd16b0f13a2f1321cddbcf231b398a88b19e3915ee544692c3559f42a", 0xb2, 0x6}, {&(0x7f0000000580)="8023d53ac815f8a84b84350b859e8673ed208a78bbfec2e35d6d4927707d5dd61106eb0321af3709c17fe7661323c51575e9c18d7b834c138636224eb1a7d75dd59d5c5d7411bdd4c2b07cf727643f52b1ca3e1680cde001be2f8334303e9f4191c2f9425472ca1ee6bac17fde09f0ce5fdf2e70d3c1a38b2d3e0e804f7df817b6a03e5e1ffea1ca7cd7", 0x8a, 0x8}, {&(0x7f0000000300)="fae83b83fc781c7715", 0x9, 0x8fe}, {&(0x7f0000000640)="96f1e3c89318e48db56867032dd1ba9b0ffeec69eb34236bd93b937c6bb7447840dc021e536b89aad4fe89ca2317f4fe2b36cbbdd8d72d841aee6f7b7be258352406775f169573cbf4da0bcf856f825233c5387a3a7cde778c057d591f2133c10e8b5bdb164577f492130acfc7", 0x6d, 0x5}], 0x802010, &(0x7f0000000740)={[{@order_relaxed}], [{@fsname}, {@fsuuid={'fsuuid', 0x3d, {[0x36, 0x38, 0x61, 0x64, 0x39, 0x38, 0x31, 0x37], 0x2d, [0x62, 0x61, 0x61, 0x63], 0x2d, [0x62, 0x39, 0x33, 0x35], 0x2d, [0x32, 0x37, 0x33, 0x61], 0x2d, [0x61, 0x39, 0x64, 0x65, 0x31, 0x8eb4bab6ccebb2ed, 0x64, 0x62]}}}]})

06:18:49 executing program 3:
r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0)
mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800004, 0x12, r0, 0x0)
preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x9, 0x0)
mmap(&(0x7f0000000000/0xa000)=nil, 0xa000, 0x2, 0x10, 0xffffffffffffffff, 0x0)
r1 = openat$khugepaged_scan(0xffffff9c, &(0x7f0000000080), 0x1, 0x0)
close(r1)

[  332.143896][T14578] loop0: detected capacity change from 0 to 8
06:18:49 executing program 2:
r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0)
mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800004, 0x12, 0xffffffffffffffff, 0x0)
preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x9, 0x0)
mmap(&(0x7f0000000000/0xa000)=nil, 0xa000, 0x2, 0x2172, 0xffffffffffffffff, 0x0)
r1 = openat$khugepaged_scan(0xffffff9c, &(0x7f0000000080), 0x1, 0x0)
close(r1)

06:18:49 executing program 1:
r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0)
mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800004, 0x12, r0, 0x0)
preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x9, 0x0)
mmap(&(0x7f0000000000/0xa000)=nil, 0xa000, 0x2, 0x2172, 0xffffffffffffffff, 0x0)
socketpair(0x0, 0x80005, 0x0, &(0x7f0000000340)={0x0, 0x0})

06:18:49 executing program 3:
r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0)
mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800004, 0x12, r0, 0x0)
preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x9, 0x0)
mmap(&(0x7f0000000000/0xa000)=nil, 0xa000, 0x2, 0x2172, 0xffffffffffffffff, 0x0)
r1 = openat$khugepaged_scan(0xffffff9c, 0x0, 0x1, 0x0)
close(r1)

06:18:49 executing program 2:
r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0)
mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800004, 0x12, 0xffffffffffffffff, 0x0)
preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x9, 0x0)
mmap(&(0x7f0000000000/0xa000)=nil, 0xa000, 0x2, 0x2172, 0xffffffffffffffff, 0x0)
r1 = openat$khugepaged_scan(0xffffff9c, &(0x7f0000000080), 0x1, 0x0)
close(r1)

06:18:49 executing program 3:
r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0)
mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800004, 0x12, r0, 0x0)
preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x9, 0x0)
mmap(&(0x7f0000000000/0xa000)=nil, 0xa000, 0x2, 0x2172, 0xffffffffffffffff, 0x0)
r1 = openat$khugepaged_scan(0xffffff9c, 0x0, 0x1, 0x0)
close(r1)

06:18:49 executing program 0:
r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0)
mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800004, 0x12, 0xffffffffffffffff, 0x0)
preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x9, 0x0)
mmap(&(0x7f0000000000/0xa000)=nil, 0xa000, 0x2, 0x2172, 0xffffffffffffffff, 0x0)
syz_mount_image$nilfs2(&(0x7f0000000180), &(0x7f0000000200)='./file0\x00', 0xd85, 0x7, &(0x7f00000006c0)=[{&(0x7f0000000240)="997c7e90471ec6786b6aa37fd8fbf290c011bee5642707bf7b126c36024e5e8f0d3d514aa1538eb70908eb3ac1a8a52e0ba29dab8884c189c9b68415aa0226e7c6a7ccf48ad20543b10360ab7ee9b247e4304d92f0ec7c0ba06d8160095660a0f12836e2033baed6228d464479ce22f2fadce176d0750fdc6ab1004eb9c4440707be1dc31c1ce11815d12f0d50eef6477341b3f6a4f364a1fccd68e2bcd2dba76227338cd6a1835a44", 0xa9, 0x8}, {&(0x7f0000000380)="3a79b76eed8bb53c1f5217cb4d40694fa75675b28af54d40304f697a1d04373a7ef7b09d46fa6365d222516dcc92d004bc937a22980c404bb5b5669f3dfd0e569079c03b2855be3337944aea4b03b03a3eb6d7", 0x53, 0x3}, {&(0x7f0000000400)="c8213af91316be74099fc072cc912017e77b8709c846cf00eb99c7c03cee58e25602e6ec0b4b42c8709e4447b0d23296a71661cdb6ea9b13d35ed3206f67e5559840f063e554ed7fcb842ab9b072197358b7a617cb0825abfabe3da9b022ecbe28ebcc22bd651a40dfcf4782be0c0c6d8adb8fdd7afce8c8659cc9eef1483eceb26a223fa9d591e28633e6bf6facd75e4295341e2ef3788284fc4482db16cab37de0c1adbf7fa07ad161ae875284778f49e15a052d875e", 0xb7, 0x80}, {&(0x7f00000004c0)="056b3e2d287f817e74a518293ea19b1196cccb376ac73cd7bbeccaced6f43aa9706b33d8ec56c58be0febb03dadec48add6a378f07f9053f1b6f33fe63a960502ad48232f0bee4a41509d7063d478768ab8ee0a90ebdb7c9bc326d54c8edad7e9d59641faf45c171e35f77f8c38a7563e1555c331a5a3e4da1ce59c0c697ebe071d527f24563165dafd23b45186c3d55251c825d0d7fd16b0f13a2f1321cddbcf231b398a88b19e3915ee544692c3559f42a", 0xb2, 0x6}, {&(0x7f0000000580)="8023d53ac815f8a84b84350b859e8673ed208a78bbfec2e35d6d4927707d5dd61106eb0321af3709c17fe7661323c51575e9c18d7b834c138636224eb1a7d75dd59d5c5d7411bdd4c2b07cf727643f52b1ca3e1680cde001be2f8334303e9f4191c2f9425472ca1ee6bac17fde09f0ce5fdf2e70d3c1a38b2d3e0e804f7df817b6a03e5e1ffea1ca7cd7", 0x8a, 0x8}, {&(0x7f0000000300)="fae83b83fc781c7715", 0x9, 0x8fe}, {&(0x7f0000000640)="96f1e3c89318e48db56867032dd1ba9b0ffeec69eb34236bd93b937c6bb7447840dc021e536b89aad4fe89ca2317f4fe2b36cbbdd8d72d841aee6f7b7be258352406775f169573cbf4da0bcf856f825233c5387a3a7cde778c057d591f2133c10e8b5bdb164577f492130acfc7", 0x6d, 0x5}], 0x802010, &(0x7f0000000740)={[{@order_relaxed}], [{@fsname}, {@fsuuid={'fsuuid', 0x3d, {[0x36, 0x38, 0x61, 0x64, 0x39, 0x38, 0x31, 0x37], 0x2d, [0x62, 0x61, 0x61, 0x63], 0x2d, [0x62, 0x39, 0x33, 0x35], 0x2d, [0x32, 0x37, 0x33, 0x61], 0x2d, [0x61, 0x39, 0x64, 0x65, 0x31, 0x8eb4bab6ccebb2ed, 0x64, 0x62]}}}]})

06:18:49 executing program 1:
r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0)
mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800004, 0x12, r0, 0x0)
preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x9, 0x0)
mmap(&(0x7f0000000000/0xa000)=nil, 0xa000, 0x2, 0x2172, 0xffffffffffffffff, 0x0)
socketpair(0x0, 0x80005, 0x0, &(0x7f0000000340)={0x0, 0x0})

[  332.336930][T14598] loop0: detected capacity change from 0 to 8
06:18:49 executing program 3:
r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0)
mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800004, 0x12, r0, 0x0)
preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x9, 0x0)
mmap(&(0x7f0000000000/0xa000)=nil, 0xa000, 0x2, 0x2172, 0xffffffffffffffff, 0x0)
r1 = openat$khugepaged_scan(0xffffff9c, 0x0, 0x1, 0x0)
close(r1)

06:18:49 executing program 2:
mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800004, 0x12, 0xffffffffffffffff, 0x0)
preadv(0xffffffffffffffff, &(0x7f00000001c0)=[{0x0}], 0x1, 0x9, 0x0)
mmap(&(0x7f0000000000/0xa000)=nil, 0xa000, 0x2, 0x2172, 0xffffffffffffffff, 0x0)
syz_mount_image$nilfs2(&(0x7f0000000180), &(0x7f0000000200)='./file0\x00', 0xd85, 0x7, &(0x7f00000006c0)=[{&(0x7f0000000240)="997c7e90471ec6786b6aa37fd8fbf290c011bee5642707bf7b126c36024e5e8f0d3d514aa1538eb70908eb3ac1a8a52e0ba29dab8884c189c9b68415aa0226e7c6a7ccf48ad20543b10360ab7ee9b247e4304d92f0ec7c0ba06d8160095660a0f12836e2033baed6228d464479ce22f2fadce176d0750fdc6ab1004eb9c4440707be1dc31c1ce11815d12f0d50eef6477341b3f6a4f364a1fccd68e2bcd2dba76227338cd6a1835a44", 0xa9, 0x8}, {&(0x7f0000000380)="3a79b76eed8bb53c1f5217cb4d40694fa75675b28af54d40304f697a1d04373a7ef7b09d46fa6365d222516dcc92d004bc937a22980c404bb5b5669f3dfd0e569079c03b2855be3337944aea4b03b03a3eb6d7", 0x53, 0x3}, {&(0x7f0000000400)="c8213af91316be74099fc072cc912017e77b8709c846cf00eb99c7c03cee58e25602e6ec0b4b42c8709e4447b0d23296a71661cdb6ea9b13d35ed3206f67e5559840f063e554ed7fcb842ab9b072197358b7a617cb0825abfabe3da9b022ecbe28ebcc22bd651a40dfcf4782be0c0c6d8adb8fdd7afce8c8659cc9eef1483eceb26a223fa9d591e28633e6bf6facd75e4295341e2ef3788284fc4482db16cab37de0c1adbf7fa07ad161ae875284778f49e15a052d875e", 0xb7, 0x80}, {&(0x7f00000004c0)="056b3e2d287f817e74a518293ea19b1196cccb376ac73cd7bbeccaced6f43aa9706b33d8ec56c58be0febb03dadec48add6a378f07f9053f1b6f33fe63a960502ad48232f0bee4a41509d7063d478768ab8ee0a90ebdb7c9bc326d54c8edad7e9d59641faf45c171e35f77f8c38a7563e1555c331a5a3e4da1ce59c0c697ebe071d527f24563165dafd23b45186c3d55251c825d0d7fd16b0f13a2f1321cddbcf231b398a88b19e3915ee544692c3559f42a", 0xb2, 0x6}, {&(0x7f0000000580)="8023d53ac815f8a84b84350b859e8673ed208a78bbfec2e35d6d4927707d5dd61106eb0321af3709c17fe7661323c51575e9c18d7b834c138636224eb1a7d75dd59d5c5d7411bdd4c2b07cf727643f52b1ca3e1680cde001be2f8334303e9f4191c2f9425472ca1ee6bac17fde09f0ce5fdf2e70d3c1a38b2d3e0e804f7df817b6a03e5e1ffea1ca7cd7", 0x8a, 0x8}, {&(0x7f0000000300)="fae83b83fc781c7715", 0x9, 0x8fe}, {&(0x7f0000000640)="96f1e3c89318e48db56867032dd1ba9b0ffeec69eb34236bd93b937c6bb7447840dc021e536b89aad4fe89ca2317f4fe2b36cbbdd8d72d841aee6f7b7be258352406775f169573cbf4da0bcf856f825233c5387a3a7cde778c057d591f2133c10e8b5bdb164577f492130acfc7", 0x6d, 0x5}], 0x802010, &(0x7f0000000740)={[{@order_relaxed}], [{@fsname}, {@fsuuid={'fsuuid', 0x3d, {[0x36, 0x38, 0x61, 0x64, 0x39, 0x38, 0x31, 0x37], 0x2d, [0x62, 0x61, 0x61, 0x63], 0x2d, [0x62, 0x39, 0x33, 0x35], 0x2d, [0x32, 0x37, 0x33, 0x61], 0x2d, [0x61, 0x39, 0x64, 0x65, 0x31, 0x8eb4bab6ccebb2ed, 0x64, 0x62]}}}]})

06:18:50 executing program 0:
r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0)
mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800004, 0x12, 0xffffffffffffffff, 0x0)
preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x9, 0x0)
mmap(&(0x7f0000000000/0xa000)=nil, 0xa000, 0x2, 0x2172, 0xffffffffffffffff, 0x0)
syz_mount_image$nilfs2(&(0x7f0000000180), &(0x7f0000000200)='./file0\x00', 0xd85, 0x7, &(0x7f00000006c0)=[{&(0x7f0000000240)="997c7e90471ec6786b6aa37fd8fbf290c011bee5642707bf7b126c36024e5e8f0d3d514aa1538eb70908eb3ac1a8a52e0ba29dab8884c189c9b68415aa0226e7c6a7ccf48ad20543b10360ab7ee9b247e4304d92f0ec7c0ba06d8160095660a0f12836e2033baed6228d464479ce22f2fadce176d0750fdc6ab1004eb9c4440707be1dc31c1ce11815d12f0d50eef6477341b3f6a4f364a1fccd68e2bcd2dba76227338cd6a1835a44", 0xa9, 0x8}, {&(0x7f0000000380)="3a79b76eed8bb53c1f5217cb4d40694fa75675b28af54d40304f697a1d04373a7ef7b09d46fa6365d222516dcc92d004bc937a22980c404bb5b5669f3dfd0e569079c03b2855be3337944aea4b03b03a3eb6d7", 0x53, 0x3}, {&(0x7f0000000400)="c8213af91316be74099fc072cc912017e77b8709c846cf00eb99c7c03cee58e25602e6ec0b4b42c8709e4447b0d23296a71661cdb6ea9b13d35ed3206f67e5559840f063e554ed7fcb842ab9b072197358b7a617cb0825abfabe3da9b022ecbe28ebcc22bd651a40dfcf4782be0c0c6d8adb8fdd7afce8c8659cc9eef1483eceb26a223fa9d591e28633e6bf6facd75e4295341e2ef3788284fc4482db16cab37de0c1adbf7fa07ad161ae875284778f49e15a052d875e", 0xb7, 0x80}, {&(0x7f00000004c0)="056b3e2d287f817e74a518293ea19b1196cccb376ac73cd7bbeccaced6f43aa9706b33d8ec56c58be0febb03dadec48add6a378f07f9053f1b6f33fe63a960502ad48232f0bee4a41509d7063d478768ab8ee0a90ebdb7c9bc326d54c8edad7e9d59641faf45c171e35f77f8c38a7563e1555c331a5a3e4da1ce59c0c697ebe071d527f24563165dafd23b45186c3d55251c825d0d7fd16b0f13a2f1321cddbcf231b398a88b19e3915ee544692c3559f42a", 0xb2, 0x6}, {&(0x7f0000000580)="8023d53ac815f8a84b84350b859e8673ed208a78bbfec2e35d6d4927707d5dd61106eb0321af3709c17fe7661323c51575e9c18d7b834c138636224eb1a7d75dd59d5c5d7411bdd4c2b07cf727643f52b1ca3e1680cde001be2f8334303e9f4191c2f9425472ca1ee6bac17fde09f0ce5fdf2e70d3c1a38b2d3e0e804f7df817b6a03e5e1ffea1ca7cd7", 0x8a, 0x8}, {&(0x7f0000000300)="fae83b83fc781c7715", 0x9, 0x8fe}, {&(0x7f0000000640)="96f1e3c89318e48db56867032dd1ba9b0ffeec69eb34236bd93b937c6bb7447840dc021e536b89aad4fe89ca2317f4fe2b36cbbdd8d72d841aee6f7b7be258352406775f169573cbf4da0bcf856f825233c5387a3a7cde778c057d591f2133c10e8b5bdb164577f492130acfc7", 0x6d, 0x5}], 0x802010, &(0x7f0000000740)={[{@order_relaxed}], [{@fsname}, {@fsuuid={'fsuuid', 0x3d, {[0x36, 0x38, 0x61, 0x64, 0x39, 0x38, 0x31, 0x37], 0x2d, [0x62, 0x61, 0x61, 0x63], 0x2d, [0x62, 0x39, 0x33, 0x35], 0x2d, [0x32, 0x37, 0x33, 0x61], 0x2d, [0x61, 0x39, 0x64, 0x65, 0x31, 0x8eb4bab6ccebb2ed, 0x64, 0x62]}}}]})

[  332.421705][T14609] loop2: detected capacity change from 0 to 8
06:18:50 executing program 1:
r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0)
mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800004, 0x12, r0, 0x0)
preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x9, 0x0)
mmap(&(0x7f0000000000/0xa000)=nil, 0xa000, 0x2, 0x2172, 0xffffffffffffffff, 0x0)
socketpair(0x29, 0x0, 0x0, &(0x7f0000000340)={0x0, 0x0})

06:18:50 executing program 3:
r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0)
mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800004, 0x12, r0, 0x0)
preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x9, 0x0)
mmap(&(0x7f0000000000/0xa000)=nil, 0xa000, 0x2, 0x2172, 0xffffffffffffffff, 0x0)
openat$khugepaged_scan(0xffffff9c, &(0x7f0000000080), 0x1, 0x0)
close(0xffffffffffffffff)

[  332.474220][T14613] loop0: detected capacity change from 0 to 8
06:18:50 executing program 1:
r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0)
mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800004, 0x12, r0, 0x0)
preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x9, 0x0)
mmap(&(0x7f0000000000/0xa000)=nil, 0xa000, 0x2, 0x2172, 0xffffffffffffffff, 0x0)
socketpair(0x29, 0x0, 0x0, &(0x7f0000000340)={0x0, 0x0})

06:18:50 executing program 3:
r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0)
mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800004, 0x12, r0, 0x0)
preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x9, 0x0)
mmap(&(0x7f0000000000/0xa000)=nil, 0xa000, 0x2, 0x2172, 0xffffffffffffffff, 0x0)
openat$khugepaged_scan(0xffffff9c, &(0x7f0000000080), 0x1, 0x0)
close(0xffffffffffffffff)

06:18:50 executing program 2:
r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0)
mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800004, 0x10, r0, 0x0)
preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x9, 0x0)
mmap(&(0x7f0000000000/0xa000)=nil, 0xa000, 0x2, 0x2172, 0xffffffffffffffff, 0x0)
r1 = openat$khugepaged_scan(0xffffff9c, &(0x7f0000000080), 0x1, 0x0)
close(r1)

06:18:50 executing program 1:
r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0)
mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800004, 0x12, r0, 0x0)
preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x9, 0x0)
mmap(&(0x7f0000000000/0xa000)=nil, 0xa000, 0x2, 0x2172, 0xffffffffffffffff, 0x0)
socketpair(0x29, 0x0, 0x0, &(0x7f0000000340)={0x0, 0x0})

06:18:50 executing program 0:
r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0)
mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800004, 0x12, r0, 0x0)
preadv(0xffffffffffffffff, &(0x7f00000001c0)=[{0x0}], 0x1, 0x9, 0x0)
mmap(&(0x7f0000000000/0xa000)=nil, 0xa000, 0x2, 0x2172, 0xffffffffffffffff, 0x0)
syz_mount_image$nilfs2(&(0x7f0000000180), &(0x7f0000000200)='./file0\x00', 0xd85, 0x7, &(0x7f00000006c0)=[{&(0x7f0000000240)="997c7e90471ec6786b6aa37fd8fbf290c011bee5642707bf7b126c36024e5e8f0d3d514aa1538eb70908eb3ac1a8a52e0ba29dab8884c189c9b68415aa0226e7c6a7ccf48ad20543b10360ab7ee9b247e4304d92f0ec7c0ba06d8160095660a0f12836e2033baed6228d464479ce22f2fadce176d0750fdc6ab1004eb9c4440707be1dc31c1ce11815d12f0d50eef6477341b3f6a4f364a1fccd68e2bcd2dba76227338cd6a1835a44", 0xa9, 0x8}, {&(0x7f0000000380)="3a79b76eed8bb53c1f5217cb4d40694fa75675b28af54d40304f697a1d04373a7ef7b09d46fa6365d222516dcc92d004bc937a22980c404bb5b5669f3dfd0e569079c03b2855be3337944aea4b03b03a3eb6d7", 0x53, 0x3}, {&(0x7f0000000400)="c8213af91316be74099fc072cc912017e77b8709c846cf00eb99c7c03cee58e25602e6ec0b4b42c8709e4447b0d23296a71661cdb6ea9b13d35ed3206f67e5559840f063e554ed7fcb842ab9b072197358b7a617cb0825abfabe3da9b022ecbe28ebcc22bd651a40dfcf4782be0c0c6d8adb8fdd7afce8c8659cc9eef1483eceb26a223fa9d591e28633e6bf6facd75e4295341e2ef3788284fc4482db16cab37de0c1adbf7fa07ad161ae875284778f49e15a052d875e", 0xb7, 0x80}, {&(0x7f00000004c0)="056b3e2d287f817e74a518293ea19b1196cccb376ac73cd7bbeccaced6f43aa9706b33d8ec56c58be0febb03dadec48add6a378f07f9053f1b6f33fe63a960502ad48232f0bee4a41509d7063d478768ab8ee0a90ebdb7c9bc326d54c8edad7e9d59641faf45c171e35f77f8c38a7563e1555c331a5a3e4da1ce59c0c697ebe071d527f24563165dafd23b45186c3d55251c825d0d7fd16b0f13a2f1321cddbcf231b398a88b19e3915ee544692c3559f42a", 0xb2, 0x6}, {&(0x7f0000000580)="8023d53ac815f8a84b84350b859e8673ed208a78bbfec2e35d6d4927707d5dd61106eb0321af3709c17fe7661323c51575e9c18d7b834c138636224eb1a7d75dd59d5c5d7411bdd4c2b07cf727643f52b1ca3e1680cde001be2f8334303e9f4191c2f9425472ca1ee6bac17fde09f0ce5fdf2e70d3c1a38b2d3e0e804f7df817b6a03e5e1ffea1ca7cd7", 0x8a, 0x8}, {&(0x7f0000000300)="fae83b83fc781c7715", 0x9, 0x8fe}, {&(0x7f0000000640)="96f1e3c89318e48db56867032dd1ba9b0ffeec69eb34236bd93b937c6bb7447840dc021e536b89aad4fe89ca2317f4fe2b36cbbdd8d72d841aee6f7b7be258352406775f169573cbf4da0bcf856f825233c5387a3a7cde778c057d591f2133c10e8b5bdb164577f492130acfc7", 0x6d, 0x5}], 0x802010, &(0x7f0000000740)={[{@order_relaxed}], [{@fsname}, {@fsuuid={'fsuuid', 0x3d, {[0x36, 0x38, 0x61, 0x64, 0x39, 0x38, 0x31, 0x37], 0x2d, [0x62, 0x61, 0x61, 0x63], 0x2d, [0x62, 0x39, 0x33, 0x35], 0x2d, [0x32, 0x37, 0x33, 0x61], 0x2d, [0x61, 0x39, 0x64, 0x65, 0x31, 0x8eb4bab6ccebb2ed, 0x64, 0x62]}}}]})

06:18:50 executing program 3:
r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0)
mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800004, 0x12, r0, 0x0)
preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x9, 0x0)
mmap(&(0x7f0000000000/0xa000)=nil, 0xa000, 0x2, 0x2172, 0xffffffffffffffff, 0x0)
openat$khugepaged_scan(0xffffff9c, &(0x7f0000000080), 0x1, 0x0)
close(0xffffffffffffffff)

[  332.596518][T14632] loop0: detected capacity change from 0 to 8
06:18:50 executing program 2:
r0 = openat(0xffffffffffffffff, 0x0, 0x0, 0x0)
mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800004, 0x12, r0, 0x0)
preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x9, 0x0)
mmap(&(0x7f0000000000/0xa000)=nil, 0xa000, 0x2, 0x2172, 0xffffffffffffffff, 0x0)
socketpair(0x29, 0x80005, 0x0, &(0x7f0000000340)={0x0, 0x0})

06:18:50 executing program 1:
r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0)
mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800004, 0x12, r0, 0x0)
preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x9, 0x0)
mmap(&(0x7f0000000000/0xa000)=nil, 0xa000, 0x2, 0x2172, 0xffffffffffffffff, 0x0)
socketpair(0x29, 0x80005, 0x0, 0x0)

06:18:50 executing program 3:
r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0)
preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x9, 0x0)
mmap(&(0x7f0000000000/0xa000)=nil, 0xa000, 0x2, 0x2172, 0xffffffffffffffff, 0x0)
r1 = openat$khugepaged_scan(0xffffff9c, &(0x7f0000000080), 0x1, 0x0)
close(r1)

06:18:50 executing program 2:
r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0)
mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800004, 0x12, r0, 0x0)
preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x9, 0x0)
r1 = openat$khugepaged_scan(0xffffff9c, &(0x7f0000000080), 0x1, 0x0)
close(r1)

06:18:50 executing program 1:
r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0)
mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800004, 0x12, r0, 0x0)
preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x9, 0x0)
mmap(&(0x7f0000000000/0xa000)=nil, 0xa000, 0x2, 0x2172, 0xffffffffffffffff, 0x0)
socketpair(0x29, 0x80005, 0x0, 0x0)

06:18:50 executing program 0:
r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0)
mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800004, 0x12, r0, 0x0)
preadv(0xffffffffffffffff, &(0x7f00000001c0)=[{0x0}], 0x1, 0x9, 0x0)
mmap(&(0x7f0000000000/0xa000)=nil, 0xa000, 0x2, 0x2172, 0xffffffffffffffff, 0x0)
syz_mount_image$nilfs2(&(0x7f0000000180), &(0x7f0000000200)='./file0\x00', 0xd85, 0x7, &(0x7f00000006c0)=[{&(0x7f0000000240)="997c7e90471ec6786b6aa37fd8fbf290c011bee5642707bf7b126c36024e5e8f0d3d514aa1538eb70908eb3ac1a8a52e0ba29dab8884c189c9b68415aa0226e7c6a7ccf48ad20543b10360ab7ee9b247e4304d92f0ec7c0ba06d8160095660a0f12836e2033baed6228d464479ce22f2fadce176d0750fdc6ab1004eb9c4440707be1dc31c1ce11815d12f0d50eef6477341b3f6a4f364a1fccd68e2bcd2dba76227338cd6a1835a44", 0xa9, 0x8}, {&(0x7f0000000380)="3a79b76eed8bb53c1f5217cb4d40694fa75675b28af54d40304f697a1d04373a7ef7b09d46fa6365d222516dcc92d004bc937a22980c404bb5b5669f3dfd0e569079c03b2855be3337944aea4b03b03a3eb6d7", 0x53, 0x3}, {&(0x7f0000000400)="c8213af91316be74099fc072cc912017e77b8709c846cf00eb99c7c03cee58e25602e6ec0b4b42c8709e4447b0d23296a71661cdb6ea9b13d35ed3206f67e5559840f063e554ed7fcb842ab9b072197358b7a617cb0825abfabe3da9b022ecbe28ebcc22bd651a40dfcf4782be0c0c6d8adb8fdd7afce8c8659cc9eef1483eceb26a223fa9d591e28633e6bf6facd75e4295341e2ef3788284fc4482db16cab37de0c1adbf7fa07ad161ae875284778f49e15a052d875e", 0xb7, 0x80}, {&(0x7f00000004c0)="056b3e2d287f817e74a518293ea19b1196cccb376ac73cd7bbeccaced6f43aa9706b33d8ec56c58be0febb03dadec48add6a378f07f9053f1b6f33fe63a960502ad48232f0bee4a41509d7063d478768ab8ee0a90ebdb7c9bc326d54c8edad7e9d59641faf45c171e35f77f8c38a7563e1555c331a5a3e4da1ce59c0c697ebe071d527f24563165dafd23b45186c3d55251c825d0d7fd16b0f13a2f1321cddbcf231b398a88b19e3915ee544692c3559f42a", 0xb2, 0x6}, {&(0x7f0000000580)="8023d53ac815f8a84b84350b859e8673ed208a78bbfec2e35d6d4927707d5dd61106eb0321af3709c17fe7661323c51575e9c18d7b834c138636224eb1a7d75dd59d5c5d7411bdd4c2b07cf727643f52b1ca3e1680cde001be2f8334303e9f4191c2f9425472ca1ee6bac17fde09f0ce5fdf2e70d3c1a38b2d3e0e804f7df817b6a03e5e1ffea1ca7cd7", 0x8a, 0x8}, {&(0x7f0000000300)="fae83b83fc781c7715", 0x9, 0x8fe}, {&(0x7f0000000640)="96f1e3c89318e48db56867032dd1ba9b0ffeec69eb34236bd93b937c6bb7447840dc021e536b89aad4fe89ca2317f4fe2b36cbbdd8d72d841aee6f7b7be258352406775f169573cbf4da0bcf856f825233c5387a3a7cde778c057d591f2133c10e8b5bdb164577f492130acfc7", 0x6d, 0x5}], 0x802010, &(0x7f0000000740)={[{@order_relaxed}], [{@fsname}, {@fsuuid={'fsuuid', 0x3d, {[0x36, 0x38, 0x61, 0x64, 0x39, 0x38, 0x31, 0x37], 0x2d, [0x62, 0x61, 0x61, 0x63], 0x2d, [0x62, 0x39, 0x33, 0x35], 0x2d, [0x32, 0x37, 0x33, 0x61], 0x2d, [0x61, 0x39, 0x64, 0x65, 0x31, 0x8eb4bab6ccebb2ed, 0x64, 0x62]}}}]})

06:18:50 executing program 2:
r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0)
mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800004, 0x12, r0, 0x0)
preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x9, 0x0)
r1 = socket$unix(0x1, 0x1, 0x0)
bind$unix(r1, &(0x7f00000001c0)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x56)
mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x100000a, 0x13, r1, 0x285ad000)
r2 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x11, 0x4, &(0x7f00000000c0)=ANY=[@ANYBLOB="18000000000000000000000000000000850000007b0000009500000000000000"], &(0x7f00000001c0)='syzkaller\x00', 0x4, 0x8f, &(0x7f00000002c0)=""/143, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78)
bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='ext4_es_lookup_extent_exit\x00', r2}, 0x10)
write$binfmt_elf32(r2, &(0x7f0000000380)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x2, 0x7, 0x1f, 0x6, 0x2, 0x3e, 0x70cc, 0x277, 0x34, 0x238, 0x3, 0x0, 0x20, 0x1, 0x4, 0x5, 0x3}, [{0x6474e551, 0x40, 0x2, 0x40000000, 0x1, 0x80, 0x1, 0xffffffff}, {0x6474e551, 0x8, 0x68, 0x80000000, 0x1, 0xffffffc0, 0x5, 0x3}], "cddb2636616f9eedd3ce3c19a74d64f8494bea4c266ec1b74ba94ea1db55171a67253dcdb1b481cbddefc51afc5d4a3b4bd6ac5cff43552908ce38a9d109838616661728584955ac29706dea357d03b160d088c8a1b9c8c32b5174fc52891f4dba0cfc1580d661a2c3bba7fa88a03b787b023710c6255c4cf55d599c23d6c7985832d8e9aa0628ac3b2e0338", ['\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00']}, 0x900)
mmap(&(0x7f0000000000/0xa000)=nil, 0xa000, 0x2, 0x2172, 0xffffffffffffffff, 0x0)
socketpair(0x29, 0x80005, 0x0, &(0x7f0000000340)={0x0, 0x0})

06:18:50 executing program 3:
r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0)
mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800004, 0x12, r0, 0x0)
preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x9, 0x0)
mmap(&(0x7f0000000000/0xa000)=nil, 0xa000, 0x2, 0x2172, 0xffffffffffffffff, 0x0)
socketpair(0x1e, 0x80005, 0x0, &(0x7f0000000340)={<r1=>0x0, <r2=>0x0})
close(r1)
r3 = syz_init_net_socket$netrom(0x6, 0x5, 0x0)
ioctl$FS_IOC_SETVERSION(r3, 0x40047602, &(0x7f0000000040)=0xfffd)
syz_mount_image$nilfs2(&(0x7f0000000180), &(0x7f0000000200)='./file0\x00', 0xd85, 0x7, &(0x7f00000006c0)=[{&(0x7f0000000240)="997c7e90471ec6786b6aa37fd8fbf290c011bee5642707bf7b126c36024e5e8f0d3d514aa1538eb70908eb3ac1a8a52e0ba29dab8884c189c9b68415aa0226e7c6a7ccf48ad20543b10360ab7ee9b247e4304d92f0ec7c0ba06d8160095660a0f12836e2033baed6228d464479ce22f2fadce176d0750fdc6ab1004eb9c4440707be1dc31c1ce11815d12f0d50eef6477341b3f6a4f364a1fccd68e2bcd2dba76227338cd6a1835a44", 0xa9, 0x8}, {&(0x7f0000000380)="3a79b76eed8bb53c1f5217cb4d40694fa75675b28af54d40304f697a1d04373a7ef7b09d46fa6365d222516dcc92d004bc937a22980c404bb5b5669f3dfd0e569079c03b2855be3337944aea4b03b03a3eb6d7", 0x53, 0x3}, {&(0x7f0000000400)="c8213af91316be74099fc072cc912017e77b8709c846cf00eb99c7c03cee58e25602e6ec0b4b42c8709e4447b0d23296a71661cdb6ea9b13d35ed3206f67e5559840f063e554ed7fcb842ab9b072197358b7a617cb0825abfabe3da9b022ecbe28ebcc22bd651a40dfcf4782be0c0c6d8adb8fdd7afce8c8659cc9eef1483eceb26a223fa9d591e28633e6bf6facd75e4295341e2ef3788284fc4482db16cab37de0c1adbf7fa07ad161ae875284778f49e15a052d875e", 0xb7, 0x80}, {&(0x7f00000004c0)="056b3e2d287f817e74a518293ea19b1196cccb376ac73cd7bbeccaced6f43aa9706b33d8ec56c58be0febb03dadec48add6a378f07f9053f1b6f33fe63a960502ad48232f0bee4a41509d7063d478768ab8ee0a90ebdb7c9bc326d54c8edad7e9d59641faf45c171e35f77f8c38a7563e1555c331a5a3e4da1ce59c0c697ebe071d527f24563165dafd23b45186c3d55251c825d0d7fd16b0f13a2f1321cddbcf231b398a88b19e3915ee544692c3559f42a", 0xb2, 0x6}, {&(0x7f0000000580)="8023d53ac815f8a84b84350b859e8673ed208a78bbfec2e35d6d4927707d5dd61106eb0321af3709c17fe7661323c51575e9c18d7b834c138636224eb1a7d75dd59d5c5d7411bdd4c2b07cf727643f52b1ca3e1680cde001be2f8334303e9f4191c2f9425472ca1ee6bac17fde09f0ce5fdf2e70d3c1a38b2d3e0e804f7df817b6a03e5e1ffea1ca7cd7", 0x8a, 0x8}, {&(0x7f0000000300)="fae83b83fc781c7715", 0x9, 0x8fe}, {&(0x7f0000000640)="96f1e3c89318e48db56867032dd1ba9b0ffeec69eb34236bd93b937c6bb7447840dc021e536b89aad4fe89ca2317f4fe2b36cbbdd8d72d841aee6f7b7be258352406775f169573cbf4da0bcf856f825233c5387a3a7cde778c057d591f2133c10e8b5bdb164577f492130acfc7", 0x6d, 0x5}], 0x802010, &(0x7f0000000740)={[{@order_relaxed}], [{@fsname}, {@fsuuid={'fsuuid', 0x3d, {[0x36, 0x38, 0x61, 0x64, 0x39, 0x38, 0x31, 0x37], 0x2d, [0x62, 0x61, 0x61, 0x63], 0x2d, [0x62, 0x39, 0x33, 0x35], 0x2d, [0x32, 0x37, 0x33, 0x61], 0x2d, [0x61, 0x39, 0x64, 0x65, 0x31, 0x8eb4bab6ccebb2ed, 0x64, 0x62]}}}]})
ioctl$sock_SIOCETHTOOL(r2, 0x8946, &(0x7f0000000140)={'veth1_to_bridge\x00', &(0x7f0000000100)=@ethtool_pauseparam={0x12, 0x6, 0x8, 0x1}})
r4 = openat$khugepaged_scan(0xffffff9c, &(0x7f0000000080), 0x1, 0x0)
close(r4)

06:18:50 executing program 1:
r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0)
mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800004, 0x12, r0, 0x0)
preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x9, 0x0)
mmap(&(0x7f0000000000/0xa000)=nil, 0xa000, 0x2, 0x2172, 0xffffffffffffffff, 0x0)
socketpair(0x29, 0x80005, 0x0, 0x0)

[  332.750631][T14648] loop0: detected capacity change from 0 to 8
[  332.790418][T14654] loop3: detected capacity change from 0 to 8
06:18:50 executing program 2:
r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0)
mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800004, 0x12, r0, 0x0)
preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x9, 0x0)
r1 = socket$unix(0x1, 0x1, 0x0)
bind$unix(r1, &(0x7f00000001c0)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x56)
mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x100000a, 0x13, r1, 0x285ad000)
r2 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x11, 0x4, &(0x7f00000000c0)=ANY=[@ANYBLOB="18000000000000000000000000000000850000007b0000009500000000000000"], &(0x7f00000001c0)='syzkaller\x00', 0x4, 0x8f, &(0x7f00000002c0)=""/143, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78)
bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='ext4_es_lookup_extent_exit\x00', r2}, 0x10)
write$binfmt_elf32(r2, &(0x7f0000000380)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x2, 0x7, 0x1f, 0x6, 0x2, 0x3e, 0x70cc, 0x277, 0x34, 0x238, 0x3, 0x0, 0x20, 0x1, 0x4, 0x5, 0x3}, [{0x6474e551, 0x40, 0x2, 0x40000000, 0x1, 0x80, 0x1, 0xffffffff}, {0x6474e551, 0x8, 0x68, 0x80000000, 0x1, 0xffffffc0, 0x5, 0x3}], "cddb2636616f9eedd3ce3c19a74d64f8494bea4c266ec1b74ba94ea1db55171a67253dcdb1b481cbddefc51afc5d4a3b4bd6ac5cff43552908ce38a9d109838616661728584955ac29706dea357d03b160d088c8a1b9c8c32b5174fc52891f4dba0cfc1580d661a2c3bba7fa88a03b787b023710c6255c4cf55d599c23d6c7985832d8e9aa0628ac3b2e0338", ['\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00']}, 0x900)
mmap(&(0x7f0000000000/0xa000)=nil, 0xa000, 0x2, 0x2172, 0xffffffffffffffff, 0x0)
socketpair(0x29, 0x80005, 0x0, &(0x7f0000000340)={0x0, 0x0})

06:18:50 executing program 1:
r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0)
mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800004, 0x12, r0, 0x0)
preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x9, 0x0)
vmsplice(r0, &(0x7f0000000240)=[{&(0x7f0000000080)="4ab1b8694a30bc0b64f0bf0fa59d6d6310a9fca4f5ca7242c45a43a3f790f1bb52f7d713fdc0e6dfa75a5fa7f39f0c693511ea6a67b64b56fa4550fb865102551e0de8881e54887a6391bc4677137a4e433d75874a6619ff219d8ab89c1fdd9fe0d5ae7f1b35994210b3700e36625640f808", 0x72}, {&(0x7f0000000100)="b4346c01f32075d5cdbe81dc2919a8983c8e9f197195a027c0b95dec78d35df6ebeb63bff0423813616d67337c30bab5b6fb29da1bb7c014982cb6715df37902afa71736216374d5265195d9de49c7b08ac58de319c21a5fd49d6a39aecbae4bd0f079aab13eb24843b657b3b9e2f1e2d0731f5e00a4bafcf845d00e210b9ebf51a2303fbc02c70c9d4c62d4849f61727ffdac8e7a0e5b4b92dc03aa3ec3e37067eda1f5ee14cea961ae21f23d6678", 0xaf}], 0x2, 0xd)
ioctl$EXT4_IOC_MIGRATE(r0, 0x6609)
mmap(&(0x7f0000000000/0xa000)=nil, 0xa000, 0x2, 0x2172, 0xffffffffffffffff, 0x0)
socketpair(0x1e, 0x80005, 0x0, &(0x7f0000000340)={<r1=>0x0, 0x0})
ioctl$BTRFS_IOC_SCRUB_PROGRESS(r1, 0xc400941d, &(0x7f0000000680)={0x0, 0x1000, 0x7, 0xb84d75b96df9382e})
r2 = socket$unix(0x1, 0x1, 0x0)
bind$unix(r2, &(0x7f00000001c0)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x56)
ioctl$sock_SIOCETHTOOL(r2, 0x8946, &(0x7f0000000040)={'bond_slave_0\x00', &(0x7f0000000380)=@ethtool_per_queue_op={0x4b, 0xe, [0x7ff, 0x3, 0x101, 0xd28f, 0x4, 0x1, 0x3, 0x4, 0x1, 0x80000001, 0x24d, 0xffffff81, 0x81, 0x4, 0x0, 0x5, 0x1, 0x6, 0x6, 0x9, 0x3c43ddd5, 0x6, 0x7fff, 0x101, 0x3, 0x3f, 0xffffffff, 0x27, 0x9, 0x8, 0x0, 0xffff, 0x6, 0x80000001, 0x5, 0xc14, 0x200, 0x1f, 0x2ef677ce, 0x401, 0x9, 0x5, 0x401, 0x3, 0x17b, 0x3ff, 0xfffff245, 0x6, 0xfffffffb, 0x5, 0x400, 0x80000000, 0xd8, 0x179, 0xfa20000, 0x8, 0x6, 0x0, 0x1, 0x7, 0x5, 0x20, 0x3ff, 0x8, 0x6, 0x3, 0x1, 0x3, 0x3, 0x1ff, 0xff00, 0x0, 0x2ac, 0x2, 0x1ff, 0x0, 0x5, 0x6, 0xfff, 0x7, 0xff, 0x84e, 0xcb, 0x0, 0xd89, 0x2, 0x0, 0x0, 0x7, 0x10000, 0xdb, 0x6, 0x9, 0x0, 0x1f, 0xe9f, 0x9150, 0xffffffff, 0x3, 0x101, 0x9, 0x0, 0xfe29, 0x1, 0x1, 0x1, 0x8, 0x5, 0x5a, 0x1, 0x2, 0x9, 0xa0, 0xffffff24, 0xd3d2, 0x32, 0x80, 0x82, 0x4, 0xf89, 0x4000000, 0x98a, 0x7ff, 0x400, 0x7, 0x2, 0xfff, 0x1], "0b889191f8d8cb46a1b7145bf8f9cc66d6a3c8c5af0b3708251e07524ebaed1d511baacedaaffe5d2cfcf40404978dd5282f82a18e4796daad638fc7a4f044b3f156076b71ea4d6729246da871797e2c13d659610b545658546383f48bb1b06b4cb53fa50d16e43b4c14e144e6814e3c3f2adb174374ae762ba13910e60d8afed3763a3ffe847b79f2e04aea7d045159b703e8182c29799afdd0746aa14e71c3f8fd755f6a7e70bce5ee4e3122339d1119866eb3a730464a86ad90a34ddc0fbe3d49e4304b26c9f3c76c469c8c2e132ada1a7480ee41e4977e9ba9e0bda8fbd70c92e8c6262fd154abeb524c9d79344210457cb5"}})
close(r1)

06:18:50 executing program 0:
r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0)
mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800004, 0x12, r0, 0x0)
preadv(0xffffffffffffffff, &(0x7f00000001c0)=[{0x0}], 0x1, 0x9, 0x0)
mmap(&(0x7f0000000000/0xa000)=nil, 0xa000, 0x2, 0x2172, 0xffffffffffffffff, 0x0)
syz_mount_image$nilfs2(&(0x7f0000000180), &(0x7f0000000200)='./file0\x00', 0xd85, 0x7, &(0x7f00000006c0)=[{&(0x7f0000000240)="997c7e90471ec6786b6aa37fd8fbf290c011bee5642707bf7b126c36024e5e8f0d3d514aa1538eb70908eb3ac1a8a52e0ba29dab8884c189c9b68415aa0226e7c6a7ccf48ad20543b10360ab7ee9b247e4304d92f0ec7c0ba06d8160095660a0f12836e2033baed6228d464479ce22f2fadce176d0750fdc6ab1004eb9c4440707be1dc31c1ce11815d12f0d50eef6477341b3f6a4f364a1fccd68e2bcd2dba76227338cd6a1835a44", 0xa9, 0x8}, {&(0x7f0000000380)="3a79b76eed8bb53c1f5217cb4d40694fa75675b28af54d40304f697a1d04373a7ef7b09d46fa6365d222516dcc92d004bc937a22980c404bb5b5669f3dfd0e569079c03b2855be3337944aea4b03b03a3eb6d7", 0x53, 0x3}, {&(0x7f0000000400)="c8213af91316be74099fc072cc912017e77b8709c846cf00eb99c7c03cee58e25602e6ec0b4b42c8709e4447b0d23296a71661cdb6ea9b13d35ed3206f67e5559840f063e554ed7fcb842ab9b072197358b7a617cb0825abfabe3da9b022ecbe28ebcc22bd651a40dfcf4782be0c0c6d8adb8fdd7afce8c8659cc9eef1483eceb26a223fa9d591e28633e6bf6facd75e4295341e2ef3788284fc4482db16cab37de0c1adbf7fa07ad161ae875284778f49e15a052d875e", 0xb7, 0x80}, {&(0x7f00000004c0)="056b3e2d287f817e74a518293ea19b1196cccb376ac73cd7bbeccaced6f43aa9706b33d8ec56c58be0febb03dadec48add6a378f07f9053f1b6f33fe63a960502ad48232f0bee4a41509d7063d478768ab8ee0a90ebdb7c9bc326d54c8edad7e9d59641faf45c171e35f77f8c38a7563e1555c331a5a3e4da1ce59c0c697ebe071d527f24563165dafd23b45186c3d55251c825d0d7fd16b0f13a2f1321cddbcf231b398a88b19e3915ee544692c3559f42a", 0xb2, 0x6}, {&(0x7f0000000580)="8023d53ac815f8a84b84350b859e8673ed208a78bbfec2e35d6d4927707d5dd61106eb0321af3709c17fe7661323c51575e9c18d7b834c138636224eb1a7d75dd59d5c5d7411bdd4c2b07cf727643f52b1ca3e1680cde001be2f8334303e9f4191c2f9425472ca1ee6bac17fde09f0ce5fdf2e70d3c1a38b2d3e0e804f7df817b6a03e5e1ffea1ca7cd7", 0x8a, 0x8}, {&(0x7f0000000300)="fae83b83fc781c7715", 0x9, 0x8fe}, {&(0x7f0000000640)="96f1e3c89318e48db56867032dd1ba9b0ffeec69eb34236bd93b937c6bb7447840dc021e536b89aad4fe89ca2317f4fe2b36cbbdd8d72d841aee6f7b7be258352406775f169573cbf4da0bcf856f825233c5387a3a7cde778c057d591f2133c10e8b5bdb164577f492130acfc7", 0x6d, 0x5}], 0x802010, &(0x7f0000000740)={[{@order_relaxed}], [{@fsname}, {@fsuuid={'fsuuid', 0x3d, {[0x36, 0x38, 0x61, 0x64, 0x39, 0x38, 0x31, 0x37], 0x2d, [0x62, 0x61, 0x61, 0x63], 0x2d, [0x62, 0x39, 0x33, 0x35], 0x2d, [0x32, 0x37, 0x33, 0x61], 0x2d, [0x61, 0x39, 0x64, 0x65, 0x31, 0x8eb4bab6ccebb2ed, 0x64, 0x62]}}}]})

[  332.876639][T14664] loop0: detected capacity change from 0 to 8
06:18:50 executing program 2:
r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0)
mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800004, 0x12, r0, 0x0)
preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x9, 0x0)
r1 = socket$unix(0x1, 0x1, 0x0)
bind$unix(r1, &(0x7f00000001c0)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x56)
mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x100000a, 0x13, r1, 0x285ad000)
r2 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x11, 0x4, &(0x7f00000000c0)=ANY=[@ANYBLOB="18000000000000000000000000000000850000007b0000009500000000000000"], &(0x7f00000001c0)='syzkaller\x00', 0x4, 0x8f, &(0x7f00000002c0)=""/143, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78)
bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='ext4_es_lookup_extent_exit\x00', r2}, 0x10)
write$binfmt_elf32(r2, &(0x7f0000000380)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x2, 0x7, 0x1f, 0x6, 0x2, 0x3e, 0x70cc, 0x277, 0x34, 0x238, 0x3, 0x0, 0x20, 0x1, 0x4, 0x5, 0x3}, [{0x6474e551, 0x40, 0x2, 0x40000000, 0x1, 0x80, 0x1, 0xffffffff}, {0x6474e551, 0x8, 0x68, 0x80000000, 0x1, 0xffffffc0, 0x5, 0x3}], "cddb2636616f9eedd3ce3c19a74d64f8494bea4c266ec1b74ba94ea1db55171a67253dcdb1b481cbddefc51afc5d4a3b4bd6ac5cff43552908ce38a9d109838616661728584955ac29706dea357d03b160d088c8a1b9c8c32b5174fc52891f4dba0cfc1580d661a2c3bba7fa88a03b787b023710c6255c4cf55d599c23d6c7985832d8e9aa0628ac3b2e0338", ['\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00']}, 0x900)
mmap(&(0x7f0000000000/0xa000)=nil, 0xa000, 0x2, 0x2172, 0xffffffffffffffff, 0x0)
socketpair(0x29, 0x80005, 0x0, &(0x7f0000000340)={0x0, 0x0})

06:18:50 executing program 3:
r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0)
mmap(&(0x7f00002cf000/0x3000)=nil, 0x3000, 0x2000001, 0x8010, r0, 0xfffff000)
r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000001c0), 0x0, 0x0)
epoll_ctl$EPOLL_CTL_ADD(r0, 0x1, 0xffffffffffffffff, &(0x7f00000000c0)={0x10002001})
r2 = fcntl$dupfd(r1, 0x0, r1)
ioctl$TIOCSETD(r2, 0x5423, &(0x7f0000000140)=0x1)
ioctl$sock_ipv6_tunnel_SIOCCHGTUNNEL(r2, 0x89f3, &(0x7f0000000180)={'syztnl2\x00', 0x0})
preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x9, 0x0)
mmap(&(0x7f0000000000/0xa000)=nil, 0xa000, 0x2, 0x2172, 0xffffffffffffffff, 0x0)
r3 = socket$inet_udp(0x2, 0x2, 0x0)
mmap(&(0x7f00003ff000/0x3000)=nil, 0x3000, 0x300000e, 0x10010, r3, 0xeefac000)
socketpair(0x1, 0x2, 0x100007ff, &(0x7f0000000340)={0x0, 0x0})
r4 = syz_open_dev$mouse(&(0x7f0000000040), 0x5, 0x484002)
setsockopt$kcm_KCM_RECV_DISABLE(r4, 0x119, 0x1, &(0x7f0000000080)=0x4, 0x4)
r5 = bpf$LINK_GET_FD_BY_ID(0x1e, &(0x7f0000000200), 0x4)
r6 = syz_init_net_socket$nl_rdma(0x10, 0x3, 0x10)
bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='ext4_es_lookup_extent_exit\x00'}, 0x10)
close(0xffffffffffffffff)
setsockopt$SO_BINDTODEVICE(r6, 0x1, 0x19, &(0x7f0000000100)='veth1_macvtap\x00', 0x10)
fcntl$setstatus(r5, 0x4, 0xc00)

06:18:50 executing program 1:
r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0)
mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800004, 0x12, r0, 0x0)
preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x9, 0x0)
vmsplice(r0, &(0x7f0000000240)=[{&(0x7f0000000080)="4ab1b8694a30bc0b64f0bf0fa59d6d6310a9fca4f5ca7242c45a43a3f790f1bb52f7d713fdc0e6dfa75a5fa7f39f0c693511ea6a67b64b56fa4550fb865102551e0de8881e54887a6391bc4677137a4e433d75874a6619ff219d8ab89c1fdd9fe0d5ae7f1b35994210b3700e36625640f808", 0x72}, {&(0x7f0000000100)="b4346c01f32075d5cdbe81dc2919a8983c8e9f197195a027c0b95dec78d35df6ebeb63bff0423813616d67337c30bab5b6fb29da1bb7c014982cb6715df37902afa71736216374d5265195d9de49c7b08ac58de319c21a5fd49d6a39aecbae4bd0f079aab13eb24843b657b3b9e2f1e2d0731f5e00a4bafcf845d00e210b9ebf51a2303fbc02c70c9d4c62d4849f61727ffdac8e7a0e5b4b92dc03aa3ec3e37067eda1f5ee14cea961ae21f23d6678", 0xaf}], 0x2, 0xd)
ioctl$EXT4_IOC_MIGRATE(r0, 0x6609)
mmap(&(0x7f0000000000/0xa000)=nil, 0xa000, 0x2, 0x2172, 0xffffffffffffffff, 0x0)
socketpair(0x1e, 0x80005, 0x0, &(0x7f0000000340)={<r1=>0x0, 0x0})
ioctl$BTRFS_IOC_SCRUB_PROGRESS(r1, 0xc400941d, &(0x7f0000000680)={0x0, 0x1000, 0x7, 0xb84d75b96df9382e})
r2 = socket$unix(0x1, 0x1, 0x0)
bind$unix(r2, &(0x7f00000001c0)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x56)
ioctl$sock_SIOCETHTOOL(r2, 0x8946, &(0x7f0000000040)={'bond_slave_0\x00', &(0x7f0000000380)=@ethtool_per_queue_op={0x4b, 0xe, [0x7ff, 0x3, 0x101, 0xd28f, 0x4, 0x1, 0x3, 0x4, 0x1, 0x80000001, 0x24d, 0xffffff81, 0x81, 0x4, 0x0, 0x5, 0x1, 0x6, 0x6, 0x9, 0x3c43ddd5, 0x6, 0x7fff, 0x101, 0x3, 0x3f, 0xffffffff, 0x27, 0x9, 0x8, 0x0, 0xffff, 0x6, 0x80000001, 0x5, 0xc14, 0x200, 0x1f, 0x2ef677ce, 0x401, 0x9, 0x5, 0x401, 0x3, 0x17b, 0x3ff, 0xfffff245, 0x6, 0xfffffffb, 0x5, 0x400, 0x80000000, 0xd8, 0x179, 0xfa20000, 0x8, 0x6, 0x0, 0x1, 0x7, 0x5, 0x20, 0x3ff, 0x8, 0x6, 0x3, 0x1, 0x3, 0x3, 0x1ff, 0xff00, 0x0, 0x2ac, 0x2, 0x1ff, 0x0, 0x5, 0x6, 0xfff, 0x7, 0xff, 0x84e, 0xcb, 0x0, 0xd89, 0x2, 0x0, 0x0, 0x7, 0x10000, 0xdb, 0x6, 0x9, 0x0, 0x1f, 0xe9f, 0x9150, 0xffffffff, 0x3, 0x101, 0x9, 0x0, 0xfe29, 0x1, 0x1, 0x1, 0x8, 0x5, 0x5a, 0x1, 0x2, 0x9, 0xa0, 0xffffff24, 0xd3d2, 0x32, 0x80, 0x82, 0x4, 0xf89, 0x4000000, 0x98a, 0x7ff, 0x400, 0x7, 0x2, 0xfff, 0x1], "0b889191f8d8cb46a1b7145bf8f9cc66d6a3c8c5af0b3708251e07524ebaed1d511baacedaaffe5d2cfcf40404978dd5282f82a18e4796daad638fc7a4f044b3f156076b71ea4d6729246da871797e2c13d659610b545658546383f48bb1b06b4cb53fa50d16e43b4c14e144e6814e3c3f2adb174374ae762ba13910e60d8afed3763a3ffe847b79f2e04aea7d045159b703e8182c29799afdd0746aa14e71c3f8fd755f6a7e70bce5ee4e3122339d1119866eb3a730464a86ad90a34ddc0fbe3d49e4304b26c9f3c76c469c8c2e132ada1a7480ee41e4977e9ba9e0bda8fbd70c92e8c6262fd154abeb524c9d79344210457cb5"}})
close(r1)

06:18:50 executing program 0:
r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0)
mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800004, 0x12, r0, 0x0)
preadv(r0, 0x0, 0x0, 0x9, 0x0)
mmap(&(0x7f0000000000/0xa000)=nil, 0xa000, 0x2, 0x2172, 0xffffffffffffffff, 0x0)
syz_mount_image$nilfs2(&(0x7f0000000180), &(0x7f0000000200)='./file0\x00', 0xd85, 0x7, &(0x7f00000006c0)=[{&(0x7f0000000240)="997c7e90471ec6786b6aa37fd8fbf290c011bee5642707bf7b126c36024e5e8f0d3d514aa1538eb70908eb3ac1a8a52e0ba29dab8884c189c9b68415aa0226e7c6a7ccf48ad20543b10360ab7ee9b247e4304d92f0ec7c0ba06d8160095660a0f12836e2033baed6228d464479ce22f2fadce176d0750fdc6ab1004eb9c4440707be1dc31c1ce11815d12f0d50eef6477341b3f6a4f364a1fccd68e2bcd2dba76227338cd6a1835a44", 0xa9, 0x8}, {&(0x7f0000000380)="3a79b76eed8bb53c1f5217cb4d40694fa75675b28af54d40304f697a1d04373a7ef7b09d46fa6365d222516dcc92d004bc937a22980c404bb5b5669f3dfd0e569079c03b2855be3337944aea4b03b03a3eb6d7", 0x53, 0x3}, {&(0x7f0000000400)="c8213af91316be74099fc072cc912017e77b8709c846cf00eb99c7c03cee58e25602e6ec0b4b42c8709e4447b0d23296a71661cdb6ea9b13d35ed3206f67e5559840f063e554ed7fcb842ab9b072197358b7a617cb0825abfabe3da9b022ecbe28ebcc22bd651a40dfcf4782be0c0c6d8adb8fdd7afce8c8659cc9eef1483eceb26a223fa9d591e28633e6bf6facd75e4295341e2ef3788284fc4482db16cab37de0c1adbf7fa07ad161ae875284778f49e15a052d875e", 0xb7, 0x80}, {&(0x7f00000004c0)="056b3e2d287f817e74a518293ea19b1196cccb376ac73cd7bbeccaced6f43aa9706b33d8ec56c58be0febb03dadec48add6a378f07f9053f1b6f33fe63a960502ad48232f0bee4a41509d7063d478768ab8ee0a90ebdb7c9bc326d54c8edad7e9d59641faf45c171e35f77f8c38a7563e1555c331a5a3e4da1ce59c0c697ebe071d527f24563165dafd23b45186c3d55251c825d0d7fd16b0f13a2f1321cddbcf231b398a88b19e3915ee544692c3559f42a", 0xb2, 0x6}, {&(0x7f0000000580)="8023d53ac815f8a84b84350b859e8673ed208a78bbfec2e35d6d4927707d5dd61106eb0321af3709c17fe7661323c51575e9c18d7b834c138636224eb1a7d75dd59d5c5d7411bdd4c2b07cf727643f52b1ca3e1680cde001be2f8334303e9f4191c2f9425472ca1ee6bac17fde09f0ce5fdf2e70d3c1a38b2d3e0e804f7df817b6a03e5e1ffea1ca7cd7", 0x8a, 0x8}, {&(0x7f0000000300)="fae83b83fc781c7715", 0x9, 0x8fe}, {&(0x7f0000000640)="96f1e3c89318e48db56867032dd1ba9b0ffeec69eb34236bd93b937c6bb7447840dc021e536b89aad4fe89ca2317f4fe2b36cbbdd8d72d841aee6f7b7be258352406775f169573cbf4da0bcf856f825233c5387a3a7cde778c057d591f2133c10e8b5bdb164577f492130acfc7", 0x6d, 0x5}], 0x802010, &(0x7f0000000740)={[{@order_relaxed}], [{@fsname}, {@fsuuid={'fsuuid', 0x3d, {[0x36, 0x38, 0x61, 0x64, 0x39, 0x38, 0x31, 0x37], 0x2d, [0x62, 0x61, 0x61, 0x63], 0x2d, [0x62, 0x39, 0x33, 0x35], 0x2d, [0x32, 0x37, 0x33, 0x61], 0x2d, [0x61, 0x39, 0x64, 0x65, 0x31, 0x8eb4bab6ccebb2ed, 0x64, 0x62]}}}]})

06:18:50 executing program 2:
r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0)
mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800004, 0x12, r0, 0x0)
preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x9, 0x0)
r1 = socket$unix(0x1, 0x1, 0x0)
bind$unix(r1, &(0x7f00000001c0)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x56)
mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x100000a, 0x13, r1, 0x285ad000)
r2 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x11, 0x4, &(0x7f00000000c0)=ANY=[@ANYBLOB="18000000000000000000000000000000850000007b0000009500000000000000"], &(0x7f00000001c0)='syzkaller\x00', 0x4, 0x8f, &(0x7f00000002c0)=""/143, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78)
bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='ext4_es_lookup_extent_exit\x00', r2}, 0x10)
write$binfmt_elf32(r2, &(0x7f0000000380)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x2, 0x7, 0x1f, 0x6, 0x2, 0x3e, 0x70cc, 0x277, 0x34, 0x238, 0x3, 0x0, 0x20, 0x1, 0x4, 0x5, 0x3}, [{0x6474e551, 0x40, 0x2, 0x40000000, 0x1, 0x80, 0x1, 0xffffffff}, {0x6474e551, 0x8, 0x68, 0x80000000, 0x1, 0xffffffc0, 0x5, 0x3}], "cddb2636616f9eedd3ce3c19a74d64f8494bea4c266ec1b74ba94ea1db55171a67253dcdb1b481cbddefc51afc5d4a3b4bd6ac5cff43552908ce38a9d109838616661728584955ac29706dea357d03b160d088c8a1b9c8c32b5174fc52891f4dba0cfc1580d661a2c3bba7fa88a03b787b023710c6255c4cf55d599c23d6c7985832d8e9aa0628ac3b2e0338", ['\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00']}, 0x900)
socketpair(0x29, 0x80005, 0x0, &(0x7f0000000340)={0x0, 0x0})

[  333.037289][T14689] loop0: detected capacity change from 0 to 8
06:18:50 executing program 2:
r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0)
mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800004, 0x12, r0, 0x0)
preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x9, 0x0)
r1 = socket$unix(0x1, 0x1, 0x0)
bind$unix(r1, &(0x7f00000001c0)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x56)
mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x100000a, 0x13, r1, 0x285ad000)
r2 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x11, 0x4, &(0x7f00000000c0)=ANY=[@ANYBLOB="18000000000000000000000000000000850000007b0000009500000000000000"], &(0x7f00000001c0)='syzkaller\x00', 0x4, 0x8f, &(0x7f00000002c0)=""/143, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78)
bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='ext4_es_lookup_extent_exit\x00', r2}, 0x10)
write$binfmt_elf32(r2, &(0x7f0000000380)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x2, 0x7, 0x1f, 0x6, 0x2, 0x3e, 0x70cc, 0x277, 0x34, 0x238, 0x3, 0x0, 0x20, 0x1, 0x4, 0x5, 0x3}, [{0x6474e551, 0x40, 0x2, 0x40000000, 0x1, 0x80, 0x1, 0xffffffff}, {0x6474e551, 0x8, 0x68, 0x80000000, 0x1, 0xffffffc0, 0x5, 0x3}], "cddb2636616f9eedd3ce3c19a74d64f8494bea4c266ec1b74ba94ea1db55171a67253dcdb1b481cbddefc51afc5d4a3b4bd6ac5cff43552908ce38a9d109838616661728584955ac29706dea357d03b160d088c8a1b9c8c32b5174fc52891f4dba0cfc1580d661a2c3bba7fa88a03b787b023710c6255c4cf55d599c23d6c7985832d8e9aa0628ac3b2e0338", ['\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00']}, 0x900)
socketpair(0x29, 0x80005, 0x0, &(0x7f0000000340)={0x0, 0x0})

06:18:50 executing program 1:
r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0)
mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800004, 0x12, r0, 0x0)
preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x9, 0x0)
vmsplice(r0, &(0x7f0000000240)=[{&(0x7f0000000080)="4ab1b8694a30bc0b64f0bf0fa59d6d6310a9fca4f5ca7242c45a43a3f790f1bb52f7d713fdc0e6dfa75a5fa7f39f0c693511ea6a67b64b56fa4550fb865102551e0de8881e54887a6391bc4677137a4e433d75874a6619ff219d8ab89c1fdd9fe0d5ae7f1b35994210b3700e36625640f808", 0x72}, {&(0x7f0000000100)="b4346c01f32075d5cdbe81dc2919a8983c8e9f197195a027c0b95dec78d35df6ebeb63bff0423813616d67337c30bab5b6fb29da1bb7c014982cb6715df37902afa71736216374d5265195d9de49c7b08ac58de319c21a5fd49d6a39aecbae4bd0f079aab13eb24843b657b3b9e2f1e2d0731f5e00a4bafcf845d00e210b9ebf51a2303fbc02c70c9d4c62d4849f61727ffdac8e7a0e5b4b92dc03aa3ec3e37067eda1f5ee14cea961ae21f23d6678", 0xaf}], 0x2, 0xd)
ioctl$EXT4_IOC_MIGRATE(r0, 0x6609)
mmap(&(0x7f0000000000/0xa000)=nil, 0xa000, 0x2, 0x2172, 0xffffffffffffffff, 0x0)
socketpair(0x1e, 0x80005, 0x0, &(0x7f0000000340)={<r1=>0x0, 0x0})
ioctl$BTRFS_IOC_SCRUB_PROGRESS(r1, 0xc400941d, &(0x7f0000000680)={0x0, 0x1000, 0x7, 0xb84d75b96df9382e})
r2 = socket$unix(0x1, 0x1, 0x0)
bind$unix(r2, &(0x7f00000001c0)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x56)
ioctl$sock_SIOCETHTOOL(r2, 0x8946, &(0x7f0000000040)={'bond_slave_0\x00', &(0x7f0000000380)=@ethtool_per_queue_op={0x4b, 0xe, [0x7ff, 0x3, 0x101, 0xd28f, 0x4, 0x1, 0x3, 0x4, 0x1, 0x80000001, 0x24d, 0xffffff81, 0x81, 0x4, 0x0, 0x5, 0x1, 0x6, 0x6, 0x9, 0x3c43ddd5, 0x6, 0x7fff, 0x101, 0x3, 0x3f, 0xffffffff, 0x27, 0x9, 0x8, 0x0, 0xffff, 0x6, 0x80000001, 0x5, 0xc14, 0x200, 0x1f, 0x2ef677ce, 0x401, 0x9, 0x5, 0x401, 0x3, 0x17b, 0x3ff, 0xfffff245, 0x6, 0xfffffffb, 0x5, 0x400, 0x80000000, 0xd8, 0x179, 0xfa20000, 0x8, 0x6, 0x0, 0x1, 0x7, 0x5, 0x20, 0x3ff, 0x8, 0x6, 0x3, 0x1, 0x3, 0x3, 0x1ff, 0xff00, 0x0, 0x2ac, 0x2, 0x1ff, 0x0, 0x5, 0x6, 0xfff, 0x7, 0xff, 0x84e, 0xcb, 0x0, 0xd89, 0x2, 0x0, 0x0, 0x7, 0x10000, 0xdb, 0x6, 0x9, 0x0, 0x1f, 0xe9f, 0x9150, 0xffffffff, 0x3, 0x101, 0x9, 0x0, 0xfe29, 0x1, 0x1, 0x1, 0x8, 0x5, 0x5a, 0x1, 0x2, 0x9, 0xa0, 0xffffff24, 0xd3d2, 0x32, 0x80, 0x82, 0x4, 0xf89, 0x4000000, 0x98a, 0x7ff, 0x400, 0x7, 0x2, 0xfff, 0x1], "0b889191f8d8cb46a1b7145bf8f9cc66d6a3c8c5af0b3708251e07524ebaed1d511baacedaaffe5d2cfcf40404978dd5282f82a18e4796daad638fc7a4f044b3f156076b71ea4d6729246da871797e2c13d659610b545658546383f48bb1b06b4cb53fa50d16e43b4c14e144e6814e3c3f2adb174374ae762ba13910e60d8afed3763a3ffe847b79f2e04aea7d045159b703e8182c29799afdd0746aa14e71c3f8fd755f6a7e70bce5ee4e3122339d1119866eb3a730464a86ad90a34ddc0fbe3d49e4304b26c9f3c76c469c8c2e132ada1a7480ee41e4977e9ba9e0bda8fbd70c92e8c6262fd154abeb524c9d79344210457cb5"}})
close(r1)

06:18:50 executing program 3:
r0 = openat(0xffffffffffffffff, &(0x7f0000000300)='./file0\x00', 0x0, 0x6)
mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800004, 0x12, r0, 0x0)
preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x9, 0x0)
mmap(&(0x7f0000008000/0x3000)=nil, 0x3000, 0x2, 0x11, 0xffffffffffffffff, 0x0)
r1 = openat$sequencer2(0xffffff9c, &(0x7f0000000040), 0x0, 0x0)
ppoll(&(0x7f0000000080)=[{r0, 0x200}, {r1, 0x2400}], 0x2, &(0x7f00000000c0), &(0x7f0000000100)={[0x0, 0x4]}, 0x8)
socketpair(0x1e, 0x80005, 0x0, &(0x7f0000000340)={<r2=>0x0, 0x0})
close(r2)
r3 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x11, 0x4, &(0x7f0000000440)=@framed={{0x18, 0x0, 0x0, 0x0, 0x3}, [@call={0x85, 0x0, 0x0, 0x78}]}, &(0x7f00000001c0)='syzkaller\x00', 0x4, 0x8f, &(0x7f0000000480)=""/143, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x74)
bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='ext4_es_lookup_extent_exit\x00', r3}, 0x10)
close(r3)
ioctl$TUNGETIFF(r0, 0x800454d2, &(0x7f00000002c0)={'wg1\x00'})
socket$phonet_pipe(0x23, 0x5, 0x2)
accept4(r2, &(0x7f0000000140)=@nfc_llcp, &(0x7f0000000200)=0x80, 0x80800)

06:18:50 executing program 2:
r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0)
mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800004, 0x12, r0, 0x0)
preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x9, 0x0)
r1 = socket$unix(0x1, 0x1, 0x0)
bind$unix(r1, &(0x7f00000001c0)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x56)
mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x100000a, 0x13, r1, 0x285ad000)
r2 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x11, 0x4, &(0x7f00000000c0)=ANY=[@ANYBLOB="18000000000000000000000000000000850000007b0000009500000000000000"], &(0x7f00000001c0)='syzkaller\x00', 0x4, 0x8f, &(0x7f00000002c0)=""/143, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78)
bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='ext4_es_lookup_extent_exit\x00', r2}, 0x10)
write$binfmt_elf32(r2, &(0x7f0000000380)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x2, 0x7, 0x1f, 0x6, 0x2, 0x3e, 0x70cc, 0x277, 0x34, 0x238, 0x3, 0x0, 0x20, 0x1, 0x4, 0x5, 0x3}, [{0x6474e551, 0x40, 0x2, 0x40000000, 0x1, 0x80, 0x1, 0xffffffff}, {0x6474e551, 0x8, 0x68, 0x80000000, 0x1, 0xffffffc0, 0x5, 0x3}], "cddb2636616f9eedd3ce3c19a74d64f8494bea4c266ec1b74ba94ea1db55171a67253dcdb1b481cbddefc51afc5d4a3b4bd6ac5cff43552908ce38a9d109838616661728584955ac29706dea357d03b160d088c8a1b9c8c32b5174fc52891f4dba0cfc1580d661a2c3bba7fa88a03b787b023710c6255c4cf55d599c23d6c7985832d8e9aa0628ac3b2e0338", ['\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00']}, 0x900)
socketpair(0x29, 0x80005, 0x0, &(0x7f0000000340)={0x0, 0x0})

06:18:50 executing program 0:
r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0)
mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800004, 0x12, r0, 0x0)
preadv(r0, 0x0, 0x0, 0x9, 0x0)
mmap(&(0x7f0000000000/0xa000)=nil, 0xa000, 0x2, 0x2172, 0xffffffffffffffff, 0x0)
syz_mount_image$nilfs2(&(0x7f0000000180), &(0x7f0000000200)='./file0\x00', 0xd85, 0x7, &(0x7f00000006c0)=[{&(0x7f0000000240)="997c7e90471ec6786b6aa37fd8fbf290c011bee5642707bf7b126c36024e5e8f0d3d514aa1538eb70908eb3ac1a8a52e0ba29dab8884c189c9b68415aa0226e7c6a7ccf48ad20543b10360ab7ee9b247e4304d92f0ec7c0ba06d8160095660a0f12836e2033baed6228d464479ce22f2fadce176d0750fdc6ab1004eb9c4440707be1dc31c1ce11815d12f0d50eef6477341b3f6a4f364a1fccd68e2bcd2dba76227338cd6a1835a44", 0xa9, 0x8}, {&(0x7f0000000380)="3a79b76eed8bb53c1f5217cb4d40694fa75675b28af54d40304f697a1d04373a7ef7b09d46fa6365d222516dcc92d004bc937a22980c404bb5b5669f3dfd0e569079c03b2855be3337944aea4b03b03a3eb6d7", 0x53, 0x3}, {&(0x7f0000000400)="c8213af91316be74099fc072cc912017e77b8709c846cf00eb99c7c03cee58e25602e6ec0b4b42c8709e4447b0d23296a71661cdb6ea9b13d35ed3206f67e5559840f063e554ed7fcb842ab9b072197358b7a617cb0825abfabe3da9b022ecbe28ebcc22bd651a40dfcf4782be0c0c6d8adb8fdd7afce8c8659cc9eef1483eceb26a223fa9d591e28633e6bf6facd75e4295341e2ef3788284fc4482db16cab37de0c1adbf7fa07ad161ae875284778f49e15a052d875e", 0xb7, 0x80}, {&(0x7f00000004c0)="056b3e2d287f817e74a518293ea19b1196cccb376ac73cd7bbeccaced6f43aa9706b33d8ec56c58be0febb03dadec48add6a378f07f9053f1b6f33fe63a960502ad48232f0bee4a41509d7063d478768ab8ee0a90ebdb7c9bc326d54c8edad7e9d59641faf45c171e35f77f8c38a7563e1555c331a5a3e4da1ce59c0c697ebe071d527f24563165dafd23b45186c3d55251c825d0d7fd16b0f13a2f1321cddbcf231b398a88b19e3915ee544692c3559f42a", 0xb2, 0x6}, {&(0x7f0000000580)="8023d53ac815f8a84b84350b859e8673ed208a78bbfec2e35d6d4927707d5dd61106eb0321af3709c17fe7661323c51575e9c18d7b834c138636224eb1a7d75dd59d5c5d7411bdd4c2b07cf727643f52b1ca3e1680cde001be2f8334303e9f4191c2f9425472ca1ee6bac17fde09f0ce5fdf2e70d3c1a38b2d3e0e804f7df817b6a03e5e1ffea1ca7cd7", 0x8a, 0x8}, {&(0x7f0000000300)="fae83b83fc781c7715", 0x9, 0x8fe}, {&(0x7f0000000640)="96f1e3c89318e48db56867032dd1ba9b0ffeec69eb34236bd93b937c6bb7447840dc021e536b89aad4fe89ca2317f4fe2b36cbbdd8d72d841aee6f7b7be258352406775f169573cbf4da0bcf856f825233c5387a3a7cde778c057d591f2133c10e8b5bdb164577f492130acfc7", 0x6d, 0x5}], 0x802010, &(0x7f0000000740)={[{@order_relaxed}], [{@fsname}, {@fsuuid={'fsuuid', 0x3d, {[0x36, 0x38, 0x61, 0x64, 0x39, 0x38, 0x31, 0x37], 0x2d, [0x62, 0x61, 0x61, 0x63], 0x2d, [0x62, 0x39, 0x33, 0x35], 0x2d, [0x32, 0x37, 0x33, 0x61], 0x2d, [0x61, 0x39, 0x64, 0x65, 0x31, 0x8eb4bab6ccebb2ed, 0x64, 0x62]}}}]})

06:18:50 executing program 3:
r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0)
mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800004, 0x12, r0, 0x0)
r1 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x11, 0x4, &(0x7f00000000c0)=@framed={{}, [@call={0x85, 0x0, 0x0, 0x7b}]}, &(0x7f00000001c0)='syzkaller\x00', 0x4, 0x8f, &(0x7f00000002c0)=""/143, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78)
bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='ext4_es_lookup_extent_exit\x00', r1}, 0x10)
preadv(r1, &(0x7f00000001c0)=[{0x0}], 0x1, 0x8, 0x0)
mmap(&(0x7f0000000000/0xa000)=nil, 0xa000, 0x2, 0x2172, 0xffffffffffffffff, 0x0)
socketpair(0x1e, 0x80005, 0x0, &(0x7f0000000340)={0x0, 0x0})

06:18:50 executing program 1:
r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0)
mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800004, 0x12, r0, 0x0)
preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x9, 0x0)
vmsplice(r0, &(0x7f0000000240)=[{&(0x7f0000000080)="4ab1b8694a30bc0b64f0bf0fa59d6d6310a9fca4f5ca7242c45a43a3f790f1bb52f7d713fdc0e6dfa75a5fa7f39f0c693511ea6a67b64b56fa4550fb865102551e0de8881e54887a6391bc4677137a4e433d75874a6619ff219d8ab89c1fdd9fe0d5ae7f1b35994210b3700e36625640f808", 0x72}, {&(0x7f0000000100)="b4346c01f32075d5cdbe81dc2919a8983c8e9f197195a027c0b95dec78d35df6ebeb63bff0423813616d67337c30bab5b6fb29da1bb7c014982cb6715df37902afa71736216374d5265195d9de49c7b08ac58de319c21a5fd49d6a39aecbae4bd0f079aab13eb24843b657b3b9e2f1e2d0731f5e00a4bafcf845d00e210b9ebf51a2303fbc02c70c9d4c62d4849f61727ffdac8e7a0e5b4b92dc03aa3ec3e37067eda1f5ee14cea961ae21f23d6678", 0xaf}], 0x2, 0xd)
ioctl$EXT4_IOC_MIGRATE(r0, 0x6609)
mmap(&(0x7f0000000000/0xa000)=nil, 0xa000, 0x2, 0x2172, 0xffffffffffffffff, 0x0)
socketpair(0x1e, 0x80005, 0x0, &(0x7f0000000340)={<r1=>0x0, 0x0})
ioctl$BTRFS_IOC_SCRUB_PROGRESS(r1, 0xc400941d, &(0x7f0000000680)={0x0, 0x1000, 0x7, 0xb84d75b96df9382e})
r2 = socket$unix(0x1, 0x1, 0x0)
bind$unix(r2, &(0x7f00000001c0)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x56)
ioctl$sock_SIOCETHTOOL(r2, 0x8946, &(0x7f0000000040)={'bond_slave_0\x00', &(0x7f0000000380)=@ethtool_per_queue_op={0x4b, 0xe, [0x7ff, 0x3, 0x101, 0xd28f, 0x4, 0x1, 0x3, 0x4, 0x1, 0x80000001, 0x24d, 0xffffff81, 0x81, 0x4, 0x0, 0x5, 0x1, 0x6, 0x6, 0x9, 0x3c43ddd5, 0x6, 0x7fff, 0x101, 0x3, 0x3f, 0xffffffff, 0x27, 0x9, 0x8, 0x0, 0xffff, 0x6, 0x80000001, 0x5, 0xc14, 0x200, 0x1f, 0x2ef677ce, 0x401, 0x9, 0x5, 0x401, 0x3, 0x17b, 0x3ff, 0xfffff245, 0x6, 0xfffffffb, 0x5, 0x400, 0x80000000, 0xd8, 0x179, 0xfa20000, 0x8, 0x6, 0x0, 0x1, 0x7, 0x5, 0x20, 0x3ff, 0x8, 0x6, 0x3, 0x1, 0x3, 0x3, 0x1ff, 0xff00, 0x0, 0x2ac, 0x2, 0x1ff, 0x0, 0x5, 0x6, 0xfff, 0x7, 0xff, 0x84e, 0xcb, 0x0, 0xd89, 0x2, 0x0, 0x0, 0x7, 0x10000, 0xdb, 0x6, 0x9, 0x0, 0x1f, 0xe9f, 0x9150, 0xffffffff, 0x3, 0x101, 0x9, 0x0, 0xfe29, 0x1, 0x1, 0x1, 0x8, 0x5, 0x5a, 0x1, 0x2, 0x9, 0xa0, 0xffffff24, 0xd3d2, 0x32, 0x80, 0x82, 0x4, 0xf89, 0x4000000, 0x98a, 0x7ff, 0x400, 0x7, 0x2, 0xfff, 0x1], "0b889191f8d8cb46a1b7145bf8f9cc66d6a3c8c5af0b3708251e07524ebaed1d511baacedaaffe5d2cfcf40404978dd5282f82a18e4796daad638fc7a4f044b3f156076b71ea4d6729246da871797e2c13d659610b545658546383f48bb1b06b4cb53fa50d16e43b4c14e144e6814e3c3f2adb174374ae762ba13910e60d8afed3763a3ffe847b79f2e04aea7d045159b703e8182c29799afdd0746aa14e71c3f8fd755f6a7e70bce5ee4e3122339d1119866eb3a730464a86ad90a34ddc0fbe3d49e4304b26c9f3c76c469c8c2e132ada1a7480ee41e4977e9ba9e0bda8fbd70c92e8c6262fd154abeb524c9d79344210457cb5"}})

[  333.232704][T14707] loop0: detected capacity change from 0 to 8
06:18:50 executing program 2:
r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0)
mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800004, 0x12, r0, 0x0)
preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x9, 0x0)
r1 = socket$unix(0x1, 0x1, 0x0)
bind$unix(r1, &(0x7f00000001c0)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x56)
mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x100000a, 0x13, r1, 0x285ad000)
r2 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x11, 0x4, &(0x7f00000000c0)=ANY=[@ANYBLOB="18000000000000000000000000000000850000007b0000009500000000000000"], &(0x7f00000001c0)='syzkaller\x00', 0x4, 0x8f, &(0x7f00000002c0)=""/143, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78)
bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='ext4_es_lookup_extent_exit\x00', r2}, 0x10)
mmap(&(0x7f0000000000/0xa000)=nil, 0xa000, 0x2, 0x2172, 0xffffffffffffffff, 0x0)
socketpair(0x29, 0x80005, 0x0, &(0x7f0000000340)={0x0, 0x0})

06:18:50 executing program 3:
r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0)
mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800004, 0x12, r0, 0x0)
r1 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x11, 0x4, &(0x7f00000000c0)=@framed={{}, [@call={0x85, 0x0, 0x0, 0x7b}]}, &(0x7f00000001c0)='syzkaller\x00', 0x4, 0x8f, &(0x7f00000002c0)=""/143, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78)
bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='ext4_es_lookup_extent_exit\x00', r1}, 0x10)
preadv(r1, &(0x7f00000001c0)=[{0x0}], 0x1, 0x8, 0x0)
mmap(&(0x7f0000000000/0xa000)=nil, 0xa000, 0x2, 0x2172, 0xffffffffffffffff, 0x0)
socketpair(0x1e, 0x80005, 0x0, &(0x7f0000000340)={0x0, 0x0})

06:18:50 executing program 1:
r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0)
mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800004, 0x12, r0, 0x0)
preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x9, 0x0)
vmsplice(r0, &(0x7f0000000240)=[{&(0x7f0000000080)="4ab1b8694a30bc0b64f0bf0fa59d6d6310a9fca4f5ca7242c45a43a3f790f1bb52f7d713fdc0e6dfa75a5fa7f39f0c693511ea6a67b64b56fa4550fb865102551e0de8881e54887a6391bc4677137a4e433d75874a6619ff219d8ab89c1fdd9fe0d5ae7f1b35994210b3700e36625640f808", 0x72}, {&(0x7f0000000100)="b4346c01f32075d5cdbe81dc2919a8983c8e9f197195a027c0b95dec78d35df6ebeb63bff0423813616d67337c30bab5b6fb29da1bb7c014982cb6715df37902afa71736216374d5265195d9de49c7b08ac58de319c21a5fd49d6a39aecbae4bd0f079aab13eb24843b657b3b9e2f1e2d0731f5e00a4bafcf845d00e210b9ebf51a2303fbc02c70c9d4c62d4849f61727ffdac8e7a0e5b4b92dc03aa3ec3e37067eda1f5ee14cea961ae21f23d6678", 0xaf}], 0x2, 0xd)
ioctl$EXT4_IOC_MIGRATE(r0, 0x6609)
mmap(&(0x7f0000000000/0xa000)=nil, 0xa000, 0x2, 0x2172, 0xffffffffffffffff, 0x0)
socketpair(0x1e, 0x80005, 0x0, &(0x7f0000000340)={<r1=>0x0, 0x0})
ioctl$BTRFS_IOC_SCRUB_PROGRESS(r1, 0xc400941d, &(0x7f0000000680)={0x0, 0x1000, 0x7, 0xb84d75b96df9382e})
r2 = socket$unix(0x1, 0x1, 0x0)
bind$unix(r2, &(0x7f00000001c0)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x56)

06:18:50 executing program 3:
r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0)
mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800004, 0x12, r0, 0x0)
preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x9, 0x0)
mmap(&(0x7f0000000000/0xa000)=nil, 0xa000, 0x2, 0x2172, 0xffffffffffffffff, 0x0)
r1 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x11, 0x4, &(0x7f00000000c0)=@framed={{}, [@call={0x85, 0x0, 0x0, 0x7b}]}, &(0x7f00000001c0)='syzkaller\x00', 0x4, 0x8f, &(0x7f00000002c0)=""/143, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78)
bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='ext4_es_lookup_extent_exit\x00', r1}, 0x10)
preadv(r1, &(0x7f0000000080)=[{&(0x7f0000000040)=""/12, 0xc}], 0x1, 0x36, 0x401)
socketpair(0x1e, 0x80005, 0x0, &(0x7f0000000340)={<r2=>0x0, 0x0})
close(r2)
r3 = socket$unix(0x1, 0x1, 0x0)
bind$unix(r3, &(0x7f00000001c0)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x56)
ioctl$sock_SIOCOUTQNSD(r3, 0x894b, &(0x7f0000000100))
ioctl$RTC_PIE_OFF(r0, 0x7006)
r4 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0)
mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800004, 0x12, r4, 0x0)
preadv(r4, &(0x7f00000001c0)=[{0x0}], 0x1, 0x9, 0x0)
mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r4, 0x0)
r5 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x11, 0x9, &(0x7f0000000380)=@raw=[@initr0={0x18, 0x0, 0x0, 0x0, 0x10000, 0x0, 0x0, 0x0, 0x3}, @ldst={0x2, 0x1, 0x3, 0x7196d1492be6837c, 0x4, 0xfffffffffffffff4, 0x10}, @jmp={0x5, 0x1, 0xa, 0x6, 0x7, 0x75, 0x1}, @map={0x18, 0xa, 0x1, 0x0, r4}, @map, @ldst={0x1, 0x3, 0x2, 0x0, 0x6, 0x50}], &(0x7f00000001c0)='syzkaller\x00', 0x4, 0x8f, &(0x7f00000002c0)=""/143, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x74)
bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='ext4_es_lookup_extent_exit\x00', r5}, 0x10)
mmap(&(0x7f00006fe000/0x2000)=nil, 0x2000, 0x1000006, 0x50, r5, 0x6fdfe000)

06:18:50 executing program 2:
r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0)
mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800004, 0x12, r0, 0x0)
preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x9, 0x0)
r1 = socket$unix(0x1, 0x1, 0x0)
bind$unix(r1, &(0x7f00000001c0)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x56)
mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x100000a, 0x13, r1, 0x285ad000)
bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x11, 0x4, &(0x7f00000000c0)=ANY=[@ANYBLOB="18000000000000000000000000000000850000007b0000009500000000000000"], &(0x7f00000001c0)='syzkaller\x00', 0x4, 0x8f, &(0x7f00000002c0)=""/143, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78)
mmap(&(0x7f0000000000/0xa000)=nil, 0xa000, 0x2, 0x2172, 0xffffffffffffffff, 0x0)
socketpair(0x29, 0x80005, 0x0, &(0x7f0000000340)={0x0, 0x0})

06:18:50 executing program 0:
r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0)
mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800004, 0x12, r0, 0x0)
preadv(r0, 0x0, 0x0, 0x9, 0x0)
mmap(&(0x7f0000000000/0xa000)=nil, 0xa000, 0x2, 0x2172, 0xffffffffffffffff, 0x0)
syz_mount_image$nilfs2(&(0x7f0000000180), &(0x7f0000000200)='./file0\x00', 0xd85, 0x7, &(0x7f00000006c0)=[{&(0x7f0000000240)="997c7e90471ec6786b6aa37fd8fbf290c011bee5642707bf7b126c36024e5e8f0d3d514aa1538eb70908eb3ac1a8a52e0ba29dab8884c189c9b68415aa0226e7c6a7ccf48ad20543b10360ab7ee9b247e4304d92f0ec7c0ba06d8160095660a0f12836e2033baed6228d464479ce22f2fadce176d0750fdc6ab1004eb9c4440707be1dc31c1ce11815d12f0d50eef6477341b3f6a4f364a1fccd68e2bcd2dba76227338cd6a1835a44", 0xa9, 0x8}, {&(0x7f0000000380)="3a79b76eed8bb53c1f5217cb4d40694fa75675b28af54d40304f697a1d04373a7ef7b09d46fa6365d222516dcc92d004bc937a22980c404bb5b5669f3dfd0e569079c03b2855be3337944aea4b03b03a3eb6d7", 0x53, 0x3}, {&(0x7f0000000400)="c8213af91316be74099fc072cc912017e77b8709c846cf00eb99c7c03cee58e25602e6ec0b4b42c8709e4447b0d23296a71661cdb6ea9b13d35ed3206f67e5559840f063e554ed7fcb842ab9b072197358b7a617cb0825abfabe3da9b022ecbe28ebcc22bd651a40dfcf4782be0c0c6d8adb8fdd7afce8c8659cc9eef1483eceb26a223fa9d591e28633e6bf6facd75e4295341e2ef3788284fc4482db16cab37de0c1adbf7fa07ad161ae875284778f49e15a052d875e", 0xb7, 0x80}, {&(0x7f00000004c0)="056b3e2d287f817e74a518293ea19b1196cccb376ac73cd7bbeccaced6f43aa9706b33d8ec56c58be0febb03dadec48add6a378f07f9053f1b6f33fe63a960502ad48232f0bee4a41509d7063d478768ab8ee0a90ebdb7c9bc326d54c8edad7e9d59641faf45c171e35f77f8c38a7563e1555c331a5a3e4da1ce59c0c697ebe071d527f24563165dafd23b45186c3d55251c825d0d7fd16b0f13a2f1321cddbcf231b398a88b19e3915ee544692c3559f42a", 0xb2, 0x6}, {&(0x7f0000000580)="8023d53ac815f8a84b84350b859e8673ed208a78bbfec2e35d6d4927707d5dd61106eb0321af3709c17fe7661323c51575e9c18d7b834c138636224eb1a7d75dd59d5c5d7411bdd4c2b07cf727643f52b1ca3e1680cde001be2f8334303e9f4191c2f9425472ca1ee6bac17fde09f0ce5fdf2e70d3c1a38b2d3e0e804f7df817b6a03e5e1ffea1ca7cd7", 0x8a, 0x8}, {&(0x7f0000000300)="fae83b83fc781c7715", 0x9, 0x8fe}, {&(0x7f0000000640)="96f1e3c89318e48db56867032dd1ba9b0ffeec69eb34236bd93b937c6bb7447840dc021e536b89aad4fe89ca2317f4fe2b36cbbdd8d72d841aee6f7b7be258352406775f169573cbf4da0bcf856f825233c5387a3a7cde778c057d591f2133c10e8b5bdb164577f492130acfc7", 0x6d, 0x5}], 0x802010, &(0x7f0000000740)={[{@order_relaxed}], [{@fsname}, {@fsuuid={'fsuuid', 0x3d, {[0x36, 0x38, 0x61, 0x64, 0x39, 0x38, 0x31, 0x37], 0x2d, [0x62, 0x61, 0x61, 0x63], 0x2d, [0x62, 0x39, 0x33, 0x35], 0x2d, [0x32, 0x37, 0x33, 0x61], 0x2d, [0x61, 0x39, 0x64, 0x65, 0x31, 0x8eb4bab6ccebb2ed, 0x64, 0x62]}}}]})

[  333.425129][T14725] loop0: detected capacity change from 0 to 8
06:18:51 executing program 1:
r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0)
mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800004, 0x12, r0, 0x0)
preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x9, 0x0)
vmsplice(r0, &(0x7f0000000240)=[{&(0x7f0000000080)="4ab1b8694a30bc0b64f0bf0fa59d6d6310a9fca4f5ca7242c45a43a3f790f1bb52f7d713fdc0e6dfa75a5fa7f39f0c693511ea6a67b64b56fa4550fb865102551e0de8881e54887a6391bc4677137a4e433d75874a6619ff219d8ab89c1fdd9fe0d5ae7f1b35994210b3700e36625640f808", 0x72}, {&(0x7f0000000100)="b4346c01f32075d5cdbe81dc2919a8983c8e9f197195a027c0b95dec78d35df6ebeb63bff0423813616d67337c30bab5b6fb29da1bb7c014982cb6715df37902afa71736216374d5265195d9de49c7b08ac58de319c21a5fd49d6a39aecbae4bd0f079aab13eb24843b657b3b9e2f1e2d0731f5e00a4bafcf845d00e210b9ebf51a2303fbc02c70c9d4c62d4849f61727ffdac8e7a0e5b4b92dc03aa3ec3e37067eda1f5ee14cea961ae21f23d6678", 0xaf}], 0x2, 0xd)
ioctl$EXT4_IOC_MIGRATE(r0, 0x6609)
mmap(&(0x7f0000000000/0xa000)=nil, 0xa000, 0x2, 0x2172, 0xffffffffffffffff, 0x0)
socketpair(0x1e, 0x80005, 0x0, &(0x7f0000000340)={<r1=>0x0, 0x0})
ioctl$BTRFS_IOC_SCRUB_PROGRESS(r1, 0xc400941d, &(0x7f0000000680)={0x0, 0x1000, 0x7, 0xb84d75b96df9382e})
socket$unix(0x1, 0x1, 0x0)

06:18:51 executing program 2:
r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0)
mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800004, 0x12, r0, 0x0)
preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x9, 0x0)
r1 = socket$unix(0x1, 0x1, 0x0)
bind$unix(r1, &(0x7f00000001c0)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x56)
mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x100000a, 0x13, r1, 0x285ad000)
mmap(&(0x7f0000000000/0xa000)=nil, 0xa000, 0x2, 0x2172, 0xffffffffffffffff, 0x0)
socketpair(0x29, 0x80005, 0x0, &(0x7f0000000340)={0x0, 0x0})

06:18:51 executing program 3:
r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0)
mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800004, 0x12, r0, 0x0)
preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x9, 0x0)
mmap(&(0x7f0000000000/0xa000)=nil, 0xa000, 0x2, 0x2172, 0xffffffffffffffff, 0x0)
r1 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x11, 0x4, &(0x7f00000000c0)=@framed={{}, [@call={0x85, 0x0, 0x0, 0x7b}]}, &(0x7f00000001c0)='syzkaller\x00', 0x4, 0x8f, &(0x7f00000002c0)=""/143, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78)
bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='ext4_es_lookup_extent_exit\x00', r1}, 0x10)
preadv(r1, &(0x7f0000000080)=[{&(0x7f0000000040)=""/12, 0xc}], 0x1, 0x36, 0x401)
socketpair(0x1e, 0x80005, 0x0, &(0x7f0000000340)={<r2=>0x0, 0x0})
close(r2)
r3 = socket$unix(0x1, 0x1, 0x0)
bind$unix(r3, &(0x7f00000001c0)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x56)
ioctl$sock_SIOCOUTQNSD(r3, 0x894b, &(0x7f0000000100))
ioctl$RTC_PIE_OFF(r0, 0x7006)
r4 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0)
mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800004, 0x12, r4, 0x0)
preadv(r4, &(0x7f00000001c0)=[{0x0}], 0x1, 0x9, 0x0)
mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r4, 0x0)
r5 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x11, 0x9, &(0x7f0000000380)=@raw=[@initr0={0x18, 0x0, 0x0, 0x0, 0x10000, 0x0, 0x0, 0x0, 0x3}, @ldst={0x2, 0x1, 0x3, 0x7196d1492be6837c, 0x4, 0xfffffffffffffff4, 0x10}, @jmp={0x5, 0x1, 0xa, 0x6, 0x7, 0x75, 0x1}, @map={0x18, 0xa, 0x1, 0x0, r4}, @map, @ldst={0x1, 0x3, 0x2, 0x0, 0x6, 0x50}], &(0x7f00000001c0)='syzkaller\x00', 0x4, 0x8f, &(0x7f00000002c0)=""/143, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x74)
bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='ext4_es_lookup_extent_exit\x00', r5}, 0x10)
mmap(&(0x7f00006fe000/0x2000)=nil, 0x2000, 0x1000006, 0x50, r5, 0x6fdfe000)

06:18:51 executing program 1:
r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0)
mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800004, 0x12, r0, 0x0)
preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x9, 0x0)
vmsplice(r0, &(0x7f0000000240)=[{&(0x7f0000000080)="4ab1b8694a30bc0b64f0bf0fa59d6d6310a9fca4f5ca7242c45a43a3f790f1bb52f7d713fdc0e6dfa75a5fa7f39f0c693511ea6a67b64b56fa4550fb865102551e0de8881e54887a6391bc4677137a4e433d75874a6619ff219d8ab89c1fdd9fe0d5ae7f1b35994210b3700e36625640f808", 0x72}, {&(0x7f0000000100)="b4346c01f32075d5cdbe81dc2919a8983c8e9f197195a027c0b95dec78d35df6ebeb63bff0423813616d67337c30bab5b6fb29da1bb7c014982cb6715df37902afa71736216374d5265195d9de49c7b08ac58de319c21a5fd49d6a39aecbae4bd0f079aab13eb24843b657b3b9e2f1e2d0731f5e00a4bafcf845d00e210b9ebf51a2303fbc02c70c9d4c62d4849f61727ffdac8e7a0e5b4b92dc03aa3ec3e37067eda1f5ee14cea961ae21f23d6678", 0xaf}], 0x2, 0xd)
ioctl$EXT4_IOC_MIGRATE(r0, 0x6609)
mmap(&(0x7f0000000000/0xa000)=nil, 0xa000, 0x2, 0x2172, 0xffffffffffffffff, 0x0)
socketpair(0x1e, 0x80005, 0x0, &(0x7f0000000340)={<r1=>0x0, 0x0})
ioctl$BTRFS_IOC_SCRUB_PROGRESS(r1, 0xc400941d, &(0x7f0000000680)={0x0, 0x1000, 0x7, 0xb84d75b96df9382e})

06:18:51 executing program 0:
r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0)
mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800004, 0x12, r0, 0x0)
preadv(r0, &(0x7f00000001c0), 0x0, 0x9, 0x0)
mmap(&(0x7f0000000000/0xa000)=nil, 0xa000, 0x2, 0x2172, 0xffffffffffffffff, 0x0)
syz_mount_image$nilfs2(&(0x7f0000000180), &(0x7f0000000200)='./file0\x00', 0xd85, 0x7, &(0x7f00000006c0)=[{&(0x7f0000000240)="997c7e90471ec6786b6aa37fd8fbf290c011bee5642707bf7b126c36024e5e8f0d3d514aa1538eb70908eb3ac1a8a52e0ba29dab8884c189c9b68415aa0226e7c6a7ccf48ad20543b10360ab7ee9b247e4304d92f0ec7c0ba06d8160095660a0f12836e2033baed6228d464479ce22f2fadce176d0750fdc6ab1004eb9c4440707be1dc31c1ce11815d12f0d50eef6477341b3f6a4f364a1fccd68e2bcd2dba76227338cd6a1835a44", 0xa9, 0x8}, {&(0x7f0000000380)="3a79b76eed8bb53c1f5217cb4d40694fa75675b28af54d40304f697a1d04373a7ef7b09d46fa6365d222516dcc92d004bc937a22980c404bb5b5669f3dfd0e569079c03b2855be3337944aea4b03b03a3eb6d7", 0x53, 0x3}, {&(0x7f0000000400)="c8213af91316be74099fc072cc912017e77b8709c846cf00eb99c7c03cee58e25602e6ec0b4b42c8709e4447b0d23296a71661cdb6ea9b13d35ed3206f67e5559840f063e554ed7fcb842ab9b072197358b7a617cb0825abfabe3da9b022ecbe28ebcc22bd651a40dfcf4782be0c0c6d8adb8fdd7afce8c8659cc9eef1483eceb26a223fa9d591e28633e6bf6facd75e4295341e2ef3788284fc4482db16cab37de0c1adbf7fa07ad161ae875284778f49e15a052d875e", 0xb7, 0x80}, {&(0x7f00000004c0)="056b3e2d287f817e74a518293ea19b1196cccb376ac73cd7bbeccaced6f43aa9706b33d8ec56c58be0febb03dadec48add6a378f07f9053f1b6f33fe63a960502ad48232f0bee4a41509d7063d478768ab8ee0a90ebdb7c9bc326d54c8edad7e9d59641faf45c171e35f77f8c38a7563e1555c331a5a3e4da1ce59c0c697ebe071d527f24563165dafd23b45186c3d55251c825d0d7fd16b0f13a2f1321cddbcf231b398a88b19e3915ee544692c3559f42a", 0xb2, 0x6}, {&(0x7f0000000580)="8023d53ac815f8a84b84350b859e8673ed208a78bbfec2e35d6d4927707d5dd61106eb0321af3709c17fe7661323c51575e9c18d7b834c138636224eb1a7d75dd59d5c5d7411bdd4c2b07cf727643f52b1ca3e1680cde001be2f8334303e9f4191c2f9425472ca1ee6bac17fde09f0ce5fdf2e70d3c1a38b2d3e0e804f7df817b6a03e5e1ffea1ca7cd7", 0x8a, 0x8}, {&(0x7f0000000300)="fae83b83fc781c7715", 0x9, 0x8fe}, {&(0x7f0000000640)="96f1e3c89318e48db56867032dd1ba9b0ffeec69eb34236bd93b937c6bb7447840dc021e536b89aad4fe89ca2317f4fe2b36cbbdd8d72d841aee6f7b7be258352406775f169573cbf4da0bcf856f825233c5387a3a7cde778c057d591f2133c10e8b5bdb164577f492130acfc7", 0x6d, 0x5}], 0x802010, &(0x7f0000000740)={[{@order_relaxed}], [{@fsname}, {@fsuuid={'fsuuid', 0x3d, {[0x36, 0x38, 0x61, 0x64, 0x39, 0x38, 0x31, 0x37], 0x2d, [0x62, 0x61, 0x61, 0x63], 0x2d, [0x62, 0x39, 0x33, 0x35], 0x2d, [0x32, 0x37, 0x33, 0x61], 0x2d, [0x61, 0x39, 0x64, 0x65, 0x31, 0x8eb4bab6ccebb2ed, 0x64, 0x62]}}}]})

06:18:51 executing program 2:
r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0)
mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800004, 0x12, r0, 0x0)
preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x9, 0x0)
r1 = socket$unix(0x1, 0x1, 0x0)
bind$unix(r1, &(0x7f00000001c0)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x56)
mmap(&(0x7f0000000000/0xa000)=nil, 0xa000, 0x2, 0x2172, 0xffffffffffffffff, 0x0)
socketpair(0x29, 0x80005, 0x0, &(0x7f0000000340)={0x0, 0x0})

06:18:51 executing program 3:
r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0)
mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800004, 0x12, r0, 0x0)
preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x9, 0x0)
mmap(&(0x7f0000000000/0xa000)=nil, 0xa000, 0x2, 0x2172, 0xffffffffffffffff, 0x0)
r1 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x11, 0x4, &(0x7f00000000c0)=@framed={{}, [@call={0x85, 0x0, 0x0, 0x7b}]}, &(0x7f00000001c0)='syzkaller\x00', 0x4, 0x8f, &(0x7f00000002c0)=""/143, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78)
bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='ext4_es_lookup_extent_exit\x00', r1}, 0x10)
preadv(r1, &(0x7f0000000080)=[{&(0x7f0000000040)=""/12, 0xc}], 0x1, 0x36, 0x401)
socketpair(0x1e, 0x80005, 0x0, &(0x7f0000000340)={<r2=>0x0, 0x0})
close(r2)
r3 = socket$unix(0x1, 0x1, 0x0)
bind$unix(r3, &(0x7f00000001c0)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x56)
ioctl$sock_SIOCOUTQNSD(r3, 0x894b, &(0x7f0000000100))
ioctl$RTC_PIE_OFF(r0, 0x7006)
r4 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0)
mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800004, 0x12, r4, 0x0)
preadv(r4, &(0x7f00000001c0)=[{0x0}], 0x1, 0x9, 0x0)
mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r4, 0x0)
r5 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x11, 0x9, &(0x7f0000000380)=@raw=[@initr0={0x18, 0x0, 0x0, 0x0, 0x10000, 0x0, 0x0, 0x0, 0x3}, @ldst={0x2, 0x1, 0x3, 0x7196d1492be6837c, 0x4, 0xfffffffffffffff4, 0x10}, @jmp={0x5, 0x1, 0xa, 0x6, 0x7, 0x75, 0x1}, @map={0x18, 0xa, 0x1, 0x0, r4}, @map, @ldst={0x1, 0x3, 0x2, 0x0, 0x6, 0x50}], &(0x7f00000001c0)='syzkaller\x00', 0x4, 0x8f, &(0x7f00000002c0)=""/143, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x74)
bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='ext4_es_lookup_extent_exit\x00', r5}, 0x10)
mmap(&(0x7f00006fe000/0x2000)=nil, 0x2000, 0x1000006, 0x50, r5, 0x6fdfe000)

06:18:51 executing program 1:
r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0)
mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800004, 0x12, r0, 0x0)
preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x9, 0x0)
vmsplice(r0, &(0x7f0000000240)=[{&(0x7f0000000080)="4ab1b8694a30bc0b64f0bf0fa59d6d6310a9fca4f5ca7242c45a43a3f790f1bb52f7d713fdc0e6dfa75a5fa7f39f0c693511ea6a67b64b56fa4550fb865102551e0de8881e54887a6391bc4677137a4e433d75874a6619ff219d8ab89c1fdd9fe0d5ae7f1b35994210b3700e36625640f808", 0x72}, {&(0x7f0000000100)="b4346c01f32075d5cdbe81dc2919a8983c8e9f197195a027c0b95dec78d35df6ebeb63bff0423813616d67337c30bab5b6fb29da1bb7c014982cb6715df37902afa71736216374d5265195d9de49c7b08ac58de319c21a5fd49d6a39aecbae4bd0f079aab13eb24843b657b3b9e2f1e2d0731f5e00a4bafcf845d00e210b9ebf51a2303fbc02c70c9d4c62d4849f61727ffdac8e7a0e5b4b92dc03aa3ec3e37067eda1f5ee14cea961ae21f23d6678", 0xaf}], 0x2, 0xd)
ioctl$EXT4_IOC_MIGRATE(r0, 0x6609)
mmap(&(0x7f0000000000/0xa000)=nil, 0xa000, 0x2, 0x2172, 0xffffffffffffffff, 0x0)
socketpair(0x1e, 0x80005, 0x0, &(0x7f0000000340)={0x0, 0x0})

[  333.593175][T14741] loop0: detected capacity change from 0 to 8
06:18:51 executing program 2:
r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0)
mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800004, 0x12, r0, 0x0)
preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x9, 0x0)
socket$unix(0x1, 0x1, 0x0)
mmap(&(0x7f0000000000/0xa000)=nil, 0xa000, 0x2, 0x2172, 0xffffffffffffffff, 0x0)
socketpair(0x29, 0x80005, 0x0, &(0x7f0000000340)={0x0, 0x0})

06:18:51 executing program 1:
r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0)
mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800004, 0x12, r0, 0x0)
preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x9, 0x0)
vmsplice(r0, &(0x7f0000000240)=[{&(0x7f0000000080)="4ab1b8694a30bc0b64f0bf0fa59d6d6310a9fca4f5ca7242c45a43a3f790f1bb52f7d713fdc0e6dfa75a5fa7f39f0c693511ea6a67b64b56fa4550fb865102551e0de8881e54887a6391bc4677137a4e433d75874a6619ff219d8ab89c1fdd9fe0d5ae7f1b35994210b3700e36625640f808", 0x72}, {&(0x7f0000000100)="b4346c01f32075d5cdbe81dc2919a8983c8e9f197195a027c0b95dec78d35df6ebeb63bff0423813616d67337c30bab5b6fb29da1bb7c014982cb6715df37902afa71736216374d5265195d9de49c7b08ac58de319c21a5fd49d6a39aecbae4bd0f079aab13eb24843b657b3b9e2f1e2d0731f5e00a4bafcf845d00e210b9ebf51a2303fbc02c70c9d4c62d4849f61727ffdac8e7a0e5b4b92dc03aa3ec3e37067eda1f5ee14cea961ae21f23d6678", 0xaf}], 0x2, 0xd)
ioctl$EXT4_IOC_MIGRATE(r0, 0x6609)
mmap(&(0x7f0000000000/0xa000)=nil, 0xa000, 0x2, 0x2172, 0xffffffffffffffff, 0x0)

06:18:51 executing program 0:
r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0)
mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800004, 0x12, r0, 0x0)
preadv(r0, &(0x7f00000001c0), 0x0, 0x9, 0x0)
mmap(&(0x7f0000000000/0xa000)=nil, 0xa000, 0x2, 0x2172, 0xffffffffffffffff, 0x0)
syz_mount_image$nilfs2(&(0x7f0000000180), &(0x7f0000000200)='./file0\x00', 0xd85, 0x7, &(0x7f00000006c0)=[{&(0x7f0000000240)="997c7e90471ec6786b6aa37fd8fbf290c011bee5642707bf7b126c36024e5e8f0d3d514aa1538eb70908eb3ac1a8a52e0ba29dab8884c189c9b68415aa0226e7c6a7ccf48ad20543b10360ab7ee9b247e4304d92f0ec7c0ba06d8160095660a0f12836e2033baed6228d464479ce22f2fadce176d0750fdc6ab1004eb9c4440707be1dc31c1ce11815d12f0d50eef6477341b3f6a4f364a1fccd68e2bcd2dba76227338cd6a1835a44", 0xa9, 0x8}, {&(0x7f0000000380)="3a79b76eed8bb53c1f5217cb4d40694fa75675b28af54d40304f697a1d04373a7ef7b09d46fa6365d222516dcc92d004bc937a22980c404bb5b5669f3dfd0e569079c03b2855be3337944aea4b03b03a3eb6d7", 0x53, 0x3}, {&(0x7f0000000400)="c8213af91316be74099fc072cc912017e77b8709c846cf00eb99c7c03cee58e25602e6ec0b4b42c8709e4447b0d23296a71661cdb6ea9b13d35ed3206f67e5559840f063e554ed7fcb842ab9b072197358b7a617cb0825abfabe3da9b022ecbe28ebcc22bd651a40dfcf4782be0c0c6d8adb8fdd7afce8c8659cc9eef1483eceb26a223fa9d591e28633e6bf6facd75e4295341e2ef3788284fc4482db16cab37de0c1adbf7fa07ad161ae875284778f49e15a052d875e", 0xb7, 0x80}, {&(0x7f00000004c0)="056b3e2d287f817e74a518293ea19b1196cccb376ac73cd7bbeccaced6f43aa9706b33d8ec56c58be0febb03dadec48add6a378f07f9053f1b6f33fe63a960502ad48232f0bee4a41509d7063d478768ab8ee0a90ebdb7c9bc326d54c8edad7e9d59641faf45c171e35f77f8c38a7563e1555c331a5a3e4da1ce59c0c697ebe071d527f24563165dafd23b45186c3d55251c825d0d7fd16b0f13a2f1321cddbcf231b398a88b19e3915ee544692c3559f42a", 0xb2, 0x6}, {&(0x7f0000000580)="8023d53ac815f8a84b84350b859e8673ed208a78bbfec2e35d6d4927707d5dd61106eb0321af3709c17fe7661323c51575e9c18d7b834c138636224eb1a7d75dd59d5c5d7411bdd4c2b07cf727643f52b1ca3e1680cde001be2f8334303e9f4191c2f9425472ca1ee6bac17fde09f0ce5fdf2e70d3c1a38b2d3e0e804f7df817b6a03e5e1ffea1ca7cd7", 0x8a, 0x8}, {&(0x7f0000000300)="fae83b83fc781c7715", 0x9, 0x8fe}, {&(0x7f0000000640)="96f1e3c89318e48db56867032dd1ba9b0ffeec69eb34236bd93b937c6bb7447840dc021e536b89aad4fe89ca2317f4fe2b36cbbdd8d72d841aee6f7b7be258352406775f169573cbf4da0bcf856f825233c5387a3a7cde778c057d591f2133c10e8b5bdb164577f492130acfc7", 0x6d, 0x5}], 0x802010, &(0x7f0000000740)={[{@order_relaxed}], [{@fsname}, {@fsuuid={'fsuuid', 0x3d, {[0x36, 0x38, 0x61, 0x64, 0x39, 0x38, 0x31, 0x37], 0x2d, [0x62, 0x61, 0x61, 0x63], 0x2d, [0x62, 0x39, 0x33, 0x35], 0x2d, [0x32, 0x37, 0x33, 0x61], 0x2d, [0x61, 0x39, 0x64, 0x65, 0x31, 0x8eb4bab6ccebb2ed, 0x64, 0x62]}}}]})

06:18:51 executing program 2:
r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0)
mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800004, 0x12, r0, 0x0)
preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x9, 0x0)
mmap(&(0x7f0000000000/0xa000)=nil, 0xa000, 0x2, 0x2172, 0xffffffffffffffff, 0x0)
socketpair(0x29, 0x80005, 0x0, &(0x7f0000000340)={0x0, 0x0})

06:18:51 executing program 3:
r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0)
mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800004, 0x12, r0, 0x0)
preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x9, 0x0)
vmsplice(r0, &(0x7f0000000240)=[{&(0x7f0000000080)="4ab1b8694a30bc0b64f0bf0fa59d6d6310a9fca4f5ca7242c45a43a3f790f1bb52f7d713fdc0e6dfa75a5fa7f39f0c693511ea6a67b64b56fa4550fb865102551e0de8881e54887a6391bc4677137a4e433d75874a6619ff219d8ab89c1fdd9fe0d5ae7f1b35994210b3700e36625640f808", 0x72}, {&(0x7f0000000100)="b4346c01f32075d5cdbe81dc2919a8983c8e9f197195a027c0b95dec78d35df6ebeb63bff0423813616d67337c30bab5b6fb29da1bb7c014982cb6715df37902afa71736216374d5265195d9de49c7b08ac58de319c21a5fd49d6a39aecbae4bd0f079aab13eb24843b657b3b9e2f1e2d0731f5e00a4bafcf845d00e210b9ebf51a2303fbc02c70c9d4c62d4849f61727ffdac8e7a0e5b4b92dc03aa3ec3e37067eda1f5ee14cea961ae21f23d6678", 0xaf}], 0x2, 0xd)
ioctl$EXT4_IOC_MIGRATE(r0, 0x6609)
mmap(&(0x7f0000000000/0xa000)=nil, 0xa000, 0x2, 0x2172, 0xffffffffffffffff, 0x0)
socketpair(0x1e, 0x80005, 0x0, &(0x7f0000000340)={0x0, 0x0})

06:18:51 executing program 1:
r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0)
mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800004, 0x12, r0, 0x0)
preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x9, 0x0)
vmsplice(r0, &(0x7f0000000240)=[{&(0x7f0000000080)="4ab1b8694a30bc0b64f0bf0fa59d6d6310a9fca4f5ca7242c45a43a3f790f1bb52f7d713fdc0e6dfa75a5fa7f39f0c693511ea6a67b64b56fa4550fb865102551e0de8881e54887a6391bc4677137a4e433d75874a6619ff219d8ab89c1fdd9fe0d5ae7f1b35994210b3700e36625640f808", 0x72}, {&(0x7f0000000100)="b4346c01f32075d5cdbe81dc2919a8983c8e9f197195a027c0b95dec78d35df6ebeb63bff0423813616d67337c30bab5b6fb29da1bb7c014982cb6715df37902afa71736216374d5265195d9de49c7b08ac58de319c21a5fd49d6a39aecbae4bd0f079aab13eb24843b657b3b9e2f1e2d0731f5e00a4bafcf845d00e210b9ebf51a2303fbc02c70c9d4c62d4849f61727ffdac8e7a0e5b4b92dc03aa3ec3e37067eda1f5ee14cea961ae21f23d6678", 0xaf}], 0x2, 0xd)
ioctl$EXT4_IOC_MIGRATE(r0, 0x6609)

[  333.734966][T14756] loop0: detected capacity change from 0 to 8
06:18:51 executing program 2:
r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0)
mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800004, 0x12, r0, 0x0)
mmap(&(0x7f0000000000/0xa000)=nil, 0xa000, 0x2, 0x2172, 0xffffffffffffffff, 0x0)
socketpair(0x29, 0x80005, 0x0, &(0x7f0000000340)={0x0, 0x0})

06:18:51 executing program 3:
r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0)
mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800004, 0x12, r0, 0x0)
preadv(r0, 0x0, 0x0, 0x9, 0x0)
mmap(&(0x7f0000000000/0xa000)=nil, 0xa000, 0x2, 0x2172, 0xffffffffffffffff, 0x0)
syz_mount_image$nilfs2(&(0x7f0000000180), &(0x7f0000000200)='./file0\x00', 0xd85, 0x7, &(0x7f00000006c0)=[{&(0x7f0000000240)="997c7e90471ec6786b6aa37fd8fbf290c011bee5642707bf7b126c36024e5e8f0d3d514aa1538eb70908eb3ac1a8a52e0ba29dab8884c189c9b68415aa0226e7c6a7ccf48ad20543b10360ab7ee9b247e4304d92f0ec7c0ba06d8160095660a0f12836e2033baed6228d464479ce22f2fadce176d0750fdc6ab1004eb9c4440707be1dc31c1ce11815d12f0d50eef6477341b3f6a4f364a1fccd68e2bcd2dba76227338cd6a1835a44", 0xa9, 0x8}, {&(0x7f0000000380)="3a79b76eed8bb53c1f5217cb4d40694fa75675b28af54d40304f697a1d04373a7ef7b09d46fa6365d222516dcc92d004bc937a22980c404bb5b5669f3dfd0e569079c03b2855be3337944aea4b03b03a3eb6d7", 0x53, 0x3}, {&(0x7f0000000400)="c8213af91316be74099fc072cc912017e77b8709c846cf00eb99c7c03cee58e25602e6ec0b4b42c8709e4447b0d23296a71661cdb6ea9b13d35ed3206f67e5559840f063e554ed7fcb842ab9b072197358b7a617cb0825abfabe3da9b022ecbe28ebcc22bd651a40dfcf4782be0c0c6d8adb8fdd7afce8c8659cc9eef1483eceb26a223fa9d591e28633e6bf6facd75e4295341e2ef3788284fc4482db16cab37de0c1adbf7fa07ad161ae875284778f49e15a052d875e", 0xb7, 0x80}, {&(0x7f00000004c0)="056b3e2d287f817e74a518293ea19b1196cccb376ac73cd7bbeccaced6f43aa9706b33d8ec56c58be0febb03dadec48add6a378f07f9053f1b6f33fe63a960502ad48232f0bee4a41509d7063d478768ab8ee0a90ebdb7c9bc326d54c8edad7e9d59641faf45c171e35f77f8c38a7563e1555c331a5a3e4da1ce59c0c697ebe071d527f24563165dafd23b45186c3d55251c825d0d7fd16b0f13a2f1321cddbcf231b398a88b19e3915ee544692c3559f42a", 0xb2, 0x6}, {&(0x7f0000000580)="8023d53ac815f8a84b84350b859e8673ed208a78bbfec2e35d6d4927707d5dd61106eb0321af3709c17fe7661323c51575e9c18d7b834c138636224eb1a7d75dd59d5c5d7411bdd4c2b07cf727643f52b1ca3e1680cde001be2f8334303e9f4191c2f9425472ca1ee6bac17fde09f0ce5fdf2e70d3c1a38b2d3e0e804f7df817b6a03e5e1ffea1ca7cd7", 0x8a, 0x8}, {&(0x7f0000000300)="fae83b83fc781c7715", 0x9, 0x8fe}, {&(0x7f0000000640)="96f1e3c89318e48db56867032dd1ba9b0ffeec69eb34236bd93b937c6bb7447840dc021e536b89aad4fe89ca2317f4fe2b36cbbdd8d72d841aee6f7b7be258352406775f169573cbf4da0bcf856f825233c5387a3a7cde778c057d591f2133c10e8b5bdb164577f492130acfc7", 0x6d, 0x5}], 0x802010, &(0x7f0000000740)={[{@order_relaxed}], [{@fsname}, {@fsuuid={'fsuuid', 0x3d, {[0x36, 0x38, 0x61, 0x64, 0x39, 0x38, 0x31, 0x37], 0x2d, [0x62, 0x61, 0x61, 0x63], 0x2d, [0x62, 0x39, 0x33, 0x35], 0x2d, [0x32, 0x37, 0x33, 0x61], 0x2d, [0x61, 0x39, 0x64, 0x65, 0x31, 0x8eb4bab6ccebb2ed, 0x64, 0x62]}}}]})

06:18:51 executing program 1:
r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0)
mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800004, 0x12, r0, 0x0)
preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x9, 0x0)
vmsplice(r0, &(0x7f0000000240)=[{&(0x7f0000000080)="4ab1b8694a30bc0b64f0bf0fa59d6d6310a9fca4f5ca7242c45a43a3f790f1bb52f7d713fdc0e6dfa75a5fa7f39f0c693511ea6a67b64b56fa4550fb865102551e0de8881e54887a6391bc4677137a4e433d75874a6619ff219d8ab89c1fdd9fe0d5ae7f1b35994210b3700e36625640f808", 0x72}, {&(0x7f0000000100)="b4346c01f32075d5cdbe81dc2919a8983c8e9f197195a027c0b95dec78d35df6ebeb63bff0423813616d67337c30bab5b6fb29da1bb7c014982cb6715df37902afa71736216374d5265195d9de49c7b08ac58de319c21a5fd49d6a39aecbae4bd0f079aab13eb24843b657b3b9e2f1e2d0731f5e00a4bafcf845d00e210b9ebf51a2303fbc02c70c9d4c62d4849f61727ffdac8e7a0e5b4b92dc03aa3ec3e37067eda1f5ee14cea961ae21f23d6678", 0xaf}], 0x2, 0xd)

06:18:51 executing program 2:
r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0)
mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800004, 0x12, r0, 0x0)
mmap(&(0x7f0000000000/0xa000)=nil, 0xa000, 0x2, 0x2172, 0xffffffffffffffff, 0x0)
socketpair(0x29, 0x80005, 0x0, &(0x7f0000000340)={0x0, 0x0})

[  333.866210][T14767] loop3: detected capacity change from 0 to 8
06:18:51 executing program 0:
r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0)
mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800004, 0x12, r0, 0x0)
preadv(r0, &(0x7f00000001c0), 0x0, 0x9, 0x0)
mmap(&(0x7f0000000000/0xa000)=nil, 0xa000, 0x2, 0x2172, 0xffffffffffffffff, 0x0)
syz_mount_image$nilfs2(&(0x7f0000000180), &(0x7f0000000200)='./file0\x00', 0xd85, 0x7, &(0x7f00000006c0)=[{&(0x7f0000000240)="997c7e90471ec6786b6aa37fd8fbf290c011bee5642707bf7b126c36024e5e8f0d3d514aa1538eb70908eb3ac1a8a52e0ba29dab8884c189c9b68415aa0226e7c6a7ccf48ad20543b10360ab7ee9b247e4304d92f0ec7c0ba06d8160095660a0f12836e2033baed6228d464479ce22f2fadce176d0750fdc6ab1004eb9c4440707be1dc31c1ce11815d12f0d50eef6477341b3f6a4f364a1fccd68e2bcd2dba76227338cd6a1835a44", 0xa9, 0x8}, {&(0x7f0000000380)="3a79b76eed8bb53c1f5217cb4d40694fa75675b28af54d40304f697a1d04373a7ef7b09d46fa6365d222516dcc92d004bc937a22980c404bb5b5669f3dfd0e569079c03b2855be3337944aea4b03b03a3eb6d7", 0x53, 0x3}, {&(0x7f0000000400)="c8213af91316be74099fc072cc912017e77b8709c846cf00eb99c7c03cee58e25602e6ec0b4b42c8709e4447b0d23296a71661cdb6ea9b13d35ed3206f67e5559840f063e554ed7fcb842ab9b072197358b7a617cb0825abfabe3da9b022ecbe28ebcc22bd651a40dfcf4782be0c0c6d8adb8fdd7afce8c8659cc9eef1483eceb26a223fa9d591e28633e6bf6facd75e4295341e2ef3788284fc4482db16cab37de0c1adbf7fa07ad161ae875284778f49e15a052d875e", 0xb7, 0x80}, {&(0x7f00000004c0)="056b3e2d287f817e74a518293ea19b1196cccb376ac73cd7bbeccaced6f43aa9706b33d8ec56c58be0febb03dadec48add6a378f07f9053f1b6f33fe63a960502ad48232f0bee4a41509d7063d478768ab8ee0a90ebdb7c9bc326d54c8edad7e9d59641faf45c171e35f77f8c38a7563e1555c331a5a3e4da1ce59c0c697ebe071d527f24563165dafd23b45186c3d55251c825d0d7fd16b0f13a2f1321cddbcf231b398a88b19e3915ee544692c3559f42a", 0xb2, 0x6}, {&(0x7f0000000580)="8023d53ac815f8a84b84350b859e8673ed208a78bbfec2e35d6d4927707d5dd61106eb0321af3709c17fe7661323c51575e9c18d7b834c138636224eb1a7d75dd59d5c5d7411bdd4c2b07cf727643f52b1ca3e1680cde001be2f8334303e9f4191c2f9425472ca1ee6bac17fde09f0ce5fdf2e70d3c1a38b2d3e0e804f7df817b6a03e5e1ffea1ca7cd7", 0x8a, 0x8}, {&(0x7f0000000300)="fae83b83fc781c7715", 0x9, 0x8fe}, {&(0x7f0000000640)="96f1e3c89318e48db56867032dd1ba9b0ffeec69eb34236bd93b937c6bb7447840dc021e536b89aad4fe89ca2317f4fe2b36cbbdd8d72d841aee6f7b7be258352406775f169573cbf4da0bcf856f825233c5387a3a7cde778c057d591f2133c10e8b5bdb164577f492130acfc7", 0x6d, 0x5}], 0x802010, &(0x7f0000000740)={[{@order_relaxed}], [{@fsname}, {@fsuuid={'fsuuid', 0x3d, {[0x36, 0x38, 0x61, 0x64, 0x39, 0x38, 0x31, 0x37], 0x2d, [0x62, 0x61, 0x61, 0x63], 0x2d, [0x62, 0x39, 0x33, 0x35], 0x2d, [0x32, 0x37, 0x33, 0x61], 0x2d, [0x61, 0x39, 0x64, 0x65, 0x31, 0x8eb4bab6ccebb2ed, 0x64, 0x62]}}}]})

06:18:51 executing program 2:
r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0)
mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800004, 0x12, r0, 0x0)
mmap(&(0x7f0000000000/0xa000)=nil, 0xa000, 0x2, 0x2172, 0xffffffffffffffff, 0x0)
socketpair(0x29, 0x80005, 0x0, &(0x7f0000000340)={0x0, 0x0})

06:18:51 executing program 1:
r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0)
mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800004, 0x12, r0, 0x0)
vmsplice(r0, &(0x7f0000000240)=[{&(0x7f0000000080)="4ab1b8694a30bc0b64f0bf0fa59d6d6310a9fca4f5ca7242c45a43a3f790f1bb52f7d713fdc0e6dfa75a5fa7f39f0c693511ea6a67b64b56fa4550fb865102551e0de8881e54887a6391bc4677137a4e433d75874a6619ff219d8ab89c1fdd9fe0d5ae7f1b35994210b3700e36625640f808", 0x72}, {&(0x7f0000000100)="b4346c01f32075d5cdbe81dc2919a8983c8e9f197195a027c0b95dec78d35df6ebeb63bff0423813616d67337c30bab5b6fb29da1bb7c014982cb6715df37902afa71736216374d5265195d9de49c7b08ac58de319c21a5fd49d6a39aecbae4bd0f079aab13eb24843b657b3b9e2f1e2d0731f5e00a4bafcf845d00e210b9ebf51a2303fbc02c70c9d4c62d4849f61727ffdac8e7a0e5b4b92dc03aa3ec3e37067eda1f5ee14cea961ae21f23d6678", 0xaf}], 0x2, 0xd)

06:18:51 executing program 3:
r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0)
mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800004, 0x12, r0, 0x0)
preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x9, 0x0)
mmap(&(0x7f0000000000/0xa000)=nil, 0xa000, 0x2, 0x2172, 0xffffffffffffffff, 0x0)
r1 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x11, 0x4, &(0x7f00000000c0)=@framed={{}, [@call={0x85, 0x0, 0x0, 0x7b}]}, &(0x7f00000001c0)='syzkaller\x00', 0x4, 0x8f, &(0x7f00000002c0)=""/143, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78)
bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='ext4_es_lookup_extent_exit\x00', r1}, 0x10)
preadv(r1, &(0x7f0000000080)=[{&(0x7f0000000040)=""/12, 0xc}], 0x1, 0x36, 0x401)
socketpair(0x1e, 0x80005, 0x0, &(0x7f0000000340)={<r2=>0x0, 0x0})
close(r2)
r3 = socket$unix(0x1, 0x1, 0x0)
bind$unix(r3, &(0x7f00000001c0)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x56)
ioctl$sock_SIOCOUTQNSD(r3, 0x894b, &(0x7f0000000100))
ioctl$RTC_PIE_OFF(r0, 0x7006)
r4 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0)
mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800004, 0x12, r4, 0x0)
preadv(r4, &(0x7f00000001c0)=[{0x0}], 0x1, 0x9, 0x0)
mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r4, 0x0)
r5 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x11, 0x9, &(0x7f0000000380)=@raw=[@initr0={0x18, 0x0, 0x0, 0x0, 0x10000, 0x0, 0x0, 0x0, 0x3}, @ldst={0x2, 0x1, 0x3, 0x7196d1492be6837c, 0x4, 0xfffffffffffffff4, 0x10}, @jmp={0x5, 0x1, 0xa, 0x6, 0x7, 0x75, 0x1}, @map={0x18, 0xa, 0x1, 0x0, r4}, @map, @ldst={0x1, 0x3, 0x2, 0x0, 0x6, 0x50}], &(0x7f00000001c0)='syzkaller\x00', 0x4, 0x8f, &(0x7f00000002c0)=""/143, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x74)
bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='ext4_es_lookup_extent_exit\x00', r5}, 0x10)
mmap(&(0x7f00006fe000/0x2000)=nil, 0x2000, 0x1000006, 0x50, r5, 0x6fdfe000)

[  334.015516][T14780] loop0: detected capacity change from 0 to 8
06:18:51 executing program 2:
r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0)
preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x9, 0x0)
mmap(&(0x7f0000000000/0xa000)=nil, 0xa000, 0x2, 0x2172, 0xffffffffffffffff, 0x0)
socketpair(0x29, 0x80005, 0x0, &(0x7f0000000340)={0x0, 0x0})

06:18:51 executing program 1:
r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0)
mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800004, 0x12, r0, 0x0)
vmsplice(r0, &(0x7f0000000240)=[{&(0x7f0000000080)="4ab1b8694a30bc0b64f0bf0fa59d6d6310a9fca4f5ca7242c45a43a3f790f1bb52f7d713fdc0e6dfa75a5fa7f39f0c693511ea6a67b64b56fa4550fb865102551e0de8881e54887a6391bc4677137a4e433d75874a6619ff219d8ab89c1fdd9fe0d5ae7f1b35994210b3700e36625640f808", 0x72}, {&(0x7f0000000100)="b4346c01f32075d5cdbe81dc2919a8983c8e9f197195a027c0b95dec78d35df6ebeb63bff0423813616d67337c30bab5b6fb29da1bb7c014982cb6715df37902afa71736216374d5265195d9de49c7b08ac58de319c21a5fd49d6a39aecbae4bd0f079aab13eb24843b657b3b9e2f1e2d0731f5e00a4bafcf845d00e210b9ebf51a2303fbc02c70c9d4c62d4849f61727ffdac8e7a0e5b4b92dc03aa3ec3e37067eda1f5ee14cea961ae21f23d6678", 0xaf}], 0x2, 0xd)

06:18:51 executing program 1:
r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0)
mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800004, 0x12, r0, 0x0)
vmsplice(r0, &(0x7f0000000240)=[{&(0x7f0000000080)="4ab1b8694a30bc0b64f0bf0fa59d6d6310a9fca4f5ca7242c45a43a3f790f1bb52f7d713fdc0e6dfa75a5fa7f39f0c693511ea6a67b64b56fa4550fb865102551e0de8881e54887a6391bc4677137a4e433d75874a6619ff219d8ab89c1fdd9fe0d5ae7f1b35994210b3700e36625640f808", 0x72}, {&(0x7f0000000100)="b4346c01f32075d5cdbe81dc2919a8983c8e9f197195a027c0b95dec78d35df6ebeb63bff0423813616d67337c30bab5b6fb29da1bb7c014982cb6715df37902afa71736216374d5265195d9de49c7b08ac58de319c21a5fd49d6a39aecbae4bd0f079aab13eb24843b657b3b9e2f1e2d0731f5e00a4bafcf845d00e210b9ebf51a2303fbc02c70c9d4c62d4849f61727ffdac8e7a0e5b4b92dc03aa3ec3e37067eda1f5ee14cea961ae21f23d6678", 0xaf}], 0x2, 0xd)

06:18:51 executing program 3:
r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0)
mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800004, 0x12, r0, 0x0)
preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x9, 0x0)
mmap(&(0x7f0000000000/0xa000)=nil, 0xa000, 0x2, 0x2172, 0xffffffffffffffff, 0x0)
r1 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x11, 0x4, &(0x7f00000000c0)=@framed={{}, [@call={0x85, 0x0, 0x0, 0x7b}]}, &(0x7f00000001c0)='syzkaller\x00', 0x4, 0x8f, &(0x7f00000002c0)=""/143, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78)
bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='ext4_es_lookup_extent_exit\x00', r1}, 0x10)
preadv(r1, &(0x7f0000000080)=[{&(0x7f0000000040)=""/12, 0xc}], 0x1, 0x36, 0x401)
socketpair(0x1e, 0x80005, 0x0, &(0x7f0000000340)={<r2=>0x0, 0x0})
close(r2)
r3 = socket$unix(0x1, 0x1, 0x0)
bind$unix(r3, &(0x7f00000001c0)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x56)
ioctl$sock_SIOCOUTQNSD(r3, 0x894b, &(0x7f0000000100))
ioctl$RTC_PIE_OFF(r0, 0x7006)
r4 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0)
mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800004, 0x12, r4, 0x0)
preadv(r4, &(0x7f00000001c0)=[{0x0}], 0x1, 0x9, 0x0)
mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r4, 0x0)
r5 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x11, 0x9, &(0x7f0000000380)=@raw=[@initr0={0x18, 0x0, 0x0, 0x0, 0x10000, 0x0, 0x0, 0x0, 0x3}, @ldst={0x2, 0x1, 0x3, 0x7196d1492be6837c, 0x4, 0xfffffffffffffff4, 0x10}, @jmp={0x5, 0x1, 0xa, 0x6, 0x7, 0x75, 0x1}, @map={0x18, 0xa, 0x1, 0x0, r4}, @map, @ldst={0x1, 0x3, 0x2, 0x0, 0x6, 0x50}], &(0x7f00000001c0)='syzkaller\x00', 0x4, 0x8f, &(0x7f00000002c0)=""/143, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x74)
bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='ext4_es_lookup_extent_exit\x00', r5}, 0x10)
mmap(&(0x7f00006fe000/0x2000)=nil, 0x2000, 0x1000006, 0x50, r5, 0x6fdfe000)

06:18:51 executing program 0:
r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0)
mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800004, 0x12, r0, 0x0)
preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x0, 0x0)
mmap(&(0x7f0000000000/0xa000)=nil, 0xa000, 0x2, 0x2172, 0xffffffffffffffff, 0x0)
syz_mount_image$nilfs2(&(0x7f0000000180), &(0x7f0000000200)='./file0\x00', 0xd85, 0x7, &(0x7f00000006c0)=[{&(0x7f0000000240)="997c7e90471ec6786b6aa37fd8fbf290c011bee5642707bf7b126c36024e5e8f0d3d514aa1538eb70908eb3ac1a8a52e0ba29dab8884c189c9b68415aa0226e7c6a7ccf48ad20543b10360ab7ee9b247e4304d92f0ec7c0ba06d8160095660a0f12836e2033baed6228d464479ce22f2fadce176d0750fdc6ab1004eb9c4440707be1dc31c1ce11815d12f0d50eef6477341b3f6a4f364a1fccd68e2bcd2dba76227338cd6a1835a44", 0xa9, 0x8}, {&(0x7f0000000380)="3a79b76eed8bb53c1f5217cb4d40694fa75675b28af54d40304f697a1d04373a7ef7b09d46fa6365d222516dcc92d004bc937a22980c404bb5b5669f3dfd0e569079c03b2855be3337944aea4b03b03a3eb6d7", 0x53, 0x3}, {&(0x7f0000000400)="c8213af91316be74099fc072cc912017e77b8709c846cf00eb99c7c03cee58e25602e6ec0b4b42c8709e4447b0d23296a71661cdb6ea9b13d35ed3206f67e5559840f063e554ed7fcb842ab9b072197358b7a617cb0825abfabe3da9b022ecbe28ebcc22bd651a40dfcf4782be0c0c6d8adb8fdd7afce8c8659cc9eef1483eceb26a223fa9d591e28633e6bf6facd75e4295341e2ef3788284fc4482db16cab37de0c1adbf7fa07ad161ae875284778f49e15a052d875e", 0xb7, 0x80}, {&(0x7f00000004c0)="056b3e2d287f817e74a518293ea19b1196cccb376ac73cd7bbeccaced6f43aa9706b33d8ec56c58be0febb03dadec48add6a378f07f9053f1b6f33fe63a960502ad48232f0bee4a41509d7063d478768ab8ee0a90ebdb7c9bc326d54c8edad7e9d59641faf45c171e35f77f8c38a7563e1555c331a5a3e4da1ce59c0c697ebe071d527f24563165dafd23b45186c3d55251c825d0d7fd16b0f13a2f1321cddbcf231b398a88b19e3915ee544692c3559f42a", 0xb2, 0x6}, {&(0x7f0000000580)="8023d53ac815f8a84b84350b859e8673ed208a78bbfec2e35d6d4927707d5dd61106eb0321af3709c17fe7661323c51575e9c18d7b834c138636224eb1a7d75dd59d5c5d7411bdd4c2b07cf727643f52b1ca3e1680cde001be2f8334303e9f4191c2f9425472ca1ee6bac17fde09f0ce5fdf2e70d3c1a38b2d3e0e804f7df817b6a03e5e1ffea1ca7cd7", 0x8a, 0x8}, {&(0x7f0000000300)="fae83b83fc781c7715", 0x9, 0x8fe}, {&(0x7f0000000640)="96f1e3c89318e48db56867032dd1ba9b0ffeec69eb34236bd93b937c6bb7447840dc021e536b89aad4fe89ca2317f4fe2b36cbbdd8d72d841aee6f7b7be258352406775f169573cbf4da0bcf856f825233c5387a3a7cde778c057d591f2133c10e8b5bdb164577f492130acfc7", 0x6d, 0x5}], 0x802010, &(0x7f0000000740)={[{@order_relaxed}], [{@fsname}, {@fsuuid={'fsuuid', 0x3d, {[0x36, 0x38, 0x61, 0x64, 0x39, 0x38, 0x31, 0x37], 0x2d, [0x62, 0x61, 0x61, 0x63], 0x2d, [0x62, 0x39, 0x33, 0x35], 0x2d, [0x32, 0x37, 0x33, 0x61], 0x2d, [0x61, 0x39, 0x64, 0x65, 0x31, 0x8eb4bab6ccebb2ed, 0x64, 0x62]}}}]})

06:18:51 executing program 2:
r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0)
preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x9, 0x0)
mmap(&(0x7f0000000000/0xa000)=nil, 0xa000, 0x2, 0x2172, 0xffffffffffffffff, 0x0)
socketpair(0x29, 0x80005, 0x0, &(0x7f0000000340)={0x0, 0x0})

06:18:51 executing program 1:
r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0)
preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x9, 0x0)
vmsplice(r0, &(0x7f0000000240)=[{&(0x7f0000000080)="4ab1b8694a30bc0b64f0bf0fa59d6d6310a9fca4f5ca7242c45a43a3f790f1bb52f7d713fdc0e6dfa75a5fa7f39f0c693511ea6a67b64b56fa4550fb865102551e0de8881e54887a6391bc4677137a4e433d75874a6619ff219d8ab89c1fdd9fe0d5ae7f1b35994210b3700e36625640f808", 0x72}, {&(0x7f0000000100)="b4346c01f32075d5cdbe81dc2919a8983c8e9f197195a027c0b95dec78d35df6ebeb63bff0423813616d67337c30bab5b6fb29da1bb7c014982cb6715df37902afa71736216374d5265195d9de49c7b08ac58de319c21a5fd49d6a39aecbae4bd0f079aab13eb24843b657b3b9e2f1e2d0731f5e00a4bafcf845d00e210b9ebf51a2303fbc02c70c9d4c62d4849f61727ffdac8e7a0e5b4b92dc03aa3ec3e37067eda1f5ee14cea961ae21f23d6678", 0xaf}], 0x2, 0xd)

[  334.166370][T14799] loop0: detected capacity change from 0 to 8
06:18:51 executing program 2:
r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0)
preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x9, 0x0)
mmap(&(0x7f0000000000/0xa000)=nil, 0xa000, 0x2, 0x2172, 0xffffffffffffffff, 0x0)
socketpair(0x29, 0x80005, 0x0, &(0x7f0000000340)={0x0, 0x0})

06:18:51 executing program 0:
r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0)
mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800004, 0x12, r0, 0x0)
preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x0, 0x0)
mmap(&(0x7f0000000000/0xa000)=nil, 0xa000, 0x2, 0x2172, 0xffffffffffffffff, 0x0)
syz_mount_image$nilfs2(&(0x7f0000000180), &(0x7f0000000200)='./file0\x00', 0xd85, 0x7, &(0x7f00000006c0)=[{&(0x7f0000000240)="997c7e90471ec6786b6aa37fd8fbf290c011bee5642707bf7b126c36024e5e8f0d3d514aa1538eb70908eb3ac1a8a52e0ba29dab8884c189c9b68415aa0226e7c6a7ccf48ad20543b10360ab7ee9b247e4304d92f0ec7c0ba06d8160095660a0f12836e2033baed6228d464479ce22f2fadce176d0750fdc6ab1004eb9c4440707be1dc31c1ce11815d12f0d50eef6477341b3f6a4f364a1fccd68e2bcd2dba76227338cd6a1835a44", 0xa9, 0x8}, {&(0x7f0000000380)="3a79b76eed8bb53c1f5217cb4d40694fa75675b28af54d40304f697a1d04373a7ef7b09d46fa6365d222516dcc92d004bc937a22980c404bb5b5669f3dfd0e569079c03b2855be3337944aea4b03b03a3eb6d7", 0x53, 0x3}, {&(0x7f0000000400)="c8213af91316be74099fc072cc912017e77b8709c846cf00eb99c7c03cee58e25602e6ec0b4b42c8709e4447b0d23296a71661cdb6ea9b13d35ed3206f67e5559840f063e554ed7fcb842ab9b072197358b7a617cb0825abfabe3da9b022ecbe28ebcc22bd651a40dfcf4782be0c0c6d8adb8fdd7afce8c8659cc9eef1483eceb26a223fa9d591e28633e6bf6facd75e4295341e2ef3788284fc4482db16cab37de0c1adbf7fa07ad161ae875284778f49e15a052d875e", 0xb7, 0x80}, {&(0x7f00000004c0)="056b3e2d287f817e74a518293ea19b1196cccb376ac73cd7bbeccaced6f43aa9706b33d8ec56c58be0febb03dadec48add6a378f07f9053f1b6f33fe63a960502ad48232f0bee4a41509d7063d478768ab8ee0a90ebdb7c9bc326d54c8edad7e9d59641faf45c171e35f77f8c38a7563e1555c331a5a3e4da1ce59c0c697ebe071d527f24563165dafd23b45186c3d55251c825d0d7fd16b0f13a2f1321cddbcf231b398a88b19e3915ee544692c3559f42a", 0xb2, 0x6}, {&(0x7f0000000580)="8023d53ac815f8a84b84350b859e8673ed208a78bbfec2e35d6d4927707d5dd61106eb0321af3709c17fe7661323c51575e9c18d7b834c138636224eb1a7d75dd59d5c5d7411bdd4c2b07cf727643f52b1ca3e1680cde001be2f8334303e9f4191c2f9425472ca1ee6bac17fde09f0ce5fdf2e70d3c1a38b2d3e0e804f7df817b6a03e5e1ffea1ca7cd7", 0x8a, 0x8}, {&(0x7f0000000300)="fae83b83fc781c7715", 0x9, 0x8fe}, {&(0x7f0000000640)="96f1e3c89318e48db56867032dd1ba9b0ffeec69eb34236bd93b937c6bb7447840dc021e536b89aad4fe89ca2317f4fe2b36cbbdd8d72d841aee6f7b7be258352406775f169573cbf4da0bcf856f825233c5387a3a7cde778c057d591f2133c10e8b5bdb164577f492130acfc7", 0x6d, 0x5}], 0x802010, &(0x7f0000000740)={[{@order_relaxed}], [{@fsname}, {@fsuuid={'fsuuid', 0x3d, {[0x36, 0x38, 0x61, 0x64, 0x39, 0x38, 0x31, 0x37], 0x2d, [0x62, 0x61, 0x61, 0x63], 0x2d, [0x62, 0x39, 0x33, 0x35], 0x2d, [0x32, 0x37, 0x33, 0x61], 0x2d, [0x61, 0x39, 0x64, 0x65, 0x31, 0x8eb4bab6ccebb2ed, 0x64, 0x62]}}}]})

06:18:51 executing program 3:
r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0)
mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800004, 0x12, r0, 0x0)
preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x9, 0x0)
mmap(&(0x7f0000000000/0xa000)=nil, 0xa000, 0x2, 0x2172, 0xffffffffffffffff, 0x0)
r1 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x11, 0x4, &(0x7f00000000c0)=@framed={{}, [@call={0x85, 0x0, 0x0, 0x7b}]}, &(0x7f00000001c0)='syzkaller\x00', 0x4, 0x8f, &(0x7f00000002c0)=""/143, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78)
bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='ext4_es_lookup_extent_exit\x00', r1}, 0x10)
preadv(r1, &(0x7f0000000080)=[{&(0x7f0000000040)=""/12, 0xc}], 0x1, 0x36, 0x401)
socketpair(0x1e, 0x80005, 0x0, &(0x7f0000000340)={<r2=>0x0, 0x0})
close(r2)
r3 = socket$unix(0x1, 0x1, 0x0)
bind$unix(r3, &(0x7f00000001c0)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x56)
ioctl$sock_SIOCOUTQNSD(r3, 0x894b, &(0x7f0000000100))
ioctl$RTC_PIE_OFF(r0, 0x7006)
r4 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0)
mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800004, 0x12, r4, 0x0)
preadv(r4, &(0x7f00000001c0)=[{0x0}], 0x1, 0x9, 0x0)
mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r4, 0x0)
r5 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x11, 0x9, &(0x7f0000000380)=@raw=[@initr0={0x18, 0x0, 0x0, 0x0, 0x10000, 0x0, 0x0, 0x0, 0x3}, @ldst={0x2, 0x1, 0x3, 0x7196d1492be6837c, 0x4, 0xfffffffffffffff4, 0x10}, @jmp={0x5, 0x1, 0xa, 0x6, 0x7, 0x75, 0x1}, @map={0x18, 0xa, 0x1, 0x0, r4}, @map, @ldst={0x1, 0x3, 0x2, 0x0, 0x6, 0x50}], &(0x7f00000001c0)='syzkaller\x00', 0x4, 0x8f, &(0x7f00000002c0)=""/143, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x74)
bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='ext4_es_lookup_extent_exit\x00', r5}, 0x10)
mmap(&(0x7f00006fe000/0x2000)=nil, 0x2000, 0x1000006, 0x50, r5, 0x6fdfe000)

06:18:51 executing program 2:
mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800004, 0x12, 0xffffffffffffffff, 0x0)
preadv(0xffffffffffffffff, &(0x7f00000001c0)=[{0x0}], 0x1, 0x9, 0x0)
mmap(&(0x7f0000000000/0xa000)=nil, 0xa000, 0x2, 0x2172, 0xffffffffffffffff, 0x0)
socketpair(0x29, 0x80005, 0x0, &(0x7f0000000340)={0x0, 0x0})

06:18:51 executing program 1:
r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0)
preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x9, 0x0)
vmsplice(r0, &(0x7f0000000240)=[{&(0x7f0000000080)="4ab1b8694a30bc0b64f0bf0fa59d6d6310a9fca4f5ca7242c45a43a3f790f1bb52f7d713fdc0e6dfa75a5fa7f39f0c693511ea6a67b64b56fa4550fb865102551e0de8881e54887a6391bc4677137a4e433d75874a6619ff219d8ab89c1fdd9fe0d5ae7f1b35994210b3700e36625640f808", 0x72}, {&(0x7f0000000100)="b4346c01f32075d5cdbe81dc2919a8983c8e9f197195a027c0b95dec78d35df6ebeb63bff0423813616d67337c30bab5b6fb29da1bb7c014982cb6715df37902afa71736216374d5265195d9de49c7b08ac58de319c21a5fd49d6a39aecbae4bd0f079aab13eb24843b657b3b9e2f1e2d0731f5e00a4bafcf845d00e210b9ebf51a2303fbc02c70c9d4c62d4849f61727ffdac8e7a0e5b4b92dc03aa3ec3e37067eda1f5ee14cea961ae21f23d6678", 0xaf}], 0x2, 0xd)

[  334.319500][T14810] loop0: detected capacity change from 0 to 8
06:18:51 executing program 2:
mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800004, 0x12, 0xffffffffffffffff, 0x0)
preadv(0xffffffffffffffff, &(0x7f00000001c0)=[{0x0}], 0x1, 0x9, 0x0)
mmap(&(0x7f0000000000/0xa000)=nil, 0xa000, 0x2, 0x2172, 0xffffffffffffffff, 0x0)
socketpair(0x29, 0x80005, 0x0, &(0x7f0000000340)={0x0, 0x0})

06:18:51 executing program 1:
r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0)
preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x9, 0x0)
vmsplice(r0, &(0x7f0000000240)=[{&(0x7f0000000080)="4ab1b8694a30bc0b64f0bf0fa59d6d6310a9fca4f5ca7242c45a43a3f790f1bb52f7d713fdc0e6dfa75a5fa7f39f0c693511ea6a67b64b56fa4550fb865102551e0de8881e54887a6391bc4677137a4e433d75874a6619ff219d8ab89c1fdd9fe0d5ae7f1b35994210b3700e36625640f808", 0x72}, {&(0x7f0000000100)="b4346c01f32075d5cdbe81dc2919a8983c8e9f197195a027c0b95dec78d35df6ebeb63bff0423813616d67337c30bab5b6fb29da1bb7c014982cb6715df37902afa71736216374d5265195d9de49c7b08ac58de319c21a5fd49d6a39aecbae4bd0f079aab13eb24843b657b3b9e2f1e2d0731f5e00a4bafcf845d00e210b9ebf51a2303fbc02c70c9d4c62d4849f61727ffdac8e7a0e5b4b92dc03aa3ec3e37067eda1f5ee14cea961ae21f23d6678", 0xaf}], 0x2, 0xd)

06:18:52 executing program 2:
mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800004, 0x12, 0xffffffffffffffff, 0x0)
preadv(0xffffffffffffffff, &(0x7f00000001c0)=[{0x0}], 0x1, 0x9, 0x0)
mmap(&(0x7f0000000000/0xa000)=nil, 0xa000, 0x2, 0x2172, 0xffffffffffffffff, 0x0)
socketpair(0x29, 0x80005, 0x0, &(0x7f0000000340)={0x0, 0x0})

06:18:52 executing program 3:
r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0)
mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800004, 0x12, r0, 0x0)
preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x9, 0x0)
mmap(&(0x7f0000000000/0xa000)=nil, 0xa000, 0x2, 0x2172, 0xffffffffffffffff, 0x0)
r1 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x11, 0x4, &(0x7f00000000c0)=@framed={{}, [@call={0x85, 0x0, 0x0, 0x7b}]}, &(0x7f00000001c0)='syzkaller\x00', 0x4, 0x8f, &(0x7f00000002c0)=""/143, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78)
bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='ext4_es_lookup_extent_exit\x00', r1}, 0x10)
preadv(r1, &(0x7f0000000080)=[{&(0x7f0000000040)=""/12, 0xc}], 0x1, 0x36, 0x401)
socketpair(0x1e, 0x80005, 0x0, &(0x7f0000000340)={<r2=>0x0, 0x0})
close(r2)
r3 = socket$unix(0x1, 0x1, 0x0)
bind$unix(r3, &(0x7f00000001c0)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x56)
ioctl$sock_SIOCOUTQNSD(r3, 0x894b, &(0x7f0000000100))
ioctl$RTC_PIE_OFF(r0, 0x7006)
r4 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0)
mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800004, 0x12, r4, 0x0)
preadv(r4, &(0x7f00000001c0)=[{0x0}], 0x1, 0x9, 0x0)
mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r4, 0x0)
r5 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x11, 0x9, &(0x7f0000000380)=@raw=[@initr0={0x18, 0x0, 0x0, 0x0, 0x10000, 0x0, 0x0, 0x0, 0x3}, @ldst={0x2, 0x1, 0x3, 0x7196d1492be6837c, 0x4, 0xfffffffffffffff4, 0x10}, @jmp={0x5, 0x1, 0xa, 0x6, 0x7, 0x75, 0x1}, @map={0x18, 0xa, 0x1, 0x0, r4}, @map, @ldst={0x1, 0x3, 0x2, 0x0, 0x6, 0x50}], &(0x7f00000001c0)='syzkaller\x00', 0x4, 0x8f, &(0x7f00000002c0)=""/143, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x74)
bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='ext4_es_lookup_extent_exit\x00', r5}, 0x10)

