0x6c060000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) ioctl$TIOCSETD(0xffffffffffffffff, 0x5423, &(0x7f0000000080)=0x3) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$EVIOCGPROP(r0, 0x40047438, &(0x7f0000000180)=""/246) close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x2) ioctl$PPPIOCGFLAGS1(r0, 0x10, 0x0) 10:11:42 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$TCPDIAG_GETSOCK(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000780)=ANY=[@ANYBLOB="8011000012"], 0x1180}, 0x1, 0x0, 0x0, 0x40021}, 0x810) 10:11:42 executing program 3: syz_clone(0x20005000, 0x0, 0x0, &(0x7f0000000140), 0x0, 0x0) 10:11:42 executing program 0: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000180), 0xa000, 0x0) close(r0) 10:11:42 executing program 2: perf_event_open$cgroup(&(0x7f0000000040)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 10:11:42 executing program 1: perf_event_open(&(0x7f0000000080)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 10:11:42 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f00000001c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x1c, 0x1c, 0x4, [@typedef={0x2, 0x0, 0x0, 0x8, 0x2}, @int={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x4}]}, {0x0, [0x0, 0x61]}}, &(0x7f0000000640)=""/4096, 0x38, 0x1000, 0x1}, 0x20) 10:11:48 executing program 5: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000005c0)={0x5, 0x4, &(0x7f0000000300)=@framed={{}, [@call={0x85, 0x0, 0x0, 0x43}]}, &(0x7f0000000380)='GPL\x00', 0x5, 0x93, &(0x7f00000004c0)=""/147, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 10:11:48 executing program 2: bpf$MAP_CREATE(0x0, &(0x7f0000000400)=@base={0x2, 0x4, 0x0, 0x401, 0x0, 0x1}, 0x48) 10:11:48 executing program 1: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x11, 0x4, &(0x7f0000000000)=@framed={{}, [@alu={0x7, 0x0, 0x7}]}, &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 10:11:48 executing program 0: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000440)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) r1 = openat$cgroup_int(r0, &(0x7f0000000040)='hugetlb.2MB.rsvd.max_usage_in_bytes\x00', 0x2, 0x0) write$cgroup_pressure(r1, &(0x7f0000000140)={'some'}, 0x2f) 10:11:48 executing program 4: unshare(0x6c060000) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000280), 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000080)=0x3) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) r1 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$EVIOCGPROP(r1, 0x40047438, &(0x7f0000000180)=""/246) close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x2) ioctl$PPPIOCGFLAGS1(r1, 0x10, 0x0) 10:11:48 executing program 3: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000001500), 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, 0x0) 10:11:48 executing program 0: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000005c0)={0x2, 0x4, &(0x7f0000000300)=@framed={{}, [@call={0x85, 0x0, 0x0, 0xad}]}, &(0x7f0000000380)='GPL\x00', 0x5, 0x93, &(0x7f00000004c0)=""/147, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 10:11:48 executing program 2: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000880)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb419b0dd1acf462, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 10:11:48 executing program 3: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff}) fstat(r0, &(0x7f0000000000)) 10:11:48 executing program 1: open$dir(&(0x7f0000000180)='./file0\x00', 0x1218c2, 0x0) lsetxattr(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)=@known='trusted.syz\x00', 0x0, 0x0, 0x0) 10:11:48 executing program 0: openat$urandom(0xffffffffffffff9c, &(0x7f0000004500), 0x40000, 0x0) 10:11:48 executing program 3: r0 = socket$unix(0x1, 0x2, 0x0) recvmmsg$unix(r0, 0x0, 0x0, 0x2100, 0x0) 10:11:56 executing program 2: r0 = semget$private(0x0, 0x3, 0x0) semctl$GETVAL(r0, 0x1, 0xc, &(0x7f00000000c0)=""/215) 10:11:56 executing program 1: semget$private(0x0, 0x7, 0x3a0) 10:11:56 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) recvmmsg$unix(r0, 0x0, 0x0, 0x0, 0x0) 10:11:56 executing program 0: get_mempolicy(0x0, 0x0, 0x0, &(0x7f0000ffc000/0x4000)=nil, 0x3) 10:11:56 executing program 4: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000280), 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000080)=0x3) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) r1 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$EVIOCGPROP(r1, 0x40047438, &(0x7f0000000180)=""/246) close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x2) ioctl$PPPIOCGFLAGS1(r1, 0x10, 0x0) 10:11:56 executing program 3: r0 = socket$unix(0x1, 0x5, 0x0) recvmmsg$unix(r0, &(0x7f0000003240)=[{{0x0, 0x0, 0x0}}], 0x1, 0x1, 0x0) 10:11:56 executing program 2: mprotect(&(0x7f0000ffc000/0x2000)=nil, 0x2000, 0x0) mlock(&(0x7f0000ffb000/0x4000)=nil, 0x4000) 10:11:56 executing program 0: open$dir(&(0x7f0000000180)='./file0\x00', 0x101040, 0x0) chmod(&(0x7f0000000000)='./file0\x00', 0x1e) 10:11:56 executing program 3: open$dir(&(0x7f0000000180)='./file0\x00', 0x101040, 0x0) chmod(&(0x7f0000000040)='./file0\x00', 0xc0) 10:11:56 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f00000001c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xd, 0xd, 0x2, [@datasec={0x0, 0x0, 0x0, 0xf, 0x1, [], 'R'}]}}, &(0x7f00000002c0)=""/239, 0x2a, 0xef, 0x1}, 0x20) 10:11:56 executing program 4: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000280), 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000080)=0x3) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) r1 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$EVIOCGPROP(r1, 0x40047438, &(0x7f0000000180)=""/246) close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x2) ioctl$PPPIOCGFLAGS1(r1, 0x10, 0x0) 10:11:56 executing program 2: r0 = inotify_init1(0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(r0, 0xc0189436, 0x0) 10:11:56 executing program 3: pselect6(0x40, &(0x7f0000000240)={0x10001}, 0x0, 0x0, 0x0, 0x0) 10:11:56 executing program 4: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000280), 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000080)=0x3) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) r1 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$EVIOCGPROP(r1, 0x40047438, &(0x7f0000000180)=""/246) close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x2) ioctl$PPPIOCGFLAGS1(r1, 0x10, 0x0) 10:12:04 executing program 5: r0 = inotify_init1(0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(r0, 0x40049409, 0x0) 10:12:04 executing program 0: r0 = syz_open_dev$loop(&(0x7f0000000240), 0x0, 0x0) ioctl$LOOP_SET_STATUS(r0, 0x1267, 0x0) 10:12:04 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg(r0, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000080)=[{0x0}, {&(0x7f0000000180)="99", 0x1}], 0x2}, 0x0) 10:12:04 executing program 1: syz_mount_image$ext4(&(0x7f0000000340)='ext4\x00', &(0x7f0000000380)='./file0\x00', 0x0, 0x400000, &(0x7f0000000600), 0x0, &(0x7f0000000680)) 10:12:04 executing program 3: r0 = gettid() rt_sigqueueinfo(r0, 0x11, &(0x7f0000000340)) 10:12:04 executing program 4: unshare(0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000280), 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000080)=0x3) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) r1 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$EVIOCGPROP(r1, 0x40047438, &(0x7f0000000180)=""/246) close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x2) ioctl$PPPIOCGFLAGS1(r1, 0x10, 0x0) 10:12:04 executing program 2: add_key$fscrypt_provisioning(&(0x7f0000000340), 0x0, 0x0, 0x0, 0xfffffffffffffffe) 10:12:04 executing program 4: unshare(0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000280), 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000080)=0x3) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) r1 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$EVIOCGPROP(r1, 0x40047438, &(0x7f0000000180)=""/246) close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x2) ioctl$PPPIOCGFLAGS1(r1, 0x10, 0x0) 10:12:04 executing program 0: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg(r0, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f0000000280)='N', 0x1}], 0x3}, 0x0) 10:12:04 executing program 3: syz_mount_image$tmpfs(&(0x7f00000005c0), &(0x7f0000000600)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000840)={[{@nr_inodes={'nr_inodes', 0x3d, [0x33]}}]}) 10:12:04 executing program 2: r0 = syz_open_dev$loop(&(0x7f0000000240), 0x0, 0x0) ioctl$LOOP_SET_STATUS(r0, 0x80081270, 0x0) 10:12:04 executing program 0: r0 = perf_event_open(&(0x7f00000000c0)={0x3, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = bpf$ITER_CREATE(0x21, &(0x7f0000000040), 0x8) r2 = openat$cgroup_ro(r1, &(0x7f0000000080)='io.stat\x00', 0x0, 0x0) bpf$ITER_CREATE(0x21, &(0x7f00000000c0)={r2}, 0x8) perf_event_open$cgroup(&(0x7f0000000180)={0x1, 0x80, 0x8, 0x18, 0x1, 0x31, 0x0, 0xffffffff, 0x40200, 0x1c, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x3, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x2, 0x4, @perf_config_ext={0x8, 0x400}, 0x4000, 0x0, 0x8, 0x3, 0x1, 0x8, 0x3e, 0x0, 0xffff, 0x0, 0x7}, r2, 0xd, r0, 0x0) r3 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000280)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) r4 = bpf$ITER_CREATE(0x21, &(0x7f0000000040), 0x8) r5 = openat$cgroup_ro(r4, &(0x7f0000000080)='io.stat\x00', 0x0, 0x0) r6 = bpf$ITER_CREATE(0x21, &(0x7f00000000c0)={r5}, 0x8) r7 = openat$cgroup_ro(r4, &(0x7f0000000380)='memory.numa_stat\x00', 0x0, 0x0) ioctl$TUNSETFILTEREBPF(r7, 0x800454e1, &(0x7f00000003c0)=r4) openat$cgroup_ro(r6, &(0x7f0000000280)='blkio.bfq.io_wait_time_recursive\x00', 0x0, 0x0) openat$cgroup_ro(r6, &(0x7f0000000200)='blkio.throttle.io_service_bytes\x00', 0x0, 0x0) openat$cgroup_type(r6, &(0x7f0000000300), 0x2, 0x0) bpf$BPF_PROG_DETACH(0x9, &(0x7f00000002c0)={@cgroup=r3, r6, 0x6}, 0x10) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000580)={0xffffffffffffffff, 0x20, &(0x7f0000000540)={&(0x7f0000000440)=""/184, 0xb8, 0x0, &(0x7f0000000500)=""/58, 0x3a}}, 0x10) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(r0, 0x4008240b, &(0x7f0000000040)={0x4, 0x80, 0x9, 0x4, 0x4, 0x7, 0x0, 0x9, 0x4002, 0x4, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0xae, 0x1, @perf_bp={&(0x7f0000000000), 0x2}, 0x2800, 0x6, 0x7, 0x8, 0x5, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x7}) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000340)='./cgroup/syz0\x00', 0x1ff) r8 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000140)='blkio.bfq.io_serviced_recursive\x00', 0x0, 0x0) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(r8, 0x4008240b, &(0x7f0000000200)={0x3, 0x80, 0x0, 0x5, 0xda, 0x3, 0x0, 0x9, 0xa0000, 0x3, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1013, 0x1, @perf_config_ext={0x7fff, 0xfffffffffffffffa}, 0x2000, 0x3fe, 0x1, 0x2, 0x1, 0xb8, 0x7, 0x0, 0xfb0, 0x0, 0x1000}) 10:12:12 executing program 5: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) openat$cgroup_procs(r0, &(0x7f0000000040)='cgroup.threads\x00', 0x2, 0x0) 10:12:12 executing program 4: unshare(0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000280), 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000080)=0x3) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) r1 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$EVIOCGPROP(r1, 0x40047438, &(0x7f0000000180)=""/246) close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x2) ioctl$PPPIOCGFLAGS1(r1, 0x10, 0x0) 10:12:12 executing program 3: r0 = perf_event_open(&(0x7f00000000c0)={0x8, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0x40042409, 0x0) 10:12:12 executing program 2: r0 = syz_clone(0x0, &(0x7f0000000000)='B', 0x1, &(0x7f0000000140), 0x0, &(0x7f00000001c0)) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(0xffffffffffffffff, 0x4008240b, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000300)={r0, 0xffffffffffffffff, 0x0, 0x5, &(0x7f00000002c0)=')){}\x00'}, 0x30) 10:12:12 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000005c0)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg$unix(r0, &(0x7f00000008c0)={0x0, 0x0, 0x0}, 0x0) 10:12:12 executing program 1: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000280)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) bpf$BPF_PROG_DETACH(0x9, &(0x7f00000002c0)={@cgroup=r0}, 0x10) 10:12:12 executing program 4: unshare(0x6c060000) r0 = openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000080)=0x3) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) r1 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$EVIOCGPROP(r1, 0x40047438, &(0x7f0000000180)=""/246) close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x2) ioctl$PPPIOCGFLAGS1(r1, 0x10, 0x0) 10:12:12 executing program 3: r0 = socket$l2tp(0x2, 0x2, 0x73) ioctl$sock_ifreq(r0, 0x8935, &(0x7f0000000000)={'macvtap0\x00', @ifru_ivalue}) 10:12:12 executing program 1: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000000)={0x2, 0x12, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, [@sadb_ident={0x2, 0xb}]}, 0x20}}, 0x0) 10:12:12 executing program 2: r0 = socket(0xa, 0x6, 0x0) bind$tipc(r0, 0x0, 0x0) 10:12:12 executing program 3: socketpair(0x23, 0x0, 0x1, 0x0) 10:12:12 executing program 1: r0 = socket(0x10, 0x2, 0x0) getsockname$tipc(r0, 0x0, 0x0) [ 2031.917785][ T24] audit: type=1400 audit(1649758332.326:447): avc: denied { bind } for pid=24551 comm="syz-executor.2" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=dccp_socket permissive=1 10:12:20 executing program 5: socket(0x23, 0x0, 0xfffffffc) 10:12:20 executing program 4: unshare(0x6c060000) r0 = openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000080)=0x3) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) r1 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$EVIOCGPROP(r1, 0x40047438, &(0x7f0000000180)=""/246) close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x2) ioctl$PPPIOCGFLAGS1(r1, 0x10, 0x0) 10:12:20 executing program 1: r0 = socket$phonet(0x23, 0x2, 0x1) ioctl$SIOCPNADDRESOURCE(r0, 0x89e0, 0x0) 10:12:20 executing program 2: r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$inet_udp_int(r0, 0x11, 0x1, &(0x7f0000000000)=0x36, 0x4) 10:12:20 executing program 3: syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='net/if_inet6\x00') 10:12:20 executing program 0: r0 = socket(0x21, 0x2, 0x2) bind$unix(r0, &(0x7f0000000000)=@abs, 0x6e) 10:12:20 executing program 0: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) ioctl$sock_ifreq(r0, 0x8910, &(0x7f0000000280)={'syz_tun\x00', @ifru_addrs=@phonet}) 10:12:20 executing program 1: r0 = socket(0x23, 0x2, 0x0) sendmsg$BATADV_CMD_SET_VLAN(r0, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000300)={0x0}}, 0x0) 10:12:20 executing program 3: r0 = socket$packet(0x11, 0x3, 0x300) writev(r0, &(0x7f0000000440)=[{&(0x7f0000000000)="9a", 0x1}], 0x1) 10:12:20 executing program 1: pipe2(0x0, 0x880) getsockopt$CAN_RAW_RECV_OWN_MSGS(0xffffffffffffffff, 0x65, 0x4, 0x0, 0x0) socket$can_raw(0x1d, 0x3, 0x1) ioctl$BTRFS_IOC_BALANCE_PROGRESS(0xffffffffffffffff, 0x84009422, 0x0) ioctl$SNDRV_TIMER_IOCTL_SELECT(0xffffffffffffffff, 0x40345410, 0x0) 10:12:20 executing program 0: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$KDFONTOP_SET(r0, 0x4b72, &(0x7f0000000480)={0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000080)="e663e829d7160b39f6b887eb50771a8db79a8f589638370d6d12b5b038d1bb8a79eeceb4490b30ef792b6448b2786b1c8bd53f43d04d7335f907a8f4d5a2dbc9fafb1b1ab3cd2b08f2f8d26a435df79ddbac73b1795900b5f22dd42aa56731fda14ebb309bbbe101ae2df6c5fb3e736e5a2c3d9d2baeabf8e49472ffdce9056cd8bac81a2a96d62489e7de6a194450762efe80623e3e8de6eed855bfbe266f026df06165c212b3ac0abde256b348f02638d0dcb74132c944f9c1e0928075a80d4c3e195b98d0c506223c58e18e6cede6845c1b4c7256eeead92f84aa4cecd937e7279b6ad1ffff00c99d7a685c6b797fae298a8d4764914922302145dc85e8670dce26854c1fcb63f354becb760dcd925f629c89b017a48a5d1feec49fd153500edd10c4f5dc5561602eb774f18f98e1eb197bab0226f0611b739bce6b354d177e2b424046dc1a3517efd55e3811486ef75c46cc88bbe81cca71799f8fe6caee58d32317c1da84ee032302fdb293fdc94959d952c090074ab100522138a4cca0aae3a70eb9f8cef7d747ed75480439b83e75d0774b1ff5e441914163721f41c4c9d8f853929001b3e50df6e89995028fb58bfb11947bc08062b4fb935531c2084ddcf7d995ccbf28c5abf521449fffa4146e7ebb690b559690a89cb1503d1847f9aeba8cd0885084aafda6c400dde4e87931efc48bb00163ca5c62a64a1f00f69d6c9a3663faeae807f3993444b36c7e8e0ce9cb062d89f85e7fb4cdce2ef7a300586576d29e36b3010705054e62cbfaaf0b0b52b9ad8dc3302ab8ee9e2cb0a9725159962451d7b75da77fed5f8b91868a1f5fc2c0592f15dddb1fc152060a2ed2e0861de393f4dfd4515dc917a9748289e82cba50f8e7f100b9d33bce6d1d76b8170d235ef080817516480599a3c05775e926775b2d2dc8fe803bc21724ce34b4599083447628e7dd13fc84c06abd1d713d8a71ac9245f3e1b9379b4fcb93a3dd71bc97cc757c6eae5879f6d1c9a01d348a79228841c5a3bc38aad10b490cd75edd89a852402fde7d6e13b6f6a1b446467910f8ca5e6f3e5cffbc64eb6fdf51d8da96b1d73e5d0b20acb315ee3a4538c67a23db682c3fe3aae7851aaaecc1b8bda768829bcb33ac35b7614239bb147b001ca4d7cdc1880fe285b252f1289ab2224a76dd52b8ae5760aa93155a17ac5fd3fcdfa1fab59af9e87fec5c7248f39f54b1a5abe28cbd23699ba695cf1f986a916f6a3734871d51fec316fc9b6afa826099ad2296a55a4820b82ec5ca664f089034c2104a4e529cf411e5b43ae7ba3f83b72a6c53766344b8d4df73d45f93c591fa26183e2d92f25956b28b6b8b5815f194544b4c31804916e3b7ea2f4d95ddfcb7c37c28d4c02e6e0179b19b9d6a4a00db98331a56389debaaadf3d645014a4d2f54d4c847257070bfd286d538657d"}) 10:12:20 executing program 2: r0 = socket$can_raw(0x1d, 0x3, 0x1) recvmsg$can_raw(r0, &(0x7f00000002c0)={&(0x7f0000000180)=@hci, 0x80, 0x0}, 0x0) [ 2040.185686][ T24] audit: type=1400 audit(1649758340.596:448): avc: denied { ioctl } for pid=24565 comm="syz-executor.1" path="socket:[84601]" dev="sockfs" ino=84601 ioctlcmd=0x89e0 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=phonet_socket permissive=1 [ 2040.243323][ T24] audit: type=1400 audit(1649758340.636:449): avc: denied { ioctl } for pid=24572 comm="syz-executor.0" path="socket:[84630]" dev="sockfs" ino=84630 ioctlcmd=0x8910 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_xfrm_socket permissive=1 10:12:28 executing program 5: r0 = socket$can_raw(0x1d, 0x3, 0x1) setsockopt$CAN_RAW_FILTER(r0, 0x65, 0x1, &(0x7f0000000200)=[{}], 0x8) 10:12:28 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$DEVLINK_CMD_SB_GET(r0, &(0x7f0000000f40)={0x0, 0x0, &(0x7f0000000f00)={&(0x7f0000000e40)=ANY=[@ANYBLOB="140020"], 0x14}}, 0x0) 10:12:28 executing program 0: io_uring_setup(0x0, &(0x7f0000000d80)) 10:12:28 executing program 1: openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080), 0x40800, 0x0) 10:12:28 executing program 4: unshare(0x6c060000) r0 = openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000080)=0x3) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) r1 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$EVIOCGPROP(r1, 0x40047438, &(0x7f0000000180)=""/246) close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x2) ioctl$PPPIOCGFLAGS1(r1, 0x10, 0x0) 10:12:28 executing program 2: syz_io_uring_setup(0x69e7, &(0x7f0000000000), &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ff8000/0x4000)=nil, &(0x7f0000000080), &(0x7f00000000c0)) 10:12:28 executing program 2: syz_genetlink_get_family_id$devlink(&(0x7f0000000240), 0xffffffffffffffff) sendmsg$DEVLINK_CMD_SB_PORT_POOL_SET(0xffffffffffffffff, 0x0, 0x0) 10:12:28 executing program 3: pipe2(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) ioctl$SNDRV_TIMER_IOCTL_SELECT(r0, 0x40345410, 0x0) 10:12:28 executing program 1: syz_io_uring_setup(0x1a4d, &(0x7f00000003c0)={0x0, 0x0, 0x2}, &(0x7f0000ffe000/0x2000)=nil, &(0x7f0000ffe000/0x1000)=nil, &(0x7f0000000440), 0x0) 10:12:28 executing program 0: openat$sysfs(0xffffffffffffff9c, &(0x7f0000000000)='/sys/devices/system', 0x258640, 0xbe) 10:12:28 executing program 2: open$dir(&(0x7f0000000000)='./file0\x00', 0x20641, 0x0) r0 = geteuid() r1 = getgid() fchownat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', r0, r1, 0x0) 10:12:28 executing program 3: openat$incfs(0xffffffffffffff9c, &(0x7f0000000080)='.pending_reads\x00', 0x8040, 0x0) 10:12:36 executing program 5: open$dir(&(0x7f0000000000)='./file1\x00', 0x28641, 0xc4) 10:12:36 executing program 1: r0 = openat$sysfs(0xffffffffffffff9c, &(0x7f00000000c0)='/sys/fs/cgroup', 0x0, 0x0) setsockopt$inet6_tcp_TCP_QUEUE_SEQ(r0, 0x6, 0x15, 0x0, 0x0) 10:12:36 executing program 0: r0 = open$dir(&(0x7f0000000000)='./file0\x00', 0x20040, 0x0) ioctl$BTRFS_IOC_SET_RECEIVED_SUBVOL(r0, 0xc0c89425, &(0x7f0000000040)={"21344f49e900e5476e1afbdfe7fd7230", 0x0, 0x0, {0x7, 0xffff}, {0xa7a}, 0x8f93, [0x7fffffffffffffff, 0x100000000, 0xb108, 0xfffffffffffffffd, 0xfffc, 0x2, 0x4, 0x3, 0x5ae, 0x8, 0x9, 0x1d5ea90f, 0xfffffffffffffff9, 0x3, 0x9, 0x7fffffffffffffff]}) r2 = mq_open(&(0x7f0000000140)='})[\x00', 0x40, 0x28, &(0x7f0000000180)={0x2, 0x3ff, 0x8, 0xfffffffffffffffd}) inotify_add_watch(0xffffffffffffffff, &(0x7f00000002c0)='./file0\x00', 0x5000002) ioctl$BTRFS_IOC_SET_RECEIVED_SUBVOL(r2, 0xc0c89425, &(0x7f00000001c0)={"96d82ba7c74a78356cb05e3160d95177", r1, r1, {0x3, 0x80000000}, {0x7fff, 0x3fe}, 0x6, [0x7bd, 0x4d34, 0xfef5, 0x20, 0x8, 0x5, 0xd, 0x74, 0x2, 0x7, 0x6, 0x100000001, 0x2, 0x9, 0x4, 0x80]}) 10:12:36 executing program 3: openat$ptmx(0xffffffffffffff9c, &(0x7f0000000340), 0x100, 0x0) 10:12:36 executing program 2: getresgid(&(0x7f0000000080), &(0x7f00000000c0), 0x0) 10:12:36 executing program 4: unshare(0x6c060000) openat$ptmx(0xffffffffffffff9c, &(0x7f0000000280), 0x0, 0x0) ioctl$TIOCSETD(0xffffffffffffffff, 0x5423, &(0x7f0000000080)=0x3) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$EVIOCGPROP(r0, 0x40047438, &(0x7f0000000180)=""/246) close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x2) ioctl$PPPIOCGFLAGS1(r0, 0x10, 0x0) 10:12:36 executing program 0: open$dir(&(0x7f0000000000)='./file0\x00', 0x20040, 0x0) open$dir(&(0x7f0000000100)='./file0\x00', 0x8000, 0x1) 10:12:36 executing program 1: open$dir(&(0x7f0000000000)='./file0\x00', 0x20641, 0x0) fchownat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0xee01, 0x0, 0x1000) 10:12:36 executing program 2: r0 = openat$sysfs(0xffffffffffffff9c, &(0x7f00000000c0)='/sys/devices/system', 0x0, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_ID_VALID(r0, 0x40082102, 0x0) 10:12:36 executing program 3: open$dir(&(0x7f0000000000)='./file0\x00', 0x20640, 0x0) open$dir(&(0x7f0000000040)='./file0\x00', 0x0, 0x5) 10:12:36 executing program 0: r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$IP_VS_SO_SET_TIMEOUT(r0, 0x0, 0x48a, &(0x7f0000000000), 0xc) 10:12:36 executing program 1: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000005c0)={{0x14}, [@NFT_MSG_NEWTABLE={0x20, 0x0, 0xa, 0x3, 0x0, 0x0, {0x1}, [@NFTA_TABLE_NAME={0x9, 0x1, 'syz0\x00'}]}, @NFT_MSG_NEWSET={0x3c, 0x9, 0xa, 0x401, 0x0, 0x0, {0x1}, [@NFTA_SET_ID={0x8}, @NFTA_SET_NAME={0x9, 0x2, 'syz2\x00'}, @NFTA_SET_TABLE={0x9, 0x1, 'syz0\x00'}, @NFTA_SET_KEY_LEN={0x8, 0x5, 0x1, 0x0, 0x1f}]}, @NFT_MSG_NEWSETELEM={0x48, 0xc, 0xa, 0x201, 0x0, 0x0, {0x1}, [@NFTA_SET_ELEM_LIST_SET={0x9, 0x2, 'syz2\x00'}, @NFTA_SET_ELEM_LIST_ELEMENTS={0x1c, 0x3, 0x0, 0x1, [{0x18, 0x0, 0x0, 0x1, [@NFTA_SET_ELEM_FLAGS={0x8, 0x3, 0x1, 0x0, 0x4}, @NFTA_SET_ELEM_TIMEOUT={0x4, 0x6}]}]}, @NFTA_SET_ELEM_LIST_TABLE={0x9, 0x1, 'syz0\x00'}]}], {0x14, 0x10}}, 0xcc}}, 0x0) [ 2055.739245][T24641] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.1'. 10:12:43 executing program 5: pselect6(0x40, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10001}, 0x0, &(0x7f0000000480)={0x8, 0x0, 0x0, 0x0, 0x0, 0x5}, 0x0, 0x0) socketpair(0x23, 0x0, 0x4, &(0x7f0000000700)) 10:12:43 executing program 3: getresgid(&(0x7f00000007c0), &(0x7f0000000800), &(0x7f0000000840)) 10:12:43 executing program 2: r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f0000000a00)={{{@in6=@private1, @in6=@private0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0xee01}}, {{@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}}, 0xa, @in6=@loopback, 0x0, 0x1}}, 0xe8) 10:12:43 executing program 0: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_ipv6_tunnel_SIOCDELPRL(r0, 0x89f6, 0x0) 10:12:43 executing program 4: unshare(0x6c060000) openat$ptmx(0xffffffffffffff9c, &(0x7f0000000280), 0x0, 0x0) ioctl$TIOCSETD(0xffffffffffffffff, 0x5423, &(0x7f0000000080)=0x3) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$EVIOCGPROP(r0, 0x40047438, &(0x7f0000000180)=""/246) close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x2) ioctl$PPPIOCGFLAGS1(r0, 0x10, 0x0) 10:12:43 executing program 1: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000005c0)={{0x14}, [@NFT_MSG_NEWTABLE={0x20, 0x0, 0xa, 0x3, 0x0, 0x0, {0x1}, [@NFTA_TABLE_NAME={0x9, 0x1, 'syz0\x00'}]}, @NFT_MSG_NEWSET={0x3c, 0x9, 0xa, 0x401, 0x0, 0x0, {0x1}, [@NFTA_SET_ID={0x8}, @NFTA_SET_NAME={0x9, 0x2, 'syz2\x00'}, @NFTA_SET_TABLE={0x9, 0x1, 'syz0\x00'}, @NFTA_SET_KEY_LEN={0x8, 0x5, 0x1, 0x0, 0x1f}]}, @NFT_MSG_NEWSETELEM={0x48, 0xc, 0xa, 0x201, 0x0, 0x0, {0x1}, [@NFTA_SET_ELEM_LIST_SET={0x9, 0x2, 'syz2\x00'}, @NFTA_SET_ELEM_LIST_ELEMENTS={0x1c, 0x3, 0x0, 0x1, [{0x18, 0x0, 0x0, 0x1, [@NFTA_SET_ELEM_FLAGS={0x8, 0x3, 0x1, 0x0, 0x4}, @NFTA_SET_ELEM_TIMEOUT={0x4, 0x6}]}]}, @NFTA_SET_ELEM_LIST_TABLE={0x9, 0x1, 'syz0\x00'}]}], {0x14, 0x10}}, 0xcc}}, 0x0) 10:12:43 executing program 3: sendmsg$NL802154_CMD_GET_WPAN_PHY(0xffffffffffffffff, 0x0, 0x0) 10:12:43 executing program 2: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000e40)={0x11, 0x2, &(0x7f0000000d00)=@raw=[@alu={0x4}, @call], &(0x7f0000000d40)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 10:12:43 executing program 0: r0 = socket(0x2, 0x3, 0x2) ioctl$sock_inet6_udp_SIOCINQ(r0, 0x8912, &(0x7f0000000140)) 10:12:43 executing program 2: openat$tun(0xffffffffffffff9c, 0x0, 0x420042, 0x0) 10:12:43 executing program 3: bpf$MAP_CREATE(0x0, &(0x7f0000000380)=@bloom_filter, 0x48) 10:12:43 executing program 0: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000800)={0x3, 0x4, &(0x7f0000000140)=@framed={{}, [@jmp={0x5, 0x0, 0x8, 0x0, 0x0, 0x0, 0x6}]}, &(0x7f00000001c0)='GPL\x00', 0x7, 0xe4, &(0x7f0000000400)=""/228, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) [ 2062.794874][T24655] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.1'. 10:12:50 executing program 5: bpf$MAP_CREATE(0x0, &(0x7f0000000880)=@bloom_filter={0x1e, 0x0, 0x40, 0x7fff}, 0x48) 10:12:50 executing program 4: unshare(0x6c060000) openat$ptmx(0xffffffffffffff9c, &(0x7f0000000280), 0x0, 0x0) ioctl$TIOCSETD(0xffffffffffffffff, 0x5423, &(0x7f0000000080)=0x3) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$EVIOCGPROP(r0, 0x40047438, &(0x7f0000000180)=""/246) close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x2) ioctl$PPPIOCGFLAGS1(r0, 0x10, 0x0) 10:12:50 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) setsockopt$netlink_NETLINK_DROP_MEMBERSHIP(r0, 0x10e, 0x3, 0x0, 0x0) 10:12:50 executing program 3: r0 = socket$phonet_pipe(0x23, 0x5, 0x2) setsockopt$PNPIPE_INITSTATE(r0, 0x113, 0x4, &(0x7f0000000200), 0x4) 10:12:50 executing program 0: syz_emit_ethernet(0x118f, &(0x7f0000000000)=ANY=[@ANYBLOB="aaaaaaaaaaaa00000000000086dd651209dd11592f"], 0x0) 10:12:50 executing program 1: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000005c0)={{0x14}, [@NFT_MSG_NEWTABLE={0x20, 0x0, 0xa, 0x3, 0x0, 0x0, {0x1}, [@NFTA_TABLE_NAME={0x9, 0x1, 'syz0\x00'}]}, @NFT_MSG_NEWSET={0x3c, 0x9, 0xa, 0x401, 0x0, 0x0, {0x1}, [@NFTA_SET_ID={0x8}, @NFTA_SET_NAME={0x9, 0x2, 'syz2\x00'}, @NFTA_SET_TABLE={0x9, 0x1, 'syz0\x00'}, @NFTA_SET_KEY_LEN={0x8, 0x5, 0x1, 0x0, 0x1f}]}, @NFT_MSG_NEWSETELEM={0x48, 0xc, 0xa, 0x201, 0x0, 0x0, {0x1}, [@NFTA_SET_ELEM_LIST_SET={0x9, 0x2, 'syz2\x00'}, @NFTA_SET_ELEM_LIST_ELEMENTS={0x1c, 0x3, 0x0, 0x1, [{0x18, 0x0, 0x0, 0x1, [@NFTA_SET_ELEM_FLAGS={0x8, 0x3, 0x1, 0x0, 0x4}, @NFTA_SET_ELEM_TIMEOUT={0x4, 0x6}]}]}, @NFTA_SET_ELEM_LIST_TABLE={0x9, 0x1, 'syz0\x00'}]}], {0x14, 0x10}}, 0xcc}}, 0x0) 10:12:50 executing program 2: openat$tun(0xffffffffffffff9c, &(0x7f0000000180), 0x34000, 0x0) 10:12:50 executing program 0: syz_emit_ethernet(0x118f, &(0x7f0000000000)=ANY=[@ANYBLOB="aaaaaaaaaaaa00000000000086dd651209dd11"], 0x0) 10:12:50 executing program 3: open$dir(&(0x7f0000000000)='./file0\x00', 0x40c1, 0x0) r0 = open$dir(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) utimensat(r0, 0x0, &(0x7f0000000140)={{0x77359400}}, 0x0) 10:12:50 executing program 3: openat$sysfs(0xffffffffffffff9c, &(0x7f0000000040)='/sys/fs/cgroup', 0x200000, 0x1) 10:12:50 executing program 0: pselect6(0x0, 0x0, &(0x7f0000000040), &(0x7f0000000080), &(0x7f00000000c0)={0x0, 0x989680}, &(0x7f0000000140)={0x0}) 10:12:50 executing program 2: socket$inet6_udp(0xa, 0x2, 0x0) io_setup(0x2, &(0x7f0000000200)=0x0) io_submit(r0, 0x0, 0x0) [ 2069.902371][ T24] audit: type=1400 audit(1649758370.316:450): avc: denied { setopt } for pid=24672 comm="syz-executor.3" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=phonet_socket permissive=1 [ 2069.926409][T24678] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.1'. 10:12:57 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$BTRFS_IOC_TREE_SEARCH(r0, 0xd0009411, 0x0) 10:12:57 executing program 3: r0 = openat$sysfs(0xffffffffffffff9c, &(0x7f00000000c0)='/sys/devices/system', 0x0, 0x0) setsockopt$inet6_MRT6_ADD_MIF(r0, 0x29, 0xca, 0x0, 0x0) 10:12:57 executing program 0: openat$sysfs(0xffffffffffffff9c, &(0x7f00000002c0)='/sys/class/dmi', 0x100, 0x10b) 10:12:57 executing program 4: unshare(0x6c060000) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000280), 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) r1 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$EVIOCGPROP(r1, 0x40047438, &(0x7f0000000180)=""/246) close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x2) ioctl$PPPIOCGFLAGS1(r1, 0x10, 0x0) 10:12:57 executing program 1: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000005c0)={{0x14}, [@NFT_MSG_NEWTABLE={0x20, 0x0, 0xa, 0x3, 0x0, 0x0, {0x1}, [@NFTA_TABLE_NAME={0x9, 0x1, 'syz0\x00'}]}, @NFT_MSG_NEWSET={0x3c, 0x9, 0xa, 0x401, 0x0, 0x0, {0x1}, [@NFTA_SET_ID={0x8}, @NFTA_SET_NAME={0x9, 0x2, 'syz2\x00'}, @NFTA_SET_TABLE={0x9, 0x1, 'syz0\x00'}, @NFTA_SET_KEY_LEN={0x8, 0x5, 0x1, 0x0, 0x1f}]}, @NFT_MSG_NEWSETELEM={0x48, 0xc, 0xa, 0x201, 0x0, 0x0, {0x1}, [@NFTA_SET_ELEM_LIST_SET={0x9, 0x2, 'syz2\x00'}, @NFTA_SET_ELEM_LIST_ELEMENTS={0x1c, 0x3, 0x0, 0x1, [{0x18, 0x0, 0x0, 0x1, [@NFTA_SET_ELEM_FLAGS={0x8, 0x3, 0x1, 0x0, 0x4}, @NFTA_SET_ELEM_TIMEOUT={0x4, 0x6}]}]}, @NFTA_SET_ELEM_LIST_TABLE={0x9, 0x1, 'syz0\x00'}]}], {0x14, 0x10}}, 0xcc}}, 0x0) 10:12:57 executing program 2: r0 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000140)='/sys/devices/virtual', 0x0, 0x0) ioctl$sock_inet6_tcp_SIOCOUTQ(r0, 0x5411, 0x0) 10:12:57 executing program 3: setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(0xffffffffffffffff, 0x6, 0x16, 0x0, 0x0) 10:12:57 executing program 2: r0 = openat$sysfs(0xffffffffffffff9c, &(0x7f00000000c0)='/sys/devices/system', 0x0, 0x0) getpeername$packet(r0, 0x0, 0x0) 10:12:57 executing program 2: open$dir(&(0x7f0000000080)='./file0\x00', 0x2641, 0x134) 10:12:57 executing program 0: syz_emit_ethernet(0x29, 0x0, 0x0) 10:12:57 executing program 3: openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) bpf$BPF_PROG_GET_FD_BY_ID(0xd, 0x0, 0x0) openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) bpf$BPF_PROG_DETACH(0x9, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000001580)='cgroup.controllers\x00', 0x0, 0x0) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) 10:12:57 executing program 0: bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000040)={@cgroup, 0xffffffffffffffff, 0x1a}, 0x10) [ 2077.026034][T24704] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.1'. 10:13:04 executing program 5: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x0, 0x3, &(0x7f00000000c0)=@framed, &(0x7f0000000100)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 10:13:04 executing program 2: openat$cgroup_devices(0xffffffffffffffff, &(0x7f0000000100)='devices.deny\x00', 0x2, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000380)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) bpf$ITER_CREATE(0x21, 0x0, 0x0) 10:13:04 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa02, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) gettid() r0 = socket$kcm(0x10, 0x2, 0x0) recvmsg$kcm(r0, &(0x7f0000000d00)={0x0, 0x300, &(0x7f0000000bc0)=[{&(0x7f0000002300)=""/4096, 0x1000}, {&(0x7f0000003300)=""/4096, 0xe00}], 0x2}, 0x0) sendmsg$kcm(r0, &(0x7f0000000340)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000001600)="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", 0xcfa}], 0x1}, 0x0) 10:13:04 executing program 3: bpf$OBJ_PIN_PROG(0x16, 0x0, 0x0) 10:13:04 executing program 1: sendmsg$NFT_BATCH(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000005c0)={{0x14}, [@NFT_MSG_NEWTABLE={0x20, 0x0, 0xa, 0x3, 0x0, 0x0, {0x1}, [@NFTA_TABLE_NAME={0x9, 0x1, 'syz0\x00'}]}, @NFT_MSG_NEWSET={0x3c, 0x9, 0xa, 0x401, 0x0, 0x0, {0x1}, [@NFTA_SET_ID={0x8}, @NFTA_SET_NAME={0x9, 0x2, 'syz2\x00'}, @NFTA_SET_TABLE={0x9, 0x1, 'syz0\x00'}, @NFTA_SET_KEY_LEN={0x8, 0x5, 0x1, 0x0, 0x1f}]}, @NFT_MSG_NEWSETELEM={0x48, 0xc, 0xa, 0x201, 0x0, 0x0, {0x1}, [@NFTA_SET_ELEM_LIST_SET={0x9, 0x2, 'syz2\x00'}, @NFTA_SET_ELEM_LIST_ELEMENTS={0x1c, 0x3, 0x0, 0x1, [{0x18, 0x0, 0x0, 0x1, [@NFTA_SET_ELEM_FLAGS={0x8, 0x3, 0x1, 0x0, 0x4}, @NFTA_SET_ELEM_TIMEOUT={0x4, 0x6}]}]}, @NFTA_SET_ELEM_LIST_TABLE={0x9, 0x1, 'syz0\x00'}]}], {0x14, 0x10}}, 0xcc}}, 0x0) 10:13:04 executing program 4: unshare(0x6c060000) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000280), 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) r1 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$EVIOCGPROP(r1, 0x40047438, &(0x7f0000000180)=""/246) close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x2) ioctl$PPPIOCGFLAGS1(r1, 0x10, 0x0) 10:13:04 executing program 3: syz_emit_ethernet(0x46, &(0x7f0000000040)={@local, @remote, @val, {@ipv4}}, 0x0) 10:13:04 executing program 1: sendmsg$NFT_BATCH(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000005c0)={{0x14}, [@NFT_MSG_NEWTABLE={0x20, 0x0, 0xa, 0x3, 0x0, 0x0, {0x1}, [@NFTA_TABLE_NAME={0x9, 0x1, 'syz0\x00'}]}, @NFT_MSG_NEWSET={0x3c, 0x9, 0xa, 0x401, 0x0, 0x0, {0x1}, [@NFTA_SET_ID={0x8}, @NFTA_SET_NAME={0x9, 0x2, 'syz2\x00'}, @NFTA_SET_TABLE={0x9, 0x1, 'syz0\x00'}, @NFTA_SET_KEY_LEN={0x8, 0x5, 0x1, 0x0, 0x1f}]}, @NFT_MSG_NEWSETELEM={0x48, 0xc, 0xa, 0x201, 0x0, 0x0, {0x1}, [@NFTA_SET_ELEM_LIST_SET={0x9, 0x2, 'syz2\x00'}, @NFTA_SET_ELEM_LIST_ELEMENTS={0x1c, 0x3, 0x0, 0x1, [{0x18, 0x0, 0x0, 0x1, [@NFTA_SET_ELEM_FLAGS={0x8, 0x3, 0x1, 0x0, 0x4}, @NFTA_SET_ELEM_TIMEOUT={0x4, 0x6}]}]}, @NFTA_SET_ELEM_LIST_TABLE={0x9, 0x1, 'syz0\x00'}]}], {0x14, 0x10}}, 0xcc}}, 0x0) 10:13:04 executing program 3: openat(0xffffffffffffff9c, &(0x7f00000001c0)='./file0\x00', 0x200, 0x0) utimes(&(0x7f0000000440)='./file0\x00', 0x0) 10:13:04 executing program 2: syz_emit_ethernet(0x4a, &(0x7f0000000200)={@random="abf3031f1489", @empty, @val, {@ipv6}}, 0x0) 10:13:04 executing program 1: sendmsg$NFT_BATCH(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000005c0)={{0x14}, [@NFT_MSG_NEWTABLE={0x20, 0x0, 0xa, 0x3, 0x0, 0x0, {0x1}, [@NFTA_TABLE_NAME={0x9, 0x1, 'syz0\x00'}]}, @NFT_MSG_NEWSET={0x3c, 0x9, 0xa, 0x401, 0x0, 0x0, {0x1}, [@NFTA_SET_ID={0x8}, @NFTA_SET_NAME={0x9, 0x2, 'syz2\x00'}, @NFTA_SET_TABLE={0x9, 0x1, 'syz0\x00'}, @NFTA_SET_KEY_LEN={0x8, 0x5, 0x1, 0x0, 0x1f}]}, @NFT_MSG_NEWSETELEM={0x48, 0xc, 0xa, 0x201, 0x0, 0x0, {0x1}, [@NFTA_SET_ELEM_LIST_SET={0x9, 0x2, 'syz2\x00'}, @NFTA_SET_ELEM_LIST_ELEMENTS={0x1c, 0x3, 0x0, 0x1, [{0x18, 0x0, 0x0, 0x1, [@NFTA_SET_ELEM_FLAGS={0x8, 0x3, 0x1, 0x0, 0x4}, @NFTA_SET_ELEM_TIMEOUT={0x4, 0x6}]}]}, @NFTA_SET_ELEM_LIST_TABLE={0x9, 0x1, 'syz0\x00'}]}], {0x14, 0x10}}, 0xcc}}, 0x0) 10:13:04 executing program 3: madvise(&(0x7f0000001000/0x2000)=nil, 0x2000, 0x0) syz_emit_ethernet(0x400e, &(0x7f0000000000)={@broadcast, @broadcast, @val, {@ipv6}}, 0x0) [ 2084.287488][T24746] netlink: 3286 bytes leftover after parsing attributes in process `syz-executor.0'. [ 2084.305503][T24733] netlink: 3286 bytes leftover after parsing attributes in process `syz-executor.0'. 10:13:11 executing program 5: utimensat(0xffffffffffffffff, 0x0, &(0x7f0000000040)={{0x0, 0xffffffffffffffff}}, 0x0) 10:13:11 executing program 2: pipe2(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) fcntl$lock(r0, 0xa4dfd5374cee5c90, 0x0) 10:13:11 executing program 1: socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000005c0)={{0x14}, [@NFT_MSG_NEWTABLE={0x20, 0x0, 0xa, 0x3, 0x0, 0x0, {0x1}, [@NFTA_TABLE_NAME={0x9, 0x1, 'syz0\x00'}]}, @NFT_MSG_NEWSET={0x3c, 0x9, 0xa, 0x401, 0x0, 0x0, {0x1}, [@NFTA_SET_ID={0x8}, @NFTA_SET_NAME={0x9, 0x2, 'syz2\x00'}, @NFTA_SET_TABLE={0x9, 0x1, 'syz0\x00'}, @NFTA_SET_KEY_LEN={0x8, 0x5, 0x1, 0x0, 0x1f}]}, @NFT_MSG_NEWSETELEM={0x48, 0xc, 0xa, 0x201, 0x0, 0x0, {0x1}, [@NFTA_SET_ELEM_LIST_SET={0x9, 0x2, 'syz2\x00'}, @NFTA_SET_ELEM_LIST_ELEMENTS={0x1c, 0x3, 0x0, 0x1, [{0x18, 0x0, 0x0, 0x1, [@NFTA_SET_ELEM_FLAGS={0x8, 0x3, 0x1, 0x0, 0x4}, @NFTA_SET_ELEM_TIMEOUT={0x4, 0x6}]}]}, @NFTA_SET_ELEM_LIST_TABLE={0x9, 0x1, 'syz0\x00'}]}], {0x14, 0x10}}, 0xcc}}, 0x0) 10:13:11 executing program 3: mkdirat(0xffffffffffffff9c, &(0x7f0000000180)='./file1\x00', 0x0) open$dir(&(0x7f0000000040)='./file1/../file0\x00', 0x0, 0x0) 10:13:11 executing program 4: unshare(0x6c060000) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000280), 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) r1 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$EVIOCGPROP(r1, 0x40047438, &(0x7f0000000180)=""/246) close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x2) ioctl$PPPIOCGFLAGS1(r1, 0x10, 0x0) 10:13:11 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa02, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) gettid() r0 = socket$kcm(0x10, 0x2, 0x0) recvmsg$kcm(r0, &(0x7f0000000d00)={0x0, 0x300, &(0x7f0000000bc0)=[{&(0x7f0000002300)=""/4096, 0x1000}, {&(0x7f0000003300)=""/4096, 0xe00}], 0x2}, 0x0) sendmsg$kcm(r0, &(0x7f0000000340)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000001600)="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", 0xcfa}], 0x1}, 0x0) 10:13:11 executing program 1: socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000005c0)={{0x14}, [@NFT_MSG_NEWTABLE={0x20, 0x0, 0xa, 0x3, 0x0, 0x0, {0x1}, [@NFTA_TABLE_NAME={0x9, 0x1, 'syz0\x00'}]}, @NFT_MSG_NEWSET={0x3c, 0x9, 0xa, 0x401, 0x0, 0x0, {0x1}, [@NFTA_SET_ID={0x8}, @NFTA_SET_NAME={0x9, 0x2, 'syz2\x00'}, @NFTA_SET_TABLE={0x9, 0x1, 'syz0\x00'}, @NFTA_SET_KEY_LEN={0x8, 0x5, 0x1, 0x0, 0x1f}]}, @NFT_MSG_NEWSETELEM={0x48, 0xc, 0xa, 0x201, 0x0, 0x0, {0x1}, [@NFTA_SET_ELEM_LIST_SET={0x9, 0x2, 'syz2\x00'}, @NFTA_SET_ELEM_LIST_ELEMENTS={0x1c, 0x3, 0x0, 0x1, [{0x18, 0x0, 0x0, 0x1, [@NFTA_SET_ELEM_FLAGS={0x8, 0x3, 0x1, 0x0, 0x4}, @NFTA_SET_ELEM_TIMEOUT={0x4, 0x6}]}]}, @NFTA_SET_ELEM_LIST_TABLE={0x9, 0x1, 'syz0\x00'}]}], {0x14, 0x10}}, 0xcc}}, 0x0) 10:13:11 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) sendto$unix(r0, 0x0, 0xfffffebe, 0x0, 0x0, 0x0) 10:13:11 executing program 2: syz_emit_ethernet(0x36, &(0x7f0000000000)={@broadcast, @broadcast, @val, {@ipv6}}, 0x0) 10:13:11 executing program 1: socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000005c0)={{0x14}, [@NFT_MSG_NEWTABLE={0x20, 0x0, 0xa, 0x3, 0x0, 0x0, {0x1}, [@NFTA_TABLE_NAME={0x9, 0x1, 'syz0\x00'}]}, @NFT_MSG_NEWSET={0x3c, 0x9, 0xa, 0x401, 0x0, 0x0, {0x1}, [@NFTA_SET_ID={0x8}, @NFTA_SET_NAME={0x9, 0x2, 'syz2\x00'}, @NFTA_SET_TABLE={0x9, 0x1, 'syz0\x00'}, @NFTA_SET_KEY_LEN={0x8, 0x5, 0x1, 0x0, 0x1f}]}, @NFT_MSG_NEWSETELEM={0x48, 0xc, 0xa, 0x201, 0x0, 0x0, {0x1}, [@NFTA_SET_ELEM_LIST_SET={0x9, 0x2, 'syz2\x00'}, @NFTA_SET_ELEM_LIST_ELEMENTS={0x1c, 0x3, 0x0, 0x1, [{0x18, 0x0, 0x0, 0x1, [@NFTA_SET_ELEM_FLAGS={0x8, 0x3, 0x1, 0x0, 0x4}, @NFTA_SET_ELEM_TIMEOUT={0x4, 0x6}]}]}, @NFTA_SET_ELEM_LIST_TABLE={0x9, 0x1, 'syz0\x00'}]}], {0x14, 0x10}}, 0xcc}}, 0x0) 10:13:11 executing program 3: syz_emit_ethernet(0x37b, &(0x7f00000004c0)=ANY=[@ANYBLOB="ffffffffffffffffffffffff86dd65acff0303453304fe8000000000000000000000000000bbff020000000000000000000000000001"], 0x0) 10:13:11 executing program 2: r0 = open$dir(&(0x7f0000000000)='./file0\x00', 0x200, 0x0) preadv(r0, &(0x7f0000000500)=[{0x0}], 0x1, 0x0, 0x0) [ 2091.497717][T24775] netlink: 3286 bytes leftover after parsing attributes in process `syz-executor.0'. [ 2091.512280][T24759] netlink: 3286 bytes leftover after parsing attributes in process `syz-executor.0'. 10:13:18 executing program 5: socketpair(0x29, 0x2, 0x0, 0x0) 10:13:18 executing program 1: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r0, 0x0, 0x0) 10:13:18 executing program 4: unshare(0x6c060000) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000280), 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000080)) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) r1 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$EVIOCGPROP(r1, 0x40047438, &(0x7f0000000180)=""/246) close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x2) ioctl$PPPIOCGFLAGS1(r1, 0x10, 0x0) 10:13:18 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa02, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) gettid() r0 = socket$kcm(0x10, 0x2, 0x0) recvmsg$kcm(r0, &(0x7f0000000d00)={0x0, 0x300, &(0x7f0000000bc0)=[{&(0x7f0000002300)=""/4096, 0x1000}, {&(0x7f0000003300)=""/4096, 0xe00}], 0x2}, 0x0) sendmsg$kcm(r0, &(0x7f0000000340)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000001600)="fa0c000026008152915a655267d7d137ab2ff96e27bf28b285fe3903a44a6017edcaa3a2b4dade3baee72569b51366463fedf5e787c05b0cb5927a3a7edfb4d078e9ae1504d489e058be9fafaa633705b6d4bf1301f2cd9ebf19254a1b0b9760612582bccd3983ce4474844c065e914dab8bbd52a45f431678bfe28633bf7c8dc83df809238ed87f1e393883ef750ce79c6f84e5e5de176e2f26024e4e3a3d8fbdaf3254022f265d8ccc5fd7205d9d9c2c4076c58162523082d81a39c43f782332ba8e82b4107a049cb82bba8b5edd80473844291437b8d22edca68047582e6be601e9df5e60a32c7cd202c5a30b8b606e43362739551cbb013b65e238f41cc00d7900140cf06b7bc9030f2563bcf9d4f4b7f48c79ec1a323d06276a0a3f8846b7c62b66f9709cabcaad234c53f3bc9b11165a6321f1db1057f076cfaebf8fbfa033fdc1dc2c3e314b36b3b3dd50425447da8bc5938ff7a17361100ab0b1ffeab7ac487411824224781eb9cdd4edef57ae91cd61f56a56c0599cfc3a491447207610f242da6cd6b030ae5f35e3181c44ae68665a023759b9ef4358db46107edc49194aed72b62600ec0ae4fc9065be059fc010cd6e6c9ea77c666b5e25693fbcf595e3e57113ff3a0e0c63d0604a16ea5adb8b7b54d47d4d8804612fde571863064528a49bf684d8a880a11afd819f186c177c49cac3ba1e9d1aa7ad0ff36b9e36d73c05b8abcaf96df0aacd2c9653f30ec29e1284af8749a9b2803c2727e992a6e65df192e1875c3e6d3553ffb7cb34ffee8f8ac0123c390454b42a0316952cbc9949376d9320ec207f77c2d5eb9e86d720cf8e9008a9a51932b45cd4cab21414c92d1c20f9e15e3fc16c7ce181e9ab19b01b70343934c823b1215e173405dd225233823cd4a604a77f06b14eb05b860e6cf8790335788c43abe9de1598e9952e5c7e6b2f8b17b1788ff3033e7d1635b008834bdf4054e6195e55000827c6202b227dde06f23ae21c00b371bdb6b7ea47b2e78844b52a77f9f0929790dcd7df2752e4af092d539c87c18751a5eb3eb4d38a2a0e070064b4ffaacff0543b115cc89f6c7e78f12147ebfcf1c80bac8f98deb59cbe670adb4cd1882a7e0ca4ba85ae9d445223ffb32301d46c0c9b05a830cbea0f72294ab3b539e4ed7cac2e22b235e8ceedeb643fb90b061a58368e76036ff3c1828d8a4e21288662afb6f2acab00d734db7ffc8373a928571819ce9ea6cb0956a6093b2b1f65662b76bc6ac8a19008cf08a6342d64674271451714e1d0e4ff7647fe7551d3cf16f37cb5547317e4fef51e4fb471de6ffbb90c2dd4a64266c4c2f75fc62e58ec306fb92212fb262d8b138899a3b53e67cde2f97d94cd2265cc04d32b29edf77e75b1f88372495cb2937f183bfc8604d72efb3af5c1f41b665b25592676b0ad2185478eade7e663e743e0e09cce6224c787ce1d789dc4a9b350bfe3a75f551341b11dd96cdaea17989dad565b16324a69842dc29a0ed16744ea5935598ac8238e146139189927a14d3b2863044b63b468ae75f48fab68ad235c36daffebfe4b468fc9b13198b1a683dcd3b3b4294ba22caddbacf8792d5783bc12e2538e4609e6bb6e9eeab98a06452c252a657f400260458c29fae8879097698c9aba2b2d889fc78f00d0d8271e09e8542b71018be6ff8cb03cb423e79303047d6ce124a00f64461b899bbddc4fe87ff677533391e16c01fa9cd6420bdc856c4c7f057b249ee9817efd6ab2cd02eb887d2631435ef2d5a1c7e57ac046ef615a1285ca89ade18ae69af3b3f8f76ca8aa060e373c0f99424fe1c5fadc72fe145fd2d4e4da4b78597890516857de188fcdaf15e3b0871b346cd39ab772cc25fab49e60c818cde934b137144adfc4fbde3ddbeccce9679f02b66746e822c67b3ed5fdafb4a936a2683b39a002115ecd62220605ca542610a80f2e3530aa89d3ed6ed9c57bbfd5db3a0b62786a608309a355443c616032008f9458b2f10db93e29470192370084e9322c309c9b23333b46d04e79176659503ad4b05deebb3c67d715ee6e84a89002ea6f7f71bf41ad36b42c8ae01c97174dbb641e50641aba60c291a84e906c013087370a5043e07d36fcead378f6c1e6ed3f5ac695124b82b20261cf7c9b82172e09c81d7d39eed72aee5678613a3c671ddd44f2c7c75a3b5d316aa165d56594fccab20903d7f503a08928e76c779918b2463b720ee6367a43e494a1db3ed1a80690e665570c01ce7eb979cdd95d4e1ca51730eb2cd63ffb2a56049601627c9788254945142dce85adbe1eb5997d16cdfe2a3758b13dc6bb121e2206ae64206868c1c5e89a101bc121719ac435dcad093f5f67cefd863cc7c8f3fc8a9dc62a83c115f1ce714b18af067951aa06dd9bb4ed98a820bf4704d156977caa4e6415b2a0df0386e2f6a061bf44abc8a397cf4abdafc51b78ebec9831f3c60fde6e62a1fd082903080aef20ff8de8bc0dced06f627514600539ca7114a088848da4244a85b4cf5b976d3a698c9a568d417e276917baba05d1a02181db2e6cc35986da4ccc63f8cd8e85a4a923dd27e2f499664601fdc44fdf46e2d2880cd5a7ece89c370234c438dcc0b43865cc62bad21e9dc37da758cbe01752f02fd9cbfe98630a30a78bb1239e25cdaba3d45d13cd3e7216d9d8070f3ff1a0cd9a0c91f29974c98f2677ba88c1091bde4be0cd37ea5eeb3b9cbb0360a00ddd40bbd60ffb8d4daa973ef0977c18dd4b38a605cee957872dca85787c37b6931293eddb77015faf143d1d28d24822d1a5d134799e8175a38b255aaf0e39b68c7f734e2e1e7044626daa84c9113e86d86ef63c863703703ea163319261dcf516c32d49478f7af30d52baa18ea6b0fc286c06b7e4ee019bf3fe74845a652d4a52aaa241a189c411e90e2953863a2bc4124e573607b94cdff19e280731824931a83f056cb5857672619b97ce38081592c0c319ce72e04e9eadce89775cfb5a4b2842663bc79bde565435cbcd46c4d505ceef7dde86512d39d4cb270deb7e79ebf8602bdc0d76c3e833d36ee08be10be634f44056c2f3fd6a328c7cd562e9c96ff7845fc3df81a876bb07f1cc833bed6ca1dc5cf935a4e959db6a4fae6edbc45357d8758faa9cd04cd41eb6efcfbd91658519bf520b90107f767d126854818485e98cb7ef56804de6950bf4e72098a949d14ea0e4e9f2534cf16cac0aeb970fc5c39f37e93910d5c99ac163792260d2280ec5c9a79bf295588ec23f524aae65f800f9c39e338f3d66b1a69e5488e04823eab36ae6ec6a2c5ce133ccd819a2b217b1ab7f4afd1697bb42929b3131358b5421c83f925571934442d0fd0ce3990d4e5d31d8b956f76df3c2f8533e46b892c88692ce009155dd5c7dbe4c86874b95762650f63e4b4aabb41320978b05b80cfe8fa2830904ef6b5c4f7ad46ca5dac151c9077c4d2c6adfe5066a8eb09a9bc6892330ea2b259a53c7137f8498254e1b04bf920c35c5333c4d640b11da60917ae921037b4aedbd6a0fbeeaf88ef6defc830552b4cbe3fe2a844806a48923dd428ea1c8d797bd8e6aabd1d1a8c97c8038b627120a77f4e47fa1f788aa9da268b0ec10fc453cb722685df76547dbf55a16663aa2b2a51e9c52456cccdf682592d1369dd12e3d3cb504e0f2d7004e60c297d5a25d0298045dae8fca8cb795ea57288b85a7e705820087d55ca6c42e920e2aa1174e128622cf64a197fd728cb2949536ba63e8bda8589261f1377caea37302e47228d3708a5666c66ba711d3c0b310a8c47e86d26597299d523c28c90e4feab43e950f398f7b61ccf7e6490d75ba6d8214e2d5ef2d7a088db490e1ebacf4e6eecc896cb1c704f0a8fcdf4ccb5dfa53eaf43d709287f36c10188c19fd59da7d73494de089c1b0a69ee22dcb847001c5317846a876bee1685d11c4db0673ec4c3a12008bb719650525b3c39e2b0469edda93830b3f1bde3e5b0b4637197866bb08c5858cf0d9876e3c7cad54169887bf9c80f9f4be362e1bc8c27f3434e9a918bac355c184bd899b9aebe6be20e70c0c69234342eb8b57aa9ffb7797a32df91cec2bbc90201658ca227abf1fe68e65363867e1f6ad79b827f363d64fbd3b188d95307d011c4ce5bf4407908c058eeb97ec98dd0ebfdab6b348fa387f2a7573cac25344c983e8fd526c30ee6d59fe99a30c7d7e2864aa22bfa49df5f32da68309cab3ed9c2ce69b6ecb8508ce28a43ebd6c809b8afd07a4606e664965d316f3707a3abee9bcdc32a78031b0171fb565d90c16cd56e5792c0cf618b799715f32538e38f493d4e19ec76fc8a07576a13975706bfc2bb1516c2d18a4385cc37a206eac6c9fb8d073572ba2671d2198abf24fdd0c40d079ae44962c26743b4bf5950ac5ee34c5d7bd60b364ce670958112c37b9829bed7e1327356d6b94af3ba020c2337b2dba37d00af8a128a614390cdde62ce871f948427fb5c187df9a1540a5cc71da1a86144acbfd94bf433f744f0c4f2a675eba3ed251c5b11b08dfefc726c0394a9b75121d88467ed4b2cd69819dfe50693a4a4c8370d3af12f41c0067283bbb5a90044a340fc357a11081a6c13bb9c32d9caa448479fd5f0302b6729ca7233094540b14546d6bcc15771c2686279b34f9c0914f5306d0fabd5979266ea01a17a22507e560dbf904dd62c40e2bcc", 0xcfa}], 0x1}, 0x0) 10:13:18 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$inet6_tcp_int(r0, 0x6, 0x12, &(0x7f00000001c0), &(0x7f0000000000)=0x4) 10:13:18 executing program 3: syz_emit_ethernet(0x36, &(0x7f0000000080)={@broadcast, @local, @val, {@ipv6}}, 0x0) 10:13:18 executing program 2: r0 = syz_open_dev$evdev(&(0x7f0000000000), 0x0, 0x0) ioctl$EVIOCGMASK(r0, 0x80104592, &(0x7f0000002540)={0x0, 0x0, 0x0}) 10:13:18 executing program 1: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r0, 0x0, 0x0) 10:13:18 executing program 3: r0 = socket$netlink(0x10, 0x3, 0x0) bind$netlink(r0, &(0x7f0000000000)={0x10, 0x0, 0x0, 0x400000}, 0xc) bind$netlink(r0, &(0x7f0000000080)={0x10, 0x0, 0x0, 0x2}, 0xc) 10:13:18 executing program 1: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r0, 0x0, 0x0) 10:13:18 executing program 2: syz_emit_ethernet(0x2a, &(0x7f0000000140)={@broadcast, @remote, @void, {@ipv4={0x800, @igmp={{0x5, 0x4, 0x0, 0x0, 0x1c, 0x0, 0x0, 0x0, 0x2, 0x0, @dev, @empty}}}}}, 0x0) 10:13:18 executing program 3: prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f00000002c0)=0x0) sched_setscheduler(r0, 0x2, &(0x7f0000000080)=0x6) r1 = getpid() sched_setscheduler(r1, 0x2, &(0x7f00000000c0)=0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r2, &(0x7f000057eff8)=@abs, 0x6e) sendmmsg$unix(r3, &(0x7f00000bd000), 0x318, 0x0) recvmmsg(r2, &(0x7f00000000c0), 0x10106, 0x2, 0x0) syz_mount_image$ext4(&(0x7f0000000180)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xfffbffff00000000, 0x8, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000600100000f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000006856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010300), 0x0, 0x640}, {&(0x7f0000010400)="03000000040000000500000016000f000300040000000000000000000f00698c", 0x20, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}, {&(0x7f0000011000)}, {0x0, 0x0, 0x6700000}, {&(0x7f0000000580), 0x0, 0xc000}], 0x0, &(0x7f0000013b00)=ANY=[@ANYBLOB='\x00']) r4 = creat(&(0x7f0000000000)='./file1\x00', 0x18) r5 = socket(0x10, 0x3, 0x0) sendmsg$nl_route(r5, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f00000005c0)=@ipv4_newroute={0x38, 0x18, 0xbad, 0x0, 0x0, {}, [@RTA_ENCAP_TYPE={0x6, 0x15, 0x3}, @RTA_ENCAP={0x14, 0x16, 0x0, 0x1, @SEG6_IPTUNNEL_SRH={0xd}}]}, 0x38}}, 0x0) r6 = socket(0x26, 0x3, 0x0) sendmsg$nl_route(r6, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f00000005c0)=@ipv4_newroute={0x38, 0x18, 0xbad, 0x0, 0x0, {0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6}, [@RTA_ENCAP_TYPE={0x6, 0x15, 0x3}, @RTA_ENCAP={0x14, 0x16, 0x0, 0x1, @SEG6_IPTUNNEL_SRH={0xd}}]}, 0x38}}, 0x0) r7 = socket(0x10, 0x3, 0x0) sendmsg$nl_route(r7, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f00000005c0)=@ipv4_newroute={0x38, 0x18, 0xbad, 0x0, 0x0, {0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6}, [@RTA_ENCAP_TYPE={0x6, 0x15, 0x3}, @RTA_ENCAP={0x14, 0x16, 0x0, 0x1, @SEG6_IPTUNNEL_SRH={0xd}}]}, 0x38}}, 0x0) execveat(r4, 0x0, &(0x7f0000000380)=[&(0x7f00000001c0)='+{!#\x00', &(0x7f0000000300)='ext4\x00', &(0x7f0000000340)='@(\x00'], &(0x7f00000004c0)=[&(0x7f00000003c0)='ext4\x00', &(0x7f0000000400)='ext4\x00', &(0x7f0000000500)='\x00.D\x04\xe0\xce\x99\xd9\xa9\xac\xac\xadH\xa4\xcf\xb7\xffT\xac\x05\xfd\xdd\xb8w\x0f\x82B\xff\xf2\x909`1!\f\x870\x1f\xc1%Y\xc8\x15c \xea\x1cY!\x04\xe4\x91^\x00\x04\xe4\xa6\xba\xc6\xfd\x10\xdf\xe24\xd4&\x17\xdc\xec\xf4\f\n\xb7.\x13\x8e\x1bYENj\xe1\x19~\x1c\xaf\a;d\x9f\xba\xd9T\xd4-\xecX\xc0Y\x83@\xc7\x8b\xff*\xdd\xaa\xc6,o4\xe2\x0f\x16\x01[\xc0\xeb\x7fFI]WF\x1f\f?\xfa\xb1\xe7\xf6t\x027\xb1\xc17.4V\xf81{9\xa3\xb9\x01\xcck@I\xe2\xf1Y\x10E\xa1z/\x05.~Yh%\x8f\x06sB)N\x11P\xf6p\xff\'\xaf\a7\x10+p\xbb\xf3\xb08\xb5)\x00\xeeg\xd0\xee\xe9\x98\x8d\xf8\xb5G\t@f\x1et v\x14\tT\xc5', 0x0], 0x1000) recvfrom(r2, &(0x7f0000000600)=""/203, 0xcb, 0x42, &(0x7f0000000700)=@hci={0x1f, 0xffffffffffffffff, 0x4}, 0x80) 10:13:18 executing program 1: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r0, &(0x7f00000000c0)={0x0, 0x0, 0x0}, 0x0) [ 2097.701715][T24806] netlink: 3286 bytes leftover after parsing attributes in process `syz-executor.0'. [ 2097.715278][T24784] netlink: 3286 bytes leftover after parsing attributes in process `syz-executor.0'. [ 2097.788787][T24808] loop3: detected capacity change from 0 to 264192 [ 2097.830767][T24808] EXT4-fs (loop3): mounted filesystem without journal. Quota mode: writeback. 10:13:26 executing program 5: prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f00000002c0)=0x0) sched_setscheduler(r0, 0x2, &(0x7f0000000080)=0x6) r1 = getpid() sched_setscheduler(r1, 0x2, &(0x7f00000000c0)=0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r2, &(0x7f000057eff8)=@abs, 0x6e) sendmmsg$unix(r3, &(0x7f00000bd000), 0x318, 0x0) recvmmsg(r2, &(0x7f00000000c0), 0x10106, 0x2, 0x0) syz_mount_image$ext4(&(0x7f0000000180)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xfffbffff00000000, 0x8, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000600100000f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000006856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010300), 0x0, 0x640}, {&(0x7f0000010400)="03000000040000000500000016000f000300040000000000000000000f00698c", 0x20, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}, {&(0x7f0000011000)}, {0x0, 0x0, 0x6700000}, {&(0x7f0000000580), 0x0, 0xc000}], 0x0, &(0x7f0000013b00)=ANY=[@ANYBLOB='\x00']) r4 = creat(&(0x7f0000000000)='./file1\x00', 0x18) r5 = socket(0x10, 0x3, 0x0) sendmsg$nl_route(r5, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f00000005c0)=@ipv4_newroute={0x38, 0x18, 0xbad, 0x0, 0x0, {}, [@RTA_ENCAP_TYPE={0x6, 0x15, 0x3}, @RTA_ENCAP={0x14, 0x16, 0x0, 0x1, @SEG6_IPTUNNEL_SRH={0xd}}]}, 0x38}}, 0x0) r6 = socket(0x26, 0x3, 0x0) sendmsg$nl_route(r6, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f00000005c0)=@ipv4_newroute={0x38, 0x18, 0xbad, 0x0, 0x0, {0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6}, [@RTA_ENCAP_TYPE={0x6, 0x15, 0x3}, @RTA_ENCAP={0x14, 0x16, 0x0, 0x1, @SEG6_IPTUNNEL_SRH={0xd}}]}, 0x38}}, 0x0) r7 = socket(0x10, 0x3, 0x0) sendmsg$nl_route(r7, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f00000005c0)=@ipv4_newroute={0x38, 0x18, 0xbad, 0x0, 0x0, {0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6}, [@RTA_ENCAP_TYPE={0x6, 0x15, 0x3}, @RTA_ENCAP={0x14, 0x16, 0x0, 0x1, @SEG6_IPTUNNEL_SRH={0xd}}]}, 0x38}}, 0x0) execveat(r4, 0x0, &(0x7f0000000380)=[&(0x7f00000001c0)='+{!#\x00', &(0x7f0000000340)='@(\x00'], &(0x7f00000004c0)=[&(0x7f00000003c0)='ext4\x00', &(0x7f0000000400)='ext4\x00', &(0x7f0000000500)='\x00.D\x04\xe0\xce\x99\xd9\xa9\xac\xac\xadH\xa4\xcf\xb7\xffT\xac\x05\xfd\xdd\xb8w\x0f\x82B\xff\xf2\x909`1!\f\x870\x1f\xc1%Y\xc8\x15c \xea\x1cY!\x04\xe4\x91^\x00\x04\xe4\xa6\xba\xc6\xfd\x10\xdf\xe24\xd4&\x17\xdc\xec\xf4\f\n\xb7.\x13\x8e\x1bYENj\xe1\x19~\x1c\xaf\a;d\x9f\xba\xd9T\xd4-\xecX\xc0Y\x83@\xc7\x8b\xff*\xdd\xaa\xc6,o4\xe2\x0f\x16\x01[\xc0\xeb\x7fFI]WF\x1f\f?\xfa\xb1\xe7\xf6t\x027\xb1\xc17.4V\xf81{9\xa3\xb9\x01\xcck@I\xe2\xf1Y\x10E\xa1z/\x05.~Yh%\x8f\x06sB)N\x11P\xf6p\xff\'\xaf\a7\x10+p\xbb\xf3\xb08\xb5)\x00\xeeg\xd0\xee\xe9\x98\x8d\xf8\xb5G\t@f\x1et v\x14\tT\xc5', &(0x7f0000000480)=':--[\x00'], 0x1000) recvfrom(r2, &(0x7f0000000600)=""/203, 0xcb, 0x42, &(0x7f0000000700)=@hci={0x1f, 0xffffffffffffffff, 0x4}, 0x80) 10:13:26 executing program 2: prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f00000002c0)=0x0) sched_setscheduler(r0, 0x2, &(0x7f0000000080)=0x6) r1 = getpid() sched_setscheduler(r1, 0x2, &(0x7f00000000c0)=0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r2, &(0x7f000057eff8)=@abs, 0x6e) sendmmsg$unix(r3, &(0x7f00000bd000), 0x318, 0x0) recvmmsg(r2, &(0x7f00000000c0), 0x10106, 0x2, 0x0) syz_mount_image$ext4(&(0x7f0000000180)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xfffbffff00000000, 0x8, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000600100000f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000006856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010300), 0x0, 0x640}, {&(0x7f0000010400)="03000000040000000500000016000f000300040000000000000000000f00698c", 0x20, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}, {&(0x7f0000011000)}, {0x0, 0x0, 0x6700000}, {&(0x7f0000000580), 0x0, 0xc000}], 0x0, &(0x7f0000013b00)=ANY=[@ANYBLOB='\x00']) r4 = creat(&(0x7f0000000000)='./file1\x00', 0x18) r5 = socket(0x10, 0x3, 0x0) sendmsg$nl_route(r5, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f00000005c0)=@ipv4_newroute={0x38, 0x18, 0xbad, 0x0, 0x0, {}, [@RTA_ENCAP_TYPE={0x6, 0x15, 0x3}, @RTA_ENCAP={0x14, 0x16, 0x0, 0x1, @SEG6_IPTUNNEL_SRH={0xd}}]}, 0x38}}, 0x0) r6 = socket(0x26, 0x3, 0x0) sendmsg$nl_route(r6, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f00000005c0)=@ipv4_newroute={0x38, 0x18, 0xbad, 0x0, 0x0, {0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6}, [@RTA_ENCAP_TYPE={0x6, 0x15, 0x3}, @RTA_ENCAP={0x14, 0x16, 0x0, 0x1, @SEG6_IPTUNNEL_SRH={0xd}}]}, 0x38}}, 0x0) r7 = socket(0x10, 0x3, 0x0) sendmsg$nl_route(r7, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f00000005c0)=@ipv4_newroute={0x38, 0x18, 0xbad, 0x0, 0x0, {0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6}, [@RTA_ENCAP_TYPE={0x6, 0x15, 0x3}, @RTA_ENCAP={0x14, 0x16, 0x0, 0x1, @SEG6_IPTUNNEL_SRH={0xd}}]}, 0x38}}, 0x0) execveat(r4, 0x0, &(0x7f0000000380)=[&(0x7f00000001c0)='+{!#\x00', &(0x7f0000000300)='ext4\x00', &(0x7f0000000340)='@(\x00'], &(0x7f00000004c0)=[&(0x7f00000003c0)='ext4\x00', &(0x7f0000000400)='ext4\x00', &(0x7f0000000500)='\x00.D\x04\xe0\xce\x99\xd9\xa9\xac\xac\xadH\xa4\xcf\xb7\xffT\xac\x05\xfd\xdd\xb8w\x0f\x82B\xff\xf2\x909`1!\f\x870\x1f\xc1%Y\xc8\x15c \xea\x1cY!\x04\xe4\x91^\x00\x04\xe4\xa6\xba\xc6\xfd\x10\xdf\xe24\xd4&\x17\xdc\xec\xf4\f\n\xb7.\x13\x8e\x1bYENj\xe1\x19~\x1c\xaf\a;d\x9f\xba\xd9T\xd4-\xecX\xc0Y\x83@\xc7\x8b\xff*\xdd\xaa\xc6,o4\xe2\x0f\x16\x01[\xc0\xeb\x7fFI]WF\x1f\f?\xfa\xb1\xe7\xf6t\x027\xb1\xc17.4V\xf81{9\xa3\xb9\x01\xcck@I\xe2\xf1Y\x10E\xa1z/\x05.~Yh%\x8f\x06sB)N\x11P\xf6p\xff\'\xaf\a7\x10+p\xbb\xf3\xb08\xb5)\x00\xeeg\xd0\xee\xe9\x98\x8d\xf8\xb5G\t@f\x1et v\x14\tT\xc5'], 0x1000) recvfrom(r2, &(0x7f0000000600)=""/203, 0xcb, 0x42, &(0x7f0000000700)=@hci={0x1f, 0xffffffffffffffff, 0x4}, 0x80) 10:13:26 executing program 1: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r0, &(0x7f00000000c0)={0x0, 0x0, 0x0}, 0x0) 10:13:26 executing program 0: prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f00000002c0)=0x0) sched_setscheduler(r0, 0x2, &(0x7f0000000080)=0x6) r1 = getpid() sched_setscheduler(r1, 0x2, &(0x7f00000000c0)=0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r2, &(0x7f000057eff8)=@abs, 0x6e) sendmmsg$unix(r3, &(0x7f00000bd000), 0x318, 0x0) recvmmsg(r2, &(0x7f00000000c0), 0x10106, 0x2, 0x0) syz_mount_image$ext4(&(0x7f0000000180)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xfffbffff00000000, 0x8, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000600100000f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000006856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010300), 0x0, 0x640}, {&(0x7f0000010400)="03000000040000000500000016000f000300040000000000000000000f00698c", 0x20, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}, {&(0x7f0000011000)}, {0x0, 0x0, 0x6700000}, {&(0x7f0000000580), 0x0, 0xc000}], 0x0, &(0x7f0000013b00)=ANY=[@ANYBLOB='\x00']) r4 = creat(&(0x7f0000000000)='./file1\x00', 0x18) r5 = socket(0x10, 0x3, 0x0) sendmsg$nl_route(r5, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f00000005c0)=@ipv4_newroute={0x38, 0x18, 0xbad, 0x0, 0x0, {}, [@RTA_ENCAP_TYPE={0x6, 0x15, 0x3}, @RTA_ENCAP={0x14, 0x16, 0x0, 0x1, @SEG6_IPTUNNEL_SRH={0xd}}]}, 0x38}}, 0x0) r6 = socket(0x26, 0x3, 0x0) sendmsg$nl_route(r6, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f00000005c0)=@ipv4_newroute={0x38, 0x18, 0xbad, 0x0, 0x0, {0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6}, [@RTA_ENCAP_TYPE={0x6, 0x15, 0x3}, @RTA_ENCAP={0x14, 0x16, 0x0, 0x1, @SEG6_IPTUNNEL_SRH={0xd}}]}, 0x38}}, 0x0) r7 = socket(0x10, 0x3, 0x0) sendmsg$nl_route(r7, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f00000005c0)=@ipv4_newroute={0x38, 0x18, 0xbad, 0x0, 0x0, {0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6}, [@RTA_ENCAP_TYPE={0x6, 0x15, 0x3}, @RTA_ENCAP={0x14, 0x16, 0x0, 0x1, @SEG6_IPTUNNEL_SRH={0xd}}]}, 0x38}}, 0x0) execveat(r4, 0x0, &(0x7f0000000380)=[&(0x7f00000001c0)='+{!#\x00', &(0x7f0000000300)='ext4\x00', &(0x7f0000000340)='@(\x00'], 0x0, 0x1000) recvfrom(r2, &(0x7f0000000600)=""/203, 0xcb, 0x42, &(0x7f0000000700)=@hci={0x1f, 0xffffffffffffffff, 0x4}, 0x80) 10:13:26 executing program 4: unshare(0x6c060000) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000280), 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000080)) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) r1 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$EVIOCGPROP(r1, 0x40047438, &(0x7f0000000180)=""/246) close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x2) ioctl$PPPIOCGFLAGS1(r1, 0x10, 0x0) 10:13:26 executing program 3: prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f00000002c0)=0x0) sched_setscheduler(r0, 0x2, &(0x7f0000000080)=0x6) r1 = getpid() sched_setscheduler(r1, 0x2, &(0x7f00000000c0)=0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r2, &(0x7f000057eff8)=@abs, 0x6e) sendmmsg$unix(r3, &(0x7f00000bd000), 0x318, 0x0) recvmmsg(r2, &(0x7f00000000c0), 0x10106, 0x2, 0x0) syz_mount_image$ext4(&(0x7f0000000180)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xfffbffff00000000, 0x8, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000600100000f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000006856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010300), 0x0, 0x640}, {&(0x7f0000010400)="03000000040000000500000016000f000300040000000000000000000f00698c", 0x20, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}, {&(0x7f0000011000)}, {0x0, 0x0, 0x6700000}, {&(0x7f0000000580), 0x0, 0xc000}], 0x0, &(0x7f0000013b00)=ANY=[@ANYBLOB='\x00']) r4 = creat(&(0x7f0000000000)='./file1\x00', 0x18) r5 = socket(0x10, 0x3, 0x0) sendmsg$nl_route(r5, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f00000005c0)=@ipv4_newroute={0x38, 0x18, 0xbad, 0x0, 0x0, {}, [@RTA_ENCAP_TYPE={0x6, 0x15, 0x3}, @RTA_ENCAP={0x14, 0x16, 0x0, 0x1, @SEG6_IPTUNNEL_SRH={0xd}}]}, 0x38}}, 0x0) r6 = socket(0x26, 0x3, 0x0) sendmsg$nl_route(r6, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f00000005c0)=@ipv4_newroute={0x38, 0x18, 0xbad, 0x0, 0x0, {0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6}, [@RTA_ENCAP_TYPE={0x6, 0x15, 0x3}, @RTA_ENCAP={0x14, 0x16, 0x0, 0x1, @SEG6_IPTUNNEL_SRH={0xd}}]}, 0x38}}, 0x0) r7 = socket(0x10, 0x3, 0x0) sendmsg$nl_route(r7, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f00000005c0)=@ipv4_newroute={0x38, 0x18, 0xbad, 0x0, 0x0, {0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6}, [@RTA_ENCAP_TYPE={0x6, 0x15, 0x3}, @RTA_ENCAP={0x14, 0x16, 0x0, 0x1, @SEG6_IPTUNNEL_SRH={0xd}}]}, 0x38}}, 0x0) execveat(r4, 0x0, &(0x7f0000000380)=[&(0x7f00000001c0)='+{!#\x00', &(0x7f0000000300)='ext4\x00', &(0x7f0000000340)='@(\x00'], &(0x7f00000004c0)=[&(0x7f00000003c0)='ext4\x00', &(0x7f0000000400)='ext4\x00', &(0x7f0000000500)='\x00.D\x04\xe0\xce\x99\xd9\xa9\xac\xac\xadH\xa4\xcf\xb7\xffT\xac\x05\xfd\xdd\xb8w\x0f\x82B\xff\xf2\x909`1!\f\x870\x1f\xc1%Y\xc8\x15c \xea\x1cY!\x04\xe4\x91^\x00\x04\xe4\xa6\xba\xc6\xfd\x10\xdf\xe24\xd4&\x17\xdc\xec\xf4\f\n\xb7.\x13\x8e\x1bYENj\xe1\x19~\x1c\xaf\a;d\x9f\xba\xd9T\xd4-\xecX\xc0Y\x83@\xc7\x8b\xff*\xdd\xaa\xc6,o4\xe2\x0f\x16\x01[\xc0\xeb\x7fFI]WF\x1f\f?\xfa\xb1\xe7\xf6t\x027\xb1\xc17.4V\xf81{9\xa3\xb9\x01\xcck@I\xe2\xf1Y\x10E\xa1z/\x05.~Yh%\x8f\x06sB)N\x11P\xf6p\xff\'\xaf\a7\x10+p\xbb\xf3\xb08\xb5)\x00\xeeg\xd0\xee\xe9\x98\x8d\xf8\xb5G\t@f\x1et v\x14\tT\xc5', 0x0], 0x1000) recvfrom(r2, &(0x7f0000000600)=""/203, 0xcb, 0x42, &(0x7f0000000700)=@hci={0x1f, 0xffffffffffffffff, 0x4}, 0x80) 10:13:26 executing program 1: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r0, &(0x7f00000000c0)={0x0, 0x0, 0x0}, 0x0) 10:13:26 executing program 1: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000000)={0x0}}, 0x0) 10:13:26 executing program 1: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000000)={0x0}}, 0x0) 10:13:26 executing program 4: unshare(0x6c060000) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000280), 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000080)) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) r1 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$EVIOCGPROP(r1, 0x40047438, &(0x7f0000000180)=""/246) close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x2) ioctl$PPPIOCGFLAGS1(r1, 0x10, 0x0) 10:13:26 executing program 1: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000000)={0x0}}, 0x0) [ 2106.279452][T24838] loop3: detected capacity change from 0 to 264192 [ 2106.639788][T24841] loop2: detected capacity change from 0 to 264192 10:13:28 executing program 1: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000005c0)={{0x14}, [@NFT_MSG_NEWTABLE={0x20, 0x0, 0xa, 0x3, 0x0, 0x0, {0x1}, [@NFTA_TABLE_NAME={0x9, 0x1, 'syz0\x00'}]}, @NFT_MSG_NEWSET={0x3c, 0x9, 0xa, 0x401, 0x0, 0x0, {0x1}, [@NFTA_SET_ID={0x8}, @NFTA_SET_NAME={0x9, 0x2, 'syz2\x00'}, @NFTA_SET_TABLE={0x9, 0x1, 'syz0\x00'}, @NFTA_SET_KEY_LEN={0x8, 0x5, 0x1, 0x0, 0x1f}]}], {0x14, 0x10}}, 0x84}}, 0x0) [ 2108.119201][T24838] EXT4-fs: failed to create workqueue [ 2108.124627][T24838] EXT4-fs (loop3): mount failed [ 2108.402594][T24841] EXT4-fs (loop2): mounted filesystem without journal. Quota mode: writeback. 10:13:35 executing program 5: prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f00000002c0)=0x0) sched_setscheduler(r0, 0x2, &(0x7f0000000080)=0x6) r1 = getpid() sched_setscheduler(r1, 0x2, &(0x7f00000000c0)=0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r2, &(0x7f000057eff8)=@abs, 0x6e) sendmmsg$unix(r3, &(0x7f00000bd000), 0x318, 0x0) recvmmsg(r2, &(0x7f00000000c0), 0x10106, 0x2, 0x0) syz_mount_image$ext4(&(0x7f0000000180)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xfffbffff00000000, 0x8, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000600100000f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000006856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010300), 0x0, 0x640}, {&(0x7f0000010400)="03000000040000000500000016000f000300040000000000000000000f00698c", 0x20, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}, {&(0x7f0000011000)}, {0x0, 0x0, 0x6700000}, {&(0x7f0000000580), 0x0, 0xc000}], 0x0, &(0x7f0000013b00)=ANY=[@ANYBLOB='\x00']) r4 = creat(&(0x7f0000000000)='./file1\x00', 0x18) r5 = socket(0x10, 0x3, 0x0) sendmsg$nl_route(r5, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f00000005c0)=@ipv4_newroute={0x38, 0x18, 0xbad, 0x0, 0x0, {}, [@RTA_ENCAP_TYPE={0x6, 0x15, 0x3}, @RTA_ENCAP={0x14, 0x16, 0x0, 0x1, @SEG6_IPTUNNEL_SRH={0xd}}]}, 0x38}}, 0x0) r6 = socket(0x26, 0x3, 0x0) sendmsg$nl_route(r6, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f00000005c0)=@ipv4_newroute={0x38, 0x18, 0xbad, 0x0, 0x0, {0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6}, [@RTA_ENCAP_TYPE={0x6, 0x15, 0x3}, @RTA_ENCAP={0x14, 0x16, 0x0, 0x1, @SEG6_IPTUNNEL_SRH={0xd}}]}, 0x38}}, 0x0) r7 = socket(0x10, 0x3, 0x0) sendmsg$nl_route(r7, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f00000005c0)=@ipv4_newroute={0x38, 0x18, 0xbad, 0x0, 0x0, {0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6}, [@RTA_ENCAP_TYPE={0x6, 0x15, 0x3}, @RTA_ENCAP={0x14, 0x16, 0x0, 0x1, @SEG6_IPTUNNEL_SRH={0xd}}]}, 0x38}}, 0x0) execveat(r4, 0x0, &(0x7f0000000380)=[&(0x7f00000001c0)='+{!#\x00', &(0x7f0000000340)='@(\x00'], &(0x7f00000004c0)=[&(0x7f00000003c0)='ext4\x00', &(0x7f0000000400)='ext4\x00', &(0x7f0000000500)='\x00.D\x04\xe0\xce\x99\xd9\xa9\xac\xac\xadH\xa4\xcf\xb7\xffT\xac\x05\xfd\xdd\xb8w\x0f\x82B\xff\xf2\x909`1!\f\x870\x1f\xc1%Y\xc8\x15c \xea\x1cY!\x04\xe4\x91^\x00\x04\xe4\xa6\xba\xc6\xfd\x10\xdf\xe24\xd4&\x17\xdc\xec\xf4\f\n\xb7.\x13\x8e\x1bYENj\xe1\x19~\x1c\xaf\a;d\x9f\xba\xd9T\xd4-\xecX\xc0Y\x83@\xc7\x8b\xff*\xdd\xaa\xc6,o4\xe2\x0f\x16\x01[\xc0\xeb\x7fFI]WF\x1f\f?\xfa\xb1\xe7\xf6t\x027\xb1\xc17.4V\xf81{9\xa3\xb9\x01\xcck@I\xe2\xf1Y\x10E\xa1z/\x05.~Yh%\x8f\x06sB)N\x11P\xf6p\xff\'\xaf\a7\x10+p\xbb\xf3\xb08\xb5)\x00\xeeg\xd0\xee\xe9\x98\x8d\xf8\xb5G\t@f\x1et v\x14\tT\xc5', &(0x7f0000000480)=':--[\x00'], 0x1000) recvfrom(r2, &(0x7f0000000600)=""/203, 0xcb, 0x42, &(0x7f0000000700)=@hci={0x1f, 0xffffffffffffffff, 0x4}, 0x80) 10:13:35 executing program 3: prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f00000002c0)=0x0) sched_setscheduler(r0, 0x2, &(0x7f0000000080)=0x6) r1 = getpid() sched_setscheduler(r1, 0x2, &(0x7f00000000c0)=0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r2, &(0x7f000057eff8)=@abs, 0x6e) sendmmsg$unix(r3, &(0x7f00000bd000), 0x318, 0x0) recvmmsg(r2, &(0x7f00000000c0), 0x10106, 0x2, 0x0) syz_mount_image$ext4(&(0x7f0000000180)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xfffbffff00000000, 0x8, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000600100000f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000006856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010300), 0x0, 0x640}, {&(0x7f0000010400)="03000000040000000500000016000f000300040000000000000000000f00698c", 0x20, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}, {&(0x7f0000011000)}, {0x0, 0x0, 0x6700000}, {&(0x7f0000000580), 0x0, 0xc000}], 0x0, &(0x7f0000013b00)=ANY=[@ANYBLOB='\x00']) r4 = creat(&(0x7f0000000000)='./file1\x00', 0x18) r5 = socket(0x10, 0x3, 0x0) sendmsg$nl_route(r5, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f00000005c0)=@ipv4_newroute={0x38, 0x18, 0xbad, 0x0, 0x0, {}, [@RTA_ENCAP_TYPE={0x6, 0x15, 0x3}, @RTA_ENCAP={0x14, 0x16, 0x0, 0x1, @SEG6_IPTUNNEL_SRH={0xd}}]}, 0x38}}, 0x0) r6 = socket(0x26, 0x3, 0x0) sendmsg$nl_route(r6, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f00000005c0)=@ipv4_newroute={0x38, 0x18, 0xbad, 0x0, 0x0, {0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6}, [@RTA_ENCAP_TYPE={0x6, 0x15, 0x3}, @RTA_ENCAP={0x14, 0x16, 0x0, 0x1, @SEG6_IPTUNNEL_SRH={0xd}}]}, 0x38}}, 0x0) r7 = socket(0x10, 0x3, 0x0) sendmsg$nl_route(r7, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f00000005c0)=@ipv4_newroute={0x38, 0x18, 0xbad, 0x0, 0x0, {0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6}, [@RTA_ENCAP_TYPE={0x6, 0x15, 0x3}, @RTA_ENCAP={0x14, 0x16, 0x0, 0x1, @SEG6_IPTUNNEL_SRH={0xd}}]}, 0x38}}, 0x0) execveat(r4, 0x0, &(0x7f0000000380)=[&(0x7f00000001c0)='+{!#\x00', &(0x7f0000000300)='ext4\x00', &(0x7f0000000340)='@(\x00'], &(0x7f00000004c0)=[&(0x7f00000003c0)='ext4\x00', &(0x7f0000000400)='ext4\x00', &(0x7f0000000500)='\x00.D\x04\xe0\xce\x99\xd9\xa9\xac\xac\xadH\xa4\xcf\xb7\xffT\xac\x05\xfd\xdd\xb8w\x0f\x82B\xff\xf2\x909`1!\f\x870\x1f\xc1%Y\xc8\x15c \xea\x1cY!\x04\xe4\x91^\x00\x04\xe4\xa6\xba\xc6\xfd\x10\xdf\xe24\xd4&\x17\xdc\xec\xf4\f\n\xb7.\x13\x8e\x1bYENj\xe1\x19~\x1c\xaf\a;d\x9f\xba\xd9T\xd4-\xecX\xc0Y\x83@\xc7\x8b\xff*\xdd\xaa\xc6,o4\xe2\x0f\x16\x01[\xc0\xeb\x7fFI]WF\x1f\f?\xfa\xb1\xe7\xf6t\x027\xb1\xc17.4V\xf81{9\xa3\xb9\x01\xcck@I\xe2\xf1Y\x10E\xa1z/\x05.~Yh%\x8f\x06sB)N\x11P\xf6p\xff\'\xaf\a7\x10+p\xbb\xf3\xb08\xb5)\x00\xeeg\xd0\xee\xe9\x98\x8d\xf8\xb5G\t@f\x1et v\x14\tT\xc5', 0x0], 0x1000) recvfrom(r2, &(0x7f0000000600)=""/203, 0xcb, 0x42, &(0x7f0000000700)=@hci={0x1f, 0xffffffffffffffff, 0x4}, 0x80) 10:13:35 executing program 1: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000005c0)={{0x14}, [@NFT_MSG_NEWTABLE={0x20, 0x0, 0xa, 0x3, 0x0, 0x0, {0x1}, [@NFTA_TABLE_NAME={0x9, 0x1, 'syz0\x00'}]}, @NFT_MSG_NEWSET={0x3c, 0x9, 0xa, 0x401, 0x0, 0x0, {0x1}, [@NFTA_SET_ID={0x8}, @NFTA_SET_NAME={0x9, 0x2, 'syz2\x00'}, @NFTA_SET_TABLE={0x9, 0x1, 'syz0\x00'}, @NFTA_SET_KEY_LEN={0x8, 0x5, 0x1, 0x0, 0x1f}]}], {0x14, 0x10}}, 0x84}}, 0x0) 10:13:35 executing program 4: unshare(0x6c060000) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000280), 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000080)=0x3) bpf$PROG_LOAD(0x5, 0x0, 0x0) r1 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$EVIOCGPROP(r1, 0x40047438, &(0x7f0000000180)=""/246) close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x2) ioctl$PPPIOCGFLAGS1(r1, 0x10, 0x0) 10:13:35 executing program 2: prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f00000002c0)=0x0) sched_setscheduler(r0, 0x2, &(0x7f0000000080)=0x6) r1 = getpid() sched_setscheduler(r1, 0x2, &(0x7f00000000c0)=0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r2, &(0x7f000057eff8)=@abs, 0x6e) sendmmsg$unix(r3, &(0x7f00000bd000), 0x318, 0x0) recvmmsg(r2, &(0x7f00000000c0), 0x10106, 0x2, 0x0) syz_mount_image$ext4(&(0x7f0000000180)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xfffbffff00000000, 0x8, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000600100000f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000006856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010300), 0x0, 0x640}, {&(0x7f0000010400)="03000000040000000500000016000f000300040000000000000000000f00698c", 0x20, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}, {&(0x7f0000011000)}, {0x0, 0x0, 0x6700000}, {&(0x7f0000000580), 0x0, 0xc000}], 0x0, &(0x7f0000013b00)=ANY=[@ANYBLOB='\x00']) r4 = creat(&(0x7f0000000000)='./file1\x00', 0x18) r5 = socket(0x10, 0x3, 0x0) sendmsg$nl_route(r5, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f00000005c0)=@ipv4_newroute={0x38, 0x18, 0xbad, 0x0, 0x0, {}, [@RTA_ENCAP_TYPE={0x6, 0x15, 0x3}, @RTA_ENCAP={0x14, 0x16, 0x0, 0x1, @SEG6_IPTUNNEL_SRH={0xd}}]}, 0x38}}, 0x0) r6 = socket(0x26, 0x3, 0x0) sendmsg$nl_route(r6, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f00000005c0)=@ipv4_newroute={0x38, 0x18, 0xbad, 0x0, 0x0, {0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6}, [@RTA_ENCAP_TYPE={0x6, 0x15, 0x3}, @RTA_ENCAP={0x14, 0x16, 0x0, 0x1, @SEG6_IPTUNNEL_SRH={0xd}}]}, 0x38}}, 0x0) r7 = socket(0x10, 0x3, 0x0) sendmsg$nl_route(r7, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f00000005c0)=@ipv4_newroute={0x38, 0x18, 0xbad, 0x0, 0x0, {0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6}, [@RTA_ENCAP_TYPE={0x6, 0x15, 0x3}, @RTA_ENCAP={0x14, 0x16, 0x0, 0x1, @SEG6_IPTUNNEL_SRH={0xd}}]}, 0x38}}, 0x0) execveat(r4, 0x0, &(0x7f0000000380)=[&(0x7f00000001c0)='+{!#\x00', &(0x7f0000000300)='ext4\x00', &(0x7f0000000340)='@(\x00'], &(0x7f00000004c0)=[&(0x7f00000003c0)='ext4\x00', &(0x7f0000000400)='ext4\x00', &(0x7f0000000500)='\x00.D\x04\xe0\xce\x99\xd9\xa9\xac\xac\xadH\xa4\xcf\xb7\xffT\xac\x05\xfd\xdd\xb8w\x0f\x82B\xff\xf2\x909`1!\f\x870\x1f\xc1%Y\xc8\x15c \xea\x1cY!\x04\xe4\x91^\x00\x04\xe4\xa6\xba\xc6\xfd\x10\xdf\xe24\xd4&\x17\xdc\xec\xf4\f\n\xb7.\x13\x8e\x1bYENj\xe1\x19~\x1c\xaf\a;d\x9f\xba\xd9T\xd4-\xecX\xc0Y\x83@\xc7\x8b\xff*\xdd\xaa\xc6,o4\xe2\x0f\x16\x01[\xc0\xeb\x7fFI]WF\x1f\f?\xfa\xb1\xe7\xf6t\x027\xb1\xc17.4V\xf81{9\xa3\xb9\x01\xcck@I\xe2\xf1Y\x10E\xa1z/\x05.~Yh%\x8f\x06sB)N\x11P\xf6p\xff\'\xaf\a7\x10+p\xbb\xf3\xb08\xb5)\x00\xeeg\xd0\xee\xe9\x98\x8d\xf8\xb5G\t@f\x1et v\x14\tT\xc5'], 0x1000) recvfrom(r2, &(0x7f0000000600)=""/203, 0xcb, 0x42, &(0x7f0000000700)=@hci={0x1f, 0xffffffffffffffff, 0x4}, 0x80) 10:13:35 executing program 0: prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f00000002c0)=0x0) sched_setscheduler(r0, 0x2, &(0x7f0000000080)=0x6) r1 = getpid() sched_setscheduler(r1, 0x2, &(0x7f00000000c0)=0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r2, &(0x7f000057eff8)=@abs, 0x6e) sendmmsg$unix(r3, &(0x7f00000bd000), 0x318, 0x0) recvmmsg(r2, &(0x7f00000000c0), 0x10106, 0x2, 0x0) syz_mount_image$ext4(&(0x7f0000000180)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xfffbffff00000000, 0x8, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000600100000f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000006856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010300), 0x0, 0x640}, {&(0x7f0000010400)="03000000040000000500000016000f000300040000000000000000000f00698c", 0x20, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}, {&(0x7f0000011000)}, {0x0, 0x0, 0x6700000}, {&(0x7f0000000580), 0x0, 0xc000}], 0x0, &(0x7f0000013b00)=ANY=[@ANYBLOB='\x00']) r4 = creat(&(0x7f0000000000)='./file1\x00', 0x18) r5 = socket(0x10, 0x3, 0x0) sendmsg$nl_route(r5, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f00000005c0)=@ipv4_newroute={0x38, 0x18, 0xbad, 0x0, 0x0, {}, [@RTA_ENCAP_TYPE={0x6, 0x15, 0x3}, @RTA_ENCAP={0x14, 0x16, 0x0, 0x1, @SEG6_IPTUNNEL_SRH={0xd}}]}, 0x38}}, 0x0) r6 = socket(0x26, 0x3, 0x0) sendmsg$nl_route(r6, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f00000005c0)=@ipv4_newroute={0x38, 0x18, 0xbad, 0x0, 0x0, {0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6}, [@RTA_ENCAP_TYPE={0x6, 0x15, 0x3}, @RTA_ENCAP={0x14, 0x16, 0x0, 0x1, @SEG6_IPTUNNEL_SRH={0xd}}]}, 0x38}}, 0x0) r7 = socket(0x10, 0x3, 0x0) sendmsg$nl_route(r7, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f00000005c0)=@ipv4_newroute={0x38, 0x18, 0xbad, 0x0, 0x0, {0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6}, [@RTA_ENCAP_TYPE={0x6, 0x15, 0x3}, @RTA_ENCAP={0x14, 0x16, 0x0, 0x1, @SEG6_IPTUNNEL_SRH={0xd}}]}, 0x38}}, 0x0) execveat(r4, 0x0, &(0x7f0000000380)=[&(0x7f00000001c0)='+{!#\x00', &(0x7f0000000300)='ext4\x00', &(0x7f0000000340)='@(\x00'], 0x0, 0x1000) recvfrom(r2, &(0x7f0000000600)=""/203, 0xcb, 0x42, &(0x7f0000000700)=@hci={0x1f, 0xffffffffffffffff, 0x4}, 0x80) 10:13:35 executing program 4: unshare(0x6c060000) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000280), 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000080)=0x3) bpf$PROG_LOAD(0x5, 0x0, 0x0) r1 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$EVIOCGPROP(r1, 0x40047438, &(0x7f0000000180)=""/246) close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x2) ioctl$PPPIOCGFLAGS1(r1, 0x10, 0x0) 10:13:35 executing program 1: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000005c0)={{0x14}, [@NFT_MSG_NEWTABLE={0x20, 0x0, 0xa, 0x3, 0x0, 0x0, {0x1}, [@NFTA_TABLE_NAME={0x9, 0x1, 'syz0\x00'}]}, @NFT_MSG_NEWSET={0x3c, 0x9, 0xa, 0x401, 0x0, 0x0, {0x1}, [@NFTA_SET_ID={0x8}, @NFTA_SET_NAME={0x9, 0x2, 'syz2\x00'}, @NFTA_SET_TABLE={0x9, 0x1, 'syz0\x00'}, @NFTA_SET_KEY_LEN={0x8, 0x5, 0x1, 0x0, 0x1f}]}], {0x14, 0x10}}, 0x84}}, 0x0) [ 2115.749577][T24894] loop3: detected capacity change from 0 to 264192 [ 2116.149275][T24895] loop2: detected capacity change from 0 to 264192 10:13:37 executing program 3: prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f00000002c0)=0x0) sched_setscheduler(r0, 0x2, &(0x7f0000000080)=0x6) r1 = getpid() sched_setscheduler(r1, 0x2, &(0x7f00000000c0)=0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r2, &(0x7f000057eff8)=@abs, 0x6e) sendmmsg$unix(r3, &(0x7f00000bd000), 0x318, 0x0) recvmmsg(r2, &(0x7f00000000c0), 0x10106, 0x2, 0x0) syz_mount_image$ext4(&(0x7f0000000180)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xfffbffff00000000, 0x8, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000600100000f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000006856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010300), 0x0, 0x640}, {&(0x7f0000010400)="03000000040000000500000016000f000300040000000000000000000f00698c", 0x20, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}, {&(0x7f0000011000)}, {0x0, 0x0, 0x6700000}, {&(0x7f0000000580), 0x0, 0xc000}], 0x0, &(0x7f0000013b00)=ANY=[@ANYBLOB='\x00']) r4 = creat(&(0x7f0000000000)='./file1\x00', 0x18) r5 = socket(0x10, 0x3, 0x0) sendmsg$nl_route(r5, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f00000005c0)=@ipv4_newroute={0x38, 0x18, 0xbad, 0x0, 0x0, {}, [@RTA_ENCAP_TYPE={0x6, 0x15, 0x3}, @RTA_ENCAP={0x14, 0x16, 0x0, 0x1, @SEG6_IPTUNNEL_SRH={0xd}}]}, 0x38}}, 0x0) r6 = socket(0x26, 0x3, 0x0) sendmsg$nl_route(r6, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f00000005c0)=@ipv4_newroute={0x38, 0x18, 0xbad, 0x0, 0x0, {0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6}, [@RTA_ENCAP_TYPE={0x6, 0x15, 0x3}, @RTA_ENCAP={0x14, 0x16, 0x0, 0x1, @SEG6_IPTUNNEL_SRH={0xd}}]}, 0x38}}, 0x0) r7 = socket(0x10, 0x3, 0x0) sendmsg$nl_route(r7, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f00000005c0)=@ipv4_newroute={0x38, 0x18, 0xbad, 0x0, 0x0, {0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6}, [@RTA_ENCAP_TYPE={0x6, 0x15, 0x3}, @RTA_ENCAP={0x14, 0x16, 0x0, 0x1, @SEG6_IPTUNNEL_SRH={0xd}}]}, 0x38}}, 0x0) execveat(r4, 0x0, &(0x7f0000000380)=[&(0x7f00000001c0)='+{!#\x00', &(0x7f0000000300)='ext4\x00', &(0x7f0000000340)='@(\x00'], &(0x7f00000004c0)=[&(0x7f00000003c0)='ext4\x00', &(0x7f0000000400)='ext4\x00', &(0x7f0000000500)='\x00.D\x04\xe0\xce\x99\xd9\xa9\xac\xac\xadH\xa4\xcf\xb7\xffT\xac\x05\xfd\xdd\xb8w\x0f\x82B\xff\xf2\x909`1!\f\x870\x1f\xc1%Y\xc8\x15c \xea\x1cY!\x04\xe4\x91^\x00\x04\xe4\xa6\xba\xc6\xfd\x10\xdf\xe24\xd4&\x17\xdc\xec\xf4\f\n\xb7.\x13\x8e\x1bYENj\xe1\x19~\x1c\xaf\a;d\x9f\xba\xd9T\xd4-\xecX\xc0Y\x83@\xc7\x8b\xff*\xdd\xaa\xc6,o4\xe2\x0f\x16\x01[\xc0\xeb\x7fFI]WF\x1f\f?\xfa\xb1\xe7\xf6t\x027\xb1\xc17.4V\xf81{9\xa3\xb9\x01\xcck@I\xe2\xf1Y\x10E\xa1z/\x05.~Yh%\x8f\x06sB)N\x11P\xf6p\xff\'\xaf\a7\x10+p\xbb\xf3\xb08\xb5)\x00\xeeg\xd0\xee\xe9\x98\x8d\xf8\xb5G\t@f\x1et v\x14\tT\xc5', 0x0], 0x1000) 10:13:37 executing program 1: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000005c0)={{0x14}, [@NFT_MSG_NEWTABLE={0x20, 0x0, 0xa, 0x3, 0x0, 0x0, {0x1}, [@NFTA_TABLE_NAME={0x9, 0x1, 'syz0\x00'}]}, @NFT_MSG_NEWSET={0x3c, 0x9, 0xa, 0x401, 0x0, 0x0, {0x1}, [@NFTA_SET_ID={0x8}, @NFTA_SET_NAME={0x9, 0x2, 'syz2\x00'}, @NFTA_SET_TABLE={0x9, 0x1, 'syz0\x00'}, @NFTA_SET_KEY_LEN={0x8, 0x5, 0x1, 0x0, 0x1f}]}, @NFT_MSG_NEWSETELEM={0x48, 0xc, 0xa, 0x0, 0x0, 0x0, {0x1}, [@NFTA_SET_ELEM_LIST_SET={0x9, 0x2, 'syz2\x00'}, @NFTA_SET_ELEM_LIST_ELEMENTS={0x1c, 0x3, 0x0, 0x1, [{0x18, 0x0, 0x0, 0x1, [@NFTA_SET_ELEM_FLAGS={0x8, 0x3, 0x1, 0x0, 0x4}, @NFTA_SET_ELEM_TIMEOUT={0x4, 0x6}]}]}, @NFTA_SET_ELEM_LIST_TABLE={0x9, 0x1, 'syz0\x00'}]}], {0x14, 0x10}}, 0xcc}}, 0x0) 10:13:37 executing program 4: unshare(0x6c060000) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000280), 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000080)=0x3) bpf$PROG_LOAD(0x5, 0x0, 0x0) r1 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$EVIOCGPROP(r1, 0x40047438, &(0x7f0000000180)=""/246) close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x2) ioctl$PPPIOCGFLAGS1(r1, 0x10, 0x0) [ 2116.848240][T24894] EXT4-fs: failed to create workqueue [ 2116.853679][T24894] EXT4-fs (loop3): mount failed [ 2116.882633][T24895] EXT4-fs (loop2): mounted filesystem without journal. Quota mode: writeback. 10:13:37 executing program 2: prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f00000002c0)=0x0) sched_setscheduler(r0, 0x2, &(0x7f0000000080)=0x6) r1 = getpid() sched_setscheduler(r1, 0x2, &(0x7f00000000c0)=0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r2, &(0x7f000057eff8)=@abs, 0x6e) sendmmsg$unix(r3, &(0x7f00000bd000), 0x318, 0x0) recvmmsg(r2, &(0x7f00000000c0), 0x10106, 0x2, 0x0) syz_mount_image$ext4(&(0x7f0000000180)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xfffbffff00000000, 0x8, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000600100000f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000006856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010300), 0x0, 0x640}, {&(0x7f0000010400)="03000000040000000500000016000f000300040000000000000000000f00698c", 0x20, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}, {&(0x7f0000011000)}, {0x0, 0x0, 0x6700000}, {&(0x7f0000000580), 0x0, 0xc000}], 0x0, &(0x7f0000013b00)=ANY=[@ANYBLOB='\x00']) r4 = creat(&(0x7f0000000000)='./file1\x00', 0x18) r5 = socket(0x10, 0x3, 0x0) sendmsg$nl_route(r5, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f00000005c0)=@ipv4_newroute={0x38, 0x18, 0xbad, 0x0, 0x0, {}, [@RTA_ENCAP_TYPE={0x6, 0x15, 0x3}, @RTA_ENCAP={0x14, 0x16, 0x0, 0x1, @SEG6_IPTUNNEL_SRH={0xd}}]}, 0x38}}, 0x0) r6 = socket(0x26, 0x3, 0x0) sendmsg$nl_route(r6, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f00000005c0)=@ipv4_newroute={0x38, 0x18, 0xbad, 0x0, 0x0, {0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6}, [@RTA_ENCAP_TYPE={0x6, 0x15, 0x3}, @RTA_ENCAP={0x14, 0x16, 0x0, 0x1, @SEG6_IPTUNNEL_SRH={0xd}}]}, 0x38}}, 0x0) r7 = socket(0x10, 0x3, 0x0) sendmsg$nl_route(r7, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f00000005c0)=@ipv4_newroute={0x38, 0x18, 0xbad, 0x0, 0x0, {0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6}, [@RTA_ENCAP_TYPE={0x6, 0x15, 0x3}, @RTA_ENCAP={0x14, 0x16, 0x0, 0x1, @SEG6_IPTUNNEL_SRH={0xd}}]}, 0x38}}, 0x0) execveat(r4, 0x0, &(0x7f0000000380)=[&(0x7f00000001c0)='+{!#\x00', &(0x7f0000000300)='ext4\x00', 0x0], &(0x7f00000004c0)=[&(0x7f00000003c0)='ext4\x00', &(0x7f0000000400)='ext4\x00', &(0x7f0000000500)='\x00.D\x04\xe0\xce\x99\xd9\xa9\xac\xac\xadH\xa4\xcf\xb7\xffT\xac\x05\xfd\xdd\xb8w\x0f\x82B\xff\xf2\x909`1!\f\x870\x1f\xc1%Y\xc8\x15c \xea\x1cY!\x04\xe4\x91^\x00\x04\xe4\xa6\xba\xc6\xfd\x10\xdf\xe24\xd4&\x17\xdc\xec\xf4\f\n\xb7.\x13\x8e\x1bYENj\xe1\x19~\x1c\xaf\a;d\x9f\xba\xd9T\xd4-\xecX\xc0Y\x83@\xc7\x8b\xff*\xdd\xaa\xc6,o4\xe2\x0f\x16\x01[\xc0\xeb\x7fFI]WF\x1f\f?\xfa\xb1\xe7\xf6t\x027\xb1\xc17.4V\xf81{9\xa3\xb9\x01\xcck@I\xe2\xf1Y\x10E\xa1z/\x05.~Yh%\x8f\x06sB)N\x11P\xf6p\xff\'\xaf\a7\x10+p\xbb\xf3\xb08\xb5)\x00\xeeg\xd0\xee\xe9\x98\x8d\xf8\xb5G\t@f\x1et v\x14\tT\xc5', &(0x7f0000000480)=':--[\x00'], 0x1000) recvfrom(r2, &(0x7f0000000600)=""/203, 0xcb, 0x42, &(0x7f0000000700)=@hci={0x1f, 0xffffffffffffffff, 0x4}, 0x80) [ 2117.140483][T24916] loop3: detected capacity change from 0 to 264192 [ 2117.219676][T24916] EXT4-fs (loop3): mounted filesystem without journal. Quota mode: writeback. [ 2117.498605][T24930] loop2: detected capacity change from 0 to 264192 [ 2117.565458][T24930] EXT4-fs (loop2): mounted filesystem without journal. Quota mode: writeback. 10:13:47 executing program 5: prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f00000002c0)=0x0) sched_setscheduler(r0, 0x2, &(0x7f0000000080)=0x6) r1 = getpid() sched_setscheduler(r1, 0x2, &(0x7f00000000c0)=0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r2, &(0x7f000057eff8)=@abs, 0x6e) sendmmsg$unix(r3, &(0x7f00000bd000), 0x318, 0x0) recvmmsg(r2, &(0x7f00000000c0), 0x10106, 0x2, 0x0) syz_mount_image$ext4(&(0x7f0000000180)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xfffbffff00000000, 0x8, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000600100000f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000006856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010300), 0x0, 0x640}, {&(0x7f0000010400)="03000000040000000500000016000f000300040000000000000000000f00698c", 0x20, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}, {&(0x7f0000011000)}, {0x0, 0x0, 0x6700000}, {&(0x7f0000000580), 0x0, 0xc000}], 0x0, &(0x7f0000013b00)=ANY=[@ANYBLOB='\x00']) r4 = creat(&(0x7f0000000000)='./file1\x00', 0x18) r5 = socket(0x10, 0x3, 0x0) sendmsg$nl_route(r5, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f00000005c0)=@ipv4_newroute={0x38, 0x18, 0xbad, 0x0, 0x0, {}, [@RTA_ENCAP_TYPE={0x6, 0x15, 0x3}, @RTA_ENCAP={0x14, 0x16, 0x0, 0x1, @SEG6_IPTUNNEL_SRH={0xd}}]}, 0x38}}, 0x0) r6 = socket(0x26, 0x3, 0x0) sendmsg$nl_route(r6, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f00000005c0)=@ipv4_newroute={0x38, 0x18, 0xbad, 0x0, 0x0, {0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6}, [@RTA_ENCAP_TYPE={0x6, 0x15, 0x3}, @RTA_ENCAP={0x14, 0x16, 0x0, 0x1, @SEG6_IPTUNNEL_SRH={0xd}}]}, 0x38}}, 0x0) r7 = socket(0x10, 0x3, 0x0) sendmsg$nl_route(r7, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f00000005c0)=@ipv4_newroute={0x38, 0x18, 0xbad, 0x0, 0x0, {0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6}, [@RTA_ENCAP_TYPE={0x6, 0x15, 0x3}, @RTA_ENCAP={0x14, 0x16, 0x0, 0x1, @SEG6_IPTUNNEL_SRH={0xd}}]}, 0x38}}, 0x0) execveat(r4, 0x0, &(0x7f0000000380)=[&(0x7f00000001c0)='+{!#\x00', &(0x7f0000000340)='@(\x00'], &(0x7f00000004c0)=[&(0x7f00000003c0)='ext4\x00', &(0x7f0000000400)='ext4\x00', &(0x7f0000000500)='\x00.D\x04\xe0\xce\x99\xd9\xa9\xac\xac\xadH\xa4\xcf\xb7\xffT\xac\x05\xfd\xdd\xb8w\x0f\x82B\xff\xf2\x909`1!\f\x870\x1f\xc1%Y\xc8\x15c \xea\x1cY!\x04\xe4\x91^\x00\x04\xe4\xa6\xba\xc6\xfd\x10\xdf\xe24\xd4&\x17\xdc\xec\xf4\f\n\xb7.\x13\x8e\x1bYENj\xe1\x19~\x1c\xaf\a;d\x9f\xba\xd9T\xd4-\xecX\xc0Y\x83@\xc7\x8b\xff*\xdd\xaa\xc6,o4\xe2\x0f\x16\x01[\xc0\xeb\x7fFI]WF\x1f\f?\xfa\xb1\xe7\xf6t\x027\xb1\xc17.4V\xf81{9\xa3\xb9\x01\xcck@I\xe2\xf1Y\x10E\xa1z/\x05.~Yh%\x8f\x06sB)N\x11P\xf6p\xff\'\xaf\a7\x10+p\xbb\xf3\xb08\xb5)\x00\xeeg\xd0\xee\xe9\x98\x8d\xf8\xb5G\t@f\x1et v\x14\tT\xc5', &(0x7f0000000480)=':--[\x00'], 0x1000) recvfrom(r2, &(0x7f0000000600)=""/203, 0xcb, 0x42, &(0x7f0000000700)=@hci={0x1f, 0xffffffffffffffff, 0x4}, 0x80) 10:13:47 executing program 0: prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f00000002c0)=0x0) sched_setscheduler(r0, 0x2, &(0x7f0000000080)=0x6) r1 = getpid() sched_setscheduler(r1, 0x2, &(0x7f00000000c0)=0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r2, &(0x7f000057eff8)=@abs, 0x6e) sendmmsg$unix(r3, &(0x7f00000bd000), 0x318, 0x0) recvmmsg(r2, &(0x7f00000000c0), 0x10106, 0x2, 0x0) syz_mount_image$ext4(&(0x7f0000000180)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xfffbffff00000000, 0x8, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000600100000f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000006856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010300), 0x0, 0x640}, {&(0x7f0000010400)="03000000040000000500000016000f000300040000000000000000000f00698c", 0x20, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}, {&(0x7f0000011000)}, {0x0, 0x0, 0x6700000}, {&(0x7f0000000580), 0x0, 0xc000}], 0x0, &(0x7f0000013b00)=ANY=[@ANYBLOB='\x00']) r4 = creat(&(0x7f0000000000)='./file1\x00', 0x18) r5 = socket(0x10, 0x3, 0x0) sendmsg$nl_route(r5, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f00000005c0)=@ipv4_newroute={0x38, 0x18, 0xbad, 0x0, 0x0, {}, [@RTA_ENCAP_TYPE={0x6, 0x15, 0x3}, @RTA_ENCAP={0x14, 0x16, 0x0, 0x1, @SEG6_IPTUNNEL_SRH={0xd}}]}, 0x38}}, 0x0) r6 = socket(0x26, 0x3, 0x0) sendmsg$nl_route(r6, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f00000005c0)=@ipv4_newroute={0x38, 0x18, 0xbad, 0x0, 0x0, {0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6}, [@RTA_ENCAP_TYPE={0x6, 0x15, 0x3}, @RTA_ENCAP={0x14, 0x16, 0x0, 0x1, @SEG6_IPTUNNEL_SRH={0xd}}]}, 0x38}}, 0x0) r7 = socket(0x10, 0x3, 0x0) sendmsg$nl_route(r7, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f00000005c0)=@ipv4_newroute={0x38, 0x18, 0xbad, 0x0, 0x0, {0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6}, [@RTA_ENCAP_TYPE={0x6, 0x15, 0x3}, @RTA_ENCAP={0x14, 0x16, 0x0, 0x1, @SEG6_IPTUNNEL_SRH={0xd}}]}, 0x38}}, 0x0) execveat(r4, 0x0, &(0x7f0000000380)=[&(0x7f00000001c0)='+{!#\x00', &(0x7f0000000300)='ext4\x00', &(0x7f0000000340)='@(\x00'], 0x0, 0x1000) recvfrom(r2, &(0x7f0000000600)=""/203, 0xcb, 0x42, &(0x7f0000000700)=@hci={0x1f, 0xffffffffffffffff, 0x4}, 0x80) 10:13:47 executing program 1: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000005c0)={{0x14}, [@NFT_MSG_NEWTABLE={0x20, 0x0, 0xa, 0x3, 0x0, 0x0, {0x1}, [@NFTA_TABLE_NAME={0x9, 0x1, 'syz0\x00'}]}, @NFT_MSG_NEWSET={0x3c, 0x9, 0xa, 0x401, 0x0, 0x0, {0x1}, [@NFTA_SET_ID={0x8}, @NFTA_SET_NAME={0x9, 0x2, 'syz2\x00'}, @NFTA_SET_TABLE={0x9, 0x1, 'syz0\x00'}, @NFTA_SET_KEY_LEN={0x8, 0x5, 0x1, 0x0, 0x1f}]}, @NFT_MSG_NEWSETELEM={0x48, 0xc, 0xa, 0x0, 0x0, 0x0, {0x1}, [@NFTA_SET_ELEM_LIST_SET={0x9, 0x2, 'syz2\x00'}, @NFTA_SET_ELEM_LIST_ELEMENTS={0x1c, 0x3, 0x0, 0x1, [{0x18, 0x0, 0x0, 0x1, [@NFTA_SET_ELEM_FLAGS={0x8, 0x3, 0x1, 0x0, 0x4}, @NFTA_SET_ELEM_TIMEOUT={0x4, 0x6}]}]}, @NFTA_SET_ELEM_LIST_TABLE={0x9, 0x1, 'syz0\x00'}]}], {0x14, 0x10}}, 0xcc}}, 0x0) 10:13:47 executing program 4: unshare(0x6c060000) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000280), 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000080)=0x3) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) r1 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$EVIOCGPROP(r1, 0x40047438, &(0x7f0000000180)=""/246) close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x2) ioctl$PPPIOCGFLAGS1(r1, 0x10, 0x0) 10:13:47 executing program 3: prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f00000002c0)=0x0) sched_setscheduler(r0, 0x2, &(0x7f0000000080)=0x6) r1 = getpid() sched_setscheduler(r1, 0x2, &(0x7f00000000c0)=0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r2, &(0x7f000057eff8)=@abs, 0x6e) sendmmsg$unix(r3, &(0x7f00000bd000), 0x318, 0x0) recvmmsg(r2, &(0x7f00000000c0), 0x10106, 0x2, 0x0) syz_mount_image$ext4(&(0x7f0000000180)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xfffbffff00000000, 0x8, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000600100000f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000006856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010300), 0x0, 0x640}, {&(0x7f0000010400)="03000000040000000500000016000f000300040000000000000000000f00698c", 0x20, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}, {&(0x7f0000011000)}, {0x0, 0x0, 0x6700000}, {&(0x7f0000000580), 0x0, 0xc000}], 0x0, &(0x7f0000013b00)=ANY=[@ANYBLOB='\x00']) r4 = creat(&(0x7f0000000000)='./file1\x00', 0x18) r5 = socket(0x10, 0x3, 0x0) sendmsg$nl_route(r5, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f00000005c0)=@ipv4_newroute={0x38, 0x18, 0xbad, 0x0, 0x0, {}, [@RTA_ENCAP_TYPE={0x6, 0x15, 0x3}, @RTA_ENCAP={0x14, 0x16, 0x0, 0x1, @SEG6_IPTUNNEL_SRH={0xd}}]}, 0x38}}, 0x0) r6 = socket(0x26, 0x3, 0x0) sendmsg$nl_route(r6, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f00000005c0)=@ipv4_newroute={0x38, 0x18, 0xbad, 0x0, 0x0, {0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6}, [@RTA_ENCAP_TYPE={0x6, 0x15, 0x3}, @RTA_ENCAP={0x14, 0x16, 0x0, 0x1, @SEG6_IPTUNNEL_SRH={0xd}}]}, 0x38}}, 0x0) r7 = socket(0x10, 0x3, 0x0) sendmsg$nl_route(r7, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f00000005c0)=@ipv4_newroute={0x38, 0x18, 0xbad, 0x0, 0x0, {0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6}, [@RTA_ENCAP_TYPE={0x6, 0x15, 0x3}, @RTA_ENCAP={0x14, 0x16, 0x0, 0x1, @SEG6_IPTUNNEL_SRH={0xd}}]}, 0x38}}, 0x0) execveat(r4, 0x0, &(0x7f0000000380)=[&(0x7f00000001c0)='+{!#\x00', &(0x7f0000000300)='ext4\x00', &(0x7f0000000340)='@(\x00'], &(0x7f00000004c0)=[&(0x7f00000003c0)='ext4\x00', &(0x7f0000000400)='ext4\x00', &(0x7f0000000500)='\x00.D\x04\xe0\xce\x99\xd9\xa9\xac\xac\xadH\xa4\xcf\xb7\xffT\xac\x05\xfd\xdd\xb8w\x0f\x82B\xff\xf2\x909`1!\f\x870\x1f\xc1%Y\xc8\x15c \xea\x1cY!\x04\xe4\x91^\x00\x04\xe4\xa6\xba\xc6\xfd\x10\xdf\xe24\xd4&\x17\xdc\xec\xf4\f\n\xb7.\x13\x8e\x1bYENj\xe1\x19~\x1c\xaf\a;d\x9f\xba\xd9T\xd4-\xecX\xc0Y\x83@\xc7\x8b\xff*\xdd\xaa\xc6,o4\xe2\x0f\x16\x01[\xc0\xeb\x7fFI]WF\x1f\f?\xfa\xb1\xe7\xf6t\x027\xb1\xc17.4V\xf81{9\xa3\xb9\x01\xcck@I\xe2\xf1Y\x10E\xa1z/\x05.~Yh%\x8f\x06sB)N\x11P\xf6p\xff\'\xaf\a7\x10+p\xbb\xf3\xb08\xb5)\x00\xeeg\xd0\xee\xe9\x98\x8d\xf8\xb5G\t@f\x1et v\x14\tT\xc5', 0x0], 0x1000) 10:13:47 executing program 2: prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f00000002c0)=0x0) sched_setscheduler(r0, 0x2, &(0x7f0000000080)=0x6) r1 = getpid() sched_setscheduler(r1, 0x2, &(0x7f00000000c0)=0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r2, &(0x7f000057eff8)=@abs, 0x6e) sendmmsg$unix(r3, &(0x7f00000bd000), 0x318, 0x0) recvmmsg(r2, &(0x7f00000000c0), 0x10106, 0x2, 0x0) syz_mount_image$ext4(&(0x7f0000000180)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xfffbffff00000000, 0x8, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000600100000f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000006856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010300), 0x0, 0x640}, {&(0x7f0000010400)="03000000040000000500000016000f000300040000000000000000000f00698c", 0x20, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}, {&(0x7f0000011000)}, {0x0, 0x0, 0x6700000}, {&(0x7f0000000580), 0x0, 0xc000}], 0x0, &(0x7f0000013b00)=ANY=[@ANYBLOB='\x00']) r4 = creat(&(0x7f0000000000)='./file1\x00', 0x18) r5 = socket(0x10, 0x3, 0x0) sendmsg$nl_route(r5, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f00000005c0)=@ipv4_newroute={0x38, 0x18, 0xbad, 0x0, 0x0, {}, [@RTA_ENCAP_TYPE={0x6, 0x15, 0x3}, @RTA_ENCAP={0x14, 0x16, 0x0, 0x1, @SEG6_IPTUNNEL_SRH={0xd}}]}, 0x38}}, 0x0) r6 = socket(0x26, 0x3, 0x0) sendmsg$nl_route(r6, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f00000005c0)=@ipv4_newroute={0x38, 0x18, 0xbad, 0x0, 0x0, {0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6}, [@RTA_ENCAP_TYPE={0x6, 0x15, 0x3}, @RTA_ENCAP={0x14, 0x16, 0x0, 0x1, @SEG6_IPTUNNEL_SRH={0xd}}]}, 0x38}}, 0x0) r7 = socket(0x10, 0x3, 0x0) sendmsg$nl_route(r7, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f00000005c0)=@ipv4_newroute={0x38, 0x18, 0xbad, 0x0, 0x0, {0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6}, [@RTA_ENCAP_TYPE={0x6, 0x15, 0x3}, @RTA_ENCAP={0x14, 0x16, 0x0, 0x1, @SEG6_IPTUNNEL_SRH={0xd}}]}, 0x38}}, 0x0) execveat(r4, 0x0, &(0x7f0000000380)=[&(0x7f00000001c0)='+{!#\x00', &(0x7f0000000300)='ext4\x00', 0x0], &(0x7f00000004c0)=[&(0x7f00000003c0)='ext4\x00', &(0x7f0000000400)='ext4\x00', &(0x7f0000000500)='\x00.D\x04\xe0\xce\x99\xd9\xa9\xac\xac\xadH\xa4\xcf\xb7\xffT\xac\x05\xfd\xdd\xb8w\x0f\x82B\xff\xf2\x909`1!\f\x870\x1f\xc1%Y\xc8\x15c \xea\x1cY!\x04\xe4\x91^\x00\x04\xe4\xa6\xba\xc6\xfd\x10\xdf\xe24\xd4&\x17\xdc\xec\xf4\f\n\xb7.\x13\x8e\x1bYENj\xe1\x19~\x1c\xaf\a;d\x9f\xba\xd9T\xd4-\xecX\xc0Y\x83@\xc7\x8b\xff*\xdd\xaa\xc6,o4\xe2\x0f\x16\x01[\xc0\xeb\x7fFI]WF\x1f\f?\xfa\xb1\xe7\xf6t\x027\xb1\xc17.4V\xf81{9\xa3\xb9\x01\xcck@I\xe2\xf1Y\x10E\xa1z/\x05.~Yh%\x8f\x06sB)N\x11P\xf6p\xff\'\xaf\a7\x10+p\xbb\xf3\xb08\xb5)\x00\xeeg\xd0\xee\xe9\x98\x8d\xf8\xb5G\t@f\x1et v\x14\tT\xc5', &(0x7f0000000480)=':--[\x00'], 0x1000) recvfrom(r2, &(0x7f0000000600)=""/203, 0xcb, 0x42, &(0x7f0000000700)=@hci={0x1f, 0xffffffffffffffff, 0x4}, 0x80) 10:13:47 executing program 4: unshare(0x6c060000) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000280), 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000080)=0x3) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) r1 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$EVIOCGPROP(r1, 0x40047438, &(0x7f0000000180)=""/246) close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x2) ioctl$PPPIOCGFLAGS1(r1, 0x10, 0x0) 10:13:47 executing program 1: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000005c0)={{0x14}, [@NFT_MSG_NEWTABLE={0x20, 0x0, 0xa, 0x3, 0x0, 0x0, {0x1}, [@NFTA_TABLE_NAME={0x9, 0x1, 'syz0\x00'}]}, @NFT_MSG_NEWSET={0x3c, 0x9, 0xa, 0x401, 0x0, 0x0, {0x1}, [@NFTA_SET_ID={0x8}, @NFTA_SET_NAME={0x9, 0x2, 'syz2\x00'}, @NFTA_SET_TABLE={0x9, 0x1, 'syz0\x00'}, @NFTA_SET_KEY_LEN={0x8, 0x5, 0x1, 0x0, 0x1f}]}, @NFT_MSG_NEWSETELEM={0x48, 0xc, 0xa, 0x0, 0x0, 0x0, {0x1}, [@NFTA_SET_ELEM_LIST_SET={0x9, 0x2, 'syz2\x00'}, @NFTA_SET_ELEM_LIST_ELEMENTS={0x1c, 0x3, 0x0, 0x1, [{0x18, 0x0, 0x0, 0x1, [@NFTA_SET_ELEM_FLAGS={0x8, 0x3, 0x1, 0x0, 0x4}, @NFTA_SET_ELEM_TIMEOUT={0x4, 0x6}]}]}, @NFTA_SET_ELEM_LIST_TABLE={0x9, 0x1, 'syz0\x00'}]}], {0x14, 0x10}}, 0xcc}}, 0x0) [ 2127.339362][T24953] loop2: detected capacity change from 0 to 264192 [ 2127.620063][T24955] loop3: detected capacity change from 0 to 264192 10:13:48 executing program 0: prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f00000002c0)=0x0) sched_setscheduler(r0, 0x2, &(0x7f0000000080)=0x6) r1 = getpid() sched_setscheduler(r1, 0x2, &(0x7f00000000c0)=0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r2, &(0x7f000057eff8)=@abs, 0x6e) sendmmsg$unix(r3, &(0x7f00000bd000), 0x318, 0x0) recvmmsg(r2, &(0x7f00000000c0), 0x10106, 0x2, 0x0) syz_mount_image$ext4(&(0x7f0000000180)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xfffbffff00000000, 0x8, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000600100000f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000006856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010300), 0x0, 0x640}, {&(0x7f0000010400)="03000000040000000500000016000f000300040000000000000000000f00698c", 0x20, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}, {&(0x7f0000011000)}, {0x0, 0x0, 0x6700000}, {&(0x7f0000000580), 0x0, 0xc000}], 0x0, &(0x7f0000013b00)=ANY=[@ANYBLOB='\x00']) r4 = creat(&(0x7f0000000000)='./file1\x00', 0x18) r5 = socket(0x10, 0x3, 0x0) sendmsg$nl_route(r5, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f00000005c0)=@ipv4_newroute={0x38, 0x18, 0xbad, 0x0, 0x0, {}, [@RTA_ENCAP_TYPE={0x6, 0x15, 0x3}, @RTA_ENCAP={0x14, 0x16, 0x0, 0x1, @SEG6_IPTUNNEL_SRH={0xd}}]}, 0x38}}, 0x0) r6 = socket(0x26, 0x3, 0x0) sendmsg$nl_route(r6, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f00000005c0)=@ipv4_newroute={0x38, 0x18, 0xbad, 0x0, 0x0, {0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6}, [@RTA_ENCAP_TYPE={0x6, 0x15, 0x3}, @RTA_ENCAP={0x14, 0x16, 0x0, 0x1, @SEG6_IPTUNNEL_SRH={0xd}}]}, 0x38}}, 0x0) r7 = socket(0x10, 0x3, 0x0) sendmsg$nl_route(r7, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f00000005c0)=@ipv4_newroute={0x38, 0x18, 0xbad, 0x0, 0x0, {0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6}, [@RTA_ENCAP_TYPE={0x6, 0x15, 0x3}, @RTA_ENCAP={0x14, 0x16, 0x0, 0x1, @SEG6_IPTUNNEL_SRH={0xd}}]}, 0x38}}, 0x0) execveat(r4, 0x0, &(0x7f0000000380)=[&(0x7f00000001c0)='+{!#\x00', &(0x7f0000000300)='ext4\x00', 0x0], &(0x7f00000004c0)=[&(0x7f00000003c0)='ext4\x00', &(0x7f0000000400)='ext4\x00', &(0x7f0000000500)='\x00.D\x04\xe0\xce\x99\xd9\xa9\xac\xac\xadH\xa4\xcf\xb7\xffT\xac\x05\xfd\xdd\xb8w\x0f\x82B\xff\xf2\x909`1!\f\x870\x1f\xc1%Y\xc8\x15c \xea\x1cY!\x04\xe4\x91^\x00\x04\xe4\xa6\xba\xc6\xfd\x10\xdf\xe24\xd4&\x17\xdc\xec\xf4\f\n\xb7.\x13\x8e\x1bYENj\xe1\x19~\x1c\xaf\a;d\x9f\xba\xd9T\xd4-\xecX\xc0Y\x83@\xc7\x8b\xff*\xdd\xaa\xc6,o4\xe2\x0f\x16\x01[\xc0\xeb\x7fFI]WF\x1f\f?\xfa\xb1\xe7\xf6t\x027\xb1\xc17.4V\xf81{9\xa3\xb9\x01\xcck@I\xe2\xf1Y\x10E\xa1z/\x05.~Yh%\x8f\x06sB)N\x11P\xf6p\xff\'\xaf\a7\x10+p\xbb\xf3\xb08\xb5)\x00\xeeg\xd0\xee\xe9\x98\x8d\xf8\xb5G\t@f\x1et v\x14\tT\xc5', &(0x7f0000000480)=':--[\x00'], 0x1000) recvfrom(r2, &(0x7f0000000600)=""/203, 0xcb, 0x42, &(0x7f0000000700)=@hci={0x1f, 0xffffffffffffffff, 0x4}, 0x80) [ 2128.317714][T24953] EXT4-fs (loop2): mounted filesystem without journal. Quota mode: writeback. [ 2128.317745][T24955] EXT4-fs (loop3): mounted filesystem without journal. Quota mode: writeback. 10:13:48 executing program 4: unshare(0x6c060000) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000280), 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000080)=0x3) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) r1 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$EVIOCGPROP(r1, 0x40047438, &(0x7f0000000180)=""/246) close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x2) ioctl$PPPIOCGFLAGS1(r1, 0x10, 0x0) 10:13:48 executing program 3: prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f00000002c0)=0x0) sched_setscheduler(r0, 0x2, &(0x7f0000000080)=0x6) r1 = getpid() sched_setscheduler(r1, 0x2, &(0x7f00000000c0)=0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r2, &(0x7f000057eff8)=@abs, 0x6e) sendmmsg$unix(r3, &(0x7f00000bd000), 0x318, 0x0) recvmmsg(r2, &(0x7f00000000c0), 0x10106, 0x2, 0x0) syz_mount_image$ext4(&(0x7f0000000180)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xfffbffff00000000, 0x8, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000600100000f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000006856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010300), 0x0, 0x640}, {&(0x7f0000010400)="03000000040000000500000016000f000300040000000000000000000f00698c", 0x20, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}, {&(0x7f0000011000)}, {0x0, 0x0, 0x6700000}, {&(0x7f0000000580), 0x0, 0xc000}], 0x0, &(0x7f0000013b00)=ANY=[@ANYBLOB='\x00']) r4 = creat(&(0x7f0000000000)='./file1\x00', 0x18) r5 = socket(0x10, 0x3, 0x0) sendmsg$nl_route(r5, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f00000005c0)=@ipv4_newroute={0x38, 0x18, 0xbad, 0x0, 0x0, {}, [@RTA_ENCAP_TYPE={0x6, 0x15, 0x3}, @RTA_ENCAP={0x14, 0x16, 0x0, 0x1, @SEG6_IPTUNNEL_SRH={0xd}}]}, 0x38}}, 0x0) r6 = socket(0x26, 0x3, 0x0) sendmsg$nl_route(r6, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f00000005c0)=@ipv4_newroute={0x38, 0x18, 0xbad, 0x0, 0x0, {0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6}, [@RTA_ENCAP_TYPE={0x6, 0x15, 0x3}, @RTA_ENCAP={0x14, 0x16, 0x0, 0x1, @SEG6_IPTUNNEL_SRH={0xd}}]}, 0x38}}, 0x0) r7 = socket(0x10, 0x3, 0x0) sendmsg$nl_route(r7, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f00000005c0)=@ipv4_newroute={0x38, 0x18, 0xbad, 0x0, 0x0, {0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6}, [@RTA_ENCAP_TYPE={0x6, 0x15, 0x3}, @RTA_ENCAP={0x14, 0x16, 0x0, 0x1, @SEG6_IPTUNNEL_SRH={0xd}}]}, 0x38}}, 0x0) execveat(r4, 0x0, &(0x7f0000000380)=[&(0x7f00000001c0)='+{!#\x00', &(0x7f0000000300)='ext4\x00', &(0x7f0000000340)='@(\x00'], &(0x7f00000004c0)=[&(0x7f00000003c0)='ext4\x00', &(0x7f0000000400)='ext4\x00', &(0x7f0000000500)='\x00.D\x04\xe0\xce\x99\xd9\xa9\xac\xac\xadH\xa4\xcf\xb7\xffT\xac\x05\xfd\xdd\xb8w\x0f\x82B\xff\xf2\x909`1!\f\x870\x1f\xc1%Y\xc8\x15c \xea\x1cY!\x04\xe4\x91^\x00\x04\xe4\xa6\xba\xc6\xfd\x10\xdf\xe24\xd4&\x17\xdc\xec\xf4\f\n\xb7.\x13\x8e\x1bYENj\xe1\x19~\x1c\xaf\a;d\x9f\xba\xd9T\xd4-\xecX\xc0Y\x83@\xc7\x8b\xff*\xdd\xaa\xc6,o4\xe2\x0f\x16\x01[\xc0\xeb\x7fFI]WF\x1f\f?\xfa\xb1\xe7\xf6t\x027\xb1\xc17.4V\xf81{9\xa3\xb9\x01\xcck@I\xe2\xf1Y\x10E\xa1z/\x05.~Yh%\x8f\x06sB)N\x11P\xf6p\xff\'\xaf\a7\x10+p\xbb\xf3\xb08\xb5)\x00\xeeg\xd0\xee\xe9\x98\x8d\xf8\xb5G\t@f\x1et v\x14\tT\xc5', 0x0], 0x1000) 10:13:48 executing program 2: prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f00000002c0)=0x0) sched_setscheduler(r0, 0x2, &(0x7f0000000080)=0x6) r1 = getpid() sched_setscheduler(r1, 0x2, &(0x7f00000000c0)=0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r2, &(0x7f000057eff8)=@abs, 0x6e) sendmmsg$unix(r3, &(0x7f00000bd000), 0x318, 0x0) recvmmsg(r2, &(0x7f00000000c0), 0x10106, 0x2, 0x0) syz_mount_image$ext4(&(0x7f0000000180)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xfffbffff00000000, 0x8, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000600100000f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000006856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010300), 0x0, 0x640}, {&(0x7f0000010400)="03000000040000000500000016000f000300040000000000000000000f00698c", 0x20, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}, {&(0x7f0000011000)}, {0x0, 0x0, 0x6700000}, {&(0x7f0000000580), 0x0, 0xc000}], 0x0, &(0x7f0000013b00)=ANY=[@ANYBLOB='\x00']) r4 = creat(&(0x7f0000000000)='./file1\x00', 0x18) r5 = socket(0x10, 0x3, 0x0) sendmsg$nl_route(r5, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f00000005c0)=@ipv4_newroute={0x38, 0x18, 0xbad, 0x0, 0x0, {}, [@RTA_ENCAP_TYPE={0x6, 0x15, 0x3}, @RTA_ENCAP={0x14, 0x16, 0x0, 0x1, @SEG6_IPTUNNEL_SRH={0xd}}]}, 0x38}}, 0x0) r6 = socket(0x26, 0x3, 0x0) sendmsg$nl_route(r6, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f00000005c0)=@ipv4_newroute={0x38, 0x18, 0xbad, 0x0, 0x0, {0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6}, [@RTA_ENCAP_TYPE={0x6, 0x15, 0x3}, @RTA_ENCAP={0x14, 0x16, 0x0, 0x1, @SEG6_IPTUNNEL_SRH={0xd}}]}, 0x38}}, 0x0) r7 = socket(0x10, 0x3, 0x0) sendmsg$nl_route(r7, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f00000005c0)=@ipv4_newroute={0x38, 0x18, 0xbad, 0x0, 0x0, {0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6}, [@RTA_ENCAP_TYPE={0x6}, @RTA_ENCAP={0x14, 0x16, 0x0, 0x1, @SEG6_IPTUNNEL_SRH={0xd}}]}, 0x38}}, 0x0) execveat(r4, &(0x7f0000000040)='./file0\x00', &(0x7f0000000380)=[&(0x7f00000001c0)='+{!#\x00', &(0x7f0000000300)='ext4\x00', &(0x7f0000000340)='@(\x00'], &(0x7f00000004c0)=[&(0x7f00000003c0)='ext4\x00', &(0x7f0000000400)='ext4\x00', &(0x7f0000000500)='\x00.D\x04\xe0\xce\x99\xd9\xa9\xac\xac\xadH\xa4\xcf\xb7\xffT\xac\x05\xfd\xdd\xb8w\x0f\x82B\xff\xf2\x909`1!\f\x870\x1f\xc1%Y\xc8\x15c \xea\x1cY!\x04\xe4\x91^\x00\x04\xe4\xa6\xba\xc6\xfd\x10\xdf\xe24\xd4&\x17\xdc\xec\xf4\f\n\xb7.\x13\x8e\x1bYENj\xe1\x19~\x1c\xaf\a;d\x9f\xba\xd9T\xd4-\xecX\xc0Y\x83@\xc7\x8b\xff*\xdd\xaa\xc6,o4\xe2\x0f\x16\x01[\xc0\xeb\x7fFI]WF\x1f\f?\xfa\xb1\xe7\xf6t\x027\xb1\xc17.4V\xf81{9\xa3\xb9\x01\xcck@I\xe2\xf1Y\x10E\xa1z/\x05.~Yh%\x8f\x06sB)N\x11P\xf6p\xff\'\xaf\a7\x10+p\xbb\xf3\xb08\xb5)\x00\xeeg\xd0\xee\xe9\x98\x8d\xf8\xb5G\t@f\x1et v\x14\tT\xc5', &(0x7f0000000480)=':--[\x00'], 0x1000) recvfrom(r2, &(0x7f0000000600)=""/203, 0xcb, 0x42, &(0x7f0000000700)=@hci={0x1f, 0xffffffffffffffff, 0x4}, 0x80) [ 2129.049998][T24989] loop3: detected capacity change from 0 to 264192 [ 2129.111057][T24990] loop2: detected capacity change from 0 to 264192 [ 2129.604027][T24989] EXT4-fs (loop3): mounted filesystem without journal. Quota mode: writeback. [ 2129.621348][T24990] EXT4-fs (loop2): mounted filesystem without journal. Quota mode: writeback. 10:13:59 executing program 5: prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f00000002c0)=0x0) sched_setscheduler(r0, 0x2, &(0x7f0000000080)=0x6) r1 = getpid() sched_setscheduler(r1, 0x2, &(0x7f00000000c0)=0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r2, &(0x7f000057eff8)=@abs, 0x6e) sendmmsg$unix(r3, &(0x7f00000bd000), 0x318, 0x0) recvmmsg(r2, &(0x7f00000000c0), 0x10106, 0x2, 0x0) syz_mount_image$ext4(&(0x7f0000000180)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xfffbffff00000000, 0x8, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000600100000f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000006856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010300), 0x0, 0x640}, {&(0x7f0000010400)="03000000040000000500000016000f000300040000000000000000000f00698c", 0x20, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}, {&(0x7f0000011000)}, {0x0, 0x0, 0x6700000}, {&(0x7f0000000580), 0x0, 0xc000}], 0x0, &(0x7f0000013b00)=ANY=[@ANYBLOB='\x00']) r4 = creat(&(0x7f0000000000)='./file1\x00', 0x18) r5 = socket(0x10, 0x3, 0x0) sendmsg$nl_route(r5, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f00000005c0)=@ipv4_newroute={0x38, 0x18, 0xbad, 0x0, 0x0, {}, [@RTA_ENCAP_TYPE={0x6, 0x15, 0x3}, @RTA_ENCAP={0x14, 0x16, 0x0, 0x1, @SEG6_IPTUNNEL_SRH={0xd}}]}, 0x38}}, 0x0) r6 = socket(0x26, 0x3, 0x0) sendmsg$nl_route(r6, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f00000005c0)=@ipv4_newroute={0x38, 0x18, 0xbad, 0x0, 0x0, {0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6}, [@RTA_ENCAP_TYPE={0x6, 0x15, 0x3}, @RTA_ENCAP={0x14, 0x16, 0x0, 0x1, @SEG6_IPTUNNEL_SRH={0xd}}]}, 0x38}}, 0x0) r7 = socket(0x10, 0x3, 0x0) sendmsg$nl_route(r7, &(0x7f0000000240)={0x0, 0x0, 0x0}, 0x0) execveat(r4, &(0x7f0000000040)='./file0\x00', &(0x7f0000000380)=[&(0x7f00000001c0)='+{!#\x00', &(0x7f0000000300)='ext4\x00', &(0x7f0000000340)='@(\x00'], &(0x7f00000004c0)=[&(0x7f00000003c0)='ext4\x00', &(0x7f0000000400)='ext4\x00', &(0x7f0000000500)='\x00.D\x04\xe0\xce\x99\xd9\xa9\xac\xac\xadH\xa4\xcf\xb7\xffT\xac\x05\xfd\xdd\xb8w\x0f\x82B\xff\xf2\x909`1!\f\x870\x1f\xc1%Y\xc8\x15c \xea\x1cY!\x04\xe4\x91^\x00\x04\xe4\xa6\xba\xc6\xfd\x10\xdf\xe24\xd4&\x17\xdc\xec\xf4\f\n\xb7.\x13\x8e\x1bYENj\xe1\x19~\x1c\xaf\a;d\x9f\xba\xd9T\xd4-\xecX\xc0Y\x83@\xc7\x8b\xff*\xdd\xaa\xc6,o4\xe2\x0f\x16\x01[\xc0\xeb\x7fFI]WF\x1f\f?\xfa\xb1\xe7\xf6t\x027\xb1\xc17.4V\xf81{9\xa3\xb9\x01\xcck@I\xe2\xf1Y\x10E\xa1z/\x05.~Yh%\x8f\x06sB)N\x11P\xf6p\xff\'\xaf\a7\x10+p\xbb\xf3\xb08\xb5)\x00\xeeg\xd0\xee\xe9\x98\x8d\xf8\xb5G\t@f\x1et v\x14\tT\xc5', &(0x7f0000000480)=':--[\x00'], 0x1000) recvfrom(r2, &(0x7f0000000600)=""/203, 0xcb, 0x42, &(0x7f0000000700)=@hci={0x1f, 0xffffffffffffffff, 0x4}, 0x80) 10:13:59 executing program 1: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000005c0)={{0x14}, [@NFT_MSG_NEWTABLE={0x20, 0x0, 0xa, 0x3, 0x0, 0x0, {0x1}, [@NFTA_TABLE_NAME={0x9, 0x1, 'syz0\x00'}]}, @NFT_MSG_NEWSET={0x3c, 0x9, 0xa, 0x401, 0x0, 0x0, {0x1}, [@NFTA_SET_ID={0x8}, @NFTA_SET_NAME={0x9, 0x2, 'syz2\x00'}, @NFTA_SET_TABLE={0x9, 0x1, 'syz0\x00'}, @NFTA_SET_KEY_LEN={0x8, 0x5, 0x1, 0x0, 0x1f}]}, @NFT_MSG_NEWSETELEM={0x48, 0xc, 0xa, 0x201, 0x0, 0x0, {}, [@NFTA_SET_ELEM_LIST_SET={0x9, 0x2, 'syz2\x00'}, @NFTA_SET_ELEM_LIST_ELEMENTS={0x1c, 0x3, 0x0, 0x1, [{0x18, 0x0, 0x0, 0x1, [@NFTA_SET_ELEM_FLAGS={0x8, 0x3, 0x1, 0x0, 0x4}, @NFTA_SET_ELEM_TIMEOUT={0x4, 0x6}]}]}, @NFTA_SET_ELEM_LIST_TABLE={0x9, 0x1, 'syz0\x00'}]}], {0x14, 0x10}}, 0xcc}}, 0x0) 10:13:59 executing program 4: unshare(0x6c060000) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000280), 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000080)=0x3) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) r1 = openat$ppp(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$EVIOCGPROP(r1, 0x40047438, &(0x7f0000000180)=""/246) close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x2) ioctl$PPPIOCGFLAGS1(r1, 0x10, 0x0) 10:13:59 executing program 0: prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f00000002c0)=0x0) sched_setscheduler(r0, 0x2, &(0x7f0000000080)=0x6) r1 = getpid() sched_setscheduler(r1, 0x2, &(0x7f00000000c0)=0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r2, &(0x7f000057eff8)=@abs, 0x6e) sendmmsg$unix(r3, &(0x7f00000bd000), 0x318, 0x0) recvmmsg(r2, &(0x7f00000000c0), 0x10106, 0x2, 0x0) syz_mount_image$ext4(&(0x7f0000000180)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xfffbffff00000000, 0x8, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000600100000f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000006856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010300), 0x0, 0x640}, {&(0x7f0000010400)="03000000040000000500000016000f000300040000000000000000000f00698c", 0x20, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}, {&(0x7f0000011000)}, {0x0, 0x0, 0x6700000}, {&(0x7f0000000580), 0x0, 0xc000}], 0x0, &(0x7f0000013b00)=ANY=[@ANYBLOB='\x00']) r4 = creat(&(0x7f0000000000)='./file1\x00', 0x18) r5 = socket(0x10, 0x3, 0x0) sendmsg$nl_route(r5, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f00000005c0)=@ipv4_newroute={0x38, 0x18, 0xbad, 0x0, 0x0, {}, [@RTA_ENCAP_TYPE={0x6, 0x15, 0x3}, @RTA_ENCAP={0x14, 0x16, 0x0, 0x1, @SEG6_IPTUNNEL_SRH={0xd}}]}, 0x38}}, 0x0) r6 = socket(0x26, 0x3, 0x0) sendmsg$nl_route(r6, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f00000005c0)=@ipv4_newroute={0x38, 0x18, 0xbad, 0x0, 0x0, {0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6}, [@RTA_ENCAP_TYPE={0x6, 0x15, 0x3}, @RTA_ENCAP={0x14, 0x16, 0x0, 0x1, @SEG6_IPTUNNEL_SRH={0xd}}]}, 0x38}}, 0x0) r7 = socket(0x10, 0x3, 0x0) sendmsg$nl_route(r7, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f00000005c0)=@ipv4_newroute={0x34, 0x18, 0xbad, 0x0, 0x0, {0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6}, [@RTA_ENCAP={0x18, 0x16, 0x0, 0x1, @SEG6_IPTUNNEL_SRH={0x14}}]}, 0x34}}, 0x0) execveat(r4, &(0x7f0000000040)='./file0\x00', &(0x7f0000000380)=[&(0x7f00000001c0)='+{!