newfstatat(0xffffffffffffff9c, &(0x7f00000000c0)='./file1\x00', &(0x7f0000001400), 0x400) close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x2) ioctl$TIOCSTI(r4, 0x5412, &(0x7f00000004c0)=0x40) fsync(0xffffffffffffffff) write$binfmt_misc(r4, &(0x7f0000001080)=ANY=[@ANYBLOB="7379d3c6"], 0x4) fallocate(r4, 0x100000011, 0x0, 0x2811fdff) open(&(0x7f0000000100)='.\x00', 0x20c2, 0x2d) open$dir(&(0x7f0000000500)='./file1\x00', 0x1c6c0, 0x0) r5 = openat$vcsu(0xffffffffffffff9c, &(0x7f0000000cc0), 0x400c00, 0x0) lsetxattr$security_selinux(&(0x7f0000001180)='./file1\x00', &(0x7f00000011c0), &(0x7f0000001300)='system_u:object_r:unconfined_exec_t:s0\x00', 0x27, 0x3) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000400)={0xffffffffffffffff, 0xe0, &(0x7f0000000300)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, &(0x7f00000000c0)=[0x0], &(0x7f0000000140), 0x0, 0x8, &(0x7f0000000200)=[{}, {}, {}, {}, {}], 0x28, 0x0, 0x0, 0x0, 0x0, 0x10, 0x8, 0x8, &(0x7f00000002c0)}}, 0x10) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000e80)=@bpf_lsm={0x1d, 0x4, &(0x7f0000000040)=@framed={{0x18, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x73fc}, [@generic={0x9, 0x8, 0x0, 0x7f, 0x200}]}, &(0x7f0000000880)='GPL\x00', 0x1f, 0x93, &(0x7f0000000cc0)=""/147, 0x40f00, 0x2, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, &(0x7f0000000b80)={0x9}, 0x8, 0x10, 0x0, 0x0, r6}, 0x80) r7 = socket$nl_generic(0x10, 0x3, 0x10) r8 = syz_genetlink_get_family_id$tipc(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$TIPC_CMD_ENABLE_BEARER(r7, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000001200)=ANY=[@ANYBLOB="3400000006c08fada241ee0a049e6fba3f36f40da839bbdf54c31768b0026f4261f56d51c5d81ba4cb99f8203c40d0a142fcd75ce26e408d229139f8c4e81109c56a18e453e8a537df21c4ec04a4f3e22f4ac125a28ad43e41107b1f7e79c8573985e54fd665e2913ca74da8c9f3fc2839258c19fa7ac20ebead31206cf280ea73f635bc5418b66554392dfd11874fef72bc53538aae3cb5ef8a80140f4737dd2c572a03ee1d5e3d627e", @ANYRESOCT=0x0, @ANYBLOB="010000000000000000000100000000000000014100000018001700000000000000007564503a73"], 0x34}, 0x1, 0x0, 0x0, 0x1}, 0x0) ioctl$AUTOFS_DEV_IOCTL_PROTOSUBVER(r1, 0xc0189373, &(0x7f0000000540)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x6}}, './file0\x00'}) sendmsg$TIPC_CMD_GET_MAX_PORTS(r5, &(0x7f0000001140)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x40000}, 0xc, &(0x7f0000001100)={&(0x7f00000010c0)={0x1c, r8, 0x400, 0x8000, 0x25dfdbfe, {}, ["", "", "", "", "", "", ""]}, 0x1c}, 0x1, 0x0, 0x0, 0x20048854}, 0x4004) bpf$PROG_LOAD(0x5, &(0x7f0000000e40)={0x5, 0x16, &(0x7f0000001340)=ANY=[@ANYBLOB="390000000100000000000000900000f117fa0000", @ANYRES32=r4, @ANYBLOB="1f00000000000000b703000000000000850000000c000000b61b0453c29f42b5be06c7010b4efffe000000000085000000a900000018150000", @ANYRES32=r3, @ANYBLOB="0000000000000000180100002020782500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b70300000000850000005d000000185500000100000000000000000000009500000000000000"], &(0x7f0000000b80)='syzkaller\x00', 0x1, 0xe8, &(0x7f0000000bc0)=""/232, 0x41000, 0x5b, '\x00', 0x0, 0xe, r5, 0x8, &(0x7f0000000d00)={0x5, 0x2}, 0x8, 0x10, &(0x7f0000000d40)={0x4, 0xe, 0x2, 0x8}, 0x10, r6, r4, 0x5, &(0x7f0000000d80), &(0x7f0000000dc0)=[{0x4, 0x3, 0x0, 0x2}, {0x3, 0x1, 0xa, 0xa}, {0x0, 0x3, 0x2, 0xa}, {0x0, 0x3, 0x7, 0x1}, {0x1, 0x5, 0xb, 0xc}], 0x10, 0x7}, 0x90) [ 104.114172][ T4953] hsr_slave_1: entered promiscuous mode [ 104.118485][ T5087] loop4: p2 p3 p7 [ 104.138417][ T5090] loop3: detected capacity change from 0 to 2048 20:40:52 executing program 4: ioctl$BTRFS_IOC_LOGICAL_INO(0xffffffffffffffff, 0xc0389424, &(0x7f0000000180)={0x1, 0x28, '\x00', 0x1, &(0x7f0000000080)=[0x0, 0x0, 0x0, 0x0, 0x0]}) r0 = socket$inet6(0xa, 0x3, 0x6) r1 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) r2 = dup2(r1, r0) ioctl$FIDEDUPERANGE(r0, 0xc0189436, &(0x7f0000000f00)=ANY=[@ANYBLOB="08000000000000000000000000000000000000002000000032057e68d5d647f4ed243c9d097db4c7bae602f8d4c84b5325f3d737af1c3ebe2901b056ac84d04eb9d8bfd4771499d444ff07000033206062c9a0527d2d0e4b0000fa0693ec3785977184911bffc60554e8950e91e1a8209818b4eb3440ae351192e1d7cf54ba6743f2db330481aac17f0961506d7ebd7ca999cf4e148c1ef2880f63693dfee2a6f2fafec2c059fd15db654600000000000000000076da8ec51705470a42729df6a32122af2a673d7409ca1b8a0da065e2bf7790c86a6b3014e1ef5d1c4000d3dff081d5a4c403971fe8869ab4973ffc7b24b6fbb4341ac1a0f5d56b64b9d23d6855e653f1e0418a6d9838196a7b145310a9b4c467199ecc3bd47b85aae47754bf695bdb85ea03f70beab5732a014c5f525bf2f9b9c6bd545e1a"]) ioctl$TIOCSBRK(r2, 0x5427) recvfrom$inet6(0xffffffffffffffff, &(0x7f0000000280)=""/134, 0x86, 0x40000102, &(0x7f0000000340)={0xa, 0x4e21, 0x77f, @mcast1, 0x403b3f}, 0x1c) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000001040)={{r2, 0xffffffffffffffff}, &(0x7f0000000140), &(0x7f0000000480)=r1}, 0x20) syz_read_part_table(0x593, &(0x7f00000005c0)="$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") r4 = creat(&(0x7f0000000240)='./file0\x00', 0x0) stat(&(0x7f0000000040)='./file1\x00', &(0x7f0000000380)) newfstatat(0xffffffffffffff9c, &(0x7f00000000c0)='./file1\x00', &(0x7f0000001400), 0x400) close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x2) ioctl$TIOCSTI(r4, 0x5412, &(0x7f00000004c0)=0x40) fsync(0xffffffffffffffff) write$binfmt_misc(r4, &(0x7f0000001080)=ANY=[@ANYBLOB="7379d3c6"], 0x4) fallocate(r4, 0x100000011, 0x0, 0x2811fdff) open(&(0x7f0000000100)='.\x00', 0x20c2, 0x2d) open$dir(&(0x7f0000000500)='./file1\x00', 0x1c6c0, 0x0) r5 = openat$vcsu(0xffffffffffffff9c, &(0x7f0000000cc0), 0x400c00, 0x0) lsetxattr$security_selinux(&(0x7f0000001180)='./file1\x00', &(0x7f00000011c0), &(0x7f0000001300)='system_u:object_r:unconfined_exec_t:s0\x00', 0x27, 0x3) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000400)={0xffffffffffffffff, 0xe0, &(0x7f0000000300)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, &(0x7f00000000c0)=[0x0], &(0x7f0000000140), 0x0, 0x8, &(0x7f0000000200)=[{}, {}, {}, {}, {}], 0x28, 0x0, 0x0, 0x0, 0x0, 0x10, 0x8, 0x8, &(0x7f00000002c0)}}, 0x10) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000e80)=@bpf_lsm={0x1d, 0x4, &(0x7f0000000040)=@framed={{0x18, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x73fc}, [@generic={0x9, 0x8, 0x0, 0x7f, 0x200}]}, &(0x7f0000000880)='GPL\x00', 0x1f, 0x93, &(0x7f0000000cc0)=""/147, 0x40f00, 0x2, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, &(0x7f0000000b80)={0x9}, 0x8, 0x10, 0x0, 0x0, r6}, 0x80) r7 = socket$nl_generic(0x10, 0x3, 0x10) r8 = syz_genetlink_get_family_id$tipc(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$TIPC_CMD_ENABLE_BEARER(r7, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000001200)=ANY=[@ANYBLOB="3400000006c08fada241ee0a049e6fba3f36f40da839bbdf54c31768b0026f4261f56d51c5d81ba4cb99f8203c40d0a142fcd75ce26e408d229139f8c4e81109c56a18e453e8a537df21c4ec04a4f3e22f4ac125a28ad43e41107b1f7e79c8573985e54fd665e2913ca74da8c9f3fc2839258c19fa7ac20ebead31206cf280ea73f635bc5418b66554392dfd11874fef72bc53538aae3cb5ef8a80140f4737dd2c572a03ee1d5e3d627e", @ANYRESOCT=0x0, @ANYBLOB="010000000000000000000100000000000000014100000018001700000000000000007564503a73"], 0x34}, 0x1, 0x0, 0x0, 0x1}, 0x0) ioctl$AUTOFS_DEV_IOCTL_PROTOSUBVER(r1, 0xc0189373, &(0x7f0000000540)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x6}}, './file0\x00'}) sendmsg$TIPC_CMD_GET_MAX_PORTS(r5, &(0x7f0000001140)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x40000}, 0xc, &(0x7f0000001100)={&(0x7f00000010c0)={0x1c, r8, 0x400, 0x8000, 0x25dfdbfe, {}, ["", "", "", "", "", "", ""]}, 0x1c}, 0x1, 0x0, 0x0, 0x20048854}, 0x4004) bpf$PROG_LOAD(0x5, &(0x7f0000000e40)={0x5, 0x16, &(0x7f0000001340)=ANY=[@ANYBLOB="390000000100000000000000900000f117fa0000", @ANYRES32=r4, @ANYBLOB="1f00000000000000b703000000000000850000000c000000b61b0453c29f42b5be06c7010b4efffe000000000085000000a900000018150000", @ANYRES32=r3, @ANYBLOB="0000000000000000180100002020782500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b70300000000850000005d000000185500000100000000000000000000009500000000000000"], &(0x7f0000000b80)='syzkaller\x00', 0x1, 0xe8, &(0x7f0000000bc0)=""/232, 0x41000, 0x5b, '\x00', 0x0, 0xe, r5, 0x8, &(0x7f0000000d00)={0x5, 0x2}, 0x8, 0x10, &(0x7f0000000d40)={0x4, 0xe, 0x2, 0x8}, 0x10, r6, r4, 0x5, &(0x7f0000000d80), &(0x7f0000000dc0)=[{0x4, 0x3, 0x0, 0x2}, {0x3, 0x1, 0xa, 0xa}, {0x0, 0x3, 0x2, 0xa}, {0x0, 0x3, 0x7, 0x1}, {0x1, 0x5, 0xb, 0xc}], 0x10, 0x7}, 0x90) [ 104.172277][ T5091] EXT4-fs (loop0): 1 orphan inode deleted [ 104.178119][ T5091] EXT4-fs (loop0): mounted filesystem 00000000-0000-0000-0000-000000000000 r/w without journal. Quota mode: writeback. [ 104.191766][ T3701] Quota error (device loop0): do_check_range: Getting dqdh_entries 15 out of range 0-14 [ 104.213981][ T5091] ext4 filesystem being mounted at /root/syzkaller-testdir338643557/syzkaller.M396af/52/file1 supports timestamps until 2038-01-19 (0x7fffffff) 20:40:52 executing program 0: r0 = open(&(0x7f0000000040)='./bus\x00', 0x8001141042, 0x0) connect$unix(r0, &(0x7f0000000240)=@file={0x0, './bus\x00'}, 0x6e) setuid(0x0) getgid() ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f0000000a80)) getuid() getegid() r1 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x4, &(0x7f00000002c0)=ANY=[@ANYBLOB="18010000000000000000000000000004850000006d00000095"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x80) r2 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000000)='alarmtimer_suspend\x00', r1}, 0x10) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000080)={0x0, r2, 0x0, 0x6, &(0x7f0000000040)='kfree\x00'}, 0x13) perf_event_open(&(0x7f0000002740)={0x5, 0x80, 0xfd, 0x3, 0x81, 0xeb, 0x0, 0x9, 0x0, 0x5, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0xfffffff7, 0x2, @perf_config_ext={0x2, 0x401}, 0x1800, 0x3, 0x3, 0x6, 0x80000001, 0x81, 0x20, 0x0, 0x5, 0x0, 0x10000}, 0x0, 0x9, 0xffffffffffffffff, 0x8) perf_event_open(&(0x7f0000000040)={0x0, 0x80, 0x1, 0x0, 0x1, 0x1f, 0x0, 0x7, 0x0, 0xa, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x8, 0x2, @perf_config_ext={0x100000001, 0x9}, 0x15, 0x72e0, 0xa9, 0x1, 0x0, 0x2, 0x5, 0x0, 0x1000}, 0x0, 0x7, 0xffffffffffffffff, 0x9) fstat(r0, &(0x7f0000000b00)) r3 = getegid() syz_mount_image$ext4(&(0x7f0000000100)='ext4\x00', &(0x7f0000000200)='./file1\x00', 0x3000000, &(0x7f0000003040)=ANY=[@ANYRES64=r3, @ANYBLOB="8555591a163448f4c52bee6cc0e12a6a8610718f818822e94c360e46f93ac9c63a1b40ea9d758c2b4e2d7c386a141016d11cb13fabc846fc7fb242c175fbdf96e2a96e80e82b73987b1d5dfd843c7e6748a15a0c4160f5e4c468e8f8e417bd3385546159881194fe3a7cf8307cd9c7ce0ca180a481d4dcaa6611ec5c8ff1c546360dea3da9f2bfc1fd71af9ebf2afe4285f013a3929a7096097976a16e2060e5f26e379011ea1811", @ANYRES64, @ANYBLOB="ca42ad87c41bb3b2507e4e12104f0cd507000001046f9445657db4996b10208d04454e11fb5b1383c5ce98e3062f45ec04e5b8b179df3d64a6cec05d29235e3cbe0b339abe9faee5cf3e44c97ce56a1dc359047114eeb3c23f331114039d75a664afc47e8273b79e83d301fc4ceec8b89911505b6743797c459195a7120ded1748f315deb90000ffed00000000000000", @ANYRES8=r3, @ANYRES8=r3, @ANYRES64, @ANYBLOB="bd85893dee1670c8c7e3b4a65ec61f224992fd11263b7749c7ee63dd4fc13cc5dfdde8a3099aaf21ece351c316d9bbd7e4ecc524c856f20d6a1818d6d75f702eb904653f9d55af", @ANYRESOCT], 0x1, 0x513, &(0x7f0000000c40)="$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") [ 104.263032][ T5090] loop3: p2 p3 p7 [ 104.274088][ T2775] loop4: p2 p3 p7 [ 104.289495][ T4139] EXT4-fs (loop0): unmounting filesystem 00000000-0000-0000-0000-000000000000. [ 104.293869][ T5110] loop1: detected capacity change from 0 to 2048 [ 104.325460][ T5112] loop4: detected capacity change from 0 to 2048 [ 104.363062][ T5110] loop1: p2 p3 p7 [ 104.388122][ T5112] loop4: p2 p3 p7 20:40:52 executing program 1: ioctl$BTRFS_IOC_LOGICAL_INO(0xffffffffffffffff, 0xc0389424, &(0x7f0000000180)={0x1, 0x28, '\x00', 0x1, &(0x7f0000000080)=[0x0, 0x0, 0x0, 0x0, 0x0]}) r0 = socket$inet6(0xa, 0x3, 0x6) r1 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) r2 = dup2(r1, r0) ioctl$FIDEDUPERANGE(r0, 0xc0189436, &(0x7f0000000f00)=ANY=[@ANYBLOB="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"]) ioctl$TIOCSBRK(r2, 0x5427) recvfrom$inet6(0xffffffffffffffff, &(0x7f0000000280)=""/134, 0x86, 0x40000102, &(0x7f0000000340)={0xa, 0x4e21, 0x77f, @mcast1, 0x403b3f}, 0x1c) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000001040)={{r2, 0xffffffffffffffff}, &(0x7f0000000140), &(0x7f0000000480)=r1}, 0x20) syz_read_part_table(0x593, &(0x7f00000005c0)="$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") r4 = creat(&(0x7f0000000240)='./file0\x00', 0x0) fsetxattr$security_capability(r4, &(0x7f0000000100), &(0x7f0000000000)=@v1={0x1000000, [{0x80000000, 0x81}]}, 0xc, 0x0) newfstatat(0xffffffffffffff9c, &(0x7f00000000c0)='./file1\x00', &(0x7f0000001400), 0x400) close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x2) ioctl$TIOCSTI(r4, 0x5412, &(0x7f00000004c0)=0x40) fsync(0xffffffffffffffff) write$binfmt_misc(r4, &(0x7f0000001080)=ANY=[@ANYBLOB="7379d3c6"], 0x4) fallocate(r4, 0x100000011, 0x0, 0x2811fdff) open(&(0x7f0000000100)='.\x00', 0x20c2, 0x2d) open$dir(&(0x7f0000000500)='./file1\x00', 0x1c6c0, 0x0) r5 = openat$vcsu(0xffffffffffffff9c, &(0x7f0000000cc0), 0x400c00, 0x0) lsetxattr$security_selinux(&(0x7f0000001180)='./file1\x00', &(0x7f00000011c0), &(0x7f0000001300)='system_u:object_r:unconfined_exec_t:s0\x00', 0x27, 0x3) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000400)={0xffffffffffffffff, 0xe0, &(0x7f0000000300)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, &(0x7f00000000c0)=[0x0], &(0x7f0000000140), 0x0, 0x8, &(0x7f0000000200)=[{}, {}, {}, {}, {}], 0x28, 0x0, 0x0, 0x0, 0x0, 0x10, 0x8, 0x8, &(0x7f00000002c0)}}, 0x10) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000e80)=@bpf_lsm={0x1d, 0x4, &(0x7f0000000040)=@framed={{0x18, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x73fc}, [@generic={0x9, 0x8, 0x0, 0x7f, 0x200}]}, &(0x7f0000000880)='GPL\x00', 0x1f, 0x93, &(0x7f0000000cc0)=""/147, 0x40f00, 0x2, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, &(0x7f0000000b80)={0x9}, 0x8, 0x10, 0x0, 0x0, r6}, 0x80) r7 = socket$nl_generic(0x10, 0x3, 0x10) r8 = syz_genetlink_get_family_id$tipc(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$TIPC_CMD_ENABLE_BEARER(r7, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000001200)=ANY=[@ANYBLOB="3400000006c08fada241ee0a049e6fba3f36f40da839bbdf54c31768b0026f4261f56d51c5d81ba4cb99f8203c40d0a142fcd75ce26e408d229139f8c4e81109c56a18e453e8a537df21c4ec04a4f3e22f4ac125a28ad43e41107b1f7e79c8573985e54fd665e2913ca74da8c9f3fc2839258c19fa7ac20ebead31206cf280ea73f635bc5418b66554392dfd11874fef72bc53538aae3cb5ef8a80140f4737dd2c572a03ee1d5e3d627e", @ANYRESOCT=0x0, @ANYBLOB="010000000000000000000100000000000000014100000018001700000000000000007564503a73"], 0x34}, 0x1, 0x0, 0x0, 0x1}, 0x0) ioctl$AUTOFS_DEV_IOCTL_PROTOSUBVER(r1, 0xc0189373, &(0x7f0000000540)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x6}}, './file0\x00'}) sendmsg$TIPC_CMD_GET_MAX_PORTS(r5, &(0x7f0000001140)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x40000}, 0xc, &(0x7f0000001100)={&(0x7f00000010c0)={0x1c, r8, 0x400, 0x8000, 0x25dfdbfe, {}, ["", "", "", "", "", "", ""]}, 0x1c}, 0x1, 0x0, 0x0, 0x20048854}, 0x4004) bpf$PROG_LOAD(0x5, &(0x7f0000000e40)={0x5, 0x16, &(0x7f0000001340)=ANY=[@ANYBLOB="390000000100000000000000900000f117fa0000", @ANYRES32=r4, @ANYBLOB="1f00000000000000b703000000000000850000000c000000b61b0453c29f42b5be06c7010b4efffe000000000085000000a900000018150000", @ANYRES32=r3, @ANYBLOB="0000000000000000180100002020782500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b70300000000850000005d000000185500000100000000000000000000009500000000000000"], &(0x7f0000000b80)='syzkaller\x00', 0x1, 0xe8, &(0x7f0000000bc0)=""/232, 0x41000, 0x5b, '\x00', 0x0, 0xe, r5, 0x8, &(0x7f0000000d00)={0x5, 0x2}, 0x8, 0x10, &(0x7f0000000d40)={0x4, 0xe, 0x2, 0x8}, 0x10, r6, r4, 0x5, &(0x7f0000000d80), &(0x7f0000000dc0)=[{0x4, 0x3, 0x0, 0x2}, {0x3, 0x1, 0xa, 0xa}, {0x0, 0x3, 0x2, 0xa}, {0x0, 0x3, 0x7, 0x1}, {0x1, 0x5, 0xb, 0xc}], 0x10, 0x7}, 0x90) 20:40:52 executing program 4: ioctl$BTRFS_IOC_LOGICAL_INO(0xffffffffffffffff, 0xc0389424, &(0x7f0000000180)={0x1, 0x28, '\x00', 0x1, &(0x7f0000000080)=[0x0, 0x0, 0x0, 0x0, 0x0]}) r0 = socket$inet6(0xa, 0x3, 0x6) r1 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) r2 = dup2(r1, r0) ioctl$FIDEDUPERANGE(r0, 0xc0189436, &(0x7f0000000f00)=ANY=[@ANYBLOB="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"]) ioctl$TIOCSBRK(r2, 0x5427) recvfrom$inet6(0xffffffffffffffff, &(0x7f0000000280)=""/134, 0x86, 0x40000102, &(0x7f0000000340)={0xa, 0x4e21, 0x77f, @mcast1, 0x403b3f}, 0x1c) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000001040)={{r2, 0xffffffffffffffff}, &(0x7f0000000140), &(0x7f0000000480)=r1}, 0x20) syz_read_part_table(0x593, &(0x7f00000005c0)="$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") r4 = creat(&(0x7f0000000240)='./file0\x00', 0x0) stat(&(0x7f0000000040)='./file1\x00', &(0x7f0000000380)) newfstatat(0xffffffffffffff9c, &(0x7f00000000c0)='./file1\x00', &(0x7f0000001400), 0x400) close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x2) ioctl$TIOCSTI(r4, 0x5412, &(0x7f00000004c0)=0x40) fsync(0xffffffffffffffff) write$binfmt_misc(r4, &(0x7f0000001080)=ANY=[@ANYBLOB="7379d3c6"], 0x4) fallocate(r4, 0x100000011, 0x0, 0x2811fdff) open(&(0x7f0000000100)='.\x00', 0x20c2, 0x2d) open$dir(&(0x7f0000000500)='./file1\x00', 0x1c6c0, 0x0) r5 = openat$vcsu(0xffffffffffffff9c, &(0x7f0000000cc0), 0x400c00, 0x0) lsetxattr$security_selinux(&(0x7f0000001180)='./file1\x00', &(0x7f00000011c0), &(0x7f0000001300)='system_u:object_r:unconfined_exec_t:s0\x00', 0x27, 0x3) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000400)={0xffffffffffffffff, 0xe0, &(0x7f0000000300)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, &(0x7f00000000c0)=[0x0], &(0x7f0000000140), 0x0, 0x8, &(0x7f0000000200)=[{}, {}, {}, {}, {}], 0x28, 0x0, 0x0, 0x0, 0x0, 0x10, 0x8, 0x8, &(0x7f00000002c0)}}, 0x10) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000e80)=@bpf_lsm={0x1d, 0x4, &(0x7f0000000040)=@framed={{0x18, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x73fc}, [@generic={0x9, 0x8, 0x0, 0x7f, 0x200}]}, &(0x7f0000000880)='GPL\x00', 0x1f, 0x93, &(0x7f0000000cc0)=""/147, 0x40f00, 0x2, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, &(0x7f0000000b80)={0x9}, 0x8, 0x10, 0x0, 0x0, r6}, 0x80) r7 = socket$nl_generic(0x10, 0x3, 0x10) r8 = syz_genetlink_get_family_id$tipc(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$TIPC_CMD_ENABLE_BEARER(r7, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000001200)=ANY=[@ANYBLOB="3400000006c08fada241ee0a049e6fba3f36f40da839bbdf54c31768b0026f4261f56d51c5d81ba4cb99f8203c40d0a142fcd75ce26e408d229139f8c4e81109c56a18e453e8a537df21c4ec04a4f3e22f4ac125a28ad43e41107b1f7e79c8573985e54fd665e2913ca74da8c9f3fc2839258c19fa7ac20ebead31206cf280ea73f635bc5418b66554392dfd11874fef72bc53538aae3cb5ef8a80140f4737dd2c572a03ee1d5e3d627e", @ANYRESOCT=0x0, @ANYBLOB="010000000000000000000100000000000000014100000018001700000000000000007564503a73"], 0x34}, 0x1, 0x0, 0x0, 0x1}, 0x0) ioctl$AUTOFS_DEV_IOCTL_PROTOSUBVER(r1, 0xc0189373, &(0x7f0000000540)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x6}}, './file0\x00'}) sendmsg$TIPC_CMD_GET_MAX_PORTS(r5, &(0x7f0000001140)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x40000}, 0xc, &(0x7f0000001100)={&(0x7f00000010c0)={0x1c, r8, 0x400, 0x8000, 0x25dfdbfe, {}, ["", "", "", "", "", "", ""]}, 0x1c}, 0x1, 0x0, 0x0, 0x20048854}, 0x4004) bpf$PROG_LOAD(0x5, &(0x7f0000000e40)={0x5, 0x16, &(0x7f0000001340)=ANY=[@ANYBLOB="390000000100000000000000900000f117fa0000", @ANYRES32=r4, @ANYBLOB="1f00000000000000b703000000000000850000000c000000b61b0453c29f42b5be06c7010b4efffe000000000085000000a900000018150000", @ANYRES32=r3, @ANYBLOB="0000000000000000180100002020782500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b70300000000850000005d000000185500000100000000000000000000009500000000000000"], &(0x7f0000000b80)='syzkaller\x00', 0x1, 0xe8, &(0x7f0000000bc0)=""/232, 0x41000, 0x5b, '\x00', 0x0, 0xe, r5, 0x8, &(0x7f0000000d00)={0x5, 0x2}, 0x8, 0x10, &(0x7f0000000d40)={0x4, 0xe, 0x2, 0x8}, 0x10, r6, r4, 0x5, &(0x7f0000000d80), &(0x7f0000000dc0)=[{0x4, 0x3, 0x0, 0x2}, {0x3, 0x1, 0xa, 0xa}, {0x0, 0x3, 0x2, 0xa}, {0x0, 0x3, 0x7, 0x1}, {0x1, 0x5, 0xb, 0xc}], 0x10, 0x7}, 0x90) [ 104.420213][ T5116] loop0: detected capacity change from 0 to 512 [ 104.478861][ T5116] EXT4-fs (loop0): 1 orphan inode deleted [ 104.484651][ T5116] EXT4-fs (loop0): mounted filesystem 00000000-0000-0000-0000-000000000000 r/w without journal. Quota mode: writeback. [ 104.512376][ T2775] loop4: p2 p3 p7 [ 104.516229][ T311] Quota error (device loop0): do_check_range: Getting dqdh_entries 15 out of range 0-14 [ 104.527949][ T5116] ext4 filesystem being mounted at /root/syzkaller-testdir338643557/syzkaller.M396af/53/file1 supports timestamps until 2038-01-19 (0x7fffffff) 20:40:53 executing program 0: r0 = open(&(0x7f0000000040)='./bus\x00', 0x8001141042, 0x0) connect$unix(r0, &(0x7f0000000240)=@file={0x0, './bus\x00'}, 0x6e) setuid(0x0) getgid() ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f0000000a80)) getuid() getegid() r1 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x4, &(0x7f00000002c0)=ANY=[@ANYBLOB="18010000000000000000000000000004850000006d00000095"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x80) r2 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000000)='alarmtimer_suspend\x00', r1}, 0x10) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000080)={0x0, r2, 0x0, 0x6, &(0x7f0000000040)='kfree\x00'}, 0x13) perf_event_open(&(0x7f0000002740)={0x5, 0x80, 0xfd, 0x3, 0x81, 0xeb, 0x0, 0x9, 0x0, 0x5, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0xfffffff7, 0x2, @perf_config_ext={0x2, 0x401}, 0x1800, 0x3, 0x3, 0x6, 0x80000001, 0x81, 0x20, 0x0, 0x5, 0x0, 0x10000}, 0x0, 0x9, 0xffffffffffffffff, 0x8) perf_event_open(&(0x7f0000000040)={0x0, 0x80, 0x1, 0x0, 0x1, 0x1f, 0x0, 0x7, 0x0, 0xa, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x8, 0x2, @perf_config_ext={0x100000001, 0x9}, 0x15, 0x72e0, 0xa9, 0x1, 0x0, 0x2, 0x5, 0x0, 0x1000}, 0x0, 0x7, 0xffffffffffffffff, 0x9) fstat(r0, &(0x7f0000000b00)) r3 = getegid() syz_mount_image$ext4(&(0x7f0000000100)='ext4\x00', &(0x7f0000000200)='./file1\x00', 0x3000000, &(0x7f0000003040)=ANY=[@ANYRES64=r3, @ANYBLOB="8555591a163448f4c52bee6cc0e12a6a8610718f818822e94c360e46f93ac9c63a1b40ea9d758c2b4e2d7c386a141016d11cb13fabc846fc7fb242c175fbdf96e2a96e80e82b73987b1d5dfd843c7e6748a15a0c4160f5e4c468e8f8e417bd3385546159881194fe3a7cf8307cd9c7ce0ca180a481d4dcaa6611ec5c8ff1c546360dea3da9f2bfc1fd71af9ebf2afe4285f013a3929a7096097976a16e2060e5f26e379011ea1811", @ANYRES64, @ANYBLOB="ca42ad87c41bb3b2507e4e12104f0cd507000001046f9445657db4996b10208d04454e11fb5b1383c5ce98e3062f45ec04e5b8b179df3d64a6cec05d29235e3cbe0b339abe9faee5cf3e44c97ce56a1dc359047114eeb3c23f331114039d75a664afc47e8273b79e83d301fc4ceec8b89911505b6743797c459195a7120ded1748f315deb90000ffed00000000000000", @ANYRES8=r3, @ANYRES8=r3, @ANYRES64, @ANYBLOB="bd85893dee1670c8c7e3b4a65ec61f224992fd11263b7749c7ee63dd4fc13cc5dfdde8a3099aaf21ece351c316d9bbd7e4ecc524c856f20d6a1818d6d75f702eb904653f9d55af", @ANYRESOCT], 0x1, 0x513, &(0x7f0000000c40)="$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") [ 104.624940][ T5129] loop1: detected capacity change from 0 to 2048 20:40:53 executing program 3: r0 = open(&(0x7f0000000040)='./bus\x00', 0x8001141042, 0x0) connect$unix(r0, &(0x7f0000000240)=@file={0x0, './bus\x00'}, 0x6e) setuid(0x0) getgid() ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f0000000a80)) getuid() getegid() r1 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x4, &(0x7f00000002c0)=ANY=[@ANYBLOB="18010000000000000000000000000004850000006d00000095"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000000)='alarmtimer_suspend\x00', r1}, 0x10) r2 = gettid() perf_event_open(&(0x7f0000002740)={0x5, 0x80, 0xfd, 0x3, 0x81, 0xeb, 0x0, 0x9, 0x0, 0x5, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0xfffffff7, 0x2, @perf_config_ext={0x2, 0x401}, 0x1800, 0x3, 0x3, 0x6, 0x80000001, 0x81, 0x20, 0x0, 0x5, 0x0, 0x10000}, r2, 0x9, 0xffffffffffffffff, 0x8) perf_event_open(&(0x7f0000000040)={0x0, 0x80, 0x1, 0x0, 0x1, 0x1f, 0x0, 0x7, 0x0, 0xa, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x8, 0x2, @perf_config_ext={0x100000001, 0x9}, 0x15, 0x72e0, 0xa9, 0x1, 0x0, 0x2, 0x5, 0x0, 0x1000}, r2, 0x7, 0xffffffffffffffff, 0x9) fstat(r0, &(0x7f0000000b00)) r3 = getegid() syz_mount_image$ext4(&(0x7f0000000100)='ext4\x00', &(0x7f0000000200)='./file1\x00', 0x3000000, &(0x7f0000003040)=ANY=[@ANYRES64=r3, @ANYBLOB="8555591a163448f4c52bee6cc0e12a6a8610718f818822e94c360e46f93ac9c63a1b40ea9d758c2b4e2d7c386a141016d11cb13fabc846fc7fb242c175fbdf96e2a96e80e82b73987b1d5dfd843c7e6748a15a0c4160f5e4c468e8f8e417bd3385546159881194fe3a7cf8307cd9c7ce0ca180a481d4dcaa6611ec5c8ff1c546360dea3da9f2bfc1fd71af9ebf2afe4285f013a3929a7096097976a16e2060e5f26e379011ea1811", @ANYRES64, @ANYBLOB="ca42ad87c41bb3b2507e4e12104f0cd507000001046f9445657db4996b10208d04454e11fb5b1383c5ce98e3062f45ec04e5b8b179df3d64a6cec05d29235e3cbe0b339abe9faee5cf3e44c97ce56a1dc359047114eeb3c23f331114039d75a664afc47e8273b79e83d301fc4ceec8b89911505b6743797c459195a7120ded1748f315deb90000ffed00000000000000", @ANYRES8=r3, @ANYRES8=r3, @ANYRES64, @ANYBLOB="bd85893dee1670c8c7e3b4a65ec61f224992fd11263b7749c7ee63dd4fc13cc5dfdde8a3099aaf21ece351c316d9bbd7e4ecc524c856f20d6a1818d6d75f702eb904653f9d55af", @ANYRESOCT], 0x1, 0x513, &(0x7f0000000c40)="$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") 20:40:53 executing program 1: ioctl$BTRFS_IOC_LOGICAL_INO(0xffffffffffffffff, 0xc0389424, &(0x7f0000000180)={0x1, 0x28, '\x00', 0x1, &(0x7f0000000080)=[0x0, 0x0, 0x0, 0x0, 0x0]}) r0 = socket$inet6(0xa, 0x3, 0x6) r1 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) r2 = dup2(r1, r0) ioctl$FIDEDUPERANGE(r0, 0xc0189436, &(0x7f0000000f00)=ANY=[@ANYBLOB="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"]) ioctl$TIOCSBRK(r2, 0x5427) recvfrom$inet6(0xffffffffffffffff, &(0x7f0000000280)=""/134, 0x86, 0x40000102, &(0x7f0000000340)={0xa, 0x4e21, 0x77f, @mcast1, 0x403b3f}, 0x1c) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000001040)={{r2, 0xffffffffffffffff}, &(0x7f0000000140), &(0x7f0000000480)=r1}, 0x20) syz_read_part_table(0x593, &(0x7f00000005c0)="$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") r4 = creat(&(0x7f0000000240)='./file0\x00', 0x0) fsetxattr$security_capability(r4, &(0x7f0000000100), &(0x7f0000000000)=@v1={0x1000000, [{0x80000000, 0x81}]}, 0xc, 0x0) newfstatat(0xffffffffffffff9c, &(0x7f00000000c0)='./file1\x00', &(0x7f0000001400), 0x400) close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x2) ioctl$TIOCSTI(r4, 0x5412, &(0x7f00000004c0)=0x40) fsync(0xffffffffffffffff) write$binfmt_misc(r4, &(0x7f0000001080)=ANY=[@ANYBLOB="7379d3c6"], 0x4) fallocate(r4, 0x100000011, 0x0, 0x2811fdff) open(&(0x7f0000000100)='.\x00', 0x20c2, 0x2d) open$dir(&(0x7f0000000500)='./file1\x00', 0x1c6c0, 0x0) r5 = openat$vcsu(0xffffffffffffff9c, &(0x7f0000000cc0), 0x400c00, 0x0) lsetxattr$security_selinux(&(0x7f0000001180)='./file1\x00', &(0x7f00000011c0), &(0x7f0000001300)='system_u:object_r:unconfined_exec_t:s0\x00', 0x27, 0x3) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000400)={0xffffffffffffffff, 0xe0, &(0x7f0000000300)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, &(0x7f00000000c0)=[0x0], &(0x7f0000000140), 0x0, 0x8, &(0x7f0000000200)=[{}, {}, {}, {}, {}], 0x28, 0x0, 0x0, 0x0, 0x0, 0x10, 0x8, 0x8, &(0x7f00000002c0)}}, 0x10) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000e80)=@bpf_lsm={0x1d, 0x4, &(0x7f0000000040)=@framed={{0x18, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x73fc}, [@generic={0x9, 0x8, 0x0, 0x7f, 0x200}]}, &(0x7f0000000880)='GPL\x00', 0x1f, 0x93, &(0x7f0000000cc0)=""/147, 0x40f00, 0x2, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, &(0x7f0000000b80)={0x9}, 0x8, 0x10, 0x0, 0x0, r6}, 0x80) r7 = socket$nl_generic(0x10, 0x3, 0x10) r8 = syz_genetlink_get_family_id$tipc(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$TIPC_CMD_ENABLE_BEARER(r7, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000001200)=ANY=[@ANYBLOB="3400000006c08fada241ee0a049e6fba3f36f40da839bbdf54c31768b0026f4261f56d51c5d81ba4cb99f8203c40d0a142fcd75ce26e408d229139f8c4e81109c56a18e453e8a537df21c4ec04a4f3e22f4ac125a28ad43e41107b1f7e79c8573985e54fd665e2913ca74da8c9f3fc2839258c19fa7ac20ebead31206cf280ea73f635bc5418b66554392dfd11874fef72bc53538aae3cb5ef8a80140f4737dd2c572a03ee1d5e3d627e", @ANYRESOCT=0x0, @ANYBLOB="010000000000000000000100000000000000014100000018001700000000000000007564503a73"], 0x34}, 0x1, 0x0, 0x0, 0x1}, 0x0) ioctl$AUTOFS_DEV_IOCTL_PROTOSUBVER(r1, 0xc0189373, &(0x7f0000000540)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x6}}, './file0\x00'}) sendmsg$TIPC_CMD_GET_MAX_PORTS(r5, &(0x7f0000001140)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x40000}, 0xc, &(0x7f0000001100)={&(0x7f00000010c0)={0x1c, r8, 0x400, 0x8000, 0x25dfdbfe, {}, ["", "", "", "", "", "", ""]}, 0x1c}, 0x1, 0x0, 0x0, 0x20048854}, 0x4004) bpf$PROG_LOAD(0x5, &(0x7f0000000e40)={0x5, 0x16, &(0x7f0000001340)=ANY=[@ANYBLOB="390000000100000000000000900000f117fa0000", @ANYRES32=r4, @ANYBLOB="1f00000000000000b703000000000000850000000c000000b61b0453c29f42b5be06c7010b4efffe000000000085000000a900000018150000", @ANYRES32=r3, @ANYBLOB="0000000000000000180100002020782500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b70300000000850000005d000000185500000100000000000000000000009500000000000000"], &(0x7f0000000b80)='syzkaller\x00', 0x1, 0xe8, &(0x7f0000000bc0)=""/232, 0x41000, 0x5b, '\x00', 0x0, 0xe, r5, 0x8, &(0x7f0000000d00)={0x5, 0x2}, 0x8, 0x10, &(0x7f0000000d40)={0x4, 0xe, 0x2, 0x8}, 0x10, r6, r4, 0x5, &(0x7f0000000d80), &(0x7f0000000dc0)=[{0x4, 0x3, 0x0, 0x2}, {0x3, 0x1, 0xa, 0xa}, {0x0, 0x3, 0x2, 0xa}, {0x0, 0x3, 0x7, 0x1}, {0x1, 0x5, 0xb, 0xc}], 0x10, 0x7}, 0x90) [ 104.681363][ T5135] loop4: detected capacity change from 0 to 2048 [ 104.703400][ T4139] EXT4-fs (loop0): unmounting filesystem 00000000-0000-0000-0000-000000000000. [ 104.712521][ T5129] loop1: p2 p3 p7 [ 104.756410][ T5137] loop3: detected capacity change from 0 to 512 [ 104.770016][ T5135] loop4: p2 p3 p7 [ 104.779497][ T2775] loop1: p2 p3 p7 [ 104.789878][ T5137] EXT4-fs (loop3): 1 orphan inode deleted 20:40:53 executing program 4: r0 = open(&(0x7f0000000040)='./bus\x00', 0x8001141042, 0x0) connect$unix(r0, &(0x7f0000000240)=@file={0x0, './bus\x00'}, 0x6e) setuid(0x0) getgid() ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f0000000a80)) getuid() getegid() r1 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x4, &(0x7f00000002c0)=ANY=[@ANYBLOB="18010000000000000000000000000004850000006d00000095"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x80) r2 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000000)='alarmtimer_suspend\x00', r1}, 0x10) r3 = gettid() bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000080)={r3, r2, 0x0, 0x6, &(0x7f0000000040)='kfree\x00'}, 0x13) perf_event_open(&(0x7f0000002740)={0x5, 0x80, 0xfd, 0x3, 0x81, 0xeb, 0x0, 0x9, 0x0, 0x5, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0xfffffff7, 0x2, @perf_config_ext={0x2, 0x401}, 0x1800, 0x3, 0x3, 0x6, 0x80000001, 0x81, 0x20, 0x0, 0x5, 0x0, 0x10000}, r3, 0x9, 0xffffffffffffffff, 0x8) perf_event_open(&(0x7f0000000040)={0x0, 0x80, 0x1, 0x0, 0x1, 0x1f, 0x0, 0x7, 0x0, 0xa, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x8, 0x2, @perf_config_ext={0x100000001, 0x9}, 0x15, 0x72e0, 0xa9, 0x1, 0x0, 0x2, 0x5, 0x0, 0x1000}, r3, 0x7, 0xffffffffffffffff, 0x9) fstat(r0, &(0x7f0000000b00)) r4 = getegid() syz_mount_image$ext4(&(0x7f0000000100)='ext4\x00', &(0x7f0000000200)='./file1\x00', 0x3000000, &(0x7f0000003040)=ANY=[@ANYRES64=r4, @ANYBLOB="8555591a163448f4c52bee6cc0e12a6a8610718f818822e94c360e46f93ac9c63a1b40ea9d758c2b4e2d7c386a141016d11cb13fabc846fc7fb242c175fbdf96e2a96e80e82b73987b1d5dfd843c7e6748a15a0c4160f5e4c468e8f8e417bd3385546159881194fe3a7cf8307cd9c7ce0ca180a481d4dcaa6611ec5c8ff1c546360dea3da9f2bfc1fd71af9ebf2afe4285f013a3929a7096097976a16e2060e5f26e379011ea1811", @ANYRES64, @ANYBLOB="ca42ad87c41bb3b2507e4e12104f0cd507000001046f9445657db4996b10208d04454e11fb5b1383c5ce98e3062f45ec04e5b8b179df3d64a6cec05d29235e3cbe0b339abe9faee5cf3e44c97ce56a1dc359047114eeb3c23f331114039d75a664afc47e8273b79e83d301fc4ceec8b89911505b6743797c459195a7120ded1748f315deb90000ffed00000000000000", @ANYRES8=r4, @ANYRES8=r4, @ANYRES64, @ANYBLOB="bd85893dee1670c8c7e3b4a65ec61f224992fd11263b7749c7ee63dd4fc13cc5dfdde8a3099aaf21ece351c316d9bbd7e4ecc524c856f20d6a1818d6d75f702eb904653f9d55af", @ANYRESOCT], 0x1, 0x513, &(0x7f0000000c40)="$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") [ 104.795774][ T5137] EXT4-fs (loop3): mounted filesystem 00000000-0000-0000-0000-000000000000 r/w without journal. Quota mode: writeback. [ 104.812943][ T1523] Quota error (device loop3): do_check_range: Getting dqdh_entries 15 out of range 0-14 [ 104.858100][ T5141] loop0: detected capacity change from 0 to 512 [ 104.891508][ T5137] ext4 filesystem being mounted at /root/syzkaller-testdir749715024/syzkaller.AedAWc/90/file1 supports timestamps until 2038-01-19 (0x7fffffff) [ 104.960580][ T5141] EXT4-fs (loop0): 1 orphan inode deleted [ 104.960898][ T5145] loop1: detected capacity change from 0 to 2048 [ 104.970940][ T5141] EXT4-fs (loop0): mounted filesystem 00000000-0000-0000-0000-000000000000 r/w without journal. Quota mode: writeback. [ 104.993524][ T5143] loop4: detected capacity change from 0 to 512 [ 105.000388][ T1523] Quota error (device loop0): do_check_range: Getting dqdh_entries 15 out of range 0-14 [ 105.038501][ T5143] EXT4-fs (loop4): 1 orphan inode deleted [ 105.044551][ T5143] EXT4-fs (loop4): mounted filesystem 00000000-0000-0000-0000-000000000000 r/w without journal. Quota mode: writeback. [ 105.057817][ T3701] Quota error (device loop4): do_check_range: Getting dqdh_entries 15 out of range 0-14 [ 105.098831][ T5145] loop1: p2 p3 p7 [ 105.103499][ T5141] ext4 filesystem being mounted at /root/syzkaller-testdir338643557/syzkaller.M396af/54/file1 supports timestamps until 2038-01-19 (0x7fffffff) 20:40:53 executing program 3: r0 = open(&(0x7f0000000040)='./bus\x00', 0x8001141042, 0x0) connect$unix(r0, &(0x7f0000000240)=@file={0x0, './bus\x00'}, 0x6e) setuid(0x0) getgid() ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f0000000a80)) getuid() getegid() r1 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x4, &(0x7f00000002c0)=ANY=[@ANYBLOB="18010000000000000000000000000004850000006d00000095"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000000)='alarmtimer_suspend\x00', r1}, 0x10) r2 = gettid() perf_event_open(&(0x7f0000002740)={0x5, 0x80, 0xfd, 0x3, 0x81, 0xeb, 0x0, 0x9, 0x0, 0x5, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0xfffffff7, 0x2, @perf_config_ext={0x2, 0x401}, 0x1800, 0x3, 0x3, 0x6, 0x80000001, 0x81, 0x20, 0x0, 0x5, 0x0, 0x10000}, r2, 0x9, 0xffffffffffffffff, 0x8) perf_event_open(&(0x7f0000000040)={0x0, 0x80, 0x1, 0x0, 0x1, 0x1f, 0x0, 0x7, 0x0, 0xa, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x8, 0x2, @perf_config_ext={0x100000001, 0x9}, 0x15, 0x72e0, 0xa9, 0x1, 0x0, 0x2, 0x5, 0x0, 0x1000}, r2, 0x7, 0xffffffffffffffff, 0x9) fstat(r0, &(0x7f0000000b00)) r3 = getegid() syz_mount_image$ext4(&(0x7f0000000100)='ext4\x00', &(0x7f0000000200)='./file1\x00', 0x3000000, &(0x7f0000003040)=ANY=[@ANYRES64=r3, @ANYBLOB="8555591a163448f4c52bee6cc0e12a6a8610718f818822e94c360e46f93ac9c63a1b40ea9d758c2b4e2d7c386a141016d11cb13fabc846fc7fb242c175fbdf96e2a96e80e82b73987b1d5dfd843c7e6748a15a0c4160f5e4c468e8f8e417bd3385546159881194fe3a7cf8307cd9c7ce0ca180a481d4dcaa6611ec5c8ff1c546360dea3da9f2bfc1fd71af9ebf2afe4285f013a3929a7096097976a16e2060e5f26e379011ea1811", @ANYRES64, @ANYBLOB="ca42ad87c41bb3b2507e4e12104f0cd507000001046f9445657db4996b10208d04454e11fb5b1383c5ce98e3062f45ec04e5b8b179df3d64a6cec05d29235e3cbe0b339abe9faee5cf3e44c97ce56a1dc359047114eeb3c23f331114039d75a664afc47e8273b79e83d301fc4ceec8b89911505b6743797c459195a7120ded1748f315deb90000ffed00000000000000", @ANYRES8=r3, @ANYRES8=r3, @ANYRES64, @ANYBLOB="bd85893dee1670c8c7e3b4a65ec61f224992fd11263b7749c7ee63dd4fc13cc5dfdde8a3099aaf21ece351c316d9bbd7e4ecc524c856f20d6a1818d6d75f702eb904653f9d55af", @ANYRESOCT], 0x1, 0x513, &(0x7f0000000c40)="$eJzs3W9rJHcdAPDvTLJp7i41WxU5C7bFVu6K3m7S2DaKtBVEHxXU+jzGZBNCNtmQ3dRLKJriCxBEVPAF+ETwBQjSlyDCgT4XFUX0Th/qjczuRPNnN1mSTfbcfD4w2d9v/n2/vyE7O39+zARwbb0QEW9FxFhEvBwR08X4tBgW8sp+Z75HD99byocksuydvyWRFOMO1pXXxyPiVmeRmIyIr38l4lvJybjN3b31xXq9tl3Uq62NrWpzd+/e2sbiam21tjk3N/va/Ovzr87PZIULtbMcEW986U8/+v7PvvzGrz7z7d8v/OXud/K0vvCxTt4RsXShAD101l1qb4sD+TbavoxgQ5K3pzQ27CwAAOhHfoz/4Yj4ZPv4fzrG2kdzAAAAwCjJ3pyKfyURGQAAADCy0oiYiiStFH0BpiJNK5VOH96Pxs203mi2Pr3S2NlczqdFlKOUrqzVazNFX+FylJK8Plv0sT2ov3KsPhcRz0TED6dvtOuVpUZ9edgXPwAAAOCauPX80fP/f06n7TIAAAAwYso9KwAAAMCocMoPAAAAo8/5PwAAAIy0r779dj5kB+/xXn53d2e98e695VpzvbKxs1RZamxvVVYbjdX2M/s2zlpfvdHY+mxs7tyvtmrNVrW5u7ew0djZbC2sHXkFNgAAAHCFnnn+g98lEbH/+RvtIYrnAAIc8cdhJwAM0tiwEwCGZnzYCQBDUzpzDnsIGHXJGdNPdt7pXCuMX19OPgAAwODd+fjJ+/8TxbSzrw0A/8/09QGA68fdPbi+SuftAXh70JkAw/KhzsdTvab3fHhHH/f/O9cYsuxciQEAAAMz1R6StFIcp09FmlYqEU+3XwtQSlbW6rWZ4vzgt9Olp/L6bHvJ5Mw+wwAAAAAAAAAAAAAAAAAAAAAAAABAR5YlkQEAAAAjLSL9c9J+mn/EnemXpo5eHTj21q+fvvPj+4ut1vZsxETy9+l81EREtH5SjH8l80oAAAAAeAJ0ztOLz9lhZwMAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAADAqHn08L2lg+Eq4/71ixFR7hZ/PCbbn5NRioib/0hi/NBySUSMDSD+/vsRcbtb/CQeZ1lWLrLoFv/GJccvtzdN9/hpRNwaQHy4zj7I9z9vdfv+pfFC+7P792+8GC6q9/4v/e/+b6zH/ufpY/Venn3wi2rP+O9HPDveff9zED/pxD8SIq+82Gcbv/mNvb2uEw6tslv8w7GqrY2tanN3797axuJqbbW2OTc3+9r86/Ovzs9UV9bqteJv1zA/+MQvH5/W/ps94pePtv/E9n+pr9Zn8e8H9x9+pFMpdYt/98Xuv7+3e8RPi9++TxXlfPqdg/J+p3zYcz//zXOntX+5R/snz2j/3b7aH597+Wvf+0PXKSe2BgBwFZq7e+uL9Xpt+5TCZB/zXHHhzScjjQEW4slIY1iF7Lud/8eLreeCi58oZBdZfDwGkMbEie/pWJx3hUnEfr6uPv8hAQCAEfO/g/7T7iABAAAAAAAAAAAAAAAAAAAAl+mcjyWbjIi+Zz4ec384TQUAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAONV/AgAA//8FStFZ") 20:40:53 executing program 1: ioctl$BTRFS_IOC_LOGICAL_INO(0xffffffffffffffff, 0xc0389424, &(0x7f0000000180)={0x1, 0x28, '\x00', 0x1, &(0x7f0000000080)=[0x0, 0x0, 0x0, 0x0, 0x0]}) r0 = socket$inet6(0xa, 0x3, 0x6) r1 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) r2 = dup2(r1, r0) ioctl$FIDEDUPERANGE(r0, 0xc0189436, &(0x7f0000000f00)=ANY=[@ANYBLOB="08000000000000000000000000000000000000002000000032057e68d5d647f4ed243c9d097db4c7bae602f8d4c84b5325f3d737af1c3ebe2901b056ac84d04eb9d8bfd4771499d444ff07000033206062c9a0527d2d0e4b0000fa0693ec3785977184911bffc60554e8950e91e1a8209818b4eb3440ae351192e1d7cf54ba6743f2db330481aac17f0961506d7ebd7ca999cf4e148c1ef2880f63693dfee2a6f2fafec2c059fd15db654600000000000000000076da8ec51705470a42729df6a32122af2a673d7409ca1b8a0da065e2bf7790c86a6b3014e1ef5d1c4000d3dff081d5a4c403971fe8869ab4973ffc7b24b6fbb4341ac1a0f5d56b64b9d23d6855e653f1e0418a6d9838196a7b145310a9b4c467199ecc3bd47b85aae47754bf695bdb85ea03f70beab5732a014c5f525bf2f9b9c6bd545e1a"]) ioctl$TIOCSBRK(r2, 0x5427) recvfrom$inet6(0xffffffffffffffff, &(0x7f0000000280)=""/134, 0x86, 0x40000102, &(0x7f0000000340)={0xa, 0x4e21, 0x77f, @mcast1, 0x403b3f}, 0x1c) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000001040)={{r2, 0xffffffffffffffff}, &(0x7f0000000140), &(0x7f0000000480)=r1}, 0x20) syz_read_part_table(0x593, &(0x7f00000005c0)="$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") stat(&(0x7f0000000040)='./file1\x00', &(0x7f0000000380)) fsetxattr$security_capability(0xffffffffffffffff, &(0x7f0000000100), &(0x7f0000000000)=@v1={0x1000000, [{0x80000000, 0x81}]}, 0xc, 0x0) newfstatat(0xffffffffffffff9c, &(0x7f00000000c0)='./file1\x00', &(0x7f0000001400), 0x400) close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x2) ioctl$TIOCSTI(0xffffffffffffffff, 0x5412, &(0x7f00000004c0)=0x40) fsync(0xffffffffffffffff) write$binfmt_misc(0xffffffffffffffff, &(0x7f0000001080)=ANY=[@ANYBLOB="7379d3c6"], 0x4) fallocate(0xffffffffffffffff, 0x100000011, 0x0, 0x2811fdff) open(&(0x7f0000000100)='.\x00', 0x20c2, 0x2d) open$dir(&(0x7f0000000500)='./file1\x00', 0x1c6c0, 0x0) r4 = openat$vcsu(0xffffffffffffff9c, &(0x7f0000000cc0), 0x400c00, 0x0) lsetxattr$security_selinux(&(0x7f0000001180)='./file1\x00', &(0x7f00000011c0), &(0x7f0000001300)='system_u:object_r:unconfined_exec_t:s0\x00', 0x27, 0x3) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000400)={0xffffffffffffffff, 0xe0, &(0x7f0000000300)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, &(0x7f00000000c0)=[0x0], &(0x7f0000000140), 0x0, 0x8, &(0x7f0000000200)=[{}, {}, {}, {}, {}], 0x28, 0x0, 0x0, 0x0, 0x0, 0x10, 0x8, 0x8, &(0x7f00000002c0)}}, 0x10) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000e80)=@bpf_lsm={0x1d, 0x4, &(0x7f0000000040)=@framed={{0x18, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x73fc}, [@generic={0x9, 0x8, 0x0, 0x7f, 0x200}]}, &(0x7f0000000880)='GPL\x00', 0x1f, 0x93, &(0x7f0000000cc0)=""/147, 0x40f00, 0x2, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, &(0x7f0000000b80)={0x9}, 0x8, 0x10, 0x0, 0x0, r5}, 0x80) r6 = socket$nl_generic(0x10, 0x3, 0x10) r7 = syz_genetlink_get_family_id$tipc(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$TIPC_CMD_ENABLE_BEARER(r6, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000001200)=ANY=[@ANYBLOB="3400000006c08fada241ee0a049e6fba3f36f40da839bbdf54c31768b0026f4261f56d51c5d81ba4cb99f8203c40d0a142fcd75ce26e408d229139f8c4e81109c56a18e453e8a537df21c4ec04a4f3e22f4ac125a28ad43e41107b1f7e79c8573985e54fd665e2913ca74da8c9f3fc2839258c19fa7ac20ebead31206cf280ea73f635bc5418b66554392dfd11874fef72bc53538aae3cb5ef8a80140f4737dd2c572a03ee1d5e3d627e", @ANYRESOCT=0x0, @ANYBLOB="010000000000000000000100000000000000014100000018001700000000000000007564503a73"], 0x34}, 0x1, 0x0, 0x0, 0x1}, 0x0) ioctl$AUTOFS_DEV_IOCTL_PROTOSUBVER(r1, 0xc0189373, &(0x7f0000000540)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x6}}, './file0\x00'}) sendmsg$TIPC_CMD_GET_MAX_PORTS(r4, &(0x7f0000001140)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x40000}, 0xc, &(0x7f0000001100)={&(0x7f00000010c0)={0x1c, r7, 0x400, 0x8000, 0x25dfdbfe, {}, ["", "", "", "", "", "", ""]}, 0x1c}, 0x1, 0x0, 0x0, 0x20048854}, 0x4004) bpf$PROG_LOAD(0x5, &(0x7f0000000e40)={0x5, 0x16, &(0x7f0000001340)=ANY=[@ANYBLOB="390000000100000000000000900000f117fa0000", @ANYRES32, @ANYBLOB="1f00000000000000b703000000000000850000000c000000b61b0453c29f42b5be06c7010b4efffe000000000085000000a900000018150000", @ANYRES32=r3, @ANYBLOB="0000000000000000180100002020782500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b70300000000850000005d000000185500000100000000000000000000009500000000000000"], &(0x7f0000000b80)='syzkaller\x00', 0x1, 0xe8, &(0x7f0000000bc0)=""/232, 0x41000, 0x5b, '\x00', 0x0, 0xe, r4, 0x8, &(0x7f0000000d00)={0x5, 0x2}, 0x8, 0x10, &(0x7f0000000d40)={0x4, 0xe, 0x2, 0x8}, 0x10, r5, 0xffffffffffffffff, 0x5, &(0x7f0000000d80), &(0x7f0000000dc0)=[{0x4, 0x3, 0x0, 0x2}, {0x3, 0x1, 0xa, 0xa}, {0x0, 0x3, 0x2, 0xa}, {0x0, 0x3, 0x7, 0x1}, {0x1, 0x5, 0xb, 0xc}], 0x10, 0x7}, 0x90) [ 105.166516][ T3097] EXT4-fs (loop3): unmounting filesystem 00000000-0000-0000-0000-000000000000. [ 105.188187][ T5143] ext4 filesystem being mounted at /root/syzkaller-testdir977475924/syzkaller.rrpyUU/107/file1 supports timestamps until 2038-01-19 (0x7fffffff) 20:40:53 executing program 0: r0 = open(&(0x7f0000000040)='./bus\x00', 0x8001141042, 0x0) connect$unix(r0, &(0x7f0000000240)=@file={0x0, './bus\x00'}, 0x6e) setuid(0x0) getgid() ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f0000000a80)) getuid() getegid() r1 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x4, &(0x7f00000002c0)=ANY=[@ANYBLOB="18010000000000000000000000000004850000006d00000095"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x80) r2 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000000)='alarmtimer_suspend\x00', r1}, 0x10) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000080)={0x0, r2, 0x0, 0x6, &(0x7f0000000040)='kfree\x00'}, 0x13) perf_event_open(&(0x7f0000002740)={0x5, 0x80, 0xfd, 0x3, 0x81, 0xeb, 0x0, 0x9, 0x0, 0x5, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0xfffffff7, 0x2, @perf_config_ext={0x2, 0x401}, 0x1800, 0x3, 0x3, 0x6, 0x80000001, 0x81, 0x20, 0x0, 0x5, 0x0, 0x10000}, 0x0, 0x9, 0xffffffffffffffff, 0x8) perf_event_open(&(0x7f0000000040)={0x0, 0x80, 0x1, 0x0, 0x1, 0x1f, 0x0, 0x7, 0x0, 0xa, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x8, 0x2, @perf_config_ext={0x100000001, 0x9}, 0x15, 0x72e0, 0xa9, 0x1, 0x0, 0x2, 0x5, 0x0, 0x1000}, 0x0, 0x7, 0xffffffffffffffff, 0x9) fstat(r0, &(0x7f0000000b00)) r3 = getegid() syz_mount_image$ext4(&(0x7f0000000100)='ext4\x00', &(0x7f0000000200)='./file1\x00', 0x3000000, &(0x7f0000003040)=ANY=[@ANYRES64=r3, @ANYBLOB="8555591a163448f4c52bee6cc0e12a6a8610718f818822e94c360e46f93ac9c63a1b40ea9d758c2b4e2d7c386a141016d11cb13fabc846fc7fb242c175fbdf96e2a96e80e82b73987b1d5dfd843c7e6748a15a0c4160f5e4c468e8f8e417bd3385546159881194fe3a7cf8307cd9c7ce0ca180a481d4dcaa6611ec5c8ff1c546360dea3da9f2bfc1fd71af9ebf2afe4285f013a3929a7096097976a16e2060e5f26e379011ea1811", @ANYRES64, @ANYBLOB="ca42ad87c41bb3b2507e4e12104f0cd507000001046f9445657db4996b10208d04454e11fb5b1383c5ce98e3062f45ec04e5b8b179df3d64a6cec05d29235e3cbe0b339abe9faee5cf3e44c97ce56a1dc359047114eeb3c23f331114039d75a664afc47e8273b79e83d301fc4ceec8b89911505b6743797c459195a7120ded1748f315deb90000ffed00000000000000", @ANYRES8=r3, @ANYRES8=r3, @ANYRES64, @ANYBLOB="bd85893dee1670c8c7e3b4a65ec61f224992fd11263b7749c7ee63dd4fc13cc5dfdde8a3099aaf21ece351c316d9bbd7e4ecc524c856f20d6a1818d6d75f702eb904653f9d55af", @ANYRESOCT], 0x1, 0x513, &(0x7f0000000c40)="$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") [ 105.213952][ T2775] loop1: p2 p3 p7 20:40:53 executing program 4: ioctl$BTRFS_IOC_LOGICAL_INO(0xffffffffffffffff, 0xc0389424, &(0x7f0000000180)={0x1, 0x28, '\x00', 0x1, &(0x7f0000000080)=[0x0, 0x0, 0x0, 0x0, 0x0]}) r0 = socket$inet6(0xa, 0x3, 0x6) r1 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) r2 = dup2(r1, r0) ioctl$FIDEDUPERANGE(r0, 0xc0189436, &(0x7f0000000f00)=ANY=[@ANYBLOB="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"]) ioctl$TIOCSBRK(r2, 0x5427) recvfrom$inet6(0xffffffffffffffff, &(0x7f0000000280)=""/134, 0x86, 0x40000102, &(0x7f0000000340)={0xa, 0x4e21, 0x77f, @mcast1, 0x403b3f}, 0x1c) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000001040)={{r2, 0xffffffffffffffff}, &(0x7f0000000140), &(0x7f0000000480)=r1}, 0x20) syz_read_part_table(0x593, &(0x7f00000005c0)="$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") r4 = creat(&(0x7f0000000240)='./file0\x00', 0x0) fsetxattr$security_capability(r4, &(0x7f0000000100), &(0x7f0000000000)=@v1={0x1000000, [{0x80000000, 0x81}]}, 0xc, 0x0) newfstatat(0xffffffffffffff9c, &(0x7f00000000c0)='./file1\x00', &(0x7f0000001400), 0x400) close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x2) ioctl$TIOCSTI(r4, 0x5412, &(0x7f00000004c0)=0x40) fsync(0xffffffffffffffff) write$binfmt_misc(r4, &(0x7f0000001080)=ANY=[@ANYBLOB="7379d3c6"], 0x4) fallocate(r4, 0x100000011, 0x0, 0x2811fdff) open(&(0x7f0000000100)='.\x00', 0x20c2, 0x2d) open$dir(&(0x7f0000000500)='./file1\x00', 0x1c6c0, 0x0) r5 = openat$vcsu(0xffffffffffffff9c, &(0x7f0000000cc0), 0x400c00, 0x0) lsetxattr$security_selinux(&(0x7f0000001180)='./file1\x00', &(0x7f00000011c0), &(0x7f0000001300)='system_u:object_r:unconfined_exec_t:s0\x00', 0x27, 0x3) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000400)={0xffffffffffffffff, 0xe0, &(0x7f0000000300)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, &(0x7f00000000c0)=[0x0], &(0x7f0000000140), 0x0, 0x8, &(0x7f0000000200)=[{}, {}, {}, {}, {}], 0x28, 0x0, 0x0, 0x0, 0x0, 0x10, 0x8, 0x8, &(0x7f00000002c0)}}, 0x10) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000e80)=@bpf_lsm={0x1d, 0x4, &(0x7f0000000040)=@framed={{0x18, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x73fc}, [@generic={0x9, 0x8, 0x0, 0x7f, 0x200}]}, &(0x7f0000000880)='GPL\x00', 0x1f, 0x93, &(0x7f0000000cc0)=""/147, 0x40f00, 0x2, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, &(0x7f0000000b80)={0x9}, 0x8, 0x10, 0x0, 0x0, r6}, 0x80) r7 = socket$nl_generic(0x10, 0x3, 0x10) r8 = syz_genetlink_get_family_id$tipc(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$TIPC_CMD_ENABLE_BEARER(r7, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000001200)=ANY=[@ANYBLOB="3400000006c08fada241ee0a049e6fba3f36f40da839bbdf54c31768b0026f4261f56d51c5d81ba4cb99f8203c40d0a142fcd75ce26e408d229139f8c4e81109c56a18e453e8a537df21c4ec04a4f3e22f4ac125a28ad43e41107b1f7e79c8573985e54fd665e2913ca74da8c9f3fc2839258c19fa7ac20ebead31206cf280ea73f635bc5418b66554392dfd11874fef72bc53538aae3cb5ef8a80140f4737dd2c572a03ee1d5e3d627e", @ANYRESOCT=0x0, @ANYBLOB="010000000000000000000100000000000000014100000018001700000000000000007564503a73"], 0x34}, 0x1, 0x0, 0x0, 0x1}, 0x0) ioctl$AUTOFS_DEV_IOCTL_PROTOSUBVER(r1, 0xc0189373, &(0x7f0000000540)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x6}}, './file0\x00'}) sendmsg$TIPC_CMD_GET_MAX_PORTS(r5, &(0x7f0000001140)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x40000}, 0xc, &(0x7f0000001100)={&(0x7f00000010c0)={0x1c, r8, 0x400, 0x8000, 0x25dfdbfe, {}, ["", "", "", "", "", "", ""]}, 0x1c}, 0x1, 0x0, 0x0, 0x20048854}, 0x4004) bpf$PROG_LOAD(0x5, &(0x7f0000000e40)={0x5, 0x16, &(0x7f0000001340)=ANY=[@ANYBLOB="390000000100000000000000900000f117fa0000", @ANYRES32=r4, @ANYBLOB="1f00000000000000b703000000000000850000000c000000b61b0453c29f42b5be06c7010b4efffe000000000085000000a900000018150000", @ANYRES32=r3, @ANYBLOB="0000000000000000180100002020782500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b70300000000850000005d000000185500000100000000000000000000009500000000000000"], &(0x7f0000000b80)='syzkaller\x00', 0x1, 0xe8, &(0x7f0000000bc0)=""/232, 0x41000, 0x5b, '\x00', 0x0, 0xe, r5, 0x8, &(0x7f0000000d00)={0x5, 0x2}, 0x8, 0x10, &(0x7f0000000d40)={0x4, 0xe, 0x2, 0x8}, 0x10, r6, r4, 0x5, &(0x7f0000000d80), &(0x7f0000000dc0)=[{0x4, 0x3, 0x0, 0x2}, {0x3, 0x1, 0xa, 0xa}, {0x0, 0x3, 0x2, 0xa}, {0x0, 0x3, 0x7, 0x1}, {0x1, 0x5, 0xb, 0xc}], 0x10, 0x7}, 0x90) [ 105.260156][ T4139] EXT4-fs (loop0): unmounting filesystem 00000000-0000-0000-0000-000000000000. [ 105.290631][ T5160] loop3: detected capacity change from 0 to 512 [ 105.312283][ T3090] EXT4-fs (loop4): unmounting filesystem 00000000-0000-0000-0000-000000000000. [ 105.346324][ T4953] netdevsim netdevsim2 netdevsim0: renamed from eth0 [ 105.373541][ T5165] loop1: detected capacity change from 0 to 2048 [ 105.392803][ T5160] EXT4-fs (loop3): 1 orphan inode deleted [ 105.398651][ T5160] EXT4-fs (loop3): mounted filesystem 00000000-0000-0000-0000-000000000000 r/w without journal. Quota mode: writeback. [ 105.417040][ T4953] netdevsim netdevsim2 netdevsim1: renamed from eth1 [ 105.432162][ T4953] netdevsim netdevsim2 netdevsim2: renamed from eth2 [ 105.458276][ T5172] loop0: detected capacity change from 0 to 512 [ 105.466815][ T5160] ext4 filesystem being mounted at /root/syzkaller-testdir749715024/syzkaller.AedAWc/91/file1 supports timestamps until 2038-01-19 (0x7fffffff) [ 105.476787][ T4953] netdevsim netdevsim2 netdevsim3: renamed from eth3 [ 105.516565][ T5165] loop1: p2 p3 p7 [ 105.523698][ T5172] EXT4-fs (loop0): 1 orphan inode deleted [ 105.529893][ T5172] EXT4-fs (loop0): mounted filesystem 00000000-0000-0000-0000-000000000000 r/w without journal. Quota mode: writeback. [ 105.552901][ T4953] 8021q: adding VLAN 0 to HW filter on device bond0 [ 105.558361][ T5175] loop4: detected capacity change from 0 to 2048 [ 105.568197][ T4953] 8021q: adding VLAN 0 to HW filter on device team0 [ 105.587801][ T906] bridge0: port 1(bridge_slave_0) entered blocking state [ 105.594900][ T906] bridge0: port 1(bridge_slave_0) entered forwarding state [ 105.605987][ T906] bridge0: port 2(bridge_slave_1) entered blocking state [ 105.613142][ T906] bridge0: port 2(bridge_slave_1) entered forwarding state 20:40:54 executing program 1: ioctl$BTRFS_IOC_LOGICAL_INO(0xffffffffffffffff, 0xc0389424, &(0x7f0000000180)={0x1, 0x28, '\x00', 0x1, &(0x7f0000000080)=[0x0, 0x0, 0x0, 0x0, 0x0]}) r0 = socket$inet6(0xa, 0x3, 0x6) r1 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) r2 = dup2(r1, r0) ioctl$FIDEDUPERANGE(r0, 0xc0189436, &(0x7f0000000f00)=ANY=[@ANYBLOB="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"]) ioctl$TIOCSBRK(r2, 0x5427) recvfrom$inet6(0xffffffffffffffff, &(0x7f0000000280)=""/134, 0x86, 0x40000102, &(0x7f0000000340)={0xa, 0x4e21, 0x77f, @mcast1, 0x403b3f}, 0x1c) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000001040)={{r2, 0xffffffffffffffff}, &(0x7f0000000140), &(0x7f0000000480)=r1}, 0x20) syz_read_part_table(0x593, &(0x7f00000005c0)="$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") stat(&(0x7f0000000040)='./file1\x00', &(0x7f0000000380)) fsetxattr$security_capability(0xffffffffffffffff, &(0x7f0000000100), &(0x7f0000000000)=@v1={0x1000000, [{0x80000000, 0x81}]}, 0xc, 0x0) newfstatat(0xffffffffffffff9c, &(0x7f00000000c0)='./file1\x00', &(0x7f0000001400), 0x400) close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x2) ioctl$TIOCSTI(0xffffffffffffffff, 0x5412, &(0x7f00000004c0)=0x40) fsync(0xffffffffffffffff) write$binfmt_misc(0xffffffffffffffff, &(0x7f0000001080)=ANY=[@ANYBLOB="7379d3c6"], 0x4) fallocate(0xffffffffffffffff, 0x100000011, 0x0, 0x2811fdff) open(&(0x7f0000000100)='.\x00', 0x20c2, 0x2d) open$dir(&(0x7f0000000500)='./file1\x00', 0x1c6c0, 0x0) r4 = openat$vcsu(0xffffffffffffff9c, &(0x7f0000000cc0), 0x400c00, 0x0) lsetxattr$security_selinux(&(0x7f0000001180)='./file1\x00', &(0x7f00000011c0), &(0x7f0000001300)='system_u:object_r:unconfined_exec_t:s0\x00', 0x27, 0x3) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000400)={0xffffffffffffffff, 0xe0, &(0x7f0000000300)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, &(0x7f00000000c0)=[0x0], &(0x7f0000000140), 0x0, 0x8, &(0x7f0000000200)=[{}, {}, {}, {}, {}], 0x28, 0x0, 0x0, 0x0, 0x0, 0x10, 0x8, 0x8, &(0x7f00000002c0)}}, 0x10) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000e80)=@bpf_lsm={0x1d, 0x4, &(0x7f0000000040)=@framed={{0x18, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x73fc}, [@generic={0x9, 0x8, 0x0, 0x7f, 0x200}]}, &(0x7f0000000880)='GPL\x00', 0x1f, 0x93, &(0x7f0000000cc0)=""/147, 0x40f00, 0x2, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, &(0x7f0000000b80)={0x9}, 0x8, 0x10, 0x0, 0x0, r5}, 0x80) r6 = socket$nl_generic(0x10, 0x3, 0x10) r7 = syz_genetlink_get_family_id$tipc(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$TIPC_CMD_ENABLE_BEARER(r6, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000001200)=ANY=[@ANYBLOB="3400000006c08fada241ee0a049e6fba3f36f40da839bbdf54c31768b0026f4261f56d51c5d81ba4cb99f8203c40d0a142fcd75ce26e408d229139f8c4e81109c56a18e453e8a537df21c4ec04a4f3e22f4ac125a28ad43e41107b1f7e79c8573985e54fd665e2913ca74da8c9f3fc2839258c19fa7ac20ebead31206cf280ea73f635bc5418b66554392dfd11874fef72bc53538aae3cb5ef8a80140f4737dd2c572a03ee1d5e3d627e", @ANYRESOCT=0x0, @ANYBLOB="010000000000000000000100000000000000014100000018001700000000000000007564503a73"], 0x34}, 0x1, 0x0, 0x0, 0x1}, 0x0) ioctl$AUTOFS_DEV_IOCTL_PROTOSUBVER(r1, 0xc0189373, &(0x7f0000000540)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x6}}, './file0\x00'}) sendmsg$TIPC_CMD_GET_MAX_PORTS(r4, &(0x7f0000001140)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x40000}, 0xc, &(0x7f0000001100)={&(0x7f00000010c0)={0x1c, r7, 0x400, 0x8000, 0x25dfdbfe, {}, ["", "", "", "", "", "", ""]}, 0x1c}, 0x1, 0x0, 0x0, 0x20048854}, 0x4004) bpf$PROG_LOAD(0x5, &(0x7f0000000e40)={0x5, 0x16, &(0x7f0000001340)=ANY=[@ANYBLOB="390000000100000000000000900000f117fa0000", @ANYRES32, @ANYBLOB="1f00000000000000b703000000000000850000000c000000b61b0453c29f42b5be06c7010b4efffe000000000085000000a900000018150000", @ANYRES32=r3, @ANYBLOB="0000000000000000180100002020782500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b70300000000850000005d000000185500000100000000000000000000009500000000000000"], &(0x7f0000000b80)='syzkaller\x00', 0x1, 0xe8, &(0x7f0000000bc0)=""/232, 0x41000, 0x5b, '\x00', 0x0, 0xe, r4, 0x8, &(0x7f0000000d00)={0x5, 0x2}, 0x8, 0x10, &(0x7f0000000d40)={0x4, 0xe, 0x2, 0x8}, 0x10, r5, 0xffffffffffffffff, 0x5, &(0x7f0000000d80), &(0x7f0000000dc0)=[{0x4, 0x3, 0x0, 0x2}, {0x3, 0x1, 0xa, 0xa}, {0x0, 0x3, 0x2, 0xa}, {0x0, 0x3, 0x7, 0x1}, {0x1, 0x5, 0xb, 0xc}], 0x10, 0x7}, 0x90) 20:40:54 executing program 0: r0 = open(&(0x7f0000000040)='./bus\x00', 0x8001141042, 0x0) connect$unix(r0, &(0x7f0000000240)=@file={0x0, './bus\x00'}, 0x6e) setuid(0x0) getgid() ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f0000000a80)) getuid() getegid() bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x4, &(0x7f00000002c0)=ANY=[@ANYBLOB="18010000000000000000000000000004850000006d00000095"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x80) r1 = gettid() bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000080)={r1, 0xffffffffffffffff, 0x0, 0x6, &(0x7f0000000040)='kfree\x00'}, 0x13) perf_event_open(&(0x7f0000002740)={0x5, 0x80, 0xfd, 0x3, 0x81, 0xeb, 0x0, 0x9, 0x0, 0x5, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0xfffffff7, 0x2, @perf_config_ext={0x2, 0x401}, 0x1800, 0x3, 0x3, 0x6, 0x80000001, 0x81, 0x20, 0x0, 0x5, 0x0, 0x10000}, r1, 0x9, 0xffffffffffffffff, 0x8) perf_event_open(&(0x7f0000000040)={0x0, 0x80, 0x1, 0x0, 0x1, 0x1f, 0x0, 0x7, 0x0, 0xa, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x8, 0x2, @perf_config_ext={0x100000001, 0x9}, 0x15, 0x72e0, 0xa9, 0x1, 0x0, 0x2, 0x5, 0x0, 0x1000}, r1, 0x7, 0xffffffffffffffff, 0x9) fstat(r0, &(0x7f0000000b00)) r2 = getegid() syz_mount_image$ext4(&(0x7f0000000100)='ext4\x00', &(0x7f0000000200)='./file1\x00', 0x3000000, &(0x7f0000003040)=ANY=[@ANYRES64=r2, @ANYBLOB="8555591a163448f4c52bee6cc0e12a6a8610718f818822e94c360e46f93ac9c63a1b40ea9d758c2b4e2d7c386a141016d11cb13fabc846fc7fb242c175fbdf96e2a96e80e82b73987b1d5dfd843c7e6748a15a0c4160f5e4c468e8f8e417bd3385546159881194fe3a7cf8307cd9c7ce0ca180a481d4dcaa6611ec5c8ff1c546360dea3da9f2bfc1fd71af9ebf2afe4285f013a3929a7096097976a16e2060e5f26e379011ea1811", @ANYRES64, @ANYBLOB="ca42ad87c41bb3b2507e4e12104f0cd507000001046f9445657db4996b10208d04454e11fb5b1383c5ce98e3062f45ec04e5b8b179df3d64a6cec05d29235e3cbe0b339abe9faee5cf3e44c97ce56a1dc359047114eeb3c23f331114039d75a664afc47e8273b79e83d301fc4ceec8b89911505b6743797c459195a7120ded1748f315deb90000ffed00000000000000", @ANYRES8=r2, @ANYRES8=r2, @ANYRES64, @ANYBLOB="bd85893dee1670c8c7e3b4a65ec61f224992fd11263b7749c7ee63dd4fc13cc5dfdde8a3099aaf21ece351c316d9bbd7e4ecc524c856f20d6a1818d6d75f702eb904653f9d55af", @ANYRESOCT], 0x1, 0x513, &(0x7f0000000c40)="$eJzs3W9rJHcdAPDvTLJp7i41WxU5C7bFVu6K3m7S2DaKtBVEHxXU+jzGZBNCNtmQ3dRLKJriCxBEVPAF+ETwBQjSlyDCgT4XFUX0Th/qjczuRPNnN1mSTfbcfD4w2d9v/n2/vyE7O39+zARwbb0QEW9FxFhEvBwR08X4tBgW8sp+Z75HD99byocksuydvyWRFOMO1pXXxyPiVmeRmIyIr38l4lvJybjN3b31xXq9tl3Uq62NrWpzd+/e2sbiam21tjk3N/va/Ovzr87PZIULtbMcEW986U8/+v7PvvzGrz7z7d8v/OXud/K0vvCxTt4RsXShAD101l1qb4sD+TbavoxgQ5K3pzQ27CwAAOhHfoz/4Yj4ZPv4fzrG2kdzAAAAwCjJ3pyKfyURGQAAADCy0oiYiiStFH0BpiJNK5VOH96Pxs203mi2Pr3S2NlczqdFlKOUrqzVazNFX+FylJK8Plv0sT2ov3KsPhcRz0TED6dvtOuVpUZ9edgXPwAAAOCauPX80fP/f06n7TIAAAAwYso9KwAAAMCocMoPAAAAo8/5PwAAAIy0r779dj5kB+/xXn53d2e98e695VpzvbKxs1RZamxvVVYbjdX2M/s2zlpfvdHY+mxs7tyvtmrNVrW5u7ew0djZbC2sHXkFNgAAAHCFnnn+g98lEbH/+RvtIYrnAAIc8cdhJwAM0tiwEwCGZnzYCQBDUzpzDnsIGHXJGdNPdt7pXCuMX19OPgAAwODd+fjJ+/8TxbSzrw0A/8/09QGA68fdPbi+SuftAXh70JkAw/KhzsdTvab3fHhHH/f/O9cYsuxciQEAAAMz1R6StFIcp09FmlYqEU+3XwtQSlbW6rWZ4vzgt9Olp/L6bHvJ5Mw+wwAAAAAAAAAAAAAAAAAAAAAAAABAR5YlkQEAAAAjLSL9c9J+mn/EnemXpo5eHTj21q+fvvPj+4ut1vZsxETy9+l81EREtH5SjH8l80oAAAAAeAJ0ztOLz9lhZwMAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAADAqHn08L2lg+Eq4/71ixFR7hZ/PCbbn5NRioib/0hi/NBySUSMDSD+/vsRcbtb/CQeZ1lWLrLoFv/GJccvtzdN9/hpRNwaQHy4zj7I9z9vdfv+pfFC+7P792+8GC6q9/4v/e/+b6zH/ufpY/Venn3wi2rP+O9HPDveff9zED/pxD8SIq+82Gcbv/mNvb2uEw6tslv8w7GqrY2tanN3797axuJqbbW2OTc3+9r86/Ovzs9UV9bqteJv1zA/+MQvH5/W/ps94pePtv/E9n+pr9Zn8e8H9x9+pFMpdYt/98Xuv7+3e8RPi9++TxXlfPqdg/J+p3zYcz//zXOntX+5R/snz2j/3b7aH597+Wvf+0PXKSe2BgBwFZq7e+uL9Xpt+5TCZB/zXHHhzScjjQEW4slIY1iF7Lud/8eLreeCi58oZBdZfDwGkMbEie/pWJx3hUnEfr6uPv8hAQCAEfO/g/7T7iABAAAAAAAAAAAAAAAAAAAAl+mcjyWbjIi+Zz4ec384TQUAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAONV/AgAA//8FStFZ") 20:40:54 executing program 3: r0 = perf_event_open(&(0x7f0000000a40)={0x2, 0x80, 0xcd, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @perf_bp={&(0x7f0000000200), 0x8}, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfb75}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000040)={0x0, 0x4, 0x0, &(0x7f0000000180)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x80) perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x208, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x4, 0x8001}, 0x4000, 0x0, 0x0, 0x0, 0x0, 0x14e, 0xd1}, 0x0, 0xbfffffffffffffff, r0, 0x19893a9f0a0e2244) r1 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) syz_clone(0x2000000, 0x0, 0x0, 0x0, 0x0, 0x0) r2 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x18, 0x5, &(0x7f00000002c0)=ANY=[@ANYBLOB="180000001800ff0f0000000000000000850000006d000000750000000800000095"], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x80) r3 = perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400, 0x80000, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x7, 0x1007}, 0x8006, 0x0, 0x0, 0x1, 0x4, 0x800000, 0x3}, 0x0, 0xffefffffffffffff, 0xffffffffffffffff, 0x9) ioctl$PERF_EVENT_IOC_SET_FILTER(r3, 0x40082406, &(0x7f00000003c0)='memory.numa_stat\x00') perf_event_open(0x0, 0x0, 0x0, r3, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000080)='sched_switch\x00', r2}, 0x10) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000380)={{0x1, 0xffffffffffffffff}, &(0x7f0000000000), &(0x7f0000000240)=r2}, 0x20) r5 = memfd_secret(0x0) syz_io_uring_setup(0x0, &(0x7f0000000300)={0x0, 0x2, 0x0, 0x0, 0x0, 0x0, r5}, 0x0, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f00000009c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000000a00)=0x14) r7 = openat2(0xffffffffffffff9c, &(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)={0x40841}, 0x18) write$binfmt_script(r7, &(0x7f0000000340)=ANY=[], 0xfffffdef) r8 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000b40)={0x1b, 0x0, 0x0, 0x7, 0x0, 0xffffffffffffffff, 0x200, '\x00', 0x0, 0xffffffffffffffff, 0x3, 0x1, 0x4}, 0x48) r9 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000bc0)={0x2, 0x4, 0x8, 0x1, 0x80, 0x1, 0x9, '\x00', 0x0, 0xffffffffffffffff, 0x4, 0x1, 0x4}, 0x48) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000d00)={0x11, 0x12, &(0x7f0000000440)=@raw=[@exit, @ringbuf_query={{0x18, 0x1, 0x1, 0x0, r4}}, @ringbuf_output={{0x18, 0x1, 0x1, 0x0, r5}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x10001}, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x4, 0x0, 0x0, 0x2}}, @exit, @initr0={0x18, 0x0, 0x0, 0x0, 0x6349, 0x0, 0x0, 0x0, 0xf685}, @ldst={0x3, 0x2, 0x1, 0x0, 0xb, 0x2543a83bb932833c, 0x1}], &(0x7f0000000940)='syzkaller\x00', 0x80000001, 0x27, &(0x7f0000000980)=""/39, 0x41000, 0x40, '\x00', r6, 0x0, r7, 0x8, &(0x7f0000000ac0)={0x3, 0x1}, 0x8, 0x10, &(0x7f0000000b00)={0x2, 0xc, 0xfffffe00, 0x2}, 0x10, 0x0, 0x0, 0x5, &(0x7f0000000c40)=[r2, 0x1, 0x1, r8, r9, r1], &(0x7f0000000c80)=[{0x4, 0x1, 0x8, 0xc}, {0x0, 0x4, 0xf, 0x4}, {0x1, 0x2, 0xd, 0x6}, {0x0, 0x4, 0x10, 0xc}, {0x2, 0x4, 0xd, 0x1}], 0x10, 0x20}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000280)={&(0x7f0000000140)='ext4_ext_show_extent\x00', r2}, 0x10) r10 = perf_event_open(&(0x7f0000000080)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) r11 = gettid() perf_event_open(0x0, r11, 0x2, 0xffffffffffffffff, 0xb) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) perf_event_open(&(0x7f0000000840)={0x2, 0x80, 0x0, 0x7, 0x0, 0x80, 0x0, 0x3, 0x0, 0x9, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, @perf_config_ext={0x8000000000, 0x3}, 0x46c73247dfbe0d, 0x1007e, 0x0, 0x2, 0x0, 0x0, 0x6, 0x0, 0xffffffff, 0x0, 0x1c}, 0x0, 0x9, 0xffffffffffffffff, 0xd) bpf$PROG_LOAD(0x5, &(0x7f0000000780)={0x14, 0x4, &(0x7f00000008c0)=ANY=[@ANYBLOB="850000006b00000018150000a3df7ddd9621fb0201050062d91123e632b2f902ad1e9f1cc7a66ed51ac8a4070000000000000019a83f0b7c9502871fb1ca3dc499e804bbbc359859ed6fd9f104fc7ed900d122072d8275a24d000000000601c3a63953a7b36fe458", @ANYRES32, @ANYBLOB="00000000000000002d59e4eda4000000"], &(0x7f0000000400)='syzkaller\x00', 0xfff, 0xe3, &(0x7f0000000580)=""/227, 0x0, 0x4, '\x00', 0x0, 0x24, 0xffffffffffffffff, 0x8, &(0x7f0000000500)={0x1, 0x3}, 0x8, 0x10, &(0x7f0000000680)={0x5, 0x6, 0x81, 0x9}, 0x10, 0xffffffffffffffff, 0xffffffffffffffff, 0x0, &(0x7f00000006c0)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, r10]}, 0x80) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x4030582a, &(0x7f0000000040)=0x91) [ 105.639219][ T5172] ext4 filesystem being mounted at /root/syzkaller-testdir338643557/syzkaller.M396af/55/file1 supports timestamps until 2038-01-19 (0x7fffffff) [ 105.667739][ T5175] loop4: p2 p3 p7 20:40:54 executing program 4: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) ioctl$BTRFS_IOC_DEV_REPLACE(r0, 0xca289435, &(0x7f0000000140)={0x3, 0xffffffffffffff00, @status={[0x10000, 0x13, 0x5, 0x46, 0x35bcaf96, 0x1ff]}, [0x8001, 0x8000, 0xffffffffffffffff, 0x6, 0x0, 0x80000000, 0x6bfb, 0x6857, 0x100, 0xffffffff80000001, 0x100000001, 0x8, 0x5, 0x7f, 0x10001, 0xb06d, 0x8000, 0x6, 0x7, 0xa7f5, 0x6, 0x4, 0x7, 0x1, 0x8, 0x1c, 0x2c, 0x6, 0x57, 0x7, 0xffffffffffff393b, 0xc6, 0x100, 0x20, 0x400, 0x5, 0x898, 0xffffffff, 0x41, 0x0, 0x465b6a3a, 0x8, 0x8, 0x10001, 0x3, 0x4, 0x5, 0x8, 0x0, 0x3, 0x8000000000000001, 0x746db9e8, 0x4, 0x6, 0x7d, 0x700000000, 0x3f8000000000, 0x101, 0xc0000000000000, 0x100, 0xff, 0x1, 0x8, 0x8000]}) setsockopt$inet_sctp6_SCTP_MAX_BURST(r0, 0x84, 0x14, &(0x7f0000000100), 0x4) sendto$inet6(r0, &(0x7f0000000000)='R', 0x1, 0x0, &(0x7f000005ffe4)={0xa, 0x0, 0x0, @loopback}, 0x1c) [ 105.720650][ T4953] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 105.732777][ T3097] EXT4-fs (loop3): unmounting filesystem 00000000-0000-0000-0000-000000000000. [ 105.732825][ T4139] EXT4-fs (loop0): unmounting filesystem 00000000-0000-0000-0000-000000000000. [ 105.826480][ T5195] loop1: detected capacity change from 0 to 2048 [ 105.864241][ T5202] sctp: [Deprecated]: syz-executor.4 (pid 5202) Use of int in max_burst socket option deprecated. [ 105.864241][ T5202] Use struct sctp_assoc_value instead 20:40:54 executing program 4: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) ioctl$BTRFS_IOC_DEV_REPLACE(r0, 0xca289435, &(0x7f0000000140)={0x3, 0xffffffffffffff00, @status={[0x10000, 0x13, 0x5, 0x46, 0x35bcaf96, 0x1ff]}, [0x8001, 0x8000, 0xffffffffffffffff, 0x6, 0x0, 0x80000000, 0x6bfb, 0x6857, 0x100, 0xffffffff80000001, 0x100000001, 0x8, 0x5, 0x7f, 0x10001, 0xb06d, 0x8000, 0x6, 0x7, 0xa7f5, 0x6, 0x4, 0x7, 0x1, 0x8, 0x1c, 0x2c, 0x6, 0x57, 0x7, 0xffffffffffff393b, 0xc6, 0x100, 0x20, 0x400, 0x5, 0x898, 0xffffffff, 0x41, 0x0, 0x465b6a3a, 0x8, 0x8, 0x10001, 0x3, 0x4, 0x5, 0x8, 0x0, 0x3, 0x8000000000000001, 0x746db9e8, 0x4, 0x6, 0x7d, 0x700000000, 0x3f8000000000, 0x101, 0xc0000000000000, 0x100, 0xff, 0x1, 0x8, 0x8000]}) (async) setsockopt$inet_sctp6_SCTP_MAX_BURST(r0, 0x84, 0x14, &(0x7f0000000100), 0x4) sendto$inet6(r0, &(0x7f0000000000)='R', 0x1, 0x0, &(0x7f000005ffe4)={0xa, 0x0, 0x0, @loopback}, 0x1c) [ 105.904227][ T5205] loop0: detected capacity change from 0 to 512 [ 105.932946][ T5195] loop1: p2 p3 p7 [ 105.967908][ T5205] EXT4-fs (loop0): 1 orphan inode deleted [ 105.973758][ T5205] EXT4-fs (loop0): mounted filesystem 00000000-0000-0000-0000-000000000000 r/w without journal. Quota mode: writeback. [ 105.994413][ T5217] sctp: [Deprecated]: syz-executor.4 (pid 5217) Use of int in max_burst socket option deprecated. [ 105.994413][ T5217] Use struct sctp_assoc_value instead 20:40:54 executing program 1: ioctl$BTRFS_IOC_LOGICAL_INO(0xffffffffffffffff, 0xc0389424, &(0x7f0000000180)={0x1, 0x28, '\x00', 0x1, &(0x7f0000000080)=[0x0, 0x0, 0x0, 0x0, 0x0]}) r0 = socket$inet6(0xa, 0x3, 0x6) r1 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) r2 = dup2(r1, r0) ioctl$FIDEDUPERANGE(r0, 0xc0189436, &(0x7f0000000f00)=ANY=[@ANYBLOB="08000000000000000000000000000000000000002000000032057e68d5d647f4ed243c9d097db4c7bae602f8d4c84b5325f3d737af1c3ebe2901b056ac84d04eb9d8bfd4771499d444ff07000033206062c9a0527d2d0e4b0000fa0693ec3785977184911bffc60554e8950e91e1a8209818b4eb3440ae351192e1d7cf54ba6743f2db330481aac17f0961506d7ebd7ca999cf4e148c1ef2880f63693dfee2a6f2fafec2c059fd15db654600000000000000000076da8ec51705470a42729df6a32122af2a673d7409ca1b8a0da065e2bf7790c86a6b3014e1ef5d1c4000d3dff081d5a4c403971fe8869ab4973ffc7b24b6fbb4341ac1a0f5d56b64b9d23d6855e653f1e0418a6d9838196a7b145310a9b4c467199ecc3bd47b85aae47754bf695bdb85ea03f70beab5732a014c5f525bf2f9b9c6bd545e1a"]) ioctl$TIOCSBRK(r2, 0x5427) recvfrom$inet6(0xffffffffffffffff, &(0x7f0000000280)=""/134, 0x86, 0x40000102, &(0x7f0000000340)={0xa, 0x4e21, 0x77f, @mcast1, 0x403b3f}, 0x1c) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000001040)={{r2, 0xffffffffffffffff}, &(0x7f0000000140), &(0x7f0000000480)=r1}, 0x20) syz_read_part_table(0x593, &(0x7f00000005c0)="$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") stat(&(0x7f0000000040)='./file1\x00', &(0x7f0000000380)) fsetxattr$security_capability(0xffffffffffffffff, &(0x7f0000000100), &(0x7f0000000000)=@v1={0x1000000, [{0x80000000, 0x81}]}, 0xc, 0x0) newfstatat(0xffffffffffffff9c, &(0x7f00000000c0)='./file1\x00', &(0x7f0000001400), 0x400) close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x2) ioctl$TIOCSTI(0xffffffffffffffff, 0x5412, &(0x7f00000004c0)=0x40) fsync(0xffffffffffffffff) write$binfmt_misc(0xffffffffffffffff, &(0x7f0000001080)=ANY=[@ANYBLOB="7379d3c6"], 0x4) fallocate(0xffffffffffffffff, 0x100000011, 0x0, 0x2811fdff) open(&(0x7f0000000100)='.\x00', 0x20c2, 0x2d) open$dir(&(0x7f0000000500)='./file1\x00', 0x1c6c0, 0x0) r4 = openat$vcsu(0xffffffffffffff9c, &(0x7f0000000cc0), 0x400c00, 0x0) lsetxattr$security_selinux(&(0x7f0000001180)='./file1\x00', &(0x7f00000011c0), &(0x7f0000001300)='system_u:object_r:unconfined_exec_t:s0\x00', 0x27, 0x3) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000400)={0xffffffffffffffff, 0xe0, &(0x7f0000000300)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, &(0x7f00000000c0)=[0x0], &(0x7f0000000140), 0x0, 0x8, &(0x7f0000000200)=[{}, {}, {}, {}, {}], 0x28, 0x0, 0x0, 0x0, 0x0, 0x10, 0x8, 0x8, &(0x7f00000002c0)}}, 0x10) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000e80)=@bpf_lsm={0x1d, 0x4, &(0x7f0000000040)=@framed={{0x18, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x73fc}, [@generic={0x9, 0x8, 0x0, 0x7f, 0x200}]}, &(0x7f0000000880)='GPL\x00', 0x1f, 0x93, &(0x7f0000000cc0)=""/147, 0x40f00, 0x2, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, &(0x7f0000000b80)={0x9}, 0x8, 0x10, 0x0, 0x0, r5}, 0x80) r6 = socket$nl_generic(0x10, 0x3, 0x10) r7 = syz_genetlink_get_family_id$tipc(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$TIPC_CMD_ENABLE_BEARER(r6, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000001200)=ANY=[@ANYBLOB="3400000006c08fada241ee0a049e6fba3f36f40da839bbdf54c31768b0026f4261f56d51c5d81ba4cb99f8203c40d0a142fcd75ce26e408d229139f8c4e81109c56a18e453e8a537df21c4ec04a4f3e22f4ac125a28ad43e41107b1f7e79c8573985e54fd665e2913ca74da8c9f3fc2839258c19fa7ac20ebead31206cf280ea73f635bc5418b66554392dfd11874fef72bc53538aae3cb5ef8a80140f4737dd2c572a03ee1d5e3d627e", @ANYRESOCT=0x0, @ANYBLOB="010000000000000000000100000000000000014100000018001700000000000000007564503a73"], 0x34}, 0x1, 0x0, 0x0, 0x1}, 0x0) ioctl$AUTOFS_DEV_IOCTL_PROTOSUBVER(r1, 0xc0189373, &(0x7f0000000540)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x6}}, './file0\x00'}) sendmsg$TIPC_CMD_GET_MAX_PORTS(r4, &(0x7f0000001140)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x40000}, 0xc, &(0x7f0000001100)={&(0x7f00000010c0)={0x1c, r7, 0x400, 0x8000, 0x25dfdbfe, {}, ["", "", "", "", "", "", ""]}, 0x1c}, 0x1, 0x0, 0x0, 0x20048854}, 0x4004) bpf$PROG_LOAD(0x5, &(0x7f0000000e40)={0x5, 0x16, &(0x7f0000001340)=ANY=[@ANYBLOB="390000000100000000000000900000f117fa0000", @ANYRES32, @ANYBLOB="1f00000000000000b703000000000000850000000c000000b61b0453c29f42b5be06c7010b4efffe000000000085000000a900000018150000", @ANYRES32=r3, @ANYBLOB="0000000000000000180100002020782500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b70300000000850000005d000000185500000100000000000000000000009500000000000000"], &(0x7f0000000b80)='syzkaller\x00', 0x1, 0xe8, &(0x7f0000000bc0)=""/232, 0x41000, 0x5b, '\x00', 0x0, 0xe, r4, 0x8, &(0x7f0000000d00)={0x5, 0x2}, 0x8, 0x10, &(0x7f0000000d40)={0x4, 0xe, 0x2, 0x8}, 0x10, r5, 0xffffffffffffffff, 0x5, &(0x7f0000000d80), &(0x7f0000000dc0)=[{0x4, 0x3, 0x0, 0x2}, {0x3, 0x1, 0xa, 0xa}, {0x0, 0x3, 0x2, 0xa}, {0x0, 0x3, 0x7, 0x1}, {0x1, 0x5, 0xb, 0xc}], 0x10, 0x7}, 0x90) [ 106.024785][ T4953] veth0_vlan: entered promiscuous mode [ 106.035832][ T4953] veth1_vlan: entered promiscuous mode [ 106.045340][ T5205] ext4 filesystem being mounted at /root/syzkaller-testdir338643557/syzkaller.M396af/56/file1 supports timestamps until 2038-01-19 (0x7fffffff) 20:40:54 executing program 4: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) ioctl$BTRFS_IOC_DEV_REPLACE(r0, 0xca289435, &(0x7f0000000140)={0x3, 0xffffffffffffff00, @status={[0x10000, 0x13, 0x5, 0x46, 0x35bcaf96, 0x1ff]}, [0x8001, 0x8000, 0xffffffffffffffff, 0x6, 0x0, 0x80000000, 0x6bfb, 0x6857, 0x100, 0xffffffff80000001, 0x100000001, 0x8, 0x5, 0x7f, 0x10001, 0xb06d, 0x8000, 0x6, 0x7, 0xa7f5, 0x6, 0x4, 0x7, 0x1, 0x8, 0x1c, 0x2c, 0x6, 0x57, 0x7, 0xffffffffffff393b, 0xc6, 0x100, 0x20, 0x400, 0x5, 0x898, 0xffffffff, 0x41, 0x0, 0x465b6a3a, 0x8, 0x8, 0x10001, 0x3, 0x4, 0x5, 0x8, 0x0, 0x3, 0x8000000000000001, 0x746db9e8, 0x4, 0x6, 0x7d, 0x700000000, 0x3f8000000000, 0x101, 0xc0000000000000, 0x100, 0xff, 0x1, 0x8, 0x8000]}) setsockopt$inet_sctp6_SCTP_MAX_BURST(r0, 0x84, 0x14, &(0x7f0000000100), 0x4) sendto$inet6(r0, &(0x7f0000000000)='R', 0x1, 0x0, &(0x7f000005ffe4)={0xa, 0x0, 0x0, @loopback}, 0x1c) socket$inet6_sctp(0xa, 0x1, 0x84) (async) ioctl$BTRFS_IOC_DEV_REPLACE(r0, 0xca289435, &(0x7f0000000140)={0x3, 0xffffffffffffff00, @status={[0x10000, 0x13, 0x5, 0x46, 0x35bcaf96, 0x1ff]}, [0x8001, 0x8000, 0xffffffffffffffff, 0x6, 0x0, 0x80000000, 0x6bfb, 0x6857, 0x100, 0xffffffff80000001, 0x100000001, 0x8, 0x5, 0x7f, 0x10001, 0xb06d, 0x8000, 0x6, 0x7, 0xa7f5, 0x6, 0x4, 0x7, 0x1, 0x8, 0x1c, 0x2c, 0x6, 0x57, 0x7, 0xffffffffffff393b, 0xc6, 0x100, 0x20, 0x400, 0x5, 0x898, 0xffffffff, 0x41, 0x0, 0x465b6a3a, 0x8, 0x8, 0x10001, 0x3, 0x4, 0x5, 0x8, 0x0, 0x3, 0x8000000000000001, 0x746db9e8, 0x4, 0x6, 0x7d, 0x700000000, 0x3f8000000000, 0x101, 0xc0000000000000, 0x100, 0xff, 0x1, 0x8, 0x8000]}) (async) setsockopt$inet_sctp6_SCTP_MAX_BURST(r0, 0x84, 0x14, &(0x7f0000000100), 0x4) (async) sendto$inet6(r0, &(0x7f0000000000)='R', 0x1, 0x0, &(0x7f000005ffe4)={0xa, 0x0, 0x0, @loopback}, 0x1c) (async) 20:40:54 executing program 0: r0 = open(&(0x7f0000000040)='./bus\x00', 0x8001141042, 0x0) connect$unix(r0, &(0x7f0000000240)=@file={0x0, './bus\x00'}, 0x6e) setuid(0x0) getgid() ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f0000000a80)) getuid() getegid() bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x4, &(0x7f00000002c0)=ANY=[@ANYBLOB="18010000000000000000000000000004850000006d00000095"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x80) r1 = gettid() bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000080)={r1, 0xffffffffffffffff, 0x0, 0x6, &(0x7f0000000040)='kfree\x00'}, 0x13) perf_event_open(&(0x7f0000002740)={0x5, 0x80, 0xfd, 0x3, 0x81, 0xeb, 0x0, 0x9, 0x0, 0x5, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0xfffffff7, 0x2, @perf_config_ext={0x2, 0x401}, 0x1800, 0x3, 0x3, 0x6, 0x80000001, 0x81, 0x20, 0x0, 0x5, 0x0, 0x10000}, r1, 0x9, 0xffffffffffffffff, 0x8) perf_event_open(&(0x7f0000000040)={0x0, 0x80, 0x1, 0x0, 0x1, 0x1f, 0x0, 0x7, 0x0, 0xa, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x8, 0x2, @perf_config_ext={0x100000001, 0x9}, 0x15, 0x72e0, 0xa9, 0x1, 0x0, 0x2, 0x5, 0x0, 0x1000}, r1, 0x7, 0xffffffffffffffff, 0x9) fstat(r0, &(0x7f0000000b00)) r2 = getegid() syz_mount_image$ext4(&(0x7f0000000100)='ext4\x00', &(0x7f0000000200)='./file1\x00', 0x3000000, &(0x7f0000003040)=ANY=[@ANYRES64=r2, @ANYBLOB="8555591a163448f4c52bee6cc0e12a6a8610718f818822e94c360e46f93ac9c63a1b40ea9d758c2b4e2d7c386a141016d11cb13fabc846fc7fb242c175fbdf96e2a96e80e82b73987b1d5dfd843c7e6748a15a0c4160f5e4c468e8f8e417bd3385546159881194fe3a7cf8307cd9c7ce0ca180a481d4dcaa6611ec5c8ff1c546360dea3da9f2bfc1fd71af9ebf2afe4285f013a3929a7096097976a16e2060e5f26e379011ea1811", @ANYRES64, @ANYBLOB="ca42ad87c41bb3b2507e4e12104f0cd507000001046f9445657db4996b10208d04454e11fb5b1383c5ce98e3062f45ec04e5b8b179df3d64a6cec05d29235e3cbe0b339abe9faee5cf3e44c97ce56a1dc359047114eeb3c23f331114039d75a664afc47e8273b79e83d301fc4ceec8b89911505b6743797c459195a7120ded1748f315deb90000ffed00000000000000", @ANYRES8=r2, @ANYRES8=r2, @ANYRES64, @ANYBLOB="bd85893dee1670c8c7e3b4a65ec61f224992fd11263b7749c7ee63dd4fc13cc5dfdde8a3099aaf21ece351c316d9bbd7e4ecc524c856f20d6a1818d6d75f702eb904653f9d55af", @ANYRESOCT], 0x1, 0x513, &(0x7f0000000c40)="$eJzs3W9rJHcdAPDvTLJp7i41WxU5C7bFVu6K3m7S2DaKtBVEHxXU+jzGZBNCNtmQ3dRLKJriCxBEVPAF+ETwBQjSlyDCgT4XFUX0Th/qjczuRPNnN1mSTfbcfD4w2d9v/n2/vyE7O39+zARwbb0QEW9FxFhEvBwR08X4tBgW8sp+Z75HD99byocksuydvyWRFOMO1pXXxyPiVmeRmIyIr38l4lvJybjN3b31xXq9tl3Uq62NrWpzd+/e2sbiam21tjk3N/va/Ovzr87PZIULtbMcEW986U8/+v7PvvzGrz7z7d8v/OXud/K0vvCxTt4RsXShAD101l1qb4sD+TbavoxgQ5K3pzQ27CwAAOhHfoz/4Yj4ZPv4fzrG2kdzAAAAwCjJ3pyKfyURGQAAADCy0oiYiiStFH0BpiJNK5VOH96Pxs203mi2Pr3S2NlczqdFlKOUrqzVazNFX+FylJK8Plv0sT2ov3KsPhcRz0TED6dvtOuVpUZ9edgXPwAAAOCauPX80fP/f06n7TIAAAAwYso9KwAAAMCocMoPAAAAo8/5PwAAAIy0r779dj5kB+/xXn53d2e98e695VpzvbKxs1RZamxvVVYbjdX2M/s2zlpfvdHY+mxs7tyvtmrNVrW5u7ew0djZbC2sHXkFNgAAAHCFnnn+g98lEbH/+RvtIYrnAAIc8cdhJwAM0tiwEwCGZnzYCQBDUzpzDnsIGHXJGdNPdt7pXCuMX19OPgAAwODd+fjJ+/8TxbSzrw0A/8/09QGA68fdPbi+SuftAXh70JkAw/KhzsdTvab3fHhHH/f/O9cYsuxciQEAAAMz1R6StFIcp09FmlYqEU+3XwtQSlbW6rWZ4vzgt9Olp/L6bHvJ5Mw+wwAAAAAAAAAAAAAAAAAAAAAAAABAR5YlkQEAAAAjLSL9c9J+mn/EnemXpo5eHTj21q+fvvPj+4ut1vZsxETy9+l81EREtH5SjH8l80oAAAAAeAJ0ztOLz9lhZwMAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAADAqHn08L2lg+Eq4/71ixFR7hZ/PCbbn5NRioib/0hi/NBySUSMDSD+/vsRcbtb/CQeZ1lWLrLoFv/GJccvtzdN9/hpRNwaQHy4zj7I9z9vdfv+pfFC+7P792+8GC6q9/4v/e/+b6zH/ufpY/Venn3wi2rP+O9HPDveff9zED/pxD8SIq+82Gcbv/mNvb2uEw6tslv8w7GqrY2tanN3797axuJqbbW2OTc3+9r86/Ovzs9UV9bqteJv1zA/+MQvH5/W/ps94pePtv/E9n+pr9Zn8e8H9x9+pFMpdYt/98Xuv7+3e8RPi9++TxXlfPqdg/J+p3zYcz//zXOntX+5R/snz2j/3b7aH597+Wvf+0PXKSe2BgBwFZq7e+uL9Xpt+5TCZB/zXHHhzScjjQEW4slIY1iF7Lud/8eLreeCi58oZBdZfDwGkMbEie/pWJx3hUnEfr6uPv8hAQCAEfO/g/7T7iABAAAAAAAAAAAAAAAAAAAAl+mcjyWbjIi+Zz4ec384TQUAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAONV/AgAA//8FStFZ") [ 106.134772][ T4953] veth0_macvtap: entered promiscuous mode [ 106.141894][ T4139] EXT4-fs (loop0): unmounting filesystem 00000000-0000-0000-0000-000000000000. [ 106.143632][ T5229] sctp: [Deprecated]: syz-executor.4 (pid 5229) Use of int in max_burst socket option deprecated. [ 106.143632][ T5229] Use struct sctp_assoc_value instead [ 106.172351][ T4953] veth1_macvtap: entered promiscuous mode [ 106.185509][ T4953] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0 [ 106.195998][ T4953] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 106.205949][ T4953] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0 [ 106.212034][ T5228] loop1: detected capacity change from 0 to 2048 [ 106.216432][ T4953] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 106.232632][ T4953] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0 [ 106.242244][ T5231] sctp: [Deprecated]: syz-executor.4 (pid 5231) Use of int in max_burst socket option deprecated. [ 106.242244][ T5231] Use struct sctp_assoc_value instead [ 106.243065][ T4953] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 106.268766][ T4953] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0 20:40:54 executing program 4: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cpuset.effective_cpus\x00', 0x275a, 0x0) fcntl$lock(r0, 0x25, &(0x7f00000000c0)) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cpuset.effective_cpus\x00', 0x275a, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cpuset.effective_cpus\x00', 0x275a, 0x0) fcntl$lock(r2, 0x26, &(0x7f0000000000)={0x1}) fcntl$lock(r2, 0x25, &(0x7f00000000c0)) fcntl$lock(r1, 0x26, &(0x7f0000000000)={0x1}) ioctl$FIBMAP(r2, 0x1, &(0x7f0000000040)=0x2) close(r0) [ 106.279407][ T4953] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 106.337163][ T4953] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 106.339112][ T5228] loop1: p2 p3 p7 [ 106.358891][ T4953] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1 [ 106.369755][ T4953] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 106.378714][ T5242] loop0: detected capacity change from 0 to 512 [ 106.380098][ T4953] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1 [ 106.397071][ T4953] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 106.407287][ T4953] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1 [ 106.412438][ T5242] EXT4-fs (loop0): 1 orphan inode deleted [ 106.418075][ T4953] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 106.418098][ T4953] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1 [ 106.423820][ T5242] EXT4-fs (loop0): mounted filesystem 00000000-0000-0000-0000-000000000000 r/w without journal. Quota mode: writeback. [ 106.433657][ T4953] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 106.468706][ T4953] batman_adv: batadv0: Interface activated: batadv_slave_1 20:40:54 executing program 1: ioctl$BTRFS_IOC_LOGICAL_INO(0xffffffffffffffff, 0xc0389424, &(0x7f0000000180)={0x1, 0x28, '\x00', 0x1, &(0x7f0000000080)=[0x0, 0x0, 0x0, 0x0, 0x0]}) r0 = socket$inet6(0xa, 0x3, 0x6) r1 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) r2 = dup2(r1, r0) ioctl$FIDEDUPERANGE(r0, 0xc0189436, &(0x7f0000000f00)=ANY=[@ANYBLOB="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"]) ioctl$TIOCSBRK(r2, 0x5427) recvfrom$inet6(0xffffffffffffffff, &(0x7f0000000280)=""/134, 0x86, 0x40000102, &(0x7f0000000340)={0xa, 0x4e21, 0x77f, @mcast1, 0x403b3f}, 0x1c) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000001040)={{r2, 0xffffffffffffffff}, &(0x7f0000000140), &(0x7f0000000480)=r1}, 0x20) r4 = creat(&(0x7f0000000240)='./file0\x00', 0x0) stat(&(0x7f0000000040)='./file1\x00', &(0x7f0000000380)) fsetxattr$security_capability(r4, &(0x7f0000000100), &(0x7f0000000000)=@v1={0x1000000, [{0x80000000, 0x81}]}, 0xc, 0x0) newfstatat(0xffffffffffffff9c, &(0x7f00000000c0)='./file1\x00', &(0x7f0000001400), 0x400) close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x2) ioctl$TIOCSTI(r4, 0x5412, &(0x7f00000004c0)=0x40) fsync(0xffffffffffffffff) write$binfmt_misc(r4, &(0x7f0000001080)=ANY=[@ANYBLOB="7379d3c6"], 0x4) fallocate(r4, 0x100000011, 0x0, 0x2811fdff) open(&(0x7f0000000100)='.\x00', 0x20c2, 0x2d) open$dir(&(0x7f0000000500)='./file1\x00', 0x1c6c0, 0x0) r5 = openat$vcsu(0xffffffffffffff9c, &(0x7f0000000cc0), 0x400c00, 0x0) lsetxattr$security_selinux(&(0x7f0000001180)='./file1\x00', &(0x7f00000011c0), &(0x7f0000001300)='system_u:object_r:unconfined_exec_t:s0\x00', 0x27, 0x3) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000400)={0xffffffffffffffff, 0xe0, &(0x7f0000000300)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, &(0x7f00000000c0)=[0x0], &(0x7f0000000140), 0x0, 0x8, &(0x7f0000000200)=[{}, {}, {}, {}, {}], 0x28, 0x0, 0x0, 0x0, 0x0, 0x10, 0x8, 0x8, &(0x7f00000002c0)}}, 0x10) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000e80)=@bpf_lsm={0x1d, 0x4, &(0x7f0000000040)=@framed={{0x18, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x73fc}, [@generic={0x9, 0x8, 0x0, 0x7f, 0x200}]}, &(0x7f0000000880)='GPL\x00', 0x1f, 0x93, &(0x7f0000000cc0)=""/147, 0x40f00, 0x2, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, &(0x7f0000000b80)={0x9}, 0x8, 0x10, 0x0, 0x0, r6}, 0x80) r7 = socket$nl_generic(0x10, 0x3, 0x10) r8 = syz_genetlink_get_family_id$tipc(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$TIPC_CMD_ENABLE_BEARER(r7, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000001200)=ANY=[@ANYBLOB="3400000006c08fada241ee0a049e6fba3f36f40da839bbdf54c31768b0026f4261f56d51c5d81ba4cb99f8203c40d0a142fcd75ce26e408d229139f8c4e81109c56a18e453e8a537df21c4ec04a4f3e22f4ac125a28ad43e41107b1f7e79c8573985e54fd665e2913ca74da8c9f3fc2839258c19fa7ac20ebead31206cf280ea73f635bc5418b66554392dfd11874fef72bc53538aae3cb5ef8a80140f4737dd2c572a03ee1d5e3d627e", @ANYRESOCT=0x0, @ANYBLOB="010000000000000000000100000000000000014100000018001700000000000000007564503a73"], 0x34}, 0x1, 0x0, 0x0, 0x1}, 0x0) ioctl$AUTOFS_DEV_IOCTL_PROTOSUBVER(r1, 0xc0189373, &(0x7f0000000540)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x6}}, './file0\x00'}) sendmsg$TIPC_CMD_GET_MAX_PORTS(r5, &(0x7f0000001140)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x40000}, 0xc, &(0x7f0000001100)={&(0x7f00000010c0)={0x1c, r8, 0x400, 0x8000, 0x25dfdbfe, {}, ["", "", "", "", "", "", ""]}, 0x1c}, 0x1, 0x0, 0x0, 0x20048854}, 0x4004) bpf$PROG_LOAD(0x5, &(0x7f0000000e40)={0x5, 0x16, &(0x7f0000001340)=ANY=[@ANYBLOB="390000000100000000000000900000f117fa0000", @ANYRES32=r4, @ANYBLOB="1f00000000000000b703000000000000850000000c000000b61b0453c29f42b5be06c7010b4efffe000000000085000000a900000018150000", @ANYRES32=r3, @ANYBLOB="0000000000000000180100002020782500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b70300000000850000005d000000185500000100000000000000000000009500000000000000"], &(0x7f0000000b80)='syzkaller\x00', 0x1, 0xe8, &(0x7f0000000bc0)=""/232, 0x41000, 0x5b, '\x00', 0x0, 0xe, r5, 0x8, &(0x7f0000000d00)={0x5, 0x2}, 0x8, 0x10, &(0x7f0000000d40)={0x4, 0xe, 0x2, 0x8}, 0x10, r6, r4, 0x5, &(0x7f0000000d80), &(0x7f0000000dc0)=[{0x4, 0x3, 0x0, 0x2}, {0x3, 0x1, 0xa, 0xa}, {0x0, 0x3, 0x2, 0xa}, {0x0, 0x3, 0x7, 0x1}, {0x1, 0x5, 0xb, 0xc}], 0x10, 0x7}, 0x90) [ 106.488148][ T4953] netdevsim netdevsim2 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 106.497098][ T4953] netdevsim netdevsim2 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 106.506306][ T4953] netdevsim netdevsim2 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 106.515376][ T4953] netdevsim netdevsim2 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 20:40:54 executing program 2: r0 = perf_event_open(&(0x7f0000000a40)={0x2, 0x80, 0xcd, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @perf_bp={&(0x7f0000000200), 0x8}, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfb75}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000040)={0x0, 0x4, 0x0, &(0x7f0000000180)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x80) perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x208, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x4, 0x8001}, 0x4000, 0x0, 0x0, 0x0, 0x0, 0x14e, 0xd1}, 0x0, 0xbfffffffffffffff, r0, 0x19893a9f0a0e2244) r1 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) syz_clone(0x2000000, 0x0, 0x0, 0x0, 0x0, 0x0) r2 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x18, 0x5, &(0x7f00000002c0)=ANY=[@ANYBLOB="180000001800ff0f0000000000000000850000006d000000750000000800000095"], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x80) r3 = perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400, 0x80000, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x7, 0x1007}, 0x8006, 0x0, 0x0, 0x1, 0x4, 0x800000, 0x3}, 0x0, 0xffefffffffffffff, 0xffffffffffffffff, 0x9) ioctl$PERF_EVENT_IOC_SET_FILTER(r3, 0x40082406, &(0x7f00000003c0)='memory.numa_stat\x00') perf_event_open(0x0, 0x0, 0x0, r3, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000080)='sched_switch\x00', r2}, 0x10) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000380)={{0x1, 0xffffffffffffffff}, &(0x7f0000000000), &(0x7f0000000240)=r2}, 0x20) r5 = memfd_secret(0x0) syz_io_uring_setup(0x0, &(0x7f0000000300)={0x0, 0x2, 0x0, 0x0, 0x0, 0x0, r5}, 0x0, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f00000009c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000000a00)=0x14) r7 = openat2(0xffffffffffffff9c, &(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)={0x40841}, 0x18) write$binfmt_script(r7, &(0x7f0000000340)=ANY=[], 0xfffffdef) r8 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000b40)={0x1b, 0x0, 0x0, 0x7, 0x0, 0xffffffffffffffff, 0x200, '\x00', 0x0, 0xffffffffffffffff, 0x3, 0x1, 0x4}, 0x48) r9 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000bc0)={0x2, 0x4, 0x8, 0x1, 0x80, 0x1, 0x9, '\x00', 0x0, 0xffffffffffffffff, 0x4, 0x1, 0x4}, 0x48) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000d00)={0x11, 0x12, &(0x7f0000000440)=@raw=[@exit, @ringbuf_query={{0x18, 0x1, 0x1, 0x0, r4}}, @ringbuf_output={{0x18, 0x1, 0x1, 0x0, r5}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x10001}, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x4, 0x0, 0x0, 0x2}}, @exit, @initr0={0x18, 0x0, 0x0, 0x0, 0x6349, 0x0, 0x0, 0x0, 0xf685}, @ldst={0x3, 0x2, 0x1, 0x0, 0xb, 0x2543a83bb932833c, 0x1}], &(0x7f0000000940)='syzkaller\x00', 0x80000001, 0x27, &(0x7f0000000980)=""/39, 0x41000, 0x40, '\x00', r6, 0x0, r7, 0x8, &(0x7f0000000ac0)={0x3, 0x1}, 0x8, 0x10, &(0x7f0000000b00)={0x2, 0xc, 0xfffffe00, 0x2}, 0x10, 0x0, 0x0, 0x5, &(0x7f0000000c40)=[r2, 0x1, 0x1, r8, r9, r1], &(0x7f0000000c80)=[{0x4, 0x1, 0x8, 0xc}, {0x0, 0x4, 0xf, 0x4}, {0x1, 0x2, 0xd, 0x6}, {0x0, 0x4, 0x10, 0xc}, {0x2, 0x4, 0xd, 0x1}], 0x10, 0x20}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000280)={&(0x7f0000000140)='ext4_ext_show_extent\x00', r2}, 0x10) r10 = perf_event_open(&(0x7f0000000080)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) perf_event_open$cgroup(&(0x7f0000000300)={0x5, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_bp={&(0x7f0000000100)}, 0x81252, 0x6, 0x80000001, 0x0, 0x0, 0x0, 0x6, 0x0, 0x6, 0x0, 0x6}, 0xffffffffffffffff, 0xe, 0xffffffffffffffff, 0xc) perf_event_open(0x0, 0x0, 0x2, 0xffffffffffffffff, 0xb) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) perf_event_open(&(0x7f0000000840)={0x2, 0x80, 0x0, 0x7, 0x0, 0x80, 0x0, 0x3, 0x0, 0x9, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, @perf_config_ext={0x8000000000, 0x3}, 0x46c73247dfbe0d, 0x1007e, 0x0, 0x2, 0x0, 0x0, 0x6, 0x0, 0xffffffff, 0x0, 0x1c}, 0x0, 0x9, 0xffffffffffffffff, 0xd) bpf$PROG_LOAD(0x5, &(0x7f0000000780)={0x14, 0x4, &(0x7f00000008c0)=ANY=[@ANYBLOB="850000006b00000018150000a3df7ddd9621fb0201050062d91123e632b2f902ad1e9f1cc7a66ed51ac8a4070000000000000019a83f0b7c9502871fb1ca3dc499e804bbbc359859ed6fd9f104fc7ed900d122072d8275a24d000000000601c3a63953a7b36fe458", @ANYRES32, @ANYBLOB="00000000000000002d59e4eda4000000"], &(0x7f0000000400)='syzkaller\x00', 0xfff, 0xe3, &(0x7f0000000580)=""/227, 0x0, 0x4, '\x00', 0x0, 0x24, 0xffffffffffffffff, 0x8, &(0x7f0000000500)={0x1, 0x3}, 0x8, 0x10, &(0x7f0000000680)={0x5, 0x6, 0x81, 0x9}, 0x10, 0xffffffffffffffff, 0xffffffffffffffff, 0x0, &(0x7f00000006c0)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, r10]}, 0x80) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x4030582a, &(0x7f0000000040)=0x91) [ 106.525417][ T5242] ext4 filesystem being mounted at /root/syzkaller-testdir338643557/syzkaller.M396af/57/file1 supports timestamps until 2038-01-19 (0x7fffffff) 20:40:55 executing program 0: r0 = open(&(0x7f0000000040)='./bus\x00', 0x8001141042, 0x0) connect$unix(r0, &(0x7f0000000240)=@file={0x0, './bus\x00'}, 0x6e) setuid(0x0) getgid() ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f0000000a80)) getuid() getegid() r1 = gettid() bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000080)={r1, 0xffffffffffffffff, 0x0, 0x6, &(0x7f0000000040)='kfree\x00'}, 0x13) perf_event_open(&(0x7f0000002740)={0x5, 0x80, 0xfd, 0x3, 0x81, 0xeb, 0x0, 0x9, 0x0, 0x5, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0xfffffff7, 0x2, @perf_config_ext={0x2, 0x401}, 0x1800, 0x3, 0x3, 0x6, 0x80000001, 0x81, 0x20, 0x0, 0x5, 0x0, 0x10000}, r1, 0x9, 0xffffffffffffffff, 0x8) perf_event_open(&(0x7f0000000040)={0x0, 0x80, 0x1, 0x0, 0x1, 0x1f, 0x0, 0x7, 0x0, 0xa, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x8, 0x2, @perf_config_ext={0x100000001, 0x9}, 0x15, 0x72e0, 0xa9, 0x1, 0x0, 0x2, 0x5, 0x0, 0x1000}, r1, 0x7, 0xffffffffffffffff, 0x9) fstat(r0, &(0x7f0000000b00)) r2 = getegid() syz_mount_image$ext4(&(0x7f0000000100)='ext4\x00', &(0x7f0000000200)='./file1\x00', 0x3000000, &(0x7f0000003040)=ANY=[@ANYRES64=r2, @ANYBLOB="8555591a163448f4c52bee6cc0e12a6a8610718f818822e94c360e46f93ac9c63a1b40ea9d758c2b4e2d7c386a141016d11cb13fabc846fc7fb242c175fbdf96e2a96e80e82b73987b1d5dfd843c7e6748a15a0c4160f5e4c468e8f8e417bd3385546159881194fe3a7cf8307cd9c7ce0ca180a481d4dcaa6611ec5c8ff1c546360dea3da9f2bfc1fd71af9ebf2afe4285f013a3929a7096097976a16e2060e5f26e379011ea1811", @ANYRES64, @ANYBLOB="ca42ad87c41bb3b2507e4e12104f0cd507000001046f9445657db4996b10208d04454e11fb5b1383c5ce98e3062f45ec04e5b8b179df3d64a6cec05d29235e3cbe0b339abe9faee5cf3e44c97ce56a1dc359047114eeb3c23f331114039d75a664afc47e8273b79e83d301fc4ceec8b89911505b6743797c459195a7120ded1748f315deb90000ffed00000000000000", @ANYRES8=r2, @ANYRES8=r2, @ANYRES64, @ANYBLOB="bd85893dee1670c8c7e3b4a65ec61f224992fd11263b7749c7ee63dd4fc13cc5dfdde8a3099aaf21ece351c316d9bbd7e4ecc524c856f20d6a1818d6d75f702eb904653f9d55af", @ANYRESOCT], 0x1, 0x513, &(0x7f0000000c40)="$eJzs3W9rJHcdAPDvTLJp7i41WxU5C7bFVu6K3m7S2DaKtBVEHxXU+jzGZBNCNtmQ3dRLKJriCxBEVPAF+ETwBQjSlyDCgT4XFUX0Th/qjczuRPNnN1mSTfbcfD4w2d9v/n2/vyE7O39+zARwbb0QEW9FxFhEvBwR08X4tBgW8sp+Z75HD99byocksuydvyWRFOMO1pXXxyPiVmeRmIyIr38l4lvJybjN3b31xXq9tl3Uq62NrWpzd+/e2sbiam21tjk3N/va/Ovzr87PZIULtbMcEW986U8/+v7PvvzGrz7z7d8v/OXud/K0vvCxTt4RsXShAD101l1qb4sD+TbavoxgQ5K3pzQ27CwAAOhHfoz/4Yj4ZPv4fzrG2kdzAAAAwCjJ3pyKfyURGQAAADCy0oiYiiStFH0BpiJNK5VOH96Pxs203mi2Pr3S2NlczqdFlKOUrqzVazNFX+FylJK8Plv0sT2ov3KsPhcRz0TED6dvtOuVpUZ9edgXPwAAAOCauPX80fP/f06n7TIAAAAwYso9KwAAAMCocMoPAAAAo8/5PwAAAIy0r779dj5kB+/xXn53d2e98e695VpzvbKxs1RZamxvVVYbjdX2M/s2zlpfvdHY+mxs7tyvtmrNVrW5u7ew0djZbC2sHXkFNgAAAHCFnnn+g98lEbH/+RvtIYrnAAIc8cdhJwAM0tiwEwCGZnzYCQBDUzpzDnsIGHXJGdNPdt7pXCuMX19OPgAAwODd+fjJ+/8TxbSzrw0A/8/09QGA68fdPbi+SuftAXh70JkAw/KhzsdTvab3fHhHH/f/O9cYsuxciQEAAAMz1R6StFIcp09FmlYqEU+3XwtQSlbW6rWZ4vzgt9Olp/L6bHvJ5Mw+wwAAAAAAAAAAAAAAAAAAAAAAAABAR5YlkQEAAAAjLSL9c9J+mn/EnemXpo5eHTj21q+fvvPj+4ut1vZsxETy9+l81EREtH5SjH8l80oAAAAAeAJ0ztOLz9lhZwMAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAADAqHn08L2lg+Eq4/71ixFR7hZ/PCbbn5NRioib/0hi/NBySUSMDSD+/vsRcbtb/CQeZ1lWLrLoFv/GJccvtzdN9/hpRNwaQHy4zj7I9z9vdfv+pfFC+7P792+8GC6q9/4v/e/+b6zH/ufpY/Venn3wi2rP+O9HPDveff9zED/pxD8SIq+82Gcbv/mNvb2uEw6tslv8w7GqrY2tanN3797axuJqbbW2OTc3+9r86/Ovzs9UV9bqteJv1zA/+MQvH5/W/ps94pePtv/E9n+pr9Zn8e8H9x9+pFMpdYt/98Xuv7+3e8RPi9++TxXlfPqdg/J+p3zYcz//zXOntX+5R/snz2j/3b7aH597+Wvf+0PXKSe2BgBwFZq7e+uL9Xpt+5TCZB/zXHHhzScjjQEW4slIY1iF7Lud/8eLreeCi58oZBdZfDwGkMbEie/pWJx3hUnEfr6uPv8hAQCAEfO/g/7T7iABAAAAAAAAAAAAAAAAAAAAl+mcjyWbjIi+Zz4ec384TQUAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAONV/AgAA//8FStFZ") [ 106.620747][ T4139] EXT4-fs (loop0): unmounting filesystem 00000000-0000-0000-0000-000000000000. [ 106.782826][ T5268] loop0: detected capacity change from 0 to 512 [ 106.811902][ T5268] EXT4-fs (loop0): 1 orphan inode deleted 20:40:55 executing program 1: ioctl$BTRFS_IOC_LOGICAL_INO(0xffffffffffffffff, 0xc0389424, &(0x7f0000000180)={0x1, 0x28, '\x00', 0x1, &(0x7f0000000080)=[0x0, 0x0, 0x0, 0x0, 0x0]}) r0 = socket$inet6(0xa, 0x3, 0x6) r1 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) r2 = dup2(r1, r0) ioctl$FIDEDUPERANGE(r0, 0xc0189436, &(0x7f0000000f00)=ANY=[@ANYBLOB="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"]) ioctl$TIOCSBRK(r2, 0x5427) recvfrom$inet6(0xffffffffffffffff, &(0x7f0000000280)=""/134, 0x86, 0x40000102, &(0x7f0000000340)={0xa, 0x4e21, 0x77f, @mcast1, 0x403b3f}, 0x1c) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000001040)={{r2, 0xffffffffffffffff}, &(0x7f0000000140), &(0x7f0000000480)=r1}, 0x20) r4 = creat(&(0x7f0000000240)='./file0\x00', 0x0) stat(&(0x7f0000000040)='./file1\x00', &(0x7f0000000380)) fsetxattr$security_capability(r4, &(0x7f0000000100), &(0x7f0000000000)=@v1={0x1000000, [{0x80000000, 0x81}]}, 0xc, 0x0) newfstatat(0xffffffffffffff9c, &(0x7f00000000c0)='./file1\x00', &(0x7f0000001400), 0x400) close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x2) ioctl$TIOCSTI(r4, 0x5412, &(0x7f00000004c0)=0x40) fsync(0xffffffffffffffff) write$binfmt_misc(r4, &(0x7f0000001080)=ANY=[@ANYBLOB="7379d3c6"], 0x4) fallocate(r4, 0x100000011, 0x0, 0x2811fdff) open(&(0x7f0000000100)='.\x00', 0x20c2, 0x2d) open$dir(&(0x7f0000000500)='./file1\x00', 0x1c6c0, 0x0) r5 = openat$vcsu(0xffffffffffffff9c, &(0x7f0000000cc0), 0x400c00, 0x0) lsetxattr$security_selinux(&(0x7f0000001180)='./file1\x00', &(0x7f00000011c0), &(0x7f0000001300)='system_u:object_r:unconfined_exec_t:s0\x00', 0x27, 0x3) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000400)={0xffffffffffffffff, 0xe0, &(0x7f0000000300)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, &(0x7f00000000c0)=[0x0], &(0x7f0000000140), 0x0, 0x8, &(0x7f0000000200)=[{}, {}, {}, {}, {}], 0x28, 0x0, 0x0, 0x0, 0x0, 0x10, 0x8, 0x8, &(0x7f00000002c0)}}, 0x10) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000e80)=@bpf_lsm={0x1d, 0x4, &(0x7f0000000040)=@framed={{0x18, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x73fc}, [@generic={0x9, 0x8, 0x0, 0x7f, 0x200}]}, &(0x7f0000000880)='GPL\x00', 0x1f, 0x93, &(0x7f0000000cc0)=""/147, 0x40f00, 0x2, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, &(0x7f0000000b80)={0x9}, 0x8, 0x10, 0x0, 0x0, r6}, 0x80) r7 = socket$nl_generic(0x10, 0x3, 0x10) r8 = syz_genetlink_get_family_id$tipc(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$TIPC_CMD_ENABLE_BEARER(r7, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000001200)=ANY=[@ANYBLOB="3400000006c08fada241ee0a049e6fba3f36f40da839bbdf54c31768b0026f4261f56d51c5d81ba4cb99f8203c40d0a142fcd75ce26e408d229139f8c4e81109c56a18e453e8a537df21c4ec04a4f3e22f4ac125a28ad43e41107b1f7e79c8573985e54fd665e2913ca74da8c9f3fc2839258c19fa7ac20ebead31206cf280ea73f635bc5418b66554392dfd11874fef72bc53538aae3cb5ef8a80140f4737dd2c572a03ee1d5e3d627e", @ANYRESOCT=0x0, @ANYBLOB="010000000000000000000100000000000000014100000018001700000000000000007564503a73"], 0x34}, 0x1, 0x0, 0x0, 0x1}, 0x0) ioctl$AUTOFS_DEV_IOCTL_PROTOSUBVER(r1, 0xc0189373, &(0x7f0000000540)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x6}}, './file0\x00'}) sendmsg$TIPC_CMD_GET_MAX_PORTS(r5, &(0x7f0000001140)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x40000}, 0xc, &(0x7f0000001100)={&(0x7f00000010c0)={0x1c, r8, 0x400, 0x8000, 0x25dfdbfe, {}, ["", "", "", "", "", "", ""]}, 0x1c}, 0x1, 0x0, 0x0, 0x20048854}, 0x4004) bpf$PROG_LOAD(0x5, &(0x7f0000000e40)={0x5, 0x16, &(0x7f0000001340)=ANY=[@ANYBLOB="390000000100000000000000900000f117fa0000", @ANYRES32=r4, @ANYBLOB="1f00000000000000b703000000000000850000000c000000b61b0453c29f42b5be06c7010b4efffe000000000085000000a900000018150000", @ANYRES32=r3, @ANYBLOB="0000000000000000180100002020782500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b70300000000850000005d000000185500000100000000000000000000009500000000000000"], &(0x7f0000000b80)='syzkaller\x00', 0x1, 0xe8, &(0x7f0000000bc0)=""/232, 0x41000, 0x5b, '\x00', 0x0, 0xe, r5, 0x8, &(0x7f0000000d00)={0x5, 0x2}, 0x8, 0x10, &(0x7f0000000d40)={0x4, 0xe, 0x2, 0x8}, 0x10, r6, r4, 0x5, &(0x7f0000000d80), &(0x7f0000000dc0)=[{0x4, 0x3, 0x0, 0x2}, {0x3, 0x1, 0xa, 0xa}, {0x0, 0x3, 0x2, 0xa}, {0x0, 0x3, 0x7, 0x1}, {0x1, 0x5, 0xb, 0xc}], 0x10, 0x7}, 0x90) 20:40:55 executing program 3: r0 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000240)={0x2, 0x4, 0x8, 0x1, 0x80, 0x0, 0x0, '\x00', 0x0, 0x0}, 0x48) r1 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f00000007c0)={0x1b, 0x0, 0x0, 0x40000, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0}, 0x48) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000840)={0x1, 0x1c, &(0x7f0000000000)=ANY=[@ANYBLOB="180800000000000000000000feffffff18110000", @ANYRES32=r1, @ANYBLOB="0000000000000000b707000014000000b7030000000000008500000005000000bf0900000000000035090100000000009500000000000000b702000000000000639af8ff00000000a5090800000000007baaf0ff00000000bd8900000000000007080000f8ffffffbfa400000000000007040000f0ffffffb70200000800000018220000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7050000080000004608f0ff76000000bf910000000000005607000009faa5c9de000000008500000007000000b700000000eeffff9400000000000000"], &(0x7f0000000980)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r3 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000200)={&(0x7f0000000340)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x48, 0x48, 0x6, [@const={0x5, 0x0, 0x0, 0xa, 0x1}, @restrict={0x3, 0x0, 0x0, 0xb, 0x1}, @fwd={0x7}, @volatile={0xc, 0x0, 0x0, 0x9, 0x5}, @array={0x0, 0x0, 0x0, 0x3, 0x0, {0x4, 0x4, 0x1f}}]}, {0x0, [0x0, 0x0, 0x61, 0x30]}}, &(0x7f00000003c0)=""/104, 0x66, 0x68, 0x1, 0x5}, 0x20) bpf$MAP_UPDATE_CONST_STR(0x2, &(0x7f0000000500)={{r0, 0xffffffffffffffff}, &(0x7f0000000480), &(0x7f00000004c0)='%pi6 \x00'}, 0x20) bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0xb, 0x12, &(0x7f0000000100)=@raw=[@generic={0xfb, 0x9, 0x4, 0x2, 0x9}, @btf_id={0x18, 0xa, 0x3, 0x0, 0x3}, @map_fd={0x18, 0x7, 0x1, 0x0, r1}, @snprintf={{}, {}, {}, {}, {}, {}, {}, {}, {}, {0x18, 0x3, 0x2, 0x0, r0}}], &(0x7f00000001c0)='GPL\x00', 0x9, 0x43, &(0x7f00000002c0)=""/67, 0x40f00, 0xa, '\x00', 0x0, 0x1, r3, 0x8, &(0x7f0000000440)={0xa, 0x1}, 0x8, 0x10, 0x0, 0x0, 0xffffffffffffffff, r2, 0x4, &(0x7f0000000540)=[r0, r1, r1, r0, r1, r0, r1, r4, r1], &(0x7f0000000580)=[{0x0, 0x4, 0xf, 0x1}, {0x3, 0x5, 0x9, 0x2}, {0x5, 0x1, 0x3f}, {0x0, 0x1, 0x6, 0x1}], 0x10, 0x7}, 0x90) 20:40:55 executing program 0: r0 = open(&(0x7f0000000040)='./bus\x00', 0x8001141042, 0x0) connect$unix(r0, &(0x7f0000000240)=@file={0x0, './bus\x00'}, 0x6e) setuid(0x0) getgid() ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f0000000a80)) getuid() getegid() r1 = gettid() bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000080)={r1, 0xffffffffffffffff, 0x0, 0x6, &(0x7f0000000040)='kfree\x00'}, 0x13) perf_event_open(&(0x7f0000002740)={0x5, 0x80, 0xfd, 0x3, 0x81, 0xeb, 0x0, 0x9, 0x0, 0x5, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0xfffffff7, 0x2, @perf_config_ext={0x2, 0x401}, 0x1800, 0x3, 0x3, 0x6, 0x80000001, 0x81, 0x20, 0x0, 0x5, 0x0, 0x10000}, r1, 0x9, 0xffffffffffffffff, 0x8) perf_event_open(&(0x7f0000000040)={0x0, 0x80, 0x1, 0x0, 0x1, 0x1f, 0x0, 0x7, 0x0, 0xa, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x8, 0x2, @perf_config_ext={0x100000001, 0x9}, 0x15, 0x72e0, 0xa9, 0x1, 0x0, 0x2, 0x5, 0x0, 0x1000}, r1, 0x7, 0xffffffffffffffff, 0x9) fstat(r0, &(0x7f0000000b00)) r2 = getegid() syz_mount_image$ext4(&(0x7f0000000100)='ext4\x00', &(0x7f0000000200)='./file1\x00', 0x3000000, &(0x7f0000003040)=ANY=[@ANYRES64=r2, @ANYBLOB="8555591a163448f4c52bee6cc0e12a6a8610718f818822e94c360e46f93ac9c63a1b40ea9d758c2b4e2d7c386a141016d11cb13fabc846fc7fb242c175fbdf96e2a96e80e82b73987b1d5dfd843c7e6748a15a0c4160f5e4c468e8f8e417bd3385546159881194fe3a7cf8307cd9c7ce0ca180a481d4dcaa6611ec5c8ff1c546360dea3da9f2bfc1fd71af9ebf2afe4285f013a3929a7096097976a16e2060e5f26e379011ea1811", @ANYRES64, @ANYBLOB="ca42ad87c41bb3b2507e4e12104f0cd507000001046f9445657db4996b10208d04454e11fb5b1383c5ce98e3062f45ec04e5b8b179df3d64a6cec05d29235e3cbe0b339abe9faee5cf3e44c97ce56a1dc359047114eeb3c23f331114039d75a664afc47e8273b79e83d301fc4ceec8b89911505b6743797c459195a7120ded1748f315deb90000ffed00000000000000", @ANYRES8=r2, @ANYRES8=r2, @ANYRES64, @ANYBLOB="bd85893dee1670c8c7e3b4a65ec61f224992fd11263b7749c7ee63dd4fc13cc5dfdde8a3099aaf21ece351c316d9bbd7e4ecc524c856f20d6a1818d6d75f702eb904653f9d55af", @ANYRESOCT], 0x1, 0x513, &(0x7f0000000c40)="$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") [ 106.818607][ T5268] EXT4-fs (loop0): mounted filesystem 00000000-0000-0000-0000-000000000000 r/w without journal. Quota mode: writeback. [ 106.852434][ T5268] ext4 filesystem being mounted at /root/syzkaller-testdir338643557/syzkaller.M396af/58/file1 supports timestamps until 2038-01-19 (0x7fffffff) 20:40:55 executing program 2: r0 = perf_event_open(&(0x7f0000000a40)={0x2, 0x80, 0xcd, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @perf_bp={&(0x7f0000000200), 0x8}, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfb75}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000040)={0x0, 0x4, 0x0, &(0x7f0000000180)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x80) perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x208, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x4, 0x8001}, 0x4000, 0x0, 0x0, 0x0, 0x0, 0x14e, 0xd1}, 0x0, 0xbfffffffffffffff, r0, 0x19893a9f0a0e2244) r1 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) syz_clone(0x2000000, 0x0, 0x0, 0x0, 0x0, 0x0) r2 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x18, 0x5, &(0x7f00000002c0)=ANY=[@ANYBLOB="180000001800ff0f0000000000000000850000006d000000750000000800000095"], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x80) r3 = perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400, 0x80000, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x7, 0x1007}, 0x8006, 0x0, 0x0, 0x1, 0x4, 0x800000, 0x3}, 0x0, 0xffefffffffffffff, 0xffffffffffffffff, 0x9) ioctl$PERF_EVENT_IOC_SET_FILTER(r3, 0x40082406, &(0x7f00000003c0)='memory.numa_stat\x00') perf_event_open(0x0, 0x0, 0x0, r3, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000080)='sched_switch\x00', r2}, 0x10) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000380)={{0x1, 0xffffffffffffffff}, &(0x7f0000000000), &(0x7f0000000240)=r2}, 0x20) r5 = memfd_secret(0x0) syz_io_uring_setup(0x0, &(0x7f0000000300)={0x0, 0x2, 0x0, 0x0, 0x0, 0x0, r5}, 0x0, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f00000009c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000000a00)=0x14) r7 = openat2(0xffffffffffffff9c, &(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)={0x40841}, 0x18) write$binfmt_script(r7, &(0x7f0000000340)=ANY=[], 0xfffffdef) r8 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000b40)={0x1b, 0x0, 0x0, 0x7, 0x0, 0xffffffffffffffff, 0x200, '\x00', 0x0, 0xffffffffffffffff, 0x3, 0x1, 0x4}, 0x48) r9 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000bc0)={0x2, 0x4, 0x8, 0x1, 0x80, 0x1, 0x9, '\x00', 0x0, 0xffffffffffffffff, 0x4, 0x1, 0x4}, 0x48) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000d00)={0x11, 0x12, &(0x7f0000000440)=@raw=[@exit, @ringbuf_query={{0x18, 0x1, 0x1, 0x0, r4}}, @ringbuf_output={{0x18, 0x1, 0x1, 0x0, r5}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x10001}, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x4, 0x0, 0x0, 0x2}}, @exit, @initr0={0x18, 0x0, 0x0, 0x0, 0x6349, 0x0, 0x0, 0x0, 0xf685}, @ldst={0x3, 0x2, 0x1, 0x0, 0xb, 0x2543a83bb932833c, 0x1}], &(0x7f0000000940)='syzkaller\x00', 0x80000001, 0x27, &(0x7f0000000980)=""/39, 0x41000, 0x40, '\x00', r6, 0x0, r7, 0x8, &(0x7f0000000ac0)={0x3, 0x1}, 0x8, 0x10, &(0x7f0000000b00)={0x2, 0xc, 0xfffffe00, 0x2}, 0x10, 0x0, 0x0, 0x5, &(0x7f0000000c40)=[r2, 0x1, 0x1, r8, r9, r1], &(0x7f0000000c80)=[{0x4, 0x1, 0x8, 0xc}, {0x0, 0x4, 0xf, 0x4}, {0x1, 0x2, 0xd, 0x6}, {0x0, 0x4, 0x10, 0xc}, {0x2, 0x4, 0xd, 0x1}], 0x10, 0x20}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000280)={&(0x7f0000000140)='ext4_ext_show_extent\x00', r2}, 0x10) r10 = perf_event_open(&(0x7f0000000080)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) perf_event_open$cgroup(&(0x7f0000000300)={0x5, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_bp={&(0x7f0000000100)}, 0x81252, 0x6, 0x80000001, 0x0, 0x0, 0x0, 0x6, 0x0, 0x6, 0x0, 0x6}, 0xffffffffffffffff, 0xe, 0xffffffffffffffff, 0xc) perf_event_open(0x0, 0x0, 0x2, 0xffffffffffffffff, 0xb) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) perf_event_open(&(0x7f0000000840)={0x2, 0x80, 0x0, 0x7, 0x0, 0x80, 0x0, 0x3, 0x0, 0x9, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, @perf_config_ext={0x8000000000, 0x3}, 0x46c73247dfbe0d, 0x1007e, 0x0, 0x2, 0x0, 0x0, 0x6, 0x0, 0xffffffff, 0x0, 0x1c}, 0x0, 0x9, 0xffffffffffffffff, 0xd) bpf$PROG_LOAD(0x5, &(0x7f0000000780)={0x14, 0x4, &(0x7f00000008c0)=ANY=[@ANYBLOB="850000006b00000018150000a3df7ddd9621fb0201050062d91123e632b2f902ad1e9f1cc7a66ed51ac8a4070000000000000019a83f0b7c9502871fb1ca3dc499e804bbbc359859ed6fd9f104fc7ed900d122072d8275a24d000000000601c3a63953a7b36fe458", @ANYRES32, @ANYBLOB="00000000000000002d59e4eda4000000"], &(0x7f0000000400)='syzkaller\x00', 0xfff, 0xe3, &(0x7f0000000580)=""/227, 0x0, 0x4, '\x00', 0x0, 0x24, 0xffffffffffffffff, 0x8, &(0x7f0000000500)={0x1, 0x3}, 0x8, 0x10, &(0x7f0000000680)={0x5, 0x6, 0x81, 0x9}, 0x10, 0xffffffffffffffff, 0xffffffffffffffff, 0x0, &(0x7f00000006c0)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, r10]}, 0x80) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x4030582a, &(0x7f0000000040)=0x91) [ 106.890825][ T4139] EXT4-fs (loop0): unmounting filesystem 00000000-0000-0000-0000-000000000000. 