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", 0x1000, 0x401}, {&(0x7f00000000c0)="ec60b4d87062c6dbd8a71d6fdee9b131d9cd483c00aef1a5283eb24c", 0x1c, 0x1}, {&(0x7f0000000100)="9745069bb52f4607167448260051590343245035b0950796dccd13532c55bc77aa48e33e1f2d947977c5da95dfc90e759ff03ef5830fd0c562c1891ef99698903c620603d1964984a92ebaedc1de5c29d7b51a907c0092adc328d9cd96ada4e6d942af5c79f78ca386bb1f109fcffd562994327755b09f63c013b372f169ea128a6ccc077424a1acee253569e0abae6b25c47769655713ee623caf863d0bc62b8b3b81d48a6d4518f9258aad2c9bf471c9cb30f662d51ae802baef60738295029b4e8a97780e174fc26056bd850a7eaf22947d533bd34b02442f7bd878d1841890af59", 0xe3, 0x1}, {&(0x7f0000000200)="67f46a533ff8214d199dceec753cda4b75d47c905b2f6c32d49b218844d389741c5a628d", 0x24, 0x3}, {&(0x7f0000000240)="0b076341075e7858a69fd3b0c623f14da161281aa78634a4df39352397a9895400feb421054714013aeb376a5a81b2cefedfda6ca6a985257087840698abd314e7f3aeaf7592016fb0bd655736cbf8bd76cbe0a6d3db1472714624ac624fafd23579267f297f778362ca069015c49e3d801ebc047ac63221019397ee62a97a096524e3769b5338bcfdfbdbe4248fd304dcdf2a9ecdf6b4654e7d87edc3d33021f0b6b1bb06519b663483742e15243f9ef37035c0a3427a11e7e3f1a8a8ec", 0xbe, 0x4}], 0x1000400, &(0x7f0000000380)=ANY=[@ANYBLOB="6e6f6175746f5f64615f616c6c6f632c64656275672c736d61636b6673666c6f6f723d6c292a26252c0007000081000000"]) 10:10:25 executing program 4: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000040)={0x2, &(0x7f0000000000)=[{0x25}, {}]}) (fail_nth: 11) 10:10:25 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000040)={0x2, &(0x7f0000000000)=[{0x3}, {}]}) 10:10:25 executing program 5: clock_nanosleep(0x54fb6926d29f01ef, 0x0, &(0x7f0000000080)={0x0, 0x989680}, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f0000000040)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f00000000c0)=0x14) getpeername$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000140)=0x14) ioctl$sock_ipv6_tunnel_SIOCDELTUNNEL(0xffffffffffffffff, 0x89f2, &(0x7f0000000200)={'ip6tnl0\x00', &(0x7f0000000180)={'ip6_vti0\x00', 0x0, 0x0, 0x4, 0x0, 0x7, 0x41, @empty, @ipv4={'\x00', '\xff\xff', @loopback}, 0x1, 0x8000, 0x6, 0xe2}}) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000000240)={'team0\x00', 0x0}) getpeername$packet(0xffffffffffffffff, &(0x7f0000000280)={0x11, 0x0, 0x0}, &(0x7f00000002c0)=0x14) accept4$packet(0xffffffffffffffff, &(0x7f0000000300)={0x11, 0x0, 0x0}, &(0x7f0000000340)=0x14, 0x0) sendmsg$TEAM_CMD_PORT_LIST_GET(0xffffffffffffffff, &(0x7f0000000c40)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x8000000}, 0xc, &(0x7f0000000c00)={&(0x7f0000000380)={0x854, 0x0, 0x100, 0x70bd2d, 0x25dfdbff, {}, [{{0x8}, {0x80, 0x2, 0x0, 0x1, [{0x3c, 0x1, @user_linkup={{{0x24}, {0x5}, {0x4}}, {0x8}}}, {0x40, 0x1, @queue_id={{{0x24}, {0x5}, {0x8, 0x4, 0x9}}, {0x8}}}]}}, {{0x8}, {0x1bc, 0x2, 0x0, 0x1, [{0x40, 0x1, @name={{0x24}, {0x5}, {0xf, 0x4, 'roundrobin\x00'}}}, {0x3c, 0x1, @user_linkup={{{0x24}, {0x5}, {0x4}}, {0x8, 0x6, r0}}}, {0x38, 0x1, @mcast_rejoin_interval={{0x24}, {0x5}, {0x8, 0x4, 0x8}}}, {0x40, 0x1, @lb_port_stats={{{0x24}, {0x5}, {0x8, 0x4, 0x1fe87e3e}}, {0x8}}}, {0x40, 0x1, @lb_hash_stats={{{0x24}, {0x5}, {0x8, 0x4, 0xffff55cc}}, {0x8}}}, {0x4c, 0x1, @lb_tx_method={{0x24}, {0x5}, {0x19, 0x4, 'hash_to_port_mapping\x00'}}}, {0x38, 0x1, @notify_peers_count={{0x24}, {0x5}, {0x8, 0x4, 0x66fc}}}]}}, {{0x8}, {0x44, 0x2, 0x0, 0x1, [{0x40, 0x1, @priority={{{0x24}, {0x5}, {0x8, 0x4, 0x1}}, {0x8}}}]}}, {{0x8}, {0x108, 0x2, 0x0, 0x1, [{0x3c, 0x1, @user_linkup_enabled={{{0x24}, {0x5}, {0x4}}, {0x8, 0x6, r1}}}, {0x4c, 0x1, @lb_tx_method={{0x24}, {0x5}, {0x19, 0x4, 'hash_to_port_mapping\x00'}}}, {0x3c, 0x1, @user_linkup_enabled={{{0x24}, {0x5}, {0x4}}, {0x8}}}, {0x40, 0x1, @lb_tx_hash_to_port_mapping={{{0x24}, {0x5}, {0x8}}, {0x8}}}]}}, {{0x8, 0x1, r2}, {0x214, 0x2, 0x0, 0x1, [{0x3c, 0x1, @enabled={{{0x24}, {0x5}, {0x4}}, {0x8}}}, {0x38, 0x1, @mcast_rejoin_count={{0x24}, {0x5}, {0x8, 0x4, 0x5}}}, {0x38, 0x1, @notify_peers_interval={{0x24}, {0x5}, {0x8, 0x4, 0x7}}}, {0x38, 0x1, @mcast_rejoin_interval={{0x24}, {0x5}, {0x8, 0x4, 0x20}}}, {0x3c, 0x1, @lb_tx_method={{0x24}, {0x5}, {0x9, 0x4, 'hash\x00'}}}, {0x40, 0x1, @lb_port_stats={{{0x24}, {0x5}, {0x8, 0x4, 0x80000000}}, {0x8}}}, {0x38, 0x1, @notify_peers_count={{0x24}, {0x5}, {0x8, 0x4, 0x5}}}, {0x40, 0x1, @queue_id={{{0x24}, {0x5}, {0x8, 0x4, 0x200}}, {0x8, 0x6, r3}}}, {0x38, 0x1, @notify_peers_count={{0x24}, {0x5}, {0x8, 0x4, 0x5}}}]}}, {{0x8}, {0x134, 0x2, 0x0, 0x1, [{0x3c, 0x1, @lb_tx_method={{0x24}, {0x5}, {0x9, 0x4, 'hash\x00'}}}, {0x40, 0x1, @name={{0x24}, {0x5}, {0xe, 0x4, 'broadcast\x00'}}}, {0x40, 0x1, @queue_id={{{0x24}, {0x5}, {0x8, 0x4, 0xe1}}, {0x8, 0x6, r4}}}, {0x3c, 0x1, @user_linkup_enabled={{{0x24}, {0x5}, {0x4}}, {0x8, 0x6, r5}}}, {0x38, 0x1, @mcast_rejoin_interval={{0x24}, {0x5}, {0x8}}}]}}, {{0x8}, {0x138, 0x2, 0x0, 0x1, [{0x38, 0x1, @notify_peers_interval={{0x24}, {0x5}, {0x8, 0x4, 0x9}}}, {0x38, 0x1, @mcast_rejoin_count={{0x24}, {0x5}, {0x8}}}, {0x38, 0x1, @notify_peers_interval={{0x24}, {0x5}, {0x8, 0x4, 0xffffffc1}}}, {0x40, 0x1, @lb_port_stats={{{0x24}, {0x5}, {0x8, 0x4, 0x6}}, {0x8}}}, {0x4c, 0x1, @bpf_hash_func={{0x24}, {0x5}, {0x1c, 0x4, [{0x9, 0xf8, 0x6, 0x7}, {0xca, 0x9, 0x3, 0xac}, {0x200, 0x1, 0x0, 0xfffff4cb}]}}}]}}]}, 0x854}, 0x1, 0x0, 0x0, 0x4090}, 0x20000045) [ 1846.591805][T18691] loop2: detected capacity change from 0 to 127 [ 1846.609025][T18699] FAULT_INJECTION: forcing a failure. [ 1846.609025][T18699] name failslab, interval 1, probability 0, space 0, times 0 [ 1846.621742][T18699] CPU: 1 PID: 18699 Comm: syz-executor.4 Not tainted 5.15.0-rc3-syzkaller #0 [ 1846.630647][T18699] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 