nlink\x00', 0x0, 0x0, 0x0) 11:24:16 executing program 4: write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000540)=ANY=[@ANYBLOB="7f454c4601061f000400000000000000030038000800000032000000000000004000000000000000560200000000000007000000008038000100090002000100010000000100000006000000000000000400000000000000060000000000000001040000000000000200000000000000010000000000000051e574640400000001000000000000000400000000000000050000000000000005000000000000000400000000000000ff24444700000000908bc001727fbcd44f4d3bf922995edf2fd379eb00"/468], 0x2c4) r0 = inotify_init() r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) epoll_ctl$EPOLL_CTL_DEL(0xffffffffffffffff, 0x2, r1) inotify_add_watch(r0, &(0x7f0000000000)='.\x00', 0x400017e) r2 = openat$incfs(0xffffffffffffffff, &(0x7f0000000080)='.log\x00', 0x20200, 0x40) fcntl$getownex(r2, 0x10, &(0x7f00000000c0)) r3 = open(&(0x7f0000000040)='./file0\x00', 0x200c2, 0x0) write$binfmt_elf64(r3, &(0x7f0000000080)=ANY=[], 0x8) sendfile(r3, r3, &(0x7f00000001c0), 0xa198) dup(0xffffffffffffffff) r4 = syz_mount_image$gfs2meta(&(0x7f0000000140)='gfs2meta\x00', &(0x7f0000000200)='./file0\x00', 0x1000, 0x4, &(0x7f0000000880)=[{&(0x7f0000000240)="77ba0daae1b2e74ecd52c59a85bf6f4b1f0b01ab07ba92bc6e57305406115f2bc3e4dd94f19ed896c4fccd34271e9dc3499af9298dbc709e0e6a513d61391d4b198af5f55d24239ae934e8babb8d1cb67bb17b0158", 0x55, 0x3}, {&(0x7f00000002c0)="ae227f954d229f666a6cd22938585e852071e55aa5728addcd315922bf32282e077bdbc63cd5ec89626ee2f8e7982ca239eaa758231056cdca22ca27428407f6c64c384665cfbd00ee6e0d7609f2c7ba0f28b4af70d0307ef78decfe42973915cd509de7c19ea0f3f5c3caaab05f9af08e2cc82d2c14b919dd045e3d36ce1c5d0ff23aed0a4a6ef508b5e71df0a25250d47f1e033ed503b6df99c189111b75b59df679cb75240b756cafecfd203568eeb2c1708fe9f11a2cb0f288590ec76cefbde09c90e9d568492aa5f41196397b70c869838c7164f2bad8eff017d021d7d41c9025c20b", 0xe5, 0x3}, {&(0x7f00000003c0)="792eb6eec33e561f18dc4b58b6a6fb3c7e6fd5e612c08490216ae02617f9811945929cffbf59727393a9a69d57b00a5cd08da3888884b8361d6a4003a54480c1086a5fc876582ff049ede86e2f58d80c7b6cf618e1ba36d4710887bc34ef2b7abbc686df2185f99998060bf492b84e3a02077e2aaf014e1186fde602d2b639d467f48fc2e18cf1553e07ac39040953566ab1d21aac627b166825375377bc3332b62160ea8bf7fc3196b30965dce6181bf7a1c60d0270f24ba60e633c8c88bbdefb5928dc8183c2ce0616de6c3185a4aa7eb2ec6ab7d8394a9536bf7e4f33f76294b0b4a390aca576177671191fe91530e9bd0db79cee", 0xf6, 0x100000000}, {&(0x7f00000004c0)="a90f49b744c1ad7c27bc0a3b1965ca2bce6602b5f5a8b294ced925862d0a9df5c88e43095ba5810ba49c2216e7e1a9b5f07075e6a3101e853557713e983b2f46cf599dc2cba6254802d01794cdc015e28e2b5aa8c10293a4487b3fe2469252f2c2406327b2a5fe71b185ec0adfdc824a237f94", 0x73, 0x7}], 0x21008, &(0x7f0000000900)={[{'.log\x00'}, {'-%('}, {'.log\x00'}], [{@appraise_type='appraise_type=imasig'}, {@fowner_eq={'fowner', 0x3d, 0xee01}}, {@hash='hash'}, {@subj_type={'subj_type', 0x3d, '-&'}}, {@hash='hash'}]}) ioctl$BTRFS_IOC_SUBVOL_SETFLAGS(r4, 0x4008941a, &(0x7f0000000980)=0xfe33b054cbbc4d79) [ 522.868600][T25746] loop5: detected capacity change from 264192 to 0 11:24:17 executing program 2: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x7f, 0x80000000008001}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x9}, 0x0) r1 = open(&(0x7f0000000240)='./file1\x00', 0x141142, 0x0) write$UHID_INPUT(r1, &(0x7f0000001440)={0x8, {'\x002\x00'}}, 0xfffffc41) open(&(0x7f00000001c0)='./file1\x00', 0x0, 0x0) setxattr$trusted_overlay_nlink(&(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x0, 0x0) [ 523.031236][T25755] loop4: detected capacity change from 264192 to 0 11:24:17 executing program 0: r0 = perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x5c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write$binfmt_elf64(r0, &(0x7f0000000540)=ANY=[@ANYBLOB], 0x2c4) r1 = inotify_init() r2 = openat$fuse(0xffffffffffffff9c, 0x0, 0x2, 0x0) epoll_ctl$EPOLL_CTL_DEL(0xffffffffffffffff, 0x2, r2) inotify_add_watch(r1, &(0x7f0000000000)='.\x00', 0x400017e) r3 = openat$incfs(0xffffffffffffffff, &(0x7f0000000080)='.log\x00', 0x20200, 0x40) fcntl$getownex(r3, 0x10, &(0x7f00000000c0)) r4 = open(&(0x7f0000000040)='./file0\x00', 0x200c2, 0x0) write$binfmt_elf64(r4, &(0x7f0000000080)=ANY=[], 0x8) sendfile(r4, r4, &(0x7f00000001c0), 0xa198) dup(0xffffffffffffffff) r5 = syz_mount_image$gfs2meta(&(0x7f0000000140)='gfs2meta\x00', &(0x7f0000000200)='./file0\x00', 0x1000, 0x4, &(0x7f0000000880)=[{&(0x7f0000000240)="77ba0daae1b2e74ecd52c59a85bf6f4b1f0b01ab07ba92bc6e57305406115f2bc3e4dd94f19ed896c4fccd34271e9dc3499af9298dbc709e0e6a513d61391d4b198af5f55d24239ae934e8babb8d1cb67bb17b0158", 0x55, 0x3}, {&(0x7f00000002c0)="ae227f954d229f666a6cd22938585e852071e55aa5728addcd315922bf32282e077bdbc63cd5ec89626ee2f8e7982ca239eaa758231056cdca22ca27428407f6c64c384665cfbd00ee6e0d7609f2c7ba0f28b4af70d0307ef78decfe42973915cd509de7c19ea0f3f5c3caaab05f9af08e2cc82d2c14b919dd045e3d36ce1c5d0ff23aed0a4a6ef508b5e71df0a25250d47f1e033ed503b6df99c189111b75b59df679cb75240b756cafecfd203568eeb2c1708fe9f11a2cb0f288590ec76cefbde09c90e9d568492aa5f41196397b70c869838c7164f2bad8eff017d021d7d41c9025c20b", 0xe5, 0x3}, {&(0x7f00000003c0)="792eb6eec33e561f18dc4b58b6a6fb3c7e6fd5e612c08490216ae02617f9811945929cffbf59727393a9a69d57b00a5cd08da3888884b8361d6a4003a54480c1086a5fc876582ff049ede86e2f58d80c7b6cf618e1ba36d4710887bc34ef2b7abbc686df2185f99998060bf492b84e3a02077e2aaf014e1186fde602d2b639d467f48fc2e18cf1553e07ac39040953566ab1d21aac627b166825375377bc3332b62160ea8bf7fc3196b30965dce6181bf7a1c60d0270f24ba60e633c8c88bbdefb5928dc8183c2ce0616de6c3185a4aa7eb2ec6ab7d8394a9536bf7e4f33f76294b0b4a390aca576177671191fe91530e9bd0db79cee", 0xf6, 0x100000000}, {&(0x7f00000004c0)="a90f49b744c1ad7c27bc0a3b1965ca2bce6602b5f5a8b294ced925862d0a9df5c88e43095ba5810ba49c2216e7e1a9b5f07075e6a3101e853557713e983b2f46cf599dc2cba6254802d01794cdc015e28e2b5aa8c10293a4487b3fe2469252f2c2406327b2a5fe71b185ec0adfdc824a237f94", 0x73, 0x7}], 0x21008, &(0x7f0000000900)={[{'.log\x00'}, {'-%('}, {'.log\x00'}], [{@obj_user={'obj_user'}}, {@appraise_type='appraise_type=imasig'}, {@fowner_eq={'fowner', 0x3d, 0xee01}}, {@hash='hash'}, {@subj_type={'subj_type', 0x3d, '-&'}}]}) ioctl$BTRFS_IOC_SUBVOL_SETFLAGS(r5, 0x4008941a, &(0x7f0000000980)=0xfe33b054cbbc4d79) 11:24:17 executing program 1: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x7f, 0x80000000008001}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x9}, 0x0) r1 = open(&(0x7f0000000240)='./file1\x00', 0x141142, 0x0) write$UHID_INPUT(r1, &(0x7f0000001440), 0xfffffc41) open(&(0x7f00000001c0)='./file1\x00', 0x0, 0x8000000) setxattr$trusted_overlay_nlink(&(0x7f0000000000)='./file1\x00', &(0x7f00000000c0)='trusted.overlay.nlink\x00', 0x0, 0x0, 0x0) [ 523.251319][T25769] loop0: detected capacity change from 264192 to 0 11:24:17 executing program 5: write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000540)=ANY=[@ANYBLOB="7f454c4601061f000400000000000000030038000800000032000000000000004000000000000000560200000000000007000000008038000100090002000100010000000100000006000000000000000400000000000000060000000000000001040000000000000200000000000000010000000000000051e574640400000001000000000000000400000000000000050000000000000005000000000000000400000000000000ff24444700000000908bc001727fbcd44f4d3bf922995edf2fd379eb00"/480], 0x2c4) r0 = inotify_init() r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) epoll_ctl$EPOLL_CTL_DEL(0xffffffffffffffff, 0x2, r1) inotify_add_watch(r0, &(0x7f0000000000)='.\x00', 0x400017e) r2 = openat$incfs(0xffffffffffffffff, &(0x7f0000000080)='.log\x00', 0x20200, 0x40) fcntl$getownex(r2, 0x10, &(0x7f00000000c0)) r3 = open(&(0x7f0000000040)='./file0\x00', 0x200c2, 0x0) write$binfmt_elf64(r3, &(0x7f0000000080)=ANY=[], 0x8) sendfile(r3, r3, &(0x7f00000001c0), 0xa198) dup(0xffffffffffffffff) r4 = syz_mount_image$gfs2meta(&(0x7f0000000140)='gfs2meta\x00', &(0x7f0000000200)='./file0\x00', 0x1000, 0x4, &(0x7f0000000880)=[{&(0x7f0000000240)="77ba0daae1b2e74ecd52c59a85bf6f4b1f0b01ab07ba92bc6e57305406115f2bc3e4dd94f19ed896c4fccd34271e9dc3499af9298dbc709e0e6a513d61391d4b198af5f55d24239ae934e8babb8d1cb67bb17b0158", 0x55, 0x3}, {&(0x7f00000002c0)="ae227f954d229f666a6cd22938585e852071e55aa5728addcd315922bf32282e077bdbc63cd5ec89626ee2f8e7982ca239eaa758231056cdca22ca27428407f6c64c384665cfbd00ee6e0d7609f2c7ba0f28b4af70d0307ef78decfe42973915cd509de7c19ea0f3f5c3caaab05f9af08e2cc82d2c14b919dd045e3d36ce1c5d0ff23aed0a4a6ef508b5e71df0a25250d47f1e033ed503b6df99c189111b75b59df679cb75240b756cafecfd203568eeb2c1708fe9f11a2cb0f288590ec76cefbde09c90e9d568492aa5f41196397b70c869838c7164f2bad8eff017d021d7d41c9025c20b", 0xe5, 0x3}, {&(0x7f00000003c0)="792eb6eec33e561f18dc4b58b6a6fb3c7e6fd5e612c08490216ae02617f9811945929cffbf59727393a9a69d57b00a5cd08da3888884b8361d6a4003a54480c1086a5fc876582ff049ede86e2f58d80c7b6cf618e1ba36d4710887bc34ef2b7abbc686df2185f99998060bf492b84e3a02077e2aaf014e1186fde602d2b639d467f48fc2e18cf1553e07ac39040953566ab1d21aac627b166825375377bc3332b62160ea8bf7fc3196b30965dce6181bf7a1c60d0270f24ba60e633c8c88bbdefb5928dc8183c2ce0616de6c3185a4aa7eb2ec6ab7d8394a9536bf7e4f33f76294b0b4a390aca576177671191fe91530e9bd0db79cee", 0xf6, 0x100000000}, {&(0x7f00000004c0)="a90f49b744c1ad7c27bc0a3b1965ca2bce6602b5f5a8b294ced925862d0a9df5c88e43095ba5810ba49c2216e7e1a9b5f07075e6a3101e853557713e983b2f46cf599dc2cba6254802d01794cdc015e28e2b5aa8c10293a4487b3fe2469252f2c2406327b2a5fe71b185ec0adfdc824a237f94", 0x73, 0x7}], 0x21008, &(0x7f0000000900)={[{'.log\x00'}, {'-%('}, {'.log\x00'}], [{@appraise_type='appraise_type=imasig'}, {@fowner_eq={'fowner', 0x3d, 0xee01}}, {@hash='hash'}, {@subj_type={'subj_type', 0x3d, '-&'}}, {@hash='hash'}]}) ioctl$BTRFS_IOC_SUBVOL_SETFLAGS(r4, 0x4008941a, &(0x7f0000000980)=0xfe33b054cbbc4d79) [ 523.756281][ T35] kauditd_printk_skb: 32 callbacks suppressed [ 523.756293][ T35] audit: type=1804 audit(1612178657.824:1907): pid=25765 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.3" name="/root/syzkaller-testdir548988167/syzkaller.gb8agU/370/file1" dev="sda1" ino=15796 res=1 errno=0 [ 523.803454][T25787] loop5: detected capacity change from 264192 to 0 11:24:17 executing program 4: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x7f, 0x80000000008001}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x9}, 0x0) r1 = open(&(0x7f0000000240)='./file1\x00', 0x141142, 0x0) write$UHID_INPUT(r1, &(0x7f0000001440), 0xfffffc41) open(&(0x7f00000001c0)='./file1\x00', 0x0, 0x7000000) setxattr$trusted_overlay_nlink(&(0x7f0000000000)='./file1\x00', &(0x7f00000000c0)='trusted.overlay.nlink\x00', 0x0, 0x0, 0x0) [ 523.956025][ T35] audit: type=1804 audit(1612178658.024:1908): pid=25772 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.2" name="/root/syzkaller-testdir245532710/syzkaller.d2c0aK/382/file1" dev="sda1" ino=15837 res=1 errno=0 11:24:18 executing program 0: r0 = perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x5c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write$binfmt_elf64(r0, &(0x7f0000000540)=ANY=[@ANYBLOB], 0x2c4) r1 = inotify_init() r2 = openat$fuse(0xffffffffffffff9c, 0x0, 0x2, 0x0) epoll_ctl$EPOLL_CTL_DEL(0xffffffffffffffff, 0x2, r2) inotify_add_watch(r1, &(0x7f0000000000)='.\x00', 0x400017e) r3 = openat$incfs(0xffffffffffffffff, &(0x7f0000000080)='.log\x00', 0x20200, 0x40) fcntl$getownex(r3, 0x10, &(0x7f00000000c0)) r4 = open(&(0x7f0000000040)='./file0\x00', 0x200c2, 0x0) write$binfmt_elf64(r4, &(0x7f0000000080)=ANY=[], 0x8) sendfile(r4, r4, &(0x7f00000001c0), 0xa198) dup(0xffffffffffffffff) r5 = syz_mount_image$gfs2meta(&(0x7f0000000140)='gfs2meta\x00', &(0x7f0000000200)='./file0\x00', 0x1000, 0x4, &(0x7f0000000880)=[{&(0x7f0000000240)="77ba0daae1b2e74ecd52c59a85bf6f4b1f0b01ab07ba92bc6e57305406115f2bc3e4dd94f19ed896c4fccd34271e9dc3499af9298dbc709e0e6a513d61391d4b198af5f55d24239ae934e8babb8d1cb67bb17b0158", 0x55, 0x3}, {&(0x7f00000002c0)="ae227f954d229f666a6cd22938585e852071e55aa5728addcd315922bf32282e077bdbc63cd5ec89626ee2f8e7982ca239eaa758231056cdca22ca27428407f6c64c384665cfbd00ee6e0d7609f2c7ba0f28b4af70d0307ef78decfe42973915cd509de7c19ea0f3f5c3caaab05f9af08e2cc82d2c14b919dd045e3d36ce1c5d0ff23aed0a4a6ef508b5e71df0a25250d47f1e033ed503b6df99c189111b75b59df679cb75240b756cafecfd203568eeb2c1708fe9f11a2cb0f288590ec76cefbde09c90e9d568492aa5f41196397b70c869838c7164f2bad8eff017d021d7d41c9025c20b", 0xe5, 0x3}, {&(0x7f00000003c0)="792eb6eec33e561f18dc4b58b6a6fb3c7e6fd5e612c08490216ae02617f9811945929cffbf59727393a9a69d57b00a5cd08da3888884b8361d6a4003a54480c1086a5fc876582ff049ede86e2f58d80c7b6cf618e1ba36d4710887bc34ef2b7abbc686df2185f99998060bf492b84e3a02077e2aaf014e1186fde602d2b639d467f48fc2e18cf1553e07ac39040953566ab1d21aac627b166825375377bc3332b62160ea8bf7fc3196b30965dce6181bf7a1c60d0270f24ba60e633c8c88bbdefb5928dc8183c2ce0616de6c3185a4aa7eb2ec6ab7d8394a9536bf7e4f33f76294b0b4a390aca576177671191fe91530e9bd0db79cee", 0xf6, 0x100000000}, {&(0x7f00000004c0)="a90f49b744c1ad7c27bc0a3b1965ca2bce6602b5f5a8b294ced925862d0a9df5c88e43095ba5810ba49c2216e7e1a9b5f07075e6a3101e853557713e983b2f46cf599dc2cba6254802d01794cdc015e28e2b5aa8c10293a4487b3fe2469252f2c2406327b2a5fe71b185ec0adfdc824a237f94", 0x73, 0x7}], 0x21008, &(0x7f0000000900)={[{'.log\x00'}, {'-%('}, {'.log\x00'}], [{@obj_user={'obj_user'}}, {@appraise_type='appraise_type=imasig'}, {@fowner_eq={'fowner', 0x3d, 0xee01}}, {@hash='hash'}, {@subj_type={'subj_type', 0x3d, '-&'}}]}) ioctl$BTRFS_IOC_SUBVOL_SETFLAGS(r5, 0x4008941a, &(0x7f0000000980)=0xfe33b054cbbc4d79) 11:24:18 executing program 3: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x7f, 0x80000000008001}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x9}, 0x0) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000080)) r1 = open(&(0x7f0000000240)='./file1\x00', 0x141142, 0x0) write$UHID_INPUT(r1, &(0x7f0000001440)={0x8, {'\x000\x00'}}, 0xfffffc41) open(&(0x7f00000001c0)='./file1\x00', 0x0, 0x0) setxattr$trusted_overlay_nlink(&(0x7f0000000000)='./file1\x00', &(0x7f00000000c0)='trusted.overlay.nlink\x00', 0x0, 0x0, 0x0) [ 524.105693][ T35] audit: type=1804 audit(1612178658.054:1909): pid=25768 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.3" name="/root/syzkaller-testdir548988167/syzkaller.gb8agU/370/file1" dev="sda1" ino=15796 res=1 errno=0 11:24:18 executing program 2: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x7f, 0x80000000008001}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x9}, 0x0) r1 = open(&(0x7f0000000240)='./file1\x00', 0x141142, 0x0) write$UHID_INPUT(r1, &(0x7f0000001440)={0x8, {'\x003\x00'}}, 0xfffffc41) open(&(0x7f00000001c0)='./file1\x00', 0x0, 0x0) setxattr$trusted_overlay_nlink(&(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x0, 0x0) [ 524.258997][ T35] audit: type=1804 audit(1612178658.084:1910): pid=25775 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.2" name="/root/syzkaller-testdir245532710/syzkaller.d2c0aK/382/file1" dev="sda1" ino=15837 res=1 errno=0 [ 524.294325][T25802] loop0: detected capacity change from 264192 to 0 11:24:18 executing program 1: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x7f, 0x80000000008001}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x9}, 0x0) r1 = open(&(0x7f0000000240)='./file1\x00', 0x141142, 0x0) write$UHID_INPUT(r1, &(0x7f0000001440), 0xfffffc41) open(&(0x7f00000001c0)='./file1\x00', 0x0, 0x9000000) setxattr$trusted_overlay_nlink(&(0x7f0000000000)='./file1\x00', &(0x7f00000000c0)='trusted.overlay.nlink\x00', 0x0, 0x0, 0x0) [ 524.443818][ T35] audit: type=1804 audit(1612178658.084:1911): pid=25772 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor.2" name="/root/syzkaller-testdir245532710/syzkaller.d2c0aK/382/file1" dev="sda1" ino=15837 res=1 errno=0 11:24:18 executing program 5: write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000540)=ANY=[@ANYBLOB="7f454c4601061f000400000000000000030038000800000032000000000000004000000000000000560200000000000007000000008038000100090002000100010000000100000006000000000000000400000000000000060000000000000001040000000000000200000000000000010000000000000051e574640400000001000000000000000400000000000000050000000000000005000000000000000400000000000000ff24444700000000908bc001727fbcd44f4d3bf922995edf2fd379eb00"/480], 0x2c4) r0 = inotify_init() r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) epoll_ctl$EPOLL_CTL_DEL(0xffffffffffffffff, 0x2, r1) inotify_add_watch(r0, &(0x7f0000000000)='.\x00', 0x400017e) r2 = openat$incfs(0xffffffffffffffff, &(0x7f0000000080)='.log\x00', 0x20200, 0x40) fcntl$getownex(r2, 0x10, &(0x7f00000000c0)) r3 = open(&(0x7f0000000040)='./file0\x00', 0x200c2, 0x0) write$binfmt_elf64(r3, &(0x7f0000000080)=ANY=[], 0x8) sendfile(r3, r3, &(0x7f00000001c0), 0xa198) dup(0xffffffffffffffff) r4 = syz_mount_image$gfs2meta(&(0x7f0000000140)='gfs2meta\x00', &(0x7f0000000200)='./file0\x00', 0x1000, 0x4, &(0x7f0000000880)=[{&(0x7f0000000240)="77ba0daae1b2e74ecd52c59a85bf6f4b1f0b01ab07ba92bc6e57305406115f2bc3e4dd94f19ed896c4fccd34271e9dc3499af9298dbc709e0e6a513d61391d4b198af5f55d24239ae934e8babb8d1cb67bb17b0158", 0x55, 0x3}, {&(0x7f00000002c0)="ae227f954d229f666a6cd22938585e852071e55aa5728addcd315922bf32282e077bdbc63cd5ec89626ee2f8e7982ca239eaa758231056cdca22ca27428407f6c64c384665cfbd00ee6e0d7609f2c7ba0f28b4af70d0307ef78decfe42973915cd509de7c19ea0f3f5c3caaab05f9af08e2cc82d2c14b919dd045e3d36ce1c5d0ff23aed0a4a6ef508b5e71df0a25250d47f1e033ed503b6df99c189111b75b59df679cb75240b756cafecfd203568eeb2c1708fe9f11a2cb0f288590ec76cefbde09c90e9d568492aa5f41196397b70c869838c7164f2bad8eff017d021d7d41c9025c20b", 0xe5, 0x3}, {&(0x7f00000003c0)="792eb6eec33e561f18dc4b58b6a6fb3c7e6fd5e612c08490216ae02617f9811945929cffbf59727393a9a69d57b00a5cd08da3888884b8361d6a4003a54480c1086a5fc876582ff049ede86e2f58d80c7b6cf618e1ba36d4710887bc34ef2b7abbc686df2185f99998060bf492b84e3a02077e2aaf014e1186fde602d2b639d467f48fc2e18cf1553e07ac39040953566ab1d21aac627b166825375377bc3332b62160ea8bf7fc3196b30965dce6181bf7a1c60d0270f24ba60e633c8c88bbdefb5928dc8183c2ce0616de6c3185a4aa7eb2ec6ab7d8394a9536bf7e4f33f76294b0b4a390aca576177671191fe91530e9bd0db79cee", 0xf6, 0x100000000}, {&(0x7f00000004c0)="a90f49b744c1ad7c27bc0a3b1965ca2bce6602b5f5a8b294ced925862d0a9df5c88e43095ba5810ba49c2216e7e1a9b5f07075e6a3101e853557713e983b2f46cf599dc2cba6254802d01794cdc015e28e2b5aa8c10293a4487b3fe2469252f2c2406327b2a5fe71b185ec0adfdc824a237f94", 0x73, 0x7}], 0x21008, &(0x7f0000000900)={[{'.log\x00'}, {'-%('}, {'.log\x00'}], [{@appraise_type='appraise_type=imasig'}, {@fowner_eq={'fowner', 0x3d, 0xee01}}, {@hash='hash'}, {@subj_type={'subj_type', 0x3d, '-&'}}, {@hash='hash'}]}) ioctl$BTRFS_IOC_SUBVOL_SETFLAGS(r4, 0x4008941a, &(0x7f0000000980)=0xfe33b054cbbc4d79) [ 524.540424][ T35] audit: type=1804 audit(1612178658.154:1912): pid=25779 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.1" name="/root/syzkaller-testdir551554057/syzkaller.l2Zg4z/368/file1" dev="sda1" ino=15840 res=1 errno=0 [ 524.646049][ T35] audit: type=1804 audit(1612178658.204:1913): pid=25781 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.1" name="/root/syzkaller-testdir551554057/syzkaller.l2Zg4z/368/file1" dev="sda1" ino=15840 res=1 errno=0 [ 524.764459][T25823] loop5: detected capacity change from 264192 to 0 [ 524.783020][ T35] audit: type=1804 audit(1612178658.204:1914): pid=25779 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor.1" name="/root/syzkaller-testdir551554057/syzkaller.l2Zg4z/368/file1" dev="sda1" ino=15840 res=1 errno=0 [ 524.810348][ T35] audit: type=1804 audit(1612178658.874:1915): pid=25796 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.4" name="/root/syzkaller-testdir068764309/syzkaller.I2gCPs/409/file1" dev="sda1" ino=15853 res=1 errno=0 [ 524.907808][ T35] audit: type=1804 audit(1612178658.984:1916): pid=25809 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.3" name="/root/syzkaller-testdir548988167/syzkaller.gb8agU/371/file1" dev="sda1" ino=15796 res=1 errno=0 11:24:19 executing program 0: r0 = perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x5c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write$binfmt_elf64(r0, &(0x7f0000000540)=ANY=[@ANYBLOB], 0x2c4) r1 = inotify_init() openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) epoll_ctl$EPOLL_CTL_DEL(0xffffffffffffffff, 0x2, 0xffffffffffffffff) inotify_add_watch(r1, &(0x7f0000000000)='.\x00', 0x400017e) r2 = openat$incfs(0xffffffffffffffff, &(0x7f0000000080)='.log\x00', 0x20200, 0x40) fcntl$getownex(r2, 0x10, &(0x7f00000000c0)) r3 = open(&(0x7f0000000040)='./file0\x00', 0x200c2, 0x0) write$binfmt_elf64(r3, &(0x7f0000000080)=ANY=[], 0x8) sendfile(r3, r3, &(0x7f00000001c0), 0xa198) dup(0xffffffffffffffff) r4 = syz_mount_image$gfs2meta(&(0x7f0000000140)='gfs2meta\x00', &(0x7f0000000200)='./file0\x00', 0x1000, 0x4, &(0x7f0000000880)=[{&(0x7f0000000240)="77ba0daae1b2e74ecd52c59a85bf6f4b1f0b01ab07ba92bc6e57305406115f2bc3e4dd94f19ed896c4fccd34271e9dc3499af9298dbc709e0e6a513d61391d4b198af5f55d24239ae934e8babb8d1cb67bb17b0158", 0x55, 0x3}, {&(0x7f00000002c0)="ae227f954d229f666a6cd22938585e852071e55aa5728addcd315922bf32282e077bdbc63cd5ec89626ee2f8e7982ca239eaa758231056cdca22ca27428407f6c64c384665cfbd00ee6e0d7609f2c7ba0f28b4af70d0307ef78decfe42973915cd509de7c19ea0f3f5c3caaab05f9af08e2cc82d2c14b919dd045e3d36ce1c5d0ff23aed0a4a6ef508b5e71df0a25250d47f1e033ed503b6df99c189111b75b59df679cb75240b756cafecfd203568eeb2c1708fe9f11a2cb0f288590ec76cefbde09c90e9d568492aa5f41196397b70c869838c7164f2bad8eff017d021d7d41c9025c20b", 0xe5, 0x3}, {&(0x7f00000003c0)="792eb6eec33e561f18dc4b58b6a6fb3c7e6fd5e612c08490216ae02617f9811945929cffbf59727393a9a69d57b00a5cd08da3888884b8361d6a4003a54480c1086a5fc876582ff049ede86e2f58d80c7b6cf618e1ba36d4710887bc34ef2b7abbc686df2185f99998060bf492b84e3a02077e2aaf014e1186fde602d2b639d467f48fc2e18cf1553e07ac39040953566ab1d21aac627b166825375377bc3332b62160ea8bf7fc3196b30965dce6181bf7a1c60d0270f24ba60e633c8c88bbdefb5928dc8183c2ce0616de6c3185a4aa7eb2ec6ab7d8394a9536bf7e4f33f76294b0b4a390aca576177671191fe91530e9bd0db79cee", 0xf6, 0x100000000}, {&(0x7f00000004c0)="a90f49b744c1ad7c27bc0a3b1965ca2bce6602b5f5a8b294ced925862d0a9df5c88e43095ba5810ba49c2216e7e1a9b5f07075e6a3101e853557713e983b2f46cf599dc2cba6254802d01794cdc015e28e2b5aa8c10293a4487b3fe2469252f2c2406327b2a5fe71b185ec0adfdc824a237f94", 0x73, 0x7}], 0x21008, &(0x7f0000000900)={[{'.log\x00'}, {'-%('}, {'.log\x00'}], [{@obj_user={'obj_user'}}, {@appraise_type='appraise_type=imasig'}, {@fowner_eq={'fowner', 0x3d, 0xee01}}, {@hash='hash'}, {@subj_type={'subj_type', 0x3d, '-&'}}]}) ioctl$BTRFS_IOC_SUBVOL_SETFLAGS(r4, 0x4008941a, &(0x7f0000000980)=0xfe33b054cbbc4d79) 11:24:19 executing program 4: write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000540)=ANY=[@ANYBLOB="7f454c4601061f000400000000000000030038000800000032000000000000004000000000000000560200000000000007000000008038000100090002000100010000000100000006000000000000000400000000000000060000000000000001040000000000000200000000000000010000000000000051e574640400000001000000000000000400000000000000050000000000000005000000000000000400000000000000ff24444700000000908bc001727fbcd44f4d3bf922995edf2fd379eb00"/480], 0x2c4) r0 = inotify_init() r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) epoll_ctl$EPOLL_CTL_DEL(0xffffffffffffffff, 0x2, r1) inotify_add_watch(r0, &(0x7f0000000000)='.\x00', 0x400017e) r2 = openat$incfs(0xffffffffffffffff, &(0x7f0000000080)='.log\x00', 0x20200, 0x40) fcntl$getownex(r2, 0x10, &(0x7f00000000c0)) r3 = open(&(0x7f0000000040)='./file0\x00', 0x200c2, 0x0) write$binfmt_elf64(r3, &(0x7f0000000080)=ANY=[], 0x8) sendfile(r3, r3, &(0x7f00000001c0), 0xa198) dup(0xffffffffffffffff) r4 = syz_mount_image$gfs2meta(&(0x7f0000000140)='gfs2meta\x00', &(0x7f0000000200)='./file0\x00', 0x1000, 0x4, &(0x7f0000000880)=[{&(0x7f0000000240)="77ba0daae1b2e74ecd52c59a85bf6f4b1f0b01ab07ba92bc6e57305406115f2bc3e4dd94f19ed896c4fccd34271e9dc3499af9298dbc709e0e6a513d61391d4b198af5f55d24239ae934e8babb8d1cb67bb17b0158", 0x55, 0x3}, {&(0x7f00000002c0)="ae227f954d229f666a6cd22938585e852071e55aa5728addcd315922bf32282e077bdbc63cd5ec89626ee2f8e7982ca239eaa758231056cdca22ca27428407f6c64c384665cfbd00ee6e0d7609f2c7ba0f28b4af70d0307ef78decfe42973915cd509de7c19ea0f3f5c3caaab05f9af08e2cc82d2c14b919dd045e3d36ce1c5d0ff23aed0a4a6ef508b5e71df0a25250d47f1e033ed503b6df99c189111b75b59df679cb75240b756cafecfd203568eeb2c1708fe9f11a2cb0f288590ec76cefbde09c90e9d568492aa5f41196397b70c869838c7164f2bad8eff017d021d7d41c9025c20b", 0xe5, 0x3}, {&(0x7f00000003c0)="792eb6eec33e561f18dc4b58b6a6fb3c7e6fd5e612c08490216ae02617f9811945929cffbf59727393a9a69d57b00a5cd08da3888884b8361d6a4003a54480c1086a5fc876582ff049ede86e2f58d80c7b6cf618e1ba36d4710887bc34ef2b7abbc686df2185f99998060bf492b84e3a02077e2aaf014e1186fde602d2b639d467f48fc2e18cf1553e07ac39040953566ab1d21aac627b166825375377bc3332b62160ea8bf7fc3196b30965dce6181bf7a1c60d0270f24ba60e633c8c88bbdefb5928dc8183c2ce0616de6c3185a4aa7eb2ec6ab7d8394a9536bf7e4f33f76294b0b4a390aca576177671191fe91530e9bd0db79cee", 0xf6, 0x100000000}, {&(0x7f00000004c0)="a90f49b744c1ad7c27bc0a3b1965ca2bce6602b5f5a8b294ced925862d0a9df5c88e43095ba5810ba49c2216e7e1a9b5f07075e6a3101e853557713e983b2f46cf599dc2cba6254802d01794cdc015e28e2b5aa8c10293a4487b3fe2469252f2c2406327b2a5fe71b185ec0adfdc824a237f94", 0x73, 0x7}], 0x21008, &(0x7f0000000900)={[{'.log\x00'}, {'-%('}, {'.log\x00'}], [{@appraise_type='appraise_type=imasig'}, {@fowner_eq={'fowner', 0x3d, 0xee01}}, {@hash='hash'}, {@subj_type={'subj_type', 0x3d, '-&'}}, {@hash='hash'}]}) ioctl$BTRFS_IOC_SUBVOL_SETFLAGS(r4, 0x4008941a, &(0x7f0000000980)=0xfe33b054cbbc4d79) 11:24:19 executing program 3: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x7f, 0x80000000008001}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x9}, 0x0) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000080)) r1 = open(&(0x7f0000000240)='./file1\x00', 0x141142, 0x0) write$UHID_INPUT(r1, &(0x7f0000001440)={0x8, {'\x001\x00'}}, 0xfffffc41) open(&(0x7f00000001c0)='./file1\x00', 0x0, 0x0) setxattr$trusted_overlay_nlink(&(0x7f0000000000)='./file1\x00', &(0x7f00000000c0)='trusted.overlay.nlink\x00', 0x0, 0x0, 0x0) [ 525.295369][T25833] loop0: detected capacity change from 264192 to 0 [ 525.507255][T25845] loop4: detected capacity change from 264192 to 0 11:24:19 executing program 5: write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000540)=ANY=[@ANYBLOB="7f454c4601061f000400000000000000030038000800000032000000000000004000000000000000560200000000000007000000008038000100090002000100010000000100000006000000000000000400000000000000060000000000000001040000000000000200000000000000010000000000000051e574640400000001000000000000000400000000000000050000000000000005000000000000000400000000000000ff24444700000000908bc001727fbcd44f4d3bf922995edf2fd379eb00"/486], 0x2c4) r0 = inotify_init() r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) epoll_ctl$EPOLL_CTL_DEL(0xffffffffffffffff, 0x2, r1) inotify_add_watch(r0, &(0x7f0000000000)='.\x00', 0x400017e) r2 = openat$incfs(0xffffffffffffffff, &(0x7f0000000080)='.log\x00', 0x20200, 0x40) fcntl$getownex(r2, 0x10, &(0x7f00000000c0)) r3 = open(&(0x7f0000000040)='./file0\x00', 0x200c2, 0x0) write$binfmt_elf64(r3, &(0x7f0000000080)=ANY=[], 0x8) sendfile(r3, r3, &(0x7f00000001c0), 0xa198) dup(0xffffffffffffffff) r4 = syz_mount_image$gfs2meta(&(0x7f0000000140)='gfs2meta\x00', &(0x7f0000000200)='./file0\x00', 0x1000, 0x4, &(0x7f0000000880)=[{&(0x7f0000000240)="77ba0daae1b2e74ecd52c59a85bf6f4b1f0b01ab07ba92bc6e57305406115f2bc3e4dd94f19ed896c4fccd34271e9dc3499af9298dbc709e0e6a513d61391d4b198af5f55d24239ae934e8babb8d1cb67bb17b0158", 0x55, 0x3}, {&(0x7f00000002c0)="ae227f954d229f666a6cd22938585e852071e55aa5728addcd315922bf32282e077bdbc63cd5ec89626ee2f8e7982ca239eaa758231056cdca22ca27428407f6c64c384665cfbd00ee6e0d7609f2c7ba0f28b4af70d0307ef78decfe42973915cd509de7c19ea0f3f5c3caaab05f9af08e2cc82d2c14b919dd045e3d36ce1c5d0ff23aed0a4a6ef508b5e71df0a25250d47f1e033ed503b6df99c189111b75b59df679cb75240b756cafecfd203568eeb2c1708fe9f11a2cb0f288590ec76cefbde09c90e9d568492aa5f41196397b70c869838c7164f2bad8eff017d021d7d41c9025c20b", 0xe5, 0x3}, {&(0x7f00000003c0)="792eb6eec33e561f18dc4b58b6a6fb3c7e6fd5e612c08490216ae02617f9811945929cffbf59727393a9a69d57b00a5cd08da3888884b8361d6a4003a54480c1086a5fc876582ff049ede86e2f58d80c7b6cf618e1ba36d4710887bc34ef2b7abbc686df2185f99998060bf492b84e3a02077e2aaf014e1186fde602d2b639d467f48fc2e18cf1553e07ac39040953566ab1d21aac627b166825375377bc3332b62160ea8bf7fc3196b30965dce6181bf7a1c60d0270f24ba60e633c8c88bbdefb5928dc8183c2ce0616de6c3185a4aa7eb2ec6ab7d8394a9536bf7e4f33f76294b0b4a390aca576177671191fe91530e9bd0db79cee", 0xf6, 0x100000000}, {&(0x7f00000004c0)="a90f49b744c1ad7c27bc0a3b1965ca2bce6602b5f5a8b294ced925862d0a9df5c88e43095ba5810ba49c2216e7e1a9b5f07075e6a3101e853557713e983b2f46cf599dc2cba6254802d01794cdc015e28e2b5aa8c10293a4487b3fe2469252f2c2406327b2a5fe71b185ec0adfdc824a237f94", 0x73, 0x7}], 0x21008, &(0x7f0000000900)={[{'.log\x00'}, {'-%('}, {'.log\x00'}], [{@appraise_type='appraise_type=imasig'}, {@fowner_eq={'fowner', 0x3d, 0xee01}}, {@hash='hash'}, {@subj_type={'subj_type', 0x3d, '-&'}}, {@hash='hash'}]}) ioctl$BTRFS_IOC_SUBVOL_SETFLAGS(r4, 0x4008941a, &(0x7f0000000980)=0xfe33b054cbbc4d79) 11:24:19 executing program 2: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x7f, 0x80000000008001}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x9}, 0x0) r1 = open(&(0x7f0000000240)='./file1\x00', 0x141142, 0x0) write$UHID_INPUT(r1, &(0x7f0000001440)={0x8, {'\x004\x00'}}, 0xfffffc41) open(&(0x7f00000001c0)='./file1\x00', 0x0, 0x0) setxattr$trusted_overlay_nlink(&(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x0, 0x0) 11:24:19 executing program 1: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x7f, 0x80000000008001}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x9}, 0x0) r1 = open(&(0x7f0000000240)='./file1\x00', 0x141142, 0x0) write$UHID_INPUT(r1, &(0x7f0000001440), 0xfffffc41) open(&(0x7f00000001c0)='./file1\x00', 0x0, 0xa000000) setxattr$trusted_overlay_nlink(&(0x7f0000000000)='./file1\x00', &(0x7f00000000c0)='trusted.overlay.nlink\x00', 0x0, 0x0, 0x0) [ 525.704080][T25853] loop5: detected capacity change from 264192 to 0 11:24:19 executing program 0: r0 = perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x5c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write$binfmt_elf64(r0, &(0x7f0000000540)=ANY=[@ANYBLOB], 0x2c4) inotify_init() openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) epoll_ctl$EPOLL_CTL_DEL(0xffffffffffffffff, 0x2, 0xffffffffffffffff) inotify_add_watch(0xffffffffffffffff, &(0x7f0000000000)='.\x00', 0x400017e) r1 = openat$incfs(0xffffffffffffffff, &(0x7f0000000080)='.log\x00', 0x20200, 0x40) fcntl$getownex(r1, 0x10, &(0x7f00000000c0)) r2 = open(&(0x7f0000000040)='./file0\x00', 0x200c2, 0x0) write$binfmt_elf64(r2, &(0x7f0000000080)=ANY=[], 0x8) sendfile(r2, r2, &(0x7f00000001c0), 0xa198) dup(0xffffffffffffffff) r3 = syz_mount_image$gfs2meta(&(0x7f0000000140)='gfs2meta\x00', &(0x7f0000000200)='./file0\x00', 0x1000, 0x4, &(0x7f0000000880)=[{&(0x7f0000000240)="77ba0daae1b2e74ecd52c59a85bf6f4b1f0b01ab07ba92bc6e57305406115f2bc3e4dd94f19ed896c4fccd34271e9dc3499af9298dbc709e0e6a513d61391d4b198af5f55d24239ae934e8babb8d1cb67bb17b0158", 0x55, 0x3}, {&(0x7f00000002c0)="ae227f954d229f666a6cd22938585e852071e55aa5728addcd315922bf32282e077bdbc63cd5ec89626ee2f8e7982ca239eaa758231056cdca22ca27428407f6c64c384665cfbd00ee6e0d7609f2c7ba0f28b4af70d0307ef78decfe42973915cd509de7c19ea0f3f5c3caaab05f9af08e2cc82d2c14b919dd045e3d36ce1c5d0ff23aed0a4a6ef508b5e71df0a25250d47f1e033ed503b6df99c189111b75b59df679cb75240b756cafecfd203568eeb2c1708fe9f11a2cb0f288590ec76cefbde09c90e9d568492aa5f41196397b70c869838c7164f2bad8eff017d021d7d41c9025c20b", 0xe5, 0x3}, {&(0x7f00000003c0)="792eb6eec33e561f18dc4b58b6a6fb3c7e6fd5e612c08490216ae02617f9811945929cffbf59727393a9a69d57b00a5cd08da3888884b8361d6a4003a54480c1086a5fc876582ff049ede86e2f58d80c7b6cf618e1ba36d4710887bc34ef2b7abbc686df2185f99998060bf492b84e3a02077e2aaf014e1186fde602d2b639d467f48fc2e18cf1553e07ac39040953566ab1d21aac627b166825375377bc3332b62160ea8bf7fc3196b30965dce6181bf7a1c60d0270f24ba60e633c8c88bbdefb5928dc8183c2ce0616de6c3185a4aa7eb2ec6ab7d8394a9536bf7e4f33f76294b0b4a390aca576177671191fe91530e9bd0db79cee", 0xf6, 0x100000000}, {&(0x7f00000004c0)="a90f49b744c1ad7c27bc0a3b1965ca2bce6602b5f5a8b294ced925862d0a9df5c88e43095ba5810ba49c2216e7e1a9b5f07075e6a3101e853557713e983b2f46cf599dc2cba6254802d01794cdc015e28e2b5aa8c10293a4487b3fe2469252f2c2406327b2a5fe71b185ec0adfdc824a237f94", 0x73, 0x7}], 0x21008, &(0x7f0000000900)={[{'.log\x00'}, {'-%('}, {'.log\x00'}], [{@obj_user={'obj_user'}}, {@appraise_type='appraise_type=imasig'}, {@fowner_eq={'fowner', 0x3d, 0xee01}}, {@hash='hash'}, {@subj_type={'subj_type', 0x3d, '-&'}}]}) ioctl$BTRFS_IOC_SUBVOL_SETFLAGS(r3, 0x4008941a, &(0x7f0000000980)=0xfe33b054cbbc4d79) [ 525.976740][T25864] loop0: detected capacity change from 264192 to 0 11:24:20 executing program 1: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x7f, 0x80000000008001}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x9}, 0x0) r1 = open(&(0x7f0000000240)='./file1\x00', 0x141142, 0x0) write$UHID_INPUT(r1, &(0x7f0000001440), 0xfffffc41) open(&(0x7f00000001c0)='./file1\x00', 0x0, 0xb000000) setxattr$trusted_overlay_nlink(&(0x7f0000000000)='./file1\x00', &(0x7f00000000c0)='trusted.overlay.nlink\x00', 0x0, 0x0, 0x0) 11:24:20 executing program 4: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x7f, 0x80000000008001}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x9}, 0x0) r1 = open(&(0x7f0000000240)='./file1\x00', 0x141142, 0x0) write$UHID_INPUT(r1, &(0x7f0000001440), 0xfffffc41) open(&(0x7f00000001c0)='./file1\x00', 0x0, 0xa000000) setxattr$trusted_overlay_nlink(&(0x7f0000000000)='./file1\x00', &(0x7f00000000c0)='trusted.overlay.nlink\x00', 0x0, 0x0, 0x0) 11:24:20 executing program 3: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x7f, 0x80000000008001}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x9}, 0x0) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000080)) r1 = open(&(0x7f0000000240)='./file1\x00', 0x141142, 0x0) write$UHID_INPUT(r1, &(0x7f0000001440)={0x8, {'\x002\x00'}}, 0xfffffc41) open(&(0x7f00000001c0)='./file1\x00', 0x0, 0x0) setxattr$trusted_overlay_nlink(&(0x7f0000000000)='./file1\x00', &(0x7f00000000c0)='trusted.overlay.nlink\x00', 0x0, 0x0, 0x0) 11:24:20 executing program 5: write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000540)=ANY=[@ANYBLOB="7f454c4601061f000400000000000000030038000800000032000000000000004000000000000000560200000000000007000000008038000100090002000100010000000100000006000000000000000400000000000000060000000000000001040000000000000200000000000000010000000000000051e574640400000001000000000000000400000000000000050000000000000005000000000000000400000000000000ff24444700000000908bc001727fbcd44f4d3bf922995edf2fd379eb00"/486], 0x2c4) r0 = inotify_init() r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) epoll_ctl$EPOLL_CTL_DEL(0xffffffffffffffff, 0x2, r1) inotify_add_watch(r0, &(0x7f0000000000)='.\x00', 0x400017e) r2 = openat$incfs(0xffffffffffffffff, &(0x7f0000000080)='.log\x00', 0x20200, 0x40) fcntl$getownex(r2, 0x10, &(0x7f00000000c0)) r3 = open(&(0x7f0000000040)='./file0\x00', 0x200c2, 0x0) write$binfmt_elf64(r3, &(0x7f0000000080)=ANY=[], 0x8) sendfile(r3, r3, &(0x7f00000001c0), 0xa198) dup(0xffffffffffffffff) r4 = syz_mount_image$gfs2meta(&(0x7f0000000140)='gfs2meta\x00', &(0x7f0000000200)='./file0\x00', 0x1000, 0x4, &(0x7f0000000880)=[{&(0x7f0000000240)="77ba0daae1b2e74ecd52c59a85bf6f4b1f0b01ab07ba92bc6e57305406115f2bc3e4dd94f19ed896c4fccd34271e9dc3499af9298dbc709e0e6a513d61391d4b198af5f55d24239ae934e8babb8d1cb67bb17b0158", 0x55, 0x3}, {&(0x7f00000002c0)="ae227f954d229f666a6cd22938585e852071e55aa5728addcd315922bf32282e077bdbc63cd5ec89626ee2f8e7982ca239eaa758231056cdca22ca27428407f6c64c384665cfbd00ee6e0d7609f2c7ba0f28b4af70d0307ef78decfe42973915cd509de7c19ea0f3f5c3caaab05f9af08e2cc82d2c14b919dd045e3d36ce1c5d0ff23aed0a4a6ef508b5e71df0a25250d47f1e033ed503b6df99c189111b75b59df679cb75240b756cafecfd203568eeb2c1708fe9f11a2cb0f288590ec76cefbde09c90e9d568492aa5f41196397b70c869838c7164f2bad8eff017d021d7d41c9025c20b", 0xe5, 0x3}, {&(0x7f00000003c0)="792eb6eec33e561f18dc4b58b6a6fb3c7e6fd5e612c08490216ae02617f9811945929cffbf59727393a9a69d57b00a5cd08da3888884b8361d6a4003a54480c1086a5fc876582ff049ede86e2f58d80c7b6cf618e1ba36d4710887bc34ef2b7abbc686df2185f99998060bf492b84e3a02077e2aaf014e1186fde602d2b639d467f48fc2e18cf1553e07ac39040953566ab1d21aac627b166825375377bc3332b62160ea8bf7fc3196b30965dce6181bf7a1c60d0270f24ba60e633c8c88bbdefb5928dc8183c2ce0616de6c3185a4aa7eb2ec6ab7d8394a9536bf7e4f33f76294b0b4a390aca576177671191fe91530e9bd0db79cee", 0xf6, 0x100000000}, {&(0x7f00000004c0)="a90f49b744c1ad7c27bc0a3b1965ca2bce6602b5f5a8b294ced925862d0a9df5c88e43095ba5810ba49c2216e7e1a9b5f07075e6a3101e853557713e983b2f46cf599dc2cba6254802d01794cdc015e28e2b5aa8c10293a4487b3fe2469252f2c2406327b2a5fe71b185ec0adfdc824a237f94", 0x73, 0x7}], 0x21008, &(0x7f0000000900)={[{'.log\x00'}, {'-%('}, {'.log\x00'}], [{@appraise_type='appraise_type=imasig'}, {@fowner_eq={'fowner', 0x3d, 0xee01}}, {@hash='hash'}, {@subj_type={'subj_type', 0x3d, '-&'}}, {@hash='hash'}]}) ioctl$BTRFS_IOC_SUBVOL_SETFLAGS(r4, 0x4008941a, &(0x7f0000000980)=0xfe33b054cbbc4d79) [ 526.704706][T25885] loop5: detected capacity change from 264192 to 0 11:24:20 executing program 0: r0 = perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x5c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write$binfmt_elf64(r0, &(0x7f0000000540)=ANY=[@ANYBLOB], 0x2c4) inotify_init() openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) epoll_ctl$EPOLL_CTL_DEL(0xffffffffffffffff, 0x2, 0xffffffffffffffff) inotify_add_watch(0xffffffffffffffff, &(0x7f0000000000)='.\x00', 0x400017e) r1 = openat$incfs(0xffffffffffffffff, &(0x7f0000000080)='.log\x00', 0x20200, 0x40) fcntl$getownex(r1, 0x10, &(0x7f00000000c0)) r2 = open(&(0x7f0000000040)='./file0\x00', 0x200c2, 0x0) write$binfmt_elf64(r2, &(0x7f0000000080)=ANY=[], 0x8) sendfile(r2, r2, &(0x7f00000001c0), 0xa198) dup(0xffffffffffffffff) r3 = syz_mount_image$gfs2meta(&(0x7f0000000140)='gfs2meta\x00', &(0x7f0000000200)='./file0\x00', 0x1000, 0x4, &(0x7f0000000880)=[{&(0x7f0000000240)="77ba0daae1b2e74ecd52c59a85bf6f4b1f0b01ab07ba92bc6e57305406115f2bc3e4dd94f19ed896c4fccd34271e9dc3499af9298dbc709e0e6a513d61391d4b198af5f55d24239ae934e8babb8d1cb67bb17b0158", 0x55, 0x3}, {&(0x7f00000002c0)="ae227f954d229f666a6cd22938585e852071e55aa5728addcd315922bf32282e077bdbc63cd5ec89626ee2f8e7982ca239eaa758231056cdca22ca27428407f6c64c384665cfbd00ee6e0d7609f2c7ba0f28b4af70d0307ef78decfe42973915cd509de7c19ea0f3f5c3caaab05f9af08e2cc82d2c14b919dd045e3d36ce1c5d0ff23aed0a4a6ef508b5e71df0a25250d47f1e033ed503b6df99c189111b75b59df679cb75240b756cafecfd203568eeb2c1708fe9f11a2cb0f288590ec76cefbde09c90e9d568492aa5f41196397b70c869838c7164f2bad8eff017d021d7d41c9025c20b", 0xe5, 0x3}, {&(0x7f00000003c0)="792eb6eec33e561f18dc4b58b6a6fb3c7e6fd5e612c08490216ae02617f9811945929cffbf59727393a9a69d57b00a5cd08da3888884b8361d6a4003a54480c1086a5fc876582ff049ede86e2f58d80c7b6cf618e1ba36d4710887bc34ef2b7abbc686df2185f99998060bf492b84e3a02077e2aaf014e1186fde602d2b639d467f48fc2e18cf1553e07ac39040953566ab1d21aac627b166825375377bc3332b62160ea8bf7fc3196b30965dce6181bf7a1c60d0270f24ba60e633c8c88bbdefb5928dc8183c2ce0616de6c3185a4aa7eb2ec6ab7d8394a9536bf7e4f33f76294b0b4a390aca576177671191fe91530e9bd0db79cee", 0xf6, 0x100000000}, {&(0x7f00000004c0)="a90f49b744c1ad7c27bc0a3b1965ca2bce6602b5f5a8b294ced925862d0a9df5c88e43095ba5810ba49c2216e7e1a9b5f07075e6a3101e853557713e983b2f46cf599dc2cba6254802d01794cdc015e28e2b5aa8c10293a4487b3fe2469252f2c2406327b2a5fe71b185ec0adfdc824a237f94", 0x73, 0x7}], 0x21008, &(0x7f0000000900)={[{'.log\x00'}, {'-%('}, {'.log\x00'}], [{@obj_user={'obj_user'}}, {@appraise_type='appraise_type=imasig'}, {@fowner_eq={'fowner', 0x3d, 0xee01}}, {@hash='hash'}, {@subj_type={'subj_type', 0x3d, '-&'}}]}) ioctl$BTRFS_IOC_SUBVOL_SETFLAGS(r3, 0x4008941a, &(0x7f0000000980)=0xfe33b054cbbc4d79) 11:24:20 executing program 2: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x7f, 0x80000000008001}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x9}, 0x0) r1 = open(&(0x7f0000000240)='./file1\x00', 0x141142, 0x0) write$UHID_INPUT(r1, &(0x7f0000001440)={0x8, {'\x005\x00'}}, 0xfffffc41) open(&(0x7f00000001c0)='./file1\x00', 0x0, 0x0) setxattr$trusted_overlay_nlink(&(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x0, 0x0) [ 526.910172][T25901] loop0: detected capacity change from 264192 to 0 11:24:21 executing program 5: write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000540)=ANY=[@ANYBLOB="7f454c4601061f000400000000000000030038000800000032000000000000004000000000000000560200000000000007000000008038000100090002000100010000000100000006000000000000000400000000000000060000000000000001040000000000000200000000000000010000000000000051e574640400000001000000000000000400000000000000050000000000000005000000000000000400000000000000ff24444700000000908bc001727fbcd44f4d3bf922995edf2fd379eb00"/486], 0x2c4) r0 = inotify_init() r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) epoll_ctl$EPOLL_CTL_DEL(0xffffffffffffffff, 0x2, r1) inotify_add_watch(r0, &(0x7f0000000000)='.\x00', 0x400017e) r2 = openat$incfs(0xffffffffffffffff, &(0x7f0000000080)='.log\x00', 0x20200, 0x40) fcntl$getownex(r2, 0x10, &(0x7f00000000c0)) r3 = open(&(0x7f0000000040)='./file0\x00', 0x200c2, 0x0) write$binfmt_elf64(r3, &(0x7f0000000080)=ANY=[], 0x8) sendfile(r3, r3, &(0x7f00000001c0), 0xa198) dup(0xffffffffffffffff) r4 = syz_mount_image$gfs2meta(&(0x7f0000000140)='gfs2meta\x00', &(0x7f0000000200)='./file0\x00', 0x1000, 0x4, &(0x7f0000000880)=[{&(0x7f0000000240)="77ba0daae1b2e74ecd52c59a85bf6f4b1f0b01ab07ba92bc6e57305406115f2bc3e4dd94f19ed896c4fccd34271e9dc3499af9298dbc709e0e6a513d61391d4b198af5f55d24239ae934e8babb8d1cb67bb17b0158", 0x55, 0x3}, {&(0x7f00000002c0)="ae227f954d229f666a6cd22938585e852071e55aa5728addcd315922bf32282e077bdbc63cd5ec89626ee2f8e7982ca239eaa758231056cdca22ca27428407f6c64c384665cfbd00ee6e0d7609f2c7ba0f28b4af70d0307ef78decfe42973915cd509de7c19ea0f3f5c3caaab05f9af08e2cc82d2c14b919dd045e3d36ce1c5d0ff23aed0a4a6ef508b5e71df0a25250d47f1e033ed503b6df99c189111b75b59df679cb75240b756cafecfd203568eeb2c1708fe9f11a2cb0f288590ec76cefbde09c90e9d568492aa5f41196397b70c869838c7164f2bad8eff017d021d7d41c9025c20b", 0xe5, 0x3}, {&(0x7f00000003c0)="792eb6eec33e561f18dc4b58b6a6fb3c7e6fd5e612c08490216ae02617f9811945929cffbf59727393a9a69d57b00a5cd08da3888884b8361d6a4003a54480c1086a5fc876582ff049ede86e2f58d80c7b6cf618e1ba36d4710887bc34ef2b7abbc686df2185f99998060bf492b84e3a02077e2aaf014e1186fde602d2b639d467f48fc2e18cf1553e07ac39040953566ab1d21aac627b166825375377bc3332b62160ea8bf7fc3196b30965dce6181bf7a1c60d0270f24ba60e633c8c88bbdefb5928dc8183c2ce0616de6c3185a4aa7eb2ec6ab7d8394a9536bf7e4f33f76294b0b4a390aca576177671191fe91530e9bd0db79cee", 0xf6, 0x100000000}, {&(0x7f00000004c0)="a90f49b744c1ad7c27bc0a3b1965ca2bce6602b5f5a8b294ced925862d0a9df5c88e43095ba5810ba49c2216e7e1a9b5f07075e6a3101e853557713e983b2f46cf599dc2cba6254802d01794cdc015e28e2b5aa8c10293a4487b3fe2469252f2c2406327b2a5fe71b185ec0adfdc824a237f94", 0x73, 0x7}], 0x21008, &(0x7f0000000900)={[{'.log\x00'}, {'-%('}, {'.log\x00'}], [{@appraise_type='appraise_type=imasig'}, {@fowner_eq={'fowner', 0x3d, 0xee01}}, {@hash='hash'}, {@subj_type={'subj_type', 0x3d, '-&'}}, {@hash='hash'}]}) ioctl$BTRFS_IOC_SUBVOL_SETFLAGS(r4, 0x4008941a, &(0x7f0000000980)=0xfe33b054cbbc4d79) 11:24:21 executing program 0: r0 = perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x5c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write$binfmt_elf64(r0, &(0x7f0000000540)=ANY=[@ANYBLOB], 0x2c4) inotify_init() openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) epoll_ctl$EPOLL_CTL_DEL(0xffffffffffffffff, 0x2, 0xffffffffffffffff) inotify_add_watch(0xffffffffffffffff, &(0x7f0000000000)='.\x00', 0x400017e) r1 = openat$incfs(0xffffffffffffffff, &(0x7f0000000080)='.log\x00', 0x20200, 0x40) fcntl$getownex(r1, 0x10, &(0x7f00000000c0)) r2 = open(&(0x7f0000000040)='./file0\x00', 0x200c2, 0x0) write$binfmt_elf64(r2, &(0x7f0000000080)=ANY=[], 0x8) sendfile(r2, r2, &(0x7f00000001c0), 0xa198) dup(0xffffffffffffffff) r3 = syz_mount_image$gfs2meta(&(0x7f0000000140)='gfs2meta\x00', &(0x7f0000000200)='./file0\x00', 0x1000, 0x4, &(0x7f0000000880)=[{&(0x7f0000000240)="77ba0daae1b2e74ecd52c59a85bf6f4b1f0b01ab07ba92bc6e57305406115f2bc3e4dd94f19ed896c4fccd34271e9dc3499af9298dbc709e0e6a513d61391d4b198af5f55d24239ae934e8babb8d1cb67bb17b0158", 0x55, 0x3}, {&(0x7f00000002c0)="ae227f954d229f666a6cd22938585e852071e55aa5728addcd315922bf32282e077bdbc63cd5ec89626ee2f8e7982ca239eaa758231056cdca22ca27428407f6c64c384665cfbd00ee6e0d7609f2c7ba0f28b4af70d0307ef78decfe42973915cd509de7c19ea0f3f5c3caaab05f9af08e2cc82d2c14b919dd045e3d36ce1c5d0ff23aed0a4a6ef508b5e71df0a25250d47f1e033ed503b6df99c189111b75b59df679cb75240b756cafecfd203568eeb2c1708fe9f11a2cb0f288590ec76cefbde09c90e9d568492aa5f41196397b70c869838c7164f2bad8eff017d021d7d41c9025c20b", 0xe5, 0x3}, {&(0x7f00000003c0)="792eb6eec33e561f18dc4b58b6a6fb3c7e6fd5e612c08490216ae02617f9811945929cffbf59727393a9a69d57b00a5cd08da3888884b8361d6a4003a54480c1086a5fc876582ff049ede86e2f58d80c7b6cf618e1ba36d4710887bc34ef2b7abbc686df2185f99998060bf492b84e3a02077e2aaf014e1186fde602d2b639d467f48fc2e18cf1553e07ac39040953566ab1d21aac627b166825375377bc3332b62160ea8bf7fc3196b30965dce6181bf7a1c60d0270f24ba60e633c8c88bbdefb5928dc8183c2ce0616de6c3185a4aa7eb2ec6ab7d8394a9536bf7e4f33f76294b0b4a390aca576177671191fe91530e9bd0db79cee", 0xf6, 0x100000000}, {&(0x7f00000004c0)="a90f49b744c1ad7c27bc0a3b1965ca2bce6602b5f5a8b294ced925862d0a9df5c88e43095ba5810ba49c2216e7e1a9b5f07075e6a3101e853557713e983b2f46cf599dc2cba6254802d01794cdc015e28e2b5aa8c10293a4487b3fe2469252f2c2406327b2a5fe71b185ec0adfdc824a237f94", 0x73, 0x7}], 0x21008, &(0x7f0000000900)={[{'.log\x00'}, {'-%('}, {'.log\x00'}], [{@obj_user={'obj_user'}}, {@appraise_type='appraise_type=imasig'}, {@fowner_eq={'fowner', 0x3d, 0xee01}}, {@hash='hash'}, {@subj_type={'subj_type', 0x3d, '-&'}}]}) ioctl$BTRFS_IOC_SUBVOL_SETFLAGS(r3, 0x4008941a, &(0x7f0000000980)=0xfe33b054cbbc4d79) 11:24:21 executing program 4: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x7f, 0x80000000008001}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x9}, 0x0) r1 = open(&(0x7f0000000240)='./file1\x00', 0x141142, 0x0) write$UHID_INPUT(r1, &(0x7f0000001440), 0xfffffc41) open(&(0x7f00000001c0)='./file1\x00', 0x0, 0xa000000) setxattr$trusted_overlay_nlink(&(0x7f0000000000)='./file1\x00', &(0x7f00000000c0)='trusted.overlay.nlink\x00', 0x0, 0x0, 0x0) [ 527.745614][T25920] loop5: detected capacity change from 264192 to 0 [ 527.860447][T25926] loop0: detected capacity change from 264192 to 0 11:24:22 executing program 3: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x7f, 0x80000000008001}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x9}, 0x0) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000080)) r1 = open(&(0x7f0000000240)='./file1\x00', 0x141142, 0x0) write$UHID_INPUT(r1, &(0x7f0000001440)={0x8, {'\x003\x00'}}, 0xfffffc41) open(&(0x7f00000001c0)='./file1\x00', 0x0, 0x0) setxattr$trusted_overlay_nlink(&(0x7f0000000000)='./file1\x00', &(0x7f00000000c0)='trusted.overlay.nlink\x00', 0x0, 0x0, 0x0) 11:24:22 executing program 1: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x7f, 0x80000000008001}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x9}, 0x0) r1 = open(&(0x7f0000000240)='./file1\x00', 0x141142, 0x0) write$UHID_INPUT(r1, &(0x7f0000001440), 0xfffffc41) open(&(0x7f00000001c0)='./file1\x00', 0x0, 0xc000000) setxattr$trusted_overlay_nlink(&(0x7f0000000000)='./file1\x00', &(0x7f00000000c0)='trusted.overlay.nlink\x00', 0x0, 0x0, 0x0) 11:24:22 executing program 2: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x7f, 0x80000000008001}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x9}, 0x0) r1 = open(&(0x7f0000000240)='./file1\x00', 0x141142, 0x0) write$UHID_INPUT(r1, &(0x7f0000001440)={0x8, {'\x006\x00'}}, 0xfffffc41) open(&(0x7f00000001c0)='./file1\x00', 0x0, 0x0) setxattr$trusted_overlay_nlink(&(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x0, 0x0) 11:24:22 executing program 5: write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000540)=ANY=[@ANYBLOB="7f454c4601061f000400000000000000030038000800000032000000000000004000000000000000560200000000000007000000008038000100090002000100010000000100000006000000000000000400000000000000060000000000000001040000000000000200000000000000010000000000000051e574640400000001000000000000000400000000000000050000000000000005000000000000000400000000000000ff24444700000000908bc001727fbcd44f4d3bf922995edf2fd379eb00"/489], 0x2c4) r0 = inotify_init() r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) epoll_ctl$EPOLL_CTL_DEL(0xffffffffffffffff, 0x2, r1) inotify_add_watch(r0, &(0x7f0000000000)='.\x00', 0x400017e) r2 = openat$incfs(0xffffffffffffffff, &(0x7f0000000080)='.log\x00', 0x20200, 0x40) fcntl$getownex(r2, 0x10, &(0x7f00000000c0)) r3 = open(&(0x7f0000000040)='./file0\x00', 0x200c2, 0x0) write$binfmt_elf64(r3, &(0x7f0000000080)=ANY=[], 0x8) sendfile(r3, r3, &(0x7f00000001c0), 0xa198) dup(0xffffffffffffffff) r4 = syz_mount_image$gfs2meta(&(0x7f0000000140)='gfs2meta\x00', &(0x7f0000000200)='./file0\x00', 0x1000, 0x4, &(0x7f0000000880)=[{&(0x7f0000000240)="77ba0daae1b2e74ecd52c59a85bf6f4b1f0b01ab07ba92bc6e57305406115f2bc3e4dd94f19ed896c4fccd34271e9dc3499af9298dbc709e0e6a513d61391d4b198af5f55d24239ae934e8babb8d1cb67bb17b0158", 0x55, 0x3}, {&(0x7f00000002c0)="ae227f954d229f666a6cd22938585e852071e55aa5728addcd315922bf32282e077bdbc63cd5ec89626ee2f8e7982ca239eaa758231056cdca22ca27428407f6c64c384665cfbd00ee6e0d7609f2c7ba0f28b4af70d0307ef78decfe42973915cd509de7c19ea0f3f5c3caaab05f9af08e2cc82d2c14b919dd045e3d36ce1c5d0ff23aed0a4a6ef508b5e71df0a25250d47f1e033ed503b6df99c189111b75b59df679cb75240b756cafecfd203568eeb2c1708fe9f11a2cb0f288590ec76cefbde09c90e9d568492aa5f41196397b70c869838c7164f2bad8eff017d021d7d41c9025c20b", 0xe5, 0x3}, {&(0x7f00000003c0)="792eb6eec33e561f18dc4b58b6a6fb3c7e6fd5e612c08490216ae02617f9811945929cffbf59727393a9a69d57b00a5cd08da3888884b8361d6a4003a54480c1086a5fc876582ff049ede86e2f58d80c7b6cf618e1ba36d4710887bc34ef2b7abbc686df2185f99998060bf492b84e3a02077e2aaf014e1186fde602d2b639d467f48fc2e18cf1553e07ac39040953566ab1d21aac627b166825375377bc3332b62160ea8bf7fc3196b30965dce6181bf7a1c60d0270f24ba60e633c8c88bbdefb5928dc8183c2ce0616de6c3185a4aa7eb2ec6ab7d8394a9536bf7e4f33f76294b0b4a390aca576177671191fe91530e9bd0db79cee", 0xf6, 0x100000000}, {&(0x7f00000004c0)="a90f49b744c1ad7c27bc0a3b1965ca2bce6602b5f5a8b294ced925862d0a9df5c88e43095ba5810ba49c2216e7e1a9b5f07075e6a3101e853557713e983b2f46cf599dc2cba6254802d01794cdc015e28e2b5aa8c10293a4487b3fe2469252f2c2406327b2a5fe71b185ec0adfdc824a237f94", 0x73, 0x7}], 0x21008, &(0x7f0000000900)={[{'.log\x00'}, {'-%('}, {'.log\x00'}], [{@appraise_type='appraise_type=imasig'}, {@fowner_eq={'fowner', 0x3d, 0xee01}}, {@hash='hash'}, {@subj_type={'subj_type', 0x3d, '-&'}}, {@hash='hash'}]}) ioctl$BTRFS_IOC_SUBVOL_SETFLAGS(r4, 0x4008941a, &(0x7f0000000980)=0xfe33b054cbbc4d79) 11:24:22 executing program 0: r0 = perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x5c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write$binfmt_elf64(r0, &(0x7f0000000540)=ANY=[@ANYBLOB], 0x2c4) r1 = inotify_init() openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) epoll_ctl$EPOLL_CTL_DEL(0xffffffffffffffff, 0x2, 0xffffffffffffffff) inotify_add_watch(r1, 0x0, 0x400017e) r2 = openat$incfs(0xffffffffffffffff, &(0x7f0000000080)='.log\x00', 0x20200, 0x40) fcntl$getownex(r2, 0x10, &(0x7f00000000c0)) r3 = open(&(0x7f0000000040)='./file0\x00', 0x200c2, 0x0) write$binfmt_elf64(r3, &(0x7f0000000080)=ANY=[], 0x8) sendfile(r3, r3, &(0x7f00000001c0), 0xa198) dup(0xffffffffffffffff) r4 = syz_mount_image$gfs2meta(&(0x7f0000000140)='gfs2meta\x00', &(0x7f0000000200)='./file0\x00', 0x1000, 0x4, &(0x7f0000000880)=[{&(0x7f0000000240)="77ba0daae1b2e74ecd52c59a85bf6f4b1f0b01ab07ba92bc6e57305406115f2bc3e4dd94f19ed896c4fccd34271e9dc3499af9298dbc709e0e6a513d61391d4b198af5f55d24239ae934e8babb8d1cb67bb17b0158", 0x55, 0x3}, {&(0x7f00000002c0)="ae227f954d229f666a6cd22938585e852071e55aa5728addcd315922bf32282e077bdbc63cd5ec89626ee2f8e7982ca239eaa758231056cdca22ca27428407f6c64c384665cfbd00ee6e0d7609f2c7ba0f28b4af70d0307ef78decfe42973915cd509de7c19ea0f3f5c3caaab05f9af08e2cc82d2c14b919dd045e3d36ce1c5d0ff23aed0a4a6ef508b5e71df0a25250d47f1e033ed503b6df99c189111b75b59df679cb75240b756cafecfd203568eeb2c1708fe9f11a2cb0f288590ec76cefbde09c90e9d568492aa5f41196397b70c869838c7164f2bad8eff017d021d7d41c9025c20b", 0xe5, 0x3}, {&(0x7f00000003c0)="792eb6eec33e561f18dc4b58b6a6fb3c7e6fd5e612c08490216ae02617f9811945929cffbf59727393a9a69d57b00a5cd08da3888884b8361d6a4003a54480c1086a5fc876582ff049ede86e2f58d80c7b6cf618e1ba36d4710887bc34ef2b7abbc686df2185f99998060bf492b84e3a02077e2aaf014e1186fde602d2b639d467f48fc2e18cf1553e07ac39040953566ab1d21aac627b166825375377bc3332b62160ea8bf7fc3196b30965dce6181bf7a1c60d0270f24ba60e633c8c88bbdefb5928dc8183c2ce0616de6c3185a4aa7eb2ec6ab7d8394a9536bf7e4f33f76294b0b4a390aca576177671191fe91530e9bd0db79cee", 0xf6, 0x100000000}, {&(0x7f00000004c0)="a90f49b744c1ad7c27bc0a3b1965ca2bce6602b5f5a8b294ced925862d0a9df5c88e43095ba5810ba49c2216e7e1a9b5f07075e6a3101e853557713e983b2f46cf599dc2cba6254802d01794cdc015e28e2b5aa8c10293a4487b3fe2469252f2c2406327b2a5fe71b185ec0adfdc824a237f94", 0x73, 0x7}], 0x21008, &(0x7f0000000900)={[{'.log\x00'}, {'-%('}, {'.log\x00'}], [{@obj_user={'obj_user'}}, {@appraise_type='appraise_type=imasig'}, {@fowner_eq={'fowner', 0x3d, 0xee01}}, {@hash='hash'}, {@subj_type={'subj_type', 0x3d, '-&'}}]}) ioctl$BTRFS_IOC_SUBVOL_SETFLAGS(r4, 0x4008941a, &(0x7f0000000980)=0xfe33b054cbbc4d79) [ 528.692210][T25955] loop5: detected capacity change from 264192 to 0 [ 528.803393][T25960] loop0: detected capacity change from 264192 to 0 [ 528.928889][ T35] kauditd_printk_skb: 23 callbacks suppressed [ 528.928901][ T35] audit: type=1804 audit(1612178663.004:1940): pid=25936 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.4" name="/root/syzkaller-testdir068764309/syzkaller.I2gCPs/412/file1" dev="sda1" ino=15795 res=1 errno=0 [ 529.163811][ T35] audit: type=1804 audit(1612178663.234:1941): pid=25943 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.1" name="/root/syzkaller-testdir551554057/syzkaller.l2Zg4z/372/file1" dev="sda1" ino=15852 res=1 errno=0 11:24:23 executing program 4: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x7f, 0x80000000008001}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x9}, 0x0) r1 = open(&(0x7f0000000240)='./file1\x00', 0x141142, 0x0) write$UHID_INPUT(r1, &(0x7f0000001440), 0xfffffc41) open(&(0x7f00000001c0)='./file1\x00', 0x0, 0xa000000) setxattr$trusted_overlay_nlink(&(0x7f0000000000)='./file1\x00', &(0x7f00000000c0)='trusted.overlay.nlink\x00', 0x0, 0x0, 0x0) 11:24:23 executing program 0: r0 = perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x5c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write$binfmt_elf64(r0, &(0x7f0000000540)=ANY=[@ANYBLOB], 0x2c4) r1 = inotify_init() openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) epoll_ctl$EPOLL_CTL_DEL(0xffffffffffffffff, 0x2, 0xffffffffffffffff) inotify_add_watch(r1, 0x0, 0x400017e) r2 = openat$incfs(0xffffffffffffffff, &(0x7f0000000080)='.log\x00', 0x20200, 0x40) fcntl$getownex(r2, 0x10, &(0x7f00000000c0)) r3 = open(&(0x7f0000000040)='./file0\x00', 0x200c2, 0x0) write$binfmt_elf64(r3, &(0x7f0000000080)=ANY=[], 0x8) sendfile(r3, r3, &(0x7f00000001c0), 0xa198) dup(0xffffffffffffffff) r4 = syz_mount_image$gfs2meta(&(0x7f0000000140)='gfs2meta\x00', &(0x7f0000000200)='./file0\x00', 0x1000, 0x4, &(0x7f0000000880)=[{&(0x7f0000000240)="77ba0daae1b2e74ecd52c59a85bf6f4b1f0b01ab07ba92bc6e57305406115f2bc3e4dd94f19ed896c4fccd34271e9dc3499af9298dbc709e0e6a513d61391d4b198af5f55d24239ae934e8babb8d1cb67bb17b0158", 0x55, 0x3}, {&(0x7f00000002c0)="ae227f954d229f666a6cd22938585e852071e55aa5728addcd315922bf32282e077bdbc63cd5ec89626ee2f8e7982ca239eaa758231056cdca22ca27428407f6c64c384665cfbd00ee6e0d7609f2c7ba0f28b4af70d0307ef78decfe42973915cd509de7c19ea0f3f5c3caaab05f9af08e2cc82d2c14b919dd045e3d36ce1c5d0ff23aed0a4a6ef508b5e71df0a25250d47f1e033ed503b6df99c189111b75b59df679cb75240b756cafecfd203568eeb2c1708fe9f11a2cb0f288590ec76cefbde09c90e9d568492aa5f41196397b70c869838c7164f2bad8eff017d021d7d41c9025c20b", 0xe5, 0x3}, {&(0x7f00000003c0)="792eb6eec33e561f18dc4b58b6a6fb3c7e6fd5e612c08490216ae02617f9811945929cffbf59727393a9a69d57b00a5cd08da3888884b8361d6a4003a54480c1086a5fc876582ff049ede86e2f58d80c7b6cf618e1ba36d4710887bc34ef2b7abbc686df2185f99998060bf492b84e3a02077e2aaf014e1186fde602d2b639d467f48fc2e18cf1553e07ac39040953566ab1d21aac627b166825375377bc3332b62160ea8bf7fc3196b30965dce6181bf7a1c60d0270f24ba60e633c8c88bbdefb5928dc8183c2ce0616de6c3185a4aa7eb2ec6ab7d8394a9536bf7e4f33f76294b0b4a390aca576177671191fe91530e9bd0db79cee", 0xf6, 0x100000000}, {&(0x7f00000004c0)="a90f49b744c1ad7c27bc0a3b1965ca2bce6602b5f5a8b294ced925862d0a9df5c88e43095ba5810ba49c2216e7e1a9b5f07075e6a3101e853557713e983b2f46cf599dc2cba6254802d01794cdc015e28e2b5aa8c10293a4487b3fe2469252f2c2406327b2a5fe71b185ec0adfdc824a237f94", 0x73, 0x7}], 0x21008, &(0x7f0000000900)={[{'.log\x00'}, {'-%('}, {'.log\x00'}], [{@obj_user={'obj_user'}}, {@appraise_type='appraise_type=imasig'}, {@fowner_eq={'fowner', 0x3d, 0xee01}}, {@hash='hash'}, {@subj_type={'subj_type', 0x3d, '-&'}}]}) ioctl$BTRFS_IOC_SUBVOL_SETFLAGS(r4, 0x4008941a, &(0x7f0000000980)=0xfe33b054cbbc4d79) [ 529.318402][ T35] audit: type=1804 audit(1612178663.234:1942): pid=25967 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.1" name="/root/syzkaller-testdir551554057/syzkaller.l2Zg4z/372/file1" dev="sda1" ino=15852 res=1 errno=0 11:24:23 executing program 1: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x7f, 0x80000000008001}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x9}, 0x0) r1 = open(&(0x7f0000000240)='./file1\x00', 0x141142, 0x0) write$UHID_INPUT(r1, &(0x7f0000001440), 0xfffffc41) open(&(0x7f00000001c0)='./file1\x00', 0x0, 0xd000000) setxattr$trusted_overlay_nlink(&(0x7f0000000000)='./file1\x00', &(0x7f00000000c0)='trusted.overlay.nlink\x00', 0x0, 0x0, 0x0) 11:24:23 executing program 5: write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000540)=ANY=[@ANYBLOB="7f454c4601061f000400000000000000030038000800000032000000000000004000000000000000560200000000000007000000008038000100090002000100010000000100000006000000000000000400000000000000060000000000000001040000000000000200000000000000010000000000000051e574640400000001000000000000000400000000000000050000000000000005000000000000000400000000000000ff24444700000000908bc001727fbcd44f4d3bf922995edf2fd379eb00"/486], 0x2c4) r0 = inotify_init() r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) epoll_ctl$EPOLL_CTL_DEL(0xffffffffffffffff, 0x2, r1) inotify_add_watch(r0, &(0x7f0000000000)='.\x00', 0x400017e) r2 = openat$incfs(0xffffffffffffffff, &(0x7f0000000080)='.log\x00', 0x20200, 0x40) fcntl$getownex(r2, 0x10, &(0x7f00000000c0)) r3 = open(&(0x7f0000000040)='./file0\x00', 0x200c2, 0x0) write$binfmt_elf64(r3, &(0x7f0000000080)=ANY=[], 0x8) sendfile(r3, r3, &(0x7f00000001c0), 0xa198) dup(0xffffffffffffffff) r4 = syz_mount_image$gfs2meta(&(0x7f0000000140)='gfs2meta\x00', &(0x7f0000000200)='./file0\x00', 0x1000, 0x4, &(0x7f0000000880)=[{&(0x7f0000000240)="77ba0daae1b2e74ecd52c59a85bf6f4b1f0b01ab07ba92bc6e57305406115f2bc3e4dd94f19ed896c4fccd34271e9dc3499af9298dbc709e0e6a513d61391d4b198af5f55d24239ae934e8babb8d1cb67bb17b0158", 0x55, 0x3}, {&(0x7f00000002c0)="ae227f954d229f666a6cd22938585e852071e55aa5728addcd315922bf32282e077bdbc63cd5ec89626ee2f8e7982ca239eaa758231056cdca22ca27428407f6c64c384665cfbd00ee6e0d7609f2c7ba0f28b4af70d0307ef78decfe42973915cd509de7c19ea0f3f5c3caaab05f9af08e2cc82d2c14b919dd045e3d36ce1c5d0ff23aed0a4a6ef508b5e71df0a25250d47f1e033ed503b6df99c189111b75b59df679cb75240b756cafecfd203568eeb2c1708fe9f11a2cb0f288590ec76cefbde09c90e9d568492aa5f41196397b70c869838c7164f2bad8eff017d021d7d41c9025c20b", 0xe5, 0x3}, {&(0x7f00000003c0)="792eb6eec33e561f18dc4b58b6a6fb3c7e6fd5e612c08490216ae02617f9811945929cffbf59727393a9a69d57b00a5cd08da3888884b8361d6a4003a54480c1086a5fc876582ff049ede86e2f58d80c7b6cf618e1ba36d4710887bc34ef2b7abbc686df2185f99998060bf492b84e3a02077e2aaf014e1186fde602d2b639d467f48fc2e18cf1553e07ac39040953566ab1d21aac627b166825375377bc3332b62160ea8bf7fc3196b30965dce6181bf7a1c60d0270f24ba60e633c8c88bbdefb5928dc8183c2ce0616de6c3185a4aa7eb2ec6ab7d8394a9536bf7e4f33f76294b0b4a390aca576177671191fe91530e9bd0db79cee", 0xf6, 0x100000000}, {&(0x7f00000004c0)="a90f49b744c1ad7c27bc0a3b1965ca2bce6602b5f5a8b294ced925862d0a9df5c88e43095ba5810ba49c2216e7e1a9b5f07075e6a3101e853557713e983b2f46cf599dc2cba6254802d01794cdc015e28e2b5aa8c10293a4487b3fe2469252f2c2406327b2a5fe71b185ec0adfdc824a237f94", 0x73, 0x7}], 0x21008, &(0x7f0000000900)={[{'.log\x00'}, {'-%('}, {'.log\x00'}], [{@appraise_type='appraise_type=imasig'}, {@fowner_eq={'fowner', 0x3d, 0xee01}}, {@hash='hash'}, {@subj_type={'subj_type', 0x3d, '-&'}}, {@hash='hash'}]}) ioctl$BTRFS_IOC_SUBVOL_SETFLAGS(r4, 0x4008941a, &(0x7f0000000980)=0xfe33b054cbbc4d79) 11:24:23 executing program 3: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x7f, 0x80000000008001}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x9}, 0x0) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000080)) r1 = open(&(0x7f0000000240)='./file1\x00', 0x141142, 0x0) write$UHID_INPUT(r1, &(0x7f0000001440)={0x8, {'\x004\x00'}}, 0xfffffc41) open(&(0x7f00000001c0)='./file1\x00', 0x0, 0x0) setxattr$trusted_overlay_nlink(&(0x7f0000000000)='./file1\x00', &(0x7f00000000c0)='trusted.overlay.nlink\x00', 0x0, 0x0, 0x0) [ 529.528774][ T35] audit: type=1804 audit(1612178663.264:1943): pid=25966 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor.1" name="/root/syzkaller-testdir551554057/syzkaller.l2Zg4z/372/file1" dev="sda1" ino=15852 res=1 errno=0 11:24:23 executing program 2: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x7f, 0x80000000008001}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x9}, 0x0) r1 = open(&(0x7f0000000240)='./file1\x00', 0x141142, 0x0) write$UHID_INPUT(r1, &(0x7f0000001440)={0x8, {'\x007\x00'}}, 0xfffffc41) open(&(0x7f00000001c0)='./file1\x00', 0x0, 0x0) setxattr$trusted_overlay_nlink(&(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x0, 0x0) [ 529.586506][T25978] loop0: detected capacity change from 264192 to 0 [ 529.627430][ T35] audit: type=1804 audit(1612178663.344:1944): pid=25944 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.3" name="/root/syzkaller-testdir548988167/syzkaller.gb8agU/374/file1" dev="sda1" ino=15853 res=1 errno=0 [ 529.723077][T25985] loop5: detected capacity change from 264192 to 0 [ 529.880717][ T35] audit: type=1804 audit(1612178663.344:1945): pid=25970 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor.3" name="/root/syzkaller-testdir548988167/syzkaller.gb8agU/374/file1" dev="sda1" ino=15853 res=1 errno=0 [ 530.025519][ T35] audit: type=1804 audit(1612178663.344:1946): pid=25971 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.3" name="/root/syzkaller-testdir548988167/syzkaller.gb8agU/374/file1" dev="sda1" ino=15853 res=1 errno=0 [ 530.168977][ T35] audit: type=1804 audit(1612178663.354:1947): pid=25950 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.2" name="/root/syzkaller-testdir245532710/syzkaller.d2c0aK/386/file1" dev="sda1" ino=15807 res=1 errno=0 11:24:24 executing program 0: r0 = perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x5c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write$binfmt_elf64(r0, &(0x7f0000000540)=ANY=[@ANYBLOB], 0x2c4) r1 = inotify_init() openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) epoll_ctl$EPOLL_CTL_DEL(0xffffffffffffffff, 0x2, 0xffffffffffffffff) inotify_add_watch(r1, 0x0, 0x400017e) r2 = openat$incfs(0xffffffffffffffff, &(0x7f0000000080)='.log\x00', 0x20200, 0x40) fcntl$getownex(r2, 0x10, &(0x7f00000000c0)) r3 = open(&(0x7f0000000040)='./file0\x00', 0x200c2, 0x0) write$binfmt_elf64(r3, &(0x7f0000000080)=ANY=[], 0x8) sendfile(r3, r3, &(0x7f00000001c0), 0xa198) dup(0xffffffffffffffff) r4 = syz_mount_image$gfs2meta(&(0x7f0000000140)='gfs2meta\x00', &(0x7f0000000200)='./file0\x00', 0x1000, 0x4, &(0x7f0000000880)=[{&(0x7f0000000240)="77ba0daae1b2e74ecd52c59a85bf6f4b1f0b01ab07ba92bc6e57305406115f2bc3e4dd94f19ed896c4fccd34271e9dc3499af9298dbc709e0e6a513d61391d4b198af5f55d24239ae934e8babb8d1cb67bb17b0158", 0x55, 0x3}, {&(0x7f00000002c0)="ae227f954d229f666a6cd22938585e852071e55aa5728addcd315922bf32282e077bdbc63cd5ec89626ee2f8e7982ca239eaa758231056cdca22ca27428407f6c64c384665cfbd00ee6e0d7609f2c7ba0f28b4af70d0307ef78decfe42973915cd509de7c19ea0f3f5c3caaab05f9af08e2cc82d2c14b919dd045e3d36ce1c5d0ff23aed0a4a6ef508b5e71df0a25250d47f1e033ed503b6df99c189111b75b59df679cb75240b756cafecfd203568eeb2c1708fe9f11a2cb0f288590ec76cefbde09c90e9d568492aa5f41196397b70c869838c7164f2bad8eff017d021d7d41c9025c20b", 0xe5, 0x3}, {&(0x7f00000003c0)="792eb6eec33e561f18dc4b58b6a6fb3c7e6fd5e612c08490216ae02617f9811945929cffbf59727393a9a69d57b00a5cd08da3888884b8361d6a4003a54480c1086a5fc876582ff049ede86e2f58d80c7b6cf618e1ba36d4710887bc34ef2b7abbc686df2185f99998060bf492b84e3a02077e2aaf014e1186fde602d2b639d467f48fc2e18cf1553e07ac39040953566ab1d21aac627b166825375377bc3332b62160ea8bf7fc3196b30965dce6181bf7a1c60d0270f24ba60e633c8c88bbdefb5928dc8183c2ce0616de6c3185a4aa7eb2ec6ab7d8394a9536bf7e4f33f76294b0b4a390aca576177671191fe91530e9bd0db79cee", 0xf6, 0x100000000}, {&(0x7f00000004c0)="a90f49b744c1ad7c27bc0a3b1965ca2bce6602b5f5a8b294ced925862d0a9df5c88e43095ba5810ba49c2216e7e1a9b5f07075e6a3101e853557713e983b2f46cf599dc2cba6254802d01794cdc015e28e2b5aa8c10293a4487b3fe2469252f2c2406327b2a5fe71b185ec0adfdc824a237f94", 0x73, 0x7}], 0x21008, &(0x7f0000000900)={[{'.log\x00'}, {'-%('}, {'.log\x00'}], [{@obj_user={'obj_user'}}, {@appraise_type='appraise_type=imasig'}, {@fowner_eq={'fowner', 0x3d, 0xee01}}, {@hash='hash'}, {@subj_type={'subj_type', 0x3d, '-&'}}]}) ioctl$BTRFS_IOC_SUBVOL_SETFLAGS(r4, 0x4008941a, &(0x7f0000000980)=0xfe33b054cbbc4d79) [ 530.309020][ T35] audit: type=1804 audit(1612178663.354:1948): pid=25972 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.2" name="/root/syzkaller-testdir245532710/syzkaller.d2c0aK/386/file1" dev="sda1" ino=15807 res=1 errno=0 11:24:24 executing program 5: write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000540)=ANY=[@ANYBLOB="7f454c4601061f000400000000000000030038000800000032000000000000004000000000000000560200000000000007000000008038000100090002000100010000000100000006000000000000000400000000000000060000000000000001040000000000000200000000000000010000000000000051e574640400000001000000000000000400000000000000050000000000000005000000000000000400000000000000ff24444700000000908bc001727fbcd44f4d3bf922995edf2fd379eb00"/486], 0x2c4) r0 = inotify_init() r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) epoll_ctl$EPOLL_CTL_DEL(0xffffffffffffffff, 0x2, r1) inotify_add_watch(r0, &(0x7f0000000000)='.\x00', 0x400017e) r2 = openat$incfs(0xffffffffffffffff, &(0x7f0000000080)='.log\x00', 0x20200, 0x40) fcntl$getownex(r2, 0x10, &(0x7f00000000c0)) r3 = open(&(0x7f0000000040)='./file0\x00', 0x200c2, 0x0) write$binfmt_elf64(r3, &(0x7f0000000080)=ANY=[], 0x8) sendfile(r3, r3, &(0x7f00000001c0), 0xa198) dup(0xffffffffffffffff) r4 = syz_mount_image$gfs2meta(&(0x7f0000000140)='gfs2meta\x00', &(0x7f0000000200)='./file0\x00', 0x1000, 0x4, &(0x7f0000000880)=[{&(0x7f0000000240)="77ba0daae1b2e74ecd52c59a85bf6f4b1f0b01ab07ba92bc6e57305406115f2bc3e4dd94f19ed896c4fccd34271e9dc3499af9298dbc709e0e6a513d61391d4b198af5f55d24239ae934e8babb8d1cb67bb17b0158", 0x55, 0x3}, {&(0x7f00000002c0)="ae227f954d229f666a6cd22938585e852071e55aa5728addcd315922bf32282e077bdbc63cd5ec89626ee2f8e7982ca239eaa758231056cdca22ca27428407f6c64c384665cfbd00ee6e0d7609f2c7ba0f28b4af70d0307ef78decfe42973915cd509de7c19ea0f3f5c3caaab05f9af08e2cc82d2c14b919dd045e3d36ce1c5d0ff23aed0a4a6ef508b5e71df0a25250d47f1e033ed503b6df99c189111b75b59df679cb75240b756cafecfd203568eeb2c1708fe9f11a2cb0f288590ec76cefbde09c90e9d568492aa5f41196397b70c869838c7164f2bad8eff017d021d7d41c9025c20b", 0xe5, 0x3}, {&(0x7f00000003c0)="792eb6eec33e561f18dc4b58b6a6fb3c7e6fd5e612c08490216ae02617f9811945929cffbf59727393a9a69d57b00a5cd08da3888884b8361d6a4003a54480c1086a5fc876582ff049ede86e2f58d80c7b6cf618e1ba36d4710887bc34ef2b7abbc686df2185f99998060bf492b84e3a02077e2aaf014e1186fde602d2b639d467f48fc2e18cf1553e07ac39040953566ab1d21aac627b166825375377bc3332b62160ea8bf7fc3196b30965dce6181bf7a1c60d0270f24ba60e633c8c88bbdefb5928dc8183c2ce0616de6c3185a4aa7eb2ec6ab7d8394a9536bf7e4f33f76294b0b4a390aca576177671191fe91530e9bd0db79cee", 0xf6, 0x100000000}, {&(0x7f00000004c0)="a90f49b744c1ad7c27bc0a3b1965ca2bce6602b5f5a8b294ced925862d0a9df5c88e43095ba5810ba49c2216e7e1a9b5f07075e6a3101e853557713e983b2f46cf599dc2cba6254802d01794cdc015e28e2b5aa8c10293a4487b3fe2469252f2c2406327b2a5fe71b185ec0adfdc824a237f94", 0x73, 0x7}], 0x21008, &(0x7f0000000900)={[{'.log\x00'}, {'-%('}, {'.log\x00'}], [{@appraise_type='appraise_type=imasig'}, {@fowner_eq={'fowner', 0x3d, 0xee01}}, {@hash='hash'}, {@subj_type={'subj_type', 0x3d, '-&'}}, {@hash='hash'}]}) ioctl$BTRFS_IOC_SUBVOL_SETFLAGS(r4, 0x4008941a, &(0x7f0000000980)=0xfe33b054cbbc4d79) [ 530.489639][ T35] audit: type=1804 audit(1612178663.354:1949): pid=25951 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor.2" name="/root/syzkaller-testdir245532710/syzkaller.d2c0aK/386/file1" dev="sda1" ino=15807 res=1 errno=0 [ 530.548491][T26013] loop0: detected capacity change from 264192 to 0 11:24:24 executing program 2: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x7f, 0x80000000008001}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x9}, 0x0) r1 = open(&(0x7f0000000240)='./file1\x00', 0x141142, 0x0) write$UHID_INPUT(r1, &(0x7f0000001440)={0x8, {'\x008\x00'}}, 0xfffffc41) open(&(0x7f00000001c0)='./file1\x00', 0x0, 0x0) setxattr$trusted_overlay_nlink(&(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x0, 0x0) [ 530.685886][T26019] loop5: detected capacity change from 264192 to 0 11:24:24 executing program 4: write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000540)=ANY=[@ANYBLOB="7f454c4601061f000400000000000000030038000800000032000000000000004000000000000000560200000000000007000000008038000100090002000100010000000100000006000000000000000400000000000000060000000000000001040000000000000200000000000000010000000000000051e574640400000001000000000000000400000000000000050000000000000005000000000000000400000000000000ff24444700000000908bc001727fbcd44f4d3bf922995edf2fd379eb00"/489], 0x2c4) r0 = inotify_init() r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) epoll_ctl$EPOLL_CTL_DEL(0xffffffffffffffff, 0x2, r1) inotify_add_watch(r0, &(0x7f0000000000)='.\x00', 0x400017e) r2 = openat$incfs(0xffffffffffffffff, &(0x7f0000000080)='.log\x00', 0x20200, 0x40) fcntl$getownex(r2, 0x10, &(0x7f00000000c0)) r3 = open(&(0x7f0000000040)='./file0\x00', 0x200c2, 0x0) write$binfmt_elf64(r3, &(0x7f0000000080)=ANY=[], 0x8) sendfile(r3, r3, &(0x7f00000001c0), 0xa198) dup(0xffffffffffffffff) r4 = syz_mount_image$gfs2meta(&(0x7f0000000140)='gfs2meta\x00', &(0x7f0000000200)='./file0\x00', 0x1000, 0x4, &(0x7f0000000880)=[{&(0x7f0000000240)="77ba0daae1b2e74ecd52c59a85bf6f4b1f0b01ab07ba92bc6e57305406115f2bc3e4dd94f19ed896c4fccd34271e9dc3499af9298dbc709e0e6a513d61391d4b198af5f55d24239ae934e8babb8d1cb67bb17b0158", 0x55, 0x3}, {&(0x7f00000002c0)="ae227f954d229f666a6cd22938585e852071e55aa5728addcd315922bf32282e077bdbc63cd5ec89626ee2f8e7982ca239eaa758231056cdca22ca27428407f6c64c384665cfbd00ee6e0d7609f2c7ba0f28b4af70d0307ef78decfe42973915cd509de7c19ea0f3f5c3caaab05f9af08e2cc82d2c14b919dd045e3d36ce1c5d0ff23aed0a4a6ef508b5e71df0a25250d47f1e033ed503b6df99c189111b75b59df679cb75240b756cafecfd203568eeb2c1708fe9f11a2cb0f288590ec76cefbde09c90e9d568492aa5f41196397b70c869838c7164f2bad8eff017d021d7d41c9025c20b", 0xe5, 0x3}, {&(0x7f00000003c0)="792eb6eec33e561f18dc4b58b6a6fb3c7e6fd5e612c08490216ae02617f9811945929cffbf59727393a9a69d57b00a5cd08da3888884b8361d6a4003a54480c1086a5fc876582ff049ede86e2f58d80c7b6cf618e1ba36d4710887bc34ef2b7abbc686df2185f99998060bf492b84e3a02077e2aaf014e1186fde602d2b639d467f48fc2e18cf1553e07ac39040953566ab1d21aac627b166825375377bc3332b62160ea8bf7fc3196b30965dce6181bf7a1c60d0270f24ba60e633c8c88bbdefb5928dc8183c2ce0616de6c3185a4aa7eb2ec6ab7d8394a9536bf7e4f33f76294b0b4a390aca576177671191fe91530e9bd0db79cee", 0xf6, 0x100000000}, {&(0x7f00000004c0)="a90f49b744c1ad7c27bc0a3b1965ca2bce6602b5f5a8b294ced925862d0a9df5c88e43095ba5810ba49c2216e7e1a9b5f07075e6a3101e853557713e983b2f46cf599dc2cba6254802d01794cdc015e28e2b5aa8c10293a4487b3fe2469252f2c2406327b2a5fe71b185ec0adfdc824a237f94", 0x73, 0x7}], 0x21008, &(0x7f0000000900)={[{'.log\x00'}, {'-%('}, {'.log\x00'}], [{@appraise_type='appraise_type=imasig'}, {@fowner_eq={'fowner', 0x3d, 0xee01}}, {@hash='hash'}, {@subj_type={'subj_type', 0x3d, '-&'}}, {@hash='hash'}]}) ioctl$BTRFS_IOC_SUBVOL_SETFLAGS(r4, 0x4008941a, &(0x7f0000000980)=0xfe33b054cbbc4d79) 11:24:24 executing program 1: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x7f, 0x80000000008001}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x9}, 0x0) r1 = open(&(0x7f0000000240)='./file1\x00', 0x141142, 0x0) write$UHID_INPUT(r1, &(0x7f0000001440), 0xfffffc41) open(&(0x7f00000001c0)='./file1\x00', 0x0, 0xe000000) setxattr$trusted_overlay_nlink(&(0x7f0000000000)='./file1\x00', &(0x7f00000000c0)='trusted.overlay.nlink\x00', 0x0, 0x0, 0x0) 11:24:25 executing program 3: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x7f, 0x80000000008001}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x9}, 0x0) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000080)) r1 = open(&(0x7f0000000240)='./file1\x00', 0x141142, 0x0) write$UHID_INPUT(r1, &(0x7f0000001440)={0x8, {'\x005\x00'}}, 0xfffffc41) open(&(0x7f00000001c0)='./file1\x00', 0x0, 0x0) setxattr$trusted_overlay_nlink(&(0x7f0000000000)='./file1\x00', &(0x7f00000000c0)='trusted.overlay.nlink\x00', 0x0, 0x0, 0x0) [ 531.039193][T26036] loop4: detected capacity change from 264192 to 0 11:24:25 executing program 0: r0 = perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x5c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write$binfmt_elf64(r0, &(0x7f0000000540)=ANY=[@ANYBLOB], 0x2c4) r1 = inotify_init() openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) epoll_ctl$EPOLL_CTL_DEL(0xffffffffffffffff, 0x2, 0xffffffffffffffff) inotify_add_watch(r1, &(0x7f0000000000)='.\x00', 0x0) r2 = openat$incfs(0xffffffffffffffff, &(0x7f0000000080)='.log\x00', 0x20200, 0x40) fcntl$getownex(r2, 0x10, &(0x7f00000000c0)) r3 = open(&(0x7f0000000040)='./file0\x00', 0x200c2, 0x0) write$binfmt_elf64(r3, &(0x7f0000000080)=ANY=[], 0x8) sendfile(r3, r3, &(0x7f00000001c0), 0xa198) dup(0xffffffffffffffff) r4 = syz_mount_image$gfs2meta(&(0x7f0000000140)='gfs2meta\x00', &(0x7f0000000200)='./file0\x00', 0x1000, 0x4, &(0x7f0000000880)=[{&(0x7f0000000240)="77ba0daae1b2e74ecd52c59a85bf6f4b1f0b01ab07ba92bc6e57305406115f2bc3e4dd94f19ed896c4fccd34271e9dc3499af9298dbc709e0e6a513d61391d4b198af5f55d24239ae934e8babb8d1cb67bb17b0158", 0x55, 0x3}, {&(0x7f00000002c0)="ae227f954d229f666a6cd22938585e852071e55aa5728addcd315922bf32282e077bdbc63cd5ec89626ee2f8e7982ca239eaa758231056cdca22ca27428407f6c64c384665cfbd00ee6e0d7609f2c7ba0f28b4af70d0307ef78decfe42973915cd509de7c19ea0f3f5c3caaab05f9af08e2cc82d2c14b919dd045e3d36ce1c5d0ff23aed0a4a6ef508b5e71df0a25250d47f1e033ed503b6df99c189111b75b59df679cb75240b756cafecfd203568eeb2c1708fe9f11a2cb0f288590ec76cefbde09c90e9d568492aa5f41196397b70c869838c7164f2bad8eff017d021d7d41c9025c20b", 0xe5, 0x3}, {&(0x7f00000003c0)="792eb6eec33e561f18dc4b58b6a6fb3c7e6fd5e612c08490216ae02617f9811945929cffbf59727393a9a69d57b00a5cd08da3888884b8361d6a4003a54480c1086a5fc876582ff049ede86e2f58d80c7b6cf618e1ba36d4710887bc34ef2b7abbc686df2185f99998060bf492b84e3a02077e2aaf014e1186fde602d2b639d467f48fc2e18cf1553e07ac39040953566ab1d21aac627b166825375377bc3332b62160ea8bf7fc3196b30965dce6181bf7a1c60d0270f24ba60e633c8c88bbdefb5928dc8183c2ce0616de6c3185a4aa7eb2ec6ab7d8394a9536bf7e4f33f76294b0b4a390aca576177671191fe91530e9bd0db79cee", 0xf6, 0x100000000}, {&(0x7f00000004c0)="a90f49b744c1ad7c27bc0a3b1965ca2bce6602b5f5a8b294ced925862d0a9df5c88e43095ba5810ba49c2216e7e1a9b5f07075e6a3101e853557713e983b2f46cf599dc2cba6254802d01794cdc015e28e2b5aa8c10293a4487b3fe2469252f2c2406327b2a5fe71b185ec0adfdc824a237f94", 0x73, 0x7}], 0x21008, &(0x7f0000000900)={[{'.log\x00'}, {'-%('}, {'.log\x00'}], [{@obj_user={'obj_user'}}, {@appraise_type='appraise_type=imasig'}, {@fowner_eq={'fowner', 0x3d, 0xee01}}, {@hash='hash'}, {@subj_type={'subj_type', 0x3d, '-&'}}]}) ioctl$BTRFS_IOC_SUBVOL_SETFLAGS(r4, 0x4008941a, &(0x7f0000000980)=0xfe33b054cbbc4d79) 11:24:25 executing program 5: write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000540)=ANY=[@ANYBLOB="7f454c4601061f000400000000000000030038000800000032000000000000004000000000000000560200000000000007000000008038000100090002000100010000000100000006000000000000000400000000000000060000000000000001040000000000000200000000000000010000000000000051e574640400000001000000000000000400000000000000050000000000000005000000000000000400000000000000ff24444700000000908bc001727fbcd44f4d3bf922995edf2fd379eb00"/486], 0x2c4) r0 = inotify_init() r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) epoll_ctl$EPOLL_CTL_DEL(0xffffffffffffffff, 0x2, r1) inotify_add_watch(r0, &(0x7f0000000000)='.\x00', 0x400017e) r2 = openat$incfs(0xffffffffffffffff, &(0x7f0000000080)='.log\x00', 0x20200, 0x40) fcntl$getownex(r2, 0x10, &(0x7f00000000c0)) r3 = open(&(0x7f0000000040)='./file0\x00', 0x200c2, 0x0) write$binfmt_elf64(r3, &(0x7f0000000080)=ANY=[], 0x8) sendfile(r3, r3, &(0x7f00000001c0), 0xa198) dup(0xffffffffffffffff) r4 = syz_mount_image$gfs2meta(&(0x7f0000000140)='gfs2meta\x00', &(0x7f0000000200)='./file0\x00', 0x1000, 0x4, &(0x7f0000000880)=[{&(0x7f0000000240)="77ba0daae1b2e74ecd52c59a85bf6f4b1f0b01ab07ba92bc6e57305406115f2bc3e4dd94f19ed896c4fccd34271e9dc3499af9298dbc709e0e6a513d61391d4b198af5f55d24239ae934e8babb8d1cb67bb17b0158", 0x55, 0x3}, {&(0x7f00000002c0)="ae227f954d229f666a6cd22938585e852071e55aa5728addcd315922bf32282e077bdbc63cd5ec89626ee2f8e7982ca239eaa758231056cdca22ca27428407f6c64c384665cfbd00ee6e0d7609f2c7ba0f28b4af70d0307ef78decfe42973915cd509de7c19ea0f3f5c3caaab05f9af08e2cc82d2c14b919dd045e3d36ce1c5d0ff23aed0a4a6ef508b5e71df0a25250d47f1e033ed503b6df99c189111b75b59df679cb75240b756cafecfd203568eeb2c1708fe9f11a2cb0f288590ec76cefbde09c90e9d568492aa5f41196397b70c869838c7164f2bad8eff017d021d7d41c9025c20b", 0xe5, 0x3}, {&(0x7f00000003c0)="792eb6eec33e561f18dc4b58b6a6fb3c7e6fd5e612c08490216ae02617f9811945929cffbf59727393a9a69d57b00a5cd08da3888884b8361d6a4003a54480c1086a5fc876582ff049ede86e2f58d80c7b6cf618e1ba36d4710887bc34ef2b7abbc686df2185f99998060bf492b84e3a02077e2aaf014e1186fde602d2b639d467f48fc2e18cf1553e07ac39040953566ab1d21aac627b166825375377bc3332b62160ea8bf7fc3196b30965dce6181bf7a1c60d0270f24ba60e633c8c88bbdefb5928dc8183c2ce0616de6c3185a4aa7eb2ec6ab7d8394a9536bf7e4f33f76294b0b4a390aca576177671191fe91530e9bd0db79cee", 0xf6, 0x100000000}, {&(0x7f00000004c0)="a90f49b744c1ad7c27bc0a3b1965ca2bce6602b5f5a8b294ced925862d0a9df5c88e43095ba5810ba49c2216e7e1a9b5f07075e6a3101e853557713e983b2f46cf599dc2cba6254802d01794cdc015e28e2b5aa8c10293a4487b3fe2469252f2c2406327b2a5fe71b185ec0adfdc824a237f94", 0x73, 0x7}], 0x21008, &(0x7f0000000900)={[{'.log\x00'}, {'-%('}, {'.log\x00'}], [{@appraise_type='appraise_type=imasig'}, {@fowner_eq={'fowner', 0x3d, 0xee01}}, {@hash='hash'}, {@subj_type={'subj_type', 0x3d, '-&'}}, {@hash='hash'}]}) ioctl$BTRFS_IOC_SUBVOL_SETFLAGS(r4, 0x4008941a, &(0x7f0000000980)=0xfe33b054cbbc4d79) [ 531.450641][T26055] loop0: detected capacity change from 264192 to 0 [ 531.519926][T26058] loop5: detected capacity change from 264192 to 0 11:24:26 executing program 2: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x7f, 0x80000000008001}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x9}, 0x0) r1 = open(&(0x7f0000000240)='./file1\x00', 0x141142, 0x0) write$UHID_INPUT(r1, &(0x7f0000001440)={0x8, {'\x009\x00'}}, 0xfffffc41) open(&(0x7f00000001c0)='./file1\x00', 0x0, 0x0) setxattr$trusted_overlay_nlink(&(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x0, 0x0) 11:24:26 executing program 4: write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000540)=ANY=[@ANYBLOB="7f454c4601061f000400000000000000030038000800000032000000000000004000000000000000560200000000000007000000008038000100090002000100010000000100000006000000000000000400000000000000060000000000000001040000000000000200000000000000010000000000000051e574640400000001000000000000000400000000000000050000000000000005000000000000000400000000000000ff24444700000000908bc001727fbcd44f4d3bf922995edf2fd379eb00"/486], 0x2c4) r0 = inotify_init() r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) epoll_ctl$EPOLL_CTL_DEL(0xffffffffffffffff, 0x2, r1) inotify_add_watch(r0, &(0x7f0000000000)='.\x00', 0x400017e) r2 = openat$incfs(0xffffffffffffffff, &(0x7f0000000080)='.log\x00', 0x20200, 0x40) fcntl$getownex(r2, 0x10, &(0x7f00000000c0)) r3 = open(&(0x7f0000000040)='./file0\x00', 0x200c2, 0x0) write$binfmt_elf64(r3, &(0x7f0000000080)=ANY=[], 0x8) sendfile(r3, r3, &(0x7f00000001c0), 0xa198) dup(0xffffffffffffffff) r4 = syz_mount_image$gfs2meta(&(0x7f0000000140)='gfs2meta\x00', &(0x7f0000000200)='./file0\x00', 0x1000, 0x4, &(0x7f0000000880)=[{&(0x7f0000000240)="77ba0daae1b2e74ecd52c59a85bf6f4b1f0b01ab07ba92bc6e57305406115f2bc3e4dd94f19ed896c4fccd34271e9dc3499af9298dbc709e0e6a513d61391d4b198af5f55d24239ae934e8babb8d1cb67bb17b0158", 0x55, 0x3}, {&(0x7f00000002c0)="ae227f954d229f666a6cd22938585e852071e55aa5728addcd315922bf32282e077bdbc63cd5ec89626ee2f8e7982ca239eaa758231056cdca22ca27428407f6c64c384665cfbd00ee6e0d7609f2c7ba0f28b4af70d0307ef78decfe42973915cd509de7c19ea0f3f5c3caaab05f9af08e2cc82d2c14b919dd045e3d36ce1c5d0ff23aed0a4a6ef508b5e71df0a25250d47f1e033ed503b6df99c189111b75b59df679cb75240b756cafecfd203568eeb2c1708fe9f11a2cb0f288590ec76cefbde09c90e9d568492aa5f41196397b70c869838c7164f2bad8eff017d021d7d41c9025c20b", 0xe5, 0x3}, {&(0x7f00000003c0)="792eb6eec33e561f18dc4b58b6a6fb3c7e6fd5e612c08490216ae02617f9811945929cffbf59727393a9a69d57b00a5cd08da3888884b8361d6a4003a54480c1086a5fc876582ff049ede86e2f58d80c7b6cf618e1ba36d4710887bc34ef2b7abbc686df2185f99998060bf492b84e3a02077e2aaf014e1186fde602d2b639d467f48fc2e18cf1553e07ac39040953566ab1d21aac627b166825375377bc3332b62160ea8bf7fc3196b30965dce6181bf7a1c60d0270f24ba60e633c8c88bbdefb5928dc8183c2ce0616de6c3185a4aa7eb2ec6ab7d8394a9536bf7e4f33f76294b0b4a390aca576177671191fe91530e9bd0db79cee", 0xf6, 0x100000000}, {&(0x7f00000004c0)="a90f49b744c1ad7c27bc0a3b1965ca2bce6602b5f5a8b294ced925862d0a9df5c88e43095ba5810ba49c2216e7e1a9b5f07075e6a3101e853557713e983b2f46cf599dc2cba6254802d01794cdc015e28e2b5aa8c10293a4487b3fe2469252f2c2406327b2a5fe71b185ec0adfdc824a237f94", 0x73, 0x7}], 0x21008, &(0x7f0000000900)={[{'.log\x00'}, {'-%('}, {'.log\x00'}], [{@appraise_type='appraise_type=imasig'}, {@fowner_eq={'fowner', 0x3d, 0xee01}}, {@hash='hash'}, {@subj_type={'subj_type', 0x3d, '-&'}}, {@hash='hash'}]}) ioctl$BTRFS_IOC_SUBVOL_SETFLAGS(r4, 0x4008941a, &(0x7f0000000980)=0xfe33b054cbbc4d79) [ 532.128913][T26073] loop4: detected capacity change from 264192 to 0 11:24:26 executing program 1: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x7f, 0x80000000008001}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x9}, 0x0) r1 = open(&(0x7f0000000240)='./file1\x00', 0x141142, 0x0) write$UHID_INPUT(r1, &(0x7f0000001440), 0xfffffc41) open(&(0x7f00000001c0)='./file1\x00', 0x0, 0x10000000) setxattr$trusted_overlay_nlink(&(0x7f0000000000)='./file1\x00', &(0x7f00000000c0)='trusted.overlay.nlink\x00', 0x0, 0x0, 0x0) 11:24:26 executing program 0: r0 = perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x5c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write$binfmt_elf64(r0, &(0x7f0000000540)=ANY=[@ANYBLOB], 0x2c4) r1 = inotify_init() openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) epoll_ctl$EPOLL_CTL_DEL(0xffffffffffffffff, 0x2, 0xffffffffffffffff) inotify_add_watch(r1, &(0x7f0000000000)='.\x00', 0x0) r2 = openat$incfs(0xffffffffffffffff, &(0x7f0000000080)='.log\x00', 0x20200, 0x40) fcntl$getownex(r2, 0x10, &(0x7f00000000c0)) r3 = open(&(0x7f0000000040)='./file0\x00', 0x200c2, 0x0) write$binfmt_elf64(r3, &(0x7f0000000080)=ANY=[], 0x8) sendfile(r3, r3, &(0x7f00000001c0), 0xa198) dup(0xffffffffffffffff) r4 = syz_mount_image$gfs2meta(&(0x7f0000000140)='gfs2meta\x00', &(0x7f0000000200)='./file0\x00', 0x1000, 0x4, &(0x7f0000000880)=[{&(0x7f0000000240)="77ba0daae1b2e74ecd52c59a85bf6f4b1f0b01ab07ba92bc6e57305406115f2bc3e4dd94f19ed896c4fccd34271e9dc3499af9298dbc709e0e6a513d61391d4b198af5f55d24239ae934e8babb8d1cb67bb17b0158", 0x55, 0x3}, {&(0x7f00000002c0)="ae227f954d229f666a6cd22938585e852071e55aa5728addcd315922bf32282e077bdbc63cd5ec89626ee2f8e7982ca239eaa758231056cdca22ca27428407f6c64c384665cfbd00ee6e0d7609f2c7ba0f28b4af70d0307ef78decfe42973915cd509de7c19ea0f3f5c3caaab05f9af08e2cc82d2c14b919dd045e3d36ce1c5d0ff23aed0a4a6ef508b5e71df0a25250d47f1e033ed503b6df99c189111b75b59df679cb75240b756cafecfd203568eeb2c1708fe9f11a2cb0f288590ec76cefbde09c90e9d568492aa5f41196397b70c869838c7164f2bad8eff017d021d7d41c9025c20b", 0xe5, 0x3}, {&(0x7f00000003c0)="792eb6eec33e561f18dc4b58b6a6fb3c7e6fd5e612c08490216ae02617f9811945929cffbf59727393a9a69d57b00a5cd08da3888884b8361d6a4003a54480c1086a5fc876582ff049ede86e2f58d80c7b6cf618e1ba36d4710887bc34ef2b7abbc686df2185f99998060bf492b84e3a02077e2aaf014e1186fde602d2b639d467f48fc2e18cf1553e07ac39040953566ab1d21aac627b166825375377bc3332b62160ea8bf7fc3196b30965dce6181bf7a1c60d0270f24ba60e633c8c88bbdefb5928dc8183c2ce0616de6c3185a4aa7eb2ec6ab7d8394a9536bf7e4f33f76294b0b4a390aca576177671191fe91530e9bd0db79cee", 0xf6, 0x100000000}, {&(0x7f00000004c0)="a90f49b744c1ad7c27bc0a3b1965ca2bce6602b5f5a8b294ced925862d0a9df5c88e43095ba5810ba49c2216e7e1a9b5f07075e6a3101e853557713e983b2f46cf599dc2cba6254802d01794cdc015e28e2b5aa8c10293a4487b3fe2469252f2c2406327b2a5fe71b185ec0adfdc824a237f94", 0x73, 0x7}], 0x21008, &(0x7f0000000900)={[{'.log\x00'}, {'-%('}, {'.log\x00'}], [{@obj_user={'obj_user'}}, {@appraise_type='appraise_type=imasig'}, {@fowner_eq={'fowner', 0x3d, 0xee01}}, {@hash='hash'}, {@subj_type={'subj_type', 0x3d, '-&'}}]}) ioctl$BTRFS_IOC_SUBVOL_SETFLAGS(r4, 0x4008941a, &(0x7f0000000980)=0xfe33b054cbbc4d79) 11:24:26 executing program 3: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x7f, 0x80000000008001}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x9}, 0x0) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000080)) r1 = open(&(0x7f0000000240)='./file1\x00', 0x141142, 0x0) write$UHID_INPUT(r1, &(0x7f0000001440)={0x8, {'\x006\x00'}}, 0xfffffc41) open(&(0x7f00000001c0)='./file1\x00', 0x0, 0x0) setxattr$trusted_overlay_nlink(&(0x7f0000000000)='./file1\x00', &(0x7f00000000c0)='trusted.overlay.nlink\x00', 0x0, 0x0, 0x0) 11:24:26 executing program 5: write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000540)=ANY=[@ANYBLOB="7f454c4601061f000400000000000000030038000800000032000000000000004000000000000000560200000000000007000000008038000100090002000100010000000100000006000000000000000400000000000000060000000000000001040000000000000200000000000000010000000000000051e574640400000001000000000000000400000000000000050000000000000005000000000000000400000000000000ff24444700000000908bc001727fbcd44f4d3bf922995edf2fd379eb00"/488], 0x2c4) r0 = inotify_init() r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) epoll_ctl$EPOLL_CTL_DEL(0xffffffffffffffff, 0x2, r1) inotify_add_watch(r0, &(0x7f0000000000)='.\x00', 0x400017e) r2 = openat$incfs(0xffffffffffffffff, &(0x7f0000000080)='.log\x00', 0x20200, 0x40) fcntl$getownex(r2, 0x10, &(0x7f00000000c0)) r3 = open(&(0x7f0000000040)='./file0\x00', 0x200c2, 0x0) write$binfmt_elf64(r3, &(0x7f0000000080)=ANY=[], 0x8) sendfile(r3, r3, &(0x7f00000001c0), 0xa198) dup(0xffffffffffffffff) r4 = syz_mount_image$gfs2meta(&(0x7f0000000140)='gfs2meta\x00', &(0x7f0000000200)='./file0\x00', 0x1000, 0x4, &(0x7f0000000880)=[{&(0x7f0000000240)="77ba0daae1b2e74ecd52c59a85bf6f4b1f0b01ab07ba92bc6e57305406115f2bc3e4dd94f19ed896c4fccd34271e9dc3499af9298dbc709e0e6a513d61391d4b198af5f55d24239ae934e8babb8d1cb67bb17b0158", 0x55, 0x3}, {&(0x7f00000002c0)="ae227f954d229f666a6cd22938585e852071e55aa5728addcd315922bf32282e077bdbc63cd5ec89626ee2f8e7982ca239eaa758231056cdca22ca27428407f6c64c384665cfbd00ee6e0d7609f2c7ba0f28b4af70d0307ef78decfe42973915cd509de7c19ea0f3f5c3caaab05f9af08e2cc82d2c14b919dd045e3d36ce1c5d0ff23aed0a4a6ef508b5e71df0a25250d47f1e033ed503b6df99c189111b75b59df679cb75240b756cafecfd203568eeb2c1708fe9f11a2cb0f288590ec76cefbde09c90e9d568492aa5f41196397b70c869838c7164f2bad8eff017d021d7d41c9025c20b", 0xe5, 0x3}, {&(0x7f00000003c0)="792eb6eec33e561f18dc4b58b6a6fb3c7e6fd5e612c08490216ae02617f9811945929cffbf59727393a9a69d57b00a5cd08da3888884b8361d6a4003a54480c1086a5fc876582ff049ede86e2f58d80c7b6cf618e1ba36d4710887bc34ef2b7abbc686df2185f99998060bf492b84e3a02077e2aaf014e1186fde602d2b639d467f48fc2e18cf1553e07ac39040953566ab1d21aac627b166825375377bc3332b62160ea8bf7fc3196b30965dce6181bf7a1c60d0270f24ba60e633c8c88bbdefb5928dc8183c2ce0616de6c3185a4aa7eb2ec6ab7d8394a9536bf7e4f33f76294b0b4a390aca576177671191fe91530e9bd0db79cee", 0xf6, 0x100000000}, {&(0x7f00000004c0)="a90f49b744c1ad7c27bc0a3b1965ca2bce6602b5f5a8b294ced925862d0a9df5c88e43095ba5810ba49c2216e7e1a9b5f07075e6a3101e853557713e983b2f46cf599dc2cba6254802d01794cdc015e28e2b5aa8c10293a4487b3fe2469252f2c2406327b2a5fe71b185ec0adfdc824a237f94", 0x73, 0x7}], 0x21008, &(0x7f0000000900)={[{'.log\x00'}, {'-%('}, {'.log\x00'}], [{@appraise_type='appraise_type=imasig'}, {@fowner_eq={'fowner', 0x3d, 0xee01}}, {@hash='hash'}, {@subj_type={'subj_type', 0x3d, '-&'}}, {@hash='hash'}]}) ioctl$BTRFS_IOC_SUBVOL_SETFLAGS(r4, 0x4008941a, &(0x7f0000000980)=0xfe33b054cbbc4d79) [ 532.396615][T26089] loop0: detected capacity change from 264192 to 0 [ 532.470969][T26096] loop5: detected capacity change from 264192 to 0 11:24:26 executing program 0: r0 = perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x5c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write$binfmt_elf64(r0, &(0x7f0000000540)=ANY=[@ANYBLOB], 0x2c4) r1 = inotify_init() openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) epoll_ctl$EPOLL_CTL_DEL(0xffffffffffffffff, 0x2, 0xffffffffffffffff) inotify_add_watch(r1, &(0x7f0000000000)='.\x00', 0x0) r2 = openat$incfs(0xffffffffffffffff, &(0x7f0000000080)='.log\x00', 0x20200, 0x40) fcntl$getownex(r2, 0x10, &(0x7f00000000c0)) r3 = open(&(0x7f0000000040)='./file0\x00', 0x200c2, 0x0) write$binfmt_elf64(r3, &(0x7f0000000080)=ANY=[], 0x8) sendfile(r3, r3, &(0x7f00000001c0), 0xa198) dup(0xffffffffffffffff) r4 = syz_mount_image$gfs2meta(&(0x7f0000000140)='gfs2meta\x00', &(0x7f0000000200)='./file0\x00', 0x1000, 0x4, &(0x7f0000000880)=[{&(0x7f0000000240)="77ba0daae1b2e74ecd52c59a85bf6f4b1f0b01ab07ba92bc6e57305406115f2bc3e4dd94f19ed896c4fccd34271e9dc3499af9298dbc709e0e6a513d61391d4b198af5f55d24239ae934e8babb8d1cb67bb17b0158", 0x55, 0x3}, {&(0x7f00000002c0)="ae227f954d229f666a6cd22938585e852071e55aa5728addcd315922bf32282e077bdbc63cd5ec89626ee2f8e7982ca239eaa758231056cdca22ca27428407f6c64c384665cfbd00ee6e0d7609f2c7ba0f28b4af70d0307ef78decfe42973915cd509de7c19ea0f3f5c3caaab05f9af08e2cc82d2c14b919dd045e3d36ce1c5d0ff23aed0a4a6ef508b5e71df0a25250d47f1e033ed503b6df99c189111b75b59df679cb75240b756cafecfd203568eeb2c1708fe9f11a2cb0f288590ec76cefbde09c90e9d568492aa5f41196397b70c869838c7164f2bad8eff017d021d7d41c9025c20b", 0xe5, 0x3}, {&(0x7f00000003c0)="792eb6eec33e561f18dc4b58b6a6fb3c7e6fd5e612c08490216ae02617f9811945929cffbf59727393a9a69d57b00a5cd08da3888884b8361d6a4003a54480c1086a5fc876582ff049ede86e2f58d80c7b6cf618e1ba36d4710887bc34ef2b7abbc686df2185f99998060bf492b84e3a02077e2aaf014e1186fde602d2b639d467f48fc2e18cf1553e07ac39040953566ab1d21aac627b166825375377bc3332b62160ea8bf7fc3196b30965dce6181bf7a1c60d0270f24ba60e633c8c88bbdefb5928dc8183c2ce0616de6c3185a4aa7eb2ec6ab7d8394a9536bf7e4f33f76294b0b4a390aca576177671191fe91530e9bd0db79cee", 0xf6, 0x100000000}, {&(0x7f00000004c0)="a90f49b744c1ad7c27bc0a3b1965ca2bce6602b5f5a8b294ced925862d0a9df5c88e43095ba5810ba49c2216e7e1a9b5f07075e6a3101e853557713e983b2f46cf599dc2cba6254802d01794cdc015e28e2b5aa8c10293a4487b3fe2469252f2c2406327b2a5fe71b185ec0adfdc824a237f94", 0x73, 0x7}], 0x21008, &(0x7f0000000900)={[{'.log\x00'}, {'-%('}, {'.log\x00'}], [{@obj_user={'obj_user'}}, {@appraise_type='appraise_type=imasig'}, {@fowner_eq={'fowner', 0x3d, 0xee01}}, {@hash='hash'}, {@subj_type={'subj_type', 0x3d, '-&'}}]}) ioctl$BTRFS_IOC_SUBVOL_SETFLAGS(r4, 0x4008941a, &(0x7f0000000980)=0xfe33b054cbbc4d79) [ 532.737778][T26107] loop0: detected capacity change from 264192 to 0 11:24:27 executing program 4: write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000540)=ANY=[@ANYBLOB="7f454c4601061f000400000000000000030038000800000032000000000000004000000000000000560200000000000007000000008038000100090002000100010000000100000006000000000000000400000000000000060000000000000001040000000000000200000000000000010000000000000051e574640400000001000000000000000400000000000000050000000000000005000000000000000400000000000000ff24444700000000908bc001727fbcd44f4d3bf922995edf2fd379eb00"/486], 0x2c4) r0 = inotify_init() r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) epoll_ctl$EPOLL_CTL_DEL(0xffffffffffffffff, 0x2, r1) inotify_add_watch(r0, &(0x7f0000000000)='.\x00', 0x400017e) r2 = openat$incfs(0xffffffffffffffff, &(0x7f0000000080)='.log\x00', 0x20200, 0x40) fcntl$getownex(r2, 0x10, &(0x7f00000000c0)) r3 = open(&(0x7f0000000040)='./file0\x00', 0x200c2, 0x0) write$binfmt_elf64(r3, &(0x7f0000000080)=ANY=[], 0x8) sendfile(r3, r3, &(0x7f00000001c0), 0xa198) dup(0xffffffffffffffff) r4 = syz_mount_image$gfs2meta(&(0x7f0000000140)='gfs2meta\x00', &(0x7f0000000200)='./file0\x00', 0x1000, 0x4, &(0x7f0000000880)=[{&(0x7f0000000240)="77ba0daae1b2e74ecd52c59a85bf6f4b1f0b01ab07ba92bc6e57305406115f2bc3e4dd94f19ed896c4fccd34271e9dc3499af9298dbc709e0e6a513d61391d4b198af5f55d24239ae934e8babb8d1cb67bb17b0158", 0x55, 0x3}, {&(0x7f00000002c0)="ae227f954d229f666a6cd22938585e852071e55aa5728addcd315922bf32282e077bdbc63cd5ec89626ee2f8e7982ca239eaa758231056cdca22ca27428407f6c64c384665cfbd00ee6e0d7609f2c7ba0f28b4af70d0307ef78decfe42973915cd509de7c19ea0f3f5c3caaab05f9af08e2cc82d2c14b919dd045e3d36ce1c5d0ff23aed0a4a6ef508b5e71df0a25250d47f1e033ed503b6df99c189111b75b59df679cb75240b756cafecfd203568eeb2c1708fe9f11a2cb0f288590ec76cefbde09c90e9d568492aa5f41196397b70c869838c7164f2bad8eff017d021d7d41c9025c20b", 0xe5, 0x3}, {&(0x7f00000003c0)="792eb6eec33e561f18dc4b58b6a6fb3c7e6fd5e612c08490216ae02617f9811945929cffbf59727393a9a69d57b00a5cd08da3888884b8361d6a4003a54480c1086a5fc876582ff049ede86e2f58d80c7b6cf618e1ba36d4710887bc34ef2b7abbc686df2185f99998060bf492b84e3a02077e2aaf014e1186fde602d2b639d467f48fc2e18cf1553e07ac39040953566ab1d21aac627b166825375377bc3332b62160ea8bf7fc3196b30965dce6181bf7a1c60d0270f24ba60e633c8c88bbdefb5928dc8183c2ce0616de6c3185a4aa7eb2ec6ab7d8394a9536bf7e4f33f76294b0b4a390aca576177671191fe91530e9bd0db79cee", 0xf6, 0x100000000}, {&(0x7f00000004c0)="a90f49b744c1ad7c27bc0a3b1965ca2bce6602b5f5a8b294ced925862d0a9df5c88e43095ba5810ba49c2216e7e1a9b5f07075e6a3101e853557713e983b2f46cf599dc2cba6254802d01794cdc015e28e2b5aa8c10293a4487b3fe2469252f2c2406327b2a5fe71b185ec0adfdc824a237f94", 0x73, 0x7}], 0x21008, &(0x7f0000000900)={[{'.log\x00'}, {'-%('}, {'.log\x00'}], [{@appraise_type='appraise_type=imasig'}, {@fowner_eq={'fowner', 0x3d, 0xee01}}, {@hash='hash'}, {@subj_type={'subj_type', 0x3d, '-&'}}, {@hash='hash'}]}) ioctl$BTRFS_IOC_SUBVOL_SETFLAGS(r4, 0x4008941a, &(0x7f0000000980)=0xfe33b054cbbc4d79) [ 533.095012][T26116] loop4: detected capacity change from 264192 to 0 11:24:27 executing program 5: write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000540)=ANY=[@ANYBLOB="7f454c4601061f000400000000000000030038000800000032000000000000004000000000000000560200000000000007000000008038000100090002000100010000000100000006000000000000000400000000000000060000000000000001040000000000000200000000000000010000000000000051e574640400000001000000000000000400000000000000050000000000000005000000000000000400000000000000ff24444700000000908bc001727fbcd44f4d3bf922995edf2fd379eb00"/488], 0x2c4) r0 = inotify_init() r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) epoll_ctl$EPOLL_CTL_DEL(0xffffffffffffffff, 0x2, r1) inotify_add_watch(r0, &(0x7f0000000000)='.\x00', 0x400017e) r2 = openat$incfs(0xffffffffffffffff, &(0x7f0000000080)='.log\x00', 0x20200, 0x40) fcntl$getownex(r2, 0x10, &(0x7f00000000c0)) r3 = open(&(0x7f0000000040)='./file0\x00', 0x200c2, 0x0) write$binfmt_elf64(r3, &(0x7f0000000080)=ANY=[], 0x8) sendfile(r3, r3, &(0x7f00000001c0), 0xa198) dup(0xffffffffffffffff) r4 = syz_mount_image$gfs2meta(&(0x7f0000000140)='gfs2meta\x00', &(0x7f0000000200)='./file0\x00', 0x1000, 0x4, &(0x7f0000000880)=[{&(0x7f0000000240)="77ba0daae1b2e74ecd52c59a85bf6f4b1f0b01ab07ba92bc6e57305406115f2bc3e4dd94f19ed896c4fccd34271e9dc3499af9298dbc709e0e6a513d61391d4b198af5f55d24239ae934e8babb8d1cb67bb17b0158", 0x55, 0x3}, {&(0x7f00000002c0)="ae227f954d229f666a6cd22938585e852071e55aa5728addcd315922bf32282e077bdbc63cd5ec89626ee2f8e7982ca239eaa758231056cdca22ca27428407f6c64c384665cfbd00ee6e0d7609f2c7ba0f28b4af70d0307ef78decfe42973915cd509de7c19ea0f3f5c3caaab05f9af08e2cc82d2c14b919dd045e3d36ce1c5d0ff23aed0a4a6ef508b5e71df0a25250d47f1e033ed503b6df99c189111b75b59df679cb75240b756cafecfd203568eeb2c1708fe9f11a2cb0f288590ec76cefbde09c90e9d568492aa5f41196397b70c869838c7164f2bad8eff017d021d7d41c9025c20b", 0xe5, 0x3}, {&(0x7f00000003c0)="792eb6eec33e561f18dc4b58b6a6fb3c7e6fd5e612c08490216ae02617f9811945929cffbf59727393a9a69d57b00a5cd08da3888884b8361d6a4003a54480c1086a5fc876582ff049ede86e2f58d80c7b6cf618e1ba36d4710887bc34ef2b7abbc686df2185f99998060bf492b84e3a02077e2aaf014e1186fde602d2b639d467f48fc2e18cf1553e07ac39040953566ab1d21aac627b166825375377bc3332b62160ea8bf7fc3196b30965dce6181bf7a1c60d0270f24ba60e633c8c88bbdefb5928dc8183c2ce0616de6c3185a4aa7eb2ec6ab7d8394a9536bf7e4f33f76294b0b4a390aca576177671191fe91530e9bd0db79cee", 0xf6, 0x100000000}, {&(0x7f00000004c0)="a90f49b744c1ad7c27bc0a3b1965ca2bce6602b5f5a8b294ced925862d0a9df5c88e43095ba5810ba49c2216e7e1a9b5f07075e6a3101e853557713e983b2f46cf599dc2cba6254802d01794cdc015e28e2b5aa8c10293a4487b3fe2469252f2c2406327b2a5fe71b185ec0adfdc824a237f94", 0x73, 0x7}], 0x21008, &(0x7f0000000900)={[{'.log\x00'}, {'-%('}, {'.log\x00'}], [{@appraise_type='appraise_type=imasig'}, {@fowner_eq={'fowner', 0x3d, 0xee01}}, {@hash='hash'}, {@subj_type={'subj_type', 0x3d, '-&'}}, {@hash='hash'}]}) ioctl$BTRFS_IOC_SUBVOL_SETFLAGS(r4, 0x4008941a, &(0x7f0000000980)=0xfe33b054cbbc4d79) 11:24:27 executing program 2: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x7f, 0x80000000008001}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x9}, 0x0) r1 = open(&(0x7f0000000240)='./file1\x00', 0x141142, 0x0) write$UHID_INPUT(r1, &(0x7f0000001440)={0x8, {'\x00:\x00'}}, 0xfffffc41) open(&(0x7f00000001c0)='./file1\x00', 0x0, 0x0) setxattr$trusted_overlay_nlink(&(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x0, 0x0) 11:24:27 executing program 1: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x7f, 0x80000000008001}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x9}, 0x0) r1 = open(&(0x7f0000000240)='./file1\x00', 0x141142, 0x0) write$UHID_INPUT(r1, &(0x7f0000001440), 0xfffffc41) open(&(0x7f00000001c0)='./file1\x00', 0x0, 0x11000000) setxattr$trusted_overlay_nlink(&(0x7f0000000000)='./file1\x00', &(0x7f00000000c0)='trusted.overlay.nlink\x00', 0x0, 0x0, 0x0) [ 533.476007][T26126] loop5: detected capacity change from 264192 to 0 11:24:27 executing program 3: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x7f, 0x80000000008001}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x9}, 0x0) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000080)) r1 = open(&(0x7f0000000240)='./file1\x00', 0x141142, 0x0) write$UHID_INPUT(r1, &(0x7f0000001440)={0x8, {'\x007\x00'}}, 0xfffffc41) open(&(0x7f00000001c0)='./file1\x00', 0x0, 0x0) setxattr$trusted_overlay_nlink(&(0x7f0000000000)='./file1\x00', &(0x7f00000000c0)='trusted.overlay.nlink\x00', 0x0, 0x0, 0x0) 11:24:27 executing program 0: r0 = perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x5c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write$binfmt_elf64(r0, &(0x7f0000000540)=ANY=[@ANYBLOB], 0x2c4) r1 = inotify_init() openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) epoll_ctl$EPOLL_CTL_DEL(0xffffffffffffffff, 0x2, 0xffffffffffffffff) inotify_add_watch(r1, &(0x7f0000000000)='.\x00', 0x400017e) r2 = openat$incfs(0xffffffffffffffff, 0x0, 0x20200, 0x40) fcntl$getownex(r2, 0x10, &(0x7f00000000c0)) r3 = open(&(0x7f0000000040)='./file0\x00', 0x200c2, 0x0) write$binfmt_elf64(r3, &(0x7f0000000080)=ANY=[], 0x8) sendfile(r3, r3, &(0x7f00000001c0), 0xa198) dup(0xffffffffffffffff) r4 = syz_mount_image$gfs2meta(&(0x7f0000000140)='gfs2meta\x00', &(0x7f0000000200)='./file0\x00', 0x1000, 0x4, &(0x7f0000000880)=[{&(0x7f0000000240)="77ba0daae1b2e74ecd52c59a85bf6f4b1f0b01ab07ba92bc6e57305406115f2bc3e4dd94f19ed896c4fccd34271e9dc3499af9298dbc709e0e6a513d61391d4b198af5f55d24239ae934e8babb8d1cb67bb17b0158", 0x55, 0x3}, {&(0x7f00000002c0)="ae227f954d229f666a6cd22938585e852071e55aa5728addcd315922bf32282e077bdbc63cd5ec89626ee2f8e7982ca239eaa758231056cdca22ca27428407f6c64c384665cfbd00ee6e0d7609f2c7ba0f28b4af70d0307ef78decfe42973915cd509de7c19ea0f3f5c3caaab05f9af08e2cc82d2c14b919dd045e3d36ce1c5d0ff23aed0a4a6ef508b5e71df0a25250d47f1e033ed503b6df99c189111b75b59df679cb75240b756cafecfd203568eeb2c1708fe9f11a2cb0f288590ec76cefbde09c90e9d568492aa5f41196397b70c869838c7164f2bad8eff017d021d7d41c9025c20b", 0xe5, 0x3}, {&(0x7f00000003c0)="792eb6eec33e561f18dc4b58b6a6fb3c7e6fd5e612c08490216ae02617f9811945929cffbf59727393a9a69d57b00a5cd08da3888884b8361d6a4003a54480c1086a5fc876582ff049ede86e2f58d80c7b6cf618e1ba36d4710887bc34ef2b7abbc686df2185f99998060bf492b84e3a02077e2aaf014e1186fde602d2b639d467f48fc2e18cf1553e07ac39040953566ab1d21aac627b166825375377bc3332b62160ea8bf7fc3196b30965dce6181bf7a1c60d0270f24ba60e633c8c88bbdefb5928dc8183c2ce0616de6c3185a4aa7eb2ec6ab7d8394a9536bf7e4f33f76294b0b4a390aca576177671191fe91530e9bd0db79cee", 0xf6, 0x100000000}, {&(0x7f00000004c0)="a90f49b744c1ad7c27bc0a3b1965ca2bce6602b5f5a8b294ced925862d0a9df5c88e43095ba5810ba49c2216e7e1a9b5f07075e6a3101e853557713e983b2f46cf599dc2cba6254802d01794cdc015e28e2b5aa8c10293a4487b3fe2469252f2c2406327b2a5fe71b185ec0adfdc824a237f94", 0x73, 0x7}], 0x21008, &(0x7f0000000900)={[{'.log\x00'}, {'-%('}, {'.log\x00'}], [{@obj_user={'obj_user'}}, {@appraise_type='appraise_type=imasig'}, {@fowner_eq={'fowner', 0x3d, 0xee01}}, {@hash='hash'}, {@subj_type={'subj_type', 0x3d, '-&'}}]}) ioctl$BTRFS_IOC_SUBVOL_SETFLAGS(r4, 0x4008941a, &(0x7f0000000980)=0xfe33b054cbbc4d79) [ 533.735446][T26138] loop0: detected capacity change from 264192 to 0 11:24:28 executing program 4: write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000540)=ANY=[@ANYBLOB="7f454c4601061f000400000000000000030038000800000032000000000000004000000000000000560200000000000007000000008038000100090002000100010000000100000006000000000000000400000000000000060000000000000001040000000000000200000000000000010000000000000051e574640400000001000000000000000400000000000000050000000000000005000000000000000400000000000000ff24444700000000908bc001727fbcd44f4d3bf922995edf2fd379eb00"/486], 0x2c4) r0 = inotify_init() r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) epoll_ctl$EPOLL_CTL_DEL(0xffffffffffffffff, 0x2, r1) inotify_add_watch(r0, &(0x7f0000000000)='.\x00', 0x400017e) r2 = openat$incfs(0xffffffffffffffff, &(0x7f0000000080)='.log\x00', 0x20200, 0x40) fcntl$getownex(r2, 0x10, &(0x7f00000000c0)) r3 = open(&(0x7f0000000040)='./file0\x00', 0x200c2, 0x0) write$binfmt_elf64(r3, &(0x7f0000000080)=ANY=[], 0x8) sendfile(r3, r3, &(0x7f00000001c0), 0xa198) dup(0xffffffffffffffff) r4 = syz_mount_image$gfs2meta(&(0x7f0000000140)='gfs2meta\x00', &(0x7f0000000200)='./file0\x00', 0x1000, 0x4, &(0x7f0000000880)=[{&(0x7f0000000240)="77ba0daae1b2e74ecd52c59a85bf6f4b1f0b01ab07ba92bc6e57305406115f2bc3e4dd94f19ed896c4fccd34271e9dc3499af9298dbc709e0e6a513d61391d4b198af5f55d24239ae934e8babb8d1cb67bb17b0158", 0x55, 0x3}, {&(0x7f00000002c0)="ae227f954d229f666a6cd22938585e852071e55aa5728addcd315922bf32282e077bdbc63cd5ec89626ee2f8e7982ca239eaa758231056cdca22ca27428407f6c64c384665cfbd00ee6e0d7609f2c7ba0f28b4af70d0307ef78decfe42973915cd509de7c19ea0f3f5c3caaab05f9af08e2cc82d2c14b919dd045e3d36ce1c5d0ff23aed0a4a6ef508b5e71df0a25250d47f1e033ed503b6df99c189111b75b59df679cb75240b756cafecfd203568eeb2c1708fe9f11a2cb0f288590ec76cefbde09c90e9d568492aa5f41196397b70c869838c7164f2bad8eff017d021d7d41c9025c20b", 0xe5, 0x3}, {&(0x7f00000003c0)="792eb6eec33e561f18dc4b58b6a6fb3c7e6fd5e612c08490216ae02617f9811945929cffbf59727393a9a69d57b00a5cd08da3888884b8361d6a4003a54480c1086a5fc876582ff049ede86e2f58d80c7b6cf618e1ba36d4710887bc34ef2b7abbc686df2185f99998060bf492b84e3a02077e2aaf014e1186fde602d2b639d467f48fc2e18cf1553e07ac39040953566ab1d21aac627b166825375377bc3332b62160ea8bf7fc3196b30965dce6181bf7a1c60d0270f24ba60e633c8c88bbdefb5928dc8183c2ce0616de6c3185a4aa7eb2ec6ab7d8394a9536bf7e4f33f76294b0b4a390aca576177671191fe91530e9bd0db79cee", 0xf6, 0x100000000}, {&(0x7f00000004c0)="a90f49b744c1ad7c27bc0a3b1965ca2bce6602b5f5a8b294ced925862d0a9df5c88e43095ba5810ba49c2216e7e1a9b5f07075e6a3101e853557713e983b2f46cf599dc2cba6254802d01794cdc015e28e2b5aa8c10293a4487b3fe2469252f2c2406327b2a5fe71b185ec0adfdc824a237f94", 0x73, 0x7}], 0x21008, &(0x7f0000000900)={[{'.log\x00'}, {'-%('}, {'.log\x00'}], [{@appraise_type='appraise_type=imasig'}, {@fowner_eq={'fowner', 0x3d, 0xee01}}, {@hash='hash'}, {@subj_type={'subj_type', 0x3d, '-&'}}, {@hash='hash'}]}) ioctl$BTRFS_IOC_SUBVOL_SETFLAGS(r4, 0x4008941a, &(0x7f0000000980)=0xfe33b054cbbc4d79) [ 534.090695][T26153] loop4: detected capacity change from 264192 to 0 11:24:28 executing program 5: write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000540)=ANY=[@ANYBLOB="7f454c4601061f000400000000000000030038000800000032000000000000004000000000000000560200000000000007000000008038000100090002000100010000000100000006000000000000000400000000000000060000000000000001040000000000000200000000000000010000000000000051e574640400000001000000000000000400000000000000050000000000000005000000000000000400000000000000ff24444700000000908bc001727fbcd44f4d3bf922995edf2fd379eb00"/488], 0x2c4) r0 = inotify_init() r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) epoll_ctl$EPOLL_CTL_DEL(0xffffffffffffffff, 0x2, r1) inotify_add_watch(r0, &(0x7f0000000000)='.\x00', 0x400017e) r2 = openat$incfs(0xffffffffffffffff, &(0x7f0000000080)='.log\x00', 0x20200, 0x40) fcntl$getownex(r2, 0x10, &(0x7f00000000c0)) r3 = open(&(0x7f0000000040)='./file0\x00', 0x200c2, 0x0) write$binfmt_elf64(r3, &(0x7f0000000080)=ANY=[], 0x8) sendfile(r3, r3, &(0x7f00000001c0), 0xa198) dup(0xffffffffffffffff) r4 = syz_mount_image$gfs2meta(&(0x7f0000000140)='gfs2meta\x00', &(0x7f0000000200)='./file0\x00', 0x1000, 0x4, &(0x7f0000000880)=[{&(0x7f0000000240)="77ba0daae1b2e74ecd52c59a85bf6f4b1f0b01ab07ba92bc6e57305406115f2bc3e4dd94f19ed896c4fccd34271e9dc3499af9298dbc709e0e6a513d61391d4b198af5f55d24239ae934e8babb8d1cb67bb17b0158", 0x55, 0x3}, {&(0x7f00000002c0)="ae227f954d229f666a6cd22938585e852071e55aa5728addcd315922bf32282e077bdbc63cd5ec89626ee2f8e7982ca239eaa758231056cdca22ca27428407f6c64c384665cfbd00ee6e0d7609f2c7ba0f28b4af70d0307ef78decfe42973915cd509de7c19ea0f3f5c3caaab05f9af08e2cc82d2c14b919dd045e3d36ce1c5d0ff23aed0a4a6ef508b5e71df0a25250d47f1e033ed503b6df99c189111b75b59df679cb75240b756cafecfd203568eeb2c1708fe9f11a2cb0f288590ec76cefbde09c90e9d568492aa5f41196397b70c869838c7164f2bad8eff017d021d7d41c9025c20b", 0xe5, 0x3}, {&(0x7f00000003c0)="792eb6eec33e561f18dc4b58b6a6fb3c7e6fd5e612c08490216ae02617f9811945929cffbf59727393a9a69d57b00a5cd08da3888884b8361d6a4003a54480c1086a5fc876582ff049ede86e2f58d80c7b6cf618e1ba36d4710887bc34ef2b7abbc686df2185f99998060bf492b84e3a02077e2aaf014e1186fde602d2b639d467f48fc2e18cf1553e07ac39040953566ab1d21aac627b166825375377bc3332b62160ea8bf7fc3196b30965dce6181bf7a1c60d0270f24ba60e633c8c88bbdefb5928dc8183c2ce0616de6c3185a4aa7eb2ec6ab7d8394a9536bf7e4f33f76294b0b4a390aca576177671191fe91530e9bd0db79cee", 0xf6, 0x100000000}, {&(0x7f00000004c0)="a90f49b744c1ad7c27bc0a3b1965ca2bce6602b5f5a8b294ced925862d0a9df5c88e43095ba5810ba49c2216e7e1a9b5f07075e6a3101e853557713e983b2f46cf599dc2cba6254802d01794cdc015e28e2b5aa8c10293a4487b3fe2469252f2c2406327b2a5fe71b185ec0adfdc824a237f94", 0x73, 0x7}], 0x21008, &(0x7f0000000900)={[{'.log\x00'}, {'-%('}, {'.log\x00'}], [{@appraise_type='appraise_type=imasig'}, {@fowner_eq={'fowner', 0x3d, 0xee01}}, {@hash='hash'}, {@subj_type={'subj_type', 0x3d, '-&'}}, {@hash='hash'}]}) ioctl$BTRFS_IOC_SUBVOL_SETFLAGS(r4, 0x4008941a, &(0x7f0000000980)=0xfe33b054cbbc4d79) [ 534.200135][ T35] kauditd_printk_skb: 29 callbacks suppressed [ 534.200146][ T35] audit: type=1804 audit(1612178668.275:1979): pid=26147 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.3" name="/root/syzkaller-testdir548988167/syzkaller.gb8agU/378/file1" dev="sda1" ino=15852 res=1 errno=0 [ 534.406557][T26161] loop5: detected capacity change from 264192 to 0 [ 534.432807][ T35] audit: type=1804 audit(1612178668.405:1980): pid=26135 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.2" name="/root/syzkaller-testdir245532710/syzkaller.d2c0aK/390/file1" dev="sda1" ino=15807 res=1 errno=0 11:24:28 executing program 3: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x7f, 0x80000000008001}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x9}, 0x0) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000080)) r1 = open(&(0x7f0000000240)='./file1\x00', 0x141142, 0x0) write$UHID_INPUT(r1, &(0x7f0000001440)={0x8, {'\x008\x00'}}, 0xfffffc41) open(&(0x7f00000001c0)='./file1\x00', 0x0, 0x0) setxattr$trusted_overlay_nlink(&(0x7f0000000000)='./file1\x00', &(0x7f00000000c0)='trusted.overlay.nlink\x00', 0x0, 0x0, 0x0) 11:24:28 executing program 0: r0 = perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x5c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write$binfmt_elf64(r0, &(0x7f0000000540)=ANY=[@ANYBLOB], 0x2c4) r1 = inotify_init() openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) epoll_ctl$EPOLL_CTL_DEL(0xffffffffffffffff, 0x2, 0xffffffffffffffff) inotify_add_watch(r1, &(0x7f0000000000)='.\x00', 0x400017e) r2 = openat$incfs(0xffffffffffffffff, 0x0, 0x20200, 0x40) fcntl$getownex(r2, 0x10, &(0x7f00000000c0)) r3 = open(&(0x7f0000000040)='./file0\x00', 0x200c2, 0x0) write$binfmt_elf64(r3, &(0x7f0000000080)=ANY=[], 0x8) sendfile(r3, r3, &(0x7f00000001c0), 0xa198) dup(0xffffffffffffffff) r4 = syz_mount_image$gfs2meta(&(0x7f0000000140)='gfs2meta\x00', &(0x7f0000000200)='./file0\x00', 0x1000, 0x4, &(0x7f0000000880)=[{&(0x7f0000000240)="77ba0daae1b2e74ecd52c59a85bf6f4b1f0b01ab07ba92bc6e57305406115f2bc3e4dd94f19ed896c4fccd34271e9dc3499af9298dbc709e0e6a513d61391d4b198af5f55d24239ae934e8babb8d1cb67bb17b0158", 0x55, 0x3}, {&(0x7f00000002c0)="ae227f954d229f666a6cd22938585e852071e55aa5728addcd315922bf32282e077bdbc63cd5ec89626ee2f8e7982ca239eaa758231056cdca22ca27428407f6c64c384665cfbd00ee6e0d7609f2c7ba0f28b4af70d0307ef78decfe42973915cd509de7c19ea0f3f5c3caaab05f9af08e2cc82d2c14b919dd045e3d36ce1c5d0ff23aed0a4a6ef508b5e71df0a25250d47f1e033ed503b6df99c189111b75b59df679cb75240b756cafecfd203568eeb2c1708fe9f11a2cb0f288590ec76cefbde09c90e9d568492aa5f41196397b70c869838c7164f2bad8eff017d021d7d41c9025c20b", 0xe5, 0x3}, {&(0x7f00000003c0)="792eb6eec33e561f18dc4b58b6a6fb3c7e6fd5e612c08490216ae02617f9811945929cffbf59727393a9a69d57b00a5cd08da3888884b8361d6a4003a54480c1086a5fc876582ff049ede86e2f58d80c7b6cf618e1ba36d4710887bc34ef2b7abbc686df2185f99998060bf492b84e3a02077e2aaf014e1186fde602d2b639d467f48fc2e18cf1553e07ac39040953566ab1d21aac627b166825375377bc3332b62160ea8bf7fc3196b30965dce6181bf7a1c60d0270f24ba60e633c8c88bbdefb5928dc8183c2ce0616de6c3185a4aa7eb2ec6ab7d8394a9536bf7e4f33f76294b0b4a390aca576177671191fe91530e9bd0db79cee", 0xf6, 0x100000000}, {&(0x7f00000004c0)="a90f49b744c1ad7c27bc0a3b1965ca2bce6602b5f5a8b294ced925862d0a9df5c88e43095ba5810ba49c2216e7e1a9b5f07075e6a3101e853557713e983b2f46cf599dc2cba6254802d01794cdc015e28e2b5aa8c10293a4487b3fe2469252f2c2406327b2a5fe71b185ec0adfdc824a237f94", 0x73, 0x7}], 0x21008, &(0x7f0000000900)={[{'.log\x00'}, {'-%('}, {'.log\x00'}], [{@obj_user={'obj_user'}}, {@appraise_type='appraise_type=imasig'}, {@fowner_eq={'fowner', 0x3d, 0xee01}}, {@hash='hash'}, {@subj_type={'subj_type', 0x3d, '-&'}}]}) ioctl$BTRFS_IOC_SUBVOL_SETFLAGS(r4, 0x4008941a, &(0x7f0000000980)=0xfe33b054cbbc4d79) 11:24:28 executing program 2: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x7f, 0x80000000008001}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x9}, 0x0) r1 = open(&(0x7f0000000240)='./file1\x00', 0x141142, 0x0) write$UHID_INPUT(r1, &(0x7f0000001440)={0x8, {'\x00;\x00'}}, 0xfffffc41) open(&(0x7f00000001c0)='./file1\x00', 0x0, 0x0) setxattr$trusted_overlay_nlink(&(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x0, 0x0) [ 534.685582][ T35] audit: type=1804 audit(1612178668.465:1981): pid=26136 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.2" name="/root/syzkaller-testdir245532710/syzkaller.d2c0aK/390/file1" dev="sda1" ino=15807 res=1 errno=0 11:24:28 executing program 1: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x7f, 0x80000000008001}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x9}, 0x0) r1 = open(&(0x7f0000000240)='./file1\x00', 0x141142, 0x0) write$UHID_INPUT(r1, &(0x7f0000001440), 0xfffffc41) open(&(0x7f00000001c0)='./file1\x00', 0x0, 0x12000000) setxattr$trusted_overlay_nlink(&(0x7f0000000000)='./file1\x00', &(0x7f00000000c0)='trusted.overlay.nlink\x00', 0x0, 0x0, 0x0) [ 534.820109][T26173] loop0: detected capacity change from 264192 to 0 [ 534.824224][ T35] audit: type=1804 audit(1612178668.465:1982): pid=26135 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor.2" name="/root/syzkaller-testdir245532710/syzkaller.d2c0aK/390/file1" dev="sda1" ino=15807 res=1 errno=0 11:24:29 executing program 4: r0 = perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x5c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write$binfmt_elf64(r0, &(0x7f0000000540)=ANY=[@ANYBLOB], 0x2c4) r1 = inotify_init() openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) epoll_ctl$EPOLL_CTL_DEL(0xffffffffffffffff, 0x2, 0xffffffffffffffff) inotify_add_watch(r1, &(0x7f0000000000)='.\x00', 0x400017e) r2 = openat$incfs(0xffffffffffffffff, 0x0, 0x20200, 0x40) fcntl$getownex(r2, 0x10, &(0x7f00000000c0)) r3 = open(&(0x7f0000000040)='./file0\x00', 0x200c2, 0x0) write$binfmt_elf64(r3, &(0x7f0000000080)=ANY=[], 0x8) sendfile(r3, r3, &(0x7f00000001c0), 0xa198) dup(0xffffffffffffffff) r4 = syz_mount_image$gfs2meta(&(0x7f0000000140)='gfs2meta\x00', &(0x7f0000000200)='./file0\x00', 0x1000, 0x4, &(0x7f0000000880)=[{&(0x7f0000000240)="77ba0daae1b2e74ecd52c59a85bf6f4b1f0b01ab07ba92bc6e57305406115f2bc3e4dd94f19ed896c4fccd34271e9dc3499af9298dbc709e0e6a513d61391d4b198af5f55d24239ae934e8babb8d1cb67bb17b0158", 0x55, 0x3}, {&(0x7f00000002c0)="ae227f954d229f666a6cd22938585e852071e55aa5728addcd315922bf32282e077bdbc63cd5ec89626ee2f8e7982ca239eaa758231056cdca22ca27428407f6c64c384665cfbd00ee6e0d7609f2c7ba0f28b4af70d0307ef78decfe42973915cd509de7c19ea0f3f5c3caaab05f9af08e2cc82d2c14b919dd045e3d36ce1c5d0ff23aed0a4a6ef508b5e71df0a25250d47f1e033ed503b6df99c189111b75b59df679cb75240b756cafecfd203568eeb2c1708fe9f11a2cb0f288590ec76cefbde09c90e9d568492aa5f41196397b70c869838c7164f2bad8eff017d021d7d41c9025c20b", 0xe5, 0x3}, {&(0x7f00000003c0)="792eb6eec33e561f18dc4b58b6a6fb3c7e6fd5e612c08490216ae02617f9811945929cffbf59727393a9a69d57b00a5cd08da3888884b8361d6a4003a54480c1086a5fc876582ff049ede86e2f58d80c7b6cf618e1ba36d4710887bc34ef2b7abbc686df2185f99998060bf492b84e3a02077e2aaf014e1186fde602d2b639d467f48fc2e18cf1553e07ac39040953566ab1d21aac627b166825375377bc3332b62160ea8bf7fc3196b30965dce6181bf7a1c60d0270f24ba60e633c8c88bbdefb5928dc8183c2ce0616de6c3185a4aa7eb2ec6ab7d8394a9536bf7e4f33f76294b0b4a390aca576177671191fe91530e9bd0db79cee", 0xf6, 0x100000000}, {&(0x7f00000004c0)="a90f49b744c1ad7c27bc0a3b1965ca2bce6602b5f5a8b294ced925862d0a9df5c88e43095ba5810ba49c2216e7e1a9b5f07075e6a3101e853557713e983b2f46cf599dc2cba6254802d01794cdc015e28e2b5aa8c10293a4487b3fe2469252f2c2406327b2a5fe71b185ec0adfdc824a237f94", 0x73, 0x7}], 0x21008, &(0x7f0000000900)={[{'.log\x00'}, {'-%('}, {'.log\x00'}], [{@obj_user={'obj_user'}}, {@appraise_type='appraise_type=imasig'}, {@fowner_eq={'fowner', 0x3d, 0xee01}}, {@hash='hash'}, {@subj_type={'subj_type', 0x3d, '-&'}}]}) ioctl$BTRFS_IOC_SUBVOL_SETFLAGS(r4, 0x4008941a, &(0x7f0000000980)=0xfe33b054cbbc4d79) [ 535.040083][ T35] audit: type=1804 audit(1612178668.585:1983): pid=26165 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.3" name="/root/syzkaller-testdir548988167/syzkaller.gb8agU/378/file1" dev="sda1" ino=15852 res=1 errno=0 11:24:29 executing program 5: write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000540)=ANY=[@ANYBLOB="7f454c4601061f000400000000000000030038000800000032000000000000004000000000000000560200000000000007000000008038000100090002000100010000000100000006000000000000000400000000000000060000000000000001040000000000000200000000000000010000000000000051e574640400000001000000000000000400000000000000050000000000000005000000000000000400000000000000ff24444700000000908bc001727fbcd44f4d3bf922995edf2fd379eb00"/489], 0x2c4) r0 = inotify_init() r1 = openat$fuse(0xffffffffffffff9c, 0x0, 0x2, 0x0) epoll_ctl$EPOLL_CTL_DEL(0xffffffffffffffff, 0x2, r1) inotify_add_watch(r0, &(0x7f0000000000)='.