20:40:55 executing program 3: bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000240)={0x2, 0x4, 0x8, 0x1, 0x80, 0x0, 0x0, '\x00', 0x0, 0x0}, 0x48) (async) r0 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000240)={0x2, 0x4, 0x8, 0x1, 0x80, 0x0, 0x0, '\x00', 0x0, 0x0}, 0x48) r1 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f00000007c0)={0x1b, 0x0, 0x0, 0x40000, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0}, 0x48) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000840)={0x1, 0x1c, &(0x7f0000000000)=ANY=[@ANYBLOB="180800000000000000000000feffffff18110000", @ANYRES32=r1, @ANYBLOB="0000000000000000b707000014000000b7030000000000008500000005000000bf0900000000000035090100000000009500000000000000b702000000000000639af8ff00000000a5090800000000007baaf0ff00000000bd8900000000000007080000f8ffffffbfa400000000000007040000f0ffffffb70200000800000018220000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7050000080000004608f0ff76000000bf910000000000005607000009faa5c9de000000008500000007000000b700000000eeffff9400000000000000"], &(0x7f0000000980)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r3 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000200)={&(0x7f0000000340)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x48, 0x48, 0x6, [@const={0x5, 0x0, 0x0, 0xa, 0x1}, @restrict={0x3, 0x0, 0x0, 0xb, 0x1}, @fwd={0x7}, @volatile={0xc, 0x0, 0x0, 0x9, 0x5}, @array={0x0, 0x0, 0x0, 0x3, 0x0, {0x4, 0x4, 0x1f}}]}, {0x0, [0x0, 0x0, 0x61, 0x30]}}, &(0x7f00000003c0)=""/104, 0x66, 0x68, 0x1, 0x5}, 0x20) bpf$MAP_UPDATE_CONST_STR(0x2, &(0x7f0000000500)={{r0, 0xffffffffffffffff}, &(0x7f0000000480), &(0x7f00000004c0)='%pi6 \x00'}, 0x20) bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0xb, 0x12, &(0x7f0000000100)=@raw=[@generic={0xfb, 0x9, 0x4, 0x2, 0x9}, @btf_id={0x18, 0xa, 0x3, 0x0, 0x3}, @map_fd={0x18, 0x7, 0x1, 0x0, r1}, @snprintf={{}, {}, {}, {}, {}, {}, {}, {}, {}, {0x18, 0x3, 0x2, 0x0, r0}}], &(0x7f00000001c0)='GPL\x00', 0x9, 0x43, &(0x7f00000002c0)=""/67, 0x40f00, 0xa, '\x00', 0x0, 0x1, r3, 0x8, &(0x7f0000000440)={0xa, 0x1}, 0x8, 0x10, 0x0, 0x0, 0xffffffffffffffff, r2, 0x4, &(0x7f0000000540)=[r0, r1, r1, r0, r1, r0, r1, r4, r1], &(0x7f0000000580)=[{0x0, 0x4, 0xf, 0x1}, {0x3, 0x5, 0x9, 0x2}, {0x5, 0x1, 0x3f}, {0x0, 0x1, 0x6, 0x1}], 0x10, 0x7}, 0x90) (async) bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0xb, 0x12, &(0x7f0000000100)=@raw=[@generic={0xfb, 0x9, 0x4, 0x2, 0x9}, @btf_id={0x18, 0xa, 0x3, 0x0, 0x3}, @map_fd={0x18, 0x7, 0x1, 0x0, r1}, @snprintf={{}, {}, {}, {}, {}, {}, {}, {}, {}, {0x18, 0x3, 0x2, 0x0, r0}}], &(0x7f00000001c0)='GPL\x00', 0x9, 0x43, &(0x7f00000002c0)=""/67, 0x40f00, 0xa, '\x00', 0x0, 0x1, r3, 0x8, &(0x7f0000000440)={0xa, 0x1}, 0x8, 0x10, 0x0, 0x0, 0xffffffffffffffff, r2, 0x4, &(0x7f0000000540)=[r0, r1, r1, r0, r1, r0, r1, r4, r1], &(0x7f0000000580)=[{0x0, 0x4, 0xf, 0x1}, {0x3, 0x5, 0x9, 0x2}, {0x5, 0x1, 0x3f}, {0x0, 0x1, 0x6, 0x1}], 0x10, 0x7}, 0x90) [ 106.954635][ T5285] loop0: detected capacity change from 0 to 512 20:40:55 executing program 3: r0 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000240)={0x2, 0x4, 0x8, 0x1, 0x80, 0x0, 0x0, '\x00', 0x0, 0x0}, 0x48) (async, rerun: 32) r1 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f00000007c0)={0x1b, 0x0, 0x0, 0x40000, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0}, 0x48) (rerun: 32) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000840)={0x1, 0x1c, &(0x7f0000000000)=ANY=[@ANYBLOB="180800000000000000000000feffffff18110000", @ANYRES32=r1, @ANYBLOB="0000000000000000b707000014000000b7030000000000008500000005000000bf0900000000000035090100000000009500000000000000b702000000000000639af8ff00000000a5090800000000007baaf0ff00000000bd8900000000000007080000f8ffffffbfa400000000000007040000f0ffffffb70200000800000018220000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7050000080000004608f0ff76000000bf910000000000005607000009faa5c9de000000008500000007000000b700000000eeffff9400000000000000"], &(0x7f0000000980)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r3 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000200)={&(0x7f0000000340)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x48, 0x48, 0x6, [@const={0x5, 0x0, 0x0, 0xa, 0x1}, @restrict={0x3, 0x0, 0x0, 0xb, 0x1}, @fwd={0x7}, @volatile={0xc, 0x0, 0x0, 0x9, 0x5}, @array={0x0, 0x0, 0x0, 0x3, 0x0, {0x4, 0x4, 0x1f}}]}, {0x0, [0x0, 0x0, 0x61, 0x30]}}, &(0x7f00000003c0)=""/104, 0x66, 0x68, 0x1, 0x5}, 0x20) bpf$MAP_UPDATE_CONST_STR(0x2, &(0x7f0000000500)={{r0, 0xffffffffffffffff}, &(0x7f0000000480), &(0x7f00000004c0)='%pi6 \x00'}, 0x20) bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0xb, 0x12, &(0x7f0000000100)=@raw=[@generic={0xfb, 0x9, 0x4, 0x2, 0x9}, @btf_id={0x18, 0xa, 0x3, 0x0, 0x3}, @map_fd={0x18, 0x7, 0x1, 0x0, r1}, @snprintf={{}, {}, {}, {}, {}, {}, {}, {}, {}, {0x18, 0x3, 0x2, 0x0, r0}}], &(0x7f00000001c0)='GPL\x00', 0x9, 0x43, &(0x7f00000002c0)=""/67, 0x40f00, 0xa, '\x00', 0x0, 0x1, r3, 0x8, &(0x7f0000000440)={0xa, 0x1}, 0x8, 0x10, 0x0, 0x0, 0xffffffffffffffff, r2, 0x4, &(0x7f0000000540)=[r0, r1, r1, r0, r1, r0, r1, r4, r1], &(0x7f0000000580)=[{0x0, 0x4, 0xf, 0x1}, {0x3, 0x5, 0x9, 0x2}, {0x5, 0x1, 0x3f}, {0x0, 0x1, 0x6, 0x1}], 0x10, 0x7}, 0x90) [ 107.009784][ T5285] EXT4-fs (loop0): 1 orphan inode deleted [ 107.015589][ T5285] EXT4-fs (loop0): mounted filesystem 00000000-0000-0000-0000-000000000000 r/w without journal. Quota mode: writeback. [ 107.037484][ T1523] __quota_error: 6 callbacks suppressed [ 107.037507][ T1523] Quota error (device loop0): do_check_range: Getting dqdh_entries 15 out of range 0-14 [ 107.093348][ T5285] ext4 filesystem being mounted at /root/syzkaller-testdir338643557/syzkaller.M396af/59/file1 supports timestamps until 2038-01-19 (0x7fffffff) 20:40:55 executing program 4: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cpuset.effective_cpus\x00', 0x275a, 0x0) fcntl$lock(r0, 0x25, &(0x7f00000000c0)) (async) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cpuset.effective_cpus\x00', 0x275a, 0x0) (async) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cpuset.effective_cpus\x00', 0x275a, 0x0) fcntl$lock(r2, 0x26, &(0x7f0000000000)={0x1}) (async) fcntl$lock(r2, 0x25, &(0x7f00000000c0)) fcntl$lock(r1, 0x26, &(0x7f0000000000)={0x1}) (async, rerun: 64) ioctl$FIBMAP(r2, 0x1, &(0x7f0000000040)=0x2) (rerun: 64) close(r0) 20:40:55 executing program 0: r0 = open(&(0x7f0000000040)='./bus\x00', 0x8001141042, 0x0) connect$unix(r0, &(0x7f0000000240)=@file={0x0, './bus\x00'}, 0x6e) setuid(0x0) getgid() ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f0000000a80)) getuid() r1 = gettid() bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000080)={r1, 0xffffffffffffffff, 0x0, 0x6, &(0x7f0000000040)='kfree\x00'}, 0x13) perf_event_open(&(0x7f0000002740)={0x5, 0x80, 0xfd, 0x3, 0x81, 0xeb, 0x0, 0x9, 0x0, 0x5, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0xfffffff7, 0x2, @perf_config_ext={0x2, 0x401}, 0x1800, 0x3, 0x3, 0x6, 0x80000001, 0x81, 0x20, 0x0, 0x5, 0x0, 0x10000}, r1, 0x9, 0xffffffffffffffff, 0x8) perf_event_open(&(0x7f0000000040)={0x0, 0x80, 0x1, 0x0, 0x1, 0x1f, 0x0, 0x7, 0x0, 0xa, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x8, 0x2, @perf_config_ext={0x100000001, 0x9}, 0x15, 0x72e0, 0xa9, 0x1, 0x0, 0x2, 0x5, 0x0, 0x1000}, r1, 0x7, 0xffffffffffffffff, 0x9) fstat(r0, &(0x7f0000000b00)) r2 = getegid() syz_mount_image$ext4(&(0x7f0000000100)='ext4\x00', &(0x7f0000000200)='./file1\x00', 0x3000000, &(0x7f0000003040)=ANY=[@ANYRES64=r2, @ANYBLOB="8555591a163448f4c52bee6cc0e12a6a8610718f818822e94c360e46f93ac9c63a1b40ea9d758c2b4e2d7c386a141016d11cb13fabc846fc7fb242c175fbdf96e2a96e80e82b73987b1d5dfd843c7e6748a15a0c4160f5e4c468e8f8e417bd3385546159881194fe3a7cf8307cd9c7ce0ca180a481d4dcaa6611ec5c8ff1c546360dea3da9f2bfc1fd71af9ebf2afe4285f013a3929a7096097976a16e2060e5f26e379011ea1811", @ANYRES64, @ANYBLOB="ca42ad87c41bb3b2507e4e12104f0cd507000001046f9445657db4996b10208d04454e11fb5b1383c5ce98e3062f45ec04e5b8b179df3d64a6cec05d29235e3cbe0b339abe9faee5cf3e44c97ce56a1dc359047114eeb3c23f331114039d75a664afc47e8273b79e83d301fc4ceec8b89911505b6743797c459195a7120ded1748f315deb90000ffed00000000000000", @ANYRES8=r2, @ANYRES8=r2, @ANYRES64, @ANYBLOB="bd85893dee1670c8c7e3b4a65ec61f224992fd11263b7749c7ee63dd4fc13cc5dfdde8a3099aaf21ece351c316d9bbd7e4ecc524c856f20d6a1818d6d75f702eb904653f9d55af", @ANYRESOCT], 0x1, 0x513, &(0x7f0000000c40)="$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") 20:40:55 executing program 3: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cpuset.effective_cpus\x00', 0x275a, 0x0) fcntl$lock(r0, 0x25, &(0x7f00000000c0)) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cpuset.effective_cpus\x00', 0x275a, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cpuset.effective_cpus\x00', 0x275a, 0x0) fcntl$lock(r2, 0x26, &(0x7f0000000000)={0x1}) fcntl$lock(r2, 0x25, &(0x7f00000000c0)) fcntl$lock(r1, 0x26, &(0x7f0000000000)={0x1}) ioctl$FIBMAP(r2, 0x1, &(0x7f0000000040)=0x2) close(r0) 20:40:55 executing program 1: ioctl$BTRFS_IOC_LOGICAL_INO(0xffffffffffffffff, 0xc0389424, &(0x7f0000000180)={0x1, 0x28, '\x00', 0x1, &(0x7f0000000080)=[0x0, 0x0, 0x0, 0x0, 0x0]}) r0 = socket$inet6(0xa, 0x3, 0x6) r1 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) r2 = dup2(r1, r0) ioctl$FIDEDUPERANGE(r0, 0xc0189436, &(0x7f0000000f00)=ANY=[@ANYBLOB="08000000000000000000000000000000000000002000000032057e68d5d647f4ed243c9d097db4c7bae602f8d4c84b5325f3d737af1c3ebe2901b056ac84d04eb9d8bfd4771499d444ff07000033206062c9a0527d2d0e4b0000fa0693ec3785977184911bffc60554e8950e91e1a8209818b4eb3440ae351192e1d7cf54ba6743f2db330481aac17f0961506d7ebd7ca999cf4e148c1ef2880f63693dfee2a6f2fafec2c059fd15db654600000000000000000076da8ec51705470a42729df6a32122af2a673d7409ca1b8a0da065e2bf7790c86a6b3014e1ef5d1c4000d3dff081d5a4c403971fe8869ab4973ffc7b24b6fbb4341ac1a0f5d56b64b9d23d6855e653f1e0418a6d9838196a7b145310a9b4c467199ecc3bd47b85aae47754bf695bdb85ea03f70beab5732a014c5f525bf2f9b9c6bd545e1a"]) ioctl$TIOCSBRK(r2, 0x5427) recvfrom$inet6(0xffffffffffffffff, &(0x7f0000000280)=""/134, 0x86, 0x40000102, &(0x7f0000000340)={0xa, 0x4e21, 0x77f, @mcast1, 0x403b3f}, 0x1c) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000001040)={{r2, 0xffffffffffffffff}, &(0x7f0000000140), &(0x7f0000000480)=r1}, 0x20) r4 = creat(&(0x7f0000000240)='./file0\x00', 0x0) stat(&(0x7f0000000040)='./file1\x00', &(0x7f0000000380)) fsetxattr$security_capability(r4, &(0x7f0000000100), &(0x7f0000000000)=@v1={0x1000000, [{0x80000000, 0x81}]}, 0xc, 0x0) newfstatat(0xffffffffffffff9c, &(0x7f00000000c0)='./file1\x00', &(0x7f0000001400), 0x400) close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x2) ioctl$TIOCSTI(r4, 0x5412, &(0x7f00000004c0)=0x40) fsync(0xffffffffffffffff) write$binfmt_misc(r4, &(0x7f0000001080)=ANY=[@ANYBLOB="7379d3c6"], 0x4) fallocate(r4, 0x100000011, 0x0, 0x2811fdff) open(&(0x7f0000000100)='.\x00', 0x20c2, 0x2d) open$dir(&(0x7f0000000500)='./file1\x00', 0x1c6c0, 0x0) r5 = openat$vcsu(0xffffffffffffff9c, &(0x7f0000000cc0), 0x400c00, 0x0) lsetxattr$security_selinux(&(0x7f0000001180)='./file1\x00', &(0x7f00000011c0), &(0x7f0000001300)='system_u:object_r:unconfined_exec_t:s0\x00', 0x27, 0x3) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000400)={0xffffffffffffffff, 0xe0, &(0x7f0000000300)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, &(0x7f00000000c0)=[0x0], &(0x7f0000000140), 0x0, 0x8, &(0x7f0000000200)=[{}, {}, {}, {}, {}], 0x28, 0x0, 0x0, 0x0, 0x0, 0x10, 0x8, 0x8, &(0x7f00000002c0)}}, 0x10) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000e80)=@bpf_lsm={0x1d, 0x4, &(0x7f0000000040)=@framed={{0x18, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x73fc}, [@generic={0x9, 0x8, 0x0, 0x7f, 0x200}]}, &(0x7f0000000880)='GPL\x00', 0x1f, 0x93, &(0x7f0000000cc0)=""/147, 0x40f00, 0x2, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, &(0x7f0000000b80)={0x9}, 0x8, 0x10, 0x0, 0x0, r6}, 0x80) r7 = socket$nl_generic(0x10, 0x3, 0x10) r8 = syz_genetlink_get_family_id$tipc(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$TIPC_CMD_ENABLE_BEARER(r7, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000001200)=ANY=[@ANYBLOB="3400000006c08fada241ee0a049e6fba3f36f40da839bbdf54c31768b0026f4261f56d51c5d81ba4cb99f8203c40d0a142fcd75ce26e408d229139f8c4e81109c56a18e453e8a537df21c4ec04a4f3e22f4ac125a28ad43e41107b1f7e79c8573985e54fd665e2913ca74da8c9f3fc2839258c19fa7ac20ebead31206cf280ea73f635bc5418b66554392dfd11874fef72bc53538aae3cb5ef8a80140f4737dd2c572a03ee1d5e3d627e", @ANYRESOCT=0x0, @ANYBLOB="010000000000000000000100000000000000014100000018001700000000000000007564503a73"], 0x34}, 0x1, 0x0, 0x0, 0x1}, 0x0) ioctl$AUTOFS_DEV_IOCTL_PROTOSUBVER(r1, 0xc0189373, &(0x7f0000000540)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x6}}, './file0\x00'}) sendmsg$TIPC_CMD_GET_MAX_PORTS(r5, &(0x7f0000001140)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x40000}, 0xc, &(0x7f0000001100)={&(0x7f00000010c0)={0x1c, r8, 0x400, 0x8000, 0x25dfdbfe, {}, ["", "", "", "", "", "", ""]}, 0x1c}, 0x1, 0x0, 0x0, 0x20048854}, 0x4004) bpf$PROG_LOAD(0x5, &(0x7f0000000e40)={0x5, 0x16, &(0x7f0000001340)=ANY=[@ANYBLOB="390000000100000000000000900000f117fa0000", @ANYRES32=r4, @ANYBLOB="1f00000000000000b703000000000000850000000c000000b61b0453c29f42b5be06c7010b4efffe000000000085000000a900000018150000", @ANYRES32=r3, @ANYBLOB="0000000000000000180100002020782500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b70300000000850000005d000000185500000100000000000000000000009500000000000000"], &(0x7f0000000b80)='syzkaller\x00', 0x1, 0xe8, &(0x7f0000000bc0)=""/232, 0x41000, 0x5b, '\x00', 0x0, 0xe, r5, 0x8, &(0x7f0000000d00)={0x5, 0x2}, 0x8, 0x10, &(0x7f0000000d40)={0x4, 0xe, 0x2, 0x8}, 0x10, r6, r4, 0x5, &(0x7f0000000d80), &(0x7f0000000dc0)=[{0x4, 0x3, 0x0, 0x2}, {0x3, 0x1, 0xa, 0xa}, {0x0, 0x3, 0x2, 0xa}, {0x0, 0x3, 0x7, 0x1}, {0x1, 0x5, 0xb, 0xc}], 0x10, 0x7}, 0x90) 20:40:55 executing program 2: r0 = perf_event_open(&(0x7f0000000a40)={0x2, 0x80, 0xcd, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @perf_bp={&(0x7f0000000200), 0x8}, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfb75}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000040)={0x0, 0x4, 0x0, &(0x7f0000000180)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x80) perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x208, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x4, 0x8001}, 0x4000, 0x0, 0x0, 0x0, 0x0, 0x14e, 0xd1}, 0x0, 0xbfffffffffffffff, r0, 0x19893a9f0a0e2244) r1 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) syz_clone(0x2000000, 0x0, 0x0, 0x0, 0x0, 0x0) r2 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x18, 0x5, &(0x7f00000002c0)=ANY=[@ANYBLOB="180000001800ff0f0000000000000000850000006d000000750000000800000095"], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x80) r3 = perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400, 0x80000, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x7, 0x1007}, 0x8006, 0x0, 0x0, 0x1, 0x4, 0x800000, 0x3}, 0x0, 0xffefffffffffffff, 0xffffffffffffffff, 0x9) ioctl$PERF_EVENT_IOC_SET_FILTER(r3, 0x40082406, &(0x7f00000003c0)='memory.numa_stat\x00') perf_event_open(0x0, 0x0, 0x0, r3, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000080)='sched_switch\x00', r2}, 0x10) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000380)={{0x1, 0xffffffffffffffff}, &(0x7f0000000000), &(0x7f0000000240)=r2}, 0x20) r5 = memfd_secret(0x0) syz_io_uring_setup(0x0, &(0x7f0000000300)={0x0, 0x2, 0x0, 0x0, 0x0, 0x0, r5}, 0x0, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f00000009c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000000a00)=0x14) r7 = openat2(0xffffffffffffff9c, &(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)={0x40841}, 0x18) write$binfmt_script(r7, &(0x7f0000000340)=ANY=[], 0xfffffdef) r8 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000b40)={0x1b, 0x0, 0x0, 0x7, 0x0, 0xffffffffffffffff, 0x200, '\x00', 0x0, 0xffffffffffffffff, 0x3, 0x1, 0x4}, 0x48) r9 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000bc0)={0x2, 0x4, 0x8, 0x1, 0x80, 0x1, 0x9, '\x00', 0x0, 0xffffffffffffffff, 0x4, 0x1, 0x4}, 0x48) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000d00)={0x11, 0x12, &(0x7f0000000440)=@raw=[@exit, @ringbuf_query={{0x18, 0x1, 0x1, 0x0, r4}}, @ringbuf_output={{0x18, 0x1, 0x1, 0x0, r5}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x10001}, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x4, 0x0, 0x0, 0x2}}, @exit, @initr0={0x18, 0x0, 0x0, 0x0, 0x6349, 0x0, 0x0, 0x0, 0xf685}, @ldst={0x3, 0x2, 0x1, 0x0, 0xb, 0x2543a83bb932833c, 0x1}], &(0x7f0000000940)='syzkaller\x00', 0x80000001, 0x27, &(0x7f0000000980)=""/39, 0x41000, 0x40, '\x00', r6, 0x0, r7, 0x8, &(0x7f0000000ac0)={0x3, 0x1}, 0x8, 0x10, &(0x7f0000000b00)={0x2, 0xc, 0xfffffe00, 0x2}, 0x10, 0x0, 0x0, 0x5, &(0x7f0000000c40)=[r2, 0x1, 0x1, r8, r9, r1], &(0x7f0000000c80)=[{0x4, 0x1, 0x8, 0xc}, {0x0, 0x4, 0xf, 0x4}, {0x1, 0x2, 0xd, 0x6}, {0x0, 0x4, 0x10, 0xc}, {0x2, 0x4, 0xd, 0x1}], 0x10, 0x20}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000280)={&(0x7f0000000140)='ext4_ext_show_extent\x00', r2}, 0x10) r10 = perf_event_open(&(0x7f0000000080)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) perf_event_open$cgroup(&(0x7f0000000300)={0x5, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_bp={&(0x7f0000000100)}, 0x81252, 0x6, 0x80000001, 0x0, 0x0, 0x0, 0x6, 0x0, 0x6, 0x0, 0x6}, 0xffffffffffffffff, 0xe, 0xffffffffffffffff, 0xc) perf_event_open(0x0, 0x0, 0x2, 0xffffffffffffffff, 0xb) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) perf_event_open(&(0x7f0000000840)={0x2, 0x80, 0x0, 0x7, 0x0, 0x80, 0x0, 0x3, 0x0, 0x9, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, @perf_config_ext={0x8000000000, 0x3}, 0x46c73247dfbe0d, 0x1007e, 0x0, 0x2, 0x0, 0x0, 0x6, 0x0, 0xffffffff, 0x0, 0x1c}, 0x0, 0x9, 0xffffffffffffffff, 0xd) bpf$PROG_LOAD(0x5, &(0x7f0000000780)={0x14, 0x4, &(0x7f00000008c0)=ANY=[@ANYBLOB="850000006b00000018150000a3df7ddd9621fb0201050062d91123e632b2f902ad1e9f1cc7a66ed51ac8a4070000000000000019a83f0b7c9502871fb1ca3dc499e804bbbc359859ed6fd9f104fc7ed900d122072d8275a24d000000000601c3a63953a7b36fe458", @ANYRES32, @ANYBLOB="00000000000000002d59e4eda4000000"], &(0x7f0000000400)='syzkaller\x00', 0xfff, 0xe3, &(0x7f0000000580)=""/227, 0x0, 0x4, '\x00', 0x0, 0x24, 0xffffffffffffffff, 0x8, &(0x7f0000000500)={0x1, 0x3}, 0x8, 0x10, &(0x7f0000000680)={0x5, 0x6, 0x81, 0x9}, 0x10, 0xffffffffffffffff, 0xffffffffffffffff, 0x0, &(0x7f00000006c0)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, r10]}, 0x80) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x4030582a, &(0x7f0000000040)=0x91) [ 107.178580][ T4139] EXT4-fs (loop0): unmounting filesystem 00000000-0000-0000-0000-000000000000. [ 107.285382][ T5325] loop0: detected capacity change from 0 to 512 [ 107.331943][ T5325] EXT4-fs (loop0): 1 orphan inode deleted [ 107.337840][ T5325] EXT4-fs (loop0): mounted filesystem 00000000-0000-0000-0000-000000000000 r/w without journal. Quota mode: writeback. [ 107.351393][ T311] Quota error (device loop0): do_check_range: Getting dqdh_entries 15 out of range 0-14 [ 107.432981][ T5325] ext4 filesystem being mounted at /root/syzkaller-testdir338643557/syzkaller.M396af/60/file1 supports timestamps until 2038-01-19 (0x7fffffff) 20:40:55 executing program 0: r0 = open(&(0x7f0000000040)='./bus\x00', 0x8001141042, 0x0) connect$unix(r0, &(0x7f0000000240)=@file={0x0, './bus\x00'}, 0x6e) setuid(0x0) getgid() ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f0000000a80)) r1 = gettid() bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000080)={r1, 0xffffffffffffffff, 0x0, 0x6, &(0x7f0000000040)='kfree\x00'}, 0x13) perf_event_open(&(0x7f0000002740)={0x5, 0x80, 0xfd, 0x3, 0x81, 0xeb, 0x0, 0x9, 0x0, 0x5, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0xfffffff7, 0x2, @perf_config_ext={0x2, 0x401}, 0x1800, 0x3, 0x3, 0x6, 0x80000001, 0x81, 0x20, 0x0, 0x5, 0x0, 0x10000}, r1, 0x9, 0xffffffffffffffff, 0x8) perf_event_open(&(0x7f0000000040)={0x0, 0x80, 0x1, 0x0, 0x1, 0x1f, 0x0, 0x7, 0x0, 0xa, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x8, 0x2, @perf_config_ext={0x100000001, 0x9}, 0x15, 0x72e0, 0xa9, 0x1, 0x0, 0x2, 0x5, 0x0, 0x1000}, r1, 0x7, 0xffffffffffffffff, 0x9) fstat(r0, &(0x7f0000000b00)) r2 = getegid() syz_mount_image$ext4(&(0x7f0000000100)='ext4\x00', &(0x7f0000000200)='./file1\x00', 0x3000000, &(0x7f0000003040)=ANY=[@ANYRES64=r2, @ANYBLOB="8555591a163448f4c52bee6cc0e12a6a8610718f818822e94c360e46f93ac9c63a1b40ea9d758c2b4e2d7c386a141016d11cb13fabc846fc7fb242c175fbdf96e2a96e80e82b73987b1d5dfd843c7e6748a15a0c4160f5e4c468e8f8e417bd3385546159881194fe3a7cf8307cd9c7ce0ca180a481d4dcaa6611ec5c8ff1c546360dea3da9f2bfc1fd71af9ebf2afe4285f013a3929a7096097976a16e2060e5f26e379011ea1811", @ANYRES64, @ANYBLOB="ca42ad87c41bb3b2507e4e12104f0cd507000001046f9445657db4996b10208d04454e11fb5b1383c5ce98e3062f45ec04e5b8b179df3d64a6cec05d29235e3cbe0b339abe9faee5cf3e44c97ce56a1dc359047114eeb3c23f331114039d75a664afc47e8273b79e83d301fc4ceec8b89911505b6743797c459195a7120ded1748f315deb90000ffed00000000000000", @ANYRES8=r2, @ANYRES8=r2, @ANYRES64, @ANYBLOB="bd85893dee1670c8c7e3b4a65ec61f224992fd11263b7749c7ee63dd4fc13cc5dfdde8a3099aaf21ece351c316d9bbd7e4ecc524c856f20d6a1818d6d75f702eb904653f9d55af", @ANYRESOCT], 0x1, 0x513, &(0x7f0000000c40)="$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") [ 107.524276][ T4139] EXT4-fs (loop0): unmounting filesystem 00000000-0000-0000-0000-000000000000. 20:40:56 executing program 1: ioctl$BTRFS_IOC_LOGICAL_INO(0xffffffffffffffff, 0xc0389424, &(0x7f0000000180)={0x1, 0x28, '\x00', 0x1, &(0x7f0000000080)=[0x0, 0x0, 0x0, 0x0, 0x0]}) r0 = socket$inet6(0xa, 0x3, 0x6) r1 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) r2 = dup2(r1, r0) ioctl$FIDEDUPERANGE(r0, 0xc0189436, &(0x7f0000000f00)=ANY=[@ANYBLOB="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"]) ioctl$TIOCSBRK(r2, 0x5427) recvfrom$inet6(0xffffffffffffffff, &(0x7f0000000280)=""/134, 0x86, 0x40000102, &(0x7f0000000340)={0xa, 0x4e21, 0x77f, @mcast1, 0x403b3f}, 0x1c) syz_read_part_table(0x593, &(0x7f00000005c0)="$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") r3 = creat(&(0x7f0000000240)='./file0\x00', 0x0) stat(&(0x7f0000000040)='./file1\x00', &(0x7f0000000380)) fsetxattr$security_capability(r3, &(0x7f0000000100), &(0x7f0000000000)=@v1={0x1000000, [{0x80000000, 0x81}]}, 0xc, 0x0) newfstatat(0xffffffffffffff9c, &(0x7f00000000c0)='./file1\x00', &(0x7f0000001400), 0x400) close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x2) ioctl$TIOCSTI(r3, 0x5412, &(0x7f00000004c0)=0x40) fsync(0xffffffffffffffff) write$binfmt_misc(r3, &(0x7f0000001080)=ANY=[@ANYBLOB="7379d3c6"], 0x4) fallocate(r3, 0x100000011, 0x0, 0x2811fdff) open(&(0x7f0000000100)='.\x00', 0x20c2, 0x2d) open$dir(&(0x7f0000000500)='./file1\x00', 0x1c6c0, 0x0) r4 = openat$vcsu(0xffffffffffffff9c, &(0x7f0000000cc0), 0x400c00, 0x0) lsetxattr$security_selinux(&(0x7f0000001180)='./file1\x00', &(0x7f00000011c0), &(0x7f0000001300)='system_u:object_r:unconfined_exec_t:s0\x00', 0x27, 0x3) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000400)={0xffffffffffffffff, 0xe0, &(0x7f0000000300)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, &(0x7f00000000c0)=[0x0], &(0x7f0000000140), 0x0, 0x8, &(0x7f0000000200)=[{}, {}, {}, {}, {}], 0x28, 0x0, 0x0, 0x0, 0x0, 0x10, 0x8, 0x8, &(0x7f00000002c0)}}, 0x10) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000e80)=@bpf_lsm={0x1d, 0x4, &(0x7f0000000040)=@framed={{0x18, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x73fc}, [@generic={0x9, 0x8, 0x0, 0x7f, 0x200}]}, &(0x7f0000000880)='GPL\x00', 0x1f, 0x93, &(0x7f0000000cc0)=""/147, 0x40f00, 0x2, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, &(0x7f0000000b80)={0x9}, 0x8, 0x10, 0x0, 0x0, r5}, 0x80) r6 = socket$nl_generic(0x10, 0x3, 0x10) r7 = syz_genetlink_get_family_id$tipc(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$TIPC_CMD_ENABLE_BEARER(r6, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000001200)=ANY=[@ANYBLOB="3400000006c08fada241ee0a049e6fba3f36f40da839bbdf54c31768b0026f4261f56d51c5d81ba4cb99f8203c40d0a142fcd75ce26e408d229139f8c4e81109c56a18e453e8a537df21c4ec04a4f3e22f4ac125a28ad43e41107b1f7e79c8573985e54fd665e2913ca74da8c9f3fc2839258c19fa7ac20ebead31206cf280ea73f635bc5418b66554392dfd11874fef72bc53538aae3cb5ef8a80140f4737dd2c572a03ee1d5e3d627e", @ANYRESOCT=0x0, @ANYBLOB="010000000000000000000100000000000000014100000018001700000000000000007564503a73"], 0x34}, 0x1, 0x0, 0x0, 0x1}, 0x0) ioctl$AUTOFS_DEV_IOCTL_PROTOSUBVER(r1, 0xc0189373, &(0x7f0000000540)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x6}}, './file0\x00'}) sendmsg$TIPC_CMD_GET_MAX_PORTS(r4, &(0x7f0000001140)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x40000}, 0xc, &(0x7f0000001100)={&(0x7f00000010c0)={0x1c, r7, 0x400, 0x8000, 0x25dfdbfe, {}, ["", "", "", "", "", "", ""]}, 0x1c}, 0x1, 0x0, 0x0, 0x20048854}, 0x4004) bpf$PROG_LOAD(0x5, &(0x7f0000000e40)={0x5, 0x16, &(0x7f0000001340)=ANY=[@ANYBLOB="390000000100000000000000900000f117fa0000", @ANYRES32=r3, @ANYBLOB="1f00000000000000b703000000000000850000000c000000b61b0453c29f42b5be06c7010b4efffe000000000085000000a900000018150000", @ANYRES32, @ANYBLOB="0000000000000000180100002020782500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b70300000000850000005d000000185500000100000000000000000000009500000000000000"], &(0x7f0000000b80)='syzkaller\x00', 0x1, 0xe8, &(0x7f0000000bc0)=""/232, 0x41000, 0x5b, '\x00', 0x0, 0xe, r4, 0x8, &(0x7f0000000d00)={0x5, 0x2}, 0x8, 0x10, &(0x7f0000000d40)={0x4, 0xe, 0x2, 0x8}, 0x10, r5, r3, 0x5, &(0x7f0000000d80), &(0x7f0000000dc0)=[{0x4, 0x3, 0x0, 0x2}, {0x3, 0x1, 0xa, 0xa}, {0x0, 0x3, 0x2, 0xa}, {0x0, 0x3, 0x7, 0x1}, {0x1, 0x5, 0xb, 0xc}], 0x10, 0x7}, 0x90) 20:40:56 executing program 2: r0 = perf_event_open(&(0x7f0000000a40)={0x2, 0x80, 0xcd, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @perf_bp={&(0x7f0000000200), 0x8}, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfb75}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000040)={0x0, 0x4, 0x0, &(0x7f0000000180)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x80) perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x208, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x4, 0x8001}, 0x4000, 0x0, 0x0, 0x0, 0x0, 0x14e, 0xd1}, 0x0, 0xbfffffffffffffff, r0, 0x19893a9f0a0e2244) r1 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) syz_clone(0x2000000, 0x0, 0x0, 0x0, 0x0, 0x0) r2 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x18, 0x5, &(0x7f00000002c0)=ANY=[@ANYBLOB="180000001800ff0f0000000000000000850000006d000000750000000800000095"], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x80) r3 = perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400, 0x80000, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x7, 0x1007}, 0x8006, 0x0, 0x0, 0x1, 0x4, 0x800000, 0x3}, 0x0, 0xffefffffffffffff, 0xffffffffffffffff, 0x9) ioctl$PERF_EVENT_IOC_SET_FILTER(r3, 0x40082406, &(0x7f00000003c0)='memory.numa_stat\x00') perf_event_open(0x0, 0x0, 0x0, r3, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000080)='sched_switch\x00', r2}, 0x10) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000380)={{0x1, 0xffffffffffffffff}, &(0x7f0000000000), &(0x7f0000000240)=r2}, 0x20) r5 = memfd_secret(0x0) syz_io_uring_setup(0x0, &(0x7f0000000300)={0x0, 0x2, 0x0, 0x0, 0x0, 0x0, r5}, 0x0, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f00000009c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000000a00)=0x14) r7 = openat2(0xffffffffffffff9c, &(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)={0x40841}, 0x18) write$binfmt_script(r7, &(0x7f0000000340)=ANY=[], 0xfffffdef) r8 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000b40)={0x1b, 0x0, 0x0, 0x7, 0x0, 0xffffffffffffffff, 0x200, '\x00', 0x0, 0xffffffffffffffff, 0x3, 0x1, 0x4}, 0x48) r9 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000bc0)={0x2, 0x4, 0x8, 0x1, 0x80, 0x1, 0x9, '\x00', 0x0, 0xffffffffffffffff, 0x4, 0x1, 0x4}, 0x48) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000d00)={0x11, 0x12, &(0x7f0000000440)=@raw=[@exit, @ringbuf_query={{0x18, 0x1, 0x1, 0x0, r4}}, @ringbuf_output={{0x18, 0x1, 0x1, 0x0, r5}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x10001}, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x4, 0x0, 0x0, 0x2}}, @exit, @initr0={0x18, 0x0, 0x0, 0x0, 0x6349, 0x0, 0x0, 0x0, 0xf685}, @ldst={0x3, 0x2, 0x1, 0x0, 0xb, 0x2543a83bb932833c, 0x1}], &(0x7f0000000940)='syzkaller\x00', 0x80000001, 0x27, &(0x7f0000000980)=""/39, 0x41000, 0x40, '\x00', r6, 0x0, r7, 0x8, &(0x7f0000000ac0)={0x3, 0x1}, 0x8, 0x10, &(0x7f0000000b00)={0x2, 0xc, 0xfffffe00, 0x2}, 0x10, 0x0, 0x0, 0x5, &(0x7f0000000c40)=[r2, 0x1, 0x1, r8, r9, r1], &(0x7f0000000c80)=[{0x4, 0x1, 0x8, 0xc}, {0x0, 0x4, 0xf, 0x4}, {0x1, 0x2, 0xd, 0x6}, {0x0, 0x4, 0x10, 0xc}, {0x2, 0x4, 0xd, 0x1}], 0x10, 0x20}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000280)={&(0x7f0000000140)='ext4_ext_show_extent\x00', r2}, 0x10) r10 = perf_event_open(&(0x7f0000000080)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r11 = gettid() perf_event_open$cgroup(&(0x7f0000000300)={0x5, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_bp={&(0x7f0000000100)}, 0x81252, 0x6, 0x80000001, 0x0, 0x0, 0x0, 0x6, 0x0, 0x6, 0x0, 0x6}, 0xffffffffffffffff, 0xe, 0xffffffffffffffff, 0xc) perf_event_open(0x0, r11, 0x2, 0xffffffffffffffff, 0xb) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) perf_event_open(&(0x7f0000000840)={0x2, 0x80, 0x0, 0x7, 0x0, 0x80, 0x0, 0x3, 0x0, 0x9, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, @perf_config_ext={0x8000000000, 0x3}, 0x46c73247dfbe0d, 0x1007e, 0x0, 0x2, 0x0, 0x0, 0x6, 0x0, 0xffffffff, 0x0, 0x1c}, 0x0, 0x9, 0xffffffffffffffff, 0xd) bpf$PROG_LOAD(0x5, &(0x7f0000000780)={0x14, 0x4, &(0x7f00000008c0)=ANY=[@ANYBLOB="850000006b00000018150000a3df7ddd9621fb0201050062d91123e632b2f902ad1e9f1cc7a66ed51ac8a4070000000000000019a83f0b7c9502871fb1ca3dc499e804bbbc359859ed6fd9f104fc7ed900d122072d8275a24d000000000601c3a63953a7b36fe458", @ANYRES32, @ANYBLOB="00000000000000002d59e4eda4000000"], &(0x7f0000000400)='syzkaller\x00', 0xfff, 0xe3, &(0x7f0000000580)=""/227, 0x0, 0x4, '\x00', 0x0, 0x24, 0xffffffffffffffff, 0x8, &(0x7f0000000500)={0x1, 0x3}, 0x8, 0x10, &(0x7f0000000680)={0x5, 0x6, 0x81, 0x9}, 0x10, 0xffffffffffffffff, 0xffffffffffffffff, 0x0, &(0x7f00000006c0)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, r10]}, 0x80) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x4030582a, &(0x7f0000000040)=0x91) [ 107.647800][ T5368] loop0: detected capacity change from 0 to 512 [ 107.668671][ T5370] loop1: detected capacity change from 0 to 2048 [ 107.714430][ T5368] EXT4-fs (loop0): 1 orphan inode deleted [ 107.734396][ T5370] loop1: p2 p3 p7 [ 107.738661][ T1523] Quota error (device loop0): do_check_range: Getting dqdh_entries 15 out of range 0-14 [ 107.750493][ T5368] ext4 filesystem being mounted at /root/syzkaller-testdir338643557/syzkaller.M396af/61/file1 supports timestamps until 2038-01-19 (0x7fffffff) 20:40:56 executing program 0: r0 = open(&(0x7f0000000040)='./bus\x00', 0x8001141042, 0x0) connect$unix(r0, &(0x7f0000000240)=@file={0x0, './bus\x00'}, 0x6e) setuid(0x0) getgid() ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f0000000a80)) r1 = gettid() bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000080)={r1, 0xffffffffffffffff, 0x0, 0x6, &(0x7f0000000040)='kfree\x00'}, 0x13) perf_event_open(&(0x7f0000002740)={0x5, 0x80, 0xfd, 0x3, 0x81, 0xeb, 0x0, 0x9, 0x0, 0x5, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0xfffffff7, 0x2, @perf_config_ext={0x2, 0x401}, 0x1800, 0x3, 0x3, 0x6, 0x80000001, 0x81, 0x20, 0x0, 0x5, 0x0, 0x10000}, r1, 0x9, 0xffffffffffffffff, 0x8) perf_event_open(&(0x7f0000000040)={0x0, 0x80, 0x1, 0x0, 0x1, 0x1f, 0x0, 0x7, 0x0, 0xa, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x8, 0x2, @perf_config_ext={0x100000001, 0x9}, 0x15, 0x72e0, 0xa9, 0x1, 0x0, 0x2, 0x5, 0x0, 0x1000}, r1, 0x7, 0xffffffffffffffff, 0x9) fstat(r0, &(0x7f0000000b00)) r2 = getegid() syz_mount_image$ext4(&(0x7f0000000100)='ext4\x00', &(0x7f0000000200)='./file1\x00', 0x3000000, &(0x7f0000003040)=ANY=[@ANYRES64=r2, @ANYBLOB="8555591a163448f4c52bee6cc0e12a6a8610718f818822e94c360e46f93ac9c63a1b40ea9d758c2b4e2d7c386a141016d11cb13fabc846fc7fb242c175fbdf96e2a96e80e82b73987b1d5dfd843c7e6748a15a0c4160f5e4c468e8f8e417bd3385546159881194fe3a7cf8307cd9c7ce0ca180a481d4dcaa6611ec5c8ff1c546360dea3da9f2bfc1fd71af9ebf2afe4285f013a3929a7096097976a16e2060e5f26e379011ea1811", @ANYRES64, @ANYBLOB="ca42ad87c41bb3b2507e4e12104f0cd507000001046f9445657db4996b10208d04454e11fb5b1383c5ce98e3062f45ec04e5b8b179df3d64a6cec05d29235e3cbe0b339abe9faee5cf3e44c97ce56a1dc359047114eeb3c23f331114039d75a664afc47e8273b79e83d301fc4ceec8b89911505b6743797c459195a7120ded1748f315deb90000ffed00000000000000", @ANYRES8=r2, @ANYRES8=r2, @ANYRES64, @ANYBLOB="bd85893dee1670c8c7e3b4a65ec61f224992fd11263b7749c7ee63dd4fc13cc5dfdde8a3099aaf21ece351c316d9bbd7e4ecc524c856f20d6a1818d6d75f702eb904653f9d55af", @ANYRESOCT], 0x1, 0x513, &(0x7f0000000c40)="$eJzs3W9rJHcdAPDvTLJp7i41WxU5C7bFVu6K3m7S2DaKtBVEHxXU+jzGZBNCNtmQ3dRLKJriCxBEVPAF+ETwBQjSlyDCgT4XFUX0Th/qjczuRPNnN1mSTfbcfD4w2d9v/n2/vyE7O39+zARwbb0QEW9FxFhEvBwR08X4tBgW8sp+Z75HD99byocksuydvyWRFOMO1pXXxyPiVmeRmIyIr38l4lvJybjN3b31xXq9tl3Uq62NrWpzd+/e2sbiam21tjk3N/va/Ovzr87PZIULtbMcEW986U8/+v7PvvzGrz7z7d8v/OXud/K0vvCxTt4RsXShAD101l1qb4sD+TbavoxgQ5K3pzQ27CwAAOhHfoz/4Yj4ZPv4fzrG2kdzAAAAwCjJ3pyKfyURGQAAADCy0oiYiiStFH0BpiJNK5VOH96Pxs203mi2Pr3S2NlczqdFlKOUrqzVazNFX+FylJK8Plv0sT2ov3KsPhcRz0TED6dvtOuVpUZ9edgXPwAAAOCauPX80fP/f06n7TIAAAAwYso9KwAAAMCocMoPAAAAo8/5PwAAAIy0r779dj5kB+/xXn53d2e98e695VpzvbKxs1RZamxvVVYbjdX2M/s2zlpfvdHY+mxs7tyvtmrNVrW5u7ew0djZbC2sHXkFNgAAAHCFnnn+g98lEbH/+RvtIYrnAAIc8cdhJwAM0tiwEwCGZnzYCQBDUzpzDnsIGHXJGdNPdt7pXCuMX19OPgAAwODd+fjJ+/8TxbSzrw0A/8/09QGA68fdPbi+SuftAXh70JkAw/KhzsdTvab3fHhHH/f/O9cYsuxciQEAAAMz1R6StFIcp09FmlYqEU+3XwtQSlbW6rWZ4vzgt9Olp/L6bHvJ5Mw+wwAAAAAAAAAAAAAAAAAAAAAAAABAR5YlkQEAAAAjLSL9c9J+mn/EnemXpo5eHTj21q+fvvPj+4ut1vZsxETy9+l81EREtH5SjH8l80oAAAAAeAJ0ztOLz9lhZwMAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAADAqHn08L2lg+Eq4/71ixFR7hZ/PCbbn5NRioib/0hi/NBySUSMDSD+/vsRcbtb/CQeZ1lWLrLoFv/GJccvtzdN9/hpRNwaQHy4zj7I9z9vdfv+pfFC+7P792+8GC6q9/4v/e/+b6zH/ufpY/Venn3wi2rP+O9HPDveff9zED/pxD8SIq+82Gcbv/mNvb2uEw6tslv8w7GqrY2tanN3797axuJqbbW2OTc3+9r86/Ovzs9UV9bqteJv1zA/+MQvH5/W/ps94pePtv/E9n+pr9Zn8e8H9x9+pFMpdYt/98Xuv7+3e8RPi9++TxXlfPqdg/J+p3zYcz//zXOntX+5R/snz2j/3b7aH597+Wvf+0PXKSe2BgBwFZq7e+uL9Xpt+5TCZB/zXHHhzScjjQEW4slIY1iF7Lud/8eLreeCi58oZBdZfDwGkMbEie/pWJx3hUnEfr6uPv8hAQCAEfO/g/7T7iABAAAAAAAAAAAAAAAAAAAAl+mcjyWbjIi+Zz4ec384TQUAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAONV/AgAA//8FStFZ") 20:40:56 executing program 1: ioctl$BTRFS_IOC_LOGICAL_INO(0xffffffffffffffff, 0xc0389424, &(0x7f0000000180)={0x1, 0x28, '\x00', 0x1, &(0x7f0000000080)=[0x0, 0x0, 0x0, 0x0, 0x0]}) r0 = socket$inet6(0xa, 0x3, 0x6) r1 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) r2 = dup2(r1, r0) ioctl$FIDEDUPERANGE(r0, 0xc0189436, &(0x7f0000000f00)=ANY=[@ANYBLOB="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"]) ioctl$TIOCSBRK(r2, 0x5427) recvfrom$inet6(0xffffffffffffffff, &(0x7f0000000280)=""/134, 0x86, 0x40000102, &(0x7f0000000340)={0xa, 0x4e21, 0x77f, @mcast1, 0x403b3f}, 0x1c) syz_read_part_table(0x593, &(0x7f00000005c0)="$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") r3 = creat(&(0x7f0000000240)='./file0\x00', 0x0) stat(&(0x7f0000000040)='./file1\x00', &(0x7f0000000380)) fsetxattr$security_capability(r3, &(0x7f0000000100), &(0x7f0000000000)=@v1={0x1000000, [{0x80000000, 0x81}]}, 0xc, 0x0) newfstatat(0xffffffffffffff9c, &(0x7f00000000c0)='./file1\x00', &(0x7f0000001400), 0x400) close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x2) ioctl$TIOCSTI(r3, 0x5412, &(0x7f00000004c0)=0x40) fsync(0xffffffffffffffff) write$binfmt_misc(r3, &(0x7f0000001080)=ANY=[@ANYBLOB="7379d3c6"], 0x4) fallocate(r3, 0x100000011, 0x0, 0x2811fdff) open(&(0x7f0000000100)='.\x00', 0x20c2, 0x2d) open$dir(&(0x7f0000000500)='./file1\x00', 0x1c6c0, 0x0) r4 = openat$vcsu(0xffffffffffffff9c, &(0x7f0000000cc0), 0x400c00, 0x0) lsetxattr$security_selinux(&(0x7f0000001180)='./file1\x00', &(0x7f00000011c0), &(0x7f0000001300)='system_u:object_r:unconfined_exec_t:s0\x00', 0x27, 0x3) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000400)={0xffffffffffffffff, 0xe0, &(0x7f0000000300)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, &(0x7f00000000c0)=[0x0], &(0x7f0000000140), 0x0, 0x8, &(0x7f0000000200)=[{}, {}, {}, {}, {}], 0x28, 0x0, 0x0, 0x0, 0x0, 0x10, 0x8, 0x8, &(0x7f00000002c0)}}, 0x10) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000e80)=@bpf_lsm={0x1d, 0x4, &(0x7f0000000040)=@framed={{0x18, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x73fc}, [@generic={0x9, 0x8, 0x0, 0x7f, 0x200}]}, &(0x7f0000000880)='GPL\x00', 0x1f, 0x93, &(0x7f0000000cc0)=""/147, 0x40f00, 0x2, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, &(0x7f0000000b80)={0x9}, 0x8, 0x10, 0x0, 0x0, r5}, 0x80) r6 = socket$nl_generic(0x10, 0x3, 0x10) r7 = syz_genetlink_get_family_id$tipc(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$TIPC_CMD_ENABLE_BEARER(r6, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000001200)=ANY=[@ANYBLOB="3400000006c08fada241ee0a049e6fba3f36f40da839bbdf54c31768b0026f4261f56d51c5d81ba4cb99f8203c40d0a142fcd75ce26e408d229139f8c4e81109c56a18e453e8a537df21c4ec04a4f3e22f4ac125a28ad43e41107b1f7e79c8573985e54fd665e2913ca74da8c9f3fc2839258c19fa7ac20ebead31206cf280ea73f635bc5418b66554392dfd11874fef72bc53538aae3cb5ef8a80140f4737dd2c572a03ee1d5e3d627e", @ANYRESOCT=0x0, @ANYBLOB="010000000000000000000100000000000000014100000018001700000000000000007564503a73"], 0x34}, 0x1, 0x0, 0x0, 0x1}, 0x0) ioctl$AUTOFS_DEV_IOCTL_PROTOSUBVER(r1, 0xc0189373, &(0x7f0000000540)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x6}}, './file0\x00'}) sendmsg$TIPC_CMD_GET_MAX_PORTS(r4, &(0x7f0000001140)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x40000}, 0xc, &(0x7f0000001100)={&(0x7f00000010c0)={0x1c, r7, 0x400, 0x8000, 0x25dfdbfe, {}, ["", "", "", "", "", "", ""]}, 0x1c}, 0x1, 0x0, 0x0, 0x20048854}, 0x4004) bpf$PROG_LOAD(0x5, &(0x7f0000000e40)={0x5, 0x16, &(0x7f0000001340)=ANY=[@ANYBLOB="390000000100000000000000900000f117fa0000", @ANYRES32=r3, @ANYBLOB="1f00000000000000b703000000000000850000000c000000b61b0453c29f42b5be06c7010b4efffe000000000085000000a900000018150000", @ANYRES32, @ANYBLOB="0000000000000000180100002020782500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b70300000000850000005d000000185500000100000000000000000000009500000000000000"], &(0x7f0000000b80)='syzkaller\x00', 0x1, 0xe8, &(0x7f0000000bc0)=""/232, 0x41000, 0x5b, '\x00', 0x0, 0xe, r4, 0x8, &(0x7f0000000d00)={0x5, 0x2}, 0x8, 0x10, &(0x7f0000000d40)={0x4, 0xe, 0x2, 0x8}, 0x10, r5, r3, 0x5, &(0x7f0000000d80), &(0x7f0000000dc0)=[{0x4, 0x3, 0x0, 0x2}, {0x3, 0x1, 0xa, 0xa}, {0x0, 0x3, 0x2, 0xa}, {0x0, 0x3, 0x7, 0x1}, {0x1, 0x5, 0xb, 0xc}], 0x10, 0x7}, 0x90) [ 107.858767][ T3326] blk_print_req_error: 22 callbacks suppressed [ 107.858782][ T3326] I/O error, dev loop1, sector 0 op 0x0:(READ) flags 0x80700 phys_seg 1 prio class 0 [ 107.914767][ T5397] loop0: detected capacity change from 0 to 512 [ 107.928410][ T3169] udevd[3169]: inotify_add_watch(7, /dev/loop1p7, 10) failed: No such file or directory [ 107.939135][ T4030] udevd[4030]: inotify_add_watch(7, /dev/loop1p3, 10) failed: No such file or directory [ 107.962149][ T5398] loop1: detected capacity change from 0 to 2048 [ 107.991114][ T5397] EXT4-fs (loop0): 1 orphan inode deleted [ 108.017918][ T5397] ext4 filesystem being mounted at /root/syzkaller-testdir338643557/syzkaller.M396af/62/file1 supports timestamps until 2038-01-19 (0x7fffffff) 20:40:56 executing program 0: r0 = open(&(0x7f0000000040)='./bus\x00', 0x8001141042, 0x0) connect$unix(r0, &(0x7f0000000240)=@file={0x0, './bus\x00'}, 0x6e) setuid(0x0) getgid() ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f0000000a80)) r1 = gettid() bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000080)={r1, 0xffffffffffffffff, 0x0, 0x6, &(0x7f0000000040)='kfree\x00'}, 0x13) perf_event_open(&(0x7f0000002740)={0x5, 0x80, 0xfd, 0x3, 0x81, 0xeb, 0x0, 0x9, 0x0, 0x5, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0xfffffff7, 0x2, @perf_config_ext={0x2, 0x401}, 0x1800, 0x3, 0x3, 0x6, 0x80000001, 0x81, 0x20, 0x0, 0x5, 0x0, 0x10000}, r1, 0x9, 0xffffffffffffffff, 0x8) perf_event_open(&(0x7f0000000040)={0x0, 0x80, 0x1, 0x0, 0x1, 0x1f, 0x0, 0x7, 0x0, 0xa, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x8, 0x2, @perf_config_ext={0x100000001, 0x9}, 0x15, 0x72e0, 0xa9, 0x1, 0x0, 0x2, 0x5, 0x0, 0x1000}, r1, 0x7, 0xffffffffffffffff, 0x9) fstat(r0, &(0x7f0000000b00)) r2 = getegid() syz_mount_image$ext4(&(0x7f0000000100)='ext4\x00', &(0x7f0000000200)='./file1\x00', 0x3000000, &(0x7f0000003040)=ANY=[@ANYRES64=r2, @ANYBLOB="8555591a163448f4c52bee6cc0e12a6a8610718f818822e94c360e46f93ac9c63a1b40ea9d758c2b4e2d7c386a141016d11cb13fabc846fc7fb242c175fbdf96e2a96e80e82b73987b1d5dfd843c7e6748a15a0c4160f5e4c468e8f8e417bd3385546159881194fe3a7cf8307cd9c7ce0ca180a481d4dcaa6611ec5c8ff1c546360dea3da9f2bfc1fd71af9ebf2afe4285f013a3929a7096097976a16e2060e5f26e379011ea1811", @ANYRES64, @ANYBLOB="ca42ad87c41bb3b2507e4e12104f0cd507000001046f9445657db4996b10208d04454e11fb5b1383c5ce98e3062f45ec04e5b8b179df3d64a6cec05d29235e3cbe0b339abe9faee5cf3e44c97ce56a1dc359047114eeb3c23f331114039d75a664afc47e8273b79e83d301fc4ceec8b89911505b6743797c459195a7120ded1748f315deb90000ffed00000000000000", @ANYRES8=r2, @ANYRES8=r2, @ANYRES64, @ANYBLOB="bd85893dee1670c8c7e3b4a65ec61f224992fd11263b7749c7ee63dd4fc13cc5dfdde8a3099aaf21ece351c316d9bbd7e4ecc524c856f20d6a1818d6d75f702eb904653f9d55af", @ANYRESOCT], 0x1, 0x513, &(0x7f0000000c40)="$eJzs3W9rJHcdAPDvTLJp7i41WxU5C7bFVu6K3m7S2DaKtBVEHxXU+jzGZBNCNtmQ3dRLKJriCxBEVPAF+ETwBQjSlyDCgT4XFUX0Th/qjczuRPNnN1mSTfbcfD4w2d9v/n2/vyE7O39+zARwbb0QEW9FxFhEvBwR08X4tBgW8sp+Z75HD99byocksuydvyWRFOMO1pXXxyPiVmeRmIyIr38l4lvJybjN3b31xXq9tl3Uq62NrWpzd+/e2sbiam21tjk3N/va/Ovzr87PZIULtbMcEW986U8/+v7PvvzGrz7z7d8v/OXud/K0vvCxTt4RsXShAD101l1qb4sD+TbavoxgQ5K3pzQ27CwAAOhHfoz/4Yj4ZPv4fzrG2kdzAAAAwCjJ3pyKfyURGQAAADCy0oiYiiStFH0BpiJNK5VOH96Pxs203mi2Pr3S2NlczqdFlKOUrqzVazNFX+FylJK8Plv0sT2ov3KsPhcRz0TED6dvtOuVpUZ9edgXPwAAAOCauPX80fP/f06n7TIAAAAwYso9KwAAAMCocMoPAAAAo8/5PwAAAIy0r779dj5kB+/xXn53d2e98e695VpzvbKxs1RZamxvVVYbjdX2M/s2zlpfvdHY+mxs7tyvtmrNVrW5u7ew0djZbC2sHXkFNgAAAHCFnnn+g98lEbH/+RvtIYrnAAIc8cdhJwAM0tiwEwCGZnzYCQBDUzpzDnsIGHXJGdNPdt7pXCuMX19OPgAAwODd+fjJ+/8TxbSzrw0A/8/09QGA68fdPbi+SuftAXh70JkAw/KhzsdTvab3fHhHH/f/O9cYsuxciQEAAAMz1R6StFIcp09FmlYqEU+3XwtQSlbW6rWZ4vzgt9Olp/L6bHvJ5Mw+wwAAAAAAAAAAAAAAAAAAAAAAAABAR5YlkQEAAAAjLSL9c9J+mn/EnemXpo5eHTj21q+fvvPj+4ut1vZsxETy9+l81EREtH5SjH8l80oAAAAAeAJ0ztOLz9lhZwMAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAADAqHn08L2lg+Eq4/71ixFR7hZ/PCbbn5NRioib/0hi/NBySUSMDSD+/vsRcbtb/CQeZ1lWLrLoFv/GJccvtzdN9/hpRNwaQHy4zj7I9z9vdfv+pfFC+7P792+8GC6q9/4v/e/+b6zH/ufpY/Venn3wi2rP+O9HPDveff9zED/pxD8SIq+82Gcbv/mNvb2uEw6tslv8w7GqrY2tanN3797axuJqbbW2OTc3+9r86/Ovzs9UV9bqteJv1zA/+MQvH5/W/ps94pePtv/E9n+pr9Zn8e8H9x9+pFMpdYt/98Xuv7+3e8RPi9++TxXlfPqdg/J+p3zYcz//zXOntX+5R/snz2j/3b7aH597+Wvf+0PXKSe2BgBwFZq7e+uL9Xpt+5TCZB/zXHHhzScjjQEW4slIY1iF7Lud/8eLreeCi58oZBdZfDwGkMbEie/pWJx3hUnEfr6uPv8hAQCAEfO/g/7T7iABAAAAAAAAAAAAAAAAAAAAl+mcjyWbjIi+Zz4ec384TQUAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAONV/AgAA//8FStFZ") 20:40:56 executing program 4: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cpuset.effective_cpus\x00', 0x275a, 0x0) fcntl$lock(r0, 0x25, &(0x7f00000000c0)) (async) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cpuset.effective_cpus\x00', 0x275a, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cpuset.effective_cpus\x00', 0x275a, 0x0) fcntl$lock(r2, 0x26, &(0x7f0000000000)={0x1}) (async) fcntl$lock(r2, 0x25, &(0x7f00000000c0)) (async, rerun: 64) fcntl$lock(r1, 0x26, &(0x7f0000000000)={0x1}) (async, rerun: 64) ioctl$FIBMAP(r2, 0x1, &(0x7f0000000040)=0x2) close(r0) 20:40:56 executing program 3: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cpuset.effective_cpus\x00', 0x275a, 0x0) fcntl$lock(r0, 0x25, &(0x7f00000000c0)) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cpuset.effective_cpus\x00', 0x275a, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cpuset.effective_cpus\x00', 0x275a, 0x0) fcntl$lock(r2, 0x26, &(0x7f0000000000)={0x1}) fcntl$lock(r2, 0x25, &(0x7f00000000c0)) fcntl$lock(r1, 0x26, &(0x7f0000000000)={0x1}) ioctl$FIBMAP(r2, 0x1, &(0x7f0000000040)=0x2) close(r0) [ 108.018373][ T3701] Quota error (device loop0): do_check_range: Getting dqdh_entries 15 out of range 0-14 [ 108.059778][ T5398] loop1: p2 p3 p7 20:40:56 executing program 1: ioctl$BTRFS_IOC_LOGICAL_INO(0xffffffffffffffff, 0xc0389424, &(0x7f0000000180)={0x1, 0x28, '\x00', 0x1, &(0x7f0000000080)=[0x0, 0x0, 0x0, 0x0, 0x0]}) r0 = socket$inet6(0xa, 0x3, 0x6) r1 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) r2 = dup2(r1, r0) ioctl$FIDEDUPERANGE(r0, 0xc0189436, &(0x7f0000000f00)=ANY=[@ANYBLOB="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"]) ioctl$TIOCSBRK(r2, 0x5427) recvfrom$inet6(0xffffffffffffffff, &(0x7f0000000280)=""/134, 0x86, 0x40000102, &(0x7f0000000340)={0xa, 0x4e21, 0x77f, @mcast1, 0x403b3f}, 0x1c) syz_read_part_table(0x593, &(0x7f00000005c0)="$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") r3 = creat(&(0x7f0000000240)='./file0\x00', 0x0) stat(&(0x7f0000000040)='./file1\x00', &(0x7f0000000380)) fsetxattr$security_capability(r3, &(0x7f0000000100), &(0x7f0000000000)=@v1={0x1000000, [{0x80000000, 0x81}]}, 0xc, 0x0) newfstatat(0xffffffffffffff9c, &(0x7f00000000c0)='./file1\x00', &(0x7f0000001400), 0x400) close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x2) ioctl$TIOCSTI(r3, 0x5412, &(0x7f00000004c0)=0x40) fsync(0xffffffffffffffff) write$binfmt_misc(r3, &(0x7f0000001080)=ANY=[@ANYBLOB="7379d3c6"], 0x4) fallocate(r3, 0x100000011, 0x0, 0x2811fdff) open(&(0x7f0000000100)='.\x00', 0x20c2, 0x2d) open$dir(&(0x7f0000000500)='./file1\x00', 0x1c6c0, 0x0) r4 = openat$vcsu(0xffffffffffffff9c, &(0x7f0000000cc0), 0x400c00, 0x0) lsetxattr$security_selinux(&(0x7f0000001180)='./file1\x00', &(0x7f00000011c0), &(0x7f0000001300)='system_u:object_r:unconfined_exec_t:s0\x00', 0x27, 0x3) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000400)={0xffffffffffffffff, 0xe0, &(0x7f0000000300)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, &(0x7f00000000c0)=[0x0], &(0x7f0000000140), 0x0, 0x8, &(0x7f0000000200)=[{}, {}, {}, {}, {}], 0x28, 0x0, 0x0, 0x0, 0x0, 0x10, 0x8, 0x8, &(0x7f00000002c0)}}, 0x10) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000e80)=@bpf_lsm={0x1d, 0x4, &(0x7f0000000040)=@framed={{0x18, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x73fc}, [@generic={0x9, 0x8, 0x0, 0x7f, 0x200}]}, &(0x7f0000000880)='GPL\x00', 0x1f, 0x93, &(0x7f0000000cc0)=""/147, 0x40f00, 0x2, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, &(0x7f0000000b80)={0x9}, 0x8, 0x10, 0x0, 0x0, r5}, 0x80) r6 = socket$nl_generic(0x10, 0x3, 0x10) r7 = syz_genetlink_get_family_id$tipc(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$TIPC_CMD_ENABLE_BEARER(r6, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000001200)=ANY=[@ANYBLOB="3400000006c08fada241ee0a049e6fba3f36f40da839bbdf54c31768b0026f4261f56d51c5d81ba4cb99f8203c40d0a142fcd75ce26e408d229139f8c4e81109c56a18e453e8a537df21c4ec04a4f3e22f4ac125a28ad43e41107b1f7e79c8573985e54fd665e2913ca74da8c9f3fc2839258c19fa7ac20ebead31206cf280ea73f635bc5418b66554392dfd11874fef72bc53538aae3cb5ef8a80140f4737dd2c572a03ee1d5e3d627e", @ANYRESOCT=0x0, @ANYBLOB="010000000000000000000100000000000000014100000018001700000000000000007564503a73"], 0x34}, 0x1, 0x0, 0x0, 0x1}, 0x0) ioctl$AUTOFS_DEV_IOCTL_PROTOSUBVER(r1, 0xc0189373, &(0x7f0000000540)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x6}}, './file0\x00'}) sendmsg$TIPC_CMD_GET_MAX_PORTS(r4, &(0x7f0000001140)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x40000}, 0xc, &(0x7f0000001100)={&(0x7f00000010c0)={0x1c, r7, 0x400, 0x8000, 0x25dfdbfe, {}, ["", "", "", "", "", "", ""]}, 0x1c}, 0x1, 0x0, 0x0, 0x20048854}, 0x4004) bpf$PROG_LOAD(0x5, &(0x7f0000000e40)={0x5, 0x16, &(0x7f0000001340)=ANY=[@ANYBLOB="390000000100000000000000900000f117fa0000", @ANYRES32=r3, @ANYBLOB="1f00000000000000b703000000000000850000000c000000b61b0453c29f42b5be06c7010b4efffe000000000085000000a900000018150000", @ANYRES32, @ANYBLOB="0000000000000000180100002020782500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b70300000000850000005d000000185500000100000000000000000000009500000000000000"], &(0x7f0000000b80)='syzkaller\x00', 0x1, 0xe8, &(0x7f0000000bc0)=""/232, 0x41000, 0x5b, '\x00', 0x0, 0xe, r4, 0x8, &(0x7f0000000d00)={0x5, 0x2}, 0x8, 0x10, &(0x7f0000000d40)={0x4, 0xe, 0x2, 0x8}, 0x10, r5, r3, 0x5, &(0x7f0000000d80), &(0x7f0000000dc0)=[{0x4, 0x3, 0x0, 0x2}, {0x3, 0x1, 0xa, 0xa}, {0x0, 0x3, 0x2, 0xa}, {0x0, 0x3, 0x7, 0x1}, {0x1, 0x5, 0xb, 0xc}], 0x10, 0x7}, 0x90) 20:40:56 executing program 4: r0 = perf_event_open(&(0x7f0000000a40)={0x2, 0x80, 0xcd, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @perf_bp={&(0x7f0000000200), 0x8}, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfb75}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000040)={0x0, 0x4, 0x0, &(0x7f0000000180)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x80) perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x208, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x4, 0x8001}, 0x4000, 0x0, 0x0, 0x0, 0x0, 0x14e, 0xd1}, 0x0, 0xbfffffffffffffff, r0, 0x19893a9f0a0e2244) r1 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) syz_clone(0x2000000, 0x0, 0x0, 0x0, 0x0, 0x0) r2 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x18, 0x5, &(0x7f00000002c0)=ANY=[@ANYBLOB="180000001800ff0f0000000000000000850000006d000000750000000800000095"], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x80) r3 = perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400, 0x80000, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x7, 0x1007}, 0x8006, 0x0, 0x0, 0x1, 0x4, 0x800000, 0x3}, 0x0, 0xffefffffffffffff, 0xffffffffffffffff, 0x9) ioctl$PERF_EVENT_IOC_SET_FILTER(r3, 0x40082406, &(0x7f00000003c0)='memory.numa_stat\x00') perf_event_open(0x0, 0x0, 0x0, r3, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000080)='sched_switch\x00', r2}, 0x10) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000380)={{0x1, 0xffffffffffffffff}, &(0x7f0000000000), &(0x7f0000000240)=r2}, 0x20) r5 = memfd_secret(0x0) syz_io_uring_setup(0x0, &(0x7f0000000300)={0x0, 0x2, 0x0, 0x0, 0x0, 0x0, r5}, 0x0, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f00000009c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000000a00)=0x14) r7 = openat2(0xffffffffffffff9c, &(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)={0x40841}, 0x18) write$binfmt_script(r7, &(0x7f0000000340)=ANY=[], 0xfffffdef) r8 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000b40)={0x1b, 0x0, 0x0, 0x7, 0x0, 0xffffffffffffffff, 0x200, '\x00', 0x0, 0xffffffffffffffff, 0x3, 0x1, 0x4}, 0x48) r9 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000bc0)={0x2, 0x4, 0x8, 0x1, 0x80, 0x1, 0x9, '\x00', 0x0, 0xffffffffffffffff, 0x4, 0x1, 0x4}, 0x48) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000d00)={0x11, 0x12, &(0x7f0000000440)=@raw=[@exit, @ringbuf_query={{0x18, 0x1, 0x1, 0x0, r4}}, @ringbuf_output={{0x18, 0x1, 0x1, 0x0, r5}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x10001}, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x4, 0x0, 0x0, 0x2}}, @exit, @initr0={0x18, 0x0, 0x0, 0x0, 0x6349, 0x0, 0x0, 0x0, 0xf685}, @ldst={0x3, 0x2, 0x1, 0x0, 0xb, 0x2543a83bb932833c, 0x1}], &(0x7f0000000940)='syzkaller\x00', 0x80000001, 0x27, &(0x7f0000000980)=""/39, 0x41000, 0x40, '\x00', r6, 0x0, r7, 0x8, &(0x7f0000000ac0)={0x3, 0x1}, 0x8, 0x10, &(0x7f0000000b00)={0x2, 0xc, 0xfffffe00, 0x2}, 0x10, 0x0, 0x0, 0x5, &(0x7f0000000c40)=[r2, 0x1, 0x1, r8, r9, r1], &(0x7f0000000c80)=[{0x4, 0x1, 0x8, 0xc}, {0x0, 0x4, 0xf, 0x4}, {0x1, 0x2, 0xd, 0x6}, {0x0, 0x4, 0x10, 0xc}, {0x2, 0x4, 0xd, 0x1}], 0x10, 0x20}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000280)={&(0x7f0000000140)='ext4_ext_show_extent\x00', r2}, 0x10) r10 = perf_event_open(&(0x7f0000000080)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) perf_event_open$cgroup(&(0x7f0000000300)={0x5, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_bp={&(0x7f0000000100)}, 0x81252, 0x6, 0x80000001, 0x0, 0x0, 0x0, 0x6, 0x0, 0x6, 0x0, 0x6}, 0xffffffffffffffff, 0xe, 0xffffffffffffffff, 0xc) perf_event_open(0x0, 0x0, 0x2, 0xffffffffffffffff, 0xb) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) perf_event_open(&(0x7f0000000840)={0x2, 0x80, 0x0, 0x7, 0x0, 0x80, 0x0, 0x3, 0x0, 0x9, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, @perf_config_ext={0x8000000000, 0x3}, 0x46c73247dfbe0d, 0x1007e, 0x0, 0x2, 0x0, 0x0, 0x6, 0x0, 0xffffffff, 0x0, 0x1c}, 0x0, 0x9, 0xffffffffffffffff, 0xd) bpf$PROG_LOAD(0x5, &(0x7f0000000780)={0x14, 0x4, &(0x7f00000008c0)=ANY=[@ANYBLOB="850000006b00000018150000a3df7ddd9621fb0201050062d91123e632b2f902ad1e9f1cc7a66ed51ac8a4070000000000000019a83f0b7c9502871fb1ca3dc499e804bbbc359859ed6fd9f104fc7ed900d122072d8275a24d000000000601c3a63953a7b36fe458", @ANYRES32, @ANYBLOB="00000000000000002d59e4eda4000000"], &(0x7f0000000400)='syzkaller\x00', 0xfff, 0xe3, &(0x7f0000000580)=""/227, 0x0, 0x4, '\x00', 0x0, 0x24, 0xffffffffffffffff, 0x8, &(0x7f0000000500)={0x1, 0x3}, 0x8, 0x10, &(0x7f0000000680)={0x5, 0x6, 0x81, 0x9}, 0x10, 0xffffffffffffffff, 0xffffffffffffffff, 0x0, &(0x7f00000006c0)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, r10]}, 0x80) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x4030582a, &(0x7f0000000040)=0x91) [ 108.164903][ T3326] I/O error, dev loop1, sector 0 op 0x0:(READ) flags 0x80700 phys_seg 1 prio class 0 [ 108.192834][ T3110] udevd[3110]: inotify_add_watch(7, /dev/loop1p7, 10) failed: No such file or directory [ 108.208617][ T3169] udevd[3169]: inotify_add_watch(7, /dev/loop1p3, 10) failed: No such file or directory [ 108.208760][ T5419] loop0: detected capacity change from 0 to 512 [ 108.234254][ T5418] loop1: detected capacity change from 0 to 2048 [ 108.279951][ T5419] EXT4-fs (loop0): 1 orphan inode deleted [ 108.286233][ T5419] ext4 filesystem being mounted at /root/syzkaller-testdir338643557/syzkaller.M396af/63/file1 supports timestamps until 2038-01-19 (0x7fffffff) [ 108.305132][ T3701] Quota error (device loop0): do_check_range: Getting dqdh_entries 15 out of range 0-14 20:40:56 executing program 0: r0 = open(&(0x7f0000000040)='./bus\x00', 0x8001141042, 0x0) connect$unix(r0, &(0x7f0000000240)=@file={0x0, './bus\x00'}, 0x6e) setuid(0x0) getgid() r1 = gettid() bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000080)={r1, 0xffffffffffffffff, 0x0, 0x6, &(0x7f0000000040)='kfree\x00'}, 0x13) perf_event_open(&(0x7f0000002740)={0x5, 0x80, 0xfd, 0x3, 0x81, 0xeb, 0x0, 0x9, 0x0, 0x5, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0xfffffff7, 0x2, @perf_config_ext={0x2, 0x401}, 0x1800, 0x3, 0x3, 0x6, 0x80000001, 0x81, 0x20, 0x0, 0x5, 0x0, 0x10000}, r1, 0x9, 0xffffffffffffffff, 0x8) perf_event_open(&(0x7f0000000040)={0x0, 0x80, 0x1, 0x0, 0x1, 0x1f, 0x0, 0x7, 0x0, 0xa, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x8, 0x2, @perf_config_ext={0x100000001, 0x9}, 0x15, 0x72e0, 0xa9, 0x1, 0x0, 0x2, 0x5, 0x0, 0x1000}, r1, 0x7, 0xffffffffffffffff, 0x9) fstat(r0, &(0x7f0000000b00)) r2 = getegid() syz_mount_image$ext4(&(0x7f0000000100)='ext4\x00', &(0x7f0000000200)='./file1\x00', 0x3000000, &(0x7f0000003040)=ANY=[@ANYRES64=r2, @ANYBLOB="8555591a163448f4c52bee6cc0e12a6a8610718f818822e94c360e46f93ac9c63a1b40ea9d758c2b4e2d7c386a141016d11cb13fabc846fc7fb242c175fbdf96e2a96e80e82b73987b1d5dfd843c7e6748a15a0c4160f5e4c468e8f8e417bd3385546159881194fe3a7cf8307cd9c7ce0ca180a481d4dcaa6611ec5c8ff1c546360dea3da9f2bfc1fd71af9ebf2afe4285f013a3929a7096097976a16e2060e5f26e379011ea1811", @ANYRES64, @ANYBLOB="ca42ad87c41bb3b2507e4e12104f0cd507000001046f9445657db4996b10208d04454e11fb5b1383c5ce98e3062f45ec04e5b8b179df3d64a6cec05d29235e3cbe0b339abe9faee5cf3e44c97ce56a1dc359047114eeb3c23f331114039d75a664afc47e8273b79e83d301fc4ceec8b89911505b6743797c459195a7120ded1748f315deb90000ffed00000000000000", @ANYRES8=r2, @ANYRES8=r2, @ANYRES64, @ANYBLOB="bd85893dee1670c8c7e3b4a65ec61f224992fd11263b7749c7ee63dd4fc13cc5dfdde8a3099aaf21ece351c316d9bbd7e4ecc524c856f20d6a1818d6d75f702eb904653f9d55af", @ANYRESOCT], 0x1, 0x513, &(0x7f0000000c40)="$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") [ 108.341691][ T5418] loop1: p2 p3 p7 20:40:56 executing program 1: ioctl$BTRFS_IOC_LOGICAL_INO(0xffffffffffffffff, 0xc0389424, &(0x7f0000000180)={0x1, 0x28, '\x00', 0x1, &(0x7f0000000080)=[0x0, 0x0, 0x0, 0x0, 0x0]}) r0 = socket$inet6(0xa, 0x3, 0x6) r1 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) r2 = dup2(r1, r0) ioctl$FIDEDUPERANGE(r0, 0xc0189436, &(0x7f0000000f00)=ANY=[@ANYBLOB="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"]) ioctl$TIOCSBRK(r2, 0x5427) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000001040)={{r2, 0xffffffffffffffff}, &(0x7f0000000140), &(0x7f0000000480)=r1}, 0x20) syz_read_part_table(0x593, &(0x7f00000005c0)="$eJzs0r1LK2kUB+A3A5c0e4lcLli4hWCwigqx0CIpRGJIY0RcsbAWLLQQLCwkEq39+AcUv0BsxD6lGEEUYiUpxXpBsUmVZdfZxmplUdnleZrhPefMHF5+E/hPi8Lv7XY7EUJoJ9//9m+nhbFS98TI5FQIiTAbQij8+stfnUQ88fdXz+NzOT6XktnG/vXo82nHTc9dPX0Yxf1aFMJaCGHh4Sj1b+/G/99Z/jK1vrFU3FzJz98XVx8H5/oKXVuFxZ2hg1xlujM3E/9Ytehz9qcbw8e37fLT7vf+b/VGK3sVz2USH7Ofr/U2/72f1Wa1Nd57sjyQ+dG8qGzHub/IHwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA+GBn+cvU+sZScXMlP39fXH0cnOsrdG0VFneGDnKV6c7cTPQ6V4s+Z3+6MXx82y4/7X7v/1ZvtLJX8Vwm8TH7+Vpv89/7WW1WW+O9J8sDmR/Ni8p2nPuL/AEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAACAf6gwVuqeGJmcCiERZkMIo1HH0Z/1dvK1n4jnzuNnOa6XktnG/vXo82nHTc9dPX04EddrUQhrIYSFh6PUp1+Gd/sjAAD///tch0s=") r4 = creat(&(0x7f0000000240)='./file0\x00', 0x0) stat(&(0x7f0000000040)='./file1\x00', &(0x7f0000000380)) fsetxattr$security_capability(r4, &(0x7f0000000100), &(0x7f0000000000)=@v1={0x1000000, [{0x80000000, 0x81}]}, 0xc, 0x0) newfstatat(0xffffffffffffff9c, &(0x7f00000000c0)='./file1\x00', &(0x7f0000001400), 0x400) close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x2) ioctl$TIOCSTI(r4, 0x5412, &(0x7f00000004c0)=0x40) fsync(0xffffffffffffffff) write$binfmt_misc(r4, &(0x7f0000001080)=ANY=[@ANYBLOB="7379d3c6"], 0x4) fallocate(r4, 0x100000011, 0x0, 0x2811fdff) open(&(0x7f0000000100)='.\x00', 0x20c2, 0x2d) open$dir(&(0x7f0000000500)='./file1\x00', 0x1c6c0, 0x0) r5 = openat$vcsu(0xffffffffffffff9c, &(0x7f0000000cc0), 0x400c00, 0x0) lsetxattr$security_selinux(&(0x7f0000001180)='./file1\x00', &(0x7f00000011c0), &(0x7f0000001300)='system_u:object_r:unconfined_exec_t:s0\x00', 0x27, 0x3) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000400)={0xffffffffffffffff, 0xe0, &(0x7f0000000300)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, &(0x7f00000000c0)=[0x0], &(0x7f0000000140), 0x0, 0x8, &(0x7f0000000200)=[{}, {}, {}, {}, {}], 0x28, 0x0, 0x0, 0x0, 0x0, 0x10, 0x8, 0x8, &(0x7f00000002c0)}}, 0x10) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000e80)=@bpf_lsm={0x1d, 0x4, &(0x7f0000000040)=@framed={{0x18, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x73fc}, [@generic={0x9, 0x8, 0x0, 0x7f, 0x200}]}, &(0x7f0000000880)='GPL\x00', 0x1f, 0x93, &(0x7f0000000cc0)=""/147, 0x40f00, 0x2, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, &(0x7f0000000b80)={0x9}, 0x8, 0x10, 0x0, 0x0, r6}, 0x80) r7 = socket$nl_generic(0x10, 0x3, 0x10) r8 = syz_genetlink_get_family_id$tipc(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$TIPC_CMD_ENABLE_BEARER(r7, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000001200)=ANY=[@ANYBLOB="3400000006c08fada241ee0a049e6fba3f36f40da839bbdf54c31768b0026f4261f56d51c5d81ba4cb99f8203c40d0a142fcd75ce26e408d229139f8c4e81109c56a18e453e8a537df21c4ec04a4f3e22f4ac125a28ad43e41107b1f7e79c8573985e54fd665e2913ca74da8c9f3fc2839258c19fa7ac20ebead31206cf280ea73f635bc5418b66554392dfd11874fef72bc53538aae3cb5ef8a80140f4737dd2c572a03ee1d5e3d627e", @ANYRESOCT=0x0, @ANYBLOB="010000000000000000000100000000000000014100000018001700000000000000007564503a73"], 0x34}, 0x1, 0x0, 0x0, 0x1}, 0x0) ioctl$AUTOFS_DEV_IOCTL_PROTOSUBVER(r1, 0xc0189373, &(0x7f0000000540)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x6}}, './file0\x00'}) sendmsg$TIPC_CMD_GET_MAX_PORTS(r5, &(0x7f0000001140)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x40000}, 0xc, &(0x7f0000001100)={&(0x7f00000010c0)={0x1c, r8, 0x400, 0x8000, 0x25dfdbfe, {}, ["", "", "", "", "", "", ""]}, 0x1c}, 0x1, 0x0, 0x0, 0x20048854}, 0x4004) bpf$PROG_LOAD(0x5, &(0x7f0000000e40)={0x5, 0x16, &(0x7f0000001340)=ANY=[@ANYBLOB="390000000100000000000000900000f117fa0000", @ANYRES32=r4, @ANYBLOB="1f00000000000000b703000000000000850000000c000000b61b0453c29f42b5be06c7010b4efffe000000000085000000a900000018150000", @ANYRES32=r3, @ANYBLOB="0000000000000000180100002020782500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b70300000000850000005d000000185500000100000000000000000000009500000000000000"], &(0x7f0000000b80)='syzkaller\x00', 0x1, 0xe8, &(0x7f0000000bc0)=""/232, 0x41000, 0x5b, '\x00', 0x0, 0xe, r5, 0x8, &(0x7f0000000d00)={0x5, 0x2}, 0x8, 0x10, &(0x7f0000000d40)={0x4, 0xe, 0x2, 0x8}, 0x10, r6, r4, 0x5, &(0x7f0000000d80), &(0x7f0000000dc0)=[{0x4, 0x3, 0x0, 0x2}, {0x3, 0x1, 0xa, 0xa}, {0x0, 0x3, 0x2, 0xa}, {0x0, 0x3, 0x7, 0x1}, {0x1, 0x5, 0xb, 0xc}], 0x10, 0x7}, 0x90) [ 108.453055][ T5425] loop0: detected capacity change from 0 to 512 20:40:56 executing program 2: r0 = perf_event_open(&(0x7f0000000a40)={0x2, 0x80, 0xcd, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @perf_bp={&(0x7f0000000200), 0x8}, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfb75}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000040)={0x0, 0x4, 0x0, &(0x7f0000000180)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x80) perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x208, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x4, 0x8001}, 0x4000, 0x0, 0x0, 0x0, 0x0, 0x14e, 0xd1}, 0x0, 0xbfffffffffffffff, r0, 0x19893a9f0a0e2244) r1 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) syz_clone(0x2000000, 0x0, 0x0, 0x0, 0x0, 0x0) r2 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x18, 0x5, &(0x7f00000002c0)=ANY=[@ANYBLOB="180000001800ff0f0000000000000000850000006d000000750000000800000095"], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x80) r3 = perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400, 0x80000, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x7, 0x1007}, 0x8006, 0x0, 0x0, 0x1, 0x4, 0x800000, 0x3}, 0x0, 0xffefffffffffffff, 0xffffffffffffffff, 0x9) ioctl$PERF_EVENT_IOC_SET_FILTER(r3, 0x40082406, &(0x7f00000003c0)='memory.numa_stat\x00') perf_event_open(0x0, 0x0, 0x0, r3, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000080)='sched_switch\x00', r2}, 0x10) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000380)={{0x1, 0xffffffffffffffff}, &(0x7f0000000000), &(0x7f0000000240)=r2}, 0x20) r5 = memfd_secret(0x0) syz_io_uring_setup(0x0, &(0x7f0000000300)={0x0, 0x2, 0x0, 0x0, 0x0, 0x0, r5}, 0x0, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f00000009c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000000a00)=0x14) r7 = openat2(0xffffffffffffff9c, &(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)={0x40841}, 0x18) write$binfmt_script(r7, &(0x7f0000000340)=ANY=[], 0xfffffdef) r8 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000b40)={0x1b, 0x0, 0x0, 0x7, 0x0, 0xffffffffffffffff, 0x200, '\x00', 0x0, 0xffffffffffffffff, 0x3, 0x1, 0x4}, 0x48) r9 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000bc0)={0x2, 0x4, 0x8, 0x1, 0x80, 0x1, 0x9, '\x00', 0x0, 0xffffffffffffffff, 0x4, 0x1, 0x4}, 0x48) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000d00)={0x11, 0x12, &(0x7f0000000440)=@raw=[@exit, @ringbuf_query={{0x18, 0x1, 0x1, 0x0, r4}}, @ringbuf_output={{0x18, 0x1, 0x1, 0x0, r5}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x10001}, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x4, 0x0, 0x0, 0x2}}, @exit, @initr0={0x18, 0x0, 0x0, 0x0, 0x6349, 0x0, 0x0, 0x0, 0xf685}, @ldst={0x3, 0x2, 0x1, 0x0, 0xb, 0x2543a83bb932833c, 0x1}], &(0x7f0000000940)='syzkaller\x00', 0x80000001, 0x27, &(0x7f0000000980)=""/39, 0x41000, 0x40, '\x00', r6, 0x0, r7, 0x8, &(0x7f0000000ac0)={0x3, 0x1}, 0x8, 0x10, &(0x7f0000000b00)={0x2, 0xc, 0xfffffe00, 0x2}, 0x10, 0x0, 0x0, 0x5, &(0x7f0000000c40)=[r2, 0x1, 0x1, r8, r9, r1], &(0x7f0000000c80)=[{0x4, 0x1, 0x8, 0xc}, {0x0, 0x4, 0xf, 0x4}, {0x1, 0x2, 0xd, 0x6}, {0x0, 0x4, 0x10, 0xc}, {0x2, 0x4, 0xd, 0x1}], 0x10, 0x20}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000280)={&(0x7f0000000140)='ext4_ext_show_extent\x00', r2}, 0x10) r10 = perf_event_open(&(0x7f0000000080)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r11 = gettid() perf_event_open$cgroup(&(0x7f0000000300)={0x5, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_bp={&(0x7f0000000100)}, 0x81252, 0x6, 0x80000001, 0x0, 0x0, 0x0, 0x6, 0x0, 0x6, 0x0, 0x6}, 0xffffffffffffffff, 0xe, 0xffffffffffffffff, 0xc) perf_event_open(0x0, r11, 0x2, 0xffffffffffffffff, 0xb) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) perf_event_open(&(0x7f0000000840)={0x2, 0x80, 0x0, 0x7, 0x0, 0x80, 0x0, 0x3, 0x0, 0x9, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, @perf_config_ext={0x8000000000, 0x3}, 0x46c73247dfbe0d, 0x1007e, 0x0, 0x2, 0x0, 0x0, 0x6, 0x0, 0xffffffff, 0x0, 0x1c}, 0x0, 0x9, 0xffffffffffffffff, 0xd) bpf$PROG_LOAD(0x5, &(0x7f0000000780)={0x14, 0x4, &(0x7f00000008c0)=ANY=[@ANYBLOB="850000006b00000018150000a3df7ddd9621fb0201050062d91123e632b2f902ad1e9f1cc7a66ed51ac8a4070000000000000019a83f0b7c9502871fb1ca3dc499e804bbbc359859ed6fd9f104fc7ed900d122072d8275a24d000000000601c3a63953a7b36fe458", @ANYRES32, @ANYBLOB="00000000000000002d59e4eda4000000"], &(0x7f0000000400)='syzkaller\x00', 0xfff, 0xe3, &(0x7f0000000580)=""/227, 0x0, 0x4, '\x00', 0x0, 0x24, 0xffffffffffffffff, 0x8, &(0x7f0000000500)={0x1, 0x3}, 0x8, 0x10, &(0x7f0000000680)={0x5, 0x6, 0x81, 0x9}, 0x10, 0xffffffffffffffff, 0xffffffffffffffff, 0x0, &(0x7f00000006c0)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, r10]}, 0x80) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x4030582a, &(0x7f0000000040)=0x91) 20:40:56 executing program 0: r0 = open(&(0x7f0000000040)='./bus\x00', 0x8001141042, 0x0) connect$unix(r0, &(0x7f0000000240)=@file={0x0, './bus\x00'}, 0x6e) setuid(0x0) r1 = gettid() bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000080)={r1, 0xffffffffffffffff, 0x0, 0x6, &(0x7f0000000040)='kfree\x00'}, 0x13) perf_event_open(&(0x7f0000002740)={0x5, 0x80, 0xfd, 0x3, 0x81, 0xeb, 0x0, 0x9, 0x0, 0x5, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0xfffffff7, 0x2, @perf_config_ext={0x2, 0x401}, 0x1800, 0x3, 0x3, 0x6, 0x80000001, 0x81, 0x20, 0x0, 0x5, 0x0, 0x10000}, r1, 0x9, 0xffffffffffffffff, 0x8) perf_event_open(&(0x7f0000000040)={0x0, 0x80, 0x1, 0x0, 0x1, 0x1f, 0x0, 0x7, 0x0, 0xa, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x8, 0x2, @perf_config_ext={0x100000001, 0x9}, 0x15, 0x72e0, 0xa9, 0x1, 0x0, 0x2, 0x5, 0x0, 0x1000}, r1, 0x7, 0xffffffffffffffff, 0x9) fstat(r0, &(0x7f0000000b00)) r2 = getegid() syz_mount_image$ext4(&(0x7f0000000100)='ext4\x00', &(0x7f0000000200)='./file1\x00', 0x3000000, &(0x7f0000003040)=ANY=[@ANYRES64=r2, @ANYBLOB="8555591a163448f4c52bee6cc0e12a6a8610718f818822e94c360e46f93ac9c63a1b40ea9d758c2b4e2d7c386a141016d11cb13fabc846fc7fb242c175fbdf96e2a96e80e82b73987b1d5dfd843c7e6748a15a0c4160f5e4c468e8f8e417bd3385546159881194fe3a7cf8307cd9c7ce0ca180a481d4dcaa6611ec5c8ff1c546360dea3da9f2bfc1fd71af9ebf2afe4285f013a3929a7096097976a16e2060e5f26e379011ea1811", @ANYRES64, @ANYBLOB="ca42ad87c41bb3b2507e4e12104f0cd507000001046f9445657db4996b10208d04454e11fb5b1383c5ce98e3062f45ec04e5b8b179df3d64a6cec05d29235e3cbe0b339abe9faee5cf3e44c97ce56a1dc359047114eeb3c23f331114039d75a664afc47e8273b79e83d301fc4ceec8b89911505b6743797c459195a7120ded1748f315deb90000ffed00000000000000", @ANYRES8=r2, @ANYRES8=r2, @ANYRES64, @ANYBLOB="bd85893dee1670c8c7e3b4a65ec61f224992fd11263b7749c7ee63dd4fc13cc5dfdde8a3099aaf21ece351c316d9bbd7e4ecc524c856f20d6a1818d6d75f702eb904653f9d55af", @ANYRESOCT], 0x1, 0x513, &(0x7f0000000c40)="$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") [ 108.509186][ T5425] EXT4-fs (loop0): 1 orphan inode deleted [ 108.522449][ T5425] ext4 filesystem being mounted at /root/syzkaller-testdir338643557/syzkaller.M396af/64/file1 supports timestamps until 2038-01-19 (0x7fffffff) [ 108.530107][ T5427] loop1: detected capacity change from 0 to 2048 [ 108.546141][ T3701] Quota error (device loop0): do_check_range: Getting dqdh_entries 15 out of range 0-14 [ 108.603111][ T5427] loop1: p2 p3 p7 20:40:57 executing program 1: ioctl$BTRFS_IOC_LOGICAL_INO(0xffffffffffffffff, 0xc0389424, &(0x7f0000000180)={0x1, 0x28, '\x00', 0x1, &(0x7f0000000080)=[0x0, 0x0, 0x0, 0x0, 0x0]}) r0 = socket$inet6(0xa, 0x3, 0x6) r1 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) r2 = dup2(r1, r0) ioctl$FIDEDUPERANGE(r0, 0xc0189436, &(0x7f0000000f00)=ANY=[@ANYBLOB="08000000000000000000000000000000000000002000000032057e68d5d647f4ed243c9d097db4c7bae602f8d4c84b5325f3d737af1c3ebe2901b056ac84d04eb9d8bfd4771499d444ff07000033206062c9a0527d2d0e4b0000fa0693ec3785977184911bffc60554e8950e91e1a8209818b4eb3440ae351192e1d7cf54ba6743f2db330481aac17f0961506d7ebd7ca999cf4e148c1ef2880f63693dfee2a6f2fafec2c059fd15db654600000000000000000076da8ec51705470a42729df6a32122af2a673d7409ca1b8a0da065e2bf7790c86a6b3014e1ef5d1c4000d3dff081d5a4c403971fe8869ab4973ffc7b24b6fbb4341ac1a0f5d56b64b9d23d6855e653f1e0418a6d9838196a7b145310a9b4c467199ecc3bd47b85aae47754bf695bdb85ea03f70beab5732a014c5f525bf2f9b9c6bd545e1a"]) ioctl$TIOCSBRK(r2, 0x5427) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000001040)={{r2, 0xffffffffffffffff}, &(0x7f0000000140), &(0x7f0000000480)=r1}, 0x20) syz_read_part_table(0x593, &(0x7f00000005c0)="$eJzs0r1LK2kUB+A3A5c0e4lcLli4hWCwigqx0CIpRGJIY0RcsbAWLLQQLCwkEq39+AcUv0BsxD6lGEEUYiUpxXpBsUmVZdfZxmplUdnleZrhPefMHF5+E/hPi8Lv7XY7EUJoJ9//9m+nhbFS98TI5FQIiTAbQij8+stfnUQ88fdXz+NzOT6XktnG/vXo82nHTc9dPX0Yxf1aFMJaCGHh4Sj1b+/G/99Z/jK1vrFU3FzJz98XVx8H5/oKXVuFxZ2hg1xlujM3E/9Ytehz9qcbw8e37fLT7vf+b/VGK3sVz2USH7Ofr/U2/72f1Wa1Nd57sjyQ+dG8qGzHub/IHwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA+GBn+cvU+sZScXMlP39fXH0cnOsrdG0VFneGDnKV6c7cTPQ6V4s+Z3+6MXx82y4/7X7v/1ZvtLJX8Vwm8TH7+Vpv89/7WW1WW+O9J8sDmR/Ni8p2nPuL/AEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAACAf6gwVuqeGJmcCiERZkMIo1HH0Z/1dvK1n4jnzuNnOa6XktnG/vXo82nHTc9dPX04EddrUQhrIYSFh6PUp1+Gd/sjAAD///tch0s=") r4 = creat(&(0x7f0000000240)='./file0\x00', 0x0) stat(&(0x7f0000000040)='./file1\x00', &(0x7f0000000380)) fsetxattr$security_capability(r4, &(0x7f0000000100), &(0x7f0000000000)=@v1={0x1000000, [{0x80000000, 0x81}]}, 0xc, 0x0) newfstatat(0xffffffffffffff9c, &(0x7f00000000c0)='./file1\x00', &(0x7f0000001400), 0x400) close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x2) ioctl$TIOCSTI(r4, 0x5412, &(0x7f00000004c0)=0x40) fsync(0xffffffffffffffff) write$binfmt_misc(r4, &(0x7f0000001080)=ANY=[@ANYBLOB="7379d3c6"], 0x4) fallocate(r4, 0x100000011, 0x0, 0x2811fdff) open(&(0x7f0000000100)='.\x00', 0x20c2, 0x2d) open$dir(&(0x7f0000000500)='./file1\x00', 0x1c6c0, 0x0) r5 = openat$vcsu(0xffffffffffffff9c, &(0x7f0000000cc0), 0x400c00, 0x0) lsetxattr$security_selinux(&(0x7f0000001180)='./file1\x00', &(0x7f00000011c0), &(0x7f0000001300)='system_u:object_r:unconfined_exec_t:s0\x00', 0x27, 0x3) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000400)={0xffffffffffffffff, 0xe0, &(0x7f0000000300)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, &(0x7f00000000c0)=[0x0], &(0x7f0000000140), 0x0, 0x8, &(0x7f0000000200)=[{}, {}, {}, {}, {}], 0x28, 0x0, 0x0, 0x0, 0x0, 0x10, 0x8, 0x8, &(0x7f00000002c0)}}, 0x10) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000e80)=@bpf_lsm={0x1d, 0x4, &(0x7f0000000040)=@framed={{0x18, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x73fc}, [@generic={0x9, 0x8, 0x0, 0x7f, 0x200}]}, &(0x7f0000000880)='GPL\x00', 0x1f, 0x93, &(0x7f0000000cc0)=""/147, 0x40f00, 0x2, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, &(0x7f0000000b80)={0x9}, 0x8, 0x10, 0x0, 0x0, r6}, 0x80) r7 = socket$nl_generic(0x10, 0x3, 0x10) r8 = syz_genetlink_get_family_id$tipc(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$TIPC_CMD_ENABLE_BEARER(r7, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000001200)=ANY=[@ANYBLOB="3400000006c08fada241ee0a049e6fba3f36f40da839bbdf54c31768b0026f4261f56d51c5d81ba4cb99f8203c40d0a142fcd75ce26e408d229139f8c4e81109c56a18e453e8a537df21c4ec04a4f3e22f4ac125a28ad43e41107b1f7e79c8573985e54fd665e2913ca74da8c9f3fc2839258c19fa7ac20ebead31206cf280ea73f635bc5418b66554392dfd11874fef72bc53538aae3cb5ef8a80140f4737dd2c572a03ee1d5e3d627e", @ANYRESOCT=0x0, @ANYBLOB="010000000000000000000100000000000000014100000018001700000000000000007564503a73"], 0x34}, 0x1, 0x0, 0x0, 0x1}, 0x0) ioctl$AUTOFS_DEV_IOCTL_PROTOSUBVER(r1, 0xc0189373, &(0x7f0000000540)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x6}}, './file0\x00'}) sendmsg$TIPC_CMD_GET_MAX_PORTS(r5, &(0x7f0000001140)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x40000}, 0xc, &(0x7f0000001100)={&(0x7f00000010c0)={0x1c, r8, 0x400, 0x8000, 0x25dfdbfe, {}, ["", "", "", "", "", "", ""]}, 0x1c}, 0x1, 0x0, 0x0, 0x20048854}, 0x4004) bpf$PROG_LOAD(0x5, &(0x7f0000000e40)={0x5, 0x16, &(0x7f0000001340)=ANY=[@ANYBLOB="390000000100000000000000900000f117fa0000", @ANYRES32=r4, @ANYBLOB="1f00000000000000b703000000000000850000000c000000b61b0453c29f42b5be06c7010b4efffe000000000085000000a900000018150000", @ANYRES32=r3, @ANYBLOB="0000000000000000180100002020782500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b70300000000850000005d000000185500000100000000000000000000009500000000000000"], &(0x7f0000000b80)='syzkaller\x00', 0x1, 0xe8, &(0x7f0000000bc0)=""/232, 0x41000, 0x5b, '\x00', 0x0, 0xe, r5, 0x8, &(0x7f0000000d00)={0x5, 0x2}, 0x8, 0x10, &(0x7f0000000d40)={0x4, 0xe, 0x2, 0x8}, 0x10, r6, r4, 0x5, &(0x7f0000000d80), &(0x7f0000000dc0)=[{0x4, 0x3, 0x0, 0x2}, {0x3, 0x1, 0xa, 0xa}, {0x0, 0x3, 0x2, 0xa}, {0x0, 0x3, 0x7, 0x1}, {0x1, 0x5, 0xb, 0xc}], 0x10, 0x7}, 0x90) [ 108.663391][ T5435] loop0: detected capacity change from 0 to 512 [ 108.679747][ T3110] udevd[3110]: inotify_add_watch(7, /dev/loop1p7, 10) failed: No such file or directory [ 108.691641][ T3169] udevd[3169]: inotify_add_watch(7, /dev/loop1p3, 10) failed: No such file or directory 20:40:57 executing program 0: r0 = open(&(0x7f0000000040)='./bus\x00', 0x8001141042, 0x0) connect$unix(r0, &(0x7f0000000240)=@file={0x0, './bus\x00'}, 0x6e) r1 = gettid() bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000080)={r1, 0xffffffffffffffff, 0x0, 0x6, &(0x7f0000000040)='kfree\x00'}, 0x13) perf_event_open(&(0x7f0000002740)={0x5, 0x80, 0xfd, 0x3, 0x81, 0xeb, 0x0, 0x9, 0x0, 0x5, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0xfffffff7, 0x2, @perf_config_ext={0x2, 0x401}, 0x1800, 0x3, 0x3, 0x6, 0x80000001, 0x81, 0x20, 0x0, 0x5, 0x0, 0x10000}, r1, 0x9, 0xffffffffffffffff, 0x8) perf_event_open(&(0x7f0000000040)={0x0, 0x80, 0x1, 0x0, 0x1, 0x1f, 0x0, 0x7, 0x0, 0xa, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x8, 0x2, @perf_config_ext={0x100000001, 0x9}, 0x15, 0x72e0, 0xa9, 0x1, 0x0, 0x2, 0x5, 0x0, 0x1000}, r1, 0x7, 0xffffffffffffffff, 0x9) fstat(r0, &(0x7f0000000b00)) r2 = getegid() syz_mount_image$ext4(&(0x7f0000000100)='ext4\x00', &(0x7f0000000200)='./file1\x00', 0x3000000, &(0x7f0000003040)=ANY=[@ANYRES64=r2, @ANYBLOB="8555591a163448f4c52bee6cc0e12a6a8610718f818822e94c360e46f93ac9c63a1b40ea9d758c2b4e2d7c386a141016d11cb13fabc846fc7fb242c175fbdf96e2a96e80e82b73987b1d5dfd843c7e6748a15a0c4160f5e4c468e8f8e417bd3385546159881194fe3a7cf8307cd9c7ce0ca180a481d4dcaa6611ec5c8ff1c546360dea3da9f2bfc1fd71af9ebf2afe4285f013a3929a7096097976a16e2060e5f26e379011ea1811", @ANYRES64, @ANYBLOB="ca42ad87c41bb3b2507e4e12104f0cd507000001046f9445657db4996b10208d04454e11fb5b1383c5ce98e3062f45ec04e5b8b179df3d64a6cec05d29235e3cbe0b339abe9faee5cf3e44c97ce56a1dc359047114eeb3c23f331114039d75a664afc47e8273b79e83d301fc4ceec8b89911505b6743797c459195a7120ded1748f315deb90000ffed00000000000000", @ANYRES8=r2, @ANYRES8=r2, @ANYRES64, @ANYBLOB="bd85893dee1670c8c7e3b4a65ec61f224992fd11263b7749c7ee63dd4fc13cc5dfdde8a3099aaf21ece351c316d9bbd7e4ecc524c856f20d6a1818d6d75f702eb904653f9d55af", @ANYRESOCT], 0x1, 0x513, &(0x7f0000000c40)="$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") [ 108.715173][ T5436] loop1: detected capacity change from 0 to 2048 [ 108.723764][ T5435] EXT4-fs (loop0): 1 orphan inode deleted [ 108.731185][ T5435] ext4 filesystem being mounted at /root/syzkaller-testdir338643557/syzkaller.M396af/65/file1 supports timestamps until 2038-01-19 (0x7fffffff) [ 108.746547][ T3701] Quota error (device loop0): do_check_range: Getting dqdh_entries 15 out of range 0-14 [ 108.789550][ T5436] loop1: p2 p3 p7 20:40:57 executing program 1: ioctl$BTRFS_IOC_LOGICAL_INO(0xffffffffffffffff, 0xc0389424, &(0x7f0000000180)={0x1, 0x28, '\x00', 0x1, &(0x7f0000000080)=[0x0, 0x0, 0x0, 0x0, 0x0]}) r0 = socket$inet6(0xa, 0x3, 0x6) r1 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) r2 = dup2(r1, r0) ioctl$FIDEDUPERANGE(r0, 0xc0189436, &(0x7f0000000f00)=ANY=[@ANYBLOB="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"]) ioctl$TIOCSBRK(r2, 0x5427) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000001040)={{r2, 0xffffffffffffffff}, &(0x7f0000000140), &(0x7f0000000480)=r1}, 0x20) syz_read_part_table(0x593, &(0x7f00000005c0)="$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") r4 = creat(&(0x7f0000000240)='./file0\x00', 0x0) stat(&(0x7f0000000040)='./file1\x00', &(0x7f0000000380)) fsetxattr$security_capability(r4, &(0x7f0000000100), &(0x7f0000000000)=@v1={0x1000000, [{0x80000000, 0x81}]}, 0xc, 0x0) newfstatat(0xffffffffffffff9c, &(0x7f00000000c0)='./file1\x00', &(0x7f0000001400), 0x400) close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x2) ioctl$TIOCSTI(r4, 0x5412, &(0x7f00000004c0)=0x40) fsync(0xffffffffffffffff) write$binfmt_misc(r4, &(0x7f0000001080)=ANY=[@ANYBLOB="7379d3c6"], 0x4) fallocate(r4, 0x100000011, 0x0, 0x2811fdff) open(&(0x7f0000000100)='.\x00', 0x20c2, 0x2d) open$dir(&(0x7f0000000500)='./file1\x00', 0x1c6c0, 0x0) r5 = openat$vcsu(0xffffffffffffff9c, &(0x7f0000000cc0), 0x400c00, 0x0) lsetxattr$security_selinux(&(0x7f0000001180)='./file1\x00', &(0x7f00000011c0), &(0x7f0000001300)='system_u:object_r:unconfined_exec_t:s0\x00', 0x27, 0x3) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000400)={0xffffffffffffffff, 0xe0, &(0x7f0000000300)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, &(0x7f00000000c0)=[0x0], &(0x7f0000000140), 0x0, 0x8, &(0x7f0000000200)=[{}, {}, {}, {}, {}], 0x28, 0x0, 0x0, 0x0, 0x0, 0x10, 0x8, 0x8, &(0x7f00000002c0)}}, 0x10) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000e80)=@bpf_lsm={0x1d, 0x4, &(0x7f0000000040)=@framed={{0x18, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x73fc}, [@generic={0x9, 0x8, 0x0, 0x7f, 0x200}]}, &(0x7f0000000880)='GPL\x00', 0x1f, 0x93, &(0x7f0000000cc0)=""/147, 0x40f00, 0x2, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, &(0x7f0000000b80)={0x9}, 0x8, 0x10, 0x0, 0x0, r6}, 0x80) r7 = socket$nl_generic(0x10, 0x3, 0x10) r8 = syz_genetlink_get_family_id$tipc(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$TIPC_CMD_ENABLE_BEARER(r7, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000001200)=ANY=[@ANYBLOB="3400000006c08fada241ee0a049e6fba3f36f40da839bbdf54c31768b0026f4261f56d51c5d81ba4cb99f8203c40d0a142fcd75ce26e408d229139f8c4e81109c56a18e453e8a537df21c4ec04a4f3e22f4ac125a28ad43e41107b1f7e79c8573985e54fd665e2913ca74da8c9f3fc2839258c19fa7ac20ebead31206cf280ea73f635bc5418b66554392dfd11874fef72bc53538aae3cb5ef8a80140f4737dd2c572a03ee1d5e3d627e", @ANYRESOCT=0x0, @ANYBLOB="010000000000000000000100000000000000014100000018001700000000000000007564503a73"], 0x34}, 0x1, 0x0, 0x0, 0x1}, 0x0) ioctl$AUTOFS_DEV_IOCTL_PROTOSUBVER(r1, 0xc0189373, &(0x7f0000000540)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x6}}, './file0\x00'}) sendmsg$TIPC_CMD_GET_MAX_PORTS(r5, &(0x7f0000001140)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x40000}, 0xc, &(0x7f0000001100)={&(0x7f00000010c0)={0x1c, r8, 0x400, 0x8000, 0x25dfdbfe, {}, ["", "", "", "", "", "", ""]}, 0x1c}, 0x1, 0x0, 0x0, 0x20048854}, 0x4004) bpf$PROG_LOAD(0x5, &(0x7f0000000e40)={0x5, 0x16, &(0x7f0000001340)=ANY=[@ANYBLOB="390000000100000000000000900000f117fa0000", @ANYRES32=r4, @ANYBLOB="1f00000000000000b703000000000000850000000c000000b61b0453c29f42b5be06c7010b4efffe000000000085000000a900000018150000", @ANYRES32=r3, @ANYBLOB="0000000000000000180100002020782500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b70300000000850000005d000000185500000100000000000000000000009500000000000000"], &(0x7f0000000b80)='syzkaller\x00', 0x1, 0xe8, &(0x7f0000000bc0)=""/232, 0x41000, 0x5b, '\x00', 0x0, 0xe, r5, 0x8, &(0x7f0000000d00)={0x5, 0x2}, 0x8, 0x10, &(0x7f0000000d40)={0x4, 0xe, 0x2, 0x8}, 0x10, r6, r4, 0x5, &(0x7f0000000d80), &(0x7f0000000dc0)=[{0x4, 0x3, 0x0, 0x2}, {0x3, 0x1, 0xa, 0xa}, {0x0, 0x3, 0x2, 0xa}, {0x0, 0x3, 0x7, 0x1}, {0x1, 0x5, 0xb, 0xc}], 0x10, 0x7}, 0x90) [ 108.848844][ T5441] loop0: detected capacity change from 0 to 512 [ 108.881143][ T5441] EXT4-fs (loop0): 1 orphan inode deleted [ 108.898458][ T5443] loop1: detected capacity change from 0 to 2048 [ 108.899253][ T311] Quota error (device loop0): do_check_range: Getting dqdh_entries 15 out of range 0-14 20:40:57 executing program 3: r0 = open(&(0x7f0000000040)='./bus\x00', 0x8001141042, 0x0) connect$unix(r0, &(0x7f0000000240)=@file={0x0, './bus\x00'}, 0x6e) setuid(0x0) getgid() ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f0000000a80)) getuid() r1 = gettid() bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000080)={r1, 0xffffffffffffffff, 0x0, 0x6, &(0x7f0000000040)='kfree\x00'}, 0x13) perf_event_open(&(0x7f0000002740)={0x5, 0x80, 0xfd, 0x3, 0x81, 0xeb, 0x0, 0x9, 0x0, 0x5, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0xfffffff7, 0x2, @perf_config_ext={0x2, 0x401}, 0x1800, 0x3, 0x3, 0x6, 0x80000001, 0x81, 0x20, 0x0, 0x5, 0x0, 0x10000}, r1, 0x9, 0xffffffffffffffff, 0x8) perf_event_open(&(0x7f0000000040)={0x0, 0x80, 0x1, 0x0, 0x1, 0x1f, 0x0, 0x7, 0x0, 0xa, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x8, 0x2, @perf_config_ext={0x100000001, 0x9}, 0x15, 0x72e0, 0xa9, 0x1, 0x0, 0x2, 0x5, 0x0, 0x1000}, r1, 0x7, 0xffffffffffffffff, 0x9) fstat(r0, &(0x7f0000000b00)) r2 = getegid() syz_mount_image$ext4(&(0x7f0000000100)='ext4\x00', &(0x7f0000000200)='./file1\x00', 0x3000000, &(0x7f0000003040)=ANY=[@ANYRES64=r2, @ANYBLOB="8555591a163448f4c52bee6cc0e12a6a8610718f818822e94c360e46f93ac9c63a1b40ea9d758c2b4e2d7c386a141016d11cb13fabc846fc7fb242c175fbdf96e2a96e80e82b73987b1d5dfd843c7e6748a15a0c4160f5e4c468e8f8e417bd3385546159881194fe3a7cf8307cd9c7ce0ca180a481d4dcaa6611ec5c8ff1c546360dea3da9f2bfc1fd71af9ebf2afe4285f013a3929a7096097976a16e2060e5f26e379011ea1811", @ANYRES64, @ANYBLOB="ca42ad87c41bb3b2507e4e12104f0cd507000001046f9445657db4996b10208d04454e11fb5b1383c5ce98e3062f45ec04e5b8b179df3d64a6cec05d29235e3cbe0b339abe9faee5cf3e44c97ce56a1dc359047114eeb3c23f331114039d75a664afc47e8273b79e83d301fc4ceec8b89911505b6743797c459195a7120ded1748f315deb90000ffed00000000000000", @ANYRES8=r2, @ANYRES8=r2, @ANYRES64, @ANYBLOB="bd85893dee1670c8c7e3b4a65ec61f224992fd11263b7749c7ee63dd4fc13cc5dfdde8a3099aaf21ece351c316d9bbd7e4ecc524c856f20d6a1818d6d75f702eb904653f9d55af", @ANYRESOCT], 0x1, 0x513, &(0x7f0000000c40)="$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") [ 108.937707][ T5441] ext4 filesystem being mounted at /root/syzkaller-testdir338643557/syzkaller.M396af/66/file1 supports timestamps until 2038-01-19 (0x7fffffff) [ 108.990608][ T5447] loop3: detected capacity change from 0 to 512 [ 109.009330][ T5443] loop1: p2 p3 p7 20:40:57 executing program 0: r0 = open(&(0x7f0000000040)='./bus\x00', 0x8001141042, 0x0) r1 = gettid() bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000080)={r1, 0xffffffffffffffff, 0x0, 0x6, &(0x7f0000000040)='kfree\x00'}, 0x13) perf_event_open(&(0x7f0000002740)={0x5, 0x80, 0xfd, 0x3, 0x81, 0xeb, 0x0, 0x9, 0x0, 0x5, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0xfffffff7, 0x2, @perf_config_ext={0x2, 0x401}, 0x1800, 0x3, 0x3, 0x6, 0x80000001, 0x81, 0x20, 0x0, 0x5, 0x0, 0x10000}, r1, 0x9, 0xffffffffffffffff, 0x8) perf_event_open(&(0x7f0000000040)={0x0, 0x80, 0x1, 0x0, 0x1, 0x1f, 0x0, 0x7, 0x0, 0xa, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x8, 0x2, @perf_config_ext={0x100000001, 0x9}, 0x15, 0x72e0, 0xa9, 0x1, 0x0, 0x2, 0x5, 0x0, 0x1000}, r1, 0x7, 0xffffffffffffffff, 0x9) fstat(r0, &(0x7f0000000b00)) r2 = getegid() syz_mount_image$ext4(&(0x7f0000000100)='ext4\x00', &(0x7f0000000200)='./file1\x00', 0x3000000, &(0x7f0000003040)=ANY=[@ANYRES64=r2, @ANYBLOB="8555591a163448f4c52bee6cc0e12a6a8610718f818822e94c360e46f93ac9c63a1b40ea9d758c2b4e2d7c386a141016d11cb13fabc846fc7fb242c175fbdf96e2a96e80e82b73987b1d5dfd843c7e6748a15a0c4160f5e4c468e8f8e417bd3385546159881194fe3a7cf8307cd9c7ce0ca180a481d4dcaa6611ec5c8ff1c546360dea3da9f2bfc1fd71af9ebf2afe4285f013a3929a7096097976a16e2060e5f26e379011ea1811", @ANYRES64, @ANYBLOB="ca42ad87c41bb3b2507e4e12104f0cd507000001046f9445657db4996b10208d04454e11fb5b1383c5ce98e3062f45ec04e5b8b179df3d64a6cec05d29235e3cbe0b339abe9faee5cf3e44c97ce56a1dc359047114eeb3c23f331114039d75a664afc47e8273b79e83d301fc4ceec8b89911505b6743797c459195a7120ded1748f315deb90000ffed00000000000000", @ANYRES8=r2, @ANYRES8=r2, @ANYRES64, @ANYBLOB="bd85893dee1670c8c7e3b4a65ec61f224992fd11263b7749c7ee63dd4fc13cc5dfdde8a3099aaf21ece351c316d9bbd7e4ecc524c856f20d6a1818d6d75f702eb904653f9d55af", @ANYRESOCT], 0x1, 0x513, &(0x7f0000000c40)="$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") 20:40:57 executing program 1: ioctl$BTRFS_IOC_LOGICAL_INO(0xffffffffffffffff, 0xc0389424, &(0x7f0000000180)={0x1, 0x28, '\x00', 0x1, &(0x7f0000000080)=[0x0, 0x0, 0x0, 0x0, 0x0]}) r0 = socket$inet6(0xa, 0x3, 0x6) r1 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) r2 = dup2(r1, r0) ioctl$FIDEDUPERANGE(r0, 0xc0189436, &(0x7f0000000f00)=ANY=[@ANYBLOB="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"]) recvfrom$inet6(0xffffffffffffffff, &(0x7f0000000280)=""/134, 0x86, 0x40000102, &(0x7f0000000340)={0xa, 0x4e21, 0x77f, @mcast1, 0x403b3f}, 0x1c) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000001040)={{r2, 0xffffffffffffffff}, &(0x7f0000000140), &(0x7f0000000480)=r1}, 0x20) syz_read_part_table(0x593, &(0x7f00000005c0)="$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") r4 = creat(&(0x7f0000000240)='./file0\x00', 0x0) stat(&(0x7f0000000040)='./file1\x00', &(0x7f0000000380)) fsetxattr$security_capability(r4, &(0x7f0000000100), &(0x7f0000000000)=@v1={0x1000000, [{0x80000000, 0x81}]}, 0xc, 0x0) newfstatat(0xffffffffffffff9c, &(0x7f00000000c0)='./file1\x00', &(0x7f0000001400), 0x400) close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x2) ioctl$TIOCSTI(r4, 0x5412, &(0x7f00000004c0)=0x40) fsync(0xffffffffffffffff) write$binfmt_misc(r4, &(0x7f0000001080)=ANY=[@ANYBLOB="7379d3c6"], 0x4) fallocate(r4, 0x100000011, 0x0, 0x2811fdff) open(&(0x7f0000000100)='.\x00', 0x20c2, 0x2d) open$dir(&(0x7f0000000500)='./file1\x00', 0x1c6c0, 0x0) r5 = openat$vcsu(0xffffffffffffff9c, &(0x7f0000000cc0), 0x400c00, 0x0) lsetxattr$security_selinux(&(0x7f0000001180)='./file1\x00', &(0x7f00000011c0), &(0x7f0000001300)='system_u:object_r:unconfined_exec_t:s0\x00', 0x27, 0x3) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000400)={0xffffffffffffffff, 0xe0, &(0x7f0000000300)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, &(0x7f00000000c0)=[0x0], &(0x7f0000000140), 0x0, 0x8, &(0x7f0000000200)=[{}, {}, {}, {}, {}], 0x28, 0x0, 0x0, 0x0, 0x0, 0x10, 0x8, 0x8, &(0x7f00000002c0)}}, 0x10) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000e80)=@bpf_lsm={0x1d, 0x4, &(0x7f0000000040)=@framed={{0x18, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x73fc}, [@generic={0x9, 0x8, 0x0, 0x7f, 0x200}]}, &(0x7f0000000880)='GPL\x00', 0x1f, 0x93, &(0x7f0000000cc0)=""/147, 0x40f00, 0x2, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, &(0x7f0000000b80)={0x9}, 0x8, 0x10, 0x0, 0x0, r6}, 0x80) r7 = socket$nl_generic(0x10, 0x3, 0x10) r8 = syz_genetlink_get_family_id$tipc(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$TIPC_CMD_ENABLE_BEARER(r7, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000001200)=ANY=[@ANYBLOB="3400000006c08fada241ee0a049e6fba3f36f40da839bbdf54c31768b0026f4261f56d51c5d81ba4cb99f8203c40d0a142fcd75ce26e408d229139f8c4e81109c56a18e453e8a537df21c4ec04a4f3e22f4ac125a28ad43e41107b1f7e79c8573985e54fd665e2913ca74da8c9f3fc2839258c19fa7ac20ebead31206cf280ea73f635bc5418b66554392dfd11874fef72bc53538aae3cb5ef8a80140f4737dd2c572a03ee1d5e3d627e", @ANYRESOCT=0x0, @ANYBLOB="010000000000000000000100000000000000014100000018001700000000000000007564503a73"], 0x34}, 0x1, 0x0, 0x0, 0x1}, 0x0) ioctl$AUTOFS_DEV_IOCTL_PROTOSUBVER(r1, 0xc0189373, &(0x7f0000000540)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x6}}, './file0\x00'}) sendmsg$TIPC_CMD_GET_MAX_PORTS(r5, &(0x7f0000001140)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x40000}, 0xc, &(0x7f0000001100)={&(0x7f00000010c0)={0x1c, r8, 0x400, 0x8000, 0x25dfdbfe, {}, ["", "", "", "", "", "", ""]}, 0x1c}, 0x1, 0x0, 0x0, 0x20048854}, 0x4004) bpf$PROG_LOAD(0x5, &(0x7f0000000e40)={0x5, 0x16, &(0x7f0000001340)=ANY=[@ANYBLOB="390000000100000000000000900000f117fa0000", @ANYRES32=r4, @ANYBLOB="1f00000000000000b703000000000000850000000c000000b61b0453c29f42b5be06c7010b4efffe000000000085000000a900000018150000", @ANYRES32=r3, @ANYBLOB="0000000000000000180100002020782500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b70300000000850000005d000000185500000100000000000000000000009500000000000000"], &(0x7f0000000b80)='syzkaller\x00', 0x1, 0xe8, &(0x7f0000000bc0)=""/232, 0x41000, 0x5b, '\x00', 0x0, 0xe, r5, 0x8, &(0x7f0000000d00)={0x5, 0x2}, 0x8, 0x10, &(0x7f0000000d40)={0x4, 0xe, 0x2, 0x8}, 0x10, r6, r4, 0x5, &(0x7f0000000d80), &(0x7f0000000dc0)=[{0x4, 0x3, 0x0, 0x2}, {0x3, 0x1, 0xa, 0xa}, {0x0, 0x3, 0x2, 0xa}, {0x0, 0x3, 0x7, 0x1}, {0x1, 0x5, 0xb, 0xc}], 0x10, 0x7}, 0x90) 20:40:57 executing program 4: r0 = perf_event_open(&(0x7f0000000a40)={0x2, 0x80, 0xcd, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @perf_bp={&(0x7f0000000200), 0x8}, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfb75}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000040)={0x0, 0x4, 0x0, &(0x7f0000000180)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x80) perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x208, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x4, 0x8001}, 0x4000, 0x0, 0x0, 0x0, 0x0, 0x14e, 0xd1}, 0x0, 0xbfffffffffffffff, r0, 0x19893a9f0a0e2244) r1 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) syz_clone(0x2000000, 0x0, 0x0, 0x0, 0x0, 0x0) r2 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x18, 0x5, &(0x7f00000002c0)=ANY=[@ANYBLOB="180000001800ff0f0000000000000000850000006d000000750000000800000095"], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x80) r3 = perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400, 0x80000, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x7, 0x1007}, 0x8006, 0x0, 0x0, 0x1, 0x4, 0x800000, 0x3}, 0x0, 0xffefffffffffffff, 0xffffffffffffffff, 0x9) ioctl$PERF_EVENT_IOC_SET_FILTER(r3, 0x40082406, &(0x7f00000003c0)='memory.numa_stat\x00') perf_event_open(0x0, 0x0, 0x0, r3, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000080)='sched_switch\x00', r2}, 0x10) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000380)={{0x1, 0xffffffffffffffff}, &(0x7f0000000000), &(0x7f0000000240)=r2}, 0x20) r5 = memfd_secret(0x0) syz_io_uring_setup(0x0, &(0x7f0000000300)={0x0, 0x2, 0x0, 0x0, 0x0, 0x0, r5}, 0x0, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f00000009c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000000a00)=0x14) r7 = openat2(0xffffffffffffff9c, &(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)={0x40841}, 0x18) write$binfmt_script(r7, &(0x7f0000000340)=ANY=[], 0xfffffdef) r8 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000b40)={0x1b, 0x0, 0x0, 0x7, 0x0, 0xffffffffffffffff, 0x200, '\x00', 0x0, 0xffffffffffffffff, 0x3, 0x1, 0x4}, 0x48) r9 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000bc0)={0x2, 0x4, 0x8, 0x1, 0x80, 0x1, 0x9, '\x00', 0x0, 0xffffffffffffffff, 0x4, 0x1, 0x4}, 0x48) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000d00)={0x11, 0x12, &(0x7f0000000440)=@raw=[@exit, @ringbuf_query={{0x18, 0x1, 0x1, 0x0, r4}}, @ringbuf_output={{0x18, 0x1, 0x1, 0x0, r5}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x10001}, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x4, 0x0, 0x0, 0x2}}, @exit, @initr0={0x18, 0x0, 0x0, 0x0, 0x6349, 0x0, 0x0, 0x0, 0xf685}, @ldst={0x3, 0x2, 0x1, 0x0, 0xb, 0x2543a83bb932833c, 0x1}], &(0x7f0000000940)='syzkaller\x00', 0x80000001, 0x27, &(0x7f0000000980)=""/39, 0x41000, 0x40, '\x00', r6, 0x0, r7, 0x8, &(0x7f0000000ac0)={0x3, 0x1}, 0x8, 0x10, &(0x7f0000000b00)={0x2, 0xc, 0xfffffe00, 0x2}, 0x10, 0x0, 0x0, 0x5, &(0x7f0000000c40)=[r2, 0x1, 0x1, r8, r9, r1], &(0x7f0000000c80)=[{0x4, 0x1, 0x8, 0xc}, {0x0, 0x4, 0xf, 0x4}, {0x1, 0x2, 0xd, 0x6}, {0x0, 0x4, 0x10, 0xc}, {0x2, 0x4, 0xd, 0x1}], 0x10, 0x20}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000280)={&(0x7f0000000140)='ext4_ext_show_extent\x00', r2}, 0x10) r10 = perf_event_open(&(0x7f0000000080)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) perf_event_open$cgroup(&(0x7f0000000300)={0x5, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_bp={&(0x7f0000000100)}, 0x81252, 0x6, 0x80000001, 0x0, 0x0, 0x0, 0x6, 0x0, 0x6, 0x0, 0x6}, 0xffffffffffffffff, 0xe, 0xffffffffffffffff, 0xc) perf_event_open(0x0, 0x0, 0x2, 0xffffffffffffffff, 0xb) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) perf_event_open(&(0x7f0000000840)={0x2, 0x80, 0x0, 0x7, 0x0, 0x80, 0x0, 0x3, 0x0, 0x9, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, @perf_config_ext={0x8000000000, 0x3}, 0x46c73247dfbe0d, 0x1007e, 0x0, 0x2, 0x0, 0x0, 0x6, 0x0, 0xffffffff, 0x0, 0x1c}, 0x0, 0x9, 0xffffffffffffffff, 0xd) bpf$PROG_LOAD(0x5, &(0x7f0000000780)={0x14, 0x4, &(0x7f00000008c0)=ANY=[@ANYBLOB="850000006b00000018150000a3df7ddd9621fb0201050062d91123e632b2f902ad1e9f1cc7a66ed51ac8a4070000000000000019a83f0b7c9502871fb1ca3dc499e804bbbc359859ed6fd9f104fc7ed900d122072d8275a24d000000000601c3a63953a7b36fe458", @ANYRES32, @ANYBLOB="00000000000000002d59e4eda4000000"], &(0x7f0000000400)='syzkaller\x00', 0xfff, 0xe3, &(0x7f0000000580)=""/227, 0x0, 0x4, '\x00', 0x0, 0x24, 0xffffffffffffffff, 0x8, &(0x7f0000000500)={0x1, 0x3}, 0x8, 0x10, &(0x7f0000000680)={0x5, 0x6, 0x81, 0x9}, 0x10, 0xffffffffffffffff, 0xffffffffffffffff, 0x0, &(0x7f00000006c0)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, r10]}, 0x80) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x4030582a, &(0x7f0000000040)=0x91) 20:40:57 executing program 3: ioctl$BTRFS_IOC_LOGICAL_INO(0xffffffffffffffff, 0xc0389424, &(0x7f0000000180)={0x1, 0x28, '\x00', 0x1, &(0x7f0000000080)=[0x0, 0x0, 0x0, 0x0, 0x0]}) r0 = socket$inet6(0xa, 0x3, 0x6) r1 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) r2 = dup2(r1, r0) ioctl$FIDEDUPERANGE(r0, 0xc0189436, &(0x7f0000000f00)=ANY=[@ANYBLOB="08000000000000000000000000000000000000002000000032057e68d5d647f4ed243c9d097db4c7bae602f8d4c84b5325f3d737af1c3ebe2901b056ac84d04eb9d8bfd4771499d444ff07000033206062c9a0527d2d0e4b0000fa0693ec3785977184911bffc60554e8950e91e1a8209818b4eb3440ae351192e1d7cf54ba6743f2db330481aac17f0961506d7ebd7ca999cf4e148c1ef2880f63693dfee2a6f2fafec2c059fd15db654600000000000000000076da8ec51705470a42729df6a32122af2a673d7409ca1b8a0da065e2bf7790c86a6b3014e1ef5d1c4000d3dff081d5a4c403971fe8869ab4973ffc7b24b6fbb4341ac1a0f5d56b64b9d23d6855e653f1e0418a6d9838196a7b145310a9b4c467199ecc3bd47b85aae47754bf695bdb85ea03f70beab5732a014c5f525bf2f9b9c6bd545e1a"]) ioctl$TIOCSBRK(r2, 0x5427) recvfrom$inet6(0xffffffffffffffff, &(0x7f0000000280)=""/134, 0x86, 0x40000102, &(0x7f0000000340)={0xa, 0x4e21, 0x77f, @mcast1, 0x403b3f}, 0x1c) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000001040)={{r2, 0xffffffffffffffff}, &(0x7f0000000140), &(0x7f0000000480)=r1}, 0x20) r4 = creat(&(0x7f0000000240)='./file0\x00', 0x0) stat(&(0x7f0000000040)='./file1\x00', &(0x7f0000000380)) fsetxattr$security_capability(r4, &(0x7f0000000100), &(0x7f0000000000)=@v1={0x1000000, [{0x80000000, 0x81}]}, 0xc, 0x0) newfstatat(0xffffffffffffff9c, &(0x7f00000000c0)='./file1\x00', &(0x7f0000001400), 0x400) close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x2) ioctl$TIOCSTI(r4, 0x5412, &(0x7f00000004c0)=0x40) fsync(0xffffffffffffffff) write$binfmt_misc(r4, &(0x7f0000001080)=ANY=[@ANYBLOB="7379d3c6"], 0x4) fallocate(r4, 0x100000011, 0x0, 0x2811fdff) open(&(0x7f0000000100)='.\x00', 0x20c2, 0x2d) open$dir(&(0x7f0000000500)='./file1\x00', 0x1c6c0, 0x0) r5 = openat$vcsu(0xffffffffffffff9c, &(0x7f0000000cc0), 0x400c00, 0x0) lsetxattr$security_selinux(&(0x7f0000001180)='./file1\x00', &(0x7f00000011c0), &(0x7f0000001300)='system_u:object_r:unconfined_exec_t:s0\x00', 0x27, 0x3) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000400)={0xffffffffffffffff, 0xe0, &(0x7f0000000300)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, &(0x7f00000000c0)=[0x0], &(0x7f0000000140), 0x0, 0x8, &(0x7f0000000200)=[{}, {}, {}, {}, {}], 0x28, 0x0, 0x0, 0x0, 0x0, 0x10, 0x8, 0x8, &(0x7f00000002c0)}}, 0x10) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000e80)=@bpf_lsm={0x1d, 0x4, &(0x7f0000000040)=@framed={{0x18, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x73fc}, [@generic={0x9, 0x8, 0x0, 0x7f, 0x200}]}, &(0x7f0000000880)='GPL\x00', 0x1f, 0x93, &(0x7f0000000cc0)=""/147, 0x40f00, 0x2, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, &(0x7f0000000b80)={0x9}, 0x8, 0x10, 0x0, 0x0, r6}, 0x80) r7 = socket$nl_generic(0x10, 0x3, 0x10) r8 = syz_genetlink_get_family_id$tipc(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$TIPC_CMD_ENABLE_BEARER(r7, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000001200)=ANY=[@ANYBLOB="3400000006c08fada241ee0a049e6fba3f36f40da839bbdf54c31768b0026f4261f56d51c5d81ba4cb99f8203c40d0a142fcd75ce26e408d229139f8c4e81109c56a18e453e8a537df21c4ec04a4f3e22f4ac125a28ad43e41107b1f7e79c8573985e54fd665e2913ca74da8c9f3fc2839258c19fa7ac20ebead31206cf280ea73f635bc5418b66554392dfd11874fef72bc53538aae3cb5ef8a80140f4737dd2c572a03ee1d5e3d627e", @ANYRESOCT=0x0, @ANYBLOB="010000000000000000000100000000000000014100000018001700000000000000007564503a73"], 0x34}, 0x1, 0x0, 0x0, 0x1}, 0x0) ioctl$AUTOFS_DEV_IOCTL_PROTOSUBVER(r1, 0xc0189373, &(0x7f0000000540)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x6}}, './file0\x00'}) sendmsg$TIPC_CMD_GET_MAX_PORTS(r5, &(0x7f0000001140)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x40000}, 0xc, &(0x7f0000001100)={&(0x7f00000010c0)={0x1c, r8, 0x400, 0x8000, 0x25dfdbfe, {}, ["", "", "", "", "", "", ""]}, 0x1c}, 0x1, 0x0, 0x0, 0x20048854}, 0x4004) bpf$PROG_LOAD(0x5, &(0x7f0000000e40)={0x5, 0x16, &(0x7f0000001340)=ANY=[@ANYBLOB="390000000100000000000000900000f117fa0000", @ANYRES32=r4, @ANYBLOB="1f00000000000000b703000000000000850000000c000000b61b0453c29f42b5be06c7010b4efffe000000000085000000a900000018150000", @ANYRES32=r3, @ANYBLOB="0000000000000000180100002020782500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b70300000000850000005d000000185500000100000000000000000000009500000000000000"], &(0x7f0000000b80)='syzkaller\x00', 0x1, 0xe8, &(0x7f0000000bc0)=""/232, 0x41000, 0x5b, '\x00', 0x0, 0xe, r5, 0x8, &(0x7f0000000d00)={0x5, 0x2}, 0x8, 0x10, &(0x7f0000000d40)={0x4, 0xe, 0x2, 0x8}, 0x10, r6, r4, 0x5, &(0x7f0000000d80), &(0x7f0000000dc0)=[{0x4, 0x3, 0x0, 0x2}, {0x3, 0x1, 0xa, 0xa}, {0x0, 0x3, 0x2, 0xa}, {0x0, 0x3, 0x7, 0x1}, {0x1, 0x5, 0xb, 0xc}], 0x10, 0x7}, 0x90) [ 109.055231][ T5447] EXT4-fs (loop3): 1 orphan inode deleted [ 109.065485][ T3701] Quota error (device loop3): do_check_range: Getting dqdh_entries 15 out of range 0-14 [ 109.082751][ T5447] ext4 filesystem being mounted at /root/syzkaller-testdir749715024/syzkaller.AedAWc/98/file1 supports timestamps until 2038-01-19 (0x7fffffff) [ 109.160827][ T5452] loop0: detected capacity change from 0 to 512 [ 109.199801][ T5452] EXT4-fs (loop0): 1 orphan inode deleted 20:40:57 executing program 0: r0 = gettid() bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000080)={r0, 0xffffffffffffffff, 0x0, 0x6, &(0x7f0000000040)='kfree\x00'}, 0x13) perf_event_open(&(0x7f0000002740)={0x5, 0x80, 0xfd, 0x3, 0x81, 0xeb, 0x0, 0x9, 0x0, 0x5, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0xfffffff7, 0x2, @perf_config_ext={0x2, 0x401}, 0x1800, 0x3, 0x3, 0x6, 0x80000001, 0x81, 0x20, 0x0, 0x5, 0x0, 0x10000}, r0, 0x9, 0xffffffffffffffff, 0x8) perf_event_open(&(0x7f0000000040)={0x0, 0x80, 0x1, 0x0, 0x1, 0x1f, 0x0, 0x7, 0x0, 0xa, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x8, 0x2, @perf_config_ext={0x100000001, 0x9}, 0x15, 0x72e0, 0xa9, 0x1, 0x0, 0x2, 0x5, 0x0, 0x1000}, r0, 0x7, 0xffffffffffffffff, 0x9) fstat(0xffffffffffffffff, &(0x7f0000000b00)) r1 = getegid() syz_mount_image$ext4(&(0x7f0000000100)='ext4\x00', &(0x7f0000000200)='./file1\x00', 0x3000000, &(0x7f0000003040)=ANY=[@ANYRES64=r1, @ANYBLOB="8555591a163448f4c52bee6cc0e12a6a8610718f818822e94c360e46f93ac9c63a1b40ea9d758c2b4e2d7c386a141016d11cb13fabc846fc7fb242c175fbdf96e2a96e80e82b73987b1d5dfd843c7e6748a15a0c4160f5e4c468e8f8e417bd3385546159881194fe3a7cf8307cd9c7ce0ca180a481d4dcaa6611ec5c8ff1c546360dea3da9f2bfc1fd71af9ebf2afe4285f013a3929a7096097976a16e2060e5f26e379011ea1811", @ANYRES64, @ANYBLOB="ca42ad87c41bb3b2507e4e12104f0cd507000001046f9445657db4996b10208d04454e11fb5b1383c5ce98e3062f45ec04e5b8b179df3d64a6cec05d29235e3cbe0b339abe9faee5cf3e44c97ce56a1dc359047114eeb3c23f331114039d75a664afc47e8273b79e83d301fc4ceec8b89911505b6743797c459195a7120ded1748f315deb90000ffed00000000000000", @ANYRES8=r1, @ANYRES8=r1, @ANYRES64, @ANYBLOB="bd85893dee1670c8c7e3b4a65ec61f224992fd11263b7749c7ee63dd4fc13cc5dfdde8a3099aaf21ece351c316d9bbd7e4ecc524c856f20d6a1818d6d75f702eb904653f9d55af", @ANYRESOCT], 0x1, 0x513, &(0x7f0000000c40)="$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") [ 109.217835][ T3701] Quota error (device loop0): do_check_range: Getting dqdh_entries 15 out of range 0-14 [ 109.228264][ T5453] loop1: detected capacity change from 0 to 2048 [ 109.239484][ T5452] ext4 filesystem being mounted at /root/syzkaller-testdir338643557/syzkaller.M396af/67/file1 supports timestamps until 2038-01-19 (0x7fffffff) [ 109.317080][ T5453] loop1: p2 p3 p7 20:40:57 executing program 1: ioctl$BTRFS_IOC_LOGICAL_INO(0xffffffffffffffff, 0xc0389424, &(0x7f0000000180)={0x1, 0x28, '\x00', 0x1, &(0x7f0000000080)=[0x0, 0x0, 0x0, 0x0, 0x0]}) r0 = socket$inet6(0xa, 0x3, 0x6) r1 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) r2 = dup2(r1, r0) ioctl$FIDEDUPERANGE(r0, 0xc0189436, &(0x7f0000000f00)=ANY=[@ANYBLOB="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"]) recvfrom$inet6(0xffffffffffffffff, &(0x7f0000000280)=""/134, 0x86, 0x40000102, &(0x7f0000000340)={0xa, 0x4e21, 0x77f, @mcast1, 0x403b3f}, 0x1c) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000001040)={{r2, 0xffffffffffffffff}, &(0x7f0000000140), &(0x7f0000000480)=r1}, 0x20) syz_read_part_table(0x593, &(0x7f00000005c0)="$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") r4 = creat(&(0x7f0000000240)='./file0\x00', 0x0) stat(&(0x7f0000000040)='./file1\x00', &(0x7f0000000380)) fsetxattr$security_capability(r4, &(0x7f0000000100), &(0x7f0000000000)=@v1={0x1000000, [{0x80000000, 0x81}]}, 0xc, 0x0) newfstatat(0xffffffffffffff9c, &(0x7f00000000c0)='./file1\x00', &(0x7f0000001400), 0x400) close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x2) ioctl$TIOCSTI(r4, 0x5412, &(0x7f00000004c0)=0x40) fsync(0xffffffffffffffff) write$binfmt_misc(r4, &(0x7f0000001080)=ANY=[@ANYBLOB="7379d3c6"], 0x4) fallocate(r4, 0x100000011, 0x0, 0x2811fdff) open(&(0x7f0000000100)='.