10:10:25 executing program 1: syz_mount_image$ext4(&(0x7f0000000480)='ext3\x00', &(0x7f00000004c0)='./file0\x00', 0x0, 0xedc000000000, 0x0, 0x0, &(0x7f00000007c0)={[], [{@fscontext={'fscontext', 0x3d, 'sysadm_u'}}, {@defcontext={'defcontext', 0x3d, 'staff_u'}}]}) [ 1846.640699][T18699] Call Trace: [ 1846.643984][T18699] dump_stack_lvl+0xd6/0x122 [ 1846.648662][T18699] dump_stack+0x11/0x1b [ 1846.652816][T18699] should_fail+0x23c/0x250 [ 1846.657239][T18699] ? bpf_prog_create_from_user+0x1ab/0x240 [ 1846.663138][T18699] __should_failslab+0x81/0x90 [ 1846.667982][T18699] should_failslab+0x5/0x20 [ 1846.672504][T18699] __kmalloc_track_caller+0x6d/0x350 [ 1846.677823][T18699] ? kmem_cache_alloc_trace+0x221/0x320 [ 1846.683453][T18699] kmemdup+0x21/0x50 [ 1846.687547][T18699] bpf_prog_create_from_user+0x1ab/0x240 [ 1846.693472][T18699] ? seccomp_run_filters+0x2b0/0x2b0 [ 1846.698867][T18699] do_seccomp+0x5ec/0x1590 [ 1846.703369][T18699] ? proc_fail_nth_write+0x127/0x150 [ 1846.704079][T18706] FAULT_INJECTION: forcing a failure. [ 1846.704079][T18706] name failslab, interval 1, probability 0, space 0, times 0 [ 1846.708656][T18699] ? cap_task_prctl+0xa0/0x600 [ 1846.726103][T18699] prctl_set_seccomp+0x49/0x60 [ 1846.730889][T18699] __do_sys_prctl+0x639/0xca0 [ 1846.735554][T18699] ? ksys_write+0x162/0x190 [ 1846.740134][T18699] ? fpregs_assert_state_consistent+0x7d/0x90 [ 1846.746307][T18699] __x64_sys_prctl+0x62/0x70 [ 1846.750890][T18699] do_syscall_64+0x44/0xa0 [ 1846.755370][T18699] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 1846.761329][T18699] RIP: 0033:0x7f9dee22a8d9 [ 1846.765724][T18699] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1846.785349][T18699] RSP: 002b:00007f9debfa2188 EFLAGS: 00000246 ORIG_RAX: 000000000000009d [ 1846.793834][T18699] RAX: ffffffffffffffda RBX: 00007f9dee32ef60 RCX: 00007f9dee22a8d9 [ 1846.801793][T18699] RDX: 0000000020000040 RSI: 0000000000000002 RDI: 0000000000000016 [ 1846.809827][T18699] RBP: 00007f9debfa21d0 R08: 0000000000000000 R09: 0000000000000000 [ 1846.818737][T18699] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1846.826705][T18699] R13: 00007ffeaf366aef R14: 00007f9debfa2300 R15: 0000000000022000 [ 1846.834660][T18706] CPU: 0 PID: 18706 Comm: syz-executor.3 Not tainted 5.15.0-rc3-syzkaller #0 [ 1846.843422][T18706] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1846.853476][T18706] Call Trace: [ 1846.856760][T18706] dump_stack_lvl+0xd6/0x122 [ 1846.861531][T18706] dump_stack+0x11/0x1b [ 1846.865685][T18706] should_fail+0x23c/0x250 [ 1846.870098][T18706] ? sidtab_sid2str_get+0x9c/0x130 [ 1846.875304][T18706] __should_failslab+0x81/0x90 [ 1846.880066][T18706] should_failslab+0x5/0x20 [ 1846.884602][T18706] __kmalloc_track_caller+0x6d/0x350 [ 1846.889883][T18706] kmemdup+0x21/0x50 [ 1846.893901][T18706] sidtab_sid2str_get+0x9c/0x130 [ 1846.898862][T18706] security_sid_to_context_core+0x1cb/0x2d0 [ 1846.904752][T18706] security_sid_to_context_force+0x2f/0x40 [ 1846.910653][T18706] selinux_inode_init_security+0x4e4/0x590 [ 1846.916474][T18706] security_inode_init_security+0xe4/0x260 [ 1846.922395][T18706] ? ext4_init_security+0x40/0x40 [ 1846.927467][T18706] ext4_init_security+0x30/0x40 [ 1846.932349][T18706] __ext4_new_inode+0x2a0a/0x2fd0 [ 1846.937411][T18706] ext4_mkdir+0x28a/0x760 [ 1846.941823][T18706] vfs_mkdir+0x2c3/0x3e0 [ 1846.946072][T18706] do_mkdirat+0x12e/0x2c0 [ 1846.948326][T18716] FAULT_INJECTION: forcing a failure. [ 1846.948326][T18716] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 1846.950497][T18706] __x64_sys_mkdir+0x40/0x50 [ 1846.950525][T18706] do_syscall_64+0x44/0xa0 [ 1846.972466][T18706] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 1846.978357][T18706] RIP: 0033:0x7f51e79349e7 [ 1846.982771][T18706] Code: 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 83 c8 ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 b8 53 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1847.002374][T18706] RSP: 002b:00007f51e56acfa8 EFLAGS: 00000246 ORIG_RAX: 0000000000000053 [ 1847.010771][T18706] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 00007f51e79349e7 [ 1847.018767][T18706] RDX: 0000000000000000 RSI: 00000000000001ff RDI: 0000000020000040 [ 1847.026789][T18706] RBP: 00007f51e56ad040 R08: 0000000000000000 R09: 0000000000000000 [ 1847.034748][T18706] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000020000000 [ 1847.042716][T18706] R13: 0000000020000040 R14: 00007f51e56ad000 R15: 0000000020000480 [ 1847.050714][T18716] CPU: 1 PID: 18716 Comm: syz-executor.4 Not tainted 5.15.0-rc3-syzkaller #0 [ 1847.059512][T18716] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1847.069552][T18716] Call Trace: [ 1847.072814][T18716] dump_stack_lvl+0xd6/0x122 [ 1847.077450][T18716] dump_stack+0x11/0x1b [ 1847.081683][T18716] should_fail+0x23c/0x250 [ 1847.086081][T18716] should_fail_usercopy+0x16/0x20 [ 1847.091089][T18716] _copy_from_user+0x1c/0xd0 [ 1847.095666][T18716] kstrtouint_from_user+0x7e/0x170 [ 1847.100763][T18716] ? 