\x00', 0x400017e) r2 = openat$incfs(0xffffffffffffffff, &(0x7f0000000080)='.log\x00', 0x20200, 0x40) fcntl$getownex(r2, 0x10, &(0x7f00000000c0)) r3 = open(&(0x7f0000000040)='./file0\x00', 0x200c2, 0x0) write$binfmt_elf64(r3, &(0x7f0000000080)=ANY=[], 0x8) sendfile(r3, r3, &(0x7f00000001c0), 0xa198) dup(0xffffffffffffffff) r4 = syz_mount_image$gfs2meta(&(0x7f0000000140)='gfs2meta\x00', &(0x7f0000000200)='./file0\x00', 0x1000, 0x4, &(0x7f0000000880)=[{&(0x7f0000000240)="77ba0daae1b2e74ecd52c59a85bf6f4b1f0b01ab07ba92bc6e57305406115f2bc3e4dd94f19ed896c4fccd34271e9dc3499af9298dbc709e0e6a513d61391d4b198af5f55d24239ae934e8babb8d1cb67bb17b0158", 0x55, 0x3}, {&(0x7f00000002c0)="ae227f954d229f666a6cd22938585e852071e55aa5728addcd315922bf32282e077bdbc63cd5ec89626ee2f8e7982ca239eaa758231056cdca22ca27428407f6c64c384665cfbd00ee6e0d7609f2c7ba0f28b4af70d0307ef78decfe42973915cd509de7c19ea0f3f5c3caaab05f9af08e2cc82d2c14b919dd045e3d36ce1c5d0ff23aed0a4a6ef508b5e71df0a25250d47f1e033ed503b6df99c189111b75b59df679cb75240b756cafecfd203568eeb2c1708fe9f11a2cb0f288590ec76cefbde09c90e9d568492aa5f41196397b70c869838c7164f2bad8eff017d021d7d41c9025c20b", 0xe5, 0x3}, {&(0x7f00000003c0)="792eb6eec33e561f18dc4b58b6a6fb3c7e6fd5e612c08490216ae02617f9811945929cffbf59727393a9a69d57b00a5cd08da3888884b8361d6a4003a54480c1086a5fc876582ff049ede86e2f58d80c7b6cf618e1ba36d4710887bc34ef2b7abbc686df2185f99998060bf492b84e3a02077e2aaf014e1186fde602d2b639d467f48fc2e18cf1553e07ac39040953566ab1d21aac627b166825375377bc3332b62160ea8bf7fc3196b30965dce6181bf7a1c60d0270f24ba60e633c8c88bbdefb5928dc8183c2ce0616de6c3185a4aa7eb2ec6ab7d8394a9536bf7e4f33f76294b0b4a390aca576177671191fe91530e9bd0db79cee", 0xf6, 0x100000000}, {&(0x7f00000004c0)="a90f49b744c1ad7c27bc0a3b1965ca2bce6602b5f5a8b294ced925862d0a9df5c88e43095ba5810ba49c2216e7e1a9b5f07075e6a3101e853557713e983b2f46cf599dc2cba6254802d01794cdc015e28e2b5aa8c10293a4487b3fe2469252f2c2406327b2a5fe71b185ec0adfdc824a237f94", 0x73, 0x7}], 0x21008, &(0x7f0000000900)={[{'.log\x00'}, {'-%('}, {'.log\x00'}], [{@appraise_type='appraise_type=imasig'}, {@fowner_eq={'fowner', 0x3d, 0xee01}}, {@hash='hash'}, {@subj_type={'subj_type', 0x3d, '-&'}}, {@hash='hash'}]}) ioctl$BTRFS_IOC_SUBVOL_SETFLAGS(r4, 0x4008941a, &(0x7f0000000980)=0xfe33b054cbbc4d79) [ 535.164724][T26193] loop4: detected capacity change from 264192 to 0 [ 535.176840][ T35] audit: type=1804 audit(1612178668.655:1984): pid=26145 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.1" name="/root/syzkaller-testdir551554057/syzkaller.l2Zg4z/376/file1" dev="sda1" ino=15837 res=1 errno=0 [ 535.336913][ T35] audit: type=1804 audit(1612178668.655:1985): pid=26166 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor.1" name="/root/syzkaller-testdir551554057/syzkaller.l2Zg4z/376/file1" dev="sda1" ino=15837 res=1 errno=0 [ 535.356780][T26202] loop5: detected capacity change from 264192 to 0 11:24:29 executing program 0: r0 = perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x5c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write$binfmt_elf64(r0, &(0x7f0000000540)=ANY=[@ANYBLOB], 0x2c4) r1 = inotify_init() openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) epoll_ctl$EPOLL_CTL_DEL(0xffffffffffffffff, 0x2, 0xffffffffffffffff) inotify_add_watch(r1, &(0x7f0000000000)='.\x00', 0x400017e) r2 = openat$incfs(0xffffffffffffffff, 0x0, 0x20200, 0x40) fcntl$getownex(r2, 0x10, &(0x7f00000000c0)) r3 = open(&(0x7f0000000040)='./file0\x00', 0x200c2, 0x0) write$binfmt_elf64(r3, &(0x7f0000000080)=ANY=[], 0x8) sendfile(r3, r3, &(0x7f00000001c0), 0xa198) dup(0xffffffffffffffff) r4 = syz_mount_image$gfs2meta(&(0x7f0000000140)='gfs2meta\x00', &(0x7f0000000200)='./file0\x00', 0x1000, 0x4, &(0x7f0000000880)=[{&(0x7f0000000240)="77ba0daae1b2e74ecd52c59a85bf6f4b1f0b01ab07ba92bc6e57305406115f2bc3e4dd94f19ed896c4fccd34271e9dc3499af9298dbc709e0e6a513d61391d4b198af5f55d24239ae934e8babb8d1cb67bb17b0158", 0x55, 0x3}, {&(0x7f00000002c0)="ae227f954d229f666a6cd22938585e852071e55aa5728addcd315922bf32282e077bdbc63cd5ec89626ee2f8e7982ca239eaa758231056cdca22ca27428407f6c64c384665cfbd00ee6e0d7609f2c7ba0f28b4af70d0307ef78decfe42973915cd509de7c19ea0f3f5c3caaab05f9af08e2cc82d2c14b919dd045e3d36ce1c5d0ff23aed0a4a6ef508b5e71df0a25250d47f1e033ed503b6df99c189111b75b59df679cb75240b756cafecfd203568eeb2c1708fe9f11a2cb0f288590ec76cefbde09c90e9d568492aa5f41196397b70c869838c7164f2bad8eff017d021d7d41c9025c20b", 0xe5, 0x3}, {&(0x7f00000003c0)="792eb6eec33e561f18dc4b58b6a6fb3c7e6fd5e612c08490216ae02617f9811945929cffbf59727393a9a69d57b00a5cd08da3888884b8361d6a4003a54480c1086a5fc876582ff049ede86e2f58d80c7b6cf618e1ba36d4710887bc34ef2b7abbc686df2185f99998060bf492b84e3a02077e2aaf014e1186fde602d2b639d467f48fc2e18cf1553e07ac39040953566ab1d21aac627b166825375377bc3332b62160ea8bf7fc3196b30965dce6181bf7a1c60d0270f24ba60e633c8c88bbdefb5928dc8183c2ce0616de6c3185a4aa7eb2ec6ab7d8394a9536bf7e4f33f76294b0b4a390aca576177671191fe91530e9bd0db79cee", 0xf6, 0x100000000}, {&(0x7f00000004c0)="a90f49b744c1ad7c27bc0a3b1965ca2bce6602b5f5a8b294ced925862d0a9df5c88e43095ba5810ba49c2216e7e1a9b5f07075e6a3101e853557713e983b2f46cf599dc2cba6254802d01794cdc015e28e2b5aa8c10293a4487b3fe2469252f2c2406327b2a5fe71b185ec0adfdc824a237f94", 0x73, 0x7}], 0x21008, &(0x7f0000000900)={[{'.log\x00'}, {'-%('}, {'.log\x00'}], [{@obj_user={'obj_user'}}, {@appraise_type='appraise_type=imasig'}, {@fowner_eq={'fowner', 0x3d, 0xee01}}, {@hash='hash'}, {@subj_type={'subj_type', 0x3d, '-&'}}]}) ioctl$BTRFS_IOC_SUBVOL_SETFLAGS(r4, 0x4008941a, &(0x7f0000000980)=0xfe33b054cbbc4d79) [ 535.525022][ T35] audit: type=1804 audit(1612178668.655:1986): pid=26167 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.1" name="/root/syzkaller-testdir551554057/syzkaller.l2Zg4z/376/file1" dev="sda1" ino=15837 res=1 errno=0 11:24:29 executing program 3: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x7f, 0x80000000008001}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x9}, 0x0) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000080)) r1 = open(&(0x7f0000000240)='./file1\x00', 0x141142, 0x0) write$UHID_INPUT(r1, &(0x7f0000001440)={0x8, {'\x009\x00'}}, 0xfffffc41) open(&(0x7f00000001c0)='./file1\x00', 0x0, 0x0) setxattr$trusted_overlay_nlink(&(0x7f0000000000)='./file1\x00', &(0x7f00000000c0)='trusted.overlay.nlink\x00', 0x0, 0x0, 0x0) [ 535.649881][ T35] audit: type=1804 audit(1612178669.255:1987): pid=26179 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.3" name="/root/syzkaller-testdir548988167/syzkaller.gb8agU/379/file1" dev="sda1" ino=15851 res=1 errno=0 11:24:29 executing program 1: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x7f, 0x80000000008001}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x9}, 0x0) r1 = open(&(0x7f0000000240)='./file1\x00', 0x141142, 0x0) write$UHID_INPUT(r1, &(0x7f0000001440), 0xfffffc41) open(&(0x7f00000001c0)='./file1\x00', 0x0, 0x18000000) setxattr$trusted_overlay_nlink(&(0x7f0000000000)='./file1\x00', &(0x7f00000000c0)='trusted.overlay.nlink\x00', 0x0, 0x0, 0x0) 11:24:29 executing program 2: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x7f, 0x80000000008001}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x9}, 0x0) r1 = open(&(0x7f0000000240)='./file1\x00', 0x141142, 0x0) write$UHID_INPUT(r1, &(0x7f0000001440)={0x8, {'\x00<\x00'}}, 0xfffffc41) open(&(0x7f00000001c0)='./file1\x00', 0x0, 0x0) setxattr$trusted_overlay_nlink(&(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x0, 0x0) [ 535.759703][ T35] audit: type=1804 audit(1612178669.545:1988): pid=26194 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.1" name="/root/syzkaller-testdir551554057/syzkaller.l2Zg4z/377/file1" dev="sda1" ino=15863 res=1 errno=0 [ 535.794286][T26210] loop0: detected capacity change from 264192 to 0 11:24:30 executing program 4: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x7f, 0x80000000008001}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x9}, 0x0) r1 = open(&(0x7f0000000240)='./file1\x00', 0x141142, 0x0) write$UHID_INPUT(r1, &(0x7f0000001440)={0x8, {'\x00;\x00'}}, 0xfffffc41) open(&(0x7f00000001c0)='./file1\x00', 0x0, 0x0) setxattr$trusted_overlay_nlink(&(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x0, 0x0) 11:24:30 executing program 5: write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000540)=ANY=[@ANYBLOB="7f454c4601061f000400000000000000030038000800000032000000000000004000000000000000560200000000000007000000008038000100090002000100010000000100000006000000000000000400000000000000060000000000000001040000000000000200000000000000010000000000000051e574640400000001000000000000000400000000000000050000000000000005000000000000000400000000000000ff24444700000000908bc001727fbcd44f4d3bf922995edf2fd379eb00"/489], 0x2c4) r0 = inotify_init() r1 = openat$fuse(0xffffffffffffff9c, 0x0, 0x2, 0x0) epoll_ctl$EPOLL_CTL_DEL(0xffffffffffffffff, 0x2, r1) inotify_add_watch(r0, &(0x7f0000000000)='.\x00', 0x400017e) r2 = openat$incfs(0xffffffffffffffff, &(0x7f0000000080)='.log\x00', 0x20200, 0x40) fcntl$getownex(r2, 0x10, &(0x7f00000000c0)) r3 = open(&(0x7f0000000040)='./file0\x00', 0x200c2, 0x0) write$binfmt_elf64(r3, &(0x7f0000000080)=ANY=[], 0x8) sendfile(r3, r3, &(0x7f00000001c0), 0xa198) dup(0xffffffffffffffff) r4 = syz_mount_image$gfs2meta(&(0x7f0000000140)='gfs2meta\x00', &(0x7f0000000200)='./file0\x00', 0x1000, 0x4, &(0x7f0000000880)=[{&(0x7f0000000240)="77ba0daae1b2e74ecd52c59a85bf6f4b1f0b01ab07ba92bc6e57305406115f2bc3e4dd94f19ed896c4fccd34271e9dc3499af9298dbc709e0e6a513d61391d4b198af5f55d24239ae934e8babb8d1cb67bb17b0158", 0x55, 0x3}, {&(0x7f00000002c0)="ae227f954d229f666a6cd22938585e852071e55aa5728addcd315922bf32282e077bdbc63cd5ec89626ee2f8e7982ca239eaa758231056cdca22ca27428407f6c64c384665cfbd00ee6e0d7609f2c7ba0f28b4af70d0307ef78decfe42973915cd509de7c19ea0f3f5c3caaab05f9af08e2cc82d2c14b919dd045e3d36ce1c5d0ff23aed0a4a6ef508b5e71df0a25250d47f1e033ed503b6df99c189111b75b59df679cb75240b756cafecfd203568eeb2c1708fe9f11a2cb0f288590ec76cefbde09c90e9d568492aa5f41196397b70c869838c7164f2bad8eff017d021d7d41c9025c20b", 0xe5, 0x3}, {&(0x7f00000003c0)="792eb6eec33e561f18dc4b58b6a6fb3c7e6fd5e612c08490216ae02617f9811945929cffbf59727393a9a69d57b00a5cd08da3888884b8361d6a4003a54480c1086a5fc876582ff049ede86e2f58d80c7b6cf618e1ba36d4710887bc34ef2b7abbc686df2185f99998060bf492b84e3a02077e2aaf014e1186fde602d2b639d467f48fc2e18cf1553e07ac39040953566ab1d21aac627b166825375377bc3332b62160ea8bf7fc3196b30965dce6181bf7a1c60d0270f24ba60e633c8c88bbdefb5928dc8183c2ce0616de6c3185a4aa7eb2ec6ab7d8394a9536bf7e4f33f76294b0b4a390aca576177671191fe91530e9bd0db79cee", 0xf6, 0x100000000}, {&(0x7f00000004c0)="a90f49b744c1ad7c27bc0a3b1965ca2bce6602b5f5a8b294ced925862d0a9df5c88e43095ba5810ba49c2216e7e1a9b5f07075e6a3101e853557713e983b2f46cf599dc2cba6254802d01794cdc015e28e2b5aa8c10293a4487b3fe2469252f2c2406327b2a5fe71b185ec0adfdc824a237f94", 0x73, 0x7}], 0x21008, &(0x7f0000000900)={[{'.log\x00'}, {'-%('}, {'.log\x00'}], [{@appraise_type='appraise_type=imasig'}, {@fowner_eq={'fowner', 0x3d, 0xee01}}, {@hash='hash'}, {@subj_type={'subj_type', 0x3d, '-&'}}, {@hash='hash'}]}) ioctl$BTRFS_IOC_SUBVOL_SETFLAGS(r4, 0x4008941a, &(0x7f0000000980)=0xfe33b054cbbc4d79) [ 536.215289][T26236] loop5: detected capacity change from 264192 to 0 11:24:30 executing program 0: r0 = perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x5c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write$binfmt_elf64(r0, &(0x7f0000000540)=ANY=[@ANYBLOB], 0x2c4) r1 = inotify_init() openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) epoll_ctl$EPOLL_CTL_DEL(0xffffffffffffffff, 0x2, 0xffffffffffffffff) inotify_add_watch(r1, &(0x7f0000000000)='.\x00', 0x400017e) r2 = openat$incfs(0xffffffffffffffff, &(0x7f0000000080)='.log\x00', 0x0, 0x40) fcntl$getownex(r2, 0x10, &(0x7f00000000c0)) r3 = open(&(0x7f0000000040)='./file0\x00', 0x200c2, 0x0) write$binfmt_elf64(r3, &(0x7f0000000080)=ANY=[], 0x8) sendfile(r3, r3, &(0x7f00000001c0), 0xa198) dup(0xffffffffffffffff) r4 = syz_mount_image$gfs2meta(&(0x7f0000000140)='gfs2meta\x00', &(0x7f0000000200)='./file0\x00', 0x1000, 0x4, &(0x7f0000000880)=[{&(0x7f0000000240)="77ba0daae1b2e74ecd52c59a85bf6f4b1f0b01ab07ba92bc6e57305406115f2bc3e4dd94f19ed896c4fccd34271e9dc3499af9298dbc709e0e6a513d61391d4b198af5f55d24239ae934e8babb8d1cb67bb17b0158", 0x55, 0x3}, {&(0x7f00000002c0)="ae227f954d229f666a6cd22938585e852071e55aa5728addcd315922bf32282e077bdbc63cd5ec89626ee2f8e7982ca239eaa758231056cdca22ca27428407f6c64c384665cfbd00ee6e0d7609f2c7ba0f28b4af70d0307ef78decfe42973915cd509de7c19ea0f3f5c3caaab05f9af08e2cc82d2c14b919dd045e3d36ce1c5d0ff23aed0a4a6ef508b5e71df0a25250d47f1e033ed503b6df99c189111b75b59df679cb75240b756cafecfd203568eeb2c1708fe9f11a2cb0f288590ec76cefbde09c90e9d568492aa5f41196397b70c869838c7164f2bad8eff017d021d7d41c9025c20b", 0xe5, 0x3}, {&(0x7f00000003c0)="792eb6eec33e561f18dc4b58b6a6fb3c7e6fd5e612c08490216ae02617f9811945929cffbf59727393a9a69d57b00a5cd08da3888884b8361d6a4003a54480c1086a5fc876582ff049ede86e2f58d80c7b6cf618e1ba36d4710887bc34ef2b7abbc686df2185f99998060bf492b84e3a02077e2aaf014e1186fde602d2b639d467f48fc2e18cf1553e07ac39040953566ab1d21aac627b166825375377bc3332b62160ea8bf7fc3196b30965dce6181bf7a1c60d0270f24ba60e633c8c88bbdefb5928dc8183c2ce0616de6c3185a4aa7eb2ec6ab7d8394a9536bf7e4f33f76294b0b4a390aca576177671191fe91530e9bd0db79cee", 0xf6, 0x100000000}, {&(0x7f00000004c0)="a90f49b744c1ad7c27bc0a3b1965ca2bce6602b5f5a8b294ced925862d0a9df5c88e43095ba5810ba49c2216e7e1a9b5f07075e6a3101e853557713e983b2f46cf599dc2cba6254802d01794cdc015e28e2b5aa8c10293a4487b3fe2469252f2c2406327b2a5fe71b185ec0adfdc824a237f94", 0x73, 0x7}], 0x21008, &(0x7f0000000900)={[{'.log\x00'}, {'-%('}, {'.log\x00'}], [{@obj_user={'obj_user'}}, {@appraise_type='appraise_type=imasig'}, {@fowner_eq={'fowner', 0x3d, 0xee01}}, {@hash='hash'}, {@subj_type={'subj_type', 0x3d, '-&'}}]}) ioctl$BTRFS_IOC_SUBVOL_SETFLAGS(r4, 0x4008941a, &(0x7f0000000980)=0xfe33b054cbbc4d79) [ 536.661939][T26245] loop0: detected capacity change from 264192 to 0 11:24:31 executing program 3: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x7f, 0x80000000008001}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x9}, 0x0) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000080)) r1 = open(&(0x7f0000000240)='./file1\x00', 0x141142, 0x0) write$UHID_INPUT(r1, &(0x7f0000001440)={0x8, {'\x00:\x00'}}, 0xfffffc41) open(&(0x7f00000001c0)='./file1\x00', 0x0, 0x0) setxattr$trusted_overlay_nlink(&(0x7f0000000000)='./file1\x00', &(0x7f00000000c0)='trusted.overlay.nlink\x00', 0x0, 0x0, 0x0) 11:24:31 executing program 2: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x7f, 0x80000000008001}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x9}, 0x0) r1 = open(&(0x7f0000000240)='./file1\x00', 0x141142, 0x0) write$UHID_INPUT(r1, &(0x7f0000001440)={0x8, {'\x00=\x00'}}, 0xfffffc41) open(&(0x7f00000001c0)='./file1\x00', 0x0, 0x0) setxattr$trusted_overlay_nlink(&(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x0, 0x0) 11:24:31 executing program 5: write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000540)=ANY=[@ANYBLOB="7f454c4601061f000400000000000000030038000800000032000000000000004000000000000000560200000000000007000000008038000100090002000100010000000100000006000000000000000400000000000000060000000000000001040000000000000200000000000000010000000000000051e574640400000001000000000000000400000000000000050000000000000005000000000000000400000000000000ff24444700000000908bc001727fbcd44f4d3bf922995edf2fd379eb00"/489], 0x2c4) r0 = inotify_init() r1 = openat$fuse(0xffffffffffffff9c, 0x0, 0x2, 0x0) epoll_ctl$EPOLL_CTL_DEL(0xffffffffffffffff, 0x2, r1) inotify_add_watch(r0, &(0x7f0000000000)='.\x00', 0x400017e) r2 = openat$incfs(0xffffffffffffffff, &(0x7f0000000080)='.log\x00', 0x20200, 0x40) fcntl$getownex(r2, 0x10, &(0x7f00000000c0)) r3 = open(&(0x7f0000000040)='./file0\x00', 0x200c2, 0x0) write$binfmt_elf64(r3, &(0x7f0000000080)=ANY=[], 0x8) sendfile(r3, r3, &(0x7f00000001c0), 0xa198) dup(0xffffffffffffffff) r4 = syz_mount_image$gfs2meta(&(0x7f0000000140)='gfs2meta\x00', &(0x7f0000000200)='./file0\x00', 0x1000, 0x4, &(0x7f0000000880)=[{&(0x7f0000000240)="77ba0daae1b2e74ecd52c59a85bf6f4b1f0b01ab07ba92bc6e57305406115f2bc3e4dd94f19ed896c4fccd34271e9dc3499af9298dbc709e0e6a513d61391d4b198af5f55d24239ae934e8babb8d1cb67bb17b0158", 0x55, 0x3}, {&(0x7f00000002c0)="ae227f954d229f666a6cd22938585e852071e55aa5728addcd315922bf32282e077bdbc63cd5ec89626ee2f8e7982ca239eaa758231056cdca22ca27428407f6c64c384665cfbd00ee6e0d7609f2c7ba0f28b4af70d0307ef78decfe42973915cd509de7c19ea0f3f5c3caaab05f9af08e2cc82d2c14b919dd045e3d36ce1c5d0ff23aed0a4a6ef508b5e71df0a25250d47f1e033ed503b6df99c189111b75b59df679cb75240b756cafecfd203568eeb2c1708fe9f11a2cb0f288590ec76cefbde09c90e9d568492aa5f41196397b70c869838c7164f2bad8eff017d021d7d41c9025c20b", 0xe5, 0x3}, {&(0x7f00000003c0)="792eb6eec33e561f18dc4b58b6a6fb3c7e6fd5e612c08490216ae02617f9811945929cffbf59727393a9a69d57b00a5cd08da3888884b8361d6a4003a54480c1086a5fc876582ff049ede86e2f58d80c7b6cf618e1ba36d4710887bc34ef2b7abbc686df2185f99998060bf492b84e3a02077e2aaf014e1186fde602d2b639d467f48fc2e18cf1553e07ac39040953566ab1d21aac627b166825375377bc3332b62160ea8bf7fc3196b30965dce6181bf7a1c60d0270f24ba60e633c8c88bbdefb5928dc8183c2ce0616de6c3185a4aa7eb2ec6ab7d8394a9536bf7e4f33f76294b0b4a390aca576177671191fe91530e9bd0db79cee", 0xf6, 0x100000000}, {&(0x7f00000004c0)="a90f49b744c1ad7c27bc0a3b1965ca2bce6602b5f5a8b294ced925862d0a9df5c88e43095ba5810ba49c2216e7e1a9b5f07075e6a3101e853557713e983b2f46cf599dc2cba6254802d01794cdc015e28e2b5aa8c10293a4487b3fe2469252f2c2406327b2a5fe71b185ec0adfdc824a237f94", 0x73, 0x7}], 0x21008, &(0x7f0000000900)={[{'.log\x00'}, {'-%('}, {'.log\x00'}], [{@appraise_type='appraise_type=imasig'}, {@fowner_eq={'fowner', 0x3d, 0xee01}}, {@hash='hash'}, {@subj_type={'subj_type', 0x3d, '-&'}}, {@hash='hash'}]}) ioctl$BTRFS_IOC_SUBVOL_SETFLAGS(r4, 0x4008941a, &(0x7f0000000980)=0xfe33b054cbbc4d79) 11:24:31 executing program 1: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x7f, 0x80000000008001}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x9}, 0x0) r1 = open(&(0x7f0000000240)='./file1\x00', 0x141142, 0x0) write$UHID_INPUT(r1, &(0x7f0000001440), 0xfffffc41) open(&(0x7f00000001c0)='./file1\x00', 0x0, 0x1f000000) setxattr$trusted_overlay_nlink(&(0x7f0000000000)='./file1\x00', &(0x7f00000000c0)='trusted.overlay.nlink\x00', 0x0, 0x0, 0x0) 11:24:31 executing program 4: write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000540)=ANY=[@ANYBLOB="7f454c4601061f000400000000000000030038000800000032000000000000004000000000000000560200000000000007000000008038000100090002000100010000000100000006000000000000000400000000000000060000000000000001040000000000000200000000000000010000000000000051e574640400000001000000000000000400000000000000050000000000000005000000000000000400000000000000ff24444700000000908bc001727fbcd44f4d3bf922995edf2fd379eb00"/489], 0x2c4) r0 = inotify_init() r1 = openat$fuse(0xffffffffffffff9c, 0x0, 0x2, 0x0) epoll_ctl$EPOLL_CTL_DEL(0xffffffffffffffff, 0x2, r1) inotify_add_watch(r0, &(0x7f0000000000)='.\x00', 0x400017e) r2 = openat$incfs(0xffffffffffffffff, &(0x7f0000000080)='.log\x00', 0x20200, 0x40) fcntl$getownex(r2, 0x10, &(0x7f00000000c0)) r3 = open(&(0x7f0000000040)='./file0\x00', 0x200c2, 0x0) write$binfmt_elf64(r3, &(0x7f0000000080)=ANY=[], 0x8) sendfile(r3, r3, &(0x7f00000001c0), 0xa198) dup(0xffffffffffffffff) r4 = syz_mount_image$gfs2meta(&(0x7f0000000140)='gfs2meta\x00', &(0x7f0000000200)='./file0\x00', 0x1000, 0x4, &(0x7f0000000880)=[{&(0x7f0000000240)="77ba0daae1b2e74ecd52c59a85bf6f4b1f0b01ab07ba92bc6e57305406115f2bc3e4dd94f19ed896c4fccd34271e9dc3499af9298dbc709e0e6a513d61391d4b198af5f55d24239ae934e8babb8d1cb67bb17b0158", 0x55, 0x3}, {&(0x7f00000002c0)="ae227f954d229f666a6cd22938585e852071e55aa5728addcd315922bf32282e077bdbc63cd5ec89626ee2f8e7982ca239eaa758231056cdca22ca27428407f6c64c384665cfbd00ee6e0d7609f2c7ba0f28b4af70d0307ef78decfe42973915cd509de7c19ea0f3f5c3caaab05f9af08e2cc82d2c14b919dd045e3d36ce1c5d0ff23aed0a4a6ef508b5e71df0a25250d47f1e033ed503b6df99c189111b75b59df679cb75240b756cafecfd203568eeb2c1708fe9f11a2cb0f288590ec76cefbde09c90e9d568492aa5f41196397b70c869838c7164f2bad8eff017d021d7d41c9025c20b", 0xe5, 0x3}, {&(0x7f00000003c0)="792eb6eec33e561f18dc4b58b6a6fb3c7e6fd5e612c08490216ae02617f9811945929cffbf59727393a9a69d57b00a5cd08da3888884b8361d6a4003a54480c1086a5fc876582ff049ede86e2f58d80c7b6cf618e1ba36d4710887bc34ef2b7abbc686df2185f99998060bf492b84e3a02077e2aaf014e1186fde602d2b639d467f48fc2e18cf1553e07ac39040953566ab1d21aac627b166825375377bc3332b62160ea8bf7fc3196b30965dce6181bf7a1c60d0270f24ba60e633c8c88bbdefb5928dc8183c2ce0616de6c3185a4aa7eb2ec6ab7d8394a9536bf7e4f33f76294b0b4a390aca576177671191fe91530e9bd0db79cee", 0xf6, 0x100000000}, {&(0x7f00000004c0)="a90f49b744c1ad7c27bc0a3b1965ca2bce6602b5f5a8b294ced925862d0a9df5c88e43095ba5810ba49c2216e7e1a9b5f07075e6a3101e853557713e983b2f46cf599dc2cba6254802d01794cdc015e28e2b5aa8c10293a4487b3fe2469252f2c2406327b2a5fe71b185ec0adfdc824a237f94", 0x73, 0x7}], 0x21008, &(0x7f0000000900)={[{'.log\x00'}, {'-%('}, {'.log\x00'}], [{@appraise_type='appraise_type=imasig'}, {@fowner_eq={'fowner', 0x3d, 0xee01}}, {@hash='hash'}, {@subj_type={'subj_type', 0x3d, '-&'}}, {@hash='hash'}]}) ioctl$BTRFS_IOC_SUBVOL_SETFLAGS(r4, 0x4008941a, &(0x7f0000000980)=0xfe33b054cbbc4d79) [ 537.211601][T26258] loop5: detected capacity change from 264192 to 0 [ 537.359365][T26272] loop4: detected capacity change from 264192 to 0 11:24:31 executing program 0: r0 = perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x5c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write$binfmt_elf64(r0, &(0x7f0000000540)=ANY=[@ANYBLOB], 0x2c4) r1 = inotify_init() openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) epoll_ctl$EPOLL_CTL_DEL(0xffffffffffffffff, 0x2, 0xffffffffffffffff) inotify_add_watch(r1, &(0x7f0000000000)='.\x00', 0x400017e) r2 = openat$incfs(0xffffffffffffffff, &(0x7f0000000080)='.log\x00', 0x0, 0x40) fcntl$getownex(r2, 0x10, &(0x7f00000000c0)) r3 = open(&(0x7f0000000040)='./file0\x00', 0x200c2, 0x0) write$binfmt_elf64(r3, &(0x7f0000000080)=ANY=[], 0x8) sendfile(r3, r3, &(0x7f00000001c0), 0xa198) dup(0xffffffffffffffff) r4 = syz_mount_image$gfs2meta(&(0x7f0000000140)='gfs2meta\x00', &(0x7f0000000200)='./file0\x00', 0x1000, 0x4, &(0x7f0000000880)=[{&(0x7f0000000240)="77ba0daae1b2e74ecd52c59a85bf6f4b1f0b01ab07ba92bc6e57305406115f2bc3e4dd94f19ed896c4fccd34271e9dc3499af9298dbc709e0e6a513d61391d4b198af5f55d24239ae934e8babb8d1cb67bb17b0158", 0x55, 0x3}, {&(0x7f00000002c0)="ae227f954d229f666a6cd22938585e852071e55aa5728addcd315922bf32282e077bdbc63cd5ec89626ee2f8e7982ca239eaa758231056cdca22ca27428407f6c64c384665cfbd00ee6e0d7609f2c7ba0f28b4af70d0307ef78decfe42973915cd509de7c19ea0f3f5c3caaab05f9af08e2cc82d2c14b919dd045e3d36ce1c5d0ff23aed0a4a6ef508b5e71df0a25250d47f1e033ed503b6df99c189111b75b59df679cb75240b756cafecfd203568eeb2c1708fe9f11a2cb0f288590ec76cefbde09c90e9d568492aa5f41196397b70c869838c7164f2bad8eff017d021d7d41c9025c20b", 0xe5, 0x3}, {&(0x7f00000003c0)="792eb6eec33e561f18dc4b58b6a6fb3c7e6fd5e612c08490216ae02617f9811945929cffbf59727393a9a69d57b00a5cd08da3888884b8361d6a4003a54480c1086a5fc876582ff049ede86e2f58d80c7b6cf618e1ba36d4710887bc34ef2b7abbc686df2185f99998060bf492b84e3a02077e2aaf014e1186fde602d2b639d467f48fc2e18cf1553e07ac39040953566ab1d21aac627b166825375377bc3332b62160ea8bf7fc3196b30965dce6181bf7a1c60d0270f24ba60e633c8c88bbdefb5928dc8183c2ce0616de6c3185a4aa7eb2ec6ab7d8394a9536bf7e4f33f76294b0b4a390aca576177671191fe91530e9bd0db79cee", 0xf6, 0x100000000}, {&(0x7f00000004c0)="a90f49b744c1ad7c27bc0a3b1965ca2bce6602b5f5a8b294ced925862d0a9df5c88e43095ba5810ba49c2216e7e1a9b5f07075e6a3101e853557713e983b2f46cf599dc2cba6254802d01794cdc015e28e2b5aa8c10293a4487b3fe2469252f2c2406327b2a5fe71b185ec0adfdc824a237f94", 0x73, 0x7}], 0x21008, &(0x7f0000000900)={[{'.log\x00'}, {'-%('}, {'.log\x00'}], [{@obj_user={'obj_user'}}, {@appraise_type='appraise_type=imasig'}, {@fowner_eq={'fowner', 0x3d, 0xee01}}, {@hash='hash'}, {@subj_type={'subj_type', 0x3d, '-&'}}]}) ioctl$BTRFS_IOC_SUBVOL_SETFLAGS(r4, 0x4008941a, &(0x7f0000000980)=0xfe33b054cbbc4d79) [ 537.527628][T26282] loop0: detected capacity change from 264192 to 0 11:24:32 executing program 2: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x7f, 0x80000000008001}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x9}, 0x0) r1 = open(&(0x7f0000000240)='./file1\x00', 0x141142, 0x0) write$UHID_INPUT(r1, &(0x7f0000001440)={0x8, {'\x00>\x00'}}, 0xfffffc41) open(&(0x7f00000001c0)='./file1\x00', 0x0, 0x0) setxattr$trusted_overlay_nlink(&(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x0, 0x0) 11:24:32 executing program 5: write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000540)=ANY=[@ANYBLOB="7f454c4601061f000400000000000000030038000800000032000000000000004000000000000000560200000000000007000000008038000100090002000100010000000100000006000000000000000400000000000000060000000000000001040000000000000200000000000000010000000000000051e574640400000001000000000000000400000000000000050000000000000005000000000000000400000000000000ff24444700000000908bc001727fbcd44f4d3bf922995edf2fd379eb00"/489], 0x2c4) r0 = inotify_init() openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) epoll_ctl$EPOLL_CTL_DEL(0xffffffffffffffff, 0x2, 0xffffffffffffffff) inotify_add_watch(r0, &(0x7f0000000000)='.\x00', 0x400017e) r1 = openat$incfs(0xffffffffffffffff, &(0x7f0000000080)='.log\x00', 0x20200, 0x40) fcntl$getownex(r1, 0x10, &(0x7f00000000c0)) r2 = open(&(0x7f0000000040)='./file0\x00', 0x200c2, 0x0) write$binfmt_elf64(r2, &(0x7f0000000080)=ANY=[], 0x8) sendfile(r2, r2, &(0x7f00000001c0), 0xa198) dup(0xffffffffffffffff) r3 = syz_mount_image$gfs2meta(&(0x7f0000000140)='gfs2meta\x00', &(0x7f0000000200)='./file0\x00', 0x1000, 0x4, &(0x7f0000000880)=[{&(0x7f0000000240)="77ba0daae1b2e74ecd52c59a85bf6f4b1f0b01ab07ba92bc6e57305406115f2bc3e4dd94f19ed896c4fccd34271e9dc3499af9298dbc709e0e6a513d61391d4b198af5f55d24239ae934e8babb8d1cb67bb17b0158", 0x55, 0x3}, {&(0x7f00000002c0)="ae227f954d229f666a6cd22938585e852071e55aa5728addcd315922bf32282e077bdbc63cd5ec89626ee2f8e7982ca239eaa758231056cdca22ca27428407f6c64c384665cfbd00ee6e0d7609f2c7ba0f28b4af70d0307ef78decfe42973915cd509de7c19ea0f3f5c3caaab05f9af08e2cc82d2c14b919dd045e3d36ce1c5d0ff23aed0a4a6ef508b5e71df0a25250d47f1e033ed503b6df99c189111b75b59df679cb75240b756cafecfd203568eeb2c1708fe9f11a2cb0f288590ec76cefbde09c90e9d568492aa5f41196397b70c869838c7164f2bad8eff017d021d7d41c9025c20b", 0xe5, 0x3}, {&(0x7f00000003c0)="792eb6eec33e561f18dc4b58b6a6fb3c7e6fd5e612c08490216ae02617f9811945929cffbf59727393a9a69d57b00a5cd08da3888884b8361d6a4003a54480c1086a5fc876582ff049ede86e2f58d80c7b6cf618e1ba36d4710887bc34ef2b7abbc686df2185f99998060bf492b84e3a02077e2aaf014e1186fde602d2b639d467f48fc2e18cf1553e07ac39040953566ab1d21aac627b166825375377bc3332b62160ea8bf7fc3196b30965dce6181bf7a1c60d0270f24ba60e633c8c88bbdefb5928dc8183c2ce0616de6c3185a4aa7eb2ec6ab7d8394a9536bf7e4f33f76294b0b4a390aca576177671191fe91530e9bd0db79cee", 0xf6, 0x100000000}, {&(0x7f00000004c0)="a90f49b744c1ad7c27bc0a3b1965ca2bce6602b5f5a8b294ced925862d0a9df5c88e43095ba5810ba49c2216e7e1a9b5f07075e6a3101e853557713e983b2f46cf599dc2cba6254802d01794cdc015e28e2b5aa8c10293a4487b3fe2469252f2c2406327b2a5fe71b185ec0adfdc824a237f94", 0x73, 0x7}], 0x21008, &(0x7f0000000900)={[{'.log\x00'}, {'-%('}, {'.log\x00'}], [{@appraise_type='appraise_type=imasig'}, {@fowner_eq={'fowner', 0x3d, 0xee01}}, {@hash='hash'}, {@subj_type={'subj_type', 0x3d, '-&'}}, {@hash='hash'}]}) ioctl$BTRFS_IOC_SUBVOL_SETFLAGS(r3, 0x4008941a, &(0x7f0000000980)=0xfe33b054cbbc4d79) 11:24:32 executing program 3: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x7f, 0x80000000008001}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x9}, 0x0) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000080)) r1 = open(&(0x7f0000000240)='./file1\x00', 0x141142, 0x0) write$UHID_INPUT(r1, &(0x7f0000001440)={0x8, {'\x00;\x00'}}, 0xfffffc41) open(&(0x7f00000001c0)='./file1\x00', 0x0, 0x0) setxattr$trusted_overlay_nlink(&(0x7f0000000000)='./file1\x00', &(0x7f00000000c0)='trusted.overlay.nlink\x00', 0x0, 0x0, 0x0) 11:24:32 executing program 4: write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000540)=ANY=[@ANYBLOB="7f454c4601061f000400000000000000030038000800000032000000000000004000000000000000560200000000000007000000008038000100090002000100010000000100000006000000000000000400000000000000060000000000000001040000000000000200000000000000010000000000000051e574640400000001000000000000000400000000000000050000000000000005000000000000000400000000000000ff24444700000000908bc001727fbcd44f4d3bf922995edf2fd379eb00"/489], 0x2c4) r0 = inotify_init() r1 = openat$fuse(0xffffffffffffff9c, 0x0, 0x2, 0x0) epoll_ctl$EPOLL_CTL_DEL(0xffffffffffffffff, 0x2, r1) inotify_add_watch(r0, &(0x7f0000000000)='.\x00', 0x400017e) r2 = openat$incfs(0xffffffffffffffff, &(0x7f0000000080)='.log\x00', 0x20200, 0x40) fcntl$getownex(r2, 0x10, &(0x7f00000000c0)) r3 = open(&(0x7f0000000040)='./file0\x00', 0x200c2, 0x0) write$binfmt_elf64(r3, &(0x7f0000000080)=ANY=[], 0x8) sendfile(r3, r3, &(0x7f00000001c0), 0xa198) dup(0xffffffffffffffff) r4 = syz_mount_image$gfs2meta(&(0x7f0000000140)='gfs2meta\x00', &(0x7f0000000200)='./file0\x00', 0x1000, 0x4, &(0x7f0000000880)=[{&(0x7f0000000240)="77ba0daae1b2e74ecd52c59a85bf6f4b1f0b01ab07ba92bc6e57305406115f2bc3e4dd94f19ed896c4fccd34271e9dc3499af9298dbc709e0e6a513d61391d4b198af5f55d24239ae934e8babb8d1cb67bb17b0158", 0x55, 0x3}, {&(0x7f00000002c0)="ae227f954d229f666a6cd22938585e852071e55aa5728addcd315922bf32282e077bdbc63cd5ec89626ee2f8e7982ca239eaa758231056cdca22ca27428407f6c64c384665cfbd00ee6e0d7609f2c7ba0f28b4af70d0307ef78decfe42973915cd509de7c19ea0f3f5c3caaab05f9af08e2cc82d2c14b919dd045e3d36ce1c5d0ff23aed0a4a6ef508b5e71df0a25250d47f1e033ed503b6df99c189111b75b59df679cb75240b756cafecfd203568eeb2c1708fe9f11a2cb0f288590ec76cefbde09c90e9d568492aa5f41196397b70c869838c7164f2bad8eff017d021d7d41c9025c20b", 0xe5, 0x3}, {&(0x7f00000003c0)="792eb6eec33e561f18dc4b58b6a6fb3c7e6fd5e612c08490216ae02617f9811945929cffbf59727393a9a69d57b00a5cd08da3888884b8361d6a4003a54480c1086a5fc876582ff049ede86e2f58d80c7b6cf618e1ba36d4710887bc34ef2b7abbc686df2185f99998060bf492b84e3a02077e2aaf014e1186fde602d2b639d467f48fc2e18cf1553e07ac39040953566ab1d21aac627b166825375377bc3332b62160ea8bf7fc3196b30965dce6181bf7a1c60d0270f24ba60e633c8c88bbdefb5928dc8183c2ce0616de6c3185a4aa7eb2ec6ab7d8394a9536bf7e4f33f76294b0b4a390aca576177671191fe91530e9bd0db79cee", 0xf6, 0x100000000}, {&(0x7f00000004c0)="a90f49b744c1ad7c27bc0a3b1965ca2bce6602b5f5a8b294ced925862d0a9df5c88e43095ba5810ba49c2216e7e1a9b5f07075e6a3101e853557713e983b2f46cf599dc2cba6254802d01794cdc015e28e2b5aa8c10293a4487b3fe2469252f2c2406327b2a5fe71b185ec0adfdc824a237f94", 0x73, 0x7}], 0x21008, &(0x7f0000000900)={[{'.log\x00'}, {'-%('}, {'.log\x00'}], [{@appraise_type='appraise_type=imasig'}, {@fowner_eq={'fowner', 0x3d, 0xee01}}, {@hash='hash'}, {@subj_type={'subj_type', 0x3d, '-&'}}, {@hash='hash'}]}) ioctl$BTRFS_IOC_SUBVOL_SETFLAGS(r4, 0x4008941a, &(0x7f0000000980)=0xfe33b054cbbc4d79) [ 538.225417][T26296] loop5: detected capacity change from 264192 to 0 11:24:32 executing program 0: r0 = perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x5c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write$binfmt_elf64(r0, &(0x7f0000000540)=ANY=[@ANYBLOB], 0x2c4) r1 = inotify_init() openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) epoll_ctl$EPOLL_CTL_DEL(0xffffffffffffffff, 0x2, 0xffffffffffffffff) inotify_add_watch(r1, &(0x7f0000000000)='.\x00', 0x400017e) r2 = openat$incfs(0xffffffffffffffff, &(0x7f0000000080)='.log\x00', 0x0, 0x40) fcntl$getownex(r2, 0x10, &(0x7f00000000c0)) r3 = open(&(0x7f0000000040)='./file0\x00', 0x200c2, 0x0) write$binfmt_elf64(r3, &(0x7f0000000080)=ANY=[], 0x8) sendfile(r3, r3, &(0x7f00000001c0), 0xa198) dup(0xffffffffffffffff) r4 = syz_mount_image$gfs2meta(&(0x7f0000000140)='gfs2meta\x00', &(0x7f0000000200)='./file0\x00', 0x1000, 0x4, &(0x7f0000000880)=[{&(0x7f0000000240)="77ba0daae1b2e74ecd52c59a85bf6f4b1f0b01ab07ba92bc6e57305406115f2bc3e4dd94f19ed896c4fccd34271e9dc3499af9298dbc709e0e6a513d61391d4b198af5f55d24239ae934e8babb8d1cb67bb17b0158", 0x55, 0x3}, {&(0x7f00000002c0)="ae227f954d229f666a6cd22938585e852071e55aa5728addcd315922bf32282e077bdbc63cd5ec89626ee2f8e7982ca239eaa758231056cdca22ca27428407f6c64c384665cfbd00ee6e0d7609f2c7ba0f28b4af70d0307ef78decfe42973915cd509de7c19ea0f3f5c3caaab05f9af08e2cc82d2c14b919dd045e3d36ce1c5d0ff23aed0a4a6ef508b5e71df0a25250d47f1e033ed503b6df99c189111b75b59df679cb75240b756cafecfd203568eeb2c1708fe9f11a2cb0f288590ec76cefbde09c90e9d568492aa5f41196397b70c869838c7164f2bad8eff017d021d7d41c9025c20b", 0xe5, 0x3}, {&(0x7f00000003c0)="792eb6eec33e561f18dc4b58b6a6fb3c7e6fd5e612c08490216ae02617f9811945929cffbf59727393a9a69d57b00a5cd08da3888884b8361d6a4003a54480c1086a5fc876582ff049ede86e2f58d80c7b6cf618e1ba36d4710887bc34ef2b7abbc686df2185f99998060bf492b84e3a02077e2aaf014e1186fde602d2b639d467f48fc2e18cf1553e07ac39040953566ab1d21aac627b166825375377bc3332b62160ea8bf7fc3196b30965dce6181bf7a1c60d0270f24ba60e633c8c88bbdefb5928dc8183c2ce0616de6c3185a4aa7eb2ec6ab7d8394a9536bf7e4f33f76294b0b4a390aca576177671191fe91530e9bd0db79cee", 0xf6, 0x100000000}, {&(0x7f00000004c0)="a90f49b744c1ad7c27bc0a3b1965ca2bce6602b5f5a8b294ced925862d0a9df5c88e43095ba5810ba49c2216e7e1a9b5f07075e6a3101e853557713e983b2f46cf599dc2cba6254802d01794cdc015e28e2b5aa8c10293a4487b3fe2469252f2c2406327b2a5fe71b185ec0adfdc824a237f94", 0x73, 0x7}], 0x21008, &(0x7f0000000900)={[{'.log\x00'}, {'-%('}, {'.log\x00'}], [{@obj_user={'obj_user'}}, {@appraise_type='appraise_type=imasig'}, {@fowner_eq={'fowner', 0x3d, 0xee01}}, {@hash='hash'}, {@subj_type={'subj_type', 0x3d, '-&'}}]}) ioctl$BTRFS_IOC_SUBVOL_SETFLAGS(r4, 0x4008941a, &(0x7f0000000980)=0xfe33b054cbbc4d79) 11:24:32 executing program 1: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x7f, 0x80000000008001}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x9}, 0x0) r1 = open(&(0x7f0000000240)='./file1\x00', 0x141142, 0x0) write$UHID_INPUT(r1, &(0x7f0000001440), 0xfffffc41) open(&(0x7f00000001c0)='./file1\x00', 0x0, 0x20000000) setxattr$trusted_overlay_nlink(&(0x7f0000000000)='./file1\x00', &(0x7f00000000c0)='trusted.overlay.nlink\x00', 0x0, 0x0, 0x0) [ 538.407104][T26309] loop4: detected capacity change from 264192 to 0 [ 538.489790][T26314] loop0: detected capacity change from 264192 to 0 11:24:32 executing program 3: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x7f, 0x80000000008001}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x9}, 0x0) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000080)) r1 = open(&(0x7f0000000240)='./file1\x00', 0x141142, 0x0) write$UHID_INPUT(r1, &(0x7f0000001440)={0x8, {'\x00<\x00'}}, 0xfffffc41) open(&(0x7f00000001c0)='./file1\x00', 0x0, 0x0) setxattr$trusted_overlay_nlink(&(0x7f0000000000)='./file1\x00', &(0x7f00000000c0)='trusted.overlay.nlink\x00', 0x0, 0x0, 0x0) 11:24:33 executing program 5: write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000540)=ANY=[@ANYBLOB="7f454c4601061f000400000000000000030038000800000032000000000000004000000000000000560200000000000007000000008038000100090002000100010000000100000006000000000000000400000000000000060000000000000001040000000000000200000000000000010000000000000051e574640400000001000000000000000400000000000000050000000000000005000000000000000400000000000000ff24444700000000908bc001727fbcd44f4d3bf922995edf2fd379eb00"/489], 0x2c4) r0 = inotify_init() openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) epoll_ctl$EPOLL_CTL_DEL(0xffffffffffffffff, 0x2, 0xffffffffffffffff) inotify_add_watch(r0, &(0x7f0000000000)='.\x00', 0x400017e) r1 = openat$incfs(0xffffffffffffffff, &(0x7f0000000080)='.log\x00', 0x20200, 0x40) fcntl$getownex(r1, 0x10, &(0x7f00000000c0)) r2 = open(&(0x7f0000000040)='./file0\x00', 0x200c2, 0x0) write$binfmt_elf64(r2, &(0x7f0000000080)=ANY=[], 0x8) sendfile(r2, r2, &(0x7f00000001c0), 0xa198) dup(0xffffffffffffffff) r3 = syz_mount_image$gfs2meta(&(0x7f0000000140)='gfs2meta\x00', &(0x7f0000000200)='./file0\x00', 0x1000, 0x4, &(0x7f0000000880)=[{&(0x7f0000000240)="77ba0daae1b2e74ecd52c59a85bf6f4b1f0b01ab07ba92bc6e57305406115f2bc3e4dd94f19ed896c4fccd34271e9dc3499af9298dbc709e0e6a513d61391d4b198af5f55d24239ae934e8babb8d1cb67bb17b0158", 0x55, 0x3}, {&(0x7f00000002c0)="ae227f954d229f666a6cd22938585e852071e55aa5728addcd315922bf32282e077bdbc63cd5ec89626ee2f8e7982ca239eaa758231056cdca22ca27428407f6c64c384665cfbd00ee6e0d7609f2c7ba0f28b4af70d0307ef78decfe42973915cd509de7c19ea0f3f5c3caaab05f9af08e2cc82d2c14b919dd045e3d36ce1c5d0ff23aed0a4a6ef508b5e71df0a25250d47f1e033ed503b6df99c189111b75b59df679cb75240b756cafecfd203568eeb2c1708fe9f11a2cb0f288590ec76cefbde09c90e9d568492aa5f41196397b70c869838c7164f2bad8eff017d021d7d41c9025c20b", 0xe5, 0x3}, {&(0x7f00000003c0)="792eb6eec33e561f18dc4b58b6a6fb3c7e6fd5e612c08490216ae02617f9811945929cffbf59727393a9a69d57b00a5cd08da3888884b8361d6a4003a54480c1086a5fc876582ff049ede86e2f58d80c7b6cf618e1ba36d4710887bc34ef2b7abbc686df2185f99998060bf492b84e3a02077e2aaf014e1186fde602d2b639d467f48fc2e18cf1553e07ac39040953566ab1d21aac627b166825375377bc3332b62160ea8bf7fc3196b30965dce6181bf7a1c60d0270f24ba60e633c8c88bbdefb5928dc8183c2ce0616de6c3185a4aa7eb2ec6ab7d8394a9536bf7e4f33f76294b0b4a390aca576177671191fe91530e9bd0db79cee", 0xf6, 0x100000000}, {&(0x7f00000004c0)="a90f49b744c1ad7c27bc0a3b1965ca2bce6602b5f5a8b294ced925862d0a9df5c88e43095ba5810ba49c2216e7e1a9b5f07075e6a3101e853557713e983b2f46cf599dc2cba6254802d01794cdc015e28e2b5aa8c10293a4487b3fe2469252f2c2406327b2a5fe71b185ec0adfdc824a237f94", 0x73, 0x7}], 0x21008, &(0x7f0000000900)={[{'.log\x00'}, {'-%('}, {'.log\x00'}], [{@appraise_type='appraise_type=imasig'}, {@fowner_eq={'fowner', 0x3d, 0xee01}}, {@hash='hash'}, {@subj_type={'subj_type', 0x3d, '-&'}}, {@hash='hash'}]}) ioctl$BTRFS_IOC_SUBVOL_SETFLAGS(r3, 0x4008941a, &(0x7f0000000980)=0xfe33b054cbbc4d79) [ 539.074906][T26332] loop5: detected capacity change from 264192 to 0 11:24:33 executing program 0: r0 = perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x5c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write$binfmt_elf64(r0, &(0x7f0000000540)=ANY=[@ANYBLOB], 0x2c4) r1 = inotify_init() openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) epoll_ctl$EPOLL_CTL_DEL(0xffffffffffffffff, 0x2, 0xffffffffffffffff) inotify_add_watch(r1, &(0x7f0000000000)='.\x00', 0x400017e) r2 = openat$incfs(0xffffffffffffffff, &(0x7f0000000080)='.log\x00', 0x20200, 0x0) fcntl$getownex(r2, 0x10, &(0x7f00000000c0)) r3 = open(&(0x7f0000000040)='./file0\x00', 0x200c2, 0x0) write$binfmt_elf64(r3, &(0x7f0000000080)=ANY=[], 0x8) sendfile(r3, r3, &(0x7f00000001c0), 0xa198) dup(0xffffffffffffffff) r4 = syz_mount_image$gfs2meta(&(0x7f0000000140)='gfs2meta\x00', &(0x7f0000000200)='./file0\x00', 0x1000, 0x4, &(0x7f0000000880)=[{&(0x7f0000000240)="77ba0daae1b2e74ecd52c59a85bf6f4b1f0b01ab07ba92bc6e57305406115f2bc3e4dd94f19ed896c4fccd34271e9dc3499af9298dbc709e0e6a513d61391d4b198af5f55d24239ae934e8babb8d1cb67bb17b0158", 0x55, 0x3}, {&(0x7f00000002c0)="ae227f954d229f666a6cd22938585e852071e55aa5728addcd315922bf32282e077bdbc63cd5ec89626ee2f8e7982ca239eaa758231056cdca22ca27428407f6c64c384665cfbd00ee6e0d7609f2c7ba0f28b4af70d0307ef78decfe42973915cd509de7c19ea0f3f5c3caaab05f9af08e2cc82d2c14b919dd045e3d36ce1c5d0ff23aed0a4a6ef508b5e71df0a25250d47f1e033ed503b6df99c189111b75b59df679cb75240b756cafecfd203568eeb2c1708fe9f11a2cb0f288590ec76cefbde09c90e9d568492aa5f41196397b70c869838c7164f2bad8eff017d021d7d41c9025c20b", 0xe5, 0x3}, {&(0x7f00000003c0)="792eb6eec33e561f18dc4b58b6a6fb3c7e6fd5e612c08490216ae02617f9811945929cffbf59727393a9a69d57b00a5cd08da3888884b8361d6a4003a54480c1086a5fc876582ff049ede86e2f58d80c7b6cf618e1ba36d4710887bc34ef2b7abbc686df2185f99998060bf492b84e3a02077e2aaf014e1186fde602d2b639d467f48fc2e18cf1553e07ac39040953566ab1d21aac627b166825375377bc3332b62160ea8bf7fc3196b30965dce6181bf7a1c60d0270f24ba60e633c8c88bbdefb5928dc8183c2ce0616de6c3185a4aa7eb2ec6ab7d8394a9536bf7e4f33f76294b0b4a390aca576177671191fe91530e9bd0db79cee", 0xf6, 0x100000000}, {&(0x7f00000004c0)="a90f49b744c1ad7c27bc0a3b1965ca2bce6602b5f5a8b294ced925862d0a9df5c88e43095ba5810ba49c2216e7e1a9b5f07075e6a3101e853557713e983b2f46cf599dc2cba6254802d01794cdc015e28e2b5aa8c10293a4487b3fe2469252f2c2406327b2a5fe71b185ec0adfdc824a237f94", 0x73, 0x7}], 0x21008, &(0x7f0000000900)={[{'.log\x00'}, {'-%('}, {'.log\x00'}], [{@obj_user={'obj_user'}}, {@appraise_type='appraise_type=imasig'}, {@fowner_eq={'fowner', 0x3d, 0xee01}}, {@hash='hash'}, {@subj_type={'subj_type', 0x3d, '-&'}}]}) ioctl$BTRFS_IOC_SUBVOL_SETFLAGS(r4, 0x4008941a, &(0x7f0000000980)=0xfe33b054cbbc4d79) 11:24:33 executing program 4: r0 = perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x5c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write$binfmt_elf64(r0, &(0x7f0000000540)=ANY=[@ANYBLOB], 0x2c4) r1 = inotify_init() openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) epoll_ctl$EPOLL_CTL_DEL(0xffffffffffffffff, 0x2, 0xffffffffffffffff) inotify_add_watch(r1, &(0x7f0000000000)='.\x00', 0x400017e) r2 = openat$incfs(0xffffffffffffffff, &(0x7f0000000080)='.log\x00', 0x0, 0x40) fcntl$getownex(r2, 0x10, &(0x7f00000000c0)) r3 = open(&(0x7f0000000040)='./file0\x00', 0x200c2, 0x0) write$binfmt_elf64(r3, &(0x7f0000000080)=ANY=[], 0x8) sendfile(r3, r3, &(0x7f00000001c0), 0xa198) dup(0xffffffffffffffff) r4 = syz_mount_image$gfs2meta(&(0x7f0000000140)='gfs2meta\x00', &(0x7f0000000200)='./file0\x00', 0x1000, 0x4, &(0x7f0000000880)=[{&(0x7f0000000240)="77ba0daae1b2e74ecd52c59a85bf6f4b1f0b01ab07ba92bc6e57305406115f2bc3e4dd94f19ed896c4fccd34271e9dc3499af9298dbc709e0e6a513d61391d4b198af5f55d24239ae934e8babb8d1cb67bb17b0158", 0x55, 0x3}, {&(0x7f00000002c0)="ae227f954d229f666a6cd22938585e852071e55aa5728addcd315922bf32282e077bdbc63cd5ec89626ee2f8e7982ca239eaa758231056cdca22ca27428407f6c64c384665cfbd00ee6e0d7609f2c7ba0f28b4af70d0307ef78decfe42973915cd509de7c19ea0f3f5c3caaab05f9af08e2cc82d2c14b919dd045e3d36ce1c5d0ff23aed0a4a6ef508b5e71df0a25250d47f1e033ed503b6df99c189111b75b59df679cb75240b756cafecfd203568eeb2c1708fe9f11a2cb0f288590ec76cefbde09c90e9d568492aa5f41196397b70c869838c7164f2bad8eff017d021d7d41c9025c20b", 0xe5, 0x3}, {&(0x7f00000003c0)="792eb6eec33e561f18dc4b58b6a6fb3c7e6fd5e612c08490216ae02617f9811945929cffbf59727393a9a69d57b00a5cd08da3888884b8361d6a4003a54480c1086a5fc876582ff049ede86e2f58d80c7b6cf618e1ba36d4710887bc34ef2b7abbc686df2185f99998060bf492b84e3a02077e2aaf014e1186fde602d2b639d467f48fc2e18cf1553e07ac39040953566ab1d21aac627b166825375377bc3332b62160ea8bf7fc3196b30965dce6181bf7a1c60d0270f24ba60e633c8c88bbdefb5928dc8183c2ce0616de6c3185a4aa7eb2ec6ab7d8394a9536bf7e4f33f76294b0b4a390aca576177671191fe91530e9bd0db79cee", 0xf6, 0x100000000}, {&(0x7f00000004c0)="a90f49b744c1ad7c27bc0a3b1965ca2bce6602b5f5a8b294ced925862d0a9df5c88e43095ba5810ba49c2216e7e1a9b5f07075e6a3101e853557713e983b2f46cf599dc2cba6254802d01794cdc015e28e2b5aa8c10293a4487b3fe2469252f2c2406327b2a5fe71b185ec0adfdc824a237f94", 0x73, 0x7}], 0x21008, &(0x7f0000000900)={[{'.log\x00'}, {'-%('}, {'.log\x00'}], [{@obj_user={'obj_user'}}, {@appraise_type='appraise_type=imasig'}, {@fowner_eq={'fowner', 0x3d, 0xee01}}, {@hash='hash'}, {@subj_type={'subj_type', 0x3d, '-&'}}]}) ioctl$BTRFS_IOC_SUBVOL_SETFLAGS(r4, 0x4008941a, &(0x7f0000000980)=0xfe33b054cbbc4d79) 11:24:33 executing program 2: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x7f, 0x80000000008001}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x9}, 0x0) r1 = open(&(0x7f0000000240)='./file1\x00', 0x141142, 0x0) write$UHID_INPUT(r1, &(0x7f0000001440)={0x8, {'\x00?\x00'}}, 0xfffffc41) open(&(0x7f00000001c0)='./file1\x00', 0x0, 0x0) setxattr$trusted_overlay_nlink(&(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x0, 0x0) [ 539.433299][T26345] loop0: detected capacity change from 264192 to 0 [ 539.449033][ T35] kauditd_printk_skb: 32 callbacks suppressed [ 539.449117][ T35] audit: type=1804 audit(1612178673.525:2021): pid=26324 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.1" name="/root/syzkaller-testdir551554057/syzkaller.l2Zg4z/380/file1" dev="sda1" ino=15866 res=1 errno=0 [ 539.550712][T26350] loop4: detected capacity change from 264192 to 0 [ 539.565621][ T35] audit: type=1804 audit(1612178673.565:2022): pid=26325 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.1" name="/root/syzkaller-testdir551554057/syzkaller.l2Zg4z/380/file1" dev="sda1" ino=15866 res=1 errno=0 [ 539.592855][ T35] audit: type=1804 audit(1612178673.565:2023): pid=26324 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor.1" name="/root/syzkaller-testdir551554057/syzkaller.l2Zg4z/380/file1" dev="sda1" ino=15866 res=1 errno=0 [ 539.619748][ T35] audit: type=1804 audit(1612178673.635:2024): pid=26337 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.3" name="/root/syzkaller-testdir548988167/syzkaller.gb8agU/383/file1" dev="sda1" ino=15808 res=1 errno=0 11:24:34 executing program 3: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x7f, 0x80000000008001}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x9}, 0x0) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000080)) r1 = open(&(0x7f0000000240)='./file1\x00', 0x141142, 0x0) write$UHID_INPUT(r1, &(0x7f0000001440)={0x8, {'\x00=\x00'}}, 0xfffffc41) open(&(0x7f00000001c0)='./file1\x00', 0x0, 0x0) setxattr$trusted_overlay_nlink(&(0x7f0000000000)='./file1\x00', &(0x7f00000000c0)='trusted.overlay.nlink\x00', 0x0, 0x0, 0x0) [ 539.888153][ T35] audit: type=1804 audit(1612178673.915:2025): pid=26339 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.3" name="/root/syzkaller-testdir548988167/syzkaller.gb8agU/383/file1" dev="sda1" ino=15808 res=1 errno=0 11:24:34 executing program 1: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x7f, 0x80000000008001}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x9}, 0x0) r1 = open(&(0x7f0000000240)='./file1\x00', 0x141142, 0x0) write$UHID_INPUT(r1, &(0x7f0000001440), 0xfffffc41) open(&(0x7f00000001c0)='./file1\x00', 0x0, 0x25000000) setxattr$trusted_overlay_nlink(&(0x7f0000000000)='./file1\x00', &(0x7f00000000c0)='trusted.overlay.nlink\x00', 0x0, 0x0, 0x0) 11:24:34 executing program 5: write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000540)=ANY=[@ANYBLOB="7f454c4601061f000400000000000000030038000800000032000000000000004000000000000000560200000000000007000000008038000100090002000100010000000100000006000000000000000400000000000000060000000000000001040000000000000200000000000000010000000000000051e574640400000001000000000000000400000000000000050000000000000005000000000000000400000000000000ff24444700000000908bc001727fbcd44f4d3bf922995edf2fd379eb00"/489], 0x2c4) r0 = inotify_init() openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) epoll_ctl$EPOLL_CTL_DEL(0xffffffffffffffff, 0x2, 0xffffffffffffffff) inotify_add_watch(r0, &(0x7f0000000000)='.\x00', 0x400017e) r1 = openat$incfs(0xffffffffffffffff, &(0x7f0000000080)='.log\x00', 0x20200, 0x40) fcntl$getownex(r1, 0x10, &(0x7f00000000c0)) r2 = open(&(0x7f0000000040)='./file0\x00', 0x200c2, 0x0) write$binfmt_elf64(r2, &(0x7f0000000080)=ANY=[], 0x8) sendfile(r2, r2, &(0x7f00000001c0), 0xa198) dup(0xffffffffffffffff) r3 = syz_mount_image$gfs2meta(&(0x7f0000000140)='gfs2meta\x00', &(0x7f0000000200)='./file0\x00', 0x1000, 0x4, &(0x7f0000000880)=[{&(0x7f0000000240)="77ba0daae1b2e74ecd52c59a85bf6f4b1f0b01ab07ba92bc6e57305406115f2bc3e4dd94f19ed896c4fccd34271e9dc3499af9298dbc709e0e6a513d61391d4b198af5f55d24239ae934e8babb8d1cb67bb17b0158", 0x55, 0x3}, {&(0x7f00000002c0)="ae227f954d229f666a6cd22938585e852071e55aa5728addcd315922bf32282e077bdbc63cd5ec89626ee2f8e7982ca239eaa758231056cdca22ca27428407f6c64c384665cfbd00ee6e0d7609f2c7ba0f28b4af70d0307ef78decfe42973915cd509de7c19ea0f3f5c3caaab05f9af08e2cc82d2c14b919dd045e3d36ce1c5d0ff23aed0a4a6ef508b5e71df0a25250d47f1e033ed503b6df99c189111b75b59df679cb75240b756cafecfd203568eeb2c1708fe9f11a2cb0f288590ec76cefbde09c90e9d568492aa5f41196397b70c869838c7164f2bad8eff017d021d7d41c9025c20b", 0xe5, 0x3}, {&(0x7f00000003c0)="792eb6eec33e561f18dc4b58b6a6fb3c7e6fd5e612c08490216ae02617f9811945929cffbf59727393a9a69d57b00a5cd08da3888884b8361d6a4003a54480c1086a5fc876582ff049ede86e2f58d80c7b6cf618e1ba36d4710887bc34ef2b7abbc686df2185f99998060bf492b84e3a02077e2aaf014e1186fde602d2b639d467f48fc2e18cf1553e07ac39040953566ab1d21aac627b166825375377bc3332b62160ea8bf7fc3196b30965dce6181bf7a1c60d0270f24ba60e633c8c88bbdefb5928dc8183c2ce0616de6c3185a4aa7eb2ec6ab7d8394a9536bf7e4f33f76294b0b4a390aca576177671191fe91530e9bd0db79cee", 0xf6, 0x100000000}, {&(0x7f00000004c0)="a90f49b744c1ad7c27bc0a3b1965ca2bce6602b5f5a8b294ced925862d0a9df5c88e43095ba5810ba49c2216e7e1a9b5f07075e6a3101e853557713e983b2f46cf599dc2cba6254802d01794cdc015e28e2b5aa8c10293a4487b3fe2469252f2c2406327b2a5fe71b185ec0adfdc824a237f94", 0x73, 0x7}], 0x21008, &(0x7f0000000900)={[{'.log\x00'}, {'-%('}, {'.log\x00'}], [{@appraise_type='appraise_type=imasig'}, {@fowner_eq={'fowner', 0x3d, 0xee01}}, {@hash='hash'}, {@subj_type={'subj_type', 0x3d, '-&'}}, {@hash='hash'}]}) ioctl$BTRFS_IOC_SUBVOL_SETFLAGS(r3, 0x4008941a, &(0x7f0000000980)=0xfe33b054cbbc4d79) [ 540.052460][ T35] audit: type=1804 audit(1612178674.125:2026): pid=26358 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.2" name="/root/syzkaller-testdir245532710/syzkaller.d2c0aK/395/file1" dev="sda1" ino=15850 res=1 errno=0 [ 540.130126][T26364] loop5: detected capacity change from 264192 to 0 11:24:34 executing program 0: r0 = perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x5c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write$binfmt_elf64(r0, &(0x7f0000000540)=ANY=[@ANYBLOB], 0x2c4) r1 = inotify_init() openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) epoll_ctl$EPOLL_CTL_DEL(0xffffffffffffffff, 0x2, 0xffffffffffffffff) inotify_add_watch(r1, &(0x7f0000000000)='.\x00', 0x400017e) r2 = openat$incfs(0xffffffffffffffff, &(0x7f0000000080)='.log\x00', 0x20200, 0x0) fcntl$getownex(r2, 0x10, &(0x7f00000000c0)) r3 = open(&(0x7f0000000040)='./file0\x00', 0x200c2, 0x0) write$binfmt_elf64(r3, &(0x7f0000000080)=ANY=[], 0x8) sendfile(r3, r3, &(0x7f00000001c0), 0xa198) dup(0xffffffffffffffff) r4 = syz_mount_image$gfs2meta(&(0x7f0000000140)='gfs2meta\x00', &(0x7f0000000200)='./file0\x00', 0x1000, 0x4, &(0x7f0000000880)=[{&(0x7f0000000240)="77ba0daae1b2e74ecd52c59a85bf6f4b1f0b01ab07ba92bc6e57305406115f2bc3e4dd94f19ed896c4fccd34271e9dc3499af9298dbc709e0e6a513d61391d4b198af5f55d24239ae934e8babb8d1cb67bb17b0158", 0x55, 0x3}, {&(0x7f00000002c0)="ae227f954d229f666a6cd22938585e852071e55aa5728addcd315922bf32282e077bdbc63cd5ec89626ee2f8e7982ca239eaa758231056cdca22ca27428407f6c64c384665cfbd00ee6e0d7609f2c7ba0f28b4af70d0307ef78decfe42973915cd509de7c19ea0f3f5c3caaab05f9af08e2cc82d2c14b919dd045e3d36ce1c5d0ff23aed0a4a6ef508b5e71df0a25250d47f1e033ed503b6df99c189111b75b59df679cb75240b756cafecfd203568eeb2c1708fe9f11a2cb0f288590ec76cefbde09c90e9d568492aa5f41196397b70c869838c7164f2bad8eff017d021d7d41c9025c20b", 0xe5, 0x3}, {&(0x7f00000003c0)="792eb6eec33e561f18dc4b58b6a6fb3c7e6fd5e612c08490216ae02617f9811945929cffbf59727393a9a69d57b00a5cd08da3888884b8361d6a4003a54480c1086a5fc876582ff049ede86e2f58d80c7b6cf618e1ba36d4710887bc34ef2b7abbc686df2185f99998060bf492b84e3a02077e2aaf014e1186fde602d2b639d467f48fc2e18cf1553e07ac39040953566ab1d21aac627b166825375377bc3332b62160ea8bf7fc3196b30965dce6181bf7a1c60d0270f24ba60e633c8c88bbdefb5928dc8183c2ce0616de6c3185a4aa7eb2ec6ab7d8394a9536bf7e4f33f76294b0b4a390aca576177671191fe91530e9bd0db79cee", 0xf6, 0x100000000}, {&(0x7f00000004c0)="a90f49b744c1ad7c27bc0a3b1965ca2bce6602b5f5a8b294ced925862d0a9df5c88e43095ba5810ba49c2216e7e1a9b5f07075e6a3101e853557713e983b2f46cf599dc2cba6254802d01794cdc015e28e2b5aa8c10293a4487b3fe2469252f2c2406327b2a5fe71b185ec0adfdc824a237f94", 0x73, 0x7}], 0x21008, &(0x7f0000000900)={[{'.log\x00'}, {'-%('}, {'.log\x00'}], [{@obj_user={'obj_user'}}, {@appraise_type='appraise_type=imasig'}, {@fowner_eq={'fowner', 0x3d, 0xee01}}, {@hash='hash'}, {@subj_type={'subj_type', 0x3d, '-&'}}]}) ioctl$BTRFS_IOC_SUBVOL_SETFLAGS(r4, 0x4008941a, &(0x7f0000000980)=0xfe33b054cbbc4d79) 11:24:34 executing program 4: r0 = perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x5c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write$binfmt_elf64(r0, &(0x7f0000000540)=ANY=[@ANYBLOB], 0x2c4) r1 = inotify_init() openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) epoll_ctl$EPOLL_CTL_DEL(0xffffffffffffffff, 0x2, 0xffffffffffffffff) inotify_add_watch(r1, &(0x7f0000000000)='.\x00', 0x400017e) r2 = openat$incfs(0xffffffffffffffff, &(0x7f0000000080)='.log\x00', 0x20200, 0x0) fcntl$getownex(r2, 0x10, &(0x7f00000000c0)) r3 = open(&(0x7f0000000040)='./file0\x00', 0x200c2, 0x0) write$binfmt_elf64(r3, &(0x7f0000000080)=ANY=[], 0x8) sendfile(r3, r3, &(0x7f00000001c0), 0xa198) dup(0xffffffffffffffff) r4 = syz_mount_image$gfs2meta(&(0x7f0000000140)='gfs2meta\x00', &(0x7f0000000200)='./file0\x00', 0x1000, 0x4, &(0x7f0000000880)=[{&(0x7f0000000240)="77ba0daae1b2e74ecd52c59a85bf6f4b1f0b01ab07ba92bc6e57305406115f2bc3e4dd94f19ed896c4fccd34271e9dc3499af9298dbc709e0e6a513d61391d4b198af5f55d24239ae934e8babb8d1cb67bb17b0158", 0x55, 0x3}, {&(0x7f00000002c0)="ae227f954d229f666a6cd22938585e852071e55aa5728addcd315922bf32282e077bdbc63cd5ec89626ee2f8e7982ca239eaa758231056cdca22ca27428407f6c64c384665cfbd00ee6e0d7609f2c7ba0f28b4af70d0307ef78decfe42973915cd509de7c19ea0f3f5c3caaab05f9af08e2cc82d2c14b919dd045e3d36ce1c5d0ff23aed0a4a6ef508b5e71df0a25250d47f1e033ed503b6df99c189111b75b59df679cb75240b756cafecfd203568eeb2c1708fe9f11a2cb0f288590ec76cefbde09c90e9d568492aa5f41196397b70c869838c7164f2bad8eff017d021d7d41c9025c20b", 0xe5, 0x3}, {&(0x7f00000003c0)="792eb6eec33e561f18dc4b58b6a6fb3c7e6fd5e612c08490216ae02617f9811945929cffbf59727393a9a69d57b00a5cd08da3888884b8361d6a4003a54480c1086a5fc876582ff049ede86e2f58d80c7b6cf618e1ba36d4710887bc34ef2b7abbc686df2185f99998060bf492b84e3a02077e2aaf014e1186fde602d2b639d467f48fc2e18cf1553e07ac39040953566ab1d21aac627b166825375377bc3332b62160ea8bf7fc3196b30965dce6181bf7a1c60d0270f24ba60e633c8c88bbdefb5928dc8183c2ce0616de6c3185a4aa7eb2ec6ab7d8394a9536bf7e4f33f76294b0b4a390aca576177671191fe91530e9bd0db79cee", 0xf6, 0x100000000}, {&(0x7f00000004c0)="a90f49b744c1ad7c27bc0a3b1965ca2bce6602b5f5a8b294ced925862d0a9df5c88e43095ba5810ba49c2216e7e1a9b5f07075e6a3101e853557713e983b2f46cf599dc2cba6254802d01794cdc015e28e2b5aa8c10293a4487b3fe2469252f2c2406327b2a5fe71b185ec0adfdc824a237f94", 0x73, 0x7}], 0x21008, &(0x7f0000000900)={[{'.log\x00'}, {'-%('}, {'.log\x00'}], [{@obj_user={'obj_user'}}, {@appraise_type='appraise_type=imasig'}, {@fowner_eq={'fowner', 0x3d, 0xee01}}, {@hash='hash'}, {@subj_type={'subj_type', 0x3d, '-&'}}]}) ioctl$BTRFS_IOC_SUBVOL_SETFLAGS(r4, 0x4008941a, &(0x7f0000000980)=0xfe33b054cbbc4d79) 11:24:34 executing program 2: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x7f, 0x80000000008001}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x9}, 0x0) r1 = open(&(0x7f0000000240)='./file1\x00', 0x141142, 0x0) write$UHID_INPUT(r1, &(0x7f0000001440)={0x8, {'\x00@\x00'}}, 0xfffffc41) open(&(0x7f00000001c0)='./file1\x00', 0x0, 0x0) setxattr$trusted_overlay_nlink(&(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x0, 0x0) [ 540.332559][ T35] audit: type=1804 audit(1612178674.405:2027): pid=26358 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.2" name="/root/syzkaller-testdir245532710/syzkaller.d2c0aK/395/file1" dev="sda1" ino=15850 res=1 errno=0 [ 540.408353][T26382] loop0: detected capacity change from 264192 to 0 [ 540.428786][ T35] audit: type=1800 audit(1612178674.405:2028): pid=26358 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed comm="syz-executor.2" name="file1" dev="sda1" ino=15850 res=0 errno=0 [ 540.479880][T26386] loop4: detected capacity change from 264192 to 0 [ 540.592834][ T35] audit: type=1804 audit(1612178674.405:2029): pid=26357 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor.2" name="/root/syzkaller-testdir245532710/syzkaller.d2c0aK/395/file1" dev="sda1" ino=15850 res=1 errno=0 11:24:34 executing program 1: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x7f, 0x80000000008001}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x9}, 0x0) r1 = open(&(0x7f0000000240)='./file1\x00', 0x141142, 0x0) write$UHID_INPUT(r1, &(0x7f0000001440), 0xfffffc41) open(&(0x7f00000001c0)='./file1\x00', 0x0, 0x3f000000) setxattr$trusted_overlay_nlink(&(0x7f0000000000)='./file1\x00', &(0x7f00000000c0)='trusted.overlay.nlink\x00', 0x0, 0x0, 0x0) [ 540.721872][ T35] audit: type=1800 audit(1612178674.405:2030): pid=26357 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed comm="syz-executor.2" name="file1" dev="sda1" ino=15850 res=0 errno=0 11:24:35 executing program 5: write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000540)=ANY=[@ANYBLOB="7f454c4601061f000400000000000000030038000800000032000000000000004000000000000000560200000000000007000000008038000100090002000100010000000100000006000000000000000400000000000000060000000000000001040000000000000200000000000000010000000000000051e574640400000001000000000000000400000000000000050000000000000005000000000000000400000000000000ff24444700000000908bc001727fbcd44f4d3bf922995edf2fd379eb00"/489], 0x2c4) inotify_init() r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) epoll_ctl$EPOLL_CTL_DEL(0xffffffffffffffff, 0x2, r0) inotify_add_watch(0xffffffffffffffff, &(0x7f0000000000)='.\x00', 0x400017e) r1 = openat$incfs(0xffffffffffffffff, &(0x7f0000000080)='.log\x00', 0x20200, 0x40) fcntl$getownex(r1, 0x10, &(0x7f00000000c0)) r2 = open(&(0x7f0000000040)='./file0\x00', 0x200c2, 0x0) write$binfmt_elf64(r2, &(0x7f0000000080)=ANY=[], 0x8) sendfile(r2, r2, &(0x7f00000001c0), 0xa198) dup(0xffffffffffffffff) r3 = syz_mount_image$gfs2meta(&(0x7f0000000140)='gfs2meta\x00', &(0x7f0000000200)='./file0\x00', 0x1000, 0x4, &(0x7f0000000880)=[{&(0x7f0000000240)="77ba0daae1b2e74ecd52c59a85bf6f4b1f0b01ab07ba92bc6e57305406115f2bc3e4dd94f19ed896c4fccd34271e9dc3499af9298dbc709e0e6a513d61391d4b198af5f55d24239ae934e8babb8d1cb67bb17b0158", 0x55, 0x3}, {&(0x7f00000002c0)="ae227f954d229f666a6cd22938585e852071e55aa5728addcd315922bf32282e077bdbc63cd5ec89626ee2f8e7982ca239eaa758231056cdca22ca27428407f6c64c384665cfbd00ee6e0d7609f2c7ba0f28b4af70d0307ef78decfe42973915cd509de7c19ea0f3f5c3caaab05f9af08e2cc82d2c14b919dd045e3d36ce1c5d0ff23aed0a4a6ef508b5e71df0a25250d47f1e033ed503b6df99c189111b75b59df679cb75240b756cafecfd203568eeb2c1708fe9f11a2cb0f288590ec76cefbde09c90e9d568492aa5f41196397b70c869838c7164f2bad8eff017d021d7d41c9025c20b", 0xe5, 0x3}, {&(0x7f00000003c0)="792eb6eec33e561f18dc4b58b6a6fb3c7e6fd5e612c08490216ae02617f9811945929cffbf59727393a9a69d57b00a5cd08da3888884b8361d6a4003a54480c1086a5fc876582ff049ede86e2f58d80c7b6cf618e1ba36d4710887bc34ef2b7abbc686df2185f99998060bf492b84e3a02077e2aaf014e1186fde602d2b639d467f48fc2e18cf1553e07ac39040953566ab1d21aac627b166825375377bc3332b62160ea8bf7fc3196b30965dce6181bf7a1c60d0270f24ba60e633c8c88bbdefb5928dc8183c2ce0616de6c3185a4aa7eb2ec6ab7d8394a9536bf7e4f33f76294b0b4a390aca576177671191fe91530e9bd0db79cee", 0xf6, 0x100000000}, {&(0x7f00000004c0)="a90f49b744c1ad7c27bc0a3b1965ca2bce6602b5f5a8b294ced925862d0a9df5c88e43095ba5810ba49c2216e7e1a9b5f07075e6a3101e853557713e983b2f46cf599dc2cba6254802d01794cdc015e28e2b5aa8c10293a4487b3fe2469252f2c2406327b2a5fe71b185ec0adfdc824a237f94", 0x73, 0x7}], 0x21008, &(0x7f0000000900)={[{'.log\x00'}, {'-%('}, {'.log\x00'}], [{@appraise_type='appraise_type=imasig'}, {@fowner_eq={'fowner', 0x3d, 0xee01}}, {@hash='hash'}, {@subj_type={'subj_type', 0x3d, '-&'}}, {@hash='hash'}]}) ioctl$BTRFS_IOC_SUBVOL_SETFLAGS(r3, 0x4008941a, &(0x7f0000000980)=0xfe33b054cbbc4d79) 11:24:35 executing program 3: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x7f, 0x80000000008001}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x9}, 0x0) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000080)) r1 = open(&(0x7f0000000240)='./file1\x00', 0x141142, 0x0) write$UHID_INPUT(r1, &(0x7f0000001440)={0x8, {'\x00>\x00'}}, 0xfffffc41) open(&(0x7f00000001c0)='./file1\x00', 0x0, 0x0) setxattr$trusted_overlay_nlink(&(0x7f0000000000)='./file1\x00', &(0x7f00000000c0)='trusted.overlay.nlink\x00', 0x0, 0x0, 0x0) [ 541.170672][T26407] loop5: detected capacity change from 264192 to 0 11:24:35 executing program 0: r0 = perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x5c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write$binfmt_elf64(r0, &(0x7f0000000540)=ANY=[@ANYBLOB], 0x2c4) r1 = inotify_init() openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) epoll_ctl$EPOLL_CTL_DEL(0xffffffffffffffff, 0x2, 0xffffffffffffffff) inotify_add_watch(r1, &(0x7f0000000000)='.\x00', 0x400017e) r2 = openat$incfs(0xffffffffffffffff, &(0x7f0000000080)='.log\x00', 0x20200, 0x0) fcntl$getownex(r2, 0x10, &(0x7f00000000c0)) r3 = open(&(0x7f0000000040)='./file0\x00', 0x200c2, 0x0) write$binfmt_elf64(r3, &(0x7f0000000080)=ANY=[], 0x8) sendfile(r3, r3, &(0x7f00000001c0), 0xa198) dup(0xffffffffffffffff) r4 = syz_mount_image$gfs2meta(&(0x7f0000000140)='gfs2meta\x00', &(0x7f0000000200)='./file0\x00', 0x1000, 0x4, &(0x7f0000000880)=[{&(0x7f0000000240)="77ba0daae1b2e74ecd52c59a85bf6f4b1f0b01ab07ba92bc6e57305406115f2bc3e4dd94f19ed896c4fccd34271e9dc3499af9298dbc709e0e6a513d61391d4b198af5f55d24239ae934e8babb8d1cb67bb17b0158", 0x55, 0x3}, {&(0x7f00000002c0)="ae227f954d229f666a6cd22938585e852071e55aa5728addcd315922bf32282e077bdbc63cd5ec89626ee2f8e7982ca239eaa758231056cdca22ca27428407f6c64c384665cfbd00ee6e0d7609f2c7ba0f28b4af70d0307ef78decfe42973915cd509de7c19ea0f3f5c3caaab05f9af08e2cc82d2c14b919dd045e3d36ce1c5d0ff23aed0a4a6ef508b5e71df0a25250d47f1e033ed503b6df99c189111b75b59df679cb75240b756cafecfd203568eeb2c1708fe9f11a2cb0f288590ec76cefbde09c90e9d568492aa5f41196397b70c869838c7164f2bad8eff017d021d7d41c9025c20b", 0xe5, 0x3}, {&(0x7f00000003c0)="792eb6eec33e561f18dc4b58b6a6fb3c7e6fd5e612c08490216ae02617f9811945929cffbf59727393a9a69d57b00a5cd08da3888884b8361d6a4003a54480c1086a5fc876582ff049ede86e2f58d80c7b6cf618e1ba36d4710887bc34ef2b7abbc686df2185f99998060bf492b84e3a02077e2aaf014e1186fde602d2b639d467f48fc2e18cf1553e07ac39040953566ab1d21aac627b166825375377bc3332b62160ea8bf7fc3196b30965dce6181bf7a1c60d0270f24ba60e633c8c88bbdefb5928dc8183c2ce0616de6c3185a4aa7eb2ec6ab7d8394a9536bf7e4f33f76294b0b4a390aca576177671191fe91530e9bd0db79cee", 0xf6, 0x100000000}, {&(0x7f00000004c0)="a90f49b744c1ad7c27bc0a3b1965ca2bce6602b5f5a8b294ced925862d0a9df5c88e43095ba5810ba49c2216e7e1a9b5f07075e6a3101e853557713e983b2f46cf599dc2cba6254802d01794cdc015e28e2b5aa8c10293a4487b3fe2469252f2c2406327b2a5fe71b185ec0adfdc824a237f94", 0x73, 0x7}], 0x21008, &(0x7f0000000900)={[{'.log\x00'}, {'-%('}, {'.log\x00'}], [{@obj_user={'obj_user'}}, {@appraise_type='appraise_type=imasig'}, {@fowner_eq={'fowner', 0x3d, 0xee01}}, {@hash='hash'}, {@subj_type={'subj_type', 0x3d, '-&'}}]}) ioctl$BTRFS_IOC_SUBVOL_SETFLAGS(r4, 0x4008941a, &(0x7f0000000980)=0xfe33b054cbbc4d79) 11:24:35 executing program 4: r0 = perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x5c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write$binfmt_elf64(r0, &(0x7f0000000540)=ANY=[@ANYBLOB], 0x2c4) r1 = inotify_init() openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) epoll_ctl$EPOLL_CTL_DEL(0xffffffffffffffff, 0x2, 0xffffffffffffffff) inotify_add_watch(r1, &(0x7f0000000000)='.\x00', 0x400017e) r2 = openat$incfs(0xffffffffffffffff, &(0x7f0000000080)='.log\x00', 0x20200, 0x0) fcntl$getownex(r2, 0x10, &(0x7f00000000c0)) r3 = open(&(0x7f0000000040)='./file0\x00', 0x200c2, 0x0) write$binfmt_elf64(r3, &(0x7f0000000080)=ANY=[], 0x8) sendfile(r3, r3, &(0x7f00000001c0), 0xa198) dup(0xffffffffffffffff) r4 = syz_mount_image$gfs2meta(&(0x7f0000000140)='gfs2meta\x00', &(0x7f0000000200)='./file0\x00', 0x1000, 0x4, &(0x7f0000000880)=[{&(0x7f0000000240)="77ba0daae1b2e74ecd52c59a85bf6f4b1f0b01ab07ba92bc6e57305406115f2bc3e4dd94f19ed896c4fccd34271e9dc3499af9298dbc709e0e6a513d61391d4b198af5f55d24239ae934e8babb8d1cb67bb17b0158", 0x55, 0x3}, {&(0x7f00000002c0)="ae227f954d229f666a6cd22938585e852071e55aa5728addcd315922bf32282e077bdbc63cd5ec89626ee2f8e7982ca239eaa758231056cdca22ca27428407f6c64c384665cfbd00ee6e0d7609f2c7ba0f28b4af70d0307ef78decfe42973915cd509de7c19ea0f3f5c3caaab05f9af08e2cc82d2c14b919dd045e3d36ce1c5d0ff23aed0a4a6ef508b5e71df0a25250d47f1e033ed503b6df99c189111b75b59df679cb75240b756cafecfd203568eeb2c1708fe9f11a2cb0f288590ec76cefbde09c90e9d568492aa5f41196397b70c869838c7164f2bad8eff017d021d7d41c9025c20b", 0xe5, 0x3}, {&(0x7f00000003c0)="792eb6eec33e561f18dc4b58b6a6fb3c7e6fd5e612c08490216ae02617f9811945929cffbf59727393a9a69d57b00a5cd08da3888884b8361d6a4003a54480c1086a5fc876582ff049ede86e2f58d80c7b6cf618e1ba36d4710887bc34ef2b7abbc686df2185f99998060bf492b84e3a02077e2aaf014e1186fde602d2b639d467f48fc2e18cf1553e07ac39040953566ab1d21aac627b166825375377bc3332b62160ea8bf7fc3196b30965dce6181bf7a1c60d0270f24ba60e633c8c88bbdefb5928dc8183c2ce0616de6c3185a4aa7eb2ec6ab7d8394a9536bf7e4f33f76294b0b4a390aca576177671191fe91530e9bd0db79cee", 0xf6, 0x100000000}, {&(0x7f00000004c0)="a90f49b744c1ad7c27bc0a3b1965ca2bce6602b5f5a8b294ced925862d0a9df5c88e43095ba5810ba49c2216e7e1a9b5f07075e6a3101e853557713e983b2f46cf599dc2cba6254802d01794cdc015e28e2b5aa8c10293a4487b3fe2469252f2c2406327b2a5fe71b185ec0adfdc824a237f94", 0x73, 0x7}], 0x21008, &(0x7f0000000900)={[{'.log\x00'}, {'-%('}, {'.log\x00'}], [{@obj_user={'obj_user'}}, {@appraise_type='appraise_type=imasig'}, {@fowner_eq={'fowner', 0x3d, 0xee01}}, {@hash='hash'}, {@subj_type={'subj_type', 0x3d, '-&'}}]}) ioctl$BTRFS_IOC_SUBVOL_SETFLAGS(r4, 0x4008941a, &(0x7f0000000980)=0xfe33b054cbbc4d79) [ 541.399269][T26414] loop0: detected capacity change from 264192 to 0 [ 541.522084][T26423] loop4: detected capacity change from 264192 to 0 11:24:35 executing program 2: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x7f, 0x80000000008001}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x9}, 0x0) r1 = open(&(0x7f0000000240)='./file1\x00', 0x141142, 0x0) write$UHID_INPUT(r1, &(0x7f0000001440)={0x8, {'\x00A\x00'}}, 0xfffffc41) open(&(0x7f00000001c0)='./file1\x00', 0x0, 0x0) setxattr$trusted_overlay_nlink(&(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x0, 0x0) 11:24:35 executing program 5: write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000540)=ANY=[@ANYBLOB="7f454c4601061f000400000000000000030038000800000032000000000000004000000000000000560200000000000007000000008038000100090002000100010000000100000006000000000000000400000000000000060000000000000001040000000000000200000000000000010000000000000051e574640400000001000000000000000400000000000000050000000000000005000000000000000400000000000000ff24444700000000908bc001727fbcd44f4d3bf922995edf2fd379eb00"/489], 0x2c4) inotify_init() r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) epoll_ctl$EPOLL_CTL_DEL(0xffffffffffffffff, 0x2, r0) inotify_add_watch(0xffffffffffffffff, &(0x7f0000000000)='.\x00', 0x400017e) r1 = openat$incfs(0xffffffffffffffff, &(0x7f0000000080)='.log\x00', 0x20200, 0x40) fcntl$getownex(r1, 0x10, &(0x7f00000000c0)) r2 = open(&(0x7f0000000040)='./file0\x00', 0x200c2, 0x0) write$binfmt_elf64(r2, &(0x7f0000000080)=ANY=[], 0x8) sendfile(r2, r2, &(0x7f00000001c0), 0xa198) dup(0xffffffffffffffff) r3 = syz_mount_image$gfs2meta(&(0x7f0000000140)='gfs2meta\x00', &(0x7f0000000200)='./file0\x00', 0x1000, 0x4, &(0x7f0000000880)=[{&(0x7f0000000240)="77ba0daae1b2e74ecd52c59a85bf6f4b1f0b01ab07ba92bc6e57305406115f2bc3e4dd94f19ed896c4fccd34271e9dc3499af9298dbc709e0e6a513d61391d4b198af5f55d24239ae934e8babb8d1cb67bb17b0158", 0x55, 0x3}, {&(0x7f00000002c0)="ae227f954d229f666a6cd22938585e852071e55aa5728addcd315922bf32282e077bdbc63cd5ec89626ee2f8e7982ca239eaa758231056cdca22ca27428407f6c64c384665cfbd00ee6e0d7609f2c7ba0f28b4af70d0307ef78decfe42973915cd509de7c19ea0f3f5c3caaab05f9af08e2cc82d2c14b919dd045e3d36ce1c5d0ff23aed0a4a6ef508b5e71df0a25250d47f1e033ed503b6df99c189111b75b59df679cb75240b756cafecfd203568eeb2c1708fe9f11a2cb0f288590ec76cefbde09c90e9d568492aa5f41196397b70c869838c7164f2bad8eff017d021d7d41c9025c20b", 0xe5, 0x3}, {&(0x7f00000003c0)="792eb6eec33e561f18dc4b58b6a6fb3c7e6fd5e612c08490216ae02617f9811945929cffbf59727393a9a69d57b00a5cd08da3888884b8361d6a4003a54480c1086a5fc876582ff049ede86e2f58d80c7b6cf618e1ba36d4710887bc34ef2b7abbc686df2185f99998060bf492b84e3a02077e2aaf014e1186fde602d2b639d467f48fc2e18cf1553e07ac39040953566ab1d21aac627b166825375377bc3332b62160ea8bf7fc3196b30965dce6181bf7a1c60d0270f24ba60e633c8c88bbdefb5928dc8183c2ce0616de6c3185a4aa7eb2ec6ab7d8394a9536bf7e4f33f76294b0b4a390aca576177671191fe91530e9bd0db79cee", 0xf6, 0x100000000}, {&(0x7f00000004c0)="a90f49b744c1ad7c27bc0a3b1965ca2bce6602b5f5a8b294ced925862d0a9df5c88e43095ba5810ba49c2216e7e1a9b5f07075e6a3101e853557713e983b2f46cf599dc2cba6254802d01794cdc015e28e2b5aa8c10293a4487b3fe2469252f2c2406327b2a5fe71b185ec0adfdc824a237f94", 0x73, 0x7}], 0x21008, &(0x7f0000000900)={[{'.log\x00'}, {'-%('}, {'.log\x00'}], [{@appraise_type='appraise_type=imasig'}, {@fowner_eq={'fowner', 0x3d, 0xee01}}, {@hash='hash'}, {@subj_type={'subj_type', 0x3d, '-&'}}, {@hash='hash'}]}) ioctl$BTRFS_IOC_SUBVOL_SETFLAGS(r3, 0x4008941a, &(0x7f0000000980)=0xfe33b054cbbc4d79) 11:24:36 executing program 1: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x7f, 0x80000000008001}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x9}, 0x0) r1 = open(&(0x7f0000000240)='./file1\x00', 0x141142, 0x0) write$UHID_INPUT(r1, &(0x7f0000001440), 0xfffffc41) open(&(0x7f00000001c0)='./file1\x00', 0x0, 0x40000000) setxattr$trusted_overlay_nlink(&(0x7f0000000000)='./file1\x00', &(0x7f00000000c0)='trusted.overlay.nlink\x00', 0x0, 0x0, 0x0) 11:24:36 executing program 4: write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000540)=ANY=[@ANYBLOB="7f454c4601061f000400000000000000030038000800000032000000000000004000000000000000560200000000000007000000008038000100090002000100010000000100000006000000000000000400000000000000060000000000000001040000000000000200000000000000010000000000000051e574640400000001000000000000000400000000000000050000000000000005000000000000000400000000000000ff24444700000000908bc001727fbcd44f4d3bf922995edf2fd379eb00"/489], 0x2c4) r0 = inotify_init() openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) epoll_ctl$EPOLL_CTL_DEL(0xffffffffffffffff, 0x2, 0xffffffffffffffff) inotify_add_watch(r0, &(0x7f0000000000)='.\x00', 0x400017e) r1 = openat$incfs(0xffffffffffffffff, &(0x7f0000000080)='.log\x00', 0x20200, 0x40) fcntl$getownex(r1, 0x10, &(0x7f00000000c0)) r2 = open(&(0x7f0000000040)='./file0\x00', 0x200c2, 0x0) write$binfmt_elf64(r2, &(0x7f0000000080)=ANY=[], 0x8) sendfile(r2, r2, &(0x7f00000001c0), 0xa198) dup(0xffffffffffffffff) r3 = syz_mount_image$gfs2meta(&(0x7f0000000140)='gfs2meta\x00', &(0x7f0000000200)='./file0\x00', 0x1000, 0x4, &(0x7f0000000880)=[{&(0x7f0000000240)="77ba0daae1b2e74ecd52c59a85bf6f4b1f0b01ab07ba92bc6e57305406115f2bc3e4dd94f19ed896c4fccd34271e9dc3499af9298dbc709e0e6a513d61391d4b198af5f55d24239ae934e8babb8d1cb67bb17b0158", 0x55, 0x3}, {&(0x7f00000002c0)="ae227f954d229f666a6cd22938585e852071e55aa5728addcd315922bf32282e077bdbc63cd5ec89626ee2f8e7982ca239eaa758231056cdca22ca27428407f6c64c384665cfbd00ee6e0d7609f2c7ba0f28b4af70d0307ef78decfe42973915cd509de7c19ea0f3f5c3caaab05f9af08e2cc82d2c14b919dd045e3d36ce1c5d0ff23aed0a4a6ef508b5e71df0a25250d47f1e033ed503b6df99c189111b75b59df679cb75240b756cafecfd203568eeb2c1708fe9f11a2cb0f288590ec76cefbde09c90e9d568492aa5f41196397b70c869838c7164f2bad8eff017d021d7d41c9025c20b", 0xe5, 0x3}, {&(0x7f00000003c0)="792eb6eec33e561f18dc4b58b6a6fb3c7e6fd5e612c08490216ae02617f9811945929cffbf59727393a9a69d57b00a5cd08da3888884b8361d6a4003a54480c1086a5fc876582ff049ede86e2f58d80c7b6cf618e1ba36d4710887bc34ef2b7abbc686df2185f99998060bf492b84e3a02077e2aaf014e1186fde602d2b639d467f48fc2e18cf1553e07ac39040953566ab1d21aac627b166825375377bc3332b62160ea8bf7fc3196b30965dce6181bf7a1c60d0270f24ba60e633c8c88bbdefb5928dc8183c2ce0616de6c3185a4aa7eb2ec6ab7d8394a9536bf7e4f33f76294b0b4a390aca576177671191fe91530e9bd0db79cee", 0xf6, 0x100000000}, {&(0x7f00000004c0)="a90f49b744c1ad7c27bc0a3b1965ca2bce6602b5f5a8b294ced925862d0a9df5c88e43095ba5810ba49c2216e7e1a9b5f07075e6a3101e853557713e983b2f46cf599dc2cba6254802d01794cdc015e28e2b5aa8c10293a4487b3fe2469252f2c2406327b2a5fe71b185ec0adfdc824a237f94", 0x73, 0x7}], 0x21008, &(0x7f0000000900)={[{'.log\x00'}, {'-%('}, {'.log\x00'}], [{@appraise_type='appraise_type=imasig'}, {@fowner_eq={'fowner', 0x3d, 0xee01}}, {@hash='hash'}, {@subj_type={'subj_type', 0x3d, '-&'}}, {@hash='hash'}]}) ioctl$BTRFS_IOC_SUBVOL_SETFLAGS(r3, 0x4008941a, &(0x7f0000000980)=0xfe33b054cbbc4d79) [ 542.030800][T26439] loop5: detected capacity change from 264192 to 0 [ 542.125167][T26445] loop4: detected capacity change from 264192 to 0 11:24:36 executing program 0: r0 = perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x5c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write$binfmt_elf64(r0, &(0x7f0000000540)=ANY=[@ANYBLOB], 0x2c4) r1 = inotify_init() openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) epoll_ctl$EPOLL_CTL_DEL(0xffffffffffffffff, 0x2, 0xffffffffffffffff) inotify_add_watch(r1, &(0x7f0000000000)='.\x00', 0x400017e) openat$incfs(0xffffffffffffffff, &(0x7f0000000080)='.log\x00', 0x20200, 0x40) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f00000000c0)) r2 = open(&(0x7f0000000040)='./file0\x00', 0x200c2, 0x0) write$binfmt_elf64(r2, &(0x7f0000000080)=ANY=[], 0x8) sendfile(r2, r2, &(0x7f00000001c0), 0xa198) dup(0xffffffffffffffff) r3 = syz_mount_image$gfs2meta(&(0x7f0000000140)='gfs2meta\x00', &(0x7f0000000200)='./file0\x00', 0x1000, 0x4, &(0x7f0000000880)=[{&(0x7f0000000240)="77ba0daae1b2e74ecd52c59a85bf6f4b1f0b01ab07ba92bc6e57305406115f2bc3e4dd94f19ed896c4fccd34271e9dc3499af9298dbc709e0e6a513d61391d4b198af5f55d24239ae934e8babb8d1cb67bb17b0158", 0x55, 0x3}, {&(0x7f00000002c0)="ae227f954d229f666a6cd22938585e852071e55aa5728addcd315922bf32282e077bdbc63cd5ec89626ee2f8e7982ca239eaa758231056cdca22ca27428407f6c64c384665cfbd00ee6e0d7609f2c7ba0f28b4af70d0307ef78decfe42973915cd509de7c19ea0f3f5c3caaab05f9af08e2cc82d2c14b919dd045e3d36ce1c5d0ff23aed0a4a6ef508b5e71df0a25250d47f1e033ed503b6df99c189111b75b59df679cb75240b756cafecfd203568eeb2c1708fe9f11a2cb0f288590ec76cefbde09c90e9d568492aa5f41196397b70c869838c7164f2bad8eff017d021d7d41c9025c20b", 0xe5, 0x3}, {&(0x7f00000003c0)="792eb6eec33e561f18dc4b58b6a6fb3c7e6fd5e612c08490216ae02617f9811945929cffbf59727393a9a69d57b00a5cd08da3888884b8361d6a4003a54480c1086a5fc876582ff049ede86e2f58d80c7b6cf618e1ba36d4710887bc34ef2b7abbc686df2185f99998060bf492b84e3a02077e2aaf014e1186fde602d2b639d467f48fc2e18cf1553e07ac39040953566ab1d21aac627b166825375377bc3332b62160ea8bf7fc3196b30965dce6181bf7a1c60d0270f24ba60e633c8c88bbdefb5928dc8183c2ce0616de6c3185a4aa7eb2ec6ab7d8394a9536bf7e4f33f76294b0b4a390aca576177671191fe91530e9bd0db79cee", 0xf6, 0x100000000}, {&(0x7f00000004c0)="a90f49b744c1ad7c27bc0a3b1965ca2bce6602b5f5a8b294ced925862d0a9df5c88e43095ba5810ba49c2216e7e1a9b5f07075e6a3101e853557713e983b2f46cf599dc2cba6254802d01794cdc015e28e2b5aa8c10293a4487b3fe2469252f2c2406327b2a5fe71b185ec0adfdc824a237f94", 0x73, 0x7}], 0x21008, &(0x7f0000000900)={[{'.log\x00'}, {'-%('}, {'.log\x00'}], [{@obj_user={'obj_user'}}, {@appraise_type='appraise_type=imasig'}, {@fowner_eq={'fowner', 0x3d, 0xee01}}, {@hash='hash'}, {@subj_type={'subj_type', 0x3d, '-&'}}]}) ioctl$BTRFS_IOC_SUBVOL_SETFLAGS(r3, 0x4008941a, &(0x7f0000000980)=0xfe33b054cbbc4d79) 11:24:36 executing program 2: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x7f, 0x80000000008001}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x9}, 0x0) r1 = open(&(0x7f0000000240)='./file1\x00', 0x141142, 0x0) write$UHID_INPUT(r1, &(0x7f0000001440)={0x8, {'\x00B\x00'}}, 0xfffffc41) open(&(0x7f00000001c0)='./file1\x00', 0x0, 0x0) setxattr$trusted_overlay_nlink(&(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x0, 0x0) [ 542.363556][T26456] loop0: detected capacity change from 264192 to 0 11:24:36 executing program 3: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x7f, 0x80000000008001}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x9}, 0x0) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000080)) r1 = open(&(0x7f0000000240)='./file1\x00', 0x141142, 0x0) write$UHID_INPUT(r1, &(0x7f0000001440)={0x8, {'\x00?\x00'}}, 0xfffffc41) open(&(0x7f00000001c0)='./file1\x00', 0x0, 0x0) setxattr$trusted_overlay_nlink(&(0x7f0000000000)='./file1\x00', &(0x7f00000000c0)='trusted.overlay.nlink\x00', 0x0, 0x0, 0x0) 11:24:36 executing program 5: write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000540)=ANY=[@ANYBLOB="7f454c4601061f000400000000000000030038000800000032000000000000004000000000000000560200000000000007000000008038000100090002000100010000000100000006000000000000000400000000000000060000000000000001040000000000000200000000000000010000000000000051e574640400000001000000000000000400000000000000050000000000000005000000000000000400000000000000ff24444700000000908bc001727fbcd44f4d3bf922995edf2fd379eb00"/489], 0x2c4) inotify_init() r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) epoll_ctl$EPOLL_CTL_DEL(0xffffffffffffffff, 0x2, r0) inotify_add_watch(0xffffffffffffffff, &(0x7f0000000000)='.\x00', 0x400017e) r1 = openat$incfs(0xffffffffffffffff, &(0x7f0000000080)='.log\x00', 0x20200, 0x40) fcntl$getownex(r1, 0x10, &(0x7f00000000c0)) r2 = open(&(0x7f0000000040)='./file0\x00', 0x200c2, 0x0) write$binfmt_elf64(r2, &(0x7f0000000080)=ANY=[], 0x8) sendfile(r2, r2, &(0x7f00000001c0), 0xa198) dup(0xffffffffffffffff) r3 = syz_mount_image$gfs2meta(&(0x7f0000000140)='gfs2meta\x00', &(0x7f0000000200)='./file0\x00', 0x1000, 0x4, &(0x7f0000000880)=[{&(0x7f0000000240)="77ba0daae1b2e74ecd52c59a85bf6f4b1f0b01ab07ba92bc6e57305406115f2bc3e4dd94f19ed896c4fccd34271e9dc3499af9298dbc709e0e6a513d61391d4b198af5f55d24239ae934e8babb8d1cb67bb17b0158", 0x55, 0x3}, {&(0x7f00000002c0)="ae227f954d229f666a6cd22938585e852071e55aa5728addcd315922bf32282e077bdbc63cd5ec89626ee2f8e7982ca239eaa758231056cdca22ca27428407f6c64c384665cfbd00ee6e0d7609f2c7ba0f28b4af70d0307ef78decfe42973915cd509de7c19ea0f3f5c3caaab05f9af08e2cc82d2c14b919dd045e3d36ce1c5d0ff23aed0a4a6ef508b5e71df0a25250d47f1e033ed503b6df99c189111b75b59df679cb75240b756cafecfd203568eeb2c1708fe9f11a2cb0f288590ec76cefbde09c90e9d568492aa5f41196397b70c869838c7164f2bad8eff017d021d7d41c9025c20b", 0xe5, 0x3}, {&(0x7f00000003c0)="792eb6eec33e561f18dc4b58b6a6fb3c7e6fd5e612c08490216ae02617f9811945929cffbf59727393a9a69d57b00a5cd08da3888884b8361d6a4003a54480c1086a5fc876582ff049ede86e2f58d80c7b6cf618e1ba36d4710887bc34ef2b7abbc686df2185f99998060bf492b84e3a02077e2aaf014e1186fde602d2b639d467f48fc2e18cf1553e07ac39040953566ab1d21aac627b166825375377bc3332b62160ea8bf7fc3196b30965dce6181bf7a1c60d0270f24ba60e633c8c88bbdefb5928dc8183c2ce0616de6c3185a4aa7eb2ec6ab7d8394a9536bf7e4f33f76294b0b4a390aca576177671191fe91530e9bd0db79cee", 0xf6, 0x100000000}, {&(0x7f00000004c0)="a90f49b744c1ad7c27bc0a3b1965ca2bce6602b5f5a8b294ced925862d0a9df5c88e43095ba5810ba49c2216e7e1a9b5f07075e6a3101e853557713e983b2f46cf599dc2cba6254802d01794cdc015e28e2b5aa8c10293a4487b3fe2469252f2c2406327b2a5fe71b185ec0adfdc824a237f94", 0x73, 0x7}], 0x21008, &(0x7f0000000900)={[{'.log\x00'}, {'-%('}, {'.log\x00'}], [{@appraise_type='appraise_type=imasig'}, {@fowner_eq={'fowner', 0x3d, 0xee01}}, {@hash='hash'}, {@subj_type={'subj_type', 0x3d, '-&'}}, {@hash='hash'}]}) ioctl$BTRFS_IOC_SUBVOL_SETFLAGS(r3, 0x4008941a, &(0x7f0000000980)=0xfe33b054cbbc4d79) 11:24:37 executing program 1: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x7f, 0x80000000008001}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x9}, 0x0) r1 = open(&(0x7f0000000240)='./file1\x00', 0x141142, 0x0) write$UHID_INPUT(r1, &(0x7f0000001440), 0xfffffc41) open(&(0x7f00000001c0)='./file1\x00', 0x0, 0x48000000) setxattr$trusted_overlay_nlink(&(0x7f0000000000)='./file1\x00', &(0x7f00000000c0)='trusted.overlay.nlink\x00', 0x0, 0x0, 0x0) [ 542.962899][T26476] loop5: detected capacity change from 264192 to 0 11:24:37 executing program 4: write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000540)=ANY=[@ANYBLOB="7f454c4601061f000400000000000000030038000800000032000000000000004000000000000000560200000000000007000000008038000100090002000100010000000100000006000000000000000400000000000000060000000000000001040000000000000200000000000000010000000000000051e574640400000001000000000000000400000000000000050000000000000005000000000000000400000000000000ff24444700000000908bc001727fbcd44f4d3bf922995edf2fd379eb00"/489], 0x2c4) inotify_init() r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) epoll_ctl$EPOLL_CTL_DEL(0xffffffffffffffff, 0x2, r0) inotify_add_watch(0xffffffffffffffff, &(0x7f0000000000)='.\x00', 0x400017e) r1 = openat$incfs(0xffffffffffffffff, &(0x7f0000000080)='.log\x00', 0x20200, 0x40) fcntl$getownex(r1, 0x10, &(0x7f00000000c0)) r2 = open(&(0x7f0000000040)='./file0\x00', 0x200c2, 0x0) write$binfmt_elf64(r2, &(0x7f0000000080)=ANY=[], 0x8) sendfile(r2, r2, &(0x7f00000001c0), 0xa198) dup(0xffffffffffffffff) r3 = syz_mount_image$gfs2meta(&(0x7f0000000140)='gfs2meta\x00', &(0x7f0000000200)='./file0\x00', 0x1000, 0x4, &(0x7f0000000880)=[{&(0x7f0000000240)="77ba0daae1b2e74ecd52c59a85bf6f4b1f0b01ab07ba92bc6e57305406115f2bc3e4dd94f19ed896c4fccd34271e9dc3499af9298dbc709e0e6a513d61391d4b198af5f55d24239ae934e8babb8d1cb67bb17b0158", 0x55, 0x3}, {&(0x7f00000002c0)="ae227f954d229f666a6cd22938585e852071e55aa5728addcd315922bf32282e077bdbc63cd5ec89626ee2f8e7982ca239eaa758231056cdca22ca27428407f6c64c384665cfbd00ee6e0d7609f2c7ba0f28b4af70d0307ef78decfe42973915cd509de7c19ea0f3f5c3caaab05f9af08e2cc82d2c14b919dd045e3d36ce1c5d0ff23aed0a4a6ef508b5e71df0a25250d47f1e033ed503b6df99c189111b75b59df679cb75240b756cafecfd203568eeb2c1708fe9f11a2cb0f288590ec76cefbde09c90e9d568492aa5f41196397b70c869838c7164f2bad8eff017d021d7d41c9025c20b", 0xe5, 0x3}, {&(0x7f00000003c0)="792eb6eec33e561f18dc4b58b6a6fb3c7e6fd5e612c08490216ae02617f9811945929cffbf59727393a9a69d57b00a5cd08da3888884b8361d6a4003a54480c1086a5fc876582ff049ede86e2f58d80c7b6cf618e1ba36d4710887bc34ef2b7abbc686df2185f99998060bf492b84e3a02077e2aaf014e1186fde602d2b639d467f48fc2e18cf1553e07ac39040953566ab1d21aac627b166825375377bc3332b62160ea8bf7fc3196b30965dce6181bf7a1c60d0270f24ba60e633c8c88bbdefb5928dc8183c2ce0616de6c3185a4aa7eb2ec6ab7d8394a9536bf7e4f33f76294b0b4a390aca576177671191fe91530e9bd0db79cee", 0xf6, 0x100000000}, {&(0x7f00000004c0)="a90f49b744c1ad7c27bc0a3b1965ca2bce6602b5f5a8b294ced925862d0a9df5c88e43095ba5810ba49c2216e7e1a9b5f07075e6a3101e853557713e983b2f46cf599dc2cba6254802d01794cdc015e28e2b5aa8c10293a4487b3fe2469252f2c2406327b2a5fe71b185ec0adfdc824a237f94", 0x73, 0x7}], 0x21008, &(0x7f0000000900)={[{'.log\x00'}, {'-%('}, {'.log\x00'}], [{@appraise_type='appraise_type=imasig'}, {@fowner_eq={'fowner', 0x3d, 0xee01}}, {@hash='hash'}, {@subj_type={'subj_type', 0x3d, '-&'}}, {@hash='hash'}]}) ioctl$BTRFS_IOC_SUBVOL_SETFLAGS(r3, 0x4008941a, &(0x7f0000000980)=0xfe33b054cbbc4d79) 11:24:37 executing program 0: r0 = perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x5c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write$binfmt_elf64(r0, &(0x7f0000000540)=ANY=[@ANYBLOB], 0x2c4) r1 = inotify_init() openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) epoll_ctl$EPOLL_CTL_DEL(0xffffffffffffffff, 0x2, 0xffffffffffffffff) inotify_add_watch(r1, &(0x7f0000000000)='.\x00', 0x400017e) openat$incfs(0xffffffffffffffff, &(0x7f0000000080)='.log\x00', 0x20200, 0x40) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f00000000c0)) r2 = open(&(0x7f0000000040)='./file0\x00', 0x200c2, 0x0) write$binfmt_elf64(r2, &(0x7f0000000080)=ANY=[], 0x8) sendfile(r2, r2, &(0x7f00000001c0), 0xa198) dup(0xffffffffffffffff) r3 = syz_mount_image$gfs2meta(&(0x7f0000000140)='gfs2meta\x00', &(0x7f0000000200)='./file0\x00', 0x1000, 0x4, &(0x7f0000000880)=[{&(0x7f0000000240)="77ba0daae1b2e74ecd52c59a85bf6f4b1f0b01ab07ba92bc6e57305406115f2bc3e4dd94f19ed896c4fccd34271e9dc3499af9298dbc709e0e6a513d61391d4b198af5f55d24239ae934e8babb8d1cb67bb17b0158", 0x55, 0x3}, {&(0x7f00000002c0)="ae227f954d229f666a6cd22938585e852071e55aa5728addcd315922bf32282e077bdbc63cd5ec89626ee2f8e7982ca239eaa758231056cdca22ca27428407f6c64c384665cfbd00ee6e0d7609f2c7ba0f28b4af70d0307ef78decfe42973915cd509de7c19ea0f3f5c3caaab05f9af08e2cc82d2c14b919dd045e3d36ce1c5d0ff23aed0a4a6ef508b5e71df0a25250d47f1e033ed503b6df99c189111b75b59df679cb75240b756cafecfd203568eeb2c1708fe9f11a2cb0f288590ec76cefbde09c90e9d568492aa5f41196397b70c869838c7164f2bad8eff017d021d7d41c9025c20b", 0xe5, 0x3}, {&(0x7f00000003c0)="792eb6eec33e561f18dc4b58b6a6fb3c7e6fd5e612c08490216ae02617f9811945929cffbf59727393a9a69d57b00a5cd08da3888884b8361d6a4003a54480c1086a5fc876582ff049ede86e2f58d80c7b6cf618e1ba36d4710887bc34ef2b7abbc686df2185f99998060bf492b84e3a02077e2aaf014e1186fde602d2b639d467f48fc2e18cf1553e07ac39040953566ab1d21aac627b166825375377bc3332b62160ea8bf7fc3196b30965dce6181bf7a1c60d0270f24ba60e633c8c88bbdefb5928dc8183c2ce0616de6c3185a4aa7eb2ec6ab7d8394a9536bf7e4f33f76294b0b4a390aca576177671191fe91530e9bd0db79cee", 0xf6, 0x100000000}, {&(0x7f00000004c0)="a90f49b744c1ad7c27bc0a3b1965ca2bce6602b5f5a8b294ced925862d0a9df5c88e43095ba5810ba49c2216e7e1a9b5f07075e6a3101e853557713e983b2f46cf599dc2cba6254802d01794cdc015e28e2b5aa8c10293a4487b3fe2469252f2c2406327b2a5fe71b185ec0adfdc824a237f94", 0x73, 0x7}], 0x21008, &(0x7f0000000900)={[{'.log\x00'}, {'-%('}, {'.log\x00'}], [{@obj_user={'obj_user'}}, {@appraise_type='appraise_type=imasig'}, {@fowner_eq={'fowner', 0x3d, 0xee01}}, {@hash='hash'}, {@subj_type={'subj_type', 0x3d, '-&'}}]}) ioctl$BTRFS_IOC_SUBVOL_SETFLAGS(r3, 0x4008941a, &(0x7f0000000980)=0xfe33b054cbbc4d79) [ 543.150700][T26483] loop4: detected capacity change from 264192 to 0 [ 543.304307][T26495] loop0: detected capacity change from 264192 to 0 11:24:37 executing program 2: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x7f, 0x80000000008001}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x9}, 0x0) r1 = open(&(0x7f0000000240)='./file1\x00', 0x141142, 0x0) write$UHID_INPUT(r1, &(0x7f0000001440)={0x8, {'\x00C\x00'}}, 0xfffffc41) open(&(0x7f00000001c0)='./file1\x00', 0x0, 0x0) setxattr$trusted_overlay_nlink(&(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x0, 0x0) 11:24:37 executing program 5: write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000540)=ANY=[@ANYBLOB="7f454c4601061f000400000000000000030038000800000032000000000000004000000000000000560200000000000007000000008038000100090002000100010000000100000006000000000000000400000000000000060000000000000001040000000000000200000000000000010000000000000051e574640400000001000000000000000400000000000000050000000000000005000000000000000400000000000000ff24444700000000908bc001727fbcd44f4d3bf922995edf2fd379eb00"/489], 0x2c4) r0 = inotify_init() r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) epoll_ctl$EPOLL_CTL_DEL(0xffffffffffffffff, 0x2, r1) inotify_add_watch(r0, 0x0, 0x400017e) r2 = openat$incfs(0xffffffffffffffff, &(0x7f0000000080)='.log\x00', 0x20200, 0x40) fcntl$getownex(r2, 0x10, &(0x7f00000000c0)) r3 = open(&(0x7f0000000040)='./file0\x00', 0x200c2, 0x0) write$binfmt_elf64(r3, &(0x7f0000000080)=ANY=[], 0x8) sendfile(r3, r3, &(0x7f00000001c0), 0xa198) dup(0xffffffffffffffff) r4 = syz_mount_image$gfs2meta(&(0x7f0000000140)='gfs2meta\x00', &(0x7f0000000200)='./file0\x00', 0x1000, 0x4, &(0x7f0000000880)=[{&(0x7f0000000240)="77ba0daae1b2e74ecd52c59a85bf6f4b1f0b01ab07ba92bc6e57305406115f2bc3e4dd94f19ed896c4fccd34271e9dc3499af9298dbc709e0e6a513d61391d4b198af5f55d24239ae934e8babb8d1cb67bb17b0158", 0x55, 0x3}, {&(0x7f00000002c0)="ae227f954d229f666a6cd22938585e852071e55aa5728addcd315922bf32282e077bdbc63cd5ec89626ee2f8e7982ca239eaa758231056cdca22ca27428407f6c64c384665cfbd00ee6e0d7609f2c7ba0f28b4af70d0307ef78decfe42973915cd509de7c19ea0f3f5c3caaab05f9af08e2cc82d2c14b919dd045e3d36ce1c5d0ff23aed0a4a6ef508b5e71df0a25250d47f1e033ed503b6df99c189111b75b59df679cb75240b756cafecfd203568eeb2c1708fe9f11a2cb0f288590ec76cefbde09c90e9d568492aa5f41196397b70c869838c7164f2bad8eff017d021d7d41c9025c20b", 0xe5, 0x3}, {&(0x7f00000003c0)="792eb6eec33e561f18dc4b58b6a6fb3c7e6fd5e612c08490216ae02617f9811945929cffbf59727393a9a69d57b00a5cd08da3888884b8361d6a4003a54480c1086a5fc876582ff049ede86e2f58d80c7b6cf618e1ba36d4710887bc34ef2b7abbc686df2185f99998060bf492b84e3a02077e2aaf014e1186fde602d2b639d467f48fc2e18cf1553e07ac39040953566ab1d21aac627b166825375377bc3332b62160ea8bf7fc3196b30965dce6181bf7a1c60d0270f24ba60e633c8c88bbdefb5928dc8183c2ce0616de6c3185a4aa7eb2ec6ab7d8394a9536bf7e4f33f76294b0b4a390aca576177671191fe91530e9bd0db79cee", 0xf6, 0x100000000}, {&(0x7f00000004c0)="a90f49b744c1ad7c27bc0a3b1965ca2bce6602b5f5a8b294ced925862d0a9df5c88e43095ba5810ba49c2216e7e1a9b5f07075e6a3101e853557713e983b2f46cf599dc2cba6254802d01794cdc015e28e2b5aa8c10293a4487b3fe2469252f2c2406327b2a5fe71b185ec0adfdc824a237f94", 0x73, 0x7}], 0x21008, &(0x7f0000000900)={[{'.log\x00'}, {'-%('}, {'.log\x00'}], [{@appraise_type='appraise_type=imasig'}, {@fowner_eq={'fowner', 0x3d, 0xee01}}, {@hash='hash'}, {@subj_type={'subj_type', 0x3d, '-&'}}, {@hash='hash'}]}) ioctl$BTRFS_IOC_SUBVOL_SETFLAGS(r4, 0x4008941a, &(0x7f0000000980)=0xfe33b054cbbc4d79) 11:24:37 executing program 3: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x7f, 0x80000000008001}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x9}, 0x0) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000080)) r1 = open(&(0x7f0000000240)='./file1\x00', 0x141142, 0x0) write$UHID_INPUT(r1, &(0x7f0000001440)={0x8, {'\x00@\x00'}}, 0xfffffc41) open(&(0x7f00000001c0)='./file1\x00', 0x0, 0x0) setxattr$trusted_overlay_nlink(&(0x7f0000000000)='./file1\x00', &(0x7f00000000c0)='trusted.overlay.nlink\x00', 0x0, 0x0, 0x0) [ 543.792378][T26510] loop5: detected capacity change from 264192 to 0 11:24:38 executing program 4: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x7f, 0x80000000008001}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x9}, 0x0) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000080)) r1 = open(&(0x7f0000000240)='./file1\x00', 0x141142, 0x0) write$UHID_INPUT(r1, &(0x7f0000001440)={0x8, {'\x00?\x00'}}, 0xfffffc41) open(&(0x7f00000001c0)='./file1\x00', 0x0, 0x0) setxattr$trusted_overlay_nlink(&(0x7f0000000000)='./file1\x00', &(0x7f00000000c0)='trusted.overlay.nlink\x00', 0x0, 0x0, 0x0) 11:24:38 executing program 0: r0 = perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x5c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write$binfmt_elf64(r0, &(0x7f0000000540)=ANY=[@ANYBLOB], 0x2c4) r1 = inotify_init() openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) epoll_ctl$EPOLL_CTL_DEL(0xffffffffffffffff, 0x2, 0xffffffffffffffff) inotify_add_watch(r1, &(0x7f0000000000)='.\x00', 0x400017e) openat$incfs(0xffffffffffffffff, &(0x7f0000000080)='.log\x00', 0x20200, 0x40) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f00000000c0)) r2 = open(&(0x7f0000000040)='./file0\x00', 0x200c2, 0x0) write$binfmt_elf64(r2, &(0x7f0000000080)=ANY=[], 0x8) sendfile(r2, r2, &(0x7f00000001c0), 0xa198) dup(0xffffffffffffffff) r3 = syz_mount_image$gfs2meta(&(0x7f0000000140)='gfs2meta\x00', &(0x7f0000000200)='./file0\x00', 0x1000, 0x4, &(0x7f0000000880)=[{&(0x7f0000000240)="77ba0daae1b2e74ecd52c59a85bf6f4b1f0b01ab07ba92bc6e57305406115f2bc3e4dd94f19ed896c4fccd34271e9dc3499af9298dbc709e0e6a513d61391d4b198af5f55d24239ae934e8babb8d1cb67bb17b0158", 0x55, 0x3}, {&(0x7f00000002c0)="ae227f954d229f666a6cd22938585e852071e55aa5728addcd315922bf32282e077bdbc63cd5ec89626ee2f8e7982ca239eaa758231056cdca22ca27428407f6c64c384665cfbd00ee6e0d7609f2c7ba0f28b4af70d0307ef78decfe42973915cd509de7c19ea0f3f5c3caaab05f9af08e2cc82d2c14b919dd045e3d36ce1c5d0ff23aed0a4a6ef508b5e71df0a25250d47f1e033ed503b6df99c189111b75b59df679cb75240b756cafecfd203568eeb2c1708fe9f11a2cb0f288590ec76cefbde09c90e9d568492aa5f41196397b70c869838c7164f2bad8eff017d021d7d41c9025c20b", 0xe5, 0x3}, {&(0x7f00000003c0)="792eb6eec33e561f18dc4b58b6a6fb3c7e6fd5e612c08490216ae02617f9811945929cffbf59727393a9a69d57b00a5cd08da3888884b8361d6a4003a54480c1086a5fc876582ff049ede86e2f58d80c7b6cf618e1ba36d4710887bc34ef2b7abbc686df2185f99998060bf492b84e3a02077e2aaf014e1186fde602d2b639d467f48fc2e18cf1553e07ac39040953566ab1d21aac627b166825375377bc3332b62160ea8bf7fc3196b30965dce6181bf7a1c60d0270f24ba60e633c8c88bbdefb5928dc8183c2ce0616de6c3185a4aa7eb2ec6ab7d8394a9536bf7e4f33f76294b0b4a390aca576177671191fe91530e9bd0db79cee", 0xf6, 0x100000000}, {&(0x7f00000004c0)="a90f49b744c1ad7c27bc0a3b1965ca2bce6602b5f5a8b294ced925862d0a9df5c88e43095ba5810ba49c2216e7e1a9b5f07075e6a3101e853557713e983b2f46cf599dc2cba6254802d01794cdc015e28e2b5aa8c10293a4487b3fe2469252f2c2406327b2a5fe71b185ec0adfdc824a237f94", 0x73, 0x7}], 0x21008, &(0x7f0000000900)={[{'.log\x00'}, {'-%('}, {'.log\x00'}], [{@obj_user={'obj_user'}}, {@appraise_type='appraise_type=imasig'}, {@fowner_eq={'fowner', 0x3d, 0xee01}}, {@hash='hash'}, {@subj_type={'subj_type', 0x3d, '-&'}}]}) ioctl$BTRFS_IOC_SUBVOL_SETFLAGS(r3, 0x4008941a, &(0x7f0000000980)=0xfe33b054cbbc4d79) 11:24:38 executing program 1: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x7f, 0x80000000008001}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x9}, 0x0) r1 = open(&(0x7f0000000240)='./file1\x00', 0x141142, 0x0) write$UHID_INPUT(r1, &(0x7f0000001440), 0xfffffc41) open(&(0x7f00000001c0)='./file1\x00', 0x0, 0x4c000000) setxattr$trusted_overlay_nlink(&(0x7f0000000000)='./file1\x00', &(0x7f00000000c0)='trusted.overlay.nlink\x00', 0x0, 0x0, 0x0) [ 544.249247][T26528] loop0: detected capacity change from 264192 to 0 [ 544.473786][ T35] kauditd_printk_skb: 32 callbacks suppressed [ 544.473797][ T35] audit: type=1804 audit(1612178678.546:2063): pid=26509 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.2" name="/root/syzkaller-testdir245532710/syzkaller.d2c0aK/399/file1" dev="sda1" ino=15840 res=1 errno=0 11:24:38 executing program 5: write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000540)=ANY=[@ANYBLOB="7f454c4601061f000400000000000000030038000800000032000000000000004000000000000000560200000000000007000000008038000100090002000100010000000100000006000000000000000400000000000000060000000000000001040000000000000200000000000000010000000000000051e574640400000001000000000000000400000000000000050000000000000005000000000000000400000000000000ff24444700000000908bc001727fbcd44f4d3bf922995edf2fd379eb00"/489], 0x2c4) r0 = inotify_init() r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) epoll_ctl$EPOLL_CTL_DEL(0xffffffffffffffff, 0x2, r1) inotify_add_watch(r0, 0x0, 0x400017e) r2 = openat$incfs(0xffffffffffffffff, &(0x7f0000000080)='.log\x00', 0x20200, 0x40) fcntl$getownex(r2, 0x10, &(0x7f00000000c0)) r3 = open(&(0x7f0000000040)='./file0\x00', 0x200c2, 0x0) write$binfmt_elf64(r3, &(0x7f0000000080)=ANY=[], 0x8) sendfile(r3, r3, &(0x7f00000001c0), 0xa198) dup(0xffffffffffffffff) r4 = syz_mount_image$gfs2meta(&(0x7f0000000140)='gfs2meta\x00', &(0x7f0000000200)='./file0\x00', 0x1000, 0x4, &(0x7f0000000880)=[{&(0x7f0000000240)="77ba0daae1b2e74ecd52c59a85bf6f4b1f0b01ab07ba92bc6e57305406115f2bc3e4dd94f19ed896c4fccd34271e9dc3499af9298dbc709e0e6a513d61391d4b198af5f55d24239ae934e8babb8d1cb67bb17b0158", 0x55, 0x3}, {&(0x7f00000002c0)="ae227f954d229f666a6cd22938585e852071e55aa5728addcd315922bf32282e077bdbc63cd5ec89626ee2f8e7982ca239eaa758231056cdca22ca27428407f6c64c384665cfbd00ee6e0d7609f2c7ba0f28b4af70d0307ef78decfe42973915cd509de7c19ea0f3f5c3caaab05f9af08e2cc82d2c14b919dd045e3d36ce1c5d0ff23aed0a4a6ef508b5e71df0a25250d47f1e033ed503b6df99c189111b75b59df679cb75240b756cafecfd203568eeb2c1708fe9f11a2cb0f288590ec76cefbde09c90e9d568492aa5f41196397b70c869838c7164f2bad8eff017d021d7d41c9025c20b", 0xe5, 0x3}, {&(0x7f00000003c0)="792eb6eec33e561f18dc4b58b6a6fb3c7e6fd5e612c08490216ae02617f9811945929cffbf59727393a9a69d57b00a5cd08da3888884b8361d6a4003a54480c1086a5fc876582ff049ede86e2f58d80c7b6cf618e1ba36d4710887bc34ef2b7abbc686df2185f99998060bf492b84e3a02077e2aaf014e1186fde602d2b639d467f48fc2e18cf1553e07ac39040953566ab1d21aac627b166825375377bc3332b62160ea8bf7fc3196b30965dce6181bf7a1c60d0270f24ba60e633c8c88bbdefb5928dc8183c2ce0616de6c3185a4aa7eb2ec6ab7d8394a9536bf7e4f33f76294b0b4a390aca576177671191fe91530e9bd0db79cee", 0xf6, 0x100000000}, {&(0x7f00000004c0)="a90f49b744c1ad7c27bc0a3b1965ca2bce6602b5f5a8b294ced925862d0a9df5c88e43095ba5810ba49c2216e7e1a9b5f07075e6a3101e853557713e983b2f46cf599dc2cba6254802d01794cdc015e28e2b5aa8c10293a4487b3fe2469252f2c2406327b2a5fe71b185ec0adfdc824a237f94", 0x73, 0x7}], 0x21008, &(0x7f0000000900)={[{'.log\x00'}, {'-%('}, {'.log\x00'}], [{@appraise_type='appraise_type=imasig'}, {@fowner_eq={'fowner', 0x3d, 0xee01}}, {@hash='hash'}, {@subj_type={'subj_type', 0x3d, '-&'}}, {@hash='hash'}]}) ioctl$BTRFS_IOC_SUBVOL_SETFLAGS(r4, 0x4008941a, &(0x7f0000000980)=0xfe33b054cbbc4d79) 11:24:38 executing program 2: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x7f, 0x80000000008001}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x9}, 0x0) r1 = open(&(0x7f0000000240)='./file1\x00', 0x141142, 0x0) write$UHID_INPUT(r1, &(0x7f0000001440)={0x8, {'\x00D\x00'}}, 0xfffffc41) open(&(0x7f00000001c0)='./file1\x00', 0x0, 0x0) setxattr$trusted_overlay_nlink(&(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x0, 0x0) [ 544.656160][ T35] audit: type=1804 audit(1612178678.616:2064): pid=26523 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.4" name="/root/syzkaller-testdir068764309/syzkaller.I2gCPs/427/file1" dev="sda1" ino=15851 res=1 errno=0 [ 544.699697][T26541] loop5: detected capacity change from 264192 to 0 [ 544.722030][ T35] audit: type=1804 audit(1612178678.796:2065): pid=26517 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.3" name="/root/syzkaller-testdir548988167/syzkaller.gb8agU/387/file1" dev="sda1" ino=15866 res=1 errno=0 11:24:39 executing program 3: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x7f, 0x80000000008001}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x9}, 0x0) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000080)) r1 = open(&(0x7f0000000240)='./file1\x00', 0x141142, 0x0) write$UHID_INPUT(r1, &(0x7f0000001440)={0x8, {'\x00A\x00'}}, 0xfffffc41) open(&(0x7f00000001c0)='./file1\x00', 0x0, 0x0) setxattr$trusted_overlay_nlink(&(0x7f0000000000)='./file1\x00', &(0x7f00000000c0)='trusted.overlay.nlink\x00', 0x0, 0x0, 0x0) 11:24:39 executing program 0: r0 = perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x5c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write$binfmt_elf64(r0, &(0x7f0000000540)=ANY=[@ANYBLOB], 0x2c4) r1 = inotify_init() openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) epoll_ctl$EPOLL_CTL_DEL(0xffffffffffffffff, 0x2, 0xffffffffffffffff) inotify_add_watch(r1, &(0x7f0000000000)='.\x00', 0x400017e) r2 = openat$incfs(0xffffffffffffffff, &(0x7f0000000080)='.log\x00', 0x20200, 0x40) fcntl$getownex(r2, 0x10, 0x0) r3 = open(&(0x7f0000000040)='./file0\x00', 0x200c2, 0x0) write$binfmt_elf64(r3, &(0x7f0000000080)=ANY=[], 0x8) sendfile(r3, r3, &(0x7f00000001c0), 0xa198) dup(0xffffffffffffffff) r4 = syz_mount_image$gfs2meta(&(0x7f0000000140)='gfs2meta\x00', &(0x7f0000000200)='./file0\x00', 0x1000, 0x4, &(0x7f0000000880)=[{&(0x7f0000000240)="77ba0daae1b2e74ecd52c59a85bf6f4b1f0b01ab07ba92bc6e57305406115f2bc3e4dd94f19ed896c4fccd34271e9dc3499af9298dbc709e0e6a513d61391d4b198af5f55d24239ae934e8babb8d1cb67bb17b0158", 0x55, 0x3}, {&(0x7f00000002c0)="ae227f954d229f666a6cd22938585e852071e55aa5728addcd315922bf32282e077bdbc63cd5ec89626ee2f8e7982ca239eaa758231056cdca22ca27428407f6c64c384665cfbd00ee6e0d7609f2c7ba0f28b4af70d0307ef78decfe42973915cd509de7c19ea0f3f5c3caaab05f9af08e2cc82d2c14b919dd045e3d36ce1c5d0ff23aed0a4a6ef508b5e71df0a25250d47f1e033ed503b6df99c189111b75b59df679cb75240b756cafecfd203568eeb2c1708fe9f11a2cb0f288590ec76cefbde09c90e9d568492aa5f41196397b70c869838c7164f2bad8eff017d021d7d41c9025c20b", 0xe5, 0x3}, {&(0x7f00000003c0)="792eb6eec33e561f18dc4b58b6a6fb3c7e6fd5e612c08490216ae02617f9811945929cffbf59727393a9a69d57b00a5cd08da3888884b8361d6a4003a54480c1086a5fc876582ff049ede86e2f58d80c7b6cf618e1ba36d4710887bc34ef2b7abbc686df2185f99998060bf492b84e3a02077e2aaf014e1186fde602d2b639d467f48fc2e18cf1553e07ac39040953566ab1d21aac627b166825375377bc3332b62160ea8bf7fc3196b30965dce6181bf7a1c60d0270f24ba60e633c8c88bbdefb5928dc8183c2ce0616de6c3185a4aa7eb2ec6ab7d8394a9536bf7e4f33f76294b0b4a390aca576177671191fe91530e9bd0db79cee", 0xf6, 0x100000000}, {&(0x7f00000004c0)="a90f49b744c1ad7c27bc0a3b1965ca2bce6602b5f5a8b294ced925862d0a9df5c88e43095ba5810ba49c2216e7e1a9b5f07075e6a3101e853557713e983b2f46cf599dc2cba6254802d01794cdc015e28e2b5aa8c10293a4487b3fe2469252f2c2406327b2a5fe71b185ec0adfdc824a237f94", 0x73, 0x7}], 0x21008, &(0x7f0000000900)={[{'.log\x00'}, {'-%('}, {'.log\x00'}], [{@obj_user={'obj_user'}}, {@appraise_type='appraise_type=imasig'}, {@fowner_eq={'fowner', 0x3d, 0xee01}}, {@hash='hash'}, {@subj_type={'subj_type', 0x3d, '-&'}}]}) ioctl$BTRFS_IOC_SUBVOL_SETFLAGS(r4, 0x4008941a, &(0x7f0000000980)=0xfe33b054cbbc4d79) [ 544.990439][ T35] audit: type=1804 audit(1612178678.876:2066): pid=26521 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.3" name="/root/syzkaller-testdir548988167/syzkaller.gb8agU/387/file1" dev="sda1" ino=15866 res=1 errno=0 11:24:39 executing program 4: r0 = perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x5c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write$binfmt_elf64(r0, &(0x7f0000000540)=ANY=[@ANYBLOB], 0x2c4) r1 = inotify_init() openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) epoll_ctl$EPOLL_CTL_DEL(0xffffffffffffffff, 0x2, 0xffffffffffffffff) inotify_add_watch(r1, &(0x7f0000000000)='.\x00', 0x400017e) openat$incfs(0xffffffffffffffff, &(0x7f0000000080)='.log\x00', 0x20200, 0x40) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f00000000c0)) r2 = open(&(0x7f0000000040)='./file0\x00', 0x200c2, 0x0) write$binfmt_elf64(r2, &(0x7f0000000080)=ANY=[], 0x8) sendfile(r2, r2, &(0x7f00000001c0), 0xa198) dup(0xffffffffffffffff) r3 = syz_mount_image$gfs2meta(&(0x7f0000000140)='gfs2meta\x00', &(0x7f0000000200)='./file0\x00', 0x1000, 0x4, &(0x7f0000000880)=[{&(0x7f0000000240)="77ba0daae1b2e74ecd52c59a85bf6f4b1f0b01ab07ba92bc6e57305406115f2bc3e4dd94f19ed896c4fccd34271e9dc3499af9298dbc709e0e6a513d61391d4b198af5f55d24239ae934e8babb8d1cb67bb17b0158", 0x55, 0x3}, {&(0x7f00000002c0)="ae227f954d229f666a6cd22938585e852071e55aa5728addcd315922bf32282e077bdbc63cd5ec89626ee2f8e7982ca239eaa758231056cdca22ca27428407f6c64c384665cfbd00ee6e0d7609f2c7ba0f28b4af70d0307ef78decfe42973915cd509de7c19ea0f3f5c3caaab05f9af08e2cc82d2c14b919dd045e3d36ce1c5d0ff23aed0a4a6ef508b5e71df0a25250d47f1e033ed503b6df99c189111b75b59df679cb75240b756cafecfd203568eeb2c1708fe9f11a2cb0f288590ec76cefbde09c90e9d568492aa5f41196397b70c869838c7164f2bad8eff017d021d7d41c9025c20b", 0xe5, 0x3}, {&(0x7f00000003c0)="792eb6eec33e561f18dc4b58b6a6fb3c7e6fd5e612c08490216ae02617f9811945929cffbf59727393a9a69d57b00a5cd08da3888884b8361d6a4003a54480c1086a5fc876582ff049ede86e2f58d80c7b6cf618e1ba36d4710887bc34ef2b7abbc686df2185f99998060bf492b84e3a02077e2aaf014e1186fde602d2b639d467f48fc2e18cf1553e07ac39040953566ab1d21aac627b166825375377bc3332b62160ea8bf7fc3196b30965dce6181bf7a1c60d0270f24ba60e633c8c88bbdefb5928dc8183c2ce0616de6c3185a4aa7eb2ec6ab7d8394a9536bf7e4f33f76294b0b4a390aca576177671191fe91530e9bd0db79cee", 0xf6, 0x100000000}, {&(0x7f00000004c0)="a90f49b744c1ad7c27bc0a3b1965ca2bce6602b5f5a8b294ced925862d0a9df5c88e43095ba5810ba49c2216e7e1a9b5f07075e6a3101e853557713e983b2f46cf599dc2cba6254802d01794cdc015e28e2b5aa8c10293a4487b3fe2469252f2c2406327b2a5fe71b185ec0adfdc824a237f94", 0x73, 0x7}], 0x21008, &(0x7f0000000900)={[{'.log\x00'}, {'-%('}, {'.log\x00'}], [{@obj_user={'obj_user'}}, {@appraise_type='appraise_type=imasig'}, {@fowner_eq={'fowner', 0x3d, 0xee01}}, {@hash='hash'}, {@subj_type={'subj_type', 0x3d, '-&'}}]}) ioctl$BTRFS_IOC_SUBVOL_SETFLAGS(r3, 0x4008941a, &(0x7f0000000980)=0xfe33b054cbbc4d79) [ 545.197091][T26556] loop0: detected capacity change from 264192 to 0 [ 545.296056][ T35] audit: type=1804 audit(1612178679.376:2067): pid=26548 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.2" name="/root/syzkaller-testdir245532710/syzkaller.d2c0aK/400/file1" dev="sda1" ino=15840 res=1 errno=0 [ 545.362645][T26567] loop4: detected capacity change from 264192 to 0 [ 545.455741][ T35] audit: type=1804 audit(1612178679.406:2068): pid=26536 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.1" name="/root/syzkaller-testdir551554057/syzkaller.l2Zg4z/385/file1" dev="sda1" ino=15815 res=1 errno=0 11:24:39 executing program 2: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x7f, 0x80000000008001}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x9}, 0x0) r1 = open(&(0x7f0000000240)='./file1\x00', 0x141142, 0x0) write$UHID_INPUT(r1, &(0x7f0000001440)={0x8, {'\x00E\x00'}}, 0xfffffc41) open(&(0x7f00000001c0)='./file1\x00', 0x0, 0x0) setxattr$trusted_overlay_nlink(&(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x0, 0x0) 11:24:39 executing program 5: write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000540)=ANY=[@ANYBLOB="7f454c4601061f000400000000000000030038000800000032000000000000004000000000000000560200000000000007000000008038000100090002000100010000000100000006000000000000000400000000000000060000000000000001040000000000000200000000000000010000000000000051e574640400000001000000000000000400000000000000050000000000000005000000000000000400000000000000ff24444700000000908bc001727fbcd44f4d3bf922995edf2fd379eb00"/489], 0x2c4) r0 = inotify_init() r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) epoll_ctl$EPOLL_CTL_DEL(0xffffffffffffffff, 0x2, r1) inotify_add_watch(r0, 0x0, 0x400017e) r2 = openat$incfs(0xffffffffffffffff, &(0x7f0000000080)='.log\x00', 0x20200, 0x40) fcntl$getownex(r2, 0x10, &(0x7f00000000c0)) r3 = open(&(0x7f0000000040)='./file0\x00', 0x200c2, 0x0) write$binfmt_elf64(r3, &(0x7f0000000080)=ANY=[], 0x8) sendfile(r3, r3, &(0x7f00000001c0), 0xa198) dup(0xffffffffffffffff) r4 = syz_mount_image$gfs2meta(&(0x7f0000000140)='gfs2meta\x00', &(0x7f0000000200)='./file0\x00', 0x1000, 0x4, &(0x7f0000000880)=[{&(0x7f0000000240)="77ba0daae1b2e74ecd52c59a85bf6f4b1f0b01ab07ba92bc6e57305406115f2bc3e4dd94f19ed896c4fccd34271e9dc3499af9298dbc709e0e6a513d61391d4b198af5f55d24239ae934e8babb8d1cb67bb17b0158", 0x55, 0x3}, {&(0x7f00000002c0)="ae227f954d229f666a6cd22938585e852071e55aa5728addcd315922bf32282e077bdbc63cd5ec89626ee2f8e7982ca239eaa758231056cdca22ca27428407f6c64c384665cfbd00ee6e0d7609f2c7ba0f28b4af70d0307ef78decfe42973915cd509de7c19ea0f3f5c3caaab05f9af08e2cc82d2c14b919dd045e3d36ce1c5d0ff23aed0a4a6ef508b5e71df0a25250d47f1e033ed503b6df99c189111b75b59df679cb75240b756cafecfd203568eeb2c1708fe9f11a2cb0f288590ec76cefbde09c90e9d568492aa5f41196397b70c869838c7164f2bad8eff017d021d7d41c9025c20b", 0xe5, 0x3}, {&(0x7f00000003c0)="792eb6eec33e561f18dc4b58b6a6fb3c7e6fd5e612c08490216ae02617f9811945929cffbf59727393a9a69d57b00a5cd08da3888884b8361d6a4003a54480c1086a5fc876582ff049ede86e2f58d80c7b6cf618e1ba36d4710887bc34ef2b7abbc686df2185f99998060bf492b84e3a02077e2aaf014e1186fde602d2b639d467f48fc2e18cf1553e07ac39040953566ab1d21aac627b166825375377bc3332b62160ea8bf7fc3196b30965dce6181bf7a1c60d0270f24ba60e633c8c88bbdefb5928dc8183c2ce0616de6c3185a4aa7eb2ec6ab7d8394a9536bf7e4f33f76294b0b4a390aca576177671191fe91530e9bd0db79cee", 0xf6, 0x100000000}, {&(0x7f00000004c0)="a90f49b744c1ad7c27bc0a3b1965ca2bce6602b5f5a8b294ced925862d0a9df5c88e43095ba5810ba49c2216e7e1a9b5f07075e6a3101e853557713e983b2f46cf599dc2cba6254802d01794cdc015e28e2b5aa8c10293a4487b3fe2469252f2c2406327b2a5fe71b185ec0adfdc824a237f94", 0x73, 0x7}], 0x21008, &(0x7f0000000900)={[{'.log\x00'}, {'-%('}, {'.log\x00'}], [{@appraise_type='appraise_type=imasig'}, {@fowner_eq={'fowner', 0x3d, 0xee01}}, {@hash='hash'}, {@subj_type={'subj_type', 0x3d, '-&'}}, {@hash='hash'}]}) ioctl$BTRFS_IOC_SUBVOL_SETFLAGS(r4, 0x4008941a, &(0x7f0000000980)=0xfe33b054cbbc4d79) [ 545.486099][ T35] audit: type=1804 audit(1612178679.406:2069): pid=26564 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.1" name="/root/syzkaller-testdir551554057/syzkaller.l2Zg4z/385/file1" dev="sda1" ino=15815 res=1 errno=0 11:24:39 executing program 1: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x7f, 0x80000000008001}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x9}, 0x0) r1 = open(&(0x7f0000000240)='./file1\x00', 0x141142, 0x0) write$UHID_INPUT(r1, &(0x7f0000001440), 0xfffffc41) open(&(0x7f00000001c0)='./file1\x00', 0x0, 0x5c000000) setxattr$trusted_overlay_nlink(&(0x7f0000000000)='./file1\x00', &(0x7f00000000c0)='trusted.overlay.nlink\x00', 0x0, 0x0, 0x0) [ 545.625061][ T35] audit: type=1804 audit(1612178679.406:2070): pid=26563 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor.1" name="/root/syzkaller-testdir551554057/syzkaller.l2Zg4z/385/file1" dev="sda1" ino=15815 res=1 errno=0 [ 545.688926][T26575] loop5: detected capacity change from 264192 to 0 [ 545.773351][ T35] audit: type=1800 audit(1612178679.596:2071): pid=26548 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed comm="syz-executor.2" name="file1" dev="sda1" ino=15840 res=0 errno=0 11:24:40 executing program 0: r0 = perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x5c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write$binfmt_elf64(r0, &(0x7f0000000540)=ANY=[@ANYBLOB], 0x2c4) r1 = inotify_init() openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) epoll_ctl$EPOLL_CTL_DEL(0xffffffffffffffff, 0x2, 0xffffffffffffffff) inotify_add_watch(r1, &(0x7f0000000000)='.\x00', 0x400017e) r2 = openat$incfs(0xffffffffffffffff, &(0x7f0000000080)='.log\x00', 0x20200, 0x40) fcntl$getownex(r2, 0x10, 0x0) r3 = open(&(0x7f0000000040)='./file0\x00', 0x200c2, 0x0) write$binfmt_elf64(r3, &(0x7f0000000080)=ANY=[], 0x8) sendfile(r3, r3, &(0x7f00000001c0), 0xa198) dup(0xffffffffffffffff) r4 = syz_mount_image$gfs2meta(&(0x7f0000000140)='gfs2meta\x00', &(0x7f0000000200)='./file0\x00', 0x1000, 0x4, &(0x7f0000000880)=[{&(0x7f0000000240)="77ba0daae1b2e74ecd52c59a85bf6f4b1f0b01ab07ba92bc6e57305406115f2bc3e4dd94f19ed896c4fccd34271e9dc3499af9298dbc709e0e6a513d61391d4b198af5f55d24239ae934e8babb8d1cb67bb17b0158", 0x55, 0x3}, {&(0x7f00000002c0)="ae227f954d229f666a6cd22938585e852071e55aa5728addcd315922bf32282e077bdbc63cd5ec89626ee2f8e7982ca239eaa758231056cdca22ca27428407f6c64c384665cfbd00ee6e0d7609f2c7ba0f28b4af70d0307ef78decfe42973915cd509de7c19ea0f3f5c3caaab05f9af08e2cc82d2c14b919dd045e3d36ce1c5d0ff23aed0a4a6ef508b5e71df0a25250d47f1e033ed503b6df99c189111b75b59df679cb75240b756cafecfd203568eeb2c1708fe9f11a2cb0f288590ec76cefbde09c90e9d568492aa5f41196397b70c869838c7164f2bad8eff017d021d7d41c9025c20b", 0xe5, 0x3}, {&(0x7f00000003c0)="792eb6eec33e561f18dc4b58b6a6fb3c7e6fd5e612c08490216ae02617f9811945929cffbf59727393a9a69d57b00a5cd08da3888884b8361d6a4003a54480c1086a5fc876582ff049ede86e2f58d80c7b6cf618e1ba36d4710887bc34ef2b7abbc686df2185f99998060bf492b84e3a02077e2aaf014e1186fde602d2b639d467f48fc2e18cf1553e07ac39040953566ab1d21aac627b166825375377bc3332b62160ea8bf7fc3196b30965dce6181bf7a1c60d0270f24ba60e633c8c88bbdefb5928dc8183c2ce0616de6c3185a4aa7eb2ec6ab7d8394a9536bf7e4f33f76294b0b4a390aca576177671191fe91530e9bd0db79cee", 0xf6, 0x100000000}, {&(0x7f00000004c0)="a90f49b744c1ad7c27bc0a3b1965ca2bce6602b5f5a8b294ced925862d0a9df5c88e43095ba5810ba49c2216e7e1a9b5f07075e6a3101e853557713e983b2f46cf599dc2cba6254802d01794cdc015e28e2b5aa8c10293a4487b3fe2469252f2c2406327b2a5fe71b185ec0adfdc824a237f94", 0x73, 0x7}], 0x21008, &(0x7f0000000900)={[{'.log\x00'}, {'-%('}, {'.log\x00'}], [{@obj_user={'obj_user'}}, {@appraise_type='appraise_type=imasig'}, {@fowner_eq={'fowner', 0x3d, 0xee01}}, {@hash='hash'}, {@subj_type={'subj_type', 0x3d, '-&'}}]}) ioctl$BTRFS_IOC_SUBVOL_SETFLAGS(r4, 0x4008941a, &(0x7f0000000980)=0xfe33b054cbbc4d79) [ 545.968460][ T35] audit: type=1804 audit(1612178680.046:2072): pid=26555 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.3" name="/root/syzkaller-testdir548988167/syzkaller.gb8agU/388/file1" dev="sda1" ino=15794 res=1 errno=0 11:24:40 executing program 4: r0 = perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x5c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write$binfmt_elf64(r0, &(0x7f0000000540)=ANY=[@ANYBLOB], 0x2c4) r1 = inotify_init() openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) epoll_ctl$EPOLL_CTL_DEL(0xffffffffffffffff, 0x2, 0xffffffffffffffff) inotify_add_watch(r1, &(0x7f0000000000)='.\x00', 0x400017e) r2 = openat$incfs(0xffffffffffffffff, &(0x7f0000000080)='.log\x00', 0x20200, 0x40) fcntl$getownex(r2, 0x10, 0x0) r3 = open(&(0x7f0000000040)='./file0\x00', 0x200c2, 0x0) write$binfmt_elf64(r3, &(0x7f0000000080)=ANY=[], 0x8) sendfile(r3, r3, &(0x7f00000001c0), 0xa198) dup(0xffffffffffffffff) r4 = syz_mount_image$gfs2meta(&(0x7f0000000140)='gfs2meta\x00', &(0x7f0000000200)='./file0\x00', 0x1000, 0x4, &(0x7f0000000880)=[{&(0x7f0000000240)="77ba0daae1b2e74ecd52c59a85bf6f4b1f0b01ab07ba92bc6e57305406115f2bc3e4dd94f19ed896c4fccd34271e9dc3499af9298dbc709e0e6a513d61391d4b198af5f55d24239ae934e8babb8d1cb67bb17b0158", 0x55, 0x3}, {&(0x7f00000002c0)="ae227f954d229f666a6cd22938585e852071e55aa5728addcd315922bf32282e077bdbc63cd5ec89626ee2f8e7982ca239eaa758231056cdca22ca27428407f6c64c384665cfbd00ee6e0d7609f2c7ba0f28b4af70d0307ef78decfe42973915cd509de7c19ea0f3f5c3caaab05f9af08e2cc82d2c14b919dd045e3d36ce1c5d0ff23aed0a4a6ef508b5e71df0a25250d47f1e033ed503b6df99c189111b75b59df679cb75240b756cafecfd203568eeb2c1708fe9f11a2cb0f288590ec76cefbde09c90e9d568492aa5f41196397b70c869838c7164f2bad8eff017d021d7d41c9025c20b", 0xe5, 0x3}, {&(0x7f00000003c0)="792eb6eec33e561f18dc4b58b6a6fb3c7e6fd5e612c08490216ae02617f9811945929cffbf59727393a9a69d57b00a5cd08da3888884b8361d6a4003a54480c1086a5fc876582ff049ede86e2f58d80c7b6cf618e1ba36d4710887bc34ef2b7abbc686df2185f99998060bf492b84e3a02077e2aaf014e1186fde602d2b639d467f48fc2e18cf1553e07ac39040953566ab1d21aac627b166825375377bc3332b62160ea8bf7fc3196b30965dce6181bf7a1c60d0270f24ba60e633c8c88bbdefb5928dc8183c2ce0616de6c3185a4aa7eb2ec6ab7d8394a9536bf7e4f33f76294b0b4a390aca576177671191fe91530e9bd0db79cee", 0xf6, 0x100000000}, {&(0x7f00000004c0)="a90f49b744c1ad7c27bc0a3b1965ca2bce6602b5f5a8b294ced925862d0a9df5c88e43095ba5810ba49c2216e7e1a9b5f07075e6a3101e853557713e983b2f46cf599dc2cba6254802d01794cdc015e28e2b5aa8c10293a4487b3fe2469252f2c2406327b2a5fe71b185ec0adfdc824a237f94", 0x73, 0x7}], 0x21008, &(0x7f0000000900)={[{'.log\x00'}, {'-%('}, {'.log\x00'}], [{@obj_user={'obj_user'}}, {@appraise_type='appraise_type=imasig'}, {@fowner_eq={'fowner', 0x3d, 0xee01}}, {@hash='hash'}, {@subj_type={'subj_type', 0x3d, '-&'}}]}) ioctl$BTRFS_IOC_SUBVOL_SETFLAGS(r4, 0x4008941a, &(0x7f0000000980)=0xfe33b054cbbc4d79) 11:24:40 executing program 3: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x7f, 0x80000000008001}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x9}, 0x0) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000080)) r1 = open(&(0x7f0000000240)='./file1\x00', 0x141142, 0x0) write$UHID_INPUT(r1, &(0x7f0000001440)={0x8, {'\x00B\x00'}}, 0xfffffc41) open(&(0x7f00000001c0)='./file1\x00', 0x0, 0x0) setxattr$trusted_overlay_nlink(&(0x7f0000000000)='./file1\x00', &(0x7f00000000c0)='trusted.overlay.nlink\x00', 0x0, 0x0, 0x0) [ 546.191959][T26595] loop0: detected capacity change from 264192 to 0 [ 546.316671][T26602] loop4: detected capacity change from 264192 to 0 11:24:40 executing program 5: write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000540)=ANY=[@ANYBLOB="7f454c4601061f000400000000000000030038000800000032000000000000004000000000000000560200000000000007000000008038000100090002000100010000000100000006000000000000000400000000000000060000000000000001040000000000000200000000000000010000000000000051e574640400000001000000000000000400000000000000050000000000000005000000000000000400000000000000ff24444700000000908bc001727fbcd44f4d3bf922995edf2fd379eb00"/489], 0x2c4) r0 = inotify_init() r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) epoll_ctl$EPOLL_CTL_DEL(0xffffffffffffffff, 0x2, r1) inotify_add_watch(r0, &(0x7f0000000000)='.\x00', 0x0) r2 = openat$incfs(0xffffffffffffffff, &(0x7f0000000080)='.log\x00', 0x20200, 0x40) fcntl$getownex(r2, 0x10, &(0x7f00000000c0)) r3 = open(&(0x7f0000000040)='./file0\x00', 0x200c2, 0x0) write$binfmt_elf64(r3, &(0x7f0000000080)=ANY=[], 0x8) sendfile(r3, r3, &(0x7f00000001c0), 0xa198) dup(0xffffffffffffffff) r4 = syz_mount_image$gfs2meta(&(0x7f0000000140)='gfs2meta\x00', &(0x7f0000000200)='./file0\x00', 0x1000, 0x4, &(0x7f0000000880)=[{&(0x7f0000000240)="77ba0daae1b2e74ecd52c59a85bf6f4b1f0b01ab07ba92bc6e57305406115f2bc3e4dd94f19ed896c4fccd34271e9dc3499af9298dbc709e0e6a513d61391d4b198af5f55d24239ae934e8babb8d1cb67bb17b0158", 0x55, 0x3}, {&(0x7f00000002c0)="ae227f954d229f666a6cd22938585e852071e55aa5728addcd315922bf32282e077bdbc63cd5ec89626ee2f8e7982ca239eaa758231056cdca22ca27428407f6c64c384665cfbd00ee6e0d7609f2c7ba0f28b4af70d0307ef78decfe42973915cd509de7c19ea0f3f5c3caaab05f9af08e2cc82d2c14b919dd045e3d36ce1c5d0ff23aed0a4a6ef508b5e71df0a25250d47f1e033ed503b6df99c189111b75b59df679cb75240b756cafecfd203568eeb2c1708fe9f11a2cb0f288590ec76cefbde09c90e9d568492aa5f41196397b70c869838c7164f2bad8eff017d021d7d41c9025c20b", 0xe5, 0x3}, {&(0x7f00000003c0)="792eb6eec33e561f18dc4b58b6a6fb3c7e6fd5e612c08490216ae02617f9811945929cffbf59727393a9a69d57b00a5cd08da3888884b8361d6a4003a54480c1086a5fc876582ff049ede86e2f58d80c7b6cf618e1ba36d4710887bc34ef2b7abbc686df2185f99998060bf492b84e3a02077e2aaf014e1186fde602d2b639d467f48fc2e18cf1553e07ac39040953566ab1d21aac627b166825375377bc3332b62160ea8bf7fc3196b30965dce6181bf7a1c60d0270f24ba60e633c8c88bbdefb5928dc8183c2ce0616de6c3185a4aa7eb2ec6ab7d8394a9536bf7e4f33f76294b0b4a390aca576177671191fe91530e9bd0db79cee", 0xf6, 0x100000000}, {&(0x7f00000004c0)="a90f49b744c1ad7c27bc0a3b1965ca2bce6602b5f5a8b294ced925862d0a9df5c88e43095ba5810ba49c2216e7e1a9b5f07075e6a3101e853557713e983b2f46cf599dc2cba6254802d01794cdc015e28e2b5aa8c10293a4487b3fe2469252f2c2406327b2a5fe71b185ec0adfdc824a237f94", 0x73, 0x7}], 0x21008, &(0x7f0000000900)={[{'.log\x00'}, {'-%('}, {'.log\x00'}], [{@appraise_type='appraise_type=imasig'}, {@fowner_eq={'fowner', 0x3d, 0xee01}}, {@hash='hash'}, {@subj_type={'subj_type', 0x3d, '-&'}}, {@hash='hash'}]}) ioctl$BTRFS_IOC_SUBVOL_SETFLAGS(r4, 0x4008941a, &(0x7f0000000980)=0xfe33b054cbbc4d79) 11:24:40 executing program 1: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x7f, 0x80000000008001}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x9}, 0x0) r1 = open(&(0x7f0000000240)='./file1\x00', 0x141142, 0x0) write$UHID_INPUT(r1, &(0x7f0000001440), 0xfffffc41) open(&(0x7f00000001c0)='./file1\x00', 0x0, 0x68000000) setxattr$trusted_overlay_nlink(&(0x7f0000000000)='./file1\x00', &(0x7f00000000c0)='trusted.overlay.nlink\x00', 0x0, 0x0, 0x0) [ 546.725712][T26617] loop5: detected capacity change from 264192 to 0 11:24:40 executing program 2: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x7f, 0x80000000008001}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x9}, 0x0) r1 = open(&(0x7f0000000240)='./file1\x00', 0x141142, 0x0) write$UHID_INPUT(r1, &(0x7f0000001440)={0x8, {'\x00F\x00'}}, 0xfffffc41) open(&(0x7f00000001c0)='./file1\x00', 0x0, 0x0) setxattr$trusted_overlay_nlink(&(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x0, 0x0) 11:24:41 executing program 0: r0 = perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x5c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write$binfmt_elf64(r0, &(0x7f0000000540)=ANY=[@ANYBLOB], 0x2c4) r1 = inotify_init() openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) epoll_ctl$EPOLL_CTL_DEL(0xffffffffffffffff, 0x2, 0xffffffffffffffff) inotify_add_watch(r1, &(0x7f0000000000)='.