06:18:52 executing program 0:
r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0)
mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800004, 0x12, r0, 0x0)
preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x0, 0x0)
mmap(&(0x7f0000000000/0xa000)=nil, 0xa000, 0x2, 0x2172, 0xffffffffffffffff, 0x0)
syz_mount_image$nilfs2(&(0x7f0000000180), &(0x7f0000000200)='./file0\x00', 0xd85, 0x7, &(0x7f00000006c0)=[{&(0x7f0000000240)="997c7e90471ec6786b6aa37fd8fbf290c011bee5642707bf7b126c36024e5e8f0d3d514aa1538eb70908eb3ac1a8a52e0ba29dab8884c189c9b68415aa0226e7c6a7ccf48ad20543b10360ab7ee9b247e4304d92f0ec7c0ba06d8160095660a0f12836e2033baed6228d464479ce22f2fadce176d0750fdc6ab1004eb9c4440707be1dc31c1ce11815d12f0d50eef6477341b3f6a4f364a1fccd68e2bcd2dba76227338cd6a1835a44", 0xa9, 0x8}, {&(0x7f0000000380)="3a79b76eed8bb53c1f5217cb4d40694fa75675b28af54d40304f697a1d04373a7ef7b09d46fa6365d222516dcc92d004bc937a22980c404bb5b5669f3dfd0e569079c03b2855be3337944aea4b03b03a3eb6d7", 0x53, 0x3}, {&(0x7f0000000400)="c8213af91316be74099fc072cc912017e77b8709c846cf00eb99c7c03cee58e25602e6ec0b4b42c8709e4447b0d23296a71661cdb6ea9b13d35ed3206f67e5559840f063e554ed7fcb842ab9b072197358b7a617cb0825abfabe3da9b022ecbe28ebcc22bd651a40dfcf4782be0c0c6d8adb8fdd7afce8c8659cc9eef1483eceb26a223fa9d591e28633e6bf6facd75e4295341e2ef3788284fc4482db16cab37de0c1adbf7fa07ad161ae875284778f49e15a052d875e", 0xb7, 0x80}, {&(0x7f00000004c0)="056b3e2d287f817e74a518293ea19b1196cccb376ac73cd7bbeccaced6f43aa9706b33d8ec56c58be0febb03dadec48add6a378f07f9053f1b6f33fe63a960502ad48232f0bee4a41509d7063d478768ab8ee0a90ebdb7c9bc326d54c8edad7e9d59641faf45c171e35f77f8c38a7563e1555c331a5a3e4da1ce59c0c697ebe071d527f24563165dafd23b45186c3d55251c825d0d7fd16b0f13a2f1321cddbcf231b398a88b19e3915ee544692c3559f42a", 0xb2, 0x6}, {&(0x7f0000000580)="8023d53ac815f8a84b84350b859e8673ed208a78bbfec2e35d6d4927707d5dd61106eb0321af3709c17fe7661323c51575e9c18d7b834c138636224eb1a7d75dd59d5c5d7411bdd4c2b07cf727643f52b1ca3e1680cde001be2f8334303e9f4191c2f9425472ca1ee6bac17fde09f0ce5fdf2e70d3c1a38b2d3e0e804f7df817b6a03e5e1ffea1ca7cd7", 0x8a, 0x8}, {&(0x7f0000000300)="fae83b83fc781c7715", 0x9, 0x8fe}, {&(0x7f0000000640)="96f1e3c89318e48db56867032dd1ba9b0ffeec69eb34236bd93b937c6bb7447840dc021e536b89aad4fe89ca2317f4fe2b36cbbdd8d72d841aee6f7b7be258352406775f169573cbf4da0bcf856f825233c5387a3a7cde778c057d591f2133c10e8b5bdb164577f492130acfc7", 0x6d, 0x5}], 0x802010, &(0x7f0000000740)={[{@order_relaxed}], [{@fsname}, {@fsuuid={'fsuuid', 0x3d, {[0x36, 0x38, 0x61, 0x64, 0x39, 0x38, 0x31, 0x37], 0x2d, [0x62, 0x61, 0x61, 0x63], 0x2d, [0x62, 0x39, 0x33, 0x35], 0x2d, [0x32, 0x37, 0x33, 0x61], 0x2d, [0x61, 0x39, 0x64, 0x65, 0x31, 0x8eb4bab6ccebb2ed, 0x64, 0x62]}}}]})

06:18:52 executing program 1:
mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800004, 0x12, 0xffffffffffffffff, 0x0)
preadv(0xffffffffffffffff, &(0x7f00000001c0)=[{0x0}], 0x1, 0x9, 0x0)
vmsplice(0xffffffffffffffff, &(0x7f0000000240)=[{&(0x7f0000000080)="4ab1b8694a30bc0b64f0bf0fa59d6d6310a9fca4f5ca7242c45a43a3f790f1bb52f7d713fdc0e6dfa75a5fa7f39f0c693511ea6a67b64b56fa4550fb865102551e0de8881e54887a6391bc4677137a4e433d75874a6619ff219d8ab89c1fdd9fe0d5ae7f1b35994210b3700e36625640f808", 0x72}, {&(0x7f0000000100)="b4346c01f32075d5cdbe81dc2919a8983c8e9f197195a027c0b95dec78d35df6ebeb63bff0423813616d67337c30bab5b6fb29da1bb7c014982cb6715df37902afa71736216374d5265195d9de49c7b08ac58de319c21a5fd49d6a39aecbae4bd0f079aab13eb24843b657b3b9e2f1e2d0731f5e00a4bafcf845d00e210b9ebf51a2303fbc02c70c9d4c62d4849f61727ffdac8e7a0e5b4b92dc03aa3ec3e37067eda1f5ee14cea961ae21f23d6678", 0xaf}], 0x2, 0xd)

06:18:52 executing program 3:
r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0)
mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800004, 0x12, r0, 0x0)
preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x9, 0x0)
mmap(&(0x7f0000000000/0xa000)=nil, 0xa000, 0x2, 0x2172, 0xffffffffffffffff, 0x0)
r1 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x11, 0x4, &(0x7f00000000c0)=@framed={{}, [@call={0x85, 0x0, 0x0, 0x7b}]}, &(0x7f00000001c0)='syzkaller\x00', 0x4, 0x8f, &(0x7f00000002c0)=""/143, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78)
bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='ext4_es_lookup_extent_exit\x00', r1}, 0x10)
preadv(r1, &(0x7f0000000080)=[{&(0x7f0000000040)=""/12, 0xc}], 0x1, 0x36, 0x401)
socketpair(0x1e, 0x80005, 0x0, &(0x7f0000000340)={<r2=>0x0, 0x0})
close(r2)
r3 = socket$unix(0x1, 0x1, 0x0)
bind$unix(r3, &(0x7f00000001c0)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x56)
ioctl$sock_SIOCOUTQNSD(r3, 0x894b, &(0x7f0000000100))
ioctl$RTC_PIE_OFF(r0, 0x7006)
r4 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0)
mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800004, 0x12, r4, 0x0)
preadv(r4, &(0x7f00000001c0)=[{0x0}], 0x1, 0x9, 0x0)
mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r4, 0x0)
bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x11, 0x9, &(0x7f0000000380)=@raw=[@initr0={0x18, 0x0, 0x0, 0x0, 0x10000, 0x0, 0x0, 0x0, 0x3}, @ldst={0x2, 0x1, 0x3, 0x7196d1492be6837c, 0x4, 0xfffffffffffffff4, 0x10}, @jmp={0x5, 0x1, 0xa, 0x6, 0x7, 0x75, 0x1}, @map={0x18, 0xa, 0x1, 0x0, r4}, @map, @ldst={0x1, 0x3, 0x2, 0x0, 0x6, 0x50}], &(0x7f00000001c0)='syzkaller\x00', 0x4, 0x8f, &(0x7f00000002c0)=""/143, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x74)

[  334.487283][T14827] loop0: detected capacity change from 0 to 8
06:18:52 executing program 2:
r0 = openat(0xffffffffffffffff, 0x0, 0x0, 0x0)
mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800004, 0x12, r0, 0x0)
preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x9, 0x0)
mmap(&(0x7f0000000000/0xa000)=nil, 0xa000, 0x2, 0x2172, 0xffffffffffffffff, 0x0)
socketpair(0x29, 0x80005, 0x0, &(0x7f0000000340)={0x0, 0x0})

06:18:52 executing program 1:
mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800004, 0x12, 0xffffffffffffffff, 0x0)
preadv(0xffffffffffffffff, &(0x7f00000001c0)=[{0x0}], 0x1, 0x9, 0x0)
vmsplice(0xffffffffffffffff, &(0x7f0000000240)=[{&(0x7f0000000080)="4ab1b8694a30bc0b64f0bf0fa59d6d6310a9fca4f5ca7242c45a43a3f790f1bb52f7d713fdc0e6dfa75a5fa7f39f0c693511ea6a67b64b56fa4550fb865102551e0de8881e54887a6391bc4677137a4e433d75874a6619ff219d8ab89c1fdd9fe0d5ae7f1b35994210b3700e36625640f808", 0x72}, {&(0x7f0000000100)="b4346c01f32075d5cdbe81dc2919a8983c8e9f197195a027c0b95dec78d35df6ebeb63bff0423813616d67337c30bab5b6fb29da1bb7c014982cb6715df37902afa71736216374d5265195d9de49c7b08ac58de319c21a5fd49d6a39aecbae4bd0f079aab13eb24843b657b3b9e2f1e2d0731f5e00a4bafcf845d00e210b9ebf51a2303fbc02c70c9d4c62d4849f61727ffdac8e7a0e5b4b92dc03aa3ec3e37067eda1f5ee14cea961ae21f23d6678", 0xaf}], 0x2, 0xd)

06:18:52 executing program 2:
r0 = openat(0xffffffffffffffff, 0x0, 0x0, 0x0)
mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800004, 0x12, r0, 0x0)
preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x9, 0x0)
mmap(&(0x7f0000000000/0xa000)=nil, 0xa000, 0x2, 0x2172, 0xffffffffffffffff, 0x0)
socketpair(0x29, 0x80005, 0x0, &(0x7f0000000340)={0x0, 0x0})

06:18:52 executing program 0:
r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0)
mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800004, 0x12, r0, 0x0)
preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x9, 0x0)
mmap(&(0x7f0000000000/0xa000)=nil, 0xa000, 0x0, 0x2172, 0xffffffffffffffff, 0x0)
syz_mount_image$nilfs2(&(0x7f0000000180), &(0x7f0000000200)='./file0\x00', 0xd85, 0x7, &(0x7f00000006c0)=[{&(0x7f0000000240)="997c7e90471ec6786b6aa37fd8fbf290c011bee5642707bf7b126c36024e5e8f0d3d514aa1538eb70908eb3ac1a8a52e0ba29dab8884c189c9b68415aa0226e7c6a7ccf48ad20543b10360ab7ee9b247e4304d92f0ec7c0ba06d8160095660a0f12836e2033baed6228d464479ce22f2fadce176d0750fdc6ab1004eb9c4440707be1dc31c1ce11815d12f0d50eef6477341b3f6a4f364a1fccd68e2bcd2dba76227338cd6a1835a44", 0xa9, 0x8}, {&(0x7f0000000380)="3a79b76eed8bb53c1f5217cb4d40694fa75675b28af54d40304f697a1d04373a7ef7b09d46fa6365d222516dcc92d004bc937a22980c404bb5b5669f3dfd0e569079c03b2855be3337944aea4b03b03a3eb6d7", 0x53, 0x3}, {&(0x7f0000000400)="c8213af91316be74099fc072cc912017e77b8709c846cf00eb99c7c03cee58e25602e6ec0b4b42c8709e4447b0d23296a71661cdb6ea9b13d35ed3206f67e5559840f063e554ed7fcb842ab9b072197358b7a617cb0825abfabe3da9b022ecbe28ebcc22bd651a40dfcf4782be0c0c6d8adb8fdd7afce8c8659cc9eef1483eceb26a223fa9d591e28633e6bf6facd75e4295341e2ef3788284fc4482db16cab37de0c1adbf7fa07ad161ae875284778f49e15a052d875e", 0xb7, 0x80}, {&(0x7f00000004c0)="056b3e2d287f817e74a518293ea19b1196cccb376ac73cd7bbeccaced6f43aa9706b33d8ec56c58be0febb03dadec48add6a378f07f9053f1b6f33fe63a960502ad48232f0bee4a41509d7063d478768ab8ee0a90ebdb7c9bc326d54c8edad7e9d59641faf45c171e35f77f8c38a7563e1555c331a5a3e4da1ce59c0c697ebe071d527f24563165dafd23b45186c3d55251c825d0d7fd16b0f13a2f1321cddbcf231b398a88b19e3915ee544692c3559f42a", 0xb2, 0x6}, {&(0x7f0000000580)="8023d53ac815f8a84b84350b859e8673ed208a78bbfec2e35d6d4927707d5dd61106eb0321af3709c17fe7661323c51575e9c18d7b834c138636224eb1a7d75dd59d5c5d7411bdd4c2b07cf727643f52b1ca3e1680cde001be2f8334303e9f4191c2f9425472ca1ee6bac17fde09f0ce5fdf2e70d3c1a38b2d3e0e804f7df817b6a03e5e1ffea1ca7cd7", 0x8a, 0x8}, {&(0x7f0000000300)="fae83b83fc781c7715", 0x9, 0x8fe}, {&(0x7f0000000640)="96f1e3c89318e48db56867032dd1ba9b0ffeec69eb34236bd93b937c6bb7447840dc021e536b89aad4fe89ca2317f4fe2b36cbbdd8d72d841aee6f7b7be258352406775f169573cbf4da0bcf856f825233c5387a3a7cde778c057d591f2133c10e8b5bdb164577f492130acfc7", 0x6d, 0x5}], 0x802010, &(0x7f0000000740)={[{@order_relaxed}], [{@fsname}, {@fsuuid={'fsuuid', 0x3d, {[0x36, 0x38, 0x61, 0x64, 0x39, 0x38, 0x31, 0x37], 0x2d, [0x62, 0x61, 0x61, 0x63], 0x2d, [0x62, 0x39, 0x33, 0x35], 0x2d, [0x32, 0x37, 0x33, 0x61], 0x2d, [0x61, 0x39, 0x64, 0x65, 0x31, 0x8eb4bab6ccebb2ed, 0x64, 0x62]}}}]})

06:18:52 executing program 3:
r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0)
mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800004, 0x12, r0, 0x0)
preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x9, 0x0)
mmap(&(0x7f0000000000/0xa000)=nil, 0xa000, 0x2, 0x2172, 0xffffffffffffffff, 0x0)
r1 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x11, 0x4, &(0x7f00000000c0)=@framed={{}, [@call={0x85, 0x0, 0x0, 0x7b}]}, &(0x7f00000001c0)='syzkaller\x00', 0x4, 0x8f, &(0x7f00000002c0)=""/143, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78)
bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='ext4_es_lookup_extent_exit\x00', r1}, 0x10)
preadv(r1, &(0x7f0000000080)=[{&(0x7f0000000040)=""/12, 0xc}], 0x1, 0x36, 0x401)
socketpair(0x1e, 0x80005, 0x0, &(0x7f0000000340)={<r2=>0x0, 0x0})
close(r2)
r3 = socket$unix(0x1, 0x1, 0x0)
bind$unix(r3, &(0x7f00000001c0)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x56)
ioctl$sock_SIOCOUTQNSD(r3, 0x894b, &(0x7f0000000100))
ioctl$RTC_PIE_OFF(r0, 0x7006)
r4 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0)
mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800004, 0x12, r4, 0x0)
preadv(r4, &(0x7f00000001c0)=[{0x0}], 0x1, 0x9, 0x0)
mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r4, 0x0)

06:18:52 executing program 2:
r0 = openat(0xffffffffffffffff, 0x0, 0x0, 0x0)
mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800004, 0x12, r0, 0x0)
preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x9, 0x0)
mmap(&(0x7f0000000000/0xa000)=nil, 0xa000, 0x2, 0x2172, 0xffffffffffffffff, 0x0)
socketpair(0x29, 0x80005, 0x0, &(0x7f0000000340)={0x0, 0x0})

06:18:52 executing program 1:
mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800004, 0x12, 0xffffffffffffffff, 0x0)
preadv(0xffffffffffffffff, &(0x7f00000001c0)=[{0x0}], 0x1, 0x9, 0x0)
vmsplice(0xffffffffffffffff, &(0x7f0000000240)=[{&(0x7f0000000080)="4ab1b8694a30bc0b64f0bf0fa59d6d6310a9fca4f5ca7242c45a43a3f790f1bb52f7d713fdc0e6dfa75a5fa7f39f0c693511ea6a67b64b56fa4550fb865102551e0de8881e54887a6391bc4677137a4e433d75874a6619ff219d8ab89c1fdd9fe0d5ae7f1b35994210b3700e36625640f808", 0x72}, {&(0x7f0000000100)="b4346c01f32075d5cdbe81dc2919a8983c8e9f197195a027c0b95dec78d35df6ebeb63bff0423813616d67337c30bab5b6fb29da1bb7c014982cb6715df37902afa71736216374d5265195d9de49c7b08ac58de319c21a5fd49d6a39aecbae4bd0f079aab13eb24843b657b3b9e2f1e2d0731f5e00a4bafcf845d00e210b9ebf51a2303fbc02c70c9d4c62d4849f61727ffdac8e7a0e5b4b92dc03aa3ec3e37067eda1f5ee14cea961ae21f23d6678", 0xaf}], 0x2, 0xd)

06:18:52 executing program 0:
r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0)
mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800004, 0x12, r0, 0x0)
preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x9, 0x0)
mmap(&(0x7f0000000000/0xa000)=nil, 0xa000, 0x0, 0x2172, 0xffffffffffffffff, 0x0)
syz_mount_image$nilfs2(&(0x7f0000000180), &(0x7f0000000200)='./file0\x00', 0xd85, 0x7, &(0x7f00000006c0)=[{&(0x7f0000000240)="997c7e90471ec6786b6aa37fd8fbf290c011bee5642707bf7b126c36024e5e8f0d3d514aa1538eb70908eb3ac1a8a52e0ba29dab8884c189c9b68415aa0226e7c6a7ccf48ad20543b10360ab7ee9b247e4304d92f0ec7c0ba06d8160095660a0f12836e2033baed6228d464479ce22f2fadce176d0750fdc6ab1004eb9c4440707be1dc31c1ce11815d12f0d50eef6477341b3f6a4f364a1fccd68e2bcd2dba76227338cd6a1835a44", 0xa9, 0x8}, {&(0x7f0000000380)="3a79b76eed8bb53c1f5217cb4d40694fa75675b28af54d40304f697a1d04373a7ef7b09d46fa6365d222516dcc92d004bc937a22980c404bb5b5669f3dfd0e569079c03b2855be3337944aea4b03b03a3eb6d7", 0x53, 0x3}, {&(0x7f0000000400)="c8213af91316be74099fc072cc912017e77b8709c846cf00eb99c7c03cee58e25602e6ec0b4b42c8709e4447b0d23296a71661cdb6ea9b13d35ed3206f67e5559840f063e554ed7fcb842ab9b072197358b7a617cb0825abfabe3da9b022ecbe28ebcc22bd651a40dfcf4782be0c0c6d8adb8fdd7afce8c8659cc9eef1483eceb26a223fa9d591e28633e6bf6facd75e4295341e2ef3788284fc4482db16cab37de0c1adbf7fa07ad161ae875284778f49e15a052d875e", 0xb7, 0x80}, {&(0x7f00000004c0)="056b3e2d287f817e74a518293ea19b1196cccb376ac73cd7bbeccaced6f43aa9706b33d8ec56c58be0febb03dadec48add6a378f07f9053f1b6f33fe63a960502ad48232f0bee4a41509d7063d478768ab8ee0a90ebdb7c9bc326d54c8edad7e9d59641faf45c171e35f77f8c38a7563e1555c331a5a3e4da1ce59c0c697ebe071d527f24563165dafd23b45186c3d55251c825d0d7fd16b0f13a2f1321cddbcf231b398a88b19e3915ee544692c3559f42a", 0xb2, 0x6}, {&(0x7f0000000580)="8023d53ac815f8a84b84350b859e8673ed208a78bbfec2e35d6d4927707d5dd61106eb0321af3709c17fe7661323c51575e9c18d7b834c138636224eb1a7d75dd59d5c5d7411bdd4c2b07cf727643f52b1ca3e1680cde001be2f8334303e9f4191c2f9425472ca1ee6bac17fde09f0ce5fdf2e70d3c1a38b2d3e0e804f7df817b6a03e5e1ffea1ca7cd7", 0x8a, 0x8}, {&(0x7f0000000300)="fae83b83fc781c7715", 0x9, 0x8fe}, {&(0x7f0000000640)="96f1e3c89318e48db56867032dd1ba9b0ffeec69eb34236bd93b937c6bb7447840dc021e536b89aad4fe89ca2317f4fe2b36cbbdd8d72d841aee6f7b7be258352406775f169573cbf4da0bcf856f825233c5387a3a7cde778c057d591f2133c10e8b5bdb164577f492130acfc7", 0x6d, 0x5}], 0x802010, &(0x7f0000000740)={[{@order_relaxed}], [{@fsname}, {@fsuuid={'fsuuid', 0x3d, {[0x36, 0x38, 0x61, 0x64, 0x39, 0x38, 0x31, 0x37], 0x2d, [0x62, 0x61, 0x61, 0x63], 0x2d, [0x62, 0x39, 0x33, 0x35], 0x2d, [0x32, 0x37, 0x33, 0x61], 0x2d, [0x61, 0x39, 0x64, 0x65, 0x31, 0x8eb4bab6ccebb2ed, 0x64, 0x62]}}}]})

06:18:52 executing program 3:
r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0)
mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800004, 0x12, r0, 0x0)
preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x9, 0x0)
mmap(&(0x7f0000000000/0xa000)=nil, 0xa000, 0x2, 0x2172, 0xffffffffffffffff, 0x0)
r1 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x11, 0x4, &(0x7f00000000c0)=@framed={{}, [@call={0x85, 0x0, 0x0, 0x7b}]}, &(0x7f00000001c0)='syzkaller\x00', 0x4, 0x8f, &(0x7f00000002c0)=""/143, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78)
bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='ext4_es_lookup_extent_exit\x00', r1}, 0x10)
preadv(r1, &(0x7f0000000080)=[{&(0x7f0000000040)=""/12, 0xc}], 0x1, 0x36, 0x401)
socketpair(0x1e, 0x80005, 0x0, &(0x7f0000000340)={<r2=>0x0, 0x0})
close(r2)
r3 = socket$unix(0x1, 0x1, 0x0)
bind$unix(r3, &(0x7f00000001c0)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x56)
ioctl$sock_SIOCOUTQNSD(r3, 0x894b, &(0x7f0000000100))
ioctl$RTC_PIE_OFF(r0, 0x7006)
r4 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0)
mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800004, 0x12, r4, 0x0)
preadv(r4, &(0x7f00000001c0)=[{0x0}], 0x1, 0x9, 0x0)

06:18:52 executing program 2:
r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0)
mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x0, 0x12, r0, 0x0)
preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x9, 0x0)
mmap(&(0x7f0000000000/0xa000)=nil, 0xa000, 0x2, 0x2172, 0xffffffffffffffff, 0x0)
socketpair(0x29, 0x80005, 0x0, &(0x7f0000000340)={0x0, 0x0})

06:18:52 executing program 1:
r0 = openat(0xffffffffffffffff, 0x0, 0x0, 0x0)
mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800004, 0x12, r0, 0x0)
preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x9, 0x0)
vmsplice(r0, &(0x7f0000000240)=[{&(0x7f0000000080)="4ab1b8694a30bc0b64f0bf0fa59d6d6310a9fca4f5ca7242c45a43a3f790f1bb52f7d713fdc0e6dfa75a5fa7f39f0c693511ea6a67b64b56fa4550fb865102551e0de8881e54887a6391bc4677137a4e433d75874a6619ff219d8ab89c1fdd9fe0d5ae7f1b35994210b3700e36625640f808", 0x72}, {&(0x7f0000000100)="b4346c01f32075d5cdbe81dc2919a8983c8e9f197195a027c0b95dec78d35df6ebeb63bff0423813616d67337c30bab5b6fb29da1bb7c014982cb6715df37902afa71736216374d5265195d9de49c7b08ac58de319c21a5fd49d6a39aecbae4bd0f079aab13eb24843b657b3b9e2f1e2d0731f5e00a4bafcf845d00e210b9ebf51a2303fbc02c70c9d4c62d4849f61727ffdac8e7a0e5b4b92dc03aa3ec3e37067eda1f5ee14cea961ae21f23d6678", 0xaf}], 0x2, 0xd)

06:18:52 executing program 0:
r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0)
mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800004, 0x12, r0, 0x0)
preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x9, 0x0)
mmap(&(0x7f0000000000/0xa000)=nil, 0xa000, 0x0, 0x2172, 0xffffffffffffffff, 0x0)
syz_mount_image$nilfs2(&(0x7f0000000180), &(0x7f0000000200)='./file0\x00', 0xd85, 0x7, &(0x7f00000006c0)=[{&(0x7f0000000240)="997c7e90471ec6786b6aa37fd8fbf290c011bee5642707bf7b126c36024e5e8f0d3d514aa1538eb70908eb3ac1a8a52e0ba29dab8884c189c9b68415aa0226e7c6a7ccf48ad20543b10360ab7ee9b247e4304d92f0ec7c0ba06d8160095660a0f12836e2033baed6228d464479ce22f2fadce176d0750fdc6ab1004eb9c4440707be1dc31c1ce11815d12f0d50eef6477341b3f6a4f364a1fccd68e2bcd2dba76227338cd6a1835a44", 0xa9, 0x8}, {&(0x7f0000000380)="3a79b76eed8bb53c1f5217cb4d40694fa75675b28af54d40304f697a1d04373a7ef7b09d46fa6365d222516dcc92d004bc937a22980c404bb5b5669f3dfd0e569079c03b2855be3337944aea4b03b03a3eb6d7", 0x53, 0x3}, {&(0x7f0000000400)="c8213af91316be74099fc072cc912017e77b8709c846cf00eb99c7c03cee58e25602e6ec0b4b42c8709e4447b0d23296a71661cdb6ea9b13d35ed3206f67e5559840f063e554ed7fcb842ab9b072197358b7a617cb0825abfabe3da9b022ecbe28ebcc22bd651a40dfcf4782be0c0c6d8adb8fdd7afce8c8659cc9eef1483eceb26a223fa9d591e28633e6bf6facd75e4295341e2ef3788284fc4482db16cab37de0c1adbf7fa07ad161ae875284778f49e15a052d875e", 0xb7, 0x80}, {&(0x7f00000004c0)="056b3e2d287f817e74a518293ea19b1196cccb376ac73cd7bbeccaced6f43aa9706b33d8ec56c58be0febb03dadec48add6a378f07f9053f1b6f33fe63a960502ad48232f0bee4a41509d7063d478768ab8ee0a90ebdb7c9bc326d54c8edad7e9d59641faf45c171e35f77f8c38a7563e1555c331a5a3e4da1ce59c0c697ebe071d527f24563165dafd23b45186c3d55251c825d0d7fd16b0f13a2f1321cddbcf231b398a88b19e3915ee544692c3559f42a", 0xb2, 0x6}, {&(0x7f0000000580)="8023d53ac815f8a84b84350b859e8673ed208a78bbfec2e35d6d4927707d5dd61106eb0321af3709c17fe7661323c51575e9c18d7b834c138636224eb1a7d75dd59d5c5d7411bdd4c2b07cf727643f52b1ca3e1680cde001be2f8334303e9f4191c2f9425472ca1ee6bac17fde09f0ce5fdf2e70d3c1a38b2d3e0e804f7df817b6a03e5e1ffea1ca7cd7", 0x8a, 0x8}, {&(0x7f0000000300)="fae83b83fc781c7715", 0x9, 0x8fe}, {&(0x7f0000000640)="96f1e3c89318e48db56867032dd1ba9b0ffeec69eb34236bd93b937c6bb7447840dc021e536b89aad4fe89ca2317f4fe2b36cbbdd8d72d841aee6f7b7be258352406775f169573cbf4da0bcf856f825233c5387a3a7cde778c057d591f2133c10e8b5bdb164577f492130acfc7", 0x6d, 0x5}], 0x802010, &(0x7f0000000740)={[{@order_relaxed}], [{@fsname}, {@fsuuid={'fsuuid', 0x3d, {[0x36, 0x38, 0x61, 0x64, 0x39, 0x38, 0x31, 0x37], 0x2d, [0x62, 0x61, 0x61, 0x63], 0x2d, [0x62, 0x39, 0x33, 0x35], 0x2d, [0x32, 0x37, 0x33, 0x61], 0x2d, [0x61, 0x39, 0x64, 0x65, 0x31, 0x8eb4bab6ccebb2ed, 0x64, 0x62]}}}]})

06:18:52 executing program 1:
r0 = openat(0xffffffffffffffff, 0x0, 0x0, 0x0)
mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800004, 0x12, r0, 0x0)
preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x9, 0x0)
vmsplice(r0, &(0x7f0000000240)=[{&(0x7f0000000080)="4ab1b8694a30bc0b64f0bf0fa59d6d6310a9fca4f5ca7242c45a43a3f790f1bb52f7d713fdc0e6dfa75a5fa7f39f0c693511ea6a67b64b56fa4550fb865102551e0de8881e54887a6391bc4677137a4e433d75874a6619ff219d8ab89c1fdd9fe0d5ae7f1b35994210b3700e36625640f808", 0x72}, {&(0x7f0000000100)="b4346c01f32075d5cdbe81dc2919a8983c8e9f197195a027c0b95dec78d35df6ebeb63bff0423813616d67337c30bab5b6fb29da1bb7c014982cb6715df37902afa71736216374d5265195d9de49c7b08ac58de319c21a5fd49d6a39aecbae4bd0f079aab13eb24843b657b3b9e2f1e2d0731f5e00a4bafcf845d00e210b9ebf51a2303fbc02c70c9d4c62d4849f61727ffdac8e7a0e5b4b92dc03aa3ec3e37067eda1f5ee14cea961ae21f23d6678", 0xaf}], 0x2, 0xd)

06:18:52 executing program 2:
r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0)
mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x0, 0x12, r0, 0x0)
preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x9, 0x0)
mmap(&(0x7f0000000000/0xa000)=nil, 0xa000, 0x2, 0x2172, 0xffffffffffffffff, 0x0)
socketpair(0x29, 0x80005, 0x0, &(0x7f0000000340)={0x0, 0x0})

06:18:52 executing program 0:
r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0)
mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800004, 0x12, r0, 0x0)
preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x9, 0x0)
mmap(&(0x7f0000000000/0xa000)=nil, 0xa000, 0x2, 0x10, 0xffffffffffffffff, 0x0)
syz_mount_image$nilfs2(&(0x7f0000000180), &(0x7f0000000200)='./file0\x00', 0xd85, 0x7, &(0x7f00000006c0)=[{&(0x7f0000000240)="997c7e90471ec6786b6aa37fd8fbf290c011bee5642707bf7b126c36024e5e8f0d3d514aa1538eb70908eb3ac1a8a52e0ba29dab8884c189c9b68415aa0226e7c6a7ccf48ad20543b10360ab7ee9b247e4304d92f0ec7c0ba06d8160095660a0f12836e2033baed6228d464479ce22f2fadce176d0750fdc6ab1004eb9c4440707be1dc31c1ce11815d12f0d50eef6477341b3f6a4f364a1fccd68e2bcd2dba76227338cd6a1835a44", 0xa9, 0x8}, {&(0x7f0000000380)="3a79b76eed8bb53c1f5217cb4d40694fa75675b28af54d40304f697a1d04373a7ef7b09d46fa6365d222516dcc92d004bc937a22980c404bb5b5669f3dfd0e569079c03b2855be3337944aea4b03b03a3eb6d7", 0x53, 0x3}, {&(0x7f0000000400)="c8213af91316be74099fc072cc912017e77b8709c846cf00eb99c7c03cee58e25602e6ec0b4b42c8709e4447b0d23296a71661cdb6ea9b13d35ed3206f67e5559840f063e554ed7fcb842ab9b072197358b7a617cb0825abfabe3da9b022ecbe28ebcc22bd651a40dfcf4782be0c0c6d8adb8fdd7afce8c8659cc9eef1483eceb26a223fa9d591e28633e6bf6facd75e4295341e2ef3788284fc4482db16cab37de0c1adbf7fa07ad161ae875284778f49e15a052d875e", 0xb7, 0x80}, {&(0x7f00000004c0)="056b3e2d287f817e74a518293ea19b1196cccb376ac73cd7bbeccaced6f43aa9706b33d8ec56c58be0febb03dadec48add6a378f07f9053f1b6f33fe63a960502ad48232f0bee4a41509d7063d478768ab8ee0a90ebdb7c9bc326d54c8edad7e9d59641faf45c171e35f77f8c38a7563e1555c331a5a3e4da1ce59c0c697ebe071d527f24563165dafd23b45186c3d55251c825d0d7fd16b0f13a2f1321cddbcf231b398a88b19e3915ee544692c3559f42a", 0xb2, 0x6}, {&(0x7f0000000580)="8023d53ac815f8a84b84350b859e8673ed208a78bbfec2e35d6d4927707d5dd61106eb0321af3709c17fe7661323c51575e9c18d7b834c138636224eb1a7d75dd59d5c5d7411bdd4c2b07cf727643f52b1ca3e1680cde001be2f8334303e9f4191c2f9425472ca1ee6bac17fde09f0ce5fdf2e70d3c1a38b2d3e0e804f7df817b6a03e5e1ffea1ca7cd7", 0x8a, 0x8}, {&(0x7f0000000300)="fae83b83fc781c7715", 0x9, 0x8fe}, {&(0x7f0000000640)="96f1e3c89318e48db56867032dd1ba9b0ffeec69eb34236bd93b937c6bb7447840dc021e536b89aad4fe89ca2317f4fe2b36cbbdd8d72d841aee6f7b7be258352406775f169573cbf4da0bcf856f825233c5387a3a7cde778c057d591f2133c10e8b5bdb164577f492130acfc7", 0x6d, 0x5}], 0x802010, &(0x7f0000000740)={[{@order_relaxed}], [{@fsname}, {@fsuuid={'fsuuid', 0x3d, {[0x36, 0x38, 0x61, 0x64, 0x39, 0x38, 0x31, 0x37], 0x2d, [0x62, 0x61, 0x61, 0x63], 0x2d, [0x62, 0x39, 0x33, 0x35], 0x2d, [0x32, 0x37, 0x33, 0x61], 0x2d, [0x61, 0x39, 0x64, 0x65, 0x31, 0x8eb4bab6ccebb2ed, 0x64, 0x62]}}}]})

06:18:52 executing program 1:
r0 = openat(0xffffffffffffffff, 0x0, 0x0, 0x0)
mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800004, 0x12, r0, 0x0)
preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x9, 0x0)
vmsplice(r0, &(0x7f0000000240)=[{&(0x7f0000000080)="4ab1b8694a30bc0b64f0bf0fa59d6d6310a9fca4f5ca7242c45a43a3f790f1bb52f7d713fdc0e6dfa75a5fa7f39f0c693511ea6a67b64b56fa4550fb865102551e0de8881e54887a6391bc4677137a4e433d75874a6619ff219d8ab89c1fdd9fe0d5ae7f1b35994210b3700e36625640f808", 0x72}, {&(0x7f0000000100)="b4346c01f32075d5cdbe81dc2919a8983c8e9f197195a027c0b95dec78d35df6ebeb63bff0423813616d67337c30bab5b6fb29da1bb7c014982cb6715df37902afa71736216374d5265195d9de49c7b08ac58de319c21a5fd49d6a39aecbae4bd0f079aab13eb24843b657b3b9e2f1e2d0731f5e00a4bafcf845d00e210b9ebf51a2303fbc02c70c9d4c62d4849f61727ffdac8e7a0e5b4b92dc03aa3ec3e37067eda1f5ee14cea961ae21f23d6678", 0xaf}], 0x2, 0xd)

06:18:52 executing program 3:
r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0)
mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800004, 0x12, r0, 0x0)
preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x9, 0x0)
mmap(&(0x7f0000000000/0xa000)=nil, 0xa000, 0x2, 0x2172, 0xffffffffffffffff, 0x0)
r1 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x11, 0x4, &(0x7f00000000c0)=@framed={{}, [@call={0x85, 0x0, 0x0, 0x7b}]}, &(0x7f00000001c0)='syzkaller\x00', 0x4, 0x8f, &(0x7f00000002c0)=""/143, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78)
bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='ext4_es_lookup_extent_exit\x00', r1}, 0x10)
preadv(r1, &(0x7f0000000080)=[{&(0x7f0000000040)=""/12, 0xc}], 0x1, 0x36, 0x401)
socketpair(0x1e, 0x80005, 0x0, &(0x7f0000000340)={<r2=>0x0, 0x0})
close(r2)
r3 = socket$unix(0x1, 0x1, 0x0)
bind$unix(r3, &(0x7f00000001c0)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x56)
ioctl$sock_SIOCOUTQNSD(r3, 0x894b, &(0x7f0000000100))
ioctl$RTC_PIE_OFF(r0, 0x7006)
r4 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0)
mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800004, 0x12, r4, 0x0)

06:18:52 executing program 2:
r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0)
mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x0, 0x12, r0, 0x0)
preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x9, 0x0)
mmap(&(0x7f0000000000/0xa000)=nil, 0xa000, 0x2, 0x2172, 0xffffffffffffffff, 0x0)
socketpair(0x29, 0x80005, 0x0, &(0x7f0000000340)={0x0, 0x0})

06:18:52 executing program 0:
r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0)
mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800004, 0x12, r0, 0x0)
preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x9, 0x0)
mmap(&(0x7f0000000000/0xa000)=nil, 0xa000, 0x2, 0x10, 0xffffffffffffffff, 0x0)
syz_mount_image$nilfs2(&(0x7f0000000180), &(0x7f0000000200)='./file0\x00', 0xd85, 0x7, &(0x7f00000006c0)=[{&(0x7f0000000240)="997c7e90471ec6786b6aa37fd8fbf290c011bee5642707bf7b126c36024e5e8f0d3d514aa1538eb70908eb3ac1a8a52e0ba29dab8884c189c9b68415aa0226e7c6a7ccf48ad20543b10360ab7ee9b247e4304d92f0ec7c0ba06d8160095660a0f12836e2033baed6228d464479ce22f2fadce176d0750fdc6ab1004eb9c4440707be1dc31c1ce11815d12f0d50eef6477341b3f6a4f364a1fccd68e2bcd2dba76227338cd6a1835a44", 0xa9, 0x8}, {&(0x7f0000000380)="3a79b76eed8bb53c1f5217cb4d40694fa75675b28af54d40304f697a1d04373a7ef7b09d46fa6365d222516dcc92d004bc937a22980c404bb5b5669f3dfd0e569079c03b2855be3337944aea4b03b03a3eb6d7", 0x53, 0x3}, {&(0x7f0000000400)="c8213af91316be74099fc072cc912017e77b8709c846cf00eb99c7c03cee58e25602e6ec0b4b42c8709e4447b0d23296a71661cdb6ea9b13d35ed3206f67e5559840f063e554ed7fcb842ab9b072197358b7a617cb0825abfabe3da9b022ecbe28ebcc22bd651a40dfcf4782be0c0c6d8adb8fdd7afce8c8659cc9eef1483eceb26a223fa9d591e28633e6bf6facd75e4295341e2ef3788284fc4482db16cab37de0c1adbf7fa07ad161ae875284778f49e15a052d875e", 0xb7, 0x80}, {&(0x7f00000004c0)="056b3e2d287f817e74a518293ea19b1196cccb376ac73cd7bbeccaced6f43aa9706b33d8ec56c58be0febb03dadec48add6a378f07f9053f1b6f33fe63a960502ad48232f0bee4a41509d7063d478768ab8ee0a90ebdb7c9bc326d54c8edad7e9d59641faf45c171e35f77f8c38a7563e1555c331a5a3e4da1ce59c0c697ebe071d527f24563165dafd23b45186c3d55251c825d0d7fd16b0f13a2f1321cddbcf231b398a88b19e3915ee544692c3559f42a", 0xb2, 0x6}, {&(0x7f0000000580)="8023d53ac815f8a84b84350b859e8673ed208a78bbfec2e35d6d4927707d5dd61106eb0321af3709c17fe7661323c51575e9c18d7b834c138636224eb1a7d75dd59d5c5d7411bdd4c2b07cf727643f52b1ca3e1680cde001be2f8334303e9f4191c2f9425472ca1ee6bac17fde09f0ce5fdf2e70d3c1a38b2d3e0e804f7df817b6a03e5e1ffea1ca7cd7", 0x8a, 0x8}, {&(0x7f0000000300)="fae83b83fc781c7715", 0x9, 0x8fe}, {&(0x7f0000000640)="96f1e3c89318e48db56867032dd1ba9b0ffeec69eb34236bd93b937c6bb7447840dc021e536b89aad4fe89ca2317f4fe2b36cbbdd8d72d841aee6f7b7be258352406775f169573cbf4da0bcf856f825233c5387a3a7cde778c057d591f2133c10e8b5bdb164577f492130acfc7", 0x6d, 0x5}], 0x802010, &(0x7f0000000740)={[{@order_relaxed}], [{@fsname}, {@fsuuid={'fsuuid', 0x3d, {[0x36, 0x38, 0x61, 0x64, 0x39, 0x38, 0x31, 0x37], 0x2d, [0x62, 0x61, 0x61, 0x63], 0x2d, [0x62, 0x39, 0x33, 0x35], 0x2d, [0x32, 0x37, 0x33, 0x61], 0x2d, [0x61, 0x39, 0x64, 0x65, 0x31, 0x8eb4bab6ccebb2ed, 0x64, 0x62]}}}]})

06:18:52 executing program 1:
r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0)
mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x0, 0x12, r0, 0x0)
preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x9, 0x0)
vmsplice(r0, &(0x7f0000000240)=[{&(0x7f0000000080)="4ab1b8694a30bc0b64f0bf0fa59d6d6310a9fca4f5ca7242c45a43a3f790f1bb52f7d713fdc0e6dfa75a5fa7f39f0c693511ea6a67b64b56fa4550fb865102551e0de8881e54887a6391bc4677137a4e433d75874a6619ff219d8ab89c1fdd9fe0d5ae7f1b35994210b3700e36625640f808", 0x72}, {&(0x7f0000000100)="b4346c01f32075d5cdbe81dc2919a8983c8e9f197195a027c0b95dec78d35df6ebeb63bff0423813616d67337c30bab5b6fb29da1bb7c014982cb6715df37902afa71736216374d5265195d9de49c7b08ac58de319c21a5fd49d6a39aecbae4bd0f079aab13eb24843b657b3b9e2f1e2d0731f5e00a4bafcf845d00e210b9ebf51a2303fbc02c70c9d4c62d4849f61727ffdac8e7a0e5b4b92dc03aa3ec3e37067eda1f5ee14cea961ae21f23d6678", 0xaf}], 0x2, 0xd)

06:18:52 executing program 2:
r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0)
mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800004, 0x10, r0, 0x0)
preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x9, 0x0)
mmap(&(0x7f0000000000/0xa000)=nil, 0xa000, 0x2, 0x2172, 0xffffffffffffffff, 0x0)
socketpair(0x29, 0x80005, 0x0, &(0x7f0000000340)={0x0, 0x0})

06:18:52 executing program 0:
r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0)
mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800004, 0x12, r0, 0x0)
preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x9, 0x0)
mmap(&(0x7f0000000000/0xa000)=nil, 0xa000, 0x2, 0x10, 0xffffffffffffffff, 0x0)
syz_mount_image$nilfs2(&(0x7f0000000180), &(0x7f0000000200)='./file0\x00', 0xd85, 0x7, &(0x7f00000006c0)=[{&(0x7f0000000240)="997c7e90471ec6786b6aa37fd8fbf290c011bee5642707bf7b126c36024e5e8f0d3d514aa1538eb70908eb3ac1a8a52e0ba29dab8884c189c9b68415aa0226e7c6a7ccf48ad20543b10360ab7ee9b247e4304d92f0ec7c0ba06d8160095660a0f12836e2033baed6228d464479ce22f2fadce176d0750fdc6ab1004eb9c4440707be1dc31c1ce11815d12f0d50eef6477341b3f6a4f364a1fccd68e2bcd2dba76227338cd6a1835a44", 0xa9, 0x8}, {&(0x7f0000000380)="3a79b76eed8bb53c1f5217cb4d40694fa75675b28af54d40304f697a1d04373a7ef7b09d46fa6365d222516dcc92d004bc937a22980c404bb5b5669f3dfd0e569079c03b2855be3337944aea4b03b03a3eb6d7", 0x53, 0x3}, {&(0x7f0000000400)="c8213af91316be74099fc072cc912017e77b8709c846cf00eb99c7c03cee58e25602e6ec0b4b42c8709e4447b0d23296a71661cdb6ea9b13d35ed3206f67e5559840f063e554ed7fcb842ab9b072197358b7a617cb0825abfabe3da9b022ecbe28ebcc22bd651a40dfcf4782be0c0c6d8adb8fdd7afce8c8659cc9eef1483eceb26a223fa9d591e28633e6bf6facd75e4295341e2ef3788284fc4482db16cab37de0c1adbf7fa07ad161ae875284778f49e15a052d875e", 0xb7, 0x80}, {&(0x7f00000004c0)="056b3e2d287f817e74a518293ea19b1196cccb376ac73cd7bbeccaced6f43aa9706b33d8ec56c58be0febb03dadec48add6a378f07f9053f1b6f33fe63a960502ad48232f0bee4a41509d7063d478768ab8ee0a90ebdb7c9bc326d54c8edad7e9d59641faf45c171e35f77f8c38a7563e1555c331a5a3e4da1ce59c0c697ebe071d527f24563165dafd23b45186c3d55251c825d0d7fd16b0f13a2f1321cddbcf231b398a88b19e3915ee544692c3559f42a", 0xb2, 0x6}, {&(0x7f0000000580)="8023d53ac815f8a84b84350b859e8673ed208a78bbfec2e35d6d4927707d5dd61106eb0321af3709c17fe7661323c51575e9c18d7b834c138636224eb1a7d75dd59d5c5d7411bdd4c2b07cf727643f52b1ca3e1680cde001be2f8334303e9f4191c2f9425472ca1ee6bac17fde09f0ce5fdf2e70d3c1a38b2d3e0e804f7df817b6a03e5e1ffea1ca7cd7", 0x8a, 0x8}, {&(0x7f0000000300)="fae83b83fc781c7715", 0x9, 0x8fe}, {&(0x7f0000000640)="96f1e3c89318e48db56867032dd1ba9b0ffeec69eb34236bd93b937c6bb7447840dc021e536b89aad4fe89ca2317f4fe2b36cbbdd8d72d841aee6f7b7be258352406775f169573cbf4da0bcf856f825233c5387a3a7cde778c057d591f2133c10e8b5bdb164577f492130acfc7", 0x6d, 0x5}], 0x802010, &(0x7f0000000740)={[{@order_relaxed}], [{@fsname}, {@fsuuid={'fsuuid', 0x3d, {[0x36, 0x38, 0x61, 0x64, 0x39, 0x38, 0x31, 0x37], 0x2d, [0x62, 0x61, 0x61, 0x63], 0x2d, [0x62, 0x39, 0x33, 0x35], 0x2d, [0x32, 0x37, 0x33, 0x61], 0x2d, [0x61, 0x39, 0x64, 0x65, 0x31, 0x8eb4bab6ccebb2ed, 0x64, 0x62]}}}]})

06:18:52 executing program 3:
r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0)
mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800004, 0x12, r0, 0x0)
preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x9, 0x0)
mmap(&(0x7f0000000000/0xa000)=nil, 0xa000, 0x2, 0x2172, 0xffffffffffffffff, 0x0)
r1 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x11, 0x4, &(0x7f00000000c0)=@framed={{}, [@call={0x85, 0x0, 0x0, 0x7b}]}, &(0x7f00000001c0)='syzkaller\x00', 0x4, 0x8f, &(0x7f00000002c0)=""/143, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78)
bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='ext4_es_lookup_extent_exit\x00', r1}, 0x10)
preadv(r1, &(0x7f0000000080)=[{&(0x7f0000000040)=""/12, 0xc}], 0x1, 0x36, 0x401)
socketpair(0x1e, 0x80005, 0x0, &(0x7f0000000340)={<r2=>0x0, 0x0})
close(r2)
r3 = socket$unix(0x1, 0x1, 0x0)
bind$unix(r3, &(0x7f00000001c0)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x56)
ioctl$sock_SIOCOUTQNSD(r3, 0x894b, &(0x7f0000000100))
ioctl$RTC_PIE_OFF(r0, 0x7006)
openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0)

06:18:52 executing program 2:
r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0)
mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800004, 0x10, r0, 0x0)
preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x9, 0x0)
mmap(&(0x7f0000000000/0xa000)=nil, 0xa000, 0x2, 0x2172, 0xffffffffffffffff, 0x0)
socketpair(0x29, 0x80005, 0x0, &(0x7f0000000340)={0x0, 0x0})

06:18:52 executing program 1:
r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0)
mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x0, 0x12, r0, 0x0)
preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x9, 0x0)
vmsplice(r0, &(0x7f0000000240)=[{&(0x7f0000000080)="4ab1b8694a30bc0b64f0bf0fa59d6d6310a9fca4f5ca7242c45a43a3f790f1bb52f7d713fdc0e6dfa75a5fa7f39f0c693511ea6a67b64b56fa4550fb865102551e0de8881e54887a6391bc4677137a4e433d75874a6619ff219d8ab89c1fdd9fe0d5ae7f1b35994210b3700e36625640f808", 0x72}, {&(0x7f0000000100)="b4346c01f32075d5cdbe81dc2919a8983c8e9f197195a027c0b95dec78d35df6ebeb63bff0423813616d67337c30bab5b6fb29da1bb7c014982cb6715df37902afa71736216374d5265195d9de49c7b08ac58de319c21a5fd49d6a39aecbae4bd0f079aab13eb24843b657b3b9e2f1e2d0731f5e00a4bafcf845d00e210b9ebf51a2303fbc02c70c9d4c62d4849f61727ffdac8e7a0e5b4b92dc03aa3ec3e37067eda1f5ee14cea961ae21f23d6678", 0xaf}], 0x2, 0xd)

06:18:52 executing program 3:
r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0)
mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800004, 0x12, r0, 0x0)
preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x9, 0x0)
mmap(&(0x7f0000000000/0xa000)=nil, 0xa000, 0x2, 0x2172, 0xffffffffffffffff, 0x0)
r1 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x11, 0x4, &(0x7f00000000c0)=@framed={{}, [@call={0x85, 0x0, 0x0, 0x7b}]}, &(0x7f00000001c0)='syzkaller\x00', 0x4, 0x8f, &(0x7f00000002c0)=""/143, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78)
bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='ext4_es_lookup_extent_exit\x00', r1}, 0x10)
preadv(r1, &(0x7f0000000080)=[{&(0x7f0000000040)=""/12, 0xc}], 0x1, 0x36, 0x401)
socketpair(0x1e, 0x80005, 0x0, &(0x7f0000000340)={<r2=>0x0, 0x0})
close(r2)
r3 = socket$unix(0x1, 0x1, 0x0)
bind$unix(r3, &(0x7f00000001c0)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x56)
ioctl$sock_SIOCOUTQNSD(r3, 0x894b, &(0x7f0000000100))
ioctl$RTC_PIE_OFF(r0, 0x7006)

06:18:52 executing program 0:
r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0)
mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800004, 0x12, r0, 0x0)
preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x9, 0x0)
mmap(&(0x7f0000000000/0xa000)=nil, 0xa000, 0x2, 0x2172, 0xffffffffffffffff, 0x0)
syz_mount_image$nilfs2(0x0, &(0x7f0000000200)='./file0\x00', 0xd85, 0x7, &(0x7f00000006c0)=[{&(0x7f0000000240)="997c7e90471ec6786b6aa37fd8fbf290c011bee5642707bf7b126c36024e5e8f0d3d514aa1538eb70908eb3ac1a8a52e0ba29dab8884c189c9b68415aa0226e7c6a7ccf48ad20543b10360ab7ee9b247e4304d92f0ec7c0ba06d8160095660a0f12836e2033baed6228d464479ce22f2fadce176d0750fdc6ab1004eb9c4440707be1dc31c1ce11815d12f0d50eef6477341b3f6a4f364a1fccd68e2bcd2dba76227338cd6a1835a44", 0xa9, 0x8}, {&(0x7f0000000380)="3a79b76eed8bb53c1f5217cb4d40694fa75675b28af54d40304f697a1d04373a7ef7b09d46fa6365d222516dcc92d004bc937a22980c404bb5b5669f3dfd0e569079c03b2855be3337944aea4b03b03a3eb6d7", 0x53, 0x3}, {&(0x7f0000000400)="c8213af91316be74099fc072cc912017e77b8709c846cf00eb99c7c03cee58e25602e6ec0b4b42c8709e4447b0d23296a71661cdb6ea9b13d35ed3206f67e5559840f063e554ed7fcb842ab9b072197358b7a617cb0825abfabe3da9b022ecbe28ebcc22bd651a40dfcf4782be0c0c6d8adb8fdd7afce8c8659cc9eef1483eceb26a223fa9d591e28633e6bf6facd75e4295341e2ef3788284fc4482db16cab37de0c1adbf7fa07ad161ae875284778f49e15a052d875e", 0xb7, 0x80}, {&(0x7f00000004c0)="056b3e2d287f817e74a518293ea19b1196cccb376ac73cd7bbeccaced6f43aa9706b33d8ec56c58be0febb03dadec48add6a378f07f9053f1b6f33fe63a960502ad48232f0bee4a41509d7063d478768ab8ee0a90ebdb7c9bc326d54c8edad7e9d59641faf45c171e35f77f8c38a7563e1555c331a5a3e4da1ce59c0c697ebe071d527f24563165dafd23b45186c3d55251c825d0d7fd16b0f13a2f1321cddbcf231b398a88b19e3915ee544692c3559f42a", 0xb2, 0x6}, {&(0x7f0000000580)="8023d53ac815f8a84b84350b859e8673ed208a78bbfec2e35d6d4927707d5dd61106eb0321af3709c17fe7661323c51575e9c18d7b834c138636224eb1a7d75dd59d5c5d7411bdd4c2b07cf727643f52b1ca3e1680cde001be2f8334303e9f4191c2f9425472ca1ee6bac17fde09f0ce5fdf2e70d3c1a38b2d3e0e804f7df817b6a03e5e1ffea1ca7cd7", 0x8a, 0x8}, {&(0x7f0000000300)="fae83b83fc781c7715", 0x9, 0x8fe}, {&(0x7f0000000640)="96f1e3c89318e48db56867032dd1ba9b0ffeec69eb34236bd93b937c6bb7447840dc021e536b89aad4fe89ca2317f4fe2b36cbbdd8d72d841aee6f7b7be258352406775f169573cbf4da0bcf856f825233c5387a3a7cde778c057d591f2133c10e8b5bdb164577f492130acfc7", 0x6d, 0x5}], 0x802010, &(0x7f0000000740)={[{@order_relaxed}], [{@fsname}, {@fsuuid={'fsuuid', 0x3d, {[0x36, 0x38, 0x61, 0x64, 0x39, 0x38, 0x31, 0x37], 0x2d, [0x62, 0x61, 0x61, 0x63], 0x2d, [0x62, 0x39, 0x33, 0x35], 0x2d, [0x32, 0x37, 0x33, 0x61], 0x2d, [0x61, 0x39, 0x64, 0x65, 0x31, 0x8eb4bab6ccebb2ed, 0x64, 0x62]}}}]})

[  335.070688][T14890] loop0: detected capacity change from 0 to 8
06:18:52 executing program 2:
r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0)
mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800004, 0x10, r0, 0x0)
preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x9, 0x0)
mmap(&(0x7f0000000000/0xa000)=nil, 0xa000, 0x2, 0x2172, 0xffffffffffffffff, 0x0)
socketpair(0x29, 0x80005, 0x0, &(0x7f0000000340)={0x0, 0x0})

06:18:52 executing program 1:
r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0)
mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x0, 0x12, r0, 0x0)
preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x9, 0x0)
vmsplice(r0, &(0x7f0000000240)=[{&(0x7f0000000080)="4ab1b8694a30bc0b64f0bf0fa59d6d6310a9fca4f5ca7242c45a43a3f790f1bb52f7d713fdc0e6dfa75a5fa7f39f0c693511ea6a67b64b56fa4550fb865102551e0de8881e54887a6391bc4677137a4e433d75874a6619ff219d8ab89c1fdd9fe0d5ae7f1b35994210b3700e36625640f808", 0x72}, {&(0x7f0000000100)="b4346c01f32075d5cdbe81dc2919a8983c8e9f197195a027c0b95dec78d35df6ebeb63bff0423813616d67337c30bab5b6fb29da1bb7c014982cb6715df37902afa71736216374d5265195d9de49c7b08ac58de319c21a5fd49d6a39aecbae4bd0f079aab13eb24843b657b3b9e2f1e2d0731f5e00a4bafcf845d00e210b9ebf51a2303fbc02c70c9d4c62d4849f61727ffdac8e7a0e5b4b92dc03aa3ec3e37067eda1f5ee14cea961ae21f23d6678", 0xaf}], 0x2, 0xd)

06:18:52 executing program 2:
r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0)
mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800004, 0x12, 0xffffffffffffffff, 0x0)
preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x9, 0x0)
mmap(&(0x7f0000000000/0xa000)=nil, 0xa000, 0x2, 0x2172, 0xffffffffffffffff, 0x0)
socketpair(0x29, 0x80005, 0x0, &(0x7f0000000340)={0x0, 0x0})

06:18:52 executing program 3:
r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0)
mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800004, 0x12, r0, 0x0)
preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x9, 0x0)
mmap(&(0x7f0000000000/0xa000)=nil, 0xa000, 0x2, 0x2172, 0xffffffffffffffff, 0x0)
r1 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x11, 0x4, &(0x7f00000000c0)=@framed={{}, [@call={0x85, 0x0, 0x0, 0x7b}]}, &(0x7f00000001c0)='syzkaller\x00', 0x4, 0x8f, &(0x7f00000002c0)=""/143, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78)
bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='ext4_es_lookup_extent_exit\x00', r1}, 0x10)
preadv(r1, &(0x7f0000000080)=[{&(0x7f0000000040)=""/12, 0xc}], 0x1, 0x36, 0x401)
socketpair(0x1e, 0x80005, 0x0, &(0x7f0000000340)={<r2=>0x0, 0x0})
close(r2)
r3 = socket$unix(0x1, 0x1, 0x0)
bind$unix(r3, &(0x7f00000001c0)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x56)
ioctl$sock_SIOCOUTQNSD(r3, 0x894b, &(0x7f0000000100))

06:18:52 executing program 1:
r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0)
mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800004, 0x10, r0, 0x0)
preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x9, 0x0)
vmsplice(r0, &(0x7f0000000240)=[{&(0x7f0000000080)="4ab1b8694a30bc0b64f0bf0fa59d6d6310a9fca4f5ca7242c45a43a3f790f1bb52f7d713fdc0e6dfa75a5fa7f39f0c693511ea6a67b64b56fa4550fb865102551e0de8881e54887a6391bc4677137a4e433d75874a6619ff219d8ab89c1fdd9fe0d5ae7f1b35994210b3700e36625640f808", 0x72}, {&(0x7f0000000100)="b4346c01f32075d5cdbe81dc2919a8983c8e9f197195a027c0b95dec78d35df6ebeb63bff0423813616d67337c30bab5b6fb29da1bb7c014982cb6715df37902afa71736216374d5265195d9de49c7b08ac58de319c21a5fd49d6a39aecbae4bd0f079aab13eb24843b657b3b9e2f1e2d0731f5e00a4bafcf845d00e210b9ebf51a2303fbc02c70c9d4c62d4849f61727ffdac8e7a0e5b4b92dc03aa3ec3e37067eda1f5ee14cea961ae21f23d6678", 0xaf}], 0x2, 0xd)

06:18:52 executing program 0:
r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0)
mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800004, 0x12, r0, 0x0)
preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x9, 0x0)
mmap(&(0x7f0000000000/0xa000)=nil, 0xa000, 0x2, 0x2172, 0xffffffffffffffff, 0x0)
syz_mount_image$nilfs2(0x0, &(0x7f0000000200)='./file0\x00', 0xd85, 0x7, &(0x7f00000006c0)=[{&(0x7f0000000240)="997c7e90471ec6786b6aa37fd8fbf290c011bee5642707bf7b126c36024e5e8f0d3d514aa1538eb70908eb3ac1a8a52e0ba29dab8884c189c9b68415aa0226e7c6a7ccf48ad20543b10360ab7ee9b247e4304d92f0ec7c0ba06d8160095660a0f12836e2033baed6228d464479ce22f2fadce176d0750fdc6ab1004eb9c4440707be1dc31c1ce11815d12f0d50eef6477341b3f6a4f364a1fccd68e2bcd2dba76227338cd6a1835a44", 0xa9, 0x8}, {&(0x7f0000000380)="3a79b76eed8bb53c1f5217cb4d40694fa75675b28af54d40304f697a1d04373a7ef7b09d46fa6365d222516dcc92d004bc937a22980c404bb5b5669f3dfd0e569079c03b2855be3337944aea4b03b03a3eb6d7", 0x53, 0x3}, {&(0x7f0000000400)="c8213af91316be74099fc072cc912017e77b8709c846cf00eb99c7c03cee58e25602e6ec0b4b42c8709e4447b0d23296a71661cdb6ea9b13d35ed3206f67e5559840f063e554ed7fcb842ab9b072197358b7a617cb0825abfabe3da9b022ecbe28ebcc22bd651a40dfcf4782be0c0c6d8adb8fdd7afce8c8659cc9eef1483eceb26a223fa9d591e28633e6bf6facd75e4295341e2ef3788284fc4482db16cab37de0c1adbf7fa07ad161ae875284778f49e15a052d875e", 0xb7, 0x80}, {&(0x7f00000004c0)="056b3e2d287f817e74a518293ea19b1196cccb376ac73cd7bbeccaced6f43aa9706b33d8ec56c58be0febb03dadec48add6a378f07f9053f1b6f33fe63a960502ad48232f0bee4a41509d7063d478768ab8ee0a90ebdb7c9bc326d54c8edad7e9d59641faf45c171e35f77f8c38a7563e1555c331a5a3e4da1ce59c0c697ebe071d527f24563165dafd23b45186c3d55251c825d0d7fd16b0f13a2f1321cddbcf231b398a88b19e3915ee544692c3559f42a", 0xb2, 0x6}, {&(0x7f0000000580)="8023d53ac815f8a84b84350b859e8673ed208a78bbfec2e35d6d4927707d5dd61106eb0321af3709c17fe7661323c51575e9c18d7b834c138636224eb1a7d75dd59d5c5d7411bdd4c2b07cf727643f52b1ca3e1680cde001be2f8334303e9f4191c2f9425472ca1ee6bac17fde09f0ce5fdf2e70d3c1a38b2d3e0e804f7df817b6a03e5e1ffea1ca7cd7", 0x8a, 0x8}, {&(0x7f0000000300)="fae83b83fc781c7715", 0x9, 0x8fe}, {&(0x7f0000000640)="96f1e3c89318e48db56867032dd1ba9b0ffeec69eb34236bd93b937c6bb7447840dc021e536b89aad4fe89ca2317f4fe2b36cbbdd8d72d841aee6f7b7be258352406775f169573cbf4da0bcf856f825233c5387a3a7cde778c057d591f2133c10e8b5bdb164577f492130acfc7", 0x6d, 0x5}], 0x802010, &(0x7f0000000740)={[{@order_relaxed}], [{@fsname}, {@fsuuid={'fsuuid', 0x3d, {[0x36, 0x38, 0x61, 0x64, 0x39, 0x38, 0x31, 0x37], 0x2d, [0x62, 0x61, 0x61, 0x63], 0x2d, [0x62, 0x39, 0x33, 0x35], 0x2d, [0x32, 0x37, 0x33, 0x61], 0x2d, [0x61, 0x39, 0x64, 0x65, 0x31, 0x8eb4bab6ccebb2ed, 0x64, 0x62]}}}]})

06:18:52 executing program 2:
r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0)
mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800004, 0x12, 0xffffffffffffffff, 0x0)
preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x9, 0x0)
mmap(&(0x7f0000000000/0xa000)=nil, 0xa000, 0x2, 0x2172, 0xffffffffffffffff, 0x0)
socketpair(0x29, 0x80005, 0x0, &(0x7f0000000340)={0x0, 0x0})

06:18:52 executing program 1:
r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0)
mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800004, 0x10, r0, 0x0)
preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x9, 0x0)
vmsplice(r0, &(0x7f0000000240)=[{&(0x7f0000000080)="4ab1b8694a30bc0b64f0bf0fa59d6d6310a9fca4f5ca7242c45a43a3f790f1bb52f7d713fdc0e6dfa75a5fa7f39f0c693511ea6a67b64b56fa4550fb865102551e0de8881e54887a6391bc4677137a4e433d75874a6619ff219d8ab89c1fdd9fe0d5ae7f1b35994210b3700e36625640f808", 0x72}, {&(0x7f0000000100)="b4346c01f32075d5cdbe81dc2919a8983c8e9f197195a027c0b95dec78d35df6ebeb63bff0423813616d67337c30bab5b6fb29da1bb7c014982cb6715df37902afa71736216374d5265195d9de49c7b08ac58de319c21a5fd49d6a39aecbae4bd0f079aab13eb24843b657b3b9e2f1e2d0731f5e00a4bafcf845d00e210b9ebf51a2303fbc02c70c9d4c62d4849f61727ffdac8e7a0e5b4b92dc03aa3ec3e37067eda1f5ee14cea961ae21f23d6678", 0xaf}], 0x2, 0xd)

06:18:52 executing program 3:
r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0)
mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800004, 0x12, r0, 0x0)
preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x9, 0x0)
mmap(&(0x7f0000000000/0xa000)=nil, 0xa000, 0x2, 0x2172, 0xffffffffffffffff, 0x0)
r1 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x11, 0x4, &(0x7f00000000c0)=@framed={{}, [@call={0x85, 0x0, 0x0, 0x7b}]}, &(0x7f00000001c0)='syzkaller\x00', 0x4, 0x8f, &(0x7f00000002c0)=""/143, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78)
bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='ext4_es_lookup_extent_exit\x00', r1}, 0x10)
preadv(r1, &(0x7f0000000080)=[{&(0x7f0000000040)=""/12, 0xc}], 0x1, 0x36, 0x401)
socketpair(0x1e, 0x80005, 0x0, &(0x7f0000000340)={<r2=>0x0, 0x0})
close(r2)
r3 = socket$unix(0x1, 0x1, 0x0)
bind$unix(r3, &(0x7f00000001c0)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x56)

06:18:52 executing program 2:
r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0)
mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800004, 0x12, 0xffffffffffffffff, 0x0)
preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x9, 0x0)
mmap(&(0x7f0000000000/0xa000)=nil, 0xa000, 0x2, 0x2172, 0xffffffffffffffff, 0x0)
socketpair(0x29, 0x80005, 0x0, &(0x7f0000000340)={0x0, 0x0})

06:18:52 executing program 1:
r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0)
mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800004, 0x10, r0, 0x0)
preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x9, 0x0)
vmsplice(r0, &(0x7f0000000240)=[{&(0x7f0000000080)="4ab1b8694a30bc0b64f0bf0fa59d6d6310a9fca4f5ca7242c45a43a3f790f1bb52f7d713fdc0e6dfa75a5fa7f39f0c693511ea6a67b64b56fa4550fb865102551e0de8881e54887a6391bc4677137a4e433d75874a6619ff219d8ab89c1fdd9fe0d5ae7f1b35994210b3700e36625640f808", 0x72}, {&(0x7f0000000100)="b4346c01f32075d5cdbe81dc2919a8983c8e9f197195a027c0b95dec78d35df6ebeb63bff0423813616d67337c30bab5b6fb29da1bb7c014982cb6715df37902afa71736216374d5265195d9de49c7b08ac58de319c21a5fd49d6a39aecbae4bd0f079aab13eb24843b657b3b9e2f1e2d0731f5e00a4bafcf845d00e210b9ebf51a2303fbc02c70c9d4c62d4849f61727ffdac8e7a0e5b4b92dc03aa3ec3e37067eda1f5ee14cea961ae21f23d6678", 0xaf}], 0x2, 0xd)

06:18:52 executing program 2:
r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0)
mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800004, 0x12, r0, 0x0)
preadv(0xffffffffffffffff, &(0x7f00000001c0)=[{0x0}], 0x1, 0x9, 0x0)
mmap(&(0x7f0000000000/0xa000)=nil, 0xa000, 0x2, 0x2172, 0xffffffffffffffff, 0x0)
socketpair(0x29, 0x80005, 0x0, &(0x7f0000000340)={0x0, 0x0})

06:18:52 executing program 3:
r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0)
mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800004, 0x12, r0, 0x0)
preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x9, 0x0)
mmap(&(0x7f0000000000/0xa000)=nil, 0xa000, 0x2, 0x2172, 0xffffffffffffffff, 0x0)
r1 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x11, 0x4, &(0x7f00000000c0)=@framed={{}, [@call={0x85, 0x0, 0x0, 0x7b}]}, &(0x7f00000001c0)='syzkaller\x00', 0x4, 0x8f, &(0x7f00000002c0)=""/143, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78)
bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='ext4_es_lookup_extent_exit\x00', r1}, 0x10)
preadv(r1, &(0x7f0000000080)=[{&(0x7f0000000040)=""/12, 0xc}], 0x1, 0x36, 0x401)
socketpair(0x1e, 0x80005, 0x0, &(0x7f0000000340)={<r2=>0x0, 0x0})
close(r2)
bind$unix(0xffffffffffffffff, &(0x7f00000001c0)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x56)

[  335.314923][T14918] loop0: detected capacity change from 0 to 8
06:18:53 executing program 1:
r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0)
mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800004, 0x12, 0xffffffffffffffff, 0x0)
preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x9, 0x0)
vmsplice(r0, &(0x7f0000000240)=[{&(0x7f0000000080)="4ab1b8694a30bc0b64f0bf0fa59d6d6310a9fca4f5ca7242c45a43a3f790f1bb52f7d713fdc0e6dfa75a5fa7f39f0c693511ea6a67b64b56fa4550fb865102551e0de8881e54887a6391bc4677137a4e433d75874a6619ff219d8ab89c1fdd9fe0d5ae7f1b35994210b3700e36625640f808", 0x72}, {&(0x7f0000000100)="b4346c01f32075d5cdbe81dc2919a8983c8e9f197195a027c0b95dec78d35df6ebeb63bff0423813616d67337c30bab5b6fb29da1bb7c014982cb6715df37902afa71736216374d5265195d9de49c7b08ac58de319c21a5fd49d6a39aecbae4bd0f079aab13eb24843b657b3b9e2f1e2d0731f5e00a4bafcf845d00e210b9ebf51a2303fbc02c70c9d4c62d4849f61727ffdac8e7a0e5b4b92dc03aa3ec3e37067eda1f5ee14cea961ae21f23d6678", 0xaf}], 0x2, 0xd)

06:18:53 executing program 2:
r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0)
mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800004, 0x12, r0, 0x0)
preadv(0xffffffffffffffff, &(0x7f00000001c0)=[{0x0}], 0x1, 0x9, 0x0)
mmap(&(0x7f0000000000/0xa000)=nil, 0xa000, 0x2, 0x2172, 0xffffffffffffffff, 0x0)
socketpair(0x29, 0x80005, 0x0, &(0x7f0000000340)={0x0, 0x0})

06:18:53 executing program 3:
r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0)
mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800004, 0x12, r0, 0x0)
preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x9, 0x0)
mmap(&(0x7f0000000000/0xa000)=nil, 0xa000, 0x2, 0x2172, 0xffffffffffffffff, 0x0)
r1 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x11, 0x4, &(0x7f00000000c0)=@framed={{}, [@call={0x85, 0x0, 0x0, 0x7b}]}, &(0x7f00000001c0)='syzkaller\x00', 0x4, 0x8f, &(0x7f00000002c0)=""/143, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78)
bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='ext4_es_lookup_extent_exit\x00', r1}, 0x10)
preadv(r1, &(0x7f0000000080)=[{&(0x7f0000000040)=""/12, 0xc}], 0x1, 0x36, 0x401)
socketpair(0x1e, 0x80005, 0x0, &(0x7f0000000340)={<r2=>0x0, 0x0})
close(r2)
bind$unix(0xffffffffffffffff, &(0x7f00000001c0)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x56)

06:18:53 executing program 0:
r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0)
mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800004, 0x12, r0, 0x0)
preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x9, 0x0)
mmap(&(0x7f0000000000/0xa000)=nil, 0xa000, 0x2, 0x2172, 0xffffffffffffffff, 0x0)
syz_mount_image$nilfs2(0x0, &(0x7f0000000200)='./file0\x00', 0xd85, 0x7, &(0x7f00000006c0)=[{&(0x7f0000000240)="997c7e90471ec6786b6aa37fd8fbf290c011bee5642707bf7b126c36024e5e8f0d3d514aa1538eb70908eb3ac1a8a52e0ba29dab8884c189c9b68415aa0226e7c6a7ccf48ad20543b10360ab7ee9b247e4304d92f0ec7c0ba06d8160095660a0f12836e2033baed6228d464479ce22f2fadce176d0750fdc6ab1004eb9c4440707be1dc31c1ce11815d12f0d50eef6477341b3f6a4f364a1fccd68e2bcd2dba76227338cd6a1835a44", 0xa9, 0x8}, {&(0x7f0000000380)="3a79b76eed8bb53c1f5217cb4d40694fa75675b28af54d40304f697a1d04373a7ef7b09d46fa6365d222516dcc92d004bc937a22980c404bb5b5669f3dfd0e569079c03b2855be3337944aea4b03b03a3eb6d7", 0x53, 0x3}, {&(0x7f0000000400)="c8213af91316be74099fc072cc912017e77b8709c846cf00eb99c7c03cee58e25602e6ec0b4b42c8709e4447b0d23296a71661cdb6ea9b13d35ed3206f67e5559840f063e554ed7fcb842ab9b072197358b7a617cb0825abfabe3da9b022ecbe28ebcc22bd651a40dfcf4782be0c0c6d8adb8fdd7afce8c8659cc9eef1483eceb26a223fa9d591e28633e6bf6facd75e4295341e2ef3788284fc4482db16cab37de0c1adbf7fa07ad161ae875284778f49e15a052d875e", 0xb7, 0x80}, {&(0x7f00000004c0)="056b3e2d287f817e74a518293ea19b1196cccb376ac73cd7bbeccaced6f43aa9706b33d8ec56c58be0febb03dadec48add6a378f07f9053f1b6f33fe63a960502ad48232f0bee4a41509d7063d478768ab8ee0a90ebdb7c9bc326d54c8edad7e9d59641faf45c171e35f77f8c38a7563e1555c331a5a3e4da1ce59c0c697ebe071d527f24563165dafd23b45186c3d55251c825d0d7fd16b0f13a2f1321cddbcf231b398a88b19e3915ee544692c3559f42a", 0xb2, 0x6}, {&(0x7f0000000580)="8023d53ac815f8a84b84350b859e8673ed208a78bbfec2e35d6d4927707d5dd61106eb0321af3709c17fe7661323c51575e9c18d7b834c138636224eb1a7d75dd59d5c5d7411bdd4c2b07cf727643f52b1ca3e1680cde001be2f8334303e9f4191c2f9425472ca1ee6bac17fde09f0ce5fdf2e70d3c1a38b2d3e0e804f7df817b6a03e5e1ffea1ca7cd7", 0x8a, 0x8}, {&(0x7f0000000300)="fae83b83fc781c7715", 0x9, 0x8fe}, {&(0x7f0000000640)="96f1e3c89318e48db56867032dd1ba9b0ffeec69eb34236bd93b937c6bb7447840dc021e536b89aad4fe89ca2317f4fe2b36cbbdd8d72d841aee6f7b7be258352406775f169573cbf4da0bcf856f825233c5387a3a7cde778c057d591f2133c10e8b5bdb164577f492130acfc7", 0x6d, 0x5}], 0x802010, &(0x7f0000000740)={[{@order_relaxed}], [{@fsname}, {@fsuuid={'fsuuid', 0x3d, {[0x36, 0x38, 0x61, 0x64, 0x39, 0x38, 0x31, 0x37], 0x2d, [0x62, 0x61, 0x61, 0x63], 0x2d, [0x62, 0x39, 0x33, 0x35], 0x2d, [0x32, 0x37, 0x33, 0x61], 0x2d, [0x61, 0x39, 0x64, 0x65, 0x31, 0x8eb4bab6ccebb2ed, 0x64, 0x62]}}}]})

06:18:53 executing program 2:
r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0)
mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800004, 0x12, r0, 0x0)
preadv(0xffffffffffffffff, &(0x7f00000001c0)=[{0x0}], 0x1, 0x9, 0x0)
mmap(&(0x7f0000000000/0xa000)=nil, 0xa000, 0x2, 0x2172, 0xffffffffffffffff, 0x0)
socketpair(0x29, 0x80005, 0x0, &(0x7f0000000340)={0x0, 0x0})

06:18:53 executing program 3:
r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0)
mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800004, 0x12, r0, 0x0)
preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x9, 0x0)
mmap(&(0x7f0000000000/0xa000)=nil, 0xa000, 0x2, 0x2172, 0xffffffffffffffff, 0x0)
r1 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x11, 0x4, &(0x7f00000000c0)=@framed={{}, [@call={0x85, 0x0, 0x0, 0x7b}]}, &(0x7f00000001c0)='syzkaller\x00', 0x4, 0x8f, &(0x7f00000002c0)=""/143, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78)
bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='ext4_es_lookup_extent_exit\x00', r1}, 0x10)
preadv(r1, &(0x7f0000000080)=[{&(0x7f0000000040)=""/12, 0xc}], 0x1, 0x36, 0x401)
socketpair(0x1e, 0x80005, 0x0, &(0x7f0000000340)={<r2=>0x0, 0x0})
close(r2)
bind$unix(0xffffffffffffffff, &(0x7f00000001c0)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x56)

06:18:53 executing program 1:
r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0)
mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800004, 0x12, 0xffffffffffffffff, 0x0)
preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x9, 0x0)
vmsplice(r0, &(0x7f0000000240)=[{&(0x7f0000000080)="4ab1b8694a30bc0b64f0bf0fa59d6d6310a9fca4f5ca7242c45a43a3f790f1bb52f7d713fdc0e6dfa75a5fa7f39f0c693511ea6a67b64b56fa4550fb865102551e0de8881e54887a6391bc4677137a4e433d75874a6619ff219d8ab89c1fdd9fe0d5ae7f1b35994210b3700e36625640f808", 0x72}, {&(0x7f0000000100)="b4346c01f32075d5cdbe81dc2919a8983c8e9f197195a027c0b95dec78d35df6ebeb63bff0423813616d67337c30bab5b6fb29da1bb7c014982cb6715df37902afa71736216374d5265195d9de49c7b08ac58de319c21a5fd49d6a39aecbae4bd0f079aab13eb24843b657b3b9e2f1e2d0731f5e00a4bafcf845d00e210b9ebf51a2303fbc02c70c9d4c62d4849f61727ffdac8e7a0e5b4b92dc03aa3ec3e37067eda1f5ee14cea961ae21f23d6678", 0xaf}], 0x2, 0xd)

[  335.527292][T14935] loop0: detected capacity change from 0 to 8
06:18:53 executing program 3:
r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0)
mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800004, 0x12, r0, 0x0)
preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x9, 0x0)
mmap(&(0x7f0000000000/0xa000)=nil, 0xa000, 0x2, 0x2172, 0xffffffffffffffff, 0x0)
r1 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x11, 0x4, &(0x7f00000000c0)=@framed={{}, [@call={0x85, 0x0, 0x0, 0x7b}]}, &(0x7f00000001c0)='syzkaller\x00', 0x4, 0x8f, &(0x7f00000002c0)=""/143, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78)
bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='ext4_es_lookup_extent_exit\x00', r1}, 0x10)
preadv(r1, &(0x7f0000000080)=[{&(0x7f0000000040)=""/12, 0xc}], 0x1, 0x36, 0x401)
socketpair(0x1e, 0x80005, 0x0, &(0x7f0000000340)={0x0, 0x0})
r2 = socket$unix(0x1, 0x1, 0x0)
bind$unix(r2, &(0x7f00000001c0)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x56)

06:18:53 executing program 1:
r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0)
mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800004, 0x12, 0xffffffffffffffff, 0x0)
preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x9, 0x0)
vmsplice(r0, &(0x7f0000000240)=[{&(0x7f0000000080)="4ab1b8694a30bc0b64f0bf0fa59d6d6310a9fca4f5ca7242c45a43a3f790f1bb52f7d713fdc0e6dfa75a5fa7f39f0c693511ea6a67b64b56fa4550fb865102551e0de8881e54887a6391bc4677137a4e433d75874a6619ff219d8ab89c1fdd9fe0d5ae7f1b35994210b3700e36625640f808", 0x72}, {&(0x7f0000000100)="b4346c01f32075d5cdbe81dc2919a8983c8e9f197195a027c0b95dec78d35df6ebeb63bff0423813616d67337c30bab5b6fb29da1bb7c014982cb6715df37902afa71736216374d5265195d9de49c7b08ac58de319c21a5fd49d6a39aecbae4bd0f079aab13eb24843b657b3b9e2f1e2d0731f5e00a4bafcf845d00e210b9ebf51a2303fbc02c70c9d4c62d4849f61727ffdac8e7a0e5b4b92dc03aa3ec3e37067eda1f5ee14cea961ae21f23d6678", 0xaf}], 0x2, 0xd)

06:18:53 executing program 2:
r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0)
mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800004, 0x12, r0, 0x0)
preadv(r0, 0x0, 0x0, 0x9, 0x0)
mmap(&(0x7f0000000000/0xa000)=nil, 0xa000, 0x2, 0x2172, 0xffffffffffffffff, 0x0)
socketpair(0x29, 0x80005, 0x0, &(0x7f0000000340)={0x0, 0x0})

06:18:53 executing program 3:
r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0)
mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800004, 0x12, r0, 0x0)
preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x9, 0x0)
mmap(&(0x7f0000000000/0xa000)=nil, 0xa000, 0x2, 0x2172, 0xffffffffffffffff, 0x0)
r1 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x11, 0x4, &(0x7f00000000c0)=@framed={{}, [@call={0x85, 0x0, 0x0, 0x7b}]}, &(0x7f00000001c0)='syzkaller\x00', 0x4, 0x8f, &(0x7f00000002c0)=""/143, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78)
bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='ext4_es_lookup_extent_exit\x00', r1}, 0x10)
preadv(r1, &(0x7f0000000080)=[{&(0x7f0000000040)=""/12, 0xc}], 0x1, 0x36, 0x401)
r2 = socket$unix(0x1, 0x1, 0x0)
bind$unix(r2, &(0x7f00000001c0)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x56)

06:18:53 executing program 0:
r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0)
mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800004, 0x12, r0, 0x0)
preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x9, 0x0)
mmap(&(0x7f0000000000/0xa000)=nil, 0xa000, 0x2, 0x2172, 0xffffffffffffffff, 0x0)
syz_mount_image$nilfs2(&(0x7f0000000180), 0x0, 0xd85, 0x7, &(0x7f00000006c0)=[{&(0x7f0000000240)="997c7e90471ec6786b6aa37fd8fbf290c011bee5642707bf7b126c36024e5e8f0d3d514aa1538eb70908eb3ac1a8a52e0ba29dab8884c189c9b68415aa0226e7c6a7ccf48ad20543b10360ab7ee9b247e4304d92f0ec7c0ba06d8160095660a0f12836e2033baed6228d464479ce22f2fadce176d0750fdc6ab1004eb9c4440707be1dc31c1ce11815d12f0d50eef6477341b3f6a4f364a1fccd68e2bcd2dba76227338cd6a1835a44", 0xa9, 0x8}, {&(0x7f0000000380)="3a79b76eed8bb53c1f5217cb4d40694fa75675b28af54d40304f697a1d04373a7ef7b09d46fa6365d222516dcc92d004bc937a22980c404bb5b5669f3dfd0e569079c03b2855be3337944aea4b03b03a3eb6d7", 0x53, 0x3}, {&(0x7f0000000400)="c8213af91316be74099fc072cc912017e77b8709c846cf00eb99c7c03cee58e25602e6ec0b4b42c8709e4447b0d23296a71661cdb6ea9b13d35ed3206f67e5559840f063e554ed7fcb842ab9b072197358b7a617cb0825abfabe3da9b022ecbe28ebcc22bd651a40dfcf4782be0c0c6d8adb8fdd7afce8c8659cc9eef1483eceb26a223fa9d591e28633e6bf6facd75e4295341e2ef3788284fc4482db16cab37de0c1adbf7fa07ad161ae875284778f49e15a052d875e", 0xb7, 0x80}, {&(0x7f00000004c0)="056b3e2d287f817e74a518293ea19b1196cccb376ac73cd7bbeccaced6f43aa9706b33d8ec56c58be0febb03dadec48add6a378f07f9053f1b6f33fe63a960502ad48232f0bee4a41509d7063d478768ab8ee0a90ebdb7c9bc326d54c8edad7e9d59641faf45c171e35f77f8c38a7563e1555c331a5a3e4da1ce59c0c697ebe071d527f24563165dafd23b45186c3d55251c825d0d7fd16b0f13a2f1321cddbcf231b398a88b19e3915ee544692c3559f42a", 0xb2, 0x6}, {&(0x7f0000000580)="8023d53ac815f8a84b84350b859e8673ed208a78bbfec2e35d6d4927707d5dd61106eb0321af3709c17fe7661323c51575e9c18d7b834c138636224eb1a7d75dd59d5c5d7411bdd4c2b07cf727643f52b1ca3e1680cde001be2f8334303e9f4191c2f9425472ca1ee6bac17fde09f0ce5fdf2e70d3c1a38b2d3e0e804f7df817b6a03e5e1ffea1ca7cd7", 0x8a, 0x8}, {&(0x7f0000000300)="fae83b83fc781c7715", 0x9, 0x8fe}, {&(0x7f0000000640)="96f1e3c89318e48db56867032dd1ba9b0ffeec69eb34236bd93b937c6bb7447840dc021e536b89aad4fe89ca2317f4fe2b36cbbdd8d72d841aee6f7b7be258352406775f169573cbf4da0bcf856f825233c5387a3a7cde778c057d591f2133c10e8b5bdb164577f492130acfc7", 0x6d, 0x5}], 0x802010, &(0x7f0000000740)={[{@order_relaxed}], [{@fsname}, {@fsuuid={'fsuuid', 0x3d, {[0x36, 0x38, 0x61, 0x64, 0x39, 0x38, 0x31, 0x37], 0x2d, [0x62, 0x61, 0x61, 0x63], 0x2d, [0x62, 0x39, 0x33, 0x35], 0x2d, [0x32, 0x37, 0x33, 0x61], 0x2d, [0x61, 0x39, 0x64, 0x65, 0x31, 0x8eb4bab6ccebb2ed, 0x64, 0x62]}}}]})

06:18:53 executing program 1:
r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0)
mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800004, 0x12, r0, 0x0)
preadv(0xffffffffffffffff, &(0x7f00000001c0)=[{0x0}], 0x1, 0x9, 0x0)
vmsplice(r0, &(0x7f0000000240)=[{&(0x7f0000000080)="4ab1b8694a30bc0b64f0bf0fa59d6d6310a9fca4f5ca7242c45a43a3f790f1bb52f7d713fdc0e6dfa75a5fa7f39f0c693511ea6a67b64b56fa4550fb865102551e0de8881e54887a6391bc4677137a4e433d75874a6619ff219d8ab89c1fdd9fe0d5ae7f1b35994210b3700e36625640f808", 0x72}, {&(0x7f0000000100)="b4346c01f32075d5cdbe81dc2919a8983c8e9f197195a027c0b95dec78d35df6ebeb63bff0423813616d67337c30bab5b6fb29da1bb7c014982cb6715df37902afa71736216374d5265195d9de49c7b08ac58de319c21a5fd49d6a39aecbae4bd0f079aab13eb24843b657b3b9e2f1e2d0731f5e00a4bafcf845d00e210b9ebf51a2303fbc02c70c9d4c62d4849f61727ffdac8e7a0e5b4b92dc03aa3ec3e37067eda1f5ee14cea961ae21f23d6678", 0xaf}], 0x2, 0xd)

06:18:53 executing program 2:
r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0)
mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800004, 0x12, r0, 0x0)
preadv(r0, 0x0, 0x0, 0x9, 0x0)
mmap(&(0x7f0000000000/0xa000)=nil, 0xa000, 0x2, 0x2172, 0xffffffffffffffff, 0x0)
socketpair(0x29, 0x80005, 0x0, &(0x7f0000000340)={0x0, 0x0})

06:18:53 executing program 1:
r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0)
mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800004, 0x12, r0, 0x0)
preadv(0xffffffffffffffff, &(0x7f00000001c0)=[{0x0}], 0x1, 0x9, 0x0)
vmsplice(r0, &(0x7f0000000240)=[{&(0x7f0000000080)="4ab1b8694a30bc0b64f0bf0fa59d6d6310a9fca4f5ca7242c45a43a3f790f1bb52f7d713fdc0e6dfa75a5fa7f39f0c693511ea6a67b64b56fa4550fb865102551e0de8881e54887a6391bc4677137a4e433d75874a6619ff219d8ab89c1fdd9fe0d5ae7f1b35994210b3700e36625640f808", 0x72}, {&(0x7f0000000100)="b4346c01f32075d5cdbe81dc2919a8983c8e9f197195a027c0b95dec78d35df6ebeb63bff0423813616d67337c30bab5b6fb29da1bb7c014982cb6715df37902afa71736216374d5265195d9de49c7b08ac58de319c21a5fd49d6a39aecbae4bd0f079aab13eb24843b657b3b9e2f1e2d0731f5e00a4bafcf845d00e210b9ebf51a2303fbc02c70c9d4c62d4849f61727ffdac8e7a0e5b4b92dc03aa3ec3e37067eda1f5ee14cea961ae21f23d6678", 0xaf}], 0x2, 0xd)

06:18:53 executing program 3:
r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0)
mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800004, 0x12, r0, 0x0)
preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x9, 0x0)
mmap(&(0x7f0000000000/0xa000)=nil, 0xa000, 0x2, 0x2172, 0xffffffffffffffff, 0x0)
r1 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x11, 0x4, &(0x7f00000000c0)=@framed={{}, [@call={0x85, 0x0, 0x0, 0x7b}]}, &(0x7f00000001c0)='syzkaller\x00', 0x4, 0x8f, &(0x7f00000002c0)=""/143, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78)
bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='ext4_es_lookup_extent_exit\x00', r1}, 0x10)
r2 = socket$unix(0x1, 0x1, 0x0)
bind$unix(r2, &(0x7f00000001c0)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x56)

[  335.733683][T14956] loop0: detected capacity change from 0 to 8
06:18:53 executing program 2:
r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0)
mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800004, 0x12, r0, 0x0)
preadv(r0, 0x0, 0x0, 0x9, 0x0)
mmap(&(0x7f0000000000/0xa000)=nil, 0xa000, 0x2, 0x2172, 0xffffffffffffffff, 0x0)
socketpair(0x29, 0x80005, 0x0, &(0x7f0000000340)={0x0, 0x0})

06:18:53 executing program 1:
r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0)
mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800004, 0x12, r0, 0x0)
preadv(0xffffffffffffffff, &(0x7f00000001c0)=[{0x0}], 0x1, 0x9, 0x0)
vmsplice(r0, &(0x7f0000000240)=[{&(0x7f0000000080)="4ab1b8694a30bc0b64f0bf0fa59d6d6310a9fca4f5ca7242c45a43a3f790f1bb52f7d713fdc0e6dfa75a5fa7f39f0c693511ea6a67b64b56fa4550fb865102551e0de8881e54887a6391bc4677137a4e433d75874a6619ff219d8ab89c1fdd9fe0d5ae7f1b35994210b3700e36625640f808", 0x72}, {&(0x7f0000000100)="b4346c01f32075d5cdbe81dc2919a8983c8e9f197195a027c0b95dec78d35df6ebeb63bff0423813616d67337c30bab5b6fb29da1bb7c014982cb6715df37902afa71736216374d5265195d9de49c7b08ac58de319c21a5fd49d6a39aecbae4bd0f079aab13eb24843b657b3b9e2f1e2d0731f5e00a4bafcf845d00e210b9ebf51a2303fbc02c70c9d4c62d4849f61727ffdac8e7a0e5b4b92dc03aa3ec3e37067eda1f5ee14cea961ae21f23d6678", 0xaf}], 0x2, 0xd)

06:18:53 executing program 3:
r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0)
mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800004, 0x12, r0, 0x0)
preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x9, 0x0)
mmap(&(0x7f0000000000/0xa000)=nil, 0xa000, 0x2, 0x2172, 0xffffffffffffffff, 0x0)
bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x11, 0x4, &(0x7f00000000c0)=@framed={{}, [@call={0x85, 0x0, 0x0, 0x7b}]}, &(0x7f00000001c0)='syzkaller\x00', 0x4, 0x8f, &(0x7f00000002c0)=""/143, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78)
r1 = socket$unix(0x1, 0x1, 0x0)
bind$unix(r1, &(0x7f00000001c0)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x56)

06:18:53 executing program 0:
r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0)
mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800004, 0x12, r0, 0x0)
preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x9, 0x0)
mmap(&(0x7f0000000000/0xa000)=nil, 0xa000, 0x2, 0x2172, 0xffffffffffffffff, 0x0)
syz_mount_image$nilfs2(&(0x7f0000000180), 0x0, 0xd85, 0x7, &(0x7f00000006c0)=[{&(0x7f0000000240)="997c7e90471ec6786b6aa37fd8fbf290c011bee5642707bf7b126c36024e5e8f0d3d514aa1538eb70908eb3ac1a8a52e0ba29dab8884c189c9b68415aa0226e7c6a7ccf48ad20543b10360ab7ee9b247e4304d92f0ec7c0ba06d8160095660a0f12836e2033baed6228d464479ce22f2fadce176d0750fdc6ab1004eb9c4440707be1dc31c1ce11815d12f0d50eef6477341b3f6a4f364a1fccd68e2bcd2dba76227338cd6a1835a44", 0xa9, 0x8}, {&(0x7f0000000380)="3a79b76eed8bb53c1f5217cb4d40694fa75675b28af54d40304f697a1d04373a7ef7b09d46fa6365d222516dcc92d004bc937a22980c404bb5b5669f3dfd0e569079c03b2855be3337944aea4b03b03a3eb6d7", 0x53, 0x3}, {&(0x7f0000000400)="c8213af91316be74099fc072cc912017e77b8709c846cf00eb99c7c03cee58e25602e6ec0b4b42c8709e4447b0d23296a71661cdb6ea9b13d35ed3206f67e5559840f063e554ed7fcb842ab9b072197358b7a617cb0825abfabe3da9b022ecbe28ebcc22bd651a40dfcf4782be0c0c6d8adb8fdd7afce8c8659cc9eef1483eceb26a223fa9d591e28633e6bf6facd75e4295341e2ef3788284fc4482db16cab37de0c1adbf7fa07ad161ae875284778f49e15a052d875e", 0xb7, 0x80}, {&(0x7f00000004c0)="056b3e2d287f817e74a518293ea19b1196cccb376ac73cd7bbeccaced6f43aa9706b33d8ec56c58be0febb03dadec48add6a378f07f9053f1b6f33fe63a960502ad48232f0bee4a41509d7063d478768ab8ee0a90ebdb7c9bc326d54c8edad7e9d59641faf45c171e35f77f8c38a7563e1555c331a5a3e4da1ce59c0c697ebe071d527f24563165dafd23b45186c3d55251c825d0d7fd16b0f13a2f1321cddbcf231b398a88b19e3915ee544692c3559f42a", 0xb2, 0x6}, {&(0x7f0000000580)="8023d53ac815f8a84b84350b859e8673ed208a78bbfec2e35d6d4927707d5dd61106eb0321af3709c17fe7661323c51575e9c18d7b834c138636224eb1a7d75dd59d5c5d7411bdd4c2b07cf727643f52b1ca3e1680cde001be2f8334303e9f4191c2f9425472ca1ee6bac17fde09f0ce5fdf2e70d3c1a38b2d3e0e804f7df817b6a03e5e1ffea1ca7cd7", 0x8a, 0x8}, {&(0x7f0000000300)="fae83b83fc781c7715", 0x9, 0x8fe}, {&(0x7f0000000640)="96f1e3c89318e48db56867032dd1ba9b0ffeec69eb34236bd93b937c6bb7447840dc021e536b89aad4fe89ca2317f4fe2b36cbbdd8d72d841aee6f7b7be258352406775f169573cbf4da0bcf856f825233c5387a3a7cde778c057d591f2133c10e8b5bdb164577f492130acfc7", 0x6d, 0x5}], 0x802010, &(0x7f0000000740)={[{@order_relaxed}], [{@fsname}, {@fsuuid={'fsuuid', 0x3d, {[0x36, 0x38, 0x61, 0x64, 0x39, 0x38, 0x31, 0x37], 0x2d, [0x62, 0x61, 0x61, 0x63], 0x2d, [0x62, 0x39, 0x33, 0x35], 0x2d, [0x32, 0x37, 0x33, 0x61], 0x2d, [0x61, 0x39, 0x64, 0x65, 0x31, 0x8eb4bab6ccebb2ed, 0x64, 0x62]}}}]})

06:18:53 executing program 3:
r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0)
mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800004, 0x12, r0, 0x0)
preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x9, 0x0)
mmap(&(0x7f0000000000/0xa000)=nil, 0xa000, 0x2, 0x2172, 0xffffffffffffffff, 0x0)
bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x11, 0x4, &(0x7f00000000c0)=@framed={{}, [@call={0x85, 0x0, 0x0, 0x7b}]}, &(0x7f00000001c0)='syzkaller\x00', 0x4, 0x8f, &(0x7f00000002c0)=""/143, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78)
r1 = socket$unix(0x1, 0x1, 0x0)
bind$unix(r1, &(0x7f00000001c0)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x56)

06:18:53 executing program 1:
r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0)
mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800004, 0x12, r0, 0x0)
preadv(r0, 0x0, 0x0, 0x9, 0x0)
vmsplice(r0, &(0x7f0000000240)=[{&(0x7f0000000080)="4ab1b8694a30bc0b64f0bf0fa59d6d6310a9fca4f5ca7242c45a43a3f790f1bb52f7d713fdc0e6dfa75a5fa7f39f0c693511ea6a67b64b56fa4550fb865102551e0de8881e54887a6391bc4677137a4e433d75874a6619ff219d8ab89c1fdd9fe0d5ae7f1b35994210b3700e36625640f808", 0x72}, {&(0x7f0000000100)="b4346c01f32075d5cdbe81dc2919a8983c8e9f197195a027c0b95dec78d35df6ebeb63bff0423813616d67337c30bab5b6fb29da1bb7c014982cb6715df37902afa71736216374d5265195d9de49c7b08ac58de319c21a5fd49d6a39aecbae4bd0f079aab13eb24843b657b3b9e2f1e2d0731f5e00a4bafcf845d00e210b9ebf51a2303fbc02c70c9d4c62d4849f61727ffdac8e7a0e5b4b92dc03aa3ec3e37067eda1f5ee14cea961ae21f23d6678", 0xaf}], 0x2, 0xd)

06:18:53 executing program 2:
r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0)
mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800004, 0x12, r0, 0x0)
preadv(r0, &(0x7f00000001c0), 0x0, 0x9, 0x0)
mmap(&(0x7f0000000000/0xa000)=nil, 0xa000, 0x2, 0x2172, 0xffffffffffffffff, 0x0)
socketpair(0x29, 0x80005, 0x0, &(0x7f0000000340)={0x0, 0x0})

[  335.902154][T14976] loop0: detected capacity change from 0 to 8
06:18:53 executing program 1:
r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0)
mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800004, 0x12, r0, 0x0)
preadv(r0, 0x0, 0x0, 0x9, 0x0)
vmsplice(r0, &(0x7f0000000240)=[{&(0x7f0000000080)="4ab1b8694a30bc0b64f0bf0fa59d6d6310a9fca4f5ca7242c45a43a3f790f1bb52f7d713fdc0e6dfa75a5fa7f39f0c693511ea6a67b64b56fa4550fb865102551e0de8881e54887a6391bc4677137a4e433d75874a6619ff219d8ab89c1fdd9fe0d5ae7f1b35994210b3700e36625640f808", 0x72}, {&(0x7f0000000100)="b4346c01f32075d5cdbe81dc2919a8983c8e9f197195a027c0b95dec78d35df6ebeb63bff0423813616d67337c30bab5b6fb29da1bb7c014982cb6715df37902afa71736216374d5265195d9de49c7b08ac58de319c21a5fd49d6a39aecbae4bd0f079aab13eb24843b657b3b9e2f1e2d0731f5e00a4bafcf845d00e210b9ebf51a2303fbc02c70c9d4c62d4849f61727ffdac8e7a0e5b4b92dc03aa3ec3e37067eda1f5ee14cea961ae21f23d6678", 0xaf}], 0x2, 0xd)

06:18:53 executing program 2:
r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0)
mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800004, 0x12, r0, 0x0)
preadv(r0, &(0x7f00000001c0), 0x0, 0x9, 0x0)
mmap(&(0x7f0000000000/0xa000)=nil, 0xa000, 0x2, 0x2172, 0xffffffffffffffff, 0x0)
socketpair(0x29, 0x80005, 0x0, &(0x7f0000000340)={0x0, 0x0})

06:18:53 executing program 0:
r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0)
mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800004, 0x12, r0, 0x0)
preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x9, 0x0)
mmap(&(0x7f0000000000/0xa000)=nil, 0xa000, 0x2, 0x2172, 0xffffffffffffffff, 0x0)
syz_mount_image$nilfs2(&(0x7f0000000180), 0x0, 0xd85, 0x7, &(0x7f00000006c0)=[{&(0x7f0000000240)="997c7e90471ec6786b6aa37fd8fbf290c011bee5642707bf7b126c36024e5e8f0d3d514aa1538eb70908eb3ac1a8a52e0ba29dab8884c189c9b68415aa0226e7c6a7ccf48ad20543b10360ab7ee9b247e4304d92f0ec7c0ba06d8160095660a0f12836e2033baed6228d464479ce22f2fadce176d0750fdc6ab1004eb9c4440707be1dc31c1ce11815d12f0d50eef6477341b3f6a4f364a1fccd68e2bcd2dba76227338cd6a1835a44", 0xa9, 0x8}, {&(0x7f0000000380)="3a79b76eed8bb53c1f5217cb4d40694fa75675b28af54d40304f697a1d04373a7ef7b09d46fa6365d222516dcc92d004bc937a22980c404bb5b5669f3dfd0e569079c03b2855be3337944aea4b03b03a3eb6d7", 0x53, 0x3}, {&(0x7f0000000400)="c8213af91316be74099fc072cc912017e77b8709c846cf00eb99c7c03cee58e25602e6ec0b4b42c8709e4447b0d23296a71661cdb6ea9b13d35ed3206f67e5559840f063e554ed7fcb842ab9b072197358b7a617cb0825abfabe3da9b022ecbe28ebcc22bd651a40dfcf4782be0c0c6d8adb8fdd7afce8c8659cc9eef1483eceb26a223fa9d591e28633e6bf6facd75e4295341e2ef3788284fc4482db16cab37de0c1adbf7fa07ad161ae875284778f49e15a052d875e", 0xb7, 0x80}, {&(0x7f00000004c0)="056b3e2d287f817e74a518293ea19b1196cccb376ac73cd7bbeccaced6f43aa9706b33d8ec56c58be0febb03dadec48add6a378f07f9053f1b6f33fe63a960502ad48232f0bee4a41509d7063d478768ab8ee0a90ebdb7c9bc326d54c8edad7e9d59641faf45c171e35f77f8c38a7563e1555c331a5a3e4da1ce59c0c697ebe071d527f24563165dafd23b45186c3d55251c825d0d7fd16b0f13a2f1321cddbcf231b398a88b19e3915ee544692c3559f42a", 0xb2, 0x6}, {&(0x7f0000000580)="8023d53ac815f8a84b84350b859e8673ed208a78bbfec2e35d6d4927707d5dd61106eb0321af3709c17fe7661323c51575e9c18d7b834c138636224eb1a7d75dd59d5c5d7411bdd4c2b07cf727643f52b1ca3e1680cde001be2f8334303e9f4191c2f9425472ca1ee6bac17fde09f0ce5fdf2e70d3c1a38b2d3e0e804f7df817b6a03e5e1ffea1ca7cd7", 0x8a, 0x8}, {&(0x7f0000000300)="fae83b83fc781c7715", 0x9, 0x8fe}, {&(0x7f0000000640)="96f1e3c89318e48db56867032dd1ba9b0ffeec69eb34236bd93b937c6bb7447840dc021e536b89aad4fe89ca2317f4fe2b36cbbdd8d72d841aee6f7b7be258352406775f169573cbf4da0bcf856f825233c5387a3a7cde778c057d591f2133c10e8b5bdb164577f492130acfc7", 0x6d, 0x5}], 0x802010, &(0x7f0000000740)={[{@order_relaxed}], [{@fsname}, {@fsuuid={'fsuuid', 0x3d, {[0x36, 0x38, 0x61, 0x64, 0x39, 0x38, 0x31, 0x37], 0x2d, [0x62, 0x61, 0x61, 0x63], 0x2d, [0x62, 0x39, 0x33, 0x35], 0x2d, [0x32, 0x37, 0x33, 0x61], 0x2d, [0x61, 0x39, 0x64, 0x65, 0x31, 0x8eb4bab6ccebb2ed, 0x64, 0x62]}}}]})

06:18:53 executing program 3:
r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0)
mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800004, 0x12, r0, 0x0)
preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x9, 0x0)
mmap(&(0x7f0000000000/0xa000)=nil, 0xa000, 0x2, 0x2172, 0xffffffffffffffff, 0x0)
bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x11, 0x4, &(0x7f00000000c0)=@framed={{}, [@call={0x85, 0x0, 0x0, 0x7b}]}, &(0x7f00000001c0)='syzkaller\x00', 0x4, 0x8f, &(0x7f00000002c0)=""/143, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78)
r1 = socket$unix(0x1, 0x1, 0x0)
bind$unix(r1, &(0x7f00000001c0)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x56)

06:18:53 executing program 2:
r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0)
mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800004, 0x12, r0, 0x0)
preadv(r0, &(0x7f00000001c0), 0x0, 0x9, 0x0)
mmap(&(0x7f0000000000/0xa000)=nil, 0xa000, 0x2, 0x2172, 0xffffffffffffffff, 0x0)
socketpair(0x29, 0x80005, 0x0, &(0x7f0000000340)={0x0, 0x0})

[  336.034983][T14989] loop0: detected capacity change from 0 to 8
06:18:53 executing program 1:
r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0)
mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800004, 0x12, r0, 0x0)
preadv(r0, 0x0, 0x0, 0x9, 0x0)
vmsplice(r0, &(0x7f0000000240)=[{&(0x7f0000000080)="4ab1b8694a30bc0b64f0bf0fa59d6d6310a9fca4f5ca7242c45a43a3f790f1bb52f7d713fdc0e6dfa75a5fa7f39f0c693511ea6a67b64b56fa4550fb865102551e0de8881e54887a6391bc4677137a4e433d75874a6619ff219d8ab89c1fdd9fe0d5ae7f1b35994210b3700e36625640f808", 0x72}, {&(0x7f0000000100)="b4346c01f32075d5cdbe81dc2919a8983c8e9f197195a027c0b95dec78d35df6ebeb63bff0423813616d67337c30bab5b6fb29da1bb7c014982cb6715df37902afa71736216374d5265195d9de49c7b08ac58de319c21a5fd49d6a39aecbae4bd0f079aab13eb24843b657b3b9e2f1e2d0731f5e00a4bafcf845d00e210b9ebf51a2303fbc02c70c9d4c62d4849f61727ffdac8e7a0e5b4b92dc03aa3ec3e37067eda1f5ee14cea961ae21f23d6678", 0xaf}], 0x2, 0xd)

06:18:53 executing program 3:
r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0)
mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800004, 0x12, r0, 0x0)
preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x9, 0x0)
mmap(&(0x7f0000000000/0xa000)=nil, 0xa000, 0x2, 0x2172, 0xffffffffffffffff, 0x0)
bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='ext4_es_lookup_extent_exit\x00'}, 0x10)
r1 = socket$unix(0x1, 0x1, 0x0)
bind$unix(r1, &(0x7f00000001c0)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x56)

06:18:53 executing program 2:
r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0)
mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800004, 0x12, r0, 0x0)
preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x0, 0x0)
mmap(&(0x7f0000000000/0xa000)=nil, 0xa000, 0x2, 0x2172, 0xffffffffffffffff, 0x0)
socketpair(0x29, 0x80005, 0x0, &(0x7f0000000340)={0x0, 0x0})

06:18:53 executing program 1:
r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0)
mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800004, 0x12, r0, 0x0)
preadv(r0, &(0x7f00000001c0), 0x0, 0x9, 0x0)
vmsplice(r0, &(0x7f0000000240)=[{&(0x7f0000000080)="4ab1b8694a30bc0b64f0bf0fa59d6d6310a9fca4f5ca7242c45a43a3f790f1bb52f7d713fdc0e6dfa75a5fa7f39f0c693511ea6a67b64b56fa4550fb865102551e0de8881e54887a6391bc4677137a4e433d75874a6619ff219d8ab89c1fdd9fe0d5ae7f1b35994210b3700e36625640f808", 0x72}, {&(0x7f0000000100)="b4346c01f32075d5cdbe81dc2919a8983c8e9f197195a027c0b95dec78d35df6ebeb63bff0423813616d67337c30bab5b6fb29da1bb7c014982cb6715df37902afa71736216374d5265195d9de49c7b08ac58de319c21a5fd49d6a39aecbae4bd0f079aab13eb24843b657b3b9e2f1e2d0731f5e00a4bafcf845d00e210b9ebf51a2303fbc02c70c9d4c62d4849f61727ffdac8e7a0e5b4b92dc03aa3ec3e37067eda1f5ee14cea961ae21f23d6678", 0xaf}], 0x2, 0xd)

06:18:53 executing program 0:
r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0)
mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800004, 0x12, r0, 0x0)
preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x9, 0x0)
mmap(&(0x7f0000000000/0xa000)=nil, 0xa000, 0x2, 0x2172, 0xffffffffffffffff, 0x0)
syz_mount_image$nilfs2(&(0x7f0000000180), &(0x7f0000000200)='./file0\x00', 0x0, 0x7, &(0x7f00000006c0)=[{&(0x7f0000000240)="997c7e90471ec6786b6aa37fd8fbf290c011bee5642707bf7b126c36024e5e8f0d3d514aa1538eb70908eb3ac1a8a52e0ba29dab8884c189c9b68415aa0226e7c6a7ccf48ad20543b10360ab7ee9b247e4304d92f0ec7c0ba06d8160095660a0f12836e2033baed6228d464479ce22f2fadce176d0750fdc6ab1004eb9c4440707be1dc31c1ce11815d12f0d50eef6477341b3f6a4f364a1fccd68e2bcd2dba76227338cd6a1835a44", 0xa9, 0x8}, {&(0x7f0000000380)="3a79b76eed8bb53c1f5217cb4d40694fa75675b28af54d40304f697a1d04373a7ef7b09d46fa6365d222516dcc92d004bc937a22980c404bb5b5669f3dfd0e569079c03b2855be3337944aea4b03b03a3eb6d7", 0x53, 0x3}, {&(0x7f0000000400)="c8213af91316be74099fc072cc912017e77b8709c846cf00eb99c7c03cee58e25602e6ec0b4b42c8709e4447b0d23296a71661cdb6ea9b13d35ed3206f67e5559840f063e554ed7fcb842ab9b072197358b7a617cb0825abfabe3da9b022ecbe28ebcc22bd651a40dfcf4782be0c0c6d8adb8fdd7afce8c8659cc9eef1483eceb26a223fa9d591e28633e6bf6facd75e4295341e2ef3788284fc4482db16cab37de0c1adbf7fa07ad161ae875284778f49e15a052d875e", 0xb7, 0x80}, {&(0x7f00000004c0)="056b3e2d287f817e74a518293ea19b1196cccb376ac73cd7bbeccaced6f43aa9706b33d8ec56c58be0febb03dadec48add6a378f07f9053f1b6f33fe63a960502ad48232f0bee4a41509d7063d478768ab8ee0a90ebdb7c9bc326d54c8edad7e9d59641faf45c171e35f77f8c38a7563e1555c331a5a3e4da1ce59c0c697ebe071d527f24563165dafd23b45186c3d55251c825d0d7fd16b0f13a2f1321cddbcf231b398a88b19e3915ee544692c3559f42a", 0xb2, 0x6}, {&(0x7f0000000580)="8023d53ac815f8a84b84350b859e8673ed208a78bbfec2e35d6d4927707d5dd61106eb0321af3709c17fe7661323c51575e9c18d7b834c138636224eb1a7d75dd59d5c5d7411bdd4c2b07cf727643f52b1ca3e1680cde001be2f8334303e9f4191c2f9425472ca1ee6bac17fde09f0ce5fdf2e70d3c1a38b2d3e0e804f7df817b6a03e5e1ffea1ca7cd7", 0x8a, 0x8}, {&(0x7f0000000300)="fae83b83fc781c7715", 0x9, 0x8fe}, {&(0x7f0000000640)="96f1e3c89318e48db56867032dd1ba9b0ffeec69eb34236bd93b937c6bb7447840dc021e536b89aad4fe89ca2317f4fe2b36cbbdd8d72d841aee6f7b7be258352406775f169573cbf4da0bcf856f825233c5387a3a7cde778c057d591f2133c10e8b5bdb164577f492130acfc7", 0x6d, 0x5}], 0x802010, &(0x7f0000000740)={[{@order_relaxed}], [{@fsname}, {@fsuuid={'fsuuid', 0x3d, {[0x36, 0x38, 0x61, 0x64, 0x39, 0x38, 0x31, 0x37], 0x2d, [0x62, 0x61, 0x61, 0x63], 0x2d, [0x62, 0x39, 0x33, 0x35], 0x2d, [0x32, 0x37, 0x33, 0x61], 0x2d, [0x61, 0x39, 0x64, 0x65, 0x31, 0x8eb4bab6ccebb2ed, 0x64, 0x62]}}}]})

06:18:53 executing program 2:
r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0)
mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800004, 0x12, r0, 0x0)
preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x0, 0x0)
mmap(&(0x7f0000000000/0xa000)=nil, 0xa000, 0x2, 0x2172, 0xffffffffffffffff, 0x0)
socketpair(0x29, 0x80005, 0x0, &(0x7f0000000340)={0x0, 0x0})

06:18:53 executing program 3:
r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0)
mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800004, 0x12, r0, 0x0)
preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x9, 0x0)
mmap(&(0x7f0000000000/0xa000)=nil, 0xa000, 0x2, 0x2172, 0xffffffffffffffff, 0x0)
bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='ext4_es_lookup_extent_exit\x00'}, 0x10)
r1 = socket$unix(0x1, 0x1, 0x0)
bind$unix(r1, &(0x7f00000001c0)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x56)

06:18:53 executing program 1:
r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0)
mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800004, 0x12, r0, 0x0)
preadv(r0, &(0x7f00000001c0), 0x0, 0x9, 0x0)
vmsplice(r0, &(0x7f0000000240)=[{&(0x7f0000000080)="4ab1b8694a30bc0b64f0bf0fa59d6d6310a9fca4f5ca7242c45a43a3f790f1bb52f7d713fdc0e6dfa75a5fa7f39f0c693511ea6a67b64b56fa4550fb865102551e0de8881e54887a6391bc4677137a4e433d75874a6619ff219d8ab89c1fdd9fe0d5ae7f1b35994210b3700e36625640f808", 0x72}, {&(0x7f0000000100)="b4346c01f32075d5cdbe81dc2919a8983c8e9f197195a027c0b95dec78d35df6ebeb63bff0423813616d67337c30bab5b6fb29da1bb7c014982cb6715df37902afa71736216374d5265195d9de49c7b08ac58de319c21a5fd49d6a39aecbae4bd0f079aab13eb24843b657b3b9e2f1e2d0731f5e00a4bafcf845d00e210b9ebf51a2303fbc02c70c9d4c62d4849f61727ffdac8e7a0e5b4b92dc03aa3ec3e37067eda1f5ee14cea961ae21f23d6678", 0xaf}], 0x2, 0xd)

[  336.205291][T15006] loop0: detected capacity change from 0 to 8
06:18:53 executing program 3:
r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0)
mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800004, 0x12, r0, 0x0)
preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x9, 0x0)
mmap(&(0x7f0000000000/0xa000)=nil, 0xa000, 0x2, 0x2172, 0xffffffffffffffff, 0x0)
bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='ext4_es_lookup_extent_exit\x00'}, 0x10)
r1 = socket$unix(0x1, 0x1, 0x0)
bind$unix(r1, &(0x7f00000001c0)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x56)

06:18:53 executing program 2:
r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0)
mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800004, 0x12, r0, 0x0)
preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x0, 0x0)
mmap(&(0x7f0000000000/0xa000)=nil, 0xa000, 0x2, 0x2172, 0xffffffffffffffff, 0x0)
socketpair(0x29, 0x80005, 0x0, &(0x7f0000000340)={0x0, 0x0})

06:18:53 executing program 2:
r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0)
mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800004, 0x12, r0, 0x0)
preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x9, 0x0)
mmap(&(0x7f0000000000/0xa000)=nil, 0xa000, 0x0, 0x2172, 0xffffffffffffffff, 0x0)
socketpair(0x29, 0x80005, 0x0, &(0x7f0000000340)={0x0, 0x0})

06:18:53 executing program 1:
r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0)
mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800004, 0x12, r0, 0x0)
preadv(r0, &(0x7f00000001c0), 0x0, 0x9, 0x0)
vmsplice(r0, &(0x7f0000000240)=[{&(0x7f0000000080)="4ab1b8694a30bc0b64f0bf0fa59d6d6310a9fca4f5ca7242c45a43a3f790f1bb52f7d713fdc0e6dfa75a5fa7f39f0c693511ea6a67b64b56fa4550fb865102551e0de8881e54887a6391bc4677137a4e433d75874a6619ff219d8ab89c1fdd9fe0d5ae7f1b35994210b3700e36625640f808", 0x72}, {&(0x7f0000000100)="b4346c01f32075d5cdbe81dc2919a8983c8e9f197195a027c0b95dec78d35df6ebeb63bff0423813616d67337c30bab5b6fb29da1bb7c014982cb6715df37902afa71736216374d5265195d9de49c7b08ac58de319c21a5fd49d6a39aecbae4bd0f079aab13eb24843b657b3b9e2f1e2d0731f5e00a4bafcf845d00e210b9ebf51a2303fbc02c70c9d4c62d4849f61727ffdac8e7a0e5b4b92dc03aa3ec3e37067eda1f5ee14cea961ae21f23d6678", 0xaf}], 0x2, 0xd)

06:18:53 executing program 0:
r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0)
mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800004, 0x12, r0, 0x0)
preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x9, 0x0)
mmap(&(0x7f0000000000/0xa000)=nil, 0xa000, 0x2, 0x2172, 0xffffffffffffffff, 0x0)
syz_mount_image$nilfs2(&(0x7f0000000180), &(0x7f0000000200)='./file0\x00', 0x0, 0x0, 0x0, 0x802010, &(0x7f0000000740)={[{@order_relaxed}], [{@fsname}, {@fsuuid={'fsuuid', 0x3d, {[0x36, 0x38, 0x61, 0x64, 0x39, 0x38, 0x31, 0x37], 0x2d, [0x62, 0x61, 0x61, 0x63], 0x2d, [0x62, 0x39, 0x33, 0x35], 0x2d, [0x32, 0x37, 0x33, 0x61], 0x2d, [0x61, 0x39, 0x64, 0x65, 0x31, 0x8eb4bab6ccebb2ed, 0x64, 0x62]}}}]})

06:18:53 executing program 3:
r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0)
mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800004, 0x12, r0, 0x0)
preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x9, 0x0)
r1 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x11, 0x4, &(0x7f00000000c0)=@framed={{}, [@call={0x85, 0x0, 0x0, 0x7b}]}, &(0x7f00000001c0)='syzkaller\x00', 0x4, 0x8f, &(0x7f00000002c0)=""/143, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78)
bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='ext4_es_lookup_extent_exit\x00', r1}, 0x10)
r2 = socket$unix(0x1, 0x1, 0x0)
bind$unix(r2, &(0x7f00000001c0)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x56)

06:18:53 executing program 2:
r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0)
mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800004, 0x12, r0, 0x0)
preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x9, 0x0)
mmap(&(0x7f0000000000/0xa000)=nil, 0xa000, 0x0, 0x2172, 0xffffffffffffffff, 0x0)
socketpair(0x29, 0x80005, 0x0, &(0x7f0000000340)={0x0, 0x0})

06:18:53 executing program 3:
r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0)
mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800004, 0x12, r0, 0x0)
preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x9, 0x0)
r1 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x11, 0x4, &(0x7f00000000c0)=@framed={{}, [@call={0x85, 0x0, 0x0, 0x7b}]}, &(0x7f00000001c0)='syzkaller\x00', 0x4, 0x8f, &(0x7f00000002c0)=""/143, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78)
bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='ext4_es_lookup_extent_exit\x00', r1}, 0x10)
r2 = socket$unix(0x1, 0x1, 0x0)
bind$unix(r2, &(0x7f00000001c0)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x56)

06:18:53 executing program 1:
r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0)
mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800004, 0x12, r0, 0x0)
preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x0, 0x0)
vmsplice(r0, &(0x7f0000000240)=[{&(0x7f0000000080)="4ab1b8694a30bc0b64f0bf0fa59d6d6310a9fca4f5ca7242c45a43a3f790f1bb52f7d713fdc0e6dfa75a5fa7f39f0c693511ea6a67b64b56fa4550fb865102551e0de8881e54887a6391bc4677137a4e433d75874a6619ff219d8ab89c1fdd9fe0d5ae7f1b35994210b3700e36625640f808", 0x72}, {&(0x7f0000000100)="b4346c01f32075d5cdbe81dc2919a8983c8e9f197195a027c0b95dec78d35df6ebeb63bff0423813616d67337c30bab5b6fb29da1bb7c014982cb6715df37902afa71736216374d5265195d9de49c7b08ac58de319c21a5fd49d6a39aecbae4bd0f079aab13eb24843b657b3b9e2f1e2d0731f5e00a4bafcf845d00e210b9ebf51a2303fbc02c70c9d4c62d4849f61727ffdac8e7a0e5b4b92dc03aa3ec3e37067eda1f5ee14cea961ae21f23d6678", 0xaf}], 0x2, 0xd)

06:18:54 executing program 0:
r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0)
mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800004, 0x12, r0, 0x0)
preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x9, 0x0)
mmap(&(0x7f0000000000/0xa000)=nil, 0xa000, 0x2, 0x2172, 0xffffffffffffffff, 0x0)
syz_mount_image$nilfs2(&(0x7f0000000180), &(0x7f0000000200)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000740)={[{@order_relaxed}], [{@fsname}, {@fsuuid={'fsuuid', 0x3d, {[0x36, 0x38, 0x61, 0x64, 0x39, 0x38, 0x31, 0x37], 0x2d, [0x62, 0x61, 0x61, 0x63], 0x2d, [0x62, 0x39, 0x33, 0x35], 0x2d, [0x32, 0x37, 0x33, 0x61], 0x2d, [0x61, 0x39, 0x64, 0x65, 0x31, 0x8eb4bab6ccebb2ed, 0x64, 0x62]}}}]})

06:18:54 executing program 2:
r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0)
mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800004, 0x12, r0, 0x0)
preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x9, 0x0)
mmap(&(0x7f0000000000/0xa000)=nil, 0xa000, 0x0, 0x2172, 0xffffffffffffffff, 0x0)
socketpair(0x29, 0x80005, 0x0, &(0x7f0000000340)={0x0, 0x0})

06:18:54 executing program 3:
r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0)
mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800004, 0x12, r0, 0x0)
preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x9, 0x0)
r1 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x11, 0x4, &(0x7f00000000c0)=@framed={{}, [@call={0x85, 0x0, 0x0, 0x7b}]}, &(0x7f00000001c0)='syzkaller\x00', 0x4, 0x8f, &(0x7f00000002c0)=""/143, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78)
bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='ext4_es_lookup_extent_exit\x00', r1}, 0x10)
r2 = socket$unix(0x1, 0x1, 0x0)
bind$unix(r2, &(0x7f00000001c0)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x56)

06:18:54 executing program 1:
r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0)
mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800004, 0x12, r0, 0x0)
preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x0, 0x0)
vmsplice(r0, &(0x7f0000000240)=[{&(0x7f0000000080)="4ab1b8694a30bc0b64f0bf0fa59d6d6310a9fca4f5ca7242c45a43a3f790f1bb52f7d713fdc0e6dfa75a5fa7f39f0c693511ea6a67b64b56fa4550fb865102551e0de8881e54887a6391bc4677137a4e433d75874a6619ff219d8ab89c1fdd9fe0d5ae7f1b35994210b3700e36625640f808", 0x72}, {&(0x7f0000000100)="b4346c01f32075d5cdbe81dc2919a8983c8e9f197195a027c0b95dec78d35df6ebeb63bff0423813616d67337c30bab5b6fb29da1bb7c014982cb6715df37902afa71736216374d5265195d9de49c7b08ac58de319c21a5fd49d6a39aecbae4bd0f079aab13eb24843b657b3b9e2f1e2d0731f5e00a4bafcf845d00e210b9ebf51a2303fbc02c70c9d4c62d4849f61727ffdac8e7a0e5b4b92dc03aa3ec3e37067eda1f5ee14cea961ae21f23d6678", 0xaf}], 0x2, 0xd)

06:18:54 executing program 0:
r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0)
mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800004, 0x12, r0, 0x0)
preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x9, 0x0)
mmap(&(0x7f0000000000/0xa000)=nil, 0xa000, 0x2, 0x2172, 0xffffffffffffffff, 0x0)
syz_mount_image$nilfs2(&(0x7f0000000180), &(0x7f0000000200)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000740)={[{@order_relaxed}], [{@fsname}, {@fsuuid={'fsuuid', 0x3d, {[0x36, 0x38, 0x61, 0x64, 0x39, 0x38, 0x31, 0x37], 0x2d, [0x62, 0x61, 0x61, 0x63], 0x2d, [0x62, 0x39, 0x33, 0x35], 0x2d, [0x32, 0x37, 0x33, 0x61], 0x2d, [0x61, 0x39, 0x64, 0x65, 0x31, 0x8eb4bab6ccebb2ed, 0x64, 0x62]}}}]})

06:18:54 executing program 2:
r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0)
mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800004, 0x12, r0, 0x0)
preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x9, 0x0)
mmap(&(0x7f0000000000/0xa000)=nil, 0xa000, 0x2, 0x10, 0xffffffffffffffff, 0x0)
socketpair(0x29, 0x80005, 0x0, &(0x7f0000000340)={0x0, 0x0})

06:18:54 executing program 1:
r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0)
mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800004, 0x12, r0, 0x0)
preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x0, 0x0)
vmsplice(r0, &(0x7f0000000240)=[{&(0x7f0000000080)="4ab1b8694a30bc0b64f0bf0fa59d6d6310a9fca4f5ca7242c45a43a3f790f1bb52f7d713fdc0e6dfa75a5fa7f39f0c693511ea6a67b64b56fa4550fb865102551e0de8881e54887a6391bc4677137a4e433d75874a6619ff219d8ab89c1fdd9fe0d5ae7f1b35994210b3700e36625640f808", 0x72}, {&(0x7f0000000100)="b4346c01f32075d5cdbe81dc2919a8983c8e9f197195a027c0b95dec78d35df6ebeb63bff0423813616d67337c30bab5b6fb29da1bb7c014982cb6715df37902afa71736216374d5265195d9de49c7b08ac58de319c21a5fd49d6a39aecbae4bd0f079aab13eb24843b657b3b9e2f1e2d0731f5e00a4bafcf845d00e210b9ebf51a2303fbc02c70c9d4c62d4849f61727ffdac8e7a0e5b4b92dc03aa3ec3e37067eda1f5ee14cea961ae21f23d6678", 0xaf}], 0x2, 0xd)

06:18:54 executing program 3:
r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0)
mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800004, 0x12, r0, 0x0)
mmap(&(0x7f0000000000/0xa000)=nil, 0xa000, 0x2, 0x2172, 0xffffffffffffffff, 0x0)
r1 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x11, 0x4, &(0x7f00000000c0)=@framed={{}, [@call={0x85, 0x0, 0x0, 0x7b}]}, &(0x7f00000001c0)='syzkaller\x00', 0x4, 0x8f, &(0x7f00000002c0)=""/143, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78)
bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='ext4_es_lookup_extent_exit\x00', r1}, 0x10)
r2 = socket$unix(0x1, 0x1, 0x0)
bind$unix(r2, &(0x7f00000001c0)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x56)

06:18:54 executing program 0:
r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0)
mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800004, 0x12, r0, 0x0)
preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x9, 0x0)
mmap(&(0x7f0000000000/0xa000)=nil, 0xa000, 0x2, 0x2172, 0xffffffffffffffff, 0x0)
syz_mount_image$nilfs2(&(0x7f0000000180), &(0x7f0000000200)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000740)={[{@order_relaxed}], [{@fsname}, {@fsuuid={'fsuuid', 0x3d, {[0x36, 0x38, 0x61, 0x64, 0x39, 0x38, 0x31, 0x37], 0x2d, [0x62, 0x61, 0x61, 0x63], 0x2d, [0x62, 0x39, 0x33, 0x35], 0x2d, [0x32, 0x37, 0x33, 0x61], 0x2d, [0x61, 0x39, 0x64, 0x65, 0x31, 0x8eb4bab6ccebb2ed, 0x64, 0x62]}}}]})

06:18:54 executing program 2:
r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0)
mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800004, 0x12, r0, 0x0)
preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x9, 0x0)
mmap(&(0x7f0000000000/0xa000)=nil, 0xa000, 0x2, 0x10, 0xffffffffffffffff, 0x0)
socketpair(0x29, 0x80005, 0x0, &(0x7f0000000340)={0x0, 0x0})

06:18:54 executing program 1:
r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0)
mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800004, 0x12, r0, 0x0)
preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x9, 0x0)
vmsplice(0xffffffffffffffff, &(0x7f0000000240)=[{&(0x7f0000000080)="4ab1b8694a30bc0b64f0bf0fa59d6d6310a9fca4f5ca7242c45a43a3f790f1bb52f7d713fdc0e6dfa75a5fa7f39f0c693511ea6a67b64b56fa4550fb865102551e0de8881e54887a6391bc4677137a4e433d75874a6619ff219d8ab89c1fdd9fe0d5ae7f1b35994210b3700e36625640f808", 0x72}, {&(0x7f0000000100)="b4346c01f32075d5cdbe81dc2919a8983c8e9f197195a027c0b95dec78d35df6ebeb63bff0423813616d67337c30bab5b6fb29da1bb7c014982cb6715df37902afa71736216374d5265195d9de49c7b08ac58de319c21a5fd49d6a39aecbae4bd0f079aab13eb24843b657b3b9e2f1e2d0731f5e00a4bafcf845d00e210b9ebf51a2303fbc02c70c9d4c62d4849f61727ffdac8e7a0e5b4b92dc03aa3ec3e37067eda1f5ee14cea961ae21f23d6678", 0xaf}], 0x2, 0xd)

06:18:54 executing program 3:
r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0)
mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800004, 0x12, r0, 0x0)
mmap(&(0x7f0000000000/0xa000)=nil, 0xa000, 0x2, 0x2172, 0xffffffffffffffff, 0x0)
r1 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x11, 0x4, &(0x7f00000000c0)=@framed={{}, [@call={0x85, 0x0, 0x0, 0x7b}]}, &(0x7f00000001c0)='syzkaller\x00', 0x4, 0x8f, &(0x7f00000002c0)=""/143, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78)
bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='ext4_es_lookup_extent_exit\x00', r1}, 0x10)
r2 = socket$unix(0x1, 0x1, 0x0)
bind$unix(r2, &(0x7f00000001c0)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x56)

06:18:54 executing program 2:
r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0)
mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800004, 0x12, r0, 0x0)
preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x9, 0x0)
mmap(&(0x7f0000000000/0xa000)=nil, 0xa000, 0x2, 0x10, 0xffffffffffffffff, 0x0)
socketpair(0x29, 0x80005, 0x0, &(0x7f0000000340)={0x0, 0x0})

06:18:54 executing program 0:
r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0)
mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800004, 0x12, r0, 0x0)
preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x9, 0x0)
mmap(&(0x7f0000000000/0xa000)=nil, 0xa000, 0x2, 0x2172, 0xffffffffffffffff, 0x0)
syz_mount_image$nilfs2(&(0x7f0000000180), &(0x7f0000000200)='./file0\x00', 0x0, 0x0, 0x0, 0x802010, 0x0)

06:18:54 executing program 1:
r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0)
mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800004, 0x12, r0, 0x0)
preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x9, 0x0)
vmsplice(0xffffffffffffffff, &(0x7f0000000240)=[{&(0x7f0000000080)="4ab1b8694a30bc0b64f0bf0fa59d6d6310a9fca4f5ca7242c45a43a3f790f1bb52f7d713fdc0e6dfa75a5fa7f39f0c693511ea6a67b64b56fa4550fb865102551e0de8881e54887a6391bc4677137a4e433d75874a6619ff219d8ab89c1fdd9fe0d5ae7f1b35994210b3700e36625640f808", 0x72}, {&(0x7f0000000100)="b4346c01f32075d5cdbe81dc2919a8983c8e9f197195a027c0b95dec78d35df6ebeb63bff0423813616d67337c30bab5b6fb29da1bb7c014982cb6715df37902afa71736216374d5265195d9de49c7b08ac58de319c21a5fd49d6a39aecbae4bd0f079aab13eb24843b657b3b9e2f1e2d0731f5e00a4bafcf845d00e210b9ebf51a2303fbc02c70c9d4c62d4849f61727ffdac8e7a0e5b4b92dc03aa3ec3e37067eda1f5ee14cea961ae21f23d6678", 0xaf}], 0x2, 0xd)

06:18:54 executing program 0:
r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0)
mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800004, 0x12, r0, 0x0)
preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x9, 0x0)
mmap(&(0x7f0000000000/0xa000)=nil, 0xa000, 0x2, 0x2172, 0xffffffffffffffff, 0x0)
syz_mount_image$nilfs2(&(0x7f0000000180), &(0x7f0000000200)='./file0\x00', 0x0, 0x0, 0x0, 0x802010, 0x0)

06:18:54 executing program 2:
r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0)
mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800004, 0x12, r0, 0x0)
preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x9, 0x0)
mmap(&(0x7f0000000000/0xa000)=nil, 0xa000, 0x2, 0x2172, 0xffffffffffffffff, 0x0)
socketpair(0x0, 0x80005, 0x0, &(0x7f0000000340)={0x0, 0x0})

06:18:54 executing program 0:
r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0)
mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800004, 0x12, r0, 0x0)
preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x9, 0x0)
mmap(&(0x7f0000000000/0xa000)=nil, 0xa000, 0x2, 0x2172, 0xffffffffffffffff, 0x0)
syz_mount_image$nilfs2(&(0x7f0000000180), &(0x7f0000000200)='./file0\x00', 0x0, 0x0, 0x0, 0x802010, 0x0)

06:18:54 executing program 1:
r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0)
mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800004, 0x12, r0, 0x0)
preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x9, 0x0)
vmsplice(0xffffffffffffffff, &(0x7f0000000240)=[{&(0x7f0000000080)="4ab1b8694a30bc0b64f0bf0fa59d6d6310a9fca4f5ca7242c45a43a3f790f1bb52f7d713fdc0e6dfa75a5fa7f39f0c693511ea6a67b64b56fa4550fb865102551e0de8881e54887a6391bc4677137a4e433d75874a6619ff219d8ab89c1fdd9fe0d5ae7f1b35994210b3700e36625640f808", 0x72}, {&(0x7f0000000100)="b4346c01f32075d5cdbe81dc2919a8983c8e9f197195a027c0b95dec78d35df6ebeb63bff0423813616d67337c30bab5b6fb29da1bb7c014982cb6715df37902afa71736216374d5265195d9de49c7b08ac58de319c21a5fd49d6a39aecbae4bd0f079aab13eb24843b657b3b9e2f1e2d0731f5e00a4bafcf845d00e210b9ebf51a2303fbc02c70c9d4c62d4849f61727ffdac8e7a0e5b4b92dc03aa3ec3e37067eda1f5ee14cea961ae21f23d6678", 0xaf}], 0x2, 0xd)

06:18:54 executing program 3:
r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0)
mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800004, 0x12, r0, 0x0)
mmap(&(0x7f0000000000/0xa000)=nil, 0xa000, 0x2, 0x2172, 0xffffffffffffffff, 0x0)
r1 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x11, 0x4, &(0x7f00000000c0)=@framed={{}, [@call={0x85, 0x0, 0x0, 0x7b}]}, &(0x7f00000001c0)='syzkaller\x00', 0x4, 0x8f, &(0x7f00000002c0)=""/143, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78)
bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='ext4_es_lookup_extent_exit\x00', r1}, 0x10)
r2 = socket$unix(0x1, 0x1, 0x0)
bind$unix(r2, &(0x7f00000001c0)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x56)

06:18:54 executing program 1:
r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0)
mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800004, 0x12, r0, 0x0)
preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x9, 0x0)
vmsplice(r0, 0x0, 0x0, 0xd)

06:18:54 executing program 0:
r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0)
mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800004, 0x12, r0, 0x0)
preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x9, 0x0)
mmap(&(0x7f0000000000/0xa000)=nil, 0xa000, 0x2, 0x2172, 0xffffffffffffffff, 0x0)
syz_mount_image$nilfs2(&(0x7f0000000180), &(0x7f0000000200)='./file0\x00', 0x0, 0x0, 0x0, 0x802010, &(0x7f0000000740)={[], [{@fsname}, {@fsuuid={'fsuuid', 0x3d, {[0x36, 0x38, 0x61, 0x64, 0x39, 0x38, 0x31, 0x37], 0x2d, [0x62, 0x61, 0x61, 0x63], 0x2d, [0x62, 0x39, 0x33, 0x35], 0x2d, [0x32, 0x37, 0x33, 0x61], 0x2d, [0x61, 0x39, 0x64, 0x65, 0x31, 0x8eb4bab6ccebb2ed, 0x64, 0x62]}}}]})

06:18:54 executing program 2:
r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0)
mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800004, 0x12, r0, 0x0)
preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x9, 0x0)
mmap(&(0x7f0000000000/0xa000)=nil, 0xa000, 0x2, 0x2172, 0xffffffffffffffff, 0x0)
socketpair(0x0, 0x80005, 0x0, &(0x7f0000000340)={0x0, 0x0})

06:18:54 executing program 3:
r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0)
preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x9, 0x0)
mmap(&(0x7f0000000000/0xa000)=nil, 0xa000, 0x2, 0x2172, 0xffffffffffffffff, 0x0)
r1 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x11, 0x4, &(0x7f00000000c0)=@framed={{}, [@call={0x85, 0x0, 0x0, 0x7b}]}, &(0x7f00000001c0)='syzkaller\x00', 0x4, 0x8f, &(0x7f00000002c0)=""/143, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78)
bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='ext4_es_lookup_extent_exit\x00', r1}, 0x10)
r2 = socket$unix(0x1, 0x1, 0x0)
bind$unix(r2, &(0x7f00000001c0)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x56)

06:18:54 executing program 1:
r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0)
mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800004, 0x12, r0, 0x0)
preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x9, 0x0)
vmsplice(r0, 0x0, 0x0, 0x0)

06:18:54 executing program 0:
r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0)
mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800004, 0x12, r0, 0x0)
preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x9, 0x0)
mmap(&(0x7f0000000000/0xa000)=nil, 0xa000, 0x2, 0x2172, 0xffffffffffffffff, 0x0)
syz_mount_image$nilfs2(&(0x7f0000000180), &(0x7f0000000200)='./file0\x00', 0x0, 0x0, 0x0, 0x802010, &(0x7f0000000740)={[], [{@fsname}]})

06:18:54 executing program 1:
r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0)
mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800004, 0x12, r0, 0x0)
preadv(r0, 0x0, 0x0, 0x9, 0x0)
mmap(&(0x7f0000000000/0xa000)=nil, 0xa000, 0x2, 0x2172, 0xffffffffffffffff, 0x0)
socketpair(0x29, 0x80005, 0x0, &(0x7f0000000340)={0x0, 0x0})

06:18:54 executing program 3:
r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0)
preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x9, 0x0)
mmap(&(0x7f0000000000/0xa000)=nil, 0xa000, 0x2, 0x2172, 0xffffffffffffffff, 0x0)
r1 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x11, 0x4, &(0x7f00000000c0)=@framed={{}, [@call={0x85, 0x0, 0x0, 0x7b}]}, &(0x7f00000001c0)='syzkaller\x00', 0x4, 0x8f, &(0x7f00000002c0)=""/143, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78)
bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='ext4_es_lookup_extent_exit\x00', r1}, 0x10)
r2 = socket$unix(0x1, 0x1, 0x0)
bind$unix(r2, &(0x7f00000001c0)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x56)

06:18:54 executing program 2:
r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0)
mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800004, 0x12, r0, 0x0)
preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x9, 0x0)
mmap(&(0x7f0000000000/0xa000)=nil, 0xa000, 0x2, 0x2172, 0xffffffffffffffff, 0x0)
socketpair(0x0, 0x80005, 0x0, &(0x7f0000000340)={0x0, 0x0})

06:18:54 executing program 0:
r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0)
mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800004, 0x12, r0, 0x0)
preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x9, 0x0)
mmap(&(0x7f0000000000/0xa000)=nil, 0xa000, 0x2, 0x2172, 0xffffffffffffffff, 0x0)
syz_mount_image$nilfs2(&(0x7f0000000180), &(0x7f0000000200)='./file0\x00', 0x0, 0x0, 0x0, 0x802010, &(0x7f0000000740))

06:18:54 executing program 2:
r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0)
mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800004, 0x12, r0, 0x0)
preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x9, 0x0)
mmap(&(0x7f0000000000/0xa000)=nil, 0xa000, 0x2, 0x2172, 0xffffffffffffffff, 0x0)
socketpair(0x29, 0x0, 0x0, &(0x7f0000000340)={0x0, 0x0})

06:18:54 executing program 3:
r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0)
preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x9, 0x0)
mmap(&(0x7f0000000000/0xa000)=nil, 0xa000, 0x2, 0x2172, 0xffffffffffffffff, 0x0)
r1 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x11, 0x4, &(0x7f00000000c0)=@framed={{}, [@call={0x85, 0x0, 0x0, 0x7b}]}, &(0x7f00000001c0)='syzkaller\x00', 0x4, 0x8f, &(0x7f00000002c0)=""/143, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78)
bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='ext4_es_lookup_extent_exit\x00', r1}, 0x10)
r2 = socket$unix(0x1, 0x1, 0x0)
bind$unix(r2, &(0x7f00000001c0)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x56)

06:18:54 executing program 1:
r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0)
mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800004, 0x12, r0, 0x0)
preadv(r0, 0x0, 0x0, 0x9, 0x0)
mmap(&(0x7f0000000000/0xa000)=nil, 0xa000, 0x2, 0x2172, 0xffffffffffffffff, 0x0)
socketpair(0x29, 0x80005, 0x0, &(0x7f0000000340)={0x0, 0x0})

06:18:55 executing program 0:
r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0)
mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800004, 0x12, r0, 0x0)
preadv(0xffffffffffffffff, &(0x7f00000001c0)=[{0x0}], 0x1, 0x9, 0x0)
mmap(&(0x7f0000000000/0xa000)=nil, 0xa000, 0x2, 0x2172, 0xffffffffffffffff, 0x0)
socketpair(0x29, 0x80005, 0x0, &(0x7f0000000340)={0x0, 0x0})

06:18:55 executing program 3:
mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800004, 0x12, 0xffffffffffffffff, 0x0)
preadv(0xffffffffffffffff, &(0x7f00000001c0)=[{0x0}], 0x1, 0x9, 0x0)
mmap(&(0x7f0000000000/0xa000)=nil, 0xa000, 0x2, 0x2172, 0xffffffffffffffff, 0x0)
r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x11, 0x4, &(0x7f00000000c0)=@framed={{}, [@call={0x85, 0x0, 0x0, 0x7b}]}, &(0x7f00000001c0)='syzkaller\x00', 0x4, 0x8f, &(0x7f00000002c0)=""/143, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78)
bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='ext4_es_lookup_extent_exit\x00', r0}, 0x10)
r1 = socket$unix(0x1, 0x1, 0x0)
bind$unix(r1, &(0x7f00000001c0)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x56)

06:18:55 executing program 1:
r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0)
preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x9, 0x0)
mmap(&(0x7f0000000000/0xa000)=nil, 0xa000, 0x2, 0x2172, 0xffffffffffffffff, 0x0)
r1 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x11, 0x4, &(0x7f00000000c0)=@framed={{}, [@call={0x85, 0x0, 0x0, 0x7b}]}, &(0x7f00000001c0)='syzkaller\x00', 0x4, 0x8f, &(0x7f00000002c0)=""/143, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78)
bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='ext4_es_lookup_extent_exit\x00', r1}, 0x10)
r2 = socket$unix(0x1, 0x1, 0x0)
bind$unix(r2, &(0x7f00000001c0)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x56)

06:18:55 executing program 2:
r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0)
mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800004, 0x12, r0, 0x0)
preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x9, 0x0)
mmap(&(0x7f0000000000/0xa000)=nil, 0xa000, 0x2, 0x2172, 0xffffffffffffffff, 0x0)
socketpair(0x29, 0x0, 0x0, &(0x7f0000000340)={0x0, 0x0})

06:18:55 executing program 0:
r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0)
mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800004, 0x10, r0, 0x0)
preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x9, 0x0)
mmap(&(0x7f0000000000/0xa000)=nil, 0xa000, 0x2, 0x2172, 0xffffffffffffffff, 0x0)
socketpair(0x29, 0x80005, 0x0, &(0x7f0000000340)={0x0, 0x0})

06:18:55 executing program 3:
mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800004, 0x12, 0xffffffffffffffff, 0x0)
preadv(0xffffffffffffffff, &(0x7f00000001c0)=[{0x0}], 0x1, 0x9, 0x0)
mmap(&(0x7f0000000000/0xa000)=nil, 0xa000, 0x2, 0x2172, 0xffffffffffffffff, 0x0)
r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x11, 0x4, &(0x7f00000000c0)=@framed={{}, [@call={0x85, 0x0, 0x0, 0x7b}]}, &(0x7f00000001c0)='syzkaller\x00', 0x4, 0x8f, &(0x7f00000002c0)=""/143, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78)
bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='ext4_es_lookup_extent_exit\x00', r0}, 0x10)
r1 = socket$unix(0x1, 0x1, 0x0)
bind$unix(r1, &(0x7f00000001c0)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x56)

06:18:55 executing program 0:
r0 = openat(0xffffffffffffffff, &(0x7f0000000300)='./file0\x00', 0x0, 0x6)
mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800004, 0x12, r0, 0x0)
preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x9, 0x0)
mmap(&(0x7f0000008000/0x3000)=nil, 0x3000, 0x2, 0x11, 0xffffffffffffffff, 0x0)
r1 = openat$sequencer2(0xffffff9c, &(0x7f0000000040), 0x0, 0x0)
ppoll(&(0x7f0000000080)=[{r0, 0x200}, {r1, 0x2400}], 0x2, &(0x7f00000000c0), &(0x7f0000000100)={[0x0, 0x4]}, 0x8)
socketpair(0x1e, 0x80005, 0x0, &(0x7f0000000340)={<r2=>0x0, 0x0})
close(r2)
r3 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x11, 0x4, &(0x7f0000000440)=@framed={{0x18, 0x0, 0x0, 0x0, 0x3}, [@call={0x85, 0x0, 0x0, 0x78}]}, &(0x7f00000001c0)='syzkaller\x00', 0x4, 0x8f, &(0x7f0000000480)=""/143, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x74)
bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='ext4_es_lookup_extent_exit\x00', r3}, 0x10)
close(r3)
ioctl$TUNGETIFF(r0, 0x800454d2, &(0x7f00000002c0)={'wg1\x00'})
socket$phonet_pipe(0x23, 0x5, 0x2)
accept4(r2, &(0x7f0000000140)=@nfc_llcp, &(0x7f0000000200)=0x80, 0x80800)
r4 = getpgrp(0x0)
perf_event_open(&(0x7f0000000540)={0x0, 0x80, 0x0, 0x6, 0x3, 0xc5, 0x0, 0x6, 0x40, 0x8, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x3, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x8001, 0x1, @perf_config_ext={0x100, 0x3}, 0x10902, 0x4, 0x3, 0x0, 0x2, 0x6, 0x7f, 0x0, 0x0, 0x0, 0x401}, r4, 0x2, 0xffffffffffffffff, 0xa)
r5 = socket$unix(0x1, 0x1, 0x0)
bind$unix(r5, &(0x7f00000001c0)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x56)
poll(&(0x7f0000000000)=[{r5, 0x80}, {r1, 0x20}, {r1, 0x5604}], 0x3, 0x9)

06:18:55 executing program 2:
r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0)
mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800004, 0x12, r0, 0x0)
preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x9, 0x0)
mmap(&(0x7f0000000000/0xa000)=nil, 0xa000, 0x2, 0x2172, 0xffffffffffffffff, 0x0)
socketpair(0x29, 0x0, 0x0, &(0x7f0000000340)={0x0, 0x0})

06:18:55 executing program 1:
r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0)
mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800004, 0x12, r0, 0x0)
r1 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x11, 0x4, &(0x7f00000000c0)=@framed={{}, [@call={0x85, 0x0, 0x0, 0x7b}]}, &(0x7f00000001c0)='syzkaller\x00', 0x4, 0x8f, &(0x7f00000002c0)=""/143, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78)
bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='ext4_es_lookup_extent_exit\x00', r1}, 0x10)
ioctl$FS_IOC_FSGETXATTR(r1, 0x801c581f, &(0x7f0000000040)={0x106c, 0x80000001, 0xe0000000, 0x1, 0x101})
preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x9, 0x0)
mmap(&(0x7f0000000000/0xa000)=nil, 0xa000, 0x2, 0x2172, 0xffffffffffffffff, 0x0)
r2 = socket$unix(0x1, 0x1, 0x0)
r3 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0)
mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800004, 0x12, r3, 0x0)
preadv(r3, &(0x7f00000001c0)=[{0x0}], 0x1, 0x9, 0x0)
mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r3, 0x0)
openat(r3, &(0x7f0000000140)='\xe9\x1fq\x89Y\x1e\x923aK\x00', 0x400, 0x41)
bind$unix(r2, &(0x7f00000001c0)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x56)
ioctl$BTRFS_IOC_WAIT_SYNC(r2, 0x40089416, &(0x7f0000000100))
socketpair(0x1e, 0x80005, 0x0, &(0x7f0000000340)={0x0, 0x0})
bpf$BPF_BTF_GET_NEXT_ID(0x17, &(0x7f0000000580)={0x8, <r4=>0x0}, 0x8)
r5 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x11, 0x4, &(0x7f00000000c0)=@framed={{}, [@call={0x85, 0x0, 0x0, 0x7b}]}, &(0x7f00000001c0)='syzkaller\x00', 0x4, 0x8f, &(0x7f00000002c0)=""/143, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78)
bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='ext4_es_lookup_extent_exit\x00', r5}, 0x10)
bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0xd, 0x5, &(0x7f0000000380)=@raw=[@map={0x18, 0x4}, @map={0x18, 0xb, 0x1, 0x0, r0}, @call={0x85, 0x0, 0x0, 0x1a}], &(0x7f00000003c0)='GPL\x00', 0xfffffffe, 0xc2, &(0x7f0000000400)=""/194, 0x40f00, 0x9, '\x00', 0x0, 0x24, 0xffffffffffffffff, 0x8, &(0x7f0000000500)={0x9}, 0x8, 0x10, &(0x7f0000000540)={0x0, 0xf, 0x0, 0x401}, 0x10, r4, r5}, 0x74)

06:18:55 executing program 3:
mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800004, 0x12, 0xffffffffffffffff, 0x0)
preadv(0xffffffffffffffff, &(0x7f00000001c0)=[{0x0}], 0x1, 0x9, 0x0)
mmap(&(0x7f0000000000/0xa000)=nil, 0xa000, 0x2, 0x2172, 0xffffffffffffffff, 0x0)
r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x11, 0x4, &(0x7f00000000c0)=@framed={{}, [@call={0x85, 0x0, 0x0, 0x7b}]}, &(0x7f00000001c0)='syzkaller\x00', 0x4, 0x8f, &(0x7f00000002c0)=""/143, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78)
bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='ext4_es_lookup_extent_exit\x00', r0}, 0x10)
r1 = socket$unix(0x1, 0x1, 0x0)
bind$unix(r1, &(0x7f00000001c0)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x56)

06:18:55 executing program 2:
r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0)
mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800004, 0x12, r0, 0x0)
preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x9, 0x0)
mmap(&(0x7f0000000000/0xa000)=nil, 0xa000, 0x2, 0x2172, 0xffffffffffffffff, 0x0)
socketpair(0x29, 0x80005, 0x0, 0x0)

06:18:55 executing program 3:
r0 = openat(0xffffffffffffffff, 0x0, 0x0, 0x0)
mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800004, 0x12, r0, 0x0)
preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x9, 0x0)
mmap(&(0x7f0000000000/0xa000)=nil, 0xa000, 0x2, 0x2172, 0xffffffffffffffff, 0x0)
r1 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x11, 0x4, &(0x7f00000000c0)=@framed={{}, [@call={0x85, 0x0, 0x0, 0x7b}]}, &(0x7f00000001c0)='syzkaller\x00', 0x4, 0x8f, &(0x7f00000002c0)=""/143, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78)
bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='ext4_es_lookup_extent_exit\x00', r1}, 0x10)
r2 = socket$unix(0x1, 0x1, 0x0)
bind$unix(r2, &(0x7f00000001c0)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x56)

06:18:55 executing program 2:
r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0)
mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800004, 0x12, r0, 0x0)
preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x9, 0x0)
mmap(&(0x7f0000000000/0xa000)=nil, 0xa000, 0x2, 0x2172, 0xffffffffffffffff, 0x0)
socketpair(0x29, 0x80005, 0x0, 0x0)

06:18:55 executing program 0:
r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0)
mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800004, 0x12, r0, 0x0)
preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x9, 0x0)
mmap(&(0x7f0000000000/0xa000)=nil, 0xa000, 0x2, 0x2172, 0xffffffffffffffff, 0x0)
close(0xffffffffffffffff)

06:18:55 executing program 1:
r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0)
mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800004, 0x12, r0, 0x0)
preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x9, 0x0)
mmap(&(0x7f0000000000/0xa000)=nil, 0xa000, 0x2, 0x2172, 0xffffffffffffffff, 0x0)
bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x11, 0x4, &(0x7f00000000c0)=@framed={{}, [@call={0x85, 0x0, 0x0, 0x7b}]}, 0x0, 0x4, 0x8f, &(0x7f00000002c0)=""/143, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x74)

06:18:55 executing program 2:
r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0)
mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800004, 0x12, r0, 0x0)
preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x9, 0x0)
mmap(&(0x7f0000000000/0xa000)=nil, 0xa000, 0x2, 0x2172, 0xffffffffffffffff, 0x0)
socketpair(0x29, 0x80005, 0x0, 0x0)

06:18:55 executing program 3:
r0 = openat(0xffffffffffffffff, 0x0, 0x0, 0x0)
mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800004, 0x12, r0, 0x0)
preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x9, 0x0)
mmap(&(0x7f0000000000/0xa000)=nil, 0xa000, 0x2, 0x2172, 0xffffffffffffffff, 0x0)
r1 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x11, 0x4, &(0x7f00000000c0)=@framed={{}, [@call={0x85, 0x0, 0x0, 0x7b}]}, &(0x7f00000001c0)='syzkaller\x00', 0x4, 0x8f, &(0x7f00000002c0)=""/143, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78)
bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='ext4_es_lookup_extent_exit\x00', r1}, 0x10)
r2 = socket$unix(0x1, 0x1, 0x0)
bind$unix(r2, &(0x7f00000001c0)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x56)

06:18:55 executing program 0:
r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0)
mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800004, 0x12, r0, 0x0)
preadv(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)=""/179, 0xb3}], 0x1, 0x3, 0xaee)
preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x9, 0x0)
mmap(&(0x7f0000000000/0xa000)=nil, 0xa000, 0x2, 0x2172, 0xffffffffffffffff, 0x0)
ioctl$KVM_CREATE_PIT2(r0, 0x4040ae77, &(0x7f0000000200)={0x6})
socketpair(0x1e, 0x80005, 0x0, &(0x7f0000000340)={<r1=>0x0, 0x0})
close(r1)
r2 = getuid()
syz_mount_image$reiserfs(&(0x7f0000000140), &(0x7f0000000180)='./file0\x00', 0x8000, 0x3, &(0x7f0000000300)=[{&(0x7f0000000540)="21d37ef07e82e237fbe1b40158d20e242c5ea1f9d9edc6b9395250085d6dfa486982e82d4ce1a5e2bc00d29383bae640de", 0x31, 0x7}, {&(0x7f0000000240)="c43f281f483aa6cd83e40e59d53f177299d285bbe5d90aab2b56a76f9db49d86afa5a0f601ba9b3502de5f3724f3ec00927151f928f668b362052950a2e8f16baec29875fdad59395e86a1050c368933e3ed5a17d76bd7bded793436ea207885f395ace3fc12126c205b170be392c1645233ef01f9661090706a65f63b4845dc2884a20711a8024ad4af44aeec9db33991dae38d95cdb7132970d0d4dec58b9d46d378", 0xa3, 0x6}, {&(0x7f0000000380)="05f82c760d277896dd8c9891a41aafe24124891a32a238c3c78696d112aa09f3ae5c54b0c08676da5db7f358c72dfaca9a5d90860b4ae363c9a921c47965d339c23408a6d9b31a23aee27822f0a140d8e4ec9475a740113f2b9923b46333110e528e0a513151aad34aee1b5310fcf62c1982349253003d6d53aebbe09cf5918668ee682be93b6a671bbc", 0x8a, 0x3}], 0x2000400, &(0x7f0000000440)={[{@balloc_no_unhash_reloc}, {@nolargeio}, {@grpjquota}], [{@obj_role={'obj_role', 0x3d, '^'}}, {@hash}, {@uid_lt={'uid<', r2}}, {@mask={'mask', 0x3d, 'MAY_EXEC'}}, {@uid_lt={'uid<', 0xee00}}, {@smackfsfloor={'smackfsfloor', 0x3d, ':%#[@'}}, {@obj_user={'obj_user', 0x3d, ',\\*),i'}}, {@uid_eq={'uid', 0x3d, 0xee00}}, {@seclabel}, {@uid_lt={'uid<', 0xee00}}]})

06:18:55 executing program 1:
r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0)
mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800004, 0x12, r0, 0x0)
preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x9, 0x0)
mmap(&(0x7f0000000000/0xa000)=nil, 0xa000, 0x2, 0x2172, 0xffffffffffffffff, 0x0)
socketpair(0x1e, 0x80005, 0x0, &(0x7f0000000340)={<r1=>0x0, 0x0})
close(r1)
r2 = bpf$LINK_GET_FD_BY_ID(0x1e, &(0x7f0000000040)=0xffffffffffffffff, 0x4)
ioctl$F2FS_IOC_COMMIT_ATOMIC_WRITE(r2, 0xf502, 0x0)