0xffffffff81000000 [ 1847.104896][T18716] ? proc_fail_nth_read+0x150/0x150 [ 1847.110079][T18716] proc_fail_nth_write+0x4b/0x150 [ 1847.115113][T18716] vfs_write+0x286/0x900 [ 1847.119338][T18716] ? vfs_read+0x4e3/0x750 [ 1847.123649][T18716] ? __switch_to+0x145/0x4c0 [ 1847.128237][T18716] ? finish_task_switch+0xce/0x290 [ 1847.133330][T18716] ? __fget_light+0x21b/0x260 [ 1847.137989][T18716] ? __cond_resched+0x11/0x40 [ 1847.142703][T18716] ksys_write+0xd9/0x190 [ 1847.146926][T18716] __x64_sys_write+0x3e/0x50 [ 1847.151533][T18716] do_syscall_64+0x44/0xa0 [ 1847.155933][T18716] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 1847.161842][T18716] RIP: 0033:0x7f9dee1dd3ef [ 1847.166238][T18716] Code: 89 54 24 18 48 89 74 24 10 89 7c 24 08 e8 99 fd ff ff 48 8b 54 24 18 48 8b 74 24 10 41 89 c0 8b 7c 24 08 b8 01 00 00 00 0f 05 <48> 3d 00 f0 ff ff 77 31 44 89 c7 48 89 44 24 08 e8 cc fd ff ff 48 [ 1847.185898][T18716] RSP: 002b:00007f9debfa2170 EFLAGS: 00000293 ORIG_RAX: 0000000000000001 10:10:25 executing program 4: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000040)={0x2, &(0x7f0000000000)=[{0x25}, {}]}) (fail_nth: 12) 10:10:26 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000040)={0x2, &(0x7f0000000000)=[{0x5}, {}]}) [ 1847.194290][T18716] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 00007f9dee1dd3ef [ 1847.202241][T18716] RDX: 0000000000000001 RSI: 00007f9debfa21e0 RDI: 0000000000000003 [ 1847.210282][T18716] RBP: 00007f9debfa21d0 R08: 0000000000000000 R09: 0000000000000000 [ 1847.218237][T18716] R10: 0000000000000000 R11: 0000000000000293 R12: 0000000000000002 [ 1847.226275][T18716] R13: 00007ffeaf366aef R14: 00007f9debfa2300 R15: 0000000000022000 10:10:26 executing program 5: socketpair(0x11, 0xa, 0x1, &(0x7f0000000000)={0xffffffffffffffff}) sendmsg$TIPC_CMD_GET_NETID(r0, &(0x7f0000000140)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x8000000}, 0xc, &(0x7f0000000100)={&(0x7f00000000c0)={0x1c, 0x0, 0x100, 0x70bd2b, 0x25dfdbfc, {}, ["", "", ""]}, 0x1c}, 0x1, 0x0, 0x0, 0x10}, 0x40) clock_nanosleep(0x54fb6926d29f01ef, 0x0, &(0x7f0000000080)={0x0, 0x989680}, 0x0) socketpair(0x21, 0x6, 0x4, &(0x7f0000000180)) 10:10:26 executing program 1: syz_mount_image$ext4(&(0x7f0000000480)='ext3\x00', &(0x7f00000004c0)='./file0\x00', 0x0, 0x100000000000000, 0x0, 0x0, &(0x7f00000007c0)={[], [{@fscontext={'fscontext', 0x3d, 'sysadm_u'}}, {@defcontext={'defcontext', 0x3d, 'staff_u'}}]}) 10:10:26 executing program 4: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000040)={0x2, &(0x7f0000000000)=[{0x25}, {}]}) 10:10:26 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext3\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000480)=ANY=[@ANYBLOB='lazytime,test_dummy_encryption,max_dir_size_kb=0x000000000200,grpjquota=,min_batch_time=0x00000000000003ff,rootcontext\a']) (fail_nth: 7) 10:10:26 executing program 1: syz_mount_image$ext4(&(0x7f0000000480)='ext3\x00', &(0x7f00000004c0)='./file0\x00', 0x0, 0x200000000000000, 0x0, 0x0, &(0x7f00000007c0)={[], [{@fscontext={'fscontext', 0x3d, 'sysadm_u'}}, {@defcontext={'defcontext', 0x3d, 'staff_u'}}]}) [ 1847.413266][T18691] EXT4-fs (loop2): VFS: Can't find ext4 filesystem [ 1847.458645][T18744] FAULT_INJECTION: forcing a failure. [ 1847.458645][T18744] name failslab, interval 1, probability 0, space 0, times 0 [ 1847.471365][T18744] CPU: 1 PID: 18744 Comm: syz-executor.3 Not tainted 5.15.0-rc3-syzkaller #0 [ 1847.480195][T18744] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1847.490513][T18744] Call Trace: [ 1847.493858][T18744] dump_stack_lvl+0xd6/0x122 [ 1847.498453][T18744] dump_stack+0x11/0x1b [ 1847.502621][T18744] should_fail+0x23c/0x250 [ 1847.507050][T18744] ? kcalloc+0x32/0x50 [ 1847.511208][T18744] __should_failslab+0x81/0x90 [ 1847.516229][T18744] should_failslab+0x5/0x20 [ 1847.520716][T18744] __kmalloc+0x6f/0x350 [ 1847.525008][T18744] ? __crc32c_le_base+0x250/0x350 [ 1847.530176][T18744] kcalloc+0x32/0x50 [ 1847.534102][T18744] ext4_find_extent+0x21c/0x7f0 [ 1847.538977][T18744] ext4_ext_map_blocks+0x115/0x1ff0 [ 1847.544175][T18744] ? ext4_inode_csum+0x410/0x490 [ 1847.549125][T18744] ? ext4_es_lookup_extent+0x206/0x490 [ 1847.554569][T18744] ext4_map_blocks+0x1cf/0xf00 [ 1847.559343][T18744] ext4_getblk+0xc6/0x3e0 [ 1847.563652][T18744] ext4_bread+0x28/0x100 [ 1847.567921][T18744] ext4_append+0xd1/0x1c0 [ 1847.572235][T18744] ext4_init_new_dir+0x177/0x500 [ 1847.577182][T18744] ext4_mkdir+0x329/0x760 [ 1847.581664][T18744] vfs_mkdir+0x2c3/0x3e0 [ 1847.586043][T18744] do_mkdirat+0x12e/0x2c0 [ 1847.590524][T18744] __x64_sys_mkdir+0x40/0x50 [ 1847.595100][T18744] do_syscall_64+0x44/0xa0 [ 1847.599558][T18744] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 1847.605505][T18744] RIP: 0033:0x7f51e79349e7 [ 1847.609896][T18744] Code: 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 83 c8 ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 b8 53 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1847.629593][T18744] RSP: 002b:00007f51e56acfa8 EFLAGS: 00000246 ORIG_RAX: 0000000000000053 [ 1847.638022][T18744] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 00007f51e79349e7 [ 1847.646107][T18744] RDX: 0000000000000000 RSI: 00000000000001ff RDI: 0000000020000040 10:10:26 executing program 2: ioprio_get$pid(0x1, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000440)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r0 = openat$incfs(0xffffffffffffffff, &(0x7f0000000040)='.pending_reads\x00', 0x101000, 0x20) execveat(r0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000100)=[&(0x7f00000000c0)='\x00'], &(0x7f00000002c0)=[&(0x7f0000000140)='^#]&*(^\x00', &(0x7f0000000180)='\xdey\x00', &(0x7f00000001c0)='--\x00', &(0x7f0000000200)='.pending_reads\x00', &(0x7f0000000240)='.pending_reads\x00', &(0x7f0000000280)='/\\\x00'], 0x1000) openat$dir(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0xb0000, 0x0) 10:10:26 executing program 5: clock_nanosleep(0x54fb6926d29f01ef, 0x0, &(0x7f0000000080)={0x0, 0x989680}, 0x0) clock_settime(0x0, &(0x7f0000000000)={0x77359400}) 10:10:26 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000040)={0x2, &(0x7f0000000000)=[{0x1d}, {}]}) 10:10:26 executing program 4: prctl$PR_SET_SECCOMP(0x2, 0x2, &(0x7f0000000040)={0x2, &(0x7f0000000000)=[{0x25}, {}]}) 10:10:26 executing program 1: syz_mount_image$ext4(&(0x7f0000000480)='ext3\x00', &(0x7f00000004c0)='./file0\x00', 0x0, 0x700000000000000, 0x0, 0x0, &(0x7f00000007c0)={[], [{@fscontext={'fscontext', 0x3d, 'sysadm_u'}}, {@defcontext={'defcontext', 0x3d, 'staff_u'}}]}) 03:33:20 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext3\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000480)=ANY=[@ANYBLOB='lazytime,test_dummy_encryption,max_dir_size_kb=0x000000000200,grpjquota=,min_batch_time=0x00000000000003ff,rootcontext\a']) (fail_nth: 8) [ 1847.654074][T18744] RBP: 00007f51e56ad040 R08: 0000000000000000 R09: 0000000000000000 [ 1847.662312][T18744] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000020000000 [ 1847.670265][T18744] R13: 0000000020000040 R14: 00007f51e56ad000 R15: 0000000020000480 [ 1847.746513][T18763] FAULT_INJECTION: forcing a failure. [ 1847.746513][T18763] name failslab, interval 1, probability 0, space 0, times 0 [ 1847.759875][T18763] CPU: 1 PID: 18763 Comm: syz-executor.3 Not tainted 5.15.0-rc3-syzkaller #0 [ 1847.768823][T18763] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1847.778875][T18763] Call Trace: [ 1847.782201][T18763] dump_stack_lvl+0xd6/0x122 [ 1847.786915][T18763] dump_stack+0x11/0x1b [ 1847.791092][T18763] should_fail+0x23c/0x250 10:10:26 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000040)={0x2, &(0x7f0000000000)=[{0x25}, {}]}) [ 1847.795511][T18763] ? __es_insert_extent+0x51f/0xe70 [ 1847.800712][T18763] __should_failslab+0x81/0x90 [ 1847.805653][T18763] should_failslab+0x5/0x20 [ 1847.810258][T18763] kmem_cache_alloc+0x4f/0x300 [ 1847.817891][T18763] ? __set_page_dirty+0x160/0x1a0 [ 1847.822923][T18763] __es_insert_extent+0x51f/0xe70 [ 1847.828052][T18763] ext4_es_insert_extent+0x1cb/0x1950 [ 1847.833599][T18763] ext4_ext_map_blocks+0x100a/0x1ff0 [ 1847.838894][T18763] ext4_map_blocks+0x1cf/0xf00 10:10:26 executing program 4: prctl$PR_SET_SECCOMP(0x3, 0x2, &(0x7f0000000040)={0x2, &(0x7f0000000000)=[{0x25}, {}]}) 10:10:26 executing program 1: syz_mount_image$ext4(&(0x7f0000000480)='ext3\x00', &(0x7f00000004c0)='./file0\x00', 0x0, 0x2010000000000000, 0x0, 0x0, &(0x7f00000007c0)={[], [{@fscontext={'fscontext', 0x3d, 'sysadm_u'}}, {@defcontext={'defcontext', 0x3d, 'staff_u'}}]}) [ 1847.843867][T18763] ext4_getblk+0xc6/0x3e0 [ 1847.848207][T18763] ext4_bread+0x28/0x100 [ 1847.852534][T18763] ext4_append+0xd1/0x1c0 [ 1847.856858][T18763] ext4_init_new_dir+0x177/0x500 [ 1847.861804][T18763] ext4_mkdir+0x329/0x760 [ 1847.866222][T18763] vfs_mkdir+0x2c3/0x3e0 [ 1847.870479][T18763] do_mkdirat+0x12e/0x2c0 [ 1847.874944][T18763] __x64_sys_mkdir+0x40/0x50 [ 1847.880059][T18763] do_syscall_64+0x44/0xa0 [ 1847.884485][T18763] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 1847.890824][T18763] RIP: 0033:0x7f51e79349e7 [ 1847.895304][T18763] Code: 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 83 c8 ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 b8 53 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1847.915140][T18763] RSP: 002b:00007f51e56acfa8 EFLAGS: 00000246 ORIG_RAX: 0000000000000053 [ 1847.923814][T18763] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 00007f51e79349e7 [ 1847.931968][T18763] RDX: 0000000000000000 RSI: 00000000000001ff RDI: 0000000020000040 10:10:27 executing program 5: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$tipc(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$TIPC_CMD_RESET_LINK_STATS(r0, &(0x7f0000000140)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x10}, 0xc, &(0x7f0000000100)={&(0x7f00000000c0)={0x28, r1, 0x400, 0x70bd2a, 0x25dfdbff, {{}, {}, {0xc, 0x14, 'syz0\x00'}}, ["", "", "", "", "", ""]}, 0x28}, 0x1, 0x0, 0x0, 0x40400c4}, 0x44) clock_nanosleep(0x54fb6926d29f01ef, 0x0, &(0x7f0000000080)={0x0, 0x989680}, 0x0) 10:10:27 executing program 2: keyctl$restrict_keyring(0x1d, 0xffffffffffffffff, &(0x7f0000000040)='trusted\x00', &(0x7f0000000080)='[\x00') sysfs$3(0x3) syz_mount_image$ext4(0x0, &(0x7f0000000440)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) prctl$PR_GET_TSC(0x19, &(0x7f00000000c0)) openat$dir(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x828d6b7afe44f226, 0x0) 10:10:27 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000040)={0x2, &(0x7f0000000000)=[{0x28}, {}]}) 10:10:27 executing program 4: prctl$PR_SET_SECCOMP(0x4, 0x2, &(0x7f0000000040)={0x2, &(0x7f0000000000)=[{0x25}, {}]}) [ 1847.939941][T18763] RBP: 00007f51e56ad040 R08: 0000000000000000 R09: 0000000000000000 [ 1847.947920][T18763] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000020000000 [ 1847.956001][T18763] R13: 0000000020000040 R14: 00007f51e56ad000 R15: 0000000020000480 10:10:27 executing program 1: syz_mount_image$ext4(&(0x7f0000000480)='ext3\x00', &(0x7f00000004c0)='./file0\x00', 0x0, 0x2200000000000000, 0x0, 0x0, &(0x7f00000007c0)={[], [{@fscontext={'fscontext', 0x3d, 'sysadm_u'}}, {@defcontext={'defcontext', 0x3d, 'staff_u'}}]}) 10:10:27 executing program 4: prctl$PR_SET_SECCOMP(0x7, 0x2, &(0x7f0000000040)={0x2, &(0x7f0000000000)=[{0x25}, {}]}) 10:10:27 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext3\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000480)=ANY=[@ANYBLOB='lazytime,test_dummy_encryption,max_dir_size_kb=0x000000000200,grpjquota=,min_batch_time=0x00000000000003ff,rootcontext\a']) (fail_nth: 9) [ 1848.071076][T18796] FAULT_INJECTION: forcing a failure. [ 1848.071076][T18796] name failslab, interval 1, probability 0, space 0, times 0 [ 1848.083813][T18796] CPU: 1 PID: 18796 Comm: syz-executor.3 Not tainted 5.15.0-rc3-syzkaller #0 [ 1848.092576][T18796] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1848.102695][T18796] Call Trace: [ 1848.105971][T18796] dump_stack_lvl+0xd6/0x122 [ 1848.110605][T18796] dump_stack+0x11/0x1b [ 1848.114776][T18796] should_fail+0x23c/0x250 10:10:27 executing program 1: syz_mount_image$ext4(&(0x7f0000000480)='ext3\x00', &(0x7f00000004c0)='./file0\x00', 0x0, 0x8cffffff00000000, 0x0, 0x0, &(0x7f00000007c0)={[], [{@fscontext={'fscontext', 0x3d, 'sysadm_u'}}, {@defcontext={'defcontext', 0x3d, 'staff_u'}}]}) 10:10:27 executing program 4: prctl$PR_SET_SECCOMP(0x8, 0x2, &(0x7f0000000040)={0x2, &(0x7f0000000000)=[{0x25}, {}]}) [ 1848.119363][T18796] ? kcalloc+0x32/0x50 [ 1848.123825][T18796] __should_failslab+0x81/0x90 [ 1848.128681][T18796] should_failslab+0x5/0x20 [ 1848.133185][T18796] __kmalloc+0x6f/0x350 [ 1848.137348][T18796] kcalloc+0x32/0x50 [ 1848.141280][T18796] ext4_find_extent+0x21c/0x7f0 [ 1848.146617][T18796] ? kfree+0xf8/0x1d0 [ 1848.150600][T18796] ext4_ext_map_blocks+0x115/0x1ff0 [ 1848.155794][T18796] ext4_map_blocks+0x71e/0xf00 [ 1848.160560][T18796] ext4_getblk+0xc6/0x3e0 [ 1848.164896][T18796] ext4_bread+0x28/0x100 [ 1848.169135][T18796] ext4_append+0xd1/0x1c0 [ 1848.173483][T18796] ext4_init_new_dir+0x177/0x500 [ 1848.178464][T18796] ext4_mkdir+0x329/0x760 [ 1848.182872][T18796] vfs_mkdir+0x2c3/0x3e0 [ 1848.187123][T18796] do_mkdirat+0x12e/0x2c0 [ 1848.191453][T18796] __x64_sys_mkdir+0x40/0x50 [ 1848.196061][T18796] do_syscall_64+0x44/0xa0 [ 1848.200580][T18796] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 1848.206498][T18796] RIP: 0033:0x7f51e79349e7 [ 1848.210903][T18796] Code: 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 83 c8 ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 b8 53 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1848.230541][T18796] RSP: 002b:00007f51e56acfa8 EFLAGS: 00000246 ORIG_RAX: 0000000000000053 [ 1848.238947][T18796] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 00007f51e79349e7 [ 1848.246924][T18796] RDX: 0000000000000000 RSI: 00000000000001ff RDI: 0000000020000040 [ 1848.254890][T18796] RBP: 00007f51e56ad040 R08: 0000000000000000 R09: 0000000000000000 [ 1848.262988][T18796] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000020000000 10:10:27 executing program 4: prctl$PR_SET_SECCOMP(0xd, 0x2, &(0x7f0000000040)={0x2, &(0x7f0000000000)=[{0x25}, {}]}) 10:10:27 executing program 2: syz_mount_image$ext4(0x0, &(0x7f0000000440)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) openat$dir(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0xb0000, 0x0) r0 = openat$dir(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x181, 0x188) clock_gettime(0x0, &(0x7f00000000c0)={0x0, 0x0}) clock_gettime(0x0, &(0x7f0000000100)={0x0, 0x0}) futimesat(r0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000140)={{r1, r2/1000+10000}, {r3, r4/1000+60000}}) 10:10:27 executing program 5: r0 = add_key$fscrypt_v1(&(0x7f0000000000), &(0x7f0000000040)={'fscrypt:', @desc4}, &(0x7f00000000c0)={0x0, "0183a60779b04f7bd16b34a21a95d54467c74ab426df8edb9fafa8a21e5a77fd23c1c807157a86a8c41cc58e07719a884377b876f590e5fb25a8ba4bfb920d1e", 0x3f}, 0x48, 0xfffffffffffffff8) clock_gettime(0x0, &(0x7f0000000140)) clock_gettime(0x0, &(0x7f0000000180)={0x0, 0x0}) clock_nanosleep(0x6, 0x0, &(0x7f0000000080)={r1, r2+10000000}, 0x0) add_key$fscrypt_v1(&(0x7f0000000300), &(0x7f0000000340)={'fscrypt:', @auto=[0x0, 0x66, 0x66, 0x30, 0x3c067a56abc6984c, 0x31, 0x32, 0x62, 0x8, 0x31, 0x37, 0x35, 0x39, 0x33, 0x50, 0x36]}, &(0x7f0000000380)={0x0, "407fd9be20e892e5678a212bb3ea01cc24824ca92752e4cc6504258581496d4b87551616b33794437f353e802a8a10c3095b412e06f41026a848e84b2ec31909", 0x2a}, 0x48, r0) r3 = add_key$keyring(&(0x7f0000000280), &(0x7f00000002c0)={'syz', 0x0}, 0x0, 0x0, r0) add_key$keyring(&(0x7f0000000200), &(0x7f0000000240)={'syz', 0x0}, 0x0, 0x0, r3) clock_gettime(0x6, &(0x7f00000001c0)) 10:10:27 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000040)={0x2, &(0x7f0000000000)=[{0x29}, {}]}) 10:10:27 executing program 1: syz_mount_image$ext4(&(0x7f0000000480)='ext3\x00', &(0x7f00000004c0)='./file0\x00', 0x0, 0xf6ffffff00000000, 0x0, 0x0, &(0x7f00000007c0)={[], [{@fscontext={'fscontext', 0x3d, 'sysadm_u'}}, {@defcontext={'defcontext', 0x3d, 'staff_u'}}]}) [ 1848.270953][T18796] R13: 0000000020000040 R14: 00007f51e56ad000 R15: 0000000020000480 10:10:27 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext3\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000480)=ANY=[@ANYBLOB='lazytime,test_dummy_encryption,max_dir_size_kb=0x000000000200,grpjquota=,min_batch_time=0x00000000000003ff,rootcontext\a']) (fail_nth: 10) 10:10:27 executing program 4: prctl$PR_SET_SECCOMP(0xe, 0x2, &(0x7f0000000040)={0x2, &(0x7f0000000000)=[{0x25}, {}]}) 10:10:27 executing program 2: syz_mount_image$ext4(0x0, &(0x7f0000000440)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) openat$dir(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x6c2100, 0x1bd) openat$dir(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0xb0000, 0x0) 10:10:27 executing program 5: clock_nanosleep(0x54fb6926d29f01ef, 0x0, &(0x7f0000000080)={0x0, 0x989680}, 0x0) r0 = getpgrp(0xffffffffffffffff) sched_rr_get_interval(r0, &(0x7f0000000000)) 10:10:27 executing program 1: syz_mount_image$ext4(&(0x7f0000000480)='ext3\x00', &(0x7f00000004c0)='./file0\x00', 0x0, 0xfeffffff00000000, 0x0, 0x0, &(0x7f00000007c0)={[], [{@fscontext={'fscontext', 0x3d, 'sysadm_u'}}, {@defcontext={'defcontext', 0x3d, 'staff_u'}}]}) [ 1848.401645][T18831] FAULT_INJECTION: forcing a failure. [ 1848.401645][T18831] name failslab, interval 1, probability 0, space 0, times 0 [ 1848.414282][T18831] CPU: 1 PID: 18831 Comm: syz-executor.3 Not tainted 5.15.0-rc3-syzkaller #0 [ 1848.423132][T18831] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1848.433196][T18831] Call