\x00', 0x400017e) r2 = openat$incfs(0xffffffffffffffff, &(0x7f0000000080)='.log\x00', 0x20200, 0x40) fcntl$getownex(r2, 0x10, 0x0) r3 = open(&(0x7f0000000040)='./file0\x00', 0x200c2, 0x0) write$binfmt_elf64(r3, &(0x7f0000000080)=ANY=[], 0x8) sendfile(r3, r3, &(0x7f00000001c0), 0xa198) dup(0xffffffffffffffff) r4 = syz_mount_image$gfs2meta(&(0x7f0000000140)='gfs2meta\x00', &(0x7f0000000200)='./file0\x00', 0x1000, 0x4, &(0x7f0000000880)=[{&(0x7f0000000240)="77ba0daae1b2e74ecd52c59a85bf6f4b1f0b01ab07ba92bc6e57305406115f2bc3e4dd94f19ed896c4fccd34271e9dc3499af9298dbc709e0e6a513d61391d4b198af5f55d24239ae934e8babb8d1cb67bb17b0158", 0x55, 0x3}, {&(0x7f00000002c0)="ae227f954d229f666a6cd22938585e852071e55aa5728addcd315922bf32282e077bdbc63cd5ec89626ee2f8e7982ca239eaa758231056cdca22ca27428407f6c64c384665cfbd00ee6e0d7609f2c7ba0f28b4af70d0307ef78decfe42973915cd509de7c19ea0f3f5c3caaab05f9af08e2cc82d2c14b919dd045e3d36ce1c5d0ff23aed0a4a6ef508b5e71df0a25250d47f1e033ed503b6df99c189111b75b59df679cb75240b756cafecfd203568eeb2c1708fe9f11a2cb0f288590ec76cefbde09c90e9d568492aa5f41196397b70c869838c7164f2bad8eff017d021d7d41c9025c20b", 0xe5, 0x3}, {&(0x7f00000003c0)="792eb6eec33e561f18dc4b58b6a6fb3c7e6fd5e612c08490216ae02617f9811945929cffbf59727393a9a69d57b00a5cd08da3888884b8361d6a4003a54480c1086a5fc876582ff049ede86e2f58d80c7b6cf618e1ba36d4710887bc34ef2b7abbc686df2185f99998060bf492b84e3a02077e2aaf014e1186fde602d2b639d467f48fc2e18cf1553e07ac39040953566ab1d21aac627b166825375377bc3332b62160ea8bf7fc3196b30965dce6181bf7a1c60d0270f24ba60e633c8c88bbdefb5928dc8183c2ce0616de6c3185a4aa7eb2ec6ab7d8394a9536bf7e4f33f76294b0b4a390aca576177671191fe91530e9bd0db79cee", 0xf6, 0x100000000}, {&(0x7f00000004c0)="a90f49b744c1ad7c27bc0a3b1965ca2bce6602b5f5a8b294ced925862d0a9df5c88e43095ba5810ba49c2216e7e1a9b5f07075e6a3101e853557713e983b2f46cf599dc2cba6254802d01794cdc015e28e2b5aa8c10293a4487b3fe2469252f2c2406327b2a5fe71b185ec0adfdc824a237f94", 0x73, 0x7}], 0x21008, &(0x7f0000000900)={[{'.log\x00'}, {'-%('}, {'.log\x00'}], [{@obj_user={'obj_user'}}, {@appraise_type='appraise_type=imasig'}, {@fowner_eq={'fowner', 0x3d, 0xee01}}, {@hash='hash'}, {@subj_type={'subj_type', 0x3d, '-&'}}]}) ioctl$BTRFS_IOC_SUBVOL_SETFLAGS(r4, 0x4008941a, &(0x7f0000000980)=0xfe33b054cbbc4d79) [ 547.146133][T26631] loop0: detected capacity change from 264192 to 0 11:24:41 executing program 4: r0 = perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x5c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write$binfmt_elf64(r0, &(0x7f0000000540)=ANY=[@ANYBLOB], 0x2c4) r1 = inotify_init() openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) epoll_ctl$EPOLL_CTL_DEL(0xffffffffffffffff, 0x2, 0xffffffffffffffff) inotify_add_watch(r1, &(0x7f0000000000)='.\x00', 0x400017e) r2 = openat$incfs(0xffffffffffffffff, &(0x7f0000000080)='.log\x00', 0x20200, 0x40) fcntl$getownex(r2, 0x10, 0x0) r3 = open(&(0x7f0000000040)='./file0\x00', 0x200c2, 0x0) write$binfmt_elf64(r3, &(0x7f0000000080)=ANY=[], 0x8) sendfile(r3, r3, &(0x7f00000001c0), 0xa198) dup(0xffffffffffffffff) r4 = syz_mount_image$gfs2meta(&(0x7f0000000140)='gfs2meta\x00', &(0x7f0000000200)='./file0\x00', 0x1000, 0x4, &(0x7f0000000880)=[{&(0x7f0000000240)="77ba0daae1b2e74ecd52c59a85bf6f4b1f0b01ab07ba92bc6e57305406115f2bc3e4dd94f19ed896c4fccd34271e9dc3499af9298dbc709e0e6a513d61391d4b198af5f55d24239ae934e8babb8d1cb67bb17b0158", 0x55, 0x3}, {&(0x7f00000002c0)="ae227f954d229f666a6cd22938585e852071e55aa5728addcd315922bf32282e077bdbc63cd5ec89626ee2f8e7982ca239eaa758231056cdca22ca27428407f6c64c384665cfbd00ee6e0d7609f2c7ba0f28b4af70d0307ef78decfe42973915cd509de7c19ea0f3f5c3caaab05f9af08e2cc82d2c14b919dd045e3d36ce1c5d0ff23aed0a4a6ef508b5e71df0a25250d47f1e033ed503b6df99c189111b75b59df679cb75240b756cafecfd203568eeb2c1708fe9f11a2cb0f288590ec76cefbde09c90e9d568492aa5f41196397b70c869838c7164f2bad8eff017d021d7d41c9025c20b", 0xe5, 0x3}, {&(0x7f00000003c0)="792eb6eec33e561f18dc4b58b6a6fb3c7e6fd5e612c08490216ae02617f9811945929cffbf59727393a9a69d57b00a5cd08da3888884b8361d6a4003a54480c1086a5fc876582ff049ede86e2f58d80c7b6cf618e1ba36d4710887bc34ef2b7abbc686df2185f99998060bf492b84e3a02077e2aaf014e1186fde602d2b639d467f48fc2e18cf1553e07ac39040953566ab1d21aac627b166825375377bc3332b62160ea8bf7fc3196b30965dce6181bf7a1c60d0270f24ba60e633c8c88bbdefb5928dc8183c2ce0616de6c3185a4aa7eb2ec6ab7d8394a9536bf7e4f33f76294b0b4a390aca576177671191fe91530e9bd0db79cee", 0xf6, 0x100000000}, {&(0x7f00000004c0)="a90f49b744c1ad7c27bc0a3b1965ca2bce6602b5f5a8b294ced925862d0a9df5c88e43095ba5810ba49c2216e7e1a9b5f07075e6a3101e853557713e983b2f46cf599dc2cba6254802d01794cdc015e28e2b5aa8c10293a4487b3fe2469252f2c2406327b2a5fe71b185ec0adfdc824a237f94", 0x73, 0x7}], 0x21008, &(0x7f0000000900)={[{'.log\x00'}, {'-%('}, {'.log\x00'}], [{@obj_user={'obj_user'}}, {@appraise_type='appraise_type=imasig'}, {@fowner_eq={'fowner', 0x3d, 0xee01}}, {@hash='hash'}, {@subj_type={'subj_type', 0x3d, '-&'}}]}) ioctl$BTRFS_IOC_SUBVOL_SETFLAGS(r4, 0x4008941a, &(0x7f0000000980)=0xfe33b054cbbc4d79) 11:24:41 executing program 3: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x7f, 0x80000000008001}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x9}, 0x0) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000080)) r1 = open(&(0x7f0000000240)='./file1\x00', 0x141142, 0x0) write$UHID_INPUT(r1, &(0x7f0000001440)={0x8, {'\x00C\x00'}}, 0xfffffc41) open(&(0x7f00000001c0)='./file1\x00', 0x0, 0x0) setxattr$trusted_overlay_nlink(&(0x7f0000000000)='./file1\x00', &(0x7f00000000c0)='trusted.overlay.nlink\x00', 0x0, 0x0, 0x0) [ 547.390199][T26640] loop4: detected capacity change from 264192 to 0 11:24:41 executing program 5: write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000540)=ANY=[@ANYBLOB="7f454c4601061f000400000000000000030038000800000032000000000000004000000000000000560200000000000007000000008038000100090002000100010000000100000006000000000000000400000000000000060000000000000001040000000000000200000000000000010000000000000051e574640400000001000000000000000400000000000000050000000000000005000000000000000400000000000000ff24444700000000908bc001727fbcd44f4d3bf922995edf2fd379eb00"/489], 0x2c4) r0 = inotify_init() r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) epoll_ctl$EPOLL_CTL_DEL(0xffffffffffffffff, 0x2, r1) inotify_add_watch(r0, &(0x7f0000000000)='.\x00', 0x0) r2 = openat$incfs(0xffffffffffffffff, &(0x7f0000000080)='.log\x00', 0x20200, 0x40) fcntl$getownex(r2, 0x10, &(0x7f00000000c0)) r3 = open(&(0x7f0000000040)='./file0\x00', 0x200c2, 0x0) write$binfmt_elf64(r3, &(0x7f0000000080)=ANY=[], 0x8) sendfile(r3, r3, &(0x7f00000001c0), 0xa198) dup(0xffffffffffffffff) r4 = syz_mount_image$gfs2meta(&(0x7f0000000140)='gfs2meta\x00', &(0x7f0000000200)='./file0\x00', 0x1000, 0x4, &(0x7f0000000880)=[{&(0x7f0000000240)="77ba0daae1b2e74ecd52c59a85bf6f4b1f0b01ab07ba92bc6e57305406115f2bc3e4dd94f19ed896c4fccd34271e9dc3499af9298dbc709e0e6a513d61391d4b198af5f55d24239ae934e8babb8d1cb67bb17b0158", 0x55, 0x3}, {&(0x7f00000002c0)="ae227f954d229f666a6cd22938585e852071e55aa5728addcd315922bf32282e077bdbc63cd5ec89626ee2f8e7982ca239eaa758231056cdca22ca27428407f6c64c384665cfbd00ee6e0d7609f2c7ba0f28b4af70d0307ef78decfe42973915cd509de7c19ea0f3f5c3caaab05f9af08e2cc82d2c14b919dd045e3d36ce1c5d0ff23aed0a4a6ef508b5e71df0a25250d47f1e033ed503b6df99c189111b75b59df679cb75240b756cafecfd203568eeb2c1708fe9f11a2cb0f288590ec76cefbde09c90e9d568492aa5f41196397b70c869838c7164f2bad8eff017d021d7d41c9025c20b", 0xe5, 0x3}, {&(0x7f00000003c0)="792eb6eec33e561f18dc4b58b6a6fb3c7e6fd5e612c08490216ae02617f9811945929cffbf59727393a9a69d57b00a5cd08da3888884b8361d6a4003a54480c1086a5fc876582ff049ede86e2f58d80c7b6cf618e1ba36d4710887bc34ef2b7abbc686df2185f99998060bf492b84e3a02077e2aaf014e1186fde602d2b639d467f48fc2e18cf1553e07ac39040953566ab1d21aac627b166825375377bc3332b62160ea8bf7fc3196b30965dce6181bf7a1c60d0270f24ba60e633c8c88bbdefb5928dc8183c2ce0616de6c3185a4aa7eb2ec6ab7d8394a9536bf7e4f33f76294b0b4a390aca576177671191fe91530e9bd0db79cee", 0xf6, 0x100000000}, {&(0x7f00000004c0)="a90f49b744c1ad7c27bc0a3b1965ca2bce6602b5f5a8b294ced925862d0a9df5c88e43095ba5810ba49c2216e7e1a9b5f07075e6a3101e853557713e983b2f46cf599dc2cba6254802d01794cdc015e28e2b5aa8c10293a4487b3fe2469252f2c2406327b2a5fe71b185ec0adfdc824a237f94", 0x73, 0x7}], 0x21008, &(0x7f0000000900)={[{'.log\x00'}, {'-%('}, {'.log\x00'}], [{@appraise_type='appraise_type=imasig'}, {@fowner_eq={'fowner', 0x3d, 0xee01}}, {@hash='hash'}, {@subj_type={'subj_type', 0x3d, '-&'}}, {@hash='hash'}]}) ioctl$BTRFS_IOC_SUBVOL_SETFLAGS(r4, 0x4008941a, &(0x7f0000000980)=0xfe33b054cbbc4d79) [ 547.673488][T26654] loop5: detected capacity change from 264192 to 0 11:24:41 executing program 1: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x7f, 0x80000000008001}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x9}, 0x0) r1 = open(&(0x7f0000000240)='./file1\x00', 0x141142, 0x0) write$UHID_INPUT(r1, &(0x7f0000001440), 0xfffffc41) open(&(0x7f00000001c0)='./file1\x00', 0x0, 0x6c000000) setxattr$trusted_overlay_nlink(&(0x7f0000000000)='./file1\x00', &(0x7f00000000c0)='trusted.overlay.nlink\x00', 0x0, 0x0, 0x0) 11:24:42 executing program 0: r0 = perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x5c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write$binfmt_elf64(r0, &(0x7f0000000540)=ANY=[@ANYBLOB], 0x2c4) r1 = inotify_init() openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) epoll_ctl$EPOLL_CTL_DEL(0xffffffffffffffff, 0x2, 0xffffffffffffffff) inotify_add_watch(r1, &(0x7f0000000000)='.\x00', 0x400017e) r2 = openat$incfs(0xffffffffffffffff, &(0x7f0000000080)='.log\x00', 0x20200, 0x40) fcntl$getownex(r2, 0x10, &(0x7f00000000c0)) r3 = open(0x0, 0x200c2, 0x0) write$binfmt_elf64(r3, &(0x7f0000000080)=ANY=[], 0x8) sendfile(r3, r3, &(0x7f00000001c0), 0xa198) dup(0xffffffffffffffff) r4 = syz_mount_image$gfs2meta(&(0x7f0000000140)='gfs2meta\x00', &(0x7f0000000200)='./file0\x00', 0x1000, 0x4, &(0x7f0000000880)=[{&(0x7f0000000240)="77ba0daae1b2e74ecd52c59a85bf6f4b1f0b01ab07ba92bc6e57305406115f2bc3e4dd94f19ed896c4fccd34271e9dc3499af9298dbc709e0e6a513d61391d4b198af5f55d24239ae934e8babb8d1cb67bb17b0158", 0x55, 0x3}, {&(0x7f00000002c0)="ae227f954d229f666a6cd22938585e852071e55aa5728addcd315922bf32282e077bdbc63cd5ec89626ee2f8e7982ca239eaa758231056cdca22ca27428407f6c64c384665cfbd00ee6e0d7609f2c7ba0f28b4af70d0307ef78decfe42973915cd509de7c19ea0f3f5c3caaab05f9af08e2cc82d2c14b919dd045e3d36ce1c5d0ff23aed0a4a6ef508b5e71df0a25250d47f1e033ed503b6df99c189111b75b59df679cb75240b756cafecfd203568eeb2c1708fe9f11a2cb0f288590ec76cefbde09c90e9d568492aa5f41196397b70c869838c7164f2bad8eff017d021d7d41c9025c20b", 0xe5, 0x3}, {&(0x7f00000003c0)="792eb6eec33e561f18dc4b58b6a6fb3c7e6fd5e612c08490216ae02617f9811945929cffbf59727393a9a69d57b00a5cd08da3888884b8361d6a4003a54480c1086a5fc876582ff049ede86e2f58d80c7b6cf618e1ba36d4710887bc34ef2b7abbc686df2185f99998060bf492b84e3a02077e2aaf014e1186fde602d2b639d467f48fc2e18cf1553e07ac39040953566ab1d21aac627b166825375377bc3332b62160ea8bf7fc3196b30965dce6181bf7a1c60d0270f24ba60e633c8c88bbdefb5928dc8183c2ce0616de6c3185a4aa7eb2ec6ab7d8394a9536bf7e4f33f76294b0b4a390aca576177671191fe91530e9bd0db79cee", 0xf6, 0x100000000}, {&(0x7f00000004c0)="a90f49b744c1ad7c27bc0a3b1965ca2bce6602b5f5a8b294ced925862d0a9df5c88e43095ba5810ba49c2216e7e1a9b5f07075e6a3101e853557713e983b2f46cf599dc2cba6254802d01794cdc015e28e2b5aa8c10293a4487b3fe2469252f2c2406327b2a5fe71b185ec0adfdc824a237f94", 0x73, 0x7}], 0x21008, &(0x7f0000000900)={[{'.log\x00'}, {'-%('}, {'.log\x00'}], [{@obj_user={'obj_user'}}, {@appraise_type='appraise_type=imasig'}, {@fowner_eq={'fowner', 0x3d, 0xee01}}, {@hash='hash'}, {@subj_type={'subj_type', 0x3d, '-&'}}]}) ioctl$BTRFS_IOC_SUBVOL_SETFLAGS(r4, 0x4008941a, &(0x7f0000000980)=0xfe33b054cbbc4d79) 11:24:42 executing program 4: r0 = perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x5c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write$binfmt_elf64(r0, &(0x7f0000000540)=ANY=[@ANYBLOB], 0x2c4) r1 = inotify_init() openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) epoll_ctl$EPOLL_CTL_DEL(0xffffffffffffffff, 0x2, 0xffffffffffffffff) inotify_add_watch(r1, &(0x7f0000000000)='.\x00', 0x400017e) r2 = openat$incfs(0xffffffffffffffff, &(0x7f0000000080)='.log\x00', 0x20200, 0x40) fcntl$getownex(r2, 0x10, 0x0) r3 = open(&(0x7f0000000040)='./file0\x00', 0x200c2, 0x0) write$binfmt_elf64(r3, &(0x7f0000000080)=ANY=[], 0x8) sendfile(r3, r3, &(0x7f00000001c0), 0xa198) dup(0xffffffffffffffff) r4 = syz_mount_image$gfs2meta(&(0x7f0000000140)='gfs2meta\x00', &(0x7f0000000200)='./file0\x00', 0x1000, 0x4, &(0x7f0000000880)=[{&(0x7f0000000240)="77ba0daae1b2e74ecd52c59a85bf6f4b1f0b01ab07ba92bc6e57305406115f2bc3e4dd94f19ed896c4fccd34271e9dc3499af9298dbc709e0e6a513d61391d4b198af5f55d24239ae934e8babb8d1cb67bb17b0158", 0x55, 0x3}, {&(0x7f00000002c0)="ae227f954d229f666a6cd22938585e852071e55aa5728addcd315922bf32282e077bdbc63cd5ec89626ee2f8e7982ca239eaa758231056cdca22ca27428407f6c64c384665cfbd00ee6e0d7609f2c7ba0f28b4af70d0307ef78decfe42973915cd509de7c19ea0f3f5c3caaab05f9af08e2cc82d2c14b919dd045e3d36ce1c5d0ff23aed0a4a6ef508b5e71df0a25250d47f1e033ed503b6df99c189111b75b59df679cb75240b756cafecfd203568eeb2c1708fe9f11a2cb0f288590ec76cefbde09c90e9d568492aa5f41196397b70c869838c7164f2bad8eff017d021d7d41c9025c20b", 0xe5, 0x3}, {&(0x7f00000003c0)="792eb6eec33e561f18dc4b58b6a6fb3c7e6fd5e612c08490216ae02617f9811945929cffbf59727393a9a69d57b00a5cd08da3888884b8361d6a4003a54480c1086a5fc876582ff049ede86e2f58d80c7b6cf618e1ba36d4710887bc34ef2b7abbc686df2185f99998060bf492b84e3a02077e2aaf014e1186fde602d2b639d467f48fc2e18cf1553e07ac39040953566ab1d21aac627b166825375377bc3332b62160ea8bf7fc3196b30965dce6181bf7a1c60d0270f24ba60e633c8c88bbdefb5928dc8183c2ce0616de6c3185a4aa7eb2ec6ab7d8394a9536bf7e4f33f76294b0b4a390aca576177671191fe91530e9bd0db79cee", 0xf6, 0x100000000}, {&(0x7f00000004c0)="a90f49b744c1ad7c27bc0a3b1965ca2bce6602b5f5a8b294ced925862d0a9df5c88e43095ba5810ba49c2216e7e1a9b5f07075e6a3101e853557713e983b2f46cf599dc2cba6254802d01794cdc015e28e2b5aa8c10293a4487b3fe2469252f2c2406327b2a5fe71b185ec0adfdc824a237f94", 0x73, 0x7}], 0x21008, &(0x7f0000000900)={[{'.log\x00'}, {'-%('}, {'.log\x00'}], [{@obj_user={'obj_user'}}, {@appraise_type='appraise_type=imasig'}, {@fowner_eq={'fowner', 0x3d, 0xee01}}, {@hash='hash'}, {@subj_type={'subj_type', 0x3d, '-&'}}]}) ioctl$BTRFS_IOC_SUBVOL_SETFLAGS(r4, 0x4008941a, &(0x7f0000000980)=0xfe33b054cbbc4d79) [ 548.032694][T26662] loop0: detected capacity change from 264192 to 0 11:24:42 executing program 0: r0 = perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x5c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write$binfmt_elf64(r0, &(0x7f0000000540)=ANY=[@ANYBLOB], 0x2c4) r1 = inotify_init() openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) epoll_ctl$EPOLL_CTL_DEL(0xffffffffffffffff, 0x2, 0xffffffffffffffff) inotify_add_watch(r1, &(0x7f0000000000)='.\x00', 0x400017e) r2 = openat$incfs(0xffffffffffffffff, &(0x7f0000000080)='.log\x00', 0x20200, 0x40) fcntl$getownex(r2, 0x10, &(0x7f00000000c0)) r3 = open(0x0, 0x200c2, 0x0) write$binfmt_elf64(r3, &(0x7f0000000080)=ANY=[], 0x8) sendfile(r3, r3, &(0x7f00000001c0), 0xa198) dup(0xffffffffffffffff) r4 = syz_mount_image$gfs2meta(&(0x7f0000000140)='gfs2meta\x00', &(0x7f0000000200)='./file0\x00', 0x1000, 0x4, &(0x7f0000000880)=[{&(0x7f0000000240)="77ba0daae1b2e74ecd52c59a85bf6f4b1f0b01ab07ba92bc6e57305406115f2bc3e4dd94f19ed896c4fccd34271e9dc3499af9298dbc709e0e6a513d61391d4b198af5f55d24239ae934e8babb8d1cb67bb17b0158", 0x55, 0x3}, {&(0x7f00000002c0)="ae227f954d229f666a6cd22938585e852071e55aa5728addcd315922bf32282e077bdbc63cd5ec89626ee2f8e7982ca239eaa758231056cdca22ca27428407f6c64c384665cfbd00ee6e0d7609f2c7ba0f28b4af70d0307ef78decfe42973915cd509de7c19ea0f3f5c3caaab05f9af08e2cc82d2c14b919dd045e3d36ce1c5d0ff23aed0a4a6ef508b5e71df0a25250d47f1e033ed503b6df99c189111b75b59df679cb75240b756cafecfd203568eeb2c1708fe9f11a2cb0f288590ec76cefbde09c90e9d568492aa5f41196397b70c869838c7164f2bad8eff017d021d7d41c9025c20b", 0xe5, 0x3}, {&(0x7f00000003c0)="792eb6eec33e561f18dc4b58b6a6fb3c7e6fd5e612c08490216ae02617f9811945929cffbf59727393a9a69d57b00a5cd08da3888884b8361d6a4003a54480c1086a5fc876582ff049ede86e2f58d80c7b6cf618e1ba36d4710887bc34ef2b7abbc686df2185f99998060bf492b84e3a02077e2aaf014e1186fde602d2b639d467f48fc2e18cf1553e07ac39040953566ab1d21aac627b166825375377bc3332b62160ea8bf7fc3196b30965dce6181bf7a1c60d0270f24ba60e633c8c88bbdefb5928dc8183c2ce0616de6c3185a4aa7eb2ec6ab7d8394a9536bf7e4f33f76294b0b4a390aca576177671191fe91530e9bd0db79cee", 0xf6, 0x100000000}, {&(0x7f00000004c0)="a90f49b744c1ad7c27bc0a3b1965ca2bce6602b5f5a8b294ced925862d0a9df5c88e43095ba5810ba49c2216e7e1a9b5f07075e6a3101e853557713e983b2f46cf599dc2cba6254802d01794cdc015e28e2b5aa8c10293a4487b3fe2469252f2c2406327b2a5fe71b185ec0adfdc824a237f94", 0x73, 0x7}], 0x21008, &(0x7f0000000900)={[{'.log\x00'}, {'-%('}, {'.log\x00'}], [{@obj_user={'obj_user'}}, {@appraise_type='appraise_type=imasig'}, {@fowner_eq={'fowner', 0x3d, 0xee01}}, {@hash='hash'}, {@subj_type={'subj_type', 0x3d, '-&'}}]}) ioctl$BTRFS_IOC_SUBVOL_SETFLAGS(r4, 0x4008941a, &(0x7f0000000980)=0xfe33b054cbbc4d79) 11:24:42 executing program 2: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x7f, 0x80000000008001}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x9}, 0x0) r1 = open(&(0x7f0000000240)='./file1\x00', 0x141142, 0x0) write$UHID_INPUT(r1, &(0x7f0000001440)={0x8, {'\x00G\x00'}}, 0xfffffc41) open(&(0x7f00000001c0)='./file1\x00', 0x0, 0x0) setxattr$trusted_overlay_nlink(&(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x0, 0x0) [ 548.208717][T26674] loop0: detected capacity change from 264192 to 0 11:24:42 executing program 3: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x7f, 0x80000000008001}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x9}, 0x0) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000080)) r1 = open(&(0x7f0000000240)='./file1\x00', 0x141142, 0x0) write$UHID_INPUT(r1, &(0x7f0000001440)={0x8, {'\x00D\x00'}}, 0xfffffc41) open(&(0x7f00000001c0)='./file1\x00', 0x0, 0x0) setxattr$trusted_overlay_nlink(&(0x7f0000000000)='./file1\x00', &(0x7f00000000c0)='trusted.overlay.nlink\x00', 0x0, 0x0, 0x0) 11:24:42 executing program 0: r0 = perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x5c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write$binfmt_elf64(r0, &(0x7f0000000540)=ANY=[@ANYBLOB], 0x2c4) r1 = inotify_init() openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) epoll_ctl$EPOLL_CTL_DEL(0xffffffffffffffff, 0x2, 0xffffffffffffffff) inotify_add_watch(r1, &(0x7f0000000000)='.\x00', 0x400017e) r2 = openat$incfs(0xffffffffffffffff, &(0x7f0000000080)='.log\x00', 0x20200, 0x40) fcntl$getownex(r2, 0x10, &(0x7f00000000c0)) r3 = open(0x0, 0x200c2, 0x0) write$binfmt_elf64(r3, &(0x7f0000000080)=ANY=[], 0x8) sendfile(r3, r3, &(0x7f00000001c0), 0xa198) dup(0xffffffffffffffff) r4 = syz_mount_image$gfs2meta(&(0x7f0000000140)='gfs2meta\x00', &(0x7f0000000200)='./file0\x00', 0x1000, 0x4, &(0x7f0000000880)=[{&(0x7f0000000240)="77ba0daae1b2e74ecd52c59a85bf6f4b1f0b01ab07ba92bc6e57305406115f2bc3e4dd94f19ed896c4fccd34271e9dc3499af9298dbc709e0e6a513d61391d4b198af5f55d24239ae934e8babb8d1cb67bb17b0158", 0x55, 0x3}, {&(0x7f00000002c0)="ae227f954d229f666a6cd22938585e852071e55aa5728addcd315922bf32282e077bdbc63cd5ec89626ee2f8e7982ca239eaa758231056cdca22ca27428407f6c64c384665cfbd00ee6e0d7609f2c7ba0f28b4af70d0307ef78decfe42973915cd509de7c19ea0f3f5c3caaab05f9af08e2cc82d2c14b919dd045e3d36ce1c5d0ff23aed0a4a6ef508b5e71df0a25250d47f1e033ed503b6df99c189111b75b59df679cb75240b756cafecfd203568eeb2c1708fe9f11a2cb0f288590ec76cefbde09c90e9d568492aa5f41196397b70c869838c7164f2bad8eff017d021d7d41c9025c20b", 0xe5, 0x3}, {&(0x7f00000003c0)="792eb6eec33e561f18dc4b58b6a6fb3c7e6fd5e612c08490216ae02617f9811945929cffbf59727393a9a69d57b00a5cd08da3888884b8361d6a4003a54480c1086a5fc876582ff049ede86e2f58d80c7b6cf618e1ba36d4710887bc34ef2b7abbc686df2185f99998060bf492b84e3a02077e2aaf014e1186fde602d2b639d467f48fc2e18cf1553e07ac39040953566ab1d21aac627b166825375377bc3332b62160ea8bf7fc3196b30965dce6181bf7a1c60d0270f24ba60e633c8c88bbdefb5928dc8183c2ce0616de6c3185a4aa7eb2ec6ab7d8394a9536bf7e4f33f76294b0b4a390aca576177671191fe91530e9bd0db79cee", 0xf6, 0x100000000}, {&(0x7f00000004c0)="a90f49b744c1ad7c27bc0a3b1965ca2bce6602b5f5a8b294ced925862d0a9df5c88e43095ba5810ba49c2216e7e1a9b5f07075e6a3101e853557713e983b2f46cf599dc2cba6254802d01794cdc015e28e2b5aa8c10293a4487b3fe2469252f2c2406327b2a5fe71b185ec0adfdc824a237f94", 0x73, 0x7}], 0x21008, &(0x7f0000000900)={[{'.log\x00'}, {'-%('}, {'.log\x00'}], [{@obj_user={'obj_user'}}, {@appraise_type='appraise_type=imasig'}, {@fowner_eq={'fowner', 0x3d, 0xee01}}, {@hash='hash'}, {@subj_type={'subj_type', 0x3d, '-&'}}]}) ioctl$BTRFS_IOC_SUBVOL_SETFLAGS(r4, 0x4008941a, &(0x7f0000000980)=0xfe33b054cbbc4d79) [ 548.404696][T26677] loop4: detected capacity change from 264192 to 0 11:24:42 executing program 5: write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000540)=ANY=[@ANYBLOB="7f454c4601061f000400000000000000030038000800000032000000000000004000000000000000560200000000000007000000008038000100090002000100010000000100000006000000000000000400000000000000060000000000000001040000000000000200000000000000010000000000000051e574640400000001000000000000000400000000000000050000000000000005000000000000000400000000000000ff24444700000000908bc001727fbcd44f4d3bf922995edf2fd379eb00"/489], 0x2c4) r0 = inotify_init() r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) epoll_ctl$EPOLL_CTL_DEL(0xffffffffffffffff, 0x2, r1) inotify_add_watch(r0, &(0x7f0000000000)='.\x00', 0x0) r2 = openat$incfs(0xffffffffffffffff, &(0x7f0000000080)='.log\x00', 0x20200, 0x40) fcntl$getownex(r2, 0x10, &(0x7f00000000c0)) r3 = open(&(0x7f0000000040)='./file0\x00', 0x200c2, 0x0) write$binfmt_elf64(r3, &(0x7f0000000080)=ANY=[], 0x8) sendfile(r3, r3, &(0x7f00000001c0), 0xa198) dup(0xffffffffffffffff) r4 = syz_mount_image$gfs2meta(&(0x7f0000000140)='gfs2meta\x00', &(0x7f0000000200)='./file0\x00', 0x1000, 0x4, &(0x7f0000000880)=[{&(0x7f0000000240)="77ba0daae1b2e74ecd52c59a85bf6f4b1f0b01ab07ba92bc6e57305406115f2bc3e4dd94f19ed896c4fccd34271e9dc3499af9298dbc709e0e6a513d61391d4b198af5f55d24239ae934e8babb8d1cb67bb17b0158", 0x55, 0x3}, {&(0x7f00000002c0)="ae227f954d229f666a6cd22938585e852071e55aa5728addcd315922bf32282e077bdbc63cd5ec89626ee2f8e7982ca239eaa758231056cdca22ca27428407f6c64c384665cfbd00ee6e0d7609f2c7ba0f28b4af70d0307ef78decfe42973915cd509de7c19ea0f3f5c3caaab05f9af08e2cc82d2c14b919dd045e3d36ce1c5d0ff23aed0a4a6ef508b5e71df0a25250d47f1e033ed503b6df99c189111b75b59df679cb75240b756cafecfd203568eeb2c1708fe9f11a2cb0f288590ec76cefbde09c90e9d568492aa5f41196397b70c869838c7164f2bad8eff017d021d7d41c9025c20b", 0xe5, 0x3}, {&(0x7f00000003c0)="792eb6eec33e561f18dc4b58b6a6fb3c7e6fd5e612c08490216ae02617f9811945929cffbf59727393a9a69d57b00a5cd08da3888884b8361d6a4003a54480c1086a5fc876582ff049ede86e2f58d80c7b6cf618e1ba36d4710887bc34ef2b7abbc686df2185f99998060bf492b84e3a02077e2aaf014e1186fde602d2b639d467f48fc2e18cf1553e07ac39040953566ab1d21aac627b166825375377bc3332b62160ea8bf7fc3196b30965dce6181bf7a1c60d0270f24ba60e633c8c88bbdefb5928dc8183c2ce0616de6c3185a4aa7eb2ec6ab7d8394a9536bf7e4f33f76294b0b4a390aca576177671191fe91530e9bd0db79cee", 0xf6, 0x100000000}, {&(0x7f00000004c0)="a90f49b744c1ad7c27bc0a3b1965ca2bce6602b5f5a8b294ced925862d0a9df5c88e43095ba5810ba49c2216e7e1a9b5f07075e6a3101e853557713e983b2f46cf599dc2cba6254802d01794cdc015e28e2b5aa8c10293a4487b3fe2469252f2c2406327b2a5fe71b185ec0adfdc824a237f94", 0x73, 0x7}], 0x21008, &(0x7f0000000900)={[{'.log\x00'}, {'-%('}, {'.log\x00'}], [{@appraise_type='appraise_type=imasig'}, {@fowner_eq={'fowner', 0x3d, 0xee01}}, {@hash='hash'}, {@subj_type={'subj_type', 0x3d, '-&'}}, {@hash='hash'}]}) ioctl$BTRFS_IOC_SUBVOL_SETFLAGS(r4, 0x4008941a, &(0x7f0000000980)=0xfe33b054cbbc4d79) [ 548.492328][T26687] loop0: detected capacity change from 264192 to 0 11:24:42 executing program 0: r0 = perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x5c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write$binfmt_elf64(r0, &(0x7f0000000540)=ANY=[@ANYBLOB], 0x2c4) r1 = inotify_init() openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) epoll_ctl$EPOLL_CTL_DEL(0xffffffffffffffff, 0x2, 0xffffffffffffffff) inotify_add_watch(r1, &(0x7f0000000000)='.\x00', 0x400017e) r2 = openat$incfs(0xffffffffffffffff, &(0x7f0000000080)='.log\x00', 0x20200, 0x40) fcntl$getownex(r2, 0x10, &(0x7f00000000c0)) r3 = open(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) write$binfmt_elf64(r3, &(0x7f0000000080)=ANY=[], 0x8) sendfile(r3, r3, &(0x7f00000001c0), 0xa198) dup(0xffffffffffffffff) r4 = syz_mount_image$gfs2meta(&(0x7f0000000140)='gfs2meta\x00', &(0x7f0000000200)='./file0\x00', 0x1000, 0x4, &(0x7f0000000880)=[{&(0x7f0000000240)="77ba0daae1b2e74ecd52c59a85bf6f4b1f0b01ab07ba92bc6e57305406115f2bc3e4dd94f19ed896c4fccd34271e9dc3499af9298dbc709e0e6a513d61391d4b198af5f55d24239ae934e8babb8d1cb67bb17b0158", 0x55, 0x3}, {&(0x7f00000002c0)="ae227f954d229f666a6cd22938585e852071e55aa5728addcd315922bf32282e077bdbc63cd5ec89626ee2f8e7982ca239eaa758231056cdca22ca27428407f6c64c384665cfbd00ee6e0d7609f2c7ba0f28b4af70d0307ef78decfe42973915cd509de7c19ea0f3f5c3caaab05f9af08e2cc82d2c14b919dd045e3d36ce1c5d0ff23aed0a4a6ef508b5e71df0a25250d47f1e033ed503b6df99c189111b75b59df679cb75240b756cafecfd203568eeb2c1708fe9f11a2cb0f288590ec76cefbde09c90e9d568492aa5f41196397b70c869838c7164f2bad8eff017d021d7d41c9025c20b", 0xe5, 0x3}, {&(0x7f00000003c0)="792eb6eec33e561f18dc4b58b6a6fb3c7e6fd5e612c08490216ae02617f9811945929cffbf59727393a9a69d57b00a5cd08da3888884b8361d6a4003a54480c1086a5fc876582ff049ede86e2f58d80c7b6cf618e1ba36d4710887bc34ef2b7abbc686df2185f99998060bf492b84e3a02077e2aaf014e1186fde602d2b639d467f48fc2e18cf1553e07ac39040953566ab1d21aac627b166825375377bc3332b62160ea8bf7fc3196b30965dce6181bf7a1c60d0270f24ba60e633c8c88bbdefb5928dc8183c2ce0616de6c3185a4aa7eb2ec6ab7d8394a9536bf7e4f33f76294b0b4a390aca576177671191fe91530e9bd0db79cee", 0xf6, 0x100000000}, {&(0x7f00000004c0)="a90f49b744c1ad7c27bc0a3b1965ca2bce6602b5f5a8b294ced925862d0a9df5c88e43095ba5810ba49c2216e7e1a9b5f07075e6a3101e853557713e983b2f46cf599dc2cba6254802d01794cdc015e28e2b5aa8c10293a4487b3fe2469252f2c2406327b2a5fe71b185ec0adfdc824a237f94", 0x73, 0x7}], 0x21008, &(0x7f0000000900)={[{'.log\x00'}, {'-%('}, {'.log\x00'}], [{@obj_user={'obj_user'}}, {@appraise_type='appraise_type=imasig'}, {@fowner_eq={'fowner', 0x3d, 0xee01}}, {@hash='hash'}, {@subj_type={'subj_type', 0x3d, '-&'}}]}) ioctl$BTRFS_IOC_SUBVOL_SETFLAGS(r4, 0x4008941a, &(0x7f0000000980)=0xfe33b054cbbc4d79) [ 548.626721][T26699] loop5: detected capacity change from 264192 to 0 [ 548.708947][T26704] loop0: detected capacity change from 264192 to 0 11:24:42 executing program 0: r0 = perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x5c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write$binfmt_elf64(r0, &(0x7f0000000540)=ANY=[@ANYBLOB], 0x2c4) r1 = inotify_init() openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) epoll_ctl$EPOLL_CTL_DEL(0xffffffffffffffff, 0x2, 0xffffffffffffffff) inotify_add_watch(r1, &(0x7f0000000000)='.\x00', 0x400017e) r2 = openat$incfs(0xffffffffffffffff, &(0x7f0000000080)='.log\x00', 0x20200, 0x40) fcntl$getownex(r2, 0x10, &(0x7f00000000c0)) r3 = open(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) write$binfmt_elf64(r3, &(0x7f0000000080)=ANY=[], 0x8) sendfile(r3, r3, &(0x7f00000001c0), 0xa198) dup(0xffffffffffffffff) r4 = syz_mount_image$gfs2meta(&(0x7f0000000140)='gfs2meta\x00', &(0x7f0000000200)='./file0\x00', 0x1000, 0x4, &(0x7f0000000880)=[{&(0x7f0000000240)="77ba0daae1b2e74ecd52c59a85bf6f4b1f0b01ab07ba92bc6e57305406115f2bc3e4dd94f19ed896c4fccd34271e9dc3499af9298dbc709e0e6a513d61391d4b198af5f55d24239ae934e8babb8d1cb67bb17b0158", 0x55, 0x3}, {&(0x7f00000002c0)="ae227f954d229f666a6cd22938585e852071e55aa5728addcd315922bf32282e077bdbc63cd5ec89626ee2f8e7982ca239eaa758231056cdca22ca27428407f6c64c384665cfbd00ee6e0d7609f2c7ba0f28b4af70d0307ef78decfe42973915cd509de7c19ea0f3f5c3caaab05f9af08e2cc82d2c14b919dd045e3d36ce1c5d0ff23aed0a4a6ef508b5e71df0a25250d47f1e033ed503b6df99c189111b75b59df679cb75240b756cafecfd203568eeb2c1708fe9f11a2cb0f288590ec76cefbde09c90e9d568492aa5f41196397b70c869838c7164f2bad8eff017d021d7d41c9025c20b", 0xe5, 0x3}, {&(0x7f00000003c0)="792eb6eec33e561f18dc4b58b6a6fb3c7e6fd5e612c08490216ae02617f9811945929cffbf59727393a9a69d57b00a5cd08da3888884b8361d6a4003a54480c1086a5fc876582ff049ede86e2f58d80c7b6cf618e1ba36d4710887bc34ef2b7abbc686df2185f99998060bf492b84e3a02077e2aaf014e1186fde602d2b639d467f48fc2e18cf1553e07ac39040953566ab1d21aac627b166825375377bc3332b62160ea8bf7fc3196b30965dce6181bf7a1c60d0270f24ba60e633c8c88bbdefb5928dc8183c2ce0616de6c3185a4aa7eb2ec6ab7d8394a9536bf7e4f33f76294b0b4a390aca576177671191fe91530e9bd0db79cee", 0xf6, 0x100000000}, {&(0x7f00000004c0)="a90f49b744c1ad7c27bc0a3b1965ca2bce6602b5f5a8b294ced925862d0a9df5c88e43095ba5810ba49c2216e7e1a9b5f07075e6a3101e853557713e983b2f46cf599dc2cba6254802d01794cdc015e28e2b5aa8c10293a4487b3fe2469252f2c2406327b2a5fe71b185ec0adfdc824a237f94", 0x73, 0x7}], 0x21008, &(0x7f0000000900)={[{'.log\x00'}, {'-%('}, {'.log\x00'}], [{@obj_user={'obj_user'}}, {@appraise_type='appraise_type=imasig'}, {@fowner_eq={'fowner', 0x3d, 0xee01}}, {@hash='hash'}, {@subj_type={'subj_type', 0x3d, '-&'}}]}) ioctl$BTRFS_IOC_SUBVOL_SETFLAGS(r4, 0x4008941a, &(0x7f0000000980)=0xfe33b054cbbc4d79) [ 548.830197][T26713] loop0: detected capacity change from 264192 to 0 11:24:42 executing program 0: r0 = perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x5c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write$binfmt_elf64(r0, &(0x7f0000000540)=ANY=[@ANYBLOB], 0x2c4) r1 = inotify_init() openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) epoll_ctl$EPOLL_CTL_DEL(0xffffffffffffffff, 0x2, 0xffffffffffffffff) inotify_add_watch(r1, &(0x7f0000000000)='.\x00', 0x400017e) r2 = openat$incfs(0xffffffffffffffff, &(0x7f0000000080)='.log\x00', 0x20200, 0x40) fcntl$getownex(r2, 0x10, &(0x7f00000000c0)) r3 = open(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) write$binfmt_elf64(r3, &(0x7f0000000080)=ANY=[], 0x8) sendfile(r3, r3, &(0x7f00000001c0), 0xa198) dup(0xffffffffffffffff) r4 = syz_mount_image$gfs2meta(&(0x7f0000000140)='gfs2meta\x00', &(0x7f0000000200)='./file0\x00', 0x1000, 0x4, &(0x7f0000000880)=[{&(0x7f0000000240)="77ba0daae1b2e74ecd52c59a85bf6f4b1f0b01ab07ba92bc6e57305406115f2bc3e4dd94f19ed896c4fccd34271e9dc3499af9298dbc709e0e6a513d61391d4b198af5f55d24239ae934e8babb8d1cb67bb17b0158", 0x55, 0x3}, {&(0x7f00000002c0)="ae227f954d229f666a6cd22938585e852071e55aa5728addcd315922bf32282e077bdbc63cd5ec89626ee2f8e7982ca239eaa758231056cdca22ca27428407f6c64c384665cfbd00ee6e0d7609f2c7ba0f28b4af70d0307ef78decfe42973915cd509de7c19ea0f3f5c3caaab05f9af08e2cc82d2c14b919dd045e3d36ce1c5d0ff23aed0a4a6ef508b5e71df0a25250d47f1e033ed503b6df99c189111b75b59df679cb75240b756cafecfd203568eeb2c1708fe9f11a2cb0f288590ec76cefbde09c90e9d568492aa5f41196397b70c869838c7164f2bad8eff017d021d7d41c9025c20b", 0xe5, 0x3}, {&(0x7f00000003c0)="792eb6eec33e561f18dc4b58b6a6fb3c7e6fd5e612c08490216ae02617f9811945929cffbf59727393a9a69d57b00a5cd08da3888884b8361d6a4003a54480c1086a5fc876582ff049ede86e2f58d80c7b6cf618e1ba36d4710887bc34ef2b7abbc686df2185f99998060bf492b84e3a02077e2aaf014e1186fde602d2b639d467f48fc2e18cf1553e07ac39040953566ab1d21aac627b166825375377bc3332b62160ea8bf7fc3196b30965dce6181bf7a1c60d0270f24ba60e633c8c88bbdefb5928dc8183c2ce0616de6c3185a4aa7eb2ec6ab7d8394a9536bf7e4f33f76294b0b4a390aca576177671191fe91530e9bd0db79cee", 0xf6, 0x100000000}, {&(0x7f00000004c0)="a90f49b744c1ad7c27bc0a3b1965ca2bce6602b5f5a8b294ced925862d0a9df5c88e43095ba5810ba49c2216e7e1a9b5f07075e6a3101e853557713e983b2f46cf599dc2cba6254802d01794cdc015e28e2b5aa8c10293a4487b3fe2469252f2c2406327b2a5fe71b185ec0adfdc824a237f94", 0x73, 0x7}], 0x21008, &(0x7f0000000900)={[{'.log\x00'}, {'-%('}, {'.log\x00'}], [{@obj_user={'obj_user'}}, {@appraise_type='appraise_type=imasig'}, {@fowner_eq={'fowner', 0x3d, 0xee01}}, {@hash='hash'}, {@subj_type={'subj_type', 0x3d, '-&'}}]}) ioctl$BTRFS_IOC_SUBVOL_SETFLAGS(r4, 0x4008941a, &(0x7f0000000980)=0xfe33b054cbbc4d79) 11:24:43 executing program 4: r0 = perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x5c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write$binfmt_elf64(r0, &(0x7f0000000540)=ANY=[@ANYBLOB], 0x2c4) r1 = inotify_init() openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) epoll_ctl$EPOLL_CTL_DEL(0xffffffffffffffff, 0x2, 0xffffffffffffffff) inotify_add_watch(r1, &(0x7f0000000000)='.\x00', 0x400017e) r2 = openat$incfs(0xffffffffffffffff, &(0x7f0000000080)='.log\x00', 0x20200, 0x40) fcntl$getownex(r2, 0x10, &(0x7f00000000c0)) r3 = open(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) write$binfmt_elf64(r3, &(0x7f0000000080)=ANY=[], 0x8) sendfile(r3, r3, &(0x7f00000001c0), 0xa198) dup(0xffffffffffffffff) r4 = syz_mount_image$gfs2meta(&(0x7f0000000140)='gfs2meta\x00', &(0x7f0000000200)='./file0\x00', 0x1000, 0x4, &(0x7f0000000880)=[{&(0x7f0000000240)="77ba0daae1b2e74ecd52c59a85bf6f4b1f0b01ab07ba92bc6e57305406115f2bc3e4dd94f19ed896c4fccd34271e9dc3499af9298dbc709e0e6a513d61391d4b198af5f55d24239ae934e8babb8d1cb67bb17b0158", 0x55, 0x3}, {&(0x7f00000002c0)="ae227f954d229f666a6cd22938585e852071e55aa5728addcd315922bf32282e077bdbc63cd5ec89626ee2f8e7982ca239eaa758231056cdca22ca27428407f6c64c384665cfbd00ee6e0d7609f2c7ba0f28b4af70d0307ef78decfe42973915cd509de7c19ea0f3f5c3caaab05f9af08e2cc82d2c14b919dd045e3d36ce1c5d0ff23aed0a4a6ef508b5e71df0a25250d47f1e033ed503b6df99c189111b75b59df679cb75240b756cafecfd203568eeb2c1708fe9f11a2cb0f288590ec76cefbde09c90e9d568492aa5f41196397b70c869838c7164f2bad8eff017d021d7d41c9025c20b", 0xe5, 0x3}, {&(0x7f00000003c0)="792eb6eec33e561f18dc4b58b6a6fb3c7e6fd5e612c08490216ae02617f9811945929cffbf59727393a9a69d57b00a5cd08da3888884b8361d6a4003a54480c1086a5fc876582ff049ede86e2f58d80c7b6cf618e1ba36d4710887bc34ef2b7abbc686df2185f99998060bf492b84e3a02077e2aaf014e1186fde602d2b639d467f48fc2e18cf1553e07ac39040953566ab1d21aac627b166825375377bc3332b62160ea8bf7fc3196b30965dce6181bf7a1c60d0270f24ba60e633c8c88bbdefb5928dc8183c2ce0616de6c3185a4aa7eb2ec6ab7d8394a9536bf7e4f33f76294b0b4a390aca576177671191fe91530e9bd0db79cee", 0xf6, 0x100000000}, {&(0x7f00000004c0)="a90f49b744c1ad7c27bc0a3b1965ca2bce6602b5f5a8b294ced925862d0a9df5c88e43095ba5810ba49c2216e7e1a9b5f07075e6a3101e853557713e983b2f46cf599dc2cba6254802d01794cdc015e28e2b5aa8c10293a4487b3fe2469252f2c2406327b2a5fe71b185ec0adfdc824a237f94", 0x73, 0x7}], 0x21008, &(0x7f0000000900)={[{'.log\x00'}, {'-%('}, {'.log\x00'}], [{@obj_user={'obj_user'}}, {@appraise_type='appraise_type=imasig'}, {@fowner_eq={'fowner', 0x3d, 0xee01}}, {@hash='hash'}, {@subj_type={'subj_type', 0x3d, '-&'}}]}) ioctl$BTRFS_IOC_SUBVOL_SETFLAGS(r4, 0x4008941a, &(0x7f0000000980)=0xfe33b054cbbc4d79) [ 548.996006][T26720] loop0: detected capacity change from 264192 to 0 [ 549.106226][T26726] loop4: detected capacity change from 264192 to 0 11:24:43 executing program 1: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x7f, 0x80000000008001}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x9}, 0x0) r1 = open(&(0x7f0000000240)='./file1\x00', 0x141142, 0x0) write$UHID_INPUT(r1, &(0x7f0000001440), 0xfffffc41) open(&(0x7f00000001c0)='./file1\x00', 0x0, 0x74000000) setxattr$trusted_overlay_nlink(&(0x7f0000000000)='./file1\x00', &(0x7f00000000c0)='trusted.overlay.nlink\x00', 0x0, 0x0, 0x0) 11:24:43 executing program 2: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x7f, 0x80000000008001}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x9}, 0x0) r1 = open(&(0x7f0000000240)='./file1\x00', 0x141142, 0x0) write$UHID_INPUT(r1, &(0x7f0000001440)={0x8, {'\x00H\x00'}}, 0xfffffc41) open(&(0x7f00000001c0)='./file1\x00', 0x0, 0x0) setxattr$trusted_overlay_nlink(&(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x0, 0x0) 11:24:43 executing program 4: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x7f, 0x80000000008001}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x9}, 0x0) r1 = open(&(0x7f0000000240)='./file1\x00', 0x141142, 0x0) write$UHID_INPUT(r1, &(0x7f0000001440)={0x8, {'\x00G\x00'}}, 0xfffffc41) open(&(0x7f00000001c0)='./file1\x00', 0x0, 0x0) setxattr$trusted_overlay_nlink(&(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x0, 0x0) 11:24:43 executing program 0: r0 = perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x5c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write$binfmt_elf64(r0, &(0x7f0000000540)=ANY=[@ANYBLOB], 0x2c4) r1 = inotify_init() openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) epoll_ctl$EPOLL_CTL_DEL(0xffffffffffffffff, 0x2, 0xffffffffffffffff) inotify_add_watch(r1, &(0x7f0000000000)='.\x00', 0x400017e) r2 = openat$incfs(0xffffffffffffffff, &(0x7f0000000080)='.log\x00', 0x20200, 0x40) fcntl$getownex(r2, 0x10, &(0x7f00000000c0)) r3 = open(&(0x7f0000000040)='./file0\x00', 0x200c2, 0x0) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000080)=ANY=[], 0x8) sendfile(r3, r3, &(0x7f00000001c0), 0xa198) dup(0xffffffffffffffff) r4 = syz_mount_image$gfs2meta(&(0x7f0000000140)='gfs2meta\x00', &(0x7f0000000200)='./file0\x00', 0x1000, 0x4, &(0x7f0000000880)=[{&(0x7f0000000240)="77ba0daae1b2e74ecd52c59a85bf6f4b1f0b01ab07ba92bc6e57305406115f2bc3e4dd94f19ed896c4fccd34271e9dc3499af9298dbc709e0e6a513d61391d4b198af5f55d24239ae934e8babb8d1cb67bb17b0158", 0x55, 0x3}, {&(0x7f00000002c0)="ae227f954d229f666a6cd22938585e852071e55aa5728addcd315922bf32282e077bdbc63cd5ec89626ee2f8e7982ca239eaa758231056cdca22ca27428407f6c64c384665cfbd00ee6e0d7609f2c7ba0f28b4af70d0307ef78decfe42973915cd509de7c19ea0f3f5c3caaab05f9af08e2cc82d2c14b919dd045e3d36ce1c5d0ff23aed0a4a6ef508b5e71df0a25250d47f1e033ed503b6df99c189111b75b59df679cb75240b756cafecfd203568eeb2c1708fe9f11a2cb0f288590ec76cefbde09c90e9d568492aa5f41196397b70c869838c7164f2bad8eff017d021d7d41c9025c20b", 0xe5, 0x3}, {&(0x7f00000003c0)="792eb6eec33e561f18dc4b58b6a6fb3c7e6fd5e612c08490216ae02617f9811945929cffbf59727393a9a69d57b00a5cd08da3888884b8361d6a4003a54480c1086a5fc876582ff049ede86e2f58d80c7b6cf618e1ba36d4710887bc34ef2b7abbc686df2185f99998060bf492b84e3a02077e2aaf014e1186fde602d2b639d467f48fc2e18cf1553e07ac39040953566ab1d21aac627b166825375377bc3332b62160ea8bf7fc3196b30965dce6181bf7a1c60d0270f24ba60e633c8c88bbdefb5928dc8183c2ce0616de6c3185a4aa7eb2ec6ab7d8394a9536bf7e4f33f76294b0b4a390aca576177671191fe91530e9bd0db79cee", 0xf6, 0x100000000}, {&(0x7f00000004c0)="a90f49b744c1ad7c27bc0a3b1965ca2bce6602b5f5a8b294ced925862d0a9df5c88e43095ba5810ba49c2216e7e1a9b5f07075e6a3101e853557713e983b2f46cf599dc2cba6254802d01794cdc015e28e2b5aa8c10293a4487b3fe2469252f2c2406327b2a5fe71b185ec0adfdc824a237f94", 0x73, 0x7}], 0x21008, &(0x7f0000000900)={[{'.log\x00'}, {'-%('}, {'.log\x00'}], [{@obj_user={'obj_user'}}, {@appraise_type='appraise_type=imasig'}, {@fowner_eq={'fowner', 0x3d, 0xee01}}, {@hash='hash'}, {@subj_type={'subj_type', 0x3d, '-&'}}]}) ioctl$BTRFS_IOC_SUBVOL_SETFLAGS(r4, 0x4008941a, &(0x7f0000000980)=0xfe33b054cbbc4d79) [ 549.318777][T26734] loop0: detected capacity change from 264192 to 0 11:24:43 executing program 5: write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000540)=ANY=[@ANYBLOB="7f454c4601061f000400000000000000030038000800000032000000000000004000000000000000560200000000000007000000008038000100090002000100010000000100000006000000000000000400000000000000060000000000000001040000000000000200000000000000010000000000000051e574640400000001000000000000000400000000000000050000000000000005000000000000000400000000000000ff24444700000000908bc001727fbcd44f4d3bf922995edf2fd379eb00"/489], 0x2c4) r0 = inotify_init() r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) epoll_ctl$EPOLL_CTL_DEL(0xffffffffffffffff, 0x2, r1) inotify_add_watch(r0, &(0x7f0000000000)='.\x00', 0x400017e) r2 = openat$incfs(0xffffffffffffffff, 0x0, 0x20200, 0x40) fcntl$getownex(r2, 0x10, &(0x7f00000000c0)) r3 = open(&(0x7f0000000040)='./file0\x00', 0x200c2, 0x0) write$binfmt_elf64(r3, &(0x7f0000000080)=ANY=[], 0x8) sendfile(r3, r3, &(0x7f00000001c0), 0xa198) dup(0xffffffffffffffff) r4 = syz_mount_image$gfs2meta(&(0x7f0000000140)='gfs2meta\x00', &(0x7f0000000200)='./file0\x00', 0x1000, 0x4, &(0x7f0000000880)=[{&(0x7f0000000240)="77ba0daae1b2e74ecd52c59a85bf6f4b1f0b01ab07ba92bc6e57305406115f2bc3e4dd94f19ed896c4fccd34271e9dc3499af9298dbc709e0e6a513d61391d4b198af5f55d24239ae934e8babb8d1cb67bb17b0158", 0x55, 0x3}, {&(0x7f00000002c0)="ae227f954d229f666a6cd22938585e852071e55aa5728addcd315922bf32282e077bdbc63cd5ec89626ee2f8e7982ca239eaa758231056cdca22ca27428407f6c64c384665cfbd00ee6e0d7609f2c7ba0f28b4af70d0307ef78decfe42973915cd509de7c19ea0f3f5c3caaab05f9af08e2cc82d2c14b919dd045e3d36ce1c5d0ff23aed0a4a6ef508b5e71df0a25250d47f1e033ed503b6df99c189111b75b59df679cb75240b756cafecfd203568eeb2c1708fe9f11a2cb0f288590ec76cefbde09c90e9d568492aa5f41196397b70c869838c7164f2bad8eff017d021d7d41c9025c20b", 0xe5, 0x3}, {&(0x7f00000003c0)="792eb6eec33e561f18dc4b58b6a6fb3c7e6fd5e612c08490216ae02617f9811945929cffbf59727393a9a69d57b00a5cd08da3888884b8361d6a4003a54480c1086a5fc876582ff049ede86e2f58d80c7b6cf618e1ba36d4710887bc34ef2b7abbc686df2185f99998060bf492b84e3a02077e2aaf014e1186fde602d2b639d467f48fc2e18cf1553e07ac39040953566ab1d21aac627b166825375377bc3332b62160ea8bf7fc3196b30965dce6181bf7a1c60d0270f24ba60e633c8c88bbdefb5928dc8183c2ce0616de6c3185a4aa7eb2ec6ab7d8394a9536bf7e4f33f76294b0b4a390aca576177671191fe91530e9bd0db79cee", 0xf6, 0x100000000}, {&(0x7f00000004c0)="a90f49b744c1ad7c27bc0a3b1965ca2bce6602b5f5a8b294ced925862d0a9df5c88e43095ba5810ba49c2216e7e1a9b5f07075e6a3101e853557713e983b2f46cf599dc2cba6254802d01794cdc015e28e2b5aa8c10293a4487b3fe2469252f2c2406327b2a5fe71b185ec0adfdc824a237f94", 0x73, 0x7}], 0x21008, &(0x7f0000000900)={[{'.log\x00'}, {'-%('}, {'.log\x00'}], [{@appraise_type='appraise_type=imasig'}, {@fowner_eq={'fowner', 0x3d, 0xee01}}, {@hash='hash'}, {@subj_type={'subj_type', 0x3d, '-&'}}, {@hash='hash'}]}) ioctl$BTRFS_IOC_SUBVOL_SETFLAGS(r4, 0x4008941a, &(0x7f0000000980)=0xfe33b054cbbc4d79) 11:24:43 executing program 3: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x7f, 0x80000000008001}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x9}, 0x0) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000080)) r1 = open(&(0x7f0000000240)='./file1\x00', 0x141142, 0x0) write$UHID_INPUT(r1, &(0x7f0000001440)={0x8, {'\x00E\x00'}}, 0xfffffc41) open(&(0x7f00000001c0)='./file1\x00', 0x0, 0x0) setxattr$trusted_overlay_nlink(&(0x7f0000000000)='./file1\x00', &(0x7f00000000c0)='trusted.overlay.nlink\x00', 0x0, 0x0, 0x0) 11:24:43 executing program 0: r0 = perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x5c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write$binfmt_elf64(r0, &(0x7f0000000540)=ANY=[@ANYBLOB], 0x2c4) r1 = inotify_init() openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) epoll_ctl$EPOLL_CTL_DEL(0xffffffffffffffff, 0x2, 0xffffffffffffffff) inotify_add_watch(r1, &(0x7f0000000000)='.\x00', 0x400017e) r2 = openat$incfs(0xffffffffffffffff, &(0x7f0000000080)='.log\x00', 0x20200, 0x40) fcntl$getownex(r2, 0x10, &(0x7f00000000c0)) r3 = open(&(0x7f0000000040)='./file0\x00', 0x200c2, 0x0) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000080)=ANY=[], 0x8) sendfile(r3, r3, &(0x7f00000001c0), 0xa198) dup(0xffffffffffffffff) r4 = syz_mount_image$gfs2meta(&(0x7f0000000140)='gfs2meta\x00', &(0x7f0000000200)='./file0\x00', 0x1000, 0x4, &(0x7f0000000880)=[{&(0x7f0000000240)="77ba0daae1b2e74ecd52c59a85bf6f4b1f0b01ab07ba92bc6e57305406115f2bc3e4dd94f19ed896c4fccd34271e9dc3499af9298dbc709e0e6a513d61391d4b198af5f55d24239ae934e8babb8d1cb67bb17b0158", 0x55, 0x3}, {&(0x7f00000002c0)="ae227f954d229f666a6cd22938585e852071e55aa5728addcd315922bf32282e077bdbc63cd5ec89626ee2f8e7982ca239eaa758231056cdca22ca27428407f6c64c384665cfbd00ee6e0d7609f2c7ba0f28b4af70d0307ef78decfe42973915cd509de7c19ea0f3f5c3caaab05f9af08e2cc82d2c14b919dd045e3d36ce1c5d0ff23aed0a4a6ef508b5e71df0a25250d47f1e033ed503b6df99c189111b75b59df679cb75240b756cafecfd203568eeb2c1708fe9f11a2cb0f288590ec76cefbde09c90e9d568492aa5f41196397b70c869838c7164f2bad8eff017d021d7d41c9025c20b", 0xe5, 0x3}, {&(0x7f00000003c0)="792eb6eec33e561f18dc4b58b6a6fb3c7e6fd5e612c08490216ae02617f9811945929cffbf59727393a9a69d57b00a5cd08da3888884b8361d6a4003a54480c1086a5fc876582ff049ede86e2f58d80c7b6cf618e1ba36d4710887bc34ef2b7abbc686df2185f99998060bf492b84e3a02077e2aaf014e1186fde602d2b639d467f48fc2e18cf1553e07ac39040953566ab1d21aac627b166825375377bc3332b62160ea8bf7fc3196b30965dce6181bf7a1c60d0270f24ba60e633c8c88bbdefb5928dc8183c2ce0616de6c3185a4aa7eb2ec6ab7d8394a9536bf7e4f33f76294b0b4a390aca576177671191fe91530e9bd0db79cee", 0xf6, 0x100000000}, {&(0x7f00000004c0)="a90f49b744c1ad7c27bc0a3b1965ca2bce6602b5f5a8b294ced925862d0a9df5c88e43095ba5810ba49c2216e7e1a9b5f07075e6a3101e853557713e983b2f46cf599dc2cba6254802d01794cdc015e28e2b5aa8c10293a4487b3fe2469252f2c2406327b2a5fe71b185ec0adfdc824a237f94", 0x73, 0x7}], 0x21008, &(0x7f0000000900)={[{'.log\x00'}, {'-%('}, {'.log\x00'}], [{@obj_user={'obj_user'}}, {@appraise_type='appraise_type=imasig'}, {@fowner_eq={'fowner', 0x3d, 0xee01}}, {@hash='hash'}, {@subj_type={'subj_type', 0x3d, '-&'}}]}) ioctl$BTRFS_IOC_SUBVOL_SETFLAGS(r4, 0x4008941a, &(0x7f0000000980)=0xfe33b054cbbc4d79) [ 549.578990][T26753] loop0: detected capacity change from 264192 to 0 11:24:43 executing program 0: r0 = perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x5c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write$binfmt_elf64(r0, &(0x7f0000000540)=ANY=[@ANYBLOB], 0x2c4) r1 = inotify_init() openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) epoll_ctl$EPOLL_CTL_DEL(0xffffffffffffffff, 0x2, 0xffffffffffffffff) inotify_add_watch(r1, &(0x7f0000000000)='.\x00', 0x400017e) r2 = openat$incfs(0xffffffffffffffff, &(0x7f0000000080)='.log\x00', 0x20200, 0x40) fcntl$getownex(r2, 0x10, &(0x7f00000000c0)) r3 = open(&(0x7f0000000040)='./file0\x00', 0x200c2, 0x0) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000080)=ANY=[], 0x8) sendfile(r3, r3, &(0x7f00000001c0), 0xa198) dup(0xffffffffffffffff) r4 = syz_mount_image$gfs2meta(&(0x7f0000000140)='gfs2meta\x00', &(0x7f0000000200)='./file0\x00', 0x1000, 0x4, &(0x7f0000000880)=[{&(0x7f0000000240)="77ba0daae1b2e74ecd52c59a85bf6f4b1f0b01ab07ba92bc6e57305406115f2bc3e4dd94f19ed896c4fccd34271e9dc3499af9298dbc709e0e6a513d61391d4b198af5f55d24239ae934e8babb8d1cb67bb17b0158", 0x55, 0x3}, {&(0x7f00000002c0)="ae227f954d229f666a6cd22938585e852071e55aa5728addcd315922bf32282e077bdbc63cd5ec89626ee2f8e7982ca239eaa758231056cdca22ca27428407f6c64c384665cfbd00ee6e0d7609f2c7ba0f28b4af70d0307ef78decfe42973915cd509de7c19ea0f3f5c3caaab05f9af08e2cc82d2c14b919dd045e3d36ce1c5d0ff23aed0a4a6ef508b5e71df0a25250d47f1e033ed503b6df99c189111b75b59df679cb75240b756cafecfd203568eeb2c1708fe9f11a2cb0f288590ec76cefbde09c90e9d568492aa5f41196397b70c869838c7164f2bad8eff017d021d7d41c9025c20b", 0xe5, 0x3}, {&(0x7f00000003c0)="792eb6eec33e561f18dc4b58b6a6fb3c7e6fd5e612c08490216ae02617f9811945929cffbf59727393a9a69d57b00a5cd08da3888884b8361d6a4003a54480c1086a5fc876582ff049ede86e2f58d80c7b6cf618e1ba36d4710887bc34ef2b7abbc686df2185f99998060bf492b84e3a02077e2aaf014e1186fde602d2b639d467f48fc2e18cf1553e07ac39040953566ab1d21aac627b166825375377bc3332b62160ea8bf7fc3196b30965dce6181bf7a1c60d0270f24ba60e633c8c88bbdefb5928dc8183c2ce0616de6c3185a4aa7eb2ec6ab7d8394a9536bf7e4f33f76294b0b4a390aca576177671191fe91530e9bd0db79cee", 0xf6, 0x100000000}, {&(0x7f00000004c0)="a90f49b744c1ad7c27bc0a3b1965ca2bce6602b5f5a8b294ced925862d0a9df5c88e43095ba5810ba49c2216e7e1a9b5f07075e6a3101e853557713e983b2f46cf599dc2cba6254802d01794cdc015e28e2b5aa8c10293a4487b3fe2469252f2c2406327b2a5fe71b185ec0adfdc824a237f94", 0x73, 0x7}], 0x21008, &(0x7f0000000900)={[{'.log\x00'}, {'-%('}, {'.log\x00'}], [{@obj_user={'obj_user'}}, {@appraise_type='appraise_type=imasig'}, {@fowner_eq={'fowner', 0x3d, 0xee01}}, {@hash='hash'}, {@subj_type={'subj_type', 0x3d, '-&'}}]}) ioctl$BTRFS_IOC_SUBVOL_SETFLAGS(r4, 0x4008941a, &(0x7f0000000980)=0xfe33b054cbbc4d79) [ 549.630500][T26756] loop5: detected capacity change from 264192 to 0 [ 549.700365][ T35] kauditd_printk_skb: 28 callbacks suppressed [ 549.700400][ T35] audit: type=1804 audit(1612178683.776:2101): pid=26740 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.4" name="/root/syzkaller-testdir068764309/syzkaller.I2gCPs/433/file1" dev="sda1" ino=15821 res=1 errno=0 [ 549.770240][T26768] loop0: detected capacity change from 264192 to 0 11:24:43 executing program 0: r0 = perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x5c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write$binfmt_elf64(r0, &(0x7f0000000540)=ANY=[@ANYBLOB], 0x2c4) r1 = inotify_init() openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) epoll_ctl$EPOLL_CTL_DEL(0xffffffffffffffff, 0x2, 0xffffffffffffffff) inotify_add_watch(r1, &(0x7f0000000000)='.\x00', 0x400017e) r2 = openat$incfs(0xffffffffffffffff, &(0x7f0000000080)='.log\x00', 0x20200, 0x40) fcntl$getownex(r2, 0x10, &(0x7f00000000c0)) r3 = open(&(0x7f0000000040)='./file0\x00', 0x200c2, 0x0) write$binfmt_elf64(r3, 0x0, 0x8) sendfile(r3, r3, &(0x7f00000001c0), 0xa198) dup(0xffffffffffffffff) r4 = syz_mount_image$gfs2meta(&(0x7f0000000140)='gfs2meta\x00', &(0x7f0000000200)='./file0\x00', 0x1000, 0x4, &(0x7f0000000880)=[{&(0x7f0000000240)="77ba0daae1b2e74ecd52c59a85bf6f4b1f0b01ab07ba92bc6e57305406115f2bc3e4dd94f19ed896c4fccd34271e9dc3499af9298dbc709e0e6a513d61391d4b198af5f55d24239ae934e8babb8d1cb67bb17b0158", 0x55, 0x3}, {&(0x7f00000002c0)="ae227f954d229f666a6cd22938585e852071e55aa5728addcd315922bf32282e077bdbc63cd5ec89626ee2f8e7982ca239eaa758231056cdca22ca27428407f6c64c384665cfbd00ee6e0d7609f2c7ba0f28b4af70d0307ef78decfe42973915cd509de7c19ea0f3f5c3caaab05f9af08e2cc82d2c14b919dd045e3d36ce1c5d0ff23aed0a4a6ef508b5e71df0a25250d47f1e033ed503b6df99c189111b75b59df679cb75240b756cafecfd203568eeb2c1708fe9f11a2cb0f288590ec76cefbde09c90e9d568492aa5f41196397b70c869838c7164f2bad8eff017d021d7d41c9025c20b", 0xe5, 0x3}, {&(0x7f00000003c0)="792eb6eec33e561f18dc4b58b6a6fb3c7e6fd5e612c08490216ae02617f9811945929cffbf59727393a9a69d57b00a5cd08da3888884b8361d6a4003a54480c1086a5fc876582ff049ede86e2f58d80c7b6cf618e1ba36d4710887bc34ef2b7abbc686df2185f99998060bf492b84e3a02077e2aaf014e1186fde602d2b639d467f48fc2e18cf1553e07ac39040953566ab1d21aac627b166825375377bc3332b62160ea8bf7fc3196b30965dce6181bf7a1c60d0270f24ba60e633c8c88bbdefb5928dc8183c2ce0616de6c3185a4aa7eb2ec6ab7d8394a9536bf7e4f33f76294b0b4a390aca576177671191fe91530e9bd0db79cee", 0xf6, 0x100000000}, {&(0x7f00000004c0)="a90f49b744c1ad7c27bc0a3b1965ca2bce6602b5f5a8b294ced925862d0a9df5c88e43095ba5810ba49c2216e7e1a9b5f07075e6a3101e853557713e983b2f46cf599dc2cba6254802d01794cdc015e28e2b5aa8c10293a4487b3fe2469252f2c2406327b2a5fe71b185ec0adfdc824a237f94", 0x73, 0x7}], 0x21008, &(0x7f0000000900)={[{'.log\x00'}, {'-%('}, {'.log\x00'}], [{@obj_user={'obj_user'}}, {@appraise_type='appraise_type=imasig'}, {@fowner_eq={'fowner', 0x3d, 0xee01}}, {@hash='hash'}, {@subj_type={'subj_type', 0x3d, '-&'}}]}) ioctl$BTRFS_IOC_SUBVOL_SETFLAGS(r4, 0x4008941a, &(0x7f0000000980)=0xfe33b054cbbc4d79) [ 549.963003][T26776] loop0: detected capacity change from 264192 to 0 11:24:44 executing program 4: r0 = perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x5c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write$binfmt_elf64(r0, &(0x7f0000000540)=ANY=[@ANYBLOB], 0x2c4) r1 = inotify_init() openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) epoll_ctl$EPOLL_CTL_DEL(0xffffffffffffffff, 0x2, 0xffffffffffffffff) inotify_add_watch(r1, &(0x7f0000000000)='.\x00', 0x400017e) r2 = openat$incfs(0xffffffffffffffff, &(0x7f0000000080)='.log\x00', 0x20200, 0x40) fcntl$getownex(r2, 0x10, &(0x7f00000000c0)) r3 = open(&(0x7f0000000040)='./file0\x00', 0x200c2, 0x0) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000080)=ANY=[], 0x8) sendfile(r3, r3, &(0x7f00000001c0), 0xa198) dup(0xffffffffffffffff) r4 = syz_mount_image$gfs2meta(&(0x7f0000000140)='gfs2meta\x00', &(0x7f0000000200)='./file0\x00', 0x1000, 0x4, &(0x7f0000000880)=[{&(0x7f0000000240)="77ba0daae1b2e74ecd52c59a85bf6f4b1f0b01ab07ba92bc6e57305406115f2bc3e4dd94f19ed896c4fccd34271e9dc3499af9298dbc709e0e6a513d61391d4b198af5f55d24239ae934e8babb8d1cb67bb17b0158", 0x55, 0x3}, {&(0x7f00000002c0)="ae227f954d229f666a6cd22938585e852071e55aa5728addcd315922bf32282e077bdbc63cd5ec89626ee2f8e7982ca239eaa758231056cdca22ca27428407f6c64c384665cfbd00ee6e0d7609f2c7ba0f28b4af70d0307ef78decfe42973915cd509de7c19ea0f3f5c3caaab05f9af08e2cc82d2c14b919dd045e3d36ce1c5d0ff23aed0a4a6ef508b5e71df0a25250d47f1e033ed503b6df99c189111b75b59df679cb75240b756cafecfd203568eeb2c1708fe9f11a2cb0f288590ec76cefbde09c90e9d568492aa5f41196397b70c869838c7164f2bad8eff017d021d7d41c9025c20b", 0xe5, 0x3}, {&(0x7f00000003c0)="792eb6eec33e561f18dc4b58b6a6fb3c7e6fd5e612c08490216ae02617f9811945929cffbf59727393a9a69d57b00a5cd08da3888884b8361d6a4003a54480c1086a5fc876582ff049ede86e2f58d80c7b6cf618e1ba36d4710887bc34ef2b7abbc686df2185f99998060bf492b84e3a02077e2aaf014e1186fde602d2b639d467f48fc2e18cf1553e07ac39040953566ab1d21aac627b166825375377bc3332b62160ea8bf7fc3196b30965dce6181bf7a1c60d0270f24ba60e633c8c88bbdefb5928dc8183c2ce0616de6c3185a4aa7eb2ec6ab7d8394a9536bf7e4f33f76294b0b4a390aca576177671191fe91530e9bd0db79cee", 0xf6, 0x100000000}, {&(0x7f00000004c0)="a90f49b744c1ad7c27bc0a3b1965ca2bce6602b5f5a8b294ced925862d0a9df5c88e43095ba5810ba49c2216e7e1a9b5f07075e6a3101e853557713e983b2f46cf599dc2cba6254802d01794cdc015e28e2b5aa8c10293a4487b3fe2469252f2c2406327b2a5fe71b185ec0adfdc824a237f94", 0x73, 0x7}], 0x21008, &(0x7f0000000900)={[{'.log\x00'}, {'-%('}, {'.log\x00'}], [{@obj_user={'obj_user'}}, {@appraise_type='appraise_type=imasig'}, {@fowner_eq={'fowner', 0x3d, 0xee01}}, {@hash='hash'}, {@subj_type={'subj_type', 0x3d, '-&'}}]}) ioctl$BTRFS_IOC_SUBVOL_SETFLAGS(r4, 0x4008941a, &(0x7f0000000980)=0xfe33b054cbbc4d79) [ 550.047781][ T35] audit: type=1804 audit(1612178684.127:2102): pid=26757 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.1" name="/root/syzkaller-testdir551554057/syzkaller.l2Zg4z/389/file1" dev="sda1" ino=15857 res=1 errno=0 11:24:44 executing program 0: r0 = perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x5c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write$binfmt_elf64(r0, &(0x7f0000000540)=ANY=[@ANYBLOB], 0x2c4) r1 = inotify_init() openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) epoll_ctl$EPOLL_CTL_DEL(0xffffffffffffffff, 0x2, 0xffffffffffffffff) inotify_add_watch(r1, &(0x7f0000000000)='.\x00', 0x400017e) r2 = openat$incfs(0xffffffffffffffff, &(0x7f0000000080)='.log\x00', 0x20200, 0x40) fcntl$getownex(r2, 0x10, &(0x7f00000000c0)) r3 = open(&(0x7f0000000040)='./file0\x00', 0x200c2, 0x0) write$binfmt_elf64(r3, 0x0, 0x8) sendfile(r3, r3, &(0x7f00000001c0), 0xa198) dup(0xffffffffffffffff) r4 = syz_mount_image$gfs2meta(&(0x7f0000000140)='gfs2meta\x00', &(0x7f0000000200)='./file0\x00', 0x1000, 0x4, &(0x7f0000000880)=[{&(0x7f0000000240)="77ba0daae1b2e74ecd52c59a85bf6f4b1f0b01ab07ba92bc6e57305406115f2bc3e4dd94f19ed896c4fccd34271e9dc3499af9298dbc709e0e6a513d61391d4b198af5f55d24239ae934e8babb8d1cb67bb17b0158", 0x55, 0x3}, {&(0x7f00000002c0)="ae227f954d229f666a6cd22938585e852071e55aa5728addcd315922bf32282e077bdbc63cd5ec89626ee2f8e7982ca239eaa758231056cdca22ca27428407f6c64c384665cfbd00ee6e0d7609f2c7ba0f28b4af70d0307ef78decfe42973915cd509de7c19ea0f3f5c3caaab05f9af08e2cc82d2c14b919dd045e3d36ce1c5d0ff23aed0a4a6ef508b5e71df0a25250d47f1e033ed503b6df99c189111b75b59df679cb75240b756cafecfd203568eeb2c1708fe9f11a2cb0f288590ec76cefbde09c90e9d568492aa5f41196397b70c869838c7164f2bad8eff017d021d7d41c9025c20b", 0xe5, 0x3}, {&(0x7f00000003c0)="792eb6eec33e561f18dc4b58b6a6fb3c7e6fd5e612c08490216ae02617f9811945929cffbf59727393a9a69d57b00a5cd08da3888884b8361d6a4003a54480c1086a5fc876582ff049ede86e2f58d80c7b6cf618e1ba36d4710887bc34ef2b7abbc686df2185f99998060bf492b84e3a02077e2aaf014e1186fde602d2b639d467f48fc2e18cf1553e07ac39040953566ab1d21aac627b166825375377bc3332b62160ea8bf7fc3196b30965dce6181bf7a1c60d0270f24ba60e633c8c88bbdefb5928dc8183c2ce0616de6c3185a4aa7eb2ec6ab7d8394a9536bf7e4f33f76294b0b4a390aca576177671191fe91530e9bd0db79cee", 0xf6, 0x100000000}, {&(0x7f00000004c0)="a90f49b744c1ad7c27bc0a3b1965ca2bce6602b5f5a8b294ced925862d0a9df5c88e43095ba5810ba49c2216e7e1a9b5f07075e6a3101e853557713e983b2f46cf599dc2cba6254802d01794cdc015e28e2b5aa8c10293a4487b3fe2469252f2c2406327b2a5fe71b185ec0adfdc824a237f94", 0x73, 0x7}], 0x21008, &(0x7f0000000900)={[{'.log\x00'}, {'-%('}, {'.log\x00'}], [{@obj_user={'obj_user'}}, {@appraise_type='appraise_type=imasig'}, {@fowner_eq={'fowner', 0x3d, 0xee01}}, {@hash='hash'}, {@subj_type={'subj_type', 0x3d, '-&'}}]}) ioctl$BTRFS_IOC_SUBVOL_SETFLAGS(r4, 0x4008941a, &(0x7f0000000980)=0xfe33b054cbbc4d79) [ 550.151723][ T35] audit: type=1804 audit(1612178684.227:2103): pid=26769 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.3" name="/root/syzkaller-testdir548988167/syzkaller.gb8agU/392/file1" dev="sda1" ino=15866 res=1 errno=0 11:24:44 executing program 1: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x7f, 0x80000000008001}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x9}, 0x0) r1 = open(&(0x7f0000000240)='./file1\x00', 0x141142, 0x0) write$UHID_INPUT(r1, &(0x7f0000001440), 0xfffffc41) open(&(0x7f00000001c0)='./file1\x00', 0x0, 0x7a000000) setxattr$trusted_overlay_nlink(&(0x7f0000000000)='./file1\x00', &(0x7f00000000c0)='trusted.overlay.nlink\x00', 0x0, 0x0, 0x0) [ 550.256706][ T35] audit: type=1804 audit(1612178684.267:2104): pid=26743 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.2" name="/root/syzkaller-testdir245532710/syzkaller.d2c0aK/404/file1" dev="sda1" ino=15878 res=1 errno=0 [ 550.299110][T26783] loop0: detected capacity change from 264192 to 0 [ 550.361772][ T35] audit: type=1804 audit(1612178684.267:2105): pid=26780 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.2" name="/root/syzkaller-testdir245532710/syzkaller.d2c0aK/404/file1" dev="sda1" ino=15878 res=1 errno=0 11:24:44 executing program 5: write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000540)=ANY=[@ANYBLOB="7f454c4601061f000400000000000000030038000800000032000000000000004000000000000000560200000000000007000000008038000100090002000100010000000100000006000000000000000400000000000000060000000000000001040000000000000200000000000000010000000000000051e574640400000001000000000000000400000000000000050000000000000005000000000000000400000000000000ff24444700000000908bc001727fbcd44f4d3bf922995edf2fd379eb00"/489], 0x2c4) r0 = inotify_init() r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) epoll_ctl$EPOLL_CTL_DEL(0xffffffffffffffff, 0x2, r1) inotify_add_watch(r0, &(0x7f0000000000)='.\x00', 0x400017e) r2 = openat$incfs(0xffffffffffffffff, 0x0, 0x20200, 0x40) fcntl$getownex(r2, 0x10, &(0x7f00000000c0)) r3 = open(&(0x7f0000000040)='./file0\x00', 0x200c2, 0x0) write$binfmt_elf64(r3, &(0x7f0000000080)=ANY=[], 0x8) sendfile(r3, r3, &(0x7f00000001c0), 0xa198) dup(0xffffffffffffffff) r4 = syz_mount_image$gfs2meta(&(0x7f0000000140)='gfs2meta\x00', &(0x7f0000000200)='./file0\x00', 0x1000, 0x4, &(0x7f0000000880)=[{&(0x7f0000000240)="77ba0daae1b2e74ecd52c59a85bf6f4b1f0b01ab07ba92bc6e57305406115f2bc3e4dd94f19ed896c4fccd34271e9dc3499af9298dbc709e0e6a513d61391d4b198af5f55d24239ae934e8babb8d1cb67bb17b0158", 0x55, 0x3}, {&(0x7f00000002c0)="ae227f954d229f666a6cd22938585e852071e55aa5728addcd315922bf32282e077bdbc63cd5ec89626ee2f8e7982ca239eaa758231056cdca22ca27428407f6c64c384665cfbd00ee6e0d7609f2c7ba0f28b4af70d0307ef78decfe42973915cd509de7c19ea0f3f5c3caaab05f9af08e2cc82d2c14b919dd045e3d36ce1c5d0ff23aed0a4a6ef508b5e71df0a25250d47f1e033ed503b6df99c189111b75b59df679cb75240b756cafecfd203568eeb2c1708fe9f11a2cb0f288590ec76cefbde09c90e9d568492aa5f41196397b70c869838c7164f2bad8eff017d021d7d41c9025c20b", 0xe5, 0x3}, {&(0x7f00000003c0)="792eb6eec33e561f18dc4b58b6a6fb3c7e6fd5e612c08490216ae02617f9811945929cffbf59727393a9a69d57b00a5cd08da3888884b8361d6a4003a54480c1086a5fc876582ff049ede86e2f58d80c7b6cf618e1ba36d4710887bc34ef2b7abbc686df2185f99998060bf492b84e3a02077e2aaf014e1186fde602d2b639d467f48fc2e18cf1553e07ac39040953566ab1d21aac627b166825375377bc3332b62160ea8bf7fc3196b30965dce6181bf7a1c60d0270f24ba60e633c8c88bbdefb5928dc8183c2ce0616de6c3185a4aa7eb2ec6ab7d8394a9536bf7e4f33f76294b0b4a390aca576177671191fe91530e9bd0db79cee", 0xf6, 0x100000000}, {&(0x7f00000004c0)="a90f49b744c1ad7c27bc0a3b1965ca2bce6602b5f5a8b294ced925862d0a9df5c88e43095ba5810ba49c2216e7e1a9b5f07075e6a3101e853557713e983b2f46cf599dc2cba6254802d01794cdc015e28e2b5aa8c10293a4487b3fe2469252f2c2406327b2a5fe71b185ec0adfdc824a237f94", 0x73, 0x7}], 0x21008, &(0x7f0000000900)={[{'.log\x00'}, {'-%('}, {'.log\x00'}], [{@appraise_type='appraise_type=imasig'}, {@fowner_eq={'fowner', 0x3d, 0xee01}}, {@hash='hash'}, {@subj_type={'subj_type', 0x3d, '-&'}}, {@hash='hash'}]}) ioctl$BTRFS_IOC_SUBVOL_SETFLAGS(r4, 0x4008941a, &(0x7f0000000980)=0xfe33b054cbbc4d79) [ 550.392429][ T35] audit: type=1804 audit(1612178684.267:2106): pid=26747 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor.2" name="/root/syzkaller-testdir245532710/syzkaller.d2c0aK/404/file1" dev="sda1" ino=15878 res=1 errno=0 11:24:44 executing program 0: r0 = perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x5c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write$binfmt_elf64(r0, &(0x7f0000000540)=ANY=[@ANYBLOB], 0x2c4) r1 = inotify_init() openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) epoll_ctl$EPOLL_CTL_DEL(0xffffffffffffffff, 0x2, 0xffffffffffffffff) inotify_add_watch(r1, &(0x7f0000000000)='.\x00', 0x400017e) r2 = openat$incfs(0xffffffffffffffff, &(0x7f0000000080)='.log\x00', 0x20200, 0x40) fcntl$getownex(r2, 0x10, &(0x7f00000000c0)) r3 = open(&(0x7f0000000040)='./file0\x00', 0x200c2, 0x0) write$binfmt_elf64(r3, 0x0, 0x8) sendfile(r3, r3, &(0x7f00000001c0), 0xa198) dup(0xffffffffffffffff) r4 = syz_mount_image$gfs2meta(&(0x7f0000000140)='gfs2meta\x00', &(0x7f0000000200)='./file0\x00', 0x1000, 0x4, &(0x7f0000000880)=[{&(0x7f0000000240)="77ba0daae1b2e74ecd52c59a85bf6f4b1f0b01ab07ba92bc6e57305406115f2bc3e4dd94f19ed896c4fccd34271e9dc3499af9298dbc709e0e6a513d61391d4b198af5f55d24239ae934e8babb8d1cb67bb17b0158", 0x55, 0x3}, {&(0x7f00000002c0)="ae227f954d229f666a6cd22938585e852071e55aa5728addcd315922bf32282e077bdbc63cd5ec89626ee2f8e7982ca239eaa758231056cdca22ca27428407f6c64c384665cfbd00ee6e0d7609f2c7ba0f28b4af70d0307ef78decfe42973915cd509de7c19ea0f3f5c3caaab05f9af08e2cc82d2c14b919dd045e3d36ce1c5d0ff23aed0a4a6ef508b5e71df0a25250d47f1e033ed503b6df99c189111b75b59df679cb75240b756cafecfd203568eeb2c1708fe9f11a2cb0f288590ec76cefbde09c90e9d568492aa5f41196397b70c869838c7164f2bad8eff017d021d7d41c9025c20b", 0xe5, 0x3}, {&(0x7f00000003c0)="792eb6eec33e561f18dc4b58b6a6fb3c7e6fd5e612c08490216ae02617f9811945929cffbf59727393a9a69d57b00a5cd08da3888884b8361d6a4003a54480c1086a5fc876582ff049ede86e2f58d80c7b6cf618e1ba36d4710887bc34ef2b7abbc686df2185f99998060bf492b84e3a02077e2aaf014e1186fde602d2b639d467f48fc2e18cf1553e07ac39040953566ab1d21aac627b166825375377bc3332b62160ea8bf7fc3196b30965dce6181bf7a1c60d0270f24ba60e633c8c88bbdefb5928dc8183c2ce0616de6c3185a4aa7eb2ec6ab7d8394a9536bf7e4f33f76294b0b4a390aca576177671191fe91530e9bd0db79cee", 0xf6, 0x100000000}, {&(0x7f00000004c0)="a90f49b744c1ad7c27bc0a3b1965ca2bce6602b5f5a8b294ced925862d0a9df5c88e43095ba5810ba49c2216e7e1a9b5f07075e6a3101e853557713e983b2f46cf599dc2cba6254802d01794cdc015e28e2b5aa8c10293a4487b3fe2469252f2c2406327b2a5fe71b185ec0adfdc824a237f94", 0x73, 0x7}], 0x21008, &(0x7f0000000900)={[{'.log\x00'}, {'-%('}, {'.log\x00'}], [{@obj_user={'obj_user'}}, {@appraise_type='appraise_type=imasig'}, {@fowner_eq={'fowner', 0x3d, 0xee01}}, {@hash='hash'}, {@subj_type={'subj_type', 0x3d, '-&'}}]}) ioctl$BTRFS_IOC_SUBVOL_SETFLAGS(r4, 0x4008941a, &(0x7f0000000980)=0xfe33b054cbbc4d79) 11:24:44 executing program 2: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x7f, 0x80000000008001}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x9}, 0x0) r1 = open(&(0x7f0000000240)='./file1\x00', 0x141142, 0x0) write$UHID_INPUT(r1, &(0x7f0000001440)={0x8, {'\x00I\x00'}}, 0xfffffc41) open(&(0x7f00000001c0)='./file1\x00', 0x0, 0x0) setxattr$trusted_overlay_nlink(&(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x0, 0x0) [ 550.559624][ T35] audit: type=1800 audit(1612178684.327:2107): pid=26757 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed comm="syz-executor.1" name="file1" dev="sda1" ino=15857 res=0 errno=0 [ 550.568587][T26788] loop4: detected capacity change from 264192 to 0 11:24:44 executing program 3: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x7f, 0x80000000008001}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x9}, 0x0) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000080)) r1 = open(&(0x7f0000000240)='./file1\x00', 0x141142, 0x0) write$UHID_INPUT(r1, &(0x7f0000001440)={0x8, {'\x00F\x00'}}, 0xfffffc41) open(&(0x7f00000001c0)='./file1\x00', 0x0, 0x0) setxattr$trusted_overlay_nlink(&(0x7f0000000000)='./file1\x00', &(0x7f00000000c0)='trusted.overlay.nlink\x00', 0x0, 0x0, 0x0) [ 550.609777][ T35] audit: type=1804 audit(1612178684.327:2108): pid=26752 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.1" name="/root/syzkaller-testdir551554057/syzkaller.l2Zg4z/389/file1" dev="sda1" ino=15857 res=1 errno=0 11:24:44 executing program 4: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x7f, 0x80000000008001}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x9}, 0x0) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000080)) r1 = open(&(0x7f0000000240)='./file1\x00', 0x141142, 0x0) write$UHID_INPUT(r1, &(0x7f0000001440)={0x8, {'\x00E\x00'}}, 0xfffffc41) open(&(0x7f00000001c0)='./file1\x00', 0x0, 0x0) setxattr$trusted_overlay_nlink(&(0x7f0000000000)='./file1\x00', &(0x7f00000000c0)='trusted.overlay.nlink\x00', 0x0, 0x0, 0x0) [ 550.673050][T26801] loop0: detected capacity change from 264192 to 0 [ 550.690658][ T35] audit: type=1800 audit(1612178684.327:2109): pid=26752 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed comm="syz-executor.1" name="file1" dev="sda1" ino=15857 res=0 errno=0 [ 550.745930][T26807] loop5: detected capacity change from 264192 to 0 11:24:44 executing program 0: r0 = perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x5c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write$binfmt_elf64(r0, &(0x7f0000000540)=ANY=[@ANYBLOB], 0x2c4) r1 = inotify_init() openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) epoll_ctl$EPOLL_CTL_DEL(0xffffffffffffffff, 0x2, 0xffffffffffffffff) inotify_add_watch(r1, &(0x7f0000000000)='.\x00', 0x400017e) r2 = openat$incfs(0xffffffffffffffff, &(0x7f0000000080)='.log\x00', 0x20200, 0x40) fcntl$getownex(r2, 0x10, &(0x7f00000000c0)) r3 = open(&(0x7f0000000040)='./file0\x00', 0x200c2, 0x0) write$binfmt_elf64(r3, &(0x7f0000000080)=ANY=[], 0x8) sendfile(0xffffffffffffffff, r3, &(0x7f00000001c0), 0xa198) dup(0xffffffffffffffff) r4 = syz_mount_image$gfs2meta(&(0x7f0000000140)='gfs2meta\x00', &(0x7f0000000200)='./file0\x00', 0x1000, 0x4, &(0x7f0000000880)=[{&(0x7f0000000240)="77ba0daae1b2e74ecd52c59a85bf6f4b1f0b01ab07ba92bc6e57305406115f2bc3e4dd94f19ed896c4fccd34271e9dc3499af9298dbc709e0e6a513d61391d4b198af5f55d24239ae934e8babb8d1cb67bb17b0158", 0x55, 0x3}, {&(0x7f00000002c0)="ae227f954d229f666a6cd22938585e852071e55aa5728addcd315922bf32282e077bdbc63cd5ec89626ee2f8e7982ca239eaa758231056cdca22ca27428407f6c64c384665cfbd00ee6e0d7609f2c7ba0f28b4af70d0307ef78decfe42973915cd509de7c19ea0f3f5c3caaab05f9af08e2cc82d2c14b919dd045e3d36ce1c5d0ff23aed0a4a6ef508b5e71df0a25250d47f1e033ed503b6df99c189111b75b59df679cb75240b756cafecfd203568eeb2c1708fe9f11a2cb0f288590ec76cefbde09c90e9d568492aa5f41196397b70c869838c7164f2bad8eff017d021d7d41c9025c20b", 0xe5, 0x3}, {&(0x7f00000003c0)="792eb6eec33e561f18dc4b58b6a6fb3c7e6fd5e612c08490216ae02617f9811945929cffbf59727393a9a69d57b00a5cd08da3888884b8361d6a4003a54480c1086a5fc876582ff049ede86e2f58d80c7b6cf618e1ba36d4710887bc34ef2b7abbc686df2185f99998060bf492b84e3a02077e2aaf014e1186fde602d2b639d467f48fc2e18cf1553e07ac39040953566ab1d21aac627b166825375377bc3332b62160ea8bf7fc3196b30965dce6181bf7a1c60d0270f24ba60e633c8c88bbdefb5928dc8183c2ce0616de6c3185a4aa7eb2ec6ab7d8394a9536bf7e4f33f76294b0b4a390aca576177671191fe91530e9bd0db79cee", 0xf6, 0x100000000}, {&(0x7f00000004c0)="a90f49b744c1ad7c27bc0a3b1965ca2bce6602b5f5a8b294ced925862d0a9df5c88e43095ba5810ba49c2216e7e1a9b5f07075e6a3101e853557713e983b2f46cf599dc2cba6254802d01794cdc015e28e2b5aa8c10293a4487b3fe2469252f2c2406327b2a5fe71b185ec0adfdc824a237f94", 0x73, 0x7}], 0x21008, &(0x7f0000000900)={[{'.log\x00'}, {'-%('}, {'.log\x00'}], [{@obj_user={'obj_user'}}, {@appraise_type='appraise_type=imasig'}, {@fowner_eq={'fowner', 0x3d, 0xee01}}, {@hash='hash'}, {@subj_type={'subj_type', 0x3d, '-&'}}]}) ioctl$BTRFS_IOC_SUBVOL_SETFLAGS(r4, 0x4008941a, &(0x7f0000000980)=0xfe33b054cbbc4d79) [ 550.784278][ T35] audit: type=1804 audit(1612178684.587:2110): pid=26772 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.3" name="/root/syzkaller-testdir548988167/syzkaller.gb8agU/392/file1" dev="sda1" ino=15866 res=1 errno=0 [ 550.911928][T26823] loop0: detected capacity change from 264192 to 0 11:24:45 executing program 0: r0 = perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x5c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write$binfmt_elf64(r0, &(0x7f0000000540)=ANY=[@ANYBLOB], 0x2c4) r1 = inotify_init() openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) epoll_ctl$EPOLL_CTL_DEL(0xffffffffffffffff, 0x2, 0xffffffffffffffff) inotify_add_watch(r1, &(0x7f0000000000)='.\x00', 0x400017e) r2 = openat$incfs(0xffffffffffffffff, &(0x7f0000000080)='.log\x00', 0x20200, 0x40) fcntl$getownex(r2, 0x10, &(0x7f00000000c0)) r3 = open(&(0x7f0000000040)='./file0\x00', 0x200c2, 0x0) write$binfmt_elf64(r3, &(0x7f0000000080)=ANY=[], 0x8) sendfile(0xffffffffffffffff, r3, &(0x7f00000001c0), 0xa198) dup(0xffffffffffffffff) r4 = syz_mount_image$gfs2meta(&(0x7f0000000140)='gfs2meta\x00', &(0x7f0000000200)='./file0\x00', 0x1000, 0x4, &(0x7f0000000880)=[{&(0x7f0000000240)="77ba0daae1b2e74ecd52c59a85bf6f4b1f0b01ab07ba92bc6e57305406115f2bc3e4dd94f19ed896c4fccd34271e9dc3499af9298dbc709e0e6a513d61391d4b198af5f55d24239ae934e8babb8d1cb67bb17b0158", 0x55, 0x3}, {&(0x7f00000002c0)="ae227f954d229f666a6cd22938585e852071e55aa5728addcd315922bf32282e077bdbc63cd5ec89626ee2f8e7982ca239eaa758231056cdca22ca27428407f6c64c384665cfbd00ee6e0d7609f2c7ba0f28b4af70d0307ef78decfe42973915cd509de7c19ea0f3f5c3caaab05f9af08e2cc82d2c14b919dd045e3d36ce1c5d0ff23aed0a4a6ef508b5e71df0a25250d47f1e033ed503b6df99c189111b75b59df679cb75240b756cafecfd203568eeb2c1708fe9f11a2cb0f288590ec76cefbde09c90e9d568492aa5f41196397b70c869838c7164f2bad8eff017d021d7d41c9025c20b", 0xe5, 0x3}, {&(0x7f00000003c0)="792eb6eec33e561f18dc4b58b6a6fb3c7e6fd5e612c08490216ae02617f9811945929cffbf59727393a9a69d57b00a5cd08da3888884b8361d6a4003a54480c1086a5fc876582ff049ede86e2f58d80c7b6cf618e1ba36d4710887bc34ef2b7abbc686df2185f99998060bf492b84e3a02077e2aaf014e1186fde602d2b639d467f48fc2e18cf1553e07ac39040953566ab1d21aac627b166825375377bc3332b62160ea8bf7fc3196b30965dce6181bf7a1c60d0270f24ba60e633c8c88bbdefb5928dc8183c2ce0616de6c3185a4aa7eb2ec6ab7d8394a9536bf7e4f33f76294b0b4a390aca576177671191fe91530e9bd0db79cee", 0xf6, 0x100000000}, {&(0x7f00000004c0)="a90f49b744c1ad7c27bc0a3b1965ca2bce6602b5f5a8b294ced925862d0a9df5c88e43095ba5810ba49c2216e7e1a9b5f07075e6a3101e853557713e983b2f46cf599dc2cba6254802d01794cdc015e28e2b5aa8c10293a4487b3fe2469252f2c2406327b2a5fe71b185ec0adfdc824a237f94", 0x73, 0x7}], 0x21008, &(0x7f0000000900)={[{'.log\x00'}, {'-%('}, {'.log\x00'}], [{@obj_user={'obj_user'}}, {@appraise_type='appraise_type=imasig'}, {@fowner_eq={'fowner', 0x3d, 0xee01}}, {@hash='hash'}, {@subj_type={'subj_type', 0x3d, '-&'}}]}) ioctl$BTRFS_IOC_SUBVOL_SETFLAGS(r4, 0x4008941a, &(0x7f0000000980)=0xfe33b054cbbc4d79) 11:24:45 executing program 1: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x7f, 0x80000000008001}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x9}, 0x0) r1 = open(&(0x7f0000000240)='./file1\x00', 0x141142, 0x0) write$UHID_INPUT(r1, &(0x7f0000001440), 0xfffffc41) open(&(0x7f00000001c0)='./file1\x00', 0x0, 0xa1ffffff) setxattr$trusted_overlay_nlink(&(0x7f0000000000)='./file1\x00', &(0x7f00000000c0)='trusted.overlay.nlink\x00', 0x0, 0x0, 0x0) [ 551.104249][T26832] loop0: detected capacity change from 264192 to 0 11:24:45 executing program 0: r0 = perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x5c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write$binfmt_elf64(r0, &(0x7f0000000540)=ANY=[@ANYBLOB], 0x2c4) r1 = inotify_init() openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) epoll_ctl$EPOLL_CTL_DEL(0xffffffffffffffff, 0x2, 0xffffffffffffffff) inotify_add_watch(r1, &(0x7f0000000000)='.\x00', 0x400017e) r2 = openat$incfs(0xffffffffffffffff, &(0x7f0000000080)='.log\x00', 0x20200, 0x40) fcntl$getownex(r2, 0x10, &(0x7f00000000c0)) r3 = open(&(0x7f0000000040)='./file0\x00', 0x200c2, 0x0) write$binfmt_elf64(r3, &(0x7f0000000080)=ANY=[], 0x8) sendfile(0xffffffffffffffff, r3, &(0x7f00000001c0), 0xa198) dup(0xffffffffffffffff) r4 = syz_mount_image$gfs2meta(&(0x7f0000000140)='gfs2meta\x00', &(0x7f0000000200)='./file0\x00', 0x1000, 0x4, &(0x7f0000000880)=[{&(0x7f0000000240)="77ba0daae1b2e74ecd52c59a85bf6f4b1f0b01ab07ba92bc6e57305406115f2bc3e4dd94f19ed896c4fccd34271e9dc3499af9298dbc709e0e6a513d61391d4b198af5f55d24239ae934e8babb8d1cb67bb17b0158", 0x55, 0x3}, {&(0x7f00000002c0)="ae227f954d229f666a6cd22938585e852071e55aa5728addcd315922bf32282e077bdbc63cd5ec89626ee2f8e7982ca239eaa758231056cdca22ca27428407f6c64c384665cfbd00ee6e0d7609f2c7ba0f28b4af70d0307ef78decfe42973915cd509de7c19ea0f3f5c3caaab05f9af08e2cc82d2c14b919dd045e3d36ce1c5d0ff23aed0a4a6ef508b5e71df0a25250d47f1e033ed503b6df99c189111b75b59df679cb75240b756cafecfd203568eeb2c1708fe9f11a2cb0f288590ec76cefbde09c90e9d568492aa5f41196397b70c869838c7164f2bad8eff017d021d7d41c9025c20b", 0xe5, 0x3}, {&(0x7f00000003c0)="792eb6eec33e561f18dc4b58b6a6fb3c7e6fd5e612c08490216ae02617f9811945929cffbf59727393a9a69d57b00a5cd08da3888884b8361d6a4003a54480c1086a5fc876582ff049ede86e2f58d80c7b6cf618e1ba36d4710887bc34ef2b7abbc686df2185f99998060bf492b84e3a02077e2aaf014e1186fde602d2b639d467f48fc2e18cf1553e07ac39040953566ab1d21aac627b166825375377bc3332b62160ea8bf7fc3196b30965dce6181bf7a1c60d0270f24ba60e633c8c88bbdefb5928dc8183c2ce0616de6c3185a4aa7eb2ec6ab7d8394a9536bf7e4f33f76294b0b4a390aca576177671191fe91530e9bd0db79cee", 0xf6, 0x100000000}, {&(0x7f00000004c0)="a90f49b744c1ad7c27bc0a3b1965ca2bce6602b5f5a8b294ced925862d0a9df5c88e43095ba5810ba49c2216e7e1a9b5f07075e6a3101e853557713e983b2f46cf599dc2cba6254802d01794cdc015e28e2b5aa8c10293a4487b3fe2469252f2c2406327b2a5fe71b185ec0adfdc824a237f94", 0x73, 0x7}], 0x21008, &(0x7f0000000900)={[{'.log\x00'}, {'-%('}, {'.log\x00'}], [{@obj_user={'obj_user'}}, {@appraise_type='appraise_type=imasig'}, {@fowner_eq={'fowner', 0x3d, 0xee01}}, {@hash='hash'}, {@subj_type={'subj_type', 0x3d, '-&'}}]}) ioctl$BTRFS_IOC_SUBVOL_SETFLAGS(r4, 0x4008941a, &(0x7f0000000980)=0xfe33b054cbbc4d79) [ 551.262722][T26838] loop0: detected capacity change from 264192 to 0 11:24:45 executing program 0: r0 = perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x5c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write$binfmt_elf64(r0, &(0x7f0000000540)=ANY=[@ANYBLOB], 0x2c4) r1 = inotify_init() openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) epoll_ctl$EPOLL_CTL_DEL(0xffffffffffffffff, 0x2, 0xffffffffffffffff) inotify_add_watch(r1, &(0x7f0000000000)='.\x00', 0x400017e) r2 = openat$incfs(0xffffffffffffffff, &(0x7f0000000080)='.log\x00', 0x20200, 0x40) fcntl$getownex(r2, 0x10, &(0x7f00000000c0)) r3 = open(&(0x7f0000000040)='./file0\x00', 0x200c2, 0x0) write$binfmt_elf64(r3, &(0x7f0000000080)=ANY=[], 0x8) sendfile(r3, 0xffffffffffffffff, &(0x7f00000001c0), 0xa198) dup(0xffffffffffffffff) r4 = syz_mount_image$gfs2meta(&(0x7f0000000140)='gfs2meta\x00', &(0x7f0000000200)='./file0\x00', 0x1000, 0x4, &(0x7f0000000880)=[{&(0x7f0000000240)="77ba0daae1b2e74ecd52c59a85bf6f4b1f0b01ab07ba92bc6e57305406115f2bc3e4dd94f19ed896c4fccd34271e9dc3499af9298dbc709e0e6a513d61391d4b198af5f55d24239ae934e8babb8d1cb67bb17b0158", 0x55, 0x3}, {&(0x7f00000002c0)="ae227f954d229f666a6cd22938585e852071e55aa5728addcd315922bf32282e077bdbc63cd5ec89626ee2f8e7982ca239eaa758231056cdca22ca27428407f6c64c384665cfbd00ee6e0d7609f2c7ba0f28b4af70d0307ef78decfe42973915cd509de7c19ea0f3f5c3caaab05f9af08e2cc82d2c14b919dd045e3d36ce1c5d0ff23aed0a4a6ef508b5e71df0a25250d47f1e033ed503b6df99c189111b75b59df679cb75240b756cafecfd203568eeb2c1708fe9f11a2cb0f288590ec76cefbde09c90e9d568492aa5f41196397b70c869838c7164f2bad8eff017d021d7d41c9025c20b", 0xe5, 0x3}, {&(0x7f00000003c0)="792eb6eec33e561f18dc4b58b6a6fb3c7e6fd5e612c08490216ae02617f9811945929cffbf59727393a9a69d57b00a5cd08da3888884b8361d6a4003a54480c1086a5fc876582ff049ede86e2f58d80c7b6cf618e1ba36d4710887bc34ef2b7abbc686df2185f99998060bf492b84e3a02077e2aaf014e1186fde602d2b639d467f48fc2e18cf1553e07ac39040953566ab1d21aac627b166825375377bc3332b62160ea8bf7fc3196b30965dce6181bf7a1c60d0270f24ba60e633c8c88bbdefb5928dc8183c2ce0616de6c3185a4aa7eb2ec6ab7d8394a9536bf7e4f33f76294b0b4a390aca576177671191fe91530e9bd0db79cee", 0xf6, 0x100000000}, {&(0x7f00000004c0)="a90f49b744c1ad7c27bc0a3b1965ca2bce6602b5f5a8b294ced925862d0a9df5c88e43095ba5810ba49c2216e7e1a9b5f07075e6a3101e853557713e983b2f46cf599dc2cba6254802d01794cdc015e28e2b5aa8c10293a4487b3fe2469252f2c2406327b2a5fe71b185ec0adfdc824a237f94", 0x73, 0x7}], 0x21008, &(0x7f0000000900)={[{'.log\x00'}, {'-%('}, {'.log\x00'}], [{@obj_user={'obj_user'}}, {@appraise_type='appraise_type=imasig'}, {@fowner_eq={'fowner', 0x3d, 0xee01}}, {@hash='hash'}, {@subj_type={'subj_type', 0x3d, '-&'}}]}) ioctl$BTRFS_IOC_SUBVOL_SETFLAGS(r4, 0x4008941a, &(0x7f0000000980)=0xfe33b054cbbc4d79) [ 551.507708][T26852] loop0: detected capacity change from 264192 to 0 11:24:45 executing program 5: write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000540)=ANY=[@ANYBLOB="7f454c4601061f000400000000000000030038000800000032000000000000004000000000000000560200000000000007000000008038000100090002000100010000000100000006000000000000000400000000000000060000000000000001040000000000000200000000000000010000000000000051e574640400000001000000000000000400000000000000050000000000000005000000000000000400000000000000ff24444700000000908bc001727fbcd44f4d3bf922995edf2fd379eb00"/489], 0x2c4) r0 = inotify_init() r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) epoll_ctl$EPOLL_CTL_DEL(0xffffffffffffffff, 0x2, r1) inotify_add_watch(r0, &(0x7f0000000000)='.\x00', 0x400017e) r2 = openat$incfs(0xffffffffffffffff, 0x0, 0x20200, 0x40) fcntl$getownex(r2, 0x10, &(0x7f00000000c0)) r3 = open(&(0x7f0000000040)='./file0\x00', 0x200c2, 0x0) write$binfmt_elf64(r3, &(0x7f0000000080)=ANY=[], 0x8) sendfile(r3, r3, &(0x7f00000001c0), 0xa198) dup(0xffffffffffffffff) r4 = syz_mount_image$gfs2meta(&(0x7f0000000140)='gfs2meta\x00', &(0x7f0000000200)='./file0\x00', 0x1000, 0x4, &(0x7f0000000880)=[{&(0x7f0000000240)="77ba0daae1b2e74ecd52c59a85bf6f4b1f0b01ab07ba92bc6e57305406115f2bc3e4dd94f19ed896c4fccd34271e9dc3499af9298dbc709e0e6a513d61391d4b198af5f55d24239ae934e8babb8d1cb67bb17b0158", 0x55, 0x3}, {&(0x7f00000002c0)="ae227f954d229f666a6cd22938585e852071e55aa5728addcd315922bf32282e077bdbc63cd5ec89626ee2f8e7982ca239eaa758231056cdca22ca27428407f6c64c384665cfbd00ee6e0d7609f2c7ba0f28b4af70d0307ef78decfe42973915cd509de7c19ea0f3f5c3caaab05f9af08e2cc82d2c14b919dd045e3d36ce1c5d0ff23aed0a4a6ef508b5e71df0a25250d47f1e033ed503b6df99c189111b75b59df679cb75240b756cafecfd203568eeb2c1708fe9f11a2cb0f288590ec76cefbde09c90e9d568492aa5f41196397b70c869838c7164f2bad8eff017d021d7d41c9025c20b", 0xe5, 0x3}, {&(0x7f00000003c0)="792eb6eec33e561f18dc4b58b6a6fb3c7e6fd5e612c08490216ae02617f9811945929cffbf59727393a9a69d57b00a5cd08da3888884b8361d6a4003a54480c1086a5fc876582ff049ede86e2f58d80c7b6cf618e1ba36d4710887bc34ef2b7abbc686df2185f99998060bf492b84e3a02077e2aaf014e1186fde602d2b639d467f48fc2e18cf1553e07ac39040953566ab1d21aac627b166825375377bc3332b62160ea8bf7fc3196b30965dce6181bf7a1c60d0270f24ba60e633c8c88bbdefb5928dc8183c2ce0616de6c3185a4aa7eb2ec6ab7d8394a9536bf7e4f33f76294b0b4a390aca576177671191fe91530e9bd0db79cee", 0xf6, 0x100000000}, {&(0x7f00000004c0)="a90f49b744c1ad7c27bc0a3b1965ca2bce6602b5f5a8b294ced925862d0a9df5c88e43095ba5810ba49c2216e7e1a9b5f07075e6a3101e853557713e983b2f46cf599dc2cba6254802d01794cdc015e28e2b5aa8c10293a4487b3fe2469252f2c2406327b2a5fe71b185ec0adfdc824a237f94", 0x73, 0x7}], 0x21008, &(0x7f0000000900)={[{'.log\x00'}, {'-%('}, {'.log\x00'}], [{@appraise_type='appraise_type=imasig'}, {@fowner_eq={'fowner', 0x3d, 0xee01}}, {@hash='hash'}, {@subj_type={'subj_type', 0x3d, '-&'}}, {@hash='hash'}]}) ioctl$BTRFS_IOC_SUBVOL_SETFLAGS(r4, 0x4008941a, &(0x7f0000000980)=0xfe33b054cbbc4d79) 11:24:45 executing program 0: r0 = perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x5c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write$binfmt_elf64(r0, &(0x7f0000000540)=ANY=[@ANYBLOB], 0x2c4) r1 = inotify_init() openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) epoll_ctl$EPOLL_CTL_DEL(0xffffffffffffffff, 0x2, 0xffffffffffffffff) inotify_add_watch(r1, &(0x7f0000000000)='.\x00', 0x400017e) r2 = openat$incfs(0xffffffffffffffff, &(0x7f0000000080)='.log\x00', 0x20200, 0x40) fcntl$getownex(r2, 0x10, &(0x7f00000000c0)) r3 = open(&(0x7f0000000040)='./file0\x00', 0x200c2, 0x0) write$binfmt_elf64(r3, &(0x7f0000000080)=ANY=[], 0x8) sendfile(r3, 0xffffffffffffffff, &(0x7f00000001c0), 0xa198) dup(0xffffffffffffffff) r4 = syz_mount_image$gfs2meta(&(0x7f0000000140)='gfs2meta\x00', &(0x7f0000000200)='./file0\x00', 0x1000, 0x4, &(0x7f0000000880)=[{&(0x7f0000000240)="77ba0daae1b2e74ecd52c59a85bf6f4b1f0b01ab07ba92bc6e57305406115f2bc3e4dd94f19ed896c4fccd34271e9dc3499af9298dbc709e0e6a513d61391d4b198af5f55d24239ae934e8babb8d1cb67bb17b0158", 0x55, 0x3}, {&(0x7f00000002c0)="ae227f954d229f666a6cd22938585e852071e55aa5728addcd315922bf32282e077bdbc63cd5ec89626ee2f8e7982ca239eaa758231056cdca22ca27428407f6c64c384665cfbd00ee6e0d7609f2c7ba0f28b4af70d0307ef78decfe42973915cd509de7c19ea0f3f5c3caaab05f9af08e2cc82d2c14b919dd045e3d36ce1c5d0ff23aed0a4a6ef508b5e71df0a25250d47f1e033ed503b6df99c189111b75b59df679cb75240b756cafecfd203568eeb2c1708fe9f11a2cb0f288590ec76cefbde09c90e9d568492aa5f41196397b70c869838c7164f2bad8eff017d021d7d41c9025c20b", 0xe5, 0x3}, {&(0x7f00000003c0)="792eb6eec33e561f18dc4b58b6a6fb3c7e6fd5e612c08490216ae02617f9811945929cffbf59727393a9a69d57b00a5cd08da3888884b8361d6a4003a54480c1086a5fc876582ff049ede86e2f58d80c7b6cf618e1ba36d4710887bc34ef2b7abbc686df2185f99998060bf492b84e3a02077e2aaf014e1186fde602d2b639d467f48fc2e18cf1553e07ac39040953566ab1d21aac627b166825375377bc3332b62160ea8bf7fc3196b30965dce6181bf7a1c60d0270f24ba60e633c8c88bbdefb5928dc8183c2ce0616de6c3185a4aa7eb2ec6ab7d8394a9536bf7e4f33f76294b0b4a390aca576177671191fe91530e9bd0db79cee", 0xf6, 0x100000000}, {&(0x7f00000004c0)="a90f49b744c1ad7c27bc0a3b1965ca2bce6602b5f5a8b294ced925862d0a9df5c88e43095ba5810ba49c2216e7e1a9b5f07075e6a3101e853557713e983b2f46cf599dc2cba6254802d01794cdc015e28e2b5aa8c10293a4487b3fe2469252f2c2406327b2a5fe71b185ec0adfdc824a237f94", 0x73, 0x7}], 0x21008, &(0x7f0000000900)={[{'.log\x00'}, {'-%('}, {'.log\x00'}], [{@obj_user={'obj_user'}}, {@appraise_type='appraise_type=imasig'}, {@fowner_eq={'fowner', 0x3d, 0xee01}}, {@hash='hash'}, {@subj_type={'subj_type', 0x3d, '-&'}}]}) ioctl$BTRFS_IOC_SUBVOL_SETFLAGS(r4, 0x4008941a, &(0x7f0000000980)=0xfe33b054cbbc4d79) 11:24:45 executing program 4: r0 = perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x5c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write$binfmt_elf64(r0, &(0x7f0000000540)=ANY=[@ANYBLOB], 0x2c4) r1 = inotify_init() openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) epoll_ctl$EPOLL_CTL_DEL(0xffffffffffffffff, 0x2, 0xffffffffffffffff) inotify_add_watch(r1, &(0x7f0000000000)='.\x00', 0x400017e) r2 = openat$incfs(0xffffffffffffffff, &(0x7f0000000080)='.log\x00', 0x20200, 0x40) fcntl$getownex(r2, 0x10, &(0x7f00000000c0)) r3 = open(&(0x7f0000000040)='./file0\x00', 0x200c2, 0x0) write$binfmt_elf64(r3, &(0x7f0000000080)=ANY=[], 0x8) sendfile(r3, 0xffffffffffffffff, &(0x7f00000001c0), 0xa198) dup(0xffffffffffffffff) r4 = syz_mount_image$gfs2meta(&(0x7f0000000140)='gfs2meta\x00', &(0x7f0000000200)='./file0\x00', 0x1000, 0x4, &(0x7f0000000880)=[{&(0x7f0000000240)="77ba0daae1b2e74ecd52c59a85bf6f4b1f0b01ab07ba92bc6e57305406115f2bc3e4dd94f19ed896c4fccd34271e9dc3499af9298dbc709e0e6a513d61391d4b198af5f55d24239ae934e8babb8d1cb67bb17b0158", 0x55, 0x3}, {&(0x7f00000002c0)="ae227f954d229f666a6cd22938585e852071e55aa5728addcd315922bf32282e077bdbc63cd5ec89626ee2f8e7982ca239eaa758231056cdca22ca27428407f6c64c384665cfbd00ee6e0d7609f2c7ba0f28b4af70d0307ef78decfe42973915cd509de7c19ea0f3f5c3caaab05f9af08e2cc82d2c14b919dd045e3d36ce1c5d0ff23aed0a4a6ef508b5e71df0a25250d47f1e033ed503b6df99c189111b75b59df679cb75240b756cafecfd203568eeb2c1708fe9f11a2cb0f288590ec76cefbde09c90e9d568492aa5f41196397b70c869838c7164f2bad8eff017d021d7d41c9025c20b", 0xe5, 0x3}, {&(0x7f00000003c0)="792eb6eec33e561f18dc4b58b6a6fb3c7e6fd5e612c08490216ae02617f9811945929cffbf59727393a9a69d57b00a5cd08da3888884b8361d6a4003a54480c1086a5fc876582ff049ede86e2f58d80c7b6cf618e1ba36d4710887bc34ef2b7abbc686df2185f99998060bf492b84e3a02077e2aaf014e1186fde602d2b639d467f48fc2e18cf1553e07ac39040953566ab1d21aac627b166825375377bc3332b62160ea8bf7fc3196b30965dce6181bf7a1c60d0270f24ba60e633c8c88bbdefb5928dc8183c2ce0616de6c3185a4aa7eb2ec6ab7d8394a9536bf7e4f33f76294b0b4a390aca576177671191fe91530e9bd0db79cee", 0xf6, 0x100000000}, {&(0x7f00000004c0)="a90f49b744c1ad7c27bc0a3b1965ca2bce6602b5f5a8b294ced925862d0a9df5c88e43095ba5810ba49c2216e7e1a9b5f07075e6a3101e853557713e983b2f46cf599dc2cba6254802d01794cdc015e28e2b5aa8c10293a4487b3fe2469252f2c2406327b2a5fe71b185ec0adfdc824a237f94", 0x73, 0x7}], 0x21008, &(0x7f0000000900)={[{'.log\x00'}, {'-%('}, {'.log\x00'}], [{@obj_user={'obj_user'}}, {@appraise_type='appraise_type=imasig'}, {@fowner_eq={'fowner', 0x3d, 0xee01}}, {@hash='hash'}, {@subj_type={'subj_type', 0x3d, '-&'}}]}) ioctl$BTRFS_IOC_SUBVOL_SETFLAGS(r4, 0x4008941a, &(0x7f0000000980)=0xfe33b054cbbc4d79) [ 551.714020][T26861] loop0: detected capacity change from 264192 to 0 [ 551.735260][T26862] loop5: detected capacity change from 264192 to 0 11:24:45 executing program 2: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x7f, 0x80000000008001}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x9}, 0x0) r1 = open(&(0x7f0000000240)='./file1\x00', 0x141142, 0x0) write$UHID_INPUT(r1, &(0x7f0000001440)={0x8, {'\x00J\x00'}}, 0xfffffc41) open(&(0x7f00000001c0)='./file1\x00', 0x0, 0x0) setxattr$trusted_overlay_nlink(&(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x0, 0x0) 11:24:45 executing program 0: r0 = perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x5c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write$binfmt_elf64(r0, &(0x7f0000000540)=ANY=[@ANYBLOB], 0x2c4) r1 = inotify_init() openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) epoll_ctl$EPOLL_CTL_DEL(0xffffffffffffffff, 0x2, 0xffffffffffffffff) inotify_add_watch(r1, &(0x7f0000000000)='.\x00', 0x400017e) r2 = openat$incfs(0xffffffffffffffff, &(0x7f0000000080)='.log\x00', 0x20200, 0x40) fcntl$getownex(r2, 0x10, &(0x7f00000000c0)) r3 = open(&(0x7f0000000040)='./file0\x00', 0x200c2, 0x0) write$binfmt_elf64(r3, &(0x7f0000000080)=ANY=[], 0x8) sendfile(r3, 0xffffffffffffffff, &(0x7f00000001c0), 0xa198) dup(0xffffffffffffffff) r4 = syz_mount_image$gfs2meta(&(0x7f0000000140)='gfs2meta\x00', &(0x7f0000000200)='./file0\x00', 0x1000, 0x4, &(0x7f0000000880)=[{&(0x7f0000000240)="77ba0daae1b2e74ecd52c59a85bf6f4b1f0b01ab07ba92bc6e57305406115f2bc3e4dd94f19ed896c4fccd34271e9dc3499af9298dbc709e0e6a513d61391d4b198af5f55d24239ae934e8babb8d1cb67bb17b0158", 0x55, 0x3}, {&(0x7f00000002c0)="ae227f954d229f666a6cd22938585e852071e55aa5728addcd315922bf32282e077bdbc63cd5ec89626ee2f8e7982ca239eaa758231056cdca22ca27428407f6c64c384665cfbd00ee6e0d7609f2c7ba0f28b4af70d0307ef78decfe42973915cd509de7c19ea0f3f5c3caaab05f9af08e2cc82d2c14b919dd045e3d36ce1c5d0ff23aed0a4a6ef508b5e71df0a25250d47f1e033ed503b6df99c189111b75b59df679cb75240b756cafecfd203568eeb2c1708fe9f11a2cb0f288590ec76cefbde09c90e9d568492aa5f41196397b70c869838c7164f2bad8eff017d021d7d41c9025c20b", 0xe5, 0x3}, {&(0x7f00000003c0)="792eb6eec33e561f18dc4b58b6a6fb3c7e6fd5e612c08490216ae02617f9811945929cffbf59727393a9a69d57b00a5cd08da3888884b8361d6a4003a54480c1086a5fc876582ff049ede86e2f58d80c7b6cf618e1ba36d4710887bc34ef2b7abbc686df2185f99998060bf492b84e3a02077e2aaf014e1186fde602d2b639d467f48fc2e18cf1553e07ac39040953566ab1d21aac627b166825375377bc3332b62160ea8bf7fc3196b30965dce6181bf7a1c60d0270f24ba60e633c8c88bbdefb5928dc8183c2ce0616de6c3185a4aa7eb2ec6ab7d8394a9536bf7e4f33f76294b0b4a390aca576177671191fe91530e9bd0db79cee", 0xf6, 0x100000000}, {&(0x7f00000004c0)="a90f49b744c1ad7c27bc0a3b1965ca2bce6602b5f5a8b294ced925862d0a9df5c88e43095ba5810ba49c2216e7e1a9b5f07075e6a3101e853557713e983b2f46cf599dc2cba6254802d01794cdc015e28e2b5aa8c10293a4487b3fe2469252f2c2406327b2a5fe71b185ec0adfdc824a237f94", 0x73, 0x7}], 0x21008, &(0x7f0000000900)={[{'.log\x00'}, {'-%('}, {'.log\x00'}], [{@obj_user={'obj_user'}}, {@appraise_type='appraise_type=imasig'}, {@fowner_eq={'fowner', 0x3d, 0xee01}}, {@hash='hash'}, {@subj_type={'subj_type', 0x3d, '-&'}}]}) ioctl$BTRFS_IOC_SUBVOL_SETFLAGS(r4, 0x4008941a, &(0x7f0000000980)=0xfe33b054cbbc4d79) [ 551.857423][T26870] loop4: detected capacity change from 264192 to 0 11:24:46 executing program 3: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x7f, 0x80000000008001}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x9}, 0x0) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000080)) r1 = open(&(0x7f0000000240)='./file1\x00', 0x141142, 0x0) write$UHID_INPUT(r1, &(0x7f0000001440)={0x8, {'\x00G\x00'}}, 0xfffffc41) open(&(0x7f00000001c0)='./file1\x00', 0x0, 0x0) setxattr$trusted_overlay_nlink(&(0x7f0000000000)='./file1\x00', &(0x7f00000000c0)='trusted.overlay.nlink\x00', 0x0, 0x0, 0x0) 11:24:46 executing program 4: write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000540)=ANY=[@ANYBLOB="7f454c4601061f000400000000000000030038000800000032000000000000004000000000000000560200000000000007000000008038000100090002000100010000000100000006000000000000000400000000000000060000000000000001040000000000000200000000000000010000000000000051e574640400000001000000000000000400000000000000050000000000000005000000000000000400000000000000ff24444700000000908bc001727fbcd44f4d3bf922995edf2fd379eb00"/489], 0x2c4) r0 = inotify_init() r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) epoll_ctl$EPOLL_CTL_DEL(0xffffffffffffffff, 0x2, r1) inotify_add_watch(r0, &(0x7f0000000000)='.\x00', 0x400017e) r2 = openat$incfs(0xffffffffffffffff, 0x0, 0x20200, 0x40) fcntl$getownex(r2, 0x10, &(0x7f00000000c0)) r3 = open(&(0x7f0000000040)='./file0\x00', 0x200c2, 0x0) write$binfmt_elf64(r3, &(0x7f0000000080)=ANY=[], 0x8) sendfile(r3, r3, &(0x7f00000001c0), 0xa198) dup(0xffffffffffffffff) r4 = syz_mount_image$gfs2meta(&(0x7f0000000140)='gfs2meta\x00', &(0x7f0000000200)='./file0\x00', 0x1000, 0x4, &(0x7f0000000880)=[{&(0x7f0000000240)="77ba0daae1b2e74ecd52c59a85bf6f4b1f0b01ab07ba92bc6e57305406115f2bc3e4dd94f19ed896c4fccd34271e9dc3499af9298dbc709e0e6a513d61391d4b198af5f55d24239ae934e8babb8d1cb67bb17b0158", 0x55, 0x3}, {&(0x7f00000002c0)="ae227f954d229f666a6cd22938585e852071e55aa5728addcd315922bf32282e077bdbc63cd5ec89626ee2f8e7982ca239eaa758231056cdca22ca27428407f6c64c384665cfbd00ee6e0d7609f2c7ba0f28b4af70d0307ef78decfe42973915cd509de7c19ea0f3f5c3caaab05f9af08e2cc82d2c14b919dd045e3d36ce1c5d0ff23aed0a4a6ef508b5e71df0a25250d47f1e033ed503b6df99c189111b75b59df679cb75240b756cafecfd203568eeb2c1708fe9f11a2cb0f288590ec76cefbde09c90e9d568492aa5f41196397b70c869838c7164f2bad8eff017d021d7d41c9025c20b", 0xe5, 0x3}, {&(0x7f00000003c0)="792eb6eec33e561f18dc4b58b6a6fb3c7e6fd5e612c08490216ae02617f9811945929cffbf59727393a9a69d57b00a5cd08da3888884b8361d6a4003a54480c1086a5fc876582ff049ede86e2f58d80c7b6cf618e1ba36d4710887bc34ef2b7abbc686df2185f99998060bf492b84e3a02077e2aaf014e1186fde602d2b639d467f48fc2e18cf1553e07ac39040953566ab1d21aac627b166825375377bc3332b62160ea8bf7fc3196b30965dce6181bf7a1c60d0270f24ba60e633c8c88bbdefb5928dc8183c2ce0616de6c3185a4aa7eb2ec6ab7d8394a9536bf7e4f33f76294b0b4a390aca576177671191fe91530e9bd0db79cee", 0xf6, 0x100000000}, {&(0x7f00000004c0)="a90f49b744c1ad7c27bc0a3b1965ca2bce6602b5f5a8b294ced925862d0a9df5c88e43095ba5810ba49c2216e7e1a9b5f07075e6a3101e853557713e983b2f46cf599dc2cba6254802d01794cdc015e28e2b5aa8c10293a4487b3fe2469252f2c2406327b2a5fe71b185ec0adfdc824a237f94", 0x73, 0x7}], 0x21008, &(0x7f0000000900)={[{'.log\x00'}, {'-%('}, {'.log\x00'}], [{@appraise_type='appraise_type=imasig'}, {@fowner_eq={'fowner', 0x3d, 0xee01}}, {@hash='hash'}, {@subj_type={'subj_type', 0x3d, '-&'}}, {@hash='hash'}]}) ioctl$BTRFS_IOC_SUBVOL_SETFLAGS(r4, 0x4008941a, &(0x7f0000000980)=0xfe33b054cbbc4d79) [ 551.946773][T26877] loop0: detected capacity change from 264192 to 0 11:24:46 executing program 0: r0 = perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x5c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write$binfmt_elf64(r0, &(0x7f0000000540)=ANY=[@ANYBLOB], 0x2c4) r1 = inotify_init() openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) epoll_ctl$EPOLL_CTL_DEL(0xffffffffffffffff, 0x2, 0xffffffffffffffff) inotify_add_watch(r1, &(0x7f0000000000)='.\x00', 0x400017e) r2 = openat$incfs(0xffffffffffffffff, &(0x7f0000000080)='.log\x00', 0x20200, 0x40) fcntl$getownex(r2, 0x10, &(0x7f00000000c0)) r3 = open(&(0x7f0000000040)='./file0\x00', 0x200c2, 0x0) write$binfmt_elf64(r3, &(0x7f0000000080)=ANY=[], 0x8) sendfile(r3, r3, 0x0, 0xa198) dup(0xffffffffffffffff) r4 = syz_mount_image$gfs2meta(&(0x7f0000000140)='gfs2meta\x00', &(0x7f0000000200)='./file0\x00', 0x1000, 0x4, &(0x7f0000000880)=[{&(0x7f0000000240)="77ba0daae1b2e74ecd52c59a85bf6f4b1f0b01ab07ba92bc6e57305406115f2bc3e4dd94f19ed896c4fccd34271e9dc3499af9298dbc709e0e6a513d61391d4b198af5f55d24239ae934e8babb8d1cb67bb17b0158", 0x55, 0x3}, {&(0x7f00000002c0)="ae227f954d229f666a6cd22938585e852071e55aa5728addcd315922bf32282e077bdbc63cd5ec89626ee2f8e7982ca239eaa758231056cdca22ca27428407f6c64c384665cfbd00ee6e0d7609f2c7ba0f28b4af70d0307ef78decfe42973915cd509de7c19ea0f3f5c3caaab05f9af08e2cc82d2c14b919dd045e3d36ce1c5d0ff23aed0a4a6ef508b5e71df0a25250d47f1e033ed503b6df99c189111b75b59df679cb75240b756cafecfd203568eeb2c1708fe9f11a2cb0f288590ec76cefbde09c90e9d568492aa5f41196397b70c869838c7164f2bad8eff017d021d7d41c9025c20b", 0xe5, 0x3}, {&(0x7f00000003c0)="792eb6eec33e561f18dc4b58b6a6fb3c7e6fd5e612c08490216ae02617f9811945929cffbf59727393a9a69d57b00a5cd08da3888884b8361d6a4003a54480c1086a5fc876582ff049ede86e2f58d80c7b6cf618e1ba36d4710887bc34ef2b7abbc686df2185f99998060bf492b84e3a02077e2aaf014e1186fde602d2b639d467f48fc2e18cf1553e07ac39040953566ab1d21aac627b166825375377bc3332b62160ea8bf7fc3196b30965dce6181bf7a1c60d0270f24ba60e633c8c88bbdefb5928dc8183c2ce0616de6c3185a4aa7eb2ec6ab7d8394a9536bf7e4f33f76294b0b4a390aca576177671191fe91530e9bd0db79cee", 0xf6, 0x100000000}, {&(0x7f00000004c0)="a90f49b744c1ad7c27bc0a3b1965ca2bce6602b5f5a8b294ced925862d0a9df5c88e43095ba5810ba49c2216e7e1a9b5f07075e6a3101e853557713e983b2f46cf599dc2cba6254802d01794cdc015e28e2b5aa8c10293a4487b3fe2469252f2c2406327b2a5fe71b185ec0adfdc824a237f94", 0x73, 0x7}], 0x21008, &(0x7f0000000900)={[{'.log\x00'}, {'-%('}, {'.log\x00'}], [{@obj_user={'obj_user'}}, {@appraise_type='appraise_type=imasig'}, {@fowner_eq={'fowner', 0x3d, 0xee01}}, {@hash='hash'}, {@subj_type={'subj_type', 0x3d, '-&'}}]}) ioctl$BTRFS_IOC_SUBVOL_SETFLAGS(r4, 0x4008941a, &(0x7f0000000980)=0xfe33b054cbbc4d79) [ 552.100866][T26886] loop0: detected capacity change from 264192 to 0 11:24:46 executing program 0: r0 = perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x5c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write$binfmt_elf64(r0, &(0x7f0000000540)=ANY=[@ANYBLOB], 0x2c4) r1 = inotify_init() openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) epoll_ctl$EPOLL_CTL_DEL(0xffffffffffffffff, 0x2, 0xffffffffffffffff) inotify_add_watch(r1, &(0x7f0000000000)='.\x00', 0x400017e) r2 = openat$incfs(0xffffffffffffffff, &(0x7f0000000080)='.log\x00', 0x20200, 0x40) fcntl$getownex(r2, 0x10, &(0x7f00000000c0)) r3 = open(&(0x7f0000000040)='./file0\x00', 0x200c2, 0x0) write$binfmt_elf64(r3, &(0x7f0000000080)=ANY=[], 0x8) sendfile(r3, r3, 0x0, 0xa198) dup(0xffffffffffffffff) r4 = syz_mount_image$gfs2meta(&(0x7f0000000140)='gfs2meta\x00', &(0x7f0000000200)='./file0\x00', 0x1000, 0x4, &(0x7f0000000880)=[{&(0x7f0000000240)="77ba0daae1b2e74ecd52c59a85bf6f4b1f0b01ab07ba92bc6e57305406115f2bc3e4dd94f19ed896c4fccd34271e9dc3499af9298dbc709e0e6a513d61391d4b198af5f55d24239ae934e8babb8d1cb67bb17b0158", 0x55, 0x3}, {&(0x7f00000002c0)="ae227f954d229f666a6cd22938585e852071e55aa5728addcd315922bf32282e077bdbc63cd5ec89626ee2f8e7982ca239eaa758231056cdca22ca27428407f6c64c384665cfbd00ee6e0d7609f2c7ba0f28b4af70d0307ef78decfe42973915cd509de7c19ea0f3f5c3caaab05f9af08e2cc82d2c14b919dd045e3d36ce1c5d0ff23aed0a4a6ef508b5e71df0a25250d47f1e033ed503b6df99c189111b75b59df679cb75240b756cafecfd203568eeb2c1708fe9f11a2cb0f288590ec76cefbde09c90e9d568492aa5f41196397b70c869838c7164f2bad8eff017d021d7d41c9025c20b", 0xe5, 0x3}, {&(0x7f00000003c0)="792eb6eec33e561f18dc4b58b6a6fb3c7e6fd5e612c08490216ae02617f9811945929cffbf59727393a9a69d57b00a5cd08da3888884b8361d6a4003a54480c1086a5fc876582ff049ede86e2f58d80c7b6cf618e1ba36d4710887bc34ef2b7abbc686df2185f99998060bf492b84e3a02077e2aaf014e1186fde602d2b639d467f48fc2e18cf1553e07ac39040953566ab1d21aac627b166825375377bc3332b62160ea8bf7fc3196b30965dce6181bf7a1c60d0270f24ba60e633c8c88bbdefb5928dc8183c2ce0616de6c3185a4aa7eb2ec6ab7d8394a9536bf7e4f33f76294b0b4a390aca576177671191fe91530e9bd0db79cee", 0xf6, 0x100000000}, {&(0x7f00000004c0)="a90f49b744c1ad7c27bc0a3b1965ca2bce6602b5f5a8b294ced925862d0a9df5c88e43095ba5810ba49c2216e7e1a9b5f07075e6a3101e853557713e983b2f46cf599dc2cba6254802d01794cdc015e28e2b5aa8c10293a4487b3fe2469252f2c2406327b2a5fe71b185ec0adfdc824a237f94", 0x73, 0x7}], 0x21008, &(0x7f0000000900)={[{'.log\x00'}, {'-%('}, {'.log\x00'}], [{@obj_user={'obj_user'}}, {@appraise_type='appraise_type=imasig'}, {@fowner_eq={'fowner', 0x3d, 0xee01}}, {@hash='hash'}, {@subj_type={'subj_type', 0x3d, '-&'}}]}) ioctl$BTRFS_IOC_SUBVOL_SETFLAGS(r4, 0x4008941a, &(0x7f0000000980)=0xfe33b054cbbc4d79) [ 552.170206][T26893] loop4: detected capacity change from 264192 to 0 [ 552.260668][T26906] loop0: detected capacity change from 264192 to 0 11:24:46 executing program 1: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x7f, 0x80000000008001}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x9}, 0x0) r1 = open(&(0x7f0000000240)='./file1\x00', 0x141142, 0x0) write$UHID_INPUT(r1, &(0x7f0000001440), 0xfffffc41) open(&(0x7f00000001c0)='./file1\x00', 0x0, 0xeaffffff) setxattr$trusted_overlay_nlink(&(0x7f0000000000)='./file1\x00', &(0x7f00000000c0)='trusted.overlay.nlink\x00', 0x0, 0x0, 0x0) 11:24:46 executing program 5: write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000540)=ANY=[@ANYBLOB="7f454c4601061f000400000000000000030038000800000032000000000000004000000000000000560200000000000007000000008038000100090002000100010000000100000006000000000000000400000000000000060000000000000001040000000000000200000000000000010000000000000051e574640400000001000000000000000400000000000000050000000000000005000000000000000400000000000000ff24444700000000908bc001727fbcd44f4d3bf922995edf2fd379eb00"/489], 0x2c4) r0 = inotify_init() r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) epoll_ctl$EPOLL_CTL_DEL(0xffffffffffffffff, 0x2, r1) inotify_add_watch(r0, &(0x7f0000000000)='.\x00', 0x400017e) r2 = openat$incfs(0xffffffffffffffff, &(0x7f0000000080)='.log\x00', 0x0, 0x40) fcntl$getownex(r2, 0x10, &(0x7f00000000c0)) r3 = open(&(0x7f0000000040)='./file0\x00', 0x200c2, 0x0) write$binfmt_elf64(r3, &(0x7f0000000080)=ANY=[], 0x8) sendfile(r3, r3, &(0x7f00000001c0), 0xa198) dup(0xffffffffffffffff) r4 = syz_mount_image$gfs2meta(&(0x7f0000000140)='gfs2meta\x00', &(0x7f0000000200)='./file0\x00', 0x1000, 0x4, &(0x7f0000000880)=[{&(0x7f0000000240)="77ba0daae1b2e74ecd52c59a85bf6f4b1f0b01ab07ba92bc6e57305406115f2bc3e4dd94f19ed896c4fccd34271e9dc3499af9298dbc709e0e6a513d61391d4b198af5f55d24239ae934e8babb8d1cb67bb17b0158", 0x55, 0x3}, {&(0x7f00000002c0)="ae227f954d229f666a6cd22938585e852071e55aa5728addcd315922bf32282e077bdbc63cd5ec89626ee2f8e7982ca239eaa758231056cdca22ca27428407f6c64c384665cfbd00ee6e0d7609f2c7ba0f28b4af70d0307ef78decfe42973915cd509de7c19ea0f3f5c3caaab05f9af08e2cc82d2c14b919dd045e3d36ce1c5d0ff23aed0a4a6ef508b5e71df0a25250d47f1e033ed503b6df99c189111b75b59df679cb75240b756cafecfd203568eeb2c1708fe9f11a2cb0f288590ec76cefbde09c90e9d568492aa5f41196397b70c869838c7164f2bad8eff017d021d7d41c9025c20b", 0xe5, 0x3}, {&(0x7f00000003c0)="792eb6eec33e561f18dc4b58b6a6fb3c7e6fd5e612c08490216ae02617f9811945929cffbf59727393a9a69d57b00a5cd08da3888884b8361d6a4003a54480c1086a5fc876582ff049ede86e2f58d80c7b6cf618e1ba36d4710887bc34ef2b7abbc686df2185f99998060bf492b84e3a02077e2aaf014e1186fde602d2b639d467f48fc2e18cf1553e07ac39040953566ab1d21aac627b166825375377bc3332b62160ea8bf7fc3196b30965dce6181bf7a1c60d0270f24ba60e633c8c88bbdefb5928dc8183c2ce0616de6c3185a4aa7eb2ec6ab7d8394a9536bf7e4f33f76294b0b4a390aca576177671191fe91530e9bd0db79cee", 0xf6, 0x100000000}, {&(0x7f00000004c0)="a90f49b744c1ad7c27bc0a3b1965ca2bce6602b5f5a8b294ced925862d0a9df5c88e43095ba5810ba49c2216e7e1a9b5f07075e6a3101e853557713e983b2f46cf599dc2cba6254802d01794cdc015e28e2b5aa8c10293a4487b3fe2469252f2c2406327b2a5fe71b185ec0adfdc824a237f94", 0x73, 0x7}], 0x21008, &(0x7f0000000900)={[{'.log\x00'}, {'-%('}, {'.log\x00'}], [{@appraise_type='appraise_type=imasig'}, {@fowner_eq={'fowner', 0x3d, 0xee01}}, {@hash='hash'}, {@subj_type={'subj_type', 0x3d, '-&'}}, {@hash='hash'}]}) ioctl$BTRFS_IOC_SUBVOL_SETFLAGS(r4, 0x4008941a, &(0x7f0000000980)=0xfe33b054cbbc4d79) 11:24:46 executing program 0: r0 = perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x5c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write$binfmt_elf64(r0, &(0x7f0000000540)=ANY=[@ANYBLOB], 0x2c4) r1 = inotify_init() openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) epoll_ctl$EPOLL_CTL_DEL(0xffffffffffffffff, 0x2, 0xffffffffffffffff) inotify_add_watch(r1, &(0x7f0000000000)='.\x00', 0x400017e) r2 = openat$incfs(0xffffffffffffffff, &(0x7f0000000080)='.log\x00', 0x20200, 0x40) fcntl$getownex(r2, 0x10, &(0x7f00000000c0)) r3 = open(&(0x7f0000000040)='./file0\x00', 0x200c2, 0x0) write$binfmt_elf64(r3, &(0x7f0000000080)=ANY=[], 0x8) sendfile(r3, r3, 0x0, 0xa198) dup(0xffffffffffffffff) r4 = syz_mount_image$gfs2meta(&(0x7f0000000140)='gfs2meta\x00', &(0x7f0000000200)='./file0\x00', 0x1000, 0x4, &(0x7f0000000880)=[{&(0x7f0000000240)="77ba0daae1b2e74ecd52c59a85bf6f4b1f0b01ab07ba92bc6e57305406115f2bc3e4dd94f19ed896c4fccd34271e9dc3499af9298dbc709e0e6a513d61391d4b198af5f55d24239ae934e8babb8d1cb67bb17b0158", 0x55, 0x3}, {&(0x7f00000002c0)="ae227f954d229f666a6cd22938585e852071e55aa5728addcd315922bf32282e077bdbc63cd5ec89626ee2f8e7982ca239eaa758231056cdca22ca27428407f6c64c384665cfbd00ee6e0d7609f2c7ba0f28b4af70d0307ef78decfe42973915cd509de7c19ea0f3f5c3caaab05f9af08e2cc82d2c14b919dd045e3d36ce1c5d0ff23aed0a4a6ef508b5e71df0a25250d47f1e033ed503b6df99c189111b75b59df679cb75240b756cafecfd203568eeb2c1708fe9f11a2cb0f288590ec76cefbde09c90e9d568492aa5f41196397b70c869838c7164f2bad8eff017d021d7d41c9025c20b", 0xe5, 0x3}, {&(0x7f00000003c0)="792eb6eec33e561f18dc4b58b6a6fb3c7e6fd5e612c08490216ae02617f9811945929cffbf59727393a9a69d57b00a5cd08da3888884b8361d6a4003a54480c1086a5fc876582ff049ede86e2f58d80c7b6cf618e1ba36d4710887bc34ef2b7abbc686df2185f99998060bf492b84e3a02077e2aaf014e1186fde602d2b639d467f48fc2e18cf1553e07ac39040953566ab1d21aac627b166825375377bc3332b62160ea8bf7fc3196b30965dce6181bf7a1c60d0270f24ba60e633c8c88bbdefb5928dc8183c2ce0616de6c3185a4aa7eb2ec6ab7d8394a9536bf7e4f33f76294b0b4a390aca576177671191fe91530e9bd0db79cee", 0xf6, 0x100000000}, {&(0x7f00000004c0)="a90f49b744c1ad7c27bc0a3b1965ca2bce6602b5f5a8b294ced925862d0a9df5c88e43095ba5810ba49c2216e7e1a9b5f07075e6a3101e853557713e983b2f46cf599dc2cba6254802d01794cdc015e28e2b5aa8c10293a4487b3fe2469252f2c2406327b2a5fe71b185ec0adfdc824a237f94", 0x73, 0x7}], 0x21008, &(0x7f0000000900)={[{'.log\x00'}, {'-%('}, {'.log\x00'}], [{@obj_user={'obj_user'}}, {@appraise_type='appraise_type=imasig'}, {@fowner_eq={'fowner', 0x3d, 0xee01}}, {@hash='hash'}, {@subj_type={'subj_type', 0x3d, '-&'}}]}) ioctl$BTRFS_IOC_SUBVOL_SETFLAGS(r4, 0x4008941a, &(0x7f0000000980)=0xfe33b054cbbc4d79) [ 552.439036][T26915] loop0: detected capacity change from 264192 to 0 11:24:46 executing program 0: r0 = perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x5c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write$binfmt_elf64(r0, &(0x7f0000000540)=ANY=[@ANYBLOB], 0x2c4) r1 = inotify_init() openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) epoll_ctl$EPOLL_CTL_DEL(0xffffffffffffffff, 0x2, 0xffffffffffffffff) inotify_add_watch(r1, &(0x7f0000000000)='.\x00', 0x400017e) r2 = openat$incfs(0xffffffffffffffff, &(0x7f0000000080)='.log\x00', 0x20200, 0x40) fcntl$getownex(r2, 0x10, &(0x7f00000000c0)) r3 = open(&(0x7f0000000040)='./file0\x00', 0x200c2, 0x0) write$binfmt_elf64(r3, &(0x7f0000000080)=ANY=[], 0x8) sendfile(r3, r3, &(0x7f00000001c0), 0x0) dup(0xffffffffffffffff) r4 = syz_mount_image$gfs2meta(&(0x7f0000000140)='gfs2meta\x00', &(0x7f0000000200)='./file0\x00', 0x1000, 0x4, &(0x7f0000000880)=[{&(0x7f0000000240)="77ba0daae1b2e74ecd52c59a85bf6f4b1f0b01ab07ba92bc6e57305406115f2bc3e4dd94f19ed896c4fccd34271e9dc3499af9298dbc709e0e6a513d61391d4b198af5f55d24239ae934e8babb8d1cb67bb17b0158", 0x55, 0x3}, {&(0x7f00000002c0)="ae227f954d229f666a6cd22938585e852071e55aa5728addcd315922bf32282e077bdbc63cd5ec89626ee2f8e7982ca239eaa758231056cdca22ca27428407f6c64c384665cfbd00ee6e0d7609f2c7ba0f28b4af70d0307ef78decfe42973915cd509de7c19ea0f3f5c3caaab05f9af08e2cc82d2c14b919dd045e3d36ce1c5d0ff23aed0a4a6ef508b5e71df0a25250d47f1e033ed503b6df99c189111b75b59df679cb75240b756cafecfd203568eeb2c1708fe9f11a2cb0f288590ec76cefbde09c90e9d568492aa5f41196397b70c869838c7164f2bad8eff017d021d7d41c9025c20b", 0xe5, 0x3}, {&(0x7f00000003c0)="792eb6eec33e561f18dc4b58b6a6fb3c7e6fd5e612c08490216ae02617f9811945929cffbf59727393a9a69d57b00a5cd08da3888884b8361d6a4003a54480c1086a5fc876582ff049ede86e2f58d80c7b6cf618e1ba36d4710887bc34ef2b7abbc686df2185f99998060bf492b84e3a02077e2aaf014e1186fde602d2b639d467f48fc2e18cf1553e07ac39040953566ab1d21aac627b166825375377bc3332b62160ea8bf7fc3196b30965dce6181bf7a1c60d0270f24ba60e633c8c88bbdefb5928dc8183c2ce0616de6c3185a4aa7eb2ec6ab7d8394a9536bf7e4f33f76294b0b4a390aca576177671191fe91530e9bd0db79cee", 0xf6, 0x100000000}, {&(0x7f00000004c0)="a90f49b744c1ad7c27bc0a3b1965ca2bce6602b5f5a8b294ced925862d0a9df5c88e43095ba5810ba49c2216e7e1a9b5f07075e6a3101e853557713e983b2f46cf599dc2cba6254802d01794cdc015e28e2b5aa8c10293a4487b3fe2469252f2c2406327b2a5fe71b185ec0adfdc824a237f94", 0x73, 0x7}], 0x21008, &(0x7f0000000900)={[{'.log\x00'}, {'-%('}, {'.log\x00'}], [{@obj_user={'obj_user'}}, {@appraise_type='appraise_type=imasig'}, {@fowner_eq={'fowner', 0x3d, 0xee01}}, {@hash='hash'}, {@subj_type={'subj_type', 0x3d, '-&'}}]}) ioctl$BTRFS_IOC_SUBVOL_SETFLAGS(r4, 0x4008941a, &(0x7f0000000980)=0xfe33b054cbbc4d79) [ 552.498907][T26920] loop5: detected capacity change from 264192 to 0 11:24:46 executing program 2: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x7f, 0x80000000008001}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x9}, 0x0) r1 = open(&(0x7f0000000240)='./file1\x00', 0x141142, 0x0) write$UHID_INPUT(r1, &(0x7f0000001440)={0x8, {'\x00K\x00'}}, 0xfffffc41) open(&(0x7f00000001c0)='./file1\x00', 0x0, 0x0) setxattr$trusted_overlay_nlink(&(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x0, 0x0) [ 552.637085][T26928] loop0: detected capacity change from 264192 to 0 11:24:46 executing program 0: r0 = perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x5c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write$binfmt_elf64(r0, &(0x7f0000000540)=ANY=[@ANYBLOB], 0x2c4) r1 = inotify_init() openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) epoll_ctl$EPOLL_CTL_DEL(0xffffffffffffffff, 0x2, 0xffffffffffffffff) inotify_add_watch(r1, &(0x7f0000000000)='.\x00', 0x400017e) r2 = openat$incfs(0xffffffffffffffff, &(0x7f0000000080)='.log\x00', 0x20200, 0x40) fcntl$getownex(r2, 0x10, &(0x7f00000000c0)) r3 = open(&(0x7f0000000040)='./file0\x00', 0x200c2, 0x0) write$binfmt_elf64(r3, &(0x7f0000000080)=ANY=[], 0x8) sendfile(r3, r3, &(0x7f00000001c0), 0x0) dup(0xffffffffffffffff) r4 = syz_mount_image$gfs2meta(&(0x7f0000000140)='gfs2meta\x00', &(0x7f0000000200)='./file0\x00', 0x1000, 0x4, &(0x7f0000000880)=[{&(0x7f0000000240)="77ba0daae1b2e74ecd52c59a85bf6f4b1f0b01ab07ba92bc6e57305406115f2bc3e4dd94f19ed896c4fccd34271e9dc3499af9298dbc709e0e6a513d61391d4b198af5f55d24239ae934e8babb8d1cb67bb17b0158", 0x55, 0x3}, {&(0x7f00000002c0)="ae227f954d229f666a6cd22938585e852071e55aa5728addcd315922bf32282e077bdbc63cd5ec89626ee2f8e7982ca239eaa758231056cdca22ca27428407f6c64c384665cfbd00ee6e0d7609f2c7ba0f28b4af70d0307ef78decfe42973915cd509de7c19ea0f3f5c3caaab05f9af08e2cc82d2c14b919dd045e3d36ce1c5d0ff23aed0a4a6ef508b5e71df0a25250d47f1e033ed503b6df99c189111b75b59df679cb75240b756cafecfd203568eeb2c1708fe9f11a2cb0f288590ec76cefbde09c90e9d568492aa5f41196397b70c869838c7164f2bad8eff017d021d7d41c9025c20b", 0xe5, 0x3}, {&(0x7f00000003c0)="792eb6eec33e561f18dc4b58b6a6fb3c7e6fd5e612c08490216ae02617f9811945929cffbf59727393a9a69d57b00a5cd08da3888884b8361d6a4003a54480c1086a5fc876582ff049ede86e2f58d80c7b6cf618e1ba36d4710887bc34ef2b7abbc686df2185f99998060bf492b84e3a02077e2aaf014e1186fde602d2b639d467f48fc2e18cf1553e07ac39040953566ab1d21aac627b166825375377bc3332b62160ea8bf7fc3196b30965dce6181bf7a1c60d0270f24ba60e633c8c88bbdefb5928dc8183c2ce0616de6c3185a4aa7eb2ec6ab7d8394a9536bf7e4f33f76294b0b4a390aca576177671191fe91530e9bd0db79cee", 0xf6, 0x100000000}, {&(0x7f00000004c0)="a90f49b744c1ad7c27bc0a3b1965ca2bce6602b5f5a8b294ced925862d0a9df5c88e43095ba5810ba49c2216e7e1a9b5f07075e6a3101e853557713e983b2f46cf599dc2cba6254802d01794cdc015e28e2b5aa8c10293a4487b3fe2469252f2c2406327b2a5fe71b185ec0adfdc824a237f94", 0x73, 0x7}], 0x21008, &(0x7f0000000900)={[{'.log\x00'}, {'-%('}, {'.log\x00'}], [{@obj_user={'obj_user'}}, {@appraise_type='appraise_type=imasig'}, {@fowner_eq={'fowner', 0x3d, 0xee01}}, {@hash='hash'}, {@subj_type={'subj_type', 0x3d, '-&'}}]}) ioctl$BTRFS_IOC_SUBVOL_SETFLAGS(r4, 0x4008941a, &(0x7f0000000980)=0xfe33b054cbbc4d79) [ 552.806779][T26936] loop0: detected capacity change from 264192 to 0 11:24:47 executing program 0: r0 = perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x5c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write$binfmt_elf64(r0, &(0x7f0000000540)=ANY=[@ANYBLOB], 0x2c4) r1 = inotify_init() openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) epoll_ctl$EPOLL_CTL_DEL(0xffffffffffffffff, 0x2, 0xffffffffffffffff) inotify_add_watch(r1, &(0x7f0000000000)='.\x00', 0x400017e) r2 = openat$incfs(0xffffffffffffffff, &(0x7f0000000080)='.log\x00', 0x20200, 0x40) fcntl$getownex(r2, 0x10, &(0x7f00000000c0)) r3 = open(&(0x7f0000000040)='./file0\x00', 0x200c2, 0x0) write$binfmt_elf64(r3, &(0x7f0000000080)=ANY=[], 0x8) sendfile(r3, r3, &(0x7f00000001c0), 0x0) dup(0xffffffffffffffff) r4 = syz_mount_image$gfs2meta(&(0x7f0000000140)='gfs2meta\x00', &(0x7f0000000200)='./file0\x00', 0x1000, 0x4, &(0x7f0000000880)=[{&(0x7f0000000240)="77ba0daae1b2e74ecd52c59a85bf6f4b1f0b01ab07ba92bc6e57305406115f2bc3e4dd94f19ed896c4fccd34271e9dc3499af9298dbc709e0e6a513d61391d4b198af5f55d24239ae934e8babb8d1cb67bb17b0158", 0x55, 0x3}, {&(0x7f00000002c0)="ae227f954d229f666a6cd22938585e852071e55aa5728addcd315922bf32282e077bdbc63cd5ec89626ee2f8e7982ca239eaa758231056cdca22ca27428407f6c64c384665cfbd00ee6e0d7609f2c7ba0f28b4af70d0307ef78decfe42973915cd509de7c19ea0f3f5c3caaab05f9af08e2cc82d2c14b919dd045e3d36ce1c5d0ff23aed0a4a6ef508b5e71df0a25250d47f1e033ed503b6df99c189111b75b59df679cb75240b756cafecfd203568eeb2c1708fe9f11a2cb0f288590ec76cefbde09c90e9d568492aa5f41196397b70c869838c7164f2bad8eff017d021d7d41c9025c20b", 0xe5, 0x3}, {&(0x7f00000003c0)="792eb6eec33e561f18dc4b58b6a6fb3c7e6fd5e612c08490216ae02617f9811945929cffbf59727393a9a69d57b00a5cd08da3888884b8361d6a4003a54480c1086a5fc876582ff049ede86e2f58d80c7b6cf618e1ba36d4710887bc34ef2b7abbc686df2185f99998060bf492b84e3a02077e2aaf014e1186fde602d2b639d467f48fc2e18cf1553e07ac39040953566ab1d21aac627b166825375377bc3332b62160ea8bf7fc3196b30965dce6181bf7a1c60d0270f24ba60e633c8c88bbdefb5928dc8183c2ce0616de6c3185a4aa7eb2ec6ab7d8394a9536bf7e4f33f76294b0b4a390aca576177671191fe91530e9bd0db79cee", 0xf6, 0x100000000}, {&(0x7f00000004c0)="a90f49b744c1ad7c27bc0a3b1965ca2bce6602b5f5a8b294ced925862d0a9df5c88e43095ba5810ba49c2216e7e1a9b5f07075e6a3101e853557713e983b2f46cf599dc2cba6254802d01794cdc015e28e2b5aa8c10293a4487b3fe2469252f2c2406327b2a5fe71b185ec0adfdc824a237f94", 0x73, 0x7}], 0x21008, &(0x7f0000000900)={[{'.log\x00'}, {'-%('}, {'.log\x00'}], [{@obj_user={'obj_user'}}, {@appraise_type='appraise_type=imasig'}, {@fowner_eq={'fowner', 0x3d, 0xee01}}, {@hash='hash'}, {@subj_type={'subj_type', 0x3d, '-&'}}]}) ioctl$BTRFS_IOC_SUBVOL_SETFLAGS(r4, 0x4008941a, &(0x7f0000000980)=0xfe33b054cbbc4d79) 11:24:47 executing program 4: r0 = perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x5c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write$binfmt_elf64(r0, &(0x7f0000000540)=ANY=[@ANYBLOB], 0x2c4) r1 = inotify_init() openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) epoll_ctl$EPOLL_CTL_DEL(0xffffffffffffffff, 0x2, 0xffffffffffffffff) inotify_add_watch(r1, &(0x7f0000000000)='.\x00', 0x400017e) r2 = openat$incfs(0xffffffffffffffff, &(0x7f0000000080)='.log\x00', 0x20200, 0x40) fcntl$getownex(r2, 0x10, &(0x7f00000000c0)) r3 = open(&(0x7f0000000040)='./file0\x00', 0x200c2, 0x0) write$binfmt_elf64(r3, &(0x7f0000000080)=ANY=[], 0x8) sendfile(r3, r3, 0x0, 0xa198) dup(0xffffffffffffffff) r4 = syz_mount_image$gfs2meta(&(0x7f0000000140)='gfs2meta\x00', &(0x7f0000000200)='./file0\x00', 0x1000, 0x4, &(0x7f0000000880)=[{&(0x7f0000000240)="77ba0daae1b2e74ecd52c59a85bf6f4b1f0b01ab07ba92bc6e57305406115f2bc3e4dd94f19ed896c4fccd34271e9dc3499af9298dbc709e0e6a513d61391d4b198af5f55d24239ae934e8babb8d1cb67bb17b0158", 0x55, 0x3}, {&(0x7f00000002c0)="ae227f954d229f666a6cd22938585e852071e55aa5728addcd315922bf32282e077bdbc63cd5ec89626ee2f8e7982ca239eaa758231056cdca22ca27428407f6c64c384665cfbd00ee6e0d7609f2c7ba0f28b4af70d0307ef78decfe42973915cd509de7c19ea0f3f5c3caaab05f9af08e2cc82d2c14b919dd045e3d36ce1c5d0ff23aed0a4a6ef508b5e71df0a25250d47f1e033ed503b6df99c189111b75b59df679cb75240b756cafecfd203568eeb2c1708fe9f11a2cb0f288590ec76cefbde09c90e9d568492aa5f41196397b70c869838c7164f2bad8eff017d021d7d41c9025c20b", 0xe5, 0x3}, {&(0x7f00000003c0)="792eb6eec33e561f18dc4b58b6a6fb3c7e6fd5e612c08490216ae02617f9811945929cffbf59727393a9a69d57b00a5cd08da3888884b8361d6a4003a54480c1086a5fc876582ff049ede86e2f58d80c7b6cf618e1ba36d4710887bc34ef2b7abbc686df2185f99998060bf492b84e3a02077e2aaf014e1186fde602d2b639d467f48fc2e18cf1553e07ac39040953566ab1d21aac627b166825375377bc3332b62160ea8bf7fc3196b30965dce6181bf7a1c60d0270f24ba60e633c8c88bbdefb5928dc8183c2ce0616de6c3185a4aa7eb2ec6ab7d8394a9536bf7e4f33f76294b0b4a390aca576177671191fe91530e9bd0db79cee", 0xf6, 0x100000000}, {&(0x7f00000004c0)="a90f49b744c1ad7c27bc0a3b1965ca2bce6602b5f5a8b294ced925862d0a9df5c88e43095ba5810ba49c2216e7e1a9b5f07075e6a3101e853557713e983b2f46cf599dc2cba6254802d01794cdc015e28e2b5aa8c10293a4487b3fe2469252f2c2406327b2a5fe71b185ec0adfdc824a237f94", 0x73, 0x7}], 0x21008, &(0x7f0000000900)={[{'.log\x00'}, {'-%('}, {'.log\x00'}], [{@obj_user={'obj_user'}}, {@appraise_type='appraise_type=imasig'}, {@fowner_eq={'fowner', 0x3d, 0xee01}}, {@hash='hash'}, {@subj_type={'subj_type', 0x3d, '-&'}}]}) ioctl$BTRFS_IOC_SUBVOL_SETFLAGS(r4, 0x4008941a, &(0x7f0000000980)=0xfe33b054cbbc4d79) 11:24:47 executing program 3: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x7f, 0x80000000008001}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x9}, 0x0) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000080)) r1 = open(&(0x7f0000000240)='./file1\x00', 0x141142, 0x0) write$UHID_INPUT(r1, &(0x7f0000001440)={0x8, {'\x00H\x00'}}, 0xfffffc41) open(&(0x7f00000001c0)='./file1\x00', 0x0, 0x0) setxattr$trusted_overlay_nlink(&(0x7f0000000000)='./file1\x00', &(0x7f00000000c0)='trusted.overlay.nlink\x00', 0x0, 0x0, 0x0) [ 553.137964][T26947] loop0: detected capacity change from 264192 to 0 11:24:47 executing program 0: r0 = perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x5c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write$binfmt_elf64(r0, &(0x7f0000000540)=ANY=[@ANYBLOB], 0x2c4) r1 = inotify_init() openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) epoll_ctl$EPOLL_CTL_DEL(0xffffffffffffffff, 0x2, 0xffffffffffffffff) inotify_add_watch(r1, &(0x7f0000000000)='.\x00', 0x400017e) r2 = openat$incfs(0xffffffffffffffff, &(0x7f0000000080)='.log\x00', 0x20200, 0x40) fcntl$getownex(r2, 0x10, &(0x7f00000000c0)) r3 = open(&(0x7f0000000040)='./file0\x00', 0x200c2, 0x0) write$binfmt_elf64(r3, &(0x7f0000000080)=ANY=[], 0x8) sendfile(r3, r3, &(0x7f00000001c0), 0xa198) dup(0xffffffffffffffff) r4 = syz_mount_image$gfs2meta(0x0, &(0x7f0000000200)='./file0\x00', 0x1000, 0x4, &(0x7f0000000880)=[{&(0x7f0000000240)="77ba0daae1b2e74ecd52c59a85bf6f4b1f0b01ab07ba92bc6e57305406115f2bc3e4dd94f19ed896c4fccd34271e9dc3499af9298dbc709e0e6a513d61391d4b198af5f55d24239ae934e8babb8d1cb67bb17b0158", 0x55, 0x3}, {&(0x7f00000002c0)="ae227f954d229f666a6cd22938585e852071e55aa5728addcd315922bf32282e077bdbc63cd5ec89626ee2f8e7982ca239eaa758231056cdca22ca27428407f6c64c384665cfbd00ee6e0d7609f2c7ba0f28b4af70d0307ef78decfe42973915cd509de7c19ea0f3f5c3caaab05f9af08e2cc82d2c14b919dd045e3d36ce1c5d0ff23aed0a4a6ef508b5e71df0a25250d47f1e033ed503b6df99c189111b75b59df679cb75240b756cafecfd203568eeb2c1708fe9f11a2cb0f288590ec76cefbde09c90e9d568492aa5f41196397b70c869838c7164f2bad8eff017d021d7d41c9025c20b", 0xe5, 0x3}, {&(0x7f00000003c0)="792eb6eec33e561f18dc4b58b6a6fb3c7e6fd5e612c08490216ae02617f9811945929cffbf59727393a9a69d57b00a5cd08da3888884b8361d6a4003a54480c1086a5fc876582ff049ede86e2f58d80c7b6cf618e1ba36d4710887bc34ef2b7abbc686df2185f99998060bf492b84e3a02077e2aaf014e1186fde602d2b639d467f48fc2e18cf1553e07ac39040953566ab1d21aac627b166825375377bc3332b62160ea8bf7fc3196b30965dce6181bf7a1c60d0270f24ba60e633c8c88bbdefb5928dc8183c2ce0616de6c3185a4aa7eb2ec6ab7d8394a9536bf7e4f33f76294b0b4a390aca576177671191fe91530e9bd0db79cee", 0xf6, 0x100000000}, {&(0x7f00000004c0)="a90f49b744c1ad7c27bc0a3b1965ca2bce6602b5f5a8b294ced925862d0a9df5c88e43095ba5810ba49c2216e7e1a9b5f07075e6a3101e853557713e983b2f46cf599dc2cba6254802d01794cdc015e28e2b5aa8c10293a4487b3fe2469252f2c2406327b2a5fe71b185ec0adfdc824a237f94", 0x73, 0x7}], 0x21008, &(0x7f0000000900)={[{'.log\x00'}, {'-%('}, {'.log\x00'}], [{@obj_user={'obj_user'}}, {@appraise_type='appraise_type=imasig'}, {@fowner_eq={'fowner', 0x3d, 0xee01}}, {@hash='hash'}, {@subj_type={'subj_type', 0x3d, '-&'}}]}) ioctl$BTRFS_IOC_SUBVOL_SETFLAGS(r4, 0x4008941a, &(0x7f0000000980)=0xfe33b054cbbc4d79) [ 553.207365][T26950] loop4: detected capacity change from 264192 to 0 11:24:47 executing program 4: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x7f, 0x80000000008001}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x9}, 0x0) r1 = open(&(0x7f0000000240)='./file1\x00', 0x141142, 0x0) write$UHID_INPUT(r1, &(0x7f0000001440), 0xfffffc41) open(&(0x7f00000001c0)='./file1\x00', 0x0, 0x7a000000) setxattr$trusted_overlay_nlink(&(0x7f0000000000)='./file1\x00', &(0x7f00000000c0)='trusted.overlay.nlink\x00', 0x0, 0x0, 0x0) 11:24:47 executing program 5: write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000540)=ANY=[@ANYBLOB="7f454c4601061f000400000000000000030038000800000032000000000000004000000000000000560200000000000007000000008038000100090002000100010000000100000006000000000000000400000000000000060000000000000001040000000000000200000000000000010000000000000051e574640400000001000000000000000400000000000000050000000000000005000000000000000400000000000000ff24444700000000908bc001727fbcd44f4d3bf922995edf2fd379eb00"/489], 0x2c4) r0 = inotify_init() r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) epoll_ctl$EPOLL_CTL_DEL(0xffffffffffffffff, 0x2, r1) inotify_add_watch(r0, &(0x7f0000000000)='.