#\x00', &(0x7f0000000300)='ext4\x00', &(0x7f0000000340)='@(\x00'], &(0x7f00000004c0)=[&(0x7f00000003c0)='ext4\x00', &(0x7f0000000400)='ext4\x00', &(0x7f0000000500)='\x00.D\x04\xe0\xce\x99\xd9\xa9\xac\xac\xadH\xa4\xcf\xb7\xffT\xac\x05\xfd\xdd\xb8w\x0f\x82B\xff\xf2\x909`1!\f\x870\x1f\xc1%Y\xc8\x15c \xea\x1cY!\x04\xe4\x91^\x00\x04\xe4\xa6\xba\xc6\xfd\x10\xdf\xe24\xd4&\x17\xdc\xec\xf4\f\n\xb7.\x13\x8e\x1bYENj\xe1\x19~\x1c\xaf\a;d\x9f\xba\xd9T\xd4-\xecX\xc0Y\x83@\xc7\x8b\xff*\xdd\xaa\xc6,o4\xe2\x0f\x16\x01[\xc0\xeb\x7fFI]WF\x1f\f?\xfa\xb1\xe7\xf6t\x027\xb1\xc17.4V\xf81{9\xa3\xb9\x01\xcck@I\xe2\xf1Y\x10E\xa1z/\x05.~Yh%\x8f\x06sB)N\x11P\xf6p\xff\'\xaf\a7\x10+p\xbb\xf3\xb08\xb5)\x00\xeeg\xd0\xee\xe9\x98\x8d\xf8\xb5G\t@f\x1et v\x14\tT\xc5', &(0x7f0000000480)=':--[\x00'], 0x1000) recvfrom(r2, &(0x7f0000000600)=""/203, 0xcb, 0x42, &(0x7f0000000700)=@hci={0x1f, 0xffffffffffffffff, 0x4}, 0x80) 10:13:59 executing program 3: prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f00000002c0)=0x0) sched_setscheduler(r0, 0x2, &(0x7f0000000080)=0x6) r1 = getpid() sched_setscheduler(r1, 0x2, &(0x7f00000000c0)=0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r2, &(0x7f000057eff8)=@abs, 0x6e) sendmmsg$unix(r3, &(0x7f00000bd000), 0x318, 0x0) recvmmsg(r2, &(0x7f00000000c0), 0x10106, 0x2, 0x0) syz_mount_image$ext4(&(0x7f0000000180)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xfffbffff00000000, 0x8, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000600100000f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000006856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010300), 0x0, 0x640}, {&(0x7f0000010400)="03000000040000000500000016000f000300040000000000000000000f00698c", 0x20, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}, {&(0x7f0000011000)}, {0x0, 0x0, 0x6700000}, {&(0x7f0000000580), 0x0, 0xc000}], 0x0, &(0x7f0000013b00)=ANY=[@ANYBLOB='\x00']) creat(&(0x7f0000000000)='./file1\x00', 0x18) r4 = socket(0x10, 0x3, 0x0) sendmsg$nl_route(r4, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f00000005c0)=@ipv4_newroute={0x38, 0x18, 0xbad, 0x0, 0x0, {}, [@RTA_ENCAP_TYPE={0x6, 0x15, 0x3}, @RTA_ENCAP={0x14, 0x16, 0x0, 0x1, @SEG6_IPTUNNEL_SRH={0xd}}]}, 0x38}}, 0x0) r5 = socket(0x26, 0x3, 0x0) sendmsg$nl_route(r5, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f00000005c0)=@ipv4_newroute={0x38, 0x18, 0xbad, 0x0, 0x0, {0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6}, [@RTA_ENCAP_TYPE={0x6, 0x15, 0x3}, @RTA_ENCAP={0x14, 0x16, 0x0, 0x1, @SEG6_IPTUNNEL_SRH={0xd}}]}, 0x38}}, 0x0) r6 = socket(0x10, 0x3, 0x0) sendmsg$nl_route(r6, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f00000005c0)=@ipv4_newroute={0x38, 0x18, 0xbad, 0x0, 0x0, {0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6}, [@RTA_ENCAP_TYPE={0x6, 0x15, 0x3}, @RTA_ENCAP={0x14, 0x16, 0x0, 0x1, @SEG6_IPTUNNEL_SRH={0xd}}]}, 0x38}}, 0x0) 10:13:59 executing program 2: prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f00000002c0)=0x0) sched_setscheduler(r0, 0x2, &(0x7f0000000080)=0x6) r1 = getpid() sched_setscheduler(r1, 0x2, &(0x7f00000000c0)=0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r2, &(0x7f000057eff8)=@abs, 0x6e) sendmmsg$unix(r3, &(0x7f00000bd000), 0x318, 0x0) recvmmsg(r2, &(0x7f00000000c0), 0x10106, 0x2, 0x0) syz_mount_image$ext4(&(0x7f0000000180)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xfffbffff00000000, 0x8, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000600100000f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000006856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010300), 0x0, 0x640}, {&(0x7f0000010400)="03000000040000000500000016000f000300040000000000000000000f00698c", 0x20, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}, {&(0x7f0000011000)}, {0x0, 0x0, 0x6700000}, {&(0x7f0000000580), 0x0, 0xc000}], 0x0, &(0x7f0000013b00)=ANY=[@ANYBLOB='\x00']) r4 = creat(&(0x7f0000000000)='./file1\x00', 0x18) r5 = socket(0x10, 0x3, 0x0) sendmsg$nl_route(r5, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f00000005c0)=@ipv4_newroute={0x38, 0x18, 0xbad, 0x0, 0x0, {}, [@RTA_ENCAP_TYPE={0x6, 0x15, 0x3}, @RTA_ENCAP={0x14, 0x16, 0x0, 0x1, @SEG6_IPTUNNEL_SRH={0xd}}]}, 0x38}}, 0x0) r6 = socket(0x26, 0x3, 0x0) sendmsg$nl_route(r6, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f00000005c0)=@ipv4_newroute={0x38, 0x18, 0xbad, 0x0, 0x0, {0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6}, [@RTA_ENCAP_TYPE={0x6, 0x15, 0x3}, @RTA_ENCAP={0x14, 0x16, 0x0, 0x1, @SEG6_IPTUNNEL_SRH={0xd}}]}, 0x38}}, 0x0) r7 = socket(0x10, 0x3, 0x0) sendmsg$nl_route(r7, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f00000005c0)=@ipv4_newroute={0x38, 0x18, 0xbad, 0x0, 0x0, {0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6}, [@RTA_ENCAP_TYPE={0x6, 0x15, 0x3}, @RTA_ENCAP={0x14, 0x16, 0x0, 0x1, @SEG6_IPTUNNEL_SRH={0xd}}]}, 0x38}}, 0x0) execveat(r4, 0x0, &(0x7f0000000380)=[&(0x7f00000001c0)='+{!#\x00', &(0x7f0000000300)='ext4\x00', &(0x7f0000000340)='@(\x00'], &(0x7f00000004c0)=[&(0x7f00000003c0)='ext4\x00', &(0x7f0000000400)='ext4\x00', &(0x7f0000000500)='\x00.D\x04\xe0\xce\x99\xd9\xa9\xac\xac\xadH\xa4\xcf\xb7\xffT\xac\x05\xfd\xdd\xb8w\x0f\x82B\xff\xf2\x909`1!\f\x870\x1f\xc1%Y\xc8\x15c \xea\x1cY!\x04\xe4\x91^\x00\x04\xe4\xa6\xba\xc6\xfd\x10\xdf\xe24\xd4&\x17\xdc\xec\xf4\f\n\xb7.\x13\x8e\x1bYENj\xe1\x19~\x1c\xaf\a;d\x9f\xba\xd9T\xd4-\xecX\xc0Y\x83@\xc7\x8b\xff*\xdd\xaa\xc6,o4\xe2\x0f\x16\x01[\xc0\xeb\x7fFI]WF\x1f\f?\xfa\xb1\xe7\xf6t\x027\xb1\xc17.4V\xf81{9\xa3\xb9\x01\xcck@I\xe2\xf1Y\x10E\xa1z/\x05.~Yh%\x8f\x06sB)N\x11P\xf6p\xff\'\xaf\a7\x10+p\xbb\xf3\xb08\xb5)\x00\xeeg\xd0\xee\xe9\x98\x8d\xf8\xb5G\t@f\x1et v\x14\tT\xc5', 0x0], 0x1000) 10:13:59 executing program 4: unshare(0x6c060000) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000280), 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000080)=0x3) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) r1 = openat$ppp(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$EVIOCGPROP(r1, 0x40047438, &(0x7f0000000180)=""/246) close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x2) ioctl$PPPIOCGFLAGS1(r1, 0x10, 0x0) [ 2138.980396][T25017] loop3: detected capacity change from 0 to 264192 [ 2139.439198][T25020] loop2: detected capacity change from 0 to 264192 10:14:00 executing program 1: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000005c0)={{0x14}, [@NFT_MSG_NEWTABLE={0x20, 0x0, 0xa, 0x3, 0x0, 0x0, {0x1}, [@NFTA_TABLE_NAME={0x9, 0x1, 'syz0\x00'}]}, @NFT_MSG_NEWSET={0x3c, 0x9, 0xa, 0x401, 0x0, 0x0, {0x1}, [@NFTA_SET_ID={0x8}, @NFTA_SET_NAME={0x9, 0x2, 'syz2\x00'}, @NFTA_SET_TABLE={0x9, 0x1, 'syz0\x00'}, @NFTA_SET_KEY_LEN={0x8, 0x5, 0x1, 0x0, 0x1f}]}, @NFT_MSG_NEWSETELEM={0x48, 0xc, 0xa, 0x201, 0x0, 0x0, {}, [@NFTA_SET_ELEM_LIST_SET={0x9, 0x2, 'syz2\x00'}, @NFTA_SET_ELEM_LIST_ELEMENTS={0x1c, 0x3, 0x0, 0x1, [{0x18, 0x0, 0x0, 0x1, [@NFTA_SET_ELEM_FLAGS={0x8, 0x3, 0x1, 0x0, 0x4}, @NFTA_SET_ELEM_TIMEOUT={0x4, 0x6}]}]}, @NFTA_SET_ELEM_LIST_TABLE={0x9, 0x1, 'syz0\x00'}]}], {0x14, 0x10}}, 0xcc}}, 0x0) [ 2140.183487][T25017] EXT4-fs: failed to create workqueue [ 2140.188919][T25017] EXT4-fs (loop3): mount failed 10:14:00 executing program 3: prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f00000002c0)=0x0) sched_setscheduler(r0, 0x2, &(0x7f0000000080)=0x6) r1 = getpid() sched_setscheduler(r1, 0x2, &(0x7f00000000c0)=0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r2, &(0x7f000057eff8)=@abs, 0x6e) sendmmsg$unix(r3, &(0x7f00000bd000), 0x318, 0x0) recvmmsg(r2, &(0x7f00000000c0), 0x10106, 0x2, 0x0) syz_mount_image$ext4(&(0x7f0000000180)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xfffbffff00000000, 0x8, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000600100000f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000006856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010300), 0x0, 0x640}, {&(0x7f0000010400)="03000000040000000500000016000f000300040000000000000000000f00698c", 0x20, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}, {&(0x7f0000011000)}, {0x0, 0x0, 0x6700000}, {&(0x7f0000000580), 0x0, 0xc000}], 0x0, &(0x7f0000013b00)=ANY=[@ANYBLOB='\x00']) creat(&(0x7f0000000000)='./file1\x00', 0x18) r4 = socket(0x10, 0x3, 0x0) sendmsg$nl_route(r4, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f00000005c0)=@ipv4_newroute={0x38, 0x18, 0xbad, 0x0, 0x0, {}, [@RTA_ENCAP_TYPE={0x6, 0x15, 0x3}, @RTA_ENCAP={0x14, 0x16, 0x0, 0x1, @SEG6_IPTUNNEL_SRH={0xd}}]}, 0x38}}, 0x0) r5 = socket(0x26, 0x3, 0x0) sendmsg$nl_route(r5, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f00000005c0)=@ipv4_newroute={0x38, 0x18, 0xbad, 0x0, 0x0, {0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6}, [@RTA_ENCAP_TYPE={0x6, 0x15, 0x3}, @RTA_ENCAP={0x14, 0x16, 0x0, 0x1, @SEG6_IPTUNNEL_SRH={0xd}}]}, 0x38}}, 0x0) r6 = socket(0x10, 0x3, 0x0) sendmsg$nl_route(r6, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f00000005c0)=@ipv4_newroute={0x38, 0x18, 0xbad, 0x0, 0x0, {0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6}, [@RTA_ENCAP_TYPE={0x6, 0x15, 0x3}, @RTA_ENCAP={0x14, 0x16, 0x0, 0x1, @SEG6_IPTUNNEL_SRH={0xd}}]}, 0x38}}, 0x0) 10:14:00 executing program 1: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000005c0)={{0x14}, [@NFT_MSG_NEWTABLE={0x20, 0x0, 0xa, 0x3, 0x0, 0x0, {0x1}, [@NFTA_TABLE_NAME={0x9, 0x1, 'syz0\x00'}]}, @NFT_MSG_NEWSET={0x3c, 0x9, 0xa, 0x401, 0x0, 0x0, {0x1}, [@NFTA_SET_ID={0x8}, @NFTA_SET_NAME={0x9, 0x2, 'syz2\x00'}, @NFTA_SET_TABLE={0x9, 0x1, 'syz0\x00'}, @NFTA_SET_KEY_LEN={0x8, 0x5, 0x1, 0x0, 0x1f}]}, @NFT_MSG_NEWSETELEM={0x48, 0xc, 0xa, 0x201, 0x0, 0x0, {}, [@NFTA_SET_ELEM_LIST_SET={0x9, 0x2, 'syz2\x00'}, @NFTA_SET_ELEM_LIST_ELEMENTS={0x1c, 0x3, 0x0, 0x1, [{0x18, 0x0, 0x0, 0x1, [@NFTA_SET_ELEM_FLAGS={0x8, 0x3, 0x1, 0x0, 0x4}, @NFTA_SET_ELEM_TIMEOUT={0x4, 0x6}]}]}, @NFTA_SET_ELEM_LIST_TABLE={0x9, 0x1, 'syz0\x00'}]}], {0x14, 0x10}}, 0xcc}}, 0x0) 10:14:00 executing program 0: prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f00000002c0)=0x0) sched_setscheduler(r0, 0x2, &(0x7f0000000080)=0x6) r1 = getpid() sched_setscheduler(r1, 0x2, &(0x7f00000000c0)=0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r2, &(0x7f000057eff8)=@abs, 0x6e) sendmmsg$unix(r3, &(0x7f00000bd000), 0x318, 0x0) recvmmsg(r2, &(0x7f00000000c0), 0x10106, 0x2, 0x0) syz_mount_image$ext4(&(0x7f0000000180)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xfffbffff00000000, 0x8, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000600100000f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000006856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010300), 0x0, 0x640}, {&(0x7f0000010400)="03000000040000000500000016000f000300040000000000000000000f00698c", 0x20, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}, {&(0x7f0000011000)}, {0x0, 0x0, 0x6700000}, {&(0x7f0000000580), 0x0, 0xc000}], 0x0, &(0x7f0000013b00)=ANY=[@ANYBLOB='\x00']) r4 = creat(&(0x7f0000000000)='./file1\x00', 0x18) r5 = socket(0x10, 0x3, 0x0) sendmsg$nl_route(r5, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f00000005c0)=@ipv4_newroute={0x38, 0x18, 0xbad, 0x0, 0x0, {}, [@RTA_ENCAP_TYPE={0x6, 0x15, 0x3}, @RTA_ENCAP={0x14, 0x16, 0x0, 0x1, @SEG6_IPTUNNEL_SRH={0xd}}]}, 0x38}}, 0x0) r6 = socket(0x26, 0x3, 0x0) sendmsg$nl_route(r6, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f00000005c0)=@ipv4_newroute={0x38, 0x18, 0xbad, 0x0, 0x0, {0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6}, [@RTA_ENCAP_TYPE={0x6, 0x15, 0x3}, @RTA_ENCAP={0x14, 0x16, 0x0, 0x1, @SEG6_IPTUNNEL_SRH={0xd}}]}, 0x38}}, 0x0) r7 = socket(0x10, 0x3, 0x0) sendmsg$nl_route(r7, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f00000005c0)=@ipv4_newroute={0x34, 0x18, 0xbad, 0x0, 0x0, {0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6}, [@RTA_ENCAP={0x18, 0x16, 0x0, 0x1, @SEG6_IPTUNNEL_SRH={0x14}}]}, 0x34}}, 0x0) execveat(r4, &(0x7f0000000040)='./file0\x00', &(0x7f0000000380)=[&(0x7f00000001c0)='+{!#\x00', &(0x7f0000000300)='ext4\x00', &(0x7f0000000340)='@(\x00'], &(0x7f00000004c0)=[&(0x7f00000003c0)='ext4\x00', &(0x7f0000000400)='ext4\x00', &(0x7f0000000500)='\x00.D\x04\xe0\xce\x99\xd9\xa9\xac\xac\xadH\xa4\xcf\xb7\xffT\xac\x05\xfd\xdd\xb8w\x0f\x82B\xff\xf2\x909`1!\f\x870\x1f\xc1%Y\xc8\x15c \xea\x1cY!\x04\xe4\x91^\x00\x04\xe4\xa6\xba\xc6\xfd\x10\xdf\xe24\xd4&\x17\xdc\xec\xf4\f\n\xb7.\x13\x8e\x1bYENj\xe1\x19~\x1c\xaf\a;d\x9f\xba\xd9T\xd4-\xecX\xc0Y\x83@\xc7\x8b\xff*\xdd\xaa\xc6,o4\xe2\x0f\x16\x01[\xc0\xeb\x7fFI]WF\x1f\f?\xfa\xb1\xe7\xf6t\x027\xb1\xc17.4V\xf81{9\xa3\xb9\x01\xcck@I\xe2\xf1Y\x10E\xa1z/\x05.~Yh%\x8f\x06sB)N\x11P\xf6p\xff\'\xaf\a7\x10+p\xbb\xf3\xb08\xb5)\x00\xeeg\xd0\xee\xe9\x98\x8d\xf8\xb5G\t@f\x1et v\x14\tT\xc5', &(0x7f0000000480)=':--[\x00'], 0x1000) recvfrom(r2, &(0x7f0000000600)=""/203, 0xcb, 0x42, &(0x7f0000000700)=@hci={0x1f, 0xffffffffffffffff, 0x4}, 0x80) 10:14:00 executing program 4: unshare(0x6c060000) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000280), 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000080)=0x3) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) r1 = openat$ppp(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$EVIOCGPROP(r1, 0x40047438, &(0x7f0000000180)=""/246) close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x2) ioctl$PPPIOCGFLAGS1(r1, 0x10, 0x0) [ 2140.291801][T25020] EXT4-fs (loop2): mounted filesystem without journal. Quota mode: writeback. [ 2140.302797][T25012] I/O error, dev loop3, sector 264064 op 0x0:(READ) flags 0x80700 phys_seg 1 prio class 0 [ 2140.669420][T25051] loop3: detected capacity change from 0 to 264192 [ 2141.303966][T25051] EXT4-fs (loop3): mounted filesystem without journal. Quota mode: writeback. 10:14:08 executing program 5: prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f00000002c0)=0x0) sched_setscheduler(r0, 0x2, &(0x7f0000000080)=0x6) r1 = getpid() sched_setscheduler(r1, 0x2, &(0x7f00000000c0)=0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r2, &(0x7f000057eff8)=@abs, 0x6e) sendmmsg$unix(r3, &(0x7f00000bd000), 0x318, 0x0) recvmmsg(r2, &(0x7f00000000c0), 0x10106, 0x2, 0x0) syz_mount_image$ext4(&(0x7f0000000180)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xfffbffff00000000, 0x8, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000600100000f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000006856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010300), 0x0, 0x640}, {&(0x7f0000010400)="03000000040000000500000016000f000300040000000000000000000f00698c", 0x20, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}, {&(0x7f0000011000)}, {0x0, 0x0, 0x6700000}, {&(0x7f0000000580), 0x0, 0xc000}], 0x0, &(0x7f0000013b00)=ANY=[@ANYBLOB='\x00']) r4 = creat(&(0x7f0000000000)='./file1\x00', 0x18) r5 = socket(0x10, 0x3, 0x0) sendmsg$nl_route(r5, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f00000005c0)=@ipv4_newroute={0x38, 0x18, 0xbad, 0x0, 0x0, {}, [@RTA_ENCAP_TYPE={0x6, 0x15, 0x3}, @RTA_ENCAP={0x14, 0x16, 0x0, 0x1, @SEG6_IPTUNNEL_SRH={0xd}}]}, 0x38}}, 0x0) r6 = socket(0x26, 0x3, 0x0) sendmsg$nl_route(r6, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f00000005c0)=@ipv4_newroute={0x38, 0x18, 0xbad, 0x0, 0x0, {0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6}, [@RTA_ENCAP_TYPE={0x6, 0x15, 0x3}, @RTA_ENCAP={0x14, 0x16, 0x0, 0x1, @SEG6_IPTUNNEL_SRH={0xd}}]}, 0x38}}, 0x0) r7 = socket(0x10, 0x3, 0x0) sendmsg$nl_route(r7, &(0x7f0000000240)={0x0, 0x0, 0x0}, 0x0) execveat(r4, &(0x7f0000000040)='./file0\x00', &(0x7f0000000380)=[&(0x7f00000001c0)='+{!#\x00', &(0x7f0000000300)='ext4\x00', &(0x7f0000000340)='@(\x00'], &(0x7f00000004c0)=[&(0x7f00000003c0)='ext4\x00', &(0x7f0000000400)='ext4\x00', &(0x7f0000000500)='\x00.D\x04\xe0\xce\x99\xd9\xa9\xac\xac\xadH\xa4\xcf\xb7\xffT\xac\x05\xfd\xdd\xb8w\x0f\x82B\xff\xf2\x909`1!\f\x870\x1f\xc1%Y\xc8\x15c \xea\x1cY!\x04\xe4\x91^\x00\x04\xe4\xa6\xba\xc6\xfd\x10\xdf\xe24\xd4&\x17\xdc\xec\xf4\f\n\xb7.\x13\x8e\x1bYENj\xe1\x19~\x1c\xaf\a;d\x9f\xba\xd9T\xd4-\xecX\xc0Y\x83@\xc7\x8b\xff*\xdd\xaa\xc6,o4\xe2\x0f\x16\x01[\xc0\xeb\x7fFI]WF\x1f\f?\xfa\xb1\xe7\xf6t\x027\xb1\xc17.4V\xf81{9\xa3\xb9\x01\xcck@I\xe2\xf1Y\x10E\xa1z/\x05.~Yh%\x8f\x06sB)N\x11P\xf6p\xff\'\xaf\a7\x10+p\xbb\xf3\xb08\xb5)\x00\xeeg\xd0\xee\xe9\x98\x8d\xf8\xb5G\t@f\x1et v\x14\tT\xc5', &(0x7f0000000480)=':--[\x00'], 0x1000) recvfrom(r2, &(0x7f0000000600)=""/203, 0xcb, 0x42, &(0x7f0000000700)=@hci={0x1f, 0xffffffffffffffff, 0x4}, 0x80) 10:14:08 executing program 2: prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f00000002c0)=0x0) sched_setscheduler(r0, 0x2, &(0x7f0000000080)=0x6) r1 = getpid() sched_setscheduler(r1, 0x2, &(0x7f00000000c0)=0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r2, &(0x7f000057eff8)=@abs, 0x6e) sendmmsg$unix(r3, &(0x7f00000bd000), 0x318, 0x0) recvmmsg(r2, &(0x7f00000000c0), 0x10106, 0x2, 0x0) syz_mount_image$ext4(&(0x7f0000000180)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xfffbffff00000000, 0x8, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000600100000f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000006856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010300), 0x0, 0x640}, {&(0x7f0000010400)="03000000040000000500000016000f000300040000000000000000000f00698c", 0x20, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}, {&(0x7f0000011000)}, {0x0, 0x0, 0x6700000}, {&(0x7f0000000580), 0x0, 0xc000}], 0x0, &(0x7f0000013b00)=ANY=[@ANYBLOB='\x00']) r4 = creat(&(0x7f0000000000)='./file1\x00', 0x18) r5 = socket(0x10, 0x3, 0x0) sendmsg$nl_route(r5, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f00000005c0)=@ipv4_newroute={0x38, 0x18, 0xbad, 0x0, 0x0, {}, [@RTA_ENCAP_TYPE={0x6, 0x15, 0x3}, @RTA_ENCAP={0x14, 0x16, 0x0, 0x1, @SEG6_IPTUNNEL_SRH={0xd}}]}, 0x38}}, 0x0) r6 = socket(0x26, 0x3, 0x0) sendmsg$nl_route(r6, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f00000005c0)=@ipv4_newroute={0x38, 0x18, 0xbad, 0x0, 0x0, {0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6}, [@RTA_ENCAP_TYPE={0x6, 0x15, 0x3}, @RTA_ENCAP={0x14, 0x16, 0x0, 0x1, @SEG6_IPTUNNEL_SRH={0xd}}]}, 0x38}}, 0x0) r7 = socket(0x10, 0x0, 0x0) sendmsg$nl_route(r7, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f00000005c0)=@ipv4_newroute={0x38, 0x18, 0xbad, 0x0, 0x0, {0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6}, [@RTA_ENCAP_TYPE={0x6, 0x15, 0x3}, @RTA_ENCAP={0x14, 0x16, 0x0, 0x1, @SEG6_IPTUNNEL_SRH={0xd}}]}, 0x38}}, 0x0) execveat(r4, &(0x7f0000000040)='./file0\x00', &(0x7f0000000380)=[&(0x7f00000001c0)='+{!#\x00', &(0x7f0000000300)='ext4\x00', &(0x7f0000000340)='@(\x00'], &(0x7f00000004c0)=[&(0x7f00000003c0)='ext4\x00', &(0x7f0000000400)='ext4\x00', &(0x7f0000000500)='\x00.D\x04\xe0\xce\x99\xd9\xa9\xac\xac\xadH\xa4\xcf\xb7\xffT\xac\x05\xfd\xdd\xb8w\x0f\x82B\xff\xf2\x909`1!\f\x870\x1f\xc1%Y\xc8\x15c \xea\x1cY!\x04\xe4\x91^\x00\x04\xe4\xa6\xba\xc6\xfd\x10\xdf\xe24\xd4&\x17\xdc\xec\xf4\f\n\xb7.\x13\x8e\x1bYENj\xe1\x19~\x1c\xaf\a;d\x9f\xba\xd9T\xd4-\xecX\xc0Y\x83@\xc7\x8b\xff*\xdd\xaa\xc6,o4\xe2\x0f\x16\x01[\xc0\xeb\x7fFI]WF\x1f\f?\xfa\xb1\xe7\xf6t\x027\xb1\xc17.4V\xf81{9\xa3\xb9\x01\xcck@I\xe2\xf1Y\x10E\xa1z/\x05.~Yh%\x8f\x06sB)N\x11P\xf6p\xff\'\xaf\a7\x10+p\xbb\xf3\xb08\xb5)\x00\xeeg\xd0\xee\xe9\x98\x8d\xf8\xb5G\t@f\x1et v\x14\tT\xc5', &(0x7f0000000480)=':--[\x00'], 0x1000) recvfrom(r2, &(0x7f0000000600)=""/203, 0xcb, 0x42, &(0x7f0000000700)=@hci={0x1f, 0xffffffffffffffff, 0x4}, 0x80) 10:14:08 executing program 1: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000005c0)={{0x14}, [@NFT_MSG_NEWTABLE={0x20, 0x0, 0xa, 0x3, 0x0, 0x0, {0x1}, [@NFTA_TABLE_NAME={0x9, 0x1, 'syz0\x00'}]}, @NFT_MSG_NEWSET={0x3c, 0x9, 0xa, 0x401, 0x0, 0x0, {0x1}, [@NFTA_SET_ID={0x8}, @NFTA_SET_NAME={0x9, 0x2, 'syz2\x00'}, @NFTA_SET_TABLE={0x9, 0x1, 'syz0\x00'}, @NFTA_SET_KEY_LEN={0x8, 0x5, 0x1, 0x0, 0x1f}]}, @NFT_MSG_NEWSETELEM={0x3c, 0xc, 0xa, 0x201, 0x0, 0x0, {0x1}, [@NFTA_SET_ELEM_LIST_SET={0x9, 0x2, 'syz2\x00'}, @NFTA_SET_ELEM_LIST_ELEMENTS={0x1c, 0x3, 0x0, 0x1, [{0x18, 0x0, 0x0, 0x1, [@NFTA_SET_ELEM_FLAGS={0x8, 0x3, 0x1, 0x0, 0x4}, @NFTA_SET_ELEM_TIMEOUT={0xc, 0x6}]}]}]}], {0x14, 0x10}}, 0xc0}}, 0x0) 10:14:08 executing program 4: unshare(0x6c060000) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000280), 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000080)=0x3) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) r1 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$EVIOCGPROP(0xffffffffffffffff, 0x40047438, &(0x7f0000000180)=""/246) close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x2) ioctl$PPPIOCGFLAGS1(r1, 0x10, 0x0) 10:14:08 executing program 3: prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f00000002c0)=0x0) sched_setscheduler(r0, 0x2, &(0x7f0000000080)=0x6) r1 = getpid() sched_setscheduler(r1, 0x2, &(0x7f00000000c0)=0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r2, &(0x7f000057eff8)=@abs, 0x6e) sendmmsg$unix(r3, &(0x7f00000bd000), 0x318, 0x0) recvmmsg(r2, &(0x7f00000000c0), 0x10106, 0x2, 0x0) syz_mount_image$ext4(&(0x7f0000000180)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xfffbffff00000000, 0x8, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000600100000f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000006856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010300), 0x0, 0x640}, {&(0x7f0000010400)="03000000040000000500000016000f000300040000000000000000000f00698c", 0x20, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}, {&(0x7f0000011000)}, {0x0, 0x0, 0x6700000}, {&(0x7f0000000580), 0x0, 0xc000}], 0x0, &(0x7f0000013b00)=ANY=[@ANYBLOB='\x00']) creat(&(0x7f0000000000)='./file1\x00', 0x18) r4 = socket(0x10, 0x3, 0x0) sendmsg$nl_route(r4, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f00000005c0)=@ipv4_newroute={0x38, 0x18, 0xbad, 0x0, 0x0, {}, [@RTA_ENCAP_TYPE={0x6, 0x15, 0x3}, @RTA_ENCAP={0x14, 0x16, 0x0, 0x1, @SEG6_IPTUNNEL_SRH={0xd}}]}, 0x38}}, 0x0) r5 = socket(0x26, 0x3, 0x0) sendmsg$nl_route(r5, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f00000005c0)=@ipv4_newroute={0x38, 0x18, 0xbad, 0x0, 0x0, {0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6}, [@RTA_ENCAP_TYPE={0x6, 0x15, 0x3}, @RTA_ENCAP={0x14, 0x16, 0x0, 0x1, @SEG6_IPTUNNEL_SRH={0xd}}]}, 0x38}}, 0x0) r6 = socket(0x10, 0x3, 0x0) sendmsg$nl_route(r6, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f00000005c0)=@ipv4_newroute={0x38, 0x18, 0xbad, 0x0, 0x0, {0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6}, [@RTA_ENCAP_TYPE={0x6, 0x15, 0x3}, @RTA_ENCAP={0x14, 0x16, 0x0, 0x1, @SEG6_IPTUNNEL_SRH={0xd}}]}, 0x38}}, 0x0) 10:14:08 executing program 0: prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f00000002c0)=0x0) sched_setscheduler(r0, 0x2, &(0x7f0000000080)=0x6) r1 = getpid() sched_setscheduler(r1, 0x2, &(0x7f00000000c0)=0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r2, &(0x7f000057eff8)=@abs, 0x6e) sendmmsg$unix(r3, &(0x7f00000bd000), 0x318, 0x0) recvmmsg(r2, &(0x7f00000000c0), 0x10106, 0x2, 0x0) syz_mount_image$ext4(&(0x7f0000000180)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xfffbffff00000000, 0x8, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000600100000f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000006856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010300), 0x0, 0x640}, {&(0x7f0000010400)="03000000040000000500000016000f000300040000000000000000000f00698c", 0x20, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}, {&(0x7f0000011000)}, {0x0, 0x0, 0x6700000}, {&(0x7f0000000580), 0x0, 0xc000}], 0x0, &(0x7f0000013b00)=ANY=[@ANYBLOB='\x00']) r4 = creat(&(0x7f0000000000)='./file1\x00', 0x18) r5 = socket(0x10, 0x3, 0x0) sendmsg$nl_route(r5, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f00000005c0)=@ipv4_newroute={0x38, 0x18, 0xbad, 0x0, 0x0, {}, [@RTA_ENCAP_TYPE={0x6, 0x15, 0x3}, @RTA_ENCAP={0x14, 0x16, 0x0, 0x1, @SEG6_IPTUNNEL_SRH={0xd}}]}, 0x38}}, 0x0) r6 = socket(0x26, 0x3, 0x0) sendmsg$nl_route(r6, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f00000005c0)=@ipv4_newroute={0x38, 0x18, 0xbad, 0x0, 0x0, {0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6}, [@RTA_ENCAP_TYPE={0x6, 0x15, 0x3}, @RTA_ENCAP={0x14, 0x16, 0x0, 0x1, @SEG6_IPTUNNEL_SRH={0xd}}]}, 0x38}}, 0x0) r7 = socket(0x10, 0x3, 0x0) sendmsg$nl_route(r7, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f00000005c0)=@ipv4_newroute={0x34, 0x18, 0xbad, 0x0, 0x0, {0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6}, [@RTA_ENCAP={0x18, 0x16, 0x0, 0x1, @SEG6_IPTUNNEL_SRH={0x14}}]}, 0x34}}, 0x0) execveat(r4, &(0x7f0000000040)='./file0\x00', &(0x7f0000000380)=[&(0x7f00000001c0)='+{!#\x00', &(0x7f0000000300)='ext4\x00', &(0x7f0000000340)='@(\x00'], &(0x7f00000004c0)=[&(0x7f00000003c0)='ext4\x00', &(0x7f0000000400)='ext4\x00', &(0x7f0000000500)='\x00.D\x04\xe0\xce\x99\xd9\xa9\xac\xac\xadH\xa4\xcf\xb7\xffT\xac\x05\xfd\xdd\xb8w\x0f\x82B\xff\xf2\x909`1!\f\x870\x1f\xc1%Y\xc8\x15c \xea\x1cY!\x04\xe4\x91^\x00\x04\xe4\xa6\xba\xc6\xfd\x10\xdf\xe24\xd4&\x17\xdc\xec\xf4\f\n\xb7.\x13\x8e\x1bYENj\xe1\x19~\x1c\xaf\a;d\x9f\xba\xd9T\xd4-\xecX\xc0Y\x83@\xc7\x8b\xff*\xdd\xaa\xc6,o4\xe2\x0f\x16\x01[\xc0\xeb\x7fFI]WF\x1f\f?\xfa\xb1\xe7\xf6t\x027\xb1\xc17.4V\xf81{9\xa3\xb9\x01\xcck@I\xe2\xf1Y\x10E\xa1z/\x05.~Yh%\x8f\x06sB)N\x11P\xf6p\xff\'\xaf\a7\x10+p\xbb\xf3\xb08\xb5)\x00\xeeg\xd0\xee\xe9\x98\x8d\xf8\xb5G\t@f\x1et v\x14\tT\xc5', &(0x7f0000000480)=':--[\x00'], 0x1000) recvfrom(r2, &(0x7f0000000600)=""/203, 0xcb, 0x42, &(0x7f0000000700)=@hci={0x1f, 0xffffffffffffffff, 0x4}, 0x80) 10:14:08 executing program 4: unshare(0x6c060000) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000280), 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000080)=0x3) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) r1 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$EVIOCGPROP(0xffffffffffffffff, 0x40047438, &(0x7f0000000180)=""/246) close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x2) ioctl$PPPIOCGFLAGS1(r1, 0x10, 0x0) 10:14:08 executing program 1: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000005c0)={{0x14}, [@NFT_MSG_NEWTABLE={0x20, 0x0, 0xa, 0x3, 0x0, 0x0, {0x1}, [@NFTA_TABLE_NAME={0x9, 0x1, 'syz0\x00'}]}, @NFT_MSG_NEWSET={0x3c, 0x9, 0xa, 0x401, 0x0, 0x0, {0x1}, [@NFTA_SET_ID={0x8}, @NFTA_SET_NAME={0x9, 0x2, 'syz2\x00'}, @NFTA_SET_TABLE={0x9, 0x1, 'syz0\x00'}, @NFTA_SET_KEY_LEN={0x8, 0x5, 0x1, 0x0, 0x1f}]}, @NFT_MSG_NEWSETELEM={0x3c, 0xc, 0xa, 0x201, 0x0, 0x0, {0x1}, [@NFTA_SET_ELEM_LIST_SET={0x9, 0x2, 'syz2\x00'}, @NFTA_SET_ELEM_LIST_ELEMENTS={0x1c, 0x3, 0x0, 0x1, [{0x18, 0x0, 0x0, 0x1, [@NFTA_SET_ELEM_FLAGS={0x8, 0x3, 0x1, 0x0, 0x4}, @NFTA_SET_ELEM_TIMEOUT={0xc, 0x6}]}]}]}], {0x14, 0x10}}, 0xc0}}, 0x0) [ 2148.759394][T25083] loop2: detected capacity change from 0 to 264192 [ 2149.139507][T25085] loop3: detected capacity change from 0 to 264192 [ 2150.400884][T25083] EXT4-fs: failed to create workqueue [ 2150.406292][T25083] EXT4-fs (loop2): mount failed 10:14:10 executing program 2: prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f00000002c0)=0x0) sched_setscheduler(r0, 0x2, &(0x7f0000000080)=0x6) r1 = getpid() sched_setscheduler(r1, 0x2, &(0x7f00000000c0)=0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r2, &(0x7f000057eff8)=@abs, 0x6e) sendmmsg$unix(r3, &(0x7f00000bd000), 0x318, 0x0) recvmmsg(r2, &(0x7f00000000c0), 0x10106, 0x2, 0x0) syz_mount_image$ext4(&(0x7f0000000180)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xfffbffff00000000, 0x8, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000600100000f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000006856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010300), 0x0, 0x640}, {&(0x7f0000010400)="03000000040000000500000016000f000300040000000000000000000f00698c", 0x20, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}, {&(0x7f0000011000)}, {0x0, 0x0, 0x6700000}, {&(0x7f0000000580), 0x0, 0xc000}], 0x0, &(0x7f0000013b00)=ANY=[@ANYBLOB='\x00']) r4 = creat(&(0x7f0000000000)='./file1\x00', 0x18) r5 = socket(0x10, 0x3, 0x0) sendmsg$nl_route(r5, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f00000005c0)=@ipv4_newroute={0x38, 0x18, 0xbad, 0x0, 0x0, {}, [@RTA_ENCAP_TYPE={0x6, 0x15, 0x3}, @RTA_ENCAP={0x14, 0x16, 0x0, 0x1, @SEG6_IPTUNNEL_SRH={0xd}}]}, 0x38}}, 0x0) r6 = socket(0x26, 0x3, 0x0) sendmsg$nl_route(r6, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f00000005c0)=@ipv4_newroute={0x38, 0x18, 0xbad, 0x0, 0x0, {0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6}, [@RTA_ENCAP_TYPE={0x6, 0x15, 0x3}, @RTA_ENCAP={0x14, 0x16, 0x0, 0x1, @SEG6_IPTUNNEL_SRH={0xd}}]}, 0x38}}, 0x0) r7 = socket(0x10, 0x0, 0x0) sendmsg$nl_route(r7, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f00000005c0)=@ipv4_newroute={0x38, 0x18, 0xbad, 0x0, 0x0, {0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6}, [@RTA_ENCAP_TYPE={0x6, 0x15, 0x3}, @RTA_ENCAP={0x14, 0x16, 0x0, 0x1, @SEG6_IPTUNNEL_SRH={0xd}}]}, 0x38}}, 0x0) execveat(r4, &(0x7f0000000040)='./file0\x00', &(0x7f0000000380)=[&(0x7f00000001c0)='+{!#\x00', &(0x7f0000000300)='ext4\x00', &(0x7f0000000340)='@(\x00'], &(0x7f00000004c0)=[&(0x7f00000003c0)='ext4\x00', &(0x7f0000000400)='ext4\x00', &(0x7f0000000500)='\x00.D\x04\xe0\xce\x99\xd9\xa9\xac\xac\xadH\xa4\xcf\xb7\xffT\xac\x05\xfd\xdd\xb8w\x0f\x82B\xff\xf2\x909`1!\f\x870\x1f\xc1%Y\xc8\x15c \xea\x1cY!\x04\xe4\x91^\x00\x04\xe4\xa6\xba\xc6\xfd\x10\xdf\xe24\xd4&\x17\xdc\xec\xf4\f\n\xb7.\x13\x8e\x1bYENj\xe1\x19~\x1c\xaf\a;d\x9f\xba\xd9T\xd4-\xecX\xc0Y\x83@\xc7\x8b\xff*\xdd\xaa\xc6,o4\xe2\x0f\x16\x01[\xc0\xeb\x7fFI]WF\x1f\f?\xfa\xb1\xe7\xf6t\x027\xb1\xc17.4V\xf81{9\xa3\xb9\x01\xcck@I\xe2\xf1Y\x10E\xa1z/\x05.~Yh%\x8f\x06sB)N\x11P\xf6p\xff\'\xaf\a7\x10+p\xbb\xf3\xb08\xb5)\x00\xeeg\xd0\xee\xe9\x98\x8d\xf8\xb5G\t@f\x1et v\x14\tT\xc5', &(0x7f0000000480)=':--[\x00'], 0x1000) recvfrom(r2, &(0x7f0000000600)=""/203, 0xcb, 0x42, &(0x7f0000000700)=@hci={0x1f, 0xffffffffffffffff, 0x4}, 0x80) 10:14:10 executing program 1: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000005c0)={{0x14}, [@NFT_MSG_NEWTABLE={0x20, 0x0, 0xa, 0x3, 0x0, 0x0, {0x1}, [@NFTA_TABLE_NAME={0x9, 0x1, 'syz0\x00'}]}, @NFT_MSG_NEWSET={0x3c, 0x9, 0xa, 0x401, 0x0, 0x0, {0x1}, [@NFTA_SET_ID={0x8}, @NFTA_SET_NAME={0x9, 0x2, 'syz2\x00'}, @NFTA_SET_TABLE={0x9, 0x1, 'syz0\x00'}, @NFTA_SET_KEY_LEN={0x8, 0x5, 0x1, 0x0, 0x1f}]}, @NFT_MSG_NEWSETELEM={0x3c, 0xc, 0xa, 0x201, 0x0, 0x0, {0x1}, [@NFTA_SET_ELEM_LIST_SET={0x9, 0x2, 'syz2\x00'}, @NFTA_SET_ELEM_LIST_ELEMENTS={0x1c, 0x3, 0x0, 0x1, [{0x18, 0x0, 0x0, 0x1, [@NFTA_SET_ELEM_FLAGS={0x8, 0x3, 0x1, 0x0, 0x4}, @NFTA_SET_ELEM_TIMEOUT={0xc, 0x6}]}]}]}], {0x14, 0x10}}, 0xc0}}, 0x0) 10:14:11 executing program 4: unshare(0x6c060000) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000280), 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000080)=0x3) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) r1 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$EVIOCGPROP(0xffffffffffffffff, 0x40047438, &(0x7f0000000180)=""/246) close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x2) ioctl$PPPIOCGFLAGS1(r1, 0x10, 0x0) 10:14:11 executing program 1: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000005c0)={{0x14}, [@NFT_MSG_NEWTABLE={0x20, 0x0, 0xa, 0x3, 0x0, 0x0, {0x1}, [@NFTA_TABLE_NAME={0x9, 0x1, 'syz0\x00'}]}, @NFT_MSG_NEWSET={0x3c, 0x9, 0xa, 0x401, 0x0, 0x0, {0x1}, [@NFTA_SET_ID={0x8}, @NFTA_SET_NAME={0x9, 0x2, 'syz2\x00'}, @NFTA_SET_TABLE={0x9, 0x1, 'syz0\x00'}, @NFTA_SET_KEY_LEN={0x8, 0x5, 0x1, 0x0, 0x1f}]}, @NFT_MSG_NEWSETELEM={0x2c, 0xc, 0xa, 0x201, 0x0, 0x0, {0x1}, [@NFTA_SET_ELEM_LIST_SET={0x9, 0x2, 'syz2\x00'}, @NFTA_SET_ELEM_LIST_TABLE={0x9, 0x1, 'syz0\x00'}]}], {0x14, 0x10}}, 0xb0}}, 0x0) [ 2150.564607][T25085] EXT4-fs (loop3): mounted filesystem without journal. Quota mode: writeback. [ 2150.603126][T25074] I/O error, dev loop2, sector 264064 op 0x0:(READ) flags 0x80700 phys_seg 1 prio class 0 [ 2150.716349][T25111] loop2: detected capacity change from 0 to 264192 [ 2150.765126][T25111] EXT4-fs (loop2): mounted filesystem without journal. Quota mode: writeback. 10:14:18 executing program 5: prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f00000002c0)=0x0) sched_setscheduler(r0, 0x2, &(0x7f0000000080)=0x6) r1 = getpid() sched_setscheduler(r1, 0x2, &(0x7f00000000c0)=0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r2, &(0x7f000057eff8)=@abs, 0x6e) sendmmsg$unix(r3, &(0x7f00000bd000), 0x318, 0x0) recvmmsg(r2, &(0x7f00000000c0), 0x10106, 0x2, 0x0) syz_mount_image$ext4(&(0x7f0000000180)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xfffbffff00000000, 0x8, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000600100000f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000006856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010300), 0x0, 0x640}, {&(0x7f0000010400)="03000000040000000500000016000f000300040000000000000000000f00698c", 0x20, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}, {&(0x7f0000011000)}, {0x0, 0x0, 0x6700000}, {&(0x7f0000000580), 0x0, 0xc000}], 0x0, &(0x7f0000013b00)=ANY=[@ANYBLOB='\x00']) r4 = creat(&(0x7f0000000000)='./file1\x00', 0x18) r5 = socket(0x10, 0x3, 0x0) sendmsg$nl_route(r5, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f00000005c0)=@ipv4_newroute={0x38, 0x18, 0xbad, 0x0, 0x0, {}, [@RTA_ENCAP_TYPE={0x6, 0x15, 0x3}, @RTA_ENCAP={0x14, 0x16, 0x0, 0x1, @SEG6_IPTUNNEL_SRH={0xd}}]}, 0x38}}, 0x0) r6 = socket(0x26, 0x3, 0x0) sendmsg$nl_route(r6, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f00000005c0)=@ipv4_newroute={0x38, 0x18, 0xbad, 0x0, 0x0, {0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6}, [@RTA_ENCAP_TYPE={0x6, 0x15, 0x3}, @RTA_ENCAP={0x14, 0x16, 0x0, 0x1, @SEG6_IPTUNNEL_SRH={0xd}}]}, 0x38}}, 0x0) r7 = socket(0x10, 0x3, 0x0) sendmsg$nl_route(r7, &(0x7f0000000240)={0x0, 0x0, 0x0}, 0x0) execveat(r4, &(0x7f0000000040)='./file0\x00', &(0x7f0000000380)=[&(0x7f00000001c0)='+{!#\x00', &(0x7f0000000300)='ext4\x00', &(0x7f0000000340)='@(\x00'], &(0x7f00000004c0)=[&(0x7f00000003c0)='ext4\x00', &(0x7f0000000400)='ext4\x00', &(0x7f0000000500)='\x00.D\x04\xe0\xce\x99\xd9\xa9\xac\xac\xadH\xa4\xcf\xb7\xffT\xac\x05\xfd\xdd\xb8w\x0f\x82B\xff\xf2\x909`1!\f\x870\x1f\xc1%Y\xc8\x15c \xea\x1cY!\x04\xe4\x91^\x00\x04\xe4\xa6\xba\xc6\xfd\x10\xdf\xe24\xd4&\x17\xdc\xec\xf4\f\n\xb7.\x13\x8e\x1bYENj\xe1\x19~\x1c\xaf\a;d\x9f\xba\xd9T\xd4-\xecX\xc0Y\x83@\xc7\x8b\xff*\xdd\xaa\xc6,o4\xe2\x0f\x16\x01[\xc0\xeb\x7fFI]WF\x1f\f?\xfa\xb1\xe7\xf6t\x027\xb1\xc17.4V\xf81{9\xa3\xb9\x01\xcck@I\xe2\xf1Y\x10E\xa1z/\x05.~Yh%\x8f\x06sB)N\x11P\xf6p\xff\'\xaf\a7\x10+p\xbb\xf3\xb08\xb5)\x00\xeeg\xd0\xee\xe9\x98\x8d\xf8\xb5G\t@f\x1et v\x14\tT\xc5', &(0x7f0000000480)=':--[\x00'], 0x1000) recvfrom(r2, &(0x7f0000000600)=""/203, 0xcb, 0x42, &(0x7f0000000700)=@hci={0x1f, 0xffffffffffffffff, 0x4}, 0x80) 10:14:18 executing program 4: unshare(0x6c060000) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000280), 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000080)=0x3) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) r1 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$EVIOCGPROP(r1, 0x40047438, 0x0) close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x2) ioctl$PPPIOCGFLAGS1(r1, 0x10, 0x0) 10:14:18 executing program 3: prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f00000002c0)=0x0) sched_setscheduler(r0, 0x2, &(0x7f0000000080)=0x6) r1 = getpid() sched_setscheduler(r1, 0x2, &(0x7f00000000c0)=0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r2, &(0x7f000057eff8)=@abs, 0x6e) sendmmsg$unix(r3, &(0x7f00000bd000), 0x318, 0x0) recvmmsg(r2, &(0x7f00000000c0), 0x10106, 0x2, 0x0) syz_mount_image$ext4(&(0x7f0000000180)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xfffbffff00000000, 0x8, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000600100000f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000006856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010300), 0x0, 0x640}, {&(0x7f0000010400)="03000000040000000500000016000f000300040000000000000000000f00698c", 0x20, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}, {&(0x7f0000011000)}, {0x0, 0x0, 0x6700000}, {&(0x7f0000000580), 0x0, 0xc000}], 0x0, &(0x7f0000013b00)=ANY=[@ANYBLOB='\x00']) r4 = creat(&(0x7f0000000000)='./file1\x00', 0x18) r5 = socket(0x10, 0x3, 0x0) sendmsg$nl_route(r5, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f00000005c0)=@ipv4_newroute={0x38, 0x18, 0xbad, 0x0, 0x0, {}, [@RTA_ENCAP_TYPE={0x6, 0x15, 0x3}, @RTA_ENCAP={0x14, 0x16, 0x0, 0x1, @SEG6_IPTUNNEL_SRH={0xd}}]}, 0x38}}, 0x0) r6 = socket(0x26, 0x3, 0x0) sendmsg$nl_route(r6, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f00000005c0)=@ipv4_newroute={0x38, 0x18, 0xbad, 0x0, 0x0, {0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6}, [@RTA_ENCAP_TYPE={0x6, 0x15, 0x3}, @RTA_ENCAP={0x14, 0x16, 0x0, 0x1, @SEG6_IPTUNNEL_SRH={0xd}}]}, 0x38}}, 0x0) socket(0x10, 0x3, 0x0) execveat(r4, 0x0, &(0x7f0000000380)=[&(0x7f00000001c0)='+{!#\x00', &(0x7f0000000300)='ext4\x00', &(0x7f0000000340)='@(\x00'], &(0x7f00000004c0)=[&(0x7f00000003c0)='ext4\x00', &(0x7f0000000400)='ext4\x00', &(0x7f0000000500)='\x00.D\x04\xe0\xce\x99\xd9\xa9\xac\xac\xadH\xa4\xcf\xb7\xffT\xac\x05\xfd\xdd\xb8w\x0f\x82B\xff\xf2\x909`1!\f\x870\x1f\xc1%Y\xc8\x15c \xea\x1cY!\x04\xe4\x91^\x00\x04\xe4\xa6\xba\xc6\xfd\x10\xdf\xe24\xd4&\x17\xdc\xec\xf4\f\n\xb7.\x13\x8e\x1bYENj\xe1\x19~\x1c\xaf\a;d\x9f\xba\xd9T\xd4-\xecX\xc0Y\x83@\xc7\x8b\xff*\xdd\xaa\xc6,o4\xe2\x0f\x16\x01[\xc0\xeb\x7fFI]WF\x1f\f?\xfa\xb1\xe7\xf6t\x027\xb1\xc17.4V\xf81{9\xa3\xb9\x01\xcck@I\xe2\xf1Y\x10E\xa1z/\x05.~Yh%\x8f\x06sB)N\x11P\xf6p\xff\'\xaf\a7\x10+p\xbb\xf3\xb08\xb5)\x00\xeeg\xd0\xee\xe9\x98\x8d\xf8\xb5G\t@f\x1et v\x14\tT\xc5', 0x0], 0x1000) 10:14:18 executing program 0: prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f00000002c0)=0x0) sched_setscheduler(r0, 0x2, &(0x7f0000000080)=0x6) r1 = getpid() sched_setscheduler(r1, 0x2, &(0x7f00000000c0)=0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r2, &(0x7f000057eff8)=@abs, 0x6e) sendmmsg$unix(r3, &(0x7f00000bd000), 0x318, 0x0) recvmmsg(r2, &(0x7f00000000c0), 0x10106, 0x2, 0x0) syz_mount_image$ext4(&(0x7f0000000180)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xfffbffff00000000, 0x8, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000600100000f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000006856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010300), 0x0, 0x640}, {&(0x7f0000010400)="03000000040000000500000016000f000300040000000000000000000f00698c", 0x20, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}, {&(0x7f0000011000)}, {0x0, 0x0, 0x6700000}, {&(0x7f0000000580), 0x0, 0xc000}], 0x0, &(0x7f0000013b00)=ANY=[@ANYBLOB='\x00']) r4 = creat(&(0x7f0000000000)='./file1\x00', 0x18) r5 = socket(0x10, 0x3, 0x0) sendmsg$nl_route(r5, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f00000005c0)=@ipv4_newroute={0x38, 0x18, 0xbad, 0x0, 0x0, {}, [@RTA_ENCAP_TYPE={0x6, 0x15, 0x3}, @RTA_ENCAP={0x14, 0x16, 0x0, 0x1, @SEG6_IPTUNNEL_SRH={0xd}}]}, 0x38}}, 0x0) r6 = socket(0x26, 0x3, 0x0) sendmsg$nl_route(r6, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f00000005c0)=@ipv4_newroute={0x24, 0x18, 0xbad, 0x0, 0x0, {0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6}, [@RTA_ENCAP_TYPE={0x6, 0x15, 0x3}]}, 0x24}}, 0x0) r7 = socket(0x10, 0x3, 0x0) sendmsg$nl_route(r7, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f00000005c0)=@ipv4_newroute={0x38, 0x18, 0xbad, 0x0, 0x0, {0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6}, [@RTA_ENCAP_TYPE={0x6, 0x15, 0x3}, @RTA_ENCAP={0x14, 0x16, 0x0, 0x1, @SEG6_IPTUNNEL_SRH={0xd}}]}, 0x38}}, 0x0) execveat(r4, &(0x7f0000000040)='./file0\x00', &(0x7f0000000380)=[&(0x7f00000001c0)='+{!#\x00', &(0x7f0000000300)='ext4\x00', &(0x7f0000000340)='@(\x00'], &(0x7f00000004c0)=[&(0x7f00000003c0)='ext4\x00', &(0x7f0000000400)='ext4\x00', &(0x7f0000000500)='\x00.D\x04\xe0\xce\x99\xd9\xa9\xac\xac\xadH\xa4\xcf\xb7\xffT\xac\x05\xfd\xdd\xb8w\x0f\x82B\xff\xf2\x909`1!\f\x870\x1f\xc1%Y\xc8\x15c \xea\x1cY!\x04\xe4\x91^\x00\x04\xe4\xa6\xba\xc6\xfd\x10\xdf\xe24\xd4&\x17\xdc\xec\xf4\f\n\xb7.\x13\x8e\x1bYENj\xe1\x19~\x1c\xaf\a;d\x9f\xba\xd9T\xd4-\xecX\xc0Y\x83@\xc7\x8b\xff*\xdd\xaa\xc6,o4\xe2\x0f\x16\x01[\xc0\xeb\x7fFI]WF\x1f\f?\xfa\xb1\xe7\xf6t\x027\xb1\xc17.4V\xf81{9\xa3\xb9\x01\xcck@I\xe2\xf1Y\x10E\xa1z/\x05.~Yh%\x8f\x06sB)N\x11P\xf6p\xff\'\xaf\a7\x10+p\xbb\xf3\xb08\xb5)\x00\xeeg\xd0\xee\xe9\x98\x8d\xf8\xb5G\t@f\x1et v\x14\tT\xc5', &(0x7f0000000480)=':--[\x00'], 0x1000) recvfrom(r2, &(0x7f0000000600)=""/203, 0xcb, 0x42, &(0x7f0000000700)=@hci={0x1f, 0xffffffffffffffff, 0x4}, 0x80) 10:14:18 executing program 1: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000005c0)={{0x14}, [@NFT_MSG_NEWTABLE={0x20, 0x0, 0xa, 0x3, 0x0, 0x0, {0x1}, [@NFTA_TABLE_NAME={0x9, 0x1, 'syz0\x00'}]}, @NFT_MSG_NEWSET={0x3c, 0x9, 0xa, 0x401, 0x0, 0x0, {0x1}, [@NFTA_SET_ID={0x8}, @NFTA_SET_NAME={0x9, 0x2, 'syz2\x00'}, @NFTA_SET_TABLE={0x9, 0x1, 'syz0\x00'}, @NFTA_SET_KEY_LEN={0x8, 0x5, 0x1, 0x0, 0x1f}]}, @NFT_MSG_NEWSETELEM={0x2c, 0xc, 0xa, 0x201, 0x0, 0x0, {0x1}, [@NFTA_SET_ELEM_LIST_SET={0x9, 0x2, 'syz2\x00'}, @NFTA_SET_ELEM_LIST_TABLE={0x9, 0x1, 'syz0\x00'}]}], {0x14, 0x10}}, 0xb0}}, 0x0) 10:14:18 executing program 2: prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f00000002c0)=0x0) sched_setscheduler(r0, 0x2, &(0x7f0000000080)=0x6) r1 = getpid() sched_setscheduler(r1, 0x2, &(0x7f00000000c0)=0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r2, &(0x7f000057eff8)=@abs, 0x6e) sendmmsg$unix(r3, &(0x7f00000bd000), 0x318, 0x0) recvmmsg(r2, &(0x7f00000000c0), 0x10106, 0x2, 0x0) syz_mount_image$ext4(&(0x7f0000000180)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xfffbffff00000000, 0x8, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000600100000f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000006856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010300), 0x0, 0x640}, {&(0x7f0000010400)="03000000040000000500000016000f000300040000000000000000000f00698c", 0x20, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}, {&(0x7f0000011000)}, {0x0, 0x0, 0x6700000}, {&(0x7f0000000580), 0x0, 0xc000}], 0x0, &(0x7f0000013b00)=ANY=[@ANYBLOB='\x00']) r4 = creat(&(0x7f0000000000)='./file1\x00', 0x18) r5 = socket(0x10, 0x3, 0x0) sendmsg$nl_route(r5, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f00000005c0)=@ipv4_newroute={0x38, 0x18, 0xbad, 0x0, 0x0, {}, [@RTA_ENCAP_TYPE={0x6, 0x15, 0x3}, @RTA_ENCAP={0x14, 0x16, 0x0, 0x1, @SEG6_IPTUNNEL_SRH={0xd}}]}, 0x38}}, 0x0) r6 = socket(0x26, 0x3, 0x0) sendmsg$nl_route(r6, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f00000005c0)=@ipv4_newroute={0x38, 0x18, 0xbad, 0x0, 0x0, {0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6}, [@RTA_ENCAP_TYPE={0x6, 0x15, 0x3}, @RTA_ENCAP={0x14, 0x16, 0x0, 0x1, @SEG6_IPTUNNEL_SRH={0xd}}]}, 0x38}}, 0x0) r7 = socket(0x10, 0x0, 0x0) sendmsg$nl_route(r7, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f00000005c0)=@ipv4_newroute={0x38, 0x18, 0xbad, 0x0, 0x0, {0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6}, [@RTA_ENCAP_TYPE={0x6, 0x15, 0x3}, @RTA_ENCAP={0x14, 0x16, 0x0, 0x1, @SEG6_IPTUNNEL_SRH={0xd}}]}, 0x38}}, 0x0) execveat(r4, &(0x7f0000000040)='./file0\x00', &(0x7f0000000380)=[&(0x7f00000001c0)='+{!#\x00', &(0x7f0000000300)='ext4\x00', &(0x7f0000000340)='@(\x00'], &(0x7f00000004c0)=[&(0x7f00000003c0)='ext4\x00', &(0x7f0000000400)='ext4\x00', &(0x7f0000000500)='\x00.D\x04\xe0\xce\x99\xd9\xa9\xac\xac\xadH\xa4\xcf\xb7\xffT\xac\x05\xfd\xdd\xb8w\x0f\x82B\xff\xf2\x909`1!\f\x870\x1f\xc1%Y\xc8\x15c \xea\x1cY!\x04\xe4\x91^\x00\x04\xe4\xa6\xba\xc6\xfd\x10\xdf\xe24\xd4&\x17\xdc\xec\xf4\f\n\xb7.\x13\x8e\x1bYENj\xe1\x19~\x1c\xaf\a;d\x9f\xba\xd9T\xd4-\xecX\xc0Y\x83@\xc7\x8b\xff*\xdd\xaa\xc6,o4\xe2\x0f\x16\x01[\xc0\xeb\x7fFI]WF\x1f\f?\xfa\xb1\xe7\xf6t\x027\xb1\xc17.4V\xf81{9\xa3\xb9\x01\xcck@I\xe2\xf1Y\x10E\xa1z/\x05.~Yh%\x8f\x06sB)N\x11P\xf6p\xff\'\xaf\a7\x10+p\xbb\xf3\xb08\xb5)\x00\xeeg\xd0\xee\xe9\x98\x8d\xf8\xb5G\t@f\x1et v\x14\tT\xc5', &(0x7f0000000480)=':--[\x00'], 0x1000) recvfrom(r2, &(0x7f0000000600)=""/203, 0xcb, 0x42, &(0x7f0000000700)=@hci={0x1f, 0xffffffffffffffff, 0x4}, 0x80) 10:14:18 executing program 4: unshare(0x6c060000) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000280), 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000080)=0x3) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) r1 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$EVIOCGPROP(r1, 0x40047438, 0x0) close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x2) ioctl$PPPIOCGFLAGS1(r1, 0x10, 0x0) 10:14:18 executing program 1: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000005c0)={{0x14}, [@NFT_MSG_NEWTABLE={0x20, 0x0, 0xa, 0x3, 0x0, 0x0, {0x1}, [@NFTA_TABLE_NAME={0x9, 0x1, 'syz0\x00'}]}, @NFT_MSG_NEWSET={0x3c, 0x9, 0xa, 0x401, 0x0, 0x0, {0x1}, [@NFTA_SET_ID={0x8}, @NFTA_SET_NAME={0x9, 0x2, 'syz2\x00'}, @NFTA_SET_TABLE={0x9, 0x1, 'syz0\x00'}, @NFTA_SET_KEY_LEN={0x8, 0x5, 0x1, 0x0, 0x1f}]}, @NFT_MSG_NEWSETELEM={0x2c, 0xc, 0xa, 0x201, 0x0, 0x0, {0x1}, [@NFTA_SET_ELEM_LIST_SET={0x9, 0x2, 'syz2\x00'}, @NFTA_SET_ELEM_LIST_TABLE={0x9, 0x1, 'syz0\x00'}]}], {0x14, 0x10}}, 0xb0}}, 0x0) [ 2158.130113][T25136] loop2: detected capacity change from 0 to 264192 [ 2158.371607][T25137] loop3: detected capacity change from 0 to 264192 10:14:19 executing program 0: prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f00000002c0)=0x0) sched_setscheduler(r0, 0x2, &(0x7f0000000080)=0x6) r1 = getpid() sched_setscheduler(r1, 0x2, &(0x7f00000000c0)=0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r2, &(0x7f000057eff8)=@abs, 0x6e) sendmmsg$unix(r3, &(0x7f00000bd000), 0x318, 0x0) recvmmsg(r2, &(0x7f00000000c0), 0x10106, 0x2, 0x0) syz_mount_image$ext4(&(0x7f0000000180)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xfffbffff00000000, 0x8, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000600100000f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000006856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010300), 0x0, 0x640}, {&(0x7f0000010400)="03000000040000000500000016000f000300040000000000000000000f00698c", 0x20, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}, {&(0x7f0000011000)}, {0x0, 0x0, 0x6700000}, {&(0x7f0000000580), 0x0, 0xc000}], 0x0, &(0x7f0000013b00)=ANY=[@ANYBLOB='\x00']) r4 = creat(&(0x7f0000000000)='./file1\x00', 0x18) r5 = socket(0x10, 0x3, 0x0) sendmsg$nl_route(r5, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f00000005c0)=@ipv4_newroute={0x38, 0x18, 0xbad, 0x0, 0x0, {}, [@RTA_ENCAP_TYPE={0x6, 0x15, 0x3}, @RTA_ENCAP={0x14, 0x16, 0x0, 0x1, @SEG6_IPTUNNEL_SRH={0xd}}]}, 0x38}}, 0x0) r6 = socket(0x26, 0x3, 0x0) sendmsg$nl_route(r6, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f00000005c0)=@ipv4_newroute={0x24, 0x18, 0xbad, 0x0, 0x0, {0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6}, [@RTA_ENCAP_TYPE={0x6, 0x15, 0x3}]}, 0x24}}, 0x0) r7 = socket(0x10, 0x3, 0x0) sendmsg$nl_route(r7, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f00000005c0)=@ipv4_newroute={0x38, 0x18, 0xbad, 0x0, 0x0, {0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6}, [@RTA_ENCAP_TYPE={0x6, 0x15, 0x3}, @RTA_ENCAP={0x14, 0x16, 0x0, 0x1, @SEG6_IPTUNNEL_SRH={0xd}}]}, 0x38}}, 0x0) execveat(r4, &(0x7f0000000040)='./file0\x00', &(0x7f0000000380)=[&(0x7f00000001c0)='+{!#\x00', &(0x7f0000000300)='ext4\x00', &(0x7f0000000340)='@(\x00'], &(0x7f00000004c0)=[&(0x7f00000003c0)='ext4\x00', &(0x7f0000000400)='ext4\x00', &(0x7f0000000500)='\x00.D\x04\xe0\xce\x99\xd9\xa9\xac\xac\xadH\xa4\xcf\xb7\xffT\xac\x05\xfd\xdd\xb8w\x0f\x82B\xff\xf2\x909`1!\f\x870\x1f\xc1%Y\xc8\x15c \xea\x1cY!\x04\xe4\x91^\x00\x04\xe4\xa6\xba\xc6\xfd\x10\xdf\xe24\xd4&\x17\xdc\xec\xf4\f\n\xb7.\x13\x8e\x1bYENj\xe1\x19~\x1c\xaf\a;d\x9f\xba\xd9T\xd4-\xecX\xc0Y\x83@\xc7\x8b\xff*\xdd\xaa\xc6,o4\xe2\x0f\x16\x01[\xc0\xeb\x7fFI]WF\x1f\f?\xfa\xb1\xe7\xf6t\x027\xb1\xc17.4V\xf81{9\xa3\xb9\x01\xcck@I\xe2\xf1Y\x10E\xa1z/\x05.~Yh%\x8f\x06sB)N\x11P\xf6p\xff\'\xaf\a7\x10+p\xbb\xf3\xb08\xb5)\x00\xeeg\xd0\xee\xe9\x98\x8d\xf8\xb5G\t@f\x1et v\x14\tT\xc5', &(0x7f0000000480)=':--[\x00'], 0x1000) recvfrom(r2, &(0x7f0000000600)=""/203, 0xcb, 0x42, &(0x7f0000000700)=@hci={0x1f, 0xffffffffffffffff, 0x4}, 0x80) 10:14:19 executing program 1: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000005c0)={{0x14}, [@NFT_MSG_NEWTABLE={0x20, 0x0, 0xa, 0x3, 0x0, 0x0, {0x1}, [@NFTA_TABLE_NAME={0x9, 0x1, 'syz0\x00'}]}, @NFT_MSG_NEWSET={0x3c, 0x9, 0xa, 0x401, 0x0, 0x0, {0x1}, [@NFTA_SET_ID={0x8}, @NFTA_SET_NAME={0x9, 0x2, 'syz2\x00'}, @NFTA_SET_TABLE={0x9, 0x1, 'syz0\x00'}, @NFTA_SET_KEY_LEN={0x8, 0x5, 0x1, 0x0, 0x1f}]}, @NFT_MSG_NEWSETELEM={0x30, 0xc, 0xa, 0x201, 0x0, 0x0, {0x1}, [@NFTA_SET_ELEM_LIST_SET={0x9, 0x2, 'syz2\x00'}, @NFTA_SET_ELEM_LIST_ELEMENTS={0x4}, @NFTA_SET_ELEM_LIST_TABLE={0x9, 0x1, 'syz0\x00'}]}], {0x14, 0x10}}, 0xb4}}, 0x0) 10:14:19 executing program 2: prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f00000002c0)=0x0) sched_setscheduler(r0, 0x2, &(0x7f0000000080)=0x6) r1 = getpid() sched_setscheduler(r1, 0x2, &(0x7f00000000c0)=0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r2, &(0x7f000057eff8)=@abs, 0x6e) sendmmsg$unix(r3, &(0x7f00000bd000), 0x318, 0x0) recvmmsg(r2, &(0x7f00000000c0), 0x10106, 0x2, 0x0) syz_mount_image$ext4(&(0x7f0000000180)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xfffbffff00000000, 0x8, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000600100000f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000006856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010300), 0x0, 0x640}, {&(0x7f0000010400)="03000000040000000500000016000f000300040000000000000000000f00698c", 0x20, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}, {&(0x7f0000011000)}, {0x0, 0x0, 0x6700000}, {&(0x7f0000000580), 0x0, 0xc000}], 0x0, &(0x7f0000013b00)=ANY=[@ANYBLOB='\x00']) r4 = creat(&(0x7f0000000000)='./file1\x00', 0x18) r5 = socket(0x10, 0x3, 0x0) sendmsg$nl_route(r5, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f00000005c0)=@ipv4_newroute={0x38, 0x18, 0xbad, 0x0, 0x0, {}, [@RTA_ENCAP_TYPE={0x6, 0x15, 0x3}, @RTA_ENCAP={0x14, 0x16, 0x0, 0x1, @SEG6_IPTUNNEL_SRH={0xd}}]}, 0x38}}, 0x0) r6 = socket(0x26, 0x3, 0x0) sendmsg$nl_route(r6, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f00000005c0)=@ipv4_newroute={0x38, 0x18, 0xbad, 0x0, 0x0, {0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6}, [@RTA_ENCAP_TYPE={0x6, 0x15, 0x3}, @RTA_ENCAP={0x14, 0x16, 0x0, 0x1, @SEG6_IPTUNNEL_SRH={0xd}}]}, 0x38}}, 0x0) r7 = socket(0x10, 0x0, 0x0) sendmsg$nl_route(r7, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f00000005c0)=@ipv4_newroute={0x38, 0x18, 0xbad, 0x0, 0x0, {0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6}, [@RTA_ENCAP_TYPE={0x6, 0x15, 0x3}, @RTA_ENCAP={0x14, 0x16, 0x0, 0x1, @SEG6_IPTUNNEL_SRH={0xd}}]}, 0x38}}, 0x0) execveat(r4, &(0x7f0000000040)='./file0\x00', &(0x7f0000000380)=[&(0x7f00000001c0)='+{!#\x00', &(0x7f0000000300)='ext4\x00', &(0x7f0000000340)='@(\x00'], &(0x7f00000004c0)=[&(0x7f00000003c0)='ext4\x00', &(0x7f0000000400)='ext4\x00', &(0x7f0000000500)='\x00.D\x04\xe0\xce\x99\xd9\xa9\xac\xac\xadH\xa4\xcf\xb7\xffT\xac\x05\xfd\xdd\xb8w\x0f\x82B\xff\xf2\x909`1!\f\x870\x1f\xc1%Y\xc8\x15c \xea\x1cY!\x04\xe4\x91^\x00\x04\xe4\xa6\xba\xc6\xfd\x10\xdf\xe24\xd4&\x17\xdc\xec\xf4\f\n\xb7.\x13\x8e\x1bYENj\xe1\x19~\x1c\xaf\a;d\x9f\xba\xd9T\xd4-\xecX\xc0Y\x83@\xc7\x8b\xff*\xdd\xaa\xc6,o4\xe2\x0f\x16\x01[\xc0\xeb\x7fFI]WF\x1f\f?\xfa\xb1\xe7\xf6t\x027\xb1\xc17.4V\xf81{9\xa3\xb9\x01\xcck@I\xe2\xf1Y\x10E\xa1z/\x05.~Yh%\x8f\x06sB)N\x11P\xf6p\xff\'\xaf\a7\x10+p\xbb\xf3\xb08\xb5)\x00\xeeg\xd0\xee\xe9\x98\x8d\xf8\xb5G\t@f\x1et v\x14\tT\xc5', &(0x7f0000000480)=':--[\x00'], 0x1000) 10:14:19 executing program 4: unshare(0x6c060000) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000280), 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000080)=0x3) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) r1 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$EVIOCGPROP(r1, 0x40047438, 0x0) close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x2) ioctl$PPPIOCGFLAGS1(r1, 0x10, 0x0) [ 2158.897853][T25137] EXT4-fs: error -4 creating inode table initialization thread [ 2158.905609][T25137] EXT4-fs (loop3): mount failed [ 2158.911831][T25136] EXT4-fs: error -4 creating inode table initialization thread [ 2158.919581][T25136] EXT4-fs (loop2): mount failed [ 2159.359473][T25163] loop2: detected capacity change from 0 to 264192 [ 2160.716071][T25163] EXT4-fs: failed to create workqueue [ 2160.721515][T25163] EXT4-fs (loop2): mount failed [ 2160.841231][T25159] I/O error, dev loop2, sector 264064 op 0x0:(READ) flags 0x80700 phys_seg 1 prio class 0 10:14:28 executing program 5: prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f00000002c0)=0x0) sched_setscheduler(r0, 0x2, &(0x7f0000000080)=0x6) r1 = getpid() sched_setscheduler(r1, 0x2, &(0x7f00000000c0)=0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r2, &(0x7f000057eff8)=@abs, 0x6e) sendmmsg$unix(r3, &(0x7f00000bd000), 0x318, 0x0) recvmmsg(r2, &(0x7f00000000c0), 0x10106, 0x2, 0x0) syz_mount_image$ext4(&(0x7f0000000180)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xfffbffff00000000, 0x8, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000600100000f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000006856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010300), 0x0, 0x640}, {&(0x7f0000010400)="03000000040000000500000016000f000300040000000000000000000f00698c", 0x20, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}, {&(0x7f0000011000)}, {0x0, 0x0, 0x6700000}, {&(0x7f0000000580), 0x0, 0xc000}], 0x0, &(0x7f0000013b00)=ANY=[@ANYBLOB='\x00']) r4 = creat(&(0x7f0000000000)='./file1\x00', 0x18) r5 = socket(0x10, 0x3, 0x0) sendmsg$nl_route(r5, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f00000005c0)=@ipv4_newroute={0x38, 0x18, 0xbad, 0x0, 0x0, {}, [@RTA_ENCAP_TYPE={0x6, 0x15, 0x3}, @RTA_ENCAP={0x14, 0x16, 0x0, 0x1, @SEG6_IPTUNNEL_SRH={0xd}}]}, 0x38}}, 0x0) r6 = socket(0x26, 0x3, 0x0) sendmsg$nl_route(r6, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f00000005c0)=@ipv4_newroute={0x38, 0x18, 0xbad, 0x0, 0x0, {0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6}, [@RTA_ENCAP_TYPE={0x6, 0x15, 0x3}, @RTA_ENCAP={0x14, 0x16, 0x0, 0x1, @SEG6_IPTUNNEL_SRH={0xd}}]}, 0x38}}, 0x0) socket(0x10, 0x3, 0x0) execveat(r4, 0x0, &(0x7f0000000380)=[&(0x7f00000001c0)='+{!#\x00', &(0x7f0000000300)='ext4\x00', &(0x7f0000000340)='@(\x00'], &(0x7f00000004c0)=[&(0x7f00000003c0)='ext4\x00', &(0x7f0000000400)='ext4\x00', &(0x7f0000000500)='\x00.D\x04\xe0\xce\x99\xd9\xa9\xac\xac\xadH\xa4\xcf\xb7\xffT\xac\x05\xfd\xdd\xb8w\x0f\x82B\xff\xf2\x909`1!\f\x870\x1f\xc1%Y\xc8\x15c \xea\x1cY!\x04\xe4\x91^\x00\x04\xe4\xa6\xba\xc6\xfd\x10\xdf\xe24\xd4&\x17\xdc\xec\xf4\f\n\xb7.\x13\x8e\x1bYENj\xe1\x19~\x1c\xaf\a;d\x9f\xba\xd9T\xd4-\xecX\xc0Y\x83@\xc7\x8b\xff*\xdd\xaa\xc6,o4\xe2\x0f\x16\x01[\xc0\xeb\x7fFI]WF\x1f\f?\xfa\xb1\xe7\xf6t\x027\xb1\xc17.4V\xf81{9\xa3\xb9\x01\xcck@I\xe2\xf1Y\x10E\xa1z/\x05.~Yh%\x8f\x06sB)N\x11P\xf6p\xff\'\xaf\a7\x10+p\xbb\xf3\xb08\xb5)\x00\xeeg\xd0\xee\xe9\x98\x8d\xf8\xb5G\t@f\x1et v\x14\tT\xc5', 0x0], 0x1000) 10:14:28 executing program 3: prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f00000002c0)=0x0) sched_setscheduler(r0, 0x2, &(0x7f0000000080)=0x6) r1 = getpid() sched_setscheduler(r1, 0x2, &(0x7f00000000c0)=0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r2, &(0x7f000057eff8)=@abs, 0x6e) sendmmsg$unix(r3, &(0x7f00000bd000), 0x318, 0x0) recvmmsg(r2, &(0x7f00000000c0), 0x10106, 0x2, 0x0) syz_mount_image$ext4(&(0x7f0000000180)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xfffbffff00000000, 0x8, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000600100000f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000006856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010300), 0x0, 0x640}, {&(0x7f0000010400)="03000000040000000500000016000f000300040000000000000000000f00698c", 0x20, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}, {&(0x7f0000011000)}, {0x0, 0x0, 0x6700000}, {&(0x7f0000000580), 0x0, 0xc000}], 0x0, &(0x7f0000013b00)=ANY=[@ANYBLOB='\x00']) r4 = creat(&(0x7f0000000000)='./file1\x00', 0x18) r5 = socket(0x10, 0x3, 0x0) sendmsg$nl_route(r5, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f00000005c0)=@ipv4_newroute={0x38, 0x18, 0xbad, 0x0, 0x0, {}, [@RTA_ENCAP_TYPE={0x6, 0x15, 0x3}, @RTA_ENCAP={0x14, 0x16, 0x0, 0x1, @SEG6_IPTUNNEL_SRH={0xd}}]}, 0x38}}, 0x0) r6 = socket(0x26, 0x3, 0x0) sendmsg$nl_route(r6, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f00000005c0)=@ipv4_newroute={0x38, 0x18, 0xbad, 0x0, 0x0, {0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6}, [@RTA_ENCAP_TYPE={0x6, 0x15, 0x3}, @RTA_ENCAP={0x14, 0x16, 0x0, 0x1, @SEG6_IPTUNNEL_SRH={0xd}}]}, 0x38}}, 0x0) socket(0x10, 0x3, 0x0) execveat(r4, 0x0, &(0x7f0000000380)=[&(0x7f00000001c0)='+{!#\x00', &(0x7f0000000300)='ext4\x00', &(0x7f0000000340)='@(\x00'], &(0x7f00000004c0)=[&(0x7f00000003c0)='ext4\x00', &(0x7f0000000400)='ext4\x00', &(0x7f0000000500)='\x00.D\x04\xe0\xce\x99\xd9\xa9\xac\xac\xadH\xa4\xcf\xb7\xffT\xac\x05\xfd\xdd\xb8w\x0f\x82B\xff\xf2\x909`1!\f\x870\x1f\xc1%Y\xc8\x15c \xea\x1cY!\x04\xe4\x91^\x00\x04\xe4\xa6\xba\xc6\xfd\x10\xdf\xe24\xd4&\x17\xdc\xec\xf4\f\n\xb7.\x13\x8e\x1bYENj\xe1\x19~\x1c\xaf\a;d\x9f\xba\xd9T\xd4-\xecX\xc0Y\x83@\xc7\x8b\xff*\xdd\xaa\xc6,o4\xe2\x0f\x16\x01[\xc0\xeb\x7fFI]WF\x1f\f?\xfa\xb1\xe7\xf6t\x027\xb1\xc17.4V\xf81{9\xa3\xb9\x01\xcck@I\xe2\xf1Y\x10E\xa1z/\x05.~Yh%\x8f\x06sB)N\x11P\xf6p\xff\'\xaf\a7\x10+p\xbb\xf3\xb08\xb5)\x00\xeeg\xd0\xee\xe9\x98\x8d\xf8\xb5G\t@f\x1et v\x14\tT\xc5', 0x0], 0x1000) 10:14:28 executing program 1: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000005c0)={{0x14}, [@NFT_MSG_NEWTABLE={0x20, 0x0, 0xa, 0x3, 0x0, 0x0, {0x1}, [@NFTA_TABLE_NAME={0x9, 0x1, 'syz0\x00'}]}, @NFT_MSG_NEWSET={0x3c, 0x9, 0xa, 0x401, 0x0, 0x0, {0x1}, [@NFTA_SET_ID={0x8}, @NFTA_SET_NAME={0x9, 0x2, 'syz2\x00'}, @NFTA_SET_TABLE={0x9, 0x1, 'syz0\x00'}, @NFTA_SET_KEY_LEN={0x8, 0x5, 0x1, 0x0, 0x1f}]}, @NFT_MSG_NEWSETELEM={0x30, 0xc, 0xa, 0x201, 0x0, 0x0, {0x1}, [@NFTA_SET_ELEM_LIST_SET={0x9, 0x2, 'syz2\x00'}, @NFTA_SET_ELEM_LIST_ELEMENTS={0x4}, @NFTA_SET_ELEM_LIST_TABLE={0x9, 0x1, 'syz0\x00'}]}], {0x14, 0x10}}, 0xb4}}, 0x0) 10:14:28 executing program 4: unshare(0x6c060000) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000280), 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000080)=0x3) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) r1 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$EVIOCGPROP(r1, 0x40047438, &(0x7f0000000180)=""/246) close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PPPIOCGFLAGS1(r1, 0x10, 0x0) 10:14:28 executing program 2: prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f00000002c0)=0x0) sched_setscheduler(r0, 0x2, &(0x7f0000000080)=0x6) r1 = getpid() sched_setscheduler(r1, 0x2, &(0x7f00000000c0)=0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r2, &(0x7f000057eff8)=@abs, 0x6e) sendmmsg$unix(r3, &(0x7f00000bd000), 0x318, 0x0) recvmmsg(r2, &(0x7f00000000c0), 0x10106, 0x2, 0x0) syz_mount_image$ext4(&(0x7f0000000180)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xfffbffff00000000, 0x8, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000600100000f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000006856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010300), 0x0, 0x640}, {&(0x7f0000010400)="03000000040000000500000016000f000300040000000000000000000f00698c", 0x20, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}, {&(0x7f0000011000)}, {0x0, 0x0, 0x6700000}, {&(0x7f0000000580), 0x0, 0xc000}], 0x0, &(0x7f0000013b00)=ANY=[@ANYBLOB='\x00']) r4 = creat(&(0x7f0000000000)='./file1\x00', 0x18) r5 = socket(0x10, 0x3, 0x0) sendmsg$nl_route(r5, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f00000005c0)=@ipv4_newroute={0x38, 0x18, 0xbad, 0x0, 0x0, {}, [@RTA_ENCAP_TYPE={0x6, 0x15, 0x3}, @RTA_ENCAP={0x14, 0x16, 0x0, 0x1, @SEG6_IPTUNNEL_SRH={0xd}}]}, 0x38}}, 0x0) r6 = socket(0x26, 0x3, 0x0) sendmsg$nl_route(r6, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f00000005c0)=@ipv4_newroute={0x38, 0x18, 0xbad, 0x0, 0x0, {0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6}, [@RTA_ENCAP_TYPE={0x6, 0x15, 0x3}, @RTA_ENCAP={0x14, 0x16, 0x0, 0x1, @SEG6_IPTUNNEL_SRH={0xd}}]}, 0x38}}, 0x0) r7 = socket(0x10, 0x0, 0x0) sendmsg$nl_route(r7, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f00000005c0)=@ipv4_newroute={0x38, 0x18, 0xbad, 0x0, 0x0, {0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6}, [@RTA_ENCAP_TYPE={0x6, 0x15, 0x3}, @RTA_ENCAP={0x14, 0x16, 0x0, 0x1, @SEG6_IPTUNNEL_SRH={0xd}}]}, 0x38}}, 0x0) execveat(r4, &(0x7f0000000040)='./file0\x00', &(0x7f0000000380)=[&(0x7f00000001c0)='+{!#\x00', &(0x7f0000000300)='ext4\x00', &(0x7f0000000340)='@(\x00'], &(0x7f00000004c0)=[&(0x7f00000003c0)='ext4\x00', &(0x7f0000000400)='ext4\x00', &(0x7f0000000500)='\x00.D\x04\xe0\xce\x99\xd9\xa9\xac\xac\xadH\xa4\xcf\xb7\xffT\xac\x05\xfd\xdd\xb8w\x0f\x82B\xff\xf2\x909`1!\f\x870\x1f\xc1%Y\xc8\x15c \xea\x1cY!\x04\xe4\x91^\x00\x04\xe4\xa6\xba\xc6\xfd\x10\xdf\xe24\xd4&\x17\xdc\xec\xf4\f\n\xb7.\x13\x8e\x1bYENj\xe1\x19~\x1c\xaf\a;d\x9f\xba\xd9T\xd4-\xecX\xc0Y\x83@\xc7\x8b\xff*\xdd\xaa\xc6,o4\xe2\x0f\x16\x01[\xc0\xeb\x7fFI]WF\x1f\f?\xfa\xb1\xe7\xf6t\x027\xb1\xc17.4V\xf81{9\xa3\xb9\x01\xcck@I\xe2\xf1Y\x10E\xa1z/\x05.~Yh%\x8f\x06sB)N\x11P\xf6p\xff\'\xaf\a7\x10+p\xbb\xf3\xb08\xb5)\x00\xeeg\xd0\xee\xe9\x98\x8d\xf8\xb5G\t@f\x1et v\x14\tT\xc5', &(0x7f0000000480)=':--[\x00'], 0x1000) 10:14:28 executing program 0: prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f00000002c0)=0x0) sched_setscheduler(r0, 0x2, &(0x7f0000000080)=0x6) r1 = getpid() sched_setscheduler(r1, 0x2, &(0x7f00000000c0)=0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r2, &(0x7f000057eff8)=@abs, 0x6e) sendmmsg$unix(r3, &(0x7f00000bd000), 0x318, 0x0) recvmmsg(r2, &(0x7f00000000c0), 0x10106, 0x2, 0x0) syz_mount_image$ext4(&(0x7f0000000180)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xfffbffff00000000, 0x8, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000600100000f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000006856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010300), 0x0, 0x640}, {&(0x7f0000010400)="03000000040000000500000016000f000300040000000000000000000f00698c", 0x20, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}, {&(0x7f0000011000)}, {0x0, 0x0, 0x6700000}, {&(0x7f0000000580), 0x0, 0xc000}], 0x0, &(0x7f0000013b00)=ANY=[@ANYBLOB='\x00']) r4 = creat(&(0x7f0000000000)='./file1\x00', 0x18) r5 = socket(0x10, 0x3, 0x0) sendmsg$nl_route(r5, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f00000005c0)=@ipv4_newroute={0x38, 0x18, 0xbad, 0x0, 0x0, {}, [@RTA_ENCAP_TYPE={0x6, 0x15, 0x3}, @RTA_ENCAP={0x14, 0x16, 0x0, 0x1, @SEG6_IPTUNNEL_SRH={0xd}}]}, 0x38}}, 0x0) r6 = socket(0x26, 0x3, 0x0) sendmsg$nl_route(r6, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f00000005c0)=@ipv4_newroute={0x24, 0x18, 0xbad, 0x0, 0x0, {0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6}, [@RTA_ENCAP_TYPE={0x6, 0x15, 0x3}]}, 0x24}}, 0x0) r7 = socket(0x10, 0x3, 0x0) sendmsg$nl_route(r7, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f00000005c0)=@ipv4_newroute={0x38, 0x18, 0xbad, 0x0, 0x0, {0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6}, [@RTA_ENCAP_TYPE={0x6, 0x15, 0x3}, @RTA_ENCAP={0x14, 0x16, 0x0, 0x1, @SEG6_IPTUNNEL_SRH={0xd}}]}, 0x38}}, 0x0) execveat(r4, &(0x7f0000000040)='./file0\x00', &(0x7f0000000380)=[&(0x7f00000001c0)='+{!#\x00', &(0x7f0000000300)='ext4\x00', &(0x7f0000000340)='@(\x00'], &(0x7f00000004c0)=[&(0x7f00000003c0)='ext4\x00', &(0x7f0000000400)='ext4\x00', &(0x7f0000000500)='\x00.D\x04\xe0\xce\x99\xd9\xa9\xac\xac\xadH\xa4\xcf\xb7\xffT\xac\x05\xfd\xdd\xb8w\x0f\x82B\xff\xf2\x909`1!\f\x870\x1f\xc1%Y\xc8\x15c \xea\x1cY!\x04\xe4\x91^\x00\x04\xe4\xa6\xba\xc6\xfd\x10\xdf\xe24\xd4&\x17\xdc\xec\xf4\f\n\xb7.\x13\x8e\x1bYENj\xe1\x19~\x1c\xaf\a;d\x9f\xba\xd9T\xd4-\xecX\xc0Y\x83@\xc7\x8b\xff*\xdd\xaa\xc6,o4\xe2\x0f\x16\x01[\xc0\xeb\x7fFI]WF\x1f\f?\xfa\xb1\xe7\xf6t\x027\xb1\xc17.4V\xf81{9\xa3\xb9\x01\xcck@I\xe2\xf1Y\x10E\xa1z/\x05.~Yh%\x8f\x06sB)N\x11P\xf6p\xff\'\xaf\a7\x10+p\xbb\xf3\xb08\xb5)\x00\xeeg\xd0\xee\xe9\x98\x8d\xf8\xb5G\t@f\x1et v\x14\tT\xc5', &(0x7f0000000480)=':--[\x00'], 0x1000) recvfrom(r2, &(0x7f0000000600)=""/203, 0xcb, 0x42, &(0x7f0000000700)=@hci={0x1f, 0xffffffffffffffff, 0x4}, 0x80) 10:14:28 executing program 4: unshare(0x6c060000) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000280), 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000080)=0x3) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) r1 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$EVIOCGPROP(r1, 0x40047438, &(0x7f0000000180)=""/246) close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PPPIOCGFLAGS1(r1, 0x10, 0x0) 10:14:28 executing program 1: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000005c0)={{0x14}, [@NFT_MSG_NEWTABLE={0x20, 0x0, 0xa, 0x3, 0x0, 0x0, {0x1}, [@NFTA_TABLE_NAME={0x9, 0x1, 'syz0\x00'}]}, @NFT_MSG_NEWSET={0x3c, 0x9, 0xa, 0x401, 0x0, 0x0, {0x1}, [@NFTA_SET_ID={0x8}, @NFTA_SET_NAME={0x9, 0x2, 'syz2\x00'}, @NFTA_SET_TABLE={0x9, 0x1, 'syz0\x00'}, @NFTA_SET_KEY_LEN={0x8, 0x5, 0x1, 0x0, 0x1f}]}, @NFT_MSG_NEWSETELEM={0x30, 0xc, 0xa, 0x201, 0x0, 0x0, {0x1}, [@NFTA_SET_ELEM_LIST_SET={0x9, 0x2, 'syz2\x00'}, @NFTA_SET_ELEM_LIST_ELEMENTS={0x4}, @NFTA_SET_ELEM_LIST_TABLE={0x9, 0x1, 'syz0\x00'}]}], {0x14, 0x10}}, 0xb4}}, 0x0) [ 2168.030823][T25196] loop3: detected capacity change from 0 to 264192 [ 2168.170095][T25195] loop2: detected capacity change from 0 to 264192 [ 2168.881269][T25196] EXT4-fs: failed to create workqueue [ 2168.886703][T25196] EXT4-fs (loop3): mount failed 10:14:29 executing program 2: prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f00000002c0)=0x0) sched_setscheduler(r0, 0x2, &(0x7f0000000080)=0x6) r1 = getpid() sched_setscheduler(r1, 0x2, &(0x7f00000000c0)=0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r2, &(0x7f000057eff8)=@abs, 0x6e) sendmmsg$unix(r3, &(0x7f00000bd000), 0x318, 0x0) recvmmsg(r2, &(0x7f00000000c0), 0x10106, 0x2, 0x0) syz_mount_image$ext4(&(0x7f0000000180)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xfffbffff00000000, 0x8, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000600100000f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000006856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010300), 0x0, 0x640}, {&(0x7f0000010400)="03000000040000000500000016000f000300040000000000000000000f00698c", 0x20, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}, {&(0x7f0000011000)}, {0x0, 0x0, 0x6700000}, {&(0x7f0000000580), 0x0, 0xc000}], 0x0, &(0x7f0000013b00)=ANY=[@ANYBLOB='\x00']) r4 = creat(&(0x7f0000000000)='./file1\x00', 0x18) r5 = socket(0x10, 0x3, 0x0) sendmsg$nl_route(r5, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f00000005c0)=@ipv4_newroute={0x38, 0x18, 0xbad, 0x0, 0x0, {}, [@RTA_ENCAP_TYPE={0x6, 0x15, 0x3}, @RTA_ENCAP={0x14, 0x16, 0x0, 0x1, @SEG6_IPTUNNEL_SRH={0xd}}]}, 0x38}}, 0x0) r6 = socket(0x26, 0x3, 0x0) sendmsg$nl_route(r6, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f00000005c0)=@ipv4_newroute={0x38, 0x18, 0xbad, 0x0, 0x0, {0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6}, [@RTA_ENCAP_TYPE={0x6, 0x15, 0x3}, @RTA_ENCAP={0x14, 0x16, 0x0, 0x1, @SEG6_IPTUNNEL_SRH={0xd}}]}, 0x38}}, 0x0) r7 = socket(0x10, 0x0, 0x0) sendmsg$nl_route(r7, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f00000005c0)=@ipv4_newroute={0x38, 0x18, 0xbad, 0x0, 0x0, {0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6}, [@RTA_ENCAP_TYPE={0x6, 0x15, 0x3}, @RTA_ENCAP={0x14, 0x16, 0x0, 0x1, @SEG6_IPTUNNEL_SRH={0xd}}]}, 0x38}}, 0x0) execveat(r4, &(0x7f0000000040)='./file0\x00', &(0x7f0000000380)=[&(0x7f00000001c0)='+{!#\x00', &(0x7f0000000300)='ext4\x00', &(0x7f0000000340)='@(\x00'], &(0x7f00000004c0)=[&(0x7f00000003c0)='ext4\x00', &(0x7f0000000400)='ext4\x00', &(0x7f0000000500)='\x00.D\x04\xe0\xce\x99\xd9\xa9\xac\xac\xadH\xa4\xcf\xb7\xffT\xac\x05\xfd\xdd\xb8w\x0f\x82B\xff\xf2\x909`1!\f\x870\x1f\xc1%Y\xc8\x15c \xea\x1cY!\x04\xe4\x91^\x00\x04\xe4\xa6\xba\xc6\xfd\x10\xdf\xe24\xd4&\x17\xdc\xec\xf4\f\n\xb7.\x13\x8e\x1bYENj\xe1\x19~\x1c\xaf\a;d\x9f\xba\xd9T\xd4-\xecX\xc0Y\x83@\xc7\x8b\xff*\xdd\xaa\xc6,o4\xe2\x0f\x16\x01[\xc0\xeb\x7fFI]WF\x1f\f?\xfa\xb1\xe7\xf6t\x027\xb1\xc17.4V\xf81{9\xa3\xb9\x01\xcck@I\xe2\xf1Y\x10E\xa1z/\x05.~Yh%\x8f\x06sB)N\x11P\xf6p\xff\'\xaf\a7\x10+p\xbb\xf3\xb08\xb5)\x00\xeeg\xd0\xee\xe9\x98\x8d\xf8\xb5G\t@f\x1et v\x14\tT\xc5', &(0x7f0000000480)=':--[\x00'], 0x1000) 10:14:29 executing program 3: prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f00000002c0)=0x0) sched_setscheduler(r0, 0x2, &(0x7f0000000080)=0x6) r1 = getpid() sched_setscheduler(r1, 0x2, &(0x7f00000000c0)=0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r2, &(0x7f000057eff8)=@abs, 0x6e) sendmmsg$unix(r3, &(0x7f00000bd000), 0x318, 0x0) recvmmsg(r2, &(0x7f00000000c0), 0x10106, 0x2, 0x0) syz_mount_image$ext4(&(0x7f0000000180)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xfffbffff00000000, 0x8, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000600100000f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000006856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010300), 0x0, 0x640}, {&(0x7f0000010400)="03000000040000000500000016000f000300040000000000000000000f00698c", 0x20, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}, {&(0x7f0000011000)}, {0x0, 0x0, 0x6700000}, {&(0x7f0000000580), 0x0, 0xc000}], 0x0, &(0x7f0000013b00)=ANY=[@ANYBLOB='\x00']) r4 = creat(&(0x7f0000000000)='./file1\x00', 0x18) r5 = socket(0x10, 0x3, 0x0) sendmsg$nl_route(r5, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f00000005c0)=@ipv4_newroute={0x38, 0x18, 0xbad, 0x0, 0x0, {}, [@RTA_ENCAP_TYPE={0x6, 0x15, 0x3}, @RTA_ENCAP={0x14, 0x16, 0x0, 0x1, @SEG6_IPTUNNEL_SRH={0xd}}]}, 0x38}}, 0x0) r6 = socket(0x26, 0x3, 0x0) sendmsg$nl_route(r6, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f00000005c0)=@ipv4_newroute={0x38, 0x18, 0xbad, 0x0, 0x0, {0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6}, [@RTA_ENCAP_TYPE={0x6, 0x15, 0x3}, @RTA_ENCAP={0x14, 0x16, 0x0, 0x1, @SEG6_IPTUNNEL_SRH={0xd}}]}, 0x38}}, 0x0) socket(0x10, 0x3, 0x0) execveat(r4, 0x0, &(0x7f0000000380)=[&(0x7f00000001c0)='+{!#\x00', &(0x7f0000000300)='ext4\x00', &(0x7f0000000340)='@(\x00'], &(0x7f00000004c0)=[&(0x7f00000003c0)='ext4\x00', &(0x7f0000000400)='ext4\x00', &(0x7f0000000500)='\x00.D\x04\xe0\xce\x99\xd9\xa9\xac\xac\xadH\xa4\xcf\xb7\xffT\xac\x05\xfd\xdd\xb8w\x0f\x82B\xff\xf2\x909`1!\f\x870\x1f\xc1%Y\xc8\x15c \xea\x1cY!\x04\xe4\x91^\x00\x04\xe4\xa6\xba\xc6\xfd\x10\xdf\xe24\xd4&\x17\xdc\xec\xf4\f\n\xb7.\x13\x8e\x1bYENj\xe1\x19~\x1c\xaf\a;d\x9f\xba\xd9T\xd4-\xecX\xc0Y\x83@\xc7\x8b\xff*\xdd\xaa\xc6,o4\xe2\x0f\x16\x01[\xc0\xeb\x7fFI]WF\x1f\f?\xfa\xb1\xe7\xf6t\x027\xb1\xc17.4V\xf81{9\xa3\xb9\x01\xcck@I\xe2\xf1Y\x10E\xa1z/\x05.~Yh%\x8f\x06sB)N\x11P\xf6p\xff\'\xaf\a7\x10+p\xbb\xf3\xb08\xb5)\x00\xeeg\xd0\xee\xe9\x98\x8d\xf8\xb5G\t@f\x1et v\x14\tT\xc5', 0x0], 0x1000) 10:14:29 executing program 1: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000005c0)={{0x14}, [@NFT_MSG_NEWTABLE={0x20, 0x0, 0xa, 0x3, 0x0, 0x0, {0x1}, [@NFTA_TABLE_NAME={0x9, 0x1, 'syz0\x00'}]}, @NFT_MSG_NEWSET={0x3c, 0x9, 0xa, 0x401, 0x0, 0x0, {0x1}, [@NFTA_SET_ID={0x8}, @NFTA_SET_NAME={0x9, 0x2, 'syz2\x00'}, @NFTA_SET_TABLE={0x9, 0x1, 'syz0\x00'}, @NFTA_SET_KEY_LEN={0x8, 0x5, 0x1, 0x0, 0x1f}]}, @NFT_MSG_NEWSETELEM={0x3c, 0xc, 0xa, 0x201, 0x0, 0x0, {0x1}, [@NFTA_SET_ELEM_LIST_SET={0x9, 0x2, 'syz2\x00'}, @NFTA_SET_ELEM_LIST_ELEMENTS={0x10, 0x3, 0x0, 0x1, [{0xc, 0x0, 0x0, 0x1, [@NFTA_SET_ELEM_FLAGS={0x8, 0x3, 0x1, 0x0, 0x4}]}]}, @NFTA_SET_ELEM_LIST_TABLE={0x9, 0x1, 'syz0\x00'}]}], {0x14, 0x10}}, 0xc0}}, 0x0) 10:14:29 executing program 4: unshare(0x6c060000) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000280), 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000080)=0x3) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) r1 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$EVIOCGPROP(r1, 0x40047438, &(0x7f0000000180)=""/246) close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PPPIOCGFLAGS1(r1, 0x10, 0x0) [ 2168.931353][T25195] EXT4-fs (loop2): mounted filesystem without journal. Quota mode: writeback. [ 2169.319496][T25227] loop2: detected capacity change from 0 to 264192 [ 2170.654232][T25227] EXT4-fs (loop2): mounted filesystem without journal. Quota mode: writeback. 10:14:38 executing program 5: prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f00000002c0)=0x0) sched_setscheduler(r0, 0x2, &(0x7f0000000080)=0x6) r1 = getpid() sched_setscheduler(r1, 0x2, &(0x7f00000000c0)=0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r2, &(0x7f000057eff8)=@abs, 0x6e) sendmmsg$unix(r3, &(0x7f00000bd000), 0x318, 0x0) recvmmsg(r2, &(0x7f00000000c0), 0x10106, 0x2, 0x0) syz_mount_image$ext4(&(0x7f0000000180)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xfffbffff00000000, 0x8, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000600100000f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000006856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010300), 0x0, 0x640}, {&(0x7f0000010400)="03000000040000000500000016000f000300040000000000000000000f00698c", 0x20, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}, {&(0x7f0000011000)}, {0x0, 0x0, 0x6700000}, {&(0x7f0000000580), 0x0, 0xc000}], 0x0, &(0x7f0000013b00)=ANY=[@ANYBLOB='\x00']) r4 = creat(&(0x7f0000000000)='./file1\x00', 0x18) r5 = socket(0x10, 0x3, 0x0) sendmsg$nl_route(r5, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f00000005c0)=@ipv4_newroute={0x38, 0x18, 0xbad, 0x0, 0x0, {}, [@RTA_ENCAP_TYPE={0x6, 0x15, 0x3}, @RTA_ENCAP={0x14, 0x16, 0x0, 0x1, @SEG6_IPTUNNEL_SRH={0xd}}]}, 0x38}}, 0x0) r6 = socket(0x26, 0x3, 0x0) sendmsg$nl_route(r6, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f00000005c0)=@ipv4_newroute={0x38, 0x18, 0xbad, 0x0, 0x0, {0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6}, [@RTA_ENCAP_TYPE={0x6, 0x15, 0x3}, @RTA_ENCAP={0x14, 0x16, 0x0, 0x1, @SEG6_IPTUNNEL_SRH={0xd}}]}, 0x38}}, 0x0) socket(0x10, 0x3, 0x0) execveat(r4, 0x0, &(0x7f0000000380)=[&(0x7f00000001c0)='+{!#\x00', &(0x7f0000000300)='ext4\x00', &(0x7f0000000340)='@(\x00'], &(0x7f00000004c0)=[&(0x7f00000003c0)='ext4\x00', &(0x7f0000000400)='ext4\x00', &(0x7f0000000500)='\x00.D\x04\xe0\xce\x99\xd9\xa9\xac\xac\xadH\xa4\xcf\xb7\xffT\xac\x05\xfd\xdd\xb8w\x0f\x82B\xff\xf2\x909`1!\f\x870\x1f\xc1%Y\xc8\x15c \xea\x1cY!\x04\xe4\x91^\x00\x04\xe4\xa6\xba\xc6\xfd\x10\xdf\xe24\xd4&\x17\xdc\xec\xf4\f\n\xb7.\x13\x8e\x1bYENj\xe1\x19~\x1c\xaf\a;d\x9f\xba\xd9T\xd4-\xecX\xc0Y\x83@\xc7\x8b\xff*\xdd\xaa\xc6,o4\xe2\x0f\x16\x01[\xc0\xeb\x7fFI]WF\x1f\f?\xfa\xb1\xe7\xf6t\x027\xb1\xc17.4V\xf81{9\xa3\xb9\x01\xcck@I\xe2\xf1Y\x10E\xa1z/\x05.~Yh%\x8f\x06sB)N\x11P\xf6p\xff\'\xaf\a7\x10+p\xbb\xf3\xb08\xb5)\x00\xeeg\xd0\xee\xe9\x98\x8d\xf8\xb5G\t@f\x1et v\x14\tT\xc5', 0x0], 0x1000) 10:14:38 executing program 0: prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f00000002c0)=0x0) sched_setscheduler(r0, 0x2, &(0x7f0000000080)=0x6) r1 = getpid() sched_setscheduler(r1, 0x2, &(0x7f00000000c0)=0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r2, &(0x7f000057eff8)=@abs, 0x6e) sendmmsg$unix(r3, &(0x7f00000bd000), 0x318, 0x0) recvmmsg(r2, &(0x7f00000000c0), 0x10106, 0x2, 0x0) syz_mount_image$ext4(&(0x7f0000000180)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xfffbffff00000000, 0x8, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000600100000f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000006856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010300), 0x0, 0x640}, {&(0x7f0000010400)="03000000040000000500000016000f000300040000000000000000000f00698c", 0x20, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}, {&(0x7f0000011000)}, {0x0, 0x0, 0x6700000}, {&(0x7f0000000580), 0x0, 0xc000}], 0x0, &(0x7f0000013b00)=ANY=[@ANYBLOB='\x00']) r4 = creat(&(0x7f0000000000)='./file1\x00', 0x18) r5 = socket(0x10, 0x3, 0x0) sendmsg$nl_route(r5, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f00000005c0)=@ipv4_newroute={0x38, 0x18, 0xbad, 0x0, 0x0, {}, [@RTA_ENCAP_TYPE={0x6, 0x15, 0x3}, @RTA_ENCAP={0x14, 0x16, 0x0, 0x1, @SEG6_IPTUNNEL_SRH={0xd}}]}, 0x38}}, 0x0) r6 = socket(0x26, 0x3, 0x0) sendmsg$nl_route(r6, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f00000005c0)=@ipv4_newroute={0x38, 0x18, 0xbad, 0x0, 0x0, {0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6}, [@RTA_ENCAP_TYPE={0x6, 0x15, 0x3}, @RTA_ENCAP={0x14, 0x16, 0x0, 0x1, @SEG6_IPTUNNEL_SRH={0xd}}]}, 0x38}}, 0x0) socket(0x10, 0x3, 0x0) execveat(r4, 0x0, &(0x7f0000000380)=[&(0x7f00000001c0)='+{!#\x00', &(0x7f0000000300)='ext4\x00', &(0x7f0000000340)='@(\x00'], &(0x7f00000004c0)=[&(0x7f00000003c0)='ext4\x00', &(0x7f0000000400)='ext4\x00', &(0x7f0000000500)='\x00.D\x04\xe0\xce\x99\xd9\xa9\xac\xac\xadH\xa4\xcf\xb7\xffT\xac\x05\xfd\xdd\xb8w\x0f\x82B\xff\xf2\x909`1!\f\x870\x1f\xc1%Y\xc8\x15c \xea\x1cY!\x04\xe4\x91^\x00\x04\xe4\xa6\xba\xc6\xfd\x10\xdf\xe24\xd4&\x17\xdc\xec\xf4\f\n\xb7.\x13\x8e\x1bYENj\xe1\x19~\x1c\xaf\a;d\x9f\xba\xd9T\xd4-\xecX\xc0Y\x83@\xc7\x8b\xff*\xdd\xaa\xc6,o4\xe2\x0f\x16\x01[\xc0\xeb\x7fFI]WF\x1f\f?\xfa\xb1\xe7\xf6t\x027\xb1\xc17.4V\xf81{9\xa3\xb9\x01\xcck@I\xe2\xf1Y\x10E\xa1z/\x05.~Yh%\x8f\x06sB)N\x11P\xf6p\xff\'\xaf\a7\x10+p\xbb\xf3\xb08\xb5)\x00\xeeg\xd0\xee\xe9\x98\x8d\xf8\xb5G\t@f\x1et v\x14\tT\xc5', 0x0], 0x1000) 10:14:38 executing program 3: prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f00000002c0)=0x0) sched_setscheduler(r0, 0x2, &(0x7f0000000080)=0x6) r1 = getpid() sched_setscheduler(r1, 0x2, &(0x7f00000000c0)=0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r2, &(0x7f000057eff8)=@abs, 0x6e) sendmmsg$unix(r3, &(0x7f00000bd000), 0x318, 0x0) recvmmsg(r2, &(0x7f00000000c0), 0x10106, 0x2, 0x0) syz_mount_image$ext4(&(0x7f0000000180)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xfffbffff00000000, 0x8, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000600100000f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000006856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010300), 0x0, 0x640}, {&(0x7f0000010400)="03000000040000000500000016000f000300040000000000000000000f00698c", 0x20, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}, {&(0x7f0000011000)}, {0x0, 0x0, 0x6700000}, {&(0x7f0000000580), 0x0, 0xc000}], 0x0, &(0x7f0000013b00)=ANY=[@ANYBLOB='\x00']) r4 = creat(&(0x7f0000000000)='./file1\x00', 0x18) r5 = socket(0x10, 0x3, 0x0) sendmsg$nl_route(r5, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f00000005c0)=@ipv4_newroute={0x38, 0x18, 0xbad, 0x0, 0x0, {}, [@RTA_ENCAP_TYPE={0x6, 0x15, 0x3}, @RTA_ENCAP={0x14, 0x16, 0x0, 0x1, @SEG6_IPTUNNEL_SRH={0xd}}]}, 0x38}}, 0x0) r6 = socket(0x26, 0x3, 0x0) sendmsg$nl_route(r6, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f00000005c0)=@ipv4_newroute={0x38, 0x18, 0xbad, 0x0, 0x0, {0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6}, [@RTA_ENCAP_TYPE={0x6, 0x15, 0x3}, @RTA_ENCAP={0x14, 0x16, 0x0, 0x1, @SEG6_IPTUNNEL_SRH={0xd}}]}, 0x38}}, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f00000005c0)=@ipv4_newroute={0x38, 0x18, 0xbad, 0x0, 0x0, {0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6}, [@RTA_ENCAP_TYPE={0x6, 0x15, 0x3}, @RTA_ENCAP={0x14, 0x16, 0x0, 0x1, @SEG6_IPTUNNEL_SRH={0xd}}]}, 0x38}}, 0x0) execveat(r4, 0x0, &(0x7f0000000380)=[&(0x7f00000001c0)='+{!#\x00', &(0x7f0000000300)='ext4\x00', &(0x7f0000000340)='@(\x00'], &(0x7f00000004c0)=[&(0x7f00000003c0)='ext4\x00', &(0x7f0000000400)='ext4\x00', &(0x7f0000000500)='\x00.D\x04\xe0\xce\x99\xd9\xa9\xac\xac\xadH\xa4\xcf\xb7\xffT\xac\x05\xfd\xdd\xb8w\x0f\x82B\xff\xf2\x909`1!\f\x870\x1f\xc1%Y\xc8\x15c \xea\x1cY!\x04\xe4\x91^\x00\x04\xe4\xa6\xba\xc6\xfd\x10\xdf\xe24\xd4&\x17\xdc\xec\xf4\f\n\xb7.\x13\x8e\x1bYENj\xe1\x19~\x1c\xaf\a;d\x9f\xba\xd9T\xd4-\xecX\xc0Y\x83@\xc7\x8b\xff*\xdd\xaa\xc6,o4\xe2\x0f\x16\x01[\xc0\xeb\x7fFI]WF\x1f\f?\xfa\xb1\xe7\xf6t\x027\xb1\xc17.4V\xf81{9\xa3\xb9\x01\xcck@I\xe2\xf1Y\x10E\xa1z/\x05.~Yh%\x8f\x06sB)N\x11P\xf6p\xff\'\xaf\a7\x10+p\xbb\xf3\xb08\xb5)\x00\xeeg\xd0\xee\xe9\x98\x8d\xf8\xb5G\t@f\x1et v\x14\tT\xc5', 0x0], 0x1000) 10:14:38 executing program 1: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000005c0)={{0x14}, [@NFT_MSG_NEWTABLE={0x20, 0x0, 0xa, 0x3, 0x0, 0x0, {0x1}, [@NFTA_TABLE_NAME={0x9, 0x1, 'syz0\x00'}]}, @NFT_MSG_NEWSET={0x3c, 0x9, 0xa, 0x401, 0x0, 0x0, {0x1}, [@NFTA_SET_ID={0x8}, @NFTA_SET_NAME={0x9, 0x2, 'syz2\x00'}, @NFTA_SET_TABLE={0x9, 0x1, 'syz0\x00'}, @NFTA_SET_KEY_LEN={0x8, 0x5, 0x1, 0x0, 0x1f}]}, @NFT_MSG_NEWSETELEM={0x3c, 0xc, 0xa, 0x201, 0x0, 0x0, {0x1}, [@NFTA_SET_ELEM_LIST_SET={0x9, 0x2, 'syz2\x00'}, @NFTA_SET_ELEM_LIST_ELEMENTS={0x10, 0x3, 0x0, 0x1, [{0xc, 0x0, 0x0, 0x1, [@NFTA_SET_ELEM_FLAGS={0x8, 0x3, 0x1, 0x0, 0x4}]}]}, @NFTA_SET_ELEM_LIST_TABLE={0x9, 0x1, 'syz0\x00'}]}], {0x14, 0x10}}, 0xc0}}, 0x0) 10:14:38 executing program 4: unshare(0x6c060000) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000280), 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000080)=0x3) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) r1 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$EVIOCGPROP(r1, 0x40047438, &(0x7f0000000180)=""/246) close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x2) ioctl$PPPIOCGFLAGS1(0xffffffffffffffff, 0x10, 0x0) 10:14:38 executing program 2: prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f00000002c0)=0x0) sched_setscheduler(r0, 0x2, &(0x7f0000000080)=0x6) r1 = getpid() sched_setscheduler(r1, 0x2, &(0x7f00000000c0)=0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r2, &(0x7f000057eff8)=@abs, 0x6e) sendmmsg$unix(r3, &(0x7f00000bd000), 0x318, 0x0) recvmmsg(r2, &(0x7f00000000c0), 0x10106, 0x2, 0x0) syz_mount_image$ext4(&(0x7f0000000180)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xfffbffff00000000, 0x8, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000600100000f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000006856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010300), 0x0, 0x640}, {&(0x7f0000010400)="03000000040000000500000016000f000300040000000000000000000f00698c", 0x20, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}, {&(0x7f0000011000)}, {0x0, 0x0, 0x6700000}, {&(0x7f0000000580), 0x0, 0xc000}], 0x0, &(0x7f0000013b00)=ANY=[@ANYBLOB='\x00']) creat(&(0x7f0000000000)='./file1\x00', 0x18) r4 = socket(0x10, 0x3, 0x0) sendmsg$nl_route(r4, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f00000005c0)=@ipv4_newroute={0x38, 0x18, 0xbad, 0x0, 0x0, {}, [@RTA_ENCAP_TYPE={0x6, 0x15, 0x3}, @RTA_ENCAP={0x14, 0x16, 0x0, 0x1, @SEG6_IPTUNNEL_SRH={0xd}}]}, 0x38}}, 0x0) r5 = socket(0x26, 0x3, 0x0) sendmsg$nl_route(r5, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f00000005c0)=@ipv4_newroute={0x38, 0x18, 0xbad, 0x0, 0x0, {0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6}, [@RTA_ENCAP_TYPE={0x6, 0x15, 0x3}, @RTA_ENCAP={0x14, 0x16, 0x0, 0x1, @SEG6_IPTUNNEL_SRH={0xd}}]}, 0x38}}, 0x0) r6 = socket(0x10, 0x0, 0x0) sendmsg$nl_route(r6, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f00000005c0)=@ipv4_newroute={0x38, 0x18, 0xbad, 0x0, 0x0, {0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6}, [@RTA_ENCAP_TYPE={0x6, 0x15, 0x3}, @RTA_ENCAP={0x14, 0x16, 0x0, 0x1, @SEG6_IPTUNNEL_SRH={0xd}}]}, 0x38}}, 0x0) recvfrom(r2, &(0x7f0000000600)=""/203, 0xcb, 0x42, &(0x7f0000000700)=@hci={0x1f, 0xffffffffffffffff, 0x4}, 0x80) 10:14:38 executing program 4: unshare(0x6c060000) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000280), 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000080)=0x3) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) r1 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$EVIOCGPROP(r1, 0x40047438, &(0x7f0000000180)=""/246) close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x2) ioctl$PPPIOCGFLAGS1(0xffffffffffffffff, 0x10, 0x0) 10:14:38 executing program 1: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000005c0)={{0x14}, [@NFT_MSG_NEWTABLE={0x20, 0x0, 0xa, 0x3, 0x0, 0x0, {0x1}, [@NFTA_TABLE_NAME={0x9, 0x1, 'syz0\x00'}]}, @NFT_MSG_NEWSET={0x3c, 0x9, 0xa, 0x401, 0x0, 0x0, {0x1}, [@NFTA_SET_ID={0x8}, @NFTA_SET_NAME={0x9, 0x2, 'syz2\x00'}, @NFTA_SET_TABLE={0x9, 0x1, 'syz0\x00'}, @NFTA_SET_KEY_LEN={0x8, 0x5, 0x1, 0x0, 0x1f}]}, @NFT_MSG_NEWSETELEM={0x3c, 0xc, 0xa, 0x201, 0x0, 0x0, {0x1}, [@NFTA_SET_ELEM_LIST_SET={0x9, 0x2, 'syz2\x00'}, @NFTA_SET_ELEM_LIST_ELEMENTS={0x10, 0x3, 0x0, 0x1, [{0xc, 0x0, 0x0, 0x1, [@NFTA_SET_ELEM_FLAGS={0x8, 0x3, 0x1, 0x0, 0x4}]}]}, @NFTA_SET_ELEM_LIST_TABLE={0x9, 0x1, 'syz0\x00'}]}], {0x14, 0x10}}, 0xc0}}, 0x0) [ 2178.269975][T25256] loop2: detected capacity change from 0 to 264192 [ 2178.469468][T25257] loop3: detected capacity change from 0 to 264192 10:14:39 executing program 0: prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f00000002c0)=0x0) sched_setscheduler(r0, 0x2, &(0x7f0000000080)=0x6) r1 = getpid() sched_setscheduler(r1, 0x2, &(0x7f00000000c0)=0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r2, &(0x7f000057eff8)=@abs, 0x6e) sendmmsg$unix(r3, &(0x7f00000bd000), 0x318, 0x0) recvmmsg(r2, &(0x7f00000000c0), 0x10106, 0x2, 0x0) syz_mount_image$ext4(&(0x7f0000000180)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xfffbffff00000000, 0x8, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000600100000f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000006856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010300), 0x0, 0x640}, {&(0x7f0000010400)="03000000040000000500000016000f000300040000000000000000000f00698c", 0x20, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}, {&(0x7f0000011000)}, {0x0, 0x0, 0x6700000}, {&(0x7f0000000580), 0x0, 0xc000}], 0x0, &(0x7f0000013b00)=ANY=[@ANYBLOB='\x00']) r4 = creat(&(0x7f0000000000)='./file1\x00', 0x18) r5 = socket(0x10, 0x3, 0x0) sendmsg$nl_route(r5, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f00000005c0)=@ipv4_newroute={0x38, 0x18, 0xbad, 0x0, 0x0, {}, [@RTA_ENCAP_TYPE={0x6, 0x15, 0x3}, @RTA_ENCAP={0x14, 0x16, 0x0, 0x1, @SEG6_IPTUNNEL_SRH={0xd}}]}, 0x38}}, 0x0) r6 = socket(0x26, 0x3, 0x0) sendmsg$nl_route(r6, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f00000005c0)=@ipv4_newroute={0x38, 0x18, 0xbad, 0x0, 0x0, {0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6}, [@RTA_ENCAP_TYPE={0x6, 0x15, 0x3}, @RTA_ENCAP={0x14, 0x16, 0x0, 0x1, @SEG6_IPTUNNEL_SRH={0xd}}]}, 0x38}}, 0x0) r7 = socket(0x10, 0x0, 0x0) sendmsg$nl_route(r7, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f00000005c0)=@ipv4_newroute={0x38, 0x18, 0xbad, 0x0, 0x0, {0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6}, [@RTA_ENCAP_TYPE={0x6, 0x15, 0x3}, @RTA_ENCAP={0x14, 0x16, 0x0, 0x1, @SEG6_IPTUNNEL_SRH={0xd}}]}, 0x38}}, 0x0) execveat(r4, &(0x7f0000000040)='./file0\x00', &(0x7f0000000380)=[&(0x7f00000001c0)='+{!#\x00', &(0x7f0000000300)='ext4\x00', &(0x7f0000000340)='@(\x00'], &(0x7f00000004c0)=[&(0x7f00000003c0)='ext4\x00', &(0x7f0000000400)='ext4\x00', &(0x7f0000000500)='\x00.D\x04\xe0\xce\x99\xd9\xa9\xac\xac\xadH\xa4\xcf\xb7\xffT\xac\x05\xfd\xdd\xb8w\x0f\x82B\xff\xf2\x909`1!\f\x870\x1f\xc1%Y\xc8\x15c \xea\x1cY!\x04\xe4\x91^\x00\x04\xe4\xa6\xba\xc6\xfd\x10\xdf\xe24\xd4&\x17\xdc\xec\xf4\f\n\xb7.\x13\x8e\x1bYENj\xe1\x19~\x1c\xaf\a;d\x9f\xba\xd9T\xd4-\xecX\xc0Y\x83@\xc7\x8b\xff*\xdd\xaa\xc6,o4\xe2\x0f\x16\x01[\xc0\xeb\x7fFI]WF\x1f\f?\xfa\xb1\xe7\xf6t\x027\xb1\xc17.4V\xf81{9\xa3\xb9\x01\xcck@I\xe2\xf1Y\x10E\xa1z/\x05.~Yh%\x8f\x06sB)N\x11P\xf6p\xff\'\xaf\a7\x10+p\xbb\xf3\xb08\xb5)\x00\xeeg\xd0\xee\xe9\x98\x8d\xf8\xb5G\t@f\x1et v\x14\tT\xc5', &(0x7f0000000480)=':--[\x00'], 0x1000) [ 2179.021467][T25256] EXT4-fs: failed to create workqueue [ 2179.026867][T25256] EXT4-fs (loop2): mount failed [ 2179.033839][T25257] EXT4-fs: error -4 creating inode table initialization thread [ 2179.041440][T25257] EXT4-fs (loop3): mount failed 10:14:39 executing program 1: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000005c0)={{0x14}, [@NFT_MSG_NEWTABLE={0x20, 0x0, 0xa, 0x3, 0x0, 0x0, {0x1}, [@NFTA_TABLE_NAME={0x9, 0x1, 'syz0\x00'}]}, @NFT_MSG_NEWSET={0x3c, 0x9, 0xa, 0x401, 0x0, 0x0, {0x1}, [@NFTA_SET_ID={0x8}, @NFTA_SET_NAME={0x9, 0x2, 'syz2\x00'}, @NFTA_SET_TABLE={0x9, 0x1, 'syz0\x00'}, @NFTA_SET_KEY_LEN={0x8, 0x5, 0x1, 0x0, 0x1f}]}, @NFT_MSG_NEWSETELEM={0x40, 0xc, 0xa, 0x201, 0x0, 0x0, {0x1}, [@NFTA_SET_ELEM_LIST_SET={0x9, 0x2, 'syz2\x00'}, @NFTA_SET_ELEM_LIST_ELEMENTS={0x14, 0x3, 0x0, 0x1, [{0x10, 0x0, 0x0, 0x1, [@NFTA_SET_ELEM_TIMEOUT={0xc, 0x6}]}]}, @NFTA_SET_ELEM_LIST_TABLE={0x9, 0x1, 'syz0\x00'}]}], {0x14, 0x10}}, 0xc4}}, 0x0) 10:14:39 executing program 2: prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f00000002c0)=0x0) sched_setscheduler(r0, 0x2, &(0x7f0000000080)=0x6) r1 = getpid() sched_setscheduler(r1, 0x2, &(0x7f00000000c0)=0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r2, &(0x7f000057eff8)=@abs, 0x6e) sendmmsg$unix(r3, &(0x7f00000bd000), 0x318, 0x0) recvmmsg(r2, &(0x7f00000000c0), 0x10106, 0x2, 0x0) syz_mount_image$ext4(&(0x7f0000000180)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xfffbffff00000000, 0x8, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000600100000f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000006856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010300), 0x0, 0x640}, {&(0x7f0000010400)="03000000040000000500000016000f000300040000000000000000000f00698c", 0x20, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}, {&(0x7f0000011000)}, {0x0, 0x0, 0x6700000}, {&(0x7f0000000580), 0x0, 0xc000}], 0x0, &(0x7f0000013b00)=ANY=[@ANYBLOB='\x00']) creat(&(0x7f0000000000)='./file1\x00', 0x18) r4 = socket(0x10, 0x3, 0x0) sendmsg$nl_route(r4, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f00000005c0)=@ipv4_newroute={0x38, 0x18, 0xbad, 0x0, 0x0, {}, [@RTA_ENCAP_TYPE={0x6, 0x15, 0x3}, @RTA_ENCAP={0x14, 0x16, 0x0, 0x1, @SEG6_IPTUNNEL_SRH={0xd}}]}, 0x38}}, 0x0) r5 = socket(0x26, 0x3, 0x0) sendmsg$nl_route(r5, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f00000005c0)=@ipv4_newroute={0x38, 0x18, 0xbad, 0x0, 0x0, {0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6}, [@RTA_ENCAP_TYPE={0x6, 0x15, 0x3}, @RTA_ENCAP={0x14, 0x16, 0x0, 0x1, @SEG6_IPTUNNEL_SRH={0xd}}]}, 0x38}}, 0x0) r6 = socket(0x10, 0x0, 0x0) sendmsg$nl_route(r6, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f00000005c0)=@ipv4_newroute={0x38, 0x18, 0xbad, 0x0, 0x0, {0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6}, [@RTA_ENCAP_TYPE={0x6, 0x15, 0x3}, @RTA_ENCAP={0x14, 0x16, 0x0, 0x1, @SEG6_IPTUNNEL_SRH={0xd}}]}, 0x38}}, 0x0) recvfrom(r2, &(0x7f0000000600)=""/203, 0xcb, 0x42, &(0x7f0000000700)=@hci={0x1f, 0xffffffffffffffff, 0x4}, 0x80) 10:14:39 executing program 3: prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f00000002c0)=0x0) sched_setscheduler(r0, 0x2, &(0x7f0000000080)=0x6) r1 = getpid() sched_setscheduler(r1, 0x2, &(0x7f00000000c0)=0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r2, &(0x7f000057eff8)=@abs, 0x6e) sendmmsg$unix(r3, &(0x7f00000bd000), 0x318, 0x0) recvmmsg(r2, &(0x7f00000000c0), 0x10106, 0x2, 0x0) syz_mount_image$ext4(&(0x7f0000000180)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xfffbffff00000000, 0x8, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000600100000f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000006856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010300), 0x0, 0x640}, {&(0x7f0000010400)="03000000040000000500000016000f000300040000000000000000000f00698c", 0x20, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}, {&(0x7f0000011000)}, {0x0, 0x0, 0x6700000}, {&(0x7f0000000580), 0x0, 0xc000}], 0x0, &(0x7f0000013b00)=ANY=[@ANYBLOB='\x00']) r4 = creat(&(0x7f0000000000)='./file1\x00', 0x18) r5 = socket(0x10, 0x3, 0x0) sendmsg$nl_route(r5, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f00000005c0)=@ipv4_newroute={0x38, 0x18, 0xbad, 0x0, 0x0, {}, [@RTA_ENCAP_TYPE={0x6, 0x15, 0x3}, @RTA_ENCAP={0x14, 0x16, 0x0, 0x1, @SEG6_IPTUNNEL_SRH={0xd}}]}, 0x38}}, 0x0) r6 = socket(0x26, 0x3, 0x0) sendmsg$nl_route(r6, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f00000005c0)=@ipv4_newroute={0x38, 0x18, 0xbad, 0x0, 0x0, {0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6}, [@RTA_ENCAP_TYPE={0x6, 0x15, 0x3}, @RTA_ENCAP={0x14, 0x16, 0x0, 0x1, @SEG6_IPTUNNEL_SRH={0xd}}]}, 0x38}}, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f00000005c0)=@ipv4_newroute={0x38, 0x18, 0xbad, 0x0, 0x0, {0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6}, [@RTA_ENCAP_TYPE={0x6, 0x15, 0x3}, @RTA_ENCAP={0x14, 0x16, 0x0, 0x1, @SEG6_IPTUNNEL_SRH={0xd}}]}, 0x38}}, 0x0) execveat(r4, 0x0, &(0x7f0000000380)=[&(0x7f00000001c0)='+{!#\x00', &(0x7f0000000300)='ext4\x00', &(0x7f0000000340)='@(\x00'], &(0x7f00000004c0)=[&(0x7f00000003c0)='ext4\x00', &(0x7f0000000400)='ext4\x00', &(0x7f0000000500)='\x00.D\x04\xe0\xce\x99\xd9\xa9\xac\xac\xadH\xa4\xcf\xb7\xffT\xac\x05\xfd\xdd\xb8w\x0f\x82B\xff\xf2\x909`1!\f\x870\x1f\xc1%Y\xc8\x15c \xea\x1cY!\x04\xe4\x91^\x00\x04\xe4\xa6\xba\xc6\xfd\x10\xdf\xe24\xd4&\x17\xdc\xec\xf4\f\n\xb7.\x13\x8e\x1bYENj\xe1\x19~\x1c\xaf\a;d\x9f\xba\xd9T\xd4-\xecX\xc0Y\x83@\xc7\x8b\xff*\xdd\xaa\xc6,o4\xe2\x0f\x16\x01[\xc0\xeb\x7fFI]WF\x1f\f?\xfa\xb1\xe7\xf6t\x027\xb1\xc17.4V\xf81{9\xa3\xb9\x01\xcck@I\xe2\xf1Y\x10E\xa1z/\x05.~Yh%\x8f\x06sB)N\x11P\xf6p\xff\'\xaf\a7\x10+p\xbb\xf3\xb08\xb5)\x00\xeeg\xd0\xee\xe9\x98\x8d\xf8\xb5G\t@f\x1et v\x14\tT\xc5', 0x0], 0x1000) [ 2179.721870][T25287] loop3: detected capacity change from 0 to 264192 [ 2179.731727][T25287] EXT4-fs (loop3): mounted filesystem without journal. Quota mode: writeback. [ 2179.759186][T25285] I/O error, dev loop2, sector 264064 op 0x0:(READ) flags 0x80700 phys_seg 1 prio class 0 [ 2179.891984][T25295] loop2: detected capacity change from 0 to 264192 [ 2179.911559][T25295] EXT4-fs (loop2): mounted filesystem without journal. Quota mode: writeback. 10:14:45 executing program 5: prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f00000002c0)=0x0) sched_setscheduler(r0, 0x2, &(0x7f0000000080)=0x6) r1 = getpid() sched_setscheduler(r1, 0x2, &(0x7f00000000c0)=0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r2, &(0x7f000057eff8)=@abs, 0x6e) sendmmsg$unix(r3, &(0x7f00000bd000), 0x318, 0x0) recvmmsg(r2, &(0x7f00000000c0), 0x10106, 0x2, 0x0) syz_mount_image$ext4(&(0x7f0000000180)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xfffbffff00000000, 0x8, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000600100000f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000006856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010300), 0x0, 0x640}, {&(0x7f0000010400)="03000000040000000500000016000f000300040000000000000000000f00698c", 0x20, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}, {&(0x7f0000011000)}, {0x0, 0x0, 0x6700000}, {&(0x7f0000000580), 0x0, 0xc000}], 0x0, &(0x7f0000013b00)=ANY=[@ANYBLOB='\x00']) r4 = creat(&(0x7f0000000000)='./file1\x00', 0x18) r5 = socket(0x10, 0x3, 0x0) sendmsg$nl_route(r5, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f00000005c0)=@ipv4_newroute={0x38, 0x18, 0xbad, 0x0, 0x0, {}, [@RTA_ENCAP_TYPE={0x6, 0x15, 0x3}, @RTA_ENCAP={0x14, 0x16, 0x0, 0x1, @SEG6_IPTUNNEL_SRH={0xd}}]}, 0x38}}, 0x0) r6 = socket(0x26, 0x3, 0x0) sendmsg$nl_route(r6, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f00000005c0)=@ipv4_newroute={0x38, 0x18, 0xbad, 0x0, 0x0, {0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6}, [@RTA_ENCAP_TYPE={0x6, 0x15, 0x3}, @RTA_ENCAP={0x14, 0x16, 0x0, 0x1, @SEG6_IPTUNNEL_SRH={0xd}}]}, 0x38}}, 0x0) socket(0x10, 0x3, 0x0) execveat(r4, 0x0, &(0x7f0000000380)=[&(0x7f00000001c0)='+{!#\x00', &(0x7f0000000300)='ext4\x00', &(0x7f0000000340)='@(\x00'], &(0x7f00000004c0)=[&(0x7f00000003c0)='ext4\x00', &(0x7f0000000400)='ext4\x00', &(0x7f0000000500)='\x00.D\x04\xe0\xce\x99\xd9\xa9\xac\xac\xadH\xa4\xcf\xb7\xffT\xac\x05\xfd\xdd\xb8w\x0f\x82B\xff\xf2\x909`1!\f\x870\x1f\xc1%Y\xc8\x15c \xea\x1cY!\x04\xe4\x91^\x00\x04\xe4\xa6\xba\xc6\xfd\x10\xdf\xe24\xd4&\x17\xdc\xec\xf4\f\n\xb7.\x13\x8e\x1bYENj\xe1\x19~\x1c\xaf\a;d\x9f\xba\xd9T\xd4-\xecX\xc0Y\x83@\xc7\x8b\xff*\xdd\xaa\xc6,o4\xe2\x0f\x16\x01[\xc0\xeb\x7fFI]WF\x1f\f?\xfa\xb1\xe7\xf6t\x027\xb1\xc17.4V\xf81{9\xa3\xb9\x01\xcck@I\xe2\xf1Y\x10E\xa1z/\x05.~Yh%\x8f\x06sB)N\x11P\xf6p\xff\'\xaf\a7\x10+p\xbb\xf3\xb08\xb5)\x00\xeeg\xd0\xee\xe9\x98\x8d\xf8\xb5G\t@f\x1et v\x14\tT\xc5', 0x0], 0x1000) 10:14:45 executing program 4: unshare(0x6c060000) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000280), 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000080)=0x3) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) r1 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$EVIOCGPROP(r1, 0x40047438, &(0x7f0000000180)=""/246) close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x2) ioctl$PPPIOCGFLAGS1(0xffffffffffffffff, 0x10, 0x0) 10:14:45 executing program 1: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000005c0)={{0x14}, [@NFT_MSG_NEWTABLE={0x20, 0x0, 0xa, 0x3, 0x0, 0x0, {0x1}, [@NFTA_TABLE_NAME={0x9, 0x1, 'syz0\x00'}]}, @NFT_MSG_NEWSET={0x3c, 0x9, 0xa, 0x401, 0x0, 0x0, {0x1}, [@NFTA_SET_ID={0x8}, @NFTA_SET_NAME={0x9, 0x2, 'syz2\x00'}, @NFTA_SET_TABLE={0x9, 0x1, 'syz0\x00'}, @NFTA_SET_KEY_LEN={0x8, 0x5, 0x1, 0x0, 0x1f}]}, @NFT_MSG_NEWSETELEM={0x40, 0xc, 0xa, 0x201, 0x0, 0x0, {0x1}, [@NFTA_SET_ELEM_LIST_SET={0x9, 0x2, 'syz2\x00'}, @NFTA_SET_ELEM_LIST_ELEMENTS={0x14, 0x3, 0x0, 0x1, [{0x10, 0x0, 0x0, 0x1, [@NFTA_SET_ELEM_TIMEOUT={0xc, 0x6}]}]}, @NFTA_SET_ELEM_LIST_TABLE={0x9, 0x1, 'syz0\x00'}]}], {0x14, 0x10}}, 0xc4}}, 0x0) 10:14:45 executing program 0: unshare(0x6c060000) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000280), 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000080)=0x3) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) r1 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$EVIOCGPROP(r1, 0x40047438, &(0x7f0000000180)=""/246) close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x2) ioctl$PPPIOCGFLAGS1(0xffffffffffffffff, 0x10, 0x0) 10:14:45 executing program 3: prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f00000002c0)=0x0) sched_setscheduler(r0, 0x2, &(0x7f0000000080)=0x6) r1 = getpid() sched_setscheduler(r1, 0x2, &(0x7f00000000c0)=0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r2, &(0x7f000057eff8)=@abs, 0x6e) sendmmsg$unix(r3, &(0x7f00000bd000), 0x318, 0x0) recvmmsg(r2, &(0x7f00000000c0), 0x10106, 0x2, 0x0) syz_mount_image$ext4(&(0x7f0000000180)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xfffbffff00000000, 0x8, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000600100000f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000006856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010300), 0x0, 0x640}, {&(0x7f0000010400)="03000000040000000500000016000f000300040000000000000000000f00698c", 0x20, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}, {&(0x7f0000011000)}, {0x0, 0x0, 0x6700000}, {&(0x7f0000000580), 0x0, 0xc000}], 0x0, &(0x7f0000013b00)=ANY=[@ANYBLOB='\x00']) r4 = creat(&(0x7f0000000000)='./file1\x00', 0x18) r5 = socket(0x10, 0x3, 0x0) sendmsg$nl_route(r5, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f00000005c0)=@ipv4_newroute={0x38, 0x18, 0xbad, 0x0, 0x0, {}, [@RTA_ENCAP_TYPE={0x6, 0x15, 0x3}, @RTA_ENCAP={0x14, 0x16, 0x0, 0x1, @SEG6_IPTUNNEL_SRH={0xd}}]}, 0x38}}, 0x0) r6 = socket(0x26, 0x3, 0x0) sendmsg$nl_route(r6, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f00000005c0)=@ipv4_newroute={0x38, 0x18, 0xbad, 0x0, 0x0, {0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6}, [@RTA_ENCAP_TYPE={0x6, 0x15, 0x3}, @RTA_ENCAP={0x14, 0x16, 0x0, 0x1, @SEG6_IPTUNNEL_SRH={0xd}}]}, 0x38}}, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f00000005c0)=@ipv4_newroute={0x38, 0x18, 0xbad, 0x0, 0x0, {0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6}, [@RTA_ENCAP_TYPE={0x6, 0x15, 0x3}, @RTA_ENCAP={0x14, 0x16, 0x0, 0x1, @SEG6_IPTUNNEL_SRH={0xd}}]}, 0x38}}, 0x0) execveat(r4, 0x0, &(0x7f0000000380)=[&(0x7f00000001c0)='+{!#\x00', &(0x7f0000000300)='ext4\x00', &(0x7f0000000340)='@(\x00'], &(0x7f00000004c0)=[&(0x7f00000003c0)='ext4\x00', &(0x7f0000000400)='ext4\x00', &(0x7f0000000500)='\x00.D\x04\xe0\xce\x99\xd9\xa9\xac\xac\xadH\xa4\xcf\xb7\xffT\xac\x05\xfd\xdd\xb8w\x0f\x82B\xff\xf2\x909`1!\f\x870\x1f\xc1%Y\xc8\x15c \xea\x1cY!\x04\xe4\x91^\x00\x04\xe4\xa6\xba\xc6\xfd\x10\xdf\xe24\xd4&\x17\xdc\xec\xf4\f\n\xb7.\x13\x8e\x1bYENj\xe1\x19~\x1c\xaf\a;d\x9f\xba\xd9T\xd4-\xecX\xc0Y\x83@\xc7\x8b\xff*\xdd\xaa\xc6,o4\xe2\x0f\x16\x01[\xc0\xeb\x7fFI]WF\x1f\f?\xfa\xb1\xe7\xf6t\x027\xb1\xc17.4V\xf81{9\xa3\xb9\x01\xcck@I\xe2\xf1Y\x10E\xa1z/\x05.~Yh%\x8f\x06sB)N\x11P\xf6p\xff\'\xaf\a7\x10+p\xbb\xf3\xb08\xb5)\x00\xeeg\xd0\xee\xe9\x98\x8d\xf8\xb5G\t@f\x1et v\x14\tT\xc5', 0x0], 0x1000) 10:14:45 executing program 2: prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f00000002c0)=0x0) sched_setscheduler(r0, 0x2, &(0x7f0000000080)=0x6) r1 = getpid() sched_setscheduler(r1, 0x2, &(0x7f00000000c0)=0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r2, &(0x7f000057eff8)=@abs, 0x6e) sendmmsg$unix(r3, &(0x7f00000bd000), 0x318, 0x0) recvmmsg(r2, &(0x7f00000000c0), 0x10106, 0x2, 0x0) syz_mount_image$ext4(&(0x7f0000000180)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xfffbffff00000000, 0x8, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000600100000f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000006856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010300), 0x0, 0x640}, {&(0x7f0000010400)="03000000040000000500000016000f000300040000000000000000000f00698c", 0x20, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}, {&(0x7f0000011000)}, {0x0, 0x0, 0x6700000}, {&(0x7f0000000580), 0x0, 0xc000}], 0x0, &(0x7f0000013b00)=ANY=[@ANYBLOB='\x00']) creat(&(0x7f0000000000)='./file1\x00', 0x18) r4 = socket(0x10, 0x3, 0x0) sendmsg$nl_route(r4, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f00000005c0)=@ipv4_newroute={0x38, 0x18, 0xbad, 0x0, 0x0, {}, [@RTA_ENCAP_TYPE={0x6, 0x15, 0x3}, @RTA_ENCAP={0x14, 0x16, 0x0, 0x1, @SEG6_IPTUNNEL_SRH={0xd}}]}, 0x38}}, 0x0) r5 = socket(0x26, 0x3, 0x0) sendmsg$nl_route(r5, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f00000005c0)=@ipv4_newroute={0x38, 0x18, 0xbad, 0x0, 0x0, {0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6}, [@RTA_ENCAP_TYPE={0x6, 0x15, 0x3}, @RTA_ENCAP={0x14, 0x16, 0x0, 0x1, @SEG6_IPTUNNEL_SRH={0xd}}]}, 0x38}}, 0x0) socket(0x10, 0x0, 0x0) recvfrom(r2, &(0x7f0000000600)=""/203, 0xcb, 0x42, &(0x7f0000000700)=@hci={0x1f, 0xffffffffffffffff, 0x4}, 0x80) [ 2185.129739][T25312] loop3: detected capacity change from 0 to 264192 [ 2185.151081][T25311] loop2: detected capacity change from 0 to 264192 10:14:46 executing program 1: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000005c0)={{0x14}, [@NFT_MSG_NEWTABLE={0x20, 0x0, 0xa, 0x3, 0x0, 0x0, {0x1}, [@NFTA_TABLE_NAME={0x9, 0x1, 'syz0\x00'}]}, @NFT_MSG_NEWSET={0x3c, 0x9, 0xa, 0x401, 0x0, 0x0, {0x1}, [@NFTA_SET_ID={0x8}, @NFTA_SET_NAME={0x9, 0x2, 'syz2\x00'}, @NFTA_SET_TABLE={0x9, 0x1, 'syz0\x00'}, @NFTA_SET_KEY_LEN={0x8, 0x5, 0x1, 0x0, 0x1f}]}, @NFT_MSG_NEWSETELEM={0x40, 0xc, 0xa, 0x201, 0x0, 0x0, {0x1}, [@NFTA_SET_ELEM_LIST_SET={0x9, 0x2, 'syz2\x00'}, @NFTA_SET_ELEM_LIST_ELEMENTS={0x14, 0x3, 0x0, 0x1, [{0x10, 0x0, 0x0, 0x1, [@NFTA_SET_ELEM_TIMEOUT={0xc, 0x6}]}]}, @NFTA_SET_ELEM_LIST_TABLE={0x9, 0x1, 'syz0\x00'}]}], {0x14, 0x10}}, 0xc4}}, 0x0) 10:14:46 executing program 4: prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f00000002c0)=0x0) sched_setscheduler(r0, 0x2, &(0x7f0000000080)=0x6) r1 = getpid() sched_setscheduler(r1, 0x2, &(0x7f00000000c0)=0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r2, &(0x7f000057eff8)=@abs, 0x6e) sendmmsg$unix(r3, &(0x7f00000bd000), 0x318, 0x0) recvmmsg(r2, &(0x7f00000000c0), 0x10106, 0x2, 0x0) syz_mount_image$ext4(&(0x7f0000000180)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xfffbffff00000000, 0x8, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000600100000f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000006856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010300), 0x0, 0x640}, {&(0x7f0000010400)="03000000040000000500000016000f000300040000000000000000000f00698c", 0x20, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}, {&(0x7f0000011000)}, {0x0, 0x0, 0x6700000}, {&(0x7f0000000580), 0x0, 0xc000}], 0x0, &(0x7f0000013b00)=ANY=[@ANYBLOB='\x00']) r4 = creat(&(0x7f0000000000)='./file1\x00', 0x18) r5 = socket(0x10, 0x3, 0x0) sendmsg$nl_route(r5, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f00000005c0)=@ipv4_newroute={0x38, 0x18, 0xbad, 0x0, 0x0, {}, [@RTA_ENCAP_TYPE={0x6, 0x15, 0x3}, @RTA_ENCAP={0x14, 0x16, 0x0, 0x1, @SEG6_IPTUNNEL_SRH={0xd}}]}, 0x38}}, 0x0) r6 = socket(0x26, 0x3, 0x0) sendmsg$nl_route(r6, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f00000005c0)=@ipv4_newroute={0x38, 0x18, 0xbad, 0x0, 0x0, {0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6}, [@RTA_ENCAP_TYPE={0x6, 0x15, 0x3}, @RTA_ENCAP={0x14, 0x16, 0x0, 0x1, @SEG6_IPTUNNEL_SRH={0xd}}]}, 0x38}}, 0x0) r7 = socket(0x10, 0x0, 0x0) sendmsg$nl_route(r7, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f00000005c0)=@ipv4_newroute={0x38, 0x18, 0xbad, 0x0, 0x0, {0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6}, [@RTA_ENCAP_TYPE={0x6, 0x15, 0x3}, @RTA_ENCAP={0x14, 0x16, 0x0, 0x1, @SEG6_IPTUNNEL_SRH={0xd}}]}, 0x38}}, 0x0) execveat(r4, &(0x7f0000000040)='./file0\x00', &(0x7f0000000380)=[&(0x7f00000001c0)='+{!#\x00', &(0x7f0000000300)='ext4\x00', &(0x7f0000000340)='@(\x00'], &(0x7f00000004c0)=[&(0x7f00000003c0)='ext4\x00', &(0x7f0000000400)='ext4\x00', &(0x7f0000000500)='\x00.D\x04\xe0\xce\x99\xd9\xa9\xac\xac\xadH\xa4\xcf\xb7\xffT\xac\x05\xfd\xdd\xb8w\x0f\x82B\xff\xf2\x909`1!\f\x870\x1f\xc1%Y\xc8\x15c \xea\x1cY!\x04\xe4\x91^\x00\x04\xe4\xa6\xba\xc6\xfd\x10\xdf\xe24\xd4&\x17\xdc\xec\xf4\f\n\xb7.\x13\x8e\x1bYENj\xe1\x19~\x1c\xaf\a;d\x9f\xba\xd9T\xd4-\xecX\xc0Y\x83@\xc7\x8b\xff*\xdd\xaa\xc6,o4\xe2\x0f\x16\x01[\xc0\xeb\x7fFI]WF\x1f\f?\xfa\xb1\xe7\xf6t\x027\xb1\xc17.4V\xf81{9\xa3\xb9\x01\xcck@I\xe2\xf1Y\x10E\xa1z/\x05.~Yh%\x8f\x06sB)N\x11P\xf6p\xff\'\xaf\a7\x10+p\xbb\xf3\xb08\xb5)\x00\xeeg\xd0\xee\xe9\x98\x8d\xf8\xb5G\t@f\x1et v\x14\tT\xc5', &(0x7f0000000480)=':--[\x00'], 0x1000) 10:14:46 executing program 0: prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f00000002c0)=0x0) sched_setscheduler(r0, 0x2, &(0x7f0000000080)=0x6) r1 = getpid() sched_setscheduler(r1, 0x2, &(0x7f00000000c0)=0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r2, &(0x7f000057eff8)=@abs, 0x6e) sendmmsg$unix(r3, &(0x7f00000bd000), 0x318, 0x0) recvmmsg(r2, &(0x7f00000000c0), 0x10106, 0x2, 0x0) syz_mount_image$ext4(&(0x7f0000000180)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xfffbffff00000000, 0x8, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000600100000f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000006856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010300), 0x0, 0x640}, {&(0x7f0000010400)="03000000040000000500000016000f000300040000000000000000000f00698c", 0x20, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}, {&(0x7f0000011000)}, {0x0, 0x0, 0x6700000}, {&(0x7f0000000580), 0x0, 0xc000}], 0x0, &(0x7f0000013b00)=ANY=[@ANYBLOB='\x00']) r4 = creat(&(0x7f0000000000)='./file1\x00', 0x18) r5 = socket(0x10, 0x3, 0x0) sendmsg$nl_route(r5, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f00000005c0)=@ipv4_newroute={0x38, 0x18, 0xbad, 0x0, 0x0, {}, [@RTA_ENCAP_TYPE={0x6, 0x15, 0x3}, @RTA_ENCAP={0x14, 0x16, 0x0, 0x1, @SEG6_IPTUNNEL_SRH={0xd}}]}, 0x38}}, 0x0) r6 = socket(0x26, 0x3, 0x0) sendmsg$nl_route(r6, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f00000005c0)=@ipv4_newroute={0x38, 0x18, 0xbad, 0x0, 0x0, {}, [@RTA_ENCAP_TYPE={0x6, 0x15, 0x3}, @RTA_ENCAP={0x14, 0x16, 0x0, 0x1, @SEG6_IPTUNNEL_SRH={0xd}}]}, 0x38}}, 0x0) r7 = socket(0x10, 0x3, 0x0) sendmsg$nl_route(r7, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f00000005c0)=@ipv4_newroute={0x38, 0x18, 0xbad, 0x0, 0x0, {0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6}, [@RTA_ENCAP_TYPE={0x6, 0x15, 0x3}, @RTA_ENCAP={0x14, 0x16, 0x0, 0x1, @SEG6_IPTUNNEL_SRH={0xd}}]}, 0x38}}, 0x0) execveat(r4, &(0x7f0000000040)='./file0\x00', &(0x7f0000000380)=[&(0x7f00000001c0)='+{!#\x00', &(0x7f0000000300)='ext4\x00', &(0x7f0000000340)='@(\x00'], &(0x7f00000004c0)=[&(0x7f00000003c0)='ext4\x00', &(0x7f0000000400)='ext4\x00', &(0x7f0000000500)='\x00.D\x04\xe0\xce\x99\xd9\xa9\xac\xac\xadH\xa4\xcf\xb7\xffT\xac\x05\xfd\xdd\xb8w\x0f\x82B\xff\xf2\x909`1!\f\x870\x1f\xc1%Y\xc8\x15c \xea\x1cY!\x04\xe4\x91^\x00\x04\xe4\xa6\xba\xc6\xfd\x10\xdf\xe24\xd4&\x17\xdc\xec\xf4\f\n\xb7.\x13\x8e\x1bYENj\xe1\x19~\x1c\xaf\a;d\x9f\xba\xd9T\xd4-\xecX\xc0Y\x83@\xc7\x8b\xff*\xdd\xaa\xc6,o4\xe2\x0f\x16\x01[\xc0\xeb\x7fFI]WF\x1f\f?\xfa\xb1\xe7\xf6t\x027\xb1\xc17.4V\xf81{9\xa3\xb9\x01\xcck@I\xe2\xf1Y\x10E\xa1z/\x05.~Yh%\x8f\x06sB)N\x11P\xf6p\xff\'\xaf\a7\x10+p\xbb\xf3\xb08\xb5)\x00\xeeg\xd0\xee\xe9\x98\x8d\xf8\xb5G\t@f\x1et v\x14\tT\xc5', &(0x7f0000000480)=':--[\x00'], 0x1000) recvfrom(r2, &(0x7f0000000600)=""/203, 0xcb, 0x42, &(0x7f0000000700)=@hci={0x1f, 0xffffffffffffffff, 0x4}, 0x80) 10:14:46 executing program 3: prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f00000002c0)=0x0) sched_setscheduler(r0, 0x2, &(0x7f0000000080)=0x6) r1 = getpid() sched_setscheduler(r1, 0x2, &(0x7f00000000c0)=0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r2, &(0x7f000057eff8)=@abs, 0x6e) sendmmsg$unix(r3, &(0x7f00000bd000), 0x318, 0x0) recvmmsg(r2, &(0x7f00000000c0), 0x10106, 0x2, 0x0) syz_mount_image$ext4(&(0x7f0000000180)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xfffbffff00000000, 0x8, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000600100000f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000006856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010300), 0x0, 0x640}, {&(0x7f0000010400)="03000000040000000500000016000f000300040000000000000000000f00698c", 0x20, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}, {&(0x7f0000011000)}, {0x0, 0x0, 0x6700000}, {&(0x7f0000000580), 0x0, 0xc000}], 0x0, &(0x7f0000013b00)=ANY=[@ANYBLOB='\x00']) r4 = creat(&(0x7f0000000000)='./file1\x00', 0x18) r5 = socket(0x10, 0x3, 0x0) sendmsg$nl_route(r5, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f00000005c0)=@ipv4_newroute={0x38, 0x18, 0xbad, 0x0, 0x0, {}, [@RTA_ENCAP_TYPE={0x6, 0x15, 0x3}, @RTA_ENCAP={0x14, 0x16, 0x0, 0x1, @SEG6_IPTUNNEL_SRH={0xd}}]}, 0x38}}, 0x0) socket(0x26, 0x3, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f00000005c0)=@ipv4_newroute={0x38, 0x18, 0xbad, 0x0, 0x0, {0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6}, [@RTA_ENCAP_TYPE={0x6, 0x15, 0x3}, @RTA_ENCAP={0x14, 0x16, 0x0, 0x1, @SEG6_IPTUNNEL_SRH={0xd}}]}, 0x38}}, 0x0) execveat(r4, 0x0, &(0x7f0000000380)=[&(0x7f00000001c0)='+{!#\x00', &(0x7f0000000300)='ext4\x00', &(0x7f0000000340)='@(\x00'], &(0x7f00000004c0)=[&(0x7f00000003c0)='ext4\x00', &(0x7f0000000400)='ext4\x00', &(0x7f0000000500)='\x00.D\x04\xe0\xce\x99\xd9\xa9\xac\xac\xadH\xa4\xcf\xb7\xffT\xac\x05\xfd\xdd\xb8w\x0f\x82B\xff\xf2\x909`1!\f\x870\x1f\xc1%Y\xc8\x15c \xea\x1cY!\x04\xe4\x91^\x00\x04\xe4\xa6\xba\xc6\xfd\x10\xdf\xe24\xd4&\x17\xdc\xec\xf4\f\n\xb7.\x13\x8e\x1bYENj\xe1\x19~\x1c\xaf\a;d\x9f\xba\xd9T\xd4-\xecX\xc0Y\x83@\xc7\x8b\xff*\xdd\xaa\xc6,o4\xe2\x0f\x16\x01[\xc0\xeb\x7fFI]WF\x1f\f?\xfa\xb1\xe7\xf6t\x027\xb1\xc17.4V\xf81{9\xa3\xb9\x01\xcck@I\xe2\xf1Y\x10E\xa1z/\x05.~Yh%\x8f\x06sB)N\x11P\xf6p\xff\'\xaf\a7\x10+p\xbb\xf3\xb08\xb5)\x00\xeeg\xd0\xee\xe9\x98\x8d\xf8\xb5G\t@f\x1et v\x14\tT\xc5', 0x0], 0x1000) 10:14:46 executing program 2: prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f00000002c0)=0x0) sched_setscheduler(r0, 0x2, &(0x7f0000000080)=0x6) r1 = getpid() sched_setscheduler(r1, 0x2, &(0x7f00000000c0)=0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r2, &(0x7f000057eff8)=@abs, 0x6e) sendmmsg$unix(r3, &(0x7f00000bd000), 0x318, 0x0) recvmmsg(r2, &(0x7f00000000c0), 0x10106, 0x2, 0x0) syz_mount_image$ext4(&(0x7f0000000180)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xfffbffff00000000, 0x8, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000600100000f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000006856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010300), 0x0, 0x640}, {&(0x7f0000010400)="03000000040000000500000016000f000300040000000000000000000f00698c", 0x20, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}, {&(0x7f0000011000)}, {0x0, 0x0, 0x6700000}, {&(0x7f0000000580), 0x0, 0xc000}], 0x0, &(0x7f0000013b00)=ANY=[@ANYBLOB='\x00']) creat(&(0x7f0000000000)='./file1\x00', 0x18) r4 = socket(0x10, 0x3, 0x0) sendmsg$nl_route(r4, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f00000005c0)=@ipv4_newroute={0x38, 0x18, 0xbad, 0x0, 0x0, {}, [@RTA_ENCAP_TYPE={0x6, 0x15, 0x3}, @RTA_ENCAP={0x14, 0x16, 0x0, 0x1, @SEG6_IPTUNNEL_SRH={0xd}}]}, 0x38}}, 0x0) r5 = socket(0x26, 0x3, 0x0) sendmsg$nl_route(r5, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f00000005c0)=@ipv4_newroute={0x38, 0x18, 0xbad, 0x0, 0x0, {0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6}, [@RTA_ENCAP_TYPE={0x6, 0x15, 0x3}, @RTA_ENCAP={0x14, 0x16, 0x0, 0x1, @SEG6_IPTUNNEL_SRH={0xd}}]}, 0x38}}, 0x0) socket(0x10, 0x0, 0x0) recvfrom(r2, &(0x7f0000000600)=""/203, 0xcb, 0x42, &(0x7f0000000700)=@hci={0x1f, 0xffffffffffffffff, 0x4}, 0x80) [ 2185.676223][T25312] EXT4-fs (loop3): mounted filesystem without journal. Quota mode: writeback. [ 2185.676282][T25311] EXT4-fs (loop2): mounted filesystem without journal. Quota mode: writeback. [ 2185.970525][T25335] loop4: detected capacity change from 0 to 264192 10:14:47 executing program 1: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000005c0)={{0x14}, [@NFT_MSG_NEWTABLE={0x20, 0x0, 0xa, 0x3, 0x0, 0x0, {0x1}, [@NFTA_TABLE_NAME={0x9, 0x1, 'syz0\x00'}]}, @NFT_MSG_NEWSET={0x3c, 0x9, 0xa, 0x401, 0x0, 0x0, {0x1}, [@NFTA_SET_ID={0x8}, @NFTA_SET_NAME={0x9, 0x2, 'syz2\x00'}, @NFTA_SET_TABLE={0x9, 0x1, 'syz0\x00'}, @NFTA_SET_KEY_LEN={0x8, 0x5, 0x1, 0x0, 0x1f}]}, @NFT_MSG_NEWSETELEM={0x48, 0xc, 0xa, 0x201, 0x0, 0x0, {0x1}, [@NFTA_SET_ELEM_LIST_SET={0x9, 0x2, 'syz2\x00'}, @NFTA_SET_ELEM_LIST_ELEMENTS={0x1c, 0x3, 0x0, 0x1, [{0x18, 0x0, 0x0, 0x1, [@NFTA_SET_ELEM_FLAGS={0x8}, @NFTA_SET_ELEM_TIMEOUT={0x4, 0x6}]}]}, @NFTA_SET_ELEM_LIST_TABLE={0x9, 0x1, 'syz0\x00'}]}], {0x14, 0x10}}, 0xcc}}, 0x0) [ 2186.834055][T25343] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.1'. [ 2187.089161][T25337] loop3: detected capacity change from 0 to 264192 [ 2187.519626][T25335] EXT4-fs: failed to create workqueue [ 2187.525046][T25335] EXT4-fs (loop4): mount failed [ 2187.727616][T25337] EXT4-fs: failed to create workqueue [ 2187.733039][T25337] EXT4-fs (loop3): mount failed [ 2187.747656][T25353] loop2: detected capacity change from 0 to 264192 [ 2187.812863][T25353] EXT4-fs (loop2): mounted filesystem without journal. Quota mode: writeback. 