06:18:55 executing program 3:
r0 = openat(0xffffffffffffffff, 0x0, 0x0, 0x0)
mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800004, 0x12, r0, 0x0)
preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x9, 0x0)
mmap(&(0x7f0000000000/0xa000)=nil, 0xa000, 0x2, 0x2172, 0xffffffffffffffff, 0x0)
r1 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x11, 0x4, &(0x7f00000000c0)=@framed={{}, [@call={0x85, 0x0, 0x0, 0x7b}]}, &(0x7f00000001c0)='syzkaller\x00', 0x4, 0x8f, &(0x7f00000002c0)=""/143, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78)
bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='ext4_es_lookup_extent_exit\x00', r1}, 0x10)
r2 = socket$unix(0x1, 0x1, 0x0)
bind$unix(r2, &(0x7f00000001c0)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x56)

06:18:55 executing program 2:
r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0)
mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800004, 0x12, r0, 0x0)
preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x9, 0x0)
mmap(&(0x7f0000000000/0xa000)=nil, 0xa000, 0x2, 0x2172, 0xffffffffffffffff, 0x0)
socketpair(0x1e, 0x80005, 0x0, &(0x7f0000000340)={<r1=>0x0, 0x0})
close(r1)
r2 = bpf$LINK_GET_FD_BY_ID(0x1e, &(0x7f0000000040)=0xffffffffffffffff, 0x4)
ioctl$F2FS_IOC_COMMIT_ATOMIC_WRITE(r2, 0xf502, 0x0)

[  337.933334][T15157] loop0: detected capacity change from 0 to 64
06:18:55 executing program 1:
r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0)
mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800004, 0x12, r0, 0x0)
preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x9, 0x0)
mmap(&(0x7f0000000000/0xa000)=nil, 0xa000, 0x2, 0x2172, 0xffffffffffffffff, 0x0)
socketpair(0x1e, 0x80005, 0x0, &(0x7f0000000340)={<r1=>0x0, 0x0})
close(r1)
r2 = bpf$LINK_GET_FD_BY_ID(0x1e, &(0x7f0000000040)=0xffffffffffffffff, 0x4)
ioctl$F2FS_IOC_COMMIT_ATOMIC_WRITE(r2, 0xf502, 0x0)

[  337.995221][T15157] REISERFS warning (device loop0): super-6504 reiserfs_getopt: the option "nolargeio" requires an argument
[  337.995221][T15157] 
06:18:55 executing program 2:
r0 = socket$nl_route(0x10, 0x3, 0x0)
sendmsg$nl_route(r0, &(0x7f0000000400)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000440)=ANY=[@ANYBLOB="3400000011000100000000000000000002000000", @ANYRES32=0x0, @ANYBLOB="081f0000000000000000030062726964676530000000000000000000"], 0x34}}, 0x0)
r1 = openat(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0x0, 0x0)
mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800004, 0x12, r1, 0x0)
preadv(r1, &(0x7f00000001c0)=[{0x0}], 0x1, 0x9, 0x0)
openat$cgroup_ro(r1, &(0x7f0000000040)='cpuacct.usage_sys\x00', 0x0, 0x0)
mmap(&(0x7f0000000000/0xa000)=nil, 0xa000, 0x2, 0x2172, 0xffffffffffffffff, 0x0)
socketpair(0x1e, 0x80005, 0x0, &(0x7f0000000340)={0x0, 0x0})

06:18:55 executing program 3:
r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0)
mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x0, 0x12, r0, 0x0)
preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x9, 0x0)
mmap(&(0x7f0000000000/0xa000)=nil, 0xa000, 0x2, 0x2172, 0xffffffffffffffff, 0x0)
r1 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x11, 0x4, &(0x7f00000000c0)=@framed={{}, [@call={0x85, 0x0, 0x0, 0x7b}]}, &(0x7f00000001c0)='syzkaller\x00', 0x4, 0x8f, &(0x7f00000002c0)=""/143, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78)
bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='ext4_es_lookup_extent_exit\x00', r1}, 0x10)
r2 = socket$unix(0x1, 0x1, 0x0)
bind$unix(r2, &(0x7f00000001c0)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x56)

[  338.050772][T15170] netlink: 20 bytes leftover after parsing attributes in process `syz-executor.2'.
06:18:55 executing program 1:
r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0)
mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800004, 0x12, r0, 0x0)
preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x9, 0x0)
mmap(&(0x7f0000000000/0xa000)=nil, 0xa000, 0x2, 0x2172, 0xffffffffffffffff, 0x0)
socketpair(0x1e, 0x80005, 0x0, &(0x7f0000000340)={<r1=>0x0, 0x0})
close(r1)
r2 = bpf$LINK_GET_FD_BY_ID(0x1e, &(0x7f0000000040)=0xffffffffffffffff, 0x4)
ioctl$F2FS_IOC_COMMIT_ATOMIC_WRITE(r2, 0xf502, 0x0)

06:18:55 executing program 3:
r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0)
mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x0, 0x12, r0, 0x0)
preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x9, 0x0)
mmap(&(0x7f0000000000/0xa000)=nil, 0xa000, 0x2, 0x2172, 0xffffffffffffffff, 0x0)
r1 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x11, 0x4, &(0x7f00000000c0)=@framed={{}, [@call={0x85, 0x0, 0x0, 0x7b}]}, &(0x7f00000001c0)='syzkaller\x00', 0x4, 0x8f, &(0x7f00000002c0)=""/143, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78)
bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='ext4_es_lookup_extent_exit\x00', r1}, 0x10)
r2 = socket$unix(0x1, 0x1, 0x0)
bind$unix(r2, &(0x7f00000001c0)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x56)

06:18:55 executing program 2:
r0 = socket$nl_route(0x10, 0x3, 0x0)
sendmsg$nl_route(r0, &(0x7f0000000400)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000440)=ANY=[@ANYBLOB="3400000011000100000000000000000002000000", @ANYRES32=0x0, @ANYBLOB="081f0000000000000000030062726964676530000000000000000000"], 0x34}}, 0x0)
r1 = openat(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0x0, 0x0)
mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800004, 0x12, r1, 0x0)
preadv(r1, &(0x7f00000001c0)=[{0x0}], 0x1, 0x9, 0x0)
openat$cgroup_ro(r1, &(0x7f0000000040)='cpuacct.usage_sys\x00', 0x0, 0x0)
mmap(&(0x7f0000000000/0xa000)=nil, 0xa000, 0x2, 0x2172, 0xffffffffffffffff, 0x0)
socketpair(0x1e, 0x80005, 0x0, &(0x7f0000000340)={0x0, 0x0})

06:18:55 executing program 1:
r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0)
mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800004, 0x12, r0, 0x0)
preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x9, 0x0)
mmap(&(0x7f0000000000/0xa000)=nil, 0xa000, 0x2, 0x2172, 0xffffffffffffffff, 0x0)
socketpair(0x1e, 0x80005, 0x0, &(0x7f0000000340)={<r1=>0x0, 0x0})
close(r1)
bpf$LINK_GET_FD_BY_ID(0x1e, &(0x7f0000000040)=0xffffffffffffffff, 0x4)

06:18:55 executing program 0:
r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0)
mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800004, 0x12, r0, 0x0)
preadv(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)=""/179, 0xb3}], 0x1, 0x3, 0xaee)
preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x9, 0x0)
mmap(&(0x7f0000000000/0xa000)=nil, 0xa000, 0x2, 0x2172, 0xffffffffffffffff, 0x0)
ioctl$KVM_CREATE_PIT2(r0, 0x4040ae77, &(0x7f0000000200)={0x6})
socketpair(0x1e, 0x80005, 0x0, &(0x7f0000000340)={<r1=>0x0, 0x0})
close(r1)
r2 = getuid()
syz_mount_image$reiserfs(&(0x7f0000000140), &(0x7f0000000180)='./file0\x00', 0x8000, 0x3, &(0x7f0000000300)=[{&(0x7f0000000540)="21d37ef07e82e237fbe1b40158d20e242c5ea1f9d9edc6b9395250085d6dfa486982e82d4ce1a5e2bc00d29383bae640de", 0x31, 0x7}, {&(0x7f0000000240)="c43f281f483aa6cd83e40e59d53f177299d285bbe5d90aab2b56a76f9db49d86afa5a0f601ba9b3502de5f3724f3ec00927151f928f668b362052950a2e8f16baec29875fdad59395e86a1050c368933e3ed5a17d76bd7bded793436ea207885f395ace3fc12126c205b170be392c1645233ef01f9661090706a65f63b4845dc2884a20711a8024ad4af44aeec9db33991dae38d95cdb7132970d0d4dec58b9d46d378", 0xa3, 0x6}, {&(0x7f0000000380)="05f82c760d277896dd8c9891a41aafe24124891a32a238c3c78696d112aa09f3ae5c54b0c08676da5db7f358c72dfaca9a5d90860b4ae363c9a921c47965d339c23408a6d9b31a23aee27822f0a140d8e4ec9475a740113f2b9923b46333110e528e0a513151aad34aee1b5310fcf62c1982349253003d6d53aebbe09cf5918668ee682be93b6a671bbc", 0x8a, 0x3}], 0x2000400, &(0x7f0000000440)={[{@balloc_no_unhash_reloc}, {@nolargeio}, {@grpjquota}], [{@obj_role={'obj_role', 0x3d, '^'}}, {@hash}, {@uid_lt={'uid<', r2}}, {@mask={'mask', 0x3d, 'MAY_EXEC'}}, {@uid_lt={'uid<', 0xee00}}, {@smackfsfloor={'smackfsfloor', 0x3d, ':%#[@'}}, {@obj_user={'obj_user', 0x3d, ',\\*),i'}}, {@uid_eq={'uid', 0x3d, 0xee00}}, {@seclabel}, {@uid_lt={'uid<', 0xee00}}]})

[  338.172017][T15180] netlink: 20 bytes leftover after parsing attributes in process `syz-executor.2'.
06:18:55 executing program 3:
r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0)
mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x0, 0x12, r0, 0x0)
preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x9, 0x0)
mmap(&(0x7f0000000000/0xa000)=nil, 0xa000, 0x2, 0x2172, 0xffffffffffffffff, 0x0)
r1 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x11, 0x4, &(0x7f00000000c0)=@framed={{}, [@call={0x85, 0x0, 0x0, 0x7b}]}, &(0x7f00000001c0)='syzkaller\x00', 0x4, 0x8f, &(0x7f00000002c0)=""/143, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78)
bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='ext4_es_lookup_extent_exit\x00', r1}, 0x10)
r2 = socket$unix(0x1, 0x1, 0x0)
bind$unix(r2, &(0x7f00000001c0)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x56)

[  338.234652][T15184] loop0: detected capacity change from 0 to 64
[  338.261802][T15184] REISERFS warning (device loop0): super-6504 reiserfs_getopt: the option "nolargeio" requires an argument
[  338.261802][T15184] 
06:18:55 executing program 1:
r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0)
mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800004, 0x12, r0, 0x0)
preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x9, 0x0)
mmap(&(0x7f0000000000/0xa000)=nil, 0xa000, 0x2, 0x2172, 0xffffffffffffffff, 0x0)
socketpair(0x1e, 0x80005, 0x0, &(0x7f0000000340)={0x0, 0x0})
bpf$LINK_GET_FD_BY_ID(0x1e, &(0x7f0000000040)=0xffffffffffffffff, 0x4)

06:18:55 executing program 2:
r0 = socket$nl_route(0x10, 0x3, 0x0)
sendmsg$nl_route(r0, &(0x7f0000000400)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000440)=ANY=[@ANYBLOB="3400000011000100000000000000000002000000", @ANYRES32=0x0, @ANYBLOB="081f0000000000000000030062726964676530000000000000000000"], 0x34}}, 0x0)
r1 = openat(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0x0, 0x0)
mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800004, 0x12, r1, 0x0)
preadv(r1, &(0x7f00000001c0)=[{0x0}], 0x1, 0x9, 0x0)
openat$cgroup_ro(r1, &(0x7f0000000040)='cpuacct.usage_sys\x00', 0x0, 0x0)
mmap(&(0x7f0000000000/0xa000)=nil, 0xa000, 0x2, 0x2172, 0xffffffffffffffff, 0x0)
socketpair(0x1e, 0x80005, 0x0, &(0x7f0000000340)={0x0, 0x0})

[  338.305177][T15192] netlink: 20 bytes leftover after parsing attributes in process `syz-executor.2'.
06:18:55 executing program 1:
r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0)
mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800004, 0x12, r0, 0x0)
preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x9, 0x0)
mmap(&(0x7f0000000000/0xa000)=nil, 0xa000, 0x2, 0x2172, 0xffffffffffffffff, 0x0)
bpf$LINK_GET_FD_BY_ID(0x1e, &(0x7f0000000040)=0xffffffffffffffff, 0x4)

06:18:55 executing program 3:
r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0)
mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800004, 0x10, r0, 0x0)
preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x9, 0x0)
mmap(&(0x7f0000000000/0xa000)=nil, 0xa000, 0x2, 0x2172, 0xffffffffffffffff, 0x0)
r1 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x11, 0x4, &(0x7f00000000c0)=@framed={{}, [@call={0x85, 0x0, 0x0, 0x7b}]}, &(0x7f00000001c0)='syzkaller\x00', 0x4, 0x8f, &(0x7f00000002c0)=""/143, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78)
bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='ext4_es_lookup_extent_exit\x00', r1}, 0x10)
r2 = socket$unix(0x1, 0x1, 0x0)
bind$unix(r2, &(0x7f00000001c0)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x56)

06:18:56 executing program 0:
r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0)
mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800004, 0x12, r0, 0x0)
preadv(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)=""/179, 0xb3}], 0x1, 0x3, 0xaee)
preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x9, 0x0)
mmap(&(0x7f0000000000/0xa000)=nil, 0xa000, 0x2, 0x2172, 0xffffffffffffffff, 0x0)
ioctl$KVM_CREATE_PIT2(r0, 0x4040ae77, &(0x7f0000000200)={0x6})
socketpair(0x1e, 0x80005, 0x0, &(0x7f0000000340)={<r1=>0x0, 0x0})
close(r1)
r2 = getuid()
syz_mount_image$reiserfs(&(0x7f0000000140), &(0x7f0000000180)='./file0\x00', 0x8000, 0x3, &(0x7f0000000300)=[{&(0x7f0000000540)="21d37ef07e82e237fbe1b40158d20e242c5ea1f9d9edc6b9395250085d6dfa486982e82d4ce1a5e2bc00d29383bae640de", 0x31, 0x7}, {&(0x7f0000000240)="c43f281f483aa6cd83e40e59d53f177299d285bbe5d90aab2b56a76f9db49d86afa5a0f601ba9b3502de5f3724f3ec00927151f928f668b362052950a2e8f16baec29875fdad59395e86a1050c368933e3ed5a17d76bd7bded793436ea207885f395ace3fc12126c205b170be392c1645233ef01f9661090706a65f63b4845dc2884a20711a8024ad4af44aeec9db33991dae38d95cdb7132970d0d4dec58b9d46d378", 0xa3, 0x6}, {&(0x7f0000000380)="05f82c760d277896dd8c9891a41aafe24124891a32a238c3c78696d112aa09f3ae5c54b0c08676da5db7f358c72dfaca9a5d90860b4ae363c9a921c47965d339c23408a6d9b31a23aee27822f0a140d8e4ec9475a740113f2b9923b46333110e528e0a513151aad34aee1b5310fcf62c1982349253003d6d53aebbe09cf5918668ee682be93b6a671bbc", 0x8a, 0x3}], 0x2000400, &(0x7f0000000440)={[{@balloc_no_unhash_reloc}, {@nolargeio}, {@grpjquota}], [{@obj_role={'obj_role', 0x3d, '^'}}, {@hash}, {@uid_lt={'uid<', r2}}, {@mask={'mask', 0x3d, 'MAY_EXEC'}}, {@uid_lt={'uid<', 0xee00}}, {@smackfsfloor={'smackfsfloor', 0x3d, ':%#[@'}}, {@obj_user={'obj_user', 0x3d, ',\\*),i'}}, {@uid_eq={'uid', 0x3d, 0xee00}}, {@seclabel}, {@uid_lt={'uid<', 0xee00}}]})

06:18:56 executing program 2:
r0 = socket$nl_route(0x10, 0x3, 0x0)
sendmsg$nl_route(r0, &(0x7f0000000400)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000440)=ANY=[@ANYBLOB="3400000011000100000000000000000002000000", @ANYRES32=0x0, @ANYBLOB="081f0000000000000000030062726964676530000000000000000000"], 0x34}}, 0x0)
r1 = openat(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0x0, 0x0)
mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800004, 0x12, r1, 0x0)
preadv(r1, &(0x7f00000001c0)=[{0x0}], 0x1, 0x9, 0x0)
openat$cgroup_ro(r1, &(0x7f0000000040)='cpuacct.usage_sys\x00', 0x0, 0x0)
mmap(&(0x7f0000000000/0xa000)=nil, 0xa000, 0x2, 0x2172, 0xffffffffffffffff, 0x0)

06:18:56 executing program 3:
r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0)
mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800004, 0x10, r0, 0x0)
preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x9, 0x0)
mmap(&(0x7f0000000000/0xa000)=nil, 0xa000, 0x2, 0x2172, 0xffffffffffffffff, 0x0)
r1 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x11, 0x4, &(0x7f00000000c0)=@framed={{}, [@call={0x85, 0x0, 0x0, 0x7b}]}, &(0x7f00000001c0)='syzkaller\x00', 0x4, 0x8f, &(0x7f00000002c0)=""/143, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78)
bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='ext4_es_lookup_extent_exit\x00', r1}, 0x10)
r2 = socket$unix(0x1, 0x1, 0x0)
bind$unix(r2, &(0x7f00000001c0)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x56)

06:18:56 executing program 1:
r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0)
mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800004, 0x12, r0, 0x0)
preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x9, 0x0)
bpf$LINK_GET_FD_BY_ID(0x1e, &(0x7f0000000040)=0xffffffffffffffff, 0x4)

[  338.436557][T15200] netlink: 20 bytes leftover after parsing attributes in process `syz-executor.2'.
06:18:56 executing program 2:
r0 = socket$nl_route(0x10, 0x3, 0x0)
sendmsg$nl_route(r0, &(0x7f0000000400)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000440)=ANY=[@ANYBLOB="3400000011000100000000000000000002000000", @ANYRES32=0x0, @ANYBLOB="081f0000000000000000030062726964676530000000000000000000"], 0x34}}, 0x0)
r1 = openat(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0x0, 0x0)
mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800004, 0x12, r1, 0x0)
preadv(r1, &(0x7f00000001c0)=[{0x0}], 0x1, 0x9, 0x0)
openat$cgroup_ro(r1, &(0x7f0000000040)='cpuacct.usage_sys\x00', 0x0, 0x0)

[  338.493455][T15205] loop0: detected capacity change from 0 to 64
06:18:56 executing program 1:
r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0)
mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800004, 0x12, r0, 0x0)
bpf$LINK_GET_FD_BY_ID(0x1e, &(0x7f0000000040)=0xffffffffffffffff, 0x4)

[  338.537142][T15205] REISERFS warning (device loop0): super-6504 reiserfs_getopt: the option "nolargeio" requires an argument
[  338.537142][T15205] 
06:18:56 executing program 3:
r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0)
mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800004, 0x10, r0, 0x0)
preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x9, 0x0)
mmap(&(0x7f0000000000/0xa000)=nil, 0xa000, 0x2, 0x2172, 0xffffffffffffffff, 0x0)
r1 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x11, 0x4, &(0x7f00000000c0)=@framed={{}, [@call={0x85, 0x0, 0x0, 0x7b}]}, &(0x7f00000001c0)='syzkaller\x00', 0x4, 0x8f, &(0x7f00000002c0)=""/143, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78)
bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='ext4_es_lookup_extent_exit\x00', r1}, 0x10)
r2 = socket$unix(0x1, 0x1, 0x0)
bind$unix(r2, &(0x7f00000001c0)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x56)

[  338.542835][T15211] netlink: 20 bytes leftover after parsing attributes in process `syz-executor.2'.
06:18:56 executing program 2:
r0 = socket$nl_route(0x10, 0x3, 0x0)
sendmsg$nl_route(r0, &(0x7f0000000400)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000440)=ANY=[@ANYBLOB="3400000011000100000000000000000002000000", @ANYRES32=0x0, @ANYBLOB="081f0000000000000000030062726964676530000000000000000000"], 0x34}}, 0x0)
r1 = openat(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0x0, 0x0)
mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800004, 0x12, r1, 0x0)
preadv(r1, &(0x7f00000001c0)=[{0x0}], 0x1, 0x9, 0x0)

[  338.655972][T15218] netlink: 20 bytes leftover after parsing attributes in process `syz-executor.2'.
06:18:56 executing program 0:
r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0)
mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800004, 0x12, r0, 0x0)
preadv(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)=""/179, 0xb3}], 0x1, 0x3, 0xaee)
preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x9, 0x0)
mmap(&(0x7f0000000000/0xa000)=nil, 0xa000, 0x2, 0x2172, 0xffffffffffffffff, 0x0)
ioctl$KVM_CREATE_PIT2(r0, 0x4040ae77, &(0x7f0000000200)={0x6})
socketpair(0x1e, 0x80005, 0x0, &(0x7f0000000340)={<r1=>0x0, 0x0})
close(r1)
syz_mount_image$reiserfs(&(0x7f0000000140), &(0x7f0000000180)='./file0\x00', 0x8000, 0x3, &(0x7f0000000300)=[{&(0x7f0000000540)="21d37ef07e82e237fbe1b40158d20e242c5ea1f9d9edc6b9395250085d6dfa486982e82d4ce1a5e2bc00d29383bae640de", 0x31, 0x7}, {&(0x7f0000000240)="c43f281f483aa6cd83e40e59d53f177299d285bbe5d90aab2b56a76f9db49d86afa5a0f601ba9b3502de5f3724f3ec00927151f928f668b362052950a2e8f16baec29875fdad59395e86a1050c368933e3ed5a17d76bd7bded793436ea207885f395ace3fc12126c205b170be392c1645233ef01f9661090706a65f63b4845dc2884a20711a8024ad4af44aeec9db33991dae38d95cdb7132970d0d4dec58b9d46d378", 0xa3, 0x6}, {&(0x7f0000000380)="05f82c760d277896dd8c9891a41aafe24124891a32a238c3c78696d112aa09f3ae5c54b0c08676da5db7f358c72dfaca9a5d90860b4ae363c9a921c47965d339c23408a6d9b31a23aee27822f0a140d8e4ec9475a740113f2b9923b46333110e528e0a513151aad34aee1b5310fcf62c1982349253003d6d53aebbe09cf5918668ee682be93b6a671bbc", 0x8a, 0x3}], 0x2000400, &(0x7f0000000440)={[{@balloc_no_unhash_reloc}, {@nolargeio}, {@grpjquota}], [{@obj_role={'obj_role', 0x3d, '^'}}, {@hash}, {@uid_lt}, {@mask={'mask', 0x3d, 'MAY_EXEC'}}, {@uid_lt={'uid<', 0xee00}}, {@smackfsfloor={'smackfsfloor', 0x3d, ':%#[@'}}, {@obj_user={'obj_user', 0x3d, ',\\*),i'}}, {@uid_eq={'uid', 0x3d, 0xee00}}, {@seclabel}, {@uid_lt={'uid<', 0xee00}}]})

06:18:56 executing program 1:
r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0)
mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800004, 0x12, r0, 0x0)
bpf$LINK_GET_FD_BY_ID(0x1e, &(0x7f0000000040)=0xffffffffffffffff, 0x4)

06:18:56 executing program 3:
r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0)
mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800004, 0x12, 0xffffffffffffffff, 0x0)
preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x9, 0x0)
mmap(&(0x7f0000000000/0xa000)=nil, 0xa000, 0x2, 0x2172, 0xffffffffffffffff, 0x0)
r1 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x11, 0x4, &(0x7f00000000c0)=@framed={{}, [@call={0x85, 0x0, 0x0, 0x7b}]}, &(0x7f00000001c0)='syzkaller\x00', 0x4, 0x8f, &(0x7f00000002c0)=""/143, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78)
bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='ext4_es_lookup_extent_exit\x00', r1}, 0x10)
r2 = socket$unix(0x1, 0x1, 0x0)
bind$unix(r2, &(0x7f00000001c0)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x56)

06:18:56 executing program 1:
r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0)
mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800004, 0x12, r0, 0x0)
bpf$LINK_GET_FD_BY_ID(0x1e, &(0x7f0000000040)=0xffffffffffffffff, 0x4)

06:18:56 executing program 2:
r0 = socket$nl_route(0x10, 0x3, 0x0)
sendmsg$nl_route(r0, &(0x7f0000000400)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000440)=ANY=[@ANYBLOB="3400000011000100000000000000000002000000", @ANYRES32=0x0, @ANYBLOB="081f0000000000000000030062726964676530000000000000000000"], 0x34}}, 0x0)
r1 = openat(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0x0, 0x0)
mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800004, 0x12, r1, 0x0)

06:18:56 executing program 3:
r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0)
mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800004, 0x12, 0xffffffffffffffff, 0x0)
preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x9, 0x0)
mmap(&(0x7f0000000000/0xa000)=nil, 0xa000, 0x2, 0x2172, 0xffffffffffffffff, 0x0)
r1 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x11, 0x4, &(0x7f00000000c0)=@framed={{}, [@call={0x85, 0x0, 0x0, 0x7b}]}, &(0x7f00000001c0)='syzkaller\x00', 0x4, 0x8f, &(0x7f00000002c0)=""/143, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78)
bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='ext4_es_lookup_extent_exit\x00', r1}, 0x10)
r2 = socket$unix(0x1, 0x1, 0x0)
bind$unix(r2, &(0x7f00000001c0)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x56)

[  338.771880][T15229] loop0: detected capacity change from 0 to 64
06:18:56 executing program 1:
r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0)
preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x9, 0x0)
bpf$LINK_GET_FD_BY_ID(0x1e, &(0x7f0000000040)=0xffffffffffffffff, 0x4)

[  338.792592][T15231] netlink: 20 bytes leftover after parsing attributes in process `syz-executor.2'.
[  338.803754][T15229] REISERFS warning (device loop0): super-6504 reiserfs_getopt: the option "nolargeio" requires an argument
[  338.803754][T15229] 
06:18:56 executing program 2:
r0 = socket$nl_route(0x10, 0x3, 0x0)
sendmsg$nl_route(r0, &(0x7f0000000400)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000440)=ANY=[@ANYBLOB="3400000011000100000000000000000002000000", @ANYRES32=0x0, @ANYBLOB="081f0000000000000000030062726964676530000000000000000000"], 0x34}}, 0x0)
openat(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0x0, 0x0)

[  338.879518][T15240] netlink: 20 bytes leftover after parsing attributes in process `syz-executor.2'.
06:18:56 executing program 0:
r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0)
mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800004, 0x12, r0, 0x0)
preadv(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)=""/179, 0xb3}], 0x1, 0x3, 0xaee)
preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x9, 0x0)
mmap(&(0x7f0000000000/0xa000)=nil, 0xa000, 0x2, 0x2172, 0xffffffffffffffff, 0x0)
ioctl$KVM_CREATE_PIT2(r0, 0x4040ae77, &(0x7f0000000200)={0x6})
socketpair(0x1e, 0x80005, 0x0, &(0x7f0000000340)={0x0, 0x0})
syz_mount_image$reiserfs(&(0x7f0000000140), &(0x7f0000000180)='./file0\x00', 0x8000, 0x3, &(0x7f0000000300)=[{&(0x7f0000000540)="21d37ef07e82e237fbe1b40158d20e242c5ea1f9d9edc6b9395250085d6dfa486982e82d4ce1a5e2bc00d29383bae640de", 0x31, 0x7}, {&(0x7f0000000240)="c43f281f483aa6cd83e40e59d53f177299d285bbe5d90aab2b56a76f9db49d86afa5a0f601ba9b3502de5f3724f3ec00927151f928f668b362052950a2e8f16baec29875fdad59395e86a1050c368933e3ed5a17d76bd7bded793436ea207885f395ace3fc12126c205b170be392c1645233ef01f9661090706a65f63b4845dc2884a20711a8024ad4af44aeec9db33991dae38d95cdb7132970d0d4dec58b9d46d378", 0xa3, 0x6}, {&(0x7f0000000380)="05f82c760d277896dd8c9891a41aafe24124891a32a238c3c78696d112aa09f3ae5c54b0c08676da5db7f358c72dfaca9a5d90860b4ae363c9a921c47965d339c23408a6d9b31a23aee27822f0a140d8e4ec9475a740113f2b9923b46333110e528e0a513151aad34aee1b5310fcf62c1982349253003d6d53aebbe09cf5918668ee682be93b6a671bbc", 0x8a, 0x3}], 0x2000400, &(0x7f0000000440)={[{@balloc_no_unhash_reloc}, {@nolargeio}, {@grpjquota}], [{@obj_role={'obj_role', 0x3d, '^'}}, {@hash}, {@uid_lt}, {@mask={'mask', 0x3d, 'MAY_EXEC'}}, {@uid_lt={'uid<', 0xee00}}, {@smackfsfloor={'smackfsfloor', 0x3d, ':%#[@'}}, {@obj_user={'obj_user', 0x3d, ',\\*),i'}}, {@uid_eq={'uid', 0x3d, 0xee00}}, {@seclabel}, {@uid_lt={'uid<', 0xee00}}]})

06:18:56 executing program 1:
r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0)
preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x9, 0x0)
bpf$LINK_GET_FD_BY_ID(0x1e, &(0x7f0000000040)=0xffffffffffffffff, 0x4)

06:18:56 executing program 3:
r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0)
mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800004, 0x12, 0xffffffffffffffff, 0x0)
preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x9, 0x0)
mmap(&(0x7f0000000000/0xa000)=nil, 0xa000, 0x2, 0x2172, 0xffffffffffffffff, 0x0)
r1 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x11, 0x4, &(0x7f00000000c0)=@framed={{}, [@call={0x85, 0x0, 0x0, 0x7b}]}, &(0x7f00000001c0)='syzkaller\x00', 0x4, 0x8f, &(0x7f00000002c0)=""/143, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78)
bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='ext4_es_lookup_extent_exit\x00', r1}, 0x10)
r2 = socket$unix(0x1, 0x1, 0x0)
bind$unix(r2, &(0x7f00000001c0)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x56)

06:18:56 executing program 2:
r0 = socket$nl_route(0x10, 0x3, 0x0)
sendmsg$nl_route(r0, &(0x7f0000000400)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000440)=ANY=[@ANYBLOB="3400000011000100000000000000000002000000", @ANYRES32=0x0, @ANYBLOB="081f0000000000000000030062726964676530000000000000000000"], 0x34}}, 0x0)

[  338.954240][T15249] netlink: 20 bytes leftover after parsing attributes in process `syz-executor.2'.
[  338.959676][T15248] loop0: detected capacity change from 0 to 64
06:18:56 executing program 2:
sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000400)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000440)=ANY=[@ANYBLOB="3400000011000100000000000000000002000000", @ANYRES32=0x0, @ANYBLOB="081f0000000000000000030062726964676530000000000000000000"], 0x34}}, 0x0)

[  339.004072][T15248] REISERFS warning (device loop0): super-6504 reiserfs_getopt: the option "nolargeio" requires an argument
[  339.004072][T15248] 
06:18:56 executing program 1:
r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0)
preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x9, 0x0)
bpf$LINK_GET_FD_BY_ID(0x1e, &(0x7f0000000040)=0xffffffffffffffff, 0x4)

06:18:56 executing program 3:
r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0)
mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800004, 0x12, r0, 0x0)
preadv(0xffffffffffffffff, &(0x7f00000001c0)=[{0x0}], 0x1, 0x9, 0x0)
mmap(&(0x7f0000000000/0xa000)=nil, 0xa000, 0x2, 0x2172, 0xffffffffffffffff, 0x0)
r1 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x11, 0x4, &(0x7f00000000c0)=@framed={{}, [@call={0x85, 0x0, 0x0, 0x7b}]}, &(0x7f00000001c0)='syzkaller\x00', 0x4, 0x8f, &(0x7f00000002c0)=""/143, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78)
bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='ext4_es_lookup_extent_exit\x00', r1}, 0x10)
r2 = socket$unix(0x1, 0x1, 0x0)
bind$unix(r2, &(0x7f00000001c0)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x56)

06:18:56 executing program 0:
r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0)
mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800004, 0x12, r0, 0x0)
preadv(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)=""/179, 0xb3}], 0x1, 0x3, 0xaee)
preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x9, 0x0)
mmap(&(0x7f0000000000/0xa000)=nil, 0xa000, 0x2, 0x2172, 0xffffffffffffffff, 0x0)
ioctl$KVM_CREATE_PIT2(r0, 0x4040ae77, &(0x7f0000000200)={0x6})
syz_mount_image$reiserfs(&(0x7f0000000140), &(0x7f0000000180)='./file0\x00', 0x8000, 0x3, &(0x7f0000000300)=[{&(0x7f0000000540)="21d37ef07e82e237fbe1b40158d20e242c5ea1f9d9edc6b9395250085d6dfa486982e82d4ce1a5e2bc00d29383bae640de", 0x31, 0x7}, {&(0x7f0000000240)="c43f281f483aa6cd83e40e59d53f177299d285bbe5d90aab2b56a76f9db49d86afa5a0f601ba9b3502de5f3724f3ec00927151f928f668b362052950a2e8f16baec29875fdad59395e86a1050c368933e3ed5a17d76bd7bded793436ea207885f395ace3fc12126c205b170be392c1645233ef01f9661090706a65f63b4845dc2884a20711a8024ad4af44aeec9db33991dae38d95cdb7132970d0d4dec58b9d46d378", 0xa3, 0x6}, {&(0x7f0000000380)="05f82c760d277896dd8c9891a41aafe24124891a32a238c3c78696d112aa09f3ae5c54b0c08676da5db7f358c72dfaca9a5d90860b4ae363c9a921c47965d339c23408a6d9b31a23aee27822f0a140d8e4ec9475a740113f2b9923b46333110e528e0a513151aad34aee1b5310fcf62c1982349253003d6d53aebbe09cf5918668ee682be93b6a671bbc", 0x8a, 0x3}], 0x2000400, &(0x7f0000000440)={[{@balloc_no_unhash_reloc}, {@nolargeio}, {@grpjquota}], [{@obj_role={'obj_role', 0x3d, '^'}}, {@hash}, {@uid_lt}, {@mask={'mask', 0x3d, 'MAY_EXEC'}}, {@uid_lt={'uid<', 0xee00}}, {@smackfsfloor={'smackfsfloor', 0x3d, ':%#[@'}}, {@obj_user={'obj_user', 0x3d, ',\\*),i'}}, {@uid_eq={'uid', 0x3d, 0xee00}}, {@seclabel}, {@uid_lt={'uid<', 0xee00}}]})

06:18:56 executing program 2:
sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000400)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000440)=ANY=[@ANYBLOB="3400000011000100000000000000000002000000", @ANYRES32=0x0, @ANYBLOB="081f0000000000000000030062726964676530000000000000000000"], 0x34}}, 0x0)

06:18:56 executing program 1:
mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800004, 0x12, 0xffffffffffffffff, 0x0)
preadv(0xffffffffffffffff, &(0x7f00000001c0)=[{0x0}], 0x1, 0x9, 0x0)
bpf$LINK_GET_FD_BY_ID(0x1e, &(0x7f0000000040)=0xffffffffffffffff, 0x4)

[  339.122698][T15260] loop0: detected capacity change from 0 to 64
06:18:56 executing program 2:
sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000400)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000440)=ANY=[@ANYBLOB="3400000011000100000000000000000002000000", @ANYRES32=0x0, @ANYBLOB="081f0000000000000000030062726964676530000000000000000000"], 0x34}}, 0x0)

06:18:56 executing program 3:
r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0)
mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800004, 0x12, r0, 0x0)
preadv(0xffffffffffffffff, &(0x7f00000001c0)=[{0x0}], 0x1, 0x9, 0x0)
mmap(&(0x7f0000000000/0xa000)=nil, 0xa000, 0x2, 0x2172, 0xffffffffffffffff, 0x0)
r1 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x11, 0x4, &(0x7f00000000c0)=@framed={{}, [@call={0x85, 0x0, 0x0, 0x7b}]}, &(0x7f00000001c0)='syzkaller\x00', 0x4, 0x8f, &(0x7f00000002c0)=""/143, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78)
bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='ext4_es_lookup_extent_exit\x00', r1}, 0x10)
r2 = socket$unix(0x1, 0x1, 0x0)
bind$unix(r2, &(0x7f00000001c0)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x56)

[  339.140899][T15260] REISERFS warning (device loop0): super-6504 reiserfs_getopt: the option "nolargeio" requires an argument
[  339.140899][T15260] 
06:18:56 executing program 1:
mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800004, 0x12, 0xffffffffffffffff, 0x0)
preadv(0xffffffffffffffff, &(0x7f00000001c0)=[{0x0}], 0x1, 0x9, 0x0)
bpf$LINK_GET_FD_BY_ID(0x1e, &(0x7f0000000040)=0xffffffffffffffff, 0x4)

06:18:56 executing program 3:
r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0)
mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800004, 0x12, r0, 0x0)
preadv(0xffffffffffffffff, &(0x7f00000001c0)=[{0x0}], 0x1, 0x9, 0x0)
mmap(&(0x7f0000000000/0xa000)=nil, 0xa000, 0x2, 0x2172, 0xffffffffffffffff, 0x0)
r1 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x11, 0x4, &(0x7f00000000c0)=@framed={{}, [@call={0x85, 0x0, 0x0, 0x7b}]}, &(0x7f00000001c0)='syzkaller\x00', 0x4, 0x8f, &(0x7f00000002c0)=""/143, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78)
bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='ext4_es_lookup_extent_exit\x00', r1}, 0x10)
r2 = socket$unix(0x1, 0x1, 0x0)
bind$unix(r2, &(0x7f00000001c0)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x56)

06:18:56 executing program 2:
socket$nl_route(0x10, 0x3, 0x0)
sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000400)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000440)=ANY=[@ANYBLOB="3400000011000100000000000000000002000000", @ANYRES32=0x0, @ANYBLOB="081f0000000000000000030062726964676530000000000000000000"], 0x34}}, 0x0)

06:18:56 executing program 0:
r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0)
mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800004, 0x12, r0, 0x0)
preadv(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)=""/179, 0xb3}], 0x1, 0x3, 0xaee)
preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x9, 0x0)
mmap(&(0x7f0000000000/0xa000)=nil, 0xa000, 0x2, 0x2172, 0xffffffffffffffff, 0x0)
syz_mount_image$reiserfs(&(0x7f0000000140), &(0x7f0000000180)='./file0\x00', 0x8000, 0x3, &(0x7f0000000300)=[{&(0x7f0000000540)="21d37ef07e82e237fbe1b40158d20e242c5ea1f9d9edc6b9395250085d6dfa486982e82d4ce1a5e2bc00d29383bae640de", 0x31, 0x7}, {&(0x7f0000000240)="c43f281f483aa6cd83e40e59d53f177299d285bbe5d90aab2b56a76f9db49d86afa5a0f601ba9b3502de5f3724f3ec00927151f928f668b362052950a2e8f16baec29875fdad59395e86a1050c368933e3ed5a17d76bd7bded793436ea207885f395ace3fc12126c205b170be392c1645233ef01f9661090706a65f63b4845dc2884a20711a8024ad4af44aeec9db33991dae38d95cdb7132970d0d4dec58b9d46d378", 0xa3, 0x6}, {&(0x7f0000000380)="05f82c760d277896dd8c9891a41aafe24124891a32a238c3c78696d112aa09f3ae5c54b0c08676da5db7f358c72dfaca9a5d90860b4ae363c9a921c47965d339c23408a6d9b31a23aee27822f0a140d8e4ec9475a740113f2b9923b46333110e528e0a513151aad34aee1b5310fcf62c1982349253003d6d53aebbe09cf5918668ee682be93b6a671bbc", 0x8a, 0x3}], 0x2000400, &(0x7f0000000440)={[{@balloc_no_unhash_reloc}, {@nolargeio}, {@grpjquota}], [{@obj_role={'obj_role', 0x3d, '^'}}, {@hash}, {@uid_lt}, {@mask={'mask', 0x3d, 'MAY_EXEC'}}, {@uid_lt={'uid<', 0xee00}}, {@smackfsfloor={'smackfsfloor', 0x3d, ':%#[@'}}, {@obj_user={'obj_user', 0x3d, ',\\*),i'}}, {@uid_eq={'uid', 0x3d, 0xee00}}, {@seclabel}, {@uid_lt={'uid<', 0xee00}}]})

06:18:56 executing program 1:
mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800004, 0x12, 0xffffffffffffffff, 0x0)
preadv(0xffffffffffffffff, &(0x7f00000001c0)=[{0x0}], 0x1, 0x9, 0x0)
bpf$LINK_GET_FD_BY_ID(0x1e, &(0x7f0000000040)=0xffffffffffffffff, 0x4)

06:18:56 executing program 2:
socket$nl_route(0x10, 0x3, 0x0)
sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000400)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000440)=ANY=[@ANYBLOB="3400000011000100000000000000000002000000", @ANYRES32=0x0, @ANYBLOB="081f0000000000000000030062726964676530000000000000000000"], 0x34}}, 0x0)

[  339.288363][T15280] loop0: detected capacity change from 0 to 64
06:18:56 executing program 3:
r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0)
mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800004, 0x12, r0, 0x0)
preadv(r0, 0x0, 0x0, 0x9, 0x0)
mmap(&(0x7f0000000000/0xa000)=nil, 0xa000, 0x2, 0x2172, 0xffffffffffffffff, 0x0)
r1 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x11, 0x4, &(0x7f00000000c0)=@framed={{}, [@call={0x85, 0x0, 0x0, 0x7b}]}, &(0x7f00000001c0)='syzkaller\x00', 0x4, 0x8f, &(0x7f00000002c0)=""/143, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78)
bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='ext4_es_lookup_extent_exit\x00', r1}, 0x10)
r2 = socket$unix(0x1, 0x1, 0x0)
bind$unix(r2, &(0x7f00000001c0)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x56)

[  339.300356][T15280] REISERFS warning (device loop0): super-6504 reiserfs_getopt: the option "nolargeio" requires an argument
[  339.300356][T15280] 
06:18:56 executing program 1:
r0 = openat(0xffffffffffffffff, 0x0, 0x0, 0x0)
mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800004, 0x12, r0, 0x0)
preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x9, 0x0)
bpf$LINK_GET_FD_BY_ID(0x1e, &(0x7f0000000040)=0xffffffffffffffff, 0x4)

06:18:56 executing program 2:
socket$nl_route(0x10, 0x3, 0x0)
sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000400)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000440)=ANY=[@ANYBLOB="3400000011000100000000000000000002000000", @ANYRES32=0x0, @ANYBLOB="081f0000000000000000030062726964676530000000000000000000"], 0x34}}, 0x0)

06:18:56 executing program 1:
r0 = openat(0xffffffffffffffff, 0x0, 0x0, 0x0)
mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800004, 0x12, r0, 0x0)
preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x9, 0x0)
bpf$LINK_GET_FD_BY_ID(0x1e, &(0x7f0000000040)=0xffffffffffffffff, 0x4)

06:18:56 executing program 3:
r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0)
mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800004, 0x12, r0, 0x0)
preadv(r0, 0x0, 0x0, 0x9, 0x0)
mmap(&(0x7f0000000000/0xa000)=nil, 0xa000, 0x2, 0x2172, 0xffffffffffffffff, 0x0)
r1 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x11, 0x4, &(0x7f00000000c0)=@framed={{}, [@call={0x85, 0x0, 0x0, 0x7b}]}, &(0x7f00000001c0)='syzkaller\x00', 0x4, 0x8f, &(0x7f00000002c0)=""/143, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78)
bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='ext4_es_lookup_extent_exit\x00', r1}, 0x10)
r2 = socket$unix(0x1, 0x1, 0x0)
bind$unix(r2, &(0x7f00000001c0)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x56)

06:18:57 executing program 0:
r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0)
mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800004, 0x12, r0, 0x0)
preadv(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)=""/179, 0xb3}], 0x1, 0x3, 0xaee)
preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x9, 0x0)
syz_mount_image$reiserfs(&(0x7f0000000140), &(0x7f0000000180)='./file0\x00', 0x8000, 0x3, &(0x7f0000000300)=[{&(0x7f0000000540)="21d37ef07e82e237fbe1b40158d20e242c5ea1f9d9edc6b9395250085d6dfa486982e82d4ce1a5e2bc00d29383bae640de", 0x31, 0x7}, {&(0x7f0000000240)="c43f281f483aa6cd83e40e59d53f177299d285bbe5d90aab2b56a76f9db49d86afa5a0f601ba9b3502de5f3724f3ec00927151f928f668b362052950a2e8f16baec29875fdad59395e86a1050c368933e3ed5a17d76bd7bded793436ea207885f395ace3fc12126c205b170be392c1645233ef01f9661090706a65f63b4845dc2884a20711a8024ad4af44aeec9db33991dae38d95cdb7132970d0d4dec58b9d46d378", 0xa3, 0x6}, {&(0x7f0000000380)="05f82c760d277896dd8c9891a41aafe24124891a32a238c3c78696d112aa09f3ae5c54b0c08676da5db7f358c72dfaca9a5d90860b4ae363c9a921c47965d339c23408a6d9b31a23aee27822f0a140d8e4ec9475a740113f2b9923b46333110e528e0a513151aad34aee1b5310fcf62c1982349253003d6d53aebbe09cf5918668ee682be93b6a671bbc", 0x8a, 0x3}], 0x2000400, &(0x7f0000000440)={[{@balloc_no_unhash_reloc}, {@nolargeio}, {@grpjquota}], [{@obj_role={'obj_role', 0x3d, '^'}}, {@hash}, {@uid_lt}, {@mask={'mask', 0x3d, 'MAY_EXEC'}}, {@uid_lt={'uid<', 0xee00}}, {@smackfsfloor={'smackfsfloor', 0x3d, ':%#[@'}}, {@obj_user={'obj_user', 0x3d, ',\\*),i'}}, {@uid_eq={'uid', 0x3d, 0xee00}}, {@seclabel}, {@uid_lt={'uid<', 0xee00}}]})

06:18:57 executing program 1:
r0 = openat(0xffffffffffffffff, 0x0, 0x0, 0x0)
mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800004, 0x12, r0, 0x0)
preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x9, 0x0)
bpf$LINK_GET_FD_BY_ID(0x1e, &(0x7f0000000040)=0xffffffffffffffff, 0x4)

06:18:57 executing program 2:
r0 = socket$nl_route(0x10, 0x3, 0x0)
sendmsg$nl_route(r0, 0x0, 0x0)

06:18:57 executing program 3:
r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0)
mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800004, 0x12, r0, 0x0)
preadv(r0, 0x0, 0x0, 0x9, 0x0)
mmap(&(0x7f0000000000/0xa000)=nil, 0xa000, 0x2, 0x2172, 0xffffffffffffffff, 0x0)
r1 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x11, 0x4, &(0x7f00000000c0)=@framed={{}, [@call={0x85, 0x0, 0x0, 0x7b}]}, &(0x7f00000001c0)='syzkaller\x00', 0x4, 0x8f, &(0x7f00000002c0)=""/143, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78)
bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='ext4_es_lookup_extent_exit\x00', r1}, 0x10)
r2 = socket$unix(0x1, 0x1, 0x0)
bind$unix(r2, &(0x7f00000001c0)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x56)

06:18:57 executing program 1:
r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0)
mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x0, 0x12, r0, 0x0)
preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x9, 0x0)
bpf$LINK_GET_FD_BY_ID(0x1e, &(0x7f0000000040)=0xffffffffffffffff, 0x4)

06:18:57 executing program 2:
r0 = socket$nl_route(0x10, 0x3, 0x0)
sendmsg$nl_route(r0, 0x0, 0x0)

06:18:57 executing program 0:
r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0)
mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800004, 0x12, r0, 0x0)
preadv(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)=""/179, 0xb3}], 0x1, 0x3, 0xaee)
preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x9, 0x0)
syz_mount_image$reiserfs(&(0x7f0000000140), &(0x7f0000000180)='./file0\x00', 0x8000, 0x3, &(0x7f0000000300)=[{&(0x7f0000000540)="21d37ef07e82e237fbe1b40158d20e242c5ea1f9d9edc6b9395250085d6dfa486982e82d4ce1a5e2bc00d29383bae640de", 0x31, 0x7}, {&(0x7f0000000240)="c43f281f483aa6cd83e40e59d53f177299d285bbe5d90aab2b56a76f9db49d86afa5a0f601ba9b3502de5f3724f3ec00927151f928f668b362052950a2e8f16baec29875fdad59395e86a1050c368933e3ed5a17d76bd7bded793436ea207885f395ace3fc12126c205b170be392c1645233ef01f9661090706a65f63b4845dc2884a20711a8024ad4af44aeec9db33991dae38d95cdb7132970d0d4dec58b9d46d378", 0xa3, 0x6}, {&(0x7f0000000380)="05f82c760d277896dd8c9891a41aafe24124891a32a238c3c78696d112aa09f3ae5c54b0c08676da5db7f358c72dfaca9a5d90860b4ae363c9a921c47965d339c23408a6d9b31a23aee27822f0a140d8e4ec9475a740113f2b9923b46333110e528e0a513151aad34aee1b5310fcf62c1982349253003d6d53aebbe09cf5918668ee682be93b6a671bbc", 0x8a, 0x3}], 0x2000400, &(0x7f0000000440)={[{@balloc_no_unhash_reloc}, {@nolargeio}, {@grpjquota}], [{@obj_role={'obj_role', 0x3d, '^'}}, {@hash}, {@uid_lt}, {@mask={'mask', 0x3d, 'MAY_EXEC'}}, {@uid_lt={'uid<', 0xee00}}, {@smackfsfloor={'smackfsfloor', 0x3d, ':%#[@'}}, {@obj_user={'obj_user', 0x3d, ',\\*),i'}}, {@uid_eq={'uid', 0x3d, 0xee00}}, {@seclabel}, {@uid_lt={'uid<', 0xee00}}]})

06:18:57 executing program 1:
r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0)
mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x0, 0x12, r0, 0x0)
preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x9, 0x0)
bpf$LINK_GET_FD_BY_ID(0x1e, &(0x7f0000000040)=0xffffffffffffffff, 0x4)

06:18:57 executing program 2:
r0 = socket$nl_route(0x10, 0x3, 0x0)
sendmsg$nl_route(r0, 0x0, 0x0)

06:18:57 executing program 3:
r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0)
mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800004, 0x12, r0, 0x0)
preadv(r0, &(0x7f00000001c0), 0x0, 0x9, 0x0)
mmap(&(0x7f0000000000/0xa000)=nil, 0xa000, 0x2, 0x2172, 0xffffffffffffffff, 0x0)
r1 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x11, 0x4, &(0x7f00000000c0)=@framed={{}, [@call={0x85, 0x0, 0x0, 0x7b}]}, &(0x7f00000001c0)='syzkaller\x00', 0x4, 0x8f, &(0x7f00000002c0)=""/143, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78)
bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='ext4_es_lookup_extent_exit\x00', r1}, 0x10)
r2 = socket$unix(0x1, 0x1, 0x0)
bind$unix(r2, &(0x7f00000001c0)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x56)

06:18:57 executing program 0:
r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0)
mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800004, 0x12, r0, 0x0)
preadv(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)=""/179, 0xb3}], 0x1, 0x3, 0xaee)
preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x9, 0x0)
syz_mount_image$reiserfs(&(0x7f0000000140), &(0x7f0000000180)='./file0\x00', 0x8000, 0x3, &(0x7f0000000300)=[{&(0x7f0000000540)="21d37ef07e82e237fbe1b40158d20e242c5ea1f9d9edc6b9395250085d6dfa486982e82d4ce1a5e2bc00d29383bae640de", 0x31, 0x7}, {&(0x7f0000000240)="c43f281f483aa6cd83e40e59d53f177299d285bbe5d90aab2b56a76f9db49d86afa5a0f601ba9b3502de5f3724f3ec00927151f928f668b362052950a2e8f16baec29875fdad59395e86a1050c368933e3ed5a17d76bd7bded793436ea207885f395ace3fc12126c205b170be392c1645233ef01f9661090706a65f63b4845dc2884a20711a8024ad4af44aeec9db33991dae38d95cdb7132970d0d4dec58b9d46d378", 0xa3, 0x6}, {&(0x7f0000000380)="05f82c760d277896dd8c9891a41aafe24124891a32a238c3c78696d112aa09f3ae5c54b0c08676da5db7f358c72dfaca9a5d90860b4ae363c9a921c47965d339c23408a6d9b31a23aee27822f0a140d8e4ec9475a740113f2b9923b46333110e528e0a513151aad34aee1b5310fcf62c1982349253003d6d53aebbe09cf5918668ee682be93b6a671bbc", 0x8a, 0x3}], 0x2000400, &(0x7f0000000440)={[{@balloc_no_unhash_reloc}, {@nolargeio}, {@grpjquota}], [{@obj_role={'obj_role', 0x3d, '^'}}, {@hash}, {@uid_lt}, {@mask={'mask', 0x3d, 'MAY_EXEC'}}, {@uid_lt={'uid<', 0xee00}}, {@smackfsfloor={'smackfsfloor', 0x3d, ':%#[@'}}, {@obj_user={'obj_user', 0x3d, ',\\*),i'}}, {@uid_eq={'uid', 0x3d, 0xee00}}, {@seclabel}, {@uid_lt={'uid<', 0xee00}}]})

06:18:57 executing program 3:
r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0)
mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800004, 0x12, r0, 0x0)
preadv(r0, &(0x7f00000001c0), 0x0, 0x9, 0x0)
mmap(&(0x7f0000000000/0xa000)=nil, 0xa000, 0x2, 0x2172, 0xffffffffffffffff, 0x0)
r1 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x11, 0x4, &(0x7f00000000c0)=@framed={{}, [@call={0x85, 0x0, 0x0, 0x7b}]}, &(0x7f00000001c0)='syzkaller\x00', 0x4, 0x8f, &(0x7f00000002c0)=""/143, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78)
bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='ext4_es_lookup_extent_exit\x00', r1}, 0x10)
r2 = socket$unix(0x1, 0x1, 0x0)
bind$unix(r2, &(0x7f00000001c0)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x56)

06:18:57 executing program 1:
r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0)
mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x0, 0x12, r0, 0x0)
preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x9, 0x0)
bpf$LINK_GET_FD_BY_ID(0x1e, &(0x7f0000000040)=0xffffffffffffffff, 0x4)

06:18:57 executing program 0:
r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0)
mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800004, 0x12, r0, 0x0)
preadv(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)=""/179, 0xb3}], 0x1, 0x3, 0xaee)
mmap(&(0x7f0000000000/0xa000)=nil, 0xa000, 0x2, 0x2172, 0xffffffffffffffff, 0x0)
syz_mount_image$reiserfs(&(0x7f0000000140), &(0x7f0000000180)='./file0\x00', 0x8000, 0x3, &(0x7f0000000300)=[{&(0x7f0000000540)="21d37ef07e82e237fbe1b40158d20e242c5ea1f9d9edc6b9395250085d6dfa486982e82d4ce1a5e2bc00d29383bae640de", 0x31, 0x7}, {&(0x7f0000000240)="c43f281f483aa6cd83e40e59d53f177299d285bbe5d90aab2b56a76f9db49d86afa5a0f601ba9b3502de5f3724f3ec00927151f928f668b362052950a2e8f16baec29875fdad59395e86a1050c368933e3ed5a17d76bd7bded793436ea207885f395ace3fc12126c205b170be392c1645233ef01f9661090706a65f63b4845dc2884a20711a8024ad4af44aeec9db33991dae38d95cdb7132970d0d4dec58b9d46d378", 0xa3, 0x6}, {&(0x7f0000000380)="05f82c760d277896dd8c9891a41aafe24124891a32a238c3c78696d112aa09f3ae5c54b0c08676da5db7f358c72dfaca9a5d90860b4ae363c9a921c47965d339c23408a6d9b31a23aee27822f0a140d8e4ec9475a740113f2b9923b46333110e528e0a513151aad34aee1b5310fcf62c1982349253003d6d53aebbe09cf5918668ee682be93b6a671bbc", 0x8a, 0x3}], 0x2000400, &(0x7f0000000440)={[{@balloc_no_unhash_reloc}, {@nolargeio}, {@grpjquota}], [{@obj_role={'obj_role', 0x3d, '^'}}, {@hash}, {@uid_lt}, {@mask={'mask', 0x3d, 'MAY_EXEC'}}, {@uid_lt={'uid<', 0xee00}}, {@smackfsfloor={'smackfsfloor', 0x3d, ':%#[@'}}, {@obj_user={'obj_user', 0x3d, ',\\*),i'}}, {@uid_eq={'uid', 0x3d, 0xee00}}, {@seclabel}, {@uid_lt={'uid<', 0xee00}}]})

06:18:57 executing program 2:
r0 = socket$nl_route(0x10, 0x3, 0x0)
sendmsg$nl_route(r0, &(0x7f0000000400)={0x0, 0x0, 0x0}, 0x0)

06:18:57 executing program 1:
r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0)
mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800004, 0x10, r0, 0x0)
preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x9, 0x0)
bpf$LINK_GET_FD_BY_ID(0x1e, &(0x7f0000000040)=0xffffffffffffffff, 0x4)

[  339.750661][T15332] loop0: detected capacity change from 0 to 64
06:18:57 executing program 2:
r0 = socket$nl_route(0x10, 0x3, 0x0)
sendmsg$nl_route(r0, &(0x7f0000000400)={0x0, 0x0, 0x0}, 0x0)

[  339.776828][T15332] REISERFS warning (device loop0): super-6504 reiserfs_getopt: the option "nolargeio" requires an argument
[  339.776828][T15332] 
06:18:57 executing program 3:
r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0)
mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800004, 0x12, r0, 0x0)
preadv(r0, &(0x7f00000001c0), 0x0, 0x9, 0x0)
mmap(&(0x7f0000000000/0xa000)=nil, 0xa000, 0x2, 0x2172, 0xffffffffffffffff, 0x0)
r1 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x11, 0x4, &(0x7f00000000c0)=@framed={{}, [@call={0x85, 0x0, 0x0, 0x7b}]}, &(0x7f00000001c0)='syzkaller\x00', 0x4, 0x8f, &(0x7f00000002c0)=""/143, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78)
bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='ext4_es_lookup_extent_exit\x00', r1}, 0x10)
r2 = socket$unix(0x1, 0x1, 0x0)
bind$unix(r2, &(0x7f00000001c0)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x56)

06:18:57 executing program 1:
r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0)
mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800004, 0x10, r0, 0x0)
preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x9, 0x0)
bpf$LINK_GET_FD_BY_ID(0x1e, &(0x7f0000000040)=0xffffffffffffffff, 0x4)

06:18:57 executing program 2:
r0 = socket$nl_route(0x10, 0x3, 0x0)
sendmsg$nl_route(r0, &(0x7f0000000400)={0x0, 0x0, 0x0}, 0x0)

06:18:57 executing program 1:
r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0)
mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800004, 0x10, r0, 0x0)
preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x9, 0x0)
bpf$LINK_GET_FD_BY_ID(0x1e, &(0x7f0000000040)=0xffffffffffffffff, 0x4)

06:18:57 executing program 0:
r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0)
mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800004, 0x12, r0, 0x0)
preadv(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)=""/179, 0xb3}], 0x1, 0x3, 0xaee)
mmap(&(0x7f0000000000/0xa000)=nil, 0xa000, 0x2, 0x2172, 0xffffffffffffffff, 0x0)
syz_mount_image$reiserfs(&(0x7f0000000140), &(0x7f0000000180)='./file0\x00', 0x8000, 0x3, &(0x7f0000000300)=[{&(0x7f0000000540)="21d37ef07e82e237fbe1b40158d20e242c5ea1f9d9edc6b9395250085d6dfa486982e82d4ce1a5e2bc00d29383bae640de", 0x31, 0x7}, {&(0x7f0000000240)="c43f281f483aa6cd83e40e59d53f177299d285bbe5d90aab2b56a76f9db49d86afa5a0f601ba9b3502de5f3724f3ec00927151f928f668b362052950a2e8f16baec29875fdad59395e86a1050c368933e3ed5a17d76bd7bded793436ea207885f395ace3fc12126c205b170be392c1645233ef01f9661090706a65f63b4845dc2884a20711a8024ad4af44aeec9db33991dae38d95cdb7132970d0d4dec58b9d46d378", 0xa3, 0x6}, {&(0x7f0000000380)="05f82c760d277896dd8c9891a41aafe24124891a32a238c3c78696d112aa09f3ae5c54b0c08676da5db7f358c72dfaca9a5d90860b4ae363c9a921c47965d339c23408a6d9b31a23aee27822f0a140d8e4ec9475a740113f2b9923b46333110e528e0a513151aad34aee1b5310fcf62c1982349253003d6d53aebbe09cf5918668ee682be93b6a671bbc", 0x8a, 0x3}], 0x2000400, &(0x7f0000000440)={[{@balloc_no_unhash_reloc}, {@nolargeio}, {@grpjquota}], [{@obj_role={'obj_role', 0x3d, '^'}}, {@hash}, {@uid_lt}, {@mask={'mask', 0x3d, 'MAY_EXEC'}}, {@uid_lt={'uid<', 0xee00}}, {@smackfsfloor={'smackfsfloor', 0x3d, ':%#[@'}}, {@obj_user={'obj_user', 0x3d, ',\\*),i'}}, {@uid_eq={'uid', 0x3d, 0xee00}}, {@seclabel}, {@uid_lt={'uid<', 0xee00}}]})

06:18:57 executing program 2:
r0 = socket$nl_route(0x10, 0x3, 0x0)
sendmsg$nl_route(r0, &(0x7f0000000400)={0x0, 0x0, &(0x7f0000000100)={0x0, 0x34}}, 0x0)

06:18:57 executing program 3:
r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0)
mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800004, 0x12, r0, 0x0)
preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x0, 0x0)
mmap(&(0x7f0000000000/0xa000)=nil, 0xa000, 0x2, 0x2172, 0xffffffffffffffff, 0x0)
r1 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x11, 0x4, &(0x7f00000000c0)=@framed={{}, [@call={0x85, 0x0, 0x0, 0x7b}]}, &(0x7f00000001c0)='syzkaller\x00', 0x4, 0x8f, &(0x7f00000002c0)=""/143, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78)
bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='ext4_es_lookup_extent_exit\x00', r1}, 0x10)
r2 = socket$unix(0x1, 0x1, 0x0)
bind$unix(r2, &(0x7f00000001c0)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x56)

06:18:57 executing program 1:
r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0)
mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800004, 0x12, 0xffffffffffffffff, 0x0)
preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x9, 0x0)
bpf$LINK_GET_FD_BY_ID(0x1e, &(0x7f0000000040)=0xffffffffffffffff, 0x4)

06:18:57 executing program 2:
r0 = socket$nl_route(0x10, 0x3, 0x0)
sendmsg$nl_route(r0, &(0x7f0000000400)={0x0, 0x0, &(0x7f0000000100)={0x0, 0x34}}, 0x0)

[  339.985451][T15358] loop0: detected capacity change from 0 to 64
06:18:57 executing program 1:
r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0)
mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800004, 0x12, 0xffffffffffffffff, 0x0)
preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x9, 0x0)
bpf$LINK_GET_FD_BY_ID(0x1e, &(0x7f0000000040)=0xffffffffffffffff, 0x4)

06:18:57 executing program 3:
r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0)
mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800004, 0x12, r0, 0x0)
preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x0, 0x0)
mmap(&(0x7f0000000000/0xa000)=nil, 0xa000, 0x2, 0x2172, 0xffffffffffffffff, 0x0)
r1 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x11, 0x4, &(0x7f00000000c0)=@framed={{}, [@call={0x85, 0x0, 0x0, 0x7b}]}, &(0x7f00000001c0)='syzkaller\x00', 0x4, 0x8f, &(0x7f00000002c0)=""/143, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78)
bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='ext4_es_lookup_extent_exit\x00', r1}, 0x10)
r2 = socket$unix(0x1, 0x1, 0x0)
bind$unix(r2, &(0x7f00000001c0)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x56)

[  340.048497][T15358] REISERFS warning (device loop0): super-6504 reiserfs_getopt: the option "nolargeio" requires an argument
[  340.048497][T15358] 
06:18:57 executing program 2:
r0 = socket$nl_route(0x10, 0x3, 0x0)
sendmsg$nl_route(r0, &(0x7f0000000400)={0x0, 0x0, &(0x7f0000000100)={0x0, 0x34}}, 0x0)

06:18:57 executing program 0:
r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0)
mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800004, 0x12, r0, 0x0)
preadv(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)=""/179, 0xb3}], 0x1, 0x3, 0xaee)
mmap(&(0x7f0000000000/0xa000)=nil, 0xa000, 0x2, 0x2172, 0xffffffffffffffff, 0x0)
syz_mount_image$reiserfs(&(0x7f0000000140), &(0x7f0000000180)='./file0\x00', 0x8000, 0x3, &(0x7f0000000300)=[{&(0x7f0000000540)="21d37ef07e82e237fbe1b40158d20e242c5ea1f9d9edc6b9395250085d6dfa486982e82d4ce1a5e2bc00d29383bae640de", 0x31, 0x7}, {&(0x7f0000000240)="c43f281f483aa6cd83e40e59d53f177299d285bbe5d90aab2b56a76f9db49d86afa5a0f601ba9b3502de5f3724f3ec00927151f928f668b362052950a2e8f16baec29875fdad59395e86a1050c368933e3ed5a17d76bd7bded793436ea207885f395ace3fc12126c205b170be392c1645233ef01f9661090706a65f63b4845dc2884a20711a8024ad4af44aeec9db33991dae38d95cdb7132970d0d4dec58b9d46d378", 0xa3, 0x6}, {&(0x7f0000000380)="05f82c760d277896dd8c9891a41aafe24124891a32a238c3c78696d112aa09f3ae5c54b0c08676da5db7f358c72dfaca9a5d90860b4ae363c9a921c47965d339c23408a6d9b31a23aee27822f0a140d8e4ec9475a740113f2b9923b46333110e528e0a513151aad34aee1b5310fcf62c1982349253003d6d53aebbe09cf5918668ee682be93b6a671bbc", 0x8a, 0x3}], 0x2000400, &(0x7f0000000440)={[{@balloc_no_unhash_reloc}, {@nolargeio}, {@grpjquota}], [{@obj_role={'obj_role', 0x3d, '^'}}, {@hash}, {@uid_lt}, {@mask={'mask', 0x3d, 'MAY_EXEC'}}, {@uid_lt={'uid<', 0xee00}}, {@smackfsfloor={'smackfsfloor', 0x3d, ':%#[@'}}, {@obj_user={'obj_user', 0x3d, ',\\*),i'}}, {@uid_eq={'uid', 0x3d, 0xee00}}, {@seclabel}, {@uid_lt={'uid<', 0xee00}}]})

06:18:57 executing program 1:
r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0)
mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800004, 0x12, 0xffffffffffffffff, 0x0)
preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x9, 0x0)
bpf$LINK_GET_FD_BY_ID(0x1e, &(0x7f0000000040)=0xffffffffffffffff, 0x4)

[  340.187559][T15373] loop0: detected capacity change from 0 to 64
06:18:57 executing program 2:
r0 = socket$nl_route(0x10, 0x3, 0x0)
sendmsg$nl_route(r0, &(0x7f0000000400)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000440)=ANY=[@ANYBLOB="3400000011000100000000000000000002000000", @ANYRES32=0x0], 0x34}}, 0x0)

06:18:57 executing program 1:
r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0)
mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800004, 0x12, r0, 0x0)
preadv(0xffffffffffffffff, &(0x7f00000001c0)=[{0x0}], 0x1, 0x9, 0x0)
bpf$LINK_GET_FD_BY_ID(0x1e, &(0x7f0000000040)=0xffffffffffffffff, 0x4)

06:18:57 executing program 3:
r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0)
mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800004, 0x12, r0, 0x0)
preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x0, 0x0)
mmap(&(0x7f0000000000/0xa000)=nil, 0xa000, 0x2, 0x2172, 0xffffffffffffffff, 0x0)
r1 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x11, 0x4, &(0x7f00000000c0)=@framed={{}, [@call={0x85, 0x0, 0x0, 0x7b}]}, &(0x7f00000001c0)='syzkaller\x00', 0x4, 0x8f, &(0x7f00000002c0)=""/143, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78)
bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='ext4_es_lookup_extent_exit\x00', r1}, 0x10)
r2 = socket$unix(0x1, 0x1, 0x0)
bind$unix(r2, &(0x7f00000001c0)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x56)

[  340.231620][T15373] REISERFS warning (device loop0): super-6504 reiserfs_getopt: the option "nolargeio" requires an argument
[  340.231620][T15373] 
[  340.242558][T15379] netlink: 20 bytes leftover after parsing attributes in process `syz-executor.2'.
06:18:57 executing program 1:
r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0)
mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800004, 0x12, r0, 0x0)
preadv(0xffffffffffffffff, &(0x7f00000001c0)=[{0x0}], 0x1, 0x9, 0x0)
bpf$LINK_GET_FD_BY_ID(0x1e, &(0x7f0000000040)=0xffffffffffffffff, 0x4)

06:18:57 executing program 2:
r0 = socket$nl_route(0x10, 0x3, 0x0)
sendmsg$nl_route(r0, &(0x7f0000000400)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000440)=ANY=[@ANYBLOB="3400000011000100000000000000000002000000"], 0x34}}, 0x0)

06:18:57 executing program 3:
r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0)
mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800004, 0x12, r0, 0x0)
preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x9, 0x0)
mmap(&(0x7f0000000000/0xa000)=nil, 0xa000, 0x0, 0x2172, 0xffffffffffffffff, 0x0)
r1 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x11, 0x4, &(0x7f00000000c0)=@framed={{}, [@call={0x85, 0x0, 0x0, 0x7b}]}, &(0x7f00000001c0)='syzkaller\x00', 0x4, 0x8f, &(0x7f00000002c0)=""/143, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78)
bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='ext4_es_lookup_extent_exit\x00', r1}, 0x10)
r2 = socket$unix(0x1, 0x1, 0x0)
bind$unix(r2, &(0x7f00000001c0)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x56)

06:18:57 executing program 0:
r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0)
mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800004, 0x12, r0, 0x0)
preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x9, 0x0)
mmap(&(0x7f0000000000/0xa000)=nil, 0xa000, 0x2, 0x2172, 0xffffffffffffffff, 0x0)
syz_mount_image$reiserfs(&(0x7f0000000140), &(0x7f0000000180)='./file0\x00', 0x8000, 0x3, &(0x7f0000000300)=[{&(0x7f0000000540)="21d37ef07e82e237fbe1b40158d20e242c5ea1f9d9edc6b9395250085d6dfa486982e82d4ce1a5e2bc00d29383bae640de", 0x31, 0x7}, {&(0x7f0000000240)="c43f281f483aa6cd83e40e59d53f177299d285bbe5d90aab2b56a76f9db49d86afa5a0f601ba9b3502de5f3724f3ec00927151f928f668b362052950a2e8f16baec29875fdad59395e86a1050c368933e3ed5a17d76bd7bded793436ea207885f395ace3fc12126c205b170be392c1645233ef01f9661090706a65f63b4845dc2884a20711a8024ad4af44aeec9db33991dae38d95cdb7132970d0d4dec58b9d46d378", 0xa3, 0x6}, {&(0x7f0000000380)="05f82c760d277896dd8c9891a41aafe24124891a32a238c3c78696d112aa09f3ae5c54b0c08676da5db7f358c72dfaca9a5d90860b4ae363c9a921c47965d339c23408a6d9b31a23aee27822f0a140d8e4ec9475a740113f2b9923b46333110e528e0a513151aad34aee1b5310fcf62c1982349253003d6d53aebbe09cf5918668ee682be93b6a671bbc", 0x8a, 0x3}], 0x2000400, &(0x7f0000000440)={[{@balloc_no_unhash_reloc}, {@nolargeio}, {@grpjquota}], [{@obj_role={'obj_role', 0x3d, '^'}}, {@hash}, {@uid_lt}, {@mask={'mask', 0x3d, 'MAY_EXEC'}}, {@uid_lt={'uid<', 0xee00}}, {@smackfsfloor={'smackfsfloor', 0x3d, ':%#[@'}}, {@obj_user={'obj_user', 0x3d, ',\\*),i'}}, {@uid_eq={'uid', 0x3d, 0xee00}}, {@seclabel}, {@uid_lt={'uid<', 0xee00}}]})

06:18:57 executing program 1:
r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0)
mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800004, 0x12, r0, 0x0)
preadv(0xffffffffffffffff, &(0x7f00000001c0)=[{0x0}], 0x1, 0x9, 0x0)
bpf$LINK_GET_FD_BY_ID(0x1e, &(0x7f0000000040)=0xffffffffffffffff, 0x4)

06:18:57 executing program 2:
r0 = socket$nl_route(0x10, 0x3, 0x0)
sendmsg$nl_route(r0, &(0x7f0000000400)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000440)=ANY=[], 0x34}}, 0x0)

06:18:58 executing program 3:
r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0)
mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800004, 0x12, r0, 0x0)
preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x9, 0x0)
mmap(&(0x7f0000000000/0xa000)=nil, 0xa000, 0x0, 0x2172, 0xffffffffffffffff, 0x0)
r1 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x11, 0x4, &(0x7f00000000c0)=@framed={{}, [@call={0x85, 0x0, 0x0, 0x7b}]}, &(0x7f00000001c0)='syzkaller\x00', 0x4, 0x8f, &(0x7f00000002c0)=""/143, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78)
bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='ext4_es_lookup_extent_exit\x00', r1}, 0x10)
r2 = socket$unix(0x1, 0x1, 0x0)
bind$unix(r2, &(0x7f00000001c0)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x56)

[  340.416391][T15396] loop0: detected capacity change from 0 to 64
[  340.434198][T15396] REISERFS warning (device loop0): super-6504 reiserfs_getopt: the option "nolargeio" requires an argument
[  340.434198][T15396] 
06:18:58 executing program 1:
r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0)
mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800004, 0x12, r0, 0x0)
preadv(r0, 0x0, 0x0, 0x9, 0x0)
bpf$LINK_GET_FD_BY_ID(0x1e, &(0x7f0000000040)=0xffffffffffffffff, 0x4)

06:18:58 executing program 2:
r0 = socket$nl_route(0x10, 0x3, 0x0)
sendmsg$nl_route(r0, &(0x7f0000000400)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000440)=ANY=[], 0x34}}, 0x0)

06:18:58 executing program 3:
r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0)
mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800004, 0x12, r0, 0x0)
preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x9, 0x0)
mmap(&(0x7f0000000000/0xa000)=nil, 0xa000, 0x0, 0x2172, 0xffffffffffffffff, 0x0)
r1 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x11, 0x4, &(0x7f00000000c0)=@framed={{}, [@call={0x85, 0x0, 0x0, 0x7b}]}, &(0x7f00000001c0)='syzkaller\x00', 0x4, 0x8f, &(0x7f00000002c0)=""/143, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78)
bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='ext4_es_lookup_extent_exit\x00', r1}, 0x10)
r2 = socket$unix(0x1, 0x1, 0x0)
bind$unix(r2, &(0x7f00000001c0)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x56)

06:18:58 executing program 1:
r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0)
mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800004, 0x12, r0, 0x0)
preadv(r0, 0x0, 0x0, 0x9, 0x0)
bpf$LINK_GET_FD_BY_ID(0x1e, &(0x7f0000000040)=0xffffffffffffffff, 0x4)

06:18:58 executing program 0:
r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0)
preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x9, 0x0)
mmap(&(0x7f0000000000/0xa000)=nil, 0xa000, 0x2, 0x2172, 0xffffffffffffffff, 0x0)
syz_mount_image$reiserfs(&(0x7f0000000140), &(0x7f0000000180)='./file0\x00', 0x8000, 0x3, &(0x7f0000000300)=[{&(0x7f0000000540)="21d37ef07e82e237fbe1b40158d20e242c5ea1f9d9edc6b9395250085d6dfa486982e82d4ce1a5e2bc00d29383bae640de", 0x31, 0x7}, {&(0x7f0000000240)="c43f281f483aa6cd83e40e59d53f177299d285bbe5d90aab2b56a76f9db49d86afa5a0f601ba9b3502de5f3724f3ec00927151f928f668b362052950a2e8f16baec29875fdad59395e86a1050c368933e3ed5a17d76bd7bded793436ea207885f395ace3fc12126c205b170be392c1645233ef01f9661090706a65f63b4845dc2884a20711a8024ad4af44aeec9db33991dae38d95cdb7132970d0d4dec58b9d46d378", 0xa3, 0x6}, {&(0x7f0000000380)="05f82c760d277896dd8c9891a41aafe24124891a32a238c3c78696d112aa09f3ae5c54b0c08676da5db7f358c72dfaca9a5d90860b4ae363c9a921c47965d339c23408a6d9b31a23aee27822f0a140d8e4ec9475a740113f2b9923b46333110e528e0a513151aad34aee1b5310fcf62c1982349253003d6d53aebbe09cf5918668ee682be93b6a671bbc", 0x8a, 0x3}], 0x2000400, &(0x7f0000000440)={[{@balloc_no_unhash_reloc}, {@nolargeio}, {@grpjquota}], [{@obj_role={'obj_role', 0x3d, '^'}}, {@hash}, {@uid_lt}, {@mask={'mask', 0x3d, 'MAY_EXEC'}}, {@uid_lt={'uid<', 0xee00}}, {@smackfsfloor={'smackfsfloor', 0x3d, ':%#[@'}}, {@obj_user={'obj_user', 0x3d, ',\\*),i'}}, {@uid_eq={'uid', 0x3d, 0xee00}}, {@seclabel}, {@uid_lt={'uid<', 0xee00}}]})

06:18:58 executing program 2:
r0 = socket$nl_route(0x10, 0x3, 0x0)
sendmsg$nl_route(r0, &(0x7f0000000400)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000440)=ANY=[], 0x34}}, 0x0)

06:18:58 executing program 3:
r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0)
mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800004, 0x12, r0, 0x0)
preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x9, 0x0)
mmap(&(0x7f0000000000/0xa000)=nil, 0xa000, 0x2, 0x10, 0xffffffffffffffff, 0x0)
r1 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x11, 0x4, &(0x7f00000000c0)=@framed={{}, [@call={0x85, 0x0, 0x0, 0x7b}]}, &(0x7f00000001c0)='syzkaller\x00', 0x4, 0x8f, &(0x7f00000002c0)=""/143, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78)
bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='ext4_es_lookup_extent_exit\x00', r1}, 0x10)
r2 = socket$unix(0x1, 0x1, 0x0)
bind$unix(r2, &(0x7f00000001c0)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x56)

[  340.598030][T15417] loop0: detected capacity change from 0 to 64
06:18:58 executing program 1:
r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0)
mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800004, 0x12, r0, 0x0)
preadv(r0, 0x0, 0x0, 0x9, 0x0)
bpf$LINK_GET_FD_BY_ID(0x1e, &(0x7f0000000040)=0xffffffffffffffff, 0x4)

06:18:58 executing program 3:
r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0)
mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800004, 0x12, r0, 0x0)
preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x9, 0x0)
mmap(&(0x7f0000000000/0xa000)=nil, 0xa000, 0x2, 0x10, 0xffffffffffffffff, 0x0)
r1 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x11, 0x4, &(0x7f00000000c0)=@framed={{}, [@call={0x85, 0x0, 0x0, 0x7b}]}, &(0x7f00000001c0)='syzkaller\x00', 0x4, 0x8f, &(0x7f00000002c0)=""/143, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78)
bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='ext4_es_lookup_extent_exit\x00', r1}, 0x10)
r2 = socket$unix(0x1, 0x1, 0x0)
bind$unix(r2, &(0x7f00000001c0)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x56)

[  340.622849][T15417] REISERFS warning (device loop0): super-6504 reiserfs_getopt: the option "nolargeio" requires an argument
[  340.622849][T15417] 
06:18:58 executing program 2:
r0 = socket$nl_route(0x10, 0x3, 0x0)
sendmsg$nl_route(r0, &(0x7f0000000400)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000440)=ANY=[@ANYBLOB], 0x34}}, 0x0)

06:18:58 executing program 1:
r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0)
mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800004, 0x12, r0, 0x0)
preadv(r0, &(0x7f00000001c0), 0x0, 0x9, 0x0)
bpf$LINK_GET_FD_BY_ID(0x1e, &(0x7f0000000040)=0xffffffffffffffff, 0x4)

06:18:58 executing program 3:
r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0)
mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800004, 0x12, r0, 0x0)
preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x9, 0x0)
mmap(&(0x7f0000000000/0xa000)=nil, 0xa000, 0x2, 0x10, 0xffffffffffffffff, 0x0)
r1 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x11, 0x4, &(0x7f00000000c0)=@framed={{}, [@call={0x85, 0x0, 0x0, 0x7b}]}, &(0x7f00000001c0)='syzkaller\x00', 0x4, 0x8f, &(0x7f00000002c0)=""/143, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78)
bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='ext4_es_lookup_extent_exit\x00', r1}, 0x10)
r2 = socket$unix(0x1, 0x1, 0x0)
bind$unix(r2, &(0x7f00000001c0)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x56)

06:18:58 executing program 0:
r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0)
preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x9, 0x0)
mmap(&(0x7f0000000000/0xa000)=nil, 0xa000, 0x2, 0x2172, 0xffffffffffffffff, 0x0)
syz_mount_image$reiserfs(&(0x7f0000000140), &(0x7f0000000180)='./file0\x00', 0x8000, 0x3, &(0x7f0000000300)=[{&(0x7f0000000540)="21d37ef07e82e237fbe1b40158d20e242c5ea1f9d9edc6b9395250085d6dfa486982e82d4ce1a5e2bc00d29383bae640de", 0x31, 0x7}, {&(0x7f0000000240)="c43f281f483aa6cd83e40e59d53f177299d285bbe5d90aab2b56a76f9db49d86afa5a0f601ba9b3502de5f3724f3ec00927151f928f668b362052950a2e8f16baec29875fdad59395e86a1050c368933e3ed5a17d76bd7bded793436ea207885f395ace3fc12126c205b170be392c1645233ef01f9661090706a65f63b4845dc2884a20711a8024ad4af44aeec9db33991dae38d95cdb7132970d0d4dec58b9d46d378", 0xa3, 0x6}, {&(0x7f0000000380)="05f82c760d277896dd8c9891a41aafe24124891a32a238c3c78696d112aa09f3ae5c54b0c08676da5db7f358c72dfaca9a5d90860b4ae363c9a921c47965d339c23408a6d9b31a23aee27822f0a140d8e4ec9475a740113f2b9923b46333110e528e0a513151aad34aee1b5310fcf62c1982349253003d6d53aebbe09cf5918668ee682be93b6a671bbc", 0x8a, 0x3}], 0x2000400, &(0x7f0000000440)={[{@balloc_no_unhash_reloc}, {@nolargeio}, {@grpjquota}], [{@obj_role={'obj_role', 0x3d, '^'}}, {@hash}, {@uid_lt}, {@mask={'mask', 0x3d, 'MAY_EXEC'}}, {@uid_lt={'uid<', 0xee00}}, {@smackfsfloor={'smackfsfloor', 0x3d, ':%#[@'}}, {@obj_user={'obj_user', 0x3d, ',\\*),i'}}, {@uid_eq={'uid', 0x3d, 0xee00}}, {@seclabel}, {@uid_lt={'uid<', 0xee00}}]})

06:18:58 executing program 2:
r0 = socket$nl_route(0x10, 0x3, 0x0)
sendmsg$nl_route(r0, &(0x7f0000000400)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000440)=ANY=[@ANYBLOB], 0x34}}, 0x0)

06:18:58 executing program 1:
r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0)
mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800004, 0x12, r0, 0x0)
preadv(r0, &(0x7f00000001c0), 0x0, 0x9, 0x0)
bpf$LINK_GET_FD_BY_ID(0x1e, &(0x7f0000000040)=0xffffffffffffffff, 0x4)

[  340.791949][T15437] loop0: detected capacity change from 0 to 64
[  340.811680][T15437] REISERFS warning (device loop0): super-6504 reiserfs_getopt: the option "nolargeio" requires an argument
[  340.811680][T15437] 
06:18:58 executing program 3:
r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0)
mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800004, 0x12, r0, 0x0)
preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x9, 0x0)
mmap(&(0x7f0000000000/0xa000)=nil, 0xa000, 0x2, 0x2172, 0xffffffffffffffff, 0x0)
r1 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0)
bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='ext4_es_lookup_extent_exit\x00', r1}, 0x10)
r2 = socket$unix(0x1, 0x1, 0x0)
bind$unix(r2, &(0x7f00000001c0)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x56)

06:18:58 executing program 2:
r0 = socket$nl_route(0x10, 0x3, 0x0)
sendmsg$nl_route(r0, &(0x7f0000000400)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000440)=ANY=[@ANYBLOB], 0x34}}, 0x0)

06:18:58 executing program 1:
r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0)
mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800004, 0x12, r0, 0x0)
preadv(r0, &(0x7f00000001c0), 0x0, 0x9, 0x0)
bpf$LINK_GET_FD_BY_ID(0x1e, &(0x7f0000000040)=0xffffffffffffffff, 0x4)

06:18:58 executing program 2:
r0 = socket$nl_route(0x10, 0x3, 0x0)
sendmsg$nl_route(r0, &(0x7f0000000400)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000440)=ANY=[@ANYBLOB="34000000110001000000"], 0x34}}, 0x0)

06:18:58 executing program 1:
r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0)
mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800004, 0x12, r0, 0x0)
preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x0, 0x0)
bpf$LINK_GET_FD_BY_ID(0x1e, &(0x7f0000000040)=0xffffffffffffffff, 0x4)

06:18:58 executing program 0:
r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0)
preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x9, 0x0)
mmap(&(0x7f0000000000/0xa000)=nil, 0xa000, 0x2, 0x2172, 0xffffffffffffffff, 0x0)
syz_mount_image$reiserfs(&(0x7f0000000140), &(0x7f0000000180)='./file0\x00', 0x8000, 0x3, &(0x7f0000000300)=[{&(0x7f0000000540)="21d37ef07e82e237fbe1b40158d20e242c5ea1f9d9edc6b9395250085d6dfa486982e82d4ce1a5e2bc00d29383bae640de", 0x31, 0x7}, {&(0x7f0000000240)="c43f281f483aa6cd83e40e59d53f177299d285bbe5d90aab2b56a76f9db49d86afa5a0f601ba9b3502de5f3724f3ec00927151f928f668b362052950a2e8f16baec29875fdad59395e86a1050c368933e3ed5a17d76bd7bded793436ea207885f395ace3fc12126c205b170be392c1645233ef01f9661090706a65f63b4845dc2884a20711a8024ad4af44aeec9db33991dae38d95cdb7132970d0d4dec58b9d46d378", 0xa3, 0x6}, {&(0x7f0000000380)="05f82c760d277896dd8c9891a41aafe24124891a32a238c3c78696d112aa09f3ae5c54b0c08676da5db7f358c72dfaca9a5d90860b4ae363c9a921c47965d339c23408a6d9b31a23aee27822f0a140d8e4ec9475a740113f2b9923b46333110e528e0a513151aad34aee1b5310fcf62c1982349253003d6d53aebbe09cf5918668ee682be93b6a671bbc", 0x8a, 0x3}], 0x2000400, &(0x7f0000000440)={[{@balloc_no_unhash_reloc}, {@nolargeio}, {@grpjquota}], [{@obj_role={'obj_role', 0x3d, '^'}}, {@hash}, {@uid_lt}, {@mask={'mask', 0x3d, 'MAY_EXEC'}}, {@uid_lt={'uid<', 0xee00}}, {@smackfsfloor={'smackfsfloor', 0x3d, ':%#[@'}}, {@obj_user={'obj_user', 0x3d, ',\\*),i'}}, {@uid_eq={'uid', 0x3d, 0xee00}}, {@seclabel}, {@uid_lt={'uid<', 0xee00}}]})

06:18:58 executing program 3:
r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0)
mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800004, 0x12, r0, 0x0)
preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x9, 0x0)
mmap(&(0x7f0000000000/0xa000)=nil, 0xa000, 0x2, 0x2172, 0xffffffffffffffff, 0x0)
r1 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0)
bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='ext4_es_lookup_extent_exit\x00', r1}, 0x10)
r2 = socket$unix(0x1, 0x1, 0x0)
bind$unix(r2, &(0x7f00000001c0)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x56)

06:18:58 executing program 2:
r0 = socket$nl_route(0x10, 0x3, 0x0)
sendmsg$nl_route(r0, &(0x7f0000000400)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000440)=ANY=[@ANYBLOB], 0x34}}, 0x0)

06:18:58 executing program 1:
r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0)
mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800004, 0x12, r0, 0x0)
preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x0, 0x0)
bpf$LINK_GET_FD_BY_ID(0x1e, &(0x7f0000000040)=0xffffffffffffffff, 0x4)

06:18:58 executing program 3:
r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0)
mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800004, 0x12, r0, 0x0)
preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x9, 0x0)
mmap(&(0x7f0000000000/0xa000)=nil, 0xa000, 0x2, 0x2172, 0xffffffffffffffff, 0x0)
r1 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0)
bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='ext4_es_lookup_extent_exit\x00', r1}, 0x10)
r2 = socket$unix(0x1, 0x1, 0x0)
bind$unix(r2, &(0x7f00000001c0)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x56)

[  341.008905][T15457] loop0: detected capacity change from 0 to 64
[  341.020951][T15457] REISERFS warning (device loop0): super-6504 reiserfs_getopt: the option "nolargeio" requires an argument
06:18:58 executing program 1:
r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0)
mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800004, 0x12, r0, 0x0)
preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x0, 0x0)
bpf$LINK_GET_FD_BY_ID(0x1e, &(0x7f0000000040)=0xffffffffffffffff, 0x4)

[  341.020951][T15457] 
06:18:58 executing program 2:
r0 = socket$nl_route(0x10, 0x3, 0x0)
sendmsg$nl_route(r0, &(0x7f0000000400)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000440)=ANY=[@ANYBLOB], 0x34}}, 0x0)

06:18:58 executing program 1:
r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0)
mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800004, 0x12, r0, 0x0)
preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x9, 0x0)
bpf$LINK_GET_FD_BY_ID(0x1e, 0x0, 0x0)

06:18:58 executing program 0:
mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800004, 0x12, 0xffffffffffffffff, 0x0)
preadv(0xffffffffffffffff, &(0x7f00000001c0)=[{0x0}], 0x1, 0x9, 0x0)
mmap(&(0x7f0000000000/0xa000)=nil, 0xa000, 0x2, 0x2172, 0xffffffffffffffff, 0x0)
syz_mount_image$reiserfs(&(0x7f0000000140), &(0x7f0000000180)='./file0\x00', 0x8000, 0x3, &(0x7f0000000300)=[{&(0x7f0000000540)="21d37ef07e82e237fbe1b40158d20e242c5ea1f9d9edc6b9395250085d6dfa486982e82d4ce1a5e2bc00d29383bae640de", 0x31, 0x7}, {&(0x7f0000000240)="c43f281f483aa6cd83e40e59d53f177299d285bbe5d90aab2b56a76f9db49d86afa5a0f601ba9b3502de5f3724f3ec00927151f928f668b362052950a2e8f16baec29875fdad59395e86a1050c368933e3ed5a17d76bd7bded793436ea207885f395ace3fc12126c205b170be392c1645233ef01f9661090706a65f63b4845dc2884a20711a8024ad4af44aeec9db33991dae38d95cdb7132970d0d4dec58b9d46d378", 0xa3, 0x6}, {&(0x7f0000000380)="05f82c760d277896dd8c9891a41aafe24124891a32a238c3c78696d112aa09f3ae5c54b0c08676da5db7f358c72dfaca9a5d90860b4ae363c9a921c47965d339c23408a6d9b31a23aee27822f0a140d8e4ec9475a740113f2b9923b46333110e528e0a513151aad34aee1b5310fcf62c1982349253003d6d53aebbe09cf5918668ee682be93b6a671bbc", 0x8a, 0x3}], 0x2000400, &(0x7f0000000440)={[{@balloc_no_unhash_reloc}, {@nolargeio}, {@grpjquota}], [{@obj_role={'obj_role', 0x3d, '^'}}, {@hash}, {@uid_lt}, {@mask={'mask', 0x3d, 'MAY_EXEC'}}, {@uid_lt={'uid<', 0xee00}}, {@smackfsfloor={'smackfsfloor', 0x3d, ':%#[@'}}, {@obj_user={'obj_user', 0x3d, ',\\*),i'}}, {@uid_eq={'uid', 0x3d, 0xee00}}, {@seclabel}, {@uid_lt={'uid<', 0xee00}}]})

06:18:58 executing program 3:
r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0)
mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800004, 0x12, r0, 0x0)
preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x9, 0x0)
mmap(&(0x7f0000000000/0xa000)=nil, 0xa000, 0x2, 0x2172, 0xffffffffffffffff, 0x0)
r1 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x0, 0x4, &(0x7f00000000c0)=@framed={{}, [@call={0x85, 0x0, 0x0, 0x7b}]}, &(0x7f00000001c0)='syzkaller\x00', 0x4, 0x8f, &(0x7f00000002c0)=""/143, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78)
bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='ext4_es_lookup_extent_exit\x00', r1}, 0x10)
r2 = socket$unix(0x1, 0x1, 0x0)
bind$unix(r2, &(0x7f00000001c0)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x56)

06:18:58 executing program 2:
r0 = socket$nl_route(0x10, 0x3, 0x0)
sendmsg$nl_route(r0, &(0x7f0000000400)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000440)=ANY=[@ANYBLOB], 0x34}}, 0x0)

06:18:58 executing program 1:
r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0)
preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x9, 0x0)
mmap(&(0x7f0000000000/0xa000)=nil, 0xa000, 0x2, 0x2172, 0xffffffffffffffff, 0x0)
syz_mount_image$reiserfs(&(0x7f0000000140), &(0x7f0000000180)='./file0\x00', 0x8000, 0x3, &(0x7f0000000300)=[{&(0x7f0000000540)="21d37ef07e82e237fbe1b40158d20e242c5ea1f9d9edc6b9395250085d6dfa486982e82d4ce1a5e2bc00d29383bae640de", 0x31, 0x7}, {&(0x7f0000000240)="c43f281f483aa6cd83e40e59d53f177299d285bbe5d90aab2b56a76f9db49d86afa5a0f601ba9b3502de5f3724f3ec00927151f928f668b362052950a2e8f16baec29875fdad59395e86a1050c368933e3ed5a17d76bd7bded793436ea207885f395ace3fc12126c205b170be392c1645233ef01f9661090706a65f63b4845dc2884a20711a8024ad4af44aeec9db33991dae38d95cdb7132970d0d4dec58b9d46d378", 0xa3, 0x6}, {&(0x7f0000000380)="05f82c760d277896dd8c9891a41aafe24124891a32a238c3c78696d112aa09f3ae5c54b0c08676da5db7f358c72dfaca9a5d90860b4ae363c9a921c47965d339c23408a6d9b31a23aee27822f0a140d8e4ec9475a740113f2b9923b46333110e528e0a513151aad34aee1b5310fcf62c1982349253003d6d53aebbe09cf5918668ee682be93b6a671bbc", 0x8a, 0x3}], 0x2000400, &(0x7f0000000440)={[{@balloc_no_unhash_reloc}, {@nolargeio}, {@grpjquota}], [{@obj_role={'obj_role', 0x3d, '^'}}, {@hash}, {@uid_lt}, {@mask={'mask', 0x3d, 'MAY_EXEC'}}, {@uid_lt={'uid<', 0xee00}}, {@smackfsfloor={'smackfsfloor', 0x3d, ':%#[@'}}, {@obj_user={'obj_user', 0x3d, ',\\*),i'}}, {@uid_eq={'uid', 0x3d, 0xee00}}, {@seclabel}, {@uid_lt={'uid<', 0xee00}}]})

[  341.167556][T15477] loop0: detected capacity change from 0 to 64
[  341.194441][T15482] loop1: detected capacity change from 0 to 64
06:18:58 executing program 2:
r0 = socket$nl_route(0x10, 0x3, 0x0)
sendmsg$nl_route(r0, &(0x7f0000000400)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000440)=ANY=[@ANYBLOB="3400000011"], 0x34}}, 0x0)

06:18:58 executing program 3:
r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0)
mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800004, 0x12, r0, 0x0)
preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x9, 0x0)
mmap(&(0x7f0000000000/0xa000)=nil, 0xa000, 0x2, 0x2172, 0xffffffffffffffff, 0x0)
r1 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x0, 0x4, &(0x7f00000000c0)=@framed={{}, [@call={0x85, 0x0, 0x0, 0x7b}]}, &(0x7f00000001c0)='syzkaller\x00', 0x4, 0x8f, &(0x7f00000002c0)=""/143, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78)
bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='ext4_es_lookup_extent_exit\x00', r1}, 0x10)
r2 = socket$unix(0x1, 0x1, 0x0)
bind$unix(r2, &(0x7f00000001c0)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x56)

[  341.212830][T15482] REISERFS warning (device loop1): super-6504 reiserfs_getopt: the option "nolargeio" requires an argument
[  341.212830][T15482] 
[  341.238512][T15477] REISERFS warning (device loop0): super-6504 reiserfs_getopt: the option "nolargeio" requires an argument
[  341.238512][T15477] 
06:18:58 executing program 2:
r0 = socket$nl_route(0x10, 0x3, 0x0)
sendmsg$nl_route(r0, &(0x7f0000000400)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000440)=ANY=[@ANYBLOB="3400000011"], 0x34}}, 0x0)

06:18:58 executing program 3:
r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0)
mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800004, 0x12, r0, 0x0)
preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x9, 0x0)
mmap(&(0x7f0000000000/0xa000)=nil, 0xa000, 0x2, 0x2172, 0xffffffffffffffff, 0x0)
r1 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x0, 0x4, &(0x7f00000000c0)=@framed={{}, [@call={0x85, 0x0, 0x0, 0x7b}]}, &(0x7f00000001c0)='syzkaller\x00', 0x4, 0x8f, &(0x7f00000002c0)=""/143, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78)
bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='ext4_es_lookup_extent_exit\x00', r1}, 0x10)
r2 = socket$unix(0x1, 0x1, 0x0)
bind$unix(r2, &(0x7f00000001c0)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x56)

06:18:58 executing program 0:
mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800004, 0x12, 0xffffffffffffffff, 0x0)
preadv(0xffffffffffffffff, &(0x7f00000001c0)=[{0x0}], 0x1, 0x9, 0x0)
mmap(&(0x7f0000000000/0xa000)=nil, 0xa000, 0x2, 0x2172, 0xffffffffffffffff, 0x0)
syz_mount_image$reiserfs(&(0x7f0000000140), &(0x7f0000000180)='./file0\x00', 0x8000, 0x3, &(0x7f0000000300)=[{&(0x7f0000000540)="21d37ef07e82e237fbe1b40158d20e242c5ea1f9d9edc6b9395250085d6dfa486982e82d4ce1a5e2bc00d29383bae640de", 0x31, 0x7}, {&(0x7f0000000240)="c43f281f483aa6cd83e40e59d53f177299d285bbe5d90aab2b56a76f9db49d86afa5a0f601ba9b3502de5f3724f3ec00927151f928f668b362052950a2e8f16baec29875fdad59395e86a1050c368933e3ed5a17d76bd7bded793436ea207885f395ace3fc12126c205b170be392c1645233ef01f9661090706a65f63b4845dc2884a20711a8024ad4af44aeec9db33991dae38d95cdb7132970d0d4dec58b9d46d378", 0xa3, 0x6}, {&(0x7f0000000380)="05f82c760d277896dd8c9891a41aafe24124891a32a238c3c78696d112aa09f3ae5c54b0c08676da5db7f358c72dfaca9a5d90860b4ae363c9a921c47965d339c23408a6d9b31a23aee27822f0a140d8e4ec9475a740113f2b9923b46333110e528e0a513151aad34aee1b5310fcf62c1982349253003d6d53aebbe09cf5918668ee682be93b6a671bbc", 0x8a, 0x3}], 0x2000400, &(0x7f0000000440)={[{@balloc_no_unhash_reloc}, {@nolargeio}, {@grpjquota}], [{@obj_role={'obj_role', 0x3d, '^'}}, {@hash}, {@uid_lt}, {@mask={'mask', 0x3d, 'MAY_EXEC'}}, {@uid_lt={'uid<', 0xee00}}, {@smackfsfloor={'smackfsfloor', 0x3d, ':%#[@'}}, {@obj_user={'obj_user', 0x3d, ',\\*),i'}}, {@uid_eq={'uid', 0x3d, 0xee00}}, {@seclabel}, {@uid_lt={'uid<', 0xee00}}]})

06:18:58 executing program 2:
r0 = socket$nl_route(0x10, 0x3, 0x0)
sendmsg$nl_route(r0, &(0x7f0000000400)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000440)=ANY=[@ANYBLOB="3400000011"], 0x34}}, 0x0)

06:18:58 executing program 1:
r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0)
mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800004, 0x12, r0, 0x0)
preadv(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)=""/179, 0xb3}], 0x1, 0x3, 0xaee)
mmap(&(0x7f0000000000/0xa000)=nil, 0xa000, 0x2, 0x2172, 0xffffffffffffffff, 0x0)
syz_mount_image$reiserfs(&(0x7f0000000140), &(0x7f0000000180)='./file0\x00', 0x8000, 0x3, &(0x7f0000000300)=[{&(0x7f0000000540)="21d37ef07e82e237fbe1b40158d20e242c5ea1f9d9edc6b9395250085d6dfa486982e82d4ce1a5e2bc00d29383bae640de", 0x31, 0x7}, {&(0x7f0000000240)="c43f281f483aa6cd83e40e59d53f177299d285bbe5d90aab2b56a76f9db49d86afa5a0f601ba9b3502de5f3724f3ec00927151f928f668b362052950a2e8f16baec29875fdad59395e86a1050c368933e3ed5a17d76bd7bded793436ea207885f395ace3fc12126c205b170be392c1645233ef01f9661090706a65f63b4845dc2884a20711a8024ad4af44aeec9db33991dae38d95cdb7132970d0d4dec58b9d46d378", 0xa3, 0x6}, {&(0x7f0000000380)="05f82c760d277896dd8c9891a41aafe24124891a32a238c3c78696d112aa09f3ae5c54b0c08676da5db7f358c72dfaca9a5d90860b4ae363c9a921c47965d339c23408a6d9b31a23aee27822f0a140d8e4ec9475a740113f2b9923b46333110e528e0a513151aad34aee1b5310fcf62c1982349253003d6d53aebbe09cf5918668ee682be93b6a671bbc", 0x8a, 0x3}], 0x2000400, &(0x7f0000000440)={[{@balloc_no_unhash_reloc}, {@nolargeio}, {@grpjquota}], [{@obj_role={'obj_role', 0x3d, '^'}}, {@hash}, {@uid_lt}, {@mask={'mask', 0x3d, 'MAY_EXEC'}}, {@uid_lt={'uid<', 0xee00}}, {@smackfsfloor={'smackfsfloor', 0x3d, ':%#[@'}}, {@obj_user={'obj_user', 0x3d, ',\\*),i'}}, {@uid_eq={'uid', 0x3d, 0xee00}}, {@seclabel}, {@uid_lt={'uid<', 0xee00}}]})

06:18:58 executing program 3:
r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0)
mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800004, 0x12, r0, 0x0)
preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x9, 0x0)
mmap(&(0x7f0000000000/0xa000)=nil, 0xa000, 0x2, 0x2172, 0xffffffffffffffff, 0x0)
r1 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x11, 0x0, 0x0, &(0x7f00000001c0)='syzkaller\x00', 0x4, 0x8f, &(0x7f00000002c0)=""/143, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x74)
bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='ext4_es_lookup_extent_exit\x00', r1}, 0x10)
r2 = socket$unix(0x1, 0x1, 0x0)
bind$unix(r2, &(0x7f00000001c0)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x56)

[  341.416581][T15504] loop1: detected capacity change from 0 to 64
[  341.431016][T15504] REISERFS warning (device loop1): super-6504 reiserfs_getopt: the option "nolargeio" requires an argument
[  341.431016][T15504] 
06:18:59 executing program 3:
r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0)
mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800004, 0x12, r0, 0x0)
preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x9, 0x0)
mmap(&(0x7f0000000000/0xa000)=nil, 0xa000, 0x2, 0x2172, 0xffffffffffffffff, 0x0)
r1 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x11, 0x0, 0x0, &(0x7f00000001c0)='syzkaller\x00', 0x4, 0x8f, &(0x7f00000002c0)=""/143, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x74)
bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='ext4_es_lookup_extent_exit\x00', r1}, 0x10)
r2 = socket$unix(0x1, 0x1, 0x0)
bind$unix(r2, &(0x7f00000001c0)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x56)

06:18:59 executing program 2:
r0 = socket$nl_route(0x10, 0x3, 0x0)
sendmsg$nl_route(r0, &(0x7f0000000400)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000440)=ANY=[@ANYBLOB="3400000011000100"], 0x34}}, 0x0)

[  341.454119][T15506] loop0: detected capacity change from 0 to 64
[  341.485432][T15506] REISERFS warning (device loop0): super-6504 reiserfs_getopt: the option "nolargeio" requires an argument
[  341.485432][T15506] 
06:18:59 executing program 2:
r0 = socket$nl_route(0x10, 0x3, 0x0)
sendmsg$nl_route(r0, &(0x7f0000000400)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000440)=ANY=[@ANYBLOB="340000001100"], 0x34}}, 0x0)

06:18:59 executing program 3:
r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0)
mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800004, 0x12, r0, 0x0)
preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x9, 0x0)
mmap(&(0x7f0000000000/0xa000)=nil, 0xa000, 0x2, 0x2172, 0xffffffffffffffff, 0x0)
r1 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x11, 0x0, 0x0, &(0x7f00000001c0)='syzkaller\x00', 0x4, 0x8f, &(0x7f00000002c0)=""/143, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x74)
bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='ext4_es_lookup_extent_exit\x00', r1}, 0x10)
r2 = socket$unix(0x1, 0x1, 0x0)
bind$unix(r2, &(0x7f00000001c0)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x56)

06:18:59 executing program 0:
mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800004, 0x12, 0xffffffffffffffff, 0x0)
preadv(0xffffffffffffffff, &(0x7f00000001c0)=[{0x0}], 0x1, 0x9, 0x0)
mmap(&(0x7f0000000000/0xa000)=nil, 0xa000, 0x2, 0x2172, 0xffffffffffffffff, 0x0)
syz_mount_image$reiserfs(&(0x7f0000000140), &(0x7f0000000180)='./file0\x00', 0x8000, 0x3, &(0x7f0000000300)=[{&(0x7f0000000540)="21d37ef07e82e237fbe1b40158d20e242c5ea1f9d9edc6b9395250085d6dfa486982e82d4ce1a5e2bc00d29383bae640de", 0x31, 0x7}, {&(0x7f0000000240)="c43f281f483aa6cd83e40e59d53f177299d285bbe5d90aab2b56a76f9db49d86afa5a0f601ba9b3502de5f3724f3ec00927151f928f668b362052950a2e8f16baec29875fdad59395e86a1050c368933e3ed5a17d76bd7bded793436ea207885f395ace3fc12126c205b170be392c1645233ef01f9661090706a65f63b4845dc2884a20711a8024ad4af44aeec9db33991dae38d95cdb7132970d0d4dec58b9d46d378", 0xa3, 0x6}, {&(0x7f0000000380)="05f82c760d277896dd8c9891a41aafe24124891a32a238c3c78696d112aa09f3ae5c54b0c08676da5db7f358c72dfaca9a5d90860b4ae363c9a921c47965d339c23408a6d9b31a23aee27822f0a140d8e4ec9475a740113f2b9923b46333110e528e0a513151aad34aee1b5310fcf62c1982349253003d6d53aebbe09cf5918668ee682be93b6a671bbc", 0x8a, 0x3}], 0x2000400, &(0x7f0000000440)={[{@balloc_no_unhash_reloc}, {@nolargeio}, {@grpjquota}], [{@obj_role={'obj_role', 0x3d, '^'}}, {@hash}, {@uid_lt}, {@mask={'mask', 0x3d, 'MAY_EXEC'}}, {@uid_lt={'uid<', 0xee00}}, {@smackfsfloor={'smackfsfloor', 0x3d, ':%#[@'}}, {@obj_user={'obj_user', 0x3d, ',\\*),i'}}, {@uid_eq={'uid', 0x3d, 0xee00}}, {@seclabel}, {@uid_lt={'uid<', 0xee00}}]})

06:18:59 executing program 2:
r0 = socket$nl_route(0x10, 0x3, 0x0)
sendmsg$nl_route(r0, &(0x7f0000000400)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000440)=ANY=[@ANYBLOB="340000001100"], 0x34}}, 0x0)

06:18:59 executing program 3:
r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0)
mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800004, 0x12, r0, 0x0)
preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x9, 0x0)
mmap(&(0x7f0000000000/0xa000)=nil, 0xa000, 0x2, 0x2172, 0xffffffffffffffff, 0x0)
r1 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x11, 0x3, &(0x7f00000000c0)=@framed, &(0x7f00000001c0)='syzkaller\x00', 0x4, 0x8f, &(0x7f00000002c0)=""/143, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x74)
bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='ext4_es_lookup_extent_exit\x00', r1}, 0x10)
r2 = socket$unix(0x1, 0x1, 0x0)
bind$unix(r2, &(0x7f00000001c0)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x56)

06:18:59 executing program 1:
r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0)
mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800004, 0x12, r0, 0x0)
preadv(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)=""/179, 0xb3}], 0x1, 0x3, 0xaee)
mmap(&(0x7f0000000000/0xa000)=nil, 0xa000, 0x2, 0x2172, 0xffffffffffffffff, 0x0)
syz_mount_image$reiserfs(&(0x7f0000000140), &(0x7f0000000180)='./file0\x00', 0x8000, 0x3, &(0x7f0000000300)=[{&(0x7f0000000540)="21d37ef07e82e237fbe1b40158d20e242c5ea1f9d9edc6b9395250085d6dfa486982e82d4ce1a5e2bc00d29383bae640de", 0x31, 0x7}, {&(0x7f0000000240)="c43f281f483aa6cd83e40e59d53f177299d285bbe5d90aab2b56a76f9db49d86afa5a0f601ba9b3502de5f3724f3ec00927151f928f668b362052950a2e8f16baec29875fdad59395e86a1050c368933e3ed5a17d76bd7bded793436ea207885f395ace3fc12126c205b170be392c1645233ef01f9661090706a65f63b4845dc2884a20711a8024ad4af44aeec9db33991dae38d95cdb7132970d0d4dec58b9d46d378", 0xa3, 0x6}, {&(0x7f0000000380)="05f82c760d277896dd8c9891a41aafe24124891a32a238c3c78696d112aa09f3ae5c54b0c08676da5db7f358c72dfaca9a5d90860b4ae363c9a921c47965d339c23408a6d9b31a23aee27822f0a140d8e4ec9475a740113f2b9923b46333110e528e0a513151aad34aee1b5310fcf62c1982349253003d6d53aebbe09cf5918668ee682be93b6a671bbc", 0x8a, 0x3}], 0x2000400, &(0x7f0000000440)={[{@balloc_no_unhash_reloc}, {@nolargeio}, {@grpjquota}], [{@obj_role={'obj_role', 0x3d, '^'}}, {@hash}, {@uid_lt}, {@mask={'mask', 0x3d, 'MAY_EXEC'}}, {@uid_lt={'uid<', 0xee00}}, {@smackfsfloor={'smackfsfloor', 0x3d, ':%#[@'}}, {@obj_user={'obj_user', 0x3d, ',\\*),i'}}, {@uid_eq={'uid', 0x3d, 0xee00}}, {@seclabel}, {@uid_lt={'uid<', 0xee00}}]})

06:18:59 executing program 2:
r0 = socket$nl_route(0x10, 0x3, 0x0)
sendmsg$nl_route(r0, &(0x7f0000000400)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000440)=ANY=[@ANYBLOB="340000001100"], 0x34}}, 0x0)

[  341.648677][T15529] loop1: detected capacity change from 0 to 64
[  341.670253][T15530] loop0: detected capacity change from 0 to 64
[  341.682980][T15529] REISERFS warning (device loop1): super-6504 reiserfs_getopt: the option "nolargeio" requires an argument
[  341.682980][T15529] 
[  341.697396][T15530] REISERFS warning (device loop0): super-6504 reiserfs_getopt: the option "nolargeio" requires an argument
[  341.697396][T15530] 
06:18:59 executing program 2:
r0 = socket$nl_route(0x10, 0x3, 0x0)
sendmsg$nl_route(r0, &(0x7f0000000400)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000440)=ANY=[@ANYBLOB="34000000110001"], 0x34}}, 0x0)

06:18:59 executing program 3:
r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0)
mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800004, 0x12, r0, 0x0)
preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x9, 0x0)
mmap(&(0x7f0000000000/0xa000)=nil, 0xa000, 0x2, 0x2172, 0xffffffffffffffff, 0x0)
r1 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x11, 0x3, &(0x7f00000000c0)=@framed, 0x0, 0x4, 0x8f, &(0x7f00000002c0)=""/143, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x74)
bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='ext4_es_lookup_extent_exit\x00', r1}, 0x10)
r2 = socket$unix(0x1, 0x1, 0x0)
bind$unix(r2, &(0x7f00000001c0)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x56)

06:18:59 executing program 2:
r0 = socket$nl_route(0x10, 0x3, 0x0)
sendmsg$nl_route(r0, &(0x7f0000000400)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000440)=ANY=[@ANYBLOB="340000001100"], 0x34}}, 0x0)

06:18:59 executing program 0:
r0 = openat(0xffffffffffffffff, 0x0, 0x0, 0x0)
mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800004, 0x12, r0, 0x0)
preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x9, 0x0)
mmap(&(0x7f0000000000/0xa000)=nil, 0xa000, 0x2, 0x2172, 0xffffffffffffffff, 0x0)
syz_mount_image$reiserfs(&(0x7f0000000140), &(0x7f0000000180)='./file0\x00', 0x8000, 0x3, &(0x7f0000000300)=[{&(0x7f0000000540)="21d37ef07e82e237fbe1b40158d20e242c5ea1f9d9edc6b9395250085d6dfa486982e82d4ce1a5e2bc00d29383bae640de", 0x31, 0x7}, {&(0x7f0000000240)="c43f281f483aa6cd83e40e59d53f177299d285bbe5d90aab2b56a76f9db49d86afa5a0f601ba9b3502de5f3724f3ec00927151f928f668b362052950a2e8f16baec29875fdad59395e86a1050c368933e3ed5a17d76bd7bded793436ea207885f395ace3fc12126c205b170be392c1645233ef01f9661090706a65f63b4845dc2884a20711a8024ad4af44aeec9db33991dae38d95cdb7132970d0d4dec58b9d46d378", 0xa3, 0x6}, {&(0x7f0000000380)="05f82c760d277896dd8c9891a41aafe24124891a32a238c3c78696d112aa09f3ae5c54b0c08676da5db7f358c72dfaca9a5d90860b4ae363c9a921c47965d339c23408a6d9b31a23aee27822f0a140d8e4ec9475a740113f2b9923b46333110e528e0a513151aad34aee1b5310fcf62c1982349253003d6d53aebbe09cf5918668ee682be93b6a671bbc", 0x8a, 0x3}], 0x2000400, &(0x7f0000000440)={[{@balloc_no_unhash_reloc}, {@nolargeio}, {@grpjquota}], [{@obj_role={'obj_role', 0x3d, '^'}}, {@hash}, {@uid_lt}, {@mask={'mask', 0x3d, 'MAY_EXEC'}}, {@uid_lt={'uid<', 0xee00}}, {@smackfsfloor={'smackfsfloor', 0x3d, ':%#[@'}}, {@obj_user={'obj_user', 0x3d, ',\\*),i'}}, {@uid_eq={'uid', 0x3d, 0xee00}}, {@seclabel}, {@uid_lt={'uid<', 0xee00}}]})

06:18:59 executing program 1:
r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0)
mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800004, 0x12, r0, 0x0)
preadv(r0, &(0x7f00000001c0), 0x0, 0x9, 0x0)
mmap(&(0x7f0000000000/0xa000)=nil, 0xa000, 0x2, 0x2172, 0xffffffffffffffff, 0x0)
r1 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x11, 0x4, &(0x7f00000000c0)=@framed={{}, [@call={0x85, 0x0, 0x0, 0x7b}]}, &(0x7f00000001c0)='syzkaller\x00', 0x4, 0x8f, &(0x7f00000002c0)=""/143, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78)
bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='ext4_es_lookup_extent_exit\x00', r1}, 0x10)
r2 = socket$unix(0x1, 0x1, 0x0)
bind$unix(r2, &(0x7f00000001c0)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x56)

06:18:59 executing program 2:
r0 = socket$nl_route(0x10, 0x3, 0x0)
sendmsg$nl_route(r0, &(0x7f0000000400)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000440)=ANY=[@ANYBLOB="340000001100"], 0x34}}, 0x0)

06:18:59 executing program 3:
r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0)
mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800004, 0x12, r0, 0x0)
preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x9, 0x0)
mmap(&(0x7f0000000000/0xa000)=nil, 0xa000, 0x2, 0x2172, 0xffffffffffffffff, 0x0)
r1 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x11, 0x3, &(0x7f00000000c0)=@framed, 0x0, 0x4, 0x8f, &(0x7f00000002c0)=""/143, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x74)
bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='ext4_es_lookup_extent_exit\x00', r1}, 0x10)
r2 = socket$unix(0x1, 0x1, 0x0)
bind$unix(r2, &(0x7f00000001c0)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x56)

[  341.886088][T15551] loop0: detected capacity change from 0 to 64
06:18:59 executing program 2:
r0 = socket$nl_route(0x10, 0x3, 0x0)
sendmsg$nl_route(r0, &(0x7f0000000400)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000440)=ANY=[@ANYBLOB="340000001100"], 0x34}}, 0x0)

[  341.908702][T15551] REISERFS warning (device loop0): super-6504 reiserfs_getopt: the option "nolargeio" requires an argument
[  341.908702][T15551] 
06:18:59 executing program 3:
r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0)
mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800004, 0x12, r0, 0x0)
preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x9, 0x0)
mmap(&(0x7f0000000000/0xa000)=nil, 0xa000, 0x2, 0x2172, 0xffffffffffffffff, 0x0)
r1 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x11, 0x3, &(0x7f00000000c0)=@framed, 0x0, 0x4, 0x8f, &(0x7f00000002c0)=""/143, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x74)
bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='ext4_es_lookup_extent_exit\x00', r1}, 0x10)
r2 = socket$unix(0x1, 0x1, 0x0)
bind$unix(r2, &(0x7f00000001c0)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x56)

06:18:59 executing program 1:
r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0)
mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800004, 0x12, r0, 0x0)
preadv(r0, 0x0, 0x0, 0x9, 0x0)
mmap(&(0x7f0000000000/0xa000)=nil, 0xa000, 0x2, 0x2172, 0xffffffffffffffff, 0x0)
r1 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x11, 0x4, &(0x7f00000000c0)=@framed={{}, [@call={0x85, 0x0, 0x0, 0x7b}]}, &(0x7f00000001c0)='syzkaller\x00', 0x4, 0x8f, &(0x7f00000002c0)=""/143, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78)
bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='ext4_es_lookup_extent_exit\x00', r1}, 0x10)
r2 = socket$unix(0x1, 0x1, 0x0)
bind$unix(r2, &(0x7f00000001c0)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x56)

06:18:59 executing program 2:
r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0)
mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800004, 0x12, r0, 0x0)
preadv(r0, 0x0, 0x0, 0x9, 0x0)
mmap(&(0x7f0000000000/0xa000)=nil, 0xa000, 0x2, 0x2172, 0xffffffffffffffff, 0x0)
r1 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x11, 0x4, &(0x7f00000000c0)=@framed={{}, [@call={0x85, 0x0, 0x0, 0x7b}]}, &(0x7f00000001c0)='syzkaller\x00', 0x4, 0x8f, &(0x7f00000002c0)=""/143, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78)
bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='ext4_es_lookup_extent_exit\x00', r1}, 0x10)
r2 = socket$unix(0x1, 0x1, 0x0)
bind$unix(r2, &(0x7f00000001c0)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x56)

06:18:59 executing program 0:
r0 = openat(0xffffffffffffffff, 0x0, 0x0, 0x0)
mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800004, 0x12, r0, 0x0)
preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x9, 0x0)
mmap(&(0x7f0000000000/0xa000)=nil, 0xa000, 0x2, 0x2172, 0xffffffffffffffff, 0x0)
syz_mount_image$reiserfs(&(0x7f0000000140), &(0x7f0000000180)='./file0\x00', 0x8000, 0x3, &(0x7f0000000300)=[{&(0x7f0000000540)="21d37ef07e82e237fbe1b40158d20e242c5ea1f9d9edc6b9395250085d6dfa486982e82d4ce1a5e2bc00d29383bae640de", 0x31, 0x7}, {&(0x7f0000000240)="c43f281f483aa6cd83e40e59d53f177299d285bbe5d90aab2b56a76f9db49d86afa5a0f601ba9b3502de5f3724f3ec00927151f928f668b362052950a2e8f16baec29875fdad59395e86a1050c368933e3ed5a17d76bd7bded793436ea207885f395ace3fc12126c205b170be392c1645233ef01f9661090706a65f63b4845dc2884a20711a8024ad4af44aeec9db33991dae38d95cdb7132970d0d4dec58b9d46d378", 0xa3, 0x6}, {&(0x7f0000000380)="05f82c760d277896dd8c9891a41aafe24124891a32a238c3c78696d112aa09f3ae5c54b0c08676da5db7f358c72dfaca9a5d90860b4ae363c9a921c47965d339c23408a6d9b31a23aee27822f0a140d8e4ec9475a740113f2b9923b46333110e528e0a513151aad34aee1b5310fcf62c1982349253003d6d53aebbe09cf5918668ee682be93b6a671bbc", 0x8a, 0x3}], 0x2000400, &(0x7f0000000440)={[{@balloc_no_unhash_reloc}, {@nolargeio}, {@grpjquota}], [{@obj_role={'obj_role', 0x3d, '^'}}, {@hash}, {@uid_lt}, {@mask={'mask', 0x3d, 'MAY_EXEC'}}, {@uid_lt={'uid<', 0xee00}}, {@smackfsfloor={'smackfsfloor', 0x3d, ':%#[@'}}, {@obj_user={'obj_user', 0x3d, ',\\*),i'}}, {@uid_eq={'uid', 0x3d, 0xee00}}, {@seclabel}, {@uid_lt={'uid<', 0xee00}}]})

06:18:59 executing program 3:
r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0)
mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800004, 0x12, r0, 0x0)
preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x9, 0x0)
mmap(&(0x7f0000000000/0xa000)=nil, 0xa000, 0x2, 0x2172, 0xffffffffffffffff, 0x0)
r1 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x11, 0x3, &(0x7f00000000c0)=@framed, &(0x7f00000001c0)='syzkaller\x00', 0x0, 0x8f, &(0x7f00000002c0)=""/143, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x74)
bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='ext4_es_lookup_extent_exit\x00', r1}, 0x10)
r2 = socket$unix(0x1, 0x1, 0x0)
bind$unix(r2, &(0x7f00000001c0)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x56)

06:18:59 executing program 2:
r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0)
mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800004, 0x12, r0, 0x0)
preadv(r0, 0x0, 0x0, 0x9, 0x0)
mmap(&(0x7f0000000000/0xa000)=nil, 0xa000, 0x2, 0x2172, 0xffffffffffffffff, 0x0)
r1 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x11, 0x4, &(0x7f00000000c0)=@framed={{}, [@call={0x85, 0x0, 0x0, 0x7b}]}, &(0x7f00000001c0)='syzkaller\x00', 0x4, 0x8f, &(0x7f00000002c0)=""/143, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78)
bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='ext4_es_lookup_extent_exit\x00', r1}, 0x10)
r2 = socket$unix(0x1, 0x1, 0x0)
bind$unix(r2, &(0x7f00000001c0)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x56)

06:18:59 executing program 3:
r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0)
mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800004, 0x12, r0, 0x0)
preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x9, 0x0)
mmap(&(0x7f0000000000/0xa000)=nil, 0xa000, 0x2, 0x2172, 0xffffffffffffffff, 0x0)
r1 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x11, 0x3, &(0x7f00000000c0)=@framed, &(0x7f00000001c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x74)
bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='ext4_es_lookup_extent_exit\x00', r1}, 0x10)
r2 = socket$unix(0x1, 0x1, 0x0)
bind$unix(r2, &(0x7f00000001c0)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x56)

06:18:59 executing program 1:
r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0)
mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800004, 0x12, r0, 0x0)
preadv(0xffffffffffffffff, &(0x7f00000001c0)=[{0x0}], 0x1, 0x9, 0x0)
mmap(&(0x7f0000000000/0xa000)=nil, 0xa000, 0x2, 0x2172, 0xffffffffffffffff, 0x0)
r1 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x11, 0x4, &(0x7f00000000c0)=@framed={{}, [@call={0x85, 0x0, 0x0, 0x7b}]}, &(0x7f00000001c0)='syzkaller\x00', 0x4, 0x8f, &(0x7f00000002c0)=""/143, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78)
bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='ext4_es_lookup_extent_exit\x00', r1}, 0x10)
r2 = socket$unix(0x1, 0x1, 0x0)
bind$unix(r2, &(0x7f00000001c0)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x56)

[  342.104078][T15572] loop0: detected capacity change from 0 to 64
[  342.121067][T15572] REISERFS warning (device loop0): super-6504 reiserfs_getopt: the option "nolargeio" requires an argument
[  342.121067][T15572] 
06:18:59 executing program 0:
r0 = openat(0xffffffffffffffff, 0x0, 0x0, 0x0)
mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800004, 0x12, r0, 0x0)
preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x9, 0x0)
mmap(&(0x7f0000000000/0xa000)=nil, 0xa000, 0x2, 0x2172, 0xffffffffffffffff, 0x0)
syz_mount_image$reiserfs(&(0x7f0000000140), &(0x7f0000000180)='./file0\x00', 0x8000, 0x3, &(0x7f0000000300)=[{&(0x7f0000000540)="21d37ef07e82e237fbe1b40158d20e242c5ea1f9d9edc6b9395250085d6dfa486982e82d4ce1a5e2bc00d29383bae640de", 0x31, 0x7}, {&(0x7f0000000240)="c43f281f483aa6cd83e40e59d53f177299d285bbe5d90aab2b56a76f9db49d86afa5a0f601ba9b3502de5f3724f3ec00927151f928f668b362052950a2e8f16baec29875fdad59395e86a1050c368933e3ed5a17d76bd7bded793436ea207885f395ace3fc12126c205b170be392c1645233ef01f9661090706a65f63b4845dc2884a20711a8024ad4af44aeec9db33991dae38d95cdb7132970d0d4dec58b9d46d378", 0xa3, 0x6}, {&(0x7f0000000380)="05f82c760d277896dd8c9891a41aafe24124891a32a238c3c78696d112aa09f3ae5c54b0c08676da5db7f358c72dfaca9a5d90860b4ae363c9a921c47965d339c23408a6d9b31a23aee27822f0a140d8e4ec9475a740113f2b9923b46333110e528e0a513151aad34aee1b5310fcf62c1982349253003d6d53aebbe09cf5918668ee682be93b6a671bbc", 0x8a, 0x3}], 0x2000400, &(0x7f0000000440)={[{@balloc_no_unhash_reloc}, {@nolargeio}, {@grpjquota}], [{@obj_role={'obj_role', 0x3d, '^'}}, {@hash}, {@uid_lt}, {@mask={'mask', 0x3d, 'MAY_EXEC'}}, {@uid_lt={'uid<', 0xee00}}, {@smackfsfloor={'smackfsfloor', 0x3d, ':%#[@'}}, {@obj_user={'obj_user', 0x3d, ',\\*),i'}}, {@uid_eq={'uid', 0x3d, 0xee00}}, {@seclabel}, {@uid_lt={'uid<', 0xee00}}]})

06:18:59 executing program 3:
r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0)
mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800004, 0x12, r0, 0x0)
preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x9, 0x0)
mmap(&(0x7f0000000000/0xa000)=nil, 0xa000, 0x2, 0x2172, 0xffffffffffffffff, 0x0)
bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x11, 0x3, &(0x7f00000000c0)=@framed, &(0x7f00000001c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x74)
bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0)
r1 = socket$unix(0x1, 0x1, 0x0)
bind$unix(r1, &(0x7f00000001c0)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x56)

06:18:59 executing program 2:
r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0)
mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800004, 0x12, 0xffffffffffffffff, 0x0)
preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x9, 0x0)
mmap(&(0x7f0000000000/0xa000)=nil, 0xa000, 0x2, 0x2172, 0xffffffffffffffff, 0x0)
r1 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x11, 0x4, &(0x7f00000000c0)=@framed={{}, [@call={0x85, 0x0, 0x0, 0x7b}]}, &(0x7f00000001c0)='syzkaller\x00', 0x4, 0x8f, &(0x7f00000002c0)=""/143, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78)
bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='ext4_es_lookup_extent_exit\x00', r1}, 0x10)
r2 = socket$unix(0x1, 0x1, 0x0)
bind$unix(r2, &(0x7f00000001c0)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x56)

06:18:59 executing program 1:
r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0)
mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800004, 0x12, 0xffffffffffffffff, 0x0)
preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x9, 0x0)
mmap(&(0x7f0000000000/0xa000)=nil, 0xa000, 0x2, 0x2172, 0xffffffffffffffff, 0x0)
r1 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x11, 0x4, &(0x7f00000000c0)=@framed={{}, [@call={0x85, 0x0, 0x0, 0x7b}]}, &(0x7f00000001c0)='syzkaller\x00', 0x4, 0x8f, &(0x7f00000002c0)=""/143, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78)
bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='ext4_es_lookup_extent_exit\x00', r1}, 0x10)
r2 = socket$unix(0x1, 0x1, 0x0)
bind$unix(r2, &(0x7f00000001c0)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x56)

[  342.280716][T15581] loop0: detected capacity change from 0 to 64
06:18:59 executing program 3:
r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0)
mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800004, 0x12, r0, 0x0)
preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x9, 0x0)
mmap(&(0x7f0000000000/0xa000)=nil, 0xa000, 0x2, 0x2172, 0xffffffffffffffff, 0x0)
bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x11, 0x3, &(0x7f00000000c0)=@framed, &(0x7f00000001c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x74)
bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0)
r1 = socket$unix(0x1, 0x1, 0x0)
bind$unix(r1, &(0x7f00000001c0)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x56)

[  342.300904][T15581] REISERFS warning (device loop0): super-6504 reiserfs_getopt: the option "nolargeio" requires an argument
[  342.300904][T15581] 
06:18:59 executing program 2:
r0 = socket$nl_route(0x10, 0x3, 0x0)
sendmsg$nl_route(r0, &(0x7f0000000400)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000440)=ANY=[@ANYBLOB="3400000011000100000000000000000002000000", @ANYRES32=0x0, @ANYBLOB="081f0000000000000000030062726964676530000000000000000000"], 0x34}}, 0x0)
r1 = openat(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0x0, 0x0)
mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800004, 0x12, r1, 0x0)

06:18:59 executing program 1:
r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0)
mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800004, 0x12, 0xffffffffffffffff, 0x0)
preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x9, 0x0)
mmap(&(0x7f0000000000/0xa000)=nil, 0xa000, 0x2, 0x2172, 0xffffffffffffffff, 0x0)
r1 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x11, 0x4, &(0x7f00000000c0)=@framed={{}, [@call={0x85, 0x0, 0x0, 0x7b}]}, &(0x7f00000001c0)='syzkaller\x00', 0x4, 0x8f, &(0x7f00000002c0)=""/143, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78)
bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='ext4_es_lookup_extent_exit\x00', r1}, 0x10)
r2 = socket$unix(0x1, 0x1, 0x0)
bind$unix(r2, &(0x7f00000001c0)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x56)

06:18:59 executing program 3:
r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0)
mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800004, 0x12, r0, 0x0)
preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x9, 0x0)
mmap(&(0x7f0000000000/0xa000)=nil, 0xa000, 0x2, 0x2172, 0xffffffffffffffff, 0x0)
bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x11, 0x3, &(0x7f00000000c0)=@framed, &(0x7f00000001c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x74)
bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0)
r1 = socket$unix(0x1, 0x1, 0x0)
bind$unix(r1, &(0x7f00000001c0)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x56)

06:19:00 executing program 0:
r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0)
mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x0, 0x12, r0, 0x0)
preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x9, 0x0)
mmap(&(0x7f0000000000/0xa000)=nil, 0xa000, 0x2, 0x2172, 0xffffffffffffffff, 0x0)
syz_mount_image$reiserfs(&(0x7f0000000140), &(0x7f0000000180)='./file0\x00', 0x8000, 0x3, &(0x7f0000000300)=[{&(0x7f0000000540)="21d37ef07e82e237fbe1b40158d20e242c5ea1f9d9edc6b9395250085d6dfa486982e82d4ce1a5e2bc00d29383bae640de", 0x31, 0x7}, {&(0x7f0000000240)="c43f281f483aa6cd83e40e59d53f177299d285bbe5d90aab2b56a76f9db49d86afa5a0f601ba9b3502de5f3724f3ec00927151f928f668b362052950a2e8f16baec29875fdad59395e86a1050c368933e3ed5a17d76bd7bded793436ea207885f395ace3fc12126c205b170be392c1645233ef01f9661090706a65f63b4845dc2884a20711a8024ad4af44aeec9db33991dae38d95cdb7132970d0d4dec58b9d46d378", 0xa3, 0x6}, {&(0x7f0000000380)="05f82c760d277896dd8c9891a41aafe24124891a32a238c3c78696d112aa09f3ae5c54b0c08676da5db7f358c72dfaca9a5d90860b4ae363c9a921c47965d339c23408a6d9b31a23aee27822f0a140d8e4ec9475a740113f2b9923b46333110e528e0a513151aad34aee1b5310fcf62c1982349253003d6d53aebbe09cf5918668ee682be93b6a671bbc", 0x8a, 0x3}], 0x2000400, &(0x7f0000000440)={[{@balloc_no_unhash_reloc}, {@nolargeio}, {@grpjquota}], [{@obj_role={'obj_role', 0x3d, '^'}}, {@hash}, {@uid_lt}, {@mask={'mask', 0x3d, 'MAY_EXEC'}}, {@uid_lt={'uid<', 0xee00}}, {@smackfsfloor={'smackfsfloor', 0x3d, ':%#[@'}}, {@obj_user={'obj_user', 0x3d, ',\\*),i'}}, {@uid_eq={'uid', 0x3d, 0xee00}}, {@seclabel}, {@uid_lt={'uid<', 0xee00}}]})

06:19:00 executing program 2:
r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0)
mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x0, 0x12, r0, 0x0)
preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x9, 0x0)
mmap(&(0x7f0000000000/0xa000)=nil, 0xa000, 0x2, 0x2172, 0xffffffffffffffff, 0x0)
r1 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x11, 0x4, &(0x7f00000000c0)=@framed={{}, [@call={0x85, 0x0, 0x0, 0x7b}]}, &(0x7f00000001c0)='syzkaller\x00', 0x4, 0x8f, &(0x7f00000002c0)=""/143, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78)
bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='ext4_es_lookup_extent_exit\x00', r1}, 0x10)
r2 = socket$unix(0x1, 0x1, 0x0)
bind$unix(r2, &(0x7f00000001c0)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x56)

06:19:00 executing program 1:
r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0)
mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800004, 0x12, r0, 0x0)
preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x9, 0x0)
mmap(&(0x7f0000000000/0xa000)=nil, 0xa000, 0x2, 0x2172, 0xffffffffffffffff, 0x0)
socketpair(0x1e, 0x80005, 0x0, &(0x7f0000000340)={0x0, 0x0})
r1 = socket$unix(0x1, 0x1, 0x0)
bind$unix(r1, &(0x7f00000001c0)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x56)
close(r1)

[  342.462675][T15602] loop0: detected capacity change from 0 to 64
[  342.477548][T15602] REISERFS warning (device loop0): super-6504 reiserfs_getopt: the option "nolargeio" requires an argument
[  342.477548][T15602] 
06:19:00 executing program 3:
r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0)
mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800004, 0x12, r0, 0x0)
preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x9, 0x0)
mmap(&(0x7f0000000000/0xa000)=nil, 0xa000, 0x2, 0x2172, 0xffffffffffffffff, 0x0)
r1 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x11, 0x3, &(0x7f00000000c0)=@framed, &(0x7f00000001c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x74)
bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={0x0, r1}, 0x10)
r2 = socket$unix(0x1, 0x1, 0x0)
bind$unix(r2, &(0x7f00000001c0)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x56)

06:19:00 executing program 1:
r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0)
mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800004, 0x12, r0, 0x0)
preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x9, 0x0)
mmap(&(0x7f0000000000/0xa000)=nil, 0xa000, 0x2, 0x2172, 0xffffffffffffffff, 0x0)
socketpair(0x1e, 0x80005, 0x0, &(0x7f0000000340)={0x0, 0x0})
r1 = socket$unix(0x1, 0x1, 0x0)
bind$unix(r1, &(0x7f00000001c0)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x56)
close(r1)

06:19:00 executing program 2:
r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0)
mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800004, 0x12, r0, 0x0)
preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x0, 0x0)
mmap(&(0x7f0000000000/0xa000)=nil, 0xa000, 0x2, 0x2172, 0xffffffffffffffff, 0x0)
bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x11, 0x4, &(0x7f00000000c0)=@framed={{}, [@call={0x85, 0x0, 0x0, 0x7b}]}, &(0x7f00000001c0)='syzkaller\x00', 0x4, 0x8f, &(0x7f00000002c0)=""/143, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78)

06:19:00 executing program 0:
r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0)
mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x0, 0x12, r0, 0x0)
preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x9, 0x0)
mmap(&(0x7f0000000000/0xa000)=nil, 0xa000, 0x2, 0x2172, 0xffffffffffffffff, 0x0)
syz_mount_image$reiserfs(&(0x7f0000000140), &(0x7f0000000180)='./file0\x00', 0x8000, 0x3, &(0x7f0000000300)=[{&(0x7f0000000540)="21d37ef07e82e237fbe1b40158d20e242c5ea1f9d9edc6b9395250085d6dfa486982e82d4ce1a5e2bc00d29383bae640de", 0x31, 0x7}, {&(0x7f0000000240)="c43f281f483aa6cd83e40e59d53f177299d285bbe5d90aab2b56a76f9db49d86afa5a0f601ba9b3502de5f3724f3ec00927151f928f668b362052950a2e8f16baec29875fdad59395e86a1050c368933e3ed5a17d76bd7bded793436ea207885f395ace3fc12126c205b170be392c1645233ef01f9661090706a65f63b4845dc2884a20711a8024ad4af44aeec9db33991dae38d95cdb7132970d0d4dec58b9d46d378", 0xa3, 0x6}, {&(0x7f0000000380)="05f82c760d277896dd8c9891a41aafe24124891a32a238c3c78696d112aa09f3ae5c54b0c08676da5db7f358c72dfaca9a5d90860b4ae363c9a921c47965d339c23408a6d9b31a23aee27822f0a140d8e4ec9475a740113f2b9923b46333110e528e0a513151aad34aee1b5310fcf62c1982349253003d6d53aebbe09cf5918668ee682be93b6a671bbc", 0x8a, 0x3}], 0x2000400, &(0x7f0000000440)={[{@balloc_no_unhash_reloc}, {@nolargeio}, {@grpjquota}], [{@obj_role={'obj_role', 0x3d, '^'}}, {@hash}, {@uid_lt}, {@mask={'mask', 0x3d, 'MAY_EXEC'}}, {@uid_lt={'uid<', 0xee00}}, {@smackfsfloor={'smackfsfloor', 0x3d, ':%#[@'}}, {@obj_user={'obj_user', 0x3d, ',\\*),i'}}, {@uid_eq={'uid', 0x3d, 0xee00}}, {@seclabel}, {@uid_lt={'uid<', 0xee00}}]})

06:19:00 executing program 3:
r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0)
mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800004, 0x12, r0, 0x0)
preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x9, 0x0)
mmap(&(0x7f0000000000/0xa000)=nil, 0xa000, 0x2, 0x2172, 0xffffffffffffffff, 0x0)
r1 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x11, 0x3, &(0x7f00000000c0)=@framed, &(0x7f00000001c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x74)
bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={0x0, r1}, 0x10)
r2 = socket$unix(0x1, 0x1, 0x0)
bind$unix(r2, &(0x7f00000001c0)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x56)

06:19:00 executing program 1:
r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0)
mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800004, 0x12, r0, 0x0)
preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x9, 0x0)
mmap(&(0x7f0000000000/0xa000)=nil, 0xa000, 0x2, 0x2172, 0xffffffffffffffff, 0x0)
socketpair(0x1e, 0x80005, 0x0, &(0x7f0000000340)={0x0, 0x0})
r1 = socket$unix(0x1, 0x1, 0x0)
bind$unix(r1, &(0x7f00000001c0)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x56)
close(r1)

06:19:00 executing program 2:
r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0)
mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x0, 0x12, r0, 0x0)
preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x9, 0x0)
mmap(&(0x7f0000000000/0xa000)=nil, 0xa000, 0x2, 0x2172, 0xffffffffffffffff, 0x0)
syz_mount_image$reiserfs(&(0x7f0000000140), &(0x7f0000000180)='./file0\x00', 0x8000, 0x3, &(0x7f0000000300)=[{&(0x7f0000000540)="21d37ef07e82e237fbe1b40158d20e242c5ea1f9d9edc6b9395250085d6dfa486982e82d4ce1a5e2bc00d29383bae640de", 0x31, 0x7}, {&(0x7f0000000240)="c43f281f483aa6cd83e40e59d53f177299d285bbe5d90aab2b56a76f9db49d86afa5a0f601ba9b3502de5f3724f3ec00927151f928f668b362052950a2e8f16baec29875fdad59395e86a1050c368933e3ed5a17d76bd7bded793436ea207885f395ace3fc12126c205b170be392c1645233ef01f9661090706a65f63b4845dc2884a20711a8024ad4af44aeec9db33991dae38d95cdb7132970d0d4dec58b9d46d378", 0xa3, 0x6}, {&(0x7f0000000380)="05f82c760d277896dd8c9891a41aafe24124891a32a238c3c78696d112aa09f3ae5c54b0c08676da5db7f358c72dfaca9a5d90860b4ae363c9a921c47965d339c23408a6d9b31a23aee27822f0a140d8e4ec9475a740113f2b9923b46333110e528e0a513151aad34aee1b5310fcf62c1982349253003d6d53aebbe09cf5918668ee682be93b6a671bbc", 0x8a, 0x3}], 0x2000400, &(0x7f0000000440)={[{@balloc_no_unhash_reloc}, {@nolargeio}, {@grpjquota}], [{@obj_role={'obj_role', 0x3d, '^'}}, {@hash}, {@uid_lt}, {@mask={'mask', 0x3d, 'MAY_EXEC'}}, {@uid_lt={'uid<', 0xee00}}, {@smackfsfloor={'smackfsfloor', 0x3d, ':%#[@'}}, {@obj_user={'obj_user', 0x3d, ',\\*),i'}}, {@uid_eq={'uid', 0x3d, 0xee00}}, {@seclabel}, {@uid_lt={'uid<', 0xee00}}]})

[  342.660421][T15620] loop0: detected capacity change from 0 to 64
[  342.687353][T15620] REISERFS warning (device loop0): super-6504 reiserfs_getopt: the option "nolargeio" requires an argument
[  342.687353][T15620] 
06:19:00 executing program 3:
r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0)
mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800004, 0x12, r0, 0x0)
preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x9, 0x0)
mmap(&(0x7f0000000000/0xa000)=nil, 0xa000, 0x2, 0x2172, 0xffffffffffffffff, 0x0)
r1 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x11, 0x3, &(0x7f00000000c0)=@framed, &(0x7f00000001c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x74)
bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={0x0, r1}, 0x10)
r2 = socket$unix(0x1, 0x1, 0x0)
bind$unix(r2, &(0x7f00000001c0)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x56)

06:19:00 executing program 1:
r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0)
mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800004, 0x12, r0, 0x0)
preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x9, 0x0)
mmap(&(0x7f0000000000/0xa000)=nil, 0xa000, 0x2, 0x2172, 0xffffffffffffffff, 0x0)
socketpair(0x1e, 0x80005, 0x0, &(0x7f0000000340)={0x0, 0x0})
r1 = socket$unix(0x1, 0x1, 0x0)
close(r1)

[  342.758273][T15627] loop2: detected capacity change from 0 to 64
06:19:00 executing program 3:
r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0)
mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800004, 0x12, r0, 0x0)
preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x9, 0x0)
mmap(&(0x7f0000000000/0xa000)=nil, 0xa000, 0x2, 0x2172, 0xffffffffffffffff, 0x0)
bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x11, 0x3, &(0x7f00000000c0)=@framed, &(0x7f00000001c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x74)
bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='ext4_es_lookup_extent_exit\x00'}, 0x10)
r1 = socket$unix(0x1, 0x1, 0x0)
bind$unix(r1, &(0x7f00000001c0)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x56)

[  342.805107][T15627] REISERFS warning (device loop2): super-6504 reiserfs_getopt: the option "nolargeio" requires an argument
[  342.805107][T15627] 
06:19:00 executing program 0:
r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0)
mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x0, 0x12, r0, 0x0)
preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x9, 0x0)
mmap(&(0x7f0000000000/0xa000)=nil, 0xa000, 0x2, 0x2172, 0xffffffffffffffff, 0x0)
syz_mount_image$reiserfs(&(0x7f0000000140), &(0x7f0000000180)='./file0\x00', 0x8000, 0x3, &(0x7f0000000300)=[{&(0x7f0000000540)="21d37ef07e82e237fbe1b40158d20e242c5ea1f9d9edc6b9395250085d6dfa486982e82d4ce1a5e2bc00d29383bae640de", 0x31, 0x7}, {&(0x7f0000000240)="c43f281f483aa6cd83e40e59d53f177299d285bbe5d90aab2b56a76f9db49d86afa5a0f601ba9b3502de5f3724f3ec00927151f928f668b362052950a2e8f16baec29875fdad59395e86a1050c368933e3ed5a17d76bd7bded793436ea207885f395ace3fc12126c205b170be392c1645233ef01f9661090706a65f63b4845dc2884a20711a8024ad4af44aeec9db33991dae38d95cdb7132970d0d4dec58b9d46d378", 0xa3, 0x6}, {&(0x7f0000000380)="05f82c760d277896dd8c9891a41aafe24124891a32a238c3c78696d112aa09f3ae5c54b0c08676da5db7f358c72dfaca9a5d90860b4ae363c9a921c47965d339c23408a6d9b31a23aee27822f0a140d8e4ec9475a740113f2b9923b46333110e528e0a513151aad34aee1b5310fcf62c1982349253003d6d53aebbe09cf5918668ee682be93b6a671bbc", 0x8a, 0x3}], 0x2000400, &(0x7f0000000440)={[{@balloc_no_unhash_reloc}, {@nolargeio}, {@grpjquota}], [{@obj_role={'obj_role', 0x3d, '^'}}, {@hash}, {@uid_lt}, {@mask={'mask', 0x3d, 'MAY_EXEC'}}, {@uid_lt={'uid<', 0xee00}}, {@smackfsfloor={'smackfsfloor', 0x3d, ':%#[@'}}, {@obj_user={'obj_user', 0x3d, ',\\*),i'}}, {@uid_eq={'uid', 0x3d, 0xee00}}, {@seclabel}, {@uid_lt={'uid<', 0xee00}}]})

06:19:00 executing program 1:
r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0)
mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800004, 0x12, r0, 0x0)
preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x9, 0x0)
mmap(&(0x7f0000000000/0xa000)=nil, 0xa000, 0x2, 0x2172, 0xffffffffffffffff, 0x0)
socketpair(0x1e, 0x80005, 0x0, &(0x7f0000000340)={0x0, 0x0})
r1 = socket$unix(0x1, 0x1, 0x0)
close(r1)

06:19:00 executing program 3:
r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0)
mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800004, 0x12, r0, 0x0)
preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x9, 0x0)
mmap(&(0x7f0000000000/0xa000)=nil, 0xa000, 0x2, 0x2172, 0xffffffffffffffff, 0x0)
bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x11, 0x3, &(0x7f00000000c0)=@framed, &(0x7f00000001c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x74)
bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='ext4_es_lookup_extent_exit\x00'}, 0x10)
r1 = socket$unix(0x1, 0x1, 0x0)
bind$unix(r1, &(0x7f00000001c0)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x56)

[  342.886228][T15640] loop0: detected capacity change from 0 to 64
[  342.900994][T15640] REISERFS warning (device loop0): super-6504 reiserfs_getopt: the option "nolargeio" requires an argument
[  342.900994][T15640] 
06:19:00 executing program 1:
r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0)
mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800004, 0x12, r0, 0x0)
preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x9, 0x0)
mmap(&(0x7f0000000000/0xa000)=nil, 0xa000, 0x2, 0x2172, 0xffffffffffffffff, 0x0)
socketpair(0x1e, 0x80005, 0x0, &(0x7f0000000340)={0x0, 0x0})
r1 = socket$unix(0x1, 0x1, 0x0)
close(r1)

06:19:00 executing program 2:
r0 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000680), 0xffffffffffffffff)
ioctl$sock_SIOCGIFINDEX_80211(0xffffffffffffffff, 0x8933, &(0x7f0000000c00)={'wlan1\x00'})
r1 = socket$nl_generic(0x10, 0x3, 0x10)
ioctl$sock_SIOCGIFINDEX_80211(r1, 0x8933, &(0x7f0000000e40)={'wlan0\x00', <r2=>0x0})
sendmsg$NL80211_CMD_TRIGGER_SCAN(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000f40)={&(0x7f0000000000)=ANY=[@ANYBLOB='$\x00\x00\x00', @ANYRES16=r0, @ANYBLOB="010000000000000000002100000008000300", @ANYRES32=r2, @ANYBLOB="08009e"], 0x24}}, 0x0)
sendmsg$NL80211_CMD_FRAME(0xffffffffffffffff, &(0x7f0000000100)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f00000000c0)={&(0x7f0000000c40)=ANY=[@ANYBLOB="2000000059c89a20a00fadf00ada0277887124d85c2b6f27e866a2f2434f0213672fd63827c4c50f5346d89412d5351da4a233d419db04d5f089f764866116182e7757ccfd", @ANYRES16=r0, @ANYBLOB="00022dbd7000fedbdf253b0000000c0099007f000000470000000c00cd001f000400070000ff04008e00"], 0x30}, 0x1, 0x0, 0x0, 0x44}, 0x40000)
r3 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0)
mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800004, 0x12, r3, 0x0)
preadv(r3, &(0x7f00000001c0)=[{0x0}], 0x1, 0x9, 0x0)
mmap(&(0x7f0000000000/0xa000)=nil, 0xa000, 0x2, 0x2172, 0xffffffffffffffff, 0x0)
r4 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000180), 0xffffffffffffffff)
ioctl$sock_SIOCGIFINDEX_80211(r3, 0x8933, &(0x7f0000000200)={'wlan0\x00', <r5=>0x0})
sendmsg$NL80211_CMD_REGISTER_FRAME(r3, &(0x7f0000000300)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x2000}, 0xc, &(0x7f00000002c0)={&(0x7f0000000240)={0x60, r4, 0x100, 0x70bd29, 0x25dfdbfc, {{}, {@val={0x8, 0x3, r5}, @val={0xc, 0x99, {0x9de00000, 0x6b}}}}, [@NL80211_ATTR_FRAME_TYPE={0x6}, @NL80211_ATTR_FRAME_TYPE={0x6, 0x65, 0x7f}, @NL80211_ATTR_FRAME_TYPE={0x6, 0x65, 0x8}, @NL80211_ATTR_FRAME_TYPE={0x6}, @NL80211_ATTR_FRAME_TYPE={0x6, 0x65, 0xc0}, @NL80211_ATTR_FRAME_TYPE={0x6, 0x65, 0x2e30}, @NL80211_ATTR_FRAME_TYPE={0x6, 0x65, 0x6}]}, 0x60}, 0x1, 0x0, 0x0, 0x10}, 0x4)
r6 = syz_open_dev$tty1(0xc, 0x4, 0x1)
write$binfmt_elf64(r6, &(0x7f0000000380)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x80, 0x1, 0x9, 0x1, 0x2, 0x3e, 0x7ff, 0x1f2, 0x40, 0x1f4, 0xbfa, 0x3, 0x38, 0x1, 0x5, 0x4, 0x4}, [{0x5, 0x9, 0x6, 0x101, 0x6, 0x4, 0x9, 0x6}, {0x5, 0x3, 0x5e61, 0x80000000, 0xcc3, 0x9, 0x7, 0x8}], "d1660f10e0ac4a6edbf3aa53803c8f57ef2a12069e82553332d2b96d67f2dbc5b04959dad57c303d876233684f5e9ad402a193da791e11122f2cccbf10d6d499f5e16385d09f63891a965d80bcb68b551fabffb4bf0b5c372b4d69cdefac988201a40429a8d0dc699820193afcab08070fde89c22e16b43dde5e37d9a3df0cd352e8667f163774d9dc3c79571e5100046281", ['\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00']}, 0x842)
socketpair(0x1e, 0x80005, 0x0, &(0x7f0000000340)={0x0, 0x0})

06:19:00 executing program 3:
r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0)
mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800004, 0x12, r0, 0x0)
preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x9, 0x0)
mmap(&(0x7f0000000000/0xa000)=nil, 0xa000, 0x2, 0x2172, 0xffffffffffffffff, 0x0)
bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x11, 0x3, &(0x7f00000000c0)=@framed, &(0x7f00000001c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x74)
bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='ext4_es_lookup_extent_exit\x00'}, 0x10)
r1 = socket$unix(0x1, 0x1, 0x0)
bind$unix(r1, &(0x7f00000001c0)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x56)

06:19:00 executing program 1:
r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0)
mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800004, 0x12, r0, 0x0)
preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x9, 0x0)
mmap(&(0x7f0000000000/0xa000)=nil, 0xa000, 0x2, 0x2172, 0xffffffffffffffff, 0x0)
socketpair(0x1e, 0x80005, 0x0, &(0x7f0000000340)={0x0, 0x0})
bind$unix(0xffffffffffffffff, &(0x7f00000001c0)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x56)
close(0xffffffffffffffff)

06:19:00 executing program 0:
r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0)
mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800004, 0x10, r0, 0x0)
preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x9, 0x0)
mmap(&(0x7f0000000000/0xa000)=nil, 0xa000, 0x2, 0x2172, 0xffffffffffffffff, 0x0)
syz_mount_image$reiserfs(&(0x7f0000000140), &(0x7f0000000180)='./file0\x00', 0x8000, 0x3, &(0x7f0000000300)=[{&(0x7f0000000540)="21d37ef07e82e237fbe1b40158d20e242c5ea1f9d9edc6b9395250085d6dfa486982e82d4ce1a5e2bc00d29383bae640de", 0x31, 0x7}, {&(0x7f0000000240)="c43f281f483aa6cd83e40e59d53f177299d285bbe5d90aab2b56a76f9db49d86afa5a0f601ba9b3502de5f3724f3ec00927151f928f668b362052950a2e8f16baec29875fdad59395e86a1050c368933e3ed5a17d76bd7bded793436ea207885f395ace3fc12126c205b170be392c1645233ef01f9661090706a65f63b4845dc2884a20711a8024ad4af44aeec9db33991dae38d95cdb7132970d0d4dec58b9d46d378", 0xa3, 0x6}, {&(0x7f0000000380)="05f82c760d277896dd8c9891a41aafe24124891a32a238c3c78696d112aa09f3ae5c54b0c08676da5db7f358c72dfaca9a5d90860b4ae363c9a921c47965d339c23408a6d9b31a23aee27822f0a140d8e4ec9475a740113f2b9923b46333110e528e0a513151aad34aee1b5310fcf62c1982349253003d6d53aebbe09cf5918668ee682be93b6a671bbc", 0x8a, 0x3}], 0x2000400, &(0x7f0000000440)={[{@balloc_no_unhash_reloc}, {@nolargeio}, {@grpjquota}], [{@obj_role={'obj_role', 0x3d, '^'}}, {@hash}, {@uid_lt}, {@mask={'mask', 0x3d, 'MAY_EXEC'}}, {@uid_lt={'uid<', 0xee00}}, {@smackfsfloor={'smackfsfloor', 0x3d, ':%#[@'}}, {@obj_user={'obj_user', 0x3d, ',\\*),i'}}, {@uid_eq={'uid', 0x3d, 0xee00}}, {@seclabel}, {@uid_lt={'uid<', 0xee00}}]})

06:19:00 executing program 3:
r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0)
mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800004, 0x12, r0, 0x0)
preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x9, 0x0)
mmap(&(0x7f0000000000/0xa000)=nil, 0xa000, 0x2, 0x2172, 0xffffffffffffffff, 0x0)
r1 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x11, 0x3, &(0x7f00000000c0)=@framed, &(0x7f00000001c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x74)
bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='ext4_es_lookup_extent_exit\x00', r1}, 0x10)
r2 = socket$unix(0x1, 0x0, 0x0)
bind$unix(r2, &(0x7f00000001c0)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x56)

06:19:00 executing program 1:
r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0)
mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800004, 0x12, r0, 0x0)
preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x9, 0x0)
mmap(&(0x7f0000000000/0xa000)=nil, 0xa000, 0x2, 0x2172, 0xffffffffffffffff, 0x0)
socketpair(0x1e, 0x80005, 0x0, &(0x7f0000000340)={0x0, 0x0})
bind$unix(0xffffffffffffffff, &(0x7f00000001c0)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x56)
close(0xffffffffffffffff)