\x00', 0x400017e) r2 = openat$incfs(0xffffffffffffffff, &(0x7f0000000080)='.log\x00', 0x0, 0x0) fcntl$getownex(r2, 0x10, &(0x7f00000000c0)) r3 = open(&(0x7f0000000040)='./file0\x00', 0x200c2, 0x0) write$binfmt_elf64(r3, &(0x7f0000000080)=ANY=[], 0x8) sendfile(r3, r3, &(0x7f00000001c0), 0xa198) dup(0xffffffffffffffff) r4 = syz_mount_image$gfs2meta(&(0x7f0000000140)='gfs2meta\x00', &(0x7f0000000200)='./file0\x00', 0x1000, 0x4, &(0x7f0000000880)=[{&(0x7f0000000240)="77ba0daae1b2e74ecd52c59a85bf6f4b1f0b01ab07ba92bc6e57305406115f2bc3e4dd94f19ed896c4fccd34271e9dc3499af9298dbc709e0e6a513d61391d4b198af5f55d24239ae934e8babb8d1cb67bb17b0158", 0x55, 0x3}, {&(0x7f00000002c0)="ae227f954d229f666a6cd22938585e852071e55aa5728addcd315922bf32282e077bdbc63cd5ec89626ee2f8e7982ca239eaa758231056cdca22ca27428407f6c64c384665cfbd00ee6e0d7609f2c7ba0f28b4af70d0307ef78decfe42973915cd509de7c19ea0f3f5c3caaab05f9af08e2cc82d2c14b919dd045e3d36ce1c5d0ff23aed0a4a6ef508b5e71df0a25250d47f1e033ed503b6df99c189111b75b59df679cb75240b756cafecfd203568eeb2c1708fe9f11a2cb0f288590ec76cefbde09c90e9d568492aa5f41196397b70c869838c7164f2bad8eff017d021d7d41c9025c20b", 0xe5, 0x3}, {&(0x7f00000003c0)="792eb6eec33e561f18dc4b58b6a6fb3c7e6fd5e612c08490216ae02617f9811945929cffbf59727393a9a69d57b00a5cd08da3888884b8361d6a4003a54480c1086a5fc876582ff049ede86e2f58d80c7b6cf618e1ba36d4710887bc34ef2b7abbc686df2185f99998060bf492b84e3a02077e2aaf014e1186fde602d2b639d467f48fc2e18cf1553e07ac39040953566ab1d21aac627b166825375377bc3332b62160ea8bf7fc3196b30965dce6181bf7a1c60d0270f24ba60e633c8c88bbdefb5928dc8183c2ce0616de6c3185a4aa7eb2ec6ab7d8394a9536bf7e4f33f76294b0b4a390aca576177671191fe91530e9bd0db79cee", 0xf6, 0x100000000}, {&(0x7f00000004c0)="a90f49b744c1ad7c27bc0a3b1965ca2bce6602b5f5a8b294ced925862d0a9df5c88e43095ba5810ba49c2216e7e1a9b5f07075e6a3101e853557713e983b2f46cf599dc2cba6254802d01794cdc015e28e2b5aa8c10293a4487b3fe2469252f2c2406327b2a5fe71b185ec0adfdc824a237f94", 0x73, 0x7}], 0x21008, &(0x7f0000000900)={[{'.log\x00'}, {'-%('}, {'.log\x00'}], [{@appraise_type='appraise_type=imasig'}, {@fowner_eq={'fowner', 0x3d, 0xee01}}, {@hash='hash'}, {@subj_type={'subj_type', 0x3d, '-&'}}, {@hash='hash'}]}) ioctl$BTRFS_IOC_SUBVOL_SETFLAGS(r4, 0x4008941a, &(0x7f0000000980)=0xfe33b054cbbc4d79) [ 553.319240][T26961] loop0: detected capacity change from 264192 to 0 11:24:47 executing program 1: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x7f, 0x80000000008001}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x9}, 0x0) r1 = open(&(0x7f0000000240)='./file1\x00', 0x141142, 0x0) write$UHID_INPUT(r1, &(0x7f0000001440), 0xfffffc41) open(&(0x7f00000001c0)='./file1\x00', 0x0, 0xf6ffffff) setxattr$trusted_overlay_nlink(&(0x7f0000000000)='./file1\x00', &(0x7f00000000c0)='trusted.overlay.nlink\x00', 0x0, 0x0, 0x0) [ 553.515567][T26974] loop5: detected capacity change from 264192 to 0 11:24:47 executing program 4: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x7f, 0x80000000008001}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x9}, 0x0) r1 = open(&(0x7f0000000240)='./file1\x00', 0x141142, 0x0) write$UHID_INPUT(r1, &(0x7f0000001440), 0xfffffc41) open(&(0x7f00000001c0)='./file1\x00', 0x0, 0x74000000) setxattr$trusted_overlay_nlink(&(0x7f0000000000)='./file1\x00', &(0x7f00000000c0)='trusted.overlay.nlink\x00', 0x0, 0x0, 0x0) 11:24:47 executing program 2: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x7f, 0x80000000008001}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x9}, 0x0) r1 = open(&(0x7f0000000240)='./file1\x00', 0x141142, 0x0) write$UHID_INPUT(r1, &(0x7f0000001440)={0x8, {'\x00L\x00'}}, 0xfffffc41) open(&(0x7f00000001c0)='./file1\x00', 0x0, 0x0) setxattr$trusted_overlay_nlink(&(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x0, 0x0) 11:24:48 executing program 5: write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000540)=ANY=[@ANYBLOB="7f454c4601061f000400000000000000030038000800000032000000000000004000000000000000560200000000000007000000008038000100090002000100010000000100000006000000000000000400000000000000060000000000000001040000000000000200000000000000010000000000000051e574640400000001000000000000000400000000000000050000000000000005000000000000000400000000000000ff24444700000000908bc001727fbcd44f4d3bf922995edf2fd379eb00"/489], 0x2c4) r0 = inotify_init() r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) epoll_ctl$EPOLL_CTL_DEL(0xffffffffffffffff, 0x2, r1) inotify_add_watch(r0, &(0x7f0000000000)='.\x00', 0x400017e) openat$incfs(0xffffffffffffffff, &(0x7f0000000080)='.log\x00', 0x0, 0x0) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f00000000c0)) r2 = open(&(0x7f0000000040)='./file0\x00', 0x200c2, 0x0) write$binfmt_elf64(r2, &(0x7f0000000080)=ANY=[], 0x8) sendfile(r2, r2, &(0x7f00000001c0), 0xa198) dup(0xffffffffffffffff) r3 = syz_mount_image$gfs2meta(&(0x7f0000000140)='gfs2meta\x00', &(0x7f0000000200)='./file0\x00', 0x1000, 0x4, &(0x7f0000000880)=[{&(0x7f0000000240)="77ba0daae1b2e74ecd52c59a85bf6f4b1f0b01ab07ba92bc6e57305406115f2bc3e4dd94f19ed896c4fccd34271e9dc3499af9298dbc709e0e6a513d61391d4b198af5f55d24239ae934e8babb8d1cb67bb17b0158", 0x55, 0x3}, {&(0x7f00000002c0)="ae227f954d229f666a6cd22938585e852071e55aa5728addcd315922bf32282e077bdbc63cd5ec89626ee2f8e7982ca239eaa758231056cdca22ca27428407f6c64c384665cfbd00ee6e0d7609f2c7ba0f28b4af70d0307ef78decfe42973915cd509de7c19ea0f3f5c3caaab05f9af08e2cc82d2c14b919dd045e3d36ce1c5d0ff23aed0a4a6ef508b5e71df0a25250d47f1e033ed503b6df99c189111b75b59df679cb75240b756cafecfd203568eeb2c1708fe9f11a2cb0f288590ec76cefbde09c90e9d568492aa5f41196397b70c869838c7164f2bad8eff017d021d7d41c9025c20b", 0xe5, 0x3}, {&(0x7f00000003c0)="792eb6eec33e561f18dc4b58b6a6fb3c7e6fd5e612c08490216ae02617f9811945929cffbf59727393a9a69d57b00a5cd08da3888884b8361d6a4003a54480c1086a5fc876582ff049ede86e2f58d80c7b6cf618e1ba36d4710887bc34ef2b7abbc686df2185f99998060bf492b84e3a02077e2aaf014e1186fde602d2b639d467f48fc2e18cf1553e07ac39040953566ab1d21aac627b166825375377bc3332b62160ea8bf7fc3196b30965dce6181bf7a1c60d0270f24ba60e633c8c88bbdefb5928dc8183c2ce0616de6c3185a4aa7eb2ec6ab7d8394a9536bf7e4f33f76294b0b4a390aca576177671191fe91530e9bd0db79cee", 0xf6, 0x100000000}, {&(0x7f00000004c0)="a90f49b744c1ad7c27bc0a3b1965ca2bce6602b5f5a8b294ced925862d0a9df5c88e43095ba5810ba49c2216e7e1a9b5f07075e6a3101e853557713e983b2f46cf599dc2cba6254802d01794cdc015e28e2b5aa8c10293a4487b3fe2469252f2c2406327b2a5fe71b185ec0adfdc824a237f94", 0x73, 0x7}], 0x21008, &(0x7f0000000900)={[{'.log\x00'}, {'-%('}, {'.log\x00'}], [{@appraise_type='appraise_type=imasig'}, {@fowner_eq={'fowner', 0x3d, 0xee01}}, {@hash='hash'}, {@subj_type={'subj_type', 0x3d, '-&'}}, {@hash='hash'}]}) ioctl$BTRFS_IOC_SUBVOL_SETFLAGS(r3, 0x4008941a, &(0x7f0000000980)=0xfe33b054cbbc4d79) 11:24:48 executing program 0: r0 = perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x5c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write$binfmt_elf64(r0, &(0x7f0000000540)=ANY=[@ANYBLOB], 0x2c4) r1 = inotify_init() openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) epoll_ctl$EPOLL_CTL_DEL(0xffffffffffffffff, 0x2, 0xffffffffffffffff) inotify_add_watch(r1, &(0x7f0000000000)='.\x00', 0x400017e) r2 = openat$incfs(0xffffffffffffffff, &(0x7f0000000080)='.log\x00', 0x20200, 0x40) fcntl$getownex(r2, 0x10, &(0x7f00000000c0)) r3 = open(&(0x7f0000000040)='./file0\x00', 0x200c2, 0x0) write$binfmt_elf64(r3, &(0x7f0000000080)=ANY=[], 0x8) sendfile(r3, r3, &(0x7f00000001c0), 0xa198) dup(0xffffffffffffffff) r4 = syz_mount_image$gfs2meta(0x0, &(0x7f0000000200)='./file0\x00', 0x1000, 0x4, &(0x7f0000000880)=[{&(0x7f0000000240)="77ba0daae1b2e74ecd52c59a85bf6f4b1f0b01ab07ba92bc6e57305406115f2bc3e4dd94f19ed896c4fccd34271e9dc3499af9298dbc709e0e6a513d61391d4b198af5f55d24239ae934e8babb8d1cb67bb17b0158", 0x55, 0x3}, {&(0x7f00000002c0)="ae227f954d229f666a6cd22938585e852071e55aa5728addcd315922bf32282e077bdbc63cd5ec89626ee2f8e7982ca239eaa758231056cdca22ca27428407f6c64c384665cfbd00ee6e0d7609f2c7ba0f28b4af70d0307ef78decfe42973915cd509de7c19ea0f3f5c3caaab05f9af08e2cc82d2c14b919dd045e3d36ce1c5d0ff23aed0a4a6ef508b5e71df0a25250d47f1e033ed503b6df99c189111b75b59df679cb75240b756cafecfd203568eeb2c1708fe9f11a2cb0f288590ec76cefbde09c90e9d568492aa5f41196397b70c869838c7164f2bad8eff017d021d7d41c9025c20b", 0xe5, 0x3}, {&(0x7f00000003c0)="792eb6eec33e561f18dc4b58b6a6fb3c7e6fd5e612c08490216ae02617f9811945929cffbf59727393a9a69d57b00a5cd08da3888884b8361d6a4003a54480c1086a5fc876582ff049ede86e2f58d80c7b6cf618e1ba36d4710887bc34ef2b7abbc686df2185f99998060bf492b84e3a02077e2aaf014e1186fde602d2b639d467f48fc2e18cf1553e07ac39040953566ab1d21aac627b166825375377bc3332b62160ea8bf7fc3196b30965dce6181bf7a1c60d0270f24ba60e633c8c88bbdefb5928dc8183c2ce0616de6c3185a4aa7eb2ec6ab7d8394a9536bf7e4f33f76294b0b4a390aca576177671191fe91530e9bd0db79cee", 0xf6, 0x100000000}, {&(0x7f00000004c0)="a90f49b744c1ad7c27bc0a3b1965ca2bce6602b5f5a8b294ced925862d0a9df5c88e43095ba5810ba49c2216e7e1a9b5f07075e6a3101e853557713e983b2f46cf599dc2cba6254802d01794cdc015e28e2b5aa8c10293a4487b3fe2469252f2c2406327b2a5fe71b185ec0adfdc824a237f94", 0x73, 0x7}], 0x21008, &(0x7f0000000900)={[{'.log\x00'}, {'-%('}, {'.log\x00'}], [{@obj_user={'obj_user'}}, {@appraise_type='appraise_type=imasig'}, {@fowner_eq={'fowner', 0x3d, 0xee01}}, {@hash='hash'}, {@subj_type={'subj_type', 0x3d, '-&'}}]}) ioctl$BTRFS_IOC_SUBVOL_SETFLAGS(r4, 0x4008941a, &(0x7f0000000980)=0xfe33b054cbbc4d79) 11:24:48 executing program 3: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x7f, 0x80000000008001}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x9}, 0x0) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000080)) r1 = open(&(0x7f0000000240)='./file1\x00', 0x141142, 0x0) write$UHID_INPUT(r1, &(0x7f0000001440)={0x8, {'\x00I\x00'}}, 0xfffffc41) open(&(0x7f00000001c0)='./file1\x00', 0x0, 0x0) setxattr$trusted_overlay_nlink(&(0x7f0000000000)='./file1\x00', &(0x7f00000000c0)='trusted.overlay.nlink\x00', 0x0, 0x0, 0x0) [ 554.386422][T27003] loop5: detected capacity change from 264192 to 0 [ 554.451662][T27006] loop0: detected capacity change from 264192 to 0 11:24:48 executing program 1: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x7f, 0x80000000008001}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x9}, 0x0) r1 = open(&(0x7f0000000240)='./file1\x00', 0x141142, 0x0) write$UHID_INPUT(r1, &(0x7f0000001440), 0xfffffc41) open(&(0x7f00000001c0)='./file1\x00', 0x0, 0xfeffffff) setxattr$trusted_overlay_nlink(&(0x7f0000000000)='./file1\x00', &(0x7f00000000c0)='trusted.overlay.nlink\x00', 0x0, 0x0, 0x0) 11:24:48 executing program 4: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x7f, 0x80000000008001}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x9}, 0x0) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000080)) r1 = open(&(0x7f0000000240)='./file1\x00', 0x141142, 0x0) write$UHID_INPUT(r1, &(0x7f0000001440)={0x8, {'\x00H\x00'}}, 0xfffffc41) open(&(0x7f00000001c0)='./file1\x00', 0x0, 0x0) setxattr$trusted_overlay_nlink(&(0x7f0000000000)='./file1\x00', &(0x7f00000000c0)='trusted.overlay.nlink\x00', 0x0, 0x0, 0x0) 11:24:48 executing program 2: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x7f, 0x80000000008001}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x9}, 0x0) r1 = open(&(0x7f0000000240)='./file1\x00', 0x141142, 0x0) write$UHID_INPUT(r1, &(0x7f0000001440)={0x8, {'\x00M\x00'}}, 0xfffffc41) open(&(0x7f00000001c0)='./file1\x00', 0x0, 0x0) setxattr$trusted_overlay_nlink(&(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x0, 0x0) [ 554.833743][ T35] kauditd_printk_skb: 36 callbacks suppressed [ 554.833753][ T35] audit: type=1804 audit(1612178688.907:2147): pid=26993 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.2" name="/root/syzkaller-testdir245532710/syzkaller.d2c0aK/408/file1" dev="sda1" ino=15866 res=1 errno=0 [ 554.927756][ T35] audit: type=1800 audit(1612178688.907:2148): pid=26993 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed comm="syz-executor.2" name="file1" dev="sda1" ino=15866 res=0 errno=0 [ 554.968203][ T35] audit: type=1804 audit(1612178688.907:2149): pid=26992 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor.2" name="/root/syzkaller-testdir245532710/syzkaller.d2c0aK/408/file1" dev="sda1" ino=15866 res=1 errno=0 [ 555.057413][ T35] audit: type=1800 audit(1612178688.907:2150): pid=26992 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed comm="syz-executor.2" name="file1" dev="sda1" ino=15866 res=0 errno=0 11:24:49 executing program 5: write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000540)=ANY=[@ANYBLOB="7f454c4601061f000400000000000000030038000800000032000000000000004000000000000000560200000000000007000000008038000100090002000100010000000100000006000000000000000400000000000000060000000000000001040000000000000200000000000000010000000000000051e574640400000001000000000000000400000000000000050000000000000005000000000000000400000000000000ff24444700000000908bc001727fbcd44f4d3bf922995edf2fd379eb00"/489], 0x2c4) r0 = inotify_init() r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) epoll_ctl$EPOLL_CTL_DEL(0xffffffffffffffff, 0x2, r1) inotify_add_watch(r0, &(0x7f0000000000)='.\x00', 0x400017e) openat$incfs(0xffffffffffffffff, &(0x7f0000000080)='.log\x00', 0x0, 0x0) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f00000000c0)) r2 = open(&(0x7f0000000040)='./file0\x00', 0x200c2, 0x0) write$binfmt_elf64(r2, &(0x7f0000000080)=ANY=[], 0x8) sendfile(r2, r2, &(0x7f00000001c0), 0xa198) dup(0xffffffffffffffff) r3 = syz_mount_image$gfs2meta(&(0x7f0000000140)='gfs2meta\x00', &(0x7f0000000200)='./file0\x00', 0x1000, 0x4, &(0x7f0000000880)=[{&(0x7f0000000240)="77ba0daae1b2e74ecd52c59a85bf6f4b1f0b01ab07ba92bc6e57305406115f2bc3e4dd94f19ed896c4fccd34271e9dc3499af9298dbc709e0e6a513d61391d4b198af5f55d24239ae934e8babb8d1cb67bb17b0158", 0x55, 0x3}, {&(0x7f00000002c0)="ae227f954d229f666a6cd22938585e852071e55aa5728addcd315922bf32282e077bdbc63cd5ec89626ee2f8e7982ca239eaa758231056cdca22ca27428407f6c64c384665cfbd00ee6e0d7609f2c7ba0f28b4af70d0307ef78decfe42973915cd509de7c19ea0f3f5c3caaab05f9af08e2cc82d2c14b919dd045e3d36ce1c5d0ff23aed0a4a6ef508b5e71df0a25250d47f1e033ed503b6df99c189111b75b59df679cb75240b756cafecfd203568eeb2c1708fe9f11a2cb0f288590ec76cefbde09c90e9d568492aa5f41196397b70c869838c7164f2bad8eff017d021d7d41c9025c20b", 0xe5, 0x3}, {&(0x7f00000003c0)="792eb6eec33e561f18dc4b58b6a6fb3c7e6fd5e612c08490216ae02617f9811945929cffbf59727393a9a69d57b00a5cd08da3888884b8361d6a4003a54480c1086a5fc876582ff049ede86e2f58d80c7b6cf618e1ba36d4710887bc34ef2b7abbc686df2185f99998060bf492b84e3a02077e2aaf014e1186fde602d2b639d467f48fc2e18cf1553e07ac39040953566ab1d21aac627b166825375377bc3332b62160ea8bf7fc3196b30965dce6181bf7a1c60d0270f24ba60e633c8c88bbdefb5928dc8183c2ce0616de6c3185a4aa7eb2ec6ab7d8394a9536bf7e4f33f76294b0b4a390aca576177671191fe91530e9bd0db79cee", 0xf6, 0x100000000}, {&(0x7f00000004c0)="a90f49b744c1ad7c27bc0a3b1965ca2bce6602b5f5a8b294ced925862d0a9df5c88e43095ba5810ba49c2216e7e1a9b5f07075e6a3101e853557713e983b2f46cf599dc2cba6254802d01794cdc015e28e2b5aa8c10293a4487b3fe2469252f2c2406327b2a5fe71b185ec0adfdc824a237f94", 0x73, 0x7}], 0x21008, &(0x7f0000000900)={[{'.log\x00'}, {'-%('}, {'.log\x00'}], [{@appraise_type='appraise_type=imasig'}, {@fowner_eq={'fowner', 0x3d, 0xee01}}, {@hash='hash'}, {@subj_type={'subj_type', 0x3d, '-&'}}, {@hash='hash'}]}) ioctl$BTRFS_IOC_SUBVOL_SETFLAGS(r3, 0x4008941a, &(0x7f0000000980)=0xfe33b054cbbc4d79) 11:24:49 executing program 0: r0 = perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x5c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write$binfmt_elf64(r0, &(0x7f0000000540)=ANY=[@ANYBLOB], 0x2c4) r1 = inotify_init() openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) epoll_ctl$EPOLL_CTL_DEL(0xffffffffffffffff, 0x2, 0xffffffffffffffff) inotify_add_watch(r1, &(0x7f0000000000)='.\x00', 0x400017e) r2 = openat$incfs(0xffffffffffffffff, &(0x7f0000000080)='.log\x00', 0x20200, 0x40) fcntl$getownex(r2, 0x10, &(0x7f00000000c0)) r3 = open(&(0x7f0000000040)='./file0\x00', 0x200c2, 0x0) write$binfmt_elf64(r3, &(0x7f0000000080)=ANY=[], 0x8) sendfile(r3, r3, &(0x7f00000001c0), 0xa198) dup(0xffffffffffffffff) r4 = syz_mount_image$gfs2meta(0x0, &(0x7f0000000200)='./file0\x00', 0x1000, 0x4, &(0x7f0000000880)=[{&(0x7f0000000240)="77ba0daae1b2e74ecd52c59a85bf6f4b1f0b01ab07ba92bc6e57305406115f2bc3e4dd94f19ed896c4fccd34271e9dc3499af9298dbc709e0e6a513d61391d4b198af5f55d24239ae934e8babb8d1cb67bb17b0158", 0x55, 0x3}, {&(0x7f00000002c0)="ae227f954d229f666a6cd22938585e852071e55aa5728addcd315922bf32282e077bdbc63cd5ec89626ee2f8e7982ca239eaa758231056cdca22ca27428407f6c64c384665cfbd00ee6e0d7609f2c7ba0f28b4af70d0307ef78decfe42973915cd509de7c19ea0f3f5c3caaab05f9af08e2cc82d2c14b919dd045e3d36ce1c5d0ff23aed0a4a6ef508b5e71df0a25250d47f1e033ed503b6df99c189111b75b59df679cb75240b756cafecfd203568eeb2c1708fe9f11a2cb0f288590ec76cefbde09c90e9d568492aa5f41196397b70c869838c7164f2bad8eff017d021d7d41c9025c20b", 0xe5, 0x3}, {&(0x7f00000003c0)="792eb6eec33e561f18dc4b58b6a6fb3c7e6fd5e612c08490216ae02617f9811945929cffbf59727393a9a69d57b00a5cd08da3888884b8361d6a4003a54480c1086a5fc876582ff049ede86e2f58d80c7b6cf618e1ba36d4710887bc34ef2b7abbc686df2185f99998060bf492b84e3a02077e2aaf014e1186fde602d2b639d467f48fc2e18cf1553e07ac39040953566ab1d21aac627b166825375377bc3332b62160ea8bf7fc3196b30965dce6181bf7a1c60d0270f24ba60e633c8c88bbdefb5928dc8183c2ce0616de6c3185a4aa7eb2ec6ab7d8394a9536bf7e4f33f76294b0b4a390aca576177671191fe91530e9bd0db79cee", 0xf6, 0x100000000}, {&(0x7f00000004c0)="a90f49b744c1ad7c27bc0a3b1965ca2bce6602b5f5a8b294ced925862d0a9df5c88e43095ba5810ba49c2216e7e1a9b5f07075e6a3101e853557713e983b2f46cf599dc2cba6254802d01794cdc015e28e2b5aa8c10293a4487b3fe2469252f2c2406327b2a5fe71b185ec0adfdc824a237f94", 0x73, 0x7}], 0x21008, &(0x7f0000000900)={[{'.log\x00'}, {'-%('}, {'.log\x00'}], [{@obj_user={'obj_user'}}, {@appraise_type='appraise_type=imasig'}, {@fowner_eq={'fowner', 0x3d, 0xee01}}, {@hash='hash'}, {@subj_type={'subj_type', 0x3d, '-&'}}]}) ioctl$BTRFS_IOC_SUBVOL_SETFLAGS(r4, 0x4008941a, &(0x7f0000000980)=0xfe33b054cbbc4d79) [ 555.308664][ T35] audit: type=1804 audit(1612178689.387:2151): pid=27013 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.3" name="/root/syzkaller-testdir548988167/syzkaller.gb8agU/396/file1" dev="sda1" ino=15837 res=1 errno=0 [ 555.351638][T27034] loop5: detected capacity change from 264192 to 0 [ 555.434766][ T35] audit: type=1804 audit(1612178689.507:2152): pid=27020 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.1" name="/root/syzkaller-testdir551554057/syzkaller.l2Zg4z/394/file1" dev="sda1" ino=15810 res=1 errno=0 [ 555.521877][ T35] audit: type=1804 audit(1612178689.577:2153): pid=27015 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.3" name="/root/syzkaller-testdir548988167/syzkaller.gb8agU/396/file1" dev="sda1" ino=15837 res=1 errno=0 [ 555.521956][T27039] loop0: detected capacity change from 264192 to 0 [ 555.566630][ T35] audit: type=1804 audit(1612178689.647:2154): pid=27027 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.2" name="/root/syzkaller-testdir245532710/syzkaller.d2c0aK/409/file1" dev="sda1" ino=15887 res=1 errno=0 [ 555.627916][ T35] audit: type=1804 audit(1612178689.707:2155): pid=27021 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.4" name="/root/syzkaller-testdir068764309/syzkaller.I2gCPs/441/file1" dev="sda1" ino=15857 res=1 errno=0 11:24:49 executing program 3: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x7f, 0x80000000008001}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x9}, 0x0) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000080)) r1 = open(&(0x7f0000000240)='./file1\x00', 0x141142, 0x0) write$UHID_INPUT(r1, &(0x7f0000001440)={0x8, {'\x00J\x00'}}, 0xfffffc41) open(&(0x7f00000001c0)='./file1\x00', 0x0, 0x0) setxattr$trusted_overlay_nlink(&(0x7f0000000000)='./file1\x00', &(0x7f00000000c0)='trusted.overlay.nlink\x00', 0x0, 0x0, 0x0) [ 555.886217][ T35] audit: type=1804 audit(1612178689.787:2156): pid=27020 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.1" name="/root/syzkaller-testdir551554057/syzkaller.l2Zg4z/394/file1" dev="sda1" ino=15810 res=1 errno=0 11:24:50 executing program 1: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x7f, 0x80000000008001}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x9}, 0x0) r1 = open(&(0x7f0000000240)='./file1\x00', 0x141142, 0x0) write$UHID_INPUT(r1, &(0x7f0000001440), 0xfffffc41) open(&(0x7f00000001c0)='./file1\x00', 0x0, 0xff000000) setxattr$trusted_overlay_nlink(&(0x7f0000000000)='./file1\x00', &(0x7f00000000c0)='trusted.overlay.nlink\x00', 0x0, 0x0, 0x0) 11:24:50 executing program 2: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x7f, 0x80000000008001}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x9}, 0x0) r1 = open(&(0x7f0000000240)='./file1\x00', 0x141142, 0x0) write$UHID_INPUT(r1, &(0x7f0000001440)={0x8, {'\x00N\x00'}}, 0xfffffc41) open(&(0x7f00000001c0)='./file1\x00', 0x0, 0x0) setxattr$trusted_overlay_nlink(&(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x0, 0x0) 11:24:50 executing program 4: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x7f, 0x80000000008001}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x9}, 0x0) r1 = open(&(0x7f0000000240)='./file1\x00', 0x141142, 0x0) write$UHID_INPUT(r1, &(0x7f0000001440)={0x8, {'\x00M\x00'}}, 0xfffffc41) open(&(0x7f00000001c0)='./file1\x00', 0x0, 0x0) setxattr$trusted_overlay_nlink(&(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x0, 0x0) 11:24:50 executing program 5: write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000540)=ANY=[@ANYBLOB="7f454c4601061f000400000000000000030038000800000032000000000000004000000000000000560200000000000007000000008038000100090002000100010000000100000006000000000000000400000000000000060000000000000001040000000000000200000000000000010000000000000051e574640400000001000000000000000400000000000000050000000000000005000000000000000400000000000000ff24444700000000908bc001727fbcd44f4d3bf922995edf2fd379eb00"/489], 0x2c4) r0 = inotify_init() r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) epoll_ctl$EPOLL_CTL_DEL(0xffffffffffffffff, 0x2, r1) inotify_add_watch(r0, &(0x7f0000000000)='.\x00', 0x400017e) openat$incfs(0xffffffffffffffff, &(0x7f0000000080)='.log\x00', 0x0, 0x0) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f00000000c0)) r2 = open(&(0x7f0000000040)='./file0\x00', 0x200c2, 0x0) write$binfmt_elf64(r2, &(0x7f0000000080)=ANY=[], 0x8) sendfile(r2, r2, &(0x7f00000001c0), 0xa198) dup(0xffffffffffffffff) r3 = syz_mount_image$gfs2meta(&(0x7f0000000140)='gfs2meta\x00', &(0x7f0000000200)='./file0\x00', 0x1000, 0x4, &(0x7f0000000880)=[{&(0x7f0000000240)="77ba0daae1b2e74ecd52c59a85bf6f4b1f0b01ab07ba92bc6e57305406115f2bc3e4dd94f19ed896c4fccd34271e9dc3499af9298dbc709e0e6a513d61391d4b198af5f55d24239ae934e8babb8d1cb67bb17b0158", 0x55, 0x3}, {&(0x7f00000002c0)="ae227f954d229f666a6cd22938585e852071e55aa5728addcd315922bf32282e077bdbc63cd5ec89626ee2f8e7982ca239eaa758231056cdca22ca27428407f6c64c384665cfbd00ee6e0d7609f2c7ba0f28b4af70d0307ef78decfe42973915cd509de7c19ea0f3f5c3caaab05f9af08e2cc82d2c14b919dd045e3d36ce1c5d0ff23aed0a4a6ef508b5e71df0a25250d47f1e033ed503b6df99c189111b75b59df679cb75240b756cafecfd203568eeb2c1708fe9f11a2cb0f288590ec76cefbde09c90e9d568492aa5f41196397b70c869838c7164f2bad8eff017d021d7d41c9025c20b", 0xe5, 0x3}, {&(0x7f00000003c0)="792eb6eec33e561f18dc4b58b6a6fb3c7e6fd5e612c08490216ae02617f9811945929cffbf59727393a9a69d57b00a5cd08da3888884b8361d6a4003a54480c1086a5fc876582ff049ede86e2f58d80c7b6cf618e1ba36d4710887bc34ef2b7abbc686df2185f99998060bf492b84e3a02077e2aaf014e1186fde602d2b639d467f48fc2e18cf1553e07ac39040953566ab1d21aac627b166825375377bc3332b62160ea8bf7fc3196b30965dce6181bf7a1c60d0270f24ba60e633c8c88bbdefb5928dc8183c2ce0616de6c3185a4aa7eb2ec6ab7d8394a9536bf7e4f33f76294b0b4a390aca576177671191fe91530e9bd0db79cee", 0xf6, 0x100000000}, {&(0x7f00000004c0)="a90f49b744c1ad7c27bc0a3b1965ca2bce6602b5f5a8b294ced925862d0a9df5c88e43095ba5810ba49c2216e7e1a9b5f07075e6a3101e853557713e983b2f46cf599dc2cba6254802d01794cdc015e28e2b5aa8c10293a4487b3fe2469252f2c2406327b2a5fe71b185ec0adfdc824a237f94", 0x73, 0x7}], 0x21008, &(0x7f0000000900)={[{'.log\x00'}, {'-%('}, {'.log\x00'}], [{@appraise_type='appraise_type=imasig'}, {@fowner_eq={'fowner', 0x3d, 0xee01}}, {@hash='hash'}, {@subj_type={'subj_type', 0x3d, '-&'}}, {@hash='hash'}]}) ioctl$BTRFS_IOC_SUBVOL_SETFLAGS(r3, 0x4008941a, &(0x7f0000000980)=0xfe33b054cbbc4d79) 11:24:50 executing program 0: r0 = perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x5c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write$binfmt_elf64(r0, &(0x7f0000000540)=ANY=[@ANYBLOB], 0x2c4) r1 = inotify_init() openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) epoll_ctl$EPOLL_CTL_DEL(0xffffffffffffffff, 0x2, 0xffffffffffffffff) inotify_add_watch(r1, &(0x7f0000000000)='.\x00', 0x400017e) r2 = openat$incfs(0xffffffffffffffff, &(0x7f0000000080)='.log\x00', 0x20200, 0x40) fcntl$getownex(r2, 0x10, &(0x7f00000000c0)) r3 = open(&(0x7f0000000040)='./file0\x00', 0x200c2, 0x0) write$binfmt_elf64(r3, &(0x7f0000000080)=ANY=[], 0x8) sendfile(r3, r3, &(0x7f00000001c0), 0xa198) dup(0xffffffffffffffff) r4 = syz_mount_image$gfs2meta(&(0x7f0000000140)='gfs2meta\x00', 0x0, 0x1000, 0x4, &(0x7f0000000880)=[{&(0x7f0000000240)="77ba0daae1b2e74ecd52c59a85bf6f4b1f0b01ab07ba92bc6e57305406115f2bc3e4dd94f19ed896c4fccd34271e9dc3499af9298dbc709e0e6a513d61391d4b198af5f55d24239ae934e8babb8d1cb67bb17b0158", 0x55, 0x3}, {&(0x7f00000002c0)="ae227f954d229f666a6cd22938585e852071e55aa5728addcd315922bf32282e077bdbc63cd5ec89626ee2f8e7982ca239eaa758231056cdca22ca27428407f6c64c384665cfbd00ee6e0d7609f2c7ba0f28b4af70d0307ef78decfe42973915cd509de7c19ea0f3f5c3caaab05f9af08e2cc82d2c14b919dd045e3d36ce1c5d0ff23aed0a4a6ef508b5e71df0a25250d47f1e033ed503b6df99c189111b75b59df679cb75240b756cafecfd203568eeb2c1708fe9f11a2cb0f288590ec76cefbde09c90e9d568492aa5f41196397b70c869838c7164f2bad8eff017d021d7d41c9025c20b", 0xe5, 0x3}, {&(0x7f00000003c0)="792eb6eec33e561f18dc4b58b6a6fb3c7e6fd5e612c08490216ae02617f9811945929cffbf59727393a9a69d57b00a5cd08da3888884b8361d6a4003a54480c1086a5fc876582ff049ede86e2f58d80c7b6cf618e1ba36d4710887bc34ef2b7abbc686df2185f99998060bf492b84e3a02077e2aaf014e1186fde602d2b639d467f48fc2e18cf1553e07ac39040953566ab1d21aac627b166825375377bc3332b62160ea8bf7fc3196b30965dce6181bf7a1c60d0270f24ba60e633c8c88bbdefb5928dc8183c2ce0616de6c3185a4aa7eb2ec6ab7d8394a9536bf7e4f33f76294b0b4a390aca576177671191fe91530e9bd0db79cee", 0xf6, 0x100000000}, {&(0x7f00000004c0)="a90f49b744c1ad7c27bc0a3b1965ca2bce6602b5f5a8b294ced925862d0a9df5c88e43095ba5810ba49c2216e7e1a9b5f07075e6a3101e853557713e983b2f46cf599dc2cba6254802d01794cdc015e28e2b5aa8c10293a4487b3fe2469252f2c2406327b2a5fe71b185ec0adfdc824a237f94", 0x73, 0x7}], 0x21008, &(0x7f0000000900)={[{'.log\x00'}, {'-%('}, {'.log\x00'}], [{@obj_user={'obj_user'}}, {@appraise_type='appraise_type=imasig'}, {@fowner_eq={'fowner', 0x3d, 0xee01}}, {@hash='hash'}, {@subj_type={'subj_type', 0x3d, '-&'}}]}) ioctl$BTRFS_IOC_SUBVOL_SETFLAGS(r4, 0x4008941a, &(0x7f0000000980)=0xfe33b054cbbc4d79) [ 556.324733][T27059] loop5: detected capacity change from 264192 to 0 [ 556.457771][T27074] loop0: detected capacity change from 264192 to 0 11:24:50 executing program 3: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x7f, 0x80000000008001}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x9}, 0x0) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000080)) r1 = open(&(0x7f0000000240)='./file1\x00', 0x141142, 0x0) write$UHID_INPUT(r1, &(0x7f0000001440)={0x8, {'\x00K\x00'}}, 0xfffffc41) open(&(0x7f00000001c0)='./file1\x00', 0x0, 0x0) setxattr$trusted_overlay_nlink(&(0x7f0000000000)='./file1\x00', &(0x7f00000000c0)='trusted.overlay.nlink\x00', 0x0, 0x0, 0x0) 11:24:51 executing program 2: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x7f, 0x80000000008001}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x9}, 0x0) r1 = open(&(0x7f0000000240)='./file1\x00', 0x141142, 0x0) write$UHID_INPUT(r1, &(0x7f0000001440)={0x8, {'\x00O\x00'}}, 0xfffffc41) open(&(0x7f00000001c0)='./file1\x00', 0x0, 0x0) setxattr$trusted_overlay_nlink(&(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x0, 0x0) 11:24:51 executing program 5: write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000540)=ANY=[@ANYBLOB="7f454c4601061f000400000000000000030038000800000032000000000000004000000000000000560200000000000007000000008038000100090002000100010000000100000006000000000000000400000000000000060000000000000001040000000000000200000000000000010000000000000051e574640400000001000000000000000400000000000000050000000000000005000000000000000400000000000000ff24444700000000908bc001727fbcd44f4d3bf922995edf2fd379eb00"/489], 0x2c4) r0 = inotify_init() r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) epoll_ctl$EPOLL_CTL_DEL(0xffffffffffffffff, 0x2, r1) inotify_add_watch(r0, &(0x7f0000000000)='.\x00', 0x400017e) r2 = openat$incfs(0xffffffffffffffff, &(0x7f0000000080)='.log\x00', 0x0, 0x0) fcntl$getownex(r2, 0x10, 0x0) r3 = open(&(0x7f0000000040)='./file0\x00', 0x200c2, 0x0) write$binfmt_elf64(r3, &(0x7f0000000080)=ANY=[], 0x8) sendfile(r3, r3, &(0x7f00000001c0), 0xa198) dup(0xffffffffffffffff) r4 = syz_mount_image$gfs2meta(&(0x7f0000000140)='gfs2meta\x00', &(0x7f0000000200)='./file0\x00', 0x1000, 0x4, &(0x7f0000000880)=[{&(0x7f0000000240)="77ba0daae1b2e74ecd52c59a85bf6f4b1f0b01ab07ba92bc6e57305406115f2bc3e4dd94f19ed896c4fccd34271e9dc3499af9298dbc709e0e6a513d61391d4b198af5f55d24239ae934e8babb8d1cb67bb17b0158", 0x55, 0x3}, {&(0x7f00000002c0)="ae227f954d229f666a6cd22938585e852071e55aa5728addcd315922bf32282e077bdbc63cd5ec89626ee2f8e7982ca239eaa758231056cdca22ca27428407f6c64c384665cfbd00ee6e0d7609f2c7ba0f28b4af70d0307ef78decfe42973915cd509de7c19ea0f3f5c3caaab05f9af08e2cc82d2c14b919dd045e3d36ce1c5d0ff23aed0a4a6ef508b5e71df0a25250d47f1e033ed503b6df99c189111b75b59df679cb75240b756cafecfd203568eeb2c1708fe9f11a2cb0f288590ec76cefbde09c90e9d568492aa5f41196397b70c869838c7164f2bad8eff017d021d7d41c9025c20b", 0xe5, 0x3}, {&(0x7f00000003c0)="792eb6eec33e561f18dc4b58b6a6fb3c7e6fd5e612c08490216ae02617f9811945929cffbf59727393a9a69d57b00a5cd08da3888884b8361d6a4003a54480c1086a5fc876582ff049ede86e2f58d80c7b6cf618e1ba36d4710887bc34ef2b7abbc686df2185f99998060bf492b84e3a02077e2aaf014e1186fde602d2b639d467f48fc2e18cf1553e07ac39040953566ab1d21aac627b166825375377bc3332b62160ea8bf7fc3196b30965dce6181bf7a1c60d0270f24ba60e633c8c88bbdefb5928dc8183c2ce0616de6c3185a4aa7eb2ec6ab7d8394a9536bf7e4f33f76294b0b4a390aca576177671191fe91530e9bd0db79cee", 0xf6, 0x100000000}, {&(0x7f00000004c0)="a90f49b744c1ad7c27bc0a3b1965ca2bce6602b5f5a8b294ced925862d0a9df5c88e43095ba5810ba49c2216e7e1a9b5f07075e6a3101e853557713e983b2f46cf599dc2cba6254802d01794cdc015e28e2b5aa8c10293a4487b3fe2469252f2c2406327b2a5fe71b185ec0adfdc824a237f94", 0x73, 0x7}], 0x21008, &(0x7f0000000900)={[{'.log\x00'}, {'-%('}, {'.log\x00'}], [{@appraise_type='appraise_type=imasig'}, {@fowner_eq={'fowner', 0x3d, 0xee01}}, {@hash='hash'}, {@subj_type={'subj_type', 0x3d, '-&'}}, {@hash='hash'}]}) ioctl$BTRFS_IOC_SUBVOL_SETFLAGS(r4, 0x4008941a, &(0x7f0000000980)=0xfe33b054cbbc4d79) 11:24:51 executing program 0: r0 = perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x5c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write$binfmt_elf64(r0, &(0x7f0000000540)=ANY=[@ANYBLOB], 0x2c4) r1 = inotify_init() openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) epoll_ctl$EPOLL_CTL_DEL(0xffffffffffffffff, 0x2, 0xffffffffffffffff) inotify_add_watch(r1, &(0x7f0000000000)='.\x00', 0x400017e) r2 = openat$incfs(0xffffffffffffffff, &(0x7f0000000080)='.log\x00', 0x20200, 0x40) fcntl$getownex(r2, 0x10, &(0x7f00000000c0)) r3 = open(&(0x7f0000000040)='./file0\x00', 0x200c2, 0x0) write$binfmt_elf64(r3, &(0x7f0000000080)=ANY=[], 0x8) sendfile(r3, r3, &(0x7f00000001c0), 0xa198) dup(0xffffffffffffffff) r4 = syz_mount_image$gfs2meta(&(0x7f0000000140)='gfs2meta\x00', 0x0, 0x1000, 0x4, &(0x7f0000000880)=[{&(0x7f0000000240)="77ba0daae1b2e74ecd52c59a85bf6f4b1f0b01ab07ba92bc6e57305406115f2bc3e4dd94f19ed896c4fccd34271e9dc3499af9298dbc709e0e6a513d61391d4b198af5f55d24239ae934e8babb8d1cb67bb17b0158", 0x55, 0x3}, {&(0x7f00000002c0)="ae227f954d229f666a6cd22938585e852071e55aa5728addcd315922bf32282e077bdbc63cd5ec89626ee2f8e7982ca239eaa758231056cdca22ca27428407f6c64c384665cfbd00ee6e0d7609f2c7ba0f28b4af70d0307ef78decfe42973915cd509de7c19ea0f3f5c3caaab05f9af08e2cc82d2c14b919dd045e3d36ce1c5d0ff23aed0a4a6ef508b5e71df0a25250d47f1e033ed503b6df99c189111b75b59df679cb75240b756cafecfd203568eeb2c1708fe9f11a2cb0f288590ec76cefbde09c90e9d568492aa5f41196397b70c869838c7164f2bad8eff017d021d7d41c9025c20b", 0xe5, 0x3}, {&(0x7f00000003c0)="792eb6eec33e561f18dc4b58b6a6fb3c7e6fd5e612c08490216ae02617f9811945929cffbf59727393a9a69d57b00a5cd08da3888884b8361d6a4003a54480c1086a5fc876582ff049ede86e2f58d80c7b6cf618e1ba36d4710887bc34ef2b7abbc686df2185f99998060bf492b84e3a02077e2aaf014e1186fde602d2b639d467f48fc2e18cf1553e07ac39040953566ab1d21aac627b166825375377bc3332b62160ea8bf7fc3196b30965dce6181bf7a1c60d0270f24ba60e633c8c88bbdefb5928dc8183c2ce0616de6c3185a4aa7eb2ec6ab7d8394a9536bf7e4f33f76294b0b4a390aca576177671191fe91530e9bd0db79cee", 0xf6, 0x100000000}, {&(0x7f00000004c0)="a90f49b744c1ad7c27bc0a3b1965ca2bce6602b5f5a8b294ced925862d0a9df5c88e43095ba5810ba49c2216e7e1a9b5f07075e6a3101e853557713e983b2f46cf599dc2cba6254802d01794cdc015e28e2b5aa8c10293a4487b3fe2469252f2c2406327b2a5fe71b185ec0adfdc824a237f94", 0x73, 0x7}], 0x21008, &(0x7f0000000900)={[{'.log\x00'}, {'-%('}, {'.log\x00'}], [{@obj_user={'obj_user'}}, {@appraise_type='appraise_type=imasig'}, {@fowner_eq={'fowner', 0x3d, 0xee01}}, {@hash='hash'}, {@subj_type={'subj_type', 0x3d, '-&'}}]}) ioctl$BTRFS_IOC_SUBVOL_SETFLAGS(r4, 0x4008941a, &(0x7f0000000980)=0xfe33b054cbbc4d79) [ 557.233220][T27098] loop5: detected capacity change from 264192 to 0 [ 557.393134][T27106] loop0: detected capacity change from 264192 to 0 11:24:51 executing program 4: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x7f, 0x80000000008001}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x9}, 0x0) r1 = open(&(0x7f0000000240)='./file1\x00', 0x141142, 0x0) write$UHID_INPUT(r1, &(0x7f0000001440)={0x8, {'\x00N\x00'}}, 0xfffffc41) open(&(0x7f00000001c0)='./file1\x00', 0x0, 0x0) setxattr$trusted_overlay_nlink(&(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x0, 0x0) 11:24:51 executing program 1: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x7f, 0x80000000008001}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x9}, 0x0) r1 = open(&(0x7f0000000240)='./file1\x00', 0x141142, 0x0) write$UHID_INPUT(r1, &(0x7f0000001440), 0xfffffc41) open(&(0x7f00000001c0)='./file1\x00', 0x0, 0xffffff7f) setxattr$trusted_overlay_nlink(&(0x7f0000000000)='./file1\x00', &(0x7f00000000c0)='trusted.overlay.nlink\x00', 0x0, 0x0, 0x0) 11:24:52 executing program 3: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x7f, 0x80000000008001}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x9}, 0x0) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000080)) r1 = open(&(0x7f0000000240)='./file1\x00', 0x141142, 0x0) write$UHID_INPUT(r1, &(0x7f0000001440)={0x8, {'\x00L\x00'}}, 0xfffffc41) open(&(0x7f00000001c0)='./file1\x00', 0x0, 0x0) setxattr$trusted_overlay_nlink(&(0x7f0000000000)='./file1\x00', &(0x7f00000000c0)='trusted.overlay.nlink\x00', 0x0, 0x0, 0x0) 11:24:52 executing program 5: write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000540)=ANY=[@ANYBLOB="7f454c4601061f000400000000000000030038000800000032000000000000004000000000000000560200000000000007000000008038000100090002000100010000000100000006000000000000000400000000000000060000000000000001040000000000000200000000000000010000000000000051e574640400000001000000000000000400000000000000050000000000000005000000000000000400000000000000ff24444700000000908bc001727fbcd44f4d3bf922995edf2fd379eb00"/489], 0x2c4) r0 = inotify_init() r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) epoll_ctl$EPOLL_CTL_DEL(0xffffffffffffffff, 0x2, r1) inotify_add_watch(r0, &(0x7f0000000000)='.\x00', 0x400017e) r2 = openat$incfs(0xffffffffffffffff, &(0x7f0000000080)='.log\x00', 0x0, 0x0) fcntl$getownex(r2, 0x10, 0x0) r3 = open(&(0x7f0000000040)='./file0\x00', 0x200c2, 0x0) write$binfmt_elf64(r3, &(0x7f0000000080)=ANY=[], 0x8) sendfile(r3, r3, &(0x7f00000001c0), 0xa198) dup(0xffffffffffffffff) r4 = syz_mount_image$gfs2meta(&(0x7f0000000140)='gfs2meta\x00', &(0x7f0000000200)='./file0\x00', 0x1000, 0x4, &(0x7f0000000880)=[{&(0x7f0000000240)="77ba0daae1b2e74ecd52c59a85bf6f4b1f0b01ab07ba92bc6e57305406115f2bc3e4dd94f19ed896c4fccd34271e9dc3499af9298dbc709e0e6a513d61391d4b198af5f55d24239ae934e8babb8d1cb67bb17b0158", 0x55, 0x3}, {&(0x7f00000002c0)="ae227f954d229f666a6cd22938585e852071e55aa5728addcd315922bf32282e077bdbc63cd5ec89626ee2f8e7982ca239eaa758231056cdca22ca27428407f6c64c384665cfbd00ee6e0d7609f2c7ba0f28b4af70d0307ef78decfe42973915cd509de7c19ea0f3f5c3caaab05f9af08e2cc82d2c14b919dd045e3d36ce1c5d0ff23aed0a4a6ef508b5e71df0a25250d47f1e033ed503b6df99c189111b75b59df679cb75240b756cafecfd203568eeb2c1708fe9f11a2cb0f288590ec76cefbde09c90e9d568492aa5f41196397b70c869838c7164f2bad8eff017d021d7d41c9025c20b", 0xe5, 0x3}, {&(0x7f00000003c0)="792eb6eec33e561f18dc4b58b6a6fb3c7e6fd5e612c08490216ae02617f9811945929cffbf59727393a9a69d57b00a5cd08da3888884b8361d6a4003a54480c1086a5fc876582ff049ede86e2f58d80c7b6cf618e1ba36d4710887bc34ef2b7abbc686df2185f99998060bf492b84e3a02077e2aaf014e1186fde602d2b639d467f48fc2e18cf1553e07ac39040953566ab1d21aac627b166825375377bc3332b62160ea8bf7fc3196b30965dce6181bf7a1c60d0270f24ba60e633c8c88bbdefb5928dc8183c2ce0616de6c3185a4aa7eb2ec6ab7d8394a9536bf7e4f33f76294b0b4a390aca576177671191fe91530e9bd0db79cee", 0xf6, 0x100000000}, {&(0x7f00000004c0)="a90f49b744c1ad7c27bc0a3b1965ca2bce6602b5f5a8b294ced925862d0a9df5c88e43095ba5810ba49c2216e7e1a9b5f07075e6a3101e853557713e983b2f46cf599dc2cba6254802d01794cdc015e28e2b5aa8c10293a4487b3fe2469252f2c2406327b2a5fe71b185ec0adfdc824a237f94", 0x73, 0x7}], 0x21008, &(0x7f0000000900)={[{'.log\x00'}, {'-%('}, {'.log\x00'}], [{@appraise_type='appraise_type=imasig'}, {@fowner_eq={'fowner', 0x3d, 0xee01}}, {@hash='hash'}, {@subj_type={'subj_type', 0x3d, '-&'}}, {@hash='hash'}]}) ioctl$BTRFS_IOC_SUBVOL_SETFLAGS(r4, 0x4008941a, &(0x7f0000000980)=0xfe33b054cbbc4d79) 11:24:52 executing program 0: r0 = perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x5c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write$binfmt_elf64(r0, &(0x7f0000000540)=ANY=[@ANYBLOB], 0x2c4) r1 = inotify_init() openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) epoll_ctl$EPOLL_CTL_DEL(0xffffffffffffffff, 0x2, 0xffffffffffffffff) inotify_add_watch(r1, &(0x7f0000000000)='.\x00', 0x400017e) r2 = openat$incfs(0xffffffffffffffff, &(0x7f0000000080)='.log\x00', 0x20200, 0x40) fcntl$getownex(r2, 0x10, &(0x7f00000000c0)) r3 = open(&(0x7f0000000040)='./file0\x00', 0x200c2, 0x0) write$binfmt_elf64(r3, &(0x7f0000000080)=ANY=[], 0x8) sendfile(r3, r3, &(0x7f00000001c0), 0xa198) dup(0xffffffffffffffff) r4 = syz_mount_image$gfs2meta(&(0x7f0000000140)='gfs2meta\x00', 0x0, 0x1000, 0x4, &(0x7f0000000880)=[{&(0x7f0000000240)="77ba0daae1b2e74ecd52c59a85bf6f4b1f0b01ab07ba92bc6e57305406115f2bc3e4dd94f19ed896c4fccd34271e9dc3499af9298dbc709e0e6a513d61391d4b198af5f55d24239ae934e8babb8d1cb67bb17b0158", 0x55, 0x3}, {&(0x7f00000002c0)="ae227f954d229f666a6cd22938585e852071e55aa5728addcd315922bf32282e077bdbc63cd5ec89626ee2f8e7982ca239eaa758231056cdca22ca27428407f6c64c384665cfbd00ee6e0d7609f2c7ba0f28b4af70d0307ef78decfe42973915cd509de7c19ea0f3f5c3caaab05f9af08e2cc82d2c14b919dd045e3d36ce1c5d0ff23aed0a4a6ef508b5e71df0a25250d47f1e033ed503b6df99c189111b75b59df679cb75240b756cafecfd203568eeb2c1708fe9f11a2cb0f288590ec76cefbde09c90e9d568492aa5f41196397b70c869838c7164f2bad8eff017d021d7d41c9025c20b", 0xe5, 0x3}, {&(0x7f00000003c0)="792eb6eec33e561f18dc4b58b6a6fb3c7e6fd5e612c08490216ae02617f9811945929cffbf59727393a9a69d57b00a5cd08da3888884b8361d6a4003a54480c1086a5fc876582ff049ede86e2f58d80c7b6cf618e1ba36d4710887bc34ef2b7abbc686df2185f99998060bf492b84e3a02077e2aaf014e1186fde602d2b639d467f48fc2e18cf1553e07ac39040953566ab1d21aac627b166825375377bc3332b62160ea8bf7fc3196b30965dce6181bf7a1c60d0270f24ba60e633c8c88bbdefb5928dc8183c2ce0616de6c3185a4aa7eb2ec6ab7d8394a9536bf7e4f33f76294b0b4a390aca576177671191fe91530e9bd0db79cee", 0xf6, 0x100000000}, {&(0x7f00000004c0)="a90f49b744c1ad7c27bc0a3b1965ca2bce6602b5f5a8b294ced925862d0a9df5c88e43095ba5810ba49c2216e7e1a9b5f07075e6a3101e853557713e983b2f46cf599dc2cba6254802d01794cdc015e28e2b5aa8c10293a4487b3fe2469252f2c2406327b2a5fe71b185ec0adfdc824a237f94", 0x73, 0x7}], 0x21008, &(0x7f0000000900)={[{'.log\x00'}, {'-%('}, {'.log\x00'}], [{@obj_user={'obj_user'}}, {@appraise_type='appraise_type=imasig'}, {@fowner_eq={'fowner', 0x3d, 0xee01}}, {@hash='hash'}, {@subj_type={'subj_type', 0x3d, '-&'}}]}) ioctl$BTRFS_IOC_SUBVOL_SETFLAGS(r4, 0x4008941a, &(0x7f0000000980)=0xfe33b054cbbc4d79) 11:24:52 executing program 2: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x7f, 0x80000000008001}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x9}, 0x0) r1 = open(&(0x7f0000000240)='./file1\x00', 0x141142, 0x0) write$UHID_INPUT(r1, &(0x7f0000001440)={0x8, {'\x00P\x00'}}, 0xfffffc41) open(&(0x7f00000001c0)='./file1\x00', 0x0, 0x0) setxattr$trusted_overlay_nlink(&(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x0, 0x0) [ 558.210161][T27127] loop5: detected capacity change from 264192 to 0 [ 558.360165][T27135] loop0: detected capacity change from 264192 to 0 11:24:52 executing program 0: r0 = perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x5c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write$binfmt_elf64(r0, &(0x7f0000000540)=ANY=[@ANYBLOB], 0x2c4) r1 = inotify_init() openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) epoll_ctl$EPOLL_CTL_DEL(0xffffffffffffffff, 0x2, 0xffffffffffffffff) inotify_add_watch(r1, &(0x7f0000000000)='.\x00', 0x400017e) r2 = openat$incfs(0xffffffffffffffff, &(0x7f0000000080)='.log\x00', 0x20200, 0x40) fcntl$getownex(r2, 0x10, &(0x7f00000000c0)) r3 = open(&(0x7f0000000040)='./file0\x00', 0x200c2, 0x0) write$binfmt_elf64(r3, &(0x7f0000000080)=ANY=[], 0x8) sendfile(r3, r3, &(0x7f00000001c0), 0xa198) dup(0xffffffffffffffff) r4 = syz_mount_image$gfs2meta(&(0x7f0000000140)='gfs2meta\x00', &(0x7f0000000200)='./file0\x00', 0x0, 0x4, &(0x7f0000000880)=[{&(0x7f0000000240)="77ba0daae1b2e74ecd52c59a85bf6f4b1f0b01ab07ba92bc6e57305406115f2bc3e4dd94f19ed896c4fccd34271e9dc3499af9298dbc709e0e6a513d61391d4b198af5f55d24239ae934e8babb8d1cb67bb17b0158", 0x55, 0x3}, {&(0x7f00000002c0)="ae227f954d229f666a6cd22938585e852071e55aa5728addcd315922bf32282e077bdbc63cd5ec89626ee2f8e7982ca239eaa758231056cdca22ca27428407f6c64c384665cfbd00ee6e0d7609f2c7ba0f28b4af70d0307ef78decfe42973915cd509de7c19ea0f3f5c3caaab05f9af08e2cc82d2c14b919dd045e3d36ce1c5d0ff23aed0a4a6ef508b5e71df0a25250d47f1e033ed503b6df99c189111b75b59df679cb75240b756cafecfd203568eeb2c1708fe9f11a2cb0f288590ec76cefbde09c90e9d568492aa5f41196397b70c869838c7164f2bad8eff017d021d7d41c9025c20b", 0xe5, 0x3}, {&(0x7f00000003c0)="792eb6eec33e561f18dc4b58b6a6fb3c7e6fd5e612c08490216ae02617f9811945929cffbf59727393a9a69d57b00a5cd08da3888884b8361d6a4003a54480c1086a5fc876582ff049ede86e2f58d80c7b6cf618e1ba36d4710887bc34ef2b7abbc686df2185f99998060bf492b84e3a02077e2aaf014e1186fde602d2b639d467f48fc2e18cf1553e07ac39040953566ab1d21aac627b166825375377bc3332b62160ea8bf7fc3196b30965dce6181bf7a1c60d0270f24ba60e633c8c88bbdefb5928dc8183c2ce0616de6c3185a4aa7eb2ec6ab7d8394a9536bf7e4f33f76294b0b4a390aca576177671191fe91530e9bd0db79cee", 0xf6, 0x100000000}, {&(0x7f00000004c0)="a90f49b744c1ad7c27bc0a3b1965ca2bce6602b5f5a8b294ced925862d0a9df5c88e43095ba5810ba49c2216e7e1a9b5f07075e6a3101e853557713e983b2f46cf599dc2cba6254802d01794cdc015e28e2b5aa8c10293a4487b3fe2469252f2c2406327b2a5fe71b185ec0adfdc824a237f94", 0x73, 0x7}], 0x21008, &(0x7f0000000900)={[{'.log\x00'}, {'-%('}, {'.log\x00'}], [{@obj_user={'obj_user'}}, {@appraise_type='appraise_type=imasig'}, {@fowner_eq={'fowner', 0x3d, 0xee01}}, {@hash='hash'}, {@subj_type={'subj_type', 0x3d, '-&'}}]}) ioctl$BTRFS_IOC_SUBVOL_SETFLAGS(r4, 0x4008941a, &(0x7f0000000980)=0xfe33b054cbbc4d79) [ 558.723191][T27151] loop0: detected capacity change from 264192 to 0 11:24:52 executing program 4: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x7f, 0x80000000008001}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x9}, 0x0) r1 = open(&(0x7f0000000240)='./file1\x00', 0x141142, 0x0) write$UHID_INPUT(r1, &(0x7f0000001440)={0x8, {'\x00N\x00'}}, 0xfffffc41) open(&(0x7f00000001c0)='./file1\x00', 0x0, 0x0) setxattr$trusted_overlay_nlink(&(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x0, 0x0) 11:24:52 executing program 1: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x7f, 0x80000000008001}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x9}, 0x0) r1 = open(&(0x7f0000000240)='./file1\x00', 0x141142, 0x0) write$UHID_INPUT(r1, &(0x7f0000001440), 0xfffffc41) open(&(0x7f00000001c0)='./file1\x00', 0x0, 0xffffffa1) setxattr$trusted_overlay_nlink(&(0x7f0000000000)='./file1\x00', &(0x7f00000000c0)='trusted.overlay.nlink\x00', 0x0, 0x0, 0x0) 11:24:53 executing program 5: write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000540)=ANY=[@ANYBLOB="7f454c4601061f000400000000000000030038000800000032000000000000004000000000000000560200000000000007000000008038000100090002000100010000000100000006000000000000000400000000000000060000000000000001040000000000000200000000000000010000000000000051e574640400000001000000000000000400000000000000050000000000000005000000000000000400000000000000ff24444700000000908bc001727fbcd44f4d3bf922995edf2fd379eb00"/489], 0x2c4) r0 = inotify_init() r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) epoll_ctl$EPOLL_CTL_DEL(0xffffffffffffffff, 0x2, r1) inotify_add_watch(r0, &(0x7f0000000000)='.\x00', 0x400017e) r2 = openat$incfs(0xffffffffffffffff, &(0x7f0000000080)='.log\x00', 0x0, 0x0) fcntl$getownex(r2, 0x10, 0x0) r3 = open(&(0x7f0000000040)='./file0\x00', 0x200c2, 0x0) write$binfmt_elf64(r3, &(0x7f0000000080)=ANY=[], 0x8) sendfile(r3, r3, &(0x7f00000001c0), 0xa198) dup(0xffffffffffffffff) r4 = syz_mount_image$gfs2meta(&(0x7f0000000140)='gfs2meta\x00', &(0x7f0000000200)='./file0\x00', 0x1000, 0x4, &(0x7f0000000880)=[{&(0x7f0000000240)="77ba0daae1b2e74ecd52c59a85bf6f4b1f0b01ab07ba92bc6e57305406115f2bc3e4dd94f19ed896c4fccd34271e9dc3499af9298dbc709e0e6a513d61391d4b198af5f55d24239ae934e8babb8d1cb67bb17b0158", 0x55, 0x3}, {&(0x7f00000002c0)="ae227f954d229f666a6cd22938585e852071e55aa5728addcd315922bf32282e077bdbc63cd5ec89626ee2f8e7982ca239eaa758231056cdca22ca27428407f6c64c384665cfbd00ee6e0d7609f2c7ba0f28b4af70d0307ef78decfe42973915cd509de7c19ea0f3f5c3caaab05f9af08e2cc82d2c14b919dd045e3d36ce1c5d0ff23aed0a4a6ef508b5e71df0a25250d47f1e033ed503b6df99c189111b75b59df679cb75240b756cafecfd203568eeb2c1708fe9f11a2cb0f288590ec76cefbde09c90e9d568492aa5f41196397b70c869838c7164f2bad8eff017d021d7d41c9025c20b", 0xe5, 0x3}, {&(0x7f00000003c0)="792eb6eec33e561f18dc4b58b6a6fb3c7e6fd5e612c08490216ae02617f9811945929cffbf59727393a9a69d57b00a5cd08da3888884b8361d6a4003a54480c1086a5fc876582ff049ede86e2f58d80c7b6cf618e1ba36d4710887bc34ef2b7abbc686df2185f99998060bf492b84e3a02077e2aaf014e1186fde602d2b639d467f48fc2e18cf1553e07ac39040953566ab1d21aac627b166825375377bc3332b62160ea8bf7fc3196b30965dce6181bf7a1c60d0270f24ba60e633c8c88bbdefb5928dc8183c2ce0616de6c3185a4aa7eb2ec6ab7d8394a9536bf7e4f33f76294b0b4a390aca576177671191fe91530e9bd0db79cee", 0xf6, 0x100000000}, {&(0x7f00000004c0)="a90f49b744c1ad7c27bc0a3b1965ca2bce6602b5f5a8b294ced925862d0a9df5c88e43095ba5810ba49c2216e7e1a9b5f07075e6a3101e853557713e983b2f46cf599dc2cba6254802d01794cdc015e28e2b5aa8c10293a4487b3fe2469252f2c2406327b2a5fe71b185ec0adfdc824a237f94", 0x73, 0x7}], 0x21008, &(0x7f0000000900)={[{'.log\x00'}, {'-%('}, {'.log\x00'}], [{@appraise_type='appraise_type=imasig'}, {@fowner_eq={'fowner', 0x3d, 0xee01}}, {@hash='hash'}, {@subj_type={'subj_type', 0x3d, '-&'}}, {@hash='hash'}]}) ioctl$BTRFS_IOC_SUBVOL_SETFLAGS(r4, 0x4008941a, &(0x7f0000000980)=0xfe33b054cbbc4d79) 11:24:53 executing program 3: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x7f, 0x80000000008001}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x9}, 0x0) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000080)) r1 = open(&(0x7f0000000240)='./file1\x00', 0x141142, 0x0) write$UHID_INPUT(r1, &(0x7f0000001440)={0x8, {'\x00M\x00'}}, 0xfffffc41) open(&(0x7f00000001c0)='./file1\x00', 0x0, 0x0) setxattr$trusted_overlay_nlink(&(0x7f0000000000)='./file1\x00', &(0x7f00000000c0)='trusted.overlay.nlink\x00', 0x0, 0x0, 0x0) [ 559.148281][T27166] loop5: detected capacity change from 264192 to 0 11:24:53 executing program 0: r0 = perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x5c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write$binfmt_elf64(r0, &(0x7f0000000540)=ANY=[@ANYBLOB], 0x2c4) r1 = inotify_init() openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) epoll_ctl$EPOLL_CTL_DEL(0xffffffffffffffff, 0x2, 0xffffffffffffffff) inotify_add_watch(r1, &(0x7f0000000000)='.\x00', 0x400017e) r2 = openat$incfs(0xffffffffffffffff, &(0x7f0000000080)='.log\x00', 0x20200, 0x40) fcntl$getownex(r2, 0x10, &(0x7f00000000c0)) r3 = open(&(0x7f0000000040)='./file0\x00', 0x200c2, 0x0) write$binfmt_elf64(r3, &(0x7f0000000080)=ANY=[], 0x8) sendfile(r3, r3, &(0x7f00000001c0), 0xa198) dup(0xffffffffffffffff) r4 = syz_mount_image$gfs2meta(&(0x7f0000000140)='gfs2meta\x00', &(0x7f0000000200)='./file0\x00', 0x0, 0x4, &(0x7f0000000880)=[{&(0x7f0000000240)="77ba0daae1b2e74ecd52c59a85bf6f4b1f0b01ab07ba92bc6e57305406115f2bc3e4dd94f19ed896c4fccd34271e9dc3499af9298dbc709e0e6a513d61391d4b198af5f55d24239ae934e8babb8d1cb67bb17b0158", 0x55, 0x3}, {&(0x7f00000002c0)="ae227f954d229f666a6cd22938585e852071e55aa5728addcd315922bf32282e077bdbc63cd5ec89626ee2f8e7982ca239eaa758231056cdca22ca27428407f6c64c384665cfbd00ee6e0d7609f2c7ba0f28b4af70d0307ef78decfe42973915cd509de7c19ea0f3f5c3caaab05f9af08e2cc82d2c14b919dd045e3d36ce1c5d0ff23aed0a4a6ef508b5e71df0a25250d47f1e033ed503b6df99c189111b75b59df679cb75240b756cafecfd203568eeb2c1708fe9f11a2cb0f288590ec76cefbde09c90e9d568492aa5f41196397b70c869838c7164f2bad8eff017d021d7d41c9025c20b", 0xe5, 0x3}, {&(0x7f00000003c0)="792eb6eec33e561f18dc4b58b6a6fb3c7e6fd5e612c08490216ae02617f9811945929cffbf59727393a9a69d57b00a5cd08da3888884b8361d6a4003a54480c1086a5fc876582ff049ede86e2f58d80c7b6cf618e1ba36d4710887bc34ef2b7abbc686df2185f99998060bf492b84e3a02077e2aaf014e1186fde602d2b639d467f48fc2e18cf1553e07ac39040953566ab1d21aac627b166825375377bc3332b62160ea8bf7fc3196b30965dce6181bf7a1c60d0270f24ba60e633c8c88bbdefb5928dc8183c2ce0616de6c3185a4aa7eb2ec6ab7d8394a9536bf7e4f33f76294b0b4a390aca576177671191fe91530e9bd0db79cee", 0xf6, 0x100000000}, {&(0x7f00000004c0)="a90f49b744c1ad7c27bc0a3b1965ca2bce6602b5f5a8b294ced925862d0a9df5c88e43095ba5810ba49c2216e7e1a9b5f07075e6a3101e853557713e983b2f46cf599dc2cba6254802d01794cdc015e28e2b5aa8c10293a4487b3fe2469252f2c2406327b2a5fe71b185ec0adfdc824a237f94", 0x73, 0x7}], 0x21008, &(0x7f0000000900)={[{'.log\x00'}, {'-%('}, {'.log\x00'}], [{@obj_user={'obj_user'}}, {@appraise_type='appraise_type=imasig'}, {@fowner_eq={'fowner', 0x3d, 0xee01}}, {@hash='hash'}, {@subj_type={'subj_type', 0x3d, '-&'}}]}) ioctl$BTRFS_IOC_SUBVOL_SETFLAGS(r4, 0x4008941a, &(0x7f0000000980)=0xfe33b054cbbc4d79) 11:24:53 executing program 2: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x7f, 0x80000000008001}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x9}, 0x0) r1 = open(&(0x7f0000000240)='./file1\x00', 0x141142, 0x0) write$UHID_INPUT(r1, &(0x7f0000001440)={0x8, {'\x00Q\x00'}}, 0xfffffc41) open(&(0x7f00000001c0)='./file1\x00', 0x0, 0x0) setxattr$trusted_overlay_nlink(&(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x0, 0x0) [ 559.661709][T27182] loop0: detected capacity change from 264192 to 0 11:24:53 executing program 3: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x7f, 0x80000000008001}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x9}, 0x0) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000080)) r1 = open(&(0x7f0000000240)='./file1\x00', 0x141142, 0x0) write$UHID_INPUT(r1, &(0x7f0000001440)={0x8, {'\x00N\x00'}}, 0xfffffc41) open(&(0x7f00000001c0)='./file1\x00', 0x0, 0x0) setxattr$trusted_overlay_nlink(&(0x7f0000000000)='./file1\x00', &(0x7f00000000c0)='trusted.overlay.nlink\x00', 0x0, 0x0, 0x0) [ 559.849572][ T35] kauditd_printk_skb: 29 callbacks suppressed [ 559.849583][ T35] audit: type=1804 audit(1612178693.878:2186): pid=27165 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.1" name="/root/syzkaller-testdir551554057/syzkaller.l2Zg4z/397/file1" dev="sda1" ino=15900 res=1 errno=0 [ 559.898884][ T35] audit: type=1804 audit(1612178693.878:2187): pid=27177 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.3" name="/root/syzkaller-testdir548988167/syzkaller.gb8agU/400/file1" dev="sda1" ino=15897 res=1 errno=0 [ 559.933777][ T35] audit: type=1804 audit(1612178693.938:2188): pid=27164 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.4" name="/root/syzkaller-testdir068764309/syzkaller.I2gCPs/444/file1" dev="sda1" ino=15739 res=1 errno=0 11:24:54 executing program 5: write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000540)=ANY=[@ANYBLOB="7f454c4601061f000400000000000000030038000800000032000000000000004000000000000000560200000000000007000000008038000100090002000100010000000100000006000000000000000400000000000000060000000000000001040000000000000200000000000000010000000000000051e574640400000001000000000000000400000000000000050000000000000005000000000000000400000000000000ff24444700000000908bc001727fbcd44f4d3bf922995edf2fd379eb00"/489], 0x2c4) r0 = inotify_init() r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) epoll_ctl$EPOLL_CTL_DEL(0xffffffffffffffff, 0x2, r1) inotify_add_watch(r0, &(0x7f0000000000)='.\x00', 0x400017e) r2 = openat$incfs(0xffffffffffffffff, &(0x7f0000000080)='.log\x00', 0x0, 0x0) fcntl$getownex(r2, 0x10, &(0x7f00000000c0)) r3 = open(0x0, 0x200c2, 0x0) write$binfmt_elf64(r3, &(0x7f0000000080)=ANY=[], 0x8) sendfile(r3, r3, &(0x7f00000001c0), 0xa198) dup(0xffffffffffffffff) r4 = syz_mount_image$gfs2meta(&(0x7f0000000140)='gfs2meta\x00', &(0x7f0000000200)='./file0\x00', 0x1000, 0x4, &(0x7f0000000880)=[{&(0x7f0000000240)="77ba0daae1b2e74ecd52c59a85bf6f4b1f0b01ab07ba92bc6e57305406115f2bc3e4dd94f19ed896c4fccd34271e9dc3499af9298dbc709e0e6a513d61391d4b198af5f55d24239ae934e8babb8d1cb67bb17b0158", 0x55, 0x3}, {&(0x7f00000002c0)="ae227f954d229f666a6cd22938585e852071e55aa5728addcd315922bf32282e077bdbc63cd5ec89626ee2f8e7982ca239eaa758231056cdca22ca27428407f6c64c384665cfbd00ee6e0d7609f2c7ba0f28b4af70d0307ef78decfe42973915cd509de7c19ea0f3f5c3caaab05f9af08e2cc82d2c14b919dd045e3d36ce1c5d0ff23aed0a4a6ef508b5e71df0a25250d47f1e033ed503b6df99c189111b75b59df679cb75240b756cafecfd203568eeb2c1708fe9f11a2cb0f288590ec76cefbde09c90e9d568492aa5f41196397b70c869838c7164f2bad8eff017d021d7d41c9025c20b", 0xe5, 0x3}, {&(0x7f00000003c0)="792eb6eec33e561f18dc4b58b6a6fb3c7e6fd5e612c08490216ae02617f9811945929cffbf59727393a9a69d57b00a5cd08da3888884b8361d6a4003a54480c1086a5fc876582ff049ede86e2f58d80c7b6cf618e1ba36d4710887bc34ef2b7abbc686df2185f99998060bf492b84e3a02077e2aaf014e1186fde602d2b639d467f48fc2e18cf1553e07ac39040953566ab1d21aac627b166825375377bc3332b62160ea8bf7fc3196b30965dce6181bf7a1c60d0270f24ba60e633c8c88bbdefb5928dc8183c2ce0616de6c3185a4aa7eb2ec6ab7d8394a9536bf7e4f33f76294b0b4a390aca576177671191fe91530e9bd0db79cee", 0xf6, 0x100000000}, {&(0x7f00000004c0)="a90f49b744c1ad7c27bc0a3b1965ca2bce6602b5f5a8b294ced925862d0a9df5c88e43095ba5810ba49c2216e7e1a9b5f07075e6a3101e853557713e983b2f46cf599dc2cba6254802d01794cdc015e28e2b5aa8c10293a4487b3fe2469252f2c2406327b2a5fe71b185ec0adfdc824a237f94", 0x73, 0x7}], 0x21008, &(0x7f0000000900)={[{'.log\x00'}, {'-%('}, {'.log\x00'}], [{@appraise_type='appraise_type=imasig'}, {@fowner_eq={'fowner', 0x3d, 0xee01}}, {@hash='hash'}, {@subj_type={'subj_type', 0x3d, '-&'}}, {@hash='hash'}]}) ioctl$BTRFS_IOC_SUBVOL_SETFLAGS(r4, 0x4008941a, &(0x7f0000000980)=0xfe33b054cbbc4d79) [ 560.044016][ T35] audit: type=1804 audit(1612178694.068:2189): pid=27165 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.1" name="/root/syzkaller-testdir551554057/syzkaller.l2Zg4z/397/file1" dev="sda1" ino=15900 res=1 errno=0 [ 560.075442][T27190] loop5: detected capacity change from 264192 to 0 11:24:54 executing program 5: write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000540)=ANY=[@ANYBLOB="7f454c4601061f000400000000000000030038000800000032000000000000004000000000000000560200000000000007000000008038000100090002000100010000000100000006000000000000000400000000000000060000000000000001040000000000000200000000000000010000000000000051e574640400000001000000000000000400000000000000050000000000000005000000000000000400000000000000ff24444700000000908bc001727fbcd44f4d3bf922995edf2fd379eb00"/489], 0x2c4) r0 = inotify_init() r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) epoll_ctl$EPOLL_CTL_DEL(0xffffffffffffffff, 0x2, r1) inotify_add_watch(r0, &(0x7f0000000000)='.\x00', 0x400017e) r2 = openat$incfs(0xffffffffffffffff, &(0x7f0000000080)='.log\x00', 0x0, 0x0) fcntl$getownex(r2, 0x10, &(0x7f00000000c0)) r3 = open(0x0, 0x200c2, 0x0) write$binfmt_elf64(r3, &(0x7f0000000080)=ANY=[], 0x8) sendfile(r3, r3, &(0x7f00000001c0), 0xa198) dup(0xffffffffffffffff) r4 = syz_mount_image$gfs2meta(&(0x7f0000000140)='gfs2meta\x00', &(0x7f0000000200)='./file0\x00', 0x1000, 0x4, &(0x7f0000000880)=[{&(0x7f0000000240)="77ba0daae1b2e74ecd52c59a85bf6f4b1f0b01ab07ba92bc6e57305406115f2bc3e4dd94f19ed896c4fccd34271e9dc3499af9298dbc709e0e6a513d61391d4b198af5f55d24239ae934e8babb8d1cb67bb17b0158", 0x55, 0x3}, {&(0x7f00000002c0)="ae227f954d229f666a6cd22938585e852071e55aa5728addcd315922bf32282e077bdbc63cd5ec89626ee2f8e7982ca239eaa758231056cdca22ca27428407f6c64c384665cfbd00ee6e0d7609f2c7ba0f28b4af70d0307ef78decfe42973915cd509de7c19ea0f3f5c3caaab05f9af08e2cc82d2c14b919dd045e3d36ce1c5d0ff23aed0a4a6ef508b5e71df0a25250d47f1e033ed503b6df99c189111b75b59df679cb75240b756cafecfd203568eeb2c1708fe9f11a2cb0f288590ec76cefbde09c90e9d568492aa5f41196397b70c869838c7164f2bad8eff017d021d7d41c9025c20b", 0xe5, 0x3}, {&(0x7f00000003c0)="792eb6eec33e561f18dc4b58b6a6fb3c7e6fd5e612c08490216ae02617f9811945929cffbf59727393a9a69d57b00a5cd08da3888884b8361d6a4003a54480c1086a5fc876582ff049ede86e2f58d80c7b6cf618e1ba36d4710887bc34ef2b7abbc686df2185f99998060bf492b84e3a02077e2aaf014e1186fde602d2b639d467f48fc2e18cf1553e07ac39040953566ab1d21aac627b166825375377bc3332b62160ea8bf7fc3196b30965dce6181bf7a1c60d0270f24ba60e633c8c88bbdefb5928dc8183c2ce0616de6c3185a4aa7eb2ec6ab7d8394a9536bf7e4f33f76294b0b4a390aca576177671191fe91530e9bd0db79cee", 0xf6, 0x100000000}, {&(0x7f00000004c0)="a90f49b744c1ad7c27bc0a3b1965ca2bce6602b5f5a8b294ced925862d0a9df5c88e43095ba5810ba49c2216e7e1a9b5f07075e6a3101e853557713e983b2f46cf599dc2cba6254802d01794cdc015e28e2b5aa8c10293a4487b3fe2469252f2c2406327b2a5fe71b185ec0adfdc824a237f94", 0x73, 0x7}], 0x21008, &(0x7f0000000900)={[{'.log\x00'}, {'-%('}, {'.log\x00'}], [{@appraise_type='appraise_type=imasig'}, {@fowner_eq={'fowner', 0x3d, 0xee01}}, {@hash='hash'}, {@subj_type={'subj_type', 0x3d, '-&'}}, {@hash='hash'}]}) ioctl$BTRFS_IOC_SUBVOL_SETFLAGS(r4, 0x4008941a, &(0x7f0000000980)=0xfe33b054cbbc4d79) 11:24:54 executing program 1: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x7f, 0x80000000008001}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x9}, 0x0) r1 = open(&(0x7f0000000240)='./file1\x00', 0x141142, 0x0) write$UHID_INPUT(r1, &(0x7f0000001440), 0xfffffc41) open(&(0x7f00000001c0)='./file1\x00', 0x0, 0xffffffea) setxattr$trusted_overlay_nlink(&(0x7f0000000000)='./file1\x00', &(0x7f00000000c0)='trusted.overlay.nlink\x00', 0x0, 0x0, 0x0) 11:24:54 executing program 4: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x7f, 0x80000000008001}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x9}, 0x0) r1 = open(&(0x7f0000000240)='./file1\x00', 0x141142, 0x0) write$UHID_INPUT(r1, &(0x7f0000001440)={0x8, {'\x00N\x00'}}, 0xfffffc41) open(&(0x7f00000001c0)='./file1\x00', 0x0, 0x0) setxattr$trusted_overlay_nlink(&(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x0, 0x0) 11:24:54 executing program 5: write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000540)=ANY=[@ANYBLOB="7f454c4601061f000400000000000000030038000800000032000000000000004000000000000000560200000000000007000000008038000100090002000100010000000100000006000000000000000400000000000000060000000000000001040000000000000200000000000000010000000000000051e574640400000001000000000000000400000000000000050000000000000005000000000000000400000000000000ff24444700000000908bc001727fbcd44f4d3bf922995edf2fd379eb00"/489], 0x2c4) r0 = inotify_init() r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) epoll_ctl$EPOLL_CTL_DEL(0xffffffffffffffff, 0x2, r1) inotify_add_watch(r0, &(0x7f0000000000)='.\x00', 0x400017e) r2 = openat$incfs(0xffffffffffffffff, &(0x7f0000000080)='.log\x00', 0x0, 0x0) fcntl$getownex(r2, 0x10, &(0x7f00000000c0)) r3 = open(0x0, 0x200c2, 0x0) write$binfmt_elf64(r3, &(0x7f0000000080)=ANY=[], 0x8) sendfile(r3, r3, &(0x7f00000001c0), 0xa198) dup(0xffffffffffffffff) r4 = syz_mount_image$gfs2meta(&(0x7f0000000140)='gfs2meta\x00', &(0x7f0000000200)='./file0\x00', 0x1000, 0x4, &(0x7f0000000880)=[{&(0x7f0000000240)="77ba0daae1b2e74ecd52c59a85bf6f4b1f0b01ab07ba92bc6e57305406115f2bc3e4dd94f19ed896c4fccd34271e9dc3499af9298dbc709e0e6a513d61391d4b198af5f55d24239ae934e8babb8d1cb67bb17b0158", 0x55, 0x3}, {&(0x7f00000002c0)="ae227f954d229f666a6cd22938585e852071e55aa5728addcd315922bf32282e077bdbc63cd5ec89626ee2f8e7982ca239eaa758231056cdca22ca27428407f6c64c384665cfbd00ee6e0d7609f2c7ba0f28b4af70d0307ef78decfe42973915cd509de7c19ea0f3f5c3caaab05f9af08e2cc82d2c14b919dd045e3d36ce1c5d0ff23aed0a4a6ef508b5e71df0a25250d47f1e033ed503b6df99c189111b75b59df679cb75240b756cafecfd203568eeb2c1708fe9f11a2cb0f288590ec76cefbde09c90e9d568492aa5f41196397b70c869838c7164f2bad8eff017d021d7d41c9025c20b", 0xe5, 0x3}, {&(0x7f00000003c0)="792eb6eec33e561f18dc4b58b6a6fb3c7e6fd5e612c08490216ae02617f9811945929cffbf59727393a9a69d57b00a5cd08da3888884b8361d6a4003a54480c1086a5fc876582ff049ede86e2f58d80c7b6cf618e1ba36d4710887bc34ef2b7abbc686df2185f99998060bf492b84e3a02077e2aaf014e1186fde602d2b639d467f48fc2e18cf1553e07ac39040953566ab1d21aac627b166825375377bc3332b62160ea8bf7fc3196b30965dce6181bf7a1c60d0270f24ba60e633c8c88bbdefb5928dc8183c2ce0616de6c3185a4aa7eb2ec6ab7d8394a9536bf7e4f33f76294b0b4a390aca576177671191fe91530e9bd0db79cee", 0xf6, 0x100000000}, {&(0x7f00000004c0)="a90f49b744c1ad7c27bc0a3b1965ca2bce6602b5f5a8b294ced925862d0a9df5c88e43095ba5810ba49c2216e7e1a9b5f07075e6a3101e853557713e983b2f46cf599dc2cba6254802d01794cdc015e28e2b5aa8c10293a4487b3fe2469252f2c2406327b2a5fe71b185ec0adfdc824a237f94", 0x73, 0x7}], 0x21008, &(0x7f0000000900)={[{'.log\x00'}, {'-%('}, {'.log\x00'}], [{@appraise_type='appraise_type=imasig'}, {@fowner_eq={'fowner', 0x3d, 0xee01}}, {@hash='hash'}, {@subj_type={'subj_type', 0x3d, '-&'}}, {@hash='hash'}]}) ioctl$BTRFS_IOC_SUBVOL_SETFLAGS(r4, 0x4008941a, &(0x7f0000000980)=0xfe33b054cbbc4d79) [ 560.299667][T27202] loop5: detected capacity change from 264192 to 0 11:24:54 executing program 5: write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000540)=ANY=[@ANYBLOB="7f454c4601061f000400000000000000030038000800000032000000000000004000000000000000560200000000000007000000008038000100090002000100010000000100000006000000000000000400000000000000060000000000000001040000000000000200000000000000010000000000000051e574640400000001000000000000000400000000000000050000000000000005000000000000000400000000000000ff24444700000000908bc001727fbcd44f4d3bf922995edf2fd379eb00"/489], 0x2c4) r0 = inotify_init() r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) epoll_ctl$EPOLL_CTL_DEL(0xffffffffffffffff, 0x2, r1) inotify_add_watch(r0, &(0x7f0000000000)='.\x00', 0x400017e) r2 = openat$incfs(0xffffffffffffffff, &(0x7f0000000080)='.log\x00', 0x0, 0x0) fcntl$getownex(r2, 0x10, &(0x7f00000000c0)) r3 = open(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) write$binfmt_elf64(r3, &(0x7f0000000080)=ANY=[], 0x8) sendfile(r3, r3, &(0x7f00000001c0), 0xa198) dup(0xffffffffffffffff) r4 = syz_mount_image$gfs2meta(&(0x7f0000000140)='gfs2meta\x00', &(0x7f0000000200)='./file0\x00', 0x1000, 0x4, &(0x7f0000000880)=[{&(0x7f0000000240)="77ba0daae1b2e74ecd52c59a85bf6f4b1f0b01ab07ba92bc6e57305406115f2bc3e4dd94f19ed896c4fccd34271e9dc3499af9298dbc709e0e6a513d61391d4b198af5f55d24239ae934e8babb8d1cb67bb17b0158", 0x55, 0x3}, {&(0x7f00000002c0)="ae227f954d229f666a6cd22938585e852071e55aa5728addcd315922bf32282e077bdbc63cd5ec89626ee2f8e7982ca239eaa758231056cdca22ca27428407f6c64c384665cfbd00ee6e0d7609f2c7ba0f28b4af70d0307ef78decfe42973915cd509de7c19ea0f3f5c3caaab05f9af08e2cc82d2c14b919dd045e3d36ce1c5d0ff23aed0a4a6ef508b5e71df0a25250d47f1e033ed503b6df99c189111b75b59df679cb75240b756cafecfd203568eeb2c1708fe9f11a2cb0f288590ec76cefbde09c90e9d568492aa5f41196397b70c869838c7164f2bad8eff017d021d7d41c9025c20b", 0xe5, 0x3}, {&(0x7f00000003c0)="792eb6eec33e561f18dc4b58b6a6fb3c7e6fd5e612c08490216ae02617f9811945929cffbf59727393a9a69d57b00a5cd08da3888884b8361d6a4003a54480c1086a5fc876582ff049ede86e2f58d80c7b6cf618e1ba36d4710887bc34ef2b7abbc686df2185f99998060bf492b84e3a02077e2aaf014e1186fde602d2b639d467f48fc2e18cf1553e07ac39040953566ab1d21aac627b166825375377bc3332b62160ea8bf7fc3196b30965dce6181bf7a1c60d0270f24ba60e633c8c88bbdefb5928dc8183c2ce0616de6c3185a4aa7eb2ec6ab7d8394a9536bf7e4f33f76294b0b4a390aca576177671191fe91530e9bd0db79cee", 0xf6, 0x100000000}, {&(0x7f00000004c0)="a90f49b744c1ad7c27bc0a3b1965ca2bce6602b5f5a8b294ced925862d0a9df5c88e43095ba5810ba49c2216e7e1a9b5f07075e6a3101e853557713e983b2f46cf599dc2cba6254802d01794cdc015e28e2b5aa8c10293a4487b3fe2469252f2c2406327b2a5fe71b185ec0adfdc824a237f94", 0x73, 0x7}], 0x21008, &(0x7f0000000900)={[{'.log\x00'}, {'-%('}, {'.log\x00'}], [{@appraise_type='appraise_type=imasig'}, {@fowner_eq={'fowner', 0x3d, 0xee01}}, {@hash='hash'}, {@subj_type={'subj_type', 0x3d, '-&'}}, {@hash='hash'}]}) ioctl$BTRFS_IOC_SUBVOL_SETFLAGS(r4, 0x4008941a, &(0x7f0000000980)=0xfe33b054cbbc4d79) [ 560.393455][T27208] loop5: detected capacity change from 264192 to 0 11:24:54 executing program 0: r0 = perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x5c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write$binfmt_elf64(r0, &(0x7f0000000540)=ANY=[@ANYBLOB], 0x2c4) r1 = inotify_init() openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) epoll_ctl$EPOLL_CTL_DEL(0xffffffffffffffff, 0x2, 0xffffffffffffffff) inotify_add_watch(r1, &(0x7f0000000000)='.\x00', 0x400017e) r2 = openat$incfs(0xffffffffffffffff, &(0x7f0000000080)='.log\x00', 0x20200, 0x40) fcntl$getownex(r2, 0x10, &(0x7f00000000c0)) r3 = open(&(0x7f0000000040)='./file0\x00', 0x200c2, 0x0) write$binfmt_elf64(r3, &(0x7f0000000080)=ANY=[], 0x8) sendfile(r3, r3, &(0x7f00000001c0), 0xa198) dup(0xffffffffffffffff) r4 = syz_mount_image$gfs2meta(&(0x7f0000000140)='gfs2meta\x00', &(0x7f0000000200)='./file0\x00', 0x0, 0x4, &(0x7f0000000880)=[{&(0x7f0000000240)="77ba0daae1b2e74ecd52c59a85bf6f4b1f0b01ab07ba92bc6e57305406115f2bc3e4dd94f19ed896c4fccd34271e9dc3499af9298dbc709e0e6a513d61391d4b198af5f55d24239ae934e8babb8d1cb67bb17b0158", 0x55, 0x3}, {&(0x7f00000002c0)="ae227f954d229f666a6cd22938585e852071e55aa5728addcd315922bf32282e077bdbc63cd5ec89626ee2f8e7982ca239eaa758231056cdca22ca27428407f6c64c384665cfbd00ee6e0d7609f2c7ba0f28b4af70d0307ef78decfe42973915cd509de7c19ea0f3f5c3caaab05f9af08e2cc82d2c14b919dd045e3d36ce1c5d0ff23aed0a4a6ef508b5e71df0a25250d47f1e033ed503b6df99c189111b75b59df679cb75240b756cafecfd203568eeb2c1708fe9f11a2cb0f288590ec76cefbde09c90e9d568492aa5f41196397b70c869838c7164f2bad8eff017d021d7d41c9025c20b", 0xe5, 0x3}, {&(0x7f00000003c0)="792eb6eec33e561f18dc4b58b6a6fb3c7e6fd5e612c08490216ae02617f9811945929cffbf59727393a9a69d57b00a5cd08da3888884b8361d6a4003a54480c1086a5fc876582ff049ede86e2f58d80c7b6cf618e1ba36d4710887bc34ef2b7abbc686df2185f99998060bf492b84e3a02077e2aaf014e1186fde602d2b639d467f48fc2e18cf1553e07ac39040953566ab1d21aac627b166825375377bc3332b62160ea8bf7fc3196b30965dce6181bf7a1c60d0270f24ba60e633c8c88bbdefb5928dc8183c2ce0616de6c3185a4aa7eb2ec6ab7d8394a9536bf7e4f33f76294b0b4a390aca576177671191fe91530e9bd0db79cee", 0xf6, 0x100000000}, {&(0x7f00000004c0)="a90f49b744c1ad7c27bc0a3b1965ca2bce6602b5f5a8b294ced925862d0a9df5c88e43095ba5810ba49c2216e7e1a9b5f07075e6a3101e853557713e983b2f46cf599dc2cba6254802d01794cdc015e28e2b5aa8c10293a4487b3fe2469252f2c2406327b2a5fe71b185ec0adfdc824a237f94", 0x73, 0x7}], 0x21008, &(0x7f0000000900)={[{'.log\x00'}, {'-%('}, {'.log\x00'}], [{@obj_user={'obj_user'}}, {@appraise_type='appraise_type=imasig'}, {@fowner_eq={'fowner', 0x3d, 0xee01}}, {@hash='hash'}, {@subj_type={'subj_type', 0x3d, '-&'}}]}) ioctl$BTRFS_IOC_SUBVOL_SETFLAGS(r4, 0x4008941a, &(0x7f0000000980)=0xfe33b054cbbc4d79) [ 560.521611][T27215] loop5: detected capacity change from 264192 to 0 11:24:54 executing program 5: write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000540)=ANY=[@ANYBLOB="7f454c4601061f000400000000000000030038000800000032000000000000004000000000000000560200000000000007000000008038000100090002000100010000000100000006000000000000000400000000000000060000000000000001040000000000000200000000000000010000000000000051e574640400000001000000000000000400000000000000050000000000000005000000000000000400000000000000ff24444700000000908bc001727fbcd44f4d3bf922995edf2fd379eb00"/489], 0x2c4) r0 = inotify_init() r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) epoll_ctl$EPOLL_CTL_DEL(0xffffffffffffffff, 0x2, r1) inotify_add_watch(r0, &(0x7f0000000000)='.\x00', 0x400017e) r2 = openat$incfs(0xffffffffffffffff, &(0x7f0000000080)='.log\x00', 0x0, 0x0) fcntl$getownex(r2, 0x10, &(0x7f00000000c0)) r3 = open(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) write$binfmt_elf64(r3, &(0x7f0000000080)=ANY=[], 0x8) sendfile(r3, r3, &(0x7f00000001c0), 0xa198) dup(0xffffffffffffffff) r4 = syz_mount_image$gfs2meta(&(0x7f0000000140)='gfs2meta\x00', &(0x7f0000000200)='./file0\x00', 0x1000, 0x4, &(0x7f0000000880)=[{&(0x7f0000000240)="77ba0daae1b2e74ecd52c59a85bf6f4b1f0b01ab07ba92bc6e57305406115f2bc3e4dd94f19ed896c4fccd34271e9dc3499af9298dbc709e0e6a513d61391d4b198af5f55d24239ae934e8babb8d1cb67bb17b0158", 0x55, 0x3}, {&(0x7f00000002c0)="ae227f954d229f666a6cd22938585e852071e55aa5728addcd315922bf32282e077bdbc63cd5ec89626ee2f8e7982ca239eaa758231056cdca22ca27428407f6c64c384665cfbd00ee6e0d7609f2c7ba0f28b4af70d0307ef78decfe42973915cd509de7c19ea0f3f5c3caaab05f9af08e2cc82d2c14b919dd045e3d36ce1c5d0ff23aed0a4a6ef508b5e71df0a25250d47f1e033ed503b6df99c189111b75b59df679cb75240b756cafecfd203568eeb2c1708fe9f11a2cb0f288590ec76cefbde09c90e9d568492aa5f41196397b70c869838c7164f2bad8eff017d021d7d41c9025c20b", 0xe5, 0x3}, {&(0x7f00000003c0)="792eb6eec33e561f18dc4b58b6a6fb3c7e6fd5e612c08490216ae02617f9811945929cffbf59727393a9a69d57b00a5cd08da3888884b8361d6a4003a54480c1086a5fc876582ff049ede86e2f58d80c7b6cf618e1ba36d4710887bc34ef2b7abbc686df2185f99998060bf492b84e3a02077e2aaf014e1186fde602d2b639d467f48fc2e18cf1553e07ac39040953566ab1d21aac627b166825375377bc3332b62160ea8bf7fc3196b30965dce6181bf7a1c60d0270f24ba60e633c8c88bbdefb5928dc8183c2ce0616de6c3185a4aa7eb2ec6ab7d8394a9536bf7e4f33f76294b0b4a390aca576177671191fe91530e9bd0db79cee", 0xf6, 0x100000000}, {&(0x7f00000004c0)="a90f49b744c1ad7c27bc0a3b1965ca2bce6602b5f5a8b294ced925862d0a9df5c88e43095ba5810ba49c2216e7e1a9b5f07075e6a3101e853557713e983b2f46cf599dc2cba6254802d01794cdc015e28e2b5aa8c10293a4487b3fe2469252f2c2406327b2a5fe71b185ec0adfdc824a237f94", 0x73, 0x7}], 0x21008, &(0x7f0000000900)={[{'.log\x00'}, {'-%('}, {'.log\x00'}], [{@appraise_type='appraise_type=imasig'}, {@fowner_eq={'fowner', 0x3d, 0xee01}}, {@hash='hash'}, {@subj_type={'subj_type', 0x3d, '-&'}}, {@hash='hash'}]}) ioctl$BTRFS_IOC_SUBVOL_SETFLAGS(r4, 0x4008941a, &(0x7f0000000980)=0xfe33b054cbbc4d79) [ 560.660128][T27229] loop5: detected capacity change from 264192 to 0 [ 560.699164][T27228] loop0: detected capacity change from 264192 to 0 [ 560.700937][ T35] audit: type=1804 audit(1612178694.778:2190): pid=27216 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.4" name="/root/syzkaller-testdir068764309/syzkaller.I2gCPs/445/file1" dev="sda1" ino=15832 res=1 errno=0 11:24:54 executing program 5: write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000540)=ANY=[@ANYBLOB="7f454c4601061f000400000000000000030038000800000032000000000000004000000000000000560200000000000007000000008038000100090002000100010000000100000006000000000000000400000000000000060000000000000001040000000000000200000000000000010000000000000051e574640400000001000000000000000400000000000000050000000000000005000000000000000400000000000000ff24444700000000908bc001727fbcd44f4d3bf922995edf2fd379eb00"/489], 0x2c4) r0 = inotify_init() r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) epoll_ctl$EPOLL_CTL_DEL(0xffffffffffffffff, 0x2, r1) inotify_add_watch(r0, &(0x7f0000000000)='.\x00', 0x400017e) r2 = openat$incfs(0xffffffffffffffff, &(0x7f0000000080)='.log\x00', 0x0, 0x0) fcntl$getownex(r2, 0x10, &(0x7f00000000c0)) r3 = open(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) write$binfmt_elf64(r3, &(0x7f0000000080)=ANY=[], 0x8) sendfile(r3, r3, &(0x7f00000001c0), 0xa198) dup(0xffffffffffffffff) r4 = syz_mount_image$gfs2meta(&(0x7f0000000140)='gfs2meta\x00', &(0x7f0000000200)='./file0\x00', 0x1000, 0x4, &(0x7f0000000880)=[{&(0x7f0000000240)="77ba0daae1b2e74ecd52c59a85bf6f4b1f0b01ab07ba92bc6e57305406115f2bc3e4dd94f19ed896c4fccd34271e9dc3499af9298dbc709e0e6a513d61391d4b198af5f55d24239ae934e8babb8d1cb67bb17b0158", 0x55, 0x3}, {&(0x7f00000002c0)="ae227f954d229f666a6cd22938585e852071e55aa5728addcd315922bf32282e077bdbc63cd5ec89626ee2f8e7982ca239eaa758231056cdca22ca27428407f6c64c384665cfbd00ee6e0d7609f2c7ba0f28b4af70d0307ef78decfe42973915cd509de7c19ea0f3f5c3caaab05f9af08e2cc82d2c14b919dd045e3d36ce1c5d0ff23aed0a4a6ef508b5e71df0a25250d47f1e033ed503b6df99c189111b75b59df679cb75240b756cafecfd203568eeb2c1708fe9f11a2cb0f288590ec76cefbde09c90e9d568492aa5f41196397b70c869838c7164f2bad8eff017d021d7d41c9025c20b", 0xe5, 0x3}, {&(0x7f00000003c0)="792eb6eec33e561f18dc4b58b6a6fb3c7e6fd5e612c08490216ae02617f9811945929cffbf59727393a9a69d57b00a5cd08da3888884b8361d6a4003a54480c1086a5fc876582ff049ede86e2f58d80c7b6cf618e1ba36d4710887bc34ef2b7abbc686df2185f99998060bf492b84e3a02077e2aaf014e1186fde602d2b639d467f48fc2e18cf1553e07ac39040953566ab1d21aac627b166825375377bc3332b62160ea8bf7fc3196b30965dce6181bf7a1c60d0270f24ba60e633c8c88bbdefb5928dc8183c2ce0616de6c3185a4aa7eb2ec6ab7d8394a9536bf7e4f33f76294b0b4a390aca576177671191fe91530e9bd0db79cee", 0xf6, 0x100000000}, {&(0x7f00000004c0)="a90f49b744c1ad7c27bc0a3b1965ca2bce6602b5f5a8b294ced925862d0a9df5c88e43095ba5810ba49c2216e7e1a9b5f07075e6a3101e853557713e983b2f46cf599dc2cba6254802d01794cdc015e28e2b5aa8c10293a4487b3fe2469252f2c2406327b2a5fe71b185ec0adfdc824a237f94", 0x73, 0x7}], 0x21008, &(0x7f0000000900)={[{'.log\x00'}, {'-%('}, {'.log\x00'}], [{@appraise_type='appraise_type=imasig'}, {@fowner_eq={'fowner', 0x3d, 0xee01}}, {@hash='hash'}, {@subj_type={'subj_type', 0x3d, '-&'}}, {@hash='hash'}]}) ioctl$BTRFS_IOC_SUBVOL_SETFLAGS(r4, 0x4008941a, &(0x7f0000000980)=0xfe33b054cbbc4d79) [ 560.773741][ T35] audit: type=1804 audit(1612178694.838:2191): pid=27194 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.2" name="/root/syzkaller-testdir245532710/syzkaller.d2c0aK/413/file1" dev="sda1" ino=15896 res=1 errno=0 [ 560.870917][T27240] loop5: detected capacity change from 264192 to 0 [ 560.908498][ T35] audit: type=1804 audit(1612178694.988:2192): pid=27198 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.3" name="/root/syzkaller-testdir548988167/syzkaller.gb8agU/401/file1" dev="sda1" ino=15903 res=1 errno=0 [ 560.957053][ T35] audit: type=1804 audit(1612178695.018:2193): pid=27194 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.2" name="/root/syzkaller-testdir245532710/syzkaller.d2c0aK/413/file1" dev="sda1" ino=15896 res=1 errno=0 11:24:55 executing program 5: write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000540)=ANY=[@ANYBLOB="7f454c4601061f000400000000000000030038000800000032000000000000004000000000000000560200000000000007000000008038000100090002000100010000000100000006000000000000000400000000000000060000000000000001040000000000000200000000000000010000000000000051e574640400000001000000000000000400000000000000050000000000000005000000000000000400000000000000ff24444700000000908bc001727fbcd44f4d3bf922995edf2fd379eb00"/489], 0x2c4) r0 = inotify_init() r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) epoll_ctl$EPOLL_CTL_DEL(0xffffffffffffffff, 0x2, r1) inotify_add_watch(r0, &(0x7f0000000000)='.\x00', 0x400017e) r2 = openat$incfs(0xffffffffffffffff, &(0x7f0000000080)='.log\x00', 0x0, 0x0) fcntl$getownex(r2, 0x10, &(0x7f00000000c0)) r3 = open(&(0x7f0000000040)='./file0\x00', 0x200c2, 0x0) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000080)=ANY=[], 0x8) sendfile(r3, r3, &(0x7f00000001c0), 0xa198) dup(0xffffffffffffffff) r4 = syz_mount_image$gfs2meta(&(0x7f0000000140)='gfs2meta\x00', &(0x7f0000000200)='./file0\x00', 0x1000, 0x4, &(0x7f0000000880)=[{&(0x7f0000000240)="77ba0daae1b2e74ecd52c59a85bf6f4b1f0b01ab07ba92bc6e57305406115f2bc3e4dd94f19ed896c4fccd34271e9dc3499af9298dbc709e0e6a513d61391d4b198af5f55d24239ae934e8babb8d1cb67bb17b0158", 0x55, 0x3}, {&(0x7f00000002c0)="ae227f954d229f666a6cd22938585e852071e55aa5728addcd315922bf32282e077bdbc63cd5ec89626ee2f8e7982ca239eaa758231056cdca22ca27428407f6c64c384665cfbd00ee6e0d7609f2c7ba0f28b4af70d0307ef78decfe42973915cd509de7c19ea0f3f5c3caaab05f9af08e2cc82d2c14b919dd045e3d36ce1c5d0ff23aed0a4a6ef508b5e71df0a25250d47f1e033ed503b6df99c189111b75b59df679cb75240b756cafecfd203568eeb2c1708fe9f11a2cb0f288590ec76cefbde09c90e9d568492aa5f41196397b70c869838c7164f2bad8eff017d021d7d41c9025c20b", 0xe5, 0x3}, {&(0x7f00000003c0)="792eb6eec33e561f18dc4b58b6a6fb3c7e6fd5e612c08490216ae02617f9811945929cffbf59727393a9a69d57b00a5cd08da3888884b8361d6a4003a54480c1086a5fc876582ff049ede86e2f58d80c7b6cf618e1ba36d4710887bc34ef2b7abbc686df2185f99998060bf492b84e3a02077e2aaf014e1186fde602d2b639d467f48fc2e18cf1553e07ac39040953566ab1d21aac627b166825375377bc3332b62160ea8bf7fc3196b30965dce6181bf7a1c60d0270f24ba60e633c8c88bbdefb5928dc8183c2ce0616de6c3185a4aa7eb2ec6ab7d8394a9536bf7e4f33f76294b0b4a390aca576177671191fe91530e9bd0db79cee", 0xf6, 0x100000000}, {&(0x7f00000004c0)="a90f49b744c1ad7c27bc0a3b1965ca2bce6602b5f5a8b294ced925862d0a9df5c88e43095ba5810ba49c2216e7e1a9b5f07075e6a3101e853557713e983b2f46cf599dc2cba6254802d01794cdc015e28e2b5aa8c10293a4487b3fe2469252f2c2406327b2a5fe71b185ec0adfdc824a237f94", 0x73, 0x7}], 0x21008, &(0x7f0000000900)={[{'.log\x00'}, {'-%('}, {'.log\x00'}], [{@appraise_type='appraise_type=imasig'}, {@fowner_eq={'fowner', 0x3d, 0xee01}}, {@hash='hash'}, {@subj_type={'subj_type', 0x3d, '-&'}}, {@hash='hash'}]}) ioctl$BTRFS_IOC_SUBVOL_SETFLAGS(r4, 0x4008941a, &(0x7f0000000980)=0xfe33b054cbbc4d79) 11:24:55 executing program 2: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x7f, 0x80000000008001}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x9}, 0x0) r1 = open(&(0x7f0000000240)='./file1\x00', 0x141142, 0x0) write$UHID_INPUT(r1, &(0x7f0000001440)={0x8, {'\x00R\x00'}}, 0xfffffc41) open(&(0x7f00000001c0)='./file1\x00', 0x0, 0x0) setxattr$trusted_overlay_nlink(&(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x0, 0x0) [ 561.075730][ T35] audit: type=1804 audit(1612178695.118:2194): pid=27199 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.3" name="/root/syzkaller-testdir548988167/syzkaller.gb8agU/401/file1" dev="sda1" ino=15903 res=1 errno=0 [ 561.154773][T27249] loop5: detected capacity change from 264192 to 0 11:24:55 executing program 3: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x7f, 0x80000000008001}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x9}, 0x0) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000080)) r1 = open(&(0x7f0000000240)='./file1\x00', 0x141142, 0x0) write$UHID_INPUT(r1, &(0x7f0000001440)={0x8, {'\x00O\x00'}}, 0xfffffc41) open(&(0x7f00000001c0)='./file1\x00', 0x0, 0x0) setxattr$trusted_overlay_nlink(&(0x7f0000000000)='./file1\x00', &(0x7f00000000c0)='trusted.overlay.nlink\x00', 0x0, 0x0, 0x0) 11:24:55 executing program 4: write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000540)=ANY=[@ANYBLOB="7f454c4601061f000400000000000000030038000800000032000000000000004000000000000000560200000000000007000000008038000100090002000100010000000100000006000000000000000400000000000000060000000000000001040000000000000200000000000000010000000000000051e574640400000001000000000000000400000000000000050000000000000005000000000000000400000000000000ff24444700000000908bc001727fbcd44f4d3bf922995edf2fd379eb00"/489], 0x2c4) r0 = inotify_init() r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) epoll_ctl$EPOLL_CTL_DEL(0xffffffffffffffff, 0x2, r1) inotify_add_watch(r0, &(0x7f0000000000)='.\x00', 0x400017e) r2 = openat$incfs(0xffffffffffffffff, &(0x7f0000000080)='.log\x00', 0x0, 0x0) fcntl$getownex(r2, 0x10, &(0x7f00000000c0)) r3 = open(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) write$binfmt_elf64(r3, &(0x7f0000000080)=ANY=[], 0x8) sendfile(r3, r3, &(0x7f00000001c0), 0xa198) dup(0xffffffffffffffff) r4 = syz_mount_image$gfs2meta(&(0x7f0000000140)='gfs2meta\x00', &(0x7f0000000200)='./file0\x00', 0x1000, 0x4, &(0x7f0000000880)=[{&(0x7f0000000240)="77ba0daae1b2e74ecd52c59a85bf6f4b1f0b01ab07ba92bc6e57305406115f2bc3e4dd94f19ed896c4fccd34271e9dc3499af9298dbc709e0e6a513d61391d4b198af5f55d24239ae934e8babb8d1cb67bb17b0158", 0x55, 0x3}, {&(0x7f00000002c0)="ae227f954d229f666a6cd22938585e852071e55aa5728addcd315922bf32282e077bdbc63cd5ec89626ee2f8e7982ca239eaa758231056cdca22ca27428407f6c64c384665cfbd00ee6e0d7609f2c7ba0f28b4af70d0307ef78decfe42973915cd509de7c19ea0f3f5c3caaab05f9af08e2cc82d2c14b919dd045e3d36ce1c5d0ff23aed0a4a6ef508b5e71df0a25250d47f1e033ed503b6df99c189111b75b59df679cb75240b756cafecfd203568eeb2c1708fe9f11a2cb0f288590ec76cefbde09c90e9d568492aa5f41196397b70c869838c7164f2bad8eff017d021d7d41c9025c20b", 0xe5, 0x3}, {&(0x7f00000003c0)="792eb6eec33e561f18dc4b58b6a6fb3c7e6fd5e612c08490216ae02617f9811945929cffbf59727393a9a69d57b00a5cd08da3888884b8361d6a4003a54480c1086a5fc876582ff049ede86e2f58d80c7b6cf618e1ba36d4710887bc34ef2b7abbc686df2185f99998060bf492b84e3a02077e2aaf014e1186fde602d2b639d467f48fc2e18cf1553e07ac39040953566ab1d21aac627b166825375377bc3332b62160ea8bf7fc3196b30965dce6181bf7a1c60d0270f24ba60e633c8c88bbdefb5928dc8183c2ce0616de6c3185a4aa7eb2ec6ab7d8394a9536bf7e4f33f76294b0b4a390aca576177671191fe91530e9bd0db79cee", 0xf6, 0x100000000}, {&(0x7f00000004c0)="a90f49b744c1ad7c27bc0a3b1965ca2bce6602b5f5a8b294ced925862d0a9df5c88e43095ba5810ba49c2216e7e1a9b5f07075e6a3101e853557713e983b2f46cf599dc2cba6254802d01794cdc015e28e2b5aa8c10293a4487b3fe2469252f2c2406327b2a5fe71b185ec0adfdc824a237f94", 0x73, 0x7}], 0x21008, &(0x7f0000000900)={[{'.log\x00'}, {'-%('}, {'.log\x00'}], [{@appraise_type='appraise_type=imasig'}, {@fowner_eq={'fowner', 0x3d, 0xee01}}, {@hash='hash'}, {@subj_type={'subj_type', 0x3d, '-&'}}, {@hash='hash'}]}) ioctl$BTRFS_IOC_SUBVOL_SETFLAGS(r4, 0x4008941a, &(0x7f0000000980)=0xfe33b054cbbc4d79) 11:24:55 executing program 5: write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000540)=ANY=[@ANYBLOB="7f454c4601061f000400000000000000030038000800000032000000000000004000000000000000560200000000000007000000008038000100090002000100010000000100000006000000000000000400000000000000060000000000000001040000000000000200000000000000010000000000000051e574640400000001000000000000000400000000000000050000000000000005000000000000000400000000000000ff24444700000000908bc001727fbcd44f4d3bf922995edf2fd379eb00"/489], 0x2c4) r0 = inotify_init() r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) epoll_ctl$EPOLL_CTL_DEL(0xffffffffffffffff, 0x2, r1) inotify_add_watch(r0, &(0x7f0000000000)='.\x00', 0x400017e) r2 = openat$incfs(0xffffffffffffffff, &(0x7f0000000080)='.log\x00', 0x0, 0x0) fcntl$getownex(r2, 0x10, &(0x7f00000000c0)) r3 = open(&(0x7f0000000040)='./file0\x00', 0x200c2, 0x0) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000080)=ANY=[], 0x8) sendfile(r3, r3, &(0x7f00000001c0), 0xa198) dup(0xffffffffffffffff) r4 = syz_mount_image$gfs2meta(&(0x7f0000000140)='gfs2meta\x00', &(0x7f0000000200)='./file0\x00', 0x1000, 0x4, &(0x7f0000000880)=[{&(0x7f0000000240)="77ba0daae1b2e74ecd52c59a85bf6f4b1f0b01ab07ba92bc6e57305406115f2bc3e4dd94f19ed896c4fccd34271e9dc3499af9298dbc709e0e6a513d61391d4b198af5f55d24239ae934e8babb8d1cb67bb17b0158", 0x55, 0x3}, {&(0x7f00000002c0)="ae227f954d229f666a6cd22938585e852071e55aa5728addcd315922bf32282e077bdbc63cd5ec89626ee2f8e7982ca239eaa758231056cdca22ca27428407f6c64c384665cfbd00ee6e0d7609f2c7ba0f28b4af70d0307ef78decfe42973915cd509de7c19ea0f3f5c3caaab05f9af08e2cc82d2c14b919dd045e3d36ce1c5d0ff23aed0a4a6ef508b5e71df0a25250d47f1e033ed503b6df99c189111b75b59df679cb75240b756cafecfd203568eeb2c1708fe9f11a2cb0f288590ec76cefbde09c90e9d568492aa5f41196397b70c869838c7164f2bad8eff017d021d7d41c9025c20b", 0xe5, 0x3}, {&(0x7f00000003c0)="792eb6eec33e561f18dc4b58b6a6fb3c7e6fd5e612c08490216ae02617f9811945929cffbf59727393a9a69d57b00a5cd08da3888884b8361d6a4003a54480c1086a5fc876582ff049ede86e2f58d80c7b6cf618e1ba36d4710887bc34ef2b7abbc686df2185f99998060bf492b84e3a02077e2aaf014e1186fde602d2b639d467f48fc2e18cf1553e07ac39040953566ab1d21aac627b166825375377bc3332b62160ea8bf7fc3196b30965dce6181bf7a1c60d0270f24ba60e633c8c88bbdefb5928dc8183c2ce0616de6c3185a4aa7eb2ec6ab7d8394a9536bf7e4f33f76294b0b4a390aca576177671191fe91530e9bd0db79cee", 0xf6, 0x100000000}, {&(0x7f00000004c0)="a90f49b744c1ad7c27bc0a3b1965ca2bce6602b5f5a8b294ced925862d0a9df5c88e43095ba5810ba49c2216e7e1a9b5f07075e6a3101e853557713e983b2f46cf599dc2cba6254802d01794cdc015e28e2b5aa8c10293a4487b3fe2469252f2c2406327b2a5fe71b185ec0adfdc824a237f94", 0x73, 0x7}], 0x21008, &(0x7f0000000900)={[{'.log\x00'}, {'-%('}, {'.log\x00'}], [{@appraise_type='appraise_type=imasig'}, {@fowner_eq={'fowner', 0x3d, 0xee01}}, {@hash='hash'}, {@subj_type={'subj_type', 0x3d, '-&'}}, {@hash='hash'}]}) ioctl$BTRFS_IOC_SUBVOL_SETFLAGS(r4, 0x4008941a, &(0x7f0000000980)=0xfe33b054cbbc4d79) [ 561.281648][ T35] audit: type=1804 audit(1612178695.358:2195): pid=27225 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.1" name="/root/syzkaller-testdir551554057/syzkaller.l2Zg4z/398/file1" dev="sda1" ino=15897 res=1 errno=0 [ 561.366481][T27256] loop5: detected capacity change from 264192 to 0 11:24:55 executing program 1: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x7f, 0x80000000008001}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x9}, 0x0) r1 = open(&(0x7f0000000240)='./file1\x00', 0x141142, 0x0) write$UHID_INPUT(r1, &(0x7f0000001440), 0xfffffc41) open(&(0x7f00000001c0)='./file1\x00', 0x0, 0xfffffff6) setxattr$trusted_overlay_nlink(&(0x7f0000000000)='./file1\x00', &(0x7f00000000c0)='trusted.overlay.nlink\x00', 0x0, 0x0, 0x0) 11:24:55 executing program 0: r0 = perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x5c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write$binfmt_elf64(r0, &(0x7f0000000540)=ANY=[@ANYBLOB], 0x2c4) r1 = inotify_init() openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) epoll_ctl$EPOLL_CTL_DEL(0xffffffffffffffff, 0x2, 0xffffffffffffffff) inotify_add_watch(r1, &(0x7f0000000000)='.\x00', 0x400017e) r2 = openat$incfs(0xffffffffffffffff, &(0x7f0000000080)='.log\x00', 0x20200, 0x40) fcntl$getownex(r2, 0x10, &(0x7f00000000c0)) r3 = open(&(0x7f0000000040)='./file0\x00', 0x200c2, 0x0) write$binfmt_elf64(r3, &(0x7f0000000080)=ANY=[], 0x8) sendfile(r3, r3, &(0x7f00000001c0), 0xa198) dup(0xffffffffffffffff) r4 = syz_mount_image$gfs2meta(&(0x7f0000000140)='gfs2meta\x00', &(0x7f0000000200)='./file0\x00', 0x1000, 0x0, 0x0, 0x21008, &(0x7f0000000900)={[{'.log\x00'}, {'-%('}, {'.log\x00'}], [{@obj_user={'obj_user'}}, {@appraise_type='appraise_type=imasig'}, {@fowner_eq={'fowner', 0x3d, 0xee01}}, {@hash='hash'}, {@subj_type={'subj_type', 0x3d, '-&'}}]}) ioctl$BTRFS_IOC_SUBVOL_SETFLAGS(r4, 0x4008941a, &(0x7f0000000980)=0xfe33b054cbbc4d79) 11:24:55 executing program 5: write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000540)=ANY=[@ANYBLOB="7f454c4601061f000400000000000000030038000800000032000000000000004000000000000000560200000000000007000000008038000100090002000100010000000100000006000000000000000400000000000000060000000000000001040000000000000200000000000000010000000000000051e574640400000001000000000000000400000000000000050000000000000005000000000000000400000000000000ff24444700000000908bc001727fbcd44f4d3bf922995edf2fd379eb00"/489], 0x2c4) r0 = inotify_init() r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) epoll_ctl$EPOLL_CTL_DEL(0xffffffffffffffff, 0x2, r1) inotify_add_watch(r0, &(0x7f0000000000)='.\x00', 0x400017e) r2 = openat$incfs(0xffffffffffffffff, &(0x7f0000000080)='.log\x00', 0x0, 0x0) fcntl$getownex(r2, 0x10, &(0x7f00000000c0)) r3 = open(&(0x7f0000000040)='./file0\x00', 0x200c2, 0x0) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000080)=ANY=[], 0x8) sendfile(r3, r3, &(0x7f00000001c0), 0xa198) dup(0xffffffffffffffff) r4 = syz_mount_image$gfs2meta(&(0x7f0000000140)='gfs2meta\x00', &(0x7f0000000200)='./file0\x00', 0x1000, 0x4, &(0x7f0000000880)=[{&(0x7f0000000240)="77ba0daae1b2e74ecd52c59a85bf6f4b1f0b01ab07ba92bc6e57305406115f2bc3e4dd94f19ed896c4fccd34271e9dc3499af9298dbc709e0e6a513d61391d4b198af5f55d24239ae934e8babb8d1cb67bb17b0158", 0x55, 0x3}, {&(0x7f00000002c0)="ae227f954d229f666a6cd22938585e852071e55aa5728addcd315922bf32282e077bdbc63cd5ec89626ee2f8e7982ca239eaa758231056cdca22ca27428407f6c64c384665cfbd00ee6e0d7609f2c7ba0f28b4af70d0307ef78decfe42973915cd509de7c19ea0f3f5c3caaab05f9af08e2cc82d2c14b919dd045e3d36ce1c5d0ff23aed0a4a6ef508b5e71df0a25250d47f1e033ed503b6df99c189111b75b59df679cb75240b756cafecfd203568eeb2c1708fe9f11a2cb0f288590ec76cefbde09c90e9d568492aa5f41196397b70c869838c7164f2bad8eff017d021d7d41c9025c20b", 0xe5, 0x3}, {&(0x7f00000003c0)="792eb6eec33e561f18dc4b58b6a6fb3c7e6fd5e612c08490216ae02617f9811945929cffbf59727393a9a69d57b00a5cd08da3888884b8361d6a4003a54480c1086a5fc876582ff049ede86e2f58d80c7b6cf618e1ba36d4710887bc34ef2b7abbc686df2185f99998060bf492b84e3a02077e2aaf014e1186fde602d2b639d467f48fc2e18cf1553e07ac39040953566ab1d21aac627b166825375377bc3332b62160ea8bf7fc3196b30965dce6181bf7a1c60d0270f24ba60e633c8c88bbdefb5928dc8183c2ce0616de6c3185a4aa7eb2ec6ab7d8394a9536bf7e4f33f76294b0b4a390aca576177671191fe91530e9bd0db79cee", 0xf6, 0x100000000}, {&(0x7f00000004c0)="a90f49b744c1ad7c27bc0a3b1965ca2bce6602b5f5a8b294ced925862d0a9df5c88e43095ba5810ba49c2216e7e1a9b5f07075e6a3101e853557713e983b2f46cf599dc2cba6254802d01794cdc015e28e2b5aa8c10293a4487b3fe2469252f2c2406327b2a5fe71b185ec0adfdc824a237f94", 0x73, 0x7}], 0x21008, &(0x7f0000000900)={[{'.log\x00'}, {'-%('}, {'.log\x00'}], [{@appraise_type='appraise_type=imasig'}, {@fowner_eq={'fowner', 0x3d, 0xee01}}, {@hash='hash'}, {@subj_type={'subj_type', 0x3d, '-&'}}, {@hash='hash'}]}) ioctl$BTRFS_IOC_SUBVOL_SETFLAGS(r4, 0x4008941a, &(0x7f0000000980)=0xfe33b054cbbc4d79) [ 561.518808][T27266] loop4: detected capacity change from 264192 to 0 11:24:55 executing program 4: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x7f, 0x80000000008001}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x9}, 0x0) r1 = open(&(0x7f0000000240)='./file1\x00', 0x141142, 0x0) write$UHID_INPUT(r1, &(0x7f0000001440), 0xfffffc41) open(&(0x7f00000001c0)='./file1\x00', 0x0, 0xffffffea) setxattr$trusted_overlay_nlink(&(0x7f0000000000)='./file1\x00', &(0x7f00000000c0)='trusted.overlay.nlink\x00', 0x0, 0x0, 0x0) [ 561.665306][T27274] loop5: detected capacity change from 264192 to 0 11:24:55 executing program 5: write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000540)=ANY=[@ANYBLOB="7f454c4601061f000400000000000000030038000800000032000000000000004000000000000000560200000000000007000000008038000100090002000100010000000100000006000000000000000400000000000000060000000000000001040000000000000200000000000000010000000000000051e574640400000001000000000000000400000000000000050000000000000005000000000000000400000000000000ff24444700000000908bc001727fbcd44f4d3bf922995edf2fd379eb00"/489], 0x2c4) r0 = inotify_init() r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) epoll_ctl$EPOLL_CTL_DEL(0xffffffffffffffff, 0x2, r1) inotify_add_watch(r0, &(0x7f0000000000)='.\x00', 0x400017e) r2 = openat$incfs(0xffffffffffffffff, &(0x7f0000000080)='.log\x00', 0x0, 0x0) fcntl$getownex(r2, 0x10, &(0x7f00000000c0)) r3 = open(&(0x7f0000000040)='./file0\x00', 0x200c2, 0x0) write$binfmt_elf64(r3, 0x0, 0x8) sendfile(r3, r3, &(0x7f00000001c0), 0xa198) dup(0xffffffffffffffff) r4 = syz_mount_image$gfs2meta(&(0x7f0000000140)='gfs2meta\x00', &(0x7f0000000200)='./file0\x00', 0x1000, 0x4, &(0x7f0000000880)=[{&(0x7f0000000240)="77ba0daae1b2e74ecd52c59a85bf6f4b1f0b01ab07ba92bc6e57305406115f2bc3e4dd94f19ed896c4fccd34271e9dc3499af9298dbc709e0e6a513d61391d4b198af5f55d24239ae934e8babb8d1cb67bb17b0158", 0x55, 0x3}, {&(0x7f00000002c0)="ae227f954d229f666a6cd22938585e852071e55aa5728addcd315922bf32282e077bdbc63cd5ec89626ee2f8e7982ca239eaa758231056cdca22ca27428407f6c64c384665cfbd00ee6e0d7609f2c7ba0f28b4af70d0307ef78decfe42973915cd509de7c19ea0f3f5c3caaab05f9af08e2cc82d2c14b919dd045e3d36ce1c5d0ff23aed0a4a6ef508b5e71df0a25250d47f1e033ed503b6df99c189111b75b59df679cb75240b756cafecfd203568eeb2c1708fe9f11a2cb0f288590ec76cefbde09c90e9d568492aa5f41196397b70c869838c7164f2bad8eff017d021d7d41c9025c20b", 0xe5, 0x3}, {&(0x7f00000003c0)="792eb6eec33e561f18dc4b58b6a6fb3c7e6fd5e612c08490216ae02617f9811945929cffbf59727393a9a69d57b00a5cd08da3888884b8361d6a4003a54480c1086a5fc876582ff049ede86e2f58d80c7b6cf618e1ba36d4710887bc34ef2b7abbc686df2185f99998060bf492b84e3a02077e2aaf014e1186fde602d2b639d467f48fc2e18cf1553e07ac39040953566ab1d21aac627b166825375377bc3332b62160ea8bf7fc3196b30965dce6181bf7a1c60d0270f24ba60e633c8c88bbdefb5928dc8183c2ce0616de6c3185a4aa7eb2ec6ab7d8394a9536bf7e4f33f76294b0b4a390aca576177671191fe91530e9bd0db79cee", 0xf6, 0x100000000}, {&(0x7f00000004c0)="a90f49b744c1ad7c27bc0a3b1965ca2bce6602b5f5a8b294ced925862d0a9df5c88e43095ba5810ba49c2216e7e1a9b5f07075e6a3101e853557713e983b2f46cf599dc2cba6254802d01794cdc015e28e2b5aa8c10293a4487b3fe2469252f2c2406327b2a5fe71b185ec0adfdc824a237f94", 0x73, 0x7}], 0x21008, &(0x7f0000000900)={[{'.log\x00'}, {'-%('}, {'.log\x00'}], [{@appraise_type='appraise_type=imasig'}, {@fowner_eq={'fowner', 0x3d, 0xee01}}, {@hash='hash'}, {@subj_type={'subj_type', 0x3d, '-&'}}, {@hash='hash'}]}) ioctl$BTRFS_IOC_SUBVOL_SETFLAGS(r4, 0x4008941a, &(0x7f0000000980)=0xfe33b054cbbc4d79) [ 561.806021][T27290] loop5: detected capacity change from 264192 to 0 11:24:55 executing program 5: write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000540)=ANY=[@ANYBLOB="7f454c4601061f000400000000000000030038000800000032000000000000004000000000000000560200000000000007000000008038000100090002000100010000000100000006000000000000000400000000000000060000000000000001040000000000000200000000000000010000000000000051e574640400000001000000000000000400000000000000050000000000000005000000000000000400000000000000ff24444700000000908bc001727fbcd44f4d3bf922995edf2fd379eb00"/489], 0x2c4) r0 = inotify_init() r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) epoll_ctl$EPOLL_CTL_DEL(0xffffffffffffffff, 0x2, r1) inotify_add_watch(r0, &(0x7f0000000000)='.\x00', 0x400017e) r2 = openat$incfs(0xffffffffffffffff, &(0x7f0000000080)='.log\x00', 0x0, 0x0) fcntl$getownex(r2, 0x10, &(0x7f00000000c0)) r3 = open(&(0x7f0000000040)='./file0\x00', 0x200c2, 0x0) write$binfmt_elf64(r3, 0x0, 0x8) sendfile(r3, r3, &(0x7f00000001c0), 0xa198) dup(0xffffffffffffffff) r4 = syz_mount_image$gfs2meta(&(0x7f0000000140)='gfs2meta\x00', &(0x7f0000000200)='./file0\x00', 0x1000, 0x4, &(0x7f0000000880)=[{&(0x7f0000000240)="77ba0daae1b2e74ecd52c59a85bf6f4b1f0b01ab07ba92bc6e57305406115f2bc3e4dd94f19ed896c4fccd34271e9dc3499af9298dbc709e0e6a513d61391d4b198af5f55d24239ae934e8babb8d1cb67bb17b0158", 0x55, 0x3}, {&(0x7f00000002c0)="ae227f954d229f666a6cd22938585e852071e55aa5728addcd315922bf32282e077bdbc63cd5ec89626ee2f8e7982ca239eaa758231056cdca22ca27428407f6c64c384665cfbd00ee6e0d7609f2c7ba0f28b4af70d0307ef78decfe42973915cd509de7c19ea0f3f5c3caaab05f9af08e2cc82d2c14b919dd045e3d36ce1c5d0ff23aed0a4a6ef508b5e71df0a25250d47f1e033ed503b6df99c189111b75b59df679cb75240b756cafecfd203568eeb2c1708fe9f11a2cb0f288590ec76cefbde09c90e9d568492aa5f41196397b70c869838c7164f2bad8eff017d021d7d41c9025c20b", 0xe5, 0x3}, {&(0x7f00000003c0)="792eb6eec33e561f18dc4b58b6a6fb3c7e6fd5e612c08490216ae02617f9811945929cffbf59727393a9a69d57b00a5cd08da3888884b8361d6a4003a54480c1086a5fc876582ff049ede86e2f58d80c7b6cf618e1ba36d4710887bc34ef2b7abbc686df2185f99998060bf492b84e3a02077e2aaf014e1186fde602d2b639d467f48fc2e18cf1553e07ac39040953566ab1d21aac627b166825375377bc3332b62160ea8bf7fc3196b30965dce6181bf7a1c60d0270f24ba60e633c8c88bbdefb5928dc8183c2ce0616de6c3185a4aa7eb2ec6ab7d8394a9536bf7e4f33f76294b0b4a390aca576177671191fe91530e9bd0db79cee", 0xf6, 0x100000000}, {&(0x7f00000004c0)="a90f49b744c1ad7c27bc0a3b1965ca2bce6602b5f5a8b294ced925862d0a9df5c88e43095ba5810ba49c2216e7e1a9b5f07075e6a3101e853557713e983b2f46cf599dc2cba6254802d01794cdc015e28e2b5aa8c10293a4487b3fe2469252f2c2406327b2a5fe71b185ec0adfdc824a237f94", 0x73, 0x7}], 0x21008, &(0x7f0000000900)={[{'.log\x00'}, {'-%('}, {'.log\x00'}], [{@appraise_type='appraise_type=imasig'}, {@fowner_eq={'fowner', 0x3d, 0xee01}}, {@hash='hash'}, {@subj_type={'subj_type', 0x3d, '-&'}}, {@hash='hash'}]}) ioctl$BTRFS_IOC_SUBVOL_SETFLAGS(r4, 0x4008941a, &(0x7f0000000980)=0xfe33b054cbbc4d79) [ 561.974633][T27299] loop5: detected capacity change from 264192 to 0 11:24:56 executing program 3: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x7f, 0x80000000008001}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x9}, 0x0) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000080)) r1 = open(&(0x7f0000000240)='./file1\x00', 0x141142, 0x0) write$UHID_INPUT(r1, &(0x7f0000001440)={0x8, {'\x00P\x00'}}, 0xfffffc41) open(&(0x7f00000001c0)='./file1\x00', 0x0, 0x0) setxattr$trusted_overlay_nlink(&(0x7f0000000000)='./file1\x00', &(0x7f00000000c0)='trusted.overlay.nlink\x00', 0x0, 0x0, 0x0) 11:24:56 executing program 0: r0 = perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x5c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write$binfmt_elf64(r0, &(0x7f0000000540)=ANY=[@ANYBLOB], 0x2c4) r1 = inotify_init() openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) epoll_ctl$EPOLL_CTL_DEL(0xffffffffffffffff, 0x2, 0xffffffffffffffff) inotify_add_watch(r1, &(0x7f0000000000)='.\x00', 0x400017e) r2 = openat$incfs(0xffffffffffffffff, &(0x7f0000000080)='.log\x00', 0x20200, 0x40) fcntl$getownex(r2, 0x10, &(0x7f00000000c0)) r3 = open(&(0x7f0000000040)='./file0\x00', 0x200c2, 0x0) write$binfmt_elf64(r3, &(0x7f0000000080)=ANY=[], 0x8) sendfile(r3, r3, &(0x7f00000001c0), 0xa198) dup(0xffffffffffffffff) r4 = syz_mount_image$gfs2meta(&(0x7f0000000140)='gfs2meta\x00', &(0x7f0000000200)='./file0\x00', 0x1000, 0x0, 0x0, 0x21008, &(0x7f0000000900)={[{'.log\x00'}, {'-%('}, {'.log\x00'}], [{@obj_user={'obj_user'}}, {@appraise_type='appraise_type=imasig'}, {@fowner_eq={'fowner', 0x3d, 0xee01}}, {@hash='hash'}, {@subj_type={'subj_type', 0x3d, '-&'}}]}) ioctl$BTRFS_IOC_SUBVOL_SETFLAGS(r4, 0x4008941a, &(0x7f0000000980)=0xfe33b054cbbc4d79) 11:24:56 executing program 2: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x7f, 0x80000000008001}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x9}, 0x0) r1 = open(&(0x7f0000000240)='./file1\x00', 0x141142, 0x0) write$UHID_INPUT(r1, &(0x7f0000001440)={0x8, {'\x00S\x00'}}, 0xfffffc41) open(&(0x7f00000001c0)='./file1\x00', 0x0, 0x0) setxattr$trusted_overlay_nlink(&(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x0, 0x0) 11:24:56 executing program 5: write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000540)=ANY=[@ANYBLOB="7f454c4601061f000400000000000000030038000800000032000000000000004000000000000000560200000000000007000000008038000100090002000100010000000100000006000000000000000400000000000000060000000000000001040000000000000200000000000000010000000000000051e574640400000001000000000000000400000000000000050000000000000005000000000000000400000000000000ff24444700000000908bc001727fbcd44f4d3bf922995edf2fd379eb00"/489], 0x2c4) r0 = inotify_init() r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) epoll_ctl$EPOLL_CTL_DEL(0xffffffffffffffff, 0x2, r1) inotify_add_watch(r0, &(0x7f0000000000)='.\x00', 0x400017e) r2 = openat$incfs(0xffffffffffffffff, &(0x7f0000000080)='.log\x00', 0x0, 0x0) fcntl$getownex(r2, 0x10, &(0x7f00000000c0)) r3 = open(&(0x7f0000000040)='./file0\x00', 0x200c2, 0x0) write$binfmt_elf64(r3, 0x0, 0x8) sendfile(r3, r3, &(0x7f00000001c0), 0xa198) dup(0xffffffffffffffff) r4 = syz_mount_image$gfs2meta(&(0x7f0000000140)='gfs2meta\x00', &(0x7f0000000200)='./file0\x00', 0x1000, 0x4, &(0x7f0000000880)=[{&(0x7f0000000240)="77ba0daae1b2e74ecd52c59a85bf6f4b1f0b01ab07ba92bc6e57305406115f2bc3e4dd94f19ed896c4fccd34271e9dc3499af9298dbc709e0e6a513d61391d4b198af5f55d24239ae934e8babb8d1cb67bb17b0158", 0x55, 0x3}, {&(0x7f00000002c0)="ae227f954d229f666a6cd22938585e852071e55aa5728addcd315922bf32282e077bdbc63cd5ec89626ee2f8e7982ca239eaa758231056cdca22ca27428407f6c64c384665cfbd00ee6e0d7609f2c7ba0f28b4af70d0307ef78decfe42973915cd509de7c19ea0f3f5c3caaab05f9af08e2cc82d2c14b919dd045e3d36ce1c5d0ff23aed0a4a6ef508b5e71df0a25250d47f1e033ed503b6df99c189111b75b59df679cb75240b756cafecfd203568eeb2c1708fe9f11a2cb0f288590ec76cefbde09c90e9d568492aa5f41196397b70c869838c7164f2bad8eff017d021d7d41c9025c20b", 0xe5, 0x3}, {&(0x7f00000003c0)="792eb6eec33e561f18dc4b58b6a6fb3c7e6fd5e612c08490216ae02617f9811945929cffbf59727393a9a69d57b00a5cd08da3888884b8361d6a4003a54480c1086a5fc876582ff049ede86e2f58d80c7b6cf618e1ba36d4710887bc34ef2b7abbc686df2185f99998060bf492b84e3a02077e2aaf014e1186fde602d2b639d467f48fc2e18cf1553e07ac39040953566ab1d21aac627b166825375377bc3332b62160ea8bf7fc3196b30965dce6181bf7a1c60d0270f24ba60e633c8c88bbdefb5928dc8183c2ce0616de6c3185a4aa7eb2ec6ab7d8394a9536bf7e4f33f76294b0b4a390aca576177671191fe91530e9bd0db79cee", 0xf6, 0x100000000}, {&(0x7f00000004c0)="a90f49b744c1ad7c27bc0a3b1965ca2bce6602b5f5a8b294ced925862d0a9df5c88e43095ba5810ba49c2216e7e1a9b5f07075e6a3101e853557713e983b2f46cf599dc2cba6254802d01794cdc015e28e2b5aa8c10293a4487b3fe2469252f2c2406327b2a5fe71b185ec0adfdc824a237f94", 0x73, 0x7}], 0x21008, &(0x7f0000000900)={[{'.log\x00'}, {'-%('}, {'.log\x00'}], [{@appraise_type='appraise_type=imasig'}, {@fowner_eq={'fowner', 0x3d, 0xee01}}, {@hash='hash'}, {@subj_type={'subj_type', 0x3d, '-&'}}, {@hash='hash'}]}) ioctl$BTRFS_IOC_SUBVOL_SETFLAGS(r4, 0x4008941a, &(0x7f0000000980)=0xfe33b054cbbc4d79) [ 562.347563][T27310] loop5: detected capacity change from 264192 to 0 11:24:56 executing program 1: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x7f, 0x80000000008001}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x9}, 0x0) r1 = open(&(0x7f0000000240)='./file1\x00', 0x141142, 0x0) write$UHID_INPUT(r1, &(0x7f0000001440), 0xfffffc41) open(&(0x7f00000001c0)='./file1\x00', 0x0, 0xfffffffe) setxattr$trusted_overlay_nlink(&(0x7f0000000000)='./file1\x00', &(0x7f00000000c0)='trusted.overlay.nlink\x00', 0x0, 0x0, 0x0) 11:24:56 executing program 5: write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000540)=ANY=[@ANYBLOB="7f454c4601061f000400000000000000030038000800000032000000000000004000000000000000560200000000000007000000008038000100090002000100010000000100000006000000000000000400000000000000060000000000000001040000000000000200000000000000010000000000000051e574640400000001000000000000000400000000000000050000000000000005000000000000000400000000000000ff24444700000000908bc001727fbcd44f4d3bf922995edf2fd379eb00"/489], 0x2c4) r0 = inotify_init() r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) epoll_ctl$EPOLL_CTL_DEL(0xffffffffffffffff, 0x2, r1) inotify_add_watch(r0, &(0x7f0000000000)='.\x00', 0x400017e) r2 = openat$incfs(0xffffffffffffffff, &(0x7f0000000080)='.log\x00', 0x0, 0x0) fcntl$getownex(r2, 0x10, &(0x7f00000000c0)) r3 = open(&(0x7f0000000040)='./file0\x00', 0x200c2, 0x0) write$binfmt_elf64(r3, &(0x7f0000000080)=ANY=[], 0x8) sendfile(0xffffffffffffffff, r3, &(0x7f00000001c0), 0xa198) dup(0xffffffffffffffff) r4 = syz_mount_image$gfs2meta(&(0x7f0000000140)='gfs2meta\x00', &(0x7f0000000200)='./file0\x00', 0x1000, 0x4, &(0x7f0000000880)=[{&(0x7f0000000240)="77ba0daae1b2e74ecd52c59a85bf6f4b1f0b01ab07ba92bc6e57305406115f2bc3e4dd94f19ed896c4fccd34271e9dc3499af9298dbc709e0e6a513d61391d4b198af5f55d24239ae934e8babb8d1cb67bb17b0158", 0x55, 0x3}, {&(0x7f00000002c0)="ae227f954d229f666a6cd22938585e852071e55aa5728addcd315922bf32282e077bdbc63cd5ec89626ee2f8e7982ca239eaa758231056cdca22ca27428407f6c64c384665cfbd00ee6e0d7609f2c7ba0f28b4af70d0307ef78decfe42973915cd509de7c19ea0f3f5c3caaab05f9af08e2cc82d2c14b919dd045e3d36ce1c5d0ff23aed0a4a6ef508b5e71df0a25250d47f1e033ed503b6df99c189111b75b59df679cb75240b756cafecfd203568eeb2c1708fe9f11a2cb0f288590ec76cefbde09c90e9d568492aa5f41196397b70c869838c7164f2bad8eff017d021d7d41c9025c20b", 0xe5, 0x3}, {&(0x7f00000003c0)="792eb6eec33e561f18dc4b58b6a6fb3c7e6fd5e612c08490216ae02617f9811945929cffbf59727393a9a69d57b00a5cd08da3888884b8361d6a4003a54480c1086a5fc876582ff049ede86e2f58d80c7b6cf618e1ba36d4710887bc34ef2b7abbc686df2185f99998060bf492b84e3a02077e2aaf014e1186fde602d2b639d467f48fc2e18cf1553e07ac39040953566ab1d21aac627b166825375377bc3332b62160ea8bf7fc3196b30965dce6181bf7a1c60d0270f24ba60e633c8c88bbdefb5928dc8183c2ce0616de6c3185a4aa7eb2ec6ab7d8394a9536bf7e4f33f76294b0b4a390aca576177671191fe91530e9bd0db79cee", 0xf6, 0x100000000}, {&(0x7f00000004c0)="a90f49b744c1ad7c27bc0a3b1965ca2bce6602b5f5a8b294ced925862d0a9df5c88e43095ba5810ba49c2216e7e1a9b5f07075e6a3101e853557713e983b2f46cf599dc2cba6254802d01794cdc015e28e2b5aa8c10293a4487b3fe2469252f2c2406327b2a5fe71b185ec0adfdc824a237f94", 0x73, 0x7}], 0x21008, &(0x7f0000000900)={[{'.log\x00'}, {'-%('}, {'.log\x00'}], [{@appraise_type='appraise_type=imasig'}, {@fowner_eq={'fowner', 0x3d, 0xee01}}, {@hash='hash'}, {@subj_type={'subj_type', 0x3d, '-&'}}, {@hash='hash'}]}) ioctl$BTRFS_IOC_SUBVOL_SETFLAGS(r4, 0x4008941a, &(0x7f0000000980)=0xfe33b054cbbc4d79) [ 562.532463][T27320] loop5: detected capacity change from 264192 to 0 11:24:56 executing program 5: write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000540)=ANY=[@ANYBLOB="7f454c4601061f000400000000000000030038000800000032000000000000004000000000000000560200000000000007000000008038000100090002000100010000000100000006000000000000000400000000000000060000000000000001040000000000000200000000000000010000000000000051e574640400000001000000000000000400000000000000050000000000000005000000000000000400000000000000ff24444700000000908bc001727fbcd44f4d3bf922995edf2fd379eb00"/489], 0x2c4) r0 = inotify_init() r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) epoll_ctl$EPOLL_CTL_DEL(0xffffffffffffffff, 0x2, r1) inotify_add_watch(r0, &(0x7f0000000000)='.\x00', 0x400017e) r2 = openat$incfs(0xffffffffffffffff, &(0x7f0000000080)='.log\x00', 0x0, 0x0) fcntl$getownex(r2, 0x10, &(0x7f00000000c0)) r3 = open(&(0x7f0000000040)='./file0\x00', 0x200c2, 0x0) write$binfmt_elf64(r3, &(0x7f0000000080)=ANY=[], 0x8) sendfile(0xffffffffffffffff, r3, &(0x7f00000001c0), 0xa198) dup(0xffffffffffffffff) r4 = syz_mount_image$gfs2meta(&(0x7f0000000140)='gfs2meta\x00', &(0x7f0000000200)='./file0\x00', 0x1000, 0x4, &(0x7f0000000880)=[{&(0x7f0000000240)="77ba0daae1b2e74ecd52c59a85bf6f4b1f0b01ab07ba92bc6e57305406115f2bc3e4dd94f19ed896c4fccd34271e9dc3499af9298dbc709e0e6a513d61391d4b198af5f55d24239ae934e8babb8d1cb67bb17b0158", 0x55, 0x3}, {&(0x7f00000002c0)="ae227f954d229f666a6cd22938585e852071e55aa5728addcd315922bf32282e077bdbc63cd5ec89626ee2f8e7982ca239eaa758231056cdca22ca27428407f6c64c384665cfbd00ee6e0d7609f2c7ba0f28b4af70d0307ef78decfe42973915cd509de7c19ea0f3f5c3caaab05f9af08e2cc82d2c14b919dd045e3d36ce1c5d0ff23aed0a4a6ef508b5e71df0a25250d47f1e033ed503b6df99c189111b75b59df679cb75240b756cafecfd203568eeb2c1708fe9f11a2cb0f288590ec76cefbde09c90e9d568492aa5f41196397b70c869838c7164f2bad8eff017d021d7d41c9025c20b", 0xe5, 0x3}, {&(0x7f00000003c0)="792eb6eec33e561f18dc4b58b6a6fb3c7e6fd5e612c08490216ae02617f9811945929cffbf59727393a9a69d57b00a5cd08da3888884b8361d6a4003a54480c1086a5fc876582ff049ede86e2f58d80c7b6cf618e1ba36d4710887bc34ef2b7abbc686df2185f99998060bf492b84e3a02077e2aaf014e1186fde602d2b639d467f48fc2e18cf1553e07ac39040953566ab1d21aac627b166825375377bc3332b62160ea8bf7fc3196b30965dce6181bf7a1c60d0270f24ba60e633c8c88bbdefb5928dc8183c2ce0616de6c3185a4aa7eb2ec6ab7d8394a9536bf7e4f33f76294b0b4a390aca576177671191fe91530e9bd0db79cee", 0xf6, 0x100000000}, {&(0x7f00000004c0)="a90f49b744c1ad7c27bc0a3b1965ca2bce6602b5f5a8b294ced925862d0a9df5c88e43095ba5810ba49c2216e7e1a9b5f07075e6a3101e853557713e983b2f46cf599dc2cba6254802d01794cdc015e28e2b5aa8c10293a4487b3fe2469252f2c2406327b2a5fe71b185ec0adfdc824a237f94", 0x73, 0x7}], 0x21008, &(0x7f0000000900)={[{'.log\x00'}, {'-%('}, {'.log\x00'}], [{@appraise_type='appraise_type=imasig'}, {@fowner_eq={'fowner', 0x3d, 0xee01}}, {@hash='hash'}, {@subj_type={'subj_type', 0x3d, '-&'}}, {@hash='hash'}]}) ioctl$BTRFS_IOC_SUBVOL_SETFLAGS(r4, 0x4008941a, &(0x7f0000000980)=0xfe33b054cbbc4d79) 11:24:56 executing program 4: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x7f, 0x80000000008001}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x9}, 0x0) r1 = open(&(0x7f0000000240)='./file1\x00', 0x141142, 0x0) write$UHID_INPUT(r1, &(0x7f0000001440), 0xfffffc41) open(&(0x7f00000001c0)='./file1\x00', 0x0, 0xfffffff6) setxattr$trusted_overlay_nlink(&(0x7f0000000000)='./file1\x00', &(0x7f00000000c0)='trusted.overlay.nlink\x00', 0x0, 0x0, 0x0) [ 562.683333][T27331] loop5: detected capacity change from 264192 to 0 11:24:56 executing program 5: write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000540)=ANY=[@ANYBLOB="7f454c4601061f000400000000000000030038000800000032000000000000004000000000000000560200000000000007000000008038000100090002000100010000000100000006000000000000000400000000000000060000000000000001040000000000000200000000000000010000000000000051e574640400000001000000000000000400000000000000050000000000000005000000000000000400000000000000ff24444700000000908bc001727fbcd44f4d3bf922995edf2fd379eb00"/489], 0x2c4) r0 = inotify_init() r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) epoll_ctl$EPOLL_CTL_DEL(0xffffffffffffffff, 0x2, r1) inotify_add_watch(r0, &(0x7f0000000000)='.\x00', 0x400017e) r2 = openat$incfs(0xffffffffffffffff, &(0x7f0000000080)='.log\x00', 0x0, 0x0) fcntl$getownex(r2, 0x10, &(0x7f00000000c0)) r3 = open(&(0x7f0000000040)='./file0\x00', 0x200c2, 0x0) write$binfmt_elf64(r3, &(0x7f0000000080)=ANY=[], 0x8) sendfile(0xffffffffffffffff, r3, &(0x7f00000001c0), 0xa198) dup(0xffffffffffffffff) r4 = syz_mount_image$gfs2meta(&(0x7f0000000140)='gfs2meta\x00', &(0x7f0000000200)='./file0\x00', 0x1000, 0x4, &(0x7f0000000880)=[{&(0x7f0000000240)="77ba0daae1b2e74ecd52c59a85bf6f4b1f0b01ab07ba92bc6e57305406115f2bc3e4dd94f19ed896c4fccd34271e9dc3499af9298dbc709e0e6a513d61391d4b198af5f55d24239ae934e8babb8d1cb67bb17b0158", 0x55, 0x3}, {&(0x7f00000002c0)="ae227f954d229f666a6cd22938585e852071e55aa5728addcd315922bf32282e077bdbc63cd5ec89626ee2f8e7982ca239eaa758231056cdca22ca27428407f6c64c384665cfbd00ee6e0d7609f2c7ba0f28b4af70d0307ef78decfe42973915cd509de7c19ea0f3f5c3caaab05f9af08e2cc82d2c14b919dd045e3d36ce1c5d0ff23aed0a4a6ef508b5e71df0a25250d47f1e033ed503b6df99c189111b75b59df679cb75240b756cafecfd203568eeb2c1708fe9f11a2cb0f288590ec76cefbde09c90e9d568492aa5f41196397b70c869838c7164f2bad8eff017d021d7d41c9025c20b", 0xe5, 0x3}, {&(0x7f00000003c0)="792eb6eec33e561f18dc4b58b6a6fb3c7e6fd5e612c08490216ae02617f9811945929cffbf59727393a9a69d57b00a5cd08da3888884b8361d6a4003a54480c1086a5fc876582ff049ede86e2f58d80c7b6cf618e1ba36d4710887bc34ef2b7abbc686df2185f99998060bf492b84e3a02077e2aaf014e1186fde602d2b639d467f48fc2e18cf1553e07ac39040953566ab1d21aac627b166825375377bc3332b62160ea8bf7fc3196b30965dce6181bf7a1c60d0270f24ba60e633c8c88bbdefb5928dc8183c2ce0616de6c3185a4aa7eb2ec6ab7d8394a9536bf7e4f33f76294b0b4a390aca576177671191fe91530e9bd0db79cee", 0xf6, 0x100000000}, {&(0x7f00000004c0)="a90f49b744c1ad7c27bc0a3b1965ca2bce6602b5f5a8b294ced925862d0a9df5c88e43095ba5810ba49c2216e7e1a9b5f07075e6a3101e853557713e983b2f46cf599dc2cba6254802d01794cdc015e28e2b5aa8c10293a4487b3fe2469252f2c2406327b2a5fe71b185ec0adfdc824a237f94", 0x73, 0x7}], 0x21008, &(0x7f0000000900)={[{'.log\x00'}, {'-%('}, {'.log\x00'}], [{@appraise_type='appraise_type=imasig'}, {@fowner_eq={'fowner', 0x3d, 0xee01}}, {@hash='hash'}, {@subj_type={'subj_type', 0x3d, '-&'}}, {@hash='hash'}]}) ioctl$BTRFS_IOC_SUBVOL_SETFLAGS(r4, 0x4008941a, &(0x7f0000000980)=0xfe33b054cbbc4d79) [ 562.816960][T27341] loop5: detected capacity change from 264192 to 0 11:24:57 executing program 5: write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000540)=ANY=[@ANYBLOB="7f454c4601061f000400000000000000030038000800000032000000000000004000000000000000560200000000000007000000008038000100090002000100010000000100000006000000000000000400000000000000060000000000000001040000000000000200000000000000010000000000000051e574640400000001000000000000000400000000000000050000000000000005000000000000000400000000000000ff24444700000000908bc001727fbcd44f4d3bf922995edf2fd379eb00"/489], 0x2c4) r0 = inotify_init() r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) epoll_ctl$EPOLL_CTL_DEL(0xffffffffffffffff, 0x2, r1) inotify_add_watch(r0, &(0x7f0000000000)='.\x00', 0x400017e) r2 = openat$incfs(0xffffffffffffffff, &(0x7f0000000080)='.log\x00', 0x0, 0x0) fcntl$getownex(r2, 0x10, &(0x7f00000000c0)) r3 = open(&(0x7f0000000040)='./file0\x00', 0x200c2, 0x0) write$binfmt_elf64(r3, &(0x7f0000000080)=ANY=[], 0x8) sendfile(r3, 0xffffffffffffffff, &(0x7f00000001c0), 0xa198) dup(0xffffffffffffffff) r4 = syz_mount_image$gfs2meta(&(0x7f0000000140)='gfs2meta\x00', &(0x7f0000000200)='./file0\x00', 0x1000, 0x4, &(0x7f0000000880)=[{&(0x7f0000000240)="77ba0daae1b2e74ecd52c59a85bf6f4b1f0b01ab07ba92bc6e57305406115f2bc3e4dd94f19ed896c4fccd34271e9dc3499af9298dbc709e0e6a513d61391d4b198af5f55d24239ae934e8babb8d1cb67bb17b0158", 0x55, 0x3}, {&(0x7f00000002c0)="ae227f954d229f666a6cd22938585e852071e55aa5728addcd315922bf32282e077bdbc63cd5ec89626ee2f8e7982ca239eaa758231056cdca22ca27428407f6c64c384665cfbd00ee6e0d7609f2c7ba0f28b4af70d0307ef78decfe42973915cd509de7c19ea0f3f5c3caaab05f9af08e2cc82d2c14b919dd045e3d36ce1c5d0ff23aed0a4a6ef508b5e71df0a25250d47f1e033ed503b6df99c189111b75b59df679cb75240b756cafecfd203568eeb2c1708fe9f11a2cb0f288590ec76cefbde09c90e9d568492aa5f41196397b70c869838c7164f2bad8eff017d021d7d41c9025c20b", 0xe5, 0x3}, {&(0x7f00000003c0)="792eb6eec33e561f18dc4b58b6a6fb3c7e6fd5e612c08490216ae02617f9811945929cffbf59727393a9a69d57b00a5cd08da3888884b8361d6a4003a54480c1086a5fc876582ff049ede86e2f58d80c7b6cf618e1ba36d4710887bc34ef2b7abbc686df2185f99998060bf492b84e3a02077e2aaf014e1186fde602d2b639d467f48fc2e18cf1553e07ac39040953566ab1d21aac627b166825375377bc3332b62160ea8bf7fc3196b30965dce6181bf7a1c60d0270f24ba60e633c8c88bbdefb5928dc8183c2ce0616de6c3185a4aa7eb2ec6ab7d8394a9536bf7e4f33f76294b0b4a390aca576177671191fe91530e9bd0db79cee", 0xf6, 0x100000000}, {&(0x7f00000004c0)="a90f49b744c1ad7c27bc0a3b1965ca2bce6602b5f5a8b294ced925862d0a9df5c88e43095ba5810ba49c2216e7e1a9b5f07075e6a3101e853557713e983b2f46cf599dc2cba6254802d01794cdc015e28e2b5aa8c10293a4487b3fe2469252f2c2406327b2a5fe71b185ec0adfdc824a237f94", 0x73, 0x7}], 0x21008, &(0x7f0000000900)={[{'.log\x00'}, {'-%('}, {'.log\x00'}], [{@appraise_type='appraise_type=imasig'}, {@fowner_eq={'fowner', 0x3d, 0xee01}}, {@hash='hash'}, {@subj_type={'subj_type', 0x3d, '-&'}}, {@hash='hash'}]}) ioctl$BTRFS_IOC_SUBVOL_SETFLAGS(r4, 0x4008941a, &(0x7f0000000980)=0xfe33b054cbbc4d79) 11:24:57 executing program 2: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x7f, 0x80000000008001}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x9}, 0x0) r1 = open(&(0x7f0000000240)='./file1\x00', 0x141142, 0x0) write$UHID_INPUT(r1, &(0x7f0000001440)={0x8, {'\x00T\x00'}}, 0xfffffc41) open(&(0x7f00000001c0)='./file1\x00', 0x0, 0x0) setxattr$trusted_overlay_nlink(&(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x0, 0x0) [ 563.025798][T27350] loop5: detected capacity change from 264192 to 0 11:24:57 executing program 5: write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000540)=ANY=[@ANYBLOB="7f454c4601061f000400000000000000030038000800000032000000000000004000000000000000560200000000000007000000008038000100090002000100010000000100000006000000000000000400000000000000060000000000000001040000000000000200000000000000010000000000000051e574640400000001000000000000000400000000000000050000000000000005000000000000000400000000000000ff24444700000000908bc001727fbcd44f4d3bf922995edf2fd379eb00"/489], 0x2c4) r0 = inotify_init() r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) epoll_ctl$EPOLL_CTL_DEL(0xffffffffffffffff, 0x2, r1) inotify_add_watch(r0, &(0x7f0000000000)='.