\x00', 0x20c2, 0x2d) open$dir(&(0x7f0000000500)='./file1\x00', 0x1c6c0, 0x0) r5 = openat$vcsu(0xffffffffffffff9c, &(0x7f0000000cc0), 0x400c00, 0x0) lsetxattr$security_selinux(&(0x7f0000001180)='./file1\x00', &(0x7f00000011c0), &(0x7f0000001300)='system_u:object_r:unconfined_exec_t:s0\x00', 0x27, 0x3) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000400)={0xffffffffffffffff, 0xe0, &(0x7f0000000300)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, &(0x7f00000000c0)=[0x0], &(0x7f0000000140), 0x0, 0x8, &(0x7f0000000200)=[{}, {}, {}, {}, {}], 0x28, 0x0, 0x0, 0x0, 0x0, 0x10, 0x8, 0x8, &(0x7f00000002c0)}}, 0x10) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000e80)=@bpf_lsm={0x1d, 0x4, &(0x7f0000000040)=@framed={{0x18, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x73fc}, [@generic={0x9, 0x8, 0x0, 0x7f, 0x200}]}, &(0x7f0000000880)='GPL\x00', 0x1f, 0x93, &(0x7f0000000cc0)=""/147, 0x40f00, 0x2, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, &(0x7f0000000b80)={0x9}, 0x8, 0x10, 0x0, 0x0, r6}, 0x80) r7 = socket$nl_generic(0x10, 0x3, 0x10) r8 = syz_genetlink_get_family_id$tipc(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$TIPC_CMD_ENABLE_BEARER(r7, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000001200)=ANY=[@ANYBLOB="3400000006c08fada241ee0a049e6fba3f36f40da839bbdf54c31768b0026f4261f56d51c5d81ba4cb99f8203c40d0a142fcd75ce26e408d229139f8c4e81109c56a18e453e8a537df21c4ec04a4f3e22f4ac125a28ad43e41107b1f7e79c8573985e54fd665e2913ca74da8c9f3fc2839258c19fa7ac20ebead31206cf280ea73f635bc5418b66554392dfd11874fef72bc53538aae3cb5ef8a80140f4737dd2c572a03ee1d5e3d627e", @ANYRESOCT=0x0, @ANYBLOB="010000000000000000000100000000000000014100000018001700000000000000007564503a73"], 0x34}, 0x1, 0x0, 0x0, 0x1}, 0x0) ioctl$AUTOFS_DEV_IOCTL_PROTOSUBVER(r1, 0xc0189373, &(0x7f0000000540)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x6}}, './file0\x00'}) sendmsg$TIPC_CMD_GET_MAX_PORTS(r5, &(0x7f0000001140)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x40000}, 0xc, &(0x7f0000001100)={&(0x7f00000010c0)={0x1c, r8, 0x400, 0x8000, 0x25dfdbfe, {}, ["", "", "", "", "", "", ""]}, 0x1c}, 0x1, 0x0, 0x0, 0x20048854}, 0x4004) bpf$PROG_LOAD(0x5, &(0x7f0000000e40)={0x5, 0x16, &(0x7f0000001340)=ANY=[@ANYBLOB="390000000100000000000000900000f117fa0000", @ANYRES32=r4, @ANYBLOB="1f00000000000000b703000000000000850000000c000000b61b0453c29f42b5be06c7010b4efffe000000000085000000a900000018150000", @ANYRES32=r3, @ANYBLOB="0000000000000000180100002020782500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b70300000000850000005d000000185500000100000000000000000000009500000000000000"], &(0x7f0000000b80)='syzkaller\x00', 0x1, 0xe8, &(0x7f0000000bc0)=""/232, 0x41000, 0x5b, '\x00', 0x0, 0xe, r5, 0x8, &(0x7f0000000d00)={0x5, 0x2}, 0x8, 0x10, &(0x7f0000000d40)={0x4, 0xe, 0x2, 0x8}, 0x10, r6, r4, 0x5, &(0x7f0000000d80), &(0x7f0000000dc0)=[{0x4, 0x3, 0x0, 0x2}, {0x3, 0x1, 0xa, 0xa}, {0x0, 0x3, 0x2, 0xa}, {0x0, 0x3, 0x7, 0x1}, {0x1, 0x5, 0xb, 0xc}], 0x10, 0x7}, 0x90) [ 109.357557][ T2775] loop1: p2 p3 p7 [ 109.402124][ T4030] udevd[4030]: inotify_add_watch(7, /dev/loop1p3, 10) failed: No such file or directory [ 109.418384][ T3169] udevd[3169]: inotify_add_watch(7, /dev/loop1p7, 10) failed: No such file or directory [ 109.440146][ T5466] loop0: detected capacity change from 0 to 512 [ 109.454074][ T5465] loop1: detected capacity change from 0 to 2048 [ 109.483095][ T5466] EXT4-fs (loop0): 1 orphan inode deleted 20:40:57 executing program 2: r0 = perf_event_open(&(0x7f0000000a40)={0x2, 0x80, 0xcd, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @perf_bp={&(0x7f0000000200), 0x8}, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfb75}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000040)={0x0, 0x4, 0x0, &(0x7f0000000180)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x80) perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x208, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x4, 0x8001}, 0x4000, 0x0, 0x0, 0x0, 0x0, 0x14e, 0xd1}, 0x0, 0xbfffffffffffffff, r0, 0x19893a9f0a0e2244) r1 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) syz_clone(0x2000000, 0x0, 0x0, 0x0, 0x0, 0x0) r2 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x18, 0x5, &(0x7f00000002c0)=ANY=[@ANYBLOB="180000001800ff0f0000000000000000850000006d000000750000000800000095"], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x80) r3 = perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400, 0x80000, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x7, 0x1007}, 0x8006, 0x0, 0x0, 0x1, 0x4, 0x800000, 0x3}, 0x0, 0xffefffffffffffff, 0xffffffffffffffff, 0x9) ioctl$PERF_EVENT_IOC_SET_FILTER(r3, 0x40082406, &(0x7f00000003c0)='memory.numa_stat\x00') perf_event_open(0x0, 0x0, 0x0, r3, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000080)='sched_switch\x00', r2}, 0x10) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000380)={{0x1, 0xffffffffffffffff}, &(0x7f0000000000), &(0x7f0000000240)=r2}, 0x20) r5 = memfd_secret(0x0) syz_io_uring_setup(0x0, &(0x7f0000000300)={0x0, 0x2, 0x0, 0x0, 0x0, 0x0, r5}, 0x0, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f00000009c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000000a00)=0x14) r7 = openat2(0xffffffffffffff9c, &(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)={0x40841}, 0x18) write$binfmt_script(r7, &(0x7f0000000340)=ANY=[], 0xfffffdef) r8 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000b40)={0x1b, 0x0, 0x0, 0x7, 0x0, 0xffffffffffffffff, 0x200, '\x00', 0x0, 0xffffffffffffffff, 0x3, 0x1, 0x4}, 0x48) r9 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000bc0)={0x2, 0x4, 0x8, 0x1, 0x80, 0x1, 0x9, '\x00', 0x0, 0xffffffffffffffff, 0x4, 0x1, 0x4}, 0x48) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000d00)={0x11, 0x12, &(0x7f0000000440)=@raw=[@exit, @ringbuf_query={{0x18, 0x1, 0x1, 0x0, r4}}, @ringbuf_output={{0x18, 0x1, 0x1, 0x0, r5}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x10001}, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x4, 0x0, 0x0, 0x2}}, @exit, @initr0={0x18, 0x0, 0x0, 0x0, 0x6349, 0x0, 0x0, 0x0, 0xf685}, @ldst={0x3, 0x2, 0x1, 0x0, 0xb, 0x2543a83bb932833c, 0x1}], &(0x7f0000000940)='syzkaller\x00', 0x80000001, 0x27, &(0x7f0000000980)=""/39, 0x41000, 0x40, '\x00', r6, 0x0, r7, 0x8, &(0x7f0000000ac0)={0x3, 0x1}, 0x8, 0x10, &(0x7f0000000b00)={0x2, 0xc, 0xfffffe00, 0x2}, 0x10, 0x0, 0x0, 0x5, &(0x7f0000000c40)=[r2, 0x1, 0x1, r8, r9, r1], &(0x7f0000000c80)=[{0x4, 0x1, 0x8, 0xc}, {0x0, 0x4, 0xf, 0x4}, {0x1, 0x2, 0xd, 0x6}, {0x0, 0x4, 0x10, 0xc}, {0x2, 0x4, 0xd, 0x1}], 0x10, 0x20}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000280)={&(0x7f0000000140)='ext4_ext_show_extent\x00', r2}, 0x10) r10 = perf_event_open(&(0x7f0000000080)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r11 = gettid() perf_event_open$cgroup(&(0x7f0000000300)={0x5, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_bp={&(0x7f0000000100)}, 0x81252, 0x6, 0x80000001, 0x0, 0x0, 0x0, 0x6, 0x0, 0x6, 0x0, 0x6}, 0xffffffffffffffff, 0xe, 0xffffffffffffffff, 0xc) perf_event_open(0x0, r11, 0x2, 0xffffffffffffffff, 0xb) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) perf_event_open(&(0x7f0000000840)={0x2, 0x80, 0x0, 0x7, 0x0, 0x80, 0x0, 0x3, 0x0, 0x9, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, @perf_config_ext={0x8000000000, 0x3}, 0x46c73247dfbe0d, 0x1007e, 0x0, 0x2, 0x0, 0x0, 0x6, 0x0, 0xffffffff, 0x0, 0x1c}, 0x0, 0x9, 0xffffffffffffffff, 0xd) bpf$PROG_LOAD(0x5, &(0x7f0000000780)={0x14, 0x4, &(0x7f00000008c0)=ANY=[@ANYBLOB="850000006b00000018150000a3df7ddd9621fb0201050062d91123e632b2f902ad1e9f1cc7a66ed51ac8a4070000000000000019a83f0b7c9502871fb1ca3dc499e804bbbc359859ed6fd9f104fc7ed900d122072d8275a24d000000000601c3a63953a7b36fe458", @ANYRES32, @ANYBLOB="00000000000000002d59e4eda4000000"], &(0x7f0000000400)='syzkaller\x00', 0xfff, 0xe3, &(0x7f0000000580)=""/227, 0x0, 0x4, '\x00', 0x0, 0x24, 0xffffffffffffffff, 0x8, &(0x7f0000000500)={0x1, 0x3}, 0x8, 0x10, &(0x7f0000000680)={0x5, 0x6, 0x81, 0x9}, 0x10, 0xffffffffffffffff, 0xffffffffffffffff, 0x0, &(0x7f00000006c0)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, r10]}, 0x80) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x4030582a, &(0x7f0000000040)=0x91) 20:40:57 executing program 3: r0 = open(&(0x7f0000000040)='./bus\x00', 0x8001141042, 0x0) connect$unix(r0, &(0x7f0000000240)=@file={0x0, './bus\x00'}, 0x6e) setuid(0x0) getgid() ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f0000000a80)) getuid() getegid() r1 = gettid() bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000080)={r1, 0xffffffffffffffff, 0x0, 0x6, &(0x7f0000000040)='kfree\x00'}, 0x13) perf_event_open(&(0x7f0000002740)={0x5, 0x80, 0xfd, 0x3, 0x81, 0xeb, 0x0, 0x9, 0x0, 0x5, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0xfffffff7, 0x2, @perf_config_ext={0x2, 0x401}, 0x1800, 0x3, 0x3, 0x6, 0x80000001, 0x81, 0x20, 0x0, 0x5, 0x0, 0x10000}, r1, 0x9, 0xffffffffffffffff, 0x8) perf_event_open(&(0x7f0000000040)={0x0, 0x80, 0x1, 0x0, 0x1, 0x1f, 0x0, 0x7, 0x0, 0xa, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x8, 0x2, @perf_config_ext={0x100000001, 0x9}, 0x15, 0x72e0, 0xa9, 0x1, 0x0, 0x2, 0x5, 0x0, 0x1000}, r1, 0x7, 0xffffffffffffffff, 0x9) fstat(r0, &(0x7f0000000b00)) r2 = getegid() syz_mount_image$ext4(&(0x7f0000000100)='ext4\x00', &(0x7f0000000200)='./file1\x00', 0x3000000, &(0x7f0000003040)=ANY=[@ANYRES64=r2, @ANYBLOB="8555591a163448f4c52bee6cc0e12a6a8610718f818822e94c360e46f93ac9c63a1b40ea9d758c2b4e2d7c386a141016d11cb13fabc846fc7fb242c175fbdf96e2a96e80e82b73987b1d5dfd843c7e6748a15a0c4160f5e4c468e8f8e417bd3385546159881194fe3a7cf8307cd9c7ce0ca180a481d4dcaa6611ec5c8ff1c546360dea3da9f2bfc1fd71af9ebf2afe4285f013a3929a7096097976a16e2060e5f26e379011ea1811", @ANYRES64, @ANYBLOB="ca42ad87c41bb3b2507e4e12104f0cd507000001046f9445657db4996b10208d04454e11fb5b1383c5ce98e3062f45ec04e5b8b179df3d64a6cec05d29235e3cbe0b339abe9faee5cf3e44c97ce56a1dc359047114eeb3c23f331114039d75a664afc47e8273b79e83d301fc4ceec8b89911505b6743797c459195a7120ded1748f315deb90000ffed00000000000000", @ANYRES8=r2, @ANYRES8=r2, @ANYRES64, @ANYBLOB="bd85893dee1670c8c7e3b4a65ec61f224992fd11263b7749c7ee63dd4fc13cc5dfdde8a3099aaf21ece351c316d9bbd7e4ecc524c856f20d6a1818d6d75f702eb904653f9d55af", @ANYRESOCT], 0x1, 0x513, &(0x7f0000000c40)="$eJzs3W9rJHcdAPDvTLJp7i41WxU5C7bFVu6K3m7S2DaKtBVEHxXU+jzGZBNCNtmQ3dRLKJriCxBEVPAF+ETwBQjSlyDCgT4XFUX0Th/qjczuRPNnN1mSTfbcfD4w2d9v/n2/vyE7O39+zARwbb0QEW9FxFhEvBwR08X4tBgW8sp+Z75HD99byocksuydvyWRFOMO1pXXxyPiVmeRmIyIr38l4lvJybjN3b31xXq9tl3Uq62NrWpzd+/e2sbiam21tjk3N/va/Ovzr87PZIULtbMcEW986U8/+v7PvvzGrz7z7d8v/OXud/K0vvCxTt4RsXShAD101l1qb4sD+TbavoxgQ5K3pzQ27CwAAOhHfoz/4Yj4ZPv4fzrG2kdzAAAAwCjJ3pyKfyURGQAAADCy0oiYiiStFH0BpiJNK5VOH96Pxs203mi2Pr3S2NlczqdFlKOUrqzVazNFX+FylJK8Plv0sT2ov3KsPhcRz0TED6dvtOuVpUZ9edgXPwAAAOCauPX80fP/f06n7TIAAAAwYso9KwAAAMCocMoPAAAAo8/5PwAAAIy0r779dj5kB+/xXn53d2e98e695VpzvbKxs1RZamxvVVYbjdX2M/s2zlpfvdHY+mxs7tyvtmrNVrW5u7ew0djZbC2sHXkFNgAAAHCFnnn+g98lEbH/+RvtIYrnAAIc8cdhJwAM0tiwEwCGZnzYCQBDUzpzDnsIGHXJGdNPdt7pXCuMX19OPgAAwODd+fjJ+/8TxbSzrw0A/8/09QGA68fdPbi+SuftAXh70JkAw/KhzsdTvab3fHhHH/f/O9cYsuxciQEAAAMz1R6StFIcp09FmlYqEU+3XwtQSlbW6rWZ4vzgt9Olp/L6bHvJ5Mw+wwAAAAAAAAAAAAAAAAAAAAAAAABAR5YlkQEAAAAjLSL9c9J+mn/EnemXpo5eHTj21q+fvvPj+4ut1vZsxETy9+l81EREtH5SjH8l80oAAAAAeAJ0ztOLz9lhZwMAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAADAqHn08L2lg+Eq4/71ixFR7hZ/PCbbn5NRioib/0hi/NBySUSMDSD+/vsRcbtb/CQeZ1lWLrLoFv/GJccvtzdN9/hpRNwaQHy4zj7I9z9vdfv+pfFC+7P792+8GC6q9/4v/e/+b6zH/ufpY/Venn3wi2rP+O9HPDveff9zED/pxD8SIq+82Gcbv/mNvb2uEw6tslv8w7GqrY2tanN3797axuJqbbW2OTc3+9r86/Ovzs9UV9bqteJv1zA/+MQvH5/W/ps94pePtv/E9n+pr9Zn8e8H9x9+pFMpdYt/98Xuv7+3e8RPi9++TxXlfPqdg/J+p3zYcz//zXOntX+5R/snz2j/3b7aH597+Wvf+0PXKSe2BgBwFZq7e+uL9Xpt+5TCZB/zXHHhzScjjQEW4slIY1iF7Lud/8eLreeCi58oZBdZfDwGkMbEie/pWJx3hUnEfr6uPv8hAQCAEfO/g/7T7iABAAAAAAAAAAAAAAAAAAAAl+mcjyWbjIi+Zz4ec384TQUAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAONV/AgAA//8FStFZ") 20:40:57 executing program 4: r0 = perf_event_open(&(0x7f0000000a40)={0x2, 0x80, 0xcd, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @perf_bp={&(0x7f0000000200), 0x8}, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfb75}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000040)={0x0, 0x4, 0x0, &(0x7f0000000180)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x80) perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x208, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x4, 0x8001}, 0x4000, 0x0, 0x0, 0x0, 0x0, 0x14e, 0xd1}, 0x0, 0xbfffffffffffffff, r0, 0x19893a9f0a0e2244) r1 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) syz_clone(0x2000000, 0x0, 0x0, 0x0, 0x0, 0x0) r2 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x18, 0x5, &(0x7f00000002c0)=ANY=[@ANYBLOB="180000001800ff0f0000000000000000850000006d000000750000000800000095"], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x80) r3 = perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400, 0x80000, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x7, 0x1007}, 0x8006, 0x0, 0x0, 0x1, 0x4, 0x800000, 0x3}, 0x0, 0xffefffffffffffff, 0xffffffffffffffff, 0x9) ioctl$PERF_EVENT_IOC_SET_FILTER(r3, 0x40082406, &(0x7f00000003c0)='memory.numa_stat\x00') perf_event_open(0x0, 0x0, 0x0, r3, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000080)='sched_switch\x00', r2}, 0x10) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000380)={{0x1, 0xffffffffffffffff}, &(0x7f0000000000), &(0x7f0000000240)=r2}, 0x20) r5 = memfd_secret(0x0) syz_io_uring_setup(0x0, &(0x7f0000000300)={0x0, 0x2, 0x0, 0x0, 0x0, 0x0, r5}, 0x0, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f00000009c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000000a00)=0x14) r7 = openat2(0xffffffffffffff9c, &(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)={0x40841}, 0x18) write$binfmt_script(r7, &(0x7f0000000340)=ANY=[], 0xfffffdef) r8 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000b40)={0x1b, 0x0, 0x0, 0x7, 0x0, 0xffffffffffffffff, 0x200, '\x00', 0x0, 0xffffffffffffffff, 0x3, 0x1, 0x4}, 0x48) r9 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000bc0)={0x2, 0x4, 0x8, 0x1, 0x80, 0x1, 0x9, '\x00', 0x0, 0xffffffffffffffff, 0x4, 0x1, 0x4}, 0x48) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000d00)={0x11, 0x12, &(0x7f0000000440)=@raw=[@exit, @ringbuf_query={{0x18, 0x1, 0x1, 0x0, r4}}, @ringbuf_output={{0x18, 0x1, 0x1, 0x0, r5}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x10001}, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x4, 0x0, 0x0, 0x2}}, @exit, @initr0={0x18, 0x0, 0x0, 0x0, 0x6349, 0x0, 0x0, 0x0, 0xf685}, @ldst={0x3, 0x2, 0x1, 0x0, 0xb, 0x2543a83bb932833c, 0x1}], &(0x7f0000000940)='syzkaller\x00', 0x80000001, 0x27, &(0x7f0000000980)=""/39, 0x41000, 0x40, '\x00', r6, 0x0, r7, 0x8, &(0x7f0000000ac0)={0x3, 0x1}, 0x8, 0x10, &(0x7f0000000b00)={0x2, 0xc, 0xfffffe00, 0x2}, 0x10, 0x0, 0x0, 0x5, &(0x7f0000000c40)=[r2, 0x1, 0x1, r8, r9, r1], &(0x7f0000000c80)=[{0x4, 0x1, 0x8, 0xc}, {0x0, 0x4, 0xf, 0x4}, {0x1, 0x2, 0xd, 0x6}, {0x0, 0x4, 0x10, 0xc}, {0x2, 0x4, 0xd, 0x1}], 0x10, 0x20}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000280)={&(0x7f0000000140)='ext4_ext_show_extent\x00', r2}, 0x10) r10 = perf_event_open(&(0x7f0000000080)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) perf_event_open$cgroup(&(0x7f0000000300)={0x5, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_bp={&(0x7f0000000100)}, 0x81252, 0x6, 0x80000001, 0x0, 0x0, 0x0, 0x6, 0x0, 0x6, 0x0, 0x6}, 0xffffffffffffffff, 0xe, 0xffffffffffffffff, 0xc) perf_event_open(0x0, 0x0, 0x2, 0xffffffffffffffff, 0xb) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) perf_event_open(&(0x7f0000000840)={0x2, 0x80, 0x0, 0x7, 0x0, 0x80, 0x0, 0x3, 0x0, 0x9, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, @perf_config_ext={0x8000000000, 0x3}, 0x46c73247dfbe0d, 0x1007e, 0x0, 0x2, 0x0, 0x0, 0x6, 0x0, 0xffffffff, 0x0, 0x1c}, 0x0, 0x9, 0xffffffffffffffff, 0xd) bpf$PROG_LOAD(0x5, &(0x7f0000000780)={0x14, 0x4, &(0x7f00000008c0)=ANY=[@ANYBLOB="850000006b00000018150000a3df7ddd9621fb0201050062d91123e632b2f902ad1e9f1cc7a66ed51ac8a4070000000000000019a83f0b7c9502871fb1ca3dc499e804bbbc359859ed6fd9f104fc7ed900d122072d8275a24d000000000601c3a63953a7b36fe458", @ANYRES32, @ANYBLOB="00000000000000002d59e4eda4000000"], &(0x7f0000000400)='syzkaller\x00', 0xfff, 0xe3, &(0x7f0000000580)=""/227, 0x0, 0x4, '\x00', 0x0, 0x24, 0xffffffffffffffff, 0x8, &(0x7f0000000500)={0x1, 0x3}, 0x8, 0x10, &(0x7f0000000680)={0x5, 0x6, 0x81, 0x9}, 0x10, 0xffffffffffffffff, 0xffffffffffffffff, 0x0, &(0x7f00000006c0)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, r10]}, 0x80) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x4030582a, &(0x7f0000000040)=0x91) 20:40:57 executing program 0: r0 = gettid() bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000080)={r0, 0xffffffffffffffff, 0x0, 0x6, &(0x7f0000000040)='kfree\x00'}, 0x13) perf_event_open(&(0x7f0000002740)={0x5, 0x80, 0xfd, 0x3, 0x81, 0xeb, 0x0, 0x9, 0x0, 0x5, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0xfffffff7, 0x2, @perf_config_ext={0x2, 0x401}, 0x1800, 0x3, 0x3, 0x6, 0x80000001, 0x81, 0x20, 0x0, 0x5, 0x0, 0x10000}, r0, 0x9, 0xffffffffffffffff, 0x8) perf_event_open(&(0x7f0000000040)={0x0, 0x80, 0x1, 0x0, 0x1, 0x1f, 0x0, 0x7, 0x0, 0xa, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x8, 0x2, @perf_config_ext={0x100000001, 0x9}, 0x15, 0x72e0, 0xa9, 0x1, 0x0, 0x2, 0x5, 0x0, 0x1000}, r0, 0x7, 0xffffffffffffffff, 0x9) fstat(0xffffffffffffffff, &(0x7f0000000b00)) r1 = getegid() syz_mount_image$ext4(&(0x7f0000000100)='ext4\x00', &(0x7f0000000200)='./file1\x00', 0x3000000, &(0x7f0000003040)=ANY=[@ANYRES64=r1, @ANYBLOB="8555591a163448f4c52bee6cc0e12a6a8610718f818822e94c360e46f93ac9c63a1b40ea9d758c2b4e2d7c386a141016d11cb13fabc846fc7fb242c175fbdf96e2a96e80e82b73987b1d5dfd843c7e6748a15a0c4160f5e4c468e8f8e417bd3385546159881194fe3a7cf8307cd9c7ce0ca180a481d4dcaa6611ec5c8ff1c546360dea3da9f2bfc1fd71af9ebf2afe4285f013a3929a7096097976a16e2060e5f26e379011ea1811", @ANYRES64, @ANYBLOB="ca42ad87c41bb3b2507e4e12104f0cd507000001046f9445657db4996b10208d04454e11fb5b1383c5ce98e3062f45ec04e5b8b179df3d64a6cec05d29235e3cbe0b339abe9faee5cf3e44c97ce56a1dc359047114eeb3c23f331114039d75a664afc47e8273b79e83d301fc4ceec8b89911505b6743797c459195a7120ded1748f315deb90000ffed00000000000000", @ANYRES8=r1, @ANYRES8=r1, @ANYRES64, @ANYBLOB="bd85893dee1670c8c7e3b4a65ec61f224992fd11263b7749c7ee63dd4fc13cc5dfdde8a3099aaf21ece351c316d9bbd7e4ecc524c856f20d6a1818d6d75f702eb904653f9d55af", @ANYRESOCT], 0x1, 0x513, &(0x7f0000000c40)="$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") [ 109.506004][ T5466] ext4 filesystem being mounted at /root/syzkaller-testdir338643557/syzkaller.M396af/68/file1 supports timestamps until 2038-01-19 (0x7fffffff) [ 109.544674][ T5465] loop1: p2 p3 p7 20:40:58 executing program 1: ioctl$BTRFS_IOC_LOGICAL_INO(0xffffffffffffffff, 0xc0389424, &(0x7f0000000180)={0x1, 0x28, '\x00', 0x1, &(0x7f0000000080)=[0x0, 0x0, 0x0, 0x0, 0x0]}) r0 = socket$inet6(0xa, 0x3, 0x6) r1 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) r2 = dup2(r1, r0) ioctl$FIDEDUPERANGE(r0, 0xc0189436, &(0x7f0000000f00)=ANY=[@ANYBLOB="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"]) recvfrom$inet6(0xffffffffffffffff, &(0x7f0000000280)=""/134, 0x86, 0x40000102, &(0x7f0000000340)={0xa, 0x4e21, 0x77f, @mcast1, 0x403b3f}, 0x1c) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000001040)={{r2, 0xffffffffffffffff}, &(0x7f0000000140), &(0x7f0000000480)=r1}, 0x20) syz_read_part_table(0x593, &(0x7f00000005c0)="$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") r4 = creat(&(0x7f0000000240)='./file0\x00', 0x0) stat(&(0x7f0000000040)='./file1\x00', &(0x7f0000000380)) fsetxattr$security_capability(r4, &(0x7f0000000100), &(0x7f0000000000)=@v1={0x1000000, [{0x80000000, 0x81}]}, 0xc, 0x0) newfstatat(0xffffffffffffff9c, &(0x7f00000000c0)='./file1\x00', &(0x7f0000001400), 0x400) close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x2) ioctl$TIOCSTI(r4, 0x5412, &(0x7f00000004c0)=0x40) fsync(0xffffffffffffffff) write$binfmt_misc(r4, &(0x7f0000001080)=ANY=[@ANYBLOB="7379d3c6"], 0x4) fallocate(r4, 0x100000011, 0x0, 0x2811fdff) open(&(0x7f0000000100)='.\x00', 0x20c2, 0x2d) open$dir(&(0x7f0000000500)='./file1\x00', 0x1c6c0, 0x0) r5 = openat$vcsu(0xffffffffffffff9c, &(0x7f0000000cc0), 0x400c00, 0x0) lsetxattr$security_selinux(&(0x7f0000001180)='./file1\x00', &(0x7f00000011c0), &(0x7f0000001300)='system_u:object_r:unconfined_exec_t:s0\x00', 0x27, 0x3) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000400)={0xffffffffffffffff, 0xe0, &(0x7f0000000300)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, &(0x7f00000000c0)=[0x0], &(0x7f0000000140), 0x0, 0x8, &(0x7f0000000200)=[{}, {}, {}, {}, {}], 0x28, 0x0, 0x0, 0x0, 0x0, 0x10, 0x8, 0x8, &(0x7f00000002c0)}}, 0x10) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000e80)=@bpf_lsm={0x1d, 0x4, &(0x7f0000000040)=@framed={{0x18, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x73fc}, [@generic={0x9, 0x8, 0x0, 0x7f, 0x200}]}, &(0x7f0000000880)='GPL\x00', 0x1f, 0x93, &(0x7f0000000cc0)=""/147, 0x40f00, 0x2, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, &(0x7f0000000b80)={0x9}, 0x8, 0x10, 0x0, 0x0, r6}, 0x80) r7 = socket$nl_generic(0x10, 0x3, 0x10) r8 = syz_genetlink_get_family_id$tipc(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$TIPC_CMD_ENABLE_BEARER(r7, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000001200)=ANY=[@ANYBLOB="3400000006c08fada241ee0a049e6fba3f36f40da839bbdf54c31768b0026f4261f56d51c5d81ba4cb99f8203c40d0a142fcd75ce26e408d229139f8c4e81109c56a18e453e8a537df21c4ec04a4f3e22f4ac125a28ad43e41107b1f7e79c8573985e54fd665e2913ca74da8c9f3fc2839258c19fa7ac20ebead31206cf280ea73f635bc5418b66554392dfd11874fef72bc53538aae3cb5ef8a80140f4737dd2c572a03ee1d5e3d627e", @ANYRESOCT=0x0, @ANYBLOB="010000000000000000000100000000000000014100000018001700000000000000007564503a73"], 0x34}, 0x1, 0x0, 0x0, 0x1}, 0x0) ioctl$AUTOFS_DEV_IOCTL_PROTOSUBVER(r1, 0xc0189373, &(0x7f0000000540)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x6}}, './file0\x00'}) sendmsg$TIPC_CMD_GET_MAX_PORTS(r5, &(0x7f0000001140)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x40000}, 0xc, &(0x7f0000001100)={&(0x7f00000010c0)={0x1c, r8, 0x400, 0x8000, 0x25dfdbfe, {}, ["", "", "", "", "", "", ""]}, 0x1c}, 0x1, 0x0, 0x0, 0x20048854}, 0x4004) bpf$PROG_LOAD(0x5, &(0x7f0000000e40)={0x5, 0x16, &(0x7f0000001340)=ANY=[@ANYBLOB="390000000100000000000000900000f117fa0000", @ANYRES32=r4, @ANYBLOB="1f00000000000000b703000000000000850000000c000000b61b0453c29f42b5be06c7010b4efffe000000000085000000a900000018150000", @ANYRES32=r3, @ANYBLOB="0000000000000000180100002020782500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b70300000000850000005d000000185500000100000000000000000000009500000000000000"], &(0x7f0000000b80)='syzkaller\x00', 0x1, 0xe8, &(0x7f0000000bc0)=""/232, 0x41000, 0x5b, '\x00', 0x0, 0xe, r5, 0x8, &(0x7f0000000d00)={0x5, 0x2}, 0x8, 0x10, &(0x7f0000000d40)={0x4, 0xe, 0x2, 0x8}, 0x10, r6, r4, 0x5, &(0x7f0000000d80), &(0x7f0000000dc0)=[{0x4, 0x3, 0x0, 0x2}, {0x3, 0x1, 0xa, 0xa}, {0x0, 0x3, 0x2, 0xa}, {0x0, 0x3, 0x7, 0x1}, {0x1, 0x5, 0xb, 0xc}], 0x10, 0x7}, 0x90) [ 109.601629][ T5476] loop3: detected capacity change from 0 to 512 20:40:58 executing program 3: r0 = msgget(0x2, 0x21) msgsnd(r0, &(0x7f0000000440)={0x3, "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"}, 0x185, 0x800) msgrcv(r0, &(0x7f00000000c0)={0x0, ""/49}, 0x39, 0x0, 0x2400) msgrcv(r0, &(0x7f00000001c0)={0x0, ""/140}, 0x94, 0x2, 0x0) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000100)={0xa, 0x3, &(0x7f0000000000)=@framed={{0x18, 0x0, 0x0, 0x0, 0x1}}, &(0x7f0000000080)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0xf}, 0xffffffffffffff66) [ 109.642942][ T5476] EXT4-fs (loop3): 1 orphan inode deleted [ 109.651021][ T5479] loop0: detected capacity change from 0 to 512 [ 109.658756][ T5476] ext4 filesystem being mounted at /root/syzkaller-testdir749715024/syzkaller.AedAWc/100/file1 supports timestamps until 2038-01-19 (0x7fffffff) [ 109.682314][ T3326] I/O error, dev loop1, sector 0 op 0x0:(READ) flags 0x80700 phys_seg 1 prio class 0 [ 109.704422][ T5479] EXT4-fs (loop0): 1 orphan inode deleted [ 109.710668][ T4030] udevd[4030]: inotify_add_watch(7, /dev/loop1p3, 10) failed: No such file or directory [ 109.726040][ T3169] udevd[3169]: inotify_add_watch(7, /dev/loop1p7, 10) failed: No such file or directory 20:40:58 executing program 0: r0 = gettid() bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) perf_event_open(&(0x7f0000002740)={0x5, 0x80, 0xfd, 0x3, 0x81, 0xeb, 0x0, 0x9, 0x0, 0x5, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0xfffffff7, 0x2, @perf_config_ext={0x2, 0x401}, 0x1800, 0x3, 0x3, 0x6, 0x80000001, 0x81, 0x20, 0x0, 0x5, 0x0, 0x10000}, r0, 0x9, 0xffffffffffffffff, 0x8) perf_event_open(&(0x7f0000000040)={0x0, 0x80, 0x1, 0x0, 0x1, 0x1f, 0x0, 0x7, 0x0, 0xa, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x8, 0x2, @perf_config_ext={0x100000001, 0x9}, 0x15, 0x72e0, 0xa9, 0x1, 0x0, 0x2, 0x5, 0x0, 0x1000}, r0, 0x7, 0xffffffffffffffff, 0x9) fstat(0xffffffffffffffff, &(0x7f0000000b00)) r1 = getegid() syz_mount_image$ext4(&(0x7f0000000100)='ext4\x00', &(0x7f0000000200)='./file1\x00', 0x3000000, &(0x7f0000003040)=ANY=[@ANYRES64=r1, @ANYBLOB="8555591a163448f4c52bee6cc0e12a6a8610718f818822e94c360e46f93ac9c63a1b40ea9d758c2b4e2d7c386a141016d11cb13fabc846fc7fb242c175fbdf96e2a96e80e82b73987b1d5dfd843c7e6748a15a0c4160f5e4c468e8f8e417bd3385546159881194fe3a7cf8307cd9c7ce0ca180a481d4dcaa6611ec5c8ff1c546360dea3da9f2bfc1fd71af9ebf2afe4285f013a3929a7096097976a16e2060e5f26e379011ea1811", @ANYRES64, @ANYBLOB="ca42ad87c41bb3b2507e4e12104f0cd507000001046f9445657db4996b10208d04454e11fb5b1383c5ce98e3062f45ec04e5b8b179df3d64a6cec05d29235e3cbe0b339abe9faee5cf3e44c97ce56a1dc359047114eeb3c23f331114039d75a664afc47e8273b79e83d301fc4ceec8b89911505b6743797c459195a7120ded1748f315deb90000ffed00000000000000", @ANYRES8=r1, @ANYRES8=r1, @ANYRES64, @ANYBLOB="bd85893dee1670c8c7e3b4a65ec61f224992fd11263b7749c7ee63dd4fc13cc5dfdde8a3099aaf21ece351c316d9bbd7e4ecc524c856f20d6a1818d6d75f702eb904653f9d55af", @ANYRESOCT], 0x1, 0x513, &(0x7f0000000c40)="$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") 20:40:58 executing program 3: r0 = msgget(0x2, 0x21) msgsnd(r0, &(0x7f0000000440)={0x3, "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"}, 0x185, 0x800) msgrcv(r0, &(0x7f00000000c0)={0x0, ""/49}, 0x39, 0x0, 0x2400) msgrcv(r0, &(0x7f00000001c0)={0x0, ""/140}, 0x94, 0x2, 0x0) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000100)={0xa, 0x3, &(0x7f0000000000)=@framed={{0x18, 0x0, 0x0, 0x0, 0x1}}, &(0x7f0000000080)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0xf}, 0xffffffffffffff66) msgget(0x2, 0x21) (async) msgsnd(r0, &(0x7f0000000440)={0x3, "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"}, 0x185, 0x800) (async) msgrcv(r0, &(0x7f00000000c0)={0x0, ""/49}, 0x39, 0x0, 0x2400) (async) msgrcv(r0, &(0x7f00000001c0)={0x0, ""/140}, 0x94, 0x2, 0x0) (async) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000100)={0xa, 0x3, &(0x7f0000000000)=@framed={{0x18, 0x0, 0x0, 0x0, 0x1}}, &(0x7f0000000080)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0xf}, 0xffffffffffffff66) (async) [ 109.755730][ T5479] ext4 filesystem being mounted at /root/syzkaller-testdir338643557/syzkaller.M396af/69/file1 supports timestamps until 2038-01-19 (0x7fffffff) [ 109.788171][ T5486] loop1: detected capacity change from 0 to 2048 20:40:58 executing program 3: r0 = msgget(0x2, 0x21) msgsnd(r0, &(0x7f0000000440)={0x3, "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"}, 0x185, 0x800) msgrcv(r0, &(0x7f00000000c0)={0x0, ""/49}, 0x39, 0x0, 0x2400) (async, rerun: 32) msgrcv(r0, &(0x7f00000001c0)={0x0, ""/140}, 0x94, 0x2, 0x0) (async, rerun: 32) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000100)={0xa, 0x3, &(0x7f0000000000)=@framed={{0x18, 0x0, 0x0, 0x0, 0x1}}, &(0x7f0000000080)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0xf}, 0xffffffffffffff66) 20:40:58 executing program 3: socket$inet6_sctp(0xa, 0x1, 0x84) r0 = socket$inet6(0xa, 0x3, 0x3) r1 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) r2 = socket$igmp6(0xa, 0x3, 0x2) bind$inet6(r2, &(0x7f0000000040)={0xa, 0x4e20, 0x3, @mcast2, 0xff}, 0x1c) bpf$MAP_UPDATE_CONST_STR(0x2, &(0x7f0000000180)={{0x1}, &(0x7f0000000100), &(0x7f0000000140)='%pS \x00'}, 0x20) ioctl$F2FS_IOC_MOVE_RANGE(r0, 0xc020f509, &(0x7f0000000080)={r1}) writev(r1, &(0x7f00000000c0)=[{&(0x7f0000000080), 0xfffffebe}], 0x1) sendto$inet6(0xffffffffffffffff, &(0x7f0000000200)="33b17be4c1370e7340e0df8fd5a6e4df2d54a1e4d9052c135fd2d10f005a8977090944b6a7c96a2429940abaeee94e27005f5a4ccdd3c81cb53552e1b2844c3c4ac61ef71f3c867eda248e53303518b9fa509968ed9073877074fdbfc9e9027403e66b0cd8ae4144002ed71283421688b2b32abdd5c4f0b9985f5fdb3388cc97ade2bb569411cf418e687dddbb431444297eb384dcbf27b57de3ed42a02d4af838eeaae371a5668fa093bd5553991e34b7c44d", 0xb3, 0x800, &(0x7f00000001c0)={0xa, 0x4e22, 0x6948, @private2={0xfc, 0x2, '\x00', 0x1}}, 0x1c) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000002c0)={{{@in6=@private1, @in=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@multicast2}, 0x0, @in6=@local}}, &(0x7f00000003c0)=0xe8) quotactl_fd$Q_GETQUOTA(r0, 0xffffffff80000702, r3, &(0x7f0000000400)) [ 109.871993][ T5491] loop0: detected capacity change from 0 to 512 [ 109.874484][ T5486] loop1: p2 p3 p7 [ 109.918172][ T5491] EXT4-fs (loop0): 1 orphan inode deleted 20:40:58 executing program 1: ioctl$BTRFS_IOC_LOGICAL_INO(0xffffffffffffffff, 0xc0389424, &(0x7f0000000180)={0x1, 0x28, '\x00', 0x1, &(0x7f0000000080)=[0x0, 0x0, 0x0, 0x0, 0x0]}) r0 = socket$inet6(0xa, 0x3, 0x6) r1 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) r2 = dup2(r1, r0) ioctl$TIOCSBRK(r2, 0x5427) recvfrom$inet6(0xffffffffffffffff, &(0x7f0000000280)=""/134, 0x86, 0x40000102, &(0x7f0000000340)={0xa, 0x4e21, 0x77f, @mcast1, 0x403b3f}, 0x1c) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000001040)={{r2, 0xffffffffffffffff}, &(0x7f0000000140), &(0x7f0000000480)=r1}, 0x20) syz_read_part_table(0x593, &(0x7f00000005c0)="$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") r4 = creat(&(0x7f0000000240)='./file0\x00', 0x0) stat(&(0x7f0000000040)='./file1\x00', &(0x7f0000000380)) fsetxattr$security_capability(r4, &(0x7f0000000100), &(0x7f0000000000)=@v1={0x1000000, [{0x80000000, 0x81}]}, 0xc, 0x0) newfstatat(0xffffffffffffff9c, &(0x7f00000000c0)='./file1\x00', &(0x7f0000001400), 0x400) close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x2) ioctl$TIOCSTI(r4, 0x5412, &(0x7f00000004c0)=0x40) fsync(0xffffffffffffffff) write$binfmt_misc(r4, &(0x7f0000001080)=ANY=[@ANYBLOB="7379d3c6"], 0x4) fallocate(r4, 0x100000011, 0x0, 0x2811fdff) open(&(0x7f0000000100)='.\x00', 0x20c2, 0x2d) open$dir(&(0x7f0000000500)='./file1\x00', 0x1c6c0, 0x0) r5 = openat$vcsu(0xffffffffffffff9c, &(0x7f0000000cc0), 0x400c00, 0x0) lsetxattr$security_selinux(&(0x7f0000001180)='./file1\x00', &(0x7f00000011c0), &(0x7f0000001300)='system_u:object_r:unconfined_exec_t:s0\x00', 0x27, 0x3) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000400)={0xffffffffffffffff, 0xe0, &(0x7f0000000300)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, &(0x7f00000000c0)=[0x0], &(0x7f0000000140), 0x0, 0x8, &(0x7f0000000200)=[{}, {}, {}, {}, {}], 0x28, 0x0, 0x0, 0x0, 0x0, 0x10, 0x8, 0x8, &(0x7f00000002c0)}}, 0x10) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000e80)=@bpf_lsm={0x1d, 0x4, &(0x7f0000000040)=@framed={{0x18, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x73fc}, [@generic={0x9, 0x8, 0x0, 0x7f, 0x200}]}, &(0x7f0000000880)='GPL\x00', 0x1f, 0x93, &(0x7f0000000cc0)=""/147, 0x40f00, 0x2, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, &(0x7f0000000b80)={0x9}, 0x8, 0x10, 0x0, 0x0, r6}, 0x80) r7 = socket$nl_generic(0x10, 0x3, 0x10) r8 = syz_genetlink_get_family_id$tipc(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$TIPC_CMD_ENABLE_BEARER(r7, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000001200)=ANY=[@ANYBLOB="3400000006c08fada241ee0a049e6fba3f36f40da839bbdf54c31768b0026f4261f56d51c5d81ba4cb99f8203c40d0a142fcd75ce26e408d229139f8c4e81109c56a18e453e8a537df21c4ec04a4f3e22f4ac125a28ad43e41107b1f7e79c8573985e54fd665e2913ca74da8c9f3fc2839258c19fa7ac20ebead31206cf280ea73f635bc5418b66554392dfd11874fef72bc53538aae3cb5ef8a80140f4737dd2c572a03ee1d5e3d627e", @ANYRESOCT=0x0, @ANYBLOB="010000000000000000000100000000000000014100000018001700000000000000007564503a73"], 0x34}, 0x1, 0x0, 0x0, 0x1}, 0x0) ioctl$AUTOFS_DEV_IOCTL_PROTOSUBVER(r1, 0xc0189373, &(0x7f0000000540)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x6}}, './file0\x00'}) sendmsg$TIPC_CMD_GET_MAX_PORTS(r5, &(0x7f0000001140)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x40000}, 0xc, &(0x7f0000001100)={&(0x7f00000010c0)={0x1c, r8, 0x400, 0x8000, 0x25dfdbfe, {}, ["", "", "", "", "", "", ""]}, 0x1c}, 0x1, 0x0, 0x0, 0x20048854}, 0x4004) bpf$PROG_LOAD(0x5, &(0x7f0000000e40)={0x5, 0x16, &(0x7f0000001340)=ANY=[@ANYBLOB="390000000100000000000000900000f117fa0000", @ANYRES32=r4, @ANYBLOB="1f00000000000000b703000000000000850000000c000000b61b0453c29f42b5be06c7010b4efffe000000000085000000a900000018150000", @ANYRES32=r3, @ANYBLOB="0000000000000000180100002020782500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b70300000000850000005d000000185500000100000000000000000000009500000000000000"], &(0x7f0000000b80)='syzkaller\x00', 0x1, 0xe8, &(0x7f0000000bc0)=""/232, 0x41000, 0x5b, '\x00', 0x0, 0xe, r5, 0x8, &(0x7f0000000d00)={0x5, 0x2}, 0x8, 0x10, &(0x7f0000000d40)={0x4, 0xe, 0x2, 0x8}, 0x10, r6, r4, 0x5, &(0x7f0000000d80), &(0x7f0000000dc0)=[{0x4, 0x3, 0x0, 0x2}, {0x3, 0x1, 0xa, 0xa}, {0x0, 0x3, 0x2, 0xa}, {0x0, 0x3, 0x7, 0x1}, {0x1, 0x5, 0xb, 0xc}], 0x10, 0x7}, 0x90) 20:40:58 executing program 3: socket$inet6_sctp(0xa, 0x1, 0x84) r0 = socket$inet6(0xa, 0x3, 0x3) (async, rerun: 64) r1 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) (rerun: 64) r2 = socket$igmp6(0xa, 0x3, 0x2) bind$inet6(r2, &(0x7f0000000040)={0xa, 0x4e20, 0x3, @mcast2, 0xff}, 0x1c) (async, rerun: 64) bpf$MAP_UPDATE_CONST_STR(0x2, &(0x7f0000000180)={{0x1}, &(0x7f0000000100), &(0x7f0000000140)='%pS \x00'}, 0x20) (async, rerun: 64) ioctl$F2FS_IOC_MOVE_RANGE(r0, 0xc020f509, &(0x7f0000000080)={r1}) (async) writev(r1, &(0x7f00000000c0)=[{&(0x7f0000000080), 0xfffffebe}], 0x1) (async) sendto$inet6(0xffffffffffffffff, &(0x7f0000000200)="33b17be4c1370e7340e0df8fd5a6e4df2d54a1e4d9052c135fd2d10f005a8977090944b6a7c96a2429940abaeee94e27005f5a4ccdd3c81cb53552e1b2844c3c4ac61ef71f3c867eda248e53303518b9fa509968ed9073877074fdbfc9e9027403e66b0cd8ae4144002ed71283421688b2b32abdd5c4f0b9985f5fdb3388cc97ade2bb569411cf418e687dddbb431444297eb384dcbf27b57de3ed42a02d4af838eeaae371a5668fa093bd5553991e34b7c44d", 0xb3, 0x800, &(0x7f00000001c0)={0xa, 0x4e22, 0x6948, @private2={0xfc, 0x2, '\x00', 0x1}}, 0x1c) (async) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000002c0)={{{@in6=@private1, @in=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@multicast2}, 0x0, @in6=@local}}, &(0x7f00000003c0)=0xe8) quotactl_fd$Q_GETQUOTA(r0, 0xffffffff80000702, r3, &(0x7f0000000400)) 20:40:58 executing program 0: r0 = gettid() bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) perf_event_open(0x0, r0, 0x9, 0xffffffffffffffff, 0x8) perf_event_open(&(0x7f0000000040)={0x0, 0x80, 0x1, 0x0, 0x1, 0x1f, 0x0, 0x7, 0x0, 0xa, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x8, 0x2, @perf_config_ext={0x100000001, 0x9}, 0x15, 0x72e0, 0xa9, 0x1, 0x0, 0x2, 0x5, 0x0, 0x1000}, r0, 0x7, 0xffffffffffffffff, 0x9) fstat(0xffffffffffffffff, &(0x7f0000000b00)) r1 = getegid() syz_mount_image$ext4(&(0x7f0000000100)='ext4\x00', &(0x7f0000000200)='./file1\x00', 0x3000000, &(0x7f0000003040)=ANY=[@ANYRES64=r1, @ANYBLOB="8555591a163448f4c52bee6cc0e12a6a8610718f818822e94c360e46f93ac9c63a1b40ea9d758c2b4e2d7c386a141016d11cb13fabc846fc7fb242c175fbdf96e2a96e80e82b73987b1d5dfd843c7e6748a15a0c4160f5e4c468e8f8e417bd3385546159881194fe3a7cf8307cd9c7ce0ca180a481d4dcaa6611ec5c8ff1c546360dea3da9f2bfc1fd71af9ebf2afe4285f013a3929a7096097976a16e2060e5f26e379011ea1811", @ANYRES64, @ANYBLOB="ca42ad87c41bb3b2507e4e12104f0cd507000001046f9445657db4996b10208d04454e11fb5b1383c5ce98e3062f45ec04e5b8b179df3d64a6cec05d29235e3cbe0b339abe9faee5cf3e44c97ce56a1dc359047114eeb3c23f331114039d75a664afc47e8273b79e83d301fc4ceec8b89911505b6743797c459195a7120ded1748f315deb90000ffed00000000000000", @ANYRES8=r1, @ANYRES8=r1, @ANYRES64, @ANYBLOB="bd85893dee1670c8c7e3b4a65ec61f224992fd11263b7749c7ee63dd4fc13cc5dfdde8a3099aaf21ece351c316d9bbd7e4ecc524c856f20d6a1818d6d75f702eb904653f9d55af", @ANYRESOCT], 0x1, 0x513, &(0x7f0000000c40)="$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") [ 109.967487][ T5491] ext4 filesystem being mounted at /root/syzkaller-testdir338643557/syzkaller.M396af/70/file1 supports timestamps until 2038-01-19 (0x7fffffff) 20:40:58 executing program 3: socket$inet6_sctp(0xa, 0x1, 0x84) socket$inet6(0xa, 0x3, 0x3) (async) r0 = socket$inet6(0xa, 0x3, 0x3) r1 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) r2 = socket$igmp6(0xa, 0x3, 0x2) bind$inet6(r2, &(0x7f0000000040)={0xa, 0x4e20, 0x3, @mcast2, 0xff}, 0x1c) (async) bind$inet6(r2, &(0x7f0000000040)={0xa, 0x4e20, 0x3, @mcast2, 0xff}, 0x1c) bpf$MAP_UPDATE_CONST_STR(0x2, &(0x7f0000000180)={{0x1}, &(0x7f0000000100), &(0x7f0000000140)='%pS \x00'}, 0x20) ioctl$F2FS_IOC_MOVE_RANGE(r0, 0xc020f509, &(0x7f0000000080)={r1}) writev(r1, &(0x7f00000000c0)=[{&(0x7f0000000080), 0xfffffebe}], 0x1) sendto$inet6(0xffffffffffffffff, &(0x7f0000000200)="33b17be4c1370e7340e0df8fd5a6e4df2d54a1e4d9052c135fd2d10f005a8977090944b6a7c96a2429940abaeee94e27005f5a4ccdd3c81cb53552e1b2844c3c4ac61ef71f3c867eda248e53303518b9fa509968ed9073877074fdbfc9e9027403e66b0cd8ae4144002ed71283421688b2b32abdd5c4f0b9985f5fdb3388cc97ade2bb569411cf418e687dddbb431444297eb384dcbf27b57de3ed42a02d4af838eeaae371a5668fa093bd5553991e34b7c44d", 0xb3, 0x800, &(0x7f00000001c0)={0xa, 0x4e22, 0x6948, @private2={0xfc, 0x2, '\x00', 0x1}}, 0x1c) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000002c0)={{{@in6=@private1, @in=@loopback}}, {{@in=@multicast2}, 0x0, @in6=@local}}, &(0x7f00000003c0)=0xe8) (async) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000002c0)={{{@in6=@private1, @in=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@multicast2}, 0x0, @in6=@local}}, &(0x7f00000003c0)=0xe8) quotactl_fd$Q_GETQUOTA(r0, 0xffffffff80000702, r3, &(0x7f0000000400)) 20:40:58 executing program 3: r0 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000280)=@bpf_lsm={0x6, 0x3, &(0x7f00000003c0)=ANY=[@ANYBLOB="18000000003f000000000000000000f195"], &(0x7f0000000140)='GPL\x00'}, 0x80) bpf$BPF_PROG_TEST_RUN(0x1c, &(0x7f0000000240)={r0, 0x8, 0x25, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x40) r1 = bpf$OBJ_GET_MAP(0x7, &(0x7f00000004c0)=@generic={&(0x7f0000000380)='./file0\x00', 0x0, 0x18}, 0x18) bpf$PROG_BIND_MAP(0x23, &(0x7f0000000500)={r0, r1}, 0xc) r2 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000280)=@bpf_lsm={0x6, 0x3, &(0x7f00000003c0)=ANY=[], &(0x7f0000000140)='GPL\x00', 0x0, 0x0, 0x0, 0x40f00}, 0x90) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000008c0)={r0, 0xe0, &(0x7f00000007c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, &(0x7f0000000540)=[0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x5, 0x2, &(0x7f0000000580)=[0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f00000005c0)=[0x0, 0x0], 0x0, 0xe9, &(0x7f0000000600)=[{}, {}, {}, {}], 0x20, 0x10, &(0x7f0000000700), &(0x7f0000000740), 0x8, 0x2a, 0x8, 0x8, &(0x7f0000000780)}}, 0x10) r3 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000640)=@bpf_lsm={0x6, 0x3, &(0x7f00000003c0)=ANY=[], &(0x7f00000006c0)='GPL\x00'}, 0x80) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000100)={'bridge0\x00', 0x0}) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000400)=@bpf_ext={0x1c, 0x4, &(0x7f0000000080)=@framed={{0x18, 0x0, 0x0, 0x0, 0x1f, 0x0, 0x0, 0x0, 0xfffffff7}, [@alu={0x4, 0x1, 0xf95052b51dde98e6, 0x8, 0x9, 0x40, 0xfffffffffffffff0}]}, &(0x7f00000000c0)='GPL\x00', 0x4, 0x1000, &(0x7f0000001140)=""/4096, 0x40f00, 0x20, '\x00', r4, 0x0, 0xffffffffffffffff, 0x8, &(0x7f00000001c0)={0xa, 0x3}, 0x8, 0x10, &(0x7f0000000200)={0x0, 0x9, 0x7, 0x1}, 0x10, 0x79d1, r2, 0x2, 0x0, &(0x7f0000000340)=[{0x2, 0x3, 0xf, 0x9}, {0x4, 0x1, 0x1, 0x6}], 0x10, 0x10001}, 0x90) bpf$LINK_GET_NEXT_ID(0x1f, &(0x7f0000001100)={0x0, 0x0}, 0x8) r6 = bpf$LINK_GET_FD_BY_ID(0x1e, &(0x7f0000000040)=r5, 0x4) bpf$LINK_DETACH(0x22, &(0x7f0000000000)=r6, 0x4) bpf$BPF_LINK_UPDATE(0x1d, &(0x7f0000000180)={r6, r3, 0x4, r2}, 0x10) 20:40:58 executing program 3: r0 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000280)=@bpf_lsm={0x6, 0x3, &(0x7f00000003c0)=ANY=[@ANYBLOB="18000000003f000000000000000000f195"], &(0x7f0000000140)='GPL\x00'}, 0x80) bpf$BPF_PROG_TEST_RUN(0x1c, &(0x7f0000000240)={r0, 0x8, 0x25, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x40) r1 = bpf$OBJ_GET_MAP(0x7, &(0x7f00000004c0)=@generic={&(0x7f0000000380)='./file0\x00', 0x0, 0x18}, 0x18) bpf$PROG_BIND_MAP(0x23, &(0x7f0000000500)={r0, r1}, 0xc) (async) r2 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000280)=@bpf_lsm={0x6, 0x3, &(0x7f00000003c0)=ANY=[], &(0x7f0000000140)='GPL\x00', 0x0, 0x0, 0x0, 0x40f00}, 0x90) (async) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000008c0)={r0, 0xe0, &(0x7f00000007c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, &(0x7f0000000540)=[0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x5, 0x2, &(0x7f0000000580)=[0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f00000005c0)=[0x0, 0x0], 0x0, 0xe9, &(0x7f0000000600)=[{}, {}, {}, {}], 0x20, 0x10, &(0x7f0000000700), &(0x7f0000000740), 0x8, 0x2a, 0x8, 0x8, &(0x7f0000000780)}}, 0x10) r3 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000640)=@bpf_lsm={0x6, 0x3, &(0x7f00000003c0)=ANY=[], &(0x7f00000006c0)='GPL\x00'}, 0x80) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000100)={'bridge0\x00', 0x0}) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000400)=@bpf_ext={0x1c, 0x4, &(0x7f0000000080)=@framed={{0x18, 0x0, 0x0, 0x0, 0x1f, 0x0, 0x0, 0x0, 0xfffffff7}, [@alu={0x4, 0x1, 0xf95052b51dde98e6, 0x8, 0x9, 0x40, 0xfffffffffffffff0}]}, &(0x7f00000000c0)='GPL\x00', 0x4, 0x1000, &(0x7f0000001140)=""/4096, 0x40f00, 0x20, '\x00', r4, 0x0, 0xffffffffffffffff, 0x8, &(0x7f00000001c0)={0xa, 0x3}, 0x8, 0x10, &(0x7f0000000200)={0x0, 0x9, 0x7, 0x1}, 0x10, 0x79d1, r2, 0x2, 0x0, &(0x7f0000000340)=[{0x2, 0x3, 0xf, 0x9}, {0x4, 0x1, 0x1, 0x6}], 0x10, 0x10001}, 0x90) (async) bpf$LINK_GET_NEXT_ID(0x1f, &(0x7f0000001100)={0x0, 0x0}, 0x8) r6 = bpf$LINK_GET_FD_BY_ID(0x1e, &(0x7f0000000040)=r5, 0x4) bpf$LINK_DETACH(0x22, &(0x7f0000000000)=r6, 0x4) bpf$BPF_LINK_UPDATE(0x1d, &(0x7f0000000180)={r6, r3, 0x4, r2}, 0x10) [ 110.101481][ T5511] loop0: detected capacity change from 0 to 512 [ 110.130097][ T5509] loop1: detected capacity change from 0 to 2048 [ 110.176498][ T5511] EXT4-fs (loop0): 1 orphan inode deleted [ 110.188139][ T5511] ext4 filesystem being mounted at /root/syzkaller-testdir338643557/syzkaller.M396af/71/file1 supports timestamps until 2038-01-19 (0x7fffffff) 20:40:58 executing program 3: r0 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000280)=@bpf_lsm={0x6, 0x3, &(0x7f00000003c0)=ANY=[@ANYBLOB="18000000003f000000000000000000f195"], &(0x7f0000000140)='GPL\x00'}, 0x80) bpf$BPF_PROG_TEST_RUN(0x1c, &(0x7f0000000240)={r0, 0x8, 0x25, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x40) (async) r1 = bpf$OBJ_GET_MAP(0x7, &(0x7f00000004c0)=@generic={&(0x7f0000000380)='./file0\x00', 0x0, 0x18}, 0x18) bpf$PROG_BIND_MAP(0x23, &(0x7f0000000500)={r0, r1}, 0xc) (async) r2 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000280)=@bpf_lsm={0x6, 0x3, &(0x7f00000003c0)=ANY=[], &(0x7f0000000140)='GPL\x00', 0x0, 0x0, 0x0, 0x40f00}, 0x90) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000008c0)={r0, 0xe0, &(0x7f00000007c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, &(0x7f0000000540)=[0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x5, 0x2, &(0x7f0000000580)=[0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f00000005c0)=[0x0, 0x0], 0x0, 0xe9, &(0x7f0000000600)=[{}, {}, {}, {}], 0x20, 0x10, &(0x7f0000000700), &(0x7f0000000740), 0x8, 0x2a, 0x8, 0x8, &(0x7f0000000780)}}, 0x10) (async) r3 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000640)=@bpf_lsm={0x6, 0x3, &(0x7f00000003c0)=ANY=[], &(0x7f00000006c0)='GPL\x00'}, 0x80) (async) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000100)={'bridge0\x00', 0x0}) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000400)=@bpf_ext={0x1c, 0x4, &(0x7f0000000080)=@framed={{0x18, 0x0, 0x0, 0x0, 0x1f, 0x0, 0x0, 0x0, 0xfffffff7}, [@alu={0x4, 0x1, 0xf95052b51dde98e6, 0x8, 0x9, 0x40, 0xfffffffffffffff0}]}, &(0x7f00000000c0)='GPL\x00', 0x4, 0x1000, &(0x7f0000001140)=""/4096, 0x40f00, 0x20, '\x00', r4, 0x0, 0xffffffffffffffff, 0x8, &(0x7f00000001c0)={0xa, 0x3}, 0x8, 0x10, &(0x7f0000000200)={0x0, 0x9, 0x7, 0x1}, 0x10, 0x79d1, r2, 0x2, 0x0, &(0x7f0000000340)=[{0x2, 0x3, 0xf, 0x9}, {0x4, 0x1, 0x1, 0x6}], 0x10, 0x10001}, 0x90) (async) bpf$LINK_GET_NEXT_ID(0x1f, &(0x7f0000001100)={0x0, 0x0}, 0x8) r6 = bpf$LINK_GET_FD_BY_ID(0x1e, &(0x7f0000000040)=r5, 0x4) bpf$LINK_DETACH(0x22, &(0x7f0000000000)=r6, 0x4) (async) bpf$BPF_LINK_UPDATE(0x1d, &(0x7f0000000180)={r6, r3, 0x4, r2}, 0x10) 20:40:58 executing program 0: r0 = gettid() bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x9, 0xffffffffffffffff, 0x8) perf_event_open(&(0x7f0000000040)={0x0, 0x80, 0x1, 0x0, 0x1, 0x1f, 0x0, 0x7, 0x0, 0xa, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x8, 0x2, @perf_config_ext={0x100000001, 0x9}, 0x15, 0x72e0, 0xa9, 0x1, 0x0, 0x2, 0x5, 0x0, 0x1000}, r0, 0x7, 0xffffffffffffffff, 0x9) fstat(0xffffffffffffffff, &(0x7f0000000b00)) r1 = getegid() syz_mount_image$ext4(&(0x7f0000000100)='ext4\x00', &(0x7f0000000200)='./file1\x00', 0x3000000, &(0x7f0000003040)=ANY=[@ANYRES64=r1, @ANYBLOB="8555591a163448f4c52bee6cc0e12a6a8610718f818822e94c360e46f93ac9c63a1b40ea9d758c2b4e2d7c386a141016d11cb13fabc846fc7fb242c175fbdf96e2a96e80e82b73987b1d5dfd843c7e6748a15a0c4160f5e4c468e8f8e417bd3385546159881194fe3a7cf8307cd9c7ce0ca180a481d4dcaa6611ec5c8ff1c546360dea3da9f2bfc1fd71af9ebf2afe4285f013a3929a7096097976a16e2060e5f26e379011ea1811", @ANYRES64, @ANYBLOB="ca42ad87c41bb3b2507e4e12104f0cd507000001046f9445657db4996b10208d04454e11fb5b1383c5ce98e3062f45ec04e5b8b179df3d64a6cec05d29235e3cbe0b339abe9faee5cf3e44c97ce56a1dc359047114eeb3c23f331114039d75a664afc47e8273b79e83d301fc4ceec8b89911505b6743797c459195a7120ded1748f315deb90000ffed00000000000000", @ANYRES8=r1, @ANYRES8=r1, @ANYRES64, @ANYBLOB="bd85893dee1670c8c7e3b4a65ec61f224992fd11263b7749c7ee63dd4fc13cc5dfdde8a3099aaf21ece351c316d9bbd7e4ecc524c856f20d6a1818d6d75f702eb904653f9d55af", @ANYRESOCT], 0x1, 0x513, &(0x7f0000000c40)="$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") [ 110.233517][ T5509] loop1: p2 p3 p7 20:40:58 executing program 3: r0 = socket$inet_mptcp(0x2, 0x1, 0x106) connect(r0, &(0x7f0000000ec0)=@l2tp={0x2, 0x0, @empty}, 0x80) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000000)='yeah\x00', 0x5) 20:40:58 executing program 1: ioctl$BTRFS_IOC_LOGICAL_INO(0xffffffffffffffff, 0xc0389424, &(0x7f0000000180)={0x1, 0x28, '\x00', 0x1, &(0x7f0000000080)=[0x0, 0x0, 0x0, 0x0, 0x0]}) r0 = socket$inet6(0xa, 0x3, 0x6) r1 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) r2 = dup2(r1, r0) ioctl$TIOCSBRK(r2, 0x5427) recvfrom$inet6(0xffffffffffffffff, &(0x7f0000000280)=""/134, 0x86, 0x40000102, &(0x7f0000000340)={0xa, 0x4e21, 0x77f, @mcast1, 0x403b3f}, 0x1c) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000001040)={{r2, 0xffffffffffffffff}, &(0x7f0000000140), &(0x7f0000000480)=r1}, 0x20) syz_read_part_table(0x593, &(0x7f00000005c0)="$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") r4 = creat(&(0x7f0000000240)='./file0\x00', 0x0) stat(&(0x7f0000000040)='./file1\x00', &(0x7f0000000380)) fsetxattr$security_capability(r4, &(0x7f0000000100), &(0x7f0000000000)=@v1={0x1000000, [{0x80000000, 0x81}]}, 0xc, 0x0) newfstatat(0xffffffffffffff9c, &(0x7f00000000c0)='./file1\x00', &(0x7f0000001400), 0x400) close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x2) ioctl$TIOCSTI(r4, 0x5412, &(0x7f00000004c0)=0x40) fsync(0xffffffffffffffff) write$binfmt_misc(r4, &(0x7f0000001080)=ANY=[@ANYBLOB="7379d3c6"], 0x4) fallocate(r4, 0x100000011, 0x0, 0x2811fdff) open(&(0x7f0000000100)='.\x00', 0x20c2, 0x2d) open$dir(&(0x7f0000000500)='./file1\x00', 0x1c6c0, 0x0) r5 = openat$vcsu(0xffffffffffffff9c, &(0x7f0000000cc0), 0x400c00, 0x0) lsetxattr$security_selinux(&(0x7f0000001180)='./file1\x00', &(0x7f00000011c0), &(0x7f0000001300)='system_u:object_r:unconfined_exec_t:s0\x00', 0x27, 0x3) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000400)={0xffffffffffffffff, 0xe0, &(0x7f0000000300)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, &(0x7f00000000c0)=[0x0], &(0x7f0000000140), 0x0, 0x8, &(0x7f0000000200)=[{}, {}, {}, {}, {}], 0x28, 0x0, 0x0, 0x0, 0x0, 0x10, 0x8, 0x8, &(0x7f00000002c0)}}, 0x10) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000e80)=@bpf_lsm={0x1d, 0x4, &(0x7f0000000040)=@framed={{0x18, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x73fc}, [@generic={0x9, 0x8, 0x0, 0x7f, 0x200}]}, &(0x7f0000000880)='GPL\x00', 0x1f, 0x93, &(0x7f0000000cc0)=""/147, 0x40f00, 0x2, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, &(0x7f0000000b80)={0x9}, 0x8, 0x10, 0x0, 0x0, r6}, 0x80) r7 = socket$nl_generic(0x10, 0x3, 0x10) r8 = syz_genetlink_get_family_id$tipc(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$TIPC_CMD_ENABLE_BEARER(r7, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000001200)=ANY=[@ANYBLOB="3400000006c08fada241ee0a049e6fba3f36f40da839bbdf54c31768b0026f4261f56d51c5d81ba4cb99f8203c40d0a142fcd75ce26e408d229139f8c4e81109c56a18e453e8a537df21c4ec04a4f3e22f4ac125a28ad43e41107b1f7e79c8573985e54fd665e2913ca74da8c9f3fc2839258c19fa7ac20ebead31206cf280ea73f635bc5418b66554392dfd11874fef72bc53538aae3cb5ef8a80140f4737dd2c572a03ee1d5e3d627e", @ANYRESOCT=0x0, @ANYBLOB="010000000000000000000100000000000000014100000018001700000000000000007564503a73"], 0x34}, 0x1, 0x0, 0x0, 0x1}, 0x0) ioctl$AUTOFS_DEV_IOCTL_PROTOSUBVER(r1, 0xc0189373, &(0x7f0000000540)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x6}}, './file0\x00'}) sendmsg$TIPC_CMD_GET_MAX_PORTS(r5, &(0x7f0000001140)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x40000}, 0xc, &(0x7f0000001100)={&(0x7f00000010c0)={0x1c, r8, 0x400, 0x8000, 0x25dfdbfe, {}, ["", "", "", "", "", "", ""]}, 0x1c}, 0x1, 0x0, 0x0, 0x20048854}, 0x4004) bpf$PROG_LOAD(0x5, &(0x7f0000000e40)={0x5, 0x16, &(0x7f0000001340)=ANY=[@ANYBLOB="390000000100000000000000900000f117fa0000", @ANYRES32=r4, @ANYBLOB="1f00000000000000b703000000000000850000000c000000b61b0453c29f42b5be06c7010b4efffe000000000085000000a900000018150000", @ANYRES32=r3, @ANYBLOB="0000000000000000180100002020782500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b70300000000850000005d000000185500000100000000000000000000009500000000000000"], &(0x7f0000000b80)='syzkaller\x00', 0x1, 0xe8, &(0x7f0000000bc0)=""/232, 0x41000, 0x5b, '\x00', 0x0, 0xe, r5, 0x8, &(0x7f0000000d00)={0x5, 0x2}, 0x8, 0x10, &(0x7f0000000d40)={0x4, 0xe, 0x2, 0x8}, 0x10, r6, r4, 0x5, &(0x7f0000000d80), &(0x7f0000000dc0)=[{0x4, 0x3, 0x0, 0x2}, {0x3, 0x1, 0xa, 0xa}, {0x0, 0x3, 0x2, 0xa}, {0x0, 0x3, 0x7, 0x1}, {0x1, 0x5, 0xb, 0xc}], 0x10, 0x7}, 0x90) 20:40:58 executing program 2: r0 = perf_event_open(&(0x7f0000000a40)={0x2, 0x80, 0xcd, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @perf_bp={&(0x7f0000000200), 0x8}, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfb75}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000040)={0x0, 0x4, 0x0, &(0x7f0000000180)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x80) perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x208, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x4, 0x8001}, 0x4000, 0x0, 0x0, 0x0, 0x0, 0x14e, 0xd1}, 0x0, 0xbfffffffffffffff, r0, 0x19893a9f0a0e2244) r1 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) syz_clone(0x2000000, 0x0, 0x0, 0x0, 0x0, 0x0) r2 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x18, 0x5, &(0x7f00000002c0)=ANY=[@ANYBLOB="180000001800ff0f0000000000000000850000006d000000750000000800000095"], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x80) r3 = perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400, 0x80000, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x7, 0x1007}, 0x8006, 0x0, 0x0, 0x1, 0x4, 0x800000, 0x3}, 0x0, 0xffefffffffffffff, 0xffffffffffffffff, 0x9) ioctl$PERF_EVENT_IOC_SET_FILTER(r3, 0x40082406, &(0x7f00000003c0)='memory.numa_stat\x00') perf_event_open(0x0, 0x0, 0x0, r3, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000080)='sched_switch\x00', r2}, 0x10) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000380)={{0x1, 0xffffffffffffffff}, &(0x7f0000000000), &(0x7f0000000240)=r2}, 0x20) r5 = memfd_secret(0x0) syz_io_uring_setup(0x0, &(0x7f0000000300)={0x0, 0x2, 0x0, 0x0, 0x0, 0x0, r5}, 0x0, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f00000009c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000000a00)=0x14) r7 = openat2(0xffffffffffffff9c, &(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)={0x40841}, 0x18) write$binfmt_script(r7, &(0x7f0000000340)=ANY=[], 0xfffffdef) r8 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000b40)={0x1b, 0x0, 0x0, 0x7, 0x0, 0xffffffffffffffff, 0x200, '\x00', 0x0, 0xffffffffffffffff, 0x3, 0x1, 0x4}, 0x48) r9 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000bc0)={0x2, 0x4, 0x8, 0x1, 0x80, 0x1, 0x9, '\x00', 0x0, 0xffffffffffffffff, 0x4, 0x1, 0x4}, 0x48) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000d00)={0x11, 0x12, &(0x7f0000000440)=@raw=[@exit, @ringbuf_query={{0x18, 0x1, 0x1, 0x0, r4}}, @ringbuf_output={{0x18, 0x1, 0x1, 0x0, r5}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x10001}, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x4, 0x0, 0x0, 0x2}}, @exit, @initr0={0x18, 0x0, 0x0, 0x0, 0x6349, 0x0, 0x0, 0x0, 0xf685}, @ldst={0x3, 0x2, 0x1, 0x0, 0xb, 0x2543a83bb932833c, 0x1}], &(0x7f0000000940)='syzkaller\x00', 0x80000001, 0x27, &(0x7f0000000980)=""/39, 0x41000, 0x40, '\x00', r6, 0x0, r7, 0x8, &(0x7f0000000ac0)={0x3, 0x1}, 0x8, 0x10, &(0x7f0000000b00)={0x2, 0xc, 0xfffffe00, 0x2}, 0x10, 0x0, 0x0, 0x5, &(0x7f0000000c40)=[r2, 0x1, 0x1, r8, r9, r1], &(0x7f0000000c80)=[{0x4, 0x1, 0x8, 0xc}, {0x0, 0x4, 0xf, 0x4}, {0x1, 0x2, 0xd, 0x6}, {0x0, 0x4, 0x10, 0xc}, {0x2, 0x4, 0xd, 0x1}], 0x10, 0x20}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000280)={&(0x7f0000000140)='ext4_ext_show_extent\x00', r2}, 0x10) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) r10 = gettid() perf_event_open$cgroup(&(0x7f0000000300)={0x5, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_bp={&(0x7f0000000100)}, 0x81252, 0x6, 0x80000001, 0x0, 0x0, 0x0, 0x6, 0x0, 0x6, 0x0, 0x6}, 0xffffffffffffffff, 0xe, 0xffffffffffffffff, 0xc) perf_event_open(0x0, r10, 0x2, 0xffffffffffffffff, 0xb) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) perf_event_open(&(0x7f0000000840)={0x2, 0x80, 0x0, 0x7, 0x0, 0x80, 0x0, 0x3, 0x0, 0x9, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, @perf_config_ext={0x8000000000, 0x3}, 0x46c73247dfbe0d, 0x1007e, 0x0, 0x2, 0x0, 0x0, 0x6, 0x0, 0xffffffff, 0x0, 0x1c}, 0x0, 0x9, 0xffffffffffffffff, 0xd) bpf$PROG_LOAD(0x5, &(0x7f0000000780)={0x14, 0x4, &(0x7f00000008c0)=ANY=[@ANYBLOB="850000006b00000018150000a3df7ddd9621fb0201050062d91123e632b2f902ad1e9f1cc7a66ed51ac8a4070000000000000019a83f0b7c9502871fb1ca3dc499e804bbbc359859ed6fd9f104fc7ed900d122072d8275a24d000000000601c3a63953a7b36fe458", @ANYRES32, @ANYBLOB="00000000000000002d59e4eda4000000"], &(0x7f0000000400)='syzkaller\x00', 0xfff, 0xe3, &(0x7f0000000580)=""/227, 0x0, 0x4, '\x00', 0x0, 0x24, 0xffffffffffffffff, 0x8, &(0x7f0000000500)={0x1, 0x3}, 0x8, 0x10, &(0x7f0000000680)={0x5, 0x6, 0x81, 0x9}, 0x10, 0xffffffffffffffff, 0xffffffffffffffff, 0x0, &(0x7f00000006c0)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}, 0x80) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x4030582a, &(0x7f0000000040)=0x91) 20:40:58 executing program 3: r0 = socket$inet_mptcp(0x2, 0x1, 0x106) connect(r0, &(0x7f0000000ec0)=@l2tp={0x2, 0x0, @empty}, 0x80) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000000)='yeah\x00', 0x5) [ 110.360754][ T3326] I/O error, dev loop1, sector 0 op 0x0:(READ) flags 0x80700 phys_seg 1 prio class 0 20:40:58 executing program 3: r0 = socket$inet_mptcp(0x2, 0x1, 0x106) connect(r0, &(0x7f0000000ec0)=@l2tp={0x2, 0x0, @empty}, 0x80) (async) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000000)='yeah\x00', 0x5) [ 110.419987][ T5531] loop0: detected capacity change from 0 to 512 20:40:58 executing program 4: r0 = perf_event_open(&(0x7f0000000a40)={0x2, 0x80, 0xcd, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @perf_bp={&(0x7f0000000200), 0x8}, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfb75}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000040)={0x0, 0x4, 0x0, &(0x7f0000000180)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x80) perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x208, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x4, 0x8001}, 0x4000, 0x0, 0x0, 0x0, 0x0, 0x14e, 0xd1}, 0x0, 0xbfffffffffffffff, r0, 0x19893a9f0a0e2244) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) syz_clone(0x2000000, 0x0, 0x0, 0x0, 0x0, 0x0) r1 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x18, 0x5, &(0x7f00000002c0)=ANY=[@ANYBLOB="180000001800ff0f0000000000000000850000006d000000750000000800000095"], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x80) r2 = perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400, 0x80000, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x7, 0x1007}, 0x8006, 0x0, 0x0, 0x1, 0x4, 0x800000, 0x3}, 0x0, 0xffefffffffffffff, 0xffffffffffffffff, 0x9) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x40082406, &(0x7f00000003c0)='memory.numa_stat\x00') perf_event_open(0x0, 0x0, 0x0, r2, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000080)='sched_switch\x00', r1}, 0x10) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000380)={{0x1}, &(0x7f0000000000), &(0x7f0000000240)=r1}, 0x20) r3 = memfd_secret(0x0) syz_io_uring_setup(0x0, &(0x7f0000000300)={0x0, 0x2, 0x0, 0x0, 0x0, 0x0, r3}, 0x0, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f00000009c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000000a00)=0x14) r4 = openat2(0xffffffffffffff9c, &(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)={0x40841}, 0x18) write$binfmt_script(r4, &(0x7f0000000340)=ANY=[], 0xfffffdef) 20:40:58 executing program 3: r0 = openat$nci(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000380)='freezer.state\x00', 0x26e1, 0x0) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000580)={0x17, 0xc, &(0x7f0000000640)=ANY=[@ANYBLOB="184000000100000000000000000000001801000020756c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000000600000018200000", @ANYRES32=r1, @ANYBLOB="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"], &(0x7f0000000000)='GPL\x00', 0x0, 0x4b, &(0x7f0000000280)=""/75, 0x41000, 0xd, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000340)={0x0, 0x2, 0xa534261, 0x3}, 0x10, 0xffffffffffffffff, 0xffffffffffffffff, 0x3, &(0x7f0000000400)=[0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0xffffffffffffffff, r2, 0xffffffffffffffff, 0xffffffffffffffff], &(0x7f0000000440)=[{0x3, 0x2, 0x9, 0xc}, {0x0, 0x2, 0x0, 0x1}, {0x3, 0x0, 0xf}], 0x10, 0x1f}, 0x90) r4 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r4, 0x1, 0x11, &(0x7f0000000240), &(0x7f0000000280)=0x5) preadv(r0, &(0x7f0000000c80)=[{&(0x7f00000003c0)=""/45, 0xfffffffffffffca1}], 0x1, 0x4, 0xbe9) ioctl$IOCTL_GET_NCIDEV_IDX(r1, 0x0, &(0x7f0000000180)=0x0) ioctl$IOCTL_GET_NCIDEV_IDX(r0, 0x0, &(0x7f0000000040)=0x0) r7 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) write$binfmt_misc(r0, &(0x7f0000000b00)={'syz1', "511c3b073c7e31964849a8cd687059f9fa2838028e2ebfcfe3936e6943c0b094648c7e82759ed58c6ec6efa146f2062a522e31319c7883c9a4a7fd72d2cca7c5691b1948922f0d4ef972a22b148775033c0683e95e2d29f1ae130110374e370a72e5984341770921a81a9fa8c6f9b928361837bd28ab9fd4fc9686741065670c73c75e7141a60580ec503c0808b14502614479ee4f9865386da8b39e91556eef247767190fafadcac30081178c6805636450c5289f97ca57cfbb623cb2bad32e9e7b634c1ce6c0aaa9c6e1831e89edd496689ec4ac669c44451871e5dc6d2b5c008a8a6ed947f8499c2d"}, 0xee) ioctl$FAT_IOCTL_SET_ATTRIBUTES(r3, 0x40047211, &(0x7f0000000800)=0x1) r8 = openat$cgroup_int(r2, &(0x7f0000000300)='hugetlb.2MB.max_usage_in_bytes\x00', 0x2, 0x0) close_range(r0, r0, 0x0) write$binfmt_script(r8, &(0x7f0000000480)=ANY=[@ANYBLOB="2321202e2f66696c653020245e5c2e5b272000200020667265657a65722e73746174f8ffffff0a22fdab54d896e5962c38af15a421956df30abffbeb33dd4bd53af9d74d5e1169efc760750dd4718bb88c325dc13b2a65eabd0ccafdc242bf5bd1a175e89359956e9aef06a6a591120e00509008f19f8ecbde1de7c16a72bb75b8dc6341cf2f2e24215cb3385adf181f862a886b4567ba95d58a8f51358492a862ab17d0631eafa3c65d4da90f3ffeec0e20b69d7b8d8e304866353461c3c972db373a20019d38f061b0a6eb6f5cd4718b617009e6f2641182d58d1eac0c5c7565f7169229652fa03df6821e"], 0xec) ioctl$sock_FIOGETOWN(r1, 0x8903, &(0x7f0000000240)=0x0) perf_event_open(&(0x7f00000001c0)={0x5, 0x80, 0xd4, 0x7, 0xa5, 0xbc, 0x0, 0xfffffffffffffff9, 0x5090, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x7fff, 0x2, @perf_config_ext={0x20, 0xa}, 0x8100, 0x5, 0x2, 0x8, 0x1, 0x9, 0x11d, 0x0, 0x1, 0x0, 0x7}, r9, 0x6, r2, 0x9) ioctl$BTRFS_IOC_SYNC(r2, 0x9408, 0x0) r10 = syz_genetlink_get_family_id$nfc(&(0x7f0000000100), r7) sendmsg$NFC_CMD_DEV_UP(r7, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000000c0)={0x1c, r10, 0x1, 0x0, 0x0, {0x3}, [@NFC_ATTR_DEVICE_INDEX={0x8, 0x1, r6}]}, 0x1c}}, 0x0) r11 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r12 = syz_genetlink_get_family_id$batadv(&(0x7f0000000840), r1) perf_event_open$cgroup(&(0x7f0000000c00)={0x5, 0x80, 0xff, 0x0, 0x81, 0x3, 0x0, 0x9, 0x83860, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x4, @perf_config_ext={0xe3, 0x8000000000000000}, 0x10421, 0xc60, 0x3, 0x5, 0x6, 0x9, 0x7, 0x0, 0x4, 0x0, 0xfffffffffffffff7}, r1, 0x6, 0xffffffffffffffff, 0x6) r13 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$BATADV_CMD_GET_MESH(r13, &(0x7f0000000ac0)={&(0x7f00000009c0)={0x10, 0x0, 0x0, 0x10}, 0xc, &(0x7f0000000a80)={&(0x7f0000000a00)={0x54, r12, 0x400, 0x70bd27, 0x25dfdbfc, {}, [@BATADV_ATTR_GW_BANDWIDTH_UP={0x8, 0x32, 0x9}, @BATADV_ATTR_ELP_INTERVAL={0x8, 0x3a, 0xfffffffd}, @BATADV_ATTR_BONDING_ENABLED={0x5, 0x2d, 0x1}, @BATADV_ATTR_GW_BANDWIDTH_DOWN={0x8, 0x31, 0x2}, @BATADV_ATTR_MULTICAST_FANOUT={0x8, 0x3c, 0x5}, @BATADV_ATTR_ELP_INTERVAL={0x8, 0x3a, 0xfffffbff}, @BATADV_ATTR_FRAGMENTATION_ENABLED={0x5}, @BATADV_ATTR_BRIDGE_LOOP_AVOIDANCE_ENABLED={0x5, 0x2e, 0x1}]}, 0x54}, 0x1, 0x0, 0x0, 0x80}, 0x0) r14 = syz_genetlink_get_family_id$nfc(&(0x7f00000008c0), r11) sendmsg$NFC_CMD_DEACTIVATE_TARGET(r7, &(0x7f0000000980)={&(0x7f0000000880)={0x10, 0x0, 0x0, 0x20000000}, 0xc, &(0x7f0000000940)={&(0x7f0000000900)={0x1c, r14, 0x4, 0x70bd2c, 0x25dfdbfc, {}, [@NFC_ATTR_DEVICE_INDEX={0x8, 0x1, r5}]}, 0x1c}, 0x1, 0x0, 0x0, 0x20000000}, 0x840) [ 110.498288][ T5538] loop1: detected capacity change from 0 to 2048 [ 110.505211][ T5531] EXT4-fs (loop0): 1 orphan inode deleted [ 110.529138][ T5531] ext4 filesystem being mounted at /root/syzkaller-testdir338643557/syzkaller.M396af/72/file1 supports timestamps until 2038-01-19 (0x7fffffff) 20:40:59 executing program 3: r0 = openat$nci(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) (async) r1 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000380)='freezer.state\x00', 0x26e1, 0x0) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000580)={0x17, 0xc, &(0x7f0000000640)=ANY=[@ANYBLOB="184000000100000000000000000000001801000020756c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000000600000018200000", @ANYRES32=r1, @ANYBLOB="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"], &(0x7f0000000000)='GPL\x00', 0x0, 0x4b, &(0x7f0000000280)=""/75, 0x41000, 0xd, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000340)={0x0, 0x2, 0xa534261, 0x3}, 0x10, 0xffffffffffffffff, 0xffffffffffffffff, 0x3, &(0x7f0000000400)=[0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0xffffffffffffffff, r2, 0xffffffffffffffff, 0xffffffffffffffff], &(0x7f0000000440)=[{0x3, 0x2, 0x9, 0xc}, {0x0, 0x2, 0x0, 0x1}, {0x3, 0x0, 0xf}], 0x10, 0x1f}, 0x90) (async) r4 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r4, 0x1, 0x11, &(0x7f0000000240), &(0x7f0000000280)=0x5) (async) preadv(r0, &(0x7f0000000c80)=[{&(0x7f00000003c0)=""/45, 0xfffffffffffffca1}], 0x1, 0x4, 0xbe9) (async) ioctl$IOCTL_GET_NCIDEV_IDX(r1, 0x0, &(0x7f0000000180)=0x0) (async, rerun: 64) ioctl$IOCTL_GET_NCIDEV_IDX(r0, 0x0, &(0x7f0000000040)=0x0) (async, rerun: 64) r7 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) write$binfmt_misc(r0, &(0x7f0000000b00)={'syz1', "511c3b073c7e31964849a8cd687059f9fa2838028e2ebfcfe3936e6943c0b094648c7e82759ed58c6ec6efa146f2062a522e31319c7883c9a4a7fd72d2cca7c5691b1948922f0d4ef972a22b148775033c0683e95e2d29f1ae130110374e370a72e5984341770921a81a9fa8c6f9b928361837bd28ab9fd4fc9686741065670c73c75e7141a60580ec503c0808b14502614479ee4f9865386da8b39e91556eef247767190fafadcac30081178c6805636450c5289f97ca57cfbb623cb2bad32e9e7b634c1ce6c0aaa9c6e1831e89edd496689ec4ac669c44451871e5dc6d2b5c008a8a6ed947f8499c2d"}, 0xee) (async) ioctl$FAT_IOCTL_SET_ATTRIBUTES(r3, 0x40047211, &(0x7f0000000800)=0x1) r8 = openat$cgroup_int(r2, &(0x7f0000000300)='hugetlb.2MB.max_usage_in_bytes\x00', 0x2, 0x0) (async) close_range(r0, r0, 0x0) write$binfmt_script(r8, &(0x7f0000000480)=ANY=[@ANYBLOB="2321202e2f66696c653020245e5c2e5b272000200020667265657a65722e73746174f8ffffff0a22fdab54d896e5962c38af15a421956df30abffbeb33dd4bd53af9d74d5e1169efc760750dd4718bb88c325dc13b2a65eabd0ccafdc242bf5bd1a175e89359956e9aef06a6a591120e00509008f19f8ecbde1de7c16a72bb75b8dc6341cf2f2e24215cb3385adf181f862a886b4567ba95d58a8f51358492a862ab17d0631eafa3c65d4da90f3ffeec0e20b69d7b8d8e304866353461c3c972db373a20019d38f061b0a6eb6f5cd4718b617009e6f2641182d58d1eac0c5c7565f7169229652fa03df6821e"], 0xec) ioctl$sock_FIOGETOWN(r1, 0x8903, &(0x7f0000000240)=0x0) perf_event_open(&(0x7f00000001c0)={0x5, 0x80, 0xd4, 0x7, 0xa5, 0xbc, 0x0, 0xfffffffffffffff9, 0x5090, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x7fff, 0x2, @perf_config_ext={0x20, 0xa}, 0x8100, 0x5, 0x2, 0x8, 0x1, 0x9, 0x11d, 0x0, 0x1, 0x0, 0x7}, r9, 0x6, r2, 0x9) (async) ioctl$BTRFS_IOC_SYNC(r2, 0x9408, 0x0) r10 = syz_genetlink_get_family_id$nfc(&(0x7f0000000100), r7) sendmsg$NFC_CMD_DEV_UP(r7, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000000c0)={0x1c, r10, 0x1, 0x0, 0x0, {0x3}, [@NFC_ATTR_DEVICE_INDEX={0x8, 0x1, r6}]}, 0x1c}}, 0x0) r11 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r12 = syz_genetlink_get_family_id$batadv(&(0x7f0000000840), r1) (async) perf_event_open$cgroup(&(0x7f0000000c00)={0x5, 0x80, 0xff, 0x0, 0x81, 0x3, 0x0, 0x9, 0x83860, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x4, @perf_config_ext={0xe3, 0x8000000000000000}, 0x10421, 0xc60, 0x3, 0x5, 0x6, 0x9, 0x7, 0x0, 0x4, 0x0, 0xfffffffffffffff7}, r1, 0x6, 0xffffffffffffffff, 0x6) (async) r13 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$BATADV_CMD_GET_MESH(r13, &(0x7f0000000ac0)={&(0x7f00000009c0)={0x10, 0x0, 0x0, 0x10}, 0xc, &(0x7f0000000a80)={&(0x7f0000000a00)={0x54, r12, 0x400, 0x70bd27, 0x25dfdbfc, {}, [@BATADV_ATTR_GW_BANDWIDTH_UP={0x8, 0x32, 0x9}, @BATADV_ATTR_ELP_INTERVAL={0x8, 0x3a, 0xfffffffd}, @BATADV_ATTR_BONDING_ENABLED={0x5, 0x2d, 0x1}, @BATADV_ATTR_GW_BANDWIDTH_DOWN={0x8, 0x31, 0x2}, @BATADV_ATTR_MULTICAST_FANOUT={0x8, 0x3c, 0x5}, @BATADV_ATTR_ELP_INTERVAL={0x8, 0x3a, 0xfffffbff}, @BATADV_ATTR_FRAGMENTATION_ENABLED={0x5}, @BATADV_ATTR_BRIDGE_LOOP_AVOIDANCE_ENABLED={0x5, 0x2e, 0x1}]}, 0x54}, 0x1, 0x0, 0x0, 0x80}, 0x0) r14 = syz_genetlink_get_family_id$nfc(&(0x7f00000008c0), r11) sendmsg$NFC_CMD_DEACTIVATE_TARGET(r7, &(0x7f0000000980)={&(0x7f0000000880)={0x10, 0x0, 0x0, 0x20000000}, 0xc, &(0x7f0000000940)={&(0x7f0000000900)={0x1c, r14, 0x4, 0x70bd2c, 0x25dfdbfc, {}, [@NFC_ATTR_DEVICE_INDEX={0x8, 0x1, r5}]}, 0x1c}, 0x1, 0x0, 0x0, 0x20000000}, 0x840) 20:40:59 executing program 0: r0 = gettid() bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x8) perf_event_open(&(0x7f0000000040)={0x0, 0x80, 0x1, 0x0, 0x1, 0x1f, 0x0, 0x7, 0x0, 0xa, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x8, 0x2, @perf_config_ext={0x100000001, 0x9}, 0x15, 0x72e0, 0xa9, 0x1, 0x0, 0x2, 0x5, 0x0, 0x1000}, r0, 0x7, 0xffffffffffffffff, 0x9) fstat(0xffffffffffffffff, &(0x7f0000000b00)) r1 = getegid() syz_mount_image$ext4(&(0x7f0000000100)='ext4\x00', &(0x7f0000000200)='./file1\x00', 0x3000000, &(0x7f0000003040)=ANY=[@ANYRES64=r1, @ANYBLOB="8555591a163448f4c52bee6cc0e12a6a8610718f818822e94c360e46f93ac9c63a1b40ea9d758c2b4e2d7c386a141016d11cb13fabc846fc7fb242c175fbdf96e2a96e80e82b73987b1d5dfd843c7e6748a15a0c4160f5e4c468e8f8e417bd3385546159881194fe3a7cf8307cd9c7ce0ca180a481d4dcaa6611ec5c8ff1c546360dea3da9f2bfc1fd71af9ebf2afe4285f013a3929a7096097976a16e2060e5f26e379011ea1811", @ANYRES64, @ANYBLOB="ca42ad87c41bb3b2507e4e12104f0cd507000001046f9445657db4996b10208d04454e11fb5b1383c5ce98e3062f45ec04e5b8b179df3d64a6cec05d29235e3cbe0b339abe9faee5cf3e44c97ce56a1dc359047114eeb3c23f331114039d75a664afc47e8273b79e83d301fc4ceec8b89911505b6743797c459195a7120ded1748f315deb90000ffed00000000000000", @ANYRES8=r1, @ANYRES8=r1, @ANYRES64, @ANYBLOB="bd85893dee1670c8c7e3b4a65ec61f224992fd11263b7749c7ee63dd4fc13cc5dfdde8a3099aaf21ece351c316d9bbd7e4ecc524c856f20d6a1818d6d75f702eb904653f9d55af", @ANYRESOCT], 0x1, 0x513, &(0x7f0000000c40)="$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") [ 110.566425][ T5546] UDPLite: UDP-Lite is deprecated and scheduled to be removed in 2025, please contact the netdev mailing list [ 110.599444][ T5538] loop1: p2 p3 p7 20:40:59 executing program 1: ioctl$BTRFS_IOC_LOGICAL_INO(0xffffffffffffffff, 0xc0389424, &(0x7f0000000180)={0x1, 0x28, '\x00', 0x1, &(0x7f0000000080)=[0x0, 0x0, 0x0, 0x0, 0x0]}) r0 = socket$inet6(0xa, 0x3, 0x6) r1 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) r2 = dup2(r1, r0) ioctl$TIOCSBRK(r2, 0x5427) recvfrom$inet6(0xffffffffffffffff, &(0x7f0000000280)=""/134, 0x86, 0x40000102, &(0x7f0000000340)={0xa, 0x4e21, 0x77f, @mcast1, 0x403b3f}, 0x1c) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000001040)={{r2, 0xffffffffffffffff}, &(0x7f0000000140), &(0x7f0000000480)=r1}, 0x20) syz_read_part_table(0x593, &(0x7f00000005c0)="$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") r4 = creat(&(0x7f0000000240)='./file0\x00', 0x0) stat(&(0x7f0000000040)='./file1\x00', &(0x7f0000000380)) fsetxattr$security_capability(r4, &(0x7f0000000100), &(0x7f0000000000)=@v1={0x1000000, [{0x80000000, 0x81}]}, 0xc, 0x0) newfstatat(0xffffffffffffff9c, &(0x7f00000000c0)='./file1\x00', &(0x7f0000001400), 0x400) close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x2) ioctl$TIOCSTI(r4, 0x5412, &(0x7f00000004c0)=0x40) fsync(0xffffffffffffffff) write$binfmt_misc(r4, &(0x7f0000001080)=ANY=[@ANYBLOB="7379d3c6"], 0x4) fallocate(r4, 0x100000011, 0x0, 0x2811fdff) open(&(0x7f0000000100)='.\x00', 0x20c2, 0x2d) open$dir(&(0x7f0000000500)='./file1\x00', 0x1c6c0, 0x0) r5 = openat$vcsu(0xffffffffffffff9c, &(0x7f0000000cc0), 0x400c00, 0x0) lsetxattr$security_selinux(&(0x7f0000001180)='./file1\x00', &(0x7f00000011c0), &(0x7f0000001300)='system_u:object_r:unconfined_exec_t:s0\x00', 0x27, 0x3) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000400)={0xffffffffffffffff, 0xe0, &(0x7f0000000300)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, &(0x7f00000000c0)=[0x0], &(0x7f0000000140), 0x0, 0x8, &(0x7f0000000200)=[{}, {}, {}, {}, {}], 0x28, 0x0, 0x0, 0x0, 0x0, 0x10, 0x8, 0x8, &(0x7f00000002c0)}}, 0x10) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000e80)=@bpf_lsm={0x1d, 0x4, &(0x7f0000000040)=@framed={{0x18, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x73fc}, [@generic={0x9, 0x8, 0x0, 0x7f, 0x200}]}, &(0x7f0000000880)='GPL\x00', 0x1f, 0x93, &(0x7f0000000cc0)=""/147, 0x40f00, 0x2, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, &(0x7f0000000b80)={0x9}, 0x8, 0x10, 0x0, 0x0, r6}, 0x80) r7 = socket$nl_generic(0x10, 0x3, 0x10) r8 = syz_genetlink_get_family_id$tipc(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$TIPC_CMD_ENABLE_BEARER(r7, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000001200)=ANY=[@ANYBLOB="3400000006c08fada241ee0a049e6fba3f36f40da839bbdf54c31768b0026f4261f56d51c5d81ba4cb99f8203c40d0a142fcd75ce26e408d229139f8c4e81109c56a18e453e8a537df21c4ec04a4f3e22f4ac125a28ad43e41107b1f7e79c8573985e54fd665e2913ca74da8c9f3fc2839258c19fa7ac20ebead31206cf280ea73f635bc5418b66554392dfd11874fef72bc53538aae3cb5ef8a80140f4737dd2c572a03ee1d5e3d627e", @ANYRESOCT=0x0, @ANYBLOB="010000000000000000000100000000000000014100000018001700000000000000007564503a73"], 0x34}, 0x1, 0x0, 0x0, 0x1}, 0x0) ioctl$AUTOFS_DEV_IOCTL_PROTOSUBVER(r1, 0xc0189373, &(0x7f0000000540)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x6}}, './file0\x00'}) sendmsg$TIPC_CMD_GET_MAX_PORTS(r5, &(0x7f0000001140)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x40000}, 0xc, &(0x7f0000001100)={&(0x7f00000010c0)={0x1c, r8, 0x400, 0x8000, 0x25dfdbfe, {}, ["", "", "", "", "", "", ""]}, 0x1c}, 0x1, 0x0, 0x0, 0x20048854}, 0x4004) bpf$PROG_LOAD(0x5, &(0x7f0000000e40)={0x5, 0x16, &(0x7f0000001340)=ANY=[@ANYBLOB="390000000100000000000000900000f117fa0000", @ANYRES32=r4, @ANYBLOB="1f00000000000000b703000000000000850000000c000000b61b0453c29f42b5be06c7010b4efffe000000000085000000a900000018150000", @ANYRES32=r3, @ANYBLOB="0000000000000000180100002020782500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b70300000000850000005d000000185500000100000000000000000000009500000000000000"], &(0x7f0000000b80)='syzkaller\x00', 0x1, 0xe8, &(0x7f0000000bc0)=""/232, 0x41000, 0x5b, '\x00', 0x0, 0xe, r5, 0x8, &(0x7f0000000d00)={0x5, 0x2}, 0x8, 0x10, &(0x7f0000000d40)={0x4, 0xe, 0x2, 0x8}, 0x10, r6, r4, 0x5, &(0x7f0000000d80), &(0x7f0000000dc0)=[{0x4, 0x3, 0x0, 0x2}, {0x3, 0x1, 0xa, 0xa}, {0x0, 0x3, 0x2, 0xa}, {0x0, 0x3, 0x7, 0x1}, {0x1, 0x5, 0xb, 0xc}], 0x10, 0x7}, 0x90) 20:40:59 executing program 3: openat$nci(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) (async) r0 = openat$nci(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000380)='freezer.state\x00', 0x26e1, 0x0) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000580)={0x17, 0xc, &(0x7f0000000640)=ANY=[@ANYBLOB="184000000100000000000000000000001801000020756c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000000600000018200000", @ANYRES32=r1, @ANYBLOB="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"], &(0x7f0000000000)='GPL\x00', 0x0, 0x4b, &(0x7f0000000280)=""/75, 0x41000, 0xd, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000340)={0x0, 0x2, 0xa534261, 0x3}, 0x10, 0xffffffffffffffff, 0xffffffffffffffff, 0x3, &(0x7f0000000400)=[0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0xffffffffffffffff, r2, 0xffffffffffffffff, 0xffffffffffffffff], &(0x7f0000000440)=[{0x3, 0x2, 0x9, 0xc}, {0x0, 0x2, 0x0, 0x1}, {0x3, 0x0, 0xf}], 0x10, 0x1f}, 0x90) r4 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r4, 0x1, 0x11, &(0x7f0000000240), &(0x7f0000000280)=0x5) preadv(r0, &(0x7f0000000c80)=[{&(0x7f00000003c0)=""/45, 0xfffffffffffffca1}], 0x1, 0x4, 0xbe9) ioctl$IOCTL_GET_NCIDEV_IDX(r1, 0x0, &(0x7f0000000180)) (async) ioctl$IOCTL_GET_NCIDEV_IDX(r1, 0x0, &(0x7f0000000180)=0x0) ioctl$IOCTL_GET_NCIDEV_IDX(r0, 0x0, &(0x7f0000000040)=0x0) r7 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) write$binfmt_misc(r0, &(0x7f0000000b00)={'syz1', "511c3b073c7e31964849a8cd687059f9fa2838028e2ebfcfe3936e6943c0b094648c7e82759ed58c6ec6efa146f2062a522e31319c7883c9a4a7fd72d2cca7c5691b1948922f0d4ef972a22b148775033c0683e95e2d29f1ae130110374e370a72e5984341770921a81a9fa8c6f9b928361837bd28ab9fd4fc9686741065670c73c75e7141a60580ec503c0808b14502614479ee4f9865386da8b39e91556eef247767190fafadcac30081178c6805636450c5289f97ca57cfbb623cb2bad32e9e7b634c1ce6c0aaa9c6e1831e89edd496689ec4ac669c44451871e5dc6d2b5c008a8a6ed947f8499c2d"}, 0xee) (async) write$binfmt_misc(r0, &(0x7f0000000b00)={'syz1', "511c3b073c7e31964849a8cd687059f9fa2838028e2ebfcfe3936e6943c0b094648c7e82759ed58c6ec6efa146f2062a522e31319c7883c9a4a7fd72d2cca7c5691b1948922f0d4ef972a22b148775033c0683e95e2d29f1ae130110374e370a72e5984341770921a81a9fa8c6f9b928361837bd28ab9fd4fc9686741065670c73c75e7141a60580ec503c0808b14502614479ee4f9865386da8b39e91556eef247767190fafadcac30081178c6805636450c5289f97ca57cfbb623cb2bad32e9e7b634c1ce6c0aaa9c6e1831e89edd496689ec4ac669c44451871e5dc6d2b5c008a8a6ed947f8499c2d"}, 0xee) ioctl$FAT_IOCTL_SET_ATTRIBUTES(r3, 0x40047211, &(0x7f0000000800)=0x1) r8 = openat$cgroup_int(r2, &(0x7f0000000300)='hugetlb.2MB.max_usage_in_bytes\x00', 0x2, 0x0) close_range(r0, r0, 0x0) (async) close_range(r0, r0, 0x0) write$binfmt_script(r8, &(0x7f0000000480)=ANY=[@ANYBLOB="2321202e2f66696c653020245e5c2e5b272000200020667265657a65722e73746174f8ffffff0a22fdab54d896e5962c38af15a421956df30abffbeb33dd4bd53af9d74d5e1169efc760750dd4718bb88c325dc13b2a65eabd0ccafdc242bf5bd1a175e89359956e9aef06a6a591120e00509008f19f8ecbde1de7c16a72bb75b8dc6341cf2f2e24215cb3385adf181f862a886b4567ba95d58a8f51358492a862ab17d0631eafa3c65d4da90f3ffeec0e20b69d7b8d8e304866353461c3c972db373a20019d38f061b0a6eb6f5cd4718b617009e6f2641182d58d1eac0c5c7565f7169229652fa03df6821e"], 0xec) ioctl$sock_FIOGETOWN(r1, 0x8903, &(0x7f0000000240)=0x0) perf_event_open(&(0x7f00000001c0)={0x5, 0x80, 0xd4, 0x7, 0xa5, 0xbc, 0x0, 0xfffffffffffffff9, 0x5090, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x7fff, 0x2, @perf_config_ext={0x20, 0xa}, 0x8100, 0x5, 0x2, 0x8, 0x1, 0x9, 0x11d, 0x0, 0x1, 0x0, 0x7}, r9, 0x6, r2, 0x9) ioctl$BTRFS_IOC_SYNC(r2, 0x9408, 0x0) (async) ioctl$BTRFS_IOC_SYNC(r2, 0x9408, 0x0) r10 = syz_genetlink_get_family_id$nfc(&(0x7f0000000100), r7) sendmsg$NFC_CMD_DEV_UP(r7, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000000c0)={0x1c, r10, 0x1, 0x0, 0x0, {0x3}, [@NFC_ATTR_DEVICE_INDEX={0x8, 0x1, r6}]}, 0x1c}}, 0x0) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) (async) r11 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$batadv(&(0x7f0000000840), r1) (async) r12 = syz_genetlink_get_family_id$batadv(&(0x7f0000000840), r1) perf_event_open$cgroup(&(0x7f0000000c00)={0x5, 0x80, 0xff, 0x0, 0x81, 0x3, 0x0, 0x9, 0x83860, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x4, @perf_config_ext={0xe3, 0x8000000000000000}, 0x10421, 0xc60, 0x3, 0x5, 0x6, 0x9, 0x7, 0x0, 0x4, 0x0, 0xfffffffffffffff7}, r1, 0x6, 0xffffffffffffffff, 0x6) socket$nl_generic(0x10, 0x3, 0x10) (async) r13 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$BATADV_CMD_GET_MESH(r13, &(0x7f0000000ac0)={&(0x7f00000009c0)={0x10, 0x0, 0x0, 0x10}, 0xc, &(0x7f0000000a80)={&(0x7f0000000a00)={0x54, r12, 0x400, 0x70bd27, 0x25dfdbfc, {}, [@BATADV_ATTR_GW_BANDWIDTH_UP={0x8, 0x32, 0x9}, @BATADV_ATTR_ELP_INTERVAL={0x8, 0x3a, 0xfffffffd}, @BATADV_ATTR_BONDING_ENABLED={0x5, 0x2d, 0x1}, @BATADV_ATTR_GW_BANDWIDTH_DOWN={0x8, 0x31, 0x2}, @BATADV_ATTR_MULTICAST_FANOUT={0x8, 0x3c, 0x5}, @BATADV_ATTR_ELP_INTERVAL={0x8, 0x3a, 0xfffffbff}, @BATADV_ATTR_FRAGMENTATION_ENABLED={0x5}, @BATADV_ATTR_BRIDGE_LOOP_AVOIDANCE_ENABLED={0x5, 0x2e, 0x1}]}, 0x54}, 0x1, 0x0, 0x0, 0x80}, 0x0) syz_genetlink_get_family_id$nfc(&(0x7f00000008c0), r11) (async) r14 = syz_genetlink_get_family_id$nfc(&(0x7f00000008c0), r11) sendmsg$NFC_CMD_DEACTIVATE_TARGET(r7, &(0x7f0000000980)={&(0x7f0000000880)={0x10, 0x0, 0x0, 0x20000000}, 0xc, &(0x7f0000000940)={&(0x7f0000000900)={0x1c, r14, 0x4, 0x70bd2c, 0x25dfdbfc, {}, [@NFC_ATTR_DEVICE_INDEX={0x8, 0x1, r5}]}, 0x1c}, 0x1, 0x0, 0x0, 0x20000000}, 0x840) [ 110.672906][ T5554] workqueue: Failed to create a rescuer kthread for wq "nfc2_nci_rx_wq": -EINTR [ 110.697784][ T3091] __loop_clr_fd: partition scan of loop1 failed (rc=-16) [ 110.706832][ T3169] I/O error, dev loop1, sector 408 op 0x0:(READ) flags 0x80700 phys_seg 1 prio class 0 [ 110.707011][ T3169] I/O error, dev loop1, sector 408 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 0 [ 110.714179][ T4030] I/O error, dev loop1, sector 208 op 0x0:(READ) flags 0x80700 phys_seg 1 prio class 0 [ 110.723873][ T3169] buffer_io_error: 9 callbacks suppressed [ 110.723887][ T3169] Buffer I/O error on dev loop1p7, logical block 8, async page read [ 110.736839][ T3169] I/O error, dev loop1, sector 409 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 0 [ 110.766456][ T3169] Buffer I/O error on dev loop1p7, logical block 9, async page read [ 110.769415][ T5566] loop0: detected capacity change from 0 to 512 [ 110.816226][ T5563] workqueue: Failed to create a rescuer kthread for wq "nfc3_nci_cmd_wq": -EINTR [ 110.830881][ T4030] I/O error, dev loop1, sector 208 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 0 [ 110.849804][ T4030] Buffer I/O error on dev loop1p3, logical block 8, async page read 20:40:59 executing program 3: r0 = openat$nci(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000380)='freezer.state\x00', 0x26e1, 0x0) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000580)={0x17, 0xc, &(0x7f0000000640)=ANY=[@ANYBLOB="184000000100000000000000000000001801000020756c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000000600000018200000", @ANYRES32=r1, @ANYBLOB="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"], &(0x7f0000000000)='GPL\x00', 0x0, 0x4b, &(0x7f0000000280)=""/75, 0x41000, 0xd, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000340)={0x0, 0x2, 0xa534261, 0x3}, 0x10, 0xffffffffffffffff, 0xffffffffffffffff, 0x3, &(0x7f0000000400)=[0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0xffffffffffffffff, r2, 0xffffffffffffffff, 0xffffffffffffffff], &(0x7f0000000440)=[{0x3, 0x2, 0x9, 0xc}, {0x0, 0x2, 0x0, 0x1}, {0x3, 0x0, 0xf}], 0x10, 0x1f}, 0x90) r4 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r4, 0x1, 0x11, &(0x7f0000000240), &(0x7f0000000280)=0x5) preadv(r0, &(0x7f0000000c80)=[{&(0x7f00000003c0)=""/45, 0xfffffffffffffca1}], 0x1, 0x4, 0xbe9) ioctl$IOCTL_GET_NCIDEV_IDX(r1, 0x0, &(0x7f0000000180)=0x0) ioctl$IOCTL_GET_NCIDEV_IDX(r0, 0x0, &(0x7f0000000040)=0x0) r7 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) write$binfmt_misc(r0, &(0x7f0000000b00)={'syz1', "511c3b073c7e31964849a8cd687059f9fa2838028e2ebfcfe3936e6943c0b094648c7e82759ed58c6ec6efa146f2062a522e31319c7883c9a4a7fd72d2cca7c5691b1948922f0d4ef972a22b148775033c0683e95e2d29f1ae130110374e370a72e5984341770921a81a9fa8c6f9b928361837bd28ab9fd4fc9686741065670c73c75e7141a60580ec503c0808b14502614479ee4f9865386da8b39e91556eef247767190fafadcac30081178c6805636450c5289f97ca57cfbb623cb2bad32e9e7b634c1ce6c0aaa9c6e1831e89edd496689ec4ac669c44451871e5dc6d2b5c008a8a6ed947f8499c2d"}, 0xee) ioctl$FAT_IOCTL_SET_ATTRIBUTES(r3, 0x40047211, &(0x7f0000000800)=0x1) r8 = openat$cgroup_int(r2, &(0x7f0000000300)='hugetlb.2MB.max_usage_in_bytes\x00', 0x2, 0x0) close_range(r0, r0, 0x0) write$binfmt_script(r8, &(0x7f0000000480)=ANY=[@ANYBLOB="2321202e2f66696c653020245e5c2e5b272000200020667265657a65722e73746174f8ffffff0a22fdab54d896e5962c38af15a421956df30abffbeb33dd4bd53af9d74d5e1169efc760750dd4718bb88c325dc13b2a65eabd0ccafdc242bf5bd1a175e89359956e9aef06a6a591120e00509008f19f8ecbde1de7c16a72bb75b8dc6341cf2f2e24215cb3385adf181f862a886b4567ba95d58a8f51358492a862ab17d0631eafa3c65d4da90f3ffeec0e20b69d7b8d8e304866353461c3c972db373a20019d38f061b0a6eb6f5cd4718b617009e6f2641182d58d1eac0c5c7565f7169229652fa03df6821e"], 0xec) ioctl$sock_FIOGETOWN(r1, 0x8903, &(0x7f0000000240)=0x0) perf_event_open(&(0x7f00000001c0)={0x5, 0x80, 0xd4, 0x7, 0xa5, 0xbc, 0x0, 0xfffffffffffffff9, 0x5090, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x7fff, 0x2, @perf_config_ext={0x20, 0xa}, 0x8100, 0x5, 0x2, 0x8, 0x1, 0x9, 0x11d, 0x0, 0x1, 0x0, 0x7}, r9, 0x6, r2, 0x9) ioctl$BTRFS_IOC_SYNC(r2, 0x9408, 0x0) r10 = syz_genetlink_get_family_id$nfc(&(0x7f0000000100), r7) sendmsg$NFC_CMD_DEV_UP(r7, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000000c0)={0x1c, r10, 0x1, 0x0, 0x0, {0x3}, [@NFC_ATTR_DEVICE_INDEX={0x8, 0x1, r6}]}, 0x1c}}, 0x0) r11 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r12 = syz_genetlink_get_family_id$batadv(&(0x7f0000000840), r1) perf_event_open$cgroup(&(0x7f0000000c00)={0x5, 0x80, 0xff, 0x0, 0x81, 0x3, 0x0, 0x9, 0x83860, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x4, @perf_config_ext={0xe3, 0x8000000000000000}, 0x10421, 0xc60, 0x3, 0x5, 0x6, 0x9, 0x7, 0x0, 0x4, 0x0, 0xfffffffffffffff7}, r1, 0x6, 0xffffffffffffffff, 0x6) r13 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$BATADV_CMD_GET_MESH(r13, &(0x7f0000000ac0)={&(0x7f00000009c0)={0x10, 0x0, 0x0, 0x10}, 0xc, &(0x7f0000000a80)={&(0x7f0000000a00)={0x54, r12, 0x400, 0x70bd27, 0x25dfdbfc, {}, [@BATADV_ATTR_GW_BANDWIDTH_UP={0x8, 0x32, 0x9}, @BATADV_ATTR_ELP_INTERVAL={0x8, 0x3a, 0xfffffffd}, @BATADV_ATTR_BONDING_ENABLED={0x5, 0x2d, 0x1}, @BATADV_ATTR_GW_BANDWIDTH_DOWN={0x8, 0x31, 0x2}, @BATADV_ATTR_MULTICAST_FANOUT={0x8, 0x3c, 0x5}, @BATADV_ATTR_ELP_INTERVAL={0x8, 0x3a, 0xfffffbff}, @BATADV_ATTR_FRAGMENTATION_ENABLED={0x5}, @BATADV_ATTR_BRIDGE_LOOP_AVOIDANCE_ENABLED={0x5, 0x2e, 0x1}]}, 0x54}, 0x1, 0x0, 0x0, 0x80}, 0x0) r14 = syz_genetlink_get_family_id$nfc(&(0x7f00000008c0), r11) sendmsg$NFC_CMD_DEACTIVATE_TARGET(r7, &(0x7f0000000980)={&(0x7f0000000880)={0x10, 0x0, 0x0, 0x20000000}, 0xc, &(0x7f0000000940)={&(0x7f0000000900)={0x1c, r14, 0x4, 0x70bd2c, 0x25dfdbfc, {}, [@NFC_ATTR_DEVICE_INDEX={0x8, 0x1, r5}]}, 0x1c}, 0x1, 0x0, 0x0, 0x20000000}, 0x840) [ 110.876873][ T3169] I/O error, dev loop1, sector 410 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 0 [ 110.886236][ T3169] Buffer I/O error on dev loop1p7, logical block 10, async page read [ 110.888389][ T5570] loop1: detected capacity change from 0 to 2048 [ 110.915745][ T5566] EXT4-fs (loop0): 1 orphan inode deleted 20:40:59 executing program 1: ioctl$BTRFS_IOC_LOGICAL_INO(0xffffffffffffffff, 0xc0389424, &(0x7f0000000180)={0x1, 0x28, '\x00', 0x1, &(0x7f0000000080)=[0x0, 0x0, 0x0, 0x0, 0x0]}) r0 = socket$inet6(0xa, 0x3, 0x6) r1 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$FIDEDUPERANGE(r0, 0xc0189436, &(0x7f0000000f00)=ANY=[@ANYBLOB="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"]) ioctl$TIOCSBRK(0xffffffffffffffff, 0x5427) recvfrom$inet6(0xffffffffffffffff, &(0x7f0000000280)=""/134, 0x86, 0x40000102, &(0x7f0000000340)={0xa, 0x4e21, 0x77f, @mcast1, 0x403b3f}, 0x1c) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000001040)={{0xffffffffffffffff, 0xffffffffffffffff}, &(0x7f0000000140), &(0x7f0000000480)=r1}, 0x20) syz_read_part_table(0x593, &(0x7f00000005c0)="$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") r3 = creat(&(0x7f0000000240)='./file0\x00', 0x0) stat(&(0x7f0000000040)='./file1\x00', &(0x7f0000000380)) fsetxattr$security_capability(r3, &(0x7f0000000100), &(0x7f0000000000)=@v1={0x1000000, [{0x80000000, 0x81}]}, 0xc, 0x0) newfstatat(0xffffffffffffff9c, &(0x7f00000000c0)='./file1\x00', &(0x7f0000001400), 0x400) close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x2) ioctl$TIOCSTI(r3, 0x5412, &(0x7f00000004c0)=0x40) fsync(0xffffffffffffffff) write$binfmt_misc(r3, &(0x7f0000001080)=ANY=[@ANYBLOB="7379d3c6"], 0x4) fallocate(r3, 0x100000011, 0x0, 0x2811fdff) open(&(0x7f0000000100)='.\x00', 0x20c2, 0x2d) open$dir(&(0x7f0000000500)='./file1\x00', 0x1c6c0, 0x0) r4 = openat$vcsu(0xffffffffffffff9c, &(0x7f0000000cc0), 0x400c00, 0x0) lsetxattr$security_selinux(&(0x7f0000001180)='./file1\x00', &(0x7f00000011c0), &(0x7f0000001300)='system_u:object_r:unconfined_exec_t:s0\x00', 0x27, 0x3) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000400)={0xffffffffffffffff, 0xe0, &(0x7f0000000300)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, &(0x7f00000000c0)=[0x0], &(0x7f0000000140), 0x0, 0x8, &(0x7f0000000200)=[{}, {}, {}, {}, {}], 0x28, 0x0, 0x0, 0x0, 0x0, 0x10, 0x8, 0x8, &(0x7f00000002c0)}}, 0x10) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000e80)=@bpf_lsm={0x1d, 0x4, &(0x7f0000000040)=@framed={{0x18, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x73fc}, [@generic={0x9, 0x8, 0x0, 0x7f, 0x200}]}, &(0x7f0000000880)='GPL\x00', 0x1f, 0x93, &(0x7f0000000cc0)=""/147, 0x40f00, 0x2, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, &(0x7f0000000b80)={0x9}, 0x8, 0x10, 0x0, 0x0, r5}, 0x80) r6 = socket$nl_generic(0x10, 0x3, 0x10) r7 = syz_genetlink_get_family_id$tipc(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$TIPC_CMD_ENABLE_BEARER(r6, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000001200)=ANY=[@ANYBLOB="3400000006c08fada241ee0a049e6fba3f36f40da839bbdf54c31768b0026f4261f56d51c5d81ba4cb99f8203c40d0a142fcd75ce26e408d229139f8c4e81109c56a18e453e8a537df21c4ec04a4f3e22f4ac125a28ad43e41107b1f7e79c8573985e54fd665e2913ca74da8c9f3fc2839258c19fa7ac20ebead31206cf280ea73f635bc5418b66554392dfd11874fef72bc53538aae3cb5ef8a80140f4737dd2c572a03ee1d5e3d627e", @ANYRESOCT=0x0, @ANYBLOB="010000000000000000000100000000000000014100000018001700000000000000007564503a73"], 0x34}, 0x1, 0x0, 0x0, 0x1}, 0x0) ioctl$AUTOFS_DEV_IOCTL_PROTOSUBVER(r1, 0xc0189373, &(0x7f0000000540)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x6}}, './file0\x00'}) sendmsg$TIPC_CMD_GET_MAX_PORTS(r4, &(0x7f0000001140)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x40000}, 0xc, &(0x7f0000001100)={&(0x7f00000010c0)={0x1c, r7, 0x400, 0x8000, 0x25dfdbfe, {}, ["", "", "", "", "", "", ""]}, 0x1c}, 0x1, 0x0, 0x0, 0x20048854}, 0x4004) bpf$PROG_LOAD(0x5, &(0x7f0000000e40)={0x5, 0x16, &(0x7f0000001340)=ANY=[@ANYBLOB="390000000100000000000000900000f117fa0000", @ANYRES32=r3, @ANYBLOB="1f00000000000000b703000000000000850000000c000000b61b0453c29f42b5be06c7010b4efffe000000000085000000a900000018150000", @ANYRES32=r2, @ANYBLOB="0000000000000000180100002020782500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b70300000000850000005d000000185500000100000000000000000000009500000000000000"], &(0x7f0000000b80)='syzkaller\x00', 0x1, 0xe8, &(0x7f0000000bc0)=""/232, 0x41000, 0x5b, '\x00', 0x0, 0xe, r4, 0x8, &(0x7f0000000d00)={0x5, 0x2}, 0x8, 0x10, &(0x7f0000000d40)={0x4, 0xe, 0x2, 0x8}, 0x10, r5, r3, 0x5, &(0x7f0000000d80), &(0x7f0000000dc0)=[{0x4, 0x3, 0x0, 0x2}, {0x3, 0x1, 0xa, 0xa}, {0x0, 0x3, 0x2, 0xa}, {0x0, 0x3, 0x7, 0x1}, {0x1, 0x5, 0xb, 0xc}], 0x10, 0x7}, 0x90) [ 110.927226][ T5570] loop_reread_partitions: partition scan of loop1 () failed (rc=-16) [ 110.933997][ T5566] ext4 filesystem being mounted at /root/syzkaller-testdir338643557/syzkaller.M396af/73/file1 supports timestamps until 2038-01-19 (0x7fffffff) 20:40:59 executing program 3: r0 = openat$nci(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000380)='freezer.state\x00', 0x26e1, 0x0) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000580)={0x17, 0xc, &(0x7f0000000640)=ANY=[@ANYBLOB="184000000100000000000000000000001801000020756c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000000600000018200000", @ANYRES32=r1, @ANYBLOB="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"], &(0x7f0000000000)='GPL\x00', 0x0, 0x4b, &(0x7f0000000280)=""/75, 0x41000, 0xd, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000340)={0x0, 0x2, 0xa534261, 0x3}, 0x10, 0xffffffffffffffff, 0xffffffffffffffff, 0x3, &(0x7f0000000400)=[0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0xffffffffffffffff, r2, 0xffffffffffffffff, 0xffffffffffffffff], &(0x7f0000000440)=[{0x3, 0x2, 0x9, 0xc}, {0x0, 0x2, 0x0, 0x1}, {0x3, 0x0, 0xf}], 0x10, 0x1f}, 0x90) r4 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r4, 0x1, 0x11, &(0x7f0000000240), &(0x7f0000000280)=0x5) preadv(r0, &(0x7f0000000c80)=[{&(0x7f00000003c0)=""/45, 0xfffffffffffffca1}], 0x1, 0x4, 0xbe9) ioctl$IOCTL_GET_NCIDEV_IDX(r1, 0x0, &(0x7f0000000180)=0x0) ioctl$IOCTL_GET_NCIDEV_IDX(r0, 0x0, &(0x7f0000000040)=0x0) r7 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) write$binfmt_misc(r0, &(0x7f0000000b00)={'syz1', "511c3b073c7e31964849a8cd687059f9fa2838028e2ebfcfe3936e6943c0b094648c7e82759ed58c6ec6efa146f2062a522e31319c7883c9a4a7fd72d2cca7c5691b1948922f0d4ef972a22b148775033c0683e95e2d29f1ae130110374e370a72e5984341770921a81a9fa8c6f9b928361837bd28ab9fd4fc9686741065670c73c75e7141a60580ec503c0808b14502614479ee4f9865386da8b39e91556eef247767190fafadcac30081178c6805636450c5289f97ca57cfbb623cb2bad32e9e7b634c1ce6c0aaa9c6e1831e89edd496689ec4ac669c44451871e5dc6d2b5c008a8a6ed947f8499c2d"}, 0xee) ioctl$FAT_IOCTL_SET_ATTRIBUTES(r3, 0x40047211, &(0x7f0000000800)=0x1) r8 = openat$cgroup_int(r2, &(0x7f0000000300)='hugetlb.2MB.max_usage_in_bytes\x00', 0x2, 0x0) close_range(r0, r0, 0x0) write$binfmt_script(r8, &(0x7f0000000480)=ANY=[@ANYBLOB="2321202e2f66696c653020245e5c2e5b272000200020667265657a65722e73746174f8ffffff0a22fdab54d896e5962c38af15a421956df30abffbeb33dd4bd53af9d74d5e1169efc760750dd4718bb88c325dc13b2a65eabd0ccafdc242bf5bd1a175e89359956e9aef06a6a591120e00509008f19f8ecbde1de7c16a72bb75b8dc6341cf2f2e24215cb3385adf181f862a886b4567ba95d58a8f51358492a862ab17d0631eafa3c65d4da90f3ffeec0e20b69d7b8d8e304866353461c3c972db373a20019d38f061b0a6eb6f5cd4718b617009e6f2641182d58d1eac0c5c7565f7169229652fa03df6821e"], 0xec) ioctl$sock_FIOGETOWN(r1, 0x8903, &(0x7f0000000240)=0x0) perf_event_open(&(0x7f00000001c0)={0x5, 0x80, 0xd4, 0x7, 0xa5, 0xbc, 0x0, 0xfffffffffffffff9, 0x5090, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x7fff, 0x2, @perf_config_ext={0x20, 0xa}, 0x8100, 0x5, 0x2, 0x8, 0x1, 0x9, 0x11d, 0x0, 0x1, 0x0, 0x7}, r9, 0x6, r2, 0x9) ioctl$BTRFS_IOC_SYNC(r2, 0x9408, 0x0) r10 = syz_genetlink_get_family_id$nfc(&(0x7f0000000100), r7) sendmsg$NFC_CMD_DEV_UP(r7, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000000c0)={0x1c, r10, 0x1, 0x0, 0x0, {0x3}, [@NFC_ATTR_DEVICE_INDEX={0x8, 0x1, r6}]}, 0x1c}}, 0x0) r11 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r12 = syz_genetlink_get_family_id$batadv(&(0x7f0000000840), r1) perf_event_open$cgroup(&(0x7f0000000c00)={0x5, 0x80, 0xff, 0x0, 0x81, 0x3, 0x0, 0x9, 0x83860, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x4, @perf_config_ext={0xe3, 0x8000000000000000}, 0x10421, 0xc60, 0x3, 0x5, 0x6, 0x9, 0x7, 0x0, 0x4, 0x0, 0xfffffffffffffff7}, r1, 0x6, 0xffffffffffffffff, 0x6) r13 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$BATADV_CMD_GET_MESH(r13, &(0x7f0000000ac0)={&(0x7f00000009c0)={0x10, 0x0, 0x0, 0x10}, 0xc, &(0x7f0000000a80)={&(0x7f0000000a00)={0x54, r12, 0x400, 0x70bd27, 0x25dfdbfc, {}, [@BATADV_ATTR_GW_BANDWIDTH_UP={0x8, 0x32, 0x9}, @BATADV_ATTR_ELP_INTERVAL={0x8, 0x3a, 0xfffffffd}, @BATADV_ATTR_BONDING_ENABLED={0x5, 0x2d, 0x1}, @BATADV_ATTR_GW_BANDWIDTH_DOWN={0x8, 0x31, 0x2}, @BATADV_ATTR_MULTICAST_FANOUT={0x8, 0x3c, 0x5}, @BATADV_ATTR_ELP_INTERVAL={0x8, 0x3a, 0xfffffbff}, @BATADV_ATTR_FRAGMENTATION_ENABLED={0x5}, @BATADV_ATTR_BRIDGE_LOOP_AVOIDANCE_ENABLED={0x5, 0x2e, 0x1}]}, 0x54}, 0x1, 0x0, 0x0, 0x80}, 0x0) r14 = syz_genetlink_get_family_id$nfc(&(0x7f00000008c0), r11) sendmsg$NFC_CMD_DEACTIVATE_TARGET(r7, &(0x7f0000000980)={&(0x7f0000000880)={0x10, 0x0, 0x0, 0x20000000}, 0xc, &(0x7f0000000940)={&(0x7f0000000900)={0x1c, r14, 0x4, 0x70bd2c, 0x25dfdbfc, {}, [@NFC_ATTR_DEVICE_INDEX={0x8, 0x1, r5}]}, 0x1c}, 0x1, 0x0, 0x0, 0x20000000}, 0x840) 20:40:59 executing program 0: r0 = gettid() bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000040)={0x0, 0x80, 0x1, 0x0, 0x1, 0x1f, 0x0, 0x7, 0x0, 0xa, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x8, 0x2, @perf_config_ext={0x100000001, 0x9}, 0x15, 0x72e0, 0xa9, 0x1, 0x0, 0x2, 0x5, 0x0, 0x1000}, r0, 0x7, 0xffffffffffffffff, 0x9) fstat(0xffffffffffffffff, &(0x7f0000000b00)) r1 = getegid() syz_mount_image$ext4(&(0x7f0000000100)='ext4\x00', &(0x7f0000000200)='./file1\x00', 0x3000000, &(0x7f0000003040)=ANY=[@ANYRES64=r1, @ANYBLOB="8555591a163448f4c52bee6cc0e12a6a8610718f818822e94c360e46f93ac9c63a1b40ea9d758c2b4e2d7c386a141016d11cb13fabc846fc7fb242c175fbdf96e2a96e80e82b73987b1d5dfd843c7e6748a15a0c4160f5e4c468e8f8e417bd3385546159881194fe3a7cf8307cd9c7ce0ca180a481d4dcaa6611ec5c8ff1c546360dea3da9f2bfc1fd71af9ebf2afe4285f013a3929a7096097976a16e2060e5f26e379011ea1811", @ANYRES64, @ANYBLOB="ca42ad87c41bb3b2507e4e12104f0cd507000001046f9445657db4996b10208d04454e11fb5b1383c5ce98e3062f45ec04e5b8b179df3d64a6cec05d29235e3cbe0b339abe9faee5cf3e44c97ce56a1dc359047114eeb3c23f331114039d75a664afc47e8273b79e83d301fc4ceec8b89911505b6743797c459195a7120ded1748f315deb90000ffed00000000000000", @ANYRES8=r1, @ANYRES8=r1, @ANYRES64, @ANYBLOB="bd85893dee1670c8c7e3b4a65ec61f224992fd11263b7749c7ee63dd4fc13cc5dfdde8a3099aaf21ece351c316d9bbd7e4ecc524c856f20d6a1818d6d75f702eb904653f9d55af", @ANYRESOCT], 0x1, 0x513, &(0x7f0000000c40)="$eJzs3W9rJHcdAPDvTLJp7i41WxU5C7bFVu6K3m7S2DaKtBVEHxXU+jzGZBNCNtmQ3dRLKJriCxBEVPAF+ETwBQjSlyDCgT4XFUX0Th/qjczuRPNnN1mSTfbcfD4w2d9v/n2/vyE7O39+zARwbb0QEW9FxFhEvBwR08X4tBgW8sp+Z75HD99byocksuydvyWRFOMO1pXXxyPiVmeRmIyIr38l4lvJybjN3b31xXq9tl3Uq62NrWpzd+/e2sbiam21tjk3N/va/Ovzr87PZIULtbMcEW986U8/+v7PvvzGrz7z7d8v/OXud/K0vvCxTt4RsXShAD101l1qb4sD+TbavoxgQ5K3pzQ27CwAAOhHfoz/4Yj4ZPv4fzrG2kdzAAAAwCjJ3pyKfyURGQAAADCy0oiYiiStFH0BpiJNK5VOH96Pxs203mi2Pr3S2NlczqdFlKOUrqzVazNFX+FylJK8Plv0sT2ov3KsPhcRz0TED6dvtOuVpUZ9edgXPwAAAOCauPX80fP/f06n7TIAAAAwYso9KwAAAMCocMoPAAAAo8/5PwAAAIy0r779dj5kB+/xXn53d2e98e695VpzvbKxs1RZamxvVVYbjdX2M/s2zlpfvdHY+mxs7tyvtmrNVrW5u7ew0djZbC2sHXkFNgAAAHCFnnn+g98lEbH/+RvtIYrnAAIc8cdhJwAM0tiwEwCGZnzYCQBDUzpzDnsIGHXJGdNPdt7pXCuMX19OPgAAwODd+fjJ+/8TxbSzrw0A/8/09QGA68fdPbi+SuftAXh70JkAw/KhzsdTvab3fHhHH/f/O9cYsuxciQEAAAMz1R6StFIcp09FmlYqEU+3XwtQSlbW6rWZ4vzgt9Olp/L6bHvJ5Mw+wwAAAAAAAAAAAAAAAAAAAAAAAABAR5YlkQEAAAAjLSL9c9J+mn/EnemXpo5eHTj21q+fvvPj+4ut1vZsxETy9+l81EREtH5SjH8l80oAAAAAeAJ0ztOLz9lhZwMAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAADAqHn08L2lg+Eq4/71ixFR7hZ/PCbbn5NRioib/0hi/NBySUSMDSD+/vsRcbtb/CQeZ1lWLrLoFv/GJccvtzdN9/hpRNwaQHy4zj7I9z9vdfv+pfFC+7P792+8GC6q9/4v/e/+b6zH/ufpY/Venn3wi2rP+O9HPDveff9zED/pxD8SIq+82Gcbv/mNvb2uEw6tslv8w7GqrY2tanN3797axuJqbbW2OTc3+9r86/Ovzs9UV9bqteJv1zA/+MQvH5/W/ps94pePtv/E9n+pr9Zn8e8H9x9+pFMpdYt/98Xuv7+3e8RPi9++TxXlfPqdg/J+p3zYcz//zXOntX+5R/snz2j/3b7aH597+Wvf+0PXKSe2BgBwFZq7e+uL9Xpt+5TCZB/zXHHhzScjjQEW4slIY1iF7Lud/8eLreeCi58oZBdZfDwGkMbEie/pWJx3hUnEfr6uPv8hAQCAEfO/g/7T7iABAAAAAAAAAAAAAAAAAAAAl+mcjyWbjIi+Zz4ec384TQUAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAONV/AgAA//8FStFZ") [ 111.003626][ T5582] loop1: detected capacity change from 0 to 2048 20:40:59 executing program 3: r0 = openat$nci(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000380)='freezer.state\x00', 0x26e1, 0x0) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000580)={0x17, 0xc, &(0x7f0000000640)=ANY=[@ANYBLOB="184000000100000000000000000000001801000020756c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000000600000018200000", @ANYRES32=r1, @ANYBLOB="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"], &(0x7f0000000000)='GPL\x00', 0x0, 0x4b, &(0x7f0000000280)=""/75, 0x41000, 0xd, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000340)={0x0, 0x2, 0xa534261, 0x3}, 0x10, 0xffffffffffffffff, 0xffffffffffffffff, 0x3, &(0x7f0000000400)=[0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0xffffffffffffffff, r2, 0xffffffffffffffff, 0xffffffffffffffff], &(0x7f0000000440)=[{0x3, 0x2, 0x9, 0xc}, {0x0, 0x2, 0x0, 0x1}, {0x3, 0x0, 0xf}], 0x10, 0x1f}, 0x90) r4 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r4, 0x1, 0x11, &(0x7f0000000240), &(0x7f0000000280)=0x5) preadv(r0, &(0x7f0000000c80)=[{&(0x7f00000003c0)=""/45, 0xfffffffffffffca1}], 0x1, 0x4, 0xbe9) ioctl$IOCTL_GET_NCIDEV_IDX(r1, 0x0, &(0x7f0000000180)=0x0) ioctl$IOCTL_GET_NCIDEV_IDX(r0, 0x0, &(0x7f0000000040)=0x0) r7 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) write$binfmt_misc(r0, &(0x7f0000000b00)={'syz1', "511c3b073c7e31964849a8cd687059f9fa2838028e2ebfcfe3936e6943c0b094648c7e82759ed58c6ec6efa146f2062a522e31319c7883c9a4a7fd72d2cca7c5691b1948922f0d4ef972a22b148775033c0683e95e2d29f1ae130110374e370a72e5984341770921a81a9fa8c6f9b928361837bd28ab9fd4fc9686741065670c73c75e7141a60580ec503c0808b14502614479ee4f9865386da8b39e91556eef247767190fafadcac30081178c6805636450c5289f97ca57cfbb623cb2bad32e9e7b634c1ce6c0aaa9c6e1831e89edd496689ec4ac669c44451871e5dc6d2b5c008a8a6ed947f8499c2d"}, 0xee) ioctl$FAT_IOCTL_SET_ATTRIBUTES(r3, 0x40047211, &(0x7f0000000800)=0x1) r8 = openat$cgroup_int(r2, &(0x7f0000000300)='hugetlb.2MB.max_usage_in_bytes\x00', 0x2, 0x0) close_range(r0, r0, 0x0) write$binfmt_script(r8, &(0x7f0000000480)=ANY=[@ANYBLOB="2321202e2f66696c653020245e5c2e5b272000200020667265657a65722e73746174f8ffffff0a22fdab54d896e5962c38af15a421956df30abffbeb33dd4bd53af9d74d5e1169efc760750dd4718bb88c325dc13b2a65eabd0ccafdc242bf5bd1a175e89359956e9aef06a6a591120e00509008f19f8ecbde1de7c16a72bb75b8dc6341cf2f2e24215cb3385adf181f862a886b4567ba95d58a8f51358492a862ab17d0631eafa3c65d4da90f3ffeec0e20b69d7b8d8e304866353461c3c972db373a20019d38f061b0a6eb6f5cd4718b617009e6f2641182d58d1eac0c5c7565f7169229652fa03df6821e"], 0xec) ioctl$sock_FIOGETOWN(r1, 0x8903, &(0x7f0000000240)=0x0) perf_event_open(&(0x7f00000001c0)={0x5, 0x80, 0xd4, 0x7, 0xa5, 0xbc, 0x0, 0xfffffffffffffff9, 0x5090, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x7fff, 0x2, @perf_config_ext={0x20, 0xa}, 0x8100, 0x5, 0x2, 0x8, 0x1, 0x9, 0x11d, 0x0, 0x1, 0x0, 0x7}, r9, 0x6, r2, 0x9) ioctl$BTRFS_IOC_SYNC(r2, 0x9408, 0x0) r10 = syz_genetlink_get_family_id$nfc(&(0x7f0000000100), r7) sendmsg$NFC_CMD_DEV_UP(r7, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000000c0)={0x1c, r10, 0x1, 0x0, 0x0, {0x3}, [@NFC_ATTR_DEVICE_INDEX={0x8, 0x1, r6}]}, 0x1c}}, 0x0) r11 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r12 = syz_genetlink_get_family_id$batadv(&(0x7f0000000840), r1) perf_event_open$cgroup(&(0x7f0000000c00)={0x5, 0x80, 0xff, 0x0, 0x81, 0x3, 0x0, 0x9, 0x83860, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x4, @perf_config_ext={0xe3, 0x8000000000000000}, 0x10421, 0xc60, 0x3, 0x5, 0x6, 0x9, 0x7, 0x0, 0x4, 0x0, 0xfffffffffffffff7}, r1, 0x6, 0xffffffffffffffff, 0x6) r13 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$BATADV_CMD_GET_MESH(r13, &(0x7f0000000ac0)={&(0x7f00000009c0)={0x10, 0x0, 0x0, 0x10}, 0xc, &(0x7f0000000a80)={&(0x7f0000000a00)={0x54, r12, 0x400, 0x70bd27, 0x25dfdbfc, {}, [@BATADV_ATTR_GW_BANDWIDTH_UP={0x8, 0x32, 0x9}, @BATADV_ATTR_ELP_INTERVAL={0x8, 0x3a, 0xfffffffd}, @BATADV_ATTR_BONDING_ENABLED={0x5, 0x2d, 0x1}, @BATADV_ATTR_GW_BANDWIDTH_DOWN={0x8, 0x31, 0x2}, @BATADV_ATTR_MULTICAST_FANOUT={0x8, 0x3c, 0x5}, @BATADV_ATTR_ELP_INTERVAL={0x8, 0x3a, 0xfffffbff}, @BATADV_ATTR_FRAGMENTATION_ENABLED={0x5}, @BATADV_ATTR_BRIDGE_LOOP_AVOIDANCE_ENABLED={0x5, 0x2e, 0x1}]}, 0x54}, 0x1, 0x0, 0x0, 0x80}, 0x0) r14 = syz_genetlink_get_family_id$nfc(&(0x7f00000008c0), r11) sendmsg$NFC_CMD_DEACTIVATE_TARGET(r7, &(0x7f0000000980)={&(0x7f0000000880)={0x10, 0x0, 0x0, 0x20000000}, 0xc, &(0x7f0000000940)={&(0x7f0000000900)={0x1c, r14, 0x4, 0x70bd2c, 0x25dfdbfc, {}, [@NFC_ATTR_DEVICE_INDEX={0x8, 0x1, r5}]}, 0x1c}, 0x1, 0x0, 0x0, 0x20000000}, 0x840) [ 111.072990][ T5582] loop1: p2 p3 p7 20:40:59 executing program 1: ioctl$BTRFS_IOC_LOGICAL_INO(0xffffffffffffffff, 0xc0389424, &(0x7f0000000180)={0x1, 0x28, '\x00', 0x1, &(0x7f0000000080)=[0x0, 0x0, 0x0, 0x0, 0x0]}) r0 = socket$inet6(0xa, 0x3, 0x6) r1 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$FIDEDUPERANGE(r0, 0xc0189436, &(0x7f0000000f00)=ANY=[@ANYBLOB="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"]) ioctl$TIOCSBRK(0xffffffffffffffff, 0x5427) recvfrom$inet6(0xffffffffffffffff, &(0x7f0000000280)=""/134, 0x86, 0x40000102, &(0x7f0000000340)={0xa, 0x4e21, 0x77f, @mcast1, 0x403b3f}, 0x1c) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000001040)={{0xffffffffffffffff, 0xffffffffffffffff}, &(0x7f0000000140), &(0x7f0000000480)=r1}, 0x20) syz_read_part_table(0x593, &(0x7f00000005c0)="$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") r3 = creat(&(0x7f0000000240)='./file0\x00', 0x0) stat(&(0x7f0000000040)='./file1\x00', &(0x7f0000000380)) fsetxattr$security_capability(r3, &(0x7f0000000100), &(0x7f0000000000)=@v1={0x1000000, [{0x80000000, 0x81}]}, 0xc, 0x0) newfstatat(0xffffffffffffff9c, &(0x7f00000000c0)='./file1\x00', &(0x7f0000001400), 0x400) close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x2) ioctl$TIOCSTI(r3, 0x5412, &(0x7f00000004c0)=0x40) fsync(0xffffffffffffffff) write$binfmt_misc(r3, &(0x7f0000001080)=ANY=[@ANYBLOB="7379d3c6"], 0x4) fallocate(r3, 0x100000011, 0x0, 0x2811fdff) open(&(0x7f0000000100)='.