[  343.108029][T15664] loop0: detected capacity change from 0 to 64
06:19:00 executing program 3:
r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0)
mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800004, 0x12, r0, 0x0)
preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x9, 0x0)
mmap(&(0x7f0000000000/0xa000)=nil, 0xa000, 0x2, 0x2172, 0xffffffffffffffff, 0x0)
r1 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x11, 0x3, &(0x7f00000000c0)=@framed, &(0x7f00000001c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x74)
bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='ext4_es_lookup_extent_exit\x00', r1}, 0x10)
r2 = socket$unix(0x1, 0x0, 0x0)
bind$unix(r2, &(0x7f00000001c0)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x56)

06:19:00 executing program 1:
r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0)
mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800004, 0x12, r0, 0x0)
preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x9, 0x0)
mmap(&(0x7f0000000000/0xa000)=nil, 0xa000, 0x2, 0x2172, 0xffffffffffffffff, 0x0)
socketpair(0x1e, 0x80005, 0x0, &(0x7f0000000340)={0x0, 0x0})
bind$unix(0xffffffffffffffff, &(0x7f00000001c0)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x56)
close(0xffffffffffffffff)

[  343.176831][T15664] REISERFS warning (device loop0): super-6504 reiserfs_getopt: the option "nolargeio" requires an argument
[  343.176831][T15664] 
06:19:01 executing program 2:
r0 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000680), 0xffffffffffffffff)
ioctl$sock_SIOCGIFINDEX_80211(0xffffffffffffffff, 0x8933, &(0x7f0000000c00)={'wlan1\x00'})
r1 = socket$nl_generic(0x10, 0x3, 0x10)
ioctl$sock_SIOCGIFINDEX_80211(r1, 0x8933, &(0x7f0000000e40)={'wlan0\x00', <r2=>0x0})
sendmsg$NL80211_CMD_TRIGGER_SCAN(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000f40)={&(0x7f0000000000)=ANY=[@ANYBLOB='$\x00\x00\x00', @ANYRES16=r0, @ANYBLOB="010000000000000000002100000008000300", @ANYRES32=r2, @ANYBLOB="08009e"], 0x24}}, 0x0)
sendmsg$NL80211_CMD_FRAME(0xffffffffffffffff, &(0x7f0000000100)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f00000000c0)={&(0x7f0000000c40)=ANY=[@ANYBLOB="2000000059c89a20a00fadf00ada0277887124d85c2b6f27e866a2f2434f0213672fd63827c4c50f5346d89412d5351da4a233d419db04d5f089f764866116182e7757ccfd", @ANYRES16=r0, @ANYBLOB="00022dbd7000fedbdf253b0000000c0099007f000000470000000c00cd001f000400070000ff04008e00"], 0x30}, 0x1, 0x0, 0x0, 0x44}, 0x40000)
r3 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0)
mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800004, 0x12, r3, 0x0)
preadv(r3, &(0x7f00000001c0)=[{0x0}], 0x1, 0x9, 0x0)
mmap(&(0x7f0000000000/0xa000)=nil, 0xa000, 0x2, 0x2172, 0xffffffffffffffff, 0x0)
r4 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000180), 0xffffffffffffffff)
ioctl$sock_SIOCGIFINDEX_80211(r3, 0x8933, &(0x7f0000000200)={'wlan0\x00', <r5=>0x0})
sendmsg$NL80211_CMD_REGISTER_FRAME(r3, &(0x7f0000000300)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x2000}, 0xc, &(0x7f00000002c0)={&(0x7f0000000240)={0x60, r4, 0x100, 0x70bd29, 0x25dfdbfc, {{}, {@val={0x8, 0x3, r5}, @val={0xc, 0x99, {0x9de00000, 0x6b}}}}, [@NL80211_ATTR_FRAME_TYPE={0x6}, @NL80211_ATTR_FRAME_TYPE={0x6, 0x65, 0x7f}, @NL80211_ATTR_FRAME_TYPE={0x6, 0x65, 0x8}, @NL80211_ATTR_FRAME_TYPE={0x6}, @NL80211_ATTR_FRAME_TYPE={0x6, 0x65, 0xc0}, @NL80211_ATTR_FRAME_TYPE={0x6, 0x65, 0x2e30}, @NL80211_ATTR_FRAME_TYPE={0x6, 0x65, 0x6}]}, 0x60}, 0x1, 0x0, 0x0, 0x10}, 0x4)
r6 = syz_open_dev$tty1(0xc, 0x4, 0x1)
write$binfmt_elf64(r6, &(0x7f0000000380)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x80, 0x1, 0x9, 0x1, 0x2, 0x3e, 0x7ff, 0x1f2, 0x40, 0x1f4, 0xbfa, 0x3, 0x38, 0x1, 0x5, 0x4, 0x4}, [{0x5, 0x9, 0x6, 0x101, 0x6, 0x4, 0x9, 0x6}, {0x5, 0x3, 0x5e61, 0x80000000, 0xcc3, 0x9, 0x7, 0x8}], "d1660f10e0ac4a6edbf3aa53803c8f57ef2a12069e82553332d2b96d67f2dbc5b04959dad57c303d876233684f5e9ad402a193da791e11122f2cccbf10d6d499f5e16385d09f63891a965d80bcb68b551fabffb4bf0b5c372b4d69cdefac988201a40429a8d0dc699820193afcab08070fde89c22e16b43dde5e37d9a3df0cd352e8667f163774d9dc3c79571e5100046281", ['\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00']}, 0x842)
socketpair(0x1e, 0x80005, 0x0, &(0x7f0000000340)={0x0, 0x0})

06:19:01 executing program 3:
r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0)
mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800004, 0x12, r0, 0x0)
preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x9, 0x0)
mmap(&(0x7f0000000000/0xa000)=nil, 0xa000, 0x2, 0x2172, 0xffffffffffffffff, 0x0)
r1 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x11, 0x3, &(0x7f00000000c0)=@framed, &(0x7f00000001c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x74)
bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='ext4_es_lookup_extent_exit\x00', r1}, 0x10)
r2 = socket$unix(0x1, 0x0, 0x0)
bind$unix(r2, &(0x7f00000001c0)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x56)

06:19:01 executing program 1:
r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0)
mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800004, 0x12, r0, 0x0)
preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x9, 0x0)
mmap(&(0x7f0000000000/0xa000)=nil, 0xa000, 0x2, 0x2172, 0xffffffffffffffff, 0x0)
r1 = socket$unix(0x1, 0x1, 0x0)
bind$unix(r1, &(0x7f00000001c0)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x56)
close(r1)

06:19:01 executing program 0:
r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0)
mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800004, 0x10, r0, 0x0)
preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x9, 0x0)
mmap(&(0x7f0000000000/0xa000)=nil, 0xa000, 0x2, 0x2172, 0xffffffffffffffff, 0x0)
syz_mount_image$reiserfs(&(0x7f0000000140), &(0x7f0000000180)='./file0\x00', 0x8000, 0x3, &(0x7f0000000300)=[{&(0x7f0000000540)="21d37ef07e82e237fbe1b40158d20e242c5ea1f9d9edc6b9395250085d6dfa486982e82d4ce1a5e2bc00d29383bae640de", 0x31, 0x7}, {&(0x7f0000000240)="c43f281f483aa6cd83e40e59d53f177299d285bbe5d90aab2b56a76f9db49d86afa5a0f601ba9b3502de5f3724f3ec00927151f928f668b362052950a2e8f16baec29875fdad59395e86a1050c368933e3ed5a17d76bd7bded793436ea207885f395ace3fc12126c205b170be392c1645233ef01f9661090706a65f63b4845dc2884a20711a8024ad4af44aeec9db33991dae38d95cdb7132970d0d4dec58b9d46d378", 0xa3, 0x6}, {&(0x7f0000000380)="05f82c760d277896dd8c9891a41aafe24124891a32a238c3c78696d112aa09f3ae5c54b0c08676da5db7f358c72dfaca9a5d90860b4ae363c9a921c47965d339c23408a6d9b31a23aee27822f0a140d8e4ec9475a740113f2b9923b46333110e528e0a513151aad34aee1b5310fcf62c1982349253003d6d53aebbe09cf5918668ee682be93b6a671bbc", 0x8a, 0x3}], 0x2000400, &(0x7f0000000440)={[{@balloc_no_unhash_reloc}, {@nolargeio}, {@grpjquota}], [{@obj_role={'obj_role', 0x3d, '^'}}, {@hash}, {@uid_lt}, {@mask={'mask', 0x3d, 'MAY_EXEC'}}, {@uid_lt={'uid<', 0xee00}}, {@smackfsfloor={'smackfsfloor', 0x3d, ':%#[@'}}, {@obj_user={'obj_user', 0x3d, ',\\*),i'}}, {@uid_eq={'uid', 0x3d, 0xee00}}, {@seclabel}, {@uid_lt={'uid<', 0xee00}}]})

[  343.899929][T15681] loop0: detected capacity change from 0 to 64
06:19:01 executing program 3:
r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0)
mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800004, 0x12, r0, 0x0)
preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x9, 0x0)
mmap(&(0x7f0000000000/0xa000)=nil, 0xa000, 0x2, 0x2172, 0xffffffffffffffff, 0x0)
r1 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x11, 0x3, &(0x7f00000000c0)=@framed, &(0x7f00000001c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x74)
bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='ext4_es_lookup_extent_exit\x00', r1}, 0x10)
socket$unix(0x1, 0x1, 0x0)
bind$unix(0xffffffffffffffff, &(0x7f00000001c0)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x56)

[  343.955085][T15681] REISERFS warning (device loop0): super-6504 reiserfs_getopt: the option "nolargeio" requires an argument
[  343.955085][T15681] 
06:19:01 executing program 1:
r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0)
mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800004, 0x12, r0, 0x0)
preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x9, 0x0)
r1 = socket$unix(0x1, 0x1, 0x0)
bind$unix(r1, &(0x7f00000001c0)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x56)
close(r1)

06:19:01 executing program 0:
r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0)
mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800004, 0x10, r0, 0x0)
preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x9, 0x0)
mmap(&(0x7f0000000000/0xa000)=nil, 0xa000, 0x2, 0x2172, 0xffffffffffffffff, 0x0)
syz_mount_image$reiserfs(&(0x7f0000000140), &(0x7f0000000180)='./file0\x00', 0x8000, 0x3, &(0x7f0000000300)=[{&(0x7f0000000540)="21d37ef07e82e237fbe1b40158d20e242c5ea1f9d9edc6b9395250085d6dfa486982e82d4ce1a5e2bc00d29383bae640de", 0x31, 0x7}, {&(0x7f0000000240)="c43f281f483aa6cd83e40e59d53f177299d285bbe5d90aab2b56a76f9db49d86afa5a0f601ba9b3502de5f3724f3ec00927151f928f668b362052950a2e8f16baec29875fdad59395e86a1050c368933e3ed5a17d76bd7bded793436ea207885f395ace3fc12126c205b170be392c1645233ef01f9661090706a65f63b4845dc2884a20711a8024ad4af44aeec9db33991dae38d95cdb7132970d0d4dec58b9d46d378", 0xa3, 0x6}, {&(0x7f0000000380)="05f82c760d277896dd8c9891a41aafe24124891a32a238c3c78696d112aa09f3ae5c54b0c08676da5db7f358c72dfaca9a5d90860b4ae363c9a921c47965d339c23408a6d9b31a23aee27822f0a140d8e4ec9475a740113f2b9923b46333110e528e0a513151aad34aee1b5310fcf62c1982349253003d6d53aebbe09cf5918668ee682be93b6a671bbc", 0x8a, 0x3}], 0x2000400, &(0x7f0000000440)={[{@balloc_no_unhash_reloc}, {@nolargeio}, {@grpjquota}], [{@obj_role={'obj_role', 0x3d, '^'}}, {@hash}, {@uid_lt}, {@mask={'mask', 0x3d, 'MAY_EXEC'}}, {@uid_lt={'uid<', 0xee00}}, {@smackfsfloor={'smackfsfloor', 0x3d, ':%#[@'}}, {@obj_user={'obj_user', 0x3d, ',\\*),i'}}, {@uid_eq={'uid', 0x3d, 0xee00}}, {@seclabel}, {@uid_lt={'uid<', 0xee00}}]})

06:19:01 executing program 3:
r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0)
mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800004, 0x12, r0, 0x0)
preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x9, 0x0)
mmap(&(0x7f0000000000/0xa000)=nil, 0xa000, 0x2, 0x2172, 0xffffffffffffffff, 0x0)
r1 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x11, 0x3, &(0x7f00000000c0)=@framed, &(0x7f00000001c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x74)
bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='ext4_es_lookup_extent_exit\x00', r1}, 0x10)
socket$unix(0x1, 0x1, 0x0)
bind$unix(0xffffffffffffffff, &(0x7f00000001c0)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x56)

[  344.101215][T15697] loop0: detected capacity change from 0 to 64
[  344.128770][T15697] REISERFS warning (device loop0): super-6504 reiserfs_getopt: the option "nolargeio" requires an argument
[  344.128770][T15697] 
06:19:02 executing program 2:
r0 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000680), 0xffffffffffffffff)
ioctl$sock_SIOCGIFINDEX_80211(0xffffffffffffffff, 0x8933, &(0x7f0000000c00)={'wlan1\x00'})
r1 = socket$nl_generic(0x10, 0x3, 0x10)
ioctl$sock_SIOCGIFINDEX_80211(r1, 0x8933, &(0x7f0000000e40)={'wlan0\x00', <r2=>0x0})
sendmsg$NL80211_CMD_TRIGGER_SCAN(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000f40)={&(0x7f0000000000)=ANY=[@ANYBLOB='$\x00\x00\x00', @ANYRES16=r0, @ANYBLOB="010000000000000000002100000008000300", @ANYRES32=r2, @ANYBLOB="08009e"], 0x24}}, 0x0)
sendmsg$NL80211_CMD_FRAME(0xffffffffffffffff, &(0x7f0000000100)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f00000000c0)={&(0x7f0000000c40)=ANY=[@ANYBLOB="2000000059c89a20a00fadf00ada0277887124d85c2b6f27e866a2f2434f0213672fd63827c4c50f5346d89412d5351da4a233d419db04d5f089f764866116182e7757ccfd", @ANYRES16=r0, @ANYBLOB="00022dbd7000fedbdf253b0000000c0099007f000000470000000c00cd001f000400070000ff04008e00"], 0x30}, 0x1, 0x0, 0x0, 0x44}, 0x40000)
r3 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0)
mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800004, 0x12, r3, 0x0)
preadv(r3, &(0x7f00000001c0)=[{0x0}], 0x1, 0x9, 0x0)
mmap(&(0x7f0000000000/0xa000)=nil, 0xa000, 0x2, 0x2172, 0xffffffffffffffff, 0x0)
r4 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000180), 0xffffffffffffffff)
ioctl$sock_SIOCGIFINDEX_80211(r3, 0x8933, &(0x7f0000000200)={'wlan0\x00', <r5=>0x0})
sendmsg$NL80211_CMD_REGISTER_FRAME(r3, &(0x7f0000000300)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x2000}, 0xc, &(0x7f00000002c0)={&(0x7f0000000240)={0x60, r4, 0x100, 0x70bd29, 0x25dfdbfc, {{}, {@val={0x8, 0x3, r5}, @val={0xc, 0x99, {0x9de00000, 0x6b}}}}, [@NL80211_ATTR_FRAME_TYPE={0x6}, @NL80211_ATTR_FRAME_TYPE={0x6, 0x65, 0x7f}, @NL80211_ATTR_FRAME_TYPE={0x6, 0x65, 0x8}, @NL80211_ATTR_FRAME_TYPE={0x6}, @NL80211_ATTR_FRAME_TYPE={0x6, 0x65, 0xc0}, @NL80211_ATTR_FRAME_TYPE={0x6, 0x65, 0x2e30}, @NL80211_ATTR_FRAME_TYPE={0x6, 0x65, 0x6}]}, 0x60}, 0x1, 0x0, 0x0, 0x10}, 0x4)
r6 = syz_open_dev$tty1(0xc, 0x4, 0x1)
write$binfmt_elf64(r6, &(0x7f0000000380)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x80, 0x1, 0x9, 0x1, 0x2, 0x3e, 0x7ff, 0x1f2, 0x40, 0x1f4, 0xbfa, 0x3, 0x38, 0x1, 0x5, 0x4, 0x4}, [{0x5, 0x9, 0x6, 0x101, 0x6, 0x4, 0x9, 0x6}, {0x5, 0x3, 0x5e61, 0x80000000, 0xcc3, 0x9, 0x7, 0x8}], "d1660f10e0ac4a6edbf3aa53803c8f57ef2a12069e82553332d2b96d67f2dbc5b04959dad57c303d876233684f5e9ad402a193da791e11122f2cccbf10d6d499f5e16385d09f63891a965d80bcb68b551fabffb4bf0b5c372b4d69cdefac988201a40429a8d0dc699820193afcab08070fde89c22e16b43dde5e37d9a3df0cd352e8667f163774d9dc3c79571e5100046281", ['\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00']}, 0x842)
socketpair(0x1e, 0x80005, 0x0, &(0x7f0000000340)={0x0, 0x0})

06:19:02 executing program 1:
r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0)
mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800004, 0x12, r0, 0x0)
preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x9, 0x0)
r1 = socket$unix(0x1, 0x1, 0x0)
bind$unix(r1, &(0x7f00000001c0)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x56)
close(r1)

06:19:02 executing program 3:
r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0)
mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800004, 0x12, r0, 0x0)
preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x9, 0x0)
mmap(&(0x7f0000000000/0xa000)=nil, 0xa000, 0x2, 0x2172, 0xffffffffffffffff, 0x0)
r1 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x11, 0x3, &(0x7f00000000c0)=@framed, &(0x7f00000001c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x74)
bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='ext4_es_lookup_extent_exit\x00', r1}, 0x10)
socket$unix(0x1, 0x1, 0x0)
bind$unix(0xffffffffffffffff, &(0x7f00000001c0)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x56)

06:19:02 executing program 0:
r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0)
mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800004, 0x12, 0xffffffffffffffff, 0x0)
preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x9, 0x0)
mmap(&(0x7f0000000000/0xa000)=nil, 0xa000, 0x2, 0x2172, 0xffffffffffffffff, 0x0)
syz_mount_image$reiserfs(&(0x7f0000000140), &(0x7f0000000180)='./file0\x00', 0x8000, 0x3, &(0x7f0000000300)=[{&(0x7f0000000540)="21d37ef07e82e237fbe1b40158d20e242c5ea1f9d9edc6b9395250085d6dfa486982e82d4ce1a5e2bc00d29383bae640de", 0x31, 0x7}, {&(0x7f0000000240)="c43f281f483aa6cd83e40e59d53f177299d285bbe5d90aab2b56a76f9db49d86afa5a0f601ba9b3502de5f3724f3ec00927151f928f668b362052950a2e8f16baec29875fdad59395e86a1050c368933e3ed5a17d76bd7bded793436ea207885f395ace3fc12126c205b170be392c1645233ef01f9661090706a65f63b4845dc2884a20711a8024ad4af44aeec9db33991dae38d95cdb7132970d0d4dec58b9d46d378", 0xa3, 0x6}, {&(0x7f0000000380)="05f82c760d277896dd8c9891a41aafe24124891a32a238c3c78696d112aa09f3ae5c54b0c08676da5db7f358c72dfaca9a5d90860b4ae363c9a921c47965d339c23408a6d9b31a23aee27822f0a140d8e4ec9475a740113f2b9923b46333110e528e0a513151aad34aee1b5310fcf62c1982349253003d6d53aebbe09cf5918668ee682be93b6a671bbc", 0x8a, 0x3}], 0x2000400, &(0x7f0000000440)={[{@balloc_no_unhash_reloc}, {@nolargeio}, {@grpjquota}], [{@obj_role={'obj_role', 0x3d, '^'}}, {@hash}, {@uid_lt}, {@mask={'mask', 0x3d, 'MAY_EXEC'}}, {@uid_lt={'uid<', 0xee00}}, {@smackfsfloor={'smackfsfloor', 0x3d, ':%#[@'}}, {@obj_user={'obj_user', 0x3d, ',\\*),i'}}, {@uid_eq={'uid', 0x3d, 0xee00}}, {@seclabel}, {@uid_lt={'uid<', 0xee00}}]})

[  344.851661][T15708] loop0: detected capacity change from 0 to 64
06:19:02 executing program 3:
r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0)
mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800004, 0x12, r0, 0x0)
preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x9, 0x0)
mmap(&(0x7f0000000000/0xa000)=nil, 0xa000, 0x2, 0x2172, 0xffffffffffffffff, 0x0)
r1 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x11, 0x3, &(0x7f00000000c0)=@framed, &(0x7f00000001c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x74)
bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='ext4_es_lookup_extent_exit\x00', r1}, 0x10)
r2 = socket$unix(0x1, 0x1, 0x0)
bind$unix(r2, 0x0, 0x0)

06:19:02 executing program 1:
r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0)
mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800004, 0x12, r0, 0x0)
preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x9, 0x0)
r1 = socket$unix(0x1, 0x1, 0x0)
bind$unix(r1, &(0x7f00000001c0)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x56)
close(r1)

[  344.890163][T15708] REISERFS warning (device loop0): super-6504 reiserfs_getopt: the option "nolargeio" requires an argument
[  344.890163][T15708] 
06:19:02 executing program 1:
r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0)
mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800004, 0x12, r0, 0x0)
mmap(&(0x7f0000000000/0xa000)=nil, 0xa000, 0x2, 0x2172, 0xffffffffffffffff, 0x0)
r1 = socket$unix(0x1, 0x1, 0x0)
bind$unix(r1, &(0x7f00000001c0)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x56)
close(r1)

06:19:02 executing program 3:
r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0)
mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800004, 0x12, r0, 0x0)
preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x9, 0x0)
mmap(&(0x7f0000000000/0xa000)=nil, 0xa000, 0x2, 0x2172, 0xffffffffffffffff, 0x0)
r1 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x11, 0x3, &(0x7f00000000c0)=@framed, &(0x7f00000001c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x74)
bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='ext4_es_lookup_extent_exit\x00', r1}, 0x10)
r2 = socket$unix(0x1, 0x1, 0x0)
bind$unix(r2, 0x0, 0x0)

06:19:03 executing program 2:
r0 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000680), 0xffffffffffffffff)
ioctl$sock_SIOCGIFINDEX_80211(0xffffffffffffffff, 0x8933, &(0x7f0000000c00)={'wlan1\x00'})
r1 = socket$nl_generic(0x10, 0x3, 0x10)
ioctl$sock_SIOCGIFINDEX_80211(r1, 0x8933, &(0x7f0000000e40)={'wlan0\x00', <r2=>0x0})
sendmsg$NL80211_CMD_TRIGGER_SCAN(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000f40)={&(0x7f0000000000)=ANY=[@ANYBLOB='$\x00\x00\x00', @ANYRES16=r0, @ANYBLOB="010000000000000000002100000008000300", @ANYRES32=r2, @ANYBLOB="08009e"], 0x24}}, 0x0)
sendmsg$NL80211_CMD_FRAME(0xffffffffffffffff, &(0x7f0000000100)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f00000000c0)={&(0x7f0000000c40)=ANY=[@ANYBLOB="2000000059c89a20a00fadf00ada0277887124d85c2b6f27e866a2f2434f0213672fd63827c4c50f5346d89412d5351da4a233d419db04d5f089f764866116182e7757ccfd", @ANYRES16=r0, @ANYBLOB="00022dbd7000fedbdf253b0000000c0099007f000000470000000c00cd001f000400070000ff04008e00"], 0x30}, 0x1, 0x0, 0x0, 0x44}, 0x40000)
r3 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0)
mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800004, 0x12, r3, 0x0)
preadv(r3, &(0x7f00000001c0)=[{0x0}], 0x1, 0x9, 0x0)
mmap(&(0x7f0000000000/0xa000)=nil, 0xa000, 0x2, 0x2172, 0xffffffffffffffff, 0x0)
r4 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000180), 0xffffffffffffffff)
ioctl$sock_SIOCGIFINDEX_80211(r3, 0x8933, &(0x7f0000000200)={'wlan0\x00', <r5=>0x0})
sendmsg$NL80211_CMD_REGISTER_FRAME(r3, &(0x7f0000000300)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x2000}, 0xc, &(0x7f00000002c0)={&(0x7f0000000240)={0x60, r4, 0x100, 0x70bd29, 0x25dfdbfc, {{}, {@val={0x8, 0x3, r5}, @val={0xc, 0x99, {0x9de00000, 0x6b}}}}, [@NL80211_ATTR_FRAME_TYPE={0x6}, @NL80211_ATTR_FRAME_TYPE={0x6, 0x65, 0x7f}, @NL80211_ATTR_FRAME_TYPE={0x6, 0x65, 0x8}, @NL80211_ATTR_FRAME_TYPE={0x6}, @NL80211_ATTR_FRAME_TYPE={0x6, 0x65, 0xc0}, @NL80211_ATTR_FRAME_TYPE={0x6, 0x65, 0x2e30}, @NL80211_ATTR_FRAME_TYPE={0x6, 0x65, 0x6}]}, 0x60}, 0x1, 0x0, 0x0, 0x10}, 0x4)
r6 = syz_open_dev$tty1(0xc, 0x4, 0x1)
write$binfmt_elf64(r6, &(0x7f0000000380)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x80, 0x1, 0x9, 0x1, 0x2, 0x3e, 0x7ff, 0x1f2, 0x40, 0x1f4, 0xbfa, 0x3, 0x38, 0x1, 0x5, 0x4, 0x4}, [{0x5, 0x9, 0x6, 0x101, 0x6, 0x4, 0x9, 0x6}, {0x5, 0x3, 0x5e61, 0x80000000, 0xcc3, 0x9, 0x7, 0x8}], "d1660f10e0ac4a6edbf3aa53803c8f57ef2a12069e82553332d2b96d67f2dbc5b04959dad57c303d876233684f5e9ad402a193da791e11122f2cccbf10d6d499f5e16385d09f63891a965d80bcb68b551fabffb4bf0b5c372b4d69cdefac988201a40429a8d0dc699820193afcab08070fde89c22e16b43dde5e37d9a3df0cd352e8667f163774d9dc3c79571e5100046281", ['\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00']}, 0x842)

06:19:03 executing program 0:
r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0)
mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800004, 0x12, 0xffffffffffffffff, 0x0)
preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x9, 0x0)
mmap(&(0x7f0000000000/0xa000)=nil, 0xa000, 0x2, 0x2172, 0xffffffffffffffff, 0x0)
syz_mount_image$reiserfs(&(0x7f0000000140), &(0x7f0000000180)='./file0\x00', 0x8000, 0x3, &(0x7f0000000300)=[{&(0x7f0000000540)="21d37ef07e82e237fbe1b40158d20e242c5ea1f9d9edc6b9395250085d6dfa486982e82d4ce1a5e2bc00d29383bae640de", 0x31, 0x7}, {&(0x7f0000000240)="c43f281f483aa6cd83e40e59d53f177299d285bbe5d90aab2b56a76f9db49d86afa5a0f601ba9b3502de5f3724f3ec00927151f928f668b362052950a2e8f16baec29875fdad59395e86a1050c368933e3ed5a17d76bd7bded793436ea207885f395ace3fc12126c205b170be392c1645233ef01f9661090706a65f63b4845dc2884a20711a8024ad4af44aeec9db33991dae38d95cdb7132970d0d4dec58b9d46d378", 0xa3, 0x6}, {&(0x7f0000000380)="05f82c760d277896dd8c9891a41aafe24124891a32a238c3c78696d112aa09f3ae5c54b0c08676da5db7f358c72dfaca9a5d90860b4ae363c9a921c47965d339c23408a6d9b31a23aee27822f0a140d8e4ec9475a740113f2b9923b46333110e528e0a513151aad34aee1b5310fcf62c1982349253003d6d53aebbe09cf5918668ee682be93b6a671bbc", 0x8a, 0x3}], 0x2000400, &(0x7f0000000440)={[{@balloc_no_unhash_reloc}, {@nolargeio}, {@grpjquota}], [{@obj_role={'obj_role', 0x3d, '^'}}, {@hash}, {@uid_lt}, {@mask={'mask', 0x3d, 'MAY_EXEC'}}, {@uid_lt={'uid<', 0xee00}}, {@smackfsfloor={'smackfsfloor', 0x3d, ':%#[@'}}, {@obj_user={'obj_user', 0x3d, ',\\*),i'}}, {@uid_eq={'uid', 0x3d, 0xee00}}, {@seclabel}, {@uid_lt={'uid<', 0xee00}}]})

06:19:03 executing program 1:
r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0)
mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800004, 0x12, r0, 0x0)
mmap(&(0x7f0000000000/0xa000)=nil, 0xa000, 0x2, 0x2172, 0xffffffffffffffff, 0x0)
r1 = socket$unix(0x1, 0x1, 0x0)
bind$unix(r1, &(0x7f00000001c0)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x56)
close(r1)

06:19:03 executing program 3:
r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0)
mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800004, 0x12, r0, 0x0)
preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x9, 0x0)
mmap(&(0x7f0000000000/0xa000)=nil, 0xa000, 0x2, 0x2172, 0xffffffffffffffff, 0x0)
r1 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x11, 0x3, &(0x7f00000000c0)=@framed, &(0x7f00000001c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x74)
bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='ext4_es_lookup_extent_exit\x00', r1}, 0x10)
r2 = socket$unix(0x1, 0x1, 0x0)
bind$unix(r2, 0x0, 0x0)

[  345.766648][T15731] loop0: detected capacity change from 0 to 64
[  345.781182][T15731] REISERFS warning (device loop0): super-6504 reiserfs_getopt: the option "nolargeio" requires an argument
[  345.781182][T15731] 
06:19:03 executing program 1:
r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0)
mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800004, 0x12, r0, 0x0)
mmap(&(0x7f0000000000/0xa000)=nil, 0xa000, 0x2, 0x2172, 0xffffffffffffffff, 0x0)
r1 = socket$unix(0x1, 0x1, 0x0)
bind$unix(r1, &(0x7f00000001c0)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x56)
close(r1)

06:19:03 executing program 3:
r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0)
mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800004, 0x12, r0, 0x0)
preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x9, 0x0)
mmap(&(0x7f0000000000/0xa000)=nil, 0xa000, 0x2, 0x2172, 0xffffffffffffffff, 0x0)
r1 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x11, 0x3, &(0x7f00000000c0)=@framed, &(0x7f00000001c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x74)
bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='ext4_es_lookup_extent_exit\x00', r1}, 0x10)
r2 = socket$unix(0x1, 0x1, 0x0)
bind$unix(r2, &(0x7f00000001c0)=@file={0x0, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x56)

06:19:03 executing program 1:
r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0)
preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x9, 0x0)
mmap(&(0x7f0000000000/0xa000)=nil, 0xa000, 0x2, 0x2172, 0xffffffffffffffff, 0x0)
r1 = socket$unix(0x1, 0x1, 0x0)
bind$unix(r1, &(0x7f00000001c0)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x56)
close(r1)

06:19:03 executing program 0:
r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0)
mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800004, 0x12, 0xffffffffffffffff, 0x0)
preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x9, 0x0)
mmap(&(0x7f0000000000/0xa000)=nil, 0xa000, 0x2, 0x2172, 0xffffffffffffffff, 0x0)
syz_mount_image$reiserfs(&(0x7f0000000140), &(0x7f0000000180)='./file0\x00', 0x8000, 0x3, &(0x7f0000000300)=[{&(0x7f0000000540)="21d37ef07e82e237fbe1b40158d20e242c5ea1f9d9edc6b9395250085d6dfa486982e82d4ce1a5e2bc00d29383bae640de", 0x31, 0x7}, {&(0x7f0000000240)="c43f281f483aa6cd83e40e59d53f177299d285bbe5d90aab2b56a76f9db49d86afa5a0f601ba9b3502de5f3724f3ec00927151f928f668b362052950a2e8f16baec29875fdad59395e86a1050c368933e3ed5a17d76bd7bded793436ea207885f395ace3fc12126c205b170be392c1645233ef01f9661090706a65f63b4845dc2884a20711a8024ad4af44aeec9db33991dae38d95cdb7132970d0d4dec58b9d46d378", 0xa3, 0x6}, {&(0x7f0000000380)="05f82c760d277896dd8c9891a41aafe24124891a32a238c3c78696d112aa09f3ae5c54b0c08676da5db7f358c72dfaca9a5d90860b4ae363c9a921c47965d339c23408a6d9b31a23aee27822f0a140d8e4ec9475a740113f2b9923b46333110e528e0a513151aad34aee1b5310fcf62c1982349253003d6d53aebbe09cf5918668ee682be93b6a671bbc", 0x8a, 0x3}], 0x2000400, &(0x7f0000000440)={[{@balloc_no_unhash_reloc}, {@nolargeio}, {@grpjquota}], [{@obj_role={'obj_role', 0x3d, '^'}}, {@hash}, {@uid_lt}, {@mask={'mask', 0x3d, 'MAY_EXEC'}}, {@uid_lt={'uid<', 0xee00}}, {@smackfsfloor={'smackfsfloor', 0x3d, ':%#[@'}}, {@obj_user={'obj_user', 0x3d, ',\\*),i'}}, {@uid_eq={'uid', 0x3d, 0xee00}}, {@seclabel}, {@uid_lt={'uid<', 0xee00}}]})

[  346.010753][T15747] loop0: detected capacity change from 0 to 64
[  346.040250][T15747] REISERFS warning (device loop0): super-6504 reiserfs_getopt: the option "nolargeio" requires an argument
[  346.040250][T15747] 
06:19:04 executing program 2:
r0 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000680), 0xffffffffffffffff)
ioctl$sock_SIOCGIFINDEX_80211(0xffffffffffffffff, 0x8933, &(0x7f0000000c00)={'wlan1\x00'})
r1 = socket$nl_generic(0x10, 0x3, 0x10)
ioctl$sock_SIOCGIFINDEX_80211(r1, 0x8933, &(0x7f0000000e40)={'wlan0\x00', <r2=>0x0})
sendmsg$NL80211_CMD_TRIGGER_SCAN(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000f40)={&(0x7f0000000000)=ANY=[@ANYBLOB='$\x00\x00\x00', @ANYRES16=r0, @ANYBLOB="010000000000000000002100000008000300", @ANYRES32=r2, @ANYBLOB="08009e"], 0x24}}, 0x0)
sendmsg$NL80211_CMD_FRAME(0xffffffffffffffff, &(0x7f0000000100)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f00000000c0)={&(0x7f0000000c40)=ANY=[@ANYBLOB="2000000059c89a20a00fadf00ada0277887124d85c2b6f27e866a2f2434f0213672fd63827c4c50f5346d89412d5351da4a233d419db04d5f089f764866116182e7757ccfd", @ANYRES16=r0, @ANYBLOB="00022dbd7000fedbdf253b0000000c0099007f000000470000000c00cd001f000400070000ff04008e00"], 0x30}, 0x1, 0x0, 0x0, 0x44}, 0x40000)
r3 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0)
mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800004, 0x12, r3, 0x0)
preadv(r3, &(0x7f00000001c0)=[{0x0}], 0x1, 0x9, 0x0)
mmap(&(0x7f0000000000/0xa000)=nil, 0xa000, 0x2, 0x2172, 0xffffffffffffffff, 0x0)
r4 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000180), 0xffffffffffffffff)
ioctl$sock_SIOCGIFINDEX_80211(r3, 0x8933, &(0x7f0000000200)={'wlan0\x00', <r5=>0x0})
sendmsg$NL80211_CMD_REGISTER_FRAME(r3, &(0x7f0000000300)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x2000}, 0xc, &(0x7f00000002c0)={&(0x7f0000000240)={0x60, r4, 0x100, 0x70bd29, 0x25dfdbfc, {{}, {@val={0x8, 0x3, r5}, @val={0xc, 0x99, {0x9de00000, 0x6b}}}}, [@NL80211_ATTR_FRAME_TYPE={0x6}, @NL80211_ATTR_FRAME_TYPE={0x6, 0x65, 0x7f}, @NL80211_ATTR_FRAME_TYPE={0x6, 0x65, 0x8}, @NL80211_ATTR_FRAME_TYPE={0x6}, @NL80211_ATTR_FRAME_TYPE={0x6, 0x65, 0xc0}, @NL80211_ATTR_FRAME_TYPE={0x6, 0x65, 0x2e30}, @NL80211_ATTR_FRAME_TYPE={0x6, 0x65, 0x6}]}, 0x60}, 0x1, 0x0, 0x0, 0x10}, 0x4)
write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000380)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x80, 0x1, 0x9, 0x1, 0x2, 0x3e, 0x7ff, 0x1f2, 0x40, 0x1f4, 0xbfa, 0x3, 0x38, 0x1, 0x5, 0x4, 0x4}, [{0x5, 0x9, 0x6, 0x101, 0x6, 0x4, 0x9, 0x6}, {0x5, 0x3, 0x5e61, 0x80000000, 0xcc3, 0x9, 0x7, 0x8}], "d1660f10e0ac4a6edbf3aa53803c8f57ef2a12069e82553332d2b96d67f2dbc5b04959dad57c303d876233684f5e9ad402a193da791e11122f2cccbf10d6d499f5e16385d09f63891a965d80bcb68b551fabffb4bf0b5c372b4d69cdefac988201a40429a8d0dc699820193afcab08070fde89c22e16b43dde5e37d9a3df0cd352e8667f163774d9dc3c79571e5100046281", ['\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00']}, 0x842)

06:19:04 executing program 3:
r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0)
mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800004, 0x12, r0, 0x0)
preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x9, 0x0)
mmap(&(0x7f0000000000/0xa000)=nil, 0xa000, 0x2, 0x2172, 0xffffffffffffffff, 0x0)
r1 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x11, 0x3, &(0x7f00000000c0)=@framed, &(0x7f00000001c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x74)
bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='ext4_es_lookup_extent_exit\x00', r1}, 0x10)
r2 = socket$unix(0x1, 0x1, 0x0)
bind$unix(r2, &(0x7f00000001c0)=@file={0x0, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x56)

06:19:04 executing program 1:
r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0)
preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x9, 0x0)
mmap(&(0x7f0000000000/0xa000)=nil, 0xa000, 0x2, 0x2172, 0xffffffffffffffff, 0x0)
r1 = socket$unix(0x1, 0x1, 0x0)
bind$unix(r1, &(0x7f00000001c0)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x56)
close(r1)

06:19:04 executing program 0:
r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0)
mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800004, 0x12, r0, 0x0)
preadv(0xffffffffffffffff, &(0x7f00000001c0)=[{0x0}], 0x1, 0x9, 0x0)
mmap(&(0x7f0000000000/0xa000)=nil, 0xa000, 0x2, 0x2172, 0xffffffffffffffff, 0x0)
syz_mount_image$reiserfs(&(0x7f0000000140), &(0x7f0000000180)='./file0\x00', 0x8000, 0x3, &(0x7f0000000300)=[{&(0x7f0000000540)="21d37ef07e82e237fbe1b40158d20e242c5ea1f9d9edc6b9395250085d6dfa486982e82d4ce1a5e2bc00d29383bae640de", 0x31, 0x7}, {&(0x7f0000000240)="c43f281f483aa6cd83e40e59d53f177299d285bbe5d90aab2b56a76f9db49d86afa5a0f601ba9b3502de5f3724f3ec00927151f928f668b362052950a2e8f16baec29875fdad59395e86a1050c368933e3ed5a17d76bd7bded793436ea207885f395ace3fc12126c205b170be392c1645233ef01f9661090706a65f63b4845dc2884a20711a8024ad4af44aeec9db33991dae38d95cdb7132970d0d4dec58b9d46d378", 0xa3, 0x6}, {&(0x7f0000000380)="05f82c760d277896dd8c9891a41aafe24124891a32a238c3c78696d112aa09f3ae5c54b0c08676da5db7f358c72dfaca9a5d90860b4ae363c9a921c47965d339c23408a6d9b31a23aee27822f0a140d8e4ec9475a740113f2b9923b46333110e528e0a513151aad34aee1b5310fcf62c1982349253003d6d53aebbe09cf5918668ee682be93b6a671bbc", 0x8a, 0x3}], 0x2000400, &(0x7f0000000440)={[{@balloc_no_unhash_reloc}, {@nolargeio}, {@grpjquota}], [{@obj_role={'obj_role', 0x3d, '^'}}, {@hash}, {@uid_lt}, {@mask={'mask', 0x3d, 'MAY_EXEC'}}, {@uid_lt={'uid<', 0xee00}}, {@smackfsfloor={'smackfsfloor', 0x3d, ':%#[@'}}, {@obj_user={'obj_user', 0x3d, ',\\*),i'}}, {@uid_eq={'uid', 0x3d, 0xee00}}, {@seclabel}, {@uid_lt={'uid<', 0xee00}}]})

[  346.685831][T15758] loop0: detected capacity change from 0 to 64
[  346.727768][T15758] REISERFS warning (device loop0): super-6504 reiserfs_getopt: the option "nolargeio" requires an argument
[  346.727768][T15758] 
06:19:04 executing program 2:
r0 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000680), 0xffffffffffffffff)
ioctl$sock_SIOCGIFINDEX_80211(0xffffffffffffffff, 0x8933, &(0x7f0000000c00)={'wlan1\x00'})
r1 = socket$nl_generic(0x10, 0x3, 0x10)
ioctl$sock_SIOCGIFINDEX_80211(r1, 0x8933, &(0x7f0000000e40)={'wlan0\x00', <r2=>0x0})
sendmsg$NL80211_CMD_TRIGGER_SCAN(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000f40)={&(0x7f0000000000)=ANY=[@ANYBLOB='$\x00\x00\x00', @ANYRES16=r0, @ANYBLOB="010000000000000000002100000008000300", @ANYRES32=r2, @ANYBLOB="08009e"], 0x24}}, 0x0)
sendmsg$NL80211_CMD_FRAME(0xffffffffffffffff, &(0x7f0000000100)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f00000000c0)={&(0x7f0000000c40)=ANY=[@ANYBLOB="2000000059c89a20a00fadf00ada0277887124d85c2b6f27e866a2f2434f0213672fd63827c4c50f5346d89412d5351da4a233d419db04d5f089f764866116182e7757ccfd", @ANYRES16=r0, @ANYBLOB="00022dbd7000fedbdf253b0000000c0099007f000000470000000c00cd001f000400070000ff04008e00"], 0x30}, 0x1, 0x0, 0x0, 0x44}, 0x40000)
r3 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0)
mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800004, 0x12, r3, 0x0)
preadv(r3, &(0x7f00000001c0)=[{0x0}], 0x1, 0x9, 0x0)
mmap(&(0x7f0000000000/0xa000)=nil, 0xa000, 0x2, 0x2172, 0xffffffffffffffff, 0x0)
r4 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000180), 0xffffffffffffffff)
ioctl$sock_SIOCGIFINDEX_80211(r3, 0x8933, &(0x7f0000000200)={'wlan0\x00', <r5=>0x0})
sendmsg$NL80211_CMD_REGISTER_FRAME(r3, &(0x7f0000000300)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x2000}, 0xc, &(0x7f00000002c0)={&(0x7f0000000240)={0x60, r4, 0x100, 0x70bd29, 0x25dfdbfc, {{}, {@val={0x8, 0x3, r5}, @val={0xc, 0x99, {0x9de00000, 0x6b}}}}, [@NL80211_ATTR_FRAME_TYPE={0x6}, @NL80211_ATTR_FRAME_TYPE={0x6, 0x65, 0x7f}, @NL80211_ATTR_FRAME_TYPE={0x6, 0x65, 0x8}, @NL80211_ATTR_FRAME_TYPE={0x6}, @NL80211_ATTR_FRAME_TYPE={0x6, 0x65, 0xc0}, @NL80211_ATTR_FRAME_TYPE={0x6, 0x65, 0x2e30}, @NL80211_ATTR_FRAME_TYPE={0x6, 0x65, 0x6}]}, 0x60}, 0x1, 0x0, 0x0, 0x10}, 0x4)
write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000380)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x80, 0x1, 0x9, 0x1, 0x2, 0x3e, 0x7ff, 0x1f2, 0x40, 0x1f4, 0xbfa, 0x3, 0x38, 0x1, 0x5, 0x4, 0x4}, [{0x5, 0x9, 0x6, 0x101, 0x6, 0x4, 0x9, 0x6}, {0x5, 0x3, 0x5e61, 0x80000000, 0xcc3, 0x9, 0x7, 0x8}], "d1660f10e0ac4a6edbf3aa53803c8f57ef2a12069e82553332d2b96d67f2dbc5b04959dad57c303d876233684f5e9ad402a193da791e11122f2cccbf10d6d499f5e16385d09f63891a965d80bcb68b551fabffb4bf0b5c372b4d69cdefac988201a40429a8d0dc699820193afcab08070fde89c22e16b43dde5e37d9a3df0cd352e8667f163774d9dc3c79571e5100046281", ['\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00']}, 0x842)

06:19:04 executing program 1:
r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0)
preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x9, 0x0)
mmap(&(0x7f0000000000/0xa000)=nil, 0xa000, 0x2, 0x2172, 0xffffffffffffffff, 0x0)
r1 = socket$unix(0x1, 0x1, 0x0)
bind$unix(r1, &(0x7f00000001c0)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x56)
close(r1)

06:19:04 executing program 0:
r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0)
mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800004, 0x12, r0, 0x0)
preadv(0xffffffffffffffff, &(0x7f00000001c0)=[{0x0}], 0x1, 0x9, 0x0)
mmap(&(0x7f0000000000/0xa000)=nil, 0xa000, 0x2, 0x2172, 0xffffffffffffffff, 0x0)
syz_mount_image$reiserfs(&(0x7f0000000140), &(0x7f0000000180)='./file0\x00', 0x8000, 0x3, &(0x7f0000000300)=[{&(0x7f0000000540)="21d37ef07e82e237fbe1b40158d20e242c5ea1f9d9edc6b9395250085d6dfa486982e82d4ce1a5e2bc00d29383bae640de", 0x31, 0x7}, {&(0x7f0000000240)="c43f281f483aa6cd83e40e59d53f177299d285bbe5d90aab2b56a76f9db49d86afa5a0f601ba9b3502de5f3724f3ec00927151f928f668b362052950a2e8f16baec29875fdad59395e86a1050c368933e3ed5a17d76bd7bded793436ea207885f395ace3fc12126c205b170be392c1645233ef01f9661090706a65f63b4845dc2884a20711a8024ad4af44aeec9db33991dae38d95cdb7132970d0d4dec58b9d46d378", 0xa3, 0x6}, {&(0x7f0000000380)="05f82c760d277896dd8c9891a41aafe24124891a32a238c3c78696d112aa09f3ae5c54b0c08676da5db7f358c72dfaca9a5d90860b4ae363c9a921c47965d339c23408a6d9b31a23aee27822f0a140d8e4ec9475a740113f2b9923b46333110e528e0a513151aad34aee1b5310fcf62c1982349253003d6d53aebbe09cf5918668ee682be93b6a671bbc", 0x8a, 0x3}], 0x2000400, &(0x7f0000000440)={[{@balloc_no_unhash_reloc}, {@nolargeio}, {@grpjquota}], [{@obj_role={'obj_role', 0x3d, '^'}}, {@hash}, {@uid_lt}, {@mask={'mask', 0x3d, 'MAY_EXEC'}}, {@uid_lt={'uid<', 0xee00}}, {@smackfsfloor={'smackfsfloor', 0x3d, ':%#[@'}}, {@obj_user={'obj_user', 0x3d, ',\\*),i'}}, {@uid_eq={'uid', 0x3d, 0xee00}}, {@seclabel}, {@uid_lt={'uid<', 0xee00}}]})

06:19:04 executing program 3:
r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0)
mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800004, 0x12, r0, 0x0)
preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x9, 0x0)
mmap(&(0x7f0000000000/0xa000)=nil, 0xa000, 0x2, 0x2172, 0xffffffffffffffff, 0x0)
r1 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x11, 0x3, &(0x7f00000000c0)=@framed, &(0x7f00000001c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x74)
bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='ext4_es_lookup_extent_exit\x00', r1}, 0x10)
r2 = socket$unix(0x1, 0x1, 0x0)
bind$unix(r2, &(0x7f00000001c0)=@file={0x0, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x56)

06:19:04 executing program 1:
mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800004, 0x12, 0xffffffffffffffff, 0x0)
preadv(0xffffffffffffffff, &(0x7f00000001c0)=[{0x0}], 0x1, 0x9, 0x0)
mmap(&(0x7f0000000000/0xa000)=nil, 0xa000, 0x2, 0x2172, 0xffffffffffffffff, 0x0)
r0 = socket$unix(0x1, 0x1, 0x0)
bind$unix(r0, &(0x7f00000001c0)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x56)
close(r0)

06:19:04 executing program 2:
r0 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000680), 0xffffffffffffffff)
ioctl$sock_SIOCGIFINDEX_80211(0xffffffffffffffff, 0x8933, &(0x7f0000000c00)={'wlan1\x00'})
r1 = socket$nl_generic(0x10, 0x3, 0x10)
ioctl$sock_SIOCGIFINDEX_80211(r1, 0x8933, &(0x7f0000000e40)={'wlan0\x00', <r2=>0x0})
sendmsg$NL80211_CMD_TRIGGER_SCAN(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000f40)={&(0x7f0000000000)=ANY=[@ANYBLOB='$\x00\x00\x00', @ANYRES16=r0, @ANYBLOB="010000000000000000002100000008000300", @ANYRES32=r2, @ANYBLOB="08009e"], 0x24}}, 0x0)
sendmsg$NL80211_CMD_FRAME(0xffffffffffffffff, &(0x7f0000000100)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f00000000c0)={&(0x7f0000000c40)=ANY=[@ANYBLOB="2000000059c89a20a00fadf00ada0277887124d85c2b6f27e866a2f2434f0213672fd63827c4c50f5346d89412d5351da4a233d419db04d5f089f764866116182e7757ccfd", @ANYRES16=r0, @ANYBLOB="00022dbd7000fedbdf253b0000000c0099007f000000470000000c00cd001f000400070000ff04008e00"], 0x30}, 0x1, 0x0, 0x0, 0x44}, 0x40000)
r3 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0)
mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800004, 0x12, r3, 0x0)
preadv(r3, &(0x7f00000001c0)=[{0x0}], 0x1, 0x9, 0x0)
mmap(&(0x7f0000000000/0xa000)=nil, 0xa000, 0x2, 0x2172, 0xffffffffffffffff, 0x0)
r4 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000180), 0xffffffffffffffff)
ioctl$sock_SIOCGIFINDEX_80211(r3, 0x8933, &(0x7f0000000200)={'wlan0\x00', <r5=>0x0})
sendmsg$NL80211_CMD_REGISTER_FRAME(r3, &(0x7f0000000300)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x2000}, 0xc, &(0x7f00000002c0)={&(0x7f0000000240)={0x60, r4, 0x100, 0x70bd29, 0x25dfdbfc, {{}, {@val={0x8, 0x3, r5}, @val={0xc, 0x99, {0x9de00000, 0x6b}}}}, [@NL80211_ATTR_FRAME_TYPE={0x6}, @NL80211_ATTR_FRAME_TYPE={0x6, 0x65, 0x7f}, @NL80211_ATTR_FRAME_TYPE={0x6, 0x65, 0x8}, @NL80211_ATTR_FRAME_TYPE={0x6}, @NL80211_ATTR_FRAME_TYPE={0x6, 0x65, 0xc0}, @NL80211_ATTR_FRAME_TYPE={0x6, 0x65, 0x2e30}, @NL80211_ATTR_FRAME_TYPE={0x6, 0x65, 0x6}]}, 0x60}, 0x1, 0x0, 0x0, 0x10}, 0x4)
write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000380)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x80, 0x1, 0x9, 0x1, 0x2, 0x3e, 0x7ff, 0x1f2, 0x40, 0x1f4, 0xbfa, 0x3, 0x38, 0x1, 0x5, 0x4, 0x4}, [{0x5, 0x9, 0x6, 0x101, 0x6, 0x4, 0x9, 0x6}, {0x5, 0x3, 0x5e61, 0x80000000, 0xcc3, 0x9, 0x7, 0x8}], "d1660f10e0ac4a6edbf3aa53803c8f57ef2a12069e82553332d2b96d67f2dbc5b04959dad57c303d876233684f5e9ad402a193da791e11122f2cccbf10d6d499f5e16385d09f63891a965d80bcb68b551fabffb4bf0b5c372b4d69cdefac988201a40429a8d0dc699820193afcab08070fde89c22e16b43dde5e37d9a3df0cd352e8667f163774d9dc3c79571e5100046281", ['\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00']}, 0x842)

[  347.017506][T15778] loop0: detected capacity change from 0 to 64
[  347.033649][T15778] REISERFS warning (device loop0): super-6504 reiserfs_getopt: the option "nolargeio" requires an argument
[  347.033649][T15778] 
06:19:04 executing program 2:
r0 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000680), 0xffffffffffffffff)
ioctl$sock_SIOCGIFINDEX_80211(0xffffffffffffffff, 0x8933, &(0x7f0000000c00)={'wlan1\x00'})
r1 = socket$nl_generic(0x10, 0x3, 0x10)
ioctl$sock_SIOCGIFINDEX_80211(r1, 0x8933, &(0x7f0000000e40)={'wlan0\x00', <r2=>0x0})
sendmsg$NL80211_CMD_TRIGGER_SCAN(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000f40)={&(0x7f0000000000)=ANY=[@ANYBLOB='$\x00\x00\x00', @ANYRES16=r0, @ANYBLOB="010000000000000000002100000008000300", @ANYRES32=r2, @ANYBLOB="08009e"], 0x24}}, 0x0)
sendmsg$NL80211_CMD_FRAME(0xffffffffffffffff, &(0x7f0000000100)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f00000000c0)={&(0x7f0000000c40)=ANY=[@ANYBLOB="2000000059c89a20a00fadf00ada0277887124d85c2b6f27e866a2f2434f0213672fd63827c4c50f5346d89412d5351da4a233d419db04d5f089f764866116182e7757ccfd", @ANYRES16=r0, @ANYBLOB="00022dbd7000fedbdf253b0000000c0099007f000000470000000c00cd001f000400070000ff04008e00"], 0x30}, 0x1, 0x0, 0x0, 0x44}, 0x40000)
r3 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0)
mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800004, 0x12, r3, 0x0)
preadv(r3, &(0x7f00000001c0)=[{0x0}], 0x1, 0x9, 0x0)
mmap(&(0x7f0000000000/0xa000)=nil, 0xa000, 0x2, 0x2172, 0xffffffffffffffff, 0x0)
syz_genetlink_get_family_id$nl80211(&(0x7f0000000180), 0xffffffffffffffff)
ioctl$sock_SIOCGIFINDEX_80211(r3, 0x8933, &(0x7f0000000200)={'wlan0\x00'})
r4 = syz_open_dev$tty1(0xc, 0x4, 0x1)
write$binfmt_elf64(r4, &(0x7f0000000380)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x80, 0x1, 0x9, 0x1, 0x2, 0x3e, 0x7ff, 0x1f2, 0x40, 0x1f4, 0xbfa, 0x3, 0x38, 0x1, 0x5, 0x4, 0x4}, [{0x5, 0x9, 0x6, 0x101, 0x6, 0x4, 0x9, 0x6}, {0x5, 0x3, 0x5e61, 0x80000000, 0xcc3, 0x9, 0x7, 0x8}], "d1660f10e0ac4a6edbf3aa53803c8f57ef2a12069e82553332d2b96d67f2dbc5b04959dad57c303d876233684f5e9ad402a193da791e11122f2cccbf10d6d499f5e16385d09f63891a965d80bcb68b551fabffb4bf0b5c372b4d69cdefac988201a40429a8d0dc699820193afcab08070fde89c22e16b43dde5e37d9a3df0cd352e8667f163774d9dc3c79571e5100046281", ['\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00']}, 0x842)

06:19:04 executing program 3:
r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0)
mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800004, 0x12, r0, 0x0)
mmap(&(0x7f0000000000/0xa000)=nil, 0xa000, 0x2, 0x2172, 0xffffffffffffffff, 0x0)
r1 = socket$unix(0x1, 0x1, 0x0)
bind$unix(r1, &(0x7f00000001c0)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x56)
close(r1)

06:19:04 executing program 1:
mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800004, 0x12, 0xffffffffffffffff, 0x0)
preadv(0xffffffffffffffff, &(0x7f00000001c0)=[{0x0}], 0x1, 0x9, 0x0)
mmap(&(0x7f0000000000/0xa000)=nil, 0xa000, 0x2, 0x2172, 0xffffffffffffffff, 0x0)
r0 = socket$unix(0x1, 0x1, 0x0)
bind$unix(r0, &(0x7f00000001c0)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x56)
close(r0)

06:19:04 executing program 0:
r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0)
mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800004, 0x12, r0, 0x0)
preadv(0xffffffffffffffff, &(0x7f00000001c0)=[{0x0}], 0x1, 0x9, 0x0)
mmap(&(0x7f0000000000/0xa000)=nil, 0xa000, 0x2, 0x2172, 0xffffffffffffffff, 0x0)
syz_mount_image$reiserfs(&(0x7f0000000140), &(0x7f0000000180)='./file0\x00', 0x8000, 0x3, &(0x7f0000000300)=[{&(0x7f0000000540)="21d37ef07e82e237fbe1b40158d20e242c5ea1f9d9edc6b9395250085d6dfa486982e82d4ce1a5e2bc00d29383bae640de", 0x31, 0x7}, {&(0x7f0000000240)="c43f281f483aa6cd83e40e59d53f177299d285bbe5d90aab2b56a76f9db49d86afa5a0f601ba9b3502de5f3724f3ec00927151f928f668b362052950a2e8f16baec29875fdad59395e86a1050c368933e3ed5a17d76bd7bded793436ea207885f395ace3fc12126c205b170be392c1645233ef01f9661090706a65f63b4845dc2884a20711a8024ad4af44aeec9db33991dae38d95cdb7132970d0d4dec58b9d46d378", 0xa3, 0x6}, {&(0x7f0000000380)="05f82c760d277896dd8c9891a41aafe24124891a32a238c3c78696d112aa09f3ae5c54b0c08676da5db7f358c72dfaca9a5d90860b4ae363c9a921c47965d339c23408a6d9b31a23aee27822f0a140d8e4ec9475a740113f2b9923b46333110e528e0a513151aad34aee1b5310fcf62c1982349253003d6d53aebbe09cf5918668ee682be93b6a671bbc", 0x8a, 0x3}], 0x2000400, &(0x7f0000000440)={[{@balloc_no_unhash_reloc}, {@nolargeio}, {@grpjquota}], [{@obj_role={'obj_role', 0x3d, '^'}}, {@hash}, {@uid_lt}, {@mask={'mask', 0x3d, 'MAY_EXEC'}}, {@uid_lt={'uid<', 0xee00}}, {@smackfsfloor={'smackfsfloor', 0x3d, ':%#[@'}}, {@obj_user={'obj_user', 0x3d, ',\\*),i'}}, {@uid_eq={'uid', 0x3d, 0xee00}}, {@seclabel}, {@uid_lt={'uid<', 0xee00}}]})

06:19:04 executing program 3:
r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0)
mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800004, 0x12, r0, 0x0)
preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x9, 0x0)
r1 = socket$unix(0x1, 0x1, 0x0)
bind$unix(r1, &(0x7f00000001c0)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x56)
close(r1)

[  347.293539][T15792] loop0: detected capacity change from 0 to 64
[  347.310381][T15792] REISERFS warning (device loop0): super-6504 reiserfs_getopt: the option "nolargeio" requires an argument
[  347.310381][T15792] 
06:19:04 executing program 3:
r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0)
mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800004, 0x12, r0, 0x0)
preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x9, 0x0)
r1 = socket$unix(0x1, 0x1, 0x0)
bind$unix(r1, &(0x7f00000001c0)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x56)
close(r1)

06:19:04 executing program 1:
mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800004, 0x12, 0xffffffffffffffff, 0x0)
preadv(0xffffffffffffffff, &(0x7f00000001c0)=[{0x0}], 0x1, 0x9, 0x0)
mmap(&(0x7f0000000000/0xa000)=nil, 0xa000, 0x2, 0x2172, 0xffffffffffffffff, 0x0)
r0 = socket$unix(0x1, 0x1, 0x0)
bind$unix(r0, &(0x7f00000001c0)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x56)
close(r0)

06:19:05 executing program 0:
r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0)
mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800004, 0x12, r0, 0x0)
preadv(r0, 0x0, 0x0, 0x9, 0x0)
mmap(&(0x7f0000000000/0xa000)=nil, 0xa000, 0x2, 0x2172, 0xffffffffffffffff, 0x0)
syz_mount_image$reiserfs(&(0x7f0000000140), &(0x7f0000000180)='./file0\x00', 0x8000, 0x3, &(0x7f0000000300)=[{&(0x7f0000000540)="21d37ef07e82e237fbe1b40158d20e242c5ea1f9d9edc6b9395250085d6dfa486982e82d4ce1a5e2bc00d29383bae640de", 0x31, 0x7}, {&(0x7f0000000240)="c43f281f483aa6cd83e40e59d53f177299d285bbe5d90aab2b56a76f9db49d86afa5a0f601ba9b3502de5f3724f3ec00927151f928f668b362052950a2e8f16baec29875fdad59395e86a1050c368933e3ed5a17d76bd7bded793436ea207885f395ace3fc12126c205b170be392c1645233ef01f9661090706a65f63b4845dc2884a20711a8024ad4af44aeec9db33991dae38d95cdb7132970d0d4dec58b9d46d378", 0xa3, 0x6}, {&(0x7f0000000380)="05f82c760d277896dd8c9891a41aafe24124891a32a238c3c78696d112aa09f3ae5c54b0c08676da5db7f358c72dfaca9a5d90860b4ae363c9a921c47965d339c23408a6d9b31a23aee27822f0a140d8e4ec9475a740113f2b9923b46333110e528e0a513151aad34aee1b5310fcf62c1982349253003d6d53aebbe09cf5918668ee682be93b6a671bbc", 0x8a, 0x3}], 0x2000400, &(0x7f0000000440)={[{@balloc_no_unhash_reloc}, {@nolargeio}, {@grpjquota}], [{@obj_role={'obj_role', 0x3d, '^'}}, {@hash}, {@uid_lt}, {@mask={'mask', 0x3d, 'MAY_EXEC'}}, {@uid_lt={'uid<', 0xee00}}, {@smackfsfloor={'smackfsfloor', 0x3d, ':%#[@'}}, {@obj_user={'obj_user', 0x3d, ',\\*),i'}}, {@uid_eq={'uid', 0x3d, 0xee00}}, {@seclabel}, {@uid_lt={'uid<', 0xee00}}]})

[  347.494664][T15805] loop0: detected capacity change from 0 to 64
[  347.513660][T15805] REISERFS warning (device loop0): super-6504 reiserfs_getopt: the option "nolargeio" requires an argument
[  347.513660][T15805] 
06:19:05 executing program 2:
r0 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000680), 0xffffffffffffffff)
ioctl$sock_SIOCGIFINDEX_80211(0xffffffffffffffff, 0x8933, &(0x7f0000000c00)={'wlan1\x00'})
r1 = socket$nl_generic(0x10, 0x3, 0x10)
ioctl$sock_SIOCGIFINDEX_80211(r1, 0x8933, &(0x7f0000000e40)={'wlan0\x00', <r2=>0x0})
sendmsg$NL80211_CMD_TRIGGER_SCAN(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000f40)={&(0x7f0000000000)=ANY=[@ANYBLOB='$\x00\x00\x00', @ANYRES16=r0, @ANYBLOB="010000000000000000002100000008000300", @ANYRES32=r2, @ANYBLOB="08009e"], 0x24}}, 0x0)
sendmsg$NL80211_CMD_FRAME(0xffffffffffffffff, &(0x7f0000000100)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f00000000c0)={&(0x7f0000000c40)=ANY=[@ANYBLOB="2000000059c89a20a00fadf00ada0277887124d85c2b6f27e866a2f2434f0213672fd63827c4c50f5346d89412d5351da4a233d419db04d5f089f764866116182e7757ccfd", @ANYRES16=r0, @ANYBLOB="00022dbd7000fedbdf253b0000000c0099007f000000470000000c00cd001f000400070000ff04008e00"], 0x30}, 0x1, 0x0, 0x0, 0x44}, 0x40000)
r3 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0)
mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800004, 0x12, r3, 0x0)
preadv(r3, &(0x7f00000001c0)=[{0x0}], 0x1, 0x9, 0x0)
mmap(&(0x7f0000000000/0xa000)=nil, 0xa000, 0x2, 0x2172, 0xffffffffffffffff, 0x0)
syz_genetlink_get_family_id$nl80211(&(0x7f0000000180), 0xffffffffffffffff)
r4 = syz_open_dev$tty1(0xc, 0x4, 0x1)
write$binfmt_elf64(r4, &(0x7f0000000380)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x80, 0x1, 0x9, 0x1, 0x2, 0x3e, 0x7ff, 0x1f2, 0x40, 0x1f4, 0xbfa, 0x3, 0x38, 0x1, 0x5, 0x4, 0x4}, [{0x5, 0x9, 0x6, 0x101, 0x6, 0x4, 0x9, 0x6}, {0x5, 0x3, 0x5e61, 0x80000000, 0xcc3, 0x9, 0x7, 0x8}], "d1660f10e0ac4a6edbf3aa53803c8f57ef2a12069e82553332d2b96d67f2dbc5b04959dad57c303d876233684f5e9ad402a193da791e11122f2cccbf10d6d499f5e16385d09f63891a965d80bcb68b551fabffb4bf0b5c372b4d69cdefac988201a40429a8d0dc699820193afcab08070fde89c22e16b43dde5e37d9a3df0cd352e8667f163774d9dc3c79571e5100046281", ['\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00']}, 0x842)

06:19:05 executing program 3:
r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0)
mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800004, 0x12, r0, 0x0)
preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x9, 0x0)
r1 = socket$unix(0x1, 0x1, 0x0)
bind$unix(r1, &(0x7f00000001c0)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x56)
close(r1)

06:19:05 executing program 1:
r0 = openat(0xffffffffffffffff, 0x0, 0x0, 0x0)
mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800004, 0x12, r0, 0x0)
preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x9, 0x0)
mmap(&(0x7f0000000000/0xa000)=nil, 0xa000, 0x2, 0x2172, 0xffffffffffffffff, 0x0)
r1 = socket$unix(0x1, 0x1, 0x0)
bind$unix(r1, &(0x7f00000001c0)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x56)
close(r1)

06:19:05 executing program 0:
r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0)
mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800004, 0x12, r0, 0x0)
preadv(r0, 0x0, 0x0, 0x9, 0x0)
mmap(&(0x7f0000000000/0xa000)=nil, 0xa000, 0x2, 0x2172, 0xffffffffffffffff, 0x0)
syz_mount_image$reiserfs(&(0x7f0000000140), &(0x7f0000000180)='./file0\x00', 0x8000, 0x3, &(0x7f0000000300)=[{&(0x7f0000000540)="21d37ef07e82e237fbe1b40158d20e242c5ea1f9d9edc6b9395250085d6dfa486982e82d4ce1a5e2bc00d29383bae640de", 0x31, 0x7}, {&(0x7f0000000240)="c43f281f483aa6cd83e40e59d53f177299d285bbe5d90aab2b56a76f9db49d86afa5a0f601ba9b3502de5f3724f3ec00927151f928f668b362052950a2e8f16baec29875fdad59395e86a1050c368933e3ed5a17d76bd7bded793436ea207885f395ace3fc12126c205b170be392c1645233ef01f9661090706a65f63b4845dc2884a20711a8024ad4af44aeec9db33991dae38d95cdb7132970d0d4dec58b9d46d378", 0xa3, 0x6}, {&(0x7f0000000380)="05f82c760d277896dd8c9891a41aafe24124891a32a238c3c78696d112aa09f3ae5c54b0c08676da5db7f358c72dfaca9a5d90860b4ae363c9a921c47965d339c23408a6d9b31a23aee27822f0a140d8e4ec9475a740113f2b9923b46333110e528e0a513151aad34aee1b5310fcf62c1982349253003d6d53aebbe09cf5918668ee682be93b6a671bbc", 0x8a, 0x3}], 0x2000400, &(0x7f0000000440)={[{@balloc_no_unhash_reloc}, {@nolargeio}, {@grpjquota}], [{@obj_role={'obj_role', 0x3d, '^'}}, {@hash}, {@uid_lt}, {@mask={'mask', 0x3d, 'MAY_EXEC'}}, {@uid_lt={'uid<', 0xee00}}, {@smackfsfloor={'smackfsfloor', 0x3d, ':%#[@'}}, {@obj_user={'obj_user', 0x3d, ',\\*),i'}}, {@uid_eq={'uid', 0x3d, 0xee00}}, {@seclabel}, {@uid_lt={'uid<', 0xee00}}]})

[  348.063887][T15815] loop0: detected capacity change from 0 to 64
[  348.097219][T15815] REISERFS warning (device loop0): super-6504 reiserfs_getopt: the option "nolargeio" requires an argument
[  348.097219][T15815] 
06:19:05 executing program 3:
r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0)
mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800004, 0x12, r0, 0x0)
preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x9, 0x0)
r1 = socket$unix(0x1, 0x1, 0x0)
close(r1)

06:19:05 executing program 1:
r0 = openat(0xffffffffffffffff, 0x0, 0x0, 0x0)
mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800004, 0x12, r0, 0x0)
preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x9, 0x0)
mmap(&(0x7f0000000000/0xa000)=nil, 0xa000, 0x2, 0x2172, 0xffffffffffffffff, 0x0)
r1 = socket$unix(0x1, 0x1, 0x0)
bind$unix(r1, &(0x7f00000001c0)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x56)
close(r1)

06:19:05 executing program 0:
r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0)
mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800004, 0x12, r0, 0x0)
preadv(r0, 0x0, 0x0, 0x9, 0x0)
mmap(&(0x7f0000000000/0xa000)=nil, 0xa000, 0x2, 0x2172, 0xffffffffffffffff, 0x0)
syz_mount_image$reiserfs(&(0x7f0000000140), &(0x7f0000000180)='./file0\x00', 0x8000, 0x3, &(0x7f0000000300)=[{&(0x7f0000000540)="21d37ef07e82e237fbe1b40158d20e242c5ea1f9d9edc6b9395250085d6dfa486982e82d4ce1a5e2bc00d29383bae640de", 0x31, 0x7}, {&(0x7f0000000240)="c43f281f483aa6cd83e40e59d53f177299d285bbe5d90aab2b56a76f9db49d86afa5a0f601ba9b3502de5f3724f3ec00927151f928f668b362052950a2e8f16baec29875fdad59395e86a1050c368933e3ed5a17d76bd7bded793436ea207885f395ace3fc12126c205b170be392c1645233ef01f9661090706a65f63b4845dc2884a20711a8024ad4af44aeec9db33991dae38d95cdb7132970d0d4dec58b9d46d378", 0xa3, 0x6}, {&(0x7f0000000380)="05f82c760d277896dd8c9891a41aafe24124891a32a238c3c78696d112aa09f3ae5c54b0c08676da5db7f358c72dfaca9a5d90860b4ae363c9a921c47965d339c23408a6d9b31a23aee27822f0a140d8e4ec9475a740113f2b9923b46333110e528e0a513151aad34aee1b5310fcf62c1982349253003d6d53aebbe09cf5918668ee682be93b6a671bbc", 0x8a, 0x3}], 0x2000400, &(0x7f0000000440)={[{@balloc_no_unhash_reloc}, {@nolargeio}, {@grpjquota}], [{@obj_role={'obj_role', 0x3d, '^'}}, {@hash}, {@uid_lt}, {@mask={'mask', 0x3d, 'MAY_EXEC'}}, {@uid_lt={'uid<', 0xee00}}, {@smackfsfloor={'smackfsfloor', 0x3d, ':%#[@'}}, {@obj_user={'obj_user', 0x3d, ',\\*),i'}}, {@uid_eq={'uid', 0x3d, 0xee00}}, {@seclabel}, {@uid_lt={'uid<', 0xee00}}]})

06:19:05 executing program 1:
r0 = openat(0xffffffffffffffff, 0x0, 0x0, 0x0)
mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800004, 0x12, r0, 0x0)
preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x9, 0x0)
mmap(&(0x7f0000000000/0xa000)=nil, 0xa000, 0x2, 0x2172, 0xffffffffffffffff, 0x0)
r1 = socket$unix(0x1, 0x1, 0x0)
bind$unix(r1, &(0x7f00000001c0)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x56)
close(r1)

[  348.248852][T15830] loop0: detected capacity change from 0 to 64
[  348.278945][T15830] REISERFS warning (device loop0): super-6504 reiserfs_getopt: the option "nolargeio" requires an argument
[  348.278945][T15830] 
[  348.692863][ T3408] ieee802154 phy0 wpan0: encryption failed: -22
[  348.701551][ T3408] ieee802154 phy1 wpan1: encryption failed: -22
06:19:06 executing program 2:
r0 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000680), 0xffffffffffffffff)
ioctl$sock_SIOCGIFINDEX_80211(0xffffffffffffffff, 0x8933, &(0x7f0000000c00)={'wlan1\x00'})
r1 = socket$nl_generic(0x10, 0x3, 0x10)
ioctl$sock_SIOCGIFINDEX_80211(r1, 0x8933, &(0x7f0000000e40)={'wlan0\x00', <r2=>0x0})
sendmsg$NL80211_CMD_TRIGGER_SCAN(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000f40)={&(0x7f0000000000)=ANY=[@ANYBLOB='$\x00\x00\x00', @ANYRES16=r0, @ANYBLOB="010000000000000000002100000008000300", @ANYRES32=r2, @ANYBLOB="08009e"], 0x24}}, 0x0)
sendmsg$NL80211_CMD_FRAME(0xffffffffffffffff, &(0x7f0000000100)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f00000000c0)={&(0x7f0000000c40)=ANY=[@ANYBLOB="2000000059c89a20a00fadf00ada0277887124d85c2b6f27e866a2f2434f0213672fd63827c4c50f5346d89412d5351da4a233d419db04d5f089f764866116182e7757ccfd", @ANYRES16=r0, @ANYBLOB="00022dbd7000fedbdf253b0000000c0099007f000000470000000c00cd001f000400070000ff04008e00"], 0x30}, 0x1, 0x0, 0x0, 0x44}, 0x40000)
r3 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0)
mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800004, 0x12, r3, 0x0)
preadv(r3, &(0x7f00000001c0)=[{0x0}], 0x1, 0x9, 0x0)
mmap(&(0x7f0000000000/0xa000)=nil, 0xa000, 0x2, 0x2172, 0xffffffffffffffff, 0x0)
r4 = syz_open_dev$tty1(0xc, 0x4, 0x1)
write$binfmt_elf64(r4, &(0x7f0000000380)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x80, 0x1, 0x9, 0x1, 0x2, 0x3e, 0x7ff, 0x1f2, 0x40, 0x1f4, 0xbfa, 0x3, 0x38, 0x1, 0x5, 0x4, 0x4}, [{0x5, 0x9, 0x6, 0x101, 0x6, 0x4, 0x9, 0x6}, {0x5, 0x3, 0x5e61, 0x80000000, 0xcc3, 0x9, 0x7, 0x8}], "d1660f10e0ac4a6edbf3aa53803c8f57ef2a12069e82553332d2b96d67f2dbc5b04959dad57c303d876233684f5e9ad402a193da791e11122f2cccbf10d6d499f5e16385d09f63891a965d80bcb68b551fabffb4bf0b5c372b4d69cdefac988201a40429a8d0dc699820193afcab08070fde89c22e16b43dde5e37d9a3df0cd352e8667f163774d9dc3c79571e5100046281", ['\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00']}, 0x842)

06:19:06 executing program 0:
r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0)
mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800004, 0x12, r0, 0x0)
preadv(r0, &(0x7f00000001c0), 0x0, 0x9, 0x0)
mmap(&(0x7f0000000000/0xa000)=nil, 0xa000, 0x2, 0x2172, 0xffffffffffffffff, 0x0)
syz_mount_image$reiserfs(&(0x7f0000000140), &(0x7f0000000180)='./file0\x00', 0x8000, 0x3, &(0x7f0000000300)=[{&(0x7f0000000540)="21d37ef07e82e237fbe1b40158d20e242c5ea1f9d9edc6b9395250085d6dfa486982e82d4ce1a5e2bc00d29383bae640de", 0x31, 0x7}, {&(0x7f0000000240)="c43f281f483aa6cd83e40e59d53f177299d285bbe5d90aab2b56a76f9db49d86afa5a0f601ba9b3502de5f3724f3ec00927151f928f668b362052950a2e8f16baec29875fdad59395e86a1050c368933e3ed5a17d76bd7bded793436ea207885f395ace3fc12126c205b170be392c1645233ef01f9661090706a65f63b4845dc2884a20711a8024ad4af44aeec9db33991dae38d95cdb7132970d0d4dec58b9d46d378", 0xa3, 0x6}, {&(0x7f0000000380)="05f82c760d277896dd8c9891a41aafe24124891a32a238c3c78696d112aa09f3ae5c54b0c08676da5db7f358c72dfaca9a5d90860b4ae363c9a921c47965d339c23408a6d9b31a23aee27822f0a140d8e4ec9475a740113f2b9923b46333110e528e0a513151aad34aee1b5310fcf62c1982349253003d6d53aebbe09cf5918668ee682be93b6a671bbc", 0x8a, 0x3}], 0x2000400, &(0x7f0000000440)={[{@balloc_no_unhash_reloc}, {@nolargeio}, {@grpjquota}], [{@obj_role={'obj_role', 0x3d, '^'}}, {@hash}, {@uid_lt}, {@mask={'mask', 0x3d, 'MAY_EXEC'}}, {@uid_lt={'uid<', 0xee00}}, {@smackfsfloor={'smackfsfloor', 0x3d, ':%#[@'}}, {@obj_user={'obj_user', 0x3d, ',\\*),i'}}, {@uid_eq={'uid', 0x3d, 0xee00}}, {@seclabel}, {@uid_lt={'uid<', 0xee00}}]})

06:19:06 executing program 3:
r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0)
mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800004, 0x12, r0, 0x0)
preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x9, 0x0)
close(0xffffffffffffffff)

06:19:06 executing program 1:
r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0)
mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x0, 0x12, r0, 0x0)
preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x9, 0x0)
mmap(&(0x7f0000000000/0xa000)=nil, 0xa000, 0x2, 0x2172, 0xffffffffffffffff, 0x0)
r1 = socket$unix(0x1, 0x1, 0x0)
bind$unix(r1, &(0x7f00000001c0)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x56)
close(r1)

[  349.024822][T15841] loop0: detected capacity change from 0 to 64
[  349.058313][T15841] REISERFS warning (device loop0): super-6504 reiserfs_getopt: the option "nolargeio" requires an argument
[  349.058313][T15841] 
06:19:06 executing program 3:
r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0)
mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800004, 0x12, r0, 0x0)
preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x9, 0x0)
close(0xffffffffffffffff)

06:19:06 executing program 1:
r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0)
mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x0, 0x12, r0, 0x0)
preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x9, 0x0)
mmap(&(0x7f0000000000/0xa000)=nil, 0xa000, 0x2, 0x2172, 0xffffffffffffffff, 0x0)
r1 = socket$unix(0x1, 0x1, 0x0)
bind$unix(r1, &(0x7f00000001c0)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x56)
close(r1)

06:19:06 executing program 3:
r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0)
mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800004, 0x12, r0, 0x0)
preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x9, 0x0)
close(0xffffffffffffffff)

06:19:06 executing program 0:
r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0)
mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800004, 0x12, r0, 0x0)
preadv(r0, &(0x7f00000001c0), 0x0, 0x9, 0x0)
mmap(&(0x7f0000000000/0xa000)=nil, 0xa000, 0x2, 0x2172, 0xffffffffffffffff, 0x0)
syz_mount_image$reiserfs(&(0x7f0000000140), &(0x7f0000000180)='./file0\x00', 0x8000, 0x3, &(0x7f0000000300)=[{&(0x7f0000000540)="21d37ef07e82e237fbe1b40158d20e242c5ea1f9d9edc6b9395250085d6dfa486982e82d4ce1a5e2bc00d29383bae640de", 0x31, 0x7}, {&(0x7f0000000240)="c43f281f483aa6cd83e40e59d53f177299d285bbe5d90aab2b56a76f9db49d86afa5a0f601ba9b3502de5f3724f3ec00927151f928f668b362052950a2e8f16baec29875fdad59395e86a1050c368933e3ed5a17d76bd7bded793436ea207885f395ace3fc12126c205b170be392c1645233ef01f9661090706a65f63b4845dc2884a20711a8024ad4af44aeec9db33991dae38d95cdb7132970d0d4dec58b9d46d378", 0xa3, 0x6}, {&(0x7f0000000380)="05f82c760d277896dd8c9891a41aafe24124891a32a238c3c78696d112aa09f3ae5c54b0c08676da5db7f358c72dfaca9a5d90860b4ae363c9a921c47965d339c23408a6d9b31a23aee27822f0a140d8e4ec9475a740113f2b9923b46333110e528e0a513151aad34aee1b5310fcf62c1982349253003d6d53aebbe09cf5918668ee682be93b6a671bbc", 0x8a, 0x3}], 0x2000400, &(0x7f0000000440)={[{@balloc_no_unhash_reloc}, {@nolargeio}, {@grpjquota}], [{@obj_role={'obj_role', 0x3d, '^'}}, {@hash}, {@uid_lt}, {@mask={'mask', 0x3d, 'MAY_EXEC'}}, {@uid_lt={'uid<', 0xee00}}, {@smackfsfloor={'smackfsfloor', 0x3d, ':%#[@'}}, {@obj_user={'obj_user', 0x3d, ',\\*),i'}}, {@uid_eq={'uid', 0x3d, 0xee00}}, {@seclabel}, {@uid_lt={'uid<', 0xee00}}]})

[  349.262526][T15857] loop0: detected capacity change from 0 to 64
[  349.290184][T15857] REISERFS warning (device loop0): super-6504 reiserfs_getopt: the option "nolargeio" requires an argument
[  349.290184][T15857] 
06:19:07 executing program 2:
r0 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000680), 0xffffffffffffffff)
ioctl$sock_SIOCGIFINDEX_80211(0xffffffffffffffff, 0x8933, &(0x7f0000000c00)={'wlan1\x00'})
r1 = socket$nl_generic(0x10, 0x3, 0x10)
ioctl$sock_SIOCGIFINDEX_80211(r1, 0x8933, &(0x7f0000000e40)={'wlan0\x00', <r2=>0x0})
sendmsg$NL80211_CMD_TRIGGER_SCAN(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000f40)={&(0x7f0000000000)=ANY=[@ANYBLOB='$\x00\x00\x00', @ANYRES16=r0, @ANYBLOB="010000000000000000002100000008000300", @ANYRES32=r2, @ANYBLOB="08009e"], 0x24}}, 0x0)
sendmsg$NL80211_CMD_FRAME(0xffffffffffffffff, &(0x7f0000000100)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f00000000c0)={&(0x7f0000000c40)=ANY=[@ANYBLOB="2000000059c89a20a00fadf00ada0277887124d85c2b6f27e866a2f2434f0213672fd63827c4c50f5346d89412d5351da4a233d419db04d5f089f764866116182e7757ccfd", @ANYRES16=r0, @ANYBLOB="00022dbd7000fedbdf253b0000000c0099007f000000470000000c00cd001f000400070000ff04008e00"], 0x30}, 0x1, 0x0, 0x0, 0x44}, 0x40000)
r3 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0)
mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800004, 0x12, r3, 0x0)
preadv(r3, &(0x7f00000001c0)=[{0x0}], 0x1, 0x9, 0x0)
r4 = syz_open_dev$tty1(0xc, 0x4, 0x1)
write$binfmt_elf64(r4, &(0x7f0000000380)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x80, 0x1, 0x9, 0x1, 0x2, 0x3e, 0x7ff, 0x1f2, 0x40, 0x1f4, 0xbfa, 0x3, 0x38, 0x1, 0x5, 0x4, 0x4}, [{0x5, 0x9, 0x6, 0x101, 0x6, 0x4, 0x9, 0x6}, {0x5, 0x3, 0x5e61, 0x80000000, 0xcc3, 0x9, 0x7, 0x8}], "d1660f10e0ac4a6edbf3aa53803c8f57ef2a12069e82553332d2b96d67f2dbc5b04959dad57c303d876233684f5e9ad402a193da791e11122f2cccbf10d6d499f5e16385d09f63891a965d80bcb68b551fabffb4bf0b5c372b4d69cdefac988201a40429a8d0dc699820193afcab08070fde89c22e16b43dde5e37d9a3df0cd352e8667f163774d9dc3c79571e5100046281", ['\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00']}, 0x842)

06:19:07 executing program 1:
r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0)
mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x0, 0x12, r0, 0x0)
preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x9, 0x0)
mmap(&(0x7f0000000000/0xa000)=nil, 0xa000, 0x2, 0x2172, 0xffffffffffffffff, 0x0)
r1 = socket$unix(0x1, 0x1, 0x0)
bind$unix(r1, &(0x7f00000001c0)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x56)
close(r1)

06:19:07 executing program 3:
r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0)
mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800004, 0x12, r0, 0x0)
r1 = socket$unix(0x1, 0x1, 0x0)
close(r1)

06:19:07 executing program 0:
r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0)
mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800004, 0x12, r0, 0x0)
preadv(r0, &(0x7f00000001c0), 0x0, 0x9, 0x0)
mmap(&(0x7f0000000000/0xa000)=nil, 0xa000, 0x2, 0x2172, 0xffffffffffffffff, 0x0)
syz_mount_image$reiserfs(&(0x7f0000000140), &(0x7f0000000180)='./file0\x00', 0x8000, 0x3, &(0x7f0000000300)=[{&(0x7f0000000540)="21d37ef07e82e237fbe1b40158d20e242c5ea1f9d9edc6b9395250085d6dfa486982e82d4ce1a5e2bc00d29383bae640de", 0x31, 0x7}, {&(0x7f0000000240)="c43f281f483aa6cd83e40e59d53f177299d285bbe5d90aab2b56a76f9db49d86afa5a0f601ba9b3502de5f3724f3ec00927151f928f668b362052950a2e8f16baec29875fdad59395e86a1050c368933e3ed5a17d76bd7bded793436ea207885f395ace3fc12126c205b170be392c1645233ef01f9661090706a65f63b4845dc2884a20711a8024ad4af44aeec9db33991dae38d95cdb7132970d0d4dec58b9d46d378", 0xa3, 0x6}, {&(0x7f0000000380)="05f82c760d277896dd8c9891a41aafe24124891a32a238c3c78696d112aa09f3ae5c54b0c08676da5db7f358c72dfaca9a5d90860b4ae363c9a921c47965d339c23408a6d9b31a23aee27822f0a140d8e4ec9475a740113f2b9923b46333110e528e0a513151aad34aee1b5310fcf62c1982349253003d6d53aebbe09cf5918668ee682be93b6a671bbc", 0x8a, 0x3}], 0x2000400, &(0x7f0000000440)={[{@balloc_no_unhash_reloc}, {@nolargeio}, {@grpjquota}], [{@obj_role={'obj_role', 0x3d, '^'}}, {@hash}, {@uid_lt}, {@mask={'mask', 0x3d, 'MAY_EXEC'}}, {@uid_lt={'uid<', 0xee00}}, {@smackfsfloor={'smackfsfloor', 0x3d, ':%#[@'}}, {@obj_user={'obj_user', 0x3d, ',\\*),i'}}, {@uid_eq={'uid', 0x3d, 0xee00}}, {@seclabel}, {@uid_lt={'uid<', 0xee00}}]})

06:19:07 executing program 1:
r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0)
mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800004, 0x10, r0, 0x0)
preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x9, 0x0)
mmap(&(0x7f0000000000/0xa000)=nil, 0xa000, 0x2, 0x2172, 0xffffffffffffffff, 0x0)
r1 = socket$unix(0x1, 0x1, 0x0)
bind$unix(r1, &(0x7f00000001c0)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x56)
close(r1)

[  350.033573][T15871] loop0: detected capacity change from 0 to 64
[  350.049645][T15871] REISERFS warning (device loop0): super-6504 reiserfs_getopt: the option "nolargeio" requires an argument
[  350.049645][T15871] 
06:19:07 executing program 3:
r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0)
mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800004, 0x12, r0, 0x0)
r1 = socket$unix(0x1, 0x1, 0x0)
close(r1)

06:19:07 executing program 1:
r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0)
mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800004, 0x10, r0, 0x0)
preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x9, 0x0)
mmap(&(0x7f0000000000/0xa000)=nil, 0xa000, 0x2, 0x2172, 0xffffffffffffffff, 0x0)
r1 = socket$unix(0x1, 0x1, 0x0)
bind$unix(r1, &(0x7f00000001c0)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x56)
close(r1)

06:19:07 executing program 3:
r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0)
mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800004, 0x12, r0, 0x0)
r1 = socket$unix(0x1, 0x1, 0x0)
close(r1)

06:19:08 executing program 2:
r0 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000680), 0xffffffffffffffff)
ioctl$sock_SIOCGIFINDEX_80211(0xffffffffffffffff, 0x8933, &(0x7f0000000c00)={'wlan1\x00'})
r1 = socket$nl_generic(0x10, 0x3, 0x10)
ioctl$sock_SIOCGIFINDEX_80211(r1, 0x8933, &(0x7f0000000e40)={'wlan0\x00', <r2=>0x0})
sendmsg$NL80211_CMD_TRIGGER_SCAN(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000f40)={&(0x7f0000000000)=ANY=[@ANYBLOB='$\x00\x00\x00', @ANYRES16=r0, @ANYBLOB="010000000000000000002100000008000300", @ANYRES32=r2, @ANYBLOB="08009e"], 0x24}}, 0x0)
sendmsg$NL80211_CMD_FRAME(0xffffffffffffffff, &(0x7f0000000100)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f00000000c0)={&(0x7f0000000c40)=ANY=[@ANYBLOB="2000000059c89a20a00fadf00ada0277887124d85c2b6f27e866a2f2434f0213672fd63827c4c50f5346d89412d5351da4a233d419db04d5f089f764866116182e7757ccfd", @ANYRES16=r0, @ANYBLOB="00022dbd7000fedbdf253b0000000c0099007f000000470000000c00cd001f000400070000ff04008e00"], 0x30}, 0x1, 0x0, 0x0, 0x44}, 0x40000)
r3 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0)
mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800004, 0x12, r3, 0x0)
r4 = syz_open_dev$tty1(0xc, 0x4, 0x1)
write$binfmt_elf64(r4, &(0x7f0000000380)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x80, 0x1, 0x9, 0x1, 0x2, 0x3e, 0x7ff, 0x1f2, 0x40, 0x1f4, 0xbfa, 0x3, 0x38, 0x1, 0x5, 0x4, 0x4}, [{0x5, 0x9, 0x6, 0x101, 0x6, 0x4, 0x9, 0x6}, {0x5, 0x3, 0x5e61, 0x80000000, 0xcc3, 0x9, 0x7, 0x8}], "d1660f10e0ac4a6edbf3aa53803c8f57ef2a12069e82553332d2b96d67f2dbc5b04959dad57c303d876233684f5e9ad402a193da791e11122f2cccbf10d6d499f5e16385d09f63891a965d80bcb68b551fabffb4bf0b5c372b4d69cdefac988201a40429a8d0dc699820193afcab08070fde89c22e16b43dde5e37d9a3df0cd352e8667f163774d9dc3c79571e5100046281", ['\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00']}, 0x842)

06:19:08 executing program 0:
r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0)
mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800004, 0x12, r0, 0x0)
preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x0, 0x0)
mmap(&(0x7f0000000000/0xa000)=nil, 0xa000, 0x2, 0x2172, 0xffffffffffffffff, 0x0)
syz_mount_image$reiserfs(&(0x7f0000000140), &(0x7f0000000180)='./file0\x00', 0x8000, 0x3, &(0x7f0000000300)=[{&(0x7f0000000540)="21d37ef07e82e237fbe1b40158d20e242c5ea1f9d9edc6b9395250085d6dfa486982e82d4ce1a5e2bc00d29383bae640de", 0x31, 0x7}, {&(0x7f0000000240)="c43f281f483aa6cd83e40e59d53f177299d285bbe5d90aab2b56a76f9db49d86afa5a0f601ba9b3502de5f3724f3ec00927151f928f668b362052950a2e8f16baec29875fdad59395e86a1050c368933e3ed5a17d76bd7bded793436ea207885f395ace3fc12126c205b170be392c1645233ef01f9661090706a65f63b4845dc2884a20711a8024ad4af44aeec9db33991dae38d95cdb7132970d0d4dec58b9d46d378", 0xa3, 0x6}, {&(0x7f0000000380)="05f82c760d277896dd8c9891a41aafe24124891a32a238c3c78696d112aa09f3ae5c54b0c08676da5db7f358c72dfaca9a5d90860b4ae363c9a921c47965d339c23408a6d9b31a23aee27822f0a140d8e4ec9475a740113f2b9923b46333110e528e0a513151aad34aee1b5310fcf62c1982349253003d6d53aebbe09cf5918668ee682be93b6a671bbc", 0x8a, 0x3}], 0x2000400, &(0x7f0000000440)={[{@balloc_no_unhash_reloc}, {@nolargeio}, {@grpjquota}], [{@obj_role={'obj_role', 0x3d, '^'}}, {@hash}, {@uid_lt}, {@mask={'mask', 0x3d, 'MAY_EXEC'}}, {@uid_lt={'uid<', 0xee00}}, {@smackfsfloor={'smackfsfloor', 0x3d, ':%#[@'}}, {@obj_user={'obj_user', 0x3d, ',\\*),i'}}, {@uid_eq={'uid', 0x3d, 0xee00}}, {@seclabel}, {@uid_lt={'uid<', 0xee00}}]})

06:19:08 executing program 1:
r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0)
mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800004, 0x10, r0, 0x0)
preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x9, 0x0)
mmap(&(0x7f0000000000/0xa000)=nil, 0xa000, 0x2, 0x2172, 0xffffffffffffffff, 0x0)
r1 = socket$unix(0x1, 0x1, 0x0)
bind$unix(r1, &(0x7f00000001c0)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x56)
close(r1)

06:19:08 executing program 3:
r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0)
preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x9, 0x0)
r1 = socket$unix(0x1, 0x1, 0x0)
close(r1)

[  350.935654][T15894] loop0: detected capacity change from 0 to 64
06:19:08 executing program 3:
r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0)
preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x9, 0x0)
r1 = socket$unix(0x1, 0x1, 0x0)
close(r1)

[  350.959151][T15894] REISERFS warning (device loop0): super-6504 reiserfs_getopt: the option "nolargeio" requires an argument
[  350.959151][T15894] 
06:19:08 executing program 1:
r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0)
mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800004, 0x12, 0xffffffffffffffff, 0x0)
preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x9, 0x0)
mmap(&(0x7f0000000000/0xa000)=nil, 0xa000, 0x2, 0x2172, 0xffffffffffffffff, 0x0)
r1 = socket$unix(0x1, 0x1, 0x0)
bind$unix(r1, &(0x7f00000001c0)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x56)
close(r1)

06:19:08 executing program 3:
r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0)
preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x9, 0x0)
r1 = socket$unix(0x1, 0x1, 0x0)
close(r1)

06:19:08 executing program 1:
r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0)
mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800004, 0x12, 0xffffffffffffffff, 0x0)
preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x9, 0x0)
mmap(&(0x7f0000000000/0xa000)=nil, 0xa000, 0x2, 0x2172, 0xffffffffffffffff, 0x0)
r1 = socket$unix(0x1, 0x1, 0x0)
bind$unix(r1, &(0x7f00000001c0)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x56)
close(r1)

06:19:09 executing program 2:
r0 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000680), 0xffffffffffffffff)
ioctl$sock_SIOCGIFINDEX_80211(0xffffffffffffffff, 0x8933, &(0x7f0000000c00)={'wlan1\x00'})
r1 = socket$nl_generic(0x10, 0x3, 0x10)
ioctl$sock_SIOCGIFINDEX_80211(r1, 0x8933, &(0x7f0000000e40)={'wlan0\x00', <r2=>0x0})
sendmsg$NL80211_CMD_TRIGGER_SCAN(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000f40)={&(0x7f0000000000)=ANY=[@ANYBLOB='$\x00\x00\x00', @ANYRES16=r0, @ANYBLOB="010000000000000000002100000008000300", @ANYRES32=r2, @ANYBLOB="08009e"], 0x24}}, 0x0)
sendmsg$NL80211_CMD_FRAME(0xffffffffffffffff, &(0x7f0000000100)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f00000000c0)={&(0x7f0000000c40)=ANY=[@ANYBLOB="2000000059c89a20a00fadf00ada0277887124d85c2b6f27e866a2f2434f0213672fd63827c4c50f5346d89412d5351da4a233d419db04d5f089f764866116182e7757ccfd", @ANYRES16=r0, @ANYBLOB="00022dbd7000fedbdf253b0000000c0099007f000000470000000c00cd001f000400070000ff04008e00"], 0x30}, 0x1, 0x0, 0x0, 0x44}, 0x40000)
r3 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0)
mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800004, 0x12, r3, 0x0)
r4 = syz_open_dev$tty1(0xc, 0x4, 0x1)
write$binfmt_elf64(r4, &(0x7f0000000380)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x80, 0x1, 0x9, 0x1, 0x2, 0x3e, 0x7ff, 0x1f2, 0x40, 0x1f4, 0xbfa, 0x3, 0x38, 0x1, 0x5, 0x4, 0x4}, [{0x5, 0x9, 0x6, 0x101, 0x6, 0x4, 0x9, 0x6}, {0x5, 0x3, 0x5e61, 0x80000000, 0xcc3, 0x9, 0x7, 0x8}], "d1660f10e0ac4a6edbf3aa53803c8f57ef2a12069e82553332d2b96d67f2dbc5b04959dad57c303d876233684f5e9ad402a193da791e11122f2cccbf10d6d499f5e16385d09f63891a965d80bcb68b551fabffb4bf0b5c372b4d69cdefac988201a40429a8d0dc699820193afcab08070fde89c22e16b43dde5e37d9a3df0cd352e8667f163774d9dc3c79571e5100046281", ['\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00']}, 0x842)

06:19:09 executing program 0:
r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0)
mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800004, 0x12, r0, 0x0)
preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x0, 0x0)
mmap(&(0x7f0000000000/0xa000)=nil, 0xa000, 0x2, 0x2172, 0xffffffffffffffff, 0x0)
syz_mount_image$reiserfs(&(0x7f0000000140), &(0x7f0000000180)='./file0\x00', 0x8000, 0x3, &(0x7f0000000300)=[{&(0x7f0000000540)="21d37ef07e82e237fbe1b40158d20e242c5ea1f9d9edc6b9395250085d6dfa486982e82d4ce1a5e2bc00d29383bae640de", 0x31, 0x7}, {&(0x7f0000000240)="c43f281f483aa6cd83e40e59d53f177299d285bbe5d90aab2b56a76f9db49d86afa5a0f601ba9b3502de5f3724f3ec00927151f928f668b362052950a2e8f16baec29875fdad59395e86a1050c368933e3ed5a17d76bd7bded793436ea207885f395ace3fc12126c205b170be392c1645233ef01f9661090706a65f63b4845dc2884a20711a8024ad4af44aeec9db33991dae38d95cdb7132970d0d4dec58b9d46d378", 0xa3, 0x6}, {&(0x7f0000000380)="05f82c760d277896dd8c9891a41aafe24124891a32a238c3c78696d112aa09f3ae5c54b0c08676da5db7f358c72dfaca9a5d90860b4ae363c9a921c47965d339c23408a6d9b31a23aee27822f0a140d8e4ec9475a740113f2b9923b46333110e528e0a513151aad34aee1b5310fcf62c1982349253003d6d53aebbe09cf5918668ee682be93b6a671bbc", 0x8a, 0x3}], 0x2000400, &(0x7f0000000440)={[{@balloc_no_unhash_reloc}, {@nolargeio}, {@grpjquota}], [{@obj_role={'obj_role', 0x3d, '^'}}, {@hash}, {@uid_lt}, {@mask={'mask', 0x3d, 'MAY_EXEC'}}, {@uid_lt={'uid<', 0xee00}}, {@smackfsfloor={'smackfsfloor', 0x3d, ':%#[@'}}, {@obj_user={'obj_user', 0x3d, ',\\*),i'}}, {@uid_eq={'uid', 0x3d, 0xee00}}, {@seclabel}, {@uid_lt={'uid<', 0xee00}}]})

06:19:09 executing program 3:
mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800004, 0x12, 0xffffffffffffffff, 0x0)
preadv(0xffffffffffffffff, &(0x7f00000001c0)=[{0x0}], 0x1, 0x9, 0x0)
r0 = socket$unix(0x1, 0x1, 0x0)
close(r0)

06:19:09 executing program 1:
r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0)
mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800004, 0x12, 0xffffffffffffffff, 0x0)
preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x9, 0x0)
mmap(&(0x7f0000000000/0xa000)=nil, 0xa000, 0x2, 0x2172, 0xffffffffffffffff, 0x0)
r1 = socket$unix(0x1, 0x1, 0x0)
bind$unix(r1, &(0x7f00000001c0)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x56)
close(r1)

[  351.843292][T15916] loop0: detected capacity change from 0 to 64
06:19:09 executing program 3:
mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800004, 0x12, 0xffffffffffffffff, 0x0)
preadv(0xffffffffffffffff, &(0x7f00000001c0)=[{0x0}], 0x1, 0x9, 0x0)
r0 = socket$unix(0x1, 0x1, 0x0)
close(r0)

[  351.875076][T15916] REISERFS warning (device loop0): super-6504 reiserfs_getopt: the option "nolargeio" requires an argument
[  351.875076][T15916] 
06:19:09 executing program 1:
r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0)
mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800004, 0x12, r0, 0x0)
preadv(0xffffffffffffffff, &(0x7f00000001c0)=[{0x0}], 0x1, 0x9, 0x0)
mmap(&(0x7f0000000000/0xa000)=nil, 0xa000, 0x2, 0x2172, 0xffffffffffffffff, 0x0)
r1 = socket$unix(0x1, 0x1, 0x0)
bind$unix(r1, &(0x7f00000001c0)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x56)
close(r1)

06:19:09 executing program 3:
mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800004, 0x12, 0xffffffffffffffff, 0x0)
preadv(0xffffffffffffffff, &(0x7f00000001c0)=[{0x0}], 0x1, 0x9, 0x0)
r0 = socket$unix(0x1, 0x1, 0x0)
close(r0)

06:19:09 executing program 0:
r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0)
mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800004, 0x12, r0, 0x0)
preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x0, 0x0)
mmap(&(0x7f0000000000/0xa000)=nil, 0xa000, 0x2, 0x2172, 0xffffffffffffffff, 0x0)
syz_mount_image$reiserfs(&(0x7f0000000140), &(0x7f0000000180)='./file0\x00', 0x8000, 0x3, &(0x7f0000000300)=[{&(0x7f0000000540)="21d37ef07e82e237fbe1b40158d20e242c5ea1f9d9edc6b9395250085d6dfa486982e82d4ce1a5e2bc00d29383bae640de", 0x31, 0x7}, {&(0x7f0000000240)="c43f281f483aa6cd83e40e59d53f177299d285bbe5d90aab2b56a76f9db49d86afa5a0f601ba9b3502de5f3724f3ec00927151f928f668b362052950a2e8f16baec29875fdad59395e86a1050c368933e3ed5a17d76bd7bded793436ea207885f395ace3fc12126c205b170be392c1645233ef01f9661090706a65f63b4845dc2884a20711a8024ad4af44aeec9db33991dae38d95cdb7132970d0d4dec58b9d46d378", 0xa3, 0x6}, {&(0x7f0000000380)="05f82c760d277896dd8c9891a41aafe24124891a32a238c3c78696d112aa09f3ae5c54b0c08676da5db7f358c72dfaca9a5d90860b4ae363c9a921c47965d339c23408a6d9b31a23aee27822f0a140d8e4ec9475a740113f2b9923b46333110e528e0a513151aad34aee1b5310fcf62c1982349253003d6d53aebbe09cf5918668ee682be93b6a671bbc", 0x8a, 0x3}], 0x2000400, &(0x7f0000000440)={[{@balloc_no_unhash_reloc}, {@nolargeio}, {@grpjquota}], [{@obj_role={'obj_role', 0x3d, '^'}}, {@hash}, {@uid_lt}, {@mask={'mask', 0x3d, 'MAY_EXEC'}}, {@uid_lt={'uid<', 0xee00}}, {@smackfsfloor={'smackfsfloor', 0x3d, ':%#[@'}}, {@obj_user={'obj_user', 0x3d, ',\\*),i'}}, {@uid_eq={'uid', 0x3d, 0xee00}}, {@seclabel}, {@uid_lt={'uid<', 0xee00}}]})

[  352.035977][T15931] loop0: detected capacity change from 0 to 64
[  352.050510][T15931] REISERFS warning (device loop0): super-6504 reiserfs_getopt: the option "nolargeio" requires an argument
[  352.050510][T15931] 
06:19:10 executing program 2:
r0 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000680), 0xffffffffffffffff)
ioctl$sock_SIOCGIFINDEX_80211(0xffffffffffffffff, 0x8933, &(0x7f0000000c00)={'wlan1\x00'})
r1 = socket$nl_generic(0x10, 0x3, 0x10)
ioctl$sock_SIOCGIFINDEX_80211(r1, 0x8933, &(0x7f0000000e40)={'wlan0\x00', <r2=>0x0})
sendmsg$NL80211_CMD_TRIGGER_SCAN(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000f40)={&(0x7f0000000000)=ANY=[@ANYBLOB='$\x00\x00\x00', @ANYRES16=r0, @ANYBLOB="010000000000000000002100000008000300", @ANYRES32=r2, @ANYBLOB="08009e"], 0x24}}, 0x0)
sendmsg$NL80211_CMD_FRAME(0xffffffffffffffff, &(0x7f0000000100)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f00000000c0)={&(0x7f0000000c40)=ANY=[@ANYBLOB="2000000059c89a20a00fadf00ada0277887124d85c2b6f27e866a2f2434f0213672fd63827c4c50f5346d89412d5351da4a233d419db04d5f089f764866116182e7757ccfd", @ANYRES16=r0, @ANYBLOB="00022dbd7000fedbdf253b0000000c0099007f000000470000000c00cd001f000400070000ff04008e00"], 0x30}, 0x1, 0x0, 0x0, 0x44}, 0x40000)
r3 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0)
mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800004, 0x12, r3, 0x0)
r4 = syz_open_dev$tty1(0xc, 0x4, 0x1)
write$binfmt_elf64(r4, &(0x7f0000000380)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x80, 0x1, 0x9, 0x1, 0x2, 0x3e, 0x7ff, 0x1f2, 0x40, 0x1f4, 0xbfa, 0x3, 0x38, 0x1, 0x5, 0x4, 0x4}, [{0x5, 0x9, 0x6, 0x101, 0x6, 0x4, 0x9, 0x6}, {0x5, 0x3, 0x5e61, 0x80000000, 0xcc3, 0x9, 0x7, 0x8}], "d1660f10e0ac4a6edbf3aa53803c8f57ef2a12069e82553332d2b96d67f2dbc5b04959dad57c303d876233684f5e9ad402a193da791e11122f2cccbf10d6d499f5e16385d09f63891a965d80bcb68b551fabffb4bf0b5c372b4d69cdefac988201a40429a8d0dc699820193afcab08070fde89c22e16b43dde5e37d9a3df0cd352e8667f163774d9dc3c79571e5100046281", ['\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00']}, 0x842)

06:19:10 executing program 1:
r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0)
mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800004, 0x12, r0, 0x0)
preadv(0xffffffffffffffff, &(0x7f00000001c0)=[{0x0}], 0x1, 0x9, 0x0)
mmap(&(0x7f0000000000/0xa000)=nil, 0xa000, 0x2, 0x2172, 0xffffffffffffffff, 0x0)
r1 = socket$unix(0x1, 0x1, 0x0)
bind$unix(r1, &(0x7f00000001c0)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x56)
close(r1)

06:19:10 executing program 3:
r0 = openat(0xffffffffffffffff, 0x0, 0x0, 0x0)
mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800004, 0x12, r0, 0x0)
preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x9, 0x0)
r1 = socket$unix(0x1, 0x1, 0x0)
close(r1)

06:19:10 executing program 0:
r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0)
mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800004, 0x12, r0, 0x0)
preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x9, 0x0)
mmap(&(0x7f0000000000/0xa000)=nil, 0xa000, 0x0, 0x2172, 0xffffffffffffffff, 0x0)
syz_mount_image$reiserfs(&(0x7f0000000140), &(0x7f0000000180)='./file0\x00', 0x8000, 0x3, &(0x7f0000000300)=[{&(0x7f0000000540)="21d37ef07e82e237fbe1b40158d20e242c5ea1f9d9edc6b9395250085d6dfa486982e82d4ce1a5e2bc00d29383bae640de", 0x31, 0x7}, {&(0x7f0000000240)="c43f281f483aa6cd83e40e59d53f177299d285bbe5d90aab2b56a76f9db49d86afa5a0f601ba9b3502de5f3724f3ec00927151f928f668b362052950a2e8f16baec29875fdad59395e86a1050c368933e3ed5a17d76bd7bded793436ea207885f395ace3fc12126c205b170be392c1645233ef01f9661090706a65f63b4845dc2884a20711a8024ad4af44aeec9db33991dae38d95cdb7132970d0d4dec58b9d46d378", 0xa3, 0x6}, {&(0x7f0000000380)="05f82c760d277896dd8c9891a41aafe24124891a32a238c3c78696d112aa09f3ae5c54b0c08676da5db7f358c72dfaca9a5d90860b4ae363c9a921c47965d339c23408a6d9b31a23aee27822f0a140d8e4ec9475a740113f2b9923b46333110e528e0a513151aad34aee1b5310fcf62c1982349253003d6d53aebbe09cf5918668ee682be93b6a671bbc", 0x8a, 0x3}], 0x2000400, &(0x7f0000000440)={[{@balloc_no_unhash_reloc}, {@nolargeio}, {@grpjquota}], [{@obj_role={'obj_role', 0x3d, '^'}}, {@hash}, {@uid_lt}, {@mask={'mask', 0x3d, 'MAY_EXEC'}}, {@uid_lt={'uid<', 0xee00}}, {@smackfsfloor={'smackfsfloor', 0x3d, ':%#[@'}}, {@obj_user={'obj_user', 0x3d, ',\\*),i'}}, {@uid_eq={'uid', 0x3d, 0xee00}}, {@seclabel}, {@uid_lt={'uid<', 0xee00}}]})

06:19:10 executing program 1:
r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0)
mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800004, 0x12, r0, 0x0)
preadv(0xffffffffffffffff, &(0x7f00000001c0)=[{0x0}], 0x1, 0x9, 0x0)
mmap(&(0x7f0000000000/0xa000)=nil, 0xa000, 0x2, 0x2172, 0xffffffffffffffff, 0x0)
r1 = socket$unix(0x1, 0x1, 0x0)
bind$unix(r1, &(0x7f00000001c0)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x56)
close(r1)

06:19:10 executing program 0:
r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0)
mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800004, 0x12, r0, 0x0)
preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x9, 0x0)
mmap(&(0x7f0000000000/0xa000)=nil, 0xa000, 0x0, 0x2172, 0xffffffffffffffff, 0x0)
syz_mount_image$reiserfs(&(0x7f0000000140), &(0x7f0000000180)='./file0\x00', 0x8000, 0x3, &(0x7f0000000300)=[{&(0x7f0000000540)="21d37ef07e82e237fbe1b40158d20e242c5ea1f9d9edc6b9395250085d6dfa486982e82d4ce1a5e2bc00d29383bae640de", 0x31, 0x7}, {&(0x7f0000000240)="c43f281f483aa6cd83e40e59d53f177299d285bbe5d90aab2b56a76f9db49d86afa5a0f601ba9b3502de5f3724f3ec00927151f928f668b362052950a2e8f16baec29875fdad59395e86a1050c368933e3ed5a17d76bd7bded793436ea207885f395ace3fc12126c205b170be392c1645233ef01f9661090706a65f63b4845dc2884a20711a8024ad4af44aeec9db33991dae38d95cdb7132970d0d4dec58b9d46d378", 0xa3, 0x6}, {&(0x7f0000000380)="05f82c760d277896dd8c9891a41aafe24124891a32a238c3c78696d112aa09f3ae5c54b0c08676da5db7f358c72dfaca9a5d90860b4ae363c9a921c47965d339c23408a6d9b31a23aee27822f0a140d8e4ec9475a740113f2b9923b46333110e528e0a513151aad34aee1b5310fcf62c1982349253003d6d53aebbe09cf5918668ee682be93b6a671bbc", 0x8a, 0x3}], 0x2000400, &(0x7f0000000440)={[{@balloc_no_unhash_reloc}, {@nolargeio}, {@grpjquota}], [{@obj_role={'obj_role', 0x3d, '^'}}, {@hash}, {@uid_lt}, {@mask={'mask', 0x3d, 'MAY_EXEC'}}, {@uid_lt={'uid<', 0xee00}}, {@smackfsfloor={'smackfsfloor', 0x3d, ':%#[@'}}, {@obj_user={'obj_user', 0x3d, ',\\*),i'}}, {@uid_eq={'uid', 0x3d, 0xee00}}, {@seclabel}, {@uid_lt={'uid<', 0xee00}}]})

06:19:10 executing program 3:
r0 = openat(0xffffffffffffffff, 0x0, 0x0, 0x0)
mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800004, 0x12, r0, 0x0)
preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x9, 0x0)
r1 = socket$unix(0x1, 0x1, 0x0)
close(r1)

06:19:10 executing program 0:
r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0)
mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800004, 0x12, r0, 0x0)
preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x9, 0x0)
mmap(&(0x7f0000000000/0xa000)=nil, 0xa000, 0x0, 0x2172, 0xffffffffffffffff, 0x0)
syz_mount_image$reiserfs(&(0x7f0000000140), &(0x7f0000000180)='./file0\x00', 0x8000, 0x3, &(0x7f0000000300)=[{&(0x7f0000000540)="21d37ef07e82e237fbe1b40158d20e242c5ea1f9d9edc6b9395250085d6dfa486982e82d4ce1a5e2bc00d29383bae640de", 0x31, 0x7}, {&(0x7f0000000240)="c43f281f483aa6cd83e40e59d53f177299d285bbe5d90aab2b56a76f9db49d86afa5a0f601ba9b3502de5f3724f3ec00927151f928f668b362052950a2e8f16baec29875fdad59395e86a1050c368933e3ed5a17d76bd7bded793436ea207885f395ace3fc12126c205b170be392c1645233ef01f9661090706a65f63b4845dc2884a20711a8024ad4af44aeec9db33991dae38d95cdb7132970d0d4dec58b9d46d378", 0xa3, 0x6}, {&(0x7f0000000380)="05f82c760d277896dd8c9891a41aafe24124891a32a238c3c78696d112aa09f3ae5c54b0c08676da5db7f358c72dfaca9a5d90860b4ae363c9a921c47965d339c23408a6d9b31a23aee27822f0a140d8e4ec9475a740113f2b9923b46333110e528e0a513151aad34aee1b5310fcf62c1982349253003d6d53aebbe09cf5918668ee682be93b6a671bbc", 0x8a, 0x3}], 0x2000400, &(0x7f0000000440)={[{@balloc_no_unhash_reloc}, {@nolargeio}, {@grpjquota}], [{@obj_role={'obj_role', 0x3d, '^'}}, {@hash}, {@uid_lt}, {@mask={'mask', 0x3d, 'MAY_EXEC'}}, {@uid_lt={'uid<', 0xee00}}, {@smackfsfloor={'smackfsfloor', 0x3d, ':%#[@'}}, {@obj_user={'obj_user', 0x3d, ',\\*),i'}}, {@uid_eq={'uid', 0x3d, 0xee00}}, {@seclabel}, {@uid_lt={'uid<', 0xee00}}]})

06:19:11 executing program 1:
r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0)
mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800004, 0x12, r0, 0x0)
preadv(r0, 0x0, 0x0, 0x9, 0x0)
mmap(&(0x7f0000000000/0xa000)=nil, 0xa000, 0x2, 0x2172, 0xffffffffffffffff, 0x0)
r1 = socket$unix(0x1, 0x1, 0x0)
bind$unix(r1, &(0x7f00000001c0)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x56)
close(r1)

06:19:11 executing program 0:
r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0)
mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800004, 0x12, r0, 0x0)
preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x9, 0x0)
mmap(&(0x7f0000000000/0xa000)=nil, 0xa000, 0x2, 0x10, 0xffffffffffffffff, 0x0)
syz_mount_image$reiserfs(&(0x7f0000000140), &(0x7f0000000180)='./file0\x00', 0x8000, 0x3, &(0x7f0000000300)=[{&(0x7f0000000540)="21d37ef07e82e237fbe1b40158d20e242c5ea1f9d9edc6b9395250085d6dfa486982e82d4ce1a5e2bc00d29383bae640de", 0x31, 0x7}, {&(0x7f0000000240)="c43f281f483aa6cd83e40e59d53f177299d285bbe5d90aab2b56a76f9db49d86afa5a0f601ba9b3502de5f3724f3ec00927151f928f668b362052950a2e8f16baec29875fdad59395e86a1050c368933e3ed5a17d76bd7bded793436ea207885f395ace3fc12126c205b170be392c1645233ef01f9661090706a65f63b4845dc2884a20711a8024ad4af44aeec9db33991dae38d95cdb7132970d0d4dec58b9d46d378", 0xa3, 0x6}, {&(0x7f0000000380)="05f82c760d277896dd8c9891a41aafe24124891a32a238c3c78696d112aa09f3ae5c54b0c08676da5db7f358c72dfaca9a5d90860b4ae363c9a921c47965d339c23408a6d9b31a23aee27822f0a140d8e4ec9475a740113f2b9923b46333110e528e0a513151aad34aee1b5310fcf62c1982349253003d6d53aebbe09cf5918668ee682be93b6a671bbc", 0x8a, 0x3}], 0x2000400, &(0x7f0000000440)={[{@balloc_no_unhash_reloc}, {@nolargeio}, {@grpjquota}], [{@obj_role={'obj_role', 0x3d, '^'}}, {@hash}, {@uid_lt}, {@mask={'mask', 0x3d, 'MAY_EXEC'}}, {@uid_lt={'uid<', 0xee00}}, {@smackfsfloor={'smackfsfloor', 0x3d, ':%#[@'}}, {@obj_user={'obj_user', 0x3d, ',\\*),i'}}, {@uid_eq={'uid', 0x3d, 0xee00}}, {@seclabel}, {@uid_lt={'uid<', 0xee00}}]})

06:19:11 executing program 2:
r0 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000680), 0xffffffffffffffff)
ioctl$sock_SIOCGIFINDEX_80211(0xffffffffffffffff, 0x8933, &(0x7f0000000c00)={'wlan1\x00'})
r1 = socket$nl_generic(0x10, 0x3, 0x10)
ioctl$sock_SIOCGIFINDEX_80211(r1, 0x8933, &(0x7f0000000e40)={'wlan0\x00', <r2=>0x0})
sendmsg$NL80211_CMD_TRIGGER_SCAN(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000f40)={&(0x7f0000000000)=ANY=[@ANYBLOB='$\x00\x00\x00', @ANYRES16=r0, @ANYBLOB="010000000000000000002100000008000300", @ANYRES32=r2, @ANYBLOB="08009e"], 0x24}}, 0x0)
sendmsg$NL80211_CMD_FRAME(0xffffffffffffffff, &(0x7f0000000100)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f00000000c0)={&(0x7f0000000c40)=ANY=[@ANYBLOB="2000000059c89a20a00fadf00ada0277887124d85c2b6f27e866a2f2434f0213672fd63827c4c50f5346d89412d5351da4a233d419db04d5f089f764866116182e7757ccfd", @ANYRES16=r0, @ANYBLOB="00022dbd7000fedbdf253b0000000c0099007f000000470000000c00cd001f000400070000ff04008e00"], 0x30}, 0x1, 0x0, 0x0, 0x44}, 0x40000)
r3 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0)
preadv(r3, &(0x7f00000001c0)=[{0x0}], 0x1, 0x9, 0x0)
r4 = syz_open_dev$tty1(0xc, 0x4, 0x1)
write$binfmt_elf64(r4, &(0x7f0000000380)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x80, 0x1, 0x9, 0x1, 0x2, 0x3e, 0x7ff, 0x1f2, 0x40, 0x1f4, 0xbfa, 0x3, 0x38, 0x1, 0x5, 0x4, 0x4}, [{0x5, 0x9, 0x6, 0x101, 0x6, 0x4, 0x9, 0x6}, {0x5, 0x3, 0x5e61, 0x80000000, 0xcc3, 0x9, 0x7, 0x8}], "d1660f10e0ac4a6edbf3aa53803c8f57ef2a12069e82553332d2b96d67f2dbc5b04959dad57c303d876233684f5e9ad402a193da791e11122f2cccbf10d6d499f5e16385d09f63891a965d80bcb68b551fabffb4bf0b5c372b4d69cdefac988201a40429a8d0dc699820193afcab08070fde89c22e16b43dde5e37d9a3df0cd352e8667f163774d9dc3c79571e5100046281", ['\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00']}, 0x842)

06:19:11 executing program 3:
r0 = openat(0xffffffffffffffff, 0x0, 0x0, 0x0)
mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800004, 0x12, r0, 0x0)
preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x9, 0x0)
r1 = socket$unix(0x1, 0x1, 0x0)
close(r1)

06:19:11 executing program 1:
r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0)
mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800004, 0x12, r0, 0x0)
preadv(r0, 0x0, 0x0, 0x9, 0x0)
mmap(&(0x7f0000000000/0xa000)=nil, 0xa000, 0x2, 0x2172, 0xffffffffffffffff, 0x0)
r1 = socket$unix(0x1, 0x1, 0x0)
bind$unix(r1, &(0x7f00000001c0)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x56)
close(r1)

06:19:11 executing program 0:
r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0)
mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800004, 0x12, r0, 0x0)
preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x9, 0x0)
mmap(&(0x7f0000000000/0xa000)=nil, 0xa000, 0x2, 0x10, 0xffffffffffffffff, 0x0)
syz_mount_image$reiserfs(&(0x7f0000000140), &(0x7f0000000180)='./file0\x00', 0x8000, 0x3, &(0x7f0000000300)=[{&(0x7f0000000540)="21d37ef07e82e237fbe1b40158d20e242c5ea1f9d9edc6b9395250085d6dfa486982e82d4ce1a5e2bc00d29383bae640de", 0x31, 0x7}, {&(0x7f0000000240)="c43f281f483aa6cd83e40e59d53f177299d285bbe5d90aab2b56a76f9db49d86afa5a0f601ba9b3502de5f3724f3ec00927151f928f668b362052950a2e8f16baec29875fdad59395e86a1050c368933e3ed5a17d76bd7bded793436ea207885f395ace3fc12126c205b170be392c1645233ef01f9661090706a65f63b4845dc2884a20711a8024ad4af44aeec9db33991dae38d95cdb7132970d0d4dec58b9d46d378", 0xa3, 0x6}, {&(0x7f0000000380)="05f82c760d277896dd8c9891a41aafe24124891a32a238c3c78696d112aa09f3ae5c54b0c08676da5db7f358c72dfaca9a5d90860b4ae363c9a921c47965d339c23408a6d9b31a23aee27822f0a140d8e4ec9475a740113f2b9923b46333110e528e0a513151aad34aee1b5310fcf62c1982349253003d6d53aebbe09cf5918668ee682be93b6a671bbc", 0x8a, 0x3}], 0x2000400, &(0x7f0000000440)={[{@balloc_no_unhash_reloc}, {@nolargeio}, {@grpjquota}], [{@obj_role={'obj_role', 0x3d, '^'}}, {@hash}, {@uid_lt}, {@mask={'mask', 0x3d, 'MAY_EXEC'}}, {@uid_lt={'uid<', 0xee00}}, {@smackfsfloor={'smackfsfloor', 0x3d, ':%#[@'}}, {@obj_user={'obj_user', 0x3d, ',\\*),i'}}, {@uid_eq={'uid', 0x3d, 0xee00}}, {@seclabel}, {@uid_lt={'uid<', 0xee00}}]})

06:19:11 executing program 3:
r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0)
mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x0, 0x12, r0, 0x0)
preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x9, 0x0)
r1 = socket$unix(0x1, 0x1, 0x0)
close(r1)

06:19:11 executing program 3:
r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0)
mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x0, 0x12, r0, 0x0)
preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x9, 0x0)
r1 = socket$unix(0x1, 0x1, 0x0)
close(r1)

06:19:11 executing program 0:
r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0)
mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800004, 0x12, r0, 0x0)
preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x9, 0x0)
mmap(&(0x7f0000000000/0xa000)=nil, 0xa000, 0x2, 0x10, 0xffffffffffffffff, 0x0)
syz_mount_image$reiserfs(&(0x7f0000000140), &(0x7f0000000180)='./file0\x00', 0x8000, 0x3, &(0x7f0000000300)=[{&(0x7f0000000540)="21d37ef07e82e237fbe1b40158d20e242c5ea1f9d9edc6b9395250085d6dfa486982e82d4ce1a5e2bc00d29383bae640de", 0x31, 0x7}, {&(0x7f0000000240)="c43f281f483aa6cd83e40e59d53f177299d285bbe5d90aab2b56a76f9db49d86afa5a0f601ba9b3502de5f3724f3ec00927151f928f668b362052950a2e8f16baec29875fdad59395e86a1050c368933e3ed5a17d76bd7bded793436ea207885f395ace3fc12126c205b170be392c1645233ef01f9661090706a65f63b4845dc2884a20711a8024ad4af44aeec9db33991dae38d95cdb7132970d0d4dec58b9d46d378", 0xa3, 0x6}, {&(0x7f0000000380)="05f82c760d277896dd8c9891a41aafe24124891a32a238c3c78696d112aa09f3ae5c54b0c08676da5db7f358c72dfaca9a5d90860b4ae363c9a921c47965d339c23408a6d9b31a23aee27822f0a140d8e4ec9475a740113f2b9923b46333110e528e0a513151aad34aee1b5310fcf62c1982349253003d6d53aebbe09cf5918668ee682be93b6a671bbc", 0x8a, 0x3}], 0x2000400, &(0x7f0000000440)={[{@balloc_no_unhash_reloc}, {@nolargeio}, {@grpjquota}], [{@obj_role={'obj_role', 0x3d, '^'}}, {@hash}, {@uid_lt}, {@mask={'mask', 0x3d, 'MAY_EXEC'}}, {@uid_lt={'uid<', 0xee00}}, {@smackfsfloor={'smackfsfloor', 0x3d, ':%#[@'}}, {@obj_user={'obj_user', 0x3d, ',\\*),i'}}, {@uid_eq={'uid', 0x3d, 0xee00}}, {@seclabel}, {@uid_lt={'uid<', 0xee00}}]})

06:19:11 executing program 1:
r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0)
mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800004, 0x12, r0, 0x0)
preadv(r0, 0x0, 0x0, 0x9, 0x0)
mmap(&(0x7f0000000000/0xa000)=nil, 0xa000, 0x2, 0x2172, 0xffffffffffffffff, 0x0)
r1 = socket$unix(0x1, 0x1, 0x0)
bind$unix(r1, &(0x7f00000001c0)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x56)
close(r1)

06:19:12 executing program 2:
r0 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000680), 0xffffffffffffffff)
ioctl$sock_SIOCGIFINDEX_80211(0xffffffffffffffff, 0x8933, &(0x7f0000000c00)={'wlan1\x00'})
r1 = socket$nl_generic(0x10, 0x3, 0x10)
ioctl$sock_SIOCGIFINDEX_80211(r1, 0x8933, &(0x7f0000000e40)={'wlan0\x00', <r2=>0x0})
sendmsg$NL80211_CMD_TRIGGER_SCAN(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000f40)={&(0x7f0000000000)=ANY=[@ANYBLOB='$\x00\x00\x00', @ANYRES16=r0, @ANYBLOB="010000000000000000002100000008000300", @ANYRES32=r2, @ANYBLOB="08009e"], 0x24}}, 0x0)
sendmsg$NL80211_CMD_FRAME(0xffffffffffffffff, &(0x7f0000000100)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f00000000c0)={&(0x7f0000000c40)=ANY=[@ANYBLOB="2000000059c89a20a00fadf00ada0277887124d85c2b6f27e866a2f2434f0213672fd63827c4c50f5346d89412d5351da4a233d419db04d5f089f764866116182e7757ccfd", @ANYRES16=r0, @ANYBLOB="00022dbd7000fedbdf253b0000000c0099007f000000470000000c00cd001f000400070000ff04008e00"], 0x30}, 0x1, 0x0, 0x0, 0x44}, 0x40000)
r3 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0)
preadv(r3, &(0x7f00000001c0)=[{0x0}], 0x1, 0x9, 0x0)
r4 = syz_open_dev$tty1(0xc, 0x4, 0x1)
write$binfmt_elf64(r4, &(0x7f0000000380)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x80, 0x1, 0x9, 0x1, 0x2, 0x3e, 0x7ff, 0x1f2, 0x40, 0x1f4, 0xbfa, 0x3, 0x38, 0x1, 0x5, 0x4, 0x4}, [{0x5, 0x9, 0x6, 0x101, 0x6, 0x4, 0x9, 0x6}, {0x5, 0x3, 0x5e61, 0x80000000, 0xcc3, 0x9, 0x7, 0x8}], "d1660f10e0ac4a6edbf3aa53803c8f57ef2a12069e82553332d2b96d67f2dbc5b04959dad57c303d876233684f5e9ad402a193da791e11122f2cccbf10d6d499f5e16385d09f63891a965d80bcb68b551fabffb4bf0b5c372b4d69cdefac988201a40429a8d0dc699820193afcab08070fde89c22e16b43dde5e37d9a3df0cd352e8667f163774d9dc3c79571e5100046281", ['\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00']}, 0x842)

06:19:12 executing program 3:
r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0)
mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x0, 0x12, r0, 0x0)
preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x9, 0x0)
r1 = socket$unix(0x1, 0x1, 0x0)
close(r1)

06:19:12 executing program 1:
r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0)
mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800004, 0x12, r0, 0x0)
preadv(r0, &(0x7f00000001c0), 0x0, 0x9, 0x0)
mmap(&(0x7f0000000000/0xa000)=nil, 0xa000, 0x2, 0x2172, 0xffffffffffffffff, 0x0)
r1 = socket$unix(0x1, 0x1, 0x0)
bind$unix(r1, &(0x7f00000001c0)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x56)
close(r1)

06:19:12 executing program 0:
r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0)
mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800004, 0x12, r0, 0x0)
preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x9, 0x0)
mmap(&(0x7f0000000000/0xa000)=nil, 0xa000, 0x2, 0x2172, 0xffffffffffffffff, 0x0)
syz_mount_image$reiserfs(0x0, &(0x7f0000000180)='./file0\x00', 0x8000, 0x3, &(0x7f0000000300)=[{&(0x7f0000000540)="21d37ef07e82e237fbe1b40158d20e242c5ea1f9d9edc6b9395250085d6dfa486982e82d4ce1a5e2bc00d29383bae640de", 0x31, 0x7}, {&(0x7f0000000240)="c43f281f483aa6cd83e40e59d53f177299d285bbe5d90aab2b56a76f9db49d86afa5a0f601ba9b3502de5f3724f3ec00927151f928f668b362052950a2e8f16baec29875fdad59395e86a1050c368933e3ed5a17d76bd7bded793436ea207885f395ace3fc12126c205b170be392c1645233ef01f9661090706a65f63b4845dc2884a20711a8024ad4af44aeec9db33991dae38d95cdb7132970d0d4dec58b9d46d378", 0xa3, 0x6}, {&(0x7f0000000380)="05f82c760d277896dd8c9891a41aafe24124891a32a238c3c78696d112aa09f3ae5c54b0c08676da5db7f358c72dfaca9a5d90860b4ae363c9a921c47965d339c23408a6d9b31a23aee27822f0a140d8e4ec9475a740113f2b9923b46333110e528e0a513151aad34aee1b5310fcf62c1982349253003d6d53aebbe09cf5918668ee682be93b6a671bbc", 0x8a, 0x3}], 0x2000400, &(0x7f0000000440)={[{@balloc_no_unhash_reloc}, {@nolargeio}, {@grpjquota}], [{@obj_role={'obj_role', 0x3d, '^'}}, {@hash}, {@uid_lt}, {@mask={'mask', 0x3d, 'MAY_EXEC'}}, {@uid_lt={'uid<', 0xee00}}, {@smackfsfloor={'smackfsfloor', 0x3d, ':%#[@'}}, {@obj_user={'obj_user', 0x3d, ',\\*),i'}}, {@uid_eq={'uid', 0x3d, 0xee00}}, {@seclabel}, {@uid_lt={'uid<', 0xee00}}]})

[  354.664043][T15989] loop0: detected capacity change from 0 to 64
06:19:12 executing program 3:
r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0)
mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800004, 0x10, r0, 0x0)
preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x9, 0x0)
r1 = socket$unix(0x1, 0x1, 0x0)
close(r1)

06:19:12 executing program 1:
r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0)
mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800004, 0x12, r0, 0x0)
preadv(r0, &(0x7f00000001c0), 0x0, 0x9, 0x0)
mmap(&(0x7f0000000000/0xa000)=nil, 0xa000, 0x2, 0x2172, 0xffffffffffffffff, 0x0)
r1 = socket$unix(0x1, 0x1, 0x0)
bind$unix(r1, &(0x7f00000001c0)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x56)
close(r1)

06:19:12 executing program 0:
r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0)
mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800004, 0x12, r0, 0x0)
preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x9, 0x0)
mmap(&(0x7f0000000000/0xa000)=nil, 0xa000, 0x2, 0x2172, 0xffffffffffffffff, 0x0)
syz_mount_image$reiserfs(0x0, &(0x7f0000000180)='./file0\x00', 0x8000, 0x3, &(0x7f0000000300)=[{&(0x7f0000000540)="21d37ef07e82e237fbe1b40158d20e242c5ea1f9d9edc6b9395250085d6dfa486982e82d4ce1a5e2bc00d29383bae640de", 0x31, 0x7}, {&(0x7f0000000240)="c43f281f483aa6cd83e40e59d53f177299d285bbe5d90aab2b56a76f9db49d86afa5a0f601ba9b3502de5f3724f3ec00927151f928f668b362052950a2e8f16baec29875fdad59395e86a1050c368933e3ed5a17d76bd7bded793436ea207885f395ace3fc12126c205b170be392c1645233ef01f9661090706a65f63b4845dc2884a20711a8024ad4af44aeec9db33991dae38d95cdb7132970d0d4dec58b9d46d378", 0xa3, 0x6}, {&(0x7f0000000380)="05f82c760d277896dd8c9891a41aafe24124891a32a238c3c78696d112aa09f3ae5c54b0c08676da5db7f358c72dfaca9a5d90860b4ae363c9a921c47965d339c23408a6d9b31a23aee27822f0a140d8e4ec9475a740113f2b9923b46333110e528e0a513151aad34aee1b5310fcf62c1982349253003d6d53aebbe09cf5918668ee682be93b6a671bbc", 0x8a, 0x3}], 0x2000400, &(0x7f0000000440)={[{@balloc_no_unhash_reloc}, {@nolargeio}, {@grpjquota}], [{@obj_role={'obj_role', 0x3d, '^'}}, {@hash}, {@uid_lt}, {@mask={'mask', 0x3d, 'MAY_EXEC'}}, {@uid_lt={'uid<', 0xee00}}, {@smackfsfloor={'smackfsfloor', 0x3d, ':%#[@'}}, {@obj_user={'obj_user', 0x3d, ',\\*),i'}}, {@uid_eq={'uid', 0x3d, 0xee00}}, {@seclabel}, {@uid_lt={'uid<', 0xee00}}]})

06:19:12 executing program 3:
r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0)
mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800004, 0x10, r0, 0x0)
preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x9, 0x0)
r1 = socket$unix(0x1, 0x1, 0x0)
close(r1)

[  355.010278][T16004] loop0: detected capacity change from 0 to 64
06:19:13 executing program 2:
r0 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000680), 0xffffffffffffffff)
ioctl$sock_SIOCGIFINDEX_80211(0xffffffffffffffff, 0x8933, &(0x7f0000000c00)={'wlan1\x00'})
r1 = socket$nl_generic(0x10, 0x3, 0x10)
ioctl$sock_SIOCGIFINDEX_80211(r1, 0x8933, &(0x7f0000000e40)={'wlan0\x00', <r2=>0x0})
sendmsg$NL80211_CMD_TRIGGER_SCAN(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000f40)={&(0x7f0000000000)=ANY=[@ANYBLOB='$\x00\x00\x00', @ANYRES16=r0, @ANYBLOB="010000000000000000002100000008000300", @ANYRES32=r2, @ANYBLOB="08009e"], 0x24}}, 0x0)
sendmsg$NL80211_CMD_FRAME(0xffffffffffffffff, &(0x7f0000000100)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f00000000c0)={&(0x7f0000000c40)=ANY=[@ANYBLOB="2000000059c89a20a00fadf00ada0277887124d85c2b6f27e866a2f2434f0213672fd63827c4c50f5346d89412d5351da4a233d419db04d5f089f764866116182e7757ccfd", @ANYRES16=r0, @ANYBLOB="00022dbd7000fedbdf253b0000000c0099007f000000470000000c00cd001f000400070000ff04008e00"], 0x30}, 0x1, 0x0, 0x0, 0x44}, 0x40000)
r3 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0)
preadv(r3, &(0x7f00000001c0)=[{0x0}], 0x1, 0x9, 0x0)
r4 = syz_open_dev$tty1(0xc, 0x4, 0x1)
write$binfmt_elf64(r4, &(0x7f0000000380)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x80, 0x1, 0x9, 0x1, 0x2, 0x3e, 0x7ff, 0x1f2, 0x40, 0x1f4, 0xbfa, 0x3, 0x38, 0x1, 0x5, 0x4, 0x4}, [{0x5, 0x9, 0x6, 0x101, 0x6, 0x4, 0x9, 0x6}, {0x5, 0x3, 0x5e61, 0x80000000, 0xcc3, 0x9, 0x7, 0x8}], "d1660f10e0ac4a6edbf3aa53803c8f57ef2a12069e82553332d2b96d67f2dbc5b04959dad57c303d876233684f5e9ad402a193da791e11122f2cccbf10d6d499f5e16385d09f63891a965d80bcb68b551fabffb4bf0b5c372b4d69cdefac988201a40429a8d0dc699820193afcab08070fde89c22e16b43dde5e37d9a3df0cd352e8667f163774d9dc3c79571e5100046281", ['\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00']}, 0x842)

06:19:13 executing program 1:
r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0)
mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800004, 0x12, r0, 0x0)
preadv(r0, &(0x7f00000001c0), 0x0, 0x9, 0x0)
mmap(&(0x7f0000000000/0xa000)=nil, 0xa000, 0x2, 0x2172, 0xffffffffffffffff, 0x0)
r1 = socket$unix(0x1, 0x1, 0x0)
bind$unix(r1, &(0x7f00000001c0)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x56)
close(r1)

06:19:13 executing program 3:
r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0)
mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800004, 0x10, r0, 0x0)
preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x9, 0x0)
r1 = socket$unix(0x1, 0x1, 0x0)
close(r1)

06:19:13 executing program 0:
r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0)
mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800004, 0x12, r0, 0x0)
preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x9, 0x0)
mmap(&(0x7f0000000000/0xa000)=nil, 0xa000, 0x2, 0x2172, 0xffffffffffffffff, 0x0)
syz_mount_image$reiserfs(0x0, &(0x7f0000000180)='./file0\x00', 0x8000, 0x3, &(0x7f0000000300)=[{&(0x7f0000000540)="21d37ef07e82e237fbe1b40158d20e242c5ea1f9d9edc6b9395250085d6dfa486982e82d4ce1a5e2bc00d29383bae640de", 0x31, 0x7}, {&(0x7f0000000240)="c43f281f483aa6cd83e40e59d53f177299d285bbe5d90aab2b56a76f9db49d86afa5a0f601ba9b3502de5f3724f3ec00927151f928f668b362052950a2e8f16baec29875fdad59395e86a1050c368933e3ed5a17d76bd7bded793436ea207885f395ace3fc12126c205b170be392c1645233ef01f9661090706a65f63b4845dc2884a20711a8024ad4af44aeec9db33991dae38d95cdb7132970d0d4dec58b9d46d378", 0xa3, 0x6}, {&(0x7f0000000380)="05f82c760d277896dd8c9891a41aafe24124891a32a238c3c78696d112aa09f3ae5c54b0c08676da5db7f358c72dfaca9a5d90860b4ae363c9a921c47965d339c23408a6d9b31a23aee27822f0a140d8e4ec9475a740113f2b9923b46333110e528e0a513151aad34aee1b5310fcf62c1982349253003d6d53aebbe09cf5918668ee682be93b6a671bbc", 0x8a, 0x3}], 0x2000400, &(0x7f0000000440)={[{@balloc_no_unhash_reloc}, {@nolargeio}, {@grpjquota}], [{@obj_role={'obj_role', 0x3d, '^'}}, {@hash}, {@uid_lt}, {@mask={'mask', 0x3d, 'MAY_EXEC'}}, {@uid_lt={'uid<', 0xee00}}, {@smackfsfloor={'smackfsfloor', 0x3d, ':%#[@'}}, {@obj_user={'obj_user', 0x3d, ',\\*),i'}}, {@uid_eq={'uid', 0x3d, 0xee00}}, {@seclabel}, {@uid_lt={'uid<', 0xee00}}]})

06:19:13 executing program 3:
r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0)
mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800004, 0x12, 0xffffffffffffffff, 0x0)
preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x9, 0x0)
r1 = socket$unix(0x1, 0x1, 0x0)
close(r1)

06:19:13 executing program 1:
r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0)
mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800004, 0x12, r0, 0x0)
preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x0, 0x0)
mmap(&(0x7f0000000000/0xa000)=nil, 0xa000, 0x2, 0x2172, 0xffffffffffffffff, 0x0)
r1 = socket$unix(0x1, 0x1, 0x0)
bind$unix(r1, &(0x7f00000001c0)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x56)
close(r1)

[  355.670950][T16017] loop0: detected capacity change from 0 to 64
06:19:13 executing program 1:
r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0)
mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800004, 0x12, r0, 0x0)
preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x0, 0x0)
mmap(&(0x7f0000000000/0xa000)=nil, 0xa000, 0x2, 0x2172, 0xffffffffffffffff, 0x0)
r1 = socket$unix(0x1, 0x1, 0x0)
bind$unix(r1, &(0x7f00000001c0)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x56)
close(r1)

06:19:13 executing program 3:
r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0)
mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800004, 0x12, 0xffffffffffffffff, 0x0)
preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x9, 0x0)
r1 = socket$unix(0x1, 0x1, 0x0)
close(r1)

06:19:14 executing program 2:
r0 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000680), 0xffffffffffffffff)
ioctl$sock_SIOCGIFINDEX_80211(0xffffffffffffffff, 0x8933, &(0x7f0000000c00)={'wlan1\x00'})
r1 = socket$nl_generic(0x10, 0x3, 0x10)
ioctl$sock_SIOCGIFINDEX_80211(r1, 0x8933, &(0x7f0000000e40)={'wlan0\x00', <r2=>0x0})
sendmsg$NL80211_CMD_TRIGGER_SCAN(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000f40)={&(0x7f0000000000)=ANY=[@ANYBLOB='$\x00\x00\x00', @ANYRES16=r0, @ANYBLOB="010000000000000000002100000008000300", @ANYRES32=r2, @ANYBLOB="08009e"], 0x24}}, 0x0)
sendmsg$NL80211_CMD_FRAME(0xffffffffffffffff, &(0x7f0000000100)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f00000000c0)={&(0x7f0000000c40)=ANY=[@ANYBLOB="2000000059c89a20a00fadf00ada0277887124d85c2b6f27e866a2f2434f0213672fd63827c4c50f5346d89412d5351da4a233d419db04d5f089f764866116182e7757ccfd", @ANYRES16=r0, @ANYBLOB="00022dbd7000fedbdf253b0000000c0099007f000000470000000c00cd001f000400070000ff04008e00"], 0x30}, 0x1, 0x0, 0x0, 0x44}, 0x40000)
mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800004, 0x12, 0xffffffffffffffff, 0x0)
preadv(0xffffffffffffffff, &(0x7f00000001c0)=[{0x0}], 0x1, 0x9, 0x0)
r3 = syz_open_dev$tty1(0xc, 0x4, 0x1)
write$binfmt_elf64(r3, &(0x7f0000000380)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x80, 0x1, 0x9, 0x1, 0x2, 0x3e, 0x7ff, 0x1f2, 0x40, 0x1f4, 0xbfa, 0x3, 0x38, 0x1, 0x5, 0x4, 0x4}, [{0x5, 0x9, 0x6, 0x101, 0x6, 0x4, 0x9, 0x6}, {0x5, 0x3, 0x5e61, 0x80000000, 0xcc3, 0x9, 0x7, 0x8}], "d1660f10e0ac4a6edbf3aa53803c8f57ef2a12069e82553332d2b96d67f2dbc5b04959dad57c303d876233684f5e9ad402a193da791e11122f2cccbf10d6d499f5e16385d09f63891a965d80bcb68b551fabffb4bf0b5c372b4d69cdefac988201a40429a8d0dc699820193afcab08070fde89c22e16b43dde5e37d9a3df0cd352e8667f163774d9dc3c79571e5100046281", ['\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00']}, 0x842)

06:19:14 executing program 0:
r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0)
mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800004, 0x12, r0, 0x0)
preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x9, 0x0)
mmap(&(0x7f0000000000/0xa000)=nil, 0xa000, 0x2, 0x2172, 0xffffffffffffffff, 0x0)
syz_mount_image$reiserfs(&(0x7f0000000140), 0x0, 0x8000, 0x3, &(0x7f0000000300)=[{&(0x7f0000000540)="21d37ef07e82e237fbe1b40158d20e242c5ea1f9d9edc6b9395250085d6dfa486982e82d4ce1a5e2bc00d29383bae640de", 0x31, 0x7}, {&(0x7f0000000240)="c43f281f483aa6cd83e40e59d53f177299d285bbe5d90aab2b56a76f9db49d86afa5a0f601ba9b3502de5f3724f3ec00927151f928f668b362052950a2e8f16baec29875fdad59395e86a1050c368933e3ed5a17d76bd7bded793436ea207885f395ace3fc12126c205b170be392c1645233ef01f9661090706a65f63b4845dc2884a20711a8024ad4af44aeec9db33991dae38d95cdb7132970d0d4dec58b9d46d378", 0xa3, 0x6}, {&(0x7f0000000380)="05f82c760d277896dd8c9891a41aafe24124891a32a238c3c78696d112aa09f3ae5c54b0c08676da5db7f358c72dfaca9a5d90860b4ae363c9a921c47965d339c23408a6d9b31a23aee27822f0a140d8e4ec9475a740113f2b9923b46333110e528e0a513151aad34aee1b5310fcf62c1982349253003d6d53aebbe09cf5918668ee682be93b6a671bbc", 0x8a, 0x3}], 0x2000400, &(0x7f0000000440)={[{@balloc_no_unhash_reloc}, {@nolargeio}, {@grpjquota}], [{@obj_role={'obj_role', 0x3d, '^'}}, {@hash}, {@uid_lt}, {@mask={'mask', 0x3d, 'MAY_EXEC'}}, {@uid_lt={'uid<', 0xee00}}, {@smackfsfloor={'smackfsfloor', 0x3d, ':%#[@'}}, {@obj_user={'obj_user', 0x3d, ',\\*),i'}}, {@uid_eq={'uid', 0x3d, 0xee00}}, {@seclabel}, {@uid_lt={'uid<', 0xee00}}]})

06:19:14 executing program 1:
r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0)
mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800004, 0x12, r0, 0x0)
preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x0, 0x0)
mmap(&(0x7f0000000000/0xa000)=nil, 0xa000, 0x2, 0x2172, 0xffffffffffffffff, 0x0)
r1 = socket$unix(0x1, 0x1, 0x0)
bind$unix(r1, &(0x7f00000001c0)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x56)
close(r1)

06:19:14 executing program 3:
r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0)
mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800004, 0x12, 0xffffffffffffffff, 0x0)
preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x9, 0x0)
r1 = socket$unix(0x1, 0x1, 0x0)
close(r1)

[  356.510639][T16035] loop0: detected capacity change from 0 to 64
06:19:14 executing program 3:
r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0)
mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800004, 0x12, r0, 0x0)
preadv(0xffffffffffffffff, &(0x7f00000001c0)=[{0x0}], 0x1, 0x9, 0x0)
r1 = socket$unix(0x1, 0x1, 0x0)
close(r1)

06:19:14 executing program 0:
r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0)
mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800004, 0x12, r0, 0x0)
preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x9, 0x0)
mmap(&(0x7f0000000000/0xa000)=nil, 0xa000, 0x2, 0x2172, 0xffffffffffffffff, 0x0)
syz_mount_image$reiserfs(&(0x7f0000000140), 0x0, 0x8000, 0x3, &(0x7f0000000300)=[{&(0x7f0000000540)="21d37ef07e82e237fbe1b40158d20e242c5ea1f9d9edc6b9395250085d6dfa486982e82d4ce1a5e2bc00d29383bae640de", 0x31, 0x7}, {&(0x7f0000000240)="c43f281f483aa6cd83e40e59d53f177299d285bbe5d90aab2b56a76f9db49d86afa5a0f601ba9b3502de5f3724f3ec00927151f928f668b362052950a2e8f16baec29875fdad59395e86a1050c368933e3ed5a17d76bd7bded793436ea207885f395ace3fc12126c205b170be392c1645233ef01f9661090706a65f63b4845dc2884a20711a8024ad4af44aeec9db33991dae38d95cdb7132970d0d4dec58b9d46d378", 0xa3, 0x6}, {&(0x7f0000000380)="05f82c760d277896dd8c9891a41aafe24124891a32a238c3c78696d112aa09f3ae5c54b0c08676da5db7f358c72dfaca9a5d90860b4ae363c9a921c47965d339c23408a6d9b31a23aee27822f0a140d8e4ec9475a740113f2b9923b46333110e528e0a513151aad34aee1b5310fcf62c1982349253003d6d53aebbe09cf5918668ee682be93b6a671bbc", 0x8a, 0x3}], 0x2000400, &(0x7f0000000440)={[{@balloc_no_unhash_reloc}, {@nolargeio}, {@grpjquota}], [{@obj_role={'obj_role', 0x3d, '^'}}, {@hash}, {@uid_lt}, {@mask={'mask', 0x3d, 'MAY_EXEC'}}, {@uid_lt={'uid<', 0xee00}}, {@smackfsfloor={'smackfsfloor', 0x3d, ':%#[@'}}, {@obj_user={'obj_user', 0x3d, ',\\*),i'}}, {@uid_eq={'uid', 0x3d, 0xee00}}, {@seclabel}, {@uid_lt={'uid<', 0xee00}}]})

06:19:14 executing program 1:
r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0)
mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800004, 0x12, r0, 0x0)
preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x9, 0x0)
mmap(&(0x7f0000000000/0xa000)=nil, 0xa000, 0x0, 0x2172, 0xffffffffffffffff, 0x0)
r1 = socket$unix(0x1, 0x1, 0x0)
bind$unix(r1, &(0x7f00000001c0)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x56)
close(r1)

06:19:14 executing program 3:
r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0)
mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800004, 0x12, r0, 0x0)
preadv(0xffffffffffffffff, &(0x7f00000001c0)=[{0x0}], 0x1, 0x9, 0x0)
r1 = socket$unix(0x1, 0x1, 0x0)
close(r1)

[  356.804532][T16049] loop0: detected capacity change from 0 to 64
06:19:15 executing program 2:
r0 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000680), 0xffffffffffffffff)
ioctl$sock_SIOCGIFINDEX_80211(0xffffffffffffffff, 0x8933, &(0x7f0000000c00)={'wlan1\x00'})
r1 = socket$nl_generic(0x10, 0x3, 0x10)
ioctl$sock_SIOCGIFINDEX_80211(r1, 0x8933, &(0x7f0000000e40)={'wlan0\x00', <r2=>0x0})
sendmsg$NL80211_CMD_TRIGGER_SCAN(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000f40)={&(0x7f0000000000)=ANY=[@ANYBLOB='$\x00\x00\x00', @ANYRES16=r0, @ANYBLOB="010000000000000000002100000008000300", @ANYRES32=r2, @ANYBLOB="08009e"], 0x24}}, 0x0)
sendmsg$NL80211_CMD_FRAME(0xffffffffffffffff, &(0x7f0000000100)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f00000000c0)={&(0x7f0000000c40)=ANY=[@ANYBLOB="2000000059c89a20a00fadf00ada0277887124d85c2b6f27e866a2f2434f0213672fd63827c4c50f5346d89412d5351da4a233d419db04d5f089f764866116182e7757ccfd", @ANYRES16=r0, @ANYBLOB="00022dbd7000fedbdf253b0000000c0099007f000000470000000c00cd001f000400070000ff04008e00"], 0x30}, 0x1, 0x0, 0x0, 0x44}, 0x40000)
mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800004, 0x12, 0xffffffffffffffff, 0x0)
preadv(0xffffffffffffffff, &(0x7f00000001c0)=[{0x0}], 0x1, 0x9, 0x0)
r3 = syz_open_dev$tty1(0xc, 0x4, 0x1)
write$binfmt_elf64(r3, &(0x7f0000000380)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x80, 0x1, 0x9, 0x1, 0x2, 0x3e, 0x7ff, 0x1f2, 0x40, 0x1f4, 0xbfa, 0x3, 0x38, 0x1, 0x5, 0x4, 0x4}, [{0x5, 0x9, 0x6, 0x101, 0x6, 0x4, 0x9, 0x6}, {0x5, 0x3, 0x5e61, 0x80000000, 0xcc3, 0x9, 0x7, 0x8}], "d1660f10e0ac4a6edbf3aa53803c8f57ef2a12069e82553332d2b96d67f2dbc5b04959dad57c303d876233684f5e9ad402a193da791e11122f2cccbf10d6d499f5e16385d09f63891a965d80bcb68b551fabffb4bf0b5c372b4d69cdefac988201a40429a8d0dc699820193afcab08070fde89c22e16b43dde5e37d9a3df0cd352e8667f163774d9dc3c79571e5100046281", ['\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00']}, 0x842)

06:19:15 executing program 1:
r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0)
mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800004, 0x12, r0, 0x0)
preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x9, 0x0)
mmap(&(0x7f0000000000/0xa000)=nil, 0xa000, 0x0, 0x2172, 0xffffffffffffffff, 0x0)
r1 = socket$unix(0x1, 0x1, 0x0)
bind$unix(r1, &(0x7f00000001c0)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x56)
close(r1)

06:19:15 executing program 0:
r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0)
mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800004, 0x12, r0, 0x0)
preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x9, 0x0)
mmap(&(0x7f0000000000/0xa000)=nil, 0xa000, 0x2, 0x2172, 0xffffffffffffffff, 0x0)
syz_mount_image$reiserfs(&(0x7f0000000140), 0x0, 0x8000, 0x3, &(0x7f0000000300)=[{&(0x7f0000000540)="21d37ef07e82e237fbe1b40158d20e242c5ea1f9d9edc6b9395250085d6dfa486982e82d4ce1a5e2bc00d29383bae640de", 0x31, 0x7}, {&(0x7f0000000240)="c43f281f483aa6cd83e40e59d53f177299d285bbe5d90aab2b56a76f9db49d86afa5a0f601ba9b3502de5f3724f3ec00927151f928f668b362052950a2e8f16baec29875fdad59395e86a1050c368933e3ed5a17d76bd7bded793436ea207885f395ace3fc12126c205b170be392c1645233ef01f9661090706a65f63b4845dc2884a20711a8024ad4af44aeec9db33991dae38d95cdb7132970d0d4dec58b9d46d378", 0xa3, 0x6}, {&(0x7f0000000380)="05f82c760d277896dd8c9891a41aafe24124891a32a238c3c78696d112aa09f3ae5c54b0c08676da5db7f358c72dfaca9a5d90860b4ae363c9a921c47965d339c23408a6d9b31a23aee27822f0a140d8e4ec9475a740113f2b9923b46333110e528e0a513151aad34aee1b5310fcf62c1982349253003d6d53aebbe09cf5918668ee682be93b6a671bbc", 0x8a, 0x3}], 0x2000400, &(0x7f0000000440)={[{@balloc_no_unhash_reloc}, {@nolargeio}, {@grpjquota}], [{@obj_role={'obj_role', 0x3d, '^'}}, {@hash}, {@uid_lt}, {@mask={'mask', 0x3d, 'MAY_EXEC'}}, {@uid_lt={'uid<', 0xee00}}, {@smackfsfloor={'smackfsfloor', 0x3d, ':%#[@'}}, {@obj_user={'obj_user', 0x3d, ',\\*),i'}}, {@uid_eq={'uid', 0x3d, 0xee00}}, {@seclabel}, {@uid_lt={'uid<', 0xee00}}]})

06:19:15 executing program 3:
r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0)
mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800004, 0x12, r0, 0x0)
preadv(0xffffffffffffffff, &(0x7f00000001c0)=[{0x0}], 0x1, 0x9, 0x0)
r1 = socket$unix(0x1, 0x1, 0x0)
close(r1)

[  357.506941][T16061] loop0: detected capacity change from 0 to 64
06:19:15 executing program 1:
r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0)
mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800004, 0x12, r0, 0x0)
preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x9, 0x0)
mmap(&(0x7f0000000000/0xa000)=nil, 0xa000, 0x0, 0x2172, 0xffffffffffffffff, 0x0)
r1 = socket$unix(0x1, 0x1, 0x0)
bind$unix(r1, &(0x7f00000001c0)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x56)
close(r1)

06:19:15 executing program 3:
r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0)
mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800004, 0x12, r0, 0x0)
preadv(r0, 0x0, 0x0, 0x9, 0x0)
r1 = socket$unix(0x1, 0x1, 0x0)
close(r1)