\x00', 0x400017e) r2 = openat$incfs(0xffffffffffffffff, &(0x7f0000000080)='.log\x00', 0x0, 0x0) fcntl$getownex(r2, 0x10, &(0x7f00000000c0)) r3 = open(&(0x7f0000000040)='./file0\x00', 0x200c2, 0x0) write$binfmt_elf64(r3, &(0x7f0000000080)=ANY=[], 0x8) sendfile(r3, 0xffffffffffffffff, &(0x7f00000001c0), 0xa198) dup(0xffffffffffffffff) r4 = syz_mount_image$gfs2meta(&(0x7f0000000140)='gfs2meta\x00', &(0x7f0000000200)='./file0\x00', 0x1000, 0x4, &(0x7f0000000880)=[{&(0x7f0000000240)="77ba0daae1b2e74ecd52c59a85bf6f4b1f0b01ab07ba92bc6e57305406115f2bc3e4dd94f19ed896c4fccd34271e9dc3499af9298dbc709e0e6a513d61391d4b198af5f55d24239ae934e8babb8d1cb67bb17b0158", 0x55, 0x3}, {&(0x7f00000002c0)="ae227f954d229f666a6cd22938585e852071e55aa5728addcd315922bf32282e077bdbc63cd5ec89626ee2f8e7982ca239eaa758231056cdca22ca27428407f6c64c384665cfbd00ee6e0d7609f2c7ba0f28b4af70d0307ef78decfe42973915cd509de7c19ea0f3f5c3caaab05f9af08e2cc82d2c14b919dd045e3d36ce1c5d0ff23aed0a4a6ef508b5e71df0a25250d47f1e033ed503b6df99c189111b75b59df679cb75240b756cafecfd203568eeb2c1708fe9f11a2cb0f288590ec76cefbde09c90e9d568492aa5f41196397b70c869838c7164f2bad8eff017d021d7d41c9025c20b", 0xe5, 0x3}, {&(0x7f00000003c0)="792eb6eec33e561f18dc4b58b6a6fb3c7e6fd5e612c08490216ae02617f9811945929cffbf59727393a9a69d57b00a5cd08da3888884b8361d6a4003a54480c1086a5fc876582ff049ede86e2f58d80c7b6cf618e1ba36d4710887bc34ef2b7abbc686df2185f99998060bf492b84e3a02077e2aaf014e1186fde602d2b639d467f48fc2e18cf1553e07ac39040953566ab1d21aac627b166825375377bc3332b62160ea8bf7fc3196b30965dce6181bf7a1c60d0270f24ba60e633c8c88bbdefb5928dc8183c2ce0616de6c3185a4aa7eb2ec6ab7d8394a9536bf7e4f33f76294b0b4a390aca576177671191fe91530e9bd0db79cee", 0xf6, 0x100000000}, {&(0x7f00000004c0)="a90f49b744c1ad7c27bc0a3b1965ca2bce6602b5f5a8b294ced925862d0a9df5c88e43095ba5810ba49c2216e7e1a9b5f07075e6a3101e853557713e983b2f46cf599dc2cba6254802d01794cdc015e28e2b5aa8c10293a4487b3fe2469252f2c2406327b2a5fe71b185ec0adfdc824a237f94", 0x73, 0x7}], 0x21008, &(0x7f0000000900)={[{'.log\x00'}, {'-%('}, {'.log\x00'}], [{@appraise_type='appraise_type=imasig'}, {@fowner_eq={'fowner', 0x3d, 0xee01}}, {@hash='hash'}, {@subj_type={'subj_type', 0x3d, '-&'}}, {@hash='hash'}]}) ioctl$BTRFS_IOC_SUBVOL_SETFLAGS(r4, 0x4008941a, &(0x7f0000000980)=0xfe33b054cbbc4d79) [ 563.205526][T27358] loop5: detected capacity change from 264192 to 0 11:24:57 executing program 3: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x7f, 0x80000000008001}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x9}, 0x0) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000080)) r1 = open(&(0x7f0000000240)='./file1\x00', 0x141142, 0x0) write$UHID_INPUT(r1, &(0x7f0000001440)={0x8, {'\x00Q\x00'}}, 0xfffffc41) open(&(0x7f00000001c0)='./file1\x00', 0x0, 0x0) setxattr$trusted_overlay_nlink(&(0x7f0000000000)='./file1\x00', &(0x7f00000000c0)='trusted.overlay.nlink\x00', 0x0, 0x0, 0x0) 11:24:57 executing program 0: r0 = perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x5c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write$binfmt_elf64(r0, &(0x7f0000000540)=ANY=[@ANYBLOB], 0x2c4) r1 = inotify_init() openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) epoll_ctl$EPOLL_CTL_DEL(0xffffffffffffffff, 0x2, 0xffffffffffffffff) inotify_add_watch(r1, &(0x7f0000000000)='.\x00', 0x400017e) r2 = openat$incfs(0xffffffffffffffff, &(0x7f0000000080)='.log\x00', 0x20200, 0x40) fcntl$getownex(r2, 0x10, &(0x7f00000000c0)) r3 = open(&(0x7f0000000040)='./file0\x00', 0x200c2, 0x0) write$binfmt_elf64(r3, &(0x7f0000000080)=ANY=[], 0x8) sendfile(r3, r3, &(0x7f00000001c0), 0xa198) dup(0xffffffffffffffff) r4 = syz_mount_image$gfs2meta(&(0x7f0000000140)='gfs2meta\x00', &(0x7f0000000200)='./file0\x00', 0x1000, 0x0, 0x0, 0x21008, &(0x7f0000000900)={[{'.log\x00'}, {'-%('}, {'.log\x00'}], [{@obj_user={'obj_user'}}, {@appraise_type='appraise_type=imasig'}, {@fowner_eq={'fowner', 0x3d, 0xee01}}, {@hash='hash'}, {@subj_type={'subj_type', 0x3d, '-&'}}]}) ioctl$BTRFS_IOC_SUBVOL_SETFLAGS(r4, 0x4008941a, &(0x7f0000000980)=0xfe33b054cbbc4d79) 11:24:57 executing program 5: write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000540)=ANY=[@ANYBLOB="7f454c4601061f000400000000000000030038000800000032000000000000004000000000000000560200000000000007000000008038000100090002000100010000000100000006000000000000000400000000000000060000000000000001040000000000000200000000000000010000000000000051e574640400000001000000000000000400000000000000050000000000000005000000000000000400000000000000ff24444700000000908bc001727fbcd44f4d3bf922995edf2fd379eb00"/489], 0x2c4) r0 = inotify_init() r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) epoll_ctl$EPOLL_CTL_DEL(0xffffffffffffffff, 0x2, r1) inotify_add_watch(r0, &(0x7f0000000000)='.\x00', 0x400017e) r2 = openat$incfs(0xffffffffffffffff, &(0x7f0000000080)='.log\x00', 0x0, 0x0) fcntl$getownex(r2, 0x10, &(0x7f00000000c0)) r3 = open(&(0x7f0000000040)='./file0\x00', 0x200c2, 0x0) write$binfmt_elf64(r3, &(0x7f0000000080)=ANY=[], 0x8) sendfile(r3, 0xffffffffffffffff, &(0x7f00000001c0), 0xa198) dup(0xffffffffffffffff) r4 = syz_mount_image$gfs2meta(&(0x7f0000000140)='gfs2meta\x00', &(0x7f0000000200)='./file0\x00', 0x1000, 0x4, &(0x7f0000000880)=[{&(0x7f0000000240)="77ba0daae1b2e74ecd52c59a85bf6f4b1f0b01ab07ba92bc6e57305406115f2bc3e4dd94f19ed896c4fccd34271e9dc3499af9298dbc709e0e6a513d61391d4b198af5f55d24239ae934e8babb8d1cb67bb17b0158", 0x55, 0x3}, {&(0x7f00000002c0)="ae227f954d229f666a6cd22938585e852071e55aa5728addcd315922bf32282e077bdbc63cd5ec89626ee2f8e7982ca239eaa758231056cdca22ca27428407f6c64c384665cfbd00ee6e0d7609f2c7ba0f28b4af70d0307ef78decfe42973915cd509de7c19ea0f3f5c3caaab05f9af08e2cc82d2c14b919dd045e3d36ce1c5d0ff23aed0a4a6ef508b5e71df0a25250d47f1e033ed503b6df99c189111b75b59df679cb75240b756cafecfd203568eeb2c1708fe9f11a2cb0f288590ec76cefbde09c90e9d568492aa5f41196397b70c869838c7164f2bad8eff017d021d7d41c9025c20b", 0xe5, 0x3}, {&(0x7f00000003c0)="792eb6eec33e561f18dc4b58b6a6fb3c7e6fd5e612c08490216ae02617f9811945929cffbf59727393a9a69d57b00a5cd08da3888884b8361d6a4003a54480c1086a5fc876582ff049ede86e2f58d80c7b6cf618e1ba36d4710887bc34ef2b7abbc686df2185f99998060bf492b84e3a02077e2aaf014e1186fde602d2b639d467f48fc2e18cf1553e07ac39040953566ab1d21aac627b166825375377bc3332b62160ea8bf7fc3196b30965dce6181bf7a1c60d0270f24ba60e633c8c88bbdefb5928dc8183c2ce0616de6c3185a4aa7eb2ec6ab7d8394a9536bf7e4f33f76294b0b4a390aca576177671191fe91530e9bd0db79cee", 0xf6, 0x100000000}, {&(0x7f00000004c0)="a90f49b744c1ad7c27bc0a3b1965ca2bce6602b5f5a8b294ced925862d0a9df5c88e43095ba5810ba49c2216e7e1a9b5f07075e6a3101e853557713e983b2f46cf599dc2cba6254802d01794cdc015e28e2b5aa8c10293a4487b3fe2469252f2c2406327b2a5fe71b185ec0adfdc824a237f94", 0x73, 0x7}], 0x21008, &(0x7f0000000900)={[{'.log\x00'}, {'-%('}, {'.log\x00'}], [{@appraise_type='appraise_type=imasig'}, {@fowner_eq={'fowner', 0x3d, 0xee01}}, {@hash='hash'}, {@subj_type={'subj_type', 0x3d, '-&'}}, {@hash='hash'}]}) ioctl$BTRFS_IOC_SUBVOL_SETFLAGS(r4, 0x4008941a, &(0x7f0000000980)=0xfe33b054cbbc4d79) 11:24:57 executing program 1: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x7f, 0x80000000008001}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x9}, 0x0) r1 = open(&(0x7f0000000240)='./file1\x00', 0x141142, 0x0) write$UHID_INPUT(r1, &(0x7f0000001440), 0xfffffc41) open(&(0x7f00000001c0)='./file1\x00', 0x0, 0x1000000000000) setxattr$trusted_overlay_nlink(&(0x7f0000000000)='./file1\x00', &(0x7f00000000c0)='trusted.overlay.nlink\x00', 0x0, 0x0, 0x0) [ 563.475646][T27368] loop5: detected capacity change from 264192 to 0 11:24:57 executing program 5: write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000540)=ANY=[@ANYBLOB="7f454c4601061f000400000000000000030038000800000032000000000000004000000000000000560200000000000007000000008038000100090002000100010000000100000006000000000000000400000000000000060000000000000001040000000000000200000000000000010000000000000051e574640400000001000000000000000400000000000000050000000000000005000000000000000400000000000000ff24444700000000908bc001727fbcd44f4d3bf922995edf2fd379eb00"/489], 0x2c4) r0 = inotify_init() r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) epoll_ctl$EPOLL_CTL_DEL(0xffffffffffffffff, 0x2, r1) inotify_add_watch(r0, &(0x7f0000000000)='.\x00', 0x400017e) r2 = openat$incfs(0xffffffffffffffff, &(0x7f0000000080)='.log\x00', 0x0, 0x0) fcntl$getownex(r2, 0x10, &(0x7f00000000c0)) r3 = open(&(0x7f0000000040)='./file0\x00', 0x200c2, 0x0) write$binfmt_elf64(r3, &(0x7f0000000080)=ANY=[], 0x8) sendfile(r3, r3, 0x0, 0xa198) dup(0xffffffffffffffff) r4 = syz_mount_image$gfs2meta(&(0x7f0000000140)='gfs2meta\x00', &(0x7f0000000200)='./file0\x00', 0x1000, 0x4, &(0x7f0000000880)=[{&(0x7f0000000240)="77ba0daae1b2e74ecd52c59a85bf6f4b1f0b01ab07ba92bc6e57305406115f2bc3e4dd94f19ed896c4fccd34271e9dc3499af9298dbc709e0e6a513d61391d4b198af5f55d24239ae934e8babb8d1cb67bb17b0158", 0x55, 0x3}, {&(0x7f00000002c0)="ae227f954d229f666a6cd22938585e852071e55aa5728addcd315922bf32282e077bdbc63cd5ec89626ee2f8e7982ca239eaa758231056cdca22ca27428407f6c64c384665cfbd00ee6e0d7609f2c7ba0f28b4af70d0307ef78decfe42973915cd509de7c19ea0f3f5c3caaab05f9af08e2cc82d2c14b919dd045e3d36ce1c5d0ff23aed0a4a6ef508b5e71df0a25250d47f1e033ed503b6df99c189111b75b59df679cb75240b756cafecfd203568eeb2c1708fe9f11a2cb0f288590ec76cefbde09c90e9d568492aa5f41196397b70c869838c7164f2bad8eff017d021d7d41c9025c20b", 0xe5, 0x3}, {&(0x7f00000003c0)="792eb6eec33e561f18dc4b58b6a6fb3c7e6fd5e612c08490216ae02617f9811945929cffbf59727393a9a69d57b00a5cd08da3888884b8361d6a4003a54480c1086a5fc876582ff049ede86e2f58d80c7b6cf618e1ba36d4710887bc34ef2b7abbc686df2185f99998060bf492b84e3a02077e2aaf014e1186fde602d2b639d467f48fc2e18cf1553e07ac39040953566ab1d21aac627b166825375377bc3332b62160ea8bf7fc3196b30965dce6181bf7a1c60d0270f24ba60e633c8c88bbdefb5928dc8183c2ce0616de6c3185a4aa7eb2ec6ab7d8394a9536bf7e4f33f76294b0b4a390aca576177671191fe91530e9bd0db79cee", 0xf6, 0x100000000}, {&(0x7f00000004c0)="a90f49b744c1ad7c27bc0a3b1965ca2bce6602b5f5a8b294ced925862d0a9df5c88e43095ba5810ba49c2216e7e1a9b5f07075e6a3101e853557713e983b2f46cf599dc2cba6254802d01794cdc015e28e2b5aa8c10293a4487b3fe2469252f2c2406327b2a5fe71b185ec0adfdc824a237f94", 0x73, 0x7}], 0x21008, &(0x7f0000000900)={[{'.log\x00'}, {'-%('}, {'.log\x00'}], [{@appraise_type='appraise_type=imasig'}, {@fowner_eq={'fowner', 0x3d, 0xee01}}, {@hash='hash'}, {@subj_type={'subj_type', 0x3d, '-&'}}, {@hash='hash'}]}) ioctl$BTRFS_IOC_SUBVOL_SETFLAGS(r4, 0x4008941a, &(0x7f0000000980)=0xfe33b054cbbc4d79) 11:24:57 executing program 4: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x7f, 0x80000000008001}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x9}, 0x0) r1 = open(&(0x7f0000000240)='./file1\x00', 0x141142, 0x0) write$UHID_INPUT(r1, &(0x7f0000001440), 0xfffffc41) open(&(0x7f00000001c0)='./file1\x00', 0x0, 0xfffffff6) setxattr$trusted_overlay_nlink(&(0x7f0000000000)='./file1\x00', &(0x7f00000000c0)='trusted.overlay.nlink\x00', 0x0, 0x0, 0x0) [ 563.649400][T27375] loop5: detected capacity change from 264192 to 0 11:24:57 executing program 5: write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000540)=ANY=[@ANYBLOB="7f454c4601061f000400000000000000030038000800000032000000000000004000000000000000560200000000000007000000008038000100090002000100010000000100000006000000000000000400000000000000060000000000000001040000000000000200000000000000010000000000000051e574640400000001000000000000000400000000000000050000000000000005000000000000000400000000000000ff24444700000000908bc001727fbcd44f4d3bf922995edf2fd379eb00"/489], 0x2c4) r0 = inotify_init() r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) epoll_ctl$EPOLL_CTL_DEL(0xffffffffffffffff, 0x2, r1) inotify_add_watch(r0, &(0x7f0000000000)='.\x00', 0x400017e) r2 = openat$incfs(0xffffffffffffffff, &(0x7f0000000080)='.log\x00', 0x0, 0x0) fcntl$getownex(r2, 0x10, &(0x7f00000000c0)) r3 = open(&(0x7f0000000040)='./file0\x00', 0x200c2, 0x0) write$binfmt_elf64(r3, &(0x7f0000000080)=ANY=[], 0x8) sendfile(r3, r3, 0x0, 0xa198) dup(0xffffffffffffffff) r4 = syz_mount_image$gfs2meta(&(0x7f0000000140)='gfs2meta\x00', &(0x7f0000000200)='./file0\x00', 0x1000, 0x4, &(0x7f0000000880)=[{&(0x7f0000000240)="77ba0daae1b2e74ecd52c59a85bf6f4b1f0b01ab07ba92bc6e57305406115f2bc3e4dd94f19ed896c4fccd34271e9dc3499af9298dbc709e0e6a513d61391d4b198af5f55d24239ae934e8babb8d1cb67bb17b0158", 0x55, 0x3}, {&(0x7f00000002c0)="ae227f954d229f666a6cd22938585e852071e55aa5728addcd315922bf32282e077bdbc63cd5ec89626ee2f8e7982ca239eaa758231056cdca22ca27428407f6c64c384665cfbd00ee6e0d7609f2c7ba0f28b4af70d0307ef78decfe42973915cd509de7c19ea0f3f5c3caaab05f9af08e2cc82d2c14b919dd045e3d36ce1c5d0ff23aed0a4a6ef508b5e71df0a25250d47f1e033ed503b6df99c189111b75b59df679cb75240b756cafecfd203568eeb2c1708fe9f11a2cb0f288590ec76cefbde09c90e9d568492aa5f41196397b70c869838c7164f2bad8eff017d021d7d41c9025c20b", 0xe5, 0x3}, {&(0x7f00000003c0)="792eb6eec33e561f18dc4b58b6a6fb3c7e6fd5e612c08490216ae02617f9811945929cffbf59727393a9a69d57b00a5cd08da3888884b8361d6a4003a54480c1086a5fc876582ff049ede86e2f58d80c7b6cf618e1ba36d4710887bc34ef2b7abbc686df2185f99998060bf492b84e3a02077e2aaf014e1186fde602d2b639d467f48fc2e18cf1553e07ac39040953566ab1d21aac627b166825375377bc3332b62160ea8bf7fc3196b30965dce6181bf7a1c60d0270f24ba60e633c8c88bbdefb5928dc8183c2ce0616de6c3185a4aa7eb2ec6ab7d8394a9536bf7e4f33f76294b0b4a390aca576177671191fe91530e9bd0db79cee", 0xf6, 0x100000000}, {&(0x7f00000004c0)="a90f49b744c1ad7c27bc0a3b1965ca2bce6602b5f5a8b294ced925862d0a9df5c88e43095ba5810ba49c2216e7e1a9b5f07075e6a3101e853557713e983b2f46cf599dc2cba6254802d01794cdc015e28e2b5aa8c10293a4487b3fe2469252f2c2406327b2a5fe71b185ec0adfdc824a237f94", 0x73, 0x7}], 0x21008, &(0x7f0000000900)={[{'.log\x00'}, {'-%('}, {'.log\x00'}], [{@appraise_type='appraise_type=imasig'}, {@fowner_eq={'fowner', 0x3d, 0xee01}}, {@hash='hash'}, {@subj_type={'subj_type', 0x3d, '-&'}}, {@hash='hash'}]}) ioctl$BTRFS_IOC_SUBVOL_SETFLAGS(r4, 0x4008941a, &(0x7f0000000980)=0xfe33b054cbbc4d79) [ 563.797054][T27387] loop5: detected capacity change from 264192 to 0 11:24:57 executing program 5: write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000540)=ANY=[@ANYBLOB="7f454c4601061f000400000000000000030038000800000032000000000000004000000000000000560200000000000007000000008038000100090002000100010000000100000006000000000000000400000000000000060000000000000001040000000000000200000000000000010000000000000051e574640400000001000000000000000400000000000000050000000000000005000000000000000400000000000000ff24444700000000908bc001727fbcd44f4d3bf922995edf2fd379eb00"/489], 0x2c4) r0 = inotify_init() r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) epoll_ctl$EPOLL_CTL_DEL(0xffffffffffffffff, 0x2, r1) inotify_add_watch(r0, &(0x7f0000000000)='.\x00', 0x400017e) r2 = openat$incfs(0xffffffffffffffff, &(0x7f0000000080)='.log\x00', 0x0, 0x0) fcntl$getownex(r2, 0x10, &(0x7f00000000c0)) r3 = open(&(0x7f0000000040)='./file0\x00', 0x200c2, 0x0) write$binfmt_elf64(r3, &(0x7f0000000080)=ANY=[], 0x8) sendfile(r3, r3, 0x0, 0xa198) dup(0xffffffffffffffff) r4 = syz_mount_image$gfs2meta(&(0x7f0000000140)='gfs2meta\x00', &(0x7f0000000200)='./file0\x00', 0x1000, 0x4, &(0x7f0000000880)=[{&(0x7f0000000240)="77ba0daae1b2e74ecd52c59a85bf6f4b1f0b01ab07ba92bc6e57305406115f2bc3e4dd94f19ed896c4fccd34271e9dc3499af9298dbc709e0e6a513d61391d4b198af5f55d24239ae934e8babb8d1cb67bb17b0158", 0x55, 0x3}, {&(0x7f00000002c0)="ae227f954d229f666a6cd22938585e852071e55aa5728addcd315922bf32282e077bdbc63cd5ec89626ee2f8e7982ca239eaa758231056cdca22ca27428407f6c64c384665cfbd00ee6e0d7609f2c7ba0f28b4af70d0307ef78decfe42973915cd509de7c19ea0f3f5c3caaab05f9af08e2cc82d2c14b919dd045e3d36ce1c5d0ff23aed0a4a6ef508b5e71df0a25250d47f1e033ed503b6df99c189111b75b59df679cb75240b756cafecfd203568eeb2c1708fe9f11a2cb0f288590ec76cefbde09c90e9d568492aa5f41196397b70c869838c7164f2bad8eff017d021d7d41c9025c20b", 0xe5, 0x3}, {&(0x7f00000003c0)="792eb6eec33e561f18dc4b58b6a6fb3c7e6fd5e612c08490216ae02617f9811945929cffbf59727393a9a69d57b00a5cd08da3888884b8361d6a4003a54480c1086a5fc876582ff049ede86e2f58d80c7b6cf618e1ba36d4710887bc34ef2b7abbc686df2185f99998060bf492b84e3a02077e2aaf014e1186fde602d2b639d467f48fc2e18cf1553e07ac39040953566ab1d21aac627b166825375377bc3332b62160ea8bf7fc3196b30965dce6181bf7a1c60d0270f24ba60e633c8c88bbdefb5928dc8183c2ce0616de6c3185a4aa7eb2ec6ab7d8394a9536bf7e4f33f76294b0b4a390aca576177671191fe91530e9bd0db79cee", 0xf6, 0x100000000}, {&(0x7f00000004c0)="a90f49b744c1ad7c27bc0a3b1965ca2bce6602b5f5a8b294ced925862d0a9df5c88e43095ba5810ba49c2216e7e1a9b5f07075e6a3101e853557713e983b2f46cf599dc2cba6254802d01794cdc015e28e2b5aa8c10293a4487b3fe2469252f2c2406327b2a5fe71b185ec0adfdc824a237f94", 0x73, 0x7}], 0x21008, &(0x7f0000000900)={[{'.log\x00'}, {'-%('}, {'.log\x00'}], [{@appraise_type='appraise_type=imasig'}, {@fowner_eq={'fowner', 0x3d, 0xee01}}, {@hash='hash'}, {@subj_type={'subj_type', 0x3d, '-&'}}, {@hash='hash'}]}) ioctl$BTRFS_IOC_SUBVOL_SETFLAGS(r4, 0x4008941a, &(0x7f0000000980)=0xfe33b054cbbc4d79) [ 563.945913][T27399] loop5: detected capacity change from 264192 to 0 11:24:58 executing program 5: write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000540)=ANY=[@ANYBLOB="7f454c4601061f000400000000000000030038000800000032000000000000004000000000000000560200000000000007000000008038000100090002000100010000000100000006000000000000000400000000000000060000000000000001040000000000000200000000000000010000000000000051e574640400000001000000000000000400000000000000050000000000000005000000000000000400000000000000ff24444700000000908bc001727fbcd44f4d3bf922995edf2fd379eb00"/489], 0x2c4) r0 = inotify_init() r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) epoll_ctl$EPOLL_CTL_DEL(0xffffffffffffffff, 0x2, r1) inotify_add_watch(r0, &(0x7f0000000000)='.\x00', 0x400017e) r2 = openat$incfs(0xffffffffffffffff, &(0x7f0000000080)='.log\x00', 0x0, 0x0) fcntl$getownex(r2, 0x10, &(0x7f00000000c0)) r3 = open(&(0x7f0000000040)='./file0\x00', 0x200c2, 0x0) write$binfmt_elf64(r3, &(0x7f0000000080)=ANY=[], 0x8) sendfile(r3, r3, &(0x7f00000001c0), 0x0) dup(0xffffffffffffffff) r4 = syz_mount_image$gfs2meta(&(0x7f0000000140)='gfs2meta\x00', &(0x7f0000000200)='./file0\x00', 0x1000, 0x4, &(0x7f0000000880)=[{&(0x7f0000000240)="77ba0daae1b2e74ecd52c59a85bf6f4b1f0b01ab07ba92bc6e57305406115f2bc3e4dd94f19ed896c4fccd34271e9dc3499af9298dbc709e0e6a513d61391d4b198af5f55d24239ae934e8babb8d1cb67bb17b0158", 0x55, 0x3}, {&(0x7f00000002c0)="ae227f954d229f666a6cd22938585e852071e55aa5728addcd315922bf32282e077bdbc63cd5ec89626ee2f8e7982ca239eaa758231056cdca22ca27428407f6c64c384665cfbd00ee6e0d7609f2c7ba0f28b4af70d0307ef78decfe42973915cd509de7c19ea0f3f5c3caaab05f9af08e2cc82d2c14b919dd045e3d36ce1c5d0ff23aed0a4a6ef508b5e71df0a25250d47f1e033ed503b6df99c189111b75b59df679cb75240b756cafecfd203568eeb2c1708fe9f11a2cb0f288590ec76cefbde09c90e9d568492aa5f41196397b70c869838c7164f2bad8eff017d021d7d41c9025c20b", 0xe5, 0x3}, {&(0x7f00000003c0)="792eb6eec33e561f18dc4b58b6a6fb3c7e6fd5e612c08490216ae02617f9811945929cffbf59727393a9a69d57b00a5cd08da3888884b8361d6a4003a54480c1086a5fc876582ff049ede86e2f58d80c7b6cf618e1ba36d4710887bc34ef2b7abbc686df2185f99998060bf492b84e3a02077e2aaf014e1186fde602d2b639d467f48fc2e18cf1553e07ac39040953566ab1d21aac627b166825375377bc3332b62160ea8bf7fc3196b30965dce6181bf7a1c60d0270f24ba60e633c8c88bbdefb5928dc8183c2ce0616de6c3185a4aa7eb2ec6ab7d8394a9536bf7e4f33f76294b0b4a390aca576177671191fe91530e9bd0db79cee", 0xf6, 0x100000000}, {&(0x7f00000004c0)="a90f49b744c1ad7c27bc0a3b1965ca2bce6602b5f5a8b294ced925862d0a9df5c88e43095ba5810ba49c2216e7e1a9b5f07075e6a3101e853557713e983b2f46cf599dc2cba6254802d01794cdc015e28e2b5aa8c10293a4487b3fe2469252f2c2406327b2a5fe71b185ec0adfdc824a237f94", 0x73, 0x7}], 0x21008, &(0x7f0000000900)={[{'.log\x00'}, {'-%('}, {'.log\x00'}], [{@appraise_type='appraise_type=imasig'}, {@fowner_eq={'fowner', 0x3d, 0xee01}}, {@hash='hash'}, {@subj_type={'subj_type', 0x3d, '-&'}}, {@hash='hash'}]}) ioctl$BTRFS_IOC_SUBVOL_SETFLAGS(r4, 0x4008941a, &(0x7f0000000980)=0xfe33b054cbbc4d79) 11:24:58 executing program 2: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x7f, 0x80000000008001}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x9}, 0x0) r1 = open(&(0x7f0000000240)='./file1\x00', 0x141142, 0x0) write$UHID_INPUT(r1, &(0x7f0000001440)={0x8, {'\x00U\x00'}}, 0xfffffc41) open(&(0x7f00000001c0)='./file1\x00', 0x0, 0x0) setxattr$trusted_overlay_nlink(&(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x0, 0x0) [ 564.167165][T27409] loop5: detected capacity change from 264192 to 0 11:24:58 executing program 5: write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000540)=ANY=[@ANYBLOB="7f454c4601061f000400000000000000030038000800000032000000000000004000000000000000560200000000000007000000008038000100090002000100010000000100000006000000000000000400000000000000060000000000000001040000000000000200000000000000010000000000000051e574640400000001000000000000000400000000000000050000000000000005000000000000000400000000000000ff24444700000000908bc001727fbcd44f4d3bf922995edf2fd379eb00"/489], 0x2c4) r0 = inotify_init() r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) epoll_ctl$EPOLL_CTL_DEL(0xffffffffffffffff, 0x2, r1) inotify_add_watch(r0, &(0x7f0000000000)='.\x00', 0x400017e) r2 = openat$incfs(0xffffffffffffffff, &(0x7f0000000080)='.log\x00', 0x0, 0x0) fcntl$getownex(r2, 0x10, &(0x7f00000000c0)) r3 = open(&(0x7f0000000040)='./file0\x00', 0x200c2, 0x0) write$binfmt_elf64(r3, &(0x7f0000000080)=ANY=[], 0x8) sendfile(r3, r3, &(0x7f00000001c0), 0x0) dup(0xffffffffffffffff) r4 = syz_mount_image$gfs2meta(&(0x7f0000000140)='gfs2meta\x00', &(0x7f0000000200)='./file0\x00', 0x1000, 0x4, &(0x7f0000000880)=[{&(0x7f0000000240)="77ba0daae1b2e74ecd52c59a85bf6f4b1f0b01ab07ba92bc6e57305406115f2bc3e4dd94f19ed896c4fccd34271e9dc3499af9298dbc709e0e6a513d61391d4b198af5f55d24239ae934e8babb8d1cb67bb17b0158", 0x55, 0x3}, {&(0x7f00000002c0)="ae227f954d229f666a6cd22938585e852071e55aa5728addcd315922bf32282e077bdbc63cd5ec89626ee2f8e7982ca239eaa758231056cdca22ca27428407f6c64c384665cfbd00ee6e0d7609f2c7ba0f28b4af70d0307ef78decfe42973915cd509de7c19ea0f3f5c3caaab05f9af08e2cc82d2c14b919dd045e3d36ce1c5d0ff23aed0a4a6ef508b5e71df0a25250d47f1e033ed503b6df99c189111b75b59df679cb75240b756cafecfd203568eeb2c1708fe9f11a2cb0f288590ec76cefbde09c90e9d568492aa5f41196397b70c869838c7164f2bad8eff017d021d7d41c9025c20b", 0xe5, 0x3}, {&(0x7f00000003c0)="792eb6eec33e561f18dc4b58b6a6fb3c7e6fd5e612c08490216ae02617f9811945929cffbf59727393a9a69d57b00a5cd08da3888884b8361d6a4003a54480c1086a5fc876582ff049ede86e2f58d80c7b6cf618e1ba36d4710887bc34ef2b7abbc686df2185f99998060bf492b84e3a02077e2aaf014e1186fde602d2b639d467f48fc2e18cf1553e07ac39040953566ab1d21aac627b166825375377bc3332b62160ea8bf7fc3196b30965dce6181bf7a1c60d0270f24ba60e633c8c88bbdefb5928dc8183c2ce0616de6c3185a4aa7eb2ec6ab7d8394a9536bf7e4f33f76294b0b4a390aca576177671191fe91530e9bd0db79cee", 0xf6, 0x100000000}, {&(0x7f00000004c0)="a90f49b744c1ad7c27bc0a3b1965ca2bce6602b5f5a8b294ced925862d0a9df5c88e43095ba5810ba49c2216e7e1a9b5f07075e6a3101e853557713e983b2f46cf599dc2cba6254802d01794cdc015e28e2b5aa8c10293a4487b3fe2469252f2c2406327b2a5fe71b185ec0adfdc824a237f94", 0x73, 0x7}], 0x21008, &(0x7f0000000900)={[{'.log\x00'}, {'-%('}, {'.log\x00'}], [{@appraise_type='appraise_type=imasig'}, {@fowner_eq={'fowner', 0x3d, 0xee01}}, {@hash='hash'}, {@subj_type={'subj_type', 0x3d, '-&'}}, {@hash='hash'}]}) ioctl$BTRFS_IOC_SUBVOL_SETFLAGS(r4, 0x4008941a, &(0x7f0000000980)=0xfe33b054cbbc4d79) 11:24:58 executing program 0: r0 = perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x5c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write$binfmt_elf64(r0, &(0x7f0000000540)=ANY=[@ANYBLOB], 0x2c4) r1 = inotify_init() openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) epoll_ctl$EPOLL_CTL_DEL(0xffffffffffffffff, 0x2, 0xffffffffffffffff) inotify_add_watch(r1, &(0x7f0000000000)='.\x00', 0x400017e) r2 = openat$incfs(0xffffffffffffffff, &(0x7f0000000080)='.log\x00', 0x20200, 0x40) fcntl$getownex(r2, 0x10, &(0x7f00000000c0)) r3 = open(&(0x7f0000000040)='./file0\x00', 0x200c2, 0x0) write$binfmt_elf64(r3, &(0x7f0000000080)=ANY=[], 0x8) sendfile(r3, r3, &(0x7f00000001c0), 0xa198) dup(0xffffffffffffffff) r4 = syz_mount_image$gfs2meta(&(0x7f0000000140)='gfs2meta\x00', &(0x7f0000000200)='./file0\x00', 0x1000, 0x3, &(0x7f0000000880)=[{&(0x7f0000000240)="77ba0daae1b2e74ecd52c59a85bf6f4b1f0b01ab07ba92bc6e57305406115f2bc3e4dd94f19ed896c4fccd34271e9dc3499af9298dbc709e0e6a513d61391d4b198af5f55d24239ae934e8babb8d1cb67bb17b0158", 0x55, 0x3}, {&(0x7f00000002c0)="ae227f954d229f666a6cd22938585e852071e55aa5728addcd315922bf32282e077bdbc63cd5ec89626ee2f8e7982ca239eaa758231056cdca22ca27428407f6c64c384665cfbd00ee6e0d7609f2c7ba0f28b4af70d0307ef78decfe42973915cd509de7c19ea0f3f5c3caaab05f9af08e2cc82d2c14b919dd045e3d36ce1c5d0ff23aed0a4a6ef508b5e71df0a25250d47f1e033ed503b6df99c189111b75b59df679cb75240b756cafecfd203568eeb2c1708fe9f11a2cb0f288590ec76cefbde09c90e9d568492aa5f41196397b70c869838c7164f2bad8eff017d021d7d41c9025c20b", 0xe5, 0x3}, {&(0x7f00000003c0)="792eb6eec33e561f18dc4b58b6a6fb3c7e6fd5e612c08490216ae02617f9811945929cffbf59727393a9a69d57b00a5cd08da3888884b8361d6a4003a54480c1086a5fc876582ff049ede86e2f58d80c7b6cf618e1ba36d4710887bc34ef2b7abbc686df2185f99998060bf492b84e3a02077e2aaf014e1186fde602d2b639d467f48fc2e18cf1553e07ac39040953566ab1d21aac627b166825375377bc3332b62160ea8bf7fc3196b30965dce6181bf7a1c60d0270f24ba60e633c8c88bbdefb5928dc8183c2ce0616de6c3185a4aa7eb2ec6ab7d8394a9536bf7e4f33f76294b0b4a390aca576177671191fe91530e9bd0db79cee", 0xf6, 0x100000000}], 0x21008, &(0x7f0000000900)={[{'.log\x00'}, {'-%('}, {'.log\x00'}], [{@obj_user={'obj_user'}}, {@appraise_type='appraise_type=imasig'}, {@fowner_eq={'fowner', 0x3d, 0xee01}}, {@hash='hash'}, {@subj_type={'subj_type', 0x3d, '-&'}}]}) ioctl$BTRFS_IOC_SUBVOL_SETFLAGS(r4, 0x4008941a, &(0x7f0000000980)=0xfe33b054cbbc4d79) [ 564.321446][T27415] loop5: detected capacity change from 264192 to 0 [ 564.446527][T27425] loop0: detected capacity change from 264192 to 0 11:24:58 executing program 3: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x7f, 0x80000000008001}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x9}, 0x0) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000080)) r1 = open(&(0x7f0000000240)='./file1\x00', 0x141142, 0x0) write$UHID_INPUT(r1, &(0x7f0000001440)={0x8, {'\x00R\x00'}}, 0xfffffc41) open(&(0x7f00000001c0)='./file1\x00', 0x0, 0x0) setxattr$trusted_overlay_nlink(&(0x7f0000000000)='./file1\x00', &(0x7f00000000c0)='trusted.overlay.nlink\x00', 0x0, 0x0, 0x0) 11:24:58 executing program 5: write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000540)=ANY=[@ANYBLOB="7f454c4601061f000400000000000000030038000800000032000000000000004000000000000000560200000000000007000000008038000100090002000100010000000100000006000000000000000400000000000000060000000000000001040000000000000200000000000000010000000000000051e574640400000001000000000000000400000000000000050000000000000005000000000000000400000000000000ff24444700000000908bc001727fbcd44f4d3bf922995edf2fd379eb00"/489], 0x2c4) r0 = inotify_init() r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) epoll_ctl$EPOLL_CTL_DEL(0xffffffffffffffff, 0x2, r1) inotify_add_watch(r0, &(0x7f0000000000)='.\x00', 0x400017e) r2 = openat$incfs(0xffffffffffffffff, &(0x7f0000000080)='.log\x00', 0x0, 0x0) fcntl$getownex(r2, 0x10, &(0x7f00000000c0)) r3 = open(&(0x7f0000000040)='./file0\x00', 0x200c2, 0x0) write$binfmt_elf64(r3, &(0x7f0000000080)=ANY=[], 0x8) sendfile(r3, r3, &(0x7f00000001c0), 0x0) dup(0xffffffffffffffff) r4 = syz_mount_image$gfs2meta(&(0x7f0000000140)='gfs2meta\x00', &(0x7f0000000200)='./file0\x00', 0x1000, 0x4, &(0x7f0000000880)=[{&(0x7f0000000240)="77ba0daae1b2e74ecd52c59a85bf6f4b1f0b01ab07ba92bc6e57305406115f2bc3e4dd94f19ed896c4fccd34271e9dc3499af9298dbc709e0e6a513d61391d4b198af5f55d24239ae934e8babb8d1cb67bb17b0158", 0x55, 0x3}, {&(0x7f00000002c0)="ae227f954d229f666a6cd22938585e852071e55aa5728addcd315922bf32282e077bdbc63cd5ec89626ee2f8e7982ca239eaa758231056cdca22ca27428407f6c64c384665cfbd00ee6e0d7609f2c7ba0f28b4af70d0307ef78decfe42973915cd509de7c19ea0f3f5c3caaab05f9af08e2cc82d2c14b919dd045e3d36ce1c5d0ff23aed0a4a6ef508b5e71df0a25250d47f1e033ed503b6df99c189111b75b59df679cb75240b756cafecfd203568eeb2c1708fe9f11a2cb0f288590ec76cefbde09c90e9d568492aa5f41196397b70c869838c7164f2bad8eff017d021d7d41c9025c20b", 0xe5, 0x3}, {&(0x7f00000003c0)="792eb6eec33e561f18dc4b58b6a6fb3c7e6fd5e612c08490216ae02617f9811945929cffbf59727393a9a69d57b00a5cd08da3888884b8361d6a4003a54480c1086a5fc876582ff049ede86e2f58d80c7b6cf618e1ba36d4710887bc34ef2b7abbc686df2185f99998060bf492b84e3a02077e2aaf014e1186fde602d2b639d467f48fc2e18cf1553e07ac39040953566ab1d21aac627b166825375377bc3332b62160ea8bf7fc3196b30965dce6181bf7a1c60d0270f24ba60e633c8c88bbdefb5928dc8183c2ce0616de6c3185a4aa7eb2ec6ab7d8394a9536bf7e4f33f76294b0b4a390aca576177671191fe91530e9bd0db79cee", 0xf6, 0x100000000}, {&(0x7f00000004c0)="a90f49b744c1ad7c27bc0a3b1965ca2bce6602b5f5a8b294ced925862d0a9df5c88e43095ba5810ba49c2216e7e1a9b5f07075e6a3101e853557713e983b2f46cf599dc2cba6254802d01794cdc015e28e2b5aa8c10293a4487b3fe2469252f2c2406327b2a5fe71b185ec0adfdc824a237f94", 0x73, 0x7}], 0x21008, &(0x7f0000000900)={[{'.log\x00'}, {'-%('}, {'.log\x00'}], [{@appraise_type='appraise_type=imasig'}, {@fowner_eq={'fowner', 0x3d, 0xee01}}, {@hash='hash'}, {@subj_type={'subj_type', 0x3d, '-&'}}, {@hash='hash'}]}) ioctl$BTRFS_IOC_SUBVOL_SETFLAGS(r4, 0x4008941a, &(0x7f0000000980)=0xfe33b054cbbc4d79) [ 564.656297][T27434] loop5: detected capacity change from 264192 to 0 11:24:58 executing program 5: write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000540)=ANY=[@ANYBLOB="7f454c4601061f000400000000000000030038000800000032000000000000004000000000000000560200000000000007000000008038000100090002000100010000000100000006000000000000000400000000000000060000000000000001040000000000000200000000000000010000000000000051e574640400000001000000000000000400000000000000050000000000000005000000000000000400000000000000ff24444700000000908bc001727fbcd44f4d3bf922995edf2fd379eb00"/489], 0x2c4) r0 = inotify_init() r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) epoll_ctl$EPOLL_CTL_DEL(0xffffffffffffffff, 0x2, r1) inotify_add_watch(r0, &(0x7f0000000000)='.\x00', 0x400017e) r2 = openat$incfs(0xffffffffffffffff, &(0x7f0000000080)='.log\x00', 0x0, 0x0) fcntl$getownex(r2, 0x10, &(0x7f00000000c0)) r3 = open(&(0x7f0000000040)='./file0\x00', 0x200c2, 0x0) write$binfmt_elf64(r3, &(0x7f0000000080)=ANY=[], 0x8) sendfile(r3, r3, &(0x7f00000001c0), 0xa198) dup(0xffffffffffffffff) r4 = syz_mount_image$gfs2meta(0x0, &(0x7f0000000200)='./file0\x00', 0x1000, 0x4, &(0x7f0000000880)=[{&(0x7f0000000240)="77ba0daae1b2e74ecd52c59a85bf6f4b1f0b01ab07ba92bc6e57305406115f2bc3e4dd94f19ed896c4fccd34271e9dc3499af9298dbc709e0e6a513d61391d4b198af5f55d24239ae934e8babb8d1cb67bb17b0158", 0x55, 0x3}, {&(0x7f00000002c0)="ae227f954d229f666a6cd22938585e852071e55aa5728addcd315922bf32282e077bdbc63cd5ec89626ee2f8e7982ca239eaa758231056cdca22ca27428407f6c64c384665cfbd00ee6e0d7609f2c7ba0f28b4af70d0307ef78decfe42973915cd509de7c19ea0f3f5c3caaab05f9af08e2cc82d2c14b919dd045e3d36ce1c5d0ff23aed0a4a6ef508b5e71df0a25250d47f1e033ed503b6df99c189111b75b59df679cb75240b756cafecfd203568eeb2c1708fe9f11a2cb0f288590ec76cefbde09c90e9d568492aa5f41196397b70c869838c7164f2bad8eff017d021d7d41c9025c20b", 0xe5, 0x3}, {&(0x7f00000003c0)="792eb6eec33e561f18dc4b58b6a6fb3c7e6fd5e612c08490216ae02617f9811945929cffbf59727393a9a69d57b00a5cd08da3888884b8361d6a4003a54480c1086a5fc876582ff049ede86e2f58d80c7b6cf618e1ba36d4710887bc34ef2b7abbc686df2185f99998060bf492b84e3a02077e2aaf014e1186fde602d2b639d467f48fc2e18cf1553e07ac39040953566ab1d21aac627b166825375377bc3332b62160ea8bf7fc3196b30965dce6181bf7a1c60d0270f24ba60e633c8c88bbdefb5928dc8183c2ce0616de6c3185a4aa7eb2ec6ab7d8394a9536bf7e4f33f76294b0b4a390aca576177671191fe91530e9bd0db79cee", 0xf6, 0x100000000}, {&(0x7f00000004c0)="a90f49b744c1ad7c27bc0a3b1965ca2bce6602b5f5a8b294ced925862d0a9df5c88e43095ba5810ba49c2216e7e1a9b5f07075e6a3101e853557713e983b2f46cf599dc2cba6254802d01794cdc015e28e2b5aa8c10293a4487b3fe2469252f2c2406327b2a5fe71b185ec0adfdc824a237f94", 0x73, 0x7}], 0x21008, &(0x7f0000000900)={[{'.log\x00'}, {'-%('}, {'.log\x00'}], [{@appraise_type='appraise_type=imasig'}, {@fowner_eq={'fowner', 0x3d, 0xee01}}, {@hash='hash'}, {@subj_type={'subj_type', 0x3d, '-&'}}, {@hash='hash'}]}) ioctl$BTRFS_IOC_SUBVOL_SETFLAGS(r4, 0x4008941a, &(0x7f0000000980)=0xfe33b054cbbc4d79) 11:24:59 executing program 1: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x7f, 0x80000000008001}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x9}, 0x0) r1 = open(&(0x7f0000000240)='./file1\x00', 0x141142, 0x0) write$UHID_INPUT(r1, &(0x7f0000001440), 0xfffffc41) open(&(0x7f00000001c0)='./file1\x00', 0x0, 0x100000000000000) setxattr$trusted_overlay_nlink(&(0x7f0000000000)='./file1\x00', &(0x7f00000000c0)='trusted.overlay.nlink\x00', 0x0, 0x0, 0x0) 11:24:59 executing program 4: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x7f, 0x80000000008001}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x9}, 0x0) r1 = open(&(0x7f0000000240)='./file1\x00', 0x141142, 0x0) write$UHID_INPUT(r1, &(0x7f0000001440), 0xfffffc41) open(&(0x7f00000001c0)='./file1\x00', 0x0, 0xfffffff6) setxattr$trusted_overlay_nlink(&(0x7f0000000000)='./file1\x00', &(0x7f00000000c0)='trusted.overlay.nlink\x00', 0x0, 0x0, 0x0) [ 564.894213][T27443] loop5: detected capacity change from 264192 to 0 [ 564.971892][ T35] kauditd_printk_skb: 30 callbacks suppressed [ 564.971903][ T35] audit: type=1804 audit(1612178699.048:2226): pid=27424 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.2" name="/root/syzkaller-testdir245532710/syzkaller.d2c0aK/417/file1" dev="sda1" ino=15767 res=1 errno=0 11:24:59 executing program 2: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x7f, 0x80000000008001}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x9}, 0x0) r1 = open(&(0x7f0000000240)='./file1\x00', 0x141142, 0x0) write$UHID_INPUT(r1, &(0x7f0000001440)={0x8, {'\x00V\x00'}}, 0xfffffc41) open(&(0x7f00000001c0)='./file1\x00', 0x0, 0x0) setxattr$trusted_overlay_nlink(&(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x0, 0x0) [ 565.127308][ T35] audit: type=1800 audit(1612178699.208:2227): pid=27424 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed comm="syz-executor.2" name="file1" dev="sda1" ino=15767 res=0 errno=0 [ 565.200577][ T35] audit: type=1804 audit(1612178699.228:2228): pid=27419 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor.2" name="/root/syzkaller-testdir245532710/syzkaller.d2c0aK/417/file1" dev="sda1" ino=15767 res=1 errno=0 11:24:59 executing program 0: r0 = perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x5c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write$binfmt_elf64(r0, &(0x7f0000000540)=ANY=[@ANYBLOB], 0x2c4) r1 = inotify_init() openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) epoll_ctl$EPOLL_CTL_DEL(0xffffffffffffffff, 0x2, 0xffffffffffffffff) inotify_add_watch(r1, &(0x7f0000000000)='.\x00', 0x400017e) r2 = openat$incfs(0xffffffffffffffff, &(0x7f0000000080)='.log\x00', 0x20200, 0x40) fcntl$getownex(r2, 0x10, &(0x7f00000000c0)) r3 = open(&(0x7f0000000040)='./file0\x00', 0x200c2, 0x0) write$binfmt_elf64(r3, &(0x7f0000000080)=ANY=[], 0x8) sendfile(r3, r3, &(0x7f00000001c0), 0xa198) dup(0xffffffffffffffff) r4 = syz_mount_image$gfs2meta(&(0x7f0000000140)='gfs2meta\x00', &(0x7f0000000200)='./file0\x00', 0x1000, 0x3, &(0x7f0000000880)=[{&(0x7f0000000240)="77ba0daae1b2e74ecd52c59a85bf6f4b1f0b01ab07ba92bc6e57305406115f2bc3e4dd94f19ed896c4fccd34271e9dc3499af9298dbc709e0e6a513d61391d4b198af5f55d24239ae934e8babb8d1cb67bb17b0158", 0x55, 0x3}, {&(0x7f00000002c0)="ae227f954d229f666a6cd22938585e852071e55aa5728addcd315922bf32282e077bdbc63cd5ec89626ee2f8e7982ca239eaa758231056cdca22ca27428407f6c64c384665cfbd00ee6e0d7609f2c7ba0f28b4af70d0307ef78decfe42973915cd509de7c19ea0f3f5c3caaab05f9af08e2cc82d2c14b919dd045e3d36ce1c5d0ff23aed0a4a6ef508b5e71df0a25250d47f1e033ed503b6df99c189111b75b59df679cb75240b756cafecfd203568eeb2c1708fe9f11a2cb0f288590ec76cefbde09c90e9d568492aa5f41196397b70c869838c7164f2bad8eff017d021d7d41c9025c20b", 0xe5, 0x3}, {&(0x7f00000003c0)="792eb6eec33e561f18dc4b58b6a6fb3c7e6fd5e612c08490216ae02617f9811945929cffbf59727393a9a69d57b00a5cd08da3888884b8361d6a4003a54480c1086a5fc876582ff049ede86e2f58d80c7b6cf618e1ba36d4710887bc34ef2b7abbc686df2185f99998060bf492b84e3a02077e2aaf014e1186fde602d2b639d467f48fc2e18cf1553e07ac39040953566ab1d21aac627b166825375377bc3332b62160ea8bf7fc3196b30965dce6181bf7a1c60d0270f24ba60e633c8c88bbdefb5928dc8183c2ce0616de6c3185a4aa7eb2ec6ab7d8394a9536bf7e4f33f76294b0b4a390aca576177671191fe91530e9bd0db79cee", 0xf6, 0x100000000}], 0x21008, &(0x7f0000000900)={[{'.log\x00'}, {'-%('}, {'.log\x00'}], [{@obj_user={'obj_user'}}, {@appraise_type='appraise_type=imasig'}, {@fowner_eq={'fowner', 0x3d, 0xee01}}, {@hash='hash'}, {@subj_type={'subj_type', 0x3d, '-&'}}]}) ioctl$BTRFS_IOC_SUBVOL_SETFLAGS(r4, 0x4008941a, &(0x7f0000000980)=0xfe33b054cbbc4d79) [ 565.344447][ T35] audit: type=1800 audit(1612178699.228:2229): pid=27419 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed comm="syz-executor.2" name="file1" dev="sda1" ino=15767 res=0 errno=0 [ 565.448709][T27466] loop0: detected capacity change from 264192 to 0 [ 565.596747][ T35] audit: type=1804 audit(1612178699.678:2230): pid=27448 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.3" name="/root/syzkaller-testdir548988167/syzkaller.gb8agU/405/file1" dev="sda1" ino=15901 res=1 errno=0 11:24:59 executing program 5: write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000540)=ANY=[@ANYBLOB="7f454c4601061f000400000000000000030038000800000032000000000000004000000000000000560200000000000007000000008038000100090002000100010000000100000006000000000000000400000000000000060000000000000001040000000000000200000000000000010000000000000051e574640400000001000000000000000400000000000000050000000000000005000000000000000400000000000000ff24444700000000908bc001727fbcd44f4d3bf922995edf2fd379eb00"/489], 0x2c4) r0 = inotify_init() r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) epoll_ctl$EPOLL_CTL_DEL(0xffffffffffffffff, 0x2, r1) inotify_add_watch(r0, &(0x7f0000000000)='.\x00', 0x400017e) r2 = openat$incfs(0xffffffffffffffff, &(0x7f0000000080)='.log\x00', 0x0, 0x0) fcntl$getownex(r2, 0x10, &(0x7f00000000c0)) r3 = open(&(0x7f0000000040)='./file0\x00', 0x200c2, 0x0) write$binfmt_elf64(r3, &(0x7f0000000080)=ANY=[], 0x8) sendfile(r3, r3, &(0x7f00000001c0), 0xa198) dup(0xffffffffffffffff) r4 = syz_mount_image$gfs2meta(0x0, &(0x7f0000000200)='./file0\x00', 0x1000, 0x4, &(0x7f0000000880)=[{&(0x7f0000000240)="77ba0daae1b2e74ecd52c59a85bf6f4b1f0b01ab07ba92bc6e57305406115f2bc3e4dd94f19ed896c4fccd34271e9dc3499af9298dbc709e0e6a513d61391d4b198af5f55d24239ae934e8babb8d1cb67bb17b0158", 0x55, 0x3}, {&(0x7f00000002c0)="ae227f954d229f666a6cd22938585e852071e55aa5728addcd315922bf32282e077bdbc63cd5ec89626ee2f8e7982ca239eaa758231056cdca22ca27428407f6c64c384665cfbd00ee6e0d7609f2c7ba0f28b4af70d0307ef78decfe42973915cd509de7c19ea0f3f5c3caaab05f9af08e2cc82d2c14b919dd045e3d36ce1c5d0ff23aed0a4a6ef508b5e71df0a25250d47f1e033ed503b6df99c189111b75b59df679cb75240b756cafecfd203568eeb2c1708fe9f11a2cb0f288590ec76cefbde09c90e9d568492aa5f41196397b70c869838c7164f2bad8eff017d021d7d41c9025c20b", 0xe5, 0x3}, {&(0x7f00000003c0)="792eb6eec33e561f18dc4b58b6a6fb3c7e6fd5e612c08490216ae02617f9811945929cffbf59727393a9a69d57b00a5cd08da3888884b8361d6a4003a54480c1086a5fc876582ff049ede86e2f58d80c7b6cf618e1ba36d4710887bc34ef2b7abbc686df2185f99998060bf492b84e3a02077e2aaf014e1186fde602d2b639d467f48fc2e18cf1553e07ac39040953566ab1d21aac627b166825375377bc3332b62160ea8bf7fc3196b30965dce6181bf7a1c60d0270f24ba60e633c8c88bbdefb5928dc8183c2ce0616de6c3185a4aa7eb2ec6ab7d8394a9536bf7e4f33f76294b0b4a390aca576177671191fe91530e9bd0db79cee", 0xf6, 0x100000000}, {&(0x7f00000004c0)="a90f49b744c1ad7c27bc0a3b1965ca2bce6602b5f5a8b294ced925862d0a9df5c88e43095ba5810ba49c2216e7e1a9b5f07075e6a3101e853557713e983b2f46cf599dc2cba6254802d01794cdc015e28e2b5aa8c10293a4487b3fe2469252f2c2406327b2a5fe71b185ec0adfdc824a237f94", 0x73, 0x7}], 0x21008, &(0x7f0000000900)={[{'.log\x00'}, {'-%('}, {'.log\x00'}], [{@appraise_type='appraise_type=imasig'}, {@fowner_eq={'fowner', 0x3d, 0xee01}}, {@hash='hash'}, {@subj_type={'subj_type', 0x3d, '-&'}}, {@hash='hash'}]}) ioctl$BTRFS_IOC_SUBVOL_SETFLAGS(r4, 0x4008941a, &(0x7f0000000980)=0xfe33b054cbbc4d79) [ 565.824158][ T35] audit: type=1804 audit(1612178699.878:2231): pid=27449 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.3" name="/root/syzkaller-testdir548988167/syzkaller.gb8agU/405/file1" dev="sda1" ino=15901 res=1 errno=0 [ 565.923719][ T35] audit: type=1804 audit(1612178700.008:2232): pid=27456 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.4" name="/root/syzkaller-testdir068764309/syzkaller.I2gCPs/450/file1" dev="sda1" ino=15910 res=1 errno=0 11:25:00 executing program 3: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x7f, 0x80000000008001}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x9}, 0x0) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000080)) r1 = open(&(0x7f0000000240)='./file1\x00', 0x141142, 0x0) write$UHID_INPUT(r1, &(0x7f0000001440)={0x8, {'\x00S\x00'}}, 0xfffffc41) open(&(0x7f00000001c0)='./file1\x00', 0x0, 0x0) setxattr$trusted_overlay_nlink(&(0x7f0000000000)='./file1\x00', &(0x7f00000000c0)='trusted.overlay.nlink\x00', 0x0, 0x0, 0x0) [ 566.032869][T27475] loop5: detected capacity change from 264192 to 0 [ 566.131038][ T35] audit: type=1804 audit(1612178700.088:2233): pid=27455 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.1" name="/root/syzkaller-testdir551554057/syzkaller.l2Zg4z/402/file1" dev="sda1" ino=15905 res=1 errno=0 11:25:00 executing program 5: write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000540)=ANY=[@ANYBLOB="7f454c4601061f000400000000000000030038000800000032000000000000004000000000000000560200000000000007000000008038000100090002000100010000000100000006000000000000000400000000000000060000000000000001040000000000000200000000000000010000000000000051e574640400000001000000000000000400000000000000050000000000000005000000000000000400000000000000ff24444700000000908bc001727fbcd44f4d3bf922995edf2fd379eb00"/489], 0x2c4) r0 = inotify_init() r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) epoll_ctl$EPOLL_CTL_DEL(0xffffffffffffffff, 0x2, r1) inotify_add_watch(r0, &(0x7f0000000000)='.\x00', 0x400017e) r2 = openat$incfs(0xffffffffffffffff, &(0x7f0000000080)='.log\x00', 0x0, 0x0) fcntl$getownex(r2, 0x10, &(0x7f00000000c0)) r3 = open(&(0x7f0000000040)='./file0\x00', 0x200c2, 0x0) write$binfmt_elf64(r3, &(0x7f0000000080)=ANY=[], 0x8) sendfile(r3, r3, &(0x7f00000001c0), 0xa198) dup(0xffffffffffffffff) r4 = syz_mount_image$gfs2meta(0x0, &(0x7f0000000200)='./file0\x00', 0x1000, 0x4, &(0x7f0000000880)=[{&(0x7f0000000240)="77ba0daae1b2e74ecd52c59a85bf6f4b1f0b01ab07ba92bc6e57305406115f2bc3e4dd94f19ed896c4fccd34271e9dc3499af9298dbc709e0e6a513d61391d4b198af5f55d24239ae934e8babb8d1cb67bb17b0158", 0x55, 0x3}, {&(0x7f00000002c0)="ae227f954d229f666a6cd22938585e852071e55aa5728addcd315922bf32282e077bdbc63cd5ec89626ee2f8e7982ca239eaa758231056cdca22ca27428407f6c64c384665cfbd00ee6e0d7609f2c7ba0f28b4af70d0307ef78decfe42973915cd509de7c19ea0f3f5c3caaab05f9af08e2cc82d2c14b919dd045e3d36ce1c5d0ff23aed0a4a6ef508b5e71df0a25250d47f1e033ed503b6df99c189111b75b59df679cb75240b756cafecfd203568eeb2c1708fe9f11a2cb0f288590ec76cefbde09c90e9d568492aa5f41196397b70c869838c7164f2bad8eff017d021d7d41c9025c20b", 0xe5, 0x3}, {&(0x7f00000003c0)="792eb6eec33e561f18dc4b58b6a6fb3c7e6fd5e612c08490216ae02617f9811945929cffbf59727393a9a69d57b00a5cd08da3888884b8361d6a4003a54480c1086a5fc876582ff049ede86e2f58d80c7b6cf618e1ba36d4710887bc34ef2b7abbc686df2185f99998060bf492b84e3a02077e2aaf014e1186fde602d2b639d467f48fc2e18cf1553e07ac39040953566ab1d21aac627b166825375377bc3332b62160ea8bf7fc3196b30965dce6181bf7a1c60d0270f24ba60e633c8c88bbdefb5928dc8183c2ce0616de6c3185a4aa7eb2ec6ab7d8394a9536bf7e4f33f76294b0b4a390aca576177671191fe91530e9bd0db79cee", 0xf6, 0x100000000}, {&(0x7f00000004c0)="a90f49b744c1ad7c27bc0a3b1965ca2bce6602b5f5a8b294ced925862d0a9df5c88e43095ba5810ba49c2216e7e1a9b5f07075e6a3101e853557713e983b2f46cf599dc2cba6254802d01794cdc015e28e2b5aa8c10293a4487b3fe2469252f2c2406327b2a5fe71b185ec0adfdc824a237f94", 0x73, 0x7}], 0x21008, &(0x7f0000000900)={[{'.log\x00'}, {'-%('}, {'.log\x00'}], [{@appraise_type='appraise_type=imasig'}, {@fowner_eq={'fowner', 0x3d, 0xee01}}, {@hash='hash'}, {@subj_type={'subj_type', 0x3d, '-&'}}, {@hash='hash'}]}) ioctl$BTRFS_IOC_SUBVOL_SETFLAGS(r4, 0x4008941a, &(0x7f0000000980)=0xfe33b054cbbc4d79) [ 566.209711][ T35] audit: type=1804 audit(1612178700.088:2234): pid=27478 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.1" name="/root/syzkaller-testdir551554057/syzkaller.l2Zg4z/402/file1" dev="sda1" ino=15905 res=1 errno=0 11:25:00 executing program 0: r0 = perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x5c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write$binfmt_elf64(r0, &(0x7f0000000540)=ANY=[@ANYBLOB], 0x2c4) r1 = inotify_init() openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) epoll_ctl$EPOLL_CTL_DEL(0xffffffffffffffff, 0x2, 0xffffffffffffffff) inotify_add_watch(r1, &(0x7f0000000000)='.\x00', 0x400017e) r2 = openat$incfs(0xffffffffffffffff, &(0x7f0000000080)='.log\x00', 0x20200, 0x40) fcntl$getownex(r2, 0x10, &(0x7f00000000c0)) r3 = open(&(0x7f0000000040)='./file0\x00', 0x200c2, 0x0) write$binfmt_elf64(r3, &(0x7f0000000080)=ANY=[], 0x8) sendfile(r3, r3, &(0x7f00000001c0), 0xa198) dup(0xffffffffffffffff) r4 = syz_mount_image$gfs2meta(&(0x7f0000000140)='gfs2meta\x00', &(0x7f0000000200)='./file0\x00', 0x1000, 0x3, &(0x7f0000000880)=[{&(0x7f0000000240)="77ba0daae1b2e74ecd52c59a85bf6f4b1f0b01ab07ba92bc6e57305406115f2bc3e4dd94f19ed896c4fccd34271e9dc3499af9298dbc709e0e6a513d61391d4b198af5f55d24239ae934e8babb8d1cb67bb17b0158", 0x55, 0x3}, {&(0x7f00000002c0)="ae227f954d229f666a6cd22938585e852071e55aa5728addcd315922bf32282e077bdbc63cd5ec89626ee2f8e7982ca239eaa758231056cdca22ca27428407f6c64c384665cfbd00ee6e0d7609f2c7ba0f28b4af70d0307ef78decfe42973915cd509de7c19ea0f3f5c3caaab05f9af08e2cc82d2c14b919dd045e3d36ce1c5d0ff23aed0a4a6ef508b5e71df0a25250d47f1e033ed503b6df99c189111b75b59df679cb75240b756cafecfd203568eeb2c1708fe9f11a2cb0f288590ec76cefbde09c90e9d568492aa5f41196397b70c869838c7164f2bad8eff017d021d7d41c9025c20b", 0xe5, 0x3}, {&(0x7f00000003c0)="792eb6eec33e561f18dc4b58b6a6fb3c7e6fd5e612c08490216ae02617f9811945929cffbf59727393a9a69d57b00a5cd08da3888884b8361d6a4003a54480c1086a5fc876582ff049ede86e2f58d80c7b6cf618e1ba36d4710887bc34ef2b7abbc686df2185f99998060bf492b84e3a02077e2aaf014e1186fde602d2b639d467f48fc2e18cf1553e07ac39040953566ab1d21aac627b166825375377bc3332b62160ea8bf7fc3196b30965dce6181bf7a1c60d0270f24ba60e633c8c88bbdefb5928dc8183c2ce0616de6c3185a4aa7eb2ec6ab7d8394a9536bf7e4f33f76294b0b4a390aca576177671191fe91530e9bd0db79cee", 0xf6, 0x100000000}], 0x21008, &(0x7f0000000900)={[{'.log\x00'}, {'-%('}, {'.log\x00'}], [{@obj_user={'obj_user'}}, {@appraise_type='appraise_type=imasig'}, {@fowner_eq={'fowner', 0x3d, 0xee01}}, {@hash='hash'}, {@subj_type={'subj_type', 0x3d, '-&'}}]}) ioctl$BTRFS_IOC_SUBVOL_SETFLAGS(r4, 0x4008941a, &(0x7f0000000980)=0xfe33b054cbbc4d79) 11:25:00 executing program 2: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x7f, 0x80000000008001}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x9}, 0x0) r1 = open(&(0x7f0000000240)='./file1\x00', 0x141142, 0x0) write$UHID_INPUT(r1, &(0x7f0000001440)={0x8, {'\x00W\x00'}}, 0xfffffc41) open(&(0x7f00000001c0)='./file1\x00', 0x0, 0x0) setxattr$trusted_overlay_nlink(&(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x0, 0x0) [ 566.240413][ T35] audit: type=1804 audit(1612178700.088:2235): pid=27477 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor.1" name="/root/syzkaller-testdir551554057/syzkaller.l2Zg4z/402/file1" dev="sda1" ino=15905 res=1 errno=0 11:25:00 executing program 4: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x7f, 0x80000000008001}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x9}, 0x0) r1 = open(&(0x7f0000000240)='./file1\x00', 0x141142, 0x0) write$UHID_INPUT(r1, &(0x7f0000001440), 0xfffffc41) open(&(0x7f00000001c0)='./file1\x00', 0x0, 0xfffffff6) 11:25:00 executing program 1: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x7f, 0x80000000008001}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x9}, 0x0) r1 = open(&(0x7f0000000240)='./file1\x00', 0x141142, 0x0) write$UHID_INPUT(r1, &(0x7f0000001440), 0xfffffc41) open(&(0x7f00000001c0)='./file1\x00', 0x0, 0x200000000000000) setxattr$trusted_overlay_nlink(&(0x7f0000000000)='./file1\x00', &(0x7f00000000c0)='trusted.overlay.nlink\x00', 0x0, 0x0, 0x0) [ 566.447100][T27492] loop5: detected capacity change from 264192 to 0 [ 566.486926][T27493] loop0: detected capacity change from 264192 to 0 11:25:01 executing program 5: write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000540)=ANY=[@ANYBLOB="7f454c4601061f000400000000000000030038000800000032000000000000004000000000000000560200000000000007000000008038000100090002000100010000000100000006000000000000000400000000000000060000000000000001040000000000000200000000000000010000000000000051e574640400000001000000000000000400000000000000050000000000000005000000000000000400000000000000ff24444700000000908bc001727fbcd44f4d3bf922995edf2fd379eb00"/489], 0x2c4) r0 = inotify_init() r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) epoll_ctl$EPOLL_CTL_DEL(0xffffffffffffffff, 0x2, r1) inotify_add_watch(r0, &(0x7f0000000000)='.\x00', 0x400017e) r2 = openat$incfs(0xffffffffffffffff, &(0x7f0000000080)='.log\x00', 0x0, 0x0) fcntl$getownex(r2, 0x10, &(0x7f00000000c0)) r3 = open(&(0x7f0000000040)='./file0\x00', 0x200c2, 0x0) write$binfmt_elf64(r3, &(0x7f0000000080)=ANY=[], 0x8) sendfile(r3, r3, &(0x7f00000001c0), 0xa198) dup(0xffffffffffffffff) r4 = syz_mount_image$gfs2meta(&(0x7f0000000140)='gfs2meta\x00', 0x0, 0x1000, 0x4, &(0x7f0000000880)=[{&(0x7f0000000240)="77ba0daae1b2e74ecd52c59a85bf6f4b1f0b01ab07ba92bc6e57305406115f2bc3e4dd94f19ed896c4fccd34271e9dc3499af9298dbc709e0e6a513d61391d4b198af5f55d24239ae934e8babb8d1cb67bb17b0158", 0x55, 0x3}, {&(0x7f00000002c0)="ae227f954d229f666a6cd22938585e852071e55aa5728addcd315922bf32282e077bdbc63cd5ec89626ee2f8e7982ca239eaa758231056cdca22ca27428407f6c64c384665cfbd00ee6e0d7609f2c7ba0f28b4af70d0307ef78decfe42973915cd509de7c19ea0f3f5c3caaab05f9af08e2cc82d2c14b919dd045e3d36ce1c5d0ff23aed0a4a6ef508b5e71df0a25250d47f1e033ed503b6df99c189111b75b59df679cb75240b756cafecfd203568eeb2c1708fe9f11a2cb0f288590ec76cefbde09c90e9d568492aa5f41196397b70c869838c7164f2bad8eff017d021d7d41c9025c20b", 0xe5, 0x3}, {&(0x7f00000003c0)="792eb6eec33e561f18dc4b58b6a6fb3c7e6fd5e612c08490216ae02617f9811945929cffbf59727393a9a69d57b00a5cd08da3888884b8361d6a4003a54480c1086a5fc876582ff049ede86e2f58d80c7b6cf618e1ba36d4710887bc34ef2b7abbc686df2185f99998060bf492b84e3a02077e2aaf014e1186fde602d2b639d467f48fc2e18cf1553e07ac39040953566ab1d21aac627b166825375377bc3332b62160ea8bf7fc3196b30965dce6181bf7a1c60d0270f24ba60e633c8c88bbdefb5928dc8183c2ce0616de6c3185a4aa7eb2ec6ab7d8394a9536bf7e4f33f76294b0b4a390aca576177671191fe91530e9bd0db79cee", 0xf6, 0x100000000}, {&(0x7f00000004c0)="a90f49b744c1ad7c27bc0a3b1965ca2bce6602b5f5a8b294ced925862d0a9df5c88e43095ba5810ba49c2216e7e1a9b5f07075e6a3101e853557713e983b2f46cf599dc2cba6254802d01794cdc015e28e2b5aa8c10293a4487b3fe2469252f2c2406327b2a5fe71b185ec0adfdc824a237f94", 0x73, 0x7}], 0x21008, &(0x7f0000000900)={[{'.log\x00'}, {'-%('}, {'.log\x00'}], [{@appraise_type='appraise_type=imasig'}, {@fowner_eq={'fowner', 0x3d, 0xee01}}, {@hash='hash'}, {@subj_type={'subj_type', 0x3d, '-&'}}, {@hash='hash'}]}) ioctl$BTRFS_IOC_SUBVOL_SETFLAGS(r4, 0x4008941a, &(0x7f0000000980)=0xfe33b054cbbc4d79) 11:25:01 executing program 0: r0 = perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x5c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write$binfmt_elf64(r0, &(0x7f0000000540)=ANY=[@ANYBLOB], 0x2c4) r1 = inotify_init() openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) epoll_ctl$EPOLL_CTL_DEL(0xffffffffffffffff, 0x2, 0xffffffffffffffff) inotify_add_watch(r1, &(0x7f0000000000)='.\x00', 0x400017e) r2 = openat$incfs(0xffffffffffffffff, &(0x7f0000000080)='.log\x00', 0x20200, 0x40) fcntl$getownex(r2, 0x10, &(0x7f00000000c0)) r3 = open(&(0x7f0000000040)='./file0\x00', 0x200c2, 0x0) write$binfmt_elf64(r3, &(0x7f0000000080)=ANY=[], 0x8) sendfile(r3, r3, &(0x7f00000001c0), 0xa198) dup(0xffffffffffffffff) r4 = syz_mount_image$gfs2meta(&(0x7f0000000140)='gfs2meta\x00', &(0x7f0000000200)='./file0\x00', 0x1000, 0x4, &(0x7f0000000880)=[{&(0x7f0000000240)="77ba0daae1b2e74ecd52c59a85bf6f4b1f0b01ab07ba92bc6e57305406115f2bc3e4dd94f19ed896c4fccd34271e9dc3499af9298dbc709e0e6a513d61391d4b198af5f55d24239ae934e8babb8d1cb67bb17b0158", 0x55, 0x3}, {&(0x7f00000002c0)="ae227f954d229f666a6cd22938585e852071e55aa5728addcd315922bf32282e077bdbc63cd5ec89626ee2f8e7982ca239eaa758231056cdca22ca27428407f6c64c384665cfbd00ee6e0d7609f2c7ba0f28b4af70d0307ef78decfe42973915cd509de7c19ea0f3f5c3caaab05f9af08e2cc82d2c14b919dd045e3d36ce1c5d0ff23aed0a4a6ef508b5e71df0a25250d47f1e033ed503b6df99c189111b75b59df679cb75240b756cafecfd203568eeb2c1708fe9f11a2cb0f288590ec76cefbde09c90e9d568492aa5f41196397b70c869838c7164f2bad8eff017d021d7d41c9025c20b", 0xe5, 0x3}, {&(0x7f00000003c0)="792eb6eec33e561f18dc4b58b6a6fb3c7e6fd5e612c08490216ae02617f9811945929cffbf59727393a9a69d57b00a5cd08da3888884b8361d6a4003a54480c1086a5fc876582ff049ede86e2f58d80c7b6cf618e1ba36d4710887bc34ef2b7abbc686df2185f99998060bf492b84e3a02077e2aaf014e1186fde602d2b639d467f48fc2e18cf1553e07ac39040953566ab1d21aac627b166825375377bc3332b62160ea8bf7fc3196b30965dce6181bf7a1c60d0270f24ba60e633c8c88bbdefb5928dc8183c2ce0616de6c3185a4aa7eb2ec6ab7d8394a9536bf7e4f33f76294b0b4a390aca576177671191fe91530e9bd0db79cee", 0xf6, 0x100000000}, {0x0, 0x0, 0x7}], 0x21008, &(0x7f0000000900)={[{'.log\x00'}, {'-%('}, {'.log\x00'}], [{@obj_user={'obj_user'}}, {@appraise_type='appraise_type=imasig'}, {@fowner_eq={'fowner', 0x3d, 0xee01}}, {@hash='hash'}, {@subj_type={'subj_type', 0x3d, '-&'}}]}) ioctl$BTRFS_IOC_SUBVOL_SETFLAGS(r4, 0x4008941a, &(0x7f0000000980)=0xfe33b054cbbc4d79) 11:25:01 executing program 3: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x7f, 0x80000000008001}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x9}, 0x0) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000080)) r1 = open(&(0x7f0000000240)='./file1\x00', 0x141142, 0x0) write$UHID_INPUT(r1, &(0x7f0000001440)={0x8, {'\x00T\x00'}}, 0xfffffc41) open(&(0x7f00000001c0)='./file1\x00', 0x0, 0x0) setxattr$trusted_overlay_nlink(&(0x7f0000000000)='./file1\x00', &(0x7f00000000c0)='trusted.overlay.nlink\x00', 0x0, 0x0, 0x0) [ 567.424742][T27522] loop5: detected capacity change from 264192 to 0 11:25:01 executing program 2: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x7f, 0x80000000008001}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x9}, 0x0) r1 = open(&(0x7f0000000240)='./file1\x00', 0x141142, 0x0) write$UHID_INPUT(r1, &(0x7f0000001440)={0x8, {'\x00X\x00'}}, 0xfffffc41) open(&(0x7f00000001c0)='./file1\x00', 0x0, 0x0) setxattr$trusted_overlay_nlink(&(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x0, 0x0) [ 567.524936][T27523] loop0: detected capacity change from 264192 to 0 11:25:01 executing program 4: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x7f, 0x80000000008001}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x9}, 0x0) r1 = open(&(0x7f0000000240)='./file1\x00', 0x141142, 0x0) write$UHID_INPUT(r1, &(0x7f0000001440), 0xfffffc41) open(&(0x7f00000001c0)='./file1\x00', 0x0, 0xfffffff6) 11:25:01 executing program 1: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x7f, 0x80000000008001}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x9}, 0x0) r1 = open(&(0x7f0000000240)='./file1\x00', 0x141142, 0x0) write$UHID_INPUT(r1, &(0x7f0000001440), 0xfffffc41) open(&(0x7f00000001c0)='./file1\x00', 0x0, 0x300000000000000) setxattr$trusted_overlay_nlink(&(0x7f0000000000)='./file1\x00', &(0x7f00000000c0)='trusted.overlay.nlink\x00', 0x0, 0x0, 0x0) 11:25:02 executing program 5: write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000540)=ANY=[@ANYBLOB="7f454c4601061f000400000000000000030038000800000032000000000000004000000000000000560200000000000007000000008038000100090002000100010000000100000006000000000000000400000000000000060000000000000001040000000000000200000000000000010000000000000051e574640400000001000000000000000400000000000000050000000000000005000000000000000400000000000000ff24444700000000908bc001727fbcd44f4d3bf922995edf2fd379eb00"/489], 0x2c4) r0 = inotify_init() r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) epoll_ctl$EPOLL_CTL_DEL(0xffffffffffffffff, 0x2, r1) inotify_add_watch(r0, &(0x7f0000000000)='.\x00', 0x400017e) r2 = openat$incfs(0xffffffffffffffff, &(0x7f0000000080)='.log\x00', 0x0, 0x0) fcntl$getownex(r2, 0x10, &(0x7f00000000c0)) r3 = open(&(0x7f0000000040)='./file0\x00', 0x200c2, 0x0) write$binfmt_elf64(r3, &(0x7f0000000080)=ANY=[], 0x8) sendfile(r3, r3, &(0x7f00000001c0), 0xa198) dup(0xffffffffffffffff) r4 = syz_mount_image$gfs2meta(&(0x7f0000000140)='gfs2meta\x00', 0x0, 0x1000, 0x4, &(0x7f0000000880)=[{&(0x7f0000000240)="77ba0daae1b2e74ecd52c59a85bf6f4b1f0b01ab07ba92bc6e57305406115f2bc3e4dd94f19ed896c4fccd34271e9dc3499af9298dbc709e0e6a513d61391d4b198af5f55d24239ae934e8babb8d1cb67bb17b0158", 0x55, 0x3}, {&(0x7f00000002c0)="ae227f954d229f666a6cd22938585e852071e55aa5728addcd315922bf32282e077bdbc63cd5ec89626ee2f8e7982ca239eaa758231056cdca22ca27428407f6c64c384665cfbd00ee6e0d7609f2c7ba0f28b4af70d0307ef78decfe42973915cd509de7c19ea0f3f5c3caaab05f9af08e2cc82d2c14b919dd045e3d36ce1c5d0ff23aed0a4a6ef508b5e71df0a25250d47f1e033ed503b6df99c189111b75b59df679cb75240b756cafecfd203568eeb2c1708fe9f11a2cb0f288590ec76cefbde09c90e9d568492aa5f41196397b70c869838c7164f2bad8eff017d021d7d41c9025c20b", 0xe5, 0x3}, {&(0x7f00000003c0)="792eb6eec33e561f18dc4b58b6a6fb3c7e6fd5e612c08490216ae02617f9811945929cffbf59727393a9a69d57b00a5cd08da3888884b8361d6a4003a54480c1086a5fc876582ff049ede86e2f58d80c7b6cf618e1ba36d4710887bc34ef2b7abbc686df2185f99998060bf492b84e3a02077e2aaf014e1186fde602d2b639d467f48fc2e18cf1553e07ac39040953566ab1d21aac627b166825375377bc3332b62160ea8bf7fc3196b30965dce6181bf7a1c60d0270f24ba60e633c8c88bbdefb5928dc8183c2ce0616de6c3185a4aa7eb2ec6ab7d8394a9536bf7e4f33f76294b0b4a390aca576177671191fe91530e9bd0db79cee", 0xf6, 0x100000000}, {&(0x7f00000004c0)="a90f49b744c1ad7c27bc0a3b1965ca2bce6602b5f5a8b294ced925862d0a9df5c88e43095ba5810ba49c2216e7e1a9b5f07075e6a3101e853557713e983b2f46cf599dc2cba6254802d01794cdc015e28e2b5aa8c10293a4487b3fe2469252f2c2406327b2a5fe71b185ec0adfdc824a237f94", 0x73, 0x7}], 0x21008, &(0x7f0000000900)={[{'.log\x00'}, {'-%('}, {'.log\x00'}], [{@appraise_type='appraise_type=imasig'}, {@fowner_eq={'fowner', 0x3d, 0xee01}}, {@hash='hash'}, {@subj_type={'subj_type', 0x3d, '-&'}}, {@hash='hash'}]}) ioctl$BTRFS_IOC_SUBVOL_SETFLAGS(r4, 0x4008941a, &(0x7f0000000980)=0xfe33b054cbbc4d79) 11:25:02 executing program 0: r0 = perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x5c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write$binfmt_elf64(r0, &(0x7f0000000540)=ANY=[@ANYBLOB], 0x2c4) r1 = inotify_init() openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) epoll_ctl$EPOLL_CTL_DEL(0xffffffffffffffff, 0x2, 0xffffffffffffffff) inotify_add_watch(r1, &(0x7f0000000000)='.\x00', 0x400017e) r2 = openat$incfs(0xffffffffffffffff, &(0x7f0000000080)='.log\x00', 0x20200, 0x40) fcntl$getownex(r2, 0x10, &(0x7f00000000c0)) r3 = open(&(0x7f0000000040)='./file0\x00', 0x200c2, 0x0) write$binfmt_elf64(r3, &(0x7f0000000080)=ANY=[], 0x8) sendfile(r3, r3, &(0x7f00000001c0), 0xa198) dup(0xffffffffffffffff) r4 = syz_mount_image$gfs2meta(&(0x7f0000000140)='gfs2meta\x00', &(0x7f0000000200)='./file0\x00', 0x1000, 0x4, &(0x7f0000000880)=[{&(0x7f0000000240)="77ba0daae1b2e74ecd52c59a85bf6f4b1f0b01ab07ba92bc6e57305406115f2bc3e4dd94f19ed896c4fccd34271e9dc3499af9298dbc709e0e6a513d61391d4b198af5f55d24239ae934e8babb8d1cb67bb17b0158", 0x55, 0x3}, {&(0x7f00000002c0)="ae227f954d229f666a6cd22938585e852071e55aa5728addcd315922bf32282e077bdbc63cd5ec89626ee2f8e7982ca239eaa758231056cdca22ca27428407f6c64c384665cfbd00ee6e0d7609f2c7ba0f28b4af70d0307ef78decfe42973915cd509de7c19ea0f3f5c3caaab05f9af08e2cc82d2c14b919dd045e3d36ce1c5d0ff23aed0a4a6ef508b5e71df0a25250d47f1e033ed503b6df99c189111b75b59df679cb75240b756cafecfd203568eeb2c1708fe9f11a2cb0f288590ec76cefbde09c90e9d568492aa5f41196397b70c869838c7164f2bad8eff017d021d7d41c9025c20b", 0xe5, 0x3}, {&(0x7f00000003c0)="792eb6eec33e561f18dc4b58b6a6fb3c7e6fd5e612c08490216ae02617f9811945929cffbf59727393a9a69d57b00a5cd08da3888884b8361d6a4003a54480c1086a5fc876582ff049ede86e2f58d80c7b6cf618e1ba36d4710887bc34ef2b7abbc686df2185f99998060bf492b84e3a02077e2aaf014e1186fde602d2b639d467f48fc2e18cf1553e07ac39040953566ab1d21aac627b166825375377bc3332b62160ea8bf7fc3196b30965dce6181bf7a1c60d0270f24ba60e633c8c88bbdefb5928dc8183c2ce0616de6c3185a4aa7eb2ec6ab7d8394a9536bf7e4f33f76294b0b4a390aca576177671191fe91530e9bd0db79cee", 0xf6, 0x100000000}, {0x0, 0x0, 0x7}], 0x21008, &(0x7f0000000900)={[{'.log\x00'}, {'-%('}, {'.log\x00'}], [{@obj_user={'obj_user'}}, {@appraise_type='appraise_type=imasig'}, {@fowner_eq={'fowner', 0x3d, 0xee01}}, {@hash='hash'}, {@subj_type={'subj_type', 0x3d, '-&'}}]}) ioctl$BTRFS_IOC_SUBVOL_SETFLAGS(r4, 0x4008941a, &(0x7f0000000980)=0xfe33b054cbbc4d79) [ 568.206957][T27554] loop5: detected capacity change from 264192 to 0 [ 568.374788][T27560] loop0: detected capacity change from 264192 to 0 11:25:02 executing program 2: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x7f, 0x80000000008001}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x9}, 0x0) r1 = open(&(0x7f0000000240)='./file1\x00', 0x141142, 0x0) write$UHID_INPUT(r1, &(0x7f0000001440)={0x8, {'\x00Y\x00'}}, 0xfffffc41) open(&(0x7f00000001c0)='./file1\x00', 0x0, 0x0) setxattr$trusted_overlay_nlink(&(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x0, 0x0) 11:25:02 executing program 3: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x7f, 0x80000000008001}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x9}, 0x0) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000080)) r1 = open(&(0x7f0000000240)='./file1\x00', 0x141142, 0x0) write$UHID_INPUT(r1, &(0x7f0000001440)={0x8, {'\x00U\x00'}}, 0xfffffc41) open(&(0x7f00000001c0)='./file1\x00', 0x0, 0x0) setxattr$trusted_overlay_nlink(&(0x7f0000000000)='./file1\x00', &(0x7f00000000c0)='trusted.overlay.nlink\x00', 0x0, 0x0, 0x0) 11:25:03 executing program 4: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x7f, 0x80000000008001}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x9}, 0x0) r1 = open(&(0x7f0000000240)='./file1\x00', 0x141142, 0x0) write$UHID_INPUT(r1, &(0x7f0000001440), 0xfffffc41) open(&(0x7f00000001c0)='./file1\x00', 0x0, 0xfffffff6) 11:25:03 executing program 5: write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000540)=ANY=[@ANYBLOB="7f454c4601061f000400000000000000030038000800000032000000000000004000000000000000560200000000000007000000008038000100090002000100010000000100000006000000000000000400000000000000060000000000000001040000000000000200000000000000010000000000000051e574640400000001000000000000000400000000000000050000000000000005000000000000000400000000000000ff24444700000000908bc001727fbcd44f4d3bf922995edf2fd379eb00"/489], 0x2c4) r0 = inotify_init() r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) epoll_ctl$EPOLL_CTL_DEL(0xffffffffffffffff, 0x2, r1) inotify_add_watch(r0, &(0x7f0000000000)='.\x00', 0x400017e) r2 = openat$incfs(0xffffffffffffffff, &(0x7f0000000080)='.log\x00', 0x0, 0x0) fcntl$getownex(r2, 0x10, &(0x7f00000000c0)) r3 = open(&(0x7f0000000040)='./file0\x00', 0x200c2, 0x0) write$binfmt_elf64(r3, &(0x7f0000000080)=ANY=[], 0x8) sendfile(r3, r3, &(0x7f00000001c0), 0xa198) dup(0xffffffffffffffff) r4 = syz_mount_image$gfs2meta(&(0x7f0000000140)='gfs2meta\x00', 0x0, 0x1000, 0x4, &(0x7f0000000880)=[{&(0x7f0000000240)="77ba0daae1b2e74ecd52c59a85bf6f4b1f0b01ab07ba92bc6e57305406115f2bc3e4dd94f19ed896c4fccd34271e9dc3499af9298dbc709e0e6a513d61391d4b198af5f55d24239ae934e8babb8d1cb67bb17b0158", 0x55, 0x3}, {&(0x7f00000002c0)="ae227f954d229f666a6cd22938585e852071e55aa5728addcd315922bf32282e077bdbc63cd5ec89626ee2f8e7982ca239eaa758231056cdca22ca27428407f6c64c384665cfbd00ee6e0d7609f2c7ba0f28b4af70d0307ef78decfe42973915cd509de7c19ea0f3f5c3caaab05f9af08e2cc82d2c14b919dd045e3d36ce1c5d0ff23aed0a4a6ef508b5e71df0a25250d47f1e033ed503b6df99c189111b75b59df679cb75240b756cafecfd203568eeb2c1708fe9f11a2cb0f288590ec76cefbde09c90e9d568492aa5f41196397b70c869838c7164f2bad8eff017d021d7d41c9025c20b", 0xe5, 0x3}, {&(0x7f00000003c0)="792eb6eec33e561f18dc4b58b6a6fb3c7e6fd5e612c08490216ae02617f9811945929cffbf59727393a9a69d57b00a5cd08da3888884b8361d6a4003a54480c1086a5fc876582ff049ede86e2f58d80c7b6cf618e1ba36d4710887bc34ef2b7abbc686df2185f99998060bf492b84e3a02077e2aaf014e1186fde602d2b639d467f48fc2e18cf1553e07ac39040953566ab1d21aac627b166825375377bc3332b62160ea8bf7fc3196b30965dce6181bf7a1c60d0270f24ba60e633c8c88bbdefb5928dc8183c2ce0616de6c3185a4aa7eb2ec6ab7d8394a9536bf7e4f33f76294b0b4a390aca576177671191fe91530e9bd0db79cee", 0xf6, 0x100000000}, {&(0x7f00000004c0)="a90f49b744c1ad7c27bc0a3b1965ca2bce6602b5f5a8b294ced925862d0a9df5c88e43095ba5810ba49c2216e7e1a9b5f07075e6a3101e853557713e983b2f46cf599dc2cba6254802d01794cdc015e28e2b5aa8c10293a4487b3fe2469252f2c2406327b2a5fe71b185ec0adfdc824a237f94", 0x73, 0x7}], 0x21008, &(0x7f0000000900)={[{'.log\x00'}, {'-%('}, {'.log\x00'}], [{@appraise_type='appraise_type=imasig'}, {@fowner_eq={'fowner', 0x3d, 0xee01}}, {@hash='hash'}, {@subj_type={'subj_type', 0x3d, '-&'}}, {@hash='hash'}]}) ioctl$BTRFS_IOC_SUBVOL_SETFLAGS(r4, 0x4008941a, &(0x7f0000000980)=0xfe33b054cbbc4d79) 11:25:03 executing program 1: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x7f, 0x80000000008001}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x9}, 0x0) r1 = open(&(0x7f0000000240)='./file1\x00', 0x141142, 0x0) write$UHID_INPUT(r1, &(0x7f0000001440), 0xfffffc41) open(&(0x7f00000001c0)='./file1\x00', 0x0, 0x400000000000000) setxattr$trusted_overlay_nlink(&(0x7f0000000000)='./file1\x00', &(0x7f00000000c0)='trusted.overlay.nlink\x00', 0x0, 0x0, 0x0) [ 569.079226][T27577] loop5: detected capacity change from 264192 to 0 11:25:03 executing program 0: r0 = perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x5c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write$binfmt_elf64(r0, &(0x7f0000000540)=ANY=[@ANYBLOB], 0x2c4) r1 = inotify_init() openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) epoll_ctl$EPOLL_CTL_DEL(0xffffffffffffffff, 0x2, 0xffffffffffffffff) inotify_add_watch(r1, &(0x7f0000000000)='.\x00', 0x400017e) r2 = openat$incfs(0xffffffffffffffff, &(0x7f0000000080)='.log\x00', 0x20200, 0x40) fcntl$getownex(r2, 0x10, &(0x7f00000000c0)) r3 = open(&(0x7f0000000040)='./file0\x00', 0x200c2, 0x0) write$binfmt_elf64(r3, &(0x7f0000000080)=ANY=[], 0x8) sendfile(r3, r3, &(0x7f00000001c0), 0xa198) dup(0xffffffffffffffff) r4 = syz_mount_image$gfs2meta(&(0x7f0000000140)='gfs2meta\x00', &(0x7f0000000200)='./file0\x00', 0x1000, 0x4, &(0x7f0000000880)=[{&(0x7f0000000240)="77ba0daae1b2e74ecd52c59a85bf6f4b1f0b01ab07ba92bc6e57305406115f2bc3e4dd94f19ed896c4fccd34271e9dc3499af9298dbc709e0e6a513d61391d4b198af5f55d24239ae934e8babb8d1cb67bb17b0158", 0x55, 0x3}, {&(0x7f00000002c0)="ae227f954d229f666a6cd22938585e852071e55aa5728addcd315922bf32282e077bdbc63cd5ec89626ee2f8e7982ca239eaa758231056cdca22ca27428407f6c64c384665cfbd00ee6e0d7609f2c7ba0f28b4af70d0307ef78decfe42973915cd509de7c19ea0f3f5c3caaab05f9af08e2cc82d2c14b919dd045e3d36ce1c5d0ff23aed0a4a6ef508b5e71df0a25250d47f1e033ed503b6df99c189111b75b59df679cb75240b756cafecfd203568eeb2c1708fe9f11a2cb0f288590ec76cefbde09c90e9d568492aa5f41196397b70c869838c7164f2bad8eff017d021d7d41c9025c20b", 0xe5, 0x3}, {&(0x7f00000003c0)="792eb6eec33e561f18dc4b58b6a6fb3c7e6fd5e612c08490216ae02617f9811945929cffbf59727393a9a69d57b00a5cd08da3888884b8361d6a4003a54480c1086a5fc876582ff049ede86e2f58d80c7b6cf618e1ba36d4710887bc34ef2b7abbc686df2185f99998060bf492b84e3a02077e2aaf014e1186fde602d2b639d467f48fc2e18cf1553e07ac39040953566ab1d21aac627b166825375377bc3332b62160ea8bf7fc3196b30965dce6181bf7a1c60d0270f24ba60e633c8c88bbdefb5928dc8183c2ce0616de6c3185a4aa7eb2ec6ab7d8394a9536bf7e4f33f76294b0b4a390aca576177671191fe91530e9bd0db79cee", 0xf6, 0x100000000}, {0x0, 0x0, 0x7}], 0x21008, &(0x7f0000000900)={[{'.log\x00'}, {'-%('}, {'.log\x00'}], [{@obj_user={'obj_user'}}, {@appraise_type='appraise_type=imasig'}, {@fowner_eq={'fowner', 0x3d, 0xee01}}, {@hash='hash'}, {@subj_type={'subj_type', 0x3d, '-&'}}]}) ioctl$BTRFS_IOC_SUBVOL_SETFLAGS(r4, 0x4008941a, &(0x7f0000000980)=0xfe33b054cbbc4d79) [ 569.335311][T27593] loop0: detected capacity change from 264192 to 0 11:25:03 executing program 3: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x7f, 0x80000000008001}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x9}, 0x0) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000080)) r1 = open(&(0x7f0000000240)='./file1\x00', 0x141142, 0x0) write$UHID_INPUT(r1, &(0x7f0000001440)={0x8, {'\x00V\x00'}}, 0xfffffc41) open(&(0x7f00000001c0)='./file1\x00', 0x0, 0x0) setxattr$trusted_overlay_nlink(&(0x7f0000000000)='./file1\x00', &(0x7f00000000c0)='trusted.overlay.nlink\x00', 0x0, 0x0, 0x0) 11:25:03 executing program 5: write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000540)=ANY=[@ANYBLOB="7f454c4601061f000400000000000000030038000800000032000000000000004000000000000000560200000000000007000000008038000100090002000100010000000100000006000000000000000400000000000000060000000000000001040000000000000200000000000000010000000000000051e574640400000001000000000000000400000000000000050000000000000005000000000000000400000000000000ff24444700000000908bc001727fbcd44f4d3bf922995edf2fd379eb00"/489], 0x2c4) r0 = inotify_init() r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) epoll_ctl$EPOLL_CTL_DEL(0xffffffffffffffff, 0x2, r1) inotify_add_watch(r0, &(0x7f0000000000)='.\x00', 0x400017e) r2 = openat$incfs(0xffffffffffffffff, &(0x7f0000000080)='.log\x00', 0x0, 0x0) fcntl$getownex(r2, 0x10, &(0x7f00000000c0)) r3 = open(&(0x7f0000000040)='./file0\x00', 0x200c2, 0x0) write$binfmt_elf64(r3, &(0x7f0000000080)=ANY=[], 0x8) sendfile(r3, r3, &(0x7f00000001c0), 0xa198) dup(0xffffffffffffffff) r4 = syz_mount_image$gfs2meta(&(0x7f0000000140)='gfs2meta\x00', &(0x7f0000000200)='./file0\x00', 0x0, 0x4, &(0x7f0000000880)=[{&(0x7f0000000240)="77ba0daae1b2e74ecd52c59a85bf6f4b1f0b01ab07ba92bc6e57305406115f2bc3e4dd94f19ed896c4fccd34271e9dc3499af9298dbc709e0e6a513d61391d4b198af5f55d24239ae934e8babb8d1cb67bb17b0158", 0x55, 0x3}, {&(0x7f00000002c0)="ae227f954d229f666a6cd22938585e852071e55aa5728addcd315922bf32282e077bdbc63cd5ec89626ee2f8e7982ca239eaa758231056cdca22ca27428407f6c64c384665cfbd00ee6e0d7609f2c7ba0f28b4af70d0307ef78decfe42973915cd509de7c19ea0f3f5c3caaab05f9af08e2cc82d2c14b919dd045e3d36ce1c5d0ff23aed0a4a6ef508b5e71df0a25250d47f1e033ed503b6df99c189111b75b59df679cb75240b756cafecfd203568eeb2c1708fe9f11a2cb0f288590ec76cefbde09c90e9d568492aa5f41196397b70c869838c7164f2bad8eff017d021d7d41c9025c20b", 0xe5, 0x3}, {&(0x7f00000003c0)="792eb6eec33e561f18dc4b58b6a6fb3c7e6fd5e612c08490216ae02617f9811945929cffbf59727393a9a69d57b00a5cd08da3888884b8361d6a4003a54480c1086a5fc876582ff049ede86e2f58d80c7b6cf618e1ba36d4710887bc34ef2b7abbc686df2185f99998060bf492b84e3a02077e2aaf014e1186fde602d2b639d467f48fc2e18cf1553e07ac39040953566ab1d21aac627b166825375377bc3332b62160ea8bf7fc3196b30965dce6181bf7a1c60d0270f24ba60e633c8c88bbdefb5928dc8183c2ce0616de6c3185a4aa7eb2ec6ab7d8394a9536bf7e4f33f76294b0b4a390aca576177671191fe91530e9bd0db79cee", 0xf6, 0x100000000}, {&(0x7f00000004c0)="a90f49b744c1ad7c27bc0a3b1965ca2bce6602b5f5a8b294ced925862d0a9df5c88e43095ba5810ba49c2216e7e1a9b5f07075e6a3101e853557713e983b2f46cf599dc2cba6254802d01794cdc015e28e2b5aa8c10293a4487b3fe2469252f2c2406327b2a5fe71b185ec0adfdc824a237f94", 0x73, 0x7}], 0x21008, &(0x7f0000000900)={[{'.log\x00'}, {'-%('}, {'.log\x00'}], [{@appraise_type='appraise_type=imasig'}, {@fowner_eq={'fowner', 0x3d, 0xee01}}, {@hash='hash'}, {@subj_type={'subj_type', 0x3d, '-&'}}, {@hash='hash'}]}) ioctl$BTRFS_IOC_SUBVOL_SETFLAGS(r4, 0x4008941a, &(0x7f0000000980)=0xfe33b054cbbc4d79) 11:25:04 executing program 0: r0 = perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x5c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write$binfmt_elf64(r0, &(0x7f0000000540)=ANY=[@ANYBLOB], 0x2c4) r1 = inotify_init() openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) epoll_ctl$EPOLL_CTL_DEL(0xffffffffffffffff, 0x2, 0xffffffffffffffff) inotify_add_watch(r1, &(0x7f0000000000)='.\x00', 0x400017e) r2 = openat$incfs(0xffffffffffffffff, &(0x7f0000000080)='.log\x00', 0x20200, 0x40) fcntl$getownex(r2, 0x10, &(0x7f00000000c0)) r3 = open(&(0x7f0000000040)='./file0\x00', 0x200c2, 0x0) write$binfmt_elf64(r3, &(0x7f0000000080)=ANY=[], 0x8) sendfile(r3, r3, &(0x7f00000001c0), 0xa198) dup(0xffffffffffffffff) r4 = syz_mount_image$gfs2meta(&(0x7f0000000140)='gfs2meta\x00', &(0x7f0000000200)='./file0\x00', 0x1000, 0x4, &(0x7f0000000880)=[{&(0x7f0000000240)="77ba0daae1b2e74ecd52c59a85bf6f4b1f0b01ab07ba92bc6e57305406115f2bc3e4dd94f19ed896c4fccd34271e9dc3499af9298dbc709e0e6a513d61391d4b198af5f55d24239ae934e8babb8d1cb67bb17b0158", 0x55, 0x3}, {&(0x7f00000002c0)="ae227f954d229f666a6cd22938585e852071e55aa5728addcd315922bf32282e077bdbc63cd5ec89626ee2f8e7982ca239eaa758231056cdca22ca27428407f6c64c384665cfbd00ee6e0d7609f2c7ba0f28b4af70d0307ef78decfe42973915cd509de7c19ea0f3f5c3caaab05f9af08e2cc82d2c14b919dd045e3d36ce1c5d0ff23aed0a4a6ef508b5e71df0a25250d47f1e033ed503b6df99c189111b75b59df679cb75240b756cafecfd203568eeb2c1708fe9f11a2cb0f288590ec76cefbde09c90e9d568492aa5f41196397b70c869838c7164f2bad8eff017d021d7d41c9025c20b", 0xe5, 0x3}, {&(0x7f00000003c0)="792eb6eec33e561f18dc4b58b6a6fb3c7e6fd5e612c08490216ae02617f9811945929cffbf59727393a9a69d57b00a5cd08da3888884b8361d6a4003a54480c1086a5fc876582ff049ede86e2f58d80c7b6cf618e1ba36d4710887bc34ef2b7abbc686df2185f99998060bf492b84e3a02077e2aaf014e1186fde602d2b639d467f48fc2e18cf1553e07ac39040953566ab1d21aac627b166825375377bc3332b62160ea8bf7fc3196b30965dce6181bf7a1c60d0270f24ba60e633c8c88bbdefb5928dc8183c2ce0616de6c3185a4aa7eb2ec6ab7d8394a9536bf7e4f33f76294b0b4a390aca576177671191fe91530e9bd0db79cee", 0xf6, 0x100000000}, {0x0}], 0x21008, &(0x7f0000000900)={[{'.log\x00'}, {'-%('}, {'.log\x00'}], [{@obj_user={'obj_user'}}, {@appraise_type='appraise_type=imasig'}, {@fowner_eq={'fowner', 0x3d, 0xee01}}, {@hash='hash'}, {@subj_type={'subj_type', 0x3d, '-&'}}]}) ioctl$BTRFS_IOC_SUBVOL_SETFLAGS(r4, 0x4008941a, &(0x7f0000000980)=0xfe33b054cbbc4d79) [ 570.010207][T27605] loop5: detected capacity change from 264192 to 0 [ 570.017376][ T35] kauditd_printk_skb: 24 callbacks suppressed [ 570.017388][ T35] audit: type=1804 audit(1612178704.099:2260): pid=27592 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.1" name="/root/syzkaller-testdir551554057/syzkaller.l2Zg4z/405/file1" dev="sda1" ino=15902 res=1 errno=0 11:25:04 executing program 2: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x7f, 0x80000000008001}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x9}, 0x0) r1 = open(&(0x7f0000000240)='./file1\x00', 0x141142, 0x0) write$UHID_INPUT(r1, &(0x7f0000001440)={0x8, {'\x00Z\x00'}}, 0xfffffc41) open(&(0x7f00000001c0)='./file1\x00', 0x0, 0x0) setxattr$trusted_overlay_nlink(&(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x0, 0x0) [ 570.065957][ T35] audit: type=1804 audit(1612178704.149:2261): pid=27595 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.1" name="/root/syzkaller-testdir551554057/syzkaller.l2Zg4z/405/file1" dev="sda1" ino=15902 res=1 errno=0 [ 570.141508][T27616] loop0: detected capacity change from 264192 to 0 11:25:04 executing program 4: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x7f, 0x80000000008001}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x9}, 0x0) r1 = open(&(0x7f0000000240)='./file1\x00', 0x141142, 0x0) write$UHID_INPUT(r1, &(0x7f0000001440), 0xfffffc41) setxattr$trusted_overlay_nlink(&(0x7f0000000000)='./file1\x00', &(0x7f00000000c0)='trusted.overlay.nlink\x00', 0x0, 0x0, 0x0) [ 570.219335][ T35] audit: type=1804 audit(1612178704.149:2262): pid=27592 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor.1" name="/root/syzkaller-testdir551554057/syzkaller.l2Zg4z/405/file1" dev="sda1" ino=15902 res=1 errno=0 11:25:04 executing program 1: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x7f, 0x80000000008001}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x9}, 0x0) r1 = open(&(0x7f0000000240)='./file1\x00', 0x141142, 0x0) write$UHID_INPUT(r1, &(0x7f0000001440), 0xfffffc41) open(&(0x7f00000001c0)='./file1\x00', 0x0, 0x500000000000000) setxattr$trusted_overlay_nlink(&(0x7f0000000000)='./file1\x00', &(0x7f00000000c0)='trusted.overlay.nlink\x00', 0x0, 0x0, 0x0) [ 570.635342][ T35] audit: type=1804 audit(1612178704.719:2263): pid=27611 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.3" name="/root/syzkaller-testdir548988167/syzkaller.gb8agU/409/file1" dev="sda1" ino=15899 res=1 errno=0 11:25:04 executing program 5: write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000540)=ANY=[@ANYBLOB="7f454c4601061f000400000000000000030038000800000032000000000000004000000000000000560200000000000007000000008038000100090002000100010000000100000006000000000000000400000000000000060000000000000001040000000000000200000000000000010000000000000051e574640400000001000000000000000400000000000000050000000000000005000000000000000400000000000000ff24444700000000908bc001727fbcd44f4d3bf922995edf2fd379eb00"/489], 0x2c4) r0 = inotify_init() r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) epoll_ctl$EPOLL_CTL_DEL(0xffffffffffffffff, 0x2, r1) inotify_add_watch(r0, &(0x7f0000000000)='.\x00', 0x400017e) r2 = openat$incfs(0xffffffffffffffff, &(0x7f0000000080)='.log\x00', 0x0, 0x0) fcntl$getownex(r2, 0x10, &(0x7f00000000c0)) r3 = open(&(0x7f0000000040)='./file0\x00', 0x200c2, 0x0) write$binfmt_elf64(r3, &(0x7f0000000080)=ANY=[], 0x8) sendfile(r3, r3, &(0x7f00000001c0), 0xa198) dup(0xffffffffffffffff) r4 = syz_mount_image$gfs2meta(&(0x7f0000000140)='gfs2meta\x00', &(0x7f0000000200)='./file0\x00', 0x0, 0x4, &(0x7f0000000880)=[{&(0x7f0000000240)="77ba0daae1b2e74ecd52c59a85bf6f4b1f0b01ab07ba92bc6e57305406115f2bc3e4dd94f19ed896c4fccd34271e9dc3499af9298dbc709e0e6a513d61391d4b198af5f55d24239ae934e8babb8d1cb67bb17b0158", 0x55, 0x3}, {&(0x7f00000002c0)="ae227f954d229f666a6cd22938585e852071e55aa5728addcd315922bf32282e077bdbc63cd5ec89626ee2f8e7982ca239eaa758231056cdca22ca27428407f6c64c384665cfbd00ee6e0d7609f2c7ba0f28b4af70d0307ef78decfe42973915cd509de7c19ea0f3f5c3caaab05f9af08e2cc82d2c14b919dd045e3d36ce1c5d0ff23aed0a4a6ef508b5e71df0a25250d47f1e033ed503b6df99c189111b75b59df679cb75240b756cafecfd203568eeb2c1708fe9f11a2cb0f288590ec76cefbde09c90e9d568492aa5f41196397b70c869838c7164f2bad8eff017d021d7d41c9025c20b", 0xe5, 0x3}, {&(0x7f00000003c0)="792eb6eec33e561f18dc4b58b6a6fb3c7e6fd5e612c08490216ae02617f9811945929cffbf59727393a9a69d57b00a5cd08da3888884b8361d6a4003a54480c1086a5fc876582ff049ede86e2f58d80c7b6cf618e1ba36d4710887bc34ef2b7abbc686df2185f99998060bf492b84e3a02077e2aaf014e1186fde602d2b639d467f48fc2e18cf1553e07ac39040953566ab1d21aac627b166825375377bc3332b62160ea8bf7fc3196b30965dce6181bf7a1c60d0270f24ba60e633c8c88bbdefb5928dc8183c2ce0616de6c3185a4aa7eb2ec6ab7d8394a9536bf7e4f33f76294b0b4a390aca576177671191fe91530e9bd0db79cee", 0xf6, 0x100000000}, {&(0x7f00000004c0)="a90f49b744c1ad7c27bc0a3b1965ca2bce6602b5f5a8b294ced925862d0a9df5c88e43095ba5810ba49c2216e7e1a9b5f07075e6a3101e853557713e983b2f46cf599dc2cba6254802d01794cdc015e28e2b5aa8c10293a4487b3fe2469252f2c2406327b2a5fe71b185ec0adfdc824a237f94", 0x73, 0x7}], 0x21008, &(0x7f0000000900)={[{'.log\x00'}, {'-%('}, {'.log\x00'}], [{@appraise_type='appraise_type=imasig'}, {@fowner_eq={'fowner', 0x3d, 0xee01}}, {@hash='hash'}, {@subj_type={'subj_type', 0x3d, '-&'}}, {@hash='hash'}]}) ioctl$BTRFS_IOC_SUBVOL_SETFLAGS(r4, 0x4008941a, &(0x7f0000000980)=0xfe33b054cbbc4d79) [ 570.922874][ T35] audit: type=1804 audit(1612178704.979:2264): pid=27615 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.3" name="/root/syzkaller-testdir548988167/syzkaller.gb8agU/409/file1" dev="sda1" ino=15899 res=1 errno=0 11:25:05 executing program 0: r0 = perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x5c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write$binfmt_elf64(r0, &(0x7f0000000540)=ANY=[@ANYBLOB], 0x2c4) r1 = inotify_init() openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) epoll_ctl$EPOLL_CTL_DEL(0xffffffffffffffff, 0x2, 0xffffffffffffffff) inotify_add_watch(r1, &(0x7f0000000000)='.\x00', 0x400017e) r2 = openat$incfs(0xffffffffffffffff, &(0x7f0000000080)='.log\x00', 0x20200, 0x40) fcntl$getownex(r2, 0x10, &(0x7f00000000c0)) r3 = open(&(0x7f0000000040)='./file0\x00', 0x200c2, 0x0) write$binfmt_elf64(r3, &(0x7f0000000080)=ANY=[], 0x8) sendfile(r3, r3, &(0x7f00000001c0), 0xa198) dup(0xffffffffffffffff) r4 = syz_mount_image$gfs2meta(&(0x7f0000000140)='gfs2meta\x00', &(0x7f0000000200)='./file0\x00', 0x1000, 0x4, &(0x7f0000000880)=[{&(0x7f0000000240)="77ba0daae1b2e74ecd52c59a85bf6f4b1f0b01ab07ba92bc6e57305406115f2bc3e4dd94f19ed896c4fccd34271e9dc3499af9298dbc709e0e6a513d61391d4b198af5f55d24239ae934e8babb8d1cb67bb17b0158", 0x55, 0x3}, {&(0x7f00000002c0)="ae227f954d229f666a6cd22938585e852071e55aa5728addcd315922bf32282e077bdbc63cd5ec89626ee2f8e7982ca239eaa758231056cdca22ca27428407f6c64c384665cfbd00ee6e0d7609f2c7ba0f28b4af70d0307ef78decfe42973915cd509de7c19ea0f3f5c3caaab05f9af08e2cc82d2c14b919dd045e3d36ce1c5d0ff23aed0a4a6ef508b5e71df0a25250d47f1e033ed503b6df99c189111b75b59df679cb75240b756cafecfd203568eeb2c1708fe9f11a2cb0f288590ec76cefbde09c90e9d568492aa5f41196397b70c869838c7164f2bad8eff017d021d7d41c9025c20b", 0xe5, 0x3}, {&(0x7f00000003c0)="792eb6eec33e561f18dc4b58b6a6fb3c7e6fd5e612c08490216ae02617f9811945929cffbf59727393a9a69d57b00a5cd08da3888884b8361d6a4003a54480c1086a5fc876582ff049ede86e2f58d80c7b6cf618e1ba36d4710887bc34ef2b7abbc686df2185f99998060bf492b84e3a02077e2aaf014e1186fde602d2b639d467f48fc2e18cf1553e07ac39040953566ab1d21aac627b166825375377bc3332b62160ea8bf7fc3196b30965dce6181bf7a1c60d0270f24ba60e633c8c88bbdefb5928dc8183c2ce0616de6c3185a4aa7eb2ec6ab7d8394a9536bf7e4f33f76294b0b4a390aca576177671191fe91530e9bd0db79cee", 0xf6, 0x100000000}, {0x0}], 0x21008, &(0x7f0000000900)={[{'.log\x00'}, {'-%('}, {'.log\x00'}], [{@obj_user={'obj_user'}}, {@appraise_type='appraise_type=imasig'}, {@fowner_eq={'fowner', 0x3d, 0xee01}}, {@hash='hash'}, {@subj_type={'subj_type', 0x3d, '-&'}}]}) ioctl$BTRFS_IOC_SUBVOL_SETFLAGS(r4, 0x4008941a, &(0x7f0000000980)=0xfe33b054cbbc4d79) 11:25:05 executing program 3: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x7f, 0x80000000008001}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x9}, 0x0) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000080)) r1 = open(&(0x7f0000000240)='./file1\x00', 0x141142, 0x0) write$UHID_INPUT(r1, &(0x7f0000001440)={0x8, {'\x00W\x00'}}, 0xfffffc41) open(&(0x7f00000001c0)='./file1\x00', 0x0, 0x0) setxattr$trusted_overlay_nlink(&(0x7f0000000000)='./file1\x00', &(0x7f00000000c0)='trusted.overlay.nlink\x00', 0x0, 0x0, 0x0) [ 571.041441][ T35] audit: type=1804 audit(1612178705.119:2265): pid=27625 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.2" name="/root/syzkaller-testdir245532710/syzkaller.d2c0aK/422/file1" dev="sda1" ino=15910 res=1 errno=0 [ 571.064391][T27638] loop5: detected capacity change from 264192 to 0 11:25:05 executing program 2: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x7f, 0x80000000008001}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x9}, 0x0) r1 = open(&(0x7f0000000240)='./file1\x00', 0x141142, 0x0) write$UHID_INPUT(r1, &(0x7f0000001440)={0x8, {'\x00[\x00'}}, 0xfffffc41) open(&(0x7f00000001c0)='./file1\x00', 0x0, 0x0) setxattr$trusted_overlay_nlink(&(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x0, 0x0) [ 571.176661][ T35] audit: type=1800 audit(1612178705.259:2266): pid=27625 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed comm="syz-executor.2" name="file1" dev="sda1" ino=15910 res=0 errno=0 [ 571.211637][T27643] loop0: detected capacity change from 264192 to 0 [ 571.292186][ T35] audit: type=1804 audit(1612178705.259:2267): pid=27623 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor.2" name="/root/syzkaller-testdir245532710/syzkaller.d2c0aK/422/file1" dev="sda1" ino=15910 res=1 errno=0 [ 571.317827][ T35] audit: type=1800 audit(1612178705.259:2268): pid=27623 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed comm="syz-executor.2" name="file1" dev="sda1" ino=15910 res=0 errno=0 [ 571.372363][ T35] audit: type=1804 audit(1612178705.459:2269): pid=27631 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.1" name="/root/syzkaller-testdir551554057/syzkaller.l2Zg4z/406/file1" dev="sda1" ino=15902 res=1 errno=0 11:25:05 executing program 4: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x7f, 0x80000000008001}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x9}, 0x0) r1 = open(&(0x7f0000000240)='./file1\x00', 0x141142, 0x0) write$UHID_INPUT(r1, &(0x7f0000001440), 0xfffffc41) setxattr$trusted_overlay_nlink(&(0x7f0000000000)='./file1\x00', &(0x7f00000000c0)='trusted.overlay.nlink\x00', 0x0, 0x0, 0x0) 11:25:05 executing program 1: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x7f, 0x80000000008001}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x9}, 0x0) r1 = open(&(0x7f0000000240)='./file1\x00', 0x141142, 0x0) write$UHID_INPUT(r1, &(0x7f0000001440), 0xfffffc41) open(&(0x7f00000001c0)='./file1\x00', 0x0, 0x600000000000000) setxattr$trusted_overlay_nlink(&(0x7f0000000000)='./file1\x00', &(0x7f00000000c0)='trusted.overlay.nlink\x00', 0x0, 0x0, 0x0) 11:25:05 executing program 5: write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000540)=ANY=[@ANYBLOB="7f454c4601061f000400000000000000030038000800000032000000000000004000000000000000560200000000000007000000008038000100090002000100010000000100000006000000000000000400000000000000060000000000000001040000000000000200000000000000010000000000000051e574640400000001000000000000000400000000000000050000000000000005000000000000000400000000000000ff24444700000000908bc001727fbcd44f4d3bf922995edf2fd379eb00"/489], 0x2c4) r0 = inotify_init() r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) epoll_ctl$EPOLL_CTL_DEL(0xffffffffffffffff, 0x2, r1) inotify_add_watch(r0, &(0x7f0000000000)='.\x00', 0x400017e) r2 = openat$incfs(0xffffffffffffffff, &(0x7f0000000080)='.log\x00', 0x0, 0x0) fcntl$getownex(r2, 0x10, &(0x7f00000000c0)) r3 = open(&(0x7f0000000040)='./file0\x00', 0x200c2, 0x0) write$binfmt_elf64(r3, &(0x7f0000000080)=ANY=[], 0x8) sendfile(r3, r3, &(0x7f00000001c0), 0xa198) dup(0xffffffffffffffff) r4 = syz_mount_image$gfs2meta(&(0x7f0000000140)='gfs2meta\x00', &(0x7f0000000200)='./file0\x00', 0x0, 0x4, &(0x7f0000000880)=[{&(0x7f0000000240)="77ba0daae1b2e74ecd52c59a85bf6f4b1f0b01ab07ba92bc6e57305406115f2bc3e4dd94f19ed896c4fccd34271e9dc3499af9298dbc709e0e6a513d61391d4b198af5f55d24239ae934e8babb8d1cb67bb17b0158", 0x55, 0x3}, {&(0x7f00000002c0)="ae227f954d229f666a6cd22938585e852071e55aa5728addcd315922bf32282e077bdbc63cd5ec89626ee2f8e7982ca239eaa758231056cdca22ca27428407f6c64c384665cfbd00ee6e0d7609f2c7ba0f28b4af70d0307ef78decfe42973915cd509de7c19ea0f3f5c3caaab05f9af08e2cc82d2c14b919dd045e3d36ce1c5d0ff23aed0a4a6ef508b5e71df0a25250d47f1e033ed503b6df99c189111b75b59df679cb75240b756cafecfd203568eeb2c1708fe9f11a2cb0f288590ec76cefbde09c90e9d568492aa5f41196397b70c869838c7164f2bad8eff017d021d7d41c9025c20b", 0xe5, 0x3}, {&(0x7f00000003c0)="792eb6eec33e561f18dc4b58b6a6fb3c7e6fd5e612c08490216ae02617f9811945929cffbf59727393a9a69d57b00a5cd08da3888884b8361d6a4003a54480c1086a5fc876582ff049ede86e2f58d80c7b6cf618e1ba36d4710887bc34ef2b7abbc686df2185f99998060bf492b84e3a02077e2aaf014e1186fde602d2b639d467f48fc2e18cf1553e07ac39040953566ab1d21aac627b166825375377bc3332b62160ea8bf7fc3196b30965dce6181bf7a1c60d0270f24ba60e633c8c88bbdefb5928dc8183c2ce0616de6c3185a4aa7eb2ec6ab7d8394a9536bf7e4f33f76294b0b4a390aca576177671191fe91530e9bd0db79cee", 0xf6, 0x100000000}, {&(0x7f00000004c0)="a90f49b744c1ad7c27bc0a3b1965ca2bce6602b5f5a8b294ced925862d0a9df5c88e43095ba5810ba49c2216e7e1a9b5f07075e6a3101e853557713e983b2f46cf599dc2cba6254802d01794cdc015e28e2b5aa8c10293a4487b3fe2469252f2c2406327b2a5fe71b185ec0adfdc824a237f94", 0x73, 0x7}], 0x21008, &(0x7f0000000900)={[{'.log\x00'}, {'-%('}, {'.log\x00'}], [{@appraise_type='appraise_type=imasig'}, {@fowner_eq={'fowner', 0x3d, 0xee01}}, {@hash='hash'}, {@subj_type={'subj_type', 0x3d, '-&'}}, {@hash='hash'}]}) ioctl$BTRFS_IOC_SUBVOL_SETFLAGS(r4, 0x4008941a, &(0x7f0000000980)=0xfe33b054cbbc4d79) [ 571.791804][T27670] loop5: detected capacity change from 264192 to 0 11:25:06 executing program 0: r0 = perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x5c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write$binfmt_elf64(r0, &(0x7f0000000540)=ANY=[@ANYBLOB], 0x2c4) r1 = inotify_init() openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) epoll_ctl$EPOLL_CTL_DEL(0xffffffffffffffff, 0x2, 0xffffffffffffffff) inotify_add_watch(r1, &(0x7f0000000000)='.\x00', 0x400017e) r2 = openat$incfs(0xffffffffffffffff, &(0x7f0000000080)='.log\x00', 0x20200, 0x40) fcntl$getownex(r2, 0x10, &(0x7f00000000c0)) r3 = open(&(0x7f0000000040)='./file0\x00', 0x200c2, 0x0) write$binfmt_elf64(r3, &(0x7f0000000080)=ANY=[], 0x8) sendfile(r3, r3, &(0x7f00000001c0), 0xa198) dup(0xffffffffffffffff) r4 = syz_mount_image$gfs2meta(&(0x7f0000000140)='gfs2meta\x00', &(0x7f0000000200)='./file0\x00', 0x1000, 0x4, &(0x7f0000000880)=[{&(0x7f0000000240)="77ba0daae1b2e74ecd52c59a85bf6f4b1f0b01ab07ba92bc6e57305406115f2bc3e4dd94f19ed896c4fccd34271e9dc3499af9298dbc709e0e6a513d61391d4b198af5f55d24239ae934e8babb8d1cb67bb17b0158", 0x55, 0x3}, {&(0x7f00000002c0)="ae227f954d229f666a6cd22938585e852071e55aa5728addcd315922bf32282e077bdbc63cd5ec89626ee2f8e7982ca239eaa758231056cdca22ca27428407f6c64c384665cfbd00ee6e0d7609f2c7ba0f28b4af70d0307ef78decfe42973915cd509de7c19ea0f3f5c3caaab05f9af08e2cc82d2c14b919dd045e3d36ce1c5d0ff23aed0a4a6ef508b5e71df0a25250d47f1e033ed503b6df99c189111b75b59df679cb75240b756cafecfd203568eeb2c1708fe9f11a2cb0f288590ec76cefbde09c90e9d568492aa5f41196397b70c869838c7164f2bad8eff017d021d7d41c9025c20b", 0xe5, 0x3}, {&(0x7f00000003c0)="792eb6eec33e561f18dc4b58b6a6fb3c7e6fd5e612c08490216ae02617f9811945929cffbf59727393a9a69d57b00a5cd08da3888884b8361d6a4003a54480c1086a5fc876582ff049ede86e2f58d80c7b6cf618e1ba36d4710887bc34ef2b7abbc686df2185f99998060bf492b84e3a02077e2aaf014e1186fde602d2b639d467f48fc2e18cf1553e07ac39040953566ab1d21aac627b166825375377bc3332b62160ea8bf7fc3196b30965dce6181bf7a1c60d0270f24ba60e633c8c88bbdefb5928dc8183c2ce0616de6c3185a4aa7eb2ec6ab7d8394a9536bf7e4f33f76294b0b4a390aca576177671191fe91530e9bd0db79cee", 0xf6, 0x100000000}, {0x0}], 0x21008, &(0x7f0000000900)={[{'.log\x00'}, {'-%('}, {'.log\x00'}], [{@obj_user={'obj_user'}}, {@appraise_type='appraise_type=imasig'}, {@fowner_eq={'fowner', 0x3d, 0xee01}}, {@hash='hash'}, {@subj_type={'subj_type', 0x3d, '-&'}}]}) ioctl$BTRFS_IOC_SUBVOL_SETFLAGS(r4, 0x4008941a, &(0x7f0000000980)=0xfe33b054cbbc4d79) [ 572.125517][T27681] loop0: detected capacity change from 264192 to 0 11:25:06 executing program 2: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x7f, 0x80000000008001}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x9}, 0x0) r1 = open(&(0x7f0000000240)='./file1\x00', 0x141142, 0x0) write$UHID_INPUT(r1, &(0x7f0000001440)={0x8, {'\x00\\\x00'}}, 0xfffffc41) open(&(0x7f00000001c0)='./file1\x00', 0x0, 0x0) setxattr$trusted_overlay_nlink(&(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x0, 0x0) 11:25:06 executing program 3: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x7f, 0x80000000008001}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x9}, 0x0) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000080)) r1 = open(&(0x7f0000000240)='./file1\x00', 0x141142, 0x0) write$UHID_INPUT(r1, &(0x7f0000001440)={0x8, {'\x00X\x00'}}, 0xfffffc41) open(&(0x7f00000001c0)='./file1\x00', 0x0, 0x0) setxattr$trusted_overlay_nlink(&(0x7f0000000000)='./file1\x00', &(0x7f00000000c0)='trusted.overlay.nlink\x00', 0x0, 0x0, 0x0) 11:25:06 executing program 5: write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000540)=ANY=[@ANYBLOB="7f454c4601061f000400000000000000030038000800000032000000000000004000000000000000560200000000000007000000008038000100090002000100010000000100000006000000000000000400000000000000060000000000000001040000000000000200000000000000010000000000000051e574640400000001000000000000000400000000000000050000000000000005000000000000000400000000000000ff24444700000000908bc001727fbcd44f4d3bf922995edf2fd379eb00"/489], 0x2c4) r0 = inotify_init() r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) epoll_ctl$EPOLL_CTL_DEL(0xffffffffffffffff, 0x2, r1) inotify_add_watch(r0, &(0x7f0000000000)='.\x00', 0x400017e) r2 = openat$incfs(0xffffffffffffffff, &(0x7f0000000080)='.log\x00', 0x0, 0x0) fcntl$getownex(r2, 0x10, &(0x7f00000000c0)) r3 = open(&(0x7f0000000040)='./file0\x00', 0x200c2, 0x0) write$binfmt_elf64(r3, &(0x7f0000000080)=ANY=[], 0x8) sendfile(r3, r3, &(0x7f00000001c0), 0xa198) dup(0xffffffffffffffff) r4 = syz_mount_image$gfs2meta(&(0x7f0000000140)='gfs2meta\x00', &(0x7f0000000200)='./file0\x00', 0x1000, 0x0, 0x0, 0x21008, &(0x7f0000000900)={[{'.log\x00'}, {'-%('}, {'.log\x00'}], [{@appraise_type='appraise_type=imasig'}, {@fowner_eq={'fowner', 0x3d, 0xee01}}, {@hash='hash'}, {@subj_type={'subj_type', 0x3d, '-&'}}, {@hash='hash'}]}) ioctl$BTRFS_IOC_SUBVOL_SETFLAGS(r4, 0x4008941a, &(0x7f0000000980)=0xfe33b054cbbc4d79) 11:25:06 executing program 4: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x7f, 0x80000000008001}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x9}, 0x0) r1 = open(&(0x7f0000000240)='./file1\x00', 0x141142, 0x0) write$UHID_INPUT(r1, &(0x7f0000001440), 0xfffffc41) setxattr$trusted_overlay_nlink(&(0x7f0000000000)='./file1\x00', &(0x7f00000000c0)='trusted.overlay.nlink\x00', 0x0, 0x0, 0x0) 11:25:06 executing program 1: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x7f, 0x80000000008001}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x9}, 0x0) r1 = open(&(0x7f0000000240)='./file1\x00', 0x141142, 0x0) write$UHID_INPUT(r1, &(0x7f0000001440), 0xfffffc41) open(&(0x7f00000001c0)='./file1\x00', 0x0, 0x700000000000000) setxattr$trusted_overlay_nlink(&(0x7f0000000000)='./file1\x00', &(0x7f00000000c0)='trusted.overlay.nlink\x00', 0x0, 0x0, 0x0) 11:25:07 executing program 0: r0 = perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x5c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write$binfmt_elf64(r0, &(0x7f0000000540)=ANY=[@ANYBLOB], 0x2c4) r1 = inotify_init() openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) epoll_ctl$EPOLL_CTL_DEL(0xffffffffffffffff, 0x2, 0xffffffffffffffff) inotify_add_watch(r1, &(0x7f0000000000)='.\x00', 0x400017e) r2 = openat$incfs(0xffffffffffffffff, &(0x7f0000000080)='.log\x00', 0x20200, 0x40) fcntl$getownex(r2, 0x10, &(0x7f00000000c0)) r3 = open(&(0x7f0000000040)='./file0\x00', 0x200c2, 0x0) write$binfmt_elf64(r3, &(0x7f0000000080)=ANY=[], 0x8) sendfile(r3, r3, &(0x7f00000001c0), 0xa198) dup(0xffffffffffffffff) r4 = syz_mount_image$gfs2meta(&(0x7f0000000140)='gfs2meta\x00', &(0x7f0000000200)='./file0\x00', 0x1000, 0x3, &(0x7f0000000880)=[{&(0x7f0000000240)="77ba0daae1b2e74ecd52c59a85bf6f4b1f0b01ab07ba92bc6e57305406115f2bc3e4dd94f19ed896c4fccd34271e9dc3499af9298dbc709e0e6a513d61391d4b198af5f55d24239ae934e8babb8d1cb67bb17b0158", 0x55, 0x3}, {&(0x7f00000002c0)="ae227f954d229f666a6cd22938585e852071e55aa5728addcd315922bf32282e077bdbc63cd5ec89626ee2f8e7982ca239eaa758231056cdca22ca27428407f6c64c384665cfbd00ee6e0d7609f2c7ba0f28b4af70d0307ef78decfe42973915cd509de7c19ea0f3f5c3caaab05f9af08e2cc82d2c14b919dd045e3d36ce1c5d0ff23aed0a4a6ef508b5e71df0a25250d47f1e033ed503b6df99c189111b75b59df679cb75240b756cafecfd203568eeb2c1708fe9f11a2cb0f288590ec76cefbde09c90e9d568492aa5f41196397b70c869838c7164f2bad8eff017d021d7d41c9025c20b", 0xe5, 0x3}, {0x0, 0x0, 0x7}], 0x21008, &(0x7f0000000900)={[{'.log\x00'}, {'-%('}, {'.log\x00'}], [{@obj_user={'obj_user'}}, {@appraise_type='appraise_type=imasig'}, {@fowner_eq={'fowner', 0x3d, 0xee01}}, {@hash='hash'}, {@subj_type={'subj_type', 0x3d, '-&'}}]}) ioctl$BTRFS_IOC_SUBVOL_SETFLAGS(r4, 0x4008941a, &(0x7f0000000980)=0xfe33b054cbbc4d79) [ 573.050791][T27709] loop0: detected capacity change from 8 to 0 11:25:07 executing program 5: write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000540)=ANY=[@ANYBLOB="7f454c4601061f000400000000000000030038000800000032000000000000004000000000000000560200000000000007000000008038000100090002000100010000000100000006000000000000000400000000000000060000000000000001040000000000000200000000000000010000000000000051e574640400000001000000000000000400000000000000050000000000000005000000000000000400000000000000ff24444700000000908bc001727fbcd44f4d3bf922995edf2fd379eb00"/489], 0x2c4) r0 = inotify_init() r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) epoll_ctl$EPOLL_CTL_DEL(0xffffffffffffffff, 0x2, r1) inotify_add_watch(r0, &(0x7f0000000000)='.\x00', 0x400017e) r2 = openat$incfs(0xffffffffffffffff, &(0x7f0000000080)='.log\x00', 0x0, 0x0) fcntl$getownex(r2, 0x10, &(0x7f00000000c0)) r3 = open(&(0x7f0000000040)='./file0\x00', 0x200c2, 0x0) write$binfmt_elf64(r3, &(0x7f0000000080)=ANY=[], 0x8) sendfile(r3, r3, &(0x7f00000001c0), 0xa198) dup(0xffffffffffffffff) r4 = syz_mount_image$gfs2meta(&(0x7f0000000140)='gfs2meta\x00', &(0x7f0000000200)='./file0\x00', 0x1000, 0x0, 0x0, 0x21008, &(0x7f0000000900)={[{'.log\x00'}, {'-%('}, {'.log\x00'}], [{@appraise_type='appraise_type=imasig'}, {@fowner_eq={'fowner', 0x3d, 0xee01}}, {@hash='hash'}, {@subj_type={'subj_type', 0x3d, '-&'}}, {@hash='hash'}]}) ioctl$BTRFS_IOC_SUBVOL_SETFLAGS(r4, 0x4008941a, &(0x7f0000000980)=0xfe33b054cbbc4d79) 11:25:07 executing program 2: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x7f, 0x80000000008001}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x9}, 0x0) r1 = open(&(0x7f0000000240)='./file1\x00', 0x141142, 0x0) write$UHID_INPUT(r1, &(0x7f0000001440)={0x8, {'\x00]\x00'}}, 0xfffffc41) open(&(0x7f00000001c0)='./file1\x00', 0x0, 0x0) setxattr$trusted_overlay_nlink(&(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x0, 0x0) 11:25:07 executing program 3: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x7f, 0x80000000008001}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x9}, 0x0) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000080)) r1 = open(&(0x7f0000000240)='./file1\x00', 0x141142, 0x0) write$UHID_INPUT(r1, &(0x7f0000001440)={0x8, {'\x00Y\x00'}}, 0xfffffc41) open(&(0x7f00000001c0)='./file1\x00', 0x0, 0x0) setxattr$trusted_overlay_nlink(&(0x7f0000000000)='./file1\x00', &(0x7f00000000c0)='trusted.overlay.nlink\x00', 0x0, 0x0, 0x0) 11:25:07 executing program 0: r0 = perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x5c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write$binfmt_elf64(r0, &(0x7f0000000540)=ANY=[@ANYBLOB], 0x2c4) r1 = inotify_init() openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) epoll_ctl$EPOLL_CTL_DEL(0xffffffffffffffff, 0x2, 0xffffffffffffffff) inotify_add_watch(r1, &(0x7f0000000000)='.\x00', 0x400017e) r2 = openat$incfs(0xffffffffffffffff, &(0x7f0000000080)='.log\x00', 0x20200, 0x40) fcntl$getownex(r2, 0x10, &(0x7f00000000c0)) r3 = open(&(0x7f0000000040)='./file0\x00', 0x200c2, 0x0) write$binfmt_elf64(r3, &(0x7f0000000080)=ANY=[], 0x8) sendfile(r3, r3, &(0x7f00000001c0), 0xa198) dup(0xffffffffffffffff) r4 = syz_mount_image$gfs2meta(&(0x7f0000000140)='gfs2meta\x00', &(0x7f0000000200)='./file0\x00', 0x1000, 0x3, &(0x7f0000000880)=[{&(0x7f0000000240)="77ba0daae1b2e74ecd52c59a85bf6f4b1f0b01ab07ba92bc6e57305406115f2bc3e4dd94f19ed896c4fccd34271e9dc3499af9298dbc709e0e6a513d61391d4b198af5f55d24239ae934e8babb8d1cb67bb17b0158", 0x55, 0x3}, {&(0x7f00000002c0)="ae227f954d229f666a6cd22938585e852071e55aa5728addcd315922bf32282e077bdbc63cd5ec89626ee2f8e7982ca239eaa758231056cdca22ca27428407f6c64c384665cfbd00ee6e0d7609f2c7ba0f28b4af70d0307ef78decfe42973915cd509de7c19ea0f3f5c3caaab05f9af08e2cc82d2c14b919dd045e3d36ce1c5d0ff23aed0a4a6ef508b5e71df0a25250d47f1e033ed503b6df99c189111b75b59df679cb75240b756cafecfd203568eeb2c1708fe9f11a2cb0f288590ec76cefbde09c90e9d568492aa5f41196397b70c869838c7164f2bad8eff017d021d7d41c9025c20b", 0xe5, 0x3}, {0x0, 0x0, 0x7}], 0x21008, &(0x7f0000000900)={[{'.log\x00'}, {'-%('}, {'.log\x00'}], [{@obj_user={'obj_user'}}, {@appraise_type='appraise_type=imasig'}, {@fowner_eq={'fowner', 0x3d, 0xee01}}, {@hash='hash'}, {@subj_type={'subj_type', 0x3d, '-&'}}]}) ioctl$BTRFS_IOC_SUBVOL_SETFLAGS(r4, 0x4008941a, &(0x7f0000000980)=0xfe33b054cbbc4d79) 11:25:08 executing program 4: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x7f, 0x80000000008001}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x9}, 0x0) write$UHID_INPUT(0xffffffffffffffff, &(0x7f0000001440), 0xfffffc41) open(&(0x7f00000001c0)='./file1\x00', 0x0, 0xfffffff6) setxattr$trusted_overlay_nlink(&(0x7f0000000000)='./file1\x00', &(0x7f00000000c0)='trusted.overlay.nlink\x00', 0x0, 0x0, 0x0) [ 573.996352][T27734] loop0: detected capacity change from 8 to 0 11:25:08 executing program 1: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x7f, 0x80000000008001}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x9}, 0x0) r1 = open(&(0x7f0000000240)='./file1\x00', 0x141142, 0x0) write$UHID_INPUT(r1, &(0x7f0000001440), 0xfffffc41) open(&(0x7f00000001c0)='./file1\x00', 0x0, 0x800000000000000) setxattr$trusted_overlay_nlink(&(0x7f0000000000)='./file1\x00', &(0x7f00000000c0)='trusted.overlay.nlink\x00', 0x0, 0x0, 0x0) 11:25:08 executing program 5: write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000540)=ANY=[@ANYBLOB="7f454c4601061f000400000000000000030038000800000032000000000000004000000000000000560200000000000007000000008038000100090002000100010000000100000006000000000000000400000000000000060000000000000001040000000000000200000000000000010000000000000051e574640400000001000000000000000400000000000000050000000000000005000000000000000400000000000000ff24444700000000908bc001727fbcd44f4d3bf922995edf2fd379eb00"/489], 0x2c4) r0 = inotify_init() r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) epoll_ctl$EPOLL_CTL_DEL(0xffffffffffffffff, 0x2, r1) inotify_add_watch(r0, &(0x7f0000000000)='.\x00', 0x400017e) r2 = openat$incfs(0xffffffffffffffff, &(0x7f0000000080)='.log\x00', 0x0, 0x0) fcntl$getownex(r2, 0x10, &(0x7f00000000c0)) r3 = open(&(0x7f0000000040)='./file0\x00', 0x200c2, 0x0) write$binfmt_elf64(r3, &(0x7f0000000080)=ANY=[], 0x8) sendfile(r3, r3, &(0x7f00000001c0), 0xa198) dup(0xffffffffffffffff) r4 = syz_mount_image$gfs2meta(&(0x7f0000000140)='gfs2meta\x00', &(0x7f0000000200)='./file0\x00', 0x1000, 0x0, 0x0, 0x21008, &(0x7f0000000900)={[{'.log\x00'}, {'-%('}, {'.log\x00'}], [{@appraise_type='appraise_type=imasig'}, {@fowner_eq={'fowner', 0x3d, 0xee01}}, {@hash='hash'}, {@subj_type={'subj_type', 0x3d, '-&'}}, {@hash='hash'}]}) ioctl$BTRFS_IOC_SUBVOL_SETFLAGS(r4, 0x4008941a, &(0x7f0000000980)=0xfe33b054cbbc4d79) 11:25:08 executing program 4: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x7f, 0x80000000008001}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x9}, 0x0) write$UHID_INPUT(0xffffffffffffffff, &(0x7f0000001440), 0xfffffc41) open(&(0x7f00000001c0)='./file1\x00', 0x0, 0xfffffff6) setxattr$trusted_overlay_nlink(&(0x7f0000000000)='./file1\x00', &(0x7f00000000c0)='trusted.overlay.nlink\x00', 0x0, 0x0, 0x0) 11:25:08 executing program 4: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x7f, 0x80000000008001}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x9}, 0x0) write$UHID_INPUT(0xffffffffffffffff, &(0x7f0000001440), 0xfffffc41) open(&(0x7f00000001c0)='./file1\x00', 0x0, 0xfffffff6) setxattr$trusted_overlay_nlink(&(0x7f0000000000)='./file1\x00', &(0x7f00000000c0)='trusted.overlay.nlink\x00', 0x0, 0x0, 0x0) 11:25:08 executing program 4: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x7f, 0x80000000008001}, 0x0) getpid() r0 = open(&(0x7f0000000240)='./file1\x00', 0x141142, 0x0) write$UHID_INPUT(r0, &(0x7f0000001440), 0xfffffc41) open(&(0x7f00000001c0)='./file1\x00', 0x0, 0xfffffff6) setxattr$trusted_overlay_nlink(&(0x7f0000000000)='./file1\x00', &(0x7f00000000c0)='trusted.overlay.nlink\x00', 0x0, 0x0, 0x0) 11:25:08 executing program 2: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x7f, 0x80000000008001}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x9}, 0x0) r1 = open(&(0x7f0000000240)='./file1\x00', 0x141142, 0x0) write$UHID_INPUT(r1, &(0x7f0000001440)={0x8, {'\x00^\x00'}}, 0xfffffc41) open(&(0x7f00000001c0)='./file1\x00', 0x0, 0x0) setxattr$trusted_overlay_nlink(&(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x0, 0x0) 11:25:08 executing program 0: r0 = perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x5c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write$binfmt_elf64(r0, &(0x7f0000000540)=ANY=[@ANYBLOB], 0x2c4) r1 = inotify_init() openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) epoll_ctl$EPOLL_CTL_DEL(0xffffffffffffffff, 0x2, 0xffffffffffffffff) inotify_add_watch(r1, &(0x7f0000000000)='.\x00', 0x400017e) r2 = openat$incfs(0xffffffffffffffff, &(0x7f0000000080)='.log\x00', 0x20200, 0x40) fcntl$getownex(r2, 0x10, &(0x7f00000000c0)) r3 = open(&(0x7f0000000040)='./file0\x00', 0x200c2, 0x0) write$binfmt_elf64(r3, &(0x7f0000000080)=ANY=[], 0x8) sendfile(r3, r3, &(0x7f00000001c0), 0xa198) dup(0xffffffffffffffff) r4 = syz_mount_image$gfs2meta(&(0x7f0000000140)='gfs2meta\x00', &(0x7f0000000200)='./file0\x00', 0x1000, 0x3, &(0x7f0000000880)=[{&(0x7f0000000240)="77ba0daae1b2e74ecd52c59a85bf6f4b1f0b01ab07ba92bc6e57305406115f2bc3e4dd94f19ed896c4fccd34271e9dc3499af9298dbc709e0e6a513d61391d4b198af5f55d24239ae934e8babb8d1cb67bb17b0158", 0x55, 0x3}, {&(0x7f00000002c0)="ae227f954d229f666a6cd22938585e852071e55aa5728addcd315922bf32282e077bdbc63cd5ec89626ee2f8e7982ca239eaa758231056cdca22ca27428407f6c64c384665cfbd00ee6e0d7609f2c7ba0f28b4af70d0307ef78decfe42973915cd509de7c19ea0f3f5c3caaab05f9af08e2cc82d2c14b919dd045e3d36ce1c5d0ff23aed0a4a6ef508b5e71df0a25250d47f1e033ed503b6df99c189111b75b59df679cb75240b756cafecfd203568eeb2c1708fe9f11a2cb0f288590ec76cefbde09c90e9d568492aa5f41196397b70c869838c7164f2bad8eff017d021d7d41c9025c20b", 0xe5, 0x3}, {0x0, 0x0, 0x7}], 0x21008, &(0x7f0000000900)={[{'.log\x00'}, {'-%('}, {'.log\x00'}], [{@obj_user={'obj_user'}}, {@appraise_type='appraise_type=imasig'}, {@fowner_eq={'fowner', 0x3d, 0xee01}}, {@hash='hash'}, {@subj_type={'subj_type', 0x3d, '-&'}}]}) ioctl$BTRFS_IOC_SUBVOL_SETFLAGS(r4, 0x4008941a, &(0x7f0000000980)=0xfe33b054cbbc4d79) 11:25:08 executing program 3: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x7f, 0x80000000008001}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x9}, 0x0) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000080)) r1 = open(&(0x7f0000000240)='./file1\x00', 0x141142, 0x0) write$UHID_INPUT(r1, &(0x7f0000001440)={0x8, {'\x00Z\x00'}}, 0xfffffc41) open(&(0x7f00000001c0)='./file1\x00', 0x0, 0x0) setxattr$trusted_overlay_nlink(&(0x7f0000000000)='./file1\x00', &(0x7f00000000c0)='trusted.overlay.nlink\x00', 0x0, 0x0, 0x0) [ 575.008531][T27767] loop0: detected capacity change from 8 to 0 [ 575.072535][ T35] kauditd_printk_skb: 21 callbacks suppressed [ 575.072547][ T35] audit: type=1804 audit(1612178709.159:2291): pid=27758 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.4" name="/root/syzkaller-testdir068764309/syzkaller.I2gCPs/460/file1" dev="sda1" ino=15932 res=1 errno=0 11:25:09 executing program 5: write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000540)=ANY=[@ANYBLOB="7f454c4601061f000400000000000000030038000800000032000000000000004000000000000000560200000000000007000000008038000100090002000100010000000100000006000000000000000400000000000000060000000000000001040000000000000200000000000000010000000000000051e574640400000001000000000000000400000000000000050000000000000005000000000000000400000000000000ff24444700000000908bc001727fbcd44f4d3bf922995edf2fd379eb00"/489], 0x2c4) r0 = inotify_init() r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) epoll_ctl$EPOLL_CTL_DEL(0xffffffffffffffff, 0x2, r1) inotify_add_watch(r0, &(0x7f0000000000)='.\x00', 0x400017e) r2 = openat$incfs(0xffffffffffffffff, &(0x7f0000000080)='.log\x00', 0x0, 0x0) fcntl$getownex(r2, 0x10, &(0x7f00000000c0)) r3 = open(&(0x7f0000000040)='./file0\x00', 0x200c2, 0x0) write$binfmt_elf64(r3, &(0x7f0000000080)=ANY=[], 0x8) sendfile(r3, r3, &(0x7f00000001c0), 0xa198) dup(0xffffffffffffffff) r4 = syz_mount_image$gfs2meta(&(0x7f0000000140)='gfs2meta\x00', &(0x7f0000000200)='./file0\x00', 0x1000, 0x0, 0x0, 0x0, &(0x7f0000000900)={[{'.log\x00'}, {'-%('}, {'.log\x00'}], [{@appraise_type='appraise_type=imasig'}, {@fowner_eq={'fowner', 0x3d, 0xee01}}, {@hash='hash'}, {@subj_type={'subj_type', 0x3d, '-&'}}, {@hash='hash'}]}) ioctl$BTRFS_IOC_SUBVOL_SETFLAGS(r4, 0x4008941a, &(0x7f0000000980)=0xfe33b054cbbc4d79) [ 575.279953][ T35] audit: type=1804 audit(1612178709.269:2292): pid=27754 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.1" name="/root/syzkaller-testdir551554057/syzkaller.l2Zg4z/409/file1" dev="sda1" ino=15896 res=1 errno=0 11:25:09 executing program 4: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x7f, 0x80000000008001}, 0x0) getpid() r0 = open(&(0x7f0000000240)='./file1\x00', 0x141142, 0x0) write$UHID_INPUT(r0, &(0x7f0000001440), 0xfffffc41) open(&(0x7f00000001c0)='./file1\x00', 0x0, 0xfffffff6) setxattr$trusted_overlay_nlink(&(0x7f0000000000)='./file1\x00', &(0x7f00000000c0)='trusted.overlay.nlink\x00', 0x0, 0x0, 0x0) 11:25:09 executing program 1: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x7f, 0x80000000008001}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x9}, 0x0) r1 = open(&(0x7f0000000240)='./file1\x00', 0x141142, 0x0) write$UHID_INPUT(r1, &(0x7f0000001440), 0xfffffc41) open(&(0x7f00000001c0)='./file1\x00', 0x0, 0x900000000000000) setxattr$trusted_overlay_nlink(&(0x7f0000000000)='./file1\x00', &(0x7f00000000c0)='trusted.overlay.nlink\x00', 0x0, 0x0, 0x0) [ 575.439155][ T35] audit: type=1804 audit(1612178709.269:2293): pid=27778 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor.1" name="/root/syzkaller-testdir551554057/syzkaller.l2Zg4z/409/file1" dev="sda1" ino=15896 res=1 errno=0 [ 575.548599][ T35] audit: type=1804 audit(1612178709.269:2294): pid=27779 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.1" name="/root/syzkaller-testdir551554057/syzkaller.l2Zg4z/409/file1" dev="sda1" ino=15896 res=1 errno=0 [ 575.660720][ T35] audit: type=1804 audit(1612178709.739:2295): pid=27777 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.2" name="/root/syzkaller-testdir245532710/syzkaller.d2c0aK/426/file1" dev="sda1" ino=15936 res=1 errno=0 11:25:09 executing program 0: r0 = perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x5c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write$binfmt_elf64(r0, &(0x7f0000000540)=ANY=[@ANYBLOB], 0x2c4) r1 = inotify_init() openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) epoll_ctl$EPOLL_CTL_DEL(0xffffffffffffffff, 0x2, 0xffffffffffffffff) inotify_add_watch(r1, &(0x7f0000000000)='.\x00', 0x400017e) r2 = openat$incfs(0xffffffffffffffff, &(0x7f0000000080)='.log\x00', 0x20200, 0x40) fcntl$getownex(r2, 0x10, &(0x7f00000000c0)) r3 = open(&(0x7f0000000040)='./file0\x00', 0x200c2, 0x0) write$binfmt_elf64(r3, &(0x7f0000000080)=ANY=[], 0x8) sendfile(r3, r3, &(0x7f00000001c0), 0xa198) dup(0xffffffffffffffff) r4 = syz_mount_image$gfs2meta(&(0x7f0000000140)='gfs2meta\x00', &(0x7f0000000200)='./file0\x00', 0x1000, 0x4, &(0x7f0000000880)=[{&(0x7f0000000240)="77ba0daae1b2e74ecd52c59a85bf6f4b1f0b01ab07ba92bc6e57305406115f2bc3e4dd94f19ed896c4fccd34271e9dc3499af9298dbc709e0e6a513d61391d4b198af5f55d24239ae934e8babb8d1cb67bb17b0158", 0x55, 0x3}, {&(0x7f00000002c0)="ae227f954d229f666a6cd22938585e852071e55aa5728addcd315922bf32282e077bdbc63cd5ec89626ee2f8e7982ca239eaa758231056cdca22ca27428407f6c64c384665cfbd00ee6e0d7609f2c7ba0f28b4af70d0307ef78decfe42973915cd509de7c19ea0f3f5c3caaab05f9af08e2cc82d2c14b919dd045e3d36ce1c5d0ff23aed0a4a6ef508b5e71df0a25250d47f1e033ed503b6df99c189111b75b59df679cb75240b756cafecfd203568eeb2c1708fe9f11a2cb0f288590ec76cefbde09c90e9d568492aa5f41196397b70c869838c7164f2bad8eff017d021d7d41c9025c20b", 0xe5, 0x3}, {0x0, 0x0, 0x100000000}, {0x0, 0x0, 0x7}], 0x21008, &(0x7f0000000900)={[{'.log\x00'}, {'-%('}, {'.log\x00'}], [{@obj_user={'obj_user'}}, {@appraise_type='appraise_type=imasig'}, {@fowner_eq={'fowner', 0x3d, 0xee01}}, {@hash='hash'}, {@subj_type={'subj_type', 0x3d, '-&'}}]}) ioctl$BTRFS_IOC_SUBVOL_SETFLAGS(r4, 0x4008941a, &(0x7f0000000980)=0xfe33b054cbbc4d79) [ 575.893040][ T35] audit: type=1804 audit(1612178709.979:2296): pid=27776 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.3" name="/root/syzkaller-testdir548988167/syzkaller.gb8agU/413/file1" dev="sda1" ino=15899 res=1 errno=0 11:25:10 executing program 2: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x7f, 0x80000000008001}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x9}, 0x0) r1 = open(&(0x7f0000000240)='./file1\x00', 0x141142, 0x0) write$UHID_INPUT(r1, &(0x7f0000001440)={0x8, {'\x00_\x00'}}, 0xfffffc41) open(&(0x7f00000001c0)='./file1\x00', 0x0, 0x0) setxattr$trusted_overlay_nlink(&(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x0, 0x0) [ 576.042953][T27803] loop0: detected capacity change from 264192 to 0 [ 576.078308][ T35] audit: type=1804 audit(1612178709.979:2297): pid=27801 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor.3" name="/root/syzkaller-testdir548988167/syzkaller.gb8agU/413/file1" dev="sda1" ino=15899 res=1 errno=0 [ 576.108186][ T35] audit: type=1804 audit(1612178709.999:2298): pid=27782 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.3" name="/root/syzkaller-testdir548988167/syzkaller.gb8agU/413/file1" dev="sda1" ino=15899 res=1 errno=0 11:25:10 executing program 5: write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000540)=ANY=[@ANYBLOB="7f454c4601061f000400000000000000030038000800000032000000000000004000000000000000560200000000000007000000008038000100090002000100010000000100000006000000000000000400000000000000060000000000000001040000000000000200000000000000010000000000000051e574640400000001000000000000000400000000000000050000000000000005000000000000000400000000000000ff24444700000000908bc001727fbcd44f4d3bf922995edf2fd379eb00"/489], 0x2c4) r0 = inotify_init() r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) epoll_ctl$EPOLL_CTL_DEL(0xffffffffffffffff, 0x2, r1) inotify_add_watch(r0, &(0x7f0000000000)='.\x00', 0x400017e) r2 = openat$incfs(0xffffffffffffffff, &(0x7f0000000080)='.log\x00', 0x0, 0x0) fcntl$getownex(r2, 0x10, &(0x7f00000000c0)) r3 = open(&(0x7f0000000040)='./file0\x00', 0x200c2, 0x0) write$binfmt_elf64(r3, &(0x7f0000000080)=ANY=[], 0x8) sendfile(r3, r3, &(0x7f00000001c0), 0xa198) dup(0xffffffffffffffff) r4 = syz_mount_image$gfs2meta(&(0x7f0000000140)='gfs2meta\x00', &(0x7f0000000200)='./file0\x00', 0x1000, 0x0, 0x0, 0x0, 0x0) ioctl$BTRFS_IOC_SUBVOL_SETFLAGS(r4, 0x4008941a, &(0x7f0000000980)=0xfe33b054cbbc4d79) [ 576.145097][ T35] audit: type=1804 audit(1612178710.079:2299): pid=27773 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.2" name="/root/syzkaller-testdir245532710/syzkaller.d2c0aK/426/file1" dev="sda1" ino=15936 res=1 errno=0 11:25:10 executing program 3: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x7f, 0x80000000008001}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x9}, 0x0) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000080)) r1 = open(&(0x7f0000000240)='./file1\x00', 0x141142, 0x0) write$UHID_INPUT(r1, &(0x7f0000001440)={0x8, {'\x00[\x00'}}, 0xfffffc41) open(&(0x7f00000001c0)='./file1\x00', 0x0, 0x0) setxattr$trusted_overlay_nlink(&(0x7f0000000000)='./file1\x00', &(0x7f00000000c0)='trusted.overlay.nlink\x00', 0x0, 0x0, 0x0) [ 576.360773][ T35] audit: type=1804 audit(1612178710.439:2300): pid=27808 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.2" name="/root/syzkaller-testdir245532710/syzkaller.d2c0aK/427/file1" dev="sda1" ino=15936 res=1 errno=0 11:25:10 executing program 2: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x7f, 0x80000000008001}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x9}, 0x0) r1 = open(&(0x7f0000000240)='./file1\x00', 0x141142, 0x0) write$UHID_INPUT(r1, &(0x7f0000001440)={0x8, {'\x00`\x00'}}, 0xfffffc41) open(&(0x7f00000001c0)='./file1\x00', 0x0, 0x0) setxattr$trusted_overlay_nlink(&(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x0, 0x0) 11:25:10 executing program 0: r0 = perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x5c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write$binfmt_elf64(r0, &(0x7f0000000540)=ANY=[@ANYBLOB], 0x2c4) r1 = inotify_init() openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) epoll_ctl$EPOLL_CTL_DEL(0xffffffffffffffff, 0x2, 0xffffffffffffffff) inotify_add_watch(r1, &(0x7f0000000000)='.\x00', 0x400017e) r2 = openat$incfs(0xffffffffffffffff, &(0x7f0000000080)='.log\x00', 0x20200, 0x40) fcntl$getownex(r2, 0x10, &(0x7f00000000c0)) r3 = open(&(0x7f0000000040)='./file0\x00', 0x200c2, 0x0) write$binfmt_elf64(r3, &(0x7f0000000080)=ANY=[], 0x8) sendfile(r3, r3, &(0x7f00000001c0), 0xa198) dup(0xffffffffffffffff) r4 = syz_mount_image$gfs2meta(&(0x7f0000000140)='gfs2meta\x00', &(0x7f0000000200)='./file0\x00', 0x1000, 0x4, &(0x7f0000000880)=[{&(0x7f0000000240)="77ba0daae1b2e74ecd52c59a85bf6f4b1f0b01ab07ba92bc6e57305406115f2bc3e4dd94f19ed896c4fccd34271e9dc3499af9298dbc709e0e6a513d61391d4b198af5f55d24239ae934e8babb8d1cb67bb17b0158", 0x55, 0x3}, {&(0x7f00000002c0)="ae227f954d229f666a6cd22938585e852071e55aa5728addcd315922bf32282e077bdbc63cd5ec89626ee2f8e7982ca239eaa758231056cdca22ca27428407f6c64c384665cfbd00ee6e0d7609f2c7ba0f28b4af70d0307ef78decfe42973915cd509de7c19ea0f3f5c3caaab05f9af08e2cc82d2c14b919dd045e3d36ce1c5d0ff23aed0a4a6ef508b5e71df0a25250d47f1e033ed503b6df99c189111b75b59df679cb75240b756cafecfd203568eeb2c1708fe9f11a2cb0f288590ec76cefbde09c90e9d568492aa5f41196397b70c869838c7164f2bad8eff017d021d7d41c9025c20b", 0xe5, 0x3}, {0x0, 0x0, 0x100000000}, {0x0, 0x0, 0x7}], 0x21008, &(0x7f0000000900)={[{'.log\x00'}, {'-%('}, {'.log\x00'}], [{@obj_user={'obj_user'}}, {@appraise_type='appraise_type=imasig'}, {@fowner_eq={'fowner', 0x3d, 0xee01}}, {@hash='hash'}, {@subj_type={'subj_type', 0x3d, '-&'}}]}) ioctl$BTRFS_IOC_SUBVOL_SETFLAGS(r4, 0x4008941a, &(0x7f0000000980)=0xfe33b054cbbc4d79) 11:25:10 executing program 4: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x7f, 0x80000000008001}, 0x0) getpid() r0 = open(&(0x7f0000000240)='./file1\x00', 0x141142, 0x0) write$UHID_INPUT(r0, &(0x7f0000001440), 0xfffffc41) open(&(0x7f00000001c0)='./file1\x00', 0x0, 0xfffffff6) setxattr$trusted_overlay_nlink(&(0x7f0000000000)='./file1\x00', &(0x7f00000000c0)='trusted.overlay.nlink\x00', 0x0, 0x0, 0x0) 11:25:10 executing program 1: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x7f, 0x80000000008001}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x9}, 0x0) r1 = open(&(0x7f0000000240)='./file1\x00', 0x141142, 0x0) write$UHID_INPUT(r1, &(0x7f0000001440), 0xfffffc41) open(&(0x7f00000001c0)='./file1\x00', 0x0, 0xa00000000000000) setxattr$trusted_overlay_nlink(&(0x7f0000000000)='./file1\x00', &(0x7f00000000c0)='trusted.overlay.nlink\x00', 0x0, 0x0, 0x0) [ 576.895763][T27826] loop0: detected capacity change from 264192 to 0 11:25:11 executing program 5: write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000540)=ANY=[@ANYBLOB="7f454c4601061f000400000000000000030038000800000032000000000000004000000000000000560200000000000007000000008038000100090002000100010000000100000006000000000000000400000000000000060000000000000001040000000000000200000000000000010000000000000051e574640400000001000000000000000400000000000000050000000000000005000000000000000400000000000000ff24444700000000908bc001727fbcd44f4d3bf922995edf2fd379eb00"/489], 0x2c4) r0 = inotify_init() r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) epoll_ctl$EPOLL_CTL_DEL(0xffffffffffffffff, 0x2, r1) inotify_add_watch(r0, &(0x7f0000000000)='.