\x00', 0x20c2, 0x2d) open$dir(&(0x7f0000000500)='./file1\x00', 0x1c6c0, 0x0) r4 = openat$vcsu(0xffffffffffffff9c, &(0x7f0000000cc0), 0x400c00, 0x0) lsetxattr$security_selinux(&(0x7f0000001180)='./file1\x00', &(0x7f00000011c0), &(0x7f0000001300)='system_u:object_r:unconfined_exec_t:s0\x00', 0x27, 0x3) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000400)={0xffffffffffffffff, 0xe0, &(0x7f0000000300)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, &(0x7f00000000c0)=[0x0], &(0x7f0000000140), 0x0, 0x8, &(0x7f0000000200)=[{}, {}, {}, {}, {}], 0x28, 0x0, 0x0, 0x0, 0x0, 0x10, 0x8, 0x8, &(0x7f00000002c0)}}, 0x10) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000e80)=@bpf_lsm={0x1d, 0x4, &(0x7f0000000040)=@framed={{0x18, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x73fc}, [@generic={0x9, 0x8, 0x0, 0x7f, 0x200}]}, &(0x7f0000000880)='GPL\x00', 0x1f, 0x93, &(0x7f0000000cc0)=""/147, 0x40f00, 0x2, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, &(0x7f0000000b80)={0x9}, 0x8, 0x10, 0x0, 0x0, r5}, 0x80) r6 = socket$nl_generic(0x10, 0x3, 0x10) r7 = syz_genetlink_get_family_id$tipc(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$TIPC_CMD_ENABLE_BEARER(r6, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000001200)=ANY=[@ANYBLOB="3400000006c08fada241ee0a049e6fba3f36f40da839bbdf54c31768b0026f4261f56d51c5d81ba4cb99f8203c40d0a142fcd75ce26e408d229139f8c4e81109c56a18e453e8a537df21c4ec04a4f3e22f4ac125a28ad43e41107b1f7e79c8573985e54fd665e2913ca74da8c9f3fc2839258c19fa7ac20ebead31206cf280ea73f635bc5418b66554392dfd11874fef72bc53538aae3cb5ef8a80140f4737dd2c572a03ee1d5e3d627e", @ANYRESOCT=0x0, @ANYBLOB="010000000000000000000100000000000000014100000018001700000000000000007564503a73"], 0x34}, 0x1, 0x0, 0x0, 0x1}, 0x0) ioctl$AUTOFS_DEV_IOCTL_PROTOSUBVER(r1, 0xc0189373, &(0x7f0000000540)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x6}}, './file0\x00'}) sendmsg$TIPC_CMD_GET_MAX_PORTS(r4, &(0x7f0000001140)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x40000}, 0xc, &(0x7f0000001100)={&(0x7f00000010c0)={0x1c, r7, 0x400, 0x8000, 0x25dfdbfe, {}, ["", "", "", "", "", "", ""]}, 0x1c}, 0x1, 0x0, 0x0, 0x20048854}, 0x4004) bpf$PROG_LOAD(0x5, &(0x7f0000000e40)={0x5, 0x16, &(0x7f0000001340)=ANY=[@ANYBLOB="390000000100000000000000900000f117fa0000", @ANYRES32=r3, @ANYBLOB="1f00000000000000b703000000000000850000000c000000b61b0453c29f42b5be06c7010b4efffe000000000085000000a900000018150000", @ANYRES32=r2, @ANYBLOB="0000000000000000180100002020782500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b70300000000850000005d000000185500000100000000000000000000009500000000000000"], &(0x7f0000000b80)='syzkaller\x00', 0x1, 0xe8, &(0x7f0000000bc0)=""/232, 0x41000, 0x5b, '\x00', 0x0, 0xe, r4, 0x8, &(0x7f0000000d00)={0x5, 0x2}, 0x8, 0x10, &(0x7f0000000d40)={0x4, 0xe, 0x2, 0x8}, 0x10, r5, r3, 0x5, &(0x7f0000000d80), &(0x7f0000000dc0)=[{0x4, 0x3, 0x0, 0x2}, {0x3, 0x1, 0xa, 0xa}, {0x0, 0x3, 0x2, 0xa}, {0x0, 0x3, 0x7, 0x1}, {0x1, 0x5, 0xb, 0xc}], 0x10, 0x7}, 0x90) [ 111.111548][ T2775] loop1: p2 p3 p7 20:40:59 executing program 3: r0 = openat$nci(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000380)='freezer.state\x00', 0x26e1, 0x0) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000580)={0x17, 0xc, &(0x7f0000000640)=ANY=[@ANYBLOB="184000000100000000000000000000001801000020756c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000000600000018200000", @ANYRES32=r1, @ANYBLOB="0000000800000000c6e79ec1dffe097e083e307889923f342229830ede07ab002d5fde15e2f47b249903742ecc4bfae5151d05bf2fe06849a7d5878fce9c0361225d95b6e28adf35d6526a7706159c38626284bcb656beb53a921e06e0175b96ab764a09ae2ce68c7b067397a6731427d829418219bb7cb23d573ce78f8ba5c41cbb5ae86f5d6c0daa4fa11486cbff0c63521350a174de5e155c506ca7058d63ab33cc62fa512870005a8194db167cc84ed38071dc8b16f89d7080978f06c99b59597c1caf6893105189ff2ae28db53c0a0f6e7ff5fb6dd305437eeb25783df7449268f701f7b5c360af8ad493c0bc1111b3f8281bf2d49ef193003adc82ff4ce056f8db52ebdefb453cb7f8b5e8622dd06616cff62d60e5f14f2fcab2be"], &(0x7f0000000000)='GPL\x00', 0x0, 0x4b, &(0x7f0000000280)=""/75, 0x41000, 0xd, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000340)={0x0, 0x2, 0xa534261, 0x3}, 0x10, 0xffffffffffffffff, 0xffffffffffffffff, 0x3, &(0x7f0000000400)=[0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0xffffffffffffffff, r2, 0xffffffffffffffff, 0xffffffffffffffff], &(0x7f0000000440)=[{0x3, 0x2, 0x9, 0xc}, {0x0, 0x2, 0x0, 0x1}, {0x3, 0x0, 0xf}], 0x10, 0x1f}, 0x90) r4 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r4, 0x1, 0x11, &(0x7f0000000240), &(0x7f0000000280)=0x5) preadv(r0, &(0x7f0000000c80)=[{&(0x7f00000003c0)=""/45, 0xfffffffffffffca1}], 0x1, 0x4, 0xbe9) ioctl$IOCTL_GET_NCIDEV_IDX(r1, 0x0, &(0x7f0000000180)) ioctl$IOCTL_GET_NCIDEV_IDX(r0, 0x0, &(0x7f0000000040)) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) write$binfmt_misc(r0, &(0x7f0000000b00)={'syz1', "511c3b073c7e31964849a8cd687059f9fa2838028e2ebfcfe3936e6943c0b094648c7e82759ed58c6ec6efa146f2062a522e31319c7883c9a4a7fd72d2cca7c5691b1948922f0d4ef972a22b148775033c0683e95e2d29f1ae130110374e370a72e5984341770921a81a9fa8c6f9b928361837bd28ab9fd4fc9686741065670c73c75e7141a60580ec503c0808b14502614479ee4f9865386da8b39e91556eef247767190fafadcac30081178c6805636450c5289f97ca57cfbb623cb2bad32e9e7b634c1ce6c0aaa9c6e1831e89edd496689ec4ac669c44451871e5dc6d2b5c008a8a6ed947f8499c2d"}, 0xee) ioctl$FAT_IOCTL_SET_ATTRIBUTES(r3, 0x40047211, &(0x7f0000000800)=0x1) openat$cgroup_int(r2, &(0x7f0000000300)='hugetlb.2MB.max_usage_in_bytes\x00', 0x2, 0x0) close_range(r0, r0, 0x0) [ 111.154362][ T5594] loop0: detected capacity change from 0 to 512 [ 111.188317][ T5594] EXT4-fs (loop0): 1 orphan inode deleted [ 111.196236][ T5596] loop1: detected capacity change from 0 to 2048 20:40:59 executing program 3: r0 = openat$nci(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000380)='freezer.state\x00', 0x26e1, 0x0) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000580)={0x17, 0xc, &(0x7f0000000640)=ANY=[@ANYBLOB="184000000100000000000000000000001801000020756c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000000600000018200000", @ANYRES32=r1, @ANYBLOB="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"], &(0x7f0000000000)='GPL\x00', 0x0, 0x4b, &(0x7f0000000280)=""/75, 0x41000, 0xd, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000340)={0x0, 0x2, 0xa534261, 0x3}, 0x10, 0xffffffffffffffff, 0xffffffffffffffff, 0x3, &(0x7f0000000400)=[0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0xffffffffffffffff, r2, 0xffffffffffffffff, 0xffffffffffffffff], &(0x7f0000000440)=[{0x3, 0x2, 0x9, 0xc}, {0x0, 0x2, 0x0, 0x1}, {0x3, 0x0, 0xf}], 0x10, 0x1f}, 0x90) r4 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r4, 0x1, 0x11, &(0x7f0000000240), &(0x7f0000000280)=0x5) preadv(r0, &(0x7f0000000c80)=[{&(0x7f00000003c0)=""/45, 0xfffffffffffffca1}], 0x1, 0x4, 0xbe9) ioctl$IOCTL_GET_NCIDEV_IDX(r1, 0x0, &(0x7f0000000180)) ioctl$IOCTL_GET_NCIDEV_IDX(r0, 0x0, &(0x7f0000000040)) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) write$binfmt_misc(r0, &(0x7f0000000b00)={'syz1', "511c3b073c7e31964849a8cd687059f9fa2838028e2ebfcfe3936e6943c0b094648c7e82759ed58c6ec6efa146f2062a522e31319c7883c9a4a7fd72d2cca7c5691b1948922f0d4ef972a22b148775033c0683e95e2d29f1ae130110374e370a72e5984341770921a81a9fa8c6f9b928361837bd28ab9fd4fc9686741065670c73c75e7141a60580ec503c0808b14502614479ee4f9865386da8b39e91556eef247767190fafadcac30081178c6805636450c5289f97ca57cfbb623cb2bad32e9e7b634c1ce6c0aaa9c6e1831e89edd496689ec4ac669c44451871e5dc6d2b5c008a8a6ed947f8499c2d"}, 0xee) ioctl$FAT_IOCTL_SET_ATTRIBUTES(r3, 0x40047211, &(0x7f0000000800)=0x1) close_range(r0, r0, 0x0) [ 111.221632][ T5594] ext4 filesystem being mounted at /root/syzkaller-testdir338643557/syzkaller.M396af/74/file1 supports timestamps until 2038-01-19 (0x7fffffff) 20:40:59 executing program 0: r0 = gettid() bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(0x0, r0, 0x7, 0xffffffffffffffff, 0x9) fstat(0xffffffffffffffff, &(0x7f0000000b00)) r1 = getegid() syz_mount_image$ext4(&(0x7f0000000100)='ext4\x00', &(0x7f0000000200)='./file1\x00', 0x3000000, &(0x7f0000003040)=ANY=[@ANYRES64=r1, @ANYBLOB="8555591a163448f4c52bee6cc0e12a6a8610718f818822e94c360e46f93ac9c63a1b40ea9d758c2b4e2d7c386a141016d11cb13fabc846fc7fb242c175fbdf96e2a96e80e82b73987b1d5dfd843c7e6748a15a0c4160f5e4c468e8f8e417bd3385546159881194fe3a7cf8307cd9c7ce0ca180a481d4dcaa6611ec5c8ff1c546360dea3da9f2bfc1fd71af9ebf2afe4285f013a3929a7096097976a16e2060e5f26e379011ea1811", @ANYRES64, @ANYBLOB="ca42ad87c41bb3b2507e4e12104f0cd507000001046f9445657db4996b10208d04454e11fb5b1383c5ce98e3062f45ec04e5b8b179df3d64a6cec05d29235e3cbe0b339abe9faee5cf3e44c97ce56a1dc359047114eeb3c23f331114039d75a664afc47e8273b79e83d301fc4ceec8b89911505b6743797c459195a7120ded1748f315deb90000ffed00000000000000", @ANYRES8=r1, @ANYRES8=r1, @ANYRES64, @ANYBLOB="bd85893dee1670c8c7e3b4a65ec61f224992fd11263b7749c7ee63dd4fc13cc5dfdde8a3099aaf21ece351c316d9bbd7e4ecc524c856f20d6a1818d6d75f702eb904653f9d55af", @ANYRESOCT], 0x1, 0x513, &(0x7f0000000c40)="$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") 20:40:59 executing program 2: r0 = perf_event_open(&(0x7f0000000a40)={0x2, 0x80, 0xcd, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @perf_bp={&(0x7f0000000200), 0x8}, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfb75}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000040)={0x0, 0x4, 0x0, &(0x7f0000000180)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x80) perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x208, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x4, 0x8001}, 0x4000, 0x0, 0x0, 0x0, 0x0, 0x14e, 0xd1}, 0x0, 0xbfffffffffffffff, r0, 0x19893a9f0a0e2244) r1 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) syz_clone(0x2000000, 0x0, 0x0, 0x0, 0x0, 0x0) r2 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x18, 0x5, &(0x7f00000002c0)=ANY=[@ANYBLOB="180000001800ff0f0000000000000000850000006d000000750000000800000095"], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x80) r3 = perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400, 0x80000, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x7, 0x1007}, 0x8006, 0x0, 0x0, 0x1, 0x4, 0x800000, 0x3}, 0x0, 0xffefffffffffffff, 0xffffffffffffffff, 0x9) ioctl$PERF_EVENT_IOC_SET_FILTER(r3, 0x40082406, &(0x7f00000003c0)='memory.numa_stat\x00') perf_event_open(0x0, 0x0, 0x0, r3, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000080)='sched_switch\x00', r2}, 0x10) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000380)={{0x1, 0xffffffffffffffff}, &(0x7f0000000000), &(0x7f0000000240)=r2}, 0x20) r5 = memfd_secret(0x0) syz_io_uring_setup(0x0, &(0x7f0000000300)={0x0, 0x2, 0x0, 0x0, 0x0, 0x0, r5}, 0x0, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f00000009c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000000a00)=0x14) r7 = openat2(0xffffffffffffff9c, &(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)={0x40841}, 0x18) write$binfmt_script(r7, &(0x7f0000000340)=ANY=[], 0xfffffdef) r8 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000b40)={0x1b, 0x0, 0x0, 0x7, 0x0, 0xffffffffffffffff, 0x200, '\x00', 0x0, 0xffffffffffffffff, 0x3, 0x1, 0x4}, 0x48) r9 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000bc0)={0x2, 0x4, 0x8, 0x1, 0x80, 0x1, 0x9, '\x00', 0x0, 0xffffffffffffffff, 0x4, 0x1, 0x4}, 0x48) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000d00)={0x11, 0x12, &(0x7f0000000440)=@raw=[@exit, @ringbuf_query={{0x18, 0x1, 0x1, 0x0, r4}}, @ringbuf_output={{0x18, 0x1, 0x1, 0x0, r5}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x10001}, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x4, 0x0, 0x0, 0x2}}, @exit, @initr0={0x18, 0x0, 0x0, 0x0, 0x6349, 0x0, 0x0, 0x0, 0xf685}, @ldst={0x3, 0x2, 0x1, 0x0, 0xb, 0x2543a83bb932833c, 0x1}], &(0x7f0000000940)='syzkaller\x00', 0x80000001, 0x27, &(0x7f0000000980)=""/39, 0x41000, 0x40, '\x00', r6, 0x0, r7, 0x8, &(0x7f0000000ac0)={0x3, 0x1}, 0x8, 0x10, &(0x7f0000000b00)={0x2, 0xc, 0xfffffe00, 0x2}, 0x10, 0x0, 0x0, 0x5, &(0x7f0000000c40)=[r2, 0x1, 0x1, r8, r9, r1], &(0x7f0000000c80)=[{0x4, 0x1, 0x8, 0xc}, {0x0, 0x4, 0xf, 0x4}, {0x1, 0x2, 0xd, 0x6}, {0x0, 0x4, 0x10, 0xc}, {0x2, 0x4, 0xd, 0x1}], 0x10, 0x20}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000280)={&(0x7f0000000140)='ext4_ext_show_extent\x00', r2}, 0x10) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) r10 = gettid() perf_event_open$cgroup(&(0x7f0000000300)={0x5, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_bp={&(0x7f0000000100)}, 0x81252, 0x6, 0x80000001, 0x0, 0x0, 0x0, 0x6, 0x0, 0x6, 0x0, 0x6}, 0xffffffffffffffff, 0xe, 0xffffffffffffffff, 0xc) perf_event_open(0x0, r10, 0x2, 0xffffffffffffffff, 0xb) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) perf_event_open(&(0x7f0000000840)={0x2, 0x80, 0x0, 0x7, 0x0, 0x80, 0x0, 0x3, 0x0, 0x9, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, @perf_config_ext={0x8000000000, 0x3}, 0x46c73247dfbe0d, 0x1007e, 0x0, 0x2, 0x0, 0x0, 0x6, 0x0, 0xffffffff, 0x0, 0x1c}, 0x0, 0x9, 0xffffffffffffffff, 0xd) bpf$PROG_LOAD(0x5, &(0x7f0000000780)={0x14, 0x4, &(0x7f00000008c0)=ANY=[@ANYBLOB="850000006b00000018150000a3df7ddd9621fb0201050062d91123e632b2f902ad1e9f1cc7a66ed51ac8a4070000000000000019a83f0b7c9502871fb1ca3dc499e804bbbc359859ed6fd9f104fc7ed900d122072d8275a24d000000000601c3a63953a7b36fe458", @ANYRES32, @ANYBLOB="00000000000000002d59e4eda4000000"], &(0x7f0000000400)='syzkaller\x00', 0xfff, 0xe3, &(0x7f0000000580)=""/227, 0x0, 0x4, '\x00', 0x0, 0x24, 0xffffffffffffffff, 0x8, &(0x7f0000000500)={0x1, 0x3}, 0x8, 0x10, &(0x7f0000000680)={0x5, 0x6, 0x81, 0x9}, 0x10, 0xffffffffffffffff, 0xffffffffffffffff, 0x0, &(0x7f00000006c0)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}, 0x80) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x4030582a, &(0x7f0000000040)=0x91) 20:40:59 executing program 3: r0 = openat$nci(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000380)='freezer.state\x00', 0x26e1, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000580)={0x17, 0xc, &(0x7f0000000640)=ANY=[@ANYBLOB="184000000100000000000000000000001801000020756c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000000600000018200000", @ANYRES32=r1, @ANYBLOB="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"], &(0x7f0000000000)='GPL\x00', 0x0, 0x4b, &(0x7f0000000280)=""/75, 0x41000, 0xd, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000340)={0x0, 0x2, 0xa534261, 0x3}, 0x10, 0xffffffffffffffff, 0xffffffffffffffff, 0x3, &(0x7f0000000400)=[0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0xffffffffffffffff, r2, 0xffffffffffffffff, 0xffffffffffffffff], &(0x7f0000000440)=[{0x3, 0x2, 0x9, 0xc}, {0x0, 0x2, 0x0, 0x1}, {0x3, 0x0, 0xf}], 0x10, 0x1f}, 0x90) r3 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000000240), &(0x7f0000000280)=0x5) preadv(r0, &(0x7f0000000c80)=[{&(0x7f00000003c0)=""/45, 0xfffffffffffffca1}], 0x1, 0x4, 0xbe9) ioctl$IOCTL_GET_NCIDEV_IDX(r1, 0x0, &(0x7f0000000180)) ioctl$IOCTL_GET_NCIDEV_IDX(r0, 0x0, &(0x7f0000000040)) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) write$binfmt_misc(r0, &(0x7f0000000b00)={'syz1', "511c3b073c7e31964849a8cd687059f9fa2838028e2ebfcfe3936e6943c0b094648c7e82759ed58c6ec6efa146f2062a522e31319c7883c9a4a7fd72d2cca7c5691b1948922f0d4ef972a22b148775033c0683e95e2d29f1ae130110374e370a72e5984341770921a81a9fa8c6f9b928361837bd28ab9fd4fc9686741065670c73c75e7141a60580ec503c0808b14502614479ee4f9865386da8b39e91556eef247767190fafadcac30081178c6805636450c5289f97ca57cfbb623cb2bad32e9e7b634c1ce6c0aaa9c6e1831e89edd496689ec4ac669c44451871e5dc6d2b5c008a8a6ed947f8499c2d"}, 0xee) close_range(r0, r0, 0x0) [ 111.299688][ T5596] loop1: p2 p3 p7 20:40:59 executing program 1: ioctl$BTRFS_IOC_LOGICAL_INO(0xffffffffffffffff, 0xc0389424, &(0x7f0000000180)={0x1, 0x28, '\x00', 0x1, &(0x7f0000000080)=[0x0, 0x0, 0x0, 0x0, 0x0]}) r0 = socket$inet6(0xa, 0x3, 0x6) r1 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$FIDEDUPERANGE(r0, 0xc0189436, &(0x7f0000000f00)=ANY=[@ANYBLOB="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"]) ioctl$TIOCSBRK(0xffffffffffffffff, 0x5427) recvfrom$inet6(0xffffffffffffffff, &(0x7f0000000280)=""/134, 0x86, 0x40000102, &(0x7f0000000340)={0xa, 0x4e21, 0x77f, @mcast1, 0x403b3f}, 0x1c) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000001040)={{0xffffffffffffffff, 0xffffffffffffffff}, &(0x7f0000000140), &(0x7f0000000480)=r1}, 0x20) syz_read_part_table(0x593, &(0x7f00000005c0)="$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") r3 = creat(&(0x7f0000000240)='./file0\x00', 0x0) stat(&(0x7f0000000040)='./file1\x00', &(0x7f0000000380)) fsetxattr$security_capability(r3, &(0x7f0000000100), &(0x7f0000000000)=@v1={0x1000000, [{0x80000000, 0x81}]}, 0xc, 0x0) newfstatat(0xffffffffffffff9c, &(0x7f00000000c0)='./file1\x00', &(0x7f0000001400), 0x400) close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x2) ioctl$TIOCSTI(r3, 0x5412, &(0x7f00000004c0)=0x40) fsync(0xffffffffffffffff) write$binfmt_misc(r3, &(0x7f0000001080)=ANY=[@ANYBLOB="7379d3c6"], 0x4) fallocate(r3, 0x100000011, 0x0, 0x2811fdff) open(&(0x7f0000000100)='.\x00', 0x20c2, 0x2d) open$dir(&(0x7f0000000500)='./file1\x00', 0x1c6c0, 0x0) r4 = openat$vcsu(0xffffffffffffff9c, &(0x7f0000000cc0), 0x400c00, 0x0) lsetxattr$security_selinux(&(0x7f0000001180)='./file1\x00', &(0x7f00000011c0), &(0x7f0000001300)='system_u:object_r:unconfined_exec_t:s0\x00', 0x27, 0x3) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000400)={0xffffffffffffffff, 0xe0, &(0x7f0000000300)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, &(0x7f00000000c0)=[0x0], &(0x7f0000000140), 0x0, 0x8, &(0x7f0000000200)=[{}, {}, {}, {}, {}], 0x28, 0x0, 0x0, 0x0, 0x0, 0x10, 0x8, 0x8, &(0x7f00000002c0)}}, 0x10) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000e80)=@bpf_lsm={0x1d, 0x4, &(0x7f0000000040)=@framed={{0x18, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x73fc}, [@generic={0x9, 0x8, 0x0, 0x7f, 0x200}]}, &(0x7f0000000880)='GPL\x00', 0x1f, 0x93, &(0x7f0000000cc0)=""/147, 0x40f00, 0x2, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, &(0x7f0000000b80)={0x9}, 0x8, 0x10, 0x0, 0x0, r5}, 0x80) r6 = socket$nl_generic(0x10, 0x3, 0x10) r7 = syz_genetlink_get_family_id$tipc(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$TIPC_CMD_ENABLE_BEARER(r6, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000001200)=ANY=[@ANYBLOB="3400000006c08fada241ee0a049e6fba3f36f40da839bbdf54c31768b0026f4261f56d51c5d81ba4cb99f8203c40d0a142fcd75ce26e408d229139f8c4e81109c56a18e453e8a537df21c4ec04a4f3e22f4ac125a28ad43e41107b1f7e79c8573985e54fd665e2913ca74da8c9f3fc2839258c19fa7ac20ebead31206cf280ea73f635bc5418b66554392dfd11874fef72bc53538aae3cb5ef8a80140f4737dd2c572a03ee1d5e3d627e", @ANYRESOCT=0x0, @ANYBLOB="010000000000000000000100000000000000014100000018001700000000000000007564503a73"], 0x34}, 0x1, 0x0, 0x0, 0x1}, 0x0) ioctl$AUTOFS_DEV_IOCTL_PROTOSUBVER(r1, 0xc0189373, &(0x7f0000000540)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x6}}, './file0\x00'}) sendmsg$TIPC_CMD_GET_MAX_PORTS(r4, &(0x7f0000001140)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x40000}, 0xc, &(0x7f0000001100)={&(0x7f00000010c0)={0x1c, r7, 0x400, 0x8000, 0x25dfdbfe, {}, ["", "", "", "", "", "", ""]}, 0x1c}, 0x1, 0x0, 0x0, 0x20048854}, 0x4004) bpf$PROG_LOAD(0x5, &(0x7f0000000e40)={0x5, 0x16, &(0x7f0000001340)=ANY=[@ANYBLOB="390000000100000000000000900000f117fa0000", @ANYRES32=r3, @ANYBLOB="1f00000000000000b703000000000000850000000c000000b61b0453c29f42b5be06c7010b4efffe000000000085000000a900000018150000", @ANYRES32=r2, @ANYBLOB="0000000000000000180100002020782500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b70300000000850000005d000000185500000100000000000000000000009500000000000000"], &(0x7f0000000b80)='syzkaller\x00', 0x1, 0xe8, &(0x7f0000000bc0)=""/232, 0x41000, 0x5b, '\x00', 0x0, 0xe, r4, 0x8, &(0x7f0000000d00)={0x5, 0x2}, 0x8, 0x10, &(0x7f0000000d40)={0x4, 0xe, 0x2, 0x8}, 0x10, r5, r3, 0x5, &(0x7f0000000d80), &(0x7f0000000dc0)=[{0x4, 0x3, 0x0, 0x2}, {0x3, 0x1, 0xa, 0xa}, {0x0, 0x3, 0x2, 0xa}, {0x0, 0x3, 0x7, 0x1}, {0x1, 0x5, 0xb, 0xc}], 0x10, 0x7}, 0x90) [ 111.367200][ T5615] loop0: detected capacity change from 0 to 512 [ 111.398099][ T5615] EXT4-fs (loop0): 1 orphan inode deleted 20:40:59 executing program 3: r0 = openat$nci(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000380)='freezer.state\x00', 0x26e1, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000580)={0x17, 0xc, &(0x7f0000000640)=ANY=[@ANYBLOB="184000000100000000000000000000001801000020756c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000000600000018200000", @ANYRES32=r1, @ANYBLOB="0000000800000000c6e79ec1dffe097e083e307889923f342229830ede07ab002d5fde15e2f47b249903742ecc4bfae5151d05bf2fe06849a7d5878fce9c0361225d95b6e28adf35d6526a7706159c38626284bcb656beb53a921e06e0175b96ab764a09ae2ce68c7b067397a6731427d829418219bb7cb23d573ce78f8ba5c41cbb5ae86f5d6c0daa4fa11486cbff0c63521350a174de5e155c506ca7058d63ab33cc62fa512870005a8194db167cc84ed38071dc8b16f89d7080978f06c99b59597c1caf6893105189ff2ae28db53c0a0f6e7ff5fb6dd305437eeb25783df7449268f701f7b5c360af8ad493c0bc1111b3f8281bf2d49ef193003adc82ff4ce056f8db52ebdefb453cb7f8b5e8622dd06616cff62d60e5f14f2fcab2be"], &(0x7f0000000000)='GPL\x00', 0x0, 0x4b, &(0x7f0000000280)=""/75, 0x41000, 0xd, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000340)={0x0, 0x2, 0xa534261, 0x3}, 0x10, 0xffffffffffffffff, 0xffffffffffffffff, 0x3, &(0x7f0000000400)=[0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0xffffffffffffffff, r2, 0xffffffffffffffff, 0xffffffffffffffff], &(0x7f0000000440)=[{0x3, 0x2, 0x9, 0xc}, {0x0, 0x2, 0x0, 0x1}, {0x3, 0x0, 0xf}], 0x10, 0x1f}, 0x90) r3 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000000240), &(0x7f0000000280)=0x5) preadv(r0, &(0x7f0000000c80)=[{&(0x7f00000003c0)=""/45, 0xfffffffffffffca1}], 0x1, 0x4, 0xbe9) ioctl$IOCTL_GET_NCIDEV_IDX(r1, 0x0, &(0x7f0000000180)) ioctl$IOCTL_GET_NCIDEV_IDX(r0, 0x0, &(0x7f0000000040)) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) close_range(r0, r0, 0x0) 20:40:59 executing program 4: r0 = perf_event_open(&(0x7f0000000a40)={0x2, 0x80, 0xcd, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @perf_bp={&(0x7f0000000200), 0x8}, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfb75}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000040)={0x0, 0x4, 0x0, &(0x7f0000000180)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x80) perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x208, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x4, 0x8001}, 0x4000, 0x0, 0x0, 0x0, 0x0, 0x14e, 0xd1}, 0x0, 0xbfffffffffffffff, r0, 0x19893a9f0a0e2244) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) syz_clone(0x2000000, 0x0, 0x0, 0x0, 0x0, 0x0) r1 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x18, 0x5, &(0x7f00000002c0)=ANY=[@ANYBLOB="180000001800ff0f0000000000000000850000006d000000750000000800000095"], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x80) r2 = perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400, 0x80000, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x7, 0x1007}, 0x8006, 0x0, 0x0, 0x1, 0x4, 0x800000, 0x3}, 0x0, 0xffefffffffffffff, 0xffffffffffffffff, 0x9) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x40082406, &(0x7f00000003c0)='memory.numa_stat\x00') perf_event_open(0x0, 0x0, 0x0, r2, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000080)='sched_switch\x00', r1}, 0x10) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000380)={{0x1}, &(0x7f0000000000), &(0x7f0000000240)=r1}, 0x20) r3 = memfd_secret(0x0) syz_io_uring_setup(0x0, &(0x7f0000000300)={0x0, 0x2, 0x0, 0x0, 0x0, 0x0, r3}, 0x0, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f00000009c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000000a00)=0x14) r4 = openat2(0xffffffffffffff9c, &(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)={0x40841}, 0x18) write$binfmt_script(r4, &(0x7f0000000340)=ANY=[], 0xfffffdef) [ 111.417477][ T5617] loop1: detected capacity change from 0 to 2048 [ 111.419939][ T5615] ext4 filesystem being mounted at /root/syzkaller-testdir338643557/syzkaller.M396af/75/file1 supports timestamps until 2038-01-19 (0x7fffffff) 20:40:59 executing program 3: r0 = openat$nci(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000380)='freezer.state\x00', 0x26e1, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000580)={0x17, 0xc, &(0x7f0000000640)=ANY=[@ANYBLOB="184000000100000000000000000000001801000020756c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000000600000018200000", @ANYRES32=r1, @ANYBLOB="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"], &(0x7f0000000000)='GPL\x00', 0x0, 0x4b, &(0x7f0000000280)=""/75, 0x41000, 0xd, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000340)={0x0, 0x2, 0xa534261, 0x3}, 0x10, 0xffffffffffffffff, 0xffffffffffffffff, 0x3, &(0x7f0000000400)=[0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0xffffffffffffffff, r2, 0xffffffffffffffff, 0xffffffffffffffff], &(0x7f0000000440)=[{0x3, 0x2, 0x9, 0xc}, {0x0, 0x2, 0x0, 0x1}, {0x3, 0x0, 0xf}], 0x10, 0x1f}, 0x90) r3 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000000240), &(0x7f0000000280)=0x5) preadv(r0, &(0x7f0000000c80)=[{&(0x7f00000003c0)=""/45, 0xfffffffffffffca1}], 0x1, 0x4, 0xbe9) ioctl$IOCTL_GET_NCIDEV_IDX(r1, 0x0, &(0x7f0000000180)) ioctl$IOCTL_GET_NCIDEV_IDX(r0, 0x0, &(0x7f0000000040)) close_range(r0, r0, 0x0) 20:40:59 executing program 0: r0 = gettid() bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(0x0, r0, 0x7, 0xffffffffffffffff, 0x9) fstat(0xffffffffffffffff, &(0x7f0000000b00)) r1 = getegid() syz_mount_image$ext4(&(0x7f0000000100)='ext4\x00', &(0x7f0000000200)='./file1\x00', 0x3000000, &(0x7f0000003040)=ANY=[@ANYRES64=r1, @ANYBLOB="8555591a163448f4c52bee6cc0e12a6a8610718f818822e94c360e46f93ac9c63a1b40ea9d758c2b4e2d7c386a141016d11cb13fabc846fc7fb242c175fbdf96e2a96e80e82b73987b1d5dfd843c7e6748a15a0c4160f5e4c468e8f8e417bd3385546159881194fe3a7cf8307cd9c7ce0ca180a481d4dcaa6611ec5c8ff1c546360dea3da9f2bfc1fd71af9ebf2afe4285f013a3929a7096097976a16e2060e5f26e379011ea1811", @ANYRES64, @ANYBLOB="ca42ad87c41bb3b2507e4e12104f0cd507000001046f9445657db4996b10208d04454e11fb5b1383c5ce98e3062f45ec04e5b8b179df3d64a6cec05d29235e3cbe0b339abe9faee5cf3e44c97ce56a1dc359047114eeb3c23f331114039d75a664afc47e8273b79e83d301fc4ceec8b89911505b6743797c459195a7120ded1748f315deb90000ffed00000000000000", @ANYRES8=r1, @ANYRES8=r1, @ANYRES64, @ANYBLOB="bd85893dee1670c8c7e3b4a65ec61f224992fd11263b7749c7ee63dd4fc13cc5dfdde8a3099aaf21ece351c316d9bbd7e4ecc524c856f20d6a1818d6d75f702eb904653f9d55af", @ANYRESOCT], 0x1, 0x513, &(0x7f0000000c40)="$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") [ 111.517088][ T5617] loop1: p2 p3 p7 20:40:59 executing program 3: r0 = openat$nci(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000380)='freezer.state\x00', 0x26e1, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000580)={0x17, 0xc, &(0x7f0000000640)=ANY=[@ANYBLOB="184000000100000000000000000000001801000020756c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000000600000018200000", @ANYRES32=r1, @ANYBLOB="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"], &(0x7f0000000000)='GPL\x00', 0x0, 0x4b, &(0x7f0000000280)=""/75, 0x41000, 0xd, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000340)={0x0, 0x2, 0xa534261, 0x3}, 0x10, 0xffffffffffffffff, 0xffffffffffffffff, 0x3, &(0x7f0000000400)=[0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0xffffffffffffffff, r2, 0xffffffffffffffff, 0xffffffffffffffff], &(0x7f0000000440)=[{0x3, 0x2, 0x9, 0xc}, {0x0, 0x2, 0x0, 0x1}, {0x3, 0x0, 0xf}], 0x10, 0x1f}, 0x90) r3 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000000240), &(0x7f0000000280)=0x5) preadv(r0, &(0x7f0000000c80)=[{&(0x7f00000003c0)=""/45, 0xfffffffffffffca1}], 0x1, 0x4, 0xbe9) ioctl$IOCTL_GET_NCIDEV_IDX(r1, 0x0, &(0x7f0000000180)) close_range(r0, r0, 0x0) 20:41:00 executing program 1: ioctl$BTRFS_IOC_LOGICAL_INO(0xffffffffffffffff, 0xc0389424, &(0x7f0000000180)={0x1, 0x28, '\x00', 0x1, &(0x7f0000000080)=[0x0, 0x0, 0x0, 0x0, 0x0]}) r0 = socket$inet6(0xa, 0x3, 0x6) r1 = dup2(0xffffffffffffffff, r0) ioctl$FIDEDUPERANGE(r0, 0xc0189436, &(0x7f0000000f00)=ANY=[@ANYBLOB="08000000000000000000000000000000000000002000000032057e68d5d647f4ed243c9d097db4c7bae602f8d4c84b5325f3d737af1c3ebe2901b056ac84d04eb9d8bfd4771499d444ff07000033206062c9a0527d2d0e4b0000fa0693ec3785977184911bffc60554e8950e91e1a8209818b4eb3440ae351192e1d7cf54ba6743f2db330481aac17f0961506d7ebd7ca999cf4e148c1ef2880f63693dfee2a6f2fafec2c059fd15db654600000000000000000076da8ec51705470a42729df6a32122af2a673d7409ca1b8a0da065e2bf7790c86a6b3014e1ef5d1c4000d3dff081d5a4c403971fe8869ab4973ffc7b24b6fbb4341ac1a0f5d56b64b9d23d6855e653f1e0418a6d9838196a7b145310a9b4c467199ecc3bd47b85aae47754bf695bdb85ea03f70beab5732a014c5f525bf2f9b9c6bd545e1a"]) ioctl$TIOCSBRK(r1, 0x5427) recvfrom$inet6(0xffffffffffffffff, &(0x7f0000000280)=""/134, 0x86, 0x40000102, &(0x7f0000000340)={0xa, 0x4e21, 0x77f, @mcast1, 0x403b3f}, 0x1c) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000001040)={{r1, 0xffffffffffffffff}, &(0x7f0000000140), &(0x7f0000000480)}, 0x20) syz_read_part_table(0x593, &(0x7f00000005c0)="$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") r3 = creat(&(0x7f0000000240)='./file0\x00', 0x0) stat(&(0x7f0000000040)='./file1\x00', &(0x7f0000000380)) fsetxattr$security_capability(r3, &(0x7f0000000100), &(0x7f0000000000)=@v1={0x1000000, [{0x80000000, 0x81}]}, 0xc, 0x0) newfstatat(0xffffffffffffff9c, &(0x7f00000000c0)='./file1\x00', &(0x7f0000001400), 0x400) close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x2) ioctl$TIOCSTI(r3, 0x5412, &(0x7f00000004c0)=0x40) fsync(0xffffffffffffffff) write$binfmt_misc(r3, &(0x7f0000001080)=ANY=[@ANYBLOB="7379d3c6"], 0x4) fallocate(r3, 0x100000011, 0x0, 0x2811fdff) open(&(0x7f0000000100)='.\x00', 0x20c2, 0x2d) open$dir(&(0x7f0000000500)='./file1\x00', 0x1c6c0, 0x0) r4 = openat$vcsu(0xffffffffffffff9c, &(0x7f0000000cc0), 0x400c00, 0x0) lsetxattr$security_selinux(&(0x7f0000001180)='./file1\x00', &(0x7f00000011c0), &(0x7f0000001300)='system_u:object_r:unconfined_exec_t:s0\x00', 0x27, 0x3) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000400)={0xffffffffffffffff, 0xe0, &(0x7f0000000300)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, &(0x7f00000000c0)=[0x0], &(0x7f0000000140), 0x0, 0x8, &(0x7f0000000200)=[{}, {}, {}, {}, {}], 0x28, 0x0, 0x0, 0x0, 0x0, 0x10, 0x8, 0x8, &(0x7f00000002c0)}}, 0x10) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000e80)=@bpf_lsm={0x1d, 0x4, &(0x7f0000000040)=@framed={{0x18, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x73fc}, [@generic={0x9, 0x8, 0x0, 0x7f, 0x200}]}, &(0x7f0000000880)='GPL\x00', 0x1f, 0x93, &(0x7f0000000cc0)=""/147, 0x40f00, 0x2, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, &(0x7f0000000b80)={0x9}, 0x8, 0x10, 0x0, 0x0, r5}, 0x80) r6 = socket$nl_generic(0x10, 0x3, 0x10) r7 = syz_genetlink_get_family_id$tipc(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$TIPC_CMD_ENABLE_BEARER(r6, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000001200)=ANY=[@ANYBLOB="3400000006c08fada241ee0a049e6fba3f36f40da839bbdf54c31768b0026f4261f56d51c5d81ba4cb99f8203c40d0a142fcd75ce26e408d229139f8c4e81109c56a18e453e8a537df21c4ec04a4f3e22f4ac125a28ad43e41107b1f7e79c8573985e54fd665e2913ca74da8c9f3fc2839258c19fa7ac20ebead31206cf280ea73f635bc5418b66554392dfd11874fef72bc53538aae3cb5ef8a80140f4737dd2c572a03ee1d5e3d627e", @ANYRESOCT=0x0, @ANYBLOB="010000000000000000000100000000000000014100000018001700000000000000007564503a73"], 0x34}, 0x1, 0x0, 0x0, 0x1}, 0x0) ioctl$AUTOFS_DEV_IOCTL_PROTOSUBVER(0xffffffffffffffff, 0xc0189373, &(0x7f0000000540)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x6}}, './file0\x00'}) sendmsg$TIPC_CMD_GET_MAX_PORTS(r4, &(0x7f0000001140)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x40000}, 0xc, &(0x7f0000001100)={&(0x7f00000010c0)={0x1c, r7, 0x400, 0x8000, 0x25dfdbfe, {}, ["", "", "", "", "", "", ""]}, 0x1c}, 0x1, 0x0, 0x0, 0x20048854}, 0x4004) bpf$PROG_LOAD(0x5, &(0x7f0000000e40)={0x5, 0x16, &(0x7f0000001340)=ANY=[@ANYBLOB="390000000100000000000000900000f117fa0000", @ANYRES32=r3, @ANYBLOB="1f00000000000000b703000000000000850000000c000000b61b0453c29f42b5be06c7010b4efffe000000000085000000a900000018150000", @ANYRES32=r2, @ANYBLOB="0000000000000000180100002020782500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b70300000000850000005d000000185500000100000000000000000000009500000000000000"], &(0x7f0000000b80)='syzkaller\x00', 0x1, 0xe8, &(0x7f0000000bc0)=""/232, 0x41000, 0x5b, '\x00', 0x0, 0xe, r4, 0x8, &(0x7f0000000d00)={0x5, 0x2}, 0x8, 0x10, &(0x7f0000000d40)={0x4, 0xe, 0x2, 0x8}, 0x10, r5, r3, 0x5, &(0x7f0000000d80), &(0x7f0000000dc0)=[{0x4, 0x3, 0x0, 0x2}, {0x3, 0x1, 0xa, 0xa}, {0x0, 0x3, 0x2, 0xa}, {0x0, 0x3, 0x7, 0x1}, {0x1, 0x5, 0xb, 0xc}], 0x10, 0x7}, 0x90) 20:41:00 executing program 3: r0 = openat$nci(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000380)='freezer.state\x00', 0x26e1, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000580)={0x17, 0xc, &(0x7f0000000640)=ANY=[@ANYBLOB="184000000100000000000000000000001801000020756c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000000600000018200000", @ANYRES32=r1, @ANYBLOB="0000000800000000c6e79ec1dffe097e083e307889923f342229830ede07ab002d5fde15e2f47b249903742ecc4bfae5151d05bf2fe06849a7d5878fce9c0361225d95b6e28adf35d6526a7706159c38626284bcb656beb53a921e06e0175b96ab764a09ae2ce68c7b067397a6731427d829418219bb7cb23d573ce78f8ba5c41cbb5ae86f5d6c0daa4fa11486cbff0c63521350a174de5e155c506ca7058d63ab33cc62fa512870005a8194db167cc84ed38071dc8b16f89d7080978f06c99b59597c1caf6893105189ff2ae28db53c0a0f6e7ff5fb6dd305437eeb25783df7449268f701f7b5c360af8ad493c0bc1111b3f8281bf2d49ef193003adc82ff4ce056f8db52ebdefb453cb7f8b5e8622dd06616cff62d60e5f14f2fcab2be"], &(0x7f0000000000)='GPL\x00', 0x0, 0x4b, &(0x7f0000000280)=""/75, 0x41000, 0xd, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000340)={0x0, 0x2, 0xa534261, 0x3}, 0x10, 0xffffffffffffffff, 0xffffffffffffffff, 0x3, &(0x7f0000000400)=[0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0xffffffffffffffff, r2, 0xffffffffffffffff, 0xffffffffffffffff], &(0x7f0000000440)=[{0x3, 0x2, 0x9, 0xc}, {0x0, 0x2, 0x0, 0x1}, {0x3, 0x0, 0xf}], 0x10, 0x1f}, 0x90) r3 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000000240), &(0x7f0000000280)=0x5) preadv(r0, &(0x7f0000000c80)=[{&(0x7f00000003c0)=""/45, 0xfffffffffffffca1}], 0x1, 0x4, 0xbe9) close_range(r0, r0, 0x0) [ 111.603257][ T2775] loop1: p2 p3 p7 [ 111.613158][ T5643] loop0: detected capacity change from 0 to 512 20:41:00 executing program 3: r0 = openat$nci(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000380)='freezer.state\x00', 0x26e1, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000580)={0x17, 0xc, &(0x7f0000000640)=ANY=[@ANYBLOB="184000000100000000000000000000001801000020756c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000000600000018200000", @ANYRES32=r1, @ANYBLOB="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"], &(0x7f0000000000)='GPL\x00', 0x0, 0x4b, &(0x7f0000000280)=""/75, 0x41000, 0xd, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000340)={0x0, 0x2, 0xa534261, 0x3}, 0x10, 0xffffffffffffffff, 0xffffffffffffffff, 0x3, &(0x7f0000000400)=[0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0xffffffffffffffff, r2, 0xffffffffffffffff, 0xffffffffffffffff], &(0x7f0000000440)=[{0x3, 0x2, 0x9, 0xc}, {0x0, 0x2, 0x0, 0x1}, {0x3, 0x0, 0xf}], 0x10, 0x1f}, 0x90) r3 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000000240), &(0x7f0000000280)=0x5) close_range(r0, r0, 0x0) 20:41:00 executing program 0: gettid() bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0x7, 0xffffffffffffffff, 0x9) fstat(0xffffffffffffffff, &(0x7f0000000b00)) r0 = getegid() syz_mount_image$ext4(&(0x7f0000000100)='ext4\x00', &(0x7f0000000200)='./file1\x00', 0x3000000, &(0x7f0000003040)=ANY=[@ANYRES64=r0, @ANYBLOB="8555591a163448f4c52bee6cc0e12a6a8610718f818822e94c360e46f93ac9c63a1b40ea9d758c2b4e2d7c386a141016d11cb13fabc846fc7fb242c175fbdf96e2a96e80e82b73987b1d5dfd843c7e6748a15a0c4160f5e4c468e8f8e417bd3385546159881194fe3a7cf8307cd9c7ce0ca180a481d4dcaa6611ec5c8ff1c546360dea3da9f2bfc1fd71af9ebf2afe4285f013a3929a7096097976a16e2060e5f26e379011ea1811", @ANYRES64, @ANYBLOB="ca42ad87c41bb3b2507e4e12104f0cd507000001046f9445657db4996b10208d04454e11fb5b1383c5ce98e3062f45ec04e5b8b179df3d64a6cec05d29235e3cbe0b339abe9faee5cf3e44c97ce56a1dc359047114eeb3c23f331114039d75a664afc47e8273b79e83d301fc4ceec8b89911505b6743797c459195a7120ded1748f315deb90000ffed00000000000000", @ANYRES8=r0, @ANYRES8=r0, @ANYRES64, @ANYBLOB="bd85893dee1670c8c7e3b4a65ec61f224992fd11263b7749c7ee63dd4fc13cc5dfdde8a3099aaf21ece351c316d9bbd7e4ecc524c856f20d6a1818d6d75f702eb904653f9d55af", @ANYRESOCT], 0x1, 0x513, &(0x7f0000000c40)="$eJzs3W9rJHcdAPDvTLJp7i41WxU5C7bFVu6K3m7S2DaKtBVEHxXU+jzGZBNCNtmQ3dRLKJriCxBEVPAF+ETwBQjSlyDCgT4XFUX0Th/qjczuRPNnN1mSTfbcfD4w2d9v/n2/vyE7O39+zARwbb0QEW9FxFhEvBwR08X4tBgW8sp+Z75HD99byocksuydvyWRFOMO1pXXxyPiVmeRmIyIr38l4lvJybjN3b31xXq9tl3Uq62NrWpzd+/e2sbiam21tjk3N/va/Ovzr87PZIULtbMcEW986U8/+v7PvvzGrz7z7d8v/OXud/K0vvCxTt4RsXShAD101l1qb4sD+TbavoxgQ5K3pzQ27CwAAOhHfoz/4Yj4ZPv4fzrG2kdzAAAAwCjJ3pyKfyURGQAAADCy0oiYiiStFH0BpiJNK5VOH96Pxs203mi2Pr3S2NlczqdFlKOUrqzVazNFX+FylJK8Plv0sT2ov3KsPhcRz0TED6dvtOuVpUZ9edgXPwAAAOCauPX80fP/f06n7TIAAAAwYso9KwAAAMCocMoPAAAAo8/5PwAAAIy0r779dj5kB+/xXn53d2e98e695VpzvbKxs1RZamxvVVYbjdX2M/s2zlpfvdHY+mxs7tyvtmrNVrW5u7ew0djZbC2sHXkFNgAAAHCFnnn+g98lEbH/+RvtIYrnAAIc8cdhJwAM0tiwEwCGZnzYCQBDUzpzDnsIGHXJGdNPdt7pXCuMX19OPgAAwODd+fjJ+/8TxbSzrw0A/8/09QGA68fdPbi+SuftAXh70JkAw/KhzsdTvab3fHhHH/f/O9cYsuxciQEAAAMz1R6StFIcp09FmlYqEU+3XwtQSlbW6rWZ4vzgt9Olp/L6bHvJ5Mw+wwAAAAAAAAAAAAAAAAAAAAAAAABAR5YlkQEAAAAjLSL9c9J+mn/EnemXpo5eHTj21q+fvvPj+4ut1vZsxETy9+l81EREtH5SjH8l80oAAAAAeAJ0ztOLz9lhZwMAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAADAqHn08L2lg+Eq4/71ixFR7hZ/PCbbn5NRioib/0hi/NBySUSMDSD+/vsRcbtb/CQeZ1lWLrLoFv/GJccvtzdN9/hpRNwaQHy4zj7I9z9vdfv+pfFC+7P792+8GC6q9/4v/e/+b6zH/ufpY/Venn3wi2rP+O9HPDveff9zED/pxD8SIq+82Gcbv/mNvb2uEw6tslv8w7GqrY2tanN3797axuJqbbW2OTc3+9r86/Ovzs9UV9bqteJv1zA/+MQvH5/W/ps94pePtv/E9n+pr9Zn8e8H9x9+pFMpdYt/98Xuv7+3e8RPi9++TxXlfPqdg/J+p3zYcz//zXOntX+5R/snz2j/3b7aH597+Wvf+0PXKSe2BgBwFZq7e+uL9Xpt+5TCZB/zXHHhzScjjQEW4slIY1iF7Lud/8eLreeCi58oZBdZfDwGkMbEie/pWJx3hUnEfr6uPv8hAQCAEfO/g/7T7iABAAAAAAAAAAAAAAAAAAAAl+mcjyWbjIi+Zz4ec384TQUAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAONV/AgAA//8FStFZ") [ 111.679750][ T5643] EXT4-fs (loop0): 1 orphan inode deleted [ 111.696609][ T5643] ext4 filesystem being mounted at /root/syzkaller-testdir338643557/syzkaller.M396af/76/file1 supports timestamps until 2038-01-19 (0x7fffffff) 20:41:00 executing program 3: r0 = openat$nci(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000380)='freezer.state\x00', 0x26e1, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000580)={0x17, 0xc, &(0x7f0000000640)=ANY=[@ANYBLOB="184000000100000000000000000000001801000020756c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000000600000018200000", @ANYRES32=r1, @ANYBLOB="0000000800000000c6e79ec1dffe097e083e307889923f342229830ede07ab002d5fde15e2f47b249903742ecc4bfae5151d05bf2fe06849a7d5878fce9c0361225d95b6e28adf35d6526a7706159c38626284bcb656beb53a921e06e0175b96ab764a09ae2ce68c7b067397a6731427d829418219bb7cb23d573ce78f8ba5c41cbb5ae86f5d6c0daa4fa11486cbff0c63521350a174de5e155c506ca7058d63ab33cc62fa512870005a8194db167cc84ed38071dc8b16f89d7080978f06c99b59597c1caf6893105189ff2ae28db53c0a0f6e7ff5fb6dd305437eeb25783df7449268f701f7b5c360af8ad493c0bc1111b3f8281bf2d49ef193003adc82ff4ce056f8db52ebdefb453cb7f8b5e8622dd06616cff62d60e5f14f2fcab2be"], &(0x7f0000000000)='GPL\x00', 0x0, 0x4b, &(0x7f0000000280)=""/75, 0x41000, 0xd, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000340)={0x0, 0x2, 0xa534261, 0x3}, 0x10, 0xffffffffffffffff, 0xffffffffffffffff, 0x3, &(0x7f0000000400)=[0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0xffffffffffffffff, r2, 0xffffffffffffffff, 0xffffffffffffffff], &(0x7f0000000440)=[{0x3, 0x2, 0x9, 0xc}, {0x0, 0x2, 0x0, 0x1}, {0x3, 0x0, 0xf}], 0x10, 0x1f}, 0x90) socket$inet_udplite(0x2, 0x2, 0x88) close_range(r0, r0, 0x0) [ 111.773707][ T5652] loop1: detected capacity change from 0 to 2048 20:41:00 executing program 3: r0 = openat$nci(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000380)='freezer.state\x00', 0x26e1, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000580)={0x17, 0xc, &(0x7f0000000640)=ANY=[@ANYBLOB="184000000100000000000000000000001801000020756c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000000600000018200000", @ANYRES32=r1, @ANYBLOB="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"], &(0x7f0000000000)='GPL\x00', 0x0, 0x4b, &(0x7f0000000280)=""/75, 0x41000, 0xd, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000340)={0x0, 0x2, 0xa534261, 0x3}, 0x10, 0xffffffffffffffff, 0xffffffffffffffff, 0x3, &(0x7f0000000400)=[0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0xffffffffffffffff, r2, 0xffffffffffffffff, 0xffffffffffffffff], &(0x7f0000000440)=[{0x3, 0x2, 0x9, 0xc}, {0x0, 0x2, 0x0, 0x1}, {0x3, 0x0, 0xf}], 0x10, 0x1f}, 0x90) close_range(r0, r0, 0x0) [ 111.883258][ T5665] loop0: detected capacity change from 0 to 512 [ 111.884611][ T5652] loop1: p2 p3 p7 20:41:00 executing program 1: ioctl$BTRFS_IOC_LOGICAL_INO(0xffffffffffffffff, 0xc0389424, &(0x7f0000000180)={0x1, 0x28, '\x00', 0x1, &(0x7f0000000080)=[0x0, 0x0, 0x0, 0x0, 0x0]}) r0 = socket$inet6(0xa, 0x3, 0x6) r1 = dup2(0xffffffffffffffff, r0) ioctl$FIDEDUPERANGE(r0, 0xc0189436, &(0x7f0000000f00)=ANY=[@ANYBLOB="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"]) ioctl$TIOCSBRK(r1, 0x5427) recvfrom$inet6(0xffffffffffffffff, &(0x7f0000000280)=""/134, 0x86, 0x40000102, &(0x7f0000000340)={0xa, 0x4e21, 0x77f, @mcast1, 0x403b3f}, 0x1c) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000001040)={{r1, 0xffffffffffffffff}, &(0x7f0000000140), &(0x7f0000000480)}, 0x20) syz_read_part_table(0x593, &(0x7f00000005c0)="$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") r3 = creat(&(0x7f0000000240)='./file0\x00', 0x0) stat(&(0x7f0000000040)='./file1\x00', &(0x7f0000000380)) fsetxattr$security_capability(r3, &(0x7f0000000100), &(0x7f0000000000)=@v1={0x1000000, [{0x80000000, 0x81}]}, 0xc, 0x0) newfstatat(0xffffffffffffff9c, &(0x7f00000000c0)='./file1\x00', &(0x7f0000001400), 0x400) close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x2) ioctl$TIOCSTI(r3, 0x5412, &(0x7f00000004c0)=0x40) fsync(0xffffffffffffffff) write$binfmt_misc(r3, &(0x7f0000001080)=ANY=[@ANYBLOB="7379d3c6"], 0x4) fallocate(r3, 0x100000011, 0x0, 0x2811fdff) open(&(0x7f0000000100)='.\x00', 0x20c2, 0x2d) open$dir(&(0x7f0000000500)='./file1\x00', 0x1c6c0, 0x0) r4 = openat$vcsu(0xffffffffffffff9c, &(0x7f0000000cc0), 0x400c00, 0x0) lsetxattr$security_selinux(&(0x7f0000001180)='./file1\x00', &(0x7f00000011c0), &(0x7f0000001300)='system_u:object_r:unconfined_exec_t:s0\x00', 0x27, 0x3) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000400)={0xffffffffffffffff, 0xe0, &(0x7f0000000300)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, &(0x7f00000000c0)=[0x0], &(0x7f0000000140), 0x0, 0x8, &(0x7f0000000200)=[{}, {}, {}, {}, {}], 0x28, 0x0, 0x0, 0x0, 0x0, 0x10, 0x8, 0x8, &(0x7f00000002c0)}}, 0x10) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000e80)=@bpf_lsm={0x1d, 0x4, &(0x7f0000000040)=@framed={{0x18, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x73fc}, [@generic={0x9, 0x8, 0x0, 0x7f, 0x200}]}, &(0x7f0000000880)='GPL\x00', 0x1f, 0x93, &(0x7f0000000cc0)=""/147, 0x40f00, 0x2, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, &(0x7f0000000b80)={0x9}, 0x8, 0x10, 0x0, 0x0, r5}, 0x80) r6 = socket$nl_generic(0x10, 0x3, 0x10) r7 = syz_genetlink_get_family_id$tipc(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$TIPC_CMD_ENABLE_BEARER(r6, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000001200)=ANY=[@ANYBLOB="3400000006c08fada241ee0a049e6fba3f36f40da839bbdf54c31768b0026f4261f56d51c5d81ba4cb99f8203c40d0a142fcd75ce26e408d229139f8c4e81109c56a18e453e8a537df21c4ec04a4f3e22f4ac125a28ad43e41107b1f7e79c8573985e54fd665e2913ca74da8c9f3fc2839258c19fa7ac20ebead31206cf280ea73f635bc5418b66554392dfd11874fef72bc53538aae3cb5ef8a80140f4737dd2c572a03ee1d5e3d627e", @ANYRESOCT=0x0, @ANYBLOB="010000000000000000000100000000000000014100000018001700000000000000007564503a73"], 0x34}, 0x1, 0x0, 0x0, 0x1}, 0x0) ioctl$AUTOFS_DEV_IOCTL_PROTOSUBVER(0xffffffffffffffff, 0xc0189373, &(0x7f0000000540)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x6}}, './file0\x00'}) sendmsg$TIPC_CMD_GET_MAX_PORTS(r4, &(0x7f0000001140)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x40000}, 0xc, &(0x7f0000001100)={&(0x7f00000010c0)={0x1c, r7, 0x400, 0x8000, 0x25dfdbfe, {}, ["", "", "", "", "", "", ""]}, 0x1c}, 0x1, 0x0, 0x0, 0x20048854}, 0x4004) bpf$PROG_LOAD(0x5, &(0x7f0000000e40)={0x5, 0x16, &(0x7f0000001340)=ANY=[@ANYBLOB="390000000100000000000000900000f117fa0000", @ANYRES32=r3, @ANYBLOB="1f00000000000000b703000000000000850000000c000000b61b0453c29f42b5be06c7010b4efffe000000000085000000a900000018150000", @ANYRES32=r2, @ANYBLOB="0000000000000000180100002020782500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b70300000000850000005d000000185500000100000000000000000000009500000000000000"], &(0x7f0000000b80)='syzkaller\x00', 0x1, 0xe8, &(0x7f0000000bc0)=""/232, 0x41000, 0x5b, '\x00', 0x0, 0xe, r4, 0x8, &(0x7f0000000d00)={0x5, 0x2}, 0x8, 0x10, &(0x7f0000000d40)={0x4, 0xe, 0x2, 0x8}, 0x10, r5, r3, 0x5, &(0x7f0000000d80), &(0x7f0000000dc0)=[{0x4, 0x3, 0x0, 0x2}, {0x3, 0x1, 0xa, 0xa}, {0x0, 0x3, 0x2, 0xa}, {0x0, 0x3, 0x7, 0x1}, {0x1, 0x5, 0xb, 0xc}], 0x10, 0x7}, 0x90) 20:41:00 executing program 3: r0 = openat$nci(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000380)='freezer.state\x00', 0x26e1, 0x0) close_range(r0, r0, 0x0) [ 111.932690][ T2775] loop1: p2 p3 p7 [ 111.951855][ T5665] EXT4-fs (loop0): 1 orphan inode deleted 20:41:00 executing program 3: r0 = openat$nci(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000380)='freezer.state\x00', 0x26e1, 0x0) close_range(r0, r0, 0x0) [ 111.970915][ T5665] ext4 filesystem being mounted at /root/syzkaller-testdir338643557/syzkaller.M396af/77/file1 supports timestamps until 2038-01-19 (0x7fffffff) 20:41:00 executing program 0: gettid() bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x9) fstat(0xffffffffffffffff, &(0x7f0000000b00)) r0 = getegid() syz_mount_image$ext4(&(0x7f0000000100)='ext4\x00', &(0x7f0000000200)='./file1\x00', 0x3000000, &(0x7f0000003040)=ANY=[@ANYRES64=r0, @ANYBLOB="8555591a163448f4c52bee6cc0e12a6a8610718f818822e94c360e46f93ac9c63a1b40ea9d758c2b4e2d7c386a141016d11cb13fabc846fc7fb242c175fbdf96e2a96e80e82b73987b1d5dfd843c7e6748a15a0c4160f5e4c468e8f8e417bd3385546159881194fe3a7cf8307cd9c7ce0ca180a481d4dcaa6611ec5c8ff1c546360dea3da9f2bfc1fd71af9ebf2afe4285f013a3929a7096097976a16e2060e5f26e379011ea1811", @ANYRES64, @ANYBLOB="ca42ad87c41bb3b2507e4e12104f0cd507000001046f9445657db4996b10208d04454e11fb5b1383c5ce98e3062f45ec04e5b8b179df3d64a6cec05d29235e3cbe0b339abe9faee5cf3e44c97ce56a1dc359047114eeb3c23f331114039d75a664afc47e8273b79e83d301fc4ceec8b89911505b6743797c459195a7120ded1748f315deb90000ffed00000000000000", @ANYRES8=r0, @ANYRES8=r0, @ANYRES64, @ANYBLOB="bd85893dee1670c8c7e3b4a65ec61f224992fd11263b7749c7ee63dd4fc13cc5dfdde8a3099aaf21ece351c316d9bbd7e4ecc524c856f20d6a1818d6d75f702eb904653f9d55af", @ANYRESOCT], 0x1, 0x513, &(0x7f0000000c40)="$eJzs3W9rJHcdAPDvTLJp7i41WxU5C7bFVu6K3m7S2DaKtBVEHxXU+jzGZBNCNtmQ3dRLKJriCxBEVPAF+ETwBQjSlyDCgT4XFUX0Th/qjczuRPNnN1mSTfbcfD4w2d9v/n2/vyE7O39+zARwbb0QEW9FxFhEvBwR08X4tBgW8sp+Z75HD99byocksuydvyWRFOMO1pXXxyPiVmeRmIyIr38l4lvJybjN3b31xXq9tl3Uq62NrWpzd+/e2sbiam21tjk3N/va/Ovzr87PZIULtbMcEW986U8/+v7PvvzGrz7z7d8v/OXud/K0vvCxTt4RsXShAD101l1qb4sD+TbavoxgQ5K3pzQ27CwAAOhHfoz/4Yj4ZPv4fzrG2kdzAAAAwCjJ3pyKfyURGQAAADCy0oiYiiStFH0BpiJNK5VOH96Pxs203mi2Pr3S2NlczqdFlKOUrqzVazNFX+FylJK8Plv0sT2ov3KsPhcRz0TED6dvtOuVpUZ9edgXPwAAAOCauPX80fP/f06n7TIAAAAwYso9KwAAAMCocMoPAAAAo8/5PwAAAIy0r779dj5kB+/xXn53d2e98e695VpzvbKxs1RZamxvVVYbjdX2M/s2zlpfvdHY+mxs7tyvtmrNVrW5u7ew0djZbC2sHXkFNgAAAHCFnnn+g98lEbH/+RvtIYrnAAIc8cdhJwAM0tiwEwCGZnzYCQBDUzpzDnsIGHXJGdNPdt7pXCuMX19OPgAAwODd+fjJ+/8TxbSzrw0A/8/09QGA68fdPbi+SuftAXh70JkAw/KhzsdTvab3fHhHH/f/O9cYsuxciQEAAAMz1R6StFIcp09FmlYqEU+3XwtQSlbW6rWZ4vzgt9Olp/L6bHvJ5Mw+wwAAAAAAAAAAAAAAAAAAAAAAAABAR5YlkQEAAAAjLSL9c9J+mn/EnemXpo5eHTj21q+fvvPj+4ut1vZsxETy9+l81EREtH5SjH8l80oAAAAAeAJ0ztOLz9lhZwMAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAADAqHn08L2lg+Eq4/71ixFR7hZ/PCbbn5NRioib/0hi/NBySUSMDSD+/vsRcbtb/CQeZ1lWLrLoFv/GJccvtzdN9/hpRNwaQHy4zj7I9z9vdfv+pfFC+7P792+8GC6q9/4v/e/+b6zH/ufpY/Venn3wi2rP+O9HPDveff9zED/pxD8SIq+82Gcbv/mNvb2uEw6tslv8w7GqrY2tanN3797axuJqbbW2OTc3+9r86/Ovzs9UV9bqteJv1zA/+MQvH5/W/ps94pePtv/E9n+pr9Zn8e8H9x9+pFMpdYt/98Xuv7+3e8RPi9++TxXlfPqdg/J+p3zYcz//zXOntX+5R/snz2j/3b7aH597+Wvf+0PXKSe2BgBwFZq7e+uL9Xpt+5TCZB/zXHHhzScjjQEW4slIY1iF7Lud/8eLreeCi58oZBdZfDwGkMbEie/pWJx3hUnEfr6uPv8hAQCAEfO/g/7T7iABAAAAAAAAAAAAAAAAAAAAl+mcjyWbjIi+Zz4ec384TQUAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAONV/AgAA//8FStFZ") [ 112.016543][ T5676] loop1: detected capacity change from 0 to 2048 20:41:00 executing program 3: r0 = openat$nci(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) close_range(r0, r0, 0x0) 20:41:00 executing program 3: r0 = openat$nci(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) close_range(r0, r0, 0x0) [ 112.094516][ T5676] loop1: p2 p3 p7 20:41:00 executing program 1: ioctl$BTRFS_IOC_LOGICAL_INO(0xffffffffffffffff, 0xc0389424, &(0x7f0000000180)={0x1, 0x28, '\x00', 0x1, &(0x7f0000000080)=[0x0, 0x0, 0x0, 0x0, 0x0]}) r0 = socket$inet6(0xa, 0x3, 0x6) r1 = dup2(0xffffffffffffffff, r0) ioctl$FIDEDUPERANGE(r0, 0xc0189436, &(0x7f0000000f00)=ANY=[@ANYBLOB="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"]) ioctl$TIOCSBRK(r1, 0x5427) recvfrom$inet6(0xffffffffffffffff, &(0x7f0000000280)=""/134, 0x86, 0x40000102, &(0x7f0000000340)={0xa, 0x4e21, 0x77f, @mcast1, 0x403b3f}, 0x1c) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000001040)={{r1, 0xffffffffffffffff}, &(0x7f0000000140), &(0x7f0000000480)}, 0x20) syz_read_part_table(0x593, &(0x7f00000005c0)="$eJzs0r1LK2kUB+A3A5c0e4lcLli4hWCwigqx0CIpRGJIY0RcsbAWLLQQLCwkEq39+AcUv0BsxD6lGEEUYiUpxXpBsUmVZdfZxmplUdnleZrhPefMHF5+E/hPi8Lv7XY7EUJoJ9//9m+nhbFS98TI5FQIiTAbQij8+stfnUQ88fdXz+NzOT6XktnG/vXo82nHTc9dPX0Yxf1aFMJaCGHh4Sj1b+/G/99Z/jK1vrFU3FzJz98XVx8H5/oKXVuFxZ2hg1xlujM3E/9Ytehz9qcbw8e37fLT7vf+b/VGK3sVz2USH7Ofr/U2/72f1Wa1Nd57sjyQ+dG8qGzHub/IHwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA+GBn+cvU+sZScXMlP39fXH0cnOsrdG0VFneGDnKV6c7cTPQ6V4s+Z3+6MXx82y4/7X7v/1ZvtLJX8Vwm8TH7+Vpv89/7WW1WW+O9J8sDmR/Ni8p2nPuL/AEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAACAf6gwVuqeGJmcCiERZkMIo1HH0Z/1dvK1n4jnzuNnOa6XktnG/vXo82nHTc9dPX04EddrUQhrIYSFh6PUp1+Gd/sjAAD///tch0s=") r3 = creat(&(0x7f0000000240)='./file0\x00', 0x0) stat(&(0x7f0000000040)='./file1\x00', &(0x7f0000000380)) fsetxattr$security_capability(r3, &(0x7f0000000100), &(0x7f0000000000)=@v1={0x1000000, [{0x80000000, 0x81}]}, 0xc, 0x0) newfstatat(0xffffffffffffff9c, &(0x7f00000000c0)='./file1\x00', &(0x7f0000001400), 0x400) close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x2) ioctl$TIOCSTI(r3, 0x5412, &(0x7f00000004c0)=0x40) fsync(0xffffffffffffffff) write$binfmt_misc(r3, &(0x7f0000001080)=ANY=[@ANYBLOB="7379d3c6"], 0x4) fallocate(r3, 0x100000011, 0x0, 0x2811fdff) open(&(0x7f0000000100)='.\x00', 0x20c2, 0x2d) open$dir(&(0x7f0000000500)='./file1\x00', 0x1c6c0, 0x0) r4 = openat$vcsu(0xffffffffffffff9c, &(0x7f0000000cc0), 0x400c00, 0x0) lsetxattr$security_selinux(&(0x7f0000001180)='./file1\x00', &(0x7f00000011c0), &(0x7f0000001300)='system_u:object_r:unconfined_exec_t:s0\x00', 0x27, 0x3) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000400)={0xffffffffffffffff, 0xe0, &(0x7f0000000300)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, &(0x7f00000000c0)=[0x0], &(0x7f0000000140), 0x0, 0x8, &(0x7f0000000200)=[{}, {}, {}, {}, {}], 0x28, 0x0, 0x0, 0x0, 0x0, 0x10, 0x8, 0x8, &(0x7f00000002c0)}}, 0x10) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000e80)=@bpf_lsm={0x1d, 0x4, &(0x7f0000000040)=@framed={{0x18, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x73fc}, [@generic={0x9, 0x8, 0x0, 0x7f, 0x200}]}, &(0x7f0000000880)='GPL\x00', 0x1f, 0x93, &(0x7f0000000cc0)=""/147, 0x40f00, 0x2, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, &(0x7f0000000b80)={0x9}, 0x8, 0x10, 0x0, 0x0, r5}, 0x80) r6 = socket$nl_generic(0x10, 0x3, 0x10) r7 = syz_genetlink_get_family_id$tipc(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$TIPC_CMD_ENABLE_BEARER(r6, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000001200)=ANY=[@ANYBLOB="3400000006c08fada241ee0a049e6fba3f36f40da839bbdf54c31768b0026f4261f56d51c5d81ba4cb99f8203c40d0a142fcd75ce26e408d229139f8c4e81109c56a18e453e8a537df21c4ec04a4f3e22f4ac125a28ad43e41107b1f7e79c8573985e54fd665e2913ca74da8c9f3fc2839258c19fa7ac20ebead31206cf280ea73f635bc5418b66554392dfd11874fef72bc53538aae3cb5ef8a80140f4737dd2c572a03ee1d5e3d627e", @ANYRESOCT=0x0, @ANYBLOB="010000000000000000000100000000000000014100000018001700000000000000007564503a73"], 0x34}, 0x1, 0x0, 0x0, 0x1}, 0x0) ioctl$AUTOFS_DEV_IOCTL_PROTOSUBVER(0xffffffffffffffff, 0xc0189373, &(0x7f0000000540)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x6}}, './file0\x00'}) sendmsg$TIPC_CMD_GET_MAX_PORTS(r4, &(0x7f0000001140)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x40000}, 0xc, &(0x7f0000001100)={&(0x7f00000010c0)={0x1c, r7, 0x400, 0x8000, 0x25dfdbfe, {}, ["", "", "", "", "", "", ""]}, 0x1c}, 0x1, 0x0, 0x0, 0x20048854}, 0x4004) bpf$PROG_LOAD(0x5, &(0x7f0000000e40)={0x5, 0x16, &(0x7f0000001340)=ANY=[@ANYBLOB="390000000100000000000000900000f117fa0000", @ANYRES32=r3, @ANYBLOB="1f00000000000000b703000000000000850000000c000000b61b0453c29f42b5be06c7010b4efffe000000000085000000a900000018150000", @ANYRES32=r2, @ANYBLOB="0000000000000000180100002020782500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b70300000000850000005d000000185500000100000000000000000000009500000000000000"], &(0x7f0000000b80)='syzkaller\x00', 0x1, 0xe8, &(0x7f0000000bc0)=""/232, 0x41000, 0x5b, '\x00', 0x0, 0xe, r4, 0x8, &(0x7f0000000d00)={0x5, 0x2}, 0x8, 0x10, &(0x7f0000000d40)={0x4, 0xe, 0x2, 0x8}, 0x10, r5, r3, 0x5, &(0x7f0000000d80), &(0x7f0000000dc0)=[{0x4, 0x3, 0x0, 0x2}, {0x3, 0x1, 0xa, 0xa}, {0x0, 0x3, 0x2, 0xa}, {0x0, 0x3, 0x7, 0x1}, {0x1, 0x5, 0xb, 0xc}], 0x10, 0x7}, 0x90) 20:41:00 executing program 3: close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x0) [ 112.152414][ T5690] loop0: detected capacity change from 0 to 512 20:41:00 executing program 3: close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x0) [ 112.222423][ T5690] EXT4-fs (loop0): 1 orphan inode deleted [ 112.251021][ T3701] __quota_error: 15 callbacks suppressed [ 112.251039][ T3701] Quota error (device loop0): do_check_range: Getting dqdh_entries 15 out of range 0-14 20:41:00 executing program 2: r0 = perf_event_open(&(0x7f0000000a40)={0x2, 0x80, 0xcd, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @perf_bp={&(0x7f0000000200), 0x8}, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfb75}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000040)={0x0, 0x4, 0x0, &(0x7f0000000180)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x80) perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x208, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x4, 0x8001}, 0x4000, 0x0, 0x0, 0x0, 0x0, 0x14e, 0xd1}, 0x0, 0xbfffffffffffffff, r0, 0x19893a9f0a0e2244) r1 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) syz_clone(0x2000000, 0x0, 0x0, 0x0, 0x0, 0x0) r2 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x18, 0x5, &(0x7f00000002c0)=ANY=[@ANYBLOB="180000001800ff0f0000000000000000850000006d000000750000000800000095"], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x80) r3 = perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400, 0x80000, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x7, 0x1007}, 0x8006, 0x0, 0x0, 0x1, 0x4, 0x800000, 0x3}, 0x0, 0xffefffffffffffff, 0xffffffffffffffff, 0x9) ioctl$PERF_EVENT_IOC_SET_FILTER(r3, 0x40082406, &(0x7f00000003c0)='memory.numa_stat\x00') perf_event_open(0x0, 0x0, 0x0, r3, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000080)='sched_switch\x00', r2}, 0x10) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000380)={{0x1, 0xffffffffffffffff}, &(0x7f0000000000), &(0x7f0000000240)=r2}, 0x20) r5 = memfd_secret(0x0) syz_io_uring_setup(0x0, &(0x7f0000000300)={0x0, 0x2, 0x0, 0x0, 0x0, 0x0, r5}, 0x0, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f00000009c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000000a00)=0x14) r7 = openat2(0xffffffffffffff9c, &(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)={0x40841}, 0x18) write$binfmt_script(r7, &(0x7f0000000340)=ANY=[], 0xfffffdef) r8 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000b40)={0x1b, 0x0, 0x0, 0x7, 0x0, 0xffffffffffffffff, 0x200, '\x00', 0x0, 0xffffffffffffffff, 0x3, 0x1, 0x4}, 0x48) r9 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000bc0)={0x2, 0x4, 0x8, 0x1, 0x80, 0x1, 0x9, '\x00', 0x0, 0xffffffffffffffff, 0x4, 0x1, 0x4}, 0x48) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000d00)={0x11, 0x12, &(0x7f0000000440)=@raw=[@exit, @ringbuf_query={{0x18, 0x1, 0x1, 0x0, r4}}, @ringbuf_output={{0x18, 0x1, 0x1, 0x0, r5}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x10001}, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x4, 0x0, 0x0, 0x2}}, @exit, @initr0={0x18, 0x0, 0x0, 0x0, 0x6349, 0x0, 0x0, 0x0, 0xf685}, @ldst={0x3, 0x2, 0x1, 0x0, 0xb, 0x2543a83bb932833c, 0x1}], &(0x7f0000000940)='syzkaller\x00', 0x80000001, 0x27, &(0x7f0000000980)=""/39, 0x41000, 0x40, '\x00', r6, 0x0, r7, 0x8, &(0x7f0000000ac0)={0x3, 0x1}, 0x8, 0x10, &(0x7f0000000b00)={0x2, 0xc, 0xfffffe00, 0x2}, 0x10, 0x0, 0x0, 0x5, &(0x7f0000000c40)=[r2, 0x1, 0x1, r8, r9, r1], &(0x7f0000000c80)=[{0x4, 0x1, 0x8, 0xc}, {0x0, 0x4, 0xf, 0x4}, {0x1, 0x2, 0xd, 0x6}, {0x0, 0x4, 0x10, 0xc}, {0x2, 0x4, 0xd, 0x1}], 0x10, 0x20}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000280)={&(0x7f0000000140)='ext4_ext_show_extent\x00', r2}, 0x10) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) r10 = gettid() perf_event_open$cgroup(&(0x7f0000000300)={0x5, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_bp={&(0x7f0000000100)}, 0x81252, 0x6, 0x80000001, 0x0, 0x0, 0x0, 0x6, 0x0, 0x6, 0x0, 0x6}, 0xffffffffffffffff, 0xe, 0xffffffffffffffff, 0xc) perf_event_open(0x0, r10, 0x2, 0xffffffffffffffff, 0xb) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) perf_event_open(&(0x7f0000000840)={0x2, 0x80, 0x0, 0x7, 0x0, 0x80, 0x0, 0x3, 0x0, 0x9, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, @perf_config_ext={0x8000000000, 0x3}, 0x46c73247dfbe0d, 0x1007e, 0x0, 0x2, 0x0, 0x0, 0x6, 0x0, 0xffffffff, 0x0, 0x1c}, 0x0, 0x9, 0xffffffffffffffff, 0xd) bpf$PROG_LOAD(0x5, &(0x7f0000000780)={0x14, 0x4, &(0x7f00000008c0)=ANY=[@ANYBLOB="850000006b00000018150000a3df7ddd9621fb0201050062d91123e632b2f902ad1e9f1cc7a66ed51ac8a4070000000000000019a83f0b7c9502871fb1ca3dc499e804bbbc359859ed6fd9f104fc7ed900d122072d8275a24d000000000601c3a63953a7b36fe458", @ANYRES32, @ANYBLOB="00000000000000002d59e4eda4000000"], &(0x7f0000000400)='syzkaller\x00', 0xfff, 0xe3, &(0x7f0000000580)=""/227, 0x0, 0x4, '\x00', 0x0, 0x24, 0xffffffffffffffff, 0x8, &(0x7f0000000500)={0x1, 0x3}, 0x8, 0x10, &(0x7f0000000680)={0x5, 0x6, 0x81, 0x9}, 0x10, 0xffffffffffffffff, 0xffffffffffffffff, 0x0, &(0x7f00000006c0)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}, 0x80) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x4030582a, &(0x7f0000000040)=0x91) 20:41:00 executing program 3: close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x0) 20:41:00 executing program 0: gettid() bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) fstat(0xffffffffffffffff, &(0x7f0000000b00)) r0 = getegid() syz_mount_image$ext4(&(0x7f0000000100)='ext4\x00', &(0x7f0000000200)='./file1\x00', 0x3000000, &(0x7f0000003040)=ANY=[@ANYRES64=r0, @ANYBLOB="8555591a163448f4c52bee6cc0e12a6a8610718f818822e94c360e46f93ac9c63a1b40ea9d758c2b4e2d7c386a141016d11cb13fabc846fc7fb242c175fbdf96e2a96e80e82b73987b1d5dfd843c7e6748a15a0c4160f5e4c468e8f8e417bd3385546159881194fe3a7cf8307cd9c7ce0ca180a481d4dcaa6611ec5c8ff1c546360dea3da9f2bfc1fd71af9ebf2afe4285f013a3929a7096097976a16e2060e5f26e379011ea1811", @ANYRES64, @ANYBLOB="ca42ad87c41bb3b2507e4e12104f0cd507000001046f9445657db4996b10208d04454e11fb5b1383c5ce98e3062f45ec04e5b8b179df3d64a6cec05d29235e3cbe0b339abe9faee5cf3e44c97ce56a1dc359047114eeb3c23f331114039d75a664afc47e8273b79e83d301fc4ceec8b89911505b6743797c459195a7120ded1748f315deb90000ffed00000000000000", @ANYRES8=r0, @ANYRES8=r0, @ANYRES64, @ANYBLOB="bd85893dee1670c8c7e3b4a65ec61f224992fd11263b7749c7ee63dd4fc13cc5dfdde8a3099aaf21ece351c316d9bbd7e4ecc524c856f20d6a1818d6d75f702eb904653f9d55af", @ANYRESOCT], 0x1, 0x513, &(0x7f0000000c40)="$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") 20:41:00 executing program 4: r0 = perf_event_open(&(0x7f0000000a40)={0x2, 0x80, 0xcd, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @perf_bp={&(0x7f0000000200), 0x8}, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfb75}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000040)={0x0, 0x4, 0x0, &(0x7f0000000180)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x80) perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x208, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x4, 0x8001}, 0x4000, 0x0, 0x0, 0x0, 0x0, 0x14e, 0xd1}, 0x0, 0xbfffffffffffffff, r0, 0x19893a9f0a0e2244) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) syz_clone(0x2000000, 0x0, 0x0, 0x0, 0x0, 0x0) r1 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x18, 0x5, &(0x7f00000002c0)=ANY=[@ANYBLOB="180000001800ff0f0000000000000000850000006d000000750000000800000095"], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x80) r2 = perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400, 0x80000, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x7, 0x1007}, 0x8006, 0x0, 0x0, 0x1, 0x4, 0x800000, 0x3}, 0x0, 0xffefffffffffffff, 0xffffffffffffffff, 0x9) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x40082406, &(0x7f00000003c0)='memory.numa_stat\x00') perf_event_open(0x0, 0x0, 0x0, r2, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000080)='sched_switch\x00', r1}, 0x10) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000380)={{0x1}, &(0x7f0000000000), &(0x7f0000000240)=r1}, 0x20) r3 = memfd_secret(0x0) syz_io_uring_setup(0x0, &(0x7f0000000300)={0x0, 0x2, 0x0, 0x0, 0x0, 0x0, r3}, 0x0, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f00000009c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000000a00)=0x14) r4 = openat2(0xffffffffffffff9c, &(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)={0x40841}, 0x18) write$binfmt_script(r4, &(0x7f0000000340)=ANY=[], 0xfffffdef) [ 112.285672][ T5690] ext4 filesystem being mounted at /root/syzkaller-testdir338643557/syzkaller.M396af/78/file1 supports timestamps until 2038-01-19 (0x7fffffff) [ 112.308366][ T5697] loop1: detected capacity change from 0 to 2048 20:41:00 executing program 3: r0 = openat$nci(0xffffffffffffff9c, 0x0, 0x2, 0x0) close_range(r0, r0, 0x0) 20:41:00 executing program 3: r0 = openat$nci(0xffffffffffffff9c, 0x0, 0x2, 0x0) close_range(r0, r0, 0x0) [ 112.364105][ T5697] loop1: p2 p3 p7 20:41:00 executing program 1: ioctl$BTRFS_IOC_LOGICAL_INO(0xffffffffffffffff, 0xc0389424, &(0x7f0000000180)={0x1, 0x28, '\x00', 0x1, &(0x7f0000000080)=[0x0, 0x0, 0x0, 0x0, 0x0]}) r0 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) r1 = dup2(r0, 0xffffffffffffffff) ioctl$FIDEDUPERANGE(0xffffffffffffffff, 0xc0189436, &(0x7f0000000f00)=ANY=[@ANYBLOB="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"]) ioctl$TIOCSBRK(r1, 0x5427) recvfrom$inet6(0xffffffffffffffff, &(0x7f0000000280)=""/134, 0x86, 0x40000102, &(0x7f0000000340)={0xa, 0x4e21, 0x77f, @mcast1, 0x403b3f}, 0x1c) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000001040)={{r1, 0xffffffffffffffff}, &(0x7f0000000140), &(0x7f0000000480)=r0}, 0x20) syz_read_part_table(0x593, &(0x7f00000005c0)="$eJzs0r1LK2kUB+A3A5c0e4lcLli4hWCwigqx0CIpRGJIY0RcsbAWLLQQLCwkEq39+AcUv0BsxD6lGEEUYiUpxXpBsUmVZdfZxmplUdnleZrhPefMHF5+E/hPi8Lv7XY7EUJoJ9//9m+nhbFS98TI5FQIiTAbQij8+stfnUQ88fdXz+NzOT6XktnG/vXo82nHTc9dPX0Yxf1aFMJaCGHh4Sj1b+/G/99Z/jK1vrFU3FzJz98XVx8H5/oKXVuFxZ2hg1xlujM3E/9Ytehz9qcbw8e37fLT7vf+b/VGK3sVz2USH7Ofr/U2/72f1Wa1Nd57sjyQ+dG8qGzHub/IHwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA+GBn+cvU+sZScXMlP39fXH0cnOsrdG0VFneGDnKV6c7cTPQ6V4s+Z3+6MXx82y4/7X7v/1ZvtLJX8Vwm8TH7+Vpv89/7WW1WW+O9J8sDmR/Ni8p2nPuL/AEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAACAf6gwVuqeGJmcCiERZkMIo1HH0Z/1dvK1n4jnzuNnOa6XktnG/vXo82nHTc9dPX04EddrUQhrIYSFh6PUp1+Gd/sjAAD///tch0s=") r3 = creat(&(0x7f0000000240)='./file0\x00', 0x0) stat(&(0x7f0000000040)='./file1\x00', &(0x7f0000000380)) fsetxattr$security_capability(r3, &(0x7f0000000100), &(0x7f0000000000)=@v1={0x1000000, [{0x80000000, 0x81}]}, 0xc, 0x0) newfstatat(0xffffffffffffff9c, &(0x7f00000000c0)='./file1\x00', &(0x7f0000001400), 0x400) close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x2) ioctl$TIOCSTI(r3, 0x5412, &(0x7f00000004c0)=0x40) fsync(0xffffffffffffffff) write$binfmt_misc(r3, &(0x7f0000001080)=ANY=[@ANYBLOB="7379d3c6"], 0x4) fallocate(r3, 0x100000011, 0x0, 0x2811fdff) open(&(0x7f0000000100)='.\x00', 0x20c2, 0x2d) open$dir(&(0x7f0000000500)='./file1\x00', 0x1c6c0, 0x0) r4 = openat$vcsu(0xffffffffffffff9c, &(0x7f0000000cc0), 0x400c00, 0x0) lsetxattr$security_selinux(&(0x7f0000001180)='./file1\x00', &(0x7f00000011c0), &(0x7f0000001300)='system_u:object_r:unconfined_exec_t:s0\x00', 0x27, 0x3) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000400)={0xffffffffffffffff, 0xe0, &(0x7f0000000300)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, &(0x7f00000000c0)=[0x0], &(0x7f0000000140), 0x0, 0x8, &(0x7f0000000200)=[{}, {}, {}, {}, {}], 0x28, 0x0, 0x0, 0x0, 0x0, 0x10, 0x8, 0x8, &(0x7f00000002c0)}}, 0x10) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000e80)=@bpf_lsm={0x1d, 0x4, &(0x7f0000000040)=@framed={{0x18, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x73fc}, [@generic={0x9, 0x8, 0x0, 0x7f, 0x200}]}, &(0x7f0000000880)='GPL\x00', 0x1f, 0x93, &(0x7f0000000cc0)=""/147, 0x40f00, 0x2, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, &(0x7f0000000b80)={0x9}, 0x8, 0x10, 0x0, 0x0, r5}, 0x80) r6 = socket$nl_generic(0x10, 0x3, 0x10) r7 = syz_genetlink_get_family_id$tipc(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$TIPC_CMD_ENABLE_BEARER(r6, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000001200)=ANY=[@ANYBLOB="3400000006c08fada241ee0a049e6fba3f36f40da839bbdf54c31768b0026f4261f56d51c5d81ba4cb99f8203c40d0a142fcd75ce26e408d229139f8c4e81109c56a18e453e8a537df21c4ec04a4f3e22f4ac125a28ad43e41107b1f7e79c8573985e54fd665e2913ca74da8c9f3fc2839258c19fa7ac20ebead31206cf280ea73f635bc5418b66554392dfd11874fef72bc53538aae3cb5ef8a80140f4737dd2c572a03ee1d5e3d627e", @ANYRESOCT=0x0, @ANYBLOB="010000000000000000000100000000000000014100000018001700000000000000007564503a73"], 0x34}, 0x1, 0x0, 0x0, 0x1}, 0x0) ioctl$AUTOFS_DEV_IOCTL_PROTOSUBVER(r0, 0xc0189373, &(0x7f0000000540)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x6}}, './file0\x00'}) sendmsg$TIPC_CMD_GET_MAX_PORTS(r4, &(0x7f0000001140)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x40000}, 0xc, &(0x7f0000001100)={&(0x7f00000010c0)={0x1c, r7, 0x400, 0x8000, 0x25dfdbfe, {}, ["", "", "", "", "", "", ""]}, 0x1c}, 0x1, 0x0, 0x0, 0x20048854}, 0x4004) bpf$PROG_LOAD(0x5, &(0x7f0000000e40)={0x5, 0x16, &(0x7f0000001340)=ANY=[@ANYBLOB="390000000100000000000000900000f117fa0000", @ANYRES32=r3, @ANYBLOB="1f00000000000000b703000000000000850000000c000000b61b0453c29f42b5be06c7010b4efffe000000000085000000a900000018150000", @ANYRES32=r2, @ANYBLOB="0000000000000000180100002020782500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b70300000000850000005d000000185500000100000000000000000000009500000000000000"], &(0x7f0000000b80)='syzkaller\x00', 0x1, 0xe8, &(0x7f0000000bc0)=""/232, 0x41000, 0x5b, '\x00', 0x0, 0xe, r4, 0x8, &(0x7f0000000d00)={0x5, 0x2}, 0x8, 0x10, &(0x7f0000000d40)={0x4, 0xe, 0x2, 0x8}, 0x10, r5, r3, 0x5, &(0x7f0000000d80), &(0x7f0000000dc0)=[{0x4, 0x3, 0x0, 0x2}, {0x3, 0x1, 0xa, 0xa}, {0x0, 0x3, 0x2, 0xa}, {0x0, 0x3, 0x7, 0x1}, {0x1, 0x5, 0xb, 0xc}], 0x10, 0x7}, 0x90) 20:41:00 executing program 3: r0 = openat$nci(0xffffffffffffff9c, 0x0, 0x2, 0x0) close_range(r0, r0, 0x0) 20:41:00 executing program 3: r0 = openat$nci(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) close_range(0xffffffffffffffff, r0, 0x0) [ 112.402318][ T5709] loop0: detected capacity change from 0 to 512 [ 112.450667][ T5709] EXT4-fs (loop0): 1 orphan inode deleted [ 112.466845][ T38] Quota error (device loop0): do_check_range: Getting dqdh_entries 15 out of range 0-14 [ 112.483702][ T2775] loop1: p2 p3 p7 [ 112.487693][ T5709] ext4 filesystem being mounted at /root/syzkaller-testdir338643557/syzkaller.M396af/79/file1 supports timestamps until 2038-01-19 (0x7fffffff) 20:41:00 executing program 0: gettid() bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) fstat(0xffffffffffffffff, 0x0) r0 = getegid() syz_mount_image$ext4(&(0x7f0000000100)='ext4\x00', &(0x7f0000000200)='./file1\x00', 0x3000000, &(0x7f0000003040)=ANY=[@ANYRES64=r0, @ANYBLOB="8555591a163448f4c52bee6cc0e12a6a8610718f818822e94c360e46f93ac9c63a1b40ea9d758c2b4e2d7c386a141016d11cb13fabc846fc7fb242c175fbdf96e2a96e80e82b73987b1d5dfd843c7e6748a15a0c4160f5e4c468e8f8e417bd3385546159881194fe3a7cf8307cd9c7ce0ca180a481d4dcaa6611ec5c8ff1c546360dea3da9f2bfc1fd71af9ebf2afe4285f013a3929a7096097976a16e2060e5f26e379011ea1811", @ANYRES64, @ANYBLOB="ca42ad87c41bb3b2507e4e12104f0cd507000001046f9445657db4996b10208d04454e11fb5b1383c5ce98e3062f45ec04e5b8b179df3d64a6cec05d29235e3cbe0b339abe9faee5cf3e44c97ce56a1dc359047114eeb3c23f331114039d75a664afc47e8273b79e83d301fc4ceec8b89911505b6743797c459195a7120ded1748f315deb90000ffed00000000000000", @ANYRES8=r0, @ANYRES8=r0, @ANYRES64, @ANYBLOB="bd85893dee1670c8c7e3b4a65ec61f224992fd11263b7749c7ee63dd4fc13cc5dfdde8a3099aaf21ece351c316d9bbd7e4ecc524c856f20d6a1818d6d75f702eb904653f9d55af", @ANYRESOCT], 0x1, 0x513, &(0x7f0000000c40)="$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") 20:41:00 executing program 3: r0 = openat$nci(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) close_range(0xffffffffffffffff, r0, 0x0) 20:41:01 executing program 3: r0 = openat$nci(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) close_range(0xffffffffffffffff, r0, 0x0) [ 112.609095][ T5731] loop1: detected capacity change from 0 to 2048 [ 112.639938][ T5737] loop0: detected capacity change from 0 to 512 20:41:01 executing program 3: r0 = openat$nci(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) close_range(r0, 0xffffffffffffffff, 0x0) [ 112.673937][ T5737] EXT4-fs (loop0): 1 orphan inode deleted [ 112.688821][ T5731] loop1: p2 p3 p7 [ 112.692880][ T38] Quota error (device loop0): do_check_range: Getting dqdh_entries 15 out of range 0-14 [ 112.696891][ T5737] ext4 filesystem being mounted at /root/syzkaller-testdir338643557/syzkaller.M396af/80/file1 supports timestamps until 2038-01-19 (0x7fffffff) 20:41:01 executing program 0: r0 = openat$nci(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000380)='freezer.state\x00', 0x26e1, 0x0) close_range(r0, r0, 0x0) 20:41:01 executing program 1: ioctl$BTRFS_IOC_LOGICAL_INO(0xffffffffffffffff, 0xc0389424, &(0x7f0000000180)={0x1, 0x28, '\x00', 0x1, &(0x7f0000000080)=[0x0, 0x0, 0x0, 0x0, 0x0]}) r0 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) r1 = dup2(r0, 0xffffffffffffffff) ioctl$FIDEDUPERANGE(0xffffffffffffffff, 0xc0189436, &(0x7f0000000f00)=ANY=[@ANYBLOB="08000000000000000000000000000000000000002000000032057e68d5d647f4ed243c9d097db4c7bae602f8d4c84b5325f3d737af1c3ebe2901b056ac84d04eb9d8bfd4771499d444ff07000033206062c9a0527d2d0e4b0000fa0693ec3785977184911bffc60554e8950e91e1a8209818b4eb3440ae351192e1d7cf54ba6743f2db330481aac17f0961506d7ebd7ca999cf4e148c1ef2880f63693dfee2a6f2fafec2c059fd15db654600000000000000000076da8ec51705470a42729df6a32122af2a673d7409ca1b8a0da065e2bf7790c86a6b3014e1ef5d1c4000d3dff081d5a4c403971fe8869ab4973ffc7b24b6fbb4341ac1a0f5d56b64b9d23d6855e653f1e0418a6d9838196a7b145310a9b4c467199ecc3bd47b85aae47754bf695bdb85ea03f70beab5732a014c5f525bf2f9b9c6bd545e1a"]) ioctl$TIOCSBRK(r1, 0x5427) recvfrom$inet6(0xffffffffffffffff, &(0x7f0000000280)=""/134, 0x86, 0x40000102, &(0x7f0000000340)={0xa, 0x4e21, 0x77f, @mcast1, 0x403b3f}, 0x1c) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000001040)={{r1, 0xffffffffffffffff}, &(0x7f0000000140), &(0x7f0000000480)=r0}, 0x20) syz_read_part_table(0x593, &(0x7f00000005c0)="$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") r3 = creat(&(0x7f0000000240)='./file0\x00', 0x0) stat(&(0x7f0000000040)='./file1\x00', &(0x7f0000000380)) fsetxattr$security_capability(r3, &(0x7f0000000100), &(0x7f0000000000)=@v1={0x1000000, [{0x80000000, 0x81}]}, 0xc, 0x0) newfstatat(0xffffffffffffff9c, &(0x7f00000000c0)='./file1\x00', &(0x7f0000001400), 0x400) close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x2) ioctl$TIOCSTI(r3, 0x5412, &(0x7f00000004c0)=0x40) fsync(0xffffffffffffffff) write$binfmt_misc(r3, &(0x7f0000001080)=ANY=[@ANYBLOB="7379d3c6"], 0x4) fallocate(r3, 0x100000011, 0x0, 0x2811fdff) open(&(0x7f0000000100)='.\x00', 0x20c2, 0x2d) open$dir(&(0x7f0000000500)='./file1\x00', 0x1c6c0, 0x0) r4 = openat$vcsu(0xffffffffffffff9c, &(0x7f0000000cc0), 0x400c00, 0x0) lsetxattr$security_selinux(&(0x7f0000001180)='./file1\x00', &(0x7f00000011c0), &(0x7f0000001300)='system_u:object_r:unconfined_exec_t:s0\x00', 0x27, 0x3) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000400)={0xffffffffffffffff, 0xe0, &(0x7f0000000300)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, &(0x7f00000000c0)=[0x0], &(0x7f0000000140), 0x0, 0x8, &(0x7f0000000200)=[{}, {}, {}, {}, {}], 0x28, 0x0, 0x0, 0x0, 0x0, 0x10, 0x8, 0x8, &(0x7f00000002c0)}}, 0x10) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000e80)=@bpf_lsm={0x1d, 0x4, &(0x7f0000000040)=@framed={{0x18, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x73fc}, [@generic={0x9, 0x8, 0x0, 0x7f, 0x200}]}, &(0x7f0000000880)='GPL\x00', 0x1f, 0x93, &(0x7f0000000cc0)=""/147, 0x40f00, 0x2, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, &(0x7f0000000b80)={0x9}, 0x8, 0x10, 0x0, 0x0, r5}, 0x80) r6 = socket$nl_generic(0x10, 0x3, 0x10) r7 = syz_genetlink_get_family_id$tipc(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$TIPC_CMD_ENABLE_BEARER(r6, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000001200)=ANY=[@ANYBLOB="3400000006c08fada241ee0a049e6fba3f36f40da839bbdf54c31768b0026f4261f56d51c5d81ba4cb99f8203c40d0a142fcd75ce26e408d229139f8c4e81109c56a18e453e8a537df21c4ec04a4f3e22f4ac125a28ad43e41107b1f7e79c8573985e54fd665e2913ca74da8c9f3fc2839258c19fa7ac20ebead31206cf280ea73f635bc5418b66554392dfd11874fef72bc53538aae3cb5ef8a80140f4737dd2c572a03ee1d5e3d627e", @ANYRESOCT=0x0, @ANYBLOB="010000000000000000000100000000000000014100000018001700000000000000007564503a73"], 0x34}, 0x1, 0x0, 0x0, 0x1}, 0x0) ioctl$AUTOFS_DEV_IOCTL_PROTOSUBVER(r0, 0xc0189373, &(0x7f0000000540)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x6}}, './file0\x00'}) sendmsg$TIPC_CMD_GET_MAX_PORTS(r4, &(0x7f0000001140)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x40000}, 0xc, &(0x7f0000001100)={&(0x7f00000010c0)={0x1c, r7, 0x400, 0x8000, 0x25dfdbfe, {}, ["", "", "", "", "", "", ""]}, 0x1c}, 0x1, 0x0, 0x0, 0x20048854}, 0x4004) bpf$PROG_LOAD(0x5, &(0x7f0000000e40)={0x5, 0x16, &(0x7f0000001340)=ANY=[@ANYBLOB="390000000100000000000000900000f117fa0000", @ANYRES32=r3, @ANYBLOB="1f00000000000000b703000000000000850000000c000000b61b0453c29f42b5be06c7010b4efffe000000000085000000a900000018150000", @ANYRES32=r2, @ANYBLOB="0000000000000000180100002020782500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b70300000000850000005d000000185500000100000000000000000000009500000000000000"], &(0x7f0000000b80)='syzkaller\x00', 0x1, 0xe8, &(0x7f0000000bc0)=""/232, 0x41000, 0x5b, '\x00', 0x0, 0xe, r4, 0x8, &(0x7f0000000d00)={0x5, 0x2}, 0x8, 0x10, &(0x7f0000000d40)={0x4, 0xe, 0x2, 0x8}, 0x10, r5, r3, 0x5, &(0x7f0000000d80), &(0x7f0000000dc0)=[{0x4, 0x3, 0x0, 0x2}, {0x3, 0x1, 0xa, 0xa}, {0x0, 0x3, 0x2, 0xa}, {0x0, 0x3, 0x7, 0x1}, {0x1, 0x5, 0xb, 0xc}], 0x10, 0x7}, 0x90) 20:41:01 executing program 3: r0 = openat$nci(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000380)='freezer.state\x00', 0x26e1, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000580)={0x17, 0xc, &(0x7f0000000640)=ANY=[@ANYBLOB="184000000100000000000000000000001801000020756c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000000600000018200000", @ANYRES32=r1, @ANYBLOB="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"], &(0x7f0000000000)='GPL\x00', 0x0, 0x4b, &(0x7f0000000280)=""/75, 0x41000, 0xd, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000340)={0x0, 0x2, 0xa534261, 0x3}, 0x10, 0xffffffffffffffff, 0xffffffffffffffff, 0x3, &(0x7f0000000400)=[0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0xffffffffffffffff, r2, 0xffffffffffffffff, 0xffffffffffffffff], &(0x7f0000000440)=[{0x3, 0x2, 0x9, 0xc}, {0x0, 0x2, 0x0, 0x1}, {0x3, 0x0, 0xf}], 0x10, 0x1f}, 0x90) r3 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000000240), &(0x7f0000000280)=0x5) preadv(r0, &(0x7f0000000c80)=[{&(0x7f00000003c0)=""/45, 0xfffffffffffffca1}], 0x1, 0x4, 0xbe9) ioctl$IOCTL_GET_NCIDEV_IDX(r1, 0x0, &(0x7f0000000180)) ioctl$IOCTL_GET_NCIDEV_IDX(r0, 0x0, &(0x7f0000000040)) close_range(r0, r0, 0x0) 20:41:01 executing program 3: r0 = openat$nci(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000380)='freezer.state\x00', 0x26e1, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000580)={0x17, 0xc, &(0x7f0000000640)=ANY=[@ANYBLOB="184000000100000000000000000000001801000020756c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000000600000018200000", @ANYRES32=r1, @ANYBLOB="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"], &(0x7f0000000000)='GPL\x00', 0x0, 0x4b, &(0x7f0000000280)=""/75, 0x41000, 0xd, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000340)={0x0, 0x2, 0xa534261, 0x3}, 0x10, 0xffffffffffffffff, 0xffffffffffffffff, 0x3, &(0x7f0000000400)=[0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0xffffffffffffffff, r2, 0xffffffffffffffff, 0xffffffffffffffff], &(0x7f0000000440)=[{0x3, 0x2, 0x9, 0xc}, {0x0, 0x2, 0x0, 0x1}, {0x3, 0x0, 0xf}], 0x10, 0x1f}, 0x90) r3 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000000240), &(0x7f0000000280)=0x5) preadv(r0, &(0x7f0000000c80)=[{&(0x7f00000003c0)=""/45, 0xfffffffffffffca1}], 0x1, 0x4, 0xbe9) ioctl$IOCTL_GET_NCIDEV_IDX(r1, 0x0, &(0x7f0000000180)) ioctl$IOCTL_GET_NCIDEV_IDX(r0, 0x0, &(0x7f0000000040)) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) close_range(r0, r0, 0x0) [ 112.801542][ T2775] loop1: p2 p3 p7 20:41:01 executing program 3: r0 = openat$nci(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000380)='freezer.state\x00', 0x26e1, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000580)={0x17, 0xc, &(0x7f0000000640)=ANY=[@ANYBLOB="184000000100000000000000000000001801000020756c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000000600000018200000", @ANYRES32=r1, @ANYBLOB="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"], &(0x7f0000000000)='GPL\x00', 0x0, 0x4b, &(0x7f0000000280)=""/75, 0x41000, 0xd, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000340)={0x0, 0x2, 0xa534261, 0x3}, 0x10, 0xffffffffffffffff, 0xffffffffffffffff, 0x3, &(0x7f0000000400)=[0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0xffffffffffffffff, r2, 0xffffffffffffffff, 0xffffffffffffffff], &(0x7f0000000440)=[{0x3, 0x2, 0x9, 0xc}, {0x0, 0x2, 0x0, 0x1}, {0x3, 0x0, 0xf}], 0x10, 0x1f}, 0x90) r3 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000000240), &(0x7f0000000280)=0x5) preadv(r0, &(0x7f0000000c80)=[{&(0x7f00000003c0)=""/45, 0xfffffffffffffca1}], 0x1, 0x4, 0xbe9) ioctl$IOCTL_GET_NCIDEV_IDX(r1, 0x0, &(0x7f0000000180)) ioctl$IOCTL_GET_NCIDEV_IDX(r0, 0x0, &(0x7f0000000040)) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) close_range(r0, r0, 0x0) 20:41:01 executing program 0: r0 = openat$nci(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000380)='freezer.state\x00', 0x26e1, 0x0) close_range(r0, r0, 0x0) [ 112.863645][ T5755] loop1: detected capacity change from 0 to 2048 [ 112.960168][ T5755] loop1: p2 p3 p7 20:41:01 executing program 3: r0 = openat$nci(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000380)='freezer.state\x00', 0x26e1, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000580)={0x17, 0xc, &(0x7f0000000640)=ANY=[@ANYBLOB="184000000100000000000000000000001801000020756c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000000600000018200000", @ANYRES32=r1, @ANYBLOB="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"], &(0x7f0000000000)='GPL\x00', 0x0, 0x4b, &(0x7f0000000280)=""/75, 0x41000, 0xd, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000340)={0x0, 0x2, 0xa534261, 0x3}, 0x10, 0xffffffffffffffff, 0xffffffffffffffff, 0x3, &(0x7f0000000400)=[0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0xffffffffffffffff, r2, 0xffffffffffffffff, 0xffffffffffffffff], &(0x7f0000000440)=[{0x3, 0x2, 0x9, 0xc}, {0x0, 0x2, 0x0, 0x1}, {0x3, 0x0, 0xf}], 0x10, 0x1f}, 0x90) r3 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000000240), &(0x7f0000000280)=0x5) preadv(r0, &(0x7f0000000c80)=[{&(0x7f00000003c0)=""/45, 0xfffffffffffffca1}], 0x1, 0x4, 0xbe9) ioctl$IOCTL_GET_NCIDEV_IDX(r1, 0x0, &(0x7f0000000180)) ioctl$IOCTL_GET_NCIDEV_IDX(r0, 0x0, &(0x7f0000000040)) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) close_range(r0, r0, 0x0) 20:41:01 executing program 0: r0 = openat$nci(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000380)='freezer.state\x00', 0x26e1, 0x0) close_range(r0, r0, 0x0) 20:41:01 executing program 1: ioctl$BTRFS_IOC_LOGICAL_INO(0xffffffffffffffff, 0xc0389424, &(0x7f0000000180)={0x1, 0x28, '\x00', 0x1, &(0x7f0000000080)=[0x0, 0x0, 0x0, 0x0, 0x0]}) r0 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) r1 = dup2(r0, 0xffffffffffffffff) ioctl$FIDEDUPERANGE(0xffffffffffffffff, 0xc0189436, &(0x7f0000000f00)=ANY=[@ANYBLOB="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"]) ioctl$TIOCSBRK(r1, 0x5427) recvfrom$inet6(0xffffffffffffffff, &(0x7f0000000280)=""/134, 0x86, 0x40000102, &(0x7f0000000340)={0xa, 0x4e21, 0x77f, @mcast1, 0x403b3f}, 0x1c) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000001040)={{r1, 0xffffffffffffffff}, &(0x7f0000000140), &(0x7f0000000480)=r0}, 0x20) syz_read_part_table(0x593, &(0x7f00000005c0)="$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") r3 = creat(&(0x7f0000000240)='./file0\x00', 0x0) stat(&(0x7f0000000040)='./file1\x00', &(0x7f0000000380)) fsetxattr$security_capability(r3, &(0x7f0000000100), &(0x7f0000000000)=@v1={0x1000000, [{0x80000000, 0x81}]}, 0xc, 0x0) newfstatat(0xffffffffffffff9c, &(0x7f00000000c0)='./file1\x00', &(0x7f0000001400), 0x400) close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x2) ioctl$TIOCSTI(r3, 0x5412, &(0x7f00000004c0)=0x40) fsync(0xffffffffffffffff) write$binfmt_misc(r3, &(0x7f0000001080)=ANY=[@ANYBLOB="7379d3c6"], 0x4) fallocate(r3, 0x100000011, 0x0, 0x2811fdff) open(&(0x7f0000000100)='.\x00', 0x20c2, 0x2d) open$dir(&(0x7f0000000500)='./file1\x00', 0x1c6c0, 0x0) r4 = openat$vcsu(0xffffffffffffff9c, &(0x7f0000000cc0), 0x400c00, 0x0) lsetxattr$security_selinux(&(0x7f0000001180)='./file1\x00', &(0x7f00000011c0), &(0x7f0000001300)='system_u:object_r:unconfined_exec_t:s0\x00', 0x27, 0x3) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000400)={0xffffffffffffffff, 0xe0, &(0x7f0000000300)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, &(0x7f00000000c0)=[0x0], &(0x7f0000000140), 0x0, 0x8, &(0x7f0000000200)=[{}, {}, {}, {}, {}], 0x28, 0x0, 0x0, 0x0, 0x0, 0x10, 0x8, 0x8, &(0x7f00000002c0)}}, 0x10) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000e80)=@bpf_lsm={0x1d, 0x4, &(0x7f0000000040)=@framed={{0x18, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x73fc}, [@generic={0x9, 0x8, 0x0, 0x7f, 0x200}]}, &(0x7f0000000880)='GPL\x00', 0x1f, 0x93, &(0x7f0000000cc0)=""/147, 0x40f00, 0x2, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, &(0x7f0000000b80)={0x9}, 0x8, 0x10, 0x0, 0x0, r5}, 0x80) r6 = socket$nl_generic(0x10, 0x3, 0x10) r7 = syz_genetlink_get_family_id$tipc(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$TIPC_CMD_ENABLE_BEARER(r6, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000001200)=ANY=[@ANYBLOB="3400000006c08fada241ee0a049e6fba3f36f40da839bbdf54c31768b0026f4261f56d51c5d81ba4cb99f8203c40d0a142fcd75ce26e408d229139f8c4e81109c56a18e453e8a537df21c4ec04a4f3e22f4ac125a28ad43e41107b1f7e79c8573985e54fd665e2913ca74da8c9f3fc2839258c19fa7ac20ebead31206cf280ea73f635bc5418b66554392dfd11874fef72bc53538aae3cb5ef8a80140f4737dd2c572a03ee1d5e3d627e", @ANYRESOCT=0x0, @ANYBLOB="010000000000000000000100000000000000014100000018001700000000000000007564503a73"], 0x34}, 0x1, 0x0, 0x0, 0x1}, 0x0) ioctl$AUTOFS_DEV_IOCTL_PROTOSUBVER(r0, 0xc0189373, &(0x7f0000000540)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x6}}, './file0\x00'}) sendmsg$TIPC_CMD_GET_MAX_PORTS(r4, &(0x7f0000001140)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x40000}, 0xc, &(0x7f0000001100)={&(0x7f00000010c0)={0x1c, r7, 0x400, 0x8000, 0x25dfdbfe, {}, ["", "", "", "", "", "", ""]}, 0x1c}, 0x1, 0x0, 0x0, 0x20048854}, 0x4004) bpf$PROG_LOAD(0x5, &(0x7f0000000e40)={0x5, 0x16, &(0x7f0000001340)=ANY=[@ANYBLOB="390000000100000000000000900000f117fa0000", @ANYRES32=r3, @ANYBLOB="1f00000000000000b703000000000000850000000c000000b61b0453c29f42b5be06c7010b4efffe000000000085000000a900000018150000", @ANYRES32=r2, @ANYBLOB="0000000000000000180100002020782500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b70300000000850000005d000000185500000100000000000000000000009500000000000000"], &(0x7f0000000b80)='syzkaller\x00', 0x1, 0xe8, &(0x7f0000000bc0)=""/232, 0x41000, 0x5b, '\x00', 0x0, 0xe, r4, 0x8, &(0x7f0000000d00)={0x5, 0x2}, 0x8, 0x10, &(0x7f0000000d40)={0x4, 0xe, 0x2, 0x8}, 0x10, r5, r3, 0x5, &(0x7f0000000d80), &(0x7f0000000dc0)=[{0x4, 0x3, 0x0, 0x2}, {0x3, 0x1, 0xa, 0xa}, {0x0, 0x3, 0x2, 0xa}, {0x0, 0x3, 0x7, 0x1}, {0x1, 0x5, 0xb, 0xc}], 0x10, 0x7}, 0x90) [ 112.996918][ T2775] loop1: p2 p3 p7 [ 113.034147][ T3110] udevd[3110]: inotify_add_watch(7, /dev/loop1p3, 10) failed: No such file or directory [ 113.045324][ T4029] udevd[4029]: inotify_add_watch(7, /dev/loop1p7, 10) failed: No such file or directory [ 113.068130][ T5779] loop1: detected capacity change from 0 to 2048 20:41:01 executing program 0: r0 = openat$nci(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000380)='freezer.state\x00', 0x26e1, 0x0) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000580)={0x17, 0xc, &(0x7f0000000640)=ANY=[@ANYBLOB="184000000100000000000000000000001801000020756c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000000600000018200000", @ANYRES32=r1, @ANYBLOB="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"], &(0x7f0000000000)='GPL\x00', 0x0, 0x4b, &(0x7f0000000280)=""/75, 0x41000, 0xd, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000340)={0x0, 0x2, 0xa534261, 0x3}, 0x10, 0xffffffffffffffff, 0xffffffffffffffff, 0x3, &(0x7f0000000400)=[0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0xffffffffffffffff, r2, 0xffffffffffffffff, 0xffffffffffffffff], &(0x7f0000000440)=[{0x3, 0x2, 0x9, 0xc}, {0x0, 0x2, 0x0, 0x1}, {0x3, 0x0, 0xf}], 0x10, 0x1f}, 0x90) r4 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r4, 0x1, 0x11, &(0x7f0000000240), &(0x7f0000000280)=0x5) preadv(r0, &(0x7f0000000c80)=[{&(0x7f00000003c0)=""/45, 0xfffffffffffffca1}], 0x1, 0x4, 0xbe9) ioctl$IOCTL_GET_NCIDEV_IDX(r1, 0x0, &(0x7f0000000180)) ioctl$IOCTL_GET_NCIDEV_IDX(r0, 0x0, &(0x7f0000000040)) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) write$binfmt_misc(r0, &(0x7f0000000b00)={'syz1', "511c3b073c7e31964849a8cd687059f9fa2838028e2ebfcfe3936e6943c0b094648c7e82759ed58c6ec6efa146f2062a522e31319c7883c9a4a7fd72d2cca7c5691b1948922f0d4ef972a22b148775033c0683e95e2d29f1ae130110374e370a72e5984341770921a81a9fa8c6f9b928361837bd28ab9fd4fc9686741065670c73c75e7141a60580ec503c0808b14502614479ee4f9865386da8b39e91556eef247767190fafadcac30081178c6805636450c5289f97ca57cfbb623cb2bad32e9e7b634c1ce6c0aaa9c6e1831e89edd496689ec4ac669c44451871e5dc6d2b5c008a8a6ed947f8499c2d"}, 0xee) ioctl$FAT_IOCTL_SET_ATTRIBUTES(r3, 0x40047211, &(0x7f0000000800)=0x1) openat$cgroup_int(r2, &(0x7f0000000300)='hugetlb.2MB.max_usage_in_bytes\x00', 0x2, 0x0) close_range(r0, r0, 0x0) 20:41:01 executing program 3: ioctl$BTRFS_IOC_LOGICAL_INO(0xffffffffffffffff, 0xc0389424, &(0x7f0000000180)={0x1, 0x28, '\x00', 0x1, &(0x7f0000000080)=[0x0, 0x0, 0x0, 0x0, 0x0]}) r0 = socket$inet6(0xa, 0x3, 0x6) r1 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$FIDEDUPERANGE(r0, 0xc0189436, &(0x7f0000000f00)=ANY=[@ANYBLOB="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"]) ioctl$TIOCSBRK(0xffffffffffffffff, 0x5427) recvfrom$inet6(0xffffffffffffffff, &(0x7f0000000280)=""/134, 0x86, 0x40000102, &(0x7f0000000340)={0xa, 0x4e21, 0x77f, @mcast1, 0x403b3f}, 0x1c) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000001040)={{0xffffffffffffffff, 0xffffffffffffffff}, &(0x7f0000000140), &(0x7f0000000480)=r1}, 0x20) syz_read_part_table(0x593, &(0x7f00000005c0)="$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") r3 = creat(&(0x7f0000000240)='./file0\x00', 0x0) stat(&(0x7f0000000040)='./file1\x00', &(0x7f0000000380)) fsetxattr$security_capability(r3, &(0x7f0000000100), &(0x7f0000000000)=@v1={0x1000000, [{0x80000000, 0x81}]}, 0xc, 0x0) newfstatat(0xffffffffffffff9c, &(0x7f00000000c0)='./file1\x00', &(0x7f0000001400), 0x400) close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x2) ioctl$TIOCSTI(r3, 0x5412, &(0x7f00000004c0)=0x40) fsync(0xffffffffffffffff) write$binfmt_misc(r3, &(0x7f0000001080)=ANY=[@ANYBLOB="7379d3c6"], 0x4) fallocate(r3, 0x100000011, 0x0, 0x2811fdff) open(&(0x7f0000000100)='.\x00', 0x20c2, 0x2d) open$dir(&(0x7f0000000500)='./file1\x00', 0x1c6c0, 0x0) r4 = openat$vcsu(0xffffffffffffff9c, &(0x7f0000000cc0), 0x400c00, 0x0) lsetxattr$security_selinux(&(0x7f0000001180)='./file1\x00', &(0x7f00000011c0), &(0x7f0000001300)='system_u:object_r:unconfined_exec_t:s0\x00', 0x27, 0x3) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000400)={0xffffffffffffffff, 0xe0, &(0x7f0000000300)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, &(0x7f00000000c0)=[0x0], &(0x7f0000000140), 0x0, 0x8, &(0x7f0000000200)=[{}, {}, {}, {}, {}], 0x28, 0x0, 0x0, 0x0, 0x0, 0x10, 0x8, 0x8, &(0x7f00000002c0)}}, 0x10) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000e80)=@bpf_lsm={0x1d, 0x4, &(0x7f0000000040)=@framed={{0x18, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x73fc}, [@generic={0x9, 0x8, 0x0, 0x7f, 0x200}]}, &(0x7f0000000880)='GPL\x00', 0x1f, 0x93, &(0x7f0000000cc0)=""/147, 0x40f00, 0x2, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, &(0x7f0000000b80)={0x9}, 0x8, 0x10, 0x0, 0x0, r5}, 0x80) r6 = socket$nl_generic(0x10, 0x3, 0x10) r7 = syz_genetlink_get_family_id$tipc(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$TIPC_CMD_ENABLE_BEARER(r6, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000001200)=ANY=[@ANYBLOB="3400000006c08fada241ee0a049e6fba3f36f40da839bbdf54c31768b0026f4261f56d51c5d81ba4cb99f8203c40d0a142fcd75ce26e408d229139f8c4e81109c56a18e453e8a537df21c4ec04a4f3e22f4ac125a28ad43e41107b1f7e79c8573985e54fd665e2913ca74da8c9f3fc2839258c19fa7ac20ebead31206cf280ea73f635bc5418b66554392dfd11874fef72bc53538aae3cb5ef8a80140f4737dd2c572a03ee1d5e3d627e", @ANYRESOCT=0x0, @ANYBLOB="010000000000000000000100000000000000014100000018001700000000000000007564503a73"], 0x34}, 0x1, 0x0, 0x0, 0x1}, 0x0) ioctl$AUTOFS_DEV_IOCTL_PROTOSUBVER(r1, 0xc0189373, &(0x7f0000000540)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x6}}, './file0\x00'}) sendmsg$TIPC_CMD_GET_MAX_PORTS(r4, &(0x7f0000001140)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x40000}, 0xc, &(0x7f0000001100)={&(0x7f00000010c0)={0x1c, r7, 0x400, 0x8000, 0x25dfdbfe, {}, ["", "", "", "", "", "", ""]}, 0x1c}, 0x1, 0x0, 0x0, 0x20048854}, 0x4004) bpf$PROG_LOAD(0x5, &(0x7f0000000e40)={0x5, 0x16, &(0x7f0000001340)=ANY=[@ANYBLOB="390000000100000000000000900000f117fa0000", @ANYRES32=r3, @ANYBLOB="1f00000000000000b703000000000000850000000c000000b61b0453c29f42b5be06c7010b4efffe000000000085000000a900000018150000", @ANYRES32=r2, @ANYBLOB="0000000000000000180100002020782500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b70300000000850000005d000000185500000100000000000000000000009500000000000000"], &(0x7f0000000b80)='syzkaller\x00', 0x1, 0xe8, &(0x7f0000000bc0)=""/232, 0x41000, 0x5b, '\x00', 0x0, 0xe, r4, 0x8, &(0x7f0000000d00)={0x5, 0x2}, 0x8, 0x10, &(0x7f0000000d40)={0x4, 0xe, 0x2, 0x8}, 0x10, r5, r3, 0x5, &(0x7f0000000d80), &(0x7f0000000dc0)=[{0x4, 0x3, 0x0, 0x2}, {0x3, 0x1, 0xa, 0xa}, {0x0, 0x3, 0x2, 0xa}, {0x0, 0x3, 0x7, 0x1}, {0x1, 0x5, 0xb, 0xc}], 0x10, 0x7}, 0x90) [ 113.090316][ T3110] udevd[3110]: inotify_add_watch(7, /dev/loop1p7, 10) failed: No such file or directory [ 113.090555][ T3169] udevd[3169]: inotify_add_watch(7, /dev/loop1p3, 10) failed: No such file or directory 20:41:01 executing program 0: r0 = openat$nci(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000380)='freezer.state\x00', 0x26e1, 0x0) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000580)={0x17, 0xc, &(0x7f0000000640)=ANY=[@ANYBLOB="184000000100000000000000000000001801000020756c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000000600000018200000", @ANYRES32=r1, @ANYBLOB="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"], &(0x7f0000000000)='GPL\x00', 0x0, 0x4b, &(0x7f0000000280)=""/75, 0x41000, 0xd, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000340)={0x0, 0x2, 0xa534261, 0x3}, 0x10, 0xffffffffffffffff, 0xffffffffffffffff, 0x3, &(0x7f0000000400)=[0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0xffffffffffffffff, r2, 0xffffffffffffffff, 0xffffffffffffffff], &(0x7f0000000440)=[{0x3, 0x2, 0x9, 0xc}, {0x0, 0x2, 0x0, 0x1}, {0x3, 0x0, 0xf}], 0x10, 0x1f}, 0x90) r4 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r4, 0x1, 0x11, &(0x7f0000000240), &(0x7f0000000280)=0x5) preadv(r0, &(0x7f0000000c80)=[{&(0x7f00000003c0)=""/45, 0xfffffffffffffca1}], 0x1, 0x4, 0xbe9) ioctl$IOCTL_GET_NCIDEV_IDX(r1, 0x0, &(0x7f0000000180)) ioctl$IOCTL_GET_NCIDEV_IDX(r0, 0x0, &(0x7f0000000040)) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) write$binfmt_misc(r0, &(0x7f0000000b00)={'syz1', "511c3b073c7e31964849a8cd687059f9fa2838028e2ebfcfe3936e6943c0b094648c7e82759ed58c6ec6efa146f2062a522e31319c7883c9a4a7fd72d2cca7c5691b1948922f0d4ef972a22b148775033c0683e95e2d29f1ae130110374e370a72e5984341770921a81a9fa8c6f9b928361837bd28ab9fd4fc9686741065670c73c75e7141a60580ec503c0808b14502614479ee4f9865386da8b39e91556eef247767190fafadcac30081178c6805636450c5289f97ca57cfbb623cb2bad32e9e7b634c1ce6c0aaa9c6e1831e89edd496689ec4ac669c44451871e5dc6d2b5c008a8a6ed947f8499c2d"}, 0xee) ioctl$FAT_IOCTL_SET_ATTRIBUTES(r3, 0x40047211, &(0x7f0000000800)=0x1) openat$cgroup_int(r2, &(0x7f0000000300)='hugetlb.2MB.max_usage_in_bytes\x00', 0x2, 0x0) close_range(r0, r0, 0x0) 20:41:01 executing program 4: r0 = perf_event_open(&(0x7f0000000a40)={0x2, 0x80, 0xcd, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @perf_bp={&(0x7f0000000200), 0x8}, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfb75}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000040)={0x0, 0x4, 0x0, &(0x7f0000000180)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x80) perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x208, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x4, 0x8001}, 0x4000, 0x0, 0x0, 0x0, 0x0, 0x14e, 0xd1}, 0x0, 0xbfffffffffffffff, r0, 0x19893a9f0a0e2244) r1 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) syz_clone(0x2000000, 0x0, 0x0, 0x0, 0x0, 0x0) r2 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x18, 0x5, &(0x7f00000002c0)=ANY=[@ANYBLOB="180000001800ff0f0000000000000000850000006d000000750000000800000095"], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x80) r3 = perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400, 0x80000, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x7, 0x1007}, 0x8006, 0x0, 0x0, 0x1, 0x4, 0x800000, 0x3}, 0x0, 0xffefffffffffffff, 0xffffffffffffffff, 0x9) ioctl$PERF_EVENT_IOC_SET_FILTER(r3, 0x40082406, &(0x7f00000003c0)='memory.numa_stat\x00') perf_event_open(0x0, 0x0, 0x0, r3, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000080)='sched_switch\x00', r2}, 0x10) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000380)={{0x1, 0xffffffffffffffff}, &(0x7f0000000000), &(0x7f0000000240)=r2}, 0x20) r5 = memfd_secret(0x0) syz_io_uring_setup(0x0, &(0x7f0000000300)={0x0, 0x2, 0x0, 0x0, 0x0, 0x0, r5}, 0x0, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f00000009c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000000a00)=0x14) r7 = openat2(0xffffffffffffff9c, &(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)={0x40841}, 0x18) write$binfmt_script(r7, &(0x7f0000000340)=ANY=[], 0xfffffdef) r8 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000b40)={0x1b, 0x0, 0x0, 0x7, 0x0, 0xffffffffffffffff, 0x200, '\x00', 0x0, 0xffffffffffffffff, 0x3, 0x1, 0x4}, 0x48) r9 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000bc0)={0x2, 0x4, 0x8, 0x1, 0x80, 0x1, 0x9, '\x00', 0x0, 0xffffffffffffffff, 0x4, 0x1, 0x4}, 0x48) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000d00)={0x11, 0x12, &(0x7f0000000440)=@raw=[@exit, @ringbuf_query={{0x18, 0x1, 0x1, 0x0, r4}}, @ringbuf_output={{0x18, 0x1, 0x1, 0x0, r5}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x10001}, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x4, 0x0, 0x0, 0x2}}, @exit, @initr0={0x18, 0x0, 0x0, 0x0, 0x6349, 0x0, 0x0, 0x0, 0xf685}, @ldst={0x3, 0x2, 0x1, 0x0, 0xb, 0x2543a83bb932833c, 0x1}], &(0x7f0000000940)='syzkaller\x00', 0x80000001, 0x27, &(0x7f0000000980)=""/39, 0x41000, 0x40, '\x00', r6, 0x0, r7, 0x8, &(0x7f0000000ac0)={0x3, 0x1}, 0x8, 0x10, &(0x7f0000000b00)={0x2, 0xc, 0xfffffe00, 0x2}, 0x10, 0x0, 0x0, 0x5, &(0x7f0000000c40)=[r2, 0x1, 0x1, r8, r9, r1], &(0x7f0000000c80)=[{0x4, 0x1, 0x8, 0xc}, {0x0, 0x4, 0xf, 0x4}, {0x1, 0x2, 0xd, 0x6}, {0x0, 0x4, 0x10, 0xc}, {0x2, 0x4, 0xd, 0x1}], 0x10, 0x20}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000280)={&(0x7f0000000140)='ext4_ext_show_extent\x00', r2}, 0x10) r10 = perf_event_open(&(0x7f0000000080)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) perf_event_open$cgroup(&(0x7f0000000300)={0x5, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_bp={&(0x7f0000000100)}, 0x81252, 0x6, 0x80000001, 0x0, 0x0, 0x0, 0x6, 0x0, 0x6, 0x0, 0x6}, 0xffffffffffffffff, 0xe, 0xffffffffffffffff, 0xc) perf_event_open(0x0, 0x0, 0x2, 0xffffffffffffffff, 0xb) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) perf_event_open(&(0x7f0000000840)={0x2, 0x80, 0x0, 0x7, 0x0, 0x80, 0x0, 0x3, 0x0, 0x9, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, @perf_config_ext={0x8000000000, 0x3}, 0x46c73247dfbe0d, 0x1007e, 0x0, 0x2, 0x0, 0x0, 0x6, 0x0, 0xffffffff, 0x0, 0x1c}, 0x0, 0x9, 0xffffffffffffffff, 0xd) bpf$PROG_LOAD(0x5, &(0x7f0000000780)={0x14, 0x4, &(0x7f00000008c0)=ANY=[@ANYBLOB="850000006b00000018150000a3df7ddd9621fb0201050062d91123e632b2f902ad1e9f1cc7a66ed51ac8a4070000000000000019a83f0b7c9502871fb1ca3dc499e804bbbc359859ed6fd9f104fc7ed900d122072d8275a24d000000000601c3a63953a7b36fe458", @ANYRES32, @ANYBLOB="00000000000000002d59e4eda4000000"], &(0x7f0000000400)='syzkaller\x00', 0xfff, 0xe3, &(0x7f0000000580)=""/227, 0x0, 0x4, '\x00', 0x0, 0x24, 0xffffffffffffffff, 0x8, &(0x7f0000000500)={0x1, 0x3}, 0x8, 0x10, &(0x7f0000000680)={0x5, 0x6, 0x81, 0x9}, 0x10, 0xffffffffffffffff, 0xffffffffffffffff, 0x0, &(0x7f00000006c0)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, r10]}, 0x80) 20:41:01 executing program 1: r0 = socket$inet6(0xa, 0x3, 0x6) r1 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) r2 = dup2(r1, r0) ioctl$FIDEDUPERANGE(r0, 0xc0189436, &(0x7f0000000f00)=ANY=[@ANYBLOB="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"]) ioctl$TIOCSBRK(r2, 0x5427) recvfrom$inet6(0xffffffffffffffff, &(0x7f0000000280)=""/134, 0x86, 0x40000102, &(0x7f0000000340)={0xa, 0x4e21, 0x77f, @mcast1, 0x403b3f}, 0x1c) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000001040)={{r2, 0xffffffffffffffff}, &(0x7f0000000140), &(0x7f0000000480)=r1}, 0x20) syz_read_part_table(0x593, &(0x7f00000005c0)="$eJzs0r1LK2kUB+A3A5c0e4lcLli4hWCwigqx0CIpRGJIY0RcsbAWLLQQLCwkEq39+AcUv0BsxD6lGEEUYiUpxXpBsUmVZdfZxmplUdnleZrhPefMHF5+E/hPi8Lv7XY7EUJoJ9//9m+nhbFS98TI5FQIiTAbQij8+stfnUQ88fdXz+NzOT6XktnG/vXo82nHTc9dPX0Yxf1aFMJaCGHh4Sj1b+/G/99Z/jK1vrFU3FzJz98XVx8H5/oKXVuFxZ2hg1xlujM3E/9Ytehz9qcbw8e37fLT7vf+b/VGK3sVz2USH7Ofr/U2/72f1Wa1Nd57sjyQ+dG8qGzHub/IHwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA+GBn+cvU+sZScXMlP39fXH0cnOsrdG0VFneGDnKV6c7cTPQ6V4s+Z3+6MXx82y4/7X7v/1ZvtLJX8Vwm8TH7+Vpv89/7WW1WW+O9J8sDmR/Ni8p2nPuL/AEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAACAf6gwVuqeGJmcCiERZkMIo1HH0Z/1dvK1n4jnzuNnOa6XktnG/vXo82nHTc9dPX04EddrUQhrIYSFh6PUp1+Gd/sjAAD///tch0s=") r4 = creat(&(0x7f0000000240)='./file0\x00', 0x0) stat(&(0x7f0000000040)='./file1\x00', &(0x7f0000000380)) fsetxattr$security_capability(r4, &(0x7f0000000100), &(0x7f0000000000)=@v1={0x1000000, [{0x80000000, 0x81}]}, 0xc, 0x0) newfstatat(0xffffffffffffff9c, &(0x7f00000000c0)='./file1\x00', &(0x7f0000001400), 0x400) close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x2) ioctl$TIOCSTI(r4, 0x5412, &(0x7f00000004c0)=0x40) fsync(0xffffffffffffffff) write$binfmt_misc(r4, &(0x7f0000001080)=ANY=[@ANYBLOB="7379d3c6"], 0x4) fallocate(r4, 0x100000011, 0x0, 0x2811fdff) open(&(0x7f0000000100)='.\x00', 0x20c2, 0x2d) open$dir(&(0x7f0000000500)='./file1\x00', 0x1c6c0, 0x0) r5 = openat$vcsu(0xffffffffffffff9c, &(0x7f0000000cc0), 0x400c00, 0x0) lsetxattr$security_selinux(&(0x7f0000001180)='./file1\x00', &(0x7f00000011c0), &(0x7f0000001300)='system_u:object_r:unconfined_exec_t:s0\x00', 0x27, 0x3) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000400)={0xffffffffffffffff, 0xe0, &(0x7f0000000300)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, &(0x7f00000000c0)=[0x0], &(0x7f0000000140), 0x0, 0x8, &(0x7f0000000200)=[{}, {}, {}, {}, {}], 0x28, 0x0, 0x0, 0x0, 0x0, 0x10, 0x8, 0x8, &(0x7f00000002c0)}}, 0x10) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000e80)=@bpf_lsm={0x1d, 0x4, &(0x7f0000000040)=@framed={{0x18, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x73fc}, [@generic={0x9, 0x8, 0x0, 0x7f, 0x200}]}, &(0x7f0000000880)='GPL\x00', 0x1f, 0x93, &(0x7f0000000cc0)=""/147, 0x40f00, 0x2, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, &(0x7f0000000b80)={0x9}, 0x8, 0x10, 0x0, 0x0, r6}, 0x80) r7 = socket$nl_generic(0x10, 0x3, 0x10) r8 = syz_genetlink_get_family_id$tipc(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$TIPC_CMD_ENABLE_BEARER(r7, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000001200)=ANY=[@ANYBLOB="3400000006c08fada241ee0a049e6fba3f36f40da839bbdf54c31768b0026f4261f56d51c5d81ba4cb99f8203c40d0a142fcd75ce26e408d229139f8c4e81109c56a18e453e8a537df21c4ec04a4f3e22f4ac125a28ad43e41107b1f7e79c8573985e54fd665e2913ca74da8c9f3fc2839258c19fa7ac20ebead31206cf280ea73f635bc5418b66554392dfd11874fef72bc53538aae3cb5ef8a80140f4737dd2c572a03ee1d5e3d627e", @ANYRESOCT=0x0, @ANYBLOB="010000000000000000000100000000000000014100000018001700000000000000007564503a73"], 0x34}, 0x1, 0x0, 0x0, 0x1}, 0x0) ioctl$AUTOFS_DEV_IOCTL_PROTOSUBVER(r1, 0xc0189373, &(0x7f0000000540)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x6}}, './file0\x00'}) sendmsg$TIPC_CMD_GET_MAX_PORTS(r5, &(0x7f0000001140)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x40000}, 0xc, &(0x7f0000001100)={&(0x7f00000010c0)={0x1c, r8, 0x400, 0x8000, 0x25dfdbfe, {}, ["", "", "", "", "", "", ""]}, 0x1c}, 0x1, 0x0, 0x0, 0x20048854}, 0x4004) bpf$PROG_LOAD(0x5, &(0x7f0000000e40)={0x5, 0x16, &(0x7f0000001340)=ANY=[@ANYBLOB="390000000100000000000000900000f117fa0000", @ANYRES32=r4, @ANYBLOB="1f00000000000000b703000000000000850000000c000000b61b0453c29f42b5be06c7010b4efffe000000000085000000a900000018150000", @ANYRES32=r3, @ANYBLOB="0000000000000000180100002020782500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b70300000000850000005d000000185500000100000000000000000000009500000000000000"], &(0x7f0000000b80)='syzkaller\x00', 0x1, 0xe8, &(0x7f0000000bc0)=""/232, 0x41000, 0x5b, '\x00', 0x0, 0xe, r5, 0x8, &(0x7f0000000d00)={0x5, 0x2}, 0x8, 0x10, &(0x7f0000000d40)={0x4, 0xe, 0x2, 0x8}, 0x10, r6, r4, 0x5, &(0x7f0000000d80), &(0x7f0000000dc0)=[{0x4, 0x3, 0x0, 0x2}, {0x3, 0x1, 0xa, 0xa}, {0x0, 0x3, 0x2, 0xa}, {0x0, 0x3, 0x7, 0x1}, {0x1, 0x5, 0xb, 0xc}], 0x10, 0x7}, 0x90) [ 113.198825][ T5779] loop1: p2 p3 p7 [ 113.200366][ T5794] loop3: detected capacity change from 0 to 2048 [ 113.237205][ T2775] loop1: p2 p3 p7 20:41:01 executing program 0: r0 = openat$nci(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) close_range(r0, 0xffffffffffffffff, 0x0) (fail_nth: 1) 20:41:01 executing program 2: r0 = perf_event_open(&(0x7f0000000a40)={0x2, 0x80, 0xcd, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @perf_bp={&(0x7f0000000200), 0x8}, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfb75}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000040)={0x0, 0x4, 0x0, &(0x7f0000000180)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x80) perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x208, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x4, 0x8001}, 0x4000, 0x0, 0x0, 0x0, 0x0, 0x14e, 0xd1}, 0x0, 0xbfffffffffffffff, r0, 0x19893a9f0a0e2244) r1 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) syz_clone(0x2000000, 0x0, 0x0, 0x0, 0x0, 0x0) r2 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x18, 0x5, &(0x7f00000002c0)=ANY=[@ANYBLOB="180000001800ff0f0000000000000000850000006d000000750000000800000095"], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x80) r3 = perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400, 0x80000, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x7, 0x1007}, 0x8006, 0x0, 0x0, 0x1, 0x4, 0x800000, 0x3}, 0x0, 0xffefffffffffffff, 0xffffffffffffffff, 0x9) ioctl$PERF_EVENT_IOC_SET_FILTER(r3, 0x40082406, &(0x7f00000003c0)='memory.numa_stat\x00') perf_event_open(0x0, 0x0, 0x0, r3, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000080)='sched_switch\x00', r2}, 0x10) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000380)={{0x1, 0xffffffffffffffff}, &(0x7f0000000000), &(0x7f0000000240)=r2}, 0x20) r5 = memfd_secret(0x0) syz_io_uring_setup(0x0, &(0x7f0000000300)={0x0, 0x2, 0x0, 0x0, 0x0, 0x0, r5}, 0x0, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f00000009c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000000a00)=0x14) r7 = openat2(0xffffffffffffff9c, &(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)={0x40841}, 0x18) write$binfmt_script(r7, &(0x7f0000000340)=ANY=[], 0xfffffdef) r8 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000b40)={0x1b, 0x0, 0x0, 0x7, 0x0, 0xffffffffffffffff, 0x200, '\x00', 0x0, 0xffffffffffffffff, 0x3, 0x1, 0x4}, 0x48) r9 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000bc0)={0x2, 0x4, 0x8, 0x1, 0x80, 0x1, 0x9, '\x00', 0x0, 0xffffffffffffffff, 0x4, 0x1, 0x4}, 0x48) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000d00)={0x11, 0x12, &(0x7f0000000440)=@raw=[@exit, @ringbuf_query={{0x18, 0x1, 0x1, 0x0, r4}}, @ringbuf_output={{0x18, 0x1, 0x1, 0x0, r5}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x10001}, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x4, 0x0, 0x0, 0x2}}, @exit, @initr0={0x18, 0x0, 0x0, 0x0, 0x6349, 0x0, 0x0, 0x0, 0xf685}, @ldst={0x3, 0x2, 0x1, 0x0, 0xb, 0x2543a83bb932833c, 0x1}], &(0x7f0000000940)='syzkaller\x00', 0x80000001, 0x27, &(0x7f0000000980)=""/39, 0x41000, 0x40, '\x00', r6, 0x0, r7, 0x8, &(0x7f0000000ac0)={0x3, 0x1}, 0x8, 0x10, &(0x7f0000000b00)={0x2, 0xc, 0xfffffe00, 0x2}, 0x10, 0x0, 0x0, 0x5, &(0x7f0000000c40)=[r2, 0x1, 0x1, r8, r9, r1], &(0x7f0000000c80)=[{0x4, 0x1, 0x8, 0xc}, {0x0, 0x4, 0xf, 0x4}, {0x1, 0x2, 0xd, 0x6}, {0x0, 0x4, 0x10, 0xc}, {0x2, 0x4, 0xd, 0x1}], 0x10, 0x20}, 0x90) r10 = perf_event_open(&(0x7f0000000080)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) r11 = gettid() perf_event_open$cgroup(&(0x7f0000000300)={0x5, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_bp={&(0x7f0000000100)}, 0x81252, 0x6, 0x80000001, 0x0, 0x0, 0x0, 0x6, 0x0, 0x6, 0x0, 0x6}, 0xffffffffffffffff, 0xe, 0xffffffffffffffff, 0xc) perf_event_open(0x0, r11, 0x2, 0xffffffffffffffff, 0xb) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) perf_event_open(&(0x7f0000000840)={0x2, 0x80, 0x0, 0x7, 0x0, 0x80, 0x0, 0x3, 0x0, 0x9, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, @perf_config_ext={0x8000000000, 0x3}, 0x46c73247dfbe0d, 0x1007e, 0x0, 0x2, 0x0, 0x0, 0x6, 0x0, 0xffffffff, 0x0, 0x1c}, 0x0, 0x9, 0xffffffffffffffff, 0xd) bpf$PROG_LOAD(0x5, &(0x7f0000000780)={0x14, 0x4, &(0x7f00000008c0)=ANY=[@ANYBLOB="850000006b00000018150000a3df7ddd9621fb0201050062d91123e632b2f902ad1e9f1cc7a66ed51ac8a4070000000000000019a83f0b7c9502871fb1ca3dc499e804bbbc359859ed6fd9f104fc7ed900d122072d8275a24d000000000601c3a63953a7b36fe458", @ANYRES32, @ANYBLOB="00000000000000002d59e4eda4000000"], &(0x7f0000000400)='syzkaller\x00', 0xfff, 0xe3, &(0x7f0000000580)=""/227, 0x0, 0x4, '\x00', 0x0, 0x24, 0xffffffffffffffff, 0x8, &(0x7f0000000500)={0x1, 0x3}, 0x8, 0x10, &(0x7f0000000680)={0x5, 0x6, 0x81, 0x9}, 0x10, 0xffffffffffffffff, 0xffffffffffffffff, 0x0, &(0x7f00000006c0)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, r10]}, 0x80) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x4030582a, &(0x7f0000000040)=0x91) [ 113.275690][ T3326] I/O error, dev loop1, sector 0 op 0x0:(READ) flags 0x80700 phys_seg 1 prio class 0 [ 113.316280][ T3110] udevd[3110]: inotify_add_watch(7, /dev/loop1p7, 10) failed: No such file or directory [ 113.317608][ T3169] udevd[3169]: inotify_add_watch(7, /dev/loop1p3, 10) failed: No such file or directory [ 113.347459][ T5794] loop3: p2 p3 p7 [ 113.367850][ T5804] FAULT_INJECTION: forcing a failure. [ 113.367850][ T5804] name failslab, interval 1, probability 0, space 0, times 1 [ 113.380643][ T5804] CPU: 0 PID: 5804 Comm: syz-executor.0 Not tainted 6.8.0-rc2-syzkaller-00084-g5c24e4e9e708 #0 [ 113.391008][ T5804] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/25/2024 [ 113.401147][ T5804] Call Trace: [ 113.404452][ T5804] [ 113.407413][ T5804] dump_stack_lvl+0xda/0x130 [ 113.412118][ T5804] dump_stack+0x15/0x20 [ 113.416285][ T5804] should_fail_ex+0x21f/0x230 [ 113.421071][ T5804] __should_failslab+0x92/0xa0 [ 113.425859][ T5804] should_failslab+0x9/0x20 [ 113.430378][ T5804] kmem_cache_alloc_node+0x5e/0x2f0 [ 113.435670][ T5804] ? __alloc_skb+0x10b/0x300 [ 113.440311][ T5804] __alloc_skb+0x10b/0x300 [ 113.444764][ T5804] nfc_genl_device_removed+0x3a/0x1c0 [ 113.450227][ T5804] nfc_unregister_device+0x1b/0x130 [ 113.455439][ T5804] nci_unregister_device+0x14c/0x160 [ 113.460820][ T5804] virtual_ncidev_close+0x30/0x50 [ 113.465936][ T5804] ? virtual_ncidev_open+0x140/0x140 [ 113.471245][ T5804] __fput+0x299/0x630 [ 113.475327][ T5804] ____fput+0x15/0x20 [ 113.479412][ T5804] task_work_run+0x135/0x1a0 [ 113.484160][ T5804] syscall_exit_to_user_mode+0xbd/0x130 [ 113.489827][ T5804] do_syscall_64+0xda/0x1d0 [ 113.494855][ T5804] entry_SYSCALL_64_after_hwframe+0x63/0x6b [ 113.501732][ T5804] RIP: 0033:0x7f0b99a23da9 [ 113.506772][ T5804] Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 e1 20 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b0 ff ff ff f7 d8 64 89 01 48 [ 113.528848][ T5804] RSP: 002b:00007f0b98da50c8 EFLAGS: 00000246 ORIG_RAX: 00000000000001b4 [ 113.537883][ T5804] RAX: 0000000000000000 RBX: 00007f0b99b51f80 RCX: 00007f0b99a23da9 [ 113.546222][ T5804] RDX: 0000000000000000 RSI: ffffffffffffffff RDI: 0000000000000003 [ 113.554223][ T5804] RBP: 00007f0b98da5120 R08: 0000000000000000 R09: 0000000000000000 [ 113.562296][ T5804] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 113.570881][ T5804] R13: 000000000000000b R14: 00007f0b99b51f80 R15: 00007ffd593d5a48 [ 113.579931][ T5804] [ 113.623972][ T5807] loop1: detected capacity change from 0 to 2048 [ 113.652434][ T4031] udevd[4031]: inotify_add_watch(7, /dev/loop1p7, 10) failed: No such file or directory [ 113.661521][ T4029] udevd[4029]: inotify_add_watch(7, /dev/loop1p3, 10) failed: No such file or directory 20:41:02 executing program 0: r0 = openat$nci(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) close_range(r0, 0xffffffffffffffff, 0x0) 20:41:02 executing program 1: r0 = socket$inet6(0xa, 0x3, 0x6) r1 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) r2 = dup2(r1, r0) ioctl$FIDEDUPERANGE(r0, 0xc0189436, &(0x7f0000000f00)=ANY=[@ANYBLOB="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"]) ioctl$TIOCSBRK(r2, 0x5427) recvfrom$inet6(0xffffffffffffffff, &(0x7f0000000280)=""/134, 0x86, 0x40000102, &(0x7f0000000340)={0xa, 0x4e21, 0x77f, @mcast1, 0x403b3f}, 0x1c) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000001040)={{r2, 0xffffffffffffffff}, &(0x7f0000000140), &(0x7f0000000480)=r1}, 0x20) syz_read_part_table(0x593, &(0x7f00000005c0)="$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") r4 = creat(&(0x7f0000000240)='./file0\x00', 0x0) stat(&(0x7f0000000040)='./file1\x00', &(0x7f0000000380)) fsetxattr$security_capability(r4, &(0x7f0000000100), &(0x7f0000000000)=@v1={0x1000000, [{0x80000000, 0x81}]}, 0xc, 0x0) newfstatat(0xffffffffffffff9c, &(0x7f00000000c0)='./file1\x00', &(0x7f0000001400), 0x400) close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x2) ioctl$TIOCSTI(r4, 0x5412, &(0x7f00000004c0)=0x40) fsync(0xffffffffffffffff) write$binfmt_misc(r4, &(0x7f0000001080)=ANY=[@ANYBLOB="7379d3c6"], 0x4) fallocate(r4, 0x100000011, 0x0, 0x2811fdff) open(&(0x7f0000000100)='.