06:19:15 executing program 0:
r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0)
mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800004, 0x12, r0, 0x0)
preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x9, 0x0)
mmap(&(0x7f0000000000/0xa000)=nil, 0xa000, 0x2, 0x2172, 0xffffffffffffffff, 0x0)
syz_mount_image$reiserfs(&(0x7f0000000140), &(0x7f0000000180)='./file0\x00', 0x0, 0x3, &(0x7f0000000300)=[{&(0x7f0000000540)="21d37ef07e82e237fbe1b40158d20e242c5ea1f9d9edc6b9395250085d6dfa486982e82d4ce1a5e2bc00d29383bae640de", 0x31, 0x7}, {&(0x7f0000000240)="c43f281f483aa6cd83e40e59d53f177299d285bbe5d90aab2b56a76f9db49d86afa5a0f601ba9b3502de5f3724f3ec00927151f928f668b362052950a2e8f16baec29875fdad59395e86a1050c368933e3ed5a17d76bd7bded793436ea207885f395ace3fc12126c205b170be392c1645233ef01f9661090706a65f63b4845dc2884a20711a8024ad4af44aeec9db33991dae38d95cdb7132970d0d4dec58b9d46d378", 0xa3, 0x6}, {&(0x7f0000000380)="05f82c760d277896dd8c9891a41aafe24124891a32a238c3c78696d112aa09f3ae5c54b0c08676da5db7f358c72dfaca9a5d90860b4ae363c9a921c47965d339c23408a6d9b31a23aee27822f0a140d8e4ec9475a740113f2b9923b46333110e528e0a513151aad34aee1b5310fcf62c1982349253003d6d53aebbe09cf5918668ee682be93b6a671bbc", 0x8a, 0x3}], 0x2000400, &(0x7f0000000440)={[{@balloc_no_unhash_reloc}, {@nolargeio}, {@grpjquota}], [{@obj_role={'obj_role', 0x3d, '^'}}, {@hash}, {@uid_lt}, {@mask={'mask', 0x3d, 'MAY_EXEC'}}, {@uid_lt={'uid<', 0xee00}}, {@smackfsfloor={'smackfsfloor', 0x3d, ':%#[@'}}, {@obj_user={'obj_user', 0x3d, ',\\*),i'}}, {@uid_eq={'uid', 0x3d, 0xee00}}, {@seclabel}, {@uid_lt={'uid<', 0xee00}}]})

06:19:15 executing program 1:
r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0)
mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800004, 0x12, r0, 0x0)
preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x9, 0x0)
mmap(&(0x7f0000000000/0xa000)=nil, 0xa000, 0x2, 0x10, 0xffffffffffffffff, 0x0)
r1 = socket$unix(0x1, 0x1, 0x0)
bind$unix(r1, &(0x7f00000001c0)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x56)
close(r1)

[  357.691943][T16073] REISERFS warning (device loop0): super-6504 reiserfs_getopt: the option "nolargeio" requires an argument
[  357.691943][T16073] 
06:19:16 executing program 3:
r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0)
mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800004, 0x12, r0, 0x0)
preadv(r0, 0x0, 0x0, 0x9, 0x0)
r1 = socket$unix(0x1, 0x1, 0x0)
close(r1)

06:19:16 executing program 1:
r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0)
mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800004, 0x12, r0, 0x0)
preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x9, 0x0)
mmap(&(0x7f0000000000/0xa000)=nil, 0xa000, 0x2, 0x10, 0xffffffffffffffff, 0x0)
r1 = socket$unix(0x1, 0x1, 0x0)
bind$unix(r1, &(0x7f00000001c0)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x56)
close(r1)

06:19:16 executing program 2:
r0 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000680), 0xffffffffffffffff)
ioctl$sock_SIOCGIFINDEX_80211(0xffffffffffffffff, 0x8933, &(0x7f0000000c00)={'wlan1\x00'})
r1 = socket$nl_generic(0x10, 0x3, 0x10)
ioctl$sock_SIOCGIFINDEX_80211(r1, 0x8933, &(0x7f0000000e40)={'wlan0\x00', <r2=>0x0})
sendmsg$NL80211_CMD_TRIGGER_SCAN(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000f40)={&(0x7f0000000000)=ANY=[@ANYBLOB='$\x00\x00\x00', @ANYRES16=r0, @ANYBLOB="010000000000000000002100000008000300", @ANYRES32=r2, @ANYBLOB="08009e"], 0x24}}, 0x0)
sendmsg$NL80211_CMD_FRAME(0xffffffffffffffff, &(0x7f0000000100)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f00000000c0)={&(0x7f0000000c40)=ANY=[@ANYBLOB="2000000059c89a20a00fadf00ada0277887124d85c2b6f27e866a2f2434f0213672fd63827c4c50f5346d89412d5351da4a233d419db04d5f089f764866116182e7757ccfd", @ANYRES16=r0, @ANYBLOB="00022dbd7000fedbdf253b0000000c0099007f000000470000000c00cd001f000400070000ff04008e00"], 0x30}, 0x1, 0x0, 0x0, 0x44}, 0x40000)
mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800004, 0x12, 0xffffffffffffffff, 0x0)
preadv(0xffffffffffffffff, &(0x7f00000001c0)=[{0x0}], 0x1, 0x9, 0x0)
r3 = syz_open_dev$tty1(0xc, 0x4, 0x1)
write$binfmt_elf64(r3, &(0x7f0000000380)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x80, 0x1, 0x9, 0x1, 0x2, 0x3e, 0x7ff, 0x1f2, 0x40, 0x1f4, 0xbfa, 0x3, 0x38, 0x1, 0x5, 0x4, 0x4}, [{0x5, 0x9, 0x6, 0x101, 0x6, 0x4, 0x9, 0x6}, {0x5, 0x3, 0x5e61, 0x80000000, 0xcc3, 0x9, 0x7, 0x8}], "d1660f10e0ac4a6edbf3aa53803c8f57ef2a12069e82553332d2b96d67f2dbc5b04959dad57c303d876233684f5e9ad402a193da791e11122f2cccbf10d6d499f5e16385d09f63891a965d80bcb68b551fabffb4bf0b5c372b4d69cdefac988201a40429a8d0dc699820193afcab08070fde89c22e16b43dde5e37d9a3df0cd352e8667f163774d9dc3c79571e5100046281", ['\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00']}, 0x842)

06:19:16 executing program 0:
r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0)
mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800004, 0x12, r0, 0x0)
preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x9, 0x0)
mmap(&(0x7f0000000000/0xa000)=nil, 0xa000, 0x2, 0x2172, 0xffffffffffffffff, 0x0)
syz_mount_image$reiserfs(&(0x7f0000000140), &(0x7f0000000180)='./file0\x00', 0x0, 0x0, 0x0, 0x2000400, &(0x7f0000000440)={[{@balloc_no_unhash_reloc}, {@nolargeio}, {@grpjquota}], [{@obj_role={'obj_role', 0x3d, '^'}}, {@hash}, {@uid_lt}, {@mask={'mask', 0x3d, 'MAY_EXEC'}}, {@uid_lt={'uid<', 0xee00}}, {@smackfsfloor={'smackfsfloor', 0x3d, ':%#[@'}}, {@obj_user={'obj_user', 0x3d, ',\\*),i'}}, {@uid_eq={'uid', 0x3d, 0xee00}}, {@seclabel}, {@uid_lt={'uid<', 0xee00}}]})

06:19:16 executing program 1:
r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0)
mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800004, 0x12, r0, 0x0)
preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x9, 0x0)
mmap(&(0x7f0000000000/0xa000)=nil, 0xa000, 0x2, 0x10, 0xffffffffffffffff, 0x0)
r1 = socket$unix(0x1, 0x1, 0x0)
bind$unix(r1, &(0x7f00000001c0)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x56)
close(r1)

06:19:16 executing program 0:
r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0)
mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800004, 0x12, r0, 0x0)
preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x9, 0x0)
mmap(&(0x7f0000000000/0xa000)=nil, 0xa000, 0x2, 0x2172, 0xffffffffffffffff, 0x0)
syz_mount_image$reiserfs(&(0x7f0000000140), &(0x7f0000000180)='./file0\x00', 0x0, 0x0, 0x0, 0x2000400, &(0x7f0000000440)={[{@balloc_no_unhash_reloc}, {@nolargeio}, {@grpjquota}], [{@obj_role={'obj_role', 0x3d, '^'}}, {@hash}, {@uid_lt}, {@mask={'mask', 0x3d, 'MAY_EXEC'}}, {@uid_lt={'uid<', 0xee00}}, {@smackfsfloor={'smackfsfloor', 0x3d, ':%#[@'}}, {@obj_user={'obj_user', 0x3d, ',\\*),i'}}, {@uid_eq={'uid', 0x3d, 0xee00}}, {@seclabel}, {@uid_lt={'uid<', 0xee00}}]})

06:19:16 executing program 3:
r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0)
mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800004, 0x12, r0, 0x0)
preadv(r0, 0x0, 0x0, 0x9, 0x0)
r1 = socket$unix(0x1, 0x1, 0x0)
close(r1)

06:19:16 executing program 3:
r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0)
mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800004, 0x12, r0, 0x0)
preadv(r0, &(0x7f00000001c0), 0x0, 0x9, 0x0)
r1 = socket$unix(0x1, 0x1, 0x0)
close(r1)

06:19:16 executing program 3:
r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0)
mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800004, 0x12, r0, 0x0)
preadv(r0, &(0x7f00000001c0), 0x0, 0x9, 0x0)
r1 = socket$unix(0x1, 0x1, 0x0)
close(r1)

06:19:16 executing program 0:
r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0)
mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800004, 0x12, r0, 0x0)
preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x9, 0x0)
mmap(&(0x7f0000000000/0xa000)=nil, 0xa000, 0x2, 0x2172, 0xffffffffffffffff, 0x0)
syz_mount_image$reiserfs(&(0x7f0000000140), &(0x7f0000000180)='./file0\x00', 0x0, 0x0, 0x0, 0x2000400, &(0x7f0000000440)={[{@balloc_no_unhash_reloc}, {@nolargeio}, {@grpjquota}], [{@obj_role={'obj_role', 0x3d, '^'}}, {@hash}, {@uid_lt}, {@mask={'mask', 0x3d, 'MAY_EXEC'}}, {@uid_lt={'uid<', 0xee00}}, {@smackfsfloor={'smackfsfloor', 0x3d, ':%#[@'}}, {@obj_user={'obj_user', 0x3d, ',\\*),i'}}, {@uid_eq={'uid', 0x3d, 0xee00}}, {@seclabel}, {@uid_lt={'uid<', 0xee00}}]})

06:19:16 executing program 2:
r0 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000680), 0xffffffffffffffff)
ioctl$sock_SIOCGIFINDEX_80211(0xffffffffffffffff, 0x8933, &(0x7f0000000c00)={'wlan1\x00'})
r1 = socket$nl_generic(0x10, 0x3, 0x10)
ioctl$sock_SIOCGIFINDEX_80211(r1, 0x8933, &(0x7f0000000e40)={'wlan0\x00', <r2=>0x0})
sendmsg$NL80211_CMD_TRIGGER_SCAN(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000f40)={&(0x7f0000000000)=ANY=[@ANYBLOB='$\x00\x00\x00', @ANYRES16=r0, @ANYBLOB="010000000000000000002100000008000300", @ANYRES32=r2, @ANYBLOB="08009e"], 0x24}}, 0x0)
r3 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0)
mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800004, 0x12, r3, 0x0)
preadv(r3, &(0x7f00000001c0)=[{0x0}], 0x1, 0x9, 0x0)
r4 = syz_open_dev$tty1(0xc, 0x4, 0x1)
write$binfmt_elf64(r4, &(0x7f0000000380)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x80, 0x1, 0x9, 0x1, 0x2, 0x3e, 0x7ff, 0x1f2, 0x40, 0x1f4, 0xbfa, 0x3, 0x38, 0x1, 0x5, 0x4, 0x4}, [{0x5, 0x9, 0x6, 0x101, 0x6, 0x4, 0x9, 0x6}, {0x5, 0x3, 0x5e61, 0x80000000, 0xcc3, 0x9, 0x7, 0x8}], "d1660f10e0ac4a6edbf3aa53803c8f57ef2a12069e82553332d2b96d67f2dbc5b04959dad57c303d876233684f5e9ad402a193da791e11122f2cccbf10d6d499f5e16385d09f63891a965d80bcb68b551fabffb4bf0b5c372b4d69cdefac988201a40429a8d0dc699820193afcab08070fde89c22e16b43dde5e37d9a3df0cd352e8667f163774d9dc3c79571e5100046281", ['\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00']}, 0x842)

06:19:16 executing program 1:
r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0)
mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800004, 0x12, r0, 0x0)
preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x9, 0x0)
mmap(&(0x7f0000000000/0xa000)=nil, 0xa000, 0x2, 0x2172, 0xffffffffffffffff, 0x0)
r1 = socket$unix(0x1, 0x0, 0x0)
bind$unix(r1, &(0x7f00000001c0)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x56)
close(r1)

06:19:16 executing program 3:
r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0)
mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800004, 0x12, r0, 0x0)
preadv(r0, &(0x7f00000001c0), 0x0, 0x9, 0x0)
r1 = socket$unix(0x1, 0x1, 0x0)
close(r1)

06:19:16 executing program 0:
r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0)
mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800004, 0x12, r0, 0x0)
preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x9, 0x0)
mmap(&(0x7f0000000000/0xa000)=nil, 0xa000, 0x2, 0x2172, 0xffffffffffffffff, 0x0)
syz_mount_image$reiserfs(&(0x7f0000000140), &(0x7f0000000180)='./file0\x00', 0x0, 0x2, &(0x7f0000000300)=[{&(0x7f0000000540)="21d37ef07e82e237fbe1b40158d20e242c5ea1f9d9edc6b9395250085d6dfa486982e82d4ce1a5e2bc00d29383bae640de", 0x31, 0x7}, {&(0x7f0000000240)="c43f281f483aa6cd83e40e59d53f177299d285bbe5d90aab2b56a76f9db49d86afa5a0f601ba9b3502de5f3724f3ec00927151f928f668b362052950a2e8f16baec29875fdad59395e86a1050c368933e3ed5a17d76bd7bded793436ea207885f395ace3fc12126c205b170be392c1645233ef01f9661090706a65f63b4845dc2884a20711a8024ad4af44aeec9db33991dae38d95cdb7132970d0d4dec58b9d46d378", 0xa3, 0x6}], 0x2000400, &(0x7f0000000440)={[{@balloc_no_unhash_reloc}, {@nolargeio}, {@grpjquota}], [{@obj_role={'obj_role', 0x3d, '^'}}, {@hash}, {@uid_lt}, {@mask={'mask', 0x3d, 'MAY_EXEC'}}, {@uid_lt={'uid<', 0xee00}}, {@smackfsfloor={'smackfsfloor', 0x3d, ':%#[@'}}, {@obj_user={'obj_user', 0x3d, ',\\*),i'}}, {@uid_eq={'uid', 0x3d, 0xee00}}, {@seclabel}, {@uid_lt={'uid<', 0xee00}}]})

06:19:17 executing program 1:
r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0)
mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800004, 0x12, r0, 0x0)
preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x9, 0x0)
mmap(&(0x7f0000000000/0xa000)=nil, 0xa000, 0x2, 0x2172, 0xffffffffffffffff, 0x0)
r1 = socket$unix(0x1, 0x0, 0x0)
bind$unix(r1, &(0x7f00000001c0)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x56)
close(r1)

[  359.413759][T16121] REISERFS warning (device loop0): super-6504 reiserfs_getopt: the option "nolargeio" requires an argument
[  359.413759][T16121] 
06:19:17 executing program 3:
r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0)
mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800004, 0x12, r0, 0x0)
preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x0, 0x0)
r1 = socket$unix(0x1, 0x1, 0x0)
close(r1)

06:19:17 executing program 0:
r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0)
mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800004, 0x12, r0, 0x0)
preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x9, 0x0)
mmap(&(0x7f0000000000/0xa000)=nil, 0xa000, 0x2, 0x2172, 0xffffffffffffffff, 0x0)
syz_mount_image$reiserfs(&(0x7f0000000140), &(0x7f0000000180)='./file0\x00', 0x0, 0x1, &(0x7f0000000300)=[{&(0x7f0000000540)="21d37ef07e82e237fbe1b40158d20e242c5ea1f9d9edc6b9395250085d6dfa486982e82d4ce1a5e2bc00d29383bae640de", 0x31, 0x7}], 0x2000400, &(0x7f0000000440)={[{@balloc_no_unhash_reloc}, {@nolargeio}, {@grpjquota}], [{@obj_role={'obj_role', 0x3d, '^'}}, {@hash}, {@uid_lt}, {@mask={'mask', 0x3d, 'MAY_EXEC'}}, {@uid_lt={'uid<', 0xee00}}, {@smackfsfloor={'smackfsfloor', 0x3d, ':%#[@'}}, {@obj_user={'obj_user', 0x3d, ',\\*),i'}}, {@uid_eq={'uid', 0x3d, 0xee00}}, {@seclabel}, {@uid_lt={'uid<', 0xee00}}]})

06:19:17 executing program 1:
r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0)
mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800004, 0x12, r0, 0x0)
preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x9, 0x0)
mmap(&(0x7f0000000000/0xa000)=nil, 0xa000, 0x2, 0x2172, 0xffffffffffffffff, 0x0)
r1 = socket$unix(0x1, 0x0, 0x0)
bind$unix(r1, &(0x7f00000001c0)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x56)
close(r1)

[  359.635152][T16132] REISERFS warning (device loop0): super-6504 reiserfs_getopt: the option "nolargeio" requires an argument
[  359.635152][T16132] 
06:19:17 executing program 2:
syz_genetlink_get_family_id$nl80211(&(0x7f0000000680), 0xffffffffffffffff)
ioctl$sock_SIOCGIFINDEX_80211(0xffffffffffffffff, 0x8933, &(0x7f0000000c00)={'wlan1\x00'})
r0 = socket$nl_generic(0x10, 0x3, 0x10)
ioctl$sock_SIOCGIFINDEX_80211(r0, 0x8933, &(0x7f0000000e40)={'wlan0\x00'})
r1 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0)
mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800004, 0x12, r1, 0x0)
preadv(r1, &(0x7f00000001c0)=[{0x0}], 0x1, 0x9, 0x0)
r2 = syz_open_dev$tty1(0xc, 0x4, 0x1)
write$binfmt_elf64(r2, &(0x7f0000000380)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x80, 0x1, 0x9, 0x1, 0x2, 0x3e, 0x7ff, 0x1f2, 0x40, 0x1f4, 0xbfa, 0x3, 0x38, 0x1, 0x5, 0x4, 0x4}, [{0x5, 0x9, 0x6, 0x101, 0x6, 0x4, 0x9, 0x6}, {0x5, 0x3, 0x5e61, 0x80000000, 0xcc3, 0x9, 0x7, 0x8}], "d1660f10e0ac4a6edbf3aa53803c8f57ef2a12069e82553332d2b96d67f2dbc5b04959dad57c303d876233684f5e9ad402a193da791e11122f2cccbf10d6d499f5e16385d09f63891a965d80bcb68b551fabffb4bf0b5c372b4d69cdefac988201a40429a8d0dc699820193afcab08070fde89c22e16b43dde5e37d9a3df0cd352e8667f163774d9dc3c79571e5100046281", ['\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00']}, 0x842)

06:19:17 executing program 3:
r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0)
mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800004, 0x12, r0, 0x0)
preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x0, 0x0)
r1 = socket$unix(0x1, 0x1, 0x0)
close(r1)

06:19:17 executing program 1:
r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0)
mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800004, 0x12, r0, 0x0)
preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x9, 0x0)
mmap(&(0x7f0000000000/0xa000)=nil, 0xa000, 0x2, 0x2172, 0xffffffffffffffff, 0x0)
r1 = socket$unix(0x1, 0x1, 0x0)
bind$unix(0xffffffffffffffff, &(0x7f00000001c0)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x56)
close(r1)

06:19:17 executing program 0:
r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0)
mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800004, 0x12, r0, 0x0)
preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x9, 0x0)
mmap(&(0x7f0000000000/0xa000)=nil, 0xa000, 0x2, 0x2172, 0xffffffffffffffff, 0x0)
syz_mount_image$reiserfs(&(0x7f0000000140), &(0x7f0000000180)='./file0\x00', 0x0, 0x0, &(0x7f0000000300), 0x2000400, &(0x7f0000000440)={[{@balloc_no_unhash_reloc}, {@nolargeio}, {@grpjquota}], [{@obj_role={'obj_role', 0x3d, '^'}}, {@hash}, {@uid_lt}, {@mask={'mask', 0x3d, 'MAY_EXEC'}}, {@uid_lt={'uid<', 0xee00}}, {@smackfsfloor={'smackfsfloor', 0x3d, ':%#[@'}}, {@obj_user={'obj_user', 0x3d, ',\\*),i'}}, {@uid_eq={'uid', 0x3d, 0xee00}}, {@seclabel}, {@uid_lt={'uid<', 0xee00}}]})

[  360.256537][T16146] REISERFS warning (device loop0): super-6504 reiserfs_getopt: the option "nolargeio" requires an argument
[  360.256537][T16146] 
06:19:17 executing program 3:
r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0)
mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800004, 0x12, r0, 0x0)
preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x0, 0x0)
r1 = socket$unix(0x1, 0x1, 0x0)
close(r1)

06:19:17 executing program 1:
r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0)
mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800004, 0x12, r0, 0x0)
preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x9, 0x0)
mmap(&(0x7f0000000000/0xa000)=nil, 0xa000, 0x2, 0x2172, 0xffffffffffffffff, 0x0)
r1 = socket$unix(0x1, 0x1, 0x0)
bind$unix(0xffffffffffffffff, &(0x7f00000001c0)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x56)
close(r1)

06:19:17 executing program 3:
r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0)
mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800004, 0x12, r0, 0x0)
preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x9, 0x0)
r1 = socket$unix(0x1, 0x0, 0x0)
close(r1)

06:19:17 executing program 0:
r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0)
mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800004, 0x12, r0, 0x0)
preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x9, 0x0)
mmap(&(0x7f0000000000/0xa000)=nil, 0xa000, 0x2, 0x2172, 0xffffffffffffffff, 0x0)
syz_mount_image$reiserfs(&(0x7f0000000140), &(0x7f0000000180)='./file0\x00', 0x0, 0x0, &(0x7f0000000300), 0x0, &(0x7f0000000440)={[{@balloc_no_unhash_reloc}, {@nolargeio}, {@grpjquota}], [{@obj_role={'obj_role', 0x3d, '^'}}, {@hash}, {@uid_lt}, {@mask={'mask', 0x3d, 'MAY_EXEC'}}, {@uid_lt={'uid<', 0xee00}}, {@smackfsfloor={'smackfsfloor', 0x3d, ':%#[@'}}, {@obj_user={'obj_user', 0x3d, ',\\*),i'}}, {@uid_eq={'uid', 0x3d, 0xee00}}, {@seclabel}, {@uid_lt={'uid<', 0xee00}}]})

[  360.442331][T16165] REISERFS warning (device loop0): super-6504 reiserfs_getopt: the option "nolargeio" requires an argument
[  360.442331][T16165] 
06:19:18 executing program 2:
syz_genetlink_get_family_id$nl80211(&(0x7f0000000680), 0xffffffffffffffff)
ioctl$sock_SIOCGIFINDEX_80211(0xffffffffffffffff, 0x8933, &(0x7f0000000c00)={'wlan1\x00'})
socket$nl_generic(0x10, 0x3, 0x10)
r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0)
mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800004, 0x12, r0, 0x0)
preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x9, 0x0)
r1 = syz_open_dev$tty1(0xc, 0x4, 0x1)
write$binfmt_elf64(r1, &(0x7f0000000380)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x80, 0x1, 0x9, 0x1, 0x2, 0x3e, 0x7ff, 0x1f2, 0x40, 0x1f4, 0xbfa, 0x3, 0x38, 0x1, 0x5, 0x4, 0x4}, [{0x5, 0x9, 0x6, 0x101, 0x6, 0x4, 0x9, 0x6}, {0x5, 0x3, 0x5e61, 0x80000000, 0xcc3, 0x9, 0x7, 0x8}], "d1660f10e0ac4a6edbf3aa53803c8f57ef2a12069e82553332d2b96d67f2dbc5b04959dad57c303d876233684f5e9ad402a193da791e11122f2cccbf10d6d499f5e16385d09f63891a965d80bcb68b551fabffb4bf0b5c372b4d69cdefac988201a40429a8d0dc699820193afcab08070fde89c22e16b43dde5e37d9a3df0cd352e8667f163774d9dc3c79571e5100046281", ['\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00']}, 0x842)

06:19:18 executing program 1:
r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0)
mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800004, 0x12, r0, 0x0)
preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x9, 0x0)
mmap(&(0x7f0000000000/0xa000)=nil, 0xa000, 0x2, 0x2172, 0xffffffffffffffff, 0x0)
r1 = socket$unix(0x1, 0x1, 0x0)
bind$unix(0xffffffffffffffff, &(0x7f00000001c0)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x56)
close(r1)

06:19:18 executing program 3:
r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0)
mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800004, 0x12, r0, 0x0)
preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x9, 0x0)
r1 = socket$unix(0x1, 0x0, 0x0)
close(r1)

06:19:18 executing program 0:
r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0)
mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800004, 0x12, r0, 0x0)
preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x9, 0x0)
mmap(&(0x7f0000000000/0xa000)=nil, 0xa000, 0x2, 0x2172, 0xffffffffffffffff, 0x0)
syz_mount_image$reiserfs(&(0x7f0000000140), &(0x7f0000000180)='./file0\x00', 0x0, 0x0, &(0x7f0000000300), 0x0, 0x0)

06:19:18 executing program 3:
r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0)
mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800004, 0x12, r0, 0x0)
preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x9, 0x0)
r1 = socket$unix(0x1, 0x0, 0x0)
close(r1)

06:19:18 executing program 1:
r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0)
mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800004, 0x12, r0, 0x0)
preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x9, 0x0)
mmap(&(0x7f0000000000/0xa000)=nil, 0xa000, 0x2, 0x2172, 0xffffffffffffffff, 0x0)
r1 = socket$unix(0x1, 0x1, 0x0)
bind$unix(r1, 0x0, 0x0)
close(r1)

06:19:18 executing program 3:
r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0)
mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800004, 0x12, r0, 0x0)
preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x9, 0x0)
socket$unix(0x1, 0x1, 0x0)
close(0xffffffffffffffff)

06:19:18 executing program 0:
r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0)
mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800004, 0x12, r0, 0x0)
preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x9, 0x0)
mmap(&(0x7f0000000000/0xa000)=nil, 0xa000, 0x2, 0x2172, 0xffffffffffffffff, 0x0)
syz_mount_image$reiserfs(&(0x7f0000000140), &(0x7f0000000180)='./file0\x00', 0x0, 0x0, &(0x7f0000000300), 0x0, 0x0)

06:19:19 executing program 2:
syz_genetlink_get_family_id$nl80211(&(0x7f0000000680), 0xffffffffffffffff)
ioctl$sock_SIOCGIFINDEX_80211(0xffffffffffffffff, 0x8933, &(0x7f0000000c00)={'wlan1\x00'})
r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0)
mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800004, 0x12, r0, 0x0)
preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x9, 0x0)
r1 = syz_open_dev$tty1(0xc, 0x4, 0x1)
write$binfmt_elf64(r1, &(0x7f0000000380)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x80, 0x1, 0x9, 0x1, 0x2, 0x3e, 0x7ff, 0x1f2, 0x40, 0x1f4, 0xbfa, 0x3, 0x38, 0x1, 0x5, 0x4, 0x4}, [{0x5, 0x9, 0x6, 0x101, 0x6, 0x4, 0x9, 0x6}, {0x5, 0x3, 0x5e61, 0x80000000, 0xcc3, 0x9, 0x7, 0x8}], "d1660f10e0ac4a6edbf3aa53803c8f57ef2a12069e82553332d2b96d67f2dbc5b04959dad57c303d876233684f5e9ad402a193da791e11122f2cccbf10d6d499f5e16385d09f63891a965d80bcb68b551fabffb4bf0b5c372b4d69cdefac988201a40429a8d0dc699820193afcab08070fde89c22e16b43dde5e37d9a3df0cd352e8667f163774d9dc3c79571e5100046281", ['\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00']}, 0x842)

06:19:19 executing program 3:
r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0)
mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800004, 0x12, r0, 0x0)
preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x9, 0x0)
socket$unix(0x1, 0x1, 0x0)
close(0xffffffffffffffff)

06:19:19 executing program 1:
r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0)
mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800004, 0x12, r0, 0x0)
preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x9, 0x0)
mmap(&(0x7f0000000000/0xa000)=nil, 0xa000, 0x2, 0x2172, 0xffffffffffffffff, 0x0)
r1 = socket$unix(0x1, 0x1, 0x0)
bind$unix(r1, 0x0, 0x0)
close(r1)

06:19:19 executing program 0:
r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0)
mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800004, 0x12, r0, 0x0)
preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x9, 0x0)
mmap(&(0x7f0000000000/0xa000)=nil, 0xa000, 0x2, 0x2172, 0xffffffffffffffff, 0x0)
syz_mount_image$reiserfs(&(0x7f0000000140), &(0x7f0000000180)='./file0\x00', 0x0, 0x0, &(0x7f0000000300), 0x0, 0x0)

06:19:19 executing program 1:
r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0)
mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800004, 0x12, r0, 0x0)
preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x9, 0x0)
mmap(&(0x7f0000000000/0xa000)=nil, 0xa000, 0x2, 0x2172, 0xffffffffffffffff, 0x0)
r1 = socket$unix(0x1, 0x1, 0x0)
bind$unix(r1, 0x0, 0x0)
close(r1)

06:19:19 executing program 0:
r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0)
mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800004, 0x12, r0, 0x0)
preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x9, 0x0)
mmap(&(0x7f0000000000/0xa000)=nil, 0xa000, 0x2, 0x2172, 0xffffffffffffffff, 0x0)
syz_mount_image$reiserfs(&(0x7f0000000140), &(0x7f0000000180)='./file0\x00', 0x0, 0x0, &(0x7f0000000300), 0x0, &(0x7f0000000440)={[{@balloc_no_unhash_reloc}, {@nolargeio}], [{@obj_role={'obj_role', 0x3d, '^'}}, {@hash}, {@uid_lt}, {@mask={'mask', 0x3d, 'MAY_EXEC'}}, {@uid_lt={'uid<', 0xee00}}, {@smackfsfloor={'smackfsfloor', 0x3d, ':%#[@'}}, {@obj_user={'obj_user', 0x3d, ',\\*),i'}}, {@uid_eq={'uid', 0x3d, 0xee00}}, {@seclabel}, {@uid_lt={'uid<', 0xee00}}]})

06:19:19 executing program 1:
r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0)
mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800004, 0x12, r0, 0x0)
preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x9, 0x0)
mmap(&(0x7f0000000000/0xa000)=nil, 0xa000, 0x2, 0x2172, 0xffffffffffffffff, 0x0)
r1 = socket$unix(0x1, 0x1, 0x0)
bind$unix(r1, &(0x7f00000001c0)=@file={0x0, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x56)
close(r1)

06:19:19 executing program 3:
r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0)
mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800004, 0x12, r0, 0x0)
preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x9, 0x0)
socket$unix(0x1, 0x1, 0x0)
close(0xffffffffffffffff)

[  362.325000][T16224] REISERFS warning (device loop0): super-6504 reiserfs_getopt: the option "nolargeio" requires an argument
[  362.325000][T16224] 
06:19:20 executing program 2:
syz_genetlink_get_family_id$nl80211(&(0x7f0000000680), 0xffffffffffffffff)
r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0)
mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800004, 0x12, r0, 0x0)
preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x9, 0x0)
r1 = syz_open_dev$tty1(0xc, 0x4, 0x1)
write$binfmt_elf64(r1, &(0x7f0000000380)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x80, 0x1, 0x9, 0x1, 0x2, 0x3e, 0x7ff, 0x1f2, 0x40, 0x1f4, 0xbfa, 0x3, 0x38, 0x1, 0x5, 0x4, 0x4}, [{0x5, 0x9, 0x6, 0x101, 0x6, 0x4, 0x9, 0x6}, {0x5, 0x3, 0x5e61, 0x80000000, 0xcc3, 0x9, 0x7, 0x8}], "d1660f10e0ac4a6edbf3aa53803c8f57ef2a12069e82553332d2b96d67f2dbc5b04959dad57c303d876233684f5e9ad402a193da791e11122f2cccbf10d6d499f5e16385d09f63891a965d80bcb68b551fabffb4bf0b5c372b4d69cdefac988201a40429a8d0dc699820193afcab08070fde89c22e16b43dde5e37d9a3df0cd352e8667f163774d9dc3c79571e5100046281", ['\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00']}, 0x842)

06:19:20 executing program 1:
r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0)
mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800004, 0x12, r0, 0x0)
preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x9, 0x0)
mmap(&(0x7f0000000000/0xa000)=nil, 0xa000, 0x2, 0x2172, 0xffffffffffffffff, 0x0)
r1 = socket$unix(0x1, 0x1, 0x0)
bind$unix(r1, &(0x7f00000001c0)=@file={0x0, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x56)
close(r1)

06:19:20 executing program 3:
r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0)
mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800004, 0x12, r0, 0x0)
preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x9, 0x0)
mmap(&(0x7f0000000000/0xa000)=nil, 0xa000, 0x2, 0x2172, 0xffffffffffffffff, 0x0)
syz_mount_image$reiserfs(&(0x7f0000000140), 0x0, 0x8000, 0x3, &(0x7f0000000300)=[{&(0x7f0000000540)="21d37ef07e82e237fbe1b40158d20e242c5ea1f9d9edc6b9395250085d6dfa486982e82d4ce1a5e2bc00d29383bae640de", 0x31, 0x7}, {&(0x7f0000000240)="c43f281f483aa6cd83e40e59d53f177299d285bbe5d90aab2b56a76f9db49d86afa5a0f601ba9b3502de5f3724f3ec00927151f928f668b362052950a2e8f16baec29875fdad59395e86a1050c368933e3ed5a17d76bd7bded793436ea207885f395ace3fc12126c205b170be392c1645233ef01f9661090706a65f63b4845dc2884a20711a8024ad4af44aeec9db33991dae38d95cdb7132970d0d4dec58b9d46d378", 0xa3, 0x6}, {&(0x7f0000000380)="05f82c760d277896dd8c9891a41aafe24124891a32a238c3c78696d112aa09f3ae5c54b0c08676da5db7f358c72dfaca9a5d90860b4ae363c9a921c47965d339c23408a6d9b31a23aee27822f0a140d8e4ec9475a740113f2b9923b46333110e528e0a513151aad34aee1b5310fcf62c1982349253003d6d53aebbe09cf5918668ee682be93b6a671bbc", 0x8a, 0x3}], 0x2000400, &(0x7f0000000440)={[{@balloc_no_unhash_reloc}, {@nolargeio}, {@grpjquota}], [{@obj_role={'obj_role', 0x3d, '^'}}, {@hash}, {@uid_lt}, {@mask={'mask', 0x3d, 'MAY_EXEC'}}, {@uid_lt={'uid<', 0xee00}}, {@smackfsfloor={'smackfsfloor', 0x3d, ':%#[@'}}, {@obj_user={'obj_user', 0x3d, ',\\*),i'}}, {@uid_eq={'uid', 0x3d, 0xee00}}, {@seclabel}, {@uid_lt={'uid<', 0xee00}}]})

06:19:20 executing program 0:
r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0)
mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800004, 0x12, r0, 0x0)
preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x9, 0x0)
mmap(&(0x7f0000000000/0xa000)=nil, 0xa000, 0x2, 0x2172, 0xffffffffffffffff, 0x0)
syz_mount_image$reiserfs(&(0x7f0000000140), &(0x7f0000000180)='./file0\x00', 0x0, 0x0, &(0x7f0000000300), 0x0, &(0x7f0000000440)={[{@balloc_no_unhash_reloc}], [{@obj_role={'obj_role', 0x3d, '^'}}, {@hash}, {@uid_lt}, {@mask={'mask', 0x3d, 'MAY_EXEC'}}, {@uid_lt={'uid<', 0xee00}}, {@smackfsfloor={'smackfsfloor', 0x3d, ':%#[@'}}, {@obj_user={'obj_user', 0x3d, ',\\*),i'}}, {@uid_eq={'uid', 0x3d, 0xee00}}, {@seclabel}, {@uid_lt={'uid<', 0xee00}}]})

[  363.036475][T16240] loop3: detected capacity change from 0 to 64
[  363.058345][T16236] REISERFS warning (device loop0): super-6502 reiserfs_getopt: unknown mount option "obj_role=^"
06:19:20 executing program 1:
r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0)
mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800004, 0x12, r0, 0x0)
preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x9, 0x0)
mmap(&(0x7f0000000000/0xa000)=nil, 0xa000, 0x2, 0x2172, 0xffffffffffffffff, 0x0)
r1 = socket$unix(0x1, 0x1, 0x0)
bind$unix(r1, &(0x7f00000001c0)=@file={0x0, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x56)
close(r1)

06:19:20 executing program 3:
r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0)
mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800004, 0x12, 0xffffffffffffffff, 0x0)
preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x9, 0x0)
r1 = socket$unix(0x1, 0x1, 0x0)
close(r1)

06:19:20 executing program 1:
r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0)
mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800004, 0x12, r0, 0x0)
preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x9, 0x0)
mmap(&(0x7f0000000000/0xa000)=nil, 0xa000, 0x2, 0x2172, 0xffffffffffffffff, 0x0)
r1 = socket$unix(0x1, 0x1, 0x0)
bind$unix(r1, &(0x7f00000001c0)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x56)
close(0xffffffffffffffff)

06:19:20 executing program 0:
r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0)
mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800004, 0x12, r0, 0x0)
preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x9, 0x0)
mmap(&(0x7f0000000000/0xa000)=nil, 0xa000, 0x2, 0x2172, 0xffffffffffffffff, 0x0)
syz_mount_image$reiserfs(&(0x7f0000000140), &(0x7f0000000180)='./file0\x00', 0x0, 0x0, &(0x7f0000000300), 0x0, &(0x7f0000000440)={[{@balloc_no_unhash_reloc}], [{@obj_role={'obj_role', 0x3d, '^'}}, {@hash}, {@uid_lt}, {@mask={'mask', 0x3d, 'MAY_EXEC'}}, {@uid_lt={'uid<', 0xee00}}, {@smackfsfloor={'smackfsfloor', 0x3d, ':%#[@'}}, {@obj_user={'obj_user', 0x3d, ',\\*),i'}}, {@uid_eq={'uid', 0x3d, 0xee00}}, {@seclabel}, {@uid_lt={'uid<', 0xee00}}]})

[  363.331586][T16256] REISERFS warning (device loop0): super-6502 reiserfs_getopt: unknown mount option "obj_role=^"
06:19:21 executing program 3:
r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0)
mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800004, 0x12, r0, 0x0)
preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x9, 0x0)
mmap(&(0x7f0000000000/0xa000)=nil, 0xa000, 0x2, 0x2172, 0xffffffffffffffff, 0x0)
syz_mount_image$reiserfs(&(0x7f0000000140), &(0x7f0000000180)='./file0\x00', 0x0, 0x0, &(0x7f0000000300), 0x0, &(0x7f0000000440)={[{@balloc_no_unhash_reloc}], [{@obj_role={'obj_role', 0x3d, '^'}}, {@hash}, {@uid_lt}, {@mask={'mask', 0x3d, 'MAY_EXEC'}}, {@uid_lt={'uid<', 0xee00}}, {@smackfsfloor={'smackfsfloor', 0x3d, ':%#[@'}}, {@obj_user={'obj_user', 0x3d, ',\\*),i'}}, {@uid_eq={'uid', 0x3d, 0xee00}}, {@seclabel}, {@uid_lt={'uid<', 0xee00}}]})

06:19:21 executing program 1:
r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0)
mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800004, 0x12, r0, 0x0)
preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x9, 0x0)
mmap(&(0x7f0000000000/0xa000)=nil, 0xa000, 0x2, 0x2172, 0xffffffffffffffff, 0x0)
r1 = socket$unix(0x1, 0x1, 0x0)
bind$unix(r1, &(0x7f00000001c0)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x56)
close(0xffffffffffffffff)

06:19:21 executing program 0:
r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0)
mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800004, 0x12, r0, 0x0)
preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x9, 0x0)
mmap(&(0x7f0000000000/0xa000)=nil, 0xa000, 0x2, 0x2172, 0xffffffffffffffff, 0x0)
syz_mount_image$reiserfs(&(0x7f0000000140), &(0x7f0000000180)='./file0\x00', 0x0, 0x0, &(0x7f0000000300), 0x0, &(0x7f0000000440)={[{@balloc_no_unhash_reloc}], [{@obj_role={'obj_role', 0x3d, '^'}}, {@hash}, {@uid_lt}, {@mask={'mask', 0x3d, 'MAY_EXEC'}}, {@uid_lt={'uid<', 0xee00}}, {@smackfsfloor={'smackfsfloor', 0x3d, ':%#[@'}}, {@obj_user={'obj_user', 0x3d, ',\\*),i'}}, {@uid_eq={'uid', 0x3d, 0xee00}}, {@seclabel}, {@uid_lt={'uid<', 0xee00}}]})

06:19:21 executing program 2:
r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0)
mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800004, 0x12, r0, 0x0)
preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x9, 0x0)
r1 = syz_open_dev$tty1(0xc, 0x4, 0x1)
write$binfmt_elf64(r1, &(0x7f0000000380)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x80, 0x1, 0x9, 0x1, 0x2, 0x3e, 0x7ff, 0x1f2, 0x40, 0x1f4, 0xbfa, 0x3, 0x38, 0x1, 0x5, 0x4, 0x4}, [{0x5, 0x9, 0x6, 0x101, 0x6, 0x4, 0x9, 0x6}, {0x5, 0x3, 0x5e61, 0x80000000, 0xcc3, 0x9, 0x7, 0x8}], "d1660f10e0ac4a6edbf3aa53803c8f57ef2a12069e82553332d2b96d67f2dbc5b04959dad57c303d876233684f5e9ad402a193da791e11122f2cccbf10d6d499f5e16385d09f63891a965d80bcb68b551fabffb4bf0b5c372b4d69cdefac988201a40429a8d0dc699820193afcab08070fde89c22e16b43dde5e37d9a3df0cd352e8667f163774d9dc3c79571e5100046281", ['\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00']}, 0x842)

[  363.957326][T16269] REISERFS warning (device loop0): super-6502 reiserfs_getopt: unknown mount option "obj_role=^"
[  363.974978][T16268] REISERFS warning (device loop3): super-6502 reiserfs_getopt: unknown mount option "obj_role=^"
06:19:21 executing program 1:
r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0)
mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800004, 0x12, r0, 0x0)
preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x9, 0x0)
mmap(&(0x7f0000000000/0xa000)=nil, 0xa000, 0x2, 0x2172, 0xffffffffffffffff, 0x0)
r1 = socket$unix(0x1, 0x1, 0x0)
bind$unix(r1, &(0x7f00000001c0)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x56)
close(0xffffffffffffffff)

06:19:21 executing program 1:
r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0)
mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800004, 0x12, r0, 0x0)
preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x9, 0x0)
mmap(&(0x7f0000000000/0xa000)=nil, 0xa000, 0x2, 0x2172, 0xffffffffffffffff, 0x0)
syz_mount_image$reiserfs(0x0, &(0x7f0000000180)='./file0\x00', 0x8000, 0x3, &(0x7f0000000300)=[{&(0x7f0000000540)="21d37ef07e82e237fbe1b40158d20e242c5ea1f9d9edc6b9395250085d6dfa486982e82d4ce1a5e2bc00d29383bae640de", 0x31, 0x7}, {&(0x7f0000000240)="c43f281f483aa6cd83e40e59d53f177299d285bbe5d90aab2b56a76f9db49d86afa5a0f601ba9b3502de5f3724f3ec00927151f928f668b362052950a2e8f16baec29875fdad59395e86a1050c368933e3ed5a17d76bd7bded793436ea207885f395ace3fc12126c205b170be392c1645233ef01f9661090706a65f63b4845dc2884a20711a8024ad4af44aeec9db33991dae38d95cdb7132970d0d4dec58b9d46d378", 0xa3, 0x6}, {&(0x7f0000000380)="05f82c760d277896dd8c9891a41aafe24124891a32a238c3c78696d112aa09f3ae5c54b0c08676da5db7f358c72dfaca9a5d90860b4ae363c9a921c47965d339c23408a6d9b31a23aee27822f0a140d8e4ec9475a740113f2b9923b46333110e528e0a513151aad34aee1b5310fcf62c1982349253003d6d53aebbe09cf5918668ee682be93b6a671bbc", 0x8a, 0x3}], 0x2000400, &(0x7f0000000440)={[{@balloc_no_unhash_reloc}, {@nolargeio}, {@grpjquota}], [{@obj_role={'obj_role', 0x3d, '^'}}, {@hash}, {@uid_lt}, {@mask={'mask', 0x3d, 'MAY_EXEC'}}, {@uid_lt={'uid<', 0xee00}}, {@smackfsfloor={'smackfsfloor', 0x3d, ':%#[@'}}, {@obj_user={'obj_user', 0x3d, ',\\*),i'}}, {@uid_eq={'uid', 0x3d, 0xee00}}, {@seclabel}, {@uid_lt={'uid<', 0xee00}}]})

06:19:21 executing program 0:
r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0)
mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800004, 0x12, r0, 0x0)
preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x9, 0x0)
mmap(&(0x7f0000000000/0xa000)=nil, 0xa000, 0x2, 0x2172, 0xffffffffffffffff, 0x0)
syz_mount_image$reiserfs(&(0x7f0000000140), &(0x7f0000000180)='./file0\x00', 0x0, 0x0, &(0x7f0000000300), 0x0, &(0x7f0000000440)={[{@nolargeio}], [{@obj_role={'obj_role', 0x3d, '^'}}, {@hash}, {@uid_lt}, {@mask={'mask', 0x3d, 'MAY_EXEC'}}, {@uid_lt={'uid<', 0xee00}}, {@smackfsfloor={'smackfsfloor', 0x3d, ':%#[@'}}, {@obj_user={'obj_user', 0x3d, ',\\*),i'}}, {@uid_eq={'uid', 0x3d, 0xee00}}, {@seclabel}, {@uid_lt={'uid<', 0xee00}}]})

06:19:21 executing program 3:
r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0)
mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800004, 0x12, r0, 0x0)
preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x9, 0x0)
mmap(&(0x7f0000000000/0xa000)=nil, 0xa000, 0x2, 0x2172, 0xffffffffffffffff, 0x0)
syz_mount_image$reiserfs(&(0x7f0000000140), &(0x7f0000000180)='./file0\x00', 0x0, 0x0, &(0x7f0000000300), 0x0, &(0x7f0000000440)={[{@balloc_no_unhash_reloc}], [{@obj_role={'obj_role', 0x3d, '^'}}, {@hash}, {@uid_lt}, {@mask={'mask', 0x3d, 'MAY_EXEC'}}, {@uid_lt={'uid<', 0xee00}}, {@smackfsfloor={'smackfsfloor', 0x3d, ':%#[@'}}, {@obj_user={'obj_user', 0x3d, ',\\*),i'}}, {@uid_eq={'uid', 0x3d, 0xee00}}, {@seclabel}, {@uid_lt={'uid<', 0xee00}}]})

[  364.157695][T16285] loop1: detected capacity change from 0 to 64
[  364.186524][T16290] REISERFS warning (device loop0): super-6504 reiserfs_getopt: the option "nolargeio" requires an argument
[  364.186524][T16290] 
[  364.206444][T16294] REISERFS warning (device loop3): super-6502 reiserfs_getopt: unknown mount option "obj_role=^"
06:19:21 executing program 1:
r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0)
mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800004, 0x12, r0, 0x0)
preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x9, 0x0)
mmap(&(0x7f0000000000/0xa000)=nil, 0xa000, 0x2, 0x2172, 0xffffffffffffffff, 0x0)
syz_mount_image$reiserfs(0x0, &(0x7f0000000180)='./file0\x00', 0x8000, 0x3, &(0x7f0000000300)=[{&(0x7f0000000540)="21d37ef07e82e237fbe1b40158d20e242c5ea1f9d9edc6b9395250085d6dfa486982e82d4ce1a5e2bc00d29383bae640de", 0x31, 0x7}, {&(0x7f0000000240)="c43f281f483aa6cd83e40e59d53f177299d285bbe5d90aab2b56a76f9db49d86afa5a0f601ba9b3502de5f3724f3ec00927151f928f668b362052950a2e8f16baec29875fdad59395e86a1050c368933e3ed5a17d76bd7bded793436ea207885f395ace3fc12126c205b170be392c1645233ef01f9661090706a65f63b4845dc2884a20711a8024ad4af44aeec9db33991dae38d95cdb7132970d0d4dec58b9d46d378", 0xa3, 0x6}, {&(0x7f0000000380)="05f82c760d277896dd8c9891a41aafe24124891a32a238c3c78696d112aa09f3ae5c54b0c08676da5db7f358c72dfaca9a5d90860b4ae363c9a921c47965d339c23408a6d9b31a23aee27822f0a140d8e4ec9475a740113f2b9923b46333110e528e0a513151aad34aee1b5310fcf62c1982349253003d6d53aebbe09cf5918668ee682be93b6a671bbc", 0x8a, 0x3}], 0x2000400, &(0x7f0000000440)={[{@balloc_no_unhash_reloc}, {@nolargeio}, {@grpjquota}], [{@obj_role={'obj_role', 0x3d, '^'}}, {@hash}, {@uid_lt}, {@mask={'mask', 0x3d, 'MAY_EXEC'}}, {@uid_lt={'uid<', 0xee00}}, {@smackfsfloor={'smackfsfloor', 0x3d, ':%#[@'}}, {@obj_user={'obj_user', 0x3d, ',\\*),i'}}, {@uid_eq={'uid', 0x3d, 0xee00}}, {@seclabel}, {@uid_lt={'uid<', 0xee00}}]})

06:19:21 executing program 3:
r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0)
mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800004, 0x12, r0, 0x0)
preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x9, 0x0)
mmap(&(0x7f0000000000/0xa000)=nil, 0xa000, 0x2, 0x2172, 0xffffffffffffffff, 0x0)
syz_mount_image$reiserfs(&(0x7f0000000140), &(0x7f0000000180)='./file0\x00', 0x0, 0x0, &(0x7f0000000300), 0x0, &(0x7f0000000440)={[{@balloc_no_unhash_reloc}], [{@obj_role={'obj_role', 0x3d, '^'}}, {@hash}, {@uid_lt}, {@mask={'mask', 0x3d, 'MAY_EXEC'}}, {@uid_lt={'uid<', 0xee00}}, {@smackfsfloor={'smackfsfloor', 0x3d, ':%#[@'}}, {@obj_user={'obj_user', 0x3d, ',\\*),i'}}, {@uid_eq={'uid', 0x3d, 0xee00}}, {@seclabel}, {@uid_lt={'uid<', 0xee00}}]})

06:19:21 executing program 0:
r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0)
mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800004, 0x12, r0, 0x0)
preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x9, 0x0)
mmap(&(0x7f0000000000/0xa000)=nil, 0xa000, 0x2, 0x2172, 0xffffffffffffffff, 0x0)
syz_mount_image$reiserfs(&(0x7f0000000140), &(0x7f0000000180)='./file0\x00', 0x0, 0x0, &(0x7f0000000300), 0x0, &(0x7f0000000440)={[{@nolargeio}], [{@obj_role={'obj_role', 0x3d, '^'}}, {@hash}, {@uid_lt}, {@mask={'mask', 0x3d, 'MAY_EXEC'}}, {@uid_lt={'uid<', 0xee00}}, {@smackfsfloor={'smackfsfloor', 0x3d, ':%#[@'}}, {@obj_user={'obj_user', 0x3d, ',\\*),i'}}, {@uid_eq={'uid', 0x3d, 0xee00}}, {@seclabel}, {@uid_lt={'uid<', 0xee00}}]})

[  364.350824][T16302] loop1: detected capacity change from 0 to 64
[  364.388023][T16306] REISERFS warning (device loop3): super-6502 reiserfs_getopt: unknown mount option "obj_role=^"
[  364.398764][T16307] REISERFS warning (device loop0): super-6504 reiserfs_getopt: the option "nolargeio" requires an argument
[  364.398764][T16307] 
06:19:22 executing program 2:
r0 = openat(0xffffffffffffffff, 0x0, 0x0, 0x0)
mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800004, 0x12, r0, 0x0)
preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x9, 0x0)
r1 = syz_open_dev$tty1(0xc, 0x4, 0x1)
write$binfmt_elf64(r1, &(0x7f0000000380)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x80, 0x1, 0x9, 0x1, 0x2, 0x3e, 0x7ff, 0x1f2, 0x40, 0x1f4, 0xbfa, 0x3, 0x38, 0x1, 0x5, 0x4, 0x4}, [{0x5, 0x9, 0x6, 0x101, 0x6, 0x4, 0x9, 0x6}, {0x5, 0x3, 0x5e61, 0x80000000, 0xcc3, 0x9, 0x7, 0x8}], "d1660f10e0ac4a6edbf3aa53803c8f57ef2a12069e82553332d2b96d67f2dbc5b04959dad57c303d876233684f5e9ad402a193da791e11122f2cccbf10d6d499f5e16385d09f63891a965d80bcb68b551fabffb4bf0b5c372b4d69cdefac988201a40429a8d0dc699820193afcab08070fde89c22e16b43dde5e37d9a3df0cd352e8667f163774d9dc3c79571e5100046281", ['\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00']}, 0x842)

06:19:22 executing program 1:
r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0)
mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800004, 0x12, r0, 0x0)
preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x9, 0x0)
mmap(&(0x7f0000000000/0xa000)=nil, 0xa000, 0x2, 0x2172, 0xffffffffffffffff, 0x0)
syz_mount_image$reiserfs(0x0, &(0x7f0000000180)='./file0\x00', 0x8000, 0x3, &(0x7f0000000300)=[{&(0x7f0000000540)="21d37ef07e82e237fbe1b40158d20e242c5ea1f9d9edc6b9395250085d6dfa486982e82d4ce1a5e2bc00d29383bae640de", 0x31, 0x7}, {&(0x7f0000000240)="c43f281f483aa6cd83e40e59d53f177299d285bbe5d90aab2b56a76f9db49d86afa5a0f601ba9b3502de5f3724f3ec00927151f928f668b362052950a2e8f16baec29875fdad59395e86a1050c368933e3ed5a17d76bd7bded793436ea207885f395ace3fc12126c205b170be392c1645233ef01f9661090706a65f63b4845dc2884a20711a8024ad4af44aeec9db33991dae38d95cdb7132970d0d4dec58b9d46d378", 0xa3, 0x6}, {&(0x7f0000000380)="05f82c760d277896dd8c9891a41aafe24124891a32a238c3c78696d112aa09f3ae5c54b0c08676da5db7f358c72dfaca9a5d90860b4ae363c9a921c47965d339c23408a6d9b31a23aee27822f0a140d8e4ec9475a740113f2b9923b46333110e528e0a513151aad34aee1b5310fcf62c1982349253003d6d53aebbe09cf5918668ee682be93b6a671bbc", 0x8a, 0x3}], 0x2000400, &(0x7f0000000440)={[{@balloc_no_unhash_reloc}, {@nolargeio}, {@grpjquota}], [{@obj_role={'obj_role', 0x3d, '^'}}, {@hash}, {@uid_lt}, {@mask={'mask', 0x3d, 'MAY_EXEC'}}, {@uid_lt={'uid<', 0xee00}}, {@smackfsfloor={'smackfsfloor', 0x3d, ':%#[@'}}, {@obj_user={'obj_user', 0x3d, ',\\*),i'}}, {@uid_eq={'uid', 0x3d, 0xee00}}, {@seclabel}, {@uid_lt={'uid<', 0xee00}}]})

06:19:22 executing program 0:
r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0)
mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800004, 0x12, r0, 0x0)
preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x9, 0x0)
mmap(&(0x7f0000000000/0xa000)=nil, 0xa000, 0x2, 0x2172, 0xffffffffffffffff, 0x0)
syz_mount_image$reiserfs(&(0x7f0000000140), &(0x7f0000000180)='./file0\x00', 0x0, 0x0, &(0x7f0000000300), 0x0, &(0x7f0000000440)={[{@nolargeio}], [{@obj_role={'obj_role', 0x3d, '^'}}, {@hash}, {@uid_lt}, {@mask={'mask', 0x3d, 'MAY_EXEC'}}, {@uid_lt={'uid<', 0xee00}}, {@smackfsfloor={'smackfsfloor', 0x3d, ':%#[@'}}, {@obj_user={'obj_user', 0x3d, ',\\*),i'}}, {@uid_eq={'uid', 0x3d, 0xee00}}, {@seclabel}, {@uid_lt={'uid<', 0xee00}}]})

06:19:22 executing program 3:
r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0)
mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800004, 0x12, r0, 0x0)
preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x9, 0x0)
syz_mount_image$reiserfs(&(0x7f0000000140), &(0x7f0000000180)='./file0\x00', 0x0, 0x0, &(0x7f0000000300), 0x0, &(0x7f0000000440)={[{@balloc_no_unhash_reloc}], [{@obj_role={'obj_role', 0x3d, '^'}}, {@hash}, {@uid_lt}, {@mask={'mask', 0x3d, 'MAY_EXEC'}}, {@uid_lt={'uid<', 0xee00}}, {@smackfsfloor={'smackfsfloor', 0x3d, ':%#[@'}}, {@obj_user={'obj_user', 0x3d, ',\\*),i'}}, {@uid_eq={'uid', 0x3d, 0xee00}}, {@seclabel}, {@uid_lt={'uid<', 0xee00}}]})

[  364.869177][T16323] REISERFS warning (device loop0): super-6504 reiserfs_getopt: the option "nolargeio" requires an argument
[  364.869177][T16323] 
[  364.874005][T16327] loop1: detected capacity change from 0 to 64
06:19:22 executing program 0:
r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0)
mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800004, 0x12, r0, 0x0)
preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x9, 0x0)
mmap(&(0x7f0000000000/0xa000)=nil, 0xa000, 0x2, 0x2172, 0xffffffffffffffff, 0x0)
syz_mount_image$reiserfs(&(0x7f0000000140), &(0x7f0000000180)='./file0\x00', 0x0, 0x0, &(0x7f0000000300), 0x0, &(0x7f0000000440)={[{@balloc_no_unhash_reloc}, {@nolargeio}], [{@obj_role={'obj_role', 0x3d, '^'}}, {@hash}, {@uid_lt}, {@mask={'mask', 0x3d, 'MAY_EXEC'}}, {@uid_lt={'uid<', 0xee00}}, {@smackfsfloor={'smackfsfloor', 0x3d, ':%#[@'}}, {@obj_user={'obj_user', 0x3d, ',\\*),i'}}, {@uid_eq={'uid', 0x3d, 0xee00}}, {@seclabel}]})

06:19:22 executing program 1:
r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0)
mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800004, 0x12, r0, 0x0)
preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x9, 0x0)
syz_mount_image$reiserfs(0x0, &(0x7f0000000180)='./file0\x00', 0x8000, 0x3, &(0x7f0000000300)=[{&(0x7f0000000540)="21d37ef07e82e237fbe1b40158d20e242c5ea1f9d9edc6b9395250085d6dfa486982e82d4ce1a5e2bc00d29383bae640de", 0x31, 0x7}, {&(0x7f0000000240)="c43f281f483aa6cd83e40e59d53f177299d285bbe5d90aab2b56a76f9db49d86afa5a0f601ba9b3502de5f3724f3ec00927151f928f668b362052950a2e8f16baec29875fdad59395e86a1050c368933e3ed5a17d76bd7bded793436ea207885f395ace3fc12126c205b170be392c1645233ef01f9661090706a65f63b4845dc2884a20711a8024ad4af44aeec9db33991dae38d95cdb7132970d0d4dec58b9d46d378", 0xa3, 0x6}, {&(0x7f0000000380)="05f82c760d277896dd8c9891a41aafe24124891a32a238c3c78696d112aa09f3ae5c54b0c08676da5db7f358c72dfaca9a5d90860b4ae363c9a921c47965d339c23408a6d9b31a23aee27822f0a140d8e4ec9475a740113f2b9923b46333110e528e0a513151aad34aee1b5310fcf62c1982349253003d6d53aebbe09cf5918668ee682be93b6a671bbc", 0x8a, 0x3}], 0x2000400, &(0x7f0000000440)={[{@balloc_no_unhash_reloc}, {@nolargeio}, {@grpjquota}], [{@obj_role={'obj_role', 0x3d, '^'}}, {@hash}, {@uid_lt}, {@mask={'mask', 0x3d, 'MAY_EXEC'}}, {@uid_lt={'uid<', 0xee00}}, {@smackfsfloor={'smackfsfloor', 0x3d, ':%#[@'}}, {@obj_user={'obj_user', 0x3d, ',\\*),i'}}, {@uid_eq={'uid', 0x3d, 0xee00}}, {@seclabel}, {@uid_lt={'uid<', 0xee00}}]})

06:19:22 executing program 3:
r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0)
mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800004, 0x12, r0, 0x0)
preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x9, 0x0)
syz_mount_image$reiserfs(&(0x7f0000000140), &(0x7f0000000180)='./file0\x00', 0x0, 0x0, &(0x7f0000000300), 0x0, &(0x7f0000000440)={[{@balloc_no_unhash_reloc}], [{@obj_role={'obj_role', 0x3d, '^'}}, {@hash}, {@uid_lt}, {@mask={'mask', 0x3d, 'MAY_EXEC'}}, {@uid_lt={'uid<', 0xee00}}, {@smackfsfloor={'smackfsfloor', 0x3d, ':%#[@'}}, {@obj_user={'obj_user', 0x3d, ',\\*),i'}}, {@uid_eq={'uid', 0x3d, 0xee00}}, {@seclabel}, {@uid_lt={'uid<', 0xee00}}]})

[  365.015484][T16337] REISERFS warning (device loop0): super-6504 reiserfs_getopt: the option "nolargeio" requires an argument
[  365.015484][T16337] 
06:19:22 executing program 0:
r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0)
mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800004, 0x12, r0, 0x0)
preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x9, 0x0)
mmap(&(0x7f0000000000/0xa000)=nil, 0xa000, 0x2, 0x2172, 0xffffffffffffffff, 0x0)
syz_mount_image$reiserfs(&(0x7f0000000140), &(0x7f0000000180)='./file0\x00', 0x0, 0x0, &(0x7f0000000300), 0x0, &(0x7f0000000440)={[{@balloc_no_unhash_reloc}, {@nolargeio}], [{@obj_role={'obj_role', 0x3d, '^'}}, {@hash}, {@uid_lt}, {@mask={'mask', 0x3d, 'MAY_EXEC'}}, {@uid_lt={'uid<', 0xee00}}, {@smackfsfloor={'smackfsfloor', 0x3d, ':%#[@'}}, {@obj_user={'obj_user', 0x3d, ',\\*),i'}}, {@uid_eq={'uid', 0x3d, 0xee00}}]})

06:19:22 executing program 1:
r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0)
mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800004, 0x12, r0, 0x0)
preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x9, 0x0)
syz_mount_image$reiserfs(0x0, &(0x7f0000000180)='./file0\x00', 0x8000, 0x3, &(0x7f0000000300)=[{&(0x7f0000000540)="21d37ef07e82e237fbe1b40158d20e242c5ea1f9d9edc6b9395250085d6dfa486982e82d4ce1a5e2bc00d29383bae640de", 0x31, 0x7}, {&(0x7f0000000240)="c43f281f483aa6cd83e40e59d53f177299d285bbe5d90aab2b56a76f9db49d86afa5a0f601ba9b3502de5f3724f3ec00927151f928f668b362052950a2e8f16baec29875fdad59395e86a1050c368933e3ed5a17d76bd7bded793436ea207885f395ace3fc12126c205b170be392c1645233ef01f9661090706a65f63b4845dc2884a20711a8024ad4af44aeec9db33991dae38d95cdb7132970d0d4dec58b9d46d378", 0xa3, 0x6}, {&(0x7f0000000380)="05f82c760d277896dd8c9891a41aafe24124891a32a238c3c78696d112aa09f3ae5c54b0c08676da5db7f358c72dfaca9a5d90860b4ae363c9a921c47965d339c23408a6d9b31a23aee27822f0a140d8e4ec9475a740113f2b9923b46333110e528e0a513151aad34aee1b5310fcf62c1982349253003d6d53aebbe09cf5918668ee682be93b6a671bbc", 0x8a, 0x3}], 0x2000400, &(0x7f0000000440)={[{@balloc_no_unhash_reloc}, {@nolargeio}, {@grpjquota}], [{@obj_role={'obj_role', 0x3d, '^'}}, {@hash}, {@uid_lt}, {@mask={'mask', 0x3d, 'MAY_EXEC'}}, {@uid_lt={'uid<', 0xee00}}, {@smackfsfloor={'smackfsfloor', 0x3d, ':%#[@'}}, {@obj_user={'obj_user', 0x3d, ',\\*),i'}}, {@uid_eq={'uid', 0x3d, 0xee00}}, {@seclabel}, {@uid_lt={'uid<', 0xee00}}]})

[  365.197330][T16352] REISERFS warning (device loop0): super-6504 reiserfs_getopt: the option "nolargeio" requires an argument
[  365.197330][T16352] 
06:19:23 executing program 3:
r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0)
mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800004, 0x12, r0, 0x0)
preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x9, 0x0)
syz_mount_image$reiserfs(&(0x7f0000000140), &(0x7f0000000180)='./file0\x00', 0x0, 0x0, &(0x7f0000000300), 0x0, &(0x7f0000000440)={[{@balloc_no_unhash_reloc}], [{@obj_role={'obj_role', 0x3d, '^'}}, {@hash}, {@uid_lt}, {@mask={'mask', 0x3d, 'MAY_EXEC'}}, {@uid_lt={'uid<', 0xee00}}, {@smackfsfloor={'smackfsfloor', 0x3d, ':%#[@'}}, {@obj_user={'obj_user', 0x3d, ',\\*),i'}}, {@uid_eq={'uid', 0x3d, 0xee00}}, {@seclabel}, {@uid_lt={'uid<', 0xee00}}]})

06:19:23 executing program 2:
r0 = openat(0xffffffffffffffff, 0x0, 0x0, 0x0)
mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800004, 0x12, r0, 0x0)
preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x9, 0x0)
r1 = syz_open_dev$tty1(0xc, 0x4, 0x1)
write$binfmt_elf64(r1, &(0x7f0000000380)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x80, 0x1, 0x9, 0x1, 0x2, 0x3e, 0x7ff, 0x1f2, 0x40, 0x1f4, 0xbfa, 0x3, 0x38, 0x1, 0x5, 0x4, 0x4}, [{0x5, 0x9, 0x6, 0x101, 0x6, 0x4, 0x9, 0x6}, {0x5, 0x3, 0x5e61, 0x80000000, 0xcc3, 0x9, 0x7, 0x8}], "d1660f10e0ac4a6edbf3aa53803c8f57ef2a12069e82553332d2b96d67f2dbc5b04959dad57c303d876233684f5e9ad402a193da791e11122f2cccbf10d6d499f5e16385d09f63891a965d80bcb68b551fabffb4bf0b5c372b4d69cdefac988201a40429a8d0dc699820193afcab08070fde89c22e16b43dde5e37d9a3df0cd352e8667f163774d9dc3c79571e5100046281", ['\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00']}, 0x842)

06:19:23 executing program 1:
r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0)
mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800004, 0x12, r0, 0x0)
preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x9, 0x0)
syz_mount_image$reiserfs(0x0, &(0x7f0000000180)='./file0\x00', 0x8000, 0x3, &(0x7f0000000300)=[{&(0x7f0000000540)="21d37ef07e82e237fbe1b40158d20e242c5ea1f9d9edc6b9395250085d6dfa486982e82d4ce1a5e2bc00d29383bae640de", 0x31, 0x7}, {&(0x7f0000000240)="c43f281f483aa6cd83e40e59d53f177299d285bbe5d90aab2b56a76f9db49d86afa5a0f601ba9b3502de5f3724f3ec00927151f928f668b362052950a2e8f16baec29875fdad59395e86a1050c368933e3ed5a17d76bd7bded793436ea207885f395ace3fc12126c205b170be392c1645233ef01f9661090706a65f63b4845dc2884a20711a8024ad4af44aeec9db33991dae38d95cdb7132970d0d4dec58b9d46d378", 0xa3, 0x6}, {&(0x7f0000000380)="05f82c760d277896dd8c9891a41aafe24124891a32a238c3c78696d112aa09f3ae5c54b0c08676da5db7f358c72dfaca9a5d90860b4ae363c9a921c47965d339c23408a6d9b31a23aee27822f0a140d8e4ec9475a740113f2b9923b46333110e528e0a513151aad34aee1b5310fcf62c1982349253003d6d53aebbe09cf5918668ee682be93b6a671bbc", 0x8a, 0x3}], 0x2000400, &(0x7f0000000440)={[{@balloc_no_unhash_reloc}, {@nolargeio}, {@grpjquota}], [{@obj_role={'obj_role', 0x3d, '^'}}, {@hash}, {@uid_lt}, {@mask={'mask', 0x3d, 'MAY_EXEC'}}, {@uid_lt={'uid<', 0xee00}}, {@smackfsfloor={'smackfsfloor', 0x3d, ':%#[@'}}, {@obj_user={'obj_user', 0x3d, ',\\*),i'}}, {@uid_eq={'uid', 0x3d, 0xee00}}, {@seclabel}, {@uid_lt={'uid<', 0xee00}}]})

06:19:23 executing program 0:
r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0)
mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800004, 0x12, r0, 0x0)
preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x9, 0x0)
mmap(&(0x7f0000000000/0xa000)=nil, 0xa000, 0x2, 0x2172, 0xffffffffffffffff, 0x0)
syz_mount_image$reiserfs(&(0x7f0000000140), &(0x7f0000000180)='./file0\x00', 0x0, 0x0, &(0x7f0000000300), 0x0, &(0x7f0000000440)={[{@balloc_no_unhash_reloc}, {@nolargeio}], [{@obj_role={'obj_role', 0x3d, '^'}}, {@hash}, {@uid_lt}, {@mask={'mask', 0x3d, 'MAY_EXEC'}}, {@uid_lt={'uid<', 0xee00}}, {@smackfsfloor={'smackfsfloor', 0x3d, ':%#[@'}}, {@obj_user={'obj_user', 0x3d, ',\\*),i'}}]})

[  365.787687][T16370] REISERFS warning (device loop0): super-6504 reiserfs_getopt: the option "nolargeio" requires an argument
[  365.787687][T16370] 
06:19:23 executing program 1:
r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0)
mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800004, 0x12, r0, 0x0)
mmap(&(0x7f0000000000/0xa000)=nil, 0xa000, 0x2, 0x2172, 0xffffffffffffffff, 0x0)
syz_mount_image$reiserfs(0x0, &(0x7f0000000180)='./file0\x00', 0x8000, 0x3, &(0x7f0000000300)=[{&(0x7f0000000540)="21d37ef07e82e237fbe1b40158d20e242c5ea1f9d9edc6b9395250085d6dfa486982e82d4ce1a5e2bc00d29383bae640de", 0x31, 0x7}, {&(0x7f0000000240)="c43f281f483aa6cd83e40e59d53f177299d285bbe5d90aab2b56a76f9db49d86afa5a0f601ba9b3502de5f3724f3ec00927151f928f668b362052950a2e8f16baec29875fdad59395e86a1050c368933e3ed5a17d76bd7bded793436ea207885f395ace3fc12126c205b170be392c1645233ef01f9661090706a65f63b4845dc2884a20711a8024ad4af44aeec9db33991dae38d95cdb7132970d0d4dec58b9d46d378", 0xa3, 0x6}, {&(0x7f0000000380)="05f82c760d277896dd8c9891a41aafe24124891a32a238c3c78696d112aa09f3ae5c54b0c08676da5db7f358c72dfaca9a5d90860b4ae363c9a921c47965d339c23408a6d9b31a23aee27822f0a140d8e4ec9475a740113f2b9923b46333110e528e0a513151aad34aee1b5310fcf62c1982349253003d6d53aebbe09cf5918668ee682be93b6a671bbc", 0x8a, 0x3}], 0x2000400, &(0x7f0000000440)={[{@balloc_no_unhash_reloc}, {@nolargeio}, {@grpjquota}], [{@obj_role={'obj_role', 0x3d, '^'}}, {@hash}, {@uid_lt}, {@mask={'mask', 0x3d, 'MAY_EXEC'}}, {@uid_lt={'uid<', 0xee00}}, {@smackfsfloor={'smackfsfloor', 0x3d, ':%#[@'}}, {@obj_user={'obj_user', 0x3d, ',\\*),i'}}, {@uid_eq={'uid', 0x3d, 0xee00}}, {@seclabel}, {@uid_lt={'uid<', 0xee00}}]})

[  365.845223][T16376] loop1: detected capacity change from 0 to 64
06:19:23 executing program 0:
r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0)
mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800004, 0x12, r0, 0x0)
preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x9, 0x0)
mmap(&(0x7f0000000000/0xa000)=nil, 0xa000, 0x2, 0x2172, 0xffffffffffffffff, 0x0)
syz_mount_image$reiserfs(&(0x7f0000000140), &(0x7f0000000180)='./file0\x00', 0x0, 0x0, &(0x7f0000000300), 0x0, &(0x7f0000000440)={[{@balloc_no_unhash_reloc}, {@nolargeio}], [{@obj_role={'obj_role', 0x3d, '^'}}, {@hash}, {@uid_lt}, {@mask={'mask', 0x3d, 'MAY_EXEC'}}, {@uid_lt={'uid<', 0xee00}}, {@smackfsfloor={'smackfsfloor', 0x3d, ':%#[@'}}]})

06:19:23 executing program 3:
r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0)
mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800004, 0x12, r0, 0x0)
mmap(&(0x7f0000000000/0xa000)=nil, 0xa000, 0x2, 0x2172, 0xffffffffffffffff, 0x0)
syz_mount_image$reiserfs(&(0x7f0000000140), &(0x7f0000000180)='./file0\x00', 0x0, 0x0, &(0x7f0000000300), 0x0, &(0x7f0000000440)={[{@balloc_no_unhash_reloc}], [{@obj_role={'obj_role', 0x3d, '^'}}, {@hash}, {@uid_lt}, {@mask={'mask', 0x3d, 'MAY_EXEC'}}, {@uid_lt={'uid<', 0xee00}}, {@smackfsfloor={'smackfsfloor', 0x3d, ':%#[@'}}, {@obj_user={'obj_user', 0x3d, ',\\*),i'}}, {@uid_eq={'uid', 0x3d, 0xee00}}, {@seclabel}, {@uid_lt={'uid<', 0xee00}}]})

[  365.963932][T16385] REISERFS warning (device loop0): super-6504 reiserfs_getopt: the option "nolargeio" requires an argument
[  365.963932][T16385] 
06:19:23 executing program 1:
r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0)
mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800004, 0x12, r0, 0x0)
mmap(&(0x7f0000000000/0xa000)=nil, 0xa000, 0x2, 0x2172, 0xffffffffffffffff, 0x0)
syz_mount_image$reiserfs(0x0, &(0x7f0000000180)='./file0\x00', 0x8000, 0x3, &(0x7f0000000300)=[{&(0x7f0000000540)="21d37ef07e82e237fbe1b40158d20e242c5ea1f9d9edc6b9395250085d6dfa486982e82d4ce1a5e2bc00d29383bae640de", 0x31, 0x7}, {&(0x7f0000000240)="c43f281f483aa6cd83e40e59d53f177299d285bbe5d90aab2b56a76f9db49d86afa5a0f601ba9b3502de5f3724f3ec00927151f928f668b362052950a2e8f16baec29875fdad59395e86a1050c368933e3ed5a17d76bd7bded793436ea207885f395ace3fc12126c205b170be392c1645233ef01f9661090706a65f63b4845dc2884a20711a8024ad4af44aeec9db33991dae38d95cdb7132970d0d4dec58b9d46d378", 0xa3, 0x6}, {&(0x7f0000000380)="05f82c760d277896dd8c9891a41aafe24124891a32a238c3c78696d112aa09f3ae5c54b0c08676da5db7f358c72dfaca9a5d90860b4ae363c9a921c47965d339c23408a6d9b31a23aee27822f0a140d8e4ec9475a740113f2b9923b46333110e528e0a513151aad34aee1b5310fcf62c1982349253003d6d53aebbe09cf5918668ee682be93b6a671bbc", 0x8a, 0x3}], 0x2000400, &(0x7f0000000440)={[{@balloc_no_unhash_reloc}, {@nolargeio}, {@grpjquota}], [{@obj_role={'obj_role', 0x3d, '^'}}, {@hash}, {@uid_lt}, {@mask={'mask', 0x3d, 'MAY_EXEC'}}, {@uid_lt={'uid<', 0xee00}}, {@smackfsfloor={'smackfsfloor', 0x3d, ':%#[@'}}, {@obj_user={'obj_user', 0x3d, ',\\*),i'}}, {@uid_eq={'uid', 0x3d, 0xee00}}, {@seclabel}, {@uid_lt={'uid<', 0xee00}}]})

[  366.021929][T16388] REISERFS warning (device loop3): super-6502 reiserfs_getopt: unknown mount option "obj_role=^"
06:19:23 executing program 0:
r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0)
mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800004, 0x12, r0, 0x0)
preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x9, 0x0)
mmap(&(0x7f0000000000/0xa000)=nil, 0xa000, 0x2, 0x2172, 0xffffffffffffffff, 0x0)
syz_mount_image$reiserfs(&(0x7f0000000140), &(0x7f0000000180)='./file0\x00', 0x0, 0x0, &(0x7f0000000300), 0x0, &(0x7f0000000440)={[{@balloc_no_unhash_reloc}, {@nolargeio}], [{@obj_role={'obj_role', 0x3d, '^'}}, {@hash}, {@uid_lt}, {@mask={'mask', 0x3d, 'MAY_EXEC'}}, {@uid_lt={'uid<', 0xee00}}]})

[  366.153321][T16396] loop1: detected capacity change from 0 to 64
[  366.260517][T16401] REISERFS warning (device loop0): super-6504 reiserfs_getopt: the option "nolargeio" requires an argument
[  366.260517][T16401] 
06:19:24 executing program 3:
r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0)
mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800004, 0x12, r0, 0x0)
mmap(&(0x7f0000000000/0xa000)=nil, 0xa000, 0x2, 0x2172, 0xffffffffffffffff, 0x0)
syz_mount_image$reiserfs(&(0x7f0000000140), &(0x7f0000000180)='./file0\x00', 0x0, 0x0, &(0x7f0000000300), 0x0, &(0x7f0000000440)={[{@balloc_no_unhash_reloc}], [{@obj_role={'obj_role', 0x3d, '^'}}, {@hash}, {@uid_lt}, {@mask={'mask', 0x3d, 'MAY_EXEC'}}, {@uid_lt={'uid<', 0xee00}}, {@smackfsfloor={'smackfsfloor', 0x3d, ':%#[@'}}, {@obj_user={'obj_user', 0x3d, ',\\*),i'}}, {@uid_eq={'uid', 0x3d, 0xee00}}, {@seclabel}, {@uid_lt={'uid<', 0xee00}}]})

06:19:24 executing program 1:
r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0)
mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800004, 0x12, r0, 0x0)
mmap(&(0x7f0000000000/0xa000)=nil, 0xa000, 0x2, 0x2172, 0xffffffffffffffff, 0x0)
syz_mount_image$reiserfs(0x0, &(0x7f0000000180)='./file0\x00', 0x8000, 0x3, &(0x7f0000000300)=[{&(0x7f0000000540)="21d37ef07e82e237fbe1b40158d20e242c5ea1f9d9edc6b9395250085d6dfa486982e82d4ce1a5e2bc00d29383bae640de", 0x31, 0x7}, {&(0x7f0000000240)="c43f281f483aa6cd83e40e59d53f177299d285bbe5d90aab2b56a76f9db49d86afa5a0f601ba9b3502de5f3724f3ec00927151f928f668b362052950a2e8f16baec29875fdad59395e86a1050c368933e3ed5a17d76bd7bded793436ea207885f395ace3fc12126c205b170be392c1645233ef01f9661090706a65f63b4845dc2884a20711a8024ad4af44aeec9db33991dae38d95cdb7132970d0d4dec58b9d46d378", 0xa3, 0x6}, {&(0x7f0000000380)="05f82c760d277896dd8c9891a41aafe24124891a32a238c3c78696d112aa09f3ae5c54b0c08676da5db7f358c72dfaca9a5d90860b4ae363c9a921c47965d339c23408a6d9b31a23aee27822f0a140d8e4ec9475a740113f2b9923b46333110e528e0a513151aad34aee1b5310fcf62c1982349253003d6d53aebbe09cf5918668ee682be93b6a671bbc", 0x8a, 0x3}], 0x2000400, &(0x7f0000000440)={[{@balloc_no_unhash_reloc}, {@nolargeio}, {@grpjquota}], [{@obj_role={'obj_role', 0x3d, '^'}}, {@hash}, {@uid_lt}, {@mask={'mask', 0x3d, 'MAY_EXEC'}}, {@uid_lt={'uid<', 0xee00}}, {@smackfsfloor={'smackfsfloor', 0x3d, ':%#[@'}}, {@obj_user={'obj_user', 0x3d, ',\\*),i'}}, {@uid_eq={'uid', 0x3d, 0xee00}}, {@seclabel}, {@uid_lt={'uid<', 0xee00}}]})

06:19:24 executing program 2:
r0 = openat(0xffffffffffffffff, 0x0, 0x0, 0x0)
mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800004, 0x12, r0, 0x0)
preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x9, 0x0)
r1 = syz_open_dev$tty1(0xc, 0x4, 0x1)
write$binfmt_elf64(r1, &(0x7f0000000380)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x80, 0x1, 0x9, 0x1, 0x2, 0x3e, 0x7ff, 0x1f2, 0x40, 0x1f4, 0xbfa, 0x3, 0x38, 0x1, 0x5, 0x4, 0x4}, [{0x5, 0x9, 0x6, 0x101, 0x6, 0x4, 0x9, 0x6}, {0x5, 0x3, 0x5e61, 0x80000000, 0xcc3, 0x9, 0x7, 0x8}], "d1660f10e0ac4a6edbf3aa53803c8f57ef2a12069e82553332d2b96d67f2dbc5b04959dad57c303d876233684f5e9ad402a193da791e11122f2cccbf10d6d499f5e16385d09f63891a965d80bcb68b551fabffb4bf0b5c372b4d69cdefac988201a40429a8d0dc699820193afcab08070fde89c22e16b43dde5e37d9a3df0cd352e8667f163774d9dc3c79571e5100046281", ['\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00']}, 0x842)

06:19:24 executing program 0:
r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0)
mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800004, 0x12, r0, 0x0)
preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x9, 0x0)
mmap(&(0x7f0000000000/0xa000)=nil, 0xa000, 0x2, 0x2172, 0xffffffffffffffff, 0x0)
syz_mount_image$reiserfs(&(0x7f0000000140), &(0x7f0000000180)='./file0\x00', 0x0, 0x0, &(0x7f0000000300), 0x0, &(0x7f0000000440)={[{@balloc_no_unhash_reloc}, {@nolargeio}], [{@obj_role={'obj_role', 0x3d, '^'}}, {@hash}, {@uid_lt}, {@mask={'mask', 0x3d, 'MAY_EXEC'}}]})

[  366.700198][T16415] loop1: detected capacity change from 0 to 64
[  366.723063][T16416] REISERFS warning (device loop3): super-6502 reiserfs_getopt: unknown mount option "obj_role=^"
[  366.727124][T16418] REISERFS warning (device loop0): super-6504 reiserfs_getopt: the option "nolargeio" requires an argument
[  366.727124][T16418] 
06:19:24 executing program 1:
r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0)
preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x9, 0x0)
mmap(&(0x7f0000000000/0xa000)=nil, 0xa000, 0x2, 0x2172, 0xffffffffffffffff, 0x0)
syz_mount_image$reiserfs(0x0, &(0x7f0000000180)='./file0\x00', 0x8000, 0x3, &(0x7f0000000300)=[{&(0x7f0000000540)="21d37ef07e82e237fbe1b40158d20e242c5ea1f9d9edc6b9395250085d6dfa486982e82d4ce1a5e2bc00d29383bae640de", 0x31, 0x7}, {&(0x7f0000000240)="c43f281f483aa6cd83e40e59d53f177299d285bbe5d90aab2b56a76f9db49d86afa5a0f601ba9b3502de5f3724f3ec00927151f928f668b362052950a2e8f16baec29875fdad59395e86a1050c368933e3ed5a17d76bd7bded793436ea207885f395ace3fc12126c205b170be392c1645233ef01f9661090706a65f63b4845dc2884a20711a8024ad4af44aeec9db33991dae38d95cdb7132970d0d4dec58b9d46d378", 0xa3, 0x6}, {&(0x7f0000000380)="05f82c760d277896dd8c9891a41aafe24124891a32a238c3c78696d112aa09f3ae5c54b0c08676da5db7f358c72dfaca9a5d90860b4ae363c9a921c47965d339c23408a6d9b31a23aee27822f0a140d8e4ec9475a740113f2b9923b46333110e528e0a513151aad34aee1b5310fcf62c1982349253003d6d53aebbe09cf5918668ee682be93b6a671bbc", 0x8a, 0x3}], 0x2000400, &(0x7f0000000440)={[{@balloc_no_unhash_reloc}, {@nolargeio}, {@grpjquota}], [{@obj_role={'obj_role', 0x3d, '^'}}, {@hash}, {@uid_lt}, {@mask={'mask', 0x3d, 'MAY_EXEC'}}, {@uid_lt={'uid<', 0xee00}}, {@smackfsfloor={'smackfsfloor', 0x3d, ':%#[@'}}, {@obj_user={'obj_user', 0x3d, ',\\*),i'}}, {@uid_eq={'uid', 0x3d, 0xee00}}, {@seclabel}, {@uid_lt={'uid<', 0xee00}}]})

06:19:24 executing program 0:
r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0)
mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800004, 0x12, r0, 0x0)
preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x9, 0x0)
mmap(&(0x7f0000000000/0xa000)=nil, 0xa000, 0x2, 0x2172, 0xffffffffffffffff, 0x0)
syz_mount_image$reiserfs(&(0x7f0000000140), &(0x7f0000000180)='./file0\x00', 0x0, 0x0, &(0x7f0000000300), 0x0, &(0x7f0000000440)={[{@balloc_no_unhash_reloc}, {@nolargeio}], [{@obj_role={'obj_role', 0x3d, '^'}}, {@hash}, {@uid_lt}]})

06:19:24 executing program 3:
r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0)
mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800004, 0x12, r0, 0x0)
mmap(&(0x7f0000000000/0xa000)=nil, 0xa000, 0x2, 0x2172, 0xffffffffffffffff, 0x0)
syz_mount_image$reiserfs(&(0x7f0000000140), &(0x7f0000000180)='./file0\x00', 0x0, 0x0, &(0x7f0000000300), 0x0, &(0x7f0000000440)={[{@balloc_no_unhash_reloc}], [{@obj_role={'obj_role', 0x3d, '^'}}, {@hash}, {@uid_lt}, {@mask={'mask', 0x3d, 'MAY_EXEC'}}, {@uid_lt={'uid<', 0xee00}}, {@smackfsfloor={'smackfsfloor', 0x3d, ':%#[@'}}, {@obj_user={'obj_user', 0x3d, ',\\*),i'}}, {@uid_eq={'uid', 0x3d, 0xee00}}, {@seclabel}, {@uid_lt={'uid<', 0xee00}}]})

[  366.914976][T16429] loop1: detected capacity change from 0 to 64
[  366.950089][T16433] REISERFS warning (device loop3): super-6502 reiserfs_getopt: unknown mount option "obj_role=^"
06:19:24 executing program 1:
r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0)
preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x9, 0x0)
mmap(&(0x7f0000000000/0xa000)=nil, 0xa000, 0x2, 0x2172, 0xffffffffffffffff, 0x0)
syz_mount_image$reiserfs(0x0, &(0x7f0000000180)='./file0\x00', 0x8000, 0x3, &(0x7f0000000300)=[{&(0x7f0000000540)="21d37ef07e82e237fbe1b40158d20e242c5ea1f9d9edc6b9395250085d6dfa486982e82d4ce1a5e2bc00d29383bae640de", 0x31, 0x7}, {&(0x7f0000000240)="c43f281f483aa6cd83e40e59d53f177299d285bbe5d90aab2b56a76f9db49d86afa5a0f601ba9b3502de5f3724f3ec00927151f928f668b362052950a2e8f16baec29875fdad59395e86a1050c368933e3ed5a17d76bd7bded793436ea207885f395ace3fc12126c205b170be392c1645233ef01f9661090706a65f63b4845dc2884a20711a8024ad4af44aeec9db33991dae38d95cdb7132970d0d4dec58b9d46d378", 0xa3, 0x6}, {&(0x7f0000000380)="05f82c760d277896dd8c9891a41aafe24124891a32a238c3c78696d112aa09f3ae5c54b0c08676da5db7f358c72dfaca9a5d90860b4ae363c9a921c47965d339c23408a6d9b31a23aee27822f0a140d8e4ec9475a740113f2b9923b46333110e528e0a513151aad34aee1b5310fcf62c1982349253003d6d53aebbe09cf5918668ee682be93b6a671bbc", 0x8a, 0x3}], 0x2000400, &(0x7f0000000440)={[{@balloc_no_unhash_reloc}, {@nolargeio}, {@grpjquota}], [{@obj_role={'obj_role', 0x3d, '^'}}, {@hash}, {@uid_lt}, {@mask={'mask', 0x3d, 'MAY_EXEC'}}, {@uid_lt={'uid<', 0xee00}}, {@smackfsfloor={'smackfsfloor', 0x3d, ':%#[@'}}, {@obj_user={'obj_user', 0x3d, ',\\*),i'}}, {@uid_eq={'uid', 0x3d, 0xee00}}, {@seclabel}, {@uid_lt={'uid<', 0xee00}}]})

06:19:24 executing program 3:
r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0)
preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x9, 0x0)
mmap(&(0x7f0000000000/0xa000)=nil, 0xa000, 0x2, 0x2172, 0xffffffffffffffff, 0x0)
syz_mount_image$reiserfs(&(0x7f0000000140), &(0x7f0000000180)='./file0\x00', 0x0, 0x0, &(0x7f0000000300), 0x0, &(0x7f0000000440)={[{@balloc_no_unhash_reloc}], [{@obj_role={'obj_role', 0x3d, '^'}}, {@hash}, {@uid_lt}, {@mask={'mask', 0x3d, 'MAY_EXEC'}}, {@uid_lt={'uid<', 0xee00}}, {@smackfsfloor={'smackfsfloor', 0x3d, ':%#[@'}}, {@obj_user={'obj_user', 0x3d, ',\\*),i'}}, {@uid_eq={'uid', 0x3d, 0xee00}}, {@seclabel}, {@uid_lt={'uid<', 0xee00}}]})

[  367.022855][T16438] REISERFS warning (device loop0): super-6504 reiserfs_getopt: the option "nolargeio" requires an argument
[  367.022855][T16438] 
06:19:24 executing program 0:
r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0)
mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800004, 0x12, r0, 0x0)
preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x9, 0x0)
mmap(&(0x7f0000000000/0xa000)=nil, 0xa000, 0x2, 0x2172, 0xffffffffffffffff, 0x0)
syz_mount_image$reiserfs(&(0x7f0000000140), &(0x7f0000000180)='./file0\x00', 0x0, 0x0, &(0x7f0000000300), 0x0, &(0x7f0000000440)={[{@balloc_no_unhash_reloc}, {@nolargeio}], [{@obj_role={'obj_role', 0x3d, '^'}}, {@hash}]})

[  367.106845][T16444] REISERFS warning (device loop3): super-6502 reiserfs_getopt: unknown mount option "obj_role=^"
[  367.188323][T16452] loop1: detected capacity change from 0 to 64
[  367.191578][T16449] REISERFS warning (device loop0): super-6504 reiserfs_getopt: the option "nolargeio" requires an argument
[  367.191578][T16449] 
06:19:25 executing program 3:
r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0)
preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x9, 0x0)
mmap(&(0x7f0000000000/0xa000)=nil, 0xa000, 0x2, 0x2172, 0xffffffffffffffff, 0x0)
syz_mount_image$reiserfs(&(0x7f0000000140), &(0x7f0000000180)='./file0\x00', 0x0, 0x0, &(0x7f0000000300), 0x0, &(0x7f0000000440)={[{@balloc_no_unhash_reloc}], [{@obj_role={'obj_role', 0x3d, '^'}}, {@hash}, {@uid_lt}, {@mask={'mask', 0x3d, 'MAY_EXEC'}}, {@uid_lt={'uid<', 0xee00}}, {@smackfsfloor={'smackfsfloor', 0x3d, ':%#[@'}}, {@obj_user={'obj_user', 0x3d, ',\\*),i'}}, {@uid_eq={'uid', 0x3d, 0xee00}}, {@seclabel}, {@uid_lt={'uid<', 0xee00}}]})

06:19:25 executing program 1:
r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0)
preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x9, 0x0)
mmap(&(0x7f0000000000/0xa000)=nil, 0xa000, 0x2, 0x2172, 0xffffffffffffffff, 0x0)
syz_mount_image$reiserfs(0x0, &(0x7f0000000180)='./file0\x00', 0x8000, 0x3, &(0x7f0000000300)=[{&(0x7f0000000540)="21d37ef07e82e237fbe1b40158d20e242c5ea1f9d9edc6b9395250085d6dfa486982e82d4ce1a5e2bc00d29383bae640de", 0x31, 0x7}, {&(0x7f0000000240)="c43f281f483aa6cd83e40e59d53f177299d285bbe5d90aab2b56a76f9db49d86afa5a0f601ba9b3502de5f3724f3ec00927151f928f668b362052950a2e8f16baec29875fdad59395e86a1050c368933e3ed5a17d76bd7bded793436ea207885f395ace3fc12126c205b170be392c1645233ef01f9661090706a65f63b4845dc2884a20711a8024ad4af44aeec9db33991dae38d95cdb7132970d0d4dec58b9d46d378", 0xa3, 0x6}, {&(0x7f0000000380)="05f82c760d277896dd8c9891a41aafe24124891a32a238c3c78696d112aa09f3ae5c54b0c08676da5db7f358c72dfaca9a5d90860b4ae363c9a921c47965d339c23408a6d9b31a23aee27822f0a140d8e4ec9475a740113f2b9923b46333110e528e0a513151aad34aee1b5310fcf62c1982349253003d6d53aebbe09cf5918668ee682be93b6a671bbc", 0x8a, 0x3}], 0x2000400, &(0x7f0000000440)={[{@balloc_no_unhash_reloc}, {@nolargeio}, {@grpjquota}], [{@obj_role={'obj_role', 0x3d, '^'}}, {@hash}, {@uid_lt}, {@mask={'mask', 0x3d, 'MAY_EXEC'}}, {@uid_lt={'uid<', 0xee00}}, {@smackfsfloor={'smackfsfloor', 0x3d, ':%#[@'}}, {@obj_user={'obj_user', 0x3d, ',\\*),i'}}, {@uid_eq={'uid', 0x3d, 0xee00}}, {@seclabel}, {@uid_lt={'uid<', 0xee00}}]})

06:19:25 executing program 2:
r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0)
mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x0, 0x12, r0, 0x0)
preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x9, 0x0)
r1 = syz_open_dev$tty1(0xc, 0x4, 0x1)
write$binfmt_elf64(r1, &(0x7f0000000380)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x80, 0x1, 0x9, 0x1, 0x2, 0x3e, 0x7ff, 0x1f2, 0x40, 0x1f4, 0xbfa, 0x3, 0x38, 0x1, 0x5, 0x4, 0x4}, [{0x5, 0x9, 0x6, 0x101, 0x6, 0x4, 0x9, 0x6}, {0x5, 0x3, 0x5e61, 0x80000000, 0xcc3, 0x9, 0x7, 0x8}], "d1660f10e0ac4a6edbf3aa53803c8f57ef2a12069e82553332d2b96d67f2dbc5b04959dad57c303d876233684f5e9ad402a193da791e11122f2cccbf10d6d499f5e16385d09f63891a965d80bcb68b551fabffb4bf0b5c372b4d69cdefac988201a40429a8d0dc699820193afcab08070fde89c22e16b43dde5e37d9a3df0cd352e8667f163774d9dc3c79571e5100046281", ['\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00']}, 0x842)

06:19:25 executing program 0:
r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0)
mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800004, 0x12, r0, 0x0)
preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x9, 0x0)
mmap(&(0x7f0000000000/0xa000)=nil, 0xa000, 0x2, 0x2172, 0xffffffffffffffff, 0x0)
syz_mount_image$reiserfs(&(0x7f0000000140), &(0x7f0000000180)='./file0\x00', 0x0, 0x0, &(0x7f0000000300), 0x0, &(0x7f0000000440)={[{@balloc_no_unhash_reloc}, {@nolargeio}], [{@obj_role={'obj_role', 0x3d, '^'}}]})

[  367.617302][T16463] loop1: detected capacity change from 0 to 64
[  367.631937][T16464] REISERFS warning (device loop0): super-6504 reiserfs_getopt: the option "nolargeio" requires an argument
[  367.631937][T16464] 
[  367.652085][T16468] REISERFS warning (device loop3): super-6502 reiserfs_getopt: unknown mount option "obj_role=^"
06:19:25 executing program 1:
mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800004, 0x12, 0xffffffffffffffff, 0x0)
preadv(0xffffffffffffffff, &(0x7f00000001c0)=[{0x0}], 0x1, 0x9, 0x0)
mmap(&(0x7f0000000000/0xa000)=nil, 0xa000, 0x2, 0x2172, 0xffffffffffffffff, 0x0)
syz_mount_image$reiserfs(0x0, &(0x7f0000000180)='./file0\x00', 0x8000, 0x3, &(0x7f0000000300)=[{&(0x7f0000000540)="21d37ef07e82e237fbe1b40158d20e242c5ea1f9d9edc6b9395250085d6dfa486982e82d4ce1a5e2bc00d29383bae640de", 0x31, 0x7}, {&(0x7f0000000240)="c43f281f483aa6cd83e40e59d53f177299d285bbe5d90aab2b56a76f9db49d86afa5a0f601ba9b3502de5f3724f3ec00927151f928f668b362052950a2e8f16baec29875fdad59395e86a1050c368933e3ed5a17d76bd7bded793436ea207885f395ace3fc12126c205b170be392c1645233ef01f9661090706a65f63b4845dc2884a20711a8024ad4af44aeec9db33991dae38d95cdb7132970d0d4dec58b9d46d378", 0xa3, 0x6}, {&(0x7f0000000380)="05f82c760d277896dd8c9891a41aafe24124891a32a238c3c78696d112aa09f3ae5c54b0c08676da5db7f358c72dfaca9a5d90860b4ae363c9a921c47965d339c23408a6d9b31a23aee27822f0a140d8e4ec9475a740113f2b9923b46333110e528e0a513151aad34aee1b5310fcf62c1982349253003d6d53aebbe09cf5918668ee682be93b6a671bbc", 0x8a, 0x3}], 0x2000400, &(0x7f0000000440)={[{@balloc_no_unhash_reloc}, {@nolargeio}, {@grpjquota}], [{@obj_role={'obj_role', 0x3d, '^'}}, {@hash}, {@uid_lt}, {@mask={'mask', 0x3d, 'MAY_EXEC'}}, {@uid_lt={'uid<', 0xee00}}, {@smackfsfloor={'smackfsfloor', 0x3d, ':%#[@'}}, {@obj_user={'obj_user', 0x3d, ',\\*),i'}}, {@uid_eq={'uid', 0x3d, 0xee00}}, {@seclabel}, {@uid_lt={'uid<', 0xee00}}]})

06:19:25 executing program 2:
r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0)
mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x0, 0x12, r0, 0x0)
preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x9, 0x0)
r1 = syz_open_dev$tty1(0xc, 0x4, 0x1)
write$binfmt_elf64(r1, &(0x7f0000000380)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x80, 0x1, 0x9, 0x1, 0x2, 0x3e, 0x7ff, 0x1f2, 0x40, 0x1f4, 0xbfa, 0x3, 0x38, 0x1, 0x5, 0x4, 0x4}, [{0x5, 0x9, 0x6, 0x101, 0x6, 0x4, 0x9, 0x6}, {0x5, 0x3, 0x5e61, 0x80000000, 0xcc3, 0x9, 0x7, 0x8}], "d1660f10e0ac4a6edbf3aa53803c8f57ef2a12069e82553332d2b96d67f2dbc5b04959dad57c303d876233684f5e9ad402a193da791e11122f2cccbf10d6d499f5e16385d09f63891a965d80bcb68b551fabffb4bf0b5c372b4d69cdefac988201a40429a8d0dc699820193afcab08070fde89c22e16b43dde5e37d9a3df0cd352e8667f163774d9dc3c79571e5100046281", ['\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00']}, 0x842)

06:19:25 executing program 0:
r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0)
mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800004, 0x12, r0, 0x0)
preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x9, 0x0)
mmap(&(0x7f0000000000/0xa000)=nil, 0xa000, 0x2, 0x2172, 0xffffffffffffffff, 0x0)
syz_mount_image$reiserfs(&(0x7f0000000140), &(0x7f0000000180)='./file0\x00', 0x0, 0x0, &(0x7f0000000300), 0x0, &(0x7f0000000440)={[{@balloc_no_unhash_reloc}, {@nolargeio}]})

06:19:25 executing program 3:
r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0)
preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x9, 0x0)
mmap(&(0x7f0000000000/0xa000)=nil, 0xa000, 0x2, 0x2172, 0xffffffffffffffff, 0x0)
syz_mount_image$reiserfs(&(0x7f0000000140), &(0x7f0000000180)='./file0\x00', 0x0, 0x0, &(0x7f0000000300), 0x0, &(0x7f0000000440)={[{@balloc_no_unhash_reloc}], [{@obj_role={'obj_role', 0x3d, '^'}}, {@hash}, {@uid_lt}, {@mask={'mask', 0x3d, 'MAY_EXEC'}}, {@uid_lt={'uid<', 0xee00}}, {@smackfsfloor={'smackfsfloor', 0x3d, ':%#[@'}}, {@obj_user={'obj_user', 0x3d, ',\\*),i'}}, {@uid_eq={'uid', 0x3d, 0xee00}}, {@seclabel}, {@uid_lt={'uid<', 0xee00}}]})

06:19:25 executing program 2:
r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0)
mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x0, 0x12, r0, 0x0)
preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x9, 0x0)
r1 = syz_open_dev$tty1(0xc, 0x4, 0x1)
write$binfmt_elf64(r1, &(0x7f0000000380)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x80, 0x1, 0x9, 0x1, 0x2, 0x3e, 0x7ff, 0x1f2, 0x40, 0x1f4, 0xbfa, 0x3, 0x38, 0x1, 0x5, 0x4, 0x4}, [{0x5, 0x9, 0x6, 0x101, 0x6, 0x4, 0x9, 0x6}, {0x5, 0x3, 0x5e61, 0x80000000, 0xcc3, 0x9, 0x7, 0x8}], "d1660f10e0ac4a6edbf3aa53803c8f57ef2a12069e82553332d2b96d67f2dbc5b04959dad57c303d876233684f5e9ad402a193da791e11122f2cccbf10d6d499f5e16385d09f63891a965d80bcb68b551fabffb4bf0b5c372b4d69cdefac988201a40429a8d0dc699820193afcab08070fde89c22e16b43dde5e37d9a3df0cd352e8667f163774d9dc3c79571e5100046281", ['\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00']}, 0x842)

[  367.837003][T16480] REISERFS warning (device loop0): super-6504 reiserfs_getopt: the option "nolargeio" requires an argument
[  367.837003][T16480] 
[  367.878911][T16485] loop1: detected capacity change from 0 to 64
[  367.915522][T16487] REISERFS warning (device loop3): super-6502 reiserfs_getopt: unknown mount option "obj_role=^"
06:19:25 executing program 2:
r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0)
mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800004, 0x10, r0, 0x0)
preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x9, 0x0)
r1 = syz_open_dev$tty1(0xc, 0x4, 0x1)
write$binfmt_elf64(r1, &(0x7f0000000380)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x80, 0x1, 0x9, 0x1, 0x2, 0x3e, 0x7ff, 0x1f2, 0x40, 0x1f4, 0xbfa, 0x3, 0x38, 0x1, 0x5, 0x4, 0x4}, [{0x5, 0x9, 0x6, 0x101, 0x6, 0x4, 0x9, 0x6}, {0x5, 0x3, 0x5e61, 0x80000000, 0xcc3, 0x9, 0x7, 0x8}], "d1660f10e0ac4a6edbf3aa53803c8f57ef2a12069e82553332d2b96d67f2dbc5b04959dad57c303d876233684f5e9ad402a193da791e11122f2cccbf10d6d499f5e16385d09f63891a965d80bcb68b551fabffb4bf0b5c372b4d69cdefac988201a40429a8d0dc699820193afcab08070fde89c22e16b43dde5e37d9a3df0cd352e8667f163774d9dc3c79571e5100046281", ['\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00']}, 0x842)

06:19:25 executing program 0:
r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0)
preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x9, 0x0)
mmap(&(0x7f0000000000/0xa000)=nil, 0xa000, 0x2, 0x2172, 0xffffffffffffffff, 0x0)
syz_mount_image$reiserfs(&(0x7f0000000140), &(0x7f0000000180)='./file0\x00', 0x0, 0x0, &(0x7f0000000300), 0x0, &(0x7f0000000440)={[{@balloc_no_unhash_reloc}], [{@obj_role={'obj_role', 0x3d, '^'}}, {@hash}, {@uid_lt}, {@mask={'mask', 0x3d, 'MAY_EXEC'}}, {@uid_lt={'uid<', 0xee00}}, {@smackfsfloor={'smackfsfloor', 0x3d, ':%#[@'}}, {@obj_user={'obj_user', 0x3d, ',\\*),i'}}, {@uid_eq={'uid', 0x3d, 0xee00}}, {@seclabel}, {@uid_lt={'uid<', 0xee00}}]})

06:19:25 executing program 1:
mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800004, 0x12, 0xffffffffffffffff, 0x0)
preadv(0xffffffffffffffff, &(0x7f00000001c0)=[{0x0}], 0x1, 0x9, 0x0)
mmap(&(0x7f0000000000/0xa000)=nil, 0xa000, 0x2, 0x2172, 0xffffffffffffffff, 0x0)
syz_mount_image$reiserfs(0x0, &(0x7f0000000180)='./file0\x00', 0x8000, 0x3, &(0x7f0000000300)=[{&(0x7f0000000540)="21d37ef07e82e237fbe1b40158d20e242c5ea1f9d9edc6b9395250085d6dfa486982e82d4ce1a5e2bc00d29383bae640de", 0x31, 0x7}, {&(0x7f0000000240)="c43f281f483aa6cd83e40e59d53f177299d285bbe5d90aab2b56a76f9db49d86afa5a0f601ba9b3502de5f3724f3ec00927151f928f668b362052950a2e8f16baec29875fdad59395e86a1050c368933e3ed5a17d76bd7bded793436ea207885f395ace3fc12126c205b170be392c1645233ef01f9661090706a65f63b4845dc2884a20711a8024ad4af44aeec9db33991dae38d95cdb7132970d0d4dec58b9d46d378", 0xa3, 0x6}, {&(0x7f0000000380)="05f82c760d277896dd8c9891a41aafe24124891a32a238c3c78696d112aa09f3ae5c54b0c08676da5db7f358c72dfaca9a5d90860b4ae363c9a921c47965d339c23408a6d9b31a23aee27822f0a140d8e4ec9475a740113f2b9923b46333110e528e0a513151aad34aee1b5310fcf62c1982349253003d6d53aebbe09cf5918668ee682be93b6a671bbc", 0x8a, 0x3}], 0x2000400, &(0x7f0000000440)={[{@balloc_no_unhash_reloc}, {@nolargeio}, {@grpjquota}], [{@obj_role={'obj_role', 0x3d, '^'}}, {@hash}, {@uid_lt}, {@mask={'mask', 0x3d, 'MAY_EXEC'}}, {@uid_lt={'uid<', 0xee00}}, {@smackfsfloor={'smackfsfloor', 0x3d, ':%#[@'}}, {@obj_user={'obj_user', 0x3d, ',\\*),i'}}, {@uid_eq={'uid', 0x3d, 0xee00}}, {@seclabel}, {@uid_lt={'uid<', 0xee00}}]})

06:19:25 executing program 3:
mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800004, 0x12, 0xffffffffffffffff, 0x0)
preadv(0xffffffffffffffff, &(0x7f00000001c0)=[{0x0}], 0x1, 0x9, 0x0)
mmap(&(0x7f0000000000/0xa000)=nil, 0xa000, 0x2, 0x2172, 0xffffffffffffffff, 0x0)
syz_mount_image$reiserfs(&(0x7f0000000140), &(0x7f0000000180)='./file0\x00', 0x0, 0x0, &(0x7f0000000300), 0x0, &(0x7f0000000440)={[{@balloc_no_unhash_reloc}], [{@obj_role={'obj_role', 0x3d, '^'}}, {@hash}, {@uid_lt}, {@mask={'mask', 0x3d, 'MAY_EXEC'}}, {@uid_lt={'uid<', 0xee00}}, {@smackfsfloor={'smackfsfloor', 0x3d, ':%#[@'}}, {@obj_user={'obj_user', 0x3d, ',\\*),i'}}, {@uid_eq={'uid', 0x3d, 0xee00}}, {@seclabel}, {@uid_lt={'uid<', 0xee00}}]})

[  368.098462][T16498] REISERFS warning (device loop0): super-6502 reiserfs_getopt: unknown mount option "obj_role=^"
[  368.136940][T16503] REISERFS warning (device loop3): super-6502 reiserfs_getopt: unknown mount option "obj_role=^"
[  368.154163][T16507] loop1: detected capacity change from 0 to 64
06:19:25 executing program 0:
r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0)
mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800004, 0x12, r0, 0x0)
preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x9, 0x0)
syz_mount_image$reiserfs(&(0x7f0000000140), &(0x7f0000000180)='./file0\x00', 0x0, 0x0, &(0x7f0000000300), 0x0, &(0x7f0000000440)={[{@balloc_no_unhash_reloc}], [{@obj_role={'obj_role', 0x3d, '^'}}, {@hash}, {@uid_lt}, {@mask={'mask', 0x3d, 'MAY_EXEC'}}, {@uid_lt={'uid<', 0xee00}}, {@smackfsfloor={'smackfsfloor', 0x3d, ':%#[@'}}, {@obj_user={'obj_user', 0x3d, ',\\*),i'}}, {@uid_eq={'uid', 0x3d, 0xee00}}, {@seclabel}, {@uid_lt={'uid<', 0xee00}}]})

06:19:25 executing program 1:
mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800004, 0x12, 0xffffffffffffffff, 0x0)
preadv(0xffffffffffffffff, &(0x7f00000001c0)=[{0x0}], 0x1, 0x9, 0x0)
mmap(&(0x7f0000000000/0xa000)=nil, 0xa000, 0x2, 0x2172, 0xffffffffffffffff, 0x0)
syz_mount_image$reiserfs(0x0, &(0x7f0000000180)='./file0\x00', 0x8000, 0x3, &(0x7f0000000300)=[{&(0x7f0000000540)="21d37ef07e82e237fbe1b40158d20e242c5ea1f9d9edc6b9395250085d6dfa486982e82d4ce1a5e2bc00d29383bae640de", 0x31, 0x7}, {&(0x7f0000000240)="c43f281f483aa6cd83e40e59d53f177299d285bbe5d90aab2b56a76f9db49d86afa5a0f601ba9b3502de5f3724f3ec00927151f928f668b362052950a2e8f16baec29875fdad59395e86a1050c368933e3ed5a17d76bd7bded793436ea207885f395ace3fc12126c205b170be392c1645233ef01f9661090706a65f63b4845dc2884a20711a8024ad4af44aeec9db33991dae38d95cdb7132970d0d4dec58b9d46d378", 0xa3, 0x6}, {&(0x7f0000000380)="05f82c760d277896dd8c9891a41aafe24124891a32a238c3c78696d112aa09f3ae5c54b0c08676da5db7f358c72dfaca9a5d90860b4ae363c9a921c47965d339c23408a6d9b31a23aee27822f0a140d8e4ec9475a740113f2b9923b46333110e528e0a513151aad34aee1b5310fcf62c1982349253003d6d53aebbe09cf5918668ee682be93b6a671bbc", 0x8a, 0x3}], 0x2000400, &(0x7f0000000440)={[{@balloc_no_unhash_reloc}, {@nolargeio}, {@grpjquota}], [{@obj_role={'obj_role', 0x3d, '^'}}, {@hash}, {@uid_lt}, {@mask={'mask', 0x3d, 'MAY_EXEC'}}, {@uid_lt={'uid<', 0xee00}}, {@smackfsfloor={'smackfsfloor', 0x3d, ':%#[@'}}, {@obj_user={'obj_user', 0x3d, ',\\*),i'}}, {@uid_eq={'uid', 0x3d, 0xee00}}, {@seclabel}, {@uid_lt={'uid<', 0xee00}}]})

06:19:25 executing program 3:
mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800004, 0x12, 0xffffffffffffffff, 0x0)
preadv(0xffffffffffffffff, &(0x7f00000001c0)=[{0x0}], 0x1, 0x9, 0x0)
mmap(&(0x7f0000000000/0xa000)=nil, 0xa000, 0x2, 0x2172, 0xffffffffffffffff, 0x0)
syz_mount_image$reiserfs(&(0x7f0000000140), &(0x7f0000000180)='./file0\x00', 0x0, 0x0, &(0x7f0000000300), 0x0, &(0x7f0000000440)={[{@balloc_no_unhash_reloc}], [{@obj_role={'obj_role', 0x3d, '^'}}, {@hash}, {@uid_lt}, {@mask={'mask', 0x3d, 'MAY_EXEC'}}, {@uid_lt={'uid<', 0xee00}}, {@smackfsfloor={'smackfsfloor', 0x3d, ':%#[@'}}, {@obj_user={'obj_user', 0x3d, ',\\*),i'}}, {@uid_eq={'uid', 0x3d, 0xee00}}, {@seclabel}, {@uid_lt={'uid<', 0xee00}}]})

[  368.312007][T16514] REISERFS warning (device loop3): super-6502 reiserfs_getopt: unknown mount option "obj_role=^"
[  368.388596][T16524] loop1: detected capacity change from 0 to 64
06:19:26 executing program 3:
mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800004, 0x12, 0xffffffffffffffff, 0x0)
preadv(0xffffffffffffffff, &(0x7f00000001c0)=[{0x0}], 0x1, 0x9, 0x0)
mmap(&(0x7f0000000000/0xa000)=nil, 0xa000, 0x2, 0x2172, 0xffffffffffffffff, 0x0)
syz_mount_image$reiserfs(&(0x7f0000000140), &(0x7f0000000180)='./file0\x00', 0x0, 0x0, &(0x7f0000000300), 0x0, &(0x7f0000000440)={[{@balloc_no_unhash_reloc}], [{@obj_role={'obj_role', 0x3d, '^'}}, {@hash}, {@uid_lt}, {@mask={'mask', 0x3d, 'MAY_EXEC'}}, {@uid_lt={'uid<', 0xee00}}, {@smackfsfloor={'smackfsfloor', 0x3d, ':%#[@'}}, {@obj_user={'obj_user', 0x3d, ',\\*),i'}}, {@uid_eq={'uid', 0x3d, 0xee00}}, {@seclabel}, {@uid_lt={'uid<', 0xee00}}]})

[  368.542842][T16530] REISERFS warning (device loop3): super-6502 reiserfs_getopt: unknown mount option "obj_role=^"
06:19:26 executing program 0:
r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0)
mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800004, 0x12, r0, 0x0)
preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x9, 0x0)
syz_mount_image$reiserfs(&(0x7f0000000140), &(0x7f0000000180)='./file0\x00', 0x0, 0x0, &(0x7f0000000300), 0x0, &(0x7f0000000440)={[{@balloc_no_unhash_reloc}], [{@obj_role={'obj_role', 0x3d, '^'}}, {@hash}, {@uid_lt}, {@mask={'mask', 0x3d, 'MAY_EXEC'}}, {@uid_lt={'uid<', 0xee00}}, {@smackfsfloor={'smackfsfloor', 0x3d, ':%#[@'}}, {@obj_user={'obj_user', 0x3d, ',\\*),i'}}, {@uid_eq={'uid', 0x3d, 0xee00}}, {@seclabel}, {@uid_lt={'uid<', 0xee00}}]})

06:19:26 executing program 2:
r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0)
mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800004, 0x10, r0, 0x0)
preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x9, 0x0)
r1 = syz_open_dev$tty1(0xc, 0x4, 0x1)
write$binfmt_elf64(r1, &(0x7f0000000380)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x80, 0x1, 0x9, 0x1, 0x2, 0x3e, 0x7ff, 0x1f2, 0x40, 0x1f4, 0xbfa, 0x3, 0x38, 0x1, 0x5, 0x4, 0x4}, [{0x5, 0x9, 0x6, 0x101, 0x6, 0x4, 0x9, 0x6}, {0x5, 0x3, 0x5e61, 0x80000000, 0xcc3, 0x9, 0x7, 0x8}], "d1660f10e0ac4a6edbf3aa53803c8f57ef2a12069e82553332d2b96d67f2dbc5b04959dad57c303d876233684f5e9ad402a193da791e11122f2cccbf10d6d499f5e16385d09f63891a965d80bcb68b551fabffb4bf0b5c372b4d69cdefac988201a40429a8d0dc699820193afcab08070fde89c22e16b43dde5e37d9a3df0cd352e8667f163774d9dc3c79571e5100046281", ['\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00']}, 0x842)

06:19:26 executing program 3:
r0 = openat(0xffffffffffffffff, 0x0, 0x0, 0x0)
mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800004, 0x12, r0, 0x0)
preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x9, 0x0)
mmap(&(0x7f0000000000/0xa000)=nil, 0xa000, 0x2, 0x2172, 0xffffffffffffffff, 0x0)
syz_mount_image$reiserfs(&(0x7f0000000140), &(0x7f0000000180)='./file0\x00', 0x0, 0x0, &(0x7f0000000300), 0x0, &(0x7f0000000440)={[{@balloc_no_unhash_reloc}], [{@obj_role={'obj_role', 0x3d, '^'}}, {@hash}, {@uid_lt}, {@mask={'mask', 0x3d, 'MAY_EXEC'}}, {@uid_lt={'uid<', 0xee00}}, {@smackfsfloor={'smackfsfloor', 0x3d, ':%#[@'}}, {@obj_user={'obj_user', 0x3d, ',\\*),i'}}, {@uid_eq={'uid', 0x3d, 0xee00}}, {@seclabel}, {@uid_lt={'uid<', 0xee00}}]})

06:19:26 executing program 1:
r0 = openat(0xffffffffffffffff, 0x0, 0x0, 0x0)
mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800004, 0x12, r0, 0x0)
preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x9, 0x0)
mmap(&(0x7f0000000000/0xa000)=nil, 0xa000, 0x2, 0x2172, 0xffffffffffffffff, 0x0)
syz_mount_image$reiserfs(0x0, &(0x7f0000000180)='./file0\x00', 0x8000, 0x3, &(0x7f0000000300)=[{&(0x7f0000000540)="21d37ef07e82e237fbe1b40158d20e242c5ea1f9d9edc6b9395250085d6dfa486982e82d4ce1a5e2bc00d29383bae640de", 0x31, 0x7}, {&(0x7f0000000240)="c43f281f483aa6cd83e40e59d53f177299d285bbe5d90aab2b56a76f9db49d86afa5a0f601ba9b3502de5f3724f3ec00927151f928f668b362052950a2e8f16baec29875fdad59395e86a1050c368933e3ed5a17d76bd7bded793436ea207885f395ace3fc12126c205b170be392c1645233ef01f9661090706a65f63b4845dc2884a20711a8024ad4af44aeec9db33991dae38d95cdb7132970d0d4dec58b9d46d378", 0xa3, 0x6}, {&(0x7f0000000380)="05f82c760d277896dd8c9891a41aafe24124891a32a238c3c78696d112aa09f3ae5c54b0c08676da5db7f358c72dfaca9a5d90860b4ae363c9a921c47965d339c23408a6d9b31a23aee27822f0a140d8e4ec9475a740113f2b9923b46333110e528e0a513151aad34aee1b5310fcf62c1982349253003d6d53aebbe09cf5918668ee682be93b6a671bbc", 0x8a, 0x3}], 0x2000400, &(0x7f0000000440)={[{@balloc_no_unhash_reloc}, {@nolargeio}, {@grpjquota}], [{@obj_role={'obj_role', 0x3d, '^'}}, {@hash}, {@uid_lt}, {@mask={'mask', 0x3d, 'MAY_EXEC'}}, {@uid_lt={'uid<', 0xee00}}, {@smackfsfloor={'smackfsfloor', 0x3d, ':%#[@'}}, {@obj_user={'obj_user', 0x3d, ',\\*),i'}}, {@uid_eq={'uid', 0x3d, 0xee00}}, {@seclabel}, {@uid_lt={'uid<', 0xee00}}]})

[  368.911670][T16540] loop1: detected capacity change from 0 to 64
[  368.918268][T16405] blk_update_request: I/O error, dev loop1, sector 0 op 0x0:(READ) flags 0x80700 phys_seg 1 prio class 0
[  368.937947][T16543] REISERFS warning (device loop3): super-6502 reiserfs_getopt: unknown mount option "obj_role=^"
06:19:26 executing program 1:
r0 = openat(0xffffffffffffffff, 0x0, 0x0, 0x0)
mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800004, 0x12, r0, 0x0)
preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x9, 0x0)
mmap(&(0x7f0000000000/0xa000)=nil, 0xa000, 0x2, 0x2172, 0xffffffffffffffff, 0x0)
syz_mount_image$reiserfs(0x0, &(0x7f0000000180)='./file0\x00', 0x8000, 0x3, &(0x7f0000000300)=[{&(0x7f0000000540)="21d37ef07e82e237fbe1b40158d20e242c5ea1f9d9edc6b9395250085d6dfa486982e82d4ce1a5e2bc00d29383bae640de", 0x31, 0x7}, {&(0x7f0000000240)="c43f281f483aa6cd83e40e59d53f177299d285bbe5d90aab2b56a76f9db49d86afa5a0f601ba9b3502de5f3724f3ec00927151f928f668b362052950a2e8f16baec29875fdad59395e86a1050c368933e3ed5a17d76bd7bded793436ea207885f395ace3fc12126c205b170be392c1645233ef01f9661090706a65f63b4845dc2884a20711a8024ad4af44aeec9db33991dae38d95cdb7132970d0d4dec58b9d46d378", 0xa3, 0x6}, {&(0x7f0000000380)="05f82c760d277896dd8c9891a41aafe24124891a32a238c3c78696d112aa09f3ae5c54b0c08676da5db7f358c72dfaca9a5d90860b4ae363c9a921c47965d339c23408a6d9b31a23aee27822f0a140d8e4ec9475a740113f2b9923b46333110e528e0a513151aad34aee1b5310fcf62c1982349253003d6d53aebbe09cf5918668ee682be93b6a671bbc", 0x8a, 0x3}], 0x2000400, &(0x7f0000000440)={[{@balloc_no_unhash_reloc}, {@nolargeio}, {@grpjquota}], [{@obj_role={'obj_role', 0x3d, '^'}}, {@hash}, {@uid_lt}, {@mask={'mask', 0x3d, 'MAY_EXEC'}}, {@uid_lt={'uid<', 0xee00}}, {@smackfsfloor={'smackfsfloor', 0x3d, ':%#[@'}}, {@obj_user={'obj_user', 0x3d, ',\\*),i'}}, {@uid_eq={'uid', 0x3d, 0xee00}}, {@seclabel}, {@uid_lt={'uid<', 0xee00}}]})

06:19:26 executing program 3:
r0 = openat(0xffffffffffffffff, 0x0, 0x0, 0x0)
mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800004, 0x12, r0, 0x0)
preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x9, 0x0)
mmap(&(0x7f0000000000/0xa000)=nil, 0xa000, 0x2, 0x2172, 0xffffffffffffffff, 0x0)
syz_mount_image$reiserfs(&(0x7f0000000140), &(0x7f0000000180)='./file0\x00', 0x0, 0x0, &(0x7f0000000300), 0x0, &(0x7f0000000440)={[{@balloc_no_unhash_reloc}], [{@obj_role={'obj_role', 0x3d, '^'}}, {@hash}, {@uid_lt}, {@mask={'mask', 0x3d, 'MAY_EXEC'}}, {@uid_lt={'uid<', 0xee00}}, {@smackfsfloor={'smackfsfloor', 0x3d, ':%#[@'}}, {@obj_user={'obj_user', 0x3d, ',\\*),i'}}, {@uid_eq={'uid', 0x3d, 0xee00}}, {@seclabel}, {@uid_lt={'uid<', 0xee00}}]})

[  369.103399][T16551] loop1: detected capacity change from 0 to 64
06:19:26 executing program 0:
r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0)
mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800004, 0x12, r0, 0x0)
preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x9, 0x0)
syz_mount_image$reiserfs(&(0x7f0000000140), &(0x7f0000000180)='./file0\x00', 0x0, 0x0, &(0x7f0000000300), 0x0, &(0x7f0000000440)={[{@balloc_no_unhash_reloc}], [{@obj_role={'obj_role', 0x3d, '^'}}, {@hash}, {@uid_lt}, {@mask={'mask', 0x3d, 'MAY_EXEC'}}, {@uid_lt={'uid<', 0xee00}}, {@smackfsfloor={'smackfsfloor', 0x3d, ':%#[@'}}, {@obj_user={'obj_user', 0x3d, ',\\*),i'}}, {@uid_eq={'uid', 0x3d, 0xee00}}, {@seclabel}, {@uid_lt={'uid<', 0xee00}}]})

06:19:26 executing program 1:
r0 = openat(0xffffffffffffffff, 0x0, 0x0, 0x0)
mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800004, 0x12, r0, 0x0)
preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x9, 0x0)
mmap(&(0x7f0000000000/0xa000)=nil, 0xa000, 0x2, 0x2172, 0xffffffffffffffff, 0x0)
syz_mount_image$reiserfs(0x0, &(0x7f0000000180)='./file0\x00', 0x8000, 0x3, &(0x7f0000000300)=[{&(0x7f0000000540)="21d37ef07e82e237fbe1b40158d20e242c5ea1f9d9edc6b9395250085d6dfa486982e82d4ce1a5e2bc00d29383bae640de", 0x31, 0x7}, {&(0x7f0000000240)="c43f281f483aa6cd83e40e59d53f177299d285bbe5d90aab2b56a76f9db49d86afa5a0f601ba9b3502de5f3724f3ec00927151f928f668b362052950a2e8f16baec29875fdad59395e86a1050c368933e3ed5a17d76bd7bded793436ea207885f395ace3fc12126c205b170be392c1645233ef01f9661090706a65f63b4845dc2884a20711a8024ad4af44aeec9db33991dae38d95cdb7132970d0d4dec58b9d46d378", 0xa3, 0x6}, {&(0x7f0000000380)="05f82c760d277896dd8c9891a41aafe24124891a32a238c3c78696d112aa09f3ae5c54b0c08676da5db7f358c72dfaca9a5d90860b4ae363c9a921c47965d339c23408a6d9b31a23aee27822f0a140d8e4ec9475a740113f2b9923b46333110e528e0a513151aad34aee1b5310fcf62c1982349253003d6d53aebbe09cf5918668ee682be93b6a671bbc", 0x8a, 0x3}], 0x2000400, &(0x7f0000000440)={[{@balloc_no_unhash_reloc}, {@nolargeio}, {@grpjquota}], [{@obj_role={'obj_role', 0x3d, '^'}}, {@hash}, {@uid_lt}, {@mask={'mask', 0x3d, 'MAY_EXEC'}}, {@uid_lt={'uid<', 0xee00}}, {@smackfsfloor={'smackfsfloor', 0x3d, ':%#[@'}}, {@obj_user={'obj_user', 0x3d, ',\\*),i'}}, {@uid_eq={'uid', 0x3d, 0xee00}}, {@seclabel}, {@uid_lt={'uid<', 0xee00}}]})

06:19:26 executing program 0:
r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0)
mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800004, 0x12, r0, 0x0)
syz_mount_image$reiserfs(&(0x7f0000000140), &(0x7f0000000180)='./file0\x00', 0x0, 0x0, &(0x7f0000000300), 0x0, &(0x7f0000000440)={[{@balloc_no_unhash_reloc}], [{@obj_role={'obj_role', 0x3d, '^'}}, {@hash}, {@uid_lt}, {@mask={'mask', 0x3d, 'MAY_EXEC'}}, {@uid_lt={'uid<', 0xee00}}, {@smackfsfloor={'smackfsfloor', 0x3d, ':%#[@'}}, {@obj_user={'obj_user', 0x3d, ',\\*),i'}}, {@uid_eq={'uid', 0x3d, 0xee00}}, {@seclabel}, {@uid_lt={'uid<', 0xee00}}]})

[  369.271698][T16559] REISERFS warning (device loop3): super-6502 reiserfs_getopt: unknown mount option "obj_role=^"
[  369.349487][T16574] loop1: detected capacity change from 0 to 64
06:19:26 executing program 3:
r0 = openat(0xffffffffffffffff, 0x0, 0x0, 0x0)
mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800004, 0x12, r0, 0x0)
preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x9, 0x0)
mmap(&(0x7f0000000000/0xa000)=nil, 0xa000, 0x2, 0x2172, 0xffffffffffffffff, 0x0)
syz_mount_image$reiserfs(&(0x7f0000000140), &(0x7f0000000180)='./file0\x00', 0x0, 0x0, &(0x7f0000000300), 0x0, &(0x7f0000000440)={[{@balloc_no_unhash_reloc}], [{@obj_role={'obj_role', 0x3d, '^'}}, {@hash}, {@uid_lt}, {@mask={'mask', 0x3d, 'MAY_EXEC'}}, {@uid_lt={'uid<', 0xee00}}, {@smackfsfloor={'smackfsfloor', 0x3d, ':%#[@'}}, {@obj_user={'obj_user', 0x3d, ',\\*),i'}}, {@uid_eq={'uid', 0x3d, 0xee00}}, {@seclabel}, {@uid_lt={'uid<', 0xee00}}]})

[  369.479123][T16579] REISERFS warning (device loop3): super-6502 reiserfs_getopt: unknown mount option "obj_role=^"
06:19:27 executing program 2:
r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0)
mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800004, 0x10, r0, 0x0)
preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x9, 0x0)
r1 = syz_open_dev$tty1(0xc, 0x4, 0x1)
write$binfmt_elf64(r1, &(0x7f0000000380)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x80, 0x1, 0x9, 0x1, 0x2, 0x3e, 0x7ff, 0x1f2, 0x40, 0x1f4, 0xbfa, 0x3, 0x38, 0x1, 0x5, 0x4, 0x4}, [{0x5, 0x9, 0x6, 0x101, 0x6, 0x4, 0x9, 0x6}, {0x5, 0x3, 0x5e61, 0x80000000, 0xcc3, 0x9, 0x7, 0x8}], "d1660f10e0ac4a6edbf3aa53803c8f57ef2a12069e82553332d2b96d67f2dbc5b04959dad57c303d876233684f5e9ad402a193da791e11122f2cccbf10d6d499f5e16385d09f63891a965d80bcb68b551fabffb4bf0b5c372b4d69cdefac988201a40429a8d0dc699820193afcab08070fde89c22e16b43dde5e37d9a3df0cd352e8667f163774d9dc3c79571e5100046281", ['\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00']}, 0x842)

06:19:27 executing program 0:
r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0)
mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800004, 0x12, r0, 0x0)
syz_mount_image$reiserfs(&(0x7f0000000140), &(0x7f0000000180)='./file0\x00', 0x0, 0x0, &(0x7f0000000300), 0x0, &(0x7f0000000440)={[{@balloc_no_unhash_reloc}], [{@obj_role={'obj_role', 0x3d, '^'}}, {@hash}, {@uid_lt}, {@mask={'mask', 0x3d, 'MAY_EXEC'}}, {@uid_lt={'uid<', 0xee00}}, {@smackfsfloor={'smackfsfloor', 0x3d, ':%#[@'}}, {@obj_user={'obj_user', 0x3d, ',\\*),i'}}, {@uid_eq={'uid', 0x3d, 0xee00}}, {@seclabel}, {@uid_lt={'uid<', 0xee00}}]})

06:19:27 executing program 1:
r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0)
mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x0, 0x12, r0, 0x0)
preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x9, 0x0)
mmap(&(0x7f0000000000/0xa000)=nil, 0xa000, 0x2, 0x2172, 0xffffffffffffffff, 0x0)
syz_mount_image$reiserfs(0x0, &(0x7f0000000180)='./file0\x00', 0x8000, 0x3, &(0x7f0000000300)=[{&(0x7f0000000540)="21d37ef07e82e237fbe1b40158d20e242c5ea1f9d9edc6b9395250085d6dfa486982e82d4ce1a5e2bc00d29383bae640de", 0x31, 0x7}, {&(0x7f0000000240)="c43f281f483aa6cd83e40e59d53f177299d285bbe5d90aab2b56a76f9db49d86afa5a0f601ba9b3502de5f3724f3ec00927151f928f668b362052950a2e8f16baec29875fdad59395e86a1050c368933e3ed5a17d76bd7bded793436ea207885f395ace3fc12126c205b170be392c1645233ef01f9661090706a65f63b4845dc2884a20711a8024ad4af44aeec9db33991dae38d95cdb7132970d0d4dec58b9d46d378", 0xa3, 0x6}, {&(0x7f0000000380)="05f82c760d277896dd8c9891a41aafe24124891a32a238c3c78696d112aa09f3ae5c54b0c08676da5db7f358c72dfaca9a5d90860b4ae363c9a921c47965d339c23408a6d9b31a23aee27822f0a140d8e4ec9475a740113f2b9923b46333110e528e0a513151aad34aee1b5310fcf62c1982349253003d6d53aebbe09cf5918668ee682be93b6a671bbc", 0x8a, 0x3}], 0x2000400, &(0x7f0000000440)={[{@balloc_no_unhash_reloc}, {@nolargeio}, {@grpjquota}], [{@obj_role={'obj_role', 0x3d, '^'}}, {@hash}, {@uid_lt}, {@mask={'mask', 0x3d, 'MAY_EXEC'}}, {@uid_lt={'uid<', 0xee00}}, {@smackfsfloor={'smackfsfloor', 0x3d, ':%#[@'}}, {@obj_user={'obj_user', 0x3d, ',\\*),i'}}, {@uid_eq={'uid', 0x3d, 0xee00}}, {@seclabel}, {@uid_lt={'uid<', 0xee00}}]})

06:19:27 executing program 3:
r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0)
mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x0, 0x12, r0, 0x0)
preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x9, 0x0)
mmap(&(0x7f0000000000/0xa000)=nil, 0xa000, 0x2, 0x2172, 0xffffffffffffffff, 0x0)
syz_mount_image$reiserfs(&(0x7f0000000140), &(0x7f0000000180)='./file0\x00', 0x0, 0x0, &(0x7f0000000300), 0x0, &(0x7f0000000440)={[{@balloc_no_unhash_reloc}], [{@obj_role={'obj_role', 0x3d, '^'}}, {@hash}, {@uid_lt}, {@mask={'mask', 0x3d, 'MAY_EXEC'}}, {@uid_lt={'uid<', 0xee00}}, {@smackfsfloor={'smackfsfloor', 0x3d, ':%#[@'}}, {@obj_user={'obj_user', 0x3d, ',\\*),i'}}, {@uid_eq={'uid', 0x3d, 0xee00}}, {@seclabel}, {@uid_lt={'uid<', 0xee00}}]})

[  369.880366][T16591] loop1: detected capacity change from 0 to 64
[  369.917792][T16594] REISERFS warning (device loop3): super-6502 reiserfs_getopt: unknown mount option "obj_role=^"
06:19:27 executing program 1:
r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0)
mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x0, 0x12, r0, 0x0)
preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x9, 0x0)
mmap(&(0x7f0000000000/0xa000)=nil, 0xa000, 0x2, 0x2172, 0xffffffffffffffff, 0x0)
syz_mount_image$reiserfs(0x0, &(0x7f0000000180)='./file0\x00', 0x8000, 0x3, &(0x7f0000000300)=[{&(0x7f0000000540)="21d37ef07e82e237fbe1b40158d20e242c5ea1f9d9edc6b9395250085d6dfa486982e82d4ce1a5e2bc00d29383bae640de", 0x31, 0x7}, {&(0x7f0000000240)="c43f281f483aa6cd83e40e59d53f177299d285bbe5d90aab2b56a76f9db49d86afa5a0f601ba9b3502de5f3724f3ec00927151f928f668b362052950a2e8f16baec29875fdad59395e86a1050c368933e3ed5a17d76bd7bded793436ea207885f395ace3fc12126c205b170be392c1645233ef01f9661090706a65f63b4845dc2884a20711a8024ad4af44aeec9db33991dae38d95cdb7132970d0d4dec58b9d46d378", 0xa3, 0x6}, {&(0x7f0000000380)="05f82c760d277896dd8c9891a41aafe24124891a32a238c3c78696d112aa09f3ae5c54b0c08676da5db7f358c72dfaca9a5d90860b4ae363c9a921c47965d339c23408a6d9b31a23aee27822f0a140d8e4ec9475a740113f2b9923b46333110e528e0a513151aad34aee1b5310fcf62c1982349253003d6d53aebbe09cf5918668ee682be93b6a671bbc", 0x8a, 0x3}], 0x2000400, &(0x7f0000000440)={[{@balloc_no_unhash_reloc}, {@nolargeio}, {@grpjquota}], [{@obj_role={'obj_role', 0x3d, '^'}}, {@hash}, {@uid_lt}, {@mask={'mask', 0x3d, 'MAY_EXEC'}}, {@uid_lt={'uid<', 0xee00}}, {@smackfsfloor={'smackfsfloor', 0x3d, ':%#[@'}}, {@obj_user={'obj_user', 0x3d, ',\\*),i'}}, {@uid_eq={'uid', 0x3d, 0xee00}}, {@seclabel}, {@uid_lt={'uid<', 0xee00}}]})

06:19:27 executing program 0:
r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0)
mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800004, 0x12, r0, 0x0)
syz_mount_image$reiserfs(&(0x7f0000000140), &(0x7f0000000180)='./file0\x00', 0x0, 0x0, &(0x7f0000000300), 0x0, &(0x7f0000000440)={[{@balloc_no_unhash_reloc}], [{@obj_role={'obj_role', 0x3d, '^'}}, {@hash}, {@uid_lt}, {@mask={'mask', 0x3d, 'MAY_EXEC'}}, {@uid_lt={'uid<', 0xee00}}, {@smackfsfloor={'smackfsfloor', 0x3d, ':%#[@'}}, {@obj_user={'obj_user', 0x3d, ',\\*),i'}}, {@uid_eq={'uid', 0x3d, 0xee00}}, {@seclabel}, {@uid_lt={'uid<', 0xee00}}]})

06:19:27 executing program 3:
r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0)
mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x0, 0x12, r0, 0x0)
preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x9, 0x0)
mmap(&(0x7f0000000000/0xa000)=nil, 0xa000, 0x2, 0x2172, 0xffffffffffffffff, 0x0)
syz_mount_image$reiserfs(&(0x7f0000000140), &(0x7f0000000180)='./file0\x00', 0x0, 0x0, &(0x7f0000000300), 0x0, &(0x7f0000000440)={[{@balloc_no_unhash_reloc}], [{@obj_role={'obj_role', 0x3d, '^'}}, {@hash}, {@uid_lt}, {@mask={'mask', 0x3d, 'MAY_EXEC'}}, {@uid_lt={'uid<', 0xee00}}, {@smackfsfloor={'smackfsfloor', 0x3d, ':%#[@'}}, {@obj_user={'obj_user', 0x3d, ',\\*),i'}}, {@uid_eq={'uid', 0x3d, 0xee00}}, {@seclabel}, {@uid_lt={'uid<', 0xee00}}]})

[  370.102915][T16609] REISERFS warning (device loop3): super-6502 reiserfs_getopt: unknown mount option "obj_role=^"
[  370.134921][T16607] loop1: detected capacity change from 0 to 64
06:19:27 executing program 1:
r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0)
mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x0, 0x12, r0, 0x0)
preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x9, 0x0)
mmap(&(0x7f0000000000/0xa000)=nil, 0xa000, 0x2, 0x2172, 0xffffffffffffffff, 0x0)
syz_mount_image$reiserfs(0x0, &(0x7f0000000180)='./file0\x00', 0x8000, 0x3, &(0x7f0000000300)=[{&(0x7f0000000540)="21d37ef07e82e237fbe1b40158d20e242c5ea1f9d9edc6b9395250085d6dfa486982e82d4ce1a5e2bc00d29383bae640de", 0x31, 0x7}, {&(0x7f0000000240)="c43f281f483aa6cd83e40e59d53f177299d285bbe5d90aab2b56a76f9db49d86afa5a0f601ba9b3502de5f3724f3ec00927151f928f668b362052950a2e8f16baec29875fdad59395e86a1050c368933e3ed5a17d76bd7bded793436ea207885f395ace3fc12126c205b170be392c1645233ef01f9661090706a65f63b4845dc2884a20711a8024ad4af44aeec9db33991dae38d95cdb7132970d0d4dec58b9d46d378", 0xa3, 0x6}, {&(0x7f0000000380)="05f82c760d277896dd8c9891a41aafe24124891a32a238c3c78696d112aa09f3ae5c54b0c08676da5db7f358c72dfaca9a5d90860b4ae363c9a921c47965d339c23408a6d9b31a23aee27822f0a140d8e4ec9475a740113f2b9923b46333110e528e0a513151aad34aee1b5310fcf62c1982349253003d6d53aebbe09cf5918668ee682be93b6a671bbc", 0x8a, 0x3}], 0x2000400, &(0x7f0000000440)={[{@balloc_no_unhash_reloc}, {@nolargeio}, {@grpjquota}], [{@obj_role={'obj_role', 0x3d, '^'}}, {@hash}, {@uid_lt}, {@mask={'mask', 0x3d, 'MAY_EXEC'}}, {@uid_lt={'uid<', 0xee00}}, {@smackfsfloor={'smackfsfloor', 0x3d, ':%#[@'}}, {@obj_user={'obj_user', 0x3d, ',\\*),i'}}, {@uid_eq={'uid', 0x3d, 0xee00}}, {@seclabel}, {@uid_lt={'uid<', 0xee00}}]})

[  370.356541][T16622] loop1: detected capacity change from 0 to 64
06:19:28 executing program 2:
r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0)
mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800004, 0x12, 0xffffffffffffffff, 0x0)
preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x9, 0x0)
r1 = syz_open_dev$tty1(0xc, 0x4, 0x1)
write$binfmt_elf64(r1, &(0x7f0000000380)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x80, 0x1, 0x9, 0x1, 0x2, 0x3e, 0x7ff, 0x1f2, 0x40, 0x1f4, 0xbfa, 0x3, 0x38, 0x1, 0x5, 0x4, 0x4}, [{0x5, 0x9, 0x6, 0x101, 0x6, 0x4, 0x9, 0x6}, {0x5, 0x3, 0x5e61, 0x80000000, 0xcc3, 0x9, 0x7, 0x8}], "d1660f10e0ac4a6edbf3aa53803c8f57ef2a12069e82553332d2b96d67f2dbc5b04959dad57c303d876233684f5e9ad402a193da791e11122f2cccbf10d6d499f5e16385d09f63891a965d80bcb68b551fabffb4bf0b5c372b4d69cdefac988201a40429a8d0dc699820193afcab08070fde89c22e16b43dde5e37d9a3df0cd352e8667f163774d9dc3c79571e5100046281", ['\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00']}, 0x842)

06:19:28 executing program 0:
r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0)
preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x9, 0x0)
syz_mount_image$reiserfs(&(0x7f0000000140), &(0x7f0000000180)='./file0\x00', 0x0, 0x0, &(0x7f0000000300), 0x0, &(0x7f0000000440)={[{@balloc_no_unhash_reloc}], [{@obj_role={'obj_role', 0x3d, '^'}}, {@hash}, {@uid_lt}, {@mask={'mask', 0x3d, 'MAY_EXEC'}}, {@uid_lt={'uid<', 0xee00}}, {@smackfsfloor={'smackfsfloor', 0x3d, ':%#[@'}}, {@obj_user={'obj_user', 0x3d, ',\\*),i'}}, {@uid_eq={'uid', 0x3d, 0xee00}}, {@seclabel}, {@uid_lt={'uid<', 0xee00}}]})

06:19:28 executing program 3:
r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0)
mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x0, 0x12, r0, 0x0)
preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x9, 0x0)
mmap(&(0x7f0000000000/0xa000)=nil, 0xa000, 0x2, 0x2172, 0xffffffffffffffff, 0x0)
syz_mount_image$reiserfs(&(0x7f0000000140), &(0x7f0000000180)='./file0\x00', 0x0, 0x0, &(0x7f0000000300), 0x0, &(0x7f0000000440)={[{@balloc_no_unhash_reloc}], [{@obj_role={'obj_role', 0x3d, '^'}}, {@hash}, {@uid_lt}, {@mask={'mask', 0x3d, 'MAY_EXEC'}}, {@uid_lt={'uid<', 0xee00}}, {@smackfsfloor={'smackfsfloor', 0x3d, ':%#[@'}}, {@obj_user={'obj_user', 0x3d, ',\\*),i'}}, {@uid_eq={'uid', 0x3d, 0xee00}}, {@seclabel}, {@uid_lt={'uid<', 0xee00}}]})

06:19:28 executing program 1:
r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0)
mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800004, 0x10, r0, 0x0)
preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x9, 0x0)
mmap(&(0x7f0000000000/0xa000)=nil, 0xa000, 0x2, 0x2172, 0xffffffffffffffff, 0x0)
syz_mount_image$reiserfs(0x0, &(0x7f0000000180)='./file0\x00', 0x8000, 0x3, &(0x7f0000000300)=[{&(0x7f0000000540)="21d37ef07e82e237fbe1b40158d20e242c5ea1f9d9edc6b9395250085d6dfa486982e82d4ce1a5e2bc00d29383bae640de", 0x31, 0x7}, {&(0x7f0000000240)="c43f281f483aa6cd83e40e59d53f177299d285bbe5d90aab2b56a76f9db49d86afa5a0f601ba9b3502de5f3724f3ec00927151f928f668b362052950a2e8f16baec29875fdad59395e86a1050c368933e3ed5a17d76bd7bded793436ea207885f395ace3fc12126c205b170be392c1645233ef01f9661090706a65f63b4845dc2884a20711a8024ad4af44aeec9db33991dae38d95cdb7132970d0d4dec58b9d46d378", 0xa3, 0x6}, {&(0x7f0000000380)="05f82c760d277896dd8c9891a41aafe24124891a32a238c3c78696d112aa09f3ae5c54b0c08676da5db7f358c72dfaca9a5d90860b4ae363c9a921c47965d339c23408a6d9b31a23aee27822f0a140d8e4ec9475a740113f2b9923b46333110e528e0a513151aad34aee1b5310fcf62c1982349253003d6d53aebbe09cf5918668ee682be93b6a671bbc", 0x8a, 0x3}], 0x2000400, &(0x7f0000000440)={[{@balloc_no_unhash_reloc}, {@nolargeio}, {@grpjquota}], [{@obj_role={'obj_role', 0x3d, '^'}}, {@hash}, {@uid_lt}, {@mask={'mask', 0x3d, 'MAY_EXEC'}}, {@uid_lt={'uid<', 0xee00}}, {@smackfsfloor={'smackfsfloor', 0x3d, ':%#[@'}}, {@obj_user={'obj_user', 0x3d, ',\\*),i'}}, {@uid_eq={'uid', 0x3d, 0xee00}}, {@seclabel}, {@uid_lt={'uid<', 0xee00}}]})

[  370.809133][T16631] loop1: detected capacity change from 0 to 64
[  370.814535][T16630] REISERFS warning (device loop3): super-6502 reiserfs_getopt: unknown mount option "obj_role=^"
[  370.824054][T16632] REISERFS warning (device loop0): super-6502 reiserfs_getopt: unknown mount option "obj_role=^"
06:19:28 executing program 1:
r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0)
mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800004, 0x10, r0, 0x0)
preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x9, 0x0)
mmap(&(0x7f0000000000/0xa000)=nil, 0xa000, 0x2, 0x2172, 0xffffffffffffffff, 0x0)
syz_mount_image$reiserfs(0x0, &(0x7f0000000180)='./file0\x00', 0x8000, 0x3, &(0x7f0000000300)=[{&(0x7f0000000540)="21d37ef07e82e237fbe1b40158d20e242c5ea1f9d9edc6b9395250085d6dfa486982e82d4ce1a5e2bc00d29383bae640de", 0x31, 0x7}, {&(0x7f0000000240)="c43f281f483aa6cd83e40e59d53f177299d285bbe5d90aab2b56a76f9db49d86afa5a0f601ba9b3502de5f3724f3ec00927151f928f668b362052950a2e8f16baec29875fdad59395e86a1050c368933e3ed5a17d76bd7bded793436ea207885f395ace3fc12126c205b170be392c1645233ef01f9661090706a65f63b4845dc2884a20711a8024ad4af44aeec9db33991dae38d95cdb7132970d0d4dec58b9d46d378", 0xa3, 0x6}, {&(0x7f0000000380)="05f82c760d277896dd8c9891a41aafe24124891a32a238c3c78696d112aa09f3ae5c54b0c08676da5db7f358c72dfaca9a5d90860b4ae363c9a921c47965d339c23408a6d9b31a23aee27822f0a140d8e4ec9475a740113f2b9923b46333110e528e0a513151aad34aee1b5310fcf62c1982349253003d6d53aebbe09cf5918668ee682be93b6a671bbc", 0x8a, 0x3}], 0x2000400, &(0x7f0000000440)={[{@balloc_no_unhash_reloc}, {@nolargeio}, {@grpjquota}], [{@obj_role={'obj_role', 0x3d, '^'}}, {@hash}, {@uid_lt}, {@mask={'mask', 0x3d, 'MAY_EXEC'}}, {@uid_lt={'uid<', 0xee00}}, {@smackfsfloor={'smackfsfloor', 0x3d, ':%#[@'}}, {@obj_user={'obj_user', 0x3d, ',\\*),i'}}, {@uid_eq={'uid', 0x3d, 0xee00}}, {@seclabel}, {@uid_lt={'uid<', 0xee00}}]})

06:19:28 executing program 3:
r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0)
mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800004, 0x10, r0, 0x0)
preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x9, 0x0)
mmap(&(0x7f0000000000/0xa000)=nil, 0xa000, 0x2, 0x2172, 0xffffffffffffffff, 0x0)
syz_mount_image$reiserfs(&(0x7f0000000140), &(0x7f0000000180)='./file0\x00', 0x0, 0x0, &(0x7f0000000300), 0x0, &(0x7f0000000440)={[{@balloc_no_unhash_reloc}], [{@obj_role={'obj_role', 0x3d, '^'}}, {@hash}, {@uid_lt}, {@mask={'mask', 0x3d, 'MAY_EXEC'}}, {@uid_lt={'uid<', 0xee00}}, {@smackfsfloor={'smackfsfloor', 0x3d, ':%#[@'}}, {@obj_user={'obj_user', 0x3d, ',\\*),i'}}, {@uid_eq={'uid', 0x3d, 0xee00}}, {@seclabel}, {@uid_lt={'uid<', 0xee00}}]})

06:19:28 executing program 0:
r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0)
preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x9, 0x0)
syz_mount_image$reiserfs(&(0x7f0000000140), &(0x7f0000000180)='./file0\x00', 0x0, 0x0, &(0x7f0000000300), 0x0, &(0x7f0000000440)={[{@balloc_no_unhash_reloc}], [{@obj_role={'obj_role', 0x3d, '^'}}, {@hash}, {@uid_lt}, {@mask={'mask', 0x3d, 'MAY_EXEC'}}, {@uid_lt={'uid<', 0xee00}}, {@smackfsfloor={'smackfsfloor', 0x3d, ':%#[@'}}, {@obj_user={'obj_user', 0x3d, ',\\*),i'}}, {@uid_eq={'uid', 0x3d, 0xee00}}, {@seclabel}, {@uid_lt={'uid<', 0xee00}}]})

[  370.988916][T16643] REISERFS warning (device loop3): super-6502 reiserfs_getopt: unknown mount option "obj_role=^"
[  371.038368][T16649] REISERFS warning (device loop0): super-6502 reiserfs_getopt: unknown mount option "obj_role=^"
[  371.048833][T16653] loop1: detected capacity change from 0 to 64
06:19:28 executing program 3:
r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0)
mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800004, 0x10, r0, 0x0)
preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x9, 0x0)
mmap(&(0x7f0000000000/0xa000)=nil, 0xa000, 0x2, 0x2172, 0xffffffffffffffff, 0x0)
syz_mount_image$reiserfs(&(0x7f0000000140), &(0x7f0000000180)='./file0\x00', 0x0, 0x0, &(0x7f0000000300), 0x0, &(0x7f0000000440)={[{@balloc_no_unhash_reloc}], [{@obj_role={'obj_role', 0x3d, '^'}}, {@hash}, {@uid_lt}, {@mask={'mask', 0x3d, 'MAY_EXEC'}}, {@uid_lt={'uid<', 0xee00}}, {@smackfsfloor={'smackfsfloor', 0x3d, ':%#[@'}}, {@obj_user={'obj_user', 0x3d, ',\\*),i'}}, {@uid_eq={'uid', 0x3d, 0xee00}}, {@seclabel}, {@uid_lt={'uid<', 0xee00}}]})

[  371.158745][T16659] REISERFS warning (device loop3): super-6502 reiserfs_getopt: unknown mount option "obj_role=^"
06:19:29 executing program 1:
r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0)
mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800004, 0x10, r0, 0x0)
preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x9, 0x0)
mmap(&(0x7f0000000000/0xa000)=nil, 0xa000, 0x2, 0x2172, 0xffffffffffffffff, 0x0)
syz_mount_image$reiserfs(0x0, &(0x7f0000000180)='./file0\x00', 0x8000, 0x3, &(0x7f0000000300)=[{&(0x7f0000000540)="21d37ef07e82e237fbe1b40158d20e242c5ea1f9d9edc6b9395250085d6dfa486982e82d4ce1a5e2bc00d29383bae640de", 0x31, 0x7}, {&(0x7f0000000240)="c43f281f483aa6cd83e40e59d53f177299d285bbe5d90aab2b56a76f9db49d86afa5a0f601ba9b3502de5f3724f3ec00927151f928f668b362052950a2e8f16baec29875fdad59395e86a1050c368933e3ed5a17d76bd7bded793436ea207885f395ace3fc12126c205b170be392c1645233ef01f9661090706a65f63b4845dc2884a20711a8024ad4af44aeec9db33991dae38d95cdb7132970d0d4dec58b9d46d378", 0xa3, 0x6}, {&(0x7f0000000380)="05f82c760d277896dd8c9891a41aafe24124891a32a238c3c78696d112aa09f3ae5c54b0c08676da5db7f358c72dfaca9a5d90860b4ae363c9a921c47965d339c23408a6d9b31a23aee27822f0a140d8e4ec9475a740113f2b9923b46333110e528e0a513151aad34aee1b5310fcf62c1982349253003d6d53aebbe09cf5918668ee682be93b6a671bbc", 0x8a, 0x3}], 0x2000400, &(0x7f0000000440)={[{@balloc_no_unhash_reloc}, {@nolargeio}, {@grpjquota}], [{@obj_role={'obj_role', 0x3d, '^'}}, {@hash}, {@uid_lt}, {@mask={'mask', 0x3d, 'MAY_EXEC'}}, {@uid_lt={'uid<', 0xee00}}, {@smackfsfloor={'smackfsfloor', 0x3d, ':%#[@'}}, {@obj_user={'obj_user', 0x3d, ',\\*),i'}}, {@uid_eq={'uid', 0x3d, 0xee00}}, {@seclabel}, {@uid_lt={'uid<', 0xee00}}]})

06:19:29 executing program 0:
r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0)
preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x9, 0x0)
syz_mount_image$reiserfs(&(0x7f0000000140), &(0x7f0000000180)='./file0\x00', 0x0, 0x0, &(0x7f0000000300), 0x0, &(0x7f0000000440)={[{@balloc_no_unhash_reloc}], [{@obj_role={'obj_role', 0x3d, '^'}}, {@hash}, {@uid_lt}, {@mask={'mask', 0x3d, 'MAY_EXEC'}}, {@uid_lt={'uid<', 0xee00}}, {@smackfsfloor={'smackfsfloor', 0x3d, ':%#[@'}}, {@obj_user={'obj_user', 0x3d, ',\\*),i'}}, {@uid_eq={'uid', 0x3d, 0xee00}}, {@seclabel}, {@uid_lt={'uid<', 0xee00}}]})

06:19:29 executing program 2:
r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0)
mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800004, 0x12, 0xffffffffffffffff, 0x0)
preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x9, 0x0)
r1 = syz_open_dev$tty1(0xc, 0x4, 0x1)
write$binfmt_elf64(r1, &(0x7f0000000380)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x80, 0x1, 0x9, 0x1, 0x2, 0x3e, 0x7ff, 0x1f2, 0x40, 0x1f4, 0xbfa, 0x3, 0x38, 0x1, 0x5, 0x4, 0x4}, [{0x5, 0x9, 0x6, 0x101, 0x6, 0x4, 0x9, 0x6}, {0x5, 0x3, 0x5e61, 0x80000000, 0xcc3, 0x9, 0x7, 0x8}], "d1660f10e0ac4a6edbf3aa53803c8f57ef2a12069e82553332d2b96d67f2dbc5b04959dad57c303d876233684f5e9ad402a193da791e11122f2cccbf10d6d499f5e16385d09f63891a965d80bcb68b551fabffb4bf0b5c372b4d69cdefac988201a40429a8d0dc699820193afcab08070fde89c22e16b43dde5e37d9a3df0cd352e8667f163774d9dc3c79571e5100046281", ['\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00']}, 0x842)