Trace: [ 1848.436479][T18831] dump_stack_lvl+0xd6/0x122 [ 1848.441072][T18831] dump_stack+0x11/0x1b [ 1848.445351][T18831] should_fail+0x23c/0x250 [ 1848.449864][T18831] ? ext4_mb_new_blocks+0x317/0x1fc0 [ 1848.455458][T18831] __should_failslab+0x81/0x90 [ 1848.460396][T18831] should_failslab+0x5/0x20 [ 1848.464897][T18831] kmem_cache_alloc+0x4f/0x300 [ 1848.469858][T18831] ext4_mb_new_blocks+0x317/0x1fc0 [ 1848.474975][T18831] ? ext4_find_extent+0x6cf/0x7f0 [ 1848.480008][T18831] ? ext4_ext_search_right+0x300/0x540 [ 1848.485462][T18831] ? ext4_inode_to_goal_block+0x1bd/0x1d0 [ 1848.491229][T18831] ext4_ext_map_blocks+0x15ed/0x1ff0 [ 1848.496538][T18831] ext4_map_blocks+0x71e/0xf00 [ 1848.501441][T18831] ext4_getblk+0xc6/0x3e0 [ 1848.505767][T18831] ext4_bread+0x28/0x100 [ 1848.510084][T18831] ext4_append+0xd1/0x1c0 [ 1848.514409][T18831] ext4_init_new_dir+0x177/0x500 [ 1848.519337][T18831] ext4_mkdir+0x329/0x760 [ 1848.523660][T18831] vfs_mkdir+0x2c3/0x3e0 [ 1848.527903][T18831] do_mkdirat+0x12e/0x2c0 [ 1848.532279][T18831] __x64_sys_mkdir+0x40/0x50 [ 1848.536877][T18831] do_syscall_64+0x44/0xa0 [ 1848.541301][T18831] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 1848.547192][T18831] RIP: 0033:0x7f51e79349e7 10:10:27 executing program 1: syz_mount_image$ext4(&(0x7f0000000480)='ext3\x00', &(0x7f00000004c0)='./file0\x00', 0x0, 0xffffffff00000000, 0x0, 0x0, &(0x7f00000007c0)={[], [{@fscontext={'fscontext', 0x3d, 'sysadm_u'}}, {@defcontext={'defcontext', 0x3d, 'staff_u'}}]}) 10:10:27 executing program 2: r0 = getpgrp(0xffffffffffffffff) sched_getscheduler(r0) syz_mount_image$ext4(0x0, &(0x7f0000000440)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r1 = fork() sched_rr_get_interval(r1, &(0x7f0000000100)) wait4(r1, 0x0, 0x80000000, 0x0) openat$dir(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0xb0000, 0x0) 10:10:27 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000040)={0x2, &(0x7f0000000000)=[{0x2d}, {}]}) [ 1848.551596][T18831] Code: 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 83 c8 ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 b8 53 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1848.571689][T18831] RSP: 002b:00007f51e56acfa8 EFLAGS: 00000246 ORIG_RAX: 0000000000000053 [ 1848.580188][T18831] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 00007f51e79349e7 [ 1848.588329][T18831] RDX: 0000000000000000 RSI: 00000000000001ff RDI: 0000000020000040 10:10:27 executing program 4: prctl$PR_SET_SECCOMP(0xf, 0x2, &(0x7f0000000040)={0x2, &(0x7f0000000000)=[{0x25}, {}]}) [ 1848.596303][T18831] RBP: 00007f51e56ad040 R08: 0000000000000000 R09: 0000000000000000 [ 1848.604343][T18831] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000020000000 [ 1848.612405][T18831] R13: 0000000020000040 R14: 00007f51e56ad000 R15: 0000000020000480 10:10:27 executing program 5: ioctl$sock_SIOCGIFINDEX_802154(0xffffffffffffffff, 0x8933, &(0x7f0000000040)={'wpan4\x00', 0x0}) sendmsg$NL802154_CMD_NEW_SEC_KEY(0xffffffffffffffff, &(0x7f00000002c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x10}, 0xc, &(0x7f0000000280)={&(0x7f0000000500)=ANY=[@ANYBLOB="b0010000", @ANYRES16=0x0, @ANYBLOB="20002cbd7000ffdbdf25170000000c000600020000000200000008000300", @ANYRES32=r0, @ANYBLOB="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"], 0x1b0}, 0x1, 0x0, 0x0, 0xc000}, 0x8000) clock_nanosleep(0x54fb6926d29f01ef, 0x0, &(0x7f0000000080)={0x0, 0x989680}, 0x0) 10:10:27 executing program 1: syz_mount_image$ext4(&(0x7f0000000480)='ext3\x00', &(0x7f00000004c0)='./file0\x00', 0x0, 0x0, 0x0, 0x2, &(0x7f00000007c0)={[], [{@fscontext={'fscontext', 0x3d, 'sysadm_u'}}, {@defcontext={'defcontext', 0x3d, 'staff_u'}}]}) 10:10:27 executing program 2: syz_mount_image$ext4(0x0, &(0x7f0000000440)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) ptrace$getregs(0xc, 0xffffffffffffffff, 0x1, &(0x7f0000000040)=""/160) openat$dir(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x30041, 0x0) 10:10:27 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext3\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000480)=ANY=[@ANYBLOB='lazytime,test_dummy_encryption,max_dir_size_kb=0x000000000200,grpjquota=,min_batch_time=0x00000000000003ff,rootcontext\a']) (fail_nth: 11) 10:10:27 executing program 4: prctl$PR_SET_SECCOMP(0x10, 0x2, &(0x7f0000000040)={0x2, &(0x7f0000000000)=[{0x25}, {}]}) 10:10:27 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000040)={0x2, &(0x7f0000000000)=[{0x30}, {}]}) 10:10:27 executing program 2: syz_mount_image$ext4(0x0, &(0x7f0000000440)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) openat$dir(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0xb0000, 0x0) 10:10:27 executing program 1: syz_mount_image$ext4(&(0x7f0000000480)='ext3\x00', &(0x7f00000004c0)='./file0\x00', 0x0, 0x0, 0x0, 0x7, &(0x7f00000007c0)={[], [{@fscontext={'fscontext', 0x3d, 'sysadm_u'}}, {@defcontext={'defcontext', 0x3d, 'staff_u'}}]}) 10:10:27 executing program 5: clock_nanosleep(0x54fb6926d29f01ef, 0x0, &(0x7f0000000080)={0x0, 0x989680}, 0x0) clock_gettime(0x0, &(0x7f0000000000)={0x0, 0x0}) clock_settime(0x6, &(0x7f0000000040)={r0, r1+10000000}) clock_settime(0x1, &(0x7f00000000c0)) 10:10:27 executing program 4: prctl$PR_SET_SECCOMP(0x15, 0x2, &(0x7f0000000040)={0x2, &(0x7f0000000000)=[{0x25}, {}]}) [ 1848.796281][T18875] FAULT_INJECTION: forcing a failure. [ 1848.796281][T18875] name failslab, interval 1, probability 0, space 0, times 0 [ 1848.808980][T18875] CPU: 1 PID: 18875 Comm: syz-executor.3 Not tainted 5.15.0-rc3-syzkaller #0 [ 1848.817795][T18875] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1848.828006][T18875] Call Trace: [ 1848.831558][T18875] dump_stack_lvl+0xd6/0x122 [ 1848.836156][T18875] dump_stack+0x11/0x1b [ 1848.840337][T18875] should_fail+0x23c/0x250 10:10:27 executing program 5: clock_nanosleep(0x54fb6926d29f01ef, 0x0, &(0x7f0000000080)={0x0, 0x989680}, 0x0) clock_nanosleep(0x1, 0x0, &(0x7f0000000000)={0x77359400}, &(0x7f0000000040)) [ 1848.844832][T18875] ? ext4_mb_new_blocks+0x73f/0x1fc0 [ 1848.850116][T18875] __should_failslab+0x81/0x90 [ 1848.854880][T18875] should_failslab+0x5/0x20 [ 1848.859381][T18875] kmem_cache_alloc+0x4f/0x300 [ 1848.864164][T18875] ext4_mb_new_blocks+0x73f/0x1fc0 [ 1848.869350][T18875] ? ext4_find_extent+0x6cf/0x7f0 [ 1848.874371][T18875] ? ext4_ext_search_right+0x300/0x540 [ 1848.879913][T18875] ? ext4_inode_to_goal_block+0x1bd/0x1d0 [ 1848.885678][T18875] ext4_ext_map_blocks+0x15ed/0x1ff0 [ 1848.890963][T18875] ext4_map_blocks+0x71e/0xf00 10:10:27 executing program 4: prctl$PR_SET_SECCOMP(0x17, 0x2, &(0x7f0000000040)={0x2, &(0x7f0000000000)=[{0x25}, {}]}) [ 1848.895780][T18875] ext4_getblk+0xc6/0x3e0 [ 1848.900119][T18875] ext4_bread+0x28/0x100 [ 1848.904363][T18875] ext4_append+0xd1/0x1c0 [ 1848.908940][T18875] ext4_init_new_dir+0x177/0x500 [ 1848.913972][T18875] ext4_mkdir+0x329/0x760 [ 1848.918431][T18875] vfs_mkdir+0x2c3/0x3e0 [ 1848.922730][T18875] do_mkdirat+0x12e/0x2c0 [ 1848.927174][T18875] __x64_sys_mkdir+0x40/0x50 [ 1848.931790][T18875] do_syscall_64+0x44/0xa0 [ 1848.936349][T18875] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 1848.942254][T18875] RIP: 0033:0x7f51e79349e7 10:10:27 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000040)={0x2, &(0x7f0000000000)=[{0x34}, {}]}) [ 1848.946830][T18875] Code: 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 83 c8 ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 b8 53 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1848.966839][T18875] RSP: 002b:00007f51e56acfa8 EFLAGS: 00000246 ORIG_RAX: 0000000000000053 [ 1848.975264][T18875] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 00007f51e79349e7 [ 1848.983285][T18875] RDX: 0000000000000000 RSI: 00000000000001ff RDI: 0000000020000040 10:10:28 executing program 2: syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x844800, 0x0) r0 = openat$vcsu(0xffffffffffffff9c, &(0x7f0000000080), 0x8060, 0x0) r1 = openat$incfs(r0, &(0x7f00000000c0)='.pending_reads\x00', 0x1, 0x6a) fchmodat(r1, &(0x7f0000000100)='./file0\x00', 0x198) openat$dir(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0xb0000, 0x0) 10:10:28 executing program 1: syz_mount_image$ext4(&(0x7f0000000480)='ext3\x00', &(0x7f00000004c0)='./file0\x00', 0x0, 0x0, 0x0, 0x22, &(0x7f00000007c0)={[], [{@fscontext={'fscontext', 0x3d, 'sysadm_u'}}, {@defcontext={'defcontext', 0x3d, 'staff_u'}}]}) [ 1848.991275][T18875] RBP: 00007f51e56ad040 R08: 0000000000000000 R09: 0000000000000000 [ 1848.999249][T18875] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000020000000 [ 1849.007244][T18875] R13: 0000000020000040 R14: 00007f51e56ad000 R15: 0000000020000480 10:10:28 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext3\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000480)=ANY=[@ANYBLOB='lazytime,test_dummy_encryption,max_dir_size_kb=0x000000000200,grpjquota=,min_batch_time=0x00000000000003ff,rootcontext\a']) (fail_nth: 12) 10:10:28 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000040)={0x2, &(0x7f0000000000)=[{0x35}, {}]}) 10:10:28 executing program 2: r0 = syz_mount_image$ext4(0x0, &(0x7f0000000400)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) openat$dir(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0xb0000, 0x0) clock_gettime(0x0, &(0x7f0000000440)={0x0, 0x0}) futimesat(r0, &(0x7f00000003c0)='./file0/file0\x00', &(0x7f0000000a40)={{0x0, 0x2710}, {r1, r2/1000+10000}}) getresuid(&(0x7f0000000080)=0x0, &(0x7f0000000480), &(0x7f00000004c0)) r4 = syz_mount_image$ext4(&(0x7f0000000040)='ext4\x00', &(0x7f0000000100)='./file0/file0\x00', 0x4, 0x8, &(0x7f0000000980)=[{&(0x7f0000000140)="704565ddcfe997ab342b6a0470ff8226393462be3a000611b2c6d06c2f899497d2252c2f03dabfa75265502541e3acebd2dca5621cf0a2f739bed4bc4533cab0c013fa0601892fff4579663da712681a5ac24712d1c50fe5813d274dc00ed32ff63cd29104e95802891715d156053cd5a87f83c849f99fee0c549f6d7d", 0x7d, 0x528b}, {&(0x7f00000001c0)="5e1df9e321478cf47ed6fc81936357a60a0e1367c2f1e70e0ab5cb4d1ff23b1993", 0x21, 0x3f}, {&(0x7f0000000200)="68b191e4bf726d4d8d3d1ce4bd105de1d1ec7f68cc48a6c4c47434575b2e385cbf50632515c0353da4a8677c4d477eaa4d775380424f3d7f9631fdae8da24343268d91b88db5923793546796725edb3d07bf988f25b3ecc5693f9f5e24e9d3d554f3828f4d9ff2838db5a97fdd403ac1975fbceea2b5a7af98c2d203324258f2305ccd853b1b4069caf19e8041a414ea7a2151fb0833dfda7f35d8aead7004ab394e61a0e3c8c9a1850602e91fe63e8f82c59df14a205f95f49b45e621e58b78541363bba131d3008dbb6e65c3cea2d4dc188eeb073d0a41f043006be563170856d9f5037cdba4c792cd805a8f33", 0xee, 0x7f}, {&(0x7f0000000300)="d1099c588c4bd8030077087333c036c9eb01e3e70debe04d12aa45cfa6d8f825271933b8a3eef70e3bbd6be7084f5ae92561f2a4f0fbfa7158944e68d94123b351ea79c180630480e28c1a0972ca7a67b432956045b1185256655add514ad32c25cbda78d01e6d5e3cd0108fa1e5120382be5a60064681c02bb76136ccbd3e8a51607fe6939cb26d16bc4f9a731dfb2b9e0829fc83b1ea8ef14630f0db303060e48ffc12667de505c056341668", 0xad, 0x8000}, {&(0x7f0000000540)="62e8bf35e07b4e302850795bea8bd6c7f6f3b2bc347fdd807b1a864c8cf27c2ff9c8fc33da1a5cbb8e10cfddc35a7ac2d006d88926f42eb47fd8e97d91c267f438f69284c558230c7feec43c1c4ebe1e7c73651d7400f40a5d0c9885983e9b82e94f75e4c54b1ab3000aac685aaaac7ff3d427571dd6e53a1476dd283ea35d6115c34fe0bf6480256988f41165c21c7b14d7e3253b2051af606ff845edcc63da110723ffd0b378789f35b0797e02a7b47063b0cc1148ba68e9f5", 0xba, 