10:14:57 executing program 5: prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f00000002c0)=0x0) sched_setscheduler(r0, 0x2, &(0x7f0000000080)=0x6) r1 = getpid() sched_setscheduler(r1, 0x2, &(0x7f00000000c0)=0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r2, &(0x7f000057eff8)=@abs, 0x6e) sendmmsg$unix(r3, &(0x7f00000bd000), 0x318, 0x0) recvmmsg(r2, &(0x7f00000000c0), 0x10106, 0x2, 0x0) syz_mount_image$ext4(&(0x7f0000000180)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xfffbffff00000000, 0x8, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000600100000f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000006856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010300), 0x0, 0x640}, {&(0x7f0000010400)="03000000040000000500000016000f000300040000000000000000000f00698c", 0x20, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}, {&(0x7f0000011000)}, {0x0, 0x0, 0x6700000}, {&(0x7f0000000580), 0x0, 0xc000}], 0x0, &(0x7f0000013b00)=ANY=[@ANYBLOB='\x00']) r4 = creat(&(0x7f0000000000)='./file1\x00', 0x18) r5 = socket(0x10, 0x3, 0x0) sendmsg$nl_route(r5, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f00000005c0)=@ipv4_newroute={0x38, 0x18, 0xbad, 0x0, 0x0, {}, [@RTA_ENCAP_TYPE={0x6, 0x15, 0x3}, @RTA_ENCAP={0x14, 0x16, 0x0, 0x1, @SEG6_IPTUNNEL_SRH={0xd}}]}, 0x38}}, 0x0) r6 = socket(0x26, 0x3, 0x0) sendmsg$nl_route(r6, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f00000005c0)=@ipv4_newroute={0x38, 0x18, 0xbad, 0x0, 0x0, {}, [@RTA_ENCAP_TYPE={0x6, 0x15, 0x3}, @RTA_ENCAP={0x14, 0x16, 0x0, 0x1, @SEG6_IPTUNNEL_SRH={0xd}}]}, 0x38}}, 0x0) r7 = socket(0x10, 0x3, 0x0) sendmsg$nl_route(r7, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f00000005c0)=@ipv4_newroute={0x38, 0x18, 0xbad, 0x0, 0x0, {0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6}, [@RTA_ENCAP_TYPE={0x6, 0x15, 0x3}, @RTA_ENCAP={0x14, 0x16, 0x0, 0x1, @SEG6_IPTUNNEL_SRH={0xd}}]}, 0x38}}, 0x0) execveat(r4, &(0x7f0000000040)='./file0\x00', &(0x7f0000000380)=[&(0x7f00000001c0)='+{!#\x00', &(0x7f0000000300)='ext4\x00', &(0x7f0000000340)='@(\x00'], &(0x7f00000004c0)=[&(0x7f00000003c0)='ext4\x00', &(0x7f0000000400)='ext4\x00', &(0x7f0000000500)='\x00.D\x04\xe0\xce\x99\xd9\xa9\xac\xac\xadH\xa4\xcf\xb7\xffT\xac\x05\xfd\xdd\xb8w\x0f\x82B\xff\xf2\x909`1!\f\x870\x1f\xc1%Y\xc8\x15c \xea\x1cY!\x04\xe4\x91^\x00\x04\xe4\xa6\xba\xc6\xfd\x10\xdf\xe24\xd4&\x17\xdc\xec\xf4\f\n\xb7.\x13\x8e\x1bYENj\xe1\x19~\x1c\xaf\a;d\x9f\xba\xd9T\xd4-\xecX\xc0Y\x83@\xc7\x8b\xff*\xdd\xaa\xc6,o4\xe2\x0f\x16\x01[\xc0\xeb\x7fFI]WF\x1f\f?\xfa\xb1\xe7\xf6t\x027\xb1\xc17.4V\xf81{9\xa3\xb9\x01\xcck@I\xe2\xf1Y\x10E\xa1z/\x05.~Yh%\x8f\x06sB)N\x11P\xf6p\xff\'\xaf\a7\x10+p\xbb\xf3\xb08\xb5)\x00\xeeg\xd0\xee\xe9\x98\x8d\xf8\xb5G\t@f\x1et v\x14\tT\xc5', &(0x7f0000000480)=':--[\x00'], 0x1000) recvfrom(r2, &(0x7f0000000600)=""/203, 0xcb, 0x42, &(0x7f0000000700)=@hci={0x1f, 0xffffffffffffffff, 0x4}, 0x80) 10:14:57 executing program 0: prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f00000002c0)=0x0) sched_setscheduler(r0, 0x2, &(0x7f0000000080)=0x6) r1 = getpid() sched_setscheduler(r1, 0x2, &(0x7f00000000c0)=0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r2, &(0x7f000057eff8)=@abs, 0x6e) sendmmsg$unix(r3, &(0x7f00000bd000), 0x318, 0x0) recvmmsg(r2, &(0x7f00000000c0), 0x10106, 0x2, 0x0) syz_mount_image$ext4(&(0x7f0000000180)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xfffbffff00000000, 0x8, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000600100000f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000006856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010300), 0x0, 0x640}, {&(0x7f0000010400)="03000000040000000500000016000f000300040000000000000000000f00698c", 0x20, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}, {&(0x7f0000011000)}, {0x0, 0x0, 0x6700000}, {&(0x7f0000000580), 0x0, 0xc000}], 0x0, &(0x7f0000013b00)=ANY=[@ANYBLOB='\x00']) r4 = creat(&(0x7f0000000000)='./file1\x00', 0x18) r5 = socket(0x10, 0x3, 0x0) sendmsg$nl_route(r5, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f00000005c0)=@ipv4_newroute={0x38, 0x18, 0xbad, 0x0, 0x0, {}, [@RTA_ENCAP_TYPE={0x6, 0x15, 0x3}, @RTA_ENCAP={0x14, 0x16, 0x0, 0x1, @SEG6_IPTUNNEL_SRH={0xd}}]}, 0x38}}, 0x0) r6 = socket(0x26, 0x3, 0x0) sendmsg$nl_route(r6, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f00000005c0)=@ipv4_newroute={0x38, 0x18, 0xbad, 0x0, 0x0, {}, [@RTA_ENCAP_TYPE={0x6, 0x15, 0x3}, @RTA_ENCAP={0x14, 0x16, 0x0, 0x1, @SEG6_IPTUNNEL_SRH={0xd}}]}, 0x38}}, 0x0) r7 = socket(0x10, 0x3, 0x0) sendmsg$nl_route(r7, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f00000005c0)=@ipv4_newroute={0x38, 0x18, 0xbad, 0x0, 0x0, {0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6}, [@RTA_ENCAP_TYPE={0x6, 0x15, 0x3}, @RTA_ENCAP={0x14, 0x16, 0x0, 0x1, @SEG6_IPTUNNEL_SRH={0xd}}]}, 0x38}}, 0x0) execveat(r4, &(0x7f0000000040)='./file0\x00', &(0x7f0000000380)=[&(0x7f00000001c0)='+{!#\x00', &(0x7f0000000300)='ext4\x00', &(0x7f0000000340)='@(\x00'], &(0x7f00000004c0)=[&(0x7f00000003c0)='ext4\x00', &(0x7f0000000400)='ext4\x00', &(0x7f0000000500)='\x00.D\x04\xe0\xce\x99\xd9\xa9\xac\xac\xadH\xa4\xcf\xb7\xffT\xac\x05\xfd\xdd\xb8w\x0f\x82B\xff\xf2\x909`1!\f\x870\x1f\xc1%Y\xc8\x15c \xea\x1cY!\x04\xe4\x91^\x00\x04\xe4\xa6\xba\xc6\xfd\x10\xdf\xe24\xd4&\x17\xdc\xec\xf4\f\n\xb7.\x13\x8e\x1bYENj\xe1\x19~\x1c\xaf\a;d\x9f\xba\xd9T\xd4-\xecX\xc0Y\x83@\xc7\x8b\xff*\xdd\xaa\xc6,o4\xe2\x0f\x16\x01[\xc0\xeb\x7fFI]WF\x1f\f?\xfa\xb1\xe7\xf6t\x027\xb1\xc17.4V\xf81{9\xa3\xb9\x01\xcck@I\xe2\xf1Y\x10E\xa1z/\x05.~Yh%\x8f\x06sB)N\x11P\xf6p\xff\'\xaf\a7\x10+p\xbb\xf3\xb08\xb5)\x00\xeeg\xd0\xee\xe9\x98\x8d\xf8\xb5G\t@f\x1et v\x14\tT\xc5', &(0x7f0000000480)=':--[\x00'], 0x1000) recvfrom(r2, &(0x7f0000000600)=""/203, 0xcb, 0x42, &(0x7f0000000700)=@hci={0x1f, 0xffffffffffffffff, 0x4}, 0x80) 10:14:57 executing program 1: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000005c0)={{0x14}, [@NFT_MSG_NEWTABLE={0x20, 0x0, 0xa, 0x3, 0x0, 0x0, {0x1}, [@NFTA_TABLE_NAME={0x9, 0x1, 'syz0\x00'}]}, @NFT_MSG_NEWSET={0x3c, 0x9, 0xa, 0x401, 0x0, 0x0, {0x1}, [@NFTA_SET_ID={0x8}, @NFTA_SET_NAME={0x9, 0x2, 'syz2\x00'}, @NFTA_SET_TABLE={0x9, 0x1, 'syz0\x00'}, @NFTA_SET_KEY_LEN={0x8, 0x5, 0x1, 0x0, 0x1f}]}, @NFT_MSG_NEWSETELEM={0x48, 0xc, 0xa, 0x201, 0x0, 0x0, {0x1}, [@NFTA_SET_ELEM_LIST_SET={0x9, 0x2, 'syz2\x00'}, @NFTA_SET_ELEM_LIST_ELEMENTS={0x1c, 0x3, 0x0, 0x1, [{0x18, 0x0, 0x0, 0x1, [@NFTA_SET_ELEM_FLAGS={0x8}, @NFTA_SET_ELEM_TIMEOUT={0x4, 0x6}]}]}, @NFTA_SET_ELEM_LIST_TABLE={0x9, 0x1, 'syz0\x00'}]}], {0x14, 0x10}}, 0xcc}}, 0x0) 10:14:57 executing program 3: prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f00000002c0)=0x0) sched_setscheduler(r0, 0x2, &(0x7f0000000080)=0x6) r1 = getpid() sched_setscheduler(r1, 0x2, &(0x7f00000000c0)=0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r2, &(0x7f000057eff8)=@abs, 0x6e) sendmmsg$unix(r3, &(0x7f00000bd000), 0x318, 0x0) recvmmsg(r2, &(0x7f00000000c0), 0x10106, 0x2, 0x0) syz_mount_image$ext4(&(0x7f0000000180)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xfffbffff00000000, 0x8, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000600100000f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000006856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010300), 0x0, 0x640}, {&(0x7f0000010400)="03000000040000000500000016000f000300040000000000000000000f00698c", 0x20, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}, {&(0x7f0000011000)}, {0x0, 0x0, 0x6700000}, {&(0x7f0000000580), 0x0, 0xc000}], 0x0, &(0x7f0000013b00)=ANY=[@ANYBLOB='\x00']) r4 = creat(&(0x7f0000000000)='./file1\x00', 0x18) r5 = socket(0x10, 0x3, 0x0) sendmsg$nl_route(r5, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f00000005c0)=@ipv4_newroute={0x38, 0x18, 0xbad, 0x0, 0x0, {}, [@RTA_ENCAP_TYPE={0x6, 0x15, 0x3}, @RTA_ENCAP={0x14, 0x16, 0x0, 0x1, @SEG6_IPTUNNEL_SRH={0xd}}]}, 0x38}}, 0x0) socket(0x26, 0x3, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f00000005c0)=@ipv4_newroute={0x38, 0x18, 0xbad, 0x0, 0x0, {0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6}, [@RTA_ENCAP_TYPE={0x6, 0x15, 0x3}, @RTA_ENCAP={0x14, 0x16, 0x0, 0x1, @SEG6_IPTUNNEL_SRH={0xd}}]}, 0x38}}, 0x0) execveat(r4, 0x0, &(0x7f0000000380)=[&(0x7f00000001c0)='+{!#\x00', &(0x7f0000000300)='ext4\x00', &(0x7f0000000340)='@(\x00'], &(0x7f00000004c0)=[&(0x7f00000003c0)='ext4\x00', &(0x7f0000000400)='ext4\x00', &(0x7f0000000500)='\x00.D\x04\xe0\xce\x99\xd9\xa9\xac\xac\xadH\xa4\xcf\xb7\xffT\xac\x05\xfd\xdd\xb8w\x0f\x82B\xff\xf2\x909`1!\f\x870\x1f\xc1%Y\xc8\x15c \xea\x1cY!\x04\xe4\x91^\x00\x04\xe4\xa6\xba\xc6\xfd\x10\xdf\xe24\xd4&\x17\xdc\xec\xf4\f\n\xb7.\x13\x8e\x1bYENj\xe1\x19~\x1c\xaf\a;d\x9f\xba\xd9T\xd4-\xecX\xc0Y\x83@\xc7\x8b\xff*\xdd\xaa\xc6,o4\xe2\x0f\x16\x01[\xc0\xeb\x7fFI]WF\x1f\f?\xfa\xb1\xe7\xf6t\x027\xb1\xc17.4V\xf81{9\xa3\xb9\x01\xcck@I\xe2\xf1Y\x10E\xa1z/\x05.~Yh%\x8f\x06sB)N\x11P\xf6p\xff\'\xaf\a7\x10+p\xbb\xf3\xb08\xb5)\x00\xeeg\xd0\xee\xe9\x98\x8d\xf8\xb5G\t@f\x1et v\x14\tT\xc5', 0x0], 0x1000) 10:14:57 executing program 4: prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f00000002c0)=0x0) sched_setscheduler(r0, 0x2, &(0x7f0000000080)=0x6) r1 = getpid() sched_setscheduler(r1, 0x2, &(0x7f00000000c0)=0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r2, &(0x7f000057eff8)=@abs, 0x6e) sendmmsg$unix(r3, &(0x7f00000bd000), 0x318, 0x0) recvmmsg(r2, &(0x7f00000000c0), 0x10106, 0x2, 0x0) syz_mount_image$ext4(&(0x7f0000000180)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xfffbffff00000000, 0x8, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000600100000f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000006856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010300), 0x0, 0x640}, {&(0x7f0000010400)="03000000040000000500000016000f000300040000000000000000000f00698c", 0x20, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}, {&(0x7f0000011000)}, {0x0, 0x0, 0x6700000}, {&(0x7f0000000580), 0x0, 0xc000}], 0x0, &(0x7f0000013b00)=ANY=[@ANYBLOB='\x00']) r4 = creat(&(0x7f0000000000)='./file1\x00', 0x18) r5 = socket(0x10, 0x3, 0x0) sendmsg$nl_route(r5, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f00000005c0)=@ipv4_newroute={0x38, 0x18, 0xbad, 0x0, 0x0, {}, [@RTA_ENCAP_TYPE={0x6, 0x15, 0x3}, @RTA_ENCAP={0x14, 0x16, 0x0, 0x1, @SEG6_IPTUNNEL_SRH={0xd}}]}, 0x38}}, 0x0) r6 = socket(0x26, 0x3, 0x0) sendmsg$nl_route(r6, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f00000005c0)=@ipv4_newroute={0x38, 0x18, 0xbad, 0x0, 0x0, {0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6}, [@RTA_ENCAP_TYPE={0x6, 0x15, 0x3}, @RTA_ENCAP={0x14, 0x16, 0x0, 0x1, @SEG6_IPTUNNEL_SRH={0xd}}]}, 0x38}}, 0x0) r7 = socket(0x10, 0x0, 0x0) sendmsg$nl_route(r7, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f00000005c0)=@ipv4_newroute={0x38, 0x18, 0xbad, 0x0, 0x0, {0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6}, [@RTA_ENCAP_TYPE={0x6, 0x15, 0x3}, @RTA_ENCAP={0x14, 0x16, 0x0, 0x1, @SEG6_IPTUNNEL_SRH={0xd}}]}, 0x38}}, 0x0) execveat(r4, &(0x7f0000000040)='./file0\x00', &(0x7f0000000380)=[&(0x7f00000001c0)='+{!#\x00', &(0x7f0000000300)='ext4\x00', &(0x7f0000000340)='@(\x00'], &(0x7f00000004c0)=[&(0x7f00000003c0)='ext4\x00', &(0x7f0000000400)='ext4\x00', &(0x7f0000000500)='\x00.D\x04\xe0\xce\x99\xd9\xa9\xac\xac\xadH\xa4\xcf\xb7\xffT\xac\x05\xfd\xdd\xb8w\x0f\x82B\xff\xf2\x909`1!\f\x870\x1f\xc1%Y\xc8\x15c \xea\x1cY!\x04\xe4\x91^\x00\x04\xe4\xa6\xba\xc6\xfd\x10\xdf\xe24\xd4&\x17\xdc\xec\xf4\f\n\xb7.\x13\x8e\x1bYENj\xe1\x19~\x1c\xaf\a;d\x9f\xba\xd9T\xd4-\xecX\xc0Y\x83@\xc7\x8b\xff*\xdd\xaa\xc6,o4\xe2\x0f\x16\x01[\xc0\xeb\x7fFI]WF\x1f\f?\xfa\xb1\xe7\xf6t\x027\xb1\xc17.4V\xf81{9\xa3\xb9\x01\xcck@I\xe2\xf1Y\x10E\xa1z/\x05.~Yh%\x8f\x06sB)N\x11P\xf6p\xff\'\xaf\a7\x10+p\xbb\xf3\xb08\xb5)\x00\xeeg\xd0\xee\xe9\x98\x8d\xf8\xb5G\t@f\x1et v\x14\tT\xc5', &(0x7f0000000480)=':--[\x00'], 0x1000) 10:14:57 executing program 2: prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f00000002c0)=0x0) sched_setscheduler(r0, 0x2, &(0x7f0000000080)=0x6) r1 = getpid() sched_setscheduler(r1, 0x2, &(0x7f00000000c0)=0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r2, &(0x7f000057eff8)=@abs, 0x6e) sendmmsg$unix(r3, &(0x7f00000bd000), 0x318, 0x0) recvmmsg(r2, &(0x7f00000000c0), 0x10106, 0x2, 0x0) syz_mount_image$ext4(&(0x7f0000000180)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xfffbffff00000000, 0x8, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000600100000f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000006856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010300), 0x0, 0x640}, {&(0x7f0000010400)="03000000040000000500000016000f000300040000000000000000000f00698c", 0x20, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}, {&(0x7f0000011000)}, {0x0, 0x0, 0x6700000}, {&(0x7f0000000580), 0x0, 0xc000}], 0x0, &(0x7f0000013b00)=ANY=[@ANYBLOB='\x00']) creat(&(0x7f0000000000)='./file1\x00', 0x18) r4 = socket(0x10, 0x3, 0x0) sendmsg$nl_route(r4, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f00000005c0)=@ipv4_newroute={0x38, 0x18, 0xbad, 0x0, 0x0, {}, [@RTA_ENCAP_TYPE={0x6, 0x15, 0x3}, @RTA_ENCAP={0x14, 0x16, 0x0, 0x1, @SEG6_IPTUNNEL_SRH={0xd}}]}, 0x38}}, 0x0) r5 = socket(0x26, 0x3, 0x0) sendmsg$nl_route(r5, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f00000005c0)=@ipv4_newroute={0x38, 0x18, 0xbad, 0x0, 0x0, {0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6}, [@RTA_ENCAP_TYPE={0x6, 0x15, 0x3}, @RTA_ENCAP={0x14, 0x16, 0x0, 0x1, @SEG6_IPTUNNEL_SRH={0xd}}]}, 0x38}}, 0x0) socket(0x10, 0x0, 0x0) recvfrom(r2, &(0x7f0000000600)=""/203, 0xcb, 0x42, &(0x7f0000000700)=@hci={0x1f, 0xffffffffffffffff, 0x4}, 0x80) 10:14:57 executing program 1: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000005c0)={{0x14}, [@NFT_MSG_NEWTABLE={0x20, 0x0, 0xa, 0x3, 0x0, 0x0, {0x1}, [@NFTA_TABLE_NAME={0x9, 0x1, 'syz0\x00'}]}, @NFT_MSG_NEWSET={0x3c, 0x9, 0xa, 0x401, 0x0, 0x0, {0x1}, [@NFTA_SET_ID={0x8}, @NFTA_SET_NAME={0x9, 0x2, 'syz2\x00'}, @NFTA_SET_TABLE={0x9, 0x1, 'syz0\x00'}, @NFTA_SET_KEY_LEN={0x8, 0x5, 0x1, 0x0, 0x1f}]}, @NFT_MSG_NEWSETELEM={0x48, 0xc, 0xa, 0x201, 0x0, 0x0, {0x1}, [@NFTA_SET_ELEM_LIST_SET={0x9, 0x2, 'syz2\x00'}, @NFTA_SET_ELEM_LIST_ELEMENTS={0x1c, 0x3, 0x0, 0x1, [{0x18, 0x0, 0x0, 0x1, [@NFTA_SET_ELEM_FLAGS={0x8}, @NFTA_SET_ELEM_TIMEOUT={0x4, 0x6}]}]}, @NFTA_SET_ELEM_LIST_TABLE={0x9, 0x1, 'syz0\x00'}]}], {0x14, 0x10}}, 0xcc}}, 0x0) [ 2196.866046][T25367] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.1'. [ 2196.909304][T25372] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.1'. [ 2197.360898][T25378] loop3: detected capacity change from 0 to 264192 [ 2197.479981][T25379] loop2: detected capacity change from 0 to 264192 [ 2197.620252][T25380] loop4: detected capacity change from 0 to 264192 10:14:59 executing program 0: prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f00000002c0)=0x0) sched_setscheduler(r0, 0x2, &(0x7f0000000080)=0x6) r1 = getpid() sched_setscheduler(r1, 0x2, &(0x7f00000000c0)=0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r2, &(0x7f000057eff8)=@abs, 0x6e) sendmmsg$unix(r3, &(0x7f00000bd000), 0x318, 0x0) recvmmsg(r2, &(0x7f00000000c0), 0x10106, 0x2, 0x0) syz_mount_image$ext4(&(0x7f0000000180)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xfffbffff00000000, 0x8, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000600100000f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000006856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010300), 0x0, 0x640}, {&(0x7f0000010400)="03000000040000000500000016000f000300040000000000000000000f00698c", 0x20, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}, {&(0x7f0000011000)}, {0x0, 0x0, 0x6700000}, {&(0x7f0000000580), 0x0, 0xc000}], 0x0, &(0x7f0000013b00)=ANY=[@ANYBLOB='\x00']) r4 = creat(&(0x7f0000000000)='./file1\x00', 0x18) r5 = socket(0x10, 0x3, 0x0) sendmsg$nl_route(r5, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f00000005c0)=@ipv4_newroute={0x38, 0x18, 0xbad, 0x0, 0x0, {}, [@RTA_ENCAP_TYPE={0x6, 0x15, 0x3}, @RTA_ENCAP={0x14, 0x16, 0x0, 0x1, @SEG6_IPTUNNEL_SRH={0xd}}]}, 0x38}}, 0x0) r6 = socket(0x26, 0x3, 0x0) sendmsg$nl_route(r6, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f00000005c0)=@ipv4_newroute={0x38, 0x18, 0xbad, 0x0, 0x0, {}, [@RTA_ENCAP_TYPE={0x6, 0x15, 0x3}, @RTA_ENCAP={0x14, 0x16, 0x0, 0x1, @SEG6_IPTUNNEL_SRH={0xd}}]}, 0x38}}, 0x0) r7 = socket(0x10, 0x3, 0x0) sendmsg$nl_route(r7, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f00000005c0)=@ipv4_newroute={0x38, 0x18, 0xbad, 0x0, 0x0, {0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6}, [@RTA_ENCAP_TYPE={0x6, 0x15, 0x3}, @RTA_ENCAP={0x14, 0x16, 0x0, 0x1, @SEG6_IPTUNNEL_SRH={0xd}}]}, 0x38}}, 0x0) execveat(r4, &(0x7f0000000040)='./file0\x00', &(0x7f0000000380)=[&(0x7f00000001c0)='+{!#\x00', &(0x7f0000000300)='ext4\x00', &(0x7f0000000340)='@(\x00'], &(0x7f00000004c0)=[&(0x7f00000003c0)='ext4\x00', &(0x7f0000000400)='ext4\x00', &(0x7f0000000500)='\x00.D\x04\xe0\xce\x99\xd9\xa9\xac\xac\xadH\xa4\xcf\xb7\xffT\xac\x05\xfd\xdd\xb8w\x0f\x82B\xff\xf2\x909`1!\f\x870\x1f\xc1%Y\xc8\x15c \xea\x1cY!\x04\xe4\x91^\x00\x04\xe4\xa6\xba\xc6\xfd\x10\xdf\xe24\xd4&\x17\xdc\xec\xf4\f\n\xb7.\x13\x8e\x1bYENj\xe1\x19~\x1c\xaf\a;d\x9f\xba\xd9T\xd4-\xecX\xc0Y\x83@\xc7\x8b\xff*\xdd\xaa\xc6,o4\xe2\x0f\x16\x01[\xc0\xeb\x7fFI]WF\x1f\f?\xfa\xb1\xe7\xf6t\x027\xb1\xc17.4V\xf81{9\xa3\xb9\x01\xcck@I\xe2\xf1Y\x10E\xa1z/\x05.~Yh%\x8f\x06sB)N\x11P\xf6p\xff\'\xaf\a7\x10+p\xbb\xf3\xb08\xb5)\x00\xeeg\xd0\xee\xe9\x98\x8d\xf8\xb5G\t@f\x1et v\x14\tT\xc5', &(0x7f0000000480)=':--[\x00'], 0x1000) recvfrom(r2, &(0x7f0000000600)=""/203, 0xcb, 0x42, &(0x7f0000000700)=@hci={0x1f, 0xffffffffffffffff, 0x4}, 0x80) 10:14:59 executing program 1: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000005c0)={{0x14}, [@NFT_MSG_NEWTABLE={0x20, 0x0, 0xa, 0x3, 0x0, 0x0, {0x1}, [@NFTA_TABLE_NAME={0x9, 0x1, 'syz0\x00'}]}, @NFT_MSG_NEWSET={0x3c, 0x9, 0xa, 0x401, 0x0, 0x0, {0x1}, [@NFTA_SET_ID={0x8}, @NFTA_SET_NAME={0x9, 0x2, 'syz2\x00'}, @NFTA_SET_TABLE={0x9, 0x1, 'syz0\x00'}, @NFTA_SET_KEY_LEN={0x8, 0x5, 0x1, 0x0, 0x1f}]}, @NFT_MSG_NEWSETELEM={0x3c, 0xc, 0xa, 0x201, 0x0, 0x0, {0x1}, [@NFTA_SET_ELEM_LIST_ELEMENTS={0x1c, 0x3, 0x0, 0x1, [{0x18, 0x0, 0x0, 0x1, [@NFTA_SET_ELEM_FLAGS={0x8, 0x3, 0x1, 0x0, 0x4}, @NFTA_SET_ELEM_TIMEOUT={0xc, 0x6}]}]}, @NFTA_SET_ELEM_LIST_TABLE={0x9, 0x1, 'syz0\x00'}]}], {0x14, 0x10}}, 0xc0}}, 0x0) 10:14:59 executing program 2: prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f00000002c0)=0x0) sched_setscheduler(r0, 0x2, &(0x7f0000000080)=0x6) r1 = getpid() sched_setscheduler(r1, 0x2, &(0x7f00000000c0)=0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r2, &(0x7f000057eff8)=@abs, 0x6e) sendmmsg$unix(r3, &(0x7f00000bd000), 0x318, 0x0) recvmmsg(r2, &(0x7f00000000c0), 0x10106, 0x2, 0x0) syz_mount_image$ext4(&(0x7f0000000180)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xfffbffff00000000, 0x8, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000600100000f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000006856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010300), 0x0, 0x640}, {&(0x7f0000010400)="03000000040000000500000016000f000300040000000000000000000f00698c", 0x20, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}, {&(0x7f0000011000)}, {0x0, 0x0, 0x6700000}, {&(0x7f0000000580), 0x0, 0xc000}], 0x0, &(0x7f0000013b00)=ANY=[@ANYBLOB='\x00']) creat(&(0x7f0000000000)='./file1\x00', 0x18) r4 = socket(0x10, 0x3, 0x0) sendmsg$nl_route(r4, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f00000005c0)=@ipv4_newroute={0x38, 0x18, 0xbad, 0x0, 0x0, {}, [@RTA_ENCAP_TYPE={0x6, 0x15, 0x3}, @RTA_ENCAP={0x14, 0x16, 0x0, 0x1, @SEG6_IPTUNNEL_SRH={0xd}}]}, 0x38}}, 0x0) r5 = socket(0x26, 0x3, 0x0) sendmsg$nl_route(r5, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f00000005c0)=@ipv4_newroute={0x38, 0x18, 0xbad, 0x0, 0x0, {0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6}, [@RTA_ENCAP_TYPE={0x6, 0x15, 0x3}, @RTA_ENCAP={0x14, 0x16, 0x0, 0x1, @SEG6_IPTUNNEL_SRH={0xd}}]}, 0x38}}, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f00000005c0)=@ipv4_newroute={0x38, 0x18, 0xbad, 0x0, 0x0, {0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6}, [@RTA_ENCAP_TYPE={0x6, 0x15, 0x3}, @RTA_ENCAP={0x14, 0x16, 0x0, 0x1, @SEG6_IPTUNNEL_SRH={0xd}}]}, 0x38}}, 0x0) recvfrom(r2, &(0x7f0000000600)=""/203, 0xcb, 0x42, &(0x7f0000000700)=@hci={0x1f, 0xffffffffffffffff, 0x4}, 0x80) 10:14:59 executing program 3: prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f00000002c0)=0x0) sched_setscheduler(r0, 0x2, &(0x7f0000000080)=0x6) r1 = getpid() sched_setscheduler(r1, 0x2, &(0x7f00000000c0)=0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r2, &(0x7f000057eff8)=@abs, 0x6e) sendmmsg$unix(r3, &(0x7f00000bd000), 0x318, 0x0) recvmmsg(r2, &(0x7f00000000c0), 0x10106, 0x2, 0x0) syz_mount_image$ext4(&(0x7f0000000180)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xfffbffff00000000, 0x8, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000600100000f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000006856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010300), 0x0, 0x640}, {&(0x7f0000010400)="03000000040000000500000016000f000300040000000000000000000f00698c", 0x20, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}, {&(0x7f0000011000)}, {0x0, 0x0, 0x6700000}, {&(0x7f0000000580), 0x0, 0xc000}], 0x0, &(0x7f0000013b00)=ANY=[@ANYBLOB='\x00']) r4 = creat(&(0x7f0000000000)='./file1\x00', 0x18) r5 = socket(0x10, 0x3, 0x0) sendmsg$nl_route(r5, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f00000005c0)=@ipv4_newroute={0x38, 0x18, 0xbad, 0x0, 0x0, {}, [@RTA_ENCAP_TYPE={0x6, 0x15, 0x3}, @RTA_ENCAP={0x14, 0x16, 0x0, 0x1, @SEG6_IPTUNNEL_SRH={0xd}}]}, 0x38}}, 0x0) socket(0x26, 0x3, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f00000005c0)=@ipv4_newroute={0x38, 0x18, 0xbad, 0x0, 0x0, {0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6}, [@RTA_ENCAP_TYPE={0x6, 0x15, 0x3}, @RTA_ENCAP={0x14, 0x16, 0x0, 0x1, @SEG6_IPTUNNEL_SRH={0xd}}]}, 0x38}}, 0x0) execveat(r4, 0x0, &(0x7f0000000380)=[&(0x7f00000001c0)='+{!#\x00', &(0x7f0000000300)='ext4\x00', &(0x7f0000000340)='@(\x00'], &(0x7f00000004c0)=[&(0x7f00000003c0)='ext4\x00', &(0x7f0000000400)='ext4\x00', &(0x7f0000000500)='\x00.D\x04\xe0\xce\x99\xd9\xa9\xac\xac\xadH\xa4\xcf\xb7\xffT\xac\x05\xfd\xdd\xb8w\x0f\x82B\xff\xf2\x909`1!\f\x870\x1f\xc1%Y\xc8\x15c \xea\x1cY!\x04\xe4\x91^\x00\x04\xe4\xa6\xba\xc6\xfd\x10\xdf\xe24\xd4&\x17\xdc\xec\xf4\f\n\xb7.\x13\x8e\x1bYENj\xe1\x19~\x1c\xaf\a;d\x9f\xba\xd9T\xd4-\xecX\xc0Y\x83@\xc7\x8b\xff*\xdd\xaa\xc6,o4\xe2\x0f\x16\x01[\xc0\xeb\x7fFI]WF\x1f\f?\xfa\xb1\xe7\xf6t\x027\xb1\xc17.4V\xf81{9\xa3\xb9\x01\xcck@I\xe2\xf1Y\x10E\xa1z/\x05.~Yh%\x8f\x06sB)N\x11P\xf6p\xff\'\xaf\a7\x10+p\xbb\xf3\xb08\xb5)\x00\xeeg\xd0\xee\xe9\x98\x8d\xf8\xb5G\t@f\x1et v\x14\tT\xc5', 0x0], 0x1000) 10:14:59 executing program 4: prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f00000002c0)=0x0) sched_setscheduler(r0, 0x2, &(0x7f0000000080)=0x6) r1 = getpid() sched_setscheduler(r1, 0x2, &(0x7f00000000c0)=0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r2, &(0x7f000057eff8)=@abs, 0x6e) sendmmsg$unix(r3, &(0x7f00000bd000), 0x318, 0x0) recvmmsg(r2, &(0x7f00000000c0), 0x10106, 0x2, 0x0) syz_mount_image$ext4(&(0x7f0000000180)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xfffbffff00000000, 0x8, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000600100000f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000006856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010300), 0x0, 0x640}, {&(0x7f0000010400)="03000000040000000500000016000f000300040000000000000000000f00698c", 0x20, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}, {&(0x7f0000011000)}, {0x0, 0x0, 0x6700000}, {&(0x7f0000000580), 0x0, 0xc000}], 0x0, &(0x7f0000013b00)=ANY=[@ANYBLOB='\x00']) r4 = creat(&(0x7f0000000000)='./file1\x00', 0x18) r5 = socket(0x10, 0x3, 0x0) sendmsg$nl_route(r5, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f00000005c0)=@ipv4_newroute={0x38, 0x18, 0xbad, 0x0, 0x0, {}, [@RTA_ENCAP_TYPE={0x6, 0x15, 0x3}, @RTA_ENCAP={0x14, 0x16, 0x0, 0x1, @SEG6_IPTUNNEL_SRH={0xd}}]}, 0x38}}, 0x0) r6 = socket(0x26, 0x3, 0x0) sendmsg$nl_route(r6, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={0x0}}, 0x0) r7 = socket(0x10, 0x3, 0x0) sendmsg$nl_route(r7, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f00000005c0)=@ipv4_newroute={0x38, 0x18, 0xbad, 0x0, 0x0, {0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6}, [@RTA_ENCAP_TYPE={0x6, 0x15, 0x3}, @RTA_ENCAP={0x14, 0x16, 0x0, 0x1, @SEG6_IPTUNNEL_SRH={0xd}}]}, 0x38}}, 0x0) execveat(r4, &(0x7f0000000040)='./file0\x00', &(0x7f0000000380)=[&(0x7f00000001c0)='+{!#\x00', &(0x7f0000000300)='ext4\x00', &(0x7f0000000340)='@(\x00'], &(0x7f00000004c0)=[&(0x7f00000003c0)='ext4\x00', &(0x7f0000000400)='ext4\x00', &(0x7f0000000500)='\x00.D\x04\xe0\xce\x99\xd9\xa9\xac\xac\xadH\xa4\xcf\xb7\xffT\xac\x05\xfd\xdd\xb8w\x0f\x82B\xff\xf2\x909`1!\f\x870\x1f\xc1%Y\xc8\x15c \xea\x1cY!\x04\xe4\x91^\x00\x04\xe4\xa6\xba\xc6\xfd\x10\xdf\xe24\xd4&\x17\xdc\xec\xf4\f\n\xb7.\x13\x8e\x1bYENj\xe1\x19~\x1c\xaf\a;d\x9f\xba\xd9T\xd4-\xecX\xc0Y\x83@\xc7\x8b\xff*\xdd\xaa\xc6,o4\xe2\x0f\x16\x01[\xc0\xeb\x7fFI]WF\x1f\f?\xfa\xb1\xe7\xf6t\x027\xb1\xc17.4V\xf81{9\xa3\xb9\x01\xcck@I\xe2\xf1Y\x10E\xa1z/\x05.~Yh%\x8f\x06sB)N\x11P\xf6p\xff\'\xaf\a7\x10+p\xbb\xf3\xb08\xb5)\x00\xeeg\xd0\xee\xe9\x98\x8d\xf8\xb5G\t@f\x1et v\x14\tT\xc5', &(0x7f0000000480)=':--[\x00'], 0x1000) recvfrom(r2, &(0x7f0000000600)=""/203, 0xcb, 0x42, &(0x7f0000000700)=@hci={0x1f, 0xffffffffffffffff, 0x4}, 0x80) [ 2198.860295][T25380] EXT4-fs (loop4): mounted filesystem without journal. Quota mode: writeback. [ 2198.869779][T25378] EXT4-fs (loop3): mounted filesystem without journal. Quota mode: writeback. [ 2198.885566][T25379] EXT4-fs (loop2): mounted filesystem without journal. Quota mode: writeback. [ 2199.969141][T25413] loop4: detected capacity change from 0 to 264192 [ 2200.229415][T25415] loop3: detected capacity change from 0 to 264192 [ 2200.237437][T25416] loop2: detected capacity change from 0 to 264192 [ 2200.990551][T25413] EXT4-fs: failed to create workqueue [ 2200.995964][T25413] EXT4-fs (loop4): mount failed [ 2201.564581][T25415] EXT4-fs: failed to create workqueue [ 2201.570100][T25415] EXT4-fs (loop3): mount failed [ 2201.591364][T25416] EXT4-fs: failed to create workqueue [ 2201.596782][T25416] EXT4-fs (loop2): mount failed [ 2201.711590][T25366] I/O error, dev loop2, sector 264064 op 0x0:(READ) flags 0x80700 phys_seg 1 prio class 0 10:15:05 executing program 0: prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f00000002c0)=0x0) sched_setscheduler(r0, 0x2, &(0x7f0000000080)=0x6) r1 = getpid() sched_setscheduler(r1, 0x2, &(0x7f00000000c0)=0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r2, &(0x7f000057eff8)=@abs, 0x6e) sendmmsg$unix(r3, &(0x7f00000bd000), 0x318, 0x0) recvmmsg(r2, &(0x7f00000000c0), 0x10106, 0x2, 0x0) syz_mount_image$ext4(&(0x7f0000000180)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xfffbffff00000000, 0x8, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000600100000f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000006856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010300), 0x0, 0x640}, {&(0x7f0000010400)="03000000040000000500000016000f000300040000000000000000000f00698c", 0x20, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}, {&(0x7f0000011000)}, {0x0, 0x0, 0x6700000}, {&(0x7f0000000580), 0x0, 0xc000}], 0x0, &(0x7f0000013b00)=ANY=[@ANYBLOB='\x00']) r4 = creat(&(0x7f0000000000)='./file1\x00', 0x18) r5 = socket(0x10, 0x3, 0x0) sendmsg$nl_route(r5, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f00000005c0)=@ipv4_newroute={0x38, 0x18, 0xbad, 0x0, 0x0, {}, [@RTA_ENCAP_TYPE={0x6, 0x15, 0x3}, @RTA_ENCAP={0x14, 0x16, 0x0, 0x1, @SEG6_IPTUNNEL_SRH={0xd}}]}, 0x38}}, 0x0) socket(0x26, 0x3, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f00000005c0)=@ipv4_newroute={0x38, 0x18, 0xbad, 0x0, 0x0, {0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6}, [@RTA_ENCAP_TYPE={0x6, 0x15, 0x3}, @RTA_ENCAP={0x14, 0x16, 0x0, 0x1, @SEG6_IPTUNNEL_SRH={0xd}}]}, 0x38}}, 0x0) execveat(r4, 0x0, &(0x7f0000000380)=[&(0x7f00000001c0)='+{!#\x00', &(0x7f0000000300)='ext4\x00', &(0x7f0000000340)='@(\x00'], &(0x7f00000004c0)=[&(0x7f00000003c0)='ext4\x00', &(0x7f0000000400)='ext4\x00', &(0x7f0000000500)='\x00.D\x04\xe0\xce\x99\xd9\xa9\xac\xac\xadH\xa4\xcf\xb7\xffT\xac\x05\xfd\xdd\xb8w\x0f\x82B\xff\xf2\x909`1!\f\x870\x1f\xc1%Y\xc8\x15c \xea\x1cY!\x04\xe4\x91^\x00\x04\xe4\xa6\xba\xc6\xfd\x10\xdf\xe24\xd4&\x17\xdc\xec\xf4\f\n\xb7.\x13\x8e\x1bYENj\xe1\x19~\x1c\xaf\a;d\x9f\xba\xd9T\xd4-\xecX\xc0Y\x83@\xc7\x8b\xff*\xdd\xaa\xc6,o4\xe2\x0f\x16\x01[\xc0\xeb\x7fFI]WF\x1f\f?\xfa\xb1\xe7\xf6t\x027\xb1\xc17.4V\xf81{9\xa3\xb9\x01\xcck@I\xe2\xf1Y\x10E\xa1z/\x05.~Yh%\x8f\x06sB)N\x11P\xf6p\xff\'\xaf\a7\x10+p\xbb\xf3\xb08\xb5)\x00\xeeg\xd0\xee\xe9\x98\x8d\xf8\xb5G\t@f\x1et v\x14\tT\xc5', 0x0], 0x1000) 10:15:05 executing program 5: prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f00000002c0)=0x0) sched_setscheduler(r0, 0x2, &(0x7f0000000080)=0x6) r1 = getpid() sched_setscheduler(r1, 0x2, &(0x7f00000000c0)=0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r2, &(0x7f000057eff8)=@abs, 0x6e) sendmmsg$unix(r3, &(0x7f00000bd000), 0x318, 0x0) recvmmsg(r2, &(0x7f00000000c0), 0x10106, 0x2, 0x0) syz_mount_image$ext4(&(0x7f0000000180)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xfffbffff00000000, 0x8, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000600100000f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000006856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010300), 0x0, 0x640}, {&(0x7f0000010400)="03000000040000000500000016000f000300040000000000000000000f00698c", 0x20, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}, {&(0x7f0000011000)}, {0x0, 0x0, 0x6700000}, {&(0x7f0000000580), 0x0, 0xc000}], 0x0, &(0x7f0000013b00)=ANY=[@ANYBLOB='\x00']) r4 = creat(&(0x7f0000000000)='./file1\x00', 0x18) r5 = socket(0x10, 0x3, 0x0) sendmsg$nl_route(r5, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f00000005c0)=@ipv4_newroute={0x38, 0x18, 0xbad, 0x0, 0x0, {}, [@RTA_ENCAP_TYPE={0x6, 0x15, 0x3}, @RTA_ENCAP={0x14, 0x16, 0x0, 0x1, @SEG6_IPTUNNEL_SRH={0xd}}]}, 0x38}}, 0x0) r6 = socket(0x26, 0x3, 0x0) sendmsg$nl_route(r6, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f00000005c0)=@ipv4_newroute={0x38, 0x18, 0xbad, 0x0, 0x0, {}, [@RTA_ENCAP_TYPE={0x6, 0x15, 0x3}, @RTA_ENCAP={0x14, 0x16, 0x0, 0x1, @SEG6_IPTUNNEL_SRH={0xd}}]}, 0x38}}, 0x0) r7 = socket(0x10, 0x3, 0x0) sendmsg$nl_route(r7, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f00000005c0)=@ipv4_newroute={0x38, 0x18, 0xbad, 0x0, 0x0, {0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6}, [@RTA_ENCAP_TYPE={0x6, 0x15, 0x3}, @RTA_ENCAP={0x14, 0x16, 0x0, 0x1, @SEG6_IPTUNNEL_SRH={0xd}}]}, 0x38}}, 0x0) execveat(r4, &(0x7f0000000040)='./file0\x00', &(0x7f0000000380)=[&(0x7f00000001c0)='+{!#\x00', &(0x7f0000000300)='ext4\x00', &(0x7f0000000340)='@(\x00'], &(0x7f00000004c0)=[&(0x7f00000003c0)='ext4\x00', &(0x7f0000000400)='ext4\x00', &(0x7f0000000500)='\x00.D\x04\xe0\xce\x99\xd9\xa9\xac\xac\xadH\xa4\xcf\xb7\xffT\xac\x05\xfd\xdd\xb8w\x0f\x82B\xff\xf2\x909`1!\f\x870\x1f\xc1%Y\xc8\x15c \xea\x1cY!\x04\xe4\x91^\x00\x04\xe4\xa6\xba\xc6\xfd\x10\xdf\xe24\xd4&\x17\xdc\xec\xf4\f\n\xb7.\x13\x8e\x1bYENj\xe1\x19~\x1c\xaf\a;d\x9f\xba\xd9T\xd4-\xecX\xc0Y\x83@\xc7\x8b\xff*\xdd\xaa\xc6,o4\xe2\x0f\x16\x01[\xc0\xeb\x7fFI]WF\x1f\f?\xfa\xb1\xe7\xf6t\x027\xb1\xc17.4V\xf81{9\xa3\xb9\x01\xcck@I\xe2\xf1Y\x10E\xa1z/\x05.~Yh%\x8f\x06sB)N\x11P\xf6p\xff\'\xaf\a7\x10+p\xbb\xf3\xb08\xb5)\x00\xeeg\xd0\xee\xe9\x98\x8d\xf8\xb5G\t@f\x1et v\x14\tT\xc5', &(0x7f0000000480)=':--[\x00'], 0x1000) recvfrom(r2, &(0x7f0000000600)=""/203, 0xcb, 0x42, &(0x7f0000000700)=@hci={0x1f, 0xffffffffffffffff, 0x4}, 0x80) 10:15:05 executing program 1: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000005c0)={{0x14}, [@NFT_MSG_NEWTABLE={0x20, 0x0, 0xa, 0x3, 0x0, 0x0, {0x1}, [@NFTA_TABLE_NAME={0x9, 0x1, 'syz0\x00'}]}, @NFT_MSG_NEWSET={0x3c, 0x9, 0xa, 0x401, 0x0, 0x0, {0x1}, [@NFTA_SET_ID={0x8}, @NFTA_SET_NAME={0x9, 0x2, 'syz2\x00'}, @NFTA_SET_TABLE={0x9, 0x1, 'syz0\x00'}, @NFTA_SET_KEY_LEN={0x8, 0x5, 0x1, 0x0, 0x1f}]}, @NFT_MSG_NEWSETELEM={0x3c, 0xc, 0xa, 0x201, 0x0, 0x0, {0x1}, [@NFTA_SET_ELEM_LIST_ELEMENTS={0x1c, 0x3, 0x0, 0x1, [{0x18, 0x0, 0x0, 0x1, [@NFTA_SET_ELEM_FLAGS={0x8, 0x3, 0x1, 0x0, 0x4}, @NFTA_SET_ELEM_TIMEOUT={0xc, 0x6}]}]}, @NFTA_SET_ELEM_LIST_TABLE={0x9, 0x1, 'syz0\x00'}]}], {0x14, 0x10}}, 0xc0}}, 0x0) 10:15:05 executing program 3: prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f00000002c0)=0x0) sched_setscheduler(r0, 0x2, &(0x7f0000000080)=0x6) r1 = getpid() sched_setscheduler(r1, 0x2, &(0x7f00000000c0)=0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r2, &(0x7f000057eff8)=@abs, 0x6e) sendmmsg$unix(r3, &(0x7f00000bd000), 0x318, 0x0) recvmmsg(r2, &(0x7f00000000c0), 0x10106, 0x2, 0x0) syz_mount_image$ext4(&(0x7f0000000180)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xfffbffff00000000, 0x8, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000600100000f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000006856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010300), 0x0, 0x640}, {&(0x7f0000010400)="03000000040000000500000016000f000300040000000000000000000f00698c", 0x20, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}, {&(0x7f0000011000)}, {0x0, 0x0, 0x6700000}, {&(0x7f0000000580), 0x0, 0xc000}], 0x0, &(0x7f0000013b00)=ANY=[@ANYBLOB='\x00']) r4 = creat(&(0x7f0000000000)='./file1\x00', 0x18) r5 = socket(0x10, 0x3, 0x0) sendmsg$nl_route(r5, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f00000005c0)=@ipv4_newroute={0x38, 0x18, 0xbad, 0x0, 0x0, {}, [@RTA_ENCAP_TYPE={0x6, 0x15, 0x3}, @RTA_ENCAP={0x14, 0x16, 0x0, 0x1, @SEG6_IPTUNNEL_SRH={0xd}}]}, 0x38}}, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f00000005c0)=@ipv4_newroute={0x38, 0x18, 0xbad, 0x0, 0x0, {0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6}, [@RTA_ENCAP_TYPE={0x6, 0x15, 0x3}, @RTA_ENCAP={0x14, 0x16, 0x0, 0x1, @SEG6_IPTUNNEL_SRH={0xd}}]}, 0x38}}, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f00000005c0)=@ipv4_newroute={0x38, 0x18, 0xbad, 0x0, 0x0, {0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6}, [@RTA_ENCAP_TYPE={0x6, 0x15, 0x3}, @RTA_ENCAP={0x14, 0x16, 0x0, 0x1, @SEG6_IPTUNNEL_SRH={0xd}}]}, 0x38}}, 0x0) execveat(r4, 0x0, &(0x7f0000000380)=[&(0x7f00000001c0)='+{!#\x00', &(0x7f0000000300)='ext4\x00', &(0x7f0000000340)='@(\x00'], &(0x7f00000004c0)=[&(0x7f00000003c0)='ext4\x00', &(0x7f0000000400)='ext4\x00', &(0x7f0000000500)='\x00.D\x04\xe0\xce\x99\xd9\xa9\xac\xac\xadH\xa4\xcf\xb7\xffT\xac\x05\xfd\xdd\xb8w\x0f\x82B\xff\xf2\x909`1!\f\x870\x1f\xc1%Y\xc8\x15c \xea\x1cY!\x04\xe4\x91^\x00\x04\xe4\xa6\xba\xc6\xfd\x10\xdf\xe24\xd4&\x17\xdc\xec\xf4\f\n\xb7.\x13\x8e\x1bYENj\xe1\x19~\x1c\xaf\a;d\x9f\xba\xd9T\xd4-\xecX\xc0Y\x83@\xc7\x8b\xff*\xdd\xaa\xc6,o4\xe2\x0f\x16\x01[\xc0\xeb\x7fFI]WF\x1f\f?\xfa\xb1\xe7\xf6t\x027\xb1\xc17.4V\xf81{9\xa3\xb9\x01\xcck@I\xe2\xf1Y\x10E\xa1z/\x05.~Yh%\x8f\x06sB)N\x11P\xf6p\xff\'\xaf\a7\x10+p\xbb\xf3\xb08\xb5)\x00\xeeg\xd0\xee\xe9\x98\x8d\xf8\xb5G\t@f\x1et v\x14\tT\xc5', 0x0], 0x1000) 10:15:05 executing program 4: prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f00000002c0)=0x0) sched_setscheduler(r0, 0x2, &(0x7f0000000080)=0x6) r1 = getpid() sched_setscheduler(r1, 0x2, &(0x7f00000000c0)=0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r2, &(0x7f000057eff8)=@abs, 0x6e) sendmmsg$unix(r3, &(0x7f00000bd000), 0x318, 0x0) recvmmsg(r2, &(0x7f00000000c0), 0x10106, 0x2, 0x0) syz_mount_image$ext4(&(0x7f0000000180)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xfffbffff00000000, 0x8, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000600100000f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000006856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010300), 0x0, 0x640}, {&(0x7f0000010400)="03000000040000000500000016000f000300040000000000000000000f00698c", 0x20, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}, {&(0x7f0000011000)}, {0x0, 0x0, 0x6700000}, {&(0x7f0000000580), 0x0, 0xc000}], 0x0, &(0x7f0000013b00)=ANY=[@ANYBLOB='\x00']) creat(&(0x7f0000000000)='./file1\x00', 0x18) r4 = socket(0x10, 0x3, 0x0) sendmsg$nl_route(r4, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f00000005c0)=@ipv4_newroute={0x38, 0x18, 0xbad, 0x0, 0x0, {}, [@RTA_ENCAP_TYPE={0x6, 0x15, 0x3}, @RTA_ENCAP={0x14, 0x16, 0x0, 0x1, @SEG6_IPTUNNEL_SRH={0xd}}]}, 0x38}}, 0x0) r5 = socket(0x26, 0x3, 0x0) sendmsg$nl_route(r5, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f00000005c0)=@ipv4_newroute={0x38, 0x18, 0xbad, 0x0, 0x0, {0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6}, [@RTA_ENCAP_TYPE={0x6, 0x15, 0x3}, @RTA_ENCAP={0x14, 0x16, 0x0, 0x1, @SEG6_IPTUNNEL_SRH={0xd}}]}, 0x38}}, 0x0) socket(0x10, 0x0, 0x0) recvfrom(r2, &(0x7f0000000600)=""/203, 0xcb, 0x42, &(0x7f0000000700)=@hci={0x1f, 0xffffffffffffffff, 0x4}, 0x80) 10:15:05 executing program 2: prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f00000002c0)=0x0) sched_setscheduler(r0, 0x2, &(0x7f0000000080)=0x6) r1 = getpid() sched_setscheduler(r1, 0x2, &(0x7f00000000c0)=0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r2, &(0x7f000057eff8)=@abs, 0x6e) sendmmsg$unix(r3, &(0x7f00000bd000), 0x318, 0x0) recvmmsg(r2, &(0x7f00000000c0), 0x10106, 0x2, 0x0) syz_mount_image$ext4(&(0x7f0000000180)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xfffbffff00000000, 0x8, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000600100000f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000006856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010300), 0x0, 0x640}, {&(0x7f0000010400)="03000000040000000500000016000f000300040000000000000000000f00698c", 0x20, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}, {&(0x7f0000011000)}, {0x0, 0x0, 0x6700000}, {&(0x7f0000000580), 0x0, 0xc000}], 0x0, &(0x7f0000013b00)=ANY=[@ANYBLOB='\x00']) creat(&(0x7f0000000000)='./file1\x00', 0x18) r4 = socket(0x10, 0x3, 0x0) sendmsg$nl_route(r4, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f00000005c0)=@ipv4_newroute={0x38, 0x18, 0xbad, 0x0, 0x0, {}, [@RTA_ENCAP_TYPE={0x6, 0x15, 0x3}, @RTA_ENCAP={0x14, 0x16, 0x0, 0x1, @SEG6_IPTUNNEL_SRH={0xd}}]}, 0x38}}, 0x0) r5 = socket(0x26, 0x3, 0x0) sendmsg$nl_route(r5, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f00000005c0)=@ipv4_newroute={0x38, 0x18, 0xbad, 0x0, 0x0, {0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6}, [@RTA_ENCAP_TYPE={0x6, 0x15, 0x3}, @RTA_ENCAP={0x14, 0x16, 0x0, 0x1, @SEG6_IPTUNNEL_SRH={0xd}}]}, 0x38}}, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f00000005c0)=@ipv4_newroute={0x38, 0x18, 0xbad, 0x0, 0x0, {0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6}, [@RTA_ENCAP_TYPE={0x6, 0x15, 0x3}, @RTA_ENCAP={0x14, 0x16, 0x0, 0x1, @SEG6_IPTUNNEL_SRH={0xd}}]}, 0x38}}, 0x0) recvfrom(r2, &(0x7f0000000600)=""/203, 0xcb, 0x42, &(0x7f0000000700)=@hci={0x1f, 0xffffffffffffffff, 0x4}, 0x80) [ 2205.040393][T25440] loop3: detected capacity change from 0 to 264192 [ 2205.329387][T25443] loop2: detected capacity change from 0 to 264192 [ 2205.869713][T25446] loop4: detected capacity change from 0 to 264192 10:15:07 executing program 1: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000005c0)={{0x14}, [@NFT_MSG_NEWTABLE={0x20, 0x0, 0xa, 0x3, 0x0, 0x0, {0x1}, [@NFTA_TABLE_NAME={0x9, 0x1, 'syz0\x00'}]}, @NFT_MSG_NEWSET={0x3c, 0x9, 0xa, 0x401, 0x0, 0x0, {0x1}, [@NFTA_SET_ID={0x8}, @NFTA_SET_NAME={0x9, 0x2, 'syz2\x00'}, @NFTA_SET_TABLE={0x9, 0x1, 'syz0\x00'}, @NFTA_SET_KEY_LEN={0x8, 0x5, 0x1, 0x0, 0x1f}]}, @NFT_MSG_NEWSETELEM={0x3c, 0xc, 0xa, 0x201, 0x0, 0x0, {0x1}, [@NFTA_SET_ELEM_LIST_ELEMENTS={0x1c, 0x3, 0x0, 0x1, [{0x18, 0x0, 0x0, 0x1, [@NFTA_SET_ELEM_FLAGS={0x8, 0x3, 0x1, 0x0, 0x4}, @NFTA_SET_ELEM_TIMEOUT={0xc, 0x6}]}]}, @NFTA_SET_ELEM_LIST_TABLE={0x9, 0x1, 'syz0\x00'}]}], {0x14, 0x10}}, 0xc0}}, 0x0) [ 2206.700029][T25440] EXT4-fs: failed to create workqueue [ 2206.705446][T25440] EXT4-fs (loop3): mount failed 10:15:07 executing program 3: prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f00000002c0)=0x0) sched_setscheduler(r0, 0x2, &(0x7f0000000080)=0x6) r1 = getpid() sched_setscheduler(r1, 0x2, &(0x7f00000000c0)=0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r2, &(0x7f000057eff8)=@abs, 0x6e) sendmmsg$unix(r3, &(0x7f00000bd000), 0x318, 0x0) recvmmsg(r2, &(0x7f00000000c0), 0x10106, 0x2, 0x0) syz_mount_image$ext4(&(0x7f0000000180)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xfffbffff00000000, 0x8, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000600100000f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000006856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010300), 0x0, 0x640}, {&(0x7f0000010400)="03000000040000000500000016000f000300040000000000000000000f00698c", 0x20, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}, {&(0x7f0000011000)}, {0x0, 0x0, 0x6700000}, {&(0x7f0000000580), 0x0, 0xc000}], 0x0, &(0x7f0000013b00)=ANY=[@ANYBLOB='\x00']) r4 = creat(&(0x7f0000000000)='./file1\x00', 0x18) r5 = socket(0x10, 0x3, 0x0) sendmsg$nl_route(r5, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f00000005c0)=@ipv4_newroute={0x38, 0x18, 0xbad, 0x0, 0x0, {}, [@RTA_ENCAP_TYPE={0x6, 0x15, 0x3}, @RTA_ENCAP={0x14, 0x16, 0x0, 0x1, @SEG6_IPTUNNEL_SRH={0xd}}]}, 0x38}}, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f00000005c0)=@ipv4_newroute={0x38, 0x18, 0xbad, 0x0, 0x0, {0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6}, [@RTA_ENCAP_TYPE={0x6, 0x15, 0x3}, @RTA_ENCAP={0x14, 0x16, 0x0, 0x1, @SEG6_IPTUNNEL_SRH={0xd}}]}, 0x38}}, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f00000005c0)=@ipv4_newroute={0x38, 0x18, 0xbad, 0x0, 0x0, {0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6}, [@RTA_ENCAP_TYPE={0x6, 0x15, 0x3}, @RTA_ENCAP={0x14, 0x16, 0x0, 0x1, @SEG6_IPTUNNEL_SRH={0xd}}]}, 0x38}}, 0x0) execveat(r4, 0x0, &(0x7f0000000380)=[&(0x7f00000001c0)='+{!#\x00', &(0x7f0000000300)='ext4\x00', &(0x7f0000000340)='@(\x00'], &(0x7f00000004c0)=[&(0x7f00000003c0)='ext4\x00', &(0x7f0000000400)='ext4\x00', &(0x7f0000000500)='\x00.D\x04\xe0\xce\x99\xd9\xa9\xac\xac\xadH\xa4\xcf\xb7\xffT\xac\x05\xfd\xdd\xb8w\x0f\x82B\xff\xf2\x909`1!\f\x870\x1f\xc1%Y\xc8\x15c \xea\x1cY!\x04\xe4\x91^\x00\x04\xe4\xa6\xba\xc6\xfd\x10\xdf\xe24\xd4&\x17\xdc\xec\xf4\f\n\xb7.\x13\x8e\x1bYENj\xe1\x19~\x1c\xaf\a;d\x9f\xba\xd9T\xd4-\xecX\xc0Y\x83@\xc7\x8b\xff*\xdd\xaa\xc6,o4\xe2\x0f\x16\x01[\xc0\xeb\x7fFI]WF\x1f\f?\xfa\xb1\xe7\xf6t\x027\xb1\xc17.4V\xf81{9\xa3\xb9\x01\xcck@I\xe2\xf1Y\x10E\xa1z/\x05.~Yh%\x8f\x06sB)N\x11P\xf6p\xff\'\xaf\a7\x10+p\xbb\xf3\xb08\xb5)\x00\xeeg\xd0\xee\xe9\x98\x8d\xf8\xb5G\t@f\x1et v\x14\tT\xc5', 0x0], 0x1000) 10:15:07 executing program 4: prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f00000002c0)=0x0) sched_setscheduler(r0, 0x2, &(0x7f0000000080)=0x6) r1 = getpid() sched_setscheduler(r1, 0x2, &(0x7f00000000c0)=0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r2, &(0x7f000057eff8)=@abs, 0x6e) sendmmsg$unix(r3, &(0x7f00000bd000), 0x318, 0x0) recvmmsg(r2, &(0x7f00000000c0), 0x10106, 0x2, 0x0) syz_mount_image$ext4(&(0x7f0000000180)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xfffbffff00000000, 0x8, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000600100000f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000006856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010300), 0x0, 0x640}, {&(0x7f0000010400)="03000000040000000500000016000f000300040000000000000000000f00698c", 0x20, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}, {&(0x7f0000011000)}, {0x0, 0x0, 0x6700000}, {&(0x7f0000000580), 0x0, 0xc000}], 0x0, &(0x7f0000013b00)=ANY=[@ANYBLOB='\x00']) creat(&(0x7f0000000000)='./file1\x00', 0x18) r4 = socket(0x10, 0x3, 0x0) sendmsg$nl_route(r4, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f00000005c0)=@ipv4_newroute={0x38, 0x18, 0xbad, 0x0, 0x0, {}, [@RTA_ENCAP_TYPE={0x6, 0x15, 0x3}, @RTA_ENCAP={0x14, 0x16, 0x0, 0x1, @SEG6_IPTUNNEL_SRH={0xd}}]}, 0x38}}, 0x0) r5 = socket(0x26, 0x3, 0x0) sendmsg$nl_route(r5, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f00000005c0)=@ipv4_newroute={0x38, 0x18, 0xbad, 0x0, 0x0, {0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6}, [@RTA_ENCAP_TYPE={0x6, 0x15, 0x3}, @RTA_ENCAP={0x14, 0x16, 0x0, 0x1, @SEG6_IPTUNNEL_SRH={0xd}}]}, 0x38}}, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f00000005c0)=@ipv4_newroute={0x38, 0x18, 0xbad, 0x0, 0x0, {0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6}, [@RTA_ENCAP_TYPE={0x6, 0x15, 0x3}, @RTA_ENCAP={0x14, 0x16, 0x0, 0x1, @SEG6_IPTUNNEL_SRH={0xd}}]}, 0x38}}, 0x0) recvfrom(r2, &(0x7f0000000600)=""/203, 0xcb, 0x42, &(0x7f0000000700)=@hci={0x1f, 0xffffffffffffffff, 0x4}, 0x80) 10:15:07 executing program 1: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000005c0)={{0x14}, [@NFT_MSG_NEWTABLE={0x20, 0x0, 0xa, 0x3, 0x0, 0x0, {0x1}, [@NFTA_TABLE_NAME={0x9, 0x1, 'syz0\x00'}]}, @NFT_MSG_NEWSETELEM={0x48, 0xc, 0xa, 0x201, 0x0, 0x0, {0x1}, [@NFTA_SET_ELEM_LIST_SET={0x9, 0x2, 'syz2\x00'}, @NFTA_SET_ELEM_LIST_ELEMENTS={0x1c, 0x3, 0x0, 0x1, [{0x18, 0x0, 0x0, 0x1, [@NFTA_SET_ELEM_FLAGS={0x8, 0x3, 0x1, 0x0, 0x4}, @NFTA_SET_ELEM_TIMEOUT={0xc, 0x6}]}]}, @NFTA_SET_ELEM_LIST_TABLE={0x9, 0x1, 'syz0\x00'}]}], {0x14, 0x10}}, 0x90}}, 0x0) [ 2206.986249][T25446] EXT4-fs: failed to create workqueue [ 2206.991665][T25446] EXT4-fs (loop4): mount failed 10:15:07 executing program 1: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000005c0)={{0x14}, [@NFT_MSG_NEWTABLE={0x20, 0x0, 0xa, 0x3, 0x0, 0x0, {0x1}, [@NFTA_TABLE_NAME={0x9, 0x1, 'syz0\x00'}]}, @NFT_MSG_NEWSETELEM={0x48, 0xc, 0xa, 0x201, 0x0, 0x0, {0x1}, [@NFTA_SET_ELEM_LIST_SET={0x9, 0x2, 'syz2\x00'}, @NFTA_SET_ELEM_LIST_ELEMENTS={0x1c, 0x3, 0x0, 0x1, [{0x18, 0x0, 0x0, 0x1, [@NFTA_SET_ELEM_FLAGS={0x8, 0x3, 0x1, 0x0, 0x4}, @NFTA_SET_ELEM_TIMEOUT={0xc, 0x6}]}]}, @NFTA_SET_ELEM_LIST_TABLE={0x9, 0x1, 'syz0\x00'}]}], {0x14, 0x10}}, 0x90}}, 0x0) 10:15:07 executing program 2: prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f00000002c0)=0x0) sched_setscheduler(r0, 0x2, &(0x7f0000000080)=0x6) r1 = getpid() sched_setscheduler(r1, 0x2, &(0x7f00000000c0)=0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r2, &(0x7f000057eff8)=@abs, 0x6e) sendmmsg$unix(r3, &(0x7f00000bd000), 0x318, 0x0) recvmmsg(r2, &(0x7f00000000c0), 0x10106, 0x2, 0x0) syz_mount_image$ext4(&(0x7f0000000180)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xfffbffff00000000, 0x8, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000600100000f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000006856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010300), 0x0, 0x640}, {&(0x7f0000010400)="03000000040000000500000016000f000300040000000000000000000f00698c", 0x20, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}, {&(0x7f0000011000)}, {0x0, 0x0, 0x6700000}, {&(0x7f0000000580), 0x0, 0xc000}], 0x0, &(0x7f0000013b00)=ANY=[@ANYBLOB='\x00']) creat(&(0x7f0000000000)='./file1\x00', 0x18) r4 = socket(0x10, 0x3, 0x0) sendmsg$nl_route(r4, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f00000005c0)=@ipv4_newroute={0x38, 0x18, 0xbad, 0x0, 0x0, {}, [@RTA_ENCAP_TYPE={0x6, 0x15, 0x3}, @RTA_ENCAP={0x14, 0x16, 0x0, 0x1, @SEG6_IPTUNNEL_SRH={0xd}}]}, 0x38}}, 0x0) r5 = socket(0x26, 0x3, 0x0) sendmsg$nl_route(r5, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f00000005c0)=@ipv4_newroute={0x38, 0x18, 0xbad, 0x0, 0x0, {0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6}, [@RTA_ENCAP_TYPE={0x6, 0x15, 0x3}, @RTA_ENCAP={0x14, 0x16, 0x0, 0x1, @SEG6_IPTUNNEL_SRH={0xd}}]}, 0x38}}, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f00000005c0)=@ipv4_newroute={0x38, 0x18, 0xbad, 0x0, 0x0, {0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6}, [@RTA_ENCAP_TYPE={0x6, 0x15, 0x3}, @RTA_ENCAP={0x14, 0x16, 0x0, 0x1, @SEG6_IPTUNNEL_SRH={0xd}}]}, 0x38}}, 0x0) recvfrom(r2, &(0x7f0000000600)=""/203, 0xcb, 0x42, &(0x7f0000000700)=@hci={0x1f, 0xffffffffffffffff, 0x4}, 0x80) [ 2207.031903][T25443] EXT4-fs (loop2): mounted filesystem without journal. Quota mode: writeback. [ 2207.559405][T25476] loop4: detected capacity change from 0 to 264192 [ 2207.567569][T25477] loop2: detected capacity change from 0 to 264192 [ 2208.019333][T25480] loop3: detected capacity change from 0 to 264192 [ 2209.055321][T25476] EXT4-fs: failed to create workqueue [ 2209.060828][T25476] EXT4-fs (loop4): mount failed [ 2209.068024][T25477] EXT4-fs: failed to create workqueue [ 2209.073501][T25477] EXT4-fs (loop2): mount failed [ 2209.254185][T25480] EXT4-fs (loop3): mounted filesystem without journal. Quota mode: writeback. [ 2209.379020][T25449] I/O error, dev loop4, sector 264064 op 0x0:(READ) flags 0x80700 phys_seg 1 prio class 0 10:15:18 executing program 5: prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f00000002c0)=0x0) sched_setscheduler(r0, 0x2, &(0x7f0000000080)=0x6) r1 = getpid() sched_setscheduler(r1, 0x2, &(0x7f00000000c0)=0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r2, &(0x7f000057eff8)=@abs, 0x6e) sendmmsg$unix(r3, &(0x7f00000bd000), 0x318, 0x0) recvmmsg(r2, &(0x7f00000000c0), 0x10106, 0x2, 0x0) syz_mount_image$ext4(&(0x7f0000000180)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xfffbffff00000000, 0x8, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000600100000f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000006856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010300), 0x0, 0x640}, {&(0x7f0000010400)="03000000040000000500000016000f000300040000000000000000000f00698c", 0x20, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}, {&(0x7f0000011000)}, {0x0, 0x0, 0x6700000}, {&(0x7f0000000580), 0x0, 0xc000}], 0x0, &(0x7f0000013b00)=ANY=[@ANYBLOB='\x00']) r4 = creat(&(0x7f0000000000)='./file1\x00', 0x18) r5 = socket(0x10, 0x3, 0x0) sendmsg$nl_route(r5, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f00000005c0)=@ipv4_newroute={0x38, 0x18, 0xbad, 0x0, 0x0, {}, [@RTA_ENCAP_TYPE={0x6, 0x15, 0x3}, @RTA_ENCAP={0x14, 0x16, 0x0, 0x1, @SEG6_IPTUNNEL_SRH={0xd}}]}, 0x38}}, 0x0) r6 = socket(0x26, 0x3, 0x0) sendmsg$nl_route(r6, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f00000005c0)=@ipv4_newroute={0x38, 0x18, 0xbad, 0x0, 0x0, {}, [@RTA_ENCAP_TYPE={0x6, 0x15, 0x3}, @RTA_ENCAP={0x14, 0x16, 0x0, 0x1, @SEG6_IPTUNNEL_SRH={0xd}}]}, 0x38}}, 0x0) r7 = socket(0x10, 0x3, 0x0) sendmsg$nl_route(r7, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f00000005c0)=@ipv4_newroute={0x38, 0x18, 0xbad, 0x0, 0x0, {0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6}, [@RTA_ENCAP_TYPE={0x6, 0x15, 0x3}, @RTA_ENCAP={0x14, 0x16, 0x0, 0x1, @SEG6_IPTUNNEL_SRH={0xd}}]}, 0x38}}, 0x0) execveat(r4, &(0x7f0000000040)='./file0\x00', &(0x7f0000000380)=[&(0x7f00000001c0)='+{!#\x00', &(0x7f0000000300)='ext4\x00', &(0x7f0000000340)='@(\x00'], &(0x7f00000004c0)=[&(0x7f00000003c0)='ext4\x00', &(0x7f0000000400)='ext4\x00', &(0x7f0000000500)='\x00.D\x04\xe0\xce\x99\xd9\xa9\xac\xac\xadH\xa4\xcf\xb7\xffT\xac\x05\xfd\xdd\xb8w\x0f\x82B\xff\xf2\x909`1!\f\x870\x1f\xc1%Y\xc8\x15c \xea\x1cY!\x04\xe4\x91^\x00\x04\xe4\xa6\xba\xc6\xfd\x10\xdf\xe24\xd4&\x17\xdc\xec\xf4\f\n\xb7.\x13\x8e\x1bYENj\xe1\x19~\x1c\xaf\a;d\x9f\xba\xd9T\xd4-\xecX\xc0Y\x83@\xc7\x8b\xff*\xdd\xaa\xc6,o4\xe2\x0f\x16\x01[\xc0\xeb\x7fFI]WF\x1f\f?\xfa\xb1\xe7\xf6t\x027\xb1\xc17.4V\xf81{9\xa3\xb9\x01\xcck@I\xe2\xf1Y\x10E\xa1z/\x05.~Yh%\x8f\x06sB)N\x11P\xf6p\xff\'\xaf\a7\x10+p\xbb\xf3\xb08\xb5)\x00\xeeg\xd0\xee\xe9\x98\x8d\xf8\xb5G\t@f\x1et v\x14\tT\xc5', &(0x7f0000000480)=':--[\x00'], 0x1000) recvfrom(r2, &(0x7f0000000600)=""/203, 0xcb, 0x42, &(0x7f0000000700)=@hci={0x1f, 0xffffffffffffffff, 0x4}, 0x80) 10:15:18 executing program 1: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000005c0)={{0x14}, [@NFT_MSG_NEWTABLE={0x20, 0x0, 0xa, 0x3, 0x0, 0x0, {0x1}, [@NFTA_TABLE_NAME={0x9, 0x1, 'syz0\x00'}]}, @NFT_MSG_NEWSETELEM={0x48, 0xc, 0xa, 0x201, 0x0, 0x0, {0x1}, [@NFTA_SET_ELEM_LIST_SET={0x9, 0x2, 'syz2\x00'}, @NFTA_SET_ELEM_LIST_ELEMENTS={0x1c, 0x3, 0x0, 0x1, [{0x18, 0x0, 0x0, 0x1, [@NFTA_SET_ELEM_FLAGS={0x8, 0x3, 0x1, 0x0, 0x4}, @NFTA_SET_ELEM_TIMEOUT={0xc, 0x6}]}]}, @NFTA_SET_ELEM_LIST_TABLE={0x9, 0x1, 'syz0\x00'}]}], {0x14, 0x10}}, 0x90}}, 0x0) 10:15:18 executing program 0: prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f00000002c0)=0x0) sched_setscheduler(r0, 0x2, &(0x7f0000000080)=0x6) r1 = getpid() sched_setscheduler(r1, 0x2, &(0x7f00000000c0)=0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r2, &(0x7f000057eff8)=@abs, 0x6e) sendmmsg$unix(r3, &(0x7f00000bd000), 0x318, 0x0) recvmmsg(r2, &(0x7f00000000c0), 0x10106, 0x2, 0x0) syz_mount_image$ext4(&(0x7f0000000180)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xfffbffff00000000, 0x8, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000600100000f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000006856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010300), 0x0, 0x640}, {&(0x7f0000010400)="03000000040000000500000016000f000300040000000000000000000f00698c", 0x20, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}, {&(0x7f0000011000)}, {0x0, 0x0, 0x6700000}, {&(0x7f0000000580), 0x0, 0xc000}], 0x0, &(0x7f0000013b00)=ANY=[@ANYBLOB='\x00']) r4 = creat(&(0x7f0000000000)='./file1\x00', 0x18) r5 = socket(0x10, 0x3, 0x0) sendmsg$nl_route(r5, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f00000005c0)=@ipv4_newroute={0x38, 0x18, 0xbad, 0x0, 0x0, {}, [@RTA_ENCAP_TYPE={0x6, 0x15, 0x3}, @RTA_ENCAP={0x14, 0x16, 0x0, 0x1, @SEG6_IPTUNNEL_SRH={0xd}}]}, 0x38}}, 0x0) socket(0x26, 0x3, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f00000005c0)=@ipv4_newroute={0x38, 0x18, 0xbad, 0x0, 0x0, {0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6}, [@RTA_ENCAP_TYPE={0x6, 0x15, 0x3}, @RTA_ENCAP={0x14, 0x16, 0x0, 0x1, @SEG6_IPTUNNEL_SRH={0xd}}]}, 0x38}}, 0x0) execveat(r4, 0x0, &(0x7f0000000380)=[&(0x7f00000001c0)='+{!#\x00', &(0x7f0000000300)='ext4\x00', &(0x7f0000000340)='@(\x00'], &(0x7f00000004c0)=[&(0x7f00000003c0)='ext4\x00', &(0x7f0000000400)='ext4\x00', &(0x7f0000000500)='\x00.D\x04\xe0\xce\x99\xd9\xa9\xac\xac\xadH\xa4\xcf\xb7\xffT\xac\x05\xfd\xdd\xb8w\x0f\x82B\xff\xf2\x909`1!\f\x870\x1f\xc1%Y\xc8\x15c \xea\x1cY!\x04\xe4\x91^\x00\x04\xe4\xa6\xba\xc6\xfd\x10\xdf\xe24\xd4&\x17\xdc\xec\xf4\f\n\xb7.\x13\x8e\x1bYENj\xe1\x19~\x1c\xaf\a;d\x9f\xba\xd9T\xd4-\xecX\xc0Y\x83@\xc7\x8b\xff*\xdd\xaa\xc6,o4\xe2\x0f\x16\x01[\xc0\xeb\x7fFI]WF\x1f\f?\xfa\xb1\xe7\xf6t\x027\xb1\xc17.4V\xf81{9\xa3\xb9\x01\xcck@I\xe2\xf1Y\x10E\xa1z/\x05.~Yh%\x8f\x06sB)N\x11P\xf6p\xff\'\xaf\a7\x10+p\xbb\xf3\xb08\xb5)\x00\xeeg\xd0\xee\xe9\x98\x8d\xf8\xb5G\t@f\x1et v\x14\tT\xc5', 0x0], 0x1000) 10:15:18 executing program 4: prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f00000002c0)=0x0) sched_setscheduler(r0, 0x2, &(0x7f0000000080)=0x6) r1 = getpid() sched_setscheduler(r1, 0x2, &(0x7f00000000c0)=0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r2, &(0x7f000057eff8)=@abs, 0x6e) sendmmsg$unix(r3, &(0x7f00000bd000), 0x318, 0x0) recvmmsg(r2, &(0x7f00000000c0), 0x10106, 0x2, 0x0) syz_mount_image$ext4(&(0x7f0000000180)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xfffbffff00000000, 0x8, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000600100000f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000006856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010300), 0x0, 0x640}, {&(0x7f0000010400)="03000000040000000500000016000f000300040000000000000000000f00698c", 0x20, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}, {&(0x7f0000011000)}, {0x0, 0x0, 0x6700000}, {&(0x7f0000000580), 0x0, 0xc000}], 0x0, &(0x7f0000013b00)=ANY=[@ANYBLOB='\x00']) r4 = creat(&(0x7f0000000000)='./file1\x00', 0x18) r5 = socket(0x10, 0x3, 0x0) sendmsg$nl_route(r5, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f00000005c0)=@ipv4_newroute={0x38, 0x18, 0xbad, 0x0, 0x0, {}, [@RTA_ENCAP_TYPE={0x6, 0x15, 0x3}, @RTA_ENCAP={0x14, 0x16, 0x0, 0x1, @SEG6_IPTUNNEL_SRH={0xd}}]}, 0x38}}, 0x0) r6 = socket(0x26, 0x3, 0x0) sendmsg$nl_route(r6, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={0x0}}, 0x0) r7 = socket(0x10, 0x3, 0x0) sendmsg$nl_route(r7, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f00000005c0)=@ipv4_newroute={0x38, 0x18, 0xbad, 0x0, 0x0, {0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6}, [@RTA_ENCAP_TYPE={0x6, 0x15, 0x3}, @RTA_ENCAP={0x14, 0x16, 0x0, 0x1, @SEG6_IPTUNNEL_SRH={0xd}}]}, 0x38}}, 0x0) execveat(r4, &(0x7f0000000040)='./file0\x00', &(0x7f0000000380)=[&(0x7f00000001c0)='+{!#\x00', &(0x7f0000000300)='ext4\x00', &(0x7f0000000340)='@(\x00'], &(0x7f00000004c0)=[&(0x7f00000003c0)='ext4\x00', &(0x7f0000000400)='ext4\x00', &(0x7f0000000500)='\x00.D\x04\xe0\xce\x99\xd9\xa9\xac\xac\xadH\xa4\xcf\xb7\xffT\xac\x05\xfd\xdd\xb8w\x0f\x82B\xff\xf2\x909`1!\f\x870\x1f\xc1%Y\xc8\x15c \xea\x1cY!\x04\xe4\x91^\x00\x04\xe4\xa6\xba\xc6\xfd\x10\xdf\xe24\xd4&\x17\xdc\xec\xf4\f\n\xb7.\x13\x8e\x1bYENj\xe1\x19~\x1c\xaf\a;d\x9f\xba\xd9T\xd4-\xecX\xc0Y\x83@\xc7\x8b\xff*\xdd\xaa\xc6,o4\xe2\x0f\x16\x01[\xc0\xeb\x7fFI]WF\x1f\f?\xfa\xb1\xe7\xf6t\x027\xb1\xc17.4V\xf81{9\xa3\xb9\x01\xcck@I\xe2\xf1Y\x10E\xa1z/\x05.~Yh%\x8f\x06sB)N\x11P\xf6p\xff\'\xaf\a7\x10+p\xbb\xf3\xb08\xb5)\x00\xeeg\xd0\xee\xe9\x98\x8d\xf8\xb5G\t@f\x1et v\x14\tT\xc5', &(0x7f0000000480)=':--[\x00'], 0x1000) recvfrom(r2, &(0x7f0000000600)=""/203, 0xcb, 0x42, &(0x7f0000000700)=@hci={0x1f, 0xffffffffffffffff, 0x4}, 0x80) 10:15:18 executing program 2: prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f00000002c0)=0x0) sched_setscheduler(r0, 0x2, &(0x7f0000000080)=0x6) r1 = getpid() sched_setscheduler(r1, 0x2, &(0x7f00000000c0)=0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r2, &(0x7f000057eff8)=@abs, 0x6e) sendmmsg$unix(r3, &(0x7f00000bd000), 0x318, 0x0) recvmmsg(r2, &(0x7f00000000c0), 0x10106, 0x2, 0x0) syz_mount_image$ext4(&(0x7f0000000180)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xfffbffff00000000, 0x8, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000600100000f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000006856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010300), 0x0, 0x640}, {&(0x7f0000010400)="03000000040000000500000016000f000300040000000000000000000f00698c", 0x20, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}, {&(0x7f0000011000)}, {0x0, 0x0, 0x6700000}, {&(0x7f0000000580), 0x0, 0xc000}], 0x0, &(0x7f0000013b00)=ANY=[@ANYBLOB='\x00']) creat(&(0x7f0000000000)='./file1\x00', 0x18) r4 = socket(0x10, 0x3, 0x0) sendmsg$nl_route(r4, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f00000005c0)=@ipv4_newroute={0x38, 0x18, 0xbad, 0x0, 0x0, {}, [@RTA_ENCAP_TYPE={0x6, 0x15, 0x3}, @RTA_ENCAP={0x14, 0x16, 0x0, 0x1, @SEG6_IPTUNNEL_SRH={0xd}}]}, 0x38}}, 0x0) socket(0x26, 0x3, 0x0) r5 = socket(0x10, 0x0, 0x0) sendmsg$nl_route(r5, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f00000005c0)=@ipv4_newroute={0x38, 0x18, 0xbad, 0x0, 0x0, {0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6}, [@RTA_ENCAP_TYPE={0x6, 0x15, 0x3}, @RTA_ENCAP={0x14, 0x16, 0x0, 0x1, @SEG6_IPTUNNEL_SRH={0xd}}]}, 0x38}}, 0x0) recvfrom(r2, &(0x7f0000000600)=""/203, 0xcb, 0x42, &(0x7f0000000700)=@hci={0x1f, 0xffffffffffffffff, 0x4}, 0x80) 10:15:18 executing program 3: prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f00000002c0)=0x0) sched_setscheduler(r0, 0x2, &(0x7f0000000080)=0x6) r1 = getpid() sched_setscheduler(r1, 0x2, &(0x7f00000000c0)=0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r2, &(0x7f000057eff8)=@abs, 0x6e) sendmmsg$unix(r3, &(0x7f00000bd000), 0x318, 0x0) recvmmsg(r2, &(0x7f00000000c0), 0x10106, 0x2, 0x0) syz_mount_image$ext4(&(0x7f0000000180)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xfffbffff00000000, 0x8, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000600100000f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000006856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010300), 0x0, 0x640}, {&(0x7f0000010400)="03000000040000000500000016000f000300040000000000000000000f00698c", 0x20, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}, {&(0x7f0000011000)}, {0x0, 0x0, 0x6700000}, {&(0x7f0000000580), 0x0, 0xc000}], 0x0, &(0x7f0000013b00)=ANY=[@ANYBLOB='\x00']) r4 = creat(&(0x7f0000000000)='./file1\x00', 0x18) r5 = socket(0x10, 0x3, 0x0) sendmsg$nl_route(r5, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f00000005c0)=@ipv4_newroute={0x38, 0x18, 0xbad, 0x0, 0x0, {}, [@RTA_ENCAP_TYPE={0x6, 0x15, 0x3}, @RTA_ENCAP={0x14, 0x16, 0x0, 0x1, @SEG6_IPTUNNEL_SRH={0xd}}]}, 0x38}}, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f00000005c0)=@ipv4_newroute={0x38, 0x18, 0xbad, 0x0, 0x0, {0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6}, [@RTA_ENCAP_TYPE={0x6, 0x15, 0x3}, @RTA_ENCAP={0x14, 0x16, 0x0, 0x1, @SEG6_IPTUNNEL_SRH={0xd}}]}, 0x38}}, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f00000005c0)=@ipv4_newroute={0x38, 0x18, 0xbad, 0x0, 0x0, {0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6}, [@RTA_ENCAP_TYPE={0x6, 0x15, 0x3}, @RTA_ENCAP={0x14, 0x16, 0x0, 0x1, @SEG6_IPTUNNEL_SRH={0xd}}]}, 0x38}}, 0x0) execveat(r4, 0x0, &(0x7f0000000380)=[&(0x7f00000001c0)='+{!#\x00', &(0x7f0000000300)='ext4\x00', &(0x7f0000000340)='@(\x00'], &(0x7f00000004c0)=[&(0x7f00000003c0)='ext4\x00', &(0x7f0000000400)='ext4\x00', &(0x7f0000000500)='\x00.D\x04\xe0\xce\x99\xd9\xa9\xac\xac\xadH\xa4\xcf\xb7\xffT\xac\x05\xfd\xdd\xb8w\x0f\x82B\xff\xf2\x909`1!\f\x870\x1f\xc1%Y\xc8\x15c \xea\x1cY!\x04\xe4\x91^\x00\x04\xe4\xa6\xba\xc6\xfd\x10\xdf\xe24\xd4&\x17\xdc\xec\xf4\f\n\xb7.\x13\x8e\x1bYENj\xe1\x19~\x1c\xaf\a;d\x9f\xba\xd9T\xd4-\xecX\xc0Y\x83@\xc7\x8b\xff*\xdd\xaa\xc6,o4\xe2\x0f\x16\x01[\xc0\xeb\x7fFI]WF\x1f\f?\xfa\xb1\xe7\xf6t\x027\xb1\xc17.4V\xf81{9\xa3\xb9\x01\xcck@I\xe2\xf1Y\x10E\xa1z/\x05.~Yh%\x8f\x06sB)N\x11P\xf6p\xff\'\xaf\a7\x10+p\xbb\xf3\xb08\xb5)\x00\xeeg\xd0\xee\xe9\x98\x8d\xf8\xb5G\t@f\x1et v\x14\tT\xc5', 0x0], 0x1000) 10:15:18 executing program 1: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000005c0)={{0x14}, [@NFT_MSG_NEWTABLE={0x20, 0x0, 0xa, 0x3, 0x0, 0x0, {0x1}, [@NFTA_TABLE_NAME={0x9, 0x1, 'syz0\x00'}]}, @NFT_MSG_NEWSET={0x3c, 0x9, 0xa, 0x0, 0x0, 0x0, {0x1}, [@NFTA_SET_ID={0x8}, @NFTA_SET_NAME={0x9, 0x2, 'syz2\x00'}, @NFTA_SET_TABLE={0x9, 0x1, 'syz0\x00'}, @NFTA_SET_KEY_LEN={0x8, 0x5, 0x1, 0x0, 0x1f}]}, @NFT_MSG_NEWSETELEM={0x48, 0xc, 0xa, 0x201, 0x0, 0x0, {0x1}, [@NFTA_SET_ELEM_LIST_SET={0x9, 0x2, 'syz2\x00'}, @NFTA_SET_ELEM_LIST_ELEMENTS={0x1c, 0x3, 0x0, 0x1, [{0x18, 0x0, 0x0, 0x1, [@NFTA_SET_ELEM_FLAGS={0x8, 0x3, 0x1, 0x0, 0x4}, @NFTA_SET_ELEM_TIMEOUT={0x4, 0x6}]}]}, @NFTA_SET_ELEM_LIST_TABLE={0x9, 0x1, 'syz0\x00'}]}], {0x14, 0x10}}, 0xcc}}, 0x0) 10:15:18 executing program 1: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000005c0)={{0x14}, [@NFT_MSG_NEWTABLE={0x20, 0x0, 0xa, 0x3, 0x0, 0x0, {0x1}, [@NFTA_TABLE_NAME={0x9, 0x1, 'syz0\x00'}]}, @NFT_MSG_NEWSET={0x3c, 0x9, 0xa, 0x0, 0x0, 0x0, {0x1}, [@NFTA_SET_ID={0x8}, @NFTA_SET_NAME={0x9, 0x2, 'syz2\x00'}, @NFTA_SET_TABLE={0x9, 0x1, 'syz0\x00'}, @NFTA_SET_KEY_LEN={0x8, 0x5, 0x1, 0x0, 0x1f}]}, @NFT_MSG_NEWSETELEM={0x48, 0xc, 0xa, 0x201, 0x0, 0x0, {0x1}, [@NFTA_SET_ELEM_LIST_SET={0x9, 0x2, 'syz2\x00'}, @NFTA_SET_ELEM_LIST_ELEMENTS={0x1c, 0x3, 0x0, 0x1, [{0x18, 0x0, 0x0, 0x1, [@NFTA_SET_ELEM_FLAGS={0x8, 0x3, 0x1, 0x0, 0x4}, @NFTA_SET_ELEM_TIMEOUT={0x4, 0x6}]}]}, @NFTA_SET_ELEM_LIST_TABLE={0x9, 0x1, 'syz0\x00'}]}], {0x14, 0x10}}, 0xcc}}, 0x0) 10:15:18 executing program 1: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000005c0)={{0x14}, [@NFT_MSG_NEWTABLE={0x20, 0x0, 0xa, 0x3, 0x0, 0x0, {0x1}, [@NFTA_TABLE_NAME={0x9, 0x1, 'syz0\x00'}]}, @NFT_MSG_NEWSET={0x3c, 0x9, 0xa, 0x0, 0x0, 0x0, {0x1}, [@NFTA_SET_ID={0x8}, @NFTA_SET_NAME={0x9, 0x2, 'syz2\x00'}, @NFTA_SET_TABLE={0x9, 0x1, 'syz0\x00'}, @NFTA_SET_KEY_LEN={0x8, 0x5, 0x1, 0x0, 0x1f}]}, @NFT_MSG_NEWSETELEM={0x48, 0xc, 0xa, 0x201, 0x0, 0x0, {0x1}, [@NFTA_SET_ELEM_LIST_SET={0x9, 0x2, 'syz2\x00'}, @NFTA_SET_ELEM_LIST_ELEMENTS={0x1c, 0x3, 0x0, 0x1, [{0x18, 0x0, 0x0, 0x1, [@NFTA_SET_ELEM_FLAGS={0x8, 0x3, 0x1, 0x0, 0x4}, @NFTA_SET_ELEM_TIMEOUT={0x4, 0x6}]}]}, @NFTA_SET_ELEM_LIST_TABLE={0x9, 0x1, 'syz0\x00'}]}], {0x14, 0x10}}, 0xcc}}, 0x0) 10:15:18 executing program 1: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000005c0)={{0x14}, [@NFT_MSG_NEWTABLE={0x20, 0x0, 0xa, 0x3, 0x0, 0x0, {0x1}, [@NFTA_TABLE_NAME={0x9, 0x1, 'syz0\x00'}]}, @NFT_MSG_NEWSET={0x3c, 0x9, 0xa, 0x401, 0x0, 0x0, {}, [@NFTA_SET_ID={0x8}, @NFTA_SET_NAME={0x9, 0x2, 'syz2\x00'}, @NFTA_SET_TABLE={0x9, 0x1, 'syz0\x00'}, @NFTA_SET_KEY_LEN={0x8, 0x5, 0x1, 0x0, 0x1f}]}, @NFT_MSG_NEWSETELEM={0x48, 0xc, 0xa, 0x201, 0x0, 0x0, {0x1}, [@NFTA_SET_ELEM_LIST_SET={0x9, 0x2, 'syz2\x00'}, @NFTA_SET_ELEM_LIST_ELEMENTS={0x1c, 0x3, 0x0, 0x1, [{0x18, 0x0, 0x0, 0x1, [@NFTA_SET_ELEM_FLAGS={0x8, 0x3, 0x1, 0x0, 0x4}, @NFTA_SET_ELEM_TIMEOUT={0x4, 0x6}]}]}, @NFTA_SET_ELEM_LIST_TABLE={0x9, 0x1, 'syz0\x00'}]}], {0x14, 0x10}}, 0xcc}}, 0x0) 10:15:18 executing program 1: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000005c0)={{0x14}, [@NFT_MSG_NEWTABLE={0x20, 0x0, 0xa, 0x3, 0x0, 0x0, {0x1}, [@NFTA_TABLE_NAME={0x9, 0x1, 'syz0\x00'}]}, @NFT_MSG_NEWSET={0x3c, 0x9, 0xa, 0x401, 0x0, 0x0, {}, [@NFTA_SET_ID={0x8}, @NFTA_SET_NAME={0x9, 0x2, 'syz2\x00'}, @NFTA_SET_TABLE={0x9, 0x1, 'syz0\x00'}, @NFTA_SET_KEY_LEN={0x8, 0x5, 0x1, 0x0, 0x1f}]}, @NFT_MSG_NEWSETELEM={0x48, 0xc, 0xa, 0x201, 0x0, 0x0, {0x1}, [@NFTA_SET_ELEM_LIST_SET={0x9, 0x2, 'syz2\x00'}, @NFTA_SET_ELEM_LIST_ELEMENTS={0x1c, 0x3, 0x0, 0x1, [{0x18, 0x0, 0x0, 0x1, [@NFTA_SET_ELEM_FLAGS={0x8, 0x3, 0x1, 0x0, 0x4}, @NFTA_SET_ELEM_TIMEOUT={0x4, 0x6}]}]}, @NFTA_SET_ELEM_LIST_TABLE={0x9, 0x1, 'syz0\x00'}]}], {0x14, 0x10}}, 0xcc}}, 0x0) 10:15:18 executing program 1: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000005c0)={{0x14}, [@NFT_MSG_NEWTABLE={0x20, 0x0, 0xa, 0x3, 0x0, 0x0, {0x1}, [@NFTA_TABLE_NAME={0x9, 0x1, 'syz0\x00'}]}, @NFT_MSG_NEWSET={0x3c, 0x9, 0xa, 0x401, 0x0, 0x0, {}, [@NFTA_SET_ID={0x8}, @NFTA_SET_NAME={0x9, 0x2, 'syz2\x00'}, @NFTA_SET_TABLE={0x9, 0x1, 'syz0\x00'}, @NFTA_SET_KEY_LEN={0x8, 0x5, 0x1, 0x0, 0x1f}]}, @NFT_MSG_NEWSETELEM={0x48, 0xc, 0xa, 0x201, 0x0, 0x0, {0x1}, [@NFTA_SET_ELEM_LIST_SET={0x9, 0x2, 'syz2\x00'}, @NFTA_SET_ELEM_LIST_ELEMENTS={0x1c, 0x3, 0x0, 0x1, [{0x18, 0x0, 0x0, 0x1, [@NFTA_SET_ELEM_FLAGS={0x8, 0x3, 0x1, 0x0, 0x4}, @NFTA_SET_ELEM_TIMEOUT={0x4, 0x6}]}]}, @NFTA_SET_ELEM_LIST_TABLE={0x9, 0x1, 'syz0\x00'}]}], {0x14, 0x10}}, 0xcc}}, 0x0) [ 2218.949364][T25517] loop2: detected capacity change from 0 to 264192 [ 2219.159345][T25518] loop3: detected capacity change from 0 to 264192 [ 2219.249469][T25520] loop4: detected capacity change from 0 to 264192 [ 2221.767970][T25518] EXT4-fs: error -4 creating inode table initialization thread [ 2221.775693][T25518] EXT4-fs (loop3): mount failed [ 2221.812741][T25520] EXT4-fs (loop4): mounted filesystem without journal. Quota mode: writeback. [ 2221.822828][T25517] EXT4-fs (loop2): mounted filesystem without journal. Quota mode: writeback. 10:15:28 executing program 5: prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f00000002c0)=0x0) sched_setscheduler(r0, 0x2, &(0x7f0000000080)=0x6) r1 = getpid() sched_setscheduler(r1, 0x2, &(0x7f00000000c0)=0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r2, &(0x7f000057eff8)=@abs, 0x6e) sendmmsg$unix(r3, &(0x7f00000bd000), 0x318, 0x0) recvmmsg(r2, &(0x7f00000000c0), 0x10106, 0x2, 0x0) syz_mount_image$ext4(&(0x7f0000000180)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xfffbffff00000000, 0x8, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000600100000f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000006856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010300), 0x0, 0x640}, {&(0x7f0000010400)="03000000040000000500000016000f000300040000000000000000000f00698c", 0x20, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}, {&(0x7f0000011000)}, {0x0, 0x0, 0x6700000}, {&(0x7f0000000580), 0x0, 0xc000}], 0x0, &(0x7f0000013b00)=ANY=[@ANYBLOB='\x00']) r4 = creat(&(0x7f0000000000)='./file1\x00', 0x18) r5 = socket(0x10, 0x3, 0x0) sendmsg$nl_route(r5, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f00000005c0)=@ipv4_newroute={0x38, 0x18, 0xbad, 0x0, 0x0, {}, [@RTA_ENCAP_TYPE={0x6, 0x15, 0x3}, @RTA_ENCAP={0x14, 0x16, 0x0, 0x1, @SEG6_IPTUNNEL_SRH={0xd}}]}, 0x38}}, 0x0) socket(0x26, 0x3, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f00000005c0)=@ipv4_newroute={0x38, 0x18, 0xbad, 0x0, 0x0, {0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6}, [@RTA_ENCAP_TYPE={0x6, 0x15, 0x3}, @RTA_ENCAP={0x14, 0x16, 0x0, 0x1, @SEG6_IPTUNNEL_SRH={0xd}}]}, 0x38}}, 0x0) r6 = socket(0x10, 0x3, 0x0) sendmsg$nl_route(r6, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f00000005c0)=@ipv4_newroute={0x38, 0x18, 0xbad, 0x0, 0x0, {0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6}, [@RTA_ENCAP_TYPE={0x6, 0x15, 0x3}, @RTA_ENCAP={0x14, 0x16, 0x0, 0x1, @SEG6_IPTUNNEL_SRH={0xd}}]}, 0x38}}, 0x0) execveat(r4, &(0x7f0000000040)='./file0\x00', &(0x7f0000000380)=[&(0x7f00000001c0)='+{!#\x00', &(0x7f0000000300)='ext4\x00', &(0x7f0000000340)='@(\x00'], &(0x7f00000004c0)=[&(0x7f00000003c0)='ext4\x00', &(0x7f0000000400)='ext4\x00', &(0x7f0000000500)='\x00.D\x04\xe0\xce\x99\xd9\xa9\xac\xac\xadH\xa4\xcf\xb7\xffT\xac\x05\xfd\xdd\xb8w\x0f\x82B\xff\xf2\x909`1!\f\x870\x1f\xc1%Y\xc8\x15c \xea\x1cY!\x04\xe4\x91^\x00\x04\xe4\xa6\xba\xc6\xfd\x10\xdf\xe24\xd4&\x17\xdc\xec\xf4\f\n\xb7.\x13\x8e\x1bYENj\xe1\x19~\x1c\xaf\a;d\x9f\xba\xd9T\xd4-\xecX\xc0Y\x83@\xc7\x8b\xff*\xdd\xaa\xc6,o4\xe2\x0f\x16\x01[\xc0\xeb\x7fFI]WF\x1f\f?\xfa\xb1\xe7\xf6t\x027\xb1\xc17.4V\xf81{9\xa3\xb9\x01\xcck@I\xe2\xf1Y\x10E\xa1z/\x05.~Yh%\x8f\x06sB)N\x11P\xf6p\xff\'\xaf\a7\x10+p\xbb\xf3\xb08\xb5)\x00\xeeg\xd0\xee\xe9\x98\x8d\xf8\xb5G\t@f\x1et v\x14\tT\xc5', &(0x7f0000000480)=':--[\x00'], 0x1000) recvfrom(r2, &(0x7f0000000600)=""/203, 0xcb, 0x42, &(0x7f0000000700)=@hci={0x1f, 0xffffffffffffffff, 0x4}, 0x80) 10:15:28 executing program 1: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000005c0)={{0x14}, [@NFT_MSG_NEWTABLE={0x20, 0x0, 0xa, 0x3, 0x0, 0x0, {0x1}, [@NFTA_TABLE_NAME={0x9, 0x1, 'syz0\x00'}]}, @NFT_MSG_NEWSET={0x34, 0x9, 0xa, 0x401, 0x0, 0x0, {0x1}, [@NFTA_SET_ID={0x8}, @NFTA_SET_NAME={0x9, 0x2, 'syz2\x00'}, @NFTA_SET_TABLE={0x9, 0x1, 'syz0\x00'}]}, @NFT_MSG_NEWSETELEM={0x48, 0xc, 0xa, 0x201, 0x0, 0x0, {0x1}, [@NFTA_SET_ELEM_LIST_SET={0x9, 0x2, 'syz2\x00'}, @NFTA_SET_ELEM_LIST_ELEMENTS={0x1c, 0x3, 0x0, 0x1, [{0x18, 0x0, 0x0, 0x1, [@NFTA_SET_ELEM_FLAGS={0x8, 0x3, 0x1, 0x0, 0x4}, @NFTA_SET_ELEM_TIMEOUT={0xc, 0x6}]}]}, @NFTA_SET_ELEM_LIST_TABLE={0x9, 0x1, 'syz0\x00'}]}], {0x14, 0x10}}, 0xc4}}, 0x0) 10:15:28 executing program 0: prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f00000002c0)=0x0) sched_setscheduler(r0, 0x2, &(0x7f0000000080)=0x6) r1 = getpid() sched_setscheduler(r1, 0x2, &(0x7f00000000c0)=0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r2, &(0x7f000057eff8)=@abs, 0x6e) sendmmsg$unix(r3, &(0x7f00000bd000), 0x318, 0x0) recvmmsg(r2, &(0x7f00000000c0), 0x10106, 0x2, 0x0) syz_mount_image$ext4(&(0x7f0000000180)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xfffbffff00000000, 0x8, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000600100000f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000006856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010300), 0x0, 0x640}, {&(0x7f0000010400)="03000000040000000500000016000f000300040000000000000000000f00698c", 0x20, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}, {&(0x7f0000011000)}, {0x0, 0x0, 0x6700000}, {&(0x7f0000000580), 0x0, 0xc000}], 0x0, &(0x7f0000013b00)=ANY=[@ANYBLOB='\x00']) r4 = creat(&(0x7f0000000000)='./file1\x00', 0x18) r5 = socket(0x10, 0x3, 0x0) sendmsg$nl_route(r5, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f00000005c0)=@ipv4_newroute={0x38, 0x18, 0xbad, 0x0, 0x0, {}, [@RTA_ENCAP_TYPE={0x6, 0x15, 0x3}, @RTA_ENCAP={0x14, 0x16, 0x0, 0x1, @SEG6_IPTUNNEL_SRH={0xd}}]}, 0x38}}, 0x0) socket(0x26, 0x3, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f00000005c0)=@ipv4_newroute={0x38, 0x18, 0xbad, 0x0, 0x0, {0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6}, [@RTA_ENCAP_TYPE={0x6, 0x15, 0x3}, @RTA_ENCAP={0x14, 0x16, 0x0, 0x1, @SEG6_IPTUNNEL_SRH={0xd}}]}, 0x38}}, 0x0) execveat(r4, 0x0, &(0x7f0000000380)=[&(0x7f00000001c0)='+{!#\x00', &(0x7f0000000300)='ext4\x00', &(0x7f0000000340)='@(\x00'], &(0x7f00000004c0)=[&(0x7f00000003c0)='ext4\x00', &(0x7f0000000400)='ext4\x00', &(0x7f0000000500)='\x00.D\x04\xe0\xce\x99\xd9\xa9\xac\xac\xadH\xa4\xcf\xb7\xffT\xac\x05\xfd\xdd\xb8w\x0f\x82B\xff\xf2\x909`1!\f\x870\x1f\xc1%Y\xc8\x15c \xea\x1cY!\x04\xe4\x91^\x00\x04\xe4\xa6\xba\xc6\xfd\x10\xdf\xe24\xd4&\x17\xdc\xec\xf4\f\n\xb7.\x13\x8e\x1bYENj\xe1\x19~\x1c\xaf\a;d\x9f\xba\xd9T\xd4-\xecX\xc0Y\x83@\xc7\x8b\xff*\xdd\xaa\xc6,o4\xe2\x0f\x16\x01[\xc0\xeb\x7fFI]WF\x1f\f?\xfa\xb1\xe7\xf6t\x027\xb1\xc17.4V\xf81{9\xa3\xb9\x01\xcck@I\xe2\xf1Y\x10E\xa1z/\x05.~Yh%\x8f\x06sB)N\x11P\xf6p\xff\'\xaf\a7\x10+p\xbb\xf3\xb08\xb5)\x00\xeeg\xd0\xee\xe9\x98\x8d\xf8\xb5G\t@f\x1et v\x14\tT\xc5', 0x0], 0x1000) 10:15:28 executing program 2: prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f00000002c0)=0x0) sched_setscheduler(r0, 0x2, &(0x7f0000000080)=0x6) r1 = getpid() sched_setscheduler(r1, 0x2, &(0x7f00000000c0)=0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r2, &(0x7f000057eff8)=@abs, 0x6e) sendmmsg$unix(r3, &(0x7f00000bd000), 0x318, 0x0) recvmmsg(r2, &(0x7f00000000c0), 0x10106, 0x2, 0x0) syz_mount_image$ext4(&(0x7f0000000180)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xfffbffff00000000, 0x8, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000600100000f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000006856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010300), 0x0, 0x640}, {&(0x7f0000010400)="03000000040000000500000016000f000300040000000000000000000f00698c", 0x20, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}, {&(0x7f0000011000)}, {0x0, 0x0, 0x6700000}, {&(0x7f0000000580), 0x0, 0xc000}], 0x0, &(0x7f0000013b00)=ANY=[@ANYBLOB='\x00']) creat(&(0x7f0000000000)='./file1\x00', 0x18) r4 = socket(0x10, 0x3, 0x0) sendmsg$nl_route(r4, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f00000005c0)=@ipv4_newroute={0x38, 0x18, 0xbad, 0x0, 0x0, {}, [@RTA_ENCAP_TYPE={0x6, 0x15, 0x3}, @RTA_ENCAP={0x14, 0x16, 0x0, 0x1, @SEG6_IPTUNNEL_SRH={0xd}}]}, 0x38}}, 0x0) socket(0x26, 0x3, 0x0) r5 = socket(0x10, 0x0, 0x0) sendmsg$nl_route(r5, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f00000005c0)=@ipv4_newroute={0x38, 0x18, 0xbad, 0x0, 0x0, {0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6}, [@RTA_ENCAP_TYPE={0x6, 0x15, 0x3}, @RTA_ENCAP={0x14, 0x16, 0x0, 0x1, @SEG6_IPTUNNEL_SRH={0xd}}]}, 0x38}}, 0x0) recvfrom(r2, &(0x7f0000000600)=""/203, 0xcb, 0x42, &(0x7f0000000700)=@hci={0x1f, 0xffffffffffffffff, 0x4}, 0x80) 10:15:28 executing program 3: prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f00000002c0)=0x0) sched_setscheduler(r0, 0x2, &(0x7f0000000080)=0x6) r1 = getpid() sched_setscheduler(r1, 0x2, &(0x7f00000000c0)=0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r2, &(0x7f000057eff8)=@abs, 0x6e) sendmmsg$unix(r3, &(0x7f00000bd000), 0x318, 0x0) recvmmsg(r2, &(0x7f00000000c0), 0x10106, 0x2, 0x0) syz_mount_image$ext4(&(0x7f0000000180)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xfffbffff00000000, 0x8, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000600100000f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000006856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010300), 0x0, 0x640}, {&(0x7f0000010400)="03000000040000000500000016000f000300040000000000000000000f00698c", 0x20, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}, {&(0x7f0000011000)}, {0x0, 0x0, 0x6700000}, {&(0x7f0000000580), 0x0, 0xc000}], 0x0, &(0x7f0000013b00)=ANY=[@ANYBLOB='\x00']) r4 = creat(&(0x7f0000000000)='./file1\x00', 0x18) socket(0x10, 0x3, 0x0) r5 = socket(0x26, 0x3, 0x0) sendmsg$nl_route(r5, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f00000005c0)=@ipv4_newroute={0x38, 0x18, 0xbad, 0x0, 0x0, {0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6}, [@RTA_ENCAP_TYPE={0x6, 0x15, 0x3}, @RTA_ENCAP={0x14, 0x16, 0x0, 0x1, @SEG6_IPTUNNEL_SRH={0xd}}]}, 0x38}}, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f00000005c0)=@ipv4_newroute={0x38, 0x18, 0xbad, 0x0, 0x0, {0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6}, [@RTA_ENCAP_TYPE={0x6, 0x15, 0x3}, @RTA_ENCAP={0x14, 0x16, 0x0, 0x1, @SEG6_IPTUNNEL_SRH={0xd}}]}, 0x38}}, 0x0) execveat(r4, 0x0, &(0x7f0000000380)=[&(0x7f00000001c0)='+{!#\x00', &(0x7f0000000300)='ext4\x00', &(0x7f0000000340)='@(\x00'], &(0x7f00000004c0)=[&(0x7f00000003c0)='ext4\x00', &(0x7f0000000400)='ext4\x00', &(0x7f0000000500)='\x00.D\x04\xe0\xce\x99\xd9\xa9\xac\xac\xadH\xa4\xcf\xb7\xffT\xac\x05\xfd\xdd\xb8w\x0f\x82B\xff\xf2\x909`1!\f\x870\x1f\xc1%Y\xc8\x15c \xea\x1cY!\x04\xe4\x91^\x00\x04\xe4\xa6\xba\xc6\xfd\x10\xdf\xe24\xd4&\x17\xdc\xec\xf4\f\n\xb7.\x13\x8e\x1bYENj\xe1\x19~\x1c\xaf\a;d\x9f\xba\xd9T\xd4-\xecX\xc0Y\x83@\xc7\x8b\xff*\xdd\xaa\xc6,o4\xe2\x0f\x16\x01[\xc0\xeb\x7fFI]WF\x1f\f?\xfa\xb1\xe7\xf6t\x027\xb1\xc17.4V\xf81{9\xa3\xb9\x01\xcck@I\xe2\xf1Y\x10E\xa1z/\x05.~Yh%\x8f\x06sB)N\x11P\xf6p\xff\'\xaf\a7\x10+p\xbb\xf3\xb08\xb5)\x00\xeeg\xd0\xee\xe9\x98\x8d\xf8\xb5G\t@f\x1et v\x14\tT\xc5', 0x0], 0x1000) 10:15:28 executing program 4: prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f00000002c0)=0x0) sched_setscheduler(r0, 0x2, &(0x7f0000000080)=0x6) r1 = getpid() sched_setscheduler(r1, 0x2, &(0x7f00000000c0)=0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r2, &(0x7f000057eff8)=@abs, 0x6e) sendmmsg$unix(r3, &(0x7f00000bd000), 0x318, 0x0) recvmmsg(r2, &(0x7f00000000c0), 0x10106, 0x2, 0x0) syz_mount_image$ext4(&(0x7f0000000180)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xfffbffff00000000, 0x8, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000600100000f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000006856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010300), 0x0, 0x640}, {&(0x7f0000010400)="03000000040000000500000016000f000300040000000000000000000f00698c", 0x20, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}, {&(0x7f0000011000)}, {0x0, 0x0, 0x6700000}, {&(0x7f0000000580), 0x0, 0xc000}], 0x0, &(0x7f0000013b00)=ANY=[@ANYBLOB='\x00']) r4 = creat(&(0x7f0000000000)='./file1\x00', 0x18) r5 = socket(0x10, 0x3, 0x0) sendmsg$nl_route(r5, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f00000005c0)=@ipv4_newroute={0x38, 0x18, 0xbad, 0x0, 0x0, {}, [@RTA_ENCAP_TYPE={0x6, 0x15, 0x3}, @RTA_ENCAP={0x14, 0x16, 0x0, 0x1, @SEG6_IPTUNNEL_SRH={0xd}}]}, 0x38}}, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f00000005c0)=@ipv4_newroute={0x38, 0x18, 0xbad, 0x0, 0x0, {0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6}, [@RTA_ENCAP_TYPE={0x6, 0x15, 0x3}, @RTA_ENCAP={0x14, 0x16, 0x0, 0x1, @SEG6_IPTUNNEL_SRH={0xd}}]}, 0x38}}, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f00000005c0)=@ipv4_newroute={0x38, 0x18, 0xbad, 0x0, 0x0, {0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6}, [@RTA_ENCAP_TYPE={0x6, 0x15, 0x3}, @RTA_ENCAP={0x14, 0x16, 0x0, 0x1, @SEG6_IPTUNNEL_SRH={0xd}}]}, 0x38}}, 0x0) execveat(r4, 0x0, &(0x7f0000000380)=[&(0x7f00000001c0)='+{!#\x00', &(0x7f0000000300)='ext4\x00', &(0x7f0000000340)='@(\x00'], &(0x7f00000004c0)=[&(0x7f00000003c0)='ext4\x00', &(0x7f0000000400)='ext4\x00', &(0x7f0000000500)='\x00.D\x04\xe0\xce\x99\xd9\xa9\xac\xac\xadH\xa4\xcf\xb7\xffT\xac\x05\xfd\xdd\xb8w\x0f\x82B\xff\xf2\x909`1!\f\x870\x1f\xc1%Y\xc8\x15c \xea\x1cY!\x04\xe4\x91^\x00\x04\xe4\xa6\xba\xc6\xfd\x10\xdf\xe24\xd4&\x17\xdc\xec\xf4\f\n\xb7.\x13\x8e\x1bYENj\xe1\x19~\x1c\xaf\a;d\x9f\xba\xd9T\xd4-\xecX\xc0Y\x83@\xc7\x8b\xff*\xdd\xaa\xc6,o4\xe2\x0f\x16\x01[\xc0\xeb\x7fFI]WF\x1f\f?\xfa\xb1\xe7\xf6t\x027\xb1\xc17.4V\xf81{9\xa3\xb9\x01\xcck@I\xe2\xf1Y\x10E\xa1z/\x05.~Yh%\x8f\x06sB)N\x11P\xf6p\xff\'\xaf\a7\x10+p\xbb\xf3\xb08\xb5)\x00\xeeg\xd0\xee\xe9\x98\x8d\xf8\xb5G\t@f\x1et v\x14\tT\xc5', 0x0], 0x1000) 10:15:28 executing program 1: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000005c0)={{0x14}, [@NFT_MSG_NEWTABLE={0x20, 0x0, 0xa, 0x3, 0x0, 0x0, {0x1}, [@NFTA_TABLE_NAME={0x9, 0x1, 'syz0\x00'}]}, @NFT_MSG_NEWSET={0x34, 0x9, 0xa, 0x401, 0x0, 0x0, {0x1}, [@NFTA_SET_ID={0x8}, @NFTA_SET_NAME={0x9, 0x2, 'syz2\x00'}, @NFTA_SET_TABLE={0x9, 0x1, 'syz0\x00'}]}, @NFT_MSG_NEWSETELEM={0x48, 0xc, 0xa, 0x201, 0x0, 0x0, {0x1}, [@NFTA_SET_ELEM_LIST_SET={0x9, 0x2, 'syz2\x00'}, @NFTA_SET_ELEM_LIST_ELEMENTS={0x1c, 0x3, 0x0, 0x1, [{0x18, 0x0, 0x0, 0x1, [@NFTA_SET_ELEM_FLAGS={0x8, 0x3, 0x1, 0x0, 0x4}, @NFTA_SET_ELEM_TIMEOUT={0xc, 0x6}]}]}, @NFTA_SET_ELEM_LIST_TABLE={0x9, 0x1, 'syz0\x00'}]}], {0x14, 0x10}}, 0xc4}}, 0x0) 10:15:28 executing program 1: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000005c0)={{0x14}, [@NFT_MSG_NEWTABLE={0x20, 0x0, 0xa, 0x3, 0x0, 0x0, {0x1}, [@NFTA_TABLE_NAME={0x9, 0x1, 'syz0\x00'}]}, @NFT_MSG_NEWSET={0x34, 0x9, 0xa, 0x401, 0x0, 0x0, {0x1}, [@NFTA_SET_ID={0x8}, @NFTA_SET_NAME={0x9, 0x2, 'syz2\x00'}, @NFTA_SET_TABLE={0x9, 0x1, 'syz0\x00'}]}, @NFT_MSG_NEWSETELEM={0x48, 0xc, 0xa, 0x201, 0x0, 0x0, {0x1}, [@NFTA_SET_ELEM_LIST_SET={0x9, 0x2, 'syz2\x00'}, @NFTA_SET_ELEM_LIST_ELEMENTS={0x1c, 0x3, 0x0, 0x1, [{0x18, 0x0, 0x0, 0x1, [@NFTA_SET_ELEM_FLAGS={0x8, 0x3, 0x1, 0x0, 0x4}, @NFTA_SET_ELEM_TIMEOUT={0xc, 0x6}]}]}, @NFTA_SET_ELEM_LIST_TABLE={0x9, 0x1, 'syz0\x00'}]}], {0x14, 0x10}}, 0xc4}}, 0x0) 10:15:28 executing program 1: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000005c0)={{0x14}, [@NFT_MSG_NEWTABLE={0x20, 0x0, 0xa, 0x3, 0x0, 0x0, {0x1}, [@NFTA_TABLE_NAME={0x9, 0x1, 'syz0\x00'}]}, @NFT_MSG_NEWSET={0x3c, 0x9, 0xa, 0x401, 0x0, 0x0, {0x1}, [@NFTA_SET_ID={0x8}, @NFTA_SET_NAME={0x9, 0x2, 'syz2\x00'}, @NFTA_SET_TABLE={0x9, 0x1, 'syz0\x00'}, @NFTA_SET_KEY_LEN={0x8}]}, @NFT_MSG_NEWSETELEM={0x48, 0xc, 0xa, 0x201, 0x0, 0x0, {0x1}, [@NFTA_SET_ELEM_LIST_SET={0x9, 0x2, 'syz2\x00'}, @NFTA_SET_ELEM_LIST_ELEMENTS={0x1c, 0x3, 0x0, 0x1, [{0x18, 0x0, 0x0, 0x1, [@NFTA_SET_ELEM_FLAGS={0x8, 0x3, 0x1, 0x0, 0x4}, @NFTA_SET_ELEM_TIMEOUT={0x4, 0x6}]}]}, @NFTA_SET_ELEM_LIST_TABLE={0x9, 0x1, 'syz0\x00'}]}], {0x14, 0x10}}, 0xcc}}, 0x0) 10:15:29 executing program 1: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000005c0)={{0x14}, [@NFT_MSG_NEWTABLE={0x20, 0x0, 0xa, 0x3, 0x0, 0x0, {0x1}, [@NFTA_TABLE_NAME={0x9, 0x1, 'syz0\x00'}]}, @NFT_MSG_NEWSET={0x3c, 0x9, 0xa, 0x401, 0x0, 0x0, {0x1}, [@NFTA_SET_ID={0x8}, @NFTA_SET_NAME={0x9, 0x2, 'syz2\x00'}, @NFTA_SET_TABLE={0x9, 0x1, 'syz0\x00'}, @NFTA_SET_KEY_LEN={0x8}]}, @NFT_MSG_NEWSETELEM={0x48, 0xc, 0xa, 0x201, 0x0, 0x0, {0x1}, [@NFTA_SET_ELEM_LIST_SET={0x9, 0x2, 'syz2\x00'}, @NFTA_SET_ELEM_LIST_ELEMENTS={0x1c, 0x3, 0x0, 0x1, [{0x18, 0x0, 0x0, 0x1, [@NFTA_SET_ELEM_FLAGS={0x8, 0x3, 0x1, 0x0, 0x4}, @NFTA_SET_ELEM_TIMEOUT={0x4, 0x6}]}]}, @NFTA_SET_ELEM_LIST_TABLE={0x9, 0x1, 'syz0\x00'}]}], {0x14, 0x10}}, 0xcc}}, 0x0) 10:15:29 executing program 1: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000005c0)={{0x14}, [@NFT_MSG_NEWTABLE={0x20, 0x0, 0xa, 0x3, 0x0, 0x0, {0x1}, [@NFTA_TABLE_NAME={0x9, 0x1, 'syz0\x00'}]}, @NFT_MSG_NEWSET={0x3c, 0x9, 0xa, 0x401, 0x0, 0x0, {0x1}, [@NFTA_SET_ID={0x8}, @NFTA_SET_NAME={0x9, 0x2, 'syz2\x00'}, @NFTA_SET_TABLE={0x9, 0x1, 'syz0\x00'}, @NFTA_SET_KEY_LEN={0x8}]}, @NFT_MSG_NEWSETELEM={0x48, 0xc, 0xa, 0x201, 0x0, 0x0, {0x1}, [@NFTA_SET_ELEM_LIST_SET={0x9, 0x2, 'syz2\x00'}, @NFTA_SET_ELEM_LIST_ELEMENTS={0x1c, 0x3, 0x0, 0x1, [{0x18, 0x0, 0x0, 0x1, [@NFTA_SET_ELEM_FLAGS={0x8, 0x3, 0x1, 0x0, 0x4}, @NFTA_SET_ELEM_TIMEOUT={0x4, 0x6}]}]}, @NFTA_SET_ELEM_LIST_TABLE={0x9, 0x1, 'syz0\x00'}]}], {0x14, 0x10}}, 0xcc}}, 0x0) [ 2228.990659][T25564] loop4: detected capacity change from 0 to 264192 [ 2229.089211][T25565] loop3: detected capacity change from 0 to 264192 [ 2229.097032][T25566] loop2: detected capacity change from 0 to 264192 10:15:30 executing program 1: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000005c0)={{0x14}, [@NFT_MSG_NEWTABLE={0x20, 0x0, 0xa, 0x3, 0x0, 0x0, {0x1}, [@NFTA_TABLE_NAME={0x9, 0x1, 'syz0\x00'}]}, @NFT_MSG_NEWSET={0x30, 0x9, 0xa, 0x401, 0x0, 0x0, {0x1}, [@NFTA_SET_ID={0x8}, @NFTA_SET_NAME={0x9, 0x2, 'syz2\x00'}, @NFTA_SET_KEY_LEN={0x8, 0x5, 0x1, 0x0, 0x1f}]}, @NFT_MSG_NEWSETELEM={0x48, 0xc, 0xa, 0x201, 0x0, 0x0, {0x1}, [@NFTA_SET_ELEM_LIST_SET={0x9, 0x2, 'syz2\x00'}, @NFTA_SET_ELEM_LIST_ELEMENTS={0x1c, 0x3, 0x0, 0x1, [{0x18, 0x0, 0x0, 0x1, [@NFTA_SET_ELEM_FLAGS={0x8, 0x3, 0x1, 0x0, 0x4}, @NFTA_SET_ELEM_TIMEOUT={0xc, 0x6}]}]}, @NFTA_SET_ELEM_LIST_TABLE={0x9, 0x1, 'syz0\x00'}]}], {0x14, 0x10}}, 0xc0}}, 0x0) [ 2231.488826][T25564] EXT4-fs: failed to create workqueue [ 2231.494287][T25564] EXT4-fs (loop4): mount failed [ 2231.672998][T25566] EXT4-fs: error -4 creating inode table initialization thread [ 2231.680628][T25565] EXT4-fs: error -4 creating inode table initialization thread [ 2231.680725][T25566] EXT4-fs (loop2): mount failed [ 2231.688231][T25565] EXT4-fs (loop3): mount failed 10:15:39 executing program 5: prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f00000002c0)=0x0) sched_setscheduler(r0, 0x2, &(0x7f0000000080)=0x6) r1 = getpid() sched_setscheduler(r1, 0x2, &(0x7f00000000c0)=0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r2, &(0x7f000057eff8)=@abs, 0x6e) sendmmsg$unix(r3, &(0x7f00000bd000), 0x318, 0x0) recvmmsg(r2, &(0x7f00000000c0), 0x10106, 0x2, 0x0) syz_mount_image$ext4(&(0x7f0000000180)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xfffbffff00000000, 0x8, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000600100000f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000006856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010300), 0x0, 0x640}, {&(0x7f0000010400)="03000000040000000500000016000f000300040000000000000000000f00698c", 0x20, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}, {&(0x7f0000011000)}, {0x0, 0x0, 0x6700000}, {&(0x7f0000000580), 0x0, 0xc000}], 0x0, &(0x7f0000013b00)=ANY=[@ANYBLOB='\x00']) r4 = creat(&(0x7f0000000000)='./file1\x00', 0x18) r5 = socket(0x10, 0x3, 0x0) sendmsg$nl_route(r5, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f00000005c0)=@ipv4_newroute={0x38, 0x18, 0xbad, 0x0, 0x0, {}, [@RTA_ENCAP_TYPE={0x6, 0x15, 0x3}, @RTA_ENCAP={0x14, 0x16, 0x0, 0x1, @SEG6_IPTUNNEL_SRH={0xd}}]}, 0x38}}, 0x0) socket(0x26, 0x3, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f00000005c0)=@ipv4_newroute={0x38, 0x18, 0xbad, 0x0, 0x0, {0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6}, [@RTA_ENCAP_TYPE={0x6, 0x15, 0x3}, @RTA_ENCAP={0x14, 0x16, 0x0, 0x1, @SEG6_IPTUNNEL_SRH={0xd}}]}, 0x38}}, 0x0) r6 = socket(0x10, 0x3, 0x0) sendmsg$nl_route(r6, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f00000005c0)=@ipv4_newroute={0x38, 0x18, 0xbad, 0x0, 0x0, {0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6}, [@RTA_ENCAP_TYPE={0x6, 0x15, 0x3}, @RTA_ENCAP={0x14, 0x16, 0x0, 0x1, @SEG6_IPTUNNEL_SRH={0xd}}]}, 0x38}}, 0x0) execveat(r4, &(0x7f0000000040)='./file0\x00', &(0x7f0000000380)=[&(0x7f00000001c0)='+{!#\x00', &(0x7f0000000300)='ext4\x00', &(0x7f0000000340)='@(\x00'], &(0x7f00000004c0)=[&(0x7f00000003c0)='ext4\x00', &(0x7f0000000400)='ext4\x00', &(0x7f0000000500)='\x00.D\x04\xe0\xce\x99\xd9\xa9\xac\xac\xadH\xa4\xcf\xb7\xffT\xac\x05\xfd\xdd\xb8w\x0f\x82B\xff\xf2\x909`1!\f\x870\x1f\xc1%Y\xc8\x15c \xea\x1cY!\x04\xe4\x91^\x00\x04\xe4\xa6\xba\xc6\xfd\x10\xdf\xe24\xd4&\x17\xdc\xec\xf4\f\n\xb7.\x13\x8e\x1bYENj\xe1\x19~\x1c\xaf\a;d\x9f\xba\xd9T\xd4-\xecX\xc0Y\x83@\xc7\x8b\xff*\xdd\xaa\xc6,o4\xe2\x0f\x16\x01[\xc0\xeb\x7fFI]WF\x1f\f?\xfa\xb1\xe7\xf6t\x027\xb1\xc17.4V\xf81{9\xa3\xb9\x01\xcck@I\xe2\xf1Y\x10E\xa1z/\x05.~Yh%\x8f\x06sB)N\x11P\xf6p\xff\'\xaf\a7\x10+p\xbb\xf3\xb08\xb5)\x00\xeeg\xd0\xee\xe9\x98\x8d\xf8\xb5G\t@f\x1et v\x14\tT\xc5', &(0x7f0000000480)=':--[\x00'], 0x1000) recvfrom(r2, &(0x7f0000000600)=""/203, 0xcb, 0x42, &(0x7f0000000700)=@hci={0x1f, 0xffffffffffffffff, 0x4}, 0x80) 10:15:39 executing program 1: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000005c0)={{0x14}, [@NFT_MSG_NEWTABLE={0x20, 0x0, 0xa, 0x3, 0x0, 0x0, {0x1}, [@NFTA_TABLE_NAME={0x9, 0x1, 'syz0\x00'}]}, @NFT_MSG_NEWSET={0x30, 0x9, 0xa, 0x401, 0x0, 0x0, {0x1}, [@NFTA_SET_ID={0x8}, @NFTA_SET_NAME={0x9, 0x2, 'syz2\x00'}, @NFTA_SET_KEY_LEN={0x8, 0x5, 0x1, 0x0, 0x1f}]}, @NFT_MSG_NEWSETELEM={0x48, 0xc, 0xa, 0x201, 0x0, 0x0, {0x1}, [@NFTA_SET_ELEM_LIST_SET={0x9, 0x2, 'syz2\x00'}, @NFTA_SET_ELEM_LIST_ELEMENTS={0x1c, 0x3, 0x0, 0x1, [{0x18, 0x0, 0x0, 0x1, [@NFTA_SET_ELEM_FLAGS={0x8, 0x3, 0x1, 0x0, 0x4}, @NFTA_SET_ELEM_TIMEOUT={0xc, 0x6}]}]}, @NFTA_SET_ELEM_LIST_TABLE={0x9, 0x1, 'syz0\x00'}]}], {0x14, 0x10}}, 0xc0}}, 0x0) 10:15:39 executing program 0: prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f00000002c0)=0x0) sched_setscheduler(r0, 0x2, &(0x7f0000000080)=0x6) r1 = getpid() sched_setscheduler(r1, 0x2, &(0x7f00000000c0)=0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r2, &(0x7f000057eff8)=@abs, 0x6e) sendmmsg$unix(r3, &(0x7f00000bd000), 0x318, 0x0) recvmmsg(r2, &(0x7f00000000c0), 0x10106, 0x2, 0x0) syz_mount_image$ext4(&(0x7f0000000180)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xfffbffff00000000, 0x8, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000600100000f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000006856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010300), 0x0, 0x640}, {&(0x7f0000010400)="03000000040000000500000016000f000300040000000000000000000f00698c", 0x20, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}, {&(0x7f0000011000)}, {0x0, 0x0, 0x6700000}, {&(0x7f0000000580), 0x0, 0xc000}], 0x0, &(0x7f0000013b00)=ANY=[@ANYBLOB='\x00']) r4 = creat(&(0x7f0000000000)='./file1\x00', 0x18) r5 = socket(0x10, 0x3, 0x0) sendmsg$nl_route(r5, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f00000005c0)=@ipv4_newroute={0x38, 0x18, 0x0, 0x0, 0x0, {0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6}, [@RTA_ENCAP_TYPE={0x6, 0x15, 0x3}, @RTA_ENCAP={0x14, 0x16, 0x0, 0x1, @SEG6_IPTUNNEL_SRH={0xd}}]}, 0x38}}, 0x0) r6 = socket(0x26, 0x3, 0x0) sendmsg$nl_route(r6, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f00000005c0)=@ipv4_newroute={0x38, 0x18, 0xbad, 0x0, 0x0, {0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6}, [@RTA_ENCAP_TYPE={0x6, 0x15, 0x3}, @RTA_ENCAP={0x14, 0x16, 0x0, 0x1, @SEG6_IPTUNNEL_SRH={0xd}}]}, 0x38}}, 0x0) r7 = socket(0x10, 0x3, 0x0) sendmsg$nl_route(r7, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f00000005c0)=@ipv4_newroute={0x38, 0x18, 0xbad, 0x0, 0x0, {0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6}, [@RTA_ENCAP_TYPE={0x6, 0x15, 0x3}, @RTA_ENCAP={0x14, 0x16, 0x0, 0x1, @SEG6_IPTUNNEL_SRH={0xd}}]}, 0x38}}, 0x0) execveat(r4, &(0x7f0000000040)='./file0\x00', &(0x7f0000000380)=[&(0x7f00000001c0)='+{!#\x00', &(0x7f0000000300)='ext4\x00', &(0x7f0000000340)='@(\x00'], &(0x7f00000004c0)=[&(0x7f00000003c0)='ext4\x00', &(0x7f0000000400)='ext4\x00', &(0x7f0000000500)='\x00.D\x04\xe0\xce\x99\xd9\xa9\xac\xac\xadH\xa4\xcf\xb7\xffT\xac\x05\xfd\xdd\xb8w\x0f\x82B\xff\xf2\x909`1!\f\x870\x1f\xc1%Y\xc8\x15c \xea\x1cY!\x04\xe4\x91^\x00\x04\xe4\xa6\xba\xc6\xfd\x10\xdf\xe24\xd4&\x17\xdc\xec\xf4\f\n\xb7.\x13\x8e\x1bYENj\xe1\x19~\x1c\xaf\a;d\x9f\xba\xd9T\xd4-\xecX\xc0Y\x83@\xc7\x8b\xff*\xdd\xaa\xc6,o4\xe2\x0f\x16\x01[\xc0\xeb\x7fFI]WF\x1f\f?\xfa\xb1\xe7\xf6t\x027\xb1\xc17.4V\xf81{9\xa3\xb9\x01\xcck@I\xe2\xf1Y\x10E\xa1z/\x05.~Yh%\x8f\x06sB)N\x11P\xf6p\xff\'\xaf\a7\x10+p\xbb\xf3\xb08\xb5)\x00\xeeg\xd0\xee\xe9\x98\x8d\xf8\xb5G\t@f\x1et v\x14\tT\xc5', &(0x7f0000000480)=':--[\x00'], 0x1000) recvfrom(r2, &(0x7f0000000600)=""/203, 0xcb, 0x42, &(0x7f0000000700)=@hci={0x1f, 0xffffffffffffffff, 0x4}, 0x80) 10:15:39 executing program 4: prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f00000002c0)=0x0) sched_setscheduler(r0, 0x2, &(0x7f0000000080)=0x6) r1 = getpid() sched_setscheduler(r1, 0x2, &(0x7f00000000c0)=0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r2, &(0x7f000057eff8)=@abs, 0x6e) sendmmsg$unix(r3, &(0x7f00000bd000), 0x318, 0x0) recvmmsg(r2, &(0x7f00000000c0), 0x10106, 0x2, 0x0) syz_mount_image$ext4(&(0x7f0000000180)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xfffbffff00000000, 0x8, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000600100000f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000006856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010300), 0x0, 0x640}, {&(0x7f0000010400)="03000000040000000500000016000f000300040000000000000000000f00698c", 0x20, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}, {&(0x7f0000011000)}, {0x0, 0x0, 0x6700000}, {&(0x7f0000000580), 0x0, 0xc000}], 0x0, &(0x7f0000013b00)=ANY=[@ANYBLOB='\x00']) r4 = creat(&(0x7f0000000000)='./file1\x00', 0x18) r5 = socket(0x10, 0x3, 0x0) sendmsg$nl_route(r5, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={0x0}}, 0x0) r6 = socket(0x26, 0x3, 0x0) sendmsg$nl_route(r6, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f00000005c0)=@ipv4_newroute={0x38, 0x18, 0xbad, 0x0, 0x0, {0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6}, [@RTA_ENCAP_TYPE={0x6, 0x15, 0x3}, @RTA_ENCAP={0x14, 0x16, 0x0, 0x1, @SEG6_IPTUNNEL_SRH={0xd}}]}, 0x38}}, 0x0) r7 = socket(0x10, 0x3, 0x0) sendmsg$nl_route(r7, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f00000005c0)=@ipv4_newroute={0x38, 0x18, 0xbad, 0x0, 0x0, {0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6}, [@RTA_ENCAP_TYPE={0x6, 0x15, 0x3}, @RTA_ENCAP={0x14, 0x16, 0x0, 0x1, @SEG6_IPTUNNEL_SRH={0xd}}]}, 0x38}}, 0x0) execveat(r4, &(0x7f0000000040)='./file0\x00', &(0x7f0000000380)=[&(0x7f00000001c0)='+{!#\x00', &(0x7f0000000300)='ext4\x00', &(0x7f0000000340)='@(\x00'], &(0x7f00000004c0)=[&(0x7f00000003c0)='ext4\x00', &(0x7f0000000400)='ext4\x00', &(0x7f0000000500)='\x00.D\x04\xe0\xce\x99\xd9\xa9\xac\xac\xadH\xa4\xcf\xb7\xffT\xac\x05\xfd\xdd\xb8w\x0f\x82B\xff\xf2\x909`1!\f\x870\x1f\xc1%Y\xc8\x15c \xea\x1cY!\x04\xe4\x91^\x00\x04\xe4\xa6\xba\xc6\xfd\x10\xdf\xe24\xd4&\x17\xdc\xec\xf4\f\n\xb7.\x13\x8e\x1bYENj\xe1\x19~\x1c\xaf\a;d\x9f\xba\xd9T\xd4-\xecX\xc0Y\x83@\xc7\x8b\xff*\xdd\xaa\xc6,o4\xe2\x0f\x16\x01[\xc0\xeb\x7fFI]WF\x1f\f?\xfa\xb1\xe7\xf6t\x027\xb1\xc17.4V\xf81{9\xa3\xb9\x01\xcck@I\xe2\xf1Y\x10E\xa1z/\x05.~Yh%\x8f\x06sB)N\x11P\xf6p\xff\'\xaf\a7\x10+p\xbb\xf3\xb08\xb5)\x00\xeeg\xd0\xee\xe9\x98\x8d\xf8\xb5G\t@f\x1et v\x14\tT\xc5', &(0x7f0000000480)=':--[\x00'], 0x1000) recvfrom(r2, &(0x7f0000000600)=""/203, 0xcb, 0x42, &(0x7f0000000700)=@hci={0x1f, 0xffffffffffffffff, 0x4}, 0x80) 10:15:39 executing program 3: prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f00000002c0)=0x0) sched_setscheduler(r0, 0x2, &(0x7f0000000080)=0x6) r1 = getpid() sched_setscheduler(r1, 0x2, &(0x7f00000000c0)=0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r2, &(0x7f000057eff8)=@abs, 0x6e) sendmmsg$unix(r3, &(0x7f00000bd000), 0x318, 0x0) recvmmsg(r2, &(0x7f00000000c0), 0x10106, 0x2, 0x0) syz_mount_image$ext4(&(0x7f0000000180)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xfffbffff00000000, 0x8, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000600100000f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000006856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010300), 0x0, 0x640}, {&(0x7f0000010400)="03000000040000000500000016000f000300040000000000000000000f00698c", 0x20, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}, {&(0x7f0000011000)}, {0x0, 0x0, 0x6700000}, {&(0x7f0000000580), 0x0, 0xc000}], 0x0, &(0x7f0000013b00)=ANY=[@ANYBLOB='\x00']) r4 = creat(&(0x7f0000000000)='./file1\x00', 0x18) socket(0x10, 0x3, 0x0) r5 = socket(0x26, 0x3, 0x0) sendmsg$nl_route(r5, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f00000005c0)=@ipv4_newroute={0x38, 0x18, 0xbad, 0x0, 0x0, {0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6}, [@RTA_ENCAP_TYPE={0x6, 0x15, 0x3}, @RTA_ENCAP={0x14, 0x16, 0x0, 0x1, @SEG6_IPTUNNEL_SRH={0xd}}]}, 0x38}}, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f00000005c0)=@ipv4_newroute={0x38, 0x18, 0xbad, 0x0, 0x0, {0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6}, [@RTA_ENCAP_TYPE={0x6, 0x15, 0x3}, @RTA_ENCAP={0x14, 0x16, 0x0, 0x1, @SEG6_IPTUNNEL_SRH={0xd}}]}, 0x38}}, 0x0) execveat(r4, 0x0, &(0x7f0000000380)=[&(0x7f00000001c0)='+{!#\x00', &(0x7f0000000300)='ext4\x00', &(0x7f0000000340)='@(\x00'], &(0x7f00000004c0)=[&(0x7f00000003c0)='ext4\x00', &(0x7f0000000400)='ext4\x00', &(0x7f0000000500)='\x00.D\x04\xe0\xce\x99\xd9\xa9\xac\xac\xadH\xa4\xcf\xb7\xffT\xac\x05\xfd\xdd\xb8w\x0f\x82B\xff\xf2\x909`1!\f\x870\x1f\xc1%Y\xc8\x15c \xea\x1cY!\x04\xe4\x91^\x00\x04\xe4\xa6\xba\xc6\xfd\x10\xdf\xe24\xd4&\x17\xdc\xec\xf4\f\n\xb7.\x13\x8e\x1bYENj\xe1\x19~\x1c\xaf\a;d\x9f\xba\xd9T\xd4-\xecX\xc0Y\x83@\xc7\x8b\xff*\xdd\xaa\xc6,o4\xe2\x0f\x16\x01[\xc0\xeb\x7fFI]WF\x1f\f?\xfa\xb1\xe7\xf6t\x027\xb1\xc17.4V\xf81{9\xa3\xb9\x01\xcck@I\xe2\xf1Y\x10E\xa1z/\x05.~Yh%\x8f\x06sB)N\x11P\xf6p\xff\'\xaf\a7\x10+p\xbb\xf3\xb08\xb5)\x00\xeeg\xd0\xee\xe9\x98\x8d\xf8\xb5G\t@f\x1et v\x14\tT\xc5', 0x0], 0x1000) 10:15:39 executing program 2: prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f00000002c0)=0x0) sched_setscheduler(r0, 0x2, &(0x7f0000000080)=0x6) r1 = getpid() sched_setscheduler(r1, 0x2, &(0x7f00000000c0)=0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r2, &(0x7f000057eff8)=@abs, 0x6e) sendmmsg$unix(r3, &(0x7f00000bd000), 0x318, 0x0) recvmmsg(r2, &(0x7f00000000c0), 0x10106, 0x2, 0x0) syz_mount_image$ext4(&(0x7f0000000180)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xfffbffff00000000, 0x8, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000600100000f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000006856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010300), 0x0, 0x640}, {&(0x7f0000010400)="03000000040000000500000016000f000300040000000000000000000f00698c", 0x20, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}, {&(0x7f0000011000)}, {0x0, 0x0, 0x6700000}, {&(0x7f0000000580), 0x0, 0xc000}], 0x0, &(0x7f0000013b00)=ANY=[@ANYBLOB='\x00']) creat(&(0x7f0000000000)='./file1\x00', 0x18) r4 = socket(0x10, 0x3, 0x0) sendmsg$nl_route(r4, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f00000005c0)=@ipv4_newroute={0x38, 0x18, 0xbad, 0x0, 0x0, {}, [@RTA_ENCAP_TYPE={0x6, 0x15, 0x3}, @RTA_ENCAP={0x14, 0x16, 0x0, 0x1, @SEG6_IPTUNNEL_SRH={0xd}}]}, 0x38}}, 0x0) socket(0x26, 0x3, 0x0) r5 = socket(0x10, 0x0, 0x0) sendmsg$nl_route(r5, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f00000005c0)=@ipv4_newroute={0x38, 0x18, 0xbad, 0x0, 0x0, {0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6}, [@RTA_ENCAP_TYPE={0x6, 0x15, 0x3}, @RTA_ENCAP={0x14, 0x16, 0x0, 0x1, @SEG6_IPTUNNEL_SRH={0xd}}]}, 0x38}}, 0x0) recvfrom(r2, &(0x7f0000000600)=""/203, 0xcb, 0x42, &(0x7f0000000700)=@hci={0x1f, 0xffffffffffffffff, 0x4}, 0x80) 10:15:39 executing program 1: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000005c0)={{0x14}, [@NFT_MSG_NEWTABLE={0x20, 0x0, 0xa, 0x3, 0x0, 0x0, {0x1}, [@NFTA_TABLE_NAME={0x9, 0x1, 'syz0\x00'}]}, @NFT_MSG_NEWSET={0x30, 0x9, 0xa, 0x401, 0x0, 0x0, {0x1}, [@NFTA_SET_ID={0x8}, @NFTA_SET_NAME={0x9, 0x2, 'syz2\x00'}, @NFTA_SET_KEY_LEN={0x8, 0x5, 0x1, 0x0, 0x1f}]}, @NFT_MSG_NEWSETELEM={0x48, 0xc, 0xa, 0x201, 0x0, 0x0, {0x1}, [@NFTA_SET_ELEM_LIST_SET={0x9, 0x2, 'syz2\x00'}, @NFTA_SET_ELEM_LIST_ELEMENTS={0x1c, 0x3, 0x0, 0x1, [{0x18, 0x0, 0x0, 0x1, [@NFTA_SET_ELEM_FLAGS={0x8, 0x3, 0x1, 0x0, 0x4}, @NFTA_SET_ELEM_TIMEOUT={0xc, 0x6}]}]}, @NFTA_SET_ELEM_LIST_TABLE={0x9, 0x1, 'syz0\x00'}]}], {0x14, 0x10}}, 0xc0}}, 0x0) 10:15:39 executing program 1: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000005c0)={{0x14}, [@NFT_MSG_NEWTABLE={0x20, 0x0, 0xa, 0x3, 0x0, 0x0, {0x1}, [@NFTA_TABLE_NAME={0x9, 0x1, 'syz0\x00'}]}, @NFT_MSG_NEWSET={0x30, 0x9, 0xa, 0x401, 0x0, 0x0, {0x1}, [@NFTA_SET_ID={0x8}, @NFTA_SET_TABLE={0x9, 0x1, 'syz0\x00'}, @NFTA_SET_KEY_LEN={0x8, 0x5, 0x1, 0x0, 0x1f}]}, @NFT_MSG_NEWSETELEM={0x48, 0xc, 0xa, 0x201, 0x0, 0x0, {0x1}, [@NFTA_SET_ELEM_LIST_SET={0x9, 0x2, 'syz2\x00'}, @NFTA_SET_ELEM_LIST_ELEMENTS={0x1c, 0x3, 0x0, 0x1, [{0x18, 0x0, 0x0, 0x1, [@NFTA_SET_ELEM_FLAGS={0x8, 0x3, 0x1, 0x0, 0x4}, @NFTA_SET_ELEM_TIMEOUT={0xc, 0x6}]}]}, @NFTA_SET_ELEM_LIST_TABLE={0x9, 0x1, 'syz0\x00'}]}], {0x14, 0x10}}, 0xc0}}, 0x0) 10:15:39 executing program 1: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000005c0)={{0x14}, [@NFT_MSG_NEWTABLE={0x20, 0x0, 0xa, 0x3, 0x0, 0x0, {0x1}, [@NFTA_TABLE_NAME={0x9, 0x1, 'syz0\x00'}]}, @NFT_MSG_NEWSET={0x30, 0x9, 0xa, 0x401, 0x0, 0x0, {0x1}, [@NFTA_SET_ID={0x8}, @NFTA_SET_TABLE={0x9, 0x1, 'syz0\x00'}, @NFTA_SET_KEY_LEN={0x8, 0x5, 0x1, 0x0, 0x1f}]}, @NFT_MSG_NEWSETELEM={0x48, 0xc, 0xa, 0x201, 0x0, 0x0, {0x1}, [@NFTA_SET_ELEM_LIST_SET={0x9, 0x2, 'syz2\x00'}, @NFTA_SET_ELEM_LIST_ELEMENTS={0x1c, 0x3, 0x0, 0x1, [{0x18, 0x0, 0x0, 0x1, [@NFTA_SET_ELEM_FLAGS={0x8, 0x3, 0x1, 0x0, 0x4}, @NFTA_SET_ELEM_TIMEOUT={0xc, 0x6}]}]}, @NFTA_SET_ELEM_LIST_TABLE={0x9, 0x1, 'syz0\x00'}]}], {0x14, 0x10}}, 0xc0}}, 0x0) 10:15:39 executing program 1: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000005c0)={{0x14}, [@NFT_MSG_NEWTABLE={0x20, 0x0, 0xa, 0x3, 0x0, 0x0, {0x1}, [@NFTA_TABLE_NAME={0x9, 0x1, 'syz0\x00'}]}, @NFT_MSG_NEWSET={0x30, 0x9, 0xa, 0x401, 0x0, 0x0, {0x1}, [@NFTA_SET_ID={0x8}, @NFTA_SET_TABLE={0x9, 0x1, 'syz0\x00'}, @NFTA_SET_KEY_LEN={0x8, 0x5, 0x1, 0x0, 0x1f}]}, @NFT_MSG_NEWSETELEM={0x48, 0xc, 0xa, 0x201, 0x0, 0x0, {0x1}, [@NFTA_SET_ELEM_LIST_SET={0x9, 0x2, 'syz2\x00'}, @NFTA_SET_ELEM_LIST_ELEMENTS={0x1c, 0x3, 0x0, 0x1, [{0x18, 0x0, 0x0, 0x1, [@NFTA_SET_ELEM_FLAGS={0x8, 0x3, 0x1, 0x0, 0x4}, @NFTA_SET_ELEM_TIMEOUT={0xc, 0x6}]}]}, @NFTA_SET_ELEM_LIST_TABLE={0x9, 0x1, 'syz0\x00'}]}], {0x14, 0x10}}, 0xc0}}, 0x0) 10:15:39 executing program 1: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000005c0)={{0x14}, [@NFT_MSG_NEWTABLE={0x20, 0x0, 0xa, 0x3, 0x0, 0x0, {0x1}, [@NFTA_TABLE_NAME={0x9, 0x1, 'syz0\x00'}]}, @NFT_MSG_NEWSET={0x34, 0x9, 0xa, 0x401, 0x0, 0x0, {0x1}, [@NFTA_SET_NAME={0x9, 0x2, 'syz2\x00'}, @NFTA_SET_TABLE={0x9, 0x1, 'syz0\x00'}, @NFTA_SET_KEY_LEN={0x8, 0x5, 0x1, 0x0, 0x1f}]}, @NFT_MSG_NEWSETELEM={0x48, 0xc, 0xa, 0x201, 0x0, 0x0, {0x1}, [@NFTA_SET_ELEM_LIST_SET={0x9, 0x2, 'syz2\x00'}, @NFTA_SET_ELEM_LIST_ELEMENTS={0x1c, 0x3, 0x0, 0x1, [{0x18, 0x0, 0x0, 0x1, [@NFTA_SET_ELEM_FLAGS={0x8, 0x3, 0x1, 0x0, 0x4}, @NFTA_SET_ELEM_TIMEOUT={0xc, 0x6}]}]}, @NFTA_SET_ELEM_LIST_TABLE={0x9, 0x1, 'syz0\x00'}]}], {0x14, 0x10}}, 0xc4}}, 0x0) [ 2239.119293][T25619] loop3: detected capacity change from 0 to 264192 [ 2239.169760][T25621] loop2: detected capacity change from 0 to 264192 [ 2239.439371][T25622] loop4: detected capacity change from 0 to 264192 10:15:41 executing program 1: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000005c0)={{0x14}, [@NFT_MSG_NEWTABLE={0x20, 0x0, 0xa, 0x3, 0x0, 0x0, {0x1}, [@NFTA_TABLE_NAME={0x9, 0x1, 'syz0\x00'}]}, @NFT_MSG_NEWSET={0x34, 0x9, 0xa, 0x401, 0x0, 0x0, {0x1}, [@NFTA_SET_NAME={0x9, 0x2, 'syz2\x00'}, @NFTA_SET_TABLE={0x9, 0x1, 'syz0\x00'}, @NFTA_SET_KEY_LEN={0x8, 0x5, 0x1, 0x0, 0x1f}]}, @NFT_MSG_NEWSETELEM={0x48, 0xc, 0xa, 0x201, 0x0, 0x0, {0x1}, [@NFTA_SET_ELEM_LIST_SET={0x9, 0x2, 'syz2\x00'}, @NFTA_SET_ELEM_LIST_ELEMENTS={0x1c, 0x3, 0x0, 0x1, [{0x18, 0x0, 0x0, 0x1, [@NFTA_SET_ELEM_FLAGS={0x8, 0x3, 0x1, 0x0, 0x4}, @NFTA_SET_ELEM_TIMEOUT={0xc, 0x6}]}]}, @NFTA_SET_ELEM_LIST_TABLE={0x9, 0x1, 'syz0\x00'}]}], {0x14, 0x10}}, 0xc4}}, 0x0) [ 2241.765494][T25619] EXT4-fs: error -4 creating inode table initialization thread [ 2241.773236][T25619] EXT4-fs (loop3): mount failed [ 2241.784047][T25622] EXT4-fs (loop4): mounted filesystem without journal. Quota mode: writeback. [ 2241.794110][T25621] EXT4-fs (loop2): mounted filesystem without journal. Quota mode: writeback. 10:15:49 executing program 5: prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f00000002c0)=0x0) sched_setscheduler(r0, 0x2, &(0x7f0000000080)=0x6) r1 = getpid() sched_setscheduler(r1, 0x2, &(0x7f00000000c0)=0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r2, &(0x7f000057eff8)=@abs, 0x6e) sendmmsg$unix(r3, &(0x7f00000bd000), 0x318, 0x0) recvmmsg(r2, &(0x7f00000000c0), 0x10106, 0x2, 0x0) syz_mount_image$ext4(&(0x7f0000000180)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xfffbffff00000000, 0x8, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000600100000f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000006856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010300), 0x0, 0x640}, {&(0x7f0000010400)="03000000040000000500000016000f000300040000000000000000000f00698c", 0x20, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}, {&(0x7f0000011000)}, {0x0, 0x0, 0x6700000}, {&(0x7f0000000580), 0x0, 0xc000}], 0x0, &(0x7f0000013b00)=ANY=[@ANYBLOB='\x00']) r4 = creat(&(0x7f0000000000)='./file1\x00', 0x18) r5 = socket(0x10, 0x3, 0x0) sendmsg$nl_route(r5, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f00000005c0)=@ipv4_newroute={0x38, 0x18, 0xbad, 0x0, 0x0, {}, [@RTA_ENCAP_TYPE={0x6, 0x15, 0x3}, @RTA_ENCAP={0x14, 0x16, 0x0, 0x1, @SEG6_IPTUNNEL_SRH={0xd}}]}, 0x38}}, 0x0) socket(0x26, 0x3, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f00000005c0)=@ipv4_newroute={0x38, 0x18, 0xbad, 0x0, 0x0, {0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6}, [@RTA_ENCAP_TYPE={0x6, 0x15, 0x3}, @RTA_ENCAP={0x14, 0x16, 0x0, 0x1, @SEG6_IPTUNNEL_SRH={0xd}}]}, 0x38}}, 0x0) r6 = socket(0x10, 0x3, 0x0) sendmsg$nl_route(r6, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f00000005c0)=@ipv4_newroute={0x38, 0x18, 0xbad, 0x0, 0x0, {0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6}, [@RTA_ENCAP_TYPE={0x6, 0x15, 0x3}, @RTA_ENCAP={0x14, 0x16, 0x0, 0x1, @SEG6_IPTUNNEL_SRH={0xd}}]}, 0x38}}, 0x0) execveat(r4, &(0x7f0000000040)='./file0\x00', &(0x7f0000000380)=[&(0x7f00000001c0)='+{!#\x00', &(0x7f0000000300)='ext4\x00', &(0x7f0000000340)='@(\x00'], &(0x7f00000004c0)=[&(0x7f00000003c0)='ext4\x00', &(0x7f0000000400)='ext4\x00', &(0x7f0000000500)='\x00.D\x04\xe0\xce\x99\xd9\xa9\xac\xac\xadH\xa4\xcf\xb7\xffT\xac\x05\xfd\xdd\xb8w\x0f\x82B\xff\xf2\x909`1!\f\x870\x1f\xc1%Y\xc8\x15c \xea\x1cY!\x04\xe4\x91^\x00\x04\xe4\xa6\xba\xc6\xfd\x10\xdf\xe24\xd4&\x17\xdc\xec\xf4\f\n\xb7.\x13\x8e\x1bYENj\xe1\x19~\x1c\xaf\a;d\x9f\xba\xd9T\xd4-\xecX\xc0Y\x83@\xc7\x8b\xff*\xdd\xaa\xc6,o4\xe2\x0f\x16\x01[\xc0\xeb\x7fFI]WF\x1f\f?\xfa\xb1\xe7\xf6t\x027\xb1\xc17.4V\xf81{9\xa3\xb9\x01\xcck@I\xe2\xf1Y\x10E\xa1z/\x05.~Yh%\x8f\x06sB)N\x11P\xf6p\xff\'\xaf\a7\x10+p\xbb\xf3\xb08\xb5)\x00\xeeg\xd0\xee\xe9\x98\x8d\xf8\xb5G\t@f\x1et v\x14\tT\xc5', &(0x7f0000000480)=':--[\x00'], 0x1000) recvfrom(r2, &(0x7f0000000600)=""/203, 0xcb, 0x42, &(0x7f0000000700)=@hci={0x1f, 0xffffffffffffffff, 0x4}, 0x80) 10:15:49 executing program 1: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000005c0)={{0x14}, [@NFT_MSG_NEWTABLE={0x20, 0x0, 0xa, 0x3, 0x0, 0x0, {0x1}, [@NFTA_TABLE_NAME={0x9, 0x1, 'syz0\x00'}]}, @NFT_MSG_NEWSET={0x34, 0x9, 0xa, 0x401, 0x0, 0x0, {0x1}, [@NFTA_SET_NAME={0x9, 0x2, 'syz2\x00'}, @NFTA_SET_TABLE={0x9, 0x1, 'syz0\x00'}, @NFTA_SET_KEY_LEN={0x8, 0x5, 0x1, 0x0, 0x1f}]}, @NFT_MSG_NEWSETELEM={0x48, 0xc, 0xa, 0x201, 0x0, 0x0, {0x1}, [@NFTA_SET_ELEM_LIST_SET={0x9, 0x2, 'syz2\x00'}, @NFTA_SET_ELEM_LIST_ELEMENTS={0x1c, 0x3, 0x0, 0x1, [{0x18, 0x0, 0x0, 0x1, [@NFTA_SET_ELEM_FLAGS={0x8, 0x3, 0x1, 0x0, 0x4}, @NFTA_SET_ELEM_TIMEOUT={0xc, 0x6}]}]}, @NFTA_SET_ELEM_LIST_TABLE={0x9, 0x1, 'syz0\x00'}]}], {0x14, 0x10}}, 0xc4}}, 0x0) 10:15:49 executing program 2: prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f00000002c0)=0x0) sched_setscheduler(r0, 0x2, &(0x7f0000000080)=0x6) r1 = getpid() sched_setscheduler(r1, 0x2, &(0x7f00000000c0)=0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r2, &(0x7f000057eff8)=@abs, 0x6e) sendmmsg$unix(r3, &(0x7f00000bd000), 0x318, 0x0) recvmmsg(r2, &(0x7f00000000c0), 0x10106, 0x2, 0x0) syz_mount_image$ext4(&(0x7f0000000180)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xfffbffff00000000, 0x8, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000600100000f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000006856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010300), 0x0, 0x640}, {&(0x7f0000010400)="03000000040000000500000016000f000300040000000000000000000f00698c", 0x20, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}, {&(0x7f0000011000)}, {0x0, 0x0, 0x6700000}, {&(0x7f0000000580), 0x0, 0xc000}], 0x0, &(0x7f0000013b00)=ANY=[@ANYBLOB='\x00']) creat(&(0x7f0000000000)='./file1\x00', 0x18) r4 = socket(0x10, 0x3, 0x0) sendmsg$nl_route(r4, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f00000005c0)=@ipv4_newroute={0x38, 0x18, 0xbad, 0x0, 0x0, {}, [@RTA_ENCAP_TYPE={0x6, 0x15, 0x3}, @RTA_ENCAP={0x14, 0x16, 0x0, 0x1, @SEG6_IPTUNNEL_SRH={0xd}}]}, 0x38}}, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f00000005c0)=@ipv4_newroute={0x38, 0x18, 0xbad, 0x0, 0x0, {0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6}, [@RTA_ENCAP_TYPE={0x6, 0x15, 0x3}, @RTA_ENCAP={0x14, 0x16, 0x0, 0x1, @SEG6_IPTUNNEL_SRH={0xd}}]}, 0x38}}, 0x0) r5 = socket(0x10, 0x0, 0x0) sendmsg$nl_route(r5, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f00000005c0)=@ipv4_newroute={0x38, 0x18, 0xbad, 0x0, 0x0, {0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6}, [@RTA_ENCAP_TYPE={0x6, 0x15, 0x3}, @RTA_ENCAP={0x14, 0x16, 0x0, 0x1, @SEG6_IPTUNNEL_SRH={0xd}}]}, 0x38}}, 0x0) recvfrom(r2, &(0x7f0000000600)=""/203, 0xcb, 0x42, &(0x7f0000000700)=@hci={0x1f, 0xffffffffffffffff, 0x4}, 0x80) 10:15:49 executing program 3: prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f00000002c0)=0x0) sched_setscheduler(r0, 0x2, &(0x7f0000000080)=0x6) r1 = getpid() sched_setscheduler(r1, 0x2, &(0x7f00000000c0)=0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r2, &(0x7f000057eff8)=@abs, 0x6e) sendmmsg$unix(r3, &(0x7f00000bd000), 0x318, 0x0) recvmmsg(r2, &(0x7f00000000c0), 0x10106, 0x2, 0x0) syz_mount_image$ext4(&(0x7f0000000180)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xfffbffff00000000, 0x8, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000600100000f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000006856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010300), 0x0, 0x640}, {&(0x7f0000010400)="03000000040000000500000016000f000300040000000000000000000f00698c", 0x20, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}, {&(0x7f0000011000)}, {0x0, 0x0, 0x6700000}, {&(0x7f0000000580), 0x0, 0xc000}], 0x0, &(0x7f0000013b00)=ANY=[@ANYBLOB='\x00']) r4 = creat(&(0x7f0000000000)='./file1\x00', 0x18) socket(0x10, 0x3, 0x0) r5 = socket(0x26, 0x3, 0x0) sendmsg$nl_route(r5, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f00000005c0)=@ipv4_newroute={0x38, 0x18, 0xbad, 0x0, 0x0, {0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6}, [@RTA_ENCAP_TYPE={0x6, 0x15, 0x3}, @RTA_ENCAP={0x14, 0x16, 0x0, 0x1, @SEG6_IPTUNNEL_SRH={0xd}}]}, 0x38}}, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f00000005c0)=@ipv4_newroute={0x38, 0x18, 0xbad, 0x0, 0x0, {0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6}, [@RTA_ENCAP_TYPE={0x6, 0x15, 0x3}, @RTA_ENCAP={0x14, 0x16, 0x0, 0x1, @SEG6_IPTUNNEL_SRH={0xd}}]}, 0x38}}, 0x0) execveat(r4, 0x0, &(0x7f0000000380)=[&(0x7f00000001c0)='+{!#\x00', &(0x7f0000000300)='ext4\x00', &(0x7f0000000340)='@(\x00'], &(0x7f00000004c0)=[&(0x7f00000003c0)='ext4\x00', &(0x7f0000000400)='ext4\x00', &(0x7f0000000500)='\x00.D\x04\xe0\xce\x99\xd9\xa9\xac\xac\xadH\xa4\xcf\xb7\xffT\xac\x05\xfd\xdd\xb8w\x0f\x82B\xff\xf2\x909`1!\f\x870\x1f\xc1%Y\xc8\x15c \xea\x1cY!\x04\xe4\x91^\x00\x04\xe4\xa6\xba\xc6\xfd\x10\xdf\xe24\xd4&\x17\xdc\xec\xf4\f\n\xb7.\x13\x8e\x1bYENj\xe1\x19~\x1c\xaf\a;d\x9f\xba\xd9T\xd4-\xecX\xc0Y\x83@\xc7\x8b\xff*\xdd\xaa\xc6,o4\xe2\x0f\x16\x01[\xc0\xeb\x7fFI]WF\x1f\f?\xfa\xb1\xe7\xf6t\x027\xb1\xc17.4V\xf81{9\xa3\xb9\x01\xcck@I\xe2\xf1Y\x10E\xa1z/\x05.~Yh%\x8f\x06sB)N\x11P\xf6p\xff\'\xaf\a7\x10+p\xbb\xf3\xb08\xb5)\x00\xeeg\xd0\xee\xe9\x98\x8d\xf8\xb5G\t@f\x1et v\x14\tT\xc5', 0x0], 0x1000) 10:15:49 executing program 4: prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f00000002c0)=0x0) sched_setscheduler(r0, 0x2, &(0x7f0000000080)=0x6) r1 = getpid() sched_setscheduler(r1, 0x2, &(0x7f00000000c0)=0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r2, &(0x7f000057eff8)=@abs, 0x6e) sendmmsg$unix(r3, &(0x7f00000bd000), 0x318, 0x0) recvmmsg(r2, &(0x7f00000000c0), 0x10106, 0x2, 0x0) syz_mount_image$ext4(&(0x7f0000000180)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xfffbffff00000000, 0x8, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000600100000f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000006856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010300), 0x0, 0x640}, {&(0x7f0000010400)="03000000040000000500000016000f000300040000000000000000000f00698c", 0x20, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}, {&(0x7f0000011000)}, {0x0, 0x0, 0x6700000}, {&(0x7f0000000580), 0x0, 0xc000}], 0x0, &(0x7f0000013b00)=ANY=[@ANYBLOB='\x00']) r4 = creat(&(0x7f0000000000)='./file1\x00', 0x18) r5 = socket(0x10, 0x3, 0x0) sendmsg$nl_route(r5, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={0x0}}, 0x0) r6 = socket(0x26, 0x3, 0x0) sendmsg$nl_route(r6, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f00000005c0)=@ipv4_newroute={0x38, 0x18, 0xbad, 0x0, 0x0, {0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6}, [@RTA_ENCAP_TYPE={0x6, 0x15, 0x3}, @RTA_ENCAP={0x14, 0x16, 0x0, 0x1, @SEG6_IPTUNNEL_SRH={0xd}}]}, 0x38}}, 0x0) r7 = socket(0x10, 0x3, 0x0) sendmsg$nl_route(r7, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f00000005c0)=@ipv4_newroute={0x38, 0x18, 0xbad, 0x0, 0x0, {0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6}, [@RTA_ENCAP_TYPE={0x6, 0x15, 0x3}, @RTA_ENCAP={0x14, 0x16, 0x0, 0x1, @SEG6_IPTUNNEL_SRH={0xd}}]}, 0x38}}, 0x0) execveat(r4, &(0x7f0000000040)='./file0\x00', &(0x7f0000000380)=[&(0x7f00000001c0)='+{!