06:19:29 executing program 3:
r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0)
mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800004, 0x10, r0, 0x0)
preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x9, 0x0)
mmap(&(0x7f0000000000/0xa000)=nil, 0xa000, 0x2, 0x2172, 0xffffffffffffffff, 0x0)
syz_mount_image$reiserfs(&(0x7f0000000140), &(0x7f0000000180)='./file0\x00', 0x0, 0x0, &(0x7f0000000300), 0x0, &(0x7f0000000440)={[{@balloc_no_unhash_reloc}], [{@obj_role={'obj_role', 0x3d, '^'}}, {@hash}, {@uid_lt}, {@mask={'mask', 0x3d, 'MAY_EXEC'}}, {@uid_lt={'uid<', 0xee00}}, {@smackfsfloor={'smackfsfloor', 0x3d, ':%#[@'}}, {@obj_user={'obj_user', 0x3d, ',\\*),i'}}, {@uid_eq={'uid', 0x3d, 0xee00}}, {@seclabel}, {@uid_lt={'uid<', 0xee00}}]})

[  371.760854][T16672] loop1: detected capacity change from 0 to 64
[  371.779856][T16673] REISERFS warning (device loop3): super-6502 reiserfs_getopt: unknown mount option "obj_role=^"
[  371.787840][T16671] REISERFS warning (device loop0): super-6502 reiserfs_getopt: unknown mount option "obj_role=^"
06:19:29 executing program 1:
r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0)
mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800004, 0x12, 0xffffffffffffffff, 0x0)
preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x9, 0x0)
mmap(&(0x7f0000000000/0xa000)=nil, 0xa000, 0x2, 0x2172, 0xffffffffffffffff, 0x0)
syz_mount_image$reiserfs(0x0, &(0x7f0000000180)='./file0\x00', 0x8000, 0x3, &(0x7f0000000300)=[{&(0x7f0000000540)="21d37ef07e82e237fbe1b40158d20e242c5ea1f9d9edc6b9395250085d6dfa486982e82d4ce1a5e2bc00d29383bae640de", 0x31, 0x7}, {&(0x7f0000000240)="c43f281f483aa6cd83e40e59d53f177299d285bbe5d90aab2b56a76f9db49d86afa5a0f601ba9b3502de5f3724f3ec00927151f928f668b362052950a2e8f16baec29875fdad59395e86a1050c368933e3ed5a17d76bd7bded793436ea207885f395ace3fc12126c205b170be392c1645233ef01f9661090706a65f63b4845dc2884a20711a8024ad4af44aeec9db33991dae38d95cdb7132970d0d4dec58b9d46d378", 0xa3, 0x6}, {&(0x7f0000000380)="05f82c760d277896dd8c9891a41aafe24124891a32a238c3c78696d112aa09f3ae5c54b0c08676da5db7f358c72dfaca9a5d90860b4ae363c9a921c47965d339c23408a6d9b31a23aee27822f0a140d8e4ec9475a740113f2b9923b46333110e528e0a513151aad34aee1b5310fcf62c1982349253003d6d53aebbe09cf5918668ee682be93b6a671bbc", 0x8a, 0x3}], 0x2000400, &(0x7f0000000440)={[{@balloc_no_unhash_reloc}, {@nolargeio}, {@grpjquota}], [{@obj_role={'obj_role', 0x3d, '^'}}, {@hash}, {@uid_lt}, {@mask={'mask', 0x3d, 'MAY_EXEC'}}, {@uid_lt={'uid<', 0xee00}}, {@smackfsfloor={'smackfsfloor', 0x3d, ':%#[@'}}, {@obj_user={'obj_user', 0x3d, ',\\*),i'}}, {@uid_eq={'uid', 0x3d, 0xee00}}, {@seclabel}, {@uid_lt={'uid<', 0xee00}}]})

06:19:29 executing program 3:
r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0)
mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800004, 0x12, 0xffffffffffffffff, 0x0)
preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x9, 0x0)
mmap(&(0x7f0000000000/0xa000)=nil, 0xa000, 0x2, 0x2172, 0xffffffffffffffff, 0x0)
syz_mount_image$reiserfs(&(0x7f0000000140), &(0x7f0000000180)='./file0\x00', 0x0, 0x0, &(0x7f0000000300), 0x0, &(0x7f0000000440)={[{@balloc_no_unhash_reloc}], [{@obj_role={'obj_role', 0x3d, '^'}}, {@hash}, {@uid_lt}, {@mask={'mask', 0x3d, 'MAY_EXEC'}}, {@uid_lt={'uid<', 0xee00}}, {@smackfsfloor={'smackfsfloor', 0x3d, ':%#[@'}}, {@obj_user={'obj_user', 0x3d, ',\\*),i'}}, {@uid_eq={'uid', 0x3d, 0xee00}}, {@seclabel}, {@uid_lt={'uid<', 0xee00}}]})

06:19:29 executing program 0:
mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800004, 0x12, 0xffffffffffffffff, 0x0)
preadv(0xffffffffffffffff, &(0x7f00000001c0)=[{0x0}], 0x1, 0x9, 0x0)
syz_mount_image$reiserfs(&(0x7f0000000140), &(0x7f0000000180)='./file0\x00', 0x0, 0x0, &(0x7f0000000300), 0x0, &(0x7f0000000440)={[{@balloc_no_unhash_reloc}], [{@obj_role={'obj_role', 0x3d, '^'}}, {@hash}, {@uid_lt}, {@mask={'mask', 0x3d, 'MAY_EXEC'}}, {@uid_lt={'uid<', 0xee00}}, {@smackfsfloor={'smackfsfloor', 0x3d, ':%#[@'}}, {@obj_user={'obj_user', 0x3d, ',\\*),i'}}, {@uid_eq={'uid', 0x3d, 0xee00}}, {@seclabel}, {@uid_lt={'uid<', 0xee00}}]})

[  371.987423][T16685] REISERFS warning (device loop0): super-6502 reiserfs_getopt: unknown mount option "obj_role=^"
[  371.996709][T16691] loop1: detected capacity change from 0 to 64
[  372.014947][T16688] REISERFS warning (device loop3): super-6502 reiserfs_getopt: unknown mount option "obj_role=^"
06:19:29 executing program 1:
r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0)
mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800004, 0x12, 0xffffffffffffffff, 0x0)
preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x9, 0x0)
mmap(&(0x7f0000000000/0xa000)=nil, 0xa000, 0x2, 0x2172, 0xffffffffffffffff, 0x0)
syz_mount_image$reiserfs(0x0, &(0x7f0000000180)='./file0\x00', 0x8000, 0x3, &(0x7f0000000300)=[{&(0x7f0000000540)="21d37ef07e82e237fbe1b40158d20e242c5ea1f9d9edc6b9395250085d6dfa486982e82d4ce1a5e2bc00d29383bae640de", 0x31, 0x7}, {&(0x7f0000000240)="c43f281f483aa6cd83e40e59d53f177299d285bbe5d90aab2b56a76f9db49d86afa5a0f601ba9b3502de5f3724f3ec00927151f928f668b362052950a2e8f16baec29875fdad59395e86a1050c368933e3ed5a17d76bd7bded793436ea207885f395ace3fc12126c205b170be392c1645233ef01f9661090706a65f63b4845dc2884a20711a8024ad4af44aeec9db33991dae38d95cdb7132970d0d4dec58b9d46d378", 0xa3, 0x6}, {&(0x7f0000000380)="05f82c760d277896dd8c9891a41aafe24124891a32a238c3c78696d112aa09f3ae5c54b0c08676da5db7f358c72dfaca9a5d90860b4ae363c9a921c47965d339c23408a6d9b31a23aee27822f0a140d8e4ec9475a740113f2b9923b46333110e528e0a513151aad34aee1b5310fcf62c1982349253003d6d53aebbe09cf5918668ee682be93b6a671bbc", 0x8a, 0x3}], 0x2000400, &(0x7f0000000440)={[{@balloc_no_unhash_reloc}, {@nolargeio}, {@grpjquota}], [{@obj_role={'obj_role', 0x3d, '^'}}, {@hash}, {@uid_lt}, {@mask={'mask', 0x3d, 'MAY_EXEC'}}, {@uid_lt={'uid<', 0xee00}}, {@smackfsfloor={'smackfsfloor', 0x3d, ':%#[@'}}, {@obj_user={'obj_user', 0x3d, ',\\*),i'}}, {@uid_eq={'uid', 0x3d, 0xee00}}, {@seclabel}, {@uid_lt={'uid<', 0xee00}}]})

06:19:29 executing program 0:
mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800004, 0x12, 0xffffffffffffffff, 0x0)
preadv(0xffffffffffffffff, &(0x7f00000001c0)=[{0x0}], 0x1, 0x9, 0x0)
syz_mount_image$reiserfs(&(0x7f0000000140), &(0x7f0000000180)='./file0\x00', 0x0, 0x0, &(0x7f0000000300), 0x0, &(0x7f0000000440)={[{@balloc_no_unhash_reloc}], [{@obj_role={'obj_role', 0x3d, '^'}}, {@hash}, {@uid_lt}, {@mask={'mask', 0x3d, 'MAY_EXEC'}}, {@uid_lt={'uid<', 0xee00}}, {@smackfsfloor={'smackfsfloor', 0x3d, ':%#[@'}}, {@obj_user={'obj_user', 0x3d, ',\\*),i'}}, {@uid_eq={'uid', 0x3d, 0xee00}}, {@seclabel}, {@uid_lt={'uid<', 0xee00}}]})

06:19:29 executing program 3:
r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0)
mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800004, 0x12, 0xffffffffffffffff, 0x0)
preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x9, 0x0)
mmap(&(0x7f0000000000/0xa000)=nil, 0xa000, 0x2, 0x2172, 0xffffffffffffffff, 0x0)
syz_mount_image$reiserfs(&(0x7f0000000140), &(0x7f0000000180)='./file0\x00', 0x0, 0x0, &(0x7f0000000300), 0x0, &(0x7f0000000440)={[{@balloc_no_unhash_reloc}], [{@obj_role={'obj_role', 0x3d, '^'}}, {@hash}, {@uid_lt}, {@mask={'mask', 0x3d, 'MAY_EXEC'}}, {@uid_lt={'uid<', 0xee00}}, {@smackfsfloor={'smackfsfloor', 0x3d, ':%#[@'}}, {@obj_user={'obj_user', 0x3d, ',\\*),i'}}, {@uid_eq={'uid', 0x3d, 0xee00}}, {@seclabel}, {@uid_lt={'uid<', 0xee00}}]})

[  372.177595][T16701] REISERFS warning (device loop0): super-6502 reiserfs_getopt: unknown mount option "obj_role=^"
[  372.201874][T16704] REISERFS warning (device loop3): super-6502 reiserfs_getopt: unknown mount option "obj_role=^"
[  372.266975][T16710] loop1: detected capacity change from 0 to 64
06:19:30 executing program 2:
r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0)
mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800004, 0x12, 0xffffffffffffffff, 0x0)
preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x9, 0x0)
r1 = syz_open_dev$tty1(0xc, 0x4, 0x1)
write$binfmt_elf64(r1, &(0x7f0000000380)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x80, 0x1, 0x9, 0x1, 0x2, 0x3e, 0x7ff, 0x1f2, 0x40, 0x1f4, 0xbfa, 0x3, 0x38, 0x1, 0x5, 0x4, 0x4}, [{0x5, 0x9, 0x6, 0x101, 0x6, 0x4, 0x9, 0x6}, {0x5, 0x3, 0x5e61, 0x80000000, 0xcc3, 0x9, 0x7, 0x8}], "d1660f10e0ac4a6edbf3aa53803c8f57ef2a12069e82553332d2b96d67f2dbc5b04959dad57c303d876233684f5e9ad402a193da791e11122f2cccbf10d6d499f5e16385d09f63891a965d80bcb68b551fabffb4bf0b5c372b4d69cdefac988201a40429a8d0dc699820193afcab08070fde89c22e16b43dde5e37d9a3df0cd352e8667f163774d9dc3c79571e5100046281", ['\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00']}, 0x842)

06:19:30 executing program 3:
r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0)
mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800004, 0x12, 0xffffffffffffffff, 0x0)
preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x9, 0x0)
mmap(&(0x7f0000000000/0xa000)=nil, 0xa000, 0x2, 0x2172, 0xffffffffffffffff, 0x0)
syz_mount_image$reiserfs(&(0x7f0000000140), &(0x7f0000000180)='./file0\x00', 0x0, 0x0, &(0x7f0000000300), 0x0, &(0x7f0000000440)={[{@balloc_no_unhash_reloc}], [{@obj_role={'obj_role', 0x3d, '^'}}, {@hash}, {@uid_lt}, {@mask={'mask', 0x3d, 'MAY_EXEC'}}, {@uid_lt={'uid<', 0xee00}}, {@smackfsfloor={'smackfsfloor', 0x3d, ':%#[@'}}, {@obj_user={'obj_user', 0x3d, ',\\*),i'}}, {@uid_eq={'uid', 0x3d, 0xee00}}, {@seclabel}, {@uid_lt={'uid<', 0xee00}}]})

06:19:30 executing program 0:
mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800004, 0x12, 0xffffffffffffffff, 0x0)
preadv(0xffffffffffffffff, &(0x7f00000001c0)=[{0x0}], 0x1, 0x9, 0x0)
syz_mount_image$reiserfs(&(0x7f0000000140), &(0x7f0000000180)='./file0\x00', 0x0, 0x0, &(0x7f0000000300), 0x0, &(0x7f0000000440)={[{@balloc_no_unhash_reloc}], [{@obj_role={'obj_role', 0x3d, '^'}}, {@hash}, {@uid_lt}, {@mask={'mask', 0x3d, 'MAY_EXEC'}}, {@uid_lt={'uid<', 0xee00}}, {@smackfsfloor={'smackfsfloor', 0x3d, ':%#[@'}}, {@obj_user={'obj_user', 0x3d, ',\\*),i'}}, {@uid_eq={'uid', 0x3d, 0xee00}}, {@seclabel}, {@uid_lt={'uid<', 0xee00}}]})

06:19:30 executing program 1:
r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0)
mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800004, 0x12, 0xffffffffffffffff, 0x0)
preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x9, 0x0)
mmap(&(0x7f0000000000/0xa000)=nil, 0xa000, 0x2, 0x2172, 0xffffffffffffffff, 0x0)
syz_mount_image$reiserfs(0x0, &(0x7f0000000180)='./file0\x00', 0x8000, 0x3, &(0x7f0000000300)=[{&(0x7f0000000540)="21d37ef07e82e237fbe1b40158d20e242c5ea1f9d9edc6b9395250085d6dfa486982e82d4ce1a5e2bc00d29383bae640de", 0x31, 0x7}, {&(0x7f0000000240)="c43f281f483aa6cd83e40e59d53f177299d285bbe5d90aab2b56a76f9db49d86afa5a0f601ba9b3502de5f3724f3ec00927151f928f668b362052950a2e8f16baec29875fdad59395e86a1050c368933e3ed5a17d76bd7bded793436ea207885f395ace3fc12126c205b170be392c1645233ef01f9661090706a65f63b4845dc2884a20711a8024ad4af44aeec9db33991dae38d95cdb7132970d0d4dec58b9d46d378", 0xa3, 0x6}, {&(0x7f0000000380)="05f82c760d277896dd8c9891a41aafe24124891a32a238c3c78696d112aa09f3ae5c54b0c08676da5db7f358c72dfaca9a5d90860b4ae363c9a921c47965d339c23408a6d9b31a23aee27822f0a140d8e4ec9475a740113f2b9923b46333110e528e0a513151aad34aee1b5310fcf62c1982349253003d6d53aebbe09cf5918668ee682be93b6a671bbc", 0x8a, 0x3}], 0x2000400, &(0x7f0000000440)={[{@balloc_no_unhash_reloc}, {@nolargeio}, {@grpjquota}], [{@obj_role={'obj_role', 0x3d, '^'}}, {@hash}, {@uid_lt}, {@mask={'mask', 0x3d, 'MAY_EXEC'}}, {@uid_lt={'uid<', 0xee00}}, {@smackfsfloor={'smackfsfloor', 0x3d, ':%#[@'}}, {@obj_user={'obj_user', 0x3d, ',\\*),i'}}, {@uid_eq={'uid', 0x3d, 0xee00}}, {@seclabel}, {@uid_lt={'uid<', 0xee00}}]})

[  372.683195][T16724] REISERFS warning (device loop3): super-6502 reiserfs_getopt: unknown mount option "obj_role=^"
[  372.740071][T16727] loop1: detected capacity change from 0 to 64
[  372.767985][T16728] REISERFS warning (device loop0): super-6502 reiserfs_getopt: unknown mount option "obj_role=^"
06:19:30 executing program 3:
r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0)
mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800004, 0x12, r0, 0x0)
preadv(0xffffffffffffffff, &(0x7f00000001c0)=[{0x0}], 0x1, 0x9, 0x0)
mmap(&(0x7f0000000000/0xa000)=nil, 0xa000, 0x2, 0x2172, 0xffffffffffffffff, 0x0)
syz_mount_image$reiserfs(&(0x7f0000000140), &(0x7f0000000180)='./file0\x00', 0x0, 0x0, &(0x7f0000000300), 0x0, &(0x7f0000000440)={[{@balloc_no_unhash_reloc}], [{@obj_role={'obj_role', 0x3d, '^'}}, {@hash}, {@uid_lt}, {@mask={'mask', 0x3d, 'MAY_EXEC'}}, {@uid_lt={'uid<', 0xee00}}, {@smackfsfloor={'smackfsfloor', 0x3d, ':%#[@'}}, {@obj_user={'obj_user', 0x3d, ',\\*),i'}}, {@uid_eq={'uid', 0x3d, 0xee00}}, {@seclabel}, {@uid_lt={'uid<', 0xee00}}]})

06:19:30 executing program 1:
r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0)
mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800004, 0x12, r0, 0x0)
preadv(0xffffffffffffffff, &(0x7f00000001c0)=[{0x0}], 0x1, 0x9, 0x0)
mmap(&(0x7f0000000000/0xa000)=nil, 0xa000, 0x2, 0x2172, 0xffffffffffffffff, 0x0)
syz_mount_image$reiserfs(0x0, &(0x7f0000000180)='./file0\x00', 0x8000, 0x3, &(0x7f0000000300)=[{&(0x7f0000000540)="21d37ef07e82e237fbe1b40158d20e242c5ea1f9d9edc6b9395250085d6dfa486982e82d4ce1a5e2bc00d29383bae640de", 0x31, 0x7}, {&(0x7f0000000240)="c43f281f483aa6cd83e40e59d53f177299d285bbe5d90aab2b56a76f9db49d86afa5a0f601ba9b3502de5f3724f3ec00927151f928f668b362052950a2e8f16baec29875fdad59395e86a1050c368933e3ed5a17d76bd7bded793436ea207885f395ace3fc12126c205b170be392c1645233ef01f9661090706a65f63b4845dc2884a20711a8024ad4af44aeec9db33991dae38d95cdb7132970d0d4dec58b9d46d378", 0xa3, 0x6}, {&(0x7f0000000380)="05f82c760d277896dd8c9891a41aafe24124891a32a238c3c78696d112aa09f3ae5c54b0c08676da5db7f358c72dfaca9a5d90860b4ae363c9a921c47965d339c23408a6d9b31a23aee27822f0a140d8e4ec9475a740113f2b9923b46333110e528e0a513151aad34aee1b5310fcf62c1982349253003d6d53aebbe09cf5918668ee682be93b6a671bbc", 0x8a, 0x3}], 0x2000400, &(0x7f0000000440)={[{@balloc_no_unhash_reloc}, {@nolargeio}, {@grpjquota}], [{@obj_role={'obj_role', 0x3d, '^'}}, {@hash}, {@uid_lt}, {@mask={'mask', 0x3d, 'MAY_EXEC'}}, {@uid_lt={'uid<', 0xee00}}, {@smackfsfloor={'smackfsfloor', 0x3d, ':%#[@'}}, {@obj_user={'obj_user', 0x3d, ',\\*),i'}}, {@uid_eq={'uid', 0x3d, 0xee00}}, {@seclabel}, {@uid_lt={'uid<', 0xee00}}]})

[  372.887874][T16735] REISERFS warning (device loop3): super-6502 reiserfs_getopt: unknown mount option "obj_role=^"
06:19:30 executing program 0:
r0 = openat(0xffffffffffffffff, 0x0, 0x0, 0x0)
mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800004, 0x12, r0, 0x0)
preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x9, 0x0)
syz_mount_image$reiserfs(&(0x7f0000000140), &(0x7f0000000180)='./file0\x00', 0x0, 0x0, &(0x7f0000000300), 0x0, &(0x7f0000000440)={[{@balloc_no_unhash_reloc}], [{@obj_role={'obj_role', 0x3d, '^'}}, {@hash}, {@uid_lt}, {@mask={'mask', 0x3d, 'MAY_EXEC'}}, {@uid_lt={'uid<', 0xee00}}, {@smackfsfloor={'smackfsfloor', 0x3d, ':%#[@'}}, {@obj_user={'obj_user', 0x3d, ',\\*),i'}}, {@uid_eq={'uid', 0x3d, 0xee00}}, {@seclabel}, {@uid_lt={'uid<', 0xee00}}]})

[  372.949602][T16742] REISERFS warning (device loop0): super-6502 reiserfs_getopt: unknown mount option "obj_role=^"
06:19:30 executing program 3:
r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0)
mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800004, 0x12, r0, 0x0)
preadv(0xffffffffffffffff, &(0x7f00000001c0)=[{0x0}], 0x1, 0x9, 0x0)
mmap(&(0x7f0000000000/0xa000)=nil, 0xa000, 0x2, 0x2172, 0xffffffffffffffff, 0x0)
syz_mount_image$reiserfs(&(0x7f0000000140), &(0x7f0000000180)='./file0\x00', 0x0, 0x0, &(0x7f0000000300), 0x0, &(0x7f0000000440)={[{@balloc_no_unhash_reloc}], [{@obj_role={'obj_role', 0x3d, '^'}}, {@hash}, {@uid_lt}, {@mask={'mask', 0x3d, 'MAY_EXEC'}}, {@uid_lt={'uid<', 0xee00}}, {@smackfsfloor={'smackfsfloor', 0x3d, ':%#[@'}}, {@obj_user={'obj_user', 0x3d, ',\\*),i'}}, {@uid_eq={'uid', 0x3d, 0xee00}}, {@seclabel}, {@uid_lt={'uid<', 0xee00}}]})

[  373.021620][T16748] loop1: detected capacity change from 0 to 64
[  373.250106][T16755] REISERFS warning (device loop3): super-6502 reiserfs_getopt: unknown mount option "obj_role=^"
06:19:31 executing program 0:
r0 = openat(0xffffffffffffffff, 0x0, 0x0, 0x0)
mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800004, 0x12, r0, 0x0)
preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x9, 0x0)
syz_mount_image$reiserfs(&(0x7f0000000140), &(0x7f0000000180)='./file0\x00', 0x0, 0x0, &(0x7f0000000300), 0x0, &(0x7f0000000440)={[{@balloc_no_unhash_reloc}], [{@obj_role={'obj_role', 0x3d, '^'}}, {@hash}, {@uid_lt}, {@mask={'mask', 0x3d, 'MAY_EXEC'}}, {@uid_lt={'uid<', 0xee00}}, {@smackfsfloor={'smackfsfloor', 0x3d, ':%#[@'}}, {@obj_user={'obj_user', 0x3d, ',\\*),i'}}, {@uid_eq={'uid', 0x3d, 0xee00}}, {@seclabel}, {@uid_lt={'uid<', 0xee00}}]})

06:19:31 executing program 2:
r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0)
mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800004, 0x12, r0, 0x0)
preadv(0xffffffffffffffff, &(0x7f00000001c0)=[{0x0}], 0x1, 0x9, 0x0)
r1 = syz_open_dev$tty1(0xc, 0x4, 0x1)
write$binfmt_elf64(r1, &(0x7f0000000380)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x80, 0x1, 0x9, 0x1, 0x2, 0x3e, 0x7ff, 0x1f2, 0x40, 0x1f4, 0xbfa, 0x3, 0x38, 0x1, 0x5, 0x4, 0x4}, [{0x5, 0x9, 0x6, 0x101, 0x6, 0x4, 0x9, 0x6}, {0x5, 0x3, 0x5e61, 0x80000000, 0xcc3, 0x9, 0x7, 0x8}], "d1660f10e0ac4a6edbf3aa53803c8f57ef2a12069e82553332d2b96d67f2dbc5b04959dad57c303d876233684f5e9ad402a193da791e11122f2cccbf10d6d499f5e16385d09f63891a965d80bcb68b551fabffb4bf0b5c372b4d69cdefac988201a40429a8d0dc699820193afcab08070fde89c22e16b43dde5e37d9a3df0cd352e8667f163774d9dc3c79571e5100046281", ['\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00']}, 0x842)

06:19:31 executing program 1:
r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0)
mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800004, 0x12, r0, 0x0)
preadv(0xffffffffffffffff, &(0x7f00000001c0)=[{0x0}], 0x1, 0x9, 0x0)
mmap(&(0x7f0000000000/0xa000)=nil, 0xa000, 0x2, 0x2172, 0xffffffffffffffff, 0x0)
syz_mount_image$reiserfs(0x0, &(0x7f0000000180)='./file0\x00', 0x8000, 0x3, &(0x7f0000000300)=[{&(0x7f0000000540)="21d37ef07e82e237fbe1b40158d20e242c5ea1f9d9edc6b9395250085d6dfa486982e82d4ce1a5e2bc00d29383bae640de", 0x31, 0x7}, {&(0x7f0000000240)="c43f281f483aa6cd83e40e59d53f177299d285bbe5d90aab2b56a76f9db49d86afa5a0f601ba9b3502de5f3724f3ec00927151f928f668b362052950a2e8f16baec29875fdad59395e86a1050c368933e3ed5a17d76bd7bded793436ea207885f395ace3fc12126c205b170be392c1645233ef01f9661090706a65f63b4845dc2884a20711a8024ad4af44aeec9db33991dae38d95cdb7132970d0d4dec58b9d46d378", 0xa3, 0x6}, {&(0x7f0000000380)="05f82c760d277896dd8c9891a41aafe24124891a32a238c3c78696d112aa09f3ae5c54b0c08676da5db7f358c72dfaca9a5d90860b4ae363c9a921c47965d339c23408a6d9b31a23aee27822f0a140d8e4ec9475a740113f2b9923b46333110e528e0a513151aad34aee1b5310fcf62c1982349253003d6d53aebbe09cf5918668ee682be93b6a671bbc", 0x8a, 0x3}], 0x2000400, &(0x7f0000000440)={[{@balloc_no_unhash_reloc}, {@nolargeio}, {@grpjquota}], [{@obj_role={'obj_role', 0x3d, '^'}}, {@hash}, {@uid_lt}, {@mask={'mask', 0x3d, 'MAY_EXEC'}}, {@uid_lt={'uid<', 0xee00}}, {@smackfsfloor={'smackfsfloor', 0x3d, ':%#[@'}}, {@obj_user={'obj_user', 0x3d, ',\\*),i'}}, {@uid_eq={'uid', 0x3d, 0xee00}}, {@seclabel}, {@uid_lt={'uid<', 0xee00}}]})

06:19:31 executing program 3:
r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0)
mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800004, 0x12, r0, 0x0)
preadv(0xffffffffffffffff, &(0x7f00000001c0)=[{0x0}], 0x1, 0x9, 0x0)
mmap(&(0x7f0000000000/0xa000)=nil, 0xa000, 0x2, 0x2172, 0xffffffffffffffff, 0x0)
syz_mount_image$reiserfs(&(0x7f0000000140), &(0x7f0000000180)='./file0\x00', 0x0, 0x0, &(0x7f0000000300), 0x0, &(0x7f0000000440)={[{@balloc_no_unhash_reloc}], [{@obj_role={'obj_role', 0x3d, '^'}}, {@hash}, {@uid_lt}, {@mask={'mask', 0x3d, 'MAY_EXEC'}}, {@uid_lt={'uid<', 0xee00}}, {@smackfsfloor={'smackfsfloor', 0x3d, ':%#[@'}}, {@obj_user={'obj_user', 0x3d, ',\\*),i'}}, {@uid_eq={'uid', 0x3d, 0xee00}}, {@seclabel}, {@uid_lt={'uid<', 0xee00}}]})

[  373.541889][T16763] loop1: detected capacity change from 0 to 64
[  373.584016][T16768] REISERFS warning (device loop3): super-6502 reiserfs_getopt: unknown mount option "obj_role=^"
[  373.588183][T16767] REISERFS warning (device loop0): super-6502 reiserfs_getopt: unknown mount option "obj_role=^"
06:19:31 executing program 1:
r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0)
mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800004, 0x12, r0, 0x0)
preadv(0xffffffffffffffff, &(0x7f00000001c0)=[{0x0}], 0x1, 0x9, 0x0)
mmap(&(0x7f0000000000/0xa000)=nil, 0xa000, 0x2, 0x2172, 0xffffffffffffffff, 0x0)
syz_mount_image$reiserfs(0x0, &(0x7f0000000180)='./file0\x00', 0x8000, 0x3, &(0x7f0000000300)=[{&(0x7f0000000540)="21d37ef07e82e237fbe1b40158d20e242c5ea1f9d9edc6b9395250085d6dfa486982e82d4ce1a5e2bc00d29383bae640de", 0x31, 0x7}, {&(0x7f0000000240)="c43f281f483aa6cd83e40e59d53f177299d285bbe5d90aab2b56a76f9db49d86afa5a0f601ba9b3502de5f3724f3ec00927151f928f668b362052950a2e8f16baec29875fdad59395e86a1050c368933e3ed5a17d76bd7bded793436ea207885f395ace3fc12126c205b170be392c1645233ef01f9661090706a65f63b4845dc2884a20711a8024ad4af44aeec9db33991dae38d95cdb7132970d0d4dec58b9d46d378", 0xa3, 0x6}, {&(0x7f0000000380)="05f82c760d277896dd8c9891a41aafe24124891a32a238c3c78696d112aa09f3ae5c54b0c08676da5db7f358c72dfaca9a5d90860b4ae363c9a921c47965d339c23408a6d9b31a23aee27822f0a140d8e4ec9475a740113f2b9923b46333110e528e0a513151aad34aee1b5310fcf62c1982349253003d6d53aebbe09cf5918668ee682be93b6a671bbc", 0x8a, 0x3}], 0x2000400, &(0x7f0000000440)={[{@balloc_no_unhash_reloc}, {@nolargeio}, {@grpjquota}], [{@obj_role={'obj_role', 0x3d, '^'}}, {@hash}, {@uid_lt}, {@mask={'mask', 0x3d, 'MAY_EXEC'}}, {@uid_lt={'uid<', 0xee00}}, {@smackfsfloor={'smackfsfloor', 0x3d, ':%#[@'}}, {@obj_user={'obj_user', 0x3d, ',\\*),i'}}, {@uid_eq={'uid', 0x3d, 0xee00}}, {@seclabel}, {@uid_lt={'uid<', 0xee00}}]})

06:19:31 executing program 0:
r0 = openat(0xffffffffffffffff, 0x0, 0x0, 0x0)
mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800004, 0x12, r0, 0x0)
preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x9, 0x0)
syz_mount_image$reiserfs(&(0x7f0000000140), &(0x7f0000000180)='./file0\x00', 0x0, 0x0, &(0x7f0000000300), 0x0, &(0x7f0000000440)={[{@balloc_no_unhash_reloc}], [{@obj_role={'obj_role', 0x3d, '^'}}, {@hash}, {@uid_lt}, {@mask={'mask', 0x3d, 'MAY_EXEC'}}, {@uid_lt={'uid<', 0xee00}}, {@smackfsfloor={'smackfsfloor', 0x3d, ':%#[@'}}, {@obj_user={'obj_user', 0x3d, ',\\*),i'}}, {@uid_eq={'uid', 0x3d, 0xee00}}, {@seclabel}, {@uid_lt={'uid<', 0xee00}}]})

06:19:31 executing program 3:
r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0)
mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800004, 0x12, r0, 0x0)
preadv(r0, 0x0, 0x0, 0x9, 0x0)
mmap(&(0x7f0000000000/0xa000)=nil, 0xa000, 0x2, 0x2172, 0xffffffffffffffff, 0x0)
syz_mount_image$reiserfs(&(0x7f0000000140), &(0x7f0000000180)='./file0\x00', 0x0, 0x0, &(0x7f0000000300), 0x0, &(0x7f0000000440)={[{@balloc_no_unhash_reloc}], [{@obj_role={'obj_role', 0x3d, '^'}}, {@hash}, {@uid_lt}, {@mask={'mask', 0x3d, 'MAY_EXEC'}}, {@uid_lt={'uid<', 0xee00}}, {@smackfsfloor={'smackfsfloor', 0x3d, ':%#[@'}}, {@obj_user={'obj_user', 0x3d, ',\\*),i'}}, {@uid_eq={'uid', 0x3d, 0xee00}}, {@seclabel}, {@uid_lt={'uid<', 0xee00}}]})

[  373.789651][T16778] loop1: detected capacity change from 0 to 64
[  373.844187][T16784] REISERFS warning (device loop3): super-6502 reiserfs_getopt: unknown mount option "obj_role=^"
[  373.852129][T16783] REISERFS warning (device loop0): super-6502 reiserfs_getopt: unknown mount option "obj_role=^"
06:19:31 executing program 1:
r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0)
mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800004, 0x12, r0, 0x0)
preadv(r0, 0x0, 0x0, 0x9, 0x0)
mmap(&(0x7f0000000000/0xa000)=nil, 0xa000, 0x2, 0x2172, 0xffffffffffffffff, 0x0)
syz_mount_image$reiserfs(0x0, &(0x7f0000000180)='./file0\x00', 0x8000, 0x3, &(0x7f0000000300)=[{&(0x7f0000000540)="21d37ef07e82e237fbe1b40158d20e242c5ea1f9d9edc6b9395250085d6dfa486982e82d4ce1a5e2bc00d29383bae640de", 0x31, 0x7}, {&(0x7f0000000240)="c43f281f483aa6cd83e40e59d53f177299d285bbe5d90aab2b56a76f9db49d86afa5a0f601ba9b3502de5f3724f3ec00927151f928f668b362052950a2e8f16baec29875fdad59395e86a1050c368933e3ed5a17d76bd7bded793436ea207885f395ace3fc12126c205b170be392c1645233ef01f9661090706a65f63b4845dc2884a20711a8024ad4af44aeec9db33991dae38d95cdb7132970d0d4dec58b9d46d378", 0xa3, 0x6}, {&(0x7f0000000380)="05f82c760d277896dd8c9891a41aafe24124891a32a238c3c78696d112aa09f3ae5c54b0c08676da5db7f358c72dfaca9a5d90860b4ae363c9a921c47965d339c23408a6d9b31a23aee27822f0a140d8e4ec9475a740113f2b9923b46333110e528e0a513151aad34aee1b5310fcf62c1982349253003d6d53aebbe09cf5918668ee682be93b6a671bbc", 0x8a, 0x3}], 0x2000400, &(0x7f0000000440)={[{@balloc_no_unhash_reloc}, {@nolargeio}, {@grpjquota}], [{@obj_role={'obj_role', 0x3d, '^'}}, {@hash}, {@uid_lt}, {@mask={'mask', 0x3d, 'MAY_EXEC'}}, {@uid_lt={'uid<', 0xee00}}, {@smackfsfloor={'smackfsfloor', 0x3d, ':%#[@'}}, {@obj_user={'obj_user', 0x3d, ',\\*),i'}}, {@uid_eq={'uid', 0x3d, 0xee00}}, {@seclabel}, {@uid_lt={'uid<', 0xee00}}]})

06:19:31 executing program 3:
r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0)
mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800004, 0x12, r0, 0x0)
preadv(r0, 0x0, 0x0, 0x9, 0x0)
mmap(&(0x7f0000000000/0xa000)=nil, 0xa000, 0x2, 0x2172, 0xffffffffffffffff, 0x0)
syz_mount_image$reiserfs(&(0x7f0000000140), &(0x7f0000000180)='./file0\x00', 0x0, 0x0, &(0x7f0000000300), 0x0, &(0x7f0000000440)={[{@balloc_no_unhash_reloc}], [{@obj_role={'obj_role', 0x3d, '^'}}, {@hash}, {@uid_lt}, {@mask={'mask', 0x3d, 'MAY_EXEC'}}, {@uid_lt={'uid<', 0xee00}}, {@smackfsfloor={'smackfsfloor', 0x3d, ':%#[@'}}, {@obj_user={'obj_user', 0x3d, ',\\*),i'}}, {@uid_eq={'uid', 0x3d, 0xee00}}, {@seclabel}, {@uid_lt={'uid<', 0xee00}}]})

[  374.010176][T16797] loop1: detected capacity change from 0 to 64
[  374.010499][T16794] REISERFS warning (device loop3): super-6502 reiserfs_getopt: unknown mount option "obj_role=^"
06:19:32 executing program 2:
r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0)
mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800004, 0x12, r0, 0x0)
preadv(0xffffffffffffffff, &(0x7f00000001c0)=[{0x0}], 0x1, 0x9, 0x0)
r1 = syz_open_dev$tty1(0xc, 0x4, 0x1)
write$binfmt_elf64(r1, &(0x7f0000000380)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x80, 0x1, 0x9, 0x1, 0x2, 0x3e, 0x7ff, 0x1f2, 0x40, 0x1f4, 0xbfa, 0x3, 0x38, 0x1, 0x5, 0x4, 0x4}, [{0x5, 0x9, 0x6, 0x101, 0x6, 0x4, 0x9, 0x6}, {0x5, 0x3, 0x5e61, 0x80000000, 0xcc3, 0x9, 0x7, 0x8}], "d1660f10e0ac4a6edbf3aa53803c8f57ef2a12069e82553332d2b96d67f2dbc5b04959dad57c303d876233684f5e9ad402a193da791e11122f2cccbf10d6d499f5e16385d09f63891a965d80bcb68b551fabffb4bf0b5c372b4d69cdefac988201a40429a8d0dc699820193afcab08070fde89c22e16b43dde5e37d9a3df0cd352e8667f163774d9dc3c79571e5100046281", ['\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00']}, 0x842)

06:19:32 executing program 0:
r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0)
mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x0, 0x12, r0, 0x0)
preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x9, 0x0)
syz_mount_image$reiserfs(&(0x7f0000000140), &(0x7f0000000180)='./file0\x00', 0x0, 0x0, &(0x7f0000000300), 0x0, &(0x7f0000000440)={[{@balloc_no_unhash_reloc}], [{@obj_role={'obj_role', 0x3d, '^'}}, {@hash}, {@uid_lt}, {@mask={'mask', 0x3d, 'MAY_EXEC'}}, {@uid_lt={'uid<', 0xee00}}, {@smackfsfloor={'smackfsfloor', 0x3d, ':%#[@'}}, {@obj_user={'obj_user', 0x3d, ',\\*),i'}}, {@uid_eq={'uid', 0x3d, 0xee00}}, {@seclabel}, {@uid_lt={'uid<', 0xee00}}]})

06:19:32 executing program 1:
r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0)
mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800004, 0x12, r0, 0x0)
preadv(r0, 0x0, 0x0, 0x9, 0x0)
mmap(&(0x7f0000000000/0xa000)=nil, 0xa000, 0x2, 0x2172, 0xffffffffffffffff, 0x0)
syz_mount_image$reiserfs(0x0, &(0x7f0000000180)='./file0\x00', 0x8000, 0x3, &(0x7f0000000300)=[{&(0x7f0000000540)="21d37ef07e82e237fbe1b40158d20e242c5ea1f9d9edc6b9395250085d6dfa486982e82d4ce1a5e2bc00d29383bae640de", 0x31, 0x7}, {&(0x7f0000000240)="c43f281f483aa6cd83e40e59d53f177299d285bbe5d90aab2b56a76f9db49d86afa5a0f601ba9b3502de5f3724f3ec00927151f928f668b362052950a2e8f16baec29875fdad59395e86a1050c368933e3ed5a17d76bd7bded793436ea207885f395ace3fc12126c205b170be392c1645233ef01f9661090706a65f63b4845dc2884a20711a8024ad4af44aeec9db33991dae38d95cdb7132970d0d4dec58b9d46d378", 0xa3, 0x6}, {&(0x7f0000000380)="05f82c760d277896dd8c9891a41aafe24124891a32a238c3c78696d112aa09f3ae5c54b0c08676da5db7f358c72dfaca9a5d90860b4ae363c9a921c47965d339c23408a6d9b31a23aee27822f0a140d8e4ec9475a740113f2b9923b46333110e528e0a513151aad34aee1b5310fcf62c1982349253003d6d53aebbe09cf5918668ee682be93b6a671bbc", 0x8a, 0x3}], 0x2000400, &(0x7f0000000440)={[{@balloc_no_unhash_reloc}, {@nolargeio}, {@grpjquota}], [{@obj_role={'obj_role', 0x3d, '^'}}, {@hash}, {@uid_lt}, {@mask={'mask', 0x3d, 'MAY_EXEC'}}, {@uid_lt={'uid<', 0xee00}}, {@smackfsfloor={'smackfsfloor', 0x3d, ':%#[@'}}, {@obj_user={'obj_user', 0x3d, ',\\*),i'}}, {@uid_eq={'uid', 0x3d, 0xee00}}, {@seclabel}, {@uid_lt={'uid<', 0xee00}}]})

06:19:32 executing program 3:
r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0)
mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800004, 0x12, r0, 0x0)
preadv(r0, 0x0, 0x0, 0x9, 0x0)
mmap(&(0x7f0000000000/0xa000)=nil, 0xa000, 0x2, 0x2172, 0xffffffffffffffff, 0x0)
syz_mount_image$reiserfs(&(0x7f0000000140), &(0x7f0000000180)='./file0\x00', 0x0, 0x0, &(0x7f0000000300), 0x0, &(0x7f0000000440)={[{@balloc_no_unhash_reloc}], [{@obj_role={'obj_role', 0x3d, '^'}}, {@hash}, {@uid_lt}, {@mask={'mask', 0x3d, 'MAY_EXEC'}}, {@uid_lt={'uid<', 0xee00}}, {@smackfsfloor={'smackfsfloor', 0x3d, ':%#[@'}}, {@obj_user={'obj_user', 0x3d, ',\\*),i'}}, {@uid_eq={'uid', 0x3d, 0xee00}}, {@seclabel}, {@uid_lt={'uid<', 0xee00}}]})

[  374.496126][T16808] loop1: detected capacity change from 0 to 64
06:19:32 executing program 1:
r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0)
mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800004, 0x12, r0, 0x0)
preadv(r0, 0x0, 0x0, 0x9, 0x0)
mmap(&(0x7f0000000000/0xa000)=nil, 0xa000, 0x2, 0x2172, 0xffffffffffffffff, 0x0)
syz_mount_image$reiserfs(0x0, &(0x7f0000000180)='./file0\x00', 0x8000, 0x3, &(0x7f0000000300)=[{&(0x7f0000000540)="21d37ef07e82e237fbe1b40158d20e242c5ea1f9d9edc6b9395250085d6dfa486982e82d4ce1a5e2bc00d29383bae640de", 0x31, 0x7}, {&(0x7f0000000240)="c43f281f483aa6cd83e40e59d53f177299d285bbe5d90aab2b56a76f9db49d86afa5a0f601ba9b3502de5f3724f3ec00927151f928f668b362052950a2e8f16baec29875fdad59395e86a1050c368933e3ed5a17d76bd7bded793436ea207885f395ace3fc12126c205b170be392c1645233ef01f9661090706a65f63b4845dc2884a20711a8024ad4af44aeec9db33991dae38d95cdb7132970d0d4dec58b9d46d378", 0xa3, 0x6}, {&(0x7f0000000380)="05f82c760d277896dd8c9891a41aafe24124891a32a238c3c78696d112aa09f3ae5c54b0c08676da5db7f358c72dfaca9a5d90860b4ae363c9a921c47965d339c23408a6d9b31a23aee27822f0a140d8e4ec9475a740113f2b9923b46333110e528e0a513151aad34aee1b5310fcf62c1982349253003d6d53aebbe09cf5918668ee682be93b6a671bbc", 0x8a, 0x3}], 0x2000400, &(0x7f0000000440)={[{@balloc_no_unhash_reloc}, {@nolargeio}, {@grpjquota}], [{@obj_role={'obj_role', 0x3d, '^'}}, {@hash}, {@uid_lt}, {@mask={'mask', 0x3d, 'MAY_EXEC'}}, {@uid_lt={'uid<', 0xee00}}, {@smackfsfloor={'smackfsfloor', 0x3d, ':%#[@'}}, {@obj_user={'obj_user', 0x3d, ',\\*),i'}}, {@uid_eq={'uid', 0x3d, 0xee00}}, {@seclabel}, {@uid_lt={'uid<', 0xee00}}]})

[  374.634654][T16813] REISERFS warning (device loop3): super-6502 reiserfs_getopt: unknown mount option "obj_role=^"
06:19:32 executing program 0:
r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0)
mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x0, 0x12, r0, 0x0)
preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x9, 0x0)
syz_mount_image$reiserfs(&(0x7f0000000140), &(0x7f0000000180)='./file0\x00', 0x0, 0x0, &(0x7f0000000300), 0x0, &(0x7f0000000440)={[{@balloc_no_unhash_reloc}], [{@obj_role={'obj_role', 0x3d, '^'}}, {@hash}, {@uid_lt}, {@mask={'mask', 0x3d, 'MAY_EXEC'}}, {@uid_lt={'uid<', 0xee00}}, {@smackfsfloor={'smackfsfloor', 0x3d, ':%#[@'}}, {@obj_user={'obj_user', 0x3d, ',\\*),i'}}, {@uid_eq={'uid', 0x3d, 0xee00}}, {@seclabel}, {@uid_lt={'uid<', 0xee00}}]})

06:19:32 executing program 3:
r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0)
mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800004, 0x12, r0, 0x0)
preadv(r0, &(0x7f00000001c0), 0x0, 0x9, 0x0)
mmap(&(0x7f0000000000/0xa000)=nil, 0xa000, 0x2, 0x2172, 0xffffffffffffffff, 0x0)
syz_mount_image$reiserfs(&(0x7f0000000140), &(0x7f0000000180)='./file0\x00', 0x0, 0x0, &(0x7f0000000300), 0x0, &(0x7f0000000440)={[{@balloc_no_unhash_reloc}], [{@obj_role={'obj_role', 0x3d, '^'}}, {@hash}, {@uid_lt}, {@mask={'mask', 0x3d, 'MAY_EXEC'}}, {@uid_lt={'uid<', 0xee00}}, {@smackfsfloor={'smackfsfloor', 0x3d, ':%#[@'}}, {@obj_user={'obj_user', 0x3d, ',\\*),i'}}, {@uid_eq={'uid', 0x3d, 0xee00}}, {@seclabel}, {@uid_lt={'uid<', 0xee00}}]})

[  374.780693][T16821] loop1: detected capacity change from 0 to 64
06:19:32 executing program 0:
r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0)
mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x0, 0x12, r0, 0x0)
preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x9, 0x0)
syz_mount_image$reiserfs(&(0x7f0000000140), &(0x7f0000000180)='./file0\x00', 0x0, 0x0, &(0x7f0000000300), 0x0, &(0x7f0000000440)={[{@balloc_no_unhash_reloc}], [{@obj_role={'obj_role', 0x3d, '^'}}, {@hash}, {@uid_lt}, {@mask={'mask', 0x3d, 'MAY_EXEC'}}, {@uid_lt={'uid<', 0xee00}}, {@smackfsfloor={'smackfsfloor', 0x3d, ':%#[@'}}, {@obj_user={'obj_user', 0x3d, ',\\*),i'}}, {@uid_eq={'uid', 0x3d, 0xee00}}, {@seclabel}, {@uid_lt={'uid<', 0xee00}}]})

[  374.872311][T16830] REISERFS warning (device loop3): super-6502 reiserfs_getopt: unknown mount option "obj_role=^"
06:19:33 executing program 2:
r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0)
mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800004, 0x12, r0, 0x0)
preadv(0xffffffffffffffff, &(0x7f00000001c0)=[{0x0}], 0x1, 0x9, 0x0)
r1 = syz_open_dev$tty1(0xc, 0x4, 0x1)
write$binfmt_elf64(r1, &(0x7f0000000380)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x80, 0x1, 0x9, 0x1, 0x2, 0x3e, 0x7ff, 0x1f2, 0x40, 0x1f4, 0xbfa, 0x3, 0x38, 0x1, 0x5, 0x4, 0x4}, [{0x5, 0x9, 0x6, 0x101, 0x6, 0x4, 0x9, 0x6}, {0x5, 0x3, 0x5e61, 0x80000000, 0xcc3, 0x9, 0x7, 0x8}], "d1660f10e0ac4a6edbf3aa53803c8f57ef2a12069e82553332d2b96d67f2dbc5b04959dad57c303d876233684f5e9ad402a193da791e11122f2cccbf10d6d499f5e16385d09f63891a965d80bcb68b551fabffb4bf0b5c372b4d69cdefac988201a40429a8d0dc699820193afcab08070fde89c22e16b43dde5e37d9a3df0cd352e8667f163774d9dc3c79571e5100046281", ['\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00']}, 0x842)

06:19:33 executing program 1:
r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0)
mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800004, 0x12, r0, 0x0)
preadv(r0, &(0x7f00000001c0), 0x0, 0x9, 0x0)
mmap(&(0x7f0000000000/0xa000)=nil, 0xa000, 0x2, 0x2172, 0xffffffffffffffff, 0x0)
syz_mount_image$reiserfs(0x0, &(0x7f0000000180)='./file0\x00', 0x8000, 0x3, &(0x7f0000000300)=[{&(0x7f0000000540)="21d37ef07e82e237fbe1b40158d20e242c5ea1f9d9edc6b9395250085d6dfa486982e82d4ce1a5e2bc00d29383bae640de", 0x31, 0x7}, {&(0x7f0000000240)="c43f281f483aa6cd83e40e59d53f177299d285bbe5d90aab2b56a76f9db49d86afa5a0f601ba9b3502de5f3724f3ec00927151f928f668b362052950a2e8f16baec29875fdad59395e86a1050c368933e3ed5a17d76bd7bded793436ea207885f395ace3fc12126c205b170be392c1645233ef01f9661090706a65f63b4845dc2884a20711a8024ad4af44aeec9db33991dae38d95cdb7132970d0d4dec58b9d46d378", 0xa3, 0x6}, {&(0x7f0000000380)="05f82c760d277896dd8c9891a41aafe24124891a32a238c3c78696d112aa09f3ae5c54b0c08676da5db7f358c72dfaca9a5d90860b4ae363c9a921c47965d339c23408a6d9b31a23aee27822f0a140d8e4ec9475a740113f2b9923b46333110e528e0a513151aad34aee1b5310fcf62c1982349253003d6d53aebbe09cf5918668ee682be93b6a671bbc", 0x8a, 0x3}], 0x2000400, &(0x7f0000000440)={[{@balloc_no_unhash_reloc}, {@nolargeio}, {@grpjquota}], [{@obj_role={'obj_role', 0x3d, '^'}}, {@hash}, {@uid_lt}, {@mask={'mask', 0x3d, 'MAY_EXEC'}}, {@uid_lt={'uid<', 0xee00}}, {@smackfsfloor={'smackfsfloor', 0x3d, ':%#[@'}}, {@obj_user={'obj_user', 0x3d, ',\\*),i'}}, {@uid_eq={'uid', 0x3d, 0xee00}}, {@seclabel}, {@uid_lt={'uid<', 0xee00}}]})

06:19:33 executing program 3:
r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0)
mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800004, 0x12, r0, 0x0)
preadv(r0, &(0x7f00000001c0), 0x0, 0x9, 0x0)
mmap(&(0x7f0000000000/0xa000)=nil, 0xa000, 0x2, 0x2172, 0xffffffffffffffff, 0x0)
syz_mount_image$reiserfs(&(0x7f0000000140), &(0x7f0000000180)='./file0\x00', 0x0, 0x0, &(0x7f0000000300), 0x0, &(0x7f0000000440)={[{@balloc_no_unhash_reloc}], [{@obj_role={'obj_role', 0x3d, '^'}}, {@hash}, {@uid_lt}, {@mask={'mask', 0x3d, 'MAY_EXEC'}}, {@uid_lt={'uid<', 0xee00}}, {@smackfsfloor={'smackfsfloor', 0x3d, ':%#[@'}}, {@obj_user={'obj_user', 0x3d, ',\\*),i'}}, {@uid_eq={'uid', 0x3d, 0xee00}}, {@seclabel}, {@uid_lt={'uid<', 0xee00}}]})

06:19:33 executing program 0:
r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0)
mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800004, 0x10, r0, 0x0)
preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x9, 0x0)
syz_mount_image$reiserfs(&(0x7f0000000140), &(0x7f0000000180)='./file0\x00', 0x0, 0x0, &(0x7f0000000300), 0x0, &(0x7f0000000440)={[{@balloc_no_unhash_reloc}], [{@obj_role={'obj_role', 0x3d, '^'}}, {@hash}, {@uid_lt}, {@mask={'mask', 0x3d, 'MAY_EXEC'}}, {@uid_lt={'uid<', 0xee00}}, {@smackfsfloor={'smackfsfloor', 0x3d, ':%#[@'}}, {@obj_user={'obj_user', 0x3d, ',\\*),i'}}, {@uid_eq={'uid', 0x3d, 0xee00}}, {@seclabel}, {@uid_lt={'uid<', 0xee00}}]})

[  375.445780][T16847] REISERFS warning (device loop0): super-6502 reiserfs_getopt: unknown mount option "obj_role=^"
[  375.459213][T16849] loop1: detected capacity change from 0 to 64
[  375.472535][T16846] REISERFS warning (device loop3): super-6502 reiserfs_getopt: unknown mount option "obj_role=^"
06:19:33 executing program 1:
r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0)
mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800004, 0x12, r0, 0x0)
preadv(r0, &(0x7f00000001c0), 0x0, 0x9, 0x0)
mmap(&(0x7f0000000000/0xa000)=nil, 0xa000, 0x2, 0x2172, 0xffffffffffffffff, 0x0)
syz_mount_image$reiserfs(0x0, &(0x7f0000000180)='./file0\x00', 0x8000, 0x3, &(0x7f0000000300)=[{&(0x7f0000000540)="21d37ef07e82e237fbe1b40158d20e242c5ea1f9d9edc6b9395250085d6dfa486982e82d4ce1a5e2bc00d29383bae640de", 0x31, 0x7}, {&(0x7f0000000240)="c43f281f483aa6cd83e40e59d53f177299d285bbe5d90aab2b56a76f9db49d86afa5a0f601ba9b3502de5f3724f3ec00927151f928f668b362052950a2e8f16baec29875fdad59395e86a1050c368933e3ed5a17d76bd7bded793436ea207885f395ace3fc12126c205b170be392c1645233ef01f9661090706a65f63b4845dc2884a20711a8024ad4af44aeec9db33991dae38d95cdb7132970d0d4dec58b9d46d378", 0xa3, 0x6}, {&(0x7f0000000380)="05f82c760d277896dd8c9891a41aafe24124891a32a238c3c78696d112aa09f3ae5c54b0c08676da5db7f358c72dfaca9a5d90860b4ae363c9a921c47965d339c23408a6d9b31a23aee27822f0a140d8e4ec9475a740113f2b9923b46333110e528e0a513151aad34aee1b5310fcf62c1982349253003d6d53aebbe09cf5918668ee682be93b6a671bbc", 0x8a, 0x3}], 0x2000400, &(0x7f0000000440)={[{@balloc_no_unhash_reloc}, {@nolargeio}, {@grpjquota}], [{@obj_role={'obj_role', 0x3d, '^'}}, {@hash}, {@uid_lt}, {@mask={'mask', 0x3d, 'MAY_EXEC'}}, {@uid_lt={'uid<', 0xee00}}, {@smackfsfloor={'smackfsfloor', 0x3d, ':%#[@'}}, {@obj_user={'obj_user', 0x3d, ',\\*),i'}}, {@uid_eq={'uid', 0x3d, 0xee00}}, {@seclabel}, {@uid_lt={'uid<', 0xee00}}]})

06:19:33 executing program 0:
r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0)
mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800004, 0x10, r0, 0x0)
preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x9, 0x0)
syz_mount_image$reiserfs(&(0x7f0000000140), &(0x7f0000000180)='./file0\x00', 0x0, 0x0, &(0x7f0000000300), 0x0, &(0x7f0000000440)={[{@balloc_no_unhash_reloc}], [{@obj_role={'obj_role', 0x3d, '^'}}, {@hash}, {@uid_lt}, {@mask={'mask', 0x3d, 'MAY_EXEC'}}, {@uid_lt={'uid<', 0xee00}}, {@smackfsfloor={'smackfsfloor', 0x3d, ':%#[@'}}, {@obj_user={'obj_user', 0x3d, ',\\*),i'}}, {@uid_eq={'uid', 0x3d, 0xee00}}, {@seclabel}, {@uid_lt={'uid<', 0xee00}}]})

06:19:33 executing program 3:
r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0)
mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800004, 0x12, r0, 0x0)
preadv(r0, &(0x7f00000001c0), 0x0, 0x9, 0x0)
mmap(&(0x7f0000000000/0xa000)=nil, 0xa000, 0x2, 0x2172, 0xffffffffffffffff, 0x0)
syz_mount_image$reiserfs(&(0x7f0000000140), &(0x7f0000000180)='./file0\x00', 0x0, 0x0, &(0x7f0000000300), 0x0, &(0x7f0000000440)={[{@balloc_no_unhash_reloc}], [{@obj_role={'obj_role', 0x3d, '^'}}, {@hash}, {@uid_lt}, {@mask={'mask', 0x3d, 'MAY_EXEC'}}, {@uid_lt={'uid<', 0xee00}}, {@smackfsfloor={'smackfsfloor', 0x3d, ':%#[@'}}, {@obj_user={'obj_user', 0x3d, ',\\*),i'}}, {@uid_eq={'uid', 0x3d, 0xee00}}, {@seclabel}, {@uid_lt={'uid<', 0xee00}}]})

[  375.687689][T16862] REISERFS warning (device loop0): super-6502 reiserfs_getopt: unknown mount option "obj_role=^"
[  375.719939][T16866] REISERFS warning (device loop3): super-6502 reiserfs_getopt: unknown mount option "obj_role=^"
06:19:33 executing program 1:
r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0)
mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800004, 0x12, r0, 0x0)
preadv(r0, &(0x7f00000001c0), 0x0, 0x9, 0x0)
mmap(&(0x7f0000000000/0xa000)=nil, 0xa000, 0x2, 0x2172, 0xffffffffffffffff, 0x0)
syz_mount_image$reiserfs(0x0, &(0x7f0000000180)='./file0\x00', 0x8000, 0x3, &(0x7f0000000300)=[{&(0x7f0000000540)="21d37ef07e82e237fbe1b40158d20e242c5ea1f9d9edc6b9395250085d6dfa486982e82d4ce1a5e2bc00d29383bae640de", 0x31, 0x7}, {&(0x7f0000000240)="c43f281f483aa6cd83e40e59d53f177299d285bbe5d90aab2b56a76f9db49d86afa5a0f601ba9b3502de5f3724f3ec00927151f928f668b362052950a2e8f16baec29875fdad59395e86a1050c368933e3ed5a17d76bd7bded793436ea207885f395ace3fc12126c205b170be392c1645233ef01f9661090706a65f63b4845dc2884a20711a8024ad4af44aeec9db33991dae38d95cdb7132970d0d4dec58b9d46d378", 0xa3, 0x6}, {&(0x7f0000000380)="05f82c760d277896dd8c9891a41aafe24124891a32a238c3c78696d112aa09f3ae5c54b0c08676da5db7f358c72dfaca9a5d90860b4ae363c9a921c47965d339c23408a6d9b31a23aee27822f0a140d8e4ec9475a740113f2b9923b46333110e528e0a513151aad34aee1b5310fcf62c1982349253003d6d53aebbe09cf5918668ee682be93b6a671bbc", 0x8a, 0x3}], 0x2000400, &(0x7f0000000440)={[{@balloc_no_unhash_reloc}, {@nolargeio}, {@grpjquota}], [{@obj_role={'obj_role', 0x3d, '^'}}, {@hash}, {@uid_lt}, {@mask={'mask', 0x3d, 'MAY_EXEC'}}, {@uid_lt={'uid<', 0xee00}}, {@smackfsfloor={'smackfsfloor', 0x3d, ':%#[@'}}, {@obj_user={'obj_user', 0x3d, ',\\*),i'}}, {@uid_eq={'uid', 0x3d, 0xee00}}, {@seclabel}, {@uid_lt={'uid<', 0xee00}}]})

[  375.823801][T16873] loop1: detected capacity change from 0 to 64
[  376.341604][    T5] Bluetooth: hci0: command 0x0406 tx timeout
[  376.341680][   T22] Bluetooth: hci2: command 0x0406 tx timeout
[  376.372513][    T5] Bluetooth: hci1: command 0x0406 tx timeout
06:19:33 executing program 2:
r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0)
mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800004, 0x12, r0, 0x0)
preadv(r0, 0x0, 0x0, 0x9, 0x0)
r1 = syz_open_dev$tty1(0xc, 0x4, 0x1)
write$binfmt_elf64(r1, &(0x7f0000000380)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x80, 0x1, 0x9, 0x1, 0x2, 0x3e, 0x7ff, 0x1f2, 0x40, 0x1f4, 0xbfa, 0x3, 0x38, 0x1, 0x5, 0x4, 0x4}, [{0x5, 0x9, 0x6, 0x101, 0x6, 0x4, 0x9, 0x6}, {0x5, 0x3, 0x5e61, 0x80000000, 0xcc3, 0x9, 0x7, 0x8}], "d1660f10e0ac4a6edbf3aa53803c8f57ef2a12069e82553332d2b96d67f2dbc5b04959dad57c303d876233684f5e9ad402a193da791e11122f2cccbf10d6d499f5e16385d09f63891a965d80bcb68b551fabffb4bf0b5c372b4d69cdefac988201a40429a8d0dc699820193afcab08070fde89c22e16b43dde5e37d9a3df0cd352e8667f163774d9dc3c79571e5100046281", ['\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00']}, 0x842)

06:19:33 executing program 0:
r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0)
mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800004, 0x10, r0, 0x0)
preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x9, 0x0)
syz_mount_image$reiserfs(&(0x7f0000000140), &(0x7f0000000180)='./file0\x00', 0x0, 0x0, &(0x7f0000000300), 0x0, &(0x7f0000000440)={[{@balloc_no_unhash_reloc}], [{@obj_role={'obj_role', 0x3d, '^'}}, {@hash}, {@uid_lt}, {@mask={'mask', 0x3d, 'MAY_EXEC'}}, {@uid_lt={'uid<', 0xee00}}, {@smackfsfloor={'smackfsfloor', 0x3d, ':%#[@'}}, {@obj_user={'obj_user', 0x3d, ',\\*),i'}}, {@uid_eq={'uid', 0x3d, 0xee00}}, {@seclabel}, {@uid_lt={'uid<', 0xee00}}]})

06:19:33 executing program 1:
r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0)
mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800004, 0x12, r0, 0x0)
preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x0, 0x0)
mmap(&(0x7f0000000000/0xa000)=nil, 0xa000, 0x2, 0x2172, 0xffffffffffffffff, 0x0)
syz_mount_image$reiserfs(0x0, &(0x7f0000000180)='./file0\x00', 0x8000, 0x3, &(0x7f0000000300)=[{&(0x7f0000000540)="21d37ef07e82e237fbe1b40158d20e242c5ea1f9d9edc6b9395250085d6dfa486982e82d4ce1a5e2bc00d29383bae640de", 0x31, 0x7}, {&(0x7f0000000240)="c43f281f483aa6cd83e40e59d53f177299d285bbe5d90aab2b56a76f9db49d86afa5a0f601ba9b3502de5f3724f3ec00927151f928f668b362052950a2e8f16baec29875fdad59395e86a1050c368933e3ed5a17d76bd7bded793436ea207885f395ace3fc12126c205b170be392c1645233ef01f9661090706a65f63b4845dc2884a20711a8024ad4af44aeec9db33991dae38d95cdb7132970d0d4dec58b9d46d378", 0xa3, 0x6}, {&(0x7f0000000380)="05f82c760d277896dd8c9891a41aafe24124891a32a238c3c78696d112aa09f3ae5c54b0c08676da5db7f358c72dfaca9a5d90860b4ae363c9a921c47965d339c23408a6d9b31a23aee27822f0a140d8e4ec9475a740113f2b9923b46333110e528e0a513151aad34aee1b5310fcf62c1982349253003d6d53aebbe09cf5918668ee682be93b6a671bbc", 0x8a, 0x3}], 0x2000400, &(0x7f0000000440)={[{@balloc_no_unhash_reloc}, {@nolargeio}, {@grpjquota}], [{@obj_role={'obj_role', 0x3d, '^'}}, {@hash}, {@uid_lt}, {@mask={'mask', 0x3d, 'MAY_EXEC'}}, {@uid_lt={'uid<', 0xee00}}, {@smackfsfloor={'smackfsfloor', 0x3d, ':%#[@'}}, {@obj_user={'obj_user', 0x3d, ',\\*),i'}}, {@uid_eq={'uid', 0x3d, 0xee00}}, {@seclabel}, {@uid_lt={'uid<', 0xee00}}]})

06:19:33 executing program 3:
r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0)
mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800004, 0x12, r0, 0x0)
preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x0, 0x0)
mmap(&(0x7f0000000000/0xa000)=nil, 0xa000, 0x2, 0x2172, 0xffffffffffffffff, 0x0)
syz_mount_image$reiserfs(&(0x7f0000000140), &(0x7f0000000180)='./file0\x00', 0x0, 0x0, &(0x7f0000000300), 0x0, &(0x7f0000000440)={[{@balloc_no_unhash_reloc}], [{@obj_role={'obj_role', 0x3d, '^'}}, {@hash}, {@uid_lt}, {@mask={'mask', 0x3d, 'MAY_EXEC'}}, {@uid_lt={'uid<', 0xee00}}, {@smackfsfloor={'smackfsfloor', 0x3d, ':%#[@'}}, {@obj_user={'obj_user', 0x3d, ',\\*),i'}}, {@uid_eq={'uid', 0x3d, 0xee00}}, {@seclabel}, {@uid_lt={'uid<', 0xee00}}]})

[  376.384152][   T22] Bluetooth: hci3: command 0x0406 tx timeout
[  376.441232][T16884] REISERFS warning (device loop0): super-6502 reiserfs_getopt: unknown mount option "obj_role=^"
[  376.455363][T16887] REISERFS warning (device loop3): super-6502 reiserfs_getopt: unknown mount option "obj_role=^"
[  376.485503][T16891] loop1: detected capacity change from 0 to 64
06:19:34 executing program 1:
r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0)
mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800004, 0x12, r0, 0x0)
preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x0, 0x0)
mmap(&(0x7f0000000000/0xa000)=nil, 0xa000, 0x2, 0x2172, 0xffffffffffffffff, 0x0)
syz_mount_image$reiserfs(0x0, &(0x7f0000000180)='./file0\x00', 0x8000, 0x3, &(0x7f0000000300)=[{&(0x7f0000000540)="21d37ef07e82e237fbe1b40158d20e242c5ea1f9d9edc6b9395250085d6dfa486982e82d4ce1a5e2bc00d29383bae640de", 0x31, 0x7}, {&(0x7f0000000240)="c43f281f483aa6cd83e40e59d53f177299d285bbe5d90aab2b56a76f9db49d86afa5a0f601ba9b3502de5f3724f3ec00927151f928f668b362052950a2e8f16baec29875fdad59395e86a1050c368933e3ed5a17d76bd7bded793436ea207885f395ace3fc12126c205b170be392c1645233ef01f9661090706a65f63b4845dc2884a20711a8024ad4af44aeec9db33991dae38d95cdb7132970d0d4dec58b9d46d378", 0xa3, 0x6}, {&(0x7f0000000380)="05f82c760d277896dd8c9891a41aafe24124891a32a238c3c78696d112aa09f3ae5c54b0c08676da5db7f358c72dfaca9a5d90860b4ae363c9a921c47965d339c23408a6d9b31a23aee27822f0a140d8e4ec9475a740113f2b9923b46333110e528e0a513151aad34aee1b5310fcf62c1982349253003d6d53aebbe09cf5918668ee682be93b6a671bbc", 0x8a, 0x3}], 0x2000400, &(0x7f0000000440)={[{@balloc_no_unhash_reloc}, {@nolargeio}, {@grpjquota}], [{@obj_role={'obj_role', 0x3d, '^'}}, {@hash}, {@uid_lt}, {@mask={'mask', 0x3d, 'MAY_EXEC'}}, {@uid_lt={'uid<', 0xee00}}, {@smackfsfloor={'smackfsfloor', 0x3d, ':%#[@'}}, {@obj_user={'obj_user', 0x3d, ',\\*),i'}}, {@uid_eq={'uid', 0x3d, 0xee00}}, {@seclabel}, {@uid_lt={'uid<', 0xee00}}]})

06:19:34 executing program 3:
r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0)
mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800004, 0x12, r0, 0x0)
preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x0, 0x0)
mmap(&(0x7f0000000000/0xa000)=nil, 0xa000, 0x2, 0x2172, 0xffffffffffffffff, 0x0)
syz_mount_image$reiserfs(&(0x7f0000000140), &(0x7f0000000180)='./file0\x00', 0x0, 0x0, &(0x7f0000000300), 0x0, &(0x7f0000000440)={[{@balloc_no_unhash_reloc}], [{@obj_role={'obj_role', 0x3d, '^'}}, {@hash}, {@uid_lt}, {@mask={'mask', 0x3d, 'MAY_EXEC'}}, {@uid_lt={'uid<', 0xee00}}, {@smackfsfloor={'smackfsfloor', 0x3d, ':%#[@'}}, {@obj_user={'obj_user', 0x3d, ',\\*),i'}}, {@uid_eq={'uid', 0x3d, 0xee00}}, {@seclabel}, {@uid_lt={'uid<', 0xee00}}]})

06:19:34 executing program 0:
r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0)
mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800004, 0x12, 0xffffffffffffffff, 0x0)
preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x9, 0x0)
syz_mount_image$reiserfs(&(0x7f0000000140), &(0x7f0000000180)='./file0\x00', 0x0, 0x0, &(0x7f0000000300), 0x0, &(0x7f0000000440)={[{@balloc_no_unhash_reloc}], [{@obj_role={'obj_role', 0x3d, '^'}}, {@hash}, {@uid_lt}, {@mask={'mask', 0x3d, 'MAY_EXEC'}}, {@uid_lt={'uid<', 0xee00}}, {@smackfsfloor={'smackfsfloor', 0x3d, ':%#[@'}}, {@obj_user={'obj_user', 0x3d, ',\\*),i'}}, {@uid_eq={'uid', 0x3d, 0xee00}}, {@seclabel}, {@uid_lt={'uid<', 0xee00}}]})

[  376.654596][T16898] REISERFS warning (device loop3): super-6502 reiserfs_getopt: unknown mount option "obj_role=^"
[  376.671652][T16901] REISERFS warning (device loop0): super-6502 reiserfs_getopt: unknown mount option "obj_role=^"
[  376.708604][T16907] loop1: detected capacity change from 0 to 64
06:19:34 executing program 3:
r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0)
mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800004, 0x12, r0, 0x0)
preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x0, 0x0)
mmap(&(0x7f0000000000/0xa000)=nil, 0xa000, 0x2, 0x2172, 0xffffffffffffffff, 0x0)
syz_mount_image$reiserfs(&(0x7f0000000140), &(0x7f0000000180)='./file0\x00', 0x0, 0x0, &(0x7f0000000300), 0x0, &(0x7f0000000440)={[{@balloc_no_unhash_reloc}], [{@obj_role={'obj_role', 0x3d, '^'}}, {@hash}, {@uid_lt}, {@mask={'mask', 0x3d, 'MAY_EXEC'}}, {@uid_lt={'uid<', 0xee00}}, {@smackfsfloor={'smackfsfloor', 0x3d, ':%#[@'}}, {@obj_user={'obj_user', 0x3d, ',\\*),i'}}, {@uid_eq={'uid', 0x3d, 0xee00}}, {@seclabel}, {@uid_lt={'uid<', 0xee00}}]})

[  376.867863][T16914] REISERFS warning (device loop3): super-6502 reiserfs_getopt: unknown mount option "obj_role=^"
06:19:34 executing program 2:
r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0)
mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800004, 0x12, r0, 0x0)
preadv(r0, 0x0, 0x0, 0x9, 0x0)
r1 = syz_open_dev$tty1(0xc, 0x4, 0x1)
write$binfmt_elf64(r1, &(0x7f0000000380)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x80, 0x1, 0x9, 0x1, 0x2, 0x3e, 0x7ff, 0x1f2, 0x40, 0x1f4, 0xbfa, 0x3, 0x38, 0x1, 0x5, 0x4, 0x4}, [{0x5, 0x9, 0x6, 0x101, 0x6, 0x4, 0x9, 0x6}, {0x5, 0x3, 0x5e61, 0x80000000, 0xcc3, 0x9, 0x7, 0x8}], "d1660f10e0ac4a6edbf3aa53803c8f57ef2a12069e82553332d2b96d67f2dbc5b04959dad57c303d876233684f5e9ad402a193da791e11122f2cccbf10d6d499f5e16385d09f63891a965d80bcb68b551fabffb4bf0b5c372b4d69cdefac988201a40429a8d0dc699820193afcab08070fde89c22e16b43dde5e37d9a3df0cd352e8667f163774d9dc3c79571e5100046281", ['\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00']}, 0x842)

06:19:34 executing program 1:
r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0)
mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800004, 0x12, r0, 0x0)
preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x0, 0x0)
mmap(&(0x7f0000000000/0xa000)=nil, 0xa000, 0x2, 0x2172, 0xffffffffffffffff, 0x0)
syz_mount_image$reiserfs(0x0, &(0x7f0000000180)='./file0\x00', 0x8000, 0x3, &(0x7f0000000300)=[{&(0x7f0000000540)="21d37ef07e82e237fbe1b40158d20e242c5ea1f9d9edc6b9395250085d6dfa486982e82d4ce1a5e2bc00d29383bae640de", 0x31, 0x7}, {&(0x7f0000000240)="c43f281f483aa6cd83e40e59d53f177299d285bbe5d90aab2b56a76f9db49d86afa5a0f601ba9b3502de5f3724f3ec00927151f928f668b362052950a2e8f16baec29875fdad59395e86a1050c368933e3ed5a17d76bd7bded793436ea207885f395ace3fc12126c205b170be392c1645233ef01f9661090706a65f63b4845dc2884a20711a8024ad4af44aeec9db33991dae38d95cdb7132970d0d4dec58b9d46d378", 0xa3, 0x6}, {&(0x7f0000000380)="05f82c760d277896dd8c9891a41aafe24124891a32a238c3c78696d112aa09f3ae5c54b0c08676da5db7f358c72dfaca9a5d90860b4ae363c9a921c47965d339c23408a6d9b31a23aee27822f0a140d8e4ec9475a740113f2b9923b46333110e528e0a513151aad34aee1b5310fcf62c1982349253003d6d53aebbe09cf5918668ee682be93b6a671bbc", 0x8a, 0x3}], 0x2000400, &(0x7f0000000440)={[{@balloc_no_unhash_reloc}, {@nolargeio}, {@grpjquota}], [{@obj_role={'obj_role', 0x3d, '^'}}, {@hash}, {@uid_lt}, {@mask={'mask', 0x3d, 'MAY_EXEC'}}, {@uid_lt={'uid<', 0xee00}}, {@smackfsfloor={'smackfsfloor', 0x3d, ':%#[@'}}, {@obj_user={'obj_user', 0x3d, ',\\*),i'}}, {@uid_eq={'uid', 0x3d, 0xee00}}, {@seclabel}, {@uid_lt={'uid<', 0xee00}}]})

06:19:34 executing program 0:
r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0)
mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800004, 0x12, 0xffffffffffffffff, 0x0)
preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x9, 0x0)
syz_mount_image$reiserfs(&(0x7f0000000140), &(0x7f0000000180)='./file0\x00', 0x0, 0x0, &(0x7f0000000300), 0x0, &(0x7f0000000440)={[{@balloc_no_unhash_reloc}], [{@obj_role={'obj_role', 0x3d, '^'}}, {@hash}, {@uid_lt}, {@mask={'mask', 0x3d, 'MAY_EXEC'}}, {@uid_lt={'uid<', 0xee00}}, {@smackfsfloor={'smackfsfloor', 0x3d, ':%#[@'}}, {@obj_user={'obj_user', 0x3d, ',\\*),i'}}, {@uid_eq={'uid', 0x3d, 0xee00}}, {@seclabel}, {@uid_lt={'uid<', 0xee00}}]})

06:19:34 executing program 3:
r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0)
mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800004, 0x12, r0, 0x0)
preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x9, 0x0)
mmap(&(0x7f0000000000/0xa000)=nil, 0xa000, 0x0, 0x2172, 0xffffffffffffffff, 0x0)
syz_mount_image$reiserfs(&(0x7f0000000140), &(0x7f0000000180)='./file0\x00', 0x0, 0x0, &(0x7f0000000300), 0x0, &(0x7f0000000440)={[{@balloc_no_unhash_reloc}], [{@obj_role={'obj_role', 0x3d, '^'}}, {@hash}, {@uid_lt}, {@mask={'mask', 0x3d, 'MAY_EXEC'}}, {@uid_lt={'uid<', 0xee00}}, {@smackfsfloor={'smackfsfloor', 0x3d, ':%#[@'}}, {@obj_user={'obj_user', 0x3d, ',\\*),i'}}, {@uid_eq={'uid', 0x3d, 0xee00}}, {@seclabel}, {@uid_lt={'uid<', 0xee00}}]})

[  377.347105][T16925] loop1: detected capacity change from 0 to 64
[  377.402772][T16930] REISERFS warning (device loop0): super-6502 reiserfs_getopt: unknown mount option "obj_role=^"
06:19:35 executing program 1:
r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0)
mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800004, 0x12, r0, 0x0)
preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x9, 0x0)
mmap(&(0x7f0000000000/0xa000)=nil, 0xa000, 0x0, 0x2172, 0xffffffffffffffff, 0x0)
syz_mount_image$reiserfs(0x0, &(0x7f0000000180)='./file0\x00', 0x8000, 0x3, &(0x7f0000000300)=[{&(0x7f0000000540)="21d37ef07e82e237fbe1b40158d20e242c5ea1f9d9edc6b9395250085d6dfa486982e82d4ce1a5e2bc00d29383bae640de", 0x31, 0x7}, {&(0x7f0000000240)="c43f281f483aa6cd83e40e59d53f177299d285bbe5d90aab2b56a76f9db49d86afa5a0f601ba9b3502de5f3724f3ec00927151f928f668b362052950a2e8f16baec29875fdad59395e86a1050c368933e3ed5a17d76bd7bded793436ea207885f395ace3fc12126c205b170be392c1645233ef01f9661090706a65f63b4845dc2884a20711a8024ad4af44aeec9db33991dae38d95cdb7132970d0d4dec58b9d46d378", 0xa3, 0x6}, {&(0x7f0000000380)="05f82c760d277896dd8c9891a41aafe24124891a32a238c3c78696d112aa09f3ae5c54b0c08676da5db7f358c72dfaca9a5d90860b4ae363c9a921c47965d339c23408a6d9b31a23aee27822f0a140d8e4ec9475a740113f2b9923b46333110e528e0a513151aad34aee1b5310fcf62c1982349253003d6d53aebbe09cf5918668ee682be93b6a671bbc", 0x8a, 0x3}], 0x2000400, &(0x7f0000000440)={[{@balloc_no_unhash_reloc}, {@nolargeio}, {@grpjquota}], [{@obj_role={'obj_role', 0x3d, '^'}}, {@hash}, {@uid_lt}, {@mask={'mask', 0x3d, 'MAY_EXEC'}}, {@uid_lt={'uid<', 0xee00}}, {@smackfsfloor={'smackfsfloor', 0x3d, ':%#[@'}}, {@obj_user={'obj_user', 0x3d, ',\\*),i'}}, {@uid_eq={'uid', 0x3d, 0xee00}}, {@seclabel}, {@uid_lt={'uid<', 0xee00}}]})

06:19:35 executing program 3:
r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0)
mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800004, 0x12, r0, 0x0)
preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x9, 0x0)
mmap(&(0x7f0000000000/0xa000)=nil, 0xa000, 0x0, 0x2172, 0xffffffffffffffff, 0x0)
syz_mount_image$reiserfs(&(0x7f0000000140), &(0x7f0000000180)='./file0\x00', 0x0, 0x0, &(0x7f0000000300), 0x0, &(0x7f0000000440)={[{@balloc_no_unhash_reloc}], [{@obj_role={'obj_role', 0x3d, '^'}}, {@hash}, {@uid_lt}, {@mask={'mask', 0x3d, 'MAY_EXEC'}}, {@uid_lt={'uid<', 0xee00}}, {@smackfsfloor={'smackfsfloor', 0x3d, ':%#[@'}}, {@obj_user={'obj_user', 0x3d, ',\\*),i'}}, {@uid_eq={'uid', 0x3d, 0xee00}}, {@seclabel}, {@uid_lt={'uid<', 0xee00}}]})

06:19:35 executing program 1:
r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0)
mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800004, 0x12, r0, 0x0)
preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x9, 0x0)
mmap(&(0x7f0000000000/0xa000)=nil, 0xa000, 0x0, 0x2172, 0xffffffffffffffff, 0x0)
syz_mount_image$reiserfs(0x0, &(0x7f0000000180)='./file0\x00', 0x8000, 0x3, &(0x7f0000000300)=[{&(0x7f0000000540)="21d37ef07e82e237fbe1b40158d20e242c5ea1f9d9edc6b9395250085d6dfa486982e82d4ce1a5e2bc00d29383bae640de", 0x31, 0x7}, {&(0x7f0000000240)="c43f281f483aa6cd83e40e59d53f177299d285bbe5d90aab2b56a76f9db49d86afa5a0f601ba9b3502de5f3724f3ec00927151f928f668b362052950a2e8f16baec29875fdad59395e86a1050c368933e3ed5a17d76bd7bded793436ea207885f395ace3fc12126c205b170be392c1645233ef01f9661090706a65f63b4845dc2884a20711a8024ad4af44aeec9db33991dae38d95cdb7132970d0d4dec58b9d46d378", 0xa3, 0x6}, {&(0x7f0000000380)="05f82c760d277896dd8c9891a41aafe24124891a32a238c3c78696d112aa09f3ae5c54b0c08676da5db7f358c72dfaca9a5d90860b4ae363c9a921c47965d339c23408a6d9b31a23aee27822f0a140d8e4ec9475a740113f2b9923b46333110e528e0a513151aad34aee1b5310fcf62c1982349253003d6d53aebbe09cf5918668ee682be93b6a671bbc", 0x8a, 0x3}], 0x2000400, &(0x7f0000000440)={[{@balloc_no_unhash_reloc}, {@nolargeio}, {@grpjquota}], [{@obj_role={'obj_role', 0x3d, '^'}}, {@hash}, {@uid_lt}, {@mask={'mask', 0x3d, 'MAY_EXEC'}}, {@uid_lt={'uid<', 0xee00}}, {@smackfsfloor={'smackfsfloor', 0x3d, ':%#[@'}}, {@obj_user={'obj_user', 0x3d, ',\\*),i'}}, {@uid_eq={'uid', 0x3d, 0xee00}}, {@seclabel}, {@uid_lt={'uid<', 0xee00}}]})

06:19:35 executing program 0:
r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0)
mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800004, 0x12, 0xffffffffffffffff, 0x0)
preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x9, 0x0)
syz_mount_image$reiserfs(&(0x7f0000000140), &(0x7f0000000180)='./file0\x00', 0x0, 0x0, &(0x7f0000000300), 0x0, &(0x7f0000000440)={[{@balloc_no_unhash_reloc}], [{@obj_role={'obj_role', 0x3d, '^'}}, {@hash}, {@uid_lt}, {@mask={'mask', 0x3d, 'MAY_EXEC'}}, {@uid_lt={'uid<', 0xee00}}, {@smackfsfloor={'smackfsfloor', 0x3d, ':%#[@'}}, {@obj_user={'obj_user', 0x3d, ',\\*),i'}}, {@uid_eq={'uid', 0x3d, 0xee00}}, {@seclabel}, {@uid_lt={'uid<', 0xee00}}]})

[  377.658357][T16951] REISERFS warning (device loop0): super-6502 reiserfs_getopt: unknown mount option "obj_role=^"
06:19:35 executing program 1:
r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0)
mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800004, 0x12, r0, 0x0)
preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x9, 0x0)
mmap(&(0x7f0000000000/0xa000)=nil, 0xa000, 0x0, 0x2172, 0xffffffffffffffff, 0x0)
syz_mount_image$reiserfs(0x0, &(0x7f0000000180)='./file0\x00', 0x8000, 0x3, &(0x7f0000000300)=[{&(0x7f0000000540)="21d37ef07e82e237fbe1b40158d20e242c5ea1f9d9edc6b9395250085d6dfa486982e82d4ce1a5e2bc00d29383bae640de", 0x31, 0x7}, {&(0x7f0000000240)="c43f281f483aa6cd83e40e59d53f177299d285bbe5d90aab2b56a76f9db49d86afa5a0f601ba9b3502de5f3724f3ec00927151f928f668b362052950a2e8f16baec29875fdad59395e86a1050c368933e3ed5a17d76bd7bded793436ea207885f395ace3fc12126c205b170be392c1645233ef01f9661090706a65f63b4845dc2884a20711a8024ad4af44aeec9db33991dae38d95cdb7132970d0d4dec58b9d46d378", 0xa3, 0x6}, {&(0x7f0000000380)="05f82c760d277896dd8c9891a41aafe24124891a32a238c3c78696d112aa09f3ae5c54b0c08676da5db7f358c72dfaca9a5d90860b4ae363c9a921c47965d339c23408a6d9b31a23aee27822f0a140d8e4ec9475a740113f2b9923b46333110e528e0a513151aad34aee1b5310fcf62c1982349253003d6d53aebbe09cf5918668ee682be93b6a671bbc", 0x8a, 0x3}], 0x2000400, &(0x7f0000000440)={[{@balloc_no_unhash_reloc}, {@nolargeio}, {@grpjquota}], [{@obj_role={'obj_role', 0x3d, '^'}}, {@hash}, {@uid_lt}, {@mask={'mask', 0x3d, 'MAY_EXEC'}}, {@uid_lt={'uid<', 0xee00}}, {@smackfsfloor={'smackfsfloor', 0x3d, ':%#[@'}}, {@obj_user={'obj_user', 0x3d, ',\\*),i'}}, {@uid_eq={'uid', 0x3d, 0xee00}}, {@seclabel}, {@uid_lt={'uid<', 0xee00}}]})

06:19:35 executing program 3:
r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0)
mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800004, 0x12, r0, 0x0)
preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x9, 0x0)
mmap(&(0x7f0000000000/0xa000)=nil, 0xa000, 0x0, 0x2172, 0xffffffffffffffff, 0x0)
syz_mount_image$reiserfs(&(0x7f0000000140), &(0x7f0000000180)='./file0\x00', 0x0, 0x0, &(0x7f0000000300), 0x0, &(0x7f0000000440)={[{@balloc_no_unhash_reloc}], [{@obj_role={'obj_role', 0x3d, '^'}}, {@hash}, {@uid_lt}, {@mask={'mask', 0x3d, 'MAY_EXEC'}}, {@uid_lt={'uid<', 0xee00}}, {@smackfsfloor={'smackfsfloor', 0x3d, ':%#[@'}}, {@obj_user={'obj_user', 0x3d, ',\\*),i'}}, {@uid_eq={'uid', 0x3d, 0xee00}}, {@seclabel}, {@uid_lt={'uid<', 0xee00}}]})

06:19:35 executing program 2:
r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0)
mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800004, 0x12, r0, 0x0)
preadv(r0, 0x0, 0x0, 0x9, 0x0)
r1 = syz_open_dev$tty1(0xc, 0x4, 0x1)
write$binfmt_elf64(r1, &(0x7f0000000380)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x80, 0x1, 0x9, 0x1, 0x2, 0x3e, 0x7ff, 0x1f2, 0x40, 0x1f4, 0xbfa, 0x3, 0x38, 0x1, 0x5, 0x4, 0x4}, [{0x5, 0x9, 0x6, 0x101, 0x6, 0x4, 0x9, 0x6}, {0x5, 0x3, 0x5e61, 0x80000000, 0xcc3, 0x9, 0x7, 0x8}], "d1660f10e0ac4a6edbf3aa53803c8f57ef2a12069e82553332d2b96d67f2dbc5b04959dad57c303d876233684f5e9ad402a193da791e11122f2cccbf10d6d499f5e16385d09f63891a965d80bcb68b551fabffb4bf0b5c372b4d69cdefac988201a40429a8d0dc699820193afcab08070fde89c22e16b43dde5e37d9a3df0cd352e8667f163774d9dc3c79571e5100046281", ['\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00']}, 0x842)

06:19:35 executing program 0:
r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0)
mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800004, 0x12, r0, 0x0)
preadv(0xffffffffffffffff, &(0x7f00000001c0)=[{0x0}], 0x1, 0x9, 0x0)
syz_mount_image$reiserfs(&(0x7f0000000140), &(0x7f0000000180)='./file0\x00', 0x0, 0x0, &(0x7f0000000300), 0x0, &(0x7f0000000440)={[{@balloc_no_unhash_reloc}], [{@obj_role={'obj_role', 0x3d, '^'}}, {@hash}, {@uid_lt}, {@mask={'mask', 0x3d, 'MAY_EXEC'}}, {@uid_lt={'uid<', 0xee00}}, {@smackfsfloor={'smackfsfloor', 0x3d, ':%#[@'}}, {@obj_user={'obj_user', 0x3d, ',\\*),i'}}, {@uid_eq={'uid', 0x3d, 0xee00}}, {@seclabel}, {@uid_lt={'uid<', 0xee00}}]})

06:19:35 executing program 3:
r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0)
mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800004, 0x12, r0, 0x0)
preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x9, 0x0)
mmap(&(0x7f0000000000/0xa000)=nil, 0xa000, 0x2, 0x10, 0xffffffffffffffff, 0x0)
syz_mount_image$reiserfs(&(0x7f0000000140), &(0x7f0000000180)='./file0\x00', 0x0, 0x0, &(0x7f0000000300), 0x0, &(0x7f0000000440)={[{@balloc_no_unhash_reloc}], [{@obj_role={'obj_role', 0x3d, '^'}}, {@hash}, {@uid_lt}, {@mask={'mask', 0x3d, 'MAY_EXEC'}}, {@uid_lt={'uid<', 0xee00}}, {@smackfsfloor={'smackfsfloor', 0x3d, ':%#[@'}}, {@obj_user={'obj_user', 0x3d, ',\\*),i'}}, {@uid_eq={'uid', 0x3d, 0xee00}}, {@seclabel}, {@uid_lt={'uid<', 0xee00}}]})

06:19:35 executing program 1:
r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0)
mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800004, 0x12, r0, 0x0)
preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x9, 0x0)
mmap(&(0x7f0000000000/0xa000)=nil, 0xa000, 0x2, 0x10, 0xffffffffffffffff, 0x0)
syz_mount_image$reiserfs(0x0, &(0x7f0000000180)='./file0\x00', 0x8000, 0x3, &(0x7f0000000300)=[{&(0x7f0000000540)="21d37ef07e82e237fbe1b40158d20e242c5ea1f9d9edc6b9395250085d6dfa486982e82d4ce1a5e2bc00d29383bae640de", 0x31, 0x7}, {&(0x7f0000000240)="c43f281f483aa6cd83e40e59d53f177299d285bbe5d90aab2b56a76f9db49d86afa5a0f601ba9b3502de5f3724f3ec00927151f928f668b362052950a2e8f16baec29875fdad59395e86a1050c368933e3ed5a17d76bd7bded793436ea207885f395ace3fc12126c205b170be392c1645233ef01f9661090706a65f63b4845dc2884a20711a8024ad4af44aeec9db33991dae38d95cdb7132970d0d4dec58b9d46d378", 0xa3, 0x6}, {&(0x7f0000000380)="05f82c760d277896dd8c9891a41aafe24124891a32a238c3c78696d112aa09f3ae5c54b0c08676da5db7f358c72dfaca9a5d90860b4ae363c9a921c47965d339c23408a6d9b31a23aee27822f0a140d8e4ec9475a740113f2b9923b46333110e528e0a513151aad34aee1b5310fcf62c1982349253003d6d53aebbe09cf5918668ee682be93b6a671bbc", 0x8a, 0x3}], 0x2000400, &(0x7f0000000440)={[{@balloc_no_unhash_reloc}, {@nolargeio}, {@grpjquota}], [{@obj_role={'obj_role', 0x3d, '^'}}, {@hash}, {@uid_lt}, {@mask={'mask', 0x3d, 'MAY_EXEC'}}, {@uid_lt={'uid<', 0xee00}}, {@smackfsfloor={'smackfsfloor', 0x3d, ':%#[@'}}, {@obj_user={'obj_user', 0x3d, ',\\*),i'}}, {@uid_eq={'uid', 0x3d, 0xee00}}, {@seclabel}, {@uid_lt={'uid<', 0xee00}}]})

06:19:36 executing program 0:
r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0)
mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800004, 0x12, r0, 0x0)
preadv(0xffffffffffffffff, &(0x7f00000001c0)=[{0x0}], 0x1, 0x9, 0x0)
syz_mount_image$reiserfs(&(0x7f0000000140), &(0x7f0000000180)='./file0\x00', 0x0, 0x0, &(0x7f0000000300), 0x0, &(0x7f0000000440)={[{@balloc_no_unhash_reloc}], [{@obj_role={'obj_role', 0x3d, '^'}}, {@hash}, {@uid_lt}, {@mask={'mask', 0x3d, 'MAY_EXEC'}}, {@uid_lt={'uid<', 0xee00}}, {@smackfsfloor={'smackfsfloor', 0x3d, ':%#[@'}}, {@obj_user={'obj_user', 0x3d, ',\\*),i'}}, {@uid_eq={'uid', 0x3d, 0xee00}}, {@seclabel}, {@uid_lt={'uid<', 0xee00}}]})

06:19:36 executing program 1:
r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0)
mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800004, 0x12, r0, 0x0)
preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x9, 0x0)
mmap(&(0x7f0000000000/0xa000)=nil, 0xa000, 0x2, 0x10, 0xffffffffffffffff, 0x0)
syz_mount_image$reiserfs(0x0, &(0x7f0000000180)='./file0\x00', 0x8000, 0x3, &(0x7f0000000300)=[{&(0x7f0000000540)="21d37ef07e82e237fbe1b40158d20e242c5ea1f9d9edc6b9395250085d6dfa486982e82d4ce1a5e2bc00d29383bae640de", 0x31, 0x7}, {&(0x7f0000000240)="c43f281f483aa6cd83e40e59d53f177299d285bbe5d90aab2b56a76f9db49d86afa5a0f601ba9b3502de5f3724f3ec00927151f928f668b362052950a2e8f16baec29875fdad59395e86a1050c368933e3ed5a17d76bd7bded793436ea207885f395ace3fc12126c205b170be392c1645233ef01f9661090706a65f63b4845dc2884a20711a8024ad4af44aeec9db33991dae38d95cdb7132970d0d4dec58b9d46d378", 0xa3, 0x6}, {&(0x7f0000000380)="05f82c760d277896dd8c9891a41aafe24124891a32a238c3c78696d112aa09f3ae5c54b0c08676da5db7f358c72dfaca9a5d90860b4ae363c9a921c47965d339c23408a6d9b31a23aee27822f0a140d8e4ec9475a740113f2b9923b46333110e528e0a513151aad34aee1b5310fcf62c1982349253003d6d53aebbe09cf5918668ee682be93b6a671bbc", 0x8a, 0x3}], 0x2000400, &(0x7f0000000440)={[{@balloc_no_unhash_reloc}, {@nolargeio}, {@grpjquota}], [{@obj_role={'obj_role', 0x3d, '^'}}, {@hash}, {@uid_lt}, {@mask={'mask', 0x3d, 'MAY_EXEC'}}, {@uid_lt={'uid<', 0xee00}}, {@smackfsfloor={'smackfsfloor', 0x3d, ':%#[@'}}, {@obj_user={'obj_user', 0x3d, ',\\*),i'}}, {@uid_eq={'uid', 0x3d, 0xee00}}, {@seclabel}, {@uid_lt={'uid<', 0xee00}}]})

06:19:36 executing program 3:
r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0)
mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800004, 0x12, r0, 0x0)
preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x9, 0x0)
mmap(&(0x7f0000000000/0xa000)=nil, 0xa000, 0x2, 0x10, 0xffffffffffffffff, 0x0)
syz_mount_image$reiserfs(&(0x7f0000000140), &(0x7f0000000180)='./file0\x00', 0x0, 0x0, &(0x7f0000000300), 0x0, &(0x7f0000000440)={[{@balloc_no_unhash_reloc}], [{@obj_role={'obj_role', 0x3d, '^'}}, {@hash}, {@uid_lt}, {@mask={'mask', 0x3d, 'MAY_EXEC'}}, {@uid_lt={'uid<', 0xee00}}, {@smackfsfloor={'smackfsfloor', 0x3d, ':%#[@'}}, {@obj_user={'obj_user', 0x3d, ',\\*),i'}}, {@uid_eq={'uid', 0x3d, 0xee00}}, {@seclabel}, {@uid_lt={'uid<', 0xee00}}]})

06:19:36 executing program 1:
r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0)
mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800004, 0x12, r0, 0x0)
preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x9, 0x0)
mmap(&(0x7f0000000000/0xa000)=nil, 0xa000, 0x2, 0x10, 0xffffffffffffffff, 0x0)
syz_mount_image$reiserfs(0x0, &(0x7f0000000180)='./file0\x00', 0x8000, 0x3, &(0x7f0000000300)=[{&(0x7f0000000540)="21d37ef07e82e237fbe1b40158d20e242c5ea1f9d9edc6b9395250085d6dfa486982e82d4ce1a5e2bc00d29383bae640de", 0x31, 0x7}, {&(0x7f0000000240)="c43f281f483aa6cd83e40e59d53f177299d285bbe5d90aab2b56a76f9db49d86afa5a0f601ba9b3502de5f3724f3ec00927151f928f668b362052950a2e8f16baec29875fdad59395e86a1050c368933e3ed5a17d76bd7bded793436ea207885f395ace3fc12126c205b170be392c1645233ef01f9661090706a65f63b4845dc2884a20711a8024ad4af44aeec9db33991dae38d95cdb7132970d0d4dec58b9d46d378", 0xa3, 0x6}, {&(0x7f0000000380)="05f82c760d277896dd8c9891a41aafe24124891a32a238c3c78696d112aa09f3ae5c54b0c08676da5db7f358c72dfaca9a5d90860b4ae363c9a921c47965d339c23408a6d9b31a23aee27822f0a140d8e4ec9475a740113f2b9923b46333110e528e0a513151aad34aee1b5310fcf62c1982349253003d6d53aebbe09cf5918668ee682be93b6a671bbc", 0x8a, 0x3}], 0x2000400, &(0x7f0000000440)={[{@balloc_no_unhash_reloc}, {@nolargeio}, {@grpjquota}], [{@obj_role={'obj_role', 0x3d, '^'}}, {@hash}, {@uid_lt}, {@mask={'mask', 0x3d, 'MAY_EXEC'}}, {@uid_lt={'uid<', 0xee00}}, {@smackfsfloor={'smackfsfloor', 0x3d, ':%#[@'}}, {@obj_user={'obj_user', 0x3d, ',\\*),i'}}, {@uid_eq={'uid', 0x3d, 0xee00}}, {@seclabel}, {@uid_lt={'uid<', 0xee00}}]})

06:19:36 executing program 0:
r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0)
mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800004, 0x12, r0, 0x0)
preadv(0xffffffffffffffff, &(0x7f00000001c0)=[{0x0}], 0x1, 0x9, 0x0)
syz_mount_image$reiserfs(&(0x7f0000000140), &(0x7f0000000180)='./file0\x00', 0x0, 0x0, &(0x7f0000000300), 0x0, &(0x7f0000000440)={[{@balloc_no_unhash_reloc}], [{@obj_role={'obj_role', 0x3d, '^'}}, {@hash}, {@uid_lt}, {@mask={'mask', 0x3d, 'MAY_EXEC'}}, {@uid_lt={'uid<', 0xee00}}, {@smackfsfloor={'smackfsfloor', 0x3d, ':%#[@'}}, {@obj_user={'obj_user', 0x3d, ',\\*),i'}}, {@uid_eq={'uid', 0x3d, 0xee00}}, {@seclabel}, {@uid_lt={'uid<', 0xee00}}]})

06:19:36 executing program 1:
r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0)
mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800004, 0x12, r0, 0x0)
preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x9, 0x0)
mmap(&(0x7f0000000000/0xa000)=nil, 0xa000, 0x2, 0x2172, 0xffffffffffffffff, 0x0)
syz_mount_image$reiserfs(0x0, 0x0, 0x8000, 0x3, &(0x7f0000000300)=[{&(0x7f0000000540)="21d37ef07e82e237fbe1b40158d20e242c5ea1f9d9edc6b9395250085d6dfa486982e82d4ce1a5e2bc00d29383bae640de", 0x31, 0x7}, {&(0x7f0000000240)="c43f281f483aa6cd83e40e59d53f177299d285bbe5d90aab2b56a76f9db49d86afa5a0f601ba9b3502de5f3724f3ec00927151f928f668b362052950a2e8f16baec29875fdad59395e86a1050c368933e3ed5a17d76bd7bded793436ea207885f395ace3fc12126c205b170be392c1645233ef01f9661090706a65f63b4845dc2884a20711a8024ad4af44aeec9db33991dae38d95cdb7132970d0d4dec58b9d46d378", 0xa3, 0x6}, {&(0x7f0000000380)="05f82c760d277896dd8c9891a41aafe24124891a32a238c3c78696d112aa09f3ae5c54b0c08676da5db7f358c72dfaca9a5d90860b4ae363c9a921c47965d339c23408a6d9b31a23aee27822f0a140d8e4ec9475a740113f2b9923b46333110e528e0a513151aad34aee1b5310fcf62c1982349253003d6d53aebbe09cf5918668ee682be93b6a671bbc", 0x8a, 0x3}], 0x2000400, &(0x7f0000000440)={[{@balloc_no_unhash_reloc}, {@nolargeio}, {@grpjquota}], [{@obj_role={'obj_role', 0x3d, '^'}}, {@hash}, {@uid_lt}, {@mask={'mask', 0x3d, 'MAY_EXEC'}}, {@uid_lt={'uid<', 0xee00}}, {@smackfsfloor={'smackfsfloor', 0x3d, ':%#[@'}}, {@obj_user={'obj_user', 0x3d, ',\\*),i'}}, {@uid_eq={'uid', 0x3d, 0xee00}}, {@seclabel}, {@uid_lt={'uid<', 0xee00}}]})

06:19:36 executing program 2:
r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0)
mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800004, 0x12, r0, 0x0)
preadv(r0, &(0x7f00000001c0), 0x0, 0x9, 0x0)
r1 = syz_open_dev$tty1(0xc, 0x4, 0x1)
write$binfmt_elf64(r1, &(0x7f0000000380)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x80, 0x1, 0x9, 0x1, 0x2, 0x3e, 0x7ff, 0x1f2, 0x40, 0x1f4, 0xbfa, 0x3, 0x38, 0x1, 0x5, 0x4, 0x4}, [{0x5, 0x9, 0x6, 0x101, 0x6, 0x4, 0x9, 0x6}, {0x5, 0x3, 0x5e61, 0x80000000, 0xcc3, 0x9, 0x7, 0x8}], "d1660f10e0ac4a6edbf3aa53803c8f57ef2a12069e82553332d2b96d67f2dbc5b04959dad57c303d876233684f5e9ad402a193da791e11122f2cccbf10d6d499f5e16385d09f63891a965d80bcb68b551fabffb4bf0b5c372b4d69cdefac988201a40429a8d0dc699820193afcab08070fde89c22e16b43dde5e37d9a3df0cd352e8667f163774d9dc3c79571e5100046281", ['\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00']}, 0x842)

06:19:36 executing program 3:
r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0)
mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800004, 0x12, r0, 0x0)
preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x9, 0x0)
mmap(&(0x7f0000000000/0xa000)=nil, 0xa000, 0x2, 0x10, 0xffffffffffffffff, 0x0)
syz_mount_image$reiserfs(&(0x7f0000000140), &(0x7f0000000180)='./file0\x00', 0x0, 0x0, &(0x7f0000000300), 0x0, &(0x7f0000000440)={[{@balloc_no_unhash_reloc}], [{@obj_role={'obj_role', 0x3d, '^'}}, {@hash}, {@uid_lt}, {@mask={'mask', 0x3d, 'MAY_EXEC'}}, {@uid_lt={'uid<', 0xee00}}, {@smackfsfloor={'smackfsfloor', 0x3d, ':%#[@'}}, {@obj_user={'obj_user', 0x3d, ',\\*),i'}}, {@uid_eq={'uid', 0x3d, 0xee00}}, {@seclabel}, {@uid_lt={'uid<', 0xee00}}]})

[  379.182911][T17010] loop1: detected capacity change from 0 to 64
06:19:36 executing program 3:
r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0)
mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800004, 0x12, r0, 0x0)
preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x9, 0x0)
mmap(&(0x7f0000000000/0xa000)=nil, 0xa000, 0x2, 0x2172, 0xffffffffffffffff, 0x0)
syz_mount_image$reiserfs(0x0, &(0x7f0000000180)='./file0\x00', 0x0, 0x0, &(0x7f0000000300), 0x0, &(0x7f0000000440)={[{@balloc_no_unhash_reloc}], [{@obj_role={'obj_role', 0x3d, '^'}}, {@hash}, {@uid_lt}, {@mask={'mask', 0x3d, 'MAY_EXEC'}}, {@uid_lt={'uid<', 0xee00}}, {@smackfsfloor={'smackfsfloor', 0x3d, ':%#[@'}}, {@obj_user={'obj_user', 0x3d, ',\\*),i'}}, {@uid_eq={'uid', 0x3d, 0xee00}}, {@seclabel}, {@uid_lt={'uid<', 0xee00}}]})

06:19:36 executing program 1:
r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0)
mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800004, 0x12, r0, 0x0)
preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x9, 0x0)
mmap(&(0x7f0000000000/0xa000)=nil, 0xa000, 0x2, 0x2172, 0xffffffffffffffff, 0x0)
syz_mount_image$reiserfs(0x0, 0x0, 0x8000, 0x3, &(0x7f0000000300)=[{&(0x7f0000000540)="21d37ef07e82e237fbe1b40158d20e242c5ea1f9d9edc6b9395250085d6dfa486982e82d4ce1a5e2bc00d29383bae640de", 0x31, 0x7}, {&(0x7f0000000240)="c43f281f483aa6cd83e40e59d53f177299d285bbe5d90aab2b56a76f9db49d86afa5a0f601ba9b3502de5f3724f3ec00927151f928f668b362052950a2e8f16baec29875fdad59395e86a1050c368933e3ed5a17d76bd7bded793436ea207885f395ace3fc12126c205b170be392c1645233ef01f9661090706a65f63b4845dc2884a20711a8024ad4af44aeec9db33991dae38d95cdb7132970d0d4dec58b9d46d378", 0xa3, 0x6}, {&(0x7f0000000380)="05f82c760d277896dd8c9891a41aafe24124891a32a238c3c78696d112aa09f3ae5c54b0c08676da5db7f358c72dfaca9a5d90860b4ae363c9a921c47965d339c23408a6d9b31a23aee27822f0a140d8e4ec9475a740113f2b9923b46333110e528e0a513151aad34aee1b5310fcf62c1982349253003d6d53aebbe09cf5918668ee682be93b6a671bbc", 0x8a, 0x3}], 0x2000400, &(0x7f0000000440)={[{@balloc_no_unhash_reloc}, {@nolargeio}, {@grpjquota}], [{@obj_role={'obj_role', 0x3d, '^'}}, {@hash}, {@uid_lt}, {@mask={'mask', 0x3d, 'MAY_EXEC'}}, {@uid_lt={'uid<', 0xee00}}, {@smackfsfloor={'smackfsfloor', 0x3d, ':%#[@'}}, {@obj_user={'obj_user', 0x3d, ',\\*),i'}}, {@uid_eq={'uid', 0x3d, 0xee00}}, {@seclabel}, {@uid_lt={'uid<', 0xee00}}]})

06:19:36 executing program 0:
r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0)
mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800004, 0x12, r0, 0x0)
preadv(r0, 0x0, 0x0, 0x9, 0x0)
syz_mount_image$reiserfs(&(0x7f0000000140), &(0x7f0000000180)='./file0\x00', 0x0, 0x0, &(0x7f0000000300), 0x0, &(0x7f0000000440)={[{@balloc_no_unhash_reloc}], [{@obj_role={'obj_role', 0x3d, '^'}}, {@hash}, {@uid_lt}, {@mask={'mask', 0x3d, 'MAY_EXEC'}}, {@uid_lt={'uid<', 0xee00}}, {@smackfsfloor={'smackfsfloor', 0x3d, ':%#[@'}}, {@obj_user={'obj_user', 0x3d, ',\\*),i'}}, {@uid_eq={'uid', 0x3d, 0xee00}}, {@seclabel}, {@uid_lt={'uid<', 0xee00}}]})

[  379.374871][T17030] loop1: detected capacity change from 0 to 64
06:19:37 executing program 3:
r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0)
mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800004, 0x12, r0, 0x0)
preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x9, 0x0)
mmap(&(0x7f0000000000/0xa000)=nil, 0xa000, 0x2, 0x2172, 0xffffffffffffffff, 0x0)
syz_mount_image$reiserfs(0x0, &(0x7f0000000180)='./file0\x00', 0x0, 0x0, &(0x7f0000000300), 0x0, &(0x7f0000000440)={[{@balloc_no_unhash_reloc}], [{@obj_role={'obj_role', 0x3d, '^'}}, {@hash}, {@uid_lt}, {@mask={'mask', 0x3d, 'MAY_EXEC'}}, {@uid_lt={'uid<', 0xee00}}, {@smackfsfloor={'smackfsfloor', 0x3d, ':%#[@'}}, {@obj_user={'obj_user', 0x3d, ',\\*),i'}}, {@uid_eq={'uid', 0x3d, 0xee00}}, {@seclabel}, {@uid_lt={'uid<', 0xee00}}]})

06:19:37 executing program 0:
r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0)
mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800004, 0x12, r0, 0x0)
preadv(r0, 0x0, 0x0, 0x9, 0x0)
syz_mount_image$reiserfs(&(0x7f0000000140), &(0x7f0000000180)='./file0\x00', 0x0, 0x0, &(0x7f0000000300), 0x0, &(0x7f0000000440)={[{@balloc_no_unhash_reloc}], [{@obj_role={'obj_role', 0x3d, '^'}}, {@hash}, {@uid_lt}, {@mask={'mask', 0x3d, 'MAY_EXEC'}}, {@uid_lt={'uid<', 0xee00}}, {@smackfsfloor={'smackfsfloor', 0x3d, ':%#[@'}}, {@obj_user={'obj_user', 0x3d, ',\\*),i'}}, {@uid_eq={'uid', 0x3d, 0xee00}}, {@seclabel}, {@uid_lt={'uid<', 0xee00}}]})

06:19:37 executing program 1:
r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0)
mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800004, 0x12, r0, 0x0)
preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x9, 0x0)
mmap(&(0x7f0000000000/0xa000)=nil, 0xa000, 0x2, 0x2172, 0xffffffffffffffff, 0x0)
syz_mount_image$reiserfs(0x0, 0x0, 0x8000, 0x3, &(0x7f0000000300)=[{&(0x7f0000000540)="21d37ef07e82e237fbe1b40158d20e242c5ea1f9d9edc6b9395250085d6dfa486982e82d4ce1a5e2bc00d29383bae640de", 0x31, 0x7}, {&(0x7f0000000240)="c43f281f483aa6cd83e40e59d53f177299d285bbe5d90aab2b56a76f9db49d86afa5a0f601ba9b3502de5f3724f3ec00927151f928f668b362052950a2e8f16baec29875fdad59395e86a1050c368933e3ed5a17d76bd7bded793436ea207885f395ace3fc12126c205b170be392c1645233ef01f9661090706a65f63b4845dc2884a20711a8024ad4af44aeec9db33991dae38d95cdb7132970d0d4dec58b9d46d378", 0xa3, 0x6}, {&(0x7f0000000380)="05f82c760d277896dd8c9891a41aafe24124891a32a238c3c78696d112aa09f3ae5c54b0c08676da5db7f358c72dfaca9a5d90860b4ae363c9a921c47965d339c23408a6d9b31a23aee27822f0a140d8e4ec9475a740113f2b9923b46333110e528e0a513151aad34aee1b5310fcf62c1982349253003d6d53aebbe09cf5918668ee682be93b6a671bbc", 0x8a, 0x3}], 0x2000400, &(0x7f0000000440)={[{@balloc_no_unhash_reloc}, {@nolargeio}, {@grpjquota}], [{@obj_role={'obj_role', 0x3d, '^'}}, {@hash}, {@uid_lt}, {@mask={'mask', 0x3d, 'MAY_EXEC'}}, {@uid_lt={'uid<', 0xee00}}, {@smackfsfloor={'smackfsfloor', 0x3d, ':%#[@'}}, {@obj_user={'obj_user', 0x3d, ',\\*),i'}}, {@uid_eq={'uid', 0x3d, 0xee00}}, {@seclabel}, {@uid_lt={'uid<', 0xee00}}]})

[  379.577364][T17043] loop1: detected capacity change from 0 to 64
06:19:37 executing program 2:
r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0)
mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800004, 0x12, r0, 0x0)
preadv(r0, &(0x7f00000001c0), 0x0, 0x9, 0x0)
r1 = syz_open_dev$tty1(0xc, 0x4, 0x1)
write$binfmt_elf64(r1, &(0x7f0000000380)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x80, 0x1, 0x9, 0x1, 0x2, 0x3e, 0x7ff, 0x1f2, 0x40, 0x1f4, 0xbfa, 0x3, 0x38, 0x1, 0x5, 0x4, 0x4}, [{0x5, 0x9, 0x6, 0x101, 0x6, 0x4, 0x9, 0x6}, {0x5, 0x3, 0x5e61, 0x80000000, 0xcc3, 0x9, 0x7, 0x8}], "d1660f10e0ac4a6edbf3aa53803c8f57ef2a12069e82553332d2b96d67f2dbc5b04959dad57c303d876233684f5e9ad402a193da791e11122f2cccbf10d6d499f5e16385d09f63891a965d80bcb68b551fabffb4bf0b5c372b4d69cdefac988201a40429a8d0dc699820193afcab08070fde89c22e16b43dde5e37d9a3df0cd352e8667f163774d9dc3c79571e5100046281", ['\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00']}, 0x842)

06:19:37 executing program 0:
r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0)
mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800004, 0x12, r0, 0x0)
preadv(r0, 0x0, 0x0, 0x9, 0x0)
syz_mount_image$reiserfs(&(0x7f0000000140), &(0x7f0000000180)='./file0\x00', 0x0, 0x0, &(0x7f0000000300), 0x0, &(0x7f0000000440)={[{@balloc_no_unhash_reloc}], [{@obj_role={'obj_role', 0x3d, '^'}}, {@hash}, {@uid_lt}, {@mask={'mask', 0x3d, 'MAY_EXEC'}}, {@uid_lt={'uid<', 0xee00}}, {@smackfsfloor={'smackfsfloor', 0x3d, ':%#[@'}}, {@obj_user={'obj_user', 0x3d, ',\\*),i'}}, {@uid_eq={'uid', 0x3d, 0xee00}}, {@seclabel}, {@uid_lt={'uid<', 0xee00}}]})

06:19:37 executing program 3:
r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0)
mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800004, 0x12, r0, 0x0)
preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x9, 0x0)
mmap(&(0x7f0000000000/0xa000)=nil, 0xa000, 0x2, 0x2172, 0xffffffffffffffff, 0x0)
syz_mount_image$reiserfs(0x0, &(0x7f0000000180)='./file0\x00', 0x0, 0x0, &(0x7f0000000300), 0x0, &(0x7f0000000440)={[{@balloc_no_unhash_reloc}], [{@obj_role={'obj_role', 0x3d, '^'}}, {@hash}, {@uid_lt}, {@mask={'mask', 0x3d, 'MAY_EXEC'}}, {@uid_lt={'uid<', 0xee00}}, {@smackfsfloor={'smackfsfloor', 0x3d, ':%#[@'}}, {@obj_user={'obj_user', 0x3d, ',\\*),i'}}, {@uid_eq={'uid', 0x3d, 0xee00}}, {@seclabel}, {@uid_lt={'uid<', 0xee00}}]})

06:19:37 executing program 1:
r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0)
mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800004, 0x12, r0, 0x0)
preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x9, 0x0)
mmap(&(0x7f0000000000/0xa000)=nil, 0xa000, 0x2, 0x2172, 0xffffffffffffffff, 0x0)
syz_mount_image$reiserfs(0x0, &(0x7f0000000180)='./file0\x00', 0x0, 0x3, &(0x7f0000000300)=[{&(0x7f0000000540)="21d37ef07e82e237fbe1b40158d20e242c5ea1f9d9edc6b9395250085d6dfa486982e82d4ce1a5e2bc00d29383bae640de", 0x31, 0x7}, {&(0x7f0000000240)="c43f281f483aa6cd83e40e59d53f177299d285bbe5d90aab2b56a76f9db49d86afa5a0f601ba9b3502de5f3724f3ec00927151f928f668b362052950a2e8f16baec29875fdad59395e86a1050c368933e3ed5a17d76bd7bded793436ea207885f395ace3fc12126c205b170be392c1645233ef01f9661090706a65f63b4845dc2884a20711a8024ad4af44aeec9db33991dae38d95cdb7132970d0d4dec58b9d46d378", 0xa3, 0x6}, {&(0x7f0000000380)="05f82c760d277896dd8c9891a41aafe24124891a32a238c3c78696d112aa09f3ae5c54b0c08676da5db7f358c72dfaca9a5d90860b4ae363c9a921c47965d339c23408a6d9b31a23aee27822f0a140d8e4ec9475a740113f2b9923b46333110e528e0a513151aad34aee1b5310fcf62c1982349253003d6d53aebbe09cf5918668ee682be93b6a671bbc", 0x8a, 0x3}], 0x2000400, &(0x7f0000000440)={[{@balloc_no_unhash_reloc}, {@nolargeio}, {@grpjquota}], [{@obj_role={'obj_role', 0x3d, '^'}}, {@hash}, {@uid_lt}, {@mask={'mask', 0x3d, 'MAY_EXEC'}}, {@uid_lt={'uid<', 0xee00}}, {@smackfsfloor={'smackfsfloor', 0x3d, ':%#[@'}}, {@obj_user={'obj_user', 0x3d, ',\\*),i'}}, {@uid_eq={'uid', 0x3d, 0xee00}}, {@seclabel}, {@uid_lt={'uid<', 0xee00}}]})

06:19:37 executing program 3:
r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0)
mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800004, 0x12, r0, 0x0)
preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x9, 0x0)
mmap(&(0x7f0000000000/0xa000)=nil, 0xa000, 0x2, 0x2172, 0xffffffffffffffff, 0x0)
syz_mount_image$reiserfs(&(0x7f0000000140), 0x0, 0x0, 0x0, &(0x7f0000000300), 0x0, &(0x7f0000000440)={[{@balloc_no_unhash_reloc}], [{@obj_role={'obj_role', 0x3d, '^'}}, {@hash}, {@uid_lt}, {@mask={'mask', 0x3d, 'MAY_EXEC'}}, {@uid_lt={'uid<', 0xee00}}, {@smackfsfloor={'smackfsfloor', 0x3d, ':%#[@'}}, {@obj_user={'obj_user', 0x3d, ',\\*),i'}}, {@uid_eq={'uid', 0x3d, 0xee00}}, {@seclabel}, {@uid_lt={'uid<', 0xee00}}]})

06:19:37 executing program 0:
r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0)
mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800004, 0x12, r0, 0x0)
preadv(r0, &(0x7f00000001c0), 0x0, 0x9, 0x0)
syz_mount_image$reiserfs(&(0x7f0000000140), &(0x7f0000000180)='./file0\x00', 0x0, 0x0, &(0x7f0000000300), 0x0, &(0x7f0000000440)={[{@balloc_no_unhash_reloc}], [{@obj_role={'obj_role', 0x3d, '^'}}, {@hash}, {@uid_lt}, {@mask={'mask', 0x3d, 'MAY_EXEC'}}, {@uid_lt={'uid<', 0xee00}}, {@smackfsfloor={'smackfsfloor', 0x3d, ':%#[@'}}, {@obj_user={'obj_user', 0x3d, ',\\*),i'}}, {@uid_eq={'uid', 0x3d, 0xee00}}, {@seclabel}, {@uid_lt={'uid<', 0xee00}}]})

06:19:37 executing program 1:
r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0)
mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800004, 0x12, r0, 0x0)
preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x9, 0x0)
mmap(&(0x7f0000000000/0xa000)=nil, 0xa000, 0x2, 0x2172, 0xffffffffffffffff, 0x0)
syz_mount_image$reiserfs(0x0, &(0x7f0000000180)='./file0\x00', 0x0, 0x3, &(0x7f0000000300)=[{&(0x7f0000000540)="21d37ef07e82e237fbe1b40158d20e242c5ea1f9d9edc6b9395250085d6dfa486982e82d4ce1a5e2bc00d29383bae640de", 0x31, 0x7}, {&(0x7f0000000240)="c43f281f483aa6cd83e40e59d53f177299d285bbe5d90aab2b56a76f9db49d86afa5a0f601ba9b3502de5f3724f3ec00927151f928f668b362052950a2e8f16baec29875fdad59395e86a1050c368933e3ed5a17d76bd7bded793436ea207885f395ace3fc12126c205b170be392c1645233ef01f9661090706a65f63b4845dc2884a20711a8024ad4af44aeec9db33991dae38d95cdb7132970d0d4dec58b9d46d378", 0xa3, 0x6}, {&(0x7f0000000380)="05f82c760d277896dd8c9891a41aafe24124891a32a238c3c78696d112aa09f3ae5c54b0c08676da5db7f358c72dfaca9a5d90860b4ae363c9a921c47965d339c23408a6d9b31a23aee27822f0a140d8e4ec9475a740113f2b9923b46333110e528e0a513151aad34aee1b5310fcf62c1982349253003d6d53aebbe09cf5918668ee682be93b6a671bbc", 0x8a, 0x3}], 0x2000400, &(0x7f0000000440)={[{@balloc_no_unhash_reloc}, {@nolargeio}, {@grpjquota}], [{@obj_role={'obj_role', 0x3d, '^'}}, {@hash}, {@uid_lt}, {@mask={'mask', 0x3d, 'MAY_EXEC'}}, {@uid_lt={'uid<', 0xee00}}, {@smackfsfloor={'smackfsfloor', 0x3d, ':%#[@'}}, {@obj_user={'obj_user', 0x3d, ',\\*),i'}}, {@uid_eq={'uid', 0x3d, 0xee00}}, {@seclabel}, {@uid_lt={'uid<', 0xee00}}]})

06:19:37 executing program 3:
r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0)
mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800004, 0x12, r0, 0x0)
preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x9, 0x0)
mmap(&(0x7f0000000000/0xa000)=nil, 0xa000, 0x2, 0x2172, 0xffffffffffffffff, 0x0)
syz_mount_image$reiserfs(&(0x7f0000000140), 0x0, 0x0, 0x0, &(0x7f0000000300), 0x0, &(0x7f0000000440)={[{@balloc_no_unhash_reloc}], [{@obj_role={'obj_role', 0x3d, '^'}}, {@hash}, {@uid_lt}, {@mask={'mask', 0x3d, 'MAY_EXEC'}}, {@uid_lt={'uid<', 0xee00}}, {@smackfsfloor={'smackfsfloor', 0x3d, ':%#[@'}}, {@obj_user={'obj_user', 0x3d, ',\\*),i'}}, {@uid_eq={'uid', 0x3d, 0xee00}}, {@seclabel}, {@uid_lt={'uid<', 0xee00}}]})

06:19:38 executing program 2:
r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0)
mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800004, 0x12, r0, 0x0)
preadv(r0, &(0x7f00000001c0), 0x0, 0x9, 0x0)
r1 = syz_open_dev$tty1(0xc, 0x4, 0x1)
write$binfmt_elf64(r1, &(0x7f0000000380)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x80, 0x1, 0x9, 0x1, 0x2, 0x3e, 0x7ff, 0x1f2, 0x40, 0x1f4, 0xbfa, 0x3, 0x38, 0x1, 0x5, 0x4, 0x4}, [{0x5, 0x9, 0x6, 0x101, 0x6, 0x4, 0x9, 0x6}, {0x5, 0x3, 0x5e61, 0x80000000, 0xcc3, 0x9, 0x7, 0x8}], "d1660f10e0ac4a6edbf3aa53803c8f57ef2a12069e82553332d2b96d67f2dbc5b04959dad57c303d876233684f5e9ad402a193da791e11122f2cccbf10d6d499f5e16385d09f63891a965d80bcb68b551fabffb4bf0b5c372b4d69cdefac988201a40429a8d0dc699820193afcab08070fde89c22e16b43dde5e37d9a3df0cd352e8667f163774d9dc3c79571e5100046281", ['\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00']}, 0x842)

06:19:38 executing program 0:
r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0)
mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800004, 0x12, r0, 0x0)
preadv(r0, &(0x7f00000001c0), 0x0, 0x9, 0x0)
syz_mount_image$reiserfs(&(0x7f0000000140), &(0x7f0000000180)='./file0\x00', 0x0, 0x0, &(0x7f0000000300), 0x0, &(0x7f0000000440)={[{@balloc_no_unhash_reloc}], [{@obj_role={'obj_role', 0x3d, '^'}}, {@hash}, {@uid_lt}, {@mask={'mask', 0x3d, 'MAY_EXEC'}}, {@uid_lt={'uid<', 0xee00}}, {@smackfsfloor={'smackfsfloor', 0x3d, ':%#[@'}}, {@obj_user={'obj_user', 0x3d, ',\\*),i'}}, {@uid_eq={'uid', 0x3d, 0xee00}}, {@seclabel}, {@uid_lt={'uid<', 0xee00}}]})

06:19:38 executing program 1:
r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0)
mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800004, 0x12, r0, 0x0)
preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x9, 0x0)
mmap(&(0x7f0000000000/0xa000)=nil, 0xa000, 0x2, 0x2172, 0xffffffffffffffff, 0x0)
syz_mount_image$reiserfs(0x0, &(0x7f0000000180)='./file0\x00', 0x0, 0x3, &(0x7f0000000300)=[{&(0x7f0000000540)="21d37ef07e82e237fbe1b40158d20e242c5ea1f9d9edc6b9395250085d6dfa486982e82d4ce1a5e2bc00d29383bae640de", 0x31, 0x7}, {&(0x7f0000000240)="c43f281f483aa6cd83e40e59d53f177299d285bbe5d90aab2b56a76f9db49d86afa5a0f601ba9b3502de5f3724f3ec00927151f928f668b362052950a2e8f16baec29875fdad59395e86a1050c368933e3ed5a17d76bd7bded793436ea207885f395ace3fc12126c205b170be392c1645233ef01f9661090706a65f63b4845dc2884a20711a8024ad4af44aeec9db33991dae38d95cdb7132970d0d4dec58b9d46d378", 0xa3, 0x6}, {&(0x7f0000000380)="05f82c760d277896dd8c9891a41aafe24124891a32a238c3c78696d112aa09f3ae5c54b0c08676da5db7f358c72dfaca9a5d90860b4ae363c9a921c47965d339c23408a6d9b31a23aee27822f0a140d8e4ec9475a740113f2b9923b46333110e528e0a513151aad34aee1b5310fcf62c1982349253003d6d53aebbe09cf5918668ee682be93b6a671bbc", 0x8a, 0x3}], 0x2000400, &(0x7f0000000440)={[{@balloc_no_unhash_reloc}, {@nolargeio}, {@grpjquota}], [{@obj_role={'obj_role', 0x3d, '^'}}, {@hash}, {@uid_lt}, {@mask={'mask', 0x3d, 'MAY_EXEC'}}, {@uid_lt={'uid<', 0xee00}}, {@smackfsfloor={'smackfsfloor', 0x3d, ':%#[@'}}, {@obj_user={'obj_user', 0x3d, ',\\*),i'}}, {@uid_eq={'uid', 0x3d, 0xee00}}, {@seclabel}, {@uid_lt={'uid<', 0xee00}}]})

06:19:38 executing program 3:
r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0)
mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800004, 0x12, r0, 0x0)
preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x9, 0x0)
mmap(&(0x7f0000000000/0xa000)=nil, 0xa000, 0x2, 0x2172, 0xffffffffffffffff, 0x0)
syz_mount_image$reiserfs(&(0x7f0000000140), 0x0, 0x0, 0x0, &(0x7f0000000300), 0x0, &(0x7f0000000440)={[{@balloc_no_unhash_reloc}], [{@obj_role={'obj_role', 0x3d, '^'}}, {@hash}, {@uid_lt}, {@mask={'mask', 0x3d, 'MAY_EXEC'}}, {@uid_lt={'uid<', 0xee00}}, {@smackfsfloor={'smackfsfloor', 0x3d, ':%#[@'}}, {@obj_user={'obj_user', 0x3d, ',\\*),i'}}, {@uid_eq={'uid', 0x3d, 0xee00}}, {@seclabel}, {@uid_lt={'uid<', 0xee00}}]})

06:19:38 executing program 3:
r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0)
mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800004, 0x12, r0, 0x0)
preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x9, 0x0)
mmap(&(0x7f0000000000/0xa000)=nil, 0xa000, 0x2, 0x2172, 0xffffffffffffffff, 0x0)
syz_mount_image$reiserfs(&(0x7f0000000140), &(0x7f0000000180)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000440)={[{@balloc_no_unhash_reloc}], [{@obj_role={'obj_role', 0x3d, '^'}}, {@hash}, {@uid_lt}, {@mask={'mask', 0x3d, 'MAY_EXEC'}}, {@uid_lt={'uid<', 0xee00}}, {@smackfsfloor={'smackfsfloor', 0x3d, ':%#[@'}}, {@obj_user={'obj_user', 0x3d, ',\\*),i'}}, {@uid_eq={'uid', 0x3d, 0xee00}}, {@seclabel}, {@uid_lt={'uid<', 0xee00}}]})

06:19:38 executing program 0:
r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0)
mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800004, 0x12, r0, 0x0)
preadv(r0, &(0x7f00000001c0), 0x0, 0x9, 0x0)
syz_mount_image$reiserfs(&(0x7f0000000140), &(0x7f0000000180)='./file0\x00', 0x0, 0x0, &(0x7f0000000300), 0x0, &(0x7f0000000440)={[{@balloc_no_unhash_reloc}], [{@obj_role={'obj_role', 0x3d, '^'}}, {@hash}, {@uid_lt}, {@mask={'mask', 0x3d, 'MAY_EXEC'}}, {@uid_lt={'uid<', 0xee00}}, {@smackfsfloor={'smackfsfloor', 0x3d, ':%#[@'}}, {@obj_user={'obj_user', 0x3d, ',\\*),i'}}, {@uid_eq={'uid', 0x3d, 0xee00}}, {@seclabel}, {@uid_lt={'uid<', 0xee00}}]})

06:19:38 executing program 1:
r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0)
mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800004, 0x12, r0, 0x0)
preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x9, 0x0)
mmap(&(0x7f0000000000/0xa000)=nil, 0xa000, 0x2, 0x2172, 0xffffffffffffffff, 0x0)
syz_mount_image$reiserfs(0x0, &(0x7f0000000180)='./file0\x00', 0x8000, 0x0, 0x0, 0x2000400, &(0x7f0000000440)={[{@balloc_no_unhash_reloc}, {@nolargeio}, {@grpjquota}], [{@obj_role={'obj_role', 0x3d, '^'}}, {@hash}, {@uid_lt}, {@mask={'mask', 0x3d, 'MAY_EXEC'}}, {@uid_lt={'uid<', 0xee00}}, {@smackfsfloor={'smackfsfloor', 0x3d, ':%#[@'}}, {@obj_user={'obj_user', 0x3d, ',\\*),i'}}, {@uid_eq={'uid', 0x3d, 0xee00}}, {@seclabel}, {@uid_lt={'uid<', 0xee00}}]})

06:19:38 executing program 3:
r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0)
mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800004, 0x12, r0, 0x0)
preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x9, 0x0)
mmap(&(0x7f0000000000/0xa000)=nil, 0xa000, 0x2, 0x2172, 0xffffffffffffffff, 0x0)
syz_mount_image$reiserfs(&(0x7f0000000140), &(0x7f0000000180)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000440)={[{@balloc_no_unhash_reloc}], [{@obj_role={'obj_role', 0x3d, '^'}}, {@hash}, {@uid_lt}, {@mask={'mask', 0x3d, 'MAY_EXEC'}}, {@uid_lt={'uid<', 0xee00}}, {@smackfsfloor={'smackfsfloor', 0x3d, ':%#[@'}}, {@obj_user={'obj_user', 0x3d, ',\\*),i'}}, {@uid_eq={'uid', 0x3d, 0xee00}}, {@seclabel}, {@uid_lt={'uid<', 0xee00}}]})

06:19:39 executing program 2:
r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0)
mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800004, 0x12, r0, 0x0)
preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x0, 0x0)
r1 = syz_open_dev$tty1(0xc, 0x4, 0x1)
write$binfmt_elf64(r1, &(0x7f0000000380)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x80, 0x1, 0x9, 0x1, 0x2, 0x3e, 0x7ff, 0x1f2, 0x40, 0x1f4, 0xbfa, 0x3, 0x38, 0x1, 0x5, 0x4, 0x4}, [{0x5, 0x9, 0x6, 0x101, 0x6, 0x4, 0x9, 0x6}, {0x5, 0x3, 0x5e61, 0x80000000, 0xcc3, 0x9, 0x7, 0x8}], "d1660f10e0ac4a6edbf3aa53803c8f57ef2a12069e82553332d2b96d67f2dbc5b04959dad57c303d876233684f5e9ad402a193da791e11122f2cccbf10d6d499f5e16385d09f63891a965d80bcb68b551fabffb4bf0b5c372b4d69cdefac988201a40429a8d0dc699820193afcab08070fde89c22e16b43dde5e37d9a3df0cd352e8667f163774d9dc3c79571e5100046281", ['\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00']}, 0x842)

06:19:39 executing program 1:
r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0)
mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800004, 0x12, r0, 0x0)
preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x9, 0x0)
mmap(&(0x7f0000000000/0xa000)=nil, 0xa000, 0x2, 0x2172, 0xffffffffffffffff, 0x0)
syz_mount_image$reiserfs(0x0, &(0x7f0000000180)='./file0\x00', 0x8000, 0x0, 0x0, 0x2000400, &(0x7f0000000440)={[{@balloc_no_unhash_reloc}, {@nolargeio}, {@grpjquota}], [{@obj_role={'obj_role', 0x3d, '^'}}, {@hash}, {@uid_lt}, {@mask={'mask', 0x3d, 'MAY_EXEC'}}, {@uid_lt={'uid<', 0xee00}}, {@smackfsfloor={'smackfsfloor', 0x3d, ':%#[@'}}, {@obj_user={'obj_user', 0x3d, ',\\*),i'}}, {@uid_eq={'uid', 0x3d, 0xee00}}, {@seclabel}, {@uid_lt={'uid<', 0xee00}}]})

06:19:39 executing program 3:
r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0)
mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800004, 0x12, r0, 0x0)
preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x9, 0x0)
mmap(&(0x7f0000000000/0xa000)=nil, 0xa000, 0x2, 0x2172, 0xffffffffffffffff, 0x0)
syz_mount_image$reiserfs(&(0x7f0000000140), &(0x7f0000000180)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000440)={[{@balloc_no_unhash_reloc}], [{@obj_role={'obj_role', 0x3d, '^'}}, {@hash}, {@uid_lt}, {@mask={'mask', 0x3d, 'MAY_EXEC'}}, {@uid_lt={'uid<', 0xee00}}, {@smackfsfloor={'smackfsfloor', 0x3d, ':%#[@'}}, {@obj_user={'obj_user', 0x3d, ',\\*),i'}}, {@uid_eq={'uid', 0x3d, 0xee00}}, {@seclabel}, {@uid_lt={'uid<', 0xee00}}]})

06:19:39 executing program 0:
r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0)
mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800004, 0x12, r0, 0x0)
preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x0, 0x0)
syz_mount_image$reiserfs(&(0x7f0000000140), &(0x7f0000000180)='./file0\x00', 0x0, 0x0, &(0x7f0000000300), 0x0, &(0x7f0000000440)={[{@balloc_no_unhash_reloc}], [{@obj_role={'obj_role', 0x3d, '^'}}, {@hash}, {@uid_lt}, {@mask={'mask', 0x3d, 'MAY_EXEC'}}, {@uid_lt={'uid<', 0xee00}}, {@smackfsfloor={'smackfsfloor', 0x3d, ':%#[@'}}, {@obj_user={'obj_user', 0x3d, ',\\*),i'}}, {@uid_eq={'uid', 0x3d, 0xee00}}, {@seclabel}, {@uid_lt={'uid<', 0xee00}}]})

06:19:39 executing program 1:
r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0)
mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800004, 0x12, r0, 0x0)
preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x9, 0x0)
mmap(&(0x7f0000000000/0xa000)=nil, 0xa000, 0x2, 0x2172, 0xffffffffffffffff, 0x0)
syz_mount_image$reiserfs(0x0, &(0x7f0000000180)='./file0\x00', 0x8000, 0x0, 0x0, 0x2000400, &(0x7f0000000440)={[{@balloc_no_unhash_reloc}, {@nolargeio}, {@grpjquota}], [{@obj_role={'obj_role', 0x3d, '^'}}, {@hash}, {@uid_lt}, {@mask={'mask', 0x3d, 'MAY_EXEC'}}, {@uid_lt={'uid<', 0xee00}}, {@smackfsfloor={'smackfsfloor', 0x3d, ':%#[@'}}, {@obj_user={'obj_user', 0x3d, ',\\*),i'}}, {@uid_eq={'uid', 0x3d, 0xee00}}, {@seclabel}, {@uid_lt={'uid<', 0xee00}}]})

06:19:39 executing program 3:
r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0)
mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800004, 0x12, r0, 0x0)
preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x9, 0x0)
mmap(&(0x7f0000000000/0xa000)=nil, 0xa000, 0x2, 0x2172, 0xffffffffffffffff, 0x0)
syz_mount_image$reiserfs(&(0x7f0000000140), &(0x7f0000000180)='./file0\x00', 0x0, 0x0, &(0x7f0000000300), 0x0, 0x0)

06:19:39 executing program 1:
r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0)
mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800004, 0x12, r0, 0x0)
preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x9, 0x0)
mmap(&(0x7f0000000000/0xa000)=nil, 0xa000, 0x2, 0x2172, 0xffffffffffffffff, 0x0)
syz_mount_image$reiserfs(0x0, &(0x7f0000000180)='./file0\x00', 0x8000, 0x2, &(0x7f0000000300)=[{&(0x7f0000000540)="21d37ef07e82e237fbe1b40158d20e242c5ea1f9d9edc6b9395250085d6dfa486982e82d4ce1a5e2bc00d29383bae640de", 0x31, 0x7}, {&(0x7f0000000240)="c43f281f483aa6cd83e40e59d53f177299d285bbe5d90aab2b56a76f9db49d86afa5a0f601ba9b3502de5f3724f3ec00927151f928f668b362052950a2e8f16baec29875fdad59395e86a1050c368933e3ed5a17d76bd7bded793436ea207885f395ace3fc12126c205b170be392c1645233ef01f9661090706a65f63b4845dc2884a20711a8024ad4af44aeec9db33991dae38d95cdb7132970d0d4dec58b9d46d378", 0xa3, 0x6}], 0x2000400, &(0x7f0000000440)={[{@balloc_no_unhash_reloc}, {@nolargeio}, {@grpjquota}], [{@obj_role={'obj_role', 0x3d, '^'}}, {@hash}, {@uid_lt}, {@mask={'mask', 0x3d, 'MAY_EXEC'}}, {@uid_lt={'uid<', 0xee00}}, {@smackfsfloor={'smackfsfloor', 0x3d, ':%#[@'}}, {@obj_user={'obj_user', 0x3d, ',\\*),i'}}, {@uid_eq={'uid', 0x3d, 0xee00}}, {@seclabel}, {@uid_lt={'uid<', 0xee00}}]})

06:19:39 executing program 0:
r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0)
mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800004, 0x12, r0, 0x0)
preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x0, 0x0)
syz_mount_image$reiserfs(&(0x7f0000000140), &(0x7f0000000180)='./file0\x00', 0x0, 0x0, &(0x7f0000000300), 0x0, &(0x7f0000000440)={[{@balloc_no_unhash_reloc}], [{@obj_role={'obj_role', 0x3d, '^'}}, {@hash}, {@uid_lt}, {@mask={'mask', 0x3d, 'MAY_EXEC'}}, {@uid_lt={'uid<', 0xee00}}, {@smackfsfloor={'smackfsfloor', 0x3d, ':%#[@'}}, {@obj_user={'obj_user', 0x3d, ',\\*),i'}}, {@uid_eq={'uid', 0x3d, 0xee00}}, {@seclabel}, {@uid_lt={'uid<', 0xee00}}]})

[  382.093718][T17143] loop1: detected capacity change from 0 to 64
06:19:40 executing program 2:
r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0)
mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800004, 0x12, r0, 0x0)
preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x0, 0x0)
r1 = syz_open_dev$tty1(0xc, 0x4, 0x1)
write$binfmt_elf64(r1, &(0x7f0000000380)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x80, 0x1, 0x9, 0x1, 0x2, 0x3e, 0x7ff, 0x1f2, 0x40, 0x1f4, 0xbfa, 0x3, 0x38, 0x1, 0x5, 0x4, 0x4}, [{0x5, 0x9, 0x6, 0x101, 0x6, 0x4, 0x9, 0x6}, {0x5, 0x3, 0x5e61, 0x80000000, 0xcc3, 0x9, 0x7, 0x8}], "d1660f10e0ac4a6edbf3aa53803c8f57ef2a12069e82553332d2b96d67f2dbc5b04959dad57c303d876233684f5e9ad402a193da791e11122f2cccbf10d6d499f5e16385d09f63891a965d80bcb68b551fabffb4bf0b5c372b4d69cdefac988201a40429a8d0dc699820193afcab08070fde89c22e16b43dde5e37d9a3df0cd352e8667f163774d9dc3c79571e5100046281", ['\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00']}, 0x842)

06:19:40 executing program 3:
r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0)
mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800004, 0x12, r0, 0x0)
preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x9, 0x0)
mmap(&(0x7f0000000000/0xa000)=nil, 0xa000, 0x2, 0x2172, 0xffffffffffffffff, 0x0)
syz_mount_image$reiserfs(&(0x7f0000000140), &(0x7f0000000180)='./file0\x00', 0x0, 0x0, &(0x7f0000000300), 0x0, 0x0)

06:19:40 executing program 1:
r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0)
mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800004, 0x12, r0, 0x0)
preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x9, 0x0)
mmap(&(0x7f0000000000/0xa000)=nil, 0xa000, 0x2, 0x2172, 0xffffffffffffffff, 0x0)
syz_mount_image$reiserfs(0x0, &(0x7f0000000180)='./file0\x00', 0x8000, 0x1, &(0x7f0000000300)=[{&(0x7f0000000540)="21d37ef07e82e237fbe1b40158d20e242c5ea1f9d9edc6b9395250085d6dfa486982e82d4ce1a5e2bc00d29383bae640de", 0x31, 0x7}], 0x2000400, &(0x7f0000000440)={[{@balloc_no_unhash_reloc}, {@nolargeio}, {@grpjquota}], [{@obj_role={'obj_role', 0x3d, '^'}}, {@hash}, {@uid_lt}, {@mask={'mask', 0x3d, 'MAY_EXEC'}}, {@uid_lt={'uid<', 0xee00}}, {@smackfsfloor={'smackfsfloor', 0x3d, ':%#[@'}}, {@obj_user={'obj_user', 0x3d, ',\\*),i'}}, {@uid_eq={'uid', 0x3d, 0xee00}}, {@seclabel}, {@uid_lt={'uid<', 0xee00}}]})

06:19:40 executing program 0:
r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0)
mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800004, 0x12, r0, 0x0)
preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x0, 0x0)
syz_mount_image$reiserfs(&(0x7f0000000140), &(0x7f0000000180)='./file0\x00', 0x0, 0x0, &(0x7f0000000300), 0x0, &(0x7f0000000440)={[{@balloc_no_unhash_reloc}], [{@obj_role={'obj_role', 0x3d, '^'}}, {@hash}, {@uid_lt}, {@mask={'mask', 0x3d, 'MAY_EXEC'}}, {@uid_lt={'uid<', 0xee00}}, {@smackfsfloor={'smackfsfloor', 0x3d, ':%#[@'}}, {@obj_user={'obj_user', 0x3d, ',\\*),i'}}, {@uid_eq={'uid', 0x3d, 0xee00}}, {@seclabel}, {@uid_lt={'uid<', 0xee00}}]})

06:19:40 executing program 0:
r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0)
mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800004, 0x12, r0, 0x0)
preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x9, 0x0)
syz_mount_image$reiserfs(0x0, &(0x7f0000000180)='./file0\x00', 0x0, 0x0, &(0x7f0000000300), 0x0, &(0x7f0000000440)={[{@balloc_no_unhash_reloc}], [{@obj_role={'obj_role', 0x3d, '^'}}, {@hash}, {@uid_lt}, {@mask={'mask', 0x3d, 'MAY_EXEC'}}, {@uid_lt={'uid<', 0xee00}}, {@smackfsfloor={'smackfsfloor', 0x3d, ':%#[@'}}, {@obj_user={'obj_user', 0x3d, ',\\*),i'}}, {@uid_eq={'uid', 0x3d, 0xee00}}, {@seclabel}, {@uid_lt={'uid<', 0xee00}}]})

[  382.899416][T17166] loop1: detected capacity change from 0 to 64
06:19:40 executing program 3:
r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0)
mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800004, 0x12, r0, 0x0)
preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x9, 0x0)
mmap(&(0x7f0000000000/0xa000)=nil, 0xa000, 0x2, 0x2172, 0xffffffffffffffff, 0x0)
syz_mount_image$reiserfs(&(0x7f0000000140), &(0x7f0000000180)='./file0\x00', 0x0, 0x0, &(0x7f0000000300), 0x0, 0x0)

06:19:40 executing program 1:
r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0)
mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800004, 0x12, r0, 0x0)
preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x9, 0x0)
mmap(&(0x7f0000000000/0xa000)=nil, 0xa000, 0x2, 0x2172, 0xffffffffffffffff, 0x0)
syz_mount_image$reiserfs(0x0, &(0x7f0000000180)='./file0\x00', 0x8000, 0x0, &(0x7f0000000300), 0x2000400, &(0x7f0000000440)={[{@balloc_no_unhash_reloc}, {@nolargeio}, {@grpjquota}], [{@obj_role={'obj_role', 0x3d, '^'}}, {@hash}, {@uid_lt}, {@mask={'mask', 0x3d, 'MAY_EXEC'}}, {@uid_lt={'uid<', 0xee00}}, {@smackfsfloor={'smackfsfloor', 0x3d, ':%#[@'}}, {@obj_user={'obj_user', 0x3d, ',\\*),i'}}, {@uid_eq={'uid', 0x3d, 0xee00}}, {@seclabel}, {@uid_lt={'uid<', 0xee00}}]})

06:19:40 executing program 0:
r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0)
mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800004, 0x12, r0, 0x0)
preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x9, 0x0)
syz_mount_image$reiserfs(0x0, &(0x7f0000000180)='./file0\x00', 0x0, 0x0, &(0x7f0000000300), 0x0, &(0x7f0000000440)={[{@balloc_no_unhash_reloc}], [{@obj_role={'obj_role', 0x3d, '^'}}, {@hash}, {@uid_lt}, {@mask={'mask', 0x3d, 'MAY_EXEC'}}, {@uid_lt={'uid<', 0xee00}}, {@smackfsfloor={'smackfsfloor', 0x3d, ':%#[@'}}, {@obj_user={'obj_user', 0x3d, ',\\*),i'}}, {@uid_eq={'uid', 0x3d, 0xee00}}, {@seclabel}, {@uid_lt={'uid<', 0xee00}}]})

[  383.148885][T17179] loop1: detected capacity change from 0 to 64
06:19:41 executing program 3:
r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0)
mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800004, 0x12, r0, 0x0)
preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x9, 0x0)
mmap(&(0x7f0000000000/0xa000)=nil, 0xa000, 0x2, 0x2172, 0xffffffffffffffff, 0x0)
syz_mount_image$reiserfs(&(0x7f0000000140), &(0x7f0000000180)='./file0\x00', 0x0, 0x0, &(0x7f0000000300), 0x0, &(0x7f0000000440)={[], [{@obj_role={'obj_role', 0x3d, '^'}}, {@hash}, {@uid_lt}, {@mask={'mask', 0x3d, 'MAY_EXEC'}}, {@uid_lt={'uid<', 0xee00}}, {@smackfsfloor={'smackfsfloor', 0x3d, ':%#[@'}}, {@obj_user={'obj_user', 0x3d, ',\\*),i'}}, {@uid_eq={'uid', 0x3d, 0xee00}}, {@seclabel}, {@uid_lt={'uid<', 0xee00}}]})

06:19:41 executing program 1:
r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0)
mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800004, 0x12, r0, 0x0)
preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x9, 0x0)
mmap(&(0x7f0000000000/0xa000)=nil, 0xa000, 0x2, 0x2172, 0xffffffffffffffff, 0x0)
syz_mount_image$reiserfs(0x0, &(0x7f0000000180)='./file0\x00', 0x8000, 0x0, &(0x7f0000000300), 0x0, &(0x7f0000000440)={[{@balloc_no_unhash_reloc}, {@nolargeio}, {@grpjquota}], [{@obj_role={'obj_role', 0x3d, '^'}}, {@hash}, {@uid_lt}, {@mask={'mask', 0x3d, 'MAY_EXEC'}}, {@uid_lt={'uid<', 0xee00}}, {@smackfsfloor={'smackfsfloor', 0x3d, ':%#[@'}}, {@obj_user={'obj_user', 0x3d, ',\\*),i'}}, {@uid_eq={'uid', 0x3d, 0xee00}}, {@seclabel}, {@uid_lt={'uid<', 0xee00}}]})

06:19:41 executing program 2:
r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0)
mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800004, 0x12, r0, 0x0)
preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x0, 0x0)
r1 = syz_open_dev$tty1(0xc, 0x4, 0x1)
write$binfmt_elf64(r1, &(0x7f0000000380)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x80, 0x1, 0x9, 0x1, 0x2, 0x3e, 0x7ff, 0x1f2, 0x40, 0x1f4, 0xbfa, 0x3, 0x38, 0x1, 0x5, 0x4, 0x4}, [{0x5, 0x9, 0x6, 0x101, 0x6, 0x4, 0x9, 0x6}, {0x5, 0x3, 0x5e61, 0x80000000, 0xcc3, 0x9, 0x7, 0x8}], "d1660f10e0ac4a6edbf3aa53803c8f57ef2a12069e82553332d2b96d67f2dbc5b04959dad57c303d876233684f5e9ad402a193da791e11122f2cccbf10d6d499f5e16385d09f63891a965d80bcb68b551fabffb4bf0b5c372b4d69cdefac988201a40429a8d0dc699820193afcab08070fde89c22e16b43dde5e37d9a3df0cd352e8667f163774d9dc3c79571e5100046281", ['\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00']}, 0x842)

06:19:41 executing program 0:
r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0)
mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800004, 0x12, r0, 0x0)
preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x9, 0x0)
syz_mount_image$reiserfs(0x0, &(0x7f0000000180)='./file0\x00', 0x0, 0x0, &(0x7f0000000300), 0x0, &(0x7f0000000440)={[{@balloc_no_unhash_reloc}], [{@obj_role={'obj_role', 0x3d, '^'}}, {@hash}, {@uid_lt}, {@mask={'mask', 0x3d, 'MAY_EXEC'}}, {@uid_lt={'uid<', 0xee00}}, {@smackfsfloor={'smackfsfloor', 0x3d, ':%#[@'}}, {@obj_user={'obj_user', 0x3d, ',\\*),i'}}, {@uid_eq={'uid', 0x3d, 0xee00}}, {@seclabel}, {@uid_lt={'uid<', 0xee00}}]})

[  383.796865][T17202] REISERFS warning (device loop3): super-6502 reiserfs_getopt: unknown mount option "obj_role=^"
[  383.798709][T17207] loop1: detected capacity change from 0 to 64
06:19:41 executing program 0:
r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0)
mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800004, 0x12, r0, 0x0)
preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x9, 0x0)
syz_mount_image$reiserfs(&(0x7f0000000140), 0x0, 0x0, 0x0, &(0x7f0000000300), 0x0, &(0x7f0000000440)={[{@balloc_no_unhash_reloc}], [{@obj_role={'obj_role', 0x3d, '^'}}, {@hash}, {@uid_lt}, {@mask={'mask', 0x3d, 'MAY_EXEC'}}, {@uid_lt={'uid<', 0xee00}}, {@smackfsfloor={'smackfsfloor', 0x3d, ':%#[@'}}, {@obj_user={'obj_user', 0x3d, ',\\*),i'}}, {@uid_eq={'uid', 0x3d, 0xee00}}, {@seclabel}, {@uid_lt={'uid<', 0xee00}}]})

06:19:41 executing program 1:
r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0)
mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800004, 0x12, r0, 0x0)
preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x9, 0x0)
mmap(&(0x7f0000000000/0xa000)=nil, 0xa000, 0x2, 0x2172, 0xffffffffffffffff, 0x0)
syz_mount_image$reiserfs(0x0, &(0x7f0000000180)='./file0\x00', 0x8000, 0x0, &(0x7f0000000300), 0x0, 0x0)

06:19:41 executing program 3:
r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0)
mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800004, 0x12, r0, 0x0)
preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x9, 0x0)
mmap(&(0x7f0000000000/0xa000)=nil, 0xa000, 0x2, 0x2172, 0xffffffffffffffff, 0x0)
syz_mount_image$reiserfs(&(0x7f0000000140), &(0x7f0000000180)='./file0\x00', 0x0, 0x0, &(0x7f0000000300), 0x0, &(0x7f0000000440)={[], [{@obj_role={'obj_role', 0x3d, '^'}}, {@hash}, {@uid_lt}, {@mask={'mask', 0x3d, 'MAY_EXEC'}}, {@uid_lt={'uid<', 0xee00}}, {@smackfsfloor={'smackfsfloor', 0x3d, ':%#[@'}}, {@obj_user={'obj_user', 0x3d, ',\\*),i'}}, {@uid_eq={'uid', 0x3d, 0xee00}}, {@seclabel}, {@uid_lt={'uid<', 0xee00}}]})

[  384.020955][T17214] loop1: detected capacity change from 0 to 64
[  384.056385][T17218] REISERFS warning (device loop3): super-6502 reiserfs_getopt: unknown mount option "obj_role=^"
06:19:41 executing program 3:
r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0)
mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800004, 0x12, r0, 0x0)
preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x9, 0x0)
mmap(&(0x7f0000000000/0xa000)=nil, 0xa000, 0x2, 0x2172, 0xffffffffffffffff, 0x0)
syz_mount_image$reiserfs(&(0x7f0000000140), &(0x7f0000000180)='./file0\x00', 0x0, 0x0, &(0x7f0000000300), 0x0, &(0x7f0000000440)={[], [{@obj_role={'obj_role', 0x3d, '^'}}, {@hash}, {@uid_lt}, {@mask={'mask', 0x3d, 'MAY_EXEC'}}, {@uid_lt={'uid<', 0xee00}}, {@smackfsfloor={'smackfsfloor', 0x3d, ':%#[@'}}, {@obj_user={'obj_user', 0x3d, ',\\*),i'}}, {@uid_eq={'uid', 0x3d, 0xee00}}, {@seclabel}, {@uid_lt={'uid<', 0xee00}}]})

06:19:41 executing program 1:
r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0)
mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800004, 0x12, r0, 0x0)
preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x0, 0x0)
mmap(&(0x7f0000000000/0xa000)=nil, 0xa000, 0x2, 0x2172, 0xffffffffffffffff, 0x0)
syz_mount_image$reiserfs(0x0, &(0x7f0000000180)='./file0\x00', 0x8000, 0x3, &(0x7f0000000300)=[{&(0x7f0000000540)="21d37ef07e82e237fbe1b40158d20e242c5ea1f9d9edc6b9395250085d6dfa486982e82d4ce1a5e2bc00d29383bae640de", 0x31, 0x7}, {&(0x7f0000000240)="c43f281f483aa6cd83e40e59d53f177299d285bbe5d90aab2b56a76f9db49d86afa5a0f601ba9b3502de5f3724f3ec00927151f928f668b362052950a2e8f16baec29875fdad59395e86a1050c368933e3ed5a17d76bd7bded793436ea207885f395ace3fc12126c205b170be392c1645233ef01f9661090706a65f63b4845dc2884a20711a8024ad4af44aeec9db33991dae38d95cdb7132970d0d4dec58b9d46d378", 0xa3, 0x6}, {&(0x7f0000000380)="05f82c760d277896dd8c9891a41aafe24124891a32a238c3c78696d112aa09f3ae5c54b0c08676da5db7f358c72dfaca9a5d90860b4ae363c9a921c47965d339c23408a6d9b31a23aee27822f0a140d8e4ec9475a740113f2b9923b46333110e528e0a513151aad34aee1b5310fcf62c1982349253003d6d53aebbe09cf5918668ee682be93b6a671bbc", 0x8a, 0x3}], 0x2000400, &(0x7f0000000440)={[{@balloc_no_unhash_reloc}, {@nolargeio}, {@grpjquota}], [{@obj_role={'obj_role', 0x3d, '^'}}, {@hash}, {@uid_lt}, {@mask={'mask', 0x3d, 'MAY_EXEC'}}, {@uid_lt={'uid<', 0xee00}}, {@smackfsfloor={'smackfsfloor', 0x3d, ':%#[@'}}, {@obj_user={'obj_user', 0x3d, ',\\*),i'}}, {@uid_eq={'uid', 0x3d, 0xee00}}, {@seclabel}, {@uid_lt={'uid<', 0xee00}}]})