\x00', 0x400017e) r2 = openat$incfs(0xffffffffffffffff, &(0x7f0000000080)='.log\x00', 0x0, 0x0) fcntl$getownex(r2, 0x10, &(0x7f00000000c0)) r3 = open(&(0x7f0000000040)='./file0\x00', 0x200c2, 0x0) write$binfmt_elf64(r3, &(0x7f0000000080)=ANY=[], 0x8) sendfile(r3, r3, &(0x7f00000001c0), 0xa198) dup(0xffffffffffffffff) r4 = syz_mount_image$gfs2meta(&(0x7f0000000140)='gfs2meta\x00', &(0x7f0000000200)='./file0\x00', 0x1000, 0x0, 0x0, 0x0, 0x0) ioctl$BTRFS_IOC_SUBVOL_SETFLAGS(r4, 0x4008941a, &(0x7f0000000980)=0xfe33b054cbbc4d79) 11:25:11 executing program 0: r0 = perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x5c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write$binfmt_elf64(r0, &(0x7f0000000540)=ANY=[@ANYBLOB], 0x2c4) r1 = inotify_init() openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) epoll_ctl$EPOLL_CTL_DEL(0xffffffffffffffff, 0x2, 0xffffffffffffffff) inotify_add_watch(r1, &(0x7f0000000000)='.\x00', 0x400017e) r2 = openat$incfs(0xffffffffffffffff, &(0x7f0000000080)='.log\x00', 0x20200, 0x40) fcntl$getownex(r2, 0x10, &(0x7f00000000c0)) r3 = open(&(0x7f0000000040)='./file0\x00', 0x200c2, 0x0) write$binfmt_elf64(r3, &(0x7f0000000080)=ANY=[], 0x8) sendfile(r3, r3, &(0x7f00000001c0), 0xa198) dup(0xffffffffffffffff) r4 = syz_mount_image$gfs2meta(&(0x7f0000000140)='gfs2meta\x00', &(0x7f0000000200)='./file0\x00', 0x1000, 0x4, &(0x7f0000000880)=[{&(0x7f0000000240)="77ba0daae1b2e74ecd52c59a85bf6f4b1f0b01ab07ba92bc6e57305406115f2bc3e4dd94f19ed896c4fccd34271e9dc3499af9298dbc709e0e6a513d61391d4b198af5f55d24239ae934e8babb8d1cb67bb17b0158", 0x55, 0x3}, {&(0x7f00000002c0)="ae227f954d229f666a6cd22938585e852071e55aa5728addcd315922bf32282e077bdbc63cd5ec89626ee2f8e7982ca239eaa758231056cdca22ca27428407f6c64c384665cfbd00ee6e0d7609f2c7ba0f28b4af70d0307ef78decfe42973915cd509de7c19ea0f3f5c3caaab05f9af08e2cc82d2c14b919dd045e3d36ce1c5d0ff23aed0a4a6ef508b5e71df0a25250d47f1e033ed503b6df99c189111b75b59df679cb75240b756cafecfd203568eeb2c1708fe9f11a2cb0f288590ec76cefbde09c90e9d568492aa5f41196397b70c869838c7164f2bad8eff017d021d7d41c9025c20b", 0xe5, 0x3}, {0x0, 0x0, 0x100000000}, {0x0, 0x0, 0x7}], 0x21008, &(0x7f0000000900)={[{'.log\x00'}, {'-%('}, {'.log\x00'}], [{@obj_user={'obj_user'}}, {@appraise_type='appraise_type=imasig'}, {@fowner_eq={'fowner', 0x3d, 0xee01}}, {@hash='hash'}, {@subj_type={'subj_type', 0x3d, '-&'}}]}) ioctl$BTRFS_IOC_SUBVOL_SETFLAGS(r4, 0x4008941a, &(0x7f0000000980)=0xfe33b054cbbc4d79) 11:25:11 executing program 3: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x7f, 0x80000000008001}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x9}, 0x0) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000080)) r1 = open(&(0x7f0000000240)='./file1\x00', 0x141142, 0x0) write$UHID_INPUT(r1, &(0x7f0000001440)={0x8, {'\x00\\\x00'}}, 0xfffffc41) open(&(0x7f00000001c0)='./file1\x00', 0x0, 0x0) setxattr$trusted_overlay_nlink(&(0x7f0000000000)='./file1\x00', &(0x7f00000000c0)='trusted.overlay.nlink\x00', 0x0, 0x0, 0x0) [ 577.653192][T27852] loop0: detected capacity change from 264192 to 0 11:25:11 executing program 4: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x7f, 0x80000000008001}, 0x0) sched_setattr(0x0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x9}, 0x0) r0 = open(&(0x7f0000000240)='./file1\x00', 0x141142, 0x0) write$UHID_INPUT(r0, &(0x7f0000001440), 0xfffffc41) open(&(0x7f00000001c0)='./file1\x00', 0x0, 0xfffffff6) setxattr$trusted_overlay_nlink(&(0x7f0000000000)='./file1\x00', &(0x7f00000000c0)='trusted.overlay.nlink\x00', 0x0, 0x0, 0x0) 11:25:11 executing program 2: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x7f, 0x80000000008001}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x9}, 0x0) r1 = open(&(0x7f0000000240)='./file1\x00', 0x141142, 0x0) write$UHID_INPUT(r1, &(0x7f0000001440)={0x8, {'\x00a\x00'}}, 0xfffffc41) open(&(0x7f00000001c0)='./file1\x00', 0x0, 0x0) setxattr$trusted_overlay_nlink(&(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x0, 0x0) 11:25:12 executing program 1: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x7f, 0x80000000008001}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x9}, 0x0) r1 = open(&(0x7f0000000240)='./file1\x00', 0x141142, 0x0) write$UHID_INPUT(r1, &(0x7f0000001440), 0xfffffc41) open(&(0x7f00000001c0)='./file1\x00', 0x0, 0xb00000000000000) setxattr$trusted_overlay_nlink(&(0x7f0000000000)='./file1\x00', &(0x7f00000000c0)='trusted.overlay.nlink\x00', 0x0, 0x0, 0x0) 11:25:12 executing program 5: write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000540)=ANY=[@ANYBLOB="7f454c4601061f000400000000000000030038000800000032000000000000004000000000000000560200000000000007000000008038000100090002000100010000000100000006000000000000000400000000000000060000000000000001040000000000000200000000000000010000000000000051e574640400000001000000000000000400000000000000050000000000000005000000000000000400000000000000ff24444700000000908bc001727fbcd44f4d3bf922995edf2fd379eb00"/489], 0x2c4) r0 = inotify_init() r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) epoll_ctl$EPOLL_CTL_DEL(0xffffffffffffffff, 0x2, r1) inotify_add_watch(r0, &(0x7f0000000000)='.\x00', 0x400017e) r2 = openat$incfs(0xffffffffffffffff, &(0x7f0000000080)='.log\x00', 0x0, 0x0) fcntl$getownex(r2, 0x10, &(0x7f00000000c0)) r3 = open(&(0x7f0000000040)='./file0\x00', 0x200c2, 0x0) write$binfmt_elf64(r3, &(0x7f0000000080)=ANY=[], 0x8) sendfile(r3, r3, &(0x7f00000001c0), 0xa198) dup(0xffffffffffffffff) r4 = syz_mount_image$gfs2meta(&(0x7f0000000140)='gfs2meta\x00', &(0x7f0000000200)='./file0\x00', 0x1000, 0x0, 0x0, 0x0, 0x0) ioctl$BTRFS_IOC_SUBVOL_SETFLAGS(r4, 0x4008941a, &(0x7f0000000980)=0xfe33b054cbbc4d79) 11:25:12 executing program 4: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x7f, 0x80000000008001}, 0x0) sched_setattr(0x0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x9}, 0x0) r0 = open(&(0x7f0000000240)='./file1\x00', 0x141142, 0x0) write$UHID_INPUT(r0, &(0x7f0000001440), 0xfffffc41) open(&(0x7f00000001c0)='./file1\x00', 0x0, 0xfffffff6) setxattr$trusted_overlay_nlink(&(0x7f0000000000)='./file1\x00', &(0x7f00000000c0)='trusted.overlay.nlink\x00', 0x0, 0x0, 0x0) 11:25:12 executing program 0: r0 = perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x5c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write$binfmt_elf64(r0, &(0x7f0000000540)=ANY=[@ANYBLOB], 0x2c4) r1 = inotify_init() openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) epoll_ctl$EPOLL_CTL_DEL(0xffffffffffffffff, 0x2, 0xffffffffffffffff) inotify_add_watch(r1, &(0x7f0000000000)='.\x00', 0x400017e) r2 = openat$incfs(0xffffffffffffffff, &(0x7f0000000080)='.log\x00', 0x20200, 0x40) fcntl$getownex(r2, 0x10, &(0x7f00000000c0)) r3 = open(&(0x7f0000000040)='./file0\x00', 0x200c2, 0x0) write$binfmt_elf64(r3, &(0x7f0000000080)=ANY=[], 0x8) sendfile(r3, r3, &(0x7f00000001c0), 0xa198) dup(0xffffffffffffffff) r4 = syz_mount_image$gfs2meta(&(0x7f0000000140)='gfs2meta\x00', &(0x7f0000000200)='./file0\x00', 0x1000, 0x4, &(0x7f0000000880)=[{&(0x7f0000000240)="77ba0daae1b2e74ecd52c59a85bf6f4b1f0b01ab07ba92bc6e57305406115f2bc3e4dd94f19ed896c4fccd34271e9dc3499af9298dbc709e0e6a513d61391d4b198af5f55d24239ae934e8babb8d1cb67bb17b0158", 0x55, 0x3}, {&(0x7f00000002c0)="ae227f954d229f666a6cd22938585e852071e55aa5728addcd315922bf32282e077bdbc63cd5ec89626ee2f8e7982ca239eaa758231056cdca22ca27428407f6c64c384665cfbd00ee6e0d7609f2c7ba0f28b4af70d0307ef78decfe42973915cd509de7c19ea0f3f5c3caaab05f9af08e2cc82d2c14b919dd045e3d36ce1c5d0ff23aed0a4a6ef508b5e71df0a25250d47f1e033ed503b6df99c189111b75b59df679cb75240b756cafecfd203568eeb2c1708fe9f11a2cb0f288590ec76cefbde09c90e9d568492aa5f41196397b70c869838c7164f2bad8eff017d021d7d41c9025c20b", 0xe5, 0x3}, {&(0x7f00000003c0), 0x0, 0x100000000}, {0x0, 0x0, 0x7}], 0x21008, &(0x7f0000000900)={[{'.log\x00'}, {'-%('}, {'.log\x00'}], [{@obj_user={'obj_user'}}, {@appraise_type='appraise_type=imasig'}, {@fowner_eq={'fowner', 0x3d, 0xee01}}, {@hash='hash'}, {@subj_type={'subj_type', 0x3d, '-&'}}]}) ioctl$BTRFS_IOC_SUBVOL_SETFLAGS(r4, 0x4008941a, &(0x7f0000000980)=0xfe33b054cbbc4d79) [ 578.647916][T27890] loop0: detected capacity change from 264192 to 0 11:25:12 executing program 4: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x7f, 0x80000000008001}, 0x0) sched_setattr(0x0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x9}, 0x0) r0 = open(&(0x7f0000000240)='./file1\x00', 0x141142, 0x0) write$UHID_INPUT(r0, &(0x7f0000001440), 0xfffffc41) open(&(0x7f00000001c0)='./file1\x00', 0x0, 0xfffffff6) setxattr$trusted_overlay_nlink(&(0x7f0000000000)='./file1\x00', &(0x7f00000000c0)='trusted.overlay.nlink\x00', 0x0, 0x0, 0x0) 11:25:13 executing program 3: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x7f, 0x80000000008001}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x9}, 0x0) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000080)) r1 = open(&(0x7f0000000240)='./file1\x00', 0x141142, 0x0) write$UHID_INPUT(r1, &(0x7f0000001440)={0x8, {'\x00]\x00'}}, 0xfffffc41) open(&(0x7f00000001c0)='./file1\x00', 0x0, 0x0) setxattr$trusted_overlay_nlink(&(0x7f0000000000)='./file1\x00', &(0x7f00000000c0)='trusted.overlay.nlink\x00', 0x0, 0x0, 0x0) 11:25:13 executing program 5: write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000540)=ANY=[@ANYBLOB="7f454c4601061f000400000000000000030038000800000032000000000000004000000000000000560200000000000007000000008038000100090002000100010000000100000006000000000000000400000000000000060000000000000001040000000000000200000000000000010000000000000051e574640400000001000000000000000400000000000000050000000000000005000000000000000400000000000000ff24444700000000908bc001727fbcd44f4d3bf922995edf2fd379eb00"/489], 0x2c4) r0 = inotify_init() r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) epoll_ctl$EPOLL_CTL_DEL(0xffffffffffffffff, 0x2, r1) inotify_add_watch(r0, &(0x7f0000000000)='.\x00', 0x400017e) r2 = openat$incfs(0xffffffffffffffff, &(0x7f0000000080)='.log\x00', 0x0, 0x0) fcntl$getownex(r2, 0x10, &(0x7f00000000c0)) r3 = open(&(0x7f0000000040)='./file0\x00', 0x200c2, 0x0) write$binfmt_elf64(r3, &(0x7f0000000080)=ANY=[], 0x8) sendfile(r3, r3, &(0x7f00000001c0), 0xa198) dup(0xffffffffffffffff) r4 = syz_mount_image$gfs2meta(&(0x7f0000000140)='gfs2meta\x00', &(0x7f0000000200)='./file0\x00', 0x1000, 0x0, 0x0, 0x0, &(0x7f0000000900)={[{'.log\x00'}, {'-%('}], [{@appraise_type='appraise_type=imasig'}, {@fowner_eq={'fowner', 0x3d, 0xee01}}, {@hash='hash'}, {@subj_type={'subj_type', 0x3d, '-&'}}, {@hash='hash'}]}) ioctl$BTRFS_IOC_SUBVOL_SETFLAGS(r4, 0x4008941a, &(0x7f0000000980)=0xfe33b054cbbc4d79) 11:25:13 executing program 2: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x7f, 0x80000000008001}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x9}, 0x0) r1 = open(&(0x7f0000000240)='./file1\x00', 0x141142, 0x0) write$UHID_INPUT(r1, &(0x7f0000001440)={0x8, {'\x00b\x00'}}, 0xfffffc41) open(&(0x7f00000001c0)='./file1\x00', 0x0, 0x0) setxattr$trusted_overlay_nlink(&(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x0, 0x0) 11:25:13 executing program 1: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x7f, 0x80000000008001}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x9}, 0x0) r1 = open(&(0x7f0000000240)='./file1\x00', 0x141142, 0x0) write$UHID_INPUT(r1, &(0x7f0000001440), 0xfffffc41) open(&(0x7f00000001c0)='./file1\x00', 0x0, 0xc00000000000000) setxattr$trusted_overlay_nlink(&(0x7f0000000000)='./file1\x00', &(0x7f00000000c0)='trusted.overlay.nlink\x00', 0x0, 0x0, 0x0) 11:25:13 executing program 4: r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x9}, 0x0) r1 = open(&(0x7f0000000240)='./file1\x00', 0x141142, 0x0) write$UHID_INPUT(r1, &(0x7f0000001440), 0xfffffc41) open(&(0x7f00000001c0)='./file1\x00', 0x0, 0xfffffff6) setxattr$trusted_overlay_nlink(&(0x7f0000000000)='./file1\x00', &(0x7f00000000c0)='trusted.overlay.nlink\x00', 0x0, 0x0, 0x0) 11:25:13 executing program 0: r0 = perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x5c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write$binfmt_elf64(r0, &(0x7f0000000540)=ANY=[@ANYBLOB], 0x2c4) r1 = inotify_init() openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) epoll_ctl$EPOLL_CTL_DEL(0xffffffffffffffff, 0x2, 0xffffffffffffffff) inotify_add_watch(r1, &(0x7f0000000000)='.\x00', 0x400017e) r2 = openat$incfs(0xffffffffffffffff, &(0x7f0000000080)='.log\x00', 0x20200, 0x40) fcntl$getownex(r2, 0x10, &(0x7f00000000c0)) r3 = open(&(0x7f0000000040)='./file0\x00', 0x200c2, 0x0) write$binfmt_elf64(r3, &(0x7f0000000080)=ANY=[], 0x8) sendfile(r3, r3, &(0x7f00000001c0), 0xa198) dup(0xffffffffffffffff) r4 = syz_mount_image$gfs2meta(&(0x7f0000000140)='gfs2meta\x00', &(0x7f0000000200)='./file0\x00', 0x1000, 0x4, &(0x7f0000000880)=[{&(0x7f0000000240)="77ba0daae1b2e74ecd52c59a85bf6f4b1f0b01ab07ba92bc6e57305406115f2bc3e4dd94f19ed896c4fccd34271e9dc3499af9298dbc709e0e6a513d61391d4b198af5f55d24239ae934e8babb8d1cb67bb17b0158", 0x55, 0x3}, {&(0x7f00000002c0)="ae227f954d229f666a6cd22938585e852071e55aa5728addcd315922bf32282e077bdbc63cd5ec89626ee2f8e7982ca239eaa758231056cdca22ca27428407f6c64c384665cfbd00ee6e0d7609f2c7ba0f28b4af70d0307ef78decfe42973915cd509de7c19ea0f3f5c3caaab05f9af08e2cc82d2c14b919dd045e3d36ce1c5d0ff23aed0a4a6ef508b5e71df0a25250d47f1e033ed503b6df99c189111b75b59df679cb75240b756cafecfd203568eeb2c1708fe9f11a2cb0f288590ec76cefbde09c90e9d568492aa5f41196397b70c869838c7164f2bad8eff017d021d7d41c9025c20b", 0xe5, 0x3}, {&(0x7f00000003c0), 0x0, 0x100000000}, {0x0, 0x0, 0x7}], 0x21008, &(0x7f0000000900)={[{'.log\x00'}, {'-%('}, {'.log\x00'}], [{@obj_user={'obj_user'}}, {@appraise_type='appraise_type=imasig'}, {@fowner_eq={'fowner', 0x3d, 0xee01}}, {@hash='hash'}, {@subj_type={'subj_type', 0x3d, '-&'}}]}) ioctl$BTRFS_IOC_SUBVOL_SETFLAGS(r4, 0x4008941a, &(0x7f0000000980)=0xfe33b054cbbc4d79) [ 579.536548][T27919] loop0: detected capacity change from 264192 to 0 11:25:13 executing program 5: write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000540)=ANY=[@ANYBLOB="7f454c4601061f000400000000000000030038000800000032000000000000004000000000000000560200000000000007000000008038000100090002000100010000000100000006000000000000000400000000000000060000000000000001040000000000000200000000000000010000000000000051e574640400000001000000000000000400000000000000050000000000000005000000000000000400000000000000ff24444700000000908bc001727fbcd44f4d3bf922995edf2fd379eb00"/489], 0x2c4) r0 = inotify_init() r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) epoll_ctl$EPOLL_CTL_DEL(0xffffffffffffffff, 0x2, r1) inotify_add_watch(r0, &(0x7f0000000000)='.\x00', 0x400017e) r2 = openat$incfs(0xffffffffffffffff, &(0x7f0000000080)='.log\x00', 0x0, 0x0) fcntl$getownex(r2, 0x10, &(0x7f00000000c0)) r3 = open(&(0x7f0000000040)='./file0\x00', 0x200c2, 0x0) write$binfmt_elf64(r3, &(0x7f0000000080)=ANY=[], 0x8) sendfile(r3, r3, &(0x7f00000001c0), 0xa198) dup(0xffffffffffffffff) r4 = syz_mount_image$gfs2meta(&(0x7f0000000140)='gfs2meta\x00', &(0x7f0000000200)='./file0\x00', 0x1000, 0x0, 0x0, 0x0, &(0x7f0000000900)={[{'.log\x00'}, {'-%('}], [{@appraise_type='appraise_type=imasig'}, {@fowner_eq={'fowner', 0x3d, 0xee01}}, {@hash='hash'}, {@subj_type={'subj_type', 0x3d, '-&'}}, {@hash='hash'}]}) ioctl$BTRFS_IOC_SUBVOL_SETFLAGS(r4, 0x4008941a, &(0x7f0000000980)=0xfe33b054cbbc4d79) 11:25:14 executing program 3: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x7f, 0x80000000008001}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x9}, 0x0) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000080)) r1 = open(&(0x7f0000000240)='./file1\x00', 0x141142, 0x0) write$UHID_INPUT(r1, &(0x7f0000001440)={0x8, {'\x00^\x00'}}, 0xfffffc41) open(&(0x7f00000001c0)='./file1\x00', 0x0, 0x0) setxattr$trusted_overlay_nlink(&(0x7f0000000000)='./file1\x00', &(0x7f00000000c0)='trusted.overlay.nlink\x00', 0x0, 0x0, 0x0) [ 580.088693][ T35] kauditd_printk_skb: 30 callbacks suppressed [ 580.088704][ T35] audit: type=1804 audit(1612178714.120:2331): pid=27916 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.3" name="/root/syzkaller-testdir548988167/syzkaller.gb8agU/416/file1" dev="sda1" ino=15889 res=1 errno=0 [ 580.175456][ T35] audit: type=1800 audit(1612178714.250:2332): pid=27918 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed comm="syz-executor.2" name="file1" dev="sda1" ino=15902 res=0 errno=0 11:25:14 executing program 2: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x7f, 0x80000000008001}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x9}, 0x0) r1 = open(&(0x7f0000000240)='./file1\x00', 0x141142, 0x0) write$UHID_INPUT(r1, &(0x7f0000001440)={0x8, {'\x00c\x00'}}, 0xfffffc41) open(&(0x7f00000001c0)='./file1\x00', 0x0, 0x0) setxattr$trusted_overlay_nlink(&(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x0, 0x0) [ 580.217737][ T35] audit: type=1804 audit(1612178714.250:2333): pid=27913 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor.2" name="/root/syzkaller-testdir245532710/syzkaller.d2c0aK/430/file1" dev="sda1" ino=15902 res=1 errno=0 [ 580.308224][ T35] audit: type=1800 audit(1612178714.250:2334): pid=27913 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed comm="syz-executor.2" name="file1" dev="sda1" ino=15902 res=0 errno=0 11:25:14 executing program 0: r0 = perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x5c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write$binfmt_elf64(r0, &(0x7f0000000540)=ANY=[@ANYBLOB], 0x2c4) r1 = inotify_init() openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) epoll_ctl$EPOLL_CTL_DEL(0xffffffffffffffff, 0x2, 0xffffffffffffffff) inotify_add_watch(r1, &(0x7f0000000000)='.\x00', 0x400017e) r2 = openat$incfs(0xffffffffffffffff, &(0x7f0000000080)='.log\x00', 0x20200, 0x40) fcntl$getownex(r2, 0x10, &(0x7f00000000c0)) r3 = open(&(0x7f0000000040)='./file0\x00', 0x200c2, 0x0) write$binfmt_elf64(r3, &(0x7f0000000080)=ANY=[], 0x8) sendfile(r3, r3, &(0x7f00000001c0), 0xa198) dup(0xffffffffffffffff) r4 = syz_mount_image$gfs2meta(&(0x7f0000000140)='gfs2meta\x00', &(0x7f0000000200)='./file0\x00', 0x1000, 0x4, &(0x7f0000000880)=[{&(0x7f0000000240)="77ba0daae1b2e74ecd52c59a85bf6f4b1f0b01ab07ba92bc6e57305406115f2bc3e4dd94f19ed896c4fccd34271e9dc3499af9298dbc709e0e6a513d61391d4b198af5f55d24239ae934e8babb8d1cb67bb17b0158", 0x55, 0x3}, {&(0x7f00000002c0)="ae227f954d229f666a6cd22938585e852071e55aa5728addcd315922bf32282e077bdbc63cd5ec89626ee2f8e7982ca239eaa758231056cdca22ca27428407f6c64c384665cfbd00ee6e0d7609f2c7ba0f28b4af70d0307ef78decfe42973915cd509de7c19ea0f3f5c3caaab05f9af08e2cc82d2c14b919dd045e3d36ce1c5d0ff23aed0a4a6ef508b5e71df0a25250d47f1e033ed503b6df99c189111b75b59df679cb75240b756cafecfd203568eeb2c1708fe9f11a2cb0f288590ec76cefbde09c90e9d568492aa5f41196397b70c869838c7164f2bad8eff017d021d7d41c9025c20b", 0xe5, 0x3}, {&(0x7f00000003c0), 0x0, 0x100000000}, {0x0, 0x0, 0x7}], 0x21008, &(0x7f0000000900)={[{'.log\x00'}, {'-%('}, {'.log\x00'}], [{@obj_user={'obj_user'}}, {@appraise_type='appraise_type=imasig'}, {@fowner_eq={'fowner', 0x3d, 0xee01}}, {@hash='hash'}, {@subj_type={'subj_type', 0x3d, '-&'}}]}) ioctl$BTRFS_IOC_SUBVOL_SETFLAGS(r4, 0x4008941a, &(0x7f0000000980)=0xfe33b054cbbc4d79) 11:25:14 executing program 4: r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x9}, 0x0) r1 = open(&(0x7f0000000240)='./file1\x00', 0x141142, 0x0) write$UHID_INPUT(r1, &(0x7f0000001440), 0xfffffc41) open(&(0x7f00000001c0)='./file1\x00', 0x0, 0xfffffff6) setxattr$trusted_overlay_nlink(&(0x7f0000000000)='./file1\x00', &(0x7f00000000c0)='trusted.overlay.nlink\x00', 0x0, 0x0, 0x0) [ 580.479672][ T35] audit: type=1804 audit(1612178714.330:2335): pid=27929 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.4" name="/root/syzkaller-testdir068764309/syzkaller.I2gCPs/466/file1" dev="sda1" ino=15946 res=1 errno=0 [ 580.551788][T27948] loop0: detected capacity change from 264192 to 0 [ 580.584376][ T35] audit: type=1804 audit(1612178714.520:2336): pid=27928 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.1" name="/root/syzkaller-testdir551554057/syzkaller.l2Zg4z/413/file1" dev="sda1" ino=15945 res=1 errno=0 [ 580.618200][ T35] audit: type=1804 audit(1612178714.520:2337): pid=27942 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.1" name="/root/syzkaller-testdir551554057/syzkaller.l2Zg4z/413/file1" dev="sda1" ino=15945 res=1 errno=0 [ 580.649073][ T35] audit: type=1804 audit(1612178714.520:2338): pid=27941 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor.1" name="/root/syzkaller-testdir551554057/syzkaller.l2Zg4z/413/file1" dev="sda1" ino=15945 res=1 errno=0 11:25:14 executing program 1: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x7f, 0x80000000008001}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x9}, 0x0) r1 = open(&(0x7f0000000240)='./file1\x00', 0x141142, 0x0) write$UHID_INPUT(r1, &(0x7f0000001440), 0xfffffc41) open(&(0x7f00000001c0)='./file1\x00', 0x0, 0xd00000000000000) setxattr$trusted_overlay_nlink(&(0x7f0000000000)='./file1\x00', &(0x7f00000000c0)='trusted.overlay.nlink\x00', 0x0, 0x0, 0x0) 11:25:14 executing program 5: write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000540)=ANY=[@ANYBLOB="7f454c4601061f000400000000000000030038000800000032000000000000004000000000000000560200000000000007000000008038000100090002000100010000000100000006000000000000000400000000000000060000000000000001040000000000000200000000000000010000000000000051e574640400000001000000000000000400000000000000050000000000000005000000000000000400000000000000ff24444700000000908bc001727fbcd44f4d3bf922995edf2fd379eb00"/489], 0x2c4) r0 = inotify_init() r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) epoll_ctl$EPOLL_CTL_DEL(0xffffffffffffffff, 0x2, r1) inotify_add_watch(r0, &(0x7f0000000000)='.\x00', 0x400017e) r2 = openat$incfs(0xffffffffffffffff, &(0x7f0000000080)='.log\x00', 0x0, 0x0) fcntl$getownex(r2, 0x10, &(0x7f00000000c0)) r3 = open(&(0x7f0000000040)='./file0\x00', 0x200c2, 0x0) write$binfmt_elf64(r3, &(0x7f0000000080)=ANY=[], 0x8) sendfile(r3, r3, &(0x7f00000001c0), 0xa198) dup(0xffffffffffffffff) r4 = syz_mount_image$gfs2meta(&(0x7f0000000140)='gfs2meta\x00', &(0x7f0000000200)='./file0\x00', 0x1000, 0x0, 0x0, 0x0, &(0x7f0000000900)={[{'.log\x00'}, {'-%('}], [{@appraise_type='appraise_type=imasig'}, {@fowner_eq={'fowner', 0x3d, 0xee01}}, {@hash='hash'}, {@subj_type={'subj_type', 0x3d, '-&'}}, {@hash='hash'}]}) ioctl$BTRFS_IOC_SUBVOL_SETFLAGS(r4, 0x4008941a, &(0x7f0000000980)=0xfe33b054cbbc4d79) [ 581.062250][ T35] audit: type=1804 audit(1612178715.140:2339): pid=27953 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.2" name="/root/syzkaller-testdir245532710/syzkaller.d2c0aK/431/file1" dev="sda1" ino=15937 res=1 errno=0 [ 581.175171][ T35] audit: type=1804 audit(1612178715.250:2340): pid=27945 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.3" name="/root/syzkaller-testdir548988167/syzkaller.gb8agU/417/file1" dev="sda1" ino=15889 res=1 errno=0 11:25:15 executing program 0: r0 = perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x5c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write$binfmt_elf64(r0, &(0x7f0000000540)=ANY=[@ANYBLOB], 0x2c4) r1 = inotify_init() openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) epoll_ctl$EPOLL_CTL_DEL(0xffffffffffffffff, 0x2, 0xffffffffffffffff) inotify_add_watch(r1, &(0x7f0000000000)='.\x00', 0x400017e) r2 = openat$incfs(0xffffffffffffffff, &(0x7f0000000080)='.log\x00', 0x20200, 0x40) fcntl$getownex(r2, 0x10, &(0x7f00000000c0)) r3 = open(&(0x7f0000000040)='./file0\x00', 0x200c2, 0x0) write$binfmt_elf64(r3, &(0x7f0000000080)=ANY=[], 0x8) sendfile(r3, r3, &(0x7f00000001c0), 0xa198) dup(0xffffffffffffffff) r4 = syz_mount_image$gfs2meta(&(0x7f0000000140)='gfs2meta\x00', &(0x7f0000000200)='./file0\x00', 0x1000, 0x4, &(0x7f0000000880)=[{&(0x7f0000000240)="77ba0daae1b2e74ecd52c59a85bf6f4b1f0b01ab07ba92bc6e57305406115f2bc3e4dd94f19ed896c4fccd34271e9dc3499af9298dbc709e0e6a513d61391d4b198af5f55d24239ae934e8babb8d1cb67bb17b0158", 0x55, 0x3}, {&(0x7f00000002c0)="ae227f954d229f666a6cd22938585e852071e55aa5728addcd315922bf32282e077bdbc63cd5ec89626ee2f8e7982ca239eaa758231056cdca22ca27428407f6c64c384665cfbd00ee6e0d7609f2c7ba0f28b4af70d0307ef78decfe42973915cd509de7c19ea0f3f5c3caaab05f9af08e2cc82d2c14b919dd045e3d36ce1c5d0ff23aed0a4a6ef508b5e71df0a25250d47f1e033ed503b6df99c189111b75b59df679cb75240b756cafecfd203568eeb2c1708fe9f11a2cb0f288590ec76cefbde09c90e9d568492aa5f41196397b70c869838c7164f2bad8eff017d021d7d41c9025c20b", 0xe5, 0x3}, {&(0x7f00000003c0)="792eb6eec33e561f18dc4b58b6a6fb3c7e6fd5e612c08490216ae02617f9811945929cffbf59727393a9a69d57b00a5cd08da3888884b8361d6a4003a54480c1086a5fc876582ff049ede86e2f58d80c7b6cf618e1ba36d4710887bc34ef2b7abbc686df2185f99998060bf492b84e3a02077e2aaf014e1186fde6", 0x7b, 0x100000000}, {0x0, 0x0, 0x7}], 0x21008, &(0x7f0000000900)={[{'.log\x00'}, {'-%('}, {'.log\x00'}], [{@obj_user={'obj_user'}}, {@appraise_type='appraise_type=imasig'}, {@fowner_eq={'fowner', 0x3d, 0xee01}}, {@hash='hash'}, {@subj_type={'subj_type', 0x3d, '-&'}}]}) ioctl$BTRFS_IOC_SUBVOL_SETFLAGS(r4, 0x4008941a, &(0x7f0000000980)=0xfe33b054cbbc4d79) 11:25:15 executing program 3: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x7f, 0x80000000008001}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x9}, 0x0) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000080)) r1 = open(&(0x7f0000000240)='./file1\x00', 0x141142, 0x0) write$UHID_INPUT(r1, &(0x7f0000001440)={0x8, {'\x00_\x00'}}, 0xfffffc41) open(&(0x7f00000001c0)='./file1\x00', 0x0, 0x0) setxattr$trusted_overlay_nlink(&(0x7f0000000000)='./file1\x00', &(0x7f00000000c0)='trusted.overlay.nlink\x00', 0x0, 0x0, 0x0) 11:25:15 executing program 2: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x7f, 0x80000000008001}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x9}, 0x0) r1 = open(&(0x7f0000000240)='./file1\x00', 0x141142, 0x0) write$UHID_INPUT(r1, &(0x7f0000001440)={0x8, {'\x00d\x00'}}, 0xfffffc41) open(&(0x7f00000001c0)='./file1\x00', 0x0, 0x0) setxattr$trusted_overlay_nlink(&(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x0, 0x0) [ 581.582072][T27974] loop0: detected capacity change from 264192 to 0 11:25:15 executing program 5: write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000540)=ANY=[@ANYBLOB="7f454c4601061f000400000000000000030038000800000032000000000000004000000000000000560200000000000007000000008038000100090002000100010000000100000006000000000000000400000000000000060000000000000001040000000000000200000000000000010000000000000051e574640400000001000000000000000400000000000000050000000000000005000000000000000400000000000000ff24444700000000908bc001727fbcd44f4d3bf922995edf2fd379eb00"/489], 0x2c4) r0 = inotify_init() r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) epoll_ctl$EPOLL_CTL_DEL(0xffffffffffffffff, 0x2, r1) inotify_add_watch(r0, &(0x7f0000000000)='.\x00', 0x400017e) r2 = openat$incfs(0xffffffffffffffff, &(0x7f0000000080)='.log\x00', 0x0, 0x0) fcntl$getownex(r2, 0x10, &(0x7f00000000c0)) r3 = open(&(0x7f0000000040)='./file0\x00', 0x200c2, 0x0) write$binfmt_elf64(r3, &(0x7f0000000080)=ANY=[], 0x8) sendfile(r3, r3, &(0x7f00000001c0), 0xa198) dup(0xffffffffffffffff) r4 = syz_mount_image$gfs2meta(&(0x7f0000000140)='gfs2meta\x00', &(0x7f0000000200)='./file0\x00', 0x1000, 0x0, 0x0, 0x0, &(0x7f0000000900)={[{'.log\x00'}, {'.log\x00'}], [{@appraise_type='appraise_type=imasig'}, {@fowner_eq={'fowner', 0x3d, 0xee01}}, {@hash='hash'}, {@subj_type={'subj_type', 0x3d, '-&'}}, {@hash='hash'}]}) ioctl$BTRFS_IOC_SUBVOL_SETFLAGS(r4, 0x4008941a, &(0x7f0000000980)=0xfe33b054cbbc4d79) 11:25:16 executing program 4: r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x9}, 0x0) r1 = open(&(0x7f0000000240)='./file1\x00', 0x141142, 0x0) write$UHID_INPUT(r1, &(0x7f0000001440), 0xfffffc41) open(&(0x7f00000001c0)='./file1\x00', 0x0, 0xfffffff6) setxattr$trusted_overlay_nlink(&(0x7f0000000000)='./file1\x00', &(0x7f00000000c0)='trusted.overlay.nlink\x00', 0x0, 0x0, 0x0) 11:25:16 executing program 1: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x7f, 0x80000000008001}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x9}, 0x0) r1 = open(&(0x7f0000000240)='./file1\x00', 0x141142, 0x0) write$UHID_INPUT(r1, &(0x7f0000001440), 0xfffffc41) open(&(0x7f00000001c0)='./file1\x00', 0x0, 0xe00000000000000) setxattr$trusted_overlay_nlink(&(0x7f0000000000)='./file1\x00', &(0x7f00000000c0)='trusted.overlay.nlink\x00', 0x0, 0x0, 0x0) 11:25:16 executing program 0: r0 = perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x5c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write$binfmt_elf64(r0, &(0x7f0000000540)=ANY=[@ANYBLOB], 0x2c4) r1 = inotify_init() openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) epoll_ctl$EPOLL_CTL_DEL(0xffffffffffffffff, 0x2, 0xffffffffffffffff) inotify_add_watch(r1, &(0x7f0000000000)='.\x00', 0x400017e) r2 = openat$incfs(0xffffffffffffffff, &(0x7f0000000080)='.log\x00', 0x20200, 0x40) fcntl$getownex(r2, 0x10, &(0x7f00000000c0)) r3 = open(&(0x7f0000000040)='./file0\x00', 0x200c2, 0x0) write$binfmt_elf64(r3, &(0x7f0000000080)=ANY=[], 0x8) sendfile(r3, r3, &(0x7f00000001c0), 0xa198) dup(0xffffffffffffffff) r4 = syz_mount_image$gfs2meta(&(0x7f0000000140)='gfs2meta\x00', &(0x7f0000000200)='./file0\x00', 0x1000, 0x4, &(0x7f0000000880)=[{&(0x7f0000000240)="77ba0daae1b2e74ecd52c59a85bf6f4b1f0b01ab07ba92bc6e57305406115f2bc3e4dd94f19ed896c4fccd34271e9dc3499af9298dbc709e0e6a513d61391d4b198af5f55d24239ae934e8babb8d1cb67bb17b0158", 0x55, 0x3}, {&(0x7f00000002c0)="ae227f954d229f666a6cd22938585e852071e55aa5728addcd315922bf32282e077bdbc63cd5ec89626ee2f8e7982ca239eaa758231056cdca22ca27428407f6c64c384665cfbd00ee6e0d7609f2c7ba0f28b4af70d0307ef78decfe42973915cd509de7c19ea0f3f5c3caaab05f9af08e2cc82d2c14b919dd045e3d36ce1c5d0ff23aed0a4a6ef508b5e71df0a25250d47f1e033ed503b6df99c189111b75b59df679cb75240b756cafecfd203568eeb2c1708fe9f11a2cb0f288590ec76cefbde09c90e9d568492aa5f41196397b70c869838c7164f2bad8eff017d021d7d41c9025c20b", 0xe5, 0x3}, {&(0x7f00000003c0)="792eb6eec33e561f18dc4b58b6a6fb3c7e6fd5e612c08490216ae02617f9811945929cffbf59727393a9a69d57b00a5cd08da3888884b8361d6a4003a54480c1086a5fc876582ff049ede86e2f58d80c7b6cf618e1ba36d4710887bc34ef2b7abbc686df2185f99998060bf492b84e3a02077e2aaf014e1186fde6", 0x7b, 0x100000000}, {0x0, 0x0, 0x7}], 0x21008, &(0x7f0000000900)={[{'.log\x00'}, {'-%('}, {'.log\x00'}], [{@obj_user={'obj_user'}}, {@appraise_type='appraise_type=imasig'}, {@fowner_eq={'fowner', 0x3d, 0xee01}}, {@hash='hash'}, {@subj_type={'subj_type', 0x3d, '-&'}}]}) ioctl$BTRFS_IOC_SUBVOL_SETFLAGS(r4, 0x4008941a, &(0x7f0000000980)=0xfe33b054cbbc4d79) [ 582.534737][T28006] loop0: detected capacity change from 264192 to 0 11:25:16 executing program 3: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x7f, 0x80000000008001}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x9}, 0x0) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000080)) r1 = open(&(0x7f0000000240)='./file1\x00', 0x141142, 0x0) write$UHID_INPUT(r1, &(0x7f0000001440)={0x8, {'\x00`\x00'}}, 0xfffffc41) open(&(0x7f00000001c0)='./file1\x00', 0x0, 0x0) setxattr$trusted_overlay_nlink(&(0x7f0000000000)='./file1\x00', &(0x7f00000000c0)='trusted.overlay.nlink\x00', 0x0, 0x0, 0x0) 11:25:16 executing program 5: write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000540)=ANY=[@ANYBLOB="7f454c4601061f000400000000000000030038000800000032000000000000004000000000000000560200000000000007000000008038000100090002000100010000000100000006000000000000000400000000000000060000000000000001040000000000000200000000000000010000000000000051e574640400000001000000000000000400000000000000050000000000000005000000000000000400000000000000ff24444700000000908bc001727fbcd44f4d3bf922995edf2fd379eb00"/489], 0x2c4) r0 = inotify_init() r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) epoll_ctl$EPOLL_CTL_DEL(0xffffffffffffffff, 0x2, r1) inotify_add_watch(r0, &(0x7f0000000000)='.\x00', 0x400017e) r2 = openat$incfs(0xffffffffffffffff, &(0x7f0000000080)='.log\x00', 0x0, 0x0) fcntl$getownex(r2, 0x10, &(0x7f00000000c0)) r3 = open(&(0x7f0000000040)='./file0\x00', 0x200c2, 0x0) write$binfmt_elf64(r3, &(0x7f0000000080)=ANY=[], 0x8) sendfile(r3, r3, &(0x7f00000001c0), 0xa198) dup(0xffffffffffffffff) r4 = syz_mount_image$gfs2meta(&(0x7f0000000140)='gfs2meta\x00', &(0x7f0000000200)='./file0\x00', 0x1000, 0x0, 0x0, 0x0, &(0x7f0000000900)={[{'.log\x00'}, {'.log\x00'}], [{@appraise_type='appraise_type=imasig'}, {@fowner_eq={'fowner', 0x3d, 0xee01}}, {@hash='hash'}, {@subj_type={'subj_type', 0x3d, '-&'}}, {@hash='hash'}]}) ioctl$BTRFS_IOC_SUBVOL_SETFLAGS(r4, 0x4008941a, &(0x7f0000000980)=0xfe33b054cbbc4d79) 11:25:16 executing program 2: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x7f, 0x80000000008001}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x9}, 0x0) r1 = open(&(0x7f0000000240)='./file1\x00', 0x141142, 0x0) write$UHID_INPUT(r1, &(0x7f0000001440)={0x8, {'\x00e\x00'}}, 0xfffffc41) open(&(0x7f00000001c0)='./file1\x00', 0x0, 0x0) setxattr$trusted_overlay_nlink(&(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x0, 0x0) 11:25:17 executing program 0: r0 = perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x5c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write$binfmt_elf64(r0, &(0x7f0000000540)=ANY=[@ANYBLOB], 0x2c4) r1 = inotify_init() openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) epoll_ctl$EPOLL_CTL_DEL(0xffffffffffffffff, 0x2, 0xffffffffffffffff) inotify_add_watch(r1, &(0x7f0000000000)='.\x00', 0x400017e) r2 = openat$incfs(0xffffffffffffffff, &(0x7f0000000080)='.log\x00', 0x20200, 0x40) fcntl$getownex(r2, 0x10, &(0x7f00000000c0)) r3 = open(&(0x7f0000000040)='./file0\x00', 0x200c2, 0x0) write$binfmt_elf64(r3, &(0x7f0000000080)=ANY=[], 0x8) sendfile(r3, r3, &(0x7f00000001c0), 0xa198) dup(0xffffffffffffffff) r4 = syz_mount_image$gfs2meta(&(0x7f0000000140)='gfs2meta\x00', &(0x7f0000000200)='./file0\x00', 0x1000, 0x4, &(0x7f0000000880)=[{&(0x7f0000000240)="77ba0daae1b2e74ecd52c59a85bf6f4b1f0b01ab07ba92bc6e57305406115f2bc3e4dd94f19ed896c4fccd34271e9dc3499af9298dbc709e0e6a513d61391d4b198af5f55d24239ae934e8babb8d1cb67bb17b0158", 0x55, 0x3}, {&(0x7f00000002c0)="ae227f954d229f666a6cd22938585e852071e55aa5728addcd315922bf32282e077bdbc63cd5ec89626ee2f8e7982ca239eaa758231056cdca22ca27428407f6c64c384665cfbd00ee6e0d7609f2c7ba0f28b4af70d0307ef78decfe42973915cd509de7c19ea0f3f5c3caaab05f9af08e2cc82d2c14b919dd045e3d36ce1c5d0ff23aed0a4a6ef508b5e71df0a25250d47f1e033ed503b6df99c189111b75b59df679cb75240b756cafecfd203568eeb2c1708fe9f11a2cb0f288590ec76cefbde09c90e9d568492aa5f41196397b70c869838c7164f2bad8eff017d021d7d41c9025c20b", 0xe5, 0x3}, {&(0x7f00000003c0)="792eb6eec33e561f18dc4b58b6a6fb3c7e6fd5e612c08490216ae02617f9811945929cffbf59727393a9a69d57b00a5cd08da3888884b8361d6a4003a54480c1086a5fc876582ff049ede86e2f58d80c7b6cf618e1ba36d4710887bc34ef2b7abbc686df2185f99998060bf492b84e3a02077e2aaf014e1186fde6", 0x7b, 0x100000000}, {0x0, 0x0, 0x7}], 0x21008, &(0x7f0000000900)={[{'.log\x00'}, {'-%('}, {'.log\x00'}], [{@obj_user={'obj_user'}}, {@appraise_type='appraise_type=imasig'}, {@fowner_eq={'fowner', 0x3d, 0xee01}}, {@hash='hash'}, {@subj_type={'subj_type', 0x3d, '-&'}}]}) ioctl$BTRFS_IOC_SUBVOL_SETFLAGS(r4, 0x4008941a, &(0x7f0000000980)=0xfe33b054cbbc4d79) [ 583.183714][T28029] loop0: detected capacity change from 264192 to 0 11:25:17 executing program 4: prlimit64(0x0, 0x0, &(0x7f0000000280)={0x7f, 0x80000000008001}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x9}, 0x0) r1 = open(&(0x7f0000000240)='./file1\x00', 0x141142, 0x0) write$UHID_INPUT(r1, &(0x7f0000001440), 0xfffffc41) open(&(0x7f00000001c0)='./file1\x00', 0x0, 0xfffffff6) setxattr$trusted_overlay_nlink(&(0x7f0000000000)='./file1\x00', &(0x7f00000000c0)='trusted.overlay.nlink\x00', 0x0, 0x0, 0x0) 11:25:17 executing program 1: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x7f, 0x80000000008001}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x9}, 0x0) r1 = open(&(0x7f0000000240)='./file1\x00', 0x141142, 0x0) write$UHID_INPUT(r1, &(0x7f0000001440), 0xfffffc41) open(&(0x7f00000001c0)='./file1\x00', 0x0, 0x1000000000000000) setxattr$trusted_overlay_nlink(&(0x7f0000000000)='./file1\x00', &(0x7f00000000c0)='trusted.overlay.nlink\x00', 0x0, 0x0, 0x0) 11:25:17 executing program 5: write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000540)=ANY=[@ANYBLOB="7f454c4601061f000400000000000000030038000800000032000000000000004000000000000000560200000000000007000000008038000100090002000100010000000100000006000000000000000400000000000000060000000000000001040000000000000200000000000000010000000000000051e574640400000001000000000000000400000000000000050000000000000005000000000000000400000000000000ff24444700000000908bc001727fbcd44f4d3bf922995edf2fd379eb00"/489], 0x2c4) r0 = inotify_init() r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) epoll_ctl$EPOLL_CTL_DEL(0xffffffffffffffff, 0x2, r1) inotify_add_watch(r0, &(0x7f0000000000)='.\x00', 0x400017e) r2 = openat$incfs(0xffffffffffffffff, &(0x7f0000000080)='.log\x00', 0x0, 0x0) fcntl$getownex(r2, 0x10, &(0x7f00000000c0)) r3 = open(&(0x7f0000000040)='./file0\x00', 0x200c2, 0x0) write$binfmt_elf64(r3, &(0x7f0000000080)=ANY=[], 0x8) sendfile(r3, r3, &(0x7f00000001c0), 0xa198) dup(0xffffffffffffffff) r4 = syz_mount_image$gfs2meta(&(0x7f0000000140)='gfs2meta\x00', &(0x7f0000000200)='./file0\x00', 0x1000, 0x0, 0x0, 0x0, &(0x7f0000000900)={[{'.log\x00'}, {'.log\x00'}], [{@appraise_type='appraise_type=imasig'}, {@fowner_eq={'fowner', 0x3d, 0xee01}}, {@hash='hash'}, {@subj_type={'subj_type', 0x3d, '-&'}}, {@hash='hash'}]}) ioctl$BTRFS_IOC_SUBVOL_SETFLAGS(r4, 0x4008941a, &(0x7f0000000980)=0xfe33b054cbbc4d79) 11:25:17 executing program 0: r0 = perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x5c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write$binfmt_elf64(r0, &(0x7f0000000540)=ANY=[@ANYBLOB], 0x2c4) r1 = inotify_init() openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) epoll_ctl$EPOLL_CTL_DEL(0xffffffffffffffff, 0x2, 0xffffffffffffffff) inotify_add_watch(r1, &(0x7f0000000000)='.\x00', 0x400017e) r2 = openat$incfs(0xffffffffffffffff, &(0x7f0000000080)='.log\x00', 0x20200, 0x40) fcntl$getownex(r2, 0x10, &(0x7f00000000c0)) r3 = open(&(0x7f0000000040)='./file0\x00', 0x200c2, 0x0) write$binfmt_elf64(r3, &(0x7f0000000080)=ANY=[], 0x8) sendfile(r3, r3, &(0x7f00000001c0), 0xa198) dup(0xffffffffffffffff) r4 = syz_mount_image$gfs2meta(&(0x7f0000000140)='gfs2meta\x00', &(0x7f0000000200)='./file0\x00', 0x1000, 0x4, &(0x7f0000000880)=[{&(0x7f0000000240)="77ba0daae1b2e74ecd52c59a85bf6f4b1f0b01ab07ba92bc6e57305406115f2bc3e4dd94f19ed896c4fccd34271e9dc3499af9298dbc709e0e6a513d61391d4b198af5f55d24239ae934e8babb8d1cb67bb17b0158", 0x55, 0x3}, {&(0x7f00000002c0)="ae227f954d229f666a6cd22938585e852071e55aa5728addcd315922bf32282e077bdbc63cd5ec89626ee2f8e7982ca239eaa758231056cdca22ca27428407f6c64c384665cfbd00ee6e0d7609f2c7ba0f28b4af70d0307ef78decfe42973915cd509de7c19ea0f3f5c3caaab05f9af08e2cc82d2c14b919dd045e3d36ce1c5d0ff23aed0a4a6ef508b5e71df0a25250d47f1e033ed503b6df99c189111b75b59df679cb75240b756cafecfd203568eeb2c1708fe9f11a2cb0f288590ec76cefbde09c90e9d568492aa5f41196397b70c869838c7164f2bad8eff017d021d7d41c9025c20b", 0xe5, 0x3}, {&(0x7f00000003c0)="792eb6eec33e561f18dc4b58b6a6fb3c7e6fd5e612c08490216ae02617f9811945929cffbf59727393a9a69d57b00a5cd08da3888884b8361d6a4003a54480c1086a5fc876582ff049ede86e2f58d80c7b6cf618e1ba36d4710887bc34ef2b7abbc686df2185f99998060bf492b84e3a02077e2aaf014e1186fde602d2b639d467f48fc2e18cf1553e07ac39040953566ab1d21aac627b166825375377bc3332b62160ea8bf7fc3196b30965dce6181bf7a1c60d0270f24ba6", 0xb9, 0x100000000}, {0x0, 0x0, 0x7}], 0x21008, &(0x7f0000000900)={[{'.log\x00'}, {'-%('}, {'.log\x00'}], [{@obj_user={'obj_user'}}, {@appraise_type='appraise_type=imasig'}, {@fowner_eq={'fowner', 0x3d, 0xee01}}, {@hash='hash'}, {@subj_type={'subj_type', 0x3d, '-&'}}]}) ioctl$BTRFS_IOC_SUBVOL_SETFLAGS(r4, 0x4008941a, &(0x7f0000000980)=0xfe33b054cbbc4d79) 11:25:18 executing program 3: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x7f, 0x80000000008001}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x9}, 0x0) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000080)) r1 = open(&(0x7f0000000240)='./file1\x00', 0x141142, 0x0) write$UHID_INPUT(r1, &(0x7f0000001440)={0x8, {'\x00a\x00'}}, 0xfffffc41) open(&(0x7f00000001c0)='./file1\x00', 0x0, 0x0) setxattr$trusted_overlay_nlink(&(0x7f0000000000)='./file1\x00', &(0x7f00000000c0)='trusted.overlay.nlink\x00', 0x0, 0x0, 0x0) [ 583.940782][T28052] loop0: detected capacity change from 264192 to 0 11:25:18 executing program 2: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x7f, 0x80000000008001}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x9}, 0x0) r1 = open(&(0x7f0000000240)='./file1\x00', 0x141142, 0x0) write$UHID_INPUT(r1, &(0x7f0000001440)={0x8, {'\x00f\x00'}}, 0xfffffc41) open(&(0x7f00000001c0)='./file1\x00', 0x0, 0x0) setxattr$trusted_overlay_nlink(&(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x0, 0x0) 11:25:18 executing program 4: prlimit64(0x0, 0x0, &(0x7f0000000280)={0x7f, 0x80000000008001}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x9}, 0x0) r1 = open(&(0x7f0000000240)='./file1\x00', 0x141142, 0x0) write$UHID_INPUT(r1, &(0x7f0000001440), 0xfffffc41) open(&(0x7f00000001c0)='./file1\x00', 0x0, 0xfffffff6) setxattr$trusted_overlay_nlink(&(0x7f0000000000)='./file1\x00', &(0x7f00000000c0)='trusted.overlay.nlink\x00', 0x0, 0x0, 0x0) 11:25:18 executing program 5: write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000540)=ANY=[@ANYBLOB="7f454c4601061f000400000000000000030038000800000032000000000000004000000000000000560200000000000007000000008038000100090002000100010000000100000006000000000000000400000000000000060000000000000001040000000000000200000000000000010000000000000051e574640400000001000000000000000400000000000000050000000000000005000000000000000400000000000000ff24444700000000908bc001727fbcd44f4d3bf922995edf2fd379eb00"/489], 0x2c4) r0 = inotify_init() r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) epoll_ctl$EPOLL_CTL_DEL(0xffffffffffffffff, 0x2, r1) inotify_add_watch(r0, &(0x7f0000000000)='.\x00', 0x400017e) r2 = openat$incfs(0xffffffffffffffff, &(0x7f0000000080)='.log\x00', 0x0, 0x0) fcntl$getownex(r2, 0x10, &(0x7f00000000c0)) r3 = open(&(0x7f0000000040)='./file0\x00', 0x200c2, 0x0) write$binfmt_elf64(r3, &(0x7f0000000080)=ANY=[], 0x8) sendfile(r3, r3, &(0x7f00000001c0), 0xa198) dup(0xffffffffffffffff) r4 = syz_mount_image$gfs2meta(&(0x7f0000000140)='gfs2meta\x00', &(0x7f0000000200)='./file0\x00', 0x1000, 0x0, 0x0, 0x0, &(0x7f0000000900)={[{'-%('}, {'.log\x00'}], [{@appraise_type='appraise_type=imasig'}, {@fowner_eq={'fowner', 0x3d, 0xee01}}, {@hash='hash'}, {@subj_type={'subj_type', 0x3d, '-&'}}, {@hash='hash'}]}) ioctl$BTRFS_IOC_SUBVOL_SETFLAGS(r4, 0x4008941a, &(0x7f0000000980)=0xfe33b054cbbc4d79) 11:25:18 executing program 0: r0 = perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x5c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write$binfmt_elf64(r0, &(0x7f0000000540)=ANY=[@ANYBLOB], 0x2c4) r1 = inotify_init() openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) epoll_ctl$EPOLL_CTL_DEL(0xffffffffffffffff, 0x2, 0xffffffffffffffff) inotify_add_watch(r1, &(0x7f0000000000)='.\x00', 0x400017e) r2 = openat$incfs(0xffffffffffffffff, &(0x7f0000000080)='.log\x00', 0x20200, 0x40) fcntl$getownex(r2, 0x10, &(0x7f00000000c0)) r3 = open(&(0x7f0000000040)='./file0\x00', 0x200c2, 0x0) write$binfmt_elf64(r3, &(0x7f0000000080)=ANY=[], 0x8) sendfile(r3, r3, &(0x7f00000001c0), 0xa198) dup(0xffffffffffffffff) r4 = syz_mount_image$gfs2meta(&(0x7f0000000140)='gfs2meta\x00', &(0x7f0000000200)='./file0\x00', 0x1000, 0x4, &(0x7f0000000880)=[{&(0x7f0000000240)="77ba0daae1b2e74ecd52c59a85bf6f4b1f0b01ab07ba92bc6e57305406115f2bc3e4dd94f19ed896c4fccd34271e9dc3499af9298dbc709e0e6a513d61391d4b198af5f55d24239ae934e8babb8d1cb67bb17b0158", 0x55, 0x3}, {&(0x7f00000002c0)="ae227f954d229f666a6cd22938585e852071e55aa5728addcd315922bf32282e077bdbc63cd5ec89626ee2f8e7982ca239eaa758231056cdca22ca27428407f6c64c384665cfbd00ee6e0d7609f2c7ba0f28b4af70d0307ef78decfe42973915cd509de7c19ea0f3f5c3caaab05f9af08e2cc82d2c14b919dd045e3d36ce1c5d0ff23aed0a4a6ef508b5e71df0a25250d47f1e033ed503b6df99c189111b75b59df679cb75240b756cafecfd203568eeb2c1708fe9f11a2cb0f288590ec76cefbde09c90e9d568492aa5f41196397b70c869838c7164f2bad8eff017d021d7d41c9025c20b", 0xe5, 0x3}, {&(0x7f00000003c0)="792eb6eec33e561f18dc4b58b6a6fb3c7e6fd5e612c08490216ae02617f9811945929cffbf59727393a9a69d57b00a5cd08da3888884b8361d6a4003a54480c1086a5fc876582ff049ede86e2f58d80c7b6cf618e1ba36d4710887bc34ef2b7abbc686df2185f99998060bf492b84e3a02077e2aaf014e1186fde602d2b639d467f48fc2e18cf1553e07ac39040953566ab1d21aac627b166825375377bc3332b62160ea8bf7fc3196b30965dce6181bf7a1c60d0270f24ba6", 0xb9, 0x100000000}, {0x0, 0x0, 0x7}], 0x21008, &(0x7f0000000900)={[{'.log\x00'}, {'-%('}, {'.log\x00'}], [{@obj_user={'obj_user'}}, {@appraise_type='appraise_type=imasig'}, {@fowner_eq={'fowner', 0x3d, 0xee01}}, {@hash='hash'}, {@subj_type={'subj_type', 0x3d, '-&'}}]}) ioctl$BTRFS_IOC_SUBVOL_SETFLAGS(r4, 0x4008941a, &(0x7f0000000980)=0xfe33b054cbbc4d79) 11:25:18 executing program 1: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x7f, 0x80000000008001}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x9}, 0x0) r1 = open(&(0x7f0000000240)='./file1\x00', 0x141142, 0x0) write$UHID_INPUT(r1, &(0x7f0000001440), 0xfffffc41) open(&(0x7f00000001c0)='./file1\x00', 0x0, 0x1100000000000000) setxattr$trusted_overlay_nlink(&(0x7f0000000000)='./file1\x00', &(0x7f00000000c0)='trusted.overlay.nlink\x00', 0x0, 0x0, 0x0) [ 584.836883][T28081] loop0: detected capacity change from 264192 to 0 11:25:19 executing program 3: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x7f, 0x80000000008001}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x9}, 0x0) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000080)) r1 = open(&(0x7f0000000240)='./file1\x00', 0x141142, 0x0) write$UHID_INPUT(r1, &(0x7f0000001440)={0x8, {'\x00b\x00'}}, 0xfffffc41) open(&(0x7f00000001c0)='./file1\x00', 0x0, 0x0) setxattr$trusted_overlay_nlink(&(0x7f0000000000)='./file1\x00', &(0x7f00000000c0)='trusted.overlay.nlink\x00', 0x0, 0x0, 0x0) [ 585.232616][ T35] kauditd_printk_skb: 26 callbacks suppressed [ 585.232626][ T35] audit: type=1804 audit(1612178719.310:2367): pid=28066 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.2" name="/root/syzkaller-testdir245532710/syzkaller.d2c0aK/434/file1" dev="sda1" ino=15825 res=1 errno=0 [ 585.378132][ T35] audit: type=1804 audit(1612178719.400:2368): pid=28078 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.4" name="/root/syzkaller-testdir068764309/syzkaller.I2gCPs/470/file1" dev="sda1" ino=15770 res=1 errno=0 11:25:19 executing program 2: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x7f, 0x80000000008001}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x9}, 0x0) r1 = open(&(0x7f0000000240)='./file1\x00', 0x141142, 0x0) write$UHID_INPUT(r1, &(0x7f0000001440)={0x8, {'\x00g\x00'}}, 0xfffffc41) open(&(0x7f00000001c0)='./file1\x00', 0x0, 0x0) setxattr$trusted_overlay_nlink(&(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x0, 0x0) 11:25:19 executing program 5: write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000540)=ANY=[@ANYBLOB="7f454c4601061f000400000000000000030038000800000032000000000000004000000000000000560200000000000007000000008038000100090002000100010000000100000006000000000000000400000000000000060000000000000001040000000000000200000000000000010000000000000051e574640400000001000000000000000400000000000000050000000000000005000000000000000400000000000000ff24444700000000908bc001727fbcd44f4d3bf922995edf2fd379eb00"/489], 0x2c4) r0 = inotify_init() r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) epoll_ctl$EPOLL_CTL_DEL(0xffffffffffffffff, 0x2, r1) inotify_add_watch(r0, &(0x7f0000000000)='.\x00', 0x400017e) r2 = openat$incfs(0xffffffffffffffff, &(0x7f0000000080)='.log\x00', 0x0, 0x0) fcntl$getownex(r2, 0x10, &(0x7f00000000c0)) r3 = open(&(0x7f0000000040)='./file0\x00', 0x200c2, 0x0) write$binfmt_elf64(r3, &(0x7f0000000080)=ANY=[], 0x8) sendfile(r3, r3, &(0x7f00000001c0), 0xa198) dup(0xffffffffffffffff) r4 = syz_mount_image$gfs2meta(&(0x7f0000000140)='gfs2meta\x00', &(0x7f0000000200)='./file0\x00', 0x1000, 0x0, 0x0, 0x0, &(0x7f0000000900)={[{'-%('}, {'.log\x00'}], [{@appraise_type='appraise_type=imasig'}, {@fowner_eq={'fowner', 0x3d, 0xee01}}, {@hash='hash'}, {@subj_type={'subj_type', 0x3d, '-&'}}, {@hash='hash'}]}) ioctl$BTRFS_IOC_SUBVOL_SETFLAGS(r4, 0x4008941a, &(0x7f0000000980)=0xfe33b054cbbc4d79) 11:25:19 executing program 4: prlimit64(0x0, 0x0, &(0x7f0000000280)={0x7f, 0x80000000008001}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x9}, 0x0) r1 = open(&(0x7f0000000240)='./file1\x00', 0x141142, 0x0) write$UHID_INPUT(r1, &(0x7f0000001440), 0xfffffc41) open(&(0x7f00000001c0)='./file1\x00', 0x0, 0xfffffff6) setxattr$trusted_overlay_nlink(&(0x7f0000000000)='./file1\x00', &(0x7f00000000c0)='trusted.overlay.nlink\x00', 0x0, 0x0, 0x0) 11:25:19 executing program 0: r0 = perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x5c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write$binfmt_elf64(r0, &(0x7f0000000540)=ANY=[@ANYBLOB], 0x2c4) r1 = inotify_init() openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) epoll_ctl$EPOLL_CTL_DEL(0xffffffffffffffff, 0x2, 0xffffffffffffffff) inotify_add_watch(r1, &(0x7f0000000000)='.\x00', 0x400017e) r2 = openat$incfs(0xffffffffffffffff, &(0x7f0000000080)='.log\x00', 0x20200, 0x40) fcntl$getownex(r2, 0x10, &(0x7f00000000c0)) r3 = open(&(0x7f0000000040)='./file0\x00', 0x200c2, 0x0) write$binfmt_elf64(r3, &(0x7f0000000080)=ANY=[], 0x8) sendfile(r3, r3, &(0x7f00000001c0), 0xa198) dup(0xffffffffffffffff) r4 = syz_mount_image$gfs2meta(&(0x7f0000000140)='gfs2meta\x00', &(0x7f0000000200)='./file0\x00', 0x1000, 0x4, &(0x7f0000000880)=[{&(0x7f0000000240)="77ba0daae1b2e74ecd52c59a85bf6f4b1f0b01ab07ba92bc6e57305406115f2bc3e4dd94f19ed896c4fccd34271e9dc3499af9298dbc709e0e6a513d61391d4b198af5f55d24239ae934e8babb8d1cb67bb17b0158", 0x55, 0x3}, {&(0x7f00000002c0)="ae227f954d229f666a6cd22938585e852071e55aa5728addcd315922bf32282e077bdbc63cd5ec89626ee2f8e7982ca239eaa758231056cdca22ca27428407f6c64c384665cfbd00ee6e0d7609f2c7ba0f28b4af70d0307ef78decfe42973915cd509de7c19ea0f3f5c3caaab05f9af08e2cc82d2c14b919dd045e3d36ce1c5d0ff23aed0a4a6ef508b5e71df0a25250d47f1e033ed503b6df99c189111b75b59df679cb75240b756cafecfd203568eeb2c1708fe9f11a2cb0f288590ec76cefbde09c90e9d568492aa5f41196397b70c869838c7164f2bad8eff017d021d7d41c9025c20b", 0xe5, 0x3}, {&(0x7f00000003c0)="792eb6eec33e561f18dc4b58b6a6fb3c7e6fd5e612c08490216ae02617f9811945929cffbf59727393a9a69d57b00a5cd08da3888884b8361d6a4003a54480c1086a5fc876582ff049ede86e2f58d80c7b6cf618e1ba36d4710887bc34ef2b7abbc686df2185f99998060bf492b84e3a02077e2aaf014e1186fde602d2b639d467f48fc2e18cf1553e07ac39040953566ab1d21aac627b166825375377bc3332b62160ea8bf7fc3196b30965dce6181bf7a1c60d0270f24ba6", 0xb9, 0x100000000}, {0x0, 0x0, 0x7}], 0x21008, &(0x7f0000000900)={[{'.log\x00'}, {'-%('}, {'.log\x00'}], [{@obj_user={'obj_user'}}, {@appraise_type='appraise_type=imasig'}, {@fowner_eq={'fowner', 0x3d, 0xee01}}, {@hash='hash'}, {@subj_type={'subj_type', 0x3d, '-&'}}]}) ioctl$BTRFS_IOC_SUBVOL_SETFLAGS(r4, 0x4008941a, &(0x7f0000000980)=0xfe33b054cbbc4d79) [ 585.777902][T28107] loop0: detected capacity change from 264192 to 0 [ 585.787085][ T35] audit: type=1804 audit(1612178719.870:2369): pid=28090 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.1" name="/root/syzkaller-testdir551554057/syzkaller.l2Zg4z/417/file1" dev="sda1" ino=15934 res=1 errno=0 [ 585.940654][ T35] audit: type=1804 audit(1612178719.940:2370): pid=28091 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.1" name="/root/syzkaller-testdir551554057/syzkaller.l2Zg4z/417/file1" dev="sda1" ino=15934 res=1 errno=0 11:25:20 executing program 1: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x7f, 0x80000000008001}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x9}, 0x0) r1 = open(&(0x7f0000000240)='./file1\x00', 0x141142, 0x0) write$UHID_INPUT(r1, &(0x7f0000001440), 0xfffffc41) open(&(0x7f00000001c0)='./file1\x00', 0x0, 0x1200000000000000) setxattr$trusted_overlay_nlink(&(0x7f0000000000)='./file1\x00', &(0x7f00000000c0)='trusted.overlay.nlink\x00', 0x0, 0x0, 0x0) [ 586.087357][ T35] audit: type=1804 audit(1612178719.940:2371): pid=28090 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor.1" name="/root/syzkaller-testdir551554057/syzkaller.l2Zg4z/417/file1" dev="sda1" ino=15934 res=1 errno=0 [ 586.217960][ T35] audit: type=1804 audit(1612178720.190:2372): pid=28096 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.3" name="/root/syzkaller-testdir548988167/syzkaller.gb8agU/421/file1" dev="sda1" ino=15889 res=1 errno=0 [ 586.311258][ T35] audit: type=1804 audit(1612178720.280:2373): pid=28098 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.3" name="/root/syzkaller-testdir548988167/syzkaller.gb8agU/421/file1" dev="sda1" ino=15889 res=1 errno=0 11:25:20 executing program 3: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x7f, 0x80000000008001}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x9}, 0x0) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000080)) r1 = open(&(0x7f0000000240)='./file1\x00', 0x141142, 0x0) write$UHID_INPUT(r1, &(0x7f0000001440)={0x8, {'\x00c\x00'}}, 0xfffffc41) open(&(0x7f00000001c0)='./file1\x00', 0x0, 0x0) setxattr$trusted_overlay_nlink(&(0x7f0000000000)='./file1\x00', &(0x7f00000000c0)='trusted.overlay.nlink\x00', 0x0, 0x0, 0x0) 11:25:20 executing program 5: write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000540)=ANY=[@ANYBLOB="7f454c4601061f000400000000000000030038000800000032000000000000004000000000000000560200000000000007000000008038000100090002000100010000000100000006000000000000000400000000000000060000000000000001040000000000000200000000000000010000000000000051e574640400000001000000000000000400000000000000050000000000000005000000000000000400000000000000ff24444700000000908bc001727fbcd44f4d3bf922995edf2fd379eb00"/489], 0x2c4) r0 = inotify_init() r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) epoll_ctl$EPOLL_CTL_DEL(0xffffffffffffffff, 0x2, r1) inotify_add_watch(r0, &(0x7f0000000000)='.\x00', 0x400017e) r2 = openat$incfs(0xffffffffffffffff, &(0x7f0000000080)='.log\x00', 0x0, 0x0) fcntl$getownex(r2, 0x10, &(0x7f00000000c0)) r3 = open(&(0x7f0000000040)='./file0\x00', 0x200c2, 0x0) write$binfmt_elf64(r3, &(0x7f0000000080)=ANY=[], 0x8) sendfile(r3, r3, &(0x7f00000001c0), 0xa198) dup(0xffffffffffffffff) r4 = syz_mount_image$gfs2meta(&(0x7f0000000140)='gfs2meta\x00', &(0x7f0000000200)='./file0\x00', 0x1000, 0x0, 0x0, 0x0, &(0x7f0000000900)={[{'-%('}, {'.log\x00'}], [{@appraise_type='appraise_type=imasig'}, {@fowner_eq={'fowner', 0x3d, 0xee01}}, {@hash='hash'}, {@subj_type={'subj_type', 0x3d, '-&'}}, {@hash='hash'}]}) ioctl$BTRFS_IOC_SUBVOL_SETFLAGS(r4, 0x4008941a, &(0x7f0000000980)=0xfe33b054cbbc4d79) 11:25:20 executing program 0: r0 = perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x5c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write$binfmt_elf64(r0, &(0x7f0000000540)=ANY=[@ANYBLOB], 0x2c4) r1 = inotify_init() openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) epoll_ctl$EPOLL_CTL_DEL(0xffffffffffffffff, 0x2, 0xffffffffffffffff) inotify_add_watch(r1, &(0x7f0000000000)='.\x00', 0x400017e) r2 = openat$incfs(0xffffffffffffffff, &(0x7f0000000080)='.log\x00', 0x20200, 0x40) fcntl$getownex(r2, 0x10, &(0x7f00000000c0)) r3 = open(&(0x7f0000000040)='./file0\x00', 0x200c2, 0x0) write$binfmt_elf64(r3, &(0x7f0000000080)=ANY=[], 0x8) sendfile(r3, r3, &(0x7f00000001c0), 0xa198) dup(0xffffffffffffffff) r4 = syz_mount_image$gfs2meta(&(0x7f0000000140)='gfs2meta\x00', &(0x7f0000000200)='./file0\x00', 0x1000, 0x4, &(0x7f0000000880)=[{&(0x7f0000000240)="77ba0daae1b2e74ecd52c59a85bf6f4b1f0b01ab07ba92bc6e57305406115f2bc3e4dd94f19ed896c4fccd34271e9dc3499af9298dbc709e0e6a513d61391d4b198af5f55d24239ae934e8babb8d1cb67bb17b0158", 0x55, 0x3}, {&(0x7f00000002c0)="ae227f954d229f666a6cd22938585e852071e55aa5728addcd315922bf32282e077bdbc63cd5ec89626ee2f8e7982ca239eaa758231056cdca22ca27428407f6c64c384665cfbd00ee6e0d7609f2c7ba0f28b4af70d0307ef78decfe42973915cd509de7c19ea0f3f5c3caaab05f9af08e2cc82d2c14b919dd045e3d36ce1c5d0ff23aed0a4a6ef508b5e71df0a25250d47f1e033ed503b6df99c189111b75b59df679cb75240b756cafecfd203568eeb2c1708fe9f11a2cb0f288590ec76cefbde09c90e9d568492aa5f41196397b70c869838c7164f2bad8eff017d021d7d41c9025c20b", 0xe5, 0x3}, {&(0x7f00000003c0)="792eb6eec33e561f18dc4b58b6a6fb3c7e6fd5e612c08490216ae02617f9811945929cffbf59727393a9a69d57b00a5cd08da3888884b8361d6a4003a54480c1086a5fc876582ff049ede86e2f58d80c7b6cf618e1ba36d4710887bc34ef2b7abbc686df2185f99998060bf492b84e3a02077e2aaf014e1186fde602", 0x7c, 0x100000000}, {0x0, 0x0, 0x7}], 0x21008, &(0x7f0000000900)={[{'.log\x00'}, {'-%('}, {'.log\x00'}], [{@obj_user={'obj_user'}}, {@appraise_type='appraise_type=imasig'}, {@fowner_eq={'fowner', 0x3d, 0xee01}}, {@hash='hash'}, {@subj_type={'subj_type', 0x3d, '-&'}}]}) ioctl$BTRFS_IOC_SUBVOL_SETFLAGS(r4, 0x4008941a, &(0x7f0000000980)=0xfe33b054cbbc4d79) [ 586.522775][ T35] audit: type=1804 audit(1612178720.600:2374): pid=28109 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.2" name="/root/syzkaller-testdir245532710/syzkaller.d2c0aK/435/file1" dev="sda1" ino=15902 res=1 errno=0 [ 586.618943][ T35] audit: type=1804 audit(1612178720.630:2375): pid=28118 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.4" name="/root/syzkaller-testdir068764309/syzkaller.I2gCPs/471/file1" dev="sda1" ino=15770 res=1 errno=0 11:25:20 executing program 2: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x7f, 0x80000000008001}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x9}, 0x0) r1 = open(&(0x7f0000000240)='./file1\x00', 0x141142, 0x0) write$UHID_INPUT(r1, &(0x7f0000001440)={0x8, {'\x00h\x00'}}, 0xfffffc41) open(&(0x7f00000001c0)='./file1\x00', 0x0, 0x0) setxattr$trusted_overlay_nlink(&(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x0, 0x0) [ 586.787450][T28137] loop0: detected capacity change from 264192 to 0 [ 586.809524][ T35] audit: type=1804 audit(1612178720.630:2376): pid=28112 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.2" name="/root/syzkaller-testdir245532710/syzkaller.d2c0aK/435/file1" dev="sda1" ino=15902 res=1 errno=0 11:25:20 executing program 4: prlimit64(0x0, 0xe, 0x0, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x9}, 0x0) r1 = open(&(0x7f0000000240)='./file1\x00', 0x141142, 0x0) write$UHID_INPUT(r1, &(0x7f0000001440), 0xfffffc41) open(&(0x7f00000001c0)='./file1\x00', 0x0, 0xfffffff6) setxattr$trusted_overlay_nlink(&(0x7f0000000000)='./file1\x00', &(0x7f00000000c0)='trusted.overlay.nlink\x00', 0x0, 0x0, 0x0) 11:25:21 executing program 1: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x7f, 0x80000000008001}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x9}, 0x0) r1 = open(&(0x7f0000000240)='./file1\x00', 0x141142, 0x0) write$UHID_INPUT(r1, &(0x7f0000001440), 0xfffffc41) open(&(0x7f00000001c0)='./file1\x00', 0x0, 0x1800000000000000) setxattr$trusted_overlay_nlink(&(0x7f0000000000)='./file1\x00', &(0x7f00000000c0)='trusted.overlay.nlink\x00', 0x0, 0x0, 0x0) 11:25:21 executing program 5: write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000540)=ANY=[@ANYBLOB="7f454c4601061f000400000000000000030038000800000032000000000000004000000000000000560200000000000007000000008038000100090002000100010000000100000006000000000000000400000000000000060000000000000001040000000000000200000000000000010000000000000051e574640400000001000000000000000400000000000000050000000000000005000000000000000400000000000000ff24444700000000908bc001727fbcd44f4d3bf922995edf2fd379eb00"/489], 0x2c4) r0 = inotify_init() r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) epoll_ctl$EPOLL_CTL_DEL(0xffffffffffffffff, 0x2, r1) inotify_add_watch(r0, &(0x7f0000000000)='.\x00', 0x400017e) r2 = openat$incfs(0xffffffffffffffff, &(0x7f0000000080)='.log\x00', 0x0, 0x0) fcntl$getownex(r2, 0x10, &(0x7f00000000c0)) r3 = open(&(0x7f0000000040)='./file0\x00', 0x200c2, 0x0) write$binfmt_elf64(r3, &(0x7f0000000080)=ANY=[], 0x8) sendfile(r3, r3, &(0x7f00000001c0), 0xa198) dup(0xffffffffffffffff) r4 = syz_mount_image$gfs2meta(&(0x7f0000000140)='gfs2meta\x00', &(0x7f0000000200)='./file0\x00', 0x1000, 0x0, 0x0, 0x0, &(0x7f0000000900)={[{'.log\x00'}, {'-%('}, {'.log\x00'}], [{@appraise_type='appraise_type=imasig'}, {@fowner_eq={'fowner', 0x3d, 0xee01}}, {@hash='hash'}, {@subj_type={'subj_type', 0x3d, '-&'}}]}) ioctl$BTRFS_IOC_SUBVOL_SETFLAGS(r4, 0x4008941a, &(0x7f0000000980)=0xfe33b054cbbc4d79) 11:25:21 executing program 0: r0 = perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x5c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write$binfmt_elf64(r0, &(0x7f0000000540)=ANY=[@ANYBLOB], 0x2c4) r1 = inotify_init() openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) epoll_ctl$EPOLL_CTL_DEL(0xffffffffffffffff, 0x2, 0xffffffffffffffff) inotify_add_watch(r1, &(0x7f0000000000)='.\x00', 0x400017e) r2 = openat$incfs(0xffffffffffffffff, &(0x7f0000000080)='.log\x00', 0x20200, 0x40) fcntl$getownex(r2, 0x10, &(0x7f00000000c0)) r3 = open(&(0x7f0000000040)='./file0\x00', 0x200c2, 0x0) write$binfmt_elf64(r3, &(0x7f0000000080)=ANY=[], 0x8) sendfile(r3, r3, &(0x7f00000001c0), 0xa198) dup(0xffffffffffffffff) r4 = syz_mount_image$gfs2meta(&(0x7f0000000140)='gfs2meta\x00', &(0x7f0000000200)='./file0\x00', 0x1000, 0x4, &(0x7f0000000880)=[{&(0x7f0000000240)="77ba0daae1b2e74ecd52c59a85bf6f4b1f0b01ab07ba92bc6e57305406115f2bc3e4dd94f19ed896c4fccd34271e9dc3499af9298dbc709e0e6a513d61391d4b198af5f55d24239ae934e8babb8d1cb67bb17b0158", 0x55, 0x3}, {&(0x7f00000002c0)="ae227f954d229f666a6cd22938585e852071e55aa5728addcd315922bf32282e077bdbc63cd5ec89626ee2f8e7982ca239eaa758231056cdca22ca27428407f6c64c384665cfbd00ee6e0d7609f2c7ba0f28b4af70d0307ef78decfe42973915cd509de7c19ea0f3f5c3caaab05f9af08e2cc82d2c14b919dd045e3d36ce1c5d0ff23aed0a4a6ef508b5e71df0a25250d47f1e033ed503b6df99c189111b75b59df679cb75240b756cafecfd203568eeb2c1708fe9f11a2cb0f288590ec76cefbde09c90e9d568492aa5f41196397b70c869838c7164f2bad8eff017d021d7d41c9025c20b", 0xe5, 0x3}, {&(0x7f00000003c0)="792eb6eec33e561f18dc4b58b6a6fb3c7e6fd5e612c08490216ae02617f9811945929cffbf59727393a9a69d57b00a5cd08da3888884b8361d6a4003a54480c1086a5fc876582ff049ede86e2f58d80c7b6cf618e1ba36d4710887bc34ef2b7abbc686df2185f99998060bf492b84e3a02077e2aaf014e1186fde602", 0x7c, 0x100000000}, {0x0, 0x0, 0x7}], 0x21008, &(0x7f0000000900)={[{'.log\x00'}, {'-%('}, {'.log\x00'}], [{@obj_user={'obj_user'}}, {@appraise_type='appraise_type=imasig'}, {@fowner_eq={'fowner', 0x3d, 0xee01}}, {@hash='hash'}, {@subj_type={'subj_type', 0x3d, '-&'}}]}) ioctl$BTRFS_IOC_SUBVOL_SETFLAGS(r4, 0x4008941a, &(0x7f0000000980)=0xfe33b054cbbc4d79) 11:25:21 executing program 3: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x7f, 0x80000000008001}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x9}, 0x0) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000080)) r1 = open(&(0x7f0000000240)='./file1\x00', 0x141142, 0x0) write$UHID_INPUT(r1, &(0x7f0000001440)={0x8, {'\x00d\x00'}}, 0xfffffc41) open(&(0x7f00000001c0)='./file1\x00', 0x0, 0x0) setxattr$trusted_overlay_nlink(&(0x7f0000000000)='./file1\x00', &(0x7f00000000c0)='trusted.overlay.nlink\x00', 0x0, 0x0, 0x0) [ 587.775680][T28168] loop0: detected capacity change from 264192 to 0 11:25:22 executing program 4: prlimit64(0x0, 0xe, 0x0, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x9}, 0x0) r1 = open(&(0x7f0000000240)='./file1\x00', 0x141142, 0x0) write$UHID_INPUT(r1, &(0x7f0000001440), 0xfffffc41) open(&(0x7f00000001c0)='./file1\x00', 0x0, 0xfffffff6) setxattr$trusted_overlay_nlink(&(0x7f0000000000)='./file1\x00', &(0x7f00000000c0)='trusted.overlay.nlink\x00', 0x0, 0x0, 0x0) 11:25:22 executing program 2: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x7f, 0x80000000008001}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x9}, 0x0) r1 = open(&(0x7f0000000240)='./file1\x00', 0x141142, 0x0) write$UHID_INPUT(r1, &(0x7f0000001440)={0x8, {'\x00i\x00'}}, 0xfffffc41) open(&(0x7f00000001c0)='./file1\x00', 0x0, 0x0) setxattr$trusted_overlay_nlink(&(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x0, 0x0) 11:25:22 executing program 5: write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000540)=ANY=[@ANYBLOB="7f454c4601061f000400000000000000030038000800000032000000000000004000000000000000560200000000000007000000008038000100090002000100010000000100000006000000000000000400000000000000060000000000000001040000000000000200000000000000010000000000000051e574640400000001000000000000000400000000000000050000000000000005000000000000000400000000000000ff24444700000000908bc001727fbcd44f4d3bf922995edf2fd379eb00"/489], 0x2c4) r0 = inotify_init() r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) epoll_ctl$EPOLL_CTL_DEL(0xffffffffffffffff, 0x2, r1) inotify_add_watch(r0, &(0x7f0000000000)='.\x00', 0x400017e) r2 = openat$incfs(0xffffffffffffffff, &(0x7f0000000080)='.log\x00', 0x0, 0x0) fcntl$getownex(r2, 0x10, &(0x7f00000000c0)) r3 = open(&(0x7f0000000040)='./file0\x00', 0x200c2, 0x0) write$binfmt_elf64(r3, &(0x7f0000000080)=ANY=[], 0x8) sendfile(r3, r3, &(0x7f00000001c0), 0xa198) dup(0xffffffffffffffff) r4 = syz_mount_image$gfs2meta(&(0x7f0000000140)='gfs2meta\x00', &(0x7f0000000200)='./file0\x00', 0x1000, 0x0, 0x0, 0x0, &(0x7f0000000900)={[{'.log\x00'}, {'-%('}, {'.log\x00'}], [{@appraise_type='appraise_type=imasig'}, {@fowner_eq={'fowner', 0x3d, 0xee01}}, {@hash='hash'}, {@subj_type={'subj_type', 0x3d, '-&'}}]}) ioctl$BTRFS_IOC_SUBVOL_SETFLAGS(r4, 0x4008941a, &(0x7f0000000980)=0xfe33b054cbbc4d79) 11:25:22 executing program 0: r0 = perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x5c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write$binfmt_elf64(r0, &(0x7f0000000540)=ANY=[@ANYBLOB], 0x2c4) r1 = inotify_init() openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) epoll_ctl$EPOLL_CTL_DEL(0xffffffffffffffff, 0x2, 0xffffffffffffffff) inotify_add_watch(r1, &(0x7f0000000000)='.\x00', 0x400017e) r2 = openat$incfs(0xffffffffffffffff, &(0x7f0000000080)='.log\x00', 0x20200, 0x40) fcntl$getownex(r2, 0x10, &(0x7f00000000c0)) r3 = open(&(0x7f0000000040)='./file0\x00', 0x200c2, 0x0) write$binfmt_elf64(r3, &(0x7f0000000080)=ANY=[], 0x8) sendfile(r3, r3, &(0x7f00000001c0), 0xa198) dup(0xffffffffffffffff) r4 = syz_mount_image$gfs2meta(&(0x7f0000000140)='gfs2meta\x00', &(0x7f0000000200)='./file0\x00', 0x1000, 0x4, &(0x7f0000000880)=[{&(0x7f0000000240)="77ba0daae1b2e74ecd52c59a85bf6f4b1f0b01ab07ba92bc6e57305406115f2bc3e4dd94f19ed896c4fccd34271e9dc3499af9298dbc709e0e6a513d61391d4b198af5f55d24239ae934e8babb8d1cb67bb17b0158", 0x55, 0x3}, {&(0x7f00000002c0)="ae227f954d229f666a6cd22938585e852071e55aa5728addcd315922bf32282e077bdbc63cd5ec89626ee2f8e7982ca239eaa758231056cdca22ca27428407f6c64c384665cfbd00ee6e0d7609f2c7ba0f28b4af70d0307ef78decfe42973915cd509de7c19ea0f3f5c3caaab05f9af08e2cc82d2c14b919dd045e3d36ce1c5d0ff23aed0a4a6ef508b5e71df0a25250d47f1e033ed503b6df99c189111b75b59df679cb75240b756cafecfd203568eeb2c1708fe9f11a2cb0f288590ec76cefbde09c90e9d568492aa5f41196397b70c869838c7164f2bad8eff017d021d7d41c9025c20b", 0xe5, 0x3}, {&(0x7f00000003c0)="792eb6eec33e561f18dc4b58b6a6fb3c7e6fd5e612c08490216ae02617f9811945929cffbf59727393a9a69d57b00a5cd08da3888884b8361d6a4003a54480c1086a5fc876582ff049ede86e2f58d80c7b6cf618e1ba36d4710887bc34ef2b7abbc686df2185f99998060bf492b84e3a02077e2aaf014e1186fde602", 0x7c, 0x100000000}, {0x0, 0x0, 0x7}], 0x21008, &(0x7f0000000900)={[{'.log\x00'}, {'-%('}, {'.log\x00'}], [{@obj_user={'obj_user'}}, {@appraise_type='appraise_type=imasig'}, {@fowner_eq={'fowner', 0x3d, 0xee01}}, {@hash='hash'}, {@subj_type={'subj_type', 0x3d, '-&'}}]}) ioctl$BTRFS_IOC_SUBVOL_SETFLAGS(r4, 0x4008941a, &(0x7f0000000980)=0xfe33b054cbbc4d79) 11:25:22 executing program 1: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x7f, 0x80000000008001}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x9}, 0x0) r1 = open(&(0x7f0000000240)='./file1\x00', 0x141142, 0x0) write$UHID_INPUT(r1, &(0x7f0000001440), 0xfffffc41) open(&(0x7f00000001c0)='./file1\x00', 0x0, 0x1f00000000000000) setxattr$trusted_overlay_nlink(&(0x7f0000000000)='./file1\x00', &(0x7f00000000c0)='trusted.overlay.nlink\x00', 0x0, 0x0, 0x0) [ 588.724890][T28197] loop0: detected capacity change from 264192 to 0 11:25:23 executing program 3: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x7f, 0x80000000008001}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x9}, 0x0) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000080)) r1 = open(&(0x7f0000000240)='./file1\x00', 0x141142, 0x0) write$UHID_INPUT(r1, &(0x7f0000001440)={0x8, {'\x00e\x00'}}, 0xfffffc41) open(&(0x7f00000001c0)='./file1\x00', 0x0, 0x0) setxattr$trusted_overlay_nlink(&(0x7f0000000000)='./file1\x00', &(0x7f00000000c0)='trusted.overlay.nlink\x00', 0x0, 0x0, 0x0) 11:25:23 executing program 4: prlimit64(0x0, 0xe, 0x0, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x9}, 0x0) r1 = open(&(0x7f0000000240)='./file1\x00', 0x141142, 0x0) write$UHID_INPUT(r1, &(0x7f0000001440), 0xfffffc41) open(&(0x7f00000001c0)='./file1\x00', 0x0, 0xfffffff6) setxattr$trusted_overlay_nlink(&(0x7f0000000000)='./file1\x00', &(0x7f00000000c0)='trusted.overlay.nlink\x00', 0x0, 0x0, 0x0) 11:25:23 executing program 2: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x7f, 0x80000000008001}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x9}, 0x0) r1 = open(&(0x7f0000000240)='./file1\x00', 0x141142, 0x0) write$UHID_INPUT(r1, &(0x7f0000001440)={0x8, {'\x00j\x00'}}, 0xfffffc41) open(&(0x7f00000001c0)='./file1\x00', 0x0, 0x0) setxattr$trusted_overlay_nlink(&(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x0, 0x0) 11:25:23 executing program 5: write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000540)=ANY=[@ANYBLOB="7f454c4601061f000400000000000000030038000800000032000000000000004000000000000000560200000000000007000000008038000100090002000100010000000100000006000000000000000400000000000000060000000000000001040000000000000200000000000000010000000000000051e574640400000001000000000000000400000000000000050000000000000005000000000000000400000000000000ff24444700000000908bc001727fbcd44f4d3bf922995edf2fd379eb00"/489], 0x2c4) r0 = inotify_init() r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) epoll_ctl$EPOLL_CTL_DEL(0xffffffffffffffff, 0x2, r1) inotify_add_watch(r0, &(0x7f0000000000)='.\x00', 0x400017e) r2 = openat$incfs(0xffffffffffffffff, &(0x7f0000000080)='.log\x00', 0x0, 0x0) fcntl$getownex(r2, 0x10, &(0x7f00000000c0)) r3 = open(&(0x7f0000000040)='./file0\x00', 0x200c2, 0x0) write$binfmt_elf64(r3, &(0x7f0000000080)=ANY=[], 0x8) sendfile(r3, r3, &(0x7f00000001c0), 0xa198) dup(0xffffffffffffffff) r4 = syz_mount_image$gfs2meta(&(0x7f0000000140)='gfs2meta\x00', &(0x7f0000000200)='./file0\x00', 0x1000, 0x0, 0x0, 0x0, &(0x7f0000000900)={[{'.log\x00'}, {'-%('}, {'.log\x00'}], [{@appraise_type='appraise_type=imasig'}, {@fowner_eq={'fowner', 0x3d, 0xee01}}, {@hash='hash'}, {@subj_type={'subj_type', 0x3d, '-&'}}]}) ioctl$BTRFS_IOC_SUBVOL_SETFLAGS(r4, 0x4008941a, &(0x7f0000000980)=0xfe33b054cbbc4d79) 11:25:23 executing program 0: r0 = perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x5c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write$binfmt_elf64(r0, &(0x7f0000000540)=ANY=[@ANYBLOB], 0x2c4) r1 = inotify_init() openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) epoll_ctl$EPOLL_CTL_DEL(0xffffffffffffffff, 0x2, 0xffffffffffffffff) inotify_add_watch(r1, &(0x7f0000000000)='.\x00', 0x400017e) r2 = openat$incfs(0xffffffffffffffff, &(0x7f0000000080)='.log\x00', 0x20200, 0x40) fcntl$getownex(r2, 0x10, &(0x7f00000000c0)) r3 = open(&(0x7f0000000040)='./file0\x00', 0x200c2, 0x0) write$binfmt_elf64(r3, &(0x7f0000000080)=ANY=[], 0x8) sendfile(r3, r3, &(0x7f00000001c0), 0xa198) dup(0xffffffffffffffff) r4 = syz_mount_image$gfs2meta(&(0x7f0000000140)='gfs2meta\x00', &(0x7f0000000200)='./file0\x00', 0x1000, 0x4, &(0x7f0000000880)=[{&(0x7f0000000240)="77ba0daae1b2e74ecd52c59a85bf6f4b1f0b01ab07ba92bc6e57305406115f2bc3e4dd94f19ed896c4fccd34271e9dc3499af9298dbc709e0e6a513d61391d4b198af5f55d24239ae934e8babb8d1cb67bb17b0158", 0x55, 0x3}, {&(0x7f00000002c0)="ae227f954d229f666a6cd22938585e852071e55aa5728addcd315922bf32282e077bdbc63cd5ec89626ee2f8e7982ca239eaa758231056cdca22ca27428407f6c64c384665cfbd00ee6e0d7609f2c7ba0f28b4af70d0307ef78decfe42973915cd509de7c19ea0f3f5c3caaab05f9af08e2cc82d2c14b919dd045e3d36ce1c5d0ff23aed0a4a6ef508b5e71df0a25250d47f1e033ed503b6df99c189111b75b59df679cb75240b756cafecfd203568eeb2c1708fe9f11a2cb0f288590ec76cefbde09c90e9d568492aa5f41196397b70c869838c7164f2bad8eff017d021d7d41c9025c20b", 0xe5, 0x3}, {&(0x7f00000003c0)="792eb6eec33e561f18dc4b58b6a6fb3c7e6fd5e612c08490216ae02617f9811945929cffbf59727393a9a69d57b00a5cd08da3888884b8361d6a4003a54480c1086a5fc876582ff049ede86e2f58d80c7b6cf618e1ba36d4710887bc34ef2b7abbc686df2185f99998060bf492b84e3a02077e2aaf014e1186fde602d2b639d467f48fc2e18cf1553e07ac39040953566ab1d21aac627b16682537", 0x9b, 0x100000000}, {0x0, 0x0, 0x7}], 0x21008, &(0x7f0000000900)={[{'.log\x00'}, {'-%('}, {'.log\x00'}], [{@obj_user={'obj_user'}}, {@appraise_type='appraise_type=imasig'}, {@fowner_eq={'fowner', 0x3d, 0xee01}}, {@hash='hash'}, {@subj_type={'subj_type', 0x3d, '-&'}}]}) ioctl$BTRFS_IOC_SUBVOL_SETFLAGS(r4, 0x4008941a, &(0x7f0000000980)=0xfe33b054cbbc4d79) [ 589.639424][T28230] loop0: detected capacity change from 264192 to 0 11:25:23 executing program 1: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x7f, 0x80000000008001}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x9}, 0x0) r1 = open(&(0x7f0000000240)='./file1\x00', 0x141142, 0x0) write$UHID_INPUT(r1, &(0x7f0000001440), 0xfffffc41) open(&(0x7f00000001c0)='./file1\x00', 0x0, 0x2000000000000000) setxattr$trusted_overlay_nlink(&(0x7f0000000000)='./file1\x00', &(0x7f00000000c0)='trusted.overlay.nlink\x00', 0x0, 0x0, 0x0) 11:25:24 executing program 4: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x0, 0x80000000008001}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x9}, 0x0) r1 = open(&(0x7f0000000240)='./file1\x00', 0x141142, 0x0) write$UHID_INPUT(r1, &(0x7f0000001440), 0xfffffc41) open(&(0x7f00000001c0)='./file1\x00', 0x0, 0xfffffff6) setxattr$trusted_overlay_nlink(&(0x7f0000000000)='./file1\x00', &(0x7f00000000c0)='trusted.overlay.nlink\x00', 0x0, 0x0, 0x0) 11:25:24 executing program 3: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x7f, 0x80000000008001}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x9}, 0x0) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000080)) r1 = open(&(0x7f0000000240)='./file1\x00', 0x141142, 0x0) write$UHID_INPUT(r1, &(0x7f0000001440)={0x8, {'\x00f\x00'}}, 0xfffffc41) open(&(0x7f00000001c0)='./file1\x00', 0x0, 0x0) setxattr$trusted_overlay_nlink(&(0x7f0000000000)='./file1\x00', &(0x7f00000000c0)='trusted.overlay.nlink\x00', 0x0, 0x0, 0x0) 11:25:24 executing program 5: write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000540)=ANY=[@ANYBLOB="7f454c4601061f000400000000000000030038000800000032000000000000004000000000000000560200000000000007000000008038000100090002000100010000000100000006000000000000000400000000000000060000000000000001040000000000000200000000000000010000000000000051e574640400000001000000000000000400000000000000050000000000000005000000000000000400000000000000ff24444700000000908bc001727fbcd44f4d3bf922995edf2fd379eb00"/489], 0x2c4) r0 = inotify_init() r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) epoll_ctl$EPOLL_CTL_DEL(0xffffffffffffffff, 0x2, r1) inotify_add_watch(r0, &(0x7f0000000000)='.\x00', 0x400017e) r2 = openat$incfs(0xffffffffffffffff, &(0x7f0000000080)='.log\x00', 0x0, 0x0) fcntl$getownex(r2, 0x10, &(0x7f00000000c0)) r3 = open(&(0x7f0000000040)='./file0\x00', 0x200c2, 0x0) write$binfmt_elf64(r3, &(0x7f0000000080)=ANY=[], 0x8) sendfile(r3, r3, &(0x7f00000001c0), 0xa198) dup(0xffffffffffffffff) r4 = syz_mount_image$gfs2meta(&(0x7f0000000140)='gfs2meta\x00', &(0x7f0000000200)='./file0\x00', 0x1000, 0x0, 0x0, 0x0, &(0x7f0000000900)={[{'.log\x00'}, {'-%('}, {'.log\x00'}], [{@appraise_type='appraise_type=imasig'}, {@fowner_eq={'fowner', 0x3d, 0xee01}}, {@hash='hash'}]}) ioctl$BTRFS_IOC_SUBVOL_SETFLAGS(r4, 0x4008941a, &(0x7f0000000980)=0xfe33b054cbbc4d79) 11:25:24 executing program 2: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x7f, 0x80000000008001}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x9}, 0x0) r1 = open(&(0x7f0000000240)='./file1\x00', 0x141142, 0x0) write$UHID_INPUT(r1, &(0x7f0000001440)={0x8, {'\x00k\x00'}}, 0xfffffc41) open(&(0x7f00000001c0)='./file1\x00', 0x0, 0x0) setxattr$trusted_overlay_nlink(&(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x0, 0x0) 11:25:24 executing program 0: r0 = perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x5c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write$binfmt_elf64(r0, &(0x7f0000000540)=ANY=[@ANYBLOB], 0x2c4) r1 = inotify_init() openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) epoll_ctl$EPOLL_CTL_DEL(0xffffffffffffffff, 0x2, 0xffffffffffffffff) inotify_add_watch(r1, &(0x7f0000000000)='.\x00', 0x400017e) r2 = openat$incfs(0xffffffffffffffff, &(0x7f0000000080)='.log\x00', 0x20200, 0x40) fcntl$getownex(r2, 0x10, &(0x7f00000000c0)) r3 = open(&(0x7f0000000040)='./file0\x00', 0x200c2, 0x0) write$binfmt_elf64(r3, &(0x7f0000000080)=ANY=[], 0x8) sendfile(r3, r3, &(0x7f00000001c0), 0xa198) dup(0xffffffffffffffff) r4 = syz_mount_image$gfs2meta(&(0x7f0000000140)='gfs2meta\x00', &(0x7f0000000200)='./file0\x00', 0x1000, 0x4, &(0x7f0000000880)=[{&(0x7f0000000240)="77ba0daae1b2e74ecd52c59a85bf6f4b1f0b01ab07ba92bc6e57305406115f2bc3e4dd94f19ed896c4fccd34271e9dc3499af9298dbc709e0e6a513d61391d4b198af5f55d24239ae934e8babb8d1cb67bb17b0158", 0x55, 0x3}, {&(0x7f00000002c0)="ae227f954d229f666a6cd22938585e852071e55aa5728addcd315922bf32282e077bdbc63cd5ec89626ee2f8e7982ca239eaa758231056cdca22ca27428407f6c64c384665cfbd00ee6e0d7609f2c7ba0f28b4af70d0307ef78decfe42973915cd509de7c19ea0f3f5c3caaab05f9af08e2cc82d2c14b919dd045e3d36ce1c5d0ff23aed0a4a6ef508b5e71df0a25250d47f1e033ed503b6df99c189111b75b59df679cb75240b756cafecfd203568eeb2c1708fe9f11a2cb0f288590ec76cefbde09c90e9d568492aa5f41196397b70c869838c7164f2bad8eff017d021d7d41c9025c20b", 0xe5, 0x3}, {&(0x7f00000003c0)="792eb6eec33e561f18dc4b58b6a6fb3c7e6fd5e612c08490216ae02617f9811945929cffbf59727393a9a69d57b00a5cd08da3888884b8361d6a4003a54480c1086a5fc876582ff049ede86e2f58d80c7b6cf618e1ba36d4710887bc34ef2b7abbc686df2185f99998060bf492b84e3a02077e2aaf014e1186fde602d2b639d467f48fc2e18cf1553e07ac39040953566ab1d21aac627b16682537", 0x9b, 0x100000000}, {0x0, 0x0, 0x7}], 0x21008, &(0x7f0000000900)={[{'.log\x00'}, {'-%('}, {'.log\x00'}], [{@obj_user={'obj_user'}}, {@appraise_type='appraise_type=imasig'}, {@fowner_eq={'fowner', 0x3d, 0xee01}}, {@hash='hash'}, {@subj_type={'subj_type', 0x3d, '-&'}}]}) ioctl$BTRFS_IOC_SUBVOL_SETFLAGS(r4, 0x4008941a, &(0x7f0000000980)=0xfe33b054cbbc4d79) [ 590.589932][T28262] loop0: detected capacity change from 264192 to 0 [ 590.647882][ T35] kauditd_printk_skb: 27 callbacks suppressed [ 590.647892][ T35] audit: type=1804 audit(1612178724.721:2404): pid=28240 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.1" name="/root/syzkaller-testdir551554057/syzkaller.l2Zg4z/421/file1" dev="sda1" ino=15928 res=1 errno=0 11:25:24 executing program 1: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x7f, 0x80000000008001}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x9}, 0x0) r1 = open(&(0x7f0000000240)='./file1\x00', 0x141142, 0x0) write$UHID_INPUT(r1, &(0x7f0000001440), 0xfffffc41) open(&(0x7f00000001c0)='./file1\x00', 0x0, 0x2500000000000000) setxattr$trusted_overlay_nlink(&(0x7f0000000000)='./file1\x00', &(0x7f00000000c0)='trusted.overlay.nlink\x00', 0x0, 0x0, 0x0) [ 590.780040][ T35] audit: type=1800 audit(1612178724.851:2405): pid=28240 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed comm="syz-executor.1" name="file1" dev="sda1" ino=15928 res=0 errno=0 [ 590.865822][ T35] audit: type=1804 audit(1612178724.881:2406): pid=28239 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor.1" name="/root/syzkaller-testdir551554057/syzkaller.l2Zg4z/421/file1" dev="sda1" ino=15928 res=1 errno=0 [ 590.986991][ T35] audit: type=1800 audit(1612178724.881:2407): pid=28239 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed comm="syz-executor.1" name="file1" dev="sda1" ino=15928 res=0 errno=0 [ 591.097161][ T35] audit: type=1804 audit(1612178725.011:2408): pid=28249 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.4" name="/root/syzkaller-testdir068764309/syzkaller.I2gCPs/475/file1" dev="sda1" ino=15765 res=1 errno=0 11:25:25 executing program 4: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x0, 0x80000000008001}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x9}, 0x0) r1 = open(&(0x7f0000000240)='./file1\x00', 0x141142, 0x0) write$UHID_INPUT(r1, &(0x7f0000001440), 0xfffffc41) open(&(0x7f00000001c0)='./file1\x00', 0x0, 0xfffffff6) setxattr$trusted_overlay_nlink(&(0x7f0000000000)='./file1\x00', &(0x7f00000000c0)='trusted.overlay.nlink\x00', 0x0, 0x0, 0x0) 11:25:25 executing program 5: write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000540)=ANY=[@ANYBLOB="7f454c4601061f000400000000000000030038000800000032000000000000004000000000000000560200000000000007000000008038000100090002000100010000000100000006000000000000000400000000000000060000000000000001040000000000000200000000000000010000000000000051e574640400000001000000000000000400000000000000050000000000000005000000000000000400000000000000ff24444700000000908bc001727fbcd44f4d3bf922995edf2fd379eb00"/489], 0x2c4) r0 = inotify_init() r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) epoll_ctl$EPOLL_CTL_DEL(0xffffffffffffffff, 0x2, r1) inotify_add_watch(r0, &(0x7f0000000000)='.\x00', 0x400017e) r2 = openat$incfs(0xffffffffffffffff, &(0x7f0000000080)='.log\x00', 0x0, 0x0) fcntl$getownex(r2, 0x10, &(0x7f00000000c0)) r3 = open(&(0x7f0000000040)='./file0\x00', 0x200c2, 0x0) write$binfmt_elf64(r3, &(0x7f0000000080)=ANY=[], 0x8) sendfile(r3, r3, &(0x7f00000001c0), 0xa198) dup(0xffffffffffffffff) r4 = syz_mount_image$gfs2meta(&(0x7f0000000140)='gfs2meta\x00', &(0x7f0000000200)='./file0\x00', 0x1000, 0x0, 0x0, 0x0, &(0x7f0000000900)={[{'.log\x00'}, {'-%('}, {'.log\x00'}], [{@appraise_type='appraise_type=imasig'}, {@fowner_eq={'fowner', 0x3d, 0xee01}}, {@hash='hash'}]}) ioctl$BTRFS_IOC_SUBVOL_SETFLAGS(r4, 0x4008941a, &(0x7f0000000980)=0xfe33b054cbbc4d79) 11:25:25 executing program 3: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x7f, 0x80000000008001}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x9}, 0x0) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000080)) r1 = open(&(0x7f0000000240)='./file1\x00', 0x141142, 0x0) write$UHID_INPUT(r1, &(0x7f0000001440)={0x8, {'\x00g\x00'}}, 0xfffffc41) open(&(0x7f00000001c0)='./file1\x00', 0x0, 0x0) setxattr$trusted_overlay_nlink(&(0x7f0000000000)='./file1\x00', &(0x7f00000000c0)='trusted.overlay.nlink\x00', 0x0, 0x0, 0x0) 11:25:25 executing program 0: r0 = perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x5c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write$binfmt_elf64(r0, &(0x7f0000000540)=ANY=[@ANYBLOB], 0x2c4) r1 = inotify_init() openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) epoll_ctl$EPOLL_CTL_DEL(0xffffffffffffffff, 0x2, 0xffffffffffffffff) inotify_add_watch(r1, &(0x7f0000000000)='.\x00', 0x400017e) r2 = openat$incfs(0xffffffffffffffff, &(0x7f0000000080)='.log\x00', 0x20200, 0x40) fcntl$getownex(r2, 0x10, &(0x7f00000000c0)) r3 = open(&(0x7f0000000040)='./file0\x00', 0x200c2, 0x0) write$binfmt_elf64(r3, &(0x7f0000000080)=ANY=[], 0x8) sendfile(r3, r3, &(0x7f00000001c0), 0xa198) dup(0xffffffffffffffff) r4 = syz_mount_image$gfs2meta(&(0x7f0000000140)='gfs2meta\x00', &(0x7f0000000200)='./file0\x00', 0x1000, 0x4, &(0x7f0000000880)=[{&(0x7f0000000240)="77ba0daae1b2e74ecd52c59a85bf6f4b1f0b01ab07ba92bc6e57305406115f2bc3e4dd94f19ed896c4fccd34271e9dc3499af9298dbc709e0e6a513d61391d4b198af5f55d24239ae934e8babb8d1cb67bb17b0158", 0x55, 0x3}, {&(0x7f00000002c0)="ae227f954d229f666a6cd22938585e852071e55aa5728addcd315922bf32282e077bdbc63cd5ec89626ee2f8e7982ca239eaa758231056cdca22ca27428407f6c64c384665cfbd00ee6e0d7609f2c7ba0f28b4af70d0307ef78decfe42973915cd509de7c19ea0f3f5c3caaab05f9af08e2cc82d2c14b919dd045e3d36ce1c5d0ff23aed0a4a6ef508b5e71df0a25250d47f1e033ed503b6df99c189111b75b59df679cb75240b756cafecfd203568eeb2c1708fe9f11a2cb0f288590ec76cefbde09c90e9d568492aa5f41196397b70c869838c7164f2bad8eff017d021d7d41c9025c20b", 0xe5, 0x3}, {&(0x7f00000003c0)="792eb6eec33e561f18dc4b58b6a6fb3c7e6fd5e612c08490216ae02617f9811945929cffbf59727393a9a69d57b00a5cd08da3888884b8361d6a4003a54480c1086a5fc876582ff049ede86e2f58d80c7b6cf618e1ba36d4710887bc34ef2b7abbc686df2185f99998060bf492b84e3a02077e2aaf014e1186fde602d2b639d467f48fc2e18cf1553e07ac39040953566ab1d21aac627b16682537", 0x9b, 0x100000000}, {0x0, 0x0, 0x7}], 0x21008, &(0x7f0000000900)={[{'.log\x00'}, {'-%('}, {'.log\x00'}], [{@obj_user={'obj_user'}}, {@appraise_type='appraise_type=imasig'}, {@fowner_eq={'fowner', 0x3d, 0xee01}}, {@hash='hash'}, {@subj_type={'subj_type', 0x3d, '-&'}}]}) ioctl$BTRFS_IOC_SUBVOL_SETFLAGS(r4, 0x4008941a, &(0x7f0000000980)=0xfe33b054cbbc4d79) [ 591.313331][ T35] audit: type=1804 audit(1612178725.041:2409): pid=28250 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.3" name="/root/syzkaller-testdir548988167/syzkaller.gb8agU/425/file1" dev="sda1" ino=15958 res=1 errno=0 [ 591.423308][ T35] audit: type=1804 audit(1612178725.251:2410): pid=28254 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.3" name="/root/syzkaller-testdir548988167/syzkaller.gb8agU/425/file1" dev="sda1" ino=15958 res=1 errno=0 [ 591.528014][T28290] loop0: detected capacity change from 264192 to 0 [ 591.588587][ T35] audit: type=1804 audit(1612178725.491:2411): pid=28267 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.2" name="/root/syzkaller-testdir245532710/syzkaller.d2c0aK/439/file1" dev="sda1" ino=15783 res=1 errno=0 11:25:25 executing program 2: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x7f, 0x80000000008001}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x9}, 0x0) r1 = open(&(0x7f0000000240)='./file1\x00', 0x141142, 0x0) write$UHID_INPUT(r1, &(0x7f0000001440)={0x8, {'\x00l\x00'}}, 0xfffffc41) open(&(0x7f00000001c0)='./file1\x00', 0x0, 0x0) setxattr$trusted_overlay_nlink(&(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x0, 0x0) [ 591.687443][ T35] audit: type=1804 audit(1612178725.491:2412): pid=28282 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.2" name="/root/syzkaller-testdir245532710/syzkaller.d2c0aK/439/file1" dev="sda1" ino=15783 res=1 errno=0 [ 591.804226][ T35] audit: type=1804 audit(1612178725.491:2413): pid=28270 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor.2" name="/root/syzkaller-testdir245532710/syzkaller.d2c0aK/439/file1" dev="sda1" ino=15783 res=1 errno=0 11:25:26 executing program 4: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x0, 0x80000000008001}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x9}, 0x0) r1 = open(&(0x7f0000000240)='./file1\x00', 0x141142, 0x0) write$UHID_INPUT(r1, &(0x7f0000001440), 0xfffffc41) open(&(0x7f00000001c0)='./file1\x00', 0x0, 0xfffffff6) setxattr$trusted_overlay_nlink(&(0x7f0000000000)='./file1\x00', &(0x7f00000000c0)='trusted.overlay.nlink\x00', 0x0, 0x0, 0x0) 11:25:26 executing program 1: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x7f, 0x80000000008001}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x9}, 0x0) r1 = open(&(0x7f0000000240)='./file1\x00', 0x141142, 0x0) write$UHID_INPUT(r1, &(0x7f0000001440), 0xfffffc41) open(&(0x7f00000001c0)='./file1\x00', 0x0, 0x3f00000000000000) setxattr$trusted_overlay_nlink(&(0x7f0000000000)='./file1\x00', &(0x7f00000000c0)='trusted.overlay.nlink\x00', 0x0, 0x0, 0x0) 11:25:26 executing program 5: write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000540)=ANY=[@ANYBLOB="7f454c4601061f000400000000000000030038000800000032000000000000004000000000000000560200000000000007000000008038000100090002000100010000000100000006000000000000000400000000000000060000000000000001040000000000000200000000000000010000000000000051e574640400000001000000000000000400000000000000050000000000000005000000000000000400000000000000ff24444700000000908bc001727fbcd44f4d3bf922995edf2fd379eb00"/489], 0x2c4) r0 = inotify_init() r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) epoll_ctl$EPOLL_CTL_DEL(0xffffffffffffffff, 0x2, r1) inotify_add_watch(r0, &(0x7f0000000000)='.\x00', 0x400017e) r2 = openat$incfs(0xffffffffffffffff, &(0x7f0000000080)='.log\x00', 0x0, 0x0) fcntl$getownex(r2, 0x10, &(0x7f00000000c0)) r3 = open(&(0x7f0000000040)='./file0\x00', 0x200c2, 0x0) write$binfmt_elf64(r3, &(0x7f0000000080)=ANY=[], 0x8) sendfile(r3, r3, &(0x7f00000001c0), 0xa198) dup(0xffffffffffffffff) r4 = syz_mount_image$gfs2meta(&(0x7f0000000140)='gfs2meta\x00', &(0x7f0000000200)='./file0\x00', 0x1000, 0x0, 0x0, 0x0, &(0x7f0000000900)={[{'.log\x00'}, {'-%('}, {'.log\x00'}], [{@appraise_type='appraise_type=imasig'}, {@fowner_eq={'fowner', 0x3d, 0xee01}}, {@hash='hash'}]}) ioctl$BTRFS_IOC_SUBVOL_SETFLAGS(r4, 0x4008941a, &(0x7f0000000980)=0xfe33b054cbbc4d79) 11:25:26 executing program 0: r0 = perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x5c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write$binfmt_elf64(r0, &(0x7f0000000540)=ANY=[@ANYBLOB], 0x2c4) r1 = inotify_init() openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) epoll_ctl$EPOLL_CTL_DEL(0xffffffffffffffff, 0x2, 0xffffffffffffffff) inotify_add_watch(r1, &(0x7f0000000000)='.\x00', 0x400017e) r2 = openat$incfs(0xffffffffffffffff, &(0x7f0000000080)='.log\x00', 0x20200, 0x40) fcntl$getownex(r2, 0x10, &(0x7f00000000c0)) r3 = open(&(0x7f0000000040)='./file0\x00', 0x200c2, 0x0) write$binfmt_elf64(r3, &(0x7f0000000080)=ANY=[], 0x8) sendfile(r3, r3, &(0x7f00000001c0), 0xa198) dup(0xffffffffffffffff) r4 = syz_mount_image$gfs2meta(&(0x7f0000000140)='gfs2meta\x00', &(0x7f0000000200)='./file0\x00', 0x1000, 0x4, &(0x7f0000000880)=[{&(0x7f0000000240)="77ba0daae1b2e74ecd52c59a85bf6f4b1f0b01ab07ba92bc6e57305406115f2bc3e4dd94f19ed896c4fccd34271e9dc3499af9298dbc709e0e6a513d61391d4b198af5f55d24239ae934e8babb8d1cb67bb17b0158", 0x55, 0x3}, {&(0x7f00000002c0)="ae227f954d229f666a6cd22938585e852071e55aa5728addcd315922bf32282e077bdbc63cd5ec89626ee2f8e7982ca239eaa758231056cdca22ca27428407f6c64c384665cfbd00ee6e0d7609f2c7ba0f28b4af70d0307ef78decfe42973915cd509de7c19ea0f3f5c3caaab05f9af08e2cc82d2c14b919dd045e3d36ce1c5d0ff23aed0a4a6ef508b5e71df0a25250d47f1e033ed503b6df99c189111b75b59df679cb75240b756cafecfd203568eeb2c1708fe9f11a2cb0f288590ec76cefbde09c90e9d568492aa5f41196397b70c869838c7164f2bad8eff017d021d7d41c9025c20b", 0xe5, 0x3}, {&(0x7f00000003c0)="792eb6eec33e561f18dc4b58b6a6fb3c7e6fd5e612c08490216ae02617f9811945929cffbf59727393a9a69d57b00a5cd08da3888884b8361d6a4003a54480c1086a5fc876582ff049ede86e2f58d80c7b6cf618e1ba36d4710887bc34ef2b7abbc686df2185f99998060bf492b84e3a02077e2aaf014e1186fde602d2b639d467f48fc2e18cf1553e07ac39040953566ab1d21aac627b166825375377bc3332b62160ea8bf7fc3196b3", 0xaa, 0x100000000}, {0x0, 0x0, 0x7}], 0x21008, &(0x7f0000000900)={[{'.log\x00'}, {'-%('}, {'.log\x00'}], [{@obj_user={'obj_user'}}, {@appraise_type='appraise_type=imasig'}, {@fowner_eq={'fowner', 0x3d, 0xee01}}, {@hash='hash'}, {@subj_type={'subj_type', 0x3d, '-&'}}]}) ioctl$BTRFS_IOC_SUBVOL_SETFLAGS(r4, 0x4008941a, &(0x7f0000000980)=0xfe33b054cbbc4d79) [ 592.482420][T28327] loop0: detected capacity change from 264192 to 0 11:25:26 executing program 3: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x7f, 0x80000000008001}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x9}, 0x0) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000080)) r1 = open(&(0x7f0000000240)='./file1\x00', 0x141142, 0x0) write$UHID_INPUT(r1, &(0x7f0000001440)={0x8, {'\x00h\x00'}}, 0xfffffc41) open(&(0x7f00000001c0)='./file1\x00', 0x0, 0x0) setxattr$trusted_overlay_nlink(&(0x7f0000000000)='./file1\x00', &(0x7f00000000c0)='trusted.overlay.nlink\x00', 0x0, 0x0, 0x0) 11:25:26 executing program 2: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x7f, 0x80000000008001}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x9}, 0x0) r1 = open(&(0x7f0000000240)='./file1\x00', 0x141142, 0x0) write$UHID_INPUT(r1, &(0x7f0000001440)={0x8, {'\x00m\x00'}}, 0xfffffc41) open(&(0x7f00000001c0)='./file1\x00', 0x0, 0x0) setxattr$trusted_overlay_nlink(&(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x0, 0x0) 11:25:27 executing program 5: write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000540)=ANY=[@ANYBLOB="7f454c4601061f000400000000000000030038000800000032000000000000004000000000000000560200000000000007000000008038000100090002000100010000000100000006000000000000000400000000000000060000000000000001040000000000000200000000000000010000000000000051e574640400000001000000000000000400000000000000050000000000000005000000000000000400000000000000ff24444700000000908bc001727fbcd44f4d3bf922995edf2fd379eb00"/489], 0x2c4) r0 = inotify_init() r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) epoll_ctl$EPOLL_CTL_DEL(0xffffffffffffffff, 0x2, r1) inotify_add_watch(r0, &(0x7f0000000000)='.\x00', 0x400017e) r2 = openat$incfs(0xffffffffffffffff, &(0x7f0000000080)='.log\x00', 0x0, 0x0) fcntl$getownex(r2, 0x10, &(0x7f00000000c0)) r3 = open(&(0x7f0000000040)='./file0\x00', 0x200c2, 0x0) write$binfmt_elf64(r3, &(0x7f0000000080)=ANY=[], 0x8) sendfile(r3, r3, &(0x7f00000001c0), 0xa198) dup(0xffffffffffffffff) r4 = syz_mount_image$gfs2meta(&(0x7f0000000140)='gfs2meta\x00', &(0x7f0000000200)='./file0\x00', 0x1000, 0x0, 0x0, 0x0, &(0x7f0000000900)={[{'.log\x00'}, {'-%('}, {'.log\x00'}], [{@appraise_type='appraise_type=imasig'}, {@fowner_eq={'fowner', 0x3d, 0xee01}}, {@subj_type={'subj_type', 0x3d, '-&'}}]}) ioctl$BTRFS_IOC_SUBVOL_SETFLAGS(r4, 0x4008941a, &(0x7f0000000980)=0xfe33b054cbbc4d79) 11:25:27 executing program 1: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x7f, 0x80000000008001}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x9}, 0x0) r1 = open(&(0x7f0000000240)='./file1\x00', 0x141142, 0x0) write$UHID_INPUT(r1, &(0x7f0000001440), 0xfffffc41) open(&(0x7f00000001c0)='./file1\x00', 0x0, 0x4000000000000000) setxattr$trusted_overlay_nlink(&(0x7f0000000000)='./file1\x00', &(0x7f00000000c0)='trusted.overlay.nlink\x00', 0x0, 0x0, 0x0) 11:25:27 executing program 0: r0 = perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x5c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write$binfmt_elf64(r0, &(0x7f0000000540)=ANY=[@ANYBLOB], 0x2c4) r1 = inotify_init() openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) epoll_ctl$EPOLL_CTL_DEL(0xffffffffffffffff, 0x2, 0xffffffffffffffff) inotify_add_watch(r1, &(0x7f0000000000)='.\x00', 0x400017e) r2 = openat$incfs(0xffffffffffffffff, &(0x7f0000000080)='.log\x00', 0x20200, 0x40) fcntl$getownex(r2, 0x10, &(0x7f00000000c0)) r3 = open(&(0x7f0000000040)='./file0\x00', 0x200c2, 0x0) write$binfmt_elf64(r3, &(0x7f0000000080)=ANY=[], 0x8) sendfile(r3, r3, &(0x7f00000001c0), 0xa198) dup(0xffffffffffffffff) r4 = syz_mount_image$gfs2meta(&(0x7f0000000140)='gfs2meta\x00', &(0x7f0000000200)='./file0\x00', 0x1000, 0x4, &(0x7f0000000880)=[{&(0x7f0000000240)="77ba0daae1b2e74ecd52c59a85bf6f4b1f0b01ab07ba92bc6e57305406115f2bc3e4dd94f19ed896c4fccd34271e9dc3499af9298dbc709e0e6a513d61391d4b198af5f55d24239ae934e8babb8d1cb67bb17b0158", 0x55, 0x3}, {&(0x7f00000002c0)="ae227f954d229f666a6cd22938585e852071e55aa5728addcd315922bf32282e077bdbc63cd5ec89626ee2f8e7982ca239eaa758231056cdca22ca27428407f6c64c384665cfbd00ee6e0d7609f2c7ba0f28b4af70d0307ef78decfe42973915cd509de7c19ea0f3f5c3caaab05f9af08e2cc82d2c14b919dd045e3d36ce1c5d0ff23aed0a4a6ef508b5e71df0a25250d47f1e033ed503b6df99c189111b75b59df679cb75240b756cafecfd203568eeb2c1708fe9f11a2cb0f288590ec76cefbde09c90e9d568492aa5f41196397b70c869838c7164f2bad8eff017d021d7d41c9025c20b", 0xe5, 0x3}, {&(0x7f00000003c0)="792eb6eec33e561f18dc4b58b6a6fb3c7e6fd5e612c08490216ae02617f9811945929cffbf59727393a9a69d57b00a5cd08da3888884b8361d6a4003a54480c1086a5fc876582ff049ede86e2f58d80c7b6cf618e1ba36d4710887bc34ef2b7abbc686df2185f99998060bf492b84e3a02077e2aaf014e1186fde602d2b639d467f48fc2e18cf1553e07ac39040953566ab1d21aac627b166825375377bc3332b62160ea8bf7fc3196b3", 0xaa, 0x100000000}, {0x0, 0x0, 0x7}], 0x21008, &(0x7f0000000900)={[{'.log\x00'}, {'-%('}, {'.log\x00'}], [{@obj_user={'obj_user'}}, {@appraise_type='appraise_type=imasig'}, {@fowner_eq={'fowner', 0x3d, 0xee01}}, {@hash='hash'}, {@subj_type={'subj_type', 0x3d, '-&'}}]}) ioctl$BTRFS_IOC_SUBVOL_SETFLAGS(r4, 0x4008941a, &(0x7f0000000980)=0xfe33b054cbbc4d79) 11:25:27 executing program 4: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x7f}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x9}, 0x0) r1 = open(&(0x7f0000000240)='./file1\x00', 0x141142, 0x0) write$UHID_INPUT(r1, &(0x7f0000001440), 0xfffffc41) open(&(0x7f00000001c0)='./file1\x00', 0x0, 0xfffffff6) setxattr$trusted_overlay_nlink(&(0x7f0000000000)='./file1\x00', &(0x7f00000000c0)='trusted.overlay.nlink\x00', 0x0, 0x0, 0x0) [ 593.383720][T28353] loop0: detected capacity change from 264192 to 0 11:25:27 executing program 3: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x7f, 0x80000000008001}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x9}, 0x0) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000080)) r1 = open(&(0x7f0000000240)='./file1\x00', 0x141142, 0x0) write$UHID_INPUT(r1, &(0x7f0000001440)={0x8, {'\x00i\x00'}}, 0xfffffc41) open(&(0x7f00000001c0)='./file1\x00', 0x0, 0x0) setxattr$trusted_overlay_nlink(&(0x7f0000000000)='./file1\x00', &(0x7f00000000c0)='trusted.overlay.nlink\x00', 0x0, 0x0, 0x0) 11:25:28 executing program 2: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x7f, 0x80000000008001}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x9}, 0x0) r1 = open(&(0x7f0000000240)='./file1\x00', 0x141142, 0x0) write$UHID_INPUT(r1, &(0x7f0000001440)={0x8, {'\x00n\x00'}}, 0xfffffc41) open(&(0x7f00000001c0)='./file1\x00', 0x0, 0x0) setxattr$trusted_overlay_nlink(&(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x0, 0x0) 11:25:28 executing program 5: write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000540)=ANY=[@ANYBLOB="7f454c4601061f000400000000000000030038000800000032000000000000004000000000000000560200000000000007000000008038000100090002000100010000000100000006000000000000000400000000000000060000000000000001040000000000000200000000000000010000000000000051e574640400000001000000000000000400000000000000050000000000000005000000000000000400000000000000ff24444700000000908bc001727fbcd44f4d3bf922995edf2fd379eb00"/489], 0x2c4) r0 = inotify_init() r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) epoll_ctl$EPOLL_CTL_DEL(0xffffffffffffffff, 0x2, r1) inotify_add_watch(r0, &(0x7f0000000000)='.\x00', 0x400017e) r2 = openat$incfs(0xffffffffffffffff, &(0x7f0000000080)='.log\x00', 0x0, 0x0) fcntl$getownex(r2, 0x10, &(0x7f00000000c0)) r3 = open(&(0x7f0000000040)='./file0\x00', 0x200c2, 0x0) write$binfmt_elf64(r3, &(0x7f0000000080)=ANY=[], 0x8) sendfile(r3, r3, &(0x7f00000001c0), 0xa198) dup(0xffffffffffffffff) r4 = syz_mount_image$gfs2meta(&(0x7f0000000140)='gfs2meta\x00', &(0x7f0000000200)='./file0\x00', 0x1000, 0x0, 0x0, 0x0, &(0x7f0000000900)={[{'.log\x00'}, {'-%('}, {'.log\x00'}], [{@appraise_type='appraise_type=imasig'}, {@fowner_eq={'fowner', 0x3d, 0xee01}}, {@subj_type={'subj_type', 0x3d, '-&'}}]}) ioctl$BTRFS_IOC_SUBVOL_SETFLAGS(r4, 0x4008941a, &(0x7f0000000980)=0xfe33b054cbbc4d79) 11:25:28 executing program 0: r0 = perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x5c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write$binfmt_elf64(r0, &(0x7f0000000540)=ANY=[@ANYBLOB], 0x2c4) r1 = inotify_init() openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) epoll_ctl$EPOLL_CTL_DEL(0xffffffffffffffff, 0x2, 0xffffffffffffffff) inotify_add_watch(r1, &(0x7f0000000000)='.\x00', 0x400017e) r2 = openat$incfs(0xffffffffffffffff, &(0x7f0000000080)='.log\x00', 0x20200, 0x40) fcntl$getownex(r2, 0x10, &(0x7f00000000c0)) r3 = open(&(0x7f0000000040)='./file0\x00', 0x200c2, 0x0) write$binfmt_elf64(r3, &(0x7f0000000080)=ANY=[], 0x8) sendfile(r3, r3, &(0x7f00000001c0), 0xa198) dup(0xffffffffffffffff) r4 = syz_mount_image$gfs2meta(&(0x7f0000000140)='gfs2meta\x00', &(0x7f0000000200)='./file0\x00', 0x1000, 0x4, &(0x7f0000000880)=[{&(0x7f0000000240)="77ba0daae1b2e74ecd52c59a85bf6f4b1f0b01ab07ba92bc6e57305406115f2bc3e4dd94f19ed896c4fccd34271e9dc3499af9298dbc709e0e6a513d61391d4b198af5f55d24239ae934e8babb8d1cb67bb17b0158", 0x55, 0x3}, {&(0x7f00000002c0)="ae227f954d229f666a6cd22938585e852071e55aa5728addcd315922bf32282e077bdbc63cd5ec89626ee2f8e7982ca239eaa758231056cdca22ca27428407f6c64c384665cfbd00ee6e0d7609f2c7ba0f28b4af70d0307ef78decfe42973915cd509de7c19ea0f3f5c3caaab05f9af08e2cc82d2c14b919dd045e3d36ce1c5d0ff23aed0a4a6ef508b5e71df0a25250d47f1e033ed503b6df99c189111b75b59df679cb75240b756cafecfd203568eeb2c1708fe9f11a2cb0f288590ec76cefbde09c90e9d568492aa5f41196397b70c869838c7164f2bad8eff017d021d7d41c9025c20b", 0xe5, 0x3}, {&(0x7f00000003c0)="792eb6eec33e561f18dc4b58b6a6fb3c7e6fd5e612c08490216ae02617f9811945929cffbf59727393a9a69d57b00a5cd08da3888884b8361d6a4003a54480c1086a5fc876582ff049ede86e2f58d80c7b6cf618e1ba36d4710887bc34ef2b7abbc686df2185f99998060bf492b84e3a02077e2aaf014e1186fde602d2b639d467f48fc2e18cf1553e07ac39040953566ab1d21aac627b166825375377bc3332b62160ea8bf7fc3196b3", 0xaa, 0x100000000}, {0x0, 0x0, 0x7}], 0x21008, &(0x7f0000000900)={[{'.log\x00'}, {'-%('}, {'.log\x00'}], [{@obj_user={'obj_user'}}, {@appraise_type='appraise_type=imasig'}, {@fowner_eq={'fowner', 0x3d, 0xee01}}, {@hash='hash'}, {@subj_type={'subj_type', 0x3d, '-&'}}]}) ioctl$BTRFS_IOC_SUBVOL_SETFLAGS(r4, 0x4008941a, &(0x7f0000000980)=0xfe33b054cbbc4d79) 11:25:28 executing program 1: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x7f, 0x80000000008001}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x9}, 0x0) r1 = open(&(0x7f0000000240)='./file1\x00', 0x141142, 0x0) write$UHID_INPUT(r1, &(0x7f0000001440), 0xfffffc41) open(&(0x7f00000001c0)='./file1\x00', 0x0, 0x4800000000000000) setxattr$trusted_overlay_nlink(&(0x7f0000000000)='./file1\x00', &(0x7f00000000c0)='trusted.overlay.nlink\x00', 0x0, 0x0, 0x0) [ 594.337923][T28387] loop0: detected capacity change from 264192 to 0 11:25:28 executing program 4: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x7f}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x9}, 0x0) r1 = open(&(0x7f0000000240)='./file1\x00', 0x141142, 0x0) write$UHID_INPUT(r1, &(0x7f0000001440), 0xfffffc41) open(&(0x7f00000001c0)='./file1\x00', 0x0, 0xfffffff6) setxattr$trusted_overlay_nlink(&(0x7f0000000000)='./file1\x00', &(0x7f00000000c0)='trusted.overlay.nlink\x00', 0x0, 0x0, 0x0) 11:25:28 executing program 3: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x7f, 0x80000000008001}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x9}, 0x0) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000080)) r1 = open(&(0x7f0000000240)='./file1\x00', 0x141142, 0x0) write$UHID_INPUT(r1, &(0x7f0000001440)={0x8, {'\x00j\x00'}}, 0xfffffc41) open(&(0x7f00000001c0)='./file1\x00', 0x0, 0x0) setxattr$trusted_overlay_nlink(&(0x7f0000000000)='./file1\x00', &(0x7f00000000c0)='trusted.overlay.nlink\x00', 0x0, 0x0, 0x0) 11:25:29 executing program 2: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x7f, 0x80000000008001}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x9}, 0x0) r1 = open(&(0x7f0000000240)='./file1\x00', 0x141142, 0x0) write$UHID_INPUT(r1, &(0x7f0000001440)={0x8, {'\x00o\x00'}}, 0xfffffc41) open(&(0x7f00000001c0)='./file1\x00', 0x0, 0x0) setxattr$trusted_overlay_nlink(&(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x0, 0x0) 11:25:29 executing program 5: write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000540)=ANY=[@ANYBLOB="7f454c4601061f000400000000000000030038000800000032000000000000004000000000000000560200000000000007000000008038000100090002000100010000000100000006000000000000000400000000000000060000000000000001040000000000000200000000000000010000000000000051e574640400000001000000000000000400000000000000050000000000000005000000000000000400000000000000ff24444700000000908bc001727fbcd44f4d3bf922995edf2fd379eb00"/489], 0x2c4) r0 = inotify_init() r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) epoll_ctl$EPOLL_CTL_DEL(0xffffffffffffffff, 0x2, r1) inotify_add_watch(r0, &(0x7f0000000000)='.\x00', 0x400017e) r2 = openat$incfs(0xffffffffffffffff, &(0x7f0000000080)='.log\x00', 0x0, 0x0) fcntl$getownex(r2, 0x10, &(0x7f00000000c0)) r3 = open(&(0x7f0000000040)='./file0\x00', 0x200c2, 0x0) write$binfmt_elf64(r3, &(0x7f0000000080)=ANY=[], 0x8) sendfile(r3, r3, &(0x7f00000001c0), 0xa198) dup(0xffffffffffffffff) r4 = syz_mount_image$gfs2meta(&(0x7f0000000140)='gfs2meta\x00', &(0x7f0000000200)='./file0\x00', 0x1000, 0x0, 0x0, 0x0, &(0x7f0000000900)={[{'.log\x00'}, {'-%('}, {'.log\x00'}], [{@appraise_type='appraise_type=imasig'}, {@fowner_eq={'fowner', 0x3d, 0xee01}}, {@subj_type={'subj_type', 0x3d, '-&'}}]}) ioctl$BTRFS_IOC_SUBVOL_SETFLAGS(r4, 0x4008941a, &(0x7f0000000980)=0xfe33b054cbbc4d79) 11:25:29 executing program 0: r0 = perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x5c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write$binfmt_elf64(r0, &(0x7f0000000540)=ANY=[@ANYBLOB], 0x2c4) r1 = inotify_init() openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) epoll_ctl$EPOLL_CTL_DEL(0xffffffffffffffff, 0x2, 0xffffffffffffffff) inotify_add_watch(r1, &(0x7f0000000000)='.\x00', 0x400017e) r2 = openat$incfs(0xffffffffffffffff, &(0x7f0000000080)='.log\x00', 0x20200, 0x40) fcntl$getownex(r2, 0x10, &(0x7f00000000c0)) r3 = open(&(0x7f0000000040)='./file0\x00', 0x200c2, 0x0) write$binfmt_elf64(r3, &(0x7f0000000080)=ANY=[], 0x8) sendfile(r3, r3, &(0x7f00000001c0), 0xa198) dup(0xffffffffffffffff) r4 = syz_mount_image$gfs2meta(&(0x7f0000000140)='gfs2meta\x00', &(0x7f0000000200)='./file0\x00', 0x1000, 0x4, &(0x7f0000000880)=[{&(0x7f0000000240)="77ba0daae1b2e74ecd52c59a85bf6f4b1f0b01ab07ba92bc6e57305406115f2bc3e4dd94f19ed896c4fccd34271e9dc3499af9298dbc709e0e6a513d61391d4b198af5f55d24239ae934e8babb8d1cb67bb17b0158", 0x55, 0x3}, {&(0x7f00000002c0)="ae227f954d229f666a6cd22938585e852071e55aa5728addcd315922bf32282e077bdbc63cd5ec89626ee2f8e7982ca239eaa758231056cdca22ca27428407f6c64c384665cfbd00ee6e0d7609f2c7ba0f28b4af70d0307ef78decfe42973915cd509de7c19ea0f3f5c3caaab05f9af08e2cc82d2c14b919dd045e3d36ce1c5d0ff23aed0a4a6ef508b5e71df0a25250d47f1e033ed503b6df99c189111b75b59df679cb75240b756cafecfd203568eeb2c1708fe9f11a2cb0f288590ec76cefbde09c90e9d568492aa5f41196397b70c869838c7164f2bad8eff017d021d7d41c9025c20b", 0xe5, 0x3}, {&(0x7f00000003c0)="792eb6eec33e561f18dc4b58b6a6fb3c7e6fd5e612c08490216ae02617f9811945929cffbf59727393a9a69d57b00a5cd08da3888884b8361d6a4003a54480c1086a5fc876582ff049ede86e2f58d80c7b6cf618e1ba36d4710887bc34ef2b7abbc686df2185f99998060bf492b84e3a02077e2aaf014e1186fde602d2b639d467f48fc2e18cf1553e07ac39040953566ab1d21aac627b166825375377bc3332b62160ea8bf7fc3196b30965dce6181bf7a1", 0xb2, 0x100000000}, {0x0, 0x0, 0x7}], 0x21008, &(0x7f0000000900)={[{'.log\x00'}, {'-%('}, {'.log\x00'}], [{@obj_user={'obj_user'}}, {@appraise_type='appraise_type=imasig'}, {@fowner_eq={'fowner', 0x3d, 0xee01}}, {@hash='hash'}, {@subj_type={'subj_type', 0x3d, '-&'}}]}) ioctl$BTRFS_IOC_SUBVOL_SETFLAGS(r4, 0x4008941a, &(0x7f0000000980)=0xfe33b054cbbc4d79) [ 595.244604][T28418] loop0: detected capacity change from 264192 to 0 11:25:29 executing program 4: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x7f}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x9}, 0x0) r1 = open(&(0x7f0000000240)='./file1\x00', 0x141142, 0x0) write$UHID_INPUT(r1, &(0x7f0000001440), 0xfffffc41) open(&(0x7f00000001c0)='./file1\x00', 0x0, 0xfffffff6) setxattr$trusted_overlay_nlink(&(0x7f0000000000)='./file1\x00', &(0x7f00000000c0)='trusted.overlay.nlink\x00', 0x0, 0x0, 0x0) 11:25:29 executing program 1: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x7f, 0x80000000008001}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x9}, 0x0) r1 = open(&(0x7f0000000240)='./file1\x00', 0x141142, 0x0) write$UHID_INPUT(r1, &(0x7f0000001440), 0xfffffc41) open(&(0x7f00000001c0)='./file1\x00', 0x0, 0x4c00000000000000) setxattr$trusted_overlay_nlink(&(0x7f0000000000)='./file1\x00', &(0x7f00000000c0)='trusted.overlay.nlink\x00', 0x0, 0x0, 0x0) [ 595.776172][ T35] kauditd_printk_skb: 30 callbacks suppressed [ 595.776183][ T35] audit: type=1804 audit(1612178729.851:2444): pid=28409 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.3" name="/root/syzkaller-testdir548988167/syzkaller.gb8agU/429/file1" dev="sda1" ino=15771 res=1 errno=0 11:25:30 executing program 5: write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000540)=ANY=[@ANYBLOB="7f454c4601061f000400000000000000030038000800000032000000000000004000000000000000560200000000000007000000008038000100090002000100010000000100000006000000000000000400000000000000060000000000000001040000000000000200000000000000010000000000000051e574640400000001000000000000000400000000000000050000000000000005000000000000000400000000000000ff24444700000000908bc001727fbcd44f4d3bf922995edf2fd379eb00"/489], 0x2c4) r0 = inotify_init() r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) epoll_ctl$EPOLL_CTL_DEL(0xffffffffffffffff, 0x2, r1) inotify_add_watch(r0, &(0x7f0000000000)='.\x00', 0x400017e) r2 = openat$incfs(0xffffffffffffffff, &(0x7f0000000080)='.log\x00', 0x0, 0x0) fcntl$getownex(r2, 0x10, &(0x7f00000000c0)) r3 = open(&(0x7f0000000040)='./file0\x00', 0x200c2, 0x0) write$binfmt_elf64(r3, &(0x7f0000000080)=ANY=[], 0x8) sendfile(r3, r3, &(0x7f00000001c0), 0xa198) dup(0xffffffffffffffff) r4 = syz_mount_image$gfs2meta(&(0x7f0000000140)='gfs2meta\x00', &(0x7f0000000200)='./file0\x00', 0x1000, 0x0, 0x0, 0x0, &(0x7f0000000900)={[{'.log\x00'}, {'-%('}, {'.log\x00'}], [{@appraise_type='appraise_type=imasig'}, {@hash='hash'}, {@subj_type={'subj_type', 0x3d, '-&'}}]}) ioctl$BTRFS_IOC_SUBVOL_SETFLAGS(r4, 0x4008941a, &(0x7f0000000980)=0xfe33b054cbbc4d79) 11:25:30 executing program 0: r0 = perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x5c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write$binfmt_elf64(r0, &(0x7f0000000540)=ANY=[@ANYBLOB], 0x2c4) r1 = inotify_init() openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) epoll_ctl$EPOLL_CTL_DEL(0xffffffffffffffff, 0x2, 0xffffffffffffffff) inotify_add_watch(r1, &(0x7f0000000000)='.\x00', 0x400017e) r2 = openat$incfs(0xffffffffffffffff, &(0x7f0000000080)='.log\x00', 0x20200, 0x40) fcntl$getownex(r2, 0x10, &(0x7f00000000c0)) r3 = open(&(0x7f0000000040)='./file0\x00', 0x200c2, 0x0) write$binfmt_elf64(r3, &(0x7f0000000080)=ANY=[], 0x8) sendfile(r3, r3, &(0x7f00000001c0), 0xa198) dup(0xffffffffffffffff) r4 = syz_mount_image$gfs2meta(&(0x7f0000000140)='gfs2meta\x00', &(0x7f0000000200)='./file0\x00', 0x1000, 0x4, &(0x7f0000000880)=[{&(0x7f0000000240)="77ba0daae1b2e74ecd52c59a85bf6f4b1f0b01ab07ba92bc6e57305406115f2bc3e4dd94f19ed896c4fccd34271e9dc3499af9298dbc709e0e6a513d61391d4b198af5f55d24239ae934e8babb8d1cb67bb17b0158", 0x55, 0x3}, {&(0x7f00000002c0)="ae227f954d229f666a6cd22938585e852071e55aa5728addcd315922bf32282e077bdbc63cd5ec89626ee2f8e7982ca239eaa758231056cdca22ca27428407f6c64c384665cfbd00ee6e0d7609f2c7ba0f28b4af70d0307ef78decfe42973915cd509de7c19ea0f3f5c3caaab05f9af08e2cc82d2c14b919dd045e3d36ce1c5d0ff23aed0a4a6ef508b5e71df0a25250d47f1e033ed503b6df99c189111b75b59df679cb75240b756cafecfd203568eeb2c1708fe9f11a2cb0f288590ec76cefbde09c90e9d568492aa5f41196397b70c869838c7164f2bad8eff017d021d7d41c9025c20b", 0xe5, 0x3}, {&(0x7f00000003c0)="792eb6eec33e561f18dc4b58b6a6fb3c7e6fd5e612c08490216ae02617f9811945929cffbf59727393a9a69d57b00a5cd08da3888884b8361d6a4003a54480c1086a5fc876582ff049ede86e2f58d80c7b6cf618e1ba36d4710887bc34ef2b7abbc686df2185f99998060bf492b84e3a02077e2aaf014e1186fde602d2b639d467f48fc2e18cf1553e07ac39040953566ab1d21aac627b166825375377bc3332b62160ea8bf7fc3196b30965dce6181bf7a1", 0xb2, 0x100000000}, {0x0, 0x0, 0x7}], 0x21008, &(0x7f0000000900)={[{'.log\x00'}, {'-%('}, {'.log\x00'}], [{@obj_user={'obj_user'}}, {@appraise_type='appraise_type=imasig'}, {@fowner_eq={'fowner', 0x3d, 0xee01}}, {@hash='hash'}, {@subj_type={'subj_type', 0x3d, '-&'}}]}) ioctl$BTRFS_IOC_SUBVOL_SETFLAGS(r4, 0x4008941a, &(0x7f0000000980)=0xfe33b054cbbc4d79) [ 595.979085][ T35] audit: type=1804 audit(1612178730.011:2445): pid=28415 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.3" name="/root/syzkaller-testdir548988167/syzkaller.gb8agU/429/file1" dev="sda1" ino=15771 res=1 errno=0 11:25:30 executing program 3: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x7f, 0x80000000008001}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x9}, 0x0) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000080)) r1 = open(&(0x7f0000000240)='./file1\x00', 0x141142, 0x0) write$UHID_INPUT(r1, &(0x7f0000001440)={0x8, {'\x00k\x00'}}, 0xfffffc41) open(&(0x7f00000001c0)='./file1\x00', 0x0, 0x0) setxattr$trusted_overlay_nlink(&(0x7f0000000000)='./file1\x00', &(0x7f00000000c0)='trusted.overlay.nlink\x00', 0x0, 0x0, 0x0) [ 596.135375][ T35] audit: type=1804 audit(1612178730.031:2446): pid=28421 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.2" name="/root/syzkaller-testdir245532710/syzkaller.d2c0aK/443/file1" dev="sda1" ino=15953 res=1 errno=0 11:25:30 executing program 2: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x7f, 0x80000000008001}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x9}, 0x0) r1 = open(&(0x7f0000000240)='./file1\x00', 0x141142, 0x0) write$UHID_INPUT(r1, &(0x7f0000001440)={0x8, {'\x00p\x00'}}, 0xfffffc41) open(&(0x7f00000001c0)='./file1\x00', 0x0, 0x0) setxattr$trusted_overlay_nlink(&(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x0, 0x0) [ 596.231984][T28448] loop0: detected capacity change from 264192 to 0 [ 596.267867][ T35] audit: type=1804 audit(1612178730.111:2447): pid=28425 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.2" name="/root/syzkaller-testdir245532710/syzkaller.d2c0aK/443/file1" dev="sda1" ino=15953 res=1 errno=0 [ 596.295126][ T35] audit: type=1804 audit(1612178730.111:2448): pid=28421 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor.2" name="/root/syzkaller-testdir245532710/syzkaller.d2c0aK/443/file1" dev="sda1" ino=15953 res=1 errno=0 [ 596.518394][ T35] audit: type=1804 audit(1612178730.591:2449): pid=28434 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.4" name="/root/syzkaller-testdir068764309/syzkaller.I2gCPs/480/file1" dev="sda1" ino=15765 res=1 errno=0 [ 596.615423][ T35] audit: type=1804 audit(1612178730.621:2450): pid=28436 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.1" name="/root/syzkaller-testdir551554057/syzkaller.l2Zg4z/426/file1" dev="sda1" ino=15857 res=1 errno=0 11:25:30 executing program 4: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x7f, 0x80000000008001}, 0x0) getpid() sched_setattr(0x0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x9}, 0x0) r0 = open(&(0x7f0000000240)='./file1\x00', 0x141142, 0x0) write$UHID_INPUT(r0, &(0x7f0000001440), 0xfffffc41) open(&(0x7f00000001c0)='./file1\x00', 0x0, 0xfffffff6) setxattr$trusted_overlay_nlink(&(0x7f0000000000)='./file1\x00', &(0x7f00000000c0)='trusted.overlay.nlink\x00', 0x0, 0x0, 0x0) [ 596.753295][ T35] audit: type=1804 audit(1612178730.641:2451): pid=28438 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.1" name="/root/syzkaller-testdir551554057/syzkaller.l2Zg4z/426/file1" dev="sda1" ino=15857 res=1 errno=0 11:25:30 executing program 1: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x7f, 0x80000000008001}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x9}, 0x0) r1 = open(&(0x7f0000000240)='./file1\x00', 0x141142, 0x0) write$UHID_INPUT(r1, &(0x7f0000001440), 0xfffffc41) open(&(0x7f00000001c0)='./file1\x00', 0x0, 0x5c00000000000000) setxattr$trusted_overlay_nlink(&(0x7f0000000000)='./file1\x00', &(0x7f00000000c0)='trusted.overlay.nlink\x00', 0x0, 0x0, 0x0) 11:25:31 executing program 5: write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000540)=ANY=[@ANYBLOB="7f454c4601061f000400000000000000030038000800000032000000000000004000000000000000560200000000000007000000008038000100090002000100010000000100000006000000000000000400000000000000060000000000000001040000000000000200000000000000010000000000000051e574640400000001000000000000000400000000000000050000000000000005000000000000000400000000000000ff24444700000000908bc001727fbcd44f4d3bf922995edf2fd379eb00"/489], 0x2c4) r0 = inotify_init() r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) epoll_ctl$EPOLL_CTL_DEL(0xffffffffffffffff, 0x2, r1) inotify_add_watch(r0, &(0x7f0000000000)='.\x00', 0x400017e) r2 = openat$incfs(0xffffffffffffffff, &(0x7f0000000080)='.log\x00', 0x0, 0x0) fcntl$getownex(r2, 0x10, &(0x7f00000000c0)) r3 = open(&(0x7f0000000040)='./file0\x00', 0x200c2, 0x0) write$binfmt_elf64(r3, &(0x7f0000000080)=ANY=[], 0x8) sendfile(r3, r3, &(0x7f00000001c0), 0xa198) dup(0xffffffffffffffff) r4 = syz_mount_image$gfs2meta(&(0x7f0000000140)='gfs2meta\x00', &(0x7f0000000200)='./file0\x00', 0x1000, 0x0, 0x0, 0x0, &(0x7f0000000900)={[{'.log\x00'}, {'-%('}, {'.log\x00'}], [{@appraise_type='appraise_type=imasig'}, {@hash='hash'}, {@subj_type={'subj_type', 0x3d, '-&'}}]}) ioctl$BTRFS_IOC_SUBVOL_SETFLAGS(r4, 0x4008941a, &(0x7f0000000980)=0xfe33b054cbbc4d79) 11:25:31 executing program 0: r0 = perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x5c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write$binfmt_elf64(r0, &(0x7f0000000540)=ANY=[@ANYBLOB], 0x2c4) r1 = inotify_init() openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) epoll_ctl$EPOLL_CTL_DEL(0xffffffffffffffff, 0x2, 0xffffffffffffffff) inotify_add_watch(r1, &(0x7f0000000000)='.