\x00', 0x20c2, 0x2d) open$dir(&(0x7f0000000500)='./file1\x00', 0x1c6c0, 0x0) r5 = openat$vcsu(0xffffffffffffff9c, &(0x7f0000000cc0), 0x400c00, 0x0) lsetxattr$security_selinux(&(0x7f0000001180)='./file1\x00', &(0x7f00000011c0), &(0x7f0000001300)='system_u:object_r:unconfined_exec_t:s0\x00', 0x27, 0x3) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000400)={0xffffffffffffffff, 0xe0, &(0x7f0000000300)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, &(0x7f00000000c0)=[0x0], &(0x7f0000000140), 0x0, 0x8, &(0x7f0000000200)=[{}, {}, {}, {}, {}], 0x28, 0x0, 0x0, 0x0, 0x0, 0x10, 0x8, 0x8, &(0x7f00000002c0)}}, 0x10) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000e80)=@bpf_lsm={0x1d, 0x4, &(0x7f0000000040)=@framed={{0x18, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x73fc}, [@generic={0x9, 0x8, 0x0, 0x7f, 0x200}]}, &(0x7f0000000880)='GPL\x00', 0x1f, 0x93, &(0x7f0000000cc0)=""/147, 0x40f00, 0x2, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, &(0x7f0000000b80)={0x9}, 0x8, 0x10, 0x0, 0x0, r6}, 0x80) r7 = socket$nl_generic(0x10, 0x3, 0x10) r8 = syz_genetlink_get_family_id$tipc(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$TIPC_CMD_ENABLE_BEARER(r7, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000001200)=ANY=[@ANYBLOB="3400000006c08fada241ee0a049e6fba3f36f40da839bbdf54c31768b0026f4261f56d51c5d81ba4cb99f8203c40d0a142fcd75ce26e408d229139f8c4e81109c56a18e453e8a537df21c4ec04a4f3e22f4ac125a28ad43e41107b1f7e79c8573985e54fd665e2913ca74da8c9f3fc2839258c19fa7ac20ebead31206cf280ea73f635bc5418b66554392dfd11874fef72bc53538aae3cb5ef8a80140f4737dd2c572a03ee1d5e3d627e", @ANYRESOCT=0x0, @ANYBLOB="010000000000000000000100000000000000014100000018001700000000000000007564503a73"], 0x34}, 0x1, 0x0, 0x0, 0x1}, 0x0) ioctl$AUTOFS_DEV_IOCTL_PROTOSUBVER(r1, 0xc0189373, &(0x7f0000000540)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x6}}, './file0\x00'}) sendmsg$TIPC_CMD_GET_MAX_PORTS(r5, &(0x7f0000001140)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x40000}, 0xc, &(0x7f0000001100)={&(0x7f00000010c0)={0x1c, r8, 0x400, 0x8000, 0x25dfdbfe, {}, ["", "", "", "", "", "", ""]}, 0x1c}, 0x1, 0x0, 0x0, 0x20048854}, 0x4004) bpf$PROG_LOAD(0x5, &(0x7f0000000e40)={0x5, 0x16, &(0x7f0000001340)=ANY=[@ANYBLOB="390000000100000000000000900000f117fa0000", @ANYRES32=r4, @ANYBLOB="1f00000000000000b703000000000000850000000c000000b61b0453c29f42b5be06c7010b4efffe000000000085000000a900000018150000", @ANYRES32=r3, @ANYBLOB="0000000000000000180100002020782500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b70300000000850000005d000000185500000100000000000000000000009500000000000000"], &(0x7f0000000b80)='syzkaller\x00', 0x1, 0xe8, &(0x7f0000000bc0)=""/232, 0x41000, 0x5b, '\x00', 0x0, 0xe, r5, 0x8, &(0x7f0000000d00)={0x5, 0x2}, 0x8, 0x10, &(0x7f0000000d40)={0x4, 0xe, 0x2, 0x8}, 0x10, r6, r4, 0x5, &(0x7f0000000d80), &(0x7f0000000dc0)=[{0x4, 0x3, 0x0, 0x2}, {0x3, 0x1, 0xa, 0xa}, {0x0, 0x3, 0x2, 0xa}, {0x0, 0x3, 0x7, 0x1}, {0x1, 0x5, 0xb, 0xc}], 0x10, 0x7}, 0x90) [ 113.739940][ T5807] loop1: p2 p3 p7 20:41:02 executing program 4: r0 = perf_event_open(&(0x7f0000000a40)={0x2, 0x80, 0xcd, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @perf_bp={&(0x7f0000000200), 0x8}, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfb75}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000040)={0x0, 0x4, 0x0, &(0x7f0000000180)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x80) perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x208, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x4, 0x8001}, 0x4000, 0x0, 0x0, 0x0, 0x0, 0x14e, 0xd1}, 0x0, 0xbfffffffffffffff, r0, 0x19893a9f0a0e2244) r1 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) syz_clone(0x2000000, 0x0, 0x0, 0x0, 0x0, 0x0) r2 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x18, 0x5, &(0x7f00000002c0)=ANY=[@ANYBLOB="180000001800ff0f0000000000000000850000006d000000750000000800000095"], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x80) r3 = perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400, 0x80000, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x7, 0x1007}, 0x8006, 0x0, 0x0, 0x1, 0x4, 0x800000, 0x3}, 0x0, 0xffefffffffffffff, 0xffffffffffffffff, 0x9) ioctl$PERF_EVENT_IOC_SET_FILTER(r3, 0x40082406, &(0x7f00000003c0)='memory.numa_stat\x00') perf_event_open(0x0, 0x0, 0x0, r3, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000080)='sched_switch\x00', r2}, 0x10) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000380)={{0x1, 0xffffffffffffffff}, &(0x7f0000000000), &(0x7f0000000240)=r2}, 0x20) r5 = memfd_secret(0x0) syz_io_uring_setup(0x0, &(0x7f0000000300)={0x0, 0x2, 0x0, 0x0, 0x0, 0x0, r5}, 0x0, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f00000009c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000000a00)=0x14) r7 = openat2(0xffffffffffffff9c, &(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)={0x40841}, 0x18) write$binfmt_script(r7, &(0x7f0000000340)=ANY=[], 0xfffffdef) r8 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000b40)={0x1b, 0x0, 0x0, 0x7, 0x0, 0xffffffffffffffff, 0x200, '\x00', 0x0, 0xffffffffffffffff, 0x3, 0x1, 0x4}, 0x48) r9 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000bc0)={0x2, 0x4, 0x8, 0x1, 0x80, 0x1, 0x9, '\x00', 0x0, 0xffffffffffffffff, 0x4, 0x1, 0x4}, 0x48) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000d00)={0x11, 0x12, &(0x7f0000000440)=@raw=[@exit, @ringbuf_query={{0x18, 0x1, 0x1, 0x0, r4}}, @ringbuf_output={{0x18, 0x1, 0x1, 0x0, r5}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x10001}, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x4, 0x0, 0x0, 0x2}}, @exit, @initr0={0x18, 0x0, 0x0, 0x0, 0x6349, 0x0, 0x0, 0x0, 0xf685}, @ldst={0x3, 0x2, 0x1, 0x0, 0xb, 0x2543a83bb932833c, 0x1}], &(0x7f0000000940)='syzkaller\x00', 0x80000001, 0x27, &(0x7f0000000980)=""/39, 0x41000, 0x40, '\x00', r6, 0x0, r7, 0x8, &(0x7f0000000ac0)={0x3, 0x1}, 0x8, 0x10, &(0x7f0000000b00)={0x2, 0xc, 0xfffffe00, 0x2}, 0x10, 0x0, 0x0, 0x5, &(0x7f0000000c40)=[r2, 0x1, 0x1, r8, r9, r1], &(0x7f0000000c80)=[{0x4, 0x1, 0x8, 0xc}, {0x0, 0x4, 0xf, 0x4}, {0x1, 0x2, 0xd, 0x6}, {0x0, 0x4, 0x10, 0xc}, {0x2, 0x4, 0xd, 0x1}], 0x10, 0x20}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000280)={&(0x7f0000000140)='ext4_ext_show_extent\x00', r2}, 0x10) r10 = perf_event_open(&(0x7f0000000080)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) perf_event_open$cgroup(&(0x7f0000000300)={0x5, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_bp={&(0x7f0000000100)}, 0x81252, 0x6, 0x80000001, 0x0, 0x0, 0x0, 0x6, 0x0, 0x6, 0x0, 0x6}, 0xffffffffffffffff, 0xe, 0xffffffffffffffff, 0xc) perf_event_open(0x0, 0x0, 0x2, 0xffffffffffffffff, 0xb) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) perf_event_open(&(0x7f0000000840)={0x2, 0x80, 0x0, 0x7, 0x0, 0x80, 0x0, 0x3, 0x0, 0x9, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, @perf_config_ext={0x8000000000, 0x3}, 0x46c73247dfbe0d, 0x1007e, 0x0, 0x2, 0x0, 0x0, 0x6, 0x0, 0xffffffff, 0x0, 0x1c}, 0x0, 0x9, 0xffffffffffffffff, 0xd) bpf$PROG_LOAD(0x5, &(0x7f0000000780)={0x14, 0x4, &(0x7f00000008c0)=ANY=[@ANYBLOB="850000006b00000018150000a3df7ddd9621fb0201050062d91123e632b2f902ad1e9f1cc7a66ed51ac8a4070000000000000019a83f0b7c9502871fb1ca3dc499e804bbbc359859ed6fd9f104fc7ed900d122072d8275a24d000000000601c3a63953a7b36fe458", @ANYRES32, @ANYBLOB="00000000000000002d59e4eda4000000"], &(0x7f0000000400)='syzkaller\x00', 0xfff, 0xe3, &(0x7f0000000580)=""/227, 0x0, 0x4, '\x00', 0x0, 0x24, 0xffffffffffffffff, 0x8, &(0x7f0000000500)={0x1, 0x3}, 0x8, 0x10, &(0x7f0000000680)={0x5, 0x6, 0x81, 0x9}, 0x10, 0xffffffffffffffff, 0xffffffffffffffff, 0x0, &(0x7f00000006c0)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, r10]}, 0x80) 20:41:02 executing program 3: gettid() bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) fstat(0xffffffffffffffff, 0x0) r0 = getegid() syz_mount_image$ext4(&(0x7f0000000100)='ext4\x00', &(0x7f0000000200)='./file1\x00', 0x3000000, &(0x7f0000003040)=ANY=[@ANYRES64=r0, @ANYBLOB="8555591a163448f4c52bee6cc0e12a6a8610718f818822e94c360e46f93ac9c63a1b40ea9d758c2b4e2d7c386a141016d11cb13fabc846fc7fb242c175fbdf96e2a96e80e82b73987b1d5dfd843c7e6748a15a0c4160f5e4c468e8f8e417bd3385546159881194fe3a7cf8307cd9c7ce0ca180a481d4dcaa6611ec5c8ff1c546360dea3da9f2bfc1fd71af9ebf2afe4285f013a3929a7096097976a16e2060e5f26e379011ea1811", @ANYRES64, @ANYBLOB="ca42ad87c41bb3b2507e4e12104f0cd507000001046f9445657db4996b10208d04454e11fb5b1383c5ce98e3062f45ec04e5b8b179df3d64a6cec05d29235e3cbe0b339abe9faee5cf3e44c97ce56a1dc359047114eeb3c23f331114039d75a664afc47e8273b79e83d301fc4ceec8b89911505b6743797c459195a7120ded1748f315deb90000ffed00000000000000", @ANYRES8=r0, @ANYRES8=r0, @ANYRES64, @ANYBLOB="bd85893dee1670c8c7e3b4a65ec61f224992fd11263b7749c7ee63dd4fc13cc5dfdde8a3099aaf21ece351c316d9bbd7e4ecc524c856f20d6a1818d6d75f702eb904653f9d55af", @ANYRESOCT], 0x1, 0x513, &(0x7f0000000c40)="$eJzs3W9rJHcdAPDvTLJp7i41WxU5C7bFVu6K3m7S2DaKtBVEHxXU+jzGZBNCNtmQ3dRLKJriCxBEVPAF+ETwBQjSlyDCgT4XFUX0Th/qjczuRPNnN1mSTfbcfD4w2d9v/n2/vyE7O39+zARwbb0QEW9FxFhEvBwR08X4tBgW8sp+Z75HD99byocksuydvyWRFOMO1pXXxyPiVmeRmIyIr38l4lvJybjN3b31xXq9tl3Uq62NrWpzd+/e2sbiam21tjk3N/va/Ovzr87PZIULtbMcEW986U8/+v7PvvzGrz7z7d8v/OXud/K0vvCxTt4RsXShAD101l1qb4sD+TbavoxgQ5K3pzQ27CwAAOhHfoz/4Yj4ZPv4fzrG2kdzAAAAwCjJ3pyKfyURGQAAADCy0oiYiiStFH0BpiJNK5VOH96Pxs203mi2Pr3S2NlczqdFlKOUrqzVazNFX+FylJK8Plv0sT2ov3KsPhcRz0TED6dvtOuVpUZ9edgXPwAAAOCauPX80fP/f06n7TIAAAAwYso9KwAAAMCocMoPAAAAo8/5PwAAAIy0r779dj5kB+/xXn53d2e98e695VpzvbKxs1RZamxvVVYbjdX2M/s2zlpfvdHY+mxs7tyvtmrNVrW5u7ew0djZbC2sHXkFNgAAAHCFnnn+g98lEbH/+RvtIYrnAAIc8cdhJwAM0tiwEwCGZnzYCQBDUzpzDnsIGHXJGdNPdt7pXCuMX19OPgAAwODd+fjJ+/8TxbSzrw0A/8/09QGA68fdPbi+SuftAXh70JkAw/KhzsdTvab3fHhHH/f/O9cYsuxciQEAAAMz1R6StFIcp09FmlYqEU+3XwtQSlbW6rWZ4vzgt9Olp/L6bHvJ5Mw+wwAAAAAAAAAAAAAAAAAAAAAAAABAR5YlkQEAAAAjLSL9c9J+mn/EnemXpo5eHTj21q+fvvPj+4ut1vZsxETy9+l81EREtH5SjH8l80oAAAAAeAJ0ztOLz9lhZwMAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAADAqHn08L2lg+Eq4/71ixFR7hZ/PCbbn5NRioib/0hi/NBySUSMDSD+/vsRcbtb/CQeZ1lWLrLoFv/GJccvtzdN9/hpRNwaQHy4zj7I9z9vdfv+pfFC+7P792+8GC6q9/4v/e/+b6zH/ufpY/Venn3wi2rP+O9HPDveff9zED/pxD8SIq+82Gcbv/mNvb2uEw6tslv8w7GqrY2tanN3797axuJqbbW2OTc3+9r86/Ovzs9UV9bqteJv1zA/+MQvH5/W/ps94pePtv/E9n+pr9Zn8e8H9x9+pFMpdYt/98Xuv7+3e8RPi9++TxXlfPqdg/J+p3zYcz//zXOntX+5R/snz2j/3b7aH597+Wvf+0PXKSe2BgBwFZq7e+uL9Xpt+5TCZB/zXHHhzScjjQEW4slIY1iF7Lud/8eLreeCi58oZBdZfDwGkMbEie/pWJx3hUnEfr6uPv8hAQCAEfO/g/7T7iABAAAAAAAAAAAAAAAAAAAAl+mcjyWbjIi+Zz4ec384TQUAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAONV/AgAA//8FStFZ") (fail_nth: 1) 20:41:02 executing program 2: r0 = perf_event_open(&(0x7f0000000a40)={0x2, 0x80, 0xcd, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @perf_bp={&(0x7f0000000200), 0x8}, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfb75}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000040)={0x0, 0x4, 0x0, &(0x7f0000000180)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x80) perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x208, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x4, 0x8001}, 0x4000, 0x0, 0x0, 0x0, 0x0, 0x14e, 0xd1}, 0x0, 0xbfffffffffffffff, r0, 0x19893a9f0a0e2244) r1 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) syz_clone(0x2000000, 0x0, 0x0, 0x0, 0x0, 0x0) r2 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x18, 0x5, &(0x7f00000002c0)=ANY=[@ANYBLOB="180000001800ff0f0000000000000000850000006d000000750000000800000095"], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x80) r3 = perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400, 0x80000, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x7, 0x1007}, 0x8006, 0x0, 0x0, 0x1, 0x4, 0x800000, 0x3}, 0x0, 0xffefffffffffffff, 0xffffffffffffffff, 0x9) ioctl$PERF_EVENT_IOC_SET_FILTER(r3, 0x40082406, &(0x7f00000003c0)='memory.numa_stat\x00') perf_event_open(0x0, 0x0, 0x0, r3, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000080)='sched_switch\x00', r2}, 0x10) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000380)={{0x1, 0xffffffffffffffff}, &(0x7f0000000000), &(0x7f0000000240)=r2}, 0x20) r5 = memfd_secret(0x0) syz_io_uring_setup(0x0, &(0x7f0000000300)={0x0, 0x2, 0x0, 0x0, 0x0, 0x0, r5}, 0x0, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f00000009c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000000a00)=0x14) r7 = openat2(0xffffffffffffff9c, &(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)={0x40841}, 0x18) write$binfmt_script(r7, &(0x7f0000000340)=ANY=[], 0xfffffdef) r8 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000b40)={0x1b, 0x0, 0x0, 0x7, 0x0, 0xffffffffffffffff, 0x200, '\x00', 0x0, 0xffffffffffffffff, 0x3, 0x1, 0x4}, 0x48) r9 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000bc0)={0x2, 0x4, 0x8, 0x1, 0x80, 0x1, 0x9, '\x00', 0x0, 0xffffffffffffffff, 0x4, 0x1, 0x4}, 0x48) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000d00)={0x11, 0x12, &(0x7f0000000440)=@raw=[@exit, @ringbuf_query={{0x18, 0x1, 0x1, 0x0, r4}}, @ringbuf_output={{0x18, 0x1, 0x1, 0x0, r5}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x10001}, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x4, 0x0, 0x0, 0x2}}, @exit, @initr0={0x18, 0x0, 0x0, 0x0, 0x6349, 0x0, 0x0, 0x0, 0xf685}, @ldst={0x3, 0x2, 0x1, 0x0, 0xb, 0x2543a83bb932833c, 0x1}], &(0x7f0000000940)='syzkaller\x00', 0x80000001, 0x27, &(0x7f0000000980)=""/39, 0x41000, 0x40, '\x00', r6, 0x0, r7, 0x8, &(0x7f0000000ac0)={0x3, 0x1}, 0x8, 0x10, &(0x7f0000000b00)={0x2, 0xc, 0xfffffe00, 0x2}, 0x10, 0x0, 0x0, 0x5, &(0x7f0000000c40)=[r2, 0x1, 0x1, r8, r9, r1], &(0x7f0000000c80)=[{0x4, 0x1, 0x8, 0xc}, {0x0, 0x4, 0xf, 0x4}, {0x1, 0x2, 0xd, 0x6}, {0x0, 0x4, 0x10, 0xc}, {0x2, 0x4, 0xd, 0x1}], 0x10, 0x20}, 0x90) r10 = perf_event_open(&(0x7f0000000080)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) r11 = gettid() perf_event_open$cgroup(&(0x7f0000000300)={0x5, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_bp={&(0x7f0000000100)}, 0x81252, 0x6, 0x80000001, 0x0, 0x0, 0x0, 0x6, 0x0, 0x6, 0x0, 0x6}, 0xffffffffffffffff, 0xe, 0xffffffffffffffff, 0xc) perf_event_open(0x0, r11, 0x2, 0xffffffffffffffff, 0xb) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) perf_event_open(&(0x7f0000000840)={0x2, 0x80, 0x0, 0x7, 0x0, 0x80, 0x0, 0x3, 0x0, 0x9, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, @perf_config_ext={0x8000000000, 0x3}, 0x46c73247dfbe0d, 0x1007e, 0x0, 0x2, 0x0, 0x0, 0x6, 0x0, 0xffffffff, 0x0, 0x1c}, 0x0, 0x9, 0xffffffffffffffff, 0xd) bpf$PROG_LOAD(0x5, &(0x7f0000000780)={0x14, 0x4, &(0x7f00000008c0)=ANY=[@ANYBLOB="850000006b00000018150000a3df7ddd9621fb0201050062d91123e632b2f902ad1e9f1cc7a66ed51ac8a4070000000000000019a83f0b7c9502871fb1ca3dc499e804bbbc359859ed6fd9f104fc7ed900d122072d8275a24d000000000601c3a63953a7b36fe458", @ANYRES32, @ANYBLOB="00000000000000002d59e4eda4000000"], &(0x7f0000000400)='syzkaller\x00', 0xfff, 0xe3, &(0x7f0000000580)=""/227, 0x0, 0x4, '\x00', 0x0, 0x24, 0xffffffffffffffff, 0x8, &(0x7f0000000500)={0x1, 0x3}, 0x8, 0x10, &(0x7f0000000680)={0x5, 0x6, 0x81, 0x9}, 0x10, 0xffffffffffffffff, 0xffffffffffffffff, 0x0, &(0x7f00000006c0)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, r10]}, 0x80) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x4030582a, &(0x7f0000000040)=0x91) 20:41:02 executing program 0: r0 = openat$nci(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) close_range(r0, 0xffffffffffffffff, 0x2) [ 113.811247][ T2775] loop1: p2 p3 p7 [ 113.838891][ T2775] I/O error, dev loop3, sector 0 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 0 [ 113.848110][ T2775] Buffer I/O error on dev loop3, logical block 0, async page read [ 113.855960][ T2775] loop3: unable to read partition table [ 113.861989][ T2775] loop3: partition table beyond EOD, truncated [ 113.874778][ T3326] I/O error, dev loop1, sector 0 op 0x0:(READ) flags 0x80700 phys_seg 1 prio class 0 [ 113.891314][ T5836] FAULT_INJECTION: forcing a failure. [ 113.891314][ T5836] name failslab, interval 1, probability 0, space 0, times 0 [ 113.904105][ T5836] CPU: 1 PID: 5836 Comm: syz-executor.3 Not tainted 6.8.0-rc2-syzkaller-00084-g5c24e4e9e708 #0 [ 113.914564][ T5836] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/25/2024 [ 113.924740][ T5836] Call Trace: [ 113.928118][ T5836] [ 113.931155][ T5836] dump_stack_lvl+0xda/0x130 [ 113.935957][ T5836] dump_stack+0x15/0x20 [ 113.940199][ T5836] should_fail_ex+0x21f/0x230 [ 113.941009][ T5837] loop1: detected capacity change from 0 to 2048 [ 113.944918][ T5836] ? __se_sys_memfd_create+0x22f/0x610 [ 113.956899][ T5836] __should_failslab+0x92/0xa0 [ 113.961687][ T5836] should_failslab+0x9/0x20 [ 113.966299][ T5836] __kmalloc+0xb6/0x3b0 [ 113.970475][ T5836] ? strnlen_user+0x146/0x1e0 [ 113.975194][ T5836] __se_sys_memfd_create+0x22f/0x610 [ 113.980530][ T5836] __x64_sys_memfd_create+0x31/0x40 [ 113.985742][ T5836] do_syscall_64+0xcd/0x1d0 [ 113.990270][ T5836] ? switch_fpu_return+0xe/0x10 [ 113.995126][ T5836] entry_SYSCALL_64_after_hwframe+0x63/0x6b [ 114.001120][ T5836] RIP: 0033:0x7fde2b9d7da9 [ 114.005548][ T5836] Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 e1 20 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b0 ff ff ff f7 d8 64 89 01 48 [ 114.025362][ T5836] RSP: 002b:00007fde2ad58ea8 EFLAGS: 00000202 ORIG_RAX: 000000000000013f [ 114.033796][ T5836] RAX: ffffffffffffffda RBX: 0000000000000513 RCX: 00007fde2b9d7da9 [ 114.041885][ T5836] RDX: 00007fde2ad58f80 RSI: 0000000000000000 RDI: 00007fde2ba236e1 [ 114.049957][ T5836] RBP: 0000000020000c40 R08: 00007fde2ad58c47 R09: 00007fde2ad58ed0 [ 114.057944][ T5836] R10: 000000000000000a R11: 0000000000000202 R12: 0000000020000200 [ 114.066020][ T5836] R13: 00007fde2ad58f80 R14: 00007fde2ad58f40 R15: 0000000020003040 [ 114.074021][ T5836] 20:41:02 executing program 0: r0 = openat$nci(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) close_range(r0, 0xffffffffffffffff, 0x3) 20:41:02 executing program 3: gettid() bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) fstat(0xffffffffffffffff, 0x0) r0 = getegid() syz_mount_image$ext4(&(0x7f0000000100)='ext4\x00', &(0x7f0000000200)='./file1\x00', 0x3000000, &(0x7f0000003040)=ANY=[@ANYRES64=r0, @ANYBLOB="8555591a163448f4c52bee6cc0e12a6a8610718f818822e94c360e46f93ac9c63a1b40ea9d758c2b4e2d7c386a141016d11cb13fabc846fc7fb242c175fbdf96e2a96e80e82b73987b1d5dfd843c7e6748a15a0c4160f5e4c468e8f8e417bd3385546159881194fe3a7cf8307cd9c7ce0ca180a481d4dcaa6611ec5c8ff1c546360dea3da9f2bfc1fd71af9ebf2afe4285f013a3929a7096097976a16e2060e5f26e379011ea1811", @ANYRES64, @ANYBLOB="ca42ad87c41bb3b2507e4e12104f0cd507000001046f9445657db4996b10208d04454e11fb5b1383c5ce98e3062f45ec04e5b8b179df3d64a6cec05d29235e3cbe0b339abe9faee5cf3e44c97ce56a1dc359047114eeb3c23f331114039d75a664afc47e8273b79e83d301fc4ceec8b89911505b6743797c459195a7120ded1748f315deb90000ffed00000000000000", @ANYRES8=r0, @ANYRES8=r0, @ANYRES64, @ANYBLOB="bd85893dee1670c8c7e3b4a65ec61f224992fd11263b7749c7ee63dd4fc13cc5dfdde8a3099aaf21ece351c316d9bbd7e4ecc524c856f20d6a1818d6d75f702eb904653f9d55af", @ANYRESOCT], 0x1, 0x513, &(0x7f0000000c40)="$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") (fail_nth: 2) [ 114.086745][ T3169] udevd[3169]: inotify_add_watch(7, /dev/loop1p7, 10) failed: No such file or directory [ 114.087927][ T4030] udevd[4030]: inotify_add_watch(7, /dev/loop1p3, 10) failed: No such file or directory 20:41:02 executing program 0: r0 = openat$nci(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) close_range(r0, 0xffffffffffffffff, 0x4) 20:41:02 executing program 1: r0 = socket$inet6(0xa, 0x3, 0x6) r1 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) r2 = dup2(r1, r0) ioctl$FIDEDUPERANGE(r0, 0xc0189436, &(0x7f0000000f00)=ANY=[@ANYBLOB="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"]) ioctl$TIOCSBRK(r2, 0x5427) recvfrom$inet6(0xffffffffffffffff, &(0x7f0000000280)=""/134, 0x86, 0x40000102, &(0x7f0000000340)={0xa, 0x4e21, 0x77f, @mcast1, 0x403b3f}, 0x1c) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000001040)={{r2, 0xffffffffffffffff}, &(0x7f0000000140), &(0x7f0000000480)=r1}, 0x20) syz_read_part_table(0x593, &(0x7f00000005c0)="$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") r4 = creat(&(0x7f0000000240)='./file0\x00', 0x0) stat(&(0x7f0000000040)='./file1\x00', &(0x7f0000000380)) fsetxattr$security_capability(r4, &(0x7f0000000100), &(0x7f0000000000)=@v1={0x1000000, [{0x80000000, 0x81}]}, 0xc, 0x0) newfstatat(0xffffffffffffff9c, &(0x7f00000000c0)='./file1\x00', &(0x7f0000001400), 0x400) close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x2) ioctl$TIOCSTI(r4, 0x5412, &(0x7f00000004c0)=0x40) fsync(0xffffffffffffffff) write$binfmt_misc(r4, &(0x7f0000001080)=ANY=[@ANYBLOB="7379d3c6"], 0x4) fallocate(r4, 0x100000011, 0x0, 0x2811fdff) open(&(0x7f0000000100)='.\x00', 0x20c2, 0x2d) open$dir(&(0x7f0000000500)='./file1\x00', 0x1c6c0, 0x0) r5 = openat$vcsu(0xffffffffffffff9c, &(0x7f0000000cc0), 0x400c00, 0x0) lsetxattr$security_selinux(&(0x7f0000001180)='./file1\x00', &(0x7f00000011c0), &(0x7f0000001300)='system_u:object_r:unconfined_exec_t:s0\x00', 0x27, 0x3) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000400)={0xffffffffffffffff, 0xe0, &(0x7f0000000300)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, &(0x7f00000000c0)=[0x0], &(0x7f0000000140), 0x0, 0x8, &(0x7f0000000200)=[{}, {}, {}, {}, {}], 0x28, 0x0, 0x0, 0x0, 0x0, 0x10, 0x8, 0x8, &(0x7f00000002c0)}}, 0x10) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000e80)=@bpf_lsm={0x1d, 0x4, &(0x7f0000000040)=@framed={{0x18, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x73fc}, [@generic={0x9, 0x8, 0x0, 0x7f, 0x200}]}, &(0x7f0000000880)='GPL\x00', 0x1f, 0x93, &(0x7f0000000cc0)=""/147, 0x40f00, 0x2, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, &(0x7f0000000b80)={0x9}, 0x8, 0x10, 0x0, 0x0, r6}, 0x80) r7 = socket$nl_generic(0x10, 0x3, 0x10) r8 = syz_genetlink_get_family_id$tipc(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$TIPC_CMD_ENABLE_BEARER(r7, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000001200)=ANY=[@ANYBLOB="3400000006c08fada241ee0a049e6fba3f36f40da839bbdf54c31768b0026f4261f56d51c5d81ba4cb99f8203c40d0a142fcd75ce26e408d229139f8c4e81109c56a18e453e8a537df21c4ec04a4f3e22f4ac125a28ad43e41107b1f7e79c8573985e54fd665e2913ca74da8c9f3fc2839258c19fa7ac20ebead31206cf280ea73f635bc5418b66554392dfd11874fef72bc53538aae3cb5ef8a80140f4737dd2c572a03ee1d5e3d627e", @ANYRESOCT=0x0, @ANYBLOB="010000000000000000000100000000000000014100000018001700000000000000007564503a73"], 0x34}, 0x1, 0x0, 0x0, 0x1}, 0x0) ioctl$AUTOFS_DEV_IOCTL_PROTOSUBVER(r1, 0xc0189373, &(0x7f0000000540)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x6}}, './file0\x00'}) sendmsg$TIPC_CMD_GET_MAX_PORTS(r5, &(0x7f0000001140)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x40000}, 0xc, &(0x7f0000001100)={&(0x7f00000010c0)={0x1c, r8, 0x400, 0x8000, 0x25dfdbfe, {}, ["", "", "", "", "", "", ""]}, 0x1c}, 0x1, 0x0, 0x0, 0x20048854}, 0x4004) bpf$PROG_LOAD(0x5, &(0x7f0000000e40)={0x5, 0x16, &(0x7f0000001340)=ANY=[@ANYBLOB="390000000100000000000000900000f117fa0000", @ANYRES32=r4, @ANYBLOB="1f00000000000000b703000000000000850000000c000000b61b0453c29f42b5be06c7010b4efffe000000000085000000a900000018150000", @ANYRES32=r3, @ANYBLOB="0000000000000000180100002020782500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b70300000000850000005d000000185500000100000000000000000000009500000000000000"], &(0x7f0000000b80)='syzkaller\x00', 0x1, 0xe8, &(0x7f0000000bc0)=""/232, 0x41000, 0x5b, '\x00', 0x0, 0xe, r5, 0x8, &(0x7f0000000d00)={0x5, 0x2}, 0x8, 0x10, &(0x7f0000000d40)={0x4, 0xe, 0x2, 0x8}, 0x10, r6, r4, 0x5, &(0x7f0000000d80), &(0x7f0000000dc0)=[{0x4, 0x3, 0x0, 0x2}, {0x3, 0x1, 0xa, 0xa}, {0x0, 0x3, 0x2, 0xa}, {0x0, 0x3, 0x7, 0x1}, {0x1, 0x5, 0xb, 0xc}], 0x10, 0x7}, 0x90) [ 114.149230][ T5837] loop1: p2 p3 p7 20:41:02 executing program 0: r0 = openat$nci(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) close_range(r0, 0xffffffffffffffff, 0x5) [ 114.215034][ T5851] FAULT_INJECTION: forcing a failure. [ 114.215034][ T5851] name fail_usercopy, interval 1, probability 0, space 0, times 1 [ 114.228282][ T5851] CPU: 0 PID: 5851 Comm: syz-executor.3 Not tainted 6.8.0-rc2-syzkaller-00084-g5c24e4e9e708 #0 [ 114.238803][ T5851] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/25/2024 [ 114.248946][ T5851] Call Trace: [ 114.252283][ T5851] [ 114.255255][ T5851] dump_stack_lvl+0xda/0x130 [ 114.260435][ T5851] dump_stack+0x15/0x20 [ 114.264631][ T5851] should_fail_ex+0x21f/0x230 [ 114.269487][ T5851] should_fail+0xb/0x10 [ 114.273705][ T5851] should_fail_usercopy+0x1a/0x20 [ 114.278790][ T5851] _copy_from_user+0x1e/0xd0 [ 114.283476][ T5851] __se_sys_memfd_create+0x26a/0x610 [ 114.288958][ T5851] __x64_sys_memfd_create+0x31/0x40 [ 114.294858][ T5851] do_syscall_64+0xcd/0x1d0 [ 114.299498][ T5851] entry_SYSCALL_64_after_hwframe+0x63/0x6b [ 114.305503][ T5851] RIP: 0033:0x7fde2b9d7da9 [ 114.309948][ T5851] Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 e1 20 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b0 ff ff ff f7 d8 64 89 01 48 [ 114.331506][ T5851] RSP: 002b:00007fde2ad58ea8 EFLAGS: 00000202 ORIG_RAX: 000000000000013f [ 114.339984][ T5851] RAX: ffffffffffffffda RBX: 0000000000000513 RCX: 00007fde2b9d7da9 [ 114.348008][ T5851] RDX: 00007fde2ad58f80 RSI: 0000000000000000 RDI: 00007fde2ba236e1 [ 114.356064][ T5851] RBP: 0000000020000c40 R08: 00007fde2ad58c47 R09: 00007fde2ad58ed0 20:41:02 executing program 3: gettid() bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) fstat(0xffffffffffffffff, 0x0) r0 = getegid() syz_mount_image$ext4(&(0x7f0000000100)='ext4\x00', &(0x7f0000000200)='./file1\x00', 0x3000000, &(0x7f0000003040)=ANY=[@ANYRES64=r0, @ANYBLOB="8555591a163448f4c52bee6cc0e12a6a8610718f818822e94c360e46f93ac9c63a1b40ea9d758c2b4e2d7c386a141016d11cb13fabc846fc7fb242c175fbdf96e2a96e80e82b73987b1d5dfd843c7e6748a15a0c4160f5e4c468e8f8e417bd3385546159881194fe3a7cf8307cd9c7ce0ca180a481d4dcaa6611ec5c8ff1c546360dea3da9f2bfc1fd71af9ebf2afe4285f013a3929a7096097976a16e2060e5f26e379011ea1811", @ANYRES64, @ANYBLOB="ca42ad87c41bb3b2507e4e12104f0cd507000001046f9445657db4996b10208d04454e11fb5b1383c5ce98e3062f45ec04e5b8b179df3d64a6cec05d29235e3cbe0b339abe9faee5cf3e44c97ce56a1dc359047114eeb3c23f331114039d75a664afc47e8273b79e83d301fc4ceec8b89911505b6743797c459195a7120ded1748f315deb90000ffed00000000000000", @ANYRES8=r0, @ANYRES8=r0, @ANYRES64, @ANYBLOB="bd85893dee1670c8c7e3b4a65ec61f224992fd11263b7749c7ee63dd4fc13cc5dfdde8a3099aaf21ece351c316d9bbd7e4ecc524c856f20d6a1818d6d75f702eb904653f9d55af", @ANYRESOCT], 0x1, 0x513, &(0x7f0000000c40)="$eJzs3W9rJHcdAPDvTLJp7i41WxU5C7bFVu6K3m7S2DaKtBVEHxXU+jzGZBNCNtmQ3dRLKJriCxBEVPAF+ETwBQjSlyDCgT4XFUX0Th/qjczuRPNnN1mSTfbcfD4w2d9v/n2/vyE7O39+zARwbb0QEW9FxFhEvBwR08X4tBgW8sp+Z75HD99byocksuydvyWRFOMO1pXXxyPiVmeRmIyIr38l4lvJybjN3b31xXq9tl3Uq62NrWpzd+/e2sbiam21tjk3N/va/Ovzr87PZIULtbMcEW986U8/+v7PvvzGrz7z7d8v/OXud/K0vvCxTt4RsXShAD101l1qb4sD+TbavoxgQ5K3pzQ27CwAAOhHfoz/4Yj4ZPv4fzrG2kdzAAAAwCjJ3pyKfyURGQAAADCy0oiYiiStFH0BpiJNK5VOH96Pxs203mi2Pr3S2NlczqdFlKOUrqzVazNFX+FylJK8Plv0sT2ov3KsPhcRz0TED6dvtOuVpUZ9edgXPwAAAOCauPX80fP/f06n7TIAAAAwYso9KwAAAMCocMoPAAAAo8/5PwAAAIy0r779dj5kB+/xXn53d2e98e695VpzvbKxs1RZamxvVVYbjdX2M/s2zlpfvdHY+mxs7tyvtmrNVrW5u7ew0djZbC2sHXkFNgAAAHCFnnn+g98lEbH/+RvtIYrnAAIc8cdhJwAM0tiwEwCGZnzYCQBDUzpzDnsIGHXJGdNPdt7pXCuMX19OPgAAwODd+fjJ+/8TxbSzrw0A/8/09QGA68fdPbi+SuftAXh70JkAw/KhzsdTvab3fHhHH/f/O9cYsuxciQEAAAMz1R6StFIcp09FmlYqEU+3XwtQSlbW6rWZ4vzgt9Olp/L6bHvJ5Mw+wwAAAAAAAAAAAAAAAAAAAAAAAABAR5YlkQEAAAAjLSL9c9J+mn/EnemXpo5eHTj21q+fvvPj+4ut1vZsxETy9+l81EREtH5SjH8l80oAAAAAeAJ0ztOLz9lhZwMAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAADAqHn08L2lg+Eq4/71ixFR7hZ/PCbbn5NRioib/0hi/NBySUSMDSD+/vsRcbtb/CQeZ1lWLrLoFv/GJccvtzdN9/hpRNwaQHy4zj7I9z9vdfv+pfFC+7P792+8GC6q9/4v/e/+b6zH/ufpY/Venn3wi2rP+O9HPDveff9zED/pxD8SIq+82Gcbv/mNvb2uEw6tslv8w7GqrY2tanN3797axuJqbbW2OTc3+9r86/Ovzs9UV9bqteJv1zA/+MQvH5/W/ps94pePtv/E9n+pr9Zn8e8H9x9+pFMpdYt/98Xuv7+3e8RPi9++TxXlfPqdg/J+p3zYcz//zXOntX+5R/snz2j/3b7aH597+Wvf+0PXKSe2BgBwFZq7e+uL9Xpt+5TCZB/zXHHhzScjjQEW4slIY1iF7Lud/8eLreeCi58oZBdZfDwGkMbEie/pWJx3hUnEfr6uPv8hAQCAEfO/g/7T7iABAAAAAAAAAAAAAAAAAAAAl+mcjyWbjIi+Zz4ec384TQUAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAONV/AgAA//8FStFZ") (fail_nth: 3) 20:41:02 executing program 0: r0 = openat$nci(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) close_range(r0, 0xffffffffffffffff, 0x6) [ 114.364063][ T5851] R10: 000000000000000a R11: 0000000000000202 R12: 0000000020000200 [ 114.372142][ T5851] R13: 00007fde2ad58f80 R14: 00007fde2ad58f40 R15: 0000000020003040 [ 114.380307][ T5851] [ 114.384976][ T3326] I/O error, dev loop1, sector 0 op 0x0:(READ) flags 0x80700 phys_seg 1 prio class 0 [ 114.442854][ T5861] FAULT_INJECTION: forcing a failure. [ 114.442854][ T5861] name failslab, interval 1, probability 0, space 0, times 0 [ 114.455553][ T5861] CPU: 1 PID: 5861 Comm: syz-executor.3 Not tainted 6.8.0-rc2-syzkaller-00084-g5c24e4e9e708 #0 [ 114.465929][ T5861] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/25/2024 [ 114.476364][ T5861] Call Trace: [ 114.478062][ T5860] loop1: detected capacity change from 0 to 2048 [ 114.479653][ T5861] [ 114.479662][ T5861] dump_stack_lvl+0xda/0x130 [ 114.495075][ T5861] dump_stack+0x15/0x20 [ 114.499842][ T5861] should_fail_ex+0x21f/0x230 [ 114.505508][ T5861] __should_failslab+0x92/0xa0 [ 114.510458][ T5861] should_failslab+0x9/0x20 [ 114.515417][ T5861] kmem_cache_alloc_lru+0x62/0x2e0 [ 114.520908][ T5861] ? shmem_alloc_inode+0x34/0x50 [ 114.526117][ T5861] shmem_alloc_inode+0x34/0x50 [ 114.531034][ T5861] ? shmem_match+0xa0/0xa0 [ 114.536585][ T5861] alloc_inode+0x38/0x150 [ 114.541465][ T5861] new_inode+0x1d/0x120 [ 114.545971][ T5861] shmem_get_inode+0x258/0x740 [ 114.551428][ T5861] __shmem_file_setup+0x122/0x1f0 [ 114.557116][ T5861] shmem_file_setup+0x3b/0x50 [ 114.562350][ T5861] __se_sys_memfd_create+0x318/0x610 [ 114.569026][ T5861] __x64_sys_memfd_create+0x31/0x40 [ 114.574537][ T5861] do_syscall_64+0xcd/0x1d0 [ 114.579833][ T5861] entry_SYSCALL_64_after_hwframe+0x63/0x6b [ 114.588130][ T5861] RIP: 0033:0x7fde2b9d7da9 [ 114.593477][ T5861] Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 e1 20 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b0 ff ff ff f7 d8 64 89 01 48 [ 114.615500][ T5861] RSP: 002b:00007fde2ad58ea8 EFLAGS: 00000202 ORIG_RAX: 000000000000013f [ 114.626038][ T5861] RAX: ffffffffffffffda RBX: 0000000000000513 RCX: 00007fde2b9d7da9 [ 114.634820][ T5861] RDX: 00007fde2ad58f80 RSI: 0000000000000000 RDI: 00007fde2ba236e1 20:41:03 executing program 3: gettid() bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) fstat(0xffffffffffffffff, 0x0) r0 = getegid() syz_mount_image$ext4(&(0x7f0000000100)='ext4\x00', &(0x7f0000000200)='./file1\x00', 0x3000000, &(0x7f0000003040)=ANY=[@ANYRES64=r0, @ANYBLOB="8555591a163448f4c52bee6cc0e12a6a8610718f818822e94c360e46f93ac9c63a1b40ea9d758c2b4e2d7c386a141016d11cb13fabc846fc7fb242c175fbdf96e2a96e80e82b73987b1d5dfd843c7e6748a15a0c4160f5e4c468e8f8e417bd3385546159881194fe3a7cf8307cd9c7ce0ca180a481d4dcaa6611ec5c8ff1c546360dea3da9f2bfc1fd71af9ebf2afe4285f013a3929a7096097976a16e2060e5f26e379011ea1811", @ANYRES64, @ANYBLOB="ca42ad87c41bb3b2507e4e12104f0cd507000001046f9445657db4996b10208d04454e11fb5b1383c5ce98e3062f45ec04e5b8b179df3d64a6cec05d29235e3cbe0b339abe9faee5cf3e44c97ce56a1dc359047114eeb3c23f331114039d75a664afc47e8273b79e83d301fc4ceec8b89911505b6743797c459195a7120ded1748f315deb90000ffed00000000000000", @ANYRES8=r0, @ANYRES8=r0, @ANYRES64, @ANYBLOB="bd85893dee1670c8c7e3b4a65ec61f224992fd11263b7749c7ee63dd4fc13cc5dfdde8a3099aaf21ece351c316d9bbd7e4ecc524c856f20d6a1818d6d75f702eb904653f9d55af", @ANYRESOCT], 0x1, 0x513, &(0x7f0000000c40)="$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") (fail_nth: 4) 20:41:03 executing program 0: r0 = openat$nci(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) close_range(r0, 0xffffffffffffffff, 0x7) [ 114.644088][ T5861] RBP: 0000000020000c40 R08: 00007fde2ad58c47 R09: 00007fde2ad58ed0 [ 114.654179][ T5861] R10: 000000000000000a R11: 0000000000000202 R12: 0000000020000200 [ 114.662592][ T5861] R13: 00007fde2ad58f80 R14: 00007fde2ad58f40 R15: 0000000020003040 [ 114.671727][ T5861] [ 114.739771][ T5873] FAULT_INJECTION: forcing a failure. [ 114.739771][ T5873] name failslab, interval 1, probability 0, space 0, times 0 [ 114.751635][ T5860] loop1: p2 p3 p7 [ 114.755489][ T5873] CPU: 1 PID: 5873 Comm: syz-executor.3 Not tainted 6.8.0-rc2-syzkaller-00084-g5c24e4e9e708 #0 [ 114.770506][ T5873] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/25/2024 [ 114.780794][ T5873] Call Trace: [ 114.784221][ T5873] [ 114.787165][ T5873] dump_stack_lvl+0xda/0x130 [ 114.791867][ T5873] dump_stack+0x15/0x20 [ 114.796177][ T5873] should_fail_ex+0x21f/0x230 [ 114.801051][ T5873] ? security_inode_alloc+0x32/0xd0 [ 114.806476][ T5873] __should_failslab+0x92/0xa0 [ 114.819945][ T5873] should_failslab+0x9/0x20 [ 114.824581][ T5873] kmem_cache_alloc+0x56/0x2d0 [ 114.830237][ T5873] security_inode_alloc+0x32/0xd0 [ 114.835409][ T5873] inode_init_always+0x428/0x460 [ 114.840609][ T5873] ? shmem_match+0xa0/0xa0 [ 114.845417][ T5873] alloc_inode+0x77/0x150 [ 114.849896][ T5873] new_inode+0x1d/0x120 [ 114.854099][ T5873] shmem_get_inode+0x258/0x740 [ 114.859883][ T5873] __shmem_file_setup+0x122/0x1f0 [ 114.868068][ T5873] shmem_file_setup+0x3b/0x50 [ 114.873158][ T5873] __se_sys_memfd_create+0x318/0x610 [ 114.878651][ T5873] __x64_sys_memfd_create+0x31/0x40 [ 114.883985][ T5873] do_syscall_64+0xcd/0x1d0 [ 114.888563][ T5873] entry_SYSCALL_64_after_hwframe+0x63/0x6b [ 114.894515][ T5873] RIP: 0033:0x7fde2b9d7da9 [ 114.899569][ T5873] Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 e1 20 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b0 ff ff ff f7 d8 64 89 01 48 [ 114.919841][ T5873] RSP: 002b:00007fde2ad58ea8 EFLAGS: 00000202 ORIG_RAX: 000000000000013f [ 114.928365][ T5873] RAX: ffffffffffffffda RBX: 0000000000000513 RCX: 00007fde2b9d7da9 20:41:03 executing program 2: r0 = perf_event_open(&(0x7f0000000a40)={0x2, 0x80, 0xcd, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @perf_bp={&(0x7f0000000200), 0x8}, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfb75}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000040)={0x0, 0x4, 0x0, &(0x7f0000000180)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x80) perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x208, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x4, 0x8001}, 0x4000, 0x0, 0x0, 0x0, 0x0, 0x14e, 0xd1}, 0x0, 0xbfffffffffffffff, r0, 0x19893a9f0a0e2244) r1 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) syz_clone(0x2000000, 0x0, 0x0, 0x0, 0x0, 0x0) r2 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x18, 0x5, &(0x7f00000002c0)=ANY=[@ANYBLOB="180000001800ff0f0000000000000000850000006d000000750000000800000095"], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x80) r3 = perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400, 0x80000, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x7, 0x1007}, 0x8006, 0x0, 0x0, 0x1, 0x4, 0x800000, 0x3}, 0x0, 0xffefffffffffffff, 0xffffffffffffffff, 0x9) ioctl$PERF_EVENT_IOC_SET_FILTER(r3, 0x40082406, &(0x7f00000003c0)='memory.numa_stat\x00') perf_event_open(0x0, 0x0, 0x0, r3, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000080)='sched_switch\x00', r2}, 0x10) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000380)={{0x1, 0xffffffffffffffff}, &(0x7f0000000000), &(0x7f0000000240)=r2}, 0x20) r5 = memfd_secret(0x0) syz_io_uring_setup(0x0, &(0x7f0000000300)={0x0, 0x2, 0x0, 0x0, 0x0, 0x0, r5}, 0x0, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f00000009c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000000a00)=0x14) r7 = openat2(0xffffffffffffff9c, &(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)={0x40841}, 0x18) write$binfmt_script(r7, &(0x7f0000000340)=ANY=[], 0xfffffdef) r8 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000b40)={0x1b, 0x0, 0x0, 0x7, 0x0, 0xffffffffffffffff, 0x200, '\x00', 0x0, 0xffffffffffffffff, 0x3, 0x1, 0x4}, 0x48) r9 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000bc0)={0x2, 0x4, 0x8, 0x1, 0x80, 0x1, 0x9, '\x00', 0x0, 0xffffffffffffffff, 0x4, 0x1, 0x4}, 0x48) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000d00)={0x11, 0x12, &(0x7f0000000440)=@raw=[@exit, @ringbuf_query={{0x18, 0x1, 0x1, 0x0, r4}}, @ringbuf_output={{0x18, 0x1, 0x1, 0x0, r5}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x10001}, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x4, 0x0, 0x0, 0x2}}, @exit, @initr0={0x18, 0x0, 0x0, 0x0, 0x6349, 0x0, 0x0, 0x0, 0xf685}, @ldst={0x3, 0x2, 0x1, 0x0, 0xb, 0x2543a83bb932833c, 0x1}], &(0x7f0000000940)='syzkaller\x00', 0x80000001, 0x27, &(0x7f0000000980)=""/39, 0x41000, 0x40, '\x00', r6, 0x0, r7, 0x8, &(0x7f0000000ac0)={0x3, 0x1}, 0x8, 0x10, &(0x7f0000000b00)={0x2, 0xc, 0xfffffe00, 0x2}, 0x10, 0x0, 0x0, 0x5, &(0x7f0000000c40)=[r2, 0x1, 0x1, r8, r9, r1], &(0x7f0000000c80)=[{0x4, 0x1, 0x8, 0xc}, {0x0, 0x4, 0xf, 0x4}, {0x1, 0x2, 0xd, 0x6}, {0x0, 0x4, 0x10, 0xc}, {0x2, 0x4, 0xd, 0x1}], 0x10, 0x20}, 0x90) r10 = perf_event_open(&(0x7f0000000080)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) r11 = gettid() perf_event_open$cgroup(&(0x7f0000000300)={0x5, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_bp={&(0x7f0000000100)}, 0x81252, 0x6, 0x80000001, 0x0, 0x0, 0x0, 0x6, 0x0, 0x6, 0x0, 0x6}, 0xffffffffffffffff, 0xe, 0xffffffffffffffff, 0xc) perf_event_open(0x0, r11, 0x2, 0xffffffffffffffff, 0xb) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) perf_event_open(&(0x7f0000000840)={0x2, 0x80, 0x0, 0x7, 0x0, 0x80, 0x0, 0x3, 0x0, 0x9, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, @perf_config_ext={0x8000000000, 0x3}, 0x46c73247dfbe0d, 0x1007e, 0x0, 0x2, 0x0, 0x0, 0x6, 0x0, 0xffffffff, 0x0, 0x1c}, 0x0, 0x9, 0xffffffffffffffff, 0xd) bpf$PROG_LOAD(0x5, &(0x7f0000000780)={0x14, 0x4, &(0x7f00000008c0)=ANY=[@ANYBLOB="850000006b00000018150000a3df7ddd9621fb0201050062d91123e632b2f902ad1e9f1cc7a66ed51ac8a4070000000000000019a83f0b7c9502871fb1ca3dc499e804bbbc359859ed6fd9f104fc7ed900d122072d8275a24d000000000601c3a63953a7b36fe458", @ANYRES32, @ANYBLOB="00000000000000002d59e4eda4000000"], &(0x7f0000000400)='syzkaller\x00', 0xfff, 0xe3, &(0x7f0000000580)=""/227, 0x0, 0x4, '\x00', 0x0, 0x24, 0xffffffffffffffff, 0x8, &(0x7f0000000500)={0x1, 0x3}, 0x8, 0x10, &(0x7f0000000680)={0x5, 0x6, 0x81, 0x9}, 0x10, 0xffffffffffffffff, 0xffffffffffffffff, 0x0, &(0x7f00000006c0)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, r10]}, 0x80) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x4030582a, &(0x7f0000000040)=0x91) 20:41:03 executing program 0: r0 = openat$nci(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) close_range(r0, 0xffffffffffffffff, 0x8) 20:41:03 executing program 4: r0 = perf_event_open(&(0x7f0000000a40)={0x2, 0x80, 0xcd, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @perf_bp={&(0x7f0000000200), 0x8}, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfb75}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000040)={0x0, 0x4, 0x0, &(0x7f0000000180)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x80) perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x208, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x4, 0x8001}, 0x4000, 0x0, 0x0, 0x0, 0x0, 0x14e, 0xd1}, 0x0, 0xbfffffffffffffff, r0, 0x19893a9f0a0e2244) r1 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) syz_clone(0x2000000, 0x0, 0x0, 0x0, 0x0, 0x0) r2 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x18, 0x5, &(0x7f00000002c0)=ANY=[@ANYBLOB="180000001800ff0f0000000000000000850000006d000000750000000800000095"], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x80) r3 = perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400, 0x80000, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x7, 0x1007}, 0x8006, 0x0, 0x0, 0x1, 0x4, 0x800000, 0x3}, 0x0, 0xffefffffffffffff, 0xffffffffffffffff, 0x9) ioctl$PERF_EVENT_IOC_SET_FILTER(r3, 0x40082406, &(0x7f00000003c0)='memory.numa_stat\x00') perf_event_open(0x0, 0x0, 0x0, r3, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000080)='sched_switch\x00', r2}, 0x10) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000380)={{0x1, 0xffffffffffffffff}, &(0x7f0000000000), &(0x7f0000000240)=r2}, 0x20) r5 = memfd_secret(0x0) syz_io_uring_setup(0x0, &(0x7f0000000300)={0x0, 0x2, 0x0, 0x0, 0x0, 0x0, r5}, 0x0, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f00000009c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000000a00)=0x14) r7 = openat2(0xffffffffffffff9c, &(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)={0x40841}, 0x18) write$binfmt_script(r7, &(0x7f0000000340)=ANY=[], 0xfffffdef) r8 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000b40)={0x1b, 0x0, 0x0, 0x7, 0x0, 0xffffffffffffffff, 0x200, '\x00', 0x0, 0xffffffffffffffff, 0x3, 0x1, 0x4}, 0x48) r9 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000bc0)={0x2, 0x4, 0x8, 0x1, 0x80, 0x1, 0x9, '\x00', 0x0, 0xffffffffffffffff, 0x4, 0x1, 0x4}, 0x48) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000d00)={0x11, 0x12, &(0x7f0000000440)=@raw=[@exit, @ringbuf_query={{0x18, 0x1, 0x1, 0x0, r4}}, @ringbuf_output={{0x18, 0x1, 0x1, 0x0, r5}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x10001}, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x4, 0x0, 0x0, 0x2}}, @exit, @initr0={0x18, 0x0, 0x0, 0x0, 0x6349, 0x0, 0x0, 0x0, 0xf685}, @ldst={0x3, 0x2, 0x1, 0x0, 0xb, 0x2543a83bb932833c, 0x1}], &(0x7f0000000940)='syzkaller\x00', 0x80000001, 0x27, &(0x7f0000000980)=""/39, 0x41000, 0x40, '\x00', r6, 0x0, r7, 0x8, &(0x7f0000000ac0)={0x3, 0x1}, 0x8, 0x10, &(0x7f0000000b00)={0x2, 0xc, 0xfffffe00, 0x2}, 0x10, 0x0, 0x0, 0x5, &(0x7f0000000c40)=[r2, 0x1, 0x1, r8, r9, r1], &(0x7f0000000c80)=[{0x4, 0x1, 0x8, 0xc}, {0x0, 0x4, 0xf, 0x4}, {0x1, 0x2, 0xd, 0x6}, {0x0, 0x4, 0x10, 0xc}, {0x2, 0x4, 0xd, 0x1}], 0x10, 0x20}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000280)={&(0x7f0000000140)='ext4_ext_show_extent\x00', r2}, 0x10) r10 = perf_event_open(&(0x7f0000000080)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) perf_event_open$cgroup(&(0x7f0000000300)={0x5, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_bp={&(0x7f0000000100)}, 0x81252, 0x6, 0x80000001, 0x0, 0x0, 0x0, 0x6, 0x0, 0x6, 0x0, 0x6}, 0xffffffffffffffff, 0xe, 0xffffffffffffffff, 0xc) perf_event_open(0x0, 0x0, 0x2, 0xffffffffffffffff, 0xb) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) perf_event_open(&(0x7f0000000840)={0x2, 0x80, 0x0, 0x7, 0x0, 0x80, 0x0, 0x3, 0x0, 0x9, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, @perf_config_ext={0x8000000000, 0x3}, 0x46c73247dfbe0d, 0x1007e, 0x0, 0x2, 0x0, 0x0, 0x6, 0x0, 0xffffffff, 0x0, 0x1c}, 0x0, 0x9, 0xffffffffffffffff, 0xd) bpf$PROG_LOAD(0x5, &(0x7f0000000780)={0x14, 0x4, &(0x7f00000008c0)=ANY=[@ANYBLOB="850000006b00000018150000a3df7ddd9621fb0201050062d91123e632b2f902ad1e9f1cc7a66ed51ac8a4070000000000000019a83f0b7c9502871fb1ca3dc499e804bbbc359859ed6fd9f104fc7ed900d122072d8275a24d000000000601c3a63953a7b36fe458", @ANYRES32, @ANYBLOB="00000000000000002d59e4eda4000000"], &(0x7f0000000400)='syzkaller\x00', 0xfff, 0xe3, &(0x7f0000000580)=""/227, 0x0, 0x4, '\x00', 0x0, 0x24, 0xffffffffffffffff, 0x8, &(0x7f0000000500)={0x1, 0x3}, 0x8, 0x10, &(0x7f0000000680)={0x5, 0x6, 0x81, 0x9}, 0x10, 0xffffffffffffffff, 0xffffffffffffffff, 0x0, &(0x7f00000006c0)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, r10]}, 0x80) 20:41:03 executing program 3: gettid() bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) fstat(0xffffffffffffffff, 0x0) r0 = getegid() syz_mount_image$ext4(&(0x7f0000000100)='ext4\x00', &(0x7f0000000200)='./file1\x00', 0x3000000, &(0x7f0000003040)=ANY=[@ANYRES64=r0, @ANYBLOB="8555591a163448f4c52bee6cc0e12a6a8610718f818822e94c360e46f93ac9c63a1b40ea9d758c2b4e2d7c386a141016d11cb13fabc846fc7fb242c175fbdf96e2a96e80e82b73987b1d5dfd843c7e6748a15a0c4160f5e4c468e8f8e417bd3385546159881194fe3a7cf8307cd9c7ce0ca180a481d4dcaa6611ec5c8ff1c546360dea3da9f2bfc1fd71af9ebf2afe4285f013a3929a7096097976a16e2060e5f26e379011ea1811", @ANYRES64, @ANYBLOB="ca42ad87c41bb3b2507e4e12104f0cd507000001046f9445657db4996b10208d04454e11fb5b1383c5ce98e3062f45ec04e5b8b179df3d64a6cec05d29235e3cbe0b339abe9faee5cf3e44c97ce56a1dc359047114eeb3c23f331114039d75a664afc47e8273b79e83d301fc4ceec8b89911505b6743797c459195a7120ded1748f315deb90000ffed00000000000000", @ANYRES8=r0, @ANYRES8=r0, @ANYRES64, @ANYBLOB="bd85893dee1670c8c7e3b4a65ec61f224992fd11263b7749c7ee63dd4fc13cc5dfdde8a3099aaf21ece351c316d9bbd7e4ecc524c856f20d6a1818d6d75f702eb904653f9d55af", @ANYRESOCT], 0x1, 0x513, &(0x7f0000000c40)="$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") (fail_nth: 5) [ 114.936692][ T5873] RDX: 00007fde2ad58f80 RSI: 0000000000000000 RDI: 00007fde2ba236e1 [ 114.944855][ T5873] RBP: 0000000020000c40 R08: 00007fde2ad58c47 R09: 00007fde2ad58ed0 [ 114.952833][ T5873] R10: 000000000000000a R11: 0000000000000202 R12: 0000000020000200 [ 114.960892][ T5873] R13: 00007fde2ad58f80 R14: 00007fde2ad58f40 R15: 0000000020003040 [ 114.968874][ T5873] 20:41:03 executing program 0: r0 = openat$nci(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) close_range(r0, 0xffffffffffffffff, 0x9) 20:41:03 executing program 0: r0 = openat$nci(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) close_range(r0, 0xffffffffffffffff, 0xa) [ 115.059823][ T5890] FAULT_INJECTION: forcing a failure. [ 115.059823][ T5890] name failslab, interval 1, probability 0, space 0, times 0 [ 115.073009][ T5890] CPU: 0 PID: 5890 Comm: syz-executor.3 Not tainted 6.8.0-rc2-syzkaller-00084-g5c24e4e9e708 #0 [ 115.083384][ T5890] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/25/2024 [ 115.093882][ T5890] Call Trace: [ 115.097166][ T5890] [ 115.100101][ T5890] dump_stack_lvl+0xda/0x130 [ 115.104709][ T5890] dump_stack+0x15/0x20 [ 115.109107][ T5890] should_fail_ex+0x21f/0x230 [ 115.114758][ T5890] __should_failslab+0x92/0xa0 [ 115.119719][ T5890] should_failslab+0x9/0x20 [ 115.124473][ T5890] kmem_cache_alloc_lru+0x62/0x2e0 [ 115.129777][ T5890] ? __d_alloc+0x3d/0x330 [ 115.134145][ T5890] ? get_random_u32+0x1b6/0x260 [ 115.139126][ T5890] __d_alloc+0x3d/0x330 [ 115.145292][ T5890] d_alloc_pseudo+0x1e/0x80 [ 115.149814][ T5890] alloc_file_pseudo+0x70/0x110 [ 115.154674][ T5890] __shmem_file_setup+0x1b6/0x1f0 [ 115.159729][ T5890] shmem_file_setup+0x3b/0x50 [ 115.164722][ T5890] __se_sys_memfd_create+0x318/0x610 [ 115.170110][ T5890] __x64_sys_memfd_create+0x31/0x40 [ 115.175351][ T5890] do_syscall_64+0xcd/0x1d0 [ 115.179880][ T5890] entry_SYSCALL_64_after_hwframe+0x63/0x6b [ 115.185999][ T5890] RIP: 0033:0x7fde2b9d7da9 [ 115.190450][ T5890] Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 e1 20 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b0 ff ff ff f7 d8 64 89 01 48 [ 115.210194][ T5890] RSP: 002b:00007fde2ad58ea8 EFLAGS: 00000202 ORIG_RAX: 000000000000013f [ 115.218849][ T5890] RAX: ffffffffffffffda RBX: 0000000000000513 RCX: 00007fde2b9d7da9 [ 115.227037][ T5890] RDX: 00007fde2ad58f80 RSI: 0000000000000000 RDI: 00007fde2ba236e1 [ 115.235014][ T5890] RBP: 0000000020000c40 R08: 00007fde2ad58c47 R09: 00007fde2ad58ed0 [ 115.242993][ T5890] R10: 000000000000000a R11: 0000000000000202 R12: 0000000020000200 [ 115.251016][ T5890] R13: 00007fde2ad58f80 R14: 00007fde2ad58f40 R15: 0000000020003040 [ 115.258996][ T5890] 20:41:03 executing program 2: r0 = perf_event_open(&(0x7f0000000a40)={0x2, 0x80, 0xcd, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @perf_bp={&(0x7f0000000200), 0x8}, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfb75}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000040)={0x0, 0x4, 0x0, &(0x7f0000000180)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x80) perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x208, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x4, 0x8001}, 0x4000, 0x0, 0x0, 0x0, 0x0, 0x14e, 0xd1}, 0x0, 0xbfffffffffffffff, r0, 0x19893a9f0a0e2244) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) syz_clone(0x2000000, 0x0, 0x0, 0x0, 0x0, 0x0) r1 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x18, 0x5, &(0x7f00000002c0)=ANY=[@ANYBLOB="180000001800ff0f0000000000000000850000006d000000750000000800000095"], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x80) r2 = perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400, 0x80000, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x7, 0x1007}, 0x8006, 0x0, 0x0, 0x1, 0x4, 0x800000, 0x3}, 0x0, 0xffefffffffffffff, 0xffffffffffffffff, 0x9) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x40082406, &(0x7f00000003c0)='memory.numa_stat\x00') perf_event_open(0x0, 0x0, 0x0, r2, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000080)='sched_switch\x00', r1}, 0x10) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000380)={{0x1}, &(0x7f0000000000), &(0x7f0000000240)=r1}, 0x20) r3 = memfd_secret(0x0) syz_io_uring_setup(0x0, &(0x7f0000000300)={0x0, 0x2, 0x0, 0x0, 0x0, 0x0, r3}, 0x0, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f00000009c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000000a00)=0x14) r4 = openat2(0xffffffffffffff9c, &(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)={0x40841}, 0x18) write$binfmt_script(r4, &(0x7f0000000340)=ANY=[], 0xfffffdef) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000b40)={0x1b, 0x0, 0x0, 0x7, 0x0, 0xffffffffffffffff, 0x200, '\x00', 0x0, 0xffffffffffffffff, 0x3, 0x1, 0x4}, 0x48) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000bc0)={0x2, 0x4, 0x8, 0x1, 0x80, 0x1, 0x9, '\x00', 0x0, 0xffffffffffffffff, 0x4, 0x1, 0x4}, 0x48) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000280)={&(0x7f0000000140)='ext4_ext_show_extent\x00', r1}, 0x10) r5 = perf_event_open(&(0x7f0000000080)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) r6 = gettid() perf_event_open$cgroup(&(0x7f0000000300)={0x5, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_bp={&(0x7f0000000100)}, 0x81252, 0x6, 0x80000001, 0x0, 0x0, 0x0, 0x6, 0x0, 0x6, 0x0, 0x6}, 0xffffffffffffffff, 0xe, 0xffffffffffffffff, 0xc) perf_event_open(0x0, r6, 0x2, 0xffffffffffffffff, 0xb) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) perf_event_open(&(0x7f0000000840)={0x2, 0x80, 0x0, 0x7, 0x0, 0x80, 0x0, 0x3, 0x0, 0x9, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, @perf_config_ext={0x8000000000, 0x3}, 0x46c73247dfbe0d, 0x1007e, 0x0, 0x2, 0x0, 0x0, 0x6, 0x0, 0xffffffff, 0x0, 0x1c}, 0x0, 0x9, 0xffffffffffffffff, 0xd) bpf$PROG_LOAD(0x5, &(0x7f0000000780)={0x14, 0x4, &(0x7f00000008c0)=ANY=[@ANYBLOB="850000006b00000018150000a3df7ddd9621fb0201050062d91123e632b2f902ad1e9f1cc7a66ed51ac8a4070000000000000019a83f0b7c9502871fb1ca3dc499e804bbbc359859ed6fd9f104fc7ed900d122072d8275a24d000000000601c3a63953a7b36fe458", @ANYRES32, @ANYBLOB="00000000000000002d59e4eda4000000"], &(0x7f0000000400)='syzkaller\x00', 0xfff, 0xe3, &(0x7f0000000580)=""/227, 0x0, 0x4, '\x00', 0x0, 0x24, 0xffffffffffffffff, 0x8, &(0x7f0000000500)={0x1, 0x3}, 0x8, 0x10, &(0x7f0000000680)={0x5, 0x6, 0x81, 0x9}, 0x10, 0xffffffffffffffff, 0xffffffffffffffff, 0x0, &(0x7f00000006c0)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, r5]}, 0x80) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x4030582a, &(0x7f0000000040)=0x91) 20:41:03 executing program 1: ioctl$BTRFS_IOC_LOGICAL_INO(0xffffffffffffffff, 0xc0389424, 0x0) r0 = socket$inet6(0xa, 0x3, 0x6) r1 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) r2 = dup2(r1, r0) ioctl$FIDEDUPERANGE(r0, 0xc0189436, &(0x7f0000000f00)=ANY=[@ANYBLOB="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"]) ioctl$TIOCSBRK(r2, 0x5427) recvfrom$inet6(0xffffffffffffffff, &(0x7f0000000280)=""/134, 0x86, 0x40000102, &(0x7f0000000340)={0xa, 0x4e21, 0x77f, @mcast1, 0x403b3f}, 0x1c) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000001040)={{r2, 0xffffffffffffffff}, &(0x7f0000000140), &(0x7f0000000480)=r1}, 0x20) syz_read_part_table(0x593, &(0x7f00000005c0)="$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") r4 = creat(&(0x7f0000000240)='./file0\x00', 0x0) stat(&(0x7f0000000040)='./file1\x00', &(0x7f0000000380)) fsetxattr$security_capability(r4, &(0x7f0000000100), &(0x7f0000000000)=@v1={0x1000000, [{0x80000000, 0x81}]}, 0xc, 0x0) newfstatat(0xffffffffffffff9c, &(0x7f00000000c0)='./file1\x00', &(0x7f0000001400), 0x400) close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x2) ioctl$TIOCSTI(r4, 0x5412, &(0x7f00000004c0)=0x40) fsync(0xffffffffffffffff) write$binfmt_misc(r4, &(0x7f0000001080)=ANY=[@ANYBLOB="7379d3c6"], 0x4) fallocate(r4, 0x100000011, 0x0, 0x2811fdff) open(&(0x7f0000000100)='.\x00', 0x20c2, 0x2d) open$dir(&(0x7f0000000500)='./file1\x00', 0x1c6c0, 0x0) r5 = openat$vcsu(0xffffffffffffff9c, &(0x7f0000000cc0), 0x400c00, 0x0) lsetxattr$security_selinux(&(0x7f0000001180)='./file1\x00', &(0x7f00000011c0), &(0x7f0000001300)='system_u:object_r:unconfined_exec_t:s0\x00', 0x27, 0x3) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000400)={0xffffffffffffffff, 0xe0, &(0x7f0000000300)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, &(0x7f00000000c0)=[0x0], &(0x7f0000000140), 0x0, 0x8, &(0x7f0000000200)=[{}, {}, {}, {}, {}], 0x28, 0x0, 0x0, 0x0, 0x0, 0x10, 0x8, 0x8, &(0x7f00000002c0)}}, 0x10) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000e80)=@bpf_lsm={0x1d, 0x4, &(0x7f0000000040)=@framed={{0x18, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x73fc}, [@generic={0x9, 0x8, 0x0, 0x7f, 0x200}]}, &(0x7f0000000880)='GPL\x00', 0x1f, 0x93, &(0x7f0000000cc0)=""/147, 0x40f00, 0x2, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, &(0x7f0000000b80)={0x9}, 0x8, 0x10, 0x0, 0x0, r6}, 0x80) r7 = socket$nl_generic(0x10, 0x3, 0x10) r8 = syz_genetlink_get_family_id$tipc(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$TIPC_CMD_ENABLE_BEARER(r7, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000001200)=ANY=[@ANYBLOB="3400000006c08fada241ee0a049e6fba3f36f40da839bbdf54c31768b0026f4261f56d51c5d81ba4cb99f8203c40d0a142fcd75ce26e408d229139f8c4e81109c56a18e453e8a537df21c4ec04a4f3e22f4ac125a28ad43e41107b1f7e79c8573985e54fd665e2913ca74da8c9f3fc2839258c19fa7ac20ebead31206cf280ea73f635bc5418b66554392dfd11874fef72bc53538aae3cb5ef8a80140f4737dd2c572a03ee1d5e3d627e", @ANYRESOCT=0x0, @ANYBLOB="010000000000000000000100000000000000014100000018001700000000000000007564503a73"], 0x34}, 0x1, 0x0, 0x0, 0x1}, 0x0) ioctl$AUTOFS_DEV_IOCTL_PROTOSUBVER(r1, 0xc0189373, &(0x7f0000000540)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x6}}, './file0\x00'}) sendmsg$TIPC_CMD_GET_MAX_PORTS(r5, &(0x7f0000001140)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x40000}, 0xc, &(0x7f0000001100)={&(0x7f00000010c0)={0x1c, r8, 0x400, 0x8000, 0x25dfdbfe, {}, ["", "", "", "", "", "", ""]}, 0x1c}, 0x1, 0x0, 0x0, 0x20048854}, 0x4004) bpf$PROG_LOAD(0x5, &(0x7f0000000e40)={0x5, 0x16, &(0x7f0000001340)=ANY=[@ANYBLOB="390000000100000000000000900000f117fa0000", @ANYRES32=r4, @ANYBLOB="1f00000000000000b703000000000000850000000c000000b61b0453c29f42b5be06c7010b4efffe000000000085000000a900000018150000", @ANYRES32=r3, @ANYBLOB="0000000000000000180100002020782500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b70300000000850000005d000000185500000100000000000000000000009500000000000000"], &(0x7f0000000b80)='syzkaller\x00', 0x1, 0xe8, &(0x7f0000000bc0)=""/232, 0x41000, 0x5b, '\x00', 0x0, 0xe, r5, 0x8, &(0x7f0000000d00)={0x5, 0x2}, 0x8, 0x10, &(0x7f0000000d40)={0x4, 0xe, 0x2, 0x8}, 0x10, r6, r4, 0x5, &(0x7f0000000d80), &(0x7f0000000dc0)=[{0x4, 0x3, 0x0, 0x2}, {0x3, 0x1, 0xa, 0xa}, {0x0, 0x3, 0x2, 0xa}, {0x0, 0x3, 0x7, 0x1}, {0x1, 0x5, 0xb, 0xc}], 0x10, 0x7}, 0x90) 20:41:03 executing program 4: r0 = perf_event_open(&(0x7f0000000a40)={0x2, 0x80, 0xcd, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @perf_bp={&(0x7f0000000200), 0x8}, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfb75}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000040)={0x0, 0x4, 0x0, &(0x7f0000000180)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x80) perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x208, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x4, 0x8001}, 0x4000, 0x0, 0x0, 0x0, 0x0, 0x14e, 0xd1}, 0x0, 0xbfffffffffffffff, r0, 0x19893a9f0a0e2244) r1 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) syz_clone(0x2000000, 0x0, 0x0, 0x0, 0x0, 0x0) r2 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x18, 0x5, &(0x7f00000002c0)=ANY=[@ANYBLOB="180000001800ff0f0000000000000000850000006d000000750000000800000095"], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x80) r3 = perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400, 0x80000, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x7, 0x1007}, 0x8006, 0x0, 0x0, 0x1, 0x4, 0x800000, 0x3}, 0x0, 0xffefffffffffffff, 0xffffffffffffffff, 0x9) ioctl$PERF_EVENT_IOC_SET_FILTER(r3, 0x40082406, &(0x7f00000003c0)='memory.numa_stat\x00') perf_event_open(0x0, 0x0, 0x0, r3, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000080)='sched_switch\x00', r2}, 0x10) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000380)={{0x1, 0xffffffffffffffff}, &(0x7f0000000000), &(0x7f0000000240)=r2}, 0x20) r5 = memfd_secret(0x0) syz_io_uring_setup(0x0, &(0x7f0000000300)={0x0, 0x2, 0x0, 0x0, 0x0, 0x0, r5}, 0x0, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f00000009c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000000a00)=0x14) r7 = openat2(0xffffffffffffff9c, &(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)={0x40841}, 0x18) write$binfmt_script(r7, &(0x7f0000000340)=ANY=[], 0xfffffdef) r8 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000b40)={0x1b, 0x0, 0x0, 0x7, 0x0, 0xffffffffffffffff, 0x200, '\x00', 0x0, 0xffffffffffffffff, 0x3, 0x1, 0x4}, 0x48) r9 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000bc0)={0x2, 0x4, 0x8, 0x1, 0x80, 0x1, 0x9, '\x00', 0x0, 0xffffffffffffffff, 0x4, 0x1, 0x4}, 0x48) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000d00)={0x11, 0x12, &(0x7f0000000440)=@raw=[@exit, @ringbuf_query={{0x18, 0x1, 0x1, 0x0, r4}}, @ringbuf_output={{0x18, 0x1, 0x1, 0x0, r5}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x10001}, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x4, 0x0, 0x0, 0x2}}, @exit, @initr0={0x18, 0x0, 0x0, 0x0, 0x6349, 0x0, 0x0, 0x0, 0xf685}, @ldst={0x3, 0x2, 0x1, 0x0, 0xb, 0x2543a83bb932833c, 0x1}], &(0x7f0000000940)='syzkaller\x00', 0x80000001, 0x27, &(0x7f0000000980)=""/39, 0x41000, 0x40, '\x00', r6, 0x0, r7, 0x8, &(0x7f0000000ac0)={0x3, 0x1}, 0x8, 0x10, &(0x7f0000000b00)={0x2, 0xc, 0xfffffe00, 0x2}, 0x10, 0x0, 0x0, 0x5, &(0x7f0000000c40)=[r2, 0x1, 0x1, r8, r9, r1], &(0x7f0000000c80)=[{0x4, 0x1, 0x8, 0xc}, {0x0, 0x4, 0xf, 0x4}, {0x1, 0x2, 0xd, 0x6}, {0x0, 0x4, 0x10, 0xc}, {0x2, 0x4, 0xd, 0x1}], 0x10, 0x20}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000280)={&(0x7f0000000140)='ext4_ext_show_extent\x00', r2}, 0x10) perf_event_open(&(0x7f0000000080)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) perf_event_open$cgroup(&(0x7f0000000300)={0x5, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_bp={&(0x7f0000000100)}, 0x81252, 0x6, 0x80000001, 0x0, 0x0, 0x0, 0x6, 0x0, 0x6, 0x0, 0x6}, 0xffffffffffffffff, 0xe, 0xffffffffffffffff, 0xc) perf_event_open(0x0, 0x0, 0x2, 0xffffffffffffffff, 0xb) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) perf_event_open(&(0x7f0000000840)={0x2, 0x80, 0x0, 0x7, 0x0, 0x80, 0x0, 0x3, 0x0, 0x9, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, @perf_config_ext={0x8000000000, 0x3}, 0x46c73247dfbe0d, 0x1007e, 0x0, 0x2, 0x0, 0x0, 0x6, 0x0, 0xffffffff, 0x0, 0x1c}, 0x0, 0x9, 0xffffffffffffffff, 0xd) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x4030582a, &(0x7f0000000040)=0x91) [ 115.288442][ T27] audit: type=1400 audit(1706820063.697:268): avc: denied { unlink } for pid=2757 comm="syslogd" name="messages.0" dev="tmpfs" ino=2 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 20:41:03 executing program 0: r0 = openat$nci(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) close_range(r0, 0xffffffffffffffff, 0xb) 20:41:03 executing program 3: gettid() bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) fstat(0xffffffffffffffff, 0x0) r0 = getegid() syz_mount_image$ext4(&(0x7f0000000100)='ext4\x00', &(0x7f0000000200)='./file1\x00', 0x3000000, &(0x7f0000003040)=ANY=[@ANYRES64=r0, @ANYBLOB="8555591a163448f4c52bee6cc0e12a6a8610718f818822e94c360e46f93ac9c63a1b40ea9d758c2b4e2d7c386a141016d11cb13fabc846fc7fb242c175fbdf96e2a96e80e82b73987b1d5dfd843c7e6748a15a0c4160f5e4c468e8f8e417bd3385546159881194fe3a7cf8307cd9c7ce0ca180a481d4dcaa6611ec5c8ff1c546360dea3da9f2bfc1fd71af9ebf2afe4285f013a3929a7096097976a16e2060e5f26e379011ea1811", @ANYRES64, @ANYBLOB="ca42ad87c41bb3b2507e4e12104f0cd507000001046f9445657db4996b10208d04454e11fb5b1383c5ce98e3062f45ec04e5b8b179df3d64a6cec05d29235e3cbe0b339abe9faee5cf3e44c97ce56a1dc359047114eeb3c23f331114039d75a664afc47e8273b79e83d301fc4ceec8b89911505b6743797c459195a7120ded1748f315deb90000ffed00000000000000", @ANYRES8=r0, @ANYRES8=r0, @ANYRES64, @ANYBLOB="bd85893dee1670c8c7e3b4a65ec61f224992fd11263b7749c7ee63dd4fc13cc5dfdde8a3099aaf21ece351c316d9bbd7e4ecc524c856f20d6a1818d6d75f702eb904653f9d55af", @ANYRESOCT], 0x1, 0x513, &(0x7f0000000c40)="$eJzs3W9rJHcdAPDvTLJp7i41WxU5C7bFVu6K3m7S2DaKtBVEHxXU+jzGZBNCNtmQ3dRLKJriCxBEVPAF+ETwBQjSlyDCgT4XFUX0Th/qjczuRPNnN1mSTfbcfD4w2d9v/n2/vyE7O39+zARwbb0QEW9FxFhEvBwR08X4tBgW8sp+Z75HD99byocksuydvyWRFOMO1pXXxyPiVmeRmIyIr38l4lvJybjN3b31xXq9tl3Uq62NrWpzd+/e2sbiam21tjk3N/va/Ovzr87PZIULtbMcEW986U8/+v7PvvzGrz7z7d8v/OXud/K0vvCxTt4RsXShAD101l1qb4sD+TbavoxgQ5K3pzQ27CwAAOhHfoz/4Yj4ZPv4fzrG2kdzAAAAwCjJ3pyKfyURGQAAADCy0oiYiiStFH0BpiJNK5VOH96Pxs203mi2Pr3S2NlczqdFlKOUrqzVazNFX+FylJK8Plv0sT2ov3KsPhcRz0TED6dvtOuVpUZ9edgXPwAAAOCauPX80fP/f06n7TIAAAAwYso9KwAAAMCocMoPAAAAo8/5PwAAAIy0r779dj5kB+/xXn53d2e98e695VpzvbKxs1RZamxvVVYbjdX2M/s2zlpfvdHY+mxs7tyvtmrNVrW5u7ew0djZbC2sHXkFNgAAAHCFnnn+g98lEbH/+RvtIYrnAAIc8cdhJwAM0tiwEwCGZnzYCQBDUzpzDnsIGHXJGdNPdt7pXCuMX19OPgAAwODd+fjJ+/8TxbSzrw0A/8/09QGA68fdPbi+SuftAXh70JkAw/KhzsdTvab3fHhHH/f/O9cYsuxciQEAAAMz1R6StFIcp09FmlYqEU+3XwtQSlbW6rWZ4vzgt9Olp/L6bHvJ5Mw+wwAAAAAAAAAAAAAAAAAAAAAAAABAR5YlkQEAAAAjLSL9c9J+mn/EnemXpo5eHTj21q+fvvPj+4ut1vZsxETy9+l81EREtH5SjH8l80oAAAAAeAJ0ztOLz9lhZwMAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAADAqHn08L2lg+Eq4/71ixFR7hZ/PCbbn5NRioib/0hi/NBySUSMDSD+/vsRcbtb/CQeZ1lWLrLoFv/GJccvtzdN9/hpRNwaQHy4zj7I9z9vdfv+pfFC+7P792+8GC6q9/4v/e/+b6zH/ufpY/Venn3wi2rP+O9HPDveff9zED/pxD8SIq+82Gcbv/mNvb2uEw6tslv8w7GqrY2tanN3797axuJqbbW2OTc3+9r86/Ovzs9UV9bqteJv1zA/+MQvH5/W/ps94pePtv/E9n+pr9Zn8e8H9x9+pFMpdYt/98Xuv7+3e8RPi9++TxXlfPqdg/J+p3zYcz//zXOntX+5R/snz2j/3b7aH597+Wvf+0PXKSe2BgBwFZq7e+uL9Xpt+5TCZB/zXHHhzScjjQEW4slIY1iF7Lud/8eLreeCi58oZBdZfDwGkMbEie/pWJx3hUnEfr6uPv8hAQCAEfO/g/7T7iABAAAAAAAAAAAAAAAAAAAAl+mcjyWbjIi+Zz4ec384TQUAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAONV/AgAA//8FStFZ") (fail_nth: 6) 20:41:03 executing program 0: r0 = openat$nci(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) close_range(r0, 0xffffffffffffffff, 0xc) 20:41:03 executing program 0: r0 = openat$nci(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) close_range(r0, 0xffffffffffffffff, 0xd) [ 115.502393][ T5921] FAULT_INJECTION: forcing a failure. [ 115.502393][ T5921] name failslab, interval 1, probability 0, space 0, times 0 [ 115.515205][ T5921] CPU: 0 PID: 5921 Comm: syz-executor.3 Not tainted 6.8.0-rc2-syzkaller-00084-g5c24e4e9e708 #0 [ 115.525742][ T5921] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/25/2024 [ 115.535918][ T5921] Call Trace: [ 115.539364][ T5921] [ 115.542657][ T5921] dump_stack_lvl+0xda/0x130 [ 115.547519][ T5921] dump_stack+0x15/0x20 [ 115.551754][ T5921] should_fail_ex+0x21f/0x230 [ 115.556502][ T5921] ? alloc_empty_file+0xd0/0x310 [ 115.561458][ T5921] __should_failslab+0x92/0xa0 [ 115.566290][ T5921] should_failslab+0x9/0x20 [ 115.571015][ T5921] kmem_cache_alloc+0x56/0x2d0 [ 115.575898][ T5921] alloc_empty_file+0xd0/0x310 [ 115.580682][ T5921] alloc_file+0x3a/0x300 [ 115.584948][ T5921] alloc_file_pseudo+0xb0/0x110 [ 115.589900][ T5921] __shmem_file_setup+0x1b6/0x1f0 [ 115.594990][ T5921] shmem_file_setup+0x3b/0x50 [ 115.599691][ T5921] __se_sys_memfd_create+0x318/0x610 [ 115.605095][ T5921] __x64_sys_memfd_create+0x31/0x40 [ 115.610315][ T5921] do_syscall_64+0xcd/0x1d0 [ 115.614831][ T5921] entry_SYSCALL_64_after_hwframe+0x63/0x6b [ 115.620749][ T5921] RIP: 0033:0x7fde2b9d7da9 [ 115.625258][ T5921] Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 e1 20 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b0 ff ff ff f7 d8 64 89 01 48 [ 115.644962][ T5921] RSP: 002b:00007fde2ad58ea8 EFLAGS: 00000202 ORIG_RAX: 000000000000013f [ 115.653385][ T5921] RAX: ffffffffffffffda RBX: 0000000000000513 RCX: 00007fde2b9d7da9 [ 115.662705][ T5921] RDX: 00007fde2ad58f80 RSI: 0000000000000000 RDI: 00007fde2ba236e1 [ 115.673766][ T5921] RBP: 0000000020000c40 R08: 00007fde2ad58c47 R09: 00007fde2ad58ed0 [ 115.685428][ T5921] R10: 000000000000000a R11: 0000000000000202 R12: 0000000020000200 20:41:04 executing program 3: gettid() bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) fstat(0xffffffffffffffff, 0x0) r0 = getegid() syz_mount_image$ext4(&(0x7f0000000100)='ext4\x00', &(0x7f0000000200)='./file1\x00', 0x3000000, &(0x7f0000003040)=ANY=[@ANYRES64=r0, @ANYBLOB="8555591a163448f4c52bee6cc0e12a6a8610718f818822e94c360e46f93ac9c63a1b40ea9d758c2b4e2d7c386a141016d11cb13fabc846fc7fb242c175fbdf96e2a96e80e82b73987b1d5dfd843c7e6748a15a0c4160f5e4c468e8f8e417bd3385546159881194fe3a7cf8307cd9c7ce0ca180a481d4dcaa6611ec5c8ff1c546360dea3da9f2bfc1fd71af9ebf2afe4285f013a3929a7096097976a16e2060e5f26e379011ea1811", @ANYRES64, @ANYBLOB="ca42ad87c41bb3b2507e4e12104f0cd507000001046f9445657db4996b10208d04454e11fb5b1383c5ce98e3062f45ec04e5b8b179df3d64a6cec05d29235e3cbe0b339abe9faee5cf3e44c97ce56a1dc359047114eeb3c23f331114039d75a664afc47e8273b79e83d301fc4ceec8b89911505b6743797c459195a7120ded1748f315deb90000ffed00000000000000", @ANYRES8=r0, @ANYRES8=r0, @ANYRES64, @ANYBLOB="bd85893dee1670c8c7e3b4a65ec61f224992fd11263b7749c7ee63dd4fc13cc5dfdde8a3099aaf21ece351c316d9bbd7e4ecc524c856f20d6a1818d6d75f702eb904653f9d55af", @ANYRESOCT], 0x1, 0x513, &(0x7f0000000c40)="$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") (fail_nth: 7) 20:41:04 executing program 4: r0 = perf_event_open(&(0x7f0000000a40)={0x2, 0x80, 0xcd, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @perf_bp={&(0x7f0000000200), 0x8}, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfb75}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000040)={0x0, 0x4, 0x0, &(0x7f0000000180)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x80) perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x208, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x4, 0x8001}, 0x4000, 0x0, 0x0, 0x0, 0x0, 0x14e, 0xd1}, 0x0, 0xbfffffffffffffff, r0, 0x19893a9f0a0e2244) r1 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) syz_clone(0x2000000, 0x0, 0x0, 0x0, 0x0, 0x0) r2 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x18, 0x5, &(0x7f00000002c0)=ANY=[@ANYBLOB="180000001800ff0f0000000000000000850000006d000000750000000800000095"], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x80) r3 = perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400, 0x80000, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x7, 0x1007}, 0x8006, 0x0, 0x0, 0x1, 0x4, 0x800000, 0x3}, 0x0, 0xffefffffffffffff, 0xffffffffffffffff, 0x9) ioctl$PERF_EVENT_IOC_SET_FILTER(r3, 0x40082406, &(0x7f00000003c0)='memory.numa_stat\x00') perf_event_open(0x0, 0x0, 0x0, r3, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000080)='sched_switch\x00', r2}, 0x10) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000380)={{0x1, 0xffffffffffffffff}, &(0x7f0000000000), &(0x7f0000000240)=r2}, 0x20) r5 = memfd_secret(0x0) syz_io_uring_setup(0x0, &(0x7f0000000300)={0x0, 0x2, 0x0, 0x0, 0x0, 0x0, r5}, 0x0, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f00000009c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000000a00)=0x14) r7 = openat2(0xffffffffffffff9c, &(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)={0x40841}, 0x18) write$binfmt_script(r7, &(0x7f0000000340)=ANY=[], 0xfffffdef) r8 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000b40)={0x1b, 0x0, 0x0, 0x7, 0x0, 0xffffffffffffffff, 0x200, '\x00', 0x0, 0xffffffffffffffff, 0x3, 0x1, 0x4}, 0x48) r9 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000bc0)={0x2, 0x4, 0x8, 0x1, 0x80, 0x1, 0x9, '\x00', 0x0, 0xffffffffffffffff, 0x4, 0x1, 0x4}, 0x48) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000d00)={0x11, 0x12, &(0x7f0000000440)=@raw=[@exit, @ringbuf_query={{0x18, 0x1, 0x1, 0x0, r4}}, @ringbuf_output={{0x18, 0x1, 0x1, 0x0, r5}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x10001}, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x4, 0x0, 0x0, 0x2}}, @exit, @initr0={0x18, 0x0, 0x0, 0x0, 0x6349, 0x0, 0x0, 0x0, 0xf685}, @ldst={0x3, 0x2, 0x1, 0x0, 0xb, 0x2543a83bb932833c, 0x1}], &(0x7f0000000940)='syzkaller\x00', 0x80000001, 0x27, &(0x7f0000000980)=""/39, 0x41000, 0x40, '\x00', r6, 0x0, r7, 0x8, &(0x7f0000000ac0)={0x3, 0x1}, 0x8, 0x10, &(0x7f0000000b00)={0x2, 0xc, 0xfffffe00, 0x2}, 0x10, 0x0, 0x0, 0x5, &(0x7f0000000c40)=[r2, 0x1, 0x1, r8, r9, r1], &(0x7f0000000c80)=[{0x4, 0x1, 0x8, 0xc}, {0x0, 0x4, 0xf, 0x4}, {0x1, 0x2, 0xd, 0x6}, {0x0, 0x4, 0x10, 0xc}, {0x2, 0x4, 0xd, 0x1}], 0x10, 0x20}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000280)={&(0x7f0000000140)='ext4_ext_show_extent\x00', r2}, 0x10) perf_event_open(&(0x7f0000000080)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) perf_event_open$cgroup(&(0x7f0000000300)={0x5, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_bp={&(0x7f0000000100)}, 0x81252, 0x6, 0x80000001, 0x0, 0x0, 0x0, 0x6, 0x0, 0x6, 0x0, 0x6}, 0xffffffffffffffff, 0xe, 0xffffffffffffffff, 0xc) perf_event_open(0x0, 0x0, 0x2, 0xffffffffffffffff, 0xb) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) perf_event_open(&(0x7f0000000840)={0x2, 0x80, 0x0, 0x7, 0x0, 0x80, 0x0, 0x3, 0x0, 0x9, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, @perf_config_ext={0x8000000000, 0x3}, 0x46c73247dfbe0d, 0x1007e, 0x0, 0x2, 0x0, 0x0, 0x6, 0x0, 0xffffffff, 0x0, 0x1c}, 0x0, 0x9, 0xffffffffffffffff, 0xd) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x4030582a, &(0x7f0000000040)=0x91) [ 115.694838][ T5921] R13: 00007fde2ad58f80 R14: 00007fde2ad58f40 R15: 0000000020003040 [ 115.703822][ T5921] 20:41:04 executing program 1: ioctl$BTRFS_IOC_LOGICAL_INO(0xffffffffffffffff, 0xc0389424, 0x0) r0 = socket$inet6(0xa, 0x3, 0x6) r1 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) r2 = dup2(r1, r0) ioctl$FIDEDUPERANGE(r0, 0xc0189436, &(0x7f0000000f00)=ANY=[@ANYBLOB="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"]) ioctl$TIOCSBRK(r2, 0x5427) recvfrom$inet6(0xffffffffffffffff, &(0x7f0000000280)=""/134, 0x86, 0x40000102, &(0x7f0000000340)={0xa, 0x4e21, 0x77f, @mcast1, 0x403b3f}, 0x1c) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000001040)={{r2, 0xffffffffffffffff}, &(0x7f0000000140), &(0x7f0000000480)=r1}, 0x20) syz_read_part_table(0x593, &(0x7f00000005c0)="$eJzs0r1LK2kUB+A3A5c0e4lcLli4hWCwigqx0CIpRGJIY0RcsbAWLLQQLCwkEq39+AcUv0BsxD6lGEEUYiUpxXpBsUmVZdfZxmplUdnleZrhPefMHF5+E/hPi8Lv7XY7EUJoJ9//9m+nhbFS98TI5FQIiTAbQij8+stfnUQ88fdXz+NzOT6XktnG/vXo82nHTc9dPX0Yxf1aFMJaCGHh4Sj1b+/G/99Z/jK1vrFU3FzJz98XVx8H5/oKXVuFxZ2hg1xlujM3E/9Ytehz9qcbw8e37fLT7vf+b/VGK3sVz2USH7Ofr/U2/72f1Wa1Nd57sjyQ+dG8qGzHub/IHwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA+GBn+cvU+sZScXMlP39fXH0cnOsrdG0VFneGDnKV6c7cTPQ6V4s+Z3+6MXx82y4/7X7v/1ZvtLJX8Vwm8TH7+Vpv89/7WW1WW+O9J8sDmR/Ni8p2nPuL/AEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAACAf6gwVuqeGJmcCiERZkMIo1HH0Z/1dvK1n4jnzuNnOa6XktnG/vXo82nHTc9dPX04EddrUQhrIYSFh6PUp1+Gd/sjAAD///tch0s=") r4 = creat(&(0x7f0000000240)='./file0\x00', 0x0) stat(&(0x7f0000000040)='./file1\x00', &(0x7f0000000380)) fsetxattr$security_capability(r4, &(0x7f0000000100), &(0x7f0000000000)=@v1={0x1000000, [{0x80000000, 0x81}]}, 0xc, 0x0) newfstatat(0xffffffffffffff9c, &(0x7f00000000c0)='./file1\x00', &(0x7f0000001400), 0x400) close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x2) ioctl$TIOCSTI(r4, 0x5412, &(0x7f00000004c0)=0x40) fsync(0xffffffffffffffff) write$binfmt_misc(r4, &(0x7f0000001080)=ANY=[@ANYBLOB="7379d3c6"], 0x4) fallocate(r4, 0x100000011, 0x0, 0x2811fdff) open(&(0x7f0000000100)='.\x00', 0x20c2, 0x2d) open$dir(&(0x7f0000000500)='./file1\x00', 0x1c6c0, 0x0) r5 = openat$vcsu(0xffffffffffffff9c, &(0x7f0000000cc0), 0x400c00, 0x0) lsetxattr$security_selinux(&(0x7f0000001180)='./file1\x00', &(0x7f00000011c0), &(0x7f0000001300)='system_u:object_r:unconfined_exec_t:s0\x00', 0x27, 0x3) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000400)={0xffffffffffffffff, 0xe0, &(0x7f0000000300)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, &(0x7f00000000c0)=[0x0], &(0x7f0000000140), 0x0, 0x8, &(0x7f0000000200)=[{}, {}, {}, {}, {}], 0x28, 0x0, 0x0, 0x0, 0x0, 0x10, 0x8, 0x8, &(0x7f00000002c0)}}, 0x10) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000e80)=@bpf_lsm={0x1d, 0x4, &(0x7f0000000040)=@framed={{0x18, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x73fc}, [@generic={0x9, 0x8, 0x0, 0x7f, 0x200}]}, &(0x7f0000000880)='GPL\x00', 0x1f, 0x93, &(0x7f0000000cc0)=""/147, 0x40f00, 0x2, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, &(0x7f0000000b80)={0x9}, 0x8, 0x10, 0x0, 0x0, r6}, 0x80) r7 = socket$nl_generic(0x10, 0x3, 0x10) r8 = syz_genetlink_get_family_id$tipc(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$TIPC_CMD_ENABLE_BEARER(r7, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000001200)=ANY=[@ANYBLOB="3400000006c08fada241ee0a049e6fba3f36f40da839bbdf54c31768b0026f4261f56d51c5d81ba4cb99f8203c40d0a142fcd75ce26e408d229139f8c4e81109c56a18e453e8a537df21c4ec04a4f3e22f4ac125a28ad43e41107b1f7e79c8573985e54fd665e2913ca74da8c9f3fc2839258c19fa7ac20ebead31206cf280ea73f635bc5418b66554392dfd11874fef72bc53538aae3cb5ef8a80140f4737dd2c572a03ee1d5e3d627e", @ANYRESOCT=0x0, @ANYBLOB="010000000000000000000100000000000000014100000018001700000000000000007564503a73"], 0x34}, 0x1, 0x0, 0x0, 0x1}, 0x0) ioctl$AUTOFS_DEV_IOCTL_PROTOSUBVER(r1, 0xc0189373, &(0x7f0000000540)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x6}}, './file0\x00'}) sendmsg$TIPC_CMD_GET_MAX_PORTS(r5, &(0x7f0000001140)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x40000}, 0xc, &(0x7f0000001100)={&(0x7f00000010c0)={0x1c, r8, 0x400, 0x8000, 0x25dfdbfe, {}, ["", "", "", "", "", "", ""]}, 0x1c}, 0x1, 0x0, 0x0, 0x20048854}, 0x4004) bpf$PROG_LOAD(0x5, &(0x7f0000000e40)={0x5, 0x16, &(0x7f0000001340)=ANY=[@ANYBLOB="390000000100000000000000900000f117fa0000", @ANYRES32=r4, @ANYBLOB="1f00000000000000b703000000000000850000000c000000b61b0453c29f42b5be06c7010b4efffe000000000085000000a900000018150000", @ANYRES32=r3, @ANYBLOB="0000000000000000180100002020782500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b70300000000850000005d000000185500000100000000000000000000009500000000000000"], &(0x7f0000000b80)='syzkaller\x00', 0x1, 0xe8, &(0x7f0000000bc0)=""/232, 0x41000, 0x5b, '\x00', 0x0, 0xe, r5, 0x8, &(0x7f0000000d00)={0x5, 0x2}, 0x8, 0x10, &(0x7f0000000d40)={0x4, 0xe, 0x2, 0x8}, 0x10, r6, r4, 0x5, &(0x7f0000000d80), &(0x7f0000000dc0)=[{0x4, 0x3, 0x0, 0x2}, {0x3, 0x1, 0xa, 0xa}, {0x0, 0x3, 0x2, 0xa}, {0x0, 0x3, 0x7, 0x1}, {0x1, 0x5, 0xb, 0xc}], 0x10, 0x7}, 0x90) 20:41:04 executing program 0: r0 = openat$nci(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) close_range(r0, 0xffffffffffffffff, 0xe) [ 115.744593][ T5931] FAULT_INJECTION: forcing a failure. [ 115.744593][ T5931] name failslab, interval 1, probability 0, space 0, times 0 [ 115.758225][ T5931] CPU: 1 PID: 5931 Comm: syz-executor.3 Not tainted 6.8.0-rc2-syzkaller-00084-g5c24e4e9e708 #0 [ 115.776018][ T5931] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/25/2024 [ 115.791719][ T5931] Call Trace: [ 115.795809][ T5931] [ 115.799033][ T5931] dump_stack_lvl+0xda/0x130 [ 115.805740][ T5931] dump_stack+0x15/0x20 [ 115.813160][ T5931] should_fail_ex+0x21f/0x230 [ 115.823889][ T5931] ? security_file_alloc+0x32/0xd0 [ 115.832048][ T5931] __should_failslab+0x92/0xa0 [ 115.838899][ T5931] should_failslab+0x9/0x20 [ 115.846013][ T5931] kmem_cache_alloc+0x56/0x2d0 [ 115.855725][ T5931] ? alloc_empty_file+0xd0/0x310 [ 115.862535][ T5931] security_file_alloc+0x32/0xd0 [ 115.869817][ T5931] alloc_empty_file+0x121/0x310 [ 115.875478][ T5931] alloc_file+0x3a/0x300 [ 115.880213][ T5931] alloc_file_pseudo+0xb0/0x110 [ 115.887616][ T5931] __shmem_file_setup+0x1b6/0x1f0 [ 115.897813][ T5931] shmem_file_setup+0x3b/0x50 [ 115.905353][ T5931] __se_sys_memfd_create+0x318/0x610 [ 115.912034][ T5931] __x64_sys_memfd_create+0x31/0x40 [ 115.921227][ T5931] do_syscall_64+0xcd/0x1d0 [ 115.926774][ T5931] entry_SYSCALL_64_after_hwframe+0x63/0x6b [ 115.935293][ T5931] RIP: 0033:0x7fde2b9d7da9 [ 115.941386][ T5931] Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 e1 20 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b0 ff ff ff f7 d8 64 89 01 48 [ 115.967192][ T5931] RSP: 002b:00007fde2ad58ea8 EFLAGS: 00000202 ORIG_RAX: 000000000000013f [ 115.978374][ T5931] RAX: ffffffffffffffda RBX: 0000000000000513 RCX: 00007fde2b9d7da9 20:41:04 executing program 0: r0 = openat$nci(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) close_range(r0, 0xffffffffffffffff, 0x10) 20:41:04 executing program 2: r0 = perf_event_open(&(0x7f0000000a40)={0x2, 0x80, 0xcd, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @perf_bp={&(0x7f0000000200), 0x8}, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfb75}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000040)={0x0, 0x4, 0x0, &(0x7f0000000180)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x80) perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x208, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x4, 0x8001}, 0x4000, 0x0, 0x0, 0x0, 0x0, 0x14e, 0xd1}, 0x0, 0xbfffffffffffffff, r0, 0x19893a9f0a0e2244) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) syz_clone(0x2000000, 0x0, 0x0, 0x0, 0x0, 0x0) r1 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x18, 0x5, &(0x7f00000002c0)=ANY=[@ANYBLOB="180000001800ff0f0000000000000000850000006d000000750000000800000095"], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x80) r2 = perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400, 0x80000, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x7, 0x1007}, 0x8006, 0x0, 0x0, 0x1, 0x4, 0x800000, 0x3}, 0x0, 0xffefffffffffffff, 0xffffffffffffffff, 0x9) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x40082406, &(0x7f00000003c0)='memory.numa_stat\x00') perf_event_open(0x0, 0x0, 0x0, r2, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000080)='sched_switch\x00', r1}, 0x10) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000380)={{0x1}, &(0x7f0000000000), &(0x7f0000000240)=r1}, 0x20) r3 = memfd_secret(0x0) syz_io_uring_setup(0x0, &(0x7f0000000300)={0x0, 0x2, 0x0, 0x0, 0x0, 0x0, r3}, 0x0, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f00000009c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000000a00)=0x14) r4 = openat2(0xffffffffffffff9c, &(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)={0x40841}, 0x18) write$binfmt_script(r4, &(0x7f0000000340)=ANY=[], 0xfffffdef) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000b40)={0x1b, 0x0, 0x0, 0x7, 0x0, 0xffffffffffffffff, 0x200, '\x00', 0x0, 0xffffffffffffffff, 0x3, 0x1, 0x4}, 0x48) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000bc0)={0x2, 0x4, 0x8, 0x1, 0x80, 0x1, 0x9, '\x00', 0x0, 0xffffffffffffffff, 0x4, 0x1, 0x4}, 0x48) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000280)={&(0x7f0000000140)='ext4_ext_show_extent\x00', r1}, 0x10) r5 = perf_event_open(&(0x7f0000000080)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) r6 = gettid() perf_event_open$cgroup(&(0x7f0000000300)={0x5, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_bp={&(0x7f0000000100)}, 0x81252, 0x6, 0x80000001, 0x0, 0x0, 0x0, 0x6, 0x0, 0x6, 0x0, 0x6}, 0xffffffffffffffff, 0xe, 0xffffffffffffffff, 0xc) perf_event_open(0x0, r6, 0x2, 0xffffffffffffffff, 0xb) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) perf_event_open(&(0x7f0000000840)={0x2, 0x80, 0x0, 0x7, 0x0, 0x80, 0x0, 0x3, 0x0, 0x9, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, @perf_config_ext={0x8000000000, 0x3}, 0x46c73247dfbe0d, 0x1007e, 0x0, 0x2, 0x0, 0x0, 0x6, 0x0, 0xffffffff, 0x0, 0x1c}, 0x0, 0x9, 0xffffffffffffffff, 0xd) bpf$PROG_LOAD(0x5, &(0x7f0000000780)={0x14, 0x4, &(0x7f00000008c0)=ANY=[@ANYBLOB="850000006b00000018150000a3df7ddd9621fb0201050062d91123e632b2f902ad1e9f1cc7a66ed51ac8a4070000000000000019a83f0b7c9502871fb1ca3dc499e804bbbc359859ed6fd9f104fc7ed900d122072d8275a24d000000000601c3a63953a7b36fe458", @ANYRES32, @ANYBLOB="00000000000000002d59e4eda4000000"], &(0x7f0000000400)='syzkaller\x00', 0xfff, 0xe3, &(0x7f0000000580)=""/227, 0x0, 0x4, '\x00', 0x0, 0x24, 0xffffffffffffffff, 0x8, &(0x7f0000000500)={0x1, 0x3}, 0x8, 0x10, &(0x7f0000000680)={0x5, 0x6, 0x81, 0x9}, 0x10, 0xffffffffffffffff, 0xffffffffffffffff, 0x0, &(0x7f00000006c0)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, r5]}, 0x80) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x4030582a, &(0x7f0000000040)=0x91) 20:41:04 executing program 3: gettid() bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) fstat(0xffffffffffffffff, 0x0) r0 = getegid() syz_mount_image$ext4(&(0x7f0000000100)='ext4\x00', &(0x7f0000000200)='./file1\x00', 0x3000000, &(0x7f0000003040)=ANY=[@ANYRES64=r0, @ANYBLOB="8555591a163448f4c52bee6cc0e12a6a8610718f818822e94c360e46f93ac9c63a1b40ea9d758c2b4e2d7c386a141016d11cb13fabc846fc7fb242c175fbdf96e2a96e80e82b73987b1d5dfd843c7e6748a15a0c4160f5e4c468e8f8e417bd3385546159881194fe3a7cf8307cd9c7ce0ca180a481d4dcaa6611ec5c8ff1c546360dea3da9f2bfc1fd71af9ebf2afe4285f013a3929a7096097976a16e2060e5f26e379011ea1811", @ANYRES64, @ANYBLOB="ca42ad87c41bb3b2507e4e12104f0cd507000001046f9445657db4996b10208d04454e11fb5b1383c5ce98e3062f45ec04e5b8b179df3d64a6cec05d29235e3cbe0b339abe9faee5cf3e44c97ce56a1dc359047114eeb3c23f331114039d75a664afc47e8273b79e83d301fc4ceec8b89911505b6743797c459195a7120ded1748f315deb90000ffed00000000000000", @ANYRES8=r0, @ANYRES8=r0, @ANYRES64, @ANYBLOB="bd85893dee1670c8c7e3b4a65ec61f224992fd11263b7749c7ee63dd4fc13cc5dfdde8a3099aaf21ece351c316d9bbd7e4ecc524c856f20d6a1818d6d75f702eb904653f9d55af", @ANYRESOCT], 0x1, 0x513, &(0x7f0000000c40)="$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") (fail_nth: 8) [ 115.989917][ T5931] RDX: 00007fde2ad58f80 RSI: 0000000000000000 RDI: 00007fde2ba236e1 [ 115.998202][ T5931] RBP: 0000000020000c40 R08: 00007fde2ad58c47 R09: 00007fde2ad58ed0 [ 116.006186][ T5931] R10: 000000000000000a R11: 0000000000000202 R12: 0000000020000200 [ 116.014276][ T5931] R13: 00007fde2ad58f80 R14: 00007fde2ad58f40 R15: 0000000020003040 [ 116.022262][ T5931] 20:41:04 executing program 0: r0 = openat$nci(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) close_range(r0, 0xffffffffffffffff, 0x11) [ 116.102230][ T5940] loop1: detected capacity change from 0 to 2048 [ 116.135895][ T5950] FAULT_INJECTION: forcing a failure. [ 116.135895][ T5950] name failslab, interval 1, probability 0, space 0, times 0 [ 116.148632][ T5950] CPU: 0 PID: 5950 Comm: syz-executor.3 Not tainted 6.8.0-rc2-syzkaller-00084-g5c24e4e9e708 #0 [ 116.158981][ T5950] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/25/2024 [ 116.169065][ T5950] Call Trace: [ 116.172448][ T5950] [ 116.175549][ T5950] dump_stack_lvl+0xda/0x130 [ 116.180176][ T5950] dump_stack+0x15/0x20 [ 116.184464][ T5950] should_fail_ex+0x21f/0x230 [ 116.189174][ T5950] ? vm_area_alloc+0x2c/0x130 [ 116.193895][ T5950] __should_failslab+0x92/0xa0 [ 116.198714][ T5950] should_failslab+0x9/0x20 [ 116.203326][ T5950] kmem_cache_alloc+0x56/0x2d0 [ 116.208146][ T5950] vm_area_alloc+0x2c/0x130 [ 116.212670][ T5950] mmap_region+0x85b/0x1640 [ 116.217189][ T5950] ? security_mmap_addr+0x46/0x60 [ 116.222267][ T5950] ? get_unmapped_area+0x246/0x270 [ 116.227504][ T5950] do_mmap+0x6a5/0xab0 [ 116.231646][ T5950] vm_mmap_pgoff+0x12e/0x240 [ 116.236326][ T5950] ksys_mmap_pgoff+0xc5/0x330 [ 116.241084][ T5950] ? fpregs_assert_state_consistent+0x82/0x90 [ 116.247165][ T5950] do_syscall_64+0xcd/0x1d0 [ 116.251681][ T5950] entry_SYSCALL_64_after_hwframe+0x63/0x6b [ 116.258413][ T5950] RIP: 0033:0x7fde2b9d7de3 [ 116.272485][ T5950] Code: f7 d8 64 89 01 48 83 c8 ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 00 41 89 ca 41 f7 c1 ff 0f 00 00 75 14 b8 09 00 00 00 0f 05 <48> 3d 00 f0 ff ff 77 25 c3 0f 1f 40 00 48 c7 c0 b0 ff ff ff 64 c7 [ 116.294154][ T5950] RSP: 002b:00007fde2ad58ea8 EFLAGS: 00000246 ORIG_RAX: 0000000000000009 [ 116.302628][ T5950] RAX: ffffffffffffffda RBX: 0000000000000511 RCX: 00007fde2b9d7de3 [ 116.310815][ T5950] RDX: 0000000000000003 RSI: 0000000008400000 RDI: 0000000000000000 [ 116.319419][ T5950] RBP: 0000000020000c42 R08: 00000000ffffffff R09: 0000000000000000 [ 116.327492][ T5950] R10: 0000000000000022 R11: 0000000000000246 R12: 0000000000000004 [ 116.335708][ T5950] R13: 00007fde2ad58f80 R14: 00007fde2ad58f40 R15: 0000000020003040 [ 116.343710][ T5950] 20:41:04 executing program 3: gettid() bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) fstat(0xffffffffffffffff, 0x0) r0 = getegid() syz_mount_image$ext4(&(0x7f0000000100)='ext4\x00', &(0x7f0000000200)='./file1\x00', 0x3000000, &(0x7f0000003040)=ANY=[@ANYRES64=r0, @ANYBLOB="8555591a163448f4c52bee6cc0e12a6a8610718f818822e94c360e46f93ac9c63a1b40ea9d758c2b4e2d7c386a141016d11cb13fabc846fc7fb242c175fbdf96e2a96e80e82b73987b1d5dfd843c7e6748a15a0c4160f5e4c468e8f8e417bd3385546159881194fe3a7cf8307cd9c7ce0ca180a481d4dcaa6611ec5c8ff1c546360dea3da9f2bfc1fd71af9ebf2afe4285f013a3929a7096097976a16e2060e5f26e379011ea1811", @ANYRES64, @ANYBLOB="ca42ad87c41bb3b2507e4e12104f0cd507000001046f9445657db4996b10208d04454e11fb5b1383c5ce98e3062f45ec04e5b8b179df3d64a6cec05d29235e3cbe0b339abe9faee5cf3e44c97ce56a1dc359047114eeb3c23f331114039d75a664afc47e8273b79e83d301fc4ceec8b89911505b6743797c459195a7120ded1748f315deb90000ffed00000000000000", @ANYRES8=r0, @ANYRES8=r0, @ANYRES64, @ANYBLOB="bd85893dee1670c8c7e3b4a65ec61f224992fd11263b7749c7ee63dd4fc13cc5dfdde8a3099aaf21ece351c316d9bbd7e4ecc524c856f20d6a1818d6d75f702eb904653f9d55af", @ANYRESOCT], 0x1, 0x513, &(0x7f0000000c40)="$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") (fail_nth: 9) 20:41:04 executing program 0: r0 = openat$nci(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) close_range(r0, 0xffffffffffffffff, 0x12) [ 116.450816][ T5940] loop1: p2 p3 p7 [ 116.475908][ T5962] FAULT_INJECTION: forcing a failure. [ 116.475908][ T5962] name failslab, interval 1, probability 0, space 0, times 0 [ 116.488767][ T5962] CPU: 1 PID: 5962 Comm: syz-executor.3 Not tainted 6.8.0-rc2-syzkaller-00084-g5c24e4e9e708 #0 [ 116.499395][ T5962] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/25/2024 [ 116.512090][ T5962] Call Trace: [ 116.515428][ T5962] [ 116.518466][ T5962] dump_stack_lvl+0xda/0x130 [ 116.523483][ T5962] dump_stack+0x15/0x20 [ 116.527860][ T5962] should_fail_ex+0x21f/0x230 [ 116.532742][ T5962] ? vm_area_alloc+0xac/0x130 [ 116.537545][ T5962] __should_failslab+0x92/0xa0 [ 116.542414][ T5962] should_failslab+0x9/0x20 [ 116.547221][ T5962] kmem_cache_alloc+0x56/0x2d0 [ 116.552227][ T5962] vm_area_alloc+0xac/0x130 [ 116.556895][ T5962] mmap_region+0x85b/0x1640 [ 116.561417][ T5962] ? security_mmap_addr+0x46/0x60 [ 116.566486][ T5962] ? get_unmapped_area+0x246/0x270 [ 116.572616][ T5962] do_mmap+0x6a5/0xab0 [ 116.576851][ T5962] vm_mmap_pgoff+0x12e/0x240 [ 116.581492][ T5962] ksys_mmap_pgoff+0xc5/0x330 [ 116.586191][ T5962] ? fpregs_assert_state_consistent+0x82/0x90 [ 116.593076][ T5962] do_syscall_64+0xcd/0x1d0 [ 116.597703][ T5962] entry_SYSCALL_64_after_hwframe+0x63/0x6b [ 116.603743][ T5962] RIP: 0033:0x7fde2b9d7de3 [ 116.608709][ T5962] Code: f7 d8 64 89 01 48 83 c8 ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 00 41 89 ca 41 f7 c1 ff 0f 00 00 75 14 b8 09 00 00 00 0f 05 <48> 3d 00 f0 ff ff 77 25 c3 0f 1f 40 00 48 c7 c0 b0 ff ff ff 64 c7 [ 116.633144][ T5962] RSP: 002b:00007fde2ad58ea8 EFLAGS: 00000246 ORIG_RAX: 0000000000000009 [ 116.641802][ T5962] RAX: ffffffffffffffda RBX: 0000000000000511 RCX: 00007fde2b9d7de3 [ 116.649813][ T5962] RDX: 0000000000000003 RSI: 0000000008400000 RDI: 0000000000000000 [ 116.658480][ T5962] RBP: 0000000020000c42 R08: 00000000ffffffff R09: 0000000000000000 [ 116.667849][ T5962] R10: 0000000000000022 R11: 0000000000000246 R12: 0000000000000004 20:41:05 executing program 3: gettid() bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) fstat(0xffffffffffffffff, 0x0) r0 = getegid() syz_mount_image$ext4(&(0x7f0000000100)='ext4\x00', &(0x7f0000000200)='./file1\x00', 0x3000000, &(0x7f0000003040)=ANY=[@ANYRES64=r0, @ANYBLOB="8555591a163448f4c52bee6cc0e12a6a8610718f818822e94c360e46f93ac9c63a1b40ea9d758c2b4e2d7c386a141016d11cb13fabc846fc7fb242c175fbdf96e2a96e80e82b73987b1d5dfd843c7e6748a15a0c4160f5e4c468e8f8e417bd3385546159881194fe3a7cf8307cd9c7ce0ca180a481d4dcaa6611ec5c8ff1c546360dea3da9f2bfc1fd71af9ebf2afe4285f013a3929a7096097976a16e2060e5f26e379011ea1811", @ANYRES64, @ANYBLOB="ca42ad87c41bb3b2507e4e12104f0cd507000001046f9445657db4996b10208d04454e11fb5b1383c5ce98e3062f45ec04e5b8b179df3d64a6cec05d29235e3cbe0b339abe9faee5cf3e44c97ce56a1dc359047114eeb3c23f331114039d75a664afc47e8273b79e83d301fc4ceec8b89911505b6743797c459195a7120ded1748f315deb90000ffed00000000000000", @ANYRES8=r0, @ANYRES8=r0, @ANYRES64, @ANYBLOB="bd85893dee1670c8c7e3b4a65ec61f224992fd11263b7749c7ee63dd4fc13cc5dfdde8a3099aaf21ece351c316d9bbd7e4ecc524c856f20d6a1818d6d75f702eb904653f9d55af", @ANYRESOCT], 0x1, 0x513, &(0x7f0000000c40)="$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") (fail_nth: 10) 20:41:05 executing program 0: r0 = openat$nci(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) close_range(r0, 0xffffffffffffffff, 0x48) [ 116.676445][ T5962] R13: 00007fde2ad58f80 R14: 00007fde2ad58f40 R15: 0000000020003040 [ 116.684784][ T5962] [ 116.732195][ T5970] FAULT_INJECTION: forcing a failure. [ 116.732195][ T5970] name failslab, interval 1, probability 0, space 0, times 0 [ 116.744923][ T5970] CPU: 1 PID: 5970 Comm: syz-executor.3 Not tainted 6.8.0-rc2-syzkaller-00084-g5c24e4e9e708 #0 [ 116.755356][ T5970] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/25/2024 [ 116.765479][ T5970] Call Trace: [ 116.768776][ T5970] [ 116.771721][ T5970] dump_stack_lvl+0xda/0x130 [ 116.776348][ T5970] dump_stack+0x15/0x20 [ 116.780580][ T5970] should_fail_ex+0x21f/0x230 [ 116.785293][ T5970] ? mas_alloc_nodes+0x1d3/0x4a0 [ 116.790268][ T5970] __should_failslab+0x92/0xa0 [ 116.795082][ T5970] should_failslab+0x9/0x20 [ 116.799641][ T5970] kmem_cache_alloc+0x56/0x2d0 [ 116.804509][ T5970] mas_alloc_nodes+0x1d3/0x4a0 [ 116.809313][ T5970] mas_preallocate+0x773/0xc30 [ 116.814120][ T5970] mmap_region+0xed4/0x1640 [ 116.818651][ T5970] ? security_mmap_addr+0x46/0x60 [ 116.823747][ T5970] ? get_unmapped_area+0x246/0x270 [ 116.828883][ T5970] do_mmap+0x6a5/0xab0 [ 116.833068][ T5970] vm_mmap_pgoff+0x12e/0x240 [ 116.838121][ T5970] ksys_mmap_pgoff+0xc5/0x330 [ 116.842958][ T5970] do_syscall_64+0xcd/0x1d0 [ 116.847503][ T5970] entry_SYSCALL_64_after_hwframe+0x63/0x6b [ 116.853658][ T5970] RIP: 0033:0x7fde2b9d7de3 [ 116.858308][ T5970] Code: f7 d8 64 89 01 48 83 c8 ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 00 41 89 ca 41 f7 c1 ff 0f 00 00 75 14 b8 09 00 00 00 0f 05 <48> 3d 00 f0 ff ff 77 25 c3 0f 1f 40 00 48 c7 c0 b0 ff ff ff 64 c7 20:41:05 executing program 3: gettid() bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) fstat(0xffffffffffffffff, 0x0) r0 = getegid() syz_mount_image$ext4(&(0x7f0000000100)='ext4\x00', &(0x7f0000000200)='./file1\x00', 0x3000000, &(0x7f0000003040)=ANY=[@ANYRES64=r0, @ANYBLOB="8555591a163448f4c52bee6cc0e12a6a8610718f818822e94c360e46f93ac9c63a1b40ea9d758c2b4e2d7c386a141016d11cb13fabc846fc7fb242c175fbdf96e2a96e80e82b73987b1d5dfd843c7e6748a15a0c4160f5e4c468e8f8e417bd3385546159881194fe3a7cf8307cd9c7ce0ca180a481d4dcaa6611ec5c8ff1c546360dea3da9f2bfc1fd71af9ebf2afe4285f013a3929a7096097976a16e2060e5f26e379011ea1811", @ANYRES64, @ANYBLOB="ca42ad87c41bb3b2507e4e12104f0cd507000001046f9445657db4996b10208d04454e11fb5b1383c5ce98e3062f45ec04e5b8b179df3d64a6cec05d29235e3cbe0b339abe9faee5cf3e44c97ce56a1dc359047114eeb3c23f331114039d75a664afc47e8273b79e83d301fc4ceec8b89911505b6743797c459195a7120ded1748f315deb90000ffed00000000000000", @ANYRES8=r0, @ANYRES8=r0, @ANYRES64, @ANYBLOB="bd85893dee1670c8c7e3b4a65ec61f224992fd11263b7749c7ee63dd4fc13cc5dfdde8a3099aaf21ece351c316d9bbd7e4ecc524c856f20d6a1818d6d75f702eb904653f9d55af", @ANYRESOCT], 0x1, 0x513, &(0x7f0000000c40)="$eJzs3W9rJHcdAPDvTLJp7i41WxU5C7bFVu6K3m7S2DaKtBVEHxXU+jzGZBNCNtmQ3dRLKJriCxBEVPAF+ETwBQjSlyDCgT4XFUX0Th/qjczuRPNnN1mSTfbcfD4w2d9v/n2/vyE7O39+zARwbb0QEW9FxFhEvBwR08X4tBgW8sp+Z75HD99byocksuydvyWRFOMO1pXXxyPiVmeRmIyIr38l4lvJybjN3b31xXq9tl3Uq62NrWpzd+/e2sbiam21tjk3N/va/Ovzr87PZIULtbMcEW986U8/+v7PvvzGrz7z7d8v/OXud/K0vvCxTt4RsXShAD101l1qb4sD+TbavoxgQ5K3pzQ27CwAAOhHfoz/4Yj4ZPv4fzrG2kdzAAAAwCjJ3pyKfyURGQAAADCy0oiYiiStFH0BpiJNK5VOH96Pxs203mi2Pr3S2NlczqdFlKOUrqzVazNFX+FylJK8Plv0sT2ov3KsPhcRz0TED6dvtOuVpUZ9edgXPwAAAOCauPX80fP/f06n7TIAAAAwYso9KwAAAMCocMoPAAAAo8/5PwAAAIy0r779dj5kB+/xXn53d2e98e695VpzvbKxs1RZamxvVVYbjdX2M/s2zlpfvdHY+mxs7tyvtmrNVrW5u7ew0djZbC2sHXkFNgAAAHCFnnn+g98lEbH/+RvtIYrnAAIc8cdhJwAM0tiwEwCGZnzYCQBDUzpzDnsIGHXJGdNPdt7pXCuMX19OPgAAwODd+fjJ+/8TxbSzrw0A/8/09QGA68fdPbi+SuftAXh70JkAw/KhzsdTvab3fHhHH/f/O9cYsuxciQEAAAMz1R6StFIcp09FmlYqEU+3XwtQSlbW6rWZ4vzgt9Olp/L6bHvJ5Mw+wwAAAAAAAAAAAAAAAAAAAAAAAABAR5YlkQEAAAAjLSL9c9J+mn/EnemXpo5eHTj21q+fvvPj+4ut1vZsxETy9+l81EREtH5SjH8l80oAAAAAeAJ0ztOLz9lhZwMAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAADAqHn08L2lg+Eq4/71ixFR7hZ/PCbbn5NRioib/0hi/NBySUSMDSD+/vsRcbtb/CQeZ1lWLrLoFv/GJccvtzdN9/hpRNwaQHy4zj7I9z9vdfv+pfFC+7P792+8GC6q9/4v/e/+b6zH/ufpY/Venn3wi2rP+O9HPDveff9zED/pxD8SIq+82Gcbv/mNvb2uEw6tslv8w7GqrY2tanN3797axuJqbbW2OTc3+9r86/Ovzs9UV9bqteJv1zA/+MQvH5/W/ps94pePtv/E9n+pr9Zn8e8H9x9+pFMpdYt/98Xuv7+3e8RPi9++TxXlfPqdg/J+p3zYcz//zXOntX+5R/snz2j/3b7aH597+Wvf+0PXKSe2BgBwFZq7e+uL9Xpt+5TCZB/zXHHhzScjjQEW4slIY1iF7Lud/8eLreeCi58oZBdZfDwGkMbEie/pWJx3hUnEfr6uPv8hAQCAEfO/g/7T7iABAAAAAAAAAAAAAAAAAAAAl+mcjyWbjIi+Zz4ec384TQUAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAONV/AgAA//8FStFZ") (fail_nth: 11) 20:41:05 executing program 0: r0 = openat$nci(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) close_range(r0, 0xffffffffffffffff, 0x4c) [ 116.878188][ T5970] RSP: 002b:00007fde2ad58ea8 EFLAGS: 00000246 ORIG_RAX: 0000000000000009 [ 116.887023][ T5970] RAX: ffffffffffffffda RBX: 0000000000000511 RCX: 00007fde2b9d7de3 [ 116.895031][ T5970] RDX: 0000000000000003 RSI: 0000000008400000 RDI: 0000000000000000 [ 116.903023][ T5970] RBP: 0000000020000c42 R08: 00000000ffffffff R09: 0000000000000000 [ 116.911101][ T5970] R10: 0000000000000022 R11: 0000000000000246 R12: 0000000000000004 [ 116.919170][ T5970] R13: 00007fde2ad58f80 R14: 00007fde2ad58f40 R15: 0000000020003040 [ 116.927196][ T5970] 20:41:05 executing program 4: r0 = perf_event_open(&(0x7f0000000a40)={0x2, 0x80, 0xcd, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @perf_bp={&(0x7f0000000200), 0x8}, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfb75}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000040)={0x0, 0x4, 0x0, &(0x7f0000000180)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x80) perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x208, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x4, 0x8001}, 0x4000, 0x0, 0x0, 0x0, 0x0, 0x14e, 0xd1}, 0x0, 0xbfffffffffffffff, r0, 0x19893a9f0a0e2244) r1 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) syz_clone(0x2000000, 0x0, 0x0, 0x0, 0x0, 0x0) r2 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x18, 0x5, &(0x7f00000002c0)=ANY=[@ANYBLOB="180000001800ff0f0000000000000000850000006d000000750000000800000095"], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x80) r3 = perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400, 0x80000, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x7, 0x1007}, 0x8006, 0x0, 0x0, 0x1, 0x4, 0x800000, 0x3}, 0x0, 0xffefffffffffffff, 0xffffffffffffffff, 0x9) ioctl$PERF_EVENT_IOC_SET_FILTER(r3, 0x40082406, &(0x7f00000003c0)='memory.numa_stat\x00') perf_event_open(0x0, 0x0, 0x0, r3, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000080)='sched_switch\x00', r2}, 0x10) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000380)={{0x1, 0xffffffffffffffff}, &(0x7f0000000000), &(0x7f0000000240)=r2}, 0x20) r5 = memfd_secret(0x0) syz_io_uring_setup(0x0, &(0x7f0000000300)={0x0, 0x2, 0x0, 0x0, 0x0, 0x0, r5}, 0x0, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f00000009c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000000a00)=0x14) r7 = openat2(0xffffffffffffff9c, &(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)={0x40841}, 0x18) write$binfmt_script(r7, &(0x7f0000000340)=ANY=[], 0xfffffdef) r8 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000b40)={0x1b, 0x0, 0x0, 0x7, 0x0, 0xffffffffffffffff, 0x200, '\x00', 0x0, 0xffffffffffffffff, 0x3, 0x1, 0x4}, 0x48) r9 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000bc0)={0x2, 0x4, 0x8, 0x1, 0x80, 0x1, 0x9, '\x00', 0x0, 0xffffffffffffffff, 0x4, 0x1, 0x4}, 0x48) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000d00)={0x11, 0x12, &(0x7f0000000440)=@raw=[@exit, @ringbuf_query={{0x18, 0x1, 0x1, 0x0, r4}}, @ringbuf_output={{0x18, 0x1, 0x1, 0x0, r5}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x10001}, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x4, 0x0, 0x0, 0x2}}, @exit, @initr0={0x18, 0x0, 0x0, 0x0, 0x6349, 0x0, 0x0, 0x0, 0xf685}, @ldst={0x3, 0x2, 0x1, 0x0, 0xb, 0x2543a83bb932833c, 0x1}], &(0x7f0000000940)='syzkaller\x00', 0x80000001, 0x27, &(0x7f0000000980)=""/39, 0x41000, 0x40, '\x00', r6, 0x0, r7, 0x8, &(0x7f0000000ac0)={0x3, 0x1}, 0x8, 0x10, &(0x7f0000000b00)={0x2, 0xc, 0xfffffe00, 0x2}, 0x10, 0x0, 0x0, 0x5, &(0x7f0000000c40)=[r2, 0x1, 0x1, r8, r9, r1], &(0x7f0000000c80)=[{0x4, 0x1, 0x8, 0xc}, {0x0, 0x4, 0xf, 0x4}, {0x1, 0x2, 0xd, 0x6}, {0x0, 0x4, 0x10, 0xc}, {0x2, 0x4, 0xd, 0x1}], 0x10, 0x20}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000280)={&(0x7f0000000140)='ext4_ext_show_extent\x00', r2}, 0x10) perf_event_open(&(0x7f0000000080)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) perf_event_open$cgroup(&(0x7f0000000300)={0x5, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_bp={&(0x7f0000000100)}, 0x81252, 0x6, 0x80000001, 0x0, 0x0, 0x0, 0x6, 0x0, 0x6, 0x0, 0x6}, 0xffffffffffffffff, 0xe, 0xffffffffffffffff, 0xc) perf_event_open(0x0, 0x0, 0x2, 0xffffffffffffffff, 0xb) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) perf_event_open(&(0x7f0000000840)={0x2, 0x80, 0x0, 0x7, 0x0, 0x80, 0x0, 0x3, 0x0, 0x9, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, @perf_config_ext={0x8000000000, 0x3}, 0x46c73247dfbe0d, 0x1007e, 0x0, 0x2, 0x0, 0x0, 0x6, 0x0, 0xffffffff, 0x0, 0x1c}, 0x0, 0x9, 0xffffffffffffffff, 0xd) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x4030582a, &(0x7f0000000040)=0x91) 20:41:05 executing program 0: r0 = openat$nci(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) close_range(r0, 0xffffffffffffffff, 0x60) 20:41:05 executing program 1: ioctl$BTRFS_IOC_LOGICAL_INO(0xffffffffffffffff, 0xc0389424, 0x0) r0 = socket$inet6(0xa, 0x3, 0x6) r1 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) r2 = dup2(r1, r0) ioctl$FIDEDUPERANGE(r0, 0xc0189436, &(0x7f0000000f00)=ANY=[@ANYBLOB="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"]) ioctl$TIOCSBRK(r2, 0x5427) recvfrom$inet6(0xffffffffffffffff, &(0x7f0000000280)=""/134, 0x86, 0x40000102, &(0x7f0000000340)={0xa, 0x4e21, 0x77f, @mcast1, 0x403b3f}, 0x1c) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000001040)={{r2, 0xffffffffffffffff}, &(0x7f0000000140), &(0x7f0000000480)=r1}, 0x20) syz_read_part_table(0x593, &(0x7f00000005c0)="$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") r4 = creat(&(0x7f0000000240)='./file0\x00', 0x0) stat(&(0x7f0000000040)='./file1\x00', &(0x7f0000000380)) fsetxattr$security_capability(r4, &(0x7f0000000100), &(0x7f0000000000)=@v1={0x1000000, [{0x80000000, 0x81}]}, 0xc, 0x0) newfstatat(0xffffffffffffff9c, &(0x7f00000000c0)='./file1\x00', &(0x7f0000001400), 0x400) close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x2) ioctl$TIOCSTI(r4, 0x5412, &(0x7f00000004c0)=0x40) fsync(0xffffffffffffffff) write$binfmt_misc(r4, &(0x7f0000001080)=ANY=[@ANYBLOB="7379d3c6"], 0x4) fallocate(r4, 0x100000011, 0x0, 0x2811fdff) open(&(0x7f0000000100)='.\x00', 0x20c2, 0x2d) open$dir(&(0x7f0000000500)='./file1\x00', 0x1c6c0, 0x0) r5 = openat$vcsu(0xffffffffffffff9c, &(0x7f0000000cc0), 0x400c00, 0x0) lsetxattr$security_selinux(&(0x7f0000001180)='./file1\x00', &(0x7f00000011c0), &(0x7f0000001300)='system_u:object_r:unconfined_exec_t:s0\x00', 0x27, 0x3) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000400)={0xffffffffffffffff, 0xe0, &(0x7f0000000300)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, &(0x7f00000000c0)=[0x0], &(0x7f0000000140), 0x0, 0x8, &(0x7f0000000200)=[{}, {}, {}, {}, {}], 0x28, 0x0, 0x0, 0x0, 0x0, 0x10, 0x8, 0x8, &(0x7f00000002c0)}}, 0x10) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000e80)=@bpf_lsm={0x1d, 0x4, &(0x7f0000000040)=@framed={{0x18, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x73fc}, [@generic={0x9, 0x8, 0x0, 0x7f, 0x200}]}, &(0x7f0000000880)='GPL\x00', 0x1f, 0x93, &(0x7f0000000cc0)=""/147, 0x40f00, 0x2, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, &(0x7f0000000b80)={0x9}, 0x8, 0x10, 0x0, 0x0, r6}, 0x80) r7 = socket$nl_generic(0x10, 0x3, 0x10) r8 = syz_genetlink_get_family_id$tipc(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$TIPC_CMD_ENABLE_BEARER(r7, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000001200)=ANY=[@ANYBLOB="3400000006c08fada241ee0a049e6fba3f36f40da839bbdf54c31768b0026f4261f56d51c5d81ba4cb99f8203c40d0a142fcd75ce26e408d229139f8c4e81109c56a18e453e8a537df21c4ec04a4f3e22f4ac125a28ad43e41107b1f7e79c8573985e54fd665e2913ca74da8c9f3fc2839258c19fa7ac20ebead31206cf280ea73f635bc5418b66554392dfd11874fef72bc53538aae3cb5ef8a80140f4737dd2c572a03ee1d5e3d627e", @ANYRESOCT=0x0, @ANYBLOB="010000000000000000000100000000000000014100000018001700000000000000007564503a73"], 0x34}, 0x1, 0x0, 0x0, 0x1}, 0x0) ioctl$AUTOFS_DEV_IOCTL_PROTOSUBVER(r1, 0xc0189373, &(0x7f0000000540)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x6}}, './file0\x00'}) sendmsg$TIPC_CMD_GET_MAX_PORTS(r5, &(0x7f0000001140)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x40000}, 0xc, &(0x7f0000001100)={&(0x7f00000010c0)={0x1c, r8, 0x400, 0x8000, 0x25dfdbfe, {}, ["", "", "", "", "", "", ""]}, 0x1c}, 0x1, 0x0, 0x0, 0x20048854}, 0x4004) bpf$PROG_LOAD(0x5, &(0x7f0000000e40)={0x5, 0x16, &(0x7f0000001340)=ANY=[@ANYBLOB="390000000100000000000000900000f117fa0000", @ANYRES32=r4, @ANYBLOB="1f00000000000000b703000000000000850000000c000000b61b0453c29f42b5be06c7010b4efffe000000000085000000a900000018150000", @ANYRES32=r3, @ANYBLOB="0000000000000000180100002020782500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b70300000000850000005d000000185500000100000000000000000000009500000000000000"], &(0x7f0000000b80)='syzkaller\x00', 0x1, 0xe8, &(0x7f0000000bc0)=""/232, 0x41000, 0x5b, '\x00', 0x0, 0xe, r5, 0x8, &(0x7f0000000d00)={0x5, 0x2}, 0x8, 0x10, &(0x7f0000000d40)={0x4, 0xe, 0x2, 0x8}, 0x10, r6, r4, 0x5, &(0x7f0000000d80), &(0x7f0000000dc0)=[{0x4, 0x3, 0x0, 0x2}, {0x3, 0x1, 0xa, 0xa}, {0x0, 0x3, 0x2, 0xa}, {0x0, 0x3, 0x7, 0x1}, {0x1, 0x5, 0xb, 0xc}], 0x10, 0x7}, 0x90) [ 117.001492][ T2775] loop1: p2 p3 p7 [ 117.038821][ T5987] FAULT_INJECTION: forcing a failure. [ 117.038821][ T5987] name fail_page_alloc, interval 1, probability 0, space 0, times 1 [ 117.052353][ T5987] CPU: 0 PID: 5987 Comm: syz-executor.3 Not tainted 6.8.0-rc2-syzkaller-00084-g5c24e4e9e708 #0 [ 117.062842][ T5987] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/25/2024 [ 117.073083][ T5987] Call Trace: [ 117.076398][ T5987] [ 117.079348][ T5987] dump_stack_lvl+0xda/0x130 [ 117.084271][ T5987] dump_stack+0x15/0x20 [ 117.088667][ T5987] should_fail_ex+0x21f/0x230 [ 117.093550][ T5987] __should_fail_alloc_page+0xfd/0x110 [ 117.099054][ T5987] __alloc_pages+0x108/0x340 [ 117.103742][ T5987] alloc_pages_mpol+0xb1/0x1d0 [ 117.108900][ T5987] alloc_pages+0xe0/0x100 [ 117.113399][ T5987] pte_alloc_one+0x32/0xe0 [ 117.117899][ T5987] ? mtree_range_walk+0x41a/0x450 [ 117.123178][ T5987] __pte_alloc+0x33/0x270 [ 117.127905][ T5987] ? __rcu_read_unlock+0x4d/0x70 [ 117.132950][ T5987] handle_mm_fault+0x21d1/0x27c0 [ 117.137942][ T5987] exc_page_fault+0x2f9/0x6d0 [ 117.142648][ T5987] asm_exc_page_fault+0x26/0x30 [ 117.147568][ T5987] RIP: 0033:0x7fde2b983836 [ 117.152015][ T5987] Code: f0 72 6e 48 63 cd 48 01 c1 49 39 4f 08 72 4c 8d 4d ff 85 ed 74 33 66 0f 1f 44 00 00 48 39 f0 72 1b 4d 8b 07 49 89 c1 49 29 f1 <47> 0f b6 0c 08 45 84 c9 74 08 45 88 0c 00 49 8b 47 10 48 83 c0 01 [ 117.171876][ T5987] RSP: 002b:00007fde2ad58530 EFLAGS: 00010246 [ 117.178063][ T5987] RAX: 0000000000000001 RBX: 00007fde2ad585d0 RCX: 0000000000000101 20:41:05 executing program 2: r0 = perf_event_open(&(0x7f0000000a40)={0x2, 0x80, 0xcd, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @perf_bp={&(0x7f0000000200), 0x8}, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfb75}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000040)={0x0, 0x4, 0x0, &(0x7f0000000180)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x80) perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x208, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x4, 0x8001}, 0x4000, 0x0, 0x0, 0x0, 0x0, 0x14e, 0xd1}, 0x0, 0xbfffffffffffffff, r0, 0x19893a9f0a0e2244) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) syz_clone(0x2000000, 0x0, 0x0, 0x0, 0x0, 0x0) r1 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x18, 0x5, &(0x7f00000002c0)=ANY=[@ANYBLOB="180000001800ff0f0000000000000000850000006d000000750000000800000095"], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x80) r2 = perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400, 0x80000, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x7, 0x1007}, 0x8006, 0x0, 0x0, 0x1, 0x4, 0x800000, 0x3}, 0x0, 0xffefffffffffffff, 0xffffffffffffffff, 0x9) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x40082406, &(0x7f00000003c0)='memory.numa_stat\x00') perf_event_open(0x0, 0x0, 0x0, r2, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000080)='sched_switch\x00', r1}, 0x10) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000380)={{0x1}, &(0x7f0000000000), &(0x7f0000000240)=r1}, 0x20) r3 = memfd_secret(0x0) syz_io_uring_setup(0x0, &(0x7f0000000300)={0x0, 0x2, 0x0, 0x0, 0x0, 0x0, r3}, 0x0, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f00000009c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000000a00)=0x14) r4 = openat2(0xffffffffffffff9c, &(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)={0x40841}, 0x18) write$binfmt_script(r4, &(0x7f0000000340)=ANY=[], 0xfffffdef) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000b40)={0x1b, 0x0, 0x0, 0x7, 0x0, 0xffffffffffffffff, 0x200, '\x00', 0x0, 0xffffffffffffffff, 0x3, 0x1, 0x4}, 0x48) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000bc0)={0x2, 0x4, 0x8, 0x1, 0x80, 0x1, 0x9, '\x00', 0x0, 0xffffffffffffffff, 0x4, 0x1, 0x4}, 0x48) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000280)={&(0x7f0000000140)='ext4_ext_show_extent\x00', r1}, 0x10) r5 = perf_event_open(&(0x7f0000000080)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) r6 = gettid() perf_event_open$cgroup(&(0x7f0000000300)={0x5, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_bp={&(0x7f0000000100)}, 0x81252, 0x6, 0x80000001, 0x0, 0x0, 0x0, 0x6, 0x0, 0x6, 0x0, 0x6}, 0xffffffffffffffff, 0xe, 0xffffffffffffffff, 0xc) perf_event_open(0x0, r6, 0x2, 0xffffffffffffffff, 0xb) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) perf_event_open(&(0x7f0000000840)={0x2, 0x80, 0x0, 0x7, 0x0, 0x80, 0x0, 0x3, 0x0, 0x9, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, @perf_config_ext={0x8000000000, 0x3}, 0x46c73247dfbe0d, 0x1007e, 0x0, 0x2, 0x0, 0x0, 0x6, 0x0, 0xffffffff, 0x0, 0x1c}, 0x0, 0x9, 0xffffffffffffffff, 0xd) bpf$PROG_LOAD(0x5, &(0x7f0000000780)={0x14, 0x4, &(0x7f00000008c0)=ANY=[@ANYBLOB="850000006b00000018150000a3df7ddd9621fb0201050062d91123e632b2f902ad1e9f1cc7a66ed51ac8a4070000000000000019a83f0b7c9502871fb1ca3dc499e804bbbc359859ed6fd9f104fc7ed900d122072d8275a24d000000000601c3a63953a7b36fe458", @ANYRES32, @ANYBLOB="00000000000000002d59e4eda4000000"], &(0x7f0000000400)='syzkaller\x00', 0xfff, 0xe3, &(0x7f0000000580)=""/227, 0x0, 0x4, '\x00', 0x0, 0x24, 0xffffffffffffffff, 0x8, &(0x7f0000000500)={0x1, 0x3}, 0x8, 0x10, &(0x7f0000000680)={0x5, 0x6, 0x81, 0x9}, 0x10, 0xffffffffffffffff, 0xffffffffffffffff, 0x0, &(0x7f00000006c0)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, r5]}, 0x80) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x4030582a, &(0x7f0000000040)=0x91) [ 117.186045][ T5987] RDX: 0000000000000000 RSI: 0000000000000001 RDI: 00007fde2ad58670 [ 117.194095][ T5987] RBP: 0000000000000102 R08: 00007fde22939000 R09: 0000000000000000 [ 117.202189][ T5987] R10: 0000000000000000 R11: 00007fde2ad585e0 R12: 0000000000000001 [ 117.210189][ T5987] R13: 00007fde2ba46cc0 R14: 0000000000000000 R15: 00007fde2ad58670 [ 117.218363][ T5987] [ 117.221533][ T5987] Huh VM_FAULT_OOM leaked out to the #PF handler. Retrying PF 20:41:05 executing program 0: r0 = openat$nci(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) close_range(r0, 0xffffffffffffffff, 0x68) [ 117.280277][ T5987] loop3: detected capacity change from 0 to 512 20:41:05 executing program 0: r0 = openat$nci(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) close_range(r0, 0xffffffffffffffff, 0x6c) [ 117.348775][ T5987] EXT4-fs (loop3): 1 orphan inode deleted [ 117.367397][ T26] Quota error (device loop3): do_check_range: Getting dqdh_entries 15 out of range 0-14 [ 117.369501][ T5995] loop1: detected capacity change from 0 to 2048 [ 117.384007][ T5987] ext4 filesystem being mounted at /root/syzkaller-testdir749715024/syzkaller.AedAWc/158/file1 supports timestamps until 2038-01-19 (0x7fffffff) 20:41:05 executing program 3: gettid() bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) fstat(0xffffffffffffffff, 0x0) r0 = getegid() syz_mount_image$ext4(&(0x7f0000000100)='ext4\x00', &(0x7f0000000200)='./file1\x00', 0x3000000, &(0x7f0000003040)=ANY=[@ANYRES64=r0, @ANYBLOB="8555591a163448f4c52bee6cc0e12a6a8610718f818822e94c360e46f93ac9c63a1b40ea9d758c2b4e2d7c386a141016d11cb13fabc846fc7fb242c175fbdf96e2a96e80e82b73987b1d5dfd843c7e6748a15a0c4160f5e4c468e8f8e417bd3385546159881194fe3a7cf8307cd9c7ce0ca180a481d4dcaa6611ec5c8ff1c546360dea3da9f2bfc1fd71af9ebf2afe4285f013a3929a7096097976a16e2060e5f26e379011ea1811", @ANYRES64, @ANYBLOB="ca42ad87c41bb3b2507e4e12104f0cd507000001046f9445657db4996b10208d04454e11fb5b1383c5ce98e3062f45ec04e5b8b179df3d64a6cec05d29235e3cbe0b339abe9faee5cf3e44c97ce56a1dc359047114eeb3c23f331114039d75a664afc47e8273b79e83d301fc4ceec8b89911505b6743797c459195a7120ded1748f315deb90000ffed00000000000000", @ANYRES8=r0, @ANYRES8=r0, @ANYRES64, @ANYBLOB="bd85893dee1670c8c7e3b4a65ec61f224992fd11263b7749c7ee63dd4fc13cc5dfdde8a3099aaf21ece351c316d9bbd7e4ecc524c856f20d6a1818d6d75f702eb904653f9d55af", @ANYRESOCT], 0x1, 0x513, &(0x7f0000000c40)="$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") (fail_nth: 12) 20:41:05 executing program 0: r0 = openat$nci(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) close_range(r0, 0xffffffffffffffff, 0x74) [ 117.462916][ T5995] loop1: p2 p3 p7 20:41:05 executing program 1: ioctl$BTRFS_IOC_LOGICAL_INO(0xffffffffffffffff, 0xc0389424, &(0x7f0000000180)={0x0, 0x28, '\x00', 0x1, &(0x7f0000000080)=[0x0, 0x0, 0x0, 0x0, 0x0]}) r0 = socket$inet6(0xa, 0x3, 0x6) r1 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) r2 = dup2(r1, r0) ioctl$FIDEDUPERANGE(r0, 0xc0189436, &(0x7f0000000f00)=ANY=[@ANYBLOB="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"]) ioctl$TIOCSBRK(r2, 0x5427) recvfrom$inet6(0xffffffffffffffff, &(0x7f0000000280)=""/134, 0x86, 0x40000102, &(0x7f0000000340)={0xa, 0x4e21, 0x77f, @mcast1, 0x403b3f}, 0x1c) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000001040)={{r2, 0xffffffffffffffff}, &(0x7f0000000140), &(0x7f0000000480)=r1}, 0x20) syz_read_part_table(0x593, &(0x7f00000005c0)="$eJzs0r1LK2kUB+A3A5c0e4lcLli4hWCwigqx0CIpRGJIY0RcsbAWLLQQLCwkEq39+AcUv0BsxD6lGEEUYiUpxXpBsUmVZdfZxmplUdnleZrhPefMHF5+E/hPi8Lv7XY7EUJoJ9//9m+nhbFS98TI5FQIiTAbQij8+stfnUQ88fdXz+NzOT6XktnG/vXo82nHTc9dPX0Yxf1aFMJaCGHh4Sj1b+/G/99Z/jK1vrFU3FzJz98XVx8H5/oKXVuFxZ2hg1xlujM3E/9Ytehz9qcbw8e37fLT7vf+b/VGK3sVz2USH7Ofr/U2/72f1Wa1Nd57sjyQ+dG8qGzHub/IHwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA+GBn+cvU+sZScXMlP39fXH0cnOsrdG0VFneGDnKV6c7cTPQ6V4s+Z3+6MXx82y4/7X7v/1ZvtLJX8Vwm8TH7+Vpv89/7WW1WW+O9J8sDmR/Ni8p2nPuL/AEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAACAf6gwVuqeGJmcCiERZkMIo1HH0Z/1dvK1n4jnzuNnOa6XktnG/vXo82nHTc9dPX04EddrUQhrIYSFh6PUp1+Gd/sjAAD///tch0s=") r4 = creat(&(0x7f0000000240)='./file0\x00', 0x0) stat(&(0x7f0000000040)='./file1\x00', &(0x7f0000000380)) fsetxattr$security_capability(r4, &(0x7f0000000100), &(0x7f0000000000)=@v1={0x1000000, [{0x80000000, 0x81}]}, 0xc, 0x0) newfstatat(0xffffffffffffff9c, &(0x7f00000000c0)='./file1\x00', &(0x7f0000001400), 0x400) close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x2) ioctl$TIOCSTI(r4, 0x5412, &(0x7f00000004c0)=0x40) fsync(0xffffffffffffffff) write$binfmt_misc(r4, &(0x7f0000001080)=ANY=[@ANYBLOB="7379d3c6"], 0x4) fallocate(r4, 0x100000011, 0x0, 0x2811fdff) open(&(0x7f0000000100)='.