#\x00', &(0x7f0000000300)='ext4\x00', &(0x7f0000000340)='@(\x00'], &(0x7f00000004c0)=[&(0x7f00000003c0)='ext4\x00', &(0x7f0000000400)='ext4\x00', &(0x7f0000000500)='\x00.D\x04\xe0\xce\x99\xd9\xa9\xac\xac\xadH\xa4\xcf\xb7\xffT\xac\x05\xfd\xdd\xb8w\x0f\x82B\xff\xf2\x909`1!\f\x870\x1f\xc1%Y\xc8\x15c \xea\x1cY!\x04\xe4\x91^\x00\x04\xe4\xa6\xba\xc6\xfd\x10\xdf\xe24\xd4&\x17\xdc\xec\xf4\f\n\xb7.\x13\x8e\x1bYENj\xe1\x19~\x1c\xaf\a;d\x9f\xba\xd9T\xd4-\xecX\xc0Y\x83@\xc7\x8b\xff*\xdd\xaa\xc6,o4\xe2\x0f\x16\x01[\xc0\xeb\x7fFI]WF\x1f\f?\xfa\xb1\xe7\xf6t\x027\xb1\xc17.4V\xf81{9\xa3\xb9\x01\xcck@I\xe2\xf1Y\x10E\xa1z/\x05.~Yh%\x8f\x06sB)N\x11P\xf6p\xff\'\xaf\a7\x10+p\xbb\xf3\xb08\xb5)\x00\xeeg\xd0\xee\xe9\x98\x8d\xf8\xb5G\t@f\x1et v\x14\tT\xc5', &(0x7f0000000480)=':--[\x00'], 0x1000) recvfrom(r2, &(0x7f0000000600)=""/203, 0xcb, 0x42, &(0x7f0000000700)=@hci={0x1f, 0xffffffffffffffff, 0x4}, 0x80) 10:15:49 executing program 0: prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f00000002c0)=0x0) sched_setscheduler(r0, 0x2, &(0x7f0000000080)=0x6) r1 = getpid() sched_setscheduler(r1, 0x2, &(0x7f00000000c0)=0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r2, &(0x7f000057eff8)=@abs, 0x6e) sendmmsg$unix(r3, &(0x7f00000bd000), 0x318, 0x0) recvmmsg(r2, &(0x7f00000000c0), 0x10106, 0x2, 0x0) syz_mount_image$ext4(&(0x7f0000000180)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xfffbffff00000000, 0x8, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000600100000f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000006856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010300), 0x0, 0x640}, {&(0x7f0000010400)="03000000040000000500000016000f000300040000000000000000000f00698c", 0x20, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}, {&(0x7f0000011000)}, {0x0, 0x0, 0x6700000}, {&(0x7f0000000580), 0x0, 0xc000}], 0x0, &(0x7f0000013b00)=ANY=[@ANYBLOB='\x00']) r4 = creat(&(0x7f0000000000)='./file1\x00', 0x18) r5 = socket(0x10, 0x3, 0x0) sendmsg$nl_route(r5, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f00000005c0)=@ipv4_newroute={0x38, 0x18, 0x0, 0x0, 0x0, {0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6}, [@RTA_ENCAP_TYPE={0x6, 0x15, 0x3}, @RTA_ENCAP={0x14, 0x16, 0x0, 0x1, @SEG6_IPTUNNEL_SRH={0xd}}]}, 0x38}}, 0x0) r6 = socket(0x26, 0x3, 0x0) sendmsg$nl_route(r6, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f00000005c0)=@ipv4_newroute={0x38, 0x18, 0xbad, 0x0, 0x0, {0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6}, [@RTA_ENCAP_TYPE={0x6, 0x15, 0x3}, @RTA_ENCAP={0x14, 0x16, 0x0, 0x1, @SEG6_IPTUNNEL_SRH={0xd}}]}, 0x38}}, 0x0) r7 = socket(0x10, 0x3, 0x0) sendmsg$nl_route(r7, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f00000005c0)=@ipv4_newroute={0x38, 0x18, 0xbad, 0x0, 0x0, {0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6}, [@RTA_ENCAP_TYPE={0x6, 0x15, 0x3}, @RTA_ENCAP={0x14, 0x16, 0x0, 0x1, @SEG6_IPTUNNEL_SRH={0xd}}]}, 0x38}}, 0x0) execveat(r4, &(0x7f0000000040)='./file0\x00', &(0x7f0000000380)=[&(0x7f00000001c0)='+{!#\x00', &(0x7f0000000300)='ext4\x00', &(0x7f0000000340)='@(\x00'], &(0x7f00000004c0)=[&(0x7f00000003c0)='ext4\x00', &(0x7f0000000400)='ext4\x00', &(0x7f0000000500)='\x00.D\x04\xe0\xce\x99\xd9\xa9\xac\xac\xadH\xa4\xcf\xb7\xffT\xac\x05\xfd\xdd\xb8w\x0f\x82B\xff\xf2\x909`1!\f\x870\x1f\xc1%Y\xc8\x15c \xea\x1cY!\x04\xe4\x91^\x00\x04\xe4\xa6\xba\xc6\xfd\x10\xdf\xe24\xd4&\x17\xdc\xec\xf4\f\n\xb7.\x13\x8e\x1bYENj\xe1\x19~\x1c\xaf\a;d\x9f\xba\xd9T\xd4-\xecX\xc0Y\x83@\xc7\x8b\xff*\xdd\xaa\xc6,o4\xe2\x0f\x16\x01[\xc0\xeb\x7fFI]WF\x1f\f?\xfa\xb1\xe7\xf6t\x027\xb1\xc17.4V\xf81{9\xa3\xb9\x01\xcck@I\xe2\xf1Y\x10E\xa1z/\x05.~Yh%\x8f\x06sB)N\x11P\xf6p\xff\'\xaf\a7\x10+p\xbb\xf3\xb08\xb5)\x00\xeeg\xd0\xee\xe9\x98\x8d\xf8\xb5G\t@f\x1et v\x14\tT\xc5', &(0x7f0000000480)=':--[\x00'], 0x1000) recvfrom(r2, &(0x7f0000000600)=""/203, 0xcb, 0x42, &(0x7f0000000700)=@hci={0x1f, 0xffffffffffffffff, 0x4}, 0x80) 10:15:49 executing program 1: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000005c0)={{0x14}, [@NFT_MSG_NEWSET={0x3c, 0x9, 0xa, 0x401, 0x0, 0x0, {0x1}, [@NFTA_SET_ID={0x8}, @NFTA_SET_NAME={0x9, 0x2, 'syz2\x00'}, @NFTA_SET_TABLE={0x9, 0x1, 'syz0\x00'}, @NFTA_SET_KEY_LEN={0x8, 0x5, 0x1, 0x0, 0x1f}]}, @NFT_MSG_NEWSETELEM={0x48, 0xc, 0xa, 0x201, 0x0, 0x0, {0x1}, [@NFTA_SET_ELEM_LIST_SET={0x9, 0x2, 'syz2\x00'}, @NFTA_SET_ELEM_LIST_ELEMENTS={0x1c, 0x3, 0x0, 0x1, [{0x18, 0x0, 0x0, 0x1, [@NFTA_SET_ELEM_FLAGS={0x8, 0x3, 0x1, 0x0, 0x4}, @NFTA_SET_ELEM_TIMEOUT={0xc, 0x6}]}]}, @NFTA_SET_ELEM_LIST_TABLE={0x9, 0x1, 'syz0\x00'}]}], {0x14, 0x10}}, 0xac}}, 0x0) 10:15:49 executing program 1: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000005c0)={{0x14}, [@NFT_MSG_NEWSET={0x3c, 0x9, 0xa, 0x401, 0x0, 0x0, {0x1}, [@NFTA_SET_ID={0x8}, @NFTA_SET_NAME={0x9, 0x2, 'syz2\x00'}, @NFTA_SET_TABLE={0x9, 0x1, 'syz0\x00'}, @NFTA_SET_KEY_LEN={0x8, 0x5, 0x1, 0x0, 0x1f}]}, @NFT_MSG_NEWSETELEM={0x48, 0xc, 0xa, 0x201, 0x0, 0x0, {0x1}, [@NFTA_SET_ELEM_LIST_SET={0x9, 0x2, 'syz2\x00'}, @NFTA_SET_ELEM_LIST_ELEMENTS={0x1c, 0x3, 0x0, 0x1, [{0x18, 0x0, 0x0, 0x1, [@NFTA_SET_ELEM_FLAGS={0x8, 0x3, 0x1, 0x0, 0x4}, @NFTA_SET_ELEM_TIMEOUT={0xc, 0x6}]}]}, @NFTA_SET_ELEM_LIST_TABLE={0x9, 0x1, 'syz0\x00'}]}], {0x14, 0x10}}, 0xac}}, 0x0) 10:15:49 executing program 1: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000005c0)={{0x14}, [@NFT_MSG_NEWSET={0x3c, 0x9, 0xa, 0x401, 0x0, 0x0, {0x1}, [@NFTA_SET_ID={0x8}, @NFTA_SET_NAME={0x9, 0x2, 'syz2\x00'}, @NFTA_SET_TABLE={0x9, 0x1, 'syz0\x00'}, @NFTA_SET_KEY_LEN={0x8, 0x5, 0x1, 0x0, 0x1f}]}, @NFT_MSG_NEWSETELEM={0x48, 0xc, 0xa, 0x201, 0x0, 0x0, {0x1}, [@NFTA_SET_ELEM_LIST_SET={0x9, 0x2, 'syz2\x00'}, @NFTA_SET_ELEM_LIST_ELEMENTS={0x1c, 0x3, 0x0, 0x1, [{0x18, 0x0, 0x0, 0x1, [@NFTA_SET_ELEM_FLAGS={0x8, 0x3, 0x1, 0x0, 0x4}, @NFTA_SET_ELEM_TIMEOUT={0xc, 0x6}]}]}, @NFTA_SET_ELEM_LIST_TABLE={0x9, 0x1, 'syz0\x00'}]}], {0x14, 0x10}}, 0xac}}, 0x0) 10:15:49 executing program 1: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000005c0)={{0x14}, [@NFT_MSG_NEWTABLE={0x20, 0x0, 0xa, 0x0, 0x0, 0x0, {0x1}, [@NFTA_TABLE_NAME={0x9, 0x1, 'syz0\x00'}]}, @NFT_MSG_NEWSET={0x3c, 0x9, 0xa, 0x401, 0x0, 0x0, {0x1}, [@NFTA_SET_ID={0x8}, @NFTA_SET_NAME={0x9, 0x2, 'syz2\x00'}, @NFTA_SET_TABLE={0x9, 0x1, 'syz0\x00'}, @NFTA_SET_KEY_LEN={0x8, 0x5, 0x1, 0x0, 0x1f}]}, @NFT_MSG_NEWSETELEM={0x48, 0xc, 0xa, 0x201, 0x0, 0x0, {0x1}, [@NFTA_SET_ELEM_LIST_SET={0x9, 0x2, 'syz2\x00'}, @NFTA_SET_ELEM_LIST_ELEMENTS={0x1c, 0x3, 0x0, 0x1, [{0x18, 0x0, 0x0, 0x1, [@NFTA_SET_ELEM_FLAGS={0x8, 0x3, 0x1, 0x0, 0x4}, @NFTA_SET_ELEM_TIMEOUT={0x4, 0x6}]}]}, @NFTA_SET_ELEM_LIST_TABLE={0x9, 0x1, 'syz0\x00'}]}], {0x14, 0x10}}, 0xcc}}, 0x0) 10:15:49 executing program 1: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000005c0)={{0x14}, [@NFT_MSG_NEWTABLE={0x20, 0x0, 0xa, 0x0, 0x0, 0x0, {0x1}, [@NFTA_TABLE_NAME={0x9, 0x1, 'syz0\x00'}]}, @NFT_MSG_NEWSET={0x3c, 0x9, 0xa, 0x401, 0x0, 0x0, {0x1}, [@NFTA_SET_ID={0x8}, @NFTA_SET_NAME={0x9, 0x2, 'syz2\x00'}, @NFTA_SET_TABLE={0x9, 0x1, 'syz0\x00'}, @NFTA_SET_KEY_LEN={0x8, 0x5, 0x1, 0x0, 0x1f}]}, @NFT_MSG_NEWSETELEM={0x48, 0xc, 0xa, 0x201, 0x0, 0x0, {0x1}, [@NFTA_SET_ELEM_LIST_SET={0x9, 0x2, 'syz2\x00'}, @NFTA_SET_ELEM_LIST_ELEMENTS={0x1c, 0x3, 0x0, 0x1, [{0x18, 0x0, 0x0, 0x1, [@NFTA_SET_ELEM_FLAGS={0x8, 0x3, 0x1, 0x0, 0x4}, @NFTA_SET_ELEM_TIMEOUT={0x4, 0x6}]}]}, @NFTA_SET_ELEM_LIST_TABLE={0x9, 0x1, 'syz0\x00'}]}], {0x14, 0x10}}, 0xcc}}, 0x0) [ 2249.350576][T25676] loop2: detected capacity change from 0 to 264192 [ 2249.503316][T25677] loop4: detected capacity change from 0 to 264192 [ 2249.609479][T25679] loop3: detected capacity change from 0 to 264192 10:15:49 executing program 1: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000005c0)={{0x14}, [@NFT_MSG_NEWTABLE={0x20, 0x0, 0xa, 0x0, 0x0, 0x0, {0x1}, [@NFTA_TABLE_NAME={0x9, 0x1, 'syz0\x00'}]}, @NFT_MSG_NEWSET={0x3c, 0x9, 0xa, 0x401, 0x0, 0x0, {0x1}, [@NFTA_SET_ID={0x8}, @NFTA_SET_NAME={0x9, 0x2, 'syz2\x00'}, @NFTA_SET_TABLE={0x9, 0x1, 'syz0\x00'}, @NFTA_SET_KEY_LEN={0x8, 0x5, 0x1, 0x0, 0x1f}]}, @NFT_MSG_NEWSETELEM={0x48, 0xc, 0xa, 0x201, 0x0, 0x0, {0x1}, [@NFTA_SET_ELEM_LIST_SET={0x9, 0x2, 'syz2\x00'}, @NFTA_SET_ELEM_LIST_ELEMENTS={0x1c, 0x3, 0x0, 0x1, [{0x18, 0x0, 0x0, 0x1, [@NFTA_SET_ELEM_FLAGS={0x8, 0x3, 0x1, 0x0, 0x4}, @NFTA_SET_ELEM_TIMEOUT={0x4, 0x6}]}]}, @NFTA_SET_ELEM_LIST_TABLE={0x9, 0x1, 'syz0\x00'}]}], {0x14, 0x10}}, 0xcc}}, 0x0) [ 2250.436684][T25676] EXT4-fs: failed to create workqueue [ 2250.442094][T25676] EXT4-fs (loop2): mount failed [ 2250.485462][T25677] EXT4-fs (loop4): mounted filesystem without journal. Quota mode: writeback. [ 2250.495243][T25679] EXT4-fs (loop3): mounted filesystem without journal. Quota mode: writeback. 10:15:58 executing program 5: prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f00000002c0)=0x0) sched_setscheduler(r0, 0x2, &(0x7f0000000080)=0x6) r1 = getpid() sched_setscheduler(r1, 0x2, &(0x7f00000000c0)=0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r2, &(0x7f000057eff8)=@abs, 0x6e) sendmmsg$unix(r3, &(0x7f00000bd000), 0x318, 0x0) recvmmsg(r2, &(0x7f00000000c0), 0x10106, 0x2, 0x0) syz_mount_image$ext4(&(0x7f0000000180)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xfffbffff00000000, 0x8, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000600100000f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000006856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010300), 0x0, 0x640}, {&(0x7f0000010400)="03000000040000000500000016000f000300040000000000000000000f00698c", 0x20, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}, {&(0x7f0000011000)}, {0x0, 0x0, 0x6700000}, {&(0x7f0000000580), 0x0, 0xc000}], 0x0, &(0x7f0000013b00)=ANY=[@ANYBLOB='\x00']) r4 = creat(0x0, 0x18) r5 = socket(0x10, 0x3, 0x0) sendmsg$nl_route(r5, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f00000005c0)=@ipv4_newroute={0x38, 0x18, 0xbad, 0x0, 0x0, {0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6}, [@RTA_ENCAP_TYPE={0x6, 0x15, 0x3}, @RTA_ENCAP={0x14, 0x16, 0x0, 0x1, @SEG6_IPTUNNEL_SRH={0xd}}]}, 0x38}}, 0x0) r6 = socket(0x26, 0x3, 0x0) sendmsg$nl_route(r6, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f00000005c0)=@ipv4_newroute={0x38, 0x18, 0xbad, 0x0, 0x0, {0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6}, [@RTA_ENCAP_TYPE={0x6, 0x15, 0x3}, @RTA_ENCAP={0x14, 0x16, 0x0, 0x1, @SEG6_IPTUNNEL_SRH={0xd}}]}, 0x38}}, 0x0) r7 = socket(0x10, 0x3, 0x0) sendmsg$nl_route(r7, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f00000005c0)=@ipv4_newroute={0x38, 0x18, 0xbad, 0x0, 0x0, {0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6}, [@RTA_ENCAP_TYPE={0x6, 0x15, 0x3}, @RTA_ENCAP={0x14, 0x16, 0x0, 0x1, @SEG6_IPTUNNEL_SRH={0xd}}]}, 0x38}}, 0x0) execveat(r4, &(0x7f0000000040)='./file0\x00', &(0x7f0000000380)=[&(0x7f00000001c0)='+{!#\x00', &(0x7f0000000300)='ext4\x00', &(0x7f0000000340)='@(\x00'], &(0x7f00000004c0)=[&(0x7f00000003c0)='ext4\x00', &(0x7f0000000400)='ext4\x00', &(0x7f0000000500)='\x00.D\x04\xe0\xce\x99\xd9\xa9\xac\xac\xadH\xa4\xcf\xb7\xffT\xac\x05\xfd\xdd\xb8w\x0f\x82B\xff\xf2\x909`1!\f\x870\x1f\xc1%Y\xc8\x15c \xea\x1cY!\x04\xe4\x91^\x00\x04\xe4\xa6\xba\xc6\xfd\x10\xdf\xe24\xd4&\x17\xdc\xec\xf4\f\n\xb7.\x13\x8e\x1bYENj\xe1\x19~\x1c\xaf\a;d\x9f\xba\xd9T\xd4-\xecX\xc0Y\x83@\xc7\x8b\xff*\xdd\xaa\xc6,o4\xe2\x0f\x16\x01[\xc0\xeb\x7fFI]WF\x1f\f?\xfa\xb1\xe7\xf6t\x027\xb1\xc17.4V\xf81{9\xa3\xb9\x01\xcck@I\xe2\xf1Y\x10E\xa1z/\x05.~Yh%\x8f\x06sB)N\x11P\xf6p\xff\'\xaf\a7\x10+p\xbb\xf3\xb08\xb5)\x00\xeeg\xd0\xee\xe9\x98\x8d\xf8\xb5G\t@f\x1et v\x14\tT\xc5', &(0x7f0000000480)=':--[\x00'], 0x1000) recvfrom(r2, &(0x7f0000000600)=""/203, 0xcb, 0x42, &(0x7f0000000700)=@hci={0x1f, 0xffffffffffffffff, 0x4}, 0x80) 10:15:58 executing program 2: prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f00000002c0)=0x0) sched_setscheduler(r0, 0x2, &(0x7f0000000080)=0x6) r1 = getpid() sched_setscheduler(r1, 0x2, &(0x7f00000000c0)=0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r2, &(0x7f000057eff8)=@abs, 0x6e) sendmmsg$unix(r3, &(0x7f00000bd000), 0x318, 0x0) recvmmsg(r2, &(0x7f00000000c0), 0x10106, 0x2, 0x0) syz_mount_image$ext4(&(0x7f0000000180)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xfffbffff00000000, 0x8, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000600100000f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000006856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010300), 0x0, 0x640}, {&(0x7f0000010400)="03000000040000000500000016000f000300040000000000000000000f00698c", 0x20, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}, {&(0x7f0000011000)}, {0x0, 0x0, 0x6700000}, {&(0x7f0000000580), 0x0, 0xc000}], 0x0, &(0x7f0000013b00)=ANY=[@ANYBLOB='\x00']) creat(&(0x7f0000000000)='./file1\x00', 0x18) r4 = socket(0x10, 0x3, 0x0) sendmsg$nl_route(r4, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f00000005c0)=@ipv4_newroute={0x38, 0x18, 0xbad, 0x0, 0x0, {}, [@RTA_ENCAP_TYPE={0x6, 0x15, 0x3}, @RTA_ENCAP={0x14, 0x16, 0x0, 0x1, @SEG6_IPTUNNEL_SRH={0xd}}]}, 0x38}}, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f00000005c0)=@ipv4_newroute={0x38, 0x18, 0xbad, 0x0, 0x0, {0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6}, [@RTA_ENCAP_TYPE={0x6, 0x15, 0x3}, @RTA_ENCAP={0x14, 0x16, 0x0, 0x1, @SEG6_IPTUNNEL_SRH={0xd}}]}, 0x38}}, 0x0) r5 = socket(0x10, 0x0, 0x0) sendmsg$nl_route(r5, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f00000005c0)=@ipv4_newroute={0x38, 0x18, 0xbad, 0x0, 0x0, {0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6}, [@RTA_ENCAP_TYPE={0x6, 0x15, 0x3}, @RTA_ENCAP={0x14, 0x16, 0x0, 0x1, @SEG6_IPTUNNEL_SRH={0xd}}]}, 0x38}}, 0x0) recvfrom(r2, &(0x7f0000000600)=""/203, 0xcb, 0x42, &(0x7f0000000700)=@hci={0x1f, 0xffffffffffffffff, 0x4}, 0x80) 10:15:58 executing program 0: prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f00000002c0)=0x0) sched_setscheduler(r0, 0x2, &(0x7f0000000080)=0x6) r1 = getpid() sched_setscheduler(r1, 0x2, &(0x7f00000000c0)=0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r2, &(0x7f000057eff8)=@abs, 0x6e) sendmmsg$unix(r3, &(0x7f00000bd000), 0x318, 0x0) recvmmsg(r2, &(0x7f00000000c0), 0x10106, 0x2, 0x0) syz_mount_image$ext4(&(0x7f0000000180)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xfffbffff00000000, 0x8, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000600100000f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000006856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010300), 0x0, 0x640}, {&(0x7f0000010400)="03000000040000000500000016000f000300040000000000000000000f00698c", 0x20, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}, {&(0x7f0000011000)}, {0x0, 0x0, 0x6700000}, {&(0x7f0000000580), 0x0, 0xc000}], 0x0, &(0x7f0000013b00)=ANY=[@ANYBLOB='\x00']) r4 = creat(&(0x7f0000000000)='./file1\x00', 0x18) r5 = socket(0x10, 0x3, 0x0) sendmsg$nl_route(r5, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f00000005c0)=@ipv4_newroute={0x38, 0x18, 0x0, 0x0, 0x0, {0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6}, [@RTA_ENCAP_TYPE={0x6, 0x15, 0x3}, @RTA_ENCAP={0x14, 0x16, 0x0, 0x1, @SEG6_IPTUNNEL_SRH={0xd}}]}, 0x38}}, 0x0) r6 = socket(0x26, 0x3, 0x0) sendmsg$nl_route(r6, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f00000005c0)=@ipv4_newroute={0x38, 0x18, 0xbad, 0x0, 0x0, {0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6}, [@RTA_ENCAP_TYPE={0x6, 0x15, 0x3}, @RTA_ENCAP={0x14, 0x16, 0x0, 0x1, @SEG6_IPTUNNEL_SRH={0xd}}]}, 0x38}}, 0x0) r7 = socket(0x10, 0x3, 0x0) sendmsg$nl_route(r7, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f00000005c0)=@ipv4_newroute={0x38, 0x18, 0xbad, 0x0, 0x0, {0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6}, [@RTA_ENCAP_TYPE={0x6, 0x15, 0x3}, @RTA_ENCAP={0x14, 0x16, 0x0, 0x1, @SEG6_IPTUNNEL_SRH={0xd}}]}, 0x38}}, 0x0) execveat(r4, &(0x7f0000000040)='./file0\x00', &(0x7f0000000380)=[&(0x7f00000001c0)='+{!#\x00', &(0x7f0000000300)='ext4\x00', &(0x7f0000000340)='@(\x00'], &(0x7f00000004c0)=[&(0x7f00000003c0)='ext4\x00', &(0x7f0000000400)='ext4\x00', &(0x7f0000000500)='\x00.D\x04\xe0\xce\x99\xd9\xa9\xac\xac\xadH\xa4\xcf\xb7\xffT\xac\x05\xfd\xdd\xb8w\x0f\x82B\xff\xf2\x909`1!\f\x870\x1f\xc1%Y\xc8\x15c \xea\x1cY!\x04\xe4\x91^\x00\x04\xe4\xa6\xba\xc6\xfd\x10\xdf\xe24\xd4&\x17\xdc\xec\xf4\f\n\xb7.\x13\x8e\x1bYENj\xe1\x19~\x1c\xaf\a;d\x9f\xba\xd9T\xd4-\xecX\xc0Y\x83@\xc7\x8b\xff*\xdd\xaa\xc6,o4\xe2\x0f\x16\x01[\xc0\xeb\x7fFI]WF\x1f\f?\xfa\xb1\xe7\xf6t\x027\xb1\xc17.4V\xf81{9\xa3\xb9\x01\xcck@I\xe2\xf1Y\x10E\xa1z/\x05.~Yh%\x8f\x06sB)N\x11P\xf6p\xff\'\xaf\a7\x10+p\xbb\xf3\xb08\xb5)\x00\xeeg\xd0\xee\xe9\x98\x8d\xf8\xb5G\t@f\x1et v\x14\tT\xc5', &(0x7f0000000480)=':--[\x00'], 0x1000) recvfrom(r2, &(0x7f0000000600)=""/203, 0xcb, 0x42, &(0x7f0000000700)=@hci={0x1f, 0xffffffffffffffff, 0x4}, 0x80) 10:15:58 executing program 3: prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f00000002c0)=0x0) sched_setscheduler(r0, 0x2, &(0x7f0000000080)=0x6) r1 = getpid() sched_setscheduler(r1, 0x2, &(0x7f00000000c0)=0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r2, &(0x7f000057eff8)=@abs, 0x6e) sendmmsg$unix(r3, &(0x7f00000bd000), 0x318, 0x0) recvmmsg(r2, &(0x7f00000000c0), 0x10106, 0x2, 0x0) syz_mount_image$ext4(&(0x7f0000000180)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xfffbffff00000000, 0x8, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000600100000f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000006856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010300), 0x0, 0x640}, {&(0x7f0000010400)="03000000040000000500000016000f000300040000000000000000000f00698c", 0x20, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}, {&(0x7f0000011000)}, {0x0, 0x0, 0x6700000}, {&(0x7f0000000580), 0x0, 0xc000}], 0x0, &(0x7f0000013b00)=ANY=[@ANYBLOB='\x00']) r4 = creat(&(0x7f0000000000)='./file1\x00', 0x18) r5 = socket(0x26, 0x3, 0x0) sendmsg$nl_route(r5, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f00000005c0)=@ipv4_newroute={0x38, 0x18, 0xbad, 0x0, 0x0, {0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6}, [@RTA_ENCAP_TYPE={0x6, 0x15, 0x3}, @RTA_ENCAP={0x14, 0x16, 0x0, 0x1, @SEG6_IPTUNNEL_SRH={0xd}}]}, 0x38}}, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f00000005c0)=@ipv4_newroute={0x38, 0x18, 0xbad, 0x0, 0x0, {0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6}, [@RTA_ENCAP_TYPE={0x6, 0x15, 0x3}, @RTA_ENCAP={0x14, 0x16, 0x0, 0x1, @SEG6_IPTUNNEL_SRH={0xd}}]}, 0x38}}, 0x0) execveat(r4, 0x0, &(0x7f0000000380)=[&(0x7f00000001c0)='+{!#\x00', &(0x7f0000000300)='ext4\x00', &(0x7f0000000340)='@(\x00'], &(0x7f00000004c0)=[&(0x7f00000003c0)='ext4\x00', &(0x7f0000000400)='ext4\x00', &(0x7f0000000500)='\x00.D\x04\xe0\xce\x99\xd9\xa9\xac\xac\xadH\xa4\xcf\xb7\xffT\xac\x05\xfd\xdd\xb8w\x0f\x82B\xff\xf2\x909`1!\f\x870\x1f\xc1%Y\xc8\x15c \xea\x1cY!\x04\xe4\x91^\x00\x04\xe4\xa6\xba\xc6\xfd\x10\xdf\xe24\xd4&\x17\xdc\xec\xf4\f\n\xb7.\x13\x8e\x1bYENj\xe1\x19~\x1c\xaf\a;d\x9f\xba\xd9T\xd4-\xecX\xc0Y\x83@\xc7\x8b\xff*\xdd\xaa\xc6,o4\xe2\x0f\x16\x01[\xc0\xeb\x7fFI]WF\x1f\f?\xfa\xb1\xe7\xf6t\x027\xb1\xc17.4V\xf81{9\xa3\xb9\x01\xcck@I\xe2\xf1Y\x10E\xa1z/\x05.~Yh%\x8f\x06sB)N\x11P\xf6p\xff\'\xaf\a7\x10+p\xbb\xf3\xb08\xb5)\x00\xeeg\xd0\xee\xe9\x98\x8d\xf8\xb5G\t@f\x1et v\x14\tT\xc5', 0x0], 0x1000) 10:15:58 executing program 1: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000005c0)={{0x14}, [@NFT_MSG_NEWTABLE={0x20, 0x0, 0xa, 0x3, 0x0, 0x0, {}, [@NFTA_TABLE_NAME={0x9, 0x1, 'syz0\x00'}]}, @NFT_MSG_NEWSET={0x3c, 0x9, 0xa, 0x401, 0x0, 0x0, {0x1}, [@NFTA_SET_ID={0x8}, @NFTA_SET_NAME={0x9, 0x2, 'syz2\x00'}, @NFTA_SET_TABLE={0x9, 0x1, 'syz0\x00'}, @NFTA_SET_KEY_LEN={0x8, 0x5, 0x1, 0x0, 0x1f}]}, @NFT_MSG_NEWSETELEM={0x48, 0xc, 0xa, 0x201, 0x0, 0x0, {0x1}, [@NFTA_SET_ELEM_LIST_SET={0x9, 0x2, 'syz2\x00'}, @NFTA_SET_ELEM_LIST_ELEMENTS={0x1c, 0x3, 0x0, 0x1, [{0x18, 0x0, 0x0, 0x1, [@NFTA_SET_ELEM_FLAGS={0x8, 0x3, 0x1, 0x0, 0x4}, @NFTA_SET_ELEM_TIMEOUT={0x4, 0x6}]}]}, @NFTA_SET_ELEM_LIST_TABLE={0x9, 0x1, 'syz0\x00'}]}], {0x14, 0x10}}, 0xcc}}, 0x0) 10:15:58 executing program 4: prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f00000002c0)=0x0) sched_setscheduler(r0, 0x2, &(0x7f0000000080)=0x6) r1 = getpid() sched_setscheduler(r1, 0x2, &(0x7f00000000c0)=0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r2, &(0x7f000057eff8)=@abs, 0x6e) sendmmsg$unix(r3, &(0x7f00000bd000), 0x318, 0x0) recvmmsg(r2, &(0x7f00000000c0), 0x10106, 0x2, 0x0) syz_mount_image$ext4(&(0x7f0000000180)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xfffbffff00000000, 0x8, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000600100000f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000006856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010300), 0x0, 0x640}, {&(0x7f0000010400)="03000000040000000500000016000f000300040000000000000000000f00698c", 0x20, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}, {&(0x7f0000011000)}, {0x0, 0x0, 0x6700000}, {&(0x7f0000000580), 0x0, 0xc000}], 0x0, &(0x7f0000013b00)=ANY=[@ANYBLOB='\x00']) r4 = creat(&(0x7f0000000000)='./file1\x00', 0x0) r5 = socket(0x10, 0x3, 0x0) sendmsg$nl_route(r5, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f00000005c0)=@ipv4_newroute={0x38, 0x18, 0xbad, 0x0, 0x0, {0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6}, [@RTA_ENCAP_TYPE={0x6, 0x15, 0x3}, @RTA_ENCAP={0x14, 0x16, 0x0, 0x1, @SEG6_IPTUNNEL_SRH={0xd}}]}, 0x38}}, 0x0) r6 = socket(0x26, 0x3, 0x0) sendmsg$nl_route(r6, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f00000005c0)=@ipv4_newroute={0x38, 0x18, 0xbad, 0x0, 0x0, {0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6}, [@RTA_ENCAP_TYPE={0x6, 0x15, 0x3}, @RTA_ENCAP={0x14, 0x16, 0x0, 0x1, @SEG6_IPTUNNEL_SRH={0xd}}]}, 0x38}}, 0x0) r7 = socket(0x10, 0x3, 0x0) sendmsg$nl_route(r7, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f00000005c0)=@ipv4_newroute={0x38, 0x18, 0xbad, 0x0, 0x0, {0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6}, [@RTA_ENCAP_TYPE={0x6, 0x15, 0x3}, @RTA_ENCAP={0x14, 0x16, 0x0, 0x1, @SEG6_IPTUNNEL_SRH={0xd}}]}, 0x38}}, 0x0) execveat(r4, &(0x7f0000000040)='./file0\x00', &(0x7f0000000380)=[&(0x7f00000001c0)='+{!#\x00', &(0x7f0000000300)='ext4\x00', &(0x7f0000000340)='@(\x00'], &(0x7f00000004c0)=[&(0x7f00000003c0)='ext4\x00', &(0x7f0000000400)='ext4\x00', &(0x7f0000000500)='\x00.D\x04\xe0\xce\x99\xd9\xa9\xac\xac\xadH\xa4\xcf\xb7\xffT\xac\x05\xfd\xdd\xb8w\x0f\x82B\xff\xf2\x909`1!\f\x870\x1f\xc1%Y\xc8\x15c \xea\x1cY!\x04\xe4\x91^\x00\x04\xe4\xa6\xba\xc6\xfd\x10\xdf\xe24\xd4&\x17\xdc\xec\xf4\f\n\xb7.\x13\x8e\x1bYENj\xe1\x19~\x1c\xaf\a;d\x9f\xba\xd9T\xd4-\xecX\xc0Y\x83@\xc7\x8b\xff*\xdd\xaa\xc6,o4\xe2\x0f\x16\x01[\xc0\xeb\x7fFI]WF\x1f\f?\xfa\xb1\xe7\xf6t\x027\xb1\xc17.4V\xf81{9\xa3\xb9\x01\xcck@I\xe2\xf1Y\x10E\xa1z/\x05.~Yh%\x8f\x06sB)N\x11P\xf6p\xff\'\xaf\a7\x10+p\xbb\xf3\xb08\xb5)\x00\xeeg\xd0\xee\xe9\x98\x8d\xf8\xb5G\t@f\x1et v\x14\tT\xc5', &(0x7f0000000480)=':--[\x00'], 0x1000) recvfrom(r2, &(0x7f0000000600)=""/203, 0xcb, 0x42, &(0x7f0000000700)=@hci={0x1f, 0xffffffffffffffff, 0x4}, 0x80) 10:15:58 executing program 1: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000005c0)={{0x14}, [@NFT_MSG_NEWTABLE={0x20, 0x0, 0xa, 0x3, 0x0, 0x0, {}, [@NFTA_TABLE_NAME={0x9, 0x1, 'syz0\x00'}]}, @NFT_MSG_NEWSET={0x3c, 0x9, 0xa, 0x401, 0x0, 0x0, {0x1}, [@NFTA_SET_ID={0x8}, @NFTA_SET_NAME={0x9, 0x2, 'syz2\x00'}, @NFTA_SET_TABLE={0x9, 0x1, 'syz0\x00'}, @NFTA_SET_KEY_LEN={0x8, 0x5, 0x1, 0x0, 0x1f}]}, @NFT_MSG_NEWSETELEM={0x48, 0xc, 0xa, 0x201, 0x0, 0x0, {0x1}, [@NFTA_SET_ELEM_LIST_SET={0x9, 0x2, 'syz2\x00'}, @NFTA_SET_ELEM_LIST_ELEMENTS={0x1c, 0x3, 0x0, 0x1, [{0x18, 0x0, 0x0, 0x1, [@NFTA_SET_ELEM_FLAGS={0x8, 0x3, 0x1, 0x0, 0x4}, @NFTA_SET_ELEM_TIMEOUT={0x4, 0x6}]}]}, @NFTA_SET_ELEM_LIST_TABLE={0x9, 0x1, 'syz0\x00'}]}], {0x14, 0x10}}, 0xcc}}, 0x0) 10:15:58 executing program 1: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000005c0)={{0x14}, [@NFT_MSG_NEWTABLE={0x20, 0x0, 0xa, 0x3, 0x0, 0x0, {}, [@NFTA_TABLE_NAME={0x9, 0x1, 'syz0\x00'}]}, @NFT_MSG_NEWSET={0x3c, 0x9, 0xa, 0x401, 0x0, 0x0, {0x1}, [@NFTA_SET_ID={0x8}, @NFTA_SET_NAME={0x9, 0x2, 'syz2\x00'}, @NFTA_SET_TABLE={0x9, 0x1, 'syz0\x00'}, @NFTA_SET_KEY_LEN={0x8, 0x5, 0x1, 0x0, 0x1f}]}, @NFT_MSG_NEWSETELEM={0x48, 0xc, 0xa, 0x201, 0x0, 0x0, {0x1}, [@NFTA_SET_ELEM_LIST_SET={0x9, 0x2, 'syz2\x00'}, @NFTA_SET_ELEM_LIST_ELEMENTS={0x1c, 0x3, 0x0, 0x1, [{0x18, 0x0, 0x0, 0x1, [@NFTA_SET_ELEM_FLAGS={0x8, 0x3, 0x1, 0x0, 0x4}, @NFTA_SET_ELEM_TIMEOUT={0x4, 0x6}]}]}, @NFTA_SET_ELEM_LIST_TABLE={0x9, 0x1, 'syz0\x00'}]}], {0x14, 0x10}}, 0xcc}}, 0x0) 10:15:58 executing program 1: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000005c0)={{0x14}, [@NFT_MSG_NEWTABLE={0x14, 0x0, 0xa, 0x3, 0x0, 0x0, {0x1}}, @NFT_MSG_NEWSET={0x3c, 0x9, 0xa, 0x401, 0x0, 0x0, {0x1}, [@NFTA_SET_ID={0x8}, @NFTA_SET_NAME={0x9, 0x2, 'syz2\x00'}, @NFTA_SET_TABLE={0x9, 0x1, 'syz0\x00'}, @NFTA_SET_KEY_LEN={0x8, 0x5, 0x1, 0x0, 0x1f}]}, @NFT_MSG_NEWSETELEM={0x48, 0xc, 0xa, 0x201, 0x0, 0x0, {0x1}, [@NFTA_SET_ELEM_LIST_SET={0x9, 0x2, 'syz2\x00'}, @NFTA_SET_ELEM_LIST_ELEMENTS={0x1c, 0x3, 0x0, 0x1, [{0x18, 0x0, 0x0, 0x1, [@NFTA_SET_ELEM_FLAGS={0x8, 0x3, 0x1, 0x0, 0x4}, @NFTA_SET_ELEM_TIMEOUT={0xc, 0x6}]}]}, @NFTA_SET_ELEM_LIST_TABLE={0x9, 0x1, 'syz0\x00'}]}], {0x14, 0x10}}, 0xc0}}, 0x0) 10:15:58 executing program 1: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000005c0)={{0x14}, [@NFT_MSG_NEWTABLE={0x14, 0x0, 0xa, 0x3, 0x0, 0x0, {0x1}}, @NFT_MSG_NEWSET={0x3c, 0x9, 0xa, 0x401, 0x0, 0x0, {0x1}, [@NFTA_SET_ID={0x8}, @NFTA_SET_NAME={0x9, 0x2, 'syz2\x00'}, @NFTA_SET_TABLE={0x9, 0x1, 'syz0\x00'}, @NFTA_SET_KEY_LEN={0x8, 0x5, 0x1, 0x0, 0x1f}]}, @NFT_MSG_NEWSETELEM={0x48, 0xc, 0xa, 0x201, 0x0, 0x0, {0x1}, [@NFTA_SET_ELEM_LIST_SET={0x9, 0x2, 'syz2\x00'}, @NFTA_SET_ELEM_LIST_ELEMENTS={0x1c, 0x3, 0x0, 0x1, [{0x18, 0x0, 0x0, 0x1, [@NFTA_SET_ELEM_FLAGS={0x8, 0x3, 0x1, 0x0, 0x4}, @NFTA_SET_ELEM_TIMEOUT={0xc, 0x6}]}]}, @NFTA_SET_ELEM_LIST_TABLE={0x9, 0x1, 'syz0\x00'}]}], {0x14, 0x10}}, 0xc0}}, 0x0) 10:15:58 executing program 1: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000005c0)={{0x14}, [@NFT_MSG_NEWTABLE={0x14, 0x0, 0xa, 0x3, 0x0, 0x0, {0x1}}, @NFT_MSG_NEWSET={0x3c, 0x9, 0xa, 0x401, 0x0, 0x0, {0x1}, [@NFTA_SET_ID={0x8}, @NFTA_SET_NAME={0x9, 0x2, 'syz2\x00'}, @NFTA_SET_TABLE={0x9, 0x1, 'syz0\x00'}, @NFTA_SET_KEY_LEN={0x8, 0x5, 0x1, 0x0, 0x1f}]}, @NFT_MSG_NEWSETELEM={0x48, 0xc, 0xa, 0x201, 0x0, 0x0, {0x1}, [@NFTA_SET_ELEM_LIST_SET={0x9, 0x2, 'syz2\x00'}, @NFTA_SET_ELEM_LIST_ELEMENTS={0x1c, 0x3, 0x0, 0x1, [{0x18, 0x0, 0x0, 0x1, [@NFTA_SET_ELEM_FLAGS={0x8, 0x3, 0x1, 0x0, 0x4}, @NFTA_SET_ELEM_TIMEOUT={0xc, 0x6}]}]}, @NFTA_SET_ELEM_LIST_TABLE={0x9, 0x1, 'syz0\x00'}]}], {0x14, 0x10}}, 0xc0}}, 0x0) [ 2258.179940][T25722] loop3: detected capacity change from 0 to 264192 [ 2258.549290][T25725] loop2: detected capacity change from 0 to 264192 [ 2258.556344][T25730] loop4: detected capacity change from 0 to 264192 10:16:00 executing program 1: prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f00000002c0)=0x0) sched_setscheduler(r0, 0x2, &(0x7f0000000080)=0x6) r1 = getpid() sched_setscheduler(r1, 0x2, &(0x7f00000000c0)=0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r2, &(0x7f000057eff8)=@abs, 0x6e) sendmmsg$unix(r3, &(0x7f00000bd000), 0x318, 0x0) recvmmsg(r2, &(0x7f00000000c0), 0x10106, 0x2, 0x0) syz_mount_image$ext4(&(0x7f0000000180)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xfffbffff00000000, 0x8, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000600100000f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000006856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010300), 0x0, 0x640}, {&(0x7f0000010400)="03000000040000000500000016000f000300040000000000000000000f00698c", 0x20, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}, {&(0x7f0000011000)}, {0x0, 0x0, 0x6700000}, {&(0x7f0000000580), 0x0, 0xc000}], 0x0, &(0x7f0000013b00)=ANY=[@ANYBLOB]) r4 = creat(&(0x7f0000000000)='./file1\x00', 0x18) r5 = socket(0x10, 0x3, 0x0) sendmsg$nl_route(r5, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f00000005c0)=@ipv4_newroute={0x38, 0x18, 0xbad, 0x0, 0x0, {0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6}, [@RTA_ENCAP_TYPE={0x6, 0x15, 0x3}, @RTA_ENCAP={0x14, 0x16, 0x0, 0x1, @SEG6_IPTUNNEL_SRH={0xd}}]}, 0x38}}, 0x0) r6 = socket(0x26, 0x3, 0x0) sendmsg$nl_route(r6, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f00000005c0)=@ipv4_newroute={0x38, 0x18, 0xbad, 0x0, 0x0, {0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6}, [@RTA_ENCAP_TYPE={0x6, 0x15, 0x3}, @RTA_ENCAP={0x14, 0x16, 0x0, 0x1, @SEG6_IPTUNNEL_SRH={0xd}}]}, 0x38}}, 0x0) r7 = socket(0x10, 0x3, 0x0) sendmsg$nl_route(r7, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f00000005c0)=@ipv4_newroute={0x38, 0x18, 0xbad, 0x0, 0x0, {0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6}, [@RTA_ENCAP_TYPE={0x6, 0x15, 0x3}, @RTA_ENCAP={0x14, 0x16, 0x0, 0x1, @SEG6_IPTUNNEL_SRH={0xd}}]}, 0x38}}, 0x0) execveat(r4, &(0x7f0000000040)='./file0\x00', &(0x7f0000000380)=[&(0x7f00000001c0)='+{!#\x00', &(0x7f0000000300)='ext4\x00', &(0x7f0000000340)='@(\x00'], &(0x7f00000004c0)=[&(0x7f00000003c0)='ext4\x00', &(0x7f0000000400)='ext4\x00', &(0x7f0000000500)='\x00.D\x04\xe0\xce\x99\xd9\xa9\xac\xac\xadH\xa4\xcf\xb7\xffT\xac\x05\xfd\xdd\xb8w\x0f\x82B\xff\xf2\x909`1!\f\x870\x1f\xc1%Y\xc8\x15c \xea\x1cY!\x04\xe4\x91^\x00\x04\xe4\xa6\xba\xc6\xfd\x10\xdf\xe24\xd4&\x17\xdc\xec\xf4\f\n\xb7.\x13\x8e\x1bYENj\xe1\x19~\x1c\xaf\a;d\x9f\xba\xd9T\xd4-\xecX\xc0Y\x83@\xc7\x8b\xff*\xdd\xaa\xc6,o4\xe2\x0f\x16\x01[\xc0\xeb\x7fFI]WF\x1f\f?\xfa\xb1\xe7\xf6t\x027\xb1\xc17.4V\xf81{9\xa3\xb9\x01\xcck@I\xe2\xf1Y\x10E\xa1z/\x05.~Yh%\x8f\x06sB)N\x11P\xf6p\xff\'\xaf\a7\x10+p\xbb\xf3\xb08\xb5)\x00\xeeg\xd0\xee\xe9\x98\x8d\xf8\xb5G\t@f\x1et v\x14\tT\xc5', &(0x7f0000000480)=':--[\x00'], 0x1000) recvfrom(r2, &(0x7f0000000600)=""/203, 0xcb, 0x42, &(0x7f0000000700)=@hci={0x1f, 0xffffffffffffffff, 0x4}, 0x80) [ 2260.059368][T25722] EXT4-fs: failed to create workqueue [ 2260.064791][T25722] EXT4-fs (loop3): mount failed [ 2260.469136][T25730] EXT4-fs: failed to create workqueue [ 2260.474644][T25730] EXT4-fs (loop4): mount failed [ 2260.495273][T25725] EXT4-fs: failed to create workqueue [ 2260.500683][T25725] EXT4-fs (loop2): mount failed 10:16:10 executing program 5: prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f00000002c0)=0x0) sched_setscheduler(r0, 0x2, &(0x7f0000000080)=0x6) r1 = getpid() sched_setscheduler(r1, 0x2, &(0x7f00000000c0)=0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r2, &(0x7f000057eff8)=@abs, 0x6e) sendmmsg$unix(r3, &(0x7f00000bd000), 0x318, 0x0) recvmmsg(r2, &(0x7f00000000c0), 0x10106, 0x2, 0x0) syz_mount_image$ext4(&(0x7f0000000180)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xfffbffff00000000, 0x8, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000600100000f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000006856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010300), 0x0, 0x640}, {&(0x7f0000010400)="03000000040000000500000016000f000300040000000000000000000f00698c", 0x20, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}, {&(0x7f0000011000)}, {0x0, 0x0, 0x6700000}, {&(0x7f0000000580), 0x0, 0xc000}], 0x0, &(0x7f0000013b00)=ANY=[@ANYBLOB='\x00']) r4 = creat(0x0, 0x18) r5 = socket(0x10, 0x3, 0x0) sendmsg$nl_route(r5, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f00000005c0)=@ipv4_newroute={0x38, 0x18, 0xbad, 0x0, 0x0, {0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6}, [@RTA_ENCAP_TYPE={0x6, 0x15, 0x3}, @RTA_ENCAP={0x14, 0x16, 0x0, 0x1, @SEG6_IPTUNNEL_SRH={0xd}}]}, 0x38}}, 0x0) r6 = socket(0x26, 0x3, 0x0) sendmsg$nl_route(r6, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f00000005c0)=@ipv4_newroute={0x38, 0x18, 0xbad, 0x0, 0x0, {0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6}, [@RTA_ENCAP_TYPE={0x6, 0x15, 0x3}, @RTA_ENCAP={0x14, 0x16, 0x0, 0x1, @SEG6_IPTUNNEL_SRH={0xd}}]}, 0x38}}, 0x0) r7 = socket(0x10, 0x3, 0x0) sendmsg$nl_route(r7, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f00000005c0)=@ipv4_newroute={0x38, 0x18, 0xbad, 0x0, 0x0, {0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6}, [@RTA_ENCAP_TYPE={0x6, 0x15, 0x3}, @RTA_ENCAP={0x14, 0x16, 0x0, 0x1, @SEG6_IPTUNNEL_SRH={0xd}}]}, 0x38}}, 0x0) execveat(r4, &(0x7f0000000040)='./file0\x00', &(0x7f0000000380)=[&(0x7f00000001c0)='+{!#\x00', &(0x7f0000000300)='ext4\x00', &(0x7f0000000340)='@(\x00'], &(0x7f00000004c0)=[&(0x7f00000003c0)='ext4\x00', &(0x7f0000000400)='ext4\x00', &(0x7f0000000500)='\x00.D\x04\xe0\xce\x99\xd9\xa9\xac\xac\xadH\xa4\xcf\xb7\xffT\xac\x05\xfd\xdd\xb8w\x0f\x82B\xff\xf2\x909`1!\f\x870\x1f\xc1%Y\xc8\x15c \xea\x1cY!\x04\xe4\x91^\x00\x04\xe4\xa6\xba\xc6\xfd\x10\xdf\xe24\xd4&\x17\xdc\xec\xf4\f\n\xb7.\x13\x8e\x1bYENj\xe1\x19~\x1c\xaf\a;d\x9f\xba\xd9T\xd4-\xecX\xc0Y\x83@\xc7\x8b\xff*\xdd\xaa\xc6,o4\xe2\x0f\x16\x01[\xc0\xeb\x7fFI]WF\x1f\f?\xfa\xb1\xe7\xf6t\x027\xb1\xc17.4V\xf81{9\xa3\xb9\x01\xcck@I\xe2\xf1Y\x10E\xa1z/\x05.~Yh%\x8f\x06sB)N\x11P\xf6p\xff\'\xaf\a7\x10+p\xbb\xf3\xb08\xb5)\x00\xeeg\xd0\xee\xe9\x98\x8d\xf8\xb5G\t@f\x1et v\x14\tT\xc5', &(0x7f0000000480)=':--[\x00'], 0x1000) recvfrom(r2, &(0x7f0000000600)=""/203, 0xcb, 0x42, &(0x7f0000000700)=@hci={0x1f, 0xffffffffffffffff, 0x4}, 0x80) 10:16:10 executing program 2: prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f00000002c0)=0x0) sched_setscheduler(r0, 0x2, &(0x7f0000000080)=0x6) r1 = getpid() sched_setscheduler(r1, 0x2, &(0x7f00000000c0)=0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r2, &(0x7f000057eff8)=@abs, 0x6e) sendmmsg$unix(r3, &(0x7f00000bd000), 0x318, 0x0) recvmmsg(r2, &(0x7f00000000c0), 0x10106, 0x2, 0x0) syz_mount_image$ext4(&(0x7f0000000180)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xfffbffff00000000, 0x8, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000600100000f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000006856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010300), 0x0, 0x640}, {&(0x7f0000010400)="03000000040000000500000016000f000300040000000000000000000f00698c", 0x20, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}, {&(0x7f0000011000)}, {0x0, 0x0, 0x6700000}, {&(0x7f0000000580), 0x0, 0xc000}], 0x0, &(0x7f0000013b00)=ANY=[@ANYBLOB='\x00']) creat(&(0x7f0000000000)='./file1\x00', 0x18) r4 = socket(0x10, 0x3, 0x0) sendmsg$nl_route(r4, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f00000005c0)=@ipv4_newroute={0x38, 0x18, 0xbad, 0x0, 0x0, {}, [@RTA_ENCAP_TYPE={0x6, 0x15, 0x3}, @RTA_ENCAP={0x14, 0x16, 0x0, 0x1, @SEG6_IPTUNNEL_SRH={0xd}}]}, 0x38}}, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f00000005c0)=@ipv4_newroute={0x38, 0x18, 0xbad, 0x0, 0x0, {0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6}, [@RTA_ENCAP_TYPE={0x6, 0x15, 0x3}, @RTA_ENCAP={0x14, 0x16, 0x0, 0x1, @SEG6_IPTUNNEL_SRH={0xd}}]}, 0x38}}, 0x0) r5 = socket(0x10, 0x0, 0x0) sendmsg$nl_route(r5, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f00000005c0)=@ipv4_newroute={0x38, 0x18, 0xbad, 0x0, 0x0, {0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6}, [@RTA_ENCAP_TYPE={0x6, 0x15, 0x3}, @RTA_ENCAP={0x14, 0x16, 0x0, 0x1, @SEG6_IPTUNNEL_SRH={0xd}}]}, 0x38}}, 0x0) recvfrom(r2, &(0x7f0000000600)=""/203, 0xcb, 0x42, &(0x7f0000000700)=@hci={0x1f, 0xffffffffffffffff, 0x4}, 0x80) 10:16:10 executing program 4: prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f00000002c0)=0x0) sched_setscheduler(r0, 0x2, &(0x7f0000000080)=0x6) r1 = getpid() sched_setscheduler(r1, 0x2, &(0x7f00000000c0)=0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r2, &(0x7f000057eff8)=@abs, 0x6e) sendmmsg$unix(r3, &(0x7f00000bd000), 0x318, 0x0) recvmmsg(r2, &(0x7f00000000c0), 0x10106, 0x2, 0x0) syz_mount_image$ext4(&(0x7f0000000180)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xfffbffff00000000, 0x8, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000600100000f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000006856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010300), 0x0, 0x640}, {&(0x7f0000010400)="03000000040000000500000016000f000300040000000000000000000f00698c", 0x20, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}, {&(0x7f0000011000)}, {0x0, 0x0, 0x6700000}, {&(0x7f0000000580), 0x0, 0xc000}], 0x0, &(0x7f0000013b00)=ANY=[]) r4 = creat(&(0x7f0000000000)='./file1\x00', 0x18) r5 = socket(0x10, 0x3, 0x0) sendmsg$nl_route(r5, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f00000005c0)=@ipv4_newroute={0x38, 0x18, 0xbad, 0x0, 0x0, {0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6}, [@RTA_ENCAP_TYPE={0x6, 0x15, 0x3}, @RTA_ENCAP={0x14, 0x16, 0x0, 0x1, @SEG6_IPTUNNEL_SRH={0xd}}]}, 0x38}}, 0x0) r6 = socket(0x26, 0x3, 0x0) sendmsg$nl_route(r6, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f00000005c0)=@ipv4_newroute={0x38, 0x18, 0xbad, 0x0, 0x0, {0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6}, [@RTA_ENCAP_TYPE={0x6, 0x15, 0x3}, @RTA_ENCAP={0x14, 0x16, 0x0, 0x1, @SEG6_IPTUNNEL_SRH={0xd}}]}, 0x38}}, 0x0) r7 = socket(0x10, 0x3, 0x0) sendmsg$nl_route(r7, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f00000005c0)=@ipv4_newroute={0x38, 0x18, 0xbad, 0x0, 0x0, {0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6}, [@RTA_ENCAP_TYPE={0x6, 0x15, 0x3}, @RTA_ENCAP={0x14, 0x16, 0x0, 0x1, @SEG6_IPTUNNEL_SRH={0xd}}]}, 0x38}}, 0x0) execveat(r4, &(0x7f0000000040)='./file0\x00', &(0x7f0000000380)=[&(0x7f00000001c0)='+{!#\x00', &(0x7f0000000300)='ext4\x00', &(0x7f0000000340)='@(\x00'], &(0x7f00000004c0)=[&(0x7f00000003c0)='ext4\x00', &(0x7f0000000400)='ext4\x00', &(0x7f0000000500)='\x00.D\x04\xe0\xce\x99\xd9\xa9\xac\xac\xadH\xa4\xcf\xb7\xffT\xac\x05\xfd\xdd\xb8w\x0f\x82B\xff\xf2\x909`1!\f\x870\x1f\xc1%Y\xc8\x15c \xea\x1cY!\x04\xe4\x91^\x00\x04\xe4\xa6\xba\xc6\xfd\x10\xdf\xe24\xd4&\x17\xdc\xec\xf4\f\n\xb7.\x13\x8e\x1bYENj\xe1\x19~\x1c\xaf\a;d\x9f\xba\xd9T\xd4-\xecX\xc0Y\x83@\xc7\x8b\xff*\xdd\xaa\xc6,o4\xe2\x0f\x16\x01[\xc0\xeb\x7fFI]WF\x1f\f?\xfa\xb1\xe7\xf6t\x027\xb1\xc17.4V\xf81{9\xa3\xb9\x01\xcck@I\xe2\xf1Y\x10E\xa1z/\x05.~Yh%\x8f\x06sB)N\x11P\xf6p\xff\'\xaf\a7\x10+p\xbb\xf3\xb08\xb5)\x00\xeeg\xd0\xee\xe9\x98\x8d\xf8\xb5G\t@f\x1et v\x14\tT\xc5', &(0x7f0000000480)=':--[\x00'], 0x1000) recvfrom(r2, &(0x7f0000000600)=""/203, 0xcb, 0x42, &(0x7f0000000700)=@hci={0x1f, 0xffffffffffffffff, 0x4}, 0x80) 10:16:10 executing program 3: prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f00000002c0)=0x0) sched_setscheduler(r0, 0x2, &(0x7f0000000080)=0x6) r1 = getpid() sched_setscheduler(r1, 0x2, &(0x7f00000000c0)=0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r2, &(0x7f000057eff8)=@abs, 0x6e) sendmmsg$unix(r3, &(0x7f00000bd000), 0x318, 0x0) recvmmsg(r2, &(0x7f00000000c0), 0x10106, 0x2, 0x0) syz_mount_image$ext4(&(0x7f0000000180)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xfffbffff00000000, 0x8, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000600100000f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000006856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010300), 0x0, 0x640}, {&(0x7f0000010400)="03000000040000000500000016000f000300040000000000000000000f00698c", 0x20, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}, {&(0x7f0000011000)}, {0x0, 0x0, 0x6700000}, {&(0x7f0000000580), 0x0, 0xc000}], 0x0, &(0x7f0000013b00)=ANY=[@ANYBLOB='\x00']) r4 = creat(&(0x7f0000000000)='./file1\x00', 0x18) r5 = socket(0x26, 0x3, 0x0) sendmsg$nl_route(r5, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f00000005c0)=@ipv4_newroute={0x38, 0x18, 0xbad, 0x0, 0x0, {0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6}, [@RTA_ENCAP_TYPE={0x6, 0x15, 0x3}, @RTA_ENCAP={0x14, 0x16, 0x0, 0x1, @SEG6_IPTUNNEL_SRH={0xd}}]}, 0x38}}, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f00000005c0)=@ipv4_newroute={0x38, 0x18, 0xbad, 0x0, 0x0, {0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6}, [@RTA_ENCAP_TYPE={0x6, 0x15, 0x3}, @RTA_ENCAP={0x14, 0x16, 0x0, 0x1, @SEG6_IPTUNNEL_SRH={0xd}}]}, 0x38}}, 0x0) execveat(r4, 0x0, &(0x7f0000000380)=[&(0x7f00000001c0)='+{!#\x00', &(0x7f0000000300)='ext4\x00', &(0x7f0000000340)='@(\x00'], &(0x7f00000004c0)=[&(0x7f00000003c0)='ext4\x00', &(0x7f0000000400)='ext4\x00', &(0x7f0000000500)='\x00.D\x04\xe0\xce\x99\xd9\xa9\xac\xac\xadH\xa4\xcf\xb7\xffT\xac\x05\xfd\xdd\xb8w\x0f\x82B\xff\xf2\x909`1!\f\x870\x1f\xc1%Y\xc8\x15c \xea\x1cY!\x04\xe4\x91^\x00\x04\xe4\xa6\xba\xc6\xfd\x10\xdf\xe24\xd4&\x17\xdc\xec\xf4\f\n\xb7.\x13\x8e\x1bYENj\xe1\x19~\x1c\xaf\a;d\x9f\xba\xd9T\xd4-\xecX\xc0Y\x83@\xc7\x8b\xff*\xdd\xaa\xc6,o4\xe2\x0f\x16\x01[\xc0\xeb\x7fFI]WF\x1f\f?\xfa\xb1\xe7\xf6t\x027\xb1\xc17.4V\xf81{9\xa3\xb9\x01\xcck@I\xe2\xf1Y\x10E\xa1z/\x05.~Yh%\x8f\x06sB)N\x11P\xf6p\xff\'\xaf\a7\x10+p\xbb\xf3\xb08\xb5)\x00\xeeg\xd0\xee\xe9\x98\x8d\xf8\xb5G\t@f\x1et v\x14\tT\xc5', 0x0], 0x1000) 10:16:10 executing program 0: prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f00000002c0)=0x0) sched_setscheduler(r0, 0x2, &(0x7f0000000080)=0x6) r1 = getpid() sched_setscheduler(r1, 0x2, &(0x7f00000000c0)=0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r2, &(0x7f000057eff8)=@abs, 0x6e) sendmmsg$unix(r3, &(0x7f00000bd000), 0x318, 0x0) recvmmsg(r2, &(0x7f00000000c0), 0x10106, 0x2, 0x0) syz_mount_image$ext4(&(0x7f0000000180)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xfffbffff00000000, 0x8, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000600100000f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000006856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010300), 0x0, 0x640}, {&(0x7f0000010400)="03000000040000000500000016000f000300040000000000000000000f00698c", 0x20, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}, {&(0x7f0000011000)}, {0x0, 0x0, 0x6700000}, {&(0x7f0000000580), 0x0, 0xc000}], 0x0, &(0x7f0000013b00)=ANY=[]) r4 = creat(&(0x7f0000000000)='./file1\x00', 0x18) r5 = socket(0x10, 0x3, 0x0) sendmsg$nl_route(r5, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f00000005c0)=@ipv4_newroute={0x38, 0x18, 0xbad, 0x0, 0x0, {0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6}, [@RTA_ENCAP_TYPE={0x6, 0x15, 0x3}, @RTA_ENCAP={0x14, 0x16, 0x0, 0x1, @SEG6_IPTUNNEL_SRH={0xd}}]}, 0x38}}, 0x0) r6 = socket(0x26, 0x3, 0x0) sendmsg$nl_route(r6, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f00000005c0)=@ipv4_newroute={0x38, 0x18, 0xbad, 0x0, 0x0, {0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6}, [@RTA_ENCAP_TYPE={0x6, 0x15, 0x3}, @RTA_ENCAP={0x14, 0x16, 0x0, 0x1, @SEG6_IPTUNNEL_SRH={0xd}}]}, 0x38}}, 0x0) r7 = socket(0x10, 0x3, 0x0) sendmsg$nl_route(r7, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f00000005c0)=@ipv4_newroute={0x38, 0x18, 0xbad, 0x0, 0x0, {0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6}, [@RTA_ENCAP_TYPE={0x6, 0x15, 0x3}, @RTA_ENCAP={0x14, 0x16, 0x0, 0x1, @SEG6_IPTUNNEL_SRH={0xd}}]}, 0x38}}, 0x0) execveat(r4, &(0x7f0000000040)='./file0\x00', &(0x7f0000000380)=[&(0x7f00000001c0)='+{!#\x00', &(0x7f0000000300)='ext4\x00', &(0x7f0000000340)='@(\x00'], &(0x7f00000004c0)=[&(0x7f00000003c0)='ext4\x00', &(0x7f0000000400)='ext4\x00', &(0x7f0000000500)='\x00.D\x04\xe0\xce\x99\xd9\xa9\xac\xac\xadH\xa4\xcf\xb7\xffT\xac\x05\xfd\xdd\xb8w\x0f\x82B\xff\xf2\x909`1!\f\x870\x1f\xc1%Y\xc8\x15c \xea\x1cY!\x04\xe4\x91^\x00\x04\xe4\xa6\xba\xc6\xfd\x10\xdf\xe24\xd4&\x17\xdc\xec\xf4\f\n\xb7.\x13\x8e\x1bYENj\xe1\x19~\x1c\xaf\a;d\x9f\xba\xd9T\xd4-\xecX\xc0Y\x83@\xc7\x8b\xff*\xdd\xaa\xc6,o4\xe2\x0f\x16\x01[\xc0\xeb\x7fFI]WF\x1f\f?\xfa\xb1\xe7\xf6t\x027\xb1\xc17.4V\xf81{9\xa3\xb9\x01\xcck@I\xe2\xf1Y\x10E\xa1z/\x05.~Yh%\x8f\x06sB)N\x11P\xf6p\xff\'\xaf\a7\x10+p\xbb\xf3\xb08\xb5)\x00\xeeg\xd0\xee\xe9\x98\x8d\xf8\xb5G\t@f\x1et v\x14\tT\xc5', &(0x7f0000000480)=':--[\x00'], 0x1000) recvfrom(r2, &(0x7f0000000600)=""/203, 0xcb, 0x42, &(0x7f0000000700)=@hci={0x1f, 0xffffffffffffffff, 0x4}, 0x80) 10:16:10 executing program 1: prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f00000002c0)=0x0) sched_setscheduler(r0, 0x2, &(0x7f0000000080)=0x6) r1 = getpid() sched_setscheduler(r1, 0x2, &(0x7f00000000c0)=0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r2, &(0x7f000057eff8)=@abs, 0x6e) sendmmsg$unix(r3, &(0x7f00000bd000), 0x318, 0x0) recvmmsg(r2, &(0x7f00000000c0), 0x10106, 0x2, 0x0) syz_mount_image$ext4(&(0x7f0000000180)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xfffbffff00000000, 0x8, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000600100000f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000006856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010300), 0x0, 0x640}, {&(0x7f0000010400)="03000000040000000500000016000f000300040000000000000000000f00698c", 0x20, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}, {&(0x7f0000011000)}, {0x0, 0x0, 0x6700000}, {&(0x7f0000000580), 0x0, 0xc000}], 0x0, &(0x7f0000013b00)=ANY=[@ANYBLOB]) r4 = creat(&(0x7f0000000000)='./file1\x00', 0x18) r5 = socket(0x10, 0x3, 0x0) sendmsg$nl_route(r5, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f00000005c0)=@ipv4_newroute={0x38, 0x18, 0xbad, 0x0, 0x0, {0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6}, [@RTA_ENCAP_TYPE={0x6, 0x15, 0x3}, @RTA_ENCAP={0x14, 0x16, 0x0, 0x1, @SEG6_IPTUNNEL_SRH={0xd}}]}, 0x38}}, 0x0) r6 = socket(0x26, 0x3, 0x0) sendmsg$nl_route(r6, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f00000005c0)=@ipv4_newroute={0x38, 0x18, 0xbad, 0x0, 0x0, {0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6}, [@RTA_ENCAP_TYPE={0x6, 0x15, 0x3}, @RTA_ENCAP={0x14, 0x16, 0x0, 0x1, @SEG6_IPTUNNEL_SRH={0xd}}]}, 0x38}}, 0x0) r7 = socket(0x10, 0x3, 0x0) sendmsg$nl_route(r7, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f00000005c0)=@ipv4_newroute={0x38, 0x18, 0xbad, 0x0, 0x0, {0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6}, [@RTA_ENCAP_TYPE={0x6, 0x15, 0x3}, @RTA_ENCAP={0x14, 0x16, 0x0, 0x1, @SEG6_IPTUNNEL_SRH={0xd}}]}, 0x38}}, 0x0) execveat(r4, &(0x7f0000000040)='./file0\x00', &(0x7f0000000380)=[&(0x7f00000001c0)='+{!#\x00', &(0x7f0000000300)='ext4\x00', &(0x7f0000000340)='@(\x00'], &(0x7f00000004c0)=[&(0x7f00000003c0)='ext4\x00', &(0x7f0000000400)='ext4\x00', &(0x7f0000000500)='\x00.D\x04\xe0\xce\x99\xd9\xa9\xac\xac\xadH\xa4\xcf\xb7\xffT\xac\x05\xfd\xdd\xb8w\x0f\x82B\xff\xf2\x909`1!\f\x870\x1f\xc1%Y\xc8\x15c \xea\x1cY!\x04\xe4\x91^\x00\x04\xe4\xa6\xba\xc6\xfd\x10\xdf\xe24\xd4&\x17\xdc\xec\xf4\f\n\xb7.\x13\x8e\x1bYENj\xe1\x19~\x1c\xaf\a;d\x9f\xba\xd9T\xd4-\xecX\xc0Y\x83@\xc7\x8b\xff*\xdd\xaa\xc6,o4\xe2\x0f\x16\x01[\xc0\xeb\x7fFI]WF\x1f\f?\xfa\xb1\xe7\xf6t\x027\xb1\xc17.4V\xf81{9\xa3\xb9\x01\xcck@I\xe2\xf1Y\x10E\xa1z/\x05.~Yh%\x8f\x06sB)N\x11P\xf6p\xff\'\xaf\a7\x10+p\xbb\xf3\xb08\xb5)\x00\xeeg\xd0\xee\xe9\x98\x8d\xf8\xb5G\t@f\x1et v\x14\tT\xc5', &(0x7f0000000480)=':--[\x00'], 0x1000) recvfrom(r2, &(0x7f0000000600)=""/203, 0xcb, 0x42, &(0x7f0000000700)=@hci={0x1f, 0xffffffffffffffff, 0x4}, 0x80) [ 2270.769239][T25767] loop3: detected capacity change from 0 to 264192 [ 2270.799263][T25766] loop2: detected capacity change from 0 to 264192 [ 2271.209497][T25769] loop4: detected capacity change from 0 to 264192 [ 2272.728803][T25767] EXT4-fs: failed to create workqueue [ 2272.734202][T25767] EXT4-fs (loop3): mount failed 10:16:13 executing program 1: prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f00000002c0)=0x0) sched_setscheduler(r0, 0x2, &(0x7f0000000080)=0x6) r1 = getpid() sched_setscheduler(r1, 0x2, &(0x7f00000000c0)=0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r2, &(0x7f000057eff8)=@abs, 0x6e) sendmmsg$unix(r3, &(0x7f00000bd000), 0x318, 0x0) recvmmsg(r2, &(0x7f00000000c0), 0x10106, 0x2, 0x0) syz_mount_image$ext4(&(0x7f0000000180)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xfffbffff00000000, 0x8, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000600100000f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000006856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010300), 0x0, 0x640}, {&(0x7f0000010400)="03000000040000000500000016000f000300040000000000000000000f00698c", 0x20, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}, {&(0x7f0000011000)}, {0x0, 0x0, 0x6700000}, {&(0x7f0000000580), 0x0, 0xc000}], 0x0, &(0x7f0000013b00)=ANY=[@ANYBLOB]) r4 = creat(&(0x7f0000000000)='./file1\x00', 0x18) r5 = socket(0x10, 0x3, 0x0) sendmsg$nl_route(r5, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f00000005c0)=@ipv4_newroute={0x38, 0x18, 0xbad, 0x0, 0x0, {0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6}, [@RTA_ENCAP_TYPE={0x6, 0x15, 0x3}, @RTA_ENCAP={0x14, 0x16, 0x0, 0x1, @SEG6_IPTUNNEL_SRH={0xd}}]}, 0x38}}, 0x0) r6 = socket(0x26, 0x3, 0x0) sendmsg$nl_route(r6, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f00000005c0)=@ipv4_newroute={0x38, 0x18, 0xbad, 0x0, 0x0, {0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6}, [@RTA_ENCAP_TYPE={0x6, 0x15, 0x3}, @RTA_ENCAP={0x14, 0x16, 0x0, 0x1, @SEG6_IPTUNNEL_SRH={0xd}}]}, 0x38}}, 0x0) r7 = socket(0x10, 0x3, 0x0) sendmsg$nl_route(r7, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f00000005c0)=@ipv4_newroute={0x38, 0x18, 0xbad, 0x0, 0x0, {0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6}, [@RTA_ENCAP_TYPE={0x6, 0x15, 0x3}, @RTA_ENCAP={0x14, 0x16, 0x0, 0x1, @SEG6_IPTUNNEL_SRH={0xd}}]}, 0x38}}, 0x0) execveat(r4, &(0x7f0000000040)='./file0\x00', &(0x7f0000000380)=[&(0x7f00000001c0)='+{!#\x00', &(0x7f0000000300)='ext4\x00', &(0x7f0000000340)='@(\x00'], &(0x7f00000004c0)=[&(0x7f00000003c0)='ext4\x00', &(0x7f0000000400)='ext4\x00', &(0x7f0000000500)='\x00.D\x04\xe0\xce\x99\xd9\xa9\xac\xac\xadH\xa4\xcf\xb7\xffT\xac\x05\xfd\xdd\xb8w\x0f\x82B\xff\xf2\x909`1!\f\x870\x1f\xc1%Y\xc8\x15c \xea\x1cY!\x04\xe4\x91^\x00\x04\xe4\xa6\xba\xc6\xfd\x10\xdf\xe24\xd4&\x17\xdc\xec\xf4\f\n\xb7.\x13\x8e\x1bYENj\xe1\x19~\x1c\xaf\a;d\x9f\xba\xd9T\xd4-\xecX\xc0Y\x83@\xc7\x8b\xff*\xdd\xaa\xc6,o4\xe2\x0f\x16\x01[\xc0\xeb\x7fFI]WF\x1f\f?\xfa\xb1\xe7\xf6t\x027\xb1\xc17.4V\xf81{9\xa3\xb9\x01\xcck@I\xe2\xf1Y\x10E\xa1z/\x05.~Yh%\x8f\x06sB)N\x11P\xf6p\xff\'\xaf\a7\x10+p\xbb\xf3\xb08\xb5)\x00\xeeg\xd0\xee\xe9\x98\x8d\xf8\xb5G\t@f\x1et v\x14\tT\xc5', &(0x7f0000000480)=':--[\x00'], 0x1000) recvfrom(r2, &(0x7f0000000600)=""/203, 0xcb, 0x42, &(0x7f0000000700)=@hci={0x1f, 0xffffffffffffffff, 0x4}, 0x80) 10:16:14 executing program 3: prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f00000002c0)=0x0) sched_setscheduler(r0, 0x2, &(0x7f0000000080)=0x6) r1 = getpid() sched_setscheduler(r1, 0x2, &(0x7f00000000c0)=0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r2, &(0x7f000057eff8)=@abs, 0x6e) sendmmsg$unix(r3, &(0x7f00000bd000), 0x318, 0x0) recvmmsg(r2, &(0x7f00000000c0), 0x10106, 0x2, 0x0) syz_mount_image$ext4(&(0x7f0000000180)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xfffbffff00000000, 0x8, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000600100000f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000006856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010300), 0x0, 0x640}, {&(0x7f0000010400)="03000000040000000500000016000f000300040000000000000000000f00698c", 0x20, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}, {&(0x7f0000011000)}, {0x0, 0x0, 0x6700000}, {&(0x7f0000000580), 0x0, 0xc000}], 0x0, &(0x7f0000013b00)=ANY=[@ANYBLOB='\x00']) r4 = creat(&(0x7f0000000000)='./file1\x00', 0x18) r5 = socket(0x26, 0x3, 0x0) sendmsg$nl_route(r5, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f00000005c0)=@ipv4_newroute={0x38, 0x18, 0xbad, 0x0, 0x0, {0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6}, [@RTA_ENCAP_TYPE={0x6, 0x15, 0x3}, @RTA_ENCAP={0x14, 0x16, 0x0, 0x1, @SEG6_IPTUNNEL_SRH={0xd}}]}, 0x38}}, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f00000005c0)=@ipv4_newroute={0x38, 0x18, 0xbad, 0x0, 0x0, {0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6}, [@RTA_ENCAP_TYPE={0x6, 0x15, 0x3}, @RTA_ENCAP={0x14, 0x16, 0x0, 0x1, @SEG6_IPTUNNEL_SRH={0xd}}]}, 0x38}}, 0x0) execveat(r4, 0x0, &(0x7f0000000380)=[&(0x7f00000001c0)='+{!#\x00', &(0x7f0000000300)='ext4\x00', &(0x7f0000000340)='@(\x00'], &(0x7f00000004c0)=[&(0x7f00000003c0)='ext4\x00', &(0x7f0000000400)='ext4\x00', &(0x7f0000000500)='\x00.D\x04\xe0\xce\x99\xd9\xa9\xac\xac\xadH\xa4\xcf\xb7\xffT\xac\x05\xfd\xdd\xb8w\x0f\x82B\xff\xf2\x909`1!\f\x870\x1f\xc1%Y\xc8\x15c \xea\x1cY!\x04\xe4\x91^\x00\x04\xe4\xa6\xba\xc6\xfd\x10\xdf\xe24\xd4&\x17\xdc\xec\xf4\f\n\xb7.\x13\x8e\x1bYENj\xe1\x19~\x1c\xaf\a;d\x9f\xba\xd9T\xd4-\xecX\xc0Y\x83@\xc7\x8b\xff*\xdd\xaa\xc6,o4\xe2\x0f\x16\x01[\xc0\xeb\x7fFI]WF\x1f\f?\xfa\xb1\xe7\xf6t\x027\xb1\xc17.4V\xf81{9\xa3\xb9\x01\xcck@I\xe2\xf1Y\x10E\xa1z/\x05.~Yh%\x8f\x06sB)N\x11P\xf6p\xff\'\xaf\a7\x10+p\xbb\xf3\xb08\xb5)\x00\xeeg\xd0\xee\xe9\x98\x8d\xf8\xb5G\t@f\x1et v\x14\tT\xc5', 0x0], 0x1000) 10:16:14 executing program 0: prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f00000002c0)=0x0) sched_setscheduler(r0, 0x2, &(0x7f0000000080)=0x6) r1 = getpid() sched_setscheduler(r1, 0x2, &(0x7f00000000c0)=0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r2, &(0x7f000057eff8)=@abs, 0x6e) sendmmsg$unix(r3, &(0x7f00000bd000), 0x318, 0x0) recvmmsg(r2, &(0x7f00000000c0), 0x10106, 0x2, 0x0) syz_mount_image$ext4(&(0x7f0000000180)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xfffbffff00000000, 0x8, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000600100000f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000006856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010300), 0x0, 0x640}, {&(0x7f0000010400)="03000000040000000500000016000f000300040000000000000000000f00698c", 0x20, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}, {&(0x7f0000011000)}, {0x0, 0x0, 0x6700000}, {&(0x7f0000000580), 0x0, 0xc000}], 0x0, &(0x7f0000013b00)=ANY=[]) r4 = creat(&(0x7f0000000000)='./file1\x00', 0x18) r5 = socket(0x10, 0x3, 0x0) sendmsg$nl_route(r5, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f00000005c0)=@ipv4_newroute={0x38, 0x18, 0xbad, 0x0, 0x0, {0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6}, [@RTA_ENCAP_TYPE={0x6, 0x15, 0x3}, @RTA_ENCAP={0x14, 0x16, 0x0, 0x1, @SEG6_IPTUNNEL_SRH={0xd}}]}, 0x38}}, 0x0) r6 = socket(0x26, 0x3, 0x0) sendmsg$nl_route(r6, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f00000005c0)=@ipv4_newroute={0x38, 0x18, 0xbad, 0x0, 0x0, {0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6}, [@RTA_ENCAP_TYPE={0x6, 0x15, 0x3}, @RTA_ENCAP={0x14, 0x16, 0x0, 0x1, @SEG6_IPTUNNEL_SRH={0xd}}]}, 0x38}}, 0x0) r7 = socket(0x10, 0x3, 0x0) sendmsg$nl_route(r7, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f00000005c0)=@ipv4_newroute={0x38, 0x18, 0xbad, 0x0, 0x0, {0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6}, [@RTA_ENCAP_TYPE={0x6, 0x15, 0x3}, @RTA_ENCAP={0x14, 0x16, 0x0, 0x1, @SEG6_IPTUNNEL_SRH={0xd}}]}, 0x38}}, 0x0) execveat(r4, &(0x7f0000000040)='./file0\x00', &(0x7f0000000380)=[&(0x7f00000001c0)='+{!#\x00', &(0x7f0000000300)='ext4\x00', &(0x7f0000000340)='@(\x00'], &(0x7f00000004c0)=[&(0x7f00000003c0)='ext4\x00', &(0x7f0000000400)='ext4\x00', &(0x7f0000000500)='\x00.D\x04\xe0\xce\x99\xd9\xa9\xac\xac\xadH\xa4\xcf\xb7\xffT\xac\x05\xfd\xdd\xb8w\x0f\x82B\xff\xf2\x909`1!\f\x870\x1f\xc1%Y\xc8\x15c \xea\x1cY!\x04\xe4\x91^\x00\x04\xe4\xa6\xba\xc6\xfd\x10\xdf\xe24\xd4&\x17\xdc\xec\xf4\f\n\xb7.\x13\x8e\x1bYENj\xe1\x19~\x1c\xaf\a;d\x9f\xba\xd9T\xd4-\xecX\xc0Y\x83@\xc7\x8b\xff*\xdd\xaa\xc6,o4\xe2\x0f\x16\x01[\xc0\xeb\x7fFI]WF\x1f\f?\xfa\xb1\xe7\xf6t\x027\xb1\xc17.4V\xf81{9\xa3\xb9\x01\xcck@I\xe2\xf1Y\x10E\xa1z/\x05.~Yh%\x8f\x06sB)N\x11P\xf6p\xff\'\xaf\a7\x10+p\xbb\xf3\xb08\xb5)\x00\xeeg\xd0\xee\xe9\x98\x8d\xf8\xb5G\t@f\x1et v\x14\tT\xc5', &(0x7f0000000480)=':--[\x00'], 0x1000) recvfrom(r2, &(0x7f0000000600)=""/203, 0xcb, 0x42, &(0x7f0000000700)=@hci={0x1f, 0xffffffffffffffff, 0x4}, 0x80) 10:16:14 executing program 4: prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f00000002c0)=0x0) sched_setscheduler(r0, 0x2, &(0x7f0000000080)=0x6) r1 = getpid() sched_setscheduler(r1, 0x2, &(0x7f00000000c0)=0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r2, &(0x7f000057eff8)=@abs, 0x6e) sendmmsg$unix(r3, &(0x7f00000bd000), 0x318, 0x0) recvmmsg(r2, &(0x7f00000000c0), 0x10106, 0x2, 0x0) syz_mount_image$ext4(&(0x7f0000000180)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xfffbffff00000000, 0x8, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000600100000f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000006856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010300), 0x0, 0x640}, {&(0x7f0000010400)="03000000040000000500000016000f000300040000000000000000000f00698c", 0x20, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}, {&(0x7f0000011000)}, {0x0, 0x0, 0x6700000}, {&(0x7f0000000580), 0x0, 0xc000}], 0x0, &(0x7f0000013b00)=ANY=[]) r4 = creat(&(0x7f0000000000)='./file1\x00', 0x18) r5 = socket(0x10, 0x3, 0x0) sendmsg$nl_route(r5, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f00000005c0)=@ipv4_newroute={0x38, 0x18, 0xbad, 0x0, 0x0, {0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6}, [@RTA_ENCAP_TYPE={0x6, 0x15, 0x3}, @RTA_ENCAP={0x14, 0x16, 0x0, 0x1, @SEG6_IPTUNNEL_SRH={0xd}}]}, 0x38}}, 0x0) r6 = socket(0x26, 0x3, 0x0) sendmsg$nl_route(r6, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f00000005c0)=@ipv4_newroute={0x38, 0x18, 0xbad, 0x0, 0x0, {0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6}, [@RTA_ENCAP_TYPE={0x6, 0x15, 0x3}, @RTA_ENCAP={0x14, 0x16, 0x0, 0x1, @SEG6_IPTUNNEL_SRH={0xd}}]}, 0x38}}, 0x0) r7 = socket(0x10, 0x3, 0x0) sendmsg$nl_route(r7, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f00000005c0)=@ipv4_newroute={0x38, 0x18, 0xbad, 0x0, 0x0, {0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6}, [@RTA_ENCAP_TYPE={0x6, 0x15, 0x3}, @RTA_ENCAP={0x14, 0x16, 0x0, 0x1, @SEG6_IPTUNNEL_SRH={0xd}}]}, 0x38}}, 0x0) execveat(r4, &(0x7f0000000040)='./file0\x00', &(0x7f0000000380)=[&(0x7f00000001c0)='+{!#\x00', &(0x7f0000000300)='ext4\x00', &(0x7f0000000340)='@(\x00'], &(0x7f00000004c0)=[&(0x7f00000003c0)='ext4\x00', &(0x7f0000000400)='ext4\x00', &(0x7f0000000500)='\x00.D\x04\xe0\xce\x99\xd9\xa9\xac\xac\xadH\xa4\xcf\xb7\xffT\xac\x05\xfd\xdd\xb8w\x0f\x82B\xff\xf2\x909`1!\f\x870\x1f\xc1%Y\xc8\x15c \xea\x1cY!\x04\xe4\x91^\x00\x04\xe4\xa6\xba\xc6\xfd\x10\xdf\xe24\xd4&\x17\xdc\xec\xf4\f\n\xb7.\x13\x8e\x1bYENj\xe1\x19~\x1c\xaf\a;d\x9f\xba\xd9T\xd4-\xecX\xc0Y\x83@\xc7\x8b\xff*\xdd\xaa\xc6,o4\xe2\x0f\x16\x01[\xc0\xeb\x7fFI]WF\x1f\f?\xfa\xb1\xe7\xf6t\x027\xb1\xc17.4V\xf81{9\xa3\xb9\x01\xcck@I\xe2\xf1Y\x10E\xa1z/\x05.~Yh%\x8f\x06sB)N\x11P\xf6p\xff\'\xaf\a7\x10+p\xbb\xf3\xb08\xb5)\x00\xeeg\xd0\xee\xe9\x98\x8d\xf8\xb5G\t@f\x1et v\x14\tT\xc5', &(0x7f0000000480)=':--[\x00'], 0x1000) recvfrom(r2, &(0x7f0000000600)=""/203, 0xcb, 0x42, &(0x7f0000000700)=@hci={0x1f, 0xffffffffffffffff, 0x4}, 0x80) [ 2273.757743][T25769] EXT4-fs: error -4 creating inode table initialization thread [ 2273.765364][T25769] EXT4-fs (loop4): mount failed [ 2273.770620][T25766] EXT4-fs: error -4 creating inode table initialization thread [ 2273.778265][T25766] EXT4-fs (loop2): mount failed 10:16:14 executing program 2: prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f00000002c0)=0x0) sched_setscheduler(r0, 0x2, &(0x7f0000000080)=0x6) r1 = getpid() sched_setscheduler(r1, 0x2, &(0x7f00000000c0)=0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r2, &(0x7f000057eff8)=@abs, 0x6e) sendmmsg$unix(r3, &(0x7f00000bd000), 0x318, 0x0) recvmmsg(r2, &(0x7f00000000c0), 0x10106, 0x2, 0x0) syz_mount_image$ext4(&(0x7f0000000180)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xfffbffff00000000, 0x8, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000600100000f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000006856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010300), 0x0, 0x640}, {&(0x7f0000010400)="03000000040000000500000016000f000300040000000000000000000f00698c", 0x20, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}, {&(0x7f0000011000)}, {0x0, 0x0, 0x6700000}, {&(0x7f0000000580), 0x0, 0xc000}], 0x0, &(0x7f0000013b00)=ANY=[@ANYBLOB='\x00']) creat(&(0x7f0000000000)='./file1\x00', 0x18) socket(0x10, 0x3, 0x0) r4 = socket(0x26, 0x3, 0x0) sendmsg$nl_route(r4, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f00000005c0)=@ipv4_newroute={0x38, 0x18, 0xbad, 0x0, 0x0, {0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6}, [@RTA_ENCAP_TYPE={0x6, 0x15, 0x3}, @RTA_ENCAP={0x14, 0x16, 0x0, 0x1, @SEG6_IPTUNNEL_SRH={0xd}}]}, 0x38}}, 0x0) r5 = socket(0x10, 0x0, 0x0) sendmsg$nl_route(r5, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f00000005c0)=@ipv4_newroute={0x38, 0x18, 0xbad, 0x0, 0x0, {0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6}, [@RTA_ENCAP_TYPE={0x6, 0x15, 0x3}, @RTA_ENCAP={0x14, 0x16, 0x0, 0x1, @SEG6_IPTUNNEL_SRH={0xd}}]}, 0x38}}, 0x0) recvfrom(r2, &(0x7f0000000600)=""/203, 0xcb, 0x42, &(0x7f0000000700)=@hci={0x1f, 0xffffffffffffffff, 0x4}, 0x80) [ 2274.049839][T25777] I/O error, dev loop3, sector 264064 op 0x0:(READ) flags 0x80700 phys_seg 1 prio class 0 [ 2274.516144][T25776] I/O error, dev loop4, sector 264064 op 0x0:(READ) flags 0x80700 phys_seg 1 prio class 0 [ 2274.534607][T25775] I/O error, dev loop2, sector 264064 op 0x0:(READ) flags 0x80700 phys_seg 1 prio class 0 [ 2275.000418][T25808] loop2: detected capacity change from 0 to 264192 [ 2275.013072][T25809] loop3: detected capacity change from 0 to 264192 [ 2275.159995][T25810] loop4: detected capacity change from 0 to 264192 10:16:16 executing program 0: prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f00000002c0)=0x0) sched_setscheduler(r0, 0x2, &(0x7f0000000080)=0x6) r1 = getpid() sched_setscheduler(r1, 0x2, &(0x7f00000000c0)=0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r2, &(0x7f000057eff8)=@abs, 0x6e) sendmmsg$unix(r3, &(0x7f00000bd000), 0x318, 0x0) recvmmsg(r2, &(0x7f00000000c0), 0x10106, 0x2, 0x0) syz_mount_image$ext4(&(0x7f0000000180)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xfffbffff00000000, 0x8, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000600100000f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000006856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010300), 0x0, 0x640}, {&(0x7f0000010400)="03000000040000000500000016000f000300040000000000000000000f00698c", 0x20, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}, {&(0x7f0000011000)}, {0x0, 0x0, 0x6700000}, {&(0x7f0000000580), 0x0, 0xc000}], 0x0, &(0x7f0000013b00)=ANY=[]) r4 = creat(&(0x7f0000000000)='./file1\x00', 0x18) r5 = socket(0x10, 0x3, 0x0) sendmsg$nl_route(r5, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f00000005c0)=@ipv4_newroute={0x38, 0x18, 0xbad, 0x0, 0x0, {0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6}, [@RTA_ENCAP_TYPE={0x6, 0x15, 0x3}, @RTA_ENCAP={0x14, 0x16, 0x0, 0x1, @SEG6_IPTUNNEL_SRH={0xd}}]}, 0x38}}, 0x0) r6 = socket(0x26, 0x3, 0x0) sendmsg$nl_route(r6, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f00000005c0)=@ipv4_newroute={0x38, 0x18, 0xbad, 0x0, 0x0, {0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6}, [@RTA_ENCAP_TYPE={0x6, 0x15, 0x3}, @RTA_ENCAP={0x14, 0x16, 0x0, 0x1, @SEG6_IPTUNNEL_SRH={0xd}}]}, 0x38}}, 0x0) r7 = socket(0x10, 0x3, 0x0) sendmsg$nl_route(r7, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f00000005c0)=@ipv4_newroute={0x38, 0x18, 0xbad, 0x0, 0x0, {0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6}, [@RTA_ENCAP_TYPE={0x6, 0x15, 0x3}, @RTA_ENCAP={0x14, 0x16, 0x0, 0x1, @SEG6_IPTUNNEL_SRH={0xd}}]}, 0x38}}, 0x0) execveat(r4, &(0x7f0000000040)='./file0\x00', &(0x7f0000000380)=[&(0x7f00000001c0)='+{!#\x00', &(0x7f0000000300)='ext4\x00', &(0x7f0000000340)='@(\x00'], &(0x7f00000004c0)=[&(0x7f00000003c0)='ext4\x00', &(0x7f0000000400)='ext4\x00', &(0x7f0000000500)='\x00.D\x04\xe0\xce\x99\xd9\xa9\xac\xac\xadH\xa4\xcf\xb7\xffT\xac\x05\xfd\xdd\xb8w\x0f\x82B\xff\xf2\x909`1!\f\x870\x1f\xc1%Y\xc8\x15c \xea\x1cY!\x04\xe4\x91^\x00\x04\xe4\xa6\xba\xc6\xfd\x10\xdf\xe24\xd4&\x17\xdc\xec\xf4\f\n\xb7.\x13\x8e\x1bYENj\xe1\x19~\x1c\xaf\a;d\x9f\xba\xd9T\xd4-\xecX\xc0Y\x83@\xc7\x8b\xff*\xdd\xaa\xc6,o4\xe2\x0f\x16\x01[\xc0\xeb\x7fFI]WF\x1f\f?\xfa\xb1\xe7\xf6t\x027\xb1\xc17.4V\xf81{9\xa3\xb9\x01\xcck@I\xe2\xf1Y\x10E\xa1z/\x05.~Yh%\x8f\x06sB)N\x11P\xf6p\xff\'\xaf\a7\x10+p\xbb\xf3\xb08\xb5)\x00\xeeg\xd0\xee\xe9\x98\x8d\xf8\xb5G\t@f\x1et v\x14\tT\xc5', &(0x7f0000000480)=':--[\x00'], 0x1000) recvfrom(r2, &(0x7f0000000600)=""/203, 0xcb, 0x42, &(0x7f0000000700)=@hci={0x1f, 0xffffffffffffffff, 0x4}, 0x80) [ 2275.778451][T25808] EXT4-fs (loop2): mounted filesystem without journal. Quota mode: writeback. [ 2275.778728][T25809] EXT4-fs (loop3): mounted filesystem without journal. Quota mode: writeback. [ 2275.795735][T25810] EXT4-fs (loop4): mounted filesystem without journal. Quota mode: writeback. 10:16:23 executing program 5: prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f00000002c0)=0x0) sched_setscheduler(r0, 0x2, &(0x7f0000000080)=0x6) r1 = getpid() sched_setscheduler(r1, 0x2, &(0x7f00000000c0)=0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r2, &(0x7f000057eff8)=@abs, 0x6e) sendmmsg$unix(r3, &(0x7f00000bd000), 0x318, 0x0) recvmmsg(r2, &(0x7f00000000c0), 0x10106, 0x2, 0x0) syz_mount_image$ext4(&(0x7f0000000180)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xfffbffff00000000, 0x8, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000600100000f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000006856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010300), 0x0, 0x640}, {&(0x7f0000010400)="03000000040000000500000016000f000300040000000000000000000f00698c", 0x20, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}, {&(0x7f0000011000)}, {0x0, 0x0, 0x6700000}, {&(0x7f0000000580), 0x0, 0xc000}], 0x0, &(0x7f0000013b00)=ANY=[@ANYBLOB='\x00']) r4 = creat(0x0, 0x18) r5 = socket(0x10, 0x3, 0x0) sendmsg$nl_route(r5, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f00000005c0)=@ipv4_newroute={0x38, 0x18, 0xbad, 0x0, 0x0, {0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6}, [@RTA_ENCAP_TYPE={0x6, 0x15, 0x3}, @RTA_ENCAP={0x14, 0x16, 0x0, 0x1, @SEG6_IPTUNNEL_SRH={0xd}}]}, 0x38}}, 0x0) r6 = socket(0x26, 0x3, 0x0) sendmsg$nl_route(r6, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f00000005c0)=@ipv4_newroute={0x38, 0x18, 0xbad, 0x0, 0x0, {0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6}, [@RTA_ENCAP_TYPE={0x6, 0x15, 0x3}, @RTA_ENCAP={0x14, 0x16, 0x0, 0x1, @SEG6_IPTUNNEL_SRH={0xd}}]}, 0x38}}, 0x0) r7 = socket(0x10, 0x3, 0x0) sendmsg$nl_route(r7, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f00000005c0)=@ipv4_newroute={0x38, 0x18, 0xbad, 0x0, 0x0, {0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6}, [@RTA_ENCAP_TYPE={0x6, 0x15, 0x3}, @RTA_ENCAP={0x14, 0x16, 0x0, 0x1, @SEG6_IPTUNNEL_SRH={0xd}}]}, 0x38}}, 0x0) execveat(r4, &(0x7f0000000040)='./file0\x00', &(0x7f0000000380)=[&(0x7f00000001c0)='+{!#\x00', &(0x7f0000000300)='ext4\x00', &(0x7f0000000340)='@(\x00'], &(0x7f00000004c0)=[&(0x7f00000003c0)='ext4\x00', &(0x7f0000000400)='ext4\x00', &(0x7f0000000500)='\x00.D\x04\xe0\xce\x99\xd9\xa9\xac\xac\xadH\xa4\xcf\xb7\xffT\xac\x05\xfd\xdd\xb8w\x0f\x82B\xff\xf2\x909`1!\f\x870\x1f\xc1%Y\xc8\x15c \xea\x1cY!\x04\xe4\x91^\x00\x04\xe4\xa6\xba\xc6\xfd\x10\xdf\xe24\xd4&\x17\xdc\xec\xf4\f\n\xb7.\x13\x8e\x1bYENj\xe1\x19~\x1c\xaf\a;d\x9f\xba\xd9T\xd4-\xecX\xc0Y\x83@\xc7\x8b\xff*\xdd\xaa\xc6,o4\xe2\x0f\x16\x01[\xc0\xeb\x7fFI]WF\x1f\f?\xfa\xb1\xe7\xf6t\x027\xb1\xc17.4V\xf81{9\xa3\xb9\x01\xcck@I\xe2\xf1Y\x10E\xa1z/\x05.~Yh%\x8f\x06sB)N\x11P\xf6p\xff\'\xaf\a7\x10+p\xbb\xf3\xb08\xb5)\x00\xeeg\xd0\xee\xe9\x98\x8d\xf8\xb5G\t@f\x1et v\x14\tT\xc5', &(0x7f0000000480)=':--[\x00'], 0x1000) recvfrom(r2, &(0x7f0000000600)=""/203, 0xcb, 0x42, &(0x7f0000000700)=@hci={0x1f, 0xffffffffffffffff, 0x4}, 0x80) 10:16:23 executing program 1: prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f00000002c0)=0x0) sched_setscheduler(r0, 0x2, &(0x7f0000000080)=0x6) r1 = getpid() sched_setscheduler(r1, 0x2, &(0x7f00000000c0)=0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r2, &(0x7f000057eff8)=@abs, 0x6e) sendmmsg$unix(r3, &(0x7f00000bd000), 0x318, 0x0) recvmmsg(r2, &(0x7f00000000c0), 0x10106, 0x2, 0x0) syz_mount_image$ext4(&(0x7f0000000180)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xfffbffff00000000, 0x8, &(0x7f0000000200)=[{&(0x7f0000010000), 0x0, 0x400}, {&(0x7f0000010100)="0000000000000000000000006856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010300), 0x0, 0x640}, {&(0x7f0000010400)="03000000040000000500000016000f000300040000000000000000000f00698c", 0x20, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}, {&(0x7f0000011000)}, {0x0, 0x0, 0x6700000}, {&(0x7f0000000580), 0x0, 0xc000}], 0x0, &(0x7f0000013b00)=ANY=[@ANYBLOB='\x00']) r4 = creat(&(0x7f0000000000)='./file1\x00', 0x18) r5 = socket(0x10, 0x3, 0x0) sendmsg$nl_route(r5, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f00000005c0)=@ipv4_newroute={0x38, 0x18, 0xbad, 0x0, 0x0, {0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6}, [@RTA_ENCAP_TYPE={0x6, 0x15, 0x3}, @RTA_ENCAP={0x14, 0x16, 0x0, 0x1, @SEG6_IPTUNNEL_SRH={0xd}}]}, 0x38}}, 0x0) r6 = socket(0x26, 0x3, 0x0) sendmsg$nl_route(r6, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f00000005c0)=@ipv4_newroute={0x38, 0x18, 0xbad, 0x0, 0x0, {0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6}, [@RTA_ENCAP_TYPE={0x6, 0x15, 0x3}, @RTA_ENCAP={0x14, 0x16, 0x0, 0x1, @SEG6_IPTUNNEL_SRH={0xd}}]}, 0x38}}, 0x0) r7 = socket(0x10, 0x3, 0x0) sendmsg$nl_route(r7, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f00000005c0)=@ipv4_newroute={0x38, 0x18, 0xbad, 0x0, 0x0, {0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6}, [@RTA_ENCAP_TYPE={0x6, 0x15, 0x3}, @RTA_ENCAP={0x14, 0x16, 0x0, 0x1, @SEG6_IPTUNNEL_SRH={0xd}}]}, 0x38}}, 0x0) execveat(r4, &(0x7f0000000040)='./file0\x00', &(0x7f0000000380)=[&(0x7f00000001c0)='+{!#\x00', &(0x7f0000000300)='ext4\x00', &(0x7f0000000340)='@(\x00'], &(0x7f00000004c0)=[&(0x7f00000003c0)='ext4\x00', &(0x7f0000000400)='ext4\x00', &(0x7f0000000500)='\x00.D\x04\xe0\xce\x99\xd9\xa9\xac\xac\xadH\xa4\xcf\xb7\xffT\xac\x05\xfd\xdd\xb8w\x0f\x82B\xff\xf2\x909`1!\f\x870\x1f\xc1%Y\xc8\x15c \xea\x1cY!\x04\xe4\x91^\x00\x04\xe4\xa6\xba\xc6\xfd\x10\xdf\xe24\xd4&\x17\xdc\xec\xf4\f\n\xb7.\x13\x8e\x1bYENj\xe1\x19~\x1c\xaf\a;d\x9f\xba\xd9T\xd4-\xecX\xc0Y\x83@\xc7\x8b\xff*\xdd\xaa\xc6,o4\xe2\x0f\x16\x01[\xc0\xeb\x7fFI]WF\x1f\f?\xfa\xb1\xe7\xf6t\x027\xb1\xc17.4V\xf81{9\xa3\xb9\x01\xcck@I\xe2\xf1Y\x10E\xa1z/\x05.~Yh%\x8f\x06sB)N\x11P\xf6p\xff\'\xaf\a7\x10+p\xbb\xf3\xb08\xb5)\x00\xeeg\xd0\xee\xe9\x98\x8d\xf8\xb5G\t@f\x1et v\x14\tT\xc5', &(0x7f0000000480)=':--[\x00'], 0x1000) recvfrom(r2, &(0x7f0000000600)=""/203, 0xcb, 0x42, &(0x7f0000000700)=@hci={0x1f, 0xffffffffffffffff, 0x4}, 0x80) 10:16:23 executing program 4: prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f00000002c0)=0x0) sched_setscheduler(r0, 0x2, &(0x7f0000000080)=0x6) r1 = getpid() sched_setscheduler(r1, 0x2, &(0x7f00000000c0)=0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r2, &(0x7f000057eff8)=@abs, 0x6e) sendmmsg$unix(r3, &(0x7f00000bd000), 0x318, 0x0) recvmmsg(r2, &(0x7f00000000c0), 0x10106, 0x2, 0x0) syz_mount_image$ext4(&(0x7f0000000180)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xfffbffff00000000, 0x8, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000600100000f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000006856d49a00cc4371bd6a7c893f280045010040", 0x1f}, {&(0x7f0000010300), 0x0, 0x640}, {&(0x7f0000010400)="03000000040000000500000016000f000300040000000000000000000f00698c", 0x20, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}, {&(0x7f0000011000)}, {0x0, 0x0, 0x6700000}, {&(0x7f0000000580), 0x0, 0xc000}], 0x0, &(0x7f0000013b00)=ANY=[@ANYBLOB='\x00']) r4 = creat(&(0x7f0000000000)='./file1\x00', 0x18) r5 = socket(0x10, 0x3, 0x0) sendmsg$nl_route(r5, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f00000005c0)=@ipv4_newroute={0x38, 0x18, 0xbad, 0x0, 0x0, {0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6}, [@RTA_ENCAP_TYPE={0x6, 0x15, 0x3}, @RTA_ENCAP={0x14, 0x16, 0x0, 0x1, @SEG6_IPTUNNEL_SRH={0xd}}]}, 0x38}}, 0x0) r6 = socket(0x26, 0x3, 0x0) sendmsg$nl_route(r6, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f00000005c0)=@ipv4_newroute={0x38, 0x18, 0xbad, 0x0, 0x0, {0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6}, [@RTA_ENCAP_TYPE={0x6, 0x15, 0x3}, @RTA_ENCAP={0x14, 0x16, 0x0, 0x1, @SEG6_IPTUNNEL_SRH={0xd}}]}, 0x38}}, 0x0) r7 = socket(0x10, 0x3, 0x0) sendmsg$nl_route(r7, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f00000005c0)=@ipv4_newroute={0x38, 0x18, 0xbad, 0x0, 0x0, {0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6}, [@RTA_ENCAP_TYPE={0x6, 0x15, 0x3}, @RTA_ENCAP={0x14, 0x16, 0x0, 0x1, @SEG6_IPTUNNEL_SRH={0xd}}]}, 0x38}}, 0x0) execveat(r4, &(0x7f0000000040)='./file0\x00', &(0x7f0000000380)=[&(0x7f00000001c0)='+{!#\x00', &(0x7f0000000300)='ext4\x00', &(0x7f0000000340)='@(\x00'], &(0x7f00000004c0)=[&(0x7f00000003c0)='ext4\x00', &(0x7f0000000400)='ext4\x00', &(0x7f0000000500)='\x00.D\x04\xe0\xce\x99\xd9\xa9\xac\xac\xadH\xa4\xcf\xb7\xffT\xac\x05\xfd\xdd\xb8w\x0f\x82B\xff\xf2\x909`1!\f\x870\x1f\xc1%Y\xc8\x15c \xea\x1cY!\x04\xe4\x91^\x00\x04\xe4\xa6\xba\xc6\xfd\x10\xdf\xe24\xd4&\x17\xdc\xec\xf4\f\n\xb7.\x13\x8e\x1bYENj\xe1\x19~\x1c\xaf\a;d\x9f\xba\xd9T\xd4-\xecX\xc0Y\x83@\xc7\x8b\xff*\xdd\xaa\xc6,o4\xe2\x0f\x16\x01[\xc0\xeb\x7fFI]WF\x1f\f?\xfa\xb1\xe7\xf6t\x027\xb1\xc17.4V\xf81{9\xa3\xb9\x01\xcck@I\xe2\xf1Y\x10E\xa1z/\x05.~Yh%\x8f\x06sB)N\x11P\xf6p\xff\'\xaf\a7\x10+p\xbb\xf3\xb08\xb5)\x00\xeeg\xd0\xee\xe9\x98\x8d\xf8\xb5G\t@f\x1et v\x14\tT\xc5', &(0x7f0000000480)=':--[\x00'], 0x1000) recvfrom(r2, &(0x7f0000000600)=""/203, 0xcb, 0x42, &(0x7f0000000700)=@hci={0x1f, 0xffffffffffffffff, 0x4}, 0x80) 10:16:23 executing program 3: prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f00000002c0)=0x0) sched_setscheduler(r0, 0x2, &(0x7f0000000080)=0x6) r1 = getpid() sched_setscheduler(r1, 0x2, &(0x7f00000000c0)=0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r2, &(0x7f000057eff8)=@abs, 0x6e) sendmmsg$unix(r3, &(0x7f00000bd000), 0x318, 0x0) recvmmsg(r2, &(0x7f00000000c0), 0x10106, 0x2, 0x0) syz_mount_image$ext4(&(0x7f0000000180)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xfffbffff00000000, 0x8, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000600100000f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000006856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010300), 0x0, 0x640}, {&(0x7f0000010400)="03000000040000000500000016000f000300040000000000000000000f00698c", 0x20, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}, {&(0x7f0000011000)}, {0x0, 0x0, 0x6700000}, {&(0x7f0000000580), 0x0, 0xc000}], 0x0, &(0x7f0000013b00)=ANY=[@ANYBLOB='\x00']) socket(0x10, 0x3, 0x0) r4 = socket(0x26, 0x3, 0x0) sendmsg$nl_route(r4, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f00000005c0)=@ipv4_newroute={0x38, 0x18, 0xbad, 0x0, 0x0, {0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6}, [@RTA_ENCAP_TYPE={0x6, 0x15, 0x3}, @RTA_ENCAP={0x14, 0x16, 0x0, 0x1, @SEG6_IPTUNNEL_SRH={0xd}}]}, 0x38}}, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f00000005c0)=@ipv4_newroute={0x38, 0x18, 0xbad, 0x0, 0x0, {0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6}, [@RTA_ENCAP_TYPE={0x6, 0x15, 0x3}, @RTA_ENCAP={0x14, 0x16, 0x0, 0x1, @SEG6_IPTUNNEL_SRH={0xd}}]}, 0x38}}, 0x0) execveat(0xffffffffffffffff, 0x0, &(0x7f0000000380)=[&(0x7f00000001c0)='+{!#\x00', &(0x7f0000000300)='ext4\x00', &(0x7f0000000340)='@(\x00'], &(0x7f00000004c0)=[&(0x7f00000003c0)='ext4\x00', &(0x7f0000000400)='ext4\x00', &(0x7f0000000500)='\x00.D\x04\xe0\xce\x99\xd9\xa9\xac\xac\xadH\xa4\xcf\xb7\xffT\xac\x05\xfd\xdd\xb8w\x0f\x82B\xff\xf2\x909`1!\f\x870\x1f\xc1%Y\xc8\x15c \xea\x1cY!\x04\xe4\x91^\x00\x04\xe4\xa6\xba\xc6\xfd\x10\xdf\xe24\xd4&\x17\xdc\xec\xf4\f\n\xb7.\x13\x8e\x1bYENj\xe1\x19~\x1c\xaf\a;d\x9f\xba\xd9T\xd4-\xecX\xc0Y\x83@\xc7\x8b\xff*\xdd\xaa\xc6,o4\xe2\x0f\x16\x01[\xc0\xeb\x7fFI]WF\x1f\f?\xfa\xb1\xe7\xf6t\x027\xb1\xc17.4V\xf81{9\xa3\xb9\x01\xcck@I\xe2\xf1Y\x10E\xa1z/\x05.~Yh%\x8f\x06sB)N\x11P\xf6p\xff\'\xaf\a7\x10+p\xbb\xf3\xb08\xb5)\x00\xeeg\xd0\xee\xe9\x98\x8d\xf8\xb5G\t@f\x1et v\x14\tT\xc5', 0x0], 0x1000) 10:16:23 executing program 2: prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f00000002c0)=0x0) sched_setscheduler(r0, 0x2, &(0x7f0000000080)=0x6) r1 = getpid() sched_setscheduler(r1, 0x2, &(0x7f00000000c0)=0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r2, &(0x7f000057eff8)=@abs, 0x6e) sendmmsg$unix(r3, &(0x7f00000bd000), 0x318, 0x0) recvmmsg(r2, &(0x7f00000000c0), 0x10106, 0x2, 0x0) syz_mount_image$ext4(&(0x7f0000000180)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xfffbffff00000000, 0x8, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000600100000f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000006856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010300), 0x0, 0x640}, {&(0x7f0000010400)="03000000040000000500000016000f000300040000000000000000000f00698c", 0x20, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}, {&(0x7f0000011000)}, {0x0, 0x0, 0x6700000}, {&(0x7f0000000580), 0x0, 0xc000}], 0x0, &(0x7f0000013b00)=ANY=[@ANYBLOB='\x00']) creat(&(0x7f0000000000)='./file1\x00', 0x18) socket(0x10, 0x3, 0x0) r4 = socket(0x26, 0x3, 0x0) sendmsg$nl_route(r4, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f00000005c0)=@ipv4_newroute={0x38, 0x18, 0xbad, 0x0, 0x0, {0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6}, [@RTA_ENCAP_TYPE={0x6, 0x15, 0x3}, @RTA_ENCAP={0x14, 0x16, 0x0, 0x1, @SEG6_IPTUNNEL_SRH={0xd}}]}, 0x38}}, 0x0) r5 = socket(0x10, 0x0, 0x0) sendmsg$nl_route(r5, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f00000005c0)=@ipv4_newroute={0x38, 0x18, 0xbad, 0x0, 0x0, {0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6}, [@RTA_ENCAP_TYPE={0x6, 0x15, 0x3}, @RTA_ENCAP={0x14, 0x16, 0x0, 0x1, @SEG6_IPTUNNEL_SRH={0xd}}]}, 0x38}}, 0x0) recvfrom(r2, &(0x7f0000000600)=""/203, 0xcb, 0x42, &(0x7f0000000700)=@hci={0x1f, 0xffffffffffffffff, 0x4}, 0x80) 10:16:23 executing program 0: prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f00000002c0)=0x0) sched_setscheduler(r0, 0x2, &(0x7f0000000080)=0x6) r1 = getpid() sched_setscheduler(r1, 0x2, &(0x7f00000000c0)=0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r2, &(0x7f000057eff8)=@abs, 0x6e) sendmmsg$unix(r3, &(0x7f00000bd000), 0x318, 0x0) recvmmsg(r2, &(0x7f00000000c0), 0x10106, 0x2, 0x0) syz_mount_image$ext4(&(0x7f0000000180)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xfffbffff00000000, 0x8, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000600100000f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000006856d49a00cc4371bd6a7c893f280045010040", 0x1f}, {&(0x7f0000010300), 0x0, 0x640}, {&(0x7f0000010400)="03000000040000000500000016000f000300040000000000000000000f00698c", 0x20, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}, {&(0x7f0000011000)}, {0x0, 0x0, 0x6700000}, {&(0x7f0000000580), 0x0, 0xc000}], 0x0, &(0x7f0000013b00)=ANY=[@ANYBLOB='\x00']) r4 = creat(&(0x7f0000000000)='./file1\x00', 0x18) r5 = socket(0x10, 0x3, 0x0) sendmsg$nl_route(r5, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f00000005c0)=@ipv4_newroute={0x38, 0x18, 0xbad, 0x0, 0x0, {0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6}, [@RTA_ENCAP_TYPE={0x6, 0x15, 0x3}, @RTA_ENCAP={0x14, 0x16, 0x0, 0x1, @SEG6_IPTUNNEL_SRH={0xd}}]}, 0x38}}, 0x0) r6 = socket(0x26, 0x3, 0x0) sendmsg$nl_route(r6, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f00000005c0)=@ipv4_newroute={0x38, 0x18, 0xbad, 0x0, 0x0, {0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6}, [@RTA_ENCAP_TYPE={0x6, 0x15, 0x3}, @RTA_ENCAP={0x14, 0x16, 0x0, 0x1, @SEG6_IPTUNNEL_SRH={0xd}}]}, 0x38}}, 0x0) r7 = socket(0x10, 0x3, 0x0) sendmsg$nl_route(r7, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f00000005c0)=@ipv4_newroute={0x38, 0x18, 0xbad, 0x0, 0x0, {0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6}, [@RTA_ENCAP_TYPE={0x6, 0x15, 0x3}, @RTA_ENCAP={0x14, 0x16, 0x0, 0x1, @SEG6_IPTUNNEL_SRH={0xd}}]}, 0x38}}, 0x0) execveat(r4, &(0x7f0000000040)='./file0\x00', &(0x7f0000000380)=[&(0x7f00000001c0)='+{!#\x00', &(0x7f0000000300)='ext4\x00', &(0x7f0000000340)='@(\x00'], &(0x7f00000004c0)=[&(0x7f00000003c0)='ext4\x00', &(0x7f0000000400)='ext4\x00', &(0x7f0000000500)='\x00.D\x04\xe0\xce\x99\xd9\xa9\xac\xac\xadH\xa4\xcf\xb7\xffT\xac\x05\xfd\xdd\xb8w\x0f\x82B\xff\xf2\x909`1!\f\x870\x1f\xc1%Y\xc8\x15c \xea\x1cY!\x04\xe4\x91^\x00\x04\xe4\xa6\xba\xc6\xfd\x10\xdf\xe24\xd4&\x17\xdc\xec\xf4\f\n\xb7.\x13\x8e\x1bYENj\xe1\x19~\x1c\xaf\a;d\x9f\xba\xd9T\xd4-\xecX\xc0Y\x83@\xc7\x8b\xff*\xdd\xaa\xc6,o4\xe2\x0f\x16\x01[\xc0\xeb\x7fFI]WF\x1f\f?\xfa\xb1\xe7\xf6t\x027\xb1\xc17.4V\xf81{9\xa3\xb9\x01\xcck@I\xe2\xf1Y\x10E\xa1z/\x05.~Yh%\x8f\x06sB)N\x11P\xf6p\xff\'\xaf\a7\x10+p\xbb\xf3\xb08\xb5)\x00\xeeg\xd0\xee\xe9\x98\x8d\xf8\xb5G\t@f\x1et v\x14\tT\xc5', &(0x7f0000000480)=':--[\x00'], 0x1000) recvfrom(r2, &(0x7f0000000600)=""/203, 0xcb, 0x42, &(0x7f0000000700)=@hci={0x1f, 0xffffffffffffffff, 0x4}, 0x80) [ 2283.269323][T25845] loop2: detected capacity change from 0 to 264192 [ 2283.459389][T25848] loop3: detected capacity change from 0 to 264192 [ 2283.629614][T25849] loop4: detected capacity change from 0 to 264192 [ 2284.925912][T25849] EXT4-fs (loop4): unsupported descriptor size 0 [ 2285.608956][T25845] EXT4-fs: failed to create workqueue [ 2285.614367][T25845] EXT4-fs (loop2): mount failed 10:16:27 executing program 2: prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f00000002c0)=0x0) sched_setscheduler(r0, 0x2, &(0x7f0000000080)=0x6) r1 = getpid() sched_setscheduler(r1, 0x2, &(0x7f00000000c0)=0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r2, &(0x7f000057eff8)=@abs, 0x6e) sendmmsg$unix(r3, &(0x7f00000bd000), 0x318, 0x0) recvmmsg(r2, &(0x7f00000000c0), 0x10106, 0x2, 0x0) syz_mount_image$ext4(&(0x7f0000000180)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xfffbffff00000000, 0x8, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000600100000f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000006856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010300), 0x0, 0x640}, {&(0x7f0000010400)="03000000040000000500000016000f000300040000000000000000000f00698c", 0x20, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}, {&(0x7f0000011000)}, {0x0, 0x0, 0x6700000}, {&(0x7f0000000580), 0x0, 0xc000}], 0x0, &(0x7f0000013b00)=ANY=[@ANYBLOB='\x00']) creat(&(0x7f0000000000)='./file1\x00', 0x18) socket(0x10, 0x3, 0x0) r4 = socket(0x26, 0x3, 0x0) sendmsg$nl_route(r4, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f00000005c0)=@ipv4_newroute={0x38, 0x18, 0xbad, 0x0, 0x0, {0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6}, [@RTA_ENCAP_TYPE={0x6, 0x15, 0x3}, @RTA_ENCAP={0x14, 0x16, 0x0, 0x1, @SEG6_IPTUNNEL_SRH={0xd}}]}, 0x38}}, 0x0) r5 = socket(0x10, 0x0, 0x0) sendmsg$nl_route(r5, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f00000005c0)=@ipv4_newroute={0x38, 0x18, 0xbad, 0x0, 0x0, {0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6}, [@RTA_ENCAP_TYPE={0x6, 0x15, 0x3}, @RTA_ENCAP={0x14, 0x16, 0x0, 0x1, @SEG6_IPTUNNEL_SRH={0xd}}]}, 0x38}}, 0x0) recvfrom(r2, &(0x7f0000000600)=""/203, 0xcb, 0x42, &(0x7f0000000700)=@hci={0x1f, 0xffffffffffffffff, 0x4}, 0x80) [ 2286.596591][T25848] EXT4-fs: error -4 creating inode table initialization thread [ 2286.604254][T25848] EXT4-fs (loop3): mount failed 10:16:27 executing program 4: prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f00000002c0)=0x0) sched_setscheduler(r0, 0x2, &(0x7f0000000080)=0x6) r1 = getpid() sched_setscheduler(r1, 0x2, &(0x7f00000000c0)=0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r2, &(0x7f000057eff8)=@abs, 0x6e) sendmmsg$unix(r3, &(0x7f00000bd000), 0x318, 0x0) recvmmsg(r2, &(0x7f00000000c0), 0x10106, 0x2, 0x0) syz_mount_image$ext4(&(0x7f0000000180)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xfffbffff00000000, 0x8, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000600100000f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000006856d49a", 0x10, 0x4e0}, {&(0x7f0000010300), 0x0, 0x640}, {&(0x7f0000010400)="03000000040000000500000016000f000300040000000000000000000f00698c", 0x20, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}, {&(0x7f0000011000)}, {0x0, 0x0, 0x6700000}, {&(0x7f0000000580), 0x0, 0xc000}], 0x0, &(0x7f0000013b00)=ANY=[@ANYBLOB='\x00']) r4 = creat(&(0x7f0000000000)='./file1\x00', 0x18) r5 = socket(0x10, 0x3, 0x0) sendmsg$nl_route(r5, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f00000005c0)=@ipv4_newroute={0x38, 0x18, 0xbad, 0x0, 0x0, {0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6}, [@RTA_ENCAP_TYPE={0x6, 0x15, 0x3}, @RTA_ENCAP={0x14, 0x16, 0x0, 0x1, @SEG6_IPTUNNEL_SRH={0xd}}]}, 0x38}}, 0x0) r6 = socket(0x26, 0x3, 0x0) sendmsg$nl_route(r6, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f00000005c0)=@ipv4_newroute={0x38, 0x18, 0xbad, 0x0, 0x0, {0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6}, [@RTA_ENCAP_TYPE={0x6, 0x15, 0x3}, @RTA_ENCAP={0x14, 0x16, 0x0, 0x1, @SEG6_IPTUNNEL_SRH={0xd}}]}, 0x38}}, 0x0) r7 = socket(0x10, 0x3, 0x0) sendmsg$nl_route(r7, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f00000005c0)=@ipv4_newroute={0x38, 0x18, 0xbad, 0x0, 0x0, {0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6}, [@RTA_ENCAP_TYPE={0x6, 0x15, 0x3}, @RTA_ENCAP={0x14, 0x16, 0x0, 0x1, @SEG6_IPTUNNEL_SRH={0xd}}]}, 0x38}}, 0x0) execveat(r4, &(0x7f0000000040)='./file0\x00', &(0x7f0000000380)=[&(0x7f00000001c0)='+{!#\x00', &(0x7f0000000300)='ext4\x00', &(0x7f0000000340)='@(\x00'], &(0x7f00000004c0)=[&(0x7f00000003c0)='ext4\x00', &(0x7f0000000400)='ext4\x00', &(0x7f0000000500)='\x00.D\x04\xe0\xce\x99\xd9\xa9\xac\xac\xadH\xa4\xcf\xb7\xffT\xac\x05\xfd\xdd\xb8w\x0f\x82B\xff\xf2\x909`1!\f\x870\x1f\xc1%Y\xc8\x15c \xea\x1cY!\x04\xe4\x91^\x00\x04\xe4\xa6\xba\xc6\xfd\x10\xdf\xe24\xd4&\x17\xdc\xec\xf4\f\n\xb7.\x13\x8e\x1bYENj\xe1\x19~\x1c\xaf\a;d\x9f\xba\xd9T\xd4-\xecX\xc0Y\x83@\xc7\x8b\xff*\xdd\xaa\xc6,o4\xe2\x0f\x16\x01[\xc0\xeb\x7fFI]WF\x1f\f?\xfa\xb1\xe7\xf6t\x027\xb1\xc17.4V\xf81{9\xa3\xb9\x01\xcck@I\xe2\xf1Y\x10E\xa1z/\x05.~Yh%\x8f\x06sB)N\x11P\xf6p\xff\'\xaf\a7\x10+p\xbb\xf3\xb08\xb5)\x00\xeeg\xd0\xee\xe9\x98\x8d\xf8\xb5G\t@f\x1et v\x14\tT\xc5', &(0x7f0000000480)=':--[\x00'], 0x1000) recvfrom(r2, &(0x7f0000000600)=""/203, 0xcb, 0x42, &(0x7f0000000700)=@hci={0x1f, 0xffffffffffffffff, 0x4}, 0x80) 10:16:27 executing program 1: prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f00000002c0)=0x0) sched_setscheduler(r0, 0x2, &(0x7f0000000080)=0x6) r1 = getpid() sched_setscheduler(r1, 0x2, &(0x7f00000000c0)=0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r2, &(0x7f000057eff8)=@abs, 0x6e) sendmmsg$unix(r3, &(0x7f00000bd000), 0x318, 0x0) recvmmsg(r2, &(0x7f00000000c0), 0x10106, 0x2, 0x0) syz_mount_image$ext4(&(0x7f0000000180)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xfffbffff00000000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000600100000f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010300), 0x0, 0x640}, {&(0x7f0000010400)="03000000040000000500000016000f000300040000000000000000000f00698c", 0x20, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}, {&(0x7f0000011000)}, {0x0, 0x0, 0x6700000}, {&(0x7f0000000580), 0x0, 0xc000}], 0x0, &(0x7f0000013b00)=ANY=[@ANYBLOB='\x00']) r4 = creat(&(0x7f0000000000)='./file1\x00', 0x18) r5 = socket(0x10, 0x3, 0x0) sendmsg$nl_route(r5, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f00000005c0)=@ipv4_newroute={0x38, 0x18, 0xbad, 0x0, 0x0, {0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6}, [@RTA_ENCAP_TYPE={0x6, 0x15, 0x3}, @RTA_ENCAP={0x14, 0x16, 0x0, 0x1, @SEG6_IPTUNNEL_SRH={0xd}}]}, 0x38}}, 0x0) r6 = socket(0x26, 0x3, 0x0) sendmsg$nl_route(r6, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f00000005c0)=@ipv4_newroute={0x38, 0x18, 0xbad, 0x0, 0x0, {0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6}, [@RTA_ENCAP_TYPE={0x6, 0x15, 0x3}, @RTA_ENCAP={0x14, 0x16, 0x0, 0x1, @SEG6_IPTUNNEL_SRH={0xd}}]}, 0x38}}, 0x0) r7 = socket(0x10, 0x3, 0x0) sendmsg$nl_route(r7, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f00000005c0)=@ipv4_newroute={0x38, 0x18, 0xbad, 0x0, 0x0, {0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6}, [@RTA_ENCAP_TYPE={0x6, 0x15, 0x3}, @RTA_ENCAP={0x14, 0x16, 0x0, 0x1, @SEG6_IPTUNNEL_SRH={0xd}}]}, 0x38}}, 0x0) execveat(r4, &(0x7f0000000040)='./file0\x00', &(0x7f0000000380)=[&(0x7f00000001c0)='+{!#\x00', &(0x7f0000000300)='ext4\x00', &(0x7f0000000340)='@(\x00'], &(0x7f00000004c0)=[&(0x7f00000003c0)='ext4\x00', &(0x7f0000000400)='ext4\x00', &(0x7f0000000500)='\x00.D\x04\xe0\xce\x99\xd9\xa9\xac\xac\xadH\xa4\xcf\xb7\xffT\xac\x05\xfd\xdd\xb8w\x0f\x82B\xff\xf2\x909`1!\f\x870\x1f\xc1%Y\xc8\x15c \xea\x1cY!\x04\xe4\x91^\x00\x04\xe4\xa6\xba\xc6\xfd\x10\xdf\xe24\xd4&\x17\xdc\xec\xf4\f\n\xb7.\x13\x8e\x1bYENj\xe1\x19~\x1c\xaf\a;d\x9f\xba\xd9T\xd4-\xecX\xc0Y\x83@\xc7\x8b\xff*\xdd\xaa\xc6,o4\xe2\x0f\x16\x01[\xc0\xeb\x7fFI]WF\x1f\f?\xfa\xb1\xe7\xf6t\x027\xb1\xc17.4V\xf81{9\xa3\xb9\x01\xcck@I\xe2\xf1Y\x10E\xa1z/\x05.~Yh%\x8f\x06sB)N\x11P\xf6p\xff\'\xaf\a7\x10+p\xbb\xf3\xb08\xb5)\x00\xeeg\xd0\xee\xe9\x98\x8d\xf8\xb5G\t@f\x1et v\x14\tT\xc5', &(0x7f0000000480)=':--[\x00'], 0x1000) recvfrom(r2, &(0x7f0000000600)=""/203, 0xcb, 0x42, &(0x7f0000000700)=@hci={0x1f, 0xffffffffffffffff, 0x4}, 0x80) 10:16:27 executing program 3: prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f00000002c0)=0x0) sched_setscheduler(r0, 0x2, &(0x7f0000000080)=0x6) r1 = getpid() sched_setscheduler(r1, 0x2, &(0x7f00000000c0)=0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r2, &(0x7f000057eff8)=@abs, 0x6e) sendmmsg$unix(r3, &(0x7f00000bd000), 0x318, 0x0) recvmmsg(r2, &(0x7f00000000c0), 0x10106, 0x2, 0x0) syz_mount_image$ext4(&(0x7f0000000180)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xfffbffff00000000, 0x8, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000600100000f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000006856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010300), 0x0, 0x640}, {&(0x7f0000010400)="03000000040000000500000016000f000300040000000000000000000f00698c", 0x20, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}, {&(0x7f0000011000)}, {0x0, 0x0, 0x6700000}, {&(0x7f0000000580), 0x0, 0xc000}], 0x0, &(0x7f0000013b00)=ANY=[@ANYBLOB='\x00']) socket(0x10, 0x3, 0x0) r4 = socket(0x26, 0x3, 0x0) sendmsg$nl_route(r4, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f00000005c0)=@ipv4_newroute={0x38, 0x18, 0xbad, 0x0, 0x0, {0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6}, [@RTA_ENCAP_TYPE={0x6, 0x15, 0x3}, @RTA_ENCAP={0x14, 0x16, 0x0, 0x1, @SEG6_IPTUNNEL_SRH={0xd}}]}, 0x38}}, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f00000005c0)=@ipv4_newroute={0x38, 0x18, 0xbad, 0x0, 0x0, {0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6}, [@RTA_ENCAP_TYPE={0x6, 0x15, 0x3}, @RTA_ENCAP={0x14, 0x16, 0x0, 0x1, @SEG6_IPTUNNEL_SRH={0xd}}]}, 0x38}}, 0x0) execveat(0xffffffffffffffff, 0x0, &(0x7f0000000380)=[&(0x7f00000001c0)='+{!#\x00', &(0x7f0000000300)='ext4\x00', &(0x7f0000000340)='@(\x00'], &(0x7f00000004c0)=[&(0x7f00000003c0)='ext4\x00', &(0x7f0000000400)='ext4\x00', &(0x7f0000000500)='\x00.D\x04\xe0\xce\x99\xd9\xa9\xac\xac\xadH\xa4\xcf\xb7\xffT\xac\x05\xfd\xdd\xb8w\x0f\x82B\xff\xf2\x909`1!\f\x870\x1f\xc1%Y\xc8\x15c \xea\x1cY!\x04\xe4\x91^\x00\x04\xe4\xa6\xba\xc6\xfd\x10\xdf\xe24\xd4&\x17\xdc\xec\xf4\f\n\xb7.\x13\x8e\x1bYENj\xe1\x19~\x1c\xaf\a;d\x9f\xba\xd9T\xd4-\xecX\xc0Y\x83@\xc7\x8b\xff*\xdd\xaa\xc6,o4\xe2\x0f\x16\x01[\xc0\xeb\x7fFI]WF\x1f\f?\xfa\xb1\xe7\xf6t\x027\xb1\xc17.4V\xf81{9\xa3\xb9\x01\xcck@I\xe2\xf1Y\x10E\xa1z/\x05.~Yh%\x8f\x06sB)N\x11P\xf6p\xff\'\xaf\a7\x10+p\xbb\xf3\xb08\xb5)\x00\xeeg\xd0\xee\xe9\x98\x8d\xf8\xb5G\t@f\x1et v\x14\tT\xc5', 0x0], 0x1000) 10:16:27 executing program 0: prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f00000002c0)=0x0) sched_setscheduler(r0, 0x2, &(0x7f0000000080)=0x6) r1 = getpid() sched_setscheduler(r1, 0x2, &(0x7f00000000c0)=0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r2, &(0x7f000057eff8)=@abs, 0x6e) sendmmsg$unix(r3, &(0x7f00000bd000), 0x318, 0x0) recvmmsg(r2, &(0x7f00000000c0), 0x10106, 0x2, 0x0) syz_mount_image$ext4(&(0x7f0000000180)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xfffbffff00000000, 0x8, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000600100000f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000006856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010300)}, {&(0x7f0000010400)="03000000040000000500000016000f000300040000000000000000000f00698c", 0x20, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}, {&(0x7f0000011000)}, {0x0, 0x0, 0x6700000}, {&(0x7f0000000580), 0x0, 0xc000}], 0x0, &(0x7f0000013b00)=ANY=[@ANYBLOB='\x00']) r4 = creat(&(0x7f0000000000)='./file1\x00', 0x18) r5 = socket(0x10, 0x3, 0x0) sendmsg$nl_route(r5, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f00000005c0)=@ipv4_newroute={0x38, 0x18, 0xbad, 0x0, 0x0, {0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6}, [@RTA_ENCAP_TYPE={0x6, 0x15, 0x3}, @RTA_ENCAP={0x14, 0x16, 0x0, 0x1, @SEG6_IPTUNNEL_SRH={0xd}}]}, 0x38}}, 0x0) r6 = socket(0x26, 0x3, 0x0) sendmsg$nl_route(r6, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f00000005c0)=@ipv4_newroute={0x38, 0x18, 0xbad, 0x0, 0x0, {0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6}, [@RTA_ENCAP_TYPE={0x6, 0x15, 0x3}, @RTA_ENCAP={0x14, 0x16, 0x0, 0x1, @SEG6_IPTUNNEL_SRH={0xd}}]}, 0x38}}, 0x0) r7 = socket(0x10, 0x3, 0x0) sendmsg$nl_route(r7, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f00000005c0)=@ipv4_newroute={0x38, 0x18, 0xbad, 0x0, 0x0, {0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6}, [@RTA_ENCAP_TYPE={0x6, 0x15, 0x3}, @RTA_ENCAP={0x14, 0x16, 0x0, 0x1, @SEG6_IPTUNNEL_SRH={0xd}}]}, 0x38}}, 0x0) execveat(r4, &(0x7f0000000040)='./file0\x00', &(0x7f0000000380)=[&(0x7f00000001c0)='+{!#\x00', &(0x7f0000000300)='ext4\x00', &(0x7f0000000340)='@(\x00'], &(0x7f00000004c0)=[&(0x7f00000003c0)='ext4\x00', &(0x7f0000000400)='ext4\x00', &(0x7f0000000500)='\x00.D\x04\xe0\xce\x99\xd9\xa9\xac\xac\xadH\xa4\xcf\xb7\xffT\xac\x05\xfd\xdd\xb8w\x0f\x82B\xff\xf2\x909`1!\f\x870\x1f\xc1%Y\xc8\x15c \xea\x1cY!\x04\xe4\x91^\x00\x04\xe4\xa6\xba\xc6\xfd\x10\xdf\xe24\xd4&\x17\xdc\xec\xf4\f\n\xb7.\x13\x8e\x1bYENj\xe1\x19~\x1c\xaf\a;d\x9f\xba\xd9T\xd4-\xecX\xc0Y\x83@\xc7\x8b\xff*\xdd\xaa\xc6,o4\xe2\x0f\x16\x01[\xc0\xeb\x7fFI]WF\x1f\f?\xfa\xb1\xe7\xf6t\x027\xb1\xc17.4V\xf81{9\xa3\xb9\x01\xcck@I\xe2\xf1Y\x10E\xa1z/\x05.~Yh%\x8f\x06sB)N\x11P\xf6p\xff\'\xaf\a7\x10+p\xbb\xf3\xb08\xb5)\x00\xeeg\xd0\xee\xe9\x98\x8d\xf8\xb5G\t@f\x1et v\x14\tT\xc5', &(0x7f0000000480)=':--[\x00'], 0x1000) recvfrom(r2, &(0x7f0000000600)=""/203, 0xcb, 0x42, &(0x7f0000000700)=@hci={0x1f, 0xffffffffffffffff, 0x4}, 0x80) [ 2287.169985][T25885] loop4: detected capacity change from 0 to 264192 [ 2287.610534][T25888] loop2: detected capacity change from 0 to 264192 [ 2287.830585][T25857] I/O error, dev loop3, sector 264064 op 0x0:(READ) flags 0x80700 phys_seg 1 prio class 0 [ 2288.078826][T25885] EXT4-fs (loop4): unsupported descriptor size 0 10:16:28 executing program 0: prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f00000002c0)=0x0) sched_setscheduler(r0, 0x2, &(0x7f0000000080)=0x6) r1 = getpid() sched_setscheduler(r1, 0x2, &(0x7f00000000c0)=0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r2, &(0x7f000057eff8)=@abs, 0x6e) sendmmsg$unix(r3, &(0x7f00000bd000), 0x318, 0x0) recvmmsg(r2, &(0x7f00000000c0), 0x10106, 0x2, 0x0) syz_mount_image$ext4(&(0x7f0000000180)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xfffbffff00000000, 0x8, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000600100000f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000006856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010300)}, {&(0x7f0000010400)="03000000040000000500000016000f000300040000000000000000000f00698c", 0x20, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}, {&(0x7f0000011000)}, {0x0, 0x0, 0x6700000}, {&(0x7f0000000580), 0x0, 0xc000}], 0x0, &(0x7f0000013b00)=ANY=[@ANYBLOB='\x00']) r4 = creat(&(0x7f0000000000)='./file1\x00', 0x18) r5 = socket(0x10, 0x3, 0x0) sendmsg$nl_route(r5, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f00000005c0)=@ipv4_newroute={0x38, 0x18, 0xbad, 0x0, 0x0, {0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6}, [@RTA_ENCAP_TYPE={0x6, 0x15, 0x3}, @RTA_ENCAP={0x14, 0x16, 0x0, 0x1, @SEG6_IPTUNNEL_SRH={0xd}}]}, 0x38}}, 0x0) r6 = socket(0x26, 0x3, 0x0) sendmsg$nl_route(r6, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f00000005c0)=@ipv4_newroute={0x38, 0x18, 0xbad, 0x0, 0x0, {0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6}, [@RTA_ENCAP_TYPE={0x6, 0x15, 0x3}, @RTA_ENCAP={0x14, 0x16, 0x0, 0x1, @SEG6_IPTUNNEL_SRH={0xd}}]}, 0x38}}, 0x0) r7 = socket(0x10, 0x3, 0x0) sendmsg$nl_route(r7, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f00000005c0)=@ipv4_newroute={0x38, 0x18, 0xbad, 0x0, 0x0, {0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6}, [@RTA_ENCAP_TYPE={0x6, 0x15, 0x3}, @RTA_ENCAP={0x14, 0x16, 0x0, 0x1, @SEG6_IPTUNNEL_SRH={0xd}}]}, 0x38}}, 0x0) execveat(r4, &(0x7f0000000040)='./file0\x00', &(0x7f0000000380)=[&(0x7f00000001c0)='+{!#\x00', &(0x7f0000000300)='ext4\x00', &(0x7f0000000340)='@(\x00'], &(0x7f00000004c0)=[&(0x7f00000003c0)='ext4\x00', &(0x7f0000000400)='ext4\x00', &(0x7f0000000500)='\x00.D\x04\xe0\xce\x99\xd9\xa9\xac\xac\xadH\xa4\xcf\xb7\xffT\xac\x05\xfd\xdd\xb8w\x0f\x82B\xff\xf2\x909`1!\f\x870\x1f\xc1%Y\xc8\x15c \xea\x1cY!\x04\xe4\x91^\x00\x04\xe4\xa6\xba\xc6\xfd\x10\xdf\xe24\xd4&\x17\xdc\xec\xf4\f\n\xb7.\x13\x8e\x1bYENj\xe1\x19~\x1c\xaf\a;d\x9f\xba\xd9T\xd4-\xecX\xc0Y\x83@\xc7\x8b\xff*\xdd\xaa\xc6,o4\xe2\x0f\x16\x01[\xc0\xeb\x7fFI]WF\x1f\f?\xfa\xb1\xe7\xf6t\x027\xb1\xc17.4V\xf81{9\xa3\xb9\x01\xcck@I\xe2\xf1Y\x10E\xa1z/\x05.~Yh%\x8f\x06sB)N\x11P\xf6p\xff\'\xaf\a7\x10+p\xbb\xf3\xb08\xb5)\x00\xeeg\xd0\xee\xe9\x98\x8d\xf8\xb5G\t@f\x1et v\x14\tT\xc5', &(0x7f0000000480)=':--[\x00'], 0x1000) recvfrom(r2, &(0x7f0000000600)=""/203, 0xcb, 0x42, &(0x7f0000000700)=@hci={0x1f, 0xffffffffffffffff, 0x4}, 0x80) [ 2288.402101][T25897] loop3: detected capacity change from 0 to 264192 [ 2288.418105][T25888] EXT4-fs: error -4 creating inode table initialization thread [ 2288.425842][T25888] EXT4-fs (loop2): mount failed [ 2289.129184][T25897] EXT4-fs: error -4 creating inode table initialization thread [ 2289.136810][T25897] EXT4-fs (loop3): mount failed 10:16:37 executing program 5: prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f00000002c0)=0x0) sched_setscheduler(r0, 0x2, &(0x7f0000000080)=0x6) r1 = getpid() sched_setscheduler(r1, 0x2, &(0x7f00000000c0)=0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r2, &(0x7f000057eff8)=@abs, 0x6e) sendmmsg$unix(r3, &(0x7f00000bd000), 0x318, 0x0) recvmmsg(r2, &(0x7f00000000c0), 0x10106, 0x2, 0x0) syz_mount_image$ext4(&(0x7f0000000180)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xfffbffff00000000, 0x8, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000600100000f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000006856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010300), 0x0, 0x640}, {&(0x7f0000010400)="03000000040000000500000016000f00", 0x10, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}, {&(0x7f0000011000)}, {0x0, 0x0, 0x6700000}, {&(0x7f0000000580), 0x0, 0xc000}], 0x0, &(0x7f0000013b00)=ANY=[@ANYBLOB='\x00']) r4 = creat(&(0x7f0000000000)='./file1\x00', 0x18) r5 = socket(0x10, 0x3, 0x0) sendmsg$nl_route(r5, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f00000005c0)=@ipv4_newroute={0x38, 0x18, 0xbad, 0x0, 0x0, {0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6}, [@RTA_ENCAP_TYPE={0x6, 0x15, 0x3}, @RTA_ENCAP={0x14, 0x16, 0x0, 0x1, @SEG6_IPTUNNEL_SRH={0xd}}]}, 0x38}}, 0x0) r6 = socket(0x26, 0x3, 0x0) sendmsg$nl_route(r6, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f00000005c0)=@ipv4_newroute={0x38, 0x18, 0xbad, 0x0, 0x0, {0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6}, [@RTA_ENCAP_TYPE={0x6, 0x15, 0x3}, @RTA_ENCAP={0x14, 0x16, 0x0, 0x1, @SEG6_IPTUNNEL_SRH={0xd}}]}, 0x38}}, 0x0) r7 = socket(0x10, 0x3, 0x0) sendmsg$nl_route(r7, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f00000005c0)=@ipv4_newroute={0x38, 0x18, 0xbad, 0x0, 0x0, {0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6}, [@RTA_ENCAP_TYPE={0x6, 0x15, 0x3}, @RTA_ENCAP={0x14, 0x16, 0x0, 0x1, @SEG6_IPTUNNEL_SRH={0xd}}]}, 0x38}}, 0x0) execveat(r4, &(0x7f0000000040)='./file0\x00', &(0x7f0000000380)=[&(0x7f00000001c0)='+{!#\x00', &(0x7f0000000300)='ext4\x00', &(0x7f0000000340)='@(\x00'], &(0x7f00000004c0)=[&(0x7f00000003c0)='ext4\x00', &(0x7f0000000400)='ext4\x00', &(0x7f0000000500)='\x00.D\x04\xe0\xce\x99\xd9\xa9\xac\xac\xadH\xa4\xcf\xb7\xffT\xac\x05\xfd\xdd\xb8w\x0f\x82B\xff\xf2\x909`1!\f\x870\x1f\xc1%Y\xc8\x15c \xea\x1cY!\x04\xe4\x91^\x00\x04\xe4\xa6\xba\xc6\xfd\x10\xdf\xe24\xd4&\x17\xdc\xec\xf4\f\n\xb7.\x13\x8e\x1bYENj\xe1\x19~\x1c\xaf\a;d\x9f\xba\xd9T\xd4-\xecX\xc0Y\x83@\xc7\x8b\xff*\xdd\xaa\xc6,o4\xe2\x0f\x16\x01[\xc0\xeb\x7fFI]WF\x1f\f?\xfa\xb1\xe7\xf6t\x027\xb1\xc17.4V\xf81{9\xa3\xb9\x01\xcck@I\xe2\xf1Y\x10E\xa1z/\x05.~Yh%\x8f\x06sB)N\x11P\xf6p\xff\'\xaf\a7\x10+p\xbb\xf3\xb08\xb5)\x00\xeeg\xd0\xee\xe9\x98\x8d\xf8\xb5G\t@f\x1et v\x14\tT\xc5', &(0x7f0000000480)=':--[\x00'], 0x1000) recvfrom(r2, &(0x7f0000000600)=""/203, 0xcb, 0x42, &(0x7f0000000700)=@hci={0x1f, 0xffffffffffffffff, 0x4}, 0x80) 10:16:37 executing program 2: prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f00000002c0)=0x0) sched_setscheduler(r0, 0x2, &(0x7f0000000080)=0x6) r1 = getpid() sched_setscheduler(r1, 0x2, &(0x7f00000000c0)=0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r2, &(0x7f000057eff8)=@abs, 0x6e) sendmmsg$unix(r3, &(0x7f00000bd000), 0x318, 0x0) recvmmsg(r2, &(0x7f00000000c0), 0x10106, 0x2, 0x0) syz_mount_image$ext4(&(0x7f0000000180)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xfffbffff00000000, 0x8, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000600100000f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000006856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010300), 0x0, 0x640}, {&(0x7f0000010400)="03000000040000000500000016000f000300040000000000000000000f00698c", 0x20, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}, {&(0x7f0000011000)}, {0x0, 0x0, 0x6700000}, {&(0x7f0000000580), 0x0, 0xc000}], 0x0, &(0x7f0000013b00)=ANY=[@ANYBLOB='\x00']) creat(&(0x7f0000000000)='./file1\x00', 0x18) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f00000005c0)=@ipv4_newroute={0x38, 0x18, 0xbad, 0x0, 0x0, {}, [@RTA_ENCAP_TYPE={0x6, 0x15, 0x3}, @RTA_ENCAP={0x14, 0x16, 0x0, 0x1, @SEG6_IPTUNNEL_SRH={0xd}}]}, 0x38}}, 0x0) r4 = socket(0x26, 0x3, 0x0) sendmsg$nl_route(r4, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f00000005c0)=@ipv4_newroute={0x38, 0x18, 0xbad, 0x0, 0x0, {0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6}, [@RTA_ENCAP_TYPE={0x6, 0x15, 0x3}, @RTA_ENCAP={0x14, 0x16, 0x0, 0x1, @SEG6_IPTUNNEL_SRH={0xd}}]}, 0x38}}, 0x0) r5 = socket(0x10, 0x0, 0x0) sendmsg$nl_route(r5, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f00000005c0)=@ipv4_newroute={0x38, 0x18, 0xbad, 0x0, 0x0, {0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6}, [@RTA_ENCAP_TYPE={0x6, 0x15, 0x3}, @RTA_ENCAP={0x14, 0x16, 0x0, 0x1, @SEG6_IPTUNNEL_SRH={0xd}}]}, 0x38}}, 0x0) recvfrom(r2, &(0x7f0000000600)=""/203, 0xcb, 0x42, &(0x7f0000000700)=@hci={0x1f, 0xffffffffffffffff, 0x4}, 0x80) 10:16:37 executing program 1: prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f00000002c0)=0x0) sched_setscheduler(r0, 0x2, &(0x7f0000000080)=0x6) r1 = getpid() sched_setscheduler(r1, 0x2, &(0x7f00000000c0)=0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r2, &(0x7f000057eff8)=@abs, 0x6e) sendmmsg$unix(r3, &(0x7f00000bd000), 0x318, 0x0) recvmmsg(r2, &(0x7f00000000c0), 0x10106, 0x2, 0x0) syz_mount_image$ext4(&(0x7f0000000180)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xfffbffff00000000, 0x8, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000600100000f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000006856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010300), 0x0, 0x640}, {&(0x7f0000010400)="03000000040000000500000016000f000300040000000000000000000f00698c", 0x20, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}, {&(0x7f0000011000)}, {0x0, 0x0, 0x6700000}, {&(0x7f0000000580), 0x0, 0xc000}], 0x0, &(0x7f0000013b00)=ANY=[@ANYBLOB='\x00']) creat(&(0x7f0000000000)='./file1\x00', 0x18) socket(0x10, 0x3, 0x0) r4 = socket(0x26, 0x3, 0x0) sendmsg$nl_route(r4, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f00000005c0)=@ipv4_newroute={0x38, 0x18, 0xbad, 0x0, 0x0, {0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6}, [@RTA_ENCAP_TYPE={0x6, 0x15, 0x3}, @RTA_ENCAP={0x14, 0x16, 0x0, 0x1, @SEG6_IPTUNNEL_SRH={0xd}}]}, 0x38}}, 0x0) r5 = socket(0x10, 0x0, 0x0) sendmsg$nl_route(r5, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f00000005c0)=@ipv4_newroute={0x38, 0x18, 0xbad, 0x0, 0x0, {0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6}, [@RTA_ENCAP_TYPE={0x6, 0x15, 0x3}, @RTA_ENCAP={0x14, 0x16, 0x0, 0x1, @SEG6_IPTUNNEL_SRH={0xd}}]}, 0x38}}, 0x0) recvfrom(r2, &(0x7f0000000600)=""/203, 0xcb, 0x42, &(0x7f0000000700)=@hci={0x1f, 0xffffffffffffffff, 0x4}, 0x80) 10:16:37 executing program 4: prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f00000002c0)=0x0) sched_setscheduler(r0, 0x2, &(0x7f0000000080)=0x6) r1 = getpid() sched_setscheduler(r1, 0x2, &(0x7f00000000c0)=0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r2, &(0x7f000057eff8)=@abs, 0x6e) sendmmsg$unix(r3, &(0x7f00000bd000), 0x318, 0x0) recvmmsg(r2, &(0x7f00000000c0), 0x10106, 0x2, 0x0) syz_mount_image$ext4(&(0x7f0000000180)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xfffbffff00000000, 0x8, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000600100000f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000006856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {0x0, 0x0, 0x640}, {&(0x7f0000010400)="03000000040000000500000016000f000300040000000000000000000f00698c", 0x20, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}, {&(0x7f0000011000)}, {0x0, 0x0, 0x6700000}, {&(0x7f0000000580), 0x0, 0xc000}], 0x0, &(0x7f0000013b00)=ANY=[@ANYBLOB='\x00']) r4 = creat(&(0x7f0000000000)='./file1\x00', 0x18) r5 = socket(0x10, 0x3, 0x0) sendmsg$nl_route(r5, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f00000005c0)=@ipv4_newroute={0x38, 0x18, 0xbad, 0x0, 0x0, {0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6}, [@RTA_ENCAP_TYPE={0x6, 0x15, 0x3}, @RTA_ENCAP={0x14, 0x16, 0x0, 0x1, @SEG6_IPTUNNEL_SRH={0xd}}]}, 0x38}}, 0x0) r6 = socket(0x26, 0x3, 0x0) sendmsg$nl_route(r6, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f00000005c0)=@ipv4_newroute={0x38, 0x18, 0xbad, 0x0, 0x0, {0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6}, [@RTA_ENCAP_TYPE={0x6, 0x15, 0x3}, @RTA_ENCAP={0x14, 0x16, 0x0, 0x1, @SEG6_IPTUNNEL_SRH={0xd}}]}, 0x38}}, 0x0) r7 = socket(0x10, 0x3, 0x0) sendmsg$nl_route(r7, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f00000005c0)=@ipv4_newroute={0x38, 0x18, 0xbad, 0x0, 0x0, {0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6}, [@RTA_ENCAP_TYPE={0x6, 0x15, 0x3}, @RTA_ENCAP={0x14, 0x16, 0x0, 0x1, @SEG6_IPTUNNEL_SRH={0xd}}]}, 0x38}}, 0x0) execveat(r4, &(0x7f0000000040)='./file0\x00', &(0x7f0000000380)=[&(0x7f00000001c0)='+{!#\x00', &(0x7f0000000300)='ext4\x00', &(0x7f0000000340)='@(\x00'], &(0x7f00000004c0)=[&(0x7f00000003c0)='ext4\x00', &(0x7f0000000400)='ext4\x00', &(0x7f0000000500)='\x00.D\x04\xe0\xce\x99\xd9\xa9\xac\xac\xadH\xa4\xcf\xb7\xffT\xac\x05\xfd\xdd\xb8w\x0f\x82B\xff\xf2\x909`1!\f\x870\x1f\xc1%Y\xc8\x15c \xea\x1cY!\x04\xe4\x91^\x00\x04\xe4\xa6\xba\xc6\xfd\x10\xdf\xe24\xd4&\x17\xdc\xec\xf4\f\n\xb7.\x13\x8e\x1bYENj\xe1\x19~\x1c\xaf\a;d\x9f\xba\xd9T\xd4-\xecX\xc0Y\x83@\xc7\x8b\xff*\xdd\xaa\xc6,o4\xe2\x0f\x16\x01[\xc0\xeb\x7fFI]WF\x1f\f?\xfa\xb1\xe7\xf6t\x027\xb1\xc17.4V\xf81{9\xa3\xb9\x01\xcck@I\xe2\xf1Y\x10E\xa1z/\x05.~Yh%\x8f\x06sB)N\x11P\xf6p\xff\'\xaf\a7\x10+p\xbb\xf3\xb08\xb5)\x00\xeeg\xd0\xee\xe9\x98\x8d\xf8\xb5G\t@f\x1et v\x14\tT\xc5', &(0x7f0000000480)=':--[\x00'], 0x1000) recvfrom(r2, &(0x7f0000000600)=""/203, 0xcb, 0x42, &(0x7f0000000700)=@hci={0x1f, 0xffffffffffffffff, 0x4}, 0x80) 10:16:37 executing program 3: prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f00000002c0)=0x0) sched_setscheduler(r0, 0x2, &(0x7f0000000080)=0x6) r1 = getpid() sched_setscheduler(r1, 0x2, &(0x7f00000000c0)=0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r2, &(0x7f000057eff8)=@abs, 0x6e) sendmmsg$unix(r3, &(0x7f00000bd000), 0x318, 0x0) recvmmsg(r2, &(0x7f00000000c0), 0x10106, 0x2, 0x0) syz_mount_image$ext4(&(0x7f0000000180)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xfffbffff00000000, 0x8, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000600100000f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000006856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010300), 0x0, 0x640}, {&(0x7f0000010400)="03000000040000000500000016000f000300040000000000000000000f00698c", 0x20, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}, {&(0x7f0000011000)}, {0x0, 0x0, 0x6700000}, {&(0x7f0000000580), 0x0, 0xc000}], 0x0, &(0x7f0000013b00)=ANY=[@ANYBLOB='\x00']) socket(0x10, 0x3, 0x0) r4 = socket(0x26, 0x3, 0x0) sendmsg$nl_route(r4, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f00000005c0)=@ipv4_newroute={0x38, 0x18, 0xbad, 0x0, 0x0, {0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6}, [@RTA_ENCAP_TYPE={0x6, 0x15, 0x3}, @RTA_ENCAP={0x14, 0x16, 0x0, 0x1, @SEG6_IPTUNNEL_SRH={0xd}}]}, 0x38}}, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f00000005c0)=@ipv4_newroute={0x38, 0x18, 0xbad, 0x0, 0x0, {0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6}, [@RTA_ENCAP_TYPE={0x6, 0x15, 0x3}, @RTA_ENCAP={0x14, 0x16, 0x0, 0x1, @SEG6_IPTUNNEL_SRH={0xd}}]}, 0x38}}, 0x0) execveat(0xffffffffffffffff, 0x0, &(0x7f0000000380)=[&(0x7f00000001c0)='+{!#\x00', &(0x7f0000000300)='ext4\x00', &(0x7f0000000340)='@(\x00'], &(0x7f00000004c0)=[&(0x7f00000003c0)='ext4\x00', &(0x7f0000000400)='ext4\x00', &(0x7f0000000500)='\x00.D\x04\xe0\xce\x99\xd9\xa9\xac\xac\xadH\xa4\xcf\xb7\xffT\xac\x05\xfd\xdd\xb8w\x0f\x82B\xff\xf2\x909`1!\f\x870\x1f\xc1%Y\xc8\x15c \xea\x1cY!\x04\xe4\x91^\x00\x04\xe4\xa6\xba\xc6\xfd\x10\xdf\xe24\xd4&\x17\xdc\xec\xf4\f\n\xb7.\x13\x8e\x1bYENj\xe1\x19~\x1c\xaf\a;d\x9f\xba\xd9T\xd4-\xecX\xc0Y\x83@\xc7\x8b\xff*\xdd\xaa\xc6,o4\xe2\x0f\x16\x01[\xc0\xeb\x7fFI]WF\x1f\f?\xfa\xb1\xe7\xf6t\x027\xb1\xc17.4V\xf81{9\xa3\xb9\x01\xcck@I\xe2\xf1Y\x10E\xa1z/\x05.~Yh%\x8f\x06sB)N\x11P\xf6p\xff\'\xaf\a7\x10+p\xbb\xf3\xb08\xb5)\x00\xeeg\xd0\xee\xe9\x98\x8d\xf8\xb5G\t@f\x1et v\x14\tT\xc5', 0x0], 0x1000) 10:16:37 executing program 0: prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f00000002c0)=0x0) sched_setscheduler(r0, 0x2, &(0x7f0000000080)=0x6) r1 = getpid() sched_setscheduler(r1, 0x2, &(0x7f00000000c0)=0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r2, &(0x7f000057eff8)=@abs, 0x6e) sendmmsg$unix(r3, &(0x7f00000bd000), 0x318, 0x0) recvmmsg(r2, &(0x7f00000000c0), 0x10106, 0x2, 0x0) syz_mount_image$ext4(&(0x7f0000000180)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xfffbffff00000000, 0x8, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000600100000f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000006856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010300), 0x0, 0x640}, {&(0x7f0000010400)="03000000040000000500000016000f000300040000000000000000000f00698c", 0x20, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}, {&(0x7f0000011000)}, {0x0, 0x0, 0x6700000}, {&(0x7f0000000580), 0x0, 0xc000}], 0x0, &(0x7f0000013b00)=ANY=[@ANYBLOB='\x00']) socket(0x10, 0x3, 0x0) r4 = socket(0x26, 0x3, 0x0) sendmsg$nl_route(r4, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f00000005c0)=@ipv4_newroute={0x38, 0x18, 0xbad, 0x0, 0x0, {0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6}, [@RTA_ENCAP_TYPE={0x6, 0x15, 0x3}, @RTA_ENCAP={0x14, 0x16, 0x0, 0x1, @SEG6_IPTUNNEL_SRH={0xd}}]}, 0x38}}, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f00000005c0)=@ipv4_newroute={0x38, 0x18, 0xbad, 0x0, 0x0, {0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6}, [@RTA_ENCAP_TYPE={0x6, 0x15, 0x3}, @RTA_ENCAP={0x14, 0x16, 0x0, 0x1, @SEG6_IPTUNNEL_SRH={0xd}}]}, 0x38}}, 0x0) execveat(0xffffffffffffffff, 0x0, &(0x7f0000000380)=[&(0x7f00000001c0)='+{!#\x00', &(0x7f0000000300)='ext4\x00', &(0x7f0000000340)='@(\x00'], &(0x7f00000004c0)=[&(0x7f00000003c0)='ext4\x00', &(0x7f0000000400)='ext4\x00', &(0x7f0000000500)='\x00.D\x04\xe0\xce\x99\xd9\xa9\xac\xac\xadH\xa4\xcf\xb7\xffT\xac\x05\xfd\xdd\xb8w\x0f\x82B\xff\xf2\x909`1!\f\x870\x1f\xc1%Y\xc8\x15c \xea\x1cY!\x04\xe4\x91^\x00\x04\xe4\xa6\xba\xc6\xfd\x10\xdf\xe24\xd4&\x17\xdc\xec\xf4\f\n\xb7.\x13\x8e\x1bYENj\xe1\x19~\x1c\xaf\a;d\x9f\xba\xd9T\xd4-\xecX\xc0Y\x83@\xc7\x8b\xff*\xdd\xaa\xc6,o4\xe2\x0f\x16\x01[\xc0\xeb\x7fFI]WF\x1f\f?\xfa\xb1\xe7\xf6t\x027\xb1\xc17.4V\xf81{9\xa3\xb9\x01\xcck@I\xe2\xf1Y\x10E\xa1z/\x05.