06:19:41 executing program 0:
r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0)
mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800004, 0x12, r0, 0x0)
preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x9, 0x0)
syz_mount_image$reiserfs(&(0x7f0000000140), 0x0, 0x0, 0x0, &(0x7f0000000300), 0x0, &(0x7f0000000440)={[{@balloc_no_unhash_reloc}], [{@obj_role={'obj_role', 0x3d, '^'}}, {@hash}, {@uid_lt}, {@mask={'mask', 0x3d, 'MAY_EXEC'}}, {@uid_lt={'uid<', 0xee00}}, {@smackfsfloor={'smackfsfloor', 0x3d, ':%#[@'}}, {@obj_user={'obj_user', 0x3d, ',\\*),i'}}, {@uid_eq={'uid', 0x3d, 0xee00}}, {@seclabel}, {@uid_lt={'uid<', 0xee00}}]})

[  384.301528][T17228] REISERFS warning (device loop3): super-6502 reiserfs_getopt: unknown mount option "obj_role=^"
[  384.329878][T17233] loop1: detected capacity change from 0 to 64
06:19:42 executing program 0:
r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0)
mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800004, 0x12, r0, 0x0)
preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x9, 0x0)
syz_mount_image$reiserfs(&(0x7f0000000140), 0x0, 0x0, 0x0, &(0x7f0000000300), 0x0, &(0x7f0000000440)={[{@balloc_no_unhash_reloc}], [{@obj_role={'obj_role', 0x3d, '^'}}, {@hash}, {@uid_lt}, {@mask={'mask', 0x3d, 'MAY_EXEC'}}, {@uid_lt={'uid<', 0xee00}}, {@smackfsfloor={'smackfsfloor', 0x3d, ':%#[@'}}, {@obj_user={'obj_user', 0x3d, ',\\*),i'}}, {@uid_eq={'uid', 0x3d, 0xee00}}, {@seclabel}, {@uid_lt={'uid<', 0xee00}}]})

06:19:42 executing program 2:
r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0)
mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800004, 0x12, r0, 0x0)
preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x9, 0x0)
r1 = syz_open_dev$tty1(0xc, 0x4, 0x1)
write$binfmt_elf64(r1, &(0x7f0000000380)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x80, 0x1, 0x9, 0x1, 0x2, 0x3e, 0x7ff, 0x1f2, 0x40, 0x1f4, 0xbfa, 0x3, 0x38, 0x1, 0x5, 0x4, 0x4}, [{0x5, 0x9, 0x6, 0x101, 0x6, 0x4, 0x9, 0x6}, {0x5, 0x3, 0x5e61, 0x80000000, 0xcc3, 0x9, 0x7, 0x8}], "d1660f10e0ac4a6edbf3aa53803c8f57ef2a12069e82553332d2b96d67f2dbc5b04959dad57c303d876233684f5e9ad402a193da791e11122f2cccbf10d6d499f5e16385d09f63891a965d80bcb68b551fabffb4bf0b5c372b4d69cdefac988201a40429a8d0dc699820193afcab08070fde89c22e16b43dde5e37d9a3df0cd352e8667f163774d9dc3c79571e5100046281", ['\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00']}, 0x842)

06:19:42 executing program 1:
r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0)
mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800004, 0x12, r0, 0x0)
preadv(r0, &(0x7f00000001c0), 0x0, 0x9, 0x0)
mmap(&(0x7f0000000000/0xa000)=nil, 0xa000, 0x2, 0x2172, 0xffffffffffffffff, 0x0)
syz_mount_image$reiserfs(0x0, &(0x7f0000000180)='./file0\x00', 0x8000, 0x3, &(0x7f0000000300)=[{&(0x7f0000000540)="21d37ef07e82e237fbe1b40158d20e242c5ea1f9d9edc6b9395250085d6dfa486982e82d4ce1a5e2bc00d29383bae640de", 0x31, 0x7}, {&(0x7f0000000240)="c43f281f483aa6cd83e40e59d53f177299d285bbe5d90aab2b56a76f9db49d86afa5a0f601ba9b3502de5f3724f3ec00927151f928f668b362052950a2e8f16baec29875fdad59395e86a1050c368933e3ed5a17d76bd7bded793436ea207885f395ace3fc12126c205b170be392c1645233ef01f9661090706a65f63b4845dc2884a20711a8024ad4af44aeec9db33991dae38d95cdb7132970d0d4dec58b9d46d378", 0xa3, 0x6}, {&(0x7f0000000380)="05f82c760d277896dd8c9891a41aafe24124891a32a238c3c78696d112aa09f3ae5c54b0c08676da5db7f358c72dfaca9a5d90860b4ae363c9a921c47965d339c23408a6d9b31a23aee27822f0a140d8e4ec9475a740113f2b9923b46333110e528e0a513151aad34aee1b5310fcf62c1982349253003d6d53aebbe09cf5918668ee682be93b6a671bbc", 0x8a, 0x3}], 0x2000400, &(0x7f0000000440)={[{@balloc_no_unhash_reloc}, {@nolargeio}, {@grpjquota}], [{@obj_role={'obj_role', 0x3d, '^'}}, {@hash}, {@uid_lt}, {@mask={'mask', 0x3d, 'MAY_EXEC'}}, {@uid_lt={'uid<', 0xee00}}, {@smackfsfloor={'smackfsfloor', 0x3d, ':%#[@'}}, {@obj_user={'obj_user', 0x3d, ',\\*),i'}}, {@uid_eq={'uid', 0x3d, 0xee00}}, {@seclabel}, {@uid_lt={'uid<', 0xee00}}]})

06:19:42 executing program 3:
r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0)
mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800004, 0x12, r0, 0x0)
preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x9, 0x0)
mmap(&(0x7f0000000000/0xa000)=nil, 0xa000, 0x2, 0x2172, 0xffffffffffffffff, 0x0)
syz_mount_image$reiserfs(&(0x7f0000000140), &(0x7f0000000180)='./file0\x00', 0x0, 0x0, &(0x7f0000000300), 0x0, &(0x7f0000000440)={[{@balloc_no_unhash_reloc}], [{@obj_role={'obj_role', 0x3d, '^'}}, {@hash}, {@uid_lt}, {@mask={'mask', 0x3d, 'MAY_EXEC'}}, {@uid_lt={'uid<', 0xee00}}, {@smackfsfloor={'smackfsfloor', 0x3d, ':%#[@'}}, {@obj_user={'obj_user', 0x3d, ',\\*),i'}}, {@uid_eq={'uid', 0x3d, 0xee00}}, {@seclabel}]})

06:19:42 executing program 0:
r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0)
mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800004, 0x12, r0, 0x0)
preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x9, 0x0)
syz_mount_image$reiserfs(&(0x7f0000000140), &(0x7f0000000180)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000440)={[{@balloc_no_unhash_reloc}], [{@obj_role={'obj_role', 0x3d, '^'}}, {@hash}, {@uid_lt}, {@mask={'mask', 0x3d, 'MAY_EXEC'}}, {@uid_lt={'uid<', 0xee00}}, {@smackfsfloor={'smackfsfloor', 0x3d, ':%#[@'}}, {@obj_user={'obj_user', 0x3d, ',\\*),i'}}, {@uid_eq={'uid', 0x3d, 0xee00}}, {@seclabel}, {@uid_lt={'uid<', 0xee00}}]})

[  384.725184][T17252] REISERFS warning (device loop3): super-6502 reiserfs_getopt: unknown mount option "obj_role=^"
[  384.739876][T17254] loop1: detected capacity change from 0 to 64
06:19:42 executing program 0:
r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0)
mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800004, 0x12, r0, 0x0)
preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x9, 0x0)
syz_mount_image$reiserfs(&(0x7f0000000140), &(0x7f0000000180)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000440)={[{@balloc_no_unhash_reloc}], [{@obj_role={'obj_role', 0x3d, '^'}}, {@hash}, {@uid_lt}, {@mask={'mask', 0x3d, 'MAY_EXEC'}}, {@uid_lt={'uid<', 0xee00}}, {@smackfsfloor={'smackfsfloor', 0x3d, ':%#[@'}}, {@obj_user={'obj_user', 0x3d, ',\\*),i'}}, {@uid_eq={'uid', 0x3d, 0xee00}}, {@seclabel}, {@uid_lt={'uid<', 0xee00}}]})

06:19:42 executing program 3:
r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0)
mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800004, 0x12, r0, 0x0)
preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x9, 0x0)
mmap(&(0x7f0000000000/0xa000)=nil, 0xa000, 0x2, 0x2172, 0xffffffffffffffff, 0x0)
syz_mount_image$reiserfs(&(0x7f0000000140), &(0x7f0000000180)='./file0\x00', 0x0, 0x0, &(0x7f0000000300), 0x0, &(0x7f0000000440)={[{@balloc_no_unhash_reloc}], [{@obj_role={'obj_role', 0x3d, '^'}}, {@hash}, {@uid_lt}, {@mask={'mask', 0x3d, 'MAY_EXEC'}}, {@uid_lt={'uid<', 0xee00}}, {@smackfsfloor={'smackfsfloor', 0x3d, ':%#[@'}}, {@obj_user={'obj_user', 0x3d, ',\\*),i'}}, {@uid_eq={'uid', 0x3d, 0xee00}}]})

06:19:42 executing program 1:
r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0)
mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800004, 0x12, r0, 0x0)
preadv(r0, 0x0, 0x0, 0x9, 0x0)
mmap(&(0x7f0000000000/0xa000)=nil, 0xa000, 0x2, 0x2172, 0xffffffffffffffff, 0x0)
syz_mount_image$reiserfs(0x0, &(0x7f0000000180)='./file0\x00', 0x8000, 0x3, &(0x7f0000000300)=[{&(0x7f0000000540)="21d37ef07e82e237fbe1b40158d20e242c5ea1f9d9edc6b9395250085d6dfa486982e82d4ce1a5e2bc00d29383bae640de", 0x31, 0x7}, {&(0x7f0000000240)="c43f281f483aa6cd83e40e59d53f177299d285bbe5d90aab2b56a76f9db49d86afa5a0f601ba9b3502de5f3724f3ec00927151f928f668b362052950a2e8f16baec29875fdad59395e86a1050c368933e3ed5a17d76bd7bded793436ea207885f395ace3fc12126c205b170be392c1645233ef01f9661090706a65f63b4845dc2884a20711a8024ad4af44aeec9db33991dae38d95cdb7132970d0d4dec58b9d46d378", 0xa3, 0x6}, {&(0x7f0000000380)="05f82c760d277896dd8c9891a41aafe24124891a32a238c3c78696d112aa09f3ae5c54b0c08676da5db7f358c72dfaca9a5d90860b4ae363c9a921c47965d339c23408a6d9b31a23aee27822f0a140d8e4ec9475a740113f2b9923b46333110e528e0a513151aad34aee1b5310fcf62c1982349253003d6d53aebbe09cf5918668ee682be93b6a671bbc", 0x8a, 0x3}], 0x2000400, &(0x7f0000000440)={[{@balloc_no_unhash_reloc}, {@nolargeio}, {@grpjquota}], [{@obj_role={'obj_role', 0x3d, '^'}}, {@hash}, {@uid_lt}, {@mask={'mask', 0x3d, 'MAY_EXEC'}}, {@uid_lt={'uid<', 0xee00}}, {@smackfsfloor={'smackfsfloor', 0x3d, ':%#[@'}}, {@obj_user={'obj_user', 0x3d, ',\\*),i'}}, {@uid_eq={'uid', 0x3d, 0xee00}}, {@seclabel}, {@uid_lt={'uid<', 0xee00}}]})

[  384.995806][T17268] REISERFS warning (device loop3): super-6502 reiserfs_getopt: unknown mount option "obj_role=^"
06:19:42 executing program 0:
r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0)
mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800004, 0x12, r0, 0x0)
preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x9, 0x0)
syz_mount_image$reiserfs(&(0x7f0000000140), &(0x7f0000000180)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000440)={[{@balloc_no_unhash_reloc}], [{@obj_role={'obj_role', 0x3d, '^'}}, {@hash}, {@uid_lt}, {@mask={'mask', 0x3d, 'MAY_EXEC'}}, {@uid_lt={'uid<', 0xee00}}, {@smackfsfloor={'smackfsfloor', 0x3d, ':%#[@'}}, {@obj_user={'obj_user', 0x3d, ',\\*),i'}}, {@uid_eq={'uid', 0x3d, 0xee00}}, {@seclabel}, {@uid_lt={'uid<', 0xee00}}]})

[  385.012588][T17273] loop1: detected capacity change from 0 to 64
06:19:43 executing program 1:
r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0)
mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800004, 0x12, r0, 0x0)
preadv(0xffffffffffffffff, &(0x7f00000001c0)=[{0x0}], 0x1, 0x9, 0x0)
mmap(&(0x7f0000000000/0xa000)=nil, 0xa000, 0x2, 0x2172, 0xffffffffffffffff, 0x0)
syz_mount_image$reiserfs(&(0x7f0000000140), &(0x7f0000000180)='./file0\x00', 0x0, 0x0, &(0x7f0000000300), 0x0, &(0x7f0000000440)={[{@balloc_no_unhash_reloc}], [{@obj_role={'obj_role', 0x3d, '^'}}, {@hash}, {@uid_lt}, {@mask={'mask', 0x3d, 'MAY_EXEC'}}, {@uid_lt={'uid<', 0xee00}}, {@smackfsfloor={'smackfsfloor', 0x3d, ':%#[@'}}, {@obj_user={'obj_user', 0x3d, ',\\*),i'}}, {@uid_eq={'uid', 0x3d, 0xee00}}, {@seclabel}, {@uid_lt={'uid<', 0xee00}}]})

06:19:43 executing program 0:
r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0)
mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800004, 0x12, r0, 0x0)
preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x9, 0x0)
syz_mount_image$reiserfs(&(0x7f0000000140), &(0x7f0000000180)='./file0\x00', 0x0, 0x0, &(0x7f0000000300), 0x0, 0x0)

06:19:43 executing program 2:
r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0)
mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800004, 0x12, r0, 0x0)
preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x9, 0x0)
syz_open_dev$tty1(0xc, 0x4, 0x1)
write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000380)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x80, 0x1, 0x9, 0x1, 0x2, 0x3e, 0x7ff, 0x1f2, 0x40, 0x1f4, 0xbfa, 0x3, 0x38, 0x1, 0x5, 0x4, 0x4}, [{0x5, 0x9, 0x6, 0x101, 0x6, 0x4, 0x9, 0x6}, {0x5, 0x3, 0x5e61, 0x80000000, 0xcc3, 0x9, 0x7, 0x8}], "d1660f10e0ac4a6edbf3aa53803c8f57ef2a12069e82553332d2b96d67f2dbc5b04959dad57c303d876233684f5e9ad402a193da791e11122f2cccbf10d6d499f5e16385d09f63891a965d80bcb68b551fabffb4bf0b5c372b4d69cdefac988201a40429a8d0dc699820193afcab08070fde89c22e16b43dde5e37d9a3df0cd352e8667f163774d9dc3c79571e5100046281", ['\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00']}, 0x842)

06:19:43 executing program 3:
r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0)
mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800004, 0x12, r0, 0x0)
preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x9, 0x0)
mmap(&(0x7f0000000000/0xa000)=nil, 0xa000, 0x2, 0x2172, 0xffffffffffffffff, 0x0)
syz_mount_image$reiserfs(&(0x7f0000000140), &(0x7f0000000180)='./file0\x00', 0x0, 0x0, &(0x7f0000000300), 0x0, &(0x7f0000000440)={[{@balloc_no_unhash_reloc}], [{@obj_role={'obj_role', 0x3d, '^'}}, {@hash}, {@uid_lt}, {@mask={'mask', 0x3d, 'MAY_EXEC'}}, {@uid_lt={'uid<', 0xee00}}, {@smackfsfloor={'smackfsfloor', 0x3d, ':%#[@'}}, {@obj_user={'obj_user', 0x3d, ',\\*),i'}}]})

[  385.665284][T17287] REISERFS warning (device loop1): super-6502 reiserfs_getopt: unknown mount option "obj_role=^"
[  385.667630][T17288] REISERFS warning (device loop3): super-6502 reiserfs_getopt: unknown mount option "obj_role=^"
06:19:43 executing program 2:
r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0)
mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800004, 0x12, r0, 0x0)
preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x9, 0x0)
syz_open_dev$tty1(0xc, 0x4, 0x1)
write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000380)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x80, 0x1, 0x9, 0x1, 0x2, 0x3e, 0x7ff, 0x1f2, 0x40, 0x1f4, 0xbfa, 0x3, 0x38, 0x1, 0x5, 0x4, 0x4}, [{0x5, 0x9, 0x6, 0x101, 0x6, 0x4, 0x9, 0x6}, {0x5, 0x3, 0x5e61, 0x80000000, 0xcc3, 0x9, 0x7, 0x8}], "d1660f10e0ac4a6edbf3aa53803c8f57ef2a12069e82553332d2b96d67f2dbc5b04959dad57c303d876233684f5e9ad402a193da791e11122f2cccbf10d6d499f5e16385d09f63891a965d80bcb68b551fabffb4bf0b5c372b4d69cdefac988201a40429a8d0dc699820193afcab08070fde89c22e16b43dde5e37d9a3df0cd352e8667f163774d9dc3c79571e5100046281", ['\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00']}, 0x842)

06:19:43 executing program 3:
r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0)
mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800004, 0x12, r0, 0x0)
preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x9, 0x0)
mmap(&(0x7f0000000000/0xa000)=nil, 0xa000, 0x2, 0x2172, 0xffffffffffffffff, 0x0)
syz_mount_image$reiserfs(&(0x7f0000000140), &(0x7f0000000180)='./file0\x00', 0x0, 0x0, &(0x7f0000000300), 0x0, &(0x7f0000000440)={[{@balloc_no_unhash_reloc}], [{@obj_role={'obj_role', 0x3d, '^'}}, {@hash}, {@uid_lt}, {@mask={'mask', 0x3d, 'MAY_EXEC'}}, {@uid_lt={'uid<', 0xee00}}, {@smackfsfloor={'smackfsfloor', 0x3d, ':%#[@'}}]})

06:19:43 executing program 2:
r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0)
mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800004, 0x12, r0, 0x0)
preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x9, 0x0)
syz_open_dev$tty1(0xc, 0x4, 0x1)
write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000380)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x80, 0x1, 0x9, 0x1, 0x2, 0x3e, 0x7ff, 0x1f2, 0x40, 0x1f4, 0xbfa, 0x3, 0x38, 0x1, 0x5, 0x4, 0x4}, [{0x5, 0x9, 0x6, 0x101, 0x6, 0x4, 0x9, 0x6}, {0x5, 0x3, 0x5e61, 0x80000000, 0xcc3, 0x9, 0x7, 0x8}], "d1660f10e0ac4a6edbf3aa53803c8f57ef2a12069e82553332d2b96d67f2dbc5b04959dad57c303d876233684f5e9ad402a193da791e11122f2cccbf10d6d499f5e16385d09f63891a965d80bcb68b551fabffb4bf0b5c372b4d69cdefac988201a40429a8d0dc699820193afcab08070fde89c22e16b43dde5e37d9a3df0cd352e8667f163774d9dc3c79571e5100046281", ['\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00']}, 0x842)

06:19:43 executing program 0:
r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0)
mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800004, 0x12, r0, 0x0)
preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x9, 0x0)
syz_mount_image$reiserfs(&(0x7f0000000140), &(0x7f0000000180)='./file0\x00', 0x0, 0x0, &(0x7f0000000300), 0x0, 0x0)

06:19:43 executing program 1:
r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0)
mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800004, 0x12, r0, 0x0)
preadv(0xffffffffffffffff, &(0x7f00000001c0)=[{0x0}], 0x1, 0x9, 0x0)
mmap(&(0x7f0000000000/0xa000)=nil, 0xa000, 0x2, 0x2172, 0xffffffffffffffff, 0x0)
syz_mount_image$reiserfs(0x0, &(0x7f0000000180)='./file0\x00', 0x8000, 0x3, &(0x7f0000000300)=[{&(0x7f0000000540)="21d37ef07e82e237fbe1b40158d20e242c5ea1f9d9edc6b9395250085d6dfa486982e82d4ce1a5e2bc00d29383bae640de", 0x31, 0x7}, {&(0x7f0000000240)="c43f281f483aa6cd83e40e59d53f177299d285bbe5d90aab2b56a76f9db49d86afa5a0f601ba9b3502de5f3724f3ec00927151f928f668b362052950a2e8f16baec29875fdad59395e86a1050c368933e3ed5a17d76bd7bded793436ea207885f395ace3fc12126c205b170be392c1645233ef01f9661090706a65f63b4845dc2884a20711a8024ad4af44aeec9db33991dae38d95cdb7132970d0d4dec58b9d46d378", 0xa3, 0x6}, {&(0x7f0000000380)="05f82c760d277896dd8c9891a41aafe24124891a32a238c3c78696d112aa09f3ae5c54b0c08676da5db7f358c72dfaca9a5d90860b4ae363c9a921c47965d339c23408a6d9b31a23aee27822f0a140d8e4ec9475a740113f2b9923b46333110e528e0a513151aad34aee1b5310fcf62c1982349253003d6d53aebbe09cf5918668ee682be93b6a671bbc", 0x8a, 0x3}], 0x2000400, &(0x7f0000000440)={[{@balloc_no_unhash_reloc}, {@nolargeio}, {@grpjquota}], [{@obj_role={'obj_role', 0x3d, '^'}}, {@hash}, {@uid_lt}, {@mask={'mask', 0x3d, 'MAY_EXEC'}}, {@uid_lt={'uid<', 0xee00}}, {@smackfsfloor={'smackfsfloor', 0x3d, ':%#[@'}}, {@obj_user={'obj_user', 0x3d, ',\\*),i'}}, {@uid_eq={'uid', 0x3d, 0xee00}}, {@seclabel}, {@uid_lt={'uid<', 0xee00}}]})

[  385.950336][T17307] REISERFS warning (device loop3): super-6502 reiserfs_getopt: unknown mount option "obj_role=^"
[  385.966445][T17311] loop1: detected capacity change from 0 to 64
06:19:43 executing program 2:
r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0)
mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800004, 0x12, r0, 0x0)
preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x9, 0x0)
r1 = syz_open_dev$tty1(0xc, 0x4, 0x1)
write$binfmt_elf64(r1, 0x0, 0x0)

06:19:43 executing program 0:
r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0)
mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800004, 0x12, r0, 0x0)
preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x9, 0x0)
syz_mount_image$reiserfs(&(0x7f0000000140), &(0x7f0000000180)='./file0\x00', 0x0, 0x0, &(0x7f0000000300), 0x0, 0x0)

06:19:43 executing program 2:
r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0)
mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800004, 0x12, r0, 0x0)
preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x9, 0x0)
r1 = syz_open_dev$tty1(0xc, 0x4, 0x1)
write$binfmt_elf64(r1, 0x0, 0x0)

06:19:43 executing program 3:
r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0)
mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800004, 0x12, r0, 0x0)
preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x9, 0x0)
mmap(&(0x7f0000000000/0xa000)=nil, 0xa000, 0x2, 0x2172, 0xffffffffffffffff, 0x0)
syz_mount_image$reiserfs(&(0x7f0000000140), &(0x7f0000000180)='./file0\x00', 0x0, 0x0, &(0x7f0000000300), 0x0, &(0x7f0000000440)={[{@balloc_no_unhash_reloc}], [{@obj_role={'obj_role', 0x3d, '^'}}, {@hash}, {@uid_lt}, {@mask={'mask', 0x3d, 'MAY_EXEC'}}, {@uid_lt={'uid<', 0xee00}}]})

06:19:43 executing program 1:
mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800004, 0x12, 0xffffffffffffffff, 0x0)
preadv(0xffffffffffffffff, &(0x7f00000001c0)=[{0x0}], 0x1, 0x9, 0x0)
mmap(&(0x7f0000000000/0xa000)=nil, 0xa000, 0x2, 0x2172, 0xffffffffffffffff, 0x0)
syz_mount_image$reiserfs(&(0x7f0000000140), &(0x7f0000000180)='./file0\x00', 0x0, 0x0, &(0x7f0000000300), 0x0, &(0x7f0000000440)={[{@balloc_no_unhash_reloc}], [{@obj_role={'obj_role', 0x3d, '^'}}, {@hash}, {@uid_lt}, {@mask={'mask', 0x3d, 'MAY_EXEC'}}, {@uid_lt={'uid<', 0xee00}}, {@smackfsfloor={'smackfsfloor', 0x3d, ':%#[@'}}, {@obj_user={'obj_user', 0x3d, ',\\*),i'}}, {@uid_eq={'uid', 0x3d, 0xee00}}, {@seclabel}, {@uid_lt={'uid<', 0xee00}}]})

[  386.206664][T17326] REISERFS warning (device loop3): super-6502 reiserfs_getopt: unknown mount option "obj_role=^"
06:19:43 executing program 2:
r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0)
mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800004, 0x12, r0, 0x0)
preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x9, 0x0)
r1 = syz_open_dev$tty1(0xc, 0x4, 0x1)
write$binfmt_elf64(r1, 0x0, 0x0)

[  386.262578][T17332] REISERFS warning (device loop1): super-6502 reiserfs_getopt: unknown mount option "obj_role=^"
06:19:43 executing program 0:
r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0)
mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800004, 0x12, r0, 0x0)
preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x9, 0x0)
syz_mount_image$reiserfs(&(0x7f0000000140), &(0x7f0000000180)='./file0\x00', 0x0, 0x0, &(0x7f0000000300), 0x0, &(0x7f0000000440)={[], [{@obj_role={'obj_role', 0x3d, '^'}}, {@hash}, {@uid_lt}, {@mask={'mask', 0x3d, 'MAY_EXEC'}}, {@uid_lt={'uid<', 0xee00}}, {@smackfsfloor={'smackfsfloor', 0x3d, ':%#[@'}}, {@obj_user={'obj_user', 0x3d, ',\\*),i'}}, {@uid_eq={'uid', 0x3d, 0xee00}}, {@seclabel}, {@uid_lt={'uid<', 0xee00}}]})

06:19:43 executing program 2:
r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0)
mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800004, 0x12, r0, 0x0)
preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x9, 0x0)
r1 = syz_open_dev$tty1(0xc, 0x4, 0x1)
write$binfmt_elf64(r1, &(0x7f0000000380)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x1, 0x9, 0x1, 0x2, 0x3e, 0x7ff, 0x1f2, 0x40, 0x1f4, 0xbfa, 0x3, 0x38, 0x1, 0x5, 0x4, 0x4}, [{0x5, 0x9, 0x6, 0x101, 0x6, 0x4, 0x9, 0x6}, {0x5, 0x3, 0x5e61, 0x80000000, 0xcc3, 0x9, 0x7, 0x8}], "d1660f10e0ac4a6edbf3aa53803c8f57ef2a12069e82553332d2b96d67f2dbc5b04959dad57c303d876233684f5e9ad402a193da791e11122f2cccbf10d6d499f5e16385d09f63891a965d80bcb68b551fabffb4bf0b5c372b4d69cdefac988201a40429a8d0dc699820193afcab08070fde89c22e16b43dde5e37d9a3df0cd352e8667f163774d9dc3c79571e5100046281", ['\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00']}, 0x842)

06:19:44 executing program 3:
r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0)
mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800004, 0x12, r0, 0x0)
preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x9, 0x0)
mmap(&(0x7f0000000000/0xa000)=nil, 0xa000, 0x2, 0x2172, 0xffffffffffffffff, 0x0)
syz_mount_image$reiserfs(&(0x7f0000000140), &(0x7f0000000180)='./file0\x00', 0x0, 0x0, &(0x7f0000000300), 0x0, &(0x7f0000000440)={[{@balloc_no_unhash_reloc}], [{@obj_role={'obj_role', 0x3d, '^'}}, {@hash}, {@uid_lt}, {@mask={'mask', 0x3d, 'MAY_EXEC'}}]})

06:19:44 executing program 1:
r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0)
mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800004, 0x12, 0xffffffffffffffff, 0x0)
preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x9, 0x0)
mmap(&(0x7f0000000000/0xa000)=nil, 0xa000, 0x2, 0x2172, 0xffffffffffffffff, 0x0)
r1 = socket$unix(0x1, 0x1, 0x0)
bind$unix(r1, &(0x7f00000001c0)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x56)
close(r1)

[  386.662314][T17350] REISERFS warning (device loop3): super-6502 reiserfs_getopt: unknown mount option "obj_role=^"
06:19:44 executing program 1:
r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0)
mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800004, 0x12, r0, 0x0)
preadv(r0, &(0x7f00000001c0), 0x0, 0x9, 0x0)
mmap(&(0x7f0000000000/0xa000)=nil, 0xa000, 0x2, 0x2172, 0xffffffffffffffff, 0x0)
syz_mount_image$reiserfs(&(0x7f0000000140), &(0x7f0000000180)='./file0\x00', 0x8000, 0x3, &(0x7f0000000300)=[{&(0x7f0000000540)="21d37ef07e82e237fbe1b40158d20e242c5ea1f9d9edc6b9395250085d6dfa486982e82d4ce1a5e2bc00d29383bae640de", 0x31, 0x7}, {&(0x7f0000000240)="c43f281f483aa6cd83e40e59d53f177299d285bbe5d90aab2b56a76f9db49d86afa5a0f601ba9b3502de5f3724f3ec00927151f928f668b362052950a2e8f16baec29875fdad59395e86a1050c368933e3ed5a17d76bd7bded793436ea207885f395ace3fc12126c205b170be392c1645233ef01f9661090706a65f63b4845dc2884a20711a8024ad4af44aeec9db33991dae38d95cdb7132970d0d4dec58b9d46d378", 0xa3, 0x6}, {&(0x7f0000000380)="05f82c760d277896dd8c9891a41aafe24124891a32a238c3c78696d112aa09f3ae5c54b0c08676da5db7f358c72dfaca9a5d90860b4ae363c9a921c47965d339c23408a6d9b31a23aee27822f0a140d8e4ec9475a740113f2b9923b46333110e528e0a513151aad34aee1b5310fcf62c1982349253003d6d53aebbe09cf5918668ee682be93b6a671bbc", 0x8a, 0x3}], 0x2000400, &(0x7f0000000440)={[{@balloc_no_unhash_reloc}, {@nolargeio}, {@grpjquota}], [{@obj_role={'obj_role', 0x3d, '^'}}, {@hash}, {@uid_lt}, {@mask={'mask', 0x3d, 'MAY_EXEC'}}, {@uid_lt={'uid<', 0xee00}}, {@smackfsfloor={'smackfsfloor', 0x3d, ':%#[@'}}, {@obj_user={'obj_user', 0x3d, ',\\*),i'}}, {@uid_eq={'uid', 0x3d, 0xee00}}, {@seclabel}, {@uid_lt={'uid<', 0xee00}}]})

06:19:44 executing program 0:
r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0)
mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800004, 0x12, r0, 0x0)
preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x9, 0x0)
syz_mount_image$reiserfs(&(0x7f0000000140), &(0x7f0000000180)='./file0\x00', 0x0, 0x0, &(0x7f0000000300), 0x0, &(0x7f0000000440)={[], [{@obj_role={'obj_role', 0x3d, '^'}}, {@hash}, {@uid_lt}, {@mask={'mask', 0x3d, 'MAY_EXEC'}}, {@uid_lt={'uid<', 0xee00}}, {@smackfsfloor={'smackfsfloor', 0x3d, ':%#[@'}}, {@obj_user={'obj_user', 0x3d, ',\\*),i'}}, {@uid_eq={'uid', 0x3d, 0xee00}}, {@seclabel}]})

06:19:44 executing program 3:
r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0)
mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800004, 0x12, r0, 0x0)
preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x9, 0x0)
mmap(&(0x7f0000000000/0xa000)=nil, 0xa000, 0x2, 0x2172, 0xffffffffffffffff, 0x0)
syz_mount_image$reiserfs(&(0x7f0000000140), &(0x7f0000000180)='./file0\x00', 0x0, 0x0, &(0x7f0000000300), 0x0, &(0x7f0000000440)={[{@balloc_no_unhash_reloc}], [{@obj_role={'obj_role', 0x3d, '^'}}, {@hash}, {@uid_lt}]})

[  386.775572][T17358] loop1: detected capacity change from 0 to 64
[  386.794004][T17358] REISERFS warning (device loop1): super-6504 reiserfs_getopt: the option "nolargeio" requires an argument
[  386.794004][T17358] 
06:19:44 executing program 0:
r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0)
mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800004, 0x12, r0, 0x0)
preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x9, 0x0)
syz_mount_image$reiserfs(&(0x7f0000000140), &(0x7f0000000180)='./file0\x00', 0x0, 0x0, &(0x7f0000000300), 0x0, &(0x7f0000000440)={[], [{@obj_role={'obj_role', 0x3d, '^'}}, {@hash}, {@uid_lt}, {@mask={'mask', 0x3d, 'MAY_EXEC'}}, {@uid_lt={'uid<', 0xee00}}, {@smackfsfloor={'smackfsfloor', 0x3d, ':%#[@'}}, {@obj_user={'obj_user', 0x3d, ',\\*),i'}}, {@uid_eq={'uid', 0x3d, 0xee00}}]})

[  386.860174][T17367] REISERFS warning (device loop3): super-6502 reiserfs_getopt: unknown mount option "obj_role=^"
06:19:44 executing program 1:
r0 = openat(0xffffffffffffffff, 0x0, 0x0, 0x0)
mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800004, 0x12, r0, 0x0)
preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x9, 0x0)
mmap(&(0x7f0000000000/0xa000)=nil, 0xa000, 0x2, 0x2172, 0xffffffffffffffff, 0x0)
r1 = socket$unix(0x1, 0x1, 0x0)
bind$unix(r1, &(0x7f00000001c0)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x56)
close(r1)

06:19:45 executing program 2:
r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0)
mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800004, 0x12, r0, 0x0)
preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x9, 0x0)
r1 = syz_open_dev$tty1(0xc, 0x4, 0x1)
write$binfmt_elf64(r1, &(0x7f0000000380)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x9, 0x1, 0x2, 0x3e, 0x7ff, 0x1f2, 0x40, 0x1f4, 0xbfa, 0x3, 0x38, 0x1, 0x5, 0x4, 0x4}, [{0x5, 0x9, 0x6, 0x101, 0x6, 0x4, 0x9, 0x6}, {0x5, 0x3, 0x5e61, 0x80000000, 0xcc3, 0x9, 0x7, 0x8}], "d1660f10e0ac4a6edbf3aa53803c8f57ef2a12069e82553332d2b96d67f2dbc5b04959dad57c303d876233684f5e9ad402a193da791e11122f2cccbf10d6d499f5e16385d09f63891a965d80bcb68b551fabffb4bf0b5c372b4d69cdefac988201a40429a8d0dc699820193afcab08070fde89c22e16b43dde5e37d9a3df0cd352e8667f163774d9dc3c79571e5100046281", ['\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00']}, 0x842)

06:19:45 executing program 3:
r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0)
mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800004, 0x12, r0, 0x0)
preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x9, 0x0)
mmap(&(0x7f0000000000/0xa000)=nil, 0xa000, 0x2, 0x2172, 0xffffffffffffffff, 0x0)
syz_mount_image$reiserfs(&(0x7f0000000140), &(0x7f0000000180)='./file0\x00', 0x0, 0x0, &(0x7f0000000300), 0x0, &(0x7f0000000440)={[{@balloc_no_unhash_reloc}], [{@obj_role={'obj_role', 0x3d, '^'}}, {@hash}]})

06:19:45 executing program 0:
r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0)
mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800004, 0x12, r0, 0x0)
preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x9, 0x0)
syz_mount_image$reiserfs(&(0x7f0000000140), &(0x7f0000000180)='./file0\x00', 0x0, 0x0, &(0x7f0000000300), 0x0, &(0x7f0000000440)={[], [{@obj_role={'obj_role', 0x3d, '^'}}, {@hash}, {@uid_lt}, {@mask={'mask', 0x3d, 'MAY_EXEC'}}, {@uid_lt={'uid<', 0xee00}}, {@smackfsfloor={'smackfsfloor', 0x3d, ':%#[@'}}, {@obj_user={'obj_user', 0x3d, ',\\*),i'}}]})

06:19:45 executing program 1:
r0 = openat(0xffffffffffffffff, 0x0, 0x0, 0x0)
mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800004, 0x12, r0, 0x0)
preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x9, 0x0)
mmap(&(0x7f0000000000/0xa000)=nil, 0xa000, 0x2, 0x2172, 0xffffffffffffffff, 0x0)
r1 = socket$unix(0x1, 0x1, 0x0)
bind$unix(r1, &(0x7f00000001c0)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x56)
close(r1)

[  387.520205][T17390] REISERFS warning (device loop3): super-6502 reiserfs_getopt: unknown mount option "obj_role=^"
06:19:45 executing program 1:
r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0)
mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800004, 0x12, r0, 0x0)
preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x9, 0x0)
mmap(&(0x7f0000000000/0xa000)=nil, 0xa000, 0x2, 0x2172, 0xffffffffffffffff, 0x0)
socketpair(0x1e, 0x80005, 0x0, &(0x7f0000000340)={<r1=>0x0, <r2=>0x0})
r3 = syz_open_dev$hidraw(&(0x7f0000000040), 0xffff2859, 0x6080)
r4 = socket$unix(0x1, 0x1, 0x0)
bind$unix(r4, &(0x7f00000001c0)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x56)
r5 = socket$unix(0x1, 0x1, 0x0)
bind$unix(r5, &(0x7f00000001c0)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x56)
r6 = syz_open_dev$loop(&(0x7f0000000080), 0x4, 0x4001)
r7 = openat$khugepaged_scan(0xffffff9c, &(0x7f00000000c0), 0x1, 0x0)
poll(&(0x7f0000000140)=[{r1, 0x3}, {r3, 0x10a2}, {r4, 0x1}, {r2, 0x64c}, {r5, 0x9041}, {r6, 0x140}, {r7, 0x10}], 0x7, 0xff)
close(r1)

06:19:45 executing program 3:
r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0)
mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800004, 0x12, r0, 0x0)
preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x9, 0x0)
mmap(&(0x7f0000000000/0xa000)=nil, 0xa000, 0x2, 0x2172, 0xffffffffffffffff, 0x0)
syz_mount_image$reiserfs(&(0x7f0000000140), &(0x7f0000000180)='./file0\x00', 0x0, 0x0, &(0x7f0000000300), 0x0, &(0x7f0000000440)={[{@balloc_no_unhash_reloc}], [{@obj_role={'obj_role', 0x3d, '^'}}]})

06:19:45 executing program 0:
r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0)
mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800004, 0x12, r0, 0x0)
preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x9, 0x0)
syz_mount_image$reiserfs(&(0x7f0000000140), &(0x7f0000000180)='./file0\x00', 0x0, 0x0, &(0x7f0000000300), 0x0, &(0x7f0000000440)={[], [{@obj_role={'obj_role', 0x3d, '^'}}, {@hash}, {@uid_lt}, {@mask={'mask', 0x3d, 'MAY_EXEC'}}, {@uid_lt={'uid<', 0xee00}}, {@smackfsfloor={'smackfsfloor', 0x3d, ':%#[@'}}]})

[  387.842327][T17404] REISERFS warning (device loop3): super-6502 reiserfs_getopt: unknown mount option "obj_role=^"
06:19:45 executing program 1:
r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0)
mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800004, 0x12, r0, 0x0)
preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x9, 0x0)
mmap(&(0x7f0000000000/0xa000)=nil, 0xa000, 0x2, 0x2172, 0xffffffffffffffff, 0x0)
socketpair(0x1e, 0x80005, 0x0, &(0x7f0000000340)={<r1=>0x0, <r2=>0x0})
r3 = syz_open_dev$hidraw(&(0x7f0000000040), 0xffff2859, 0x6080)
r4 = socket$unix(0x1, 0x1, 0x0)
bind$unix(r4, &(0x7f00000001c0)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x56)
r5 = socket$unix(0x1, 0x1, 0x0)
bind$unix(r5, &(0x7f00000001c0)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x56)
r6 = syz_open_dev$loop(&(0x7f0000000080), 0x4, 0x4001)
r7 = openat$khugepaged_scan(0xffffff9c, &(0x7f00000000c0), 0x1, 0x0)
poll(&(0x7f0000000140)=[{r1, 0x3}, {r3, 0x10a2}, {r4, 0x1}, {r2, 0x64c}, {r5, 0x9041}, {r6, 0x140}, {r7, 0x10}], 0x7, 0xff)
close(r1)

06:19:45 executing program 0:
r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0)
mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800004, 0x12, r0, 0x0)
preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x9, 0x0)
syz_mount_image$reiserfs(&(0x7f0000000140), &(0x7f0000000180)='./file0\x00', 0x0, 0x0, &(0x7f0000000300), 0x0, &(0x7f0000000440)={[], [{@obj_role={'obj_role', 0x3d, '^'}}, {@hash}, {@uid_lt}, {@mask={'mask', 0x3d, 'MAY_EXEC'}}, {@uid_lt={'uid<', 0xee00}}]})

06:19:45 executing program 3:
r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0)
mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800004, 0x12, r0, 0x0)
preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x9, 0x0)
mmap(&(0x7f0000000000/0xa000)=nil, 0xa000, 0x2, 0x2172, 0xffffffffffffffff, 0x0)
syz_mount_image$reiserfs(&(0x7f0000000140), &(0x7f0000000180)='./file0\x00', 0x0, 0x0, &(0x7f0000000300), 0x0, &(0x7f0000000440)={[{@balloc_no_unhash_reloc}]})

06:19:45 executing program 2:
r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0)
mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800004, 0x12, r0, 0x0)
preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x9, 0x0)
r1 = syz_open_dev$tty1(0xc, 0x4, 0x1)
write$binfmt_elf64(r1, &(0x7f0000000380)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x1, 0x2, 0x3e, 0x7ff, 0x1f2, 0x40, 0x1f4, 0xbfa, 0x3, 0x38, 0x1, 0x5, 0x4, 0x4}, [{0x5, 0x9, 0x6, 0x101, 0x6, 0x4, 0x9, 0x6}, {0x5, 0x3, 0x5e61, 0x80000000, 0xcc3, 0x9, 0x7, 0x8}], "d1660f10e0ac4a6edbf3aa53803c8f57ef2a12069e82553332d2b96d67f2dbc5b04959dad57c303d876233684f5e9ad402a193da791e11122f2cccbf10d6d499f5e16385d09f63891a965d80bcb68b551fabffb4bf0b5c372b4d69cdefac988201a40429a8d0dc699820193afcab08070fde89c22e16b43dde5e37d9a3df0cd352e8667f163774d9dc3c79571e5100046281", ['\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00']}, 0x842)

06:19:45 executing program 1:
r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0)
mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800004, 0x12, r0, 0x0)
preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x9, 0x0)
mmap(&(0x7f0000000000/0xa000)=nil, 0xa000, 0x2, 0x2172, 0xffffffffffffffff, 0x0)
socketpair(0x1e, 0x80005, 0x0, &(0x7f0000000340)={<r1=>0x0, <r2=>0x0})
r3 = syz_open_dev$hidraw(&(0x7f0000000040), 0xffff2859, 0x6080)
r4 = socket$unix(0x1, 0x1, 0x0)
bind$unix(r4, &(0x7f00000001c0)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x56)
r5 = socket$unix(0x1, 0x1, 0x0)
bind$unix(r5, &(0x7f00000001c0)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x56)
r6 = syz_open_dev$loop(&(0x7f0000000080), 0x4, 0x4001)
r7 = openat$khugepaged_scan(0xffffff9c, &(0x7f00000000c0), 0x1, 0x0)
poll(&(0x7f0000000140)=[{r1, 0x3}, {r3, 0x10a2}, {r4, 0x1}, {r2, 0x64c}, {r5, 0x9041}, {r6, 0x140}, {r7, 0x10}], 0x7, 0xff)
close(r1)

[  388.384949][T17421] REISERFS warning (device loop3): super-6502 reiserfs_getopt: unknown mount option ""
06:19:46 executing program 1:
r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0)
mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800004, 0x12, r0, 0x0)
preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x9, 0x0)
mmap(&(0x7f0000000000/0xa000)=nil, 0xa000, 0x2, 0x2172, 0xffffffffffffffff, 0x0)
socketpair(0x1e, 0x80005, 0x0, &(0x7f0000000340)={<r1=>0x0, <r2=>0x0})
r3 = syz_open_dev$hidraw(&(0x7f0000000040), 0xffff2859, 0x6080)
r4 = socket$unix(0x1, 0x1, 0x0)
bind$unix(r4, &(0x7f00000001c0)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x56)
r5 = socket$unix(0x1, 0x1, 0x0)
bind$unix(r5, &(0x7f00000001c0)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x56)
r6 = syz_open_dev$loop(&(0x7f0000000080), 0x4, 0x4001)
r7 = openat$khugepaged_scan(0xffffff9c, &(0x7f00000000c0), 0x1, 0x0)
poll(&(0x7f0000000140)=[{r1, 0x3}, {r3, 0x10a2}, {r4, 0x1}, {r2, 0x64c}, {r5, 0x9041}, {r6, 0x140}, {r7, 0x10}], 0x7, 0xff)

06:19:46 executing program 3:
r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0)
mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800004, 0x12, r0, 0x0)
preadv(r0, &(0x7f00000001c0), 0x0, 0x9, 0x0)
mmap(&(0x7f0000000000/0xa000)=nil, 0xa000, 0x2, 0x2172, 0xffffffffffffffff, 0x0)
bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x11, 0x4, &(0x7f00000000c0)=@framed={{}, [@call={0x85, 0x0, 0x0, 0x7b}]}, &(0x7f00000001c0)='syzkaller\x00', 0x4, 0x8f, &(0x7f00000002c0)=""/143, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78)

06:19:46 executing program 0:
r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0)
mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800004, 0x12, r0, 0x0)
preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x9, 0x0)
syz_mount_image$reiserfs(&(0x7f0000000140), &(0x7f0000000180)='./file0\x00', 0x0, 0x0, &(0x7f0000000300), 0x0, &(0x7f0000000440)={[], [{@obj_role={'obj_role', 0x3d, '^'}}, {@hash}, {@uid_lt}, {@mask={'mask', 0x3d, 'MAY_EXEC'}}]})

06:19:46 executing program 1:
r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0)
mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800004, 0x12, r0, 0x0)
preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x9, 0x0)
mmap(&(0x7f0000000000/0xa000)=nil, 0xa000, 0x2, 0x2172, 0xffffffffffffffff, 0x0)
socketpair(0x1e, 0x80005, 0x0, &(0x7f0000000340)={<r1=>0x0, <r2=>0x0})
r3 = syz_open_dev$hidraw(&(0x7f0000000040), 0xffff2859, 0x6080)
r4 = socket$unix(0x1, 0x1, 0x0)
bind$unix(r4, &(0x7f00000001c0)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x56)
r5 = socket$unix(0x1, 0x1, 0x0)
bind$unix(r5, &(0x7f00000001c0)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x56)
r6 = syz_open_dev$loop(&(0x7f0000000080), 0x4, 0x4001)
poll(&(0x7f0000000140)=[{r1, 0x3}, {r3, 0x10a2}, {r4, 0x1}, {r2, 0x64c}, {r5, 0x9041}, {r6, 0x140}, {0xffffffffffffffff, 0x10}], 0x7, 0xff)

06:19:46 executing program 0:
r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0)
mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800004, 0x12, r0, 0x0)
preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x9, 0x0)
syz_mount_image$reiserfs(&(0x7f0000000140), &(0x7f0000000180)='./file0\x00', 0x0, 0x0, &(0x7f0000000300), 0x0, &(0x7f0000000440)={[], [{@obj_role={'obj_role', 0x3d, '^'}}, {@hash}, {@uid_lt}]})

06:19:46 executing program 1:
r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0)
mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800004, 0x12, r0, 0x0)
preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x9, 0x0)
mmap(&(0x7f0000000000/0xa000)=nil, 0xa000, 0x2, 0x2172, 0xffffffffffffffff, 0x0)
socketpair(0x1e, 0x80005, 0x0, &(0x7f0000000340)={<r1=>0x0, <r2=>0x0})
r3 = syz_open_dev$hidraw(&(0x7f0000000040), 0xffff2859, 0x6080)
r4 = socket$unix(0x1, 0x1, 0x0)
bind$unix(r4, &(0x7f00000001c0)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x56)
r5 = socket$unix(0x1, 0x1, 0x0)
bind$unix(r5, &(0x7f00000001c0)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x56)
r6 = syz_open_dev$loop(&(0x7f0000000080), 0x4, 0x4001)
poll(&(0x7f0000000140)=[{r1, 0x3}, {r3, 0x10a2}, {r4, 0x1}, {r2, 0x64c}, {r5, 0x9041}, {r6, 0x140}, {0xffffffffffffffff, 0x10}], 0x7, 0xff)

06:19:46 executing program 1:
r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0)
mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800004, 0x12, r0, 0x0)
preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x9, 0x0)
mmap(&(0x7f0000000000/0xa000)=nil, 0xa000, 0x2, 0x2172, 0xffffffffffffffff, 0x0)
socketpair(0x1e, 0x80005, 0x0, &(0x7f0000000340)={<r1=>0x0, <r2=>0x0})
r3 = syz_open_dev$hidraw(&(0x7f0000000040), 0xffff2859, 0x6080)
r4 = socket$unix(0x1, 0x1, 0x0)
bind$unix(r4, &(0x7f00000001c0)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x56)
r5 = socket$unix(0x1, 0x1, 0x0)
bind$unix(r5, &(0x7f00000001c0)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x56)
r6 = syz_open_dev$loop(&(0x7f0000000080), 0x4, 0x4001)
poll(&(0x7f0000000140)=[{r1, 0x3}, {r3, 0x10a2}, {r4, 0x1}, {r2, 0x64c}, {r5, 0x9041}, {r6, 0x140}, {0xffffffffffffffff, 0x10}], 0x7, 0xff)

06:19:46 executing program 3:
r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0)
mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800004, 0x12, r0, 0x0)
preadv(r0, &(0x7f00000001c0), 0x0, 0x9, 0x0)
mmap(&(0x7f0000000000/0xa000)=nil, 0xa000, 0x2, 0x2172, 0xffffffffffffffff, 0x0)
bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x11, 0x4, &(0x7f00000000c0)=@framed={{}, [@call={0x85, 0x0, 0x0, 0x7b}]}, &(0x7f00000001c0)='syzkaller\x00', 0x4, 0x8f, &(0x7f00000002c0)=""/143, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78)

06:19:46 executing program 2:
r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0)
mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800004, 0x12, r0, 0x0)
preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x9, 0x0)
r1 = syz_open_dev$tty1(0xc, 0x4, 0x1)
write$binfmt_elf64(r1, &(0x7f0000000380)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x3e, 0x7ff, 0x1f2, 0x40, 0x1f4, 0xbfa, 0x3, 0x38, 0x1, 0x5, 0x4, 0x4}, [{0x5, 0x9, 0x6, 0x101, 0x6, 0x4, 0x9, 0x6}, {0x5, 0x3, 0x5e61, 0x80000000, 0xcc3, 0x9, 0x7, 0x8}], "d1660f10e0ac4a6edbf3aa53803c8f57ef2a12069e82553332d2b96d67f2dbc5b04959dad57c303d876233684f5e9ad402a193da791e11122f2cccbf10d6d499f5e16385d09f63891a965d80bcb68b551fabffb4bf0b5c372b4d69cdefac988201a40429a8d0dc699820193afcab08070fde89c22e16b43dde5e37d9a3df0cd352e8667f163774d9dc3c79571e5100046281", ['\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00']}, 0x842)

06:19:46 executing program 0:
r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0)
mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800004, 0x12, r0, 0x0)
preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x9, 0x0)
syz_mount_image$reiserfs(&(0x7f0000000140), &(0x7f0000000180)='./file0\x00', 0x0, 0x0, &(0x7f0000000300), 0x0, &(0x7f0000000440)={[], [{@obj_role={'obj_role', 0x3d, '^'}}, {@hash}]})

06:19:47 executing program 1:
r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0)
mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800004, 0x12, r0, 0x0)
preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x9, 0x0)
mmap(&(0x7f0000000000/0xa000)=nil, 0xa000, 0x2, 0x2172, 0xffffffffffffffff, 0x0)
socketpair(0x1e, 0x80005, 0x0, &(0x7f0000000340)={<r1=>0x0, <r2=>0x0})
r3 = syz_open_dev$hidraw(&(0x7f0000000040), 0xffff2859, 0x6080)
r4 = socket$unix(0x1, 0x1, 0x0)
bind$unix(r4, &(0x7f00000001c0)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x56)
r5 = socket$unix(0x1, 0x1, 0x0)
bind$unix(r5, &(0x7f00000001c0)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x56)
r6 = openat$khugepaged_scan(0xffffff9c, &(0x7f00000000c0), 0x1, 0x0)
poll(&(0x7f0000000140)=[{r1, 0x3}, {r3, 0x10a2}, {r4, 0x1}, {r2, 0x64c}, {r5, 0x9041}, {0xffffffffffffffff, 0x140}, {r6, 0x10}], 0x7, 0xff)

06:19:47 executing program 3:
r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0)
mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800004, 0x12, r0, 0x0)
preadv(r0, 0x0, 0x0, 0x9, 0x0)
mmap(&(0x7f0000000000/0xa000)=nil, 0xa000, 0x2, 0x2172, 0xffffffffffffffff, 0x0)
bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x11, 0x4, &(0x7f00000000c0)=@framed={{}, [@call={0x85, 0x0, 0x0, 0x7b}]}, &(0x7f00000001c0)='syzkaller\x00', 0x4, 0x8f, &(0x7f00000002c0)=""/143, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78)

06:19:47 executing program 0:
r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0)
mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800004, 0x12, r0, 0x0)
preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x9, 0x0)
syz_mount_image$reiserfs(&(0x7f0000000140), &(0x7f0000000180)='./file0\x00', 0x0, 0x0, &(0x7f0000000300), 0x0, &(0x7f0000000440)={[], [{@obj_role={'obj_role', 0x3d, '^'}}]})

06:19:47 executing program 1:
r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0)
mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800004, 0x12, r0, 0x0)
preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x9, 0x0)
mmap(&(0x7f0000000000/0xa000)=nil, 0xa000, 0x2, 0x2172, 0xffffffffffffffff, 0x0)
socketpair(0x1e, 0x80005, 0x0, &(0x7f0000000340)={<r1=>0x0, <r2=>0x0})
r3 = syz_open_dev$hidraw(&(0x7f0000000040), 0xffff2859, 0x6080)
r4 = socket$unix(0x1, 0x1, 0x0)
bind$unix(r4, &(0x7f00000001c0)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x56)
r5 = socket$unix(0x1, 0x1, 0x0)
r6 = openat$khugepaged_scan(0xffffff9c, &(0x7f00000000c0), 0x1, 0x0)
poll(&(0x7f0000000140)=[{r1, 0x3}, {r3, 0x10a2}, {r4, 0x1}, {r2, 0x64c}, {r5, 0x9041}, {0xffffffffffffffff, 0x140}, {r6, 0x10}], 0x7, 0xff)

06:19:47 executing program 3:
r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0)
mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800004, 0x10, r0, 0x0)
preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x9, 0x0)
ioctl$CDROMPLAYBLK(r0, 0x5317, &(0x7f0000000040)={0x1, 0x1})
mmap(&(0x7f0000000000/0xa000)=nil, 0xa000, 0x2, 0x2172, 0xffffffffffffffff, 0x0)
socketpair(0x1e, 0x80005, 0x0, &(0x7f0000000340)={<r1=>0x0, 0x0})
close(r1)

06:19:47 executing program 1:
r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0)
mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800004, 0x12, r0, 0x0)
preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x9, 0x0)
mmap(&(0x7f0000000000/0xa000)=nil, 0xa000, 0x2, 0x2172, 0xffffffffffffffff, 0x0)
socketpair(0x1e, 0x80005, 0x0, &(0x7f0000000340)={<r1=>0x0, <r2=>0x0})
r3 = syz_open_dev$hidraw(&(0x7f0000000040), 0xffff2859, 0x6080)
r4 = socket$unix(0x1, 0x1, 0x0)
bind$unix(r4, &(0x7f00000001c0)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x56)
r5 = openat$khugepaged_scan(0xffffff9c, &(0x7f00000000c0), 0x1, 0x0)
poll(&(0x7f0000000140)=[{r1, 0x3}, {r3, 0x10a2}, {r4, 0x1}, {r2, 0x64c}, {0xffffffffffffffff, 0x9041}, {0xffffffffffffffff, 0x140}, {r5, 0x10}], 0x7, 0xff)

06:19:47 executing program 3:
r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x18d000, 0x0)
mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800004, 0x12, r0, 0x0)
preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x9, 0x0)
mmap(&(0x7f0000000000/0xa000)=nil, 0xa000, 0x2, 0x2172, 0xffffffffffffffff, 0x0)
socketpair(0x1e, 0x80005, 0x0, &(0x7f0000000340)={0x0, 0x0})

06:19:47 executing program 2:
r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0)
mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800004, 0x12, r0, 0x0)
preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x9, 0x0)
r1 = syz_open_dev$tty1(0xc, 0x4, 0x1)
write$binfmt_elf64(r1, &(0x7f0000000380)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3e, 0x7ff, 0x1f2, 0x40, 0x1f4, 0xbfa, 0x3, 0x38, 0x1, 0x5, 0x4, 0x4}, [{0x5, 0x9, 0x6, 0x101, 0x6, 0x4, 0x9, 0x6}, {0x5, 0x3, 0x5e61, 0x80000000, 0xcc3, 0x9, 0x7, 0x8}], "d1660f10e0ac4a6edbf3aa53803c8f57ef2a12069e82553332d2b96d67f2dbc5b04959dad57c303d876233684f5e9ad402a193da791e11122f2cccbf10d6d499f5e16385d09f63891a965d80bcb68b551fabffb4bf0b5c372b4d69cdefac988201a40429a8d0dc699820193afcab08070fde89c22e16b43dde5e37d9a3df0cd352e8667f163774d9dc3c79571e5100046281", ['\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00']}, 0x842)

06:19:47 executing program 1:
r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0)
mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800004, 0x12, r0, 0x0)
preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x9, 0x0)
mmap(&(0x7f0000000000/0xa000)=nil, 0xa000, 0x2, 0x2172, 0xffffffffffffffff, 0x0)
socketpair(0x1e, 0x80005, 0x0, &(0x7f0000000340)={<r1=>0x0, <r2=>0x0})
r3 = syz_open_dev$hidraw(&(0x7f0000000040), 0xffff2859, 0x6080)
r4 = socket$unix(0x1, 0x1, 0x0)
bind$unix(r4, &(0x7f00000001c0)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x56)
r5 = openat$khugepaged_scan(0xffffff9c, &(0x7f00000000c0), 0x1, 0x0)
poll(&(0x7f0000000140)=[{r1, 0x3}, {r3, 0x10a2}, {r4, 0x1}, {r2, 0x64c}, {0xffffffffffffffff, 0x9041}, {0xffffffffffffffff, 0x140}, {r5, 0x10}], 0x7, 0xff)

06:19:47 executing program 0:
r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0)
mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800004, 0x12, r0, 0x0)
preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x9, 0x0)
syz_mount_image$reiserfs(&(0x7f0000000140), &(0x7f0000000180)='./file0\x00', 0x0, 0x0, &(0x7f0000000300), 0x0, &(0x7f0000000440))

06:19:47 executing program 3:
r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='\xe9\x1fq\x89Y\x1e\x923aK\x00', 0x442600, 0x8b)
mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800004, 0x12, r0, 0x0)
preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x9, 0x0)
mmap(&(0x7f0000000000/0xa000)=nil, 0xa000, 0x2, 0x2172, 0xffffffffffffffff, 0x0)
r1 = socket$unix(0x1, 0x1, 0x0)
bind$unix(r1, &(0x7f00000001c0)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x56)
mmap(&(0x7f0000356000/0x4000)=nil, 0x4000, 0x800002, 0x2010, r1, 0x6d366000)
socketpair(0x1e, 0x80005, 0x0, &(0x7f0000000340)={<r2=>0x0, <r3=>0x0})
mmap(&(0x7f00001bd000/0x4000)=nil, 0x4000, 0x0, 0x30, r3, 0x946ad000)
close(r2)
r4 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x11, 0x4, &(0x7f00000000c0)=@framed={{}, [@call={0x85, 0x0, 0x0, 0x7b}]}, &(0x7f00000001c0)='syzkaller\x00', 0x4, 0x8f, &(0x7f00000002c0)=""/143, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78)
bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='ext4_es_lookup_extent_exit\x00', r4}, 0x10)
preadv(r4, &(0x7f0000000140)=[{&(0x7f0000000040)=""/80, 0x50}, {&(0x7f00000000c0)=""/69, 0x45}], 0x2, 0x78, 0x65)

06:19:47 executing program 1:
r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0)
mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800004, 0x12, r0, 0x0)
preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x9, 0x0)
mmap(&(0x7f0000000000/0xa000)=nil, 0xa000, 0x2, 0x2172, 0xffffffffffffffff, 0x0)
socketpair(0x1e, 0x80005, 0x0, &(0x7f0000000340)={<r1=>0x0, <r2=>0x0})
r3 = syz_open_dev$hidraw(&(0x7f0000000040), 0xffff2859, 0x6080)
r4 = socket$unix(0x1, 0x1, 0x0)
bind$unix(r4, &(0x7f00000001c0)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x56)
r5 = openat$khugepaged_scan(0xffffff9c, &(0x7f00000000c0), 0x1, 0x0)
poll(&(0x7f0000000140)=[{r1, 0x3}, {r3, 0x10a2}, {r4, 0x1}, {r2, 0x64c}, {0xffffffffffffffff, 0x9041}, {0xffffffffffffffff, 0x140}, {r5, 0x10}], 0x7, 0xff)

06:19:48 executing program 0:
r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0)
mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800004, 0x12, r0, 0x0)
preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x9, 0x0)
mmap(&(0x7f0000000000/0xa000)=nil, 0xa000, 0x2, 0x2172, 0xffffffffffffffff, 0x0)
socketpair(0x1e, 0x80005, 0x0, &(0x7f0000000340)={<r1=>0x0, <r2=>0x0})
r3 = syz_open_dev$hidraw(&(0x7f0000000040), 0xffff2859, 0x6080)
r4 = socket$unix(0x1, 0x1, 0x0)
bind$unix(r4, &(0x7f00000001c0)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x56)
r5 = openat$khugepaged_scan(0xffffff9c, &(0x7f00000000c0), 0x1, 0x0)
poll(&(0x7f0000000140)=[{r1, 0x3}, {r3, 0x10a2}, {r4, 0x1}, {r2, 0x64c}, {0xffffffffffffffff, 0x9041}, {0xffffffffffffffff, 0x140}, {r5, 0x10}], 0x7, 0xff)

06:19:48 executing program 3:
r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='\xe9\x1fq\x89Y\x1e\x923aK\x00', 0x442600, 0x8b)
mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800004, 0x12, r0, 0x0)
preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x9, 0x0)
mmap(&(0x7f0000000000/0xa000)=nil, 0xa000, 0x2, 0x2172, 0xffffffffffffffff, 0x0)
r1 = socket$unix(0x1, 0x1, 0x0)
bind$unix(r1, &(0x7f00000001c0)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x56)
mmap(&(0x7f0000356000/0x4000)=nil, 0x4000, 0x800002, 0x2010, r1, 0x6d366000)
socketpair(0x1e, 0x80005, 0x0, &(0x7f0000000340)={<r2=>0x0, <r3=>0x0})
mmap(&(0x7f00001bd000/0x4000)=nil, 0x4000, 0x0, 0x30, r3, 0x946ad000)
close(r2)
r4 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x11, 0x4, &(0x7f00000000c0)=@framed={{}, [@call={0x85, 0x0, 0x0, 0x7b}]}, &(0x7f00000001c0)='syzkaller\x00', 0x4, 0x8f, &(0x7f00000002c0)=""/143, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78)
bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='ext4_es_lookup_extent_exit\x00', r4}, 0x10)
preadv(r4, &(0x7f0000000140)=[{&(0x7f0000000040)=""/80, 0x50}, {&(0x7f00000000c0)=""/69, 0x45}], 0x2, 0x78, 0x65)

06:19:48 executing program 1:
r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0)
mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800004, 0x12, r0, 0x0)
preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x9, 0x0)
mmap(&(0x7f0000000000/0xa000)=nil, 0xa000, 0x2, 0x2172, 0xffffffffffffffff, 0x0)
socketpair(0x1e, 0x80005, 0x0, &(0x7f0000000340)={<r1=>0x0, <r2=>0x0})
r3 = syz_open_dev$hidraw(&(0x7f0000000040), 0xffff2859, 0x6080)
r4 = socket$unix(0x1, 0x1, 0x0)
r5 = socket$unix(0x1, 0x1, 0x0)
r6 = openat$khugepaged_scan(0xffffff9c, &(0x7f00000000c0), 0x1, 0x0)
poll(&(0x7f0000000140)=[{r1, 0x3}, {r3, 0x10a2}, {r4, 0x1}, {r2, 0x64c}, {r5, 0x9041}, {0xffffffffffffffff, 0x140}, {r6, 0x10}], 0x7, 0xff)

06:19:48 executing program 2:
r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0)
mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800004, 0x12, r0, 0x0)
preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x9, 0x0)
r1 = syz_open_dev$tty1(0xc, 0x4, 0x1)
write$binfmt_elf64(r1, &(0x7f0000000380)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7ff, 0x1f2, 0x40, 0x1f4, 0xbfa, 0x3, 0x38, 0x1, 0x5, 0x4, 0x4}, [{0x5, 0x9, 0x6, 0x101, 0x6, 0x4, 0x9, 0x6}, {0x5, 0x3, 0x5e61, 0x80000000, 0xcc3, 0x9, 0x7, 0x8}], "d1660f10e0ac4a6edbf3aa53803c8f57ef2a12069e82553332d2b96d67f2dbc5b04959dad57c303d876233684f5e9ad402a193da791e11122f2cccbf10d6d499f5e16385d09f63891a965d80bcb68b551fabffb4bf0b5c372b4d69cdefac988201a40429a8d0dc699820193afcab08070fde89c22e16b43dde5e37d9a3df0cd352e8667f163774d9dc3c79571e5100046281", ['\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00']}, 0x842)

06:19:48 executing program 0:
mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800004, 0x12, 0xffffffffffffffff, 0x0)
r0 = socket$unix(0x1, 0x1, 0x0)
bind$unix(r0, &(0x7f00000001c0)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x56)
preadv(r0, &(0x7f00000001c0), 0x0, 0x3a7, 0x0)
mmap(&(0x7f0000000000/0xa000)=nil, 0xa000, 0x2, 0x2172, 0xffffffffffffffff, 0x0)
socketpair(0x1e, 0x80005, 0x0, &(0x7f0000000340)={<r1=>0x0, 0x0})
close(r1)

06:19:48 executing program 1:
r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0)
mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800004, 0x12, r0, 0x0)
preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x9, 0x0)
mmap(&(0x7f0000000000/0xa000)=nil, 0xa000, 0x2, 0x2172, 0xffffffffffffffff, 0x0)
socketpair(0x1e, 0x80005, 0x0, &(0x7f0000000340)={<r1=>0x0, <r2=>0x0})
r3 = syz_open_dev$hidraw(&(0x7f0000000040), 0xffff2859, 0x6080)
r4 = socket$unix(0x1, 0x1, 0x0)
r5 = openat$khugepaged_scan(0xffffff9c, &(0x7f00000000c0), 0x1, 0x0)
poll(&(0x7f0000000140)=[{r1, 0x3}, {r3, 0x10a2}, {0xffffffffffffffff, 0x1}, {r2, 0x64c}, {r4, 0x9041}, {0xffffffffffffffff, 0x140}, {r5, 0x10}], 0x7, 0xff)

06:19:48 executing program 3:
r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0)
mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800004, 0x10, r0, 0x0)
preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x9, 0x0)
mmap(&(0x7f0000000000/0xa000)=nil, 0xa000, 0x2, 0x2172, 0xffffffffffffffff, 0x0)
bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x11, 0x4, &(0x7f00000000c0)=@framed={{}, [@call={0x85, 0x0, 0x0, 0x7b}]}, &(0x7f00000001c0)='syzkaller\x00', 0x4, 0x8f, &(0x7f00000002c0)=""/143, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78)

06:19:48 executing program 1:
r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0)
mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800004, 0x12, r0, 0x0)
preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x9, 0x0)
mmap(&(0x7f0000000000/0xa000)=nil, 0xa000, 0x2, 0x2172, 0xffffffffffffffff, 0x0)
socketpair(0x1e, 0x80005, 0x0, &(0x7f0000000340)={<r1=>0x0, <r2=>0x0})
r3 = syz_open_dev$hidraw(&(0x7f0000000040), 0xffff2859, 0x6080)
r4 = socket$unix(0x1, 0x1, 0x0)
r5 = openat$khugepaged_scan(0xffffff9c, &(0x7f00000000c0), 0x1, 0x0)
poll(&(0x7f0000000140)=[{r1, 0x3}, {r3, 0x10a2}, {0xffffffffffffffff, 0x1}, {r2, 0x64c}, {r4, 0x9041}, {0xffffffffffffffff, 0x140}, {r5, 0x10}], 0x7, 0xff)

06:19:48 executing program 0:
r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0)
mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800004, 0x100010, r0, 0x0)
preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x9, 0x0)
mmap(&(0x7f000033f000/0x1000)=nil, 0x1000, 0x2, 0x2172, 0xffffffffffffffff, 0x0)
ioctl$DRM_IOCTL_MODE_SETPROPERTY(r0, 0xc01064ab, &(0x7f0000000040)={0x3, 0x3ff, 0x3})
socketpair(0x1e, 0x80005, 0x0, &(0x7f0000000340)={<r1=>0x0, 0x0})
close(r1)

06:19:48 executing program 3:
r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0)
mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800004, 0x12, r0, 0x0)
preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x9, 0x0)
mmap(&(0x7f0000000000/0xa000)=nil, 0xa000, 0x2, 0x2172, 0xffffffffffffffff, 0x0)
socketpair(0x1e, 0x80005, 0xfffff000, &(0x7f0000000340)={0x0, 0x0})

06:19:48 executing program 0:
r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0)
mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800004, 0x12, r0, 0x0)
mmap(&(0x7f0000000000/0xa000)=nil, 0xa000, 0x2, 0x2172, 0xffffffffffffffff, 0x0)
bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x11, 0x4, &(0x7f00000000c0)=@framed={{}, [@call={0x85, 0x0, 0x0, 0x7b}]}, &(0x7f00000001c0)='syzkaller\x00', 0x4, 0x8f, &(0x7f00000002c0)=""/143, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78)

06:19:49 executing program 1:
r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0)
mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800004, 0x12, r0, 0x0)
preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x9, 0x0)
mmap(&(0x7f0000000000/0xa000)=nil, 0xa000, 0x2, 0x2172, 0xffffffffffffffff, 0x0)
socketpair(0x1e, 0x80005, 0x0, &(0x7f0000000340)={<r1=>0x0, <r2=>0x0})
r3 = syz_open_dev$hidraw(&(0x7f0000000040), 0xffff2859, 0x6080)
r4 = socket$unix(0x1, 0x1, 0x0)
r5 = openat$khugepaged_scan(0xffffff9c, &(0x7f00000000c0), 0x1, 0x0)
poll(&(0x7f0000000140)=[{r1, 0x3}, {r3, 0x10a2}, {0xffffffffffffffff, 0x1}, {r2, 0x64c}, {r4, 0x9041}, {0xffffffffffffffff, 0x140}, {r5, 0x10}], 0x7, 0xff)

06:19:49 executing program 3:
r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0)
mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800004, 0x12, r0, 0x0)
preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x9, 0x0)
mmap(&(0x7f0000000000/0xa000)=nil, 0xa000, 0x2, 0x2172, 0xffffffffffffffff, 0x0)
bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x11, 0x4, &(0x7f00000000c0)=@framed={{}, [@call={0x85, 0x0, 0x0, 0x7b}]}, &(0x7f00000001c0)='syzkaller\x00', 0x4, 0x8f, &(0x7f00000002c0)=""/143, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78)

06:19:49 executing program 2:
r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0)
mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800004, 0x12, r0, 0x0)
preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x9, 0x0)
r1 = syz_open_dev$tty1(0xc, 0x4, 0x1)
write$binfmt_elf64(r1, &(0x7f0000000380)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1f2, 0x40, 0x1f4, 0xbfa, 0x3, 0x38, 0x1, 0x5, 0x4, 0x4}, [{0x5, 0x9, 0x6, 0x101, 0x6, 0x4, 0x9, 0x6}, {0x5, 0x3, 0x5e61, 0x80000000, 0xcc3, 0x9, 0x7, 0x8}], "d1660f10e0ac4a6edbf3aa53803c8f57ef2a12069e82553332d2b96d67f2dbc5b04959dad57c303d876233684f5e9ad402a193da791e11122f2cccbf10d6d499f5e16385d09f63891a965d80bcb68b551fabffb4bf0b5c372b4d69cdefac988201a40429a8d0dc699820193afcab08070fde89c22e16b43dde5e37d9a3df0cd352e8667f163774d9dc3c79571e5100046281", ['\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00']}, 0x842)

06:19:49 executing program 0:
r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0)
mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800004, 0x12, r0, 0x0)
preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x9, 0x0)
mmap(&(0x7f0000000000/0xa000)=nil, 0xa000, 0x2, 0x2172, 0xffffffffffffffff, 0x0)
socketpair(0x1e, 0x80002, 0x0, &(0x7f0000000340)={0x0, 0x0})

06:19:49 executing program 1:
r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0)
mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800004, 0x12, r0, 0x0)
preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x9, 0x0)
mmap(&(0x7f0000000000/0xa000)=nil, 0xa000, 0x2, 0x2172, 0xffffffffffffffff, 0x0)
socketpair(0x1e, 0x80005, 0x0, &(0x7f0000000340)={<r1=>0x0, <r2=>0x0})
r3 = socket$unix(0x1, 0x1, 0x0)
r4 = socket$unix(0x1, 0x1, 0x0)
r5 = openat$khugepaged_scan(0xffffff9c, &(0x7f00000000c0), 0x1, 0x0)
poll(&(0x7f0000000140)=[{r1, 0x3}, {0xffffffffffffffff, 0x10a2}, {r3, 0x1}, {r2, 0x64c}, {r4, 0x9041}, {0xffffffffffffffff, 0x140}, {r5, 0x10}], 0x7, 0xff)

06:19:49 executing program 0:
r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0)
mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800004, 0x12, r0, 0x0)
preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x9, 0x0)
mmap(&(0x7f0000000000/0xa000)=nil, 0xa000, 0x2, 0x2172, 0xffffffffffffffff, 0x0)
socketpair(0x1e, 0x80002, 0x0, &(0x7f0000000340)={0x0, 0x0})

06:19:49 executing program 3:
r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x90)
mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800004, 0x12, r0, 0x0)
preadv(r0, &(0x7f00000001c0), 0x20000000000000be, 0x9, 0x0)
mmap(&(0x7f0000000000/0xa000)=nil, 0xa000, 0x2, 0x2172, 0xffffffffffffffff, 0x0)
socketpair(0x1e, 0x80005, 0x0, &(0x7f0000000340)={<r1=>0x0, 0x0})
close(r1)

06:19:49 executing program 1:
r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0)
mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800004, 0x12, r0, 0x0)
preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x9, 0x0)
mmap(&(0x7f0000000000/0xa000)=nil, 0xa000, 0x2, 0x2172, 0xffffffffffffffff, 0x0)
r1 = socket$unix(0x1, 0x1, 0x0)
r2 = socket$unix(0x1, 0x1, 0x0)
r3 = openat$khugepaged_scan(0xffffff9c, &(0x7f00000000c0), 0x1, 0x0)
poll(&(0x7f0000000140)=[{0xffffffffffffffff, 0x3}, {0xffffffffffffffff, 0x10a2}, {r1, 0x1}, {0xffffffffffffffff, 0x64c}, {r2, 0x9041}, {0xffffffffffffffff, 0x140}, {r3, 0x10}], 0x7, 0xff)

06:19:49 executing program 0:
r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0)
mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800004, 0x12, r0, 0x0)
preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x9, 0x0)
mmap(&(0x7f0000000000/0xa000)=nil, 0xa000, 0x2, 0x2172, 0xffffffffffffffff, 0x0)
socketpair(0x1e, 0x80002, 0x0, &(0x7f0000000340)={0x0, 0x0})

06:19:49 executing program 1:
r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0)
mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800004, 0x12, r0, 0x0)
preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x9, 0x0)
mmap(&(0x7f0000000000/0xa000)=nil, 0xa000, 0x2, 0x2172, 0xffffffffffffffff, 0x0)
r1 = socket$unix(0x1, 0x1, 0x0)
r2 = socket$unix(0x1, 0x1, 0x0)
r3 = openat$khugepaged_scan(0xffffff9c, &(0x7f00000000c0), 0x1, 0x0)
poll(&(0x7f0000000140)=[{0xffffffffffffffff, 0x3}, {0xffffffffffffffff, 0x10a2}, {r1, 0x1}, {0xffffffffffffffff, 0x64c}, {r2, 0x9041}, {0xffffffffffffffff, 0x140}, {r3, 0x10}], 0x7, 0xff)

06:19:50 executing program 2:
r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0)
mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800004, 0x12, r0, 0x0)
preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x9, 0x0)
r1 = syz_open_dev$tty1(0xc, 0x4, 0x1)
write$binfmt_elf64(r1, &(0x7f0000000380)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x1f4, 0xbfa, 0x3, 0x38, 0x1, 0x5, 0x4, 0x4}, [{0x5, 0x9, 0x6, 0x101, 0x6, 0x4, 0x9, 0x6}, {0x5, 0x3, 0x5e61, 0x80000000, 0xcc3, 0x9, 0x7, 0x8}], "d1660f10e0ac4a6edbf3aa53803c8f57ef2a12069e82553332d2b96d67f2dbc5b04959dad57c303d876233684f5e9ad402a193da791e11122f2cccbf10d6d499f5e16385d09f63891a965d80bcb68b551fabffb4bf0b5c372b4d69cdefac988201a40429a8d0dc699820193afcab08070fde89c22e16b43dde5e37d9a3df0cd352e8667f163774d9dc3c79571e5100046281", ['\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00']}, 0x842)

06:19:50 executing program 3 (fault-call:3 fault-nth:0):
r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0)
mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800004, 0x12, r0, 0x0)
preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x9, 0x0)
syz_mount_image$reiserfs(&(0x7f0000000140), &(0x7f0000000180)='./file0\x00', 0x0, 0x0, &(0x7f0000000300), 0x0, &(0x7f0000000440))

06:19:50 executing program 0:
r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0)
mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800004, 0x12, r0, 0x0)
preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x9, 0x0)
socketpair(0x1e, 0x80002, 0x0, &(0x7f0000000340)={0x0, 0x0})

06:19:50 executing program 1:
r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0)
mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800004, 0x12, r0, 0x0)
preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x9, 0x0)
mmap(&(0x7f0000000000/0xa000)=nil, 0xa000, 0x2, 0x2172, 0xffffffffffffffff, 0x0)
r1 = socket$unix(0x1, 0x1, 0x0)
r2 = socket$unix(0x1, 0x1, 0x0)
r3 = openat$khugepaged_scan(0xffffff9c, &(0x7f00000000c0), 0x1, 0x0)
poll(&(0x7f0000000140)=[{0xffffffffffffffff, 0x3}, {0xffffffffffffffff, 0x10a2}, {r1, 0x1}, {0xffffffffffffffff, 0x64c}, {r2, 0x9041}, {0xffffffffffffffff, 0x140}, {r3, 0x10}], 0x7, 0xff)

[  393.017201][T17571] FAULT_INJECTION: forcing a failure.
06:19:50 executing program 1:
r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0)
mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800004, 0x12, r0, 0x0)
preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x9, 0x0)
socketpair(0x1e, 0x80005, 0x0, &(0x7f0000000340)={<r1=>0x0, <r2=>0x0})
r3 = socket$unix(0x1, 0x1, 0x0)
r4 = socket$unix(0x1, 0x1, 0x0)
r5 = openat$khugepaged_scan(0xffffff9c, &(0x7f00000000c0), 0x1, 0x0)
poll(&(0x7f0000000140)=[{r1, 0x3}, {0xffffffffffffffff, 0x10a2}, {r3, 0x1}, {r2, 0x64c}, {r4, 0x9041}, {0xffffffffffffffff, 0x140}, {r5, 0x10}], 0x7, 0xff)

[  393.017201][T17571] name failslab, interval 1, probability 0, space 0, times 0
[  393.046000][T17571] CPU: 0 PID: 17571 Comm: syz-executor.3 Not tainted 5.14.0-rc2-syzkaller #0
[  393.057028][T17571] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.14.0-2 04/01/2014
[  393.071960][T17571] Call Trace:
[  393.077810][T17571]  dump_stack_lvl+0xcd/0x134
[  393.084933][T17571]  should_fail.cold+0x5/0xa
[  393.091954][T17571]  ? __do_sys_memfd_create+0xf7/0x5a0
[  393.100268][T17571]  should_failslab+0x5/0x10
[  393.108566][T17571]  __kmalloc+0x72/0x330
06:19:50 executing program 1:
r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0)
mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800004, 0x12, r0, 0x0)
preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x9, 0x0)
socketpair(0x1e, 0x80005, 0x0, &(0x7f0000000340)={<r1=>0x0, <r2=>0x0})
r3 = socket$unix(0x1, 0x1, 0x0)
r4 = socket$unix(0x1, 0x1, 0x0)
r5 = openat$khugepaged_scan(0xffffff9c, &(0x7f00000000c0), 0x1, 0x0)
poll(&(0x7f0000000140)=[{r1, 0x3}, {0xffffffffffffffff, 0x10a2}, {r3, 0x1}, {r2, 0x64c}, {r4, 0x9041}, {0xffffffffffffffff, 0x140}, {r5, 0x10}], 0x7, 0xff)

[  393.114671][T17571]  __do_sys_memfd_create+0xf7/0x5a0
[  393.124821][T17571]  ? hmm_vma_walk_hugetlb_entry+0x8b0/0x8b0
[  393.135501][T17571]  ? syscall_enter_from_user_mode_prepare+0x17/0x40
[  393.147444][T17571]  __do_fast_syscall_32+0x65/0xf0
[  393.154733][T17571]  do_fast_syscall_32+0x2f/0x70
[  393.161920][T17571]  entry_SYSENTER_compat_after_hwframe+0x4d/0x5c
[  393.172570][T17571] RIP: 0023:0xf7f3f549
[  393.180208][T17571] Code: 03 74 c0 01 10 05 03 74 b8 01 10 06 03 74 b4 01 10 07 03 74 b0 01 10 08 03 74 d8 01 00 00 00 00 00 51 52 55 89 e5 0f 34 cd 80 <5d> 5a 59 c3 90 90 90 90 8d b4 26 00 00 00 00 8d b4 26 00 00 00 00
[  393.216221][T17571] RSP: 002b:00000000f553940c EFLAGS: 00000296 ORIG_RAX: 0000000000000164
[  393.229432][T17571] RAX: ffffffffffffffda RBX: 00000000080ea0f5 RCX: 0000000000000000
[  393.240949][T17571] RDX: 00000000f553946c RSI: 0000000000000000 RDI: 0000000000000000
[  393.255850][T17571] RBP: 0000000020000300 R08: 0000000000000000 R09: 0000000000000000
[  393.270332][T17571] R10: 0000000000000000 R11: 0000000000000000 R12: 0000000000000000
[  393.283631][T17571] R13: 0000000000000000 R14: 0000000000000000 R15: 0000000000000000
06:19:50 executing program 0:
r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0)
mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800004, 0x12, r0, 0x0)
preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x9, 0x0)
socketpair(0x1e, 0x80002, 0x0, &(0x7f0000000340)={0x0, 0x0})

06:19:50 executing program 1:
r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0)
mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800004, 0x12, r0, 0x0)
preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x9, 0x0)
socketpair(0x1e, 0x80005, 0x0, &(0x7f0000000340)={<r1=>0x0, <r2=>0x0})
r3 = socket$unix(0x1, 0x1, 0x0)
r4 = socket$unix(0x1, 0x1, 0x0)
r5 = openat$khugepaged_scan(0xffffff9c, &(0x7f00000000c0), 0x1, 0x0)
poll(&(0x7f0000000140)=[{r1, 0x3}, {0xffffffffffffffff, 0x10a2}, {r3, 0x1}, {r2, 0x64c}, {r4, 0x9041}, {0xffffffffffffffff, 0x140}, {r5, 0x10}], 0x7, 0xff)

06:19:51 executing program 2:
r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0)
mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800004, 0x12, r0, 0x0)
preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x9, 0x0)
r1 = syz_open_dev$tty1(0xc, 0x4, 0x1)
write$binfmt_elf64(r1, &(0x7f0000000380)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, 0xbfa, 0x3, 0x38, 0x1, 0x5, 0x4, 0x4}, [{0x5, 0x9, 0x6, 0x101, 0x6, 0x4, 0x9, 0x6}, {0x5, 0x3, 0x5e61, 0x80000000, 0xcc3, 0x9, 0x7, 0x8}], "d1660f10e0ac4a6edbf3aa53803c8f57ef2a12069e82553332d2b96d67f2dbc5b04959dad57c303d876233684f5e9ad402a193da791e11122f2cccbf10d6d499f5e16385d09f63891a965d80bcb68b551fabffb4bf0b5c372b4d69cdefac988201a40429a8d0dc699820193afcab08070fde89c22e16b43dde5e37d9a3df0cd352e8667f163774d9dc3c79571e5100046281", ['\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00']}, 0x842)

06:19:51 executing program 3 (fault-call:3 fault-nth:1):
r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0)
mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800004, 0x12, r0, 0x0)
preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x9, 0x0)
syz_mount_image$reiserfs(&(0x7f0000000140), &(0x7f0000000180)='./file0\x00', 0x0, 0x0, &(0x7f0000000300), 0x0, &(0x7f0000000440))

06:19:51 executing program 0:
r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0)
mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800004, 0x12, r0, 0x0)
preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x9, 0x0)
socketpair(0x1e, 0x80002, 0x0, &(0x7f0000000340)={0x0, 0x0})

06:19:51 executing program 1:
r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0)
mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800004, 0x12, r0, 0x0)
mmap(&(0x7f0000000000/0xa000)=nil, 0xa000, 0x2, 0x2172, 0xffffffffffffffff, 0x0)
socketpair(0x1e, 0x80005, 0x0, &(0x7f0000000340)={<r1=>0x0, <r2=>0x0})
r3 = socket$unix(0x1, 0x1, 0x0)
r4 = socket$unix(0x1, 0x1, 0x0)
r5 = openat$khugepaged_scan(0xffffff9c, &(0x7f00000000c0), 0x1, 0x0)
poll(&(0x7f0000000140)=[{r1, 0x3}, {0xffffffffffffffff, 0x10a2}, {r3, 0x1}, {r2, 0x64c}, {r4, 0x9041}, {0xffffffffffffffff, 0x140}, {r5, 0x10}], 0x7, 0xff)

[  393.933908][T17594] FAULT_INJECTION: forcing a failure.
[  393.933908][T17594] name fail_usercopy, interval 1, probability 0, space 0, times 0
[  393.956881][T17594] CPU: 0 PID: 17594 Comm: syz-executor.3 Not tainted 5.14.0-rc2-syzkaller #0
[  393.971408][T17594] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.14.0-2 04/01/2014
[  393.985778][T17594] Call Trace:
[  393.991106][T17594]  dump_stack_lvl+0xcd/0x134
[  393.997281][T17594]  should_fail.cold+0x5/0xa
[  394.004410][T17594]  _copy_from_user+0x2c/0x180
06:19:51 executing program 1:
r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0)
mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800004, 0x12, r0, 0x0)
mmap(&(0x7f0000000000/0xa000)=nil, 0xa000, 0x2, 0x2172, 0xffffffffffffffff, 0x0)
socketpair(0x1e, 0x80005, 0x0, &(0x7f0000000340)={<r1=>0x0, <r2=>0x0})
r3 = socket$unix(0x1, 0x1, 0x0)
r4 = socket$unix(0x1, 0x1, 0x0)
r5 = openat$khugepaged_scan(0xffffff9c, &(0x7f00000000c0), 0x1, 0x0)
poll(&(0x7f0000000140)=[{r1, 0x3}, {0xffffffffffffffff, 0x10a2}, {r3, 0x1}, {r2, 0x64c}, {r4, 0x9041}, {0xffffffffffffffff, 0x140}, {r5, 0x10}], 0x7, 0xff)

[  394.012687][T17594]  __do_sys_memfd_create+0x169/0x5a0
[  394.022890][T17594]  ? hmm_vma_walk_hugetlb_entry+0x8b0/0x8b0
[  394.022936][T17594]  ? syscall_enter_from_user_mode_prepare+0x17/0x40
[  394.022975][T17594]  __do_fast_syscall_32+0x65/0xf0
[  394.023021][T17594]  do_fast_syscall_32+0x2f/0x70
[  394.057754][T17594]  entry_SYSENTER_compat_after_hwframe+0x4d/0x5c
06:19:51 executing program 0:
r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0)
mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800004, 0x12, r0, 0x0)
mmap(&(0x7f0000000000/0xa000)=nil, 0xa000, 0x2, 0x2172, 0xffffffffffffffff, 0x0)
socketpair(0x1e, 0x80002, 0x0, &(0x7f0000000340)={0x0, 0x0})

[  394.068680][T17594] RIP: 0023:0xf7f3f549
06:19:51 executing program 1:
r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0)
mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800004, 0x12, r0, 0x0)
mmap(&(0x7f0000000000/0xa000)=nil, 0xa000, 0x2, 0x2172, 0xffffffffffffffff, 0x0)
socketpair(0x1e, 0x80005, 0x0, &(0x7f0000000340)={<r1=>0x0, <r2=>0x0})
r3 = socket$unix(0x1, 0x1, 0x0)
r4 = socket$unix(0x1, 0x1, 0x0)
r5 = openat$khugepaged_scan(0xffffff9c, &(0x7f00000000c0), 0x1, 0x0)
poll(&(0x7f0000000140)=[{r1, 0x3}, {0xffffffffffffffff, 0x10a2}, {r3, 0x1}, {r2, 0x64c}, {r4, 0x9041}, {0xffffffffffffffff, 0x140}, {r5, 0x10}], 0x7, 0xff)

[  394.081093][T17594] Code: 03 74 c0 01 10 05 03 74 b8 01 10 06 03 74 b4 01 10 07 03 74 b0 01 10 08 03 74 d8 01 00 00 00 00 00 51 52 55 89 e5 0f 34 cd 80 <5d> 5a 59 c3 90 90 90 90 8d b4 26 00 00 00 00 8d b4 26 00 00 00 00
[  394.127273][T17594] RSP: 002b:00000000f553940c EFLAGS: 00000296 ORIG_RAX: 0000000000000164
[  394.144089][T17594] RAX: ffffffffffffffda RBX: 00000000080ea0f5 RCX: 0000000000000000
06:19:51 executing program 0:
r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0)
mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800004, 0x12, r0, 0x0)
mmap(&(0x7f0000000000/0xa000)=nil, 0xa000, 0x2, 0x2172, 0xffffffffffffffff, 0x0)
socketpair(0x1e, 0x80002, 0x0, &(0x7f0000000340)={0x0, 0x0})

[  394.163484][T17594] RDX: 00000000f553946c RSI: 0000000000000000 RDI: 0000000000000000
[  394.183324][T17594] RBP: 0000000020000300 R08: 0000000000000000 R09: 0000000000000000
[  394.194168][T17594] R10: 0000000000000000 R11: 0000000000000000 R12: 0000000000000000
[  394.204263][T17594] R13: 0000000000000000 R14: 0000000000000000 R15: 0000000000000000
06:19:52 executing program 2:
r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0)
mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800004, 0x12, r0, 0x0)
preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x9, 0x0)
r1 = syz_open_dev$tty1(0xc, 0x4, 0x1)
write$binfmt_elf64(r1, &(0x7f0000000380)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, 0x0, 0x3, 0x38, 0x1, 0x5, 0x4, 0x4}, [{0x5, 0x9, 0x6, 0x101, 0x6, 0x4, 0x9, 0x6}, {0x5, 0x3, 0x5e61, 0x80000000, 0xcc3, 0x9, 0x7, 0x8}], "d1660f10e0ac4a6edbf3aa53803c8f57ef2a12069e82553332d2b96d67f2dbc5b04959dad57c303d876233684f5e9ad402a193da791e11122f2cccbf10d6d499f5e16385d09f63891a965d80bcb68b551fabffb4bf0b5c372b4d69cdefac988201a40429a8d0dc699820193afcab08070fde89c22e16b43dde5e37d9a3df0cd352e8667f163774d9dc3c79571e5100046281", ['\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00']}, 0x842)

06:19:52 executing program 3 (fault-call:3 fault-nth:2):
r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0)
mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800004, 0x12, r0, 0x0)
preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x9, 0x0)
syz_mount_image$reiserfs(&(0x7f0000000140), &(0x7f0000000180)='./file0\x00', 0x0, 0x0, &(0x7f0000000300), 0x0, &(0x7f0000000440))

06:19:52 executing program 1:
r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0)
preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x9, 0x0)
mmap(&(0x7f0000000000/0xa000)=nil, 0xa000, 0x2, 0x2172, 0xffffffffffffffff, 0x0)
socketpair(0x1e, 0x80005, 0x0, &(0x7f0000000340)={<r1=>0x0, <r2=>0x0})
r3 = socket$unix(0x1, 0x1, 0x0)
r4 = socket$unix(0x1, 0x1, 0x0)
r5 = openat$khugepaged_scan(0xffffff9c, &(0x7f00000000c0), 0x1, 0x0)
poll(&(0x7f0000000140)=[{r1, 0x3}, {0xffffffffffffffff, 0x10a2}, {r3, 0x1}, {r2, 0x64c}, {r4, 0x9041}, {0xffffffffffffffff, 0x140}, {r5, 0x10}], 0x7, 0xff)

06:19:52 executing program 0:
r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0)
mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800004, 0x12, r0, 0x0)
mmap(&(0x7f0000000000/0xa000)=nil, 0xa000, 0x2, 0x2172, 0xffffffffffffffff, 0x0)
socketpair(0x1e, 0x80002, 0x0, &(0x7f0000000340)={0x0, 0x0})

[  394.891064][T17621] FAULT_INJECTION: forcing a failure.
[  394.891064][T17621] name failslab, interval 1, probability 0, space 0, times 0
06:19:52 executing program 1:
r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0)
preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x9, 0x0)
mmap(&(0x7f0000000000/0xa000)=nil, 0xa000, 0x2, 0x2172, 0xffffffffffffffff, 0x0)
socketpair(0x1e, 0x80005, 0x0, &(0x7f0000000340)={<r1=>0x0, <r2=>0x0})
r3 = socket$unix(0x1, 0x1, 0x0)
r4 = socket$unix(0x1, 0x1, 0x0)
r5 = openat$khugepaged_scan(0xffffff9c, &(0x7f00000000c0), 0x1, 0x0)
poll(&(0x7f0000000140)=[{r1, 0x3}, {0xffffffffffffffff, 0x10a2}, {r3, 0x1}, {r2, 0x64c}, {r4, 0x9041}, {0xffffffffffffffff, 0x140}, {r5, 0x10}], 0x7, 0xff)

06:19:52 executing program 0:
r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0)
preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x9, 0x0)
mmap(&(0x7f0000000000/0xa000)=nil, 0xa000, 0x2, 0x2172, 0xffffffffffffffff, 0x0)
socketpair(0x1e, 0x80002, 0x0, &(0x7f0000000340)={0x0, 0x0})

[  394.920929][T17621] CPU: 0 PID: 17621 Comm: syz-executor.3 Not tainted 5.14.0-rc2-syzkaller #0
[  394.934937][T17621] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.14.0-2 04/01/2014
[  394.949547][T17621] Call Trace:
[  394.954407][T17621]  dump_stack_lvl+0xcd/0x134
[  394.961752][T17621]  should_fail.cold+0x5/0xa
[  394.969296][T17621]  ? shmem_destroy_inode+0x70/0x70
[  394.977443][T17621]  ? shmem_alloc_inode+0x18/0x40
[  394.985668][T17621]  should_failslab+0x5/0x10
[  394.985718][T17621]  kmem_cache_alloc+0x5e/0x4a0
[  394.985748][T17621]  ? shmem_destroy_inode+0x70/0x70
[  394.985777][T17621]  shmem_alloc_inode+0x18/0x40
[  395.012261][T17621]  ? shmem_destroy_inode+0x70/0x70
[  395.018545][T17621]  alloc_inode+0x61/0x230
[  395.024911][T17621]  new_inode+0x27/0x2f0
[  395.029921][T17621]  shmem_get_inode+0x195/0xc20
[  395.036791][T17621]  __shmem_file_setup+0xb8/0x310
06:19:52 executing program 1:
r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0)
preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x9, 0x0)
mmap(&(0x7f0000000000/0xa000)=nil, 0xa000, 0x2, 0x2172, 0xffffffffffffffff, 0x0)
socketpair(0x1e, 0x80005, 0x0, &(0x7f0000000340)={<r1=>0x0, <r2=>0x0})
r3 = socket$unix(0x1, 0x1, 0x0)
r4 = socket$unix(0x1, 0x1, 0x0)
r5 = openat$khugepaged_scan(0xffffff9c, &(0x7f00000000c0), 0x1, 0x0)
poll(&(0x7f0000000140)=[{r1, 0x3}, {0xffffffffffffffff, 0x10a2}, {r3, 0x1}, {r2, 0x64c}, {r4, 0x9041}, {0xffffffffffffffff, 0x140}, {r5, 0x10}], 0x7, 0xff)

06:19:52 executing program 0:
r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0)
preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x9, 0x0)
mmap(&(0x7f0000000000/0xa000)=nil, 0xa000, 0x2, 0x2172, 0xffffffffffffffff, 0x0)
socketpair(0x1e, 0x80002, 0x0, &(0x7f0000000340)={0x0, 0x0})

[  395.043995][T17621]  ? __sanitizer_cov_trace_const_cmp8+0x1d/0x70
[  395.056731][T17621]  __do_sys_memfd_create+0x26b/0x5a0
[  395.067923][T17621]  ? hmm_vma_walk_hugetlb_entry+0x8b0/0x8b0
[  395.076874][T17621]  ? syscall_enter_from_user_mode_prepare+0x17/0x40
[  395.086860][T17621]  __do_fast_syscall_32+0x65/0xf0
[  395.094643][T17621]  do_fast_syscall_32+0x2f/0x70
[  395.101776][T17621]  entry_SYSENTER_compat_after_hwframe+0x4d/0x5c
[  395.111565][T17621] RIP: 0023:0xf7f3f549
[  395.117851][T17621] Code: 03 74 c0 01 10 05 03 74 b8 01 10 06 03 74 b4 01 10 07 03 74 b0 01 10 08 03 74 d8 01 00 00 00 00 00 51 52 55 89 e5 0f 34 cd 80 <5d> 5a 59 c3 90 90 90 90 8d b4 26 00 00 00 00 8d b4 26 00 00 00 00
[  395.147381][T17621] RSP: 002b:00000000f553940c EFLAGS: 00000296 ORIG_RAX: 0000000000000164
[  395.160076][T17621] RAX: ffffffffffffffda RBX: 00000000080ea0f5 RCX: 0000000000000000
[  395.170574][T17621] RDX: 00000000f553946c RSI: 0000000000000000 RDI: 0000000000000000
[  395.181559][T17621] RBP: 0000000020000300 R08: 0000000000000000 R09: 0000000000000000
[  395.192565][T17621] R10: 0000000000000000 R11: 0000000000000000 R12: 0000000000000000
[  395.202520][T17621] R13: 0000000000000000 R14: 0000000000000000 R15: 0000000000000000
06:19:53 executing program 2:
r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0)
mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800004, 0x12, r0, 0x0)
preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x9, 0x0)
r1 = syz_open_dev$tty1(0xc, 0x4, 0x1)
write$binfmt_elf64(r1, &(0x7f0000000380)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, 0x0, 0x0, 0x38, 0x1, 0x5, 0x4, 0x4}, [{0x5, 0x9, 0x6, 0x101, 0x6, 0x4, 0x9, 0x6}, {0x5, 0x3, 0x5e61, 0x80000000, 0xcc3, 0x9, 0x7, 0x8}], "d1660f10e0ac4a6edbf3aa53803c8f57ef2a12069e82553332d2b96d67f2dbc5b04959dad57c303d876233684f5e9ad402a193da791e11122f2cccbf10d6d499f5e16385d09f63891a965d80bcb68b551fabffb4bf0b5c372b4d69cdefac988201a40429a8d0dc699820193afcab08070fde89c22e16b43dde5e37d9a3df0cd352e8667f163774d9dc3c79571e5100046281", ['\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00']}, 0x842)

06:19:53 executing program 1:
mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800004, 0x12, 0xffffffffffffffff, 0x0)
preadv(0xffffffffffffffff, &(0x7f00000001c0)=[{0x0}], 0x1, 0x9, 0x0)
mmap(&(0x7f0000000000/0xa000)=nil, 0xa000, 0x2, 0x2172, 0xffffffffffffffff, 0x0)
socketpair(0x1e, 0x80005, 0x0, &(0x7f0000000340)={<r0=>0x0, <r1=>0x0})
r2 = socket$unix(0x1, 0x1, 0x0)
r3 = socket$unix(0x1, 0x1, 0x0)
r4 = openat$khugepaged_scan(0xffffff9c, &(0x7f00000000c0), 0x1, 0x0)
poll(&(0x7f0000000140)=[{r0, 0x3}, {0xffffffffffffffff, 0x10a2}, {r2, 0x1}, {r1, 0x64c}, {r3, 0x9041}, {0xffffffffffffffff, 0x140}, {r4, 0x10}], 0x7, 0xff)

06:19:53 executing program 0:
r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0)
preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x9, 0x0)
mmap(&(0x7f0000000000/0xa000)=nil, 0xa000, 0x2, 0x2172, 0xffffffffffffffff, 0x0)
socketpair(0x1e, 0x80002, 0x0, &(0x7f0000000340)={0x0, 0x0})

06:19:53 executing program 3 (fault-call:3 fault-nth:3):
r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0)
mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800004, 0x12, r0, 0x0)
preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x9, 0x0)
syz_mount_image$reiserfs(&(0x7f0000000140), &(0x7f0000000180)='./file0\x00', 0x0, 0x0, &(0x7f0000000300), 0x0, &(0x7f0000000440))

[  395.857492][T17645] FAULT_INJECTION: forcing a failure.
[  395.857492][T17645] name failslab, interval 1, probability 0, space 0, times 0
[  395.875903][T17645] CPU: 1 PID: 17645 Comm: syz-executor.3 Not tainted 5.14.0-rc2-syzkaller #0
[  395.888138][T17645] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.14.0-2 04/01/2014
[  395.900659][T17645] Call Trace:
[  395.900675][T17645]  dump_stack_lvl+0xcd/0x134
[  395.900734][T17645]  should_fail.cold+0x5/0xa
[  395.900765][T17645]  ? security_inode_alloc+0x34/0x160
[  395.932079][T17645]  should_failslab+0x5/0x10
[  395.939713][T17645]  kmem_cache_alloc+0x5e/0x4a0
[  395.946608][T17645]  security_inode_alloc+0x34/0x160
[  395.954265][T17645]  inode_init_always+0x5d8/0xd60
[  395.961527][T17645]  alloc_inode+0x82/0x230
[  395.969241][T17645]  new_inode+0x27/0x2f0
[  395.975017][T17645]  shmem_get_inode+0x195/0xc20
[  395.981068][T17645]  __shmem_file_setup+0xb8/0x310
[  395.987276][T17645]  ? __sanitizer_cov_trace_const_cmp8+0x1d/0x70
[  395.995766][T17645]  __do_sys_memfd_create+0x26b/0x5a0
[  396.002129][T17645]  ? hmm_vma_walk_hugetlb_entry+0x8b0/0x8b0
[  396.009692][T17645]  ? syscall_enter_from_user_mode_prepare+0x17/0x40
[  396.019327][T17645]  __do_fast_syscall_32+0x65/0xf0
[  396.028574][T17645]  do_fast_syscall_32+0x2f/0x70
06:19:53 executing program 1:
mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800004, 0x12, 0xffffffffffffffff, 0x0)
preadv(0xffffffffffffffff, &(0x7f00000001c0)=[{0x0}], 0x1, 0x9, 0x0)
mmap(&(0x7f0000000000/0xa000)=nil, 0xa000, 0x2, 0x2172, 0xffffffffffffffff, 0x0)
socketpair(0x1e, 0x80005, 0x0, &(0x7f0000000340)={<r0=>0x0, <r1=>0x0})
r2 = socket$unix(0x1, 0x1, 0x0)
r3 = socket$unix(0x1, 0x1, 0x0)
r4 = openat$khugepaged_scan(0xffffff9c, &(0x7f00000000c0), 0x1, 0x0)
poll(&(0x7f0000000140)=[{r0, 0x3}, {0xffffffffffffffff, 0x10a2}, {r2, 0x1}, {r1, 0x64c}, {r3, 0x9041}, {0xffffffffffffffff, 0x140}, {r4, 0x10}], 0x7, 0xff)

[  396.037064][T17645]  entry_SYSENTER_compat_after_hwframe+0x4d/0x5c
[  396.046824][T17645] RIP: 0023:0xf7f3f549
[  396.052652][T17645] Code: 03 74 c0 01 10 05 03 74 b8 01 10 06 03 74 b4 01 10 07 03 74 b0 01 10 08 03 74 d8 01 00 00 00 00 00 51 52 55 89 e5 0f 34 cd 80 <5d> 5a 59 c3 90 90 90 90 8d b4 26 00 00 00 00 8d b4 26 00 00 00 00
[  396.081741][T17645] RSP: 002b:00000000f553940c EFLAGS: 00000296 ORIG_RAX: 0000000000000164
[  396.093923][T17645] RAX: ffffffffffffffda RBX: 00000000080ea0f5 RCX: 0000000000000000
[  396.104605][T17645] RDX: 00000000f553946c RSI: 0000000000000000 RDI: 0000000000000000
[  396.115392][T17645] RBP: 0000000020000300 R08: 0000000000000000 R09: 0000000000000000
[  396.127909][T17645] R10: 0000000000000000 R11: 0000000000000000 R12: 0000000000000000
[  396.139105][T17645] R13: 0000000000000000 R14: 0000000000000000 R15: 0000000000000000
06:19:53 executing program 0:
mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800004, 0x12, 0xffffffffffffffff, 0x0)
preadv(0xffffffffffffffff, &(0x7f00000001c0)=[{0x0}], 0x1, 0x9, 0x0)
mmap(&(0x7f0000000000/0xa000)=nil, 0xa000, 0x2, 0x2172, 0xffffffffffffffff, 0x0)
socketpair(0x1e, 0x80002, 0x0, &(0x7f0000000340)={0x0, 0x0})

06:19:53 executing program 3 (fault-call:3 fault-nth:4):
r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0)
mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800004, 0x12, r0, 0x0)
preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x9, 0x0)
syz_mount_image$reiserfs(&(0x7f0000000140), &(0x7f0000000180)='./file0\x00', 0x0, 0x0, &(0x7f0000000300), 0x0, &(0x7f0000000440))

06:19:53 executing program 1:
mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800004, 0x12, 0xffffffffffffffff, 0x0)
preadv(0xffffffffffffffff, &(0x7f00000001c0)=[{0x0}], 0x1, 0x9, 0x0)
mmap(&(0x7f0000000000/0xa000)=nil, 0xa000, 0x2, 0x2172, 0xffffffffffffffff, 0x0)
socketpair(0x1e, 0x80005, 0x0, &(0x7f0000000340)={<r0=>0x0, <r1=>0x0})
r2 = socket$unix(0x1, 0x1, 0x0)
r3 = socket$unix(0x1, 0x1, 0x0)
r4 = openat$khugepaged_scan(0xffffff9c, &(0x7f00000000c0), 0x1, 0x0)
poll(&(0x7f0000000140)=[{r0, 0x3}, {0xffffffffffffffff, 0x10a2}, {r2, 0x1}, {r1, 0x64c}, {r3, 0x9041}, {0xffffffffffffffff, 0x140}, {r4, 0x10}], 0x7, 0xff)

[  396.262506][T17660] FAULT_INJECTION: forcing a failure.
[  396.262506][T17660] name failslab, interval 1, probability 0, space 0, times 0
[  396.279649][T17660] CPU: 3 PID: 17660 Comm: syz-executor.3 Not tainted 5.14.0-rc2-syzkaller #0
[  396.292964][T17660] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.14.0-2 04/01/2014
[  396.306724][T17660] Call Trace:
[  396.311393][T17660]  dump_stack_lvl+0xcd/0x134
[  396.317700][T17660]  should_fail.cold+0x5/0xa
[  396.323625][T17660]  ? __d_alloc+0x2a/0x950
[  396.329602][T17660]  should_failslab+0x5/0x10
[  396.335492][T17660]  kmem_cache_alloc+0x5e/0x4a0
[  396.342454][T17660]  ? lockdep_hardirqs_on+0x79/0x100
[  396.349385][T17660]  __d_alloc+0x2a/0x950
[  396.355447][T17660]  d_alloc_pseudo+0x19/0x70
[  396.361536][T17660]  alloc_file_pseudo+0xc6/0x250
[  396.368481][T17660]  ? alloc_file+0x590/0x590
[  396.375044][T17660]  ? __sanitizer_cov_trace_const_cmp2+0x22/0x80
[  396.385534][T17660]  ? shmem_get_inode+0x59a/0xc20
[  396.392574][T17660]  __shmem_file_setup+0x144/0x310
[  396.399943][T17660]  ? __sanitizer_cov_trace_const_cmp8+0x1d/0x70
[  396.410361][T17660]  __do_sys_memfd_create+0x26b/0x5a0
[  396.418312][T17660]  ? hmm_vma_walk_hugetlb_entry+0x8b0/0x8b0
[  396.426768][T17660]  ? syscall_enter_from_user_mode_prepare+0x17/0x40
[  396.436651][T17660]  __do_fast_syscall_32+0x65/0xf0
[  396.444441][T17660]  do_fast_syscall_32+0x2f/0x70
[  396.451556][T17660]  entry_SYSENTER_compat_after_hwframe+0x4d/0x5c
[  396.461036][T17660] RIP: 0023:0xf7f3f549
[  396.466633][T17660] Code: 03 74 c0 01 10 05 03 74 b8 01 10 06 03 74 b4 01 10 07 03 74 b0 01 10 08 03 74 d8 01 00 00 00 00 00 51 52 55 89 e5 0f 34 cd 80 <5d> 5a 59 c3 90 90 90 90 8d b4 26 00 00 00 00 8d b4 26 00 00 00 00
[  396.496497][T17660] RSP: 002b:00000000f553940c EFLAGS: 00000296 ORIG_RAX: 0000000000000164
[  396.507498][T17660] RAX: ffffffffffffffda RBX: 00000000080ea0f5 RCX: 0000000000000000
[  396.517892][T17660] RDX: 00000000f553946c RSI: 0000000000000000 RDI: 0000000000000000
[  396.528577][T17660] RBP: 0000000020000300 R08: 0000000000000000 R09: 0000000000000000
[  396.539772][T17660] R10: 0000000000000000 R11: 0000000000000000 R12: 0000000000000000
[  396.551986][T17660] R13: 0000000000000000 R14: 0000000000000000 R15: 0000000000000000
06:19:54 executing program 2:
r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0)
mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800004, 0x12, r0, 0x0)
preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x9, 0x0)
r1 = syz_open_dev$tty1(0xc, 0x4, 0x1)
write$binfmt_elf64(r1, &(0x7f0000000380)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, 0x0, 0x0, 0x38, 0x0, 0x5, 0x4, 0x4}, [{0x5, 0x9, 0x6, 0x101, 0x6, 0x4, 0x9, 0x6}, {0x5, 0x3, 0x5e61, 0x80000000, 0xcc3, 0x9, 0x7, 0x8}], "d1660f10e0ac4a6edbf3aa53803c8f57ef2a12069e82553332d2b96d67f2dbc5b04959dad57c303d876233684f5e9ad402a193da791e11122f2cccbf10d6d499f5e16385d09f63891a965d80bcb68b551fabffb4bf0b5c372b4d69cdefac988201a40429a8d0dc699820193afcab08070fde89c22e16b43dde5e37d9a3df0cd352e8667f163774d9dc3c79571e5100046281", ['\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00']}, 0x842)

06:19:54 executing program 0:
mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800004, 0x12, 0xffffffffffffffff, 0x0)
preadv(0xffffffffffffffff, &(0x7f00000001c0)=[{0x0}], 0x1, 0x9, 0x0)
mmap(&(0x7f0000000000/0xa000)=nil, 0xa000, 0x2, 0x2172, 0xffffffffffffffff, 0x0)
socketpair(0x1e, 0x80002, 0x0, &(0x7f0000000340)={0x0, 0x0})

06:19:54 executing program 1:
r0 = openat(0xffffffffffffffff, 0x0, 0x0, 0x0)
mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800004, 0x12, r0, 0x0)
preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x9, 0x0)
mmap(&(0x7f0000000000/0xa000)=nil, 0xa000, 0x2, 0x2172, 0xffffffffffffffff, 0x0)
socketpair(0x1e, 0x80005, 0x0, &(0x7f0000000340)={<r1=>0x0, <r2=>0x0})
r3 = socket$unix(0x1, 0x1, 0x0)
r4 = socket$unix(0x1, 0x1, 0x0)
r5 = openat$khugepaged_scan(0xffffff9c, &(0x7f00000000c0), 0x1, 0x0)
poll(&(0x7f0000000140)=[{r1, 0x3}, {0xffffffffffffffff, 0x10a2}, {r3, 0x1}, {r2, 0x64c}, {r4, 0x9041}, {0xffffffffffffffff, 0x140}, {r5, 0x10}], 0x7, 0xff)

06:19:54 executing program 3 (fault-call:3 fault-nth:5):
r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0)
mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800004, 0x12, r0, 0x0)
preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x9, 0x0)
syz_mount_image$reiserfs(&(0x7f0000000140), &(0x7f0000000180)='./file0\x00', 0x0, 0x0, &(0x7f0000000300), 0x0, &(0x7f0000000440))

[  396.784753][T17674] FAULT_INJECTION: forcing a failure.
[  396.784753][T17674] name failslab, interval 1, probability 0, space 0, times 0
[  396.802175][T17674] CPU: 0 PID: 17674 Comm: syz-executor.3 Not tainted 5.14.0-rc2-syzkaller #0
[  396.815027][T17674] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.14.0-2 04/01/2014
[  396.815044][T17674] Call Trace:
[  396.815055][T17674]  dump_stack_lvl+0xcd/0x134
[  396.815095][T17674]  should_fail.cold+0x5/0xa
[  396.815125][T17674]  ? __alloc_file+0x21/0x280
[  396.815149][T17674]  should_failslab+0x5/0x10
[  396.815175][T17674]  kmem_cache_alloc+0x5e/0x4a0
[  396.815204][T17674]  __alloc_file+0x21/0x280
[  396.815227][T17674]  alloc_empty_file+0x6d/0x170
06:19:54 executing program 0:
mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800004, 0x12, 0xffffffffffffffff, 0x0)
preadv(0xffffffffffffffff, &(0x7f00000001c0)=[{0x0}], 0x1, 0x9, 0x0)
mmap(&(0x7f0000000000/0xa000)=nil, 0xa000, 0x2, 0x2172, 0xffffffffffffffff, 0x0)
socketpair(0x1e, 0x80002, 0x0, &(0x7f0000000340)={0x0, 0x0})

[  396.882232][T17674]  alloc_file+0x59/0x590
[  396.890909][T17674]  alloc_file_pseudo+0x165/0x250
[  396.898782][T17674]  ? alloc_file+0x590/0x590
[  396.905308][T17674]  ? __sanitizer_cov_trace_const_cmp2+0x22/0x80
[  396.915227][T17674]  ? shmem_get_inode+0x59a/0xc20
[  396.922854][T17674]  __shmem_file_setup+0x144/0x310
[  396.931344][T17674]  ? __sanitizer_cov_trace_const_cmp8+0x1d/0x70
[  396.940191][T17674]  __do_sys_memfd_create+0x26b/0x5a0
[  396.947966][T17674]  ? hmm_vma_walk_hugetlb_entry+0x8b0/0x8b0
[  396.957388][T17674]  ? syscall_enter_from_user_mode_prepare+0x17/0x40
[  396.966905][T17674]  __do_fast_syscall_32+0x65/0xf0
06:19:54 executing program 0:
r0 = openat(0xffffffffffffffff, 0x0, 0x0, 0x0)
mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800004, 0x12, r0, 0x0)
preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x9, 0x0)
mmap(&(0x7f0000000000/0xa000)=nil, 0xa000, 0x2, 0x2172, 0xffffffffffffffff, 0x0)
socketpair(0x1e, 0x80002, 0x0, &(0x7f0000000340)={0x0, 0x0})

[  396.974297][T17674]  do_fast_syscall_32+0x2f/0x70
[  396.982828][T17674]  entry_SYSENTER_compat_after_hwframe+0x4d/0x5c
[  396.991895][T17674] RIP: 0023:0xf7f3f549
[  396.997171][T17674] Code: 03 74 c0 01 10 05 03 74 b8 01 10 06 03 74 b4 01 10 07 03 74 b0 01 10 08 03 74 d8 01 00 00 00 00 00 51 52 55 89 e5 0f 34 cd 80 <5d> 5a 59 c3 90 90 90 90 8d b4 26 00 00 00 00 8d b4 26 00 00 00 00
[  397.025543][T17674] RSP: 002b:00000000f553940c EFLAGS: 00000296 ORIG_RAX: 0000000000000164
[  397.038304][T17674] RAX: ffffffffffffffda RBX: 00000000080ea0f5 RCX: 0000000000000000
[  397.048796][T17674] RDX: 00000000f553946c RSI: 0000000000000000 RDI: 0000000000000000
[  397.059016][T17674] RBP: 0000000020000300 R08: 0000000000000000 R09: 0000000000000000
[  397.068168][T17674] R10: 0000000000000000 R11: 0000000000000000 R12: 0000000000000000
[  397.079726][T17674] R13: 0000000000000000 R14: 0000000000000000 R15: 0000000000000000
06:19:54 executing program 0:
r0 = openat(0xffffffffffffffff, 0x0, 0x0, 0x0)
mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800004, 0x12, r0, 0x0)
preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x9, 0x0)
mmap(&(0x7f0000000000/0xa000)=nil, 0xa000, 0x2, 0x2172, 0xffffffffffffffff, 0x0)
socketpair(0x1e, 0x80002, 0x0, &(0x7f0000000340)={0x0, 0x0})

06:19:54 executing program 1:
r0 = openat(0xffffffffffffffff, 0x0, 0x0, 0x0)
mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800004, 0x12, r0, 0x0)
preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x9, 0x0)
mmap(&(0x7f0000000000/0xa000)=nil, 0xa000, 0x2, 0x2172, 0xffffffffffffffff, 0x0)
socketpair(0x1e, 0x80005, 0x0, &(0x7f0000000340)={<r1=>0x0, <r2=>0x0})
r3 = socket$unix(0x1, 0x1, 0x0)
r4 = socket$unix(0x1, 0x1, 0x0)
r5 = openat$khugepaged_scan(0xffffff9c, &(0x7f00000000c0), 0x1, 0x0)
poll(&(0x7f0000000140)=[{r1, 0x3}, {0xffffffffffffffff, 0x10a2}, {r3, 0x1}, {r2, 0x64c}, {r4, 0x9041}, {0xffffffffffffffff, 0x140}, {r5, 0x10}], 0x7, 0xff)

06:19:55 executing program 2:
r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0)
mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800004, 0x12, r0, 0x0)
preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x9, 0x0)
r1 = syz_open_dev$tty1(0xc, 0x4, 0x1)
write$binfmt_elf64(r1, &(0x7f0000000380)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, 0x0, 0x0, 0x38, 0x0, 0x0, 0x4, 0x4}, [{0x5, 0x9, 0x6, 0x101, 0x6, 0x4, 0x9, 0x6}, {0x5, 0x3, 0x5e61, 0x80000000, 0xcc3, 0x9, 0x7, 0x8}], "d1660f10e0ac4a6edbf3aa53803c8f57ef2a12069e82553332d2b96d67f2dbc5b04959dad57c303d876233684f5e9ad402a193da791e11122f2cccbf10d6d499f5e16385d09f63891a965d80bcb68b551fabffb4bf0b5c372b4d69cdefac988201a40429a8d0dc699820193afcab08070fde89c22e16b43dde5e37d9a3df0cd352e8667f163774d9dc3c79571e5100046281", ['\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00']}, 0x842)

06:19:55 executing program 3 (fault-call:3 fault-nth:6):
r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0)
mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800004, 0x12, r0, 0x0)
preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x9, 0x0)
syz_mount_image$reiserfs(&(0x7f0000000140), &(0x7f0000000180)='./file0\x00', 0x0, 0x0, &(0x7f0000000300), 0x0, &(0x7f0000000440))

06:19:55 executing program 0:
r0 = openat(0xffffffffffffffff, 0x0, 0x0, 0x0)
mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800004, 0x12, r0, 0x0)
preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x9, 0x0)
mmap(&(0x7f0000000000/0xa000)=nil, 0xa000, 0x2, 0x2172, 0xffffffffffffffff, 0x0)
socketpair(0x1e, 0x80002, 0x0, &(0x7f0000000340)={0x0, 0x0})

06:19:55 executing program 1:
r0 = openat(0xffffffffffffffff, 0x0, 0x0, 0x0)
mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800004, 0x12, r0, 0x0)
preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x9, 0x0)
mmap(&(0x7f0000000000/0xa000)=nil, 0xa000, 0x2, 0x2172, 0xffffffffffffffff, 0x0)
socketpair(0x1e, 0x80005, 0x0, &(0x7f0000000340)={<r1=>0x0, <r2=>0x0})
r3 = socket$unix(0x1, 0x1, 0x0)
r4 = socket$unix(0x1, 0x1, 0x0)
r5 = openat$khugepaged_scan(0xffffff9c, &(0x7f00000000c0), 0x1, 0x0)
poll(&(0x7f0000000140)=[{r1, 0x3}, {0xffffffffffffffff, 0x10a2}, {r3, 0x1}, {r2, 0x64c}, {r4, 0x9041}, {0xffffffffffffffff, 0x140}, {r5, 0x10}], 0x7, 0xff)

[  397.666727][T17697] FAULT_INJECTION: forcing a failure.
[  397.666727][T17697] name failslab, interval 1, probability 0, space 0, times 0
[  397.690465][T17697] CPU: 0 PID: 17697 Comm: syz-executor.3 Not tainted 5.14.0-rc2-syzkaller #0
06:19:55 executing program 0:
r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0)
mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x0, 0x12, r0, 0x0)
preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x9, 0x0)
mmap(&(0x7f0000000000/0xa000)=nil, 0xa000, 0x2, 0x2172, 0xffffffffffffffff, 0x0)
socketpair(0x1e, 0x80002, 0x0, &(0x7f0000000340)={0x0, 0x0})

[  397.704380][T17697] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.14.0-2 04/01/2014
06:19:55 executing program 1:
r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0)
mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x0, 0x12, r0, 0x0)
preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x9, 0x0)
mmap(&(0x7f0000000000/0xa000)=nil, 0xa000, 0x2, 0x2172, 0xffffffffffffffff, 0x0)
socketpair(0x1e, 0x80005, 0x0, &(0x7f0000000340)={<r1=>0x0, <r2=>0x0})
r3 = socket$unix(0x1, 0x1, 0x0)
r4 = socket$unix(0x1, 0x1, 0x0)
r5 = openat$khugepaged_scan(0xffffff9c, &(0x7f00000000c0), 0x1, 0x0)
poll(&(0x7f0000000140)=[{r1, 0x3}, {0xffffffffffffffff, 0x10a2}, {r3, 0x1}, {r2, 0x64c}, {r4, 0x9041}, {0xffffffffffffffff, 0x140}, {r5, 0x10}], 0x7, 0xff)

[  397.717665][T17697] Call Trace:
[  397.717912][T17697]  dump_stack_lvl+0xcd/0x134
[  397.718019][T17697]  should_fail.cold+0x5/0xa
06:19:55 executing program 3 (fault-call:3 fault-nth:7):
r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0)
mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800004, 0x12, r0, 0x0)
preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x9, 0x0)
syz_mount_image$reiserfs(&(0x7f0000000140), &(0x7f0000000180)='./file0\x00', 0x0, 0x0, &(0x7f0000000300), 0x0, &(0x7f0000000440))

[  397.718047][T17697]  ? security_file_alloc+0x34/0x170
[  397.718159][T17697]  should_failslab+0x5/0x10
[  397.718304][T17697]  kmem_cache_alloc+0x5e/0x4a0
[  397.718332][T17697]  security_file_alloc+0x34/0x170
[  397.718357][T17697]  __alloc_file+0xd8/0x280
[  397.718378][T17697]  alloc_empty_file+0x6d/0x170
[  397.718398][T17697]  alloc_file+0x59/0x590
[  397.718567][T17697]  alloc_file_pseudo+0x165/0x250
[  397.718591][T17697]  ? alloc_file+0x590/0x590
[  397.718610][T17697]  ? __sanitizer_cov_trace_const_cmp2+0x22/0x80
[  397.718722][T17697]  ? shmem_get_inode+0x59a/0xc20
[  397.718811][T17697]  __shmem_file_setup+0x144/0x310
[  397.718832][T17697]  ? __sanitizer_cov_trace_const_cmp8+0x1d/0x70
06:19:55 executing program 1:
r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0)
mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x0, 0x12, r0, 0x0)
preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x9, 0x0)
mmap(&(0x7f0000000000/0xa000)=nil, 0xa000, 0x2, 0x2172, 0xffffffffffffffff, 0x0)
socketpair(0x1e, 0x80005, 0x0, &(0x7f0000000340)={<r1=>0x0, <r2=>0x0})
r3 = socket$unix(0x1, 0x1, 0x0)
r4 = socket$unix(0x1, 0x1, 0x0)
r5 = openat$khugepaged_scan(0xffffff9c, &(0x7f00000000c0), 0x1, 0x0)
poll(&(0x7f0000000140)=[{r1, 0x3}, {0xffffffffffffffff, 0x10a2}, {r3, 0x1}, {r2, 0x64c}, {r4, 0x9041}, {0xffffffffffffffff, 0x140}, {r5, 0x10}], 0x7, 0xff)

[  397.718945][T17697]  __do_sys_memfd_create+0x26b/0x5a0
[  397.719036][T17697]  ? hmm_vma_walk_hugetlb_entry+0x8b0/0x8b0
[  397.719060][T17697]  ? syscall_enter_from_user_mode_prepare+0x17/0x40
[  397.719156][T17697]  __do_fast_syscall_32+0x65/0xf0
[  397.719181][T17697]  do_fast_syscall_32+0x2f/0x70
[  397.719268][T17697]  entry_SYSENTER_compat_after_hwframe+0x4d/0x5c
[  397.719290][T17697] RIP: 0023:0xf7f3f549
[  397.719373][T17697] Code: 03 74 c0 01 10 05 03 74 b8 01 10 06 03 74 b4 01 10 07 03 74 b0 01 10 08 03 74 d8 01 00 00 00 00 00 51 52 55 89 e5 0f 34 cd 80 <5d> 5a 59 c3 90 90 90 90 8d b4 26 00 00 00 00 8d b4 26 00 00 00 00
[  397.719394][T17697] RSP: 002b:00000000f553940c EFLAGS: 00000296 ORIG_RAX: 0000000000000164
[  397.719506][T17697] RAX: ffffffffffffffda RBX: 00000000080ea0f5 RCX: 0000000000000000
[  397.719520][T17697] RDX: 00000000f553946c RSI: 0000000000000000 RDI: 0000000000000000
[  397.719534][T17697] RBP: 0000000020000300 R08: 0000000000000000 R09: 0000000000000000
[  397.719609][T17697] R10: 0000000000000000 R11: 0000000000000000 R12: 0000000000000000
[  397.719621][T17697] R13: 0000000000000000 R14: 0000000000000000 R15: 0000000000000000
[  397.804703][T17707] FAULT_INJECTION: forcing a failure.
[  397.804703][T17707] name failslab, interval 1, probability 0, space 0, times 0
[  398.062710][T17707] CPU: 1 PID: 17707 Comm: syz-executor.3 Not tainted 5.14.0-rc2-syzkaller #0
[  398.074667][T17707] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.14.0-2 04/01/2014
[  398.086747][T17707] Call Trace:
[  398.091638][T17707]  dump_stack_lvl+0xcd/0x134
[  398.112677][T17707]  should_fail.cold+0x5/0xa
[  398.119526][T17707]  ? tomoyo_realpath_from_path+0xc3/0x620
[  398.128043][T17707]  should_failslab+0x5/0x10
[  398.133831][T17707]  __kmalloc+0x72/0x330
[  398.140064][T17707]  tomoyo_realpath_from_path+0xc3/0x620
[  398.148201][T17707]  ? tomoyo_profile+0x42/0x50
[  398.155440][T17707]  tomoyo_path_perm+0x21b/0x400
[  398.166943][T17707]  ? tomoyo_path_perm+0x1c1/0x400
[  398.174496][T17707]  ? tomoyo_check_open_permission+0x380/0x380
[  398.183134][T17707]  ? find_held_lock+0x2d/0x110
[  398.190530][T17707]  security_path_truncate+0xcf/0x140
[  398.198475][T17707]  do_sys_ftruncate+0x4d8/0x8e0
[  398.205248][T17707]  __do_fast_syscall_32+0x65/0xf0
[  398.212185][T17707]  do_fast_syscall_32+0x2f/0x70
[  398.218541][T17707]  entry_SYSENTER_compat_after_hwframe+0x4d/0x5c
[  398.227222][T17707] RIP: 0023:0xf7f3f549
[  398.233152][T17707] Code: 03 74 c0 01 10 05 03 74 b8 01 10 06 03 74 b4 01 10 07 03 74 b0 01 10 08 03 74 d8 01 00 00 00 00 00 51 52 55 89 e5 0f 34 cd 80 <5d> 5a 59 c3 90 90 90 90 8d b4 26 00 00 00 00 8d b4 26 00 00 00 00
[  398.259780][T17707] RSP: 002b:00000000f5539418 EFLAGS: 00000292 ORIG_RAX: 000000000000005d
[  398.272223][T17707] RAX: ffffffffffffffda RBX: 0000000000000005 RCX: 0000000000000000
[  398.282510][T17707] RDX: 00000000f553946c RSI: 0000000000000000 RDI: 000000000816c000
[  398.293112][T17707] RBP: 0000000020000300 R08: 0000000000000000 R09: 0000000000000000
[  398.304978][T17707] R10: 0000000000000000 R11: 0000000000000000 R12: 0000000000000000
[  398.316583][T17707] R13: 0000000000000000 R14: 0000000000000000 R15: 0000000000000000
[  398.329628][T17707] ERROR: Out of memory at tomoyo_realpath_from_path.
06:19:56 executing program 0:
r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0)
mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x0, 0x12, r0, 0x0)
preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x9, 0x0)
mmap(&(0x7f0000000000/0xa000)=nil, 0xa000, 0x2, 0x2172, 0xffffffffffffffff, 0x0)
socketpair(0x1e, 0x80002, 0x0, &(0x7f0000000340)={0x0, 0x0})

06:19:56 executing program 1:
r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0)
mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x0, 0x12, r0, 0x0)
preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x9, 0x0)
mmap(&(0x7f0000000000/0xa000)=nil, 0xa000, 0x2, 0x2172, 0xffffffffffffffff, 0x0)
socketpair(0x1e, 0x80005, 0x0, &(0x7f0000000340)={<r1=>0x0, <r2=>0x0})
r3 = socket$unix(0x1, 0x1, 0x0)
r4 = socket$unix(0x1, 0x1, 0x0)
r5 = openat$khugepaged_scan(0xffffff9c, &(0x7f00000000c0), 0x1, 0x0)
poll(&(0x7f0000000140)=[{r1, 0x3}, {0xffffffffffffffff, 0x10a2}, {r3, 0x1}, {r2, 0x64c}, {r4, 0x9041}, {0xffffffffffffffff, 0x140}, {r5, 0x10}], 0x7, 0xff)

06:19:56 executing program 2:
r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0)
mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800004, 0x12, r0, 0x0)
preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x9, 0x0)
r1 = syz_open_dev$tty1(0xc, 0x4, 0x1)
write$binfmt_elf64(r1, &(0x7f0000000380)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, 0x0, 0x0, 0x38, 0x0, 0x0, 0x0, 0x4}, [{0x5, 0x9, 0x6, 0x101, 0x6, 0x4, 0x9, 0x6}, {0x5, 0x3, 0x5e61, 0x80000000, 0xcc3, 0x9, 0x7, 0x8}], "d1660f10e0ac4a6edbf3aa53803c8f57ef2a12069e82553332d2b96d67f2dbc5b04959dad57c303d876233684f5e9ad402a193da791e11122f2cccbf10d6d499f5e16385d09f63891a965d80bcb68b551fabffb4bf0b5c372b4d69cdefac988201a40429a8d0dc699820193afcab08070fde89c22e16b43dde5e37d9a3df0cd352e8667f163774d9dc3c79571e5100046281", ['\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00']}, 0x842)

06:19:56 executing program 3 (fault-call:3 fault-nth:8):
r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0)
mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800004, 0x12, r0, 0x0)
preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x9, 0x0)
syz_mount_image$reiserfs(&(0x7f0000000140), &(0x7f0000000180)='./file0\x00', 0x0, 0x0, &(0x7f0000000300), 0x0, &(0x7f0000000440))

[  398.621246][T17728] FAULT_INJECTION: forcing a failure.
[  398.621246][T17728] name failslab, interval 1, probability 0, space 0, times 0
06:19:56 executing program 1:
r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0)
mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800004, 0x10, r0, 0x0)
preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x9, 0x0)
mmap(&(0x7f0000000000/0xa000)=nil, 0xa000, 0x2, 0x2172, 0xffffffffffffffff, 0x0)
socketpair(0x1e, 0x80005, 0x0, &(0x7f0000000340)={<r1=>0x0, <r2=>0x0})
r3 = socket$unix(0x1, 0x1, 0x0)
r4 = socket$unix(0x1, 0x1, 0x0)
r5 = openat$khugepaged_scan(0xffffff9c, &(0x7f00000000c0), 0x1, 0x0)
poll(&(0x7f0000000140)=[{r1, 0x3}, {0xffffffffffffffff, 0x10a2}, {r3, 0x1}, {r2, 0x64c}, {r4, 0x9041}, {0xffffffffffffffff, 0x140}, {r5, 0x10}], 0x7, 0xff)

06:19:56 executing program 0:
r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0)
mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x0, 0x12, r0, 0x0)
preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x9, 0x0)
mmap(&(0x7f0000000000/0xa000)=nil, 0xa000, 0x2, 0x2172, 0xffffffffffffffff, 0x0)
socketpair(0x1e, 0x80002, 0x0, &(0x7f0000000340)={0x0, 0x0})

[  398.647160][T17728] CPU: 1 PID: 17728 Comm: syz-executor.3 Not tainted 5.14.0-rc2-syzkaller #0
[  398.659991][T17728] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.14.0-2 04/01/2014
[  398.672501][T17728] Call Trace:
[  398.676988][T17728]  dump_stack_lvl+0xcd/0x134
[  398.683604][T17728]  should_fail.cold+0x5/0xa
[  398.690160][T17728]  ? tomoyo_encode2.part.0+0xe9/0x3a0
[  398.697995][T17728]  should_failslab+0x5/0x10
[  398.704180][T17728]  __kmalloc+0x72/0x330
[  398.709990][T17728]  tomoyo_encode2.part.0+0xe9/0x3a0
[  398.716920][T17728]  tomoyo_encode+0x28/0x50
[  398.722986][T17728]  tomoyo_realpath_from_path+0x186/0x620
[  398.731005][T17728]  ? tomoyo_profile+0x42/0x50
[  398.737846][T17728]  tomoyo_path_perm+0x21b/0x400
[  398.744586][T17728]  ? tomoyo_path_perm+0x1c1/0x400
[  398.751790][T17728]  ? tomoyo_check_open_permission+0x380/0x380
[  398.760192][T17728]  ? find_held_lock+0x2d/0x110
[  398.766627][T17728]  security_path_truncate+0xcf/0x140
[  398.774329][T17728]  do_sys_ftruncate+0x4d8/0x8e0
[  398.780486][T17728]  __do_fast_syscall_32+0x65/0xf0
[  398.788537][T17728]  do_fast_syscall_32+0x2f/0x70
[  398.794670][T17728]  entry_SYSENTER_compat_after_hwframe+0x4d/0x5c
[  398.803192][T17728] RIP: 0023:0xf7f3f549
[  398.809156][T17728] Code: 03 74 c0 01 10 05 03 74 b8 01 10 06 03 74 b4 01 10 07 03 74 b0 01 10 08 03 74 d8 01 00 00 00 00 00 51 52 55 89 e5 0f 34 cd 80 <5d> 5a 59 c3 90 90 90 90 8d b4 26 00 00 00 00 8d b4 26 00 00 00 00
06:19:56 executing program 0:
r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0)
mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800004, 0x10, r0, 0x0)
preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x9, 0x0)
mmap(&(0x7f0000000000/0xa000)=nil, 0xa000, 0x2, 0x2172, 0xffffffffffffffff, 0x0)
socketpair(0x1e, 0x80002, 0x0, &(0x7f0000000340)={0x0, 0x0})

[  398.832851][T17728] RSP: 002b:00000000f5539418 EFLAGS: 00000292 ORIG_RAX: 000000000000005d
06:19:56 executing program 1:
r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0)
mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800004, 0x10, r0, 0x0)
preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x9, 0x0)
mmap(&(0x7f0000000000/0xa000)=nil, 0xa000, 0x2, 0x2172, 0xffffffffffffffff, 0x0)
socketpair(0x1e, 0x80005, 0x0, &(0x7f0000000340)={<r1=>0x0, <r2=>0x0})
r3 = socket$unix(0x1, 0x1, 0x0)
r4 = socket$unix(0x1, 0x1, 0x0)
r5 = openat$khugepaged_scan(0xffffff9c, &(0x7f00000000c0), 0x1, 0x0)
poll(&(0x7f0000000140)=[{r1, 0x3}, {0xffffffffffffffff, 0x10a2}, {r3, 0x1}, {r2, 0x64c}, {r4, 0x9041}, {0xffffffffffffffff, 0x140}, {r5, 0x10}], 0x7, 0xff)

[  398.844658][T17728] RAX: ffffffffffffffda RBX: 0000000000000005 RCX: 0000000000000000
[  398.855470][T17728] RDX: 00000000f553946c RSI: 0000000000000000 RDI: 000000000816c000
[  398.866159][T17728] RBP: 0000000020000300 R08: 0000000000000000 R09: 0000000000000000
[  398.876406][T17728] R10: 0000000000000000 R11: 0000000000000000 R12: 0000000000000000
[  398.887143][T17728] R13: 0000000000000000 R14: 0000000000000000 R15: 0000000000000000
[  398.908266][T17728] ERROR: Out of memory at tomoyo_realpath_from_path.
06:19:56 executing program 1:
r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0)
mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800004, 0x10, r0, 0x0)
preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x9, 0x0)
mmap(&(0x7f0000000000/0xa000)=nil, 0xa000, 0x2, 0x2172, 0xffffffffffffffff, 0x0)
socketpair(0x1e, 0x80005, 0x0, &(0x7f0000000340)={<r1=>0x0, <r2=>0x0})
r3 = socket$unix(0x1, 0x1, 0x0)
r4 = socket$unix(0x1, 0x1, 0x0)
r5 = openat$khugepaged_scan(0xffffff9c, &(0x7f00000000c0), 0x1, 0x0)
poll(&(0x7f0000000140)=[{r1, 0x3}, {0xffffffffffffffff, 0x10a2}, {r3, 0x1}, {r2, 0x64c}, {r4, 0x9041}, {0xffffffffffffffff, 0x140}, {r5, 0x10}], 0x7, 0xff)

06:19:56 executing program 0:
r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0)
mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800004, 0x10, r0, 0x0)
preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x9, 0x0)
mmap(&(0x7f0000000000/0xa000)=nil, 0xa000, 0x2, 0x2172, 0xffffffffffffffff, 0x0)
socketpair(0x1e, 0x80002, 0x0, &(0x7f0000000340)={0x0, 0x0})

06:19:57 executing program 2:
r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0)
mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800004, 0x12, r0, 0x0)
preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x9, 0x0)
r1 = syz_open_dev$tty1(0xc, 0x4, 0x1)
write$binfmt_elf64(r1, &(0x7f0000000380)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40}, [{0x5, 0x9, 0x6, 0x101, 0x6, 0x4, 0x9, 0x6}, {0x5, 0x3, 0x5e61, 0x80000000, 0xcc3, 0x9, 0x7, 0x8}], "d1660f10e0ac4a6edbf3aa53803c8f57ef2a12069e82553332d2b96d67f2dbc5b04959dad57c303d876233684f5e9ad402a193da791e11122f2cccbf10d6d499f5e16385d09f63891a965d80bcb68b551fabffb4bf0b5c372b4d69cdefac988201a40429a8d0dc699820193afcab08070fde89c22e16b43dde5e37d9a3df0cd352e8667f163774d9dc3c79571e5100046281", ['\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00']}, 0x842)

06:19:57 executing program 1:
r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0)
mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800004, 0x12, 0xffffffffffffffff, 0x0)
preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x9, 0x0)
mmap(&(0x7f0000000000/0xa000)=nil, 0xa000, 0x2, 0x2172, 0xffffffffffffffff, 0x0)
socketpair(0x1e, 0x80005, 0x0, &(0x7f0000000340)={<r1=>0x0, <r2=>0x0})
r3 = socket$unix(0x1, 0x1, 0x0)
r4 = socket$unix(0x1, 0x1, 0x0)
r5 = openat$khugepaged_scan(0xffffff9c, &(0x7f00000000c0), 0x1, 0x0)
poll(&(0x7f0000000140)=[{r1, 0x3}, {0xffffffffffffffff, 0x10a2}, {r3, 0x1}, {r2, 0x64c}, {r4, 0x9041}, {0xffffffffffffffff, 0x140}, {r5, 0x10}], 0x7, 0xff)

06:19:57 executing program 3 (fault-call:3 fault-nth:9):
r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0)
mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800004, 0x12, r0, 0x0)
preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x9, 0x0)
syz_mount_image$reiserfs(&(0x7f0000000140), &(0x7f0000000180)='./file0\x00', 0x0, 0x0, &(0x7f0000000300), 0x0, &(0x7f0000000440))

06:19:57 executing program 0:
r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0)
mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800004, 0x10, r0, 0x0)
preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x9, 0x0)
mmap(&(0x7f0000000000/0xa000)=nil, 0xa000, 0x2, 0x2172, 0xffffffffffffffff, 0x0)
socketpair(0x1e, 0x80002, 0x0, &(0x7f0000000340)={0x0, 0x0})

[  399.532989][T17758] FAULT_INJECTION: forcing a failure.
[  399.532989][T17758] name failslab, interval 1, probability 0, space 0, times 0
[  399.553540][T17758] CPU: 1 PID: 17758 Comm: syz-executor.3 Not tainted 5.14.0-rc2-syzkaller #0
06:19:57 executing program 0:
r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0)
mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800004, 0x12, 0xffffffffffffffff, 0x0)
preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x9, 0x0)
mmap(&(0x7f0000000000/0xa000)=nil, 0xa000, 0x2, 0x2172, 0xffffffffffffffff, 0x0)
socketpair(0x1e, 0x80002, 0x0, &(0x7f0000000340)={0x0, 0x0})

[  399.566838][T17758] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.14.0-2 04/01/2014
[  399.581629][T17758] Call Trace:
[  399.588115][T17758]  dump_stack_lvl+0xcd/0x134
[  399.588166][T17758]  should_fail.cold+0x5/0xa
[  399.588194][T17758]  ? getname_flags.part.0+0x50/0x4f0
[  399.588222][T17758]  should_failslab+0x5/0x10
[  399.623625][T17758]  kmem_cache_alloc+0x5e/0x4a0
06:19:57 executing program 1:
r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0)
mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800004, 0x12, 0xffffffffffffffff, 0x0)
preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x9, 0x0)
mmap(&(0x7f0000000000/0xa000)=nil, 0xa000, 0x2, 0x2172, 0xffffffffffffffff, 0x0)
socketpair(0x1e, 0x80005, 0x0, &(0x7f0000000340)={<r1=>0x0, <r2=>0x0})
r3 = socket$unix(0x1, 0x1, 0x0)
r4 = socket$unix(0x1, 0x1, 0x0)
r5 = openat$khugepaged_scan(0xffffff9c, &(0x7f00000000c0), 0x1, 0x0)
poll(&(0x7f0000000140)=[{r1, 0x3}, {0xffffffffffffffff, 0x10a2}, {r3, 0x1}, {r2, 0x64c}, {r4, 0x9041}, {0xffffffffffffffff, 0x140}, {r5, 0x10}], 0x7, 0xff)

[  399.631452][T17758]  getname_flags.part.0+0x50/0x4f0
[  399.640229][T17758]  ? lockdep_hardirqs_on_prepare+0x400/0x400
[  399.649276][T17758]  getname+0x8e/0xd0
[  399.658665][T17758]  do_sys_openat2+0xf5/0x420
[  399.664868][T17758]  ? build_open_flags+0x6f0/0x6f0
[  399.671903][T17758]  ? find_held_lock+0x2d/0x110
[  399.677020][T17758]  ? __context_tracking_exit+0xb8/0xe0
[  399.683094][T17758]  __ia32_compat_sys_openat+0x13f/0x1f0
[  399.689409][T17758]  ? __x64_compat_sys_open+0x1c0/0x1c0
[  399.696865][T17758]  ? syscall_enter_from_user_mode_prepare+0x17/0x40
[  399.707158][T17758]  __do_fast_syscall_32+0x65/0xf0
06:19:57 executing program 0:
r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0)
mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800004, 0x12, 0xffffffffffffffff, 0x0)
preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x9, 0x0)
mmap(&(0x7f0000000000/0xa000)=nil, 0xa000, 0x2, 0x2172, 0xffffffffffffffff, 0x0)
socketpair(0x1e, 0x80002, 0x0, &(0x7f0000000340)={0x0, 0x0})

[  399.714556][T17758]  do_fast_syscall_32+0x2f/0x70
[  399.720857][T17758]  entry_SYSENTER_compat_after_hwframe+0x4d/0x5c
[  399.729309][T17758] RIP: 0023:0xf7f3f549
[  399.734189][T17758] Code: 03 74 c0 01 10 05 03 74 b8 01 10 06 03 74 b4 01 10 07 03 74 b0 01 10 08 03 74 d8 01 00 00 00 00 00 51 52 55 89 e5 0f 34 cd 80 <5d> 5a 59 c3 90 90 90 90 8d b4 26 00 00 00 00 8d b4 26 00 00 00 00
[  399.759979][T17758] RSP: 002b:00000000f55393f0 EFLAGS: 00000282 ORIG_RAX: 0000000000000127
[  399.770675][T17758] RAX: ffffffffffffffda RBX: 00000000ffffff9c RCX: 00000000f55394b0
[  399.781262][T17758] RDX: 0000000000000002 RSI: 0000000000000000 RDI: 000000000816c000
[  399.791890][T17758] RBP: 0000000000000000 R08: 0000000000000000 R09: 0000000000000000
[  399.801878][T17758] R10: 0000000000000000 R11: 0000000000000000 R12: 0000000000000000
06:19:57 executing program 0:
r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0)
mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800004, 0x12, 0xffffffffffffffff, 0x0)
preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x9, 0x0)
mmap(&(0x7f0000000000/0xa000)=nil, 0xa000, 0x2, 0x2172, 0xffffffffffffffff, 0x0)
socketpair(0x1e, 0x80002, 0x0, &(0x7f0000000340)={0x0, 0x0})

[  399.811726][T17758] R13: 0000000000000000 R14: 0000000000000000 R15: 0000000000000000
06:19:58 executing program 2:
r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0)
mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800004, 0x12, r0, 0x0)
preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x9, 0x0)
r1 = syz_open_dev$tty1(0xc, 0x4, 0x1)
write$binfmt_elf64(r1, &(0x7f0000000380)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40}, [{0x5, 0x9, 0x6, 0x101, 0x6, 0x4, 0x9, 0x6}], "d1660f10e0ac4a6edbf3aa53803c8f57ef2a12069e82553332d2b96d67f2dbc5b04959dad57c303d876233684f5e9ad402a193da791e11122f2cccbf10d6d499f5e16385d09f63891a965d80bcb68b551fabffb4bf0b5c372b4d69cdefac988201a40429a8d0dc699820193afcab08070fde89c22e16b43dde5e37d9a3df0cd352e8667f163774d9dc3c79571e5100046281", ['\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00']}, 0x80a)

06:19:58 executing program 1:
r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0)
mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800004, 0x12, 0xffffffffffffffff, 0x0)
preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x9, 0x0)
mmap(&(0x7f0000000000/0xa000)=nil, 0xa000, 0x2, 0x2172, 0xffffffffffffffff, 0x0)
socketpair(0x1e, 0x80005, 0x0, &(0x7f0000000340)={<r1=>0x0, <r2=>0x0})
r3 = socket$unix(0x1, 0x1, 0x0)
r4 = socket$unix(0x1, 0x1, 0x0)
r5 = openat$khugepaged_scan(0xffffff9c, &(0x7f00000000c0), 0x1, 0x0)
poll(&(0x7f0000000140)=[{r1, 0x3}, {0xffffffffffffffff, 0x10a2}, {r3, 0x1}, {r2, 0x64c}, {r4, 0x9041}, {0xffffffffffffffff, 0x140}, {r5, 0x10}], 0x7, 0xff)

06:19:58 executing program 3 (fault-call:3 fault-nth:10):
r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0)
mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800004, 0x12, r0, 0x0)
preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x9, 0x0)
syz_mount_image$reiserfs(&(0x7f0000000140), &(0x7f0000000180)='./file0\x00', 0x0, 0x0, &(0x7f0000000300), 0x0, &(0x7f0000000440))

06:19:58 executing program 0:
r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0)
mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800004, 0x12, r0, 0x0)
preadv(0xffffffffffffffff, &(0x7f00000001c0)=[{0x0}], 0x1, 0x9, 0x0)
mmap(&(0x7f0000000000/0xa000)=nil, 0xa000, 0x2, 0x2172, 0xffffffffffffffff, 0x0)
socketpair(0x1e, 0x80002, 0x0, &(0x7f0000000340)={0x0, 0x0})

[  400.483626][T17785] FAULT_INJECTION: forcing a failure.
06:19:58 executing program 1:
r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0)
mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800004, 0x12, r0, 0x0)
preadv(0xffffffffffffffff, &(0x7f00000001c0)=[{0x0}], 0x1, 0x9, 0x0)
mmap(&(0x7f0000000000/0xa000)=nil, 0xa000, 0x2, 0x2172, 0xffffffffffffffff, 0x0)
socketpair(0x1e, 0x80005, 0x0, &(0x7f0000000340)={<r1=>0x0, <r2=>0x0})
r3 = socket$unix(0x1, 0x1, 0x0)
r4 = socket$unix(0x1, 0x1, 0x0)
r5 = openat$khugepaged_scan(0xffffff9c, &(0x7f00000000c0), 0x1, 0x0)
poll(&(0x7f0000000140)=[{r1, 0x3}, {0xffffffffffffffff, 0x10a2}, {r3, 0x1}, {r2, 0x64c}, {r4, 0x9041}, {0xffffffffffffffff, 0x140}, {r5, 0x10}], 0x7, 0xff)

[  400.483626][T17785] name fail_page_alloc, interval 1, probability 0, space 0, times 1
[  400.512338][T17785] CPU: 1 PID: 17785 Comm: syz-executor.3 Not tainted 5.14.0-rc2-syzkaller #0
[  400.526150][T17785] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.14.0-2 04/01/2014
[  400.538160][T17785] Call Trace:
[  400.544012][T17785]  dump_stack_lvl+0xcd/0x134
06:19:58 executing program 1:
r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0)
mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800004, 0x12, r0, 0x0)
preadv(0xffffffffffffffff, &(0x7f00000001c0)=[{0x0}], 0x1, 0x9, 0x0)
mmap(&(0x7f0000000000/0xa000)=nil, 0xa000, 0x2, 0x2172, 0xffffffffffffffff, 0x0)
socketpair(0x1e, 0x80005, 0x0, &(0x7f0000000340)={<r1=>0x0, <r2=>0x0})
r3 = socket$unix(0x1, 0x1, 0x0)
r4 = socket$unix(0x1, 0x1, 0x0)
r5 = openat$khugepaged_scan(0xffffff9c, &(0x7f00000000c0), 0x1, 0x0)
poll(&(0x7f0000000140)=[{r1, 0x3}, {0xffffffffffffffff, 0x10a2}, {r3, 0x1}, {r2, 0x64c}, {r4, 0x9041}, {0xffffffffffffffff, 0x140}, {r5, 0x10}], 0x7, 0xff)

[  400.551472][T17785]  should_fail.cold+0x5/0xa
[  400.551517][T17785]  prepare_alloc_pages+0x17b/0x580
[  400.551585][T17785]  __alloc_pages+0x12f/0x500
[  400.551611][T17785]  ? __alloc_pages_slowpath.constprop.0+0x21b0/0x21b0
06:19:58 executing program 1:
r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0)
mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800004, 0x12, r0, 0x0)
preadv(0xffffffffffffffff, &(0x7f00000001c0)=[{0x0}], 0x1, 0x9, 0x0)
mmap(&(0x7f0000000000/0xa000)=nil, 0xa000, 0x2, 0x2172, 0xffffffffffffffff, 0x0)
socketpair(0x1e, 0x80005, 0x0, &(0x7f0000000340)={<r1=>0x0, <r2=>0x0})
r3 = socket$unix(0x1, 0x1, 0x0)
r4 = socket$unix(0x1, 0x1, 0x0)
r5 = openat$khugepaged_scan(0xffffff9c, &(0x7f00000000c0), 0x1, 0x0)
poll(&(0x7f0000000140)=[{r1, 0x3}, {0xffffffffffffffff, 0x10a2}, {r3, 0x1}, {r2, 0x64c}, {r4, 0x9041}, {0xffffffffffffffff, 0x140}, {r5, 0x10}], 0x7, 0xff)

[  400.551640][T17785]  ? __lock_acquire+0x162f/0x54a0
06:19:58 executing program 0:
r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0)
mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800004, 0x12, r0, 0x0)
preadv(0xffffffffffffffff, &(0x7f00000001c0)=[{0x0}], 0x1, 0x9, 0x0)
mmap(&(0x7f0000000000/0xa000)=nil, 0xa000, 0x2, 0x2172, 0xffffffffffffffff, 0x0)
socketpair(0x1e, 0x80002, 0x0, &(0x7f0000000340)={0x0, 0x0})

[  400.551677][T17785]  alloc_pages+0x18c/0x2a0
[  400.551710][T17785]  allocate_slab+0x32e/0x4b0
[  400.551742][T17785]  ___slab_alloc+0x4ba/0x820
[  400.551768][T17785]  ? find_held_lock+0x2d/0x110
[  400.551798][T17785]  ? getname_flags.part.0+0x50/0x4f0
[  400.551829][T17785]  ? fs_reclaim_release+0x9c/0xf0
[  400.551858][T17785]  ? __slab_alloc.constprop.0+0x7b/0xf0
[  400.551889][T17785]  ? getname_flags.part.0+0x50/0x4f0
[  400.551915][T17785]  ? __slab_alloc.constprop.0+0xa7/0xf0
[  400.551940][T17785]  __slab_alloc.constprop.0+0xa7/0xf0
[  400.551992][T17785]  ? getname_flags.part.0+0x50/0x4f0
[  400.552028][T17785]  kmem_cache_alloc+0x3e1/0x4a0
[  400.552064][T17785]  getname_flags.part.0+0x50/0x4f0
[  400.552095][T17785]  ? lockdep_hardirqs_on_prepare+0x400/0x400
[  400.552129][T17785]  getname+0x8e/0xd0
[  400.552159][T17785]  do_sys_openat2+0xf5/0x420
[  400.552188][T17785]  ? build_open_flags+0x6f0/0x6f0
[  400.552221][T17785]  ? find_held_lock+0x2d/0x110
[  400.552258][T17785]  ? __context_tracking_exit+0xb8/0xe0
[  400.552297][T17785]  __ia32_compat_sys_openat+0x13f/0x1f0
[  400.552337][T17785]  ? __x64_compat_sys_open+0x1c0/0x1c0
[  400.552376][T17785]  ? syscall_enter_from_user_mode_prepare+0x17/0x40
[  400.552414][T17785]  __do_fast_syscall_32+0x65/0xf0
[  400.552443][T17785]  do_fast_syscall_32+0x2f/0x70
[  400.552470][T17785]  entry_SYSENTER_compat_after_hwframe+0x4d/0x5c
[  400.552498][T17785] RIP: 0023:0xf7f3f549
[  400.552519][T17785] Code: 03 74 c0 01 10 05 03 74 b8 01 10 06 03 74 b4 01 10 07 03 74 b0 01 10 08 03 74 d8 01 00 00 00 00 00 51 52 55 89 e5 0f 34 cd 80 <5d> 5a 59 c3 90 90 90 90 8d b4 26 00 00 00 00 8d b4 26 00 00 00 00
[  400.552544][T17785] RSP: 002b:00000000f55393f0 EFLAGS: 00000282 ORIG_RAX: 0000000000000127
[  400.552571][T17785] RAX: ffffffffffffffda RBX: 00000000ffffff9c RCX: 00000000f55394b0
[  400.552589][T17785] RDX: 0000000000000002 RSI: 0000000000000000 RDI: 000000000816c000
[  400.552605][T17785] RBP: 0000000000000000 R08: 0000000000000000 R09: 0000000000000000
[  400.552621][T17785] R10: 0000000000000000 R11: 0000000000000000 R12: 0000000000000000
[  400.552635][T17785] R13: 0000000000000000 R14: 0000000000000000 R15: 0000000000000000
06:19:58 executing program 2:
r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0)
mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800004, 0x12, r0, 0x0)
preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x9, 0x0)
r1 = syz_open_dev$tty1(0xc, 0x4, 0x1)
write$binfmt_elf64(r1, &(0x7f0000000380)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40}, [{0x0, 0x9, 0x6, 0x101, 0x6, 0x4, 0x9, 0x6}], "d1660f10e0ac4a6edbf3aa53803c8f57ef2a12069e82553332d2b96d67f2dbc5b04959dad57c303d876233684f5e9ad402a193da791e11122f2cccbf10d6d499f5e16385d09f63891a965d80bcb68b551fabffb4bf0b5c372b4d69cdefac988201a40429a8d0dc699820193afcab08070fde89c22e16b43dde5e37d9a3df0cd352e8667f163774d9dc3c79571e5100046281", ['\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00']}, 0x80a)