\x00', 0x20c2, 0x2d) open$dir(&(0x7f0000000500)='./file1\x00', 0x1c6c0, 0x0) r5 = openat$vcsu(0xffffffffffffff9c, &(0x7f0000000cc0), 0x400c00, 0x0) lsetxattr$security_selinux(&(0x7f0000001180)='./file1\x00', &(0x7f00000011c0), &(0x7f0000001300)='system_u:object_r:unconfined_exec_t:s0\x00', 0x27, 0x3) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000400)={0xffffffffffffffff, 0xe0, &(0x7f0000000300)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, &(0x7f00000000c0)=[0x0], &(0x7f0000000140), 0x0, 0x8, &(0x7f0000000200)=[{}, {}, {}, {}, {}], 0x28, 0x0, 0x0, 0x0, 0x0, 0x10, 0x8, 0x8, &(0x7f00000002c0)}}, 0x10) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000e80)=@bpf_lsm={0x1d, 0x4, &(0x7f0000000040)=@framed={{0x18, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x73fc}, [@generic={0x9, 0x8, 0x0, 0x7f, 0x200}]}, &(0x7f0000000880)='GPL\x00', 0x1f, 0x93, &(0x7f0000000cc0)=""/147, 0x40f00, 0x2, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, &(0x7f0000000b80)={0x9}, 0x8, 0x10, 0x0, 0x0, r6}, 0x80) r7 = socket$nl_generic(0x10, 0x3, 0x10) r8 = syz_genetlink_get_family_id$tipc(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$TIPC_CMD_ENABLE_BEARER(r7, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000001200)=ANY=[@ANYBLOB="3400000006c08fada241ee0a049e6fba3f36f40da839bbdf54c31768b0026f4261f56d51c5d81ba4cb99f8203c40d0a142fcd75ce26e408d229139f8c4e81109c56a18e453e8a537df21c4ec04a4f3e22f4ac125a28ad43e41107b1f7e79c8573985e54fd665e2913ca74da8c9f3fc2839258c19fa7ac20ebead31206cf280ea73f635bc5418b66554392dfd11874fef72bc53538aae3cb5ef8a80140f4737dd2c572a03ee1d5e3d627e", @ANYRESOCT=0x0, @ANYBLOB="010000000000000000000100000000000000014100000018001700000000000000007564503a73"], 0x34}, 0x1, 0x0, 0x0, 0x1}, 0x0) ioctl$AUTOFS_DEV_IOCTL_PROTOSUBVER(r1, 0xc0189373, &(0x7f0000000540)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x6}}, './file0\x00'}) sendmsg$TIPC_CMD_GET_MAX_PORTS(r5, &(0x7f0000001140)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x40000}, 0xc, &(0x7f0000001100)={&(0x7f00000010c0)={0x1c, r8, 0x400, 0x8000, 0x25dfdbfe, {}, ["", "", "", "", "", "", ""]}, 0x1c}, 0x1, 0x0, 0x0, 0x20048854}, 0x4004) bpf$PROG_LOAD(0x5, &(0x7f0000000e40)={0x5, 0x16, &(0x7f0000001340)=ANY=[@ANYBLOB="390000000100000000000000900000f117fa0000", @ANYRES32=r4, @ANYBLOB="1f00000000000000b703000000000000850000000c000000b61b0453c29f42b5be06c7010b4efffe000000000085000000a900000018150000", @ANYRES32=r3, @ANYBLOB="0000000000000000180100002020782500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b70300000000850000005d000000185500000100000000000000000000009500000000000000"], &(0x7f0000000b80)='syzkaller\x00', 0x1, 0xe8, &(0x7f0000000bc0)=""/232, 0x41000, 0x5b, '\x00', 0x0, 0xe, r5, 0x8, &(0x7f0000000d00)={0x5, 0x2}, 0x8, 0x10, &(0x7f0000000d40)={0x4, 0xe, 0x2, 0x8}, 0x10, r6, r4, 0x5, &(0x7f0000000d80), &(0x7f0000000dc0)=[{0x4, 0x3, 0x0, 0x2}, {0x3, 0x1, 0xa, 0xa}, {0x0, 0x3, 0x2, 0xa}, {0x0, 0x3, 0x7, 0x1}, {0x1, 0x5, 0xb, 0xc}], 0x10, 0x7}, 0x90) [ 117.517205][ T2775] loop1: p2 p3 p7 [ 117.558936][ T6015] FAULT_INJECTION: forcing a failure. [ 117.558936][ T6015] name failslab, interval 1, probability 0, space 0, times 0 [ 117.571604][ T6015] CPU: 1 PID: 6015 Comm: syz-executor.3 Not tainted 6.8.0-rc2-syzkaller-00084-g5c24e4e9e708 #0 [ 117.581955][ T6015] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/25/2024 [ 117.592081][ T6015] Call Trace: [ 117.595428][ T6015] [ 117.598369][ T6015] dump_stack_lvl+0xda/0x130 [ 117.603086][ T6015] dump_stack+0x15/0x20 [ 117.607361][ T6015] should_fail_ex+0x21f/0x230 [ 117.612097][ T6015] ? __anon_vma_prepare+0x45/0x2b0 [ 117.617250][ T6015] __should_failslab+0x92/0xa0 [ 117.622205][ T6015] should_failslab+0x9/0x20 [ 117.626876][ T6015] kmem_cache_alloc+0x56/0x2d0 [ 117.631682][ T6015] __anon_vma_prepare+0x45/0x2b0 [ 117.636757][ T6015] do_wp_page+0xdef/0x1f20 [ 117.641485][ T6015] ? __rcu_read_lock+0x35/0x50 [ 117.646452][ T6015] handle_mm_fault+0xb80/0x27c0 [ 117.651365][ T6015] exc_page_fault+0x2f9/0x6d0 [ 117.656063][ T6015] asm_exc_page_fault+0x26/0x30 [ 117.661080][ T6015] RIP: 0033:0x7fde2b983793 [ 117.665505][ T6015] Code: 1f 84 00 00 00 00 00 3d 00 01 00 00 75 29 45 31 f6 48 83 c4 18 44 89 f0 5b 5d 41 5c 41 5d 41 5e 41 5f c3 0f 1f 40 00 49 8b 0f <44> 88 34 01 49 83 47 10 01 eb 92 66 90 8d 90 ff fe ff ff 83 fa 1c [ 117.685248][ T6015] RSP: 002b:00007fde2ad58530 EFLAGS: 00010202 [ 117.691352][ T6015] RAX: 0000000000000400 RBX: 00007fde2ad585d0 RCX: 00007fde22939000 [ 117.699440][ T6015] RDX: 00007fde2ad58770 RSI: 0000000000000001 RDI: 00007fde2ad58670 [ 117.707503][ T6015] RBP: 00000000000000f9 R08: 000000000000000a R09: 00000000000003b9 [ 117.715484][ T6015] R10: 00000000000003ca R11: 00007fde2ad585d0 R12: 0000000000000001 [ 117.723515][ T6015] R13: 00007fde2ba46cc0 R14: 0000000000000020 R15: 00007fde2ad58670 [ 117.731585][ T6015] [ 117.734744][ T6015] Huh VM_FAULT_OOM leaked out to the #PF handler. Retrying PF 20:41:06 executing program 0: r0 = openat$nci(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) close_range(r0, 0xffffffffffffffff, 0x7a) 20:41:06 executing program 0: r0 = openat$nci(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) close_range(r0, 0xffffffffffffffff, 0x300) [ 117.840183][ T6015] loop3: detected capacity change from 0 to 512 20:41:06 executing program 4: r0 = perf_event_open(&(0x7f0000000a40)={0x2, 0x80, 0xcd, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @perf_bp={&(0x7f0000000200), 0x8}, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfb75}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000040)={0x0, 0x4, 0x0, &(0x7f0000000180)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x80) perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x208, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x4, 0x8001}, 0x4000, 0x0, 0x0, 0x0, 0x0, 0x14e, 0xd1}, 0x0, 0xbfffffffffffffff, r0, 0x19893a9f0a0e2244) r1 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) syz_clone(0x2000000, 0x0, 0x0, 0x0, 0x0, 0x0) r2 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x18, 0x5, &(0x7f00000002c0)=ANY=[@ANYBLOB="180000001800ff0f0000000000000000850000006d000000750000000800000095"], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x80) r3 = perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400, 0x80000, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x7, 0x1007}, 0x8006, 0x0, 0x0, 0x1, 0x4, 0x800000, 0x3}, 0x0, 0xffefffffffffffff, 0xffffffffffffffff, 0x9) ioctl$PERF_EVENT_IOC_SET_FILTER(r3, 0x40082406, &(0x7f00000003c0)='memory.numa_stat\x00') perf_event_open(0x0, 0x0, 0x0, r3, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000080)='sched_switch\x00', r2}, 0x10) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000380)={{0x1, 0xffffffffffffffff}, &(0x7f0000000000), &(0x7f0000000240)=r2}, 0x20) r5 = memfd_secret(0x0) syz_io_uring_setup(0x0, &(0x7f0000000300)={0x0, 0x2, 0x0, 0x0, 0x0, 0x0, r5}, 0x0, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f00000009c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000000a00)=0x14) r7 = openat2(0xffffffffffffff9c, &(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)={0x40841}, 0x18) write$binfmt_script(r7, &(0x7f0000000340)=ANY=[], 0xfffffdef) r8 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000b40)={0x1b, 0x0, 0x0, 0x7, 0x0, 0xffffffffffffffff, 0x200, '\x00', 0x0, 0xffffffffffffffff, 0x3, 0x1, 0x4}, 0x48) r9 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000bc0)={0x2, 0x4, 0x8, 0x1, 0x80, 0x1, 0x9, '\x00', 0x0, 0xffffffffffffffff, 0x4, 0x1, 0x4}, 0x48) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000d00)={0x11, 0x12, &(0x7f0000000440)=@raw=[@exit, @ringbuf_query={{0x18, 0x1, 0x1, 0x0, r4}}, @ringbuf_output={{0x18, 0x1, 0x1, 0x0, r5}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x10001}, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x4, 0x0, 0x0, 0x2}}, @exit, @initr0={0x18, 0x0, 0x0, 0x0, 0x6349, 0x0, 0x0, 0x0, 0xf685}, @ldst={0x3, 0x2, 0x1, 0x0, 0xb, 0x2543a83bb932833c, 0x1}], &(0x7f0000000940)='syzkaller\x00', 0x80000001, 0x27, &(0x7f0000000980)=""/39, 0x41000, 0x40, '\x00', r6, 0x0, r7, 0x8, &(0x7f0000000ac0)={0x3, 0x1}, 0x8, 0x10, &(0x7f0000000b00)={0x2, 0xc, 0xfffffe00, 0x2}, 0x10, 0x0, 0x0, 0x5, &(0x7f0000000c40)=[r2, 0x1, 0x1, r8, r9, r1], &(0x7f0000000c80)=[{0x4, 0x1, 0x8, 0xc}, {0x0, 0x4, 0xf, 0x4}, {0x1, 0x2, 0xd, 0x6}, {0x0, 0x4, 0x10, 0xc}, {0x2, 0x4, 0xd, 0x1}], 0x10, 0x20}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000280)={&(0x7f0000000140)='ext4_ext_show_extent\x00', r2}, 0x10) r10 = perf_event_open(&(0x7f0000000080)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) perf_event_open$cgroup(&(0x7f0000000300)={0x5, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_bp={&(0x7f0000000100)}, 0x81252, 0x6, 0x80000001, 0x0, 0x0, 0x0, 0x6, 0x0, 0x6, 0x0, 0x6}, 0xffffffffffffffff, 0xe, 0xffffffffffffffff, 0xc) perf_event_open(0x0, 0x0, 0x2, 0xffffffffffffffff, 0xb) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000780)={0x14, 0x4, &(0x7f00000008c0)=ANY=[@ANYBLOB="850000006b00000018150000a3df7ddd9621fb0201050062d91123e632b2f902ad1e9f1cc7a66ed51ac8a4070000000000000019a83f0b7c9502871fb1ca3dc499e804bbbc359859ed6fd9f104fc7ed900d122072d8275a24d000000000601c3a63953a7b36fe458", @ANYRES32, @ANYBLOB="00000000000000002d59e4eda4000000"], &(0x7f0000000400)='syzkaller\x00', 0xfff, 0xe3, &(0x7f0000000580)=""/227, 0x0, 0x4, '\x00', 0x0, 0x24, 0xffffffffffffffff, 0x8, &(0x7f0000000500)={0x1, 0x3}, 0x8, 0x10, &(0x7f0000000680)={0x5, 0x6, 0x81, 0x9}, 0x10, 0xffffffffffffffff, 0xffffffffffffffff, 0x0, &(0x7f00000006c0)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, r10]}, 0x80) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x4030582a, &(0x7f0000000040)=0x91) [ 117.894361][ T6015] EXT4-fs (loop3): 1 orphan inode deleted [ 117.900833][ T6015] ext4 filesystem being mounted at /root/syzkaller-testdir749715024/syzkaller.AedAWc/159/file1 supports timestamps until 2038-01-19 (0x7fffffff) [ 117.915998][ T26] Quota error (device loop3): do_check_range: Getting dqdh_entries 15 out of range 0-14 20:41:06 executing program 3: gettid() bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) fstat(0xffffffffffffffff, 0x0) r0 = getegid() syz_mount_image$ext4(&(0x7f0000000100)='ext4\x00', &(0x7f0000000200)='./file1\x00', 0x3000000, &(0x7f0000003040)=ANY=[@ANYRES64=r0, @ANYBLOB="8555591a163448f4c52bee6cc0e12a6a8610718f818822e94c360e46f93ac9c63a1b40ea9d758c2b4e2d7c386a141016d11cb13fabc846fc7fb242c175fbdf96e2a96e80e82b73987b1d5dfd843c7e6748a15a0c4160f5e4c468e8f8e417bd3385546159881194fe3a7cf8307cd9c7ce0ca180a481d4dcaa6611ec5c8ff1c546360dea3da9f2bfc1fd71af9ebf2afe4285f013a3929a7096097976a16e2060e5f26e379011ea1811", @ANYRES64, @ANYBLOB="ca42ad87c41bb3b2507e4e12104f0cd507000001046f9445657db4996b10208d04454e11fb5b1383c5ce98e3062f45ec04e5b8b179df3d64a6cec05d29235e3cbe0b339abe9faee5cf3e44c97ce56a1dc359047114eeb3c23f331114039d75a664afc47e8273b79e83d301fc4ceec8b89911505b6743797c459195a7120ded1748f315deb90000ffed00000000000000", @ANYRES8=r0, @ANYRES8=r0, @ANYRES64, @ANYBLOB="bd85893dee1670c8c7e3b4a65ec61f224992fd11263b7749c7ee63dd4fc13cc5dfdde8a3099aaf21ece351c316d9bbd7e4ecc524c856f20d6a1818d6d75f702eb904653f9d55af", @ANYRESOCT], 0x1, 0x513, &(0x7f0000000c40)="$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") (fail_nth: 13) 20:41:06 executing program 0: r0 = openat$nci(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) close_range(r0, 0xffffffffffffffff, 0x500) 20:41:06 executing program 0: r0 = openat$nci(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) close_range(r0, 0xffffffffffffffff, 0x600) [ 118.053699][ T6043] FAULT_INJECTION: forcing a failure. [ 118.053699][ T6043] name failslab, interval 1, probability 0, space 0, times 0 [ 118.066644][ T6043] CPU: 1 PID: 6043 Comm: syz-executor.3 Not tainted 6.8.0-rc2-syzkaller-00084-g5c24e4e9e708 #0 [ 118.077172][ T6043] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/25/2024 [ 118.087318][ T6043] Call Trace: [ 118.090600][ T6043] [ 118.093538][ T6043] dump_stack_lvl+0xda/0x130 [ 118.098196][ T6043] dump_stack+0x15/0x20 [ 118.102541][ T6043] should_fail_ex+0x21f/0x230 [ 118.107967][ T6043] ? __anon_vma_prepare+0xa2/0x2b0 [ 118.113522][ T6043] __should_failslab+0x92/0xa0 [ 118.118397][ T6043] should_failslab+0x9/0x20 [ 118.122925][ T6043] kmem_cache_alloc+0x56/0x2d0 [ 118.127753][ T6043] __anon_vma_prepare+0xa2/0x2b0 [ 118.133087][ T6043] do_wp_page+0xdef/0x1f20 [ 118.137701][ T6043] ? __rcu_read_lock+0x35/0x50 [ 118.142530][ T6043] handle_mm_fault+0xb80/0x27c0 [ 118.147678][ T6043] exc_page_fault+0x2f9/0x6d0 [ 118.152418][ T6043] asm_exc_page_fault+0x26/0x30 [ 118.157307][ T6043] RIP: 0033:0x7fde2b983793 [ 118.161766][ T6043] Code: 1f 84 00 00 00 00 00 3d 00 01 00 00 75 29 45 31 f6 48 83 c4 18 44 89 f0 5b 5d 41 5c 41 5d 41 5e 41 5f c3 0f 1f 40 00 49 8b 0f <44> 88 34 01 49 83 47 10 01 eb 92 66 90 8d 90 ff fe ff ff 83 fa 1c [ 118.181559][ T6043] RSP: 002b:00007fde2ad58530 EFLAGS: 00010202 [ 118.187862][ T6043] RAX: 0000000000000400 RBX: 00007fde2ad585d0 RCX: 00007fde22939000 [ 118.195937][ T6043] RDX: 00007fde2ad58770 RSI: 0000000000000001 RDI: 00007fde2ad58670 [ 118.204029][ T6043] RBP: 00000000000000f9 R08: 000000000000000a R09: 00000000000003b9 [ 118.212104][ T6043] R10: 00000000000003ca R11: 00007fde2ad585d0 R12: 0000000000000001 [ 118.220182][ T6043] R13: 00007fde2ba46cc0 R14: 0000000000000020 R15: 00007fde2ad58670 [ 118.228180][ T6043] [ 118.231354][ T6043] Huh VM_FAULT_OOM leaked out to the #PF handler. Retrying PF [ 118.243080][ T6043] loop3: detected capacity change from 0 to 512 20:41:06 executing program 1: ioctl$BTRFS_IOC_LOGICAL_INO(0xffffffffffffffff, 0xc0389424, &(0x7f0000000180)={0x0, 0x28, '\x00', 0x1, &(0x7f0000000080)=[0x0, 0x0, 0x0, 0x0, 0x0]}) r0 = socket$inet6(0xa, 0x3, 0x6) r1 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) r2 = dup2(r1, r0) ioctl$FIDEDUPERANGE(r0, 0xc0189436, &(0x7f0000000f00)=ANY=[@ANYBLOB="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"]) ioctl$TIOCSBRK(r2, 0x5427) recvfrom$inet6(0xffffffffffffffff, &(0x7f0000000280)=""/134, 0x86, 0x40000102, &(0x7f0000000340)={0xa, 0x4e21, 0x77f, @mcast1, 0x403b3f}, 0x1c) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000001040)={{r2, 0xffffffffffffffff}, &(0x7f0000000140), &(0x7f0000000480)=r1}, 0x20) syz_read_part_table(0x593, &(0x7f00000005c0)="$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") r4 = creat(&(0x7f0000000240)='./file0\x00', 0x0) stat(&(0x7f0000000040)='./file1\x00', &(0x7f0000000380)) fsetxattr$security_capability(r4, &(0x7f0000000100), &(0x7f0000000000)=@v1={0x1000000, [{0x80000000, 0x81}]}, 0xc, 0x0) newfstatat(0xffffffffffffff9c, &(0x7f00000000c0)='./file1\x00', &(0x7f0000001400), 0x400) close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x2) ioctl$TIOCSTI(r4, 0x5412, &(0x7f00000004c0)=0x40) fsync(0xffffffffffffffff) write$binfmt_misc(r4, &(0x7f0000001080)=ANY=[@ANYBLOB="7379d3c6"], 0x4) fallocate(r4, 0x100000011, 0x0, 0x2811fdff) open(&(0x7f0000000100)='.\x00', 0x20c2, 0x2d) open$dir(&(0x7f0000000500)='./file1\x00', 0x1c6c0, 0x0) r5 = openat$vcsu(0xffffffffffffff9c, &(0x7f0000000cc0), 0x400c00, 0x0) lsetxattr$security_selinux(&(0x7f0000001180)='./file1\x00', &(0x7f00000011c0), &(0x7f0000001300)='system_u:object_r:unconfined_exec_t:s0\x00', 0x27, 0x3) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000400)={0xffffffffffffffff, 0xe0, &(0x7f0000000300)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, &(0x7f00000000c0)=[0x0], &(0x7f0000000140), 0x0, 0x8, &(0x7f0000000200)=[{}, {}, {}, {}, {}], 0x28, 0x0, 0x0, 0x0, 0x0, 0x10, 0x8, 0x8, &(0x7f00000002c0)}}, 0x10) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000e80)=@bpf_lsm={0x1d, 0x4, &(0x7f0000000040)=@framed={{0x18, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x73fc}, [@generic={0x9, 0x8, 0x0, 0x7f, 0x200}]}, &(0x7f0000000880)='GPL\x00', 0x1f, 0x93, &(0x7f0000000cc0)=""/147, 0x40f00, 0x2, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, &(0x7f0000000b80)={0x9}, 0x8, 0x10, 0x0, 0x0, r6}, 0x80) r7 = socket$nl_generic(0x10, 0x3, 0x10) r8 = syz_genetlink_get_family_id$tipc(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$TIPC_CMD_ENABLE_BEARER(r7, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000001200)=ANY=[@ANYBLOB="3400000006c08fada241ee0a049e6fba3f36f40da839bbdf54c31768b0026f4261f56d51c5d81ba4cb99f8203c40d0a142fcd75ce26e408d229139f8c4e81109c56a18e453e8a537df21c4ec04a4f3e22f4ac125a28ad43e41107b1f7e79c8573985e54fd665e2913ca74da8c9f3fc2839258c19fa7ac20ebead31206cf280ea73f635bc5418b66554392dfd11874fef72bc53538aae3cb5ef8a80140f4737dd2c572a03ee1d5e3d627e", @ANYRESOCT=0x0, @ANYBLOB="010000000000000000000100000000000000014100000018001700000000000000007564503a73"], 0x34}, 0x1, 0x0, 0x0, 0x1}, 0x0) ioctl$AUTOFS_DEV_IOCTL_PROTOSUBVER(r1, 0xc0189373, &(0x7f0000000540)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x6}}, './file0\x00'}) sendmsg$TIPC_CMD_GET_MAX_PORTS(r5, &(0x7f0000001140)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x40000}, 0xc, &(0x7f0000001100)={&(0x7f00000010c0)={0x1c, r8, 0x400, 0x8000, 0x25dfdbfe, {}, ["", "", "", "", "", "", ""]}, 0x1c}, 0x1, 0x0, 0x0, 0x20048854}, 0x4004) bpf$PROG_LOAD(0x5, &(0x7f0000000e40)={0x5, 0x16, &(0x7f0000001340)=ANY=[@ANYBLOB="390000000100000000000000900000f117fa0000", @ANYRES32=r4, @ANYBLOB="1f00000000000000b703000000000000850000000c000000b61b0453c29f42b5be06c7010b4efffe000000000085000000a900000018150000", @ANYRES32=r3, @ANYBLOB="0000000000000000180100002020782500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b70300000000850000005d000000185500000100000000000000000000009500000000000000"], &(0x7f0000000b80)='syzkaller\x00', 0x1, 0xe8, &(0x7f0000000bc0)=""/232, 0x41000, 0x5b, '\x00', 0x0, 0xe, r5, 0x8, &(0x7f0000000d00)={0x5, 0x2}, 0x8, 0x10, &(0x7f0000000d40)={0x4, 0xe, 0x2, 0x8}, 0x10, r6, r4, 0x5, &(0x7f0000000d80), &(0x7f0000000dc0)=[{0x4, 0x3, 0x0, 0x2}, {0x3, 0x1, 0xa, 0xa}, {0x0, 0x3, 0x2, 0xa}, {0x0, 0x3, 0x7, 0x1}, {0x1, 0x5, 0xb, 0xc}], 0x10, 0x7}, 0x90) 20:41:06 executing program 0: r0 = openat$nci(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) close_range(r0, 0xffffffffffffffff, 0x700) 20:41:06 executing program 2: r0 = perf_event_open(&(0x7f0000000a40)={0x2, 0x80, 0xcd, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @perf_bp={&(0x7f0000000200), 0x8}, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfb75}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000040)={0x0, 0x4, 0x0, &(0x7f0000000180)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x80) perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x208, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x4, 0x8001}, 0x4000, 0x0, 0x0, 0x0, 0x0, 0x14e, 0xd1}, 0x0, 0xbfffffffffffffff, r0, 0x19893a9f0a0e2244) r1 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) syz_clone(0x2000000, 0x0, 0x0, 0x0, 0x0, 0x0) r2 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x18, 0x5, &(0x7f00000002c0)=ANY=[@ANYBLOB="180000001800ff0f0000000000000000850000006d000000750000000800000095"], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x80) r3 = perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400, 0x80000, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x7, 0x1007}, 0x8006, 0x0, 0x0, 0x1, 0x4, 0x800000, 0x3}, 0x0, 0xffefffffffffffff, 0xffffffffffffffff, 0x9) ioctl$PERF_EVENT_IOC_SET_FILTER(r3, 0x40082406, &(0x7f00000003c0)='memory.numa_stat\x00') perf_event_open(0x0, 0x0, 0x0, r3, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000080)='sched_switch\x00', r2}, 0x10) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000380)={{0x1, 0xffffffffffffffff}, &(0x7f0000000000), &(0x7f0000000240)=r2}, 0x20) r5 = memfd_secret(0x0) syz_io_uring_setup(0x0, &(0x7f0000000300)={0x0, 0x2, 0x0, 0x0, 0x0, 0x0, r5}, 0x0, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f00000009c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000000a00)=0x14) r7 = openat2(0xffffffffffffff9c, &(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)={0x40841}, 0x18) write$binfmt_script(r7, &(0x7f0000000340)=ANY=[], 0xfffffdef) r8 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000b40)={0x1b, 0x0, 0x0, 0x7, 0x0, 0xffffffffffffffff, 0x200, '\x00', 0x0, 0xffffffffffffffff, 0x3, 0x1, 0x4}, 0x48) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000d00)={0x11, 0x12, &(0x7f0000000440)=@raw=[@exit, @ringbuf_query={{0x18, 0x1, 0x1, 0x0, r4}}, @ringbuf_output={{0x18, 0x1, 0x1, 0x0, r5}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x10001}, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x4, 0x0, 0x0, 0x2}}, @exit, @initr0={0x18, 0x0, 0x0, 0x0, 0x6349, 0x0, 0x0, 0x0, 0xf685}, @ldst={0x3, 0x2, 0x1, 0x0, 0xb, 0x2543a83bb932833c, 0x1}], &(0x7f0000000940)='syzkaller\x00', 0x80000001, 0x27, &(0x7f0000000980)=""/39, 0x41000, 0x40, '\x00', r6, 0x0, r7, 0x8, &(0x7f0000000ac0)={0x3, 0x1}, 0x8, 0x10, &(0x7f0000000b00)={0x2, 0xc, 0xfffffe00, 0x2}, 0x10, 0x0, 0x0, 0x5, &(0x7f0000000c40)=[r2, 0x1, 0x1, r8, 0xffffffffffffffff, r1], &(0x7f0000000c80)=[{0x4, 0x1, 0x8, 0xc}, {0x0, 0x4, 0xf, 0x4}, {0x1, 0x2, 0xd, 0x6}, {0x0, 0x4, 0x10, 0xc}, {0x2, 0x4, 0xd, 0x1}], 0x10, 0x20}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000280)={&(0x7f0000000140)='ext4_ext_show_extent\x00', r2}, 0x10) r9 = perf_event_open(&(0x7f0000000080)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) r10 = gettid() perf_event_open$cgroup(&(0x7f0000000300)={0x5, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_bp={&(0x7f0000000100)}, 0x81252, 0x6, 0x80000001, 0x0, 0x0, 0x0, 0x6, 0x0, 0x6, 0x0, 0x6}, 0xffffffffffffffff, 0xe, 0xffffffffffffffff, 0xc) perf_event_open(0x0, r10, 0x2, 0xffffffffffffffff, 0xb) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) perf_event_open(&(0x7f0000000840)={0x2, 0x80, 0x0, 0x7, 0x0, 0x80, 0x0, 0x3, 0x0, 0x9, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, @perf_config_ext={0x8000000000, 0x3}, 0x46c73247dfbe0d, 0x1007e, 0x0, 0x2, 0x0, 0x0, 0x6, 0x0, 0xffffffff, 0x0, 0x1c}, 0x0, 0x9, 0xffffffffffffffff, 0xd) bpf$PROG_LOAD(0x5, &(0x7f0000000780)={0x14, 0x4, &(0x7f00000008c0)=ANY=[@ANYBLOB="850000006b00000018150000a3df7ddd9621fb0201050062d91123e632b2f902ad1e9f1cc7a66ed51ac8a4070000000000000019a83f0b7c9502871fb1ca3dc499e804bbbc359859ed6fd9f104fc7ed900d122072d8275a24d000000000601c3a63953a7b36fe458", @ANYRES32, @ANYBLOB="00000000000000002d59e4eda4000000"], &(0x7f0000000400)='syzkaller\x00', 0xfff, 0xe3, &(0x7f0000000580)=""/227, 0x0, 0x4, '\x00', 0x0, 0x24, 0xffffffffffffffff, 0x8, &(0x7f0000000500)={0x1, 0x3}, 0x8, 0x10, &(0x7f0000000680)={0x5, 0x6, 0x81, 0x9}, 0x10, 0xffffffffffffffff, 0xffffffffffffffff, 0x0, &(0x7f00000006c0)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, r9]}, 0x80) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x4030582a, &(0x7f0000000040)=0x91) 20:41:06 executing program 3: gettid() bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) fstat(0xffffffffffffffff, 0x0) r0 = getegid() syz_mount_image$ext4(&(0x7f0000000100)='ext4\x00', &(0x7f0000000200)='./file1\x00', 0x3000000, &(0x7f0000003040)=ANY=[@ANYRES64=r0, @ANYBLOB="8555591a163448f4c52bee6cc0e12a6a8610718f818822e94c360e46f93ac9c63a1b40ea9d758c2b4e2d7c386a141016d11cb13fabc846fc7fb242c175fbdf96e2a96e80e82b73987b1d5dfd843c7e6748a15a0c4160f5e4c468e8f8e417bd3385546159881194fe3a7cf8307cd9c7ce0ca180a481d4dcaa6611ec5c8ff1c546360dea3da9f2bfc1fd71af9ebf2afe4285f013a3929a7096097976a16e2060e5f26e379011ea1811", @ANYRES64, @ANYBLOB="ca42ad87c41bb3b2507e4e12104f0cd507000001046f9445657db4996b10208d04454e11fb5b1383c5ce98e3062f45ec04e5b8b179df3d64a6cec05d29235e3cbe0b339abe9faee5cf3e44c97ce56a1dc359047114eeb3c23f331114039d75a664afc47e8273b79e83d301fc4ceec8b89911505b6743797c459195a7120ded1748f315deb90000ffed00000000000000", @ANYRES8=r0, @ANYRES8=r0, @ANYRES64, @ANYBLOB="bd85893dee1670c8c7e3b4a65ec61f224992fd11263b7749c7ee63dd4fc13cc5dfdde8a3099aaf21ece351c316d9bbd7e4ecc524c856f20d6a1818d6d75f702eb904653f9d55af", @ANYRESOCT], 0x1, 0x513, &(0x7f0000000c40)="$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") (fail_nth: 14) 20:41:06 executing program 4: r0 = perf_event_open(&(0x7f0000000a40)={0x2, 0x80, 0xcd, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @perf_bp={&(0x7f0000000200), 0x8}, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfb75}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000040)={0x0, 0x4, 0x0, &(0x7f0000000180)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x80) perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x208, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x4, 0x8001}, 0x4000, 0x0, 0x0, 0x0, 0x0, 0x14e, 0xd1}, 0x0, 0xbfffffffffffffff, r0, 0x19893a9f0a0e2244) r1 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) syz_clone(0x2000000, 0x0, 0x0, 0x0, 0x0, 0x0) r2 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x18, 0x5, &(0x7f00000002c0)=ANY=[@ANYBLOB="180000001800ff0f0000000000000000850000006d000000750000000800000095"], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x80) r3 = perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400, 0x80000, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x7, 0x1007}, 0x8006, 0x0, 0x0, 0x1, 0x4, 0x800000, 0x3}, 0x0, 0xffefffffffffffff, 0xffffffffffffffff, 0x9) ioctl$PERF_EVENT_IOC_SET_FILTER(r3, 0x40082406, &(0x7f00000003c0)='memory.numa_stat\x00') perf_event_open(0x0, 0x0, 0x0, r3, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000080)='sched_switch\x00', r2}, 0x10) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000380)={{0x1, 0xffffffffffffffff}, &(0x7f0000000000), &(0x7f0000000240)=r2}, 0x20) r5 = memfd_secret(0x0) syz_io_uring_setup(0x0, &(0x7f0000000300)={0x0, 0x2, 0x0, 0x0, 0x0, 0x0, r5}, 0x0, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f00000009c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000000a00)=0x14) r7 = openat2(0xffffffffffffff9c, &(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)={0x40841}, 0x18) write$binfmt_script(r7, &(0x7f0000000340)=ANY=[], 0xfffffdef) r8 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000b40)={0x1b, 0x0, 0x0, 0x7, 0x0, 0xffffffffffffffff, 0x200, '\x00', 0x0, 0xffffffffffffffff, 0x3, 0x1, 0x4}, 0x48) r9 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000bc0)={0x2, 0x4, 0x8, 0x1, 0x80, 0x1, 0x9, '\x00', 0x0, 0xffffffffffffffff, 0x4, 0x1, 0x4}, 0x48) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000d00)={0x11, 0x12, &(0x7f0000000440)=@raw=[@exit, @ringbuf_query={{0x18, 0x1, 0x1, 0x0, r4}}, @ringbuf_output={{0x18, 0x1, 0x1, 0x0, r5}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x10001}, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x4, 0x0, 0x0, 0x2}}, @exit, @initr0={0x18, 0x0, 0x0, 0x0, 0x6349, 0x0, 0x0, 0x0, 0xf685}, @ldst={0x3, 0x2, 0x1, 0x0, 0xb, 0x2543a83bb932833c, 0x1}], &(0x7f0000000940)='syzkaller\x00', 0x80000001, 0x27, &(0x7f0000000980)=""/39, 0x41000, 0x40, '\x00', r6, 0x0, r7, 0x8, &(0x7f0000000ac0)={0x3, 0x1}, 0x8, 0x10, &(0x7f0000000b00)={0x2, 0xc, 0xfffffe00, 0x2}, 0x10, 0x0, 0x0, 0x5, &(0x7f0000000c40)=[r2, 0x1, 0x1, r8, r9, r1], &(0x7f0000000c80)=[{0x4, 0x1, 0x8, 0xc}, {0x0, 0x4, 0xf, 0x4}, {0x1, 0x2, 0xd, 0x6}, {0x0, 0x4, 0x10, 0xc}, {0x2, 0x4, 0xd, 0x1}], 0x10, 0x20}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000280)={&(0x7f0000000140)='ext4_ext_show_extent\x00', r2}, 0x10) r10 = perf_event_open(&(0x7f0000000080)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) perf_event_open$cgroup(&(0x7f0000000300)={0x5, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_bp={&(0x7f0000000100)}, 0x81252, 0x6, 0x80000001, 0x0, 0x0, 0x0, 0x6, 0x0, 0x6, 0x0, 0x6}, 0xffffffffffffffff, 0xe, 0xffffffffffffffff, 0xc) perf_event_open(0x0, 0x0, 0x2, 0xffffffffffffffff, 0xb) bpf$PROG_LOAD(0x5, &(0x7f0000000780)={0x14, 0x4, &(0x7f00000008c0)=ANY=[@ANYBLOB="850000006b00000018150000a3df7ddd9621fb0201050062d91123e632b2f902ad1e9f1cc7a66ed51ac8a4070000000000000019a83f0b7c9502871fb1ca3dc499e804bbbc359859ed6fd9f104fc7ed900d122072d8275a24d000000000601c3a63953a7b36fe458", @ANYRES32, @ANYBLOB="00000000000000002d59e4eda4000000"], &(0x7f0000000400)='syzkaller\x00', 0xfff, 0xe3, &(0x7f0000000580)=""/227, 0x0, 0x4, '\x00', 0x0, 0x24, 0xffffffffffffffff, 0x8, &(0x7f0000000500)={0x1, 0x3}, 0x8, 0x10, &(0x7f0000000680)={0x5, 0x6, 0x81, 0x9}, 0x10, 0xffffffffffffffff, 0xffffffffffffffff, 0x0, &(0x7f00000006c0)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, r10]}, 0x80) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x4030582a, &(0x7f0000000040)=0x91) [ 118.292471][ T3326] I/O error, dev loop3, sector 0 op 0x0:(READ) flags 0x80700 phys_seg 1 prio class 0 [ 118.338084][ T6056] FAULT_INJECTION: forcing a failure. [ 118.338084][ T6056] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 118.351393][ T6056] CPU: 1 PID: 6056 Comm: syz-executor.3 Not tainted 6.8.0-rc2-syzkaller-00084-g5c24e4e9e708 #0 [ 118.361752][ T6056] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/25/2024 [ 118.371964][ T6056] Call Trace: [ 118.375250][ T6056] [ 118.378187][ T6056] dump_stack_lvl+0xda/0x130 [ 118.382803][ T6056] dump_stack+0x15/0x20 [ 118.386995][ T6056] should_fail_ex+0x21f/0x230 [ 118.391693][ T6056] __should_fail_alloc_page+0xfd/0x110 [ 118.397169][ T6056] __alloc_pages+0x108/0x340 [ 118.401772][ T6056] alloc_pages_mpol+0xb1/0x1d0 [ 118.406635][ T6056] vma_alloc_folio+0x166/0x2b0 [ 118.411415][ T6056] do_wp_page+0x61b/0x1f20 [ 118.415880][ T6056] ? __rcu_read_lock+0x35/0x50 [ 118.420659][ T6056] handle_mm_fault+0xb80/0x27c0 [ 118.425580][ T6056] exc_page_fault+0x2f9/0x6d0 [ 118.430281][ T6056] asm_exc_page_fault+0x26/0x30 [ 118.435194][ T6056] RIP: 0033:0x7fde2b983793 [ 118.439619][ T6056] Code: 1f 84 00 00 00 00 00 3d 00 01 00 00 75 29 45 31 f6 48 83 c4 18 44 89 f0 5b 5d 41 5c 41 5d 41 5e 41 5f c3 0f 1f 40 00 49 8b 0f <44> 88 34 01 49 83 47 10 01 eb 92 66 90 8d 90 ff fe ff ff 83 fa 1c [ 118.459326][ T6056] RSP: 002b:00007fde2ad58530 EFLAGS: 00010202 [ 118.465398][ T6056] RAX: 0000000000000400 RBX: 00007fde2ad585d0 RCX: 00007fde22939000 [ 118.473403][ T6056] RDX: 00007fde2ad58770 RSI: 0000000000000001 RDI: 00007fde2ad58670 [ 118.481540][ T6056] RBP: 00000000000000f9 R08: 000000000000000a R09: 00000000000003b9 [ 118.489705][ T6056] R10: 00000000000003ca R11: 00007fde2ad585d0 R12: 0000000000000001 [ 118.497832][ T6056] R13: 00007fde2ba46cc0 R14: 0000000000000020 R15: 00007fde2ad58670 [ 118.506010][ T6056] [ 118.509234][ T6056] Huh VM_FAULT_OOM leaked out to the #PF handler. Retrying PF 20:41:06 executing program 0: r0 = openat$nci(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) close_range(r0, 0xffffffffffffffff, 0x900) 20:41:07 executing program 0: r0 = openat$nci(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) close_range(r0, 0xffffffffffffffff, 0xa00) [ 118.539955][ T6056] loop3: detected capacity change from 0 to 512 [ 118.594932][ T6056] EXT4-fs (loop3): 1 orphan inode deleted [ 118.602260][ T6065] loop1: detected capacity change from 0 to 2048 [ 118.608752][ T38] Quota error (device loop3): do_check_range: Getting dqdh_entries 15 out of range 0-14 [ 118.634360][ T6056] ext4 filesystem being mounted at /root/syzkaller-testdir749715024/syzkaller.AedAWc/161/file1 supports timestamps until 2038-01-19 (0x7fffffff) 20:41:07 executing program 0: r0 = openat$nci(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) close_range(r0, 0xffffffffffffffff, 0xac8) 20:41:07 executing program 3: gettid() bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) fstat(0xffffffffffffffff, 0x0) r0 = getegid() syz_mount_image$ext4(&(0x7f0000000100)='ext4\x00', &(0x7f0000000200)='./file1\x00', 0x3000000, &(0x7f0000003040)=ANY=[@ANYRES64=r0, @ANYBLOB="8555591a163448f4c52bee6cc0e12a6a8610718f818822e94c360e46f93ac9c63a1b40ea9d758c2b4e2d7c386a141016d11cb13fabc846fc7fb242c175fbdf96e2a96e80e82b73987b1d5dfd843c7e6748a15a0c4160f5e4c468e8f8e417bd3385546159881194fe3a7cf8307cd9c7ce0ca180a481d4dcaa6611ec5c8ff1c546360dea3da9f2bfc1fd71af9ebf2afe4285f013a3929a7096097976a16e2060e5f26e379011ea1811", @ANYRES64, @ANYBLOB="ca42ad87c41bb3b2507e4e12104f0cd507000001046f9445657db4996b10208d04454e11fb5b1383c5ce98e3062f45ec04e5b8b179df3d64a6cec05d29235e3cbe0b339abe9faee5cf3e44c97ce56a1dc359047114eeb3c23f331114039d75a664afc47e8273b79e83d301fc4ceec8b89911505b6743797c459195a7120ded1748f315deb90000ffed00000000000000", @ANYRES8=r0, @ANYRES8=r0, @ANYRES64, @ANYBLOB="bd85893dee1670c8c7e3b4a65ec61f224992fd11263b7749c7ee63dd4fc13cc5dfdde8a3099aaf21ece351c316d9bbd7e4ecc524c856f20d6a1818d6d75f702eb904653f9d55af", @ANYRESOCT], 0x1, 0x513, &(0x7f0000000c40)="$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") (fail_nth: 15) [ 118.713016][ T6065] loop1: p2 p3 p7 20:41:07 executing program 0: r0 = openat$nci(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) close_range(r0, 0xffffffffffffffff, 0xad6) 20:41:07 executing program 1: ioctl$BTRFS_IOC_LOGICAL_INO(0xffffffffffffffff, 0xc0389424, &(0x7f0000000180)={0x0, 0x28, '\x00', 0x1, &(0x7f0000000080)=[0x0, 0x0, 0x0, 0x0, 0x0]}) r0 = socket$inet6(0xa, 0x3, 0x6) r1 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) r2 = dup2(r1, r0) ioctl$FIDEDUPERANGE(r0, 0xc0189436, &(0x7f0000000f00)=ANY=[@ANYBLOB="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"]) ioctl$TIOCSBRK(r2, 0x5427) recvfrom$inet6(0xffffffffffffffff, &(0x7f0000000280)=""/134, 0x86, 0x40000102, &(0x7f0000000340)={0xa, 0x4e21, 0x77f, @mcast1, 0x403b3f}, 0x1c) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000001040)={{r2, 0xffffffffffffffff}, &(0x7f0000000140), &(0x7f0000000480)=r1}, 0x20) syz_read_part_table(0x593, &(0x7f00000005c0)="$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") r4 = creat(&(0x7f0000000240)='./file0\x00', 0x0) stat(&(0x7f0000000040)='./file1\x00', &(0x7f0000000380)) fsetxattr$security_capability(r4, &(0x7f0000000100), &(0x7f0000000000)=@v1={0x1000000, [{0x80000000, 0x81}]}, 0xc, 0x0) newfstatat(0xffffffffffffff9c, &(0x7f00000000c0)='./file1\x00', &(0x7f0000001400), 0x400) close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x2) ioctl$TIOCSTI(r4, 0x5412, &(0x7f00000004c0)=0x40) fsync(0xffffffffffffffff) write$binfmt_misc(r4, &(0x7f0000001080)=ANY=[@ANYBLOB="7379d3c6"], 0x4) fallocate(r4, 0x100000011, 0x0, 0x2811fdff) open(&(0x7f0000000100)='.\x00', 0x20c2, 0x2d) open$dir(&(0x7f0000000500)='./file1\x00', 0x1c6c0, 0x0) r5 = openat$vcsu(0xffffffffffffff9c, &(0x7f0000000cc0), 0x400c00, 0x0) lsetxattr$security_selinux(&(0x7f0000001180)='./file1\x00', &(0x7f00000011c0), &(0x7f0000001300)='system_u:object_r:unconfined_exec_t:s0\x00', 0x27, 0x3) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000400)={0xffffffffffffffff, 0xe0, &(0x7f0000000300)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, &(0x7f00000000c0)=[0x0], &(0x7f0000000140), 0x0, 0x8, &(0x7f0000000200)=[{}, {}, {}, {}, {}], 0x28, 0x0, 0x0, 0x0, 0x0, 0x10, 0x8, 0x8, &(0x7f00000002c0)}}, 0x10) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000e80)=@bpf_lsm={0x1d, 0x4, &(0x7f0000000040)=@framed={{0x18, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x73fc}, [@generic={0x9, 0x8, 0x0, 0x7f, 0x200}]}, &(0x7f0000000880)='GPL\x00', 0x1f, 0x93, &(0x7f0000000cc0)=""/147, 0x40f00, 0x2, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, &(0x7f0000000b80)={0x9}, 0x8, 0x10, 0x0, 0x0, r6}, 0x80) r7 = socket$nl_generic(0x10, 0x3, 0x10) r8 = syz_genetlink_get_family_id$tipc(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$TIPC_CMD_ENABLE_BEARER(r7, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000001200)=ANY=[@ANYBLOB="3400000006c08fada241ee0a049e6fba3f36f40da839bbdf54c31768b0026f4261f56d51c5d81ba4cb99f8203c40d0a142fcd75ce26e408d229139f8c4e81109c56a18e453e8a537df21c4ec04a4f3e22f4ac125a28ad43e41107b1f7e79c8573985e54fd665e2913ca74da8c9f3fc2839258c19fa7ac20ebead31206cf280ea73f635bc5418b66554392dfd11874fef72bc53538aae3cb5ef8a80140f4737dd2c572a03ee1d5e3d627e", @ANYRESOCT=0x0, @ANYBLOB="010000000000000000000100000000000000014100000018001700000000000000007564503a73"], 0x34}, 0x1, 0x0, 0x0, 0x1}, 0x0) ioctl$AUTOFS_DEV_IOCTL_PROTOSUBVER(r1, 0xc0189373, &(0x7f0000000540)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x6}}, './file0\x00'}) sendmsg$TIPC_CMD_GET_MAX_PORTS(r5, &(0x7f0000001140)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x40000}, 0xc, &(0x7f0000001100)={&(0x7f00000010c0)={0x1c, r8, 0x400, 0x8000, 0x25dfdbfe, {}, ["", "", "", "", "", "", ""]}, 0x1c}, 0x1, 0x0, 0x0, 0x20048854}, 0x4004) bpf$PROG_LOAD(0x5, &(0x7f0000000e40)={0x5, 0x16, &(0x7f0000001340)=ANY=[@ANYBLOB="390000000100000000000000900000f117fa0000", @ANYRES32=r4, @ANYBLOB="1f00000000000000b703000000000000850000000c000000b61b0453c29f42b5be06c7010b4efffe000000000085000000a900000018150000", @ANYRES32=r3, @ANYBLOB="0000000000000000180100002020782500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b70300000000850000005d000000185500000100000000000000000000009500000000000000"], &(0x7f0000000b80)='syzkaller\x00', 0x1, 0xe8, &(0x7f0000000bc0)=""/232, 0x41000, 0x5b, '\x00', 0x0, 0xe, r5, 0x8, &(0x7f0000000d00)={0x5, 0x2}, 0x8, 0x10, &(0x7f0000000d40)={0x4, 0xe, 0x2, 0x8}, 0x10, r6, r4, 0x5, &(0x7f0000000d80), &(0x7f0000000dc0)=[{0x4, 0x3, 0x0, 0x2}, {0x3, 0x1, 0xa, 0xa}, {0x0, 0x3, 0x2, 0xa}, {0x0, 0x3, 0x7, 0x1}, {0x1, 0x5, 0xb, 0xc}], 0x10, 0x7}, 0x90) [ 118.769841][ T2775] loop1: p2 p3 p7 20:41:07 executing program 0: r0 = openat$nci(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) close_range(r0, 0xffffffffffffffff, 0xafd) [ 118.833246][ T6091] FAULT_INJECTION: forcing a failure. [ 118.833246][ T6091] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 118.846888][ T6091] CPU: 1 PID: 6091 Comm: syz-executor.3 Not tainted 6.8.0-rc2-syzkaller-00084-g5c24e4e9e708 #0 [ 118.857395][ T6091] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/25/2024 [ 118.867744][ T6091] Call Trace: [ 118.871047][ T6091] [ 118.874004][ T6091] dump_stack_lvl+0xda/0x130 [ 118.878634][ T6091] dump_stack+0x15/0x20 [ 118.882821][ T6091] should_fail_ex+0x21f/0x230 [ 118.890592][ T6091] __should_fail_alloc_page+0xfd/0x110 [ 118.897331][ T6091] __alloc_pages+0x108/0x340 [ 118.902429][ T6091] alloc_pages_mpol+0xb1/0x1d0 [ 118.908469][ T6091] vma_alloc_folio+0x166/0x2b0 [ 118.913865][ T6091] handle_mm_fault+0xd00/0x27c0 [ 118.919183][ T6091] ? mas_walk+0x204/0x320 [ 118.923592][ T6091] exc_page_fault+0x401/0x6d0 [ 118.928414][ T6091] asm_exc_page_fault+0x26/0x30 [ 118.933673][ T6091] RIP: 0033:0x7fde2b983840 [ 118.938490][ T6091] Code: 39 4f 08 72 4c 8d 4d ff 85 ed 74 33 66 0f 1f 44 00 00 48 39 f0 72 1b 4d 8b 07 49 89 c1 49 29 f1 47 0f b6 0c 08 45 84 c9 74 08 <45> 88 0c 00 49 8b 47 10 48 83 c0 01 49 89 47 10 83 e9 01 73 d3 41 [ 118.962785][ T6091] RSP: 002b:00007fde2ad58530 EFLAGS: 00010202 [ 118.969418][ T6091] RAX: 0000000000001000 RBX: 00007fde2ad585d0 RCX: 0000000000000003 [ 118.979111][ T6091] RDX: 0000000000003fe3 RSI: 0000000000000be4 RDI: 00007fde2ad58670 [ 118.987213][ T6091] RBP: 0000000000000004 R08: 00007fde22939000 R09: 0000000000000002 [ 118.995996][ T6091] R10: 0000000020000c42 R11: 0000000000000511 R12: 0000000000000801 [ 119.004436][ T6091] R13: 00007fde2ba46cc0 R14: 0000000000000016 R15: 00007fde2ad58670 [ 119.014485][ T6091] [ 119.019350][ T6091] Huh VM_FAULT_OOM leaked out to the #PF handler. Retrying PF [ 119.037159][ T3091] __loop_clr_fd: partition scan of loop1 failed (rc=-16) [ 119.042069][ T3169] I/O error, dev loop1, sector 408 op 0x0:(READ) flags 0x80700 phys_seg 1 prio class 0 [ 119.046585][ T4030] I/O error, dev loop1, sector 208 op 0x0:(READ) flags 0x80700 phys_seg 1 prio class 0 [ 119.070391][ T6091] loop3: detected capacity change from 0 to 512 20:41:07 executing program 0: r0 = openat$nci(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) close_range(r0, 0xffffffffffffffff, 0xb00) [ 119.084943][ T3169] I/O error, dev loop1, sector 408 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 0 [ 119.092976][ T4030] I/O error, dev loop1, sector 208 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 0 [ 119.094660][ T3169] Buffer I/O error on dev loop1p7, logical block 8, async page read [ 119.104214][ T4030] Buffer I/O error on dev loop1p3, logical block 8, async page read [ 119.120600][ T6098] loop1: detected capacity change from 0 to 2048 20:41:07 executing program 0: r0 = openat$nci(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) close_range(r0, 0xffffffffffffffff, 0xc00) 20:41:07 executing program 1: ioctl$BTRFS_IOC_LOGICAL_INO(0xffffffffffffffff, 0xc0389424, &(0x7f0000000180)={0x1, 0x28, '\x00', 0x0, &(0x7f0000000080)=[0x0, 0x0, 0x0, 0x0, 0x0]}) r0 = socket$inet6(0xa, 0x3, 0x6) r1 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) r2 = dup2(r1, r0) ioctl$FIDEDUPERANGE(r0, 0xc0189436, &(0x7f0000000f00)=ANY=[@ANYBLOB="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"]) ioctl$TIOCSBRK(r2, 0x5427) recvfrom$inet6(0xffffffffffffffff, &(0x7f0000000280)=""/134, 0x86, 0x40000102, &(0x7f0000000340)={0xa, 0x4e21, 0x77f, @mcast1, 0x403b3f}, 0x1c) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000001040)={{r2, 0xffffffffffffffff}, &(0x7f0000000140), &(0x7f0000000480)=r1}, 0x20) syz_read_part_table(0x593, &(0x7f00000005c0)="$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") r4 = creat(&(0x7f0000000240)='./file0\x00', 0x0) stat(&(0x7f0000000040)='./file1\x00', &(0x7f0000000380)) fsetxattr$security_capability(r4, &(0x7f0000000100), &(0x7f0000000000)=@v1={0x1000000, [{0x80000000, 0x81}]}, 0xc, 0x0) newfstatat(0xffffffffffffff9c, &(0x7f00000000c0)='./file1\x00', &(0x7f0000001400), 0x400) close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x2) ioctl$TIOCSTI(r4, 0x5412, &(0x7f00000004c0)=0x40) fsync(0xffffffffffffffff) write$binfmt_misc(r4, &(0x7f0000001080)=ANY=[@ANYBLOB="7379d3c6"], 0x4) fallocate(r4, 0x100000011, 0x0, 0x2811fdff) open(&(0x7f0000000100)='.\x00', 0x20c2, 0x2d) open$dir(&(0x7f0000000500)='./file1\x00', 0x1c6c0, 0x0) r5 = openat$vcsu(0xffffffffffffff9c, &(0x7f0000000cc0), 0x400c00, 0x0) lsetxattr$security_selinux(&(0x7f0000001180)='./file1\x00', &(0x7f00000011c0), &(0x7f0000001300)='system_u:object_r:unconfined_exec_t:s0\x00', 0x27, 0x3) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000400)={0xffffffffffffffff, 0xe0, &(0x7f0000000300)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, &(0x7f00000000c0)=[0x0], &(0x7f0000000140), 0x0, 0x8, &(0x7f0000000200)=[{}, {}, {}, {}, {}], 0x28, 0x0, 0x0, 0x0, 0x0, 0x10, 0x8, 0x8, &(0x7f00000002c0)}}, 0x10) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000e80)=@bpf_lsm={0x1d, 0x4, &(0x7f0000000040)=@framed={{0x18, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x73fc}, [@generic={0x9, 0x8, 0x0, 0x7f, 0x200}]}, &(0x7f0000000880)='GPL\x00', 0x1f, 0x93, &(0x7f0000000cc0)=""/147, 0x40f00, 0x2, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, &(0x7f0000000b80)={0x9}, 0x8, 0x10, 0x0, 0x0, r6}, 0x80) r7 = socket$nl_generic(0x10, 0x3, 0x10) r8 = syz_genetlink_get_family_id$tipc(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$TIPC_CMD_ENABLE_BEARER(r7, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000001200)=ANY=[@ANYBLOB="3400000006c08fada241ee0a049e6fba3f36f40da839bbdf54c31768b0026f4261f56d51c5d81ba4cb99f8203c40d0a142fcd75ce26e408d229139f8c4e81109c56a18e453e8a537df21c4ec04a4f3e22f4ac125a28ad43e41107b1f7e79c8573985e54fd665e2913ca74da8c9f3fc2839258c19fa7ac20ebead31206cf280ea73f635bc5418b66554392dfd11874fef72bc53538aae3cb5ef8a80140f4737dd2c572a03ee1d5e3d627e", @ANYRESOCT=0x0, @ANYBLOB="010000000000000000000100000000000000014100000018001700000000000000007564503a73"], 0x34}, 0x1, 0x0, 0x0, 0x1}, 0x0) ioctl$AUTOFS_DEV_IOCTL_PROTOSUBVER(r1, 0xc0189373, &(0x7f0000000540)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x6}}, './file0\x00'}) sendmsg$TIPC_CMD_GET_MAX_PORTS(r5, &(0x7f0000001140)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x40000}, 0xc, &(0x7f0000001100)={&(0x7f00000010c0)={0x1c, r8, 0x400, 0x8000, 0x25dfdbfe, {}, ["", "", "", "", "", "", ""]}, 0x1c}, 0x1, 0x0, 0x0, 0x20048854}, 0x4004) bpf$PROG_LOAD(0x5, &(0x7f0000000e40)={0x5, 0x16, &(0x7f0000001340)=ANY=[@ANYBLOB="390000000100000000000000900000f117fa0000", @ANYRES32=r4, @ANYBLOB="1f00000000000000b703000000000000850000000c000000b61b0453c29f42b5be06c7010b4efffe000000000085000000a900000018150000", @ANYRES32=r3, @ANYBLOB="0000000000000000180100002020782500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b70300000000850000005d000000185500000100000000000000000000009500000000000000"], &(0x7f0000000b80)='syzkaller\x00', 0x1, 0xe8, &(0x7f0000000bc0)=""/232, 0x41000, 0x5b, '\x00', 0x0, 0xe, r5, 0x8, &(0x7f0000000d00)={0x5, 0x2}, 0x8, 0x10, &(0x7f0000000d40)={0x4, 0xe, 0x2, 0x8}, 0x10, r6, r4, 0x5, &(0x7f0000000d80), &(0x7f0000000dc0)=[{0x4, 0x3, 0x0, 0x2}, {0x3, 0x1, 0xa, 0xa}, {0x0, 0x3, 0x2, 0xa}, {0x0, 0x3, 0x7, 0x1}, {0x1, 0x5, 0xb, 0xc}], 0x10, 0x7}, 0x90) 20:41:07 executing program 3: gettid() bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) fstat(0xffffffffffffffff, 0x0) r0 = getegid() syz_mount_image$ext4(&(0x7f0000000100)='ext4\x00', &(0x7f0000000200)='./file1\x00', 0x3000000, &(0x7f0000003040)=ANY=[@ANYRES64=r0, @ANYBLOB="8555591a163448f4c52bee6cc0e12a6a8610718f818822e94c360e46f93ac9c63a1b40ea9d758c2b4e2d7c386a141016d11cb13fabc846fc7fb242c175fbdf96e2a96e80e82b73987b1d5dfd843c7e6748a15a0c4160f5e4c468e8f8e417bd3385546159881194fe3a7cf8307cd9c7ce0ca180a481d4dcaa6611ec5c8ff1c546360dea3da9f2bfc1fd71af9ebf2afe4285f013a3929a7096097976a16e2060e5f26e379011ea1811", @ANYRES64, @ANYBLOB="ca42ad87c41bb3b2507e4e12104f0cd507000001046f9445657db4996b10208d04454e11fb5b1383c5ce98e3062f45ec04e5b8b179df3d64a6cec05d29235e3cbe0b339abe9faee5cf3e44c97ce56a1dc359047114eeb3c23f331114039d75a664afc47e8273b79e83d301fc4ceec8b89911505b6743797c459195a7120ded1748f315deb90000ffed00000000000000", @ANYRES8=r0, @ANYRES8=r0, @ANYRES64, @ANYBLOB="bd85893dee1670c8c7e3b4a65ec61f224992fd11263b7749c7ee63dd4fc13cc5dfdde8a3099aaf21ece351c316d9bbd7e4ecc524c856f20d6a1818d6d75f702eb904653f9d55af", @ANYRESOCT], 0x1, 0x513, &(0x7f0000000c40)="$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") (fail_nth: 16) 20:41:07 executing program 0: r0 = openat$nci(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) close_range(r0, 0xffffffffffffffff, 0xd00) 20:41:07 executing program 4: r0 = perf_event_open(&(0x7f0000000a40)={0x2, 0x80, 0xcd, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @perf_bp={&(0x7f0000000200), 0x8}, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfb75}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000040)={0x0, 0x4, 0x0, &(0x7f0000000180)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x80) perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x208, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x4, 0x8001}, 0x4000, 0x0, 0x0, 0x0, 0x0, 0x14e, 0xd1}, 0x0, 0xbfffffffffffffff, r0, 0x19893a9f0a0e2244) r1 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) syz_clone(0x2000000, 0x0, 0x0, 0x0, 0x0, 0x0) r2 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x18, 0x5, &(0x7f00000002c0)=ANY=[@ANYBLOB="180000001800ff0f0000000000000000850000006d000000750000000800000095"], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x80) r3 = perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400, 0x80000, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x7, 0x1007}, 0x8006, 0x0, 0x0, 0x1, 0x4, 0x800000, 0x3}, 0x0, 0xffefffffffffffff, 0xffffffffffffffff, 0x9) ioctl$PERF_EVENT_IOC_SET_FILTER(r3, 0x40082406, &(0x7f00000003c0)='memory.numa_stat\x00') perf_event_open(0x0, 0x0, 0x0, r3, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000080)='sched_switch\x00', r2}, 0x10) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000380)={{0x1, 0xffffffffffffffff}, &(0x7f0000000000), &(0x7f0000000240)=r2}, 0x20) r5 = memfd_secret(0x0) syz_io_uring_setup(0x0, &(0x7f0000000300)={0x0, 0x2, 0x0, 0x0, 0x0, 0x0, r5}, 0x0, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f00000009c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000000a00)=0x14) r7 = openat2(0xffffffffffffff9c, &(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)={0x40841}, 0x18) write$binfmt_script(r7, &(0x7f0000000340)=ANY=[], 0xfffffdef) r8 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000b40)={0x1b, 0x0, 0x0, 0x7, 0x0, 0xffffffffffffffff, 0x200, '\x00', 0x0, 0xffffffffffffffff, 0x3, 0x1, 0x4}, 0x48) r9 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000bc0)={0x2, 0x4, 0x8, 0x1, 0x80, 0x1, 0x9, '\x00', 0x0, 0xffffffffffffffff, 0x4, 0x1, 0x4}, 0x48) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000d00)={0x11, 0x12, &(0x7f0000000440)=@raw=[@exit, @ringbuf_query={{0x18, 0x1, 0x1, 0x0, r4}}, @ringbuf_output={{0x18, 0x1, 0x1, 0x0, r5}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x10001}, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x4, 0x0, 0x0, 0x2}}, @exit, @initr0={0x18, 0x0, 0x0, 0x0, 0x6349, 0x0, 0x0, 0x0, 0xf685}, @ldst={0x3, 0x2, 0x1, 0x0, 0xb, 0x2543a83bb932833c, 0x1}], &(0x7f0000000940)='syzkaller\x00', 0x80000001, 0x27, &(0x7f0000000980)=""/39, 0x41000, 0x40, '\x00', r6, 0x0, r7, 0x8, &(0x7f0000000ac0)={0x3, 0x1}, 0x8, 0x10, &(0x7f0000000b00)={0x2, 0xc, 0xfffffe00, 0x2}, 0x10, 0x0, 0x0, 0x5, &(0x7f0000000c40)=[r2, 0x1, 0x1, r8, r9, r1], &(0x7f0000000c80)=[{0x4, 0x1, 0x8, 0xc}, {0x0, 0x4, 0xf, 0x4}, {0x1, 0x2, 0xd, 0x6}, {0x0, 0x4, 0x10, 0xc}, {0x2, 0x4, 0xd, 0x1}], 0x10, 0x20}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000280)={&(0x7f0000000140)='ext4_ext_show_extent\x00', r2}, 0x10) r10 = perf_event_open(&(0x7f0000000080)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) perf_event_open$cgroup(&(0x7f0000000300)={0x5, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_bp={&(0x7f0000000100)}, 0x81252, 0x6, 0x80000001, 0x0, 0x0, 0x0, 0x6, 0x0, 0x6, 0x0, 0x6}, 0xffffffffffffffff, 0xe, 0xffffffffffffffff, 0xc) perf_event_open(0x0, 0x0, 0x2, 0xffffffffffffffff, 0xb) bpf$PROG_LOAD(0x5, &(0x7f0000000780)={0x14, 0x4, &(0x7f00000008c0)=ANY=[@ANYBLOB="850000006b00000018150000a3df7ddd9621fb0201050062d91123e632b2f902ad1e9f1cc7a66ed51ac8a4070000000000000019a83f0b7c9502871fb1ca3dc499e804bbbc359859ed6fd9f104fc7ed900d122072d8275a24d000000000601c3a63953a7b36fe458", @ANYRES32, @ANYBLOB="00000000000000002d59e4eda4000000"], &(0x7f0000000400)='syzkaller\x00', 0xfff, 0xe3, &(0x7f0000000580)=""/227, 0x0, 0x4, '\x00', 0x0, 0x24, 0xffffffffffffffff, 0x8, &(0x7f0000000500)={0x1, 0x3}, 0x8, 0x10, &(0x7f0000000680)={0x5, 0x6, 0x81, 0x9}, 0x10, 0xffffffffffffffff, 0xffffffffffffffff, 0x0, &(0x7f00000006c0)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, r10]}, 0x80) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x4030582a, &(0x7f0000000040)=0x91) [ 119.178563][ T6091] EXT4-fs (loop3): 1 orphan inode deleted [ 119.184619][ T6091] ext4 filesystem being mounted at /root/syzkaller-testdir749715024/syzkaller.AedAWc/162/file1 supports timestamps until 2038-01-19 (0x7fffffff) [ 119.200263][ T6098] loop_reread_partitions: partition scan of loop1 () failed (rc=-16) [ 119.208886][ T26] Quota error (device loop3): do_check_range: Getting dqdh_entries 15 out of range 0-14 20:41:07 executing program 0: r0 = openat$nci(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) close_range(r0, 0xffffffffffffffff, 0xe00) [ 119.271988][ T2775] loop1: p2 p3 p7 [ 119.314170][ T6119] FAULT_INJECTION: forcing a failure. [ 119.314170][ T6119] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 119.322837][ T3091] loop1: p2 p3 p7 [ 119.327749][ T6119] CPU: 1 PID: 6119 Comm: syz-executor.3 Not tainted 6.8.0-rc2-syzkaller-00084-g5c24e4e9e708 #0 [ 119.341710][ T6119] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/25/2024 [ 119.352006][ T6119] Call Trace: [ 119.355296][ T6119] [ 119.358285][ T6119] dump_stack_lvl+0xda/0x130 [ 119.363098][ T6119] dump_stack+0x15/0x20 [ 119.367402][ T6119] should_fail_ex+0x21f/0x230 [ 119.372122][ T6119] __should_fail_alloc_page+0xfd/0x110 [ 119.377697][ T6119] __alloc_pages+0x108/0x340 [ 119.382326][ T6119] alloc_pages_mpol+0xb1/0x1d0 [ 119.387155][ T6119] vma_alloc_folio+0x166/0x2b0 [ 119.392118][ T6119] handle_mm_fault+0xd00/0x27c0 [ 119.397098][ T6119] ? mas_walk+0x204/0x320 [ 119.402693][ T6119] exc_page_fault+0x401/0x6d0 [ 119.408141][ T6119] asm_exc_page_fault+0x26/0x30 [ 119.413824][ T6119] RIP: 0033:0x7fde2b983793 [ 119.418532][ T6119] Code: 1f 84 00 00 00 00 00 3d 00 01 00 00 75 29 45 31 f6 48 83 c4 18 44 89 f0 5b 5d 41 5c 41 5d 41 5e 41 5f c3 0f 1f 40 00 49 8b 0f <44> 88 34 01 49 83 47 10 01 eb 92 66 90 8d 90 ff fe ff ff 83 fa 1c [ 119.438346][ T6119] RSP: 002b:00007fde2ad58530 EFLAGS: 00010206 [ 119.444694][ T6119] RAX: 0000000000002000 RBX: 00007fde2ad585d0 RCX: 00007fde22939000 [ 119.452782][ T6119] RDX: 00007fde2ad58770 RSI: 000000000000006f RDI: 00007fde2ad58670 [ 119.461092][ T6119] RBP: 00000000000000cc R08: 0000000000000006 R09: 0000000000000021 [ 119.469356][ T6119] R10: 0000000000000024 R11: 00007fde2ad585d0 R12: 0000000000000001 [ 119.477539][ T6119] R13: 00007fde2ba46cc0 R14: 00000000000000ff R15: 00007fde2ad58670 [ 119.485531][ T6119] [ 119.488903][ T6119] Huh VM_FAULT_OOM leaked out to the #PF handler. Retrying PF 20:41:07 executing program 0: r0 = openat$nci(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) close_range(r0, 0xffffffffffffffff, 0x1100) [ 119.511322][ T6119] loop3: detected capacity change from 0 to 512 [ 119.537862][ T6127] __loop_clr_fd: partition scan of loop1 failed (rc=-16) [ 119.538646][ T4030] I/O error, dev loop1, sector 208 op 0x0:(READ) flags 0x80700 phys_seg 1 prio class 0 [ 119.548669][ T3169] I/O error, dev loop1, sector 408 op 0x0:(READ) flags 0x80700 phys_seg 1 prio class 0 [ 119.596864][ T6119] EXT4-fs (loop3): 1 orphan inode deleted [ 119.599224][ T4030] I/O error, dev loop1, sector 208 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 0 [ 119.612301][ T4030] Buffer I/O error on dev loop1p3, logical block 8, async page read [ 119.626822][ T6119] ext4 filesystem being mounted at /root/syzkaller-testdir749715024/syzkaller.AedAWc/163/file1 supports timestamps until 2038-01-19 (0x7fffffff) 20:41:08 executing program 2: r0 = perf_event_open(&(0x7f0000000a40)={0x2, 0x80, 0xcd, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @perf_bp={&(0x7f0000000200), 0x8}, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfb75}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000040)={0x0, 0x4, 0x0, &(0x7f0000000180)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x80) perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x208, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x4, 0x8001}, 0x4000, 0x0, 0x0, 0x0, 0x0, 0x14e, 0xd1}, 0x0, 0xbfffffffffffffff, r0, 0x19893a9f0a0e2244) r1 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) syz_clone(0x2000000, 0x0, 0x0, 0x0, 0x0, 0x0) r2 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x18, 0x5, &(0x7f00000002c0)=ANY=[@ANYBLOB="180000001800ff0f0000000000000000850000006d000000750000000800000095"], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x80) r3 = perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400, 0x80000, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x7, 0x1007}, 0x8006, 0x0, 0x0, 0x1, 0x4, 0x800000, 0x3}, 0x0, 0xffefffffffffffff, 0xffffffffffffffff, 0x9) ioctl$PERF_EVENT_IOC_SET_FILTER(r3, 0x40082406, &(0x7f00000003c0)='memory.numa_stat\x00') perf_event_open(0x0, 0x0, 0x0, r3, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000080)='sched_switch\x00', r2}, 0x10) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000380)={{0x1, 0xffffffffffffffff}, &(0x7f0000000000), &(0x7f0000000240)=r2}, 0x20) r5 = memfd_secret(0x0) syz_io_uring_setup(0x0, &(0x7f0000000300)={0x0, 0x2, 0x0, 0x0, 0x0, 0x0, r5}, 0x0, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f00000009c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000000a00)=0x14) r7 = openat2(0xffffffffffffff9c, &(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)={0x40841}, 0x18) write$binfmt_script(r7, &(0x7f0000000340)=ANY=[], 0xfffffdef) r8 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000b40)={0x1b, 0x0, 0x0, 0x7, 0x0, 0xffffffffffffffff, 0x200, '\x00', 0x0, 0xffffffffffffffff, 0x3, 0x1, 0x4}, 0x48) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000d00)={0x11, 0x12, &(0x7f0000000440)=@raw=[@exit, @ringbuf_query={{0x18, 0x1, 0x1, 0x0, r4}}, @ringbuf_output={{0x18, 0x1, 0x1, 0x0, r5}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x10001}, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x4, 0x0, 0x0, 0x2}}, @exit, @initr0={0x18, 0x0, 0x0, 0x0, 0x6349, 0x0, 0x0, 0x0, 0xf685}, @ldst={0x3, 0x2, 0x1, 0x0, 0xb, 0x2543a83bb932833c, 0x1}], &(0x7f0000000940)='syzkaller\x00', 0x80000001, 0x27, &(0x7f0000000980)=""/39, 0x41000, 0x40, '\x00', r6, 0x0, r7, 0x8, &(0x7f0000000ac0)={0x3, 0x1}, 0x8, 0x10, &(0x7f0000000b00)={0x2, 0xc, 0xfffffe00, 0x2}, 0x10, 0x0, 0x0, 0x5, &(0x7f0000000c40)=[r2, 0x1, 0x1, r8, 0xffffffffffffffff, r1], &(0x7f0000000c80)=[{0x4, 0x1, 0x8, 0xc}, {0x0, 0x4, 0xf, 0x4}, {0x1, 0x2, 0xd, 0x6}, {0x0, 0x4, 0x10, 0xc}, {0x2, 0x4, 0xd, 0x1}], 0x10, 0x20}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000280)={&(0x7f0000000140)='ext4_ext_show_extent\x00', r2}, 0x10) r9 = perf_event_open(&(0x7f0000000080)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) r10 = gettid() perf_event_open$cgroup(&(0x7f0000000300)={0x5, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_bp={&(0x7f0000000100)}, 0x81252, 0x6, 0x80000001, 0x0, 0x0, 0x0, 0x6, 0x0, 0x6, 0x0, 0x6}, 0xffffffffffffffff, 0xe, 0xffffffffffffffff, 0xc) perf_event_open(0x0, r10, 0x2, 0xffffffffffffffff, 0xb) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) perf_event_open(&(0x7f0000000840)={0x2, 0x80, 0x0, 0x7, 0x0, 0x80, 0x0, 0x3, 0x0, 0x9, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, @perf_config_ext={0x8000000000, 0x3}, 0x46c73247dfbe0d, 0x1007e, 0x0, 0x2, 0x0, 0x0, 0x6, 0x0, 0xffffffff, 0x0, 0x1c}, 0x0, 0x9, 0xffffffffffffffff, 0xd) bpf$PROG_LOAD(0x5, &(0x7f0000000780)={0x14, 0x4, &(0x7f00000008c0)=ANY=[@ANYBLOB="850000006b00000018150000a3df7ddd9621fb0201050062d91123e632b2f902ad1e9f1cc7a66ed51ac8a4070000000000000019a83f0b7c9502871fb1ca3dc499e804bbbc359859ed6fd9f104fc7ed900d122072d8275a24d000000000601c3a63953a7b36fe458", @ANYRES32, @ANYBLOB="00000000000000002d59e4eda4000000"], &(0x7f0000000400)='syzkaller\x00', 0xfff, 0xe3, &(0x7f0000000580)=""/227, 0x0, 0x4, '\x00', 0x0, 0x24, 0xffffffffffffffff, 0x8, &(0x7f0000000500)={0x1, 0x3}, 0x8, 0x10, &(0x7f0000000680)={0x5, 0x6, 0x81, 0x9}, 0x10, 0xffffffffffffffff, 0xffffffffffffffff, 0x0, &(0x7f00000006c0)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, r9]}, 0x80) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x4030582a, &(0x7f0000000040)=0x91) 20:41:08 executing program 0: r0 = openat$nci(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) close_range(r0, 0xffffffffffffffff, 0x1200) 20:41:08 executing program 3: gettid() bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) fstat(0xffffffffffffffff, 0x0) r0 = getegid() syz_mount_image$ext4(&(0x7f0000000100)='ext4\x00', &(0x7f0000000200)='./file1\x00', 0x3000000, &(0x7f0000003040)=ANY=[@ANYRES64=r0, @ANYBLOB="8555591a163448f4c52bee6cc0e12a6a8610718f818822e94c360e46f93ac9c63a1b40ea9d758c2b4e2d7c386a141016d11cb13fabc846fc7fb242c175fbdf96e2a96e80e82b73987b1d5dfd843c7e6748a15a0c4160f5e4c468e8f8e417bd3385546159881194fe3a7cf8307cd9c7ce0ca180a481d4dcaa6611ec5c8ff1c546360dea3da9f2bfc1fd71af9ebf2afe4285f013a3929a7096097976a16e2060e5f26e379011ea1811", @ANYRES64, @ANYBLOB="ca42ad87c41bb3b2507e4e12104f0cd507000001046f9445657db4996b10208d04454e11fb5b1383c5ce98e3062f45ec04e5b8b179df3d64a6cec05d29235e3cbe0b339abe9faee5cf3e44c97ce56a1dc359047114eeb3c23f331114039d75a664afc47e8273b79e83d301fc4ceec8b89911505b6743797c459195a7120ded1748f315deb90000ffed00000000000000", @ANYRES8=r0, @ANYRES8=r0, @ANYRES64, @ANYBLOB="bd85893dee1670c8c7e3b4a65ec61f224992fd11263b7749c7ee63dd4fc13cc5dfdde8a3099aaf21ece351c316d9bbd7e4ecc524c856f20d6a1818d6d75f702eb904653f9d55af", @ANYRESOCT], 0x1, 0x513, &(0x7f0000000c40)="$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") (fail_nth: 17) [ 119.646135][ T3701] Quota error (device loop3): do_check_range: Getting dqdh_entries 15 out of range 0-14 [ 119.648693][ T6127] loop1: detected capacity change from 0 to 2048 20:41:08 executing program 0: r0 = openat$nci(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) close_range(r0, 0xffffffffffffffff, 0x2000) [ 119.726750][ T4030] udevd[4030]: inotify_add_watch(7, /dev/loop1p3, 10) failed: No such file or directory [ 119.740248][ T3169] udevd[3169]: inotify_add_watch(7, /dev/loop1p7, 10) failed: No such file or directory 20:41:08 executing program 0: r0 = openat$nci(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) close_range(r0, 0xffffffffffffffff, 0x3f00) [ 119.812749][ T6127] loop1: p2 p3 p7 [ 119.834392][ T6154] FAULT_INJECTION: forcing a failure. [ 119.834392][ T6154] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 119.847703][ T6154] CPU: 1 PID: 6154 Comm: syz-executor.3 Not tainted 6.8.0-rc2-syzkaller-00084-g5c24e4e9e708 #0 [ 119.858056][ T6154] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/25/2024 [ 119.868189][ T6154] Call Trace: [ 119.871566][ T6154] [ 119.874537][ T6154] dump_stack_lvl+0xda/0x130 [ 119.879165][ T6154] dump_stack+0x15/0x20 [ 119.883362][ T6154] should_fail_ex+0x21f/0x230 [ 119.888130][ T6154] __should_fail_alloc_page+0xfd/0x110 [ 119.893641][ T6154] __alloc_pages+0x108/0x340 [ 119.898334][ T6154] alloc_pages_mpol+0xb1/0x1d0 [ 119.903184][ T6154] vma_alloc_folio+0x166/0x2b0 [ 119.907967][ T6154] handle_mm_fault+0xd00/0x27c0 [ 119.912940][ T6154] ? mas_walk+0x204/0x320 [ 119.917298][ T6154] exc_page_fault+0x401/0x6d0 [ 119.921997][ T6154] asm_exc_page_fault+0x26/0x30 [ 119.926943][ T6154] RIP: 0033:0x7fde2b983793 [ 119.931364][ T6154] Code: 1f 84 00 00 00 00 00 3d 00 01 00 00 75 29 45 31 f6 48 83 c4 18 44 89 f0 5b 5d 41 5c 41 5d 41 5e 41 5f c3 0f 1f 40 00 49 8b 0f <44> 88 34 01 49 83 47 10 01 eb 92 66 90 8d 90 ff fe ff ff 83 fa 1c [ 119.950987][ T6154] RSP: 002b:00007fde2ad58530 EFLAGS: 00010202 [ 119.957074][ T6154] RAX: 0000000000003000 RBX: 00007fde2ad585d0 RCX: 00007fde22939000 [ 119.965147][ T6154] RDX: 00007fde2ad58770 RSI: 0000000000000001 RDI: 00007fde2ad58670 [ 119.973139][ T6154] RBP: 00000000000000d9 R08: 0000000000000006 R09: 0000000000000020 20:41:08 executing program 0: r0 = openat$nci(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) close_range(r0, 0xffffffffffffffff, 0x4800) 20:41:08 executing program 1: ioctl$BTRFS_IOC_LOGICAL_INO(0xffffffffffffffff, 0xc0389424, &(0x7f0000000180)={0x1, 0x28, '\x00', 0x0, &(0x7f0000000080)=[0x0, 0x0, 0x0, 0x0, 0x0]}) r0 = socket$inet6(0xa, 0x3, 0x6) r1 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) r2 = dup2(r1, r0) ioctl$FIDEDUPERANGE(r0, 0xc0189436, &(0x7f0000000f00)=ANY=[@ANYBLOB="08000000000000000000000000000000000000002000000032057e68d5d647f4ed243c9d097db4c7bae602f8d4c84b5325f3d737af1c3ebe2901b056ac84d04eb9d8bfd4771499d444ff07000033206062c9a0527d2d0e4b0000fa0693ec3785977184911bffc60554e8950e91e1a8209818b4eb3440ae351192e1d7cf54ba6743f2db330481aac17f0961506d7ebd7ca999cf4e148c1ef2880f63693dfee2a6f2fafec2c059fd15db654600000000000000000076da8ec51705470a42729df6a32122af2a673d7409ca1b8a0da065e2bf7790c86a6b3014e1ef5d1c4000d3dff081d5a4c403971fe8869ab4973ffc7b24b6fbb4341ac1a0f5d56b64b9d23d6855e653f1e0418a6d9838196a7b145310a9b4c467199ecc3bd47b85aae47754bf695bdb85ea03f70beab5732a014c5f525bf2f9b9c6bd545e1a"]) ioctl$TIOCSBRK(r2, 0x5427) recvfrom$inet6(0xffffffffffffffff, &(0x7f0000000280)=""/134, 0x86, 0x40000102, &(0x7f0000000340)={0xa, 0x4e21, 0x77f, @mcast1, 0x403b3f}, 0x1c) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000001040)={{r2, 0xffffffffffffffff}, &(0x7f0000000140), &(0x7f0000000480)=r1}, 0x20) syz_read_part_table(0x593, &(0x7f00000005c0)="$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") r4 = creat(&(0x7f0000000240)='./file0\x00', 0x0) stat(&(0x7f0000000040)='./file1\x00', &(0x7f0000000380)) fsetxattr$security_capability(r4, &(0x7f0000000100), &(0x7f0000000000)=@v1={0x1000000, [{0x80000000, 0x81}]}, 0xc, 0x0) newfstatat(0xffffffffffffff9c, &(0x7f00000000c0)='./file1\x00', &(0x7f0000001400), 0x400) close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x2) ioctl$TIOCSTI(r4, 0x5412, &(0x7f00000004c0)=0x40) fsync(0xffffffffffffffff) write$binfmt_misc(r4, &(0x7f0000001080)=ANY=[@ANYBLOB="7379d3c6"], 0x4) fallocate(r4, 0x100000011, 0x0, 0x2811fdff) open(&(0x7f0000000100)='.\x00', 0x20c2, 0x2d) open$dir(&(0x7f0000000500)='./file1\x00', 0x1c6c0, 0x0) r5 = openat$vcsu(0xffffffffffffff9c, &(0x7f0000000cc0), 0x400c00, 0x0) lsetxattr$security_selinux(&(0x7f0000001180)='./file1\x00', &(0x7f00000011c0), &(0x7f0000001300)='system_u:object_r:unconfined_exec_t:s0\x00', 0x27, 0x3) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000400)={0xffffffffffffffff, 0xe0, &(0x7f0000000300)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, &(0x7f00000000c0)=[0x0], &(0x7f0000000140), 0x0, 0x8, &(0x7f0000000200)=[{}, {}, {}, {}, {}], 0x28, 0x0, 0x0, 0x0, 0x0, 0x10, 0x8, 0x8, &(0x7f00000002c0)}}, 0x10) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000e80)=@bpf_lsm={0x1d, 0x4, &(0x7f0000000040)=@framed={{0x18, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x73fc}, [@generic={0x9, 0x8, 0x0, 0x7f, 0x200}]}, &(0x7f0000000880)='GPL\x00', 0x1f, 0x93, &(0x7f0000000cc0)=""/147, 0x40f00, 0x2, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, &(0x7f0000000b80)={0x9}, 0x8, 0x10, 0x0, 0x0, r6}, 0x80) r7 = socket$nl_generic(0x10, 0x3, 0x10) r8 = syz_genetlink_get_family_id$tipc(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$TIPC_CMD_ENABLE_BEARER(r7, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000001200)=ANY=[@ANYBLOB="3400000006c08fada241ee0a049e6fba3f36f40da839bbdf54c31768b0026f4261f56d51c5d81ba4cb99f8203c40d0a142fcd75ce26e408d229139f8c4e81109c56a18e453e8a537df21c4ec04a4f3e22f4ac125a28ad43e41107b1f7e79c8573985e54fd665e2913ca74da8c9f3fc2839258c19fa7ac20ebead31206cf280ea73f635bc5418b66554392dfd11874fef72bc53538aae3cb5ef8a80140f4737dd2c572a03ee1d5e3d627e", @ANYRESOCT=0x0, @ANYBLOB="010000000000000000000100000000000000014100000018001700000000000000007564503a73"], 0x34}, 0x1, 0x0, 0x0, 0x1}, 0x0) ioctl$AUTOFS_DEV_IOCTL_PROTOSUBVER(r1, 0xc0189373, &(0x7f0000000540)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x6}}, './file0\x00'}) sendmsg$TIPC_CMD_GET_MAX_PORTS(r5, &(0x7f0000001140)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x40000}, 0xc, &(0x7f0000001100)={&(0x7f00000010c0)={0x1c, r8, 0x400, 0x8000, 0x25dfdbfe, {}, ["", "", "", "", "", "", ""]}, 0x1c}, 0x1, 0x0, 0x0, 0x20048854}, 0x4004) bpf$PROG_LOAD(0x5, &(0x7f0000000e40)={0x5, 0x16, &(0x7f0000001340)=ANY=[@ANYBLOB="390000000100000000000000900000f117fa0000", @ANYRES32=r4, @ANYBLOB="1f00000000000000b703000000000000850000000c000000b61b0453c29f42b5be06c7010b4efffe000000000085000000a900000018150000", @ANYRES32=r3, @ANYBLOB="0000000000000000180100002020782500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b70300000000850000005d000000185500000100000000000000000000009500000000000000"], &(0x7f0000000b80)='syzkaller\x00', 0x1, 0xe8, &(0x7f0000000bc0)=""/232, 0x41000, 0x5b, '\x00', 0x0, 0xe, r5, 0x8, &(0x7f0000000d00)={0x5, 0x2}, 0x8, 0x10, &(0x7f0000000d40)={0x4, 0xe, 0x2, 0x8}, 0x10, r6, r4, 0x5, &(0x7f0000000d80), &(0x7f0000000dc0)=[{0x4, 0x3, 0x0, 0x2}, {0x3, 0x1, 0xa, 0xa}, {0x0, 0x3, 0x2, 0xa}, {0x0, 0x3, 0x7, 0x1}, {0x1, 0x5, 0xb, 0xc}], 0x10, 0x7}, 0x90) [ 119.981129][ T6154] R10: 0000000000000024 R11: 00007fde2ad585d0 R12: 0000000000000001 [ 119.989168][ T6154] R13: 00007fde2ba46cc0 R14: 0000000000000002 R15: 00007fde2ad58670 [ 119.997164][ T6154] [ 120.000646][ T6154] Huh VM_FAULT_OOM leaked out to the #PF handler. Retrying PF [ 120.024739][ T6154] loop3: detected capacity change from 0 to 512 20:41:08 executing program 2: r0 = perf_event_open(&(0x7f0000000a40)={0x2, 0x80, 0xcd, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @perf_bp={&(0x7f0000000200), 0x8}, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfb75}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000040)={0x0, 0x4, 0x0, &(0x7f0000000180)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x80) perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x208, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x4, 0x8001}, 0x4000, 0x0, 0x0, 0x0, 0x0, 0x14e, 0xd1}, 0x0, 0xbfffffffffffffff, r0, 0x19893a9f0a0e2244) r1 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) syz_clone(0x2000000, 0x0, 0x0, 0x0, 0x0, 0x0) r2 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x18, 0x5, &(0x7f00000002c0)=ANY=[@ANYBLOB="180000001800ff0f0000000000000000850000006d000000750000000800000095"], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x80) r3 = perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400, 0x80000, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x7, 0x1007}, 0x8006, 0x0, 0x0, 0x1, 0x4, 0x800000, 0x3}, 0x0, 0xffefffffffffffff, 0xffffffffffffffff, 0x9) ioctl$PERF_EVENT_IOC_SET_FILTER(r3, 0x40082406, &(0x7f00000003c0)='memory.numa_stat\x00') perf_event_open(0x0, 0x0, 0x0, r3, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000080)='sched_switch\x00', r2}, 0x10) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000380)={{0x1, 0xffffffffffffffff}, &(0x7f0000000000), &(0x7f0000000240)=r2}, 0x20) r5 = memfd_secret(0x0) syz_io_uring_setup(0x0, &(0x7f0000000300)={0x0, 0x2, 0x0, 0x0, 0x0, 0x0, r5}, 0x0, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f00000009c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000000a00)=0x14) r7 = openat2(0xffffffffffffff9c, &(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)={0x40841}, 0x18) write$binfmt_script(r7, &(0x7f0000000340)=ANY=[], 0xfffffdef) r8 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000b40)={0x1b, 0x0, 0x0, 0x7, 0x0, 0xffffffffffffffff, 0x200, '\x00', 0x0, 0xffffffffffffffff, 0x3, 0x1, 0x4}, 0x48) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000d00)={0x11, 0x12, &(0x7f0000000440)=@raw=[@exit, @ringbuf_query={{0x18, 0x1, 0x1, 0x0, r4}}, @ringbuf_output={{0x18, 0x1, 0x1, 0x0, r5}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x10001}, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x4, 0x0, 0x0, 0x2}}, @exit, @initr0={0x18, 0x0, 0x0, 0x0, 0x6349, 0x0, 0x0, 0x0, 0xf685}, @ldst={0x3, 0x2, 0x1, 0x0, 0xb, 0x2543a83bb932833c, 0x1}], &(0x7f0000000940)='syzkaller\x00', 0x80000001, 0x27, &(0x7f0000000980)=""/39, 0x41000, 0x40, '\x00', r6, 0x0, r7, 0x8, &(0x7f0000000ac0)={0x3, 0x1}, 0x8, 0x10, &(0x7f0000000b00)={0x2, 0xc, 0xfffffe00, 0x2}, 0x10, 0x0, 0x0, 0x5, &(0x7f0000000c40)=[r2, 0x1, 0x1, r8, 0xffffffffffffffff, r1], &(0x7f0000000c80)=[{0x4, 0x1, 0x8, 0xc}, {0x0, 0x4, 0xf, 0x4}, {0x1, 0x2, 0xd, 0x6}, {0x0, 0x4, 0x10, 0xc}, {0x2, 0x4, 0xd, 0x1}], 0x10, 0x20}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000280)={&(0x7f0000000140)='ext4_ext_show_extent\x00', r2}, 0x10) r9 = perf_event_open(&(0x7f0000000080)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) r10 = gettid() perf_event_open$cgroup(&(0x7f0000000300)={0x5, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_bp={&(0x7f0000000100)}, 0x81252, 0x6, 0x80000001, 0x0, 0x0, 0x0, 0x6, 0x0, 0x6, 0x0, 0x6}, 0xffffffffffffffff, 0xe, 0xffffffffffffffff, 0xc) perf_event_open(0x0, r10, 0x2, 0xffffffffffffffff, 0xb) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) perf_event_open(&(0x7f0000000840)={0x2, 0x80, 0x0, 0x7, 0x0, 0x80, 0x0, 0x3, 0x0, 0x9, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, @perf_config_ext={0x8000000000, 0x3}, 0x46c73247dfbe0d, 0x1007e, 0x0, 0x2, 0x0, 0x0, 0x6, 0x0, 0xffffffff, 0x0, 0x1c}, 0x0, 0x9, 0xffffffffffffffff, 0xd) bpf$PROG_LOAD(0x5, &(0x7f0000000780)={0x14, 0x4, &(0x7f00000008c0)=ANY=[@ANYBLOB="850000006b00000018150000a3df7ddd9621fb0201050062d91123e632b2f902ad1e9f1cc7a66ed51ac8a4070000000000000019a83f0b7c9502871fb1ca3dc499e804bbbc359859ed6fd9f104fc7ed900d122072d8275a24d000000000601c3a63953a7b36fe458", @ANYRES32, @ANYBLOB="00000000000000002d59e4eda4000000"], &(0x7f0000000400)='syzkaller\x00', 0xfff, 0xe3, &(0x7f0000000580)=""/227, 0x0, 0x4, '\x00', 0x0, 0x24, 0xffffffffffffffff, 0x8, &(0x7f0000000500)={0x1, 0x3}, 0x8, 0x10, &(0x7f0000000680)={0x5, 0x6, 0x81, 0x9}, 0x10, 0xffffffffffffffff, 0xffffffffffffffff, 0x0, &(0x7f00000006c0)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, r9]}, 0x80) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x4030582a, &(0x7f0000000040)=0x91) 20:41:08 executing program 0: r0 = openat$nci(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) close_range(r0, 0xffffffffffffffff, 0x4c00) [ 120.062627][ T2775] loop1: p2 p3 p7 20:41:08 executing program 3: gettid() bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) fstat(0xffffffffffffffff, 0x0) r0 = getegid() syz_mount_image$ext4(&(0x7f0000000100)='ext4\x00', &(0x7f0000000200)='./file1\x00', 0x3000000, &(0x7f0000003040)=ANY=[@ANYRES64=r0, @ANYBLOB="8555591a163448f4c52bee6cc0e12a6a8610718f818822e94c360e46f93ac9c63a1b40ea9d758c2b4e2d7c386a141016d11cb13fabc846fc7fb242c175fbdf96e2a96e80e82b73987b1d5dfd843c7e6748a15a0c4160f5e4c468e8f8e417bd3385546159881194fe3a7cf8307cd9c7ce0ca180a481d4dcaa6611ec5c8ff1c546360dea3da9f2bfc1fd71af9ebf2afe4285f013a3929a7096097976a16e2060e5f26e379011ea1811", @ANYRES64, @ANYBLOB="ca42ad87c41bb3b2507e4e12104f0cd507000001046f9445657db4996b10208d04454e11fb5b1383c5ce98e3062f45ec04e5b8b179df3d64a6cec05d29235e3cbe0b339abe9faee5cf3e44c97ce56a1dc359047114eeb3c23f331114039d75a664afc47e8273b79e83d301fc4ceec8b89911505b6743797c459195a7120ded1748f315deb90000ffed00000000000000", @ANYRES8=r0, @ANYRES8=r0, @ANYRES64, @ANYBLOB="bd85893dee1670c8c7e3b4a65ec61f224992fd11263b7749c7ee63dd4fc13cc5dfdde8a3099aaf21ece351c316d9bbd7e4ecc524c856f20d6a1818d6d75f702eb904653f9d55af", @ANYRESOCT], 0x1, 0x513, &(0x7f0000000c40)="$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") (fail_nth: 18) [ 120.127819][ T6177] FAULT_INJECTION: forcing a failure. [ 120.127819][ T6177] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 120.141472][ T6177] CPU: 0 PID: 6177 Comm: syz-executor.3 Not tainted 6.8.0-rc2-syzkaller-00084-g5c24e4e9e708 #0 [ 120.151965][ T6177] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/25/2024 [ 120.162330][ T6177] Call Trace: [ 120.165639][ T6177] [ 120.168626][ T6177] dump_stack_lvl+0xda/0x130 [ 120.173378][ T6177] dump_stack+0x15/0x20 [ 120.177561][ T6177] should_fail_ex+0x21f/0x230 [ 120.182291][ T6177] __should_fail_alloc_page+0xfd/0x110 [ 120.187859][ T6177] __alloc_pages+0x108/0x340 [ 120.192532][ T6177] alloc_pages_mpol+0xb1/0x1d0 [ 120.197321][ T6177] vma_alloc_folio+0x166/0x2b0 [ 120.202253][ T6177] handle_mm_fault+0xd00/0x27c0 [ 120.207132][ T6177] ? mas_walk+0x204/0x320 [ 120.211668][ T6177] exc_page_fault+0x401/0x6d0 [ 120.216747][ T6177] asm_exc_page_fault+0x26/0x30 [ 120.221661][ T6177] RIP: 0033:0x7fde2b983793 [ 120.226113][ T6177] Code: 1f 84 00 00 00 00 00 3d 00 01 00 00 75 29 45 31 f6 48 83 c4 18 44 89 f0 5b 5d 41 5c 41 5d 41 5e 41 5f c3 0f 1f 40 00 49 8b 0f <44> 88 34 01 49 83 47 10 01 eb 92 66 90 8d 90 ff fe ff ff 83 fa 1c [ 120.245747][ T6177] RSP: 002b:00007fde2ad58530 EFLAGS: 00010202 [ 120.251843][ T6177] RAX: 0000000000004000 RBX: 00007fde2ad585d0 RCX: 00007fde22939000 [ 120.259832][ T6177] RDX: 00007fde2ad58770 RSI: 000000000000000f RDI: 00007fde2ad58670 [ 120.267834][ T6177] RBP: 00000000000000e7 R08: 0000000000000009 R09: 00000000000001cd 20:41:08 executing program 0: r0 = openat$nci(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) close_range(r0, 0xffffffffffffffff, 0x6000) [ 120.276020][ T6177] R10: 00000000000001d8 R11: 00007fde2ad585d0 R12: 0000000000000001 [ 120.284015][ T6177] R13: 00007fde2ba46cc0 R14: 000000000000000b R15: 00007fde2ad58670 [ 120.292118][ T6177] [ 120.295286][ T6177] Huh VM_FAULT_OOM leaked out to the #PF handler. Retrying PF [ 120.314514][ T6179] loop1: detected capacity change from 0 to 2048 20:41:08 executing program 4: r0 = perf_event_open(&(0x7f0000000a40)={0x2, 0x80, 0xcd, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @perf_bp={&(0x7f0000000200), 0x8}, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfb75}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000040)={0x0, 0x4, 0x0, &(0x7f0000000180)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x80) perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x208, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x4, 0x8001}, 0x4000, 0x0, 0x0, 0x0, 0x0, 0x14e, 0xd1}, 0x0, 0xbfffffffffffffff, r0, 0x19893a9f0a0e2244) r1 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) syz_clone(0x2000000, 0x0, 0x0, 0x0, 0x0, 0x0) r2 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x18, 0x5, &(0x7f00000002c0)=ANY=[@ANYBLOB="180000001800ff0f0000000000000000850000006d000000750000000800000095"], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x80) r3 = perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400, 0x80000, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x7, 0x1007}, 0x8006, 0x0, 0x0, 0x1, 0x4, 0x800000, 0x3}, 0x0, 0xffefffffffffffff, 0xffffffffffffffff, 0x9) ioctl$PERF_EVENT_IOC_SET_FILTER(r3, 0x40082406, &(0x7f00000003c0)='memory.numa_stat\x00') perf_event_open(0x0, 0x0, 0x0, r3, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000080)='sched_switch\x00', r2}, 0x10) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000380)={{0x1, 0xffffffffffffffff}, &(0x7f0000000000), &(0x7f0000000240)=r2}, 0x20) r5 = memfd_secret(0x0) syz_io_uring_setup(0x0, &(0x7f0000000300)={0x0, 0x2, 0x0, 0x0, 0x0, 0x0, r5}, 0x0, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f00000009c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000000a00)=0x14) r7 = openat2(0xffffffffffffff9c, &(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)={0x40841}, 0x18) write$binfmt_script(r7, &(0x7f0000000340)=ANY=[], 0xfffffdef) r8 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000b40)={0x1b, 0x0, 0x0, 0x7, 0x0, 0xffffffffffffffff, 0x200, '\x00', 0x0, 0xffffffffffffffff, 0x3, 0x1, 0x4}, 0x48) r9 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000bc0)={0x2, 0x4, 0x8, 0x1, 0x80, 0x1, 0x9, '\x00', 0x0, 0xffffffffffffffff, 0x4, 0x1, 0x4}, 0x48) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000d00)={0x11, 0x12, &(0x7f0000000440)=@raw=[@exit, @ringbuf_query={{0x18, 0x1, 0x1, 0x0, r4}}, @ringbuf_output={{0x18, 0x1, 0x1, 0x0, r5}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x10001}, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x4, 0x0, 0x0, 0x2}}, @exit, @initr0={0x18, 0x0, 0x0, 0x0, 0x6349, 0x0, 0x0, 0x0, 0xf685}, @ldst={0x3, 0x2, 0x1, 0x0, 0xb, 0x2543a83bb932833c, 0x1}], &(0x7f0000000940)='syzkaller\x00', 0x80000001, 0x27, &(0x7f0000000980)=""/39, 0x41000, 0x40, '\x00', r6, 0x0, r7, 0x8, &(0x7f0000000ac0)={0x3, 0x1}, 0x8, 0x10, &(0x7f0000000b00)={0x2, 0xc, 0xfffffe00, 0x2}, 0x10, 0x0, 0x0, 0x5, &(0x7f0000000c40)=[r2, 0x1, 0x1, r8, r9, r1], &(0x7f0000000c80)=[{0x4, 0x1, 0x8, 0xc}, {0x0, 0x4, 0xf, 0x4}, {0x1, 0x2, 0xd, 0x6}, {0x0, 0x4, 0x10, 0xc}, {0x2, 0x4, 0xd, 0x1}], 0x10, 0x20}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000280)={&(0x7f0000000140)='ext4_ext_show_extent\x00', r2}, 0x10) r10 = perf_event_open(&(0x7f0000000080)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) perf_event_open$cgroup(&(0x7f0000000300)={0x5, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_bp={&(0x7f0000000100)}, 0x81252, 0x6, 0x80000001, 0x0, 0x0, 0x0, 0x6, 0x0, 0x6, 0x0, 0x6}, 0xffffffffffffffff, 0xe, 0xffffffffffffffff, 0xc) perf_event_open(0x0, 0x0, 0x2, 0xffffffffffffffff, 0xb) bpf$PROG_LOAD(0x5, &(0x7f0000000780)={0x14, 0x4, &(0x7f00000008c0)=ANY=[@ANYBLOB="850000006b00000018150000a3df7ddd9621fb0201050062d91123e632b2f902ad1e9f1cc7a66ed51ac8a4070000000000000019a83f0b7c9502871fb1ca3dc499e804bbbc359859ed6fd9f104fc7ed900d122072d8275a24d000000000601c3a63953a7b36fe458", @ANYRES32, @ANYBLOB="00000000000000002d59e4eda4000000"], &(0x7f0000000400)='syzkaller\x00', 0xfff, 0xe3, &(0x7f0000000580)=""/227, 0x0, 0x4, '\x00', 0x0, 0x24, 0xffffffffffffffff, 0x8, &(0x7f0000000500)={0x1, 0x3}, 0x8, 0x10, &(0x7f0000000680)={0x5, 0x6, 0x81, 0x9}, 0x10, 0xffffffffffffffff, 0xffffffffffffffff, 0x0, &(0x7f00000006c0)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, r10]}, 0x80) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x4030582a, &(0x7f0000000040)=0x91) 20:41:08 executing program 0: r0 = openat$nci(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) close_range(r0, 0xffffffffffffffff, 0x6800) [ 120.337280][ T6177] loop3: detected capacity change from 0 to 512 20:41:08 executing program 3: gettid() bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) fstat(0xffffffffffffffff, 0x0) r0 = getegid() syz_mount_image$ext4(&(0x7f0000000100)='ext4\x00', &(0x7f0000000200)='./file1\x00', 0x3000000, &(0x7f0000003040)=ANY=[@ANYRES64=r0, @ANYBLOB="8555591a163448f4c52bee6cc0e12a6a8610718f818822e94c360e46f93ac9c63a1b40ea9d758c2b4e2d7c386a141016d11cb13fabc846fc7fb242c175fbdf96e2a96e80e82b73987b1d5dfd843c7e6748a15a0c4160f5e4c468e8f8e417bd3385546159881194fe3a7cf8307cd9c7ce0ca180a481d4dcaa6611ec5c8ff1c546360dea3da9f2bfc1fd71af9ebf2afe4285f013a3929a7096097976a16e2060e5f26e379011ea1811", @ANYRES64, @ANYBLOB="ca42ad87c41bb3b2507e4e12104f0cd507000001046f9445657db4996b10208d04454e11fb5b1383c5ce98e3062f45ec04e5b8b179df3d64a6cec05d29235e3cbe0b339abe9faee5cf3e44c97ce56a1dc359047114eeb3c23f331114039d75a664afc47e8273b79e83d301fc4ceec8b89911505b6743797c459195a7120ded1748f315deb90000ffed00000000000000", @ANYRES8=r0, @ANYRES8=r0, @ANYRES64, @ANYBLOB="bd85893dee1670c8c7e3b4a65ec61f224992fd11263b7749c7ee63dd4fc13cc5dfdde8a3099aaf21ece351c316d9bbd7e4ecc524c856f20d6a1818d6d75f702eb904653f9d55af", @ANYRESOCT], 0x1, 0x513, &(0x7f0000000c40)="$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") (fail_nth: 19) 20:41:08 executing program 0: r0 = openat$nci(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) close_range(r0, 0xffffffffffffffff, 0x6c00) [ 120.389942][ T6179] loop1: p2 p3 p7 [ 120.392595][ T6177] EXT4-fs (loop3): 1 orphan inode deleted [ 120.407876][ T26] Quota error (device loop3): do_check_range: Getting dqdh_entries 15 out of range 0-14 [ 120.409825][ T6177] ext4 filesystem being mounted at /root/syzkaller-testdir749715024/syzkaller.AedAWc/165/file1 supports timestamps until 2038-01-19 (0x7fffffff) 20:41:08 executing program 1: ioctl$BTRFS_IOC_LOGICAL_INO(0xffffffffffffffff, 0xc0389424, &(0x7f0000000180)={0x1, 0x28, '\x00', 0x0, &(0x7f0000000080)=[0x0, 0x0, 0x0, 0x0, 0x0]}) r0 = socket$inet6(0xa, 0x3, 0x6) r1 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) r2 = dup2(r1, r0) ioctl$FIDEDUPERANGE(r0, 0xc0189436, &(0x7f0000000f00)=ANY=[@ANYBLOB="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"]) ioctl$TIOCSBRK(r2, 0x5427) recvfrom$inet6(0xffffffffffffffff, &(0x7f0000000280)=""/134, 0x86, 0x40000102, &(0x7f0000000340)={0xa, 0x4e21, 0x77f, @mcast1, 0x403b3f}, 0x1c) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000001040)={{r2, 0xffffffffffffffff}, &(0x7f0000000140), &(0x7f0000000480)=r1}, 0x20) syz_read_part_table(0x593, &(0x7f00000005c0)="$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") r4 = creat(&(0x7f0000000240)='./file0\x00', 0x0) stat(&(0x7f0000000040)='./file1\x00', &(0x7f0000000380)) fsetxattr$security_capability(r4, &(0x7f0000000100), &(0x7f0000000000)=@v1={0x1000000, [{0x80000000, 0x81}]}, 0xc, 0x0) newfstatat(0xffffffffffffff9c, &(0x7f00000000c0)='./file1\x00', &(0x7f0000001400), 0x400) close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x2) ioctl$TIOCSTI(r4, 0x5412, &(0x7f00000004c0)=0x40) fsync(0xffffffffffffffff) write$binfmt_misc(r4, &(0x7f0000001080)=ANY=[@ANYBLOB="7379d3c6"], 0x4) fallocate(r4, 0x100000011, 0x0, 0x2811fdff) open(&(0x7f0000000100)='.\x00', 0x20c2, 0x2d) open$dir(&(0x7f0000000500)='./file1\x00', 0x1c6c0, 0x0) r5 = openat$vcsu(0xffffffffffffff9c, &(0x7f0000000cc0), 0x400c00, 0x0) lsetxattr$security_selinux(&(0x7f0000001180)='./file1\x00', &(0x7f00000011c0), &(0x7f0000001300)='system_u:object_r:unconfined_exec_t:s0\x00', 0x27, 0x3) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000400)={0xffffffffffffffff, 0xe0, &(0x7f0000000300)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, &(0x7f00000000c0)=[0x0], &(0x7f0000000140), 0x0, 0x8, &(0x7f0000000200)=[{}, {}, {}, {}, {}], 0x28, 0x0, 0x0, 0x0, 0x0, 0x10, 0x8, 0x8, &(0x7f00000002c0)}}, 0x10) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000e80)=@bpf_lsm={0x1d, 0x4, &(0x7f0000000040)=@framed={{0x18, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x73fc}, [@generic={0x9, 0x8, 0x0, 0x7f, 0x200}]}, &(0x7f0000000880)='GPL\x00', 0x1f, 0x93, &(0x7f0000000cc0)=""/147, 0x40f00, 0x2, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, &(0x7f0000000b80)={0x9}, 0x8, 0x10, 0x0, 0x0, r6}, 0x80) r7 = socket$nl_generic(0x10, 0x3, 0x10) r8 = syz_genetlink_get_family_id$tipc(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$TIPC_CMD_ENABLE_BEARER(r7, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000001200)=ANY=[@ANYBLOB="3400000006c08fada241ee0a049e6fba3f36f40da839bbdf54c31768b0026f4261f56d51c5d81ba4cb99f8203c40d0a142fcd75ce26e408d229139f8c4e81109c56a18e453e8a537df21c4ec04a4f3e22f4ac125a28ad43e41107b1f7e79c8573985e54fd665e2913ca74da8c9f3fc2839258c19fa7ac20ebead31206cf280ea73f635bc5418b66554392dfd11874fef72bc53538aae3cb5ef8a80140f4737dd2c572a03ee1d5e3d627e", @ANYRESOCT=0x0, @ANYBLOB="010000000000000000000100000000000000014100000018001700000000000000007564503a73"], 0x34}, 0x1, 0x0, 0x0, 0x1}, 0x0) ioctl$AUTOFS_DEV_IOCTL_PROTOSUBVER(r1, 0xc0189373, &(0x7f0000000540)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x6}}, './file0\x00'}) sendmsg$TIPC_CMD_GET_MAX_PORTS(r5, &(0x7f0000001140)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x40000}, 0xc, &(0x7f0000001100)={&(0x7f00000010c0)={0x1c, r8, 0x400, 0x8000, 0x25dfdbfe, {}, ["", "", "", "", "", "", ""]}, 0x1c}, 0x1, 0x0, 0x0, 0x20048854}, 0x4004) bpf$PROG_LOAD(0x5, &(0x7f0000000e40)={0x5, 0x16, &(0x7f0000001340)=ANY=[@ANYBLOB="390000000100000000000000900000f117fa0000", @ANYRES32=r4, @ANYBLOB="1f00000000000000b703000000000000850000000c000000b61b0453c29f42b5be06c7010b4efffe000000000085000000a900000018150000", @ANYRES32=r3, @ANYBLOB="0000000000000000180100002020782500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b70300000000850000005d000000185500000100000000000000000000009500000000000000"], &(0x7f0000000b80)='syzkaller\x00', 0x1, 0xe8, &(0x7f0000000bc0)=""/232, 0x41000, 0x5b, '\x00', 0x0, 0xe, r5, 0x8, &(0x7f0000000d00)={0x5, 0x2}, 0x8, 0x10, &(0x7f0000000d40)={0x4, 0xe, 0x2, 0x8}, 0x10, r6, r4, 0x5, &(0x7f0000000d80), &(0x7f0000000dc0)=[{0x4, 0x3, 0x0, 0x2}, {0x3, 0x1, 0xa, 0xa}, {0x0, 0x3, 0x2, 0xa}, {0x0, 0x3, 0x7, 0x1}, {0x1, 0x5, 0xb, 0xc}], 0x10, 0x7}, 0x90) [ 120.509788][ T6203] FAULT_INJECTION: forcing a failure. [ 120.509788][ T6203] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 120.525328][ T6203] CPU: 1 PID: 6203 Comm: syz-executor.3 Not tainted 6.8.0-rc2-syzkaller-00084-g5c24e4e9e708 #0 [ 120.538256][ T6203] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/25/2024 [ 120.548965][ T6203] Call Trace: [ 120.552747][ T6203] [ 120.556447][ T6203] dump_stack_lvl+0xda/0x130 [ 120.562963][ T6203] dump_stack+0x15/0x20 [ 120.567748][ T6203] should_fail_ex+0x21f/0x230 [ 120.573967][ T6203] __should_fail_alloc_page+0xfd/0x110 [ 120.582359][ T6203] __alloc_pages+0x108/0x340 [ 120.588239][ T6203] alloc_pages_mpol+0xb1/0x1d0 [ 120.594529][ T6203] vma_alloc_folio+0x166/0x2b0 [ 120.599712][ T6203] do_wp_page+0x61b/0x1f20 [ 120.604773][ T6203] ? __rcu_read_lock+0x35/0x50 [ 120.609833][ T6203] handle_mm_fault+0xb80/0x27c0 [ 120.615023][ T6203] ? mas_walk+0x204/0x320 [ 120.619821][ T6203] exc_page_fault+0x401/0x6d0 [ 120.624528][ T6203] asm_exc_page_fault+0x26/0x30 [ 120.629962][ T6203] RIP: 0033:0x7fde2b983793 [ 120.635423][ T6203] Code: 1f 84 00 00 00 00 00 3d 00 01 00 00 75 29 45 31 f6 48 83 c4 18 44 89 f0 5b 5d 41 5c 41 5d 41 5e 41 5f c3 0f 1f 40 00 49 8b 0f <44> 88 34 01 49 83 47 10 01 eb 92 66 90 8d 90 ff fe ff ff 83 fa 1c [ 120.656009][ T6203] RSP: 002b:00007fde2ad58530 EFLAGS: 00010202 [ 120.663140][ T6203] RAX: 0000000000005005 RBX: 00007fde2ad585d0 RCX: 00007fde22939000 [ 120.671767][ T6203] RDX: 00007fde2ad58770 RSI: 0000000000000000 RDI: 00007fde2ad58670 [ 120.681828][ T6203] RBP: 00000000000000cf R08: 0000000000000007 R09: 0000000000000042 [ 120.692200][ T6203] R10: 0000000000000052 R11: 00007fde2ad585d0 R12: 0000000000000001 [ 120.703965][ T6203] R13: 00007fde2ba46cc0 R14: 0000000000000010 R15: 00007fde2ad58670 [ 120.712298][ T6203] [ 120.717544][ T6203] Huh VM_FAULT_OOM leaked out to the #PF handler. Retrying PF [ 120.737798][ T4030] udevd[4030]: inotify_add_watch(7, /dev/loop1p3, 10) failed: No such file or directory [ 120.750514][ T3169] udevd[3169]: inotify_add_watch(7, /dev/loop1p7, 10) failed: No such file or directory 20:41:09 executing program 0: r0 = openat$nci(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) close_range(r0, 0xffffffffffffffff, 0x7400) [ 120.761802][ T6204] loop1: detected capacity change from 0 to 2048 [ 120.885391][ T6204] loop1: p2 p3 p7 20:41:09 executing program 0: r0 = openat$nci(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) close_range(r0, 0xffffffffffffffff, 0x7a00) [ 120.942069][ T6203] loop3: detected capacity change from 0 to 512 20:41:09 executing program 2: r0 = perf_event_open(&(0x7f0000000a40)={0x2, 0x80, 0xcd, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @perf_bp={&(0x7f0000000200), 0x8}, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfb75}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000040)={0x0, 0x4, 0x0, &(0x7f0000000180)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x80) perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x208, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x4, 0x8001}, 0x4000, 0x0, 0x0, 0x0, 0x0, 0x14e, 0xd1}, 0x0, 0xbfffffffffffffff, r0, 0x19893a9f0a0e2244) r1 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) syz_clone(0x2000000, 0x0, 0x0, 0x0, 0x0, 0x0) r2 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x18, 0x5, &(0x7f00000002c0)=ANY=[@ANYBLOB="180000001800ff0f0000000000000000850000006d000000750000000800000095"], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x80) r3 = perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400, 0x80000, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x7, 0x1007}, 0x8006, 0x0, 0x0, 0x1, 0x4, 0x800000, 0x3}, 0x0, 0xffefffffffffffff, 0xffffffffffffffff, 0x9) ioctl$PERF_EVENT_IOC_SET_FILTER(r3, 0x40082406, &(0x7f00000003c0)='memory.numa_stat\x00') perf_event_open(0x0, 0x0, 0x0, r3, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000080)='sched_switch\x00', r2}, 0x10) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000380)={{0x1, 0xffffffffffffffff}, &(0x7f0000000000), &(0x7f0000000240)=r2}, 0x20) r5 = memfd_secret(0x0) syz_io_uring_setup(0x0, &(0x7f0000000300)={0x0, 0x2, 0x0, 0x0, 0x0, 0x0, r5}, 0x0, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f00000009c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000000a00)=0x14) r7 = openat2(0xffffffffffffff9c, &(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)={0x40841}, 0x18) write$binfmt_script(r7, &(0x7f0000000340)=ANY=[], 0xfffffdef) r8 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000bc0)={0x2, 0x4, 0x8, 0x1, 0x80, 0x1, 0x9, '\x00', 0x0, 0xffffffffffffffff, 0x4, 0x1, 0x4}, 0x48) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000d00)={0x11, 0x12, &(0x7f0000000440)=@raw=[@exit, @ringbuf_query={{0x18, 0x1, 0x1, 0x0, r4}}, @ringbuf_output={{0x18, 0x1, 0x1, 0x0, r5}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x10001}, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x4, 0x0, 0x0, 0x2}}, @exit, @initr0={0x18, 0x0, 0x0, 0x0, 0x6349, 0x0, 0x0, 0x0, 0xf685}, @ldst={0x3, 0x2, 0x1, 0x0, 0xb, 0x2543a83bb932833c, 0x1}], &(0x7f0000000940)='syzkaller\x00', 0x80000001, 0x27, &(0x7f0000000980)=""/39, 0x41000, 0x40, '\x00', r6, 0x0, r7, 0x8, &(0x7f0000000ac0)={0x3, 0x1}, 0x8, 0x10, &(0x7f0000000b00)={0x2, 0xc, 0xfffffe00, 0x2}, 0x10, 0x0, 0x0, 0x5, &(0x7f0000000c40)=[r2, 0x1, 0x1, 0xffffffffffffffff, r8, r1], &(0x7f0000000c80)=[{0x4, 0x1, 0x8, 0xc}, {0x0, 0x4, 0xf, 0x4}, {0x1, 0x2, 0xd, 0x6}, {0x0, 0x4, 0x10, 0xc}, {0x2, 0x4, 0xd, 0x1}], 0x10, 0x20}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000280)={&(0x7f0000000140)='ext4_ext_show_extent\x00', r2}, 0x10) r9 = perf_event_open(&(0x7f0000000080)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) r10 = gettid() perf_event_open$cgroup(&(0x7f0000000300)={0x5, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_bp={&(0x7f0000000100)}, 0x81252, 0x6, 0x80000001, 0x0, 0x0, 0x0, 0x6, 0x0, 0x6, 0x0, 0x6}, 0xffffffffffffffff, 0xe, 0xffffffffffffffff, 0xc) perf_event_open(0x0, r10, 0x2, 0xffffffffffffffff, 0xb) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) perf_event_open(&(0x7f0000000840)={0x2, 0x80, 0x0, 0x7, 0x0, 0x80, 0x0, 0x3, 0x0, 0x9, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, @perf_config_ext={0x8000000000, 0x3}, 0x46c73247dfbe0d, 0x1007e, 0x0, 0x2, 0x0, 0x0, 0x6, 0x0, 0xffffffff, 0x0, 0x1c}, 0x0, 0x9, 0xffffffffffffffff, 0xd) bpf$PROG_LOAD(0x5, &(0x7f0000000780)={0x14, 0x4, &(0x7f00000008c0)=ANY=[@ANYBLOB="850000006b00000018150000a3df7ddd9621fb0201050062d91123e632b2f902ad1e9f1cc7a66ed51ac8a4070000000000000019a83f0b7c9502871fb1ca3dc499e804bbbc359859ed6fd9f104fc7ed900d122072d8275a24d000000000601c3a63953a7b36fe458", @ANYRES32, @ANYBLOB="00000000000000002d59e4eda4000000"], &(0x7f0000000400)='syzkaller\x00', 0xfff, 0xe3, &(0x7f0000000580)=""/227, 0x0, 0x4, '\x00', 0x0, 0x24, 0xffffffffffffffff, 0x8, &(0x7f0000000500)={0x1, 0x3}, 0x8, 0x10, &(0x7f0000000680)={0x5, 0x6, 0x81, 0x9}, 0x10, 0xffffffffffffffff, 0xffffffffffffffff, 0x0, &(0x7f00000006c0)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, r9]}, 0x80) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x4030582a, &(0x7f0000000040)=0x91) [ 120.994038][ T6203] EXT4-fs (loop3): 1 orphan inode deleted [ 121.008056][ T3701] Quota error (device loop3): do_check_range: Getting dqdh_entries 15 out of range 0-14 20:41:09 executing program 0: r0 = openat$nci(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) close_range(r0, 0xffffffffffffffff, 0xc80a) [ 121.030768][ T6203] ext4 filesystem being mounted at /root/syzkaller-testdir749715024/syzkaller.AedAWc/166/file1 supports timestamps until 2038-01-19 (0x7fffffff) 20:41:09 executing program 3: gettid() bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) fstat(0xffffffffffffffff, 0x0) r0 = getegid() syz_mount_image$ext4(&(0x7f0000000100)='ext4\x00', &(0x7f0000000200)='./file1\x00', 0x3000000, &(0x7f0000003040)=ANY=[@ANYRES64=r0, @ANYBLOB="8555591a163448f4c52bee6cc0e12a6a8610718f818822e94c360e46f93ac9c63a1b40ea9d758c2b4e2d7c386a141016d11cb13fabc846fc7fb242c175fbdf96e2a96e80e82b73987b1d5dfd843c7e6748a15a0c4160f5e4c468e8f8e417bd3385546159881194fe3a7cf8307cd9c7ce0ca180a481d4dcaa6611ec5c8ff1c546360dea3da9f2bfc1fd71af9ebf2afe4285f013a3929a7096097976a16e2060e5f26e379011ea1811", @ANYRES64, @ANYBLOB="ca42ad87c41bb3b2507e4e12104f0cd507000001046f9445657db4996b10208d04454e11fb5b1383c5ce98e3062f45ec04e5b8b179df3d64a6cec05d29235e3cbe0b339abe9faee5cf3e44c97ce56a1dc359047114eeb3c23f331114039d75a664afc47e8273b79e83d301fc4ceec8b89911505b6743797c459195a7120ded1748f315deb90000ffed00000000000000", @ANYRES8=r0, @ANYRES8=r0, @ANYRES64, @ANYBLOB="bd85893dee1670c8c7e3b4a65ec61f224992fd11263b7749c7ee63dd4fc13cc5dfdde8a3099aaf21ece351c316d9bbd7e4ecc524c856f20d6a1818d6d75f702eb904653f9d55af", @ANYRESOCT], 0x1, 0x513, &(0x7f0000000c40)="$eJzs3W9rJHcdAPDvTLJp7i41WxU5C7bFVu6K3m7S2DaKtBVEHxXU+jzGZBNCNtmQ3dRLKJriCxBEVPAF+ETwBQjSlyDCgT4XFUX0Th/qjczuRPNnN1mSTfbcfD4w2d9v/n2/vyE7O39+zARwbb0QEW9FxFhEvBwR08X4tBgW8sp+Z75HD99byocksuydvyWRFOMO1pXXxyPiVmeRmIyIr38l4lvJybjN3b31xXq9tl3Uq62NrWpzd+/e2sbiam21tjk3N/va/Ovzr87PZIULtbMcEW986U8/+v7PvvzGrz7z7d8v/OXud/K0vvCxTt4RsXShAD101l1qb4sD+TbavoxgQ5K3pzQ27CwAAOhHfoz/4Yj4ZPv4fzrG2kdzAAAAwCjJ3pyKfyURGQAAADCy0oiYiiStFH0BpiJNK5VOH96Pxs203mi2Pr3S2NlczqdFlKOUrqzVazNFX+FylJK8Plv0sT2ov3KsPhcRz0TED6dvtOuVpUZ9edgXPwAAAOCauPX80fP/f06n7TIAAAAwYso9KwAAAMCocMoPAAAAo8/5PwAAAIy0r779dj5kB+/xXn53d2e98e695VpzvbKxs1RZamxvVVYbjdX2M/s2zlpfvdHY+mxs7tyvtmrNVrW5u7ew0djZbC2sHXkFNgAAAHCFnnn+g98lEbH/+RvtIYrnAAIc8cdhJwAM0tiwEwCGZnzYCQBDUzpzDnsIGHXJGdNPdt7pXCuMX19OPgAAwODd+fjJ+/8TxbSzrw0A/8/09QGA68fdPbi+SuftAXh70JkAw/KhzsdTvab3fHhHH/f/O9cYsuxciQEAAAMz1R6StFIcp09FmlYqEU+3XwtQSlbW6rWZ4vzgt9Olp/L6bHvJ5Mw+wwAAAAAAAAAAAAAAAAAAAAAAAABAR5YlkQEAAAAjLSL9c9J+mn/EnemXpo5eHTj21q+fvvPj+4ut1vZsxETy9+l81EREtH5SjH8l80oAAAAAeAJ0ztOLz9lhZwMAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAADAqHn08L2lg+Eq4/71ixFR7hZ/PCbbn5NRioib/0hi/NBySUSMDSD+/vsRcbtb/CQeZ1lWLrLoFv/GJccvtzdN9/hpRNwaQHy4zj7I9z9vdfv+pfFC+7P792+8GC6q9/4v/e/+b6zH/ufpY/Venn3wi2rP+O9HPDveff9zED/pxD8SIq+82Gcbv/mNvb2uEw6tslv8w7GqrY2tanN3797axuJqbbW2OTc3+9r86/Ovzs9UV9bqteJv1zA/+MQvH5/W/ps94pePtv/E9n+pr9Zn8e8H9x9+pFMpdYt/98Xuv7+3e8RPi9++TxXlfPqdg/J+p3zYcz//zXOntX+5R/snz2j/3b7aH597+Wvf+0PXKSe2BgBwFZq7e+uL9Xpt+5TCZB/zXHHhzScjjQEW4slIY1iF7Lud/8eLreeCi58oZBdZfDwGkMbEie/pWJx3hUnEfr6uPv8hAQCAEfO/g/7T7iABAAAAAAAAAAAAAAAAAAAAl+mcjyWbjIi+Zz4ec384TQUAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAONV/AgAA//8FStFZ") (fail_nth: 20) 20:41:09 executing program 0: r0 = openat$nci(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) close_range(r0, 0xffffffffffffffff, 0xd60a) 20:41:09 executing program 1: ioctl$BTRFS_IOC_LOGICAL_INO(0xffffffffffffffff, 0xc0389424, &(0x7f0000000180)={0x1, 0x0, '\x00', 0x1, 0x0}) r0 = socket$inet6(0xa, 0x3, 0x6) r1 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) r2 = dup2(r1, r0) ioctl$FIDEDUPERANGE(r0, 0xc0189436, &(0x7f0000000f00)=ANY=[@ANYBLOB="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"]) ioctl$TIOCSBRK(r2, 0x5427) recvfrom$inet6(0xffffffffffffffff, &(0x7f0000000280)=""/134, 0x86, 0x40000102, &(0x7f0000000340)={0xa, 0x4e21, 0x77f, @mcast1, 0x403b3f}, 0x1c) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000001040)={{r2, 0xffffffffffffffff}, &(0x7f0000000140), &(0x7f0000000480)=r1}, 0x20) syz_read_part_table(0x593, &(0x7f00000005c0)="$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") r4 = creat(&(0x7f0000000240)='./file0\x00', 0x0) stat(&(0x7f0000000040)='./file1\x00', &(0x7f0000000380)) fsetxattr$security_capability(r4, &(0x7f0000000100), &(0x7f0000000000)=@v1={0x1000000, [{0x80000000, 0x81}]}, 0xc, 0x0) newfstatat(0xffffffffffffff9c, &(0x7f00000000c0)='./file1\x00', &(0x7f0000001400), 0x400) close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x2) ioctl$TIOCSTI(r4, 0x5412, &(0x7f00000004c0)=0x40) fsync(0xffffffffffffffff) write$binfmt_misc(r4, &(0x7f0000001080)=ANY=[@ANYBLOB="7379d3c6"], 0x4) fallocate(r4, 0x100000011, 0x0, 0x2811fdff) open(&(0x7f0000000100)='.