~Yh%\x8f\x06sB)N\x11P\xf6p\xff\'\xaf\a7\x10+p\xbb\xf3\xb08\xb5)\x00\xeeg\xd0\xee\xe9\x98\x8d\xf8\xb5G\t@f\x1et v\x14\tT\xc5', 0x0], 0x1000) [ 2297.809315][T25934] loop2: detected capacity change from 0 to 264192 [ 2298.279463][T25936] loop3: detected capacity change from 0 to 264192 [ 2298.287315][T25937] loop4: detected capacity change from 0 to 264192 10:16:40 executing program 0: prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f00000002c0)=0x0) sched_setscheduler(r0, 0x2, &(0x7f0000000080)=0x6) r1 = getpid() sched_setscheduler(r1, 0x2, &(0x7f00000000c0)=0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r2, &(0x7f000057eff8)=@abs, 0x6e) sendmmsg$unix(r3, &(0x7f00000bd000), 0x318, 0x0) recvmmsg(r2, &(0x7f00000000c0), 0x10106, 0x2, 0x0) syz_mount_image$ext4(&(0x7f0000000180)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xfffbffff00000000, 0x8, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000600100000f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000006856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010300), 0x0, 0x640}, {&(0x7f0000010400)="03000000040000000500000016000f00", 0x10, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}, {&(0x7f0000011000)}, {0x0, 0x0, 0x6700000}, {&(0x7f0000000580), 0x0, 0xc000}], 0x0, &(0x7f0000013b00)=ANY=[@ANYBLOB='\x00']) r4 = creat(&(0x7f0000000000)='./file1\x00', 0x18) r5 = socket(0x10, 0x3, 0x0) sendmsg$nl_route(r5, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f00000005c0)=@ipv4_newroute={0x38, 0x18, 0xbad, 0x0, 0x0, {0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6}, [@RTA_ENCAP_TYPE={0x6, 0x15, 0x3}, @RTA_ENCAP={0x14, 0x16, 0x0, 0x1, @SEG6_IPTUNNEL_SRH={0xd}}]}, 0x38}}, 0x0) r6 = socket(0x26, 0x3, 0x0) sendmsg$nl_route(r6, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f00000005c0)=@ipv4_newroute={0x38, 0x18, 0xbad, 0x0, 0x0, {0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6}, [@RTA_ENCAP_TYPE={0x6, 0x15, 0x3}, @RTA_ENCAP={0x14, 0x16, 0x0, 0x1, @SEG6_IPTUNNEL_SRH={0xd}}]}, 0x38}}, 0x0) r7 = socket(0x10, 0x3, 0x0) sendmsg$nl_route(r7, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f00000005c0)=@ipv4_newroute={0x38, 0x18, 0xbad, 0x0, 0x0, {0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6}, [@RTA_ENCAP_TYPE={0x6, 0x15, 0x3}, @RTA_ENCAP={0x14, 0x16, 0x0, 0x1, @SEG6_IPTUNNEL_SRH={0xd}}]}, 0x38}}, 0x0) execveat(r4, &(0x7f0000000040)='./file0\x00', &(0x7f0000000380)=[&(0x7f00000001c0)='+{!#\x00', &(0x7f0000000300)='ext4\x00', &(0x7f0000000340)='@(\x00'], &(0x7f00000004c0)=[&(0x7f00000003c0)='ext4\x00', &(0x7f0000000400)='ext4\x00', &(0x7f0000000500)='\x00.D\x04\xe0\xce\x99\xd9\xa9\xac\xac\xadH\xa4\xcf\xb7\xffT\xac\x05\xfd\xdd\xb8w\x0f\x82B\xff\xf2\x909`1!\f\x870\x1f\xc1%Y\xc8\x15c \xea\x1cY!\x04\xe4\x91^\x00\x04\xe4\xa6\xba\xc6\xfd\x10\xdf\xe24\xd4&\x17\xdc\xec\xf4\f\n\xb7.\x13\x8e\x1bYENj\xe1\x19~\x1c\xaf\a;d\x9f\xba\xd9T\xd4-\xecX\xc0Y\x83@\xc7\x8b\xff*\xdd\xaa\xc6,o4\xe2\x0f\x16\x01[\xc0\xeb\x7fFI]WF\x1f\f?\xfa\xb1\xe7\xf6t\x027\xb1\xc17.4V\xf81{9\xa3\xb9\x01\xcck@I\xe2\xf1Y\x10E\xa1z/\x05.~Yh%\x8f\x06sB)N\x11P\xf6p\xff\'\xaf\a7\x10+p\xbb\xf3\xb08\xb5)\x00\xeeg\xd0\xee\xe9\x98\x8d\xf8\xb5G\t@f\x1et v\x14\tT\xc5', &(0x7f0000000480)=':--[\x00'], 0x1000) recvfrom(r2, &(0x7f0000000600)=""/203, 0xcb, 0x42, &(0x7f0000000700)=@hci={0x1f, 0xffffffffffffffff, 0x4}, 0x80) [ 2300.654678][T25936] EXT4-fs: error -4 creating inode table initialization thread [ 2300.662379][T25936] EXT4-fs (loop3): mount failed [ 2300.700650][T25937] EXT4-fs (loop4): mounted filesystem without journal. Quota mode: writeback. [ 2300.710643][T25934] EXT4-fs (loop2): mounted filesystem without journal. Quota mode: writeback. 10:16:41 executing program 1: prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f00000002c0)=0x0) sched_setscheduler(r0, 0x2, &(0x7f0000000080)=0x6) r1 = getpid() sched_setscheduler(r1, 0x2, &(0x7f00000000c0)=0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r2, &(0x7f000057eff8)=@abs, 0x6e) sendmmsg$unix(r3, &(0x7f00000bd000), 0x318, 0x0) recvmmsg(r2, &(0x7f00000000c0), 0x10106, 0x2, 0x0) syz_mount_image$ext4(&(0x7f0000000180)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xfffbffff00000000, 0x8, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000600100000f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000006856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010300), 0x0, 0x640}, {&(0x7f0000010400)="03000000040000000500000016000f00", 0x10, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}, {&(0x7f0000011000)}, {0x0, 0x0, 0x6700000}, {&(0x7f0000000580), 0x0, 0xc000}], 0x0, &(0x7f0000013b00)=ANY=[@ANYBLOB='\x00']) r4 = creat(&(0x7f0000000000)='./file1\x00', 0x18) r5 = socket(0x10, 0x3, 0x0) sendmsg$nl_route(r5, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f00000005c0)=@ipv4_newroute={0x38, 0x18, 0xbad, 0x0, 0x0, {0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6}, [@RTA_ENCAP_TYPE={0x6, 0x15, 0x3}, @RTA_ENCAP={0x14, 0x16, 0x0, 0x1, @SEG6_IPTUNNEL_SRH={0xd}}]}, 0x38}}, 0x0) r6 = socket(0x26, 0x3, 0x0) sendmsg$nl_route(r6, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f00000005c0)=@ipv4_newroute={0x38, 0x18, 0xbad, 0x0, 0x0, {0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6}, [@RTA_ENCAP_TYPE={0x6, 0x15, 0x3}, @RTA_ENCAP={0x14, 0x16, 0x0, 0x1, @SEG6_IPTUNNEL_SRH={0xd}}]}, 0x38}}, 0x0) r7 = socket(0x10, 0x3, 0x0) sendmsg$nl_route(r7, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f00000005c0)=@ipv4_newroute={0x38, 0x18, 0xbad, 0x0, 0x0, {0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6}, [@RTA_ENCAP_TYPE={0x6, 0x15, 0x3}, @RTA_ENCAP={0x14, 0x16, 0x0, 0x1, @SEG6_IPTUNNEL_SRH={0xd}}]}, 0x38}}, 0x0) execveat(r4, &(0x7f0000000040)='./file0\x00', &(0x7f0000000380)=[&(0x7f00000001c0)='+{!#\x00', &(0x7f0000000300)='ext4\x00', &(0x7f0000000340)='@(\x00'], &(0x7f00000004c0)=[&(0x7f00000003c0)='ext4\x00', &(0x7f0000000400)='ext4\x00', &(0x7f0000000500)='\x00.D\x04\xe0\xce\x99\xd9\xa9\xac\xac\xadH\xa4\xcf\xb7\xffT\xac\x05\xfd\xdd\xb8w\x0f\x82B\xff\xf2\x909`1!\f\x870\x1f\xc1%Y\xc8\x15c \xea\x1cY!\x04\xe4\x91^\x00\x04\xe4\xa6\xba\xc6\xfd\x10\xdf\xe24\xd4&\x17\xdc\xec\xf4\f\n\xb7.\x13\x8e\x1bYENj\xe1\x19~\x1c\xaf\a;d\x9f\xba\xd9T\xd4-\xecX\xc0Y\x83@\xc7\x8b\xff*\xdd\xaa\xc6,o4\xe2\x0f\x16\x01[\xc0\xeb\x7fFI]WF\x1f\f?\xfa\xb1\xe7\xf6t\x027\xb1\xc17.4V\xf81{9\xa3\xb9\x01\xcck@I\xe2\xf1Y\x10E\xa1z/\x05.~Yh%\x8f\x06sB)N\x11P\xf6p\xff\'\xaf\a7\x10+p\xbb\xf3\xb08\xb5)\x00\xeeg\xd0\xee\xe9\x98\x8d\xf8\xb5G\t@f\x1et v\x14\tT\xc5', &(0x7f0000000480)=':--[\x00'], 0x1000) recvfrom(r2, &(0x7f0000000600)=""/203, 0xcb, 0x42, &(0x7f0000000700)=@hci={0x1f, 0xffffffffffffffff, 0x4}, 0x80) 10:16:41 executing program 4: prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f00000002c0)=0x0) sched_setscheduler(r0, 0x2, &(0x7f0000000080)=0x6) r1 = getpid() sched_setscheduler(r1, 0x2, &(0x7f00000000c0)=0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r2, &(0x7f000057eff8)=@abs, 0x6e) sendmmsg$unix(r3, &(0x7f00000bd000), 0x318, 0x0) recvmmsg(r2, &(0x7f00000000c0), 0x10106, 0x2, 0x0) syz_mount_image$ext4(&(0x7f0000000180)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xfffbffff00000000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000600100000f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000006856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010300), 0x0, 0x640}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}, {&(0x7f0000011000)}, {0x0, 0x0, 0x6700000}, {&(0x7f0000000580), 0x0, 0xc000}], 0x0, &(0x7f0000013b00)=ANY=[@ANYBLOB='\x00']) r4 = creat(&(0x7f0000000000)='./file1\x00', 0x18) r5 = socket(0x10, 0x3, 0x0) sendmsg$nl_route(r5, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f00000005c0)=@ipv4_newroute={0x38, 0x18, 0xbad, 0x0, 0x0, {0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6}, [@RTA_ENCAP_TYPE={0x6, 0x15, 0x3}, @RTA_ENCAP={0x14, 0x16, 0x0, 0x1, @SEG6_IPTUNNEL_SRH={0xd}}]}, 0x38}}, 0x0) r6 = socket(0x26, 0x3, 0x0) sendmsg$nl_route(r6, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f00000005c0)=@ipv4_newroute={0x38, 0x18, 0xbad, 0x0, 0x0, {0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6}, [@RTA_ENCAP_TYPE={0x6, 0x15, 0x3}, @RTA_ENCAP={0x14, 0x16, 0x0, 0x1, @SEG6_IPTUNNEL_SRH={0xd}}]}, 0x38}}, 0x0) r7 = socket(0x10, 0x3, 0x0) sendmsg$nl_route(r7, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f00000005c0)=@ipv4_newroute={0x38, 0x18, 0xbad, 0x0, 0x0, {0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6}, [@RTA_ENCAP_TYPE={0x6, 0x15, 0x3}, @RTA_ENCAP={0x14, 0x16, 0x0, 0x1, @SEG6_IPTUNNEL_SRH={0xd}}]}, 0x38}}, 0x0) execveat(r4, &(0x7f0000000040)='./file0\x00', &(0x7f0000000380)=[&(0x7f00000001c0)='+{!#\x00', &(0x7f0000000300)='ext4\x00', &(0x7f0000000340)='@(\x00'], &(0x7f00000004c0)=[&(0x7f00000003c0)='ext4\x00', &(0x7f0000000400)='ext4\x00', &(0x7f0000000500)='\x00.D\x04\xe0\xce\x99\xd9\xa9\xac\xac\xadH\xa4\xcf\xb7\xffT\xac\x05\xfd\xdd\xb8w\x0f\x82B\xff\xf2\x909`1!\f\x870\x1f\xc1%Y\xc8\x15c \xea\x1cY!\x04\xe4\x91^\x00\x04\xe4\xa6\xba\xc6\xfd\x10\xdf\xe24\xd4&\x17\xdc\xec\xf4\f\n\xb7.\x13\x8e\x1bYENj\xe1\x19~\x1c\xaf\a;d\x9f\xba\xd9T\xd4-\xecX\xc0Y\x83@\xc7\x8b\xff*\xdd\xaa\xc6,o4\xe2\x0f\x16\x01[\xc0\xeb\x7fFI]WF\x1f\f?\xfa\xb1\xe7\xf6t\x027\xb1\xc17.4V\xf81{9\xa3\xb9\x01\xcck@I\xe2\xf1Y\x10E\xa1z/\x05.~Yh%\x8f\x06sB)N\x11P\xf6p\xff\'\xaf\a7\x10+p\xbb\xf3\xb08\xb5)\x00\xeeg\xd0\xee\xe9\x98\x8d\xf8\xb5G\t@f\x1et v\x14\tT\xc5', &(0x7f0000000480)=':--[\x00'], 0x1000) recvfrom(r2, &(0x7f0000000600)=""/203, 0xcb, 0x42, &(0x7f0000000700)=@hci={0x1f, 0xffffffffffffffff, 0x4}, 0x80) 10:16:41 executing program 3: prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f00000002c0)=0x0) sched_setscheduler(r0, 0x2, &(0x7f0000000080)=0x6) r1 = getpid() sched_setscheduler(r1, 0x2, &(0x7f00000000c0)=0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r2, &(0x7f000057eff8)=@abs, 0x6e) sendmmsg$unix(r3, &(0x7f00000bd000), 0x318, 0x0) syz_mount_image$ext4(&(0x7f0000000180)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xfffbffff00000000, 0x8, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000600100000f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000006856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010300), 0x0, 0x640}, {&(0x7f0000010400)="03000000040000000500000016000f000300040000000000000000000f00698c", 0x20, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}, {&(0x7f0000011000)}, {0x0, 0x0, 0x6700000}, {&(0x7f0000000580), 0x0, 0xc000}], 0x0, &(0x7f0000013b00)=ANY=[@ANYBLOB='\x00']) r4 = creat(&(0x7f0000000000)='./file1\x00', 0x18) socket(0x10, 0x3, 0x0) r5 = socket(0x26, 0x3, 0x0) sendmsg$nl_route(r5, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f00000005c0)=@ipv4_newroute={0x38, 0x18, 0xbad, 0x0, 0x0, {0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6}, [@RTA_ENCAP_TYPE={0x6, 0x15, 0x3}, @RTA_ENCAP={0x14, 0x16, 0x0, 0x1, @SEG6_IPTUNNEL_SRH={0xd}}]}, 0x38}}, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f00000005c0)=@ipv4_newroute={0x38, 0x18, 0xbad, 0x0, 0x0, {0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6}, [@RTA_ENCAP_TYPE={0x6, 0x15, 0x3}, @RTA_ENCAP={0x14, 0x16, 0x0, 0x1, @SEG6_IPTUNNEL_SRH={0xd}}]}, 0x38}}, 0x0) execveat(r4, 0x0, &(0x7f0000000380)=[&(0x7f00000001c0)='+{!#\x00', &(0x7f0000000300)='ext4\x00', &(0x7f0000000340)='@(\x00'], &(0x7f00000004c0)=[&(0x7f00000003c0)='ext4\x00', &(0x7f0000000400)='ext4\x00', &(0x7f0000000500)='\x00.D\x04\xe0\xce\x99\xd9\xa9\xac\xac\xadH\xa4\xcf\xb7\xffT\xac\x05\xfd\xdd\xb8w\x0f\x82B\xff\xf2\x909`1!\f\x870\x1f\xc1%Y\xc8\x15c \xea\x1cY!\x04\xe4\x91^\x00\x04\xe4\xa6\xba\xc6\xfd\x10\xdf\xe24\xd4&\x17\xdc\xec\xf4\f\n\xb7.\x13\x8e\x1bYENj\xe1\x19~\x1c\xaf\a;d\x9f\xba\xd9T\xd4-\xecX\xc0Y\x83@\xc7\x8b\xff*\xdd\xaa\xc6,o4\xe2\x0f\x16\x01[\xc0\xeb\x7fFI]WF\x1f\f?\xfa\xb1\xe7\xf6t\x027\xb1\xc17.4V\xf81{9\xa3\xb9\x01\xcck@I\xe2\xf1Y\x10E\xa1z/\x05.~Yh%\x8f\x06sB)N\x11P\xf6p\xff\'\xaf\a7\x10+p\xbb\xf3\xb08\xb5)\x00\xeeg\xd0\xee\xe9\x98\x8d\xf8\xb5G\t@f\x1et v\x14\tT\xc5', 0x0], 0x1000) 10:16:41 executing program 2: prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f00000002c0)=0x0) sched_setscheduler(r0, 0x2, &(0x7f0000000080)=0x6) r1 = getpid() sched_setscheduler(r1, 0x2, &(0x7f00000000c0)=0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r2, &(0x7f000057eff8)=@abs, 0x6e) sendmmsg$unix(r3, &(0x7f00000bd000), 0x318, 0x0) recvmmsg(r2, &(0x7f00000000c0), 0x10106, 0x2, 0x0) syz_mount_image$ext4(&(0x7f0000000180)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xfffbffff00000000, 0x8, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000600100000f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000006856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010300), 0x0, 0x640}, {&(0x7f0000010400)="03000000040000000500000016000f000300040000000000000000000f00698c", 0x20, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}, {&(0x7f0000011000)}, {0x0, 0x0, 0x6700000}, {&(0x7f0000000580), 0x0, 0xc000}], 0x0, &(0x7f0000013b00)=ANY=[@ANYBLOB='\x00']) creat(&(0x7f0000000000)='./file1\x00', 0x18) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f00000005c0)=@ipv4_newroute={0x38, 0x18, 0xbad, 0x0, 0x0, {}, [@RTA_ENCAP_TYPE={0x6, 0x15, 0x3}, @RTA_ENCAP={0x14, 0x16, 0x0, 0x1, @SEG6_IPTUNNEL_SRH={0xd}}]}, 0x38}}, 0x0) r4 = socket(0x26, 0x3, 0x0) sendmsg$nl_route(r4, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f00000005c0)=@ipv4_newroute={0x38, 0x18, 0xbad, 0x0, 0x0, {0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6}, [@RTA_ENCAP_TYPE={0x6, 0x15, 0x3}, @RTA_ENCAP={0x14, 0x16, 0x0, 0x1, @SEG6_IPTUNNEL_SRH={0xd}}]}, 0x38}}, 0x0) r5 = socket(0x10, 0x0, 0x0) sendmsg$nl_route(r5, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f00000005c0)=@ipv4_newroute={0x38, 0x18, 0xbad, 0x0, 0x0, {0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6}, [@RTA_ENCAP_TYPE={0x6, 0x15, 0x3}, @RTA_ENCAP={0x14, 0x16, 0x0, 0x1, @SEG6_IPTUNNEL_SRH={0xd}}]}, 0x38}}, 0x0) recvfrom(r2, &(0x7f0000000600)=""/203, 0xcb, 0x42, &(0x7f0000000700)=@hci={0x1f, 0xffffffffffffffff, 0x4}, 0x80) [ 2301.382268][T25973] loop3: detected capacity change from 0 to 264192 10:16:41 executing program 0: prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f00000002c0)=0x0) sched_setscheduler(r0, 0x2, &(0x7f0000000080)=0x6) r1 = getpid() sched_setscheduler(r1, 0x2, &(0x7f00000000c0)=0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r2, &(0x7f000057eff8)=@abs, 0x6e) sendmmsg$unix(r3, &(0x7f00000bd000), 0x318, 0x0) recvmmsg(r2, &(0x7f00000000c0), 0x10106, 0x2, 0x0) syz_mount_image$ext4(&(0x7f0000000180)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xfffbffff00000000, 0x8, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000600100000f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000006856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010300), 0x0, 0x640}, {&(0x7f0000010400)="03000000040000000500000016000f000300040000000000000000000f00698c", 0x20, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f0000000000000400", 0x1c, 0x1500}, {&(0x7f0000011000)}, {0x0, 0x0, 0x6700000}, {&(0x7f0000000580), 0x0, 0xc000}], 0x0, &(0x7f0000013b00)=ANY=[@ANYBLOB='\x00']) r4 = creat(&(0x7f0000000000)='./file1\x00', 0x18) r5 = socket(0x10, 0x3, 0x0) sendmsg$nl_route(r5, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f00000005c0)=@ipv4_newroute={0x38, 0x18, 0xbad, 0x0, 0x0, {0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6}, [@RTA_ENCAP_TYPE={0x6, 0x15, 0x3}, @RTA_ENCAP={0x14, 0x16, 0x0, 0x1, @SEG6_IPTUNNEL_SRH={0xd}}]}, 0x38}}, 0x0) r6 = socket(0x26, 0x3, 0x0) sendmsg$nl_route(r6, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f00000005c0)=@ipv4_newroute={0x38, 0x18, 0xbad, 0x0, 0x0, {0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6}, [@RTA_ENCAP_TYPE={0x6, 0x15, 0x3}, @RTA_ENCAP={0x14, 0x16, 0x0, 0x1, @SEG6_IPTUNNEL_SRH={0xd}}]}, 0x38}}, 0x0) r7 = socket(0x10, 0x3, 0x0) sendmsg$nl_route(r7, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f00000005c0)=@ipv4_newroute={0x38, 0x18, 0xbad, 0x0, 0x0, {0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6}, [@RTA_ENCAP_TYPE={0x6, 0x15, 0x3}, @RTA_ENCAP={0x14, 0x16, 0x0, 0x1, @SEG6_IPTUNNEL_SRH={0xd}}]}, 0x38}}, 0x0) execveat(r4, &(0x7f0000000040)='./file0\x00', &(0x7f0000000380)=[&(0x7f00000001c0)='+{!#\x00', &(0x7f0000000300)='ext4\x00', &(0x7f0000000340)='@(\x00'], &(0x7f00000004c0)=[&(0x7f00000003c0)='ext4\x00', &(0x7f0000000400)='ext4\x00', &(0x7f0000000500)='\x00.D\x04\xe0\xce\x99\xd9\xa9\xac\xac\xadH\xa4\xcf\xb7\xffT\xac\x05\xfd\xdd\xb8w\x0f\x82B\xff\xf2\x909`1!\f\x870\x1f\xc1%Y\xc8\x15c \xea\x1cY!\x04\xe4\x91^\x00\x04\xe4\xa6\xba\xc6\xfd\x10\xdf\xe24\xd4&\x17\xdc\xec\xf4\f\n\xb7.\x13\x8e\x1bYENj\xe1\x19~\x1c\xaf\a;d\x9f\xba\xd9T\xd4-\xecX\xc0Y\x83@\xc7\x8b\xff*\xdd\xaa\xc6,o4\xe2\x0f\x16\x01[\xc0\xeb\x7fFI]WF\x1f\f?\xfa\xb1\xe7\xf6t\x027\xb1\xc17.4V\xf81{9\xa3\xb9\x01\xcck@I\xe2\xf1Y\x10E\xa1z/\x05.~Yh%\x8f\x06sB)N\x11P\xf6p\xff\'\xaf\a7\x10+p\xbb\xf3\xb08\xb5)\x00\xeeg\xd0\xee\xe9\x98\x8d\xf8\xb5G\t@f\x1et v\x14\tT\xc5', &(0x7f0000000480)=':--[\x00'], 0x1000) recvfrom(r2, &(0x7f0000000600)=""/203, 0xcb, 0x42, &(0x7f0000000700)=@hci={0x1f, 0xffffffffffffffff, 0x4}, 0x80) [ 2301.635447][T25975] loop4: detected capacity change from 0 to 264192 [ 2301.671747][T25975] EXT4-fs (loop4): ext4_check_descriptors: Checksum for group 0 failed (60729!=0) [ 2301.681168][T25975] EXT4-fs (loop4): group descriptors corrupted! [ 2301.763771][T25973] EXT4-fs (loop3): mounted filesystem without journal. Quota mode: writeback. [ 2303.279131][T25987] loop2: detected capacity change from 0 to 264192 [ 2303.605767][T25987] EXT4-fs: failed to create workqueue [ 2303.611252][T25987] EXT4-fs (loop2): mount failed 10:16:48 executing program 5: prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f00000002c0)=0x0) sched_setscheduler(r0, 0x2, &(0x7f0000000080)=0x6) r1 = getpid() sched_setscheduler(r1, 0x2, &(0x7f00000000c0)=0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r2, &(0x7f000057eff8)=@abs, 0x6e) sendmmsg$unix(r3, &(0x7f00000bd000), 0x318, 0x0) recvmmsg(r2, &(0x7f00000000c0), 0x10106, 0x2, 0x0) syz_mount_image$ext4(&(0x7f0000000180)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xfffbffff00000000, 0x8, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000600100000f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000006856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010300), 0x0, 0x640}, {&(0x7f0000010400)="03000000040000000500000016000f00", 0x10, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}, {&(0x7f0000011000)}, {0x0, 0x0, 0x6700000}, {&(0x7f0000000580), 0x0, 0xc000}], 0x0, &(0x7f0000013b00)=ANY=[@ANYBLOB='\x00']) r4 = creat(&(0x7f0000000000)='./file1\x00', 0x18) r5 = socket(0x10, 0x3, 0x0) sendmsg$nl_route(r5, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f00000005c0)=@ipv4_newroute={0x38, 0x18, 0xbad, 0x0, 0x0, {0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6}, [@RTA_ENCAP_TYPE={0x6, 0x15, 0x3}, @RTA_ENCAP={0x14, 0x16, 0x0, 0x1, @SEG6_IPTUNNEL_SRH={0xd}}]}, 0x38}}, 0x0) r6 = socket(0x26, 0x3, 0x0) sendmsg$nl_route(r6, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f00000005c0)=@ipv4_newroute={0x38, 0x18, 0xbad, 0x0, 0x0, {0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6}, [@RTA_ENCAP_TYPE={0x6, 0x15, 0x3}, @RTA_ENCAP={0x14, 0x16, 0x0, 0x1, @SEG6_IPTUNNEL_SRH={0xd}}]}, 0x38}}, 0x0) r7 = socket(0x10, 0x3, 0x0) sendmsg$nl_route(r7, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f00000005c0)=@ipv4_newroute={0x38, 0x18, 0xbad, 0x0, 0x0, {0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6}, [@RTA_ENCAP_TYPE={0x6, 0x15, 0x3}, @RTA_ENCAP={0x14, 0x16, 0x0, 0x1, @SEG6_IPTUNNEL_SRH={0xd}}]}, 0x38}}, 0x0) execveat(r4, &(0x7f0000000040)='./file0\x00', &(0x7f0000000380)=[&(0x7f00000001c0)='+{!#\x00', &(0x7f0000000300)='ext4\x00', &(0x7f0000000340)='@(\x00'], &(0x7f00000004c0)=[&(0x7f00000003c0)='ext4\x00', &(0x7f0000000400)='ext4\x00', &(0x7f0000000500)='\x00.D\x04\xe0\xce\x99\xd9\xa9\xac\xac\xadH\xa4\xcf\xb7\xffT\xac\x05\xfd\xdd\xb8w\x0f\x82B\xff\xf2\x909`1!\f\x870\x1f\xc1%Y\xc8\x15c \xea\x1cY!\x04\xe4\x91^\x00\x04\xe4\xa6\xba\xc6\xfd\x10\xdf\xe24\xd4&\x17\xdc\xec\xf4\f\n\xb7.\x13\x8e\x1bYENj\xe1\x19~\x1c\xaf\a;d\x9f\xba\xd9T\xd4-\xecX\xc0Y\x83@\xc7\x8b\xff*\xdd\xaa\xc6,o4\xe2\x0f\x16\x01[\xc0\xeb\x7fFI]WF\x1f\f?\xfa\xb1\xe7\xf6t\x027\xb1\xc17.4V\xf81{9\xa3\xb9\x01\xcck@I\xe2\xf1Y\x10E\xa1z/\x05.~Yh%\x8f\x06sB)N\x11P\xf6p\xff\'\xaf\a7\x10+p\xbb\xf3\xb08\xb5)\x00\xeeg\xd0\xee\xe9\x98\x8d\xf8\xb5G\t@f\x1et v\x14\tT\xc5', &(0x7f0000000480)=':--[\x00'], 0x1000) recvfrom(r2, &(0x7f0000000600)=""/203, 0xcb, 0x42, &(0x7f0000000700)=@hci={0x1f, 0xffffffffffffffff, 0x4}, 0x80) 10:16:48 executing program 1: prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f00000002c0)=0x0) sched_setscheduler(r0, 0x2, &(0x7f0000000080)=0x6) r1 = getpid() sched_setscheduler(r1, 0x2, &(0x7f00000000c0)=0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r2, &(0x7f000057eff8)=@abs, 0x6e) sendmmsg$unix(r3, &(0x7f00000bd000), 0x318, 0x0) recvmmsg(r2, &(0x7f00000000c0), 0x10106, 0x2, 0x0) syz_mount_image$ext4(&(0x7f0000000180)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xfffbffff00000000, 0x8, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000600100000f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000006856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010300), 0x0, 0x640}, {&(0x7f0000010400)="03000000040000000500000016000f000300040000000000000000000f00698c", 0x20, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000", 0x1a, 0x1500}, {&(0x7f0000011000)}, {0x0, 0x0, 0x6700000}, {&(0x7f0000000580), 0x0, 0xc000}], 0x0, &(0x7f0000013b00)=ANY=[@ANYBLOB='\x00']) r4 = creat(&(0x7f0000000000)='./file1\x00', 0x18) r5 = socket(0x10, 0x3, 0x0) sendmsg$nl_route(r5, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f00000005c0)=@ipv4_newroute={0x38, 0x18, 0xbad, 0x0, 0x0, {0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6}, [@RTA_ENCAP_TYPE={0x6, 0x15, 0x3}, @RTA_ENCAP={0x14, 0x16, 0x0, 0x1, @SEG6_IPTUNNEL_SRH={0xd}}]}, 0x38}}, 0x0) r6 = socket(0x26, 0x3, 0x0) sendmsg$nl_route(r6, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f00000005c0)=@ipv4_newroute={0x38, 0x18, 0xbad, 0x0, 0x0, {0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6}, [@RTA_ENCAP_TYPE={0x6, 0x15, 0x3}, @RTA_ENCAP={0x14, 0x16, 0x0, 0x1, @SEG6_IPTUNNEL_SRH={0xd}}]}, 0x38}}, 0x0) r7 = socket(0x10, 0x3, 0x0) sendmsg$nl_route(r7, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f00000005c0)=@ipv4_newroute={0x38, 0x18, 0xbad, 0x0, 0x0, {0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6}, [@RTA_ENCAP_TYPE={0x6, 0x15, 0x3}, @RTA_ENCAP={0x14, 0x16, 0x0, 0x1, @SEG6_IPTUNNEL_SRH={0xd}}]}, 0x38}}, 0x0) execveat(r4, &(0x7f0000000040)='./file0\x00', &(0x7f0000000380)=[&(0x7f00000001c0)='+{!#\x00', &(0x7f0000000300)='ext4\x00', &(0x7f0000000340)='@(\x00'], &(0x7f00000004c0)=[&(0x7f00000003c0)='ext4\x00', &(0x7f0000000400)='ext4\x00', &(0x7f0000000500)='\x00.D\x04\xe0\xce\x99\xd9\xa9\xac\xac\xadH\xa4\xcf\xb7\xffT\xac\x05\xfd\xdd\xb8w\x0f\x82B\xff\xf2\x909`1!\f\x870\x1f\xc1%Y\xc8\x15c \xea\x1cY!\x04\xe4\x91^\x00\x04\xe4\xa6\xba\xc6\xfd\x10\xdf\xe24\xd4&\x17\xdc\xec\xf4\f\n\xb7.\x13\x8e\x1bYENj\xe1\x19~\x1c\xaf\a;d\x9f\xba\xd9T\xd4-\xecX\xc0Y\x83@\xc7\x8b\xff*\xdd\xaa\xc6,o4\xe2\x0f\x16\x01[\xc0\xeb\x7fFI]WF\x1f\f?\xfa\xb1\xe7\xf6t\x027\xb1\xc17.4V\xf81{9\xa3\xb9\x01\xcck@I\xe2\xf1Y\x10E\xa1z/\x05.~Yh%\x8f\x06sB)N\x11P\xf6p\xff\'\xaf\a7\x10+p\xbb\xf3\xb08\xb5)\x00\xeeg\xd0\xee\xe9\x98\x8d\xf8\xb5G\t@f\x1et v\x14\tT\xc5', &(0x7f0000000480)=':--[\x00'], 0x1000) recvfrom(r2, &(0x7f0000000600)=""/203, 0xcb, 0x42, &(0x7f0000000700)=@hci={0x1f, 0xffffffffffffffff, 0x4}, 0x80) 10:16:48 executing program 4: prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f00000002c0)=0x0) sched_setscheduler(r0, 0x2, &(0x7f0000000080)=0x6) r1 = getpid() sched_setscheduler(r1, 0x2, &(0x7f00000000c0)=0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r2, &(0x7f000057eff8)=@abs, 0x6e) sendmmsg$unix(r3, &(0x7f00000bd000), 0x318, 0x0) recvmmsg(r2, &(0x7f00000000c0), 0x10106, 0x2, 0x0) syz_mount_image$ext4(&(0x7f0000000180)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xfffbffff00000000, 0x8, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000600100000f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000006856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010300), 0x0, 0x640}, {&(0x7f0000010400)="03000000040000000500000016000f000300040000000000000000000f00698c", 0x20, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000", 0x1a, 0x1500}, {&(0x7f0000011000)}, {0x0, 0x0, 0x6700000}, {&(0x7f0000000580), 0x0, 0xc000}], 0x0, &(0x7f0000013b00)=ANY=[@ANYBLOB='\x00']) r4 = creat(&(0x7f0000000000)='./file1\x00', 0x18) r5 = socket(0x10, 0x3, 0x0) sendmsg$nl_route(r5, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f00000005c0)=@ipv4_newroute={0x38, 0x18, 0xbad, 0x0, 0x0, {0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6}, [@RTA_ENCAP_TYPE={0x6, 0x15, 0x3}, @RTA_ENCAP={0x14, 0x16, 0x0, 0x1, @SEG6_IPTUNNEL_SRH={0xd}}]}, 0x38}}, 0x0) r6 = socket(0x26, 0x3, 0x0) sendmsg$nl_route(r6, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f00000005c0)=@ipv4_newroute={0x38, 0x18, 0xbad, 0x0, 0x0, {0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6}, [@RTA_ENCAP_TYPE={0x6, 0x15, 0x3}, @RTA_ENCAP={0x14, 0x16, 0x0, 0x1, @SEG6_IPTUNNEL_SRH={0xd}}]}, 0x38}}, 0x0) r7 = socket(0x10, 0x3, 0x0) sendmsg$nl_route(r7, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f00000005c0)=@ipv4_newroute={0x38, 0x18, 0xbad, 0x0, 0x0, {0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6}, [@RTA_ENCAP_TYPE={0x6, 0x15, 0x3}, @RTA_ENCAP={0x14, 0x16, 0x0, 0x1, @SEG6_IPTUNNEL_SRH={0xd}}]}, 0x38}}, 0x0) execveat(r4, &(0x7f0000000040)='./file0\x00', &(0x7f0000000380)=[&(0x7f00000001c0)='+{!#\x00', &(0x7f0000000300)='ext4\x00', &(0x7f0000000340)='@(\x00'], &(0x7f00000004c0)=[&(0x7f00000003c0)='ext4\x00', &(0x7f0000000400)='ext4\x00', &(0x7f0000000500)='\x00.D\x04\xe0\xce\x99\xd9\xa9\xac\xac\xadH\xa4\xcf\xb7\xffT\xac\x05\xfd\xdd\xb8w\x0f\x82B\xff\xf2\x909`1!\f\x870\x1f\xc1%Y\xc8\x15c \xea\x1cY!\x04\xe4\x91^\x00\x04\xe4\xa6\xba\xc6\xfd\x10\xdf\xe24\xd4&\x17\xdc\xec\xf4\f\n\xb7.\x13\x8e\x1bYENj\xe1\x19~\x1c\xaf\a;d\x9f\xba\xd9T\xd4-\xecX\xc0Y\x83@\xc7\x8b\xff*\xdd\xaa\xc6,o4\xe2\x0f\x16\x01[\xc0\xeb\x7fFI]WF\x1f\f?\xfa\xb1\xe7\xf6t\x027\xb1\xc17.4V\xf81{9\xa3\xb9\x01\xcck@I\xe2\xf1Y\x10E\xa1z/\x05.~Yh%\x8f\x06sB)N\x11P\xf6p\xff\'\xaf\a7\x10+p\xbb\xf3\xb08\xb5)\x00\xeeg\xd0\xee\xe9\x98\x8d\xf8\xb5G\t@f\x1et v\x14\tT\xc5', &(0x7f0000000480)=':--[\x00'], 0x1000) recvfrom(r2, &(0x7f0000000600)=""/203, 0xcb, 0x42, &(0x7f0000000700)=@hci={0x1f, 0xffffffffffffffff, 0x4}, 0x80) 10:16:48 executing program 3: prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f00000002c0)=0x0) sched_setscheduler(r0, 0x2, &(0x7f0000000080)=0x6) r1 = getpid() sched_setscheduler(r1, 0x2, &(0x7f00000000c0)=0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r2, &(0x7f000057eff8)=@abs, 0x6e) sendmmsg$unix(r3, &(0x7f00000bd000), 0x318, 0x0) syz_mount_image$ext4(&(0x7f0000000180)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xfffbffff00000000, 0x8, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000600100000f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000006856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010300), 0x0, 0x640}, {&(0x7f0000010400)="03000000040000000500000016000f000300040000000000000000000f00698c", 0x20, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}, {&(0x7f0000011000)}, {0x0, 0x0, 0x6700000}, {&(0x7f0000000580), 0x0, 0xc000}], 0x0, &(0x7f0000013b00)=ANY=[@ANYBLOB='\x00']) r4 = creat(&(0x7f0000000000)='./file1\x00', 0x18) socket(0x10, 0x3, 0x0) r5 = socket(0x26, 0x3, 0x0) sendmsg$nl_route(r5, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f00000005c0)=@ipv4_newroute={0x38, 0x18, 0xbad, 0x0, 0x0, {0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6}, [@RTA_ENCAP_TYPE={0x6, 0x15, 0x3}, @RTA_ENCAP={0x14, 0x16, 0x0, 0x1, @SEG6_IPTUNNEL_SRH={0xd}}]}, 0x38}}, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f00000005c0)=@ipv4_newroute={0x38, 0x18, 0xbad, 0x0, 0x0, {0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6}, [@RTA_ENCAP_TYPE={0x6, 0x15, 0x3}, @RTA_ENCAP={0x14, 0x16, 0x0, 0x1, @SEG6_IPTUNNEL_SRH={0xd}}]}, 0x38}}, 0x0) execveat(r4, 0x0, &(0x7f0000000380)=[&(0x7f00000001c0)='+{!#\x00', &(0x7f0000000300)='ext4\x00', &(0x7f0000000340)='@(\x00'], &(0x7f00000004c0)=[&(0x7f00000003c0)='ext4\x00', &(0x7f0000000400)='ext4\x00', &(0x7f0000000500)='\x00.D\x04\xe0\xce\x99\xd9\xa9\xac\xac\xadH\xa4\xcf\xb7\xffT\xac\x05\xfd\xdd\xb8w\x0f\x82B\xff\xf2\x909`1!\f\x870\x1f\xc1%Y\xc8\x15c \xea\x1cY!\x04\xe4\x91^\x00\x04\xe4\xa6\xba\xc6\xfd\x10\xdf\xe24\xd4&\x17\xdc\xec\xf4\f\n\xb7.\x13\x8e\x1bYENj\xe1\x19~\x1c\xaf\a;d\x9f\xba\xd9T\xd4-\xecX\xc0Y\x83@\xc7\x8b\xff*\xdd\xaa\xc6,o4\xe2\x0f\x16\x01[\xc0\xeb\x7fFI]WF\x1f\f?\xfa\xb1\xe7\xf6t\x027\xb1\xc17.4V\xf81{9\xa3\xb9\x01\xcck@I\xe2\xf1Y\x10E\xa1z/\x05.~Yh%\x8f\x06sB)N\x11P\xf6p\xff\'\xaf\a7\x10+p\xbb\xf3\xb08\xb5)\x00\xeeg\xd0\xee\xe9\x98\x8d\xf8\xb5G\t@f\x1et v\x14\tT\xc5', 0x0], 0x1000) 10:16:48 executing program 2: prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f00000002c0)=0x0) sched_setscheduler(r0, 0x2, &(0x7f0000000080)=0x6) r1 = getpid() sched_setscheduler(r1, 0x2, &(0x7f00000000c0)=0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r2, &(0x7f000057eff8)=@abs, 0x6e) sendmmsg$unix(r3, &(0x7f00000bd000), 0x318, 0x0) recvmmsg(r2, &(0x7f00000000c0), 0x10106, 0x2, 0x0) syz_mount_image$ext4(&(0x7f0000000180)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xfffbffff00000000, 0x8, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000600100000f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000006856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010300), 0x0, 0x640}, {&(0x7f0000010400)="03000000040000000500000016000f000300040000000000000000000f00698c", 0x20, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}, {&(0x7f0000011000)}, {0x0, 0x0, 0x6700000}, {&(0x7f0000000580), 0x0, 0xc000}], 0x0, &(0x7f0000013b00)=ANY=[@ANYBLOB='\x00']) creat(&(0x7f0000000000)='./file1\x00', 0x18) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f00000005c0)=@ipv4_newroute={0x38, 0x18, 0xbad, 0x0, 0x0, {}, [@RTA_ENCAP_TYPE={0x6, 0x15, 0x3}, @RTA_ENCAP={0x14, 0x16, 0x0, 0x1, @SEG6_IPTUNNEL_SRH={0xd}}]}, 0x38}}, 0x0) r4 = socket(0x26, 0x3, 0x0) sendmsg$nl_route(r4, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f00000005c0)=@ipv4_newroute={0x38, 0x18, 0xbad, 0x0, 0x0, {0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6}, [@RTA_ENCAP_TYPE={0x6, 0x15, 0x3}, @RTA_ENCAP={0x14, 0x16, 0x0, 0x1, @SEG6_IPTUNNEL_SRH={0xd}}]}, 0x38}}, 0x0) r5 = socket(0x10, 0x0, 0x0) sendmsg$nl_route(r5, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f00000005c0)=@ipv4_newroute={0x38, 0x18, 0xbad, 0x0, 0x0, {0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6}, [@RTA_ENCAP_TYPE={0x6, 0x15, 0x3}, @RTA_ENCAP={0x14, 0x16, 0x0, 0x1, @SEG6_IPTUNNEL_SRH={0xd}}]}, 0x38}}, 0x0) recvfrom(r2, &(0x7f0000000600)=""/203, 0xcb, 0x42, &(0x7f0000000700)=@hci={0x1f, 0xffffffffffffffff, 0x4}, 0x80) 10:16:48 executing program 0: prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f00000002c0)=0x0) sched_setscheduler(r0, 0x2, &(0x7f0000000080)=0x6) r1 = getpid() sched_setscheduler(r1, 0x2, &(0x7f00000000c0)=0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r2, &(0x7f000057eff8)=@abs, 0x6e) sendmmsg$unix(r3, &(0x7f00000bd000), 0x318, 0x0) recvmmsg(r2, &(0x7f00000000c0), 0x10106, 0x2, 0x0) syz_mount_image$ext4(&(0x7f0000000180)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xfffbffff00000000, 0x8, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000600100000f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000006856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010300), 0x0, 0x640}, {&(0x7f0000010400)="03000000040000000500000016000f000300040000000000000000000f00698c", 0x20, 0x800}, {0x0, 0x0, 0x1500}, {&(0x7f0000011000)}, {0x0, 0x0, 0x6700000}, {&(0x7f0000000580), 0x0, 0xc000}], 0x0, &(0x7f0000013b00)=ANY=[@ANYBLOB='\x00']) r4 = creat(&(0x7f0000000000)='./file1\x00', 0x18) r5 = socket(0x10, 0x3, 0x0) sendmsg$nl_route(r5, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f00000005c0)=@ipv4_newroute={0x38, 0x18, 0xbad, 0x0, 0x0, {0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6}, [@RTA_ENCAP_TYPE={0x6, 0x15, 0x3}, @RTA_ENCAP={0x14, 0x16, 0x0, 0x1, @SEG6_IPTUNNEL_SRH={0xd}}]}, 0x38}}, 0x0) r6 = socket(0x26, 0x3, 0x0) sendmsg$nl_route(r6, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f00000005c0)=@ipv4_newroute={0x38, 0x18, 0xbad, 0x0, 0x0, {0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6}, [@RTA_ENCAP_TYPE={0x6, 0x15, 0x3}, @RTA_ENCAP={0x14, 0x16, 0x0, 0x1, @SEG6_IPTUNNEL_SRH={0xd}}]}, 0x38}}, 0x0) r7 = socket(0x10, 0x3, 0x0) sendmsg$nl_route(r7, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f00000005c0)=@ipv4_newroute={0x38, 0x18, 0xbad, 0x0, 0x0, {0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6}, [@RTA_ENCAP_TYPE={0x6, 0x15, 0x3}, @RTA_ENCAP={0x14, 0x16, 0x0, 0x1, @SEG6_IPTUNNEL_SRH={0xd}}]}, 0x38}}, 0x0) execveat(r4, &(0x7f0000000040)='./file0\x00', &(0x7f0000000380)=[&(0x7f00000001c0)='+{!#\x00', &(0x7f0000000300)='ext4\x00', &(0x7f0000000340)='@(\x00'], &(0x7f00000004c0)=[&(0x7f00000003c0)='ext4\x00', &(0x7f0000000400)='ext4\x00', &(0x7f0000000500)='\x00.D\x04\xe0\xce\x99\xd9\xa9\xac\xac\xadH\xa4\xcf\xb7\xffT\xac\x05\xfd\xdd\xb8w\x0f\x82B\xff\xf2\x909`1!\f\x870\x1f\xc1%Y\xc8\x15c \xea\x1cY!\x04\xe4\x91^\x00\x04\xe4\xa6\xba\xc6\xfd\x10\xdf\xe24\xd4&\x17\xdc\xec\xf4\f\n\xb7.\x13\x8e\x1bYENj\xe1\x19~\x1c\xaf\a;d\x9f\xba\xd9T\xd4-\xecX\xc0Y\x83@\xc7\x8b\xff*\xdd\xaa\xc6,o4\xe2\x0f\x16\x01[\xc0\xeb\x7fFI]WF\x1f\f?\xfa\xb1\xe7\xf6t\x027\xb1\xc17.4V\xf81{9\xa3\xb9\x01\xcck@I\xe2\xf1Y\x10E\xa1z/\x05.~Yh%\x8f\x06sB)N\x11P\xf6p\xff\'\xaf\a7\x10+p\xbb\xf3\xb08\xb5)\x00\xeeg\xd0\xee\xe9\x98\x8d\xf8\xb5G\t@f\x1et v\x14\tT\xc5', &(0x7f0000000480)=':--[\x00'], 0x1000) recvfrom(r2, &(0x7f0000000600)=""/203, 0xcb, 0x42, &(0x7f0000000700)=@hci={0x1f, 0xffffffffffffffff, 0x4}, 0x80) [ 2308.273206][T26009] loop3: detected capacity change from 0 to 264192 [ 2308.599318][T26014] loop4: detected capacity change from 0 to 264192 [ 2309.469256][T26017] loop2: detected capacity change from 0 to 264192 [ 2310.328675][T26009] EXT4-fs: failed to create workqueue [ 2310.334165][T26009] EXT4-fs (loop3): mount failed [ 2310.340994][T26014] EXT4-fs: failed to create workqueue [ 2310.346368][T26014] EXT4-fs (loop4): mount failed 10:16:51 executing program 0: prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f00000002c0)=0x0) sched_setscheduler(r0, 0x2, &(0x7f0000000080)=0x6) r1 = getpid() sched_setscheduler(r1, 0x2, &(0x7f00000000c0)=0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r2, &(0x7f000057eff8)=@abs, 0x6e) sendmmsg$unix(r3, &(0x7f00000bd000), 0x318, 0x0) recvmmsg(r2, &(0x7f00000000c0), 0x10106, 0x2, 0x0) syz_mount_image$ext4(&(0x7f0000000180)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xfffbffff00000000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000600100000f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000006856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010300), 0x0, 0x640}, {&(0x7f0000010400)="03000000040000000500000016000f000300040000000000000000000f00698c", 0x20, 0x800}, {&(0x7f0000011000)}, {0x0, 0x0, 0x6700000}, {&(0x7f0000000580), 0x0, 0xc000}], 0x0, &(0x7f0000013b00)=ANY=[@ANYBLOB='\x00']) r4 = creat(&(0x7f0000000000)='./file1\x00', 0x18) r5 = socket(0x10, 0x3, 0x0) sendmsg$nl_route(r5, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f00000005c0)=@ipv4_newroute={0x38, 0x18, 0xbad, 0x0, 0x0, {0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6}, [@RTA_ENCAP_TYPE={0x6, 0x15, 0x3}, @RTA_ENCAP={0x14, 0x16, 0x0, 0x1, @SEG6_IPTUNNEL_SRH={0xd}}]}, 0x38}}, 0x0) r6 = socket(0x26, 0x3, 0x0) sendmsg$nl_route(r6, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f00000005c0)=@ipv4_newroute={0x38, 0x18, 0xbad, 0x0, 0x0, {0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6}, [@RTA_ENCAP_TYPE={0x6, 0x15, 0x3}, @RTA_ENCAP={0x14, 0x16, 0x0, 0x1, @SEG6_IPTUNNEL_SRH={0xd}}]}, 0x38}}, 0x0) r7 = socket(0x10, 0x3, 0x0) sendmsg$nl_route(r7, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f00000005c0)=@ipv4_newroute={0x38, 0x18, 0xbad, 0x0, 0x0, {0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6}, [@RTA_ENCAP_TYPE={0x6, 0x15, 0x3}, @RTA_ENCAP={0x14, 0x16, 0x0, 0x1, @SEG6_IPTUNNEL_SRH={0xd}}]}, 0x38}}, 0x0) execveat(r4, &(0x7f0000000040)='./file0\x00', &(0x7f0000000380)=[&(0x7f00000001c0)='+{!#\x00', &(0x7f0000000300)='ext4\x00', &(0x7f0000000340)='@(\x00'], &(0x7f00000004c0)=[&(0x7f00000003c0)='ext4\x00', &(0x7f0000000400)='ext4\x00', &(0x7f0000000500)='\x00.D\x04\xe0\xce\x99\xd9\xa9\xac\xac\xadH\xa4\xcf\xb7\xffT\xac\x05\xfd\xdd\xb8w\x0f\x82B\xff\xf2\x909`1!\f\x870\x1f\xc1%Y\xc8\x15c \xea\x1cY!\x04\xe4\x91^\x00\x04\xe4\xa6\xba\xc6\xfd\x10\xdf\xe24\xd4&\x17\xdc\xec\xf4\f\n\xb7.\x13\x8e\x1bYENj\xe1\x19~\x1c\xaf\a;d\x9f\xba\xd9T\xd4-\xecX\xc0Y\x83@\xc7\x8b\xff*\xdd\xaa\xc6,o4\xe2\x0f\x16\x01[\xc0\xeb\x7fFI]WF\x1f\f?\xfa\xb1\xe7\xf6t\x027\xb1\xc17.4V\xf81{9\xa3\xb9\x01\xcck@I\xe2\xf1Y\x10E\xa1z/\x05.~Yh%\x8f\x06sB)N\x11P\xf6p\xff\'\xaf\a7\x10+p\xbb\xf3\xb08\xb5)\x00\xeeg\xd0\xee\xe9\x98\x8d\xf8\xb5G\t@f\x1et v\x14\tT\xc5', &(0x7f0000000480)=':--[\x00'], 0x1000) recvfrom(r2, &(0x7f0000000600)=""/203, 0xcb, 0x42, &(0x7f0000000700)=@hci={0x1f, 0xffffffffffffffff, 0x4}, 0x80) 10:16:51 executing program 4: prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f00000002c0)=0x0) sched_setscheduler(r0, 0x2, &(0x7f0000000080)=0x6) r1 = getpid() sched_setscheduler(r1, 0x2, &(0x7f00000000c0)=0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r2, &(0x7f000057eff8)=@abs, 0x6e) sendmmsg$unix(r3, &(0x7f00000bd000), 0x318, 0x0) recvmmsg(r2, &(0x7f00000000c0), 0x10106, 0x2, 0x0) syz_mount_image$ext4(&(0x7f0000000180)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xfffbffff00000000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000600100000f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000006856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010300), 0x0, 0x640}, {&(0x7f0000010400)="03000000040000000500000016000f000300040000000000000000000f00698c", 0x20, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}, {0x0, 0x0, 0x6700000}, {&(0x7f0000000580), 0x0, 0xc000}], 0x0, &(0x7f0000013b00)=ANY=[@ANYBLOB='\x00']) r4 = creat(&(0x7f0000000000)='./file1\x00', 0x18) r5 = socket(0x10, 0x3, 0x0) sendmsg$nl_route(r5, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f00000005c0)=@ipv4_newroute={0x38, 0x18, 0xbad, 0x0, 0x0, {0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6}, [@RTA_ENCAP_TYPE={0x6, 0x15, 0x3}, @RTA_ENCAP={0x14, 0x16, 0x0, 0x1, @SEG6_IPTUNNEL_SRH={0xd}}]}, 0x38}}, 0x0) r6 = socket(0x26, 0x3, 0x0) sendmsg$nl_route(r6, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f00000005c0)=@ipv4_newroute={0x38, 0x18, 0xbad, 0x0, 0x0, {0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6}, [@RTA_ENCAP_TYPE={0x6, 0x15, 0x3}, @RTA_ENCAP={0x14, 0x16, 0x0, 0x1, @SEG6_IPTUNNEL_SRH={0xd}}]}, 0x38}}, 0x0) r7 = socket(0x10, 0x3, 0x0) sendmsg$nl_route(r7, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f00000005c0)=@ipv4_newroute={0x38, 0x18, 0xbad, 0x0, 0x0, {0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6}, [@RTA_ENCAP_TYPE={0x6, 0x15, 0x3}, @RTA_ENCAP={0x14, 0x16, 0x0, 0x1, @SEG6_IPTUNNEL_SRH={0xd}}]}, 0x38}}, 0x0) execveat(r4, &(0x7f0000000040)='./file0\x00', &(0x7f0000000380)=[&(0x7f00000001c0)='+{!#\x00', &(0x7f0000000300)='ext4\x00', &(0x7f0000000340)='@(\x00'], &(0x7f00000004c0)=[&(0x7f00000003c0)='ext4\x00', &(0x7f0000000400)='ext4\x00', &(0x7f0000000500)='\x00.D\x04\xe0\xce\x99\xd9\xa9\xac\xac\xadH\xa4\xcf\xb7\xffT\xac\x05\xfd\xdd\xb8w\x0f\x82B\xff\xf2\x909`1!\f\x870\x1f\xc1%Y\xc8\x15c \xea\x1cY!\x04\xe4\x91^\x00\x04\xe4\xa6\xba\xc6\xfd\x10\xdf\xe24\xd4&\x17\xdc\xec\xf4\f\n\xb7.\x13\x8e\x1bYENj\xe1\x19~\x1c\xaf\a;d\x9f\xba\xd9T\xd4-\xecX\xc0Y\x83@\xc7\x8b\xff*\xdd\xaa\xc6,o4\xe2\x0f\x16\x01[\xc0\xeb\x7fFI]WF\x1f\f?\xfa\xb1\xe7\xf6t\x027\xb1\xc17.4V\xf81{9\xa3\xb9\x01\xcck@I\xe2\xf1Y\x10E\xa1z/\x05.~Yh%\x8f\x06sB)N\x11P\xf6p\xff\'\xaf\a7\x10+p\xbb\xf3\xb08\xb5)\x00\xeeg\xd0\xee\xe9\x98\x8d\xf8\xb5G\t@f\x1et v\x14\tT\xc5', &(0x7f0000000480)=':--[\x00'], 0x1000) recvfrom(r2, &(0x7f0000000600)=""/203, 0xcb, 0x42, &(0x7f0000000700)=@hci={0x1f, 0xffffffffffffffff, 0x4}, 0x80) [ 2311.140280][T26017] EXT4-fs: failed to create workqueue [ 2311.145679][T26017] EXT4-fs (loop2): mount failed 10:16:51 executing program 3: prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f00000002c0)=0x0) sched_setscheduler(r0, 0x2, &(0x7f0000000080)=0x6) r1 = getpid() sched_setscheduler(r1, 0x2, &(0x7f00000000c0)=0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r2, &(0x7f000057eff8)=@abs, 0x6e) sendmmsg$unix(r3, &(0x7f00000bd000), 0x318, 0x0) syz_mount_image$ext4(&(0x7f0000000180)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xfffbffff00000000, 0x8, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000600100000f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000006856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010300), 0x0, 0x640}, {&(0x7f0000010400)="03000000040000000500000016000f000300040000000000000000000f00698c", 0x20, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}, {&(0x7f0000011000)}, {0x0, 0x0, 0x6700000}, {&(0x7f0000000580), 0x0, 0xc000}], 0x0, &(0x7f0000013b00)=ANY=[@ANYBLOB='\x00']) r4 = creat(&(0x7f0000000000)='./file1\x00', 0x18) socket(0x10, 0x3, 0x0) r5 = socket(0x26, 0x3, 0x0) sendmsg$nl_route(r5, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f00000005c0)=@ipv4_newroute={0x38, 0x18, 0xbad, 0x0, 0x0, {0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6}, [@RTA_ENCAP_TYPE={0x6, 0x15, 0x3}, @RTA_ENCAP={0x14, 0x16, 0x0, 0x1, @SEG6_IPTUNNEL_SRH={0xd}}]}, 0x38}}, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f00000005c0)=@ipv4_newroute={0x38, 0x18, 0xbad, 0x0, 0x0, {0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6}, [@RTA_ENCAP_TYPE={0x6, 0x15, 0x3}, @RTA_ENCAP={0x14, 0x16, 0x0, 0x1, @SEG6_IPTUNNEL_SRH={0xd}}]}, 0x38}}, 0x0) execveat(r4, 0x0, &(0x7f0000000380)=[&(0x7f00000001c0)='+{!#\x00', &(0x7f0000000300)='ext4\x00', &(0x7f0000000340)='@(\x00'], &(0x7f00000004c0)=[&(0x7f00000003c0)='ext4\x00', &(0x7f0000000400)='ext4\x00', &(0x7f0000000500)='\x00.D\x04\xe0\xce\x99\xd9\xa9\xac\xac\xadH\xa4\xcf\xb7\xffT\xac\x05\xfd\xdd\xb8w\x0f\x82B\xff\xf2\x909`1!\f\x870\x1f\xc1%Y\xc8\x15c \xea\x1cY!\x04\xe4\x91^\x00\x04\xe4\xa6\xba\xc6\xfd\x10\xdf\xe24\xd4&\x17\xdc\xec\xf4\f\n\xb7.\x13\x8e\x1bYENj\xe1\x19~\x1c\xaf\a;d\x9f\xba\xd9T\xd4-\xecX\xc0Y\x83@\xc7\x8b\xff*\xdd\xaa\xc6,o4\xe2\x0f\x16\x01[\xc0\xeb\x7fFI]WF\x1f\f?\xfa\xb1\xe7\xf6t\x027\xb1\xc17.4V\xf81{9\xa3\xb9\x01\xcck@I\xe2\xf1Y\x10E\xa1z/\x05.~Yh%\x8f\x06sB)N\x11P\xf6p\xff\'\xaf\a7\x10+p\xbb\xf3\xb08\xb5)\x00\xeeg\xd0\xee\xe9\x98\x8d\xf8\xb5G\t@f\x1et v\x14\tT\xc5', 0x0], 0x1000) [ 2311.629403][T26042] loop4: detected capacity change from 0 to 264192 10:16:52 executing program 1: prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f00000002c0)=0x0) sched_setscheduler(r0, 0x2, &(0x7f0000000080)=0x6) r1 = getpid() sched_setscheduler(r1, 0x2, &(0x7f00000000c0)=0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r2, &(0x7f000057eff8)=@abs, 0x6e) sendmmsg$unix(r3, &(0x7f00000bd000), 0x318, 0x0) recvmmsg(r2, &(0x7f00000000c0), 0x10106, 0x2, 0x0) syz_mount_image$ext4(&(0x7f0000000180)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xfffbffff00000000, 0x8, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000600100000f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000006856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010300), 0x0, 0x640}, {&(0x7f0000010400)="03000000040000000500000016000f000300040000000000000000000f00698c", 0x20, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}, {&(0x7f0000011000)}, {0x0, 0x0, 0x6700000}, {&(0x7f0000000580)}], 0x0, &(0x7f0000013b00)=ANY=[@ANYBLOB='\x00']) r4 = creat(&(0x7f0000000000)='./file1\x00', 0x18) r5 = socket(0x10, 0x3, 0x0) sendmsg$nl_route(r5, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f00000005c0)=@ipv4_newroute={0x38, 0x18, 0xbad, 0x0, 0x0, {0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6}, [@RTA_ENCAP_TYPE={0x6, 0x15, 0x3}, @RTA_ENCAP={0x14, 0x16, 0x0, 0x1, @SEG6_IPTUNNEL_SRH={0xd}}]}, 0x38}}, 0x0) r6 = socket(0x26, 0x3, 0x0) sendmsg$nl_route(r6, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f00000005c0)=@ipv4_newroute={0x38, 0x18, 0xbad, 0x0, 0x0, {0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6}, [@RTA_ENCAP_TYPE={0x6, 0x15, 0x3}, @RTA_ENCAP={0x14, 0x16, 0x0, 0x1, @SEG6_IPTUNNEL_SRH={0xd}}]}, 0x38}}, 0x0) r7 = socket(0x10, 0x3, 0x0) sendmsg$nl_route(r7, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f00000005c0)=@ipv4_newroute={0x38, 0x18, 0xbad, 0x0, 0x0, {0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6}, [@RTA_ENCAP_TYPE={0x6, 0x15, 0x3}, @RTA_ENCAP={0x14, 0x16, 0x0, 0x1, @SEG6_IPTUNNEL_SRH={0xd}}]}, 0x38}}, 0x0) execveat(r4, &(0x7f0000000040)='./file0\x00', &(0x7f0000000380)=[&(0x7f00000001c0)='+{!#\x00', &(0x7f0000000300)='ext4\x00', &(0x7f0000000340)='@(\x00'], &(0x7f00000004c0)=[&(0x7f00000003c0)='ext4\x00', &(0x7f0000000400)='ext4\x00', &(0x7f0000000500)='\x00.D\x04\xe0\xce\x99\xd9\xa9\xac\xac\xadH\xa4\xcf\xb7\xffT\xac\x05\xfd\xdd\xb8w\x0f\x82B\xff\xf2\x909`1!\f\x870\x1f\xc1%Y\xc8\x15c \xea\x1cY!\x04\xe4\x91^\x00\x04\xe4\xa6\xba\xc6\xfd\x10\xdf\xe24\xd4&\x17\xdc\xec\xf4\f\n\xb7.\x13\x8e\x1bYENj\xe1\x19~\x1c\xaf\a;d\x9f\xba\xd9T\xd4-\xecX\xc0Y\x83@\xc7\x8b\xff*\xdd\xaa\xc6,o4\xe2\x0f\x16\x01[\xc0\xeb\x7fFI]WF\x1f\f?\xfa\xb1\xe7\xf6t\x027\xb1\xc17.4V\xf81{9\xa3\xb9\x01\xcck@I\xe2\xf1Y\x10E\xa1z/\x05.~Yh%\x8f\x06sB)N\x11P\xf6p\xff\'\xaf\a7\x10+p\xbb\xf3\xb08\xb5)\x00\xeeg\xd0\xee\xe9\x98\x8d\xf8\xb5G\t@f\x1et v\x14\tT\xc5', &(0x7f0000000480)=':--[\x00'], 0x1000) recvfrom(r2, &(0x7f0000000600)=""/203, 0xcb, 0x42, &(0x7f0000000700)=@hci={0x1f, 0xffffffffffffffff, 0x4}, 0x80) 10:16:52 executing program 2: prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f00000002c0)=0x0) sched_setscheduler(r0, 0x2, &(0x7f0000000080)=0x6) r1 = getpid() sched_setscheduler(r1, 0x2, &(0x7f00000000c0)=0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r2, &(0x7f000057eff8)=@abs, 0x6e) sendmmsg$unix(r3, &(0x7f00000bd000), 0x318, 0x0) recvmmsg(r2, &(0x7f00000000c0), 0x10106, 0x2, 0x0) syz_mount_image$ext4(&(0x7f0000000180)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xfffbffff00000000, 0x8, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000600100000f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000006856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010300), 0x0, 0x640}, {&(0x7f0000010400)="03000000040000000500000016000f000300040000000000000000000f00698c", 0x20, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}, {&(0x7f0000011000)}, {0x0, 0x0, 0x6700000}, {&(0x7f0000000580), 0x0, 0xc000}], 0x0, &(0x7f0000013b00)=ANY=[@ANYBLOB='\x00']) r4 = socket(0x10, 0x3, 0x0) sendmsg$nl_route(r4, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f00000005c0)=@ipv4_newroute={0x38, 0x18, 0xbad, 0x0, 0x0, {}, [@RTA_ENCAP_TYPE={0x6, 0x15, 0x3}, @RTA_ENCAP={0x14, 0x16, 0x0, 0x1, @SEG6_IPTUNNEL_SRH={0xd}}]}, 0x38}}, 0x0) r5 = socket(0x26, 0x3, 0x0) sendmsg$nl_route(r5, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f00000005c0)=@ipv4_newroute={0x38, 0x18, 0xbad, 0x0, 0x0, {0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6}, [@RTA_ENCAP_TYPE={0x6, 0x15, 0x3}, @RTA_ENCAP={0x14, 0x16, 0x0, 0x1, @SEG6_IPTUNNEL_SRH={0xd}}]}, 0x38}}, 0x0) r6 = socket(0x10, 0x0, 0x0) sendmsg$nl_route(r6, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f00000005c0)=@ipv4_newroute={0x38, 0x18, 0xbad, 0x0, 0x0, {0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6}, [@RTA_ENCAP_TYPE={0x6, 0x15, 0x3}, @RTA_ENCAP={0x14, 0x16, 0x0, 0x1, @SEG6_IPTUNNEL_SRH={0xd}}]}, 0x38}}, 0x0) recvfrom(r2, &(0x7f0000000600)=""/203, 0xcb, 0x42, &(0x7f0000000700)=@hci={0x1f, 0xffffffffffffffff, 0x4}, 0x80) [ 2312.974018][T26042] EXT4-fs (loop4): mounted filesystem without journal. Quota mode: writeback. [ 2313.000452][T26058] loop3: detected capacity change from 0 to 264192 [ 2313.430431][T26060] loop2: detected capacity change from 0 to 264192 10:16:54 executing program 0: prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f00000002c0)=0x0) sched_setscheduler(r0, 0x2, &(0x7f0000000080)=0x6) r1 = getpid() sched_setscheduler(r1, 0x2, &(0x7f00000000c0)=0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r2, &(0x7f000057eff8)=@abs, 0x6e) sendmmsg$unix(r3, &(0x7f00000bd000), 0x318, 0x0) recvmmsg(r2, &(0x7f00000000c0), 0x10106, 0x2, 0x0) syz_mount_image$ext4(&(0x7f0000000180)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xfffbffff00000000, 0x8, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000600100000f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000006856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010300), 0x0, 0x640}, {&(0x7f0000010400)="03000000040000000500000016000f000300040000000000000000000f00698c", 0x20, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}, {&(0x7f0000011000)}, {0x0, 0x0, 0x6700000}, {&(0x7f0000000580), 0x0, 0xc000}], 0x0, &(0x7f0000013b00)=ANY=[@ANYBLOB='\x00']) creat(&(0x7f0000000000)='./file1\x00', 0x18) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f00000005c0)=@ipv4_newroute={0x38, 0x18, 0xbad, 0x0, 0x0, {}, [@RTA_ENCAP_TYPE={0x6, 0x15, 0x3}, @RTA_ENCAP={0x14, 0x16, 0x0, 0x1, @SEG6_IPTUNNEL_SRH={0xd}}]}, 0x38}}, 0x0) r4 = socket(0x26, 0x3, 0x0) sendmsg$nl_route(r4, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f00000005c0)=@ipv4_newroute={0x38, 0x18, 0xbad, 0x0, 0x0, {0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6}, [@RTA_ENCAP_TYPE={0x6, 0x15, 0x3}, @RTA_ENCAP={0x14, 0x16, 0x0, 0x1, @SEG6_IPTUNNEL_SRH={0xd}}]}, 0x38}}, 0x0) r5 = socket(0x10, 0x0, 0x0) sendmsg$nl_route(r5, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f00000005c0)=@ipv4_newroute={0x38, 0x18, 0xbad, 0x0, 0x0, {0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6}, [@RTA_ENCAP_TYPE={0x6, 0x15, 0x3}, @RTA_ENCAP={0x14, 0x16, 0x0, 0x1, @SEG6_IPTUNNEL_SRH={0xd}}]}, 0x38}}, 0x0) recvfrom(r2, &(0x7f0000000600)=""/203, 0xcb, 0x42, &(0x7f0000000700)=@hci={0x1f, 0xffffffffffffffff, 0x4}, 0x80) [ 2313.667960][T26058] EXT4-fs (loop3): mounted filesystem without journal. Quota mode: writeback. [ 2313.680840][T26060] EXT4-fs (loop2): mounted filesystem without journal. Quota mode: writeback. 10:17:02 executing program 5: prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f00000002c0)=0x0) sched_setscheduler(r0, 0x2, &(0x7f0000000080)=0x6) r1 = getpid() sched_setscheduler(r1, 0x2, &(0x7f00000000c0)=0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r2, &(0x7f000057eff8)=@abs, 0x6e) sendmmsg$unix(r3, &(0x7f00000bd000), 0x318, 0x0) recvmmsg(r2, &(0x7f00000000c0), 0x10106, 0x2, 0x0) syz_mount_image$ext4(&(0x7f0000000180)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xfffbffff00000000, 0x8, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000600100000f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000006856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010300), 0x0, 0x640}, {&(0x7f0000010400)="03000000040000000500000016000f00", 0x10, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}, {&(0x7f0000011000)}, {0x0, 0x0, 0x6700000}, {&(0x7f0000000580), 0x0, 0xc000}], 0x0, &(0x7f0000013b00)=ANY=[@ANYBLOB='\x00']) r4 = creat(&(0x7f0000000000)='./file1\x00', 0x18) r5 = socket(0x10, 0x3, 0x0) sendmsg$nl_route(r5, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f00000005c0)=@ipv4_newroute={0x38, 0x18, 0xbad, 0x0, 0x0, {0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6}, [@RTA_ENCAP_TYPE={0x6, 0x15, 0x3}, @RTA_ENCAP={0x14, 0x16, 0x0, 0x1, @SEG6_IPTUNNEL_SRH={0xd}}]}, 0x38}}, 0x0) r6 = socket(0x26, 0x3, 0x0) sendmsg$nl_route(r6, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f00000005c0)=@ipv4_newroute={0x38, 0x18, 0xbad, 0x0, 0x0, {0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6}, [@RTA_ENCAP_TYPE={0x6, 0x15, 0x3}, @RTA_ENCAP={0x14, 0x16, 0x0, 0x1, @SEG6_IPTUNNEL_SRH={0xd}}]}, 0x38}}, 0x0) r7 = socket(0x10, 0x3, 0x0) sendmsg$nl_route(r7, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f00000005c0)=@ipv4_newroute={0x38, 0x18, 0xbad, 0x0, 0x0, {0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6}, [@RTA_ENCAP_TYPE={0x6, 0x15, 0x3}, @RTA_ENCAP={0x14, 0x16, 0x0, 0x1, @SEG6_IPTUNNEL_SRH={0xd}}]}, 0x38}}, 0x0) execveat(r4, &(0x7f0000000040)='./file0\x00', &(0x7f0000000380)=[&(0x7f00000001c0)='+{!#\x00', &(0x7f0000000300)='ext4\x00', &(0x7f0000000340)='@(\x00'], &(0x7f00000004c0)=[&(0x7f00000003c0)='ext4\x00', &(0x7f0000000400)='ext4\x00', &(0x7f0000000500)='\x00.D\x04\xe0\xce\x99\xd9\xa9\xac\xac\xadH\xa4\xcf\xb7\xffT\xac\x05\xfd\xdd\xb8w\x0f\x82B\xff\xf2\x909`1!\f\x870\x1f\xc1%Y\xc8\x15c \xea\x1cY!\x04\xe4\x91^\x00\x04\xe4\xa6\xba\xc6\xfd\x10\xdf\xe24\xd4&\x17\xdc\xec\xf4\f\n\xb7.\x13\x8e\x1bYENj\xe1\x19~\x1c\xaf\a;d\x9f\xba\xd9T\xd4-\xecX\xc0Y\x83@\xc7\x8b\xff*\xdd\xaa\xc6,o4\xe2\x0f\x16\x01[\xc0\xeb\x7fFI]WF\x1f\f?\xfa\xb1\xe7\xf6t\x027\xb1\xc17.4V\xf81{9\xa3\xb9\x01\xcck@I\xe2\xf1Y\x10E\xa1z/\x05.~Yh%\x8f\x06sB)N\x11P\xf6p\xff\'\xaf\a7\x10+p\xbb\xf3\xb08\xb5)\x00\xeeg\xd0\xee\xe9\x98\x8d\xf8\xb5G\t@f\x1et v\x14\tT\xc5', &(0x7f0000000480)=':--[\x00'], 0x1000) recvfrom(r2, &(0x7f0000000600)=""/203, 0xcb, 0x42, &(0x7f0000000700)=@hci={0x1f, 0xffffffffffffffff, 0x4}, 0x80) 10:17:02 executing program 4: prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f00000002c0)=0x0) sched_setscheduler(r0, 0x2, &(0x7f0000000080)=0x6) r1 = getpid() sched_setscheduler(r1, 0x2, &(0x7f00000000c0)=0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r2, &(0x7f000057eff8)=@abs, 0x6e) sendmmsg$unix(r3, &(0x7f00000bd000), 0x318, 0x0) recvmmsg(r2, &(0x7f00000000c0), 0x10106, 0x2, 0x0) syz_mount_image$ext4(&(0x7f0000000180)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xfffbffff00000000, 0x8, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000600100000f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000006856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010300), 0x0, 0x640}, {&(0x7f0000010400)="03000000040000000500000016000f000300040000000000000000000f00698c", 0x20, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}, {&(0x7f0000011000)}, {0x0, 0x0, 0x6700000}, {&(0x7f0000000580), 0x0, 0xc000}], 0x0, &(0x7f0000013b00)=ANY=[@ANYBLOB='\x00']) creat(&(0x7f0000000000)='./file1\x00', 0x18) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f00000005c0)=@ipv4_newroute={0x38, 0x18, 0xbad, 0x0, 0x0, {}, [@RTA_ENCAP_TYPE={0x6, 0x15, 0x3}, @RTA_ENCAP={0x14, 0x16, 0x0, 0x1, @SEG6_IPTUNNEL_SRH={0xd}}]}, 0x38}}, 0x0) r4 = socket(0x26, 0x3, 0x0) sendmsg$nl_route(r4, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f00000005c0)=@ipv4_newroute={0x38, 0x18, 0xbad, 0x0, 0x0, {0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6}, [@RTA_ENCAP_TYPE={0x6, 0x15, 0x3}, @RTA_ENCAP={0x14, 0x16, 0x0, 0x1, @SEG6_IPTUNNEL_SRH={0xd}}]}, 0x38}}, 0x0) r5 = socket(0x10, 0x0, 0x0) sendmsg$nl_route(r5, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f00000005c0)=@ipv4_newroute={0x38, 0x18, 0xbad, 0x0, 0x0, {0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6}, [@RTA_ENCAP_TYPE={0x6, 0x15, 0x3}, @RTA_ENCAP={0x14, 0x16, 0x0, 0x1, @SEG6_IPTUNNEL_SRH={0xd}}]}, 0x38}}, 0x0) recvfrom(r2, &(0x7f0000000600)=""/203, 0xcb, 0x42, &(0x7f0000000700)=@hci={0x1f, 0xffffffffffffffff, 0x4}, 0x80) 10:17:02 executing program 3: prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f00000002c0)=0x0) sched_setscheduler(r0, 0x2, &(0x7f0000000080)=0x6) r1 = getpid() sched_setscheduler(r1, 0x2, &(0x7f00000000c0)=0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff}) connect$unix(r2, &(0x7f000057eff8)=@abs, 0x6e) recvmmsg(r2, &(0x7f00000000c0), 0x10106, 0x2, 0x0) syz_mount_image$ext4(&(0x7f0000000180)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xfffbffff00000000, 0x8, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000600100000f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000006856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010300), 0x0, 0x640}, {&(0x7f0000010400)="03000000040000000500000016000f000300040000000000000000000f00698c", 0x20, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}, {&(0x7f0000011000)}, {0x0, 0x0, 0x6700000}, {&(0x7f0000000580), 0x0, 0xc000}], 0x0, &(0x7f0000013b00)=ANY=[@ANYBLOB='\x00']) r3 = creat(&(0x7f0000000000)='./file1\x00', 0x18) socket(0x10, 0x3, 0x0) r4 = socket(0x26, 0x3, 0x0) sendmsg$nl_route(r4, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f00000005c0)=@ipv4_newroute={0x38, 0x18, 0xbad, 0x0, 0x0, {0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6}, [@RTA_ENCAP_TYPE={0x6, 0x15, 0x3}, @RTA_ENCAP={0x14, 0x16, 0x0, 0x1, @SEG6_IPTUNNEL_SRH={0xd}}]}, 0x38}}, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f00000005c0)=@ipv4_newroute={0x38, 0x18, 0xbad, 0x0, 0x0, {0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6}, [@RTA_ENCAP_TYPE={0x6, 0x15, 0x3}, @RTA_ENCAP={0x14, 0x16, 0x0, 0x1, @SEG6_IPTUNNEL_SRH={0xd}}]}, 0x38}}, 0x0) execveat(r3, 0x0, &(0x7f0000000380)=[&(0x7f00000001c0)='+{!#\x00', &(0x7f0000000300)='ext4\x00', &(0x7f0000000340)='@(\x00'], &(0x7f00000004c0)=[&(0x7f00000003c0)='ext4\x00', &(0x7f0000000400)='ext4\x00', &(0x7f0000000500)='\x00.D\x04\xe0\xce\x99\xd9\xa9\xac\xac\xadH\xa4\xcf\xb7\xffT\xac\x05\xfd\xdd\xb8w\x0f\x82B\xff\xf2\x909`1!\f\x870\x1f\xc1%Y\xc8\x15c \xea\x1cY!\x04\xe4\x91^\x00\x04\xe4\xa6\xba\xc6\xfd\x10\xdf\xe24\xd4&\x17\xdc\xec\xf4\f\n\xb7.\x13\x8e\x1bYENj\xe1\x19~\x1c\xaf\a;d\x9f\xba\xd9T\xd4-\xecX\xc0Y\x83@\xc7\x8b\xff*\xdd\xaa\xc6,o4\xe2\x0f\x16\x01[\xc0\xeb\x7fFI]WF\x1f\f?\xfa\xb1\xe7\xf6t\x027\xb1\xc17.4V\xf81{9\xa3\xb9\x01\xcck@I\xe2\xf1Y\x10E\xa1z/\x05.~Yh%\x8f\x06sB)N\x11P\xf6p\xff\'\xaf\a7\x10+p\xbb\xf3\xb08\xb5)\x00\xeeg\xd0\xee\xe9\x98\x8d\xf8\xb5G\t@f\x1et v\x14\tT\xc5', 0x0], 0x1000) 10:17:02 executing program 1: prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f00000002c0)=0x0) sched_setscheduler(r0, 0x2, &(0x7f0000000080)=0x6) r1 = getpid() sched_setscheduler(r1, 0x2, &(0x7f00000000c0)=0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r2, &(0x7f000057eff8)=@abs, 0x6e) sendmmsg$unix(r3, &(0x7f00000bd000), 0x318, 0x0) recvmmsg(r2, &(0x7f00000000c0), 0x10106, 0x2, 0x0) syz_mount_image$ext4(&(0x7f0000000180)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xfffbffff00000000, 0x8, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000600100000f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000006856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010300), 0x0, 0x640}, {&(0x7f0000010400)="03000000040000000500000016000f000300040000000000000000000f00698c", 0x20, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}, {&(0x7f0000011000)}, {0x0, 0x0, 0x6700000}, {&(0x7f0000000580)}], 0x0, &(0x7f0000013b00)=ANY=[@ANYBLOB='\x00']) r4 = creat(&(0x7f0000000000)='./file1\x00', 0x18) r5 = socket(0x10, 0x3, 0x0) sendmsg$nl_route(r5, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f00000005c0)=@ipv4_newroute={0x38, 0x18, 0xbad, 0x0, 0x0, {0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6}, [@RTA_ENCAP_TYPE={0x6, 0x15, 0x3}, @RTA_ENCAP={0x14, 0x16, 0x0, 0x1, @SEG6_IPTUNNEL_SRH={0xd}}]}, 0x38}}, 0x0) r6 = socket(0x26, 0x3, 0x0) sendmsg$nl_route(r6, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f00000005c0)=@ipv4_newroute={0x38, 0x18, 0xbad, 0x0, 0x0, {0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6}, [@RTA_ENCAP_TYPE={0x6, 0x15, 0x3}, @RTA_ENCAP={0x14, 0x16, 0x0, 0x1, @SEG6_IPTUNNEL_SRH={0xd}}]}, 0x38}}, 0x0) r7 = socket(0x10, 0x3, 0x0) sendmsg$nl_route(r7, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f00000005c0)=@ipv4_newroute={0x38, 0x18, 0xbad, 0x0, 0x0, {0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6}, [@RTA_ENCAP_TYPE={0x6, 0x15, 0x3}, @RTA_ENCAP={0x14, 0x16, 0x0, 0x1, @SEG6_IPTUNNEL_SRH={0xd}}]}, 0x38}}, 0x0) execveat(r4, &(0x7f0000000040)='./file0\x00', &(0x7f0000000380)=[&(0x7f00000001c0)='+{!#\x00', &(0x7f0000000300)='ext4\x00', &(0x7f0000000340)='@(\x00'], &(0x7f00000004c0)=[&(0x7f00000003c0)='ext4\x00', &(0x7f0000000400)='ext4\x00', &(0x7f0000000500)='\x00.D\x04\xe0\xce\x99\xd9\xa9\xac\xac\xadH\xa4\xcf\xb7\xffT\xac\x05\xfd\xdd\xb8w\x0f\x82B\xff\xf2\x909`1!\f\x870\x1f\xc1%Y\xc8\x15c \xea\x1cY!\x04\xe4\x91^\x00\x04\xe4\xa6\xba\xc6\xfd\x10\xdf\xe24\xd4&\x17\xdc\xec\xf4\f\n\xb7.\x13\x8e\x1bYENj\xe1\x19~\x1c\xaf\a;d\x9f\xba\xd9T\xd4-\xecX\xc0Y\x83@\xc7\x8b\xff*\xdd\xaa\xc6,o4\xe2\x0f\x16\x01[\xc0\xeb\x7fFI]WF\x1f\f?\xfa\xb1\xe7\xf6t\x027\xb1\xc17.4V\xf81{9\xa3\xb9\x01\xcck@I\xe2\xf1Y\x10E\xa1z/\x05.~Yh%\x8f\x06sB)N\x11P\xf6p\xff\'\xaf\a7\x10+p\xbb\xf3\xb08\xb5)\x00\xeeg\xd0\xee\xe9\x98\x8d\xf8\xb5G\t@f\x1et v\x14\tT\xc5', &(0x7f0000000480)=':--[\x00'], 0x1000) recvfrom(r2, &(0x7f0000000600)=""/203, 0xcb, 0x42, &(0x7f0000000700)=@hci={0x1f, 0xffffffffffffffff, 0x4}, 0x80) 10:17:02 executing program 2: prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f00000002c0)=0x0) sched_setscheduler(r0, 0x2, &(0x7f0000000080)=0x6) r1 = getpid() sched_setscheduler(r1, 0x2, &(0x7f00000000c0)=0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r2, &(0x7f000057eff8)=@abs, 0x6e) sendmmsg$unix(r3, &(0x7f00000bd000), 0x318, 0x0) syz_mount_image$ext4(&(0x7f0000000180)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xfffbffff00000000, 0x8, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000600100000f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000006856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010300), 0x0, 0x640}, {&(0x7f0000010400)="03000000040000000500000016000f000300040000000000000000000f00698c", 0x20, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}, {&(0x7f0000011000)}, {0x0, 0x0, 0x6700000}, {&(0x7f0000000580), 0x0, 0xc000}], 0x0, &(0x7f0000013b00)=ANY=[@ANYBLOB='\x00']) r4 = socket(0x10, 0x3, 0x0) sendmsg$nl_route(r4, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f00000005c0)=@ipv4_newroute={0x38, 0x18, 0xbad, 0x0, 0x0, {}, [@RTA_ENCAP_TYPE={0x6, 0x15, 0x3}, @RTA_ENCAP={0x14, 0x16, 0x0, 0x1, @SEG6_IPTUNNEL_SRH={0xd}}]}, 0x38}}, 0x0) r5 = socket(0x26, 0x3, 0x0) sendmsg$nl_route(r5, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f00000005c0)=@ipv4_newroute={0x38, 0x18, 0xbad, 0x0, 0x0, {0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6}, [@RTA_ENCAP_TYPE={0x6, 0x15, 0x3}, @RTA_ENCAP={0x14, 0x16, 0x0, 0x1, @SEG6_IPTUNNEL_SRH={0xd}}]}, 0x38}}, 0x0) r6 = socket(0x10, 0x0, 0x0) sendmsg$nl_route(r6, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f00000005c0)=@ipv4_newroute={0x38, 0x18, 0xbad, 0x0, 0x0, {0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6}, [@RTA_ENCAP_TYPE={0x6, 0x15, 0x3}, @RTA_ENCAP={0x14, 0x16, 0x0, 0x1, @SEG6_IPTUNNEL_SRH={0xd}}]}, 0x38}}, 0x0) recvfrom(r2, &(0x7f0000000600)=""/203, 0xcb, 0x42, &(0x7f0000000700)=@hci={0x1f, 0xffffffffffffffff, 0x4}, 0x80) 10:17:02 executing program 0: prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f00000002c0)=0x0) sched_setscheduler(r0, 0x2, &(0x7f0000000080)=0x6) r1 = getpid() sched_setscheduler(r1, 0x2, &(0x7f00000000c0)=0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r2, &(0x7f000057eff8)=@abs, 0x6e) sendmmsg$unix(r3, &(0x7f00000bd000), 0x318, 0x0) recvmmsg(r2, &(0x7f00000000c0), 0x10106, 0x2, 0x0) syz_mount_image$ext4(&(0x7f0000000180)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xfffbffff00000000, 0x8, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000600100000f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000006856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010300), 0x0, 0x640}, {&(0x7f0000010400)="03000000040000000500000016000f000300040000000000000000000f00698c", 0x20, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}, {&(0x7f0000011000)}, {0x0, 0x0, 0x6700000}, {0x0, 0x0, 0xc000}], 0x0, &(0x7f0000013b00)=ANY=[@ANYBLOB='\x00']) r4 = creat(&(0x7f0000000000)='./file1\x00', 0x18) r5 = socket(0x10, 0x3, 0x0) sendmsg$nl_route(r5, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f00000005c0)=@ipv4_newroute={0x38, 0x18, 0xbad, 0x0, 0x0, {0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6}, [@RTA_ENCAP_TYPE={0x6, 0x15, 0x3}, @RTA_ENCAP={0x14, 0x16, 0x0, 0x1, @SEG6_IPTUNNEL_SRH={0xd}}]}, 0x38}}, 0x0) r6 = socket(0x26, 0x3, 0x0) sendmsg$nl_route(r6, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f00000005c0)=@ipv4_newroute={0x38, 0x18, 0xbad, 0x0, 0x0, {0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6}, [@RTA_ENCAP_TYPE={0x6, 0x15, 0x3}, @RTA_ENCAP={0x14, 0x16, 0x0, 0x1, @SEG6_IPTUNNEL_SRH={0xd}}]}, 0x38}}, 0x0) r7 = socket(0x10, 0x3, 0x0) sendmsg$nl_route(r7, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f00000005c0)=@ipv4_newroute={0x38, 0x18, 0xbad, 0x0, 0x0, {0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6}, [@RTA_ENCAP_TYPE={0x6, 0x15, 0x3}, @RTA_ENCAP={0x14, 0x16, 0x0, 0x1, @SEG6_IPTUNNEL_SRH={0xd}}]}, 0x38}}, 0x0) execveat(r4, &(0x7f0000000040)='./file0\x00', &(0x7f0000000380)=[&(0x7f00000001c0)='+{!#\x00', &(0x7f0000000300)='ext4\x00', &(0x7f0000000340)='@(\x00'], &(0x7f00000004c0)=[&(0x7f00000003c0)='ext4\x00', &(0x7f0000000400)='ext4\x00', &(0x7f0000000500)='\x00.D\x04\xe0\xce\x99\xd9\xa9\xac\xac\xadH\xa4\xcf\xb7\xffT\xac\x05\xfd\xdd\xb8w\x0f\x82B\xff\xf2\x909`1!\f\x870\x1f\xc1%Y\xc8\x15c \xea\x1cY!\x04\xe4\x91^\x00\x04\xe4\xa6\xba\xc6\xfd\x10\xdf\xe24\xd4&\x17\xdc\xec\xf4\f\n\xb7.\x13\x8e\x1bYENj\xe1\x19~\x1c\xaf\a;d\x9f\xba\xd9T\xd4-\xecX\xc0Y\x83@\xc7\x8b\xff*\xdd\xaa\xc6,o4\xe2\x0f\x16\x01[\xc0\xeb\x7fFI]WF\x1f\f?\xfa\xb1\xe7\xf6t\x027\xb1\xc17.4V\xf81{9\xa3\xb9\x01\xcck@I\xe2\xf1Y\x10E\xa1z/\x05.~Yh%\x8f\x06sB)N\x11P\xf6p\xff\'\xaf\a7\x10+p\xbb\xf3\xb08\xb5)\x00\xeeg\xd0\xee\xe9\x98\x8d\xf8\xb5G\t@f\x1et v\x14\tT\xc5', &(0x7f0000000480)=':--[\x00'], 0x1000) recvfrom(r2, &(0x7f0000000600)=""/203, 0xcb, 0x42, &(0x7f0000000700)=@hci={0x1f, 0xffffffffffffffff, 0x4}, 0x80) [ 2322.616747][T26092] loop3: detected capacity change from 0 to 264192 [ 2322.959833][T26095] loop2: detected capacity change from 0 to 264192 [ 2322.968690][T26096] loop4: detected capacity change from 0 to 264192 [ 2323.733079][T26092] EXT4-fs: failed to create workqueue [ 2323.738528][T26092] EXT4-fs (loop3): mount failed [ 2323.793739][T26095] EXT4-fs: failed to create workqueue [ 2323.799163][T26095] EXT4-fs (loop2): mount failed 10:17:04 executing program 1: prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f00000002c0)=0x0) sched_setscheduler(r0, 0x2, &(0x7f0000000080)=0x6) r1 = getpid() sched_setscheduler(r1, 0x2, &(0x7f00000000c0)=0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r2, &(0x7f000057eff8)=@abs, 0x6e) sendmmsg$unix(r3, &(0x7f00000bd000), 0x318, 0x0) recvmmsg(r2, &(0x7f00000000c0), 0x10106, 0x2, 0x0) syz_mount_image$ext4(&(0x7f0000000180)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xfffbffff00000000, 0x8, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000600100000f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000006856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010300), 0x0, 0x640}, {&(0x7f0000010400)="03000000040000000500000016000f000300040000000000000000000f00698c", 0x20, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}, {&(0x7f0000011000)}, {0x0, 0x0, 0x6700000}, {&(0x7f0000000580)}], 0x0, &(0x7f0000013b00)=ANY=[@ANYBLOB='\x00']) r4 = creat(&(0x7f0000000000)='./file1\x00', 0x18) r5 = socket(0x10, 0x3, 0x0) sendmsg$nl_route(r5, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f00000005c0)=@ipv4_newroute={0x38, 0x18, 0xbad, 0x0, 0x0, {0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6}, [@RTA_ENCAP_TYPE={0x6, 0x15, 0x3}, @RTA_ENCAP={0x14, 0x16, 0x0, 0x1, @SEG6_IPTUNNEL_SRH={0xd}}]}, 0x38}}, 0x0) r6 = socket(0x26, 0x3, 0x0) sendmsg$nl_route(r6, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f00000005c0)=@ipv4_newroute={0x38, 0x18, 0xbad, 0x0, 0x0, {0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6}, [@RTA_ENCAP_TYPE={0x6, 0x15, 0x3}, @RTA_ENCAP={0x14, 0x16, 0x0, 0x1, @SEG6_IPTUNNEL_SRH={0xd}}]}, 0x38}}, 0x0) r7 = socket(0x10, 0x3, 0x0) sendmsg$nl_route(r7, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f00000005c0)=@ipv4_newroute={0x38, 0x18, 0xbad, 0x0, 0x0, {0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6}, [@RTA_ENCAP_TYPE={0x6, 0x15, 0x3}, @RTA_ENCAP={0x14, 0x16, 0x0, 0x1, @SEG6_IPTUNNEL_SRH={0xd}}]}, 0x38}}, 0x0) execveat(r4, &(0x7f0000000040)='./file0\x00', &(0x7f0000000380)=[&(0x7f00000001c0)='+{!#\x00', &(0x7f0000000300)='ext4\x00', &(0x7f0000000340)='@(\x00'], &(0x7f00000004c0)=[&(0x7f00000003c0)='ext4\x00', &(0x7f0000000400)='ext4\x00', &(0x7f0000000500)='\x00.D\x04\xe0\xce\x99\xd9\xa9\xac\xac\xadH\xa4\xcf\xb7\xffT\xac\x05\xfd\xdd\xb8w\x0f\x82B\xff\xf2\x909`1!\f\x870\x1f\xc1%Y\xc8\x15c \xea\x1cY!\x04\xe4\x91^\x00\x04\xe4\xa6\xba\xc6\xfd\x10\xdf\xe24\xd4&\x17\xdc\xec\xf4\f\n\xb7.\x13\x8e\x1bYENj\xe1\x19~\x1c\xaf\a;d\x9f\xba\xd9T\xd4-\xecX\xc0Y\x83@\xc7\x8b\xff*\xdd\xaa\xc6,o4\xe2\x0f\x16\x01[\xc0\xeb\x7fFI]WF\x1f\f?\xfa\xb1\xe7\xf6t\x027\xb1\xc17.4V\xf81{9\xa3\xb9\x01\xcck@I\xe2\xf1Y\x10E\xa1z/\x05.~Yh%\x8f\x06sB)N\x11P\xf6p\xff\'\xaf\a7\x10+p\xbb\xf3\xb08\xb5)\x00\xeeg\xd0\xee\xe9\x98\x8d\xf8\xb5G\t@f\x1et v\x14\tT\xc5', &(0x7f0000000480)=':--[\x00'], 0x1000) recvfrom(r2, &(0x7f0000000600)=""/203, 0xcb, 0x42, &(0x7f0000000700)=@hci={0x1f, 0xffffffffffffffff, 0x4}, 0x80) 10:17:04 executing program 0: prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f00000002c0)=0x0) sched_setscheduler(r0, 0x2, &(0x7f0000000080)=0x6) r1 = getpid() sched_setscheduler(r1, 0x2, &(0x7f00000000c0)=0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r2, &(0x7f000057eff8)=@abs, 0x6e) sendmmsg$unix(r3, &(0x7f00000bd000), 0x318, 0x0) recvmmsg(r2, &(0x7f00000000c0), 0x10106, 0x2, 0x0) syz_mount_image$ext4(&(0x7f0000000180)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xfffbffff00000000, 0x8, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000600100000f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000006856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010300), 0x0, 0x640}, {&(0x7f0000010400)="03000000040000000500000016000f000300040000000000000000000f00698c", 0x20, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}, {&(0x7f0000011000)}, {0x0, 0x0, 0x6700000}, {0x0, 0x0, 0xc000}], 0x0, &(0x7f0000013b00)=ANY=[@ANYBLOB='\x00']) r4 = creat(&(0x7f0000000000)='./file1\x00', 0x18) r5 = socket(0x10, 0x3, 0x0) sendmsg$nl_route(r5, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f00000005c0)=@ipv4_newroute={0x38, 0x18, 0xbad, 0x0, 0x0, {0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6}, [@RTA_ENCAP_TYPE={0x6, 0x15, 0x3}, @RTA_ENCAP={0x14, 0x16, 0x0, 0x1, @SEG6_IPTUNNEL_SRH={0xd}}]}, 0x38}}, 0x0) r6 = socket(0x26, 0x3, 0x0) sendmsg$nl_route(r6, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f00000005c0)=@ipv4_newroute={0x38, 0x18, 0xbad, 0x0, 0x0, {0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6}, [@RTA_ENCAP_TYPE={0x6, 0x15, 0x3}, @RTA_ENCAP={0x14, 0x16, 0x0, 0x1, @SEG6_IPTUNNEL_SRH={0xd}}]}, 0x38}}, 0x0) r7 = socket(0x10, 0x3, 0x0) sendmsg$nl_route(r7, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f00000005c0)=@ipv4_newroute={0x38, 0x18, 0xbad, 0x0, 0x0, {0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6}, [@RTA_ENCAP_TYPE={0x6, 0x15, 0x3}, @RTA_ENCAP={0x14, 0x16, 0x0, 0x1, @SEG6_IPTUNNEL_SRH={0xd}}]}, 0x38}}, 0x0) execveat(r4, &(0x7f0000000040)='./file0\x00', &(0x7f0000000380)=[&(0x7f00000001c0)='+{!#\x00', &(0x7f0000000300)='ext4\x00', &(0x7f0000000340)='@(\x00'], &(0x7f00000004c0)=[&(0x7f00000003c0)='ext4\x00', &(0x7f0000000400)='ext4\x00', &(0x7f0000000500)='\x00.D\x04\xe0\xce\x99\xd9\xa9\xac\xac\xadH\xa4\xcf\xb7\xffT\xac\x05\xfd\xdd\xb8w\x0f\x82B\xff\xf2\x909`1!\f\x870\x1f\xc1%Y\xc8\x15c \xea\x1cY!\x04\xe4\x91^\x00\x04\xe4\xa6\xba\xc6\xfd\x10\xdf\xe24\xd4&\x17\xdc\xec\xf4\f\n\xb7.\x13\x8e\x1bYENj\xe1\x19~\x1c\xaf\a;d\x9f\xba\xd9T\xd4-\xecX\xc0Y\x83@\xc7\x8b\xff*\xdd\xaa\xc6,o4\xe2\x0f\x16\x01[\xc0\xeb\x7fFI]WF\x1f\f?\xfa\xb1\xe7\xf6t\x027\xb1\xc17.4V\xf81{9\xa3\xb9\x01\xcck@I\xe2\xf1Y\x10E\xa1z/\x05.~Yh%\x8f\x06sB)N\x11P\xf6p\xff\'\xaf\a7\x10+p\xbb\xf3\xb08\xb5)\x00\xeeg\xd0\xee\xe9\x98\x8d\xf8\xb5G\t@f\x1et v\x14\tT\xc5', &(0x7f0000000480)=':--[\x00'], 0x1000) recvfrom(r2, &(0x7f0000000600)=""/203, 0xcb, 0x42, &(0x7f0000000700)=@hci={0x1f, 0xffffffffffffffff, 0x4}, 0x80) 10:17:04 executing program 3: prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f00000002c0)=0x0) sched_setscheduler(r0, 0x2, &(0x7f0000000080)=0x6) r1 = getpid() sched_setscheduler(r1, 0x2, &(0x7f00000000c0)=0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff}) connect$unix(r2, &(0x7f000057eff8)=@abs, 0x6e) recvmmsg(r2, &(0x7f00000000c0), 0x10106, 0x2, 0x0) syz_mount_image$ext4(&(0x7f0000000180)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xfffbffff00000000, 0x8, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000600100000f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000006856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010300), 0x0, 0x640}, {&(0x7f0000010400)="03000000040000000500000016000f000300040000000000000000000f00698c", 0x20, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}, {&(0x7f0000011000)}, {0x0, 0x0, 0x6700000}, {&(0x7f0000000580), 0x0, 0xc000}], 0x0, &(0x7f0000013b00)=ANY=[@ANYBLOB='\x00']) r3 = creat(&(0x7f0000000000)='./file1\x00', 0x18) socket(0x10, 0x3, 0x0) r4 = socket(0x26, 0x3, 0x0) sendmsg$nl_route(r4, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f00000005c0)=@ipv4_newroute={0x38, 0x18, 0xbad, 0x0, 0x0, {0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6}, [@RTA_ENCAP_TYPE={0x6, 0x15, 0x3}, @RTA_ENCAP={0x14, 0x16, 0x0, 0x1, @SEG6_IPTUNNEL_SRH={0xd}}]}, 0x38}}, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f00000005c0)=@ipv4_newroute={0x38, 0x18, 0xbad, 0x0, 0x0, {0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6}, [@RTA_ENCAP_TYPE={0x6, 0x15, 0x3}, @RTA_ENCAP={0x14, 0x16, 0x0, 0x1, @SEG6_IPTUNNEL_SRH={0xd}}]}, 0x38}}, 0x0) execveat(r3, 0x0, &(0x7f0000000380)=[&(0x7f00000001c0)='+{!#\x00', &(0x7f0000000300)='ext4\x00', &(0x7f0000000340)='@(\x00'], &(0x7f00000004c0)=[&(0x7f00000003c0)='ext4\x00', &(0x7f0000000400)='ext4\x00', &(0x7f0000000500)='\x00.D\x04\xe0\xce\x99\xd9\xa9\xac\xac\xadH\xa4\xcf\xb7\xffT\xac\x05\xfd\xdd\xb8w\x0f\x82B\xff\xf2\x909`1!\f\x870\x1f\xc1%Y\xc8\x15c \xea\x1cY!\x04\xe4\x91^\x00\x04\xe4\xa6\xba\xc6\xfd\x10\xdf\xe24\xd4&\x17\xdc\xec\xf4\f\n\xb7.\x13\x8e\x1bYENj\xe1\x19~\x1c\xaf\a;d\x9f\xba\xd9T\xd4-\xecX\xc0Y\x83@\xc7\x8b\xff*\xdd\xaa\xc6,o4\xe2\x0f\x16\x01[\xc0\xeb\x7fFI]WF\x1f\f?\xfa\xb1\xe7\xf6t\x027\xb1\xc17.4V\xf81{9\xa3\xb9\x01\xcck@I\xe2\xf1Y\x10E\xa1z/\x05.~Yh%\x8f\x06sB)N\x11P\xf6p\xff\'\xaf\a7\x10+p\xbb\xf3\xb08\xb5)\x00\xeeg\xd0\xee\xe9\x98\x8d\xf8\xb5G\t@f\x1et v\x14\tT\xc5', 0x0], 0x1000) [ 2323.849602][T26096] EXT4-fs: failed to create workqueue [ 2323.855008][T26096] EXT4-fs (loop4): mount failed 10:17:04 executing program 2: prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f00000002c0)=0x0) sched_setscheduler(r0, 0x2, &(0x7f0000000080)=0x6) r1 = getpid() sched_setscheduler(r1, 0x2, &(0x7f00000000c0)=0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r2, &(0x7f000057eff8)=@abs, 0x6e) sendmmsg$unix(r3, &(0x7f00000bd000), 0x318, 0x0) syz_mount_image$ext4(&(0x7f0000000180)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xfffbffff00000000, 0x8, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000600100000f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000006856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010300), 0x0, 0x640}, {&(0x7f0000010400)="03000000040000000500000016000f000300040000000000000000000f00698c", 0x20, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}, {&(0x7f0000011000)}, {0x0, 0x0, 0x6700000}, {&(0x7f0000000580), 0x0, 0xc000}], 0x0, &(0x7f0000013b00)=ANY=[@ANYBLOB='\x00']) r4 = socket(0x10, 0x3, 0x0) sendmsg$nl_route(r4, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f00000005c0)=@ipv4_newroute={0x38, 0x18, 0xbad, 0x0, 0x0, {}, [@RTA_ENCAP_TYPE={0x6, 0x15, 0x3}, @RTA_ENCAP={0x14, 0x16, 0x0, 0x1, @SEG6_IPTUNNEL_SRH={0xd}}]}, 0x38}}, 0x0) r5 = socket(0x26, 0x3, 0x0) sendmsg$nl_route(r5, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f00000005c0)=@ipv4_newroute={0x38, 0x18, 0xbad, 0x0, 0x0, {0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6}, [@RTA_ENCAP_TYPE={0x6, 0x15, 0x3}, @RTA_ENCAP={0x14, 0x16, 0x0, 0x1, @SEG6_IPTUNNEL_SRH={0xd}}]}, 0x38}}, 0x0) r6 = socket(0x10, 0x0, 0x0) sendmsg$nl_route(r6, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f00000005c0)=@ipv4_newroute={0x38, 0x18, 0xbad, 0x0, 0x0, {0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6}, [@RTA_ENCAP_TYPE={0x6, 0x15, 0x3}, @RTA_ENCAP={0x14, 0x16, 0x0, 0x1, @SEG6_IPTUNNEL_SRH={0xd}}]}, 0x38}}, 0x0) recvfrom(r2, &(0x7f0000000600)=""/203, 0xcb, 0x42, &(0x7f0000000700)=@hci={0x1f, 0xffffffffffffffff, 0x4}, 0x80) [ 2323.934817][T26079] I/O error, dev loop3, sector 264064 op 0x0:(READ) flags 0x80700 phys_seg 1 prio class 0 [ 2323.949862][T26119] I/O error, dev loop2, sector 264064 op 0x0:(READ) flags 0x80700 phys_seg 1 prio class 0 10:17:05 executing program 4: prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f00000002c0)=0x0) sched_setscheduler(r0, 0x2, &(0x7f0000000080)=0x6) r1 = getpid() sched_setscheduler(r1, 0x2, &(0x7f00000000c0)=0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r2, &(0x7f000057eff8)=@abs, 0x6e) sendmmsg$unix(r3, &(0x7f00000bd000), 0x318, 0x0) recvmmsg(r2, &(0x7f00000000c0), 0x10106, 0x2, 0x0) syz_mount_image$ext4(&(0x7f0000000180)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xfffbffff00000000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000600100000f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000006856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010300), 0x0, 0x640}, {&(0x7f0000010400)="03000000040000000500000016000f000300040000000000000000000f00698c", 0x20, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}, {&(0x7f0000011000)}, {0x0, 0x0, 0x6700000}], 0x0, &(0x7f0000013b00)=ANY=[@ANYBLOB='\x00']) r4 = creat(&(0x7f0000000000)='./file1\x00', 0x18) r5 = socket(0x10, 0x3, 0x0) sendmsg$nl_route(r5, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f00000005c0)=@ipv4_newroute={0x38, 0x18, 0xbad, 0x0, 0x0, {0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6}, [@RTA_ENCAP_TYPE={0x6, 0x15, 0x3}, @RTA_ENCAP={0x14, 0x16, 0x0, 0x1, @SEG6_IPTUNNEL_SRH={0xd}}]}, 0x38}}, 0x0) r6 = socket(0x26, 0x3, 0x0) sendmsg$nl_route(r6, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f00000005c0)=@ipv4_newroute={0x38, 0x18, 0xbad, 0x0, 0x0, {0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6}, [@RTA_ENCAP_TYPE={0x6, 0x15, 0x3}, @RTA_ENCAP={0x14, 0x16, 0x0, 0x1, @SEG6_IPTUNNEL_SRH={0xd}}]}, 0x38}}, 0x0) r7 = socket(0x10, 0x3, 0x0) sendmsg$nl_route(r7, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f00000005c0)=@ipv4_newroute={0x38, 0x18, 0xbad, 0x0, 0x0, {0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6}, [@RTA_ENCAP_TYPE={0x6, 0x15, 0x3}, @RTA_ENCAP={0x14, 0x16, 0x0, 0x1, @SEG6_IPTUNNEL_SRH={0xd}}]}, 0x38}}, 0x0) execveat(r4, &(0x7f0000000040)='./file0\x00', &(0x7f0000000380)=[&(0x7f00000001c0)='+{!#\x00', &(0x7f0000000300)='ext4\x00', &(0x7f0000000340)='@(\x00'], &(0x7f00000004c0)=[&(0x7f00000003c0)='ext4\x00', &(0x7f0000000400)='ext4\x00', &(0x7f0000000500)='\x00.D\x04\xe0\xce\x99\xd9\xa9\xac\xac\xadH\xa4\xcf\xb7\xffT\xac\x05\xfd\xdd\xb8w\x0f\x82B\xff\xf2\x909`1!\f\x870\x1f\xc1%Y\xc8\x15c \xea\x1cY!\x04\xe4\x91^\x00\x04\xe4\xa6\xba\xc6\xfd\x10\xdf\xe24\xd4&\x17\xdc\xec\xf4\f\n\xb7.\x13\x8e\x1bYENj\xe1\x19~\x1c\xaf\a;d\x9f\xba\xd9T\xd4-\xecX\xc0Y\x83@\xc7\x8b\xff*\xdd\xaa\xc6,o4\xe2\x0f\x16\x01[\xc0\xeb\x7fFI]WF\x1f\f?\xfa\xb1\xe7\xf6t\x027\xb1\xc17.4V\xf81{9\xa3\xb9\x01\xcck@I\xe2\xf1Y\x10E\xa1z/\x05.~Yh%\x8f\x06sB)N\x11P\xf6p\xff\'\xaf\a7\x10+p\xbb\xf3\xb08\xb5)\x00\xeeg\xd0\xee\xe9\x98\x8d\xf8\xb5G\t@f\x1et v\x14\tT\xc5', &(0x7f0000000480)=':--[\x00'], 0x1000) recvfrom(r2, &(0x7f0000000600)=""/203, 0xcb, 0x42, &(0x7f0000000700)=@hci={0x1f, 0xffffffffffffffff, 0x4}, 0x80) [ 2324.712541][T26131] loop3: detected capacity change from 0 to 264192 [ 2324.713915][T26079] I/O error, dev loop3, sector 0 op 0x0:(READ) flags 0x80700 phys_seg 62 prio class 0 [ 2324.729879][T26079] I/O error, dev loop3, sector 0 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 0 [ 2324.736459][T26128] I/O error, dev loop4, sector 264064 op 0x0:(READ) flags 0x80700 phys_seg 1 prio class 0 [ 2324.739049][T26079] Buffer I/O error on dev loop3, logical block 0, async page read 10:17:05 executing program 1: prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f00000002c0)=0x0) sched_setscheduler(r0, 0x2, &(0x7f0000000080)=0x6) r1 = getpid() sched_setscheduler(r1, 0x2, &(0x7f00000000c0)=0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r2, &(0x7f000057eff8)=@abs, 0x6e) sendmmsg$unix(r3, &(0x7f00000bd000), 0x318, 0x0) recvmmsg(r2, &(0x7f00000000c0), 0x10106, 0x2, 0x0) syz_mount_image$ext4(&(0x7f0000000180)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x8, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000600100000f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000006856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010300), 0x0, 0x640}, {&(0x7f0000010400)="03000000040000000500000016000f000300040000000000000000000f00698c", 0x20, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}, {&(0x7f0000011000)}, {0x0, 0x0, 0x6700000}, {&(0x7f0000000580), 0x0, 0xc000}], 0x0, &(0x7f0000013b00)=ANY=[@ANYBLOB='\x00']) r4 = creat(&(0x7f0000000000)='./file1\x00', 0x18) r5 = socket(0x10, 0x3, 0x0) sendmsg$nl_route(r5, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f00000005c0)=@ipv4_newroute={0x38, 0x18, 0xbad, 0x0, 0x0, {0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6}, [@RTA_ENCAP_TYPE={0x6, 0x15, 0x3}, @RTA_ENCAP={0x14, 0x16, 0x0, 0x1, @SEG6_IPTUNNEL_SRH={0xd}}]}, 0x38}}, 0x0) r6 = socket(0x26, 0x3, 0x0) sendmsg$nl_route(r6, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f00000005c0)=@ipv4_newroute={0x38, 0x18, 0xbad, 0x0, 0x0, {0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6}, [@RTA_ENCAP_TYPE={0x6, 0x15, 0x3}, @RTA_ENCAP={0x14, 0x16, 0x0, 0x1, @SEG6_IPTUNNEL_SRH={0xd}}]}, 0x38}}, 0x0) r7 = socket(0x10, 0x3, 0x0) sendmsg$nl_route(r7, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f00000005c0)=@ipv4_newroute={0x38, 0x18, 0xbad, 0x0, 0x0, {0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6}, [@RTA_ENCAP_TYPE={0x6, 0x15, 0x3}, @RTA_ENCAP={0x14, 0x16, 0x0, 0x1, @SEG6_IPTUNNEL_SRH={0xd}}]}, 0x38}}, 0x0) execveat(r4, &(0x7f0000000040)='./file0\x00', &(0x7f0000000380)=[&(0x7f00000001c0)='+{!#\x00', &(0x7f0000000300)='ext4\x00', &(0x7f0000000340)='@(\x00'], &(0x7f00000004c0)=[&(0x7f00000003c0)='ext4\x00', &(0x7f0000000400)='ext4\x00', &(0x7f0000000500)='\x00.D\x04\xe0\xce\x99\xd9\xa9\xac\xac\xadH\xa4\xcf\xb7\xffT\xac\x05\xfd\xdd\xb8w\x0f\x82B\xff\xf2\x909`1!\f\x870\x1f\xc1%Y\xc8\x15c \xea\x1cY!\x04\xe4\x91^\x00\x04\xe4\xa6\xba\xc6\xfd\x10\xdf\xe24\xd4&\x17\xdc\xec\xf4\f\n\xb7.\x13\x8e\x1bYENj\xe1\x19~\x1c\xaf\a;d\x9f\xba\xd9T\xd4-\xecX\xc0Y\x83@\xc7\x8b\xff*\xdd\xaa\xc6,o4\xe2\x0f\x16\x01[\xc0\xeb\x7fFI]WF\x1f\f?\xfa\xb1\xe7\xf6t\x027\xb1\xc17.4V\xf81{9\xa3\xb9\x01\xcck@I\xe2\xf1Y\x10E\xa1z/\x05.~Yh%\x8f\x06sB)N\x11P\xf6p\xff\'\xaf\a7\x10+p\xbb\xf3\xb08\xb5)\x00\xeeg\xd0\xee\xe9\x98\x8d\xf8\xb5G\t@f\x1et v\x14\tT\xc5', &(0x7f0000000480)=':--[\x00'], 0x1000) recvfrom(r2, &(0x7f0000000600)=""/203, 0xcb, 0x42, &(0x7f0000000700)=@hci={0x1f, 0xffffffffffffffff, 0x4}, 0x80) [ 2324.766059][T26134] loop2: detected capacity change from 0 to 264192 [ 2324.816768][T26134] EXT4-fs (loop2): mounted filesystem without journal. Quota mode: writeback. [ 2324.829794][T26131] EXT4-fs (loop3): mounted filesystem without journal. Quota mode: writeback. [ 2325.199323][T26147] loop4: detected capacity change from 0 to 264192 [ 2326.617457][T26147] EXT4-fs (loop4): mounted filesystem without journal. Quota mode: writeback. 10:17:10 executing program 5: prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f00000002c0)=0x0) sched_setscheduler(r0, 0x2, &(0x7f0000000080)=0x6) r1 = getpid() sched_setscheduler(r1, 0x2, &(0x7f00000000c0)=0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r2, &(0x7f000057eff8)=@abs, 0x6e) sendmmsg$unix(r3, &(0x7f00000bd000), 0x318, 0x0) recvmmsg(r2, &(0x7f00000000c0), 0x10106, 0x2, 0x0) syz_mount_image$ext4(&(0x7f0000000180)='ext4\x00', 0x0, 0xfffbffff00000000, 0x8, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000600100000f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000006856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010300), 0x0, 0x640}, {&(0x7f0000010400)="03000000040000000500000016000f000300040000000000000000000f00698c", 0x20, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}, {&(0x7f0000011000)}, {0x0, 0x0, 0x6700000}, {&(0x7f0000000580), 0x0, 0xc000}], 0x0, &(0x7f0000013b00)=ANY=[@ANYBLOB='\x00']) r4 = creat(&(0x7f0000000000)='./file1\x00', 0x18) r5 = socket(0x10, 0x3, 0x0) sendmsg$nl_route(r5, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f00000005c0)=@ipv4_newroute={0x38, 0x18, 0xbad, 0x0, 0x0, {0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6}, [@RTA_ENCAP_TYPE={0x6, 0x15, 0x3}, @RTA_ENCAP={0x14, 0x16, 0x0, 0x1, @SEG6_IPTUNNEL_SRH={0xd}}]}, 0x38}}, 0x0) r6 = socket(0x26, 0x3, 0x0) sendmsg$nl_route(r6, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f00000005c0)=@ipv4_newroute={0x38, 0x18, 0xbad, 0x0, 0x0, {0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6}, [@RTA_ENCAP_TYPE={0x6, 0x15, 0x3}, @RTA_ENCAP={0x14, 0x16, 0x0, 0x1, @SEG6_IPTUNNEL_SRH={0xd}}]}, 0x38}}, 0x0) r7 = socket(0x10, 0x3, 0x0) sendmsg$nl_route(r7, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f00000005c0)=@ipv4_newroute={0x38, 0x18, 0xbad, 0x0, 0x0, {0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6}, [@RTA_ENCAP_TYPE={0x6, 0x15, 0x3}, @RTA_ENCAP={0x14, 0x16, 0x0, 0x1, @SEG6_IPTUNNEL_SRH={0xd}}]}, 0x38}}, 0x0) execveat(r4, &(0x7f0000000040)='./file0\x00', &(0x7f0000000380)=[&(0x7f00000001c0)='+{!#\x00', &(0x7f0000000300)='ext4\x00', &(0x7f0000000340)='@(\x00'], &(0x7f00000004c0)=[&(0x7f00000003c0)='ext4\x00', &(0x7f0000000400)='ext4\x00', &(0x7f0000000500)='\x00.D\x04\xe0\xce\x99\xd9\xa9\xac\xac\xadH\xa4\xcf\xb7\xffT\xac\x05\xfd\xdd\xb8w\x0f\x82B\xff\xf2\x909`1!\f\x870\x1f\xc1%Y\xc8\x15c \xea\x1cY!\x04\xe4\x91^\x00\x04\xe4\xa6\xba\xc6\xfd\x10\xdf\xe24\xd4&\x17\xdc\xec\xf4\f\n\xb7.\x13\x8e\x1bYENj\xe1\x19~\x1c\xaf\a;d\x9f\xba\xd9T\xd4-\xecX\xc0Y\x83@\xc7\x8b\xff*\xdd\xaa\xc6,o4\xe2\x0f\x16\x01[\xc0\xeb\x7fFI]WF\x1f\f?\xfa\xb1\xe7\xf6t\x027\xb1\xc17.4V\xf81{9\xa3\xb9\x01\xcck@I\xe2\xf1Y\x10E\xa1z/\x05.~Yh%\x8f\x06sB)N\x11P\xf6p\xff\'\xaf\a7\x10+p\xbb\xf3\xb08\xb5)\x00\xeeg\xd0\xee\xe9\x98\x8d\xf8\xb5G\t@f\x1et v\x14\tT\xc5', &(0x7f0000000480)=':--[\x00'], 0x1000) recvfrom(r2, &(0x7f0000000600)=""/203, 0xcb, 0x42, &(0x7f0000000700)=@hci={0x1f, 0xffffffffffffffff, 0x4}, 0x80) 10:17:10 executing program 0: prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f00000002c0)=0x0) sched_setscheduler(r0, 0x2, &(0x7f0000000080)=0x6) r1 = getpid() sched_setscheduler(r1, 0x2, &(0x7f00000000c0)=0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r2, &(0x7f000057eff8)=@abs, 0x6e) sendmmsg$unix(r3, &(0x7f00000bd000), 0x318, 0x0) recvmmsg(r2, &(0x7f00000000c0), 0x10106, 0x2, 0x0) syz_mount_image$ext4(&(0x7f0000000180)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xfffbffff00000000, 0x8, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000600100000f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000006856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010300), 0x0, 0x640}, {&(0x7f0000010400)="03000000040000000500000016000f000300040000000000000000000f00698c", 0x20, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}, {&(0x7f0000011000)}, {0x0, 0x0, 0x6700000}, {0x0, 0x0, 0xc000}], 0x0, &(0x7f0000013b00)=ANY=[@ANYBLOB='\x00']) r4 = creat(&(0x7f0000000000)='./file1\x00', 0x18) r5 = socket(0x10, 0x3, 0x0) sendmsg$nl_route(r5, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f00000005c0)=@ipv4_newroute={0x38, 0x18, 0xbad, 0x0, 0x0, {0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6}, [@RTA_ENCAP_TYPE={0x6, 0x15, 0x3}, @RTA_ENCAP={0x14, 0x16, 0x0, 0x1, @SEG6_IPTUNNEL_SRH={0xd}}]}, 0x38}}, 0x0) r6 = socket(0x26, 0x3, 0x0) sendmsg$nl_route(r6, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f00000005c0)=@ipv4_newroute={0x38, 0x18, 0xbad, 0x0, 0x0, {0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6}, [@RTA_ENCAP_TYPE={0x6, 0x15, 0x3}, @RTA_ENCAP={0x14, 0x16, 0x0, 0x1, @SEG6_IPTUNNEL_SRH={0xd}}]}, 0x38}}, 0x0) r7 = socket(0x10, 0x3, 0x0) sendmsg$nl_route(r7, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f00000005c0)=@ipv4_newroute={0x38, 0x18, 0xbad, 0x0, 0x0, {0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6}, [@RTA_ENCAP_TYPE={0x6, 0x15, 0x3}, @RTA_ENCAP={0x14, 0x16, 0x0, 0x1, @SEG6_IPTUNNEL_SRH={0xd}}]}, 0x38}}, 0x0) execveat(r4, &(0x7f0000000040)='./file0\x00', &(0x7f0000000380)=[&(0x7f00000001c0)='+{!#\x00', &(0x7f0000000300)='ext4\x00', &(0x7f0000000340)='@(\x00'], &(0x7f00000004c0)=[&(0x7f00000003c0)='ext4\x00', &(0x7f0000000400)='ext4\x00', &(0x7f0000000500)='\x00.D\x04\xe0\xce\x99\xd9\xa9\xac\xac\xadH\xa4\xcf\xb7\xffT\xac\x05\xfd\xdd\xb8w\x0f\x82B\xff\xf2\x909`1!\f\x870\x1f\xc1%Y\xc8\x15c \xea\x1cY!\x04\xe4\x91^\x00\x04\xe4\xa6\xba\xc6\xfd\x10\xdf\xe24\xd4&\x17\xdc\xec\xf4\f\n\xb7.\x13\x8e\x1bYENj\xe1\x19~\x1c\xaf\a;d\x9f\xba\xd9T\xd4-\xecX\xc0Y\x83@\xc7\x8b\xff*\xdd\xaa\xc6,o4\xe2\x0f\x16\x01[\xc0\xeb\x7fFI]WF\x1f\f?\xfa\xb1\xe7\xf6t\x027\xb1\xc17.4V\xf81{9\xa3\xb9\x01\xcck@I\xe2\xf1Y\x10E\xa1z/\x05.~Yh%\x8f\x06sB)N\x11P\xf6p\xff\'\xaf\a7\x10+p\xbb\xf3\xb08\xb5)\x00\xeeg\xd0\xee\xe9\x98\x8d\xf8\xb5G\t@f\x1et v\x14\tT\xc5', &(0x7f0000000480)=':--[\x00'], 0x1000) recvfrom(r2, &(0x7f0000000600)=""/203, 0xcb, 0x42, &(0x7f0000000700)=@hci={0x1f, 0xffffffffffffffff, 0x4}, 0x80) 10:17:10 executing program 2: prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f00000002c0)=0x0) sched_setscheduler(r0, 0x2, &(0x7f0000000080)=0x6) r1 = getpid() sched_setscheduler(r1, 0x2, &(0x7f00000000c0)=0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r2, &(0x7f000057eff8)=@abs, 0x6e) sendmmsg$unix(r3, &(0x7f00000bd000), 0x318, 0x0) syz_mount_image$ext4(&(0x7f0000000180)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xfffbffff00000000, 0x8, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000600100000f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000006856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010300), 0x0, 0x640}, {&(0x7f0000010400)="03000000040000000500000016000f000300040000000000000000000f00698c", 0x20, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}, {&(0x7f0000011000)}, {0x0, 0x0, 0x6700000}, {&(0x7f0000000580), 0x0, 0xc000}], 0x0, &(0x7f0000013b00)=ANY=[@ANYBLOB='\x00']) r4 = socket(0x10, 0x3, 0x0) sendmsg$nl_route(r4, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f00000005c0)=@ipv4_newroute={0x38, 0x18, 0xbad, 0x0, 0x0, {}, [@RTA_ENCAP_TYPE={0x6, 0x15, 0x3}, @RTA_ENCAP={0x14, 0x16, 0x0, 0x1, @SEG6_IPTUNNEL_SRH={0xd}}]}, 0x38}}, 0x0) r5 = socket(0x26, 0x3, 0x0) sendmsg$nl_route(r5, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f00000005c0)=@ipv4_newroute={0x38, 0x18, 0xbad, 0x0, 0x0, {0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6}, [@RTA_ENCAP_TYPE={0x6, 0x15, 0x3}, @RTA_ENCAP={0x14, 0x16, 0x0, 0x1, @SEG6_IPTUNNEL_SRH={0xd}}]}, 0x38}}, 0x0) r6 = socket(0x10, 0x0, 0x0) sendmsg$nl_route(r6, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f00000005c0)=@ipv4_newroute={0x38, 0x18, 0xbad, 0x0, 0x0, {0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6}, [@RTA_ENCAP_TYPE={0x6, 0x15, 0x3}, @RTA_ENCAP={0x14, 0x16, 0x0, 0x1, @SEG6_IPTUNNEL_SRH={0xd}}]}, 0x38}}, 0x0) recvfrom(r2, &(0x7f0000000600)=""/203, 0xcb, 0x42, &(0x7f0000000700)=@hci={0x1f, 0xffffffffffffffff, 0x4}, 0x80) 10:17:10 executing program 1: prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f00000002c0)=0x0) sched_setscheduler(r0, 0x2, &(0x7f0000000080)=0x6) r1 = getpid() sched_setscheduler(r1, 0x2, &(0x7f00000000c0)=0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r2, &(0x7f000057eff8)=@abs, 0x6e) sendmmsg$unix(r3, &(0x7f00000bd000), 0x318, 0x0) recvmmsg(r2, &(0x7f00000000c0), 0x10106, 0x2, 0x0) syz_mount_image$ext4(&(0x7f0000000180)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x8, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000600100000f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000006856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010300), 0x0, 0x640}, {&(0x7f0000010400)="03000000040000000500000016000f000300040000000000000000000f00698c", 0x20, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}, {&(0x7f0000011000)}, {0x0, 0x0, 0x6700000}, {&(0x7f0000000580), 0x0, 0xc000}], 0x0, &(0x7f0000013b00)=ANY=[@ANYBLOB='\x00']) r4 = creat(&(0x7f0000000000)='./file1\x00', 0x18) r5 = socket(0x10, 0x3, 0x0) sendmsg$nl_route(r5, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f00000005c0)=@ipv4_newroute={0x38, 0x18, 0xbad, 0x0, 0x0, {0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6}, [@RTA_ENCAP_TYPE={0x6, 0x15, 0x3}, @RTA_ENCAP={0x14, 0x16, 0x0, 0x1, @SEG6_IPTUNNEL_SRH={0xd}}]}, 0x38}}, 0x0) r6 = socket(0x26, 0x3, 0x0) sendmsg$nl_route(r6, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f00000005c0)=@ipv4_newroute={0x38, 0x18, 0xbad, 0x0, 0x0, {0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6}, [@RTA_ENCAP_TYPE={0x6, 0x15, 0x3}, @RTA_ENCAP={0x14, 0x16, 0x0, 0x1, @SEG6_IPTUNNEL_SRH={0xd}}]}, 0x38}}, 0x0) r7 = socket(0x10, 0x3, 0x0) sendmsg$nl_route(r7, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f00000005c0)=@ipv4_newroute={0x38, 0x18, 0xbad, 0x0, 0x0, {0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6}, [@RTA_ENCAP_TYPE={0x6, 0x15, 0x3}, @RTA_ENCAP={0x14, 0x16, 0x0, 0x1, @SEG6_IPTUNNEL_SRH={0xd}}]}, 0x38}}, 0x0) execveat(r4, &(0x7f0000000040)='./file0\x00', &(0x7f0000000380)=[&(0x7f00000001c0)='+{!#\x00', &(0x7f0000000300)='ext4\x00', &(0x7f0000000340)='@(\x00'], &(0x7f00000004c0)=[&(0x7f00000003c0)='ext4\x00', &(0x7f0000000400)='ext4\x00', &(0x7f0000000500)='\x00.D\x04\xe0\xce\x99\xd9\xa9\xac\xac\xadH\xa4\xcf\xb7\xffT\xac\x05\xfd\xdd\xb8w\x0f\x82B\xff\xf2\x909`1!\f\x870\x1f\xc1%Y\xc8\x15c \xea\x1cY!\x04\xe4\x91^\x00\x04\xe4\xa6\xba\xc6\xfd\x10\xdf\xe24\xd4&\x17\xdc\xec\xf4\f\n\xb7.\x13\x8e\x1bYENj\xe1\x19~\x1c\xaf\a;d\x9f\xba\xd9T\xd4-\xecX\xc0Y\x83@\xc7\x8b\xff*\xdd\xaa\xc6,o4\xe2\x0f\x16\x01[\xc0\xeb\x7fFI]WF\x1f\f?\xfa\xb1\xe7\xf6t\x027\xb1\xc17.4V\xf81{9\xa3\xb9\x01\xcck@I\xe2\xf1Y\x10E\xa1z/\x05.~Yh%\x8f\x06sB)N\x11P\xf6p\xff\'\xaf\a7\x10+p\xbb\xf3\xb08\xb5)\x00\xeeg\xd0\xee\xe9\x98\x8d\xf8\xb5G\t@f\x1et v\x14\tT\xc5', &(0x7f0000000480)=':--[\x00'], 0x1000) recvfrom(r2, &(0x7f0000000600)=""/203, 0xcb, 0x42, &(0x7f0000000700)=@hci={0x1f, 0xffffffffffffffff, 0x4}, 0x80) 10:17:10 executing program 3: prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f00000002c0)=0x0) sched_setscheduler(r0, 0x2, &(0x7f0000000080)=0x6) r1 = getpid() sched_setscheduler(r1, 0x2, &(0x7f00000000c0)=0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff}) connect$unix(r2, &(0x7f000057eff8)=@abs, 0x6e) recvmmsg(r2, &(0x7f00000000c0), 0x10106, 0x2, 0x0) syz_mount_image$ext4(&(0x7f0000000180)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xfffbffff00000000, 0x8, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000600100000f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000006856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010300), 0x0, 0x640}, {&(0x7f0000010400)="03000000040000000500000016000f000300040000000000000000000f00698c", 0x20, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}, {&(0x7f0000011000)}, {0x0, 0x0, 0x6700000}, {&(0x7f0000000580), 0x0, 0xc000}], 0x0, &(0x7f0000013b00)=ANY=[@ANYBLOB='\x00']) r3 = creat(&(0x7f0000000000)='./file1\x00', 0x18) socket(0x10, 0x3, 0x0) r4 = socket(0x26, 0x3, 0x0) sendmsg$nl_route(r4, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f00000005c0)=@ipv4_newroute={0x38, 0x18, 0xbad, 0x0, 0x0, {0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6}, [@RTA_ENCAP_TYPE={0x6, 0x15, 0x3}, @RTA_ENCAP={0x14, 0x16, 0x0, 0x1, @SEG6_IPTUNNEL_SRH={0xd}}]}, 0x38}}, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f00000005c0)=@ipv4_newroute={0x38, 0x18, 0xbad, 0x0, 0x0, {0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6}, [@RTA_ENCAP_TYPE={0x6, 0x15, 0x3}, @RTA_ENCAP={0x14, 0x16, 0x0, 0x1, @SEG6_IPTUNNEL_SRH={0xd}}]}, 0x38}}, 0x0) execveat(r3, 0x0, &(0x7f0000000380)=[&(0x7f00000001c0)='+{!#\x00', &(0x7f0000000300)='ext4\x00', &(0x7f0000000340)='@(\x00'], &(0x7f00000004c0)=[&(0x7f00000003c0)='ext4\x00', &(0x7f0000000400)='ext4\x00', &(0x7f0000000500)='\x00.D\x04\xe0\xce\x99\xd9\xa9\xac\xac\xadH\xa4\xcf\xb7\xffT\xac\x05\xfd\xdd\xb8w\x0f\x82B\xff\xf2\x909`1!\f\x870\x1f\xc1%Y\xc8\x15c \xea\x1cY!\x04\xe4\x91^\x00\x04\xe4\xa6\xba\xc6\xfd\x10\xdf\xe24\xd4&\x17\xdc\xec\xf4\f\n\xb7.\x13\x8e\x1bYENj\xe1\x19~\x1c\xaf\a;d\x9f\xba\xd9T\xd4-\xecX\xc0Y\x83@\xc7\x8b\xff*\xdd\xaa\xc6,o4\xe2\x0f\x16\x01[\xc0\xeb\x7fFI]WF\x1f\f?\xfa\xb1\xe7\xf6t\x027\xb1\xc17.4V\xf81{9\xa3\xb9\x01\xcck@I\xe2\xf1Y\x10E\xa1z/\x05.~Yh%\x8f\x06sB)N\x11P\xf6p\xff\'\xaf\a7\x10+p\xbb\xf3\xb08\xb5)\x00\xeeg\xd0\xee\xe9\x98\x8d\xf8\xb5G\t@f\x1et v\x14\tT\xc5', 0x0], 0x1000) 10:17:10 executing program 4: prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f00000002c0)=0x0) sched_setscheduler(r0, 0x2, &(0x7f0000000080)=0x6) r1 = getpid() sched_setscheduler(r1, 0x2, &(0x7f00000000c0)=0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r2, &(0x7f000057eff8)=@abs, 0x6e) sendmmsg$unix(r3, &(0x7f00000bd000), 0x318, 0x0) recvmmsg(r2, &(0x7f00000000c0), 0x10106, 0x2, 0x0) syz_mount_image$ext4(&(0x7f0000000180)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x8, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000600100000f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000006856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010300), 0x0, 0x640}, {&(0x7f0000010400)="03000000040000000500000016000f000300040000000000000000000f00698c", 0x20, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}, {&(0x7f0000011000)}, {0x0, 0x0, 0x6700000}, {&(0x7f0000000580), 0x0, 0xc000}], 0x0, &(0x7f0000013b00)=ANY=[@ANYBLOB='\x00']) r4 = creat(&(0x7f0000000000)='./file1\x00', 0x18) r5 = socket(0x10, 0x3, 0x0) sendmsg$nl_route(r5, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f00000005c0)=@ipv4_newroute={0x38, 0x18, 0xbad, 0x0, 0x0, {0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6}, [@RTA_ENCAP_TYPE={0x6, 0x15, 0x3}, @RTA_ENCAP={0x14, 0x16, 0x0, 0x1, @SEG6_IPTUNNEL_SRH={0xd}}]}, 0x38}}, 0x0) r6 = socket(0x26, 0x3, 0x0) sendmsg$nl_route(r6, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f00000005c0)=@ipv4_newroute={0x38, 0x18, 0xbad, 0x0, 0x0, {0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6}, [@RTA_ENCAP_TYPE={0x6, 0x15, 0x3}, @RTA_ENCAP={0x14, 0x16, 0x0, 0x1, @SEG6_IPTUNNEL_SRH={0xd}}]}, 0x38}}, 0x0) r7 = socket(0x10, 0x3, 0x0) sendmsg$nl_route(r7, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f00000005c0)=@ipv4_newroute={0x38, 0x18, 0xbad, 0x0, 0x0, {0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6}, [@RTA_ENCAP_TYPE={0x6, 0x15, 0x3}, @RTA_ENCAP={0x14, 0x16, 0x0, 0x1, @SEG6_IPTUNNEL_SRH={0xd}}]}, 0x38}}, 0x0) execveat(r4, &(0x7f0000000040)='./file0\x00', &(0x7f0000000380)=[&(0x7f00000001c0)='+{!#\x00', &(0x7f0000000300)='ext4\x00', &(0x7f0000000340)='@(\x00'], &(0x7f00000004c0)=[&(0x7f00000003c0)='ext4\x00', &(0x7f0000000400)='ext4\x00', &(0x7f0000000500)='\x00.D\x04\xe0\xce\x99\xd9\xa9\xac\xac\xadH\xa4\xcf\xb7\xffT\xac\x05\xfd\xdd\xb8w\x0f\x82B\xff\xf2\x909`1!\f\x870\x1f\xc1%Y\xc8\x15c \xea\x1cY!\x04\xe4\x91^\x00\x04\xe4\xa6\xba\xc6\xfd\x10\xdf\xe24\xd4&\x17\xdc\xec\xf4\f\n\xb7.\x13\x8e\x1bYENj\xe1\x19~\x1c\xaf\a;d\x9f\xba\xd9T\xd4-\xecX\xc0Y\x83@\xc7\x8b\xff*\xdd\xaa\xc6,o4\xe2\x0f\x16\x01[\xc0\xeb\x7fFI]WF\x1f\f?\xfa\xb1\xe7\xf6t\x027\xb1\xc17.4V\xf81{9\xa3\xb9\x01\xcck@I\xe2\xf1Y\x10E\xa1z/\x05.~Yh%\x8f\x06sB)N\x11P\xf6p\xff\'\xaf\a7\x10+p\xbb\xf3\xb08\xb5)\x00\xeeg\xd0\xee\xe9\x98\x8d\xf8\xb5G\t@f\x1et v\x14\tT\xc5', &(0x7f0000000480)=':--[\x00'], 0x1000) recvfrom(r2, &(0x7f0000000600)=""/203, 0xcb, 0x42, &(0x7f0000000700)=@hci={0x1f, 0xffffffffffffffff, 0x4}, 0x80) [ 2329.940138][T26169] loop4: detected capacity change from 0 to 264192 [ 2329.990651][T26171] loop3: detected capacity change from 0 to 264192 [ 2330.001251][T26172] loop2: detected capacity change from 0 to 264192 10:17:11 executing program 1: prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f00000002c0)=0x0) sched_setscheduler(r0, 0x2, &(0x7f0000000080)=0x6) r1 = getpid() sched_setscheduler(r1, 0x2, &(0x7f00000000c0)=0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r2, &(0x7f000057eff8)=@abs, 0x6e) sendmmsg$unix(r3, &(0x7f00000bd000), 0x318, 0x0) recvmmsg(r2, &(0x7f00000000c0), 0x10106, 0x2, 0x0) syz_mount_image$ext4(&(0x7f0000000180)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x8, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000600100000f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000006856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010300), 0x0, 0x640}, {&(0x7f0000010400)="03000000040000000500000016000f000300040000000000000000000f00698c", 0x20, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}, {&(0x7f0000011000)}, {0x0, 0x0, 0x6700000}, {&(0x7f0000000580), 0x0, 0xc000}], 0x0, &(0x7f0000013b00)=ANY=[@ANYBLOB='\x00']) r4 = creat(&(0x7f0000000000)='./file1\x00', 0x18) r5 = socket(0x10, 0x3, 0x0) sendmsg$nl_route(r5, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f00000005c0)=@ipv4_newroute={0x38, 0x18, 0xbad, 0x0, 0x0, {0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6}, [@RTA_ENCAP_TYPE={0x6, 0x15, 0x3}, @RTA_ENCAP={0x14, 0x16, 0x0, 0x1, @SEG6_IPTUNNEL_SRH={0xd}}]}, 0x38}}, 0x0) r6 = socket(0x26, 0x3, 0x0) sendmsg$nl_route(r6, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f00000005c0)=@ipv4_newroute={0x38, 0x18, 0xbad, 0x0, 0x0, {0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6}, [@RTA_ENCAP_TYPE={0x6, 0x15, 0x3}, @RTA_ENCAP={0x14, 0x16, 0x0, 0x1, @SEG6_IPTUNNEL_SRH={0xd}}]}, 0x38}}, 0x0) r7 = socket(0x10, 0x3, 0x0) sendmsg$nl_route(r7, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f00000005c0)=@ipv4_newroute={0x38, 0x18, 0xbad, 0x0, 0x0, {0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6}, [@RTA_ENCAP_TYPE={0x6, 0x15, 0x3}, @RTA_ENCAP={0x14, 0x16, 0x0, 0x1, @SEG6_IPTUNNEL_SRH={0xd}}]}, 0x38}}, 0x0) execveat(r4, &(0x7f0000000040)='./file0\x00', &(0x7f0000000380)=[&(0x7f00000001c0)='+{!#\x00', &(0x7f0000000300)='ext4\x00', &(0x7f0000000340)='@(\x00'], &(0x7f00000004c0)=[&(0x7f00000003c0)='ext4\x00', &(0x7f0000000400)='ext4\x00', &(0x7f0000000500)='\x00.D\x04\xe0\xce\x99\xd9\xa9\xac\xac\xadH\xa4\xcf\xb7\xffT\xac\x05\xfd\xdd\xb8w\x0f\x82B\xff\xf2\x909`1!\f\x870\x1f\xc1%Y\xc8\x15c \xea\x1cY!\x04\xe4\x91^\x00\x04\xe4\xa6\xba\xc6\xfd\x10\xdf\xe24\xd4&\x17\xdc\xec\xf4\f\n\xb7.\x13\x8e\x1bYENj\xe1\x19~\x1c\xaf\a;d\x9f\xba\xd9T\xd4-\xecX\xc0Y\x83@\xc7\x8b\xff*\xdd\xaa\xc6,o4\xe2\x0f\x16\x01[\xc0\xeb\x7fFI]WF\x1f\f?\xfa\xb1\xe7\xf6t\x027\xb1\xc17.4V\xf81{9\xa3\xb9\x01\xcck@I\xe2\xf1Y\x10E\xa1z/\x05.~Yh%\x8f\x06sB)N\x11P\xf6p\xff\'\xaf\a7\x10+p\xbb\xf3\xb08\xb5)\x00\xeeg\xd0\xee\xe9\x98\x8d\xf8\xb5G\t@f\x1et v\x14\tT\xc5', &(0x7f0000000480)=':--[\x00'], 0x1000) recvfrom(r2, &(0x7f0000000600)=""/203, 0xcb, 0x42, &(0x7f0000000700)=@hci={0x1f, 0xffffffffffffffff, 0x4}, 0x80) 10:17:11 executing program 2: prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f00000002c0)=0x0) sched_setscheduler(r0, 0x2, &(0x7f0000000080)=0x6) r1 = getpid() sched_setscheduler(r1, 0x2, &(0x7f00000000c0)=0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff}) connect$unix(r2, &(0x7f000057eff8)=@abs, 0x6e) recvmmsg(r2, &(0x7f00000000c0), 0x10106, 0x2, 0x0) syz_mount_image$ext4(&(0x7f0000000180)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xfffbffff00000000, 0x8, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000600100000f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000006856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010300), 0x0, 0x640}, {&(0x7f0000010400)="03000000040000000500000016000f000300040000000000000000000f00698c", 0x20, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}, {&(0x7f0000011000)}, {0x0, 0x0, 0x6700000}, {&(0x7f0000000580), 0x0, 0xc000}], 0x0, &(0x7f0000013b00)=ANY=[@ANYBLOB='\x00']) r3 = socket(0x10, 0x3, 0x0) sendmsg$nl_route(r3, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f00000005c0)=@ipv4_newroute={0x38, 0x18, 0xbad, 0x0, 0x0, {}, [@RTA_ENCAP_TYPE={0x6, 0x15, 0x3}, @RTA_ENCAP={0x14, 0x16, 0x0, 0x1, @SEG6_IPTUNNEL_SRH={0xd}}]}, 0x38}}, 0x0) r4 = socket(0x26, 0x3, 0x0) sendmsg$nl_route(r4, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f00000005c0)=@ipv4_newroute={0x38, 0x18, 0xbad, 0x0, 0x0, {0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6}, [@RTA_ENCAP_TYPE={0x6, 0x15, 0x3}, @RTA_ENCAP={0x14, 0x16, 0x0, 0x1, @SEG6_IPTUNNEL_SRH={0xd}}]}, 0x38}}, 0x0) r5 = socket(0x10, 0x0, 0x0) sendmsg$nl_route(r5, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f00000005c0)=@ipv4_newroute={0x38, 0x18, 0xbad, 0x0, 0x0, {0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6}, [@RTA_ENCAP_TYPE={0x6, 0x15, 0x3}, @RTA_ENCAP={0x14, 0x16, 0x0, 0x1, @SEG6_IPTUNNEL_SRH={0xd}}]}, 0x38}}, 0x0) recvfrom(r2, &(0x7f0000000600)=""/203, 0xcb, 0x42, &(0x7f0000000700)=@hci={0x1f, 0xffffffffffffffff, 0x4}, 0x80) [ 2330.910749][T26172] EXT4-fs (loop2): mounted filesystem without journal. Quota mode: writeback. [ 2330.911084][T26171] EXT4-fs (loop3): mounted filesystem without journal. Quota mode: writeback. 10:17:11 executing program 3: prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f00000002c0)=0x0) sched_setscheduler(r0, 0x2, &(0x7f0000000080)=0x6) r1 = getpid() sched_setscheduler(r1, 0x2, &(0x7f00000000c0)=0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) sendmmsg$unix(r3, &(0x7f00000bd000), 0x318, 0x0) recvmmsg(r2, &(0x7f00000000c0), 0x10106, 0x2, 0x0) syz_mount_image$ext4(&(0x7f0000000180)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xfffbffff00000000, 0x8, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000600100000f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000006856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010300), 0x0, 0x640}, {&(0x7f0000010400)="03000000040000000500000016000f000300040000000000000000000f00698c", 0x20, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}, {&(0x7f0000011000)}, {0x0, 0x0, 0x6700000}, {&(0x7f0000000580), 0x0, 0xc000}], 0x0, &(0x7f0000013b00)=ANY=[@ANYBLOB='\x00']) r4 = creat(&(0x7f0000000000)='./file1\x00', 0x18) socket(0x10, 0x3, 0x0) r5 = socket(0x26, 0x3, 0x0) sendmsg$nl_route(r5, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f00000005c0)=@ipv4_newroute={0x38, 0x18, 0xbad, 0x0, 0x0, {0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6}, [@RTA_ENCAP_TYPE={0x6, 0x15, 0x3}, @RTA_ENCAP={0x14, 0x16, 0x0, 0x1, @SEG6_IPTUNNEL_SRH={0xd}}]}, 0x38}}, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f00000005c0)=@ipv4_newroute={0x38, 0x18, 0xbad, 0x0, 0x0, {0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6}, [@RTA_ENCAP_TYPE={0x6, 0x15, 0x3}, @RTA_ENCAP={0x14, 0x16, 0x0, 0x1, @SEG6_IPTUNNEL_SRH={0xd}}]}, 0x38}}, 0x0) execveat(r4, 0x0, &(0x7f0000000380)=[&(0x7f00000001c0)='+{!#\x00', &(0x7f0000000300)='ext4\x00', &(0x7f0000000340)='@(\x00'], &(0x7f00000004c0)=[&(0x7f00000003c0)='ext4\x00', &(0x7f0000000400)='ext4\x00', &(0x7f0000000500)='\x00.D\x04\xe0\xce\x99\xd9\xa9\xac\xac\xadH\xa4\xcf\xb7\xffT\xac\x05\xfd\xdd\xb8w\x0f\x82B\xff\xf2\x909`1!\f\x870\x1f\xc1%Y\xc8\x15c \xea\x1cY!\x04\xe4\x91^\x00\x04\xe4\xa6\xba\xc6\xfd\x10\xdf\xe24\xd4&\x17\xdc\xec\xf4\f\n\xb7.\x13\x8e\x1bYENj\xe1\x19~\x1c\xaf\a;d\x9f\xba\xd9T\xd4-\xecX\xc0Y\x83@\xc7\x8b\xff*\xdd\xaa\xc6,o4\xe2\x0f\x16\x01[\xc0\xeb\x7fFI]WF\x1f\f?\xfa\xb1\xe7\xf6t\x027\xb1\xc17.4V\xf81{9\xa3\xb9\x01\xcck@I\xe2\xf1Y\x10E\xa1z/\x05.~Yh%\x8f\x06sB)N\x11P\xf6p\xff\'\xaf\a7\x10+p\xbb\xf3\xb08\xb5)\x00\xeeg\xd0\xee\xe9\x98\x8d\xf8\xb5G\t@f\x1et v\x14\tT\xc5', 0x0], 0x1000) 10:17:11 executing program 4: prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f00000002c0)=0x0) sched_setscheduler(r0, 0x2, &(0x7f0000000080)=0x6) r1 = getpid() sched_setscheduler(r1, 0x2, &(0x7f00000000c0)=0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r2, &(0x7f000057eff8)=@abs, 0x6e) sendmmsg$unix(r3, &(0x7f00000bd000), 0x318, 0x0) recvmmsg(r2, &(0x7f00000000c0), 0x10106, 0x2, 0x0) syz_mount_image$ext4(&(0x7f0000000180)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x8, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000600100000f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000006856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010300), 0x0, 0x640}, {&(0x7f0000010400)="03000000040000000500000016000f000300040000000000000000000f00698c", 0x20, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}, {&(0x7f0000011000)}, {0x0, 0x0, 0x6700000}, {&(0x7f0000000580), 0x0, 0xc000}], 0x0, &(0x7f0000013b00)=ANY=[@ANYBLOB='\x00']) r4 = creat(&(0x7f0000000000)='./file1\x00', 0x18) r5 = socket(0x10, 0x3, 0x0) sendmsg$nl_route(r5, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f00000005c0)=@ipv4_newroute={0x38, 0x18, 0xbad, 0x0, 0x0, {0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6}, [@RTA_ENCAP_TYPE={0x6, 0x15, 0x3}, @RTA_ENCAP={0x14, 0x16, 0x0, 0x1, @SEG6_IPTUNNEL_SRH={0xd}}]}, 0x38}}, 0x0) r6 = socket(0x26, 0x3, 0x0) sendmsg$nl_route(r6, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f00000005c0)=@ipv4_newroute={0x38, 0x18, 0xbad, 0x0, 0x0, {0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6}, [@RTA_ENCAP_TYPE={0x6, 0x15, 0x3}, @RTA_ENCAP={0x14, 0x16, 0x0, 0x1, @SEG6_IPTUNNEL_SRH={0xd}}]}, 0x38}}, 0x0) r7 = socket(0x10, 0x3, 0x0) sendmsg$nl_route(r7, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f00000005c0)=@ipv4_newroute={0x38, 0x18, 0xbad, 0x0, 0x0, {0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6}, [@RTA_ENCAP_TYPE={0x6, 0x15, 0x3}, @RTA_ENCAP={0x14, 0x16, 0x0, 0x1, @SEG6_IPTUNNEL_SRH={0xd}}]}, 0x38}}, 0x0) execveat(r4, &(0x7f0000000040)='./file0\x00', &(0x7f0000000380)=[&(0x7f00000001c0)='+{!#\x00', &(0x7f0000000300)='ext4\x00', &(0x7f0000000340)='@(\x00'], &(0x7f00000004c0)=[&(0x7f00000003c0)='ext4\x00', &(0x7f0000000400)='ext4\x00', &(0x7f0000000500)='\x00.D\x04\xe0\xce\x99\xd9\xa9\xac\xac\xadH\xa4\xcf\xb7\xffT\xac\x05\xfd\xdd\xb8w\x0f\x82B\xff\xf2\x909`1!\f\x870\x1f\xc1%Y\xc8\x15c \xea\x1cY!\x04\xe4\x91^\x00\x04\xe4\xa6\xba\xc6\xfd\x10\xdf\xe24\xd4&\x17\xdc\xec\xf4\f\n\xb7.\x13\x8e\x1bYENj\xe1\x19~\x1c\xaf\a;d\x9f\xba\xd9T\xd4-\xecX\xc0Y\x83@\xc7\x8b\xff*\xdd\xaa\xc6,o4\xe2\x0f\x16\x01[\xc0\xeb\x7fFI]WF\x1f\f?\xfa\xb1\xe7\xf6t\x027\xb1\xc17.4V\xf81{9\xa3\xb9\x01\xcck@I\xe2\xf1Y\x10E\xa1z/\x05.~Yh%\x8f\x06sB)N\x11P\xf6p\xff\'\xaf\a7\x10+p\xbb\xf3\xb08\xb5)\x00\xeeg\xd0\xee\xe9\x98\x8d\xf8\xb5G\t@f\x1et v\x14\tT\xc5', &(0x7f0000000480)=':--[\x00'], 0x1000) recvfrom(r2, &(0x7f0000000600)=""/203, 0xcb, 0x42, &(0x7f0000000700)=@hci={0x1f, 0xffffffffffffffff, 0x4}, 0x80) 10:17:11 executing program 0: prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f00000002c0)=0x0) sched_setscheduler(r0, 0x2, &(0x7f0000000080)=0x6) r1 = getpid() sched_setscheduler(r1, 0x2, &(0x7f00000000c0)=0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r2, &(0x7f000057eff8)=@abs, 0x6e) sendmmsg$unix(r3, &(0x7f00000bd000), 0x318, 0x0) recvmmsg(r2, &(0x7f00000000c0), 0x10106, 0x2, 0x0) syz_mount_image$ext4(&(0x7f0000000180)='ext4\x00', 0x0, 0xfffbffff00000000, 0x8, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000600100000f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000006856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010300), 0x0, 0x640}, {&(0x7f0000010400)="03000000040000000500000016000f000300040000000000000000000f00698c", 0x20, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}, {&(0x7f0000011000)}, {0x0, 0x0, 0x6700000}, {&(0x7f0000000580), 0x0, 0xc000}], 0x0, &(0x7f0000013b00)=ANY=[@ANYBLOB='\x00']) r4 = creat(&(0x7f0000000000)='./file1\x00', 0x18) r5 = socket(0x10, 0x3, 0x0) sendmsg$nl_route(r5, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f00000005c0)=@ipv4_newroute={0x38, 0x18, 0xbad, 0x0, 0x0, {0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6}, [@RTA_ENCAP_TYPE={0x6, 0x15, 0x3}, @RTA_ENCAP={0x14, 0x16, 0x0, 0x1, @SEG6_IPTUNNEL_SRH={0xd}}]}, 0x38}}, 0x0) r6 = socket(0x26, 0x3, 0x0) sendmsg$nl_route(r6, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f00000005c0)=@ipv4_newroute={0x38, 0x18, 0xbad, 0x0, 0x0, {0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6}, [@RTA_ENCAP_TYPE={0x6, 0x15, 0x3}, @RTA_ENCAP={0x14, 0x16, 0x0, 0x1, @SEG6_IPTUNNEL_SRH={0xd}}]}, 0x38}}, 0x0) r7 = socket(0x10, 0x3, 0x0) sendmsg$nl_route(r7, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f00000005c0)=@ipv4_newroute={0x38, 0x18, 0xbad, 0x0, 0x0, {0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6}, [@RTA_ENCAP_TYPE={0x6, 0x15, 0x3}, @RTA_ENCAP={0x14, 0x16, 0x0, 0x1, @SEG6_IPTUNNEL_SRH={0xd}}]}, 0x38}}, 0x0) execveat(r4, &(0x7f0000000040)='./file0\x00', &(0x7f0000000380)=[&(0x7f00000001c0)='+{!#\x00', &(0x7f0000000300)='ext4\x00', &(0x7f0000000340)='@(\x00'], &(0x7f00000004c0)=[&(0x7f00000003c0)='ext4\x00', &(0x7f0000000400)='ext4\x00', &(0x7f0000000500)='\x00.D\x04\xe0\xce\x99\xd9\xa9\xac\xac\xadH\xa4\xcf\xb7\xffT\xac\x05\xfd\xdd\xb8w\x0f\x82B\xff\xf2\x909`1!\f\x870\x1f\xc1%Y\xc8\x15c \xea\x1cY!\x04\xe4\x91^\x00\x04\xe4\xa6\xba\xc6\xfd\x10\xdf\xe24\xd4&\x17\xdc\xec\xf4\f\n\xb7.\x13\x8e\x1bYENj\xe1\x19~\x1c\xaf\a;d\x9f\xba\xd9T\xd4-\xecX\xc0Y\x83@\xc7\x8b\xff*\xdd\xaa\xc6,o4\xe2\x0f\x16\x01[\xc0\xeb\x7fFI]WF\x1f\f?\xfa\xb1\xe7\xf6t\x027\xb1\xc17.4V\xf81{9\xa3\xb9\x01\xcck@I\xe2\xf1Y\x10E\xa1z/\x05.