\x00', 0x400017e) r2 = openat$incfs(0xffffffffffffffff, &(0x7f0000000080)='.log\x00', 0x20200, 0x40) fcntl$getownex(r2, 0x10, &(0x7f00000000c0)) r3 = open(&(0x7f0000000040)='./file0\x00', 0x200c2, 0x0) write$binfmt_elf64(r3, &(0x7f0000000080)=ANY=[], 0x8) sendfile(r3, r3, &(0x7f00000001c0), 0xa198) dup(0xffffffffffffffff) r4 = syz_mount_image$gfs2meta(&(0x7f0000000140)='gfs2meta\x00', &(0x7f0000000200)='./file0\x00', 0x1000, 0x4, &(0x7f0000000880)=[{&(0x7f0000000240)="77ba0daae1b2e74ecd52c59a85bf6f4b1f0b01ab07ba92bc6e57305406115f2bc3e4dd94f19ed896c4fccd34271e9dc3499af9298dbc709e0e6a513d61391d4b198af5f55d24239ae934e8babb8d1cb67bb17b0158", 0x55, 0x3}, {&(0x7f00000002c0)="ae227f954d229f666a6cd22938585e852071e55aa5728addcd315922bf32282e077bdbc63cd5ec89626ee2f8e7982ca239eaa758231056cdca22ca27428407f6c64c384665cfbd00ee6e0d7609f2c7ba0f28b4af70d0307ef78decfe42973915cd509de7c19ea0f3f5c3caaab05f9af08e2cc82d2c14b919dd045e3d36ce1c5d0ff23aed0a4a6ef508b5e71df0a25250d47f1e033ed503b6df99c189111b75b59df679cb75240b756cafecfd203568eeb2c1708fe9f11a2cb0f288590ec76cefbde09c90e9d568492aa5f41196397b70c869838c7164f2bad8eff017d021d7d41c9025c20b", 0xe5, 0x3}, {&(0x7f00000003c0)="792eb6eec33e561f18dc4b58b6a6fb3c7e6fd5e612c08490216ae02617f9811945929cffbf59727393a9a69d57b00a5cd08da3888884b8361d6a4003a54480c1086a5fc876582ff049ede86e2f58d80c7b6cf618e1ba36d4710887bc34ef2b7abbc686df2185f99998060bf492b84e3a02077e2aaf014e1186fde602d2b639d467f48fc2e18cf1553e07ac39040953566ab1d21aac627b166825375377bc3332b62160ea8bf7fc3196b30965dce6181bf7a1", 0xb2, 0x100000000}, {0x0, 0x0, 0x7}], 0x21008, &(0x7f0000000900)={[{'.log\x00'}, {'-%('}, {'.log\x00'}], [{@obj_user={'obj_user'}}, {@appraise_type='appraise_type=imasig'}, {@fowner_eq={'fowner', 0x3d, 0xee01}}, {@hash='hash'}, {@subj_type={'subj_type', 0x3d, '-&'}}]}) ioctl$BTRFS_IOC_SUBVOL_SETFLAGS(r4, 0x4008941a, &(0x7f0000000980)=0xfe33b054cbbc4d79) [ 597.113026][ T35] audit: type=1804 audit(1612178731.191:2452): pid=28471 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.4" name="/root/syzkaller-testdir068764309/syzkaller.I2gCPs/481/file1" dev="sda1" ino=15745 res=1 errno=0 [ 597.182935][ T35] audit: type=1804 audit(1612178731.261:2453): pid=28463 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.2" name="/root/syzkaller-testdir245532710/syzkaller.d2c0aK/444/file1" dev="sda1" ino=15953 res=1 errno=0 [ 597.230266][T28479] loop0: detected capacity change from 264192 to 0 11:25:31 executing program 4: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x7f, 0x80000000008001}, 0x0) getpid() sched_setattr(0x0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x9}, 0x0) r0 = open(&(0x7f0000000240)='./file1\x00', 0x141142, 0x0) write$UHID_INPUT(r0, &(0x7f0000001440), 0xfffffc41) open(&(0x7f00000001c0)='./file1\x00', 0x0, 0xfffffff6) setxattr$trusted_overlay_nlink(&(0x7f0000000000)='./file1\x00', &(0x7f00000000c0)='trusted.overlay.nlink\x00', 0x0, 0x0, 0x0) 11:25:31 executing program 2: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x7f, 0x80000000008001}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x9}, 0x0) r1 = open(&(0x7f0000000240)='./file1\x00', 0x141142, 0x0) write$UHID_INPUT(r1, &(0x7f0000001440)={0x8, {'\x00q\x00'}}, 0xfffffc41) open(&(0x7f00000001c0)='./file1\x00', 0x0, 0x0) setxattr$trusted_overlay_nlink(&(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x0, 0x0) 11:25:31 executing program 3: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x7f, 0x80000000008001}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x9}, 0x0) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000080)) r1 = open(&(0x7f0000000240)='./file1\x00', 0x141142, 0x0) write$UHID_INPUT(r1, &(0x7f0000001440)={0x8, {'\x00l\x00'}}, 0xfffffc41) open(&(0x7f00000001c0)='./file1\x00', 0x0, 0x0) setxattr$trusted_overlay_nlink(&(0x7f0000000000)='./file1\x00', &(0x7f00000000c0)='trusted.overlay.nlink\x00', 0x0, 0x0, 0x0) 11:25:31 executing program 4: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x7f, 0x80000000008001}, 0x0) getpid() sched_setattr(0x0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x9}, 0x0) r0 = open(&(0x7f0000000240)='./file1\x00', 0x141142, 0x0) write$UHID_INPUT(r0, &(0x7f0000001440), 0xfffffc41) open(&(0x7f00000001c0)='./file1\x00', 0x0, 0xfffffff6) setxattr$trusted_overlay_nlink(&(0x7f0000000000)='./file1\x00', &(0x7f00000000c0)='trusted.overlay.nlink\x00', 0x0, 0x0, 0x0) 11:25:32 executing program 5: write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000540)=ANY=[@ANYBLOB="7f454c4601061f000400000000000000030038000800000032000000000000004000000000000000560200000000000007000000008038000100090002000100010000000100000006000000000000000400000000000000060000000000000001040000000000000200000000000000010000000000000051e574640400000001000000000000000400000000000000050000000000000005000000000000000400000000000000ff24444700000000908bc001727fbcd44f4d3bf922995edf2fd379eb00"/489], 0x2c4) r0 = inotify_init() r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) epoll_ctl$EPOLL_CTL_DEL(0xffffffffffffffff, 0x2, r1) inotify_add_watch(r0, &(0x7f0000000000)='.\x00', 0x400017e) r2 = openat$incfs(0xffffffffffffffff, &(0x7f0000000080)='.log\x00', 0x0, 0x0) fcntl$getownex(r2, 0x10, &(0x7f00000000c0)) r3 = open(&(0x7f0000000040)='./file0\x00', 0x200c2, 0x0) write$binfmt_elf64(r3, &(0x7f0000000080)=ANY=[], 0x8) sendfile(r3, r3, &(0x7f00000001c0), 0xa198) dup(0xffffffffffffffff) r4 = syz_mount_image$gfs2meta(&(0x7f0000000140)='gfs2meta\x00', &(0x7f0000000200)='./file0\x00', 0x1000, 0x0, 0x0, 0x0, &(0x7f0000000900)={[{'.log\x00'}, {'-%('}, {'.log\x00'}], [{@appraise_type='appraise_type=imasig'}, {@hash='hash'}, {@subj_type={'subj_type', 0x3d, '-&'}}]}) ioctl$BTRFS_IOC_SUBVOL_SETFLAGS(r4, 0x4008941a, &(0x7f0000000980)=0xfe33b054cbbc4d79) 11:25:32 executing program 0: r0 = perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x5c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write$binfmt_elf64(r0, &(0x7f0000000540)=ANY=[@ANYBLOB], 0x2c4) r1 = inotify_init() openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) epoll_ctl$EPOLL_CTL_DEL(0xffffffffffffffff, 0x2, 0xffffffffffffffff) inotify_add_watch(r1, &(0x7f0000000000)='.\x00', 0x400017e) r2 = openat$incfs(0xffffffffffffffff, &(0x7f0000000080)='.log\x00', 0x20200, 0x40) fcntl$getownex(r2, 0x10, &(0x7f00000000c0)) r3 = open(&(0x7f0000000040)='./file0\x00', 0x200c2, 0x0) write$binfmt_elf64(r3, &(0x7f0000000080)=ANY=[], 0x8) sendfile(r3, r3, &(0x7f00000001c0), 0xa198) dup(0xffffffffffffffff) r4 = syz_mount_image$gfs2meta(&(0x7f0000000140)='gfs2meta\x00', &(0x7f0000000200)='./file0\x00', 0x1000, 0x4, &(0x7f0000000880)=[{&(0x7f0000000240)="77ba0daae1b2e74ecd52c59a85bf6f4b1f0b01ab07ba92bc6e57305406115f2bc3e4dd94f19ed896c4fccd34271e9dc3499af9298dbc709e0e6a513d61391d4b198af5f55d24239ae934e8babb8d1cb67bb17b0158", 0x55, 0x3}, {&(0x7f00000002c0)="ae227f954d229f666a6cd22938585e852071e55aa5728addcd315922bf32282e077bdbc63cd5ec89626ee2f8e7982ca239eaa758231056cdca22ca27428407f6c64c384665cfbd00ee6e0d7609f2c7ba0f28b4af70d0307ef78decfe42973915cd509de7c19ea0f3f5c3caaab05f9af08e2cc82d2c14b919dd045e3d36ce1c5d0ff23aed0a4a6ef508b5e71df0a25250d47f1e033ed503b6df99c189111b75b59df679cb75240b756cafecfd203568eeb2c1708fe9f11a2cb0f288590ec76cefbde09c90e9d568492aa5f41196397b70c869838c7164f2bad8eff017d021d7d41c9025c20b", 0xe5, 0x3}, {&(0x7f00000003c0)="792eb6eec33e561f18dc4b58b6a6fb3c7e6fd5e612c08490216ae02617f9811945929cffbf59727393a9a69d57b00a5cd08da3888884b8361d6a4003a54480c1086a5fc876582ff049ede86e2f58d80c7b6cf618e1ba36d4710887bc34ef2b7abbc686df2185f99998060bf492b84e3a02077e2aaf014e1186fde602d2b639d467f48fc2e18cf1553e07ac39040953566ab1d21aac627b166825375377bc3332b62160ea8bf7fc3196b30965dce6181bf7a1c60d0270", 0xb6, 0x100000000}, {0x0, 0x0, 0x7}], 0x21008, &(0x7f0000000900)={[{'.log\x00'}, {'-%('}, {'.log\x00'}], [{@obj_user={'obj_user'}}, {@appraise_type='appraise_type=imasig'}, {@fowner_eq={'fowner', 0x3d, 0xee01}}, {@hash='hash'}, {@subj_type={'subj_type', 0x3d, '-&'}}]}) ioctl$BTRFS_IOC_SUBVOL_SETFLAGS(r4, 0x4008941a, &(0x7f0000000980)=0xfe33b054cbbc4d79) 11:25:32 executing program 4: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x7f, 0x80000000008001}, 0x0) r0 = getpid() sched_setattr(r0, 0x0, 0x0) r1 = open(&(0x7f0000000240)='./file1\x00', 0x141142, 0x0) write$UHID_INPUT(r1, &(0x7f0000001440), 0xfffffc41) open(&(0x7f00000001c0)='./file1\x00', 0x0, 0xfffffff6) setxattr$trusted_overlay_nlink(&(0x7f0000000000)='./file1\x00', &(0x7f00000000c0)='trusted.overlay.nlink\x00', 0x0, 0x0, 0x0) [ 598.303033][T28520] loop0: detected capacity change from 264192 to 0 11:25:32 executing program 1: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x7f, 0x80000000008001}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x9}, 0x0) r1 = open(&(0x7f0000000240)='./file1\x00', 0x141142, 0x0) write$UHID_INPUT(r1, &(0x7f0000001440), 0xfffffc41) open(&(0x7f00000001c0)='./file1\x00', 0x0, 0x6800000000000000) setxattr$trusted_overlay_nlink(&(0x7f0000000000)='./file1\x00', &(0x7f00000000c0)='trusted.overlay.nlink\x00', 0x0, 0x0, 0x0) 11:25:32 executing program 2: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x7f, 0x80000000008001}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x9}, 0x0) r1 = open(&(0x7f0000000240)='./file1\x00', 0x141142, 0x0) write$UHID_INPUT(r1, &(0x7f0000001440)={0x8, {'\x00r\x00'}}, 0xfffffc41) open(&(0x7f00000001c0)='./file1\x00', 0x0, 0x0) setxattr$trusted_overlay_nlink(&(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x0, 0x0) 11:25:32 executing program 3: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x7f, 0x80000000008001}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x9}, 0x0) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000080)) r1 = open(&(0x7f0000000240)='./file1\x00', 0x141142, 0x0) write$UHID_INPUT(r1, &(0x7f0000001440)={0x8, {'\x00m\x00'}}, 0xfffffc41) open(&(0x7f00000001c0)='./file1\x00', 0x0, 0x0) setxattr$trusted_overlay_nlink(&(0x7f0000000000)='./file1\x00', &(0x7f00000000c0)='trusted.overlay.nlink\x00', 0x0, 0x0, 0x0) 11:25:32 executing program 5: write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000540)=ANY=[@ANYBLOB="7f454c4601061f000400000000000000030038000800000032000000000000004000000000000000560200000000000007000000008038000100090002000100010000000100000006000000000000000400000000000000060000000000000001040000000000000200000000000000010000000000000051e574640400000001000000000000000400000000000000050000000000000005000000000000000400000000000000ff24444700000000908bc001727fbcd44f4d3bf922995edf2fd379eb00"/489], 0x2c4) r0 = inotify_init() r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) epoll_ctl$EPOLL_CTL_DEL(0xffffffffffffffff, 0x2, r1) inotify_add_watch(r0, &(0x7f0000000000)='.\x00', 0x400017e) r2 = openat$incfs(0xffffffffffffffff, &(0x7f0000000080)='.log\x00', 0x0, 0x0) fcntl$getownex(r2, 0x10, &(0x7f00000000c0)) r3 = open(&(0x7f0000000040)='./file0\x00', 0x200c2, 0x0) write$binfmt_elf64(r3, &(0x7f0000000080)=ANY=[], 0x8) sendfile(r3, r3, &(0x7f00000001c0), 0xa198) dup(0xffffffffffffffff) r4 = syz_mount_image$gfs2meta(&(0x7f0000000140)='gfs2meta\x00', &(0x7f0000000200)='./file0\x00', 0x1000, 0x0, 0x0, 0x0, &(0x7f0000000900)={[{'.log\x00'}, {'-%('}, {'.log\x00'}], [{@fowner_eq={'fowner', 0x3d, 0xee01}}, {@hash='hash'}, {@subj_type={'subj_type', 0x3d, '-&'}}]}) ioctl$BTRFS_IOC_SUBVOL_SETFLAGS(r4, 0x4008941a, &(0x7f0000000980)=0xfe33b054cbbc4d79) 11:25:33 executing program 0: r0 = perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x5c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write$binfmt_elf64(r0, &(0x7f0000000540)=ANY=[@ANYBLOB], 0x2c4) r1 = inotify_init() openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) epoll_ctl$EPOLL_CTL_DEL(0xffffffffffffffff, 0x2, 0xffffffffffffffff) inotify_add_watch(r1, &(0x7f0000000000)='.\x00', 0x400017e) r2 = openat$incfs(0xffffffffffffffff, &(0x7f0000000080)='.log\x00', 0x20200, 0x40) fcntl$getownex(r2, 0x10, &(0x7f00000000c0)) r3 = open(&(0x7f0000000040)='./file0\x00', 0x200c2, 0x0) write$binfmt_elf64(r3, &(0x7f0000000080)=ANY=[], 0x8) sendfile(r3, r3, &(0x7f00000001c0), 0xa198) dup(0xffffffffffffffff) r4 = syz_mount_image$gfs2meta(&(0x7f0000000140)='gfs2meta\x00', &(0x7f0000000200)='./file0\x00', 0x1000, 0x4, &(0x7f0000000880)=[{&(0x7f0000000240)="77ba0daae1b2e74ecd52c59a85bf6f4b1f0b01ab07ba92bc6e57305406115f2bc3e4dd94f19ed896c4fccd34271e9dc3499af9298dbc709e0e6a513d61391d4b198af5f55d24239ae934e8babb8d1cb67bb17b0158", 0x55, 0x3}, {&(0x7f00000002c0)="ae227f954d229f666a6cd22938585e852071e55aa5728addcd315922bf32282e077bdbc63cd5ec89626ee2f8e7982ca239eaa758231056cdca22ca27428407f6c64c384665cfbd00ee6e0d7609f2c7ba0f28b4af70d0307ef78decfe42973915cd509de7c19ea0f3f5c3caaab05f9af08e2cc82d2c14b919dd045e3d36ce1c5d0ff23aed0a4a6ef508b5e71df0a25250d47f1e033ed503b6df99c189111b75b59df679cb75240b756cafecfd203568eeb2c1708fe9f11a2cb0f288590ec76cefbde09c90e9d568492aa5f41196397b70c869838c7164f2bad8eff017d021d7d41c9025c20b", 0xe5, 0x3}, {&(0x7f00000003c0)="792eb6eec33e561f18dc4b58b6a6fb3c7e6fd5e612c08490216ae02617f9811945929cffbf59727393a9a69d57b00a5cd08da3888884b8361d6a4003a54480c1086a5fc876582ff049ede86e2f58d80c7b6cf618e1ba36d4710887bc34ef2b7abbc686df2185f99998060bf492b84e3a02077e2aaf014e1186fde602d2b639d467f48fc2e18cf1553e07ac39040953566ab1d21aac627b166825375377bc3332b62160ea8bf7fc3196b30965dce6181bf7a1c60d0270", 0xb6, 0x100000000}, {0x0, 0x0, 0x7}], 0x21008, &(0x7f0000000900)={[{'.log\x00'}, {'-%('}, {'.log\x00'}], [{@obj_user={'obj_user'}}, {@appraise_type='appraise_type=imasig'}, {@fowner_eq={'fowner', 0x3d, 0xee01}}, {@hash='hash'}, {@subj_type={'subj_type', 0x3d, '-&'}}]}) ioctl$BTRFS_IOC_SUBVOL_SETFLAGS(r4, 0x4008941a, &(0x7f0000000980)=0xfe33b054cbbc4d79) [ 599.203594][T28552] loop0: detected capacity change from 264192 to 0 11:25:33 executing program 4: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x7f, 0x80000000008001}, 0x0) r0 = getpid() sched_setattr(r0, 0x0, 0x0) r1 = open(&(0x7f0000000240)='./file1\x00', 0x141142, 0x0) write$UHID_INPUT(r1, &(0x7f0000001440), 0xfffffc41) open(&(0x7f00000001c0)='./file1\x00', 0x0, 0xfffffff6) setxattr$trusted_overlay_nlink(&(0x7f0000000000)='./file1\x00', &(0x7f00000000c0)='trusted.overlay.nlink\x00', 0x0, 0x0, 0x0) 11:25:33 executing program 1: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x7f, 0x80000000008001}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x9}, 0x0) r1 = open(&(0x7f0000000240)='./file1\x00', 0x141142, 0x0) write$UHID_INPUT(r1, &(0x7f0000001440), 0xfffffc41) open(&(0x7f00000001c0)='./file1\x00', 0x0, 0x6c00000000000000) setxattr$trusted_overlay_nlink(&(0x7f0000000000)='./file1\x00', &(0x7f00000000c0)='trusted.overlay.nlink\x00', 0x0, 0x0, 0x0) 11:25:33 executing program 2: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x7f, 0x80000000008001}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x9}, 0x0) r1 = open(&(0x7f0000000240)='./file1\x00', 0x141142, 0x0) write$UHID_INPUT(r1, &(0x7f0000001440)={0x8, {'\x00s\x00'}}, 0xfffffc41) open(&(0x7f00000001c0)='./file1\x00', 0x0, 0x0) setxattr$trusted_overlay_nlink(&(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x0, 0x0) 11:25:33 executing program 5: write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000540)=ANY=[@ANYBLOB="7f454c4601061f000400000000000000030038000800000032000000000000004000000000000000560200000000000007000000008038000100090002000100010000000100000006000000000000000400000000000000060000000000000001040000000000000200000000000000010000000000000051e574640400000001000000000000000400000000000000050000000000000005000000000000000400000000000000ff24444700000000908bc001727fbcd44f4d3bf922995edf2fd379eb00"/489], 0x2c4) r0 = inotify_init() r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) epoll_ctl$EPOLL_CTL_DEL(0xffffffffffffffff, 0x2, r1) inotify_add_watch(r0, &(0x7f0000000000)='.\x00', 0x400017e) r2 = openat$incfs(0xffffffffffffffff, &(0x7f0000000080)='.log\x00', 0x0, 0x0) fcntl$getownex(r2, 0x10, &(0x7f00000000c0)) r3 = open(&(0x7f0000000040)='./file0\x00', 0x200c2, 0x0) write$binfmt_elf64(r3, &(0x7f0000000080)=ANY=[], 0x8) sendfile(r3, r3, &(0x7f00000001c0), 0xa198) dup(0xffffffffffffffff) r4 = syz_mount_image$gfs2meta(&(0x7f0000000140)='gfs2meta\x00', &(0x7f0000000200)='./file0\x00', 0x1000, 0x0, 0x0, 0x0, &(0x7f0000000900)={[{'.log\x00'}, {'-%('}, {'.log\x00'}], [{@fowner_eq={'fowner', 0x3d, 0xee01}}, {@hash='hash'}, {@subj_type={'subj_type', 0x3d, '-&'}}]}) ioctl$BTRFS_IOC_SUBVOL_SETFLAGS(r4, 0x4008941a, &(0x7f0000000980)=0xfe33b054cbbc4d79) 11:25:34 executing program 3: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x7f, 0x80000000008001}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x9}, 0x0) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000080)) r1 = open(&(0x7f0000000240)='./file1\x00', 0x141142, 0x0) write$UHID_INPUT(r1, &(0x7f0000001440)={0x8, {'\x00n\x00'}}, 0xfffffc41) open(&(0x7f00000001c0)='./file1\x00', 0x0, 0x0) setxattr$trusted_overlay_nlink(&(0x7f0000000000)='./file1\x00', &(0x7f00000000c0)='trusted.overlay.nlink\x00', 0x0, 0x0, 0x0) 11:25:34 executing program 0: r0 = perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x5c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write$binfmt_elf64(r0, &(0x7f0000000540)=ANY=[@ANYBLOB], 0x2c4) r1 = inotify_init() openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) epoll_ctl$EPOLL_CTL_DEL(0xffffffffffffffff, 0x2, 0xffffffffffffffff) inotify_add_watch(r1, &(0x7f0000000000)='.\x00', 0x400017e) r2 = openat$incfs(0xffffffffffffffff, &(0x7f0000000080)='.log\x00', 0x20200, 0x40) fcntl$getownex(r2, 0x10, &(0x7f00000000c0)) r3 = open(&(0x7f0000000040)='./file0\x00', 0x200c2, 0x0) write$binfmt_elf64(r3, &(0x7f0000000080)=ANY=[], 0x8) sendfile(r3, r3, &(0x7f00000001c0), 0xa198) dup(0xffffffffffffffff) r4 = syz_mount_image$gfs2meta(&(0x7f0000000140)='gfs2meta\x00', &(0x7f0000000200)='./file0\x00', 0x1000, 0x4, &(0x7f0000000880)=[{&(0x7f0000000240)="77ba0daae1b2e74ecd52c59a85bf6f4b1f0b01ab07ba92bc6e57305406115f2bc3e4dd94f19ed896c4fccd34271e9dc3499af9298dbc709e0e6a513d61391d4b198af5f55d24239ae934e8babb8d1cb67bb17b0158", 0x55, 0x3}, {&(0x7f00000002c0)="ae227f954d229f666a6cd22938585e852071e55aa5728addcd315922bf32282e077bdbc63cd5ec89626ee2f8e7982ca239eaa758231056cdca22ca27428407f6c64c384665cfbd00ee6e0d7609f2c7ba0f28b4af70d0307ef78decfe42973915cd509de7c19ea0f3f5c3caaab05f9af08e2cc82d2c14b919dd045e3d36ce1c5d0ff23aed0a4a6ef508b5e71df0a25250d47f1e033ed503b6df99c189111b75b59df679cb75240b756cafecfd203568eeb2c1708fe9f11a2cb0f288590ec76cefbde09c90e9d568492aa5f41196397b70c869838c7164f2bad8eff017d021d7d41c9025c20b", 0xe5, 0x3}, {&(0x7f00000003c0)="792eb6eec33e561f18dc4b58b6a6fb3c7e6fd5e612c08490216ae02617f9811945929cffbf59727393a9a69d57b00a5cd08da3888884b8361d6a4003a54480c1086a5fc876582ff049ede86e2f58d80c7b6cf618e1ba36d4710887bc34ef2b7abbc686df2185f99998060bf492b84e3a02077e2aaf014e1186fde602d2b639d467f48fc2e18cf1553e07ac39040953566ab1d21aac627b166825375377bc3332b62160ea8bf7fc3196b30965dce6181bf7a1c60d0270", 0xb6, 0x100000000}, {0x0, 0x0, 0x7}], 0x21008, &(0x7f0000000900)={[{'.log\x00'}, {'-%('}, {'.log\x00'}], [{@obj_user={'obj_user'}}, {@appraise_type='appraise_type=imasig'}, {@fowner_eq={'fowner', 0x3d, 0xee01}}, {@hash='hash'}, {@subj_type={'subj_type', 0x3d, '-&'}}]}) ioctl$BTRFS_IOC_SUBVOL_SETFLAGS(r4, 0x4008941a, &(0x7f0000000980)=0xfe33b054cbbc4d79) [ 600.153985][T28584] loop0: detected capacity change from 264192 to 0 11:25:34 executing program 1: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x7f, 0x80000000008001}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x9}, 0x0) r1 = open(&(0x7f0000000240)='./file1\x00', 0x141142, 0x0) write$UHID_INPUT(r1, &(0x7f0000001440), 0xfffffc41) open(&(0x7f00000001c0)='./file1\x00', 0x0, 0x7400000000000000) setxattr$trusted_overlay_nlink(&(0x7f0000000000)='./file1\x00', &(0x7f00000000c0)='trusted.overlay.nlink\x00', 0x0, 0x0, 0x0) 11:25:34 executing program 4: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x7f, 0x80000000008001}, 0x0) r0 = getpid() sched_setattr(r0, 0x0, 0x0) r1 = open(&(0x7f0000000240)='./file1\x00', 0x141142, 0x0) write$UHID_INPUT(r1, &(0x7f0000001440), 0xfffffc41) open(&(0x7f00000001c0)='./file1\x00', 0x0, 0xfffffff6) setxattr$trusted_overlay_nlink(&(0x7f0000000000)='./file1\x00', &(0x7f00000000c0)='trusted.overlay.nlink\x00', 0x0, 0x0, 0x0) 11:25:34 executing program 5: write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000540)=ANY=[@ANYBLOB="7f454c4601061f000400000000000000030038000800000032000000000000004000000000000000560200000000000007000000008038000100090002000100010000000100000006000000000000000400000000000000060000000000000001040000000000000200000000000000010000000000000051e574640400000001000000000000000400000000000000050000000000000005000000000000000400000000000000ff24444700000000908bc001727fbcd44f4d3bf922995edf2fd379eb00"/489], 0x2c4) r0 = inotify_init() r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) epoll_ctl$EPOLL_CTL_DEL(0xffffffffffffffff, 0x2, r1) inotify_add_watch(r0, &(0x7f0000000000)='.\x00', 0x400017e) r2 = openat$incfs(0xffffffffffffffff, &(0x7f0000000080)='.log\x00', 0x0, 0x0) fcntl$getownex(r2, 0x10, &(0x7f00000000c0)) r3 = open(&(0x7f0000000040)='./file0\x00', 0x200c2, 0x0) write$binfmt_elf64(r3, &(0x7f0000000080)=ANY=[], 0x8) sendfile(r3, r3, &(0x7f00000001c0), 0xa198) dup(0xffffffffffffffff) r4 = syz_mount_image$gfs2meta(&(0x7f0000000140)='gfs2meta\x00', &(0x7f0000000200)='./file0\x00', 0x1000, 0x0, 0x0, 0x0, &(0x7f0000000900)={[{'.log\x00'}, {'-%('}, {'.log\x00'}], [{@fowner_eq={'fowner', 0x3d, 0xee01}}, {@hash='hash'}, {@subj_type={'subj_type', 0x3d, '-&'}}]}) ioctl$BTRFS_IOC_SUBVOL_SETFLAGS(r4, 0x4008941a, &(0x7f0000000980)=0xfe33b054cbbc4d79) [ 600.820874][ T35] kauditd_printk_skb: 30 callbacks suppressed [ 600.820886][ T35] audit: type=1804 audit(1612178734.891:2484): pid=28587 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.3" name="/root/syzkaller-testdir548988167/syzkaller.gb8agU/433/file1" dev="sda1" ino=15952 res=1 errno=0 [ 600.910838][ T35] audit: type=1804 audit(1612178734.961:2485): pid=28577 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.2" name="/root/syzkaller-testdir245532710/syzkaller.d2c0aK/447/file1" dev="sda1" ino=15969 res=1 errno=0 11:25:35 executing program 0: r0 = perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x5c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write$binfmt_elf64(r0, &(0x7f0000000540)=ANY=[@ANYBLOB], 0x2c4) r1 = inotify_init() openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) epoll_ctl$EPOLL_CTL_DEL(0xffffffffffffffff, 0x2, 0xffffffffffffffff) inotify_add_watch(r1, &(0x7f0000000000)='.\x00', 0x400017e) r2 = openat$incfs(0xffffffffffffffff, &(0x7f0000000080)='.log\x00', 0x20200, 0x40) fcntl$getownex(r2, 0x10, &(0x7f00000000c0)) r3 = open(&(0x7f0000000040)='./file0\x00', 0x200c2, 0x0) write$binfmt_elf64(r3, &(0x7f0000000080)=ANY=[], 0x8) sendfile(r3, r3, &(0x7f00000001c0), 0xa198) dup(0xffffffffffffffff) r4 = syz_mount_image$gfs2meta(&(0x7f0000000140)='gfs2meta\x00', &(0x7f0000000200)='./file0\x00', 0x1000, 0x4, &(0x7f0000000880)=[{&(0x7f0000000240)="77ba0daae1b2e74ecd52c59a85bf6f4b1f0b01ab07ba92bc6e57305406115f2bc3e4dd94f19ed896c4fccd34271e9dc3499af9298dbc709e0e6a513d61391d4b198af5f55d24239ae934e8babb8d1cb67bb17b0158", 0x55, 0x3}, {&(0x7f00000002c0)="ae227f954d229f666a6cd22938585e852071e55aa5728addcd315922bf32282e077bdbc63cd5ec89626ee2f8e7982ca239eaa758231056cdca22ca27428407f6c64c384665cfbd00ee6e0d7609f2c7ba0f28b4af70d0307ef78decfe42973915cd509de7c19ea0f3f5c3caaab05f9af08e2cc82d2c14b919dd045e3d36ce1c5d0ff23aed0a4a6ef508b5e71df0a25250d47f1e033ed503b6df99c189111b75b59df679cb75240b756cafecfd203568eeb2c1708fe9f11a2cb0f288590ec76cefbde09c90e9d568492aa5f41196397b70c869838c7164f2bad8eff017d021d7d41c9025c20b", 0xe5, 0x3}, {&(0x7f00000003c0)="792eb6eec33e561f18dc4b58b6a6fb3c7e6fd5e612c08490216ae02617f9811945929cffbf59727393a9a69d57b00a5cd08da3888884b8361d6a4003a54480c1086a5fc876582ff049ede86e2f58d80c7b6cf618e1ba36d4710887bc34ef2b7abbc686df2185f99998060bf492b84e3a02077e2aaf014e1186fde602d2b639d467f48fc2e18cf1553e07ac39040953566ab1d21aac627b166825375377bc3332b62160ea8bf7fc3196b30965dce6181bf7a1c60d0270f24b", 0xb8, 0x100000000}, {0x0, 0x0, 0x7}], 0x21008, &(0x7f0000000900)={[{'.log\x00'}, {'-%('}, {'.log\x00'}], [{@obj_user={'obj_user'}}, {@appraise_type='appraise_type=imasig'}, {@fowner_eq={'fowner', 0x3d, 0xee01}}, {@hash='hash'}, {@subj_type={'subj_type', 0x3d, '-&'}}]}) ioctl$BTRFS_IOC_SUBVOL_SETFLAGS(r4, 0x4008941a, &(0x7f0000000980)=0xfe33b054cbbc4d79) 11:25:35 executing program 2: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x7f, 0x80000000008001}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x9}, 0x0) r1 = open(&(0x7f0000000240)='./file1\x00', 0x141142, 0x0) write$UHID_INPUT(r1, &(0x7f0000001440)={0x8, {'\x00t\x00'}}, 0xfffffc41) open(&(0x7f00000001c0)='./file1\x00', 0x0, 0x0) setxattr$trusted_overlay_nlink(&(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x0, 0x0) [ 601.007340][ T35] audit: type=1804 audit(1612178735.082:2486): pid=28589 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.3" name="/root/syzkaller-testdir548988167/syzkaller.gb8agU/433/file1" dev="sda1" ino=15952 res=1 errno=0 11:25:35 executing program 3: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x7f, 0x80000000008001}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x9}, 0x0) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000080)) r1 = open(&(0x7f0000000240)='./file1\x00', 0x141142, 0x0) write$UHID_INPUT(r1, &(0x7f0000001440)={0x8, {'\x00o\x00'}}, 0xfffffc41) open(&(0x7f00000001c0)='./file1\x00', 0x0, 0x0) setxattr$trusted_overlay_nlink(&(0x7f0000000000)='./file1\x00', &(0x7f00000000c0)='trusted.overlay.nlink\x00', 0x0, 0x0, 0x0) [ 601.208938][T28613] loop0: detected capacity change from 264192 to 0 [ 601.490782][ T35] audit: type=1804 audit(1612178735.572:2487): pid=28601 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.4" name="/root/syzkaller-testdir068764309/syzkaller.I2gCPs/486/file1" dev="sda1" ino=15780 res=1 errno=0 11:25:35 executing program 5: write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000540)=ANY=[@ANYBLOB="7f454c4601061f000400000000000000030038000800000032000000000000004000000000000000560200000000000007000000008038000100090002000100010000000100000006000000000000000400000000000000060000000000000001040000000000000200000000000000010000000000000051e574640400000001000000000000000400000000000000050000000000000005000000000000000400000000000000ff24444700000000908bc001727fbcd44f4d3bf922995edf2fd379eb00"/489], 0x2c4) r0 = inotify_init() r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) epoll_ctl$EPOLL_CTL_DEL(0xffffffffffffffff, 0x2, r1) inotify_add_watch(r0, &(0x7f0000000000)='.\x00', 0x400017e) r2 = openat$incfs(0xffffffffffffffff, &(0x7f0000000080)='.log\x00', 0x0, 0x0) fcntl$getownex(r2, 0x10, &(0x7f00000000c0)) r3 = open(&(0x7f0000000040)='./file0\x00', 0x200c2, 0x0) write$binfmt_elf64(r3, &(0x7f0000000080)=ANY=[], 0x8) sendfile(r3, r3, &(0x7f00000001c0), 0xa198) dup(0xffffffffffffffff) syz_mount_image$gfs2meta(&(0x7f0000000140)='gfs2meta\x00', &(0x7f0000000200)='./file0\x00', 0x1000, 0x0, 0x0, 0x0, &(0x7f0000000900)={[{'.log\x00'}, {'-%('}, {'.log\x00'}], [{@appraise_type='appraise_type=imasig'}, {@fowner_eq={'fowner', 0x3d, 0xee01}}, {@hash='hash'}, {@subj_type={'subj_type', 0x3d, '-&'}}]}) ioctl$BTRFS_IOC_SUBVOL_SETFLAGS(0xffffffffffffffff, 0x4008941a, &(0x7f0000000980)=0xfe33b054cbbc4d79) [ 601.604432][ T35] audit: type=1804 audit(1612178735.662:2488): pid=28600 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.1" name="/root/syzkaller-testdir551554057/syzkaller.l2Zg4z/430/file1" dev="sda1" ino=15779 res=1 errno=0 11:25:35 executing program 4: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x7f, 0x80000000008001}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x38, 0x0, 0x0, 0x0, 0x9}, 0x0) r1 = open(&(0x7f0000000240)='./file1\x00', 0x141142, 0x0) write$UHID_INPUT(r1, &(0x7f0000001440), 0xfffffc41) open(&(0x7f00000001c0)='./file1\x00', 0x0, 0xfffffff6) setxattr$trusted_overlay_nlink(&(0x7f0000000000)='./file1\x00', &(0x7f00000000c0)='trusted.overlay.nlink\x00', 0x0, 0x0, 0x0) [ 601.727510][ T35] audit: type=1804 audit(1612178735.662:2489): pid=28629 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.1" name="/root/syzkaller-testdir551554057/syzkaller.l2Zg4z/430/file1" dev="sda1" ino=15779 res=1 errno=0 11:25:35 executing program 1: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x7f, 0x80000000008001}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x9}, 0x0) r1 = open(&(0x7f0000000240)='./file1\x00', 0x141142, 0x0) write$UHID_INPUT(r1, &(0x7f0000001440), 0xfffffc41) open(&(0x7f00000001c0)='./file1\x00', 0x0, 0x7a00000000000000) setxattr$trusted_overlay_nlink(&(0x7f0000000000)='./file1\x00', &(0x7f00000000c0)='trusted.overlay.nlink\x00', 0x0, 0x0, 0x0) 11:25:36 executing program 0: r0 = perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x5c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write$binfmt_elf64(r0, &(0x7f0000000540)=ANY=[@ANYBLOB], 0x2c4) r1 = inotify_init() openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) epoll_ctl$EPOLL_CTL_DEL(0xffffffffffffffff, 0x2, 0xffffffffffffffff) inotify_add_watch(r1, &(0x7f0000000000)='.\x00', 0x400017e) r2 = openat$incfs(0xffffffffffffffff, &(0x7f0000000080)='.log\x00', 0x20200, 0x40) fcntl$getownex(r2, 0x10, &(0x7f00000000c0)) r3 = open(&(0x7f0000000040)='./file0\x00', 0x200c2, 0x0) write$binfmt_elf64(r3, &(0x7f0000000080)=ANY=[], 0x8) sendfile(r3, r3, &(0x7f00000001c0), 0xa198) dup(0xffffffffffffffff) r4 = syz_mount_image$gfs2meta(&(0x7f0000000140)='gfs2meta\x00', &(0x7f0000000200)='./file0\x00', 0x1000, 0x4, &(0x7f0000000880)=[{&(0x7f0000000240)="77ba0daae1b2e74ecd52c59a85bf6f4b1f0b01ab07ba92bc6e57305406115f2bc3e4dd94f19ed896c4fccd34271e9dc3499af9298dbc709e0e6a513d61391d4b198af5f55d24239ae934e8babb8d1cb67bb17b0158", 0x55, 0x3}, {&(0x7f00000002c0)="ae227f954d229f666a6cd22938585e852071e55aa5728addcd315922bf32282e077bdbc63cd5ec89626ee2f8e7982ca239eaa758231056cdca22ca27428407f6c64c384665cfbd00ee6e0d7609f2c7ba0f28b4af70d0307ef78decfe42973915cd509de7c19ea0f3f5c3caaab05f9af08e2cc82d2c14b919dd045e3d36ce1c5d0ff23aed0a4a6ef508b5e71df0a25250d47f1e033ed503b6df99c189111b75b59df679cb75240b756cafecfd203568eeb2c1708fe9f11a2cb0f288590ec76cefbde09c90e9d568492aa5f41196397b70c869838c7164f2bad8eff017d021d7d41c9025c20b", 0xe5, 0x3}, {&(0x7f00000003c0)="792eb6eec33e561f18dc4b58b6a6fb3c7e6fd5e612c08490216ae02617f9811945929cffbf59727393a9a69d57b00a5cd08da3888884b8361d6a4003a54480c1086a5fc876582ff049ede86e2f58d80c7b6cf618e1ba36d4710887bc34ef2b7abbc686df2185f99998060bf492b84e3a02077e2aaf014e1186fde602d2b639d467f48fc2e18cf1553e07ac39040953566ab1d21aac627b166825375377bc3332b62160ea8bf7fc3196b30965dce6181bf7a1c60d0270f24b", 0xb8, 0x100000000}, {0x0, 0x0, 0x7}], 0x21008, &(0x7f0000000900)={[{'.log\x00'}, {'-%('}, {'.log\x00'}], [{@obj_user={'obj_user'}}, {@appraise_type='appraise_type=imasig'}, {@fowner_eq={'fowner', 0x3d, 0xee01}}, {@hash='hash'}, {@subj_type={'subj_type', 0x3d, '-&'}}]}) ioctl$BTRFS_IOC_SUBVOL_SETFLAGS(r4, 0x4008941a, &(0x7f0000000980)=0xfe33b054cbbc4d79) [ 601.877173][ T35] audit: type=1804 audit(1612178735.662:2490): pid=28628 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor.1" name="/root/syzkaller-testdir551554057/syzkaller.l2Zg4z/430/file1" dev="sda1" ino=15779 res=1 errno=0 [ 602.019232][ T35] audit: type=1804 audit(1612178736.082:2491): pid=28621 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.2" name="/root/syzkaller-testdir245532710/syzkaller.d2c0aK/448/file1" dev="sda1" ino=15969 res=1 errno=0 [ 602.079375][T28644] loop0: detected capacity change from 264192 to 0 [ 602.215761][ T35] audit: type=1804 audit(1612178736.212:2492): pid=28625 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.3" name="/root/syzkaller-testdir548988167/syzkaller.gb8agU/434/file1" dev="sda1" ino=15952 res=1 errno=0 11:25:36 executing program 2: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x7f, 0x80000000008001}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x9}, 0x0) r1 = open(&(0x7f0000000240)='./file1\x00', 0x141142, 0x0) write$UHID_INPUT(r1, &(0x7f0000001440)={0x8, {'\x00u\x00'}}, 0xfffffc41) open(&(0x7f00000001c0)='./file1\x00', 0x0, 0x0) setxattr$trusted_overlay_nlink(&(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x0, 0x0) [ 602.388395][ T35] audit: type=1804 audit(1612178736.222:2493): pid=28624 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.2" name="/root/syzkaller-testdir245532710/syzkaller.d2c0aK/448/file1" dev="sda1" ino=15969 res=1 errno=0 11:25:36 executing program 3: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x7f, 0x80000000008001}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x9}, 0x0) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000080)) r1 = open(&(0x7f0000000240)='./file1\x00', 0x141142, 0x0) write$UHID_INPUT(r1, &(0x7f0000001440)={0x8, {'\x00p\x00'}}, 0xfffffc41) open(&(0x7f00000001c0)='./file1\x00', 0x0, 0x0) setxattr$trusted_overlay_nlink(&(0x7f0000000000)='./file1\x00', &(0x7f00000000c0)='trusted.overlay.nlink\x00', 0x0, 0x0, 0x0) 11:25:36 executing program 5: write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000540)=ANY=[@ANYBLOB="7f454c4601061f000400000000000000030038000800000032000000000000004000000000000000560200000000000007000000008038000100090002000100010000000100000006000000000000000400000000000000060000000000000001040000000000000200000000000000010000000000000051e574640400000001000000000000000400000000000000050000000000000005000000000000000400000000000000ff24444700000000908bc001727fbcd44f4d3bf922995edf2fd379eb00"/489], 0x2c4) r0 = inotify_init() r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) epoll_ctl$EPOLL_CTL_DEL(0xffffffffffffffff, 0x2, r1) inotify_add_watch(r0, &(0x7f0000000000)='.\x00', 0x400017e) r2 = openat$incfs(0xffffffffffffffff, &(0x7f0000000080)='.log\x00', 0x0, 0x0) fcntl$getownex(r2, 0x10, &(0x7f00000000c0)) r3 = open(&(0x7f0000000040)='./file0\x00', 0x200c2, 0x0) write$binfmt_elf64(r3, &(0x7f0000000080)=ANY=[], 0x8) sendfile(r3, r3, &(0x7f00000001c0), 0xa198) dup(0xffffffffffffffff) syz_mount_image$gfs2meta(&(0x7f0000000140)='gfs2meta\x00', &(0x7f0000000200)='./file0\x00', 0x1000, 0x0, 0x0, 0x0, &(0x7f0000000900)={[{'.log\x00'}, {'-%('}, {'.log\x00'}], [{@appraise_type='appraise_type=imasig'}, {@fowner_eq={'fowner', 0x3d, 0xee01}}, {@hash='hash'}, {@subj_type={'subj_type', 0x3d, '-&'}}]}) ioctl$BTRFS_IOC_SUBVOL_SETFLAGS(0xffffffffffffffff, 0x4008941a, &(0x7f0000000980)=0xfe33b054cbbc4d79) 11:25:36 executing program 1: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x7f, 0x80000000008001}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x9}, 0x0) r1 = open(&(0x7f0000000240)='./file1\x00', 0x141142, 0x0) write$UHID_INPUT(r1, &(0x7f0000001440), 0xfffffc41) open(&(0x7f00000001c0)='./file1\x00', 0x0, 0xa1ffffff00000000) setxattr$trusted_overlay_nlink(&(0x7f0000000000)='./file1\x00', &(0x7f00000000c0)='trusted.overlay.nlink\x00', 0x0, 0x0, 0x0) 11:25:36 executing program 0: r0 = perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x5c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write$binfmt_elf64(r0, &(0x7f0000000540)=ANY=[@ANYBLOB], 0x2c4) r1 = inotify_init() openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) epoll_ctl$EPOLL_CTL_DEL(0xffffffffffffffff, 0x2, 0xffffffffffffffff) inotify_add_watch(r1, &(0x7f0000000000)='.\x00', 0x400017e) r2 = openat$incfs(0xffffffffffffffff, &(0x7f0000000080)='.log\x00', 0x20200, 0x40) fcntl$getownex(r2, 0x10, &(0x7f00000000c0)) r3 = open(&(0x7f0000000040)='./file0\x00', 0x200c2, 0x0) write$binfmt_elf64(r3, &(0x7f0000000080)=ANY=[], 0x8) sendfile(r3, r3, &(0x7f00000001c0), 0xa198) dup(0xffffffffffffffff) r4 = syz_mount_image$gfs2meta(&(0x7f0000000140)='gfs2meta\x00', &(0x7f0000000200)='./file0\x00', 0x1000, 0x4, &(0x7f0000000880)=[{&(0x7f0000000240)="77ba0daae1b2e74ecd52c59a85bf6f4b1f0b01ab07ba92bc6e57305406115f2bc3e4dd94f19ed896c4fccd34271e9dc3499af9298dbc709e0e6a513d61391d4b198af5f55d24239ae934e8babb8d1cb67bb17b0158", 0x55, 0x3}, {&(0x7f00000002c0)="ae227f954d229f666a6cd22938585e852071e55aa5728addcd315922bf32282e077bdbc63cd5ec89626ee2f8e7982ca239eaa758231056cdca22ca27428407f6c64c384665cfbd00ee6e0d7609f2c7ba0f28b4af70d0307ef78decfe42973915cd509de7c19ea0f3f5c3caaab05f9af08e2cc82d2c14b919dd045e3d36ce1c5d0ff23aed0a4a6ef508b5e71df0a25250d47f1e033ed503b6df99c189111b75b59df679cb75240b756cafecfd203568eeb2c1708fe9f11a2cb0f288590ec76cefbde09c90e9d568492aa5f41196397b70c869838c7164f2bad8eff017d021d7d41c9025c20b", 0xe5, 0x3}, {&(0x7f00000003c0)="792eb6eec33e561f18dc4b58b6a6fb3c7e6fd5e612c08490216ae02617f9811945929cffbf59727393a9a69d57b00a5cd08da3888884b8361d6a4003a54480c1086a5fc876582ff049ede86e2f58d80c7b6cf618e1ba36d4710887bc34ef2b7abbc686df2185f99998060bf492b84e3a02077e2aaf014e1186fde602d2b639d467f48fc2e18cf1553e07ac39040953566ab1d21aac627b166825375377bc3332b62160ea8bf7fc3196b30965dce6181bf7a1c60d0270f24b", 0xb8, 0x100000000}, {0x0, 0x0, 0x7}], 0x21008, &(0x7f0000000900)={[{'.log\x00'}, {'-%('}, {'.log\x00'}], [{@obj_user={'obj_user'}}, {@appraise_type='appraise_type=imasig'}, {@fowner_eq={'fowner', 0x3d, 0xee01}}, {@hash='hash'}, {@subj_type={'subj_type', 0x3d, '-&'}}]}) ioctl$BTRFS_IOC_SUBVOL_SETFLAGS(r4, 0x4008941a, &(0x7f0000000980)=0xfe33b054cbbc4d79) 11:25:37 executing program 4: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x7f, 0x80000000008001}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x38, 0x0, 0x0, 0x0, 0x9}, 0x0) r1 = open(&(0x7f0000000240)='./file1\x00', 0x141142, 0x0) write$UHID_INPUT(r1, &(0x7f0000001440), 0xfffffc41) open(&(0x7f00000001c0)='./file1\x00', 0x0, 0xfffffff6) setxattr$trusted_overlay_nlink(&(0x7f0000000000)='./file1\x00', &(0x7f00000000c0)='trusted.overlay.nlink\x00', 0x0, 0x0, 0x0) [ 603.011028][T28675] loop0: detected capacity change from 264192 to 0 11:25:37 executing program 1: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x7f, 0x80000000008001}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x9}, 0x0) r1 = open(&(0x7f0000000240)='./file1\x00', 0x141142, 0x0) write$UHID_INPUT(r1, &(0x7f0000001440), 0xfffffc41) open(&(0x7f00000001c0)='./file1\x00', 0x0, 0xeaffffff00000000) setxattr$trusted_overlay_nlink(&(0x7f0000000000)='./file1\x00', &(0x7f00000000c0)='trusted.overlay.nlink\x00', 0x0, 0x0, 0x0) 11:25:37 executing program 5: write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000540)=ANY=[@ANYBLOB="7f454c4601061f000400000000000000030038000800000032000000000000004000000000000000560200000000000007000000008038000100090002000100010000000100000006000000000000000400000000000000060000000000000001040000000000000200000000000000010000000000000051e574640400000001000000000000000400000000000000050000000000000005000000000000000400000000000000ff24444700000000908bc001727fbcd44f4d3bf922995edf2fd379eb00"/489], 0x2c4) r0 = inotify_init() r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) epoll_ctl$EPOLL_CTL_DEL(0xffffffffffffffff, 0x2, r1) inotify_add_watch(r0, &(0x7f0000000000)='.\x00', 0x400017e) r2 = openat$incfs(0xffffffffffffffff, &(0x7f0000000080)='.log\x00', 0x0, 0x0) fcntl$getownex(r2, 0x10, &(0x7f00000000c0)) r3 = open(&(0x7f0000000040)='./file0\x00', 0x200c2, 0x0) write$binfmt_elf64(r3, &(0x7f0000000080)=ANY=[], 0x8) sendfile(r3, r3, &(0x7f00000001c0), 0xa198) dup(0xffffffffffffffff) syz_mount_image$gfs2meta(&(0x7f0000000140)='gfs2meta\x00', &(0x7f0000000200)='./file0\x00', 0x1000, 0x0, 0x0, 0x0, &(0x7f0000000900)={[{'.log\x00'}, {'-%('}, {'.log\x00'}], [{@appraise_type='appraise_type=imasig'}, {@fowner_eq={'fowner', 0x3d, 0xee01}}, {@hash='hash'}, {@subj_type={'subj_type', 0x3d, '-&'}}]}) ioctl$BTRFS_IOC_SUBVOL_SETFLAGS(0xffffffffffffffff, 0x4008941a, &(0x7f0000000980)=0xfe33b054cbbc4d79) 11:25:37 executing program 2: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x7f, 0x80000000008001}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x9}, 0x0) r1 = open(&(0x7f0000000240)='./file1\x00', 0x141142, 0x0) write$UHID_INPUT(r1, &(0x7f0000001440)={0x8, {'\x00v\x00'}}, 0xfffffc41) open(&(0x7f00000001c0)='./file1\x00', 0x0, 0x0) setxattr$trusted_overlay_nlink(&(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x0, 0x0) 11:25:37 executing program 3: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x7f, 0x80000000008001}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x9}, 0x0) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000080)) r1 = open(&(0x7f0000000240)='./file1\x00', 0x141142, 0x0) write$UHID_INPUT(r1, &(0x7f0000001440)={0x8, {'\x00q\x00'}}, 0xfffffc41) open(&(0x7f00000001c0)='./file1\x00', 0x0, 0x0) setxattr$trusted_overlay_nlink(&(0x7f0000000000)='./file1\x00', &(0x7f00000000c0)='trusted.overlay.nlink\x00', 0x0, 0x0, 0x0) 11:25:37 executing program 0: r0 = perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x5c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write$binfmt_elf64(r0, &(0x7f0000000540)=ANY=[@ANYBLOB], 0x2c4) r1 = inotify_init() openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) epoll_ctl$EPOLL_CTL_DEL(0xffffffffffffffff, 0x2, 0xffffffffffffffff) inotify_add_watch(r1, &(0x7f0000000000)='.\x00', 0x400017e) r2 = openat$incfs(0xffffffffffffffff, &(0x7f0000000080)='.log\x00', 0x20200, 0x40) fcntl$getownex(r2, 0x10, &(0x7f00000000c0)) r3 = open(&(0x7f0000000040)='./file0\x00', 0x200c2, 0x0) write$binfmt_elf64(r3, &(0x7f0000000080)=ANY=[], 0x8) sendfile(r3, r3, &(0x7f00000001c0), 0xa198) dup(0xffffffffffffffff) r4 = syz_mount_image$gfs2meta(&(0x7f0000000140)='gfs2meta\x00', &(0x7f0000000200)='./file0\x00', 0x1000, 0x4, &(0x7f0000000880)=[{&(0x7f0000000240)="77ba0daae1b2e74ecd52c59a85bf6f4b1f0b01ab07ba92bc6e57305406115f2bc3e4dd94f19ed896c4fccd34271e9dc3499af9298dbc709e0e6a513d61391d4b198af5f55d24239ae934e8babb8d1cb67bb17b0158", 0x55, 0x3}, {&(0x7f00000002c0)="ae227f954d229f666a6cd22938585e852071e55aa5728addcd315922bf32282e077bdbc63cd5ec89626ee2f8e7982ca239eaa758231056cdca22ca27428407f6c64c384665cfbd00ee6e0d7609f2c7ba0f28b4af70d0307ef78decfe42973915cd509de7c19ea0f3f5c3caaab05f9af08e2cc82d2c14b919dd045e3d36ce1c5d0ff23aed0a4a6ef508b5e71df0a25250d47f1e033ed503b6df99c189111b75b59df679cb75240b756cafecfd203568eeb2c1708fe9f11a2cb0f288590ec76cefbde09c90e9d568492aa5f41196397b70c869838c7164f2bad8eff017d021d7d41c9025c20b", 0xe5, 0x3}, {&(0x7f00000003c0)="792eb6eec33e561f18dc4b58b6a6fb3c7e6fd5e612c08490216ae02617f9811945929cffbf59727393a9a69d57b00a5cd08da3888884b8361d6a4003a54480c1086a5fc876582ff049ede86e2f58d80c7b6cf618e1ba36d4710887bc34ef2b7abbc686df2185f99998060bf492b84e3a02077e2aaf014e1186fde602d2b639d467f48fc2e18cf1553e07ac39040953566ab1d21aac627b166825375377bc3332b62160ea8bf7fc3196b30965dce6181bf7a1c60d0270f24ba6", 0xb9}, {0x0, 0x0, 0x7}], 0x21008, &(0x7f0000000900)={[{'.log\x00'}, {'-%('}, {'.log\x00'}], [{@obj_user={'obj_user'}}, {@appraise_type='appraise_type=imasig'}, {@fowner_eq={'fowner', 0x3d, 0xee01}}, {@hash='hash'}, {@subj_type={'subj_type', 0x3d, '-&'}}]}) ioctl$BTRFS_IOC_SUBVOL_SETFLAGS(r4, 0x4008941a, &(0x7f0000000980)=0xfe33b054cbbc4d79) [ 603.970175][T28705] loop0: detected capacity change from 8 to 0 11:25:38 executing program 4: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x7f, 0x80000000008001}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x38, 0x0, 0x0, 0x0, 0x9}, 0x0) r1 = open(&(0x7f0000000240)='./file1\x00', 0x141142, 0x0) write$UHID_INPUT(r1, &(0x7f0000001440), 0xfffffc41) open(&(0x7f00000001c0)='./file1\x00', 0x0, 0xfffffff6) setxattr$trusted_overlay_nlink(&(0x7f0000000000)='./file1\x00', &(0x7f00000000c0)='trusted.overlay.nlink\x00', 0x0, 0x0, 0x0) 11:25:38 executing program 5: write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000540)=ANY=[@ANYBLOB="7f454c4601061f000400000000000000030038000800000032000000000000004000000000000000560200000000000007000000008038000100090002000100010000000100000006000000000000000400000000000000060000000000000001040000000000000200000000000000010000000000000051e574640400000001000000000000000400000000000000050000000000000005000000000000000400000000000000ff24444700000000908bc001727fbcd44f4d3bf922995edf2fd379eb00"/489], 0x2c4) r0 = inotify_init() r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) epoll_ctl$EPOLL_CTL_DEL(0xffffffffffffffff, 0x2, r1) inotify_add_watch(r0, &(0x7f0000000000)='.\x00', 0x400017e) r2 = openat$incfs(0xffffffffffffffff, &(0x7f0000000080)='.log\x00', 0x0, 0x0) fcntl$getownex(r2, 0x10, &(0x7f00000000c0)) r3 = open(&(0x7f0000000040)='./file0\x00', 0x200c2, 0x0) write$binfmt_elf64(r3, &(0x7f0000000080)=ANY=[], 0x8) sendfile(r3, r3, &(0x7f00000001c0), 0xa198) dup(0xffffffffffffffff) r4 = syz_mount_image$gfs2meta(&(0x7f0000000140)='gfs2meta\x00', &(0x7f0000000200)='./file0\x00', 0x1000, 0x0, 0x0, 0x0, &(0x7f0000000900)={[{'.log\x00'}, {'-%('}, {'.log\x00'}], [{@appraise_type='appraise_type=imasig'}, {@fowner_eq={'fowner', 0x3d, 0xee01}}, {@hash='hash'}, {@subj_type={'subj_type', 0x3d, '-&'}}]}) ioctl$BTRFS_IOC_SUBVOL_SETFLAGS(r4, 0x4008941a, 0x0) 11:25:38 executing program 1: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x7f, 0x80000000008001}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x9}, 0x0) r1 = open(&(0x7f0000000240)='./file1\x00', 0x141142, 0x0) write$UHID_INPUT(r1, &(0x7f0000001440), 0xfffffc41) open(&(0x7f00000001c0)='./file1\x00', 0x0, 0xf6ffffff00000000) setxattr$trusted_overlay_nlink(&(0x7f0000000000)='./file1\x00', &(0x7f00000000c0)='trusted.overlay.nlink\x00', 0x0, 0x0, 0x0) 11:25:38 executing program 2: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x7f, 0x80000000008001}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x9}, 0x0) r1 = open(&(0x7f0000000240)='./file1\x00', 0x141142, 0x0) write$UHID_INPUT(r1, &(0x7f0000001440)={0x8, {'\x00w\x00'}}, 0xfffffc41) open(&(0x7f00000001c0)='./file1\x00', 0x0, 0x0) setxattr$trusted_overlay_nlink(&(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x0, 0x0) 11:25:38 executing program 0: r0 = perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x5c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write$binfmt_elf64(r0, &(0x7f0000000540)=ANY=[@ANYBLOB], 0x2c4) r1 = inotify_init() openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) epoll_ctl$EPOLL_CTL_DEL(0xffffffffffffffff, 0x2, 0xffffffffffffffff) inotify_add_watch(r1, &(0x7f0000000000)='.\x00', 0x400017e) r2 = openat$incfs(0xffffffffffffffff, &(0x7f0000000080)='.log\x00', 0x20200, 0x40) fcntl$getownex(r2, 0x10, &(0x7f00000000c0)) r3 = open(&(0x7f0000000040)='./file0\x00', 0x200c2, 0x0) write$binfmt_elf64(r3, &(0x7f0000000080)=ANY=[], 0x8) sendfile(r3, r3, &(0x7f00000001c0), 0xa198) dup(0xffffffffffffffff) r4 = syz_mount_image$gfs2meta(&(0x7f0000000140)='gfs2meta\x00', &(0x7f0000000200)='./file0\x00', 0x1000, 0x4, &(0x7f0000000880)=[{&(0x7f0000000240)="77ba0daae1b2e74ecd52c59a85bf6f4b1f0b01ab07ba92bc6e57305406115f2bc3e4dd94f19ed896c4fccd34271e9dc3499af9298dbc709e0e6a513d61391d4b198af5f55d24239ae934e8babb8d1cb67bb17b0158", 0x55, 0x3}, {&(0x7f00000002c0)="ae227f954d229f666a6cd22938585e852071e55aa5728addcd315922bf32282e077bdbc63cd5ec89626ee2f8e7982ca239eaa758231056cdca22ca27428407f6c64c384665cfbd00ee6e0d7609f2c7ba0f28b4af70d0307ef78decfe42973915cd509de7c19ea0f3f5c3caaab05f9af08e2cc82d2c14b919dd045e3d36ce1c5d0ff23aed0a4a6ef508b5e71df0a25250d47f1e033ed503b6df99c189111b75b59df679cb75240b756cafecfd203568eeb2c1708fe9f11a2cb0f288590ec76cefbde09c90e9d568492aa5f41196397b70c869838c7164f2bad8eff017d021d7d41c9025c20b", 0xe5, 0x3}, {&(0x7f00000003c0)="792eb6eec33e561f18dc4b58b6a6fb3c7e6fd5e612c08490216ae02617f9811945929cffbf59727393a9a69d57b00a5cd08da3888884b8361d6a4003a54480c1086a5fc876582ff049ede86e2f58d80c7b6cf618e1ba36d4710887bc34ef2b7abbc686df2185f99998060bf492b84e3a02077e2aaf014e1186fde602d2b639d467f48fc2e18cf1553e07ac39040953566ab1d21aac627b166825375377bc3332b62160ea8bf7fc3196b30965dce6181bf7a1c60d0270f24ba6", 0xb9}, {0x0, 0x0, 0x7}], 0x21008, &(0x7f0000000900)={[{'.log\x00'}, {'-%('}, {'.log\x00'}], [{@obj_user={'obj_user'}}, {@appraise_type='appraise_type=imasig'}, {@fowner_eq={'fowner', 0x3d, 0xee01}}, {@hash='hash'}, {@subj_type={'subj_type', 0x3d, '-&'}}]}) ioctl$BTRFS_IOC_SUBVOL_SETFLAGS(r4, 0x4008941a, &(0x7f0000000980)=0xfe33b054cbbc4d79) 11:25:39 executing program 3: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x7f, 0x80000000008001}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x9}, 0x0) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000080)) r1 = open(&(0x7f0000000240)='./file1\x00', 0x141142, 0x0) write$UHID_INPUT(r1, &(0x7f0000001440)={0x8, {'\x00r\x00'}}, 0xfffffc41) open(&(0x7f00000001c0)='./file1\x00', 0x0, 0x0) setxattr$trusted_overlay_nlink(&(0x7f0000000000)='./file1\x00', &(0x7f00000000c0)='trusted.overlay.nlink\x00', 0x0, 0x0, 0x0) [ 604.967996][T28733] loop0: detected capacity change from 8 to 0 11:25:39 executing program 4: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x7f, 0x80000000008001}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x38, 0x2}, 0x0) r1 = open(&(0x7f0000000240)='./file1\x00', 0x141142, 0x0) write$UHID_INPUT(r1, &(0x7f0000001440), 0xfffffc41) open(&(0x7f00000001c0)='./file1\x00', 0x0, 0xfffffff6) setxattr$trusted_overlay_nlink(&(0x7f0000000000)='./file1\x00', &(0x7f00000000c0)='trusted.overlay.nlink\x00', 0x0, 0x0, 0x0) 11:25:39 executing program 1: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x7f, 0x80000000008001}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x9}, 0x0) r1 = open(&(0x7f0000000240)='./file1\x00', 0x141142, 0x0) write$UHID_INPUT(r1, &(0x7f0000001440), 0xfffffc41) open(&(0x7f00000001c0)='./file1\x00', 0x0, 0xfeffffff00000000) setxattr$trusted_overlay_nlink(&(0x7f0000000000)='./file1\x00', &(0x7f00000000c0)='trusted.overlay.nlink\x00', 0x0, 0x0, 0x0) 11:25:39 executing program 5: write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000540)=ANY=[@ANYBLOB="7f454c4601061f000400000000000000030038000800000032000000000000004000000000000000560200000000000007000000008038000100090002000100010000000100000006000000000000000400000000000000060000000000000001040000000000000200000000000000010000000000000051e574640400000001000000000000000400000000000000050000000000000005000000000000000400000000000000ff24444700000000908bc001727fbcd44f4d3bf922995edf2fd379eb00"/489], 0x2c4) r0 = inotify_init() r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) epoll_ctl$EPOLL_CTL_DEL(0xffffffffffffffff, 0x2, r1) inotify_add_watch(r0, &(0x7f0000000000)='.\x00', 0x400017e) r2 = openat$incfs(0xffffffffffffffff, &(0x7f0000000080)='.log\x00', 0x0, 0x0) fcntl$getownex(r2, 0x10, &(0x7f00000000c0)) r3 = open(&(0x7f0000000040)='./file0\x00', 0x200c2, 0x0) write$binfmt_elf64(r3, &(0x7f0000000080)=ANY=[], 0x8) sendfile(r3, r3, &(0x7f00000001c0), 0xa198) dup(0xffffffffffffffff) r4 = syz_mount_image$gfs2meta(&(0x7f0000000140)='gfs2meta\x00', &(0x7f0000000200)='./file0\x00', 0x1000, 0x0, 0x0, 0x0, &(0x7f0000000900)={[{'.log\x00'}, {'-%('}, {'.log\x00'}], [{@appraise_type='appraise_type=imasig'}, {@fowner_eq={'fowner', 0x3d, 0xee01}}, {@hash='hash'}, {@subj_type={'subj_type', 0x3d, '-&'}}]}) ioctl$BTRFS_IOC_SUBVOL_SETFLAGS(r4, 0x4008941a, 0x0) 11:25:39 executing program 0: r0 = perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x5c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write$binfmt_elf64(r0, &(0x7f0000000540)=ANY=[@ANYBLOB], 0x2c4) r1 = inotify_init() openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) epoll_ctl$EPOLL_CTL_DEL(0xffffffffffffffff, 0x2, 0xffffffffffffffff) inotify_add_watch(r1, &(0x7f0000000000)='.\x00', 0x400017e) r2 = openat$incfs(0xffffffffffffffff, &(0x7f0000000080)='.log\x00', 0x20200, 0x40) fcntl$getownex(r2, 0x10, &(0x7f00000000c0)) r3 = open(&(0x7f0000000040)='./file0\x00', 0x200c2, 0x0) write$binfmt_elf64(r3, &(0x7f0000000080)=ANY=[], 0x8) sendfile(r3, r3, &(0x7f00000001c0), 0xa198) dup(0xffffffffffffffff) r4 = syz_mount_image$gfs2meta(&(0x7f0000000140)='gfs2meta\x00', &(0x7f0000000200)='./file0\x00', 0x1000, 0x4, &(0x7f0000000880)=[{&(0x7f0000000240)="77ba0daae1b2e74ecd52c59a85bf6f4b1f0b01ab07ba92bc6e57305406115f2bc3e4dd94f19ed896c4fccd34271e9dc3499af9298dbc709e0e6a513d61391d4b198af5f55d24239ae934e8babb8d1cb67bb17b0158", 0x55, 0x3}, {&(0x7f00000002c0)="ae227f954d229f666a6cd22938585e852071e55aa5728addcd315922bf32282e077bdbc63cd5ec89626ee2f8e7982ca239eaa758231056cdca22ca27428407f6c64c384665cfbd00ee6e0d7609f2c7ba0f28b4af70d0307ef78decfe42973915cd509de7c19ea0f3f5c3caaab05f9af08e2cc82d2c14b919dd045e3d36ce1c5d0ff23aed0a4a6ef508b5e71df0a25250d47f1e033ed503b6df99c189111b75b59df679cb75240b756cafecfd203568eeb2c1708fe9f11a2cb0f288590ec76cefbde09c90e9d568492aa5f41196397b70c869838c7164f2bad8eff017d021d7d41c9025c20b", 0xe5, 0x3}, {&(0x7f00000003c0)="792eb6eec33e561f18dc4b58b6a6fb3c7e6fd5e612c08490216ae02617f9811945929cffbf59727393a9a69d57b00a5cd08da3888884b8361d6a4003a54480c1086a5fc876582ff049ede86e2f58d80c7b6cf618e1ba36d4710887bc34ef2b7abbc686df2185f99998060bf492b84e3a02077e2aaf014e1186fde602d2b639d467f48fc2e18cf1553e07ac39040953566ab1d21aac627b166825375377bc3332b62160ea8bf7fc3196b30965dce6181bf7a1c60d0270f24ba6", 0xb9}, {0x0, 0x0, 0x7}], 0x21008, &(0x7f0000000900)={[{'.log\x00'}, {'-%('}, {'.log\x00'}], [{@obj_user={'obj_user'}}, {@appraise_type='appraise_type=imasig'}, {@fowner_eq={'fowner', 0x3d, 0xee01}}, {@hash='hash'}, {@subj_type={'subj_type', 0x3d, '-&'}}]}) ioctl$BTRFS_IOC_SUBVOL_SETFLAGS(r4, 0x4008941a, &(0x7f0000000980)=0xfe33b054cbbc4d79) 11:25:39 executing program 2: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x7f, 0x80000000008001}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x9}, 0x0) r1 = open(&(0x7f0000000240)='./file1\x00', 0x141142, 0x0) write$UHID_INPUT(r1, &(0x7f0000001440)={0x8, {'\x00x\x00'}}, 0xfffffc41) open(&(0x7f00000001c0)='./file1\x00', 0x0, 0x0) setxattr$trusted_overlay_nlink(&(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x0, 0x0) [ 605.876985][T28768] loop0: detected capacity change from 8 to 0 [ 605.915072][ T35] kauditd_printk_skb: 34 callbacks suppressed [ 605.915080][ T35] audit: type=1804 audit(1612178739.992:2528): pid=28746 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.3" name="/root/syzkaller-testdir548988167/syzkaller.gb8agU/437/file1" dev="sda1" ino=15985 res=1 errno=0 [ 606.096065][ T35] audit: type=1804 audit(1612178740.102:2529): pid=28747 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.3" name="/root/syzkaller-testdir548988167/syzkaller.gb8agU/437/file1" dev="sda1" ino=15985 res=1 errno=0 11:25:40 executing program 3: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x7f, 0x80000000008001}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x9}, 0x0) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000080)) r1 = open(&(0x7f0000000240)='./file1\x00', 0x141142, 0x0) write$UHID_INPUT(r1, &(0x7f0000001440)={0x8, {'\x00s\x00'}}, 0xfffffc41) open(&(0x7f00000001c0)='./file1\x00', 0x0, 0x0) setxattr$trusted_overlay_nlink(&(0x7f0000000000)='./file1\x00', &(0x7f00000000c0)='trusted.overlay.nlink\x00', 0x0, 0x0, 0x0) [ 606.243913][ T35] audit: type=1804 audit(1612178740.132:2530): pid=28758 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.4" name="/root/syzkaller-testdir068764309/syzkaller.I2gCPs/490/file1" dev="sda1" ino=15962 res=1 errno=0 11:25:40 executing program 4: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x7f, 0x80000000008001}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x38, 0x2}, 0x0) r1 = open(&(0x7f0000000240)='./file1\x00', 0x141142, 0x0) write$UHID_INPUT(r1, &(0x7f0000001440), 0xfffffc41) open(&(0x7f00000001c0)='./file1\x00', 0x0, 0xfffffff6) setxattr$trusted_overlay_nlink(&(0x7f0000000000)='./file1\x00', &(0x7f00000000c0)='trusted.overlay.nlink\x00', 0x0, 0x0, 0x0) 11:25:40 executing program 5: write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000540)=ANY=[@ANYBLOB="7f454c4601061f000400000000000000030038000800000032000000000000004000000000000000560200000000000007000000008038000100090002000100010000000100000006000000000000000400000000000000060000000000000001040000000000000200000000000000010000000000000051e574640400000001000000000000000400000000000000050000000000000005000000000000000400000000000000ff24444700000000908bc001727fbcd44f4d3bf922995edf2fd379eb00"/489], 0x2c4) r0 = inotify_init() r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) epoll_ctl$EPOLL_CTL_DEL(0xffffffffffffffff, 0x2, r1) inotify_add_watch(r0, &(0x7f0000000000)='.\x00', 0x400017e) r2 = openat$incfs(0xffffffffffffffff, &(0x7f0000000080)='.log\x00', 0x0, 0x0) fcntl$getownex(r2, 0x10, &(0x7f00000000c0)) r3 = open(&(0x7f0000000040)='./file0\x00', 0x200c2, 0x0) write$binfmt_elf64(r3, &(0x7f0000000080)=ANY=[], 0x8) sendfile(r3, r3, &(0x7f00000001c0), 0xa198) dup(0xffffffffffffffff) r4 = syz_mount_image$gfs2meta(&(0x7f0000000140)='gfs2meta\x00', &(0x7f0000000200)='./file0\x00', 0x1000, 0x0, 0x0, 0x0, &(0x7f0000000900)={[{'.log\x00'}, {'-%('}, {'.log\x00'}], [{@appraise_type='appraise_type=imasig'}, {@fowner_eq={'fowner', 0x3d, 0xee01}}, {@hash='hash'}, {@subj_type={'subj_type', 0x3d, '-&'}}]}) ioctl$BTRFS_IOC_SUBVOL_SETFLAGS(r4, 0x4008941a, 0x0) [ 606.417771][ T35] audit: type=1804 audit(1612178740.482:2531): pid=28763 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.1" name="/root/syzkaller-testdir551554057/syzkaller.l2Zg4z/435/file1" dev="sda1" ino=15980 res=1 errno=0 [ 606.512585][ T35] audit: type=1804 audit(1612178740.532:2532): pid=28764 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.1" name="/root/syzkaller-testdir551554057/syzkaller.l2Zg4z/435/file1" dev="sda1" ino=15980 res=1 errno=0 11:25:40 executing program 1: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x7f, 0x80000000008001}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x9}, 0x0) r1 = open(&(0x7f0000000240)='./file1\x00', 0x141142, 0x0) write$UHID_INPUT(r1, &(0x7f0000001440), 0xfffffc41) open(&(0x7f00000001c0)='./file1\x00', 0x0, 0xff00000000000000) setxattr$trusted_overlay_nlink(&(0x7f0000000000)='./file1\x00', &(0x7f00000000c0)='trusted.overlay.nlink\x00', 0x0, 0x0, 0x0) 11:25:40 executing program 0: r0 = perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x5c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write$binfmt_elf64(r0, &(0x7f0000000540)=ANY=[@ANYBLOB], 0x2c4) r1 = inotify_init() openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) epoll_ctl$EPOLL_CTL_DEL(0xffffffffffffffff, 0x2, 0xffffffffffffffff) inotify_add_watch(r1, &(0x7f0000000000)='.\x00', 0x400017e) r2 = openat$incfs(0xffffffffffffffff, &(0x7f0000000080)='.log\x00', 0x20200, 0x40) fcntl$getownex(r2, 0x10, &(0x7f00000000c0)) r3 = open(&(0x7f0000000040)='./file0\x00', 0x200c2, 0x0) write$binfmt_elf64(r3, &(0x7f0000000080)=ANY=[], 0x8) sendfile(r3, r3, &(0x7f00000001c0), 0xa198) dup(0xffffffffffffffff) r4 = syz_mount_image$gfs2meta(&(0x7f0000000140)='gfs2meta\x00', &(0x7f0000000200)='./file0\x00', 0x1000, 0x3, &(0x7f0000000880)=[{&(0x7f0000000240)="77ba0daae1b2e74ecd52c59a85bf6f4b1f0b01ab07ba92bc6e57305406115f2bc3e4dd94f19ed896c4fccd34271e9dc3499af9298dbc709e0e6a513d61391d4b198af5f55d24239ae934e8babb8d1cb67bb17b0158", 0x55, 0x3}, {&(0x7f00000003c0)="792eb6eec33e561f18dc4b58b6a6fb3c7e6fd5e612c08490216ae02617f9811945929cffbf59727393a9a69d57b00a5cd08da3888884b8361d6a4003a54480c1086a5fc876582ff049ede86e2f58d80c7b6cf618e1ba36d4710887bc34ef2b7abbc686df2185f99998060bf492b84e3a02077e2aaf014e1186fde602d2b639d467f48fc2e18cf1553e07ac39040953566ab1d21aac627b166825375377bc3332b62160ea8bf7fc3196b30965dce6181bf7a1c60d0270f24ba6", 0xb9, 0x100000000}, {0x0, 0x0, 0x7}], 0x21008, &(0x7f0000000900)={[{'.log\x00'}, {'-%('}, {'.log\x00'}], [{@obj_user={'obj_user'}}, {@appraise_type='appraise_type=imasig'}, {@fowner_eq={'fowner', 0x3d, 0xee01}}, {@hash='hash'}, {@subj_type={'subj_type', 0x3d, '-&'}}]}) ioctl$BTRFS_IOC_SUBVOL_SETFLAGS(r4, 0x4008941a, &(0x7f0000000980)=0xfe33b054cbbc4d79) [ 606.756616][ T35] audit: type=1804 audit(1612178740.832:2533): pid=28775 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.2" name="/root/syzkaller-testdir245532710/syzkaller.d2c0aK/452/file1" dev="sda1" ino=15989 res=1 errno=0 [ 606.815746][T28796] loop0: detected capacity change from 264192 to 0 [ 606.842417][ T35] audit: type=1804 audit(1612178740.892:2534): pid=28777 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.2" name="/root/syzkaller-testdir245532710/syzkaller.d2c0aK/452/file1" dev="sda1" ino=15989 res=1 errno=0 [ 606.879522][ T35] audit: type=1804 audit(1612178740.892:2535): pid=28775 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor.2" name="/root/syzkaller-testdir245532710/syzkaller.d2c0aK/452/file1" dev="sda1" ino=15989 res=1 errno=0 11:25:41 executing program 2: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x7f, 0x80000000008001}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x9}, 0x0) r1 = open(&(0x7f0000000240)='./file1\x00', 0x141142, 0x0) write$UHID_INPUT(r1, &(0x7f0000001440)={0x8, {'\x00y\x00'}}, 0xfffffc41) open(&(0x7f00000001c0)='./file1\x00', 0x0, 0x0) setxattr$trusted_overlay_nlink(&(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x0, 0x0) [ 607.137247][ T35] audit: type=1804 audit(1612178741.212:2536): pid=28786 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.3" name="/root/syzkaller-testdir548988167/syzkaller.gb8agU/438/file1" dev="sda1" ino=15962 res=1 errno=0 [ 607.238865][ T35] audit: type=1804 audit(1612178741.302:2537): pid=28790 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.4" name="/root/syzkaller-testdir068764309/syzkaller.I2gCPs/491/file1" dev="sda1" ino=15985 res=1 errno=0 11:25:41 executing program 5: write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000540)=ANY=[@ANYBLOB="7f454c4601061f000400000000000000030038000800000032000000000000004000000000000000560200000000000007000000008038000100090002000100010000000100000006000000000000000400000000000000060000000000000001040000000000000200000000000000010000000000000051e574640400000001000000000000000400000000000000050000000000000005000000000000000400000000000000ff24444700000000908bc001727fbcd44f4d3bf922995edf2fd379eb00"/489], 0x2c4) r0 = inotify_init() r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) epoll_ctl$EPOLL_CTL_DEL(0xffffffffffffffff, 0x2, r1) inotify_add_watch(r0, &(0x7f0000000000)='.\x00', 0x400017e) r2 = openat$incfs(0xffffffffffffffff, &(0x7f0000000080)='.log\x00', 0x0, 0x0) fcntl$getownex(r2, 0x10, &(0x7f00000000c0)) r3 = open(&(0x7f0000000040)='./file0\x00', 0x200c2, 0x0) write$binfmt_elf64(r3, &(0x7f0000000080)=ANY=[], 0x8) sendfile(r3, r3, &(0x7f00000001c0), 0xa198) dup(0xffffffffffffffff) r4 = syz_mount_image$gfs2meta(&(0x7f0000000140)='gfs2meta\x00', &(0x7f0000000200)='./file0\x00', 0x1000, 0x0, 0x0, 0x0, &(0x7f0000000900)={[{'.log\x00'}, {'-%('}, {'.log\x00'}], [{@appraise_type='appraise_type=imasig'}, {@fowner_eq={'fowner', 0x3d, 0xee01}}, {@hash='hash'}, {@subj_type={'subj_type', 0x3d, '-&'}}]}) ioctl$BTRFS_IOC_SUBVOL_SETFLAGS(r4, 0x4008941a, &(0x7f0000000980)) 11:25:41 executing program 3: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x7f, 0x80000000008001}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x9}, 0x0) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000080)) r1 = open(&(0x7f0000000240)='./file1\x00', 0x141142, 0x0) write$UHID_INPUT(r1, &(0x7f0000001440)={0x8, {'\x00t\x00'}}, 0xfffffc41) open(&(0x7f00000001c0)='./file1\x00', 0x0, 0x0) setxattr$trusted_overlay_nlink(&(0x7f0000000000)='./file1\x00', &(0x7f00000000c0)='trusted.overlay.nlink\x00', 0x0, 0x0, 0x0) 11:25:41 executing program 0: r0 = perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x5c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write$binfmt_elf64(r0, &(0x7f0000000540)=ANY=[@ANYBLOB], 0x2c4) r1 = inotify_init() openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) epoll_ctl$EPOLL_CTL_DEL(0xffffffffffffffff, 0x2, 0xffffffffffffffff) inotify_add_watch(r1, &(0x7f0000000000)='.\x00', 0x400017e) r2 = openat$incfs(0xffffffffffffffff, &(0x7f0000000080)='.log\x00', 0x20200, 0x40) fcntl$getownex(r2, 0x10, &(0x7f00000000c0)) r3 = open(&(0x7f0000000040)='./file0\x00', 0x200c2, 0x0) write$binfmt_elf64(r3, &(0x7f0000000080)=ANY=[], 0x8) sendfile(r3, r3, &(0x7f00000001c0), 0xa198) dup(0xffffffffffffffff) r4 = syz_mount_image$gfs2meta(&(0x7f0000000140)='gfs2meta\x00', &(0x7f0000000200)='./file0\x00', 0x1000, 0x3, &(0x7f0000000880)=[{&(0x7f0000000240)="77ba0daae1b2e74ecd52c59a85bf6f4b1f0b01ab07ba92bc6e57305406115f2bc3e4dd94f19ed896c4fccd34271e9dc3499af9298dbc709e0e6a513d61391d4b198af5f55d24239ae934e8babb8d1cb67bb17b0158", 0x55, 0x3}, {&(0x7f00000003c0)="792eb6eec33e561f18dc4b58b6a6fb3c7e6fd5e612c08490216ae02617f9811945929cffbf59727393a9a69d57b00a5cd08da3888884b8361d6a4003a54480c1086a5fc876582ff049ede86e2f58d80c7b6cf618e1ba36d4710887bc34ef2b7abbc686df2185f99998060bf492b84e3a02077e2aaf014e1186fde602d2b639d467f48fc2e18cf1553e07ac39040953566ab1d21aac627b166825375377bc3332b62160ea8bf7fc3196b30965dce6181bf7a1c60d0270f24ba6", 0xb9, 0x100000000}, {0x0, 0x0, 0x7}], 0x21008, &(0x7f0000000900)={[{'.log\x00'}, {'-%('}, {'.log\x00'}], [{@obj_user={'obj_user'}}, {@appraise_type='appraise_type=imasig'}, {@fowner_eq={'fowner', 0x3d, 0xee01}}, {@hash='hash'}, {@subj_type={'subj_type', 0x3d, '-&'}}]}) ioctl$BTRFS_IOC_SUBVOL_SETFLAGS(r4, 0x4008941a, &(0x7f0000000980)=0xfe33b054cbbc4d79) 11:25:41 executing program 4: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x7f, 0x80000000008001}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x38, 0x2}, 0x0) r1 = open(&(0x7f0000000240)='./file1\x00', 0x141142, 0x0) write$UHID_INPUT(r1, &(0x7f0000001440), 0xfffffc41) open(&(0x7f00000001c0)='./file1\x00', 0x0, 0xfffffff6) setxattr$trusted_overlay_nlink(&(0x7f0000000000)='./file1\x00', &(0x7f00000000c0)='trusted.overlay.nlink\x00', 0x0, 0x0, 0x0) [ 607.762447][T28822] loop0: detected capacity change from 264192 to 0 11:25:42 executing program 1: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x7f, 0x80000000008001}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x9}, 0x0) r1 = open(&(0x7f0000000240)='./file1\x00', 0x141142, 0x0) write$UHID_INPUT(r1, &(0x7f0000001440), 0xfffffc41) open(&(0x7f00000001c0)='./file1\x00', 0x0, 0xffffff7f00000000) setxattr$trusted_overlay_nlink(&(0x7f0000000000)='./file1\x00', &(0x7f00000000c0)='trusted.overlay.nlink\x00', 0x0, 0x0, 0x0) 11:25:42 executing program 2: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x7f, 0x80000000008001}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x9}, 0x0) r1 = open(&(0x7f0000000240)='./file1\x00', 0x141142, 0x0) write$UHID_INPUT(r1, &(0x7f0000001440)={0x8, {'\x00z\x00'}}, 0xfffffc41) open(&(0x7f00000001c0)='./file1\x00', 0x0, 0x0) setxattr$trusted_overlay_nlink(&(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x0, 0x0) 11:25:42 executing program 5: write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000540)=ANY=[@ANYBLOB="7f454c4601061f000400000000000000030038000800000032000000000000004000000000000000560200000000000007000000008038000100090002000100010000000100000006000000000000000400000000000000060000000000000001040000000000000200000000000000010000000000000051e574640400000001000000000000000400000000000000050000000000000005000000000000000400000000000000ff24444700000000908bc001727fbcd44f4d3bf922995edf2fd379eb00"/489], 0x2c4) r0 = inotify_init() r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) epoll_ctl$EPOLL_CTL_DEL(0xffffffffffffffff, 0x2, r1) inotify_add_watch(r0, &(0x7f0000000000)='.\x00', 0x400017e) r2 = openat$incfs(0xffffffffffffffff, &(0x7f0000000080)='.log\x00', 0x0, 0x0) fcntl$getownex(r2, 0x10, &(0x7f00000000c0)) r3 = open(&(0x7f0000000040)='./file0\x00', 0x200c2, 0x0) write$binfmt_elf64(r3, &(0x7f0000000080)=ANY=[], 0x8) sendfile(r3, r3, &(0x7f00000001c0), 0xa198) dup(0xffffffffffffffff) r4 = syz_mount_image$gfs2meta(&(0x7f0000000140)='gfs2meta\x00', &(0x7f0000000200)='./file0\x00', 0x1000, 0x0, 0x0, 0x0, &(0x7f0000000900)={[{'.log\x00'}, {'-%('}, {'.log\x00'}], [{@appraise_type='appraise_type=imasig'}, {@fowner_eq={'fowner', 0x3d, 0xee01}}, {@hash='hash'}, {@subj_type={'subj_type', 0x3d, '-&'}}]}) ioctl$BTRFS_IOC_SUBVOL_SETFLAGS(r4, 0x4008941a, &(0x7f0000000980)) 11:25:42 executing program 0: r0 = perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x5c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write$binfmt_elf64(r0, &(0x7f0000000540)=ANY=[@ANYBLOB], 0x2c4) r1 = inotify_init() openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) epoll_ctl$EPOLL_CTL_DEL(0xffffffffffffffff, 0x2, 0xffffffffffffffff) inotify_add_watch(r1, &(0x7f0000000000)='.\x00', 0x400017e) r2 = openat$incfs(0xffffffffffffffff, &(0x7f0000000080)='.log\x00', 0x20200, 0x40) fcntl$getownex(r2, 0x10, &(0x7f00000000c0)) r3 = open(&(0x7f0000000040)='./file0\x00', 0x200c2, 0x0) write$binfmt_elf64(r3, &(0x7f0000000080)=ANY=[], 0x8) sendfile(r3, r3, &(0x7f00000001c0), 0xa198) dup(0xffffffffffffffff) r4 = syz_mount_image$gfs2meta(&(0x7f0000000140)='gfs2meta\x00', &(0x7f0000000200)='./file0\x00', 0x1000, 0x3, &(0x7f0000000880)=[{&(0x7f0000000240)="77ba0daae1b2e74ecd52c59a85bf6f4b1f0b01ab07ba92bc6e57305406115f2bc3e4dd94f19ed896c4fccd34271e9dc3499af9298dbc709e0e6a513d61391d4b198af5f55d24239ae934e8babb8d1cb67bb17b0158", 0x55, 0x3}, {&(0x7f00000003c0)="792eb6eec33e561f18dc4b58b6a6fb3c7e6fd5e612c08490216ae02617f9811945929cffbf59727393a9a69d57b00a5cd08da3888884b8361d6a4003a54480c1086a5fc876582ff049ede86e2f58d80c7b6cf618e1ba36d4710887bc34ef2b7abbc686df2185f99998060bf492b84e3a02077e2aaf014e1186fde602d2b639d467f48fc2e18cf1553e07ac39040953566ab1d21aac627b166825375377bc3332b62160ea8bf7fc3196b30965dce6181bf7a1c60d0270f24ba6", 0xb9, 0x100000000}, {0x0, 0x0, 0x7}], 0x21008, &(0x7f0000000900)={[{'.log\x00'}, {'-%('}, {'.log\x00'}], [{@obj_user={'obj_user'}}, {@appraise_type='appraise_type=imasig'}, {@fowner_eq={'fowner', 0x3d, 0xee01}}, {@hash='hash'}, {@subj_type={'subj_type', 0x3d, '-&'}}]}) ioctl$BTRFS_IOC_SUBVOL_SETFLAGS(r4, 0x4008941a, &(0x7f0000000980)=0xfe33b054cbbc4d79) 11:25:42 executing program 3: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x7f, 0x80000000008001}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x9}, 0x0) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000080)) r1 = open(&(0x7f0000000240)='./file1\x00', 0x141142, 0x0) write$UHID_INPUT(r1, &(0x7f0000001440)={0x8, {'\x00u\x00'}}, 0xfffffc41) open(&(0x7f00000001c0)='./file1\x00', 0x0, 0x0) setxattr$trusted_overlay_nlink(&(0x7f0000000000)='./file1\x00', &(0x7f00000000c0)='trusted.overlay.nlink\x00', 0x0, 0x0, 0x0) 11:25:42 executing program 4: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x7f, 0x80000000008001}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x9}, 0x0) r1 = open(0x0, 0x141142, 0x0) write$UHID_INPUT(r1, &(0x7f0000001440), 0xfffffc41) open(&(0x7f00000001c0)='./file1\x00', 0x0, 0xfffffff6) setxattr$trusted_overlay_nlink(&(0x7f0000000000)='./file1\x00', &(0x7f00000000c0)='trusted.overlay.nlink\x00', 0x0, 0x0, 0x0) [ 608.784107][T28857] loop0: detected capacity change from 264192 to 0 11:25:43 executing program 4: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x7f, 0x80000000008001}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x9}, 0x0) r1 = open(0x0, 0x141142, 0x0) write$UHID_INPUT(r1, &(0x7f0000001440), 0xfffffc41) open(&(0x7f00000001c0)='./file1\x00', 0x0, 0xfffffff6) setxattr$trusted_overlay_nlink(&(0x7f0000000000)='./file1\x00', &(0x7f00000000c0)='trusted.overlay.nlink\x00', 0x0, 0x0, 0x0) 11:25:43 executing program 4: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x7f, 0x80000000008001}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x9}, 0x0) r1 = open(0x0, 0x141142, 0x0) write$UHID_INPUT(r1, &(0x7f0000001440), 0xfffffc41) open(&(0x7f00000001c0)='./file1\x00', 0x0, 0xfffffff6) setxattr$trusted_overlay_nlink(&(0x7f0000000000)='./file1\x00', &(0x7f00000000c0)='trusted.overlay.nlink\x00', 0x0, 0x0, 0x0) 11:25:43 executing program 1: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x7f, 0x80000000008001}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x9}, 0x0) r1 = open(&(0x7f0000000240)='./file1\x00', 0x141142, 0x0) write$UHID_INPUT(r1, &(0x7f0000001440), 0xfffffc41) open(&(0x7f00000001c0)='./file1\x00', 0x0, 0xffffffff00000000) setxattr$trusted_overlay_nlink(&(0x7f0000000000)='./file1\x00', &(0x7f00000000c0)='trusted.overlay.nlink\x00', 0x0, 0x0, 0x0) 11:25:43 executing program 4: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x7f, 0x80000000008001}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x9}, 0x0) r1 = open(&(0x7f0000000240)='./file1\x00', 0x0, 0x0) write$UHID_INPUT(r1, &(0x7f0000001440), 0xfffffc41) open(&(0x7f00000001c0)='./file1\x00', 0x0, 0xfffffff6) setxattr$trusted_overlay_nlink(&(0x7f0000000000)='./file1\x00', &(0x7f00000000c0)='trusted.overlay.nlink\x00', 0x0, 0x0, 0x0) 11:25:43 executing program 5: write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000540)=ANY=[@ANYBLOB="7f454c4601061f000400000000000000030038000800000032000000000000004000000000000000560200000000000007000000008038000100090002000100010000000100000006000000000000000400000000000000060000000000000001040000000000000200000000000000010000000000000051e574640400000001000000000000000400000000000000050000000000000005000000000000000400000000000000ff24444700000000908bc001727fbcd44f4d3bf922995edf2fd379eb00"/489], 0x2c4) r0 = inotify_init() r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) epoll_ctl$EPOLL_CTL_DEL(0xffffffffffffffff, 0x2, r1) inotify_add_watch(r0, &(0x7f0000000000)='.\x00', 0x400017e) r2 = openat$incfs(0xffffffffffffffff, &(0x7f0000000080)='.log\x00', 0x0, 0x0) fcntl$getownex(r2, 0x10, &(0x7f00000000c0)) r3 = open(&(0x7f0000000040)='./file0\x00', 0x200c2, 0x0) write$binfmt_elf64(r3, &(0x7f0000000080)=ANY=[], 0x8) sendfile(r3, r3, &(0x7f00000001c0), 0xa198) dup(0xffffffffffffffff) r4 = syz_mount_image$gfs2meta(&(0x7f0000000140)='gfs2meta\x00', &(0x7f0000000200)='./file0\x00', 0x1000, 0x0, 0x0, 0x0, &(0x7f0000000900)={[{'.log\x00'}, {'-%('}, {'.log\x00'}], [{@appraise_type='appraise_type=imasig'}, {@fowner_eq={'fowner', 0x3d, 0xee01}}, {@hash='hash'}, {@subj_type={'subj_type', 0x3d, '-&'}}]}) ioctl$BTRFS_IOC_SUBVOL_SETFLAGS(r4, 0x4008941a, &(0x7f0000000980)) 11:25:43 executing program 4: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x7f, 0x80000000008001}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x9}, 0x0) r1 = open(&(0x7f0000000240)='./file1\x00', 0x0, 0x0) write$UHID_INPUT(r1, &(0x7f0000001440), 0xfffffc41) open(&(0x7f00000001c0)='./file1\x00', 0x0, 0xfffffff6) setxattr$trusted_overlay_nlink(&(0x7f0000000000)='./file1\x00', &(0x7f00000000c0)='trusted.overlay.nlink\x00', 0x0, 0x0, 0x0) 11:25:43 executing program 4: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x7f, 0x80000000008001}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x9}, 0x0) r1 = open(&(0x7f0000000240)='./file1\x00', 0x0, 0x0) write$UHID_INPUT(r1, &(0x7f0000001440), 0xfffffc41) open(&(0x7f00000001c0)='./file1\x00', 0x0, 0xfffffff6) setxattr$trusted_overlay_nlink(&(0x7f0000000000)='./file1\x00', &(0x7f00000000c0)='trusted.overlay.nlink\x00', 0x0, 0x0, 0x0) 11:25:43 executing program 2: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x7f, 0x80000000008001}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x9}, 0x0) r1 = open(&(0x7f0000000240)='./file1\x00', 0x141142, 0x0) write$UHID_INPUT(r1, &(0x7f0000001440)={0x8, {'\x00{\x00'}}, 0xfffffc41) open(&(0x7f00000001c0)='./file1\x00', 0x0, 0x0) setxattr$trusted_overlay_nlink(&(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x0, 0x0) 11:25:43 executing program 4: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x7f, 0x80000000008001}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x9}, 0x0) open(&(0x7f0000000240)='./file1\x00', 0x141142, 0x0) write$UHID_INPUT(0xffffffffffffffff, &(0x7f0000001440), 0xfffffc41) open(&(0x7f00000001c0)='./file1\x00', 0x0, 0xfffffff6) setxattr$trusted_overlay_nlink(&(0x7f0000000000)='./file1\x00', &(0x7f00000000c0)='trusted.overlay.nlink\x00', 0x0, 0x0, 0x0) 11:25:43 executing program 0: r0 = perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x5c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write$binfmt_elf64(r0, &(0x7f0000000540)=ANY=[@ANYBLOB], 0x2c4) r1 = inotify_init() openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) epoll_ctl$EPOLL_CTL_DEL(0xffffffffffffffff, 0x2, 0xffffffffffffffff) inotify_add_watch(r1, &(0x7f0000000000)='.\x00', 0x400017e) r2 = openat$incfs(0xffffffffffffffff, &(0x7f0000000080)='.log\x00', 0x20200, 0x40) fcntl$getownex(r2, 0x10, &(0x7f00000000c0)) r3 = open(&(0x7f0000000040)='./file0\x00', 0x200c2, 0x0) write$binfmt_elf64(r3, &(0x7f0000000080)=ANY=[], 0x8) sendfile(r3, r3, &(0x7f00000001c0), 0xa198) dup(0xffffffffffffffff) r4 = syz_mount_image$gfs2meta(&(0x7f0000000140)='gfs2meta\x00', &(0x7f0000000200)='./file0\x00', 0x1000, 0x4, &(0x7f0000000880)=[{&(0x7f0000000240)="77ba0daae1b2e74ecd52c59a85bf6f4b1f0b01ab07ba92bc6e57305406115f2bc3e4dd94f19ed896c4fccd34271e9dc3499af9298dbc709e0e6a513d61391d4b198af5f55d24239ae934e8babb8d1cb67bb17b0158", 0x55, 0x3}, {0x0, 0x0, 0x3}, {&(0x7f00000003c0)="792eb6eec33e561f18dc4b58b6a6fb3c7e6fd5e612c08490216ae02617f9811945929cffbf59727393a9a69d57b00a5cd08da3888884b8361d6a4003a54480c1086a5fc876582ff049ede86e2f58d80c7b6cf618e1ba36d4710887bc34ef2b7abbc686df2185f99998060bf492b84e3a02077e2aaf014e1186fde602d2b639d467f48fc2e18cf1553e07ac39040953566ab1d21aac627b166825375377bc3332b62160ea8bf7fc3196b30965dce6181bf7a1c60d0270f24ba6", 0xb9, 0x100000000}, {0x0, 0x0, 0x7}], 0x21008, &(0x7f0000000900)={[{'.log\x00'}, {'-%('}, {'.log\x00'}], [{@obj_user={'obj_user'}}, {@appraise_type='appraise_type=imasig'}, {@fowner_eq={'fowner', 0x3d, 0xee01}}, {@hash='hash'}, {@subj_type={'subj_type', 0x3d, '-&'}}]}) ioctl$BTRFS_IOC_SUBVOL_SETFLAGS(r4, 0x4008941a, &(0x7f0000000980)=0xfe33b054cbbc4d79) 11:25:43 executing program 3: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x7f, 0x80000000008001}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x9}, 0x0) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000080)) r1 = open(&(0x7f0000000240)='./file1\x00', 0x141142, 0x0) write$UHID_INPUT(r1, &(0x7f0000001440)={0x8, {'\x00v\x00'}}, 0xfffffc41) open(&(0x7f00000001c0)='./file1\x00', 0x0, 0x0) setxattr$trusted_overlay_nlink(&(0x7f0000000000)='./file1\x00', &(0x7f00000000c0)='trusted.overlay.nlink\x00', 0x0, 0x0, 0x0) 11:25:43 executing program 4: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x7f, 0x80000000008001}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x9}, 0x0) open(&(0x7f0000000240)='./file1\x00', 0x141142, 0x0) write$UHID_INPUT(0xffffffffffffffff, &(0x7f0000001440), 0xfffffc41) open(&(0x7f00000001c0)='./file1\x00', 0x0, 0xfffffff6) setxattr$trusted_overlay_nlink(&(0x7f0000000000)='./file1\x00', &(0x7f00000000c0)='trusted.overlay.nlink\x00', 0x0, 0x0, 0x0) 11:25:43 executing program 4: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x7f, 0x80000000008001}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x9}, 0x0) open(&(0x7f0000000240)='./file1\x00', 0x141142, 0x0) write$UHID_INPUT(0xffffffffffffffff, &(0x7f0000001440), 0xfffffc41) open(&(0x7f00000001c0)='./file1\x00', 0x0, 0xfffffff6) setxattr$trusted_overlay_nlink(&(0x7f0000000000)='./file1\x00', &(0x7f00000000c0)='trusted.overlay.nlink\x00', 0x0, 0x0, 0x0) 11:25:43 executing program 4: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x7f, 0x80000000008001}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x9}, 0x0) r1 = open(&(0x7f0000000240)='./file1\x00', 0x141142, 0x0) write$UHID_INPUT(r1, 0x0, 0x0) open(&(0x7f00000001c0)='./file1\x00', 0x0, 0xfffffff6) setxattr$trusted_overlay_nlink(&(0x7f0000000000)='./file1\x00', &(0x7f00000000c0)='trusted.overlay.nlink\x00', 0x0, 0x0, 0x0) [ 609.781535][T28898] loop0: detected capacity change from 264192 to 0 11:25:44 executing program 4: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x7f, 0x80000000008001}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x9}, 0x0) r1 = open(&(0x7f0000000240)='./file1\x00', 0x141142, 0x0) write$UHID_INPUT(r1, 0x0, 0x0) open(&(0x7f00000001c0)='./file1\x00', 0x0, 0xfffffff6) setxattr$trusted_overlay_nlink(&(0x7f0000000000)='./file1\x00', &(0x7f00000000c0)='trusted.overlay.nlink\x00', 0x0, 0x0, 0x0) 11:25:44 executing program 5: r0 = perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x5c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write$binfmt_elf64(r0, &(0x7f0000000540)=ANY=[@ANYBLOB], 0x2c4) r1 = inotify_init() openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) epoll_ctl$EPOLL_CTL_DEL(0xffffffffffffffff, 0x2, 0xffffffffffffffff) inotify_add_watch(r1, &(0x7f0000000000)='.\x00', 0x400017e) r2 = openat$incfs(0xffffffffffffffff, &(0x7f0000000080)='.log\x00', 0x20200, 0x40) fcntl$getownex(r2, 0x10, &(0x7f00000000c0)) r3 = open(&(0x7f0000000040)='./file0\x00', 0x200c2, 0x0) write$binfmt_elf64(r3, &(0x7f0000000080)=ANY=[], 0x8) sendfile(r3, r3, &(0x7f00000001c0), 0xa198) dup(0xffffffffffffffff) r4 = syz_mount_image$gfs2meta(&(0x7f0000000140)='gfs2meta\x00', &(0x7f0000000200)='./file0\x00', 0x1000, 0x3, &(0x7f0000000880)=[{&(0x7f0000000240)="77ba0daae1b2e74ecd52c59a85bf6f4b1f0b01ab07ba92bc6e57305406115f2bc3e4dd94f19ed896c4fccd34271e9dc3499af9298dbc709e0e6a513d61391d4b198af5f55d24239ae934e8babb8d1cb67bb17b0158", 0x55, 0x3}, {&(0x7f00000003c0)="792eb6eec33e561f18dc4b58b6a6fb3c7e6fd5e612c08490216ae02617f9811945929cffbf59727393a9a69d57b00a5cd08da3888884b8361d6a4003a54480c1086a5fc876582ff049ede86e2f58d80c7b6cf618e1ba36d4710887bc34ef2b7abbc686df2185f99998060bf492b84e3a02077e2aaf014e1186fde602d2b639d467f48fc2e18cf1553e07ac39040953566ab1d21aac627b166825375377bc3332b62160ea8bf7fc3196b30965dce6181bf7a1c60d0270f24ba6", 0xb9, 0x100000000}, {0x0, 0x0, 0x7}], 0x21008, &(0x7f0000000900)={[{'.log\x00'}, {'-%('}, {'.log\x00'}], [{@obj_user={'obj_user'}}, {@appraise_type='appraise_type=imasig'}, {@fowner_eq={'fowner', 0x3d, 0xee01}}, {@hash='hash'}, {@subj_type={'subj_type', 0x3d, '-&'}}]}) ioctl$BTRFS_IOC_SUBVOL_SETFLAGS(r4, 0x4008941a, &(0x7f0000000980)=0xfe33b054cbbc4d79) 11:25:44 executing program 1: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x7f, 0x80000000008001}, 0x0) sendmmsg(0xffffffffffffffff, &(0x7f000000b0c0)=[{{&(0x7f0000000100)=@phonet={0x23, 0x9, 0x2c, 0x7}, 0x80, &(0x7f0000000080)=[{&(0x7f00000002c0)="0fb4dca350dd2140cbf48ff621975e3623a6adf4d63cc5b01e0c487efb99eb15d6414e55a398108a8bebc9b8f9053917f9ef07f94882e80b8a776a657c4b44850f5242a39f887cac721e7d219903ac18490cc8a8b4d7c05b430884a6b4fe52d208172103df3d7e76e07765a06cf98ce2f3dcbb3e7a1546e8a042b06ee01c95d3645d5bfd29dc9e2d81f60b0fa8eb98371c9df92b73972f6fac05b058cddab58cd8f901079791b46b5710a7b3", 0xac}], 0x1, &(0x7f0000000180)}}, {{0x0, 0x0, &(0x7f00000007c0)=[{&(0x7f0000000380)="71ef2f5bbe21886cb32f68a012e6b270ed576abf8ffadd2d2a91b419a8130ea96d1c6f156383d5b86ab9f226f27909b552ed85e266610df6a37b8b85ea93a1b69c6db11fe6b1da1f4ced235e46f867497b768f68715798ab27e46d3f55fec5812839e6b27a45ae33874a2e8ba75532efd291ddf1122292a4aaefc29f9f3c9d216062058dc84951fd28e439be2092c1381fd7c48daa67ff7d733ca34f3e2f657580340b0151a7bbc5f4caeaab839e05ee2a0e2a4fb4a05ca408414ec3fb5f38295733422b4483bcb8c85260fbf5670f39d27b1c4ead", 0xd5}, {&(0x7f0000000480)="3a198c2d42919b3a18828fec0684f4f2a8800df43c357672dfae4c031d1becd854b372500c3b45af1dae3ef9c9c862ada366ecb33df367e1a479beb6b6392269872b787629b2a460483b94f67f0ea014246ce5b6d538a03892cd32fc2b1b32d4d498231f98eb616c4dc38cd9d92c049e6b4c7951071807a504ce7c1e8a6c4b607895cc99067c6ad68983e39d463b235a20af1769b2bcf50aff21ecd73d216c9e9a210b287b7f0724c1a5e8ac937aa177f68d380c8dd31562540cf99ada9040d942c531f68330a61b951ba11c699ab526a1204c572be2", 0xd6}, {&(0x7f0000000580)="c0ff009147c853232bed9058787442b3da2c3698329bf5901e178f115102d13ae1be2ef5fc7dc2f2df4c5003efb09122de0694b912f7881bc029df70e63024b6c5f5ad69271ef79fc0ca1abde5ea4d323af25587c3cfea2a26bc8a710f1b832e948fb65f69345c39865ac86f7c6d7c278c1a0166241a3ffe5b90d5d127dc80ff75bd8a028fb68bac5b8882af00ac3868027a37ac83e9", 0x96}, {&(0x7f0000000640)="711c219f83f321b81a9c818c72cdb15448715287ed799434293b4012d9fe8fe036de80b9ed582df342739724684decd4c9c07dc16662266f374f5a12d9d6588c47fea284355a1247884e0ea17045f3811223a02f8ab2cf052bdf4bb5b08cc766", 0x60}, {&(0x7f00000006c0)="eb7a2292258412740145dd0a0e5fa256f164a87c7d737a45407b509d51b695e58b6847d391cb3f582ad646e452bdb7ccae7363333f6e877746faa5a62c9d6ce2c428d069e66bb1fbb8906bc5be10670fd55cb059c2c7465425ed13c2896b4db9c3d4145b5c8aa6f6e468d82b79e9b7eaa93972b670c0d3391b22fcae9a81502f7eb53ff844dbc77ca3fa55588b89d2676d61f4028e61c30ff7815f0cba50c5b826728be6b5059852995b3dc0fcb07d58664fa1a25fb2e465e43916349d088564b96892f353eae075627c612a08565f91241a3594c2eac28137388cbad18b9ef91ef9f930586c626a8de6ad6f7bab", 0xee}], 0x5, &(0x7f0000000200)}}, {{&(0x7f0000000840)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x4, 0x2, 0x0, {0xa, 0x4e23, 0x4, @mcast2, 0x2}}}, 0x80, &(0x7f0000000b00)=[{&(0x7f00000008c0)="9bb1de1571a97a3114edb02aedbb3d5eb9faa2ccd31d5f4b8ae211c76f2cda4918b8203c6bd822219d89e0bdeb0a03d54bb1df328c12163c498f18f37158c2588e1d78103eaf1ac4c62e0588ef889322d992daf9f64209fa08ed7a7353759fb5d0b6dd14dcfbea843fe010d81efed894da742c1516816bf9b9989218baf83bcbeb2eef201fd6d50eaba273a5c6d90a8d5b228386637c87228d73e97d353115114e9940739c8f667802d236901e0d5550", 0xb0}, {&(0x7f0000000980)="7abcbadd28866da419aa514ded5138c3e5e843543b9fa55662fbab9018e5539a700ee098cd7f6df8123c383ca2edeee0f130dade25a1292169c3aa8864c82496a40958727fe4e1b1f0f8e8e959efb6e6493b56e2f6d3c5af22d301b7afc3758837a1b8a71cb64a48c271750a4cff293f954ee541ff7a1594e1cd9b0c26fec945e8a38e50100c18ab72e2701d77d7918fe940ebb46d2dad379470e5d308980a6d1562", 0xa2}, {&(0x7f0000000a40)}, {&(0x7f0000000a80)="d919bbc7eb4dafd8bf4cb4f9d5a97b51aeb3c2fd17fcca5c84407a68cd4967b07abe89b0d44d6bdff1d426e97acf1549ebdb813e90f0d841b1aa8b248ed17fb7ce02507f0071c4fbaf004d3471ccc6e6a0eef5054f2c7096ef0d1edf95f6b7122ed4f9d4d1f4fee6fa06458c4596e862a7a80c155c", 0x75}], 0x4, &(0x7f00000044c0)=[{0xc8, 0x101, 0xfffff00a, "41905b6cbe5ef033ce0e9a72ee1ca1862705158f396043de09bb15bcae8afec74486c0ac60b803a3ff1646b2e2ab6a902843a01bc7f4db15cdbfe07b3f63223daa23f8b34d989120a7ce666191d6865e3f05d10322ff7ca84ea4152df25157bd13f2677ba2b94469ce1c50e8a43c6b0f33f81c0cb9fe14ba291102fdc5966fba771fdebedd2659ee00586295571981e6ef7cabdcabff84b7ba43c0da8d0c16cf1c07c75c629b065629259b84c15ffc862c9d"}, {0x58, 0x100, 0x6, "9ed9cdad68e97f61c450eabcd707a757957358934cbdf1f209483d5f473a3a168eabd6060a8573eaf8a21f76078f302dad8eae452014fc7c713f46de28011c9fe3d8008b"}, {0xc8, 0x6, 0x3, "f717218e9f0636c8f4d8f3e1eb641c4c44cc87ff6b3bc69aa1a4f5b16215149ada2211fe8e8e69bf427a8a893f704818c197ffd0fca3530e2be46f0293816c2fba8c0b584976d71a31d84c1a17fe18ba0a9e9d33c4753f3136ace147a0a5cab768c0b6561a7c53b8fbc0ed229e261bbe1539d1fe2c21f57d3472eeafd1da694ce403b47559e442afc19766fadda436c2c9d89fa319ab2685cb911dab79994c9b115ce7b30adf1504aa56ad73a81e029c070ca239368d15"}, {0x88, 0x10a, 0x85c1, "d71a7e4b74a6c5a01831b020621e81c0086b0b09a5ecdff1b9b0f5edfd13a5a7a1628fc6ed52c5ec8626814ebade81db192511e92365eb0f5b2713dc9dde74c9d8cc869d42c903183467a3b9489722006301e5c8410c65adb24bbd3b3ad2d72cdbd1b5a7bf838ba81927436ed4f7e3f28d"}, {0x1010, 0x9cf4a642ddfc1a9, 0x5, "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"}], 0x1280}}, {{&(0x7f0000000b40)=@rxrpc=@in4={0x21, 0x0, 0x2, 0x10, {0x2, 0x4e21, @dev={0xac, 0x14, 0x14, 0x27}}}, 0x80, &(0x7f0000000e40)=[{&(0x7f0000000bc0)="5bd1eb622fb201e2fa6cf894f71d6f1be64f33718c99abeeac2532c388bf0803c48d47838f0bbbc2b6b1ad3b5919c1d4a40cf43e0840678116dfcd7d377dd28281d29581f7df0b0f95a4deec71bb8b6e3539fca70270c2f455a28078d1006d997798927bf7a3f0e8ef8988ef851cd6a8da44d54a862de4eaba3b83ab7ba80582d9b586759b76abd44e3e9bf66e545f46e8ad15546019e309c7a4db4a3476cd53ad6abfd1c0abcbcf21769aa39943f1bd5de306c9d347a2bba3fedebff4c54ffd2d860a74e64d63f8d4c8691aeaecdedf191761c95585", 0xd6}, {&(0x7f0000000cc0)="231be5067d90f34dd8b85fda3d954fc0696a70f882d40b370542705293bf70e5204fe5baef7fd86dd4ab4c735eb043b926d29e70c800821879f363394ca550872cb83d06b1b5e9087396df4906ebd4411ba79e5b54c7d38c3f52d5f406a39012e6abc132757dd6c8e678a31dc4616be587de92f3d8a9c6545d674b7bbdd133a08b7f61dfe1b0b4db99bcd0321fff2be7e7e5716efe4786fefeb84da7d2f3c0a97648205be8aa6aec28a6", 0xaa}, {&(0x7f0000000d80)="ee48d6bf7c9c84927a2944222c14474c3abb9d79b2b8fcc7d9c9eb15c130eef6a53204c3ce481daae922d5b7a1ba7b5f085a449dacdb8657007da3e5584740c3584901c3fcb7592dc03926c8ab3720e88b032ac0dc81603bd9266bf88ac58374a600a70c2707cfddfe64475bcc362a7e0478785da72106ee06fee0958b742df697127417eb24b841ec43478c4750ec2ba81188c729c1b7deb2d1c78d9b", 0x9d}], 0x3, &(0x7f0000000e80)=[{0xa8, 0x10c, 0x7, "b0962c6db0284602e03019ba2447e26261640770e9dfae28ac86c6bbf90c7abfaa617c9a974e7c27ba5f3fec0a3caf049840c096fe7ca0cba09920767e4ffd97030e0b486add0dac5019aa6e3177010c13458147596295a97257b1a23a1dbd4e77e167af1e3d1e0427a33cb31a5715fbfcdaa424f3535cd0607b66237387360e02e8bdc3a0b0ebfad5843c9f488b4361bb683399"}, {0xf0, 0x3a, 0x7f, "c17930de7425ae1284846f77605fb09aefad3e46adccbcda41c5b64ad6bf81c2d4804deadf667e6ea582575c7e9c31acce062c8de2f54d26ef13014164f7ac63e2e65e5fbbcfb13b1153d7dfea073f1ac951012e9e50247cdaf2e113ae95bdcce92957f15b185d4bcaeb1d290765530d6d69f606ab4578066c4ba1123df9521967a3d45a04a9509449fc6c81aa79e4e79455adf0f94791364e8dfeb0b50bbfc77e8ba3f9e3a4cd28f758d727283338050a9aed544f55b14fc7f8b806c3f84b8e4c651b754efcf3a8901e18e317b7f38535ef84857380a8038c05"}, {0x30, 0x1, 0x8, "e2c486fd5bdfdd4505243c11a8bfb8efe29fdcd2e1baf5ab9e8f12415f74b5"}, {0xd8, 0x108, 0x400, "ec036857067b626d84d20021f40adb88f5bc1cc18693e8885a53f47eb212af896dd795b03ce08498823173ca740668be066470c0a8ecea5092c49bef8798657550493a2d9f231318b3fe0d0b300daa4166e37489221629534e3cb773414e87bc28c473eeda6602180457f1f3ec0706c99a68399f2084afbef064136ca70143f733aef31702509bbbc4ab352125c397bc2c74dca69a1ba1591afd774eb58e68dc87551a61893f844a9d601be2ac87e8c7e89b36089e7d9558927fe1b3dc4da55bacf354d60555fd25"}, {0xf8, 0x105, 0x4, "b18a1cd3efa76363ccf2416d3bc8b6aa19fa249c839026967c565b9402bb4020b30722ccf04b2ceb8c2927229f9c2587e0bc0e3d02fba0491ece2706d8f23fcd6a1775439a6794280eb43b4b20d685cf6141b4d9efb8e9d6b917f23a48be8c55945951eccb7e6d076e1312004ac97a6e970a1e1534e1345f52cde7e4983f37c97918a2c4d1269c376e856b8fbd45301321bb36eed3039414f2024901d04991a9125dcd40e470bd86af4d728938b298a095c68116d2d6ad046554d19eada7d9190d53d3d102d6cd1882140b2d03b1857e750a44ea3f1e330dde8afd4b4b34c5b0ad0bbca19dcf14"}], 0x398}}, {{&(0x7f0000001240)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x17}}, 0x3, 0x1, 0x3}}, 0x80, &(0x7f00000068c0)=[{&(0x7f00000012c0)='FA', 0x2}, {&(0x7f0000001300)="c969ab887f6ea47e8fcc08c6da0d0856787e3f1225a393ec1f6e2ee88aa2550a0b30aa8bbe6202e6dffa5e272f52ef8bf5ec9ef39a5e3f40ff69892fe8f58023795fec13c8b3ff1d16765a664b0e833bf0c89d6028fd1ab1a2128b28ee2472776f42274f614d3be78aac85429f207f93043256f89d5963904618b2014cd4a74e1e772d578892a514f98a3d21265a4e3d52d967a231512454da483f1609603eb36c67649b48f3ecec3613fdf01347ad76e7e9b5d5da23b321b66e6994f90797206d3d8e5aea801fd9840774f9399e8772bfb9a227067d6a4cf0db755e6ef1", 0xde}, {&(0x7f0000005740)="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", 0x1000}, {&(0x7f0000006740)="eddd24c6cd8aefced798494425f48b72910d46d69a812f981255da50ec4c817e758072cf4db255d9a9f415c5076fda982f99831ed3c0c542a1b4b6d098a2023d9c595dfcee66d03da781cb8fbf453cdc2c607a4d15a1f7ea41334c4d3f7bd3df93720bf9abd27001ffc91337398b845e817eff5bb8ea07d6361d", 0x7a}, {&(0x7f00000067c0)="e0bf36e331df095c9fbacb1af96cf83b6bcebe69b118bf8b49654c4a02d842d39ce2e966b639770d5c88125f0df324e45ab5f2c304f9cb75a0360f7b5ab711a254f09cf12ce62d37e8e8b507ea5b819d99c6b2f81e05871ef18e028986", 0x5d}, {&(0x7f0000006840)="33c1fab5fb3b52e71de2b8a64034238a8b88c7d222bac50d817c0504d91fa7760092e91626b8ccf3b3f5bdf3325675eef8daaffc7adc2748d44e8680c12b1a3b93ecae383327257a8785055fe533f992314c360be32c6d6b772893c28f0f715720381c1b703e089ad7dd1dfb6a1afc713ce29c30fa6d01c97fcb", 0x7a}, {&(0x7f0000001400)="8513fada7d46a1", 0x7}], 0x7}}, {{0x0, 0x0, &(0x7f0000007d80)=[{&(0x7f0000006940)="8a7e3d8434deef21051903c886259e058c5d9436bb36ce2d1170f7789f0ca8eb66831d6d6c7498635ef1e10d56b55ece0ac6799bccaeeccb309226f4ca", 0x3d}, {&(0x7f0000006980)="6394f5a770d977ccecda5610017b6a9a66b1e0f84f9c7fc85b8b0ca87f9b5c580053e287c768b663d2ae2f88cb5157e88c792c88d19d656d194d6b0f7fc27f11cf85da277dca9dff6f3a89c6c179cf4ab004f364b2c65423a03f174d0178866710b339e02587dcb63769e27e34d21c209c77dfd9b6c0d080ee8e91bbb8433301d7f23615f80c52459d99efffb2feab64de01bfa465e0909d1479a9d14821c7876586e45211038a75e1", 0xa9}, {&(0x7f0000006a40)="df", 0x1}, {&(0x7f0000006a80)="d4f7d952223ab6cf7955c13a8bb94da32c9c4cab08854c0f54e7361a284be4f09364ce2ad0b65d65a178e8517adbfe47f9a1229ba595cefec7958fca38644e4a9f1d54b60f6eb234bdbcedd07426f20550d55538e0088b192cabdf3b96c2e041dcafe1352344b90a3ff8d401e2727c6a637ae91a83d3fb01465be7c59286719376378a4067869e9a94b1b78c27851d72e1f87167f39f5bcf1f310cf758e40ec913a8c8aec360b303b5a8b29723498b2f58a429d8be68b91828990a8ced378701c1c8c5db35", 0xc5}, {&(0x7f0000006b80)="e21e961a671c88240bf7f97c727d72c89ff416b0ac4645bc88ed4cb148ba070741d9ebd61c95b752a413254930eda863bfcf3eb752c526cb61842d5b53a3eda09c996a6db5d528a3f82a6cc84afde9b24a567c0a0eda40ce6457b6873ef43485437b0db0a1ad5143d5c65d605b1cec6848cee553c9a26fc0d709137abbddb1ea6e059e29a116824ab4ba19c5f2f20ae32f2abeb74f3fba450dd5e94f125e4e2d79ac52fc8773006abf193416131365bf2343c05a27807708c7f8b0a45052010d723dd386d13a72d81794a4f6b5", 0xcd}, {&(0x7f0000006c80)="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", 0x1000}, {&(0x7f0000007c80)="8b78f4e754e4fd2b7bec5d85ca5f4a62c85dce7f0f820e24c6499bf2b1320e2ae0b6ea1b91acf8e0305790cd061586e4138e6379b8a890f9fc4d7b0f086f6be772e4b288b57fb0da713df52dd6e5a2b943154302b6f4065fdaeaf5b28e5203795042b58d0d05", 0x66}, {&(0x7f0000007d00)="edb7c000b22336e175f82bacca4c7278ccbcc616707f8b3dc4569c7eacde5535665a8215b7be022109837f5bd9c51ef7ee635acc713b193e44e4cfad26de03b7f0ba437295d67cc2cf7712d8b477abcfce0a9bb21ca5", 0x56}], 0x8, &(0x7f0000007e00)=[{0xe8, 0x114, 0x8c9, "7c9e28211adf577a2f86a8370577ff8510e7f2f5fc6e2ac442a673bbcc161676cf68dd55cd294dc769f7d0b16ad88ad1091e0d1c55a56c98c4b5a45c61c76fc02f7d404b2790b9141618e78d44f79123b2217cac54d426290bed376db71a59204fe5dd84a3a4ffb34a5a7c2febd9576452819a85096f1e678ac89c7363198c30b813f19046e285a9309df3008744cd3de9c7a079ea5248bc07a663a08358f6e377f45a262254bd0fb96fb50366f5e01ad152a948dc1f7672acdb060ab169c03ba700605e26a1e36b73550d886d16299926d94b9fa2"}, {0x1010, 0x10c, 0x101, "47d5fff9e441fb5f7020c318c436bbf39e548c3cd2c3e8fa49a519bc9062139eda06e45ff41a5da5989fad752e2e30358fa6abd68d737931983da863e5455c04a65bd2cf569935998200e0803660ee28f929f0f51d530e66948817fa7a0e2062bb67763e0dfa7a04220ade66fd7b3ac12d8061f9e0b4aba7e3e017bb874946164f5ff01715fb41c6049834853d43a4c23f35e1848d51883c325d1e8e7b4f2487b5de5f5ba58eb65110aa04b69253f2bb3107d8e42be0b0251cfb79cbe78e3005479520896d606d8350425652b56620c42dde76b7ce4c9e4010ff830a7c7bc42d5fb5230085af6f6ff956161321d5a7ae8bb2e813a651beddb04a3a5f53b9e2dd3b1c4e56961527097936e6dc6d5743c822fc630dfeeaa7524c27e1c3cae86d9c68977f38061f3660c6056b2f2c10ed506230a2620cd270930cf322c22ded31513f132607af53917020fb9775d4205f9b498b2b7ff6349ded893c4453160cdcb1f8703bc8a995ffdd359e23c916209cfa46be52273dbee6247eb5b214f6d2f8d8e94f9a41505be3314f1be58eba0d5a2e08445c5e41d93de73abf654b9bb3130ca094030bd154ba800de3c8f6184d594295d23405c73d526bf56c0bcc2652826ffb7d2e699d3ff7c90caa3f705c0a405181f4e9f4af966c5bbabef971abd5b606a2b2811ab68297f9bc3feb5c61e0ce46c8e5bf931fec39380b6cba309f518eba9f1bf9cb984f825bd0b1d27e2d90a2a97db507a09f531cce6c1ab93fd351ce3822491fb7ca0ea41608508ed6a3e5babf46b0749eaf79cb1167d0b7d5f068b7eeb0c05744467845c5a0956039ebc6130a9ddeb635cedee2d3a46e17eb3f4b00a67049840fc0f2930d0e4d550989d1ff7b0684ac0e8b928f48824f5ab42c2abf76002b1e47429b647fc42b2be1432708887f952528b4c98c7b6ff87ecad31712018adb14b2f87773bfe81b409bac8adc0c35908a215fdfbb4e0824dd430538af15a90b1041ff41427575d3d309486013b0f05d760e1d49e6dba92365c6baa3208fb1720bffeff15d70f3ef4336b45098f53c83360f6c3fbeca57dbcd66ac8668832527406422d53d4ae310234c83910cbfc177ff24ac49759f564a7cb90c5d96ea3e9d3e74010cd76d10c36c6ea5f316fc169900ee03694eb4168b5a0b5268121a756ab1f94e1fe8c5687de4d8ab971642a099d4fd960455f610dbf4b3f2cea34f26eb344c4af6e75b0a8b4b8543821423a3d45683fa6844df35ef1020f1f66e681385bdb22ec1f2554eee7f87c51a7a21a7a38e2a19b22e7072e6ee58ce7479479ba59cd47b463aac77066d52eb33b25b8cb55a0ae79665fcfc2c6e56a7893cd47c715834b65ebdf0ed2ceef463a133f6d3fc324effe665c02b28e8c9dc4039fdff8a9ec76a007b36f68fb220d315d229d40dd14dd92dd89830593bdfeac85c388a3f8e076326bfccae1fd2e6b305c9fd56592c08a2754132b6efdc4a9e0601083cf0e09d64a312824995bbd9c44daf18de2891ed0b6d68922c093417445cfab8ae98b4b6709b620bf301e8bceb20aedaff34fdd0e58857f33222ad83293952b55e99646d4d185f26a8e25a2243957720042d8cd3a067c45475c4ca1ed711bb366cc28b21919e7f4c2fc4c6b405acb6b51887246c2bfad35a2605c36ff07d082be2ffe7d4a35e78cf05d220da1ee27e162551da6bb25d1ade1a8ff2ac9eecd923a411c51afc7aa3734a5136f827a70442592880e4c645a6403f48e11b1f22183421f24375ea636529ec56092bf0e5c9b89225b35391f67cea2e755a8637e6165c04e8c0c9c44cecc1b370f4e76ac6d492c91461eee71f75c7f18c62d71f621b7308669a2c49e4eab70689f824aab2b7f165b3fffee74b7ebca5af5c767ce5dd608aea2881de68dd5c816f40e967dc51373ce4a720f52f65bae6c167944353a4d40140991fa623d23a03566f311536f9142d5ebe10b6c2b8b670259c677fda7fb6be42a18de077d5d417e2337012ed0dd1cf6cb08f8adf5395d88acf191d17c62b1fca80738b13bf3bd70add6e0706c0a9c4b7fc7ed8f85588abfa8512a8c131a4025a9e24619ab924696614352fb20f7cf7fb94c082415ad9635a7127ee960f18c816dbaea5b99af42ebed0a6359a44c0d8af1d5d2719d4d710dbaed8a0692c655e2ef92e9acba3f4f19cc845b9e941a2125ff2a7602a49e9ed21c69c70a79b51032249174ca50f62f4e080c6795258ee703bb59a12afa516dfee53d565e4afb77c047a69ff6281744b58cf308b4e0fb16d5b3702aeb7000db5bd4f2bb1c415db77caec0b46b5fb13d9b9a71b9a0c51fb2d2e483c94e756892adfa00e38173e36040efb23b3c944014c2bfe60b42ef25edf4f30acfa480901dd4cfa77cc0ca6bb6a8423202aedea4697c047ba3accf1c6601d9a66fbe307f25e858d07a859bc1e4229244997381ffd6b051dc9a820e235d28e2d3f8c25ee2fe83384eb46eae97c3f821c255f018e8a9d2a0f77d3a44b289fed8306a87913c0faf22ec0233dc527bfc083c0bc9fe8daa930b5cdba1e8052b73899ac8cb4aabe83e3486632930ce6b3d879ef22049d933b2319ee4475e9f47a8306105cf3e64fabd5fba0e991877ae1b3b09ffe77d9926ce91a44ba2e9d41dc2f570b607b4db0eaa6df0616a1ab14992d25fb4f9b78b37daaa5b9f28657def0d8b9d42abc7dec9f3b91c77eb57f5961c85a91207f9e5c1222044bc0ef08a4e9030ce26e3285eab0a8a17b46928f7c4808d00f15d7a48b711e3562541d44e2a011a4194f90a8d108ff558a0edfa0f306fa3c408acd1e0a48cdb7a33da16ee97c0139db0c4fef8f22076c9ca327d7a078741b0db761f906111ba396d954bcb9e9ef11a705b29766156c442c8e9ad06af220600f1a68b4ebcbd76135c6e3e68adebb3e5cb8112894d52f435e8febc382ac555dfb4746d9132498187819410f03e14899fc307cdd01eead4b0884538db20b5532accaf7e8140e7b7c303a2d515f29fe11d7b8d34fe96d1bc1baade693fb70d65ef1d703703e4cb2ec98f05744be738cd58526998466d5444616608dd85a003aef05793a1e71cc20020a1ad7a4ef9517636d41c5957e4b65f8693070a785a8646d0b45f0a6d14380d82dca5544fcd77f0a7ec615e45948c049e62669f8bbad8c1debce4ba4818ab01aef975fdace214f36d128e05748eae9dbefba7cd773f77824eda450503bbb216821cb9586b7f0a9211555c063d7520c9370a37f10263d0d103c95f0f92e275c267ef8806030878c875bf3215a137158de098f820229b30205d595d70f9499f2f9eb7f72219611d995e9203576c247a9835f6203be4e86fd6df8febe077a2cfe241fadcf7b2da08f5cda25deb8e2073c3ca06dff54101facbecd77a1adf91a23e97cd92e394a330a83eaa581c2f32195181e2cfd3df897ed7cf789c32dbf8aee328a8b4a8252de074a4cf95f89ca47c7c0eb9ca15185a345b661e41a58026765aab298cdb284b4ff70cd8792a091772287efce7569de2afc7b5a193fc96203ed793c6d7d48e993666148a74c3844bd1c7798a417b93c967ce15651c63d696bee359cdec320c176045b921f2a3b01e45d9caeb35a11cfbfc1b836edfa4cd4f5876ee78de761b038e12660cd3dc1012d7ce7355e9974672ac4cd1129112ba3e128fb1babfe6c7f2becdd11248467329c058f9c1357129a0a2ce74c4b1a3c88deeb3f5db41fbca73e97a573aa96251ce7702ab2ba7d3a6e4e009f7642dac983b968720284548a32cc5d0977dea03582285e8278689db0e5a09105ca317f95e68b3a0d325f3b011e4030e9ad7366c51b6cd6f7b6de19fd8da811b31543e1749745c4f8fb19ed017a83b51d6e343303c51d292057992bc8235a13f047d0f8d0ed4363bb77461234dc6aff81a1f49ea59ea64a03dac945d84923826cda82c6bd0565bf26917048074e53fae9221ce74588cf6358650c8648c825e410a083c6fb7e81bc8a6603f757e84fca407f4cd25395953f6e955186a20e3d55cdf5ab71bf4cb1486b7f94386796b66096f5f2805a168cbc17b697827163f84fd9816175bf235304275a32990e03432b423c0daff18f94715be3dcc445fab44ed43b63a3c44c790def23331aadc2fbd55c92979dee3adc98720285877d3d35d1339e4fee34ce74214901ea8a33c2bf367a2600a741dd8f0f9a70351e8a871cae28e86b7be1f11a90f6a4865a479d1d04ebd9f3fcc37cd4826566fa6efe20274182950fe22d1ee807a5fa86d276fc2ddefe96c993ebf2835c82e774840bcbc9e7f60a65215e308dd8d58f244b98b7506dce653a0b9005cd26abc233c1ceab93095bce3c74e9adee7916f032bf0afdc896b19833245773a009ab59dc6dd581e5cb255abe153457830f7bdc13996f35759e9d7441e4b67c6828e010964e75fe1298b7e8bc30eac505c159f679b844e86853e2f8ac9c76a380f0b3dab54469cec5fc612f375983e6170259e9ca3d757ddcdbafa17825a4f2c860434dbca781d887c8e786a3c340cf63d8b41d00f106a92a12e25722b620d1d403be5d58fd243deea682c6403d2f1fc9cf6c4e8ff2c5c91fc221d27e9197c8614443b021c0c8959dbc7a2eb3bc807de54784e9ba85a1ca7e30b861354464557c6a7f0e9736b8178d33a82f155e79772c918ee22276a34bfbb3946a712b3dcb06848fb3a922d940c804821247afa3d6c9c521c4b0343b5160b1789002403a07d70fd1af1cfae26410b8dd829003119ad75b80f26c114a4081666d19f864b4dba287e94522ebe292b8e1791f3affe91b3c8fba51599e9cc8f8fbbad4cf02b9ba295d27667cc18069cc78f465bea71af8600b56b7d20d2db898057bad028aee19268597aa6f6d4cb2d2a9d15b133872563a34e0d786243d38381dbeda06fed9cc8b7a8e4ca07255fef8049444cce2d973d5fb5ef1f76701686831e38f7532ccc49125b24913d5ed7a18f3fd857643dd10d6506876cacf82c36bf94e12cba2f75c1657490a7038c2d69cb1ce074f6a13d977c66c6a98caf8784d085aa9d7573c0987c701c400adfdbff9239c00e5531c575cfc28150df1bff645b4dd760f0b2b77582e2b1c32ae556393e24688732f5f220e7d09578293f610430f4fa7157bf695f65942f57677dc13277871d33a579441b377160e90baa333008646b42bca05b642e752ed12274930d254caf749b9afa8333f4e592586bf48007d10278a161bba010c643324a88f1283bd5f39c336e27128a162aa44dea2c151701d133fc9b5db7f1b457726fb224fd0f0057b0af1c3de8ee5700704e45abd52dbfd40e043865a6389d614366035c664ca611ae9f918e3c6ea0e7d878852c955c79576ab1b35a671199e251d4ca70a8c527ff2d50b715a35ca754afc77e1ede97f09f1be6f3be7dd3623c567bd08e71fd0ce9ae6077605d9f41591b7c5771d821bf61b917d1b7e9c9fac4ad6d5875cb2bfe291328f8810bedd18e5a1d379d3934c437cccd785db8d8e8ba08e3aab8443ec3e65068ef32226843b656b19c2d8c7bce3e2fe78229ac5432ac0306afb6c3883998d63cea1cf7b64ac02214e78a9e14ae5cc3783c086b705ee6b5407ebd001ddffa02b9bb0f21682ffd1446ee91079f0d7589d771184f812e6849627705ba2ca90571328e5f16b396c9e15c2c31b4b8bc4d57dc3abed3cb54becc9854e26354641bce8fb3be766ba40a9216318cecbdf7863a5d7123f695e947dead43b25732722a8ae1e7170db51f124495b85e0274b2c86f0aed8fdd5c31715bc5275da"}, {0x38, 0x11, 0xfffffffe, "1a2c68257018035f44ccb2cb072a8b3d2966a43f8f107fa16c5e6e8df1cf051677195999f25601d2"}, {0x1010, 0x32c, 0x5, "987aea28493b1369d9bcfb64bcc9351acf7e96ee5837b2ef61402015f9a8998f45f9fea780dfb176b10b8c27d358fb96a6cf03c15d70fe4b172edf5185141c2131a64c5877754821821189eac311af31b9c5fc0f20773e3a5a70e1e97ebb2218df28d9bd277ec55ef3966f15830d8e2d6bdf2c8b0f707389ce4ea4466ecbd203b63df4cbee6551b0769c8c2b193b9988493be0cb09d85c8d958c95903a627263faf08b20c8171f6caa56d02dc63778b48d67e245cb1cfa170fc8b6eebea4195af3479bba505e7a622f8a3b791d483ee59692f23809c5b1b96e9557a5f54d879415ff0b6d2a34c3c0632545d6f3a7baa485216add52e400005193958f53120222c88f33c4bf60e0736fd2c95a387c1d3347716fffb901018a865bd8f27f4d4651996b1d43382e0d394c130003a72b3721a004d6168d22b22b4a4458cfa49f308072335e8f62ebabaacf5b1a1db68ba30f44572b88bee38f0bf94acd6ccdc289d1cc7f0926d051e13aa692f37a77e289c3e75a8c86bf48cd3e07d4e154e2bb914fb422e51af663785e59cf2ca3e69a6782f6ccbff39c33d43bc0ef8d6384b6b3ab0d424dc74fa0ffcde8385726e84d8b5755652af8bedddae387f6e1950244fa23a1ca1d2d3295a1483e450ff8aaa79f55425901dc6371c19330fa69b3dcc3205124fff186b6f399eddee1bc7a4ea36bf904f050fd91748f48a08b71725de45693a25ae581f30f3676da4211586527abe534abcb5bdfecc806e488d5299f052fe83a72fdad2820a5411997db795eddbcd443687134ba5187a62ba315d2b1db5623c1080cbea0ab865d41d0a7ac638b80e17d142d56b2cd735ea35bf9b03372cd3c8a2e7f75c4d14d69c8f5ae893503dc5950636d615e8241427bc7a8ed231071cfbde5010c6570bf7e4a94fcb4acde51371fb7e4428bf5af908c3820b1b802bc982843253769e555574c4ad9517533e86d7109516e3e8edb5a3eca22d5e10b656a7f2f225176833ccd79f70c64a391726603cd562d9da61e6f97e28c7ec37cab56933625f041b521372fbc2683ef764c6a8c05cafa5f13812f7a7472f6dcc00766ea8f101914b0e1399e71b838a9d598e4fa84a0b09ded26463e9130d0fd7f829e2ccf661bb9594ef8901f01f372ddebc57a2caa0672dad913d6703dd0c7e671d2d34fd59b687e12eacc7079087a6c80db452be65fa3a0abd7f0d75ffabf65ad4871b0d9ecb69340e2306cb6322c51a515aef92e3976c55bd4c5a0e72dd77c5476c56ea6a6906bbb8e567bca50185b3212d394fc8e2e189b0ac3a264a054dd5ec46a7d47462d379f7eeba756d73d5c1201ef54cce31bf9f04ea119b6a613fe05b5ec7a3022bf20c981ed32459ab86bcf4dc40bb5e29a44c243a15a4cee1f34e02688e8e84c901504773fc48672182bfea2235229c12316f0e226bd20aa39a32259acdacc1a9b5fe06967d19a5b4467175ccb1487cff7ef9469308006bb7da4f93aae18b1d3453f36648c4e89db779cd5c5f82eabc98d7bed7ff2fad3deb6932e10c46cb361fa0cc7b8f592eb8b7432e075c2244c6710f7c6b3753de2d7edd0ff22362aacd96ed917861a022fc5226a4be2f33c0cb8d87f99256a069655375b39e087aba757591b07756ca01a460b945098de36a261f81812e7316c4e7c2b6f7ff31ae0539c3ab575ddda6a4ec72bd4bedcd898d3f913a09643d9e5578a490b989c2f6fc990b56862b84450a3ecaaf05855185adc8ea501634449951f68aa2a3a8c32c6181b535ac20cd79e0ef9cc716b00de6c2a744240a591af60763e75d5c327e5488a92a7786e3d2c000e95de22109463fe480ba976b91e338aa77b66a9d1978bee66fe5233bc0d603ce5a94def0afc0805454e7964afce4718cc4c5823f368fb1e1fed7fafb31c3b197dc35503fdbb158f6713747b3b412d6789c74b7c98ca05d33d6118f13165242e768cac86b4faa6d7db4ac7952056174bd32c45a50978b15a58c612277729446cf908332320b40d32b21931332fdde6a971e12d7c6624e7b3d10adf0a02df57ab75c8e8ac4bc41f013ff63de68d66b43a650d2cd91c2f8db2858a8d5483c6b0901783dbef2146965ea83f56103d28592b7d7b69fe661dc3be006dfa608fbabf14e638c3dd3c0e202f554733ef6485ae3b3e62d62b36d67d25b258ace2be91380637b39a87d6b37bb12ca58b97c71057e3a72194e3d7fd0f9420072c72f8a65178245fe735f796a341d0004214775e67ad2a05dd2d1593e4f152d6647edcef92cd8ae57857c516bb24e043047092dad95cc3b666785da995e2aa027255e4a213c7c2cd2f63d864df8da23550ac5a62e62beaf330a5c0631257aa2189fdfaaca4a0264bc91a6a02a75d23e542ffa66a23184bb09b6233e520c194ac25f9ec2570d135e6140ef22848331be102a5bd781d3a826298e7ce82eeccdaaed0546ca769e4ff877778bb106c996a5e092679edcd46e54fdf15d0a8f23db5025a5d85a9c97372890fb99644536620f8850d48c1260d9011a742d157ef74cb90fda9cc3ff0fc036a3695070f6e511fc6f942259876909081be332405234442e10eee500b60fad05112ec39ef57ec23c5098fb6413c70e1ce8921c2295dbc5c235a05204ffd76a6f777492df3ff0f6694160a0f8c4f080c00ba3c7eaa5f45b787bc72adbfdae8f1a2d9770cc0a7ddee53792b73182cba43297701fb6452468cf5680db9bb9eccd537e23aa1c96858a6248539cb41c571ed7e6ebd836520c64aa394f51be283a0dba0b3991d497587d40827613b198cfa988162add9f8fc869433d3340be2a793c72fe84de17559c917a144f0ab84f33c11452d81f06d6ac4607c858150be59c64f1872ffcadddba457e7368a3a6c523a55a00576de7ef82571ff0388eca06c9bd679bef306f0582e6a08768a108179550a2f4353c594c1f4dbac1a7c09d5288d136b71df7aba64cc8398f24b16aa37de7639507809fdae58591e269849755622a8a4acc530e259b3039012bf8bcf8b3cd97c22ad1fab19b2671276d59b489287bba78790effa5c8cea431e838205a2820a8586b0741c55c8e51ac571d2c59151192a5e6e989fa62246ce0ae06c2168c9d1b365f8cd86baba2f0aa261285d0e505665d633d33e8a00094e1426d0f53e475742191042b32c1f8a465e0c034ee04fc7c8e43a11b8859ebbe4df2d96f20d9186f8d4a9b1f4cc04eba09f3e9d50251a87db5f978398ca8eaaa27b2beb74d7a576eb7aa6e5eb9e70507de122afab3d882169aef89f26b1130774a4c0010adbeffd6f608c75f5bd32dd3b5de232796579dd81a8ff63312e2c52e5d3946ad61b0ddcf38141886cf819cedef578f5e01eaa6786f3e7bd5d63ce51de2b6e597083e63450e77d1c1f5724430039defe7bcb8ea610112abd8efc387961549b6d12d822097adaab95133f9f6df9316f8fe3ff73d31c72bfa0cc08788eeeaa7bb30f35721fa34c2098f55b0246a1d42b2f69980ec048fc93ebcd96214f4515b2ed77651a5010a154de33834287c5c1c1e6abde30e931ba25d1ea911a730372d124300824783fc9e09f64fe119324f299e935bee3c9693276731a4c732970d96a8062c11299f698e3fda45e14313f98970e6f15b2452a8498ef5b73727878de1c3b3ca5d609831787f09bad4546daa8b0a3a89da21ee6bc4201cebfd4d4212c096725b676be0b03996ccef68fa8d7662353c39c6b264ff24b1e64105000056930e4481a734a6dfcd165b582d4cd5466180ec60b595ff243ee6e754ec12db98b496077d1d6beea63d6be7e82d7e594dd5d70959fec8e7a5a5466fadfc2375f444819c7c176ac24947bbd4f256196b587f4f00931de17cc697c03f1a85f9358615ffabaa5718ae2f61b3e0580fe33c51bb0fa80ff21c1d8a0914f3bbf6e85a64943c6882de8b56fe22f4126b3773538754496b681224ed7ae617f458745e09d045eba51fe8f962e6100fd2ed47b7ecbd202c88fb317786f296c2188a468634566688d4cb66df55f3bc74b1c7bfdb9d784e26b1c8c6d9eeebe29407639682a26083fa2b13a249af3906e36ced3aa757360c9598c3f3e521da28631365ca132240352982a681356a1f5d836bdd461cde22719dc21d03cddf9659bf716c98a4872146722e9b609c8c07fb8e32ba72bfc8b9cbdc3c5f0af5766e9c608edaad5bcb82947338ca37cdf0fbce2c05f13aea12dd83a28377129fc9f0b51d9201e763fc224e06474f0662efe4a869b5a16ec60cc375fdbc6484b819c0cb3aa3a3df95f876188c3d2a2099c9c8436a58eda2d67b616d926c6fb0104272f82fb499f4266dfb32953cc29a1c69bf84757db48cde7b4c833c75360bfd892c24dce934f24c1937dbf7a2eaa03271ac308a0a5ca2c2d24074c146b7c9f9eaf840cb1dd37ee012ba8a913744105ad67ce5d8d3f87cd8d1cbff1756094048dcd6903888342fc1b4fdde02c1a9fd834eb01a02b8f4b8ee0cabc11c1adddae3edb39e534a9304dd9acfe635581f7d9bff4805637a45c1065f123b710c08cd4f085038187a3007c4d289404e3793caeba5bff5695fe7d53ad23dc7c0bd0f7caccd25adb47d1af14b30a5ebc8243abbc96f87170075cf5eccaa6da33a770ce505972edb8fbea1c43a6ec1697d7ad9c0636e472cb312d12228e3de4d21e63be3184f6f0ea308451118dacff2fa0e83da82598a3ecd220ab35f7edd3a43385aa406e2f17fb39ff3bdb264914c3ee6cc4eba2ceae00524e9282eadc44773f794f6bdbc8ac12435f134fd37768ced54153320f80dec63365546c26776f3f5f959790dc5bc84ea31484686b917b794373f02a33eecd67315dffc0c7ed51a66fdf3217475e572228d0f8afd347334a5e771ad20d79a28501afa6e9245e8e6980e2ef95c77d1dc0cc700d87366e31c5684be426c880f339505a4e75efadf2ed9022b78ecc5de2308cf19faf78b07574a774e44e6bc1aa91981b327df6db233add527f88b5fc946987d0e63e5fde0dfd1c5d799610d92bd0e4a31519ce43a9d95dc85cf46d20ab7ab9dc03cfdbb785185fc2e09d4040d9b14a4433f23f65e628671211394831ea7c0df096eaf71bce371924ecd93fb8b5b35650ec9ba85ea8f08937b84687af82593b9048f1094b65074ae283eb085ffe52a11d8c7b06e9508f95d14358593e03da10d2a7ba4cdaa0c30c88365d2bd4a31f29ece26c1d34c542cca333c8bcf53b9bfa8081c05345adcbd419e359320b66f7c7f2fc25d4db9448b6da17b98192865462399da814cd07a2dec1e79cfd96dbabff543e9aa4f560a626fd4f71f431847bbd925669c4cd8d1f082ffbeb79cdfd0dc0d87f807a34c2362284232229a4a7df3ac8690c29f53e79bcd42b3f7d3653cb0de3e04c3082961ebda9326a1c145ab274e41f634263478c529976164f6c764079372fb0f2b73391e8568cac6f9b1b2083f958e6fd9d21686c13cea832b9a1f2d903dd6190d24e75a7e774464b2c71b19d73939387bef57f9d253def2bfa7bb4864eb3d62fee1e846a081307e2f94a2fd6f22f19270518f077d27a69f1fd2ad5fabb089ea71f7fd449b7c9a58c43d0dc1f64c808b531f7b4af918ed5966bf68eea8c036b9d97bded452485be22df1eaa57db41d09d3caa698a0a0c26396059bab9b7a5c41f840d67377551c3f8c6e47fbf84bcaa2c1f6fa31a1627825fc298b5d8bc521e571573fdff3a47434ad1f025ddb88753c8ae7f20ae3d57319ccb2aa98ee1b28d6ab85fbf5bac6af3bd9bf71f3c1b6a16ba6248ff69a1d0faeb0f4dab0dc2"}, {0x58, 0x118, 0x8, "74319d023219e6a861672cdb06cca5f76d1a2cb43cb6774fc121d8febaec9c84a4c62228c3bf423c3f9ed06bd3217e851f77fd5554b38c62d631985247f919ab0fd775"}, {0x60, 0x3e5150908ef5eed1, 0xe7, "a65448bbab957309e56f7e0e2e8003880cc29adb7a37c691a600ba765798f83590095d42f6272c0c0070665e2180eb67d7158419c4321e337e0db7039f07d0c8108d1e2031bfc8e45747"}, {0x1010, 0x1, 0xb5, "8d6171f29fc04819ef6ed27d989be60e6ba2f1dadef2613b464ddfe4779b5e93365a7da66405e04717e294794eb0c9b818dade5b2e5cf635fbc6f6d9c322208de22c89c75b725b3d80424867899846f6747bb60e0c1a086efcb812c42c6f8b0b3d642c1edc9e545907aaf6a211713f5ddbb19a61dd239e4e5f29efce9c14fa677ca5c3a144009b95d3e62b19baf792300ca30b72bed6bc8d14058c9a997a29723a7316cfc51dbeebecbe1069178518ee6bc0390f46c246efd4d3f716f064dc2e8fcbf0e20c9f779a93d2313e7c3cce533aa3f236d309ebff7f6d7bdc36cef3949ac09f882f5cdebfa629570210ffcd4b80d209adfbd5870a10e4d0f287694f08b1f7fd7f4dd2de4412b53653648f12352595ff19111e9591d0b9135fc06878067233aba70bd5a710cdd523754f6d29482039c61a3e21f2256b9ca1b6596d5a209359aa7b98d8c6804008ed30391ddcd94488f1a84b68d992b2d206402d6d18067b3125e32d7bbd2285243b7286c52464c7908283334f9c54944eed407302971c166204620f5c444d8cb75a8b9ac7be88482f332e5aa4c0f6413edae8b4b117ce4c77bac6d406d6262fe4ff77aae72537359482270416f56df51502849ab4884a0852689b77729d4cbc79ca64311d1818e4061bb204e59e32862f56d5059f6491137cdf32d5a374bf21fdf39b5334244848272376b9c7af26b8bfd466d985345dd49d6097620253cd55b73918ad32fec21196667c8d7b52e2cc1e78d12fdec7d9c7cb96ba8f69b68ec761c270a2b690a51273a411052d569378a4eba78f149f487b9e477d1ddd29c3ee7b2ac0d78a2c2204eba163696518014ea26f526c74876a3ab67a90699482c900854f9fdc147b83a86d0b03d68fb704706408b20de4585bbf4436e7891497b33629c83cf13dbaaff7f4be33bf06923f1482901eadba54a0b5d1f68ea0b5e1413989a56381fba88b490385c6e0dd75d3df42a92ce635f2639b61b25fc65970fd18ecb714f6d91263fca2b345be16c1fd75ab4867792b8495bea7a860b39f7a7218b24911cd97d071351fef9e09923189c4ad988c157da65ebc5ff6e99477b29ce5c929ecebf274a01e0eada759a8f227a14ccd297d89608d8e0279731c0416e6b4fe5cf40dfd32027cba026ac37b6836fb433df83f964b2a66b2fbd36ee4ecfcbccfa7fba75c5f201a854c4353a5e83aa7be6db1292792de1a026aef3648a92ab784f6d3e27fa9adff3ad08caefe25538214e40f07551aeeb7531416d97da084d993da5820372d7995855f75087b39034fd8e021a94b5e4e09a170570b8586d24701b2ca3c8a949928a67a42f77a48941340cad3d1990124bd6fe6b3429e00fbf81ab42ff10b9abaf41ee5e6ae62ad044b052c2b168df628c60004c3a203634db4d037e22e37b4cdc4f1d502047396bbb0f29afec2e5661ce8efe5c4a4e0b8606ec42442743bb4dbf33f86fb0089e5a8b1e74dc3a0743c7df386aa2519f7f4afa16bb1ff4795a24594aab47d59bb369d160ad36293718e457e5cedd70d383b8a34eede902c63de93518928b59a1d0aa5bc91368181dcb934be7a1daf45a6733df1e0d71be428eaa475817ff76b892a76482f5525b2a958707996f460f5658cedb4448486c698fa2d625b651a442f101829c53b696dc07fa818dc027d53323f277e7a98b7acd66e6339ab05dabc2387d474b7541f3ec3f4cf50a337e4d67943481963dfa7e74d1da991c872bd43f9a2706001cdc2144a6659ff2b056efa4615e42e14421d68d03ded1d8534c4c9344277d045efe59d83d8699fba8076b7e5b4cf4555561bf96b71b01f6db6c5a11ab397a317f10b78679e503ca69e4d547086fd9468fc449db2d7381fa7cc683cdbf46a5aead32b2bcb2a60ed3c0a681cd32d4f4f601ba1fa63e3c3646efaf6693fc10037cc7bf30ed3c29af34873bc2d4cbaef6ee57d2273f67dd8436c21775738ce148abf0a54a544b578a7eff59bfc816fde74a5236223e4abd52b7b00b8dc5e9c8830f13dc31c12c261df5e2fd3fe312bcde8d1c0e2c5cce1992e641f55223b6ce6e6ec2cc2df3eb48865a39b3b23654e3e596a8a369ee771f409202fe6e2fcccc55cfd73e7fc023cd4fca6df4b3ae37d7c033a59eef941c3fbde5ea00eea344965bc0e35eb69c61f478f8edc404950068a79820f2b6f311c011019fc77f00079c810102927b5fa8f2e1f0621f864a115abb25747e2161321936e228c4daf0175d203c19312d294db9e39246a6e6c9f28a93a92cd0163df98ee52c23e0edbb28fdd42ea5ede866180cbb34a329fd722a02fc45c0ff02fc3aeb5da7a43734612f56bd7bca81e96b073715eed913b6e4ce76f803bbe51e9488a49225b6c4e56331f86e94707b7d4b22a2a3218530ef017e8d0760e826a27fba614eb0813c9f109d6e75e1e5242bf7f019f144c1465fc95785dc7bd0810ebc9e32a0ae59b06c44ddc966eaf903ddff758ea8bfe81244b6fe9800ae184397ff72f9e3062c1237b4bfca6413ea4c7ae79eadbd8e1dbf340295bc7e055c6e1c1d72958f395689964d1257b41cda24def64006ca447fed3f13348932cefb81175d2a321f692c364f1061175ac7f1a5b2c7d6c20be74908793c5e5a3e645defbe31082f8236de834a2af17f8ee2a776a853b4938a9d339f6f49082d4339806584af711a0396a10d4b98bba4347b6678757ce13eb5b78c797e3cd1089d3d40146d06ee892182a56cd1763b7425a5367e91d14a977862dc4892184826ee605e8021bb7768f982c0fbd4db1171f9df202913de995995c5ec44116abf945ccdc40c6383d57440b36c36b9dcaa9031cd211ae54a0428a19ff819888342c503b9112b3218acd83658bb65d83e7f71a7248a5a14c41580ffc5f35bf55a619e47702216a948f121940f736fe2eac0f42b40c17a52076608ffc8ed18cffb20f7fe6cc03403560590a8dd32ee0cfbef9a5919fd6b414b1a7a0c8d5ddfe476f8315b0066d149df0784b7f5f827abbdd2aa2b11c3148c202581286ffad3284a939907bfd55e79ca13c5a52a64b29f66e5992e55dc0bb52da2531a65a637475cf376c9b8e987d9a7861820ee8c67799599f134a67e6d3dbac0c21b78399c26d3f0cf1d42755cac9b603fc39c43b9f3cb061c55945e46f639b8329d9cbcbe6e0ede1dc7cace23154ec9e7013a0d10b530b16d10275fad776abaeb6329d7132b8853a293edb23fbf6dfea65e6864dd8cba7bb16984349e7664cb5ff9bb99aa7756bb86d28f5b2cc9cf2564417102927c92b8e7703ca44e1e9952f2665545c3293a70ad7ffbd1c036e04a16b74979496d9db487d2e7709e3388e4ae4090ef8794fb83e038715d956ac434fd80289f958494416c55454cd1c8d87cb502c5a52c3a417a40bf778fdf320eb5a4ba7ef991103aa257b5e1d4b444c9d0de0a150793d5d3f0185829d6e358ef6fb1bc369bf547b8745e4ebb5eac4fa07991ff69e705a3c7ffc86582963c9e35da4308f9fb73c718538fa1c4c92da0512eeaccf73bb2f30bf85945d5f9d2e66743bbc94e99f85719a312992e334390067d8fae8db38b5d86494eaa503bccb455f3ec6e1886b88966fc7947da6c5410f9f567092aa106f5c4e16a11b8145659edcdb4d2baa77e7598c8b55602b86f0b5328bb3a2db513fd3c2715a5344917d1e41da3b5c29c0fafd3daa27a9116b71a3b18eba6af5301ccb062b830f412b2b6e0511b070c06b7b6146d2b14c2cb7259705524c3838494eff62298ec876be62ac9fa00c486358816fb45959170f1d1e69817a57da797b98c313290b47625e80a5a5a89bb4d03048fb56e59225585282e63597c4f1a16707c4fe9cf6ea59ca87b57352187e79192b376721aea28a7125cc3b702b303cd13ce5ab16b4f871332e7b426c40531b9cb19e89516af11e1bef088ba5e217f75d1555a806ccb82b61cfb261eae6e2af52d10e7877df528cd697775281f5497a4bd9c8a2619cbbd2708ef8129b9035cd4a4c20bd136fe7fff0a8002106b519f79157d53a690701425ddadd54a29f5374e6a54bea9473d04e1b0828cdf80cd8ce5c787f3767e902cd0c61508e167541b8cdfbc4861cc4c7592891772304ad690a67e0e61ab4fba6fef95317ee496a5c616012798dda2c590d57a8f7dbc60560a496ec297a8b591634128c220becefef6e1055730c9158825145970fef8ab1a9ad4980013a5a6ca8ffaefec6360e994deafab14bdac4f14ab875570f80c47f73d13cbd43dc721927a07d92112787171bc94ed5e60b2674d143b67fcb89230e90cc58f9f19f0fd3086053aae604a7694cd64cd89c9b8cf282a2f05cd64c81e18553098e500bfed008b555baf51b82109501b6bd5e019d7de84dac75a1e6bf6b03f0fd7a0ba55270cf842e561d3cde9a9eb97d03f10663fcea367c5d42b64e8b7a8b29bf09e0d439768c1961676693da954457f2e847cbe48fc70e1c00a6ffa82051272a49da2838450cbec66d53713058e1f2c06d726f14272defaf86a3a1eb45ada133d5ebe82e71ea8a76ead216222f219f932ad4a1346a81a6b63eb1c657e51f8bdb5c9f90a099ad7cb39c209ffb711428abc7d4eba69960244603198246d29638f91474688c67091a21f7b08d0ce2cc52ac729d35892844bee7138c7e6191966111e810166ed630c45b257424d7dec1155350d632342c5ae33ae07dc9980ab4dd10d73991774b4c2aa5cf2965005b9f7e40f572baa05a7adb22f66547b24c673d9c6874b695ef1c7c28b80d2712869fa29c045d10448feb7437e2c31ff592fcced2abf8d21b274b052ebf2d9c313acc5d383781bf27c54d2390b3e85cdd54e11d209449e487b70056062f9c3735766a9d47e85d490f3835b5bfe874088a28e938c7fbd77971578508cc032942f55f2c52ec1d695eb87c8df2b243e3deeef18b9a1eca91bda30277e3f6455427070fb21b5061796357fac13ff4d6a1ce0906d9f50fc67ccf92a592b43c354c83dea832a9b287efa1c199bfb212fcbdb6edb178b97b26fdf64cbe3bd1e1f2ff7b6dd0a1ecd51e796899c01bc7d34bb025ce842842168dab42db33db58aa71ee171682046529eb9b2bdc30c0a3392594a8d9d1975dc21c688be140d80cec497d7d627b9b3c23a78fe988d9a59b48b2db1cb8dfde99933c133018a5e3955a3c8a2c6bcbded56b6d38ea54be17a8db7b400e2284445bad443551c7dc1b0819ac35f8f1de0b9e7c2232c7ccd56476f7edef073a2574e5a9ed3ace1993678cd2fcc60ea743a5ec2ace5fd364a7d3e24a8252b4bc8189ec5cccf2a3d54595ee5a19d7bd7433487d826696764d6b1093e49d45fd475837dd642a89b1a963b888ac4747d226ebf89963813690f7c095413adfd638c98c49667f9d6f1d12ac23359de413e0e50f500ce34fc83261ce64f10f93b857608c5c7d4875ae1a01473ccf64f4ebab97e2add40aea7952db3b58225cc4f335e9adbbfe7a9d542892e64be29be9b2a18ba62444cf6052f1b326ffbf1f78c7de0ef9ddad2434befebfb89e01c1bcd7b3fb7af431ea696f485d72891e75d70522361fa9efada5ffb036a0e9bc7704e04069c10384501ffed6ac42b73dfe7ef3e745581ba806f0d8c7b6e9528d2e0515028ddac810ea06fd7f5d04079e6f961bbca1a412789822a07bfaafad02a2771f83ef89dec123dd8b1968236826a24375b41256506812cc4a1e2e4ec117c380d57a73b2f67ec5c27499eadf1978712150d2fa1023c0953bfba7e87cc862446322cc98f6df3684e8fc289aa09fd67880c301d1"}, {0x78, 0x84, 0xf4c, "bbbf6613a7acdec1d90514c38631a506c3f4b270d8bd9a86ba0cf76ef09557a947d2dd1c576d85693e16c151985ddf599fa052035f9f6bcc569eb0eff8e1b11ff435afb0e5b2cb9e9c58bedb7f724c71e1a53724bd0abf95ac4b7c39cb338f63ef1ba53b"}, {0x38, 0x11, 0x7, "e20badb912011ec6a0b9aae016844ea4877bfb5563e0953f5096da60a15c849a3f09"}], 0x32b8}}], 0x6, 0x20000004) r0 = getpid() kcmp(r0, r0, 0x1, 0xffffffffffffffff, 0xffffffffffffffff) sched_setattr(r0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x9}, 0x0) r1 = open(&(0x7f0000000240)='./file1\x00', 0x141142, 0x0) write$UHID_INPUT(r1, &(0x7f0000001440), 0xfffffc41) read$FUSE(r1, &(0x7f0000002480)={0x2020}, 0x2020) open(&(0x7f00000001c0)='./file1\x00', 0x0, 0x0) setxattr$trusted_overlay_nlink(&(0x7f0000000000)='./file1\x00', &(0x7f00000000c0)='trusted.overlay.nlink\x00', 0x0, 0x0, 0x0) 11:25:44 executing program 4: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x7f, 0x80000000008001}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x9}, 0x0) r1 = open(&(0x7f0000000240)='./file1\x00', 0x141142, 0x0) write$UHID_INPUT(r1, 0x0, 0x0) open(&(0x7f00000001c0)='./file1\x00', 0x0, 0xfffffff6) setxattr$trusted_overlay_nlink(&(0x7f0000000000)='./file1\x00', &(0x7f00000000c0)='trusted.overlay.nlink\x00', 0x0, 0x0, 0x0) [ 610.387375][T28923] loop5: detected capacity change from 264192 to 0 11:25:44 executing program 0: r0 = perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x5c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write$binfmt_elf64(r0, &(0x7f0000000540)=ANY=[@ANYBLOB], 0x2c4) r1 = inotify_init() openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) epoll_ctl$EPOLL_CTL_DEL(0xffffffffffffffff, 0x2, 0xffffffffffffffff) inotify_add_watch(r1, &(0x7f0000000000)='.