06:19:58 executing program 3 (fault-call:3 fault-nth:11):
r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0)
mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800004, 0x12, r0, 0x0)
preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x9, 0x0)
syz_mount_image$reiserfs(&(0x7f0000000140), &(0x7f0000000180)='./file0\x00', 0x0, 0x0, &(0x7f0000000300), 0x0, &(0x7f0000000440))

06:19:58 executing program 0:
r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0)
mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800004, 0x12, r0, 0x0)
preadv(0xffffffffffffffff, &(0x7f00000001c0)=[{0x0}], 0x1, 0x9, 0x0)
mmap(&(0x7f0000000000/0xa000)=nil, 0xa000, 0x2, 0x2172, 0xffffffffffffffff, 0x0)
socketpair(0x1e, 0x80002, 0x0, &(0x7f0000000340)={0x0, 0x0})

06:19:58 executing program 1:
r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0)
mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800004, 0x12, r0, 0x0)
preadv(r0, 0x0, 0x0, 0x9, 0x0)
mmap(&(0x7f0000000000/0xa000)=nil, 0xa000, 0x2, 0x2172, 0xffffffffffffffff, 0x0)
socketpair(0x1e, 0x80005, 0x0, &(0x7f0000000340)={<r1=>0x0, <r2=>0x0})
r3 = socket$unix(0x1, 0x1, 0x0)
r4 = socket$unix(0x1, 0x1, 0x0)
r5 = openat$khugepaged_scan(0xffffff9c, &(0x7f00000000c0), 0x1, 0x0)
poll(&(0x7f0000000140)=[{r1, 0x3}, {0xffffffffffffffff, 0x10a2}, {r3, 0x1}, {r2, 0x64c}, {r4, 0x9041}, {0xffffffffffffffff, 0x140}, {r5, 0x10}], 0x7, 0xff)

[  401.398089][T17812] FAULT_INJECTION: forcing a failure.
[  401.398089][T17812] name failslab, interval 1, probability 0, space 0, times 0
[  401.426765][T17812] CPU: 2 PID: 17812 Comm: syz-executor.3 Not tainted 5.14.0-rc2-syzkaller #0
[  401.441679][T17812] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.14.0-2 04/01/2014
[  401.455219][T17812] Call Trace:
[  401.460278][T17812]  dump_stack_lvl+0xcd/0x134
[  401.466548][T17812]  should_fail.cold+0x5/0xa
[  401.473542][T17812]  ? __alloc_file+0x21/0x280
[  401.479580][T17812]  should_failslab+0x5/0x10
[  401.485984][T17812]  kmem_cache_alloc+0x5e/0x4a0
[  401.486034][T17812]  __alloc_file+0x21/0x280
[  401.486066][T17812]  alloc_empty_file+0x6d/0x170
[  401.486101][T17812]  path_openat+0xde/0x27f0
[  401.510840][T17812]  ? __lock_acquire+0x162f/0x54a0
[  401.517656][T17812]  ? path_lookupat+0x860/0x860
[  401.525522][T17812]  ? lockdep_hardirqs_on_prepare+0x400/0x400
[  401.534440][T17812]  do_filp_open+0x1aa/0x400
[  401.540815][T17812]  ? may_open_dev+0xf0/0xf0
[  401.546921][T17812]  ? alloc_fd+0x2f0/0x670
[  401.553655][T17812]  ? lock_downgrade+0x6e0/0x6e0
[  401.560717][T17812]  ? rwlock_bug.part.0+0x90/0x90
[  401.567012][T17812]  ? __sanitizer_cov_trace_const_cmp8+0x1d/0x70
[  401.574845][T17812]  ? _find_next_bit+0x1e3/0x260
[  401.582162][T17812]  ? _raw_spin_unlock+0x24/0x40
06:19:59 executing program 0:
r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0)
mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800004, 0x12, r0, 0x0)
preadv(r0, 0x0, 0x0, 0x9, 0x0)
mmap(&(0x7f0000000000/0xa000)=nil, 0xa000, 0x2, 0x2172, 0xffffffffffffffff, 0x0)
socketpair(0x1e, 0x80002, 0x0, &(0x7f0000000340)={0x0, 0x0})

06:19:59 executing program 0:
r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0)
mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800004, 0x12, r0, 0x0)
preadv(r0, 0x0, 0x0, 0x9, 0x0)
mmap(&(0x7f0000000000/0xa000)=nil, 0xa000, 0x2, 0x2172, 0xffffffffffffffff, 0x0)
socketpair(0x1e, 0x80002, 0x0, &(0x7f0000000340)={0x0, 0x0})

[  401.589057][T17812]  ? alloc_fd+0x2f0/0x670
[  401.603744][T17812]  do_sys_openat2+0x16d/0x420
[  401.609588][T17812]  ? build_open_flags+0x6f0/0x6f0
[  401.625351][T17812]  ? find_held_lock+0x2d/0x110
[  401.635340][T17812]  ? __context_tracking_exit+0xb8/0xe0
[  401.643227][T17812]  __ia32_compat_sys_openat+0x13f/0x1f0
[  401.652676][T17812]  ? __x64_compat_sys_open+0x1c0/0x1c0
[  401.662897][T17812]  ? syscall_enter_from_user_mode_prepare+0x17/0x40
[  401.672263][T17812]  __do_fast_syscall_32+0x65/0xf0
[  401.680025][T17812]  do_fast_syscall_32+0x2f/0x70
[  401.687534][T17812]  entry_SYSENTER_compat_after_hwframe+0x4d/0x5c
[  401.711237][T17812] RIP: 0023:0xf7f3f549
[  401.716483][T17812] Code: 03 74 c0 01 10 05 03 74 b8 01 10 06 03 74 b4 01 10 07 03 74 b0 01 10 08 03 74 d8 01 00 00 00 00 00 51 52 55 89 e5 0f 34 cd 80 <5d> 5a 59 c3 90 90 90 90 8d b4 26 00 00 00 00 8d b4 26 00 00 00 00
06:19:59 executing program 0:
r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0)
mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800004, 0x12, r0, 0x0)
preadv(r0, 0x0, 0x0, 0x9, 0x0)
mmap(&(0x7f0000000000/0xa000)=nil, 0xa000, 0x2, 0x2172, 0xffffffffffffffff, 0x0)
socketpair(0x1e, 0x80002, 0x0, &(0x7f0000000340)={0x0, 0x0})

06:19:59 executing program 0:
r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0)
mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800004, 0x12, r0, 0x0)
preadv(r0, &(0x7f00000001c0), 0x0, 0x9, 0x0)
mmap(&(0x7f0000000000/0xa000)=nil, 0xa000, 0x2, 0x2172, 0xffffffffffffffff, 0x0)
socketpair(0x1e, 0x80002, 0x0, &(0x7f0000000340)={0x0, 0x0})

[  401.742708][T17812] RSP: 002b:00000000f55393f0 EFLAGS: 00000282 ORIG_RAX: 0000000000000127
[  401.757800][T17812] RAX: ffffffffffffffda RBX: 00000000ffffff9c RCX: 00000000f55394b0
[  401.770328][T17812] RDX: 0000000000000002 RSI: 0000000000000000 RDI: 000000000816c000
[  401.782497][T17812] RBP: 0000000000000000 R08: 0000000000000000 R09: 0000000000000000
[  401.794309][T17812] R10: 0000000000000000 R11: 0000000000000000 R12: 0000000000000000
[  401.804087][T17812] R13: 0000000000000000 R14: 0000000000000000 R15: 0000000000000000
06:19:59 executing program 2:
r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0)
mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800004, 0x12, r0, 0x0)
preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x9, 0x0)
r1 = syz_open_dev$tty1(0xc, 0x4, 0x1)
write$binfmt_elf64(r1, &(0x7f0000000380)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40}, [{0x0, 0x0, 0x6, 0x101, 0x6, 0x4, 0x9, 0x6}], "d1660f10e0ac4a6edbf3aa53803c8f57ef2a12069e82553332d2b96d67f2dbc5b04959dad57c303d876233684f5e9ad402a193da791e11122f2cccbf10d6d499f5e16385d09f63891a965d80bcb68b551fabffb4bf0b5c372b4d69cdefac988201a40429a8d0dc699820193afcab08070fde89c22e16b43dde5e37d9a3df0cd352e8667f163774d9dc3c79571e5100046281", ['\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00']}, 0x80a)

06:19:59 executing program 0:
r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0)
mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800004, 0x12, r0, 0x0)
preadv(r0, &(0x7f00000001c0), 0x0, 0x9, 0x0)
mmap(&(0x7f0000000000/0xa000)=nil, 0xa000, 0x2, 0x2172, 0xffffffffffffffff, 0x0)
socketpair(0x1e, 0x80002, 0x0, &(0x7f0000000340)={0x0, 0x0})

06:19:59 executing program 1:
r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0)
mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800004, 0x12, r0, 0x0)
preadv(r0, 0x0, 0x0, 0x9, 0x0)
mmap(&(0x7f0000000000/0xa000)=nil, 0xa000, 0x2, 0x2172, 0xffffffffffffffff, 0x0)
socketpair(0x1e, 0x80005, 0x0, &(0x7f0000000340)={<r1=>0x0, <r2=>0x0})
r3 = socket$unix(0x1, 0x1, 0x0)
r4 = socket$unix(0x1, 0x1, 0x0)
r5 = openat$khugepaged_scan(0xffffff9c, &(0x7f00000000c0), 0x1, 0x0)
poll(&(0x7f0000000140)=[{r1, 0x3}, {0xffffffffffffffff, 0x10a2}, {r3, 0x1}, {r2, 0x64c}, {r4, 0x9041}, {0xffffffffffffffff, 0x140}, {r5, 0x10}], 0x7, 0xff)

06:19:59 executing program 3 (fault-call:3 fault-nth:12):
r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0)
mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800004, 0x12, r0, 0x0)
preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x9, 0x0)
syz_mount_image$reiserfs(&(0x7f0000000140), &(0x7f0000000180)='./file0\x00', 0x0, 0x0, &(0x7f0000000300), 0x0, &(0x7f0000000440))

[  402.378917][T17838] FAULT_INJECTION: forcing a failure.
[  402.378917][T17838] name failslab, interval 1, probability 0, space 0, times 0
06:20:00 executing program 0:
r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0)
mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800004, 0x12, r0, 0x0)
preadv(r0, &(0x7f00000001c0), 0x0, 0x9, 0x0)
mmap(&(0x7f0000000000/0xa000)=nil, 0xa000, 0x2, 0x2172, 0xffffffffffffffff, 0x0)
socketpair(0x1e, 0x80002, 0x0, &(0x7f0000000340)={0x0, 0x0})

[  402.403677][T17838] CPU: 0 PID: 17838 Comm: syz-executor.3 Not tainted 5.14.0-rc2-syzkaller #0
[  402.418049][T17838] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.14.0-2 04/01/2014
[  402.429929][T17838] Call Trace:
[  402.429945][T17838]  dump_stack_lvl+0xcd/0x134
[  402.429990][T17838]  should_fail.cold+0x5/0xa
[  402.430029][T17838]  ? security_file_alloc+0x34/0x170
[  402.430059][T17838]  should_failslab+0x5/0x10
[  402.430087][T17838]  kmem_cache_alloc+0x5e/0x4a0
[  402.468823][T17838]  security_file_alloc+0x34/0x170
[  402.474792][T17838]  __alloc_file+0xd8/0x280
[  402.480519][T17838]  alloc_empty_file+0x6d/0x170
[  402.485874][T17838]  path_openat+0xde/0x27f0
[  402.490978][T17838]  ? __lock_acquire+0x162f/0x54a0
[  402.496436][T17838]  ? path_lookupat+0x860/0x860
[  402.502812][T17838]  ? lockdep_hardirqs_on_prepare+0x400/0x400
[  402.510168][T17838]  do_filp_open+0x1aa/0x400
[  402.515737][T17838]  ? may_open_dev+0xf0/0xf0
[  402.521362][T17838]  ? alloc_fd+0x2f0/0x670
[  402.527716][T17838]  ? lock_downgrade+0x6e0/0x6e0
[  402.534270][T17838]  ? rwlock_bug.part.0+0x90/0x90
[  402.541883][T17838]  ? __sanitizer_cov_trace_const_cmp8+0x1d/0x70
[  402.550582][T17838]  ? _find_next_bit+0x1e3/0x260
[  402.557058][T17838]  ? _raw_spin_unlock+0x24/0x40
[  402.563917][T17838]  ? alloc_fd+0x2f0/0x670
[  402.570758][T17838]  do_sys_openat2+0x16d/0x420
[  402.577643][T17838]  ? build_open_flags+0x6f0/0x6f0
[  402.584346][T17838]  ? find_held_lock+0x2d/0x110
[  402.591370][T17838]  ? __context_tracking_exit+0xb8/0xe0
[  402.598966][T17838]  __ia32_compat_sys_openat+0x13f/0x1f0
[  402.607079][T17838]  ? __x64_compat_sys_open+0x1c0/0x1c0
[  402.614849][T17838]  ? syscall_enter_from_user_mode_prepare+0x17/0x40
[  402.623166][T17838]  __do_fast_syscall_32+0x65/0xf0
[  402.629457][T17838]  do_fast_syscall_32+0x2f/0x70
[  402.635938][T17838]  entry_SYSENTER_compat_after_hwframe+0x4d/0x5c
[  402.644255][T17838] RIP: 0023:0xf7f3f549
[  402.649408][T17838] Code: 03 74 c0 01 10 05 03 74 b8 01 10 06 03 74 b4 01 10 07 03 74 b0 01 10 08 03 74 d8 01 00 00 00 00 00 51 52 55 89 e5 0f 34 cd 80 <5d> 5a 59 c3 90 90 90 90 8d b4 26 00 00 00 00 8d b4 26 00 00 00 00
[  402.676188][T17838] RSP: 002b:00000000f55393f0 EFLAGS: 00000282 ORIG_RAX: 0000000000000127
[  402.688214][T17838] RAX: ffffffffffffffda RBX: 00000000ffffff9c RCX: 00000000f55394b0
[  402.699039][T17838] RDX: 0000000000000002 RSI: 0000000000000000 RDI: 000000000816c000
[  402.709492][T17838] RBP: 0000000000000000 R08: 0000000000000000 R09: 0000000000000000
[  402.720340][T17838] R10: 0000000000000000 R11: 0000000000000000 R12: 0000000000000000
[  402.732056][T17838] R13: 0000000000000000 R14: 0000000000000000 R15: 0000000000000000
06:20:00 executing program 1:
r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0)
mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800004, 0x12, r0, 0x0)
preadv(r0, 0x0, 0x0, 0x9, 0x0)
mmap(&(0x7f0000000000/0xa000)=nil, 0xa000, 0x2, 0x2172, 0xffffffffffffffff, 0x0)
socketpair(0x1e, 0x80005, 0x0, &(0x7f0000000340)={<r1=>0x0, <r2=>0x0})
r3 = socket$unix(0x1, 0x1, 0x0)
r4 = socket$unix(0x1, 0x1, 0x0)
r5 = openat$khugepaged_scan(0xffffff9c, &(0x7f00000000c0), 0x1, 0x0)
poll(&(0x7f0000000140)=[{r1, 0x3}, {0xffffffffffffffff, 0x10a2}, {r3, 0x1}, {r2, 0x64c}, {r4, 0x9041}, {0xffffffffffffffff, 0x140}, {r5, 0x10}], 0x7, 0xff)

06:20:00 executing program 1:
r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0)
mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800004, 0x12, r0, 0x0)
preadv(r0, &(0x7f00000001c0), 0x0, 0x9, 0x0)
mmap(&(0x7f0000000000/0xa000)=nil, 0xa000, 0x2, 0x2172, 0xffffffffffffffff, 0x0)
socketpair(0x1e, 0x80005, 0x0, &(0x7f0000000340)={<r1=>0x0, <r2=>0x0})
r3 = socket$unix(0x1, 0x1, 0x0)
r4 = socket$unix(0x1, 0x1, 0x0)
r5 = openat$khugepaged_scan(0xffffff9c, &(0x7f00000000c0), 0x1, 0x0)
poll(&(0x7f0000000140)=[{r1, 0x3}, {0xffffffffffffffff, 0x10a2}, {r3, 0x1}, {r2, 0x64c}, {r4, 0x9041}, {0xffffffffffffffff, 0x140}, {r5, 0x10}], 0x7, 0xff)

06:20:00 executing program 1:
r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0)
mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800004, 0x12, r0, 0x0)
preadv(r0, &(0x7f00000001c0), 0x0, 0x9, 0x0)
mmap(&(0x7f0000000000/0xa000)=nil, 0xa000, 0x2, 0x2172, 0xffffffffffffffff, 0x0)
socketpair(0x1e, 0x80005, 0x0, &(0x7f0000000340)={<r1=>0x0, <r2=>0x0})
r3 = socket$unix(0x1, 0x1, 0x0)
r4 = socket$unix(0x1, 0x1, 0x0)
r5 = openat$khugepaged_scan(0xffffff9c, &(0x7f00000000c0), 0x1, 0x0)
poll(&(0x7f0000000140)=[{r1, 0x3}, {0xffffffffffffffff, 0x10a2}, {r3, 0x1}, {r2, 0x64c}, {r4, 0x9041}, {0xffffffffffffffff, 0x140}, {r5, 0x10}], 0x7, 0xff)

06:20:00 executing program 2:
r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0)
mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800004, 0x12, r0, 0x0)
preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x9, 0x0)
r1 = syz_open_dev$tty1(0xc, 0x4, 0x1)
write$binfmt_elf64(r1, &(0x7f0000000380)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40}, [{0x0, 0x0, 0x0, 0x101, 0x6, 0x4, 0x9, 0x6}], "d1660f10e0ac4a6edbf3aa53803c8f57ef2a12069e82553332d2b96d67f2dbc5b04959dad57c303d876233684f5e9ad402a193da791e11122f2cccbf10d6d499f5e16385d09f63891a965d80bcb68b551fabffb4bf0b5c372b4d69cdefac988201a40429a8d0dc699820193afcab08070fde89c22e16b43dde5e37d9a3df0cd352e8667f163774d9dc3c79571e5100046281", ['\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00']}, 0x80a)

06:20:00 executing program 1:
r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0)
mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800004, 0x12, r0, 0x0)
preadv(r0, &(0x7f00000001c0), 0x0, 0x9, 0x0)
mmap(&(0x7f0000000000/0xa000)=nil, 0xa000, 0x2, 0x2172, 0xffffffffffffffff, 0x0)
socketpair(0x1e, 0x80005, 0x0, &(0x7f0000000340)={<r1=>0x0, <r2=>0x0})
r3 = socket$unix(0x1, 0x1, 0x0)
r4 = socket$unix(0x1, 0x1, 0x0)
r5 = openat$khugepaged_scan(0xffffff9c, &(0x7f00000000c0), 0x1, 0x0)
poll(&(0x7f0000000140)=[{r1, 0x3}, {0xffffffffffffffff, 0x10a2}, {r3, 0x1}, {r2, 0x64c}, {r4, 0x9041}, {0xffffffffffffffff, 0x140}, {r5, 0x10}], 0x7, 0xff)

06:20:00 executing program 3 (fault-call:3 fault-nth:13):
r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0)
mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800004, 0x12, r0, 0x0)
preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x9, 0x0)
syz_mount_image$reiserfs(&(0x7f0000000140), &(0x7f0000000180)='./file0\x00', 0x0, 0x0, &(0x7f0000000300), 0x0, &(0x7f0000000440))

06:20:00 executing program 0:
r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0)
mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800004, 0x12, r0, 0x0)
preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x0, 0x0)
mmap(&(0x7f0000000000/0xa000)=nil, 0xa000, 0x2, 0x2172, 0xffffffffffffffff, 0x0)
socketpair(0x1e, 0x80002, 0x0, &(0x7f0000000340)={0x0, 0x0})

[  403.271289][T17862] FAULT_INJECTION: forcing a failure.
[  403.271289][T17862] name failslab, interval 1, probability 0, space 0, times 0
[  403.292663][T17862] CPU: 0 PID: 17862 Comm: syz-executor.3 Not tainted 5.14.0-rc2-syzkaller #0
[  403.305104][T17862] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.14.0-2 04/01/2014
[  403.318407][T17862] Call Trace:
[  403.323515][T17862]  dump_stack_lvl+0xcd/0x134
[  403.331298][T17862]  should_fail.cold+0x5/0xa
06:20:00 executing program 0:
r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0)
mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800004, 0x12, r0, 0x0)
preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x0, 0x0)
mmap(&(0x7f0000000000/0xa000)=nil, 0xa000, 0x2, 0x2172, 0xffffffffffffffff, 0x0)
socketpair(0x1e, 0x80002, 0x0, &(0x7f0000000340)={0x0, 0x0})

06:20:00 executing program 1:
r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0)
mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800004, 0x12, r0, 0x0)
preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x0, 0x0)
mmap(&(0x7f0000000000/0xa000)=nil, 0xa000, 0x2, 0x2172, 0xffffffffffffffff, 0x0)
socketpair(0x1e, 0x80005, 0x0, &(0x7f0000000340)={<r1=>0x0, <r2=>0x0})
r3 = socket$unix(0x1, 0x1, 0x0)
r4 = socket$unix(0x1, 0x1, 0x0)
r5 = openat$khugepaged_scan(0xffffff9c, &(0x7f00000000c0), 0x1, 0x0)
poll(&(0x7f0000000140)=[{r1, 0x3}, {0xffffffffffffffff, 0x10a2}, {r3, 0x1}, {r2, 0x64c}, {r4, 0x9041}, {0xffffffffffffffff, 0x140}, {r5, 0x10}], 0x7, 0xff)

[  403.338376][T17862]  ? tomoyo_realpath_from_path+0xc3/0x620
06:20:00 executing program 0:
r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0)
mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800004, 0x12, r0, 0x0)
preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x0, 0x0)
mmap(&(0x7f0000000000/0xa000)=nil, 0xa000, 0x2, 0x2172, 0xffffffffffffffff, 0x0)
socketpair(0x1e, 0x80002, 0x0, &(0x7f0000000340)={0x0, 0x0})

[  403.351629][T17862]  should_failslab+0x5/0x10
[  403.351679][T17862]  __kmalloc+0x72/0x330
[  403.351706][T17862]  tomoyo_realpath_from_path+0xc3/0x620
06:20:00 executing program 1:
r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0)
mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800004, 0x12, r0, 0x0)
preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x0, 0x0)
mmap(&(0x7f0000000000/0xa000)=nil, 0xa000, 0x2, 0x2172, 0xffffffffffffffff, 0x0)
socketpair(0x1e, 0x80005, 0x0, &(0x7f0000000340)={<r1=>0x0, <r2=>0x0})
r3 = socket$unix(0x1, 0x1, 0x0)
r4 = socket$unix(0x1, 0x1, 0x0)
r5 = openat$khugepaged_scan(0xffffff9c, &(0x7f00000000c0), 0x1, 0x0)
poll(&(0x7f0000000140)=[{r1, 0x3}, {0xffffffffffffffff, 0x10a2}, {r3, 0x1}, {r2, 0x64c}, {r4, 0x9041}, {0xffffffffffffffff, 0x140}, {r5, 0x10}], 0x7, 0xff)

[  403.351734][T17862]  ? __sanitizer_cov_trace_const_cmp1+0x22/0x80
[  403.351761][T17862]  tomoyo_check_open_permission+0x272/0x380
[  403.351785][T17862]  ? tomoyo_path_number_perm+0x590/0x590
[  403.351813][T17862]  ? lockdep_hardirqs_on_prepare+0x400/0x400
[  403.351849][T17862]  ? path_get+0x5d/0x80
[  403.351867][T17862]  ? lock_downgrade+0x6e0/0x6e0
[  403.351886][T17862]  ? do_raw_spin_lock+0x120/0x2b0
[  403.351910][T17862]  tomoyo_file_open+0xa3/0xd0
[  403.351974][T17862]  security_file_open+0x52/0x4f0
[  403.352001][T17862]  do_dentry_open+0x353/0x11d0
[  403.352027][T17862]  ? __sanitizer_cov_trace_const_cmp4+0x1c/0x70
[  403.352048][T17862]  ? may_open+0x1f6/0x420
[  403.352068][T17862]  path_openat+0x1c23/0x27f0
[  403.352094][T17862]  ? path_lookupat+0x860/0x860
[  403.352115][T17862]  ? lockdep_hardirqs_on_prepare+0x400/0x400
[  403.352142][T17862]  do_filp_open+0x1aa/0x400
[  403.352161][T17862]  ? may_open_dev+0xf0/0xf0
[  403.352188][T17862]  ? rwlock_bug.part.0+0x90/0x90
[  403.352207][T17862]  ? __sanitizer_cov_trace_const_cmp8+0x1d/0x70
[  403.352226][T17862]  ? _find_next_bit+0x1e3/0x260
[  403.352254][T17862]  ? _raw_spin_unlock+0x24/0x40
[  403.352277][T17862]  ? alloc_fd+0x2f0/0x670
[  403.352343][T17862]  do_sys_openat2+0x16d/0x420
[  403.352368][T17862]  ? build_open_flags+0x6f0/0x6f0
[  403.352390][T17862]  ? find_held_lock+0x2d/0x110
[  403.352420][T17862]  ? __context_tracking_exit+0xb8/0xe0
[  403.352448][T17862]  __ia32_compat_sys_openat+0x13f/0x1f0
[  403.352470][T17862]  ? __x64_compat_sys_open+0x1c0/0x1c0
[  403.352498][T17862]  ? syscall_enter_from_user_mode_prepare+0x17/0x40
[  403.352525][T17862]  __do_fast_syscall_32+0x65/0xf0
[  403.352546][T17862]  do_fast_syscall_32+0x2f/0x70
[  403.352566][T17862]  entry_SYSENTER_compat_after_hwframe+0x4d/0x5c
[  403.352587][T17862] RIP: 0023:0xf7f3f549
[  403.352604][T17862] Code: 03 74 c0 01 10 05 03 74 b8 01 10 06 03 74 b4 01 10 07 03 74 b0 01 10 08 03 74 d8 01 00 00 00 00 00 51 52 55 89 e5 0f 34 cd 80 <5d> 5a 59 c3 90 90 90 90 8d b4 26 00 00 00 00 8d b4 26 00 00 00 00
[  403.352624][T17862] RSP: 002b:00000000f55393f0 EFLAGS: 00000282 ORIG_RAX: 0000000000000127
[  403.352646][T17862] RAX: ffffffffffffffda RBX: 00000000ffffff9c RCX: 00000000f55394b0
[  403.352660][T17862] RDX: 0000000000000002 RSI: 0000000000000000 RDI: 000000000816c000
[  403.352673][T17862] RBP: 0000000000000000 R08: 0000000000000000 R09: 0000000000000000
[  403.352692][T17862] R10: 0000000000000000 R11: 0000000000000000 R12: 0000000000000000
[  403.352705][T17862] R13: 0000000000000000 R14: 0000000000000000 R15: 0000000000000000
[  403.355003][T17862] ERROR: Out of memory at tomoyo_realpath_from_path.
06:20:01 executing program 2:
r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0)
mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800004, 0x12, r0, 0x0)
preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x9, 0x0)
r1 = syz_open_dev$tty1(0xc, 0x4, 0x1)
write$binfmt_elf64(r1, &(0x7f0000000380)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40}, [{0x0, 0x0, 0x0, 0x0, 0x6, 0x4, 0x9, 0x6}], "d1660f10e0ac4a6edbf3aa53803c8f57ef2a12069e82553332d2b96d67f2dbc5b04959dad57c303d876233684f5e9ad402a193da791e11122f2cccbf10d6d499f5e16385d09f63891a965d80bcb68b551fabffb4bf0b5c372b4d69cdefac988201a40429a8d0dc699820193afcab08070fde89c22e16b43dde5e37d9a3df0cd352e8667f163774d9dc3c79571e5100046281", ['\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00']}, 0x80a)

06:20:01 executing program 0:
r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0)
mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800004, 0x12, r0, 0x0)
preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x9, 0x0)
mmap(&(0x7f0000000000/0xa000)=nil, 0xa000, 0x0, 0x2172, 0xffffffffffffffff, 0x0)
socketpair(0x1e, 0x80002, 0x0, &(0x7f0000000340)={0x0, 0x0})

06:20:01 executing program 3 (fault-call:3 fault-nth:14):
r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0)
mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800004, 0x12, r0, 0x0)
preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x9, 0x0)
syz_mount_image$reiserfs(&(0x7f0000000140), &(0x7f0000000180)='./file0\x00', 0x0, 0x0, &(0x7f0000000300), 0x0, &(0x7f0000000440))

06:20:01 executing program 1:
r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0)
mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800004, 0x12, r0, 0x0)
preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x0, 0x0)
mmap(&(0x7f0000000000/0xa000)=nil, 0xa000, 0x2, 0x2172, 0xffffffffffffffff, 0x0)
socketpair(0x1e, 0x80005, 0x0, &(0x7f0000000340)={<r1=>0x0, <r2=>0x0})
r3 = socket$unix(0x1, 0x1, 0x0)
r4 = socket$unix(0x1, 0x1, 0x0)
r5 = openat$khugepaged_scan(0xffffff9c, &(0x7f00000000c0), 0x1, 0x0)
poll(&(0x7f0000000140)=[{r1, 0x3}, {0xffffffffffffffff, 0x10a2}, {r3, 0x1}, {r2, 0x64c}, {r4, 0x9041}, {0xffffffffffffffff, 0x140}, {r5, 0x10}], 0x7, 0xff)

[  404.241273][T17892] FAULT_INJECTION: forcing a failure.
06:20:01 executing program 0:
r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0)
mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800004, 0x12, r0, 0x0)
preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x9, 0x0)
mmap(&(0x7f0000000000/0xa000)=nil, 0xa000, 0x0, 0x2172, 0xffffffffffffffff, 0x0)
socketpair(0x1e, 0x80002, 0x0, &(0x7f0000000340)={0x0, 0x0})

[  404.241273][T17892] name failslab, interval 1, probability 0, space 0, times 0
[  404.271641][T17892] CPU: 2 PID: 17892 Comm: syz-executor.3 Not tainted 5.14.0-rc2-syzkaller #0
[  404.286295][T17892] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.14.0-2 04/01/2014
[  404.298567][T17892] Call Trace:
[  404.302143][T17892]  dump_stack_lvl+0xcd/0x134
[  404.307193][T17892]  should_fail.cold+0x5/0xa
[  404.312534][T17892]  ? tomoyo_encode2.part.0+0xe9/0x3a0
[  404.318821][T17892]  should_failslab+0x5/0x10
06:20:01 executing program 1:
r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0)
mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800004, 0x12, r0, 0x0)
preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x9, 0x0)
mmap(&(0x7f0000000000/0xa000)=nil, 0xa000, 0x0, 0x2172, 0xffffffffffffffff, 0x0)
socketpair(0x1e, 0x80005, 0x0, &(0x7f0000000340)={<r1=>0x0, <r2=>0x0})
r3 = socket$unix(0x1, 0x1, 0x0)
r4 = socket$unix(0x1, 0x1, 0x0)
r5 = openat$khugepaged_scan(0xffffff9c, &(0x7f00000000c0), 0x1, 0x0)
poll(&(0x7f0000000140)=[{r1, 0x3}, {0xffffffffffffffff, 0x10a2}, {r3, 0x1}, {r2, 0x64c}, {r4, 0x9041}, {0xffffffffffffffff, 0x140}, {r5, 0x10}], 0x7, 0xff)

[  404.323613][T17892]  __kmalloc+0x72/0x330
[  404.329106][T17892]  tomoyo_encode2.part.0+0xe9/0x3a0
[  404.335628][T17892]  tomoyo_encode+0x28/0x50
[  404.341556][T17892]  tomoyo_realpath_from_path+0x186/0x620
[  404.349557][T17892]  tomoyo_check_open_permission+0x272/0x380
[  404.357652][T17892]  ? tomoyo_path_number_perm+0x590/0x590
[  404.365060][T17892]  ? lockdep_hardirqs_on_prepare+0x400/0x400
06:20:01 executing program 0:
r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0)
mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800004, 0x12, r0, 0x0)
preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x9, 0x0)
mmap(&(0x7f0000000000/0xa000)=nil, 0xa000, 0x0, 0x2172, 0xffffffffffffffff, 0x0)
socketpair(0x1e, 0x80002, 0x0, &(0x7f0000000340)={0x0, 0x0})

[  404.372327][T17892]  ? path_get+0x5d/0x80
[  404.379226][T17892]  ? lock_downgrade+0x6e0/0x6e0
06:20:01 executing program 1:
r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0)
mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800004, 0x12, r0, 0x0)
preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x9, 0x0)
mmap(&(0x7f0000000000/0xa000)=nil, 0xa000, 0x0, 0x2172, 0xffffffffffffffff, 0x0)
socketpair(0x1e, 0x80005, 0x0, &(0x7f0000000340)={<r1=>0x0, <r2=>0x0})
r3 = socket$unix(0x1, 0x1, 0x0)
r4 = socket$unix(0x1, 0x1, 0x0)
r5 = openat$khugepaged_scan(0xffffff9c, &(0x7f00000000c0), 0x1, 0x0)
poll(&(0x7f0000000140)=[{r1, 0x3}, {0xffffffffffffffff, 0x10a2}, {r3, 0x1}, {r2, 0x64c}, {r4, 0x9041}, {0xffffffffffffffff, 0x140}, {r5, 0x10}], 0x7, 0xff)

[  404.385740][T17892]  ? do_raw_spin_lock+0x120/0x2b0
[  404.398238][T17892]  tomoyo_file_open+0xa3/0xd0
[  404.403439][T17892]  security_file_open+0x52/0x4f0
[  404.409692][T17892]  do_dentry_open+0x353/0x11d0
[  404.416630][T17892]  ? __sanitizer_cov_trace_const_cmp4+0x1c/0x70
[  404.426120][T17892]  ? may_open+0x1f6/0x420
[  404.432476][T17892]  path_openat+0x1c23/0x27f0
[  404.438650][T17892]  ? path_lookupat+0x860/0x860
[  404.444672][T17892]  ? lockdep_hardirqs_on_prepare+0x400/0x400
[  404.452676][T17892]  do_filp_open+0x1aa/0x400
[  404.457912][T17892]  ? may_open_dev+0xf0/0xf0
[  404.463412][T17892]  ? rwlock_bug.part.0+0x90/0x90
[  404.470091][T17892]  ? __sanitizer_cov_trace_const_cmp8+0x1d/0x70
[  404.477931][T17892]  ? _find_next_bit+0x1e3/0x260
[  404.483957][T17892]  ? _raw_spin_unlock+0x24/0x40
[  404.489880][T17892]  ? alloc_fd+0x2f0/0x670
[  404.495674][T17892]  do_sys_openat2+0x16d/0x420
[  404.502889][T17892]  ? build_open_flags+0x6f0/0x6f0
[  404.509701][T17892]  ? find_held_lock+0x2d/0x110
[  404.516164][T17892]  ? __context_tracking_exit+0xb8/0xe0
[  404.524388][T17892]  __ia32_compat_sys_openat+0x13f/0x1f0
[  404.532386][T17892]  ? __x64_compat_sys_open+0x1c0/0x1c0
[  404.540220][T17892]  ? syscall_enter_from_user_mode_prepare+0x17/0x40
[  404.549311][T17892]  __do_fast_syscall_32+0x65/0xf0
[  404.556482][T17892]  do_fast_syscall_32+0x2f/0x70
[  404.563454][T17892]  entry_SYSENTER_compat_after_hwframe+0x4d/0x5c
[  404.572725][T17892] RIP: 0023:0xf7f3f549
[  404.578558][T17892] Code: 03 74 c0 01 10 05 03 74 b8 01 10 06 03 74 b4 01 10 07 03 74 b0 01 10 08 03 74 d8 01 00 00 00 00 00 51 52 55 89 e5 0f 34 cd 80 <5d> 5a 59 c3 90 90 90 90 8d b4 26 00 00 00 00 8d b4 26 00 00 00 00
[  404.606379][T17892] RSP: 002b:00000000f55393f0 EFLAGS: 00000282 ORIG_RAX: 0000000000000127
[  404.619494][T17892] RAX: ffffffffffffffda RBX: 00000000ffffff9c RCX: 00000000f55394b0
[  404.630071][T17892] RDX: 0000000000000002 RSI: 0000000000000000 RDI: 000000000816c000
[  404.641790][T17892] RBP: 0000000000000000 R08: 0000000000000000 R09: 0000000000000000
[  404.653616][T17892] R10: 0000000000000000 R11: 0000000000000000 R12: 0000000000000000
[  404.664480][T17892] R13: 0000000000000000 R14: 0000000000000000 R15: 0000000000000000
[  404.701238][T17892] ERROR: Out of memory at tomoyo_realpath_from_path.
06:20:02 executing program 1:
r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0)
mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800004, 0x12, r0, 0x0)
preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x9, 0x0)
mmap(&(0x7f0000000000/0xa000)=nil, 0xa000, 0x0, 0x2172, 0xffffffffffffffff, 0x0)
socketpair(0x1e, 0x80005, 0x0, &(0x7f0000000340)={<r1=>0x0, <r2=>0x0})
r3 = socket$unix(0x1, 0x1, 0x0)
r4 = socket$unix(0x1, 0x1, 0x0)
r5 = openat$khugepaged_scan(0xffffff9c, &(0x7f00000000c0), 0x1, 0x0)
poll(&(0x7f0000000140)=[{r1, 0x3}, {0xffffffffffffffff, 0x10a2}, {r3, 0x1}, {r2, 0x64c}, {r4, 0x9041}, {0xffffffffffffffff, 0x140}, {r5, 0x10}], 0x7, 0xff)

06:20:02 executing program 0:
r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0)
mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800004, 0x12, r0, 0x0)
preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x9, 0x0)
mmap(&(0x7f0000000000/0xa000)=nil, 0xa000, 0x2, 0x10, 0xffffffffffffffff, 0x0)
socketpair(0x1e, 0x80002, 0x0, &(0x7f0000000340)={0x0, 0x0})

06:20:02 executing program 2:
r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0)
mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800004, 0x12, r0, 0x0)
preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x9, 0x0)
r1 = syz_open_dev$tty1(0xc, 0x4, 0x1)
write$binfmt_elf64(r1, &(0x7f0000000380)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40}, [{0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x9, 0x6}], "d1660f10e0ac4a6edbf3aa53803c8f57ef2a12069e82553332d2b96d67f2dbc5b04959dad57c303d876233684f5e9ad402a193da791e11122f2cccbf10d6d499f5e16385d09f63891a965d80bcb68b551fabffb4bf0b5c372b4d69cdefac988201a40429a8d0dc699820193afcab08070fde89c22e16b43dde5e37d9a3df0cd352e8667f163774d9dc3c79571e5100046281", ['\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00']}, 0x80a)

06:20:02 executing program 3 (fault-call:3 fault-nth:15):
r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0)
mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800004, 0x12, r0, 0x0)
preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x9, 0x0)
syz_mount_image$reiserfs(&(0x7f0000000140), &(0x7f0000000180)='./file0\x00', 0x0, 0x0, &(0x7f0000000300), 0x0, &(0x7f0000000440))

[  405.119171][T17920] FAULT_INJECTION: forcing a failure.
[  405.119171][T17920] name failslab, interval 1, probability 0, space 0, times 0
[  405.140912][T17920] CPU: 2 PID: 17920 Comm: syz-executor.3 Not tainted 5.14.0-rc2-syzkaller #0
[  405.154540][T17920] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.14.0-2 04/01/2014
[  405.167804][T17920] Call Trace:
[  405.172621][T17920]  dump_stack_lvl+0xcd/0x134
[  405.180101][T17920]  should_fail.cold+0x5/0xa
06:20:02 executing program 1:
r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0)
mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800004, 0x12, r0, 0x0)
preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x9, 0x0)
mmap(&(0x7f0000000000/0xa000)=nil, 0xa000, 0x2, 0x10, 0xffffffffffffffff, 0x0)
socketpair(0x1e, 0x80005, 0x0, &(0x7f0000000340)={<r1=>0x0, <r2=>0x0})
r3 = socket$unix(0x1, 0x1, 0x0)
r4 = socket$unix(0x1, 0x1, 0x0)
r5 = openat$khugepaged_scan(0xffffff9c, &(0x7f00000000c0), 0x1, 0x0)
poll(&(0x7f0000000140)=[{r1, 0x3}, {0xffffffffffffffff, 0x10a2}, {r3, 0x1}, {r2, 0x64c}, {r4, 0x9041}, {0xffffffffffffffff, 0x140}, {r5, 0x10}], 0x7, 0xff)

[  405.187052][T17920]  ? tomoyo_realpath_from_path+0xc3/0x620
[  405.195831][T17920]  should_failslab+0x5/0x10
06:20:02 executing program 0:
r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0)
mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800004, 0x12, r0, 0x0)
preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x9, 0x0)
mmap(&(0x7f0000000000/0xa000)=nil, 0xa000, 0x2, 0x10, 0xffffffffffffffff, 0x0)
socketpair(0x1e, 0x80002, 0x0, &(0x7f0000000340)={0x0, 0x0})

[  405.202283][T17920]  __kmalloc+0x72/0x330
[  405.209668][T17920]  tomoyo_realpath_from_path+0xc3/0x620
[  405.217276][T17920]  ? tomoyo_profile+0x42/0x50
[  405.223951][T17920]  tomoyo_path_number_perm+0x1d5/0x590
[  405.231169][T17920]  ? tomoyo_path_number_perm+0x18d/0x590
[  405.239393][T17920]  ? tomoyo_execute_permission+0x4a0/0x4a0
[  405.247373][T17920]  ? lock_downgrade+0x6e0/0x6e0
[  405.254625][T17920]  ? find_held_lock+0x2d/0x110
[  405.261658][T17920]  ? __fget_files+0x23d/0x3e0
[  405.268770][T17920]  security_file_ioctl+0x50/0xb0
[  405.275669][T17920]  __do_compat_sys_ioctl+0x4e/0x290
[  405.284382][T17920]  __do_fast_syscall_32+0x65/0xf0
[  405.292049][T17920]  do_fast_syscall_32+0x2f/0x70
[  405.299122][T17920]  entry_SYSENTER_compat_after_hwframe+0x4d/0x5c
[  405.310714][T17920] RIP: 0023:0xf7f3f549
[  405.310747][T17920] Code: 03 74 c0 01 10 05 03 74 b8 01 10 06 03 74 b4 01 10 07 03 74 b0 01 10 08 03 74 d8 01 00 00 00 00 00 51 52 55 89 e5 0f 34 cd 80 <5d> 5a 59 c3 90 90 90 90 8d b4 26 00 00 00 00 8d b4 26 00 00 00 00
[  405.310823][T17920] RSP: 002b:00000000f5539418 EFLAGS: 00000296 ORIG_RAX: 0000000000000036
06:20:02 executing program 1:
r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0)
mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800004, 0x12, r0, 0x0)
preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x9, 0x0)
mmap(&(0x7f0000000000/0xa000)=nil, 0xa000, 0x2, 0x10, 0xffffffffffffffff, 0x0)
socketpair(0x1e, 0x80005, 0x0, &(0x7f0000000340)={<r1=>0x0, <r2=>0x0})
r3 = socket$unix(0x1, 0x1, 0x0)
r4 = socket$unix(0x1, 0x1, 0x0)
r5 = openat$khugepaged_scan(0xffffff9c, &(0x7f00000000c0), 0x1, 0x0)
poll(&(0x7f0000000140)=[{r1, 0x3}, {0xffffffffffffffff, 0x10a2}, {r3, 0x1}, {r2, 0x64c}, {r4, 0x9041}, {0xffffffffffffffff, 0x140}, {r5, 0x10}], 0x7, 0xff)

[  405.310851][T17920] RAX: ffffffffffffffda RBX: 0000000000000006 RCX: 0000000000004c00
[  405.366621][T17920] RDX: 0000000000000005 RSI: 0000000000000006 RDI: 000000000816c000
[  405.378566][T17920] RBP: 0000000000000005 R08: 0000000000000000 R09: 0000000000000000
[  405.391188][T17920] R10: 0000000000000000 R11: 0000000000000000 R12: 0000000000000000
[  405.403092][T17920] R13: 0000000000000000 R14: 0000000000000000 R15: 0000000000000000
[  405.443569][T17920] ERROR: Out of memory at tomoyo_realpath_from_path.
06:20:03 executing program 0:
r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0)
mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800004, 0x12, r0, 0x0)
preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x9, 0x0)
mmap(&(0x7f0000000000/0xa000)=nil, 0xa000, 0x2, 0x10, 0xffffffffffffffff, 0x0)
socketpair(0x1e, 0x80002, 0x0, &(0x7f0000000340)={0x0, 0x0})

06:20:03 executing program 1:
r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0)
mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800004, 0x12, r0, 0x0)
preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x9, 0x0)
mmap(&(0x7f0000000000/0xa000)=nil, 0xa000, 0x2, 0x10, 0xffffffffffffffff, 0x0)
socketpair(0x1e, 0x80005, 0x0, &(0x7f0000000340)={<r1=>0x0, <r2=>0x0})
r3 = socket$unix(0x1, 0x1, 0x0)
r4 = socket$unix(0x1, 0x1, 0x0)
r5 = openat$khugepaged_scan(0xffffff9c, &(0x7f00000000c0), 0x1, 0x0)
poll(&(0x7f0000000140)=[{r1, 0x3}, {0xffffffffffffffff, 0x10a2}, {r3, 0x1}, {r2, 0x64c}, {r4, 0x9041}, {0xffffffffffffffff, 0x140}, {r5, 0x10}], 0x7, 0xff)

06:20:03 executing program 0:
r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0)
mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800004, 0x12, r0, 0x0)
preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x9, 0x0)
mmap(&(0x7f0000000000/0xa000)=nil, 0xa000, 0x2, 0x2172, 0xffffffffffffffff, 0x0)
socketpair(0x0, 0x80002, 0x0, &(0x7f0000000340)={0x0, 0x0})

06:20:03 executing program 2:
r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0)
mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800004, 0x12, r0, 0x0)
preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x9, 0x0)
r1 = syz_open_dev$tty1(0xc, 0x4, 0x1)
write$binfmt_elf64(r1, &(0x7f0000000380)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40}, [{0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x9, 0x6}], "d1660f10e0ac4a6edbf3aa53803c8f57ef2a12069e82553332d2b96d67f2dbc5b04959dad57c303d876233684f5e9ad402a193da791e11122f2cccbf10d6d499f5e16385d09f63891a965d80bcb68b551fabffb4bf0b5c372b4d69cdefac988201a40429a8d0dc699820193afcab08070fde89c22e16b43dde5e37d9a3df0cd352e8667f163774d9dc3c79571e5100046281", ['\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00']}, 0x80a)

06:20:03 executing program 1:
r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0)
mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800004, 0x12, r0, 0x0)
preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x9, 0x0)
mmap(&(0x7f0000000000/0xa000)=nil, 0xa000, 0x2, 0x2172, 0xffffffffffffffff, 0x0)
socketpair(0x0, 0x80005, 0x0, &(0x7f0000000340)={<r1=>0x0, <r2=>0x0})
r3 = socket$unix(0x1, 0x1, 0x0)
r4 = socket$unix(0x1, 0x1, 0x0)
r5 = openat$khugepaged_scan(0xffffff9c, &(0x7f00000000c0), 0x1, 0x0)
poll(&(0x7f0000000140)=[{r1, 0x3}, {0xffffffffffffffff, 0x10a2}, {r3, 0x1}, {r2, 0x64c}, {r4, 0x9041}, {0xffffffffffffffff, 0x140}, {r5, 0x10}], 0x7, 0xff)

06:20:03 executing program 3 (fault-call:3 fault-nth:16):
r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0)
mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800004, 0x12, r0, 0x0)
preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x9, 0x0)
syz_mount_image$reiserfs(&(0x7f0000000140), &(0x7f0000000180)='./file0\x00', 0x0, 0x0, &(0x7f0000000300), 0x0, &(0x7f0000000440))

06:20:03 executing program 0:
r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0)
mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800004, 0x12, r0, 0x0)
preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x9, 0x0)
mmap(&(0x7f0000000000/0xa000)=nil, 0xa000, 0x2, 0x2172, 0xffffffffffffffff, 0x0)
socketpair(0x0, 0x80002, 0x0, &(0x7f0000000340)={0x0, 0x0})

[  406.168283][T17959] FAULT_INJECTION: forcing a failure.
[  406.168283][T17959] name failslab, interval 1, probability 0, space 0, times 0
06:20:03 executing program 1:
r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0)
mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800004, 0x12, r0, 0x0)
preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x9, 0x0)
mmap(&(0x7f0000000000/0xa000)=nil, 0xa000, 0x2, 0x2172, 0xffffffffffffffff, 0x0)
socketpair(0x0, 0x80005, 0x0, &(0x7f0000000340)={<r1=>0x0, <r2=>0x0})
r3 = socket$unix(0x1, 0x1, 0x0)
r4 = socket$unix(0x1, 0x1, 0x0)
r5 = openat$khugepaged_scan(0xffffff9c, &(0x7f00000000c0), 0x1, 0x0)
poll(&(0x7f0000000140)=[{r1, 0x3}, {0xffffffffffffffff, 0x10a2}, {r3, 0x1}, {r2, 0x64c}, {r4, 0x9041}, {0xffffffffffffffff, 0x140}, {r5, 0x10}], 0x7, 0xff)

06:20:03 executing program 0:
r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0)
mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800004, 0x12, r0, 0x0)
preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x9, 0x0)
mmap(&(0x7f0000000000/0xa000)=nil, 0xa000, 0x2, 0x2172, 0xffffffffffffffff, 0x0)
socketpair(0x0, 0x80002, 0x0, &(0x7f0000000340)={0x0, 0x0})

[  406.224722][T17959] CPU: 0 PID: 17959 Comm: syz-executor.3 Not tainted 5.14.0-rc2-syzkaller #0
[  406.238438][T17959] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.14.0-2 04/01/2014
[  406.252911][T17959] Call Trace:
[  406.258065][T17959]  dump_stack_lvl+0xcd/0x134
[  406.265161][T17959]  should_fail.cold+0x5/0xa
[  406.270865][T17959]  ? tomoyo_encode2.part.0+0xe9/0x3a0
[  406.276910][T17959]  should_failslab+0x5/0x10
[  406.283331][T17959]  __kmalloc+0x72/0x330
[  406.289564][T17959]  tomoyo_encode2.part.0+0xe9/0x3a0
[  406.296981][T17959]  tomoyo_encode+0x28/0x50
[  406.303617][T17959]  tomoyo_realpath_from_path+0x186/0x620
[  406.311415][T17959]  tomoyo_path_number_perm+0x1d5/0x590
[  406.319549][T17959]  ? tomoyo_path_number_perm+0x18d/0x590
[  406.327551][T17959]  ? tomoyo_execute_permission+0x4a0/0x4a0
[  406.336231][T17959]  ? lock_downgrade+0x6e0/0x6e0
[  406.343056][T17959]  ? find_held_lock+0x2d/0x110
[  406.350669][T17959]  ? __fget_files+0x23d/0x3e0
[  406.357852][T17959]  security_file_ioctl+0x50/0xb0
[  406.366454][T17959]  __do_compat_sys_ioctl+0x4e/0x290
[  406.374488][T17959]  __do_fast_syscall_32+0x65/0xf0
[  406.381035][T17959]  do_fast_syscall_32+0x2f/0x70
[  406.389808][T17959]  entry_SYSENTER_compat_after_hwframe+0x4d/0x5c
[  406.399603][T17959] RIP: 0023:0xf7f3f549
[  406.406115][T17959] Code: 03 74 c0 01 10 05 03 74 b8 01 10 06 03 74 b4 01 10 07 03 74 b0 01 10 08 03 74 d8 01 00 00 00 00 00 51 52 55 89 e5 0f 34 cd 80 <5d> 5a 59 c3 90 90 90 90 8d b4 26 00 00 00 00 8d b4 26 00 00 00 00
[  406.448606][T17959] RSP: 002b:00000000f5539418 EFLAGS: 00000296 ORIG_RAX: 0000000000000036
[  406.459580][T17959] RAX: ffffffffffffffda RBX: 0000000000000006 RCX: 0000000000004c00
[  406.469411][T17959] RDX: 0000000000000005 RSI: 0000000000000006 RDI: 000000000816c000
[  406.479448][T17959] RBP: 0000000000000005 R08: 0000000000000000 R09: 0000000000000000
[  406.490077][T17959] R10: 0000000000000000 R11: 0000000000000000 R12: 0000000000000000
[  406.500919][T17959] R13: 0000000000000000 R14: 0000000000000000 R15: 0000000000000000
[  406.517204][T17959] ERROR: Out of memory at tomoyo_realpath_from_path.
06:20:04 executing program 1:
r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0)
mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800004, 0x12, r0, 0x0)
preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x9, 0x0)
mmap(&(0x7f0000000000/0xa000)=nil, 0xa000, 0x2, 0x2172, 0xffffffffffffffff, 0x0)
socketpair(0x0, 0x80005, 0x0, &(0x7f0000000340)={<r1=>0x0, <r2=>0x0})
r3 = socket$unix(0x1, 0x1, 0x0)
r4 = socket$unix(0x1, 0x1, 0x0)
r5 = openat$khugepaged_scan(0xffffff9c, &(0x7f00000000c0), 0x1, 0x0)
poll(&(0x7f0000000140)=[{r1, 0x3}, {0xffffffffffffffff, 0x10a2}, {r3, 0x1}, {r2, 0x64c}, {r4, 0x9041}, {0xffffffffffffffff, 0x140}, {r5, 0x10}], 0x7, 0xff)

06:20:04 executing program 0:
r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0)
mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800004, 0x12, r0, 0x0)
preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x9, 0x0)
mmap(&(0x7f0000000000/0xa000)=nil, 0xa000, 0x2, 0x2172, 0xffffffffffffffff, 0x0)
socketpair(0x1e, 0x0, 0x0, &(0x7f0000000340)={0x0, 0x0})

06:20:04 executing program 2:
r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0)
mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800004, 0x12, r0, 0x0)
preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x9, 0x0)
r1 = syz_open_dev$tty1(0xc, 0x4, 0x1)
write$binfmt_elf64(r1, &(0x7f0000000380)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40}, [{0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x6}], "d1660f10e0ac4a6edbf3aa53803c8f57ef2a12069e82553332d2b96d67f2dbc5b04959dad57c303d876233684f5e9ad402a193da791e11122f2cccbf10d6d499f5e16385d09f63891a965d80bcb68b551fabffb4bf0b5c372b4d69cdefac988201a40429a8d0dc699820193afcab08070fde89c22e16b43dde5e37d9a3df0cd352e8667f163774d9dc3c79571e5100046281", ['\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00']}, 0x80a)

06:20:04 executing program 3 (fault-call:3 fault-nth:17):
r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0)
mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800004, 0x12, r0, 0x0)
preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x9, 0x0)
syz_mount_image$reiserfs(&(0x7f0000000140), &(0x7f0000000180)='./file0\x00', 0x0, 0x0, &(0x7f0000000300), 0x0, &(0x7f0000000440))

06:20:04 executing program 1:
r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0)
mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800004, 0x12, r0, 0x0)
preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x9, 0x0)
mmap(&(0x7f0000000000/0xa000)=nil, 0xa000, 0x2, 0x2172, 0xffffffffffffffff, 0x0)
socketpair(0x1e, 0x0, 0x0, &(0x7f0000000340)={<r1=>0x0, <r2=>0x0})
r3 = socket$unix(0x1, 0x1, 0x0)
r4 = socket$unix(0x1, 0x1, 0x0)
r5 = openat$khugepaged_scan(0xffffff9c, &(0x7f00000000c0), 0x1, 0x0)
poll(&(0x7f0000000140)=[{r1, 0x3}, {0xffffffffffffffff, 0x10a2}, {r3, 0x1}, {r2, 0x64c}, {r4, 0x9041}, {0xffffffffffffffff, 0x140}, {r5, 0x10}], 0x7, 0xff)

06:20:04 executing program 0:
r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0)
mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800004, 0x12, r0, 0x0)
preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x9, 0x0)
mmap(&(0x7f0000000000/0xa000)=nil, 0xa000, 0x2, 0x2172, 0xffffffffffffffff, 0x0)
socketpair(0x1e, 0x0, 0x0, &(0x7f0000000340)={0x0, 0x0})

[  407.102057][T17994] FAULT_INJECTION: forcing a failure.
[  407.102057][T17994] name failslab, interval 1, probability 0, space 0, times 0
[  407.134415][T17994] CPU: 0 PID: 17994 Comm: syz-executor.3 Not tainted 5.14.0-rc2-syzkaller #0
[  407.148221][T17994] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.14.0-2 04/01/2014
[  407.160692][T17994] Call Trace:
[  407.165964][T17994]  dump_stack_lvl+0xcd/0x134
[  407.172436][T17994]  should_fail.cold+0x5/0xa
[  407.178744][T17994]  ? alloc_workqueue+0x16d/0xef0
[  407.185027][T17994]  should_failslab+0x5/0x10
[  407.191774][T17994]  __kmalloc+0x72/0x330
[  407.197782][T17994]  alloc_workqueue+0x16d/0xef0
[  407.204366][T17994]  ? __mutex_lock+0x5bf/0x10a0
[  407.211440][T17994]  ? _raw_spin_unlock+0x24/0x40
[  407.218140][T17994]  ? loop_configure+0xc2/0x1580
06:20:04 executing program 0:
r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0)
mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800004, 0x12, r0, 0x0)
preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x9, 0x0)
mmap(&(0x7f0000000000/0xa000)=nil, 0xa000, 0x2, 0x2172, 0xffffffffffffffff, 0x0)
socketpair(0x1e, 0x0, 0x0, &(0x7f0000000340)={0x0, 0x0})

06:20:04 executing program 1:
r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0)
mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800004, 0x12, r0, 0x0)
preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x9, 0x0)
mmap(&(0x7f0000000000/0xa000)=nil, 0xa000, 0x2, 0x2172, 0xffffffffffffffff, 0x0)
socketpair(0x1e, 0x0, 0x0, &(0x7f0000000340)={<r1=>0x0, <r2=>0x0})
r3 = socket$unix(0x1, 0x1, 0x0)
r4 = socket$unix(0x1, 0x1, 0x0)
r5 = openat$khugepaged_scan(0xffffff9c, &(0x7f00000000c0), 0x1, 0x0)
poll(&(0x7f0000000140)=[{r1, 0x3}, {0xffffffffffffffff, 0x10a2}, {r3, 0x1}, {r2, 0x64c}, {r4, 0x9041}, {0xffffffffffffffff, 0x140}, {r5, 0x10}], 0x7, 0xff)

[  407.224803][T17994]  ? loop_set_status_from_info+0xa60/0xa60
[  407.233822][T17994]  ? workqueue_sysfs_register+0x3e0/0x3e0
06:20:04 executing program 0:
r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0)
mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800004, 0x12, r0, 0x0)
preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x9, 0x0)
mmap(&(0x7f0000000000/0xa000)=nil, 0xa000, 0x2, 0x2172, 0xffffffffffffffff, 0x0)
socketpair(0x1e, 0x80002, 0x0, 0x0)

[  407.241163][T17994]  ? mutex_lock_io_nested+0xf00/0xf00
[  407.249019][T17994]  ? memcpy+0x39/0x60
[  407.255303][T17994]  ? loop_configure+0x416/0x1580
[  407.262922][T17994]  loop_configure+0x4d8/0x1580
[  407.270187][T17994]  lo_ioctl+0x403/0x1600
[  407.277707][T17994]  ? loop_set_status_old+0x250/0x250
[  407.285003][T17994]  ? find_held_lock+0x2d/0x110
06:20:04 executing program 1:
r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0)
mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800004, 0x12, r0, 0x0)
preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x9, 0x0)
mmap(&(0x7f0000000000/0xa000)=nil, 0xa000, 0x2, 0x2172, 0xffffffffffffffff, 0x0)
socketpair(0x1e, 0x0, 0x0, &(0x7f0000000340)={<r1=>0x0, <r2=>0x0})
r3 = socket$unix(0x1, 0x1, 0x0)
r4 = socket$unix(0x1, 0x1, 0x0)
r5 = openat$khugepaged_scan(0xffffff9c, &(0x7f00000000c0), 0x1, 0x0)
poll(&(0x7f0000000140)=[{r1, 0x3}, {0xffffffffffffffff, 0x10a2}, {r3, 0x1}, {r2, 0x64c}, {r4, 0x9041}, {0xffffffffffffffff, 0x140}, {r5, 0x10}], 0x7, 0xff)

[  407.291450][T17994]  ? tomoyo_path_number_perm+0x204/0x590
[  407.299063][T17994]  ? lock_downgrade+0x6e0/0x6e0
[  407.307667][T17994]  ? kfree+0xeb/0x650
[  407.314075][T17994]  ? tomoyo_path_number_perm+0x441/0x590
[  407.323234][T17994]  ? __sanitizer_cov_trace_const_cmp1+0x22/0x80
[  407.332571][T17994]  ? tomoyo_path_number_perm+0x24e/0x590
[  407.341224][T17994]  ? lock_downgrade+0x6e0/0x6e0
[  407.349784][T17994]  lo_compat_ioctl+0xb1/0x110
[  407.356913][T17994]  compat_blkdev_ioctl+0x3c2/0x870
[  407.365553][T17994]  ? lo_ioctl+0x1600/0x1600
[  407.371310][T17994]  ? blkdev_ioctl+0x6d0/0x6d0
[  407.378080][T17994]  ? __sanitizer_cov_trace_const_cmp4+0x1c/0x70
[  407.389436][T17994]  ? blkdev_ioctl+0x6d0/0x6d0
[  407.397101][T17994]  __do_compat_sys_ioctl+0x1c7/0x290
[  407.406370][T17994]  __do_fast_syscall_32+0x65/0xf0
[  407.416241][T17994]  do_fast_syscall_32+0x2f/0x70
[  407.424283][T17994]  entry_SYSENTER_compat_after_hwframe+0x4d/0x5c
[  407.434509][T17994] RIP: 0023:0xf7f3f549
[  407.440739][T17994] Code: 03 74 c0 01 10 05 03 74 b8 01 10 06 03 74 b4 01 10 07 03 74 b0 01 10 08 03 74 d8 01 00 00 00 00 00 51 52 55 89 e5 0f 34 cd 80 <5d> 5a 59 c3 90 90 90 90 8d b4 26 00 00 00 00 8d b4 26 00 00 00 00
[  407.479686][T17994] RSP: 002b:00000000f5539418 EFLAGS: 00000296 ORIG_RAX: 0000000000000036
[  407.479732][T17994] RAX: ffffffffffffffda RBX: 0000000000000006 RCX: 0000000000004c00
[  407.479759][T17994] RDX: 0000000000000005 RSI: 0000000000000006 RDI: 000000000816c000
[  407.479785][T17994] RBP: 0000000000000005 R08: 0000000000000000 R09: 0000000000000000
[  407.479810][T17994] R10: 0000000000000000 R11: 0000000000000000 R12: 0000000000000000
[  407.479834][T17994] R13: 0000000000000000 R14: 0000000000000000 R15: 0000000000000000
06:20:05 executing program 2:
r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0)
mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800004, 0x12, r0, 0x0)
preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x9, 0x0)
r1 = syz_open_dev$tty1(0xc, 0x4, 0x1)
write$binfmt_elf64(r1, &(0x7f0000000380)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40}, [{0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6}], "d1660f10e0ac4a6edbf3aa53803c8f57ef2a12069e82553332d2b96d67f2dbc5b04959dad57c303d876233684f5e9ad402a193da791e11122f2cccbf10d6d499f5e16385d09f63891a965d80bcb68b551fabffb4bf0b5c372b4d69cdefac988201a40429a8d0dc699820193afcab08070fde89c22e16b43dde5e37d9a3df0cd352e8667f163774d9dc3c79571e5100046281", ['\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00']}, 0x80a)

06:20:05 executing program 0:
r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0)
mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800004, 0x12, r0, 0x0)
preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x9, 0x0)
mmap(&(0x7f0000000000/0xa000)=nil, 0xa000, 0x2, 0x2172, 0xffffffffffffffff, 0x0)
socketpair(0x1e, 0x80002, 0x0, 0x0)

06:20:05 executing program 3 (fault-call:3 fault-nth:18):
r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0)
mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800004, 0x12, r0, 0x0)
preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x9, 0x0)
syz_mount_image$reiserfs(&(0x7f0000000140), &(0x7f0000000180)='./file0\x00', 0x0, 0x0, &(0x7f0000000300), 0x0, &(0x7f0000000440))

06:20:05 executing program 1:
r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0)
mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800004, 0x12, r0, 0x0)
preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x9, 0x0)
mmap(&(0x7f0000000000/0xa000)=nil, 0xa000, 0x2, 0x2172, 0xffffffffffffffff, 0x0)
socketpair(0x1e, 0x80005, 0x0, 0x0)
r1 = socket$unix(0x1, 0x1, 0x0)
r2 = socket$unix(0x1, 0x1, 0x0)
r3 = openat$khugepaged_scan(0xffffff9c, &(0x7f00000000c0), 0x1, 0x0)
poll(&(0x7f0000000140)=[{0xffffffffffffffff, 0x3}, {0xffffffffffffffff, 0x10a2}, {r1, 0x1}, {0xffffffffffffffff, 0x64c}, {r2, 0x9041}, {0xffffffffffffffff, 0x140}, {r3, 0x10}], 0x7, 0xff)

06:20:05 executing program 0:
r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0)
mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800004, 0x12, r0, 0x0)
preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x9, 0x0)
mmap(&(0x7f0000000000/0xa000)=nil, 0xa000, 0x2, 0x2172, 0xffffffffffffffff, 0x0)
socketpair(0x1e, 0x80002, 0x0, 0x0)

[  408.377656][T18023] FAULT_INJECTION: forcing a failure.
[  408.377656][T18023] name failslab, interval 1, probability 0, space 0, times 0
06:20:06 executing program 1:
r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0)
mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800004, 0x12, r0, 0x0)
preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x9, 0x0)
mmap(&(0x7f0000000000/0xa000)=nil, 0xa000, 0x2, 0x2172, 0xffffffffffffffff, 0x0)
socketpair(0x1e, 0x80005, 0x0, 0x0)
r1 = socket$unix(0x1, 0x1, 0x0)
r2 = socket$unix(0x1, 0x1, 0x0)
r3 = openat$khugepaged_scan(0xffffff9c, &(0x7f00000000c0), 0x1, 0x0)
poll(&(0x7f0000000140)=[{0xffffffffffffffff, 0x3}, {0xffffffffffffffff, 0x10a2}, {r1, 0x1}, {0xffffffffffffffff, 0x64c}, {r2, 0x9041}, {0xffffffffffffffff, 0x140}, {r3, 0x10}], 0x7, 0xff)

[  408.401978][T18023] CPU: 2 PID: 18023 Comm: syz-executor.3 Not tainted 5.14.0-rc2-syzkaller #0
[  408.425863][T18023] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.14.0-2 04/01/2014
[  408.438266][T18023] Call Trace:
[  408.442624][T18023]  dump_stack_lvl+0xcd/0x134
[  408.449197][T18023]  should_fail.cold+0x5/0xa
[  408.455518][T18023]  ? alloc_workqueue_attrs+0x38/0x80
[  408.462875][T18023]  should_failslab+0x5/0x10
[  408.468674][T18023]  kmem_cache_alloc_trace+0x55/0x3c0
[  408.475653][T18023]  alloc_workqueue_attrs+0x38/0x80
06:20:06 executing program 1:
r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0)
mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800004, 0x12, r0, 0x0)
preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x9, 0x0)
mmap(&(0x7f0000000000/0xa000)=nil, 0xa000, 0x2, 0x2172, 0xffffffffffffffff, 0x0)
socketpair(0x1e, 0x80005, 0x0, 0x0)
r1 = socket$unix(0x1, 0x1, 0x0)
r2 = socket$unix(0x1, 0x1, 0x0)
r3 = openat$khugepaged_scan(0xffffff9c, &(0x7f00000000c0), 0x1, 0x0)
poll(&(0x7f0000000140)=[{0xffffffffffffffff, 0x3}, {0xffffffffffffffff, 0x10a2}, {r1, 0x1}, {0xffffffffffffffff, 0x64c}, {r2, 0x9041}, {0xffffffffffffffff, 0x140}, {r3, 0x10}], 0x7, 0xff)

[  408.482618][T18023]  alloc_workqueue+0x192/0xef0
[  408.488819][T18023]  ? __mutex_lock+0x5bf/0x10a0
[  408.494392][T18023]  ? _raw_spin_unlock+0x24/0x40
[  408.499747][T18023]  ? loop_configure+0xc2/0x1580
06:20:06 executing program 0:
r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0)
mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800004, 0x12, r0, 0x0)
preadv(r0, 0x0, 0x0, 0x9, 0x0)
mmap(&(0x7f0000000000/0xa000)=nil, 0xa000, 0x2, 0x2172, 0xffffffffffffffff, 0x0)
socketpair(0x1e, 0x80002, 0x0, &(0x7f0000000340)={0x0, 0x0})

[  408.505138][T18023]  ? loop_set_status_from_info+0xa60/0xa60
[  408.512369][T18023]  ? workqueue_sysfs_register+0x3e0/0x3e0
[  408.524619][T18023]  ? mutex_lock_io_nested+0xf00/0xf00
[  408.532237][T18023]  ? memcpy+0x39/0x60
[  408.545230][T18023]  ? loop_configure+0x416/0x1580
[  408.552744][T18023]  loop_configure+0x4d8/0x1580
[  408.560035][T18023]  lo_ioctl+0x403/0x1600
[  408.567124][T18023]  ? loop_set_status_old+0x250/0x250
[  408.574799][T18023]  ? find_held_lock+0x2d/0x110
[  408.581861][T18023]  ? tomoyo_path_number_perm+0x204/0x590
[  408.590035][T18023]  ? lock_downgrade+0x6e0/0x6e0
[  408.596648][T18023]  ? kfree+0xeb/0x650
[  408.602121][T18023]  ? tomoyo_path_number_perm+0x441/0x590
[  408.609873][T18023]  ? __sanitizer_cov_trace_const_cmp1+0x22/0x80
[  408.619594][T18023]  ? tomoyo_path_number_perm+0x24e/0x590
[  408.629003][T18023]  ? lock_downgrade+0x6e0/0x6e0
[  408.636829][T18023]  lo_compat_ioctl+0xb1/0x110
[  408.644230][T18023]  compat_blkdev_ioctl+0x3c2/0x870
[  408.652502][T18023]  ? lo_ioctl+0x1600/0x1600
[  408.660259][T18023]  ? blkdev_ioctl+0x6d0/0x6d0
[  408.668953][T18023]  ? __sanitizer_cov_trace_const_cmp4+0x1c/0x70
[  408.677498][T18023]  ? blkdev_ioctl+0x6d0/0x6d0
[  408.683576][T18023]  __do_compat_sys_ioctl+0x1c7/0x290
[  408.690710][T18023]  __do_fast_syscall_32+0x65/0xf0
[  408.697390][T18023]  do_fast_syscall_32+0x2f/0x70
[  408.703168][T18023]  entry_SYSENTER_compat_after_hwframe+0x4d/0x5c
[  408.711266][T18023] RIP: 0023:0xf7f3f549
[  408.716882][T18023] Code: 03 74 c0 01 10 05 03 74 b8 01 10 06 03 74 b4 01 10 07 03 74 b0 01 10 08 03 74 d8 01 00 00 00 00 00 51 52 55 89 e5 0f 34 cd 80 <5d> 5a 59 c3 90 90 90 90 8d b4 26 00 00 00 00 8d b4 26 00 00 00 00
[  408.746214][T18023] RSP: 002b:00000000f5539418 EFLAGS: 00000296 ORIG_RAX: 0000000000000036
[  408.758484][T18023] RAX: ffffffffffffffda RBX: 0000000000000006 RCX: 0000000000004c00
[  408.770361][T18023] RDX: 0000000000000005 RSI: 0000000000000006 RDI: 000000000816c000
[  408.791201][T18023] RBP: 0000000000000005 R08: 0000000000000000 R09: 0000000000000000
[  408.800410][T18023] R10: 0000000000000000 R11: 0000000000000000 R12: 0000000000000000
[  408.812008][T18023] R13: 0000000000000000 R14: 0000000000000000 R15: 0000000000000000
06:20:06 executing program 2:
r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0)
mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800004, 0x12, r0, 0x0)
preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x9, 0x0)
r1 = syz_open_dev$tty1(0xc, 0x4, 0x1)
write$binfmt_elf64(r1, &(0x7f0000000380)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40}, [{}], "d1660f10e0ac4a6edbf3aa53803c8f57ef2a12069e82553332d2b96d67f2dbc5b04959dad57c303d876233684f5e9ad402a193da791e11122f2cccbf10d6d499f5e16385d09f63891a965d80bcb68b551fabffb4bf0b5c372b4d69cdefac988201a40429a8d0dc699820193afcab08070fde89c22e16b43dde5e37d9a3df0cd352e8667f163774d9dc3c79571e5100046281", ['\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00']}, 0x80a)

06:20:06 executing program 0:
r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0)
mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800004, 0x12, r0, 0x0)
preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x9, 0x0)
r1 = syz_open_dev$tty1(0xc, 0x4, 0x1)
write$binfmt_elf64(r1, &(0x7f0000000380)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, 0x0, 0x0, 0x38, 0x0, 0x0, 0x4, 0x4}, [{0x5, 0x9, 0x6, 0x101, 0x6, 0x4, 0x9, 0x6}, {0x5, 0x3, 0x5e61, 0x80000000, 0xcc3, 0x9, 0x7, 0x8}], "d1660f10e0ac4a6edbf3aa53803c8f57ef2a12069e82553332d2b96d67f2dbc5b04959dad57c303d876233684f5e9ad402a193da791e11122f2cccbf10d6d499f5e16385d09f63891a965d80bcb68b551fabffb4bf0b5c372b4d69cdefac988201a40429a8d0dc699820193afcab08070fde89c22e16b43dde5e37d9a3df0cd352e8667f163774d9dc3c79571e5100046281", ['\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00']}, 0x842)

06:20:06 executing program 1:
r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0)
mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800004, 0x12, r0, 0x0)
preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x9, 0x0)
mmap(&(0x7f0000000000/0xa000)=nil, 0xa000, 0x2, 0x2172, 0xffffffffffffffff, 0x0)
socketpair(0x1e, 0x80005, 0x0, &(0x7f0000000340)={<r1=>0x0, <r2=>0x0})
r3 = socket$unix(0x1, 0x0, 0x0)
r4 = socket$unix(0x1, 0x1, 0x0)
r5 = openat$khugepaged_scan(0xffffff9c, &(0x7f00000000c0), 0x1, 0x0)
poll(&(0x7f0000000140)=[{r1, 0x3}, {0xffffffffffffffff, 0x10a2}, {r3, 0x1}, {r2, 0x64c}, {r4, 0x9041}, {0xffffffffffffffff, 0x140}, {r5, 0x10}], 0x7, 0xff)

06:20:06 executing program 3 (fault-call:3 fault-nth:19):
r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0)
mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800004, 0x12, r0, 0x0)
preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x9, 0x0)
syz_mount_image$reiserfs(&(0x7f0000000140), &(0x7f0000000180)='./file0\x00', 0x0, 0x0, &(0x7f0000000300), 0x0, &(0x7f0000000440))

[  409.258121][T18043] FAULT_INJECTION: forcing a failure.
[  409.258121][T18043] name failslab, interval 1, probability 0, space 0, times 0
[  409.281026][T18043] CPU: 2 PID: 18043 Comm: syz-executor.3 Not tainted 5.14.0-rc2-syzkaller #0
[  409.295127][T18043] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.14.0-2 04/01/2014
[  409.308648][T18043] Call Trace:
[  409.314094][T18043]  dump_stack_lvl+0xcd/0x134
[  409.321211][T18043]  should_fail.cold+0x5/0xa
[  409.326832][T18043]  should_failslab+0x5/0x10
[  409.332497][T18043]  __kmalloc_track_caller+0x79/0x320
06:20:06 executing program 1:
r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0)
mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800004, 0x12, r0, 0x0)
preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x9, 0x0)
mmap(&(0x7f0000000000/0xa000)=nil, 0xa000, 0x2, 0x2172, 0xffffffffffffffff, 0x0)
socketpair(0x1e, 0x80005, 0x0, &(0x7f0000000340)={<r1=>0x0, <r2=>0x0})
r3 = socket$unix(0x1, 0x0, 0x0)
r4 = socket$unix(0x1, 0x1, 0x0)
r5 = openat$khugepaged_scan(0xffffff9c, &(0x7f00000000c0), 0x1, 0x0)
poll(&(0x7f0000000140)=[{r1, 0x3}, {0xffffffffffffffff, 0x10a2}, {r3, 0x1}, {r2, 0x64c}, {r4, 0x9041}, {0xffffffffffffffff, 0x140}, {r5, 0x10}], 0x7, 0xff)

[  409.340009][T18043]  ? kasprintf+0xbb/0xf0
[  409.346671][T18043]  kvasprintf+0xb5/0x150
[  409.352620][T18043]  ? bust_spinlocks+0xe0/0xe0
[  409.358492][T18043]  kasprintf+0xbb/0xf0
[  409.365041][T18043]  ? kvasprintf_const+0x190/0x190
[  409.372703][T18043]  ? call_rcu_zapped+0xb0/0xb0
[  409.380754][T18043]  ? lockdep_unlock+0x11c/0x290
[  409.386981][T18043]  alloc_workqueue+0x45d/0xef0
[  409.393448][T18043]  ? __mutex_lock+0x5bf/0x10a0
[  409.414679][T18043]  ? _raw_spin_unlock+0x24/0x40
[  409.422135][T18043]  ? loop_configure+0xc2/0x1580
[  409.428677][T18043]  ? loop_set_status_from_info+0xa60/0xa60
[  409.436818][T18043]  ? workqueue_sysfs_register+0x3e0/0x3e0
[  409.444734][T18043]  ? memcpy+0x39/0x60
[  409.452167][T18043]  ? loop_configure+0x416/0x1580
06:20:07 executing program 1:
r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0)
mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800004, 0x12, r0, 0x0)
preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x9, 0x0)
mmap(&(0x7f0000000000/0xa000)=nil, 0xa000, 0x2, 0x2172, 0xffffffffffffffff, 0x0)
socketpair(0x1e, 0x80005, 0x0, &(0x7f0000000340)={<r1=>0x0, <r2=>0x0})
r3 = socket$unix(0x1, 0x0, 0x0)
r4 = socket$unix(0x1, 0x1, 0x0)
r5 = openat$khugepaged_scan(0xffffff9c, &(0x7f00000000c0), 0x1, 0x0)
poll(&(0x7f0000000140)=[{r1, 0x3}, {0xffffffffffffffff, 0x10a2}, {r3, 0x1}, {r2, 0x64c}, {r4, 0x9041}, {0xffffffffffffffff, 0x140}, {r5, 0x10}], 0x7, 0xff)

[  409.459671][T18043]  loop_configure+0x4d8/0x1580
[  409.467193][T18043]  lo_ioctl+0x403/0x1600
[  409.474030][T18043]  ? loop_set_status_old+0x250/0x250
[  409.483292][T18043]  ? find_held_lock+0x2d/0x110
[  409.490580][T18043]  ? tomoyo_path_number_perm+0x204/0x590
[  409.498857][T18043]  ? lock_downgrade+0x6e0/0x6e0
[  409.506037][T18043]  ? kfree+0xeb/0x650
[  409.511916][T18043]  ? tomoyo_path_number_perm+0x441/0x590
[  409.519089][T18043]  ? __sanitizer_cov_trace_const_cmp1+0x22/0x80
[  409.527487][T18043]  ? tomoyo_path_number_perm+0x24e/0x590
[  409.535457][T18043]  ? lock_downgrade+0x6e0/0x6e0
[  409.541340][T18043]  lo_compat_ioctl+0xb1/0x110
[  409.549233][T18043]  compat_blkdev_ioctl+0x3c2/0x870
[  409.556312][T18043]  ? lo_ioctl+0x1600/0x1600
[  409.563455][T18043]  ? blkdev_ioctl+0x6d0/0x6d0
[  409.569917][T18043]  ? __sanitizer_cov_trace_const_cmp4+0x1c/0x70
[  409.579188][T18043]  ? blkdev_ioctl+0x6d0/0x6d0
[  409.585841][T18043]  __do_compat_sys_ioctl+0x1c7/0x290
06:20:07 executing program 1:
r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0)
mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800004, 0x12, r0, 0x0)
preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x9, 0x0)
mmap(&(0x7f0000000000/0xa000)=nil, 0xa000, 0x2, 0x2172, 0xffffffffffffffff, 0x0)
socketpair(0x1e, 0x80005, 0x0, &(0x7f0000000340)={<r1=>0x0, <r2=>0x0})
r3 = socket$unix(0x1, 0x1, 0x0)
r4 = socket$unix(0x1, 0x0, 0x0)
r5 = openat$khugepaged_scan(0xffffff9c, &(0x7f00000000c0), 0x1, 0x0)
poll(&(0x7f0000000140)=[{r1, 0x3}, {0xffffffffffffffff, 0x10a2}, {r3, 0x1}, {r2, 0x64c}, {r4, 0x9041}, {0xffffffffffffffff, 0x140}, {r5, 0x10}], 0x7, 0xff)

[  409.592956][T18043]  __do_fast_syscall_32+0x65/0xf0
[  409.603977][T18043]  do_fast_syscall_32+0x2f/0x70
[  409.610632][T18043]  entry_SYSENTER_compat_after_hwframe+0x4d/0x5c
[  409.618757][T18043] RIP: 0023:0xf7f3f549
[  409.623980][T18043] Code: 03 74 c0 01 10 05 03 74 b8 01 10 06 03 74 b4 01 10 07 03 74 b0 01 10 08 03 74 d8 01 00 00 00 00 00 51 52 55 89 e5 0f 34 cd 80 <5d> 5a 59 c3 90 90 90 90 8d b4 26 00 00 00 00 8d b4 26 00 00 00 00
[  409.648395][T18043] RSP: 002b:00000000f5539418 EFLAGS: 00000296 ORIG_RAX: 0000000000000036
[  409.659015][T18043] RAX: ffffffffffffffda RBX: 0000000000000006 RCX: 0000000000004c00
06:20:07 executing program 1:
r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0)
mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800004, 0x12, r0, 0x0)
preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x9, 0x0)
mmap(&(0x7f0000000000/0xa000)=nil, 0xa000, 0x2, 0x2172, 0xffffffffffffffff, 0x0)
socketpair(0x1e, 0x80005, 0x0, &(0x7f0000000340)={<r1=>0x0, <r2=>0x0})
r3 = socket$unix(0x1, 0x1, 0x0)
r4 = socket$unix(0x1, 0x0, 0x0)
r5 = openat$khugepaged_scan(0xffffff9c, &(0x7f00000000c0), 0x1, 0x0)
poll(&(0x7f0000000140)=[{r1, 0x3}, {0xffffffffffffffff, 0x10a2}, {r3, 0x1}, {r2, 0x64c}, {r4, 0x9041}, {0xffffffffffffffff, 0x140}, {r5, 0x10}], 0x7, 0xff)

[  409.668836][T18043] RDX: 0000000000000005 RSI: 0000000000000006 RDI: 000000000816c000
[  409.681386][T18043] RBP: 0000000000000005 R08: 0000000000000000 R09: 0000000000000000
[  409.692233][T18043] R10: 0000000000000000 R11: 0000000000000000 R12: 0000000000000000
[  409.705252][T18043] R13: 0000000000000000 R14: 0000000000000000 R15: 0000000000000000
[  410.113953][ T3408] ieee802154 phy0 wpan0: encryption failed: -22
[  410.123286][ T3408] ieee802154 phy1 wpan1: encryption failed: -22
06:20:07 executing program 1:
r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0)
mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800004, 0x12, r0, 0x0)
preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x9, 0x0)
mmap(&(0x7f0000000000/0xa000)=nil, 0xa000, 0x2, 0x2172, 0xffffffffffffffff, 0x0)
socketpair(0x1e, 0x80005, 0x0, &(0x7f0000000340)={<r1=>0x0, <r2=>0x0})
r3 = socket$unix(0x1, 0x1, 0x0)
r4 = socket$unix(0x1, 0x0, 0x0)
r5 = openat$khugepaged_scan(0xffffff9c, &(0x7f00000000c0), 0x1, 0x0)
poll(&(0x7f0000000140)=[{r1, 0x3}, {0xffffffffffffffff, 0x10a2}, {r3, 0x1}, {r2, 0x64c}, {r4, 0x9041}, {0xffffffffffffffff, 0x140}, {r5, 0x10}], 0x7, 0xff)

06:20:07 executing program 3 (fault-call:3 fault-nth:20):
r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0)
mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800004, 0x12, r0, 0x0)
preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x9, 0x0)
syz_mount_image$reiserfs(&(0x7f0000000140), &(0x7f0000000180)='./file0\x00', 0x0, 0x0, &(0x7f0000000300), 0x0, &(0x7f0000000440))

06:20:07 executing program 2:
r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0)
mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800004, 0x12, r0, 0x0)
preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x9, 0x0)
r1 = syz_open_dev$tty1(0xc, 0x4, 0x1)
write$binfmt_elf64(r1, &(0x7f0000000380)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40}, [{}], "d1660f10e0ac4a6edbf3aa53803c8f57ef2a12069e82553332d2b96d67f2dbc5b04959dad57c303d876233684f5e9ad402a193da791e11122f2cccbf10d6d499f5e16385d09f63891a965d80bcb68b551fabffb4bf0b5c372b4d69cdefac988201a40429a8d0dc699820193afcab08070fde89c22e16b43dde5e37d9a3df0cd352e8667f163774d9dc3c79571e5100046281", ['\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00']}, 0x80a)

06:20:07 executing program 0:
r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0)
mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800004, 0x12, r0, 0x0)
preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x9, 0x0)
r1 = syz_open_dev$tty1(0xc, 0x4, 0x1)
write$binfmt_elf64(r1, &(0x7f0000000380)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, 0x0, 0x0, 0x38, 0x0, 0x0, 0x4, 0x4}, [{0x5, 0x9, 0x6, 0x101, 0x6, 0x4, 0x9, 0x6}, {0x5, 0x3, 0x5e61, 0x80000000, 0xcc3, 0x9, 0x7, 0x8}], "d1660f10e0ac4a6edbf3aa53803c8f57ef2a12069e82553332d2b96d67f2dbc5b04959dad57c303d876233684f5e9ad402a193da791e11122f2cccbf10d6d499f5e16385d09f63891a965d80bcb68b551fabffb4bf0b5c372b4d69cdefac988201a40429a8d0dc699820193afcab08070fde89c22e16b43dde5e37d9a3df0cd352e8667f163774d9dc3c79571e5100046281", ['\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00']}, 0x842)

[  410.219389][T18075] FAULT_INJECTION: forcing a failure.
[  410.219389][T18075] name failslab, interval 1, probability 0, space 0, times 0
[  410.236498][T18075] CPU: 2 PID: 18075 Comm: syz-executor.3 Not tainted 5.14.0-rc2-syzkaller #0
[  410.247626][T18075] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.14.0-2 04/01/2014
[  410.260994][T18075] Call Trace:
[  410.265398][T18075]  dump_stack_lvl+0xcd/0x134
[  410.271991][T18075]  should_fail.cold+0x5/0xa
06:20:07 executing program 1:
r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0)
mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800004, 0x12, r0, 0x0)
preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x9, 0x0)
mmap(&(0x7f0000000000/0xa000)=nil, 0xa000, 0x2, 0x2172, 0xffffffffffffffff, 0x0)
socketpair(0x1e, 0x80005, 0x0, &(0x7f0000000340)={<r1=>0x0, <r2=>0x0})
r3 = socket$unix(0x1, 0x1, 0x0)
r4 = socket$unix(0x1, 0x1, 0x0)
r5 = openat$khugepaged_scan(0xffffff9c, 0x0, 0x1, 0x0)
poll(&(0x7f0000000140)=[{r1, 0x3}, {0xffffffffffffffff, 0x10a2}, {r3, 0x1}, {r2, 0x64c}, {r4, 0x9041}, {0xffffffffffffffff, 0x140}, {r5, 0x10}], 0x7, 0xff)

[  410.278590][T18075]  ? apply_wqattrs_prepare+0xac/0x890
[  410.286769][T18075]  should_failslab+0x5/0x10
[  410.293630][T18075]  __kmalloc+0x72/0x330
[  410.300690][T18075]  apply_wqattrs_prepare+0xac/0x890
[  410.308180][T18075]  apply_workqueue_attrs_locked+0xc1/0x140
[  410.323678][T18075]  alloc_workqueue+0xafb/0xef0
[  410.330417][T18075]  ? _raw_spin_unlock+0x24/0x40
[  410.336874][T18075]  ? workqueue_sysfs_register+0x3e0/0x3e0
[  410.345181][T18075]  ? memcpy+0x39/0x60
[  410.352040][T18075]  ? loop_configure+0x416/0x1580
[  410.359870][T18075]  loop_configure+0x4d8/0x1580
[  410.367741][T18075]  lo_ioctl+0x403/0x1600
[  410.373732][T18075]  ? loop_set_status_old+0x250/0x250
[  410.381117][T18075]  ? find_held_lock+0x2d/0x110
[  410.387506][T18075]  ? tomoyo_path_number_perm+0x204/0x590
[  410.396774][T18075]  ? lock_downgrade+0x6e0/0x6e0
[  410.403183][T18075]  ? kfree+0xeb/0x650
[  410.409604][T18075]  ? tomoyo_path_number_perm+0x441/0x590
[  410.418070][T18075]  ? __sanitizer_cov_trace_const_cmp1+0x22/0x80
[  410.428105][T18075]  ? tomoyo_path_number_perm+0x24e/0x590
[  410.437137][T18075]  ? lock_downgrade+0x6e0/0x6e0
[  410.444603][T18075]  lo_compat_ioctl+0xb1/0x110
06:20:08 executing program 1:
r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0)
mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800004, 0x12, r0, 0x0)
preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x9, 0x0)
mmap(&(0x7f0000000000/0xa000)=nil, 0xa000, 0x2, 0x2172, 0xffffffffffffffff, 0x0)
socketpair(0x1e, 0x80005, 0x0, &(0x7f0000000340)={<r1=>0x0, <r2=>0x0})
r3 = socket$unix(0x1, 0x1, 0x0)
r4 = socket$unix(0x1, 0x1, 0x0)
r5 = openat$khugepaged_scan(0xffffff9c, 0x0, 0x1, 0x0)
poll(&(0x7f0000000140)=[{r1, 0x3}, {0xffffffffffffffff, 0x10a2}, {r3, 0x1}, {r2, 0x64c}, {r4, 0x9041}, {0xffffffffffffffff, 0x140}, {r5, 0x10}], 0x7, 0xff)

[  410.450893][T18075]  compat_blkdev_ioctl+0x3c2/0x870
[  410.459846][T18075]  ? lo_ioctl+0x1600/0x1600
[  410.466461][T18075]  ? blkdev_ioctl+0x6d0/0x6d0
[  410.473648][T18075]  ? __sanitizer_cov_trace_const_cmp4+0x1c/0x70
[  410.483140][T18075]  ? blkdev_ioctl+0x6d0/0x6d0
[  410.489780][T18075]  __do_compat_sys_ioctl+0x1c7/0x290
[  410.497205][T18075]  __do_fast_syscall_32+0x65/0xf0
[  410.504835][T18075]  do_fast_syscall_32+0x2f/0x70
[  410.511979][T18075]  entry_SYSENTER_compat_after_hwframe+0x4d/0x5c
[  410.521655][T18075] RIP: 0023:0xf7f3f549
[  410.527844][T18075] Code: 03 74 c0 01 10 05 03 74 b8 01 10 06 03 74 b4 01 10 07 03 74 b0 01 10 08 03 74 d8 01 00 00 00 00 00 51 52 55 89 e5 0f 34 cd 80 <5d> 5a 59 c3 90 90 90 90 8d b4 26 00 00 00 00 8d b4 26 00 00 00 00
[  410.554229][T18075] RSP: 002b:00000000f5539418 EFLAGS: 00000296 ORIG_RAX: 0000000000000036
[  410.565780][T18075] RAX: ffffffffffffffda RBX: 0000000000000006 RCX: 0000000000004c00
[  410.578606][T18075] RDX: 0000000000000005 RSI: 0000000000000006 RDI: 000000000816c000
[  410.589271][T18075] RBP: 0000000000000005 R08: 0000000000000000 R09: 0000000000000000
[  410.602010][T18075] R10: 0000000000000000 R11: 0000000000000000 R12: 0000000000000000
06:20:08 executing program 1:
r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0)
mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800004, 0x12, r0, 0x0)
preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x9, 0x0)
mmap(&(0x7f0000000000/0xa000)=nil, 0xa000, 0x2, 0x2172, 0xffffffffffffffff, 0x0)
socketpair(0x1e, 0x80005, 0x0, &(0x7f0000000340)={<r1=>0x0, <r2=>0x0})
r3 = socket$unix(0x1, 0x1, 0x0)
r4 = socket$unix(0x1, 0x1, 0x0)
r5 = openat$khugepaged_scan(0xffffff9c, 0x0, 0x1, 0x0)
poll(&(0x7f0000000140)=[{r1, 0x3}, {0xffffffffffffffff, 0x10a2}, {r3, 0x1}, {r2, 0x64c}, {r4, 0x9041}, {0xffffffffffffffff, 0x140}, {r5, 0x10}], 0x7, 0xff)

[  410.613194][T18075] R13: 0000000000000000 R14: 0000000000000000 R15: 0000000000000000
06:20:08 executing program 3 (fault-call:3 fault-nth:21):
r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0)
mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800004, 0x12, r0, 0x0)
preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x9, 0x0)
syz_mount_image$reiserfs(&(0x7f0000000140), &(0x7f0000000180)='./file0\x00', 0x0, 0x0, &(0x7f0000000300), 0x0, &(0x7f0000000440))

06:20:08 executing program 1:
r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0)
mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800004, 0x12, r0, 0x0)
preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x9, 0x0)
mmap(&(0x7f0000000000/0xa000)=nil, 0xa000, 0x2, 0x2172, 0xffffffffffffffff, 0x0)
socketpair(0x1e, 0x80005, 0x0, &(0x7f0000000340)={0x0, 0x0})
socket$unix(0x1, 0x1, 0x0)
socket$unix(0x1, 0x1, 0x0)
openat$khugepaged_scan(0xffffff9c, &(0x7f00000000c0), 0x1, 0x0)
poll(0x0, 0x0, 0xff)

[  410.759937][T18091] FAULT_INJECTION: forcing a failure.
[  410.759937][T18091] name failslab, interval 1, probability 0, space 0, times 0
[  410.789488][T18091] CPU: 1 PID: 18091 Comm: syz-executor.3 Not tainted 5.14.0-rc2-syzkaller #0
[  410.804587][T18091] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.14.0-2 04/01/2014
[  410.818392][T18091] Call Trace:
[  410.823700][T18091]  dump_stack_lvl+0xcd/0x134
[  410.831491][T18091]  should_fail.cold+0x5/0xa
[  410.837362][T18091]  ? alloc_workqueue_attrs+0x38/0x80
[  410.844622][T18091]  should_failslab+0x5/0x10
[  410.850862][T18091]  kmem_cache_alloc_trace+0x55/0x3c0
[  410.858018][T18091]  alloc_workqueue_attrs+0x38/0x80
[  410.865172][T18091]  apply_wqattrs_prepare+0xb4/0x890
[  410.872432][T18091]  apply_workqueue_attrs_locked+0xc1/0x140
[  410.880091][T18091]  alloc_workqueue+0xafb/0xef0
[  410.887155][T18091]  ? _raw_spin_unlock+0x24/0x40
[  410.895902][T18091]  ? workqueue_sysfs_register+0x3e0/0x3e0
[  410.905917][T18091]  ? memcpy+0x39/0x60
[  410.911998][T18091]  ? loop_configure+0x416/0x1580
[  410.918826][T18091]  loop_configure+0x4d8/0x1580
[  410.926351][T18091]  lo_ioctl+0x403/0x1600
[  410.932912][T18091]  ? loop_set_status_old+0x250/0x250
[  410.941465][T18091]  ? find_held_lock+0x2d/0x110
[  410.947787][T18091]  ? tomoyo_path_number_perm+0x204/0x590
[  410.955447][T18091]  ? lock_downgrade+0x6e0/0x6e0
[  410.962965][T18091]  ? kfree+0xeb/0x650
[  410.968899][T18091]  ? tomoyo_path_number_perm+0x441/0x590
[  410.976441][T18091]  ? __sanitizer_cov_trace_const_cmp1+0x22/0x80
[  410.985843][T18091]  ? tomoyo_path_number_perm+0x24e/0x590
[  410.994692][T18091]  ? lock_downgrade+0x6e0/0x6e0
[  411.001861][T18091]  lo_compat_ioctl+0xb1/0x110
[  411.007182][T18091]  compat_blkdev_ioctl+0x3c2/0x870
[  411.014138][T18091]  ? lo_ioctl+0x1600/0x1600
[  411.020203][T18091]  ? blkdev_ioctl+0x6d0/0x6d0
[  411.027089][T18091]  ? __sanitizer_cov_trace_const_cmp4+0x1c/0x70
[  411.037478][T18091]  ? blkdev_ioctl+0x6d0/0x6d0
[  411.046368][T18091]  __do_compat_sys_ioctl+0x1c7/0x290
[  411.054977][T18091]  __do_fast_syscall_32+0x65/0xf0
[  411.062351][T18091]  do_fast_syscall_32+0x2f/0x70
[  411.070484][T18091]  entry_SYSENTER_compat_after_hwframe+0x4d/0x5c
[  411.081129][T18091] RIP: 0023:0xf7f3f549
06:20:08 executing program 1:
r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0)
mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800004, 0x12, r0, 0x0)
preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x9, 0x0)
mmap(&(0x7f0000000000/0xa000)=nil, 0xa000, 0x2, 0x2172, 0xffffffffffffffff, 0x0)
socketpair(0x1e, 0x80005, 0x0, &(0x7f0000000340)={0x0, 0x0})
socket$unix(0x1, 0x1, 0x0)
socket$unix(0x1, 0x1, 0x0)
openat$khugepaged_scan(0xffffff9c, &(0x7f00000000c0), 0x1, 0x0)
poll(0x0, 0x0, 0xff)

[  411.087975][T18091] Code: 03 74 c0 01 10 05 03 74 b8 01 10 06 03 74 b4 01 10 07 03 74 b0 01 10 08 03 74 d8 01 00 00 00 00 00 51 52 55 89 e5 0f 34 cd 80 <5d> 5a 59 c3 90 90 90 90 8d b4 26 00 00 00 00 8d b4 26 00 00 00 00
[  411.116779][T18091] RSP: 002b:00000000f5539418 EFLAGS: 00000296 ORIG_RAX: 0000000000000036
[  411.131598][T18091] RAX: ffffffffffffffda RBX: 0000000000000006 RCX: 0000000000004c00
[  411.144605][T18091] RDX: 0000000000000005 RSI: 0000000000000006 RDI: 000000000816c000
[  411.156193][T18091] RBP: 0000000000000005 R08: 0000000000000000 R09: 0000000000000000
[  411.168611][T18091] R10: 0000000000000000 R11: 0000000000000000 R12: 0000000000000000
[  411.180398][T18091] R13: 0000000000000000 R14: 0000000000000000 R15: 0000000000000000
06:20:08 executing program 2:
r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0)
mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800004, 0x12, r0, 0x0)
preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x9, 0x0)
r1 = syz_open_dev$tty1(0xc, 0x4, 0x1)
write$binfmt_elf64(r1, &(0x7f0000000380)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40}, [{}], "", ['\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00']}, 0x778)

06:20:08 executing program 0:
r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0)
mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800004, 0x12, r0, 0x0)
preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x9, 0x0)
r1 = syz_open_dev$tty1(0xc, 0x4, 0x1)
write$binfmt_elf64(r1, &(0x7f0000000380)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40}, [{}], "d1660f10e0ac4a6edbf3aa53803c8f57ef2a12069e82553332d2b96d67f2dbc5b04959dad57c303d876233684f5e9ad402a193da791e11122f2cccbf10d6d499f5e16385d09f63891a965d80bcb68b551fabffb4bf0b5c372b4d69cdefac988201a40429a8d0dc699820193afcab08070fde89c22e16b43dde5e37d9a3df0cd352e8667f163774d9dc3c79571e5100046281", ['\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00']}, 0x80a)

06:20:08 executing program 3 (fault-call:3 fault-nth:22):
r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0)
mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800004, 0x12, r0, 0x0)
preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x9, 0x0)
syz_mount_image$reiserfs(&(0x7f0000000140), &(0x7f0000000180)='./file0\x00', 0x0, 0x0, &(0x7f0000000300), 0x0, &(0x7f0000000440))

06:20:09 executing program 1:
r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0)
mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800004, 0x12, r0, 0x0)
preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x9, 0x0)
mmap(&(0x7f0000000000/0xa000)=nil, 0xa000, 0x2, 0x2172, 0xffffffffffffffff, 0x0)
socketpair(0x1e, 0x80005, 0x0, &(0x7f0000000340)={0x0, 0x0})
socket$unix(0x1, 0x1, 0x0)
socket$unix(0x1, 0x1, 0x0)
openat$khugepaged_scan(0xffffff9c, &(0x7f00000000c0), 0x1, 0x0)
poll(0x0, 0x0, 0xff)

[  411.469690][T18102] FAULT_INJECTION: forcing a failure.
[  411.469690][T18102] name failslab, interval 1, probability 0, space 0, times 0
[  411.494244][T18102] CPU: 3 PID: 18102 Comm: syz-executor.3 Not tainted 5.14.0-rc2-syzkaller #0
[  411.510239][T18102] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.14.0-2 04/01/2014
[  411.527748][T18102] Call Trace:
[  411.532922][T18102]  dump_stack_lvl+0xcd/0x134
[  411.539526][T18102]  should_fail.cold+0x5/0xa
[  411.545664][T18102]  ? alloc_workqueue_attrs+0x38/0x80
[  411.552207][T18102]  should_failslab+0x5/0x10
[  411.558246][T18102]  kmem_cache_alloc_trace+0x55/0x3c0
[  411.567080][T18102]  alloc_workqueue_attrs+0x38/0x80
[  411.574886][T18102]  apply_wqattrs_prepare+0xbc/0x890
[  411.582327][T18102]  apply_workqueue_attrs_locked+0xc1/0x140
[  411.592333][T18102]  alloc_workqueue+0xafb/0xef0
[  411.600628][T18102]  ? _raw_spin_unlock+0x24/0x40
[  411.608343][T18102]  ? workqueue_sysfs_register+0x3e0/0x3e0
[  411.617288][T18102]  ? memcpy+0x39/0x60
[  411.623542][T18102]  ? loop_configure+0x416/0x1580
[  411.630517][T18102]  loop_configure+0x4d8/0x1580
[  411.636920][T18102]  lo_ioctl+0x403/0x1600
[  411.642598][T18102]  ? loop_set_status_old+0x250/0x250
[  411.649577][T18102]  ? find_held_lock+0x2d/0x110
[  411.659011][T18102]  ? tomoyo_path_number_perm+0x204/0x590
[  411.668737][T18102]  ? lock_downgrade+0x6e0/0x6e0
[  411.674176][T18102]  ? kfree+0xeb/0x650
[  411.678833][T18102]  ? tomoyo_path_number_perm+0x441/0x590
[  411.686438][T18102]  ? __sanitizer_cov_trace_const_cmp1+0x22/0x80
[  411.708102][T18102]  ? tomoyo_path_number_perm+0x24e/0x590
[  411.717081][T18102]  ? lock_downgrade+0x6e0/0x6e0
[  411.724623][T18102]  lo_compat_ioctl+0xb1/0x110
[  411.730485][T18102]  compat_blkdev_ioctl+0x3c2/0x870
[  411.737211][T18102]  ? lo_ioctl+0x1600/0x1600
[  411.743445][T18102]  ? blkdev_ioctl+0x6d0/0x6d0
[  411.749317][T18102]  ? __sanitizer_cov_trace_const_cmp4+0x1c/0x70
[  411.758233][T18102]  ? blkdev_ioctl+0x6d0/0x6d0
[  411.764988][T18102]  __do_compat_sys_ioctl+0x1c7/0x290
[  411.772083][T18102]  __do_fast_syscall_32+0x65/0xf0
[  411.779442][T18102]  do_fast_syscall_32+0x2f/0x70
[  411.787062][T18102]  entry_SYSENTER_compat_after_hwframe+0x4d/0x5c
[  411.795901][T18102] RIP: 0023:0xf7f3f549
[  411.801337][T18102] Code: 03 74 c0 01 10 05 03 74 b8 01 10 06 03 74 b4 01 10 07 03 74 b0 01 10 08 03 74 d8 01 00 00 00 00 00 51 52 55 89 e5 0f 34 cd 80 <5d> 5a 59 c3 90 90 90 90 8d b4 26 00 00 00 00 8d b4 26 00 00 00 00
[  411.831247][T18102] RSP: 002b:00000000f5539418 EFLAGS: 00000296 ORIG_RAX: 0000000000000036
[  411.843057][T18102] RAX: ffffffffffffffda RBX: 0000000000000006 RCX: 0000000000004c00
[  411.855973][T18102] RDX: 0000000000000005 RSI: 0000000000000006 RDI: 000000000816c000
[  411.868652][T18102] RBP: 0000000000000005 R08: 0000000000000000 R09: 0000000000000000
[  411.880194][T18102] R10: 0000000000000000 R11: 0000000000000000 R12: 0000000000000000
06:20:09 executing program 1:
r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0)
mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800004, 0x12, r0, 0x0)
preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x9, 0x0)
mmap(&(0x7f0000000000/0xa000)=nil, 0xa000, 0x2, 0x2172, 0xffffffffffffffff, 0x0)
socketpair(0x1e, 0x80005, 0x0, &(0x7f0000000340)={<r1=>0x0, <r2=>0x0})
r3 = socket$unix(0x1, 0x1, 0x0)
r4 = socket$unix(0x1, 0x1, 0x0)
openat$khugepaged_scan(0xffffff9c, &(0x7f00000000c0), 0x1, 0x0)
poll(&(0x7f0000000140)=[{r1, 0x3}, {0xffffffffffffffff, 0x10a2}, {r3, 0x1}, {r2, 0x64c}, {r4, 0x9041}, {0xffffffffffffffff, 0x140}], 0x6, 0xff)

[  411.892747][T18102] R13: 0000000000000000 R14: 0000000000000000 R15: 0000000000000000
06:20:09 executing program 3 (fault-call:3 fault-nth:23):
r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0)
mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800004, 0x12, r0, 0x0)
preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x9, 0x0)
syz_mount_image$reiserfs(&(0x7f0000000140), &(0x7f0000000180)='./file0\x00', 0x0, 0x0, &(0x7f0000000300), 0x0, &(0x7f0000000440))

06:20:09 executing program 1:
r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0)
mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800004, 0x12, r0, 0x0)
preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x9, 0x0)
mmap(&(0x7f0000000000/0xa000)=nil, 0xa000, 0x2, 0x2172, 0xffffffffffffffff, 0x0)
socketpair(0x1e, 0x80005, 0x0, &(0x7f0000000340)={<r1=>0x0, <r2=>0x0})
r3 = socket$unix(0x1, 0x1, 0x0)
r4 = socket$unix(0x1, 0x1, 0x0)
openat$khugepaged_scan(0xffffff9c, &(0x7f00000000c0), 0x1, 0x0)
poll(&(0x7f0000000140)=[{r1, 0x3}, {0xffffffffffffffff, 0x10a2}, {r3, 0x1}, {r2, 0x64c}, {r4, 0x9041}, {0xffffffffffffffff, 0x140}], 0x6, 0xff)

[  412.008817][T18113] FAULT_INJECTION: forcing a failure.
[  412.008817][T18113] name failslab, interval 1, probability 0, space 0, times 0
[  412.030304][T18113] CPU: 3 PID: 18113 Comm: syz-executor.3 Not tainted 5.14.0-rc2-syzkaller #0
[  412.044381][T18113] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.14.0-2 04/01/2014
[  412.055685][T18113] Call Trace:
[  412.060693][T18113]  dump_stack_lvl+0xcd/0x134
[  412.067042][T18113]  should_fail.cold+0x5/0xa
[  412.074403][T18113]  should_failslab+0x5/0x10
[  412.082107][T18113]  kmem_cache_alloc_node+0x65/0x3e0
[  412.091153][T18113]  ? alloc_unbound_pwq+0x4a5/0xcd0
[  412.098906][T18113]  alloc_unbound_pwq+0x4a5/0xcd0
06:20:09 executing program 1:
r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0)
mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800004, 0x12, r0, 0x0)
preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x9, 0x0)
mmap(&(0x7f0000000000/0xa000)=nil, 0xa000, 0x2, 0x2172, 0xffffffffffffffff, 0x0)
socketpair(0x1e, 0x80005, 0x0, &(0x7f0000000340)={<r1=>0x0, <r2=>0x0})
r3 = socket$unix(0x1, 0x1, 0x0)
r4 = socket$unix(0x1, 0x1, 0x0)
openat$khugepaged_scan(0xffffff9c, &(0x7f00000000c0), 0x1, 0x0)
poll(&(0x7f0000000140)=[{r1, 0x3}, {0xffffffffffffffff, 0x10a2}, {r3, 0x1}, {r2, 0x64c}, {r4, 0x9041}, {0xffffffffffffffff, 0x140}], 0x6, 0xff)

[  412.106799][T18113]  apply_wqattrs_prepare+0x2b6/0x890
[  412.115767][T18113]  apply_workqueue_attrs_locked+0xc1/0x140
[  412.122152][T18113]  alloc_workqueue+0xafb/0xef0
[  412.128497][T18113]  ? _raw_spin_unlock+0x24/0x40
[  412.135659][T18113]  ? workqueue_sysfs_register+0x3e0/0x3e0
[  412.155536][T18113]  ? memcpy+0x39/0x60
[  412.162637][T18113]  ? loop_configure+0x416/0x1580
[  412.170279][T18113]  loop_configure+0x4d8/0x1580
[  412.179013][T18113]  lo_ioctl+0x403/0x1600
[  412.179108][T18113]  ? loop_set_status_old+0x250/0x250
[  412.179142][T18113]  ? find_held_lock+0x2d/0x110
[  412.179181][T18113]  ? tomoyo_path_number_perm+0x204/0x590
[  412.179211][T18113]  ? lock_downgrade+0x6e0/0x6e0
[  412.215753][T18113]  ? kfree+0xeb/0x650
[  412.220886][T18113]  ? tomoyo_path_number_perm+0x441/0x590
[  412.229227][T18113]  ? __sanitizer_cov_trace_const_cmp1+0x22/0x80
[  412.238751][T18113]  ? tomoyo_path_number_perm+0x24e/0x590
[  412.247180][T18113]  ? lock_downgrade+0x6e0/0x6e0
[  412.254607][T18113]  lo_compat_ioctl+0xb1/0x110
[  412.261563][T18113]  compat_blkdev_ioctl+0x3c2/0x870
[  412.268964][T18113]  ? lo_ioctl+0x1600/0x1600
[  412.275445][T18113]  ? blkdev_ioctl+0x6d0/0x6d0
[  412.283956][T18113]  ? __sanitizer_cov_trace_const_cmp4+0x1c/0x70
[  412.292609][T18113]  ? blkdev_ioctl+0x6d0/0x6d0
[  412.299591][T18113]  __do_compat_sys_ioctl+0x1c7/0x290
[  412.306843][T18113]  __do_fast_syscall_32+0x65/0xf0
[  412.313822][T18113]  do_fast_syscall_32+0x2f/0x70
[  412.321197][T18113]  entry_SYSENTER_compat_after_hwframe+0x4d/0x5c
[  412.330930][T18113] RIP: 0023:0xf7f3f549
[  412.337138][T18113] Code: 03 74 c0 01 10 05 03 74 b8 01 10 06 03 74 b4 01 10 07 03 74 b0 01 10 08 03 74 d8 01 00 00 00 00 00 51 52 55 89 e5 0f 34 cd 80 <5d> 5a 59 c3 90 90 90 90 8d b4 26 00 00 00 00 8d b4 26 00 00 00 00
[  412.365072][T18113] RSP: 002b:00000000f5539418 EFLAGS: 00000296 ORIG_RAX: 0000000000000036
[  412.394444][T18113] RAX: ffffffffffffffda RBX: 0000000000000006 RCX: 0000000000004c00
[  412.411092][T18113] RDX: 0000000000000005 RSI: 0000000000000006 RDI: 000000000816c000
[  412.425105][T18113] RBP: 0000000000000005 R08: 0000000000000000 R09: 0000000000000000
[  412.435084][T18113] R10: 0000000000000000 R11: 0000000000000000 R12: 0000000000000000
[  412.446249][T18113] R13: 0000000000000000 R14: 0000000000000000 R15: 0000000000000000
06:20:09 executing program 2:
r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0)
mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800004, 0x12, r0, 0x0)
preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x9, 0x0)
r1 = syz_open_dev$tty1(0xc, 0x4, 0x1)
write$binfmt_elf64(r1, &(0x7f0000000380)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40}, [{}], "", ['\x00', '\x00', '\x00', '\x00', '\x00', '\x00']}, 0x678)

06:20:10 executing program 0:
r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0)
mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800004, 0x12, r0, 0x0)
preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x9, 0x0)
mmap(&(0x7f0000000000/0xa000)=nil, 0xa000, 0x2, 0x2172, 0xffffffffffffffff, 0x0)
socketpair(0x1e, 0x80005, 0x0, &(0x7f0000000340)={<r1=>0x0, <r2=>0x0})
r3 = socket$unix(0x1, 0x1, 0x0)
r4 = socket$unix(0x1, 0x1, 0x0)
openat$khugepaged_scan(0xffffff9c, &(0x7f00000000c0), 0x1, 0x0)
poll(&(0x7f0000000140)=[{r1, 0x3}, {0xffffffffffffffff, 0x10a2}, {r3, 0x1}, {r2, 0x64c}, {r4, 0x9041}, {0xffffffffffffffff, 0x140}], 0x6, 0xff)

06:20:10 executing program 1:
r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0)
mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800004, 0x12, r0, 0x0)
preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x9, 0x0)
mmap(&(0x7f0000000000/0xa000)=nil, 0xa000, 0x2, 0x2172, 0xffffffffffffffff, 0x0)
socketpair(0x1e, 0x80005, 0x0, &(0x7f0000000340)={<r1=>0x0, <r2=>0x0})
r3 = socket$unix(0x1, 0x1, 0x0)
r4 = socket$unix(0x1, 0x1, 0x0)
openat$khugepaged_scan(0xffffff9c, &(0x7f00000000c0), 0x1, 0x0)
poll(&(0x7f0000000140)=[{r1, 0x3}, {0xffffffffffffffff, 0x10a2}, {r3, 0x1}, {r2, 0x64c}, {r4, 0x9041}, {0xffffffffffffffff, 0x140}, {0xffffffffffffffff, 0x10}], 0x7, 0xff)

06:20:10 executing program 3 (fault-call:3 fault-nth:24):
r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0)
mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800004, 0x12, r0, 0x0)
preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x9, 0x0)
syz_mount_image$reiserfs(&(0x7f0000000140), &(0x7f0000000180)='./file0\x00', 0x0, 0x0, &(0x7f0000000300), 0x0, &(0x7f0000000440))

06:20:10 executing program 1:
r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0)
mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800004, 0x12, r0, 0x0)
preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x9, 0x0)
mmap(&(0x7f0000000000/0xa000)=nil, 0xa000, 0x2, 0x2172, 0xffffffffffffffff, 0x0)
socketpair(0x1e, 0x80005, 0x0, &(0x7f0000000340)={<r1=>0x0, <r2=>0x0})
r3 = socket$unix(0x1, 0x1, 0x0)
r4 = socket$unix(0x1, 0x1, 0x0)
openat$khugepaged_scan(0xffffff9c, &(0x7f00000000c0), 0x1, 0x0)
poll(&(0x7f0000000140)=[{r1, 0x3}, {0xffffffffffffffff, 0x10a2}, {r3, 0x1}, {r2, 0x64c}, {r4, 0x9041}, {0xffffffffffffffff, 0x140}, {0xffffffffffffffff, 0x10}], 0x7, 0xff)

06:20:10 executing program 0:
r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0)
mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x0, 0x12, r0, 0x0)
preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x9, 0x0)
mmap(&(0x7f0000000000/0xa000)=nil, 0xa000, 0x2, 0x2172, 0xffffffffffffffff, 0x0)
socketpair(0x1e, 0x80005, 0x0, &(0x7f0000000340)={<r1=>0x0, <r2=>0x0})
r3 = socket$unix(0x1, 0x1, 0x0)
r4 = socket$unix(0x1, 0x1, 0x0)
r5 = openat$khugepaged_scan(0xffffff9c, &(0x7f00000000c0), 0x1, 0x0)
poll(&(0x7f0000000140)=[{r1, 0x3}, {0xffffffffffffffff, 0x10a2}, {r3, 0x1}, {r2, 0x64c}, {r4, 0x9041}, {0xffffffffffffffff, 0x140}, {r5, 0x10}], 0x7, 0xff)

[  412.717244][T18128] FAULT_INJECTION: forcing a failure.
[  412.717244][T18128] name failslab, interval 1, probability 0, space 0, times 0
[  412.743019][T18128] CPU: 0 PID: 18128 Comm: syz-executor.3 Not tainted 5.14.0-rc2-syzkaller #0
[  412.756481][T18128] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.14.0-2 04/01/2014
[  412.768521][T18128] Call Trace:
[  412.773687][T18128]  dump_stack_lvl+0xcd/0x134
[  412.780007][T18128]  should_fail.cold+0x5/0xa
[  412.786966][T18128]  should_failslab+0x5/0x10
[  412.795017][T18128]  kmem_cache_alloc_node+0x65/0x3e0
[  412.801888][T18128]  ? alloc_unbound_pwq+0x4a5/0xcd0
[  412.808646][T18128]  alloc_unbound_pwq+0x4a5/0xcd0
[  412.815534][T18128]  apply_wqattrs_prepare+0x2b6/0x890
[  412.822668][T18128]  apply_workqueue_attrs_locked+0xc1/0x140
[  412.830783][T18128]  alloc_workqueue+0xafb/0xef0
[  412.836917][T18128]  ? _raw_spin_unlock+0x24/0x40
[  412.843061][T18128]  ? workqueue_sysfs_register+0x3e0/0x3e0
[  412.850883][T18128]  ? memcpy+0x39/0x60
[  412.856920][T18128]  ? loop_configure+0x416/0x1580
[  412.864809][T18128]  loop_configure+0x4d8/0x1580
[  412.871871][T18128]  lo_ioctl+0x403/0x1600
[  412.877719][T18128]  ? loop_set_status_old+0x250/0x250
[  412.886716][T18128]  ? find_held_lock+0x2d/0x110
[  412.893657][T18128]  ? tomoyo_path_number_perm+0x204/0x590
[  412.901581][T18128]  ? lock_downgrade+0x6e0/0x6e0
[  412.908576][T18128]  ? kfree+0xeb/0x650
06:20:10 executing program 0:
r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0)
mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x0, 0x12, r0, 0x0)
preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x9, 0x0)
mmap(&(0x7f0000000000/0xa000)=nil, 0xa000, 0x2, 0x2172, 0xffffffffffffffff, 0x0)
socketpair(0x1e, 0x80005, 0x0, &(0x7f0000000340)={<r1=>0x0, <r2=>0x0})
r3 = socket$unix(0x1, 0x1, 0x0)
r4 = socket$unix(0x1, 0x1, 0x0)
r5 = openat$khugepaged_scan(0xffffff9c, &(0x7f00000000c0), 0x1, 0x0)
poll(&(0x7f0000000140)=[{r1, 0x3}, {0xffffffffffffffff, 0x10a2}, {r3, 0x1}, {r2, 0x64c}, {r4, 0x9041}, {0xffffffffffffffff, 0x140}, {r5, 0x10}], 0x7, 0xff)

[  412.913913][T18128]  ? tomoyo_path_number_perm+0x441/0x590
[  412.922223][T18128]  ? __sanitizer_cov_trace_const_cmp1+0x22/0x80
[  412.930329][T18128]  ? tomoyo_path_number_perm+0x24e/0x590
[  412.939364][T18128]  ? lock_downgrade+0x6e0/0x6e0
[  412.946326][T18128]  lo_compat_ioctl+0xb1/0x110
[  412.953063][T18128]  compat_blkdev_ioctl+0x3c2/0x870
[  412.959917][T18128]  ? lo_ioctl+0x1600/0x1600
[  412.966529][T18128]  ? blkdev_ioctl+0x6d0/0x6d0
[  412.973401][T18128]  ? __sanitizer_cov_trace_const_cmp4+0x1c/0x70
[  412.981617][T18128]  ? blkdev_ioctl+0x6d0/0x6d0
[  412.988148][T18128]  __do_compat_sys_ioctl+0x1c7/0x290
[  412.996274][T18128]  __do_fast_syscall_32+0x65/0xf0
[  413.003599][T18128]  do_fast_syscall_32+0x2f/0x70
[  413.011189][T18128]  entry_SYSENTER_compat_after_hwframe+0x4d/0x5c
[  413.020360][T18128] RIP: 0023:0xf7f3f549
[  413.027810][T18128] Code: 03 74 c0 01 10 05 03 74 b8 01 10 06 03 74 b4 01 10 07 03 74 b0 01 10 08 03 74 d8 01 00 00 00 00 00 51 52 55 89 e5 0f 34 cd 80 <5d> 5a 59 c3 90 90 90 90 8d b4 26 00 00 00 00 8d b4 26 00 00 00 00
[  413.055687][T18128] RSP: 002b:00000000f5539418 EFLAGS: 00000296 ORIG_RAX: 0000000000000036
[  413.066655][T18128] RAX: ffffffffffffffda RBX: 0000000000000006 RCX: 0000000000004c00
[  413.079053][T18128] RDX: 0000000000000005 RSI: 0000000000000006 RDI: 000000000816c000
[  413.092670][T18128] RBP: 0000000000000005 R08: 0000000000000000 R09: 0000000000000000
[  413.107343][T18128] R10: 0000000000000000 R11: 0000000000000000 R12: 0000000000000000
[  413.142914][T18128] R13: 0000000000000000 R14: 0000000000000000 R15: 0000000000000000
06:20:10 executing program 0:
r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0)
mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x0, 0x12, r0, 0x0)
preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x9, 0x0)
mmap(&(0x7f0000000000/0xa000)=nil, 0xa000, 0x2, 0x2172, 0xffffffffffffffff, 0x0)
socketpair(0x1e, 0x80005, 0x0, &(0x7f0000000340)={<r1=>0x0, <r2=>0x0})
r3 = socket$unix(0x1, 0x1, 0x0)
r4 = socket$unix(0x1, 0x1, 0x0)
r5 = openat$khugepaged_scan(0xffffff9c, &(0x7f00000000c0), 0x1, 0x0)
poll(&(0x7f0000000140)=[{r1, 0x3}, {0xffffffffffffffff, 0x10a2}, {r3, 0x1}, {r2, 0x64c}, {r4, 0x9041}, {0xffffffffffffffff, 0x140}, {r5, 0x10}], 0x7, 0xff)

06:20:10 executing program 2:
r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0)
mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800004, 0x12, r0, 0x0)
preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x9, 0x0)
r1 = syz_open_dev$tty1(0xc, 0x4, 0x1)
write$binfmt_elf64(r1, &(0x7f0000000380)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40}, [{}], "", ['\x00', '\x00', '\x00', '\x00', '\x00']}, 0x578)

06:20:10 executing program 0:
r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0)
preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x9, 0x0)
mmap(&(0x7f0000000000/0xa000)=nil, 0xa000, 0x2, 0x2172, 0xffffffffffffffff, 0x0)
socketpair(0x1e, 0x80005, 0x0, &(0x7f0000000340)={<r1=>0x0, <r2=>0x0})
r3 = socket$unix(0x1, 0x1, 0x0)
r4 = socket$unix(0x1, 0x1, 0x0)
r5 = openat$khugepaged_scan(0xffffff9c, &(0x7f00000000c0), 0x1, 0x0)
poll(&(0x7f0000000140)=[{r1, 0x3}, {0xffffffffffffffff, 0x10a2}, {r3, 0x1}, {r2, 0x64c}, {r4, 0x9041}, {0xffffffffffffffff, 0x140}, {r5, 0x10}], 0x7, 0xff)

06:20:10 executing program 1:
r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0)
mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800004, 0x12, r0, 0x0)
preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x9, 0x0)
mmap(&(0x7f0000000000/0xa000)=nil, 0xa000, 0x2, 0x2172, 0xffffffffffffffff, 0x0)
socketpair(0x1e, 0x80005, 0x0, &(0x7f0000000340)={<r1=>0x0, <r2=>0x0})
r3 = socket$unix(0x1, 0x1, 0x0)
r4 = socket$unix(0x1, 0x1, 0x0)
openat$khugepaged_scan(0xffffff9c, &(0x7f00000000c0), 0x1, 0x0)
poll(&(0x7f0000000140)=[{r1, 0x3}, {0xffffffffffffffff, 0x10a2}, {r3, 0x1}, {r2, 0x64c}, {r4, 0x9041}, {0xffffffffffffffff, 0x140}, {0xffffffffffffffff, 0x10}], 0x7, 0xff)

06:20:10 executing program 3 (fault-call:3 fault-nth:25):
r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0)
mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800004, 0x12, r0, 0x0)
preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x9, 0x0)
syz_mount_image$reiserfs(&(0x7f0000000140), &(0x7f0000000180)='./file0\x00', 0x0, 0x0, &(0x7f0000000300), 0x0, &(0x7f0000000440))

06:20:10 executing program 0:
r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0)
mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800004, 0x12, r0, 0x0)
preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x9, 0x0)
r1 = syz_open_dev$tty1(0xc, 0x4, 0x1)
write$binfmt_elf64(r1, &(0x7f0000000380)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40}, [{}], "", ['\x00', '\x00', '\x00', '\x00', '\x00', '\x00']}, 0x678)

[  413.337135][T18147] FAULT_INJECTION: forcing a failure.
[  413.337135][T18147] name failslab, interval 1, probability 0, space 0, times 0
[  413.358832][T18147] CPU: 3 PID: 18147 Comm: syz-executor.3 Not tainted 5.14.0-rc2-syzkaller #0
06:20:10 executing program 1:
r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0)
mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800004, 0x12, r0, 0x0)
preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x9, 0x0)
mmap(&(0x7f0000000000/0xa000)=nil, 0xa000, 0x2, 0x2172, 0xffffffffffffffff, 0x0)
socketpair(0x1e, 0x80005, 0x0, &(0x7f0000000340)={<r1=>0x0, <r2=>0x0})
r3 = socket$unix(0x1, 0x1, 0x0)
r4 = socket$unix(0x1, 0x1, 0x0)
r5 = openat$khugepaged_scan(0xffffff9c, &(0x7f00000000c0), 0x1, 0x0)
poll(&(0x7f0000000140)=[{r1, 0x3}, {0xffffffffffffffff, 0x10a2}, {r3, 0x1}, {r2, 0x64c}, {r4, 0x9041}, {0xffffffffffffffff, 0x140}, {r5}], 0x7, 0xff)

[  413.371013][T18147] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.14.0-2 04/01/2014
[  413.389800][T18147] Call Trace:
[  413.394042][T18147]  dump_stack_lvl+0xcd/0x134
[  413.399919][T18147]  should_fail.cold+0x5/0xa
[  413.407783][T18147]  should_failslab+0x5/0x10
[  413.415730][T18147]  kmem_cache_alloc_node+0x65/0x3e0
[  413.423542][T18147]  ? alloc_unbound_pwq+0x4a5/0xcd0
[  413.430775][T18147]  alloc_unbound_pwq+0x4a5/0xcd0
[  413.438504][T18147]  apply_wqattrs_prepare+0x624/0x890
[  413.447221][T18147]  apply_workqueue_attrs_locked+0xc1/0x140
[  413.458027][T18147]  alloc_workqueue+0xafb/0xef0
[  413.467140][T18147]  ? _raw_spin_unlock+0x24/0x40
[  413.474152][T18147]  ? workqueue_sysfs_register+0x3e0/0x3e0
[  413.483407][T18147]  ? memcpy+0x39/0x60
[  413.490237][T18147]  ? loop_configure+0x416/0x1580
[  413.498169][T18147]  loop_configure+0x4d8/0x1580
[  413.506196][T18147]  lo_ioctl+0x403/0x1600
[  413.513865][T18147]  ? loop_set_status_old+0x250/0x250
[  413.521484][T18147]  ? find_held_lock+0x2d/0x110
[  413.529324][T18147]  ? tomoyo_path_number_perm+0x204/0x590
[  413.538315][T18147]  ? lock_downgrade+0x6e0/0x6e0
[  413.544997][T18147]  ? kfree+0xeb/0x650
[  413.550734][T18147]  ? tomoyo_path_number_perm+0x441/0x590
[  413.558723][T18147]  ? __sanitizer_cov_trace_const_cmp1+0x22/0x80
[  413.567123][T18147]  ? tomoyo_path_number_perm+0x24e/0x590
[  413.575837][T18147]  ? lock_downgrade+0x6e0/0x6e0
[  413.583917][T18147]  lo_compat_ioctl+0xb1/0x110
[  413.591240][T18147]  compat_blkdev_ioctl+0x3c2/0x870
[  413.598002][T18147]  ? lo_ioctl+0x1600/0x1600
[  413.604599][T18147]  ? blkdev_ioctl+0x6d0/0x6d0
[  413.612410][T18147]  ? __sanitizer_cov_trace_const_cmp4+0x1c/0x70
[  413.627366][T18147]  ? blkdev_ioctl+0x6d0/0x6d0
[  413.638529][T18147]  __do_compat_sys_ioctl+0x1c7/0x290
[  413.650251][T18147]  __do_fast_syscall_32+0x65/0xf0
[  413.657300][T18147]  do_fast_syscall_32+0x2f/0x70
[  413.664309][T18147]  entry_SYSENTER_compat_after_hwframe+0x4d/0x5c
[  413.673471][T18147] RIP: 0023:0xf7f3f549
[  413.678972][T18147] Code: 03 74 c0 01 10 05 03 74 b8 01 10 06 03 74 b4 01 10 07 03 74 b0 01 10 08 03 74 d8 01 00 00 00 00 00 51 52 55 89 e5 0f 34 cd 80 <5d> 5a 59 c3 90 90 90 90 8d b4 26 00 00 00 00 8d b4 26 00 00 00 00
[  413.708063][T18147] RSP: 002b:00000000f5539418 EFLAGS: 00000296 ORIG_RAX: 0000000000000036
[  413.719349][T18147] RAX: ffffffffffffffda RBX: 0000000000000006 RCX: 0000000000004c00
06:20:11 executing program 1:
r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0)
mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800004, 0x12, r0, 0x0)
preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x9, 0x0)
mmap(&(0x7f0000000000/0xa000)=nil, 0xa000, 0x2, 0x2172, 0xffffffffffffffff, 0x0)
socketpair(0x1e, 0x80005, 0x0, &(0x7f0000000340)={<r1=>0x0, <r2=>0x0})
r3 = socket$unix(0x1, 0x1, 0x0)
r4 = socket$unix(0x1, 0x1, 0x0)
r5 = openat$khugepaged_scan(0xffffff9c, &(0x7f00000000c0), 0x1, 0x0)
poll(&(0x7f0000000140)=[{r1, 0x3}, {0xffffffffffffffff, 0x10a2}, {r3, 0x1}, {r2, 0x64c}, {r4, 0x9041}, {r5}], 0x6, 0xff)

06:20:11 executing program 1:
r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0)
mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800004, 0x12, r0, 0x0)
preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x9, 0x0)
mmap(&(0x7f0000000000/0xa000)=nil, 0xa000, 0x2, 0x2172, 0xffffffffffffffff, 0x0)
socketpair(0x1e, 0x80005, 0x0, &(0x7f0000000340)={<r1=>0x0, <r2=>0x0})
r3 = socket$unix(0x1, 0x1, 0x0)
r4 = socket$unix(0x1, 0x1, 0x0)
openat$khugepaged_scan(0xffffff9c, &(0x7f00000000c0), 0x1, 0x0)
poll(&(0x7f0000000140)=[{r1, 0x3}, {0xffffffffffffffff, 0x10a2}, {r3, 0x1}, {r2, 0x64c}, {r4, 0x9041}, {}], 0x6, 0xff)

[  413.730825][T18147] RDX: 0000000000000005 RSI: 0000000000000006 RDI: 000000000816c000
[  413.741213][T18147] RBP: 0000000000000005 R08: 0000000000000000 R09: 0000000000000000
[  413.751594][T18147] R10: 0000000000000000 R11: 0000000000000000 R12: 0000000000000000
[  413.762232][T18147] R13: 0000000000000000 R14: 0000000000000000 R15: 0000000000000000
[  413.810262][T18147] ------------[ cut here ]------------
[  413.819156][T18147] WARNING: CPU: 3 PID: 18147 at kernel/locking/lockdep.c:6305 lockdep_unregister_key+0x19a/0x250
[  413.833993][T18147] Modules linked in:
[  413.859430][T18147] CPU: 3 PID: 18147 Comm: syz-executor.3 Not tainted 5.14.0-rc2-syzkaller #0
[  413.884805][T18147] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.14.0-2 04/01/2014
[  413.896559][T18147] RIP: 0010:lockdep_unregister_key+0x19a/0x250
[  413.907246][T18147] Code: 00 00 fc ff df 48 89 fa 48 c1 ea 03 80 3c 02 00 0f 85 8f 00 00 00 4d 89 7d 08 48 b8 22 01 00 00 00 00 ad de 48 89 43 08 eb 02 <0f> 0b 4c 89 f7 ba 01 00 00 00 48 89 ee e8 44 fd ff ff 4c 89 f7 e8
[  413.937263][T18147] RSP: 0018:ffffc9002988f8a8 EFLAGS: 00010046
[  413.945334][T18147] RAX: dffffc0000000000 RBX: 0000000000000000 RCX: 1ffffffff1ad8ffd
[  413.956623][T18147] RDX: 1ffffffff1fca217 RSI: 0000000000000004 RDI: ffffffff8fe510b8
[  413.967536][T18147] RBP: ffff888029bc9128 R08: 0000000000000001 R09: 0000000000000003
[  413.978943][T18147] R10: fffff52005311f0b R11: 0000000000000001 R12: 0000000000000246
[  413.990334][T18147] R13: dffffc0000000000 R14: ffffffff8fcc8858 R15: ffff888029bc9020
[  413.999127][T18147] FS:  0000000000000000(0000) GS:ffff88802cd00000(0063) knlGS:00000000f5539b40
[  414.011877][T18147] CS:  0010 DS: 002b ES: 002b CR0: 0000000080050033
[  414.021579][T18147] CR2: 00000000f5538fe4 CR3: 000000002051c000 CR4: 0000000000150ee0
[  414.033241][T18147] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000
[  414.044436][T18147] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400
[  414.055821][T18147] Call Trace:
[  414.060159][T18147]  alloc_workqueue+0xb31/0xef0
[  414.067070][T18147]  ? _raw_spin_unlock+0x24/0x40
[  414.073598][T18147]  ? workqueue_sysfs_register+0x3e0/0x3e0
[  414.081034][T18147]  ? memcpy+0x39/0x60
[  414.086585][T18147]  ? loop_configure+0x416/0x1580
[  414.092590][T18147]  loop_configure+0x4d8/0x1580
[  414.099362][T18147]  lo_ioctl+0x403/0x1600
[  414.104936][T18147]  ? loop_set_status_old+0x250/0x250
[  414.111905][T18147]  ? find_held_lock+0x2d/0x110
[  414.118401][T18147]  ? tomoyo_path_number_perm+0x204/0x590
[  414.127548][T18147]  ? lock_downgrade+0x6e0/0x6e0
[  414.127599][T18147]  ? kfree+0xeb/0x650
06:20:11 executing program 2:
r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0)
mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800004, 0x12, r0, 0x0)
preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x9, 0x0)
r1 = syz_open_dev$tty1(0xc, 0x4, 0x1)
write$binfmt_elf64(r1, &(0x7f0000000380)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40}, [{}], "", ['\x00', '\x00', '\x00', '\x00']}, 0x478)

06:20:11 executing program 1:
r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0)
mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800004, 0x12, r0, 0x0)
preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x9, 0x0)
mmap(&(0x7f0000000000/0xa000)=nil, 0xa000, 0x2, 0x2172, 0xffffffffffffffff, 0x0)
socketpair(0x1e, 0x80005, 0x0, &(0x7f0000000340)={<r1=>0x0, <r2=>0x0})
r3 = socket$unix(0x1, 0x1, 0x0)
r4 = socket$unix(0x1, 0x1, 0x0)
openat$khugepaged_scan(0xffffff9c, &(0x7f00000000c0), 0x1, 0x0)
poll(&(0x7f0000000140)=[{r1, 0x3}, {0xffffffffffffffff, 0x10a2}, {r3, 0x1}, {r2, 0x64c}, {r4, 0x9041}, {}], 0x6, 0xff)

[  414.127628][T18147]  ? tomoyo_path_number_perm+0x441/0x590
[  414.127665][T18147]  ? __sanitizer_cov_trace_const_cmp1+0x22/0x80
[  414.127698][T18147]  ? tomoyo_path_number_perm+0x24e/0x590
[  414.127750][T18147]  ? lock_downgrade+0x6e0/0x6e0
[  414.127778][T18147]  lo_compat_ioctl+0xb1/0x110
[  414.127810][T18147]  compat_blkdev_ioctl+0x3c2/0x870
[  414.127836][T18147]  ? lo_ioctl+0x1600/0x1600
[  414.127857][T18147]  ? blkdev_ioctl+0x6d0/0x6d0
[  414.127881][T18147]  ? __sanitizer_cov_trace_const_cmp4+0x1c/0x70
[  414.127904][T18147]  ? blkdev_ioctl+0x6d0/0x6d0
[  414.127926][T18147]  __do_compat_sys_ioctl+0x1c7/0x290
[  414.127955][T18147]  __do_fast_syscall_32+0x65/0xf0
[  414.270264][T18147]  do_fast_syscall_32+0x2f/0x70
[  414.276402][T18147]  entry_SYSENTER_compat_after_hwframe+0x4d/0x5c
[  414.284706][T18147] RIP: 0023:0xf7f3f549
[  414.290173][T18147] Code: 03 74 c0 01 10 05 03 74 b8 01 10 06 03 74 b4 01 10 07 03 74 b0 01 10 08 03 74 d8 01 00 00 00 00 00 51 52 55 89 e5 0f 34 cd 80 <5d> 5a 59 c3 90 90 90 90 8d b4 26 00 00 00 00 8d b4 26 00 00 00 00
[  414.345073][T18147] RSP: 002b:00000000f5539418 EFLAGS: 00000296 ORIG_RAX: 0000000000000036
[  414.356879][T18147] RAX: ffffffffffffffda RBX: 0000000000000006 RCX: 0000000000004c00
[  414.367726][T18147] RDX: 0000000000000005 RSI: 0000000000000006 RDI: 000000000816c000
[  414.379076][T18147] RBP: 0000000000000005 R08: 0000000000000000 R09: 0000000000000000
[  414.391775][T18147] R10: 0000000000000000 R11: 0000000000000000 R12: 0000000000000000
[  414.403092][T18147] R13: 0000000000000000 R14: 0000000000000000 R15: 0000000000000000
[  414.415118][T18147] Kernel panic - not syncing: panic_on_warn set ...
[  414.452867][T18147] CPU: 3 PID: 18147 Comm: syz-executor.3 Not tainted 5.14.0-rc2-syzkaller #0
[  414.465471][T18147] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.14.0-2 04/01/2014
[  414.492904][T18147] Call Trace:
[  414.497649][T18147]  dump_stack_lvl+0xcd/0x134
[  414.504764][T18147]  panic+0x306/0x73d
[  414.511371][T18147]  ? __warn_printk+0xf3/0xf3
[  414.519309][T18147]  ? __warn.cold+0x1a/0x44
[  414.526481][T18147]  ? lockdep_unregister_key+0x19a/0x250
[  414.534826][T18147]  __warn.cold+0x35/0x44
[  414.541384][T18147]  ? lockdep_unregister_key+0x19a/0x250
[  414.549448][T18147]  report_bug+0x1bd/0x210
[  414.555718][T18147]  handle_bug+0x3c/0x60
[  414.562662][T18147]  exc_invalid_op+0x14/0x40
[  414.569210][T18147]  asm_exc_invalid_op+0x12/0x20
[  414.576491][T18147] RIP: 0010:lockdep_unregister_key+0x19a/0x250
[  414.585123][T18147] Code: 00 00 fc ff df 48 89 fa 48 c1 ea 03 80 3c 02 00 0f 85 8f 00 00 00 4d 89 7d 08 48 b8 22 01 00 00 00 00 ad de 48 89 43 08 eb 02 <0f> 0b 4c 89 f7 ba 01 00 00 00 48 89 ee e8 44 fd ff ff 4c 89 f7 e8
[  414.613010][T18147] RSP: 0018:ffffc9002988f8a8 EFLAGS: 00010046
[  414.622417][T18147] RAX: dffffc0000000000 RBX: 0000000000000000 RCX: 1ffffffff1ad8ffd
[  414.633085][T18147] RDX: 1ffffffff1fca217 RSI: 0000000000000004 RDI: ffffffff8fe510b8
[  414.643752][T18147] RBP: ffff888029bc9128 R08: 0000000000000001 R09: 0000000000000003
[  414.655128][T18147] R10: fffff52005311f0b R11: 0000000000000001 R12: 0000000000000246
[  414.664859][T18147] R13: dffffc0000000000 R14: ffffffff8fcc8858 R15: ffff888029bc9020
[  414.675837][T18147]  ? lockdep_unregister_key+0x3e/0x250
[  414.682525][T18147]  alloc_workqueue+0xb31/0xef0
[  414.688556][T18147]  ? _raw_spin_unlock+0x24/0x40
[  414.694936][T18147]  ? workqueue_sysfs_register+0x3e0/0x3e0
[  414.703371][T18147]  ? memcpy+0x39/0x60
[  414.708924][T18147]  ? loop_configure+0x416/0x1580
[  414.715914][T18147]  loop_configure+0x4d8/0x1580
[  414.723044][T18147]  lo_ioctl+0x403/0x1600
[  414.728378][T18147]  ? loop_set_status_old+0x250/0x250
[  414.736778][T18147]  ? find_held_lock+0x2d/0x110
[  414.743298][T18147]  ? tomoyo_path_number_perm+0x204/0x590
[  414.751145][T18147]  ? lock_downgrade+0x6e0/0x6e0
[  414.758386][T18147]  ? kfree+0xeb/0x650
[  414.764539][T18147]  ? tomoyo_path_number_perm+0x441/0x590
[  414.773220][T18147]  ? __sanitizer_cov_trace_const_cmp1+0x22/0x80
[  414.782638][T18147]  ? tomoyo_path_number_perm+0x24e/0x590
[  414.792864][T18147]  ? lock_downgrade+0x6e0/0x6e0
[  414.800074][T18147]  lo_compat_ioctl+0xb1/0x110
[  414.806414][T18147]  compat_blkdev_ioctl+0x3c2/0x870
[  414.813077][T18147]  ? lo_ioctl+0x1600/0x1600
[  414.819193][T18147]  ? blkdev_ioctl+0x6d0/0x6d0
[  414.826237][T18147]  ? __sanitizer_cov_trace_const_cmp4+0x1c/0x70
[  414.834814][T18147]  ? blkdev_ioctl+0x6d0/0x6d0
[  414.841441][T18147]  __do_compat_sys_ioctl+0x1c7/0x290
[  414.849078][T18147]  __do_fast_syscall_32+0x65/0xf0
[  414.855780][T18147]  do_fast_syscall_32+0x2f/0x70
[  414.862270][T18147]  entry_SYSENTER_compat_after_hwframe+0x4d/0x5c
[  414.870642][T18147] RIP: 0023:0xf7f3f549
[  414.875662][T18147] Code: 03 74 c0 01 10 05 03 74 b8 01 10 06 03 74 b4 01 10 07 03 74 b0 01 10 08 03 74 d8 01 00 00 00 00 00 51 52 55 89 e5 0f 34 cd 80 <5d> 5a 59 c3 90 90 90 90 8d b4 26 00 00 00 00 8d b4 26 00 00 00 00
[  414.901800][T18147] RSP: 002b:00000000f5539418 EFLAGS: 00000296 ORIG_RAX: 0000000000000036
[  414.913447][T18147] RAX: ffffffffffffffda RBX: 0000000000000006 RCX: 0000000000004c00
[  414.925184][T18147] RDX: 0000000000000005 RSI: 0000000000000006 RDI: 000000000816c000
[  414.936325][T18147] RBP: 0000000000000005 R08: 0000000000000000 R09: 0000000000000000
[  414.947295][T18147] R10: 0000000000000000 R11: 0000000000000000 R12: 0000000000000000
[  414.958124][T18147] R13: 0000000000000000 R14: 0000000000000000 R15: 0000000000000000
[  416.127758][T18147] Shutting down cpus with NMI
[  416.135742][T18147] Kernel Offset: disabled
[  416.142344][T18147] Rebooting in 86400 seconds..

VM DIAGNOSIS:
06:20:12  Registers:
info registers vcpu 0
RAX=0000000000000000 RBX=0000000000000009 RCX=0000000000000000 RDX=ffff888014ca54c0
RSI=ffffffff839edfc1 RDI=0000000000000003 RBP=ffff88807832e080 RSP=ffffc90000eb7850
R8 =0000000000000000 R9 =0000000000000009 R10=ffffffff839edffa R11=0000000000000010
R12=0000000000000100 R13=000000000000018d R14=dffffc0000000000 R15=0000000000000001
RIP=ffffffff8175892c RFL=00000293 [--S-A-C] CPL=0 II=0 A20=1 SMM=0 HLT=0
ES =002b 0000000000000000 ffffffff 00c0f300 DPL=3 DS   [-WA]
CS =0010 0000000000000000 ffffffff 00a09b00 DPL=0 CS64 [-RA]
SS =0018 0000000000000000 ffffffff 00c09300 DPL=0 DS   [-WA]
DS =002b 0000000000000000 ffffffff 00c0f300 DPL=3 DS   [-WA]
FS =0000 0000000000000000 ffffffff 00c00000
GS =0063 ffff88802ca00000 ffffffff 00d0f300 DPL=3 DS   [-WA]
LDT=0000 0000000000000000 ffffffff 00c00000
TR =0040 fffffe0000003000 00004087 00008b00 DPL=0 TSS64-busy
GDT=     fffffe0000001000 0000007f
IDT=     fffffe0000000000 00000fff
CR0=80050033 CR2=000000002c027000 CR3=000000006e99a000 CR4=00150ef0
DR0=0000000000000000 DR1=0000000000000000 DR2=0000000000000000 DR3=0000000000000000 
DR6=00000000fffe0ff0 DR7=0000000000000400
EFER=0000000000000d01
FCW=037f FSW=0000 [ST=0] FTW=00 MXCSR=00001f80
FPR0=0000000000000000 0000 FPR1=0000000000000000 0000
FPR2=0000000000000000 0000 FPR3=0000000000000000 0000
FPR4=0000000000000000 0000 FPR5=0000000000000000 0000
FPR6=0000000000000000 0000 FPR7=0000000000000000 0000
XMM00=00000000000000000000000000000000 XMM01=00000000000000000000000000000052
XMM02=00000000000000000000000000000000 XMM03=00000000000000000000000000000000
XMM04=00000000000000000000000000000000 XMM05=00000000000000000000000000000000
XMM06=00000000000000000000000000000000 XMM07=00000000000000000000000000000000
XMM08=00000000000000000000000000000000 XMM09=00000000000000000000000000000000
XMM10=00000000000000000000000000000000 XMM11=00000000000000000000000000000000
XMM12=00000000000000000000000000000000 XMM13=00000000000000000000000000000000
XMM14=00000000000000000000000000000000 XMM15=00000000000000000000000000000000
info registers vcpu 1
RAX=ffffffff813285d0 RBX=ffffffff8b313a60 RCX=ffffffff8132f27d RDX=1ffffffff166274d
RSI=0000000000000000 RDI=00000000000000b0 RBP=0000000000000000 RSP=ffffc90000508fd0
R8 =0000000000000001 R9 =ffff88802cb1f40f R10=ffffed1005963e81 R11=0000000000000001
R12=0000000000000001 R13=0000000000000000 R14=0000000000000000 R15=0000000000000000
RIP=ffffffff813285d8 RFL=00010046 [---Z-P-] CPL=0 II=0 A20=1 SMM=0 HLT=0
ES =0000 0000000000000000 ffffffff 00c00000
CS =0010 0000000000000000 ffffffff 00a09b00 DPL=0 CS64 [-RA]
SS =0018 0000000000000000 ffffffff 00c09300 DPL=0 DS   [-WA]
DS =0000 0000000000000000 ffffffff 00c00000
FS =0000 0000000000000000 ffffffff 00c00000
GS =0000 ffff88802cb00000 ffffffff 00c00000
LDT=0000 0000000000000000 00000000 00000000
TR =0040 fffffe000003e000 00004087 00008b00 DPL=0 TSS64-busy
GDT=     fffffe000003c000 0000007f
IDT=     fffffe0000000000 00000fff
CR0=80050033 CR2=00000000ffc95e48 CR3=000000006e99a000 CR4=00150ee0
DR0=0000000000000000 DR1=0000000000000000 DR2=0000000000000000 DR3=0000000000000000 
DR6=00000000fffe0ff0 DR7=0000000000000400
EFER=0000000000000d01
FCW=037f FSW=0000 [ST=0] FTW=00 MXCSR=00001f80
FPR0=0000000000000000 0000 FPR1=0000000000000000 0000
FPR2=0000000000000000 0000 FPR3=0000000000000000 0000
FPR4=0000000000000000 0000 FPR5=0000000000000000 0000
FPR6=0000000000000000 0000 FPR7=0000000000000000 0000
XMM00=00000000000000000000000000000000 XMM01=00000000000000000000000000000052
XMM02=00000000000000000000000000000000 XMM03=00000000000000000000000000000000
XMM04=00000000000000000000000000000000 XMM05=00000000000000000000000000000000
XMM06=00000000000000000000000000000000 XMM07=00000000000000000000000000000000
XMM08=00000000000000000000000000000000 XMM09=00000000000000000000000000000000
XMM10=00000000000000000000000000000000 XMM11=00000000000000000000000000000000
XMM12=00000000000000000000000000000000 XMM13=00000000000000000000000000000000
XMM14=00000000000000000000000000000000 XMM15=00000000000000000000000000000000
info registers vcpu 2
RAX=0000000000000003 RBX=0000000000000000 RCX=dffffc0000000000 RDX=0000000000000000
RSI=0000000000000003 RDI=ffffffff901dae80 RBP=ffffffff901dae80 RSP=ffffc90000657b48
R8 =0000000000000001 R9 =0000000000000000 R10=fffffbfff203b5d0 R11=0000000000086088
R12=0000000000000000 R13=fffffbfff203b5d0 R14=0000000000000001 R15=ffff88802cc52880
RIP=ffffffff813305fb RFL=00000046 [---Z-P-] CPL=0 II=0 A20=1 SMM=0 HLT=1
ES =0000 0000000000000000 ffffffff 00000000
CS =0010 0000000000000000 ffffffff 00a09b00 DPL=0 CS64 [-RA]
SS =0018 0000000000000000 ffffffff 00c09300 DPL=0 DS   [-WA]
DS =0000 0000000000000000 ffffffff 00000000
FS =0000 0000000000000000 ffffffff 00000000
GS =0000 ffff88802cc00000 ffffffff 00000000
LDT=0000 0000000000000000 00000000 00000000
TR =0040 fffffe0000079000 00004087 00008b00 DPL=0 TSS64-busy
GDT=     fffffe0000077000 0000007f
IDT=     fffffe0000000000 00000fff
CR0=80050033 CR2=00007f7b8c4fa000 CR3=000000002051c000 CR4=00150ee0
DR0=0000000000000000 DR1=0000000000000000 DR2=0000000000000000 DR3=0000000000000000 
DR6=00000000fffe0ff0 DR7=0000000000000400
EFER=0000000000000d01
FCW=037f FSW=0000 [ST=0] FTW=00 MXCSR=00009fc0
FPR0=0000000000000000 0000 FPR1=0000000000000000 0000
FPR2=0000000000000000 0000 FPR3=0000000000000000 0000
FPR4=0000000000000000 0000 FPR5=0000000000000000 0000
FPR6=0000000000000000 0000 FPR7=0000000000000000 0000
XMM00=5837fe9dc1c91f3200000000000402f8 XMM01=8ca0b852b1c7c8e10000000000040498
XMM02=f1c1a81e7e6f168700000000000406e8 XMM03=ac8bc31478ec851100000000000434c0
XMM04=947eeba90970166000000000001a9b28 XMM05=d3fdd5f48436fbd70000000000040790
XMM06=00f4ad095d54c93e0000000000040648 XMM07=a1fcdcf819d7e1e50000000000040408
XMM08=a327dee6f1208e4d00000000002bb2a8 XMM09=07070707505151515151685b050f2311
XMM10=00226b07070707070707070707505151 XMM11=00000000000000000000000000000000
XMM12=00000000000000000000000000000000 XMM13=00000000000000000000000000000000
XMM14=00000000000000000000000000000000 XMM15=00000000000000000000000000000000
info registers vcpu 3
RAX=dffffc0000000060 RBX=00000000000003fd RCX=0000000000000000 RDX=00000000000003fd
RSI=ffffffff8432cbcc RDI=ffffffff904e5660 RBP=ffffffff904e5620 RSP=ffffc9002988f220
R8 =000000000000002a R9 =0000000000000000 R10=ffffffff8432cbbd R11=000000000000001f
R12=0000000000000000 R13=fffffbfff209cb17 R14=fffffbfff209cace R15=dffffc0000000000
RIP=ffffffff8432cbf2 RFL=00000002 [-------] CPL=0 II=0 A20=1 SMM=0 HLT=0
ES =002b 0000000000000000 ffffffff 00c0f300 DPL=3 DS   [-WA]
CS =0010 0000000000000000 ffffffff 00a09b00 DPL=0 CS64 [-RA]
SS =0018 0000000000000000 ffffffff 00c09300 DPL=0 DS   [-WA]
DS =002b 0000000000000000 ffffffff 00c0f300 DPL=3 DS   [-WA]
FS =0000 0000000000000000 ffffffff 00c00000
GS =0063 ffff88802cd00000 ffffffff 00d0f300 DPL=3 DS   [-WA]
LDT=0000 0000000000000000 00000000 00000000
TR =0040 fffffe00000b4000 00004087 00008b00 DPL=0 TSS64-busy
GDT=     fffffe00000b2000 0000007f
IDT=     fffffe0000000000 00000fff
CR0=80050033 CR2=00000000f5538fe4 CR3=000000002051c000 CR4=00150ee0
DR0=0000000000000000 DR1=0000000000000000 DR2=0000000000000000 DR3=0000000000000000 
DR6=00000000fffe0ff0 DR7=0000000000000400
EFER=0000000000000d01
FCW=037f FSW=0000 [ST=0] FTW=00 MXCSR=00001f80
FPR0=0000000000000000 0000 FPR1=0000000000000000 0000
FPR2=0000000000000000 0000 FPR3=0000000000000000 0000
FPR4=0000000000000000 0000 FPR5=0000000000000000 0000
FPR6=0000000000000000 0000 FPR7=0000000000000000 0000
XMM00=00000000000000000000000000000000 XMM01=00000000000000000000000000000002
XMM02=00000050000000000000000100000000 XMM03=00000000000000000000000000000000
XMM04=00000000000000000000000000000000 XMM05=00000000000000000000000000000000
XMM06=00000000000000000000000000000000 XMM07=00000000000000000000000000000000
XMM08=00000000000000000000000000000000 XMM09=00000000000000000000000000000000
XMM10=00000000000000000000000000000000 XMM11=00000000000000000000000000000000
XMM12=00000000000000000000000000000000 XMM13=00000000000000000000000000000000
XMM14=00000000000000000000000000000000 XMM15=00000000000000000000000000000000