~Yh%\x8f\x06sB)N\x11P\xf6p\xff\'\xaf\a7\x10+p\xbb\xf3\xb08\xb5)\x00\xeeg\xd0\xee\xe9\x98\x8d\xf8\xb5G\t@f\x1et v\x14\tT\xc5', &(0x7f0000000480)=':--[\x00'], 0x1000) recvfrom(r2, &(0x7f0000000600)=""/203, 0xcb, 0x42, &(0x7f0000000700)=@hci={0x1f, 0xffffffffffffffff, 0x4}, 0x80) [ 2330.967524][T26169] EXT4-fs (loop4): mounted filesystem without journal. Quota mode: writeback. [ 2331.239179][T26203] loop2: detected capacity change from 0 to 264192 [ 2331.649196][T26209] loop3: detected capacity change from 0 to 264192 10:17:12 executing program 1: prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f00000002c0)=0x0) sched_setscheduler(r0, 0x2, &(0x7f0000000080)=0x6) r1 = getpid() sched_setscheduler(r1, 0x2, &(0x7f00000000c0)=0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r2, &(0x7f000057eff8)=@abs, 0x6e) sendmmsg$unix(r3, &(0x7f00000bd000), 0x318, 0x0) recvmmsg(r2, &(0x7f00000000c0), 0x10106, 0x2, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0xfffbffff00000000, 0x8, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000600100000f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000006856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010300), 0x0, 0x640}, {&(0x7f0000010400)="03000000040000000500000016000f000300040000000000000000000f00698c", 0x20, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}, {&(0x7f0000011000)}, {0x0, 0x0, 0x6700000}, {&(0x7f0000000580), 0x0, 0xc000}], 0x0, &(0x7f0000013b00)=ANY=[@ANYBLOB='\x00']) r4 = creat(&(0x7f0000000000)='./file1\x00', 0x18) r5 = socket(0x10, 0x3, 0x0) sendmsg$nl_route(r5, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f00000005c0)=@ipv4_newroute={0x38, 0x18, 0xbad, 0x0, 0x0, {0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6}, [@RTA_ENCAP_TYPE={0x6, 0x15, 0x3}, @RTA_ENCAP={0x14, 0x16, 0x0, 0x1, @SEG6_IPTUNNEL_SRH={0xd}}]}, 0x38}}, 0x0) r6 = socket(0x26, 0x3, 0x0) sendmsg$nl_route(r6, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f00000005c0)=@ipv4_newroute={0x38, 0x18, 0xbad, 0x0, 0x0, {0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6}, [@RTA_ENCAP_TYPE={0x6, 0x15, 0x3}, @RTA_ENCAP={0x14, 0x16, 0x0, 0x1, @SEG6_IPTUNNEL_SRH={0xd}}]}, 0x38}}, 0x0) r7 = socket(0x10, 0x3, 0x0) sendmsg$nl_route(r7, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f00000005c0)=@ipv4_newroute={0x38, 0x18, 0xbad, 0x0, 0x0, {0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6}, [@RTA_ENCAP_TYPE={0x6, 0x15, 0x3}, @RTA_ENCAP={0x14, 0x16, 0x0, 0x1, @SEG6_IPTUNNEL_SRH={0xd}}]}, 0x38}}, 0x0) execveat(r4, &(0x7f0000000040)='./file0\x00', &(0x7f0000000380)=[&(0x7f00000001c0)='+{!#\x00', &(0x7f0000000300)='ext4\x00', &(0x7f0000000340)='@(\x00'], &(0x7f00000004c0)=[&(0x7f00000003c0)='ext4\x00', &(0x7f0000000400)='ext4\x00', &(0x7f0000000500)='\x00.D\x04\xe0\xce\x99\xd9\xa9\xac\xac\xadH\xa4\xcf\xb7\xffT\xac\x05\xfd\xdd\xb8w\x0f\x82B\xff\xf2\x909`1!\f\x870\x1f\xc1%Y\xc8\x15c \xea\x1cY!\x04\xe4\x91^\x00\x04\xe4\xa6\xba\xc6\xfd\x10\xdf\xe24\xd4&\x17\xdc\xec\xf4\f\n\xb7.\x13\x8e\x1bYENj\xe1\x19~\x1c\xaf\a;d\x9f\xba\xd9T\xd4-\xecX\xc0Y\x83@\xc7\x8b\xff*\xdd\xaa\xc6,o4\xe2\x0f\x16\x01[\xc0\xeb\x7fFI]WF\x1f\f?\xfa\xb1\xe7\xf6t\x027\xb1\xc17.4V\xf81{9\xa3\xb9\x01\xcck@I\xe2\xf1Y\x10E\xa1z/\x05.~Yh%\x8f\x06sB)N\x11P\xf6p\xff\'\xaf\a7\x10+p\xbb\xf3\xb08\xb5)\x00\xeeg\xd0\xee\xe9\x98\x8d\xf8\xb5G\t@f\x1et v\x14\tT\xc5', &(0x7f0000000480)=':--[\x00'], 0x1000) recvfrom(r2, &(0x7f0000000600)=""/203, 0xcb, 0x42, &(0x7f0000000700)=@hci={0x1f, 0xffffffffffffffff, 0x4}, 0x80) [ 2331.980533][T26203] EXT4-fs: failed to create workqueue [ 2331.985949][T26203] EXT4-fs (loop2): mount failed [ 2332.027122][T26209] EXT4-fs (loop3): mounted filesystem without journal. Quota mode: writeback. [ 2332.360647][T26225] loop4: detected capacity change from 0 to 264192 [ 2332.792475][T26225] EXT4-fs (loop4): mounted filesystem without journal. Quota mode: writeback. 10:17:20 executing program 5: prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f00000002c0)=0x0) sched_setscheduler(r0, 0x2, &(0x7f0000000080)=0x6) r1 = getpid() sched_setscheduler(r1, 0x2, &(0x7f00000000c0)=0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r2, &(0x7f000057eff8)=@abs, 0x6e) sendmmsg$unix(r3, &(0x7f00000bd000), 0x318, 0x0) recvmmsg(r2, &(0x7f00000000c0), 0x10106, 0x2, 0x0) syz_mount_image$ext4(&(0x7f0000000180)='ext4\x00', 0x0, 0xfffbffff00000000, 0x8, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000600100000f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000006856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010300), 0x0, 0x640}, {&(0x7f0000010400)="03000000040000000500000016000f000300040000000000000000000f00698c", 0x20, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}, {&(0x7f0000011000)}, {0x0, 0x0, 0x6700000}, {&(0x7f0000000580), 0x0, 0xc000}], 0x0, &(0x7f0000013b00)=ANY=[@ANYBLOB='\x00']) r4 = creat(&(0x7f0000000000)='./file1\x00', 0x18) r5 = socket(0x10, 0x3, 0x0) sendmsg$nl_route(r5, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f00000005c0)=@ipv4_newroute={0x38, 0x18, 0xbad, 0x0, 0x0, {0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6}, [@RTA_ENCAP_TYPE={0x6, 0x15, 0x3}, @RTA_ENCAP={0x14, 0x16, 0x0, 0x1, @SEG6_IPTUNNEL_SRH={0xd}}]}, 0x38}}, 0x0) r6 = socket(0x26, 0x3, 0x0) sendmsg$nl_route(r6, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f00000005c0)=@ipv4_newroute={0x38, 0x18, 0xbad, 0x0, 0x0, {0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6}, [@RTA_ENCAP_TYPE={0x6, 0x15, 0x3}, @RTA_ENCAP={0x14, 0x16, 0x0, 0x1, @SEG6_IPTUNNEL_SRH={0xd}}]}, 0x38}}, 0x0) r7 = socket(0x10, 0x3, 0x0) sendmsg$nl_route(r7, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f00000005c0)=@ipv4_newroute={0x38, 0x18, 0xbad, 0x0, 0x0, {0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6}, [@RTA_ENCAP_TYPE={0x6, 0x15, 0x3}, @RTA_ENCAP={0x14, 0x16, 0x0, 0x1, @SEG6_IPTUNNEL_SRH={0xd}}]}, 0x38}}, 0x0) execveat(r4, &(0x7f0000000040)='./file0\x00', &(0x7f0000000380)=[&(0x7f00000001c0)='+{!#\x00', &(0x7f0000000300)='ext4\x00', &(0x7f0000000340)='@(\x00'], &(0x7f00000004c0)=[&(0x7f00000003c0)='ext4\x00', &(0x7f0000000400)='ext4\x00', &(0x7f0000000500)='\x00.D\x04\xe0\xce\x99\xd9\xa9\xac\xac\xadH\xa4\xcf\xb7\xffT\xac\x05\xfd\xdd\xb8w\x0f\x82B\xff\xf2\x909`1!\f\x870\x1f\xc1%Y\xc8\x15c \xea\x1cY!\x04\xe4\x91^\x00\x04\xe4\xa6\xba\xc6\xfd\x10\xdf\xe24\xd4&\x17\xdc\xec\xf4\f\n\xb7.\x13\x8e\x1bYENj\xe1\x19~\x1c\xaf\a;d\x9f\xba\xd9T\xd4-\xecX\xc0Y\x83@\xc7\x8b\xff*\xdd\xaa\xc6,o4\xe2\x0f\x16\x01[\xc0\xeb\x7fFI]WF\x1f\f?\xfa\xb1\xe7\xf6t\x027\xb1\xc17.4V\xf81{9\xa3\xb9\x01\xcck@I\xe2\xf1Y\x10E\xa1z/\x05.~Yh%\x8f\x06sB)N\x11P\xf6p\xff\'\xaf\a7\x10+p\xbb\xf3\xb08\xb5)\x00\xeeg\xd0\xee\xe9\x98\x8d\xf8\xb5G\t@f\x1et v\x14\tT\xc5', &(0x7f0000000480)=':--[\x00'], 0x1000) recvfrom(r2, &(0x7f0000000600)=""/203, 0xcb, 0x42, &(0x7f0000000700)=@hci={0x1f, 0xffffffffffffffff, 0x4}, 0x80) 10:17:20 executing program 2: prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f00000002c0)=0x0) sched_setscheduler(r0, 0x2, &(0x7f0000000080)=0x6) r1 = getpid() sched_setscheduler(r1, 0x2, &(0x7f00000000c0)=0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff}) connect$unix(r2, &(0x7f000057eff8)=@abs, 0x6e) recvmmsg(r2, &(0x7f00000000c0), 0x10106, 0x2, 0x0) syz_mount_image$ext4(&(0x7f0000000180)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xfffbffff00000000, 0x8, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000600100000f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000006856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010300), 0x0, 0x640}, {&(0x7f0000010400)="03000000040000000500000016000f000300040000000000000000000f00698c", 0x20, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}, {&(0x7f0000011000)}, {0x0, 0x0, 0x6700000}, {&(0x7f0000000580), 0x0, 0xc000}], 0x0, &(0x7f0000013b00)=ANY=[@ANYBLOB='\x00']) r3 = socket(0x10, 0x3, 0x0) sendmsg$nl_route(r3, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f00000005c0)=@ipv4_newroute={0x38, 0x18, 0xbad, 0x0, 0x0, {}, [@RTA_ENCAP_TYPE={0x6, 0x15, 0x3}, @RTA_ENCAP={0x14, 0x16, 0x0, 0x1, @SEG6_IPTUNNEL_SRH={0xd}}]}, 0x38}}, 0x0) r4 = socket(0x26, 0x3, 0x0) sendmsg$nl_route(r4, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f00000005c0)=@ipv4_newroute={0x38, 0x18, 0xbad, 0x0, 0x0, {0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6}, [@RTA_ENCAP_TYPE={0x6, 0x15, 0x3}, @RTA_ENCAP={0x14, 0x16, 0x0, 0x1, @SEG6_IPTUNNEL_SRH={0xd}}]}, 0x38}}, 0x0) r5 = socket(0x10, 0x0, 0x0) sendmsg$nl_route(r5, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f00000005c0)=@ipv4_newroute={0x38, 0x18, 0xbad, 0x0, 0x0, {0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6}, [@RTA_ENCAP_TYPE={0x6, 0x15, 0x3}, @RTA_ENCAP={0x14, 0x16, 0x0, 0x1, @SEG6_IPTUNNEL_SRH={0xd}}]}, 0x38}}, 0x0) recvfrom(r2, &(0x7f0000000600)=""/203, 0xcb, 0x42, &(0x7f0000000700)=@hci={0x1f, 0xffffffffffffffff, 0x4}, 0x80) 10:17:20 executing program 3: prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f00000002c0)=0x0) sched_setscheduler(r0, 0x2, &(0x7f0000000080)=0x6) r1 = getpid() sched_setscheduler(r1, 0x2, &(0x7f00000000c0)=0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) sendmmsg$unix(r3, &(0x7f00000bd000), 0x318, 0x0) recvmmsg(r2, &(0x7f00000000c0), 0x10106, 0x2, 0x0) syz_mount_image$ext4(&(0x7f0000000180)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xfffbffff00000000, 0x8, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000600100000f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000006856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010300), 0x0, 0x640}, {&(0x7f0000010400)="03000000040000000500000016000f000300040000000000000000000f00698c", 0x20, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}, {&(0x7f0000011000)}, {0x0, 0x0, 0x6700000}, {&(0x7f0000000580), 0x0, 0xc000}], 0x0, &(0x7f0000013b00)=ANY=[@ANYBLOB='\x00']) r4 = creat(&(0x7f0000000000)='./file1\x00', 0x18) socket(0x10, 0x3, 0x0) r5 = socket(0x26, 0x3, 0x0) sendmsg$nl_route(r5, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f00000005c0)=@ipv4_newroute={0x38, 0x18, 0xbad, 0x0, 0x0, {0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6}, [@RTA_ENCAP_TYPE={0x6, 0x15, 0x3}, @RTA_ENCAP={0x14, 0x16, 0x0, 0x1, @SEG6_IPTUNNEL_SRH={0xd}}]}, 0x38}}, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f00000005c0)=@ipv4_newroute={0x38, 0x18, 0xbad, 0x0, 0x0, {0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6}, [@RTA_ENCAP_TYPE={0x6, 0x15, 0x3}, @RTA_ENCAP={0x14, 0x16, 0x0, 0x1, @SEG6_IPTUNNEL_SRH={0xd}}]}, 0x38}}, 0x0) execveat(r4, 0x0, &(0x7f0000000380)=[&(0x7f00000001c0)='+{!#\x00', &(0x7f0000000300)='ext4\x00', &(0x7f0000000340)='@(\x00'], &(0x7f00000004c0)=[&(0x7f00000003c0)='ext4\x00', &(0x7f0000000400)='ext4\x00', &(0x7f0000000500)='\x00.D\x04\xe0\xce\x99\xd9\xa9\xac\xac\xadH\xa4\xcf\xb7\xffT\xac\x05\xfd\xdd\xb8w\x0f\x82B\xff\xf2\x909`1!\f\x870\x1f\xc1%Y\xc8\x15c \xea\x1cY!\x04\xe4\x91^\x00\x04\xe4\xa6\xba\xc6\xfd\x10\xdf\xe24\xd4&\x17\xdc\xec\xf4\f\n\xb7.\x13\x8e\x1bYENj\xe1\x19~\x1c\xaf\a;d\x9f\xba\xd9T\xd4-\xecX\xc0Y\x83@\xc7\x8b\xff*\xdd\xaa\xc6,o4\xe2\x0f\x16\x01[\xc0\xeb\x7fFI]WF\x1f\f?\xfa\xb1\xe7\xf6t\x027\xb1\xc17.4V\xf81{9\xa3\xb9\x01\xcck@I\xe2\xf1Y\x10E\xa1z/\x05.~Yh%\x8f\x06sB)N\x11P\xf6p\xff\'\xaf\a7\x10+p\xbb\xf3\xb08\xb5)\x00\xeeg\xd0\xee\xe9\x98\x8d\xf8\xb5G\t@f\x1et v\x14\tT\xc5', 0x0], 0x1000) 10:17:20 executing program 0: prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f00000002c0)=0x0) sched_setscheduler(r0, 0x2, &(0x7f0000000080)=0x6) r1 = getpid() sched_setscheduler(r1, 0x2, &(0x7f00000000c0)=0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r2, &(0x7f000057eff8)=@abs, 0x6e) sendmmsg$unix(r3, &(0x7f00000bd000), 0x318, 0x0) recvmmsg(r2, &(0x7f00000000c0), 0x10106, 0x2, 0x0) syz_mount_image$ext4(&(0x7f0000000180)='ext4\x00', 0x0, 0xfffbffff00000000, 0x8, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000600100000f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000006856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010300), 0x0, 0x640}, {&(0x7f0000010400)="03000000040000000500000016000f000300040000000000000000000f00698c", 0x20, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}, {&(0x7f0000011000)}, {0x0, 0x0, 0x6700000}, {&(0x7f0000000580), 0x0, 0xc000}], 0x0, &(0x7f0000013b00)=ANY=[@ANYBLOB='\x00']) r4 = creat(&(0x7f0000000000)='./file1\x00', 0x18) r5 = socket(0x10, 0x3, 0x0) sendmsg$nl_route(r5, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f00000005c0)=@ipv4_newroute={0x38, 0x18, 0xbad, 0x0, 0x0, {0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6}, [@RTA_ENCAP_TYPE={0x6, 0x15, 0x3}, @RTA_ENCAP={0x14, 0x16, 0x0, 0x1, @SEG6_IPTUNNEL_SRH={0xd}}]}, 0x38}}, 0x0) r6 = socket(0x26, 0x3, 0x0) sendmsg$nl_route(r6, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f00000005c0)=@ipv4_newroute={0x38, 0x18, 0xbad, 0x0, 0x0, {0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6}, [@RTA_ENCAP_TYPE={0x6, 0x15, 0x3}, @RTA_ENCAP={0x14, 0x16, 0x0, 0x1, @SEG6_IPTUNNEL_SRH={0xd}}]}, 0x38}}, 0x0) r7 = socket(0x10, 0x3, 0x0) sendmsg$nl_route(r7, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f00000005c0)=@ipv4_newroute={0x38, 0x18, 0xbad, 0x0, 0x0, {0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6}, [@RTA_ENCAP_TYPE={0x6, 0x15, 0x3}, @RTA_ENCAP={0x14, 0x16, 0x0, 0x1, @SEG6_IPTUNNEL_SRH={0xd}}]}, 0x38}}, 0x0) execveat(r4, &(0x7f0000000040)='./file0\x00', &(0x7f0000000380)=[&(0x7f00000001c0)='+{!#\x00', &(0x7f0000000300)='ext4\x00', &(0x7f0000000340)='@(\x00'], &(0x7f00000004c0)=[&(0x7f00000003c0)='ext4\x00', &(0x7f0000000400)='ext4\x00', &(0x7f0000000500)='\x00.D\x04\xe0\xce\x99\xd9\xa9\xac\xac\xadH\xa4\xcf\xb7\xffT\xac\x05\xfd\xdd\xb8w\x0f\x82B\xff\xf2\x909`1!\f\x870\x1f\xc1%Y\xc8\x15c \xea\x1cY!\x04\xe4\x91^\x00\x04\xe4\xa6\xba\xc6\xfd\x10\xdf\xe24\xd4&\x17\xdc\xec\xf4\f\n\xb7.\x13\x8e\x1bYENj\xe1\x19~\x1c\xaf\a;d\x9f\xba\xd9T\xd4-\xecX\xc0Y\x83@\xc7\x8b\xff*\xdd\xaa\xc6,o4\xe2\x0f\x16\x01[\xc0\xeb\x7fFI]WF\x1f\f?\xfa\xb1\xe7\xf6t\x027\xb1\xc17.4V\xf81{9\xa3\xb9\x01\xcck@I\xe2\xf1Y\x10E\xa1z/\x05.~Yh%\x8f\x06sB)N\x11P\xf6p\xff\'\xaf\a7\x10+p\xbb\xf3\xb08\xb5)\x00\xeeg\xd0\xee\xe9\x98\x8d\xf8\xb5G\t@f\x1et v\x14\tT\xc5', &(0x7f0000000480)=':--[\x00'], 0x1000) recvfrom(r2, &(0x7f0000000600)=""/203, 0xcb, 0x42, &(0x7f0000000700)=@hci={0x1f, 0xffffffffffffffff, 0x4}, 0x80) 10:17:20 executing program 1: prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f00000002c0)=0x0) sched_setscheduler(r0, 0x2, &(0x7f0000000080)=0x6) r1 = getpid() sched_setscheduler(r1, 0x2, &(0x7f00000000c0)=0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff}) connect$unix(r2, &(0x7f000057eff8)=@abs, 0x6e) recvmmsg(r2, &(0x7f00000000c0), 0x10106, 0x2, 0x0) syz_mount_image$ext4(&(0x7f0000000180)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xfffbffff00000000, 0x8, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000600100000f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000006856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010300), 0x0, 0x640}, {&(0x7f0000010400)="03000000040000000500000016000f000300040000000000000000000f00698c", 0x20, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}, {&(0x7f0000011000)}, {0x0, 0x0, 0x6700000}, {&(0x7f0000000580), 0x0, 0xc000}], 0x0, &(0x7f0000013b00)=ANY=[@ANYBLOB='\x00']) r3 = socket(0x10, 0x3, 0x0) sendmsg$nl_route(r3, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f00000005c0)=@ipv4_newroute={0x38, 0x18, 0xbad, 0x0, 0x0, {}, [@RTA_ENCAP_TYPE={0x6, 0x15, 0x3}, @RTA_ENCAP={0x14, 0x16, 0x0, 0x1, @SEG6_IPTUNNEL_SRH={0xd}}]}, 0x38}}, 0x0) r4 = socket(0x26, 0x3, 0x0) sendmsg$nl_route(r4, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f00000005c0)=@ipv4_newroute={0x38, 0x18, 0xbad, 0x0, 0x0, {0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6}, [@RTA_ENCAP_TYPE={0x6, 0x15, 0x3}, @RTA_ENCAP={0x14, 0x16, 0x0, 0x1, @SEG6_IPTUNNEL_SRH={0xd}}]}, 0x38}}, 0x0) r5 = socket(0x10, 0x0, 0x0) sendmsg$nl_route(r5, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f00000005c0)=@ipv4_newroute={0x38, 0x18, 0xbad, 0x0, 0x0, {0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6}, [@RTA_ENCAP_TYPE={0x6, 0x15, 0x3}, @RTA_ENCAP={0x14, 0x16, 0x0, 0x1, @SEG6_IPTUNNEL_SRH={0xd}}]}, 0x38}}, 0x0) recvfrom(r2, &(0x7f0000000600)=""/203, 0xcb, 0x42, &(0x7f0000000700)=@hci={0x1f, 0xffffffffffffffff, 0x4}, 0x80) 10:17:20 executing program 4: prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f00000002c0)=0x0) sched_setscheduler(r0, 0x2, &(0x7f0000000080)=0x6) r1 = getpid() sched_setscheduler(r1, 0x2, &(0x7f00000000c0)=0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r2, &(0x7f000057eff8)=@abs, 0x6e) sendmmsg$unix(r3, &(0x7f00000bd000), 0x318, 0x0) recvmmsg(r2, &(0x7f00000000c0), 0x10106, 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000180)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xfffbffff00000000, 0x8, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000600100000f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000006856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010300), 0x0, 0x640}, {&(0x7f0000010400)="03000000040000000500000016000f000300040000000000000000000f00698c", 0x20, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}, {&(0x7f0000011000)}, {0x0, 0x0, 0x6700000}, {&(0x7f0000000580), 0x0, 0xc000}], 0x0, &(0x7f0000013b00)=ANY=[@ANYBLOB='\x00']) r4 = creat(&(0x7f0000000000)='./file1\x00', 0x18) r5 = socket(0x10, 0x3, 0x0) sendmsg$nl_route(r5, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f00000005c0)=@ipv4_newroute={0x38, 0x18, 0xbad, 0x0, 0x0, {0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6}, [@RTA_ENCAP_TYPE={0x6, 0x15, 0x3}, @RTA_ENCAP={0x14, 0x16, 0x0, 0x1, @SEG6_IPTUNNEL_SRH={0xd}}]}, 0x38}}, 0x0) r6 = socket(0x26, 0x3, 0x0) sendmsg$nl_route(r6, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f00000005c0)=@ipv4_newroute={0x38, 0x18, 0xbad, 0x0, 0x0, {0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6}, [@RTA_ENCAP_TYPE={0x6, 0x15, 0x3}, @RTA_ENCAP={0x14, 0x16, 0x0, 0x1, @SEG6_IPTUNNEL_SRH={0xd}}]}, 0x38}}, 0x0) r7 = socket(0x10, 0x3, 0x0) sendmsg$nl_route(r7, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f00000005c0)=@ipv4_newroute={0x38, 0x18, 0xbad, 0x0, 0x0, {0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6}, [@RTA_ENCAP_TYPE={0x6, 0x15, 0x3}, @RTA_ENCAP={0x14, 0x16, 0x0, 0x1, @SEG6_IPTUNNEL_SRH={0xd}}]}, 0x38}}, 0x0) execveat(r4, &(0x7f0000000040)='./file0\x00', &(0x7f0000000380)=[&(0x7f00000001c0)='+{!#\x00', &(0x7f0000000300)='ext4\x00', &(0x7f0000000340)='@(\x00'], &(0x7f00000004c0)=[&(0x7f00000003c0)='ext4\x00', &(0x7f0000000400)='ext4\x00', &(0x7f0000000500)='\x00.D\x04\xe0\xce\x99\xd9\xa9\xac\xac\xadH\xa4\xcf\xb7\xffT\xac\x05\xfd\xdd\xb8w\x0f\x82B\xff\xf2\x909`1!\f\x870\x1f\xc1%Y\xc8\x15c \xea\x1cY!\x04\xe4\x91^\x00\x04\xe4\xa6\xba\xc6\xfd\x10\xdf\xe24\xd4&\x17\xdc\xec\xf4\f\n\xb7.\x13\x8e\x1bYENj\xe1\x19~\x1c\xaf\a;d\x9f\xba\xd9T\xd4-\xecX\xc0Y\x83@\xc7\x8b\xff*\xdd\xaa\xc6,o4\xe2\x0f\x16\x01[\xc0\xeb\x7fFI]WF\x1f\f?\xfa\xb1\xe7\xf6t\x027\xb1\xc17.4V\xf81{9\xa3\xb9\x01\xcck@I\xe2\xf1Y\x10E\xa1z/\x05.~Yh%\x8f\x06sB)N\x11P\xf6p\xff\'\xaf\a7\x10+p\xbb\xf3\xb08\xb5)\x00\xeeg\xd0\xee\xe9\x98\x8d\xf8\xb5G\t@f\x1et v\x14\tT\xc5', &(0x7f0000000480)=':--[\x00'], 0x1000) recvfrom(r2, &(0x7f0000000600)=""/203, 0xcb, 0x42, &(0x7f0000000700)=@hci={0x1f, 0xffffffffffffffff, 0x4}, 0x80) [ 2340.259167][T26248] loop2: detected capacity change from 0 to 264192 [ 2340.319275][T26249] loop3: detected capacity change from 0 to 264192 [ 2340.454433][T26251] loop4: detected capacity change from 0 to 264192 [ 2340.613030][T26249] EXT4-fs (loop3): mounted filesystem without journal. Quota mode: writeback. [ 2340.622811][T26251] EXT4-fs (loop4): mounted filesystem without journal. Quota mode: writeback. [ 2340.750051][T26248] EXT4-fs (loop2): mounted filesystem without journal. Quota mode: writeback. 10:17:21 executing program 1: r0 = syz_open_dev$evdev(&(0x7f0000000000), 0x2, 0x0) ioctl$EVIOCGREP(r0, 0x80084503, &(0x7f0000000040)=""/244) 10:17:21 executing program 4: r0 = openat$uhid(0xffffffffffffff9c, &(0x7f0000000080), 0x802, 0x0) write$UHID_CREATE2(r0, 0x0, 0x0) 10:17:21 executing program 2: prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f00000002c0)=0x0) sched_setscheduler(r0, 0x2, &(0x7f0000000080)=0x6) r1 = getpid() sched_setscheduler(r1, 0x2, &(0x7f00000000c0)=0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff}) recvmmsg(r2, &(0x7f00000000c0), 0x10106, 0x2, 0x0) syz_mount_image$ext4(&(0x7f0000000180)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xfffbffff00000000, 0x8, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000600100000f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000006856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010300), 0x0, 0x640}, {&(0x7f0000010400)="03000000040000000500000016000f000300040000000000000000000f00698c", 0x20, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}, {&(0x7f0000011000)}, {0x0, 0x0, 0x6700000}, {&(0x7f0000000580), 0x0, 0xc000}], 0x0, &(0x7f0000013b00)=ANY=[@ANYBLOB='\x00']) r3 = socket(0x10, 0x3, 0x0) sendmsg$nl_route(r3, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f00000005c0)=@ipv4_newroute={0x38, 0x18, 0xbad, 0x0, 0x0, {}, [@RTA_ENCAP_TYPE={0x6, 0x15, 0x3}, @RTA_ENCAP={0x14, 0x16, 0x0, 0x1, @SEG6_IPTUNNEL_SRH={0xd}}]}, 0x38}}, 0x0) r4 = socket(0x26, 0x3, 0x0) sendmsg$nl_route(r4, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f00000005c0)=@ipv4_newroute={0x38, 0x18, 0xbad, 0x0, 0x0, {0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6}, [@RTA_ENCAP_TYPE={0x6, 0x15, 0x3}, @RTA_ENCAP={0x14, 0x16, 0x0, 0x1, @SEG6_IPTUNNEL_SRH={0xd}}]}, 0x38}}, 0x0) r5 = socket(0x10, 0x0, 0x0) sendmsg$nl_route(r5, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f00000005c0)=@ipv4_newroute={0x38, 0x18, 0xbad, 0x0, 0x0, {0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6}, [@RTA_ENCAP_TYPE={0x6, 0x15, 0x3}, @RTA_ENCAP={0x14, 0x16, 0x0, 0x1, @SEG6_IPTUNNEL_SRH={0xd}}]}, 0x38}}, 0x0) recvfrom(r2, &(0x7f0000000600)=""/203, 0xcb, 0x42, &(0x7f0000000700)=@hci={0x1f, 0xffffffffffffffff, 0x4}, 0x80) 10:17:21 executing program 0: r0 = syz_open_dev$evdev(&(0x7f0000000440), 0x0, 0x40c02) write$evdev(r0, 0x0, 0x7) 10:17:21 executing program 3: prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f00000002c0)=0x0) sched_setscheduler(r0, 0x2, &(0x7f0000000080)=0x6) r1 = getpid() sched_setscheduler(r1, 0x2, &(0x7f00000000c0)=0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) sendmmsg$unix(r3, &(0x7f00000bd000), 0x318, 0x0) recvmmsg(r2, &(0x7f00000000c0), 0x10106, 0x2, 0x0) syz_mount_image$ext4(&(0x7f0000000180)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xfffbffff00000000, 0x8, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000600100000f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000006856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010300), 0x0, 0x640}, {&(0x7f0000010400)="03000000040000000500000016000f000300040000000000000000000f00698c", 0x20, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}, {&(0x7f0000011000)}, {0x0, 0x0, 0x6700000}, {&(0x7f0000000580), 0x0, 0xc000}], 0x0, &(0x7f0000013b00)=ANY=[@ANYBLOB='\x00']) r4 = creat(&(0x7f0000000000)='./file1\x00', 0x18) socket(0x10, 0x3, 0x0) r5 = socket(0x26, 0x3, 0x0) sendmsg$nl_route(r5, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f00000005c0)=@ipv4_newroute={0x38, 0x18, 0xbad, 0x0, 0x0, {0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6}, [@RTA_ENCAP_TYPE={0x6, 0x15, 0x3}, @RTA_ENCAP={0x14, 0x16, 0x0, 0x1, @SEG6_IPTUNNEL_SRH={0xd}}]}, 0x38}}, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f00000005c0)=@ipv4_newroute={0x38, 0x18, 0xbad, 0x0, 0x0, {0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6}, [@RTA_ENCAP_TYPE={0x6, 0x15, 0x3}, @RTA_ENCAP={0x14, 0x16, 0x0, 0x1, @SEG6_IPTUNNEL_SRH={0xd}}]}, 0x38}}, 0x0) execveat(r4, 0x0, &(0x7f0000000380)=[&(0x7f00000001c0)='+{!#\x00', &(0x7f0000000300)='ext4\x00', &(0x7f0000000340)='@(\x00'], &(0x7f00000004c0)=[&(0x7f00000003c0)='ext4\x00', &(0x7f0000000400)='ext4\x00', &(0x7f0000000500)='\x00.D\x04\xe0\xce\x99\xd9\xa9\xac\xac\xadH\xa4\xcf\xb7\xffT\xac\x05\xfd\xdd\xb8w\x0f\x82B\xff\xf2\x909`1!\f\x870\x1f\xc1%Y\xc8\x15c \xea\x1cY!\x04\xe4\x91^\x00\x04\xe4\xa6\xba\xc6\xfd\x10\xdf\xe24\xd4&\x17\xdc\xec\xf4\f\n\xb7.\x13\x8e\x1bYENj\xe1\x19~\x1c\xaf\a;d\x9f\xba\xd9T\xd4-\xecX\xc0Y\x83@\xc7\x8b\xff*\xdd\xaa\xc6,o4\xe2\x0f\x16\x01[\xc0\xeb\x7fFI]WF\x1f\f?\xfa\xb1\xe7\xf6t\x027\xb1\xc17.4V\xf81{9\xa3\xb9\x01\xcck@I\xe2\xf1Y\x10E\xa1z/\x05.~Yh%\x8f\x06sB)N\x11P\xf6p\xff\'\xaf\a7\x10+p\xbb\xf3\xb08\xb5)\x00\xeeg\xd0\xee\xe9\x98\x8d\xf8\xb5G\t@f\x1et v\x14\tT\xc5', 0x0], 0x1000) 10:17:21 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0xa, &(0x7f0000000100), 0x4) [ 2340.944718][ T24] audit: type=1400 audit(1649758641.356:451): avc: denied { append } for pid=26270 comm="syz-executor.0" name="event0" dev="devtmpfs" ino=217 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:event_device_t tclass=chr_file permissive=1 [ 2341.033175][T26278] loop2: detected capacity change from 0 to 264192 [ 2341.046929][T26278] EXT4-fs (loop2): mounted filesystem without journal. Quota mode: writeback. [ 2341.159356][T26286] loop3: detected capacity change from 0 to 264192 [ 2341.184839][T26286] EXT4-fs (loop3): mounted filesystem without journal. Quota mode: writeback. 10:17:27 executing program 5: prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f00000002c0)=0x0) sched_setscheduler(r0, 0x2, &(0x7f0000000080)=0x6) r1 = getpid() sched_setscheduler(r1, 0x2, &(0x7f00000000c0)=0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r2, &(0x7f000057eff8)=@abs, 0x6e) sendmmsg$unix(r3, &(0x7f00000bd000), 0x318, 0x0) recvmmsg(r2, &(0x7f00000000c0), 0x10106, 0x2, 0x0) syz_mount_image$ext4(&(0x7f0000000180)='ext4\x00', 0x0, 0xfffbffff00000000, 0x8, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000600100000f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000006856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010300), 0x0, 0x640}, {&(0x7f0000010400)="03000000040000000500000016000f000300040000000000000000000f00698c", 0x20, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}, {&(0x7f0000011000)}, {0x0, 0x0, 0x6700000}, {&(0x7f0000000580), 0x0, 0xc000}], 0x0, &(0x7f0000013b00)=ANY=[@ANYBLOB='\x00']) r4 = creat(&(0x7f0000000000)='./file1\x00', 0x18) r5 = socket(0x10, 0x3, 0x0) sendmsg$nl_route(r5, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f00000005c0)=@ipv4_newroute={0x38, 0x18, 0xbad, 0x0, 0x0, {0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6}, [@RTA_ENCAP_TYPE={0x6, 0x15, 0x3}, @RTA_ENCAP={0x14, 0x16, 0x0, 0x1, @SEG6_IPTUNNEL_SRH={0xd}}]}, 0x38}}, 0x0) r6 = socket(0x26, 0x3, 0x0) sendmsg$nl_route(r6, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f00000005c0)=@ipv4_newroute={0x38, 0x18, 0xbad, 0x0, 0x0, {0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6}, [@RTA_ENCAP_TYPE={0x6, 0x15, 0x3}, @RTA_ENCAP={0x14, 0x16, 0x0, 0x1, @SEG6_IPTUNNEL_SRH={0xd}}]}, 0x38}}, 0x0) r7 = socket(0x10, 0x3, 0x0) sendmsg$nl_route(r7, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f00000005c0)=@ipv4_newroute={0x38, 0x18, 0xbad, 0x0, 0x0, {0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6}, [@RTA_ENCAP_TYPE={0x6, 0x15, 0x3}, @RTA_ENCAP={0x14, 0x16, 0x0, 0x1, @SEG6_IPTUNNEL_SRH={0xd}}]}, 0x38}}, 0x0) execveat(r4, &(0x7f0000000040)='./file0\x00', &(0x7f0000000380)=[&(0x7f00000001c0)='+{!#\x00', &(0x7f0000000300)='ext4\x00', &(0x7f0000000340)='@(\x00'], &(0x7f00000004c0)=[&(0x7f00000003c0)='ext4\x00', &(0x7f0000000400)='ext4\x00', &(0x7f0000000500)='\x00.D\x04\xe0\xce\x99\xd9\xa9\xac\xac\xadH\xa4\xcf\xb7\xffT\xac\x05\xfd\xdd\xb8w\x0f\x82B\xff\xf2\x909`1!\f\x870\x1f\xc1%Y\xc8\x15c \xea\x1cY!\x04\xe4\x91^\x00\x04\xe4\xa6\xba\xc6\xfd\x10\xdf\xe24\xd4&\x17\xdc\xec\xf4\f\n\xb7.\x13\x8e\x1bYENj\xe1\x19~\x1c\xaf\a;d\x9f\xba\xd9T\xd4-\xecX\xc0Y\x83@\xc7\x8b\xff*\xdd\xaa\xc6,o4\xe2\x0f\x16\x01[\xc0\xeb\x7fFI]WF\x1f\f?\xfa\xb1\xe7\xf6t\x027\xb1\xc17.4V\xf81{9\xa3\xb9\x01\xcck@I\xe2\xf1Y\x10E\xa1z/\x05.~Yh%\x8f\x06sB)N\x11P\xf6p\xff\'\xaf\a7\x10+p\xbb\xf3\xb08\xb5)\x00\xeeg\xd0\xee\xe9\x98\x8d\xf8\xb5G\t@f\x1et v\x14\tT\xc5', &(0x7f0000000480)=':--[\x00'], 0x1000) recvfrom(r2, &(0x7f0000000600)=""/203, 0xcb, 0x42, &(0x7f0000000700)=@hci={0x1f, 0xffffffffffffffff, 0x4}, 0x80) 10:17:27 executing program 1: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000b80)={{0x14}, [@NFT_MSG_NEWRULE={0x28, 0x6, 0xa, 0x0, 0x0, 0x0, {0x0, 0x0, 0x7}, [@NFTA_RULE_POSITION_ID={0x8, 0xa, 0x1, 0x0, 0x2}, @NFTA_RULE_POSITION={0xc, 0x6, 0x1, 0x0, 0x3}]}, @NFT_MSG_DELFLOWTABLE={0x12c, 0x18, 0xa, 0x201, 0x0, 0x0, {}, [@NFTA_FLOWTABLE_TABLE={0x9, 0x1, 'syz0\x00'}, @NFTA_FLOWTABLE_TABLE={0x9, 0x1, 'syz1\x00'}, @NFTA_FLOWTABLE_HANDLE={0xc}, @NFTA_FLOWTABLE_HOOK={0xd0, 0x3, 0x0, 0x1, [@NFTA_FLOWTABLE_HOOK_DEVS={0x2c, 0x3, 0x0, 0x1, [{0x14, 0x1, 'ipvlan1\x00'}, {0x14, 0x1, 'veth1_to_bridge\x00'}]}, @NFTA_FLOWTABLE_HOOK_NUM={0x8}, @NFTA_FLOWTABLE_HOOK_DEVS={0x54, 0x3, 0x0, 0x1, [{0x14, 0x1, 'wlan0\x00'}, {0x14, 0x1, 'hsr0\x00'}, {0x14, 0x1, 'geneve1\x00'}, {0x14, 0x1, 'hsr0\x00'}]}, @NFTA_FLOWTABLE_HOOK_PRIORITY={0x8}, @NFTA_FLOWTABLE_HOOK_PRIORITY={0x8}, @NFTA_FLOWTABLE_HOOK_NUM={0x8}, @NFTA_FLOWTABLE_HOOK_DEVS={0x2c, 0x3, 0x0, 0x1, [{0x14, 0x1, 'wg0\x00'}, {0x14, 0x1, 'bond_slave_1\x00'}]}]}, @NFTA_FLOWTABLE_TABLE={0x9, 0x1, 'syz1\x00'}, @NFTA_FLOWTABLE_HOOK={0xc, 0x3, 0x0, 0x1, [@NFTA_FLOWTABLE_HOOK_NUM={0x8}]}, @NFTA_FLOWTABLE_HANDLE={0xc}]}, @NFT_MSG_NEWOBJ={0x20, 0x12, 0xa, 0x5, 0x0, 0x0, {0x0, 0x0, 0x5}, @NFT_OBJECT_CONNLIMIT=@NFTA_OBJ_TABLE={0x9, 0x1, 'syz0\x00'}}, @NFT_MSG_NEWSETELEM={0xd28, 0xc, 0xa, 0x0, 0x0, 0x0, {}, [@NFTA_SET_ELEM_LIST_ELEMENTS={0x28c, 0x3, 0x0, 0x1, [{0x288, 0x0, 0x0, 0x1, [@NFTA_SET_ELEM_KEY={0x1c8, 0x1, 0x0, 0x1, [@NFTA_DATA_VERDICT={0x60, 0x2, 0x0, 0x1, [@NFTA_VERDICT_CHAIN={0x9, 0x2, 'syz1\x00'}, @NFTA_VERDICT_CHAIN_ID={0x8}, @NFTA_VERDICT_CHAIN_ID={0x8}, @NFTA_VERDICT_CODE={0x8}, @NFTA_VERDICT_CHAIN_ID={0x8}, @NFTA_VERDICT_CHAIN={0x9, 0x2, 'syz2\x00'}, @NFTA_VERDICT_CHAIN_ID={0x8}, @NFTA_VERDICT_CODE={0x8}, @NFTA_VERDICT_CHAIN={0x9, 0x2, 'syz2\x00'}, @NFTA_VERDICT_CODE={0x8}]}, @NFTA_DATA_VERDICT={0x4c, 0x2, 0x0, 0x1, [@NFTA_VERDICT_CHAIN={0x9, 0x2, 'syz1\x00'}, @NFTA_VERDICT_CHAIN={0x9, 0x2, 'syz0\x00'}, @NFTA_VERDICT_CHAIN_ID={0x8}, @NFTA_VERDICT_CODE={0x8, 0x1, 0x0, 0x1, 0xfffffffffffffffb}, @NFTA_VERDICT_CHAIN={0x9, 0x2, 'syz0\x00'}, @NFTA_VERDICT_CHAIN={0x9, 0x2, 'syz0\x00'}, @NFTA_VERDICT_CHAIN_ID={0x8, 0x3, 0x1, 0x0, 0x4}]}, @NFTA_DATA_VALUE={0xef, 0x1, "9c87e675dc6f0e49f7abd62d10091e1b1dee711067a8a4e7784076cb239b1fa219827ade726cd16f5e6ad7a2a96b22b0c054023885a99c7c9f85cdee9916a0853d4214597702529147805bee10a0563f75a676df305be0fd4178ab57d49303fd4d14e102f68c3289f03facb51f78ed5172fff0a37fb37a88e6b662f01707f7d5cb458cedd845bc6352e597f91b2949bd020418a7958675c0ce997258a85d76c7439bc35161459aaf6c395eaa710c3e179097bbc8abd610d4b0fe484ea5d32eadc8875f7b4176c92d77e1cfebef783d16431828f35675eb1c32f547d8034f387bf8adb2c027c46ecb0afbe5"}, @NFTA_DATA_VALUE={0x25, 0x1, "3aa40811702ca07c1553c58713dbddb6717bb499402050cbdf3156d7075be720d9"}]}, @NFTA_SET_ELEM_KEY_END={0xb4, 0xa, 0x0, 0x1, [@NFTA_DATA_VERDICT={0xc, 0x2, 0x0, 0x1, [@NFTA_VERDICT_CHAIN_ID={0x8, 0x3, 0x1, 0x0, 0x6}]}, @NFTA_DATA_VERDICT={0x38, 0x2, 0x0, 0x1, [@NFTA_VERDICT_CHAIN_ID={0x8}, @NFTA_VERDICT_CHAIN_ID={0x8, 0x3, 0x1, 0x0, 0xadfd}, @NFTA_VERDICT_CHAIN_ID={0x8, 0x3, 0x1, 0x0, 0x5}, @NFTA_VERDICT_CHAIN_ID={0x8}, @NFTA_VERDICT_CHAIN_ID={0x8, 0x3, 0x1, 0x0, 0x6}, @NFTA_VERDICT_CHAIN={0x9, 0x2, 'syz2\x00'}]}, @NFTA_DATA_VERDICT={0x40, 0x2, 0x0, 0x1, [@NFTA_VERDICT_CHAIN={0x9, 0x2, 'syz0\x00'}, @NFTA_VERDICT_CHAIN={0x9, 0x2, 'syz2\x00'}, @NFTA_VERDICT_CODE={0x8}, @NFTA_VERDICT_CHAIN_ID={0x8}, @NFTA_VERDICT_CHAIN_ID={0x8}, @NFTA_VERDICT_CHAIN={0x9, 0x2, 'syz1\x00'}]}, @NFTA_DATA_VERDICT={0xc, 0x2, 0x0, 0x1, [@NFTA_VERDICT_CODE={0x8}]}, @NFTA_DATA_VERDICT={0x1c, 0x2, 0x0, 0x1, [@NFTA_VERDICT_CHAIN={0x9, 0x2, 'syz1\x00'}, @NFTA_VERDICT_CHAIN={0x9, 0x2, 'syz0\x00'}]}, @NFTA_DATA_VALUE={0x4}]}, @NFTA_SET_ELEM_FLAGS={0x8}]}]}, @NFTA_SET_ELEM_LIST_ELEMENTS={0xa7c, 0x3, 0x0, 0x1, [{0x53c, 0x0, 0x0, 0x1, [@NFTA_SET_ELEM_KEY={0x50c, 0x1, 0x0, 0x1, [@NFTA_DATA_VERDICT={0x20, 0x2, 0x0, 0x1, [@NFTA_VERDICT_CODE={0x8}, @NFTA_VERDICT_CHAIN_ID={0x8}, @NFTA_VERDICT_CHAIN={0x9, 0x2, 'syz2\x00'}]}, @NFTA_DATA_VALUE={0xe9, 0x1, "a80ef7af688cd077062f20befec2b2edc8671ba0837b5e0a46c8aac9963842f9b80aa6cf1391b13ec5f2c9f51a863dd09beb21c58094e238b304ae01455d750d5229b6e083584f6a4df5769a34d948f146e35fa4e171d9735a4932a08c1430974efce702b9493930fa5b1fda4a5b9c20e84d4733a1713a1a601d46cc406ea37c7c629b5b86fff14f3de9cb5c5172759ea02eaf9e6b0f0829d0c1677ee884c53924e706bb57f193eb1014043ca9b0f349d57709ed2b0417308e64b4ea7e1c65f86ee5802bbd3333fcc41c7b62062baa716ee6ab7e7c47ad3373ef584153ba64d7e67e0b1bdf"}, @NFTA_DATA_VERDICT={0x54, 0x2, 0x0, 0x1, [@NFTA_VERDICT_CHAIN_ID={0x8}, @NFTA_VERDICT_CODE={0x8}, @NFTA_VERDICT_CODE={0x8}, @NFTA_VERDICT_CHAIN={0x9, 0x2, 'syz2\x00'}, @NFTA_VERDICT_CODE={0x8}, @NFTA_VERDICT_CHAIN={0x9, 0x2, 'syz0\x00'}, @NFTA_VERDICT_CHAIN={0x9, 0x2, 'syz2\x00'}, @NFTA_VERDICT_CHAIN={0x9, 0x2, 'syz0\x00'}]}, @NFTA_DATA_VERDICT={0xc, 0x2, 0x0, 0x1, [@NFTA_VERDICT_CODE={0x8}]}, @NFTA_DATA_VALUE={0xf2, 0x1, "1db965e0eb8e7a28715bfd06fe13cdf0b0700d1f4ff61dd6f59bd36029851efdb887a787e645a3285b5b9db7bd51de444785b4d4ef7b84d7a99d845c38cb123ac8405c150eb0cc9b8ee39cbc71b42d788a7978960280f6300c10573ad699d6e66788976a48e532c39db6f27a8c944bd320a499382a8b3145ae356d53c728bc8bb86b08bd086d532700531143ed0b6dd0ce1f7998f0742f461fec4fd0e8f33d7014ee55ffd9ae5d873001e460e0968698ec8675561977f9699abb6eed74ca335443a8ac05fa979f4865203e69f835c3b203b04a3930d2dcca2c9c45d0ae5d2d99dffb8ddbcb4d011bc78a0ad31d7c"}, @NFTA_DATA_VALUE={0x91, 0x1, "8a9d9b8ebcb5bd94190c5dcdb2a80143bb4ca7c4458cd0afe46f9832f9e3e051c028960a1663850997b26fbafb5c14e43bae49217f69847c6f2134868a89feaeb70604a2ea0e49661ed8f262bfa68ffb9c9a451a0fec973c66de9a25cc797f2207d7a6e722ccb438a89279ae0d6cb12b9bb0813b8e811ea9638c795a3fb7f3e560be80679ce6a8385deb382c45"}, @NFTA_DATA_VALUE={0x2d, 0x1, "bd59decdbc50ae2b75d4f29b021928479d829d73f990353f0e41093ad9b536406fb4c269cb32844ec4"}, @NFTA_DATA_VALUE={0xfe, 0x1, "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"}, @NFTA_DATA_VERDICT={0x44, 0x2, 0x0, 0x1, [@NFTA_VERDICT_CHAIN_ID={0x8}, @NFTA_VERDICT_CHAIN_ID={0x8}, @NFTA_VERDICT_CHAIN={0x9, 0x2, 'syz1\x00'}, @NFTA_VERDICT_CHAIN={0x9, 0x2, 'syz2\x00'}, @NFTA_VERDICT_CHAIN={0x9, 0x2, 'syz2\x00'}, @NFTA_VERDICT_CHAIN={0x9, 0x2, 'syz1\x00'}]}, @NFTA_DATA_VALUE={0x9d, 0x1, "2a6d26d59c0a9c571f4fd1f10f30b3d14dcd2bdc4835617da7f39f9dd92212d00055cee0092ad2db104061e79dd8888571764d7aaab60f016e46796be5c668edf61121cd3ce640fa1cfade7569bd46d2b0e5b01f29b819bf7095a6dec14f0d1dc2c077edcdc6816faa8f3310741e025adb940fa8cac08774f3f88e05e6588afffe7ac046632dcd24d53da1c79cbf821a93478c167ac8286a65"}]}, @NFTA_SET_ELEM_FLAGS={0x8}, @NFTA_SET_ELEM_TIMEOUT={0xc}, @NFTA_SET_ELEM_TIMEOUT={0xc}, @NFTA_SET_ELEM_OBJREF={0x9, 0x9, 'syz2\x00'}]}, {0x528, 0x0, 0x0, 0x1, [@NFTA_SET_ELEM_USERDATA={0xf5, 0x6, 0x1, 0x0, "1aa1e52288b66d35530f8159cde5a335570277276bba3539e63beddbe7f5cf9eb460ccde62aa6d40ecd144f982048e0d257e185205a850ad35af37fe062082e417056be506da309251aec4720ba87210042d8c5e5e13fb4a0a69088e3cdf9fb2019402f6b70ea317b6fb750b04c886aaaf606b453108db4e1ea00666573bdb9f49e47cf3d2c042798382eccb5b1a27a6fb22fb3fe995904a96e4b86e4097b1be6cceeef98073f1b8a1056473c8bd5fc93f3b38a5a69543e0187f3eba8258c957649a9a1a35a868d9b8fcd76695691c6514044f46f614d43e9d8b0086d4ff5f8bdb90776480f2b0d9a8be22d6af95b33289"}, @NFTA_SET_ELEM_FLAGS={0x8}, @NFTA_SET_ELEM_EXPIRATION={0xc}, @NFTA_SET_ELEM_EXPR={0x4}, @NFTA_SET_ELEM_KEY={0x414, 0x1, 0x0, 0x1, [@NFTA_DATA_VALUE={0x3f1, 0x1, "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"}, @NFTA_DATA_VERDICT={0x18, 0x2, 0x0, 0x1, [@NFTA_VERDICT_CHAIN={0x9, 0x2, 'syz1\x00'}, @NFTA_VERDICT_CHAIN_ID={0x8}]}, @NFTA_DATA_VALUE={0x4}]}]}, {0x14, 0x0, 0x0, 0x1, [@NFTA_SET_ELEM_KEY_END={0x4}, @NFTA_SET_ELEM_TIMEOUT={0xc}]}]}, @NFTA_SET_ELEM_LIST_TABLE={0x9, 0x1, 'syz0\x00'}]}], {0x14}}, 0xec4}, 0x1, 0x0, 0x0, 0x200008c0}, 0x4000000) 10:17:27 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x22, &(0x7f0000000000)=0x7, 0x4) 10:17:27 executing program 2: prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f00000002c0)=0x0) sched_setscheduler(r0, 0x2, &(0x7f0000000080)=0x6) r1 = getpid() sched_setscheduler(r1, 0x2, &(0x7f00000000c0)=0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff}) recvmmsg(r2, &(0x7f00000000c0), 0x10106, 0x2, 0x0) syz_mount_image$ext4(&(0x7f0000000180)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xfffbffff00000000, 0x8, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000600100000f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000006856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010300), 0x0, 0x640}, {&(0x7f0000010400)="03000000040000000500000016000f000300040000000000000000000f00698c", 0x20, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}, {&(0x7f0000011000)}, {0x0, 0x0, 0x6700000}, {&(0x7f0000000580), 0x0, 0xc000}], 0x0, &(0x7f0000013b00)=ANY=[@ANYBLOB='\x00']) r3 = socket(0x10, 0x3, 0x0) sendmsg$nl_route(r3, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f00000005c0)=@ipv4_newroute={0x38, 0x18, 0xbad, 0x0, 0x0, {}, [@RTA_ENCAP_TYPE={0x6, 0x15, 0x3}, @RTA_ENCAP={0x14, 0x16, 0x0, 0x1, @SEG6_IPTUNNEL_SRH={0xd}}]}, 0x38}}, 0x0) r4 = socket(0x26, 0x3, 0x0) sendmsg$nl_route(r4, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f00000005c0)=@ipv4_newroute={0x38, 0x18, 0xbad, 0x0, 0x0, {0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6}, [@RTA_ENCAP_TYPE={0x6, 0x15, 0x3}, @RTA_ENCAP={0x14, 0x16, 0x0, 0x1, @SEG6_IPTUNNEL_SRH={0xd}}]}, 0x38}}, 0x0) r5 = socket(0x10, 0x0, 0x0) sendmsg$nl_route(r5, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f00000005c0)=@ipv4_newroute={0x38, 0x18, 0xbad, 0x0, 0x0, {0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6}, [@RTA_ENCAP_TYPE={0x6, 0x15, 0x3}, @RTA_ENCAP={0x14, 0x16, 0x0, 0x1, @SEG6_IPTUNNEL_SRH={0xd}}]}, 0x38}}, 0x0) recvfrom(r2, &(0x7f0000000600)=""/203, 0xcb, 0x42, &(0x7f0000000700)=@hci={0x1f, 0xffffffffffffffff, 0x4}, 0x80) 10:17:27 executing program 3: prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f00000002c0)=0x0) sched_setscheduler(r0, 0x2, &(0x7f0000000080)=0x6) r1 = getpid() sched_setscheduler(r1, 0x2, &(0x7f00000000c0)=0x4) connect$unix(0xffffffffffffffff, &(0x7f000057eff8)=@abs, 0x6e) sendmmsg$unix(0xffffffffffffffff, &(0x7f00000bd000), 0x318, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f00000000c0), 0x10106, 0x2, 0x0) syz_mount_image$ext4(&(0x7f0000000180)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xfffbffff00000000, 0x8, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000600100000f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000006856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010300), 0x0, 0x640}, {&(0x7f0000010400)="03000000040000000500000016000f000300040000000000000000000f00698c", 0x20, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}, {&(0x7f0000011000)}, {0x0, 0x0, 0x6700000}, {&(0x7f0000000580), 0x0, 0xc000}], 0x0, &(0x7f0000013b00)=ANY=[@ANYBLOB='\x00']) r2 = creat(&(0x7f0000000000)='./file1\x00', 0x18) socket(0x10, 0x3, 0x0) r3 = socket(0x26, 0x3, 0x0) sendmsg$nl_route(r3, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f00000005c0)=@ipv4_newroute={0x38, 0x18, 0xbad, 0x0, 0x0, {0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6}, [@RTA_ENCAP_TYPE={0x6, 0x15, 0x3}, @RTA_ENCAP={0x14, 0x16, 0x0, 0x1, @SEG6_IPTUNNEL_SRH={0xd}}]}, 0x38}}, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f00000005c0)=@ipv4_newroute={0x38, 0x18, 0xbad, 0x0, 0x0, {0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6}, [@RTA_ENCAP_TYPE={0x6, 0x15, 0x3}, @RTA_ENCAP={0x14, 0x16, 0x0, 0x1, @SEG6_IPTUNNEL_SRH={0xd}}]}, 0x38}}, 0x0) execveat(r2, 0x0, &(0x7f0000000380)=[&(0x7f00000001c0)='+{!#\x00', &(0x7f0000000300)='ext4\x00', &(0x7f0000000340)='@(\x00'], &(0x7f00000004c0)=[&(0x7f00000003c0)='ext4\x00', &(0x7f0000000400)='ext4\x00', &(0x7f0000000500)='\x00.D\x04\xe0\xce\x99\xd9\xa9\xac\xac\xadH\xa4\xcf\xb7\xffT\xac\x05\xfd\xdd\xb8w\x0f\x82B\xff\xf2\x909`1!\f\x870\x1f\xc1%Y\xc8\x15c \xea\x1cY!\x04\xe4\x91^\x00\x04\xe4\xa6\xba\xc6\xfd\x10\xdf\xe24\xd4&\x17\xdc\xec\xf4\f\n\xb7.\x13\x8e\x1bYENj\xe1\x19~\x1c\xaf\a;d\x9f\xba\xd9T\xd4-\xecX\xc0Y\x83@\xc7\x8b\xff*\xdd\xaa\xc6,o4\xe2\x0f\x16\x01[\xc0\xeb\x7fFI]WF\x1f\f?\xfa\xb1\xe7\xf6t\x027\xb1\xc17.4V\xf81{9\xa3\xb9\x01\xcck@I\xe2\xf1Y\x10E\xa1z/\x05.~Yh%\x8f\x06sB)N\x11P\xf6p\xff\'\xaf\a7\x10+p\xbb\xf3\xb08\xb5)\x00\xeeg\xd0\xee\xe9\x98\x8d\xf8\xb5G\t@f\x1et v\x14\tT\xc5', 0x0], 0x1000) 10:17:27 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFNL_MSG_ACCT_GET(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000040)={0x14, 0x1, 0x7, 0x5}, 0x14}}, 0x0) 10:17:27 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x1e, &(0x7f0000000180), 0x4) 10:17:27 executing program 1: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r0, &(0x7f0000001f40)={0x0, 0x0, &(0x7f0000001f00)={&(0x7f00000000c0)={{0x14}, [@NFT_MSG_NEWSET={0x14, 0x9, 0xa, 0x801}, @NFT_MSG_DELRULE={0x14, 0x8, 0xa, 0x5}, @NFT_MSG_DELSET={0x14, 0xb, 0xa, 0x3, 0x0, 0x0, {0x1}}, @NFT_MSG_DELTABLE={0x2c, 0x2, 0xa, 0x201, 0x0, 0x0, {0x5}, [@NFTA_TABLE_HANDLE={0xc}, @NFTA_TABLE_NAME={0x9, 0x1, 'syz0\x00'}]}, @NFT_MSG_NEWSET={0x20, 0x9, 0xa, 0x101, 0x0, 0x0, {}, [@NFTA_SET_TABLE={0x9, 0x1, 'syz0\x00'}]}], {0x14}}, 0xb0}}, 0x0) 10:17:27 executing program 4: openat$rdma_cm(0xffffff9c, &(0x7f0000000000), 0x2, 0x0) pselect6(0x40, &(0x7f0000000040), &(0x7f00000001c0)={0x9}, 0x0, 0x0, 0x0) 10:17:27 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r0, &(0x7f0000001f40)={0x0, 0x0, &(0x7f0000001f00)={&(0x7f0000000100)={{0x14}, [@NFT_MSG_NEWRULE={0x14}, @NFT_MSG_DELSET={0x1e4, 0xb, 0xa, 0x0, 0x0, 0x0, {}, [@NFTA_SET_DESC={0x188, 0x9, 0x0, 0x1, [@NFTA_SET_DESC_SIZE={0x8}, @NFTA_SET_DESC_CONCAT={0xb8, 0x2, 0x0, 0x1, [{0xc, 0x1, 0x0, 0x1, [@NFTA_SET_FIELD_LEN={0x8}]}, {0xc, 0x1, 0x0, 0x1, [@NFTA_SET_FIELD_LEN={0x8}]}, {0x44, 0x1, 0x0, 0x1, [@NFTA_SET_FIELD_LEN={0x8}, @NFTA_SET_FIELD_LEN={0x8}, @NFTA_SET_FIELD_LEN={0x8}, @NFTA_SET_FIELD_LEN={0x8}, @NFTA_SET_FIELD_LEN={0x8}, @NFTA_SET_FIELD_LEN={0x8}, @NFTA_SET_FIELD_LEN={0x8}, @NFTA_SET_FIELD_LEN={0x8}]}, {0x44, 0x1, 0x0, 0x1, [@NFTA_SET_FIELD_LEN={0x8}, @NFTA_SET_FIELD_LEN={0x8}, @NFTA_SET_FIELD_LEN={0x8}, @NFTA_SET_FIELD_LEN={0x8}, @NFTA_SET_FIELD_LEN={0x8}, @NFTA_SET_FIELD_LEN={0x8}, @NFTA_SET_FIELD_LEN={0x8}, @NFTA_SET_FIELD_LEN={0x8}]}, {0x14, 0x1, 0x0, 0x1, [@NFTA_SET_FIELD_LEN={0x8}, @NFTA_SET_FIELD_LEN={0x8}]}]}, @NFTA_SET_DESC_CONCAT={0xac, 0x2, 0x0, 0x1, [{0x24, 0x1, 0x0, 0x1, [@NFTA_SET_FIELD_LEN={0x8}, @NFTA_SET_FIELD_LEN={0x8}, @NFTA_SET_FIELD_LEN={0x8}, @NFTA_SET_FIELD_LEN={0x8}]}, {0x2c, 0x1, 0x0, 0x1, [@NFTA_SET_FIELD_LEN={0x8}, @NFTA_SET_FIELD_LEN={0x8}, @NFTA_SET_FIELD_LEN={0x8}, @NFTA_SET_FIELD_LEN={0x8}, @NFTA_SET_FIELD_LEN={0x8}]}, {0xc, 0x1, 0x0, 0x1, [@NFTA_SET_FIELD_LEN={0x8}]}, {0x4}, {0x34, 0x1, 0x0, 0x1, [@NFTA_SET_FIELD_LEN={0x8}, @NFTA_SET_FIELD_LEN={0x8}, @NFTA_SET_FIELD_LEN={0x8}, @NFTA_SET_FIELD_LEN={0x8}, @NFTA_SET_FIELD_LEN={0x8}, @NFTA_SET_FIELD_LEN={0x8}]}, {0x14, 0x1, 0x0, 0x1, [@NFTA_SET_FIELD_LEN={0x8}, @NFTA_SET_FIELD_LEN={0x8}]}]}, @NFTA_SET_DESC_SIZE={0x8}, @NFTA_SET_DESC_SIZE={0x8}, @NFTA_SET_DESC_SIZE={0x8}]}, @NFTA_SET_KEY_TYPE, @NFTA_SET_KEY_TYPE={0x8}, @NFTA_SET_DATA_LEN={0x8}, @NFTA_SET_DATA_TYPE={0x8}, @NFTA_SET_NAME={0x9, 0x2, 'syz0\x00'}, @NFTA_SET_ID={0x8}]}], {0xfffffffffffffe8b}}, 0x220}}, 0x0) 10:17:27 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r0, &(0x7f0000001f40)={0x0, 0x0, &(0x7f0000001f00)={&(0x7f0000000280)={{0x14}, [@NFT_MSG_NEWRULE={0x20, 0x6, 0xa, 0x201, 0x0, 0x0, {}, [@NFTA_RULE_TABLE={0x9, 0x1, 'syz1\x00'}]}], {0x14}}, 0x48}}, 0x0) 10:17:27 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_TIMEOUT_GET(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000100)={0x20, 0x1, 0x8, 0x5, 0x0, 0x0, {}, [@CTA_TIMEOUT_NAME={0x9, 0x1, 'syz1\x00'}]}, 0x20}}, 0x0) [ 2347.270806][T26294] loop3: detected capacity change from 0 to 264192 [ 2347.301712][T26294] EXT4-fs (loop3): mounted filesystem without journal. Quota mode: writeback. [ 2347.330067][T26315] loop2: detected capacity change from 0 to 264192 [ 2347.342621][T26315] EXT4-fs (loop2): mounted filesystem without journal. Quota mode: writeback. 10:17:34 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000b80)={{0x14}, [@NFT_MSG_NEWSETELEM={0x14}], {0x14}}, 0x3c}}, 0x0) 10:17:34 executing program 2: prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f00000002c0)=0x0) sched_setscheduler(r0, 0x2, &(0x7f0000000080)=0x6) r1 = getpid() sched_setscheduler(r1, 0x2, &(0x7f00000000c0)=0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff}) recvmmsg(r2, &(0x7f00000000c0), 0x10106, 0x2, 0x0) syz_mount_image$ext4(&(0x7f0000000180)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xfffbffff00000000, 0x8, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000600100000f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000006856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010300), 0x0, 0x640}, {&(0x7f0000010400)="03000000040000000500000016000f000300040000000000000000000f00698c", 0x20, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}, {&(0x7f0000011000)}, {0x0, 0x0, 0x6700000}, {&(0x7f0000000580), 0x0, 0xc000}], 0x0, &(0x7f0000013b00)=ANY=[@ANYBLOB='\x00']) r3 = socket(0x10, 0x3, 0x0) sendmsg$nl_route(r3, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f00000005c0)=@ipv4_newroute={0x38, 0x18, 0xbad, 0x0, 0x0, {}, [@RTA_ENCAP_TYPE={0x6, 0x15, 0x3}, @RTA_ENCAP={0x14, 0x16, 0x0, 0x1, @SEG6_IPTUNNEL_SRH={0xd}}]}, 0x38}}, 0x0) r4 = socket(0x26, 0x3, 0x0) sendmsg$nl_route(r4, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f00000005c0)=@ipv4_newroute={0x38, 0x18, 0xbad, 0x0, 0x0, {0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6}, [@RTA_ENCAP_TYPE={0x6, 0x15, 0x3}, @RTA_ENCAP={0x14, 0x16, 0x0, 0x1, @SEG6_IPTUNNEL_SRH={0xd}}]}, 0x38}}, 0x0) r5 = socket(0x10, 0x0, 0x0) sendmsg$nl_route(r5, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f00000005c0)=@ipv4_newroute={0x38, 0x18, 0xbad, 0x0, 0x0, {0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6}, [@RTA_ENCAP_TYPE={0x6, 0x15, 0x3}, @RTA_ENCAP={0x14, 0x16, 0x0, 0x1, @SEG6_IPTUNNEL_SRH={0xd}}]}, 0x38}}, 0x0) recvfrom(r2, &(0x7f0000000600)=""/203, 0xcb, 0x42, &(0x7f0000000700)=@hci={0x1f, 0xffffffffffffffff, 0x4}, 0x80) 10:17:34 executing program 1: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f00000000c0)={0x0, 0x1000}, 0x4) r1 = socket$packet(0x11, 0x3, 0x300) ioctl$ifreq_SIOCGIFINDEX_team(r1, 0x8933, &(0x7f0000000100)={'team0\x00', 0x0}) sendto$packet(r1, &(0x7f0000000000)="8783fe2da53f6594663c125f1455", 0xe, 0x0, &(0x7f0000000140)={0x11, 0x0, r2, 0x1, 0x0, 0x6, @remote}, 0x14) 10:17:34 executing program 5: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_TIMEOUT_GET(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000140)={0x14, 0x1, 0x8, 0x5}, 0x14}}, 0x0) 10:17:34 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r0, &(0x7f0000001f40)={0x0, 0x0, &(0x7f0000001f00)={&(0x7f00000000c0)={{0x14}, [@NFT_MSG_DELTABLE={0x14, 0x2, 0xc, 0x201}], {0x14}}, 0x3c}}, 0x0) 10:17:34 executing program 3: prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f00000002c0)=0x0) sched_setscheduler(r0, 0x2, &(0x7f0000000080)=0x6) r1 = getpid() sched_setscheduler(r1, 0x2, &(0x7f00000000c0)=0x4) connect$unix(0xffffffffffffffff, &(0x7f000057eff8)=@abs, 0x6e) sendmmsg$unix(0xffffffffffffffff, &(0x7f00000bd000), 0x318, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f00000000c0), 0x10106, 0x2, 0x0) syz_mount_image$ext4(&(0x7f0000000180)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xfffbffff00000000, 0x8, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000600100000f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000006856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010300), 0x0, 0x640}, {&(0x7f0000010400)="03000000040000000500000016000f000300040000000000000000000f00698c", 0x20, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}, {&(0x7f0000011000)}, {0x0, 0x0, 0x6700000}, {&(0x7f0000000580), 0x0, 0xc000}], 0x0, &(0x7f0000013b00)=ANY=[@ANYBLOB='\x00']) r2 = creat(&(0x7f0000000000)='./file1\x00', 0x18) socket(0x10, 0x3, 0x0) r3 = socket(0x26, 0x3, 0x0) sendmsg$nl_route(r3, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f00000005c0)=@ipv4_newroute={0x38, 0x18, 0xbad, 0x0, 0x0, {0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6}, [@RTA_ENCAP_TYPE={0x6, 0x15, 0x3}, @RTA_ENCAP={0x14, 0x16, 0x0, 0x1, @SEG6_IPTUNNEL_SRH={0xd}}]}, 0x38}}, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f00000005c0)=@ipv4_newroute={0x38, 0x18, 0xbad, 0x0, 0x0, {0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6}, [@RTA_ENCAP_TYPE={0x6, 0x15, 0x3}, @RTA_ENCAP={0x14, 0x16, 0x0, 0x1, @SEG6_IPTUNNEL_SRH={0xd}}]}, 0x38}}, 0x0) execveat(r2, 0x0, &(0x7f0000000380)=[&(0x7f00000001c0)='+{!#\x00', &(0x7f0000000300)='ext4\x00', &(0x7f0000000340)='@(\x00'], &(0x7f00000004c0)=[&(0x7f00000003c0)='ext4\x00', &(0x7f0000000400)='ext4\x00', &(0x7f0000000500)='\x00.D\x04\xe0\xce\x99\xd9\xa9\xac\xac\xadH\xa4\xcf\xb7\xffT\xac\x05\xfd\xdd\xb8w\x0f\x82B\xff\xf2\x909`1!\f\x870\x1f\xc1%Y\xc8\x15c \xea\x1cY!\x04\xe4\x91^\x00\x04\xe4\xa6\xba\xc6\xfd\x10\xdf\xe24\xd4&\x17\xdc\xec\xf4\f\n\xb7.\x13\x8e\x1bYENj\xe1\x19~\x1c\xaf\a;d\x9f\xba\xd9T\xd4-\xecX\xc0Y\x83@\xc7\x8b\xff*\xdd\xaa\xc6,o4\xe2\x0f\x16\x01[\xc0\xeb\x7fFI]WF\x1f\f?\xfa\xb1\xe7\xf6t\x027\xb1\xc17.4V\xf81{9\xa3\xb9\x01\xcck@I\xe2\xf1Y\x10E\xa1z/\x05.~Yh%\x8f\x06sB)N\x11P\xf6p\xff\'\xaf\a7\x10+p\xbb\xf3\xb08\xb5)\x00\xeeg\xd0\xee\xe9\x98\x8d\xf8\xb5G\t@f\x1et v\x14\tT\xc5', 0x0], 0x1000) 10:17:34 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000240)={{0x14}, [@NFT_MSG_DELOBJ={0x34, 0x14, 0xa, 0x101, 0x0, 0x0, {}, [@NFTA_OBJ_HANDLE={0xc}, @NFTA_OBJ_TABLE={0x9, 0x1, 'syz0\x00'}, @NFTA_OBJ_TYPE={0x8}]}, @NFT_MSG_DELRULE={0x20, 0x8, 0xa, 0x201, 0x0, 0x0, {}, [@NFTA_RULE_TABLE={0x9, 0x1, 'syz1\x00'}]}], {0x14}}, 0x7c}}, 0x0) 10:17:34 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r0, &(0x7f0000001f40)={0x0, 0x0, &(0x7f0000001f00)={&(0x7f00000000c0)={{0x14}, [@NFT_MSG_DELTABLE={0x14}], {0x14}}, 0xfffffdef}}, 0x0) 10:17:34 executing program 1: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r0, &(0x7f0000001f40)={0x0, 0x0, &(0x7f0000001f00)={&(0x7f00000000c0)={{0x14, 0x3}, [@NFT_MSG_DELTABLE={0x14, 0x2, 0xa, 0x201}], {0x14}}, 0x3c}}, 0x0) 10:17:34 executing program 0: r0 = socket$inet6_mptcp(0xa, 0x1, 0x106) ioctl$sock_inet6_tcp_SIOCOUTQNSD(r0, 0x894b, &(0x7f0000000180)) 10:17:34 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFULNL_MSG_CONFIG(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000040)={0x1c, 0x1, 0x4, 0x401, 0x0, 0x0, {}, [@NFULA_CFG_CMD={0x5, 0x1, 0x3}]}, 0x1c}}, 0x0) [ 2354.472429][T26327] loop3: detected capacity change from 0 to 264192 [ 2354.491210][T26327] EXT4-fs (loop3): mounted filesystem without journal. Quota mode: writeback. [ 2354.512124][T26343] loop2: detected capacity change from 0 to 264192 10:17:34 executing program 1: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_TIMEOUT_DEFAULT_GET(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000040)=ANY=[@ANYBLOB="3c000000040805"], 0x3c}}, 0x0) 10:17:34 executing program 3: prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f00000002c0)=0x0) sched_setscheduler(r0, 0x2, &(0x7f0000000080)=0x6) r1 = getpid() sched_setscheduler(r1, 0x2, &(0x7f00000000c0)=0x4) connect$unix(0xffffffffffffffff, &(0x7f000057eff8)=@abs, 0x6e) sendmmsg$unix(0xffffffffffffffff, &(0x7f00000bd000), 0x318, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f00000000c0), 0x10106, 0x2, 0x0) syz_mount_image$ext4(&(0x7f0000000180)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xfffbffff00000000, 0x8, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000600100000f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000006856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010300), 0x0, 0x640}, {&(0x7f0000010400)="03000000040000000500000016000f000300040000000000000000000f00698c", 0x20, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}, {&(0x7f0000011000)}, {0x0, 0x0, 0x6700000}, {&(0x7f0000000580), 0x0, 0xc000}], 0x0, &(0x7f0000013b00)=ANY=[@ANYBLOB='\x00']) r2 = creat(&(0x7f0000000000)='./file1\x00', 0x18) socket(0x10, 0x3, 0x0) r3 = socket(0x26, 0x3, 0x0) sendmsg$nl_route(r3, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f00000005c0)=@ipv4_newroute={0x38, 0x18, 0xbad, 0x0, 0x0, {0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6}, [@RTA_ENCAP_TYPE={0x6, 0x15, 0x3}, @RTA_ENCAP={0x14, 0x16, 0x0, 0x1, @SEG6_IPTUNNEL_SRH={0xd}}]}, 0x38}}, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f00000005c0)=@ipv4_newroute={0x38, 0x18, 0xbad, 0x0, 0x0, {0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6}, [@RTA_ENCAP_TYPE={0x6, 0x15, 0x3}, @RTA_ENCAP={0x14, 0x16, 0x0, 0x1, @SEG6_IPTUNNEL_SRH={0xd}}]}, 0x38}}, 0x0) execveat(r2, 0x0, &(0x7f0000000380)=[&(0x7f00000001c0)='+{!#\x00', &(0x7f0000000300)='ext4\x00', &(0x7f0000000340)='@(\x00'], &(0x7f00000004c0)=[&(0x7f00000003c0)='ext4\x00', &(0x7f0000000400)='ext4\x00', &(0x7f0000000500)='\x00.D\x04\xe0\xce\x99\xd9\xa9\xac\xac\xadH\xa4\xcf\xb7\xffT\xac\x05\xfd\xdd\xb8w\x0f\x82B\xff\xf2\x909`1!\f\x870\x1f\xc1%Y\xc8\x15c \xea\x1cY!\x04\xe4\x91^\x00\x04\xe4\xa6\xba\xc6\xfd\x10\xdf\xe24\xd4&\x17\xdc\xec\xf4\f\n\xb7.\x13\x8e\x1bYENj\xe1\x19~\x1c\xaf\a;d\x9f\xba\xd9T\xd4-\xecX\xc0Y\x83@\xc7\x8b\xff*\xdd\xaa\xc6,o4\xe2\x0f\x16\x01[\xc0\xeb\x7fFI]WF\x1f\f?\xfa\xb1\xe7\xf6t\x027\xb1\xc17.4V\xf81{9\xa3\xb9\x01\xcck@I\xe2\xf1Y\x10E\xa1z/\x05.~Yh%\x8f\x06sB)N\x11P\xf6p\xff\'\xaf\a7\x10+p\xbb\xf3\xb08\xb5)\x00\xeeg\xd0\xee\xe9\x98\x8d\xf8\xb5G\t@f\x1et v\x14\tT\xc5', 0x0], 0x1000) [ 2354.531251][T26343] EXT4-fs (loop2): mounted filesystem without journal. Quota mode: writeback. [ 2354.568181][T26352] netlink: 40 bytes leftover after parsing attributes in process `syz-executor.1'. 10:17:42 executing program 5: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r0, &(0x7f0000001f40)={0x0, 0x0, &(0x7f0000001f00)={&(0x7f00000000c0)={{0x14, 0xa}, [@NFT_MSG_DELTABLE={0x14, 0x2, 0xa, 0x201}], {0x14}}, 0x3c}}, 0x0) 10:17:42 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r0, &(0x7f0000001f40)={0x0, 0x0, &(0x7f0000001f00)={&(0x7f00000000c0)=ANY=[@ANYBLOB="1400000010000100000000000400000000000014"], 0x3c}}, 0x0) 10:17:42 executing program 1: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFULNL_MSG_CONFIG(r0, &(0x7f0000000100)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x800}, 0xc, &(0x7f00000000c0)={&(0x7f0000000040)=ANY=[@ANYBLOB="64000000010401020000000000000000"], 0x64}, 0x1, 0x0, 0x0, 0x2000c000}, 0x4000040) 10:17:42 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r0, &(0x7f0000001f40)={0x0, 0x0, &(0x7f0000001f00)={&(0x7f0000000040)={{0x14}, [@NFT_MSG_DELFLOWTABLE={0x14, 0x18, 0xa, 0x201}], {0x14}}, 0x3c}}, 0x0) 10:17:42 executing program 3: prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f00000002c0)=0x0) sched_setscheduler(r0, 0x2, &(0x7f0000000080)=0x6) getpid() socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r1, &(0x7f000057eff8)=@abs, 0x6e) sendmmsg$unix(r2, &(0x7f00000bd000), 0x318, 0x0) recvmmsg(r1, &(0x7f00000000c0), 0x10106, 0x2, 0x0) syz_mount_image$ext4(&(0x7f0000000180)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xfffbffff00000000, 0x8, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000600100000f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000006856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010300), 0x0, 0x640}, {&(0x7f0000010400)="03000000040000000500000016000f000300040000000000000000000f00698c", 0x20, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}, {&(0x7f0000011000)}, {0x0, 0x0, 0x6700000}, {&(0x7f0000000580), 0x0, 0xc000}], 0x0, &(0x7f0000013b00)=ANY=[@ANYBLOB='\x00']) r3 = creat(&(0x7f0000000000)='./file1\x00', 0x18) socket(0x10, 0x3, 0x0) r4 = socket(0x26, 0x3, 0x0) sendmsg$nl_route(r4, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f00000005c0)=@ipv4_newroute={0x38, 0x18, 0xbad, 0x0, 0x0, {0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6}, [@RTA_ENCAP_TYPE={0x6, 0x15, 0x3}, @RTA_ENCAP={0x14, 0x16, 0x0, 0x1, @SEG6_IPTUNNEL_SRH={0xd}}]}, 0x38}}, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f00000005c0)=@ipv4_newroute={0x38, 0x18, 0xbad, 0x0, 0x0, {0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6}, [@RTA_ENCAP_TYPE={0x6, 0x15, 0x3}, @RTA_ENCAP={0x14, 0x16, 0x0, 0x1, @SEG6_IPTUNNEL_SRH={0xd}}]}, 0x38}}, 0x0) execveat(r3, 0x0, &(0x7f0000000380)=[&(0x7f00000001c0)='+{!#\x00', &(0x7f0000000300)='ext4\x00', &(0x7f0000000340)='@(\x00'], &(0x7f00000004c0)=[&(0x7f00000003c0)='ext4\x00', &(0x7f0000000400)='ext4\x00', &(0x7f0000000500)='\x00.D\x04\xe0\xce\x99\xd9\xa9\xac\xac\xadH\xa4\xcf\xb7\xffT\xac\x05\xfd\xdd\xb8w\x0f\x82B\xff\xf2\x909`1!\f\x870\x1f\xc1%Y\xc8\x15c \xea\x1cY!\x04\xe4\x91^\x00\x04\xe4\xa6\xba\xc6\xfd\x10\xdf\xe24\xd4&\x17\xdc\xec\xf4\f\n\xb7.\x13\x8e\x1bYENj\xe1\x19~\x1c\xaf\a;d\x9f\xba\xd9T\xd4-\xecX\xc0Y\x83@\xc7\x8b\xff*\xdd\xaa\xc6,o4\xe2\x0f\x16\x01[\xc0\xeb\x7fFI]WF\x1f\f?\xfa\xb1\xe7\xf6t\x027\xb1\xc17.4V\xf81{9\xa3\xb9\x01\xcck@I\xe2\xf1Y\x10E\xa1z/\x05.~Yh%\x8f\x06sB)N\x11P\xf6p\xff\'\xaf\a7\x10+p\xbb\xf3\xb08\xb5)\x00\xeeg\xd0\xee\xe9\x98\x8d\xf8\xb5G\t@f\x1et v\x14\tT\xc5', 0x0], 0x1000) 10:17:42 executing program 2: prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f00000002c0)=0x0) sched_setscheduler(r0, 0x2, &(0x7f0000000080)=0x6) r1 = getpid() sched_setscheduler(r1, 0x2, &(0x7f00000000c0)=0x4) connect$unix(0xffffffffffffffff, &(0x7f000057eff8)=@abs, 0x6e) recvmmsg(0xffffffffffffffff, &(0x7f00000000c0), 0x10106, 0x2, 0x0) syz_mount_image$ext4(&(0x7f0000000180)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xfffbffff00000000, 0x8, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000600100000f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000006856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010300), 0x0, 0x640}, {&(0x7f0000010400)="03000000040000000500000016000f000300040000000000000000000f00698c", 0x20, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}, {&(0x7f0000011000)}, {0x0, 0x0, 0x6700000}, {&(0x7f0000000580), 0x0, 0xc000}], 0x0, &(0x7f0000013b00)=ANY=[@ANYBLOB='\x00']) r2 = socket(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f00000005c0)=@ipv4_newroute={0x38, 0x18, 0xbad, 0x0, 0x0, {}, [@RTA_ENCAP_TYPE={0x6, 0x15, 0x3}, @RTA_ENCAP={0x14, 0x16, 0x0, 0x1, @SEG6_IPTUNNEL_SRH={0xd}}]}, 0x38}}, 0x0) r3 = socket(0x26, 0x3, 0x0) sendmsg$nl_route(r3, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f00000005c0)=@ipv4_newroute={0x38, 0x18, 0xbad, 0x0, 0x0, {0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6}, [@RTA_ENCAP_TYPE={0x6, 0x15, 0x3}, @RTA_ENCAP={0x14, 0x16, 0x0, 0x1, @SEG6_IPTUNNEL_SRH={0xd}}]}, 0x38}}, 0x0) r4 = socket(0x10, 0x0, 0x0) sendmsg$nl_route(r4, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f00000005c0)=@ipv4_newroute={0x38, 0x18, 0xbad, 0x0, 0x0, {0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6}, [@RTA_ENCAP_TYPE={0x6, 0x15, 0x3}, @RTA_ENCAP={0x14, 0x16, 0x0, 0x1, @SEG6_IPTUNNEL_SRH={0xd}}]}, 0x38}}, 0x0) recvfrom(0xffffffffffffffff, &(0x7f0000000600)=""/203, 0xcb, 0x42, &(0x7f0000000700)=@hci={0x1f, 0xffffffffffffffff, 0x4}, 0x80) 10:17:42 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r0, &(0x7f0000001f40)={0x0, 0x0, &(0x7f0000001f00)={&(0x7f00000000c0)={{0x14, 0x10, 0x1, 0x0, 0x0, {0x0, 0x0, 0xc}}, [], {0x14}}, 0x28}}, 0x0) 10:17:42 executing program 1: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFNL_MSG_ACCT_DEL(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000040)={0x20, 0x3, 0x7, 0x301, 0x0, 0x0, {}, [@NFACCT_NAME={0x9, 0x1, 'syz1\x00'}]}, 0x20}}, 0x0) 10:17:42 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_TIMEOUT_GET(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000300)=ANY=[@ANYBLOB="e8000000010805"], 0xe8}}, 0x0) [ 2361.668049][T26369] netlink: 80 bytes leftover after parsing attributes in process `syz-executor.1'. [ 2361.681103][T26367] loop2: detected capacity change from 0 to 264192 10:17:42 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r0, &(0x7f0000001f40)={0x0, 0x0, &(0x7f0000001f00)={&(0x7f0000001f80)={{0x14}, [@NFT_MSG_DELSETELEM={0x20, 0xe, 0xa, 0x301, 0x0, 0x0, {}, [@NFTA_SET_ELEM_LIST_TABLE={0x9, 0x1, 'syz0\x00'}]}], {0x14}}, 0x48}}, 0x0) 10:17:42 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000200)=@ipv6_newroute={0x38, 0x18, 0x1, 0x0, 0x0, {0xa, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7}, [@RTA_PRIORITY={0x8}, @RTA_ENCAP={0x14, 0x16, 0x0, 0x1, @LWTUNNEL_IP6_OPTS={0x10, 0x8, @LWTUNNEL_IP_OPTS_VXLAN={0xc, 0x2, 0x0, 0x1, @LWTUNNEL_IP_OPT_VXLAN_GBP={0x8}}}}]}, 0x38}}, 0x0) 10:17:42 executing program 1: syz_mount_image$vfat(0x0, 0x0, 0x0, 0x4, &(0x7f0000001c40)=[{&(0x7f00000007c0), 0x0, 0x4}, {0x0}, {0x0}, {0x0}], 0x0, 0x0) [ 2361.712212][T26378] netlink: 212 bytes leftover after parsing attributes in process `syz-executor.0'. [ 2361.747089][T26385] IPv6: RTM_NEWROUTE with no NLM_F_CREATE or NLM_F_REPLACE [ 2361.748124][T26367] EXT4-fs (loop2): mounted filesystem without journal. Quota mode: writeback. [ 2361.754333][T26385] IPv6: NLM_F_CREATE should be set when creating new route [ 2361.784975][T26387] loop3: detected capacity change from 0 to 264192 [ 2361.854255][T26387] EXT4-fs (loop3): mounted filesystem without journal. Quota mode: writeback. 10:17:51 executing program 5: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$OSF_MSG_REMOVE(r0, &(0x7f0000001600)={0x0, 0x0, &(0x7f00000015c0)={&(0x7f0000000080)={0x1060, 0x1, 0x5, 0x0, 0x0, 0x0, {}, [{{0x254, 0x1, {{0x0, 0xc22}, 0x0, 0x0, 0x0, 0x0, 0x0, 'syz0\x00', "69531d9b2c316ee3a35baf1e993fe5064b68c36d5647883848d400", "ba0949e9ea37003f5bfe26a2befd85028a5d611f01a85d625a7f3d87420eafcd", [{}, {}, {}, {0x0, 0x0, {0x1}}, {0x0, 0x7, {0x0, 0x8001}}, {}, {0x2}, {}, {0x0, 0x0, {0x0, 0x4}}, {}, {0x6}, {}, {0x0, 0x0, {0x2}}, {}, {}, {}, {}, {}, {}, {0x4, 0x0, {0x0, 0x3}}, {}, {0x0, 0x0, {0x0, 0x2}}, {}, {0x0, 0x0, {0x3, 0x4}}, {}, {0x0, 0x7}, {}, {}, {}, {0x1ff, 0xfff}, {}, {0x4f5}, {}, {0x0, 0x8}]}}}, {{0x254, 0x1, {{}, 0x0, 0x0, 0x0, 0x0, 0xf, 'syz0\x00', "14ce2df44961865611b7aa58acb8f019e3804729d5a3ed89a5db4c06ab4a6cf3", "07fd043866e9cdcd0919f2fde7e364284b81474d15469c80bac2924041d80ac9", [{}, {}, {0x0, 0x0, {0x0, 0x8}}, {}, {}, {}, {}, {0x0, 0x0, {0x0, 0x1ff}}, {0x3c}, {}, {}, {0x0, 0x0, {0x0, 0xfffffb1f}}, {0x0, 0x0, {0x1}}, {}, {}, {0x8, 0x0, {0x0, 0x800}}, {}, {}, {}, {}, {}, {}, {0x0, 0x0, {0x1}}, {}, {0x0, 0x0, {0x0, 0x5}}, {}, {}, {0x8700, 0x5, {0x3}}, {}, {0x0, 0x0, {0x2}}, {}, {}, {0x0, 0x0, {0x0, 0x401}}, {}, {0x0, 0x0, {0x1}}, {}, {0x0, 0x4, {0x0, 0xd1a}}, {0x0, 0x0, {0x0, 0x4}}, {0x0, 0x0, {0x0, 0x10}}]}}}, {{0x254, 0x1, {{0x0, 0xace}, 0x0, 0x80, 0x0, 0x0, 0x0, 'syz0\x00', "28c6f0802fa1e350a0d0c681d33ca7d3543ae97da1d9b29770454e245504ff32", "10292ba24b3df77a6e10c0cc68317373bc86608c50bbba46b9ccedc6fda82edf", [{}, {}, {0x0, 0x0, {0x2}}, {}, {}, {0x1, 0x5}, {}, {}, {0x0, 0x0, {0x0, 0xb2}}, {0x0, 0x0, {0x0, 0x8}}, {}, {}, {0x261a}, {}, {}, {0x4}, {}, {0x0, 0x0, {0x1, 0x5}}, {}, {}, {}, {0x7fff, 0x0, {0x2}}, {0x0, 0x0, {0x0, 0x6}}, {}, {}, {0x0, 0x7f}, {0x7}, {}, {}, {}, {}, {0x0, 0x0, {0x0, 0x9}}, {0x0, 0x81}]}}}, {{0x254, 0x1, {{}, 0x0, 0x4, 0x0, 0x0, 0x0, 'syz0\x00', "f7fe112c6016bb05046c59f2006c8078940b54b9ab291fe4ffcdf162298288ea", "b6819a7727599c4a0369f4b1665cd9e1535ae1861b719ff72da3d65738e1c669", [{0xffff, 0x0, {0x3}}, {}, {}, {}, {}, {}, {0x0, 0x1}, {}, {}, {}, {0x0, 0x0, {0x0, 0xfffffff8}}, {0x0, 0x3ff}, {0x9}, {}, {0x6, 0x0, {0x0, 0x3f}}, {}, {}, {}, {}, {0x0, 0x0, {0x1}}, {}, {}, {}, {}, {0x0, 0x1}, {0x0, 0x3}, {}, {0x0, 0x0, {0x3}}, {}, {0x0, 0x0, {0x0, 0x1}}, {0x0, 0x1}, {0x0, 0x0, {0x2}}, {}, {0x0, 0x0, {0x2}}, {}, {0x4}, {}, {0x0, 0x8}, {}, {0x0, 0x0, {0x3, 0x101}}]}}}, {{0x254, 0x1, {{}, 0x0, 0x0, 0x0, 0x0, 0x0, 'syz0\x00', "9cae82f5578335ebed2561958d5ac918e595c1507fab9cc381de77f97f4f9748", "6e4b33f436841e7d5c75666618695633cc8d5004a8181d579b3c6994077a8fe6", [{}, {0x1}, {}, {}, {}, {0x7f}, {0x0, 0x100}, {}, {}, {}, {}, {0x0, 0x1, {0x0, 0x3}}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, 0x0, {0x1}}, {}, {}, {}, {0x0, 0x0, {0x2}}, {}, {}, {0x53e3}, {}, {0x0, 0x0, {0x3}}, {0x0, 0x7}, {}, {}, {0x7}]}}}, {{0x254, 0x1, {{}, 0x0, 0x0, 0x0, 0x0, 0x0, 'syz1\x00', "27900b63b7c972fcd715b2efb101d8b4bf2ddb47f1937df214c6c30c238beebc", "779e48650261d31da5f3d2bbd961df958b3a72fabfb90d55e7bea8ef71cde148", [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, 0x20}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, 0x3f}, {0x6}]}}}, {{0x254, 0x1, {{}, 0x0, 0x0, 0x0, 0x0, 0x0, 'syz0\x00', "66894dcf92d114edaf018d55941b13cf020ab2483931ddada053424aeb47e9ea", "9898157ac52fce4d906453b0cbd6905f5c4b03ecb14455ae4df2d46dcd6a6836", [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, 0x0, {0x1}}, {}, {}, {}, {0xffff}, {}, {}, {0x0, 0x0, {0x1}}, {}, {}, {}, {}, {}, {}, {0x0, 0x0, {0x0, 0x1ff}}]}}}]}, 0x1060}}, 0x0) 10:17:51 executing program 4: syz_mount_image$vfat(&(0x7f0000000180), &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000440), 0x0, &(0x7f00000004c0)={[{@shortname_mixed}, {@utf8}, {@uni_xlateno}, {@utf8no}, {@shortname_winnt}, {@fat=@allow_utime}]}) 10:17:51 executing program 1: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NL80211_CMD_CRIT_PROTOCOL_STOP(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000080)=ANY=[@ANYBLOB="14000000", @ANYRES16, @ANYBLOB="01"], 0x14}}, 0x0) 10:17:51 executing program 2: prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f00000002c0)=0x0) sched_setscheduler(r0, 0x2, &(0x7f0000000080)=0x6) r1 = getpid() sched_setscheduler(r1, 0x2, &(0x7f00000000c0)=0x4) connect$unix(0xffffffffffffffff, &(0x7f000057eff8)=@abs, 0x6e) recvmmsg(0xffffffffffffffff, &(0x7f00000000c0), 0x10106, 0x2, 0x0) syz_mount_image$ext4(&(0x7f0000000180)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xfffbffff00000000, 0x8, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000600100000f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000006856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010300), 0x0, 0x640}, {&(0x7f0000010400)="03000000040000000500000016000f000300040000000000000000000f00698c", 0x20, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}, {&(0x7f0000011000)}, {0x0, 0x0, 0x6700000}, {&(0x7f0000000580), 0x0, 0xc000}], 0x0, &(0x7f0000013b00)=ANY=[@ANYBLOB='\x00']) r2 = socket(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f00000005c0)=@ipv4_newroute={0x38, 0x18, 0xbad, 0x0, 0x0, {}, [@RTA_ENCAP_TYPE={0x6, 0x15, 0x3}, @RTA_ENCAP={0x14, 0x16, 0x0, 0x1, @SEG6_IPTUNNEL_SRH={0xd}}]}, 0x38}}, 0x0) r3 = socket(0x26, 0x3, 0x0) sendmsg$nl_route(r3, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f00000005c0)=@ipv4_newroute={0x38, 0x18, 0xbad, 0x0, 0x0, {0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6}, [@RTA_ENCAP_TYPE={0x6, 0x15, 0x3}, @RTA_ENCAP={0x14, 0x16, 0x0, 0x1, @SEG6_IPTUNNEL_SRH={0xd}}]}, 0x38}}, 0x0) r4 = socket(0x10, 0x0, 0x0) sendmsg$nl_route(r4, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f00000005c0)=@ipv4_newroute={0x38, 0x18, 0xbad, 0x0, 0x0, {0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6}, [@RTA_ENCAP_TYPE={0x6, 0x15, 0x3}, @RTA_ENCAP={0x14, 0x16, 0x0, 0x1, @SEG6_IPTUNNEL_SRH={0xd}}]}, 0x38}}, 0x0) recvfrom(0xffffffffffffffff, &(0x7f0000000600)=""/203, 0xcb, 0x42, &(0x7f0000000700)=@hci={0x1f, 0xffffffffffffffff, 0x4}, 0x80) 10:17:51 executing program 0: r0 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) syz_genetlink_get_family_id$tipc(&(0x7f0000000540), r0) 10:17:51 executing program 3: prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f00000002c0)=0x0) sched_setscheduler(r0, 0x2, &(0x7f0000000080)=0x6) getpid() socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r1, &(0x7f000057eff8)=@abs, 0x6e) sendmmsg$unix(r2, &(0x7f00000bd000), 0x318, 0x0) recvmmsg(r1, &(0x7f00000000c0), 0x10106, 0x2, 0x0) syz_mount_image$ext4(&(0x7f0000000180)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xfffbffff00000000, 0x8, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000600100000f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000006856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010300), 0x0, 0x640}, {&(0x7f0000010400)="03000000040000000500000016000f000300040000000000000000000f00698c", 0x20, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}, {&(0x7f0000011000)}, {0x0, 0x0, 0x6700000}, {&(0x7f0000000580), 0x0, 0xc000}], 0x0, &(0x7f0000013b00)=ANY=[@ANYBLOB='\x00']) r3 = creat(&(0x7f0000000000)='./file1\x00', 0x18) socket(0x10, 0x3, 0x0) r4 = socket(0x26, 0x3, 0x0) sendmsg$nl_route(r4, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f00000005c0)=@ipv4_newroute={0x38, 0x18, 0xbad, 0x0, 0x0, {0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6}, [@RTA_ENCAP_TYPE={0x6, 0x15, 0x3}, @RTA_ENCAP={0x14, 0x16, 0x0, 0x1, @SEG6_IPTUNNEL_SRH={0xd}}]}, 0x38}}, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f00000005c0)=@ipv4_newroute={0x38, 0x18, 0xbad, 0x0, 0x0, {0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6}, [@RTA_ENCAP_TYPE={0x6, 0x15, 0x3}, @RTA_ENCAP={0x14, 0x16, 0x0, 0x1, @SEG6_IPTUNNEL_SRH={0xd}}]}, 0x38}}, 0x0) execveat(r3, 0x0, &(0x7f0000000380)=[&(0x7f00000001c0)='+{!#\x00', &(0x7f0000000300)='ext4\x00', &(0x7f0000000340)='@(\x00'], &(0x7f00000004c0)=[&(0x7f00000003c0)='ext4\x00', &(0x7f0000000400)='ext4\x00', &(0x7f0000000500)='\x00.D\x04\xe0\xce\x99\xd9\xa9\xac\xac\xadH\xa4\xcf\xb7\xffT\xac\x05\xfd\xdd\xb8w\x0f\x82B\xff\xf2\x909`1!\f\x870\x1f\xc1%Y\xc8\x15c \xea\x1cY!\x04\xe4\x91^\x00\x04\xe4\xa6\xba\xc6\xfd\x10\xdf\xe24\xd4&\x17\xdc\xec\xf4\f\n\xb7.\x13\x8e\x1bYENj\xe1\x19~\x1c\xaf\a;d\x9f\xba\xd9T\xd4-\xecX\xc0Y\x83@\xc7\x8b\xff*\xdd\xaa\xc6,o4\xe2\x0f\x16\x01[\xc0\xeb\x7fFI]WF\x1f\f?\xfa\xb1\xe7\xf6t\x027\xb1\xc17.4V\xf81{9\xa3\xb9\x01\xcck@I\xe2\xf1Y\x10E\xa1z/\x05.~Yh%\x8f\x06sB)N\x11P\xf6p\xff\'\xaf\a7\x10+p\xbb\xf3\xb08\xb5)\x00\xeeg\xd0\xee\xe9\x98\x8d\xf8\xb5G\t@f\x1et v\x14\tT\xc5', 0x0], 0x1000) 10:17:51 executing program 1: r0 = socket$inet(0x2, 0x2, 0x0) sendmsg$inet_sctp(r0, &(0x7f0000000200)={&(0x7f0000000040)=@in6={0xa, 0x0, 0x0, @mcast2}, 0x1c, 0x0, 0x2}, 0x0) 10:17:51 executing program 1: pipe2$9p(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$P9_RWALK(r0, &(0x7f0000000040)=ANY=[], 0x64) 10:17:51 executing program 0: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) getsockopt$inet6_int(r0, 0x29, 0x5, 0x0, &(0x7f00000000c0)) 10:17:51 executing program 1: waitid$P_PIDFD(0x3, 0xffffffffffffffff, &(0x7f00000000c0), 0x8, 0x0) 10:17:51 executing program 1: openat$vcsa(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) getresgid(&(0x7f0000000180), &(0x7f00000001c0), &(0x7f0000000200)) 10:17:51 executing program 4: mq_open(&(0x7f0000000040)='\\\x00', 0x0, 0x0, &(0x7f0000000080)) [ 2370.957311][T26413] loop2: detected capacity change from 0 to 264192 [ 2370.969502][T26414] FAT-fs (loop4): bogus number of reserved sectors [ 2370.976058][T26414] FAT-fs (loop4): Can't find a valid FAT filesystem [ 2370.993399][T26413] EXT4-fs (loop2): mounted filesystem without journal. Quota mode: writeback. [ 2371.073383][T26431] loop3: detected capacity change from 0 to 264192 [ 2371.137589][T26431] EXT4-fs (loop3): mounted filesystem without journal. Quota mode: writeback. 10:17:57 executing program 5: socket$inet(0x2, 0x0, 0x8001) 10:17:57 executing program 0: r0 = socket$inet(0x2, 0x2, 0x0) sendmsg$inet_sctp(r0, &(0x7f0000000200)={&(0x7f0000000040)=@in6={0xa, 0x0, 0x0, @mcast2}, 0x2, 0x0}, 0x0) 10:17:57 executing program 2: prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f00000002c0)=0x0) sched_setscheduler(r0, 0x2, &(0x7f0000000080)=0x6) r1 = getpid() sched_setscheduler(r1, 0x2, &(0x7f00000000c0)=0x4) connect$unix(0xffffffffffffffff, &(0x7f000057eff8)=@abs, 0x6e) recvmmsg(0xffffffffffffffff, &(0x7f00000000c0), 0x10106, 0x2, 0x0) syz_mount_image$ext4(&(0x7f0000000180)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xfffbffff00000000, 0x8, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000600100000f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000006856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010300), 0x0, 0x640}, {&(0x7f0000010400)="03000000040000000500000016000f000300040000000000000000000f00698c", 0x20, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}, {&(0x7f0000011000)}, {0x0, 0x0, 0x6700000}, {&(0x7f0000000580), 0x0, 0xc000}], 0x0, &(0x7f0000013b00)=ANY=[@ANYBLOB='\x00']) r2 = socket(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f00000005c0)=@ipv4_newroute={0x38, 0x18, 0xbad, 0x0, 0x0, {}, [@RTA_ENCAP_TYPE={0x6, 0x15, 0x3}, @RTA_ENCAP={0x14, 0x16, 0x0, 0x1, @SEG6_IPTUNNEL_SRH={0xd}}]}, 0x38}}, 0x0) r3 = socket(0x26, 0x3, 0x0) sendmsg$nl_route(r3, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f00000005c0)=@ipv4_newroute={0x38, 0x18, 0xbad, 0x0, 0x0, {0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6}, [@RTA_ENCAP_TYPE={0x6, 0x15, 0x3}, @RTA_ENCAP={0x14, 0x16, 0x0, 0x1, @SEG6_IPTUNNEL_SRH={0xd}}]}, 0x38}}, 0x0) r4 = socket(0x10, 0x0, 0x0) sendmsg$nl_route(r4, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f00000005c0)=@ipv4_newroute={0x38, 0x18, 0xbad, 0x0, 0x0, {0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6}, [@RTA_ENCAP_TYPE={0x6, 0x15, 0x3}, @RTA_ENCAP={0x14, 0x16, 0x0, 0x1, @SEG6_IPTUNNEL_SRH={0xd}}]}, 0x38}}, 0x0) recvfrom(0xffffffffffffffff, &(0x7f0000000600)=""/203, 0xcb, 0x42, &(0x7f0000000700)=@hci={0x1f, 0xffffffffffffffff, 0x4}, 0x80) 10:17:57 executing program 1: socket(0x10, 0x2, 0x5) getsockname$netlink(0xffffffffffffffff, &(0x7f0000000200), 0x0) ioctl$BTRFS_IOC_START_SYNC(0xffffffffffffffff, 0x80089418, 0x0) 10:17:57 executing program 4: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_inet6_SIOCADDRT(r0, 0x890b, &(0x7f0000000040)={@private2, @private1, @empty, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc0120000}) 10:17:57 executing program 3: prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f00000002c0)=0x0) sched_setscheduler(r0, 0x2, &(0x7f0000000080)=0x6) getpid() socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r1, &(0x7f000057eff8)=@abs, 0x6e) sendmmsg$unix(r2, &(0x7f00000bd000), 0x318, 0x0) recvmmsg(r1, &(0x7f00000000c0), 0x10106, 0x2, 0x0) syz_mount_image$ext4(&(0x7f0000000180)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xfffbffff00000000, 0x8, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000600100000f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000006856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010300), 0x0, 0x640}, {&(0x7f0000010400)="03000000040000000500000016000f000300040000000000000000000f00698c", 0x20, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}, {&(0x7f0000011000)}, {0x0, 0x0, 0x6700000}, {&(0x7f0000000580), 0x0, 0xc000}], 0x0, &(0x7f0000013b00)=ANY=[@ANYBLOB='\x00']) r3 = creat(&(0x7f0000000000)='./file1\x00', 0x18) socket(0x10, 0x3, 0x0) r4 = socket(0x26, 0x3, 0x0) sendmsg$nl_route(r4, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f00000005c0)=@ipv4_newroute={0x38, 0x18, 0xbad, 0x0, 0x0, {0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6}, [@RTA_ENCAP_TYPE={0x6, 0x15, 0x3}, @RTA_ENCAP={0x14, 0x16, 0x0, 0x1, @SEG6_IPTUNNEL_SRH={0xd}}]}, 0x38}}, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f00000005c0)=@ipv4_newroute={0x38, 0x18, 0xbad, 0x0, 0x0, {0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6}, [@RTA_ENCAP_TYPE={0x6, 0x15, 0x3}, @RTA_ENCAP={0x14, 0x16, 0x0, 0x1, @SEG6_IPTUNNEL_SRH={0xd}}]}, 0x38}}, 0x0) execveat(r3, 0x0, &(0x7f0000000380)=[&(0x7f00000001c0)='+{!#\x00', &(0x7f0000000300)='ext4\x00', &(0x7f0000000340)='@(\x00'], &(0x7f00000004c0)=[&(0x7f00000003c0)='ext4\x00', &(0x7f0000000400)='ext4\x00', &(0x7f0000000500)='\x00.D\x04\xe0\xce\x99\xd9\xa9\xac\xac\xadH\xa4\xcf\xb7\xffT\xac\x05\xfd\xdd\xb8w\x0f\x82B\xff\xf2\x909`1!\f\x870\x1f\xc1%Y\xc8\x15c \xea\x1cY!\x04\xe4\x91^\x00\x04\xe4\xa6\xba\xc6\xfd\x10\xdf\xe24\xd4&\x17\xdc\xec\xf4\f\n\xb7.\x13\x8e\x1bYENj\xe1\x19~\x1c\xaf\a;d\x9f\xba\xd9T\xd4-\xecX\xc0Y\x83@\xc7\x8b\xff*\xdd\xaa\xc6,o4\xe2\x0f\x16\x01[\xc0\xeb\x7fFI]WF\x1f\f?\xfa\xb1\xe7\xf6t\x027\xb1\xc17.4V\xf81{9\xa3\xb9\x01\xcck@I\xe2\xf1Y\x10E\xa1z/\x05.~Yh%\x8f\x06sB)N\x11P\xf6p\xff\'\xaf\a7\x10+p\xbb\xf3\xb08\xb5)\x00\xeeg\xd0\xee\xe9\x98\x8d\xf8\xb5G\t@f\x1et v\x14\tT\xc5', 0x0], 0x1000) 10:17:57 executing program 0: pipe2$9p(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$P9_RREADDIR(r0, &(0x7f0000000080)={0xb}, 0xb) 10:17:57 executing program 4: bpf$BPF_RAW_TRACEPOINT_OPEN_UNNAMED(0x11, &(0x7f00000000c0), 0x10) 10:17:57 executing program 0: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) setsockopt$inet6_IPV6_HOPOPTS(r0, 0x29, 0x3b, &(0x7f0000000000), 0x8) 10:17:57 executing program 4: r0 = socket$inet(0x2, 0x2, 0x0) sendmsg$inet_sctp(r0, &(0x7f0000000200)={&(0x7f0000000040)=@in6={0xa, 0x0, 0x0, @mcast2}, 0x1c, 0x0, 0x0, 0x0, 0xfe5e0000}, 0x0) 10:17:57 executing program 2: prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f00000002c0)=0x0) sched_setscheduler(r0, 0x2, &(0x7f0000000080)=0x6) getpid() socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff}) connect$unix(r1, &(0x7f000057eff8)=@abs, 0x6e) recvmmsg(r1, &(0x7f00000000c0), 0x10106, 0x2, 0x0) syz_mount_image$ext4(&(0x7f0000000180)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xfffbffff00000000, 0x8, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000600100000f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000006856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010300), 0x0, 0x640}, {&(0x7f0000010400)="03000000040000000500000016000f000300040000000000000000000f00698c", 0x20, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}, {&(0x7f0000011000)}, {0x0, 0x0, 0x6700000}, {&(0x7f0000000580), 0x0, 0xc000}], 0x0, &(0x7f0000013b00)=ANY=[@ANYBLOB='\x00']) r2 = socket(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f00000005c0)=@ipv4_newroute={0x38, 0x18, 0xbad, 0x0, 0x0, {}, [@RTA_ENCAP_TYPE={0x6, 0x15, 0x3}, @RTA_ENCAP={0x14, 0x16, 0x0, 0x1, @SEG6_IPTUNNEL_SRH={0xd}}]}, 0x38}}, 0x0) r3 = socket(0x26, 0x3, 0x0) sendmsg$nl_route(r3, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f00000005c0)=@ipv4_newroute={0x38, 0x18, 0xbad, 0x0, 0x0, {0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6}, [@RTA_ENCAP_TYPE={0x6, 0x15, 0x3}, @RTA_ENCAP={0x14, 0x16, 0x0, 0x1, @SEG6_IPTUNNEL_SRH={0xd}}]}, 0x38}}, 0x0) r4 = socket(0x10, 0x0, 0x0) sendmsg$nl_route(r4, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f00000005c0)=@ipv4_newroute={0x38, 0x18, 0xbad, 0x0, 0x0, {0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6}, [@RTA_ENCAP_TYPE={0x6, 0x15, 0x3}, @RTA_ENCAP={0x14, 0x16, 0x0, 0x1, @SEG6_IPTUNNEL_SRH={0xd}}]}, 0x38}}, 0x0) recvfrom(r1, &(0x7f0000000600)=""/203, 0xcb, 0x42, &(0x7f0000000700)=@hci={0x1f, 0xffffffffffffffff, 0x4}, 0x80) [ 2377.142036][T26443] loop2: detected capacity change from 0 to 264192 [ 2377.170291][T26443] EXT4-fs (loop2): mounted filesystem without journal. Quota mode: writeback. 10:17:57 executing program 1: sendmsg$L2TP_CMD_TUNNEL_MODIFY(0xffffffffffffffff, 0x0, 0x0) write$cgroup_freezer_state(0xffffffffffffffff, 0x0, 0x0) syz_open_procfs$namespace(0x0, &(0x7f00000008c0)='ns/uts\x00') [ 2377.265372][T26470] loop3: detected capacity change from 0 to 264192 [ 2377.300713][T26470] EXT4-fs (loop3): mounted filesystem without journal. Quota mode: writeback. [ 2377.316270][T26472] loop2: detected capacity change from 0 to 264192 [ 2377.349739][T26472] EXT4-fs (loop2): mounted filesystem without journal. Quota mode: writeback. 10:18:01 executing program 5: bpf$MAP_CREATE(0x3, &(0x7f0000000040)=@base={0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x48) 10:18:01 executing program 0: socketpair(0x28, 0x5, 0x28, &(0x7f0000000040)) 10:18:01 executing program 4: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_inet6_SIOCADDRT(r0, 0x890b, &(0x7f0000000040)={@ipv4={'\x00', '\xff\xff', @dev}, @private1, @loopback}) 10:18:01 executing program 1: r0 = socket$inet(0x2, 0x2, 0x0) sendmsg$inet_sctp(r0, 0x0, 0x0) 10:18:01 executing program 2: prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f00000002c0)=0x0) sched_setscheduler(r0, 0x2, &(0x7f0000000080)=0x6) getpid() socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff}) connect$unix(r1, &(0x7f000057eff8)=@abs, 0x6e) recvmmsg(r1, &(0x7f00000000c0), 0x10106, 0x2, 0x0) syz_mount_image$ext4(&(0x7f0000000180)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xfffbffff00000000, 0x8, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000600100000f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000006856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010300), 0x0, 0x640}, {&(0x7f0000010400)="03000000040000000500000016000f000300040000000000000000000f00698c", 0x20, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}, {&(0x7f0000011000)}, {0x0, 0x0, 0x6700000}, {&(0x7f0000000580), 0x0, 0xc000}], 0x0, &(0x7f0000013b00)=ANY=[@ANYBLOB='\x00']) r2 = socket(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f00000005c0)=@ipv4_newroute={0x38, 0x18, 0xbad, 0x0, 0x0, {}, [@RTA_ENCAP_TYPE={0x6, 0x15, 0x3}, @RTA_ENCAP={0x14, 0x16, 0x0, 0x1, @SEG6_IPTUNNEL_SRH={0xd}}]}, 0x38}}, 0x0) r3 = socket(0x26, 0x3, 0x0) sendmsg$nl_route(r3, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f00000005c0)=@ipv4_newroute={0x38, 0x18, 0xbad, 0x0, 0x0, {0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6}, [@RTA_ENCAP_TYPE={0x6, 0x15, 0x3}, @RTA_ENCAP={0x14, 0x16, 0x0, 0x1, @SEG6_IPTUNNEL_SRH={0xd}}]}, 0x38}}, 0x0) r4 = socket(0x10, 0x0, 0x0) sendmsg$nl_route(r4, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f00000005c0)=@ipv4_newroute={0x38, 0x18, 0xbad, 0x0, 0x0, {0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6}, [@RTA_ENCAP_TYPE={0x6, 0x15, 0x3}, @RTA_ENCAP={0x14, 0x16, 0x0, 0x1, @SEG6_IPTUNNEL_SRH={0xd}}]}, 0x38}}, 0x0) recvfrom(r1, &(0x7f0000000600)=""/203, 0xcb, 0x42, &(0x7f0000000700)=@hci={0x1f, 0xffffffffffffffff, 0x4}, 0x80) 10:18:01 executing program 3: prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f00000002c0)=0x0) sched_setscheduler(r0, 0x2, &(0x7f0000000080)=0x6) sched_setscheduler(0x0, 0x2, &(0x7f00000000c0)=0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r1, &(0x7f000057eff8)=@abs, 0x6e) sendmmsg$unix(r2, &(0x7f00000bd000), 0x318, 0x0) recvmmsg(r1, &(0x7f00000000c0), 0x10106, 0x2, 0x0) syz_mount_image$ext4(&(0x7f0000000180)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xfffbffff00000000, 0x8, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000600100000f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000006856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010300), 0x0, 0x640}, {&(0x7f0000010400)="03000000040000000500000016000f000300040000000000000000000f00698c", 0x20, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}, {&(0x7f0000011000)}, {0x0, 0x0, 0x6700000}, {&(0x7f0000000580), 0x0, 0xc000}], 0x0, &(0x7f0000013b00)=ANY=[@ANYBLOB='\x00']) r3 = creat(&(0x7f0000000000)='./file1\x00', 0x18) socket(0x10, 0x3, 0x0) r4 = socket(0x26, 0x3, 0x0) sendmsg$nl_route(r4, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f00000005c0)=@ipv4_newroute={0x38, 0x18, 0xbad, 0x0, 0x0, {0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6}, [@RTA_ENCAP_TYPE={0x6, 0x15, 0x3}, @RTA_ENCAP={0x14, 0x16, 0x0, 0x1, @SEG6_IPTUNNEL_SRH={0xd}}]}, 0x38}}, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f00000005c0)=@ipv4_newroute={0x38, 0x18, 0xbad, 0x0, 0x0, {0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6}, [@RTA_ENCAP_TYPE={0x6, 0x15, 0x3}, @RTA_ENCAP={0x14, 0x16, 0x0, 0x1, @SEG6_IPTUNNEL_SRH={0xd}}]}, 0x38}}, 0x0) execveat(r3, 0x0, &(0x7f0000000380)=[&(0x7f00000001c0)='+{!#\x00', &(0x7f0000000300)='ext4\x00', &(0x7f0000000340)='@(\x00'], &(0x7f00000004c0)=[&(0x7f00000003c0)='ext4\x00', &(0x7f0000000400)='ext4\x00', &(0x7f0000000500)='\x00.D\x04\xe0\xce\x99\xd9\xa9\xac\xac\xadH\xa4\xcf\xb7\xffT\xac\x05\xfd\xdd\xb8w\x0f\x82B\xff\xf2\x909`1!\f\x870\x1f\xc1%Y\xc8\x15c \xea\x1cY!\x04\xe4\x91^\x00\x04\xe4\xa6\xba\xc6\xfd\x10\xdf\xe24\xd4&\x17\xdc\xec\xf4\f\n\xb7.\x13\x8e\x1bYENj\xe1\x19~\x1c\xaf\a;d\x9f\xba\xd9T\xd4-\xecX\xc0Y\x83@\xc7\x8b\xff*\xdd\xaa\xc6,o4\xe2\x0f\x16\x01[\xc0\xeb\x7fFI]WF\x1f\f?\xfa\xb1\xe7\xf6t\x027\xb1\xc17.4V\xf81{9\xa3\xb9\x01\xcck@I\xe2\xf1Y\x10E\xa1z/\x05.~Yh%\x8f\x06sB)N\x11P\xf6p\xff\'\xaf\a7\x10+p\xbb\xf3\xb08\xb5)\x00\xeeg\xd0\xee\xe9\x98\x8d\xf8\xb5G\t@f\x1et v\x14\tT\xc5', 0x0], 0x1000) 10:18:01 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$L2TP_CMD_NOOP(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000080)={0x24, r1, 0x1, 0x0, 0x0, {}, [@L2TP_ATTR_VLAN_ID={0x6}, @L2TP_ATTR_OFFSET={0x6}]}, 0x24}}, 0x0) 10:18:01 executing program 1: socketpair(0x3, 0x0, 0x101, &(0x7f0000000340)) 10:18:01 executing program 0: r0 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_ipv6_tunnel_SIOCDEL6RD(r0, 0x89fa, &(0x7f0000000200)={'syztnl1\x00', 0x0}) 10:18:01 executing program 4: openat$vcsa(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) getresgid(&(0x7f0000000180), &(0x7f00000001c0), 0x0) 10:18:01 executing program 1: tkill(0xffffffffffffffff, 0x0) 10:18:01 executing program 0: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_inet6_SIOCADDRT(r0, 0x89a0, &(0x7f0000000040)={@private2, @private1, @empty}) 10:18:01 executing program 4: syz_clone(0x8200800, 0x0, 0x0, 0x0, 0x0, 0x0) [ 2381.369997][T26502] loop2: detected capacity change from 0 to 264192 [ 2381.408863][T26506] loop3: detected capacity change from 0 to 264192 [ 2381.476416][T26502] EXT4-fs (loop2): mounted filesystem without journal. Quota mode: writeback. [ 2381.476923][T26506] EXT4-fs (loop3): mounted filesystem without journal. Quota mode: writeback. 10:18:08 executing program 5: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) getsockopt$inet6_int(r0, 0x29, 0x3a, 0x0, &(0x7f0000000100)) 10:18:08 executing program 1: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) setsockopt$inet6_buf(r0, 0x29, 0x22, &(0x7f0000000000), 0x0) 10:18:08 executing program 0: r0 = socket$inet(0x2, 0x2, 0x0) ioctl$sock_inet_sctp_SIOCINQ(r0, 0x541b, &(0x7f0000000080)) 10:18:08 executing program 4: openat$binderfs(0xffffffffffffff9c, &(0x7f0000003880)='./binderfs/binder0\x00', 0x0, 0x0) 10:18:08 executing program 3: prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f00000002c0)=0x0) sched_setscheduler(r0, 0x2, &(0x7f0000000080)=0x6) sched_setscheduler(0x0, 0x2, &(0x7f00000000c0)=0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r1, &(0x7f000057eff8)=@abs, 0x6e) sendmmsg$unix(r2, &(0x7f00000bd000), 0x318, 0x0) recvmmsg(r1, &(0x7f00000000c0), 0x10106, 0x2, 0x0) syz_mount_image$ext4(&(0x7f0000000180)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xfffbffff00000000, 0x8, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000600100000f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000006856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010300), 0x0, 0x640}, {&(0x7f0000010400)="03000000040000000500000016000f000300040000000000000000000f00698c", 0x20, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}, {&(0x7f0000011000)}, {0x0, 0x0, 0x6700000}, {&(0x7f0000000580), 0x0, 0xc000}], 0x0, &(0x7f0000013b00)=ANY=[@ANYBLOB='\x00']) r3 = creat(&(0x7f0000000000)='./file1\x00', 0x18) socket(0x10, 0x3, 0x0) r4 = socket(0x26, 0x3, 0x0) sendmsg$nl_route(r4, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f00000005c0)=@ipv4_newroute={0x38, 0x18, 0xbad, 0x0, 0x0, {0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6}, [@RTA_ENCAP_TYPE={0x6, 0x15, 0x3}, @RTA_ENCAP={0x14, 0x16, 0x0, 0x1, @SEG6_IPTUNNEL_SRH={0xd}}]}, 0x38}}, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f00000005c0)=@ipv4_newroute={0x38, 0x18, 0xbad, 0x0, 0x0, {0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6}, [@RTA_ENCAP_TYPE={0x6, 0x15, 0x3}, @RTA_ENCAP={0x14, 0x16, 0x0, 0x1, @SEG6_IPTUNNEL_SRH={0xd}}]}, 0x38}}, 0x0) execveat(r3, 0x0, &(0x7f0000000380)=[&(0x7f00000001c0)='+{!#\x00', &(0x7f0000000300)='ext4\x00', &(0x7f0000000340)='@(\x00'], &(0x7f00000004c0)=[&(0x7f00000003c0)='ext4\x00', &(0x7f0000000400)='ext4\x00', &(0x7f0000000500)='\x00.D\x04\xe0\xce\x99\xd9\xa9\xac\xac\xadH\xa4\xcf\xb7\xffT\xac\x05\xfd\xdd\xb8w\x0f\x82B\xff\xf2\x909`1!\f\x870\x1f\xc1%Y\xc8\x15c \xea\x1cY!\x04\xe4\x91^\x00\x04\xe4\xa6\xba\xc6\xfd\x10\xdf\xe24\xd4&\x17\xdc\xec\xf4\f\n\xb7.\x13\x8e\x1bYENj\xe1\x19~\x1c\xaf\a;d\x9f\xba\xd9T\xd4-\xecX\xc0Y\x83@\xc7\x8b\xff*\xdd\xaa\xc6,o4\xe2\x0f\x16\x01[\xc0\xeb\x7fFI]WF\x1f\f?\xfa\xb1\xe7\xf6t\x027\xb1\xc17.4V\xf81{9\xa3\xb9\x01\xcck@I\xe2\xf1Y\x10E\xa1z/\x05.~Yh%\x8f\x06sB)N\x11P\xf6p\xff\'\xaf\a7\x10+p\xbb\xf3\xb08\xb5)\x00\xeeg\xd0\xee\xe9\x98\x8d\xf8\xb5G\t@f\x1et v\x14\tT\xc5', 0x0], 0x1000) 10:18:08 executing program 2: prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f00000002c0)=0x0) sched_setscheduler(r0, 0x2, &(0x7f0000000080)=0x6) getpid() socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff}) connect$unix(r1, &(0x7f000057eff8)=@abs, 0x6e) recvmmsg(r1, &(0x7f00000000c0), 0x10106, 0x2, 0x0) syz_mount_image$ext4(&(0x7f0000000180)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xfffbffff00000000, 0x8, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000600100000f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000006856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010300), 0x0, 0x640}, {&(0x7f0000010400)="03000000040000000500000016000f000300040000000000000000000f00698c", 0x20, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}, {&(0x7f0000011000)}, {0x0, 0x0, 0x6700000}, {&(0x7f0000000580), 0x0, 0xc000}], 0x0, &(0x7f0000013b00)=ANY=[@ANYBLOB='\x00']) r2 = socket(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f00000005c0)=@ipv4_newroute={0x38, 0x18, 0xbad, 0x0, 0x0, {}, [@RTA_ENCAP_TYPE={0x6, 0x15, 0x3}, @RTA_ENCAP={0x14, 0x16, 0x0, 0x1, @SEG6_IPTUNNEL_SRH={0xd}}]}, 0x38}}, 0x0) r3 = socket(0x26, 0x3, 0x0) sendmsg$nl_route(r3, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f00000005c0)=@ipv4_newroute={0x38, 0x18, 0xbad, 0x0, 0x0, {0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6}, [@RTA_ENCAP_TYPE={0x6, 0x15, 0x3}, @RTA_ENCAP={0x14, 0x16, 0x0, 0x1, @SEG6_IPTUNNEL_SRH={0xd}}]}, 0x38}}, 0x0) r4 = socket(0x10, 0x0, 0x0) sendmsg$nl_route(r4, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f00000005c0)=@ipv4_newroute={0x38, 0x18, 0xbad, 0x0, 0x0, {0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6}, [@RTA_ENCAP_TYPE={0x6, 0x15, 0x3}, @RTA_ENCAP={0x14, 0x16, 0x0, 0x1, @SEG6_IPTUNNEL_SRH={0xd}}]}, 0x38}}, 0x0) recvfrom(r1, &(0x7f0000000600)=""/203, 0xcb, 0x42, &(0x7f0000000700)=@hci={0x1f, 0xffffffffffffffff, 0x4}, 0x80) 10:18:08 executing program 4: bpf$MAP_CREATE(0x21, &(0x7f0000000040)=@base={0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x48) 10:18:08 executing program 0: sendmsg$L2TP_CMD_SESSION_MODIFY(0xffffffffffffffff, 0x0, 0x0) socket$nl_generic(0x10, 0x3, 0x10) process_madvise(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) syz_open_procfs$namespace(0x0, &(0x7f00000008c0)='ns/uts\x00') 10:18:08 executing program 1: r0 = socket$inet(0x2, 0xa, 0x0) sendmsg$inet_sctp(r0, &(0x7f00000001c0)={&(0x7f0000000080)=@in={0x2, 0x4e22, @remote}, 0x10, 0x0, 0x0, &(0x7f0000000240)=ANY=[], 0x70}, 0x0) 10:18:08 executing program 0: syz_io_uring_setup(0xe, &(0x7f0000000180), &(0x7f0000ff9000/0x3000)=nil, &(0x7f0000ffb000/0x2000)=nil, &(0x7f0000000100), &(0x7f0000000140)) 10:18:08 executing program 4: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_inet6_SIOCADDRT(r0, 0x890b, &(0x7f00000000c0)={@loopback, @mcast1, @private1, 0x0, 0x0, 0x9, 0x0, 0x0, 0x2040240}) 10:18:08 executing program 0: mq_timedsend(0xffffffffffffffff, 0x0, 0x0, 0xffffffff, 0x0) [ 2388.518100][T26541] loop2: detected capacity change from 0 to 264192 [ 2388.533359][T26541] EXT4-fs (loop2): mounted filesystem without journal. Quota mode: writeback. [ 2388.568584][T26545] loop3: detected capacity change from 0 to 264192 [ 2388.580539][T26545] EXT4-fs (loop3): mounted filesystem without journal. Quota mode: writeback. 10:18:15 executing program 5: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_inet6_SIOCADDRT(r0, 0x890b, &(0x7f0000000040)={@private2, @private1, @empty, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}) 10:18:15 executing program 1: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$SO_ATTACH_FILTER(r1, 0x1, 0x1a, &(0x7f0000ab9ff0)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x108}]}, 0x10) r2 = syz_open_procfs$namespace(0xffffffffffffffff, &(0x7f0000000000)='ns/time_for_children\x00') dup2(r2, r1) sendmmsg(r0, &(0x7f0000006340)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0) 10:18:15 executing program 4: r0 = socket$inet(0x2, 0x2, 0x0) sendmsg$inet_sctp(r0, &(0x7f0000000200)={&(0x7f0000000040)=@in6={0x2, 0x0, 0xffff0000, @mcast2}, 0x1c, 0x0}, 0x0) 10:18:15 executing program 0: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) getsockopt$inet6_int(r0, 0x29, 0x21, 0x0, &(0x7f0000000080)) 10:18:15 executing program 2: prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f00000002c0)=0x0) sched_setscheduler(r0, 0x2, &(0x7f0000000080)=0x6) sched_setscheduler(0x0, 0x2, &(0x7f00000000c0)=0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff}) connect$unix(r1, &(0x7f000057eff8)=@abs, 0x6e) recvmmsg(r1, &(0x7f00000000c0), 0x10106, 0x2, 0x0) syz_mount_image$ext4(&(0x7f0000000180)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xfffbffff00000000, 0x8, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000600100000f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000006856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010300), 0x0, 0x640}, {&(0x7f0000010400)="03000000040000000500000016000f000300040000000000000000000f00698c", 0x20, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}, {&(0x7f0000011000)}, {0x0, 0x0, 0x6700000}, {&(0x7f0000000580), 0x0, 0xc000}], 0x0, &(0x7f0000013b00)=ANY=[@ANYBLOB='\x00']) r2 = socket(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f00000005c0)=@ipv4_newroute={0x38, 0x18, 0xbad, 0x0, 0x0, {}, [@RTA_ENCAP_TYPE={0x6, 0x15, 0x3}, @RTA_ENCAP={0x14, 0x16, 0x0, 0x1, @SEG6_IPTUNNEL_SRH={0xd}}]}, 0x38}}, 0x0) r3 = socket(0x26, 0x3, 0x0) sendmsg$nl_route(r3, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f00000005c0)=@ipv4_newroute={0x38, 0x18, 0xbad, 0x0, 0x0, {0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6}, [@RTA_ENCAP_TYPE={0x6, 0x15, 0x3}, @RTA_ENCAP={0x14, 0x16, 0x0, 0x1, @SEG6_IPTUNNEL_SRH={0xd}}]}, 0x38}}, 0x0) r4 = socket(0x10, 0x0, 0x0) sendmsg$nl_route(r4, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f00000005c0)=@ipv4_newroute={0x38, 0x18, 0xbad, 0x0, 0x0, {0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6}, [@RTA_ENCAP_TYPE={0x6, 0x15, 0x3}, @RTA_ENCAP={0x14, 0x16, 0x0, 0x1, @SEG6_IPTUNNEL_SRH={0xd}}]}, 0x38}}, 0x0) recvfrom(r1, &(0x7f0000000600)=""/203, 0xcb, 0x42, &(0x7f0000000700)=@hci={0x1f, 0xffffffffffffffff, 0x4}, 0x80) 10:18:15 executing program 3: prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f00000002c0)=0x0) sched_setscheduler(r0, 0x2, &(0x7f0000000080)=0x6) sched_setscheduler(0x0, 0x2, &(0x7f00000000c0)=0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r1, &(0x7f000057eff8)=@abs, 0x6e) sendmmsg$unix(r2, &(0x7f00000bd000), 0x318, 0x0) recvmmsg(r1, &(0x7f00000000c0), 0x10106, 0x2, 0x0) syz_mount_image$ext4(&(0x7f0000000180)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xfffbffff00000000, 0x8, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000600100000f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000006856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010300), 0x0, 0x640}, {&(0x7f0000010400)="03000000040000000500000016000f000300040000000000000000000f00698c", 0x20, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}, {&(0x7f0000011000)}, {0x0, 0x0, 0x6700000}, {&(0x7f0000000580), 0x0, 0xc000}], 0x0, &(0x7f0000013b00)=ANY=[@ANYBLOB='\x00']) r3 = creat(&(0x7f0000000000)='./file1\x00', 0x18) socket(0x10, 0x3, 0x0) r4 = socket(0x26, 0x3, 0x0) sendmsg$nl_route(r4, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f00000005c0)=@ipv4_newroute={0x38, 0x18, 0xbad, 0x0, 0x0, {0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6}, [@RTA_ENCAP_TYPE={0x6, 0x15, 0x3}, @RTA_ENCAP={0x14, 0x16, 0x0, 0x1, @SEG6_IPTUNNEL_SRH={0xd}}]}, 0x38}}, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f00000005c0)=@ipv4_newroute={0x38, 0x18, 0xbad, 0x0, 0x0, {0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6}, [@RTA_ENCAP_TYPE={0x6, 0x15, 0x3}, @RTA_ENCAP={0x14, 0x16, 0x0, 0x1, @SEG6_IPTUNNEL_SRH={0xd}}]}, 0x38}}, 0x0) execveat(r3, 0x0, &(0x7f0000000380)=[&(0x7f00000001c0)='+{!#\x00', &(0x7f0000000300)='ext4\x00', &(0x7f0000000340)='@(\x00'], &(0x7f00000004c0)=[&(0x7f00000003c0)='ext4\x00', &(0x7f0000000400)='ext4\x00', &(0x7f0000000500)='\x00.D\x04\xe0\xce\x99\xd9\xa9\xac\xac\xadH\xa4\xcf\xb7\xffT\xac\x05\xfd\xdd\xb8w\x0f\x82B\xff\xf2\x909`1!\f\x870\x1f\xc1%Y\xc8\x15c \xea\x1cY!\x04\xe4\x91^\x00\x04\xe4\xa6\xba\xc6\xfd\x10\xdf\xe24\xd4&\x17\xdc\xec\xf4\f\n\xb7.\x13\x8e\x1bYENj\xe1\x19~\x1c\xaf\a;d\x9f\xba\xd9T\xd4-\xecX\xc0Y\x83@\xc7\x8b\xff*\xdd\xaa\xc6,o4\xe2\x0f\x16\x01[\xc0\xeb\x7fFI]WF\x1f\f?\xfa\xb1\xe7\xf6t\x027\xb1\xc17.4V\xf81{9\xa3\xb9\x01\xcck@I\xe2\xf1Y\x10E\xa1z/\x05.~Yh%\x8f\x06sB)N\x11P\xf6p\xff\'\xaf\a7\x10+p\xbb\xf3\xb08\xb5)\x00\xeeg\xd0\xee\xe9\x98\x8d\xf8\xb5G\t@f\x1et v\x14\tT\xc5', 0x0], 0x1000) 10:18:16 executing program 4: r0 = socket$can_bcm(0x1d, 0x2, 0x2) recvmsg$can_bcm(r0, &(0x7f0000000940)={&(0x7f00000003c0)=@ethernet={0x0, @broadcast}, 0x80, 0x0}, 0x0) 10:18:16 executing program 0: pipe2$9p(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$P9_RREADDIR(r0, &(0x7f0000000080)={0xb}, 0xb) write$P9_RLOPEN(r0, &(0x7f0000000040)={0x18}, 0x18) 10:18:16 executing program 1: openat$procfs(0xffffffffffffff9c, &(0x7f00000007c0)='/proc/sysvipc/shm\x00', 0x0, 0x0) 10:18:16 executing program 0: pipe2$9p(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$P9_RREADDIR(r0, &(0x7f0000000080)={0xb}, 0x2000008b) 10:18:16 executing program 1: pipe2$watch_queue(&(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}, 0x80) sendmsg$AUDIT_SIGNAL_INFO(r0, 0x0, 0x0) 10:18:16 executing program 1: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$L2TP_CMD_NOOP(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000240)={0x14}, 0x14}}, 0x0) syz_genetlink_get_family_id$l2tp(&(0x7f0000000940), 0xffffffffffffffff) [ 2395.643380][T26574] loop2: detected capacity change from 0 to 264192 [ 2395.693028][T26575] loop3: detected capacity change from 0 to 264192 [ 2395.723479][T26574] EXT4-fs (loop2): mounted filesystem without journal. Quota mode: writeback. [ 2395.729537][T26575] EXT4-fs (loop3): mounted filesystem without journal. Quota mode: writeback. 10:18:23 executing program 5: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_inet6_SIOCADDRT(r0, 0x8912, 0x0) 10:18:23 executing program 1: r0 = socket$xdp(0x2c, 0x3, 0x0) setsockopt$XDP_TX_RING(r0, 0x11b, 0x3, &(0x7f0000000040)=0x202020, 0x4) 10:18:23 executing program 2: prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f00000002c0)=0x0) sched_setscheduler(r0, 0x2, &(0x7f0000000080)=0x6) sched_setscheduler(0x0, 0x2, &(0x7f00000000c0)=0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff}) connect$unix(r1, &(0x7f000057eff8)=@abs, 0x6e) recvmmsg(r1, &(0x7f00000000c0), 0x10106, 0x2, 0x0) syz_mount_image$ext4(&(0x7f0000000180)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xfffbffff00000000, 0x8, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000600100000f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000006856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010300), 0x0, 0x640}, {&(0x7f0000010400)="03000000040000000500000016000f000300040000000000000000000f00698c", 0x20, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}, {&(0x7f0000011000)}, {0x0, 0x0, 0x6700000}, {&(0x7f0000000580), 0x0, 0xc000}], 0x0, &(0x7f0000013b00)=ANY=[@ANYBLOB='\x00']) r2 = socket(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f00000005c0)=@ipv4_newroute={0x38, 0x18, 0xbad, 0x0, 0x0, {}, [@RTA_ENCAP_TYPE={0x6, 0x15, 0x3}, @RTA_ENCAP={0x14, 0x16, 0x0, 0x1, @SEG6_IPTUNNEL_SRH={0xd}}]}, 0x38}}, 0x0) r3 = socket(0x26, 0x3, 0x0) sendmsg$nl_route(r3, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f00000005c0)=@ipv4_newroute={0x38, 0x18, 0xbad, 0x0, 0x0, {0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6}, [@RTA_ENCAP_TYPE={0x6, 0x15, 0x3}, @RTA_ENCAP={0x14, 0x16, 0x0, 0x1, @SEG6_IPTUNNEL_SRH={0xd}}]}, 0x38}}, 0x0) r4 = socket(0x10, 0x0, 0x0) sendmsg$nl_route(r4, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f00000005c0)=@ipv4_newroute={0x38, 0x18, 0xbad, 0x0, 0x0, {0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6}, [@RTA_ENCAP_TYPE={0x6, 0x15, 0x3}, @RTA_ENCAP={0x14, 0x16, 0x0, 0x1, @SEG6_IPTUNNEL_SRH={0xd}}]}, 0x38}}, 0x0) recvfrom(r1, &(0x7f0000000600)=""/203, 0xcb, 0x42, &(0x7f0000000700)=@hci={0x1f, 0xffffffffffffffff, 0x4}, 0x80) 10:18:23 executing program 3: prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f00000002c0)) r0 = getpid() sched_setscheduler(r0, 0x2, &(0x7f00000000c0)=0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r1, &(0x7f000057eff8)=@abs, 0x6e) sendmmsg$unix(r2, &(0x7f00000bd000), 0x318, 0x0) recvmmsg(r1, &(0x7f00000000c0), 0x10106, 0x2, 0x0) syz_mount_image$ext4(&(0x7f0000000180)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xfffbffff00000000, 0x8, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000600100000f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000006856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010300), 0x0, 0x640}, {&(0x7f0000010400)="03000000040000000500000016000f000300040000000000000000000f00698c", 0x20, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}, {&(0x7f0000011000)}, {0x0, 0x0, 0x6700000}, {&(0x7f0000000580), 0x0, 0xc000}], 0x0, &(0x7f0000013b00)=ANY=[@ANYBLOB='\x00']) r3 = creat(&(0x7f0000000000)='./file1\x00', 0x18) socket(0x10, 0x3, 0x0) r4 = socket(0x26, 0x3, 0x0) sendmsg$nl_route(r4, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f00000005c0)=@ipv4_newroute={0x38, 0x18, 0xbad, 0x0, 0x0, {0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6}, [@RTA_ENCAP_TYPE={0x6, 0x15, 0x3}, @RTA_ENCAP={0x14, 0x16, 0x0, 0x1, @SEG6_IPTUNNEL_SRH={0xd}}]}, 0x38}}, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f00000005c0)=@ipv4_newroute={0x38, 0x18, 0xbad, 0x0, 0x0, {0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6}, [@RTA_ENCAP_TYPE={0x6, 0x15, 0x3}, @RTA_ENCAP={0x14, 0x16, 0x0, 0x1, @SEG6_IPTUNNEL_SRH={0xd}}]}, 0x38}}, 0x0) execveat(r3, 0x0, &(0x7f0000000380)=[&(0x7f00000001c0)='+{!#\x00', &(0x7f0000000300)='ext4\x00', &(0x7f0000000340)='@(\x00'], &(0x7f00000004c0)=[&(0x7f00000003c0)='ext4\x00', &(0x7f0000000400)='ext4\x00', &(0x7f0000000500)='\x00.D\x04\xe0\xce\x99\xd9\xa9\xac\xac\xadH\xa4\xcf\xb7\xffT\xac\x05\xfd\xdd\xb8w\x0f\x82B\xff\xf2\x909`1!\f\x870\x1f\xc1%Y\xc8\x15c \xea\x1cY!\x04\xe4\x91^\x00\x04\xe4\xa6\xba\xc6\xfd\x10\xdf\xe24\xd4&\x17\xdc\xec\xf4\f\n\xb7.\x13\x8e\x1bYENj\xe1\x19~\x1c\xaf\a;d\x9f\xba\xd9T\xd4-\xecX\xc0Y\x83@\xc7\x8b\xff*\xdd\xaa\xc6,o4\xe2\x0f\x16\x01[\xc0\xeb\x7fFI]WF\x1f\f?\xfa\xb1\xe7\xf6t\x027\xb1\xc17.4V\xf81{9\xa3\xb9\x01\xcck@I\xe2\xf1Y\x10E\xa1z/\x05.~Yh%\x8f\x06sB)N\x11P\xf6p\xff\'\xaf\a7\x10+p\xbb\xf3\xb08\xb5)\x00\xeeg\xd0\xee\xe9\x98\x8d\xf8\xb5G\t@f\x1et v\x14\tT\xc5', 0x0], 0x1000) 10:18:23 executing program 4: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_inet6_SIOCADDRT(r0, 0x89a0, 0x0) 10:18:23 executing program 0: socket(0x2, 0x0, 0x3b9) 10:18:23 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NL80211_CMD_DEL_PMK(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000140)=ANY=[], 0x50}}, 0x0) 10:18:23 executing program 0: r0 = socket$xdp(0x2c, 0x3, 0x0) getsockopt$XDP_MMAP_OFFSETS(r0, 0x11b, 0x1, 0x0, &(0x7f00000012c0)) 10:18:23 executing program 1: r0 = socket$inet(0x2, 0xa, 0x0) sendmsg$inet_sctp(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)=[{0x0}], 0x1, 0x0, 0x70}, 0x0) 10:18:23 executing program 4: r0 = socket$inet(0x2, 0x2, 0x0) sendmsg$inet_sctp(r0, &(0x7f0000000500)={0x0, 0x0, 0x0}, 0x0) sendmsg$inet_sctp(r0, &(0x7f0000000200)={0x0, 0x0, 0x0}, 0x0) 10:18:23 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000400)={0x0, 0x0, &(0x7f00000003c0)={&(0x7f0000000540)=ANY=[@ANYBLOB="380000004800010526bd7000fddbdf250a001f00", @ANYRES32, @ANYBLOB="0700000014000100fe800000000000cb47ee0b78a8394afdb0"], 0x38}}, 0x0) 10:18:23 executing program 0: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000300)={0x3, 0x4, &(0x7f0000000000)=@framed={{}, [@call={0x85, 0x0, 0x0, 0xa}]}, &(0x7f0000000140)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) [ 2402.731342][ T24] audit: type=1400 audit(1649758703.146:452): avc: denied { getopt } for pid=26599 comm="syz-executor.0" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=xdp_socket permissive=1 [ 2402.794248][T26607] loop2: detected capacity change from 0 to 264192 [ 2402.810103][T26611] loop3: detected capacity change from 0 to 264192 [ 2402.870640][T26611] EXT4-fs (loop3): mounted filesystem without journal. Quota mode: writeback. [ 2402.891345][T26607] EXT4-fs (loop2): mounted filesystem without journal. Quota mode: writeback. 10:18:27 executing program 5: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000300)={0x3, 0x4, &(0x7f0000000000)=@framed={{}, [@call={0x85, 0x0, 0x0, 0xd}]}, &(0x7f0000000140)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 10:18:27 executing program 4: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x39, 0x0, 0x0) 10:18:27 executing program 0: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x1a, 0x0, 0x300) 10:18:27 executing program 1: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) setsockopt$inet6_icmp_ICMP_FILTER(r0, 0x1, 0x45, &(0x7f00000001c0), 0x4) 10:18:27 executing program 3: prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f00000002c0)) r0 = getpid() sched_setscheduler(r0, 0x2, &(0x7f00000000c0)=0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r1, &(0x7f000057eff8)=@abs, 0x6e) sendmmsg$unix(r2, &(0x7f00000bd000), 0x318, 0x0) recvmmsg(r1, &(0x7f00000000c0), 0x10106, 0x2, 0x0) syz_mount_image$ext4(&(0x7f0000000180)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xfffbffff00000000, 0x8, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000600100000f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000006856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010300), 0x0, 0x640}, {&(0x7f0000010400)="03000000040000000500000016000f000300040000000000000000000f00698c", 0x20, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}, {&(0x7f0000011000)}, {0x0, 0x0, 0x6700000}, {&(0x7f0000000580), 0x0, 0xc000}], 0x0, &(0x7f0000013b00)=ANY=[@ANYBLOB='\x00']) r3 = creat(&(0x7f0000000000)='./file1\x00', 0x18) socket(0x10, 0x3, 0x0) r4 = socket(0x26, 0x3, 0x0) sendmsg$nl_route(r4, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f00000005c0)=@ipv4_newroute={0x38, 0x18, 0xbad, 0x0, 0x0, {0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6}, [@RTA_ENCAP_TYPE={0x6, 0x15, 0x3}, @RTA_ENCAP={0x14, 0x16, 0x0, 0x1, @SEG6_IPTUNNEL_SRH={0xd}}]}, 0x38}}, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f00000005c0)=@ipv4_newroute={0x38, 0x18, 0xbad, 0x0, 0x0, {0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6}, [@RTA_ENCAP_TYPE={0x6, 0x15, 0x3}, @RTA_ENCAP={0x14, 0x16, 0x0, 0x1, @SEG6_IPTUNNEL_SRH={0xd}}]}, 0x38}}, 0x0) execveat(r3, 0x0, &(0x7f0000000380)=[&(0x7f00000001c0)='+{!#\x00', &(0x7f0000000300)='ext4\x00', &(0x7f0000000340)='@(\x00'], &(0x7f00000004c0)=[&(0x7f00000003c0)='ext4\x00', &(0x7f0000000400)='ext4\x00', &(0x7f0000000500)='\x00.D\x04\xe0\xce\x99\xd9\xa9\xac\xac\xadH\xa4\xcf\xb7\xffT\xac\x05\xfd\xdd\xb8w\x0f\x82B\xff\xf2\x909`1!\f\x870\x1f\xc1%Y\xc8\x15c \xea\x1cY!\x04\xe4\x91^\x00\x04\xe4\xa6\xba\xc6\xfd\x10\xdf\xe24\xd4&\x17\xdc\xec\xf4\f\n\xb7.\x13\x8e\x1bYENj\xe1\x19~\x1c\xaf\a;d\x9f\xba\xd9T\xd4-\xecX\xc0Y\x83@\xc7\x8b\xff*\xdd\xaa\xc6,o4\xe2\x0f\x16\x01[\xc0\xeb\x7fFI]WF\x1f\f?\xfa\xb1\xe7\xf6t\x027\xb1\xc17.4V\xf81{9\xa3\xb9\x01\xcck@I\xe2\xf1Y\x10E\xa1z/\x05.~Yh%\x8f\x06sB)N\x11P\xf6p\xff\'\xaf\a7\x10+p\xbb\xf3\xb08\xb5)\x00\xeeg\xd0\xee\xe9\x98\x8d\xf8\xb5G\t@f\x1et v\x14\tT\xc5', 0x0], 0x1000) 10:18:27 executing program 2: prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f00000002c0)=0x0) sched_setscheduler(r0, 0x2, &(0x7f0000000080)=0x6) sched_setscheduler(0x0, 0x2, &(0x7f00000000c0)=0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff}) connect$unix(r1, &(0x7f000057eff8)=@abs, 0x6e) recvmmsg(r1, &(0x7f00000000c0), 0x10106, 0x2, 0x0) syz_mount_image$ext4(&(0x7f0000000180)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xfffbffff00000000, 0x8, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000600100000f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000006856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010300), 0x0, 0x640}, {&(0x7f0000010400)="03000000040000000500000016000f000300040000000000000000000f00698c", 0x20, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}, {&(0x7f0000011000)}, {0x0, 0x0, 0x6700000}, {&(0x7f0000000580), 0x0, 0xc000}], 0x0, &(0x7f0000013b00)=ANY=[@ANYBLOB='\x00']) r2 = socket(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f00000005c0)=@ipv4_newroute={0x38, 0x18, 0xbad, 0x0, 0x0, {}, [@RTA_ENCAP_TYPE={0x6, 0x15, 0x3}, @RTA_ENCAP={0x14, 0x16, 0x0, 0x1, @SEG6_IPTUNNEL_SRH={0xd}}]}, 0x38}}, 0x0) r3 = socket(0x26, 0x3, 0x0) sendmsg$nl_route(r3, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f00000005c0)=@ipv4_newroute={0x38, 0x18, 0xbad, 0x0, 0x0, {0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6}, [@RTA_ENCAP_TYPE={0x6, 0x15, 0x3}, @RTA_ENCAP={0x14, 0x16, 0x0, 0x1, @SEG6_IPTUNNEL_SRH={0xd}}]}, 0x38}}, 0x0) r4 = socket(0x10, 0x0, 0x0) sendmsg$nl_route(r4, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f00000005c0)=@ipv4_newroute={0x38, 0x18, 0xbad, 0x0, 0x0, {0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6}, [@RTA_ENCAP_TYPE={0x6, 0x15, 0x3}, @RTA_ENCAP={0x14, 0x16, 0x0, 0x1, @SEG6_IPTUNNEL_SRH={0xd}}]}, 0x38}}, 0x0) recvfrom(r1, &(0x7f0000000600)=""/203, 0xcb, 0x42, &(0x7f0000000700)=@hci={0x1f, 0xffffffffffffffff, 0x4}, 0x80) 10:18:27 executing program 4: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) setsockopt$inet6_icmp_ICMP_FILTER(r0, 0x1, 0x23, &(0x7f00000001c0), 0x4) 10:18:27 executing program 0: r0 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_VERSION(r0, 0xc018939f, 0x0) 10:18:27 executing program 1: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$IPVS_CMD_NEW_DAEMON(r0, &(0x7f0000000bc0)={0x0, 0x0, &(0x7f0000000b80)={&(0x7f0000000b00)={0x14}, 0x14}}, 0x0) 10:18:27 executing program 4: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000300)={0xe, 0x4, &(0x7f0000000000)=@framed={{}, [@call={0x85, 0x0, 0x0, 0x6}]}, &(0x7f0000000140)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 10:18:27 executing program 1: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) setsockopt$inet6_icmp_ICMP_FILTER(r0, 0x1, 0x1b, &(0x7f00000001c0), 0x4) 10:18:27 executing program 0: r0 = socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$devlink(&(0x7f0000000300), r0) syz_genetlink_get_family_id$ipvs(&(0x7f0000000a40), 0xffffffffffffffff) [ 2406.972322][T26644] loop2: detected capacity change from 0 to 264192 [ 2407.010357][T26644] EXT4-fs (loop2): mounted filesystem without journal. Quota mode: writeback. [ 2407.023106][T26647] loop3: detected capacity change from 0 to 264192 [ 2407.048796][T26647] EXT4-fs (loop3): mounted filesystem without journal. Quota mode: writeback. 10:18:35 executing program 5: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x1600bd74, 0x0, 0x0) 10:18:35 executing program 4: keyctl$chown(0x2, 0x0, 0x0, 0x0) 10:18:35 executing program 1: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000300)={0x13, 0x4, &(0x7f0000000000)=@framed={{}, [@call={0x85, 0x0, 0x0, 0x88}]}, &(0x7f0000000140)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 10:18:35 executing program 0: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x4b, &(0x7f0000000200)=@filter={'filter\x00', 0xe, 0x4, 0x340, 0xffffffff, 0x0, 0x130, 0x0, 0xffffffff, 0xffffffff, 0x388, 0x388, 0x388, 0xffffffff, 0x4, 0x0, {[{{@ipv6={@empty, @private2, [], [], 'bond_slave_0\x00', 'macvlan1\x00'}, 0x0, 0xa8, 0xd0}, @REJECT={0x28}}, {{@ipv6={@remote, @mcast1, [], [], 'vcan0\x00', 'vcan0\x00'}, 0x0, 0xa8, 0xd0}, @common=@unspec=@NFQUEUE2={0x28}}, {{@uncond, 0x0, 0xa8, 0xd0}, @REJECT={0x28}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x3a0) 10:18:35 executing program 2: prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f00000002c0)) r0 = getpid() sched_setscheduler(r0, 0x2, &(0x7f00000000c0)=0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff}) connect$unix(r1, &(0x7f000057eff8)=@abs, 0x6e) recvmmsg(r1, &(0x7f00000000c0), 0x10106, 0x2, 0x0) syz_mount_image$ext4(&(0x7f0000000180)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xfffbffff00000000, 0x8, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000600100000f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000006856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010300), 0x0, 0x640}, {&(0x7f0000010400)="03000000040000000500000016000f000300040000000000000000000f00698c", 0x20, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}, {&(0x7f0000011000)}, {0x0, 0x0, 0x6700000}, {&(0x7f0000000580), 0x0, 0xc000}], 0x0, &(0x7f0000013b00)=ANY=[@ANYBLOB='\x00']) r2 = socket(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f00000005c0)=@ipv4_newroute={0x38, 0x18, 0xbad, 0x0, 0x0, {}, [@RTA_ENCAP_TYPE={0x6, 0x15, 0x3}, @RTA_ENCAP={0x14, 0x16, 0x0, 0x1, @SEG6_IPTUNNEL_SRH={0xd}}]}, 0x38}}, 0x0) r3 = socket(0x26, 0x3, 0x0) sendmsg$nl_route(r3, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f00000005c0)=@ipv4_newroute={0x38, 0x18, 0xbad, 0x0, 0x0, {0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6}, [@RTA_ENCAP_TYPE={0x6, 0x15, 0x3}, @RTA_ENCAP={0x14, 0x16, 0x0, 0x1, @SEG6_IPTUNNEL_SRH={0xd}}]}, 0x38}}, 0x0) r4 = socket(0x10, 0x0, 0x0) sendmsg$nl_route(r4, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f00000005c0)=@ipv4_newroute={0x38, 0x18, 0xbad, 0x0, 0x0, {0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6}, [@RTA_ENCAP_TYPE={0x6, 0x15, 0x3}, @RTA_ENCAP={0x14, 0x16, 0x0, 0x1, @SEG6_IPTUNNEL_SRH={0xd}}]}, 0x38}}, 0x0) recvfrom(r1, &(0x7f0000000600)=""/203, 0xcb, 0x42, &(0x7f0000000700)=@hci={0x1f, 0xffffffffffffffff, 0x4}, 0x80) 10:18:35 executing program 3: prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f00000002c0)) r0 = getpid() sched_setscheduler(r0, 0x2, &(0x7f00000000c0)=0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r1, &(0x7f000057eff8)=@abs, 0x6e) sendmmsg$unix(r2, &(0x7f00000bd000), 0x318, 0x0) recvmmsg(r1, &(0x7f00000000c0), 0x10106, 0x2, 0x0) syz_mount_image$ext4(&(0x7f0000000180)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xfffbffff00000000, 0x8, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000600100000f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000006856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010300), 0x0, 0x640}, {&(0x7f0000010400)="03000000040000000500000016000f000300040000000000000000000f00698c", 0x20, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}, {&(0x7f0000011000)}, {0x0, 0x0, 0x6700000}, {&(0x7f0000000580), 0x0, 0xc000}], 0x0, &(0x7f0000013b00)=ANY=[@ANYBLOB='\x00']) r3 = creat(&(0x7f0000000000)='./file1\x00', 0x18) socket(0x10, 0x3, 0x0) r4 = socket(0x26, 0x3, 0x0) sendmsg$nl_route(r4, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f00000005c0)=@ipv4_newroute={0x38, 0x18, 0xbad, 0x0, 0x0, {0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6}, [@RTA_ENCAP_TYPE={0x6, 0x15, 0x3}, @RTA_ENCAP={0x14, 0x16, 0x0, 0x1, @SEG6_IPTUNNEL_SRH={0xd}}]}, 0x38}}, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f00000005c0)=@ipv4_newroute={0x38, 0x18, 0xbad, 0x0, 0x0, {0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6}, [@RTA_ENCAP_TYPE={0x6, 0x15, 0x3}, @RTA_ENCAP={0x14, 0x16, 0x0, 0x1, @SEG6_IPTUNNEL_SRH={0xd}}]}, 0x38}}, 0x0) execveat(r3, 0x0, &(0x7f0000000380)=[&(0x7f00000001c0)='+{!