\x00', 0x400017e) r2 = openat$incfs(0xffffffffffffffff, &(0x7f0000000080)='.log\x00', 0x20200, 0x40) fcntl$getownex(r2, 0x10, &(0x7f00000000c0)) r3 = open(&(0x7f0000000040)='./file0\x00', 0x200c2, 0x0) write$binfmt_elf64(r3, &(0x7f0000000080)=ANY=[], 0x8) sendfile(r3, r3, &(0x7f00000001c0), 0xa198) dup(0xffffffffffffffff) r4 = syz_mount_image$gfs2meta(&(0x7f0000000140)='gfs2meta\x00', &(0x7f0000000200)='./file0\x00', 0x1000, 0x4, &(0x7f0000000880)=[{&(0x7f0000000240)="77ba0daae1b2e74ecd52c59a85bf6f4b1f0b01ab07ba92bc6e57305406115f2bc3e4dd94f19ed896c4fccd34271e9dc3499af9298dbc709e0e6a513d61391d4b198af5f55d24239ae934e8babb8d1cb67bb17b0158", 0x55, 0x3}, {0x0, 0x0, 0x3}, {&(0x7f00000003c0)="792eb6eec33e561f18dc4b58b6a6fb3c7e6fd5e612c08490216ae02617f9811945929cffbf59727393a9a69d57b00a5cd08da3888884b8361d6a4003a54480c1086a5fc876582ff049ede86e2f58d80c7b6cf618e1ba36d4710887bc34ef2b7abbc686df2185f99998060bf492b84e3a02077e2aaf014e1186fde602d2b639d467f48fc2e18cf1553e07ac39040953566ab1d21aac627b166825375377bc3332b62160ea8bf7fc3196b30965dce6181bf7a1c60d0270f24ba6", 0xb9, 0x100000000}, {0x0, 0x0, 0x7}], 0x21008, &(0x7f0000000900)={[{'.log\x00'}, {'-%('}, {'.log\x00'}], [{@obj_user={'obj_user'}}, {@appraise_type='appraise_type=imasig'}, {@fowner_eq={'fowner', 0x3d, 0xee01}}, {@hash='hash'}, {@subj_type={'subj_type', 0x3d, '-&'}}]}) ioctl$BTRFS_IOC_SUBVOL_SETFLAGS(r4, 0x4008941a, &(0x7f0000000980)=0xfe33b054cbbc4d79) [ 610.675636][T28941] loop0: detected capacity change from 264192 to 0 11:25:44 executing program 2: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x7f, 0x80000000008001}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x9}, 0x0) r1 = open(&(0x7f0000000240)='./file1\x00', 0x141142, 0x0) write$UHID_INPUT(r1, &(0x7f0000001440)={0x8, {'\x00|\x00'}}, 0xfffffc41) open(&(0x7f00000001c0)='./file1\x00', 0x0, 0x0) setxattr$trusted_overlay_nlink(&(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x0, 0x0) 11:25:44 executing program 4: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x7f, 0x80000000008001}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x9}, 0x0) r1 = open(&(0x7f0000000240)='./file1\x00', 0x141142, 0x0) write$UHID_INPUT(r1, &(0x7f0000001440), 0xfffffc41) open(0x0, 0x0, 0xfffffff6) setxattr$trusted_overlay_nlink(&(0x7f0000000000)='./file1\x00', &(0x7f00000000c0)='trusted.overlay.nlink\x00', 0x0, 0x0, 0x0) 11:25:44 executing program 3: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x7f, 0x80000000008001}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x9}, 0x0) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000080)) r1 = open(&(0x7f0000000240)='./file1\x00', 0x141142, 0x0) write$UHID_INPUT(r1, &(0x7f0000001440)={0x8, {'\x00w\x00'}}, 0xfffffc41) open(&(0x7f00000001c0)='./file1\x00', 0x0, 0x0) setxattr$trusted_overlay_nlink(&(0x7f0000000000)='./file1\x00', &(0x7f00000000c0)='trusted.overlay.nlink\x00', 0x0, 0x0, 0x0) 11:25:45 executing program 5: r0 = perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x5c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write$binfmt_elf64(r0, &(0x7f0000000540)=ANY=[@ANYBLOB], 0x2c4) r1 = inotify_init() openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) epoll_ctl$EPOLL_CTL_DEL(0xffffffffffffffff, 0x2, 0xffffffffffffffff) inotify_add_watch(r1, &(0x7f0000000000)='.\x00', 0x400017e) r2 = openat$incfs(0xffffffffffffffff, &(0x7f0000000080)='.log\x00', 0x20200, 0x40) fcntl$getownex(r2, 0x10, &(0x7f00000000c0)) r3 = open(&(0x7f0000000040)='./file0\x00', 0x200c2, 0x0) write$binfmt_elf64(r3, &(0x7f0000000080)=ANY=[], 0x8) sendfile(r3, r3, &(0x7f00000001c0), 0xa198) dup(0xffffffffffffffff) r4 = syz_mount_image$gfs2meta(&(0x7f0000000140)='gfs2meta\x00', &(0x7f0000000200)='./file0\x00', 0x1000, 0x4, &(0x7f0000000880)=[{&(0x7f0000000240)="77ba0daae1b2e74ecd52c59a85bf6f4b1f0b01ab07ba92bc6e57305406115f2bc3e4dd94f19ed896c4fccd34271e9dc3499af9298dbc709e0e6a513d61391d4b198af5f55d24239ae934e8babb8d1cb67bb17b0158", 0x55, 0x3}, {0x0, 0x0, 0x3}, {&(0x7f00000003c0)="792eb6eec33e561f18dc4b58b6a6fb3c7e6fd5e612c08490216ae02617f9811945929cffbf59727393a9a69d57b00a5cd08da3888884b8361d6a4003a54480c1086a5fc876582ff049ede86e2f58d80c7b6cf618e1ba36d4710887bc34ef2b7abbc686df2185f99998060bf492b84e3a02077e2aaf014e1186fde602d2b639d467f48fc2e18cf1553e07ac39040953566ab1d21aac627b166825375377bc3332b62160ea8bf7fc3196b30965dce6181bf7a1c60d0270f24ba6", 0xb9, 0x100000000}, {0x0, 0x0, 0x7}], 0x21008, &(0x7f0000000900)={[{'.log\x00'}, {'-%('}, {'.log\x00'}], [{@obj_user={'obj_user'}}, {@appraise_type='appraise_type=imasig'}, {@fowner_eq={'fowner', 0x3d, 0xee01}}, {@hash='hash'}, {@subj_type={'subj_type', 0x3d, '-&'}}]}) ioctl$BTRFS_IOC_SUBVOL_SETFLAGS(r4, 0x4008941a, &(0x7f0000000980)=0xfe33b054cbbc4d79) [ 611.245110][ T35] kauditd_printk_skb: 31 callbacks suppressed [ 611.245122][ T35] audit: type=1804 audit(1612178745.322:2569): pid=28938 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.1" name="/root/syzkaller-testdir551554057/syzkaller.l2Zg4z/439/file1" dev="sda1" ino=15994 res=1 errno=0 11:25:45 executing program 0: r0 = perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x5c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write$binfmt_elf64(r0, &(0x7f0000000540)=ANY=[@ANYBLOB], 0x2c4) r1 = inotify_init() openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) epoll_ctl$EPOLL_CTL_DEL(0xffffffffffffffff, 0x2, 0xffffffffffffffff) inotify_add_watch(r1, &(0x7f0000000000)='.\x00', 0x400017e) r2 = openat$incfs(0xffffffffffffffff, &(0x7f0000000080)='.log\x00', 0x20200, 0x40) fcntl$getownex(r2, 0x10, &(0x7f00000000c0)) r3 = open(&(0x7f0000000040)='./file0\x00', 0x200c2, 0x0) write$binfmt_elf64(r3, &(0x7f0000000080)=ANY=[], 0x8) sendfile(r3, r3, &(0x7f00000001c0), 0xa198) dup(0xffffffffffffffff) r4 = syz_mount_image$gfs2meta(&(0x7f0000000140)='gfs2meta\x00', &(0x7f0000000200)='./file0\x00', 0x1000, 0x4, &(0x7f0000000880)=[{&(0x7f0000000240)="77ba0daae1b2e74ecd52c59a85bf6f4b1f0b01ab07ba92bc6e57305406115f2bc3e4dd94f19ed896c4fccd34271e9dc3499af9298dbc709e0e6a513d61391d4b198af5f55d24239ae934e8babb8d1cb67bb17b0158", 0x55, 0x3}, {0x0, 0x0, 0x3}, {&(0x7f00000003c0)="792eb6eec33e561f18dc4b58b6a6fb3c7e6fd5e612c08490216ae02617f9811945929cffbf59727393a9a69d57b00a5cd08da3888884b8361d6a4003a54480c1086a5fc876582ff049ede86e2f58d80c7b6cf618e1ba36d4710887bc34ef2b7abbc686df2185f99998060bf492b84e3a02077e2aaf014e1186fde602d2b639d467f48fc2e18cf1553e07ac39040953566ab1d21aac627b166825375377bc3332b62160ea8bf7fc3196b30965dce6181bf7a1c60d0270f24ba6", 0xb9, 0x100000000}, {0x0, 0x0, 0x7}], 0x21008, &(0x7f0000000900)={[{'.log\x00'}, {'-%('}, {'.log\x00'}], [{@obj_user={'obj_user'}}, {@appraise_type='appraise_type=imasig'}, {@fowner_eq={'fowner', 0x3d, 0xee01}}, {@hash='hash'}, {@subj_type={'subj_type', 0x3d, '-&'}}]}) ioctl$BTRFS_IOC_SUBVOL_SETFLAGS(r4, 0x4008941a, &(0x7f0000000980)=0xfe33b054cbbc4d79) [ 611.423414][T28964] loop5: detected capacity change from 264192 to 0 [ 611.430092][ T35] audit: type=1804 audit(1612178745.392:2570): pid=28961 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.1" name="/root/syzkaller-testdir551554057/syzkaller.l2Zg4z/439/file1" dev="sda1" ino=15994 res=1 errno=0 11:25:45 executing program 1: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x7f, 0x80000000008001}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x9, 0x1}, 0x0) r1 = open(&(0x7f0000000240)='./file1\x00', 0x141142, 0x0) read$FUSE(r1, &(0x7f0000002480)={0x2020}, 0x2020) write$UHID_INPUT(r1, &(0x7f0000001440), 0xfffffc41) open(&(0x7f00000001c0)='./file1\x00', 0x0, 0x0) r2 = gettid() ptrace$setopts(0x4206, r2, 0x0, 0x0) tkill(r2, 0x3d) sched_setattr(r2, &(0x7f0000000080)={0x38, 0x0, 0x10000008, 0x6, 0x400, 0x0, 0x37d, 0x5, 0x7, 0x6}, 0x0) setxattr$trusted_overlay_nlink(&(0x7f0000000000)='./file1\x00', &(0x7f00000000c0)='trusted.overlay.nlink\x00', 0x0, 0x0, 0x0) [ 611.648245][T28971] loop0: detected capacity change from 264192 to 0 11:25:45 executing program 4: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x7f, 0x80000000008001}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x9}, 0x0) r1 = open(&(0x7f0000000240)='./file1\x00', 0x141142, 0x0) write$UHID_INPUT(r1, &(0x7f0000001440), 0xfffffc41) open(0x0, 0x0, 0xfffffff6) setxattr$trusted_overlay_nlink(&(0x7f0000000000)='./file1\x00', &(0x7f00000000c0)='trusted.overlay.nlink\x00', 0x0, 0x0, 0x0) [ 611.711249][ T35] audit: type=1804 audit(1612178745.792:2571): pid=28955 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.3" name="/root/syzkaller-testdir548988167/syzkaller.gb8agU/442/file1" dev="sda1" ino=15990 res=1 errno=0 [ 611.871248][ T35] audit: type=1804 audit(1612178745.852:2572): pid=28956 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.2" name="/root/syzkaller-testdir245532710/syzkaller.d2c0aK/456/file1" dev="sda1" ino=15991 res=1 errno=0 [ 611.905731][ T35] audit: type=1804 audit(1612178745.922:2573): pid=28959 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.2" name="/root/syzkaller-testdir245532710/syzkaller.d2c0aK/456/file1" dev="sda1" ino=15991 res=1 errno=0 [ 611.943618][ T35] audit: type=1804 audit(1612178745.972:2574): pid=28958 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.3" name="/root/syzkaller-testdir548988167/syzkaller.gb8agU/442/file1" dev="sda1" ino=15990 res=1 errno=0 11:25:46 executing program 1: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x7f, 0x80000000008001}, 0x0) r0 = getpid() r1 = accept4$ax25(0xffffffffffffffff, &(0x7f0000000100)={{0x3, @netrom}, [@null, @bcast, @netrom, @remote, @null, @default, @default, @rose]}, &(0x7f0000000080)=0x48, 0x800) recvmmsg(r1, &(0x7f0000000180)=[{{0x0, 0x0, &(0x7f00000027c0)=[{&(0x7f00000002c0)=""/147, 0x93}, {&(0x7f0000000380)=""/4096, 0x1000}, {&(0x7f0000002480)=""/214, 0xd6}, {&(0x7f0000001380)=""/130, 0x82}, {&(0x7f0000002580)=""/252, 0xfc}, {&(0x7f0000002680)=""/88, 0x58}, {&(0x7f0000002700)=""/173, 0xad}], 0x7, &(0x7f0000002840)=""/103, 0x67}, 0x8}], 0x1, 0x10000, &(0x7f0000000200)) sched_setattr(r0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x9}, 0x0) r2 = open(&(0x7f0000000240)='./file1\x00', 0x141142, 0x0) write$UHID_INPUT(r2, &(0x7f0000001440), 0xfffffc41) pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$USBDEVFS_SETINTERFACE(0xffffffffffffffff, 0x5514, 0x0) vmsplice(r3, &(0x7f00000000c0)=[{&(0x7f0000000080)="cc", 0x1}], 0x1, 0x0) move_pages(0x0, 0x2, &(0x7f0000000180)=[&(0x7f0000000000/0x2000)=nil], &(0x7f0000000040)=[0x1], 0x0, 0x0) ioctl$UFFDIO_COPY(r3, 0xc028aa03, 0x0) mmap$snddsp(&(0x7f0000000000/0x1000)=nil, 0x1000, 0x3, 0x10, 0xffffffffffffffff, 0x10000) open(&(0x7f00000001c0)='./file1\x00', 0x0, 0x1da) setxattr$trusted_overlay_nlink(&(0x7f0000000000)='./file1\x00', &(0x7f00000000c0)='trusted.overlay.nlink\x00', 0x0, 0x0, 0x0) [ 612.030173][ T35] audit: type=1804 audit(1612178746.052:2575): pid=28979 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.1" name="/root/syzkaller-testdir551554057/syzkaller.l2Zg4z/440/file1" dev="sda1" ino=15994 res=1 errno=0 11:25:46 executing program 2: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x7f, 0x80000000008001}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x9}, 0x0) r1 = open(&(0x7f0000000240)='./file1\x00', 0x141142, 0x0) write$UHID_INPUT(r1, &(0x7f0000001440)={0x8, {'\x00}\x00'}}, 0xfffffc41) open(&(0x7f00000001c0)='./file1\x00', 0x0, 0x0) setxattr$trusted_overlay_nlink(&(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x0, 0x0) 11:25:46 executing program 3: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x7f, 0x80000000008001}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x9}, 0x0) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000080)) r1 = open(&(0x7f0000000240)='./file1\x00', 0x141142, 0x0) write$UHID_INPUT(r1, &(0x7f0000001440)={0x8, {'\x00x\x00'}}, 0xfffffc41) open(&(0x7f00000001c0)='./file1\x00', 0x0, 0x0) setxattr$trusted_overlay_nlink(&(0x7f0000000000)='./file1\x00', &(0x7f00000000c0)='trusted.overlay.nlink\x00', 0x0, 0x0, 0x0) 11:25:46 executing program 5: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x7f, 0x80000000008001}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x9}, 0x0) r1 = open(&(0x7f0000000240)='./file1\x00', 0x141142, 0x0) write$UHID_INPUT(r1, &(0x7f0000001440), 0xfffffc41) open(0x0, 0x0, 0xfffffff6) setxattr$trusted_overlay_nlink(&(0x7f0000000000)='./file1\x00', &(0x7f00000000c0)='trusted.overlay.nlink\x00', 0x0, 0x0, 0x0) 11:25:46 executing program 0: r0 = perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x5c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write$binfmt_elf64(r0, &(0x7f0000000540)=ANY=[@ANYBLOB], 0x2c4) r1 = inotify_init() openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) epoll_ctl$EPOLL_CTL_DEL(0xffffffffffffffff, 0x2, 0xffffffffffffffff) inotify_add_watch(r1, &(0x7f0000000000)='.\x00', 0x400017e) r2 = openat$incfs(0xffffffffffffffff, &(0x7f0000000080)='.log\x00', 0x20200, 0x40) fcntl$getownex(r2, 0x10, &(0x7f00000000c0)) r3 = open(&(0x7f0000000040)='./file0\x00', 0x200c2, 0x0) write$binfmt_elf64(r3, &(0x7f0000000080)=ANY=[], 0x8) sendfile(r3, r3, &(0x7f00000001c0), 0xa198) dup(0xffffffffffffffff) r4 = syz_mount_image$gfs2meta(&(0x7f0000000140)='gfs2meta\x00', &(0x7f0000000200)='./file0\x00', 0x1000, 0x4, &(0x7f0000000880)=[{&(0x7f0000000240)="77ba0daae1b2e74ecd52c59a85bf6f4b1f0b01ab07ba92bc6e57305406115f2bc3e4dd94f19ed896c4fccd34271e9dc3499af9298dbc709e0e6a513d61391d4b198af5f55d24239ae934e8babb8d1cb67bb17b0158", 0x55, 0x3}, {&(0x7f00000002c0), 0x0, 0x3}, {&(0x7f00000003c0)="792eb6eec33e561f18dc4b58b6a6fb3c7e6fd5e612c08490216ae02617f9811945929cffbf59727393a9a69d57b00a5cd08da3888884b8361d6a4003a54480c1086a5fc876582ff049ede86e2f58d80c7b6cf618e1ba36d4710887bc34ef2b7abbc686df2185f99998060bf492b84e3a02077e2aaf014e1186fde602d2b639d467f48fc2e18cf1553e07ac39040953566ab1d21aac627b166825375377bc3332b62160ea8bf7fc3196b30965dce6181bf7a1c60d0270f24ba6", 0xb9, 0x100000000}, {0x0, 0x0, 0x7}], 0x21008, &(0x7f0000000900)={[{'.log\x00'}, {'-%('}, {'.log\x00'}], [{@obj_user={'obj_user'}}, {@appraise_type='appraise_type=imasig'}, {@fowner_eq={'fowner', 0x3d, 0xee01}}, {@hash='hash'}, {@subj_type={'subj_type', 0x3d, '-&'}}]}) ioctl$BTRFS_IOC_SUBVOL_SETFLAGS(r4, 0x4008941a, &(0x7f0000000980)=0xfe33b054cbbc4d79) [ 612.567795][T29006] loop0: detected capacity change from 264192 to 0 [ 612.691895][ T35] audit: type=1804 audit(1612178746.773:2576): pid=28988 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.1" name="/root/syzkaller-testdir551554057/syzkaller.l2Zg4z/441/file1" dev="sda1" ino=15993 res=1 errno=0 11:25:47 executing program 1: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x7f, 0x80000000008001}, 0x0) getpid() r0 = gettid() ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3d) sched_setattr(r0, &(0x7f0000000040)={0x38, 0x2, 0x10, 0x2, 0x7, 0x0, 0x2000001}, 0x0) r1 = open(&(0x7f0000000240)='./file1\x00', 0x141142, 0x0) write$UHID_INPUT(r1, &(0x7f0000001440), 0xfffffc41) open(&(0x7f00000001c0)='./file1\x00', 0x0, 0x0) setxattr$trusted_overlay_nlink(&(0x7f0000000000)='./file1\x00', &(0x7f00000000c0)='trusted.overlay.nlink\x00', 0x0, 0x0, 0x0) [ 612.930130][ T35] audit: type=1804 audit(1612178747.013:2577): pid=29014 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.1" name="/root/syzkaller-testdir551554057/syzkaller.l2Zg4z/441/file1" dev="sda1" ino=15993 res=1 errno=0 11:25:47 executing program 4: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x7f, 0x80000000008001}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x9}, 0x0) r1 = open(&(0x7f0000000240)='./file1\x00', 0x141142, 0x0) write$UHID_INPUT(r1, &(0x7f0000001440), 0xfffffc41) open(0x0, 0x0, 0xfffffff6) setxattr$trusted_overlay_nlink(&(0x7f0000000000)='./file1\x00', &(0x7f00000000c0)='trusted.overlay.nlink\x00', 0x0, 0x0, 0x0) [ 613.047364][ T35] audit: type=1804 audit(1612178747.013:2578): pid=28998 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.3" name="/root/syzkaller-testdir548988167/syzkaller.gb8agU/443/file1" dev="sda1" ino=15737 res=1 errno=0 11:25:47 executing program 3: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x7f, 0x80000000008001}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x9}, 0x0) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000080)) r1 = open(&(0x7f0000000240)='./file1\x00', 0x141142, 0x0) write$UHID_INPUT(r1, &(0x7f0000001440)={0x8, {'\x00y\x00'}}, 0xfffffc41) open(&(0x7f00000001c0)='./file1\x00', 0x0, 0x0) setxattr$trusted_overlay_nlink(&(0x7f0000000000)='./file1\x00', &(0x7f00000000c0)='trusted.overlay.nlink\x00', 0x0, 0x0, 0x0) 11:25:47 executing program 0: r0 = perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x5c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write$binfmt_elf64(r0, &(0x7f0000000540)=ANY=[@ANYBLOB], 0x2c4) r1 = inotify_init() openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) epoll_ctl$EPOLL_CTL_DEL(0xffffffffffffffff, 0x2, 0xffffffffffffffff) inotify_add_watch(r1, &(0x7f0000000000)='.\x00', 0x400017e) r2 = openat$incfs(0xffffffffffffffff, &(0x7f0000000080)='.log\x00', 0x20200, 0x40) fcntl$getownex(r2, 0x10, &(0x7f00000000c0)) r3 = open(&(0x7f0000000040)='./file0\x00', 0x200c2, 0x0) write$binfmt_elf64(r3, &(0x7f0000000080)=ANY=[], 0x8) sendfile(r3, r3, &(0x7f00000001c0), 0xa198) dup(0xffffffffffffffff) r4 = syz_mount_image$gfs2meta(&(0x7f0000000140)='gfs2meta\x00', &(0x7f0000000200)='./file0\x00', 0x1000, 0x4, &(0x7f0000000880)=[{&(0x7f0000000240)="77ba0daae1b2e74ecd52c59a85bf6f4b1f0b01ab07ba92bc6e57305406115f2bc3e4dd94f19ed896c4fccd34271e9dc3499af9298dbc709e0e6a513d61391d4b198af5f55d24239ae934e8babb8d1cb67bb17b0158", 0x55, 0x3}, {&(0x7f00000002c0), 0x0, 0x3}, {&(0x7f00000003c0)="792eb6eec33e561f18dc4b58b6a6fb3c7e6fd5e612c08490216ae02617f9811945929cffbf59727393a9a69d57b00a5cd08da3888884b8361d6a4003a54480c1086a5fc876582ff049ede86e2f58d80c7b6cf618e1ba36d4710887bc34ef2b7abbc686df2185f99998060bf492b84e3a02077e2aaf014e1186fde602d2b639d467f48fc2e18cf1553e07ac39040953566ab1d21aac627b166825375377bc3332b62160ea8bf7fc3196b30965dce6181bf7a1c60d0270f24ba6", 0xb9, 0x100000000}, {0x0, 0x0, 0x7}], 0x21008, &(0x7f0000000900)={[{'.log\x00'}, {'-%('}, {'.log\x00'}], [{@obj_user={'obj_user'}}, {@appraise_type='appraise_type=imasig'}, {@fowner_eq={'fowner', 0x3d, 0xee01}}, {@hash='hash'}, {@subj_type={'subj_type', 0x3d, '-&'}}]}) ioctl$BTRFS_IOC_SUBVOL_SETFLAGS(r4, 0x4008941a, &(0x7f0000000980)=0xfe33b054cbbc4d79) 11:25:47 executing program 5: r0 = perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x5c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write$binfmt_elf64(r0, &(0x7f0000000540)=ANY=[@ANYBLOB], 0x2c4) r1 = inotify_init() openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) epoll_ctl$EPOLL_CTL_DEL(0xffffffffffffffff, 0x2, 0xffffffffffffffff) inotify_add_watch(r1, &(0x7f0000000000)='.\x00', 0x400017e) r2 = openat$incfs(0xffffffffffffffff, &(0x7f0000000080)='.log\x00', 0x20200, 0x40) fcntl$getownex(r2, 0x10, &(0x7f00000000c0)) r3 = open(&(0x7f0000000040)='./file0\x00', 0x200c2, 0x0) write$binfmt_elf64(r3, &(0x7f0000000080)=ANY=[], 0x8) sendfile(r3, r3, &(0x7f00000001c0), 0xa198) dup(0xffffffffffffffff) r4 = syz_mount_image$gfs2meta(&(0x7f0000000140)='gfs2meta\x00', &(0x7f0000000200)='./file0\x00', 0x1000, 0x4, &(0x7f0000000880)=[{&(0x7f0000000240)="77ba0daae1b2e74ecd52c59a85bf6f4b1f0b01ab07ba92bc6e57305406115f2bc3e4dd94f19ed896c4fccd34271e9dc3499af9298dbc709e0e6a513d61391d4b198af5f55d24239ae934e8babb8d1cb67bb17b0158", 0x55, 0x3}, {&(0x7f00000002c0), 0x0, 0x3}, {&(0x7f00000003c0)="792eb6eec33e561f18dc4b58b6a6fb3c7e6fd5e612c08490216ae02617f9811945929cffbf59727393a9a69d57b00a5cd08da3888884b8361d6a4003a54480c1086a5fc876582ff049ede86e2f58d80c7b6cf618e1ba36d4710887bc34ef2b7abbc686df2185f99998060bf492b84e3a02077e2aaf014e1186fde602d2b639d467f48fc2e18cf1553e07ac39040953566ab1d21aac627b166825375377bc3332b62160ea8bf7fc3196b30965dce6181bf7a1c60d0270f24ba6", 0xb9, 0x100000000}, {0x0, 0x0, 0x7}], 0x21008, &(0x7f0000000900)={[{'.log\x00'}, {'-%('}, {'.log\x00'}], [{@obj_user={'obj_user'}}, {@appraise_type='appraise_type=imasig'}, {@fowner_eq={'fowner', 0x3d, 0xee01}}, {@hash='hash'}, {@subj_type={'subj_type', 0x3d, '-&'}}]}) ioctl$BTRFS_IOC_SUBVOL_SETFLAGS(r4, 0x4008941a, &(0x7f0000000980)=0xfe33b054cbbc4d79) 11:25:47 executing program 1: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x7f, 0x80000000008001}, 0x0) r0 = getpid() r1 = openat$sndtimer(0xffffffffffffff9c, &(0x7f0000000040)='/dev/snd/timer\x00', 0x0) ioctl$SNDRV_TIMER_IOCTL_SELECT(r1, 0x40345410, &(0x7f00000001c0)={{0x3}}) ioctl$SNDRV_TIMER_IOCTL_CONTINUE(r1, 0x54a2) ioctl$SNDRV_TIMER_IOCTL_PARAMS(r1, 0x40505412, &(0x7f0000000080)) sched_setattr(r0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x9}, 0x0) r2 = open(&(0x7f0000000240)='./file1\x00', 0x141142, 0x0) write$UHID_INPUT(r2, &(0x7f0000001440), 0xfffffc41) open(&(0x7f00000001c0)='./file1\x00', 0x0, 0x0) setxattr$trusted_overlay_nlink(&(0x7f0000000000)='./file1\x00', &(0x7f00000000c0)='trusted.overlay.nlink\x00', 0x0, 0x0, 0x0) 11:25:47 executing program 2: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x7f, 0x80000000008001}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x9}, 0x0) r1 = open(&(0x7f0000000240)='./file1\x00', 0x141142, 0x0) write$UHID_INPUT(r1, &(0x7f0000001440)={0x8, {'\x00~\x00'}}, 0xfffffc41) open(&(0x7f00000001c0)='./file1\x00', 0x0, 0x0) setxattr$trusted_overlay_nlink(&(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x0, 0x0) [ 613.538864][T29029] loop0: detected capacity change from 264192 to 0 [ 613.724819][T29045] loop5: detected capacity change from 264192 to 0 11:25:48 executing program 4: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x7f, 0x80000000008001}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x9}, 0x0) r1 = open(&(0x7f0000000240)='./file1\x00', 0x141142, 0x0) write$UHID_INPUT(r1, &(0x7f0000001440), 0xfffffc41) open(0x0, 0x0, 0x0) setxattr$trusted_overlay_nlink(&(0x7f0000000000)='./file1\x00', &(0x7f00000000c0)='trusted.overlay.nlink\x00', 0x0, 0x0, 0x0) 11:25:48 executing program 1: ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, &(0x7f0000000100)={'vcan0\x00'}) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x7f, 0x80000000008001}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x9}, 0x0) r1 = open(&(0x7f0000000240)='./file1\x00', 0x141142, 0x0) bind$isdn_base(r1, &(0x7f0000000080)={0x22, 0x5, 0x5, 0x2, 0xa1}, 0x6) write$UHID_INPUT(r1, &(0x7f0000001440), 0xfffffc41) open(&(0x7f00000001c0)='./file1\x00', 0x0, 0x0) setxattr$trusted_overlay_nlink(&(0x7f0000000000)='./file1\x00', &(0x7f00000000c0)='trusted.overlay.nlink\x00', 0x0, 0x0, 0x0) 11:25:48 executing program 0: r0 = perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x5c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write$binfmt_elf64(r0, &(0x7f0000000540)=ANY=[@ANYBLOB], 0x2c4) r1 = inotify_init() openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) epoll_ctl$EPOLL_CTL_DEL(0xffffffffffffffff, 0x2, 0xffffffffffffffff) inotify_add_watch(r1, &(0x7f0000000000)='.\x00', 0x400017e) r2 = openat$incfs(0xffffffffffffffff, &(0x7f0000000080)='.log\x00', 0x20200, 0x40) fcntl$getownex(r2, 0x10, &(0x7f00000000c0)) r3 = open(&(0x7f0000000040)='./file0\x00', 0x200c2, 0x0) write$binfmt_elf64(r3, &(0x7f0000000080)=ANY=[], 0x8) sendfile(r3, r3, &(0x7f00000001c0), 0xa198) dup(0xffffffffffffffff) r4 = syz_mount_image$gfs2meta(&(0x7f0000000140)='gfs2meta\x00', &(0x7f0000000200)='./file0\x00', 0x1000, 0x4, &(0x7f0000000880)=[{&(0x7f0000000240)="77ba0daae1b2e74ecd52c59a85bf6f4b1f0b01ab07ba92bc6e57305406115f2bc3e4dd94f19ed896c4fccd34271e9dc3499af9298dbc709e0e6a513d61391d4b198af5f55d24239ae934e8babb8d1cb67bb17b0158", 0x55, 0x3}, {&(0x7f00000002c0), 0x0, 0x3}, {&(0x7f00000003c0)="792eb6eec33e561f18dc4b58b6a6fb3c7e6fd5e612c08490216ae02617f9811945929cffbf59727393a9a69d57b00a5cd08da3888884b8361d6a4003a54480c1086a5fc876582ff049ede86e2f58d80c7b6cf618e1ba36d4710887bc34ef2b7abbc686df2185f99998060bf492b84e3a02077e2aaf014e1186fde602d2b639d467f48fc2e18cf1553e07ac39040953566ab1d21aac627b166825375377bc3332b62160ea8bf7fc3196b30965dce6181bf7a1c60d0270f24ba6", 0xb9, 0x100000000}, {0x0, 0x0, 0x7}], 0x21008, &(0x7f0000000900)={[{'.log\x00'}, {'-%('}, {'.log\x00'}], [{@obj_user={'obj_user'}}, {@appraise_type='appraise_type=imasig'}, {@fowner_eq={'fowner', 0x3d, 0xee01}}, {@hash='hash'}, {@subj_type={'subj_type', 0x3d, '-&'}}]}) ioctl$BTRFS_IOC_SUBVOL_SETFLAGS(r4, 0x4008941a, &(0x7f0000000980)=0xfe33b054cbbc4d79) 11:25:48 executing program 5: r0 = perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x5c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write$binfmt_elf64(r0, &(0x7f0000000540)=ANY=[@ANYBLOB], 0x2c4) r1 = inotify_init() openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) epoll_ctl$EPOLL_CTL_DEL(0xffffffffffffffff, 0x2, 0xffffffffffffffff) inotify_add_watch(r1, &(0x7f0000000000)='.\x00', 0x400017e) r2 = openat$incfs(0xffffffffffffffff, &(0x7f0000000080)='.log\x00', 0x20200, 0x40) fcntl$getownex(r2, 0x10, &(0x7f00000000c0)) r3 = open(&(0x7f0000000040)='./file0\x00', 0x200c2, 0x0) write$binfmt_elf64(r3, &(0x7f0000000080)=ANY=[], 0x8) sendfile(r3, r3, &(0x7f00000001c0), 0xa198) dup(0xffffffffffffffff) r4 = syz_mount_image$gfs2meta(&(0x7f0000000140)='gfs2meta\x00', &(0x7f0000000200)='./file0\x00', 0x1000, 0x4, &(0x7f0000000880)=[{&(0x7f0000000240)="77ba0daae1b2e74ecd52c59a85bf6f4b1f0b01ab07ba92bc6e57305406115f2bc3e4dd94f19ed896c4fccd34271e9dc3499af9298dbc709e0e6a513d61391d4b198af5f55d24239ae934e8babb8d1cb67bb17b0158", 0x55, 0x3}, {&(0x7f00000002c0), 0x0, 0x3}, {&(0x7f00000003c0)="792eb6eec33e561f18dc4b58b6a6fb3c7e6fd5e612c08490216ae02617f9811945929cffbf59727393a9a69d57b00a5cd08da3888884b8361d6a4003a54480c1086a5fc876582ff049ede86e2f58d80c7b6cf618e1ba36d4710887bc34ef2b7abbc686df2185f99998060bf492b84e3a02077e2aaf014e1186fde602d2b639d467f48fc2e18cf1553e07ac39040953566ab1d21aac627b166825375377bc3332b62160ea8bf7fc3196b30965dce6181bf7a1c60d0270f24ba6", 0xb9, 0x100000000}, {0x0, 0x0, 0x7}], 0x21008, &(0x7f0000000900)={[{'.log\x00'}, {'-%('}, {'.log\x00'}], [{@obj_user={'obj_user'}}, {@appraise_type='appraise_type=imasig'}, {@fowner_eq={'fowner', 0x3d, 0xee01}}, {@hash='hash'}, {@subj_type={'subj_type', 0x3d, '-&'}}]}) ioctl$BTRFS_IOC_SUBVOL_SETFLAGS(r4, 0x4008941a, &(0x7f0000000980)=0xfe33b054cbbc4d79) [ 614.506458][T29060] loop0: detected capacity change from 264192 to 0 11:25:48 executing program 3: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x7f, 0x80000000008001}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x9}, 0x0) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000080)) r1 = open(&(0x7f0000000240)='./file1\x00', 0x141142, 0x0) write$UHID_INPUT(r1, &(0x7f0000001440)={0x8, {'\x00z\x00'}}, 0xfffffc41) open(&(0x7f00000001c0)='./file1\x00', 0x0, 0x0) setxattr$trusted_overlay_nlink(&(0x7f0000000000)='./file1\x00', &(0x7f00000000c0)='trusted.overlay.nlink\x00', 0x0, 0x0, 0x0) 11:25:48 executing program 0: r0 = perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x5c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write$binfmt_elf64(r0, &(0x7f0000000540)=ANY=[@ANYBLOB], 0x2c4) r1 = inotify_init() openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) epoll_ctl$EPOLL_CTL_DEL(0xffffffffffffffff, 0x2, 0xffffffffffffffff) inotify_add_watch(r1, &(0x7f0000000000)='.\x00', 0x400017e) r2 = openat$incfs(0xffffffffffffffff, &(0x7f0000000080)='.log\x00', 0x20200, 0x40) fcntl$getownex(r2, 0x10, &(0x7f00000000c0)) r3 = open(&(0x7f0000000040)='./file0\x00', 0x200c2, 0x0) write$binfmt_elf64(r3, &(0x7f0000000080)=ANY=[], 0x8) sendfile(r3, r3, &(0x7f00000001c0), 0xa198) dup(0xffffffffffffffff) r4 = syz_mount_image$gfs2meta(&(0x7f0000000140)='gfs2meta\x00', &(0x7f0000000200)='./file0\x00', 0x1000, 0x4, &(0x7f0000000880)=[{&(0x7f0000000240)="77ba0daae1b2e74ecd52c59a85bf6f4b1f0b01ab07ba92bc6e57305406115f2bc3e4dd94f19ed896c4fccd34271e9dc3499af9298dbc709e0e6a513d61391d4b198af5f55d24239ae934e8babb8d1cb67bb17b0158", 0x55, 0x3}, {&(0x7f00000002c0)="ae227f954d229f666a6cd22938585e852071e55aa5728addcd315922bf32282e077bdbc63cd5ec89626ee2f8e7982ca239eaa758231056cdca22ca27428407f6c64c384665cfbd00ee6e0d7609f2c7ba0f28b4af70d0307ef78decfe42973915cd509de7c19ea0f3f5c3caaab05f9af08e2cc8", 0x73, 0x3}, {&(0x7f00000003c0)="792eb6eec33e561f18dc4b58b6a6fb3c7e6fd5e612c08490216ae02617f9811945929cffbf59727393a9a69d57b00a5cd08da3888884b8361d6a4003a54480c1086a5fc876582ff049ede86e2f58d80c7b6cf618e1ba36d4710887bc34ef2b7abbc686df2185f99998060bf492b84e3a02077e2aaf014e1186fde602d2b639d467f48fc2e18cf1553e07ac39040953566ab1d21aac627b166825375377bc3332b62160ea8bf7fc3196b30965dce6181bf7a1c60d0270f24ba6", 0xb9, 0x100000000}, {0x0, 0x0, 0x7}], 0x21008, &(0x7f0000000900)={[{'.log\x00'}, {'-%('}, {'.log\x00'}], [{@obj_user={'obj_user'}}, {@appraise_type='appraise_type=imasig'}, {@fowner_eq={'fowner', 0x3d, 0xee01}}, {@hash='hash'}, {@subj_type={'subj_type', 0x3d, '-&'}}]}) ioctl$BTRFS_IOC_SUBVOL_SETFLAGS(r4, 0x4008941a, &(0x7f0000000980)=0xfe33b054cbbc4d79) [ 614.695527][T29079] loop5: detected capacity change from 264192 to 0 11:25:48 executing program 2: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x7f, 0x80000000008001}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x9}, 0x0) r1 = open(&(0x7f0000000240)='./file1\x00', 0x141142, 0x0) write$UHID_INPUT(r1, &(0x7f0000001440)={0x8, {"007f00"}}, 0xfffffc41) open(&(0x7f00000001c0)='./file1\x00', 0x0, 0x0) setxattr$trusted_overlay_nlink(&(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x0, 0x0) [ 614.771285][T29085] loop0: detected capacity change from 264192 to 0 11:25:49 executing program 3: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x7f, 0x80000000008001}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x9}, 0x0) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000080)) r1 = open(&(0x7f0000000240)='./file1\x00', 0x141142, 0x0) write$UHID_INPUT(r1, &(0x7f0000001440)={0x8, {'\x00{\x00'}}, 0xfffffc41) open(&(0x7f00000001c0)='./file1\x00', 0x0, 0x0) setxattr$trusted_overlay_nlink(&(0x7f0000000000)='./file1\x00', &(0x7f00000000c0)='trusted.overlay.nlink\x00', 0x0, 0x0, 0x0) 11:25:49 executing program 4: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x7f, 0x80000000008001}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x9}, 0x0) r1 = open(&(0x7f0000000240)='./file1\x00', 0x141142, 0x0) write$UHID_INPUT(r1, &(0x7f0000001440), 0xfffffc41) open(0x0, 0x0, 0x0) setxattr$trusted_overlay_nlink(&(0x7f0000000000)='./file1\x00', &(0x7f00000000c0)='trusted.overlay.nlink\x00', 0x0, 0x0, 0x0) 11:25:49 executing program 0: r0 = perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x5c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write$binfmt_elf64(r0, &(0x7f0000000540)=ANY=[@ANYBLOB], 0x2c4) r1 = inotify_init() openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) epoll_ctl$EPOLL_CTL_DEL(0xffffffffffffffff, 0x2, 0xffffffffffffffff) inotify_add_watch(r1, &(0x7f0000000000)='.\x00', 0x400017e) r2 = openat$incfs(0xffffffffffffffff, &(0x7f0000000080)='.log\x00', 0x20200, 0x40) fcntl$getownex(r2, 0x10, &(0x7f00000000c0)) r3 = open(&(0x7f0000000040)='./file0\x00', 0x200c2, 0x0) write$binfmt_elf64(r3, &(0x7f0000000080)=ANY=[], 0x8) sendfile(r3, r3, &(0x7f00000001c0), 0xa198) dup(0xffffffffffffffff) r4 = syz_mount_image$gfs2meta(&(0x7f0000000140)='gfs2meta\x00', &(0x7f0000000200)='./file0\x00', 0x1000, 0x4, &(0x7f0000000880)=[{&(0x7f0000000240)="77ba0daae1b2e74ecd52c59a85bf6f4b1f0b01ab07ba92bc6e57305406115f2bc3e4dd94f19ed896c4fccd34271e9dc3499af9298dbc709e0e6a513d61391d4b198af5f55d24239ae934e8babb8d1cb67bb17b0158", 0x55, 0x3}, {&(0x7f00000002c0)="ae227f954d229f666a6cd22938585e852071e55aa5728addcd315922bf32282e077bdbc63cd5ec89626ee2f8e7982ca239eaa758231056cdca22ca27428407f6c64c384665cfbd00ee6e0d7609f2c7ba0f28b4af70d0307ef78decfe42973915cd509de7c19ea0f3f5c3caaab05f9af08e2cc8", 0x73, 0x3}, {&(0x7f00000003c0)="792eb6eec33e561f18dc4b58b6a6fb3c7e6fd5e612c08490216ae02617f9811945929cffbf59727393a9a69d57b00a5cd08da3888884b8361d6a4003a54480c1086a5fc876582ff049ede86e2f58d80c7b6cf618e1ba36d4710887bc34ef2b7abbc686df2185f99998060bf492b84e3a02077e2aaf014e1186fde602d2b639d467f48fc2e18cf1553e07ac39040953566ab1d21aac627b166825375377bc3332b62160ea8bf7fc3196b30965dce6181bf7a1c60d0270f24ba6", 0xb9, 0x100000000}, {0x0, 0x0, 0x7}], 0x21008, &(0x7f0000000900)={[{'.log\x00'}, {'-%('}, {'.log\x00'}], [{@obj_user={'obj_user'}}, {@appraise_type='appraise_type=imasig'}, {@fowner_eq={'fowner', 0x3d, 0xee01}}, {@hash='hash'}, {@subj_type={'subj_type', 0x3d, '-&'}}]}) ioctl$BTRFS_IOC_SUBVOL_SETFLAGS(r4, 0x4008941a, &(0x7f0000000980)=0xfe33b054cbbc4d79) 11:25:49 executing program 5: r0 = perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x5c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write$binfmt_elf64(r0, &(0x7f0000000540)=ANY=[@ANYBLOB], 0x2c4) r1 = inotify_init() openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) epoll_ctl$EPOLL_CTL_DEL(0xffffffffffffffff, 0x2, 0xffffffffffffffff) inotify_add_watch(r1, &(0x7f0000000000)='.\x00', 0x400017e) r2 = openat$incfs(0xffffffffffffffff, &(0x7f0000000080)='.log\x00', 0x20200, 0x40) fcntl$getownex(r2, 0x10, &(0x7f00000000c0)) r3 = open(&(0x7f0000000040)='./file0\x00', 0x200c2, 0x0) write$binfmt_elf64(r3, &(0x7f0000000080)=ANY=[], 0x8) sendfile(r3, r3, &(0x7f00000001c0), 0xa198) dup(0xffffffffffffffff) r4 = syz_mount_image$gfs2meta(&(0x7f0000000140)='gfs2meta\x00', &(0x7f0000000200)='./file0\x00', 0x1000, 0x4, &(0x7f0000000880)=[{&(0x7f0000000240)="77ba0daae1b2e74ecd52c59a85bf6f4b1f0b01ab07ba92bc6e57305406115f2bc3e4dd94f19ed896c4fccd34271e9dc3499af9298dbc709e0e6a513d61391d4b198af5f55d24239ae934e8babb8d1cb67bb17b0158", 0x55, 0x3}, {&(0x7f00000002c0)="ae227f954d229f666a6cd22938585e852071e55aa5728addcd315922bf32282e077bdbc63cd5ec89626ee2f8e7982ca239eaa758231056cdca22ca27428407f6c64c384665cfbd00ee6e0d7609f2c7ba0f28b4af70d0307ef78decfe42973915cd509de7c19ea0f3f5c3caaab05f9af08e2cc8", 0x73, 0x3}, {&(0x7f00000003c0)="792eb6eec33e561f18dc4b58b6a6fb3c7e6fd5e612c08490216ae02617f9811945929cffbf59727393a9a69d57b00a5cd08da3888884b8361d6a4003a54480c1086a5fc876582ff049ede86e2f58d80c7b6cf618e1ba36d4710887bc34ef2b7abbc686df2185f99998060bf492b84e3a02077e2aaf014e1186fde602d2b639d467f48fc2e18cf1553e07ac39040953566ab1d21aac627b166825375377bc3332b62160ea8bf7fc3196b30965dce6181bf7a1c60d0270f24ba6", 0xb9, 0x100000000}, {0x0, 0x0, 0x7}], 0x21008, &(0x7f0000000900)={[{'.log\x00'}, {'-%('}, {'.log\x00'}], [{@obj_user={'obj_user'}}, {@appraise_type='appraise_type=imasig'}, {@fowner_eq={'fowner', 0x3d, 0xee01}}, {@hash='hash'}, {@subj_type={'subj_type', 0x3d, '-&'}}]}) ioctl$BTRFS_IOC_SUBVOL_SETFLAGS(r4, 0x4008941a, &(0x7f0000000980)=0xfe33b054cbbc4d79) 11:25:49 executing program 1: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) r1 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f0000000500)={0x0, 0x18, 0xfa00, {0x0, &(0x7f00000004c0)={0xffffffffffffffff}, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r1, &(0x7f0000000540)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x0, @empty}, {0xa, 0x0, 0x0, @dev}, r2}}, 0x48) write$RDMA_USER_CM_CMD_JOIN_IP_MCAST(0xffffffffffffffff, &(0x7f0000000300)={0x10, 0x30, 0xfa00, {&(0x7f0000000200), 0x2, {0xa, 0x4e21, 0x7d, @private1, 0xffe00000}, r2}}, 0x38) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000000)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000100), 0x111}}, 0x20) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) r4 = dup2(r3, r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000140)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000080), 0x13f}}, 0x20) r5 = dup2(r4, r0) r6 = getpid() sched_setattr(r6, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x9}, 0x0) r7 = open(&(0x7f0000000240)='./file1\x00', 0x141142, 0x0) write$UHID_INPUT(r7, &(0x7f0000001440), 0xff16) open(&(0x7f00000001c0)='./file1\x00', 0x0, 0x0) sched_setattr(0xffffffffffffffff, &(0x7f0000000180)={0x38, 0x5, 0x2, 0x7, 0x0, 0xffffffffffffffff, 0x6, 0x9, 0xffffffff, 0xc28}, 0x0) setxattr$trusted_overlay_nlink(&(0x7f0000000000)='./file1\x00', &(0x7f00000000c0)='trusted.overlay.nlink\x00', 0x0, 0x0, 0x3) ioctl$FS_IOC_MEASURE_VERITY(r5, 0xc0046686, &(0x7f0000000280)={0x1, 0x49, "c65098d11fa7a5bc534dc986a1a7ae860e0ee5765d4693ef1d55ba14b1177eac00261f61555e64c426d18c047b034941cea7738d58ccab6a85ecf7a2d258f38d5544f502ad448d8bfd"}) ftruncate(r0, 0x0) [ 615.764341][T29108] loop0: detected capacity change from 264192 to 0 [ 615.828945][T29114] loop5: detected capacity change from 264192 to 0 11:25:50 executing program 1: prlimit64(0x0, 0xa, &(0x7f0000000080)={0x1000000000009, 0x80080000008001}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x9}, 0x0) r1 = open(&(0x7f0000000240)='./file1\x00', 0x141142, 0x0) write$UHID_INPUT(r1, &(0x7f0000001440), 0xfffffc41) open(&(0x7f00000001c0)='./file1\x00', 0x0, 0x0) setxattr$trusted_overlay_nlink(&(0x7f0000000000)='./file1\x00', &(0x7f00000000c0)='trusted.overlay.nlink\x00', 0x0, 0x0, 0x0) 11:25:50 executing program 2: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x7f, 0x80000000008001}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x9}, 0x0) r1 = open(&(0x7f0000000240)='./file1\x00', 0x141142, 0x0) write$UHID_INPUT(r1, &(0x7f0000001440)={0x8, {"088000"}}, 0xfffffc41) open(&(0x7f00000001c0)='./file1\x00', 0x0, 0x0) setxattr$trusted_overlay_nlink(&(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x0, 0x0) [ 616.327449][ T35] kauditd_printk_skb: 20 callbacks suppressed [ 616.327460][ T35] audit: type=1804 audit(1612178750.403:2599): pid=29119 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.3" name="/root/syzkaller-testdir548988167/syzkaller.gb8agU/446/file1" dev="sda1" ino=15737 res=1 errno=0 11:25:50 executing program 0: r0 = perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x5c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write$binfmt_elf64(r0, &(0x7f0000000540)=ANY=[@ANYBLOB], 0x2c4) r1 = inotify_init() openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) epoll_ctl$EPOLL_CTL_DEL(0xffffffffffffffff, 0x2, 0xffffffffffffffff) inotify_add_watch(r1, &(0x7f0000000000)='.\x00', 0x400017e) r2 = openat$incfs(0xffffffffffffffff, &(0x7f0000000080)='.log\x00', 0x20200, 0x40) fcntl$getownex(r2, 0x10, &(0x7f00000000c0)) r3 = open(&(0x7f0000000040)='./file0\x00', 0x200c2, 0x0) write$binfmt_elf64(r3, &(0x7f0000000080)=ANY=[], 0x8) sendfile(r3, r3, &(0x7f00000001c0), 0xa198) dup(0xffffffffffffffff) r4 = syz_mount_image$gfs2meta(&(0x7f0000000140)='gfs2meta\x00', &(0x7f0000000200)='./file0\x00', 0x1000, 0x4, &(0x7f0000000880)=[{&(0x7f0000000240)="77ba0daae1b2e74ecd52c59a85bf6f4b1f0b01ab07ba92bc6e57305406115f2bc3e4dd94f19ed896c4fccd34271e9dc3499af9298dbc709e0e6a513d61391d4b198af5f55d24239ae934e8babb8d1cb67bb17b0158", 0x55, 0x3}, {&(0x7f00000002c0)="ae227f954d229f666a6cd22938585e852071e55aa5728addcd315922bf32282e077bdbc63cd5ec89626ee2f8e7982ca239eaa758231056cdca22ca27428407f6c64c384665cfbd00ee6e0d7609f2c7ba0f28b4af70d0307ef78decfe42973915cd509de7c19ea0f3f5c3caaab05f9af08e2cc8", 0x73, 0x3}, {&(0x7f00000003c0)="792eb6eec33e561f18dc4b58b6a6fb3c7e6fd5e612c08490216ae02617f9811945929cffbf59727393a9a69d57b00a5cd08da3888884b8361d6a4003a54480c1086a5fc876582ff049ede86e2f58d80c7b6cf618e1ba36d4710887bc34ef2b7abbc686df2185f99998060bf492b84e3a02077e2aaf014e1186fde602d2b639d467f48fc2e18cf1553e07ac39040953566ab1d21aac627b166825375377bc3332b62160ea8bf7fc3196b30965dce6181bf7a1c60d0270f24ba6", 0xb9, 0x100000000}, {0x0, 0x0, 0x7}], 0x21008, &(0x7f0000000900)={[{'.log\x00'}, {'-%('}, {'.log\x00'}], [{@obj_user={'obj_user'}}, {@appraise_type='appraise_type=imasig'}, {@fowner_eq={'fowner', 0x3d, 0xee01}}, {@hash='hash'}, {@subj_type={'subj_type', 0x3d, '-&'}}]}) ioctl$BTRFS_IOC_SUBVOL_SETFLAGS(r4, 0x4008941a, &(0x7f0000000980)=0xfe33b054cbbc4d79) 11:25:50 executing program 3: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x7f, 0x80000000008001}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x9}, 0x0) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000080)) r1 = open(&(0x7f0000000240)='./file1\x00', 0x141142, 0x0) write$UHID_INPUT(r1, &(0x7f0000001440)={0x8, {'\x00|\x00'}}, 0xfffffc41) open(&(0x7f00000001c0)='./file1\x00', 0x0, 0x0) setxattr$trusted_overlay_nlink(&(0x7f0000000000)='./file1\x00', &(0x7f00000000c0)='trusted.overlay.nlink\x00', 0x0, 0x0, 0x0) [ 616.617175][ T35] audit: type=1804 audit(1612178750.693:2600): pid=29126 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.3" name="/root/syzkaller-testdir548988167/syzkaller.gb8agU/446/file1" dev="sda1" ino=15737 res=1 errno=0 11:25:50 executing program 5: r0 = perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x5c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write$binfmt_elf64(r0, &(0x7f0000000540)=ANY=[@ANYBLOB], 0x2c4) r1 = inotify_init() openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) epoll_ctl$EPOLL_CTL_DEL(0xffffffffffffffff, 0x2, 0xffffffffffffffff) inotify_add_watch(r1, &(0x7f0000000000)='.\x00', 0x400017e) r2 = openat$incfs(0xffffffffffffffff, &(0x7f0000000080)='.log\x00', 0x20200, 0x40) fcntl$getownex(r2, 0x10, &(0x7f00000000c0)) r3 = open(&(0x7f0000000040)='./file0\x00', 0x200c2, 0x0) write$binfmt_elf64(r3, &(0x7f0000000080)=ANY=[], 0x8) sendfile(r3, r3, &(0x7f00000001c0), 0xa198) dup(0xffffffffffffffff) r4 = syz_mount_image$gfs2meta(&(0x7f0000000140)='gfs2meta\x00', &(0x7f0000000200)='./file0\x00', 0x1000, 0x4, &(0x7f0000000880)=[{&(0x7f0000000240)="77ba0daae1b2e74ecd52c59a85bf6f4b1f0b01ab07ba92bc6e57305406115f2bc3e4dd94f19ed896c4fccd34271e9dc3499af9298dbc709e0e6a513d61391d4b198af5f55d24239ae934e8babb8d1cb67bb17b0158", 0x55, 0x3}, {&(0x7f00000002c0)="ae227f954d229f666a6cd22938585e852071e55aa5728addcd315922bf32282e077bdbc63cd5ec89626ee2f8e7982ca239eaa758231056cdca22ca27428407f6c64c384665cfbd00ee6e0d7609f2c7ba0f28b4af70d0307ef78decfe42973915cd509de7c19ea0f3f5c3caaab05f9af08e2cc8", 0x73, 0x3}, {&(0x7f00000003c0)="792eb6eec33e561f18dc4b58b6a6fb3c7e6fd5e612c08490216ae02617f9811945929cffbf59727393a9a69d57b00a5cd08da3888884b8361d6a4003a54480c1086a5fc876582ff049ede86e2f58d80c7b6cf618e1ba36d4710887bc34ef2b7abbc686df2185f99998060bf492b84e3a02077e2aaf014e1186fde602d2b639d467f48fc2e18cf1553e07ac39040953566ab1d21aac627b166825375377bc3332b62160ea8bf7fc3196b30965dce6181bf7a1c60d0270f24ba6", 0xb9, 0x100000000}, {0x0, 0x0, 0x7}], 0x21008, &(0x7f0000000900)={[{'.log\x00'}, {'-%('}, {'.log\x00'}], [{@obj_user={'obj_user'}}, {@appraise_type='appraise_type=imasig'}, {@fowner_eq={'fowner', 0x3d, 0xee01}}, {@hash='hash'}, {@subj_type={'subj_type', 0x3d, '-&'}}]}) ioctl$BTRFS_IOC_SUBVOL_SETFLAGS(r4, 0x4008941a, &(0x7f0000000980)=0xfe33b054cbbc4d79) [ 616.760568][ T35] audit: type=1800 audit(1612178750.743:2601): pid=29111 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed comm="syz-executor.3" name="file1" dev="sda1" ino=15737 res=0 errno=0 [ 616.805185][T29142] loop0: detected capacity change from 264192 to 0 11:25:50 executing program 4: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x7f, 0x80000000008001}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x9}, 0x0) r1 = open(&(0x7f0000000240)='./file1\x00', 0x141142, 0x0) write$UHID_INPUT(r1, &(0x7f0000001440), 0xfffffc41) open(0x0, 0x0, 0x0) setxattr$trusted_overlay_nlink(&(0x7f0000000000)='./file1\x00', &(0x7f00000000c0)='trusted.overlay.nlink\x00', 0x0, 0x0, 0x0) [ 616.874862][ T35] audit: type=1800 audit(1612178750.753:2602): pid=29126 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed comm="syz-executor.3" name="file1" dev="sda1" ino=15737 res=0 errno=0 11:25:51 executing program 1: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x7f, 0x80000000008001}, 0x0) r0 = getpid() recvmmsg(0xffffffffffffffff, &(0x7f0000004e40)=[{{0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000080)}], 0x1, &(0x7f0000000140)=""/4, 0x4}, 0x7}, {{&(0x7f00000002c0)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @multicast2}}}, 0x80, &(0x7f0000000200)=[{&(0x7f0000000340)=""/79, 0x4f}, {&(0x7f0000000180)=""/64, 0x40}], 0x2}, 0xe98}, {{0x0, 0x0, &(0x7f0000002480)=[{&(0x7f00000003c0)=""/111, 0x6f}, {&(0x7f0000000440)=""/4096, 0x1000}], 0x2, &(0x7f00000024c0)=""/4096, 0x1000}, 0x9}, {{&(0x7f00000034c0)=@un=@abs, 0x80, &(0x7f0000003700)=[{&(0x7f0000003540)=""/84, 0x54}, {&(0x7f00000035c0)=""/63, 0x3f}, {&(0x7f0000003600)=""/223, 0xdf}], 0x3, &(0x7f0000003740)=""/142, 0x8e}, 0x7}, {{&(0x7f0000003800)=@l2={0x1f, 0x0, @none}, 0x80, &(0x7f0000004b80)=[{&(0x7f0000003880)=""/4096, 0x1000}, {&(0x7f0000004880)=""/127, 0x7f}, {&(0x7f0000004900)=""/173, 0xad}, {&(0x7f00000049c0)=""/99, 0x63}, {&(0x7f0000004a40)=""/23, 0x17}, {&(0x7f0000004a80)=""/52, 0x34}, {&(0x7f0000004ac0)=""/177, 0xb1}], 0x7, &(0x7f0000004c00)=""/28, 0x1c}, 0x1}, {{0x0, 0x0, &(0x7f0000004d00)=[{&(0x7f0000004c40)=""/183, 0xb7}], 0x1, &(0x7f0000004d40)=""/242, 0xf2}, 0xff}], 0x6, 0x20, 0x0) sched_setattr(r0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x9}, 0x0) r1 = open(&(0x7f0000000240)='./file1\x00', 0x141142, 0x0) write$UHID_INPUT(r1, &(0x7f0000001440), 0xfffffc41) open(&(0x7f00000001c0)='./file1\x00', 0x0, 0x0) setxattr$trusted_overlay_nlink(&(0x7f0000000000)='./file1\x00', &(0x7f00000000c0)='trusted.overlay.nlink\x00', 0x0, 0x0, 0x0) [ 616.959506][ T35] audit: type=1804 audit(1612178750.883:2603): pid=29130 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.1" name="/root/syzkaller-testdir551554057/syzkaller.l2Zg4z/446/file1" dev="sda1" ino=15892 res=1 errno=0 [ 617.043692][T29154] loop5: detected capacity change from 264192 to 0 [ 617.091452][ T35] audit: type=1804 audit(1612178750.983:2604): pid=29135 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.2" name="/root/syzkaller-testdir245532710/syzkaller.d2c0aK/460/file1" dev="sda1" ino=15952 res=1 errno=0 [ 617.117510][ T35] audit: type=1804 audit(1612178750.993:2605): pid=29131 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.1" name="/root/syzkaller-testdir551554057/syzkaller.l2Zg4z/446/file1" dev="sda1" ino=15892 res=1 errno=0 [ 617.153775][ T35] audit: type=1804 audit(1612178751.073:2606): pid=29137 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.2" name="/root/syzkaller-testdir245532710/syzkaller.d2c0aK/460/file1" dev="sda1" ino=15952 res=1 errno=0 11:25:51 executing program 2: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x7f, 0x80000000008001}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x9}, 0x0) r1 = open(&(0x7f0000000240)='./file1\x00', 0x141142, 0x0) write$UHID_INPUT(r1, &(0x7f0000001440)={0x8, {"008100"}}, 0xfffffc41) open(&(0x7f00000001c0)='./file1\x00', 0x0, 0x0) setxattr$trusted_overlay_nlink(&(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x0, 0x0) 11:25:51 executing program 0: r0 = perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x5c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write$binfmt_elf64(r0, &(0x7f0000000540)=ANY=[@ANYBLOB], 0x2c4) r1 = inotify_init() openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) epoll_ctl$EPOLL_CTL_DEL(0xffffffffffffffff, 0x2, 0xffffffffffffffff) inotify_add_watch(r1, &(0x7f0000000000)='.\x00', 0x400017e) r2 = openat$incfs(0xffffffffffffffff, &(0x7f0000000080)='.log\x00', 0x20200, 0x40) fcntl$getownex(r2, 0x10, &(0x7f00000000c0)) r3 = open(&(0x7f0000000040)='./file0\x00', 0x200c2, 0x0) write$binfmt_elf64(r3, &(0x7f0000000080)=ANY=[], 0x8) sendfile(r3, r3, &(0x7f00000001c0), 0xa198) dup(0xffffffffffffffff) r4 = syz_mount_image$gfs2meta(&(0x7f0000000140)='gfs2meta\x00', &(0x7f0000000200)='./file0\x00', 0x1000, 0x4, &(0x7f0000000880)=[{&(0x7f0000000240)="77ba0daae1b2e74ecd52c59a85bf6f4b1f0b01ab07ba92bc6e57305406115f2bc3e4dd94f19ed896c4fccd34271e9dc3499af9298dbc709e0e6a513d61391d4b198af5f55d24239ae934e8babb8d1cb67bb17b0158", 0x55, 0x3}, {&(0x7f00000002c0)="ae227f954d229f666a6cd22938585e852071e55aa5728addcd315922bf32282e077bdbc63cd5ec89626ee2f8e7982ca239eaa758231056cdca22ca27428407f6c64c384665cfbd00ee6e0d7609f2c7ba0f28b4af70d0307ef78decfe42973915cd509de7c19ea0f3f5c3caaab05f9af08e2cc82d2c14b919dd045e3d36ce1c5d0ff23aed0a4a6ef508b5e71df0a25250d47f1e033ed503b6df99c189111b75b59df679cb75240b756cafecfd", 0xac, 0x3}, {&(0x7f00000003c0)="792eb6eec33e561f18dc4b58b6a6fb3c7e6fd5e612c08490216ae02617f9811945929cffbf59727393a9a69d57b00a5cd08da3888884b8361d6a4003a54480c1086a5fc876582ff049ede86e2f58d80c7b6cf618e1ba36d4710887bc34ef2b7abbc686df2185f99998060bf492b84e3a02077e2aaf014e1186fde602d2b639d467f48fc2e18cf1553e07ac39040953566ab1d21aac627b166825375377bc3332b62160ea8bf7fc3196b30965dce6181bf7a1c60d0270f24ba6", 0xb9, 0x100000000}, {0x0, 0x0, 0x7}], 0x21008, &(0x7f0000000900)={[{'.log\x00'}, {'-%('}, {'.log\x00'}], [{@obj_user={'obj_user'}}, {@appraise_type='appraise_type=imasig'}, {@fowner_eq={'fowner', 0x3d, 0xee01}}, {@hash='hash'}, {@subj_type={'subj_type', 0x3d, '-&'}}]}) ioctl$BTRFS_IOC_SUBVOL_SETFLAGS(r4, 0x4008941a, &(0x7f0000000980)=0xfe33b054cbbc4d79) [ 617.616530][ T35] audit: type=1804 audit(1612178751.693:2607): pid=29158 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.3" name="/root/syzkaller-testdir548988167/syzkaller.gb8agU/447/file1" dev="sda1" ino=16006 res=1 errno=0 [ 617.739297][T29180] loop0: detected capacity change from 264192 to 0 11:25:51 executing program 5: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x7f, 0x80000000008001}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x9}, 0x0) r1 = open(&(0x7f0000000240)='./file1\x00', 0x141142, 0x0) write$UHID_INPUT(r1, &(0x7f0000001440)={0x8, {"007f00"}}, 0xfffffc41) open(&(0x7f00000001c0)='./file1\x00', 0x0, 0x0) setxattr$trusted_overlay_nlink(&(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x0, 0x0) [ 617.897469][ T35] audit: type=1804 audit(1612178751.953:2608): pid=29159 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.3" name="/root/syzkaller-testdir548988167/syzkaller.gb8agU/447/file1" dev="sda1" ino=16006 res=1 errno=0 11:25:52 executing program 3: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x7f, 0x80000000008001}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x9}, 0x0) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000080)) r1 = open(&(0x7f0000000240)='./file1\x00', 0x141142, 0x0) write$UHID_INPUT(r1, &(0x7f0000001440)={0x8, {'\x00}\x00'}}, 0xfffffc41) open(&(0x7f00000001c0)='./file1\x00', 0x0, 0x0) setxattr$trusted_overlay_nlink(&(0x7f0000000000)='./file1\x00', &(0x7f00000000c0)='trusted.overlay.nlink\x00', 0x0, 0x0, 0x0) 11:25:52 executing program 4: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x7f, 0x80000000008001}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x9}, 0x0) r1 = open(&(0x7f0000000240)='./file1\x00', 0x141142, 0x0) write$UHID_INPUT(r1, &(0x7f0000001440), 0xfffffc41) open(0x0, 0x0, 0xfffffff6) setxattr$trusted_overlay_nlink(0x0, &(0x7f00000000c0)='trusted.overlay.nlink\x00', 0x0, 0x0, 0x0) 11:25:52 executing program 1: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x7f, 0x80000000008001}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0xd}, 0x0) r1 = gettid() ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x3d) r2 = gettid() ptrace$setopts(0x4206, r2, 0x0, 0x0) tkill(r2, 0x3d) ptrace$cont(0x20, r2, 0x8, 0x83) sched_setattr(r1, &(0x7f0000000080)={0x38, 0x6, 0x10000004, 0x7, 0xa49, 0xfff, 0x3, 0x10000, 0x5, 0x2}, 0x0) r3 = open(&(0x7f0000000240)='./file1\x00', 0x141142, 0x0) write$UHID_INPUT(r3, &(0x7f0000001440), 0xfffffc41) open(&(0x7f00000001c0)='./file1\x00', 0x0, 0x20) setxattr$trusted_overlay_nlink(&(0x7f0000000000)='./file1\x00', &(0x7f00000000c0)='trusted.overlay.nlink\x00', 0x0, 0x0, 0x0) 11:25:52 executing program 0: r0 = perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x5c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write$binfmt_elf64(r0, &(0x7f0000000540)=ANY=[@ANYBLOB], 0x2c4) r1 = inotify_init() openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) epoll_ctl$EPOLL_CTL_DEL(0xffffffffffffffff, 0x2, 0xffffffffffffffff) inotify_add_watch(r1, &(0x7f0000000000)='.\x00', 0x400017e) r2 = openat$incfs(0xffffffffffffffff, &(0x7f0000000080)='.log\x00', 0x20200, 0x40) fcntl$getownex(r2, 0x10, &(0x7f00000000c0)) r3 = open(&(0x7f0000000040)='./file0\x00', 0x200c2, 0x0) write$binfmt_elf64(r3, &(0x7f0000000080)=ANY=[], 0x8) sendfile(r3, r3, &(0x7f00000001c0), 0xa198) dup(0xffffffffffffffff) r4 = syz_mount_image$gfs2meta(&(0x7f0000000140)='gfs2meta\x00', &(0x7f0000000200)='./file0\x00', 0x1000, 0x4, &(0x7f0000000880)=[{&(0x7f0000000240)="77ba0daae1b2e74ecd52c59a85bf6f4b1f0b01ab07ba92bc6e57305406115f2bc3e4dd94f19ed896c4fccd34271e9dc3499af9298dbc709e0e6a513d61391d4b198af5f55d24239ae934e8babb8d1cb67bb17b0158", 0x55, 0x3}, {&(0x7f00000002c0)="ae227f954d229f666a6cd22938585e852071e55aa5728addcd315922bf32282e077bdbc63cd5ec89626ee2f8e7982ca239eaa758231056cdca22ca27428407f6c64c384665cfbd00ee6e0d7609f2c7ba0f28b4af70d0307ef78decfe42973915cd509de7c19ea0f3f5c3caaab05f9af08e2cc82d2c14b919dd045e3d36ce1c5d0ff23aed0a4a6ef508b5e71df0a25250d47f1e033ed503b6df99c189111b75b59df679cb75240b756cafecfd", 0xac, 0x3}, {&(0x7f00000003c0)="792eb6eec33e561f18dc4b58b6a6fb3c7e6fd5e612c08490216ae02617f9811945929cffbf59727393a9a69d57b00a5cd08da3888884b8361d6a4003a54480c1086a5fc876582ff049ede86e2f58d80c7b6cf618e1ba36d4710887bc34ef2b7abbc686df2185f99998060bf492b84e3a02077e2aaf014e1186fde602d2b639d467f48fc2e18cf1553e07ac39040953566ab1d21aac627b166825375377bc3332b62160ea8bf7fc3196b30965dce6181bf7a1c60d0270f24ba6", 0xb9, 0x100000000}, {0x0, 0x0, 0x7}], 0x21008, &(0x7f0000000900)={[{'.log\x00'}, {'-%('}, {'.log\x00'}], [{@obj_user={'obj_user'}}, {@appraise_type='appraise_type=imasig'}, {@fowner_eq={'fowner', 0x3d, 0xee01}}, {@hash='hash'}, {@subj_type={'subj_type', 0x3d, '-&'}}]}) ioctl$BTRFS_IOC_SUBVOL_SETFLAGS(r4, 0x4008941a, &(0x7f0000000980)=0xfe33b054cbbc4d79) 11:25:52 executing program 2: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x7f, 0x80000000008001}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x9}, 0x0) r1 = open(&(0x7f0000000240)='./file1\x00', 0x141142, 0x0) write$UHID_INPUT(r1, &(0x7f0000001440)={0x8, {"008200"}}, 0xfffffc41) open(&(0x7f00000001c0)='./file1\x00', 0x0, 0x0) setxattr$trusted_overlay_nlink(&(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x0, 0x0) 11:25:52 executing program 1: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x7f, 0x38000000}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x9}, 0x0) r1 = open(&(0x7f0000000240)='./file1\x00', 0x141142, 0x0) r2 = gettid() ptrace$setopts(0x4206, r2, 0x0, 0x0) tkill(r2, 0x3d) sched_setattr(r2, &(0x7f0000000100)={0x38, 0x3, 0x8, 0xb0, 0x3, 0x8, 0x2, 0x85b0, 0x40, 0x8000}, 0x0) write$UHID_INPUT(r1, &(0x7f0000001440), 0xfffffc41) ioctl$TIOCGPGRP(r1, 0x540f, &(0x7f0000000080)=0x0) pidfd_open(r3, 0x0) open(&(0x7f00000001c0)='./file1\x00', 0x0, 0x0) setxattr$trusted_overlay_nlink(&(0x7f0000000000)='./file1\x00', &(0x7f00000000c0)='trusted.overlay.nlink\x00', 0x0, 0x0, 0x0) r4 = socket$nl_route(0x10, 0x3, 0x0) r5 = socket(0x11, 0x2, 0x0) bind(r5, &(0x7f0000000080)=@generic={0x11, "000001000000000008fc9d71fc00000000000000f8ffff002e0b3836005404b0d6301a4ce875f2e3ff5f163ee340b76795008000f8000000000104003c5811039e15775027ecce66fd792bbf0e5bf5ff9b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ff42c65400"}, 0x80) getsockname$packet(r5, &(0x7f0000000040)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000140)=0x14) sendmsg$nl_route(r4, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000f40)=@newlink={0x38, 0x10, 0x1, 0x0, 0x0, {0x0, 0x0, 0x0, r6}, [@IFLA_VFINFO_LIST={0x14, 0x16, 0x0, 0x1, [{0x10, 0x1, 0x0, 0x1, [@IFLA_VF_TX_RATE={0xc, 0x7, {0x81000000}}]}]}, @IFLA_IFALIASn={0x4}]}, 0x38}}, 0x0) sendmsg$nl_route(r4, &(0x7f00000002c0)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f0000000200)={&(0x7f0000000180)=@ipv6_newnexthop={0x28, 0x68, 0x200, 0x70bd2d, 0x25dfdbfd, {0xa, 0x0, 0x0, 0x0, 0x20}, [@NHA_GROUP_TYPE={0x6}, @NHA_ENCAP_TYPE={0x6, 0x7, 0x7}]}, 0x28}, 0x1, 0x0, 0x0, 0x24004800}, 0x40004) [ 618.568121][T29207] loop0: detected capacity change from 264192 to 0 11:25:52 executing program 1: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x7f, 0x80000000008001}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x9}, 0x0) r1 = open(&(0x7f0000000240)='./file1\x00', 0x141142, 0x0) perf_event_open(&(0x7f00000002c0)={0x3, 0x70, 0x48, 0x3f, 0x9, 0x4f, 0x0, 0xfffffffffffff508, 0x0, 0x3, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x2, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x25ba, 0x1, @perf_bp={&(0x7f0000000080), 0x1}, 0x201, 0xd70, 0x6da, 0x7, 0x5, 0xe5, 0x1}, 0xffffffffffffffff, 0xf, r1, 0x4) write$UHID_INPUT(r1, &(0x7f0000001440), 0xfffffc41) open(&(0x7f00000001c0)='./file1\x00', 0x0, 0x0) setxattr$trusted_overlay_nlink(&(0x7f0000000000)='./file1\x00', &(0x7f00000000c0)='trusted.overlay.nlink\x00', 0x0, 0x0, 0x0) gettid() 11:25:53 executing program 5: r0 = perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x5c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write$binfmt_elf64(r0, &(0x7f0000000540)=ANY=[@ANYBLOB], 0x2c4) r1 = inotify_init() openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) epoll_ctl$EPOLL_CTL_DEL(0xffffffffffffffff, 0x2, 0xffffffffffffffff) inotify_add_watch(r1, &(0x7f0000000000)='.\x00', 0x400017e) r2 = openat$incfs(0xffffffffffffffff, &(0x7f0000000080)='.log\x00', 0x20200, 0x40) fcntl$getownex(r2, 0x10, &(0x7f00000000c0)) r3 = open(&(0x7f0000000040)='./file0\x00', 0x200c2, 0x0) write$binfmt_elf64(r3, &(0x7f0000000080)=ANY=[], 0x8) sendfile(r3, r3, &(0x7f00000001c0), 0xa198) dup(0xffffffffffffffff) r4 = syz_mount_image$gfs2meta(&(0x7f0000000140)='gfs2meta\x00', &(0x7f0000000200)='./file0\x00', 0x1000, 0x4, &(0x7f0000000880)=[{&(0x7f0000000240)="77ba0daae1b2e74ecd52c59a85bf6f4b1f0b01ab07ba92bc6e57305406115f2bc3e4dd94f19ed896c4fccd34271e9dc3499af9298dbc709e0e6a513d61391d4b198af5f55d24239ae934e8babb8d1cb67bb17b0158", 0x55, 0x3}, {&(0x7f00000002c0)="ae227f954d229f666a6cd22938585e852071e55aa5728addcd315922bf32282e077bdbc63cd5ec89626ee2f8e7982ca239eaa758231056cdca22ca27428407f6c64c384665cfbd00ee6e0d7609f2c7ba0f28b4af70d0307ef78decfe42973915cd509de7c19ea0f3f5c3caaab05f9af08e2cc82d2c14b919dd045e3d36ce1c5d0ff23aed0a4a6ef508b5e71df0a25250d47f1e033ed503b6df99c189111b75b59df679cb75240b756cafecfd", 0xac, 0x3}, {&(0x7f00000003c0)="792eb6eec33e561f18dc4b58b6a6fb3c7e6fd5e612c08490216ae02617f9811945929cffbf59727393a9a69d57b00a5cd08da3888884b8361d6a4003a54480c1086a5fc876582ff049ede86e2f58d80c7b6cf618e1ba36d4710887bc34ef2b7abbc686df2185f99998060bf492b84e3a02077e2aaf014e1186fde602d2b639d467f48fc2e18cf1553e07ac39040953566ab1d21aac627b166825375377bc3332b62160ea8bf7fc3196b30965dce6181bf7a1c60d0270f24ba6", 0xb9, 0x100000000}, {0x0, 0x0, 0x7}], 0x21008, &(0x7f0000000900)={[{'.log\x00'}, {'-%('}, {'.log\x00'}], [{@obj_user={'obj_user'}}, {@appraise_type='appraise_type=imasig'}, {@fowner_eq={'fowner', 0x3d, 0xee01}}, {@hash='hash'}, {@subj_type={'subj_type', 0x3d, '-&'}}]}) ioctl$BTRFS_IOC_SUBVOL_SETFLAGS(r4, 0x4008941a, &(0x7f0000000980)=0xfe33b054cbbc4d79) 11:25:53 executing program 3: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x7f, 0x80000000008001}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x9}, 0x0) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000080)) r1 = open(&(0x7f0000000240)='./file1\x00', 0x141142, 0x0) write$UHID_INPUT(r1, &(0x7f0000001440)={0x8, {'\x00~\x00'}}, 0xfffffc41) open(&(0x7f00000001c0)='./file1\x00', 0x0, 0x0) setxattr$trusted_overlay_nlink(&(0x7f0000000000)='./file1\x00', &(0x7f00000000c0)='trusted.overlay.nlink\x00', 0x0, 0x0, 0x0) [ 619.308706][T29232] loop5: detected capacity change from 264192 to 0 11:25:53 executing program 0: r0 = perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x5c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write$binfmt_elf64(r0, &(0x7f0000000540)=ANY=[@ANYBLOB], 0x2c4) r1 = inotify_init() openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) epoll_ctl$EPOLL_CTL_DEL(0xffffffffffffffff, 0x2, 0xffffffffffffffff) inotify_add_watch(r1, &(0x7f0000000000)='.\x00', 0x400017e) r2 = openat$incfs(0xffffffffffffffff, &(0x7f0000000080)='.log\x00', 0x20200, 0x40) fcntl$getownex(r2, 0x10, &(0x7f00000000c0)) r3 = open(&(0x7f0000000040)='./file0\x00', 0x200c2, 0x0) write$binfmt_elf64(r3, &(0x7f0000000080)=ANY=[], 0x8) sendfile(r3, r3, &(0x7f00000001c0), 0xa198) dup(0xffffffffffffffff) r4 = syz_mount_image$gfs2meta(&(0x7f0000000140)='gfs2meta\x00', &(0x7f0000000200)='./file0\x00', 0x1000, 0x4, &(0x7f0000000880)=[{&(0x7f0000000240)="77ba0daae1b2e74ecd52c59a85bf6f4b1f0b01ab07ba92bc6e57305406115f2bc3e4dd94f19ed896c4fccd34271e9dc3499af9298dbc709e0e6a513d61391d4b198af5f55d24239ae934e8babb8d1cb67bb17b0158", 0x55, 0x3}, {&(0x7f00000002c0)="ae227f954d229f666a6cd22938585e852071e55aa5728addcd315922bf32282e077bdbc63cd5ec89626ee2f8e7982ca239eaa758231056cdca22ca27428407f6c64c384665cfbd00ee6e0d7609f2c7ba0f28b4af70d0307ef78decfe42973915cd509de7c19ea0f3f5c3caaab05f9af08e2cc82d2c14b919dd045e3d36ce1c5d0ff23aed0a4a6ef508b5e71df0a25250d47f1e033ed503b6df99c189111b75b59df679cb75240b756cafecfd", 0xac, 0x3}, {&(0x7f00000003c0)="792eb6eec33e561f18dc4b58b6a6fb3c7e6fd5e612c08490216ae02617f9811945929cffbf59727393a9a69d57b00a5cd08da3888884b8361d6a4003a54480c1086a5fc876582ff049ede86e2f58d80c7b6cf618e1ba36d4710887bc34ef2b7abbc686df2185f99998060bf492b84e3a02077e2aaf014e1186fde602d2b639d467f48fc2e18cf1553e07ac39040953566ab1d21aac627b166825375377bc3332b62160ea8bf7fc3196b30965dce6181bf7a1c60d0270f24ba6", 0xb9, 0x100000000}, {0x0, 0x0, 0x7}], 0x21008, &(0x7f0000000900)={[{'.log\x00'}, {'-%('}, {'.log\x00'}], [{@obj_user={'obj_user'}}, {@appraise_type='appraise_type=imasig'}, {@fowner_eq={'fowner', 0x3d, 0xee01}}, {@hash='hash'}, {@subj_type={'subj_type', 0x3d, '-&'}}]}) ioctl$BTRFS_IOC_SUBVOL_SETFLAGS(r4, 0x4008941a, &(0x7f0000000980)=0xfe33b054cbbc4d79) 11:25:53 executing program 4: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x7f, 0x80000000008001}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x9}, 0x0) r1 = open(&(0x7f0000000240)='./file1\x00', 0x141142, 0x0) write$UHID_INPUT(r1, &(0x7f0000001440), 0xfffffc41) open(0x0, 0x0, 0xfffffff6) setxattr$trusted_overlay_nlink(0x0, &(0x7f00000000c0)='trusted.overlay.nlink\x00', 0x0, 0x0, 0x0) [ 619.566960][T29246] loop0: detected capacity change from 264192 to 0 11:25:53 executing program 2: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x7f, 0x80000000008001}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x9}, 0x0) r1 = open(&(0x7f0000000240)='./file1\x00', 0x141142, 0x0) write$UHID_INPUT(r1, &(0x7f0000001440)={0x8, {"008300"}}, 0xfffffc41) open(&(0x7f00000001c0)='./file1\x00', 0x0, 0x0) setxattr$trusted_overlay_nlink(&(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x0, 0x0) 11:25:53 executing program 1: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x7f, 0x80000000008001}, 0x0) r0 = getpid() fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000080)={0x0, 0x0}) sched_setattr(r1, &(0x7f0000000100)={0x38, 0x5, 0x10000000, 0x2a, 0x7fffffff, 0x6, 0x855a, 0x8, 0x4, 0xcd6}, 0x0) sched_setattr(r0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x9}, 0x0) r2 = open(&(0x7f0000000240)='./file1\x00', 0x141142, 0x0) write$UHID_INPUT(r2, &(0x7f0000001440), 0xfffffc41) open(&(0x7f00000001c0)='./file1\x00', 0x0, 0x0) setxattr$trusted_overlay_nlink(&(0x7f0000000000)='./file1\x00', &(0x7f00000000c0)='trusted.overlay.nlink\x00', 0x0, 0x0, 0x2) 11:25:54 executing program 5: r0 = perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x5c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write$binfmt_elf64(r0, &(0x7f0000000540)=ANY=[@ANYBLOB], 0x2c4) r1 = inotify_init() openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) epoll_ctl$EPOLL_CTL_DEL(0xffffffffffffffff, 0x2, 0xffffffffffffffff) inotify_add_watch(r1, &(0x7f0000000000)='.\x00', 0x400017e) r2 = openat$incfs(0xffffffffffffffff, &(0x7f0000000080)='.log\x00', 0x20200, 0x40) fcntl$getownex(r2, 0x10, &(0x7f00000000c0)) r3 = open(&(0x7f0000000040)='./file0\x00', 0x200c2, 0x0) write$binfmt_elf64(r3, &(0x7f0000000080)=ANY=[], 0x8) sendfile(r3, r3, &(0x7f00000001c0), 0xa198) dup(0xffffffffffffffff) r4 = syz_mount_image$gfs2meta(&(0x7f0000000140)='gfs2meta\x00', &(0x7f0000000200)='./file0\x00', 0x1000, 0x4, &(0x7f0000000880)=[{&(0x7f0000000240)="77ba0daae1b2e74ecd52c59a85bf6f4b1f0b01ab07ba92bc6e57305406115f2bc3e4dd94f19ed896c4fccd34271e9dc3499af9298dbc709e0e6a513d61391d4b198af5f55d24239ae934e8babb8d1cb67bb17b0158", 0x55, 0x3}, {&(0x7f00000002c0)="ae227f954d229f666a6cd22938585e852071e55aa5728addcd315922bf32282e077bdbc63cd5ec89626ee2f8e7982ca239eaa758231056cdca22ca27428407f6c64c384665cfbd00ee6e0d7609f2c7ba0f28b4af70d0307ef78decfe42973915cd509de7c19ea0f3f5c3caaab05f9af08e2cc82d2c14b919dd045e3d36ce1c5d0ff23aed0a4a6ef508b5e71df0a25250d47f1e033ed503b6df99c189111b75b59df679cb75240b756cafecfd", 0xac, 0x3}, {&(0x7f00000003c0)="792eb6eec33e561f18dc4b58b6a6fb3c7e6fd5e612c08490216ae02617f9811945929cffbf59727393a9a69d57b00a5cd08da3888884b8361d6a4003a54480c1086a5fc876582ff049ede86e2f58d80c7b6cf618e1ba36d4710887bc34ef2b7abbc686df2185f99998060bf492b84e3a02077e2aaf014e1186fde602d2b639d467f48fc2e18cf1553e07ac39040953566ab1d21aac627b166825375377bc3332b62160ea8bf7fc3196b30965dce6181bf7a1c60d0270f24ba6", 0xb9, 0x100000000}, {0x0, 0x0, 0x7}], 0x21008, &(0x7f0000000900)={[{'.log\x00'}, {'-%('}, {'.log\x00'}], [{@obj_user={'obj_user'}}, {@appraise_type='appraise_type=imasig'}, {@fowner_eq={'fowner', 0x3d, 0xee01}}, {@hash='hash'}, {@subj_type={'subj_type', 0x3d, '-&'}}]}) ioctl$BTRFS_IOC_SUBVOL_SETFLAGS(r4, 0x4008941a, &(0x7f0000000980)=0xfe33b054cbbc4d79) 11:25:54 executing program 3: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x7f, 0x80000000008001}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x9}, 0x0) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000080)) r1 = open(&(0x7f0000000240)='./file1\x00', 0x141142, 0x0) write$UHID_INPUT(r1, &(0x7f0000001440)={0x8, {"007f00"}}, 0xfffffc41) open(&(0x7f00000001c0)='./file1\x00', 0x0, 0x0) setxattr$trusted_overlay_nlink(&(0x7f0000000000)='./file1\x00', &(0x7f00000000c0)='trusted.overlay.nlink\x00', 0x0, 0x0, 0x0) 11:25:54 executing program 0: r0 = perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x5c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write$binfmt_elf64(r0, &(0x7f0000000540)=ANY=[@ANYBLOB], 0x2c4) r1 = inotify_init() openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) epoll_ctl$EPOLL_CTL_DEL(0xffffffffffffffff, 0x2, 0xffffffffffffffff) inotify_add_watch(r1, &(0x7f0000000000)='.\x00', 0x400017e) r2 = openat$incfs(0xffffffffffffffff, &(0x7f0000000080)='.log\x00', 0x20200, 0x40) fcntl$getownex(r2, 0x10, &(0x7f00000000c0)) r3 = open(&(0x7f0000000040)='./file0\x00', 0x200c2, 0x0) write$binfmt_elf64(r3, &(0x7f0000000080)=ANY=[], 0x8) sendfile(r3, r3, &(0x7f00000001c0), 0xa198) dup(0xffffffffffffffff) r4 = syz_mount_image$gfs2meta(&(0x7f0000000140)='gfs2meta\x00', &(0x7f0000000200)='./file0\x00', 0x1000, 0x4, &(0x7f0000000880)=[{&(0x7f0000000240)="77ba0daae1b2e74ecd52c59a85bf6f4b1f0b01ab07ba92bc6e57305406115f2bc3e4dd94f19ed896c4fccd34271e9dc3499af9298dbc709e0e6a513d61391d4b198af5f55d24239ae934e8babb8d1cb67bb17b0158", 0x55, 0x3}, {&(0x7f00000002c0)="ae227f954d229f666a6cd22938585e852071e55aa5728addcd315922bf32282e077bdbc63cd5ec89626ee2f8e7982ca239eaa758231056cdca22ca27428407f6c64c384665cfbd00ee6e0d7609f2c7ba0f28b4af70d0307ef78decfe42973915cd509de7c19ea0f3f5c3caaab05f9af08e2cc82d2c14b919dd045e3d36ce1c5d0ff23aed0a4a6ef508b5e71df0a25250d47f1e033ed503b6df99c189111b75b59df679cb75240b756cafecfd203568eeb2c1708fe9f11a2cb0f288590ec76cefbde09c90e9d568492a", 0xc9, 0x3}, {&(0x7f00000003c0)="792eb6eec33e561f18dc4b58b6a6fb3c7e6fd5e612c08490216ae02617f9811945929cffbf59727393a9a69d57b00a5cd08da3888884b8361d6a4003a54480c1086a5fc876582ff049ede86e2f58d80c7b6cf618e1ba36d4710887bc34ef2b7abbc686df2185f99998060bf492b84e3a02077e2aaf014e1186fde602d2b639d467f48fc2e18cf1553e07ac39040953566ab1d21aac627b166825375377bc3332b62160ea8bf7fc3196b30965dce6181bf7a1c60d0270f24ba6", 0xb9, 0x100000000}, {0x0, 0x0, 0x7}], 0x21008, &(0x7f0000000900)={[{'.log\x00'}, {'-%('}, {'.log\x00'}], [{@obj_user={'obj_user'}}, {@appraise_type='appraise_type=imasig'}, {@fowner_eq={'fowner', 0x3d, 0xee01}}, {@hash='hash'}, {@subj_type={'subj_type', 0x3d, '-&'}}]}) ioctl$BTRFS_IOC_SUBVOL_SETFLAGS(r4, 0x4008941a, &(0x7f0000000980)=0xfe33b054cbbc4d79) [ 620.382219][T29270] loop5: detected capacity change from 264192 to 0 11:25:54 executing program 4: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x7f, 0x80000000008001}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x9}, 0x0) r1 = open(&(0x7f0000000240)='./file1\x00', 0x141142, 0x0) write$UHID_INPUT(r1, &(0x7f0000001440), 0xfffffc41) open(0x0, 0x0, 0xfffffff6) setxattr$trusted_overlay_nlink(0x0, &(0x7f00000000c0)='trusted.overlay.nlink\x00', 0x0, 0x0, 0x0) [ 620.568008][T29281] loop0: detected capacity change from 264192 to 0 11:25:54 executing program 2: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x7f, 0x80000000008001}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x9}, 0x0) r1 = open(&(0x7f0000000240)='./file1\x00', 0x141142, 0x0) write$UHID_INPUT(r1, &(0x7f0000001440)={0x8, {"008400"}}, 0xfffffc41) open(&(0x7f00000001c0)='./file1\x00', 0x0, 0x0) setxattr$trusted_overlay_nlink(&(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x0, 0x0) 11:25:55 executing program 1: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x7f, 0x80000000008001}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x9}, 0x0) r1 = open(&(0x7f0000000240)='./file1\x00', 0x141142, 0x0) write$UHID_INPUT(r1, &(0x7f0000001440), 0xfffffc41) open(&(0x7f00000001c0)='./file1\x00', 0x0, 0x0) r2 = bpf$BPF_RAW_TRACEPOINT_OPEN_UNNAMED(0x11, &(0x7f0000000080), 0x10) r3 = gettid() ptrace$setopts(0x4206, r3, 0x0, 0x0) tkill(r3, 0x3d) fcntl$setownex(r2, 0xf, &(0x7f0000000100)={0x1, r3}) setxattr$trusted_overlay_nlink(&(0x7f0000000000)='./file1\x00', &(0x7f00000000c0)='trusted.overlay.nlink\x00', 0x0, 0x0, 0x0) 11:25:55 executing program 5: r0 = perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x5c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write$binfmt_elf64(r0, &(0x7f0000000540)=ANY=[@ANYBLOB], 0x2c4) r1 = inotify_init() openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) epoll_ctl$EPOLL_CTL_DEL(0xffffffffffffffff, 0x2, 0xffffffffffffffff) inotify_add_watch(r1, &(0x7f0000000000)='.\x00', 0x400017e) r2 = openat$incfs(0xffffffffffffffff, &(0x7f0000000080)='.log\x00', 0x20200, 0x40) fcntl$getownex(r2, 0x10, &(0x7f00000000c0)) r3 = open(&(0x7f0000000040)='./file0\x00', 0x200c2, 0x0) write$binfmt_elf64(r3, &(0x7f0000000080)=ANY=[], 0x8) sendfile(r3, r3, &(0x7f00000001c0), 0xa198) dup(0xffffffffffffffff) r4 = syz_mount_image$gfs2meta(&(0x7f0000000140)='gfs2meta\x00', &(0x7f0000000200)='./file0\x00', 0x1000, 0x4, &(0x7f0000000880)=[{&(0x7f0000000240)="77ba0daae1b2e74ecd52c59a85bf6f4b1f0b01ab07ba92bc6e57305406115f2bc3e4dd94f19ed896c4fccd34271e9dc3499af9298dbc709e0e6a513d61391d4b198af5f55d24239ae934e8babb8d1cb67bb17b0158", 0x55, 0x3}, {&(0x7f00000002c0)="ae227f954d229f666a6cd22938585e852071e55aa5728addcd315922bf32282e077bdbc63cd5ec89626ee2f8e7982ca239eaa758231056cdca22ca27428407f6c64c384665cfbd00ee6e0d7609f2c7ba0f28b4af70d0307ef78decfe42973915cd509de7c19ea0f3f5c3caaab05f9af08e2cc82d2c14b919dd045e3d36ce1c5d0ff23aed0a4a6ef508b5e71df0a25250d47f1e033ed503b6df99c189111b75b59df679cb75240b756cafecfd", 0xac, 0x3}, {&(0x7f00000003c0)="792eb6eec33e561f18dc4b58b6a6fb3c7e6fd5e612c08490216ae02617f9811945929cffbf59727393a9a69d57b00a5cd08da3888884b8361d6a4003a54480c1086a5fc876582ff049ede86e2f58d80c7b6cf618e1ba36d4710887bc34ef2b7abbc686df2185f99998060bf492b84e3a02077e2aaf014e1186fde602d2b639d467f48fc2e18cf1553e07ac39040953566ab1d21aac627b166825375377bc3332b62160ea8bf7fc3196b30965dce6181bf7a1c60d0270f24ba6", 0xb9, 0x100000000}, {0x0, 0x0, 0x7}], 0x21008, &(0x7f0000000900)={[{'.log\x00'}, {'-%('}, {'.log\x00'}], [{@obj_user={'obj_user'}}, {@appraise_type='appraise_type=imasig'}, {@fowner_eq={'fowner', 0x3d, 0xee01}}, {@hash='hash'}, {@subj_type={'subj_type', 0x3d, '-&'}}]}) ioctl$BTRFS_IOC_SUBVOL_SETFLAGS(r4, 0x4008941a, &(0x7f0000000980)=0xfe33b054cbbc4d79) 11:25:55 executing program 0: r0 = perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x5c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write$binfmt_elf64(r0, &(0x7f0000000540)=ANY=[@ANYBLOB], 0x2c4) r1 = inotify_init() openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) epoll_ctl$EPOLL_CTL_DEL(0xffffffffffffffff, 0x2, 0xffffffffffffffff) inotify_add_watch(r1, &(0x7f0000000000)='.\x00', 0x400017e) r2 = openat$incfs(0xffffffffffffffff, &(0x7f0000000080)='.log\x00', 0x20200, 0x40) fcntl$getownex(r2, 0x10, &(0x7f00000000c0)) r3 = open(&(0x7f0000000040)='./file0\x00', 0x200c2, 0x0) write$binfmt_elf64(r3, &(0x7f0000000080)=ANY=[], 0x8) sendfile(r3, r3, &(0x7f00000001c0), 0xa198) dup(0xffffffffffffffff) r4 = syz_mount_image$gfs2meta(&(0x7f0000000140)='gfs2meta\x00', &(0x7f0000000200)='./file0\x00', 0x1000, 0x4, &(0x7f0000000880)=[{&(0x7f0000000240)="77ba0daae1b2e74ecd52c59a85bf6f4b1f0b01ab07ba92bc6e57305406115f2bc3e4dd94f19ed896c4fccd34271e9dc3499af9298dbc709e0e6a513d61391d4b198af5f55d24239ae934e8babb8d1cb67bb17b0158", 0x55, 0x3}, {&(0x7f00000002c0)="ae227f954d229f666a6cd22938585e852071e55aa5728addcd315922bf32282e077bdbc63cd5ec89626ee2f8e7982ca239eaa758231056cdca22ca27428407f6c64c384665cfbd00ee6e0d7609f2c7ba0f28b4af70d0307ef78decfe42973915cd509de7c19ea0f3f5c3caaab05f9af08e2cc82d2c14b919dd045e3d36ce1c5d0ff23aed0a4a6ef508b5e71df0a25250d47f1e033ed503b6df99c189111b75b59df679cb75240b756cafecfd203568eeb2c1708fe9f11a2cb0f288590ec76cefbde09c90e9d568492a", 0xc9, 0x3}, {&(0x7f00000003c0)="792eb6eec33e561f18dc4b58b6a6fb3c7e6fd5e612c08490216ae02617f9811945929cffbf59727393a9a69d57b00a5cd08da3888884b8361d6a4003a54480c1086a5fc876582ff049ede86e2f58d80c7b6cf618e1ba36d4710887bc34ef2b7abbc686df2185f99998060bf492b84e3a02077e2aaf014e1186fde602d2b639d467f48fc2e18cf1553e07ac39040953566ab1d21aac627b166825375377bc3332b62160ea8bf7fc3196b30965dce6181bf7a1c60d0270f24ba6", 0xb9, 0x100000000}, {0x0, 0x0, 0x7}], 0x21008, &(0x7f0000000900)={[{'.log\x00'}, {'-%('}, {'.log\x00'}], [{@obj_user={'obj_user'}}, {@appraise_type='appraise_type=imasig'}, {@fowner_eq={'fowner', 0x3d, 0xee01}}, {@hash='hash'}, {@subj_type={'subj_type', 0x3d, '-&'}}]}) ioctl$BTRFS_IOC_SUBVOL_SETFLAGS(r4, 0x4008941a, &(0x7f0000000980)=0xfe33b054cbbc4d79) [ 621.339708][ T35] kauditd_printk_skb: 20 callbacks suppressed [ 621.339720][ T35] audit: type=1804 audit(1612178755.423:2629): pid=29304 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.1" name="/root/syzkaller-testdir551554057/syzkaller.l2Zg4z/452/file1" dev="sda1" ino=16008 res=1 errno=0 [ 621.411272][T29307] loop5: detected capacity change from 264192 to 0 [ 621.421333][ T35] audit: type=1804 audit(1612178755.463:2630): pid=29284 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.3" name="/root/syzkaller-testdir548988167/syzkaller.gb8agU/450/file1" dev="sda1" ino=16000 res=1 errno=0 11:25:55 executing program 3: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x7f, 0x80000000008001}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x9}, 0x0) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000080)) r1 = open(&(0x7f0000000240)='./file1\x00', 0x141142, 0x0) write$UHID_INPUT(r1, &(0x7f0000001440)={0x8, {"088000"}}, 0xfffffc41) open(&(0x7f00000001c0)='./file1\x00', 0x0, 0x0) setxattr$trusted_overlay_nlink(&(0x7f0000000000)='./file1\x00', &(0x7f00000000c0)='trusted.overlay.nlink\x00', 0x0, 0x0, 0x0) 11:25:55 executing program 1: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x800, 0x80000000008001}, 0x0) r0 = getpid() getrlimit(0x4, &(0x7f0000000100)) r1 = fcntl$getown(0xffffffffffffffff, 0x9) ptrace$getregset(0x4204, r1, 0x201, &(0x7f0000000140)={&(0x7f00000002c0)=""/188, 0xbc}) sched_setscheduler(0xffffffffffffffff, 0x2, &(0x7f0000000080)=0xfffffffe) r2 = gettid() ptrace$setopts(0x4206, r2, 0x0, 0x0) tkill(r2, 0x3d) process_vm_writev(r2, &(0x7f0000000440)=[{&(0x7f0000000380)=""/129, 0x81}, {&(0x7f0000000200)=""/87, 0x57}], 0x2, &(0x7f00000004c0)=[{&(0x7f0000000480)=""/11, 0xb}, {&(0x7f00000006c0)=""/144, 0x90}, {&(0x7f0000000780)=""/4096, 0x1000}], 0x3, 0x0) sched_setattr(r0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x9, 0x0, 0xfffffffffffffffb, 0x0, 0xfffffffc}, 0x0) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000000500)=0x0) ptrace$setopts(0x4200, r3, 0x936, 0x0) r4 = open(&(0x7f0000000180)='./file1\x00', 0x7438b4201793d04b, 0x9e) open(&(0x7f00000001c0)='./file1\x00', 0x0, 0x81) setxattr$trusted_overlay_nlink(&(0x7f0000000000)='./file1\x00', &(0x7f00000000c0)='trusted.overlay.nlink\x00', 0x0, 0x0, 0x0) write$binfmt_aout(r4, &(0x7f0000000540)=ANY=[@ANYBLOB="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"], 0x161) [ 621.523363][T29315] loop0: detected capacity change from 264192 to 0 11:25:55 executing program 1: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x7f, 0x80000000008001}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x38, 0x2, 0x10000011, 0x3f, 0x9, 0x0, 0x0, 0xfffffffffffffffc}, 0x0) r1 = open(&(0x7f0000000240)='./file1\x00', 0x141142, 0x0) write$UHID_INPUT(r1, &(0x7f0000001440), 0xfffffc41) open(&(0x7f00000001c0)='./file1\x00', 0x0, 0x0) setxattr$trusted_overlay_nlink(&(0x7f0000000000)='./file1\x00', &(0x7f00000000c0)='trusted.overlay.nlink\x00', 0x0, 0x0, 0x0) [ 621.721964][ T35] audit: type=1804 audit(1612178755.803:2631): pid=29296 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.2" name="/root/syzkaller-testdir245532710/syzkaller.d2c0aK/464/file1" dev="sda1" ino=15952 res=1 errno=0 [ 621.823620][ T35] audit: type=1804 audit(1612178755.833:2632): pid=29296 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.2" name="/root/syzkaller-testdir245532710/syzkaller.d2c0aK/464/file1" dev="sda1" ino=15952 res=1 errno=0 11:25:56 executing program 4: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x7f, 0x80000000008001}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x9}, 0x0) r1 = open(&(0x7f0000000240)='./file1\x00', 0x141142, 0x0) write$UHID_INPUT(r1, &(0x7f0000001440), 0xfffffc41) open(0x0, 0x0, 0xfffffff6) setxattr$trusted_overlay_nlink(&(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x0, 0x0) 11:25:56 executing program 2: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x7f, 0x80000000008001}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x9}, 0x0) r1 = open(&(0x7f0000000240)='./file1\x00', 0x141142, 0x0) write$UHID_INPUT(r1, &(0x7f0000001440)={0x8, {"009000"}}, 0xfffffc41) open(&(0x7f00000001c0)='./file1\x00', 0x0, 0x0) setxattr$trusted_overlay_nlink(&(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x0, 0x0) 11:25:56 executing program 5: r0 = perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x5c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write$binfmt_elf64(r0, &(0x7f0000000540)=ANY=[@ANYBLOB], 0x2c4) r1 = inotify_init() openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) epoll_ctl$EPOLL_CTL_DEL(0xffffffffffffffff, 0x2, 0xffffffffffffffff) inotify_add_watch(r1, &(0x7f0000000000)='.\x00', 0x400017e) r2 = openat$incfs(0xffffffffffffffff, &(0x7f0000000080)='.log\x00', 0x20200, 0x40) fcntl$getownex(r2, 0x10, &(0x7f00000000c0)) r3 = open(&(0x7f0000000040)='./file0\x00', 0x200c2, 0x0) write$binfmt_elf64(r3, &(0x7f0000000080)=ANY=[], 0x8) sendfile(r3, r3, &(0x7f00000001c0), 0xa198) dup(0xffffffffffffffff) r4 = syz_mount_image$gfs2meta(&(0x7f0000000140)='gfs2meta\x00', &(0x7f0000000200)='./file0\x00', 0x1000, 0x4, &(0x7f0000000880)=[{&(0x7f0000000240)="77ba0daae1b2e74ecd52c59a85bf6f4b1f0b01ab07ba92bc6e57305406115f2bc3e4dd94f19ed896c4fccd34271e9dc3499af9298dbc709e0e6a513d61391d4b198af5f55d24239ae934e8babb8d1cb67bb17b0158", 0x55, 0x3}, {&(0x7f00000002c0)="ae227f954d229f666a6cd22938585e852071e55aa5728addcd315922bf32282e077bdbc63cd5ec89626ee2f8e7982ca239eaa758231056cdca22ca27428407f6c64c384665cfbd00ee6e0d7609f2c7ba0f28b4af70d0307ef78decfe42973915cd509de7c19ea0f3f5c3caaab05f9af08e2cc82d2c14b919dd045e3d36ce1c5d0ff23aed0a4a6ef508b5e71df0a25250d47f1e033ed503b6df99c189111b75b59df679cb75240b756cafecfd203568eeb2c1708fe9f11a2cb0f288590ec76cefbde09c90e9d568492a", 0xc9, 0x3}, {&(0x7f00000003c0)="792eb6eec33e561f18dc4b58b6a6fb3c7e6fd5e612c08490216ae02617f9811945929cffbf59727393a9a69d57b00a5cd08da3888884b8361d6a4003a54480c1086a5fc876582ff049ede86e2f58d80c7b6cf618e1ba36d4710887bc34ef2b7abbc686df2185f99998060bf492b84e3a02077e2aaf014e1186fde602d2b639d467f48fc2e18cf1553e07ac39040953566ab1d21aac627b166825375377bc3332b62160ea8bf7fc3196b30965dce6181bf7a1c60d0270f24ba6", 0xb9, 0x100000000}, {0x0, 0x0, 0x7}], 0x21008, &(0x7f0000000900)={[{'.log\x00'}, {'-%('}, {'.log\x00'}], [{@obj_user={'obj_user'}}, {@appraise_type='appraise_type=imasig'}, {@fowner_eq={'fowner', 0x3d, 0xee01}}, {@hash='hash'}, {@subj_type={'subj_type', 0x3d, '-&'}}]}) ioctl$BTRFS_IOC_SUBVOL_SETFLAGS(r4, 0x4008941a, &(0x7f0000000980)=0xfe33b054cbbc4d79) 11:25:56 executing program 0: r0 = perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x5c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write$binfmt_elf64(r0, &(0x7f0000000540)=ANY=[@ANYBLOB], 0x2c4) r1 = inotify_init() openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) epoll_ctl$EPOLL_CTL_DEL(0xffffffffffffffff, 0x2, 0xffffffffffffffff) inotify_add_watch(r1, &(0x7f0000000000)='.\x00', 0x400017e) r2 = openat$incfs(0xffffffffffffffff, &(0x7f0000000080)='.log\x00', 0x20200, 0x40) fcntl$getownex(r2, 0x10, &(0x7f00000000c0)) r3 = open(&(0x7f0000000040)='./file0\x00', 0x200c2, 0x0) write$binfmt_elf64(r3, &(0x7f0000000080)=ANY=[], 0x8) sendfile(r3, r3, &(0x7f00000001c0), 0xa198) dup(0xffffffffffffffff) r4 = syz_mount_image$gfs2meta(&(0x7f0000000140)='gfs2meta\x00', &(0x7f0000000200)='./file0\x00', 0x1000, 0x4, &(0x7f0000000880)=[{&(0x7f0000000240)="77ba0daae1b2e74ecd52c59a85bf6f4b1f0b01ab07ba92bc6e57305406115f2bc3e4dd94f19ed896c4fccd34271e9dc3499af9298dbc709e0e6a513d61391d4b198af5f55d24239ae934e8babb8d1cb67bb17b0158", 0x55, 0x3}, {&(0x7f00000002c0)="ae227f954d229f666a6cd22938585e852071e55aa5728addcd315922bf32282e077bdbc63cd5ec89626ee2f8e7982ca239eaa758231056cdca22ca27428407f6c64c384665cfbd00ee6e0d7609f2c7ba0f28b4af70d0307ef78decfe42973915cd509de7c19ea0f3f5c3caaab05f9af08e2cc82d2c14b919dd045e3d36ce1c5d0ff23aed0a4a6ef508b5e71df0a25250d47f1e033ed503b6df99c189111b75b59df679cb75240b756cafecfd203568eeb2c1708fe9f11a2cb0f288590ec76cefbde09c90e9d568492a", 0xc9, 0x3}, {&(0x7f00000003c0)="792eb6eec33e561f18dc4b58b6a6fb3c7e6fd5e612c08490216ae02617f9811945929cffbf59727393a9a69d57b00a5cd08da3888884b8361d6a4003a54480c1086a5fc876582ff049ede86e2f58d80c7b6cf618e1ba36d4710887bc34ef2b7abbc686df2185f99998060bf492b84e3a02077e2aaf014e1186fde602d2b639d467f48fc2e18cf1553e07ac39040953566ab1d21aac627b166825375377bc3332b62160ea8bf7fc3196b30965dce6181bf7a1c60d0270f24ba6", 0xb9, 0x100000000}, {0x0, 0x0, 0x7}], 0x21008, &(0x7f0000000900)={[{'.log\x00'}, {'-%('}, {'.log\x00'}], [{@obj_user={'obj_user'}}, {@appraise_type='appraise_type=imasig'}, {@fowner_eq={'fowner', 0x3d, 0xee01}}, {@hash='hash'}, {@subj_type={'subj_type', 0x3d, '-&'}}]}) ioctl$BTRFS_IOC_SUBVOL_SETFLAGS(r4, 0x4008941a, &(0x7f0000000980)=0xfe33b054cbbc4d79) [ 622.280269][ T35] audit: type=1804 audit(1612178756.363:2633): pid=29326 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.1" name="/root/syzkaller-testdir551554057/syzkaller.l2Zg4z/454/file1" dev="sda1" ino=16010 res=1 errno=0 [ 622.312347][T29343] loop5: detected capacity change from 264192 to 0 [ 622.413695][ T35] audit: type=1804 audit(1612178756.483:2634): pid=29329 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.3" name="/root/syzkaller-testdir548988167/syzkaller.gb8agU/451/file1" dev="sda1" ino=16000 res=1 errno=0 [ 622.455884][T29351] loop0: detected capacity change from 264192 to 0 [ 622.581292][ T35] audit: type=1804 audit(1612178756.643:2635): pid=29330 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.3" name="/root/syzkaller-testdir548988167/syzkaller.gb8agU/451/file1" dev="sda1" ino=16000 res=1 errno=0 [ 622.608063][ T35] audit: type=1804 audit(1612178756.663:2636): pid=29328 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.1" name="/root/syzkaller-testdir551554057/syzkaller.l2Zg4z/454/file1" dev="sda1" ino=16010 res=1 errno=0 11:25:56 executing program 3: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x7f, 0x80000000008001}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x9}, 0x0) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000080)) r1 = open(&(0x7f0000000240)='./file1\x00', 0x141142, 0x0) write$UHID_INPUT(r1, &(0x7f0000001440)={0x8, {"008100"}}, 0xfffffc41) open(&(0x7f00000001c0)='./file1\x00', 0x0, 0x0) setxattr$trusted_overlay_nlink(&(0x7f0000000000)='./file1\x00', &(0x7f00000000c0)='trusted.overlay.nlink\x00', 0x0, 0x0, 0x0) 11:25:56 executing program 1: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x7f, 0x80000000008001}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x9}, 0x0) r1 = open(&(0x7f0000000240)='./file1\x00', 0x141142, 0x0) r2 = open(&(0x7f00000001c0)='./file1\x00', 0x0, 0x0) ioctl$F2FS_IOC_MOVE_RANGE(r2, 0xc020f509, &(0x7f0000000080)={r1, 0x40, 0x40, 0x5}) write$UHID_INPUT(r3, &(0x7f00000002c0)={0x8, {"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", 0x1000}}, 0x1006) r4 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000040)='/dev/sequencer\x00', 0x40801, 0x0) write$binfmt_aout(r4, &(0x7f0000001300)=ANY=[@ANYBLOB="0000000000000000000000000000000000000000000000000000000000000000a0d52a4de2d47db97ea6b2293ef198b9e79645ef0eb4af7df76f9ae74c3c640c6d2258374b3887f39fa89844e29575735c96530bd801e82c9afc533af938460335a300a6aaa0bef4948a18eb5d49a1dc0f3c0b1a1dc2624f87a1413bd0c9670e811a004600a64aa8300df62281a3d280c53d192c760f7d21e798ecf6683bf4243cf1abbe02f800b08102fca19ee50c08f93a9688929596104adca872aafb58792222c2"], 0xb0) mmap(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x1000002, 0x10, r4, 0xcd20a000) setxattr$trusted_overlay_nlink(&(0x7f0000000000)='./file1\x00', &(0x7f00000000c0)='trusted.overlay.nlink\x00', 0x0, 0x0, 0x0) [ 622.765632][ T35] audit: type=1804 audit(1612178756.843:2637): pid=29341 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.2" name="/root/syzkaller-testdir245532710/syzkaller.d2c0aK/465/file1" dev="sda1" ino=15952 res=1 errno=0 [ 623.014849][ T35] audit: type=1804 audit(1612178757.003:2638): pid=29342 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.2" name="/root/syzkaller-testdir245532710/syzkaller.d2c0aK/465/file1" dev="sda1" ino=15952 res=1 errno=0 11:25:57 executing program 2: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x7f, 0x80000000008001}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x9}, 0x0) r1 = open(&(0x7f0000000240)='./file1\x00', 0x141142, 0x0) write$UHID_INPUT(r1, &(0x7f0000001440)={0x8, {"00a000"}}, 0xfffffc41) open(&(0x7f00000001c0)='./file1\x00', 0x0, 0x0) setxattr$trusted_overlay_nlink(&(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x0, 0x0) 11:25:57 executing program 5: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x7f, 0x80000000008001}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x9}, 0x0) r1 = open(&(0x7f0000000240)='./file1\x00', 0x141142, 0x0) write$UHID_INPUT(r1, &(0x7f0000001440)={0x8, {"009000"}}, 0xfffffc41) open(&(0x7f00000001c0)='./file1\x00', 0x0, 0x0) setxattr$trusted_overlay_nlink(&(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x0, 0x0) 11:25:57 executing program 1: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x7f, 0x80000000008001}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x9}, 0x0) perf_event_open(&(0x7f0000000100)={0x0, 0x70, 0x5, 0x0, 0x0, 0x0, 0x0, 0x1ebdc00000000, 0x10, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, @perf_config_ext={0x8, 0x400}, 0x0, 0x8, 0x40, 0x3, 0x5, 0x92, 0x3f}, 0x0, 0x3, 0xffffffffffffffff, 0xb) r1 = open(&(0x7f0000000240)='./file1\x00', 0x141142, 0x0) write$UHID_INPUT(r1, &(0x7f0000001440), 0xfffffc41) open(&(0x7f00000001c0)='./file1\x00', 0x0, 0x0) setxattr$trusted_overlay_nlink(&(0x7f0000000000)='./file1\x00', &(0x7f00000000c0)='trusted.overlay.nlink\x00', 0x0, 0x0, 0x0) 11:25:57 executing program 0: r0 = perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x5c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write$binfmt_elf64(r0, &(0x7f0000000540)=ANY=[@ANYBLOB], 0x2c4) r1 = inotify_init() openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) epoll_ctl$EPOLL_CTL_DEL(0xffffffffffffffff, 0x2, 0xffffffffffffffff) inotify_add_watch(r1, &(0x7f0000000000)='.\x00', 0x400017e) r2 = openat$incfs(0xffffffffffffffff, &(0x7f0000000080)='.log\x00', 0x20200, 0x40) fcntl$getownex(r2, 0x10, &(0x7f00000000c0)) r3 = open(&(0x7f0000000040)='./file0\x00', 0x200c2, 0x0) write$binfmt_elf64(r3, &(0x7f0000000080)=ANY=[], 0x8) sendfile(r3, r3, &(0x7f00000001c0), 0xa198) dup(0xffffffffffffffff) r4 = syz_mount_image$gfs2meta(&(0x7f0000000140)='gfs2meta\x00', &(0x7f0000000200)='./file0\x00', 0x1000, 0x4, &(0x7f0000000880)=[{&(0x7f0000000240)="77ba0daae1b2e74ecd52c59a85bf6f4b1f0b01ab07ba92bc6e57305406115f2bc3e4dd94f19ed896c4fccd34271e9dc3499af9298dbc709e0e6a513d61391d4b198af5f55d24239ae934e8babb8d1cb67bb17b0158", 0x55, 0x3}, {&(0x7f00000002c0)="ae227f954d229f666a6cd22938585e852071e55aa5728addcd315922bf32282e077bdbc63cd5ec89626ee2f8e7982ca239eaa758231056cdca22ca27428407f6c64c384665cfbd00ee6e0d7609f2c7ba0f28b4af70d0307ef78decfe42973915cd509de7c19ea0f3f5c3caaab05f9af08e2cc82d2c14b919dd045e3d36ce1c5d0ff23aed0a4a6ef508b5e71df0a25250d47f1e033ed503b6df99c189111b75b59df679cb75240b756cafecfd203568eeb2c1708fe9f11a2cb0f288590ec76cefbde09c90e9d568492aa5f41196397b70c869838c7164f2", 0xd7, 0x3}, {&(0x7f00000003c0)="792eb6eec33e561f18dc4b58b6a6fb3c7e6fd5e612c08490216ae02617f9811945929cffbf59727393a9a69d57b00a5cd08da3888884b8361d6a4003a54480c1086a5fc876582ff049ede86e2f58d80c7b6cf618e1ba36d4710887bc34ef2b7abbc686df2185f99998060bf492b84e3a02077e2aaf014e1186fde602d2b639d467f48fc2e18cf1553e07ac39040953566ab1d21aac627b166825375377bc3332b62160ea8bf7fc3196b30965dce6181bf7a1c60d0270f24ba6", 0xb9, 0x100000000}, {0x0, 0x0, 0x7}], 0x21008, &(0x7f0000000900)={[{'.log\x00'}, {'-%('}, {'.log\x00'}], [{@obj_user={'obj_user'}}, {@appraise_type='appraise_type=imasig'}, {@fowner_eq={'fowner', 0x3d, 0xee01}}, {@hash='hash'}, {@subj_type={'subj_type', 0x3d, '-&'}}]}) ioctl$BTRFS_IOC_SUBVOL_SETFLAGS(r4, 0x4008941a, &(0x7f0000000980)=0xfe33b054cbbc4d79) 11:25:57 executing program 4: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x7f, 0x80000000008001}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x9}, 0x0) r1 = open(&(0x7f0000000240)='./file1\x00', 0x141142, 0x0) write$UHID_INPUT(r1, &(0x7f0000001440), 0xfffffc41) open(0x0, 0x0, 0xfffffff6) setxattr$trusted_overlay_nlink(&(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x0, 0x0) [ 623.422824][T29384] loop0: detected capacity change from 264192 to 0 11:25:57 executing program 3: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x7f, 0x80000000008001}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x9}, 0x0) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000080)) r1 = open(&(0x7f0000000240)='./file1\x00', 0x141142, 0x0) write$UHID_INPUT(r1, &(0x7f0000001440)={0x8, {"008200"}}, 0xfffffc41) open(&(0x7f00000001c0)='./file1\x00', 0x0, 0x0) setxattr$trusted_overlay_nlink(&(0x7f0000000000)='./file1\x00', &(0x7f00000000c0)='trusted.overlay.nlink\x00', 0x0, 0x0, 0x0) 11:25:58 executing program 0: r0 = perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x5c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write$binfmt_elf64(r0, &(0x7f0000000540)=ANY=[@ANYBLOB], 0x2c4) r1 = inotify_init() openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) epoll_ctl$EPOLL_CTL_DEL(0xffffffffffffffff, 0x2, 0xffffffffffffffff) inotify_add_watch(r1, &(0x7f0000000000)='.\x00', 0x400017e) r2 = openat$incfs(0xffffffffffffffff, &(0x7f0000000080)='.log\x00', 0x20200, 0x40) fcntl$getownex(r2, 0x10, &(0x7f00000000c0)) r3 = open(&(0x7f0000000040)='./file0\x00', 0x200c2, 0x0) write$binfmt_elf64(r3, &(0x7f0000000080)=ANY=[], 0x8) sendfile(r3, r3, &(0x7f00000001c0), 0xa198) dup(0xffffffffffffffff) r4 = syz_mount_image$gfs2meta(&(0x7f0000000140)='gfs2meta\x00', &(0x7f0000000200)='./file0\x00', 0x1000, 0x4, &(0x7f0000000880)=[{&(0x7f0000000240)="77ba0daae1b2e74ecd52c59a85bf6f4b1f0b01ab07ba92bc6e57305406115f2bc3e4dd94f19ed896c4fccd34271e9dc3499af9298dbc709e0e6a513d61391d4b198af5f55d24239ae934e8babb8d1cb67bb17b0158", 0x55, 0x3}, {&(0x7f00000002c0)="ae227f954d229f666a6cd22938585e852071e55aa5728addcd315922bf32282e077bdbc63cd5ec89626ee2f8e7982ca239eaa758231056cdca22ca27428407f6c64c384665cfbd00ee6e0d7609f2c7ba0f28b4af70d0307ef78decfe42973915cd509de7c19ea0f3f5c3caaab05f9af08e2cc82d2c14b919dd045e3d36ce1c5d0ff23aed0a4a6ef508b5e71df0a25250d47f1e033ed503b6df99c189111b75b59df679cb75240b756cafecfd203568eeb2c1708fe9f11a2cb0f288590ec76cefbde09c90e9d568492aa5f41196397b70c869838c7164f2", 0xd7, 0x3}, {&(0x7f00000003c0)="792eb6eec33e561f18dc4b58b6a6fb3c7e6fd5e612c08490216ae02617f9811945929cffbf59727393a9a69d57b00a5cd08da3888884b8361d6a4003a54480c1086a5fc876582ff049ede86e2f58d80c7b6cf618e1ba36d4710887bc34ef2b7abbc686df2185f99998060bf492b84e3a02077e2aaf014e1186fde602d2b639d467f48fc2e18cf1553e07ac39040953566ab1d21aac627b166825375377bc3332b62160ea8bf7fc3196b30965dce6181bf7a1c60d0270f24ba6", 0xb9, 0x100000000}, {0x0, 0x0, 0x7}], 0x21008, &(0x7f0000000900)={[{'.log\x00'}, {'-%('}, {'.log\x00'}], [{@obj_user={'obj_user'}}, {@appraise_type='appraise_type=imasig'}, {@fowner_eq={'fowner', 0x3d, 0xee01}}, {@hash='hash'}, {@subj_type={'subj_type', 0x3d, '-&'}}]}) ioctl$BTRFS_IOC_SUBVOL_SETFLAGS(r4, 0x4008941a, &(0x7f0000000980)=0xfe33b054cbbc4d79) 11:25:58 executing program 2: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x7f, 0x80000000008001}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x9}, 0x0) r1 = open(&(0x7f0000000240)='./file1\x00', 0x141142, 0x0) write$UHID_INPUT(r1, &(0x7f0000001440)={0x8, {"00b000"}}, 0xfffffc41) open(&(0x7f00000001c0)='./file1\x00', 0x0, 0x0) setxattr$trusted_overlay_nlink(&(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x0, 0x0) 11:25:58 executing program 5: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x7f, 0x80000000008001}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x9}, 0x0) r1 = open(&(0x7f0000000240)='./file1\x00', 0x141142, 0x0) write$UHID_INPUT(r1, &(0x7f0000001440)={0x8, {"009000"}}, 0xfffffc41) open(&(0x7f00000001c0)='./file1\x00', 0x0, 0x0) setxattr$trusted_overlay_nlink(&(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x0, 0x0) [ 624.359029][T29405] loop0: detected capacity change from 264192 to 0 11:25:58 executing program 1: prlimit64(0x0, 0xf, &(0x7f0000000280)={0x7f, 0x80000000008001}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x9}, 0x0) r1 = open(&(0x7f0000000240)='./file1\x00', 0x141142, 0x0) write$UHID_INPUT(r1, &(0x7f0000001440), 0xfffffc41) open(&(0x7f00000001c0)='./file1\x00', 0x0, 0x0) setxattr$trusted_overlay_nlink(&(0x7f0000000000)='./file1\x00', &(0x7f00000000c0)='trusted.overlay.nlink\x00', 0x0, 0x0, 0x0) 11:25:58 executing program 4: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x7f, 0x80000000008001}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x9}, 0x0) r1 = open(&(0x7f0000000240)='./file1\x00', 0x141142, 0x0) write$UHID_INPUT(r1, &(0x7f0000001440), 0xfffffc41) open(0x0, 0x0, 0xfffffff6) setxattr$trusted_overlay_nlink(&(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x0, 0x0) 11:25:59 executing program 0: r0 = perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x5c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write$binfmt_elf64(r0, &(0x7f0000000540)=ANY=[@ANYBLOB], 0x2c4) r1 = inotify_init() openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) epoll_ctl$EPOLL_CTL_DEL(0xffffffffffffffff, 0x2, 0xffffffffffffffff) inotify_add_watch(r1, &(0x7f0000000000)='.\x00', 0x400017e) r2 = openat$incfs(0xffffffffffffffff, &(0x7f0000000080)='.log\x00', 0x20200, 0x40) fcntl$getownex(r2, 0x10, &(0x7f00000000c0)) r3 = open(&(0x7f0000000040)='./file0\x00', 0x200c2, 0x0) write$binfmt_elf64(r3, &(0x7f0000000080)=ANY=[], 0x8) sendfile(r3, r3, &(0x7f00000001c0), 0xa198) dup(0xffffffffffffffff) r4 = syz_mount_image$gfs2meta(&(0x7f0000000140)='gfs2meta\x00', &(0x7f0000000200)='./file0\x00', 0x1000, 0x4, &(0x7f0000000880)=[{&(0x7f0000000240)="77ba0daae1b2e74ecd52c59a85bf6f4b1f0b01ab07ba92bc6e57305406115f2bc3e4dd94f19ed896c4fccd34271e9dc3499af9298dbc709e0e6a513d61391d4b198af5f55d24239ae934e8babb8d1cb67bb17b0158", 0x55, 0x3}, {&(0x7f00000002c0)="ae227f954d229f666a6cd22938585e852071e55aa5728addcd315922bf32282e077bdbc63cd5ec89626ee2f8e7982ca239eaa758231056cdca22ca27428407f6c64c384665cfbd00ee6e0d7609f2c7ba0f28b4af70d0307ef78decfe42973915cd509de7c19ea0f3f5c3caaab05f9af08e2cc82d2c14b919dd045e3d36ce1c5d0ff23aed0a4a6ef508b5e71df0a25250d47f1e033ed503b6df99c189111b75b59df679cb75240b756cafecfd203568eeb2c1708fe9f11a2cb0f288590ec76cefbde09c90e9d568492aa5f41196397b70c869838c7164f2", 0xd7, 0x3}, {&(0x7f00000003c0)="792eb6eec33e561f18dc4b58b6a6fb3c7e6fd5e612c08490216ae02617f9811945929cffbf59727393a9a69d57b00a5cd08da3888884b8361d6a4003a54480c1086a5fc876582ff049ede86e2f58d80c7b6cf618e1ba36d4710887bc34ef2b7abbc686df2185f99998060bf492b84e3a02077e2aaf014e1186fde602d2b639d467f48fc2e18cf1553e07ac39040953566ab1d21aac627b166825375377bc3332b62160ea8bf7fc3196b30965dce6181bf7a1c60d0270f24ba6", 0xb9, 0x100000000}, {0x0, 0x0, 0x7}], 0x21008, &(0x7f0000000900)={[{'.log\x00'}, {'-%('}, {'.log\x00'}], [{@obj_user={'obj_user'}}, {@appraise_type='appraise_type=imasig'}, {@fowner_eq={'fowner', 0x3d, 0xee01}}, {@hash='hash'}, {@subj_type={'subj_type', 0x3d, '-&'}}]}) ioctl$BTRFS_IOC_SUBVOL_SETFLAGS(r4, 0x4008941a, &(0x7f0000000980)=0xfe33b054cbbc4d79) 11:25:59 executing program 3: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x7f, 0x80000000008001}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x9}, 0x0) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000080)) r1 = open(&(0x7f0000000240)='./file1\x00', 0x141142, 0x0) write$UHID_INPUT(r1, &(0x7f0000001440)={0x8, {"008300"}}, 0xfffffc41) open(&(0x7f00000001c0)='./file1\x00', 0x0, 0x0) setxattr$trusted_overlay_nlink(&(0x7f0000000000)='./file1\x00', &(0x7f00000000c0)='trusted.overlay.nlink\x00', 0x0, 0x0, 0x0) [ 625.252388][T29431] loop0: detected capacity change from 264192 to 0 11:25:59 executing program 2: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x7f, 0x80000000008001}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x9}, 0x0) r1 = open(&(0x7f0000000240)='./file1\x00', 0x141142, 0x0) write$UHID_INPUT(r1, &(0x7f0000001440)={0x8, {"00c000"}}, 0xfffffc41) open(&(0x7f00000001c0)='./file1\x00', 0x0, 0x0) setxattr$trusted_overlay_nlink(&(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x0, 0x0) 11:25:59 executing program 5: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x7f, 0x80000000008001}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x9}, 0x0) r1 = open(&(0x7f0000000240)='./file1\x00', 0x141142, 0x0) write$UHID_INPUT(r1, &(0x7f0000001440)={0x8, {"009000"}}, 0xfffffc41) open(&(0x7f00000001c0)='./file1\x00', 0x0, 0x0) setxattr$trusted_overlay_nlink(&(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x0, 0x0) 11:25:59 executing program 1: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x7f, 0x80000000008001}, 0x0) r0 = getpid() setrlimit(0x9, &(0x7f0000000080)={0xffff, 0x6}) sched_setattr(r0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x9, 0x0, 0x0, 0x800}, 0x0) r1 = open(&(0x7f0000000240)='./file1\x00', 0x141142, 0x0) write$UHID_INPUT(r1, &(0x7f0000001440), 0xfffffc41) open(&(0x7f00000001c0)='./file1\x00', 0x0, 0x0) write$binfmt_elf64(r1, &(0x7f0000002480)=ANY=[@ANYBLOB="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"], 0x12b0) setxattr$trusted_overlay_nlink(&(0x7f0000000000)='./file1\x00', &(0x7f00000000c0)='trusted.overlay.nlink\x00', 0x0, 0x0, 0x0) 11:25:59 executing program 4: r0 = perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x5c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write$binfmt_elf64(r0, &(0x7f0000000540)=ANY=[@ANYBLOB], 0x2c4) r1 = inotify_init() openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) epoll_ctl$EPOLL_CTL_DEL(0xffffffffffffffff, 0x2, 0xffffffffffffffff) inotify_add_watch(r1, &(0x7f0000000000)='.\x00', 0x400017e) r2 = openat$incfs(0xffffffffffffffff, &(0x7f0000000080)='.log\x00', 0x20200, 0x40) fcntl$getownex(r2, 0x10, &(0x7f00000000c0)) r3 = open(&(0x7f0000000040)='./file0\x00', 0x200c2, 0x0) write$binfmt_elf64(r3, &(0x7f0000000080)=ANY=[], 0x8) sendfile(r3, r3, &(0x7f00000001c0), 0xa198) dup(0xffffffffffffffff) r4 = syz_mount_image$gfs2meta(&(0x7f0000000140)='gfs2meta\x00', &(0x7f0000000200)='./file0\x00', 0x1000, 0x4, &(0x7f0000000880)=[{&(0x7f0000000240)="77ba0daae1b2e74ecd52c59a85bf6f4b1f0b01ab07ba92bc6e57305406115f2bc3e4dd94f19ed896c4fccd34271e9dc3499af9298dbc709e0e6a513d61391d4b198af5f55d24239ae934e8babb8d1cb67bb17b0158", 0x55, 0x3}, {&(0x7f00000002c0)="ae227f954d229f666a6cd22938585e852071e55aa5728addcd315922bf32282e077bdbc63cd5ec89626ee2f8e7982ca239eaa758231056cdca22ca27428407f6c64c384665cfbd00ee6e0d7609f2c7ba0f28b4af70d0307ef78decfe42973915cd509de7c19ea0f3f5c3caaab05f9af08e2cc82d2c14b919dd045e3d36ce1c5d0ff23aed0a4a6ef508b5e71df0a25250d47f1e033ed503b6df99c189111b75b59df679cb75240b756cafecfd203568eeb2c1708fe9f11a2cb0f288590ec76cefbde09c90e9d568492aa5f41196397b70c869838c7164f2", 0xd7, 0x3}, {&(0x7f00000003c0)="792eb6eec33e561f18dc4b58b6a6fb3c7e6fd5e612c08490216ae02617f9811945929cffbf59727393a9a69d57b00a5cd08da3888884b8361d6a4003a54480c1086a5fc876582ff049ede86e2f58d80c7b6cf618e1ba36d4710887bc34ef2b7abbc686df2185f99998060bf492b84e3a02077e2aaf014e1186fde602d2b639d467f48fc2e18cf1553e07ac39040953566ab1d21aac627b166825375377bc3332b62160ea8bf7fc3196b30965dce6181bf7a1c60d0270f24ba6", 0xb9, 0x100000000}, {0x0, 0x0, 0x7}], 0x21008, &(0x7f0000000900)={[{'.log\x00'}, {'-%('}, {'.log\x00'}], [{@obj_user={'obj_user'}}, {@appraise_type='appraise_type=imasig'}, {@fowner_eq={'fowner', 0x3d, 0xee01}}, {@hash='hash'}, {@subj_type={'subj_type', 0x3d, '-&'}}]}) ioctl$BTRFS_IOC_SUBVOL_SETFLAGS(r4, 0x4008941a, &(0x7f0000000980)=0xfe33b054cbbc4d79) [ 625.915906][T29456] loop4: detected capacity change from 264192 to 0 11:26:00 executing program 0: r0 = perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x5c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write$binfmt_elf64(r0, &(0x7f0000000540)=ANY=[@ANYBLOB], 0x2c4) r1 = inotify_init() openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) epoll_ctl$EPOLL_CTL_DEL(0xffffffffffffffff, 0x2, 0xffffffffffffffff) inotify_add_watch(r1, &(0x7f0000000000)='.\x00', 0x400017e) r2 = openat$incfs(0xffffffffffffffff, &(0x7f0000000080)='.log\x00', 0x20200, 0x40) fcntl$getownex(r2, 0x10, &(0x7f00000000c0)) r3 = open(&(0x7f0000000040)='./file0\x00', 0x200c2, 0x0) write$binfmt_elf64(r3, &(0x7f0000000080)=ANY=[], 0x8) sendfile(r3, r3, &(0x7f00000001c0), 0xa198) dup(0xffffffffffffffff) r4 = syz_mount_image$gfs2meta(&(0x7f0000000140)='gfs2meta\x00', &(0x7f0000000200)='./file0\x00', 0x1000, 0x4, &(0x7f0000000880)=[{&(0x7f0000000240)="77ba0daae1b2e74ecd52c59a85bf6f4b1f0b01ab07ba92bc6e57305406115f2bc3e4dd94f19ed896c4fccd34271e9dc3499af9298dbc709e0e6a513d61391d4b198af5f55d24239ae934e8babb8d1cb67bb17b0158", 0x55, 0x3}, {&(0x7f00000002c0)="ae227f954d229f666a6cd22938585e852071e55aa5728addcd315922bf32282e077bdbc63cd5ec89626ee2f8e7982ca239eaa758231056cdca22ca27428407f6c64c384665cfbd00ee6e0d7609f2c7ba0f28b4af70d0307ef78decfe42973915cd509de7c19ea0f3f5c3caaab05f9af08e2cc82d2c14b919dd045e3d36ce1c5d0ff23aed0a4a6ef508b5e71df0a25250d47f1e033ed503b6df99c189111b75b59df679cb75240b756cafecfd203568eeb2c1708fe9f11a2cb0f288590ec76cefbde09c90e9d568492aa5f41196397b70c869838c7164f2bad8eff017d021", 0xde, 0x3}, {&(0x7f00000003c0)="792eb6eec33e561f18dc4b58b6a6fb3c7e6fd5e612c08490216ae02617f9811945929cffbf59727393a9a69d57b00a5cd08da3888884b8361d6a4003a54480c1086a5fc876582ff049ede86e2f58d80c7b6cf618e1ba36d4710887bc34ef2b7abbc686df2185f99998060bf492b84e3a02077e2aaf014e1186fde602d2b639d467f48fc2e18cf1553e07ac39040953566ab1d21aac627b166825375377bc3332b62160ea8bf7fc3196b30965dce6181bf7a1c60d0270f24ba6", 0xb9, 0x100000000}, {0x0, 0x0, 0x7}], 0x21008, &(0x7f0000000900)={[{'.log\x00'}, {'-%('}, {'.log\x00'}], [{@obj_user={'obj_user'}}, {@appraise_type='appraise_type=imasig'}, {@fowner_eq={'fowner', 0x3d, 0xee01}}, {@hash='hash'}, {@subj_type={'subj_type', 0x3d, '-&'}}]}) ioctl$BTRFS_IOC_SUBVOL_SETFLAGS(r4, 0x4008941a, &(0x7f0000000980)=0xfe33b054cbbc4d79) 11:26:00 executing program 1: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x7f, 0x80000000008001}, 0x0) r0 = gettid() ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3d) sched_setattr(r0, &(0x7f0000000200)={0x38, 0x0, 0x2, 0x56910af7, 0xfffffeff, 0x1, 0x6d, 0x6, 0x6, 0x81}, 0x0) r1 = getpid() sched_setattr(r1, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x9}, 0x0) r2 = open(&(0x7f0000000240)='./file1\x00', 0x141142, 0x0) write$UHID_INPUT(r2, &(0x7f0000001440), 0xfffffc41) r3 = gettid() ptrace$setopts(0x4206, r3, 0x0, 0x0) tkill(r3, 0x3d) sched_setattr(r3, &(0x7f0000000080)={0x38, 0x2, 0x2, 0x2bdec896, 0xd73c, 0x5f, 0x3f, 0xffffffffffffff81, 0x80000000, 0x4000}, 0x0) stat(&(0x7f0000000100)='./file1\x00', &(0x7f0000000140)) fcntl$getownex(r2, 0x10, &(0x7f00000002c0)={0x0, 0x0}) sched_setattr(r4, &(0x7f0000000300)={0x38, 0x1, 0x8, 0x5, 0x6, 0x6, 0x6, 0x20eb8a3d, 0x81, 0x9}, 0x0) open(&(0x7f00000001c0)='./file1\x00', 0x0, 0x0) setxattr$trusted_overlay_nlink(&(0x7f0000000000)='./file1\x00', &(0x7f00000000c0)='trusted.overlay.nlink\x00', 0x0, 0x0, 0x0) [ 626.328511][T29468] loop0: detected capacity change from 264192 to 0 [ 626.354187][ T35] kauditd_printk_skb: 26 callbacks suppressed [ 626.354200][ T35] audit: type=1804 audit(1612178760.434:2665): pid=29442 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.2" name="/root/syzkaller-testdir245532710/syzkaller.d2c0aK/468/file1" dev="sda1" ino=15952 res=1 errno=0 [ 626.409289][ T35] audit: type=1804 audit(1612178760.494:2666): pid=29444 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.2" name="/root/syzkaller-testdir245532710/syzkaller.d2c0aK/468/file1" dev="sda1" ino=15952 res=1 errno=0 [ 626.457265][ T35] audit: type=1804 audit(1612178760.494:2667): pid=29442 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor.2" name="/root/syzkaller-testdir245532710/syzkaller.d2c0aK/468/file1" dev="sda1" ino=15952 res=1 errno=0 11:26:00 executing program 2: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x7f, 0x80000000008001}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x9}, 0x0) r1 = open(&(0x7f0000000240)='./file1\x00', 0x141142, 0x0) write$UHID_INPUT(r1, &(0x7f0000001440)={0x8, {"00d000"}}, 0xfffffc41) open(&(0x7f00000001c0)='./file1\x00', 0x0, 0x0) setxattr$trusted_overlay_nlink(&(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x0, 0x0) 11:26:00 executing program 3: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x7f, 0x80000000008001}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x9}, 0x0) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000080)) r1 = open(&(0x7f0000000240)='./file1\x00', 0x141142, 0x0) write$UHID_INPUT(r1, &(0x7f0000001440)={0x8, {"008400"}}, 0xfffffc41) open(&(0x7f00000001c0)='./file1\x00', 0x0, 0x0) setxattr$trusted_overlay_nlink(&(0x7f0000000000)='./file1\x00', &(0x7f00000000c0)='trusted.overlay.nlink\x00', 0x0, 0x0, 0x0) 11:26:00 executing program 1: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x7f, 0x80000000008001}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x9}, 0x0) r1 = open(&(0x7f0000000240)='./file1\x00', 0x141142, 0x0) fcntl$setpipe(r1, 0x407, 0x4) write$UHID_INPUT(r1, &(0x7f0000001440), 0xfffffc41) open(&(0x7f0000000080)='./file1\x00', 0x8040, 0xa3) setxattr$trusted_overlay_nlink(&(0x7f0000000000)='./file1\x00', &(0x7f00000000c0)='trusted.overlay.nlink\x00', 0x0, 0x0, 0x0) [ 626.635866][ T35] audit: type=1804 audit(1612178760.714:2668): pid=29454 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.5" name="/root/syzkaller-testdir893819022/syzkaller.HkpAFb/534/file1" dev="sda1" ino=15731 res=1 errno=0 11:26:00 executing program 4: r0 = perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x5c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write$binfmt_elf64(r0, &(0x7f0000000540)=ANY=[@ANYBLOB], 0x2c4) r1 = inotify_init() openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) epoll_ctl$EPOLL_CTL_DEL(0xffffffffffffffff, 0x2, 0xffffffffffffffff) inotify_add_watch(r1, &(0x7f0000000000)='.\x00', 0x400017e) r2 = openat$incfs(0xffffffffffffffff, &(0x7f0000000080)='.log\x00', 0x20200, 0x40) fcntl$getownex(r2, 0x10, &(0x7f00000000c0)) r3 = open(&(0x7f0000000040)='./file0\x00', 0x200c2, 0x0) write$binfmt_elf64(r3, &(0x7f0000000080)=ANY=[], 0x8) sendfile(r3, r3, &(0x7f00000001c0), 0xa198) dup(0xffffffffffffffff) r4 = syz_mount_image$gfs2meta(&(0x7f0000000140)='gfs2meta\x00', &(0x7f0000000200)='./file0\x00', 0x1000, 0x4, &(0x7f0000000880)=[{&(0x7f0000000240)="77ba0daae1b2e74ecd52c59a85bf6f4b1f0b01ab07ba92bc6e57305406115f2bc3e4dd94f19ed896c4fccd34271e9dc3499af9298dbc709e0e6a513d61391d4b198af5f55d24239ae934e8babb8d1cb67bb17b0158", 0x55, 0x3}, {&(0x7f00000002c0)="ae227f954d229f666a6cd22938585e852071e55aa5728addcd315922bf32282e077bdbc63cd5ec89626ee2f8e7982ca239eaa758231056cdca22ca27428407f6c64c384665cfbd00ee6e0d7609f2c7ba0f28b4af70d0307ef78decfe42973915cd509de7c19ea0f3f5c3caaab05f9af08e2cc82d2c14b919dd045e3d36ce1c5d0ff23aed0a4a6ef508b5e71df0a25250d47f1e033ed503b6df99c189111b75b59df679cb75240b756cafecfd203568eeb2c1708fe9f11a2cb0f288590ec76cefbde09c90e9d568492aa5f41196397b70c869838c7164f2", 0xd7, 0x3}, {&(0x7f00000003c0)="792eb6eec33e561f18dc4b58b6a6fb3c7e6fd5e612c08490216ae02617f9811945929cffbf59727393a9a69d57b00a5cd08da3888884b8361d6a4003a54480c1086a5fc876582ff049ede86e2f58d80c7b6cf618e1ba36d4710887bc34ef2b7abbc686df2185f99998060bf492b84e3a02077e2aaf014e1186fde602d2b639d467f48fc2e18cf1553e07ac39040953566ab1d21aac627b166825375377bc3332b62160ea8bf7fc3196b30965dce6181bf7a1c60d0270f24ba6", 0xb9, 0x100000000}, {0x0, 0x0, 0x7}], 0x21008, &(0x7f0000000900)={[{'.log\x00'}, {'-%('}, {'.log\x00'}], [{@obj_user={'obj_user'}}, {@appraise_type='appraise_type=imasig'}, {@fowner_eq={'fowner', 0x3d, 0xee01}}, {@hash='hash'}, {@subj_type={'subj_type', 0x3d, '-&'}}]}) ioctl$BTRFS_IOC_SUBVOL_SETFLAGS(r4, 0x4008941a, &(0x7f0000000980)=0xfe33b054cbbc4d79) 11:26:00 executing program 5: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x7f, 0x80000000008001}, 0x0) r0 = getpid() setrlimit(0x9, &(0x7f0000000080)={0xffff, 0x6}) sched_setattr(r0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x9, 0x0, 0x0, 0x800}, 0x0) r1 = open(&(0x7f0000000240)='./file1\x00', 0x141142, 0x0) write$UHID_INPUT(r1, &(0x7f0000001440), 0xfffffc41) open(&(0x7f00000001c0)='./file1\x00', 0x0, 0x0) write$binfmt_elf64(r1, &(0x7f0000002480)=ANY=[@ANYBLOB="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"], 0x12b0) setxattr$trusted_overlay_nlink(&(0x7f0000000000)='./file1\x00', &(0x7f00000000c0)='trusted.overlay.nlink\x00', 0x0, 0x0, 0x0) 11:26:01 executing program 0: r0 = perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x5c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write$binfmt_elf64(r0, &(0x7f0000000540)=ANY=[@ANYBLOB], 0x2c4) r1 = inotify_init() openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) epoll_ctl$EPOLL_CTL_DEL(0xffffffffffffffff, 0x2, 0xffffffffffffffff) inotify_add_watch(r1, &(0x7f0000000000)='.\x00', 0x400017e) r2 = openat$incfs(0xffffffffffffffff, &(0x7f0000000080)='.log\x00', 0x20200, 0x40) fcntl$getownex(r2, 0x10, &(0x7f00000000c0)) r3 = open(&(0x7f0000000040)='./file0\x00', 0x200c2, 0x0) write$binfmt_elf64(r3, &(0x7f0000000080)=ANY=[], 0x8) sendfile(r3, r3, &(0x7f00000001c0), 0xa198) dup(0xffffffffffffffff) r4 = syz_mount_image$gfs2meta(&(0x7f0000000140)='gfs2meta\x00', &(0x7f0000000200)='./file0\x00', 0x1000, 0x4, &(0x7f0000000880)=[{&(0x7f0000000240)="77ba0daae1b2e74ecd52c59a85bf6f4b1f0b01ab07ba92bc6e57305406115f2bc3e4dd94f19ed896c4fccd34271e9dc3499af9298dbc709e0e6a513d61391d4b198af5f55d24239ae934e8babb8d1cb67bb17b0158", 0x55, 0x3}, {&(0x7f00000002c0)="ae227f954d229f666a6cd22938585e852071e55aa5728addcd315922bf32282e077bdbc63cd5ec89626ee2f8e7982ca239eaa758231056cdca22ca27428407f6c64c384665cfbd00ee6e0d7609f2c7ba0f28b4af70d0307ef78decfe42973915cd509de7c19ea0f3f5c3caaab05f9af08e2cc82d2c14b919dd045e3d36ce1c5d0ff23aed0a4a6ef508b5e71df0a25250d47f1e033ed503b6df99c189111b75b59df679cb75240b756cafecfd203568eeb2c1708fe9f11a2cb0f288590ec76cefbde09c90e9d568492aa5f41196397b70c869838c7164f2bad8eff017d021", 0xde, 0x3}, {&(0x7f00000003c0)="792eb6eec33e561f18dc4b58b6a6fb3c7e6fd5e612c08490216ae02617f9811945929cffbf59727393a9a69d57b00a5cd08da3888884b8361d6a4003a54480c1086a5fc876582ff049ede86e2f58d80c7b6cf618e1ba36d4710887bc34ef2b7abbc686df2185f99998060bf492b84e3a02077e2aaf014e1186fde602d2b639d467f48fc2e18cf1553e07ac39040953566ab1d21aac627b166825375377bc3332b62160ea8bf7fc3196b30965dce6181bf7a1c60d0270f24ba6", 0xb9, 0x100000000}, {0x0, 0x0, 0x7}], 0x21008, &(0x7f0000000900)={[{'.log\x00'}, {'-%('}, {'.log\x00'}], [{@obj_user={'obj_user'}}, {@appraise_type='appraise_type=imasig'}, {@fowner_eq={'fowner', 0x3d, 0xee01}}, {@hash='hash'}, {@subj_type={'subj_type', 0x3d, '-&'}}]}) ioctl$BTRFS_IOC_SUBVOL_SETFLAGS(r4, 0x4008941a, &(0x7f0000000980)=0xfe33b054cbbc4d79) [ 626.936656][T29491] loop4: detected capacity change from 264192 to 0 [ 627.069532][T29502] loop0: detected capacity change from 264192 to 0 [ 627.090555][T29500] ================================================================== [ 627.098803][T29500] BUG: KCSAN: data-race in __fsnotify_parent / d_set_mounted [ 627.106177][T29500] [ 627.108497][T29500] write to 0xffff88810f1dd180 of 4 bytes by task 29502 on cpu 0: [ 627.116291][T29500] d_set_mounted+0xfc/0x190 [ 627.120801][T29500] get_mountpoint+0x1be/0x300 [ 627.125483][T29500] lock_mount+0x86/0x1d0 [ 627.129722][T29500] path_mount+0xcb7/0x1ca0 [ 627.134161][T29500] __se_sys_mount+0x23d/0x2e0 [ 627.138857][T29500] __x64_sys_mount+0x63/0x70 [ 627.143445][T29500] do_syscall_64+0x39/0x80 [ 627.147861][T29500] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 627.154354][T29500] [ 627.156677][T29500] read to 0xffff88810f1dd180 of 4 bytes by task 29500 on cpu 1: [ 627.164451][T29500] __fsnotify_parent+0x7d/0x430 [ 627.169309][T29500] fsnotify_perm+0x299/0x2e0 [ 627.174015][T29500] security_file_permission+0x87/0xa0 [ 627.179390][T29500] rw_verify_area+0x136/0x250 [ 627.184201][T29500] splice_direct_to_actor+0x23a/0x650 [ 627.190302][T29500] do_splice_direct+0xf5/0x170 [ 627.195073][T29500] do_sendfile+0x5e0/0xcf0 [ 627.199489][T29500] __x64_sys_sendfile64+0xa9/0x130 [ 627.204693][T29500] do_syscall_64+0x39/0x80 [ 627.209245][T29500] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 627.215253][T29500] [ 627.217574][T29500] Reported by Kernel Concurrency Sanitizer on: [ 627.224400][T29500] CPU: 1 PID: 29500 Comm: syz-executor.0 Not tainted 5.11.0-rc6-syzkaller #0 [ 627.233164][T29500] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 627.243220][T29500] ================================================================== [ 627.251399][T29500] Kernel panic - not syncing: panic_on_warn set ... [ 627.257983][T29500] CPU: 1 PID: 29500 Comm: syz-executor.0 Not tainted 5.11.0-rc6-syzkaller #0 [ 627.266860][T29500] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 627.276921][T29500] Call Trace: [ 627.280292][T29500] dump_stack+0x116/0x15d [ 627.284634][T29500] panic+0x1e7/0x5fa [ 627.288551][T29500] ? vprintk_emit+0x2e2/0x360 [ 627.293495][T29500] kcsan_report+0x67b/0x680 [ 627.298281][T29500] ? ___cache_free+0x3c/0x2f0 [ 627.302973][T29500] ? kcsan_setup_watchpoint+0x472/0x4d0 [ 627.308525][T29500] ? __fsnotify_parent+0x7d/0x430 [ 627.313701][T29500] ? fsnotify_perm+0x299/0x2e0 [ 627.318470][T29500] ? security_file_permission+0x87/0xa0 [ 627.325289][T29500] ? rw_verify_area+0x136/0x250 [ 627.330311][T29500] ? splice_direct_to_actor+0x23a/0x650 [ 627.335978][T29500] ? do_splice_direct+0xf5/0x170 [ 627.340942][T29500] ? do_sendfile+0x5e0/0xcf0 [ 627.346932][T29500] ? __x64_sys_sendfile64+0xa9/0x130 [ 627.352384][T29500] ? do_syscall_64+0x39/0x80 [ 627.356987][T29500] ? entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 627.363091][T29500] ? ___cache_free+0x3c/0x2f0 [ 627.368146][T29500] kcsan_setup_watchpoint+0x472/0x4d0 [ 627.373637][T29500] ? iter_file_splice_write+0x6e8/0x770 [ 627.379334][T29500] __fsnotify_parent+0x7d/0x430 [ 627.384341][T29500] fsnotify_perm+0x299/0x2e0 [ 627.388942][T29500] security_file_permission+0x87/0xa0 [ 627.394482][T29500] rw_verify_area+0x136/0x250 [ 627.399177][T29500] splice_direct_to_actor+0x23a/0x650 [ 627.404678][T29500] ? do_splice_direct+0x170/0x170 [ 627.409714][T29500] do_splice_direct+0xf5/0x170 [ 627.414616][T29500] do_sendfile+0x5e0/0xcf0 [ 627.419126][T29500] __x64_sys_sendfile64+0xa9/0x130 [ 627.424252][T29500] do_syscall_64+0x39/0x80 [ 627.428977][T29500] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 627.435038][T29500] RIP: 0033:0x465b09 [ 627.438952][T29500] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 627.459025][T29500] RSP: 002b:00007f51b5c71188 EFLAGS: 00000246 ORIG_RAX: 0000000000000028 [ 627.468507][T29500] RAX: ffffffffffffffda RBX: 000000000056bf60 RCX: 0000000000465b09 [ 627.477932][T29500] RDX: 00000000200001c0 RSI: 0000000000000006 RDI: 0000000000000006 [ 627.486047][T29500] RBP: 00000000004b069f R08: 0000000000000000 R09: 0000000000000000 [ 627.494047][T29500] R10: 000000000000a198 R11: 0000000000000246 R12: 000000000056bf60 [ 627.502017][T29500] R13: 00007ffdbb65301f R14: 00007f51b5c71300 R15: 0000000000022000 [ 627.510988][T29500] Kernel Offset: disabled [ 627.515433][T29500] Rebooting in 86400 seconds..