\x00', 0x20c2, 0x2d) open$dir(&(0x7f0000000500)='./file1\x00', 0x1c6c0, 0x0) r5 = openat$vcsu(0xffffffffffffff9c, &(0x7f0000000cc0), 0x400c00, 0x0) lsetxattr$security_selinux(&(0x7f0000001180)='./file1\x00', &(0x7f00000011c0), &(0x7f0000001300)='system_u:object_r:unconfined_exec_t:s0\x00', 0x27, 0x3) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000400)={0xffffffffffffffff, 0xe0, &(0x7f0000000300)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, &(0x7f00000000c0)=[0x0], &(0x7f0000000140), 0x0, 0x8, &(0x7f0000000200)=[{}, {}, {}, {}, {}], 0x28, 0x0, 0x0, 0x0, 0x0, 0x10, 0x8, 0x8, &(0x7f00000002c0)}}, 0x10) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000e80)=@bpf_lsm={0x1d, 0x4, &(0x7f0000000040)=@framed={{0x18, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x73fc}, [@generic={0x9, 0x8, 0x0, 0x7f, 0x200}]}, &(0x7f0000000880)='GPL\x00', 0x1f, 0x93, &(0x7f0000000cc0)=""/147, 0x40f00, 0x2, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, &(0x7f0000000b80)={0x9}, 0x8, 0x10, 0x0, 0x0, r6}, 0x80) r7 = socket$nl_generic(0x10, 0x3, 0x10) r8 = syz_genetlink_get_family_id$tipc(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$TIPC_CMD_ENABLE_BEARER(r7, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000001200)=ANY=[@ANYBLOB="3400000006c08fada241ee0a049e6fba3f36f40da839bbdf54c31768b0026f4261f56d51c5d81ba4cb99f8203c40d0a142fcd75ce26e408d229139f8c4e81109c56a18e453e8a537df21c4ec04a4f3e22f4ac125a28ad43e41107b1f7e79c8573985e54fd665e2913ca74da8c9f3fc2839258c19fa7ac20ebead31206cf280ea73f635bc5418b66554392dfd11874fef72bc53538aae3cb5ef8a80140f4737dd2c572a03ee1d5e3d627e", @ANYRESOCT=0x0, @ANYBLOB="010000000000000000000100000000000000014100000018001700000000000000007564503a73"], 0x34}, 0x1, 0x0, 0x0, 0x1}, 0x0) ioctl$AUTOFS_DEV_IOCTL_PROTOSUBVER(r1, 0xc0189373, &(0x7f0000000540)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x6}}, './file0\x00'}) sendmsg$TIPC_CMD_GET_MAX_PORTS(r5, &(0x7f0000001140)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x40000}, 0xc, &(0x7f0000001100)={&(0x7f00000010c0)={0x1c, r8, 0x400, 0x8000, 0x25dfdbfe, {}, ["", "", "", "", "", "", ""]}, 0x1c}, 0x1, 0x0, 0x0, 0x20048854}, 0x4004) bpf$PROG_LOAD(0x5, &(0x7f0000000e40)={0x5, 0x16, &(0x7f0000001340)=ANY=[@ANYBLOB="390000000100000000000000900000f117fa0000", @ANYRES32=r4, @ANYBLOB="1f00000000000000b703000000000000850000000c000000b61b0453c29f42b5be06c7010b4efffe000000000085000000a900000018150000", @ANYRES32=r3, @ANYBLOB="0000000000000000180100002020782500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b70300000000850000005d000000185500000100000000000000000000009500000000000000"], &(0x7f0000000b80)='syzkaller\x00', 0x1, 0xe8, &(0x7f0000000bc0)=""/232, 0x41000, 0x5b, '\x00', 0x0, 0xe, r5, 0x8, &(0x7f0000000d00)={0x5, 0x2}, 0x8, 0x10, &(0x7f0000000d40)={0x4, 0xe, 0x2, 0x8}, 0x10, r6, r4, 0x5, &(0x7f0000000d80), &(0x7f0000000dc0)=[{0x4, 0x3, 0x0, 0x2}, {0x3, 0x1, 0xa, 0xa}, {0x0, 0x3, 0x2, 0xa}, {0x0, 0x3, 0x7, 0x1}, {0x1, 0x5, 0xb, 0xc}], 0x10, 0x7}, 0x90) [ 121.175412][ T2775] loop1: p2 p3 p7 20:41:09 executing program 4: r0 = perf_event_open(&(0x7f0000000a40)={0x2, 0x80, 0xcd, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @perf_bp={&(0x7f0000000200), 0x8}, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfb75}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000040)={0x0, 0x4, 0x0, &(0x7f0000000180)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x80) perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x208, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x4, 0x8001}, 0x4000, 0x0, 0x0, 0x0, 0x0, 0x14e, 0xd1}, 0x0, 0xbfffffffffffffff, r0, 0x19893a9f0a0e2244) r1 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) syz_clone(0x2000000, 0x0, 0x0, 0x0, 0x0, 0x0) r2 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x18, 0x5, &(0x7f00000002c0)=ANY=[@ANYBLOB="180000001800ff0f0000000000000000850000006d000000750000000800000095"], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x80) r3 = perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400, 0x80000, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x7, 0x1007}, 0x8006, 0x0, 0x0, 0x1, 0x4, 0x800000, 0x3}, 0x0, 0xffefffffffffffff, 0xffffffffffffffff, 0x9) ioctl$PERF_EVENT_IOC_SET_FILTER(r3, 0x40082406, &(0x7f00000003c0)='memory.numa_stat\x00') perf_event_open(0x0, 0x0, 0x0, r3, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000080)='sched_switch\x00', r2}, 0x10) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000380)={{0x1, 0xffffffffffffffff}, &(0x7f0000000000), &(0x7f0000000240)=r2}, 0x20) r5 = memfd_secret(0x0) syz_io_uring_setup(0x0, &(0x7f0000000300)={0x0, 0x2, 0x0, 0x0, 0x0, 0x0, r5}, 0x0, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f00000009c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000000a00)=0x14) r7 = openat2(0xffffffffffffff9c, &(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)={0x40841}, 0x18) write$binfmt_script(r7, &(0x7f0000000340)=ANY=[], 0xfffffdef) r8 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000b40)={0x1b, 0x0, 0x0, 0x7, 0x0, 0xffffffffffffffff, 0x200, '\x00', 0x0, 0xffffffffffffffff, 0x3, 0x1, 0x4}, 0x48) r9 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000bc0)={0x2, 0x4, 0x8, 0x1, 0x80, 0x1, 0x9, '\x00', 0x0, 0xffffffffffffffff, 0x4, 0x1, 0x4}, 0x48) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000d00)={0x11, 0x12, &(0x7f0000000440)=@raw=[@exit, @ringbuf_query={{0x18, 0x1, 0x1, 0x0, r4}}, @ringbuf_output={{0x18, 0x1, 0x1, 0x0, r5}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x10001}, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x4, 0x0, 0x0, 0x2}}, @exit, @initr0={0x18, 0x0, 0x0, 0x0, 0x6349, 0x0, 0x0, 0x0, 0xf685}, @ldst={0x3, 0x2, 0x1, 0x0, 0xb, 0x2543a83bb932833c, 0x1}], &(0x7f0000000940)='syzkaller\x00', 0x80000001, 0x27, &(0x7f0000000980)=""/39, 0x41000, 0x40, '\x00', r6, 0x0, r7, 0x8, &(0x7f0000000ac0)={0x3, 0x1}, 0x8, 0x10, &(0x7f0000000b00)={0x2, 0xc, 0xfffffe00, 0x2}, 0x10, 0x0, 0x0, 0x5, &(0x7f0000000c40)=[r2, 0x1, 0x1, r8, r9, r1], &(0x7f0000000c80)=[{0x4, 0x1, 0x8, 0xc}, {0x0, 0x4, 0xf, 0x4}, {0x1, 0x2, 0xd, 0x6}, {0x0, 0x4, 0x10, 0xc}, {0x2, 0x4, 0xd, 0x1}], 0x10, 0x20}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000280)={&(0x7f0000000140)='ext4_ext_show_extent\x00', r2}, 0x10) r10 = perf_event_open(&(0x7f0000000080)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) perf_event_open$cgroup(&(0x7f0000000300)={0x5, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_bp={&(0x7f0000000100)}, 0x81252, 0x6, 0x80000001, 0x0, 0x0, 0x0, 0x6, 0x0, 0x6, 0x0, 0x6}, 0xffffffffffffffff, 0xe, 0xffffffffffffffff, 0xc) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000780)={0x14, 0x4, &(0x7f00000008c0)=ANY=[@ANYBLOB="850000006b00000018150000a3df7ddd9621fb0201050062d91123e632b2f902ad1e9f1cc7a66ed51ac8a4070000000000000019a83f0b7c9502871fb1ca3dc499e804bbbc359859ed6fd9f104fc7ed900d122072d8275a24d000000000601c3a63953a7b36fe458", @ANYRES32, @ANYBLOB="00000000000000002d59e4eda4000000"], &(0x7f0000000400)='syzkaller\x00', 0xfff, 0xe3, &(0x7f0000000580)=""/227, 0x0, 0x4, '\x00', 0x0, 0x24, 0xffffffffffffffff, 0x8, &(0x7f0000000500)={0x1, 0x3}, 0x8, 0x10, &(0x7f0000000680)={0x5, 0x6, 0x81, 0x9}, 0x10, 0xffffffffffffffff, 0xffffffffffffffff, 0x0, &(0x7f00000006c0)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, r10]}, 0x80) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x4030582a, &(0x7f0000000040)=0x91) 20:41:09 executing program 2: r0 = perf_event_open(&(0x7f0000000a40)={0x2, 0x80, 0xcd, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @perf_bp={&(0x7f0000000200), 0x8}, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfb75}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000040)={0x0, 0x4, 0x0, &(0x7f0000000180)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x80) perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x208, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x4, 0x8001}, 0x4000, 0x0, 0x0, 0x0, 0x0, 0x14e, 0xd1}, 0x0, 0xbfffffffffffffff, r0, 0x19893a9f0a0e2244) r1 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) syz_clone(0x2000000, 0x0, 0x0, 0x0, 0x0, 0x0) r2 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x18, 0x5, &(0x7f00000002c0)=ANY=[@ANYBLOB="180000001800ff0f0000000000000000850000006d000000750000000800000095"], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x80) r3 = perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400, 0x80000, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x7, 0x1007}, 0x8006, 0x0, 0x0, 0x1, 0x4, 0x800000, 0x3}, 0x0, 0xffefffffffffffff, 0xffffffffffffffff, 0x9) ioctl$PERF_EVENT_IOC_SET_FILTER(r3, 0x40082406, &(0x7f00000003c0)='memory.numa_stat\x00') perf_event_open(0x0, 0x0, 0x0, r3, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000080)='sched_switch\x00', r2}, 0x10) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000380)={{0x1, 0xffffffffffffffff}, &(0x7f0000000000), &(0x7f0000000240)=r2}, 0x20) r5 = memfd_secret(0x0) syz_io_uring_setup(0x0, &(0x7f0000000300)={0x0, 0x2, 0x0, 0x0, 0x0, 0x0, r5}, 0x0, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f00000009c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000000a00)=0x14) write$binfmt_script(0xffffffffffffffff, &(0x7f0000000340)=ANY=[], 0xfffffdef) r7 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000bc0)={0x2, 0x4, 0x8, 0x1, 0x80, 0x1, 0x9, '\x00', 0x0, 0xffffffffffffffff, 0x4, 0x1, 0x4}, 0x48) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000d00)={0x11, 0x12, &(0x7f0000000440)=@raw=[@exit, @ringbuf_query={{0x18, 0x1, 0x1, 0x0, r4}}, @ringbuf_output={{0x18, 0x1, 0x1, 0x0, r5}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x10001}, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x4, 0x0, 0x0, 0x2}}, @exit, @initr0={0x18, 0x0, 0x0, 0x0, 0x6349, 0x0, 0x0, 0x0, 0xf685}, @ldst={0x3, 0x2, 0x1, 0x0, 0xb, 0x2543a83bb932833c, 0x1}], &(0x7f0000000940)='syzkaller\x00', 0x80000001, 0x27, &(0x7f0000000980)=""/39, 0x41000, 0x40, '\x00', r6, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000ac0)={0x3, 0x1}, 0x8, 0x10, &(0x7f0000000b00)={0x2, 0xc, 0xfffffe00, 0x2}, 0x10, 0x0, 0x0, 0x5, &(0x7f0000000c40)=[r2, 0x1, 0x1, 0xffffffffffffffff, r7, r1], &(0x7f0000000c80)=[{0x4, 0x1, 0x8, 0xc}, {0x0, 0x4, 0xf, 0x4}, {0x1, 0x2, 0xd, 0x6}, {0x0, 0x4, 0x10, 0xc}, {0x2, 0x4, 0xd, 0x1}], 0x10, 0x20}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000280)={&(0x7f0000000140)='ext4_ext_show_extent\x00', r2}, 0x10) r8 = perf_event_open(&(0x7f0000000080)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) r9 = gettid() perf_event_open$cgroup(&(0x7f0000000300)={0x5, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_bp={&(0x7f0000000100)}, 0x81252, 0x6, 0x80000001, 0x0, 0x0, 0x0, 0x6, 0x0, 0x6, 0x0, 0x6}, 0xffffffffffffffff, 0xe, 0xffffffffffffffff, 0xc) perf_event_open(0x0, r9, 0x2, 0xffffffffffffffff, 0xb) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) perf_event_open(&(0x7f0000000840)={0x2, 0x80, 0x0, 0x7, 0x0, 0x80, 0x0, 0x3, 0x0, 0x9, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, @perf_config_ext={0x8000000000, 0x3}, 0x46c73247dfbe0d, 0x1007e, 0x0, 0x2, 0x0, 0x0, 0x6, 0x0, 0xffffffff, 0x0, 0x1c}, 0x0, 0x9, 0xffffffffffffffff, 0xd) bpf$PROG_LOAD(0x5, &(0x7f0000000780)={0x14, 0x4, &(0x7f00000008c0)=ANY=[@ANYBLOB="850000006b00000018150000a3df7ddd9621fb0201050062d91123e632b2f902ad1e9f1cc7a66ed51ac8a4070000000000000019a83f0b7c9502871fb1ca3dc499e804bbbc359859ed6fd9f104fc7ed900d122072d8275a24d000000000601c3a63953a7b36fe458", @ANYRES32, @ANYBLOB="00000000000000002d59e4eda4000000"], &(0x7f0000000400)='syzkaller\x00', 0xfff, 0xe3, &(0x7f0000000580)=""/227, 0x0, 0x4, '\x00', 0x0, 0x24, 0xffffffffffffffff, 0x8, &(0x7f0000000500)={0x1, 0x3}, 0x8, 0x10, &(0x7f0000000680)={0x5, 0x6, 0x81, 0x9}, 0x10, 0xffffffffffffffff, 0xffffffffffffffff, 0x0, &(0x7f00000006c0)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, r8]}, 0x80) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x4030582a, &(0x7f0000000040)=0x91) 20:41:09 executing program 2: r0 = perf_event_open(&(0x7f0000000a40)={0x2, 0x80, 0xcd, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @perf_bp={&(0x7f0000000200), 0x8}, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfb75}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000040)={0x0, 0x4, 0x0, &(0x7f0000000180)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x80) perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x208, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x4, 0x8001}, 0x4000, 0x0, 0x0, 0x0, 0x0, 0x14e, 0xd1}, 0x0, 0xbfffffffffffffff, r0, 0x19893a9f0a0e2244) r1 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) syz_clone(0x2000000, 0x0, 0x0, 0x0, 0x0, 0x0) r2 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x18, 0x5, &(0x7f00000002c0)=ANY=[@ANYBLOB="180000001800ff0f0000000000000000850000006d000000750000000800000095"], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x80) r3 = perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400, 0x80000, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x7, 0x1007}, 0x8006, 0x0, 0x0, 0x1, 0x4, 0x800000, 0x3}, 0x0, 0xffefffffffffffff, 0xffffffffffffffff, 0x9) ioctl$PERF_EVENT_IOC_SET_FILTER(r3, 0x40082406, &(0x7f00000003c0)='memory.numa_stat\x00') perf_event_open(0x0, 0x0, 0x0, r3, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000080)='sched_switch\x00', r2}, 0x10) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000380)={{0x1, 0xffffffffffffffff}, &(0x7f0000000000), &(0x7f0000000240)=r2}, 0x20) r5 = memfd_secret(0x0) syz_io_uring_setup(0x0, &(0x7f0000000300)={0x0, 0x2, 0x0, 0x0, 0x0, 0x0, r5}, 0x0, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f00000009c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000000a00)=0x14) write$binfmt_script(0xffffffffffffffff, &(0x7f0000000340)=ANY=[], 0xfffffdef) r7 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000bc0)={0x2, 0x4, 0x8, 0x1, 0x80, 0x1, 0x9, '\x00', 0x0, 0xffffffffffffffff, 0x4, 0x1, 0x4}, 0x48) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000d00)={0x11, 0x12, &(0x7f0000000440)=@raw=[@exit, @ringbuf_query={{0x18, 0x1, 0x1, 0x0, r4}}, @ringbuf_output={{0x18, 0x1, 0x1, 0x0, r5}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x10001}, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x4, 0x0, 0x0, 0x2}}, @exit, @initr0={0x18, 0x0, 0x0, 0x0, 0x6349, 0x0, 0x0, 0x0, 0xf685}, @ldst={0x3, 0x2, 0x1, 0x0, 0xb, 0x2543a83bb932833c, 0x1}], &(0x7f0000000940)='syzkaller\x00', 0x80000001, 0x27, &(0x7f0000000980)=""/39, 0x41000, 0x40, '\x00', r6, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000ac0)={0x3, 0x1}, 0x8, 0x10, &(0x7f0000000b00)={0x2, 0xc, 0xfffffe00, 0x2}, 0x10, 0x0, 0x0, 0x5, &(0x7f0000000c40)=[r2, 0x1, 0x1, 0xffffffffffffffff, r7, r1], &(0x7f0000000c80)=[{0x4, 0x1, 0x8, 0xc}, {0x0, 0x4, 0xf, 0x4}, {0x1, 0x2, 0xd, 0x6}, {0x0, 0x4, 0x10, 0xc}, {0x2, 0x4, 0xd, 0x1}], 0x10, 0x20}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000280)={&(0x7f0000000140)='ext4_ext_show_extent\x00', r2}, 0x10) r8 = perf_event_open(&(0x7f0000000080)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) r9 = gettid() perf_event_open$cgroup(&(0x7f0000000300)={0x5, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_bp={&(0x7f0000000100)}, 0x81252, 0x6, 0x80000001, 0x0, 0x0, 0x0, 0x6, 0x0, 0x6, 0x0, 0x6}, 0xffffffffffffffff, 0xe, 0xffffffffffffffff, 0xc) perf_event_open(0x0, r9, 0x2, 0xffffffffffffffff, 0xb) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) perf_event_open(&(0x7f0000000840)={0x2, 0x80, 0x0, 0x7, 0x0, 0x80, 0x0, 0x3, 0x0, 0x9, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, @perf_config_ext={0x8000000000, 0x3}, 0x46c73247dfbe0d, 0x1007e, 0x0, 0x2, 0x0, 0x0, 0x6, 0x0, 0xffffffff, 0x0, 0x1c}, 0x0, 0x9, 0xffffffffffffffff, 0xd) bpf$PROG_LOAD(0x5, &(0x7f0000000780)={0x14, 0x4, &(0x7f00000008c0)=ANY=[@ANYBLOB="850000006b00000018150000a3df7ddd9621fb0201050062d91123e632b2f902ad1e9f1cc7a66ed51ac8a4070000000000000019a83f0b7c9502871fb1ca3dc499e804bbbc359859ed6fd9f104fc7ed900d122072d8275a24d000000000601c3a63953a7b36fe458", @ANYRES32, @ANYBLOB="00000000000000002d59e4eda4000000"], &(0x7f0000000400)='syzkaller\x00', 0xfff, 0xe3, &(0x7f0000000580)=""/227, 0x0, 0x4, '\x00', 0x0, 0x24, 0xffffffffffffffff, 0x8, &(0x7f0000000500)={0x1, 0x3}, 0x8, 0x10, &(0x7f0000000680)={0x5, 0x6, 0x81, 0x9}, 0x10, 0xffffffffffffffff, 0xffffffffffffffff, 0x0, &(0x7f00000006c0)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, r8]}, 0x80) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x4030582a, &(0x7f0000000040)=0x91) [ 121.235517][ T6231] loop1: detected capacity change from 0 to 2048 20:41:09 executing program 1: ioctl$BTRFS_IOC_LOGICAL_INO(0xffffffffffffffff, 0xc0389424, &(0x7f0000000180)={0x1, 0x0, '\x00', 0x1, 0x0}) r0 = socket$inet6(0xa, 0x3, 0x6) r1 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) r2 = dup2(r1, r0) ioctl$FIDEDUPERANGE(r0, 0xc0189436, &(0x7f0000000f00)=ANY=[@ANYBLOB="08000000000000000000000000000000000000002000000032057e68d5d647f4ed243c9d097db4c7bae602f8d4c84b5325f3d737af1c3ebe2901b056ac84d04eb9d8bfd4771499d444ff07000033206062c9a0527d2d0e4b0000fa0693ec3785977184911bffc60554e8950e91e1a8209818b4eb3440ae351192e1d7cf54ba6743f2db330481aac17f0961506d7ebd7ca999cf4e148c1ef2880f63693dfee2a6f2fafec2c059fd15db654600000000000000000076da8ec51705470a42729df6a32122af2a673d7409ca1b8a0da065e2bf7790c86a6b3014e1ef5d1c4000d3dff081d5a4c403971fe8869ab4973ffc7b24b6fbb4341ac1a0f5d56b64b9d23d6855e653f1e0418a6d9838196a7b145310a9b4c467199ecc3bd47b85aae47754bf695bdb85ea03f70beab5732a014c5f525bf2f9b9c6bd545e1a"]) ioctl$TIOCSBRK(r2, 0x5427) recvfrom$inet6(0xffffffffffffffff, &(0x7f0000000280)=""/134, 0x86, 0x40000102, &(0x7f0000000340)={0xa, 0x4e21, 0x77f, @mcast1, 0x403b3f}, 0x1c) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000001040)={{r2, 0xffffffffffffffff}, &(0x7f0000000140), &(0x7f0000000480)=r1}, 0x20) syz_read_part_table(0x593, &(0x7f00000005c0)="$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") r4 = creat(&(0x7f0000000240)='./file0\x00', 0x0) stat(&(0x7f0000000040)='./file1\x00', &(0x7f0000000380)) fsetxattr$security_capability(r4, &(0x7f0000000100), &(0x7f0000000000)=@v1={0x1000000, [{0x80000000, 0x81}]}, 0xc, 0x0) newfstatat(0xffffffffffffff9c, &(0x7f00000000c0)='./file1\x00', &(0x7f0000001400), 0x400) close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x2) ioctl$TIOCSTI(r4, 0x5412, &(0x7f00000004c0)=0x40) fsync(0xffffffffffffffff) write$binfmt_misc(r4, &(0x7f0000001080)=ANY=[@ANYBLOB="7379d3c6"], 0x4) fallocate(r4, 0x100000011, 0x0, 0x2811fdff) open(&(0x7f0000000100)='.\x00', 0x20c2, 0x2d) open$dir(&(0x7f0000000500)='./file1\x00', 0x1c6c0, 0x0) r5 = openat$vcsu(0xffffffffffffff9c, &(0x7f0000000cc0), 0x400c00, 0x0) lsetxattr$security_selinux(&(0x7f0000001180)='./file1\x00', &(0x7f00000011c0), &(0x7f0000001300)='system_u:object_r:unconfined_exec_t:s0\x00', 0x27, 0x3) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000400)={0xffffffffffffffff, 0xe0, &(0x7f0000000300)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, &(0x7f00000000c0)=[0x0], &(0x7f0000000140), 0x0, 0x8, &(0x7f0000000200)=[{}, {}, {}, {}, {}], 0x28, 0x0, 0x0, 0x0, 0x0, 0x10, 0x8, 0x8, &(0x7f00000002c0)}}, 0x10) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000e80)=@bpf_lsm={0x1d, 0x4, &(0x7f0000000040)=@framed={{0x18, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x73fc}, [@generic={0x9, 0x8, 0x0, 0x7f, 0x200}]}, &(0x7f0000000880)='GPL\x00', 0x1f, 0x93, &(0x7f0000000cc0)=""/147, 0x40f00, 0x2, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, &(0x7f0000000b80)={0x9}, 0x8, 0x10, 0x0, 0x0, r6}, 0x80) r7 = socket$nl_generic(0x10, 0x3, 0x10) r8 = syz_genetlink_get_family_id$tipc(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$TIPC_CMD_ENABLE_BEARER(r7, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000001200)=ANY=[@ANYBLOB="3400000006c08fada241ee0a049e6fba3f36f40da839bbdf54c31768b0026f4261f56d51c5d81ba4cb99f8203c40d0a142fcd75ce26e408d229139f8c4e81109c56a18e453e8a537df21c4ec04a4f3e22f4ac125a28ad43e41107b1f7e79c8573985e54fd665e2913ca74da8c9f3fc2839258c19fa7ac20ebead31206cf280ea73f635bc5418b66554392dfd11874fef72bc53538aae3cb5ef8a80140f4737dd2c572a03ee1d5e3d627e", @ANYRESOCT=0x0, @ANYBLOB="010000000000000000000100000000000000014100000018001700000000000000007564503a73"], 0x34}, 0x1, 0x0, 0x0, 0x1}, 0x0) ioctl$AUTOFS_DEV_IOCTL_PROTOSUBVER(r1, 0xc0189373, &(0x7f0000000540)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x6}}, './file0\x00'}) sendmsg$TIPC_CMD_GET_MAX_PORTS(r5, &(0x7f0000001140)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x40000}, 0xc, &(0x7f0000001100)={&(0x7f00000010c0)={0x1c, r8, 0x400, 0x8000, 0x25dfdbfe, {}, ["", "", "", "", "", "", ""]}, 0x1c}, 0x1, 0x0, 0x0, 0x20048854}, 0x4004) bpf$PROG_LOAD(0x5, &(0x7f0000000e40)={0x5, 0x16, &(0x7f0000001340)=ANY=[@ANYBLOB="390000000100000000000000900000f117fa0000", @ANYRES32=r4, @ANYBLOB="1f00000000000000b703000000000000850000000c000000b61b0453c29f42b5be06c7010b4efffe000000000085000000a900000018150000", @ANYRES32=r3, @ANYBLOB="0000000000000000180100002020782500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b70300000000850000005d000000185500000100000000000000000000009500000000000000"], &(0x7f0000000b80)='syzkaller\x00', 0x1, 0xe8, &(0x7f0000000bc0)=""/232, 0x41000, 0x5b, '\x00', 0x0, 0xe, r5, 0x8, &(0x7f0000000d00)={0x5, 0x2}, 0x8, 0x10, &(0x7f0000000d40)={0x4, 0xe, 0x2, 0x8}, 0x10, r6, r4, 0x5, &(0x7f0000000d80), &(0x7f0000000dc0)=[{0x4, 0x3, 0x0, 0x2}, {0x3, 0x1, 0xa, 0xa}, {0x0, 0x3, 0x2, 0xa}, {0x0, 0x3, 0x7, 0x1}, {0x1, 0x5, 0xb, 0xc}], 0x10, 0x7}, 0x90) 20:41:09 executing program 2: r0 = perf_event_open(&(0x7f0000000a40)={0x2, 0x80, 0xcd, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @perf_bp={&(0x7f0000000200), 0x8}, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfb75}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000040)={0x0, 0x4, 0x0, &(0x7f0000000180)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x80) perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x208, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x4, 0x8001}, 0x4000, 0x0, 0x0, 0x0, 0x0, 0x14e, 0xd1}, 0x0, 0xbfffffffffffffff, r0, 0x19893a9f0a0e2244) r1 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) syz_clone(0x2000000, 0x0, 0x0, 0x0, 0x0, 0x0) r2 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x18, 0x5, &(0x7f00000002c0)=ANY=[@ANYBLOB="180000001800ff0f0000000000000000850000006d000000750000000800000095"], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x80) r3 = perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400, 0x80000, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x7, 0x1007}, 0x8006, 0x0, 0x0, 0x1, 0x4, 0x800000, 0x3}, 0x0, 0xffefffffffffffff, 0xffffffffffffffff, 0x9) ioctl$PERF_EVENT_IOC_SET_FILTER(r3, 0x40082406, &(0x7f00000003c0)='memory.numa_stat\x00') perf_event_open(0x0, 0x0, 0x0, r3, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000080)='sched_switch\x00', r2}, 0x10) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000380)={{0x1, 0xffffffffffffffff}, &(0x7f0000000000), &(0x7f0000000240)=r2}, 0x20) r5 = memfd_secret(0x0) syz_io_uring_setup(0x0, &(0x7f0000000300)={0x0, 0x2, 0x0, 0x0, 0x0, 0x0, r5}, 0x0, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f00000009c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000000a00)=0x14) write$binfmt_script(0xffffffffffffffff, &(0x7f0000000340)=ANY=[], 0xfffffdef) r7 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000bc0)={0x2, 0x4, 0x8, 0x1, 0x80, 0x1, 0x9, '\x00', 0x0, 0xffffffffffffffff, 0x4, 0x1, 0x4}, 0x48) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000d00)={0x11, 0x12, &(0x7f0000000440)=@raw=[@exit, @ringbuf_query={{0x18, 0x1, 0x1, 0x0, r4}}, @ringbuf_output={{0x18, 0x1, 0x1, 0x0, r5}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x10001}, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x4, 0x0, 0x0, 0x2}}, @exit, @initr0={0x18, 0x0, 0x0, 0x0, 0x6349, 0x0, 0x0, 0x0, 0xf685}, @ldst={0x3, 0x2, 0x1, 0x0, 0xb, 0x2543a83bb932833c, 0x1}], &(0x7f0000000940)='syzkaller\x00', 0x80000001, 0x27, &(0x7f0000000980)=""/39, 0x41000, 0x40, '\x00', r6, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000ac0)={0x3, 0x1}, 0x8, 0x10, &(0x7f0000000b00)={0x2, 0xc, 0xfffffe00, 0x2}, 0x10, 0x0, 0x0, 0x5, &(0x7f0000000c40)=[r2, 0x1, 0x1, 0xffffffffffffffff, r7, r1], &(0x7f0000000c80)=[{0x4, 0x1, 0x8, 0xc}, {0x0, 0x4, 0xf, 0x4}, {0x1, 0x2, 0xd, 0x6}, {0x0, 0x4, 0x10, 0xc}, {0x2, 0x4, 0xd, 0x1}], 0x10, 0x20}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000280)={&(0x7f0000000140)='ext4_ext_show_extent\x00', r2}, 0x10) r8 = perf_event_open(&(0x7f0000000080)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) r9 = gettid() perf_event_open$cgroup(&(0x7f0000000300)={0x5, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_bp={&(0x7f0000000100)}, 0x81252, 0x6, 0x80000001, 0x0, 0x0, 0x0, 0x6, 0x0, 0x6, 0x0, 0x6}, 0xffffffffffffffff, 0xe, 0xffffffffffffffff, 0xc) perf_event_open(0x0, r9, 0x2, 0xffffffffffffffff, 0xb) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) perf_event_open(&(0x7f0000000840)={0x2, 0x80, 0x0, 0x7, 0x0, 0x80, 0x0, 0x3, 0x0, 0x9, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, @perf_config_ext={0x8000000000, 0x3}, 0x46c73247dfbe0d, 0x1007e, 0x0, 0x2, 0x0, 0x0, 0x6, 0x0, 0xffffffff, 0x0, 0x1c}, 0x0, 0x9, 0xffffffffffffffff, 0xd) bpf$PROG_LOAD(0x5, &(0x7f0000000780)={0x14, 0x4, &(0x7f00000008c0)=ANY=[@ANYBLOB="850000006b00000018150000a3df7ddd9621fb0201050062d91123e632b2f902ad1e9f1cc7a66ed51ac8a4070000000000000019a83f0b7c9502871fb1ca3dc499e804bbbc359859ed6fd9f104fc7ed900d122072d8275a24d000000000601c3a63953a7b36fe458", @ANYRES32, @ANYBLOB="00000000000000002d59e4eda4000000"], &(0x7f0000000400)='syzkaller\x00', 0xfff, 0xe3, &(0x7f0000000580)=""/227, 0x0, 0x4, '\x00', 0x0, 0x24, 0xffffffffffffffff, 0x8, &(0x7f0000000500)={0x1, 0x3}, 0x8, 0x10, &(0x7f0000000680)={0x5, 0x6, 0x81, 0x9}, 0x10, 0xffffffffffffffff, 0xffffffffffffffff, 0x0, &(0x7f00000006c0)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, r8]}, 0x80) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x4030582a, &(0x7f0000000040)=0x91) [ 121.311363][ T6231] loop1: p2 p3 p7 [ 121.352655][ T2775] loop1: p2 p3 p7 [ 121.363802][ T26] netdevsim netdevsim0 netdevsim3 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 20:41:09 executing program 2: r0 = perf_event_open(&(0x7f0000000a40)={0x2, 0x80, 0xcd, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @perf_bp={&(0x7f0000000200), 0x8}, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfb75}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000040)={0x0, 0x4, 0x0, &(0x7f0000000180)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x80) perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x208, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x4, 0x8001}, 0x4000, 0x0, 0x0, 0x0, 0x0, 0x14e, 0xd1}, 0x0, 0xbfffffffffffffff, r0, 0x19893a9f0a0e2244) r1 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) syz_clone(0x2000000, 0x0, 0x0, 0x0, 0x0, 0x0) r2 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x18, 0x5, &(0x7f00000002c0)=ANY=[@ANYBLOB="180000001800ff0f0000000000000000850000006d000000750000000800000095"], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x80) r3 = perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400, 0x80000, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x7, 0x1007}, 0x8006, 0x0, 0x0, 0x1, 0x4, 0x800000, 0x3}, 0x0, 0xffefffffffffffff, 0xffffffffffffffff, 0x9) ioctl$PERF_EVENT_IOC_SET_FILTER(r3, 0x40082406, &(0x7f00000003c0)='memory.numa_stat\x00') perf_event_open(0x0, 0x0, 0x0, r3, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000080)='sched_switch\x00', r2}, 0x10) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000380)={{0x1, 0xffffffffffffffff}, &(0x7f0000000000), &(0x7f0000000240)=r2}, 0x20) r5 = memfd_secret(0x0) syz_io_uring_setup(0x0, &(0x7f0000000300)={0x0, 0x2, 0x0, 0x0, 0x0, 0x0, r5}, 0x0, 0x0) r6 = openat2(0xffffffffffffff9c, &(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)={0x40841}, 0x18) write$binfmt_script(r6, &(0x7f0000000340)=ANY=[], 0xfffffdef) r7 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000bc0)={0x2, 0x4, 0x8, 0x1, 0x80, 0x1, 0x9, '\x00', 0x0, 0xffffffffffffffff, 0x4, 0x1, 0x4}, 0x48) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000d00)={0x11, 0x12, &(0x7f0000000440)=@raw=[@exit, @ringbuf_query={{0x18, 0x1, 0x1, 0x0, r4}}, @ringbuf_output={{0x18, 0x1, 0x1, 0x0, r5}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x10001}, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x4, 0x0, 0x0, 0x2}}, @exit, @initr0={0x18, 0x0, 0x0, 0x0, 0x6349, 0x0, 0x0, 0x0, 0xf685}, @ldst={0x3, 0x2, 0x1, 0x0, 0xb, 0x2543a83bb932833c, 0x1}], &(0x7f0000000940)='syzkaller\x00', 0x80000001, 0x27, &(0x7f0000000980)=""/39, 0x41000, 0x40, '\x00', 0x0, 0x0, r6, 0x8, &(0x7f0000000ac0)={0x3, 0x1}, 0x8, 0x10, &(0x7f0000000b00)={0x2, 0xc, 0xfffffe00, 0x2}, 0x10, 0x0, 0x0, 0x5, &(0x7f0000000c40)=[r2, 0x1, 0x1, 0xffffffffffffffff, r7, r1], &(0x7f0000000c80)=[{0x4, 0x1, 0x8, 0xc}, {0x0, 0x4, 0xf, 0x4}, {0x1, 0x2, 0xd, 0x6}, {0x0, 0x4, 0x10, 0xc}, {0x2, 0x4, 0xd, 0x1}], 0x10, 0x20}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000280)={&(0x7f0000000140)='ext4_ext_show_extent\x00', r2}, 0x10) r8 = perf_event_open(&(0x7f0000000080)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) r9 = gettid() perf_event_open$cgroup(&(0x7f0000000300)={0x5, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_bp={&(0x7f0000000100)}, 0x81252, 0x6, 0x80000001, 0x0, 0x0, 0x0, 0x6, 0x0, 0x6, 0x0, 0x6}, 0xffffffffffffffff, 0xe, 0xffffffffffffffff, 0xc) perf_event_open(0x0, r9, 0x2, 0xffffffffffffffff, 0xb) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) perf_event_open(&(0x7f0000000840)={0x2, 0x80, 0x0, 0x7, 0x0, 0x80, 0x0, 0x3, 0x0, 0x9, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, @perf_config_ext={0x8000000000, 0x3}, 0x46c73247dfbe0d, 0x1007e, 0x0, 0x2, 0x0, 0x0, 0x6, 0x0, 0xffffffff, 0x0, 0x1c}, 0x0, 0x9, 0xffffffffffffffff, 0xd) bpf$PROG_LOAD(0x5, &(0x7f0000000780)={0x14, 0x4, &(0x7f00000008c0)=ANY=[@ANYBLOB="850000006b00000018150000a3df7ddd9621fb0201050062d91123e632b2f902ad1e9f1cc7a66ed51ac8a4070000000000000019a83f0b7c9502871fb1ca3dc499e804bbbc359859ed6fd9f104fc7ed900d122072d8275a24d000000000601c3a63953a7b36fe458", @ANYRES32, @ANYBLOB="00000000000000002d59e4eda4000000"], &(0x7f0000000400)='syzkaller\x00', 0xfff, 0xe3, &(0x7f0000000580)=""/227, 0x0, 0x4, '\x00', 0x0, 0x24, 0xffffffffffffffff, 0x8, &(0x7f0000000500)={0x1, 0x3}, 0x8, 0x10, &(0x7f0000000680)={0x5, 0x6, 0x81, 0x9}, 0x10, 0xffffffffffffffff, 0xffffffffffffffff, 0x0, &(0x7f00000006c0)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, r8]}, 0x80) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x4030582a, &(0x7f0000000040)=0x91) [ 121.427034][ T3326] I/O error, dev loop1, sector 0 op 0x0:(READ) flags 0x80700 phys_seg 1 prio class 0 [ 121.458374][ T26] netdevsim netdevsim0 netdevsim2 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 121.500189][ T4030] udevd[4030]: inotify_add_watch(7, /dev/loop1p3, 10) failed: No such file or directory [ 121.502392][ T3169] udevd[3169]: inotify_add_watch(7, /dev/loop1p7, 10) failed: No such file or directory [ 121.535032][ T6246] loop1: detected capacity change from 0 to 2048 [ 121.577230][ T26] netdevsim netdevsim0 netdevsim1 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 121.629955][ T6246] loop1: p2 p3 p7 20:41:10 executing program 1: ioctl$BTRFS_IOC_LOGICAL_INO(0xffffffffffffffff, 0xc0389424, &(0x7f0000000180)={0x1, 0x0, '\x00', 0x1, 0x0}) r0 = socket$inet6(0xa, 0x3, 0x6) r1 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) r2 = dup2(r1, r0) ioctl$FIDEDUPERANGE(r0, 0xc0189436, &(0x7f0000000f00)=ANY=[@ANYBLOB="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"]) ioctl$TIOCSBRK(r2, 0x5427) recvfrom$inet6(0xffffffffffffffff, &(0x7f0000000280)=""/134, 0x86, 0x40000102, &(0x7f0000000340)={0xa, 0x4e21, 0x77f, @mcast1, 0x403b3f}, 0x1c) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000001040)={{r2, 0xffffffffffffffff}, &(0x7f0000000140), &(0x7f0000000480)=r1}, 0x20) syz_read_part_table(0x593, &(0x7f00000005c0)="$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") r4 = creat(&(0x7f0000000240)='./file0\x00', 0x0) stat(&(0x7f0000000040)='./file1\x00', &(0x7f0000000380)) fsetxattr$security_capability(r4, &(0x7f0000000100), &(0x7f0000000000)=@v1={0x1000000, [{0x80000000, 0x81}]}, 0xc, 0x0) newfstatat(0xffffffffffffff9c, &(0x7f00000000c0)='./file1\x00', &(0x7f0000001400), 0x400) close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x2) ioctl$TIOCSTI(r4, 0x5412, &(0x7f00000004c0)=0x40) fsync(0xffffffffffffffff) write$binfmt_misc(r4, &(0x7f0000001080)=ANY=[@ANYBLOB="7379d3c6"], 0x4) fallocate(r4, 0x100000011, 0x0, 0x2811fdff) open(&(0x7f0000000100)='.\x00', 0x20c2, 0x2d) open$dir(&(0x7f0000000500)='./file1\x00', 0x1c6c0, 0x0) r5 = openat$vcsu(0xffffffffffffff9c, &(0x7f0000000cc0), 0x400c00, 0x0) lsetxattr$security_selinux(&(0x7f0000001180)='./file1\x00', &(0x7f00000011c0), &(0x7f0000001300)='system_u:object_r:unconfined_exec_t:s0\x00', 0x27, 0x3) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000400)={0xffffffffffffffff, 0xe0, &(0x7f0000000300)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, &(0x7f00000000c0)=[0x0], &(0x7f0000000140), 0x0, 0x8, &(0x7f0000000200)=[{}, {}, {}, {}, {}], 0x28, 0x0, 0x0, 0x0, 0x0, 0x10, 0x8, 0x8, &(0x7f00000002c0)}}, 0x10) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000e80)=@bpf_lsm={0x1d, 0x4, &(0x7f0000000040)=@framed={{0x18, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x73fc}, [@generic={0x9, 0x8, 0x0, 0x7f, 0x200}]}, &(0x7f0000000880)='GPL\x00', 0x1f, 0x93, &(0x7f0000000cc0)=""/147, 0x40f00, 0x2, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, &(0x7f0000000b80)={0x9}, 0x8, 0x10, 0x0, 0x0, r6}, 0x80) r7 = socket$nl_generic(0x10, 0x3, 0x10) r8 = syz_genetlink_get_family_id$tipc(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$TIPC_CMD_ENABLE_BEARER(r7, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000001200)=ANY=[@ANYBLOB="3400000006c08fada241ee0a049e6fba3f36f40da839bbdf54c31768b0026f4261f56d51c5d81ba4cb99f8203c40d0a142fcd75ce26e408d229139f8c4e81109c56a18e453e8a537df21c4ec04a4f3e22f4ac125a28ad43e41107b1f7e79c8573985e54fd665e2913ca74da8c9f3fc2839258c19fa7ac20ebead31206cf280ea73f635bc5418b66554392dfd11874fef72bc53538aae3cb5ef8a80140f4737dd2c572a03ee1d5e3d627e", @ANYRESOCT=0x0, @ANYBLOB="010000000000000000000100000000000000014100000018001700000000000000007564503a73"], 0x34}, 0x1, 0x0, 0x0, 0x1}, 0x0) ioctl$AUTOFS_DEV_IOCTL_PROTOSUBVER(r1, 0xc0189373, &(0x7f0000000540)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x6}}, './file0\x00'}) sendmsg$TIPC_CMD_GET_MAX_PORTS(r5, &(0x7f0000001140)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x40000}, 0xc, &(0x7f0000001100)={&(0x7f00000010c0)={0x1c, r8, 0x400, 0x8000, 0x25dfdbfe, {}, ["", "", "", "", "", "", ""]}, 0x1c}, 0x1, 0x0, 0x0, 0x20048854}, 0x4004) bpf$PROG_LOAD(0x5, &(0x7f0000000e40)={0x5, 0x16, &(0x7f0000001340)=ANY=[@ANYBLOB="390000000100000000000000900000f117fa0000", @ANYRES32=r4, @ANYBLOB="1f00000000000000b703000000000000850000000c000000b61b0453c29f42b5be06c7010b4efffe000000000085000000a900000018150000", @ANYRES32=r3, @ANYBLOB="0000000000000000180100002020782500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b70300000000850000005d000000185500000100000000000000000000009500000000000000"], &(0x7f0000000b80)='syzkaller\x00', 0x1, 0xe8, &(0x7f0000000bc0)=""/232, 0x41000, 0x5b, '\x00', 0x0, 0xe, r5, 0x8, &(0x7f0000000d00)={0x5, 0x2}, 0x8, 0x10, &(0x7f0000000d40)={0x4, 0xe, 0x2, 0x8}, 0x10, r6, r4, 0x5, &(0x7f0000000d80), &(0x7f0000000dc0)=[{0x4, 0x3, 0x0, 0x2}, {0x3, 0x1, 0xa, 0xa}, {0x0, 0x3, 0x2, 0xa}, {0x0, 0x3, 0x7, 0x1}, {0x1, 0x5, 0xb, 0xc}], 0x10, 0x7}, 0x90) [ 121.719255][ T26] netdevsim netdevsim0 netdevsim0 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 121.751330][ T4030] udevd[4030]: inotify_add_watch(7, /dev/loop1p3, 10) failed: No such file or directory [ 121.765045][ T3169] udevd[3169]: inotify_add_watch(7, /dev/loop1p7, 10) failed: No such file or directory [ 121.860586][ T6252] loop1: detected capacity change from 0 to 2048 [ 121.939075][ T6252] loop1: p2 p3 p7 20:41:10 executing program 1: ioctl$BTRFS_IOC_LOGICAL_INO(0xffffffffffffffff, 0xc0389424, &(0x7f0000000180)={0x1, 0x20, '\x00', 0x1, &(0x7f0000000080)=[0x0, 0x0, 0x0, 0x0]}) r0 = socket$inet6(0xa, 0x3, 0x6) r1 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) r2 = dup2(r1, r0) ioctl$FIDEDUPERANGE(r0, 0xc0189436, &(0x7f0000000f00)=ANY=[@ANYBLOB="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"]) ioctl$TIOCSBRK(r2, 0x5427) recvfrom$inet6(0xffffffffffffffff, &(0x7f0000000280)=""/134, 0x86, 0x40000102, &(0x7f0000000340)={0xa, 0x4e21, 0x77f, @mcast1, 0x403b3f}, 0x1c) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000001040)={{r2, 0xffffffffffffffff}, &(0x7f0000000140), &(0x7f0000000480)=r1}, 0x20) syz_read_part_table(0x593, &(0x7f00000005c0)="$eJzs0r1LK2kUB+A3A5c0e4lcLli4hWCwigqx0CIpRGJIY0RcsbAWLLQQLCwkEq39+AcUv0BsxD6lGEEUYiUpxXpBsUmVZdfZxmplUdnleZrhPefMHF5+E/hPi8Lv7XY7EUJoJ9//9m+nhbFS98TI5FQIiTAbQij8+stfnUQ88fdXz+NzOT6XktnG/vXo82nHTc9dPX0Yxf1aFMJaCGHh4Sj1b+/G/99Z/jK1vrFU3FzJz98XVx8H5/oKXVuFxZ2hg1xlujM3E/9Ytehz9qcbw8e37fLT7vf+b/VGK3sVz2USH7Ofr/U2/72f1Wa1Nd57sjyQ+dG8qGzHub/IHwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA+GBn+cvU+sZScXMlP39fXH0cnOsrdG0VFneGDnKV6c7cTPQ6V4s+Z3+6MXx82y4/7X7v/1ZvtLJX8Vwm8TH7+Vpv89/7WW1WW+O9J8sDmR/Ni8p2nPuL/AEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAACAf6gwVuqeGJmcCiERZkMIo1HH0Z/1dvK1n4jnzuNnOa6XktnG/vXo82nHTc9dPX04EddrUQhrIYSFh6PUp1+Gd/sjAAD///tch0s=") r4 = creat(&(0x7f0000000240)='./file0\x00', 0x0) stat(&(0x7f0000000040)='./file1\x00', &(0x7f0000000380)) fsetxattr$security_capability(r4, &(0x7f0000000100), &(0x7f0000000000)=@v1={0x1000000, [{0x80000000, 0x81}]}, 0xc, 0x0) newfstatat(0xffffffffffffff9c, &(0x7f00000000c0)='./file1\x00', &(0x7f0000001400), 0x400) close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x2) ioctl$TIOCSTI(r4, 0x5412, &(0x7f00000004c0)=0x40) fsync(0xffffffffffffffff) write$binfmt_misc(r4, &(0x7f0000001080)=ANY=[@ANYBLOB="7379d3c6"], 0x4) fallocate(r4, 0x100000011, 0x0, 0x2811fdff) open(&(0x7f0000000100)='.\x00', 0x20c2, 0x2d) open$dir(&(0x7f0000000500)='./file1\x00', 0x1c6c0, 0x0) r5 = openat$vcsu(0xffffffffffffff9c, &(0x7f0000000cc0), 0x400c00, 0x0) lsetxattr$security_selinux(&(0x7f0000001180)='./file1\x00', &(0x7f00000011c0), &(0x7f0000001300)='system_u:object_r:unconfined_exec_t:s0\x00', 0x27, 0x3) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000400)={0xffffffffffffffff, 0xe0, &(0x7f0000000300)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, &(0x7f00000000c0)=[0x0], &(0x7f0000000140), 0x0, 0x8, &(0x7f0000000200)=[{}, {}, {}, {}, {}], 0x28, 0x0, 0x0, 0x0, 0x0, 0x10, 0x8, 0x8, &(0x7f00000002c0)}}, 0x10) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000e80)=@bpf_lsm={0x1d, 0x4, &(0x7f0000000040)=@framed={{0x18, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x73fc}, [@generic={0x9, 0x8, 0x0, 0x7f, 0x200}]}, &(0x7f0000000880)='GPL\x00', 0x1f, 0x93, &(0x7f0000000cc0)=""/147, 0x40f00, 0x2, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, &(0x7f0000000b80)={0x9}, 0x8, 0x10, 0x0, 0x0, r6}, 0x80) r7 = socket$nl_generic(0x10, 0x3, 0x10) r8 = syz_genetlink_get_family_id$tipc(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$TIPC_CMD_ENABLE_BEARER(r7, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000001200)=ANY=[@ANYBLOB="3400000006c08fada241ee0a049e6fba3f36f40da839bbdf54c31768b0026f4261f56d51c5d81ba4cb99f8203c40d0a142fcd75ce26e408d229139f8c4e81109c56a18e453e8a537df21c4ec04a4f3e22f4ac125a28ad43e41107b1f7e79c8573985e54fd665e2913ca74da8c9f3fc2839258c19fa7ac20ebead31206cf280ea73f635bc5418b66554392dfd11874fef72bc53538aae3cb5ef8a80140f4737dd2c572a03ee1d5e3d627e", @ANYRESOCT=0x0, @ANYBLOB="010000000000000000000100000000000000014100000018001700000000000000007564503a73"], 0x34}, 0x1, 0x0, 0x0, 0x1}, 0x0) ioctl$AUTOFS_DEV_IOCTL_PROTOSUBVER(r1, 0xc0189373, &(0x7f0000000540)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x6}}, './file0\x00'}) sendmsg$TIPC_CMD_GET_MAX_PORTS(r5, &(0x7f0000001140)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x40000}, 0xc, &(0x7f0000001100)={&(0x7f00000010c0)={0x1c, r8, 0x400, 0x8000, 0x25dfdbfe, {}, ["", "", "", "", "", "", ""]}, 0x1c}, 0x1, 0x0, 0x0, 0x20048854}, 0x4004) bpf$PROG_LOAD(0x5, &(0x7f0000000e40)={0x5, 0x16, &(0x7f0000001340)=ANY=[@ANYBLOB="390000000100000000000000900000f117fa0000", @ANYRES32=r4, @ANYBLOB="1f00000000000000b703000000000000850000000c000000b61b0453c29f42b5be06c7010b4efffe000000000085000000a900000018150000", @ANYRES32=r3, @ANYBLOB="0000000000000000180100002020782500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b70300000000850000005d000000185500000100000000000000000000009500000000000000"], &(0x7f0000000b80)='syzkaller\x00', 0x1, 0xe8, &(0x7f0000000bc0)=""/232, 0x41000, 0x5b, '\x00', 0x0, 0xe, r5, 0x8, &(0x7f0000000d00)={0x5, 0x2}, 0x8, 0x10, &(0x7f0000000d40)={0x4, 0xe, 0x2, 0x8}, 0x10, r6, r4, 0x5, &(0x7f0000000d80), &(0x7f0000000dc0)=[{0x4, 0x3, 0x0, 0x2}, {0x3, 0x1, 0xa, 0xa}, {0x0, 0x3, 0x2, 0xa}, {0x0, 0x3, 0x7, 0x1}, {0x1, 0x5, 0xb, 0xc}], 0x10, 0x7}, 0x90) [ 122.045507][ T2775] loop1: p2 p3 p7 20:41:10 executing program 4: r0 = perf_event_open(&(0x7f0000000a40)={0x2, 0x80, 0xcd, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @perf_bp={&(0x7f0000000200), 0x8}, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfb75}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000040)={0x0, 0x4, 0x0, &(0x7f0000000180)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x80) perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x208, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x4, 0x8001}, 0x4000, 0x0, 0x0, 0x0, 0x0, 0x14e, 0xd1}, 0x0, 0xbfffffffffffffff, r0, 0x19893a9f0a0e2244) r1 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) syz_clone(0x2000000, 0x0, 0x0, 0x0, 0x0, 0x0) r2 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x18, 0x5, &(0x7f00000002c0)=ANY=[@ANYBLOB="180000001800ff0f0000000000000000850000006d000000750000000800000095"], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x80) r3 = perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400, 0x80000, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x7, 0x1007}, 0x8006, 0x0, 0x0, 0x1, 0x4, 0x800000, 0x3}, 0x0, 0xffefffffffffffff, 0xffffffffffffffff, 0x9) ioctl$PERF_EVENT_IOC_SET_FILTER(r3, 0x40082406, &(0x7f00000003c0)='memory.numa_stat\x00') perf_event_open(0x0, 0x0, 0x0, r3, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000080)='sched_switch\x00', r2}, 0x10) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000380)={{0x1, 0xffffffffffffffff}, &(0x7f0000000000), &(0x7f0000000240)=r2}, 0x20) r5 = memfd_secret(0x0) syz_io_uring_setup(0x0, &(0x7f0000000300)={0x0, 0x2, 0x0, 0x0, 0x0, 0x0, r5}, 0x0, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f00000009c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000000a00)=0x14) r7 = openat2(0xffffffffffffff9c, &(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)={0x40841}, 0x18) write$binfmt_script(r7, &(0x7f0000000340)=ANY=[], 0xfffffdef) r8 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000b40)={0x1b, 0x0, 0x0, 0x7, 0x0, 0xffffffffffffffff, 0x200, '\x00', 0x0, 0xffffffffffffffff, 0x3, 0x1, 0x4}, 0x48) r9 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000bc0)={0x2, 0x4, 0x8, 0x1, 0x80, 0x1, 0x9, '\x00', 0x0, 0xffffffffffffffff, 0x4, 0x1, 0x4}, 0x48) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000d00)={0x11, 0x12, &(0x7f0000000440)=@raw=[@exit, @ringbuf_query={{0x18, 0x1, 0x1, 0x0, r4}}, @ringbuf_output={{0x18, 0x1, 0x1, 0x0, r5}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x10001}, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x4, 0x0, 0x0, 0x2}}, @exit, @initr0={0x18, 0x0, 0x0, 0x0, 0x6349, 0x0, 0x0, 0x0, 0xf685}, @ldst={0x3, 0x2, 0x1, 0x0, 0xb, 0x2543a83bb932833c, 0x1}], &(0x7f0000000940)='syzkaller\x00', 0x80000001, 0x27, &(0x7f0000000980)=""/39, 0x41000, 0x40, '\x00', r6, 0x0, r7, 0x8, &(0x7f0000000ac0)={0x3, 0x1}, 0x8, 0x10, &(0x7f0000000b00)={0x2, 0xc, 0xfffffe00, 0x2}, 0x10, 0x0, 0x0, 0x5, &(0x7f0000000c40)=[r2, 0x1, 0x1, r8, r9, r1], &(0x7f0000000c80)=[{0x4, 0x1, 0x8, 0xc}, {0x0, 0x4, 0xf, 0x4}, {0x1, 0x2, 0xd, 0x6}, {0x0, 0x4, 0x10, 0xc}, {0x2, 0x4, 0xd, 0x1}], 0x10, 0x20}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000280)={&(0x7f0000000140)='ext4_ext_show_extent\x00', r2}, 0x10) r10 = perf_event_open(&(0x7f0000000080)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) perf_event_open$cgroup(&(0x7f0000000300)={0x5, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_bp={&(0x7f0000000100)}, 0x81252, 0x6, 0x80000001, 0x0, 0x0, 0x0, 0x6, 0x0, 0x6, 0x0, 0x6}, 0xffffffffffffffff, 0xe, 0xffffffffffffffff, 0xc) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000780)={0x14, 0x4, &(0x7f00000008c0)=ANY=[@ANYBLOB="850000006b00000018150000a3df7ddd9621fb0201050062d91123e632b2f902ad1e9f1cc7a66ed51ac8a4070000000000000019a83f0b7c9502871fb1ca3dc499e804bbbc359859ed6fd9f104fc7ed900d122072d8275a24d000000000601c3a63953a7b36fe458", @ANYRES32, @ANYBLOB="00000000000000002d59e4eda4000000"], &(0x7f0000000400)='syzkaller\x00', 0xfff, 0xe3, &(0x7f0000000580)=""/227, 0x0, 0x4, '\x00', 0x0, 0x24, 0xffffffffffffffff, 0x8, &(0x7f0000000500)={0x1, 0x3}, 0x8, 0x10, &(0x7f0000000680)={0x5, 0x6, 0x81, 0x9}, 0x10, 0xffffffffffffffff, 0xffffffffffffffff, 0x0, &(0x7f00000006c0)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, r10]}, 0x80) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x4030582a, &(0x7f0000000040)=0x91) [ 122.162611][ T3326] I/O error, dev loop1, sector 0 op 0x0:(READ) flags 0x80700 phys_seg 1 prio class 0 [ 122.212751][ T3169] udevd[3169]: inotify_add_watch(7, /dev/loop1p7, 10) failed: No such file or directory [ 122.216495][ T4030] udevd[4030]: inotify_add_watch(7, /dev/loop1p3, 10) failed: No such file or directory [ 122.251618][ T6273] loop1: detected capacity change from 0 to 2048 [ 122.376039][ T6273] loop1: p2 p3 p7 [ 122.387780][ T26] hsr_slave_0: left promiscuous mode 20:41:10 executing program 2: r0 = perf_event_open(&(0x7f0000000a40)={0x2, 0x80, 0xcd, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @perf_bp={&(0x7f0000000200), 0x8}, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfb75}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000040)={0x0, 0x4, 0x0, &(0x7f0000000180)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x80) perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x208, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x4, 0x8001}, 0x4000, 0x0, 0x0, 0x0, 0x0, 0x14e, 0xd1}, 0x0, 0xbfffffffffffffff, r0, 0x19893a9f0a0e2244) r1 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) syz_clone(0x2000000, 0x0, 0x0, 0x0, 0x0, 0x0) r2 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x18, 0x5, &(0x7f00000002c0)=ANY=[@ANYBLOB="180000001800ff0f0000000000000000850000006d000000750000000800000095"], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x80) r3 = perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400, 0x80000, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x7, 0x1007}, 0x8006, 0x0, 0x0, 0x1, 0x4, 0x800000, 0x3}, 0x0, 0xffefffffffffffff, 0xffffffffffffffff, 0x9) ioctl$PERF_EVENT_IOC_SET_FILTER(r3, 0x40082406, &(0x7f00000003c0)='memory.numa_stat\x00') perf_event_open(0x0, 0x0, 0x0, r3, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000080)='sched_switch\x00', r2}, 0x10) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000380)={{0x1, 0xffffffffffffffff}, &(0x7f0000000000), &(0x7f0000000240)=r2}, 0x20) r5 = memfd_secret(0x0) syz_io_uring_setup(0x0, &(0x7f0000000300)={0x0, 0x2, 0x0, 0x0, 0x0, 0x0, r5}, 0x0, 0x0) r6 = openat2(0xffffffffffffff9c, &(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)={0x40841}, 0x18) write$binfmt_script(r6, &(0x7f0000000340)=ANY=[], 0xfffffdef) r7 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000bc0)={0x2, 0x4, 0x8, 0x1, 0x80, 0x1, 0x9, '\x00', 0x0, 0xffffffffffffffff, 0x4, 0x1, 0x4}, 0x48) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000d00)={0x11, 0x12, &(0x7f0000000440)=@raw=[@exit, @ringbuf_query={{0x18, 0x1, 0x1, 0x0, r4}}, @ringbuf_output={{0x18, 0x1, 0x1, 0x0, r5}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x10001}, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x4, 0x0, 0x0, 0x2}}, @exit, @initr0={0x18, 0x0, 0x0, 0x0, 0x6349, 0x0, 0x0, 0x0, 0xf685}, @ldst={0x3, 0x2, 0x1, 0x0, 0xb, 0x2543a83bb932833c, 0x1}], &(0x7f0000000940)='syzkaller\x00', 0x80000001, 0x27, &(0x7f0000000980)=""/39, 0x41000, 0x40, '\x00', 0x0, 0x0, r6, 0x8, &(0x7f0000000ac0)={0x3, 0x1}, 0x8, 0x10, &(0x7f0000000b00)={0x2, 0xc, 0xfffffe00, 0x2}, 0x10, 0x0, 0x0, 0x5, &(0x7f0000000c40)=[r2, 0x1, 0x1, 0xffffffffffffffff, r7, r1], &(0x7f0000000c80)=[{0x4, 0x1, 0x8, 0xc}, {0x0, 0x4, 0xf, 0x4}, {0x1, 0x2, 0xd, 0x6}, {0x0, 0x4, 0x10, 0xc}, {0x2, 0x4, 0xd, 0x1}], 0x10, 0x20}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000280)={&(0x7f0000000140)='ext4_ext_show_extent\x00', r2}, 0x10) r8 = perf_event_open(&(0x7f0000000080)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) r9 = gettid() perf_event_open$cgroup(&(0x7f0000000300)={0x5, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_bp={&(0x7f0000000100)}, 0x81252, 0x6, 0x80000001, 0x0, 0x0, 0x0, 0x6, 0x0, 0x6, 0x0, 0x6}, 0xffffffffffffffff, 0xe, 0xffffffffffffffff, 0xc) perf_event_open(0x0, r9, 0x2, 0xffffffffffffffff, 0xb) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) perf_event_open(&(0x7f0000000840)={0x2, 0x80, 0x0, 0x7, 0x0, 0x80, 0x0, 0x3, 0x0, 0x9, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, @perf_config_ext={0x8000000000, 0x3}, 0x46c73247dfbe0d, 0x1007e, 0x0, 0x2, 0x0, 0x0, 0x6, 0x0, 0xffffffff, 0x0, 0x1c}, 0x0, 0x9, 0xffffffffffffffff, 0xd) bpf$PROG_LOAD(0x5, &(0x7f0000000780)={0x14, 0x4, &(0x7f00000008c0)=ANY=[@ANYBLOB="850000006b00000018150000a3df7ddd9621fb0201050062d91123e632b2f902ad1e9f1cc7a66ed51ac8a4070000000000000019a83f0b7c9502871fb1ca3dc499e804bbbc359859ed6fd9f104fc7ed900d122072d8275a24d000000000601c3a63953a7b36fe458", @ANYRES32, @ANYBLOB="00000000000000002d59e4eda4000000"], &(0x7f0000000400)='syzkaller\x00', 0xfff, 0xe3, &(0x7f0000000580)=""/227, 0x0, 0x4, '\x00', 0x0, 0x24, 0xffffffffffffffff, 0x8, &(0x7f0000000500)={0x1, 0x3}, 0x8, 0x10, &(0x7f0000000680)={0x5, 0x6, 0x81, 0x9}, 0x10, 0xffffffffffffffff, 0xffffffffffffffff, 0x0, &(0x7f00000006c0)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, r8]}, 0x80) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x4030582a, &(0x7f0000000040)=0x91) [ 122.417258][ T26] hsr_slave_1: left promiscuous mode [ 122.427056][ T26] batman_adv: batadv0: Interface deactivated: batadv_slave_0 [ 122.434498][ T26] batman_adv: batadv0: Removing interface: batadv_slave_0 20:41:10 executing program 1: ioctl$BTRFS_IOC_LOGICAL_INO(0xffffffffffffffff, 0xc0389424, &(0x7f0000000180)={0x1, 0x20, '\x00', 0x1, &(0x7f0000000080)=[0x0, 0x0, 0x0, 0x0]}) r0 = socket$inet6(0xa, 0x3, 0x6) r1 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) r2 = dup2(r1, r0) ioctl$FIDEDUPERANGE(r0, 0xc0189436, &(0x7f0000000f00)=ANY=[@ANYBLOB="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"]) ioctl$TIOCSBRK(r2, 0x5427) recvfrom$inet6(0xffffffffffffffff, &(0x7f0000000280)=""/134, 0x86, 0x40000102, &(0x7f0000000340)={0xa, 0x4e21, 0x77f, @mcast1, 0x403b3f}, 0x1c) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000001040)={{r2, 0xffffffffffffffff}, &(0x7f0000000140), &(0x7f0000000480)=r1}, 0x20) syz_read_part_table(0x593, &(0x7f00000005c0)="$eJzs0r1LK2kUB+A3A5c0e4lcLli4hWCwigqx0CIpRGJIY0RcsbAWLLQQLCwkEq39+AcUv0BsxD6lGEEUYiUpxXpBsUmVZdfZxmplUdnleZrhPefMHF5+E/hPi8Lv7XY7EUJoJ9//9m+nhbFS98TI5FQIiTAbQij8+stfnUQ88fdXz+NzOT6XktnG/vXo82nHTc9dPX0Yxf1aFMJaCGHh4Sj1b+/G/99Z/jK1vrFU3FzJz98XVx8H5/oKXVuFxZ2hg1xlujM3E/9Ytehz9qcbw8e37fLT7vf+b/VGK3sVz2USH7Ofr/U2/72f1Wa1Nd57sjyQ+dG8qGzHub/IHwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA+GBn+cvU+sZScXMlP39fXH0cnOsrdG0VFneGDnKV6c7cTPQ6V4s+Z3+6MXx82y4/7X7v/1ZvtLJX8Vwm8TH7+Vpv89/7WW1WW+O9J8sDmR/Ni8p2nPuL/AEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAACAf6gwVuqeGJmcCiERZkMIo1HH0Z/1dvK1n4jnzuNnOa6XktnG/vXo82nHTc9dPX04EddrUQhrIYSFh6PUp1+Gd/sjAAD///tch0s=") r4 = creat(&(0x7f0000000240)='./file0\x00', 0x0) stat(&(0x7f0000000040)='./file1\x00', &(0x7f0000000380)) fsetxattr$security_capability(r4, &(0x7f0000000100), &(0x7f0000000000)=@v1={0x1000000, [{0x80000000, 0x81}]}, 0xc, 0x0) newfstatat(0xffffffffffffff9c, &(0x7f00000000c0)='./file1\x00', &(0x7f0000001400), 0x400) close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x2) ioctl$TIOCSTI(r4, 0x5412, &(0x7f00000004c0)=0x40) fsync(0xffffffffffffffff) write$binfmt_misc(r4, &(0x7f0000001080)=ANY=[@ANYBLOB="7379d3c6"], 0x4) fallocate(r4, 0x100000011, 0x0, 0x2811fdff) open(&(0x7f0000000100)='.\x00', 0x20c2, 0x2d) open$dir(&(0x7f0000000500)='./file1\x00', 0x1c6c0, 0x0) r5 = openat$vcsu(0xffffffffffffff9c, &(0x7f0000000cc0), 0x400c00, 0x0) lsetxattr$security_selinux(&(0x7f0000001180)='./file1\x00', &(0x7f00000011c0), &(0x7f0000001300)='system_u:object_r:unconfined_exec_t:s0\x00', 0x27, 0x3) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000400)={0xffffffffffffffff, 0xe0, &(0x7f0000000300)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, &(0x7f00000000c0)=[0x0], &(0x7f0000000140), 0x0, 0x8, &(0x7f0000000200)=[{}, {}, {}, {}, {}], 0x28, 0x0, 0x0, 0x0, 0x0, 0x10, 0x8, 0x8, &(0x7f00000002c0)}}, 0x10) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000e80)=@bpf_lsm={0x1d, 0x4, &(0x7f0000000040)=@framed={{0x18, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x73fc}, [@generic={0x9, 0x8, 0x0, 0x7f, 0x200}]}, &(0x7f0000000880)='GPL\x00', 0x1f, 0x93, &(0x7f0000000cc0)=""/147, 0x40f00, 0x2, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, &(0x7f0000000b80)={0x9}, 0x8, 0x10, 0x0, 0x0, r6}, 0x80) r7 = socket$nl_generic(0x10, 0x3, 0x10) r8 = syz_genetlink_get_family_id$tipc(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$TIPC_CMD_ENABLE_BEARER(r7, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000001200)=ANY=[@ANYBLOB="3400000006c08fada241ee0a049e6fba3f36f40da839bbdf54c31768b0026f4261f56d51c5d81ba4cb99f8203c40d0a142fcd75ce26e408d229139f8c4e81109c56a18e453e8a537df21c4ec04a4f3e22f4ac125a28ad43e41107b1f7e79c8573985e54fd665e2913ca74da8c9f3fc2839258c19fa7ac20ebead31206cf280ea73f635bc5418b66554392dfd11874fef72bc53538aae3cb5ef8a80140f4737dd2c572a03ee1d5e3d627e", @ANYRESOCT=0x0, @ANYBLOB="010000000000000000000100000000000000014100000018001700000000000000007564503a73"], 0x34}, 0x1, 0x0, 0x0, 0x1}, 0x0) ioctl$AUTOFS_DEV_IOCTL_PROTOSUBVER(r1, 0xc0189373, &(0x7f0000000540)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x6}}, './file0\x00'}) sendmsg$TIPC_CMD_GET_MAX_PORTS(r5, &(0x7f0000001140)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x40000}, 0xc, &(0x7f0000001100)={&(0x7f00000010c0)={0x1c, r8, 0x400, 0x8000, 0x25dfdbfe, {}, ["", "", "", "", "", "", ""]}, 0x1c}, 0x1, 0x0, 0x0, 0x20048854}, 0x4004) bpf$PROG_LOAD(0x5, &(0x7f0000000e40)={0x5, 0x16, &(0x7f0000001340)=ANY=[@ANYBLOB="390000000100000000000000900000f117fa0000", @ANYRES32=r4, @ANYBLOB="1f00000000000000b703000000000000850000000c000000b61b0453c29f42b5be06c7010b4efffe000000000085000000a900000018150000", @ANYRES32=r3, @ANYBLOB="0000000000000000180100002020782500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b70300000000850000005d000000185500000100000000000000000000009500000000000000"], &(0x7f0000000b80)='syzkaller\x00', 0x1, 0xe8, &(0x7f0000000bc0)=""/232, 0x41000, 0x5b, '\x00', 0x0, 0xe, r5, 0x8, &(0x7f0000000d00)={0x5, 0x2}, 0x8, 0x10, &(0x7f0000000d40)={0x4, 0xe, 0x2, 0x8}, 0x10, r6, r4, 0x5, &(0x7f0000000d80), &(0x7f0000000dc0)=[{0x4, 0x3, 0x0, 0x2}, {0x3, 0x1, 0xa, 0xa}, {0x0, 0x3, 0x2, 0xa}, {0x0, 0x3, 0x7, 0x1}, {0x1, 0x5, 0xb, 0xc}], 0x10, 0x7}, 0x90) [ 122.497566][ T26] batman_adv: batadv0: Interface deactivated: batadv_slave_1 [ 122.505222][ T26] batman_adv: batadv0: Removing interface: batadv_slave_1 [ 122.520804][ T26] bridge_slave_1: left allmulticast mode [ 122.526507][ T26] bridge_slave_1: left promiscuous mode [ 122.532515][ T26] bridge0: port 2(bridge_slave_1) entered disabled state [ 122.575560][ T26] bridge_slave_0: left allmulticast mode [ 122.581536][ T26] bridge_slave_0: left promiscuous mode [ 122.587298][ T26] bridge0: port 1(bridge_slave_0) entered disabled state [ 122.615366][ T26] veth1_macvtap: left promiscuous mode [ 122.620994][ T26] veth0_macvtap: left promiscuous mode [ 122.622618][ T6291] loop1: detected capacity change from 0 to 2048 [ 122.626528][ T26] veth1_vlan: left promiscuous mode [ 122.639187][ T26] veth0_vlan: left promiscuous mode [ 122.772460][ T6291] loop1: p2 p3 p7 20:41:11 executing program 1: ioctl$BTRFS_IOC_LOGICAL_INO(0xffffffffffffffff, 0xc0389424, &(0x7f0000000180)={0x1, 0x20, '\x00', 0x1, &(0x7f0000000080)=[0x0, 0x0, 0x0, 0x0]}) r0 = socket$inet6(0xa, 0x3, 0x6) r1 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) r2 = dup2(r1, r0) ioctl$FIDEDUPERANGE(r0, 0xc0189436, &(0x7f0000000f00)=ANY=[@ANYBLOB="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"]) ioctl$TIOCSBRK(r2, 0x5427) recvfrom$inet6(0xffffffffffffffff, &(0x7f0000000280)=""/134, 0x86, 0x40000102, &(0x7f0000000340)={0xa, 0x4e21, 0x77f, @mcast1, 0x403b3f}, 0x1c) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000001040)={{r2, 0xffffffffffffffff}, &(0x7f0000000140), &(0x7f0000000480)=r1}, 0x20) syz_read_part_table(0x593, &(0x7f00000005c0)="$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") r4 = creat(&(0x7f0000000240)='./file0\x00', 0x0) stat(&(0x7f0000000040)='./file1\x00', &(0x7f0000000380)) fsetxattr$security_capability(r4, &(0x7f0000000100), &(0x7f0000000000)=@v1={0x1000000, [{0x80000000, 0x81}]}, 0xc, 0x0) newfstatat(0xffffffffffffff9c, &(0x7f00000000c0)='./file1\x00', &(0x7f0000001400), 0x400) close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x2) ioctl$TIOCSTI(r4, 0x5412, &(0x7f00000004c0)=0x40) fsync(0xffffffffffffffff) write$binfmt_misc(r4, &(0x7f0000001080)=ANY=[@ANYBLOB="7379d3c6"], 0x4) fallocate(r4, 0x100000011, 0x0, 0x2811fdff) open(&(0x7f0000000100)='.\x00', 0x20c2, 0x2d) open$dir(&(0x7f0000000500)='./file1\x00', 0x1c6c0, 0x0) r5 = openat$vcsu(0xffffffffffffff9c, &(0x7f0000000cc0), 0x400c00, 0x0) lsetxattr$security_selinux(&(0x7f0000001180)='./file1\x00', &(0x7f00000011c0), &(0x7f0000001300)='system_u:object_r:unconfined_exec_t:s0\x00', 0x27, 0x3) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000400)={0xffffffffffffffff, 0xe0, &(0x7f0000000300)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, &(0x7f00000000c0)=[0x0], &(0x7f0000000140), 0x0, 0x8, &(0x7f0000000200)=[{}, {}, {}, {}, {}], 0x28, 0x0, 0x0, 0x0, 0x0, 0x10, 0x8, 0x8, &(0x7f00000002c0)}}, 0x10) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000e80)=@bpf_lsm={0x1d, 0x4, &(0x7f0000000040)=@framed={{0x18, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x73fc}, [@generic={0x9, 0x8, 0x0, 0x7f, 0x200}]}, &(0x7f0000000880)='GPL\x00', 0x1f, 0x93, &(0x7f0000000cc0)=""/147, 0x40f00, 0x2, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, &(0x7f0000000b80)={0x9}, 0x8, 0x10, 0x0, 0x0, r6}, 0x80) r7 = socket$nl_generic(0x10, 0x3, 0x10) r8 = syz_genetlink_get_family_id$tipc(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$TIPC_CMD_ENABLE_BEARER(r7, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000001200)=ANY=[@ANYBLOB="3400000006c08fada241ee0a049e6fba3f36f40da839bbdf54c31768b0026f4261f56d51c5d81ba4cb99f8203c40d0a142fcd75ce26e408d229139f8c4e81109c56a18e453e8a537df21c4ec04a4f3e22f4ac125a28ad43e41107b1f7e79c8573985e54fd665e2913ca74da8c9f3fc2839258c19fa7ac20ebead31206cf280ea73f635bc5418b66554392dfd11874fef72bc53538aae3cb5ef8a80140f4737dd2c572a03ee1d5e3d627e", @ANYRESOCT=0x0, @ANYBLOB="010000000000000000000100000000000000014100000018001700000000000000007564503a73"], 0x34}, 0x1, 0x0, 0x0, 0x1}, 0x0) ioctl$AUTOFS_DEV_IOCTL_PROTOSUBVER(r1, 0xc0189373, &(0x7f0000000540)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x6}}, './file0\x00'}) sendmsg$TIPC_CMD_GET_MAX_PORTS(r5, &(0x7f0000001140)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x40000}, 0xc, &(0x7f0000001100)={&(0x7f00000010c0)={0x1c, r8, 0x400, 0x8000, 0x25dfdbfe, {}, ["", "", "", "", "", "", ""]}, 0x1c}, 0x1, 0x0, 0x0, 0x20048854}, 0x4004) bpf$PROG_LOAD(0x5, &(0x7f0000000e40)={0x5, 0x16, &(0x7f0000001340)=ANY=[@ANYBLOB="390000000100000000000000900000f117fa0000", @ANYRES32=r4, @ANYBLOB="1f00000000000000b703000000000000850000000c000000b61b0453c29f42b5be06c7010b4efffe000000000085000000a900000018150000", @ANYRES32=r3, @ANYBLOB="0000000000000000180100002020782500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b70300000000850000005d000000185500000100000000000000000000009500000000000000"], &(0x7f0000000b80)='syzkaller\x00', 0x1, 0xe8, &(0x7f0000000bc0)=""/232, 0x41000, 0x5b, '\x00', 0x0, 0xe, r5, 0x8, &(0x7f0000000d00)={0x5, 0x2}, 0x8, 0x10, &(0x7f0000000d40)={0x4, 0xe, 0x2, 0x8}, 0x10, r6, r4, 0x5, &(0x7f0000000d80), &(0x7f0000000dc0)=[{0x4, 0x3, 0x0, 0x2}, {0x3, 0x1, 0xa, 0xa}, {0x0, 0x3, 0x2, 0xa}, {0x0, 0x3, 0x7, 0x1}, {0x1, 0x5, 0xb, 0xc}], 0x10, 0x7}, 0x90) [ 122.959769][ T26] bond1 (unregistering): Released all slaves [ 122.983945][ T6295] loop1: detected capacity change from 0 to 2048 [ 123.078718][ T6295] loop1: p2 p3 p7 20:41:11 executing program 4: r0 = perf_event_open(&(0x7f0000000a40)={0x2, 0x80, 0xcd, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @perf_bp={&(0x7f0000000200), 0x8}, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfb75}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000040)={0x0, 0x4, 0x0, &(0x7f0000000180)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x80) perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x208, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x4, 0x8001}, 0x4000, 0x0, 0x0, 0x0, 0x0, 0x14e, 0xd1}, 0x0, 0xbfffffffffffffff, r0, 0x19893a9f0a0e2244) r1 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) syz_clone(0x2000000, 0x0, 0x0, 0x0, 0x0, 0x0) r2 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x18, 0x5, &(0x7f00000002c0)=ANY=[@ANYBLOB="180000001800ff0f0000000000000000850000006d000000750000000800000095"], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x80) r3 = perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400, 0x80000, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x7, 0x1007}, 0x8006, 0x0, 0x0, 0x1, 0x4, 0x800000, 0x3}, 0x0, 0xffefffffffffffff, 0xffffffffffffffff, 0x9) ioctl$PERF_EVENT_IOC_SET_FILTER(r3, 0x40082406, &(0x7f00000003c0)='memory.numa_stat\x00') perf_event_open(0x0, 0x0, 0x0, r3, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000080)='sched_switch\x00', r2}, 0x10) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000380)={{0x1, 0xffffffffffffffff}, &(0x7f0000000000), &(0x7f0000000240)=r2}, 0x20) r5 = memfd_secret(0x0) syz_io_uring_setup(0x0, &(0x7f0000000300)={0x0, 0x2, 0x0, 0x0, 0x0, 0x0, r5}, 0x0, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f00000009c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000000a00)=0x14) r7 = openat2(0xffffffffffffff9c, &(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)={0x40841}, 0x18) write$binfmt_script(r7, &(0x7f0000000340)=ANY=[], 0xfffffdef) r8 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000b40)={0x1b, 0x0, 0x0, 0x7, 0x0, 0xffffffffffffffff, 0x200, '\x00', 0x0, 0xffffffffffffffff, 0x3, 0x1, 0x4}, 0x48) r9 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000bc0)={0x2, 0x4, 0x8, 0x1, 0x80, 0x1, 0x9, '\x00', 0x0, 0xffffffffffffffff, 0x4, 0x1, 0x4}, 0x48) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000d00)={0x11, 0x12, &(0x7f0000000440)=@raw=[@exit, @ringbuf_query={{0x18, 0x1, 0x1, 0x0, r4}}, @ringbuf_output={{0x18, 0x1, 0x1, 0x0, r5}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x10001}, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x4, 0x0, 0x0, 0x2}}, @exit, @initr0={0x18, 0x0, 0x0, 0x0, 0x6349, 0x0, 0x0, 0x0, 0xf685}, @ldst={0x3, 0x2, 0x1, 0x0, 0xb, 0x2543a83bb932833c, 0x1}], &(0x7f0000000940)='syzkaller\x00', 0x80000001, 0x27, &(0x7f0000000980)=""/39, 0x41000, 0x40, '\x00', r6, 0x0, r7, 0x8, &(0x7f0000000ac0)={0x3, 0x1}, 0x8, 0x10, &(0x7f0000000b00)={0x2, 0xc, 0xfffffe00, 0x2}, 0x10, 0x0, 0x0, 0x5, &(0x7f0000000c40)=[r2, 0x1, 0x1, r8, r9, r1], &(0x7f0000000c80)=[{0x4, 0x1, 0x8, 0xc}, {0x0, 0x4, 0xf, 0x4}, {0x1, 0x2, 0xd, 0x6}, {0x0, 0x4, 0x10, 0xc}, {0x2, 0x4, 0xd, 0x1}], 0x10, 0x20}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000280)={&(0x7f0000000140)='ext4_ext_show_extent\x00', r2}, 0x10) r10 = perf_event_open(&(0x7f0000000080)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) perf_event_open$cgroup(&(0x7f0000000300)={0x5, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_bp={&(0x7f0000000100)}, 0x81252, 0x6, 0x80000001, 0x0, 0x0, 0x0, 0x6, 0x0, 0x6, 0x0, 0x6}, 0xffffffffffffffff, 0xe, 0xffffffffffffffff, 0xc) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000780)={0x14, 0x4, &(0x7f00000008c0)=ANY=[@ANYBLOB="850000006b00000018150000a3df7ddd9621fb0201050062d91123e632b2f902ad1e9f1cc7a66ed51ac8a4070000000000000019a83f0b7c9502871fb1ca3dc499e804bbbc359859ed6fd9f104fc7ed900d122072d8275a24d000000000601c3a63953a7b36fe458", @ANYRES32, @ANYBLOB="00000000000000002d59e4eda4000000"], &(0x7f0000000400)='syzkaller\x00', 0xfff, 0xe3, &(0x7f0000000580)=""/227, 0x0, 0x4, '\x00', 0x0, 0x24, 0xffffffffffffffff, 0x8, &(0x7f0000000500)={0x1, 0x3}, 0x8, 0x10, &(0x7f0000000680)={0x5, 0x6, 0x81, 0x9}, 0x10, 0xffffffffffffffff, 0xffffffffffffffff, 0x0, &(0x7f00000006c0)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, r10]}, 0x80) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x4030582a, &(0x7f0000000040)=0x91) 20:41:11 executing program 1: ioctl$BTRFS_IOC_LOGICAL_INO(0xffffffffffffffff, 0xc0389424, &(0x7f0000000180)={0x1, 0x20, '\x00', 0x1, &(0x7f0000000080)=[0x0, 0x0, 0x0, 0x0]}) r0 = socket$inet6(0xa, 0x3, 0x6) r1 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) r2 = dup2(r1, r0) ioctl$FIDEDUPERANGE(r0, 0xc0189436, &(0x7f0000000f00)=ANY=[@ANYBLOB="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"]) ioctl$TIOCSBRK(r2, 0x5427) recvfrom$inet6(0xffffffffffffffff, &(0x7f0000000280)=""/134, 0x86, 0x40000102, &(0x7f0000000340)={0xa, 0x4e21, 0x77f, @mcast1, 0x403b3f}, 0x1c) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000001040)={{r2, 0xffffffffffffffff}, &(0x7f0000000140), &(0x7f0000000480)=r1}, 0x20) syz_read_part_table(0x593, &(0x7f00000005c0)="$eJzs0r1LK2kUB+A3A5c0e4lcLli4hWCwigqx0CIpRGJIY0RcsbAWLLQQLCwkEq39+AcUv0BsxD6lGEEUYiUpxXpBsUmVZdfZxmplUdnleZrhPefMHF5+E/hPi8Lv7XY7EUJoJ9//9m+nhbFS98TI5FQIiTAbQij8+stfnUQ88fdXz+NzOT6XktnG/vXo82nHTc9dPX0Yxf1aFMJaCGHh4Sj1b+/G/99Z/jK1vrFU3FzJz98XVx8H5/oKXVuFxZ2hg1xlujM3E/9Ytehz9qcbw8e37fLT7vf+b/VGK3sVz2USH7Ofr/U2/72f1Wa1Nd57sjyQ+dG8qGzHub/IHwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA+GBn+cvU+sZScXMlP39fXH0cnOsrdG0VFneGDnKV6c7cTPQ6V4s+Z3+6MXx82y4/7X7v/1ZvtLJX8Vwm8TH7+Vpv89/7WW1WW+O9J8sDmR/Ni8p2nPuL/AEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAACAf6gwVuqeGJmcCiERZkMIo1HH0Z/1dvK1n4jnzuNnOa6XktnG/vXo82nHTc9dPX04EddrUQhrIYSFh6PUp1+Gd/sjAAD///tch0s=") r4 = creat(&(0x7f0000000240)='./file0\x00', 0x0) stat(&(0x7f0000000040)='./file1\x00', &(0x7f0000000380)) fsetxattr$security_capability(r4, &(0x7f0000000100), &(0x7f0000000000)=@v1={0x1000000, [{0x80000000, 0x81}]}, 0xc, 0x0) newfstatat(0xffffffffffffff9c, &(0x7f00000000c0)='./file1\x00', &(0x7f0000001400), 0x400) close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x2) ioctl$TIOCSTI(r4, 0x5412, &(0x7f00000004c0)=0x40) fsync(0xffffffffffffffff) write$binfmt_misc(r4, &(0x7f0000001080)=ANY=[@ANYBLOB="7379d3c6"], 0x4) fallocate(r4, 0x100000011, 0x0, 0x2811fdff) open(&(0x7f0000000100)='.\x00', 0x20c2, 0x2d) open$dir(&(0x7f0000000500)='./file1\x00', 0x1c6c0, 0x0) r5 = openat$vcsu(0xffffffffffffff9c, &(0x7f0000000cc0), 0x400c00, 0x0) lsetxattr$security_selinux(&(0x7f0000001180)='./file1\x00', &(0x7f00000011c0), &(0x7f0000001300)='system_u:object_r:unconfined_exec_t:s0\x00', 0x27, 0x3) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000400)={0xffffffffffffffff, 0xe0, &(0x7f0000000300)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, &(0x7f00000000c0)=[0x0], &(0x7f0000000140), 0x0, 0x8, &(0x7f0000000200)=[{}, {}, {}, {}, {}], 0x28, 0x0, 0x0, 0x0, 0x0, 0x10, 0x8, 0x8, &(0x7f00000002c0)}}, 0x10) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000e80)=@bpf_lsm={0x1d, 0x4, &(0x7f0000000040)=@framed={{0x18, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x73fc}, [@generic={0x9, 0x8, 0x0, 0x7f, 0x200}]}, &(0x7f0000000880)='GPL\x00', 0x1f, 0x93, &(0x7f0000000cc0)=""/147, 0x40f00, 0x2, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, &(0x7f0000000b80)={0x9}, 0x8, 0x10, 0x0, 0x0, r6}, 0x80) r7 = socket$nl_generic(0x10, 0x3, 0x10) r8 = syz_genetlink_get_family_id$tipc(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$TIPC_CMD_ENABLE_BEARER(r7, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000001200)=ANY=[@ANYBLOB="3400000006c08fada241ee0a049e6fba3f36f40da839bbdf54c31768b0026f4261f56d51c5d81ba4cb99f8203c40d0a142fcd75ce26e408d229139f8c4e81109c56a18e453e8a537df21c4ec04a4f3e22f4ac125a28ad43e41107b1f7e79c8573985e54fd665e2913ca74da8c9f3fc2839258c19fa7ac20ebead31206cf280ea73f635bc5418b66554392dfd11874fef72bc53538aae3cb5ef8a80140f4737dd2c572a03ee1d5e3d627e", @ANYRESOCT=0x0, @ANYBLOB="010000000000000000000100000000000000014100000018001700000000000000007564503a73"], 0x34}, 0x1, 0x0, 0x0, 0x1}, 0x0) ioctl$AUTOFS_DEV_IOCTL_PROTOSUBVER(r1, 0xc0189373, &(0x7f0000000540)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x6}}, './file0\x00'}) sendmsg$TIPC_CMD_GET_MAX_PORTS(r5, &(0x7f0000001140)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x40000}, 0xc, &(0x7f0000001100)={&(0x7f00000010c0)={0x1c, r8, 0x400, 0x8000, 0x25dfdbfe, {}, ["", "", "", "", "", "", ""]}, 0x1c}, 0x1, 0x0, 0x0, 0x20048854}, 0x4004) bpf$PROG_LOAD(0x5, &(0x7f0000000e40)={0x5, 0x16, &(0x7f0000001340)=ANY=[@ANYBLOB="390000000100000000000000900000f117fa0000", @ANYRES32=r4, @ANYBLOB="1f00000000000000b703000000000000850000000c000000b61b0453c29f42b5be06c7010b4efffe000000000085000000a900000018150000", @ANYRES32=r3, @ANYBLOB="0000000000000000180100002020782500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b70300000000850000005d000000185500000100000000000000000000009500000000000000"], &(0x7f0000000b80)='syzkaller\x00', 0x1, 0xe8, &(0x7f0000000bc0)=""/232, 0x41000, 0x5b, '\x00', 0x0, 0xe, r5, 0x8, &(0x7f0000000d00)={0x5, 0x2}, 0x8, 0x10, &(0x7f0000000d40)={0x4, 0xe, 0x2, 0x8}, 0x10, r6, r4, 0x5, &(0x7f0000000d80), &(0x7f0000000dc0)=[{0x4, 0x3, 0x0, 0x2}, {0x3, 0x1, 0xa, 0xa}, {0x0, 0x3, 0x2, 0xa}, {0x0, 0x3, 0x7, 0x1}, {0x1, 0x5, 0xb, 0xc}], 0x10, 0x7}, 0x90) [ 123.127291][ T26] team0 (unregistering): Port device team_slave_1 removed [ 123.164738][ T26] team0 (unregistering): Port device team_slave_0 removed [ 123.214473][ T26] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 123.262492][ T26] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 123.280265][ T6300] loop1: detected capacity change from 0 to 2048 20:41:11 executing program 2: r0 = perf_event_open(&(0x7f0000000a40)={0x2, 0x80, 0xcd, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @perf_bp={&(0x7f0000000200), 0x8}, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfb75}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000040)={0x0, 0x4, 0x0, &(0x7f0000000180)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x80) perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x208, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x4, 0x8001}, 0x4000, 0x0, 0x0, 0x0, 0x0, 0x14e, 0xd1}, 0x0, 0xbfffffffffffffff, r0, 0x19893a9f0a0e2244) r1 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) syz_clone(0x2000000, 0x0, 0x0, 0x0, 0x0, 0x0) r2 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x18, 0x5, &(0x7f00000002c0)=ANY=[@ANYBLOB="180000001800ff0f0000000000000000850000006d000000750000000800000095"], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x80) r3 = perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400, 0x80000, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x7, 0x1007}, 0x8006, 0x0, 0x0, 0x1, 0x4, 0x800000, 0x3}, 0x0, 0xffefffffffffffff, 0xffffffffffffffff, 0x9) ioctl$PERF_EVENT_IOC_SET_FILTER(r3, 0x40082406, &(0x7f00000003c0)='memory.numa_stat\x00') perf_event_open(0x0, 0x0, 0x0, r3, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000080)='sched_switch\x00', r2}, 0x10) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000380)={{0x1, 0xffffffffffffffff}, &(0x7f0000000000), &(0x7f0000000240)=r2}, 0x20) r5 = memfd_secret(0x0) syz_io_uring_setup(0x0, &(0x7f0000000300)={0x0, 0x2, 0x0, 0x0, 0x0, 0x0, r5}, 0x0, 0x0) r6 = openat2(0xffffffffffffff9c, &(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)={0x40841}, 0x18) write$binfmt_script(r6, &(0x7f0000000340)=ANY=[], 0xfffffdef) r7 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000bc0)={0x2, 0x4, 0x8, 0x1, 0x80, 0x1, 0x9, '\x00', 0x0, 0xffffffffffffffff, 0x4, 0x1, 0x4}, 0x48) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000d00)={0x11, 0x12, &(0x7f0000000440)=@raw=[@exit, @ringbuf_query={{0x18, 0x1, 0x1, 0x0, r4}}, @ringbuf_output={{0x18, 0x1, 0x1, 0x0, r5}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x10001}, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x4, 0x0, 0x0, 0x2}}, @exit, @initr0={0x18, 0x0, 0x0, 0x0, 0x6349, 0x0, 0x0, 0x0, 0xf685}, @ldst={0x3, 0x2, 0x1, 0x0, 0xb, 0x2543a83bb932833c, 0x1}], &(0x7f0000000940)='syzkaller\x00', 0x80000001, 0x27, &(0x7f0000000980)=""/39, 0x41000, 0x40, '\x00', 0x0, 0x0, r6, 0x8, &(0x7f0000000ac0)={0x3, 0x1}, 0x8, 0x10, &(0x7f0000000b00)={0x2, 0xc, 0xfffffe00, 0x2}, 0x10, 0x0, 0x0, 0x5, &(0x7f0000000c40)=[r2, 0x1, 0x1, 0xffffffffffffffff, r7, r1], &(0x7f0000000c80)=[{0x4, 0x1, 0x8, 0xc}, {0x0, 0x4, 0xf, 0x4}, {0x1, 0x2, 0xd, 0x6}, {0x0, 0x4, 0x10, 0xc}, {0x2, 0x4, 0xd, 0x1}], 0x10, 0x20}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000280)={&(0x7f0000000140)='ext4_ext_show_extent\x00', r2}, 0x10) r8 = perf_event_open(&(0x7f0000000080)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) r9 = gettid() perf_event_open$cgroup(&(0x7f0000000300)={0x5, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_bp={&(0x7f0000000100)}, 0x81252, 0x6, 0x80000001, 0x0, 0x0, 0x0, 0x6, 0x0, 0x6, 0x0, 0x6}, 0xffffffffffffffff, 0xe, 0xffffffffffffffff, 0xc) perf_event_open(0x0, r9, 0x2, 0xffffffffffffffff, 0xb) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) perf_event_open(&(0x7f0000000840)={0x2, 0x80, 0x0, 0x7, 0x0, 0x80, 0x0, 0x3, 0x0, 0x9, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, @perf_config_ext={0x8000000000, 0x3}, 0x46c73247dfbe0d, 0x1007e, 0x0, 0x2, 0x0, 0x0, 0x6, 0x0, 0xffffffff, 0x0, 0x1c}, 0x0, 0x9, 0xffffffffffffffff, 0xd) bpf$PROG_LOAD(0x5, &(0x7f0000000780)={0x14, 0x4, &(0x7f00000008c0)=ANY=[@ANYBLOB="850000006b00000018150000a3df7ddd9621fb0201050062d91123e632b2f902ad1e9f1cc7a66ed51ac8a4070000000000000019a83f0b7c9502871fb1ca3dc499e804bbbc359859ed6fd9f104fc7ed900d122072d8275a24d000000000601c3a63953a7b36fe458", @ANYRES32, @ANYBLOB="00000000000000002d59e4eda4000000"], &(0x7f0000000400)='syzkaller\x00', 0xfff, 0xe3, &(0x7f0000000580)=""/227, 0x0, 0x4, '\x00', 0x0, 0x24, 0xffffffffffffffff, 0x8, &(0x7f0000000500)={0x1, 0x3}, 0x8, 0x10, &(0x7f0000000680)={0x5, 0x6, 0x81, 0x9}, 0x10, 0xffffffffffffffff, 0xffffffffffffffff, 0x0, &(0x7f00000006c0)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, r8]}, 0x80) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x4030582a, &(0x7f0000000040)=0x91) [ 123.349161][ T26] bond0 (unregistering): Released all slaves [ 123.373806][ T6300] loop1: p2 p3 p7 [ 123.430282][ T2775] loop1: p2 p3 p7 20:41:11 executing program 1: ioctl$BTRFS_IOC_LOGICAL_INO(0xffffffffffffffff, 0xc0389424, &(0x7f0000000180)={0x1, 0x20, '\x00', 0x1, &(0x7f0000000080)=[0x0, 0x0, 0x0, 0x0]}) r0 = socket$inet6(0xa, 0x3, 0x6) r1 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) r2 = dup2(r1, r0) ioctl$FIDEDUPERANGE(r0, 0xc0189436, &(0x7f0000000f00)=ANY=[@ANYBLOB="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"]) ioctl$TIOCSBRK(r2, 0x5427) recvfrom$inet6(0xffffffffffffffff, &(0x7f0000000280)=""/134, 0x86, 0x40000102, &(0x7f0000000340)={0xa, 0x4e21, 0x77f, @mcast1, 0x403b3f}, 0x1c) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000001040)={{r2, 0xffffffffffffffff}, &(0x7f0000000140), &(0x7f0000000480)=r1}, 0x20) syz_read_part_table(0x593, &(0x7f00000005c0)="$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") r4 = creat(&(0x7f0000000240)='./file0\x00', 0x0) stat(&(0x7f0000000040)='./file1\x00', &(0x7f0000000380)) fsetxattr$security_capability(r4, &(0x7f0000000100), &(0x7f0000000000)=@v1={0x1000000, [{0x80000000, 0x81}]}, 0xc, 0x0) newfstatat(0xffffffffffffff9c, &(0x7f00000000c0)='./file1\x00', &(0x7f0000001400), 0x400) close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x2) ioctl$TIOCSTI(r4, 0x5412, &(0x7f00000004c0)=0x40) fsync(0xffffffffffffffff) write$binfmt_misc(r4, &(0x7f0000001080)=ANY=[@ANYBLOB="7379d3c6"], 0x4) fallocate(r4, 0x100000011, 0x0, 0x2811fdff) open(&(0x7f0000000100)='.\x00', 0x20c2, 0x2d) open$dir(&(0x7f0000000500)='./file1\x00', 0x1c6c0, 0x0) r5 = openat$vcsu(0xffffffffffffff9c, &(0x7f0000000cc0), 0x400c00, 0x0) lsetxattr$security_selinux(&(0x7f0000001180)='./file1\x00', &(0x7f00000011c0), &(0x7f0000001300)='system_u:object_r:unconfined_exec_t:s0\x00', 0x27, 0x3) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000400)={0xffffffffffffffff, 0xe0, &(0x7f0000000300)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, &(0x7f00000000c0)=[0x0], &(0x7f0000000140), 0x0, 0x8, &(0x7f0000000200)=[{}, {}, {}, {}, {}], 0x28, 0x0, 0x0, 0x0, 0x0, 0x10, 0x8, 0x8, &(0x7f00000002c0)}}, 0x10) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000e80)=@bpf_lsm={0x1d, 0x4, &(0x7f0000000040)=@framed={{0x18, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x73fc}, [@generic={0x9, 0x8, 0x0, 0x7f, 0x200}]}, &(0x7f0000000880)='GPL\x00', 0x1f, 0x93, &(0x7f0000000cc0)=""/147, 0x40f00, 0x2, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, &(0x7f0000000b80)={0x9}, 0x8, 0x10, 0x0, 0x0, r6}, 0x80) r7 = socket$nl_generic(0x10, 0x3, 0x10) r8 = syz_genetlink_get_family_id$tipc(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$TIPC_CMD_ENABLE_BEARER(r7, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000001200)=ANY=[@ANYBLOB="3400000006c08fada241ee0a049e6fba3f36f40da839bbdf54c31768b0026f4261f56d51c5d81ba4cb99f8203c40d0a142fcd75ce26e408d229139f8c4e81109c56a18e453e8a537df21c4ec04a4f3e22f4ac125a28ad43e41107b1f7e79c8573985e54fd665e2913ca74da8c9f3fc2839258c19fa7ac20ebead31206cf280ea73f635bc5418b66554392dfd11874fef72bc53538aae3cb5ef8a80140f4737dd2c572a03ee1d5e3d627e", @ANYRESOCT=0x0, @ANYBLOB="010000000000000000000100000000000000014100000018001700000000000000007564503a73"], 0x34}, 0x1, 0x0, 0x0, 0x1}, 0x0) ioctl$AUTOFS_DEV_IOCTL_PROTOSUBVER(r1, 0xc0189373, &(0x7f0000000540)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x6}}, './file0\x00'}) sendmsg$TIPC_CMD_GET_MAX_PORTS(r5, &(0x7f0000001140)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x40000}, 0xc, &(0x7f0000001100)={&(0x7f00000010c0)={0x1c, r8, 0x400, 0x8000, 0x25dfdbfe, {}, ["", "", "", "", "", "", ""]}, 0x1c}, 0x1, 0x0, 0x0, 0x20048854}, 0x4004) bpf$PROG_LOAD(0x5, &(0x7f0000000e40)={0x5, 0x16, &(0x7f0000001340)=ANY=[@ANYBLOB="390000000100000000000000900000f117fa0000", @ANYRES32=r4, @ANYBLOB="1f00000000000000b703000000000000850000000c000000b61b0453c29f42b5be06c7010b4efffe000000000085000000a900000018150000", @ANYRES32=r3, @ANYBLOB="0000000000000000180100002020782500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b70300000000850000005d000000185500000100000000000000000000009500000000000000"], &(0x7f0000000b80)='syzkaller\x00', 0x1, 0xe8, &(0x7f0000000bc0)=""/232, 0x41000, 0x5b, '\x00', 0x0, 0xe, r5, 0x8, &(0x7f0000000d00)={0x5, 0x2}, 0x8, 0x10, &(0x7f0000000d40)={0x4, 0xe, 0x2, 0x8}, 0x10, r6, r4, 0x5, &(0x7f0000000d80), &(0x7f0000000dc0)=[{0x4, 0x3, 0x0, 0x2}, {0x3, 0x1, 0xa, 0xa}, {0x0, 0x3, 0x2, 0xa}, {0x0, 0x3, 0x7, 0x1}, {0x1, 0x5, 0xb, 0xc}], 0x10, 0x7}, 0x90) [ 123.548378][ T3326] I/O error, dev loop1, sector 0 op 0x0:(READ) flags 0x80700 phys_seg 1 prio class 0 [ 123.595813][ T6312] loop1: detected capacity change from 0 to 2048 [ 123.743617][ T6312] loop1: p2 p3 p7 20:41:12 executing program 1: ioctl$BTRFS_IOC_LOGICAL_INO(0xffffffffffffffff, 0xc0389424, &(0x7f0000000180)={0x1, 0x20, '\x00', 0x1, &(0x7f0000000080)=[0x0, 0x0, 0x0, 0x0]}) r0 = socket$inet6(0xa, 0x3, 0x6) r1 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) r2 = dup2(r1, r0) ioctl$FIDEDUPERANGE(r0, 0xc0189436, &(0x7f0000000f00)=ANY=[@ANYBLOB="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"]) ioctl$TIOCSBRK(r2, 0x5427) recvfrom$inet6(0xffffffffffffffff, &(0x7f0000000280)=""/134, 0x86, 0x40000102, &(0x7f0000000340)={0xa, 0x4e21, 0x77f, @mcast1, 0x403b3f}, 0x1c) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000001040)={{r2, 0xffffffffffffffff}, &(0x7f0000000140), &(0x7f0000000480)=r1}, 0x20) syz_read_part_table(0x593, &(0x7f00000005c0)="$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") r4 = creat(&(0x7f0000000240)='./file0\x00', 0x0) stat(&(0x7f0000000040)='./file1\x00', &(0x7f0000000380)) fsetxattr$security_capability(r4, &(0x7f0000000100), &(0x7f0000000000)=@v1={0x1000000, [{0x80000000, 0x81}]}, 0xc, 0x0) newfstatat(0xffffffffffffff9c, &(0x7f00000000c0)='./file1\x00', &(0x7f0000001400), 0x400) close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x2) ioctl$TIOCSTI(r4, 0x5412, &(0x7f00000004c0)=0x40) fsync(0xffffffffffffffff) write$binfmt_misc(r4, &(0x7f0000001080)=ANY=[@ANYBLOB="7379d3c6"], 0x4) fallocate(r4, 0x100000011, 0x0, 0x2811fdff) open(&(0x7f0000000100)='.\x00', 0x20c2, 0x2d) open$dir(&(0x7f0000000500)='./file1\x00', 0x1c6c0, 0x0) r5 = openat$vcsu(0xffffffffffffff9c, &(0x7f0000000cc0), 0x400c00, 0x0) lsetxattr$security_selinux(&(0x7f0000001180)='./file1\x00', &(0x7f00000011c0), &(0x7f0000001300)='system_u:object_r:unconfined_exec_t:s0\x00', 0x27, 0x3) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000400)={0xffffffffffffffff, 0xe0, &(0x7f0000000300)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, &(0x7f00000000c0)=[0x0], &(0x7f0000000140), 0x0, 0x8, &(0x7f0000000200)=[{}, {}, {}, {}, {}], 0x28, 0x0, 0x0, 0x0, 0x0, 0x10, 0x8, 0x8, &(0x7f00000002c0)}}, 0x10) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000e80)=@bpf_lsm={0x1d, 0x4, &(0x7f0000000040)=@framed={{0x18, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x73fc}, [@generic={0x9, 0x8, 0x0, 0x7f, 0x200}]}, &(0x7f0000000880)='GPL\x00', 0x1f, 0x93, &(0x7f0000000cc0)=""/147, 0x40f00, 0x2, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, &(0x7f0000000b80)={0x9}, 0x8, 0x10, 0x0, 0x0, r6}, 0x80) r7 = socket$nl_generic(0x10, 0x3, 0x10) r8 = syz_genetlink_get_family_id$tipc(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$TIPC_CMD_ENABLE_BEARER(r7, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000001200)=ANY=[@ANYBLOB="3400000006c08fada241ee0a049e6fba3f36f40da839bbdf54c31768b0026f4261f56d51c5d81ba4cb99f8203c40d0a142fcd75ce26e408d229139f8c4e81109c56a18e453e8a537df21c4ec04a4f3e22f4ac125a28ad43e41107b1f7e79c8573985e54fd665e2913ca74da8c9f3fc2839258c19fa7ac20ebead31206cf280ea73f635bc5418b66554392dfd11874fef72bc53538aae3cb5ef8a80140f4737dd2c572a03ee1d5e3d627e", @ANYRESOCT=0x0, @ANYBLOB="010000000000000000000100000000000000014100000018001700000000000000007564503a73"], 0x34}, 0x1, 0x0, 0x0, 0x1}, 0x0) ioctl$AUTOFS_DEV_IOCTL_PROTOSUBVER(r1, 0xc0189373, &(0x7f0000000540)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x6}}, './file0\x00'}) sendmsg$TIPC_CMD_GET_MAX_PORTS(r5, &(0x7f0000001140)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x40000}, 0xc, &(0x7f0000001100)={&(0x7f00000010c0)={0x1c, r8, 0x400, 0x8000, 0x25dfdbfe, {}, ["", "", "", "", "", "", ""]}, 0x1c}, 0x1, 0x0, 0x0, 0x20048854}, 0x4004) bpf$PROG_LOAD(0x5, &(0x7f0000000e40)={0x5, 0x16, &(0x7f0000001340)=ANY=[@ANYBLOB="390000000100000000000000900000f117fa0000", @ANYRES32=r4, @ANYBLOB="1f00000000000000b703000000000000850000000c000000b61b0453c29f42b5be06c7010b4efffe000000000085000000a900000018150000", @ANYRES32=r3, @ANYBLOB="0000000000000000180100002020782500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b70300000000850000005d000000185500000100000000000000000000009500000000000000"], &(0x7f0000000b80)='syzkaller\x00', 0x1, 0xe8, &(0x7f0000000bc0)=""/232, 0x41000, 0x5b, '\x00', 0x0, 0xe, r5, 0x8, &(0x7f0000000d00)={0x5, 0x2}, 0x8, 0x10, &(0x7f0000000d40)={0x4, 0xe, 0x2, 0x8}, 0x10, r6, r4, 0x5, &(0x7f0000000d80), &(0x7f0000000dc0)=[{0x4, 0x3, 0x0, 0x2}, {0x3, 0x1, 0xa, 0xa}, {0x0, 0x3, 0x2, 0xa}, {0x0, 0x3, 0x7, 0x1}, {0x1, 0x5, 0xb, 0xc}], 0x10, 0x7}, 0x90) [ 123.955047][ T6325] loop1: detected capacity change from 0 to 2048 [ 124.049153][ T6325] loop1: p2 p3 p7 20:41:12 executing program 4: r0 = perf_event_open(&(0x7f0000000a40)={0x2, 0x80, 0xcd, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @perf_bp={&(0x7f0000000200), 0x8}, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfb75}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000040)={0x0, 0x4, 0x0, &(0x7f0000000180)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x80) perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x208, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x4, 0x8001}, 0x4000, 0x0, 0x0, 0x0, 0x0, 0x14e, 0xd1}, 0x0, 0xbfffffffffffffff, r0, 0x19893a9f0a0e2244) r1 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) syz_clone(0x2000000, 0x0, 0x0, 0x0, 0x0, 0x0) r2 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x18, 0x5, &(0x7f00000002c0)=ANY=[@ANYBLOB="180000001800ff0f0000000000000000850000006d000000750000000800000095"], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x80) r3 = perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400, 0x80000, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x7, 0x1007}, 0x8006, 0x0, 0x0, 0x1, 0x4, 0x800000, 0x3}, 0x0, 0xffefffffffffffff, 0xffffffffffffffff, 0x9) ioctl$PERF_EVENT_IOC_SET_FILTER(r3, 0x40082406, &(0x7f00000003c0)='memory.numa_stat\x00') perf_event_open(0x0, 0x0, 0x0, r3, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000080)='sched_switch\x00', r2}, 0x10) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000380)={{0x1, 0xffffffffffffffff}, &(0x7f0000000000), &(0x7f0000000240)=r2}, 0x20) r5 = memfd_secret(0x0) syz_io_uring_setup(0x0, &(0x7f0000000300)={0x0, 0x2, 0x0, 0x0, 0x0, 0x0, r5}, 0x0, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f00000009c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000000a00)=0x14) r7 = openat2(0xffffffffffffff9c, &(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)={0x40841}, 0x18) write$binfmt_script(r7, &(0x7f0000000340)=ANY=[], 0xfffffdef) r8 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000b40)={0x1b, 0x0, 0x0, 0x7, 0x0, 0xffffffffffffffff, 0x200, '\x00', 0x0, 0xffffffffffffffff, 0x3, 0x1, 0x4}, 0x48) r9 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000bc0)={0x2, 0x4, 0x8, 0x1, 0x80, 0x1, 0x9, '\x00', 0x0, 0xffffffffffffffff, 0x4, 0x1, 0x4}, 0x48) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000d00)={0x11, 0x12, &(0x7f0000000440)=@raw=[@exit, @ringbuf_query={{0x18, 0x1, 0x1, 0x0, r4}}, @ringbuf_output={{0x18, 0x1, 0x1, 0x0, r5}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x10001}, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x4, 0x0, 0x0, 0x2}}, @exit, @initr0={0x18, 0x0, 0x0, 0x0, 0x6349, 0x0, 0x0, 0x0, 0xf685}, @ldst={0x3, 0x2, 0x1, 0x0, 0xb, 0x2543a83bb932833c, 0x1}], &(0x7f0000000940)='syzkaller\x00', 0x80000001, 0x27, &(0x7f0000000980)=""/39, 0x41000, 0x40, '\x00', r6, 0x0, r7, 0x8, &(0x7f0000000ac0)={0x3, 0x1}, 0x8, 0x10, &(0x7f0000000b00)={0x2, 0xc, 0xfffffe00, 0x2}, 0x10, 0x0, 0x0, 0x5, &(0x7f0000000c40)=[r2, 0x1, 0x1, r8, r9, r1], &(0x7f0000000c80)=[{0x4, 0x1, 0x8, 0xc}, {0x0, 0x4, 0xf, 0x4}, {0x1, 0x2, 0xd, 0x6}, {0x0, 0x4, 0x10, 0xc}, {0x2, 0x4, 0xd, 0x1}], 0x10, 0x20}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000280)={&(0x7f0000000140)='ext4_ext_show_extent\x00', r2}, 0x10) r10 = perf_event_open(&(0x7f0000000080)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x2, 0xffffffffffffffff, 0xb) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000780)={0x14, 0x4, &(0x7f00000008c0)=ANY=[@ANYBLOB="850000006b00000018150000a3df7ddd9621fb0201050062d91123e632b2f902ad1e9f1cc7a66ed51ac8a4070000000000000019a83f0b7c9502871fb1ca3dc499e804bbbc359859ed6fd9f104fc7ed900d122072d8275a24d000000000601c3a63953a7b36fe458", @ANYRES32, @ANYBLOB="00000000000000002d59e4eda4000000"], &(0x7f0000000400)='syzkaller\x00', 0xfff, 0xe3, &(0x7f0000000580)=""/227, 0x0, 0x4, '\x00', 0x0, 0x24, 0xffffffffffffffff, 0x8, &(0x7f0000000500)={0x1, 0x3}, 0x8, 0x10, &(0x7f0000000680)={0x5, 0x6, 0x81, 0x9}, 0x10, 0xffffffffffffffff, 0xffffffffffffffff, 0x0, &(0x7f00000006c0)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, r10]}, 0x80) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x4030582a, &(0x7f0000000040)=0x91) 20:41:12 executing program 1: ioctl$BTRFS_IOC_LOGICAL_INO(0xffffffffffffffff, 0xc0389424, &(0x7f0000000180)={0x1, 0x20, '\x00', 0x1, &(0x7f0000000080)=[0x0, 0x0, 0x0, 0x0]}) r0 = socket$inet6(0xa, 0x3, 0x6) r1 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) r2 = dup2(r1, r0) ioctl$FIDEDUPERANGE(r0, 0xc0189436, &(0x7f0000000f00)=ANY=[@ANYBLOB="08000000000000000000000000000000000000002000000032057e68d5d647f4ed243c9d097db4c7bae602f8d4c84b5325f3d737af1c3ebe2901b056ac84d04eb9d8bfd4771499d444ff07000033206062c9a0527d2d0e4b0000fa0693ec3785977184911bffc60554e8950e91e1a8209818b4eb3440ae351192e1d7cf54ba6743f2db330481aac17f0961506d7ebd7ca999cf4e148c1ef2880f63693dfee2a6f2fafec2c059fd15db654600000000000000000076da8ec51705470a42729df6a32122af2a673d7409ca1b8a0da065e2bf7790c86a6b3014e1ef5d1c4000d3dff081d5a4c403971fe8869ab4973ffc7b24b6fbb4341ac1a0f5d56b64b9d23d6855e653f1e0418a6d9838196a7b145310a9b4c467199ecc3bd47b85aae47754bf695bdb85ea03f70beab5732a014c5f525bf2f9b9c6bd545e1a"]) ioctl$TIOCSBRK(r2, 0x5427) recvfrom$inet6(0xffffffffffffffff, &(0x7f0000000280)=""/134, 0x86, 0x40000102, &(0x7f0000000340)={0xa, 0x4e21, 0x77f, @mcast1, 0x403b3f}, 0x1c) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000001040)={{r2, 0xffffffffffffffff}, &(0x7f0000000140), &(0x7f0000000480)=r1}, 0x20) syz_read_part_table(0x593, &(0x7f00000005c0)="$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") r4 = creat(&(0x7f0000000240)='./file0\x00', 0x0) stat(&(0x7f0000000040)='./file1\x00', &(0x7f0000000380)) fsetxattr$security_capability(r4, &(0x7f0000000100), &(0x7f0000000000)=@v1={0x1000000, [{0x80000000, 0x81}]}, 0xc, 0x0) newfstatat(0xffffffffffffff9c, &(0x7f00000000c0)='./file1\x00', &(0x7f0000001400), 0x400) close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x2) ioctl$TIOCSTI(r4, 0x5412, &(0x7f00000004c0)=0x40) fsync(0xffffffffffffffff) write$binfmt_misc(r4, &(0x7f0000001080)=ANY=[@ANYBLOB="7379d3c6"], 0x4) fallocate(r4, 0x100000011, 0x0, 0x2811fdff) open(&(0x7f0000000100)='.\x00', 0x20c2, 0x2d) open$dir(&(0x7f0000000500)='./file1\x00', 0x1c6c0, 0x0) r5 = openat$vcsu(0xffffffffffffff9c, &(0x7f0000000cc0), 0x400c00, 0x0) lsetxattr$security_selinux(&(0x7f0000001180)='./file1\x00', &(0x7f00000011c0), &(0x7f0000001300)='system_u:object_r:unconfined_exec_t:s0\x00', 0x27, 0x3) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000400)={0xffffffffffffffff, 0xe0, &(0x7f0000000300)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, &(0x7f00000000c0)=[0x0], &(0x7f0000000140), 0x0, 0x8, &(0x7f0000000200)=[{}, {}, {}, {}, {}], 0x28, 0x0, 0x0, 0x0, 0x0, 0x10, 0x8, 0x8, &(0x7f00000002c0)}}, 0x10) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000e80)=@bpf_lsm={0x1d, 0x4, &(0x7f0000000040)=@framed={{0x18, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x73fc}, [@generic={0x9, 0x8, 0x0, 0x7f, 0x200}]}, &(0x7f0000000880)='GPL\x00', 0x1f, 0x93, &(0x7f0000000cc0)=""/147, 0x40f00, 0x2, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, &(0x7f0000000b80)={0x9}, 0x8, 0x10, 0x0, 0x0, r6}, 0x80) r7 = socket$nl_generic(0x10, 0x3, 0x10) r8 = syz_genetlink_get_family_id$tipc(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$TIPC_CMD_ENABLE_BEARER(r7, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000001200)=ANY=[@ANYBLOB="3400000006c08fada241ee0a049e6fba3f36f40da839bbdf54c31768b0026f4261f56d51c5d81ba4cb99f8203c40d0a142fcd75ce26e408d229139f8c4e81109c56a18e453e8a537df21c4ec04a4f3e22f4ac125a28ad43e41107b1f7e79c8573985e54fd665e2913ca74da8c9f3fc2839258c19fa7ac20ebead31206cf280ea73f635bc5418b66554392dfd11874fef72bc53538aae3cb5ef8a80140f4737dd2c572a03ee1d5e3d627e", @ANYRESOCT=0x0, @ANYBLOB="010000000000000000000100000000000000014100000018001700000000000000007564503a73"], 0x34}, 0x1, 0x0, 0x0, 0x1}, 0x0) ioctl$AUTOFS_DEV_IOCTL_PROTOSUBVER(r1, 0xc0189373, &(0x7f0000000540)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x6}}, './file0\x00'}) sendmsg$TIPC_CMD_GET_MAX_PORTS(r5, &(0x7f0000001140)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x40000}, 0xc, &(0x7f0000001100)={&(0x7f00000010c0)={0x1c, r8, 0x400, 0x8000, 0x25dfdbfe, {}, ["", "", "", "", "", "", ""]}, 0x1c}, 0x1, 0x0, 0x0, 0x20048854}, 0x4004) bpf$PROG_LOAD(0x5, &(0x7f0000000e40)={0x5, 0x16, &(0x7f0000001340)=ANY=[@ANYBLOB="390000000100000000000000900000f117fa0000", @ANYRES32=r4, @ANYBLOB="1f00000000000000b703000000000000850000000c000000b61b0453c29f42b5be06c7010b4efffe000000000085000000a900000018150000", @ANYRES32=r3, @ANYBLOB="0000000000000000180100002020782500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b70300000000850000005d000000185500000100000000000000000000009500000000000000"], &(0x7f0000000b80)='syzkaller\x00', 0x1, 0xe8, &(0x7f0000000bc0)=""/232, 0x41000, 0x5b, '\x00', 0x0, 0xe, r5, 0x8, &(0x7f0000000d00)={0x5, 0x2}, 0x8, 0x10, &(0x7f0000000d40)={0x4, 0xe, 0x2, 0x8}, 0x10, r6, r4, 0x5, &(0x7f0000000d80), &(0x7f0000000dc0)=[{0x4, 0x3, 0x0, 0x2}, {0x3, 0x1, 0xa, 0xa}, {0x0, 0x3, 0x2, 0xa}, {0x0, 0x3, 0x7, 0x1}, {0x1, 0x5, 0xb, 0xc}], 0x10, 0x7}, 0x90) [ 124.230641][ T6347] loop1: detected capacity change from 0 to 2048 [ 124.285815][ T6319] chnl_net:caif_netlink_parms(): no params data found [ 124.325433][ T6347] loop1: p2 p3 p7 20:41:12 executing program 2: r0 = perf_event_open(&(0x7f0000000a40)={0x2, 0x80, 0xcd, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @perf_bp={&(0x7f0000000200), 0x8}, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfb75}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000040)={0x0, 0x4, 0x0, &(0x7f0000000180)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x80) perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x208, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x4, 0x8001}, 0x4000, 0x0, 0x0, 0x0, 0x0, 0x14e, 0xd1}, 0x0, 0xbfffffffffffffff, r0, 0x19893a9f0a0e2244) r1 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) syz_clone(0x2000000, 0x0, 0x0, 0x0, 0x0, 0x0) r2 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x18, 0x5, &(0x7f00000002c0)=ANY=[@ANYBLOB="180000001800ff0f0000000000000000850000006d000000750000000800000095"], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x80) r3 = perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400, 0x80000, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x7, 0x1007}, 0x8006, 0x0, 0x0, 0x1, 0x4, 0x800000, 0x3}, 0x0, 0xffefffffffffffff, 0xffffffffffffffff, 0x9) ioctl$PERF_EVENT_IOC_SET_FILTER(r3, 0x40082406, &(0x7f00000003c0)='memory.numa_stat\x00') perf_event_open(0x0, 0x0, 0x0, r3, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000080)='sched_switch\x00', r2}, 0x10) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000380)={{0x1, 0xffffffffffffffff}, &(0x7f0000000000), &(0x7f0000000240)=r2}, 0x20) r5 = memfd_secret(0x0) getsockname$packet(0xffffffffffffffff, &(0x7f00000009c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000000a00)=0x14) r7 = openat2(0xffffffffffffff9c, &(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)={0x40841}, 0x18) write$binfmt_script(r7, &(0x7f0000000340)=ANY=[], 0xfffffdef) r8 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000bc0)={0x2, 0x4, 0x8, 0x1, 0x80, 0x1, 0x9, '\x00', 0x0, 0xffffffffffffffff, 0x4, 0x1, 0x4}, 0x48) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000d00)={0x11, 0x12, &(0x7f0000000440)=@raw=[@exit, @ringbuf_query={{0x18, 0x1, 0x1, 0x0, r4}}, @ringbuf_output={{0x18, 0x1, 0x1, 0x0, r5}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x10001}, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x4, 0x0, 0x0, 0x2}}, @exit, @initr0={0x18, 0x0, 0x0, 0x0, 0x6349, 0x0, 0x0, 0x0, 0xf685}, @ldst={0x3, 0x2, 0x1, 0x0, 0xb, 0x2543a83bb932833c, 0x1}], &(0x7f0000000940)='syzkaller\x00', 0x80000001, 0x27, &(0x7f0000000980)=""/39, 0x41000, 0x40, '\x00', r6, 0x0, r7, 0x8, &(0x7f0000000ac0)={0x3, 0x1}, 0x8, 0x10, &(0x7f0000000b00)={0x2, 0xc, 0xfffffe00, 0x2}, 0x10, 0x0, 0x0, 0x5, &(0x7f0000000c40)=[r2, 0x1, 0x1, 0xffffffffffffffff, r8, r1], &(0x7f0000000c80)=[{0x4, 0x1, 0x8, 0xc}, {0x0, 0x4, 0xf, 0x4}, {0x1, 0x2, 0xd, 0x6}, {0x0, 0x4, 0x10, 0xc}, {0x2, 0x4, 0xd, 0x1}], 0x10, 0x20}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000280)={&(0x7f0000000140)='ext4_ext_show_extent\x00', r2}, 0x10) r9 = perf_event_open(&(0x7f0000000080)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) r10 = gettid() perf_event_open$cgroup(&(0x7f0000000300)={0x5, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_bp={&(0x7f0000000100)}, 0x81252, 0x6, 0x80000001, 0x0, 0x0, 0x0, 0x6, 0x0, 0x6, 0x0, 0x6}, 0xffffffffffffffff, 0xe, 0xffffffffffffffff, 0xc) perf_event_open(0x0, r10, 0x2, 0xffffffffffffffff, 0xb) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) perf_event_open(&(0x7f0000000840)={0x2, 0x80, 0x0, 0x7, 0x0, 0x80, 0x0, 0x3, 0x0, 0x9, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, @perf_config_ext={0x8000000000, 0x3}, 0x46c73247dfbe0d, 0x1007e, 0x0, 0x2, 0x0, 0x0, 0x6, 0x0, 0xffffffff, 0x0, 0x1c}, 0x0, 0x9, 0xffffffffffffffff, 0xd) bpf$PROG_LOAD(0x5, &(0x7f0000000780)={0x14, 0x4, &(0x7f00000008c0)=ANY=[@ANYBLOB="850000006b00000018150000a3df7ddd9621fb0201050062d91123e632b2f902ad1e9f1cc7a66ed51ac8a4070000000000000019a83f0b7c9502871fb1ca3dc499e804bbbc359859ed6fd9f104fc7ed900d122072d8275a24d000000000601c3a63953a7b36fe458", @ANYRES32, @ANYBLOB="00000000000000002d59e4eda4000000"], &(0x7f0000000400)='syzkaller\x00', 0xfff, 0xe3, &(0x7f0000000580)=""/227, 0x0, 0x4, '\x00', 0x0, 0x24, 0xffffffffffffffff, 0x8, &(0x7f0000000500)={0x1, 0x3}, 0x8, 0x10, &(0x7f0000000680)={0x5, 0x6, 0x81, 0x9}, 0x10, 0xffffffffffffffff, 0xffffffffffffffff, 0x0, &(0x7f00000006c0)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, r9]}, 0x80) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x4030582a, &(0x7f0000000040)=0x91) 20:41:12 executing program 1: ioctl$BTRFS_IOC_LOGICAL_INO(0xffffffffffffffff, 0xc0389424, &(0x7f0000000180)={0x1, 0x20, '\x00', 0x1, &(0x7f0000000080)=[0x0, 0x0, 0x0, 0x0]}) r0 = socket$inet6(0xa, 0x3, 0x6) r1 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) r2 = dup2(r1, r0) ioctl$FIDEDUPERANGE(r0, 0xc0189436, &(0x7f0000000f00)=ANY=[@ANYBLOB="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"]) ioctl$TIOCSBRK(r2, 0x5427) recvfrom$inet6(0xffffffffffffffff, &(0x7f0000000280)=""/134, 0x86, 0x40000102, &(0x7f0000000340)={0xa, 0x4e21, 0x77f, @mcast1, 0x403b3f}, 0x1c) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000001040)={{r2, 0xffffffffffffffff}, &(0x7f0000000140), &(0x7f0000000480)=r1}, 0x20) syz_read_part_table(0x593, &(0x7f00000005c0)="$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") r4 = creat(&(0x7f0000000240)='./file0\x00', 0x0) stat(&(0x7f0000000040)='./file1\x00', &(0x7f0000000380)) fsetxattr$security_capability(r4, &(0x7f0000000100), &(0x7f0000000000)=@v1={0x1000000, [{0x80000000, 0x81}]}, 0xc, 0x0) newfstatat(0xffffffffffffff9c, &(0x7f00000000c0)='./file1\x00', &(0x7f0000001400), 0x400) close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x2) ioctl$TIOCSTI(r4, 0x5412, &(0x7f00000004c0)=0x40) fsync(0xffffffffffffffff) write$binfmt_misc(r4, &(0x7f0000001080)=ANY=[@ANYBLOB="7379d3c6"], 0x4) fallocate(r4, 0x100000011, 0x0, 0x2811fdff) open(&(0x7f0000000100)='.\x00', 0x20c2, 0x2d) open$dir(&(0x7f0000000500)='./file1\x00', 0x1c6c0, 0x0) r5 = openat$vcsu(0xffffffffffffff9c, &(0x7f0000000cc0), 0x400c00, 0x0) lsetxattr$security_selinux(&(0x7f0000001180)='./file1\x00', &(0x7f00000011c0), &(0x7f0000001300)='system_u:object_r:unconfined_exec_t:s0\x00', 0x27, 0x3) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000400)={0xffffffffffffffff, 0xe0, &(0x7f0000000300)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, &(0x7f00000000c0)=[0x0], &(0x7f0000000140), 0x0, 0x8, &(0x7f0000000200)=[{}, {}, {}, {}, {}], 0x28, 0x0, 0x0, 0x0, 0x0, 0x10, 0x8, 0x8, &(0x7f00000002c0)}}, 0x10) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000e80)=@bpf_lsm={0x1d, 0x4, &(0x7f0000000040)=@framed={{0x18, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x73fc}, [@generic={0x9, 0x8, 0x0, 0x7f, 0x200}]}, &(0x7f0000000880)='GPL\x00', 0x1f, 0x93, &(0x7f0000000cc0)=""/147, 0x40f00, 0x2, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, &(0x7f0000000b80)={0x9}, 0x8, 0x10, 0x0, 0x0, r6}, 0x80) r7 = socket$nl_generic(0x10, 0x3, 0x10) r8 = syz_genetlink_get_family_id$tipc(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$TIPC_CMD_ENABLE_BEARER(r7, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000001200)=ANY=[@ANYBLOB="3400000006c08fada241ee0a049e6fba3f36f40da839bbdf54c31768b0026f4261f56d51c5d81ba4cb99f8203c40d0a142fcd75ce26e408d229139f8c4e81109c56a18e453e8a537df21c4ec04a4f3e22f4ac125a28ad43e41107b1f7e79c8573985e54fd665e2913ca74da8c9f3fc2839258c19fa7ac20ebead31206cf280ea73f635bc5418b66554392dfd11874fef72bc53538aae3cb5ef8a80140f4737dd2c572a03ee1d5e3d627e", @ANYRESOCT=0x0, @ANYBLOB="010000000000000000000100000000000000014100000018001700000000000000007564503a73"], 0x34}, 0x1, 0x0, 0x0, 0x1}, 0x0) ioctl$AUTOFS_DEV_IOCTL_PROTOSUBVER(r1, 0xc0189373, &(0x7f0000000540)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x6}}, './file0\x00'}) sendmsg$TIPC_CMD_GET_MAX_PORTS(r5, &(0x7f0000001140)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x40000}, 0xc, &(0x7f0000001100)={&(0x7f00000010c0)={0x1c, r8, 0x400, 0x8000, 0x25dfdbfe, {}, ["", "", "", "", "", "", ""]}, 0x1c}, 0x1, 0x0, 0x0, 0x20048854}, 0x4004) bpf$PROG_LOAD(0x5, &(0x7f0000000e40)={0x5, 0x16, &(0x7f0000001340)=ANY=[@ANYBLOB="390000000100000000000000900000f117fa0000", @ANYRES32=r4, @ANYBLOB="1f00000000000000b703000000000000850000000c000000b61b0453c29f42b5be06c7010b4efffe000000000085000000a900000018150000", @ANYRES32=r3, @ANYBLOB="0000000000000000180100002020782500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b70300000000850000005d000000185500000100000000000000000000009500000000000000"], &(0x7f0000000b80)='syzkaller\x00', 0x1, 0xe8, &(0x7f0000000bc0)=""/232, 0x41000, 0x5b, '\x00', 0x0, 0xe, r5, 0x8, &(0x7f0000000d00)={0x5, 0x2}, 0x8, 0x10, &(0x7f0000000d40)={0x4, 0xe, 0x2, 0x8}, 0x10, r6, r4, 0x5, &(0x7f0000000d80), &(0x7f0000000dc0)=[{0x4, 0x3, 0x0, 0x2}, {0x3, 0x1, 0xa, 0xa}, {0x0, 0x3, 0x2, 0xa}, {0x0, 0x3, 0x7, 0x1}, {0x1, 0x5, 0xb, 0xc}], 0x10, 0x7}, 0x90) [ 124.432104][ T26] netdevsim netdevsim3 netdevsim3 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 124.462850][ T6319] bridge0: port 1(bridge_slave_0) entered blocking state [ 124.470715][ T6319] bridge0: port 1(bridge_slave_0) entered disabled state [ 124.523147][ T6364] loop1: detected capacity change from 0 to 2048 [ 124.537050][ T6319] bridge_slave_0: entered allmulticast mode [ 124.566746][ T6319] bridge_slave_0: entered promiscuous mode [ 124.577102][ T26] netdevsim netdevsim3 netdevsim2 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 124.609683][ T6364] loop1: p2 p3 p7 [ 124.634445][ T6319] bridge0: port 2(bridge_slave_1) entered blocking state [ 124.641621][ T6319] bridge0: port 2(bridge_slave_1) entered disabled state [ 124.670925][ T6319] bridge_slave_1: entered allmulticast mode 20:41:13 executing program 1: ioctl$BTRFS_IOC_LOGICAL_INO(0xffffffffffffffff, 0xc0389424, &(0x7f0000000180)={0x1, 0x20, '\x00', 0x1, &(0x7f0000000080)=[0x0, 0x0, 0x0, 0x0]}) r0 = socket$inet6(0xa, 0x3, 0x6) r1 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) r2 = dup2(r1, r0) ioctl$FIDEDUPERANGE(r0, 0xc0189436, &(0x7f0000000f00)=ANY=[@ANYBLOB="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"]) ioctl$TIOCSBRK(r2, 0x5427) recvfrom$inet6(0xffffffffffffffff, &(0x7f0000000280)=""/134, 0x86, 0x40000102, &(0x7f0000000340)={0xa, 0x4e21, 0x77f, @mcast1, 0x403b3f}, 0x1c) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000001040)={{r2, 0xffffffffffffffff}, &(0x7f0000000140), &(0x7f0000000480)=r1}, 0x20) syz_read_part_table(0x593, &(0x7f00000005c0)="$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") r4 = creat(&(0x7f0000000240)='./file0\x00', 0x0) stat(&(0x7f0000000040)='./file1\x00', &(0x7f0000000380)) fsetxattr$security_capability(r4, &(0x7f0000000100), &(0x7f0000000000)=@v1={0x1000000, [{0x80000000, 0x81}]}, 0xc, 0x0) newfstatat(0xffffffffffffff9c, &(0x7f00000000c0)='./file1\x00', &(0x7f0000001400), 0x400) close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x2) ioctl$TIOCSTI(r4, 0x5412, &(0x7f00000004c0)=0x40) fsync(0xffffffffffffffff) write$binfmt_misc(r4, &(0x7f0000001080)=ANY=[@ANYBLOB="7379d3c6"], 0x4) fallocate(r4, 0x100000011, 0x0, 0x2811fdff) open(&(0x7f0000000100)='.\x00', 0x20c2, 0x2d) open$dir(&(0x7f0000000500)='./file1\x00', 0x1c6c0, 0x0) r5 = openat$vcsu(0xffffffffffffff9c, &(0x7f0000000cc0), 0x400c00, 0x0) lsetxattr$security_selinux(&(0x7f0000001180)='./file1\x00', &(0x7f00000011c0), &(0x7f0000001300)='system_u:object_r:unconfined_exec_t:s0\x00', 0x27, 0x3) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000400)={0xffffffffffffffff, 0xe0, &(0x7f0000000300)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, &(0x7f00000000c0)=[0x0], &(0x7f0000000140), 0x0, 0x8, &(0x7f0000000200)=[{}, {}, {}, {}, {}], 0x28, 0x0, 0x0, 0x0, 0x0, 0x10, 0x8, 0x8, &(0x7f00000002c0)}}, 0x10) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000e80)=@bpf_lsm={0x1d, 0x4, &(0x7f0000000040)=@framed={{0x18, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x73fc}, [@generic={0x9, 0x8, 0x0, 0x7f, 0x200}]}, &(0x7f0000000880)='GPL\x00', 0x1f, 0x93, &(0x7f0000000cc0)=""/147, 0x40f00, 0x2, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, &(0x7f0000000b80)={0x9}, 0x8, 0x10, 0x0, 0x0, r6}, 0x80) r7 = socket$nl_generic(0x10, 0x3, 0x10) r8 = syz_genetlink_get_family_id$tipc(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$TIPC_CMD_ENABLE_BEARER(r7, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000001200)=ANY=[@ANYBLOB="3400000006c08fada241ee0a049e6fba3f36f40da839bbdf54c31768b0026f4261f56d51c5d81ba4cb99f8203c40d0a142fcd75ce26e408d229139f8c4e81109c56a18e453e8a537df21c4ec04a4f3e22f4ac125a28ad43e41107b1f7e79c8573985e54fd665e2913ca74da8c9f3fc2839258c19fa7ac20ebead31206cf280ea73f635bc5418b66554392dfd11874fef72bc53538aae3cb5ef8a80140f4737dd2c572a03ee1d5e3d627e", @ANYRESOCT=0x0, @ANYBLOB="010000000000000000000100000000000000014100000018001700000000000000007564503a73"], 0x34}, 0x1, 0x0, 0x0, 0x1}, 0x0) ioctl$AUTOFS_DEV_IOCTL_PROTOSUBVER(r1, 0xc0189373, &(0x7f0000000540)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x6}}, './file0\x00'}) sendmsg$TIPC_CMD_GET_MAX_PORTS(r5, &(0x7f0000001140)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x40000}, 0xc, &(0x7f0000001100)={&(0x7f00000010c0)={0x1c, r8, 0x400, 0x8000, 0x25dfdbfe, {}, ["", "", "", "", "", "", ""]}, 0x1c}, 0x1, 0x0, 0x0, 0x20048854}, 0x4004) bpf$PROG_LOAD(0x5, &(0x7f0000000e40)={0x5, 0x16, &(0x7f0000001340)=ANY=[@ANYBLOB="390000000100000000000000900000f117fa0000", @ANYRES32=r4, @ANYBLOB="1f00000000000000b703000000000000850000000c000000b61b0453c29f42b5be06c7010b4efffe000000000085000000a900000018150000", @ANYRES32=r3, @ANYBLOB="0000000000000000180100002020782500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b70300000000850000005d000000185500000100000000000000000000009500000000000000"], &(0x7f0000000b80)='syzkaller\x00', 0x1, 0xe8, &(0x7f0000000bc0)=""/232, 0x41000, 0x5b, '\x00', 0x0, 0xe, r5, 0x8, &(0x7f0000000d00)={0x5, 0x2}, 0x8, 0x10, &(0x7f0000000d40)={0x4, 0xe, 0x2, 0x8}, 0x10, r6, r4, 0x5, &(0x7f0000000d80), &(0x7f0000000dc0)=[{0x4, 0x3, 0x0, 0x2}, {0x3, 0x1, 0xa, 0xa}, {0x0, 0x3, 0x2, 0xa}, {0x0, 0x3, 0x7, 0x1}, {0x1, 0x5, 0xb, 0xc}], 0x10, 0x7}, 0x90) [ 124.696821][ T6319] bridge_slave_1: entered promiscuous mode [ 124.699568][ T2775] loop1: p2 p3 p7 [ 124.762413][ T26] netdevsim netdevsim3 netdevsim1 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 124.832847][ T6319] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 124.852132][ T26] netdevsim netdevsim3 netdevsim0 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 124.872312][ T3326] I/O error, dev loop1, sector 0 op 0x0:(READ) flags 0x80700 phys_seg 1 prio class 0 [ 124.905074][ T6319] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 124.924186][ T3169] udevd[3169]: inotify_add_watch(7, /dev/loop1p7, 10) failed: No such file or directory [ 124.939142][ T4030] udevd[4030]: inotify_add_watch(7, /dev/loop1p3, 10) failed: No such file or directory [ 124.957860][ T6380] loop1: detected capacity change from 0 to 2048 [ 124.999712][ T6319] team0: Port device team_slave_0 added [ 125.006601][ T6319] team0: Port device team_slave_1 added 20:41:13 executing program 1: ioctl$BTRFS_IOC_LOGICAL_INO(0xffffffffffffffff, 0xc0389424, &(0x7f0000000180)={0x1, 0x20, '\x00', 0x1, &(0x7f0000000080)=[0x0, 0x0, 0x0, 0x0]}) r0 = socket$inet6(0xa, 0x3, 0x6) r1 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) r2 = dup2(r1, r0) ioctl$FIDEDUPERANGE(r0, 0xc0189436, &(0x7f0000000f00)=ANY=[@ANYBLOB="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"]) ioctl$TIOCSBRK(r2, 0x5427) recvfrom$inet6(0xffffffffffffffff, &(0x7f0000000280)=""/134, 0x86, 0x40000102, &(0x7f0000000340)={0xa, 0x4e21, 0x77f, @mcast1, 0x403b3f}, 0x1c) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000001040)={{r2, 0xffffffffffffffff}, &(0x7f0000000140), &(0x7f0000000480)=r1}, 0x20) syz_read_part_table(0x593, &(0x7f00000005c0)="$eJzs0r1LK2kUB+A3A5c0e4lcLli4hWCwigqx0CIpRGJIY0RcsbAWLLQQLCwkEq39+AcUv0BsxD6lGEEUYiUpxXpBsUmVZdfZxmplUdnleZrhPefMHF5+E/hPi8Lv7XY7EUJoJ9//9m+nhbFS98TI5FQIiTAbQij8+stfnUQ88fdXz+NzOT6XktnG/vXo82nHTc9dPX0Yxf1aFMJaCGHh4Sj1b+/G/99Z/jK1vrFU3FzJz98XVx8H5/oKXVuFxZ2hg1xlujM3E/9Ytehz9qcbw8e37fLT7vf+b/VGK3sVz2USH7Ofr/U2/72f1Wa1Nd57sjyQ+dG8qGzHub/IHwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA+GBn+cvU+sZScXMlP39fXH0cnOsrdG0VFneGDnKV6c7cTPQ6V4s+Z3+6MXx82y4/7X7v/1ZvtLJX8Vwm8TH7+Vpv89/7WW1WW+O9J8sDmR/Ni8p2nPuL/AEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAACAf6gwVuqeGJmcCiERZkMIo1HH0Z/1dvK1n4jnzuNnOa6XktnG/vXo82nHTc9dPX04EddrUQhrIYSFh6PUp1+Gd/sjAAD///tch0s=") r4 = creat(&(0x7f0000000240)='./file0\x00', 0x0) stat(&(0x7f0000000040)='./file1\x00', &(0x7f0000000380)) fsetxattr$security_capability(r4, &(0x7f0000000100), &(0x7f0000000000)=@v1={0x1000000, [{0x80000000, 0x81}]}, 0xc, 0x0) newfstatat(0xffffffffffffff9c, &(0x7f00000000c0)='./file1\x00', &(0x7f0000001400), 0x400) close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x2) ioctl$TIOCSTI(r4, 0x5412, &(0x7f00000004c0)=0x40) fsync(0xffffffffffffffff) write$binfmt_misc(r4, &(0x7f0000001080)=ANY=[@ANYBLOB="7379d3c6"], 0x4) fallocate(r4, 0x100000011, 0x0, 0x2811fdff) open(&(0x7f0000000100)='.\x00', 0x20c2, 0x2d) open$dir(&(0x7f0000000500)='./file1\x00', 0x1c6c0, 0x0) r5 = openat$vcsu(0xffffffffffffff9c, &(0x7f0000000cc0), 0x400c00, 0x0) lsetxattr$security_selinux(&(0x7f0000001180)='./file1\x00', &(0x7f00000011c0), &(0x7f0000001300)='system_u:object_r:unconfined_exec_t:s0\x00', 0x27, 0x3) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000400)={0xffffffffffffffff, 0xe0, &(0x7f0000000300)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, &(0x7f00000000c0)=[0x0], &(0x7f0000000140), 0x0, 0x8, &(0x7f0000000200)=[{}, {}, {}, {}, {}], 0x28, 0x0, 0x0, 0x0, 0x0, 0x10, 0x8, 0x8, &(0x7f00000002c0)}}, 0x10) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000e80)=@bpf_lsm={0x1d, 0x4, &(0x7f0000000040)=@framed={{0x18, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x73fc}, [@generic={0x9, 0x8, 0x0, 0x7f, 0x200}]}, &(0x7f0000000880)='GPL\x00', 0x1f, 0x93, &(0x7f0000000cc0)=""/147, 0x40f00, 0x2, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, &(0x7f0000000b80)={0x9}, 0x8, 0x10, 0x0, 0x0, r6}, 0x80) r7 = socket$nl_generic(0x10, 0x3, 0x10) r8 = syz_genetlink_get_family_id$tipc(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$TIPC_CMD_ENABLE_BEARER(r7, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000001200)=ANY=[@ANYBLOB="3400000006c08fada241ee0a049e6fba3f36f40da839bbdf54c31768b0026f4261f56d51c5d81ba4cb99f8203c40d0a142fcd75ce26e408d229139f8c4e81109c56a18e453e8a537df21c4ec04a4f3e22f4ac125a28ad43e41107b1f7e79c8573985e54fd665e2913ca74da8c9f3fc2839258c19fa7ac20ebead31206cf280ea73f635bc5418b66554392dfd11874fef72bc53538aae3cb5ef8a80140f4737dd2c572a03ee1d5e3d627e", @ANYRESOCT=0x0, @ANYBLOB="010000000000000000000100000000000000014100000018001700000000000000007564503a73"], 0x34}, 0x1, 0x0, 0x0, 0x1}, 0x0) ioctl$AUTOFS_DEV_IOCTL_PROTOSUBVER(r1, 0xc0189373, &(0x7f0000000540)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x6}}, './file0\x00'}) sendmsg$TIPC_CMD_GET_MAX_PORTS(r5, &(0x7f0000001140)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x40000}, 0xc, &(0x7f0000001100)={&(0x7f00000010c0)={0x1c, r8, 0x400, 0x8000, 0x25dfdbfe, {}, ["", "", "", "", "", "", ""]}, 0x1c}, 0x1, 0x0, 0x0, 0x20048854}, 0x4004) bpf$PROG_LOAD(0x5, &(0x7f0000000e40)={0x5, 0x16, &(0x7f0000001340)=ANY=[@ANYBLOB="390000000100000000000000900000f117fa0000", @ANYRES32=r4, @ANYBLOB="1f00000000000000b703000000000000850000000c000000b61b0453c29f42b5be06c7010b4efffe000000000085000000a900000018150000", @ANYRES32=r3, @ANYBLOB="0000000000000000180100002020782500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b70300000000850000005d000000185500000100000000000000000000009500000000000000"], &(0x7f0000000b80)='syzkaller\x00', 0x1, 0xe8, &(0x7f0000000bc0)=""/232, 0x41000, 0x5b, '\x00', 0x0, 0xe, r5, 0x8, &(0x7f0000000d00)={0x5, 0x2}, 0x8, 0x10, &(0x7f0000000d40)={0x4, 0xe, 0x2, 0x8}, 0x10, r6, r4, 0x5, &(0x7f0000000d80), &(0x7f0000000dc0)=[{0x4, 0x3, 0x0, 0x2}, {0x3, 0x1, 0xa, 0xa}, {0x0, 0x3, 0x2, 0xa}, {0x0, 0x3, 0x7, 0x1}, {0x1, 0x5, 0xb, 0xc}], 0x10, 0x7}, 0x90) [ 125.043279][ T6380] loop1: p2 p3 p7 20:41:13 executing program 4: r0 = perf_event_open(&(0x7f0000000a40)={0x2, 0x80, 0xcd, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @perf_bp={&(0x7f0000000200), 0x8}, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfb75}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000040)={0x0, 0x4, 0x0, &(0x7f0000000180)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x80) perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x208, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x4, 0x8001}, 0x4000, 0x0, 0x0, 0x0, 0x0, 0x14e, 0xd1}, 0x0, 0xbfffffffffffffff, r0, 0x19893a9f0a0e2244) r1 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) syz_clone(0x2000000, 0x0, 0x0, 0x0, 0x0, 0x0) r2 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x18, 0x5, &(0x7f00000002c0)=ANY=[@ANYBLOB="180000001800ff0f0000000000000000850000006d000000750000000800000095"], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x80) r3 = perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400, 0x80000, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x7, 0x1007}, 0x8006, 0x0, 0x0, 0x1, 0x4, 0x800000, 0x3}, 0x0, 0xffefffffffffffff, 0xffffffffffffffff, 0x9) ioctl$PERF_EVENT_IOC_SET_FILTER(r3, 0x40082406, &(0x7f00000003c0)='memory.numa_stat\x00') perf_event_open(0x0, 0x0, 0x0, r3, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000080)='sched_switch\x00', r2}, 0x10) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000380)={{0x1, 0xffffffffffffffff}, &(0x7f0000000000), &(0x7f0000000240)=r2}, 0x20) r5 = memfd_secret(0x0) syz_io_uring_setup(0x0, &(0x7f0000000300)={0x0, 0x2, 0x0, 0x0, 0x0, 0x0, r5}, 0x0, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f00000009c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000000a00)=0x14) r7 = openat2(0xffffffffffffff9c, &(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)={0x40841}, 0x18) write$binfmt_script(r7, &(0x7f0000000340)=ANY=[], 0xfffffdef) r8 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000b40)={0x1b, 0x0, 0x0, 0x7, 0x0, 0xffffffffffffffff, 0x200, '\x00', 0x0, 0xffffffffffffffff, 0x3, 0x1, 0x4}, 0x48) r9 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000bc0)={0x2, 0x4, 0x8, 0x1, 0x80, 0x1, 0x9, '\x00', 0x0, 0xffffffffffffffff, 0x4, 0x1, 0x4}, 0x48) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000d00)={0x11, 0x12, &(0x7f0000000440)=@raw=[@exit, @ringbuf_query={{0x18, 0x1, 0x1, 0x0, r4}}, @ringbuf_output={{0x18, 0x1, 0x1, 0x0, r5}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x10001}, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x4, 0x0, 0x0, 0x2}}, @exit, @initr0={0x18, 0x0, 0x0, 0x0, 0x6349, 0x0, 0x0, 0x0, 0xf685}, @ldst={0x3, 0x2, 0x1, 0x0, 0xb, 0x2543a83bb932833c, 0x1}], &(0x7f0000000940)='syzkaller\x00', 0x80000001, 0x27, &(0x7f0000000980)=""/39, 0x41000, 0x40, '\x00', r6, 0x0, r7, 0x8, &(0x7f0000000ac0)={0x3, 0x1}, 0x8, 0x10, &(0x7f0000000b00)={0x2, 0xc, 0xfffffe00, 0x2}, 0x10, 0x0, 0x0, 0x5, &(0x7f0000000c40)=[r2, 0x1, 0x1, r8, r9, r1], &(0x7f0000000c80)=[{0x4, 0x1, 0x8, 0xc}, {0x0, 0x4, 0xf, 0x4}, {0x1, 0x2, 0xd, 0x6}, {0x0, 0x4, 0x10, 0xc}, {0x2, 0x4, 0xd, 0x1}], 0x10, 0x20}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000280)={&(0x7f0000000140)='ext4_ext_show_extent\x00', r2}, 0x10) r10 = perf_event_open(&(0x7f0000000080)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x2, 0xffffffffffffffff, 0xb) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000780)={0x14, 0x4, &(0x7f00000008c0)=ANY=[@ANYBLOB="850000006b00000018150000a3df7ddd9621fb0201050062d91123e632b2f902ad1e9f1cc7a66ed51ac8a4070000000000000019a83f0b7c9502871fb1ca3dc499e804bbbc359859ed6fd9f104fc7ed900d122072d8275a24d000000000601c3a63953a7b36fe458", @ANYRES32, @ANYBLOB="00000000000000002d59e4eda4000000"], &(0x7f0000000400)='syzkaller\x00', 0xfff, 0xe3, &(0x7f0000000580)=""/227, 0x0, 0x4, '\x00', 0x0, 0x24, 0xffffffffffffffff, 0x8, &(0x7f0000000500)={0x1, 0x3}, 0x8, 0x10, &(0x7f0000000680)={0x5, 0x6, 0x81, 0x9}, 0x10, 0xffffffffffffffff, 0xffffffffffffffff, 0x0, &(0x7f00000006c0)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, r10]}, 0x80) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x4030582a, &(0x7f0000000040)=0x91) [ 125.107389][ T6319] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 125.114427][ T6319] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 125.144114][ T6319] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 125.172825][ T4030] udevd[4030]: inotify_add_watch(7, /dev/loop1p3, 10) failed: No such file or directory [ 125.188879][ T3169] udevd[3169]: inotify_add_watch(7, /dev/loop1p7, 10) failed: No such file or directory [ 125.222470][ T6387] loop1: detected capacity change from 0 to 2048 [ 125.283083][ T6387] loop1: p2 p3 p7 [ 125.293288][ T6319] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 125.300455][ T6319] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 125.327954][ T6319] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active 20:41:13 executing program 1: ioctl$BTRFS_IOC_LOGICAL_INO(0xffffffffffffffff, 0xc0389424, &(0x7f0000000180)={0x1, 0x20, '\x00', 0x1, &(0x7f0000000080)=[0x0, 0x0, 0x0, 0x0]}) r0 = socket$inet6(0xa, 0x3, 0x6) r1 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) r2 = dup2(r1, r0) ioctl$FIDEDUPERANGE(r0, 0xc0189436, &(0x7f0000000f00)=ANY=[@ANYBLOB="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"]) ioctl$TIOCSBRK(r2, 0x5427) recvfrom$inet6(0xffffffffffffffff, &(0x7f0000000280)=""/134, 0x86, 0x40000102, &(0x7f0000000340)={0xa, 0x4e21, 0x77f, @mcast1, 0x403b3f}, 0x1c) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000001040)={{r2, 0xffffffffffffffff}, &(0x7f0000000140), &(0x7f0000000480)=r1}, 0x20) syz_read_part_table(0x593, &(0x7f00000005c0)="$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") r4 = creat(&(0x7f0000000240)='./file0\x00', 0x0) stat(&(0x7f0000000040)='./file1\x00', &(0x7f0000000380)) fsetxattr$security_capability(r4, &(0x7f0000000100), &(0x7f0000000000)=@v1={0x1000000, [{0x80000000, 0x81}]}, 0xc, 0x0) newfstatat(0xffffffffffffff9c, &(0x7f00000000c0)='./file1\x00', &(0x7f0000001400), 0x400) close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x2) ioctl$TIOCSTI(r4, 0x5412, &(0x7f00000004c0)=0x40) fsync(0xffffffffffffffff) write$binfmt_misc(r4, &(0x7f0000001080)=ANY=[@ANYBLOB="7379d3c6"], 0x4) fallocate(r4, 0x100000011, 0x0, 0x2811fdff) open(&(0x7f0000000100)='.