#\x00', &(0x7f0000000300)='ext4\x00', &(0x7f0000000340)='@(\x00'], &(0x7f00000004c0)=[&(0x7f00000003c0)='ext4\x00', &(0x7f0000000400)='ext4\x00', &(0x7f0000000500)='\x00.D\x04\xe0\xce\x99\xd9\xa9\xac\xac\xadH\xa4\xcf\xb7\xffT\xac\x05\xfd\xdd\xb8w\x0f\x82B\xff\xf2\x909`1!\f\x870\x1f\xc1%Y\xc8\x15c \xea\x1cY!\x04\xe4\x91^\x00\x04\xe4\xa6\xba\xc6\xfd\x10\xdf\xe24\xd4&\x17\xdc\xec\xf4\f\n\xb7.\x13\x8e\x1bYENj\xe1\x19~\x1c\xaf\a;d\x9f\xba\xd9T\xd4-\xecX\xc0Y\x83@\xc7\x8b\xff*\xdd\xaa\xc6,o4\xe2\x0f\x16\x01[\xc0\xeb\x7fFI]WF\x1f\f?\xfa\xb1\xe7\xf6t\x027\xb1\xc17.4V\xf81{9\xa3\xb9\x01\xcck@I\xe2\xf1Y\x10E\xa1z/\x05.~Yh%\x8f\x06sB)N\x11P\xf6p\xff\'\xaf\a7\x10+p\xbb\xf3\xb08\xb5)\x00\xeeg\xd0\xee\xe9\x98\x8d\xf8\xb5G\t@f\x1et v\x14\tT\xc5', 0x0], 0x1000) 10:18:35 executing program 0: r0 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_VERSION(r0, 0x4020940d, 0x0) 10:18:35 executing program 1: socket$inet6_icmp_raw(0xa, 0x3, 0x3a) syz_io_uring_setup(0xb552, &(0x7f0000000240), &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000fed000/0x13000)=nil, 0x0, 0x0) syz_io_uring_submit(0x0, 0x0, 0x0, 0x2) syz_io_uring_setup(0x6f1c, &(0x7f0000000080)={0x0, 0x7e55, 0x4, 0x3}, &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000ffc000/0x4000)=nil, 0x0, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) socket$nl_rdma(0x10, 0x3, 0x14) accept$unix(0xffffffffffffffff, 0x0, 0x0) ioctl$ifreq_SIOCGIFINDEX_wireguard(0xffffffffffffffff, 0x8933, 0x0) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(0xffffffffffffffff, 0x89f2, 0x0) sendmsg$nl_route(r0, &(0x7f0000000400)={0x0, 0x0, &(0x7f00000003c0)={&(0x7f0000000540)=ANY=[@ANYBLOB="380000004800010526bd7000fddbdf250a001f00", @ANYRES32, @ANYBLOB="0700000014000100fe800000000000cb47ee0b78a8394afdb0e60000"], 0x38}}, 0x0) syz_io_uring_submit(0x0, 0x0, 0x0, 0x0) 10:18:35 executing program 4: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$inet6_IPV6_DSTOPTS(r0, 0x29, 0x3b, &(0x7f00000015c0), 0x8) setsockopt$inet6_IPV6_RTHDR(r0, 0x29, 0x39, 0x0, 0x0) 10:18:35 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, &(0x7f00000000c0), 0x0, &(0x7f0000000100)={[{@sb}], [{@fscontext={'fscontext', 0x3d, 'root'}}]}) 10:18:35 executing program 4: bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={0x0}, 0x10) 10:18:35 executing program 0: syz_genetlink_get_family_id$devlink(&(0x7f0000000180), 0xffffffffffffffff) [ 2415.268441][T26671] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.1'. [ 2415.290014][T26677] loop2: detected capacity change from 0 to 264192 [ 2415.305891][T26677] EXT4-fs (loop2): mounted filesystem without journal. Quota mode: writeback. [ 2415.339180][T26686] loop3: detected capacity change from 0 to 264192 [ 2415.408331][T26686] EXT4-fs (loop3): mounted filesystem without journal. Quota mode: writeback. 10:18:39 executing program 5: syz_genetlink_get_family_id$nl80211(&(0x7f0000000140), 0xffffffffffffffff) syz_open_dev$vcsu(&(0x7f00000003c0), 0x1, 0xc100) 10:18:39 executing program 4: select(0x40, &(0x7f0000000540)={0x2}, &(0x7f0000000580)={0x3}, 0x0, &(0x7f0000000640)) 10:18:39 executing program 1: socketpair(0x0, 0x80c, 0x0, &(0x7f00000003c0)) 10:18:39 executing program 0: io_setup(0x1, &(0x7f0000001100)=0x0) io_submit(r0, 0x1, &(0x7f0000001200)=[&(0x7f00000011c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0}]) r1 = inotify_init() io_submit(r0, 0x1, &(0x7f0000001400)=[&(0x7f0000000200)={0x0, 0x0, 0x0, 0x8, 0x0, r1, 0x0}]) 10:18:39 executing program 3: prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x2, &(0x7f0000000080)=0x6) r0 = getpid() sched_setscheduler(r0, 0x2, &(0x7f00000000c0)=0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r1, &(0x7f000057eff8)=@abs, 0x6e) sendmmsg$unix(r2, &(0x7f00000bd000), 0x318, 0x0) recvmmsg(r1, &(0x7f00000000c0), 0x10106, 0x2, 0x0) syz_mount_image$ext4(&(0x7f0000000180)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xfffbffff00000000, 0x8, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000600100000f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000006856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010300), 0x0, 0x640}, {&(0x7f0000010400)="03000000040000000500000016000f000300040000000000000000000f00698c", 0x20, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}, {&(0x7f0000011000)}, {0x0, 0x0, 0x6700000}, {&(0x7f0000000580), 0x0, 0xc000}], 0x0, &(0x7f0000013b00)=ANY=[@ANYBLOB='\x00']) r3 = creat(&(0x7f0000000000)='./file1\x00', 0x18) socket(0x10, 0x3, 0x0) r4 = socket(0x26, 0x3, 0x0) sendmsg$nl_route(r4, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f00000005c0)=@ipv4_newroute={0x38, 0x18, 0xbad, 0x0, 0x0, {0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6}, [@RTA_ENCAP_TYPE={0x6, 0x15, 0x3}, @RTA_ENCAP={0x14, 0x16, 0x0, 0x1, @SEG6_IPTUNNEL_SRH={0xd}}]}, 0x38}}, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f00000005c0)=@ipv4_newroute={0x38, 0x18, 0xbad, 0x0, 0x0, {0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6}, [@RTA_ENCAP_TYPE={0x6, 0x15, 0x3}, @RTA_ENCAP={0x14, 0x16, 0x0, 0x1, @SEG6_IPTUNNEL_SRH={0xd}}]}, 0x38}}, 0x0) execveat(r3, 0x0, &(0x7f0000000380)=[&(0x7f00000001c0)='+{!#\x00', &(0x7f0000000300)='ext4\x00', &(0x7f0000000340)='@(\x00'], &(0x7f00000004c0)=[&(0x7f00000003c0)='ext4\x00', &(0x7f0000000400)='ext4\x00', &(0x7f0000000500)='\x00.D\x04\xe0\xce\x99\xd9\xa9\xac\xac\xadH\xa4\xcf\xb7\xffT\xac\x05\xfd\xdd\xb8w\x0f\x82B\xff\xf2\x909`1!\f\x870\x1f\xc1%Y\xc8\x15c \xea\x1cY!\x04\xe4\x91^\x00\x04\xe4\xa6\xba\xc6\xfd\x10\xdf\xe24\xd4&\x17\xdc\xec\xf4\f\n\xb7.\x13\x8e\x1bYENj\xe1\x19~\x1c\xaf\a;d\x9f\xba\xd9T\xd4-\xecX\xc0Y\x83@\xc7\x8b\xff*\xdd\xaa\xc6,o4\xe2\x0f\x16\x01[\xc0\xeb\x7fFI]WF\x1f\f?\xfa\xb1\xe7\xf6t\x027\xb1\xc17.4V\xf81{9\xa3\xb9\x01\xcck@I\xe2\xf1Y\x10E\xa1z/\x05.~Yh%\x8f\x06sB)N\x11P\xf6p\xff\'\xaf\a7\x10+p\xbb\xf3\xb08\xb5)\x00\xeeg\xd0\xee\xe9\x98\x8d\xf8\xb5G\t@f\x1et v\x14\tT\xc5', 0x0], 0x1000) 10:18:39 executing program 2: prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f00000002c0)) r0 = getpid() sched_setscheduler(r0, 0x2, &(0x7f00000000c0)=0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff}) connect$unix(r1, &(0x7f000057eff8)=@abs, 0x6e) recvmmsg(r1, &(0x7f00000000c0), 0x10106, 0x2, 0x0) syz_mount_image$ext4(&(0x7f0000000180)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xfffbffff00000000, 0x8, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000600100000f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000006856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010300), 0x0, 0x640}, {&(0x7f0000010400)="03000000040000000500000016000f000300040000000000000000000f00698c", 0x20, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}, {&(0x7f0000011000)}, {0x0, 0x0, 0x6700000}, {&(0x7f0000000580), 0x0, 0xc000}], 0x0, &(0x7f0000013b00)=ANY=[@ANYBLOB='\x00']) r2 = socket(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f00000005c0)=@ipv4_newroute={0x38, 0x18, 0xbad, 0x0, 0x0, {}, [@RTA_ENCAP_TYPE={0x6, 0x15, 0x3}, @RTA_ENCAP={0x14, 0x16, 0x0, 0x1, @SEG6_IPTUNNEL_SRH={0xd}}]}, 0x38}}, 0x0) r3 = socket(0x26, 0x3, 0x0) sendmsg$nl_route(r3, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f00000005c0)=@ipv4_newroute={0x38, 0x18, 0xbad, 0x0, 0x0, {0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6}, [@RTA_ENCAP_TYPE={0x6, 0x15, 0x3}, @RTA_ENCAP={0x14, 0x16, 0x0, 0x1, @SEG6_IPTUNNEL_SRH={0xd}}]}, 0x38}}, 0x0) r4 = socket(0x10, 0x0, 0x0) sendmsg$nl_route(r4, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f00000005c0)=@ipv4_newroute={0x38, 0x18, 0xbad, 0x0, 0x0, {0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6}, [@RTA_ENCAP_TYPE={0x6, 0x15, 0x3}, @RTA_ENCAP={0x14, 0x16, 0x0, 0x1, @SEG6_IPTUNNEL_SRH={0xd}}]}, 0x38}}, 0x0) recvfrom(r1, &(0x7f0000000600)=""/203, 0xcb, 0x42, &(0x7f0000000700)=@hci={0x1f, 0xffffffffffffffff, 0x4}, 0x80) 10:18:39 executing program 4: socketpair(0x2a, 0x0, 0x0, &(0x7f00000005c0)) 10:18:39 executing program 1: setsockopt$SO_VM_SOCKETS_CONNECT_TIMEOUT_OLD(0xffffffffffffffff, 0x28, 0x6, 0x0, 0x0) 10:18:39 executing program 1: r0 = openat$binderfs(0xffffffffffffff9c, &(0x7f0000000040)='./binderfs/binder1\x00', 0x0, 0x0) ioctl$BINDER_GET_FROZEN_INFO(r0, 0xc00c620f, &(0x7f00000020c0)) 10:18:39 executing program 1: r0 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000040), 0x0) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(r0, 0xc08c5332, &(0x7f0000000080)={0x0, 0x0, 0x0, 'queue0\x00'}) 10:18:39 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000b80)={{0x14}, [], {0x14}}, 0x28}}, 0x0) 10:18:39 executing program 1: r0 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000040), 0x0) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(r0, 0xc08c5332, &(0x7f0000000080)={0x0, 0x0, 0x0, 'queue0\x00'}) [ 2419.404805][ T24] audit: type=1400 audit(1649758719.816:453): avc: denied { create } for pid=26705 comm="syz-executor.4" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=qipcrtr_socket permissive=1 [ 2419.433181][T26711] loop2: detected capacity change from 0 to 264192 [ 2419.488721][T26717] loop3: detected capacity change from 0 to 264192 [ 2419.574001][T26711] EXT4-fs (loop2): mounted filesystem without journal. Quota mode: writeback. [ 2419.602954][T26717] EXT4-fs (loop3): mounted filesystem without journal. Quota mode: writeback. 10:18:46 executing program 5: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl802154(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$NL802154_CMD_SET_MAX_CSMA_BACKOFFS(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000001c0)={0x14, r1, 0x1}, 0x14}}, 0x0) 10:18:46 executing program 4: r0 = socket(0x29, 0x5, 0x0) sendmsg$IPCTNL_MSG_TIMEOUT_GET(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={0x0}}, 0x8080) 10:18:46 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r0, &(0x7f0000005080)={0x0, 0x0, &(0x7f0000005040)={&(0x7f00000000c0)={{0x14}, [@NFT_MSG_DELTABLE={0x20, 0x2, 0xa, 0x101, 0x0, 0x0, {0x1}, [@NFTA_TABLE_HANDLE={0xc}]}], {0x14}}, 0x48}}, 0x0) 10:18:46 executing program 1: r0 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000040), 0x0) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(r0, 0xc08c5332, &(0x7f0000000080)={0x0, 0x0, 0x0, 'queue0\x00'}) 10:18:46 executing program 2: prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) r0 = getpid() sched_setscheduler(r0, 0x2, &(0x7f00000000c0)=0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff}) connect$unix(r1, &(0x7f000057eff8)=@abs, 0x6e) recvmmsg(r1, &(0x7f00000000c0), 0x10106, 0x2, 0x0) syz_mount_image$ext4(&(0x7f0000000180)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xfffbffff00000000, 0x8, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000600100000f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000006856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010300), 0x0, 0x640}, {&(0x7f0000010400)="03000000040000000500000016000f000300040000000000000000000f00698c", 0x20, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}, {&(0x7f0000011000)}, {0x0, 0x0, 0x6700000}, {&(0x7f0000000580), 0x0, 0xc000}], 0x0, &(0x7f0000013b00)=ANY=[@ANYBLOB='\x00']) r2 = socket(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f00000005c0)=@ipv4_newroute={0x38, 0x18, 0xbad, 0x0, 0x0, {}, [@RTA_ENCAP_TYPE={0x6, 0x15, 0x3}, @RTA_ENCAP={0x14, 0x16, 0x0, 0x1, @SEG6_IPTUNNEL_SRH={0xd}}]}, 0x38}}, 0x0) r3 = socket(0x26, 0x3, 0x0) sendmsg$nl_route(r3, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f00000005c0)=@ipv4_newroute={0x38, 0x18, 0xbad, 0x0, 0x0, {0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6}, [@RTA_ENCAP_TYPE={0x6, 0x15, 0x3}, @RTA_ENCAP={0x14, 0x16, 0x0, 0x1, @SEG6_IPTUNNEL_SRH={0xd}}]}, 0x38}}, 0x0) r4 = socket(0x10, 0x0, 0x0) sendmsg$nl_route(r4, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f00000005c0)=@ipv4_newroute={0x38, 0x18, 0xbad, 0x0, 0x0, {0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6}, [@RTA_ENCAP_TYPE={0x6, 0x15, 0x3}, @RTA_ENCAP={0x14, 0x16, 0x0, 0x1, @SEG6_IPTUNNEL_SRH={0xd}}]}, 0x38}}, 0x0) recvfrom(r1, &(0x7f0000000600)=""/203, 0xcb, 0x42, &(0x7f0000000700)=@hci={0x1f, 0xffffffffffffffff, 0x4}, 0x80) 10:18:46 executing program 3: sched_setscheduler(0x0, 0x2, &(0x7f0000000080)=0x6) r0 = getpid() sched_setscheduler(r0, 0x2, &(0x7f00000000c0)=0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r1, &(0x7f000057eff8)=@abs, 0x6e) sendmmsg$unix(r2, &(0x7f00000bd000), 0x318, 0x0) recvmmsg(r1, &(0x7f00000000c0), 0x10106, 0x2, 0x0) syz_mount_image$ext4(&(0x7f0000000180)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xfffbffff00000000, 0x8, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000600100000f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000006856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010300), 0x0, 0x640}, {&(0x7f0000010400)="03000000040000000500000016000f000300040000000000000000000f00698c", 0x20, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}, {&(0x7f0000011000)}, {0x0, 0x0, 0x6700000}, {&(0x7f0000000580), 0x0, 0xc000}], 0x0, &(0x7f0000013b00)=ANY=[@ANYBLOB='\x00']) r3 = creat(&(0x7f0000000000)='./file1\x00', 0x18) socket(0x10, 0x3, 0x0) r4 = socket(0x26, 0x3, 0x0) sendmsg$nl_route(r4, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f00000005c0)=@ipv4_newroute={0x38, 0x18, 0xbad, 0x0, 0x0, {0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6}, [@RTA_ENCAP_TYPE={0x6, 0x15, 0x3}, @RTA_ENCAP={0x14, 0x16, 0x0, 0x1, @SEG6_IPTUNNEL_SRH={0xd}}]}, 0x38}}, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f00000005c0)=@ipv4_newroute={0x38, 0x18, 0xbad, 0x0, 0x0, {0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6}, [@RTA_ENCAP_TYPE={0x6, 0x15, 0x3}, @RTA_ENCAP={0x14, 0x16, 0x0, 0x1, @SEG6_IPTUNNEL_SRH={0xd}}]}, 0x38}}, 0x0) execveat(r3, 0x0, &(0x7f0000000380)=[&(0x7f00000001c0)='+{!#\x00', &(0x7f0000000300)='ext4\x00', &(0x7f0000000340)='@(\x00'], &(0x7f00000004c0)=[&(0x7f00000003c0)='ext4\x00', &(0x7f0000000400)='ext4\x00', &(0x7f0000000500)='\x00.D\x04\xe0\xce\x99\xd9\xa9\xac\xac\xadH\xa4\xcf\xb7\xffT\xac\x05\xfd\xdd\xb8w\x0f\x82B\xff\xf2\x909`1!\f\x870\x1f\xc1%Y\xc8\x15c \xea\x1cY!\x04\xe4\x91^\x00\x04\xe4\xa6\xba\xc6\xfd\x10\xdf\xe24\xd4&\x17\xdc\xec\xf4\f\n\xb7.\x13\x8e\x1bYENj\xe1\x19~\x1c\xaf\a;d\x9f\xba\xd9T\xd4-\xecX\xc0Y\x83@\xc7\x8b\xff*\xdd\xaa\xc6,o4\xe2\x0f\x16\x01[\xc0\xeb\x7fFI]WF\x1f\f?\xfa\xb1\xe7\xf6t\x027\xb1\xc17.4V\xf81{9\xa3\xb9\x01\xcck@I\xe2\xf1Y\x10E\xa1z/\x05.~Yh%\x8f\x06sB)N\x11P\xf6p\xff\'\xaf\a7\x10+p\xbb\xf3\xb08\xb5)\x00\xeeg\xd0\xee\xe9\x98\x8d\xf8\xb5G\t@f\x1et v\x14\tT\xc5', 0x0], 0x1000) 10:18:46 executing program 1: r0 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000040), 0x0) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(r0, 0xc08c5332, &(0x7f0000000080)={0x0, 0x0, 0x0, 'queue0\x00'}) 10:18:46 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x14) setsockopt$netlink_NETLINK_ADD_MEMBERSHIP(r0, 0x10e, 0x1, &(0x7f0000000000)=0x17, 0x4) 10:18:46 executing program 0: r0 = epoll_create1(0x0) r1 = socket$inet_smc(0x2b, 0x1, 0x0) epoll_ctl$EPOLL_CTL_ADD(r0, 0x1, r1, &(0x7f0000000080)) epoll_ctl$EPOLL_CTL_MOD(r0, 0x3, r1, &(0x7f0000000040)={0x20000000}) epoll_ctl$EPOLL_CTL_ADD(r0, 0x3, r1, &(0x7f0000000000)) 10:18:46 executing program 1: syz_emit_ethernet(0x6e, &(0x7f0000000100)={@multicast, @dev, @void, {@ipv4={0x800, @gre={{0x7, 0x4, 0x0, 0x0, 0x60, 0x0, 0x0, 0x0, 0x2f, 0x0, @private=0xa010100, @dev, {[@generic={0x86, 0x8, "6abbfb60ccb0"}]}}}}}}, 0x0) 10:18:47 executing program 0: openat$vcsa(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) madvise(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x12) 10:18:47 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000340)={&(0x7f00000002c0)=@ipv6_deladdrlabel={0x1c, 0x1a, 0x1, 0x0, 0x0, {0x2}}, 0x1c}}, 0x0) [ 2426.605091][T26753] loop2: detected capacity change from 0 to 264192 [ 2426.627499][T26753] EXT4-fs (loop2): mounted filesystem without journal. Quota mode: writeback. [ 2426.645247][T26757] loop3: detected capacity change from 0 to 264192 [ 2426.681092][T26757] EXT4-fs (loop3): mounted filesystem without journal. Quota mode: writeback. 10:18:54 executing program 5: add_key$keyring(&(0x7f0000000180), &(0x7f00000001c0)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffe) 10:18:54 executing program 4: r0 = syz_open_dev$MSR(&(0x7f0000000100), 0x0, 0x0) ioctl$X86_IOC_RDMSR_REGS(r0, 0xc02063a0, &(0x7f0000000140)) 10:18:54 executing program 0: add_key$keyring(&(0x7f0000000040), &(0x7f0000000200)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffc) 10:18:54 executing program 1: r0 = syz_open_dev$evdev(&(0x7f0000000180), 0x0, 0x0) ioctl$EVIOCGKEYCODE_V2(r0, 0x80284504, 0x0) 10:18:54 executing program 2: prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) r0 = getpid() sched_setscheduler(r0, 0x2, &(0x7f00000000c0)=0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff}) connect$unix(r1, &(0x7f000057eff8)=@abs, 0x6e) recvmmsg(r1, &(0x7f00000000c0), 0x10106, 0x2, 0x0) syz_mount_image$ext4(&(0x7f0000000180)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xfffbffff00000000, 0x8, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000600100000f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000006856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010300), 0x0, 0x640}, {&(0x7f0000010400)="03000000040000000500000016000f000300040000000000000000000f00698c", 0x20, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}, {&(0x7f0000011000)}, {0x0, 0x0, 0x6700000}, {&(0x7f0000000580), 0x0, 0xc000}], 0x0, &(0x7f0000013b00)=ANY=[@ANYBLOB='\x00']) r2 = socket(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f00000005c0)=@ipv4_newroute={0x38, 0x18, 0xbad, 0x0, 0x0, {}, [@RTA_ENCAP_TYPE={0x6, 0x15, 0x3}, @RTA_ENCAP={0x14, 0x16, 0x0, 0x1, @SEG6_IPTUNNEL_SRH={0xd}}]}, 0x38}}, 0x0) r3 = socket(0x26, 0x3, 0x0) sendmsg$nl_route(r3, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f00000005c0)=@ipv4_newroute={0x38, 0x18, 0xbad, 0x0, 0x0, {0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6}, [@RTA_ENCAP_TYPE={0x6, 0x15, 0x3}, @RTA_ENCAP={0x14, 0x16, 0x0, 0x1, @SEG6_IPTUNNEL_SRH={0xd}}]}, 0x38}}, 0x0) r4 = socket(0x10, 0x0, 0x0) sendmsg$nl_route(r4, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f00000005c0)=@ipv4_newroute={0x38, 0x18, 0xbad, 0x0, 0x0, {0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6}, [@RTA_ENCAP_TYPE={0x6, 0x15, 0x3}, @RTA_ENCAP={0x14, 0x16, 0x0, 0x1, @SEG6_IPTUNNEL_SRH={0xd}}]}, 0x38}}, 0x0) recvfrom(r1, &(0x7f0000000600)=""/203, 0xcb, 0x42, &(0x7f0000000700)=@hci={0x1f, 0xffffffffffffffff, 0x4}, 0x80) 10:18:54 executing program 3: sched_setscheduler(0x0, 0x2, &(0x7f0000000080)=0x6) r0 = getpid() sched_setscheduler(r0, 0x2, &(0x7f00000000c0)=0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r1, &(0x7f000057eff8)=@abs, 0x6e) sendmmsg$unix(r2, &(0x7f00000bd000), 0x318, 0x0) recvmmsg(r1, &(0x7f00000000c0), 0x10106, 0x2, 0x0) syz_mount_image$ext4(&(0x7f0000000180)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xfffbffff00000000, 0x8, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000600100000f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000006856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010300), 0x0, 0x640}, {&(0x7f0000010400)="03000000040000000500000016000f000300040000000000000000000f00698c", 0x20, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}, {&(0x7f0000011000)}, {0x0, 0x0, 0x6700000}, {&(0x7f0000000580), 0x0, 0xc000}], 0x0, &(0x7f0000013b00)=ANY=[@ANYBLOB='\x00']) r3 = creat(&(0x7f0000000000)='./file1\x00', 0x18) socket(0x10, 0x3, 0x0) r4 = socket(0x26, 0x3, 0x0) sendmsg$nl_route(r4, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f00000005c0)=@ipv4_newroute={0x38, 0x18, 0xbad, 0x0, 0x0, {0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6}, [@RTA_ENCAP_TYPE={0x6, 0x15, 0x3}, @RTA_ENCAP={0x14, 0x16, 0x0, 0x1, @SEG6_IPTUNNEL_SRH={0xd}}]}, 0x38}}, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f00000005c0)=@ipv4_newroute={0x38, 0x18, 0xbad, 0x0, 0x0, {0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6}, [@RTA_ENCAP_TYPE={0x6, 0x15, 0x3}, @RTA_ENCAP={0x14, 0x16, 0x0, 0x1, @SEG6_IPTUNNEL_SRH={0xd}}]}, 0x38}}, 0x0) execveat(r3, 0x0, &(0x7f0000000380)=[&(0x7f00000001c0)='+{!#\x00', &(0x7f0000000300)='ext4\x00', &(0x7f0000000340)='@(\x00'], &(0x7f00000004c0)=[&(0x7f00000003c0)='ext4\x00', &(0x7f0000000400)='ext4\x00', &(0x7f0000000500)='\x00.D\x04\xe0\xce\x99\xd9\xa9\xac\xac\xadH\xa4\xcf\xb7\xffT\xac\x05\xfd\xdd\xb8w\x0f\x82B\xff\xf2\x909`1!\f\x870\x1f\xc1%Y\xc8\x15c \xea\x1cY!\x04\xe4\x91^\x00\x04\xe4\xa6\xba\xc6\xfd\x10\xdf\xe24\xd4&\x17\xdc\xec\xf4\f\n\xb7.\x13\x8e\x1bYENj\xe1\x19~\x1c\xaf\a;d\x9f\xba\xd9T\xd4-\xecX\xc0Y\x83@\xc7\x8b\xff*\xdd\xaa\xc6,o4\xe2\x0f\x16\x01[\xc0\xeb\x7fFI]WF\x1f\f?\xfa\xb1\xe7\xf6t\x027\xb1\xc17.4V\xf81{9\xa3\xb9\x01\xcck@I\xe2\xf1Y\x10E\xa1z/\x05.~Yh%\x8f\x06sB)N\x11P\xf6p\xff\'\xaf\a7\x10+p\xbb\xf3\xb08\xb5)\x00\xeeg\xd0\xee\xe9\x98\x8d\xf8\xb5G\t@f\x1et v\x14\tT\xc5', 0x0], 0x1000) 10:18:54 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000240)=@delnexthop={0x20, 0x69, 0x1, 0x0, 0x0, {}, [{0x8, 0x1, 0x2}]}, 0x20}}, 0x0) 10:18:54 executing program 1: r0 = socket$vsock_stream(0x28, 0x1, 0x0) bind$vsock_stream(r0, 0x0, 0x10) 10:18:54 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_CT_DELETE(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000080)={0x58, 0x2, 0x1, 0x301, 0x0, 0x0, {}, [@CTA_TUPLE_ORIG={0x40, 0x1, 0x0, 0x1, [@CTA_TUPLE_ZONE={0x6}, @CTA_TUPLE_IP={0x2c, 0x1, 0x0, 0x1, @ipv6={{0x14, 0x3, @mcast1}, {0x14, 0x4, @local}}}, @CTA_TUPLE_ZONE={0x6}]}, @CTA_LABELS={0x4}]}, 0x58}}, 0x0) 10:18:54 executing program 1: r0 = syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) wait4(r0, &(0x7f0000000000), 0x40000000, 0x0) 10:18:54 executing program 0: r0 = openat$rfkill(0xffffffffffffff9c, &(0x7f0000000000), 0x42, 0x0) write$rfkill(r0, &(0x7f0000000080), 0x8) 10:18:54 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000180)=@ipv6_getroute={0x3c, 0x19, 0x1, 0x0, 0x0, {}, [@RTA_OIF={0x8}, @RTA_EXPIRES={0x8}, @RTA_ENCAP={0x10, 0x16, 0x0, 0x1, @LWTUNNEL_IP6_ID={0xc}}]}, 0x3c}}, 0x0) [ 2433.790110][T26789] loop2: detected capacity change from 0 to 264192 [ 2433.801382][T26789] EXT4-fs (loop2): mounted filesystem without journal. Quota mode: writeback. [ 2433.869702][T26795] loop3: detected capacity change from 0 to 264192 [ 2433.906197][T26795] EXT4-fs (loop3): mounted filesystem without journal. Quota mode: writeback. 10:19:03 executing program 5: mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x0, 0x88071, 0xffffffffffffffff, 0x0) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x4000)=nil, 0x4010, 0x0, 0x88071, 0xffffffffffffffff, 0x0) 10:19:03 executing program 0: r0 = syz_open_dev$evdev(&(0x7f0000000840), 0x0, 0x0) ioctl$EVIOCGEFFECTS(r0, 0x80044584, &(0x7f0000000880)=""/27) 10:19:03 executing program 4: syz_emit_ethernet(0x3e, &(0x7f0000000000)={@link_local, @remote, @void, {@ipv6={0x86dd, @generic={0x0, 0x6, "be08c3", 0x8, 0x0, 0x0, @empty, @local, {[@hopopts]}}}}}, 0x0) 10:19:03 executing program 2: prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) r0 = getpid() sched_setscheduler(r0, 0x2, &(0x7f00000000c0)=0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff}) connect$unix(r1, &(0x7f000057eff8)=@abs, 0x6e) recvmmsg(r1, &(0x7f00000000c0), 0x10106, 0x2, 0x0) syz_mount_image$ext4(&(0x7f0000000180)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xfffbffff00000000, 0x8, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000600100000f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000006856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010300), 0x0, 0x640}, {&(0x7f0000010400)="03000000040000000500000016000f000300040000000000000000000f00698c", 0x20, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}, {&(0x7f0000011000)}, {0x0, 0x0, 0x6700000}, {&(0x7f0000000580), 0x0, 0xc000}], 0x0, &(0x7f0000013b00)=ANY=[@ANYBLOB='\x00']) r2 = socket(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f00000005c0)=@ipv4_newroute={0x38, 0x18, 0xbad, 0x0, 0x0, {}, [@RTA_ENCAP_TYPE={0x6, 0x15, 0x3}, @RTA_ENCAP={0x14, 0x16, 0x0, 0x1, @SEG6_IPTUNNEL_SRH={0xd}}]}, 0x38}}, 0x0) r3 = socket(0x26, 0x3, 0x0) sendmsg$nl_route(r3, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f00000005c0)=@ipv4_newroute={0x38, 0x18, 0xbad, 0x0, 0x0, {0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6}, [@RTA_ENCAP_TYPE={0x6, 0x15, 0x3}, @RTA_ENCAP={0x14, 0x16, 0x0, 0x1, @SEG6_IPTUNNEL_SRH={0xd}}]}, 0x38}}, 0x0) r4 = socket(0x10, 0x0, 0x0) sendmsg$nl_route(r4, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f00000005c0)=@ipv4_newroute={0x38, 0x18, 0xbad, 0x0, 0x0, {0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6}, [@RTA_ENCAP_TYPE={0x6, 0x15, 0x3}, @RTA_ENCAP={0x14, 0x16, 0x0, 0x1, @SEG6_IPTUNNEL_SRH={0xd}}]}, 0x38}}, 0x0) recvfrom(r1, &(0x7f0000000600)=""/203, 0xcb, 0x42, &(0x7f0000000700)=@hci={0x1f, 0xffffffffffffffff, 0x4}, 0x80) 10:19:03 executing program 3: sched_setscheduler(0x0, 0x2, &(0x7f0000000080)=0x6) r0 = getpid() sched_setscheduler(r0, 0x2, &(0x7f00000000c0)=0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r1, &(0x7f000057eff8)=@abs, 0x6e) sendmmsg$unix(r2, &(0x7f00000bd000), 0x318, 0x0) recvmmsg(r1, &(0x7f00000000c0), 0x10106, 0x2, 0x0) syz_mount_image$ext4(&(0x7f0000000180)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xfffbffff00000000, 0x8, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000600100000f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000006856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010300), 0x0, 0x640}, {&(0x7f0000010400)="03000000040000000500000016000f000300040000000000000000000f00698c", 0x20, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}, {&(0x7f0000011000)}, {0x0, 0x0, 0x6700000}, {&(0x7f0000000580), 0x0, 0xc000}], 0x0, &(0x7f0000013b00)=ANY=[@ANYBLOB='\x00']) r3 = creat(&(0x7f0000000000)='./file1\x00', 0x18) socket(0x10, 0x3, 0x0) r4 = socket(0x26, 0x3, 0x0) sendmsg$nl_route(r4, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f00000005c0)=@ipv4_newroute={0x38, 0x18, 0xbad, 0x0, 0x0, {0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6}, [@RTA_ENCAP_TYPE={0x6, 0x15, 0x3}, @RTA_ENCAP={0x14, 0x16, 0x0, 0x1, @SEG6_IPTUNNEL_SRH={0xd}}]}, 0x38}}, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f00000005c0)=@ipv4_newroute={0x38, 0x18, 0xbad, 0x0, 0x0, {0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6}, [@RTA_ENCAP_TYPE={0x6, 0x15, 0x3}, @RTA_ENCAP={0x14, 0x16, 0x0, 0x1, @SEG6_IPTUNNEL_SRH={0xd}}]}, 0x38}}, 0x0) execveat(r3, 0x0, &(0x7f0000000380)=[&(0x7f00000001c0)='+{!#\x00', &(0x7f0000000300)='ext4\x00', &(0x7f0000000340)='@(\x00'], &(0x7f00000004c0)=[&(0x7f00000003c0)='ext4\x00', &(0x7f0000000400)='ext4\x00', &(0x7f0000000500)='\x00.D\x04\xe0\xce\x99\xd9\xa9\xac\xac\xadH\xa4\xcf\xb7\xffT\xac\x05\xfd\xdd\xb8w\x0f\x82B\xff\xf2\x909`1!\f\x870\x1f\xc1%Y\xc8\x15c \xea\x1cY!\x04\xe4\x91^\x00\x04\xe4\xa6\xba\xc6\xfd\x10\xdf\xe24\xd4&\x17\xdc\xec\xf4\f\n\xb7.\x13\x8e\x1bYENj\xe1\x19~\x1c\xaf\a;d\x9f\xba\xd9T\xd4-\xecX\xc0Y\x83@\xc7\x8b\xff*\xdd\xaa\xc6,o4\xe2\x0f\x16\x01[\xc0\xeb\x7fFI]WF\x1f\f?\xfa\xb1\xe7\xf6t\x027\xb1\xc17.4V\xf81{9\xa3\xb9\x01\xcck@I\xe2\xf1Y\x10E\xa1z/\x05.~Yh%\x8f\x06sB)N\x11P\xf6p\xff\'\xaf\a7\x10+p\xbb\xf3\xb08\xb5)\x00\xeeg\xd0\xee\xe9\x98\x8d\xf8\xb5G\t@f\x1et v\x14\tT\xc5', 0x0], 0x1000) 10:19:03 executing program 1: bpf$MAP_CREATE(0x0, &(0x7f0000001540)=@base={0x1, 0x2, 0x1ff, 0x104, 0xc}, 0x48) 10:19:03 executing program 4: syz_clone(0xa7043180, 0x0, 0x21, 0x0, 0x0, 0x0) 10:19:03 executing program 1: r0 = socket$inet_udp(0x2, 0x2, 0x0) getsockopt$inet_mtu(r0, 0x0, 0xa, 0x0, 0xfffffffffffffffc) 10:19:03 executing program 0: r0 = openat$null(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) read$char_usb(r0, 0x0, 0xffffffffffffff29) 10:19:03 executing program 1: io_setup(0x4, &(0x7f0000000300)=0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) eventfd(0x0) io_submit(r0, 0x1, &(0x7f0000000580)=[&(0x7f0000000380)={0x0, 0x0, 0x0, 0x0, 0x0, r1, 0x0}]) io_getevents(r0, 0x0, 0x1, &(0x7f0000000000)=[{}], 0x0) 10:19:03 executing program 0: pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) write$eventfd(r0, 0x0, 0xffffffffffffffd6) 10:19:03 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000001000)={0xffffffffffffffff, 0xffffffffffffffff}) bind$unix(r1, &(0x7f0000000580)=@file={0x1, './file0\x00'}, 0x6e) bind$unix(r0, &(0x7f0000000000)=@file={0x1, './file0\x00'}, 0x6e) [ 2442.994989][T26824] loop2: detected capacity change from 0 to 264192 [ 2443.010408][T26824] EXT4-fs (loop2): mounted filesystem without journal. Quota mode: writeback. [ 2443.070768][T26831] loop3: detected capacity change from 0 to 264192 [ 2443.110811][T26831] EXT4-fs (loop3): mounted filesystem without journal. Quota mode: writeback. 10:19:11 executing program 5: io_setup(0x4, &(0x7f0000000300)=0x0) r1 = eventfd(0x0) io_submit(r0, 0x2, &(0x7f0000000340)=[&(0x7f0000000380)={0x0, 0x0, 0x0, 0x0, 0x0, r1, 0x0}, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x5, 0x0, r1, 0x0}]) 10:19:11 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000001000)={0xffffffffffffffff}) recvfrom$unix(r0, 0x0, 0x0, 0x162, 0x0, 0x0) 10:19:11 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000001000)={0xffffffffffffffff}) bind$unix(r0, &(0x7f0000000000)=@file={0x1, './file0\x00'}, 0x6e) 10:19:11 executing program 1: openat$null(0xffffffffffffff9c, &(0x7f0000000000), 0x690801, 0x0) 10:19:11 executing program 2: ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f00000002c0)) r0 = getpid() sched_setscheduler(r0, 0x2, &(0x7f00000000c0)=0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff}) connect$unix(r1, &(0x7f000057eff8)=@abs, 0x6e) recvmmsg(r1, &(0x7f00000000c0), 0x10106, 0x2, 0x0) syz_mount_image$ext4(&(0x7f0000000180)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xfffbffff00000000, 0x8, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000600100000f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000006856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010300), 0x0, 0x640}, {&(0x7f0000010400)="03000000040000000500000016000f000300040000000000000000000f00698c", 0x20, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}, {&(0x7f0000011000)}, {0x0, 0x0, 0x6700000}, {&(0x7f0000000580), 0x0, 0xc000}], 0x0, &(0x7f0000013b00)=ANY=[@ANYBLOB='\x00']) r2 = socket(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f00000005c0)=@ipv4_newroute={0x38, 0x18, 0xbad, 0x0, 0x0, {}, [@RTA_ENCAP_TYPE={0x6, 0x15, 0x3}, @RTA_ENCAP={0x14, 0x16, 0x0, 0x1, @SEG6_IPTUNNEL_SRH={0xd}}]}, 0x38}}, 0x0) r3 = socket(0x26, 0x3, 0x0) sendmsg$nl_route(r3, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f00000005c0)=@ipv4_newroute={0x38, 0x18, 0xbad, 0x0, 0x0, {0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6}, [@RTA_ENCAP_TYPE={0x6, 0x15, 0x3}, @RTA_ENCAP={0x14, 0x16, 0x0, 0x1, @SEG6_IPTUNNEL_SRH={0xd}}]}, 0x38}}, 0x0) r4 = socket(0x10, 0x0, 0x0) sendmsg$nl_route(r4, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f00000005c0)=@ipv4_newroute={0x38, 0x18, 0xbad, 0x0, 0x0, {0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6}, [@RTA_ENCAP_TYPE={0x6, 0x15, 0x3}, @RTA_ENCAP={0x14, 0x16, 0x0, 0x1, @SEG6_IPTUNNEL_SRH={0xd}}]}, 0x38}}, 0x0) recvfrom(r1, &(0x7f0000000600)=""/203, 0xcb, 0x42, &(0x7f0000000700)=@hci={0x1f, 0xffffffffffffffff, 0x4}, 0x80) 10:19:11 executing program 3: prlimit64(0x0, 0x0, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x2, &(0x7f0000000080)=0x6) r0 = getpid() sched_setscheduler(r0, 0x2, &(0x7f00000000c0)=0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r1, &(0x7f000057eff8)=@abs, 0x6e) sendmmsg$unix(r2, &(0x7f00000bd000), 0x318, 0x0) recvmmsg(r1, &(0x7f00000000c0), 0x10106, 0x2, 0x0) syz_mount_image$ext4(&(0x7f0000000180)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xfffbffff00000000, 0x8, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000600100000f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000006856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010300), 0x0, 0x640}, {&(0x7f0000010400)="03000000040000000500000016000f000300040000000000000000000f00698c", 0x20, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}, {&(0x7f0000011000)}, {0x0, 0x0, 0x6700000}, {&(0x7f0000000580), 0x0, 0xc000}], 0x0, &(0x7f0000013b00)=ANY=[@ANYBLOB='\x00']) r3 = creat(&(0x7f0000000000)='./file1\x00', 0x18) socket(0x10, 0x3, 0x0) r4 = socket(0x26, 0x3, 0x0) sendmsg$nl_route(r4, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f00000005c0)=@ipv4_newroute={0x38, 0x18, 0xbad, 0x0, 0x0, {0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6}, [@RTA_ENCAP_TYPE={0x6, 0x15, 0x3}, @RTA_ENCAP={0x14, 0x16, 0x0, 0x1, @SEG6_IPTUNNEL_SRH={0xd}}]}, 0x38}}, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f00000005c0)=@ipv4_newroute={0x38, 0x18, 0xbad, 0x0, 0x0, {0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6}, [@RTA_ENCAP_TYPE={0x6, 0x15, 0x3}, @RTA_ENCAP={0x14, 0x16, 0x0, 0x1, @SEG6_IPTUNNEL_SRH={0xd}}]}, 0x38}}, 0x0) execveat(r3, 0x0, &(0x7f0000000380)=[&(0x7f00000001c0)='+{!#\x00', &(0x7f0000000300)='ext4\x00', &(0x7f0000000340)='@(\x00'], &(0x7f00000004c0)=[&(0x7f00000003c0)='ext4\x00', &(0x7f0000000400)='ext4\x00', &(0x7f0000000500)='\x00.D\x04\xe0\xce\x99\xd9\xa9\xac\xac\xadH\xa4\xcf\xb7\xffT\xac\x05\xfd\xdd\xb8w\x0f\x82B\xff\xf2\x909`1!\f\x870\x1f\xc1%Y\xc8\x15c \xea\x1cY!\x04\xe4\x91^\x00\x04\xe4\xa6\xba\xc6\xfd\x10\xdf\xe24\xd4&\x17\xdc\xec\xf4\f\n\xb7.\x13\x8e\x1bYENj\xe1\x19~\x1c\xaf\a;d\x9f\xba\xd9T\xd4-\xecX\xc0Y\x83@\xc7\x8b\xff*\xdd\xaa\xc6,o4\xe2\x0f\x16\x01[\xc0\xeb\x7fFI]WF\x1f\f?\xfa\xb1\xe7\xf6t\x027\xb1\xc17.4V\xf81{9\xa3\xb9\x01\xcck@I\xe2\xf1Y\x10E\xa1z/\x05.~Yh%\x8f\x06sB)N\x11P\xf6p\xff\'\xaf\a7\x10+p\xbb\xf3\xb08\xb5)\x00\xeeg\xd0\xee\xe9\x98\x8d\xf8\xb5G\t@f\x1et v\x14\tT\xc5', 0x0], 0x1000) 10:19:11 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000001000)={0xffffffffffffffff}) bind$unix(r0, &(0x7f0000000000)=@file={0x1, './file0\x00'}, 0xa0) 10:19:11 executing program 1: io_setup(0x0, &(0x7f0000000300)) 10:19:11 executing program 0: pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) write$eventfd(r0, 0x0, 0x55) 10:19:11 executing program 1: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) r1 = openat$cgroup_procs(r0, &(0x7f00000000c0)='tasks\x00', 0x2, 0x0) write$cgroup_pid(r1, &(0x7f0000000100)=0xffffffffffffffff, 0x12) 10:19:11 executing program 4: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000100)='./cgroup/syz0\x00', 0x200002, 0x0) bpf$BPF_PROG_QUERY(0x10, &(0x7f00000001c0)={r0, 0x16, 0x0, 0x0, 0x0}, 0x20) 10:19:11 executing program 0: bpf$OBJ_GET_MAP(0x7, &(0x7f0000001680)={&(0x7f0000001640)='./file0\x00'}, 0x10) bpf$OBJ_GET_MAP(0x7, &(0x7f0000002140)={&(0x7f0000002100)='./file0/file0\x00'}, 0x10) [ 2451.286195][T26860] loop2: detected capacity change from 0 to 264192 [ 2451.312258][T26860] EXT4-fs (loop2): mounted filesystem without journal. Quota mode: writeback. [ 2451.329187][T26863] loop3: detected capacity change from 0 to 264192 [ 2451.344410][T26863] EXT4-fs (loop3): mounted filesystem without journal. Quota mode: writeback. 10:19:18 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000200)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@func_proto={0x0, 0x0, 0x0, 0xd, 0x3}]}}, &(0x7f0000000140)=""/145, 0x26, 0x91, 0x1}, 0x20) 10:19:18 executing program 4: syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) syz_clone(0x88800100, 0x0, 0x0, 0x0, 0x0, 0x0) 10:19:18 executing program 1: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) r1 = openat$cgroup_int(r0, &(0x7f0000000040)='cpuset.memory_spread_page\x00', 0x2, 0x0) write$cgroup_int(r1, 0x0, 0x0) 10:19:18 executing program 0: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000280)={0x11, 0x3, &(0x7f0000000400)=ANY=[@ANYBLOB="1800000000001000000000000000000095"], &(0x7f00000000c0)='GPL\x00', 0x5, 0xe6, &(0x7f0000000300)=""/230, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000100)={&(0x7f0000000000)='bdi_dirty_ratelimit\x00', r0}, 0x10) 10:19:18 executing program 3: prlimit64(0x0, 0x0, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x2, &(0x7f0000000080)=0x6) r0 = getpid() sched_setscheduler(r0, 0x2, &(0x7f00000000c0)=0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r1, &(0x7f000057eff8)=@abs, 0x6e) sendmmsg$unix(r2, &(0x7f00000bd000), 0x318, 0x0) recvmmsg(r1, &(0x7f00000000c0), 0x10106, 0x2, 0x0) syz_mount_image$ext4(&(0x7f0000000180)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xfffbffff00000000, 0x8, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000600100000f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000006856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010300), 0x0, 0x640}, {&(0x7f0000010400)="03000000040000000500000016000f000300040000000000000000000f00698c", 0x20, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}, {&(0x7f0000011000)}, {0x0, 0x0, 0x6700000}, {&(0x7f0000000580), 0x0, 0xc000}], 0x0, &(0x7f0000013b00)=ANY=[@ANYBLOB='\x00']) r3 = creat(&(0x7f0000000000)='./file1\x00', 0x18) socket(0x10, 0x3, 0x0) r4 = socket(0x26, 0x3, 0x0) sendmsg$nl_route(r4, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f00000005c0)=@ipv4_newroute={0x38, 0x18, 0xbad, 0x0, 0x0, {0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6}, [@RTA_ENCAP_TYPE={0x6, 0x15, 0x3}, @RTA_ENCAP={0x14, 0x16, 0x0, 0x1, @SEG6_IPTUNNEL_SRH={0xd}}]}, 0x38}}, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f00000005c0)=@ipv4_newroute={0x38, 0x18, 0xbad, 0x0, 0x0, {0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6}, [@RTA_ENCAP_TYPE={0x6, 0x15, 0x3}, @RTA_ENCAP={0x14, 0x16, 0x0, 0x1, @SEG6_IPTUNNEL_SRH={0xd}}]}, 0x38}}, 0x0) execveat(r3, 0x0, &(0x7f0000000380)=[&(0x7f00000001c0)='+{!#\x00', &(0x7f0000000300)='ext4\x00', &(0x7f0000000340)='@(\x00'], &(0x7f00000004c0)=[&(0x7f00000003c0)='ext4\x00', &(0x7f0000000400)='ext4\x00', &(0x7f0000000500)='\x00.D\x04\xe0\xce\x99\xd9\xa9\xac\xac\xadH\xa4\xcf\xb7\xffT\xac\x05\xfd\xdd\xb8w\x0f\x82B\xff\xf2\x909`1!\f\x870\x1f\xc1%Y\xc8\x15c \xea\x1cY!\x04\xe4\x91^\x00\x04\xe4\xa6\xba\xc6\xfd\x10\xdf\xe24\xd4&\x17\xdc\xec\xf4\f\n\xb7.\x13\x8e\x1bYENj\xe1\x19~\x1c\xaf\a;d\x9f\xba\xd9T\xd4-\xecX\xc0Y\x83@\xc7\x8b\xff*\xdd\xaa\xc6,o4\xe2\x0f\x16\x01[\xc0\xeb\x7fFI]WF\x1f\f?\xfa\xb1\xe7\xf6t\x027\xb1\xc17.4V\xf81{9\xa3\xb9\x01\xcck@I\xe2\xf1Y\x10E\xa1z/\x05.~Yh%\x8f\x06sB)N\x11P\xf6p\xff\'\xaf\a7\x10+p\xbb\xf3\xb08\xb5)\x00\xeeg\xd0\xee\xe9\x98\x8d\xf8\xb5G\t@f\x1et v\x14\tT\xc5', 0x0], 0x1000) 10:19:18 executing program 2: ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f00000002c0)) r0 = getpid() sched_setscheduler(r0, 0x2, &(0x7f00000000c0)=0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff}) connect$unix(r1, &(0x7f000057eff8)=@abs, 0x6e) recvmmsg(r1, &(0x7f00000000c0), 0x10106, 0x2, 0x0) syz_mount_image$ext4(&(0x7f0000000180)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xfffbffff00000000, 0x8, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000600100000f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000006856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010300), 0x0, 0x640}, {&(0x7f0000010400)="03000000040000000500000016000f000300040000000000000000000f00698c", 0x20, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}, {&(0x7f0000011000)}, {0x0, 0x0, 0x6700000}, {&(0x7f0000000580), 0x0, 0xc000}], 0x0, &(0x7f0000013b00)=ANY=[@ANYBLOB='\x00']) r2 = socket(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f00000005c0)=@ipv4_newroute={0x38, 0x18, 0xbad, 0x0, 0x0, {}, [@RTA_ENCAP_TYPE={0x6, 0x15, 0x3}, @RTA_ENCAP={0x14, 0x16, 0x0, 0x1, @SEG6_IPTUNNEL_SRH={0xd}}]}, 0x38}}, 0x0) r3 = socket(0x26, 0x3, 0x0) sendmsg$nl_route(r3, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f00000005c0)=@ipv4_newroute={0x38, 0x18, 0xbad, 0x0, 0x0, {0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6}, [@RTA_ENCAP_TYPE={0x6, 0x15, 0x3}, @RTA_ENCAP={0x14, 0x16, 0x0, 0x1, @SEG6_IPTUNNEL_SRH={0xd}}]}, 0x38}}, 0x0) r4 = socket(0x10, 0x0, 0x0) sendmsg$nl_route(r4, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f00000005c0)=@ipv4_newroute={0x38, 0x18, 0xbad, 0x0, 0x0, {0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6}, [@RTA_ENCAP_TYPE={0x6, 0x15, 0x3}, @RTA_ENCAP={0x14, 0x16, 0x0, 0x1, @SEG6_IPTUNNEL_SRH={0xd}}]}, 0x38}}, 0x0) recvfrom(r1, &(0x7f0000000600)=""/203, 0xcb, 0x42, &(0x7f0000000700)=@hci={0x1f, 0xffffffffffffffff, 0x4}, 0x80) 10:19:18 executing program 1: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) r1 = openat$cgroup_procs(r0, &(0x7f00000000c0)='tasks\x00', 0x2, 0x0) ioctl$PERF_EVENT_IOC_QUERY_BPF(r1, 0x5460, 0x0) 10:19:18 executing program 4: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000280)={0x11, 0x3, &(0x7f0000000400)=ANY=[@ANYBLOB="1800000000001000000000000000000095"], &(0x7f00000000c0)='GPL\x00', 0x5, 0xe6, &(0x7f0000000300)=""/230, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) r1 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000100)={&(0x7f0000000000)='bdi_dirty_ratelimit\x00', r0}, 0x10) r2 = syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000080)={r2, r1, 0x0, 0x0, 0x0}, 0x30) 10:19:18 executing program 0: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 10:19:18 executing program 1: perf_event_open(&(0x7f0000000040)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 10:19:18 executing program 4: perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0xffffffff00000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 10:19:18 executing program 1: open$dir(&(0x7f0000000000)='./file0\x00', 0x200, 0x0) rename(&(0x7f0000000000)='./file0\x00', 0x0) [ 2458.452041][T26897] loop2: detected capacity change from 0 to 264192 [ 2458.487128][T26897] EXT4-fs (loop2): mounted filesystem without journal. Quota mode: writeback. [ 2458.497730][T26900] loop3: detected capacity change from 0 to 264192 [ 2458.549934][T26900] EXT4-fs (loop3): mounted filesystem without journal. Quota mode: writeback. 10:19:21 executing program 5: r0 = socket(0x1c, 0x10000001, 0x84) setsockopt$inet_sctp_SCTP_INITMSG(r0, 0x84, 0x3, &(0x7f0000000180)={0x0, 0xde, 0x2, 0x7e0d}, 0x8) 10:19:21 executing program 0: r0 = socket$inet_sctp(0x2, 0x1, 0x84) setsockopt$inet_sctp_SCTP_RESET_STREAMS(r0, 0x84, 0x901, &(0x7f00000003c0), 0x8) 10:19:21 executing program 4: r0 = socket$inet_sctp(0x2, 0x1, 0x84) r1 = fcntl$dupfd(r0, 0x0, r0) setsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(r1, 0x84, 0xa, &(0x7f00000004c0)={0x0, @in, 0x7fffffff}, 0x98) 10:19:21 executing program 1: r0 = socket$inet_sctp(0x2, 0x1, 0x84) sendmsg$inet_sctp(r0, &(0x7f0000000240)={&(0x7f0000000040)=@in6={0x1c, 0x1c, 0x2}, 0x1c, 0x0}, 0x0) sendmsg$inet_sctp(r0, &(0x7f0000001780)={&(0x7f0000000200)=@in={0x10, 0x2}, 0x10, 0x0, 0x0, &(0x7f0000001680)=[@dstaddrv6={0x1c, 0x84, 0xa, @remote={0xfe, 0x80, '\x00', 0x0}}, @sndrcv={0x2c}, @sndrcv={0x2c}, @dstaddrv4={0x10, 0x84, 0x9, @loopback}, @dstaddrv4={0x10, 0x84, 0x9, @multicast1}, @authinfo={0x10}, @sndrcv={0x2c}], 0xd0}, 0x20110) 10:19:21 executing program 2: ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f00000002c0)) r0 = getpid() sched_setscheduler(r0, 0x2, &(0x7f00000000c0)=0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff}) connect$unix(r1, &(0x7f000057eff8)=@abs, 0x6e) recvmmsg(r1, &(0x7f00000000c0), 0x10106, 0x2, 0x0) syz_mount_image$ext4(&(0x7f0000000180)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xfffbffff00000000, 0x8, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000600100000f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000006856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010300), 0x0, 0x640}, {&(0x7f0000010400)="03000000040000000500000016000f000300040000000000000000000f00698c", 0x20, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}, {&(0x7f0000011000)}, {0x0, 0x0, 0x6700000}, {&(0x7f0000000580), 0x0, 0xc000}], 0x0, &(0x7f0000013b00)=ANY=[@ANYBLOB='\x00']) r2 = socket(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f00000005c0)=@ipv4_newroute={0x38, 0x18, 0xbad, 0x0, 0x0, {}, [@RTA_ENCAP_TYPE={0x6, 0x15, 0x3}, @RTA_ENCAP={0x14, 0x16, 0x0, 0x1, @SEG6_IPTUNNEL_SRH={0xd}}]}, 0x38}}, 0x0) r3 = socket(0x26, 0x3, 0x0) sendmsg$nl_route(r3, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f00000005c0)=@ipv4_newroute={0x38, 0x18, 0xbad, 0x0, 0x0, {0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6}, [@RTA_ENCAP_TYPE={0x6, 0x15, 0x3}, @RTA_ENCAP={0x14, 0x16, 0x0, 0x1, @SEG6_IPTUNNEL_SRH={0xd}}]}, 0x38}}, 0x0) r4 = socket(0x10, 0x0, 0x0) sendmsg$nl_route(r4, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f00000005c0)=@ipv4_newroute={0x38, 0x18, 0xbad, 0x0, 0x0, {0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6}, [@RTA_ENCAP_TYPE={0x6, 0x15, 0x3}, @RTA_ENCAP={0x14, 0x16, 0x0, 0x1, @SEG6_IPTUNNEL_SRH={0xd}}]}, 0x38}}, 0x0) recvfrom(r1, &(0x7f0000000600)=""/203, 0xcb, 0x42, &(0x7f0000000700)=@hci={0x1f, 0xffffffffffffffff, 0x4}, 0x80) 10:19:21 executing program 3: prlimit64(0x0, 0x0, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x2, &(0x7f0000000080)=0x6) r0 = getpid() sched_setscheduler(r0, 0x2, &(0x7f00000000c0)=0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r1, &(0x7f000057eff8)=@abs, 0x6e) sendmmsg$unix(r2, &(0x7f00000bd000), 0x318, 0x0) recvmmsg(r1, &(0x7f00000000c0), 0x10106, 0x2, 0x0) syz_mount_image$ext4(&(0x7f0000000180)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xfffbffff00000000, 0x8, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000600100000f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000006856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010300), 0x0, 0x640}, {&(0x7f0000010400)="03000000040000000500000016000f000300040000000000000000000f00698c", 0x20, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}, {&(0x7f0000011000)}, {0x0, 0x0, 0x6700000}, {&(0x7f0000000580), 0x0, 0xc000}], 0x0, &(0x7f0000013b00)=ANY=[@ANYBLOB='\x00']) r3 = creat(&(0x7f0000000000)='./file1\x00', 0x18) socket(0x10, 0x3, 0x0) r4 = socket(0x26, 0x3, 0x0) sendmsg$nl_route(r4, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f00000005c0)=@ipv4_newroute={0x38, 0x18, 0xbad, 0x0, 0x0, {0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6}, [@RTA_ENCAP_TYPE={0x6, 0x15, 0x3}, @RTA_ENCAP={0x14, 0x16, 0x0, 0x1, @SEG6_IPTUNNEL_SRH={0xd}}]}, 0x38}}, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f00000005c0)=@ipv4_newroute={0x38, 0x18, 0xbad, 0x0, 0x0, {0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6}, [@RTA_ENCAP_TYPE={0x6, 0x15, 0x3}, @RTA_ENCAP={0x14, 0x16, 0x0, 0x1, @SEG6_IPTUNNEL_SRH={0xd}}]}, 0x38}}, 0x0) execveat(r3, 0x0, &(0x7f0000000380)=[&(0x7f00000001c0)='+{!#\x00', &(0x7f0000000300)='ext4\x00', &(0x7f0000000340)='@(\x00'], &(0x7f00000004c0)=[&(0x7f00000003c0)='ext4\x00', &(0x7f0000000400)='ext4\x00', &(0x7f0000000500)='\x00.D\x04\xe0\xce\x99\xd9\xa9\xac\xac\xadH\xa4\xcf\xb7\xffT\xac\x05\xfd\xdd\xb8w\x0f\x82B\xff\xf2\x909`1!\f\x870\x1f\xc1%Y\xc8\x15c \xea\x1cY!\x04\xe4\x91^\x00\x04\xe4\xa6\xba\xc6\xfd\x10\xdf\xe24\xd4&\x17\xdc\xec\xf4\f\n\xb7.\x13\x8e\x1bYENj\xe1\x19~\x1c\xaf\a;d\x9f\xba\xd9T\xd4-\xecX\xc0Y\x83@\xc7\x8b\xff*\xdd\xaa\xc6,o4\xe2\x0f\x16\x01[\xc0\xeb\x7fFI]WF\x1f\f?\xfa\xb1\xe7\xf6t\x027\xb1\xc17.4V\xf81{9\xa3\xb9\x01\xcck@I\xe2\xf1Y\x10E\xa1z/\x05.~Yh%\x8f\x06sB)N\x11P\xf6p\xff\'\xaf\a7\x10+p\xbb\xf3\xb08\xb5)\x00\xeeg\xd0\xee\xe9\x98\x8d\xf8\xb5G\t@f\x1et v\x14\tT\xc5', 0x0], 0x1000) 10:19:21 executing program 4: r0 = socket$inet_sctp(0x2, 0x1, 0x84) r1 = fcntl$dupfd(r0, 0x0, r0) setsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(r1, 0x84, 0xa, &(0x7f00000004c0)={0x0, @in, 0x7fffffff, 0x0, 0x0, 0x0, 0x80}, 0x98) 10:19:21 executing program 0: r0 = socket(0x2, 0x5, 0x0) getsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(r0, 0x84, 0xa, &(0x7f0000000100), &(0x7f00000001c0)=0x98) 10:19:21 executing program 1: r0 = socket(0x1c, 0x10000001, 0x84) setsockopt$inet_sctp_SCTP_EVENTS(r0, 0x84, 0xc, &(0x7f0000000200)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x46}, 0xb) 10:19:21 executing program 1: r0 = socket$inet6_sctp(0x1c, 0x5, 0x84) sendmsg(r0, &(0x7f0000000340)={&(0x7f0000000080)=@in6={0x1c}, 0x1c, 0x0}, 0x0) 10:19:21 executing program 0: r0 = socket$inet_sctp(0x2, 0x1, 0x84) setsockopt$inet_sctp_SCTP_HMAC_IDENT(r0, 0x84, 0x14, &(0x7f0000000300)=ANY=[@ANYBLOB="070000b5"], 0x12) 10:19:21 executing program 4: r0 = socket$inet_sctp(0x2, 0x1, 0x84) sendmsg$inet_sctp(r0, &(0x7f0000000300)={&(0x7f0000000000)=@in6={0x1c, 0x1c, 0x3}, 0x1c, 0x0}, 0x0) r1 = dup2(r0, r0) getsockopt$inet_sctp_SCTP_STATUS(r1, 0x84, 0x100, &(0x7f0000000340), &(0x7f0000000400)=0xb0) [ 2461.444144][T26928] loop2: detected capacity change from 0 to 264192 [ 2461.464984][T26928] EXT4-fs (loop2): mounted filesystem without journal. Quota mode: writeback. [ 2461.502294][T26933] loop3: detected capacity change from 0 to 264192 [ 2461.539351][T26933] EXT4-fs (loop3): mounted filesystem without journal. Quota mode: writeback. 10:19:30 executing program 5: connect(0xffffffffffffffff, &(0x7f0000000000)=@in6={0x1c, 0x1c}, 0x1c) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)) 10:19:30 executing program 0: r0 = socket$inet_sctp(0x2, 0x5, 0x84) r1 = socket$inet6_sctp(0x1c, 0x5, 0x84) r2 = socket$inet6_sctp(0x1c, 0x5, 0x84) connect$inet6(r2, &(0x7f0000000400)={0x1c, 0x1c, 0x3}, 0x1c) r3 = dup2(r2, r1) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(r3, 0x84, 0x105, &(0x7f0000000180)={0x1, [0x0]}, &(0x7f0000001700)=0x8) setsockopt$inet_sctp_SCTP_MAXSEG(r0, 0x84, 0xe, &(0x7f0000000040), 0x8) 10:19:30 executing program 1: r0 = socket$inet_sctp(0x2, 0x1, 0x84) sendmsg$inet_sctp(r0, &(0x7f0000000240)={&(0x7f0000000040)=@in6={0x1c, 0x1c, 0x2}, 0x1c, 0x0}, 0x0) sendmsg$inet_sctp(r0, &(0x7f0000000340)={&(0x7f0000000140)=@in6={0x1c, 0x1c, 0x3}, 0x1c, 0x0, 0x0, &(0x7f0000000200)=ANY=[@ANYBLOB="1c"], 0x2c}, 0x180) 10:19:30 executing program 2: prlimit64(0x0, 0x0, &(0x7f0000000140)={0x8, 0x8b}, 0x0) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f00000002c0)) r0 = getpid() sched_setscheduler(r0, 0x2, &(0x7f00000000c0)=0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff}) connect$unix(r1, &(0x7f000057eff8)=@abs, 0x6e) recvmmsg(r1, &(0x7f00000000c0), 0x10106, 0x2, 0x0) syz_mount_image$ext4(&(0x7f0000000180)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xfffbffff00000000, 0x8, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000600100000f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000006856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010300), 0x0, 0x640}, {&(0x7f0000010400)="03000000040000000500000016000f000300040000000000000000000f00698c", 0x20, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}, {&(0x7f0000011000)}, {0x0, 0x0, 0x6700000}, {&(0x7f0000000580), 0x0, 0xc000}], 0x0, &(0x7f0000013b00)=ANY=[@ANYBLOB='\x00']) r2 = socket(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f00000005c0)=@ipv4_newroute={0x38, 0x18, 0xbad, 0x0, 0x0, {}, [@RTA_ENCAP_TYPE={0x6, 0x15, 0x3}, @RTA_ENCAP={0x14, 0x16, 0x0, 0x1, @SEG6_IPTUNNEL_SRH={0xd}}]}, 0x38}}, 0x0) r3 = socket(0x26, 0x3, 0x0) sendmsg$nl_route(r3, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f00000005c0)=@ipv4_newroute={0x38, 0x18, 0xbad, 0x0, 0x0, {0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6}, [@RTA_ENCAP_TYPE={0x6, 0x15, 0x3}, @RTA_ENCAP={0x14, 0x16, 0x0, 0x1, @SEG6_IPTUNNEL_SRH={0xd}}]}, 0x38}}, 0x0) r4 = socket(0x10, 0x0, 0x0) sendmsg$nl_route(r4, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f00000005c0)=@ipv4_newroute={0x38, 0x18, 0xbad, 0x0, 0x0, {0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6}, [@RTA_ENCAP_TYPE={0x6, 0x15, 0x3}, @RTA_ENCAP={0x14, 0x16, 0x0, 0x1, @SEG6_IPTUNNEL_SRH={0xd}}]}, 0x38}}, 0x0) recvfrom(r1, &(0x7f0000000600)=""/203, 0xcb, 0x42, &(0x7f0000000700)=@hci={0x1f, 0xffffffffffffffff, 0x4}, 0x80) 10:19:30 executing program 3: prlimit64(0x0, 0xe, 0x0, 0x0) sched_setscheduler(0x0, 0x2, &(0x7f0000000080)=0x6) r0 = getpid() sched_setscheduler(r0, 0x2, &(0x7f00000000c0)=0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r1, &(0x7f000057eff8)=@abs, 0x6e) sendmmsg$unix(r2, &(0x7f00000bd000), 0x318, 0x0) recvmmsg(r1, &(0x7f00000000c0), 0x10106, 0x2, 0x0) syz_mount_image$ext4(&(0x7f0000000180)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xfffbffff00000000, 0x8, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000600100000f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000006856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010300), 0x0, 0x640}, {&(0x7f0000010400)="03000000040000000500000016000f000300040000000000000000000f00698c", 0x20, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}, {&(0x7f0000011000)}, {0x0, 0x0, 0x6700000}, {&(0x7f0000000580), 0x0, 0xc000}], 0x0, &(0x7f0000013b00)=ANY=[@ANYBLOB='\x00']) r3 = creat(&(0x7f0000000000)='./file1\x00', 0x18) socket(0x10, 0x3, 0x0) r4 = socket(0x26, 0x3, 0x0) sendmsg$nl_route(r4, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f00000005c0)=@ipv4_newroute={0x38, 0x18, 0xbad, 0x0, 0x0, {0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6}, [@RTA_ENCAP_TYPE={0x6, 0x15, 0x3}, @RTA_ENCAP={0x14, 0x16, 0x0, 0x1, @SEG6_IPTUNNEL_SRH={0xd}}]}, 0x38}}, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f00000005c0)=@ipv4_newroute={0x38, 0x18, 0xbad, 0x0, 0x0, {0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6}, [@RTA_ENCAP_TYPE={0x6, 0x15, 0x3}, @RTA_ENCAP={0x14, 0x16, 0x0, 0x1, @SEG6_IPTUNNEL_SRH={0xd}}]}, 0x38}}, 0x0) execveat(r3, 0x0, &(0x7f0000000380)=[&(0x7f00000001c0)='+{!#\x00', &(0x7f0000000300)='ext4\x00', &(0x7f0000000340)='@(\x00'], &(0x7f00000004c0)=[&(0x7f00000003c0)='ext4\x00', &(0x7f0000000400)='ext4\x00', &(0x7f0000000500)='\x00.D\x04\xe0\xce\x99\xd9\xa9\xac\xac\xadH\xa4\xcf\xb7\xffT\xac\x05\xfd\xdd\xb8w\x0f\x82B\xff\xf2\x909`1!\f\x870\x1f\xc1%Y\xc8\x15c \xea\x1cY!\x04\xe4\x91^\x00\x04\xe4\xa6\xba\xc6\xfd\x10\xdf\xe24\xd4&\x17\xdc\xec\xf4\f\n\xb7.\x13\x8e\x1bYENj\xe1\x19~\x1c\xaf\a;d\x9f\xba\xd9T\xd4-\xecX\xc0Y\x83@\xc7\x8b\xff*\xdd\xaa\xc6,o4\xe2\x0f\x16\x01[\xc0\xeb\x7fFI]WF\x1f\f?\xfa\xb1\xe7\xf6t\x027\xb1\xc17.4V\xf81{9\xa3\xb9\x01\xcck@I\xe2\xf1Y\x10E\xa1z/\x05.~Yh%\x8f\x06sB)N\x11P\xf6p\xff\'\xaf\a7\x10+p\xbb\xf3\xb08\xb5)\x00\xeeg\xd0\xee\xe9\x98\x8d\xf8\xb5G\t@f\x1et v\x14\tT\xc5', 0x0], 0x1000) 10:19:30 executing program 4: r0 = socket$inet_sctp(0x2, 0x5, 0x84) r1 = socket$inet6_sctp(0x1c, 0x5, 0x84) r2 = dup2(r0, r1) r3 = fcntl$dupfd(r2, 0x0, r1) setsockopt$inet_sctp_SCTP_ASSOCINFO(r3, 0x84, 0x2, &(0x7f0000000300)={0x0, 0x0, 0x0, 0x10000}, 0x14) 10:19:30 executing program 1: r0 = socket$inet_sctp(0x2, 0x1, 0x84) sendmsg$inet_sctp(r0, &(0x7f0000000240)={&(0x7f0000000040)=@in6={0x1c, 0x1c, 0x2}, 0x1c, 0x0}, 0x0) sendmsg$inet_sctp(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000280)='.', 0x1}], 0x1, &(0x7f0000001280)=[@sndinfo={0x1c}], 0x1c}, 0x0) 10:19:30 executing program 4: r0 = socket$inet_sctp(0x2, 0x5, 0x84) bind$inet(r0, &(0x7f00000000c0)={0x10, 0x2}, 0x10) 10:19:30 executing program 0: r0 = socket$inet_sctp(0x2, 0x1, 0x84) setsockopt$sock_int(r0, 0xffff, 0x1002, &(0x7f0000000000)=0x6, 0x4) 10:19:30 executing program 1: r0 = socket$inet_sctp(0x2, 0x1, 0x84) setsockopt$inet_sctp_SCTP_AUTO_ASCONF(r0, 0x84, 0x1e, &(0x7f0000000140)=0x8, 0x4) 10:19:30 executing program 0: r0 = socket(0x1c, 0x10000001, 0x84) sendmsg$inet_sctp(r0, &(0x7f0000000640)={&(0x7f0000000100)=@in={0x10, 0x2}, 0x10, 0x0, 0x0, &(0x7f0000000040)=ANY=[], 0xd}, 0x0) 10:19:30 executing program 4: r0 = socket$inet6_sctp(0x1c, 0x5, 0x84) r1 = dup2(r0, r0) getsockopt$inet_sctp_SCTP_PEER_AUTH_CHUNKS(r1, 0x84, 0x102, &(0x7f00000002c0)=ANY=[@ANYRES32], &(0x7f00000003c0)=0xe6) [ 2469.754072][T26960] loop2: detected capacity change from 0 to 264192 [ 2469.798259][T26960] EXT4-fs (loop2): mounted filesystem without journal. Quota mode: writeback. [ 2469.815626][T26971] loop3: detected capacity change from 0 to 264192 [ 2469.848398][T26971] EXT4-fs (loop3): mounted filesystem without journal. Quota mode: writeback. 10:19:36 executing program 5: r0 = socket(0x1c, 0x10000001, 0x0) r1 = socket$inet_sctp(0x2, 0x5, 0x84) r2 = dup2(r1, r1) r3 = fcntl$dupfd(r2, 0x0, r0) setsockopt$inet_sctp_SCTP_RECONFIG_SUPPORTED(r3, 0x84, 0x29, &(0x7f00000003c0), 0x8) 10:19:36 executing program 1: r0 = socket$inet_sctp(0x2, 0x5, 0x84) connect$inet(r0, &(0x7f0000000040)={0x10, 0x2}, 0x10) setsockopt$inet_sctp_SCTP_AUTO_ASCONF(r0, 0x84, 0x18, &(0x7f0000000440), 0x4) 10:19:36 executing program 0: r0 = socket(0x1c, 0x10000001, 0x84) getsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(r0, 0x84, 0xa, &(0x7f0000000100), &(0x7f00000001c0)=0x98) 10:19:36 executing program 4: r0 = socket$inet_sctp(0x2, 0x5, 0x84) r1 = dup2(r0, r0) getsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(r1, 0x84, 0xa, &(0x7f0000000240), &(0x7f0000000000)=0x98) 10:19:36 executing program 2: prlimit64(0x0, 0x0, &(0x7f0000000140)={0x8, 0x8b}, 0x0) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f00000002c0)) r0 = getpid() sched_setscheduler(r0, 0x2, &(0x7f00000000c0)=0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff}) connect$unix(r1, &(0x7f000057eff8)=@abs, 0x6e) recvmmsg(r1, &(0x7f00000000c0), 0x10106, 0x2, 0x0) syz_mount_image$ext4(&(0x7f0000000180)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xfffbffff00000000, 0x8, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000600100000f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000006856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010300), 0x0, 0x640}, {&(0x7f0000010400)="03000000040000000500000016000f000300040000000000000000000f00698c", 0x20, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}, {&(0x7f0000011000)}, {0x0, 0x0, 0x6700000}, {&(0x7f0000000580), 0x0, 0xc000}], 0x0, &(0x7f0000013b00)=ANY=[@ANYBLOB='\x00']) r2 = socket(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f00000005c0)=@ipv4_newroute={0x38, 0x18, 0xbad, 0x0, 0x0, {}, [@RTA_ENCAP_TYPE={0x6, 0x15, 0x3}, @RTA_ENCAP={0x14, 0x16, 0x0, 0x1, @SEG6_IPTUNNEL_SRH={0xd}}]}, 0x38}}, 0x0) r3 = socket(0x26, 0x3, 0x0) sendmsg$nl_route(r3, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f00000005c0)=@ipv4_newroute={0x38, 0x18, 0xbad, 0x0, 0x0, {0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6}, [@RTA_ENCAP_TYPE={0x6, 0x15, 0x3}, @RTA_ENCAP={0x14, 0x16, 0x0, 0x1, @SEG6_IPTUNNEL_SRH={0xd}}]}, 0x38}}, 0x0) r4 = socket(0x10, 0x0, 0x0) sendmsg$nl_route(r4, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f00000005c0)=@ipv4_newroute={0x38, 0x18, 0xbad, 0x0, 0x0, {0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6}, [@RTA_ENCAP_TYPE={0x6, 0x15, 0x3}, @RTA_ENCAP={0x14, 0x16, 0x0, 0x1, @SEG6_IPTUNNEL_SRH={0xd}}]}, 0x38}}, 0x0) recvfrom(r1, &(0x7f0000000600)=""/203, 0xcb, 0x42, &(0x7f0000000700)=@hci={0x1f, 0xffffffffffffffff, 0x4}, 0x80) 10:19:36 executing program 3: prlimit64(0x0, 0xe, 0x0, 0x0) sched_setscheduler(0x0, 0x2, &(0x7f0000000080)=0x6) r0 = getpid() sched_setscheduler(r0, 0x2, &(0x7f00000000c0)=0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r1, &(0x7f000057eff8)=@abs, 0x6e) sendmmsg$unix(r2, &(0x7f00000bd000), 0x318, 0x0) recvmmsg(r1, &(0x7f00000000c0), 0x10106, 0x2, 0x0) syz_mount_image$ext4(&(0x7f0000000180)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xfffbffff00000000, 0x8, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000600100000f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000006856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010300), 0x0, 0x640}, {&(0x7f0000010400)="03000000040000000500000016000f000300040000000000000000000f00698c", 0x20, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}, {&(0x7f0000011000)}, {0x0, 0x0, 0x6700000}, {&(0x7f0000000580), 0x0, 0xc000}], 0x0, &(0x7f0000013b00)=ANY=[@ANYBLOB='\x00']) r3 = creat(&(0x7f0000000000)='./file1\x00', 0x18) socket(0x10, 0x3, 0x0) r4 = socket(0x26, 0x3, 0x0) sendmsg$nl_route(r4, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f00000005c0)=@ipv4_newroute={0x38, 0x18, 0xbad, 0x0, 0x0, {0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6}, [@RTA_ENCAP_TYPE={0x6, 0x15, 0x3}, @RTA_ENCAP={0x14, 0x16, 0x0, 0x1, @SEG6_IPTUNNEL_SRH={0xd}}]}, 0x38}}, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f00000005c0)=@ipv4_newroute={0x38, 0x18, 0xbad, 0x0, 0x0, {0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6}, [@RTA_ENCAP_TYPE={0x6, 0x15, 0x3}, @RTA_ENCAP={0x14, 0x16, 0x0, 0x1, @SEG6_IPTUNNEL_SRH={0xd}}]}, 0x38}}, 0x0) execveat(r3, 0x0, &(0x7f0000000380)=[&(0x7f00000001c0)='+{!#\x00', &(0x7f0000000300)='ext4\x00', &(0x7f0000000340)='@(\x00'], &(0x7f00000004c0)=[&(0x7f00000003c0)='ext4\x00', &(0x7f0000000400)='ext4\x00', &(0x7f0000000500)='\x00.D\x04\xe0\xce\x99\xd9\xa9\xac\xac\xadH\xa4\xcf\xb7\xffT\xac\x05\xfd\xdd\xb8w\x0f\x82B\xff\xf2\x909`1!\f\x870\x1f\xc1%Y\xc8\x15c \xea\x1cY!\x04\xe4\x91^\x00\x04\xe4\xa6\xba\xc6\xfd\x10\xdf\xe24\xd4&\x17\xdc\xec\xf4\f\n\xb7.\x13\x8e\x1bYENj\xe1\x19~\x1c\xaf\a;d\x9f\xba\xd9T\xd4-\xecX\xc0Y\x83@\xc7\x8b\xff*\xdd\xaa\xc6,o4\xe2\x0f\x16\x01[\xc0\xeb\x7fFI]WF\x1f\f?\xfa\xb1\xe7\xf6t\x027\xb1\xc17.4V\xf81{9\xa3\xb9\x01\xcck@I\xe2\xf1Y\x10E\xa1z/\x05.~Yh%\x8f\x06sB)N\x11P\xf6p\xff\'\xaf\a7\x10+p\xbb\xf3\xb08\xb5)\x00\xeeg\xd0\xee\xe9\x98\x8d\xf8\xb5G\t@f\x1et v\x14\tT\xc5', 0x0], 0x1000) 10:19:36 executing program 4: r0 = socket$inet_sctp(0x2, 0x5, 0x84) connect$inet(r0, &(0x7f0000000140)={0x10, 0x2}, 0x10) 10:19:36 executing program 1: r0 = socket$inet_sctp(0x2, 0x1, 0x84) sendmsg$inet_sctp(r0, &(0x7f0000000240)={&(0x7f0000000040)=@in6={0x1c, 0x1c, 0x2}, 0x1c, 0x0}, 0x0) sendmsg$inet_sctp(r0, &(0x7f0000000340)={&(0x7f0000000140)=@in6={0x1c, 0x1c, 0x3}, 0x1c, 0x0, 0x0, &(0x7f0000000200)=ANY=[@ANYBLOB="1c"], 0x2c}, 0x180) 10:19:36 executing program 0: r0 = socket(0x1c, 0x10000001, 0x0) r1 = socket$inet_sctp(0x2, 0x5, 0x84) connect$inet(r1, &(0x7f0000000040)={0x10, 0x2}, 0x10) r2 = dup2(r1, r1) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(r2, 0x84, 0x105, &(0x7f0000000100)={0x1, [0x0]}, &(0x7f00000000c0)=0x8) r3 = fcntl$dupfd(r2, 0x0, r0) r4 = socket$inet_sctp(0x2, 0x5, 0x84) r5 = dup2(r4, r4) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(r5, 0x84, 0x105, &(0x7f0000000100)={0x1, [0x0]}, &(0x7f00000000c0)=0x8) setsockopt$inet_sctp_SCTP_RECONFIG_SUPPORTED(r3, 0x84, 0x29, &(0x7f00000003c0)={r6}, 0x8) 10:19:36 executing program 4: r0 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_sctp_SCTP_AUTH_KEY(r0, 0x84, 0x13, &(0x7f0000000000), 0x8) 10:19:36 executing program 0: r0 = socket(0x1c, 0x10000001, 0x84) setsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(r0, 0x84, 0xa, &(0x7f0000000440), 0x98) 10:19:36 executing program 1: r0 = socket(0x1c, 0x10000001, 0x84) setsockopt$inet_sctp_SCTP_RECONFIG_SUPPORTED(r0, 0x84, 0x29, &(0x7f0000000100), 0x8) [ 2476.005397][T27001] loop2: detected capacity change from 0 to 264192 [ 2476.016076][T27001] EXT4-fs (loop2): mounted filesystem without journal. Quota mode: writeback. [ 2476.049600][T27005] loop3: detected capacity change from 0 to 264192 [ 2476.091158][T27005] EXT4-fs (loop3): mounted filesystem without journal. Quota mode: writeback. 10:19:43 executing program 5: r0 = socket(0x1c, 0x10000001, 0x84) sendto$unix(r0, 0x0, 0x0, 0x0, &(0x7f0000000600)=@file={0xa}, 0xa) 10:19:43 executing program 1: r0 = socket$inet_sctp(0x2, 0x1, 0x84) sendmsg$inet_sctp(r0, &(0x7f0000000240)={&(0x7f0000000040)=@in6={0x1c, 0x1c, 0x2}, 0x1c, 0x0}, 0x0) sendmsg$inet_sctp(r0, &(0x7f0000001780)={0x0, 0x0, 0x0, 0x0, &(0x7f0000001680)=[@dstaddrv6={0x1c, 0x84, 0xa, @remote={0xfe, 0x80, '\x00', 0x0}}, @sndrcv={0x2c}], 0x48}, 0x20110) 10:19:43 executing program 4: r0 = socket$inet_sctp(0x2, 0x1, 0x84) setsockopt$inet_sctp_SCTP_FRAGMENT_INTERLEAVE(r0, 0x84, 0x10, &(0x7f0000000100), 0x4) 10:19:43 executing program 0: r0 = socket$inet_sctp(0x2, 0x1, 0x84) r1 = fcntl$dupfd(r0, 0x0, r0) setsockopt$inet_sctp_SCTP_DEFAULT_SNDINFO(r1, 0x84, 0x21, &(0x7f0000000040)={0x0, 0x1400}, 0x10) sendmsg$inet_sctp(r1, &(0x7f0000000780)={0x0, 0x0, &(0x7f0000000700)=[{&(0x7f00000000c0)="c9", 0x1}], 0x1}, 0x0) 10:19:43 executing program 3: prlimit64(0x0, 0xe, 0x0, 0x0) sched_setscheduler(0x0, 0x2, &(0x7f0000000080)=0x6) r0 = getpid() sched_setscheduler(r0, 0x2, &(0x7f00000000c0)=0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r1, &(0x7f000057eff8)=@abs, 0x6e) sendmmsg$unix(r2, &(0x7f00000bd000), 0x318, 0x0) recvmmsg(r1, &(0x7f00000000c0), 0x10106, 0x2, 0x0) syz_mount_image$ext4(&(0x7f0000000180)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xfffbffff00000000, 0x8, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000600100000f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000006856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010300), 0x0, 0x640}, {&(0x7f0000010400)="03000000040000000500000016000f000300040000000000000000000f00698c", 0x20, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}, {&(0x7f0000011000)}, {0x0, 0x0, 0x6700000}, {&(0x7f0000000580), 0x0, 0xc000}], 0x0, &(0x7f0000013b00)=ANY=[@ANYBLOB='\x00']) r3 = creat(&(0x7f0000000000)='./file1\x00', 0x18) socket(0x10, 0x3, 0x0) r4 = socket(0x26, 0x3, 0x0) sendmsg$nl_route(r4, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f00000005c0)=@ipv4_newroute={0x38, 0x18, 0xbad, 0x0, 0x0, {0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6}, [@RTA_ENCAP_TYPE={0x6, 0x15, 0x3}, @RTA_ENCAP={0x14, 0x16, 0x0, 0x1, @SEG6_IPTUNNEL_SRH={0xd}}]}, 0x38}}, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f00000005c0)=@ipv4_newroute={0x38, 0x18, 0xbad, 0x0, 0x0, {0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6}, [@RTA_ENCAP_TYPE={0x6, 0x15, 0x3}, @RTA_ENCAP={0x14, 0x16, 0x0, 0x1, @SEG6_IPTUNNEL_SRH={0xd}}]}, 0x38}}, 0x0) execveat(r3, 0x0, &(0x7f0000000380)=[&(0x7f00000001c0)='+{!#\x00', &(0x7f0000000300)='ext4\x00', &(0x7f0000000340)='@(\x00'], &(0x7f00000004c0)=[&(0x7f00000003c0)='ext4\x00', &(0x7f0000000400)='ext4\x00', &(0x7f0000000500)='\x00.D\x04\xe0\xce\x99\xd9\xa9\xac\xac\xadH\xa4\xcf\xb7\xffT\xac\x05\xfd\xdd\xb8w\x0f\x82B\xff\xf2\x909`1!\f\x870\x1f\xc1%Y\xc8\x15c \xea\x1cY!\x04\xe4\x91^\x00\x04\xe4\xa6\xba\xc6\xfd\x10\xdf\xe24\xd4&\x17\xdc\xec\xf4\f\n\xb7.\x13\x8e\x1bYENj\xe1\x19~\x1c\xaf\a;d\x9f\xba\xd9T\xd4-\xecX\xc0Y\x83@\xc7\x8b\xff*\xdd\xaa\xc6,o4\xe2\x0f\x16\x01[\xc0\xeb\x7fFI]WF\x1f\f?\xfa\xb1\xe7\xf6t\x027\xb1\xc17.4V\xf81{9\xa3\xb9\x01\xcck@I\xe2\xf1Y\x10E\xa1z/\x05.~Yh%\x8f\x06sB)N\x11P\xf6p\xff\'\xaf\a7\x10+p\xbb\xf3\xb08\xb5)\x00\xeeg\xd0\xee\xe9\x98\x8d\xf8\xb5G\t@f\x1et v\x14\tT\xc5', 0x0], 0x1000) 10:19:43 executing program 2: prlimit64(0x0, 0x0, &(0x7f0000000140)={0x8, 0x8b}, 0x0) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f00000002c0)) r0 = getpid() sched_setscheduler(r0, 0x2, &(0x7f00000000c0)=0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff}) connect$unix(r1, &(0x7f000057eff8)=@abs, 0x6e) recvmmsg(r1, &(0x7f00000000c0), 0x10106, 0x2, 0x0) syz_mount_image$ext4(&(0x7f0000000180)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xfffbffff00000000, 0x8, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000600100000f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000006856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010300), 0x0, 0x640}, {&(0x7f0000010400)="03000000040000000500000016000f000300040000000000000000000f00698c", 0x20, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}, {&(0x7f0000011000)}, {0x0, 0x0, 0x6700000}, {&(0x7f0000000580), 0x0, 0xc000}], 0x0, &(0x7f0000013b00)=ANY=[@ANYBLOB='\x00']) r2 = socket(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f00000005c0)=@ipv4_newroute={0x38, 0x18, 0xbad, 0x0, 0x0, {}, [@RTA_ENCAP_TYPE={0x6, 0x15, 0x3}, @RTA_ENCAP={0x14, 0x16, 0x0, 0x1, @SEG6_IPTUNNEL_SRH={0xd}}]}, 0x38}}, 0x0) r3 = socket(0x26, 0x3, 0x0) sendmsg$nl_route(r3, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f00000005c0)=@ipv4_newroute={0x38, 0x18, 0xbad, 0x0, 0x0, {0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6}, [@RTA_ENCAP_TYPE={0x6, 0x15, 0x3}, @RTA_ENCAP={0x14, 0x16, 0x0, 0x1, @SEG6_IPTUNNEL_SRH={0xd}}]}, 0x38}}, 0x0) r4 = socket(0x10, 0x0, 0x0) sendmsg$nl_route(r4, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f00000005c0)=@ipv4_newroute={0x38, 0x18, 0xbad, 0x0, 0x0, {0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6}, [@RTA_ENCAP_TYPE={0x6, 0x15, 0x3}, @RTA_ENCAP={0x14, 0x16, 0x0, 0x1, @SEG6_IPTUNNEL_SRH={0xd}}]}, 0x38}}, 0x0) recvfrom(r1, &(0x7f0000000600)=""/203, 0xcb, 0x42, &(0x7f0000000700)=@hci={0x1f, 0xffffffffffffffff, 0x4}, 0x80) 10:19:43 executing program 4: r0 = socket(0x1c, 0x10000001, 0x84) setsockopt$inet_sctp_SCTP_ASSOCINFO(r0, 0x84, 0x2, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x6e60}, 0x14) 10:19:43 executing program 0: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$netlbl_cipso(&(0x7f0000000040), r0) sendmsg$NLBL_CIPSOV4_C_ADD(r0, &(0x7f0000000440)={0x0, 0x0, &(0x7f0000000400)={&(0x7f0000000100)={0x14, r1, 0x1, 0x0, 0x0, {0x7}}, 0x14}}, 0x0) 10:19:43 executing program 1: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r0, &(0x7f0000001f40)={0x0, 0x0, &(0x7f0000001f00)={&(0x7f0000000000)={{0x14}, [@NFT_MSG_NEWCHAIN={0x6c, 0x3, 0xa, 0x0, 0x0, 0x0, {0x0, 0x0, 0x4}, [@NFTA_CHAIN_ID={0x8}, @NFTA_CHAIN_NAME={0x9, 0x3, 'syz2\x00'}, @NFTA_CHAIN_ID={0x8}, @NFTA_CHAIN_ID={0x8}, @NFTA_CHAIN_HOOK={0x28, 0x4, 0x0, 0x1, [@NFTA_HOOK_PRIORITY={0x8, 0x2, 0x1, 0x0, 0x510bdcc9}, @NFTA_HOOK_PRIORITY={0x8, 0x2, 0x1, 0x0, 0x5ffc504e}, @NFTA_HOOK_DEV={0x14, 0x3, 'veth0_vlan\x00'}]}, @NFTA_CHAIN_TABLE={0x9, 0x1, 'syz1\x00'}]}, @NFT_MSG_DELSET={0x12c, 0xb, 0xa, 0x101, 0x0, 0x0, {0x1}, [@NFTA_SET_FLAGS={0x8}, @NFTA_SET_TABLE={0x9, 0x1, 'syz0\x00'}, @NFTA_SET_ID={0x8}, @NFTA_SET_USERDATA={0xf9, 0xd, 0x1, 0x0, "5bc64cddebc9600eaaa97d8eb0cdc4011c4e7a98efbd646c4216e7221e611bd07474c56812b9b8addf89f8bc4e9a67581faa616149d347a2377960795e93967ce2a8ddb9405b07454a6c3c941ae93f7fad26975b9ac076b321197346544b4ae98dae95491d65a14ce247256be20cc3baa7361410c879e3aec04ec20963e89a0baf7887aa82cfb178e4317b5a6de64f00492e16c060e1e4352ca4350271a99402aae5fa7ec95dda31f636c7f8b4df93bd1c281d1d3015870c69771fac98bb5bc68a13b1a0346ebbf43c25a49530683aad9b9614b1600c66d216b18c76a3c705ab4cdadd3a14cb05edfd46578f69745cf59eb5a9db9b"}]}, @NFT_MSG_NEWOBJ={0x28, 0x12, 0xa, 0x0, 0x0, 0x0, {}, @NFT_OBJECT_SYNPROXY=@NFTA_OBJ_DATA={0x14, 0x4, 0x0, 0x1, [@NFTA_SYNPROXY_FLAGS={0x8}, @NFTA_SYNPROXY_FLAGS={0x8}]}}, @NFT_MSG_NEWOBJ={0x1c, 0x12, 0xa, 0x0, 0x0, 0x0, {}, @NFT_OBJECT_CT_TIMEOUT=@NFTA_OBJ_TYPE={0x8}}, @NFT_MSG_DELOBJ={0x104, 0x14, 0xa, 0x201, 0x0, 0x0, {}, [@NFTA_OBJ_TYPE={0x8}, @NFTA_OBJ_USERDATA={0xc3, 0x8, "8e9e32a1d6d21e12f326e219209a0697b23f8de209f8dea16a17a3b10f7e94d77afc40b621f8442b2259dcd794e87274eb831a413f90a24139b039be44c82a66a55badaa38000dfc7f395f591db327d069f18eae586f68a886f77c104f38bc7dbada2d691d0ef96693bda2a50acda42ffb6a06f357c4ffe835c8e8930f06274c8448e1313f466caf38602daf68fcdb253cdce19346dfa49fcd70bd2d3a8970ba1b21f712051daf434d303ff1ae4864297a8e635c49b62918a459c1ee8de330"}, @NFTA_OBJ_HANDLE={0xc}, @NFTA_OBJ_NAME={0x9, 0x2, 'syz1\x00'}, @NFTA_OBJ_NAME={0x9, 0x2, 'syz1\x00'}]}, @NFT_MSG_NEWFLOWTABLE={0xac, 0x16, 0xa, 0x801, 0x0, 0x0, {}, [@NFTA_FLOWTABLE_HOOK={0xfffffffffffffd88, 0x3, 0x0, 0x1, [@NFTA_FLOWTABLE_HOOK_NUM={0x8}, @NFTA_FLOWTABLE_HOOK_NUM={0x8}, @NFTA_FLOWTABLE_HOOK_NUM={0x8}, @NFTA_FLOWTABLE_HOOK_DEVS={0x68, 0x3, 0x0, 0x1, [{0x14, 0x1, 'erspan0\x00'}, {0x14, 0x1, 'xfrm0\x00'}, {0x14, 0x1, 'ipvlan1\x00'}, {0x14, 0x1, 'bond_slave_0\x00'}, {0x14, 0x1, 'tunl0\x00'}]}, @NFTA_FLOWTABLE_HOOK_NUM={0x8}]}, @NFTA_FLOWTABLE_NAME={0x9, 0x2, 'syz1\x00'}]}, @NFT_MSG_NEWSET={0xc4, 0x9, 0xa, 0x0, 0x0, 0x0, {}, [@NFTA_SET_USERDATA={0x96, 0xd, 0x1, 0x0, "007c5c3cff58ae69683043858ff556f11491b42063f638cfb9ecf56ac5ebbec9023753791e44cbea6bf12502d76a6762ac29cc39fa9cdee0a549ff2ce0b7bab91597ccb06bece8882421eae65fc314b9b70fcad6059013d0d61d93de1ea1fa505a015e2d302d070403f46783094f4cb92f497f5667557208a4c1cd909e9668cbcf229c07345abd0f2b9ee4d1bb695942a6b6"}, @NFTA_SET_KEY_TYPE={0x8}, @NFTA_SET_KEY_LEN={0x8}, @NFTA_SET_ID={0x8}]}], {0x14}}, 0x478}}, 0x0) 10:19:43 executing program 0: r0 = socket(0x1c, 0x10000001, 0x84) getsockopt$inet_sctp_SCTP_DEFAULT_SNDINFO(r0, 0x84, 0x21, &(0x7f0000000100), &(0x7f0000000180)=0x10) 10:19:43 executing program 4: r0 = socket$inet6_sctp(0x1c, 0x1, 0x84) bind(r0, &(0x7f0000000200)=@in6={0x1c, 0x1c}, 0x1c) 10:19:43 executing program 1: r0 = socket$inet_sctp(0x2, 0x5, 0x84) connect(r0, &(0x7f0000000000)=@in6={0x1c, 0x1c, 0x2}, 0x5c) [ 2483.136966][T27026] netlink: 152 bytes leftover after parsing attributes in process `syz-executor.1'. [ 2483.156769][T27032] loop2: detected capacity change from 0 to 264192 [ 2483.199126][T27032] EXT4-fs (loop2): mounted filesystem without journal. Quota mode: writeback. [ 2483.222069][T27039] loop3: detected capacity change from 0 to 264192 [ 2483.251216][T27039] EXT4-fs (loop3): mounted filesystem without journal. Quota mode: writeback. 10:19:50 executing program 5: r0 = socket$inet_sctp(0x2, 0x1, 0x84) close(r0) r1 = socket$inet6_sctp(0x1c, 0x5, 0x84) connect$inet6(r1, &(0x7f0000000000)={0x1c, 0x1c, 0x3}, 0x1c) r2 = dup2(r1, r1) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(r2, 0x84, 0x105, &(0x7f0000000080)={0x1, [0x0]}, &(0x7f0000000100)=0x8) getsockopt$inet_sctp_SCTP_PR_ASSOC_STATUS(r0, 0x84, 0x108, &(0x7f0000000000)={r3}, &(0x7f0000000080)=0x18) 10:19:50 executing program 4: r0 = socket$inet6_sctp(0x1c, 0x1, 0x84) bind(r0, &(0x7f0000000040)=@un=@abs={0x8}, 0x8) 10:19:50 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) recvmsg(r0, &(0x7f00000008c0)={0x0, 0x0, 0x0}, 0x0) 10:19:50 executing program 1: r0 = socket$inet_sctp(0x2, 0x1, 0x84) sendmsg$inet_sctp(r0, &(0x7f0000000300)={&(0x7f0000000000)=@in6={0x1c, 0x1c, 0x3}, 0x1c, 0x0}, 0x0) getsockopt$inet_sctp_SCTP_GET_PEER_ADDR_INFO(r0, 0x84, 0x101, &(0x7f0000000080), &(0x7f0000000140)=0x98) 10:19:50 executing program 2: prlimit64(0x0, 0xe, 0x0, 0x0) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f00000002c0)) r0 = getpid() sched_setscheduler(r0, 0x2, &(0x7f00000000c0)=0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff}) connect$unix(r1, &(0x7f000057eff8)=@abs, 0x6e) recvmmsg(r1, &(0x7f00000000c0), 0x10106, 0x2, 0x0) syz_mount_image$ext4(&(0x7f0000000180)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xfffbffff00000000, 0x8, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000600100000f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000006856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010300), 0x0, 0x640}, {&(0x7f0000010400)="03000000040000000500000016000f000300040000000000000000000f00698c", 0x20, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}, {&(0x7f0000011000)}, {0x0, 0x0, 0x6700000}, {&(0x7f0000000580), 0x0, 0xc000}], 0x0, &(0x7f0000013b00)=ANY=[@ANYBLOB='\x00']) r2 = socket(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f00000005c0)=@ipv4_newroute={0x38, 0x18, 0xbad, 0x0, 0x0, {}, [@RTA_ENCAP_TYPE={0x6, 0x15, 0x3}, @RTA_ENCAP={0x14, 0x16, 0x0, 0x1, @SEG6_IPTUNNEL_SRH={0xd}}]}, 0x38}}, 0x0) r3 = socket(0x26, 0x3, 0x0) sendmsg$nl_route(r3, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f00000005c0)=@ipv4_newroute={0x38, 0x18, 0xbad, 0x0, 0x0, {0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6}, [@RTA_ENCAP_TYPE={0x6, 0x15, 0x3}, @RTA_ENCAP={0x14, 0x16, 0x0, 0x1, @SEG6_IPTUNNEL_SRH={0xd}}]}, 0x38}}, 0x0) r4 = socket(0x10, 0x0, 0x0) sendmsg$nl_route(r4, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f00000005c0)=@ipv4_newroute={0x38, 0x18, 0xbad, 0x0, 0x0, {0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6}, [@RTA_ENCAP_TYPE={0x6, 0x15, 0x3}, @RTA_ENCAP={0x14, 0x16, 0x0, 0x1, @SEG6_IPTUNNEL_SRH={0xd}}]}, 0x38}}, 0x0) recvfrom(r1, &(0x7f0000000600)=""/203, 0xcb, 0x42, &(0x7f0000000700)=@hci={0x1f, 0xffffffffffffffff, 0x4}, 0x80) 10:19:50 executing program 3: prlimit64(0x0, 0xe, &(0x7f0000000140)={0x0, 0x8b}, 0x0) sched_setscheduler(0x0, 0x2, &(0x7f0000000080)=0x6) r0 = getpid() sched_setscheduler(r0, 0x2, &(0x7f00000000c0)=0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r1, &(0x7f000057eff8)=@abs, 0x6e) sendmmsg$unix(r2, &(0x7f00000bd000), 0x318, 0x0) recvmmsg(r1, &(0x7f00000000c0), 0x10106, 0x2, 0x0) syz_mount_image$ext4(&(0x7f0000000180)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xfffbffff00000000, 0x8, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000600100000f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000006856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010300), 0x0, 0x640}, {&(0x7f0000010400)="03000000040000000500000016000f000300040000000000000000000f00698c", 0x20, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}, {&(0x7f0000011000)}, {0x0, 0x0, 0x6700000}, {&(0x7f0000000580), 0x0, 0xc000}], 0x0, &(0x7f0000013b00)=ANY=[@ANYBLOB='\x00']) r3 = creat(&(0x7f0000000000)='./file1\x00', 0x18) socket(0x10, 0x3, 0x0) r4 = socket(0x26, 0x3, 0x0) sendmsg$nl_route(r4, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f00000005c0)=@ipv4_newroute={0x38, 0x18, 0xbad, 0x0, 0x0, {0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6}, [@RTA_ENCAP_TYPE={0x6, 0x15, 0x3}, @RTA_ENCAP={0x14, 0x16, 0x0, 0x1, @SEG6_IPTUNNEL_SRH={0xd}}]}, 0x38}}, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f00000005c0)=@ipv4_newroute={0x38, 0x18, 0xbad, 0x0, 0x0, {0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6}, [@RTA_ENCAP_TYPE={0x6, 0x15, 0x3}, @RTA_ENCAP={0x14, 0x16, 0x0, 0x1, @SEG6_IPTUNNEL_SRH={0xd}}]}, 0x38}}, 0x0) execveat(r3, 0x0, &(0x7f0000000380)=[&(0x7f00000001c0)='+{!#\x00', &(0x7f0000000300)='ext4\x00', &(0x7f0000000340)='@(\x00'], &(0x7f00000004c0)=[&(0x7f00000003c0)='ext4\x00', &(0x7f0000000400)='ext4\x00', &(0x7f0000000500)='\x00.D\x04\xe0\xce\x99\xd9\xa9\xac\xac\xadH\xa4\xcf\xb7\xffT\xac\x05\xfd\xdd\xb8w\x0f\x82B\xff\xf2\x909`1!\f\x870\x1f\xc1%Y\xc8\x15c \xea\x1cY!\x04\xe4\x91^\x00\x04\xe4\xa6\xba\xc6\xfd\x10\xdf\xe24\xd4&\x17\xdc\xec\xf4\f\n\xb7.\x13\x8e\x1bYENj\xe1\x19~\x1c\xaf\a;d\x9f\xba\xd9T\xd4-\xecX\xc0Y\x83@\xc7\x8b\xff*\xdd\xaa\xc6,o4\xe2\x0f\x16\x01[\xc0\xeb\x7fFI]WF\x1f\f?\xfa\xb1\xe7\xf6t\x027\xb1\xc17.4V\xf81{9\xa3\xb9\x01\xcck@I\xe2\xf1Y\x10E\xa1z/\x05.~Yh%\x8f\x06sB)N\x11P\xf6p\xff\'\xaf\a7\x10+p\xbb\xf3\xb08\xb5)\x00\xeeg\xd0\xee\xe9\x98\x8d\xf8\xb5G\t@f\x1et v\x14\tT\xc5', 0x0], 0x1000) 10:19:50 executing program 1: r0 = socket$inet_sctp(0x2, 0x5, 0x84) connect$inet(r0, &(0x7f0000000040)={0x10, 0x2}, 0x10) r1 = dup2(r0, r0) sendto$inet(r1, 0x0, 0x0, 0x0, &(0x7f0000000340)={0x10, 0x2}, 0x10) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(r1, 0x84, 0x105, &(0x7f0000000380)=ANY=[], &(0x7f0000000140)=0x10) 10:19:50 executing program 4: r0 = socket$inet6_sctp(0x1c, 0x1, 0x84) sendmsg(r0, &(0x7f0000000040)={&(0x7f0000000000)=@in6={0x1c, 0x1c, 0x3}, 0x2e, 0x0, 0x0, &(0x7f00000001c0)=ANY=[@ANYBLOB="a800000084"], 0xa8}, 0x0) 10:19:50 executing program 1: r0 = socket$inet_sctp(0x2, 0x1, 0x84) sendmsg$inet_sctp(r0, &(0x7f0000000240)={&(0x7f0000000040)=@in6={0x1c, 0x1c, 0x2}, 0x1c, 0x0}, 0x0) sendmsg$inet_sctp(r0, &(0x7f00000004c0)={&(0x7f00000001c0)=@in={0x10, 0x2}, 0x10, &(0x7f00000003c0)=[{&(0x7f0000000280)='z', 0x1}], 0x1, &(0x7f0000000400)=[@sndrcv={0x2c}], 0x2c}, 0x0) 10:19:50 executing program 1: r0 = socket$inet_sctp(0x2, 0x5, 0x84) r1 = dup(r0) getsockopt$inet_sctp_SCTP_STATUS(r1, 0x84, 0x100, &(0x7f0000000080), &(0x7f0000000000)=0xb0) 10:19:50 executing program 4: r0 = socket$inet6_sctp(0x1c, 0x1, 0x84) connect$inet6(r0, &(0x7f00000014c0)={0x1c, 0x1c, 0x3}, 0x1c) sendmsg$inet_sctp(r0, &(0x7f0000001480)={0x0, 0x0, 0x0}, 0x100) 10:19:50 executing program 1: r0 = socket$inet_sctp(0x2, 0x1, 0x84) sendmsg$inet_sctp(r0, &(0x7f0000000240)={&(0x7f0000000040)=@in6={0x1c, 0x1c, 0x2}, 0x1c, 0x0}, 0x0) getsockopt$inet_sctp_SCTP_GET_PEER_ADDR_INFO(r0, 0x84, 0x101, &(0x7f0000000080), &(0x7f0000000000)=0x98) [ 2490.269019][T27068] loop2: detected capacity change from 0 to 264192 [ 2490.291679][T27068] EXT4-fs (loop2): mounted filesystem without journal. Quota mode: writeback. [ 2490.328293][T27077] loop3: detected capacity change from 0 to 264192 [ 2490.341751][T27077] EXT4-fs (loop3): mounted filesystem without journal. Quota mode: writeback. 10:19:57 executing program 5: r0 = socket$inet_sctp(0x2, 0x5, 0x84) getsockopt$inet_sctp_SCTP_GET_PEER_ADDR_INFO(r0, 0x84, 0x101, &(0x7f0000000200), &(0x7f00000000c0)=0x98) 10:19:57 executing program 1: r0 = socket$inet_sctp(0x2, 0x5, 0x84) getsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(r0, 0x84, 0xa, &(0x7f0000000080), &(0x7f0000000000)=0x98) 10:19:57 executing program 4: r0 = socket(0x1c, 0x1, 0x84) getsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(r0, 0x84, 0xa, &(0x7f0000000140), &(0x7f0000000040)=0x98) 10:19:57 executing program 2: prlimit64(0x0, 0xe, 0x0, 0x0) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f00000002c0)) r0 = getpid() sched_setscheduler(r0, 0x2, &(0x7f00000000c0)=0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff}) connect$unix(r1, &(0x7f000057eff8)=@abs, 0x6e) recvmmsg(r1, &(0x7f00000000c0), 0x10106, 0x2, 0x0) syz_mount_image$ext4(&(0x7f0000000180)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xfffbffff00000000, 0x8, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000600100000f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000006856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010300), 0x0, 0x640}, {&(0x7f0000010400)="03000000040000000500000016000f000300040000000000000000000f00698c", 0x20, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}, {&(0x7f0000011000)}, {0x0, 0x0, 0x6700000}, {&(0x7f0000000580), 0x0, 0xc000}], 0x0, &(0x7f0000013b00)=ANY=[@ANYBLOB='\x00']) r2 = socket(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f00000005c0)=@ipv4_newroute={0x38, 0x18, 0xbad, 0x0, 0x0, {}, [@RTA_ENCAP_TYPE={0x6, 0x15, 0x3}, @RTA_ENCAP={0x14, 0x16, 0x0, 0x1, @SEG6_IPTUNNEL_SRH={0xd}}]}, 0x38}}, 0x0) r3 = socket(0x26, 0x3, 0x0) sendmsg$nl_route(r3, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f00000005c0)=@ipv4_newroute={0x38, 0x18, 0xbad, 0x0, 0x0, {0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6}, [@RTA_ENCAP_TYPE={0x6, 0x15, 0x3}, @RTA_ENCAP={0x14, 0x16, 0x0, 0x1, @SEG6_IPTUNNEL_SRH={0xd}}]}, 0x38}}, 0x0) r4 = socket(0x10, 0x0, 0x0) sendmsg$nl_route(r4, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f00000005c0)=@ipv4_newroute={0x38, 0x18, 0xbad, 0x0, 0x0, {0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6}, [@RTA_ENCAP_TYPE={0x6, 0x15, 0x3}, @RTA_ENCAP={0x14, 0x16, 0x0, 0x1, @SEG6_IPTUNNEL_SRH={0xd}}]}, 0x38}}, 0x0) recvfrom(r1, &(0x7f0000000600)=""/203, 0xcb, 0x42, &(0x7f0000000700)=@hci={0x1f, 0xffffffffffffffff, 0x4}, 0x80) 10:19:57 executing program 0: r0 = socket$inet_sctp(0x2, 0x5, 0x84) connect$inet(r0, &(0x7f0000000040)={0x10, 0x2}, 0x10) sendmsg$inet_sctp(r0, &(0x7f00000005c0)={&(0x7f0000000000)=@in={0x10, 0x2}, 0x10, 0x0}, 0x0) 10:19:57 executing program 3: prlimit64(0x0, 0xe, &(0x7f0000000140)={0x0, 0x8b}, 0x0) sched_setscheduler(0x0, 0x2, &(0x7f0000000080)=0x6) r0 = getpid() sched_setscheduler(r0, 0x2, &(0x7f00000000c0)=0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r1, &(0x7f000057eff8)=@abs, 0x6e) sendmmsg$unix(r2, &(0x7f00000bd000), 0x318, 0x0) recvmmsg(r1, &(0x7f00000000c0), 0x10106, 0x2, 0x0) syz_mount_image$ext4(&(0x7f0000000180)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xfffbffff00000000, 0x8, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000600100000f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000006856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010300), 0x0, 0x640}, {&(0x7f0000010400)="03000000040000000500000016000f000300040000000000000000000f00698c", 0x20, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}, {&(0x7f0000011000)}, {0x0, 0x0, 0x6700000}, {&(0x7f0000000580), 0x0, 0xc000}], 0x0, &(0x7f0000013b00)=ANY=[@ANYBLOB='\x00']) r3 = creat(&(0x7f0000000000)='./file1\x00', 0x18) socket(0x10, 0x3, 0x0) r4 = socket(0x26, 0x3, 0x0) sendmsg$nl_route(r4, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f00000005c0)=@ipv4_newroute={0x38, 0x18, 0xbad, 0x0, 0x0, {0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6}, [@RTA_ENCAP_TYPE={0x6, 0x15, 0x3}, @RTA_ENCAP={0x14, 0x16, 0x0, 0x1, @SEG6_IPTUNNEL_SRH={0xd}}]}, 0x38}}, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f00000005c0)=@ipv4_newroute={0x38, 0x18, 0xbad, 0x0, 0x0, {0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6}, [@RTA_ENCAP_TYPE={0x6, 0x15, 0x3}, @RTA_ENCAP={0x14, 0x16, 0x0, 0x1, @SEG6_IPTUNNEL_SRH={0xd}}]}, 0x38}}, 0x0) execveat(r3, 0x0, &(0x7f0000000380)=[&(0x7f00000001c0)='+{!#\x00', &(0x7f0000000300)='ext4\x00', &(0x7f0000000340)='@(\x00'], &(0x7f00000004c0)=[&(0x7f00000003c0)='ext4\x00', &(0x7f0000000400)='ext4\x00', &(0x7f0000000500)='\x00.D\x04\xe0\xce\x99\xd9\xa9\xac\xac\xadH\xa4\xcf\xb7\xffT\xac\x05\xfd\xdd\xb8w\x0f\x82B\xff\xf2\x909`1!\f\x870\x1f\xc1%Y\xc8\x15c \xea\x1cY!\x04\xe4\x91^\x00\x04\xe4\xa6\xba\xc6\xfd\x10\xdf\xe24\xd4&\x17\xdc\xec\xf4\f\n\xb7.\x13\x8e\x1bYENj\xe1\x19~\x1c\xaf\a;d\x9f\xba\xd9T\xd4-\xecX\xc0Y\x83@\xc7\x8b\xff*\xdd\xaa\xc6,o4\xe2\x0f\x16\x01[\xc0\xeb\x7fFI]WF\x1f\f?\xfa\xb1\xe7\xf6t\x027\xb1\xc17.4V\xf81{9\xa3\xb9\x01\xcck@I\xe2\xf1Y\x10E\xa1z/\x05.~Yh%\x8f\x06sB)N\x11P\xf6p\xff\'\xaf\a7\x10+p\xbb\xf3\xb08\xb5)\x00\xeeg\xd0\xee\xe9\x98\x8d\xf8\xb5G\t@f\x1et v\x14\tT\xc5', 0x0], 0x1000) 10:19:57 executing program 1: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) recvmsg(r0, &(0x7f00000008c0)={0x0, 0x0, &(0x7f00000007c0)=[{0x0}, {0x0}], 0x2}, 0x0) 10:19:57 executing program 0: r0 = socket$inet6_sctp(0x1c, 0x5, 0x84) connect$inet6(r0, &(0x7f0000000400)={0x1c, 0x1c, 0x1}, 0x1c) sendto$inet6(r0, 0x0, 0x0, 0x0, &(0x7f0000000040)={0x1c, 0x1c}, 0x1c) r1 = dup2(r0, r0) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(r1, 0x84, 0x105, &(0x7f00000001c0)={0x1, [0x0]}, &(0x7f0000000200)=0x8) 10:19:57 executing program 4: r0 = socket(0x1c, 0x10000001, 0x84) bind(r0, &(0x7f0000000280)=@in={0x10, 0x2}, 0x10) 10:19:57 executing program 4: r0 = socket$inet6_sctp(0x1c, 0x1, 0x84) connect$inet6(r0, &(0x7f00000014c0)={0x1c, 0x1c, 0x3}, 0x1c) getsockname$inet6(r0, 0x0, &(0x7f00000001c0)) 10:19:57 executing program 0: r0 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_sctp_SCTP_AUTO_ASCONF(r0, 0x84, 0x18, &(0x7f0000000440), 0x4) 10:19:57 executing program 4: r0 = socket(0x1c, 0x10000001, 0x84) setsockopt$inet_sctp_SCTP_RESET_ASSOC(r0, 0x84, 0x902, &(0x7f0000000000), 0x4) [ 2497.503034][T27116] loop2: detected capacity change from 0 to 264192 [ 2497.528749][T27116] EXT4-fs (loop2): mounted filesystem without journal. Quota mode: writeback. [ 2497.549070][T27122] loop3: detected capacity change from 0 to 264192 [ 2497.605925][T27122] EXT4-fs (loop3): mounted filesystem without journal. Quota mode: writeback. 10:20:07 executing program 4: r0 = socket$inet6_sctp(0x1c, 0x1, 0x84) bind(r0, &(0x7f0000000200)=@in6={0x1c, 0x1c, 0x2}, 0x1c) 10:20:07 executing program 5: r0 = socket(0x1c, 0x10000001, 0x84) connect$unix(r0, &(0x7f0000000300)=@abs={0x8}, 0x8) 10:20:07 executing program 0: r0 = socket$inet_sctp(0x2, 0x1, 0x84) sendmsg$inet_sctp(r0, &(0x7f0000000280)={&(0x7f00000000c0)=@in6={0x1c, 0x1c}, 0x1c, 0x0, 0x0, &(0x7f00000002c0)=ANY=[@ANYBLOB="1000bb"], 0x20}, 0x0) 10:20:07 executing program 2: prlimit64(0x0, 0xe, 0x0, 0x0) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f00000002c0)) r0 = getpid() sched_setscheduler(r0, 0x2, &(0x7f00000000c0)=0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff}) connect$unix(r1, &(0x7f000057eff8)=@abs, 0x6e) recvmmsg(r1, &(0x7f00000000c0), 0x10106, 0x2, 0x0) syz_mount_image$ext4(&(0x7f0000000180)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xfffbffff00000000, 0x8, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000600100000f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000006856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010300), 0x0, 0x640}, {&(0x7f0000010400)="03000000040000000500000016000f000300040000000000000000000f00698c", 0x20, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}, {&(0x7f0000011000)}, {0x0, 0x0, 0x6700000}, {&(0x7f0000000580), 0x0, 0xc000}], 0x0, &(0x7f0000013b00)=ANY=[@ANYBLOB='\x00']) r2 = socket(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f00000005c0)=@ipv4_newroute={0x38, 0x18, 0xbad, 0x0, 0x0, {}, [@RTA_ENCAP_TYPE={0x6, 0x15, 0x3}, @RTA_ENCAP={0x14, 0x16, 0x0, 0x1, @SEG6_IPTUNNEL_SRH={0xd}}]}, 0x38}}, 0x0) r3 = socket(0x26, 0x3, 0x0) sendmsg$nl_route(r3, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f00000005c0)=@ipv4_newroute={0x38, 0x18, 0xbad, 0x0, 0x0, {0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6}, [@RTA_ENCAP_TYPE={0x6, 0x15, 0x3}, @RTA_ENCAP={0x14, 0x16, 0x0, 0x1, @SEG6_IPTUNNEL_SRH={0xd}}]}, 0x38}}, 0x0) r4 = socket(0x10, 0x0, 0x0) sendmsg$nl_route(r4, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f00000005c0)=@ipv4_newroute={0x38, 0x18, 0xbad, 0x0, 0x0, {0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6}, [@RTA_ENCAP_TYPE={0x6, 0x15, 0x3}, @RTA_ENCAP={0x14, 0x16, 0x0, 0x1, @SEG6_IPTUNNEL_SRH={0xd}}]}, 0x38}}, 0x0) recvfrom(r1, &(0x7f0000000600)=""/203, 0xcb, 0x42, &(0x7f0000000700)=@hci={0x1f, 0xffffffffffffffff, 0x4}, 0x80) 10:20:07 executing program 3: prlimit64(0x0, 0xe, &(0x7f0000000140)={0x0, 0x8b}, 0x0) sched_setscheduler(0x0, 0x2, &(0x7f0000000080)=0x6) r0 = getpid() sched_setscheduler(r0, 0x2, &(0x7f00000000c0)=0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r1, &(0x7f000057eff8)=@abs, 0x6e) sendmmsg$unix(r2, &(0x7f00000bd000), 0x318, 0x0) recvmmsg(r1, &(0x7f00000000c0), 0x10106, 0x2, 0x0) syz_mount_image$ext4(&(0x7f0000000180)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xfffbffff00000000, 0x8, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000600100000f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000006856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010300), 0x0, 0x640}, {&(0x7f0000010400)="03000000040000000500000016000f000300040000000000000000000f00698c", 0x20, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}, {&(0x7f0000011000)}, {0x0, 0x0, 0x6700000}, {&(0x7f0000000580), 0x0, 0xc000}], 0x0, &(0x7f0000013b00)=ANY=[@ANYBLOB='\x00']) r3 = creat(&(0x7f0000000000)='./file1\x00', 0x18) socket(0x10, 0x3, 0x0) r4 = socket(0x26, 0x3, 0x0) sendmsg$nl_route(r4, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f00000005c0)=@ipv4_newroute={0x38, 0x18, 0xbad, 0x0, 0x0, {0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6}, [@RTA_ENCAP_TYPE={0x6, 0x15, 0x3}, @RTA_ENCAP={0x14, 0x16, 0x0, 0x1, @SEG6_IPTUNNEL_SRH={0xd}}]}, 0x38}}, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f00000005c0)=@ipv4_newroute={0x38, 0x18, 0xbad, 0x0, 0x0, {0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6}, [@RTA_ENCAP_TYPE={0x6, 0x15, 0x3}, @RTA_ENCAP={0x14, 0x16, 0x0, 0x1, @SEG6_IPTUNNEL_SRH={0xd}}]}, 0x38}}, 0x0) execveat(r3, 0x0, &(0x7f0000000380)=[&(0x7f00000001c0)='+{!#\x00', &(0x7f0000000300)='ext4\x00', &(0x7f0000000340)='@(\x00'], &(0x7f00000004c0)=[&(0x7f00000003c0)='ext4\x00', &(0x7f0000000400)='ext4\x00', &(0x7f0000000500)='\x00.D\x04\xe0\xce\x99\xd9\xa9\xac\xac\xadH\xa4\xcf\xb7\xffT\xac\x05\xfd\xdd\xb8w\x0f\x82B\xff\xf2\x909`1!\f\x870\x1f\xc1%Y\xc8\x15c \xea\x1cY!\x04\xe4\x91^\x00\x04\xe4\xa6\xba\xc6\xfd\x10\xdf\xe24\xd4&\x17\xdc\xec\xf4\f\n\xb7.\x13\x8e\x1bYENj\xe1\x19~\x1c\xaf\a;d\x9f\xba\xd9T\xd4-\xecX\xc0Y\x83@\xc7\x8b\xff*\xdd\xaa\xc6,o4\xe2\x0f\x16\x01[\xc0\xeb\x7fFI]WF\x1f\f?\xfa\xb1\xe7\xf6t\x027\xb1\xc17.4V\xf81{9\xa3\xb9\x01\xcck@I\xe2\xf1Y\x10E\xa1z/\x05.~Yh%\x8f\x06sB)N\x11P\xf6p\xff\'\xaf\a7\x10+p\xbb\xf3\xb08\xb5)\x00\xeeg\xd0\xee\xe9\x98\x8d\xf8\xb5G\t@f\x1et v\x14\tT\xc5', 0x0], 0x1000) 10:20:07 executing program 1: r0 = socket$inet_sctp(0x2, 0x1, 0x84) sendmsg$inet_sctp(r0, &(0x7f0000000240)={&(0x7f0000000040)=@in6={0x1c, 0x1c, 0x2}, 0x1c, 0x0}, 0x0) sendmsg$inet_sctp(r0, &(0x7f00000004c0)={0x0, 0x0, &(0x7f00000003c0)=[{&(0x7f0000000280)='z', 0x1}], 0x1, &(0x7f0000000400)=[@sndrcv={0x2c}], 0x2c}, 0x0) 10:20:07 executing program 0: r0 = socket$inet_sctp(0x2, 0x1, 0x84) close(r0) socket$inet6_udp(0x1c, 0x2, 0x0) sendmsg$inet_sctp(r0, &(0x7f0000001400)={&(0x7f0000000000)=@in6={0x1c, 0x1c, 0x3}, 0x1c, 0x0}, 0x0) 10:20:07 executing program 1: r0 = socket$inet_sctp(0x2, 0x1, 0x84) sendmsg$inet_sctp(r0, &(0x7f0000000240)={&(0x7f0000000040)=@in6={0x1c, 0x1c, 0x2}, 0x1c, 0x0}, 0x0) sendmsg$inet_sctp(r0, &(0x7f0000001780)={0x0, 0x0, 0x0, 0x0, &(0x7f0000001680)=[@dstaddrv6={0x1c, 0x84, 0xa, @remote={0xfe, 0x80, '\x00', 0x0}}, @sndrcv={0x2c}, @sndrcv={0x2c}, @dstaddrv4={0x10, 0x84, 0x9, @loopback}, @dstaddrv4={0x10, 0x84, 0x9, @multicast1}, @sndrcv={0x2c}], 0xc0}, 0x20110) 10:20:07 executing program 4: r0 = socket$inet_sctp(0x2, 0x1, 0x84) sendmsg$inet_sctp(r0, &(0x7f0000000240)={&(0x7f0000000040)=@in6={0x1c, 0x1c, 0x2}, 0x1c, 0x0}, 0x0) sendmsg$inet_sctp(r0, &(0x7f0000000340)={&(0x7f0000000140)=@in6={0x1c, 0x1c, 0x3}, 0x1c, 0x0, 0x0, 0x0, 0x2c}, 0x180) r1 = fcntl$dupfd(r0, 0x0, r0) sendmsg$inet_sctp(r1, &(0x7f0000000780)={0x0, 0x0, &(0x7f0000000700)=[{&(0x7f00000000c0)="c9", 0x1}], 0x1}, 0x20008) 10:20:07 executing program 1: r0 = socket(0x1c, 0x10000001, 0x84) recvmsg(r0, &(0x7f0000000380)={0x0, 0x0, 0x0}, 0x0) 10:20:07 executing program 0: r0 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_sctp_SCTP_SET_PEER_PRIMARY_ADDR(r0, 0x84, 0x6, &(0x7f0000000180), 0x88) 10:20:07 executing program 1: r0 = socket$inet6_sctp(0x1c, 0x1, 0x84) bind(r0, &(0x7f0000000200)=@in6={0x1c, 0x1c}, 0x1c) 10:20:07 executing program 4: r0 = socket$inet_sctp(0x2, 0x1, 0x84) sendmsg$inet_sctp(r0, &(0x7f0000000240)={&(0x7f0000000040)=@in6={0x1c, 0x1c, 0x2}, 0x1c, 0x0}, 0x0) sendmsg$inet_sctp(r0, &(0x7f00000001c0)={&(0x7f0000000080)=@in6={0x1c, 0x1c, 0x1}, 0x1c, &(0x7f0000000100)=[{&(0x7f0000000280)='.', 0x1}], 0x1, &(0x7f0000001280)=[@sndinfo={0x1c}], 0x1c}, 0x0) [ 2506.834151][T27160] loop2: detected capacity change from 0 to 264192 [ 2506.886879][T27160] EXT4-fs (loop2): mounted filesystem without journal. Quota mode: writeback. [ 2506.887898][T27167] loop3: detected capacity change from 0 to 264192 [ 2506.930512][T27167] EXT4-fs (loop3): mounted filesystem without journal. Quota mode: writeback. 10:20:14 executing program 5: r0 = socket(0x1c, 0x10000001, 0x84) setsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(r0, 0x84, 0xa, &(0x7f0000000140)={0x0, @in, 0x0, 0x0, 0x100}, 0x98) 10:20:14 executing program 4: r0 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_sctp_SCTP_RESET_ASSOC(r0, 0x84, 0x78, &(0x7f0000000180), 0x4) 10:20:14 executing program 0: r0 = socket(0x1c, 0x10000001, 0x84) setsockopt$inet_sctp_SCTP_ASSOCINFO(r0, 0x84, 0x2, &(0x7f0000000140)={0x0, 0x0, 0x0, 0x0, 0x100}, 0x14) 10:20:14 executing program 1: r0 = socket$inet6_sctp(0x1c, 0x5, 0x84) bind(r0, &(0x7f0000000040)=@in6={0x1c, 0x1c, 0x2}, 0xa) 10:20:14 executing program 2: prlimit64(0x0, 0xe, &(0x7f0000000140)={0x0, 0x8b}, 0x0) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f00000002c0)) r0 = getpid() sched_setscheduler(r0, 0x2, &(0x7f00000000c0)=0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff}) connect$unix(r1, &(0x7f000057eff8)=@abs, 0x6e) recvmmsg(r1, &(0x7f00000000c0), 0x10106, 0x2, 0x0) syz_mount_image$ext4(&(0x7f0000000180)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xfffbffff00000000, 0x8, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000600100000f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000006856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010300), 0x0, 0x640}, {&(0x7f0000010400)="03000000040000000500000016000f000300040000000000000000000f00698c", 0x20, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}, {&(0x7f0000011000)}, {0x0, 0x0, 0x6700000}, {&(0x7f0000000580), 0x0, 0xc000}], 0x0, &(0x7f0000013b00)=ANY=[@ANYBLOB='\x00']) r2 = socket(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f00000005c0)=@ipv4_newroute={0x38, 0x18, 0xbad, 0x0, 0x0, {}, [@RTA_ENCAP_TYPE={0x6, 0x15, 0x3}, @RTA_ENCAP={0x14, 0x16, 0x0, 0x1, @SEG6_IPTUNNEL_SRH={0xd}}]}, 0x38}}, 0x0) r3 = socket(0x26, 0x3, 0x0) sendmsg$nl_route(r3, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f00000005c0)=@ipv4_newroute={0x38, 0x18, 0xbad, 0x0, 0x0, {0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6}, [@RTA_ENCAP_TYPE={0x6, 0x15, 0x3}, @RTA_ENCAP={0x14, 0x16, 0x0, 0x1, @SEG6_IPTUNNEL_SRH={0xd}}]}, 0x38}}, 0x0) r4 = socket(0x10, 0x0, 0x0) sendmsg$nl_route(r4, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f00000005c0)=@ipv4_newroute={0x38, 0x18, 0xbad, 0x0, 0x0, {0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6}, [@RTA_ENCAP_TYPE={0x6, 0x15, 0x3}, @RTA_ENCAP={0x14, 0x16, 0x0, 0x1, @SEG6_IPTUNNEL_SRH={0xd}}]}, 0x38}}, 0x0) recvfrom(r1, &(0x7f0000000600)=""/203, 0xcb, 0x42, &(0x7f0000000700)=@hci={0x1f, 0xffffffffffffffff, 0x4}, 0x80) 10:20:14 executing program 3: prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8}, 0x0) sched_setscheduler(0x0, 0x2, &(0x7f0000000080)=0x6) r0 = getpid() sched_setscheduler(r0, 0x2, &(0x7f00000000c0)=0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r1, &(0x7f000057eff8)=@abs, 0x6e) sendmmsg$unix(r2, &(0x7f00000bd000), 0x318, 0x0) recvmmsg(r1, &(0x7f00000000c0), 0x10106, 0x2, 0x0) syz_mount_image$ext4(&(0x7f0000000180)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xfffbffff00000000, 0x8, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000600100000f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000006856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010300), 0x0, 0x640}, {&(0x7f0000010400)="03000000040000000500000016000f000300040000000000000000000f00698c", 0x20, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}, {&(0x7f0000011000)}, {0x0, 0x0, 0x6700000}, {&(0x7f0000000580), 0x0, 0xc000}], 0x0, &(0x7f0000013b00)=ANY=[@ANYBLOB='\x00']) r3 = creat(&(0x7f0000000000)='./file1\x00', 0x18) socket(0x10, 0x3, 0x0) r4 = socket(0x26, 0x3, 0x0) sendmsg$nl_route(r4, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f00000005c0)=@ipv4_newroute={0x38, 0x18, 0xbad, 0x0, 0x0, {0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6}, [@RTA_ENCAP_TYPE={0x6, 0x15, 0x3}, @RTA_ENCAP={0x14, 0x16, 0x0, 0x1, @SEG6_IPTUNNEL_SRH={0xd}}]}, 0x38}}, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f00000005c0)=@ipv4_newroute={0x38, 0x18, 0xbad, 0x0, 0x0, {0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6}, [@RTA_ENCAP_TYPE={0x6, 0x15, 0x3}, @RTA_ENCAP={0x14, 0x16, 0x0, 0x1, @SEG6_IPTUNNEL_SRH={0xd}}]}, 0x38}}, 0x0) execveat(r3, 0x0, &(0x7f0000000380)=[&(0x7f00000001c0)='+{!#\x00', &(0x7f0000000300)='ext4\x00', &(0x7f0000000340)='@(\x00'], &(0x7f00000004c0)=[&(0x7f00000003c0)='ext4\x00', &(0x7f0000000400)='ext4\x00', &(0x7f0000000500)='\x00.D\x04\xe0\xce\x99\xd9\xa9\xac\xac\xadH\xa4\xcf\xb7\xffT\xac\x05\xfd\xdd\xb8w\x0f\x82B\xff\xf2\x909`1!\f\x870\x1f\xc1%Y\xc8\x15c \xea\x1cY!\x04\xe4\x91^\x00\x04\xe4\xa6\xba\xc6\xfd\x10\xdf\xe24\xd4&\x17\xdc\xec\xf4\f\n\xb7.\x13\x8e\x1bYENj\xe1\x19~\x1c\xaf\a;d\x9f\xba\xd9T\xd4-\xecX\xc0Y\x83@\xc7\x8b\xff*\xdd\xaa\xc6,o4\xe2\x0f\x16\x01[\xc0\xeb\x7fFI]WF\x1f\f?\xfa\xb1\xe7\xf6t\x027\xb1\xc17.4V\xf81{9\xa3\xb9\x01\xcck@I\xe2\xf1Y\x10E\xa1z/\x05.~Yh%\x8f\x06sB)N\x11P\xf6p\xff\'\xaf\a7\x10+p\xbb\xf3\xb08\xb5)\x00\xeeg\xd0\xee\xe9\x98\x8d\xf8\xb5G\t@f\x1et v\x14\tT\xc5', 0x0], 0x1000) 10:20:14 executing program 0: r0 = socket$inet_sctp(0x2, 0x1, 0x84) setsockopt$inet_sctp_SCTP_CONTEXT(r0, 0x84, 0x1a, &(0x7f0000000140), 0x8) 10:20:14 executing program 4: r0 = socket$inet_sctp(0x2, 0x5, 0x84) r1 = socket$inet6_sctp(0x1c, 0x5, 0x84) r2 = socket$inet6_sctp(0x1c, 0x5, 0x84) connect$inet6(r2, &(0x7f0000000400)={0x1c, 0x1c, 0x3}, 0x1c) r3 = dup2(r2, r1) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(r3, 0x84, 0x105, &(0x7f0000000180)={0x1, [0x0]}, &(0x7f0000001700)=0x8) getsockopt$inet_sctp_SCTP_AUTH_ACTIVE_KEY(r0, 0x84, 0x15, &(0x7f0000000100)={r4}, &(0x7f0000000180)=0x8) 10:20:14 executing program 1: r0 = socket$inet6_sctp(0x1c, 0x1, 0x84) connect$inet6(r0, &(0x7f00000014c0)={0x1c, 0x1c, 0x3}, 0x1c) sendmsg$inet_sctp(r0, &(0x7f0000001480)={0x0, 0x0, 0x0, 0x0, &(0x7f0000001440)=[@dstaddrv6={0x1c, 0x84, 0xa, @mcast2}], 0x1c}, 0x100) 10:20:14 executing program 0: r0 = socket$inet_sctp(0x2, 0x1, 0x84) connect$inet(r0, &(0x7f0000000000)={0x10, 0x2}, 0x10) connect$inet(r0, &(0x7f0000000980)={0x10, 0x2}, 0x10) 10:20:14 executing program 1: r0 = socket(0x1c, 0x10000001, 0x84) getsockopt$inet_sctp_SCTP_PRIMARY_ADDR(r0, 0x84, 0x7, &(0x7f0000000180), &(0x7f0000000240)=0x88) 10:20:14 executing program 4: r0 = socket$inet_sctp(0x2, 0x1, 0x84) sendmsg$inet_sctp(r0, &(0x7f0000000240)={&(0x7f0000000040)=@in6={0x1c, 0x1c, 0x2}, 0x1c, 0x0}, 0x0) sendmsg$inet_sctp(r0, &(0x7f0000000340)={&(0x7f0000000140)=@in6={0x1c, 0x1c, 0x2}, 0x1c, 0x0, 0x0, &(0x7f0000000200)=ANY=[], 0x2c}, 0x180) [ 2514.035049][T27196] loop2: detected capacity change from 0 to 264192 [ 2514.084183][T27196] EXT4-fs (loop2): mounted filesystem without journal. Quota mode: writeback. [ 2514.102821][T27206] loop3: detected capacity change from 0 to 264192 [ 2514.127205][T27206] EXT4-fs (loop3): mounted filesystem without journal. Quota mode: writeback. 10:20:21 executing program 5: r0 = socket$inet_sctp(0x2, 0x1, 0x84) setsockopt$inet_sctp_SCTP_FRAGMENT_INTERLEAVE(r0, 0x84, 0x10, &(0x7f0000000100)=0x200, 0x4) 10:20:21 executing program 0: r0 = socket$inet_sctp(0x2, 0x1, 0x84) bind$inet(r0, &(0x7f0000000080), 0x10) 10:20:21 executing program 4: r0 = socket$inet_sctp(0x2, 0x1, 0x84) sendmsg$inet_sctp(r0, &(0x7f0000000240)={&(0x7f0000000040)=@in6={0x1c, 0x1c, 0x2}, 0x1c, 0x0}, 0x0) sendmsg$inet_sctp(r0, &(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, &(0x7f00000002c0)=ANY=[@ANYBLOB='O'], 0x2c}, 0x180) 10:20:21 executing program 1: r0 = socket(0x1c, 0x10000001, 0x84) setsockopt$inet_sctp_SCTP_INITMSG(r0, 0x84, 0x3, &(0x7f0000000180)={0x0, 0x0, 0x2}, 0x8) 10:20:21 executing program 2: prlimit64(0x0, 0xe, &(0x7f0000000140)={0x0, 0x8b}, 0x0) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f00000002c0)) r0 = getpid() sched_setscheduler(r0, 0x2, &(0x7f00000000c0)=0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff}) connect$unix(r1, &(0x7f000057eff8)=@abs, 0x6e) recvmmsg(r1, &(0x7f00000000c0), 0x10106, 0x2, 0x0) syz_mount_image$ext4(&(0x7f0000000180)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xfffbffff00000000, 0x8, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000600100000f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000006856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010300), 0x0, 0x640}, {&(0x7f0000010400)="03000000040000000500000016000f000300040000000000000000000f00698c", 0x20, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}, {&(0x7f0000011000)}, {0x0, 0x0, 0x6700000}, {&(0x7f0000000580), 0x0, 0xc000}], 0x0, &(0x7f0000013b00)=ANY=[@ANYBLOB='\x00']) r2 = socket(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f00000005c0)=@ipv4_newroute={0x38, 0x18, 0xbad, 0x0, 0x0, {}, [@RTA_ENCAP_TYPE={0x6, 0x15, 0x3}, @RTA_ENCAP={0x14, 0x16, 0x0, 0x1, @SEG6_IPTUNNEL_SRH={0xd}}]}, 0x38}}, 0x0) r3 = socket(0x26, 0x3, 0x0) sendmsg$nl_route(r3, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f00000005c0)=@ipv4_newroute={0x38, 0x18, 0xbad, 0x0, 0x0, {0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6}, [@RTA_ENCAP_TYPE={0x6, 0x15, 0x3}, @RTA_ENCAP={0x14, 0x16, 0x0, 0x1, @SEG6_IPTUNNEL_SRH={0xd}}]}, 0x38}}, 0x0) r4 = socket(0x10, 0x0, 0x0) sendmsg$nl_route(r4, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f00000005c0)=@ipv4_newroute={0x38, 0x18, 0xbad, 0x0, 0x0, {0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6}, [@RTA_ENCAP_TYPE={0x6, 0x15, 0x3}, @RTA_ENCAP={0x14, 0x16, 0x0, 0x1, @SEG6_IPTUNNEL_SRH={0xd}}]}, 0x38}}, 0x0) recvfrom(r1, &(0x7f0000000600)=""/203, 0xcb, 0x42, &(0x7f0000000700)=@hci={0x1f, 0xffffffffffffffff, 0x4}, 0x80) 10:20:21 executing program 3: prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8}, 0x0) sched_setscheduler(0x0, 0x2, &(0x7f0000000080)=0x6) r0 = getpid() sched_setscheduler(r0, 0x2, &(0x7f00000000c0)=0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r1, &(0x7f000057eff8)=@abs, 0x6e) sendmmsg$unix(r2, &(0x7f00000bd000), 0x318, 0x0) recvmmsg(r1, &(0x7f00000000c0), 0x10106, 0x2, 0x0) syz_mount_image$ext4(&(0x7f0000000180)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xfffbffff00000000, 0x8, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000600100000f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000006856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010300), 0x0, 0x640}, {&(0x7f0000010400)="03000000040000000500000016000f000300040000000000000000000f00698c", 0x20, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}, {&(0x7f0000011000)}, {0x0, 0x0, 0x6700000}, {&(0x7f0000000580), 0x0, 0xc000}], 0x0, &(0x7f0000013b00)=ANY=[@ANYBLOB='\x00']) r3 = creat(&(0x7f0000000000)='./file1\x00', 0x18) socket(0x10, 0x3, 0x0) r4 = socket(0x26, 0x3, 0x0) sendmsg$nl_route(r4, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f00000005c0)=@ipv4_newroute={0x38, 0x18, 0xbad, 0x0, 0x0, {0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6}, [@RTA_ENCAP_TYPE={0x6, 0x15, 0x3}, @RTA_ENCAP={0x14, 0x16, 0x0, 0x1, @SEG6_IPTUNNEL_SRH={0xd}}]}, 0x38}}, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f00000005c0)=@ipv4_newroute={0x38, 0x18, 0xbad, 0x0, 0x0, {0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6}, [@RTA_ENCAP_TYPE={0x6, 0x15, 0x3}, @RTA_ENCAP={0x14, 0x16, 0x0, 0x1, @SEG6_IPTUNNEL_SRH={0xd}}]}, 0x38}}, 0x0) execveat(r3, 0x0, &(0x7f0000000380)=[&(0x7f00000001c0)='+{!#\x00', &(0x7f0000000300)='ext4\x00', &(0x7f0000000340)='@(\x00'], &(0x7f00000004c0)=[&(0x7f00000003c0)='ext4\x00', &(0x7f0000000400)='ext4\x00', &(0x7f0000000500)='\x00.D\x04\xe0\xce\x99\xd9\xa9\xac\xac\xadH\xa4\xcf\xb7\xffT\xac\x05\xfd\xdd\xb8w\x0f\x82B\xff\xf2\x909`1!\f\x870\x1f\xc1%Y\xc8\x15c \xea\x1cY!\x04\xe4\x91^\x00\x04\xe4\xa6\xba\xc6\xfd\x10\xdf\xe24\xd4&\x17\xdc\xec\xf4\f\n\xb7.\x13\x8e\x1bYENj\xe1\x19~\x1c\xaf\a;d\x9f\xba\xd9T\xd4-\xecX\xc0Y\x83@\xc7\x8b\xff*\xdd\xaa\xc6,o4\xe2\x0f\x16\x01[\xc0\xeb\x7fFI]WF\x1f\f?\xfa\xb1\xe7\xf6t\x027\xb1\xc17.4V\xf81{9\xa3\xb9\x01\xcck@I\xe2\xf1Y\x10E\xa1z/\x05.~Yh%\x8f\x06sB)N\x11P\xf6p\xff\'\xaf\a7\x10+p\xbb\xf3\xb08\xb5)\x00\xeeg\xd0\xee\xe9\x98\x8d\xf8\xb5G\t@f\x1et v\x14\tT\xc5', 0x0], 0x1000) 10:20:21 executing program 1: r0 = socket$inet_sctp(0x2, 0x1, 0x84) close(r0) socket$inet6_sctp(0x1c, 0x5, 0x84) r1 = socket$inet6_sctp(0x1c, 0x5, 0x84) connect$inet6(r1, &(0x7f0000000000)={0x1c, 0x1c, 0x3}, 0x1c) r2 = dup2(r1, r1) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(r2, 0x84, 0x105, &(0x7f0000000080)={0x1, [0x0]}, &(0x7f0000000100)=0x8) setsockopt$inet_sctp_SCTP_MAX_BURST(r0, 0x84, 0x19, &(0x7f0000000080), 0x8) 10:20:21 executing program 0: setsockopt$inet6_MCAST_LEAVE_GROUP(0xffffffffffffffff, 0x29, 0x51, 0x0, 0x0) 10:20:21 executing program 4: symlink(&(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='./file0\x00') rename(&(0x7f0000000040)='./file0\x00', &(0x7f00000000c0)='./file0\x00') 10:20:21 executing program 0: r0 = socket$inet_sctp(0x2, 0x1, 0x84) sendmsg$inet_sctp(r0, &(0x7f0000000240)={&(0x7f0000000040)=@in6={0x1c, 0x1c, 0x2}, 0x1c, 0x0}, 0x0) getsockopt$inet_sctp_SCTP_PRIMARY_ADDR(r0, 0x84, 0x7, &(0x7f00000015c0), &(0x7f0000001680)=0x88) 10:20:21 executing program 4: setreuid(0x0, 0xee00) setreuid(0xee00, 0xffffffffffffffff) 10:20:21 executing program 0: mkdirat(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x0) linkat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0xffffffffffffff9c, 0x0, 0x0) [ 2521.313016][T27238] loop2: detected capacity change from 0 to 264192 [ 2521.359906][T27238] EXT4-fs (loop2): mounted filesystem without journal. Quota mode: writeback. [ 2521.370461][T27243] loop3: detected capacity change from 0 to 264192 [ 2521.419847][T27243] EXT4-fs (loop3): mounted filesystem without journal. Quota mode: writeback. 10:20:28 executing program 5: syz_emit_ethernet(0x66, &(0x7f00000001c0)={@local, @local, @val, {@ipv6}}, 0x0) 10:20:28 executing program 0: mkdir(&(0x7f00000015c0)='./file0\x00', 0x0) unlink(&(0x7f0000000140)='./file0\x00') 10:20:28 executing program 4: r0 = msgget$private(0x0, 0x0) msgrcv(r0, 0x0, 0x0, 0x0, 0x0) msgctl$IPC_SET(r0, 0x1, &(0x7f0000000000)={{0x2, 0x0, 0xee01, 0x0, 0xee01}}) 10:20:28 executing program 2: prlimit64(0x0, 0xe, &(0x7f0000000140)={0x0, 0x8b}, 0x0) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f00000002c0)) r0 = getpid() sched_setscheduler(r0, 0x2, &(0x7f00000000c0)=0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff}) connect$unix(r1, &(0x7f000057eff8)=@abs, 0x6e) recvmmsg(r1, &(0x7f00000000c0), 0x10106, 0x2, 0x0) syz_mount_image$ext4(&(0x7f0000000180)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xfffbffff00000000, 0x8, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000600100000f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000006856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010300), 0x0, 0x640}, {&(0x7f0000010400)="03000000040000000500000016000f000300040000000000000000000f00698c", 0x20, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}, {&(0x7f0000011000)}, {0x0, 0x0, 0x6700000}, {&(0x7f0000000580), 0x0, 0xc000}], 0x0, &(0x7f0000013b00)=ANY=[@ANYBLOB='\x00']) r2 = socket(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f00000005c0)=@ipv4_newroute={0x38, 0x18, 0xbad, 0x0, 0x0, {}, [@RTA_ENCAP_TYPE={0x6, 0x15, 0x3}, @RTA_ENCAP={0x14, 0x16, 0x0, 0x1, @SEG6_IPTUNNEL_SRH={0xd}}]}, 0x38}}, 0x0) r3 = socket(0x26, 0x3, 0x0) sendmsg$nl_route(r3, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f00000005c0)=@ipv4_newroute={0x38, 0x18, 0xbad, 0x0, 0x0, {0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6}, [@RTA_ENCAP_TYPE={0x6, 0x15, 0x3}, @RTA_ENCAP={0x14, 0x16, 0x0, 0x1, @SEG6_IPTUNNEL_SRH={0xd}}]}, 0x38}}, 0x0) r4 = socket(0x10, 0x0, 0x0) sendmsg$nl_route(r4, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f00000005c0)=@ipv4_newroute={0x38, 0x18, 0xbad, 0x0, 0x0, {0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6}, [@RTA_ENCAP_TYPE={0x6, 0x15, 0x3}, @RTA_ENCAP={0x14, 0x16, 0x0, 0x1, @SEG6_IPTUNNEL_SRH={0xd}}]}, 0x38}}, 0x0) recvfrom(r1, &(0x7f0000000600)=""/203, 0xcb, 0x42, &(0x7f0000000700)=@hci={0x1f, 0xffffffffffffffff, 0x4}, 0x80) 10:20:28 executing program 1: mkdir(&(0x7f0000000040)='./file0\x00', 0x0) utimensat(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)={{0x0, 0xfffffffffffffffe}}, 0x0) 10:20:28 executing program 3: prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8}, 0x0) sched_setscheduler(0x0, 0x2, &(0x7f0000000080)=0x6) r0 = getpid() sched_setscheduler(r0, 0x2, &(0x7f00000000c0)=0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r1, &(0x7f000057eff8)=@abs, 0x6e) sendmmsg$unix(r2, &(0x7f00000bd000), 0x318, 0x0) recvmmsg(r1, &(0x7f00000000c0), 0x10106, 0x2, 0x0) syz_mount_image$ext4(&(0x7f0000000180)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xfffbffff00000000, 0x8, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000600100000f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000006856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010300), 0x0, 0x640}, {&(0x7f0000010400)="03000000040000000500000016000f000300040000000000000000000f00698c", 0x20, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}, {&(0x7f0000011000)}, {0x0, 0x0, 0x6700000}, {&(0x7f0000000580), 0x0, 0xc000}], 0x0, &(0x7f0000013b00)=ANY=[@ANYBLOB='\x00']) r3 = creat(&(0x7f0000000000)='./file1\x00', 0x18) socket(0x10, 0x3, 0x0) r4 = socket(0x26, 0x3, 0x0) sendmsg$nl_route(r4, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f00000005c0)=@ipv4_newroute={0x38, 0x18, 0xbad, 0x0, 0x0, {0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6}, [@RTA_ENCAP_TYPE={0x6, 0x15, 0x3}, @RTA_ENCAP={0x14, 0x16, 0x0, 0x1, @SEG6_IPTUNNEL_SRH={0xd}}]}, 0x38}}, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f00000005c0)=@ipv4_newroute={0x38, 0x18, 0xbad, 0x0, 0x0, {0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6}, [@RTA_ENCAP_TYPE={0x6, 0x15, 0x3}, @RTA_ENCAP={0x14, 0x16, 0x0, 0x1, @SEG6_IPTUNNEL_SRH={0xd}}]}, 0x38}}, 0x0) execveat(r3, 0x0, &(0x7f0000000380)=[&(0x7f00000001c0)='+{!#\x00', &(0x7f0000000300)='ext4\x00', &(0x7f0000000340)='@(\x00'], &(0x7f00000004c0)=[&(0x7f00000003c0)='ext4\x00', &(0x7f0000000400)='ext4\x00', &(0x7f0000000500)='\x00.D\x04\xe0\xce\x99\xd9\xa9\xac\xac\xadH\xa4\xcf\xb7\xffT\xac\x05\xfd\xdd\xb8w\x0f\x82B\xff\xf2\x909`1!\f\x870\x1f\xc1%Y\xc8\x15c \xea\x1cY!