\x00', 0x20c2, 0x2d) open$dir(&(0x7f0000000500)='./file1\x00', 0x1c6c0, 0x0) r5 = openat$vcsu(0xffffffffffffff9c, &(0x7f0000000cc0), 0x400c00, 0x0) lsetxattr$security_selinux(&(0x7f0000001180)='./file1\x00', &(0x7f00000011c0), &(0x7f0000001300)='system_u:object_r:unconfined_exec_t:s0\x00', 0x27, 0x3) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000400)={0xffffffffffffffff, 0xe0, &(0x7f0000000300)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, &(0x7f00000000c0)=[0x0], &(0x7f0000000140), 0x0, 0x8, &(0x7f0000000200)=[{}, {}, {}, {}, {}], 0x28, 0x0, 0x0, 0x0, 0x0, 0x10, 0x8, 0x8, &(0x7f00000002c0)}}, 0x10) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000e80)=@bpf_lsm={0x1d, 0x4, &(0x7f0000000040)=@framed={{0x18, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x73fc}, [@generic={0x9, 0x8, 0x0, 0x7f, 0x200}]}, &(0x7f0000000880)='GPL\x00', 0x1f, 0x93, &(0x7f0000000cc0)=""/147, 0x40f00, 0x2, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, &(0x7f0000000b80)={0x9}, 0x8, 0x10, 0x0, 0x0, r6}, 0x80) r7 = socket$nl_generic(0x10, 0x3, 0x10) r8 = syz_genetlink_get_family_id$tipc(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$TIPC_CMD_ENABLE_BEARER(r7, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000001200)=ANY=[@ANYBLOB="3400000006c08fada241ee0a049e6fba3f36f40da839bbdf54c31768b0026f4261f56d51c5d81ba4cb99f8203c40d0a142fcd75ce26e408d229139f8c4e81109c56a18e453e8a537df21c4ec04a4f3e22f4ac125a28ad43e41107b1f7e79c8573985e54fd665e2913ca74da8c9f3fc2839258c19fa7ac20ebead31206cf280ea73f635bc5418b66554392dfd11874fef72bc53538aae3cb5ef8a80140f4737dd2c572a03ee1d5e3d627e", @ANYRESOCT=0x0, @ANYBLOB="010000000000000000000100000000000000014100000018001700000000000000007564503a73"], 0x34}, 0x1, 0x0, 0x0, 0x1}, 0x0) ioctl$AUTOFS_DEV_IOCTL_PROTOSUBVER(r1, 0xc0189373, &(0x7f0000000540)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x6}}, './file0\x00'}) sendmsg$TIPC_CMD_GET_MAX_PORTS(r5, &(0x7f0000001140)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x40000}, 0xc, &(0x7f0000001100)={&(0x7f00000010c0)={0x1c, r8, 0x400, 0x8000, 0x25dfdbfe, {}, ["", "", "", "", "", "", ""]}, 0x1c}, 0x1, 0x0, 0x0, 0x20048854}, 0x4004) bpf$PROG_LOAD(0x5, &(0x7f0000000e40)={0x5, 0x16, &(0x7f0000001340)=ANY=[@ANYBLOB="390000000100000000000000900000f117fa0000", @ANYRES32=r4, @ANYBLOB="1f00000000000000b703000000000000850000000c000000b61b0453c29f42b5be06c7010b4efffe000000000085000000a900000018150000", @ANYRES32=r3, @ANYBLOB="0000000000000000180100002020782500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b70300000000850000005d000000185500000100000000000000000000009500000000000000"], &(0x7f0000000b80)='syzkaller\x00', 0x1, 0xe8, &(0x7f0000000bc0)=""/232, 0x41000, 0x5b, '\x00', 0x0, 0xe, r5, 0x8, &(0x7f0000000d00)={0x5, 0x2}, 0x8, 0x10, &(0x7f0000000d40)={0x4, 0xe, 0x2, 0x8}, 0x10, r6, r4, 0x5, &(0x7f0000000d80), &(0x7f0000000dc0)=[{0x4, 0x3, 0x0, 0x2}, {0x3, 0x1, 0xa, 0xa}, {0x0, 0x3, 0x2, 0xa}, {0x0, 0x3, 0x7, 0x1}, {0x1, 0x5, 0xb, 0xc}], 0x10, 0x7}, 0x90) 20:41:13 executing program 2: r0 = perf_event_open(&(0x7f0000000a40)={0x2, 0x80, 0xcd, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @perf_bp={&(0x7f0000000200), 0x8}, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfb75}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000040)={0x0, 0x4, 0x0, &(0x7f0000000180)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x80) perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x208, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x4, 0x8001}, 0x4000, 0x0, 0x0, 0x0, 0x0, 0x14e, 0xd1}, 0x0, 0xbfffffffffffffff, r0, 0x19893a9f0a0e2244) r1 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) syz_clone(0x2000000, 0x0, 0x0, 0x0, 0x0, 0x0) r2 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x18, 0x5, &(0x7f00000002c0)=ANY=[@ANYBLOB="180000001800ff0f0000000000000000850000006d000000750000000800000095"], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x80) r3 = perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400, 0x80000, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x7, 0x1007}, 0x8006, 0x0, 0x0, 0x1, 0x4, 0x800000, 0x3}, 0x0, 0xffefffffffffffff, 0xffffffffffffffff, 0x9) ioctl$PERF_EVENT_IOC_SET_FILTER(r3, 0x40082406, &(0x7f00000003c0)='memory.numa_stat\x00') perf_event_open(0x0, 0x0, 0x0, r3, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000080)='sched_switch\x00', r2}, 0x10) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000380)={{0x1, 0xffffffffffffffff}, &(0x7f0000000000), &(0x7f0000000240)=r2}, 0x20) r5 = memfd_secret(0x0) getsockname$packet(0xffffffffffffffff, &(0x7f00000009c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000000a00)=0x14) r7 = openat2(0xffffffffffffff9c, &(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)={0x40841}, 0x18) write$binfmt_script(r7, &(0x7f0000000340)=ANY=[], 0xfffffdef) r8 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000bc0)={0x2, 0x4, 0x8, 0x1, 0x80, 0x1, 0x9, '\x00', 0x0, 0xffffffffffffffff, 0x4, 0x1, 0x4}, 0x48) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000d00)={0x11, 0x12, &(0x7f0000000440)=@raw=[@exit, @ringbuf_query={{0x18, 0x1, 0x1, 0x0, r4}}, @ringbuf_output={{0x18, 0x1, 0x1, 0x0, r5}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x10001}, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x4, 0x0, 0x0, 0x2}}, @exit, @initr0={0x18, 0x0, 0x0, 0x0, 0x6349, 0x0, 0x0, 0x0, 0xf685}, @ldst={0x3, 0x2, 0x1, 0x0, 0xb, 0x2543a83bb932833c, 0x1}], &(0x7f0000000940)='syzkaller\x00', 0x80000001, 0x27, &(0x7f0000000980)=""/39, 0x41000, 0x40, '\x00', r6, 0x0, r7, 0x8, &(0x7f0000000ac0)={0x3, 0x1}, 0x8, 0x10, &(0x7f0000000b00)={0x2, 0xc, 0xfffffe00, 0x2}, 0x10, 0x0, 0x0, 0x5, &(0x7f0000000c40)=[r2, 0x1, 0x1, 0xffffffffffffffff, r8, r1], &(0x7f0000000c80)=[{0x4, 0x1, 0x8, 0xc}, {0x0, 0x4, 0xf, 0x4}, {0x1, 0x2, 0xd, 0x6}, {0x0, 0x4, 0x10, 0xc}, {0x2, 0x4, 0xd, 0x1}], 0x10, 0x20}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000280)={&(0x7f0000000140)='ext4_ext_show_extent\x00', r2}, 0x10) r9 = perf_event_open(&(0x7f0000000080)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) r10 = gettid() perf_event_open$cgroup(&(0x7f0000000300)={0x5, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_bp={&(0x7f0000000100)}, 0x81252, 0x6, 0x80000001, 0x0, 0x0, 0x0, 0x6, 0x0, 0x6, 0x0, 0x6}, 0xffffffffffffffff, 0xe, 0xffffffffffffffff, 0xc) perf_event_open(0x0, r10, 0x2, 0xffffffffffffffff, 0xb) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) perf_event_open(&(0x7f0000000840)={0x2, 0x80, 0x0, 0x7, 0x0, 0x80, 0x0, 0x3, 0x0, 0x9, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, @perf_config_ext={0x8000000000, 0x3}, 0x46c73247dfbe0d, 0x1007e, 0x0, 0x2, 0x0, 0x0, 0x6, 0x0, 0xffffffff, 0x0, 0x1c}, 0x0, 0x9, 0xffffffffffffffff, 0xd) bpf$PROG_LOAD(0x5, &(0x7f0000000780)={0x14, 0x4, &(0x7f00000008c0)=ANY=[@ANYBLOB="850000006b00000018150000a3df7ddd9621fb0201050062d91123e632b2f902ad1e9f1cc7a66ed51ac8a4070000000000000019a83f0b7c9502871fb1ca3dc499e804bbbc359859ed6fd9f104fc7ed900d122072d8275a24d000000000601c3a63953a7b36fe458", @ANYRES32, @ANYBLOB="00000000000000002d59e4eda4000000"], &(0x7f0000000400)='syzkaller\x00', 0xfff, 0xe3, &(0x7f0000000580)=""/227, 0x0, 0x4, '\x00', 0x0, 0x24, 0xffffffffffffffff, 0x8, &(0x7f0000000500)={0x1, 0x3}, 0x8, 0x10, &(0x7f0000000680)={0x5, 0x6, 0x81, 0x9}, 0x10, 0xffffffffffffffff, 0xffffffffffffffff, 0x0, &(0x7f00000006c0)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, r9]}, 0x80) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x4030582a, &(0x7f0000000040)=0x91) [ 125.435933][ T6319] hsr_slave_0: entered promiscuous mode [ 125.447969][ T3091] __loop_clr_fd: partition scan of loop1 failed (rc=-16) [ 125.447994][ T4030] I/O error, dev loop1, sector 208 op 0x0:(READ) flags 0x80700 phys_seg 1 prio class 0 [ 125.448076][ T4030] I/O error, dev loop1, sector 208 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 0 [ 125.448106][ T4030] Buffer I/O error on dev loop1p3, logical block 8, async page read [ 125.448124][ T3091] ================================================================== [ 125.448149][ T3091] BUG: KCSAN: data-race in data_push_tail / string [ 125.448173][ T3091] [ 125.448181][ T3091] write to 0xffffffff870d24c2 of 1 bytes by task 4030 on cpu 1: [ 125.448183][ T4030] I/O error, dev loop1, sector 209 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 0 [ 125.448202][ T3091] string+0x16c/0x200 [ 125.448221][ T3091] vsnprintf+0xa09/0xe30 [ 125.448226][ T4030] Buffer I/O error on dev loop1p3, logical block 9, async page read [ 125.448243][ T3091] vscnprintf+0x42/0x80 [ 125.448256][ T4030] I/O error, dev loop1, sector 210 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 0 [ 125.448266][ T3091] printk_sprint+0x30/0x2d0 [ 125.448285][ T4030] Buffer I/O error on dev loop1p3, logical block 10, async page read [ 125.448302][ T3091] vprintk_store+0x56f/0x800 [ 125.448316][ T4030] I/O error, dev loop1, sector 211 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 0 [ 125.448345][ T4030] Buffer I/O error on dev loop1p3, logical block 11, async page read [ 125.448340][ T3091] vprintk_emit+0xd0/0x5d0 [ 125.448377][ T3091] vprintk_default+0x26/0x30 [ 125.448407][ T3091] vprintk+0x71/0x80 [ 125.448423][ T3091] _printk+0x7a/0xa0 [ 125.448449][ T4030] I/O error, dev loop1, sector 212 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 0 [ 125.448453][ T3091] blk_print_req_error+0x10a/0x120 [ 125.448479][ T4030] Buffer I/O error on dev loop1p3, logical block 12, async page read [ 125.448486][ T3091] blk_update_request+0x849/0x950 [ 125.448509][ T4030] I/O error, dev loop1, sector 213 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 0 [ 125.448520][ T3091] blk_mq_plug_issue_direct+0x195/0x520 [ 125.448539][ T4030] Buffer I/O error on dev loop1p3, logical block 13, async page read [ 125.448565][ T3091] blk_mq_flush_plug_list+0x2a7/0xdc0 [ 125.448570][ T4030] I/O error, dev loop1, sector 214 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 0 [ 125.448600][ T3091] __blk_flush_plug+0x210/0x260 [ 125.448630][ T3091] blk_finish_plug+0x47/0x60 [ 125.448657][ T4030] Buffer I/O error on dev loop1p3, logical block 14, async page read [ 125.448662][ T3091] read_pages+0x4bf/0x540 [ 125.448689][ T4030] Buffer I/O error on dev loop1p3, logical block 15, async page read [ 125.448691][ T3091] page_cache_ra_unbounded+0x2aa/0x2e0 [ 125.448721][ T3091] page_cache_sync_ra+0x24b/0x2a0 [ 125.448749][ T3091] filemap_get_pages+0x251/0xf90 [ 125.448776][ T3091] filemap_read+0x214/0x680 [ 125.448801][ T3091] blkdev_read_iter+0x217/0x2c0 [ 125.448835][ T3091] vfs_read+0x5ab/0x6a0 [ 125.448866][ T3091] ksys_read+0xeb/0x1a0 [ 125.448896][ T3091] __x64_sys_read+0x42/0x50 [ 125.448928][ T3091] do_syscall_64+0xcd/0x1d0 [ 125.448950][ T3091] entry_SYSCALL_64_after_hwframe+0x63/0x6b [ 125.448985][ T3091] [ 125.448991][ T3091] read to 0xffffffff870d24c0 of 8 bytes by task 3091 on cpu 0: [ 125.449020][ T3091] data_push_tail+0x102/0x430 [ 125.449041][ T3091] data_alloc+0xbe/0x2c0 [ 125.449060][ T3091] prb_reserve+0x897/0xbc0 [ 125.449080][ T3091] vprintk_store+0x53e/0x800 [ 125.449111][ T3091] vprintk_emit+0xd0/0x5d0 [ 125.449141][ T3091] vprintk_default+0x26/0x30 [ 125.449173][ T3091] vprintk+0x71/0x80 [ 125.449190][ T3091] _printk+0x7a/0xa0 [ 125.449220][ T3091] __loop_clr_fd+0x39b/0x3a0 [ 125.449279][ T3091] lo_ioctl+0xe93/0x12e0 [ 125.449305][ T3091] blkdev_ioctl+0x375/0x460 [ 125.449325][ T3091] __se_sys_ioctl+0xcf/0x140 [ 125.449355][ T3091] __x64_sys_ioctl+0x43/0x50 [ 125.449386][ T3091] do_syscall_64+0xcd/0x1d0 [ 125.449408][ T3091] entry_SYSCALL_64_after_hwframe+0x63/0x6b [ 125.449442][ T3091] [ 125.449446][ T3091] value changed: 0x00000000ffffe06a -> 0x6f727265204f2f49 [ 125.449459][ T3091] [ 125.449463][ T3091] Reported by Kernel Concurrency Sanitizer on: [ 125.449471][ T3091] CPU: 0 PID: 3091 Comm: syz-executor.1 Not tainted 6.8.0-rc2-syzkaller-00084-g5c24e4e9e708 #0 [ 125.449495][ T3091] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/25/2024 [ 125.449508][ T3091] ================================================================== [ 125.450970][ T3169] Buffer I/O error on dev loop1p7, logical block 8, async page read [ 125.540443][ T6406] loop1: detected capacity change from 0 to 2048 [ 125.550712][ T3169] Buffer I/O error on dev loop1p7, logical block 9, async page read [ 125.553075][ T6319] hsr_slave_1: entered promiscuous mode [ 126.004132][ T6319] debugfs: Directory 'hsr0' with parent 'hsr' already present! [ 126.018497][ T3169] udevd[3169]: inotify_add_watch(7, /dev/loop1p7, 10) failed: No such file or directory [ 126.022164][ T6319] Cannot create hsr debugfs directory [ 126.030284][ T4030] udevd[4030]: inotify_add_watch(7, /dev/loop1p3, 10) failed: No such file or directory [ 126.067938][ T6406] loop1: p2 p3 p7 20:41:14 executing program 1: ioctl$BTRFS_IOC_LOGICAL_INO(0xffffffffffffffff, 0xc0389424, &(0x7f0000000180)={0x1, 0x20, '\x00', 0x1, &(0x7f0000000080)=[0x0, 0x0, 0x0, 0x0]}) r0 = socket$inet6(0xa, 0x3, 0x6) r1 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) r2 = dup2(r1, r0) ioctl$FIDEDUPERANGE(r0, 0xc0189436, &(0x7f0000000f00)=ANY=[@ANYBLOB="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"]) ioctl$TIOCSBRK(r2, 0x5427) recvfrom$inet6(0xffffffffffffffff, &(0x7f0000000280)=""/134, 0x86, 0x40000102, &(0x7f0000000340)={0xa, 0x4e21, 0x77f, @mcast1, 0x403b3f}, 0x1c) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000001040)={{r2, 0xffffffffffffffff}, &(0x7f0000000140), &(0x7f0000000480)=r1}, 0x20) syz_read_part_table(0x593, &(0x7f00000005c0)="$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") r4 = creat(&(0x7f0000000240)='./file0\x00', 0x0) stat(&(0x7f0000000040)='./file1\x00', &(0x7f0000000380)) fsetxattr$security_capability(r4, &(0x7f0000000100), &(0x7f0000000000)=@v1={0x1000000, [{0x80000000, 0x81}]}, 0xc, 0x0) newfstatat(0xffffffffffffff9c, &(0x7f00000000c0)='./file1\x00', &(0x7f0000001400), 0x400) close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x2) ioctl$TIOCSTI(r4, 0x5412, &(0x7f00000004c0)=0x40) fsync(0xffffffffffffffff) write$binfmt_misc(r4, &(0x7f0000001080)=ANY=[@ANYBLOB="7379d3c6"], 0x4) fallocate(r4, 0x100000011, 0x0, 0x2811fdff) open(&(0x7f0000000100)='.\x00', 0x20c2, 0x2d) open$dir(&(0x7f0000000500)='./file1\x00', 0x1c6c0, 0x0) r5 = openat$vcsu(0xffffffffffffff9c, &(0x7f0000000cc0), 0x400c00, 0x0) lsetxattr$security_selinux(&(0x7f0000001180)='./file1\x00', &(0x7f00000011c0), &(0x7f0000001300)='system_u:object_r:unconfined_exec_t:s0\x00', 0x27, 0x3) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000400)={0xffffffffffffffff, 0xe0, &(0x7f0000000300)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, &(0x7f00000000c0)=[0x0], &(0x7f0000000140), 0x0, 0x8, &(0x7f0000000200)=[{}, {}, {}, {}, {}], 0x28, 0x0, 0x0, 0x0, 0x0, 0x10, 0x8, 0x8, &(0x7f00000002c0)}}, 0x10) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000e80)=@bpf_lsm={0x1d, 0x4, &(0x7f0000000040)=@framed={{0x18, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x73fc}, [@generic={0x9, 0x8, 0x0, 0x7f, 0x200}]}, &(0x7f0000000880)='GPL\x00', 0x1f, 0x93, &(0x7f0000000cc0)=""/147, 0x40f00, 0x2, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, &(0x7f0000000b80)={0x9}, 0x8, 0x10, 0x0, 0x0, r6}, 0x80) r7 = socket$nl_generic(0x10, 0x3, 0x10) r8 = syz_genetlink_get_family_id$tipc(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$TIPC_CMD_ENABLE_BEARER(r7, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000001200)=ANY=[@ANYBLOB="3400000006c08fada241ee0a049e6fba3f36f40da839bbdf54c31768b0026f4261f56d51c5d81ba4cb99f8203c40d0a142fcd75ce26e408d229139f8c4e81109c56a18e453e8a537df21c4ec04a4f3e22f4ac125a28ad43e41107b1f7e79c8573985e54fd665e2913ca74da8c9f3fc2839258c19fa7ac20ebead31206cf280ea73f635bc5418b66554392dfd11874fef72bc53538aae3cb5ef8a80140f4737dd2c572a03ee1d5e3d627e", @ANYRESOCT=0x0, @ANYBLOB="010000000000000000000100000000000000014100000018001700000000000000007564503a73"], 0x34}, 0x1, 0x0, 0x0, 0x1}, 0x0) ioctl$AUTOFS_DEV_IOCTL_PROTOSUBVER(r1, 0xc0189373, &(0x7f0000000540)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x6}}, './file0\x00'}) sendmsg$TIPC_CMD_GET_MAX_PORTS(r5, &(0x7f0000001140)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x40000}, 0xc, &(0x7f0000001100)={&(0x7f00000010c0)={0x1c, r8, 0x400, 0x8000, 0x25dfdbfe, {}, ["", "", "", "", "", "", ""]}, 0x1c}, 0x1, 0x0, 0x0, 0x20048854}, 0x4004) bpf$PROG_LOAD(0x5, &(0x7f0000000e40)={0x5, 0x16, &(0x7f0000001340)=ANY=[@ANYBLOB="390000000100000000000000900000f117fa0000", @ANYRES32=r4, @ANYBLOB="1f00000000000000b703000000000000850000000c000000b61b0453c29f42b5be06c7010b4efffe000000000085000000a900000018150000", @ANYRES32=r3, @ANYBLOB="0000000000000000180100002020782500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b70300000000850000005d000000185500000100000000000000000000009500000000000000"], &(0x7f0000000b80)='syzkaller\x00', 0x1, 0xe8, &(0x7f0000000bc0)=""/232, 0x41000, 0x5b, '\x00', 0x0, 0xe, r5, 0x8, &(0x7f0000000d00)={0x5, 0x2}, 0x8, 0x10, &(0x7f0000000d40)={0x4, 0xe, 0x2, 0x8}, 0x10, r6, r4, 0x5, &(0x7f0000000d80), &(0x7f0000000dc0)=[{0x4, 0x3, 0x0, 0x2}, {0x3, 0x1, 0xa, 0xa}, {0x0, 0x3, 0x2, 0xa}, {0x0, 0x3, 0x7, 0x1}, {0x1, 0x5, 0xb, 0xc}], 0x10, 0x7}, 0x90) 20:41:14 executing program 4: r0 = perf_event_open(&(0x7f0000000a40)={0x2, 0x80, 0xcd, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @perf_bp={&(0x7f0000000200), 0x8}, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfb75}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000040)={0x0, 0x4, 0x0, &(0x7f0000000180)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x80) perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x208, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x4, 0x8001}, 0x4000, 0x0, 0x0, 0x0, 0x0, 0x14e, 0xd1}, 0x0, 0xbfffffffffffffff, r0, 0x19893a9f0a0e2244) r1 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) syz_clone(0x2000000, 0x0, 0x0, 0x0, 0x0, 0x0) r2 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x18, 0x5, &(0x7f00000002c0)=ANY=[@ANYBLOB="180000001800ff0f0000000000000000850000006d000000750000000800000095"], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x80) r3 = perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400, 0x80000, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x7, 0x1007}, 0x8006, 0x0, 0x0, 0x1, 0x4, 0x800000, 0x3}, 0x0, 0xffefffffffffffff, 0xffffffffffffffff, 0x9) ioctl$PERF_EVENT_IOC_SET_FILTER(r3, 0x40082406, &(0x7f00000003c0)='memory.numa_stat\x00') perf_event_open(0x0, 0x0, 0x0, r3, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000080)='sched_switch\x00', r2}, 0x10) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000380)={{0x1, 0xffffffffffffffff}, &(0x7f0000000000), &(0x7f0000000240)=r2}, 0x20) r5 = memfd_secret(0x0) syz_io_uring_setup(0x0, &(0x7f0000000300)={0x0, 0x2, 0x0, 0x0, 0x0, 0x0, r5}, 0x0, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f00000009c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000000a00)=0x14) r7 = openat2(0xffffffffffffff9c, &(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)={0x40841}, 0x18) write$binfmt_script(r7, &(0x7f0000000340)=ANY=[], 0xfffffdef) r8 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000b40)={0x1b, 0x0, 0x0, 0x7, 0x0, 0xffffffffffffffff, 0x200, '\x00', 0x0, 0xffffffffffffffff, 0x3, 0x1, 0x4}, 0x48) r9 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000bc0)={0x2, 0x4, 0x8, 0x1, 0x80, 0x1, 0x9, '\x00', 0x0, 0xffffffffffffffff, 0x4, 0x1, 0x4}, 0x48) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000d00)={0x11, 0x12, &(0x7f0000000440)=@raw=[@exit, @ringbuf_query={{0x18, 0x1, 0x1, 0x0, r4}}, @ringbuf_output={{0x18, 0x1, 0x1, 0x0, r5}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x10001}, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x4, 0x0, 0x0, 0x2}}, @exit, @initr0={0x18, 0x0, 0x0, 0x0, 0x6349, 0x0, 0x0, 0x0, 0xf685}, @ldst={0x3, 0x2, 0x1, 0x0, 0xb, 0x2543a83bb932833c, 0x1}], &(0x7f0000000940)='syzkaller\x00', 0x80000001, 0x27, &(0x7f0000000980)=""/39, 0x41000, 0x40, '\x00', r6, 0x0, r7, 0x8, &(0x7f0000000ac0)={0x3, 0x1}, 0x8, 0x10, &(0x7f0000000b00)={0x2, 0xc, 0xfffffe00, 0x2}, 0x10, 0x0, 0x0, 0x5, &(0x7f0000000c40)=[r2, 0x1, 0x1, r8, r9, r1], &(0x7f0000000c80)=[{0x4, 0x1, 0x8, 0xc}, {0x0, 0x4, 0xf, 0x4}, {0x1, 0x2, 0xd, 0x6}, {0x0, 0x4, 0x10, 0xc}, {0x2, 0x4, 0xd, 0x1}], 0x10, 0x20}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000280)={&(0x7f0000000140)='ext4_ext_show_extent\x00', r2}, 0x10) r10 = perf_event_open(&(0x7f0000000080)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x2, 0xffffffffffffffff, 0xb) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000780)={0x14, 0x4, &(0x7f00000008c0)=ANY=[@ANYBLOB="850000006b00000018150000a3df7ddd9621fb0201050062d91123e632b2f902ad1e9f1cc7a66ed51ac8a4070000000000000019a83f0b7c9502871fb1ca3dc499e804bbbc359859ed6fd9f104fc7ed900d122072d8275a24d000000000601c3a63953a7b36fe458", @ANYRES32, @ANYBLOB="00000000000000002d59e4eda4000000"], &(0x7f0000000400)='syzkaller\x00', 0xfff, 0xe3, &(0x7f0000000580)=""/227, 0x0, 0x4, '\x00', 0x0, 0x24, 0xffffffffffffffff, 0x8, &(0x7f0000000500)={0x1, 0x3}, 0x8, 0x10, &(0x7f0000000680)={0x5, 0x6, 0x81, 0x9}, 0x10, 0xffffffffffffffff, 0xffffffffffffffff, 0x0, &(0x7f00000006c0)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, r10]}, 0x80) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x4030582a, &(0x7f0000000040)=0x91) 20:41:14 executing program 2: r0 = perf_event_open(&(0x7f0000000a40)={0x2, 0x80, 0xcd, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @perf_bp={&(0x7f0000000200), 0x8}, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfb75}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000040)={0x0, 0x4, 0x0, &(0x7f0000000180)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x80) perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x208, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x4, 0x8001}, 0x4000, 0x0, 0x0, 0x0, 0x0, 0x14e, 0xd1}, 0x0, 0xbfffffffffffffff, r0, 0x19893a9f0a0e2244) r1 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) syz_clone(0x2000000, 0x0, 0x0, 0x0, 0x0, 0x0) r2 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x18, 0x5, &(0x7f00000002c0)=ANY=[@ANYBLOB="180000001800ff0f0000000000000000850000006d000000750000000800000095"], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x80) r3 = perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400, 0x80000, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x7, 0x1007}, 0x8006, 0x0, 0x0, 0x1, 0x4, 0x800000, 0x3}, 0x0, 0xffefffffffffffff, 0xffffffffffffffff, 0x9) ioctl$PERF_EVENT_IOC_SET_FILTER(r3, 0x40082406, &(0x7f00000003c0)='memory.numa_stat\x00') perf_event_open(0x0, 0x0, 0x0, r3, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000080)='sched_switch\x00', r2}, 0x10) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000380)={{0x1, 0xffffffffffffffff}, &(0x7f0000000000), &(0x7f0000000240)=r2}, 0x20) r5 = memfd_secret(0x0) getsockname$packet(0xffffffffffffffff, &(0x7f00000009c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000000a00)=0x14) r7 = openat2(0xffffffffffffff9c, &(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)={0x40841}, 0x18) write$binfmt_script(r7, &(0x7f0000000340)=ANY=[], 0xfffffdef) r8 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000bc0)={0x2, 0x4, 0x8, 0x1, 0x80, 0x1, 0x9, '\x00', 0x0, 0xffffffffffffffff, 0x4, 0x1, 0x4}, 0x48) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000d00)={0x11, 0x12, &(0x7f0000000440)=@raw=[@exit, @ringbuf_query={{0x18, 0x1, 0x1, 0x0, r4}}, @ringbuf_output={{0x18, 0x1, 0x1, 0x0, r5}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x10001}, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x4, 0x0, 0x0, 0x2}}, @exit, @initr0={0x18, 0x0, 0x0, 0x0, 0x6349, 0x0, 0x0, 0x0, 0xf685}, @ldst={0x3, 0x2, 0x1, 0x0, 0xb, 0x2543a83bb932833c, 0x1}], &(0x7f0000000940)='syzkaller\x00', 0x80000001, 0x27, &(0x7f0000000980)=""/39, 0x41000, 0x40, '\x00', r6, 0x0, r7, 0x8, &(0x7f0000000ac0)={0x3, 0x1}, 0x8, 0x10, &(0x7f0000000b00)={0x2, 0xc, 0xfffffe00, 0x2}, 0x10, 0x0, 0x0, 0x5, &(0x7f0000000c40)=[r2, 0x1, 0x1, 0xffffffffffffffff, r8, r1], &(0x7f0000000c80)=[{0x4, 0x1, 0x8, 0xc}, {0x0, 0x4, 0xf, 0x4}, {0x1, 0x2, 0xd, 0x6}, {0x0, 0x4, 0x10, 0xc}, {0x2, 0x4, 0xd, 0x1}], 0x10, 0x20}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000280)={&(0x7f0000000140)='ext4_ext_show_extent\x00', r2}, 0x10) r9 = perf_event_open(&(0x7f0000000080)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) r10 = gettid() perf_event_open$cgroup(&(0x7f0000000300)={0x5, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_bp={&(0x7f0000000100)}, 0x81252, 0x6, 0x80000001, 0x0, 0x0, 0x0, 0x6, 0x0, 0x6, 0x0, 0x6}, 0xffffffffffffffff, 0xe, 0xffffffffffffffff, 0xc) perf_event_open(0x0, r10, 0x2, 0xffffffffffffffff, 0xb) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) perf_event_open(&(0x7f0000000840)={0x2, 0x80, 0x0, 0x7, 0x0, 0x80, 0x0, 0x3, 0x0, 0x9, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, @perf_config_ext={0x8000000000, 0x3}, 0x46c73247dfbe0d, 0x1007e, 0x0, 0x2, 0x0, 0x0, 0x6, 0x0, 0xffffffff, 0x0, 0x1c}, 0x0, 0x9, 0xffffffffffffffff, 0xd) bpf$PROG_LOAD(0x5, &(0x7f0000000780)={0x14, 0x4, &(0x7f00000008c0)=ANY=[@ANYBLOB="850000006b00000018150000a3df7ddd9621fb0201050062d91123e632b2f902ad1e9f1cc7a66ed51ac8a4070000000000000019a83f0b7c9502871fb1ca3dc499e804bbbc359859ed6fd9f104fc7ed900d122072d8275a24d000000000601c3a63953a7b36fe458", @ANYRES32, @ANYBLOB="00000000000000002d59e4eda4000000"], &(0x7f0000000400)='syzkaller\x00', 0xfff, 0xe3, &(0x7f0000000580)=""/227, 0x0, 0x4, '\x00', 0x0, 0x24, 0xffffffffffffffff, 0x8, &(0x7f0000000500)={0x1, 0x3}, 0x8, 0x10, &(0x7f0000000680)={0x5, 0x6, 0x81, 0x9}, 0x10, 0xffffffffffffffff, 0xffffffffffffffff, 0x0, &(0x7f00000006c0)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, r9]}, 0x80) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x4030582a, &(0x7f0000000040)=0x91) [ 126.226521][ T4030] udevd[4030]: inotify_add_watch(7, /dev/loop1p3, 10) failed: No such file or directory [ 126.243086][ T3169] udevd[3169]: inotify_add_watch(7, /dev/loop1p7, 10) failed: No such file or directory [ 126.283277][ T6432] loop1: detected capacity change from 0 to 2048 [ 126.320194][ T3169] udevd[3169]: inotify_add_watch(7, /dev/loop1p7, 10) failed: No such file or directory [ 126.322318][ T4030] udevd[4030]: inotify_add_watch(7, /dev/loop1p3, 10) failed: No such file or directory [ 126.395080][ T6432] loop1: p2 p3 p7 20:41:14 executing program 1: ioctl$BTRFS_IOC_LOGICAL_INO(0xffffffffffffffff, 0xc0389424, &(0x7f0000000180)={0x1, 0x20, '\x00', 0x1, &(0x7f0000000080)=[0x0, 0x0, 0x0, 0x0]}) r0 = socket$inet6(0xa, 0x3, 0x6) r1 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) r2 = dup2(r1, r0) ioctl$FIDEDUPERANGE(r0, 0xc0189436, &(0x7f0000000f00)=ANY=[@ANYBLOB="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"]) ioctl$TIOCSBRK(r2, 0x5427) recvfrom$inet6(0xffffffffffffffff, &(0x7f0000000280)=""/134, 0x86, 0x40000102, &(0x7f0000000340)={0xa, 0x4e21, 0x77f, @mcast1, 0x403b3f}, 0x1c) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000001040)={{r2, 0xffffffffffffffff}, &(0x7f0000000140), &(0x7f0000000480)=r1}, 0x20) syz_read_part_table(0x593, &(0x7f00000005c0)="$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") r4 = creat(&(0x7f0000000240)='./file0\x00', 0x0) stat(&(0x7f0000000040)='./file1\x00', &(0x7f0000000380)) fsetxattr$security_capability(r4, &(0x7f0000000100), &(0x7f0000000000)=@v1={0x1000000, [{0x80000000, 0x81}]}, 0xc, 0x0) newfstatat(0xffffffffffffff9c, &(0x7f00000000c0)='./file1\x00', &(0x7f0000001400), 0x400) close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x2) ioctl$TIOCSTI(r4, 0x5412, &(0x7f00000004c0)=0x40) fsync(0xffffffffffffffff) write$binfmt_misc(r4, &(0x7f0000001080)=ANY=[@ANYBLOB="7379d3c6"], 0x4) fallocate(r4, 0x100000011, 0x0, 0x2811fdff) open(&(0x7f0000000100)='.\x00', 0x20c2, 0x2d) open$dir(&(0x7f0000000500)='./file1\x00', 0x1c6c0, 0x0) r5 = openat$vcsu(0xffffffffffffff9c, &(0x7f0000000cc0), 0x400c00, 0x0) lsetxattr$security_selinux(&(0x7f0000001180)='./file1\x00', &(0x7f00000011c0), &(0x7f0000001300)='system_u:object_r:unconfined_exec_t:s0\x00', 0x27, 0x3) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000400)={0xffffffffffffffff, 0xe0, &(0x7f0000000300)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, &(0x7f00000000c0)=[0x0], &(0x7f0000000140), 0x0, 0x8, &(0x7f0000000200)=[{}, {}, {}, {}, {}], 0x28, 0x0, 0x0, 0x0, 0x0, 0x10, 0x8, 0x8, &(0x7f00000002c0)}}, 0x10) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000e80)=@bpf_lsm={0x1d, 0x4, &(0x7f0000000040)=@framed={{0x18, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x73fc}, [@generic={0x9, 0x8, 0x0, 0x7f, 0x200}]}, &(0x7f0000000880)='GPL\x00', 0x1f, 0x93, &(0x7f0000000cc0)=""/147, 0x40f00, 0x2, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, &(0x7f0000000b80)={0x9}, 0x8, 0x10, 0x0, 0x0, r6}, 0x80) r7 = socket$nl_generic(0x10, 0x3, 0x10) r8 = syz_genetlink_get_family_id$tipc(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$TIPC_CMD_ENABLE_BEARER(r7, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000001200)=ANY=[@ANYBLOB="3400000006c08fada241ee0a049e6fba3f36f40da839bbdf54c31768b0026f4261f56d51c5d81ba4cb99f8203c40d0a142fcd75ce26e408d229139f8c4e81109c56a18e453e8a537df21c4ec04a4f3e22f4ac125a28ad43e41107b1f7e79c8573985e54fd665e2913ca74da8c9f3fc2839258c19fa7ac20ebead31206cf280ea73f635bc5418b66554392dfd11874fef72bc53538aae3cb5ef8a80140f4737dd2c572a03ee1d5e3d627e", @ANYRESOCT=0x0, @ANYBLOB="010000000000000000000100000000000000014100000018001700000000000000007564503a73"], 0x34}, 0x1, 0x0, 0x0, 0x1}, 0x0) ioctl$AUTOFS_DEV_IOCTL_PROTOSUBVER(r1, 0xc0189373, &(0x7f0000000540)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x6}}, './file0\x00'}) sendmsg$TIPC_CMD_GET_MAX_PORTS(r5, &(0x7f0000001140)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x40000}, 0xc, &(0x7f0000001100)={&(0x7f00000010c0)={0x1c, r8, 0x400, 0x8000, 0x25dfdbfe, {}, ["", "", "", "", "", "", ""]}, 0x1c}, 0x1, 0x0, 0x0, 0x20048854}, 0x4004) bpf$PROG_LOAD(0x5, &(0x7f0000000e40)={0x5, 0x16, &(0x7f0000001340)=ANY=[@ANYBLOB="390000000100000000000000900000f117fa0000", @ANYRES32=r4, @ANYBLOB="1f00000000000000b703000000000000850000000c000000b61b0453c29f42b5be06c7010b4efffe000000000085000000a900000018150000", @ANYRES32=r3, @ANYBLOB="0000000000000000180100002020782500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b70300000000850000005d000000185500000100000000000000000000009500000000000000"], &(0x7f0000000b80)='syzkaller\x00', 0x1, 0xe8, &(0x7f0000000bc0)=""/232, 0x41000, 0x5b, '\x00', 0x0, 0xe, r5, 0x8, &(0x7f0000000d00)={0x5, 0x2}, 0x8, 0x10, &(0x7f0000000d40)={0x4, 0xe, 0x2, 0x8}, 0x10, r6, r4, 0x5, &(0x7f0000000d80), &(0x7f0000000dc0)=[{0x4, 0x3, 0x0, 0x2}, {0x3, 0x1, 0xa, 0xa}, {0x0, 0x3, 0x2, 0xa}, {0x0, 0x3, 0x7, 0x1}, {0x1, 0x5, 0xb, 0xc}], 0x10, 0x7}, 0x90) [ 126.631747][ T6452] loop1: detected capacity change from 0 to 2048 [ 126.653538][ T6383] chnl_net:caif_netlink_parms(): no params data found [ 126.761226][ T6452] loop1: p2 p3 p7 20:41:15 executing program 1: ioctl$BTRFS_IOC_LOGICAL_INO(0xffffffffffffffff, 0xc0389424, &(0x7f0000000180)={0x1, 0x20, '\x00', 0x1, &(0x7f0000000080)=[0x0, 0x0, 0x0, 0x0]}) r0 = socket$inet6(0xa, 0x3, 0x6) r1 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) r2 = dup2(r1, r0) ioctl$FIDEDUPERANGE(r0, 0xc0189436, &(0x7f0000000f00)=ANY=[@ANYBLOB="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"]) ioctl$TIOCSBRK(r2, 0x5427) recvfrom$inet6(0xffffffffffffffff, &(0x7f0000000280)=""/134, 0x86, 0x40000102, &(0x7f0000000340)={0xa, 0x4e21, 0x77f, @mcast1, 0x403b3f}, 0x1c) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000001040)={{r2, 0xffffffffffffffff}, &(0x7f0000000140), &(0x7f0000000480)=r1}, 0x20) syz_read_part_table(0x593, &(0x7f00000005c0)="$eJzs0r1LK2kUB+A3A5c0e4lcLli4hWCwigqx0CIpRGJIY0RcsbAWLLQQLCwkEq39+AcUv0BsxD6lGEEUYiUpxXpBsUmVZdfZxmplUdnleZrhPefMHF5+E/hPi8Lv7XY7EUJoJ9//9m+nhbFS98TI5FQIiTAbQij8+stfnUQ88fdXz+NzOT6XktnG/vXo82nHTc9dPX0Yxf1aFMJaCGHh4Sj1b+/G/99Z/jK1vrFU3FzJz98XVx8H5/oKXVuFxZ2hg1xlujM3E/9Ytehz9qcbw8e37fLT7vf+b/VGK3sVz2USH7Ofr/U2/72f1Wa1Nd57sjyQ+dG8qGzHub/IHwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA+GBn+cvU+sZScXMlP39fXH0cnOsrdG0VFneGDnKV6c7cTPQ6V4s+Z3+6MXx82y4/7X7v/1ZvtLJX8Vwm8TH7+Vpv89/7WW1WW+O9J8sDmR/Ni8p2nPuL/AEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAACAf6gwVuqeGJmcCiERZkMIo1HH0Z/1dvK1n4jnzuNnOa6XktnG/vXo82nHTc9dPX04EddrUQhrIYSFh6PUp1+Gd/sjAAD///tch0s=") r4 = creat(&(0x7f0000000240)='./file0\x00', 0x0) stat(&(0x7f0000000040)='./file1\x00', &(0x7f0000000380)) fsetxattr$security_capability(r4, &(0x7f0000000100), &(0x7f0000000000)=@v1={0x1000000, [{0x80000000, 0x81}]}, 0xc, 0x0) newfstatat(0xffffffffffffff9c, &(0x7f00000000c0)='./file1\x00', &(0x7f0000001400), 0x400) close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x2) ioctl$TIOCSTI(r4, 0x5412, &(0x7f00000004c0)=0x40) fsync(0xffffffffffffffff) write$binfmt_misc(r4, &(0x7f0000001080)=ANY=[@ANYBLOB="7379d3c6"], 0x4) fallocate(r4, 0x100000011, 0x0, 0x2811fdff) open(&(0x7f0000000100)='.\x00', 0x20c2, 0x2d) open$dir(&(0x7f0000000500)='./file1\x00', 0x1c6c0, 0x0) r5 = openat$vcsu(0xffffffffffffff9c, &(0x7f0000000cc0), 0x400c00, 0x0) lsetxattr$security_selinux(&(0x7f0000001180)='./file1\x00', &(0x7f00000011c0), &(0x7f0000001300)='system_u:object_r:unconfined_exec_t:s0\x00', 0x27, 0x3) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000400)={0xffffffffffffffff, 0xe0, &(0x7f0000000300)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, &(0x7f00000000c0)=[0x0], &(0x7f0000000140), 0x0, 0x8, &(0x7f0000000200)=[{}, {}, {}, {}, {}], 0x28, 0x0, 0x0, 0x0, 0x0, 0x10, 0x8, 0x8, &(0x7f00000002c0)}}, 0x10) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000e80)=@bpf_lsm={0x1d, 0x4, &(0x7f0000000040)=@framed={{0x18, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x73fc}, [@generic={0x9, 0x8, 0x0, 0x7f, 0x200}]}, &(0x7f0000000880)='GPL\x00', 0x1f, 0x93, &(0x7f0000000cc0)=""/147, 0x40f00, 0x2, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, &(0x7f0000000b80)={0x9}, 0x8, 0x10, 0x0, 0x0, r6}, 0x80) r7 = socket$nl_generic(0x10, 0x3, 0x10) r8 = syz_genetlink_get_family_id$tipc(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$TIPC_CMD_ENABLE_BEARER(r7, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000001200)=ANY=[@ANYBLOB="3400000006c08fada241ee0a049e6fba3f36f40da839bbdf54c31768b0026f4261f56d51c5d81ba4cb99f8203c40d0a142fcd75ce26e408d229139f8c4e81109c56a18e453e8a537df21c4ec04a4f3e22f4ac125a28ad43e41107b1f7e79c8573985e54fd665e2913ca74da8c9f3fc2839258c19fa7ac20ebead31206cf280ea73f635bc5418b66554392dfd11874fef72bc53538aae3cb5ef8a80140f4737dd2c572a03ee1d5e3d627e", @ANYRESOCT=0x0, @ANYBLOB="010000000000000000000100000000000000014100000018001700000000000000007564503a73"], 0x34}, 0x1, 0x0, 0x0, 0x1}, 0x0) ioctl$AUTOFS_DEV_IOCTL_PROTOSUBVER(r1, 0xc0189373, &(0x7f0000000540)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x6}}, './file0\x00'}) sendmsg$TIPC_CMD_GET_MAX_PORTS(r5, &(0x7f0000001140)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x40000}, 0xc, &(0x7f0000001100)={&(0x7f00000010c0)={0x1c, r8, 0x400, 0x8000, 0x25dfdbfe, {}, ["", "", "", "", "", "", ""]}, 0x1c}, 0x1, 0x0, 0x0, 0x20048854}, 0x4004) bpf$PROG_LOAD(0x5, &(0x7f0000000e40)={0x5, 0x16, &(0x7f0000001340)=ANY=[@ANYBLOB="390000000100000000000000900000f117fa0000", @ANYRES32=r4, @ANYBLOB="1f00000000000000b703000000000000850000000c000000b61b0453c29f42b5be06c7010b4efffe000000000085000000a900000018150000", @ANYRES32=r3, @ANYBLOB="0000000000000000180100002020782500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b70300000000850000005d000000185500000100000000000000000000009500000000000000"], &(0x7f0000000b80)='syzkaller\x00', 0x1, 0xe8, &(0x7f0000000bc0)=""/232, 0x41000, 0x5b, '\x00', 0x0, 0xe, r5, 0x8, &(0x7f0000000d00)={0x5, 0x2}, 0x8, 0x10, &(0x7f0000000d40)={0x4, 0xe, 0x2, 0x8}, 0x10, r6, r4, 0x5, &(0x7f0000000d80), &(0x7f0000000dc0)=[{0x4, 0x3, 0x0, 0x2}, {0x3, 0x1, 0xa, 0xa}, {0x0, 0x3, 0x2, 0xa}, {0x0, 0x3, 0x7, 0x1}, {0x1, 0x5, 0xb, 0xc}], 0x10, 0x7}, 0x90) [ 126.882452][ T6456] loop1: detected capacity change from 0 to 2048 [ 126.902951][ T26] hsr_slave_0: left promiscuous mode [ 126.935460][ T26] hsr_slave_1: left promiscuous mode [ 126.958874][ T26] batman_adv: batadv0: Interface deactivated: batadv_slave_0 [ 126.966378][ T26] batman_adv: batadv0: Removing interface: batadv_slave_0 20:41:15 executing program 4: r0 = perf_event_open(&(0x7f0000000a40)={0x2, 0x80, 0xcd, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @perf_bp={&(0x7f0000000200), 0x8}, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfb75}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000040)={0x0, 0x4, 0x0, &(0x7f0000000180)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x80) perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x208, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x4, 0x8001}, 0x4000, 0x0, 0x0, 0x0, 0x0, 0x14e, 0xd1}, 0x0, 0xbfffffffffffffff, r0, 0x19893a9f0a0e2244) r1 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) syz_clone(0x2000000, 0x0, 0x0, 0x0, 0x0, 0x0) r2 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x18, 0x5, &(0x7f00000002c0)=ANY=[@ANYBLOB="180000001800ff0f0000000000000000850000006d000000750000000800000095"], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x80) r3 = perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400, 0x80000, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x7, 0x1007}, 0x8006, 0x0, 0x0, 0x1, 0x4, 0x800000, 0x3}, 0x0, 0xffefffffffffffff, 0xffffffffffffffff, 0x9) ioctl$PERF_EVENT_IOC_SET_FILTER(r3, 0x40082406, &(0x7f00000003c0)='memory.numa_stat\x00') perf_event_open(0x0, 0x0, 0x0, r3, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000080)='sched_switch\x00', r2}, 0x10) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000380)={{0x1, 0xffffffffffffffff}, &(0x7f0000000000), &(0x7f0000000240)=r2}, 0x20) r5 = memfd_secret(0x0) syz_io_uring_setup(0x0, &(0x7f0000000300)={0x0, 0x2, 0x0, 0x0, 0x0, 0x0, r5}, 0x0, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f00000009c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000000a00)=0x14) r7 = openat2(0xffffffffffffff9c, &(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)={0x40841}, 0x18) write$binfmt_script(r7, &(0x7f0000000340)=ANY=[], 0xfffffdef) r8 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000b40)={0x1b, 0x0, 0x0, 0x7, 0x0, 0xffffffffffffffff, 0x200, '\x00', 0x0, 0xffffffffffffffff, 0x3, 0x1, 0x4}, 0x48) r9 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000bc0)={0x2, 0x4, 0x8, 0x1, 0x80, 0x1, 0x9, '\x00', 0x0, 0xffffffffffffffff, 0x4, 0x1, 0x4}, 0x48) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000d00)={0x11, 0x12, &(0x7f0000000440)=@raw=[@exit, @ringbuf_query={{0x18, 0x1, 0x1, 0x0, r4}}, @ringbuf_output={{0x18, 0x1, 0x1, 0x0, r5}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x10001}, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x4, 0x0, 0x0, 0x2}}, @exit, @initr0={0x18, 0x0, 0x0, 0x0, 0x6349, 0x0, 0x0, 0x0, 0xf685}, @ldst={0x3, 0x2, 0x1, 0x0, 0xb, 0x2543a83bb932833c, 0x1}], &(0x7f0000000940)='syzkaller\x00', 0x80000001, 0x27, &(0x7f0000000980)=""/39, 0x41000, 0x40, '\x00', r6, 0x0, r7, 0x8, &(0x7f0000000ac0)={0x3, 0x1}, 0x8, 0x10, &(0x7f0000000b00)={0x2, 0xc, 0xfffffe00, 0x2}, 0x10, 0x0, 0x0, 0x5, &(0x7f0000000c40)=[r2, 0x1, 0x1, r8, r9, r1], &(0x7f0000000c80)=[{0x4, 0x1, 0x8, 0xc}, {0x0, 0x4, 0xf, 0x4}, {0x1, 0x2, 0xd, 0x6}, {0x0, 0x4, 0x10, 0xc}, {0x2, 0x4, 0xd, 0x1}], 0x10, 0x20}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000280)={&(0x7f0000000140)='ext4_ext_show_extent\x00', r2}, 0x10) r10 = perf_event_open(&(0x7f0000000080)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open$cgroup(&(0x7f0000000300)={0x5, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_bp={&(0x7f0000000100)}, 0x81252, 0x6, 0x80000001, 0x0, 0x0, 0x0, 0x6, 0x0, 0x6, 0x0, 0x6}, 0xffffffffffffffff, 0xe, 0xffffffffffffffff, 0xc) perf_event_open(0x0, 0x0, 0x2, 0xffffffffffffffff, 0xb) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000780)={0x14, 0x4, &(0x7f00000008c0)=ANY=[@ANYBLOB="850000006b00000018150000a3df7ddd9621fb0201050062d91123e632b2f902ad1e9f1cc7a66ed51ac8a4070000000000000019a83f0b7c9502871fb1ca3dc499e804bbbc359859ed6fd9f104fc7ed900d122072d8275a24d000000000601c3a63953a7b36fe458", @ANYRES32, @ANYBLOB="00000000000000002d59e4eda4000000"], &(0x7f0000000400)='syzkaller\x00', 0xfff, 0xe3, &(0x7f0000000580)=""/227, 0x0, 0x4, '\x00', 0x0, 0x24, 0xffffffffffffffff, 0x8, &(0x7f0000000500)={0x1, 0x3}, 0x8, 0x10, &(0x7f0000000680)={0x5, 0x6, 0x81, 0x9}, 0x10, 0xffffffffffffffff, 0xffffffffffffffff, 0x0, &(0x7f00000006c0)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, r10]}, 0x80) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x4030582a, &(0x7f0000000040)=0x91) [ 127.003831][ T6456] loop1: p2 p3 p7 [ 127.008279][ T26] batman_adv: batadv0: Interface deactivated: batadv_slave_1 [ 127.015790][ T26] batman_adv: batadv0: Removing interface: batadv_slave_1 20:41:15 executing program 1: ioctl$BTRFS_IOC_LOGICAL_INO(0xffffffffffffffff, 0xc0389424, &(0x7f0000000180)={0x1, 0x20, '\x00', 0x1, &(0x7f0000000080)=[0x0, 0x0, 0x0, 0x0]}) r0 = socket$inet6(0xa, 0x3, 0x6) r1 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) r2 = dup2(r1, r0) ioctl$FIDEDUPERANGE(r0, 0xc0189436, &(0x7f0000000f00)=ANY=[@ANYBLOB="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"]) ioctl$TIOCSBRK(r2, 0x5427) recvfrom$inet6(0xffffffffffffffff, &(0x7f0000000280)=""/134, 0x86, 0x40000102, &(0x7f0000000340)={0xa, 0x4e21, 0x77f, @mcast1, 0x403b3f}, 0x1c) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000001040)={{r2, 0xffffffffffffffff}, &(0x7f0000000140), &(0x7f0000000480)=r1}, 0x20) syz_read_part_table(0x593, &(0x7f00000005c0)="$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") r4 = creat(&(0x7f0000000240)='./file0\x00', 0x0) stat(&(0x7f0000000040)='./file1\x00', &(0x7f0000000380)) fsetxattr$security_capability(r4, &(0x7f0000000100), &(0x7f0000000000)=@v1={0x1000000, [{0x80000000, 0x81}]}, 0xc, 0x0) newfstatat(0xffffffffffffff9c, &(0x7f00000000c0)='./file1\x00', &(0x7f0000001400), 0x400) close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x2) ioctl$TIOCSTI(r4, 0x5412, &(0x7f00000004c0)=0x40) fsync(0xffffffffffffffff) write$binfmt_misc(r4, &(0x7f0000001080)=ANY=[@ANYBLOB="7379d3c6"], 0x4) fallocate(r4, 0x100000011, 0x0, 0x2811fdff) open(&(0x7f0000000100)='.\x00', 0x20c2, 0x2d) open$dir(&(0x7f0000000500)='./file1\x00', 0x1c6c0, 0x0) r5 = openat$vcsu(0xffffffffffffff9c, &(0x7f0000000cc0), 0x400c00, 0x0) lsetxattr$security_selinux(&(0x7f0000001180)='./file1\x00', &(0x7f00000011c0), &(0x7f0000001300)='system_u:object_r:unconfined_exec_t:s0\x00', 0x27, 0x3) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000400)={0xffffffffffffffff, 0xe0, &(0x7f0000000300)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, &(0x7f00000000c0)=[0x0], &(0x7f0000000140), 0x0, 0x8, &(0x7f0000000200)=[{}, {}, {}, {}, {}], 0x28, 0x0, 0x0, 0x0, 0x0, 0x10, 0x8, 0x8, &(0x7f00000002c0)}}, 0x10) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000e80)=@bpf_lsm={0x1d, 0x4, &(0x7f0000000040)=@framed={{0x18, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x73fc}, [@generic={0x9, 0x8, 0x0, 0x7f, 0x200}]}, &(0x7f0000000880)='GPL\x00', 0x1f, 0x93, &(0x7f0000000cc0)=""/147, 0x40f00, 0x2, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, &(0x7f0000000b80)={0x9}, 0x8, 0x10, 0x0, 0x0, r6}, 0x80) r7 = socket$nl_generic(0x10, 0x3, 0x10) r8 = syz_genetlink_get_family_id$tipc(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$TIPC_CMD_ENABLE_BEARER(r7, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000001200)=ANY=[@ANYBLOB="3400000006c08fada241ee0a049e6fba3f36f40da839bbdf54c31768b0026f4261f56d51c5d81ba4cb99f8203c40d0a142fcd75ce26e408d229139f8c4e81109c56a18e453e8a537df21c4ec04a4f3e22f4ac125a28ad43e41107b1f7e79c8573985e54fd665e2913ca74da8c9f3fc2839258c19fa7ac20ebead31206cf280ea73f635bc5418b66554392dfd11874fef72bc53538aae3cb5ef8a80140f4737dd2c572a03ee1d5e3d627e", @ANYRESOCT=0x0, @ANYBLOB="010000000000000000000100000000000000014100000018001700000000000000007564503a73"], 0x34}, 0x1, 0x0, 0x0, 0x1}, 0x0) ioctl$AUTOFS_DEV_IOCTL_PROTOSUBVER(r1, 0xc0189373, &(0x7f0000000540)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x6}}, './file0\x00'}) sendmsg$TIPC_CMD_GET_MAX_PORTS(r5, &(0x7f0000001140)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x40000}, 0xc, &(0x7f0000001100)={&(0x7f00000010c0)={0x1c, r8, 0x400, 0x8000, 0x25dfdbfe, {}, ["", "", "", "", "", "", ""]}, 0x1c}, 0x1, 0x0, 0x0, 0x20048854}, 0x4004) bpf$PROG_LOAD(0x5, &(0x7f0000000e40)={0x5, 0x16, &(0x7f0000001340)=ANY=[@ANYBLOB="390000000100000000000000900000f117fa0000", @ANYRES32=r4, @ANYBLOB="1f00000000000000b703000000000000850000000c000000b61b0453c29f42b5be06c7010b4efffe000000000085000000a900000018150000", @ANYRES32=r3, @ANYBLOB="0000000000000000180100002020782500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b70300000000850000005d000000185500000100000000000000000000009500000000000000"], &(0x7f0000000b80)='syzkaller\x00', 0x1, 0xe8, &(0x7f0000000bc0)=""/232, 0x41000, 0x5b, '\x00', 0x0, 0xe, r5, 0x8, &(0x7f0000000d00)={0x5, 0x2}, 0x8, 0x10, &(0x7f0000000d40)={0x4, 0xe, 0x2, 0x8}, 0x10, r6, r4, 0x5, &(0x7f0000000d80), &(0x7f0000000dc0)=[{0x4, 0x3, 0x0, 0x2}, {0x3, 0x1, 0xa, 0xa}, {0x0, 0x3, 0x2, 0xa}, {0x0, 0x3, 0x7, 0x1}, {0x1, 0x5, 0xb, 0xc}], 0x10, 0x7}, 0x90) 20:41:15 executing program 2: r0 = perf_event_open(&(0x7f0000000a40)={0x2, 0x80, 0xcd, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @perf_bp={&(0x7f0000000200), 0x8}, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfb75}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000040)={0x0, 0x4, 0x0, &(0x7f0000000180)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x80) perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x208, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x4, 0x8001}, 0x4000, 0x0, 0x0, 0x0, 0x0, 0x14e, 0xd1}, 0x0, 0xbfffffffffffffff, r0, 0x19893a9f0a0e2244) r1 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) syz_clone(0x2000000, 0x0, 0x0, 0x0, 0x0, 0x0) r2 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x18, 0x5, &(0x7f00000002c0)=ANY=[@ANYBLOB="180000001800ff0f0000000000000000850000006d000000750000000800000095"], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x80) r3 = perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400, 0x80000, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x7, 0x1007}, 0x8006, 0x0, 0x0, 0x1, 0x4, 0x800000, 0x3}, 0x0, 0xffefffffffffffff, 0xffffffffffffffff, 0x9) ioctl$PERF_EVENT_IOC_SET_FILTER(r3, 0x40082406, &(0x7f00000003c0)='memory.numa_stat\x00') perf_event_open(0x0, 0x0, 0x0, r3, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000080)='sched_switch\x00', r2}, 0x10) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000380)={{0x1, 0xffffffffffffffff}, &(0x7f0000000000), &(0x7f0000000240)=r2}, 0x20) syz_io_uring_setup(0x0, &(0x7f0000000300)={0x0, 0x2}, 0x0, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f00000009c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000000a00)=0x14) r6 = openat2(0xffffffffffffff9c, &(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)={0x40841}, 0x18) write$binfmt_script(r6, &(0x7f0000000340)=ANY=[], 0xfffffdef) r7 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000bc0)={0x2, 0x4, 0x8, 0x1, 0x80, 0x1, 0x9, '\x00', 0x0, 0xffffffffffffffff, 0x4, 0x1, 0x4}, 0x48) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000d00)={0x11, 0x12, &(0x7f0000000440)=@raw=[@exit, @ringbuf_query={{0x18, 0x1, 0x1, 0x0, r4}}, @ringbuf_output={{}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x10001}, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x4, 0x0, 0x0, 0x2}}, @exit, @initr0={0x18, 0x0, 0x0, 0x0, 0x6349, 0x0, 0x0, 0x0, 0xf685}, @ldst={0x3, 0x2, 0x1, 0x0, 0xb, 0x2543a83bb932833c, 0x1}], &(0x7f0000000940)='syzkaller\x00', 0x80000001, 0x27, &(0x7f0000000980)=""/39, 0x41000, 0x40, '\x00', r5, 0x0, r6, 0x8, &(0x7f0000000ac0)={0x3, 0x1}, 0x8, 0x10, &(0x7f0000000b00)={0x2, 0xc, 0xfffffe00, 0x2}, 0x10, 0x0, 0x0, 0x5, &(0x7f0000000c40)=[r2, 0x1, 0x1, 0xffffffffffffffff, r7, r1], &(0x7f0000000c80)=[{0x4, 0x1, 0x8, 0xc}, {0x0, 0x4, 0xf, 0x4}, {0x1, 0x2, 0xd, 0x6}, {0x0, 0x4, 0x10, 0xc}, {0x2, 0x4, 0xd, 0x1}], 0x10, 0x20}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000280)={&(0x7f0000000140)='ext4_ext_show_extent\x00', r2}, 0x10) r8 = perf_event_open(&(0x7f0000000080)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) r9 = gettid() perf_event_open$cgroup(&(0x7f0000000300)={0x5, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_bp={&(0x7f0000000100)}, 0x81252, 0x6, 0x80000001, 0x0, 0x0, 0x0, 0x6, 0x0, 0x6, 0x0, 0x6}, 0xffffffffffffffff, 0xe, 0xffffffffffffffff, 0xc) perf_event_open(0x0, r9, 0x2, 0xffffffffffffffff, 0xb) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) perf_event_open(&(0x7f0000000840)={0x2, 0x80, 0x0, 0x7, 0x0, 0x80, 0x0, 0x3, 0x0, 0x9, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, @perf_config_ext={0x8000000000, 0x3}, 0x46c73247dfbe0d, 0x1007e, 0x0, 0x2, 0x0, 0x0, 0x6, 0x0, 0xffffffff, 0x0, 0x1c}, 0x0, 0x9, 0xffffffffffffffff, 0xd) bpf$PROG_LOAD(0x5, &(0x7f0000000780)={0x14, 0x4, &(0x7f00000008c0)=ANY=[@ANYBLOB="850000006b00000018150000a3df7ddd9621fb0201050062d91123e632b2f902ad1e9f1cc7a66ed51ac8a4070000000000000019a83f0b7c9502871fb1ca3dc499e804bbbc359859ed6fd9f104fc7ed900d122072d8275a24d000000000601c3a63953a7b36fe458", @ANYRES32, @ANYBLOB="00000000000000002d59e4eda4000000"], &(0x7f0000000400)='syzkaller\x00', 0xfff, 0xe3, &(0x7f0000000580)=""/227, 0x0, 0x4, '\x00', 0x0, 0x24, 0xffffffffffffffff, 0x8, &(0x7f0000000500)={0x1, 0x3}, 0x8, 0x10, &(0x7f0000000680)={0x5, 0x6, 0x81, 0x9}, 0x10, 0xffffffffffffffff, 0xffffffffffffffff, 0x0, &(0x7f00000006c0)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, r8]}, 0x80) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x4030582a, &(0x7f0000000040)=0x91) [ 127.059305][ T26] bridge_slave_1: left allmulticast mode [ 127.065003][ T26] bridge_slave_1: left promiscuous mode [ 127.070877][ T26] bridge0: port 2(bridge_slave_1) entered disabled state [ 127.090223][ T2775] loop1: p2 p3 p7 [ 127.132907][ T26] bridge_slave_0: left allmulticast mode [ 127.139783][ T26] bridge_slave_0: left promiscuous mode [ 127.147788][ T26] bridge0: port 1(bridge_slave_0) entered disabled state [ 127.185911][ T6476] loop1: detected capacity change from 0 to 2048 [ 127.192821][ T26] veth1_macvtap: left promiscuous mode [ 127.198467][ T26] veth0_macvtap: left promiscuous mode [ 127.204017][ T26] veth1_vlan: left promiscuous mode [ 127.209322][ T26] veth0_vlan: left promiscuous mode [ 127.285647][ T6476] loop1: p2 p3 p7 20:41:15 executing program 1: ioctl$BTRFS_IOC_LOGICAL_INO(0xffffffffffffffff, 0xc0389424, &(0x7f0000000180)={0x1, 0x28, '\x00', 0x1, &(0x7f0000000080)=[0x0, 0x0, 0x0, 0x0, 0x0]}) r0 = socket$inet6(0xa, 0x0, 0x6) r1 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) r2 = dup2(r1, r0) ioctl$FIDEDUPERANGE(r0, 0xc0189436, &(0x7f0000000f00)=ANY=[@ANYBLOB="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"]) ioctl$TIOCSBRK(r2, 0x5427) recvfrom$inet6(0xffffffffffffffff, &(0x7f0000000280)=""/134, 0x86, 0x40000102, &(0x7f0000000340)={0xa, 0x4e21, 0x77f, @mcast1, 0x403b3f}, 0x1c) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000001040)={{r2, 0xffffffffffffffff}, &(0x7f0000000140), &(0x7f0000000480)=r1}, 0x20) syz_read_part_table(0x593, &(0x7f00000005c0)="$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") r4 = creat(&(0x7f0000000240)='./file0\x00', 0x0) stat(&(0x7f0000000040)='./file1\x00', &(0x7f0000000380)) fsetxattr$security_capability(r4, &(0x7f0000000100), &(0x7f0000000000)=@v1={0x1000000, [{0x80000000, 0x81}]}, 0xc, 0x0) newfstatat(0xffffffffffffff9c, &(0x7f00000000c0)='./file1\x00', &(0x7f0000001400), 0x400) close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x2) ioctl$TIOCSTI(r4, 0x5412, &(0x7f00000004c0)=0x40) fsync(0xffffffffffffffff) write$binfmt_misc(r4, &(0x7f0000001080)=ANY=[@ANYBLOB="7379d3c6"], 0x4) fallocate(r4, 0x100000011, 0x0, 0x2811fdff) open(&(0x7f0000000100)='.\x00', 0x20c2, 0x2d) open$dir(&(0x7f0000000500)='./file1\x00', 0x1c6c0, 0x0) r5 = openat$vcsu(0xffffffffffffff9c, &(0x7f0000000cc0), 0x400c00, 0x0) lsetxattr$security_selinux(&(0x7f0000001180)='./file1\x00', &(0x7f00000011c0), &(0x7f0000001300)='system_u:object_r:unconfined_exec_t:s0\x00', 0x27, 0x3) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000400)={0xffffffffffffffff, 0xe0, &(0x7f0000000300)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, &(0x7f00000000c0)=[0x0], &(0x7f0000000140), 0x0, 0x8, &(0x7f0000000200)=[{}, {}, {}, {}, {}], 0x28, 0x0, 0x0, 0x0, 0x0, 0x10, 0x8, 0x8, &(0x7f00000002c0)}}, 0x10) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000e80)=@bpf_lsm={0x1d, 0x4, &(0x7f0000000040)=@framed={{0x18, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x73fc}, [@generic={0x9, 0x8, 0x0, 0x7f, 0x200}]}, &(0x7f0000000880)='GPL\x00', 0x1f, 0x93, &(0x7f0000000cc0)=""/147, 0x40f00, 0x2, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, &(0x7f0000000b80)={0x9}, 0x8, 0x10, 0x0, 0x0, r6}, 0x80) r7 = socket$nl_generic(0x10, 0x3, 0x10) r8 = syz_genetlink_get_family_id$tipc(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$TIPC_CMD_ENABLE_BEARER(r7, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000001200)=ANY=[@ANYBLOB="3400000006c08fada241ee0a049e6fba3f36f40da839bbdf54c31768b0026f4261f56d51c5d81ba4cb99f8203c40d0a142fcd75ce26e408d229139f8c4e81109c56a18e453e8a537df21c4ec04a4f3e22f4ac125a28ad43e41107b1f7e79c8573985e54fd665e2913ca74da8c9f3fc2839258c19fa7ac20ebead31206cf280ea73f635bc5418b66554392dfd11874fef72bc53538aae3cb5ef8a80140f4737dd2c572a03ee1d5e3d627e", @ANYRESOCT=0x0, @ANYBLOB="010000000000000000000100000000000000014100000018001700000000000000007564503a73"], 0x34}, 0x1, 0x0, 0x0, 0x1}, 0x0) ioctl$AUTOFS_DEV_IOCTL_PROTOSUBVER(r1, 0xc0189373, &(0x7f0000000540)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x6}}, './file0\x00'}) sendmsg$TIPC_CMD_GET_MAX_PORTS(r5, &(0x7f0000001140)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x40000}, 0xc, &(0x7f0000001100)={&(0x7f00000010c0)={0x1c, r8, 0x400, 0x8000, 0x25dfdbfe, {}, ["", "", "", "", "", "", ""]}, 0x1c}, 0x1, 0x0, 0x0, 0x20048854}, 0x4004) bpf$PROG_LOAD(0x5, &(0x7f0000000e40)={0x5, 0x16, &(0x7f0000001340)=ANY=[@ANYBLOB="390000000100000000000000900000f117fa0000", @ANYRES32=r4, @ANYBLOB="1f00000000000000b703000000000000850000000c000000b61b0453c29f42b5be06c7010b4efffe000000000085000000a900000018150000", @ANYRES32=r3, @ANYBLOB="0000000000000000180100002020782500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b70300000000850000005d000000185500000100000000000000000000009500000000000000"], &(0x7f0000000b80)='syzkaller\x00', 0x1, 0xe8, &(0x7f0000000bc0)=""/232, 0x41000, 0x5b, '\x00', 0x0, 0xe, r5, 0x8, &(0x7f0000000d00)={0x5, 0x2}, 0x8, 0x10, &(0x7f0000000d40)={0x4, 0xe, 0x2, 0x8}, 0x10, r6, r4, 0x5, &(0x7f0000000d80), &(0x7f0000000dc0)=[{0x4, 0x3, 0x0, 0x2}, {0x3, 0x1, 0xa, 0xa}, {0x0, 0x3, 0x2, 0xa}, {0x0, 0x3, 0x7, 0x1}, {0x1, 0x5, 0xb, 0xc}], 0x10, 0x7}, 0x90) [ 127.337161][ T2775] loop1: p2 p3 p7 [ 127.438634][ T26] team0 (unregistering): Port device team_slave_1 removed [ 127.461082][ T26] team0 (unregistering): Port device team_slave_0 removed [ 127.489289][ T6486] loop1: detected capacity change from 0 to 2048 [ 127.495857][ T26] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 127.510757][ T26] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 127.564649][ T26] bond0 (unregistering): Released all slaves [ 127.578049][ T6486] loop1: p2 p3 p7 20:41:16 executing program 1: ioctl$BTRFS_IOC_LOGICAL_INO(0xffffffffffffffff, 0xc0389424, &(0x7f0000000180)={0x1, 0x28, '\x00', 0x1, &(0x7f0000000080)=[0x0, 0x0, 0x0, 0x0, 0x0]}) r0 = socket$inet6(0xa, 0x0, 0x6) r1 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) r2 = dup2(r1, r0) ioctl$FIDEDUPERANGE(r0, 0xc0189436, &(0x7f0000000f00)=ANY=[@ANYBLOB="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"]) ioctl$TIOCSBRK(r2, 0x5427) recvfrom$inet6(0xffffffffffffffff, &(0x7f0000000280)=""/134, 0x86, 0x40000102, &(0x7f0000000340)={0xa, 0x4e21, 0x77f, @mcast1, 0x403b3f}, 0x1c) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000001040)={{r2, 0xffffffffffffffff}, &(0x7f0000000140), &(0x7f0000000480)=r1}, 0x20) syz_read_part_table(0x593, &(0x7f00000005c0)="$eJzs0r1LK2kUB+A3A5c0e4lcLli4hWCwigqx0CIpRGJIY0RcsbAWLLQQLCwkEq39+AcUv0BsxD6lGEEUYiUpxXpBsUmVZdfZxmplUdnleZrhPefMHF5+E/hPi8Lv7XY7EUJoJ9//9m+nhbFS98TI5FQIiTAbQij8+stfnUQ88fdXz+NzOT6XktnG/vXo82nHTc9dPX0Yxf1aFMJaCGHh4Sj1b+/G/99Z/jK1vrFU3FzJz98XVx8H5/oKXVuFxZ2hg1xlujM3E/9Ytehz9qcbw8e37fLT7vf+b/VGK3sVz2USH7Ofr/U2/72f1Wa1Nd57sjyQ+dG8qGzHub/IHwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA+GBn+cvU+sZScXMlP39fXH0cnOsrdG0VFneGDnKV6c7cTPQ6V4s+Z3+6MXx82y4/7X7v/1ZvtLJX8Vwm8TH7+Vpv89/7WW1WW+O9J8sDmR/Ni8p2nPuL/AEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAACAf6gwVuqeGJmcCiERZkMIo1HH0Z/1dvK1n4jnzuNnOa6XktnG/vXo82nHTc9dPX04EddrUQhrIYSFh6PUp1+Gd/sjAAD///tch0s=") r4 = creat(&(0x7f0000000240)='./file0\x00', 0x0) stat(&(0x7f0000000040)='./file1\x00', &(0x7f0000000380)) fsetxattr$security_capability(r4, &(0x7f0000000100), &(0x7f0000000000)=@v1={0x1000000, [{0x80000000, 0x81}]}, 0xc, 0x0) newfstatat(0xffffffffffffff9c, &(0x7f00000000c0)='./file1\x00', &(0x7f0000001400), 0x400) close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x2) ioctl$TIOCSTI(r4, 0x5412, &(0x7f00000004c0)=0x40) fsync(0xffffffffffffffff) write$binfmt_misc(r4, &(0x7f0000001080)=ANY=[@ANYBLOB="7379d3c6"], 0x4) fallocate(r4, 0x100000011, 0x0, 0x2811fdff) open(&(0x7f0000000100)='.\x00', 0x20c2, 0x2d) open$dir(&(0x7f0000000500)='./file1\x00', 0x1c6c0, 0x0) r5 = openat$vcsu(0xffffffffffffff9c, &(0x7f0000000cc0), 0x400c00, 0x0) lsetxattr$security_selinux(&(0x7f0000001180)='./file1\x00', &(0x7f00000011c0), &(0x7f0000001300)='system_u:object_r:unconfined_exec_t:s0\x00', 0x27, 0x3) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000400)={0xffffffffffffffff, 0xe0, &(0x7f0000000300)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, &(0x7f00000000c0)=[0x0], &(0x7f0000000140), 0x0, 0x8, &(0x7f0000000200)=[{}, {}, {}, {}, {}], 0x28, 0x0, 0x0, 0x0, 0x0, 0x10, 0x8, 0x8, &(0x7f00000002c0)}}, 0x10) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000e80)=@bpf_lsm={0x1d, 0x4, &(0x7f0000000040)=@framed={{0x18, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x73fc}, [@generic={0x9, 0x8, 0x0, 0x7f, 0x200}]}, &(0x7f0000000880)='GPL\x00', 0x1f, 0x93, &(0x7f0000000cc0)=""/147, 0x40f00, 0x2, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, &(0x7f0000000b80)={0x9}, 0x8, 0x10, 0x0, 0x0, r6}, 0x80) r7 = socket$nl_generic(0x10, 0x3, 0x10) r8 = syz_genetlink_get_family_id$tipc(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$TIPC_CMD_ENABLE_BEARER(r7, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000001200)=ANY=[@ANYBLOB="3400000006c08fada241ee0a049e6fba3f36f40da839bbdf54c31768b0026f4261f56d51c5d81ba4cb99f8203c40d0a142fcd75ce26e408d229139f8c4e81109c56a18e453e8a537df21c4ec04a4f3e22f4ac125a28ad43e41107b1f7e79c8573985e54fd665e2913ca74da8c9f3fc2839258c19fa7ac20ebead31206cf280ea73f635bc5418b66554392dfd11874fef72bc53538aae3cb5ef8a80140f4737dd2c572a03ee1d5e3d627e", @ANYRESOCT=0x0, @ANYBLOB="010000000000000000000100000000000000014100000018001700000000000000007564503a73"], 0x34}, 0x1, 0x0, 0x0, 0x1}, 0x0) ioctl$AUTOFS_DEV_IOCTL_PROTOSUBVER(r1, 0xc0189373, &(0x7f0000000540)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x6}}, './file0\x00'}) sendmsg$TIPC_CMD_GET_MAX_PORTS(r5, &(0x7f0000001140)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x40000}, 0xc, &(0x7f0000001100)={&(0x7f00000010c0)={0x1c, r8, 0x400, 0x8000, 0x25dfdbfe, {}, ["", "", "", "", "", "", ""]}, 0x1c}, 0x1, 0x0, 0x0, 0x20048854}, 0x4004) bpf$PROG_LOAD(0x5, &(0x7f0000000e40)={0x5, 0x16, &(0x7f0000001340)=ANY=[@ANYBLOB="390000000100000000000000900000f117fa0000", @ANYRES32=r4, @ANYBLOB="1f00000000000000b703000000000000850000000c000000b61b0453c29f42b5be06c7010b4efffe000000000085000000a900000018150000", @ANYRES32=r3, @ANYBLOB="0000000000000000180100002020782500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b70300000000850000005d000000185500000100000000000000000000009500000000000000"], &(0x7f0000000b80)='syzkaller\x00', 0x1, 0xe8, &(0x7f0000000bc0)=""/232, 0x41000, 0x5b, '\x00', 0x0, 0xe, r5, 0x8, &(0x7f0000000d00)={0x5, 0x2}, 0x8, 0x10, &(0x7f0000000d40)={0x4, 0xe, 0x2, 0x8}, 0x10, r6, r4, 0x5, &(0x7f0000000d80), &(0x7f0000000dc0)=[{0x4, 0x3, 0x0, 0x2}, {0x3, 0x1, 0xa, 0xa}, {0x0, 0x3, 0x2, 0xa}, {0x0, 0x3, 0x7, 0x1}, {0x1, 0x5, 0xb, 0xc}], 0x10, 0x7}, 0x90) [ 127.720341][ T6383] bridge0: port 1(bridge_slave_0) entered blocking state [ 127.727537][ T6383] bridge0: port 1(bridge_slave_0) entered disabled state [ 127.748272][ T6383] bridge_slave_0: entered allmulticast mode [ 127.752933][ T6488] loop1: detected capacity change from 0 to 2048 [ 127.755079][ T6383] bridge_slave_0: entered promiscuous mode [ 127.770687][ T6319] netdevsim netdevsim0 netdevsim0: renamed from eth0 [ 127.780545][ T6319] netdevsim netdevsim0 netdevsim1: renamed from eth1 [ 127.800221][ T6319] netdevsim netdevsim0 netdevsim2: renamed from eth2 [ 127.823835][ T6488] loop1: p2 p3 p7 [ 127.834991][ T6319] netdevsim netdevsim0 netdevsim3: renamed from eth3 [ 127.862106][ T6383] bridge0: port 2(bridge_slave_1) entered blocking state 20:41:16 executing program 1: ioctl$BTRFS_IOC_LOGICAL_INO(0xffffffffffffffff, 0xc0389424, &(0x7f0000000180)={0x1, 0x28, '\x00', 0x1, &(0x7f0000000080)=[0x0, 0x0, 0x0, 0x0, 0x0]}) r0 = socket$inet6(0xa, 0x0, 0x6) r1 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) r2 = dup2(r1, r0) ioctl$FIDEDUPERANGE(r0, 0xc0189436, &(0x7f0000000f00)=ANY=[@ANYBLOB="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"]) ioctl$TIOCSBRK(r2, 0x5427) recvfrom$inet6(0xffffffffffffffff, &(0x7f0000000280)=""/134, 0x86, 0x40000102, &(0x7f0000000340)={0xa, 0x4e21, 0x77f, @mcast1, 0x403b3f}, 0x1c) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000001040)={{r2, 0xffffffffffffffff}, &(0x7f0000000140), &(0x7f0000000480)=r1}, 0x20) syz_read_part_table(0x593, &(0x7f00000005c0)="$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") r4 = creat(&(0x7f0000000240)='./file0\x00', 0x0) stat(&(0x7f0000000040)='./file1\x00', &(0x7f0000000380)) fsetxattr$security_capability(r4, &(0x7f0000000100), &(0x7f0000000000)=@v1={0x1000000, [{0x80000000, 0x81}]}, 0xc, 0x0) newfstatat(0xffffffffffffff9c, &(0x7f00000000c0)='./file1\x00', &(0x7f0000001400), 0x400) close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x2) ioctl$TIOCSTI(r4, 0x5412, &(0x7f00000004c0)=0x40) fsync(0xffffffffffffffff) write$binfmt_misc(r4, &(0x7f0000001080)=ANY=[@ANYBLOB="7379d3c6"], 0x4) fallocate(r4, 0x100000011, 0x0, 0x2811fdff) open(&(0x7f0000000100)='.\x00', 0x20c2, 0x2d) open$dir(&(0x7f0000000500)='./file1\x00', 0x1c6c0, 0x0) r5 = openat$vcsu(0xffffffffffffff9c, &(0x7f0000000cc0), 0x400c00, 0x0) lsetxattr$security_selinux(&(0x7f0000001180)='./file1\x00', &(0x7f00000011c0), &(0x7f0000001300)='system_u:object_r:unconfined_exec_t:s0\x00', 0x27, 0x3) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000400)={0xffffffffffffffff, 0xe0, &(0x7f0000000300)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, &(0x7f00000000c0)=[0x0], &(0x7f0000000140), 0x0, 0x8, &(0x7f0000000200)=[{}, {}, {}, {}, {}], 0x28, 0x0, 0x0, 0x0, 0x0, 0x10, 0x8, 0x8, &(0x7f00000002c0)}}, 0x10) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000e80)=@bpf_lsm={0x1d, 0x4, &(0x7f0000000040)=@framed={{0x18, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x73fc}, [@generic={0x9, 0x8, 0x0, 0x7f, 0x200}]}, &(0x7f0000000880)='GPL\x00', 0x1f, 0x93, &(0x7f0000000cc0)=""/147, 0x40f00, 0x2, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, &(0x7f0000000b80)={0x9}, 0x8, 0x10, 0x0, 0x0, r6}, 0x80) r7 = socket$nl_generic(0x10, 0x3, 0x10) r8 = syz_genetlink_get_family_id$tipc(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$TIPC_CMD_ENABLE_BEARER(r7, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000001200)=ANY=[@ANYBLOB="3400000006c08fada241ee0a049e6fba3f36f40da839bbdf54c31768b0026f4261f56d51c5d81ba4cb99f8203c40d0a142fcd75ce26e408d229139f8c4e81109c56a18e453e8a537df21c4ec04a4f3e22f4ac125a28ad43e41107b1f7e79c8573985e54fd665e2913ca74da8c9f3fc2839258c19fa7ac20ebead31206cf280ea73f635bc5418b66554392dfd11874fef72bc53538aae3cb5ef8a80140f4737dd2c572a03ee1d5e3d627e", @ANYRESOCT=0x0, @ANYBLOB="010000000000000000000100000000000000014100000018001700000000000000007564503a73"], 0x34}, 0x1, 0x0, 0x0, 0x1}, 0x0) ioctl$AUTOFS_DEV_IOCTL_PROTOSUBVER(r1, 0xc0189373, &(0x7f0000000540)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x6}}, './file0\x00'}) sendmsg$TIPC_CMD_GET_MAX_PORTS(r5, &(0x7f0000001140)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x40000}, 0xc, &(0x7f0000001100)={&(0x7f00000010c0)={0x1c, r8, 0x400, 0x8000, 0x25dfdbfe, {}, ["", "", "", "", "", "", ""]}, 0x1c}, 0x1, 0x0, 0x0, 0x20048854}, 0x4004) bpf$PROG_LOAD(0x5, &(0x7f0000000e40)={0x5, 0x16, &(0x7f0000001340)=ANY=[@ANYBLOB="390000000100000000000000900000f117fa0000", @ANYRES32=r4, @ANYBLOB="1f00000000000000b703000000000000850000000c000000b61b0453c29f42b5be06c7010b4efffe000000000085000000a900000018150000", @ANYRES32=r3, @ANYBLOB="0000000000000000180100002020782500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b70300000000850000005d000000185500000100000000000000000000009500000000000000"], &(0x7f0000000b80)='syzkaller\x00', 0x1, 0xe8, &(0x7f0000000bc0)=""/232, 0x41000, 0x5b, '\x00', 0x0, 0xe, r5, 0x8, &(0x7f0000000d00)={0x5, 0x2}, 0x8, 0x10, &(0x7f0000000d40)={0x4, 0xe, 0x2, 0x8}, 0x10, r6, r4, 0x5, &(0x7f0000000d80), &(0x7f0000000dc0)=[{0x4, 0x3, 0x0, 0x2}, {0x3, 0x1, 0xa, 0xa}, {0x0, 0x3, 0x2, 0xa}, {0x0, 0x3, 0x7, 0x1}, {0x1, 0x5, 0xb, 0xc}], 0x10, 0x7}, 0x90) [ 127.869396][ T6383] bridge0: port 2(bridge_slave_1) entered disabled state [ 127.889260][ T6383] bridge_slave_1: entered allmulticast mode [ 127.908074][ T6383] bridge_slave_1: entered promiscuous mode 20:41:16 executing program 4: r0 = perf_event_open(&(0x7f0000000a40)={0x2, 0x80, 0xcd, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @perf_bp={&(0x7f0000000200), 0x8}, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfb75}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000040)={0x0, 0x4, 0x0, &(0x7f0000000180)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x80) perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x208, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x4, 0x8001}, 0x4000, 0x0, 0x0, 0x0, 0x0, 0x14e, 0xd1}, 0x0, 0xbfffffffffffffff, r0, 0x19893a9f0a0e2244) r1 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) syz_clone(0x2000000, 0x0, 0x0, 0x0, 0x0, 0x0) r2 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x18, 0x5, &(0x7f00000002c0)=ANY=[@ANYBLOB="180000001800ff0f0000000000000000850000006d000000750000000800000095"], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x80) r3 = perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400, 0x80000, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x7, 0x1007}, 0x8006, 0x0, 0x0, 0x1, 0x4, 0x800000, 0x3}, 0x0, 0xffefffffffffffff, 0xffffffffffffffff, 0x9) ioctl$PERF_EVENT_IOC_SET_FILTER(r3, 0x40082406, &(0x7f00000003c0)='memory.numa_stat\x00') perf_event_open(0x0, 0x0, 0x0, r3, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000080)='sched_switch\x00', r2}, 0x10) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000380)={{0x1, 0xffffffffffffffff}, &(0x7f0000000000), &(0x7f0000000240)=r2}, 0x20) r5 = memfd_secret(0x0) syz_io_uring_setup(0x0, &(0x7f0000000300)={0x0, 0x2, 0x0, 0x0, 0x0, 0x0, r5}, 0x0, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f00000009c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000000a00)=0x14) r7 = openat2(0xffffffffffffff9c, &(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)={0x40841}, 0x18) write$binfmt_script(r7, &(0x7f0000000340)=ANY=[], 0xfffffdef) r8 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000b40)={0x1b, 0x0, 0x0, 0x7, 0x0, 0xffffffffffffffff, 0x200, '\x00', 0x0, 0xffffffffffffffff, 0x3, 0x1, 0x4}, 0x48) r9 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000bc0)={0x2, 0x4, 0x8, 0x1, 0x80, 0x1, 0x9, '\x00', 0x0, 0xffffffffffffffff, 0x4, 0x1, 0x4}, 0x48) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000d00)={0x11, 0x12, &(0x7f0000000440)=@raw=[@exit, @ringbuf_query={{0x18, 0x1, 0x1, 0x0, r4}}, @ringbuf_output={{0x18, 0x1, 0x1, 0x0, r5}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x10001}, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x4, 0x0, 0x0, 0x2}}, @exit, @initr0={0x18, 0x0, 0x0, 0x0, 0x6349, 0x0, 0x0, 0x0, 0xf685}, @ldst={0x3, 0x2, 0x1, 0x0, 0xb, 0x2543a83bb932833c, 0x1}], &(0x7f0000000940)='syzkaller\x00', 0x80000001, 0x27, &(0x7f0000000980)=""/39, 0x41000, 0x40, '\x00', r6, 0x0, r7, 0x8, &(0x7f0000000ac0)={0x3, 0x1}, 0x8, 0x10, &(0x7f0000000b00)={0x2, 0xc, 0xfffffe00, 0x2}, 0x10, 0x0, 0x0, 0x5, &(0x7f0000000c40)=[r2, 0x1, 0x1, r8, r9, r1], &(0x7f0000000c80)=[{0x4, 0x1, 0x8, 0xc}, {0x0, 0x4, 0xf, 0x4}, {0x1, 0x2, 0xd, 0x6}, {0x0, 0x4, 0x10, 0xc}, {0x2, 0x4, 0xd, 0x1}], 0x10, 0x20}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000280)={&(0x7f0000000140)='ext4_ext_show_extent\x00', r2}, 0x10) r10 = perf_event_open(&(0x7f0000000080)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open$cgroup(&(0x7f0000000300)={0x5, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_bp={&(0x7f0000000100)}, 0x81252, 0x6, 0x80000001, 0x0, 0x0, 0x0, 0x6, 0x0, 0x6, 0x0, 0x6}, 0xffffffffffffffff, 0xe, 0xffffffffffffffff, 0xc) perf_event_open(0x0, 0x0, 0x2, 0xffffffffffffffff, 0xb) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000780)={0x14, 0x4, &(0x7f00000008c0)=ANY=[@ANYBLOB="850000006b00000018150000a3df7ddd9621fb0201050062d91123e632b2f902ad1e9f1cc7a66ed51ac8a4070000000000000019a83f0b7c9502871fb1ca3dc499e804bbbc359859ed6fd9f104fc7ed900d122072d8275a24d000000000601c3a63953a7b36fe458", @ANYRES32, @ANYBLOB="00000000000000002d59e4eda4000000"], &(0x7f0000000400)='syzkaller\x00', 0xfff, 0xe3, &(0x7f0000000580)=""/227, 0x0, 0x4, '\x00', 0x0, 0x24, 0xffffffffffffffff, 0x8, &(0x7f0000000500)={0x1, 0x3}, 0x8, 0x10, &(0x7f0000000680)={0x5, 0x6, 0x81, 0x9}, 0x10, 0xffffffffffffffff, 0xffffffffffffffff, 0x0, &(0x7f00000006c0)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, r10]}, 0x80) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x4030582a, &(0x7f0000000040)=0x91) [ 127.947562][ T6383] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 127.969842][ T6492] loop1: detected capacity change from 0 to 2048 [ 127.984772][ T6383] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link 20:41:16 executing program 2: r0 = perf_event_open(&(0x7f0000000a40)={0x2, 0x80, 0xcd, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @perf_bp={&(0x7f0000000200), 0x8}, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfb75}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000040)={0x0, 0x4, 0x0, &(0x7f0000000180)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x80) perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x208, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x4, 0x8001}, 0x4000, 0x0, 0x0, 0x0, 0x0, 0x14e, 0xd1}, 0x0, 0xbfffffffffffffff, r0, 0x19893a9f0a0e2244) r1 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) syz_clone(0x2000000, 0x0, 0x0, 0x0, 0x0, 0x0) r2 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x18, 0x5, &(0x7f00000002c0)=ANY=[@ANYBLOB="180000001800ff0f0000000000000000850000006d000000750000000800000095"], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x80) r3 = perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400, 0x80000, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x7, 0x1007}, 0x8006, 0x0, 0x0, 0x1, 0x4, 0x800000, 0x3}, 0x0, 0xffefffffffffffff, 0xffffffffffffffff, 0x9) ioctl$PERF_EVENT_IOC_SET_FILTER(r3, 0x40082406, &(0x7f00000003c0)='memory.numa_stat\x00') perf_event_open(0x0, 0x0, 0x0, r3, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000080)='sched_switch\x00', r2}, 0x10) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000380)={{0x1, 0xffffffffffffffff}, &(0x7f0000000000), &(0x7f0000000240)=r2}, 0x20) syz_io_uring_setup(0x0, &(0x7f0000000300)={0x0, 0x2}, 0x0, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f00000009c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000000a00)=0x14) r6 = openat2(0xffffffffffffff9c, &(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)={0x40841}, 0x18) write$binfmt_script(r6, &(0x7f0000000340)=ANY=[], 0xfffffdef) r7 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000bc0)={0x2, 0x4, 0x8, 0x1, 0x80, 0x1, 0x9, '\x00', 0x0, 0xffffffffffffffff, 0x4, 0x1, 0x4}, 0x48) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000d00)={0x11, 0x12, &(0x7f0000000440)=@raw=[@exit, @ringbuf_query={{0x18, 0x1, 0x1, 0x0, r4}}, @ringbuf_output={{}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x10001}, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x4, 0x0, 0x0, 0x2}}, @exit, @initr0={0x18, 0x0, 0x0, 0x0, 0x6349, 0x0, 0x0, 0x0, 0xf685}, @ldst={0x3, 0x2, 0x1, 0x0, 0xb, 0x2543a83bb932833c, 0x1}], &(0x7f0000000940)='syzkaller\x00', 0x80000001, 0x27, &(0x7f0000000980)=""/39, 0x41000, 0x40, '\x00', r5, 0x0, r6, 0x8, &(0x7f0000000ac0)={0x3, 0x1}, 0x8, 0x10, &(0x7f0000000b00)={0x2, 0xc, 0xfffffe00, 0x2}, 0x10, 0x0, 0x0, 0x5, &(0x7f0000000c40)=[r2, 0x1, 0x1, 0xffffffffffffffff, r7, r1], &(0x7f0000000c80)=[{0x4, 0x1, 0x8, 0xc}, {0x0, 0x4, 0xf, 0x4}, {0x1, 0x2, 0xd, 0x6}, {0x0, 0x4, 0x10, 0xc}, {0x2, 0x4, 0xd, 0x1}], 0x10, 0x20}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000280)={&(0x7f0000000140)='ext4_ext_show_extent\x00', r2}, 0x10) r8 = perf_event_open(&(0x7f0000000080)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) r9 = gettid() perf_event_open$cgroup(&(0x7f0000000300)={0x5, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_bp={&(0x7f0000000100)}, 0x81252, 0x6, 0x80000001, 0x0, 0x0, 0x0, 0x6, 0x0, 0x6, 0x0, 0x6}, 0xffffffffffffffff, 0xe, 0xffffffffffffffff, 0xc) perf_event_open(0x0, r9, 0x2, 0xffffffffffffffff, 0xb) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) perf_event_open(&(0x7f0000000840)={0x2, 0x80, 0x0, 0x7, 0x0, 0x80, 0x0, 0x3, 0x0, 0x9, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, @perf_config_ext={0x8000000000, 0x3}, 0x46c73247dfbe0d, 0x1007e, 0x0, 0x2, 0x0, 0x0, 0x6, 0x0, 0xffffffff, 0x0, 0x1c}, 0x0, 0x9, 0xffffffffffffffff, 0xd) bpf$PROG_LOAD(0x5, &(0x7f0000000780)={0x14, 0x4, &(0x7f00000008c0)=ANY=[@ANYBLOB="850000006b00000018150000a3df7ddd9621fb0201050062d91123e632b2f902ad1e9f1cc7a66ed51ac8a4070000000000000019a83f0b7c9502871fb1ca3dc499e804bbbc359859ed6fd9f104fc7ed900d122072d8275a24d000000000601c3a63953a7b36fe458", @ANYRES32, @ANYBLOB="00000000000000002d59e4eda4000000"], &(0x7f0000000400)='syzkaller\x00', 0xfff, 0xe3, &(0x7f0000000580)=""/227, 0x0, 0x4, '\x00', 0x0, 0x24, 0xffffffffffffffff, 0x8, &(0x7f0000000500)={0x1, 0x3}, 0x8, 0x10, &(0x7f0000000680)={0x5, 0x6, 0x81, 0x9}, 0x10, 0xffffffffffffffff, 0xffffffffffffffff, 0x0, &(0x7f00000006c0)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, r8]}, 0x80) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x4030582a, &(0x7f0000000040)=0x91) [ 128.062250][ T6492] loop1: p2 p3 p7 20:41:16 executing program 1: ioctl$BTRFS_IOC_LOGICAL_INO(0xffffffffffffffff, 0xc0389424, &(0x7f0000000180)={0x1, 0x28, '\x00', 0x1, &(0x7f0000000080)=[0x0, 0x0, 0x0, 0x0, 0x0]}) r0 = socket$inet6(0xa, 0x3, 0x0) r1 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) r2 = dup2(r1, r0) ioctl$FIDEDUPERANGE(r0, 0xc0189436, &(0x7f0000000f00)=ANY=[@ANYBLOB="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"]) ioctl$TIOCSBRK(r2, 0x5427) recvfrom$inet6(0xffffffffffffffff, &(0x7f0000000280)=""/134, 0x86, 0x40000102, &(0x7f0000000340)={0xa, 0x4e21, 0x77f, @mcast1, 0x403b3f}, 0x1c) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000001040)={{r2, 0xffffffffffffffff}, &(0x7f0000000140), &(0x7f0000000480)=r1}, 0x20) syz_read_part_table(0x593, &(0x7f00000005c0)="$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") r4 = creat(&(0x7f0000000240)='./file0\x00', 0x0) stat(&(0x7f0000000040)='./file1\x00', &(0x7f0000000380)) fsetxattr$security_capability(r4, &(0x7f0000000100), &(0x7f0000000000)=@v1={0x1000000, [{0x80000000, 0x81}]}, 0xc, 0x0) newfstatat(0xffffffffffffff9c, &(0x7f00000000c0)='./file1\x00', &(0x7f0000001400), 0x400) close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x2) ioctl$TIOCSTI(r4, 0x5412, &(0x7f00000004c0)=0x40) fsync(0xffffffffffffffff) write$binfmt_misc(r4, &(0x7f0000001080)=ANY=[@ANYBLOB="7379d3c6"], 0x4) fallocate(r4, 0x100000011, 0x0, 0x2811fdff) open(&(0x7f0000000100)='.\x00', 0x20c2, 0x2d) open$dir(&(0x7f0000000500)='./file1\x00', 0x1c6c0, 0x0) r5 = openat$vcsu(0xffffffffffffff9c, &(0x7f0000000cc0), 0x400c00, 0x0) lsetxattr$security_selinux(&(0x7f0000001180)='./file1\x00', &(0x7f00000011c0), &(0x7f0000001300)='system_u:object_r:unconfined_exec_t:s0\x00', 0x27, 0x3) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000400)={0xffffffffffffffff, 0xe0, &(0x7f0000000300)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, &(0x7f00000000c0)=[0x0], &(0x7f0000000140), 0x0, 0x8, &(0x7f0000000200)=[{}, {}, {}, {}, {}], 0x28, 0x0, 0x0, 0x0, 0x0, 0x10, 0x8, 0x8, &(0x7f00000002c0)}}, 0x10) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000e80)=@bpf_lsm={0x1d, 0x4, &(0x7f0000000040)=@framed={{0x18, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x73fc}, [@generic={0x9, 0x8, 0x0, 0x7f, 0x200}]}, &(0x7f0000000880)='GPL\x00', 0x1f, 0x93, &(0x7f0000000cc0)=""/147, 0x40f00, 0x2, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, &(0x7f0000000b80)={0x9}, 0x8, 0x10, 0x0, 0x0, r6}, 0x80) r7 = socket$nl_generic(0x10, 0x3, 0x10) r8 = syz_genetlink_get_family_id$tipc(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$TIPC_CMD_ENABLE_BEARER(r7, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000001200)=ANY=[@ANYBLOB="3400000006c08fada241ee0a049e6fba3f36f40da839bbdf54c31768b0026f4261f56d51c5d81ba4cb99f8203c40d0a142fcd75ce26e408d229139f8c4e81109c56a18e453e8a537df21c4ec04a4f3e22f4ac125a28ad43e41107b1f7e79c8573985e54fd665e2913ca74da8c9f3fc2839258c19fa7ac20ebead31206cf280ea73f635bc5418b66554392dfd11874fef72bc53538aae3cb5ef8a80140f4737dd2c572a03ee1d5e3d627e", @ANYRESOCT=0x0, @ANYBLOB="010000000000000000000100000000000000014100000018001700000000000000007564503a73"], 0x34}, 0x1, 0x0, 0x0, 0x1}, 0x0) ioctl$AUTOFS_DEV_IOCTL_PROTOSUBVER(r1, 0xc0189373, &(0x7f0000000540)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x6}}, './file0\x00'}) sendmsg$TIPC_CMD_GET_MAX_PORTS(r5, &(0x7f0000001140)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x40000}, 0xc, &(0x7f0000001100)={&(0x7f00000010c0)={0x1c, r8, 0x400, 0x8000, 0x25dfdbfe, {}, ["", "", "", "", "", "", ""]}, 0x1c}, 0x1, 0x0, 0x0, 0x20048854}, 0x4004) bpf$PROG_LOAD(0x5, &(0x7f0000000e40)={0x5, 0x16, &(0x7f0000001340)=ANY=[@ANYBLOB="390000000100000000000000900000f117fa0000", @ANYRES32=r4, @ANYBLOB="1f00000000000000b703000000000000850000000c000000b61b0453c29f42b5be06c7010b4efffe000000000085000000a900000018150000", @ANYRES32=r3, @ANYBLOB="0000000000000000180100002020782500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b70300000000850000005d000000185500000100000000000000000000009500000000000000"], &(0x7f0000000b80)='syzkaller\x00', 0x1, 0xe8, &(0x7f0000000bc0)=""/232, 0x41000, 0x5b, '\x00', 0x0, 0xe, r5, 0x8, &(0x7f0000000d00)={0x5, 0x2}, 0x8, 0x10, &(0x7f0000000d40)={0x4, 0xe, 0x2, 0x8}, 0x10, r6, r4, 0x5, &(0x7f0000000d80), &(0x7f0000000dc0)=[{0x4, 0x3, 0x0, 0x2}, {0x3, 0x1, 0xa, 0xa}, {0x0, 0x3, 0x2, 0xa}, {0x0, 0x3, 0x7, 0x1}, {0x1, 0x5, 0xb, 0xc}], 0x10, 0x7}, 0x90) [ 128.121044][ T6383] team0: Port device team_slave_0 added [ 128.147870][ T6383] team0: Port device team_slave_1 added [ 128.192972][ T6319] 8021q: adding VLAN 0 to HW filter on device bond0 [ 128.246024][ T6383] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 128.253252][ T6383] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 128.279617][ T6383] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 128.350024][ T6383] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 128.357041][ T6383] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 128.371533][ T6521] loop1: detected capacity change from 0 to 2048 [ 128.383125][ T6383] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 128.436516][ T6383] hsr_slave_0: entered promiscuous mode [ 128.452147][ T6383] hsr_slave_1: entered promiscuous mode [ 128.471724][ T6383] debugfs: Directory 'hsr0' with parent 'hsr' already present! [ 128.488526][ T6383] Cannot create hsr debugfs directory [ 128.497027][ T6521] loop1: p2 p3 p7 [ 128.507875][ T6319] 8021q: adding VLAN 0 to HW filter on device team0 20:41:17 executing program 1: ioctl$BTRFS_IOC_LOGICAL_INO(0xffffffffffffffff, 0xc0389424, &(0x7f0000000180)={0x1, 0x28, '\x00', 0x1, &(0x7f0000000080)=[0x0, 0x0, 0x0, 0x0, 0x0]}) r0 = socket$inet6(0xa, 0x3, 0x0) r1 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) r2 = dup2(r1, r0) ioctl$FIDEDUPERANGE(r0, 0xc0189436, &(0x7f0000000f00)=ANY=[@ANYBLOB="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"]) ioctl$TIOCSBRK(r2, 0x5427) recvfrom$inet6(0xffffffffffffffff, &(0x7f0000000280)=""/134, 0x86, 0x40000102, &(0x7f0000000340)={0xa, 0x4e21, 0x77f, @mcast1, 0x403b3f}, 0x1c) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000001040)={{r2, 0xffffffffffffffff}, &(0x7f0000000140), &(0x7f0000000480)=r1}, 0x20) syz_read_part_table(0x593, &(0x7f00000005c0)="$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") r4 = creat(&(0x7f0000000240)='./file0\x00', 0x0) stat(&(0x7f0000000040)='./file1\x00', &(0x7f0000000380)) fsetxattr$security_capability(r4, &(0x7f0000000100), &(0x7f0000000000)=@v1={0x1000000, [{0x80000000, 0x81}]}, 0xc, 0x0) newfstatat(0xffffffffffffff9c, &(0x7f00000000c0)='./file1\x00', &(0x7f0000001400), 0x400) close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x2) ioctl$TIOCSTI(r4, 0x5412, &(0x7f00000004c0)=0x40) fsync(0xffffffffffffffff) write$binfmt_misc(r4, &(0x7f0000001080)=ANY=[@ANYBLOB="7379d3c6"], 0x4) fallocate(r4, 0x100000011, 0x0, 0x2811fdff) open(&(0x7f0000000100)='.\x00', 0x20c2, 0x2d) open$dir(&(0x7f0000000500)='./file1\x00', 0x1c6c0, 0x0) r5 = openat$vcsu(0xffffffffffffff9c, &(0x7f0000000cc0), 0x400c00, 0x0) lsetxattr$security_selinux(&(0x7f0000001180)='./file1\x00', &(0x7f00000011c0), &(0x7f0000001300)='system_u:object_r:unconfined_exec_t:s0\x00', 0x27, 0x3) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000400)={0xffffffffffffffff, 0xe0, &(0x7f0000000300)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, &(0x7f00000000c0)=[0x0], &(0x7f0000000140), 0x0, 0x8, &(0x7f0000000200)=[{}, {}, {}, {}, {}], 0x28, 0x0, 0x0, 0x0, 0x0, 0x10, 0x8, 0x8, &(0x7f00000002c0)}}, 0x10) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000e80)=@bpf_lsm={0x1d, 0x4, &(0x7f0000000040)=@framed={{0x18, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x73fc}, [@generic={0x9, 0x8, 0x0, 0x7f, 0x200}]}, &(0x7f0000000880)='GPL\x00', 0x1f, 0x93, &(0x7f0000000cc0)=""/147, 0x40f00, 0x2, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, &(0x7f0000000b80)={0x9}, 0x8, 0x10, 0x0, 0x0, r6}, 0x80) r7 = socket$nl_generic(0x10, 0x3, 0x10) r8 = syz_genetlink_get_family_id$tipc(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$TIPC_CMD_ENABLE_BEARER(r7, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000001200)=ANY=[@ANYBLOB="3400000006c08fada241ee0a049e6fba3f36f40da839bbdf54c31768b0026f4261f56d51c5d81ba4cb99f8203c40d0a142fcd75ce26e408d229139f8c4e81109c56a18e453e8a537df21c4ec04a4f3e22f4ac125a28ad43e41107b1f7e79c8573985e54fd665e2913ca74da8c9f3fc2839258c19fa7ac20ebead31206cf280ea73f635bc5418b66554392dfd11874fef72bc53538aae3cb5ef8a80140f4737dd2c572a03ee1d5e3d627e", @ANYRESOCT=0x0, @ANYBLOB="010000000000000000000100000000000000014100000018001700000000000000007564503a73"], 0x34}, 0x1, 0x0, 0x0, 0x1}, 0x0) ioctl$AUTOFS_DEV_IOCTL_PROTOSUBVER(r1, 0xc0189373, &(0x7f0000000540)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x6}}, './file0\x00'}) sendmsg$TIPC_CMD_GET_MAX_PORTS(r5, &(0x7f0000001140)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x40000}, 0xc, &(0x7f0000001100)={&(0x7f00000010c0)={0x1c, r8, 0x400, 0x8000, 0x25dfdbfe, {}, ["", "", "", "", "", "", ""]}, 0x1c}, 0x1, 0x0, 0x0, 0x20048854}, 0x4004) bpf$PROG_LOAD(0x5, &(0x7f0000000e40)={0x5, 0x16, &(0x7f0000001340)=ANY=[@ANYBLOB="390000000100000000000000900000f117fa0000", @ANYRES32=r4, @ANYBLOB="1f00000000000000b703000000000000850000000c000000b61b0453c29f42b5be06c7010b4efffe000000000085000000a900000018150000", @ANYRES32=r3, @ANYBLOB="0000000000000000180100002020782500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b70300000000850000005d000000185500000100000000000000000000009500000000000000"], &(0x7f0000000b80)='syzkaller\x00', 0x1, 0xe8, &(0x7f0000000bc0)=""/232, 0x41000, 0x5b, '\x00', 0x0, 0xe, r5, 0x8, &(0x7f0000000d00)={0x5, 0x2}, 0x8, 0x10, &(0x7f0000000d40)={0x4, 0xe, 0x2, 0x8}, 0x10, r6, r4, 0x5, &(0x7f0000000d80), &(0x7f0000000dc0)=[{0x4, 0x3, 0x0, 0x2}, {0x3, 0x1, 0xa, 0xa}, {0x0, 0x3, 0x2, 0xa}, {0x0, 0x3, 0x7, 0x1}, {0x1, 0x5, 0xb, 0xc}], 0x10, 0x7}, 0x90) [ 128.541512][ T2775] loop1: p2 p3 p7 [ 128.560102][ T3174] bridge0: port 1(bridge_slave_0) entered blocking state [ 128.567290][ T3174] bridge0: port 1(bridge_slave_0) entered forwarding state [ 128.598347][ T3174] bridge0: port 2(bridge_slave_1) entered blocking state [ 128.605728][ T3174] bridge0: port 2(bridge_slave_1) entered forwarding state [ 128.709545][ T6529] loop1: detected capacity change from 0 to 2048 [ 128.740478][ T6319] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 128.798019][ T6529] loop1: p2 p3 p7 [ 128.859215][ T2775] loop1: p2 p3 p7 20:41:17 executing program 1: ioctl$BTRFS_IOC_LOGICAL_INO(0xffffffffffffffff, 0xc0389424, &(0x7f0000000180)={0x1, 0x28, '\x00', 0x1, &(0x7f0000000080)=[0x0, 0x0, 0x0, 0x0, 0x0]}) r0 = socket$inet6(0xa, 0x3, 0x0) r1 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) r2 = dup2(r1, r0) ioctl$FIDEDUPERANGE(r0, 0xc0189436, &(0x7f0000000f00)=ANY=[@ANYBLOB="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"]) ioctl$TIOCSBRK(r2, 0x5427) recvfrom$inet6(0xffffffffffffffff, &(0x7f0000000280)=""/134, 0x86, 0x40000102, &(0x7f0000000340)={0xa, 0x4e21, 0x77f, @mcast1, 0x403b3f}, 0x1c) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000001040)={{r2, 0xffffffffffffffff}, &(0x7f0000000140), &(0x7f0000000480)=r1}, 0x20) syz_read_part_table(0x593, &(0x7f00000005c0)="$eJzs0r1LK2kUB+A3A5c0e4lcLli4hWCwigqx0CIpRGJIY0RcsbAWLLQQLCwkEq39+AcUv0BsxD6lGEEUYiUpxXpBsUmVZdfZxmplUdnleZrhPefMHF5+E/hPi8Lv7XY7EUJoJ9//9m+nhbFS98TI5FQIiTAbQij8+stfnUQ88fdXz+NzOT6XktnG/vXo82nHTc9dPX0Yxf1aFMJaCGHh4Sj1b+/G/99Z/jK1vrFU3FzJz98XVx8H5/oKXVuFxZ2hg1xlujM3E/9Ytehz9qcbw8e37fLT7vf+b/VGK3sVz2USH7Ofr/U2/72f1Wa1Nd57sjyQ+dG8qGzHub/IHwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA+GBn+cvU+sZScXMlP39fXH0cnOsrdG0VFneGDnKV6c7cTPQ6V4s+Z3+6MXx82y4/7X7v/1ZvtLJX8Vwm8TH7+Vpv89/7WW1WW+O9J8sDmR/Ni8p2nPuL/AEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAACAf6gwVuqeGJmcCiERZkMIo1HH0Z/1dvK1n4jnzuNnOa6XktnG/vXo82nHTc9dPX04EddrUQhrIYSFh6PUp1+Gd/sjAAD///tch0s=") r4 = creat(&(0x7f0000000240)='./file0\x00', 0x0) stat(&(0x7f0000000040)='./file1\x00', &(0x7f0000000380)) fsetxattr$security_capability(r4, &(0x7f0000000100), &(0x7f0000000000)=@v1={0x1000000, [{0x80000000, 0x81}]}, 0xc, 0x0) newfstatat(0xffffffffffffff9c, &(0x7f00000000c0)='./file1\x00', &(0x7f0000001400), 0x400) close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x2) ioctl$TIOCSTI(r4, 0x5412, &(0x7f00000004c0)=0x40) fsync(0xffffffffffffffff) write$binfmt_misc(r4, &(0x7f0000001080)=ANY=[@ANYBLOB="7379d3c6"], 0x4) fallocate(r4, 0x100000011, 0x0, 0x2811fdff) open(&(0x7f0000000100)='.\x00', 0x20c2, 0x2d) open$dir(&(0x7f0000000500)='./file1\x00', 0x1c6c0, 0x0) r5 = openat$vcsu(0xffffffffffffff9c, &(0x7f0000000cc0), 0x400c00, 0x0) lsetxattr$security_selinux(&(0x7f0000001180)='./file1\x00', &(0x7f00000011c0), &(0x7f0000001300)='system_u:object_r:unconfined_exec_t:s0\x00', 0x27, 0x3) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000400)={0xffffffffffffffff, 0xe0, &(0x7f0000000300)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, &(0x7f00000000c0)=[0x0], &(0x7f0000000140), 0x0, 0x8, &(0x7f0000000200)=[{}, {}, {}, {}, {}], 0x28, 0x0, 0x0, 0x0, 0x0, 0x10, 0x8, 0x8, &(0x7f00000002c0)}}, 0x10) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000e80)=@bpf_lsm={0x1d, 0x4, &(0x7f0000000040)=@framed={{0x18, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x73fc}, [@generic={0x9, 0x8, 0x0, 0x7f, 0x200}]}, &(0x7f0000000880)='GPL\x00', 0x1f, 0x93, &(0x7f0000000cc0)=""/147, 0x40f00, 0x2, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, &(0x7f0000000b80)={0x9}, 0x8, 0x10, 0x0, 0x0, r6}, 0x80) r7 = socket$nl_generic(0x10, 0x3, 0x10) r8 = syz_genetlink_get_family_id$tipc(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$TIPC_CMD_ENABLE_BEARER(r7, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000001200)=ANY=[@ANYBLOB="3400000006c08fada241ee0a049e6fba3f36f40da839bbdf54c31768b0026f4261f56d51c5d81ba4cb99f8203c40d0a142fcd75ce26e408d229139f8c4e81109c56a18e453e8a537df21c4ec04a4f3e22f4ac125a28ad43e41107b1f7e79c8573985e54fd665e2913ca74da8c9f3fc2839258c19fa7ac20ebead31206cf280ea73f635bc5418b66554392dfd11874fef72bc53538aae3cb5ef8a80140f4737dd2c572a03ee1d5e3d627e", @ANYRESOCT=0x0, @ANYBLOB="010000000000000000000100000000000000014100000018001700000000000000007564503a73"], 0x34}, 0x1, 0x0, 0x0, 0x1}, 0x0) ioctl$AUTOFS_DEV_IOCTL_PROTOSUBVER(r1, 0xc0189373, &(0x7f0000000540)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x6}}, './file0\x00'}) sendmsg$TIPC_CMD_GET_MAX_PORTS(r5, &(0x7f0000001140)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x40000}, 0xc, &(0x7f0000001100)={&(0x7f00000010c0)={0x1c, r8, 0x400, 0x8000, 0x25dfdbfe, {}, ["", "", "", "", "", "", ""]}, 0x1c}, 0x1, 0x0, 0x0, 0x20048854}, 0x4004) bpf$PROG_LOAD(0x5, &(0x7f0000000e40)={0x5, 0x16, &(0x7f0000001340)=ANY=[@ANYBLOB="390000000100000000000000900000f117fa0000", @ANYRES32=r4, @ANYBLOB="1f00000000000000b703000000000000850000000c000000b61b0453c29f42b5be06c7010b4efffe000000000085000000a900000018150000", @ANYRES32=r3, @ANYBLOB="0000000000000000180100002020782500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b70300000000850000005d000000185500000100000000000000000000009500000000000000"], &(0x7f0000000b80)='syzkaller\x00', 0x1, 0xe8, &(0x7f0000000bc0)=""/232, 0x41000, 0x5b, '\x00', 0x0, 0xe, r5, 0x8, &(0x7f0000000d00)={0x5, 0x2}, 0x8, 0x10, &(0x7f0000000d40)={0x4, 0xe, 0x2, 0x8}, 0x10, r6, r4, 0x5, &(0x7f0000000d80), &(0x7f0000000dc0)=[{0x4, 0x3, 0x0, 0x2}, {0x3, 0x1, 0xa, 0xa}, {0x0, 0x3, 0x2, 0xa}, {0x0, 0x3, 0x7, 0x1}, {0x1, 0x5, 0xb, 0xc}], 0x10, 0x7}, 0x90) 20:41:17 executing program 4: r0 = perf_event_open(&(0x7f0000000a40)={0x2, 0x80, 0xcd, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @perf_bp={&(0x7f0000000200), 0x8}, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfb75}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000040)={0x0, 0x4, 0x0, &(0x7f0000000180)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x80) perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x208, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x4, 0x8001}, 0x4000, 0x0, 0x0, 0x0, 0x0, 0x14e, 0xd1}, 0x0, 0xbfffffffffffffff, r0, 0x19893a9f0a0e2244) r1 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) syz_clone(0x2000000, 0x0, 0x0, 0x0, 0x0, 0x0) r2 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x18, 0x5, &(0x7f00000002c0)=ANY=[@ANYBLOB="180000001800ff0f0000000000000000850000006d000000750000000800000095"], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x80) r3 = perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400, 0x80000, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x7, 0x1007}, 0x8006, 0x0, 0x0, 0x1, 0x4, 0x800000, 0x3}, 0x0, 0xffefffffffffffff, 0xffffffffffffffff, 0x9) ioctl$PERF_EVENT_IOC_SET_FILTER(r3, 0x40082406, &(0x7f00000003c0)='memory.numa_stat\x00') perf_event_open(0x0, 0x0, 0x0, r3, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000080)='sched_switch\x00', r2}, 0x10) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000380)={{0x1, 0xffffffffffffffff}, &(0x7f0000000000), &(0x7f0000000240)=r2}, 0x20) r5 = memfd_secret(0x0) syz_io_uring_setup(0x0, &(0x7f0000000300)={0x0, 0x2, 0x0, 0x0, 0x0, 0x0, r5}, 0x0, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f00000009c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000000a00)=0x14) r7 = openat2(0xffffffffffffff9c, &(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)={0x40841}, 0x18) write$binfmt_script(r7, &(0x7f0000000340)=ANY=[], 0xfffffdef) r8 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000b40)={0x1b, 0x0, 0x0, 0x7, 0x0, 0xffffffffffffffff, 0x200, '\x00', 0x0, 0xffffffffffffffff, 0x3, 0x1, 0x4}, 0x48) r9 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000bc0)={0x2, 0x4, 0x8, 0x1, 0x80, 0x1, 0x9, '\x00', 0x0, 0xffffffffffffffff, 0x4, 0x1, 0x4}, 0x48) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000d00)={0x11, 0x12, &(0x7f0000000440)=@raw=[@exit, @ringbuf_query={{0x18, 0x1, 0x1, 0x0, r4}}, @ringbuf_output={{0x18, 0x1, 0x1, 0x0, r5}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x10001}, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x4, 0x0, 0x0, 0x2}}, @exit, @initr0={0x18, 0x0, 0x0, 0x0, 0x6349, 0x0, 0x0, 0x0, 0xf685}, @ldst={0x3, 0x2, 0x1, 0x0, 0xb, 0x2543a83bb932833c, 0x1}], &(0x7f0000000940)='syzkaller\x00', 0x80000001, 0x27, &(0x7f0000000980)=""/39, 0x41000, 0x40, '\x00', r6, 0x0, r7, 0x8, &(0x7f0000000ac0)={0x3, 0x1}, 0x8, 0x10, &(0x7f0000000b00)={0x2, 0xc, 0xfffffe00, 0x2}, 0x10, 0x0, 0x0, 0x5, &(0x7f0000000c40)=[r2, 0x1, 0x1, r8, r9, r1], &(0x7f0000000c80)=[{0x4, 0x1, 0x8, 0xc}, {0x0, 0x4, 0xf, 0x4}, {0x1, 0x2, 0xd, 0x6}, {0x0, 0x4, 0x10, 0xc}, {0x2, 0x4, 0xd, 0x1}], 0x10, 0x20}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000280)={&(0x7f0000000140)='ext4_ext_show_extent\x00', r2}, 0x10) r10 = perf_event_open(&(0x7f0000000080)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open$cgroup(&(0x7f0000000300)={0x5, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_bp={&(0x7f0000000100)}, 0x81252, 0x6, 0x80000001, 0x0, 0x0, 0x0, 0x6, 0x0, 0x6, 0x0, 0x6}, 0xffffffffffffffff, 0xe, 0xffffffffffffffff, 0xc) perf_event_open(0x0, 0x0, 0x2, 0xffffffffffffffff, 0xb) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000780)={0x14, 0x4, &(0x7f00000008c0)=ANY=[@ANYBLOB="850000006b00000018150000a3df7ddd9621fb0201050062d91123e632b2f902ad1e9f1cc7a66ed51ac8a4070000000000000019a83f0b7c9502871fb1ca3dc499e804bbbc359859ed6fd9f104fc7ed900d122072d8275a24d000000000601c3a63953a7b36fe458", @ANYRES32, @ANYBLOB="00000000000000002d59e4eda4000000"], &(0x7f0000000400)='syzkaller\x00', 0xfff, 0xe3, &(0x7f0000000580)=""/227, 0x0, 0x4, '\x00', 0x0, 0x24, 0xffffffffffffffff, 0x8, &(0x7f0000000500)={0x1, 0x3}, 0x8, 0x10, &(0x7f0000000680)={0x5, 0x6, 0x81, 0x9}, 0x10, 0xffffffffffffffff, 0xffffffffffffffff, 0x0, &(0x7f00000006c0)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, r10]}, 0x80) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x4030582a, &(0x7f0000000040)=0x91) [ 128.925487][ T6319] 8021q: adding VLAN 0 to HW filter on device batadv0 20:41:17 executing program 2: r0 = perf_event_open(&(0x7f0000000a40)={0x2, 0x80, 0xcd, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @perf_bp={&(0x7f0000000200), 0x8}, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfb75}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000040)={0x0, 0x4, 0x0, &(0x7f0000000180)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x80) perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x208, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x4, 0x8001}, 0x4000, 0x0, 0x0, 0x0, 0x0, 0x14e, 0xd1}, 0x0, 0xbfffffffffffffff, r0, 0x19893a9f0a0e2244) r1 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) syz_clone(0x2000000, 0x0, 0x0, 0x0, 0x0, 0x0) r2 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x18, 0x5, &(0x7f00000002c0)=ANY=[@ANYBLOB="180000001800ff0f0000000000000000850000006d000000750000000800000095"], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x80) r3 = perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400, 0x80000, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x7, 0x1007}, 0x8006, 0x0, 0x0, 0x1, 0x4, 0x800000, 0x3}, 0x0, 0xffefffffffffffff, 0xffffffffffffffff, 0x9) ioctl$PERF_EVENT_IOC_SET_FILTER(r3, 0x40082406, &(0x7f00000003c0)='memory.numa_stat\x00') perf_event_open(0x0, 0x0, 0x0, r3, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000080)='sched_switch\x00', r2}, 0x10) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000380)={{0x1, 0xffffffffffffffff}, &(0x7f0000000000), &(0x7f0000000240)=r2}, 0x20) syz_io_uring_setup(0x0, &(0x7f0000000300)={0x0, 0x2}, 0x0, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f00000009c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000000a00)=0x14) r6 = openat2(0xffffffffffffff9c, &(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)={0x40841}, 0x18) write$binfmt_script(r6, &(0x7f0000000340)=ANY=[], 0xfffffdef) r7 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000bc0)={0x2, 0x4, 0x8, 0x1, 0x80, 0x1, 0x9, '\x00', 0x0, 0xffffffffffffffff, 0x4, 0x1, 0x4}, 0x48) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000d00)={0x11, 0x12, &(0x7f0000000440)=@raw=[@exit, @ringbuf_query={{0x18, 0x1, 0x1, 0x0, r4}}, @ringbuf_output={{}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x10001}, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x4, 0x0, 0x0, 0x2}}, @exit, @initr0={0x18, 0x0, 0x0, 0x0, 0x6349, 0x0, 0x0, 0x0, 0xf685}, @ldst={0x3, 0x2, 0x1, 0x0, 0xb, 0x2543a83bb932833c, 0x1}], &(0x7f0000000940)='syzkaller\x00', 0x80000001, 0x27, &(0x7f0000000980)=""/39, 0x41000, 0x40, '\x00', r5, 0x0, r6, 0x8, &(0x7f0000000ac0)={0x3, 0x1}, 0x8, 0x10, &(0x7f0000000b00)={0x2, 0xc, 0xfffffe00, 0x2}, 0x10, 0x0, 0x0, 0x5, &(0x7f0000000c40)=[r2, 0x1, 0x1, 0xffffffffffffffff, r7, r1], &(0x7f0000000c80)=[{0x4, 0x1, 0x8, 0xc}, {0x0, 0x4, 0xf, 0x4}, {0x1, 0x2, 0xd, 0x6}, {0x0, 0x4, 0x10, 0xc}, {0x2, 0x4, 0xd, 0x1}], 0x10, 0x20}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000280)={&(0x7f0000000140)='ext4_ext_show_extent\x00', r2}, 0x10) r8 = perf_event_open(&(0x7f0000000080)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) r9 = gettid() perf_event_open$cgroup(&(0x7f0000000300)={0x5, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_bp={&(0x7f0000000100)}, 0x81252, 0x6, 0x80000001, 0x0, 0x0, 0x0, 0x6, 0x0, 0x6, 0x0, 0x6}, 0xffffffffffffffff, 0xe, 0xffffffffffffffff, 0xc) perf_event_open(0x0, r9, 0x2, 0xffffffffffffffff, 0xb) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) perf_event_open(&(0x7f0000000840)={0x2, 0x80, 0x0, 0x7, 0x0, 0x80, 0x0, 0x3, 0x0, 0x9, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, @perf_config_ext={0x8000000000, 0x3}, 0x46c73247dfbe0d, 0x1007e, 0x0, 0x2, 0x0, 0x0, 0x6, 0x0, 0xffffffff, 0x0, 0x1c}, 0x0, 0x9, 0xffffffffffffffff, 0xd) bpf$PROG_LOAD(0x5, &(0x7f0000000780)={0x14, 0x4, &(0x7f00000008c0)=ANY=[@ANYBLOB="850000006b00000018150000a3df7ddd9621fb0201050062d91123e632b2f902ad1e9f1cc7a66ed51ac8a4070000000000000019a83f0b7c9502871fb1ca3dc499e804bbbc359859ed6fd9f104fc7ed900d122072d8275a24d000000000601c3a63953a7b36fe458", @ANYRES32, @ANYBLOB="00000000000000002d59e4eda4000000"], &(0x7f0000000400)='syzkaller\x00', 0xfff, 0xe3, &(0x7f0000000580)=""/227, 0x0, 0x4, '\x00', 0x0, 0x24, 0xffffffffffffffff, 0x8, &(0x7f0000000500)={0x1, 0x3}, 0x8, 0x10, &(0x7f0000000680)={0x5, 0x6, 0x81, 0x9}, 0x10, 0xffffffffffffffff, 0xffffffffffffffff, 0x0, &(0x7f00000006c0)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, r8]}, 0x80) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x4030582a, &(0x7f0000000040)=0x91) [ 128.969567][ T6546] loop1: detected capacity change from 0 to 2048 [ 129.032779][ T6546] loop1: p2 p3 p7 20:41:17 executing program 1: ioctl$BTRFS_IOC_LOGICAL_INO(0xffffffffffffffff, 0xc0389424, &(0x7f0000000180)={0x1, 0x28, '\x00', 0x1, &(0x7f0000000080)=[0x0, 0x0, 0x0, 0x0, 0x0]}) r0 = socket$inet6(0xa, 0x3, 0x6) r1 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) r2 = dup2(0xffffffffffffffff, r0) ioctl$FIDEDUPERANGE(r0, 0xc0189436, &(0x7f0000000f00)=ANY=[@ANYBLOB="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"]) ioctl$TIOCSBRK(r2, 0x5427) recvfrom$inet6(0xffffffffffffffff, &(0x7f0000000280)=""/134, 0x86, 0x40000102, &(0x7f0000000340)={0xa, 0x4e21, 0x77f, @mcast1, 0x403b3f}, 0x1c) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000001040)={{r2, 0xffffffffffffffff}, &(0x7f0000000140), &(0x7f0000000480)=r1}, 0x20) syz_read_part_table(0x593, &(0x7f00000005c0)="$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") r4 = creat(&(0x7f0000000240)='./file0\x00', 0x0) stat(&(0x7f0000000040)='./file1\x00', &(0x7f0000000380)) fsetxattr$security_capability(r4, &(0x7f0000000100), &(0x7f0000000000)=@v1={0x1000000, [{0x80000000, 0x81}]}, 0xc, 0x0) newfstatat(0xffffffffffffff9c, &(0x7f00000000c0)='./file1\x00', &(0x7f0000001400), 0x400) close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x2) ioctl$TIOCSTI(r4, 0x5412, &(0x7f00000004c0)=0x40) fsync(0xffffffffffffffff) write$binfmt_misc(r4, &(0x7f0000001080)=ANY=[@ANYBLOB="7379d3c6"], 0x4) fallocate(r4, 0x100000011, 0x0, 0x2811fdff) open(&(0x7f0000000100)='.\x00', 0x20c2, 0x2d) open$dir(&(0x7f0000000500)='./file1\x00', 0x1c6c0, 0x0) r5 = openat$vcsu(0xffffffffffffff9c, &(0x7f0000000cc0), 0x400c00, 0x0) lsetxattr$security_selinux(&(0x7f0000001180)='./file1\x00', &(0x7f00000011c0), &(0x7f0000001300)='system_u:object_r:unconfined_exec_t:s0\x00', 0x27, 0x3) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000400)={0xffffffffffffffff, 0xe0, &(0x7f0000000300)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, &(0x7f00000000c0)=[0x0], &(0x7f0000000140), 0x0, 0x8, &(0x7f0000000200)=[{}, {}, {}, {}, {}], 0x28, 0x0, 0x0, 0x0, 0x0, 0x10, 0x8, 0x8, &(0x7f00000002c0)}}, 0x10) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000e80)=@bpf_lsm={0x1d, 0x4, &(0x7f0000000040)=@framed={{0x18, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x73fc}, [@generic={0x9, 0x8, 0x0, 0x7f, 0x200}]}, &(0x7f0000000880)='GPL\x00', 0x1f, 0x93, &(0x7f0000000cc0)=""/147, 0x40f00, 0x2, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, &(0x7f0000000b80)={0x9}, 0x8, 0x10, 0x0, 0x0, r6}, 0x80) r7 = socket$nl_generic(0x10, 0x3, 0x10) r8 = syz_genetlink_get_family_id$tipc(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$TIPC_CMD_ENABLE_BEARER(r7, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000001200)=ANY=[@ANYBLOB="3400000006c08fada241ee0a049e6fba3f36f40da839bbdf54c31768b0026f4261f56d51c5d81ba4cb99f8203c40d0a142fcd75ce26e408d229139f8c4e81109c56a18e453e8a537df21c4ec04a4f3e22f4ac125a28ad43e41107b1f7e79c8573985e54fd665e2913ca74da8c9f3fc2839258c19fa7ac20ebead31206cf280ea73f635bc5418b66554392dfd11874fef72bc53538aae3cb5ef8a80140f4737dd2c572a03ee1d5e3d627e", @ANYRESOCT=0x0, @ANYBLOB="010000000000000000000100000000000000014100000018001700000000000000007564503a73"], 0x34}, 0x1, 0x0, 0x0, 0x1}, 0x0) ioctl$AUTOFS_DEV_IOCTL_PROTOSUBVER(r1, 0xc0189373, &(0x7f0000000540)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x6}}, './file0\x00'}) sendmsg$TIPC_CMD_GET_MAX_PORTS(r5, &(0x7f0000001140)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x40000}, 0xc, &(0x7f0000001100)={&(0x7f00000010c0)={0x1c, r8, 0x400, 0x8000, 0x25dfdbfe, {}, ["", "", "", "", "", "", ""]}, 0x1c}, 0x1, 0x0, 0x0, 0x20048854}, 0x4004) bpf$PROG_LOAD(0x5, &(0x7f0000000e40)={0x5, 0x16, &(0x7f0000001340)=ANY=[@ANYBLOB="390000000100000000000000900000f117fa0000", @ANYRES32=r4, @ANYBLOB="1f00000000000000b703000000000000850000000c000000b61b0453c29f42b5be06c7010b4efffe000000000085000000a900000018150000", @ANYRES32=r3, @ANYBLOB="0000000000000000180100002020782500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b70300000000850000005d000000185500000100000000000000000000009500000000000000"], &(0x7f0000000b80)='syzkaller\x00', 0x1, 0xe8, &(0x7f0000000bc0)=""/232, 0x41000, 0x5b, '\x00', 0x0, 0xe, r5, 0x8, &(0x7f0000000d00)={0x5, 0x2}, 0x8, 0x10, &(0x7f0000000d40)={0x4, 0xe, 0x2, 0x8}, 0x10, r6, r4, 0x5, &(0x7f0000000d80), &(0x7f0000000dc0)=[{0x4, 0x3, 0x0, 0x2}, {0