\x04\xe4\x91^\x00\x04\xe4\xa6\xba\xc6\xfd\x10\xdf\xe24\xd4&\x17\xdc\xec\xf4\f\n\xb7.\x13\x8e\x1bYENj\xe1\x19~\x1c\xaf\a;d\x9f\xba\xd9T\xd4-\xecX\xc0Y\x83@\xc7\x8b\xff*\xdd\xaa\xc6,o4\xe2\x0f\x16\x01[\xc0\xeb\x7fFI]WF\x1f\f?\xfa\xb1\xe7\xf6t\x027\xb1\xc17.4V\xf81{9\xa3\xb9\x01\xcck@I\xe2\xf1Y\x10E\xa1z/\x05.~Yh%\x8f\x06sB)N\x11P\xf6p\xff\'\xaf\a7\x10+p\xbb\xf3\xb08\xb5)\x00\xeeg\xd0\xee\xe9\x98\x8d\xf8\xb5G\t@f\x1et v\x14\tT\xc5', 0x0], 0x1000) 10:20:28 executing program 0: munmap(&(0x7f0000ffc000/0x4000)=nil, 0x4000) mprotect(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0) 10:20:28 executing program 1: mknod(&(0x7f0000000000)='./file0\x00', 0x8000, 0x0) open(&(0x7f0000001480)='./file0\x00', 0x0, 0x0) 10:20:28 executing program 0: r0 = socket$inet(0x2, 0x3, 0x0) recvmsg(r0, &(0x7f0000000700)={0x0, 0x0, &(0x7f0000000580)=[{0x0}, {0x0}, {0x0}], 0x3}, 0x0) 10:20:28 executing program 1: syz_emit_ethernet(0x4a, &(0x7f0000000740)={@random="37fa2a16b58e", @random="84b4d6193b98", @val, {@ipv6}}, 0x0) 10:20:28 executing program 1: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) chdir(&(0x7f0000000080)='./file0\x00') 10:20:28 executing program 0: r0 = socket(0x1e, 0x3, 0x0) connect$unix(r0, &(0x7f00000000c0)=@abs, 0x8) [ 2528.437130][T27274] loop2: detected capacity change from 0 to 264192 [ 2528.460124][T27274] EXT4-fs (loop2): mounted filesystem without journal. Quota mode: writeback. [ 2528.488014][T27280] loop3: detected capacity change from 0 to 264192 [ 2528.524886][T27280] EXT4-fs (loop3): mounted filesystem without journal. Quota mode: writeback. 10:20:35 executing program 5: setrlimit(0x0, &(0x7f0000000540)) 10:20:35 executing program 1: r0 = socket$unix(0x1, 0x2, 0x0) connect(r0, &(0x7f0000000200)=@un=@abs={0x0, 0x0, 0x2}, 0x8) 10:20:35 executing program 0: r0 = socket(0x1e, 0x3, 0x0) setsockopt$sock_linger(r0, 0xffff, 0x80, &(0x7f0000000000), 0x8) 10:20:35 executing program 2: prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8}, 0x0) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f00000002c0)) r0 = getpid() sched_setscheduler(r0, 0x2, &(0x7f00000000c0)=0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff}) connect$unix(r1, &(0x7f000057eff8)=@abs, 0x6e) recvmmsg(r1, &(0x7f00000000c0), 0x10106, 0x2, 0x0) syz_mount_image$ext4(&(0x7f0000000180)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xfffbffff00000000, 0x8, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000600100000f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000006856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010300), 0x0, 0x640}, {&(0x7f0000010400)="03000000040000000500000016000f000300040000000000000000000f00698c", 0x20, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}, {&(0x7f0000011000)}, {0x0, 0x0, 0x6700000}, {&(0x7f0000000580), 0x0, 0xc000}], 0x0, &(0x7f0000013b00)=ANY=[@ANYBLOB='\x00']) r2 = socket(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f00000005c0)=@ipv4_newroute={0x38, 0x18, 0xbad, 0x0, 0x0, {}, [@RTA_ENCAP_TYPE={0x6, 0x15, 0x3}, @RTA_ENCAP={0x14, 0x16, 0x0, 0x1, @SEG6_IPTUNNEL_SRH={0xd}}]}, 0x38}}, 0x0) r3 = socket(0x26, 0x3, 0x0) sendmsg$nl_route(r3, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f00000005c0)=@ipv4_newroute={0x38, 0x18, 0xbad, 0x0, 0x0, {0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6}, [@RTA_ENCAP_TYPE={0x6, 0x15, 0x3}, @RTA_ENCAP={0x14, 0x16, 0x0, 0x1, @SEG6_IPTUNNEL_SRH={0xd}}]}, 0x38}}, 0x0) r4 = socket(0x10, 0x0, 0x0) sendmsg$nl_route(r4, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f00000005c0)=@ipv4_newroute={0x38, 0x18, 0xbad, 0x0, 0x0, {0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6}, [@RTA_ENCAP_TYPE={0x6, 0x15, 0x3}, @RTA_ENCAP={0x14, 0x16, 0x0, 0x1, @SEG6_IPTUNNEL_SRH={0xd}}]}, 0x38}}, 0x0) recvfrom(r1, &(0x7f0000000600)=""/203, 0xcb, 0x42, &(0x7f0000000700)=@hci={0x1f, 0xffffffffffffffff, 0x4}, 0x80) 10:20:35 executing program 3: prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x0, &(0x7f0000000080)=0x6) r0 = getpid() sched_setscheduler(r0, 0x2, &(0x7f00000000c0)=0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r1, &(0x7f000057eff8)=@abs, 0x6e) sendmmsg$unix(r2, &(0x7f00000bd000), 0x318, 0x0) recvmmsg(r1, &(0x7f00000000c0), 0x10106, 0x2, 0x0) syz_mount_image$ext4(&(0x7f0000000180)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xfffbffff00000000, 0x8, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000600100000f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000006856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010300), 0x0, 0x640}, {&(0x7f0000010400)="03000000040000000500000016000f000300040000000000000000000f00698c", 0x20, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}, {&(0x7f0000011000)}, {0x0, 0x0, 0x6700000}, {&(0x7f0000000580), 0x0, 0xc000}], 0x0, &(0x7f0000013b00)=ANY=[@ANYBLOB='\x00']) r3 = creat(&(0x7f0000000000)='./file1\x00', 0x18) socket(0x10, 0x3, 0x0) r4 = socket(0x26, 0x3, 0x0) sendmsg$nl_route(r4, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f00000005c0)=@ipv4_newroute={0x38, 0x18, 0xbad, 0x0, 0x0, {0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6}, [@RTA_ENCAP_TYPE={0x6, 0x15, 0x3}, @RTA_ENCAP={0x14, 0x16, 0x0, 0x1, @SEG6_IPTUNNEL_SRH={0xd}}]}, 0x38}}, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f00000005c0)=@ipv4_newroute={0x38, 0x18, 0xbad, 0x0, 0x0, {0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6}, [@RTA_ENCAP_TYPE={0x6, 0x15, 0x3}, @RTA_ENCAP={0x14, 0x16, 0x0, 0x1, @SEG6_IPTUNNEL_SRH={0xd}}]}, 0x38}}, 0x0) execveat(r3, 0x0, &(0x7f0000000380)=[&(0x7f00000001c0)='+{!#\x00', &(0x7f0000000300)='ext4\x00', &(0x7f0000000340)='@(\x00'], &(0x7f00000004c0)=[&(0x7f00000003c0)='ext4\x00', &(0x7f0000000400)='ext4\x00', &(0x7f0000000500)='\x00.D\x04\xe0\xce\x99\xd9\xa9\xac\xac\xadH\xa4\xcf\xb7\xffT\xac\x05\xfd\xdd\xb8w\x0f\x82B\xff\xf2\x909`1!\f\x870\x1f\xc1%Y\xc8\x15c \xea\x1cY!\x04\xe4\x91^\x00\x04\xe4\xa6\xba\xc6\xfd\x10\xdf\xe24\xd4&\x17\xdc\xec\xf4\f\n\xb7.\x13\x8e\x1bYENj\xe1\x19~\x1c\xaf\a;d\x9f\xba\xd9T\xd4-\xecX\xc0Y\x83@\xc7\x8b\xff*\xdd\xaa\xc6,o4\xe2\x0f\x16\x01[\xc0\xeb\x7fFI]WF\x1f\f?\xfa\xb1\xe7\xf6t\x027\xb1\xc17.4V\xf81{9\xa3\xb9\x01\xcck@I\xe2\xf1Y\x10E\xa1z/\x05.~Yh%\x8f\x06sB)N\x11P\xf6p\xff\'\xaf\a7\x10+p\xbb\xf3\xb08\xb5)\x00\xeeg\xd0\xee\xe9\x98\x8d\xf8\xb5G\t@f\x1et v\x14\tT\xc5', 0x0], 0x1000) 10:20:35 executing program 4: r0 = socket(0x1e, 0x3, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) bind(r1, 0x0, 0x0) 10:20:35 executing program 4: mknod(&(0x7f0000000000)='./file0\x00', 0x8000, 0x0) rename(&(0x7f0000001180)='./file0\x00', &(0x7f00000011c0)='./file0\x00') 10:20:35 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x200, 0x0) fchown(r0, 0x0, 0xffffffffffffffff) 10:20:35 executing program 1: r0 = openat$sndseq(0xffffffffffffff9c, &(0x7f00000043c0), 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_CLIENT_POOL(r0, 0xc058534b, &(0x7f0000004400)={0x492}) 10:20:35 executing program 0: capset(&(0x7f0000000140)={0x19980330}, &(0x7f0000000180)) socket(0x2, 0x3, 0x8) 10:20:35 executing program 4: r0 = syz_init_net_socket$nfc_raw(0x27, 0x5, 0x0) connect$nfc_raw(r0, &(0x7f0000000040), 0x10) 10:20:35 executing program 1: pselect6(0x0, 0x0, 0x0, &(0x7f0000000200), &(0x7f0000000240), 0x0) 10:20:35 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000000)=@ipv6_deladdr={0x2c, 0x15, 0x1, 0x0, 0x0, {}, [@IFA_LOCAL={0x14, 0x2, @private0}]}, 0x2c}}, 0x0) [ 2535.557825][T27309] loop2: detected capacity change from 0 to 264192 [ 2535.603121][T27309] EXT4-fs (loop2): mounted filesystem without journal. Quota mode: writeback. [ 2535.618171][T27316] loop3: detected capacity change from 0 to 264192 [ 2535.649647][T27316] EXT4-fs (loop3): mounted filesystem without journal. Quota mode: writeback. 10:20:43 executing program 5: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$ETHTOOL_MSG_EEE_GET(r0, &(0x7f0000000440)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x4000000}, 0xc, &(0x7f0000000400)={&(0x7f0000000340)={0x14}, 0x14}}, 0x0) 10:20:43 executing program 0: r0 = socket(0x2, 0x3, 0x8) sendmsg$L2TP_CMD_SESSION_MODIFY(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x20000045) 10:20:43 executing program 1: r0 = timerfd_create(0x9, 0x0) clock_gettime(0x0, &(0x7f0000000000)={0x0, 0x0}) timerfd_settime(r0, 0x0, &(0x7f0000000040)={{0x77359400}, {0x0, r1+10000000}}, &(0x7f00000000c0)) 10:20:43 executing program 4: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_JOIN_MCAST(r0, &(0x7f0000000100)={0x16, 0x98, 0xfa00, {0x0, 0x0, 0xffffffffffffffff, 0x1c, 0x0, @in6={0xa, 0x0, 0x0, @mcast2}}}, 0xa0) 10:20:43 executing program 2: prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8}, 0x0) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f00000002c0)) r0 = getpid() sched_setscheduler(r0, 0x2, &(0x7f00000000c0)=0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff}) connect$unix(r1, &(0x7f000057eff8)=@abs, 0x6e) recvmmsg(r1, &(0x7f00000000c0), 0x10106, 0x2, 0x0) syz_mount_image$ext4(&(0x7f0000000180)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xfffbffff00000000, 0x8, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000600100000f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000006856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010300), 0x0, 0x640}, {&(0x7f0000010400)="03000000040000000500000016000f000300040000000000000000000f00698c", 0x20, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}, {&(0x7f0000011000)}, {0x0, 0x0, 0x6700000}, {&(0x7f0000000580), 0x0, 0xc000}], 0x0, &(0x7f0000013b00)=ANY=[@ANYBLOB='\x00']) r2 = socket(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f00000005c0)=@ipv4_newroute={0x38, 0x18, 0xbad, 0x0, 0x0, {}, [@RTA_ENCAP_TYPE={0x6, 0x15, 0x3}, @RTA_ENCAP={0x14, 0x16, 0x0, 0x1, @SEG6_IPTUNNEL_SRH={0xd}}]}, 0x38}}, 0x0) r3 = socket(0x26, 0x3, 0x0) sendmsg$nl_route(r3, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f00000005c0)=@ipv4_newroute={0x38, 0x18, 0xbad, 0x0, 0x0, {0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6}, [@RTA_ENCAP_TYPE={0x6, 0x15, 0x3}, @RTA_ENCAP={0x14, 0x16, 0x0, 0x1, @SEG6_IPTUNNEL_SRH={0xd}}]}, 0x38}}, 0x0) r4 = socket(0x10, 0x0, 0x0) sendmsg$nl_route(r4, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f00000005c0)=@ipv4_newroute={0x38, 0x18, 0xbad, 0x0, 0x0, {0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6}, [@RTA_ENCAP_TYPE={0x6, 0x15, 0x3}, @RTA_ENCAP={0x14, 0x16, 0x0, 0x1, @SEG6_IPTUNNEL_SRH={0xd}}]}, 0x38}}, 0x0) recvfrom(r1, &(0x7f0000000600)=""/203, 0xcb, 0x42, &(0x7f0000000700)=@hci={0x1f, 0xffffffffffffffff, 0x4}, 0x80) 10:20:43 executing program 3: prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x0, &(0x7f0000000080)=0x6) r0 = getpid() sched_setscheduler(r0, 0x2, &(0x7f00000000c0)=0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r1, &(0x7f000057eff8)=@abs, 0x6e) sendmmsg$unix(r2, &(0x7f00000bd000), 0x318, 0x0) recvmmsg(r1, &(0x7f00000000c0), 0x10106, 0x2, 0x0) syz_mount_image$ext4(&(0x7f0000000180)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xfffbffff00000000, 0x8, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000600100000f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000006856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010300), 0x0, 0x640}, {&(0x7f0000010400)="03000000040000000500000016000f000300040000000000000000000f00698c", 0x20, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}, {&(0x7f0000011000)}, {0x0, 0x0, 0x6700000}, {&(0x7f0000000580), 0x0, 0xc000}], 0x0, &(0x7f0000013b00)=ANY=[@ANYBLOB='\x00']) r3 = creat(&(0x7f0000000000)='./file1\x00', 0x18) socket(0x10, 0x3, 0x0) r4 = socket(0x26, 0x3, 0x0) sendmsg$nl_route(r4, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f00000005c0)=@ipv4_newroute={0x38, 0x18, 0xbad, 0x0, 0x0, {0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6}, [@RTA_ENCAP_TYPE={0x6, 0x15, 0x3}, @RTA_ENCAP={0x14, 0x16, 0x0, 0x1, @SEG6_IPTUNNEL_SRH={0xd}}]}, 0x38}}, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f00000005c0)=@ipv4_newroute={0x38, 0x18, 0xbad, 0x0, 0x0, {0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6}, [@RTA_ENCAP_TYPE={0x6, 0x15, 0x3}, @RTA_ENCAP={0x14, 0x16, 0x0, 0x1, @SEG6_IPTUNNEL_SRH={0xd}}]}, 0x38}}, 0x0) execveat(r3, 0x0, &(0x7f0000000380)=[&(0x7f00000001c0)='+{!#\x00', &(0x7f0000000300)='ext4\x00', &(0x7f0000000340)='@(\x00'], &(0x7f00000004c0)=[&(0x7f00000003c0)='ext4\x00', &(0x7f0000000400)='ext4\x00', &(0x7f0000000500)='\x00.D\x04\xe0\xce\x99\xd9\xa9\xac\xac\xadH\xa4\xcf\xb7\xffT\xac\x05\xfd\xdd\xb8w\x0f\x82B\xff\xf2\x909`1!\f\x870\x1f\xc1%Y\xc8\x15c \xea\x1cY!\x04\xe4\x91^\x00\x04\xe4\xa6\xba\xc6\xfd\x10\xdf\xe24\xd4&\x17\xdc\xec\xf4\f\n\xb7.\x13\x8e\x1bYENj\xe1\x19~\x1c\xaf\a;d\x9f\xba\xd9T\xd4-\xecX\xc0Y\x83@\xc7\x8b\xff*\xdd\xaa\xc6,o4\xe2\x0f\x16\x01[\xc0\xeb\x7fFI]WF\x1f\f?\xfa\xb1\xe7\xf6t\x027\xb1\xc17.4V\xf81{9\xa3\xb9\x01\xcck@I\xe2\xf1Y\x10E\xa1z/\x05.~Yh%\x8f\x06sB)N\x11P\xf6p\xff\'\xaf\a7\x10+p\xbb\xf3\xb08\xb5)\x00\xeeg\xd0\xee\xe9\x98\x8d\xf8\xb5G\t@f\x1et v\x14\tT\xc5', 0x0], 0x1000) 10:20:43 executing program 1: bpf$MAP_CREATE(0x0, 0x0, 0xf) 10:20:43 executing program 0: r0 = socket$inet_smc(0x2b, 0x1, 0x0) setsockopt$IPT_SO_SET_REPLACE(r0, 0x0, 0x40, &(0x7f0000000500)=@filter={'filter\x00', 0xe, 0x4, 0x328, 0xffffffff, 0x190, 0xb0, 0x190, 0xffffffff, 0xffffffff, 0x290, 0x290, 0x290, 0xffffffff, 0x4, 0x0, {[{{@uncond, 0x0, 0x70, 0xb0}, @common=@inet=@LOG={0x40, 'LOG\x00', 0x0, {0x0, 0x0, "3358447f807c725b3d5ec29f8118b05f202e183bd193658c1cca4dc6e59c"}}}, {{@uncond, 0x0, 0xb8, 0xe0, 0x0, {}, [@common=@unspec=@limit={{0x48}}]}, @REJECT={0x28}}, {{@ip={@multicast1, @local, 0x0, 0x0, 'veth0_to_bridge\x00', 'ipvlan0\x00'}, 0x0, 0xa0, 0x100, 0x0, {}, [@common=@addrtype={{0x30}}]}, @common=@CLUSTERIP={0x60, 'CLUSTERIP\x00', 0x0, {0x0, @dev}}}], {{'\x00', 0x0, 0x70, 0x98}, {0x28}}}}, 0x388) 10:20:43 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000000)=@mpls_getroute={0x24, 0x1a, 0x1, 0x0, 0x0, {}, [@RTA_DST={0x8, 0x1, {0x100, 0x0, 0x1}}]}, 0x24}}, 0x0) 10:20:43 executing program 0: bpf$LINK_GET_NEXT_ID(0x1f, &(0x7f0000000000), 0xfed0) 10:20:43 executing program 4: r0 = syz_open_dev$loop(&(0x7f0000000040), 0x0, 0x1) ioctl$LOOP_SET_CAPACITY(r0, 0x4c07) 10:20:43 executing program 1: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$TIPC_CMD_GET_LINKS(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={0xfffffffffffffffe}}, 0x0) [ 2542.643266][T27334] x_tables: duplicate underflow at hook 2 [ 2542.675953][T27343] loop2: detected capacity change from 0 to 264192 [ 2542.724399][T27343] EXT4-fs (loop2): mounted filesystem without journal. Quota mode: writeback. [ 2542.734087][T27351] loop3: detected capacity change from 0 to 264192 [ 2542.769686][T27351] EXT4-fs (loop3): mounted filesystem without journal. Quota mode: writeback. 10:20:50 executing program 5: r0 = syz_open_dev$loop(&(0x7f0000000000), 0x80, 0x0) ioctl$LOOP_GET_STATUS(r0, 0x4c03, &(0x7f0000000080)) 10:20:50 executing program 0: sched_getattr(0x0, &(0x7f0000001200)={0x38}, 0x38, 0x0) 10:20:50 executing program 1: ioctl$SNAPSHOT_ATOMIC_RESTORE(0xffffffffffffffff, 0x3304) 10:20:50 executing program 4: socketpair(0x29, 0x2, 0xfffffffe, &(0x7f0000000000)) 10:20:50 executing program 2: prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8}, 0x0) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f00000002c0)) r0 = getpid() sched_setscheduler(r0, 0x2, &(0x7f00000000c0)=0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff}) connect$unix(r1, &(0x7f000057eff8)=@abs, 0x6e) recvmmsg(r1, &(0x7f00000000c0), 0x10106, 0x2, 0x0) syz_mount_image$ext4(&(0x7f0000000180)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xfffbffff00000000, 0x8, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000600100000f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000006856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010300), 0x0, 0x640}, {&(0x7f0000010400)="03000000040000000500000016000f000300040000000000000000000f00698c", 0x20, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}, {&(0x7f0000011000)}, {0x0, 0x0, 0x6700000}, {&(0x7f0000000580), 0x0, 0xc000}], 0x0, &(0x7f0000013b00)=ANY=[@ANYBLOB='\x00']) r2 = socket(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f00000005c0)=@ipv4_newroute={0x38, 0x18, 0xbad, 0x0, 0x0, {}, [@RTA_ENCAP_TYPE={0x6, 0x15, 0x3}, @RTA_ENCAP={0x14, 0x16, 0x0, 0x1, @SEG6_IPTUNNEL_SRH={0xd}}]}, 0x38}}, 0x0) r3 = socket(0x26, 0x3, 0x0) sendmsg$nl_route(r3, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f00000005c0)=@ipv4_newroute={0x38, 0x18, 0xbad, 0x0, 0x0, {0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6}, [@RTA_ENCAP_TYPE={0x6, 0x15, 0x3}, @RTA_ENCAP={0x14, 0x16, 0x0, 0x1, @SEG6_IPTUNNEL_SRH={0xd}}]}, 0x38}}, 0x0) r4 = socket(0x10, 0x0, 0x0) sendmsg$nl_route(r4, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f00000005c0)=@ipv4_newroute={0x38, 0x18, 0xbad, 0x0, 0x0, {0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6}, [@RTA_ENCAP_TYPE={0x6, 0x15, 0x3}, @RTA_ENCAP={0x14, 0x16, 0x0, 0x1, @SEG6_IPTUNNEL_SRH={0xd}}]}, 0x38}}, 0x0) recvfrom(r1, &(0x7f0000000600)=""/203, 0xcb, 0x42, &(0x7f0000000700)=@hci={0x1f, 0xffffffffffffffff, 0x4}, 0x80) 10:20:50 executing program 3: prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x0, &(0x7f0000000080)=0x6) r0 = getpid() sched_setscheduler(r0, 0x2, &(0x7f00000000c0)=0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r1, &(0x7f000057eff8)=@abs, 0x6e) sendmmsg$unix(r2, &(0x7f00000bd000), 0x318, 0x0) recvmmsg(r1, &(0x7f00000000c0), 0x10106, 0x2, 0x0) syz_mount_image$ext4(&(0x7f0000000180)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xfffbffff00000000, 0x8, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000600100000f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000006856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010300), 0x0, 0x640}, {&(0x7f0000010400)="03000000040000000500000016000f000300040000000000000000000f00698c", 0x20, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}, {&(0x7f0000011000)}, {0x0, 0x0, 0x6700000}, {&(0x7f0000000580), 0x0, 0xc000}], 0x0, &(0x7f0000013b00)=ANY=[@ANYBLOB='\x00']) r3 = creat(&(0x7f0000000000)='./file1\x00', 0x18) socket(0x10, 0x3, 0x0) r4 = socket(0x26, 0x3, 0x0) sendmsg$nl_route(r4, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f00000005c0)=@ipv4_newroute={0x38, 0x18, 0xbad, 0x0, 0x0, {0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6}, [@RTA_ENCAP_TYPE={0x6, 0x15, 0x3}, @RTA_ENCAP={0x14, 0x16, 0x0, 0x1, @SEG6_IPTUNNEL_SRH={0xd}}]}, 0x38}}, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f00000005c0)=@ipv4_newroute={0x38, 0x18, 0xbad, 0x0, 0x0, {0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6}, [@RTA_ENCAP_TYPE={0x6, 0x15, 0x3}, @RTA_ENCAP={0x14, 0x16, 0x0, 0x1, @SEG6_IPTUNNEL_SRH={0xd}}]}, 0x38}}, 0x0) execveat(r3, 0x0, &(0x7f0000000380)=[&(0x7f00000001c0)='+{!#\x00', &(0x7f0000000300)='ext4\x00', &(0x7f0000000340)='@(\x00'], &(0x7f00000004c0)=[&(0x7f00000003c0)='ext4\x00', &(0x7f0000000400)='ext4\x00', &(0x7f0000000500)='\x00.D\x04\xe0\xce\x99\xd9\xa9\xac\xac\xadH\xa4\xcf\xb7\xffT\xac\x05\xfd\xdd\xb8w\x0f\x82B\xff\xf2\x909`1!\f\x870\x1f\xc1%Y\xc8\x15c \xea\x1cY!\x04\xe4\x91^\x00\x04\xe4\xa6\xba\xc6\xfd\x10\xdf\xe24\xd4&\x17\xdc\xec\xf4\f\n\xb7.\x13\x8e\x1bYENj\xe1\x19~\x1c\xaf\a;d\x9f\xba\xd9T\xd4-\xecX\xc0Y\x83@\xc7\x8b\xff*\xdd\xaa\xc6,o4\xe2\x0f\x16\x01[\xc0\xeb\x7fFI]WF\x1f\f?\xfa\xb1\xe7\xf6t\x027\xb1\xc17.4V\xf81{9\xa3\xb9\x01\xcck@I\xe2\xf1Y\x10E\xa1z/\x05.~Yh%\x8f\x06sB)N\x11P\xf6p\xff\'\xaf\a7\x10+p\xbb\xf3\xb08\xb5)\x00\xeeg\xd0\xee\xe9\x98\x8d\xf8\xb5G\t@f\x1et v\x14\tT\xc5', 0x0], 0x1000) 10:20:50 executing program 0: timer_create(0x0, &(0x7f0000000180)={0x0, 0x28, 0x0, @thr={0x0, 0x0}}, &(0x7f00000001c0)) 10:20:50 executing program 4: getgroups(0x3, &(0x7f0000000000)=[0x0, 0xee00, 0xffffffffffffffff]) setregid(0x0, r0) 10:20:50 executing program 1: r0 = socket$l2tp6(0xa, 0x2, 0x73) ioctl$sock_SIOCGIFINDEX_80211(r0, 0x8933, &(0x7f0000000140)={'wlan0\x00'}) 10:20:50 executing program 0: socket$nl_generic(0x10, 0x3, 0x10) r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$gtp(&(0x7f0000000080), 0xffffffffffffffff) sendmsg$GTP_CMD_DELPDP(r0, &(0x7f0000000180)={&(0x7f0000000040), 0xc, &(0x7f0000000140)={&(0x7f00000001c0)=ANY=[@ANYBLOB='$\x00\x00\x00', @ANYRES16=r1, @ANYBLOB="01"], 0x24}}, 0x0) syz_genetlink_get_family_id$gtp(0x0, 0xffffffffffffffff) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, 0x0) sendmsg$GTP_CMD_DELPDP(0xffffffffffffffff, &(0x7f0000000180)={&(0x7f0000000040), 0xc, &(0x7f0000000140)={&(0x7f00000001c0)=ANY=[], 0x24}}, 0x0) sendmsg$TEAM_CMD_OPTIONS_SET(0xffffffffffffffff, 0x0, 0x0) getpid() syz_open_procfs$userns(0x0, &(0x7f0000000100)) 10:20:50 executing program 4: r0 = socket$rds(0x15, 0x5, 0x0) sendmsg$rds(r0, &(0x7f0000000040)={0x0, 0x0, 0x0}, 0x4000000) 10:20:50 executing program 1: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_ipv6_tunnel_SIOCGETTUNNEL(r0, 0x89f0, &(0x7f0000000080)={'sit0\x00', &(0x7f0000000000)={'ip6tnl0\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @private0, @loopback}}) [ 2549.935128][T27380] netlink: 16 bytes leftover after parsing attributes in process `syz-executor.0'. [ 2549.980753][T27387] loop2: detected capacity change from 0 to 264192 [ 2550.005080][T27391] loop3: detected capacity change from 0 to 264192 [ 2550.063931][T27391] EXT4-fs (loop3): mounted filesystem without journal. Quota mode: writeback. [ 2550.077478][T27387] EXT4-fs (loop2): mounted filesystem without journal. Quota mode: writeback. 10:20:57 executing program 5: r0 = add_key$fscrypt_v1(&(0x7f0000000100), &(0x7f0000000040), &(0x7f0000000080)={0x0, "b9a0de152c297365a670fea840e4e4d08acff92d2ccedda29c4a9931cf16feeba23b70c70ac3dbd7182652b349384c63957e3ed7c7755f583a819ba76ec416e9"}, 0x48, 0xfffffffffffffffc) add_key$keyring(&(0x7f0000000000), 0x0, 0x0, 0x0, r0) 10:20:57 executing program 4: syz_open_dev$vcsa(&(0x7f0000000000), 0x0, 0x26c02) 10:20:57 executing program 0: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000019c0)={0x18, 0x3, &(0x7f00000017c0)=@framed, &(0x7f0000001800)='GPL\x00', 0x3e, 0xdc, &(0x7f0000001840)=""/220, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 10:20:57 executing program 1: r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$inet_mreqn(r0, 0x0, 0x20, &(0x7f00000000c0)={@dev, @empty}, 0xc) 10:20:57 executing program 2: prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, 0x0) r0 = getpid() sched_setscheduler(r0, 0x2, &(0x7f00000000c0)=0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff}) connect$unix(r1, &(0x7f000057eff8)=@abs, 0x6e) recvmmsg(r1, &(0x7f00000000c0), 0x10106, 0x2, 0x0) syz_mount_image$ext4(&(0x7f0000000180)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xfffbffff00000000, 0x8, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000600100000f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000006856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010300), 0x0, 0x640}, {&(0x7f0000010400)="03000000040000000500000016000f000300040000000000000000000f00698c", 0x20, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}, {&(0x7f0000011000)}, {0x0, 0x0, 0x6700000}, {&(0x7f0000000580), 0x0, 0xc000}], 0x0, &(0x7f0000013b00)=ANY=[@ANYBLOB='\x00']) r2 = socket(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f00000005c0)=@ipv4_newroute={0x38, 0x18, 0xbad, 0x0, 0x0, {}, [@RTA_ENCAP_TYPE={0x6, 0x15, 0x3}, @RTA_ENCAP={0x14, 0x16, 0x0, 0x1, @SEG6_IPTUNNEL_SRH={0xd}}]}, 0x38}}, 0x0) r3 = socket(0x26, 0x3, 0x0) sendmsg$nl_route(r3, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f00000005c0)=@ipv4_newroute={0x38, 0x18, 0xbad, 0x0, 0x0, {0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6}, [@RTA_ENCAP_TYPE={0x6, 0x15, 0x3}, @RTA_ENCAP={0x14, 0x16, 0x0, 0x1, @SEG6_IPTUNNEL_SRH={0xd}}]}, 0x38}}, 0x0) r4 = socket(0x10, 0x0, 0x0) sendmsg$nl_route(r4, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f00000005c0)=@ipv4_newroute={0x38, 0x18, 0xbad, 0x0, 0x0, {0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6}, [@RTA_ENCAP_TYPE={0x6, 0x15, 0x3}, @RTA_ENCAP={0x14, 0x16, 0x0, 0x1, @SEG6_IPTUNNEL_SRH={0xd}}]}, 0x38}}, 0x0) recvfrom(r1, &(0x7f0000000600)=""/203, 0xcb, 0x42, &(0x7f0000000700)=@hci={0x1f, 0xffffffffffffffff, 0x4}, 0x80) 10:20:57 executing program 3: prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x2, 0x0) r0 = getpid() sched_setscheduler(r0, 0x2, &(0x7f00000000c0)=0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r1, &(0x7f000057eff8)=@abs, 0x6e) sendmmsg$unix(r2, &(0x7f00000bd000), 0x318, 0x0) recvmmsg(r1, &(0x7f00000000c0), 0x10106, 0x2, 0x0) syz_mount_image$ext4(&(0x7f0000000180)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xfffbffff00000000, 0x8, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000600100000f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000006856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010300), 0x0, 0x640}, {&(0x7f0000010400)="03000000040000000500000016000f000300040000000000000000000f00698c", 0x20, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}, {&(0x7f0000011000)}, {0x0, 0x0, 0x6700000}, {&(0x7f0000000580), 0x0, 0xc000}], 0x0, &(0x7f0000013b00)=ANY=[@ANYBLOB='\x00']) r3 = creat(&(0x7f0000000000)='./file1\x00', 0x18) socket(0x10, 0x3, 0x0) r4 = socket(0x26, 0x3, 0x0) sendmsg$nl_route(r4, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f00000005c0)=@ipv4_newroute={0x38, 0x18, 0xbad, 0x0, 0x0, {0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6}, [@RTA_ENCAP_TYPE={0x6, 0x15, 0x3}, @RTA_ENCAP={0x14, 0x16, 0x0, 0x1, @SEG6_IPTUNNEL_SRH={0xd}}]}, 0x38}}, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f00000005c0)=@ipv4_newroute={0x38, 0x18, 0xbad, 0x0, 0x0, {0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6}, [@RTA_ENCAP_TYPE={0x6, 0x15, 0x3}, @RTA_ENCAP={0x14, 0x16, 0x0, 0x1, @SEG6_IPTUNNEL_SRH={0xd}}]}, 0x38}}, 0x0) execveat(r3, 0x0, &(0x7f0000000380)=[&(0x7f00000001c0)='+{!#\x00', &(0x7f0000000300)='ext4\x00', &(0x7f0000000340)='@(\x00'], &(0x7f00000004c0)=[&(0x7f00000003c0)='ext4\x00', &(0x7f0000000400)='ext4\x00', &(0x7f0000000500)='\x00.D\x04\xe0\xce\x99\xd9\xa9\xac\xac\xadH\xa4\xcf\xb7\xffT\xac\x05\xfd\xdd\xb8w\x0f\x82B\xff\xf2\x909`1!\f\x870\x1f\xc1%Y\xc8\x15c \xea\x1cY!\x04\xe4\x91^\x00\x04\xe4\xa6\xba\xc6\xfd\x10\xdf\xe24\xd4&\x17\xdc\xec\xf4\f\n\xb7.\x13\x8e\x1bYENj\xe1\x19~\x1c\xaf\a;d\x9f\xba\xd9T\xd4-\xecX\xc0Y\x83@\xc7\x8b\xff*\xdd\xaa\xc6,o4\xe2\x0f\x16\x01[\xc0\xeb\x7fFI]WF\x1f\f?\xfa\xb1\xe7\xf6t\x027\xb1\xc17.4V\xf81{9\xa3\xb9\x01\xcck@I\xe2\xf1Y\x10E\xa1z/\x05.~Yh%\x8f\x06sB)N\x11P\xf6p\xff\'\xaf\a7\x10+p\xbb\xf3\xb08\xb5)\x00\xeeg\xd0\xee\xe9\x98\x8d\xf8\xb5G\t@f\x1et v\x14\tT\xc5', 0x0], 0x1000) 10:20:57 executing program 0: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) recvfrom$inet(r0, 0x0, 0x0, 0x2002, 0x0, 0x0) 10:20:57 executing program 1: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r0, 0x89f2, &(0x7f0000000040)={'gre0\x00', &(0x7f00000002c0)=ANY=[]}) 10:20:57 executing program 4: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x1e, &(0x7f0000000000)=0x4, 0x4) 10:20:57 executing program 4: prlimit64(0x0, 0x0, 0x0, 0x0) sched_setscheduler(0x0, 0x0, &(0x7f0000000080)=0x7) sched_setaffinity(0x0, 0x8, &(0x7f0000000240)=0x2) sched_setscheduler(0x0, 0x2, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r0, &(0x7f0000000180)=@abs, 0x6e) sendmmsg$unix(r1, &(0x7f00000bd000), 0x318, 0x0) recvmmsg(r0, &(0x7f00000000c0), 0x10106, 0x2, 0x0) r2 = socket(0x10, 0x2, 0x0) write(r2, &(0x7f0000000100)="1c0000001a009b8a14000000ff0000adf87e28000000000000000000", 0x1c) recvmmsg(r2, &(0x7f0000002ec0), 0x400000000000ec0, 0x0, &(0x7f00000001c0)={0x77359400}) 10:20:57 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x0, &(0x7f00000004c0), 0x4) 10:20:57 executing program 1: r0 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$inet_tcp_TCP_REPAIR_WINDOW(r0, 0x6, 0x1d, &(0x7f0000000680), &(0x7f00000006c0)=0x14) [ 2557.094962][T27423] loop2: detected capacity change from 0 to 264192 [ 2557.146291][T27427] loop3: detected capacity change from 0 to 264192 [ 2557.210087][T27423] EXT4-fs (loop2): mounted filesystem without journal. Quota mode: writeback. [ 2557.246353][T27427] EXT4-fs (loop3): mounted filesystem without journal. Quota mode: writeback. 10:21:06 executing program 5: keyctl$instantiate(0xc, 0x0, 0x0, 0x0, 0xfffffffffffffffd) 10:21:06 executing program 1: recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0xc0000020, &(0x7f0000006a80)) r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000000100)={0x2, 0x4e20, @multicast2}, 0x62) setsockopt$inet_tcp_int(r0, 0x6, 0x2, &(0x7f0000000080)=0x2806, 0x4) r1 = openat(0xffffffffffffffff, &(0x7f00000002c0)='/proc/self/exe\x00', 0x0, 0x0) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000280)={0x1, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x3654}]}, 0x10) connect$inet(r0, &(0x7f0000000180)={0x2, 0x4e20, @loopback}, 0x10) sendfile(r0, r1, 0x0, 0x101000002) recvmsg(r0, &(0x7f0000000580)={0x0, 0x41, &(0x7f0000000500)=[{&(0x7f0000000740)=""/4084, 0xfffffe1f}], 0x6, 0x0, 0xfffffffffffffcc9}, 0x700) 10:21:06 executing program 0: r0 = socket$inet_sctp(0x2, 0x1, 0x84) sendmsg$inet_sctp(r0, &(0x7f0000000240)={&(0x7f0000000040)=@in6={0x1c, 0x1c, 0x2}, 0x1c, 0x0}, 0x0) getsockopt$inet_sctp_SCTP_AUTH_ACTIVE_KEY(r0, 0x84, 0x15, &(0x7f0000000000), &(0x7f0000000080)=0x8) 10:21:06 executing program 2: prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, 0x0) r0 = getpid() sched_setscheduler(r0, 0x2, &(0x7f00000000c0)=0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff}) connect$unix(r1, &(0x7f000057eff8)=@abs, 0x6e) recvmmsg(r1, &(0x7f00000000c0), 0x10106, 0x2, 0x0) syz_mount_image$ext4(&(0x7f0000000180)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xfffbffff00000000, 0x8, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000600100000f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000006856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010300), 0x0, 0x640}, {&(0x7f0000010400)="03000000040000000500000016000f000300040000000000000000000f00698c", 0x20, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}, {&(0x7f0000011000)}, {0x0, 0x0, 0x6700000}, {&(0x7f0000000580), 0x0, 0xc000}], 0x0, &(0x7f0000013b00)=ANY=[@ANYBLOB='\x00']) r2 = socket(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f00000005c0)=@ipv4_newroute={0x38, 0x18, 0xbad, 0x0, 0x0, {}, [@RTA_ENCAP_TYPE={0x6, 0x15, 0x3}, @RTA_ENCAP={0x14, 0x16, 0x0, 0x1, @SEG6_IPTUNNEL_SRH={0xd}}]}, 0x38}}, 0x0) r3 = socket(0x26, 0x3, 0x0) sendmsg$nl_route(r3, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f00000005c0)=@ipv4_newroute={0x38, 0x18, 0xbad, 0x0, 0x0, {0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6}, [@RTA_ENCAP_TYPE={0x6, 0x15, 0x3}, @RTA_ENCAP={0x14, 0x16, 0x0, 0x1, @SEG6_IPTUNNEL_SRH={0xd}}]}, 0x38}}, 0x0) r4 = socket(0x10, 0x0, 0x0) sendmsg$nl_route(r4, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f00000005c0)=@ipv4_newroute={0x38, 0x18, 0xbad, 0x0, 0x0, {0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6}, [@RTA_ENCAP_TYPE={0x6, 0x15, 0x3}, @RTA_ENCAP={0x14, 0x16, 0x0, 0x1, @SEG6_IPTUNNEL_SRH={0xd}}]}, 0x38}}, 0x0) recvfrom(r1, &(0x7f0000000600)=""/203, 0xcb, 0x42, &(0x7f0000000700)=@hci={0x1f, 0xffffffffffffffff, 0x4}, 0x80) 10:21:06 executing program 3: prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x2, 0x0) r0 = getpid() sched_setscheduler(r0, 0x2, &(0x7f00000000c0)=0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r1, &(0x7f000057eff8)=@abs, 0x6e) sendmmsg$unix(r2, &(0x7f00000bd000), 0x318, 0x0) recvmmsg(r1, &(0x7f00000000c0), 0x10106, 0x2, 0x0) syz_mount_image$ext4(&(0x7f0000000180)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xfffbffff00000000, 0x8, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000600100000f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000006856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010300), 0x0, 0x640}, {&(0x7f0000010400)="03000000040000000500000016000f000300040000000000000000000f00698c", 0x20, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}, {&(0x7f0000011000)}, {0x0, 0x0, 0x6700000}, {&(0x7f0000000580), 0x0, 0xc000}], 0x0, &(0x7f0000013b00)=ANY=[@ANYBLOB='\x00']) r3 = creat(&(0x7f0000000000)='./file1\x00', 0x18) socket(0x10, 0x3, 0x0) r4 = socket(0x26, 0x3, 0x0) sendmsg$nl_route(r4, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f00000005c0)=@ipv4_newroute={0x38, 0x18, 0xbad, 0x0, 0x0, {0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6}, [@RTA_ENCAP_TYPE={0x6, 0x15, 0x3}, @RTA_ENCAP={0x14, 0x16, 0x0, 0x1, @SEG6_IPTUNNEL_SRH={0xd}}]}, 0x38}}, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f00000005c0)=@ipv4_newroute={0x38, 0x18, 0xbad, 0x0, 0x0, {0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6}, [@RTA_ENCAP_TYPE={0x6, 0x15, 0x3}, @RTA_ENCAP={0x14, 0x16, 0x0, 0x1, @SEG6_IPTUNNEL_SRH={0xd}}]}, 0x38}}, 0x0) execveat(r3, 0x0, &(0x7f0000000380)=[&(0x7f00000001c0)='+{!#\x00', &(0x7f0000000300)='ext4\x00', &(0x7f0000000340)='@(\x00'], &(0x7f00000004c0)=[&(0x7f00000003c0)='ext4\x00', &(0x7f0000000400)='ext4\x00', &(0x7f0000000500)='\x00.D\x04\xe0\xce\x99\xd9\xa9\xac\xac\xadH\xa4\xcf\xb7\xffT\xac\x05\xfd\xdd\xb8w\x0f\x82B\xff\xf2\x909`1!\f\x870\x1f\xc1%Y\xc8\x15c \xea\x1cY!\x04\xe4\x91^\x00\x04\xe4\xa6\xba\xc6\xfd\x10\xdf\xe24\xd4&\x17\xdc\xec\xf4\f\n\xb7.\x13\x8e\x1bYENj\xe1\x19~\x1c\xaf\a;d\x9f\xba\xd9T\xd4-\xecX\xc0Y\x83@\xc7\x8b\xff*\xdd\xaa\xc6,o4\xe2\x0f\x16\x01[\xc0\xeb\x7fFI]WF\x1f\f?\xfa\xb1\xe7\xf6t\x027\xb1\xc17.4V\xf81{9\xa3\xb9\x01\xcck@I\xe2\xf1Y\x10E\xa1z/\x05.~Yh%\x8f\x06sB)N\x11P\xf6p\xff\'\xaf\a7\x10+p\xbb\xf3\xb08\xb5)\x00\xeeg\xd0\xee\xe9\x98\x8d\xf8\xb5G\t@f\x1et v\x14\tT\xc5', 0x0], 0x1000) 10:21:06 executing program 4: r0 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$inet_tcp_TCP_REPAIR_WINDOW(r0, 0x6, 0x18, 0x0, &(0x7f00000006c0)) 10:21:06 executing program 0: r0 = openat$binderfs(0xffffffffffffff9c, &(0x7f0000000240)='./binderfs/binder0\x00', 0x0, 0x0) ioctl$BINDER_WRITE_READ(r0, 0xc0306201, 0x0) 10:21:06 executing program 4: r0 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$inet_tcp_buf(r0, 0x6, 0x0, 0x0, &(0x7f0000000040)) 10:21:06 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$inet_tcp_TCP_REPAIR_WINDOW(r0, 0x6, 0x24, 0x0, &(0x7f00000006c0)) 10:21:06 executing program 4: prlimit64(0x0, 0x0, 0x0, 0x0) sched_setaffinity(0x0, 0x8, &(0x7f0000000240)=0x2) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r0, 0x0, 0x0) sendmmsg$unix(r1, &(0x7f00000bd000), 0x318, 0x0) recvmmsg(r0, &(0x7f00000000c0), 0x10106, 0x0, 0x0) r2 = socket(0x10, 0x2, 0x0) write(r2, &(0x7f0000000100)="1c0000001a009b8a14000000ff0000adf87e28000000000000000000", 0x1c) recvmmsg(r2, &(0x7f0000002ec0), 0x400000000000ec0, 0x1c000, &(0x7f00000001c0)={0x77359400}) 10:21:06 executing program 0: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000440)={0x9, 0x3, &(0x7f0000000180)=@framed, &(0x7f00000001c0)='syzkaller\x00', 0x3, 0xe4, &(0x7f0000000200)=""/228, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 10:21:06 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000340)={&(0x7f0000000180)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x3, [@struct={0x2}]}, {0x0, [0x0]}}, &(0x7f0000000240)=""/210, 0x27, 0xd2, 0x1}, 0x20) [ 2566.295046][T27462] loop2: detected capacity change from 0 to 264192 [ 2566.334403][T27462] EXT4-fs (loop2): mounted filesystem without journal. Quota mode: writeback. [ 2566.344356][T27466] loop3: detected capacity change from 0 to 264192 [ 2566.364628][T27466] EXT4-fs (loop3): mounted filesystem without journal. Quota mode: writeback. 10:21:12 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000340)={&(0x7f0000000180)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x6, [@struct={0x0, 0x1, 0x0, 0x4, 0x0, 0x0, [{0x5}]}]}, {0x0, [0x0, 0x0, 0x0, 0x0]}}, &(0x7f0000000240)=""/210, 0x36, 0xd2, 0x1}, 0x20) 10:21:12 executing program 0: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000440)={0x18, 0x3, &(0x7f0000000180)=@framed={{0x18, 0xa}}, &(0x7f00000001c0)='syzkaller\x00', 0x3, 0xe4, &(0x7f0000000200)=""/228, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 10:21:12 executing program 1: syz_clone(0x30028000, 0x0, 0x0, 0x0, 0x0, 0x0) 10:21:12 executing program 2: prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, 0x0) r0 = getpid() sched_setscheduler(r0, 0x2, &(0x7f00000000c0)=0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff}) connect$unix(r1, &(0x7f000057eff8)=@abs, 0x6e) recvmmsg(r1, &(0x7f00000000c0), 0x10106, 0x2, 0x0) syz_mount_image$ext4(&(0x7f0000000180)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xfffbffff00000000, 0x8, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000600100000f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000006856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010300), 0x0, 0x640}, {&(0x7f0000010400)="03000000040000000500000016000f000300040000000000000000000f00698c", 0x20, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}, {&(0x7f0000011000)}, {0x0, 0x0, 0x6700000}, {&(0x7f0000000580), 0x0, 0xc000}], 0x0, &(0x7f0000013b00)=ANY=[@ANYBLOB='\x00']) r2 = socket(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f00000005c0)=@ipv4_newroute={0x38, 0x18, 0xbad, 0x0, 0x0, {}, [@RTA_ENCAP_TYPE={0x6, 0x15, 0x3}, @RTA_ENCAP={0x14, 0x16, 0x0, 0x1, @SEG6_IPTUNNEL_SRH={0xd}}]}, 0x38}}, 0x0) r3 = socket(0x26, 0x3, 0x0) sendmsg$nl_route(r3, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f00000005c0)=@ipv4_newroute={0x38, 0x18, 0xbad, 0x0, 0x0, {0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6}, [@RTA_ENCAP_TYPE={0x6, 0x15, 0x3}, @RTA_ENCAP={0x14, 0x16, 0x0, 0x1, @SEG6_IPTUNNEL_SRH={0xd}}]}, 0x38}}, 0x0) r4 = socket(0x10, 0x0, 0x0) sendmsg$nl_route(r4, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f00000005c0)=@ipv4_newroute={0x38, 0x18, 0xbad, 0x0, 0x0, {0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6}, [@RTA_ENCAP_TYPE={0x6, 0x15, 0x3}, @RTA_ENCAP={0x14, 0x16, 0x0, 0x1, @SEG6_IPTUNNEL_SRH={0xd}}]}, 0x38}}, 0x0) recvfrom(r1, &(0x7f0000000600)=""/203, 0xcb, 0x42, &(0x7f0000000700)=@hci={0x1f, 0xffffffffffffffff, 0x4}, 0x80) 10:21:12 executing program 3: prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x2, 0x0) r0 = getpid() sched_setscheduler(r0, 0x2, &(0x7f00000000c0)=0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r1, &(0x7f000057eff8)=@abs, 0x6e) sendmmsg$unix(r2, &(0x7f00000bd000), 0x318, 0x0) recvmmsg(r1, &(0x7f00000000c0), 0x10106, 0x2, 0x0) syz_mount_image$ext4(&(0x7f0000000180)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xfffbffff00000000, 0x8, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000600100000f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000006856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010300), 0x0, 0x640}, {&(0x7f0000010400)="03000000040000000500000016000f000300040000000000000000000f00698c", 0x20, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}, {&(0x7f0000011000)}, {0x0, 0x0, 0x6700000}, {&(0x7f0000000580), 0x0, 0xc000}], 0x0, &(0x7f0000013b00)=ANY=[@ANYBLOB='\x00']) r3 = creat(&(0x7f0000000000)='./file1\x00', 0x18) socket(0x10, 0x3, 0x0) r4 = socket(0x26, 0x3, 0x0) sendmsg$nl_route(r4, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f00000005c0)=@ipv4_newroute={0x38, 0x18, 0xbad, 0x0, 0x0, {0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6}, [@RTA_ENCAP_TYPE={0x6, 0x15, 0x3}, @RTA_ENCAP={0x14, 0x16, 0x0, 0x1, @SEG6_IPTUNNEL_SRH={0xd}}]}, 0x38}}, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f00000005c0)=@ipv4_newroute={0x38, 0x18, 0xbad, 0x0, 0x0, {0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6}, [@RTA_ENCAP_TYPE={0x6, 0x15, 0x3}, @RTA_ENCAP={0x14, 0x16, 0x0, 0x1, @SEG6_IPTUNNEL_SRH={0xd}}]}, 0x38}}, 0x0) execveat(r3, 0x0, &(0x7f0000000380)=[&(0x7f00000001c0)='+{!#\x00', &(0x7f0000000300)='ext4\x00', &(0x7f0000000340)='@(\x00'], &(0x7f00000004c0)=[&(0x7f00000003c0)='ext4\x00', &(0x7f0000000400)='ext4\x00', &(0x7f0000000500)='\x00.D\x04\xe0\xce\x99\xd9\xa9\xac\xac\xadH\xa4\xcf\xb7\xffT\xac\x05\xfd\xdd\xb8w\x0f\x82B\xff\xf2\x909`1!\f\x870\x1f\xc1%Y\xc8\x15c \xea\x1cY!\x04\xe4\x91^\x00\x04\xe4\xa6\xba\xc6\xfd\x10\xdf\xe24\xd4&\x17\xdc\xec\xf4\f\n\xb7.\x13\x8e\x1bYENj\xe1\x19~\x1c\xaf\a;d\x9f\xba\xd9T\xd4-\xecX\xc0Y\x83@\xc7\x8b\xff*\xdd\xaa\xc6,o4\xe2\x0f\x16\x01[\xc0\xeb\x7fFI]WF\x1f\f?\xfa\xb1\xe7\xf6t\x027\xb1\xc17.4V\xf81{9\xa3\xb9\x01\xcck@I\xe2\xf1Y\x10E\xa1z/\x05.~Yh%\x8f\x06sB)N\x11P\xf6p\xff\'\xaf\a7\x10+p\xbb\xf3\xb08\xb5)\x00\xeeg\xd0\xee\xe9\x98\x8d\xf8\xb5G\t@f\x1et v\x14\tT\xc5', 0x0], 0x1000) 10:21:12 executing program 4: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000440)={0x18, 0x5, &(0x7f0000000000)=@raw=[@map_idx, @func, @cb_func={0x18, 0x0, 0x4, 0x0, 0xfffffffffffffffd}], &(0x7f00000001c0)='syzkaller\x00', 0x1, 0xe4, &(0x7f0000000200)=""/228, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 10:21:12 executing program 0: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000440)={0x18, 0xd, &(0x7f0000000100)=@framed={{}, [@cb_func, @func={0x85, 0x0, 0x1, 0x0, 0x4}, @cb_func={0x18, 0x0, 0x4, 0x0, 0x6}, @initr0, @map_idx, @kfunc]}, &(0x7f00000001c0)='syzkaller\x00', 0x3, 0xe4, &(0x7f0000000200)=""/228, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 10:21:12 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) recvmsg$unix(r0, &(0x7f0000001600)={&(0x7f00000000c0), 0xffffffffffffff97, &(0x7f0000000300)=[{&(0x7f0000000380)=""/201, 0xc9}, {&(0x7f0000001880)=""/4096, 0x1000}, {&(0x7f0000001640)=""/43, 0x2b}, {&(0x7f0000000240)=""/111, 0x6f}, {&(0x7f0000000040)=""/10, 0xa}, {&(0x7f0000001780)=""/246, 0xf6}, {&(0x7f0000000480)=""/159, 0x97}], 0x7, &(0x7f0000000140)=[@cred={{0x1c}}, @rights={{0x30, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}], 0x50}, 0x0) 10:21:12 executing program 4: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$sock(r0, &(0x7f0000000300)={&(0x7f0000000040)=@l2tp6={0xa, 0x0, 0x0, @local}, 0x80, 0x0}, 0x0) 10:21:12 executing program 1: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000440)={0x18, 0x3, &(0x7f0000000180)=@framed={{0x18, 0xe}}, &(0x7f00000001c0)='syzkaller\x00', 0x3, 0xe4, &(0x7f0000000200)=""/228, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 10:21:12 executing program 0: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000440)={0x18, 0x3, &(0x7f0000000180)=@framed, &(0x7f00000001c0)='syzkaller\x00', 0x3, 0xe4, &(0x7f0000000200)=""/228, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0xd00) 10:21:12 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000340)={0xffffffffffffffff}) recvmsg$unix(r0, &(0x7f00000005c0)={0x0, 0x0, 0x0}, 0x40000140) [ 2572.485058][T27499] loop2: detected capacity change from 0 to 264192 [ 2572.516634][T27499] EXT4-fs (loop2): mounted filesystem without journal. Quota mode: writeback. [ 2572.534901][T27503] loop3: detected capacity change from 0 to 264192 [ 2572.555389][T27503] EXT4-fs (loop3): mounted filesystem without journal. Quota mode: writeback. 10:21:19 executing program 5: perf_event_open(&(0x7f0000000000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 10:21:19 executing program 4: bpf$MAP_CREATE(0x0, &(0x7f00000019c0)=@base={0x9, 0x8, 0x7e00, 0x72, 0x0, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x1}, 0x48) 10:21:19 executing program 1: syz_clone(0x26104000, 0x0, 0x0, &(0x7f0000001180), 0x0, &(0x7f0000001200)) 10:21:19 executing program 0: perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2e6c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, 0x0, 0x1ff) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)=@base={0x19, 0x4, 0x4, 0x9, 0x0, 0x1}, 0x48) r1 = bpf$MAP_CREATE(0x100000000000000, &(0x7f0000000140)=@base={0xa, 0x16, 0x8, 0x7f}, 0x48) r2 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000440)={0x11, 0xa, &(0x7f0000000680)=@framed={{0x18, 0x8}, [@func={0x85, 0x0, 0x1, 0x0, 0x6}, @map_fd={0x18, 0x0, 0x1, 0x0, r1}, @generic={0x15}, @initr0, @exit]}, &(0x7f0000000000)='GPL\x00', 0x4, 0xee, &(0x7f0000000340)=""/238, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$PROG_BIND_MAP(0x23, &(0x7f0000000300)={r2, r0}, 0xc) 10:21:19 executing program 2: prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f00000002c0)) getpid() sched_setscheduler(0x0, 0x2, &(0x7f00000000c0)=0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff}) connect$unix(r0, &(0x7f000057eff8)=@abs, 0x6e) recvmmsg(r0, &(0x7f00000000c0), 0x10106, 0x2, 0x0) syz_mount_image$ext4(&(0x7f0000000180)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xfffbffff00000000, 0x8, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000600100000f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000006856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010300), 0x0, 0x640}, {&(0x7f0000010400)="03000000040000000500000016000f000300040000000000000000000f00698c", 0x20, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}, {&(0x7f0000011000)}, {0x0, 0x0, 0x6700000}, {&(0x7f0000000580), 0x0, 0xc000}], 0x0, &(0x7f0000013b00)=ANY=[@ANYBLOB='\x00']) r1 = socket(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f00000005c0)=@ipv4_newroute={0x38, 0x18, 0xbad, 0x0, 0x0, {}, [@RTA_ENCAP_TYPE={0x6, 0x15, 0x3}, @RTA_ENCAP={0x14, 0x16, 0x0, 0x1, @SEG6_IPTUNNEL_SRH={0xd}}]}, 0x38}}, 0x0) r2 = socket(0x26, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f00000005c0)=@ipv4_newroute={0x38, 0x18, 0xbad, 0x0, 0x0, {0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6}, [@RTA_ENCAP_TYPE={0x6, 0x15, 0x3}, @RTA_ENCAP={0x14, 0x16, 0x0, 0x1, @SEG6_IPTUNNEL_SRH={0xd}}]}, 0x38}}, 0x0) r3 = socket(0x10, 0x0, 0x0) sendmsg$nl_route(r3, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f00000005c0)=@ipv4_newroute={0x38, 0x18, 0xbad, 0x0, 0x0, {0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6}, [@RTA_ENCAP_TYPE={0x6, 0x15, 0x3}, @RTA_ENCAP={0x14, 0x16, 0x0, 0x1, @SEG6_IPTUNNEL_SRH={0xd}}]}, 0x38}}, 0x0) recvfrom(r0, &(0x7f0000000600)=""/203, 0xcb, 0x42, &(0x7f0000000700)=@hci={0x1f, 0xffffffffffffffff, 0x4}, 0x80) 10:21:19 executing program 3: prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x2, &(0x7f0000000080)) r0 = getpid() sched_setscheduler(r0, 0x2, &(0x7f00000000c0)=0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r1, &(0x7f000057eff8)=@abs, 0x6e) sendmmsg$unix(r2, &(0x7f00000bd000), 0x318, 0x0) recvmmsg(r1, &(0x7f00000000c0), 0x10106, 0x2, 0x0) syz_mount_image$ext4(&(0x7f0000000180)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xfffbffff00000000, 0x8, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000600100000f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000006856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010300), 0x0, 0x640}, {&(0x7f0000010400)="03000000040000000500000016000f000300040000000000000000000f00698c", 0x20, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}, {&(0x7f0000011000)}, {0x0, 0x0, 0x6700000}, {&(0x7f0000000580), 0x0, 0xc000}], 0x0, &(0x7f0000013b00)=ANY=[@ANYBLOB='\x00']) r3 = creat(&(0x7f0000000000)='./file1\x00', 0x18) socket(0x10, 0x3, 0x0) r4 = socket(0x26, 0x3, 0x0) sendmsg$nl_route(r4, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f00000005c0)=@ipv4_newroute={0x38, 0x18, 0xbad, 0x0, 0x0, {0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6}, [@RTA_ENCAP_TYPE={0x6, 0x15, 0x3}, @RTA_ENCAP={0x14, 0x16, 0x0, 0x1, @SEG6_IPTUNNEL_SRH={0xd}}]}, 0x38}}, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f00000005c0)=@ipv4_newroute={0x38, 0x18, 0xbad, 0x0, 0x0, {0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6}, [@RTA_ENCAP_TYPE={0x6, 0x15, 0x3}, @RTA_ENCAP={0x14, 0x16, 0x0, 0x1, @SEG6_IPTUNNEL_SRH={0xd}}]}, 0x38}}, 0x0) execveat(r3, 0x0, &(0x7f0000000380)=[&(0x7f00000001c0)='+{!#\x00', &(0x7f0000000300)='ext4\x00', &(0x7f0000000340)='@(\x00'], &(0x7f00000004c0)=[&(0x7f00000003c0)='ext4\x00', &(0x7f0000000400)='ext4\x00', &(0x7f0000000500)='\x00.D\x04\xe0\xce\x99\xd9\xa9\xac\xac\xadH\xa4\xcf\xb7\xffT\xac\x05\xfd\xdd\xb8w\x0f\x82B\xff\xf2\x909`1!\f\x870\x1f\xc1%Y\xc8\x15c \xea\x1cY!\x04\xe4\x91^\x00\x04\xe4\xa6\xba\xc6\xfd\x10\xdf\xe24\xd4&\x17\xdc\xec\xf4\f\n\xb7.\x13\x8e\x1bYENj\xe1\x19~\x1c\xaf\a;d\x9f\xba\xd9T\xd4-\xecX\xc0Y\x83@\xc7\x8b\xff*\xdd\xaa\xc6,o4\xe2\x0f\x16\x01[\xc0\xeb\x7fFI]WF\x1f\f?\xfa\xb1\xe7\xf6t\x027\xb1\xc17.4V\xf81{9\xa3\xb9\x01\xcck@I\xe2\xf1Y\x10E\xa1z/\x05.~Yh%\x8f\x06sB)N\x11P\xf6p\xff\'\xaf\a7\x10+p\xbb\xf3\xb08\xb5)\x00\xeeg\xd0\xee\xe9\x98\x8d\xf8\xb5G\t@f\x1et v\x14\tT\xc5', 0x0], 0x1000) 10:21:20 executing program 0: perf_event_open(&(0x7f0000000000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 10:21:20 executing program 0: r0 = perf_event_open(&(0x7f0000000000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f0000000080)='{$)\x00') 10:21:20 executing program 0: socketpair(0x28, 0x0, 0x4fa7, &(0x7f0000000100)) 10:21:20 executing program 0: perf_event_open(&(0x7f0000000000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x700, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 10:21:20 executing program 4: perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 10:21:20 executing program 0: bpf$MAP_CREATE(0x0, &(0x7f00000019c0)=@base={0x9, 0x0, 0x0, 0x0, 0x3, 0x1}, 0x48) [ 2579.639982][T27530] loop2: detected capacity change from 0 to 264192 [ 2579.697975][T27538] loop3: detected capacity change from 0 to 264192 [ 2579.734147][T27530] EXT4-fs (loop2): mounted filesystem without journal. Quota mode: writeback. [ 2579.773375][T27538] EXT4-fs (loop3): mounted filesystem without journal. Quota mode: writeback. 10:21:27 executing program 5: bpf$MAP_CREATE(0x0, &(0x7f00000019c0)=@base={0x9, 0x8, 0x1, 0x72, 0x2, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x1}, 0x48) 10:21:27 executing program 4: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r0, &(0x7f00000004c0)=ANY=[], 0x4) write$cgroup_int(r1, &(0x7f0000000200), 0x23fe00) write$cgroup_subtree(r1, &(0x7f0000000240)={[{0x0, 'net_cls'}]}, 0x9) 10:21:27 executing program 0: r0 = perf_event_open(&(0x7f0000000000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_ID(r0, 0xc020660b, 0x0) 10:21:27 executing program 1: r0 = perf_event_open(&(0x7f0000000000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(r0, 0x4020940d, &(0x7f0000000080)={0x3, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}) 10:21:27 executing program 2: prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f00000002c0)) getpid() sched_setscheduler(0x0, 0x2, &(0x7f00000000c0)=0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff}) connect$unix(r0, &(0x7f000057eff8)=@abs, 0x6e) recvmmsg(r0, &(0x7f00000000c0), 0x10106, 0x2, 0x0) syz_mount_image$ext4(&(0x7f0000000180)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xfffbffff00000000, 0x8, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000600100000f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000006856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010300), 0x0, 0x640}, {&(0x7f0000010400)="03000000040000000500000016000f000300040000000000000000000f00698c", 0x20, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}, {&(0x7f0000011000)}, {0x0, 0x0, 0x6700000}, {&(0x7f0000000580), 0x0, 0xc000}], 0x0, &(0x7f0000013b00)=ANY=[@ANYBLOB='\x00']) r1 = socket(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f00000005c0)=@ipv4_newroute={0x38, 0x18, 0xbad, 0x0, 0x0, {}, [@RTA_ENCAP_TYPE={0x6, 0x15, 0x3}, @RTA_ENCAP={0x14, 0x16, 0x0, 0x1, @SEG6_IPTUNNEL_SRH={0xd}}]}, 0x38}}, 0x0) r2 = socket(0x26, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f00000005c0)=@ipv4_newroute={0x38, 0x18, 0xbad, 0x0, 0x0, {0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6}, [@RTA_ENCAP_TYPE={0x6, 0x15, 0x3}, @RTA_ENCAP={0x14, 0x16, 0x0, 0x1, @SEG6_IPTUNNEL_SRH={0xd}}]}, 0x38}}, 0x0) r3 = socket(0x10, 0x0, 0x0) sendmsg$nl_route(r3, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f00000005c0)=@ipv4_newroute={0x38, 0x18, 0xbad, 0x0, 0x0, {0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6}, [@RTA_ENCAP_TYPE={0x6, 0x15, 0x3}, @RTA_ENCAP={0x14, 0x16, 0x0, 0x1, @SEG6_IPTUNNEL_SRH={0xd}}]}, 0x38}}, 0x0) recvfrom(r0, &(0x7f0000000600)=""/203, 0xcb, 0x42, &(0x7f0000000700)=@hci={0x1f, 0xffffffffffffffff, 0x4}, 0x80) 10:21:27 executing program 3: prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x2, &(0x7f0000000080)) r0 = getpid() sched_setscheduler(r0, 0x2, &(0x7f00000000c0)=0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r1, &(0x7f000057eff8)=@abs, 0x6e) sendmmsg$unix(r2, &(0x7f00000bd000), 0x318, 0x0) recvmmsg(r1, &(0x7f00000000c0), 0x10106, 0x2, 0x0) syz_mount_image$ext4(&(0x7f0000000180)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xfffbffff00000000, 0x8, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000600100000f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000006856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010300), 0x0, 0x640}, {&(0x7f0000010400)="03000000040000000500000016000f000300040000000000000000000f00698c", 0x20, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}, {&(0x7f0000011000)}, {0x0, 0x0, 0x6700000}, {&(0x7f0000000580), 0x0, 0xc000}], 0x0, &(0x7f0000013b00)=ANY=[@ANYBLOB='\x00']) r3 = creat(&(0x7f0000000000)='./file1\x00', 0x18) socket(0x10, 0x3, 0x0) r4 = socket(0x26, 0x3, 0x0) sendmsg$nl_route(r4, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f00000005c0)=@ipv4_newroute={0x38, 0x18, 0xbad, 0x0, 0x0, {0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6}, [@RTA_ENCAP_TYPE={0x6, 0x15, 0x3}, @RTA_ENCAP={0x14, 0x16, 0x0, 0x1, @SEG6_IPTUNNEL_SRH={0xd}}]}, 0x38}}, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f00000005c0)=@ipv4_newroute={0x38, 0x18, 0xbad, 0x0, 0x0, {0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6}, [@RTA_ENCAP_TYPE={0x6, 0x15, 0x3}, @RTA_ENCAP={0x14, 0x16, 0x0, 0x1, @SEG6_IPTUNNEL_SRH={0xd}}]}, 0x38}}, 0x0) execveat(r3, 0x0, &(0x7f0000000380)=[&(0x7f00000001c0)='+{!#\x00', &(0x7f0000000300)='ext4\x00', &(0x7f0000000340)='@(\x00'], &(0x7f00000004c0)=[&(0x7f00000003c0)='ext4\x00', &(0x7f0000000400)='ext4\x00', &(0x7f0000000500)='\x00.D\x04\xe0\xce\x99\xd9\xa9\xac\xac\xadH\xa4\xcf\xb7\xffT\xac\x05\xfd\xdd\xb8w\x0f\x82B\xff\xf2\x909`1!\f\x870\x1f\xc1%Y\xc8\x15c \xea\x1cY!\x04\xe4\x91^\x00\x04\xe4\xa6\xba\xc6\xfd\x10\xdf\xe24\xd4&\x17\xdc\xec\xf4\f\n\xb7.\x13\x8e\x1bYENj\xe1\x19~\x1c\xaf\a;d\x9f\xba\xd9T\xd4-\xecX\xc0Y\x83@\xc7\x8b\xff*\xdd\xaa\xc6,o4\xe2\x0f\x16\x01[\xc0\xeb\x7fFI]WF\x1f\f?\xfa\xb1\xe7\xf6t\x027\xb1\xc17.4V\xf81{9\xa3\xb9\x01\xcck@I\xe2\xf1Y\x10E\xa1z/\x05.~Yh%\x8f\x06sB)N\x11P\xf6p\xff\'\xaf\a7\x10+p\xbb\xf3\xb08\xb5)\x00\xeeg\xd0\xee\xe9\x98\x8d\xf8\xb5G\t@f\x1et v\x14\tT\xc5', 0x0], 0x1000) 10:21:27 executing program 1: perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = bpf$MAP_CREATE(0x100000000000000, &(0x7f0000000140)=@base={0xa, 0x16, 0x8, 0x7f}, 0x48) r1 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000440)={0x11, 0xa, &(0x7f0000000680)=@framed={{0x18, 0x8}, [@func={0x85, 0x0, 0x1, 0x0, 0x6}, @map_fd={0x18, 0x0, 0x1, 0x0, r0}, @generic={0x15}, @initr0, @exit]}, &(0x7f0000000000)='GPL\x00', 0x4, 0xee, &(0x7f0000000340)=""/238, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$PROG_BIND_MAP(0xa, &(0x7f0000000300)={r1}, 0xc) 10:21:27 executing program 0: r0 = perf_event_open(&(0x7f0000000000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_ID(r0, 0xc0189436, 0x0) 10:21:27 executing program 1: bpf$MAP_CREATE(0x0, &(0x7f00000019c0)=@base={0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x2}, 0x48) 10:21:27 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000600)={&(0x7f0000000040)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x10, 0x10, 0x6, [@var={0x2}]}, {0x0, [0x0, 0x5f, 0x2e, 0x2e]}}, &(0x7f0000000500)=""/224, 0x2e, 0xe0, 0x1}, 0x20) 10:21:27 executing program 1: perf_event_open(&(0x7f0000000040)={0x8, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 10:21:27 executing program 0: bpf$MAP_CREATE(0x0, &(0x7f0000001e00)=@base={0x5, 0x3, 0x8, 0x16, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x3}, 0x48) [ 2586.763131][T27569] loop2: detected capacity change from 0 to 264192 [ 2586.772681][T27569] EXT4-fs (loop2): mounted filesystem without journal. Quota mode: writeback. [ 2586.824946][T27575] loop3: detected capacity change from 0 to 264192 [ 2586.843987][T27575] EXT4-fs (loop3): mounted filesystem without journal. Quota mode: writeback. 10:21:31 executing program 5: bpf$MAP_CREATE(0x0, &(0x7f0000000080)=@base={0x10, 0x0, 0x0, 0xa34}, 0x48) 10:21:31 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000600)={&(0x7f0000000480)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x4, [@enum={0x0, 0x1, 0x0, 0x6, 0x4, [{0x3}]}]}, {0x0, [0x0, 0x0]}}, &(0x7f0000000500)=""/224, 0x30, 0xe0, 0x1}, 0x20) 10:21:31 executing program 0: socketpair(0x1f, 0x0, 0x0, &(0x7f00000001c0)) 10:21:31 executing program 4: bpf$MAP_CREATE(0x10, &(0x7f0000000540), 0x48) 10:21:31 executing program 2: prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f00000002c0)) getpid() sched_setscheduler(0x0, 0x2, &(0x7f00000000c0)=0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff}) connect$unix(r0, &(0x7f000057eff8)=@abs, 0x6e) recvmmsg(r0, &(0x7f00000000c0), 0x10106, 0x2, 0x0) syz_mount_image$ext4(&(0x7f0000000180)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xfffbffff00000000, 0x8, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000600100000f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000006856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010300), 0x0, 0x640}, {&(0x7f0000010400)="03000000040000000500000016000f000300040000000000000000000f00698c", 0x20, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}, {&(0x7f0000011000)}, {0x0, 0x0, 0x6700000}, {&(0x7f0000000580), 0x0, 0xc000}], 0x0, &(0x7f0000013b00)=ANY=[@ANYBLOB='\x00']) r1 = socket(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f00000005c0)=@ipv4_newroute={0x38, 0x18, 0xbad, 0x0, 0x0, {}, [@RTA_ENCAP_TYPE={0x6, 0x15, 0x3}, @RTA_ENCAP={0x14, 0x16, 0x0, 0x1, @SEG6_IPTUNNEL_SRH={0xd}}]}, 0x38}}, 0x0) r2 = socket(0x26, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f00000005c0)=@ipv4_newroute={0x38, 0x18, 0xbad, 0x0, 0x0, {0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6}, [@RTA_ENCAP_TYPE={0x6, 0x15, 0x3}, @RTA_ENCAP={0x14, 0x16, 0x0, 0x1, @SEG6_IPTUNNEL_SRH={0xd}}]}, 0x38}}, 0x0) r3 = socket(0x10, 0x0, 0x0) sendmsg$nl_route(r3, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f00000005c0)=@ipv4_newroute={0x38, 0x18, 0xbad, 0x0, 0x0, {0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6}, [@RTA_ENCAP_TYPE={0x6, 0x15, 0x3}, @RTA_ENCAP={0x14, 0x16, 0x0, 0x1, @SEG6_IPTUNNEL_SRH={0xd}}]}, 0x38}}, 0x0) recvfrom(r0, &(0x7f0000000600)=""/203, 0xcb, 0x42, &(0x7f0000000700)=@hci={0x1f, 0xffffffffffffffff, 0x4}, 0x80) 10:21:31 executing program 3: prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x2, &(0x7f0000000080)) r0 = getpid() sched_setscheduler(r0, 0x2, &(0x7f00000000c0)=0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r1, &(0x7f000057eff8)=@abs, 0x6e) sendmmsg$unix(r2, &(0x7f00000bd000), 0x318, 0x0) recvmmsg(r1, &(0x7f00000000c0), 0x10106, 0x2, 0x0) syz_mount_image$ext4(&(0x7f0000000180)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xfffbffff00000000, 0x8, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000600100000f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000006856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010300), 0x0, 0x640}, {&(0x7f0000010400)="03000000040000000500000016000f000300040000000000000000000f00698c", 0x20, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}, {&(0x7f0000011000)}, {0x0, 0x0, 0x6700000}, {&(0x7f0000000580), 0x0, 0xc000}], 0x0, &(0x7f0000013b00)=ANY=[@ANYBLOB='\x00']) r3 = creat(&(0x7f0000000000)='./file1\x00', 0x18) socket(0x10, 0x3, 0x0) r4 = socket(0x26, 0x3, 0x0) sendmsg$nl_route(r4, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f00000005c0)=@ipv4_newroute={0x38, 0x18, 0xbad, 0x0, 0x0, {0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6}, [@RTA_ENCAP_TYPE={0x6, 0x15, 0x3}, @RTA_ENCAP={0x14, 0x16, 0x0, 0x1, @SEG6_IPTUNNEL_SRH={0xd}}]}, 0x38}}, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f00000005c0)=@ipv4_newroute={0x38, 0x18, 0xbad, 0x0, 0x0, {0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6}, [@RTA_ENCAP_TYPE={0x6, 0x15, 0x3}, @RTA_ENCAP={0x14, 0x16, 0x0, 0x1, @SEG6_IPTUNNEL_SRH={0xd}}]}, 0x38}}, 0x0) execveat(r3, 0x0, &(0x7f0000000380)=[&(0x7f00000001c0)='+{!#\x00', &(0x7f0000000300)='ext4\x00', &(0x7f0000000340)='@(\x00'], &(0x7f00000004c0)=[&(0x7f00000003c0)='ext4\x00', &(0x7f0000000400)='ext4\x00', &(0x7f0000000500)='\x00.D\x04\xe0\xce\x99\xd9\xa9\xac\xac\xadH\xa4\xcf\xb7\xffT\xac\x05\xfd\xdd\xb8w\x0f\x82B\xff\xf2\x909`1!\f\x870\x1f\xc1%Y\xc8\x15c \xea\x1cY!\x04\xe4\x91^\x00\x04\xe4\xa6\xba\xc6\xfd\x10\xdf\xe24\xd4&\x17\xdc\xec\xf4\f\n\xb7.\x13\x8e\x1bYENj\xe1\x19~\x1c\xaf\a;d\x9f\xba\xd9T\xd4-\xecX\xc0Y\x83@\xc7\x8b\xff*\xdd\xaa\xc6,o4\xe2\x0f\x16\x01[\xc0\xeb\x7fFI]WF\x1f\f?\xfa\xb1\xe7\xf6t\x027\xb1\xc17.4V\xf81{9\xa3\xb9\x01\xcck@I\xe2\xf1Y\x10E\xa1z/\x05.~Yh%\x8f\x06sB)N\x11P\xf6p\xff\'\xaf\a7\x10+p\xbb\xf3\xb08\xb5)\x00\xeeg\xd0\xee\xe9\x98\x8d\xf8\xb5G\t@f\x1et v\x14\tT\xc5', 0x0], 0x1000) 10:21:31 executing program 0: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000012c0)={0xffffffffffffffff}) sendmsg(r0, &(0x7f0000003c00)={0x0, 0x0, &(0x7f0000003880)=[{&(0x7f00000003c0)="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", 0x1000}, {&(0x7f00000013c0)="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", 0x1000}, {&(0x7f00000023c0)="b247ec6a47b19221413ea69a448ffea4f695a1c407b704f7858e2c5ec56fb005facb6438339c6e360aea5f07fb59ba4d299a5036ee09ef94d34343be85ae550b59c274fbace4e1157c35a1388bd3b707e79a3e19c17d51ff09ac8d156de38efb9a14cc77c1d7f75294f3e6a222d0a75961adaa8151cdd35811368f62766ab7e7b4d82a452ae4451cb11b16274a8473c14c48fc9453ad5eb28c2ad6299937b074b32d5d327da60119ca251e1eba6854b9caa1b3574a3af564db4c390c9bc3e391fdcf01d4def76721dc8fbf7afa551e94fc9ebedad6ee188117bc", 0xda}, {&(0x7f00000024c0)="fcd8b61956881e49a3e15f9c3bf4c4d6e1f2e5b94943dd91a3d4df5746ee555da8fee81ff81b6992c4da49c7cd0cbfd70119061ce6e3d1eb550c2df6844c104b7f0f97d7656ba4990144f72faade84d510d0a3d462821ae9a9325562e58cb228f1f771a1de12b3a41c35d1030da144bf4f40add70bf87fead6d91a90a44bf444c6828dd4d2dd7e2dda0b72a1e721fb16e4935415d999d2b4b978d533c4ee502f3ae3dad3baa42bec6310a7787525e95311e719b79d75bcd1d188abbd92278ecaec5e0db4becf6f75519950a56a2db37fa6c0e0c834b2e9df63ccab833a1e", 0xde}, {&(0x7f00000025c0)="2d8ed2e6925836c515e4bd0f2ecc94f02f7e2082d1a22c4f99663e916c79", 0x1e}, {&(0x7f0000002600)="8326eb4717bbe68783086508e058ddc1801862ed5231a21229bc510ee0e8450d9d043a359c570fc01129e7f165aeaa01382608fab385404c3e6fb7714cac34693a122eb9459a456d554e9af5d2896c984c4f1ea68c295a784b835fb41c0f6c4a5815ac80c75e90c044c51fecafc2ff6e018150fa829d9dba034d8e1c993c5729f2f5c47640317df71a58373e8f84426a78237696e43531d29000cd45e76ac7ea8e207912cc6f22ef83c093cce9aae9880d7424f19335dcf7e4ebbc33aa98a81c41dc2b9821a1b3e705e05ecab26282f445a7f2d791ecc650a2fd327f9a970da15bf495ab74c1d7", 0xe7}, {&(0x7f0000002700)="69dc41e390778f3b7d68e4260a1d261a4c71a4364cd7e3564bc7fb86726b4a8254b8b7fd2db934cb227f9bc5199813aede8ea218085274ad76956af933bcdd4fdb6fc8493dfed83eb7927fd74d749b5e62f38c28923bfe0828ddd9abed6129cd2f326ca1cac866d8d1098f33b3c784115526d3ce6223b1a3d73cf0300aba158678248bfe025103a25989116a3370178ab4754958c1e78df99cb98c4778e781", 0x9f}, {&(0x7f00000027c0)="f49a565d46d9d89562953daaee9fa447890f93da42dd8f1b30e67a29023ade521bf73b6bbff0a294fc76a27852694d46f4dba15b29ec87d796af6aaefbf18c01f2fad855f44cd4ab83f77acd77a9", 0x4e}, {&(0x7f0000002840)="79e410c9188570056bf838f18a1f2d", 0xf}, {&(0x7f0000002880)="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", 0xac8}], 0xa}, 0x0) 10:21:31 executing program 4: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)=@base={0x16, 0x0, 0x5c3, 0xa34}, 0x48) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000400)={&(0x7f00000003c0)='./file0\x00', r0}, 0x10) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)=@base={0x16, 0x0, 0x5c3, 0xa34}, 0x48) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000d80)={&(0x7f0000000d40)='./file0\x00', r1}, 0x10) 10:21:31 executing program 1: bpf$MAP_CREATE(0x0, &(0x7f0000001e00)=@base={0x1, 0x3, 0x2000, 0x81}, 0x48) 10:21:31 executing program 4: bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000001e00)=@base={0x1, 0x3, 0x8, 0x81, 0xd, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x3}, 0x48) 10:21:31 executing program 0: bpf$PROG_LOAD(0x5, &(0x7f0000000380)={0xb, 0x2, &(0x7f00000000c0)=@raw=[@map_fd], &(0x7f0000000180)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0xffffffffffffffff}, 0x80) 10:21:31 executing program 0: r0 = socket$nl_sock_diag(0x10, 0x3, 0x4) sendmsg$TCPDIAG_GETSOCK(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000040)={0x54, 0x12, 0xce5a2d529566ac41, 0x0, 0x0, {}, [@INET_DIAG_REQ_BYTECODE={0x4}, @INET_DIAG_REQ_BYTECODE={0x4}]}, 0x54}}, 0x0) [ 2590.928085][T27605] loop2: detected capacity change from 0 to 264192 [ 2590.963887][T27605] EXT4-fs (loop2): mounted filesystem without journal. Quota mode: writeback. [ 2590.973496][T27608] loop3: detected capacity change from 0 to 264192 [ 2591.017769][T27608] EXT4-fs (loop3): mounted filesystem without journal. Quota mode: writeback. 10:21:34 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000700)={'batadv0\x00', &(0x7f0000000000)=@ethtool_cmd={0x4a}}) 10:21:34 executing program 1: mmap(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x6, 0x100031, 0xffffffffffffffff, 0x0) 10:21:34 executing program 5: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_EXP_NEW(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000080)={0x20, 0x0, 0x2, 0x101, 0x0, 0x0, {}, [@CTA_EXPECT_FN={0xa, 0xb, 'Q.931\x00'}]}, 0x20}}, 0x0) 10:21:34 executing program 2: prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f00000002c0)) r0 = getpid() sched_setscheduler(r0, 0x0, &(0x7f00000000c0)=0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff}) connect$unix(r1, &(0x7f000057eff8)=@abs, 0x6e) recvmmsg(r1, &(0x7f00000000c0), 0x10106, 0x2, 0x0) syz_mount_image$ext4(&(0x7f0000000180)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xfffbffff00000000, 0x8, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000600100000f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000006856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010300), 0x0, 0x640}, {&(0x7f0000010400)="03000000040000000500000016000f000300040000000000000000000f00698c", 0x20, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}, {&(0x7f0000011000)}, {0x0, 0x0, 0x6700000}, {&(0x7f0000000580), 0x0, 0xc000}], 0x0, &(0x7f0000013b00)=ANY=[@ANYBLOB='\x00']) r2 = socket(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f00000005c0)=@ipv4_newroute={0x38, 0x18, 0xbad, 0x0, 0x0, {}, [@RTA_ENCAP_TYPE={0x6, 0x15, 0x3}, @RTA_ENCAP={0x14, 0x16, 0x0, 0x1, @SEG6_IPTUNNEL_SRH={0xd}}]}, 0x38}}, 0x0) r3 = socket(0x26, 0x3, 0x0) sendmsg$nl_route(r3, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f00000005c0)=@ipv4_newroute={0x38, 0x18, 0xbad, 0x0, 0x0, {0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6}, [@RTA_ENCAP_TYPE={0x6, 0x15, 0x3}, @RTA_ENCAP={0x14, 0x16, 0x0, 0x1, @SEG6_IPTUNNEL_SRH={0xd}}]}, 0x38}}, 0x0) r4 = socket(0x10, 0x0, 0x0) sendmsg$nl_route(r4, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f00000005c0)=@ipv4_newroute={0x38, 0x18, 0xbad, 0x0, 0x0, {0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6}, [@RTA_ENCAP_TYPE={0x6, 0x15, 0x3}, @RTA_ENCAP={0x14, 0x16, 0x0, 0x1, @SEG6_IPTUNNEL_SRH={0xd}}]}, 0x38}}, 0x0) recvfrom(r1, &(0x7f0000000600)=""/203, 0xcb, 0x42, &(0x7f0000000700)=@hci={0x1f, 0xffffffffffffffff, 0x4}, 0x80) 10:21:34 executing program 4: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000300)={0x0, 0x1, &(0x7f0000000000)=ANY=[@ANYBLOB="85100000e9ffffff"], &(0x7f0000000080)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0xc0) 10:21:34 executing program 3: prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x2, &(0x7f0000000080)=0x6) getpid() sched_setscheduler(0x0, 0x2, &(0x7f00000000c0)=0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r0, &(0x7f000057eff8)=@abs, 0x6e) sendmmsg$unix(r1, &(0x7f00000bd000), 0x318, 0x0) recvmmsg(r0, &(0x7f00000000c0), 0x10106, 0x2, 0x0) syz_mount_image$ext4(&(0x7f0000000180)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xfffbffff00000000, 0x8, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000600100000f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000006856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010300), 0x0, 0x640}, {&(0x7f0000010400)="03000000040000000500000016000f000300040000000000000000000f00698c", 0x20, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}, {&(0x7f0000011000)}, {0x0, 0x0, 0x6700000}, {&(0x7f0000000580), 0x0, 0xc000}], 0x0, &(0x7f0000013b00)=ANY=[@ANYBLOB='\x00']) r2 = creat(&(0x7f0000000000)='./file1\x00', 0x18) socket(0x10, 0x3, 0x0) r3 = socket(0x26, 0x3, 0x0) sendmsg$nl_route(r3, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f00000005c0)=@ipv4_newroute={0x38, 0x18, 0xbad, 0x0, 0x0, {0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6}, [@RTA_ENCAP_TYPE={0x6, 0x15, 0x3}, @RTA_ENCAP={0x14, 0x16, 0x0, 0x1, @SEG6_IPTUNNEL_SRH={0xd}}]}, 0x38}}, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f00000005c0)=@ipv4_newroute={0x38, 0x18, 0xbad, 0x0, 0x0, {0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6}, [@RTA_ENCAP_TYPE={0x6, 0x15, 0x3}, @RTA_ENCAP={0x14, 0x16, 0x0, 0x1, @SEG6_IPTUNNEL_SRH={0xd}}]}, 0x38}}, 0x0) execveat(r2, 0x0, &(0x7f0000000380)=[&(0x7f00000001c0)='+{!#\x00', &(0x7f0000000300)='ext4\x00', &(0x7f0000000340)='@(\x00'], &(0x7f00000004c0)=[&(0x7f00000003c0)='ext4\x00', &(0x7f0000000400)='ext4\x00', &(0x7f0000000500)='\x00.D\x04\xe0\xce\x99\xd9\xa9\xac\xac\xadH\xa4\xcf\xb7\xffT\xac\x05\xfd\xdd\xb8w\x0f\x82B\xff\xf2\x909`1!\f\x870\x1f\xc1%Y\xc8\x15c \xea\x1cY!\x04\xe4\x91^\x00\x04\xe4\xa6\xba\xc6\xfd\x10\xdf\xe24\xd4&\x17\xdc\xec\xf4\f\n\xb7.\x13\x8e\x1bYENj\xe1\x19~\x1c\xaf\a;d\x9f\xba\xd9T\xd4-\xecX\xc0Y\x83@\xc7\x8b\xff*\xdd\xaa\xc6,o4\xe2\x0f\x16\x01[\xc0\xeb\x7fFI]WF\x1f\f?\xfa\xb1\xe7\xf6t\x027\xb1\xc17.4V\xf81{9\xa3\xb9\x01\xcck@I\xe2\xf1Y\x10E\xa1z/\x05.~Yh%\x8f\x06sB)N\x11P\xf6p\xff\'\xaf\a7\x10+p\xbb\xf3\xb08\xb5)\x00\xeeg\xd0\xee\xe9\x98\x8d\xf8\xb5G\t@f\x1et v\x14\tT\xc5', 0x0], 0x1000) 10:21:34 executing program 0: r0 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x8923, &(0x7f0000001500)={'ipvlan0\x00', &(0x7f00000014c0)=@ethtool_dump={0x1}}) 10:21:34 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000700)={'batadv0\x00', &(0x7f0000000000)=@ethtool_cmd={0xe}}) 10:21:34 executing program 1: r0 = socket$inet_tcp(0x2, 0x1, 0x0) socket$inet(0x2, 0xa, 0x0) socket$inet(0x2, 0xa, 0x0) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r0, 0x8922, &(0x7f0000000740)={'ip6gre0\x00', 0x0}) 10:21:34 executing program 0: r0 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x8923, &(0x7f0000001500)={'ipvlan0\x00', &(0x7f00000014c0)=@ethtool_dump={0x1}}) 10:21:34 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$ifreq_SIOCGIFINDEX_team(r0, 0x8933, &(0x7f0000000000)={'team0\x00', 0x0}) bpf$MAP_CREATE(0x0, &(0x7f0000000000)=@bloom_filter={0x1e, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, '\x00', r1}, 0x48) 10:21:34 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@union={0x0, 0x0, 0x0, 0x5, 0x0, 0x400000}]}}, &(0x7f0000000080)=""/196, 0x26, 0xc4, 0x1}, 0x20) 10:21:34 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) connect$netlink(r0, &(0x7f0000000040)=@proc={0x10, 0x0, 0x25dfdbfc}, 0xc) syz_genetlink_get_family_id$ipvs(&(0x7f0000000140), r0) [ 2593.892739][T27625] À: renamed from ipvlan0 [ 2593.941401][T27641] loop2: detected capacity change from 0 to 264192 [ 2593.990547][T27641] EXT4-fs (loop2): mounted filesystem without journal. Quota mode: writeback. [ 2593.999653][T27643] loop3: detected capacity change from 0 to 264192 [ 2594.038336][T27643] EXT4-fs (loop3): mounted filesystem without journal. Quota mode: writeback. 10:21:40 executing program 5: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000300)={0xe, 0x3, &(0x7f0000000040)=@framed, &(0x7f0000000080)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 10:21:40 executing program 1: r0 = socket$vsock_stream(0x28, 0x1, 0x0) getsockopt$sock_timeval(r0, 0x1, 0xd, 0x0, &(0x7f0000000080)) 10:21:40 executing program 0: r0 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x8923, &(0x7f0000001500)={'ipvlan0\x00', &(0x7f00000014c0)=@ethtool_dump={0x1}}) 10:21:40 executing program 2: prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f00000002c0)) r0 = getpid() sched_setscheduler(r0, 0x0, &(0x7f00000000c0)=0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff}) connect$unix(r1, &(0x7f000057eff8)=@abs, 0x6e) recvmmsg(r1, &(0x7f00000000c0), 0x10106, 0x2, 0x0) syz_mount_image$ext4(&(0x7f0000000180)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xfffbffff00000000, 0x8, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000600100000f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000006856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010300), 0x0, 0x640}, {&(0x7f0000010400)="03000000040000000500000016000f000300040000000000000000000f00698c", 0x20, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}, {&(0x7f0000011000)}, {0x0, 0x0, 0x6700000}, {&(0x7f0000000580), 0x0, 0xc000}], 0x0, &(0x7f0000013b00)=ANY=[@ANYBLOB='\x00']) r2 = socket(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f00000005c0)=@ipv4_newroute={0x38, 0x18, 0xbad, 0x0, 0x0, {}, [@RTA_ENCAP_TYPE={0x6, 0x15, 0x3}, @RTA_ENCAP={0x14, 0x16, 0x0, 0x1, @SEG6_IPTUNNEL_SRH={0xd}}]}, 0x38}}, 0x0) r3 = socket(0x26, 0x3, 0x0) sendmsg$nl_route(r3, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f00000005c0)=@ipv4_newroute={0x38, 0x18, 0xbad, 0x0, 0x0, {0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6}, [@RTA_ENCAP_TYPE={0x6, 0x15, 0x3}, @RTA_ENCAP={0x14, 0x16, 0x0, 0x1, @SEG6_IPTUNNEL_SRH={0xd}}]}, 0x38}}, 0x0) r4 = socket(0x10, 0x0, 0x0) sendmsg$nl_route(r4, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f00000005c0)=@ipv4_newroute={0x38, 0x18, 0xbad, 0x0, 0x0, {0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6}, [@RTA_ENCAP_TYPE={0x6, 0x15, 0x3}, @RTA_ENCAP={0x14, 0x16, 0x0, 0x1, @SEG6_IPTUNNEL_SRH={0xd}}]}, 0x38}}, 0x0) recvfrom(r1, &(0x7f0000000600)=""/203, 0xcb, 0x42, &(0x7f0000000700)=@hci={0x1f, 0xffffffffffffffff, 0x4}, 0x80) 10:21:40 executing program 3: prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x2, &(0x7f0000000080)=0x6) getpid() sched_setscheduler(0x0, 0x2, &(0x7f00000000c0)=0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r0, &(0x7f000057eff8)=@abs, 0x6e) sendmmsg$unix(r1, &(0x7f00000bd000), 0x318, 0x0) recvmmsg(r0, &(0x7f00000000c0), 0x10106, 0x2, 0x0) syz_mount_image$ext4(&(0x7f0000000180)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xfffbffff00000000, 0x8, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000600100000f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000006856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010300), 0x0, 0x640}, {&(0x7f0000010400)="03000000040000000500000016000f000300040000000000000000000f00698c", 0x20, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}, {&(0x7f0000011000)}, {0x0, 0x0, 0x6700000}, {&(0x7f0000000580), 0x0, 0xc000}], 0x0, &(0x7f0000013b00)=ANY=[@ANYBLOB='\x00']) r2 = creat(&(0x7f0000000000)='./file1\x00', 0x18) socket(0x10, 0x3, 0x0) r3 = socket(0x26, 0x3, 0x0) sendmsg$nl_route(r3, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f00000005c0)=@ipv4_newroute={0x38, 0x18, 0xbad, 0x0, 0x0, {0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6}, [@RTA_ENCAP_TYPE={0x6, 0x15, 0x3}, @RTA_ENCAP={0x14, 0x16, 0x0, 0x1, @SEG6_IPTUNNEL_SRH={0xd}}]}, 0x38}}, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f00000005c0)=@ipv4_newroute={0x38, 0x18, 0xbad, 0x0, 0x0, {0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6}, [@RTA_ENCAP_TYPE={0x6, 0x15, 0x3}, @RTA_ENCAP={0x14, 0x16, 0x0, 0x1, @SEG6_IPTUNNEL_SRH={0xd}}]}, 0x38}}, 0x0) execveat(r2, 0x0, &(0x7f0000000380)=[&(0x7f00000001c0)='+{!#\x00', &(0x7f0000000300)='ext4\x00', &(0x7f0000000340)='@(\x00'], &(0x7f00000004c0)=[&(0x7f00000003c0)='ext4\x00', &(0x7f0000000400)='ext4\x00', &(0x7f0000000500)='\x00.D\x04\xe0\xce\x99\xd9\xa9\xac\xac\xadH\xa4\xcf\xb7\xffT\xac\x05\xfd\xdd\xb8w\x0f\x82B\xff\xf2\x909`1!\f\x870\x1f\xc1%Y\xc8\x15c \xea\x1cY!\x04\xe4\x91^\x00\x04\xe4\xa6\xba\xc6\xfd\x10\xdf\xe24\xd4&\x17\xdc\xec\xf4\f\n\xb7.\x13\x8e\x1bYENj\xe1\x19~\x1c\xaf\a;d\x9f\xba\xd9T\xd4-\xecX\xc0Y\x83@\xc7\x8b\xff*\xdd\xaa\xc6,o4\xe2\x0f\x16\x01[\xc0\xeb\x7fFI]WF\x1f\f?\xfa\xb1\xe7\xf6t\x027\xb1\xc17.4V\xf81{9\xa3\xb9\x01\xcck@I\xe2\xf1Y\x10E\xa1z/\x05.~Yh%\x8f\x06sB)N\x11P\xf6p\xff\'\xaf\a7\x10+p\xbb\xf3\xb08\xb5)\x00\xeeg\xd0\xee\xe9\x98\x8d\xf8\xb5G\t@f\x1et v\x14\tT\xc5', 0x0], 0x1000) 10:21:40 executing program 4: r0 = socket$inet6(0xa, 0x3, 0x45) getsockopt$inet6_tcp_TCP_ZEROCOPY_RECEIVE(r0, 0x3a, 0x23, 0x0, 0x0) 10:21:40 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x6c, 0x0, 0x0, 0x2}}, &(0x7f0000000080)=""/196, 0x1a, 0xc4, 0x1}, 0x20) 10:21:40 executing program 1: bpf$BPF_BTF_LOAD(0x4, &(0x7f0000000380)={&(0x7f00000001c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x0, 0x0, 0x2}}, 0x0, 0x1a}, 0x20) 10:21:40 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$inet(0x2, 0x3, 0x5) setsockopt$inet_msfilter(r1, 0x0, 0x8, &(0x7f00000003c0)=ANY=[@ANYRESHEX], 0x1) getsockopt$inet_pktinfo(r1, 0x0, 0x8, &(0x7f0000000040)={0x0, @local, @local}, &(0x7f0000000080)=0xc) sendmsg$nl_route_sched(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f00000012c0)=@newtfilter={0x34, 0x2c, 0xd27, 0x0, 0x0, {0x0, 0x0, 0x0, r2, {}, {}, {0x7}}, [@filter_kind_options=@f_basic={{0xa}, {0x4}}]}, 0x34}}, 0x0) 10:21:40 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000380)={&(0x7f00000001c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x2, [@array={0x0, 0x0, 0x0, 0x8}]}}, &(0x7f0000000280)=""/245, 0x32, 0xf5, 0x1}, 0x20) 10:21:40 executing program 1: r0 = socket$vsock_stream(0x28, 0x1, 0x0) getsockopt$inet_pktinfo(r0, 0x0, 0x8, 0x0, 0x0) 10:21:40 executing program 0: r0 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x8923, &(0x7f0000001500)={'ipvlan0\x00', &(0x7f00000014c0)=@ethtool_dump={0x1}}) [ 2600.152762][T27672] loop2: detected capacity change from 0 to 264192 [ 2600.178838][T27672] EXT4-fs (loop2): mounted filesystem without journal. Quota mode: writeback. [ 2600.211235][T27681] loop3: detected capacity change from 0 to 264192 [ 2600.228941][T27681] EXT4-fs (loop3): mounted filesystem without journal. Quota mode: writeback. 10:21:47 executing program 5: r0 = socket$vsock_stream(0x28, 0x1, 0x0) getsockopt$sock_timeval(r0, 0x1, 0x39, 0x0, &(0x7f0000000080)) 10:21:47 executing program 1: r0 = socket$vsock_stream(0x28, 0x1, 0x0) setsockopt$IPT_SO_SET_REPLACE(r0, 0x0, 0x40, 0x0, 0x0) 10:21:47 executing program 4: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_TCP_REPAIR(r0, 0x6, 0x13, &(0x7f00000001c0)=0x1, 0x4) setsockopt$inet_tcp_TCP_REPAIR_QUEUE(r0, 0x6, 0x14, &(0x7f0000000300)=0x3, 0x4) 10:21:47 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000040)={&(0x7f00000001c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x2, [@struct={0x0, 0x1, 0x0, 0x4, 0x0, 0x0, [{0x0, 0xda}]}]}}, &(0x7f0000000240)=""/143, 0x32, 0x8f, 0x1}, 0x20) 10:21:47 executing program 2: prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f00000002c0)) r0 = getpid() sched_setscheduler(r0, 0x0, &(0x7f00000000c0)=0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff}) connect$unix(r1, &(0x7f000057eff8)=@abs, 0x6e) recvmmsg(r1, &(0x7f00000000c0), 0x10106, 0x2, 0x0) syz_mount_image$ext4(&(0x7f0000000180)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xfffbffff00000000, 0x8, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000600100000f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000006856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010300), 0x0, 0x640}, {&(0x7f0000010400)="03000000040000000500000016000f000300040000000000000000000f00698c", 0x20, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}, {&(0x7f0000011000)}, {0x0, 0x0, 0x6700000}, {&(0x7f0000000580), 0x0, 0xc000}], 0x0, &(0x7f0000013b00)=ANY=[@ANYBLOB='\x00']) r2 = socket(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f00000005c0)=@ipv4_newroute={0x38, 0x18, 0xbad, 0x0, 0x0, {}, [@RTA_ENCAP_TYPE={0x6, 0x15, 0x3}, @RTA_ENCAP={0x14, 0x16, 0x0, 0x1, @SEG6_IPTUNNEL_SRH={0xd}}]}, 0x38}}, 0x0) r3 = socket(0x26, 0x3, 0x0) sendmsg$nl_route(r3, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f00000005c0)=@ipv4_newroute={0x38, 0x18, 0xbad, 0x0, 0x0, {0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6}, [@RTA_ENCAP_TYPE={0x6, 0x15, 0x3}, @RTA_ENCAP={0x14, 0x16, 0x0, 0x1, @SEG6_IPTUNNEL_SRH={0xd}}]}, 0x38}}, 0x0) r4 = socket(0x10, 0x0, 0x0) sendmsg$nl_route(r4, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f00000005c0)=@ipv4_newroute={0x38, 0x18, 0xbad, 0x0, 0x0, {0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6}, [@RTA_ENCAP_TYPE={0x6, 0x15, 0x3}, @RTA_ENCAP={0x14, 0x16, 0x0, 0x1, @SEG6_IPTUNNEL_SRH={0xd}}]}, 0x38}}, 0x0) recvfrom(r1, &(0x7f0000000600)=""/203, 0xcb, 0x42, &(0x7f0000000700)=@hci={0x1f, 0xffffffffffffffff, 0x4}, 0x80) 10:21:47 executing program 3: prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x2, &(0x7f0000000080)=0x6) getpid() sched_setscheduler(0x0, 0x2, &(0x7f00000000c0)=0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r0, &(0x7f000057eff8)=@abs, 0x6e) sendmmsg$unix(r1, &(0x7f00000bd000), 0x318, 0x0) recvmmsg(r0, &(0x7f00000000c0), 0x10106, 0x2, 0x0) syz_mount_image$ext4(&(0x7f0000000180)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xfffbffff00000000, 0x8, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000600100000f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000006856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010300), 0x0, 0x640}, {&(0x7f0000010400)="03000000040000000500000016000f000300040000000000000000000f00698c", 0x20, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}, {&(0x7f0000011000)}, {0x0, 0x0, 0x6700000}, {&(0x7f0000000580), 0x0, 0xc000}], 0x0, &(0x7f0000013b00)=ANY=[@ANYBLOB='\x00']) r2 = creat(&(0x7f0000000000)='./file1\x00', 0x18) socket(0x10, 0x3, 0x0) r3 = socket(0x26, 0x3, 0x0) sendmsg$nl_route(r3, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f00000005c0)=@ipv4_newroute={0x38, 0x18, 0xbad, 0x0, 0x0, {0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6}, [@RTA_ENCAP_TYPE={0x6, 0x15, 0x3}, @RTA_ENCAP={0x14, 0x16, 0x0, 0x1, @SEG6_IPTUNNEL_SRH={0xd}}]}, 0x38}}, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f00000005c0)=@ipv4_newroute={0x38, 0x18, 0xbad, 0x0, 0x0, {0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6}, [@RTA_ENCAP_TYPE={0x6, 0x15, 0x3}, @RTA_ENCAP={0x14, 0x16, 0x0, 0x1, @SEG6_IPTUNNEL_SRH={0xd}}]}, 0x38}}, 0x0) execveat(r2, 0x0, &(0x7f0000000380)=[&(0x7f00000001c0)='+{!#\x00', &(0x7f0000000300)='ext4\x00', &(0x7f0000000340)='@(\x00'], &(0x7f00000004c0)=[&(0x7f00000003c0)='ext4\x00', &(0x7f0000000400)='ext4\x00', &(0x7f0000000500)='\x00.D\x04\xe0\xce\x99\xd9\xa9\xac\xac\xadH\xa4\xcf\xb7\xffT\xac\x05\xfd\xdd\xb8w\x0f\x82B\xff\xf2\x909`1!\f\x870\x1f\xc1%Y\xc8\x15c \xea\x1cY!\x04\xe4\x91^\x00\x04\xe4\xa6\xba\xc6\xfd\x10\xdf\xe24\xd4&\x17\xdc\xec\xf4\f\n\xb7.\x13\x8e\x1bYENj\xe1\x19~\x1c\xaf\a;d\x9f\xba\xd9T\xd4-\xecX\xc0Y\x83@\xc7\x8b\xff*\xdd\xaa\xc6,o4\xe2\x0f\x16\x01[\xc0\xeb\x7fFI]WF\x1f\f?\xfa\xb1\xe7\xf6t\x027\xb1\xc17.4V\xf81{9\xa3\xb9\x01\xcck@I\xe2\xf1Y\x10E\xa1z/\x05.~Yh%\x8f\x06sB)N\x11P\xf6p\xff\'\xaf\a7\x10+p\xbb\xf3\xb08\xb5)\x00\xeeg\xd0\xee\xe9\x98\x8d\xf8\xb5G\t@f\x1et v\x14\tT\xc5', 0x0], 0x1000) 10:21:47 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000380)={&(0x7f00000001c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x2, [@array]}}, &(0x7f0000000280)=""/245, 0x32, 0xf5, 0x1}, 0x20) 10:21:47 executing program 1: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000440)={0xe, 0x3, &(0x7f0000000180)=@framed, &(0x7f00000001c0)='syzkaller\x00', 0x3, 0xe4, &(0x7f0000000200)=""/228, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 10:21:47 executing program 0: r0 = socket$vsock_stream(0x28, 0x1, 0x0) getsockopt$sock_timeval(r0, 0x1, 0x2, 0x0, &(0x7f0000000080)) 10:21:47 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f00000001c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x24, 0x24, 0x2, [@func_proto={0x0, 0x3, 0x0, 0xd, 0x0, [{0x10}, {0x7}, {0xe, 0x3}]}]}}, &(0x7f0000000080)=""/196, 0x3e, 0xc4, 0x1}, 0x20) 10:21:47 executing program 1: r0 = socket$inet6_udp(0xa, 0x2, 0x0) recvmsg(r0, &(0x7f0000000240)={0x0, 0x0, 0x0}, 0x122) 10:21:47 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000700)={'batadv0\x00', &(0x7f0000000000)=@ethtool_cmd={0x2}}) [ 2607.323133][T27710] loop2: detected capacity change from 0 to 264192 [ 2607.355016][T27710] EXT4-fs (loop2): mounted filesystem without journal. Quota mode: writeback. [ 2607.379702][T27714] loop3: detected capacity change from 0 to 264192 [ 2607.393667][T27714] EXT4-fs (loop3): mounted filesystem without journal. Quota mode: writeback. 10:21:54 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) sendmsg$AUDIT_ADD_RULE(r0, &(0x7f0000000040)={0x0, 0x0, 0xfffffffffffffffe}, 0x0) 10:21:54 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000380)={&(0x7f00000001c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x0, 0x0, 0x2}}, 0x0, 0x1a}, 0x20) 10:21:54 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000700)={'batadv0\x00', &(0x7f0000000000)=@ethtool_cmd={0x12}}) 10:21:54 executing program 2: prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f00000002c0)) r0 = getpid() sched_setscheduler(r0, 0x2, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff}) connect$unix(r1, &(0x7f000057eff8)=@abs, 0x6e) recvmmsg(r1, &(0x7f00000000c0), 0x10106, 0x2, 0x0) syz_mount_image$ext4(&(0x7f0000000180)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xfffbffff00000000, 0x8, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000600100000f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000006856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010300), 0x0, 0x640}, {&(0x7f0000010400)="03000000040000000500000016000f000300040000000000000000000f00698c", 0x20, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}, {&(0x7f0000011000)}, {0x0, 0x0, 0x6700000}, {&(0x7f0000000580), 0x0, 0xc000}], 0x0, &(0x7f0000013b00)=ANY=[@ANYBLOB='\x00']) r2 = socket(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f00000005c0)=@ipv4_newroute={0x38, 0x18, 0xbad, 0x0, 0x0, {}, [@RTA_ENCAP_TYPE={0x6, 0x15, 0x3}, @RTA_ENCAP={0x14, 0x16, 0x0, 0x1, @SEG6_IPTUNNEL_SRH={0xd}}]}, 0x38}}, 0x0) r3 = socket(0x26, 0x3, 0x0) sendmsg$nl_route(r3, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f00000005c0)=@ipv4_newroute={0x38, 0x18, 0xbad, 0x0, 0x0, {0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6}, [@RTA_ENCAP_TYPE={0x6, 0x15, 0x3}, @RTA_ENCAP={0x14, 0x16, 0x0, 0x1, @SEG6_IPTUNNEL_SRH={0xd}}]}, 0x38}}, 0x0) r4 = socket(0x10, 0x0, 0x0) sendmsg$nl_route(r4, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f00000005c0)=@ipv4_newroute={0x38, 0x18, 0xbad, 0x0, 0x0, {0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6}, [@RTA_ENCAP_TYPE={0x6, 0x15, 0x3}, @RTA_ENCAP={0x14, 0x16, 0x0, 0x1, @SEG6_IPTUNNEL_SRH={0xd}}]}, 0x38}}, 0x0) recvfrom(r1, &(0x7f0000000600)=""/203, 0xcb, 0x42, &(0x7f0000000700)=@hci={0x1f, 0xffffffffffffffff, 0x4}, 0x80) 10:21:54 executing program 3: prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x2, &(0x7f0000000080)=0x6) r0 = getpid() sched_setscheduler(r0, 0x0, &(0x7f00000000c0)=0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r1, &(0x7f000057eff8)=@abs, 0x6e) sendmmsg$unix(r2, &(0x7f00000bd000), 0x318, 0x0) recvmmsg(r1, &(0x7f00000000c0), 0x10106, 0x2, 0x0) syz_mount_image$ext4(&(0x7f0000000180)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xfffbffff00000000, 0x8, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000600100000f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000006856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010300), 0x0, 0x640}, {&(0x7f0000010400)="03000000040000000500000016000f000300040000000000000000000f00698c", 0x20, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}, {&(0x7f0000011000)}, {0x0, 0x0, 0x6700000}, {&(0x7f0000000580), 0x0, 0xc000}], 0x0, &(0x7f0000013b00)=ANY=[@ANYBLOB='\x00']) r3 = creat(&(0x7f0000000000)='./file1\x00', 0x18) socket(0x10, 0x3, 0x0) r4 = socket(0x26, 0x3, 0x0) sendmsg$nl_route(r4, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f00000005c0)=@ipv4_newroute={0x38, 0x18, 0xbad, 0x0, 0x0, {0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6}, [@RTA_ENCAP_TYPE={0x6, 0x15, 0x3}, @RTA_ENCAP={0x14, 0x16, 0x0, 0x1, @SEG6_IPTUNNEL_SRH={0xd}}]}, 0x38}}, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f00000005c0)=@ipv4_newroute={0x38, 0x18, 0xbad, 0x0, 0x0, {0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6}, [@RTA_ENCAP_TYPE={0x6, 0x15, 0x3}, @RTA_ENCAP={0x14, 0x16, 0x0, 0x1, @SEG6_IPTUNNEL_SRH={0xd}}]}, 0x38}}, 0x0) execveat(r3, 0x0, &(0x7f0000000380)=[&(0x7f00000001c0)='+{!#\x00', &(0x7f0000000300)='ext4\x00', &(0x7f0000000340)='@(\x00'], &(0x7f00000004c0)=[&(0x7f00000003c0)='ext4\x00', &(0x7f0000000400)='ext4\x00', &(0x7f0000000500)='\x00.D\x04\xe0\xce\x99\xd9\xa9\xac\xac\xadH\xa4\xcf\xb7\xffT\xac\x05\xfd\xdd\xb8w\x0f\x82B\xff\xf2\x909`1!\f\x870\x1f\xc1%Y\xc8\x15c \xea\x1cY!\x04\xe4\x91^\x00\x04\xe4\xa6\xba\xc6\xfd\x10\xdf\xe24\xd4&\x17\xdc\xec\xf4\f\n\xb7.\x13\x8e\x1bYENj\xe1\x19~\x1c\xaf\a;d\x9f\xba\xd9T\xd4-\xecX\xc0Y\x83@\xc7\x8b\xff*\xdd\xaa\xc6,o4\xe2\x0f\x16\x01[\xc0\xeb\x7fFI]WF\x1f\f?\xfa\xb1\xe7\xf6t\x027\xb1\xc17.4V\xf81{9\xa3\xb9\x01\xcck@I\xe2\xf1Y\x10E\xa1z/\x05.~Yh%\x8f\x06sB)N\x11P\xf6p\xff\'\xaf\a7\x10+p\xbb\xf3\xb08\xb5)\x00\xeeg\xd0\xee\xe9\x98\x8d\xf8\xb5G\t@f\x1et v\x14\tT\xc5', 0x0], 0x1000) 10:21:54 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) getsockname(r0, &(0x7f0000000000)=@xdp, &(0x7f0000000080)=0xfffffffffffffdeb) 10:21:54 executing program 1: pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$ifreq_SIOCGIFINDEX_team(r0, 0x5452, &(0x7f0000000080)) 10:21:54 executing program 4: r0 = socket$vsock_stream(0x28, 0x1, 0x0) setsockopt$inet6_buf(r0, 0x29, 0x0, 0x0, 0x0) 10:21:54 executing program 0: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000300)={0x3e9, 0x1, &(0x7f0000000000)=@raw=[@func], &(0x7f0000000080)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 10:21:54 executing program 1: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000300)={0x0, 0xf4240, &(0x7f0000000000)=@raw=[@func, @generic, @generic, @cb_func, @map_fd, @initr0], &(0x7f0000000080)='syzkaller\x00', 0x0, 0xac, &(0x7f00000000c0)=""/172, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 10:21:54 executing program 0: bpf$MAP_CREATE(0x0, &(0x7f00000003c0)=@base={0x19, 0x0, 0x0, 0x7f, 0x0, 0x1}, 0x48) 10:21:54 executing program 4: r0 = socket$inet_tcp(0x2, 0x1, 0x0) recvmsg(r0, &(0x7f00000026c0)={0x0, 0x0, 0x0}, 0x0) [ 2614.443284][T27741] loop2: detected capacity change from 0 to 264192 [ 2614.483865][T27741] EXT4-fs (loop2): mounted filesystem without journal. Quota mode: writeback. [ 2614.499106][T27747] loop3: detected capacity change from 0 to 264192 [ 2614.532138][T27747] EXT4-fs (loop3): mounted filesystem without journal. Quota mode: writeback. 10:22:01 executing program 5: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000300)={0x12, 0x1, &(0x7f0000000000)=@raw=[@func], &(0x7f0000000080)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 10:22:01 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) connect$netlink(r0, &(0x7f0000000040)=@proc, 0xc) syz_genetlink_get_family_id$ipvs(&(0x7f0000000140), r0) 10:22:01 executing program 4: r0 = socket$vsock_stream(0x28, 0x1, 0x0) getsockopt$sock_timeval(r0, 0x300, 0x0, 0x0, 0x0) 10:22:01 executing program 0: bpf$MAP_CREATE(0x0, &(0x7f0000000000)=@base={0x1b, 0x0, 0x0, 0x0, 0x802}, 0x48) 10:22:01 executing program 2: prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f00000002c0)) r0 = getpid() sched_setscheduler(r0, 0x2, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff}) connect$unix(r1, &(0x7f000057eff8)=@abs, 0x6e) recvmmsg(r1, &(0x7f00000000c0), 0x10106, 0x2, 0x0) syz_mount_image$ext4(&(0x7f0000000180)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xfffbffff00000000, 0x8, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000600100000f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000006856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010300), 0x0, 0x640}, {&(0x7f0000010400)="03000000040000000500000016000f000300040000000000000000000f00698c", 0x20, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}, {&(0x7f0000011000)}, {0x0, 0x0, 0x6700000}, {&(0x7f0000000580), 0x0, 0xc000}], 0x0, &(0x7f0000013b00)=ANY=[@ANYBLOB='\x00']) r2 = socket(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f00000005c0)=@ipv4_newroute={0x38, 0x18, 0xbad, 0x0, 0x0, {}, [@RTA_ENCAP_TYPE={0x6, 0x15, 0x3}, @RTA_ENCAP={0x14, 0x16, 0x0, 0x1, @SEG6_IPTUNNEL_SRH={0xd}}]}, 0x38}}, 0x0) r3 = socket(0x26, 0x3, 0x0) sendmsg$nl_route(r3, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f00000005c0)=@ipv4_newroute={0x38, 0x18, 0xbad, 0x0, 0x0, {0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6}, [@RTA_ENCAP_TYPE={0x6, 0x15, 0x3}, @RTA_ENCAP={0x14, 0x16, 0x0, 0x1, @SEG6_IPTUNNEL_SRH={0xd}}]}, 0x38}}, 0x0) r4 = socket(0x10, 0x0, 0x0) sendmsg$nl_route(r4, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f00000005c0)=@ipv4_newroute={0x38, 0x18, 0xbad, 0x0, 0x0, {0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6}, [@RTA_ENCAP_TYPE={0x6, 0x15, 0x3}, @RTA_ENCAP={0x14, 0x16, 0x0, 0x1, @SEG6_IPTUNNEL_SRH={0xd}}]}, 0x38}}, 0x0) recvfrom(r1, &(0x7f0000000600)=""/203, 0xcb, 0x42, &(0x7f0000000700)=@hci={0x1f, 0xffffffffffffffff, 0x4}, 0x80) 10:22:01 executing program 3: prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x2, &(0x7f0000000080)=0x6) r0 = getpid() sched_setscheduler(r0, 0x0, &(0x7f00000000c0)=0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r1, &(0x7f000057eff8)=@abs, 0x6e) sendmmsg$unix(r2, &(0x7f00000bd000), 0x318, 0x0) recvmmsg(r1, &(0x7f00000000c0), 0x10106, 0x2, 0x0) syz_mount_image$ext4(&(0x7f0000000180)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xfffbffff00000000, 0x8, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000600100000f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000006856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010300), 0x0, 0x640}, {&(0x7f0000010400)="03000000040000000500000016000f000300040000000000000000000f00698c", 0x20, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}, {&(0x7f0000011000)}, {0x0, 0x0, 0x6700000}, {&(0x7f0000000580), 0x0, 0xc000}], 0x0, &(0x7f0000013b00)=ANY=[@ANYBLOB='\x00']) r3 = creat(&(0x7f0000000000)='./file1\x00', 0x18) socket(0x10, 0x3, 0x0) r4 = socket(0x26, 0x3, 0x0) sendmsg$nl_route(r4, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f00000005c0)=@ipv4_newroute={0x38, 0x18, 0xbad, 0x0, 0x0, {0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6}, [@RTA_ENCAP_TYPE={0x6, 0x15, 0x3}, @RTA_ENCAP={0x14, 0x16, 0x0, 0x1, @SEG6_IPTUNNEL_SRH={0xd}}]}, 0x38}}, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f00000005c0)=@ipv4_newroute={0x38, 0x18, 0xbad, 0x0, 0x0, {0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6}, [@RTA_ENCAP_TYPE={0x6, 0x15, 0x3}, @RTA_ENCAP={0x14, 0x16, 0x0, 0x1, @SEG6_IPTUNNEL_SRH={0xd}}]}, 0x38}}, 0x0) execveat(r3, 0x0, &(0x7f0000000380)=[&(0x7f00000001c0)='+{!#\x00', &(0x7f0000000300)='ext4\x00', &(0x7f0000000340)='@(\x00'], &(0x7f00000004c0)=[&(0x7f00000003c0)='ext4\x00', &(0x7f0000000400)='ext4\x00', &(0x7f0000000500)='\x00.D\x04\xe0\xce\x99\xd9\xa9\xac\xac\xadH\xa4\xcf\xb7\xffT\xac\x05\xfd\xdd\xb8w\x0f\x82B\xff\xf2\x909`1!\f\x870\x1f\xc1%Y\xc8\x15c \xea\x1cY!\x04\xe4\x91^\x00\x04\xe4\xa6\xba\xc6\xfd\x10\xdf\xe24\xd4&\x17\xdc\xec\xf4\f\n\xb7.\x13\x8e\x1bYENj\xe1\x19~\x1c\xaf\a;d\x9f\xba\xd9T\xd4-\xecX\xc0Y\x83@\xc7\x8b\xff*\xdd\xaa\xc6,o4\xe2\x0f\x16\x01[\xc0\xeb\x7fFI]WF\x1f\f?\xfa\xb1\xe7\xf6t\x027\xb1\xc17.4V\xf81{9\xa3\xb9\x01\xcck@I\xe2\xf1Y\x10E\xa1z/\x05.~Yh%\x8f\x06sB)N\x11P\xf6p\xff\'\xaf\a7\x10+p\xbb\xf3\xb08\xb5)\x00\xeeg\xd0\xee\xe9\x98\x8d\xf8\xb5G\t@f\x1et v\x14\tT\xc5', 0x0], 0x1000) 10:22:01 executing program 4: r0 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r0, 0x8922, &(0x7f0000000740)={'ip6gre0\x00', 0x0}) 10:22:01 executing program 0: r0 = socket$vsock_stream(0x28, 0x1, 0x0) getsockopt$sock_timeval(r0, 0x1, 0xa, 0x0, &(0x7f0000000080)) 10:22:01 executing program 1: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x11, 0x6, &(0x7f0000000780)=ANY=[@ANYBLOB="050000000000000061110c00000000008510000002000000850000000500000095000000000000009500a505000000007751e8ba639a6788a341cca555fef3b423cdacfa7e32fe0231368b2264f9dc3f45f9f67addb7f1ce3d4275522be18bd10a48b043ccc40f68a7d06d7535ac03000000000006003d9a3d5eac6bdf92743db265a0e3ccae66649c1cfd6587d452d64e1ecf88fc5876a820e7889669fd7cc957d794a0981478ad3a4e750500000035138d5521f9453559c35da860e8efbc6f2b2a661cbeec000000811f09002319620ca293192e72dd9736aada9faabaf6c99a342299273f7eeff2b4697b94c7f568b4106c896f63c0b28fdb7ad36e0f0acc7d20dc82c28fe7e310252d750323212ab76437d114a1382f106832465a2b5aab02b467190da7802d7a67017c85e0ea15506476a032f1df812cbd06ae844b4ee382b2abd99472fc9afc74e019d4808a34cf728703748b53ea3ba923ddbf22081234f6e29582ef798061988db236cac1ecfd724a2300"/386], &(0x7f0000000080)='GPL\x00', 0x5, 0x29e, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x6, 0x0, 0x0, 0x10, 0x0}, 0x70) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000300)='lock_acquire\x00', r0}, 0x10) bpf$MAP_CREATE(0x0, &(0x7f0000000280)=@base={0xe, 0x4, 0x8, 0xff, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0xc00}, 0x48) 10:22:01 executing program 0: bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000800)=@bpf_ext={0x1c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xbab6703e20cf60ee, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 10:22:01 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000700)={'batadv0\x00', &(0x7f0000000000)=@ethtool_cmd={0x15}}) 10:22:01 executing program 0: sendmsg$NL80211_CMD_CONTROL_PORT_FRAME(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f00000001c0)=ANY=[@ANYBLOB='4\x00\x00\x00', @ANYRES16=0x0, @ANYBLOB="000427bd7000fddbdf25810000000c009900000001007d000000040067000400670004006700060066000d890000a5919539ad6eb92f3049522f5b4e1e812d287e2ceae06138b20e4b6117e643d0bbfaa4c2e78c655da17f7680665784679140f3ef79bfeab3bb433c1a5a97519e04ea06e17dd1ae661a2da209ed131c824b1fc1be022f538460d574970330"], 0x34}}, 0x0) r0 = socket$inet(0x2, 0xa, 0x0) ioctl$ifreq_SIOCGIFINDEX_team(r0, 0xc0189436, &(0x7f0000000240)) [ 2621.560409][T27780] loop2: detected capacity change from 0 to 264192 [ 2621.583390][T27780] EXT4-fs (loop2): mounted filesystem without journal. Quota mode: writeback. [ 2621.613306][T27785] loop3: detected capacity change from 0 to 264192 [ 2621.625577][T27785] EXT4-fs (loop3): mounted filesystem without journal. Quota mode: writeback. 10:22:09 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000700)={'batadv0\x00', &(0x7f0000000000)=@ethtool_cmd={0x44}}) 10:22:09 executing program 4: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000300)={0x8, 0x3, &(0x7f0000000040)=@framed, &(0x7f0000000080)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 10:22:09 executing program 0: r0 = socket$vsock_stream(0x28, 0x1, 0x0) setsockopt$SO_VM_SOCKETS_BUFFER_SIZE(r0, 0x28, 0x0, &(0x7f0000000000)=0x7fffffff, 0x8) 10:22:09 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000300)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0xa}, {0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x2e, 0x0, 0x0]}}, &(0x7f0000000080)=""/196, 0x3a, 0xc4, 0x1}, 0x20) 10:22:09 executing program 2: prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f00000002c0)) r0 = getpid() sched_setscheduler(r0, 0x2, 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000200)={0xffffffffffffffff}) connect$unix(r1, &(0x7f000057eff8)=@abs, 0x6e) recvmmsg(r1, &(0x7f00000000c0), 0x10106, 0x2, 0x0) syz_mount_image$ext4(&(0x7f0000000180)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xfffbffff00000000, 0x8, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000600100000f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000006856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010300), 0x0, 0x640}, {&(0x7f0000010400)="03000000040000000500000016000f000300040000000000000000000f00698c", 0x20, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}, {&(0x7f0000011000)}, {0x0, 0x0, 0x6700000}, {&(0x7f0000000580), 0x0, 0xc000}], 0x0, &(0x7f0000013b00)=ANY=[@ANYBLOB='\x00']) r2 = socket(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f00000005c0)=@ipv4_newroute={0x38, 0x18, 0xbad, 0x0, 0x0, {}, [@RTA_ENCAP_TYPE={0x6, 0x15, 0x3}, @RTA_ENCAP={0x14, 0x16, 0x0, 0x1, @SEG6_IPTUNNEL_SRH={0xd}}]}, 0x38}}, 0x0) r3 = socket(0x26, 0x3, 0x0) sendmsg$nl_route(r3, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f00000005c0)=@ipv4_newroute={0x38, 0x18, 0xbad, 0x0, 0x0, {0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6}, [@RTA_ENCAP_TYPE={0x6, 0x15, 0x3}, @RTA_ENCAP={0x14, 0x16, 0x0, 0x1, @SEG6_IPTUNNEL_SRH={0xd}}]}, 0x38}}, 0x0) r4 = socket(0x10, 0x0, 0x0) sendmsg$nl_route(r4, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f00000005c0)=@ipv4_newroute={0x38, 0x18, 0xbad, 0x0, 0x0, {0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6}, [@RTA_ENCAP_TYPE={0x6, 0x15, 0x3}, @RTA_ENCAP={0x14, 0x16, 0x0, 0x1, @SEG6_IPTUNNEL_SRH={0xd}}]}, 0x38}}, 0x0) recvfrom(r1, &(0x7f0000000600)=""/203, 0xcb, 0x42, &(0x7f0000000700)=@hci={0x1f, 0xffffffffffffffff, 0x4}, 0x80) 10:22:09 executing program 3: prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x2, &(0x7f0000000080)=0x6) r0 = getpid() sched_setscheduler(r0, 0x0, &(0x7f00000000c0)=0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r1, &(0x7f000057eff8)=@abs, 0x6e) sendmmsg$unix(r2, &(0x7f00000bd000), 0x318, 0x0) recvmmsg(r1, &(0x7f00000000c0), 0x10106, 0x2, 0x0) syz_mount_image$ext4(&(0x7f0000000180)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xfffbffff00000000, 0x8, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000600100000f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000006856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010300), 0x0, 0x640}, {&(0x7f0000010400)="03000000040000000500000016000f000300040000000000000000000f00698c", 0x20, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}, {&(0x7f0000011000)}, {0x0, 0x0, 0x6700000}, {&(0x7f0000000580), 0x0, 0xc000}], 0x0, &(0x7f0000013b00)=ANY=[@ANYBLOB='\x00']) r3 = creat(&(0x7f0000000000)='./file1\x00', 0x18) socket(0x10, 0x3, 0x0) r4 = socket(0x26, 0x3, 0x0) sendmsg$nl_route(r4, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f00000005c0)=@ipv4_newroute={0x38, 0x18, 0xbad, 0x0, 0x0, {0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6}, [@RTA_ENCAP_TYPE={0x6, 0x15, 0x3}, @RTA_ENCAP={0x14, 0x16, 0x0, 0x1, @SEG6_IPTUNNEL_SRH={0xd}}]}, 0x38}}, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f00000005c0)=@ipv4_newroute={0x38, 0x18, 0xbad, 0x0, 0x0, {0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6}, [@RTA_ENCAP_TYPE={0x6, 0x15, 0x3}, @RTA_ENCAP={0x14, 0x16, 0x0, 0x1, @SEG6_IPTUNNEL_SRH={0xd}}]}, 0x38}}, 0x0) execveat(r3, 0x0, &(0x7f0000000380)=[&(0x7f00000001c0)='+{!#\x00', &(0x7f0000000300)='ext4\x00', &(0x7f0000000340)='@(\x00'], &(0x7f00000004c0)=[&(0x7f00000003c0)='ext4\x00', &(0x7f0000000400)='ext4\x00', &(0x7f0000000500)='\x00.D\x04\xe0\xce\x99\xd9\xa9\xac\xac\xadH\xa4\xcf\xb7\xffT\xac\x05\xfd\xdd\xb8w\x0f\x82B\xff\xf2\x909`1!\f\x870\x1f\xc1%Y\xc8\x15c \xea\x1cY!\x04\xe4\x91^\x00\x04\xe4\xa6\xba\xc6\xfd\x10\xdf\xe24\xd4&\x17\xdc\xec\xf4\f\n\xb7.\x13\x8e\x1bYENj\xe1\x19~\x1c\xaf\a;d\x9f\xba\xd9T\xd4-\xecX\xc0Y\x83@\xc7\x8b\xff*\xdd\xaa\xc6,o4\xe2\x0f\x16\x01[\xc0\xeb\x7fFI]WF\x1f\f?\xfa\xb1\xe7\xf6t\x027\xb1\xc17.4V\xf81{9\xa3\xb9\x01\xcck@I\xe2\xf1Y\x10E\xa1z/\x05.~Yh%\x8f\x06sB)N\x11P\xf6p\xff\'\xaf\a7\x10+p\xbb\xf3\xb08\xb5)\x00\xeeg\xd0\xee\xe9\x98\x8d\xf8\xb5G\t@f\x1et v\x14\tT\xc5', 0x0], 0x1000) 10:22:09 executing program 0: accept4(0xffffffffffffffff, 0x0, &(0x7f0000000180), 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={0x0, &(0x7f0000000080)=""/196, 0x1000000, 0xc4, 0x1}, 0x20) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(0xffffffffffffffff, 0x8933, 0x0) 10:22:09 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000700)={'batadv0\x00', &(0x7f0000000000)=@ethtool_cmd={0x3c}}) 10:22:09 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000700)={'batadv0\x00', &(0x7f0000000000)=@ethtool_cmd={0x33}}) 10:22:09 executing program 1: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000300)={0x8, 0x3, &(0x7f0000000040)=@framed={{0x18, 0x0, 0x0, 0x63}}, &(0x7f0000000080)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 10:22:09 executing program 4: bpf$MAP_CREATE(0x0, &(0x7f0000000380)=@base={0x8, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x48) [ 2628.623001][T27801] loop2: detected capacity change from 0 to 264192 10:22:09 executing program 1: r0 = socket$packet(0x11, 0x2, 0x300) sendmsg$sock(r0, &(0x7f00000006c0)={&(0x7f0000000600)=@nfc_llcp={0x27, 0x0, 0x0, 0x0, 0x0, 0x0, "34f636e0f17ee645d156a47ef5c4ecee512e35d04ebef45daef6f8af4f5aee91ca05d18156a1b117e48b3965cd444c224cb3dee48c7a7091860ae2c9fcd8f4"}, 0x80, 0x0}, 0x0) [ 2628.687045][T27801] EXT4-fs (loop2): mounted filesystem without journal. Quota mode: writeback. [ 2628.745525][T27826] loop3: detected capacity change from 0 to 264192 [ 2628.754078][T24278] ================================================================== [ 2628.762170][T24278] BUG: KCSAN: data-race in __mark_inode_dirty / __mark_inode_dirty [ 2628.770070][T24278] [ 2628.772386][T24278] read-write to 0xffff888137b4d1a0 of 8 bytes by task 22747 on cpu 0: [ 2628.780527][T24278] __mark_inode_dirty+0x1ed/0x5f0 [ 2628.785548][T24278] touch_atime+0x1c4/0x2e0 [ 2628.789961][T24278] shmem_file_read_iter+0x54c/0x6b0 [ 2628.795159][T24278] do_iter_readv_writev+0x27b/0x300 [ 2628.800352][T24278] do_iter_read+0x16f/0x5d0 [ 2628.804853][T24278] vfs_iter_read+0x4c/0x70 [ 2628.809275][T24278] loop_process_work+0x77b/0x1350 [ 2628.814303][T24278] loop_workfn+0x2d/0x40 [ 2628.818540][T24278] process_one_work+0x3d3/0x720 [ 2628.823389][T24278] worker_thread+0x618/0xa70 [ 2628.827979][T24278] kthread+0x1a9/0x1e0 [ 2628.832042][T24278] ret_from_fork+0x1f/0x30 [ 2628.836455][T24278] [ 2628.838767][T24278] read to 0xffff888137b4d1a0 of 8 bytes by task 24278 on cpu 1: [ 2628.846382][T24278] __mark_inode_dirty+0xd5/0x5f0 [ 2628.851316][T24278] touch_atime+0x1c4/0x2e0 [ 2628.855729][T24278] shmem_file_read_iter+0x54c/0x6b0 [ 2628.860933][T24278] do_iter_readv_writev+0x27b/0x300 [ 2628.866125][T24278] do_iter_read+0x16f/0x5d0 [ 2628.870630][T24278] vfs_iter_read+0x4c/0x70 [ 2628.875045][T24278] loop_process_work+0x77b/0x1350 [ 2628.880055][T24278] loop_rootcg_workfn+0x1b/0x20 [ 2628.884902][T24278] process_one_work+0x3d3/0x720 [ 2628.889753][T24278] worker_thread+0x618/0xa70 [ 2628.894339][T24278] kthread+0x1a9/0x1e0 [ 2628.898401][T24278] ret_from_fork+0x1f/0x30 [ 2628.902815][T24278] [ 2628.905126][T24278] value changed: 0x0000000000000000 -> 0x0000000000000001 [ 2628.912217][T24278] [ 2628.914528][T24278] Reported by Kernel Concurrency Sanitizer on: [ 2628.920658][T24278] CPU: 1 PID: 24278 Comm: kworker/u4:5 Not tainted 5.18.0-rc2-syzkaller-dirty #0 [ 2628.929760][T24278] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2628.939805][T24278] Workqueue: loop3 loop_rootcg_workfn [ 2628.945175][T24278] ================================================================== [ 2628.954152][T27826] EXT4-fs (loop3): mounted filesystem without journal. Quota mode: writeback. 10:22:15 executing program 5: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_EXP_GET(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000040)={0x1c, 0x1, 0x2, 0x401, 0x0, 0x0, {}, [@CTA_EXPECT_ZONE={0x6}]}, 0x1c}}, 0x0) 10:22:15 executing program 0: bpf$MAP_CREATE(0x0, &(0x7f0000000280)=@base={0x9, 0x2, 0xfffffffd, 0x84}, 0x48) 10:22:15 executing program 1: r0 = socket$vsock_stream(0x28, 0x1, 0x0) getsockopt$sock_timeval(r0, 0x1, 0x22, 0x0, &(0x7f0000000080)) 10:22:15 executing program 4: bpf$MAP_CREATE(0x0, &(0x7f0000000500)=@base={0x1a, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x5}, 0x48) 10:22:15 executing program 2: prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f00000002c0)) r0 = getpid() sched_setscheduler(r0, 0x2, 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000200)={0xffffffffffffffff}) connect$unix(r1, &(0x7f000057eff8)=@abs, 0x6e) recvmmsg(r1, &(0x7f00000000c0), 0x10106, 0x2, 0x0) syz_mount_image$ext4(&(0x7f0000000180)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xfffbffff00000000, 0x8, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000600100000f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000006856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010300), 0x0, 0x640}, {&(0x7f0000010400)="03000000040000000500000016000f000300040000000000000000000f00698c", 0x20, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}, {&(0x7f0000011000)}, {0x0, 0x0, 0x6700000}, {&(0x7f0000000580), 0x0, 0xc000}], 0x0, &(0x7f0000013b00)=ANY=[@ANYBLOB='\x00']) r2 = socket(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f00000005c0)=@ipv4_newroute={0x38, 0x18, 0xbad, 0x0, 0x0, {}, [@RTA_ENCAP_TYPE={0x6, 0x15, 0x3}, @RTA_ENCAP={0x14, 0x16, 0x0, 0x1, @SEG6_IPTUNNEL_SRH={0xd}}]}, 0x38}}, 0x0) r3 = socket(0x26, 0x3, 0x0) sendmsg$nl_route(r3, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f00000005c0)=@ipv4_newroute={0x38, 0x18, 0xbad, 0x0, 0x0, {0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6}, [@RTA_ENCAP_TYPE={0x6, 0x15, 0x3}, @RTA_ENCAP={0x14, 0x16, 0x0, 0x1, @SEG6_IPTUNNEL_SRH={0xd}}]}, 0x38}}, 0x0) r4 = socket(0x10, 0x0, 0x0) sendmsg$nl_route(r4, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f00000005c0)=@ipv4_newroute={0x38, 0x18, 0xbad, 0x0, 0x0, {0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6}, [@RTA_ENCAP_TYPE={0x6, 0x15, 0x3}, @RTA_ENCAP={0x14, 0x16, 0x0, 0x1, @SEG6_IPTUNNEL_SRH={0xd}}]}, 0x38}}, 0x0) recvfrom(r1, &(0x7f0000000600)=""/203, 0xcb, 0x42, &(0x7f0000000700)=@hci={0x1f, 0xffffffffffffffff, 0x4}, 0x80) 10:22:15 executing program 3: prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x2, &(0x7f0000000080)=0x6) r0 = getpid() sched_setscheduler(r0, 0x2, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r1, &(0x7f000057eff8)=@abs, 0x6e) sendmmsg$unix(r2, &(0x7f00000bd000), 0x318, 0x0) recvmmsg(r1, &(0x7f00000000c0), 0x10106, 0x2, 0x0) syz_mount_image$ext4(&(0x7f0000000180)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xfffbffff00000000, 0x8, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000600100000f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000006856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010300), 0x0, 0x640}, {&(0x7f0000010400)="03000000040000000500000016000f000300040000000000000000000f00698c", 0x20, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}, {&(0x7f0000011000)}, {0x0, 0x0, 0x6700000}, {&(0x7f0000000580), 0x0, 0xc000}], 0x0, &(0x7f0000013b00)=ANY=[@ANYBLOB='\x00']) r3 = creat(&(0x7f0000000000)='./file1\x00', 0x18) socket(0x10, 0x3, 0x0) r4 = socket(0x26, 0x3, 0x0) sendmsg$nl_route(r4, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f00000005c0)=@ipv4_newroute={0x38, 0x18, 0xbad, 0x0, 0x0, {0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6}, [@RTA_ENCAP_TYPE={0x6, 0x15, 0x3}, @RTA_ENCAP={0x14, 0x16, 0x0, 0x1, @SEG6_IPTUNNEL_SRH={0xd}}]}, 0x38}}, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f00000005c0)=@ipv4_newroute={0x38, 0x18, 0xbad, 0x0, 0x0, {0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6}, [@RTA_ENCAP_TYPE={0x6, 0x15, 0x3}, @RTA_ENCAP={0x14, 0x16, 0x0, 0x1, @SEG6_IPTUNNEL_SRH={0xd}}]}, 0x38}}, 0x0) execveat(r3, 0x0, &(0x7f0000000380)=[&(0x7f00000001c0)='+{!#\x00', &(0x7f0000000300)='ext4\x00', &(0x7f0000000340)='@(\x00'], &(0x7f00000004c0)=[&(0x7f00000003c0)='ext4\x00', &(0x7f0000000400)='ext4\x00', &(0x7f0000000500)='\x00.D\x04\xe0\xce\x99\xd9\xa9\xac\xac\xadH\xa4\xcf\xb7\xffT\xac\x05\xfd\xdd\xb8w\x0f\x82B\xff\xf2\x909`1!\f\x870\x1f\xc1%Y\xc8\x15c \xea\x1cY!\x04\xe4\x91^\x00\x04\xe4\xa6\xba\xc6\xfd\x10\xdf\xe24\xd4&\x17\xdc\xec\xf4\f\n\xb7.\x13\x8e\x1bYENj\xe1\x19~\x1c\xaf\a;d\x9f\xba\xd9T\xd4-\xecX\xc0Y\x83@\xc7\x8b\xff*\xdd\xaa\xc6,o4\xe2\x0f\x16\x01[\xc0\xeb\x7fFI]WF\x1f\f?\xfa\xb1\xe7\xf6t\x027\xb1\xc17.4V\xf81{9\xa3\xb9\x01\xcck@I\xe2\xf1Y\x10E\xa1z/\x05.~Yh%\x8f\x06sB)N\x11P\xf6p\xff\'\xaf\a7\x10+p\xbb\xf3\xb08\xb5)\x00\xeeg\xd0\xee\xe9\x98\x8d\xf8\xb5G\t@f\x1et v\x14\tT\xc5', 0x0], 0x1000) 10:22:15 executing program 0: r0 = socket$vsock_stream(0x28, 0x1, 0x0) getsockopt$sock_timeval(r0, 0x1, 0x9, 0x0, &(0x7f0000000080)) 10:22:15 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x2, [@union={0x0, 0x1, 0x0, 0x5, 0x0, 0x0, [{0x6000000}]}]}}, &(0x7f0000000080)=""/196, 0x32, 0xc4, 0x1}, 0x20) 10:22:15 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000700)={'batadv0\x00', &(0x7f0000000000)=@ethtool_cmd={0x4d}}) 10:22:15 executing program 0: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000300)={0x8, 0x3, &(0x7f0000000040)=@framed={{}, [], {0x95, 0x7}}, &(0x7f0000000080)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) [ 2634.915033][T27839] loop2: detected capacity change from 0 to 264192 10:22:15 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@func_proto]}}, &(0x7f0000000080)=""/196, 0x26, 0xc4, 0x1}, 0x20) 10:22:15 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000700)={'batadv0\x00', &(0x7f0000000000)=@ethtool_cmd={0x2c}}) [ 2634.959064][T27839] EXT4-fs (loop2): mounted filesystem without journal. Quota mode: writeback. [ 2635.023917][T27861] loop3: detected capacity change from 0 to 264192 [ 2635.058280][T27861] EXT4-fs (loop3): mounted filesystem without journal. Quota mode: writeback.