0x400}, {&(0x7f0000000700)="abf185683ce96adf46ac9f263d0795020f25cec7cc3c80d36929ce750ab089ddc86477febdd727e442412d1c3b63113ab680936e3055a3dfce7a554a6f68aad9422a608eb100d79d1795e9df3aee1a8bad2defb60c9b1059c8b6d3b038ba9be4aeb6a5d872cee3f4c86f3f4467a8ba4960375bfde8d597829a572b0fad57304b89a1784b930e5d293350bde833cfb1c6b0f22494f41d0f90a94e1fd17d79dc79ab9f352bab6c93d856c3238ffc01cfe211963361d6029b7ec9638649b4", 0xbd, 0x9}, {&(0x7f00000007c0)="2c6b04510e599f88ec5d272accc6c425d6597ff1560a1afff0820e620f43f18adab89768435ee1ff09d0188c3458eb54c53665dab3766532a9d8953e2ec01bff63c0d7189b87932c70ab38470d419ccca036f29cc288a87f25727e611fb49ce0d5249fa5d62b7ed97a44907252b15a51967c0585875401023b050d3df6f9956900ad486f1518c83307c751cdbcd78b3169a43f4632fce2ad74d117dd426da45342dc895e83762db7b9baf3ccc9278812b29a80a37513a106fd141363d8cef0a82d94e2dc0ef8c5b0", 0xc8, 0x1}, {&(0x7f00000008c0)="33538a4df9edec72784a1b8ee7a72c4154bd45966b7a3524e7c8712b98ae2a7cb5a6c6f2e064493f5289c4fe02bd2cf2eef0e6d2784224de4819ba82797ecd706047045481e3d1c093c0e3f0acef24e9d1a5c41dbb0ea5c9387b64e72cd70f37fce8e6511d0082f963e95846fc527f729f55d0e2ce345d22e4267d00ec5b05a65614da9d00573fe4f44134fa180672c1c135282b040184a42493fc56a49c3f054c40451ce592a28f", 0xa8, 0xffffffffffff7fff}], 0x200c05, &(0x7f0000000600)={[{@resuid={'resuid', 0x3d, r3}}, {@nouid32}, {@data_journal}, {@data_err_abort}, {@auto_da_alloc}], [{@obj_type={'obj_type', 0x3d, '(+'}}, {@pcr={'pcr', 0x3d, 0x3d}}, {@appraise_type}, {@fscontext={'fscontext', 0x3d, 'system_u'}}, {@smackfsdef={'smackfsdef', 0x3d, ':-#]-]::+/%'}}, {@smackfsfloor={'smackfsfloor', 0x3d, 'auto_da_alloc'}}]}) symlinkat(&(0x7f00000000c0)='./file0/file0\x00', r4, &(0x7f0000000500)='./file0/file0\x00') 10:10:28 executing program 4: prctl$PR_SET_SECCOMP(0x18, 0x2, &(0x7f0000000040)={0x2, &(0x7f0000000000)=[{0x25}, {}]}) 10:10:28 executing program 1: syz_mount_image$ext4(&(0x7f0000000480)='ext3\x00', &(0x7f00000004c0)='./file0\x00', 0x0, 0x0, 0x0, 0x700, &(0x7f00000007c0)={[], [{@fscontext={'fscontext', 0x3d, 'sysadm_u'}}, {@defcontext={'defcontext', 0x3d, 'staff_u'}}]}) 10:10:28 executing program 4: prctl$PR_SET_SECCOMP(0x19, 0x2, &(0x7f0000000040)={0x2, &(0x7f0000000000)=[{0x25}, {}]}) 10:10:28 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000040)={0x2, &(0x7f0000000000)=[{0x3d}, {}]}) [ 1849.143901][T18913] FAULT_INJECTION: forcing a failure. [ 1849.143901][T18913] name failslab, interval 1, probability 0, space 0, times 0 [ 1849.156786][T18913] CPU: 1 PID: 18913 Comm: syz-executor.3 Not tainted 5.15.0-rc3-syzkaller #0 [ 1849.165562][T18913] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1849.176024][T18913] Call Trace: [ 1849.179360][T18913] dump_stack_lvl+0xd6/0x122 [ 1849.183984][T18913] dump_stack+0x11/0x1b [ 1849.185337][T18915] loop2: detected capacity change from 0 to 16255 [ 1849.188147][T18913] should_fail+0x23c/0x250 [ 1849.188171][T18913] ? __es_insert_extent+0x51f/0xe70 [ 1849.188188][T18913] __should_failslab+0x81/0x90 [ 1849.209036][T18913] should_failslab+0x5/0x20 [ 1849.213543][T18913] kmem_cache_alloc+0x4f/0x300 [ 1849.219871][T18913] __es_insert_extent+0x51f/0xe70 [ 1849.224904][T18913] ext4_es_insert_extent+0x1cb/0x1950 [ 1849.230274][T18913] ext4_map_blocks+0xa5d/0xf00 [ 1849.235042][T18913] ext4_getblk+0xc6/0x3e0 [ 1849.239385][T18913] ext4_bread+0x28/0x100 [ 1849.243715][T18913] ext4_append+0xd1/0x1c0 [ 1849.244967][T18915] EXT4-fs (loop2): VFS: Can't find ext4 filesystem [ 1849.248037][T18913] ext4_init_new_dir+0x177/0x500 [ 1849.248061][T18913] ext4_mkdir+0x329/0x760 [ 1849.263935][T18913] vfs_mkdir+0x2c3/0x3e0 [ 1849.268227][T18913] do_mkdirat+0x12e/0x2c0 [ 1849.272555][T18913] __x64_sys_mkdir+0x40/0x50 [ 1849.277220][T18913] do_syscall_64+0x44/0xa0 [ 1849.281638][T18913] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 1849.287728][T18913] RIP: 0033:0x7f51e79349e7 [ 1849.292143][T18913] Code: 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 83 c8 ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 b8 53 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1849.311744][T18913] RSP: 002b:00007f51e56acfa8 EFLAGS: 00000246 ORIG_RAX: 0000000000000053 [ 1849.320163][T18913] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 00007f51e79349e7 [ 1849.328128][T18913] RDX: 0000000000000000 RSI: 00000000000001ff RDI: 0000000020000040 [ 1849.336185][T18913] RBP: 00007f51e56ad040 R08: 0000000000000000 R09: 0000000000000000 [ 1849.344157][T18913] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000020000000 [ 1849.352133][T18913] R13: 0000000020000040 R14: 00007f51e56ad000 R15: 0000000020000480 [ 1849.399787][T18915] loop2: detected capacity change from 0 to 16255 10:10:28 executing program 1: syz_mount_image$ext4(&(0x7f0000000480)='ext3\x00', &(0x7f00000004c0)='./file0\x00', 0x0, 0x0, 0x0, 0x1020, &(0x7f00000007c0)={[], [{@fscontext={'fscontext', 0x3d, 'sysadm_u'}}, {@defcontext={'defcontext', 0x3d, 'staff_u'}}]}) 10:10:28 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000040)={0x2, &(0x7f0000000000)=[{0x45}, {}]}) 10:10:28 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext3\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000480)=ANY=[@ANYBLOB='lazytime,test_dummy_encryption,max_dir_size_kb=0x000000000200,grpjquota=,min_batch_time=0x00000000000003ff,rootcontext\a']) (fail_nth: 13) 10:10:28 executing program 4: prctl$PR_SET_SECCOMP(0x1a, 0x2, &(0x7f0000000040)={0x2, &(0x7f0000000000)=[{0x25}, {}]}) 10:10:28 executing program 2: r0 = syz_mount_image$ext4(0x0, &(0x7f0000000440)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r1 = openat$vcsu(0xffffffffffffff9c, &(0x7f0000000000), 0x5200, 0x0) fchmodat(r1, &(0x7f0000000040)='./file0\x00', 0x1b0) r2 = openat$dir(0xffffffffffffff9c, &(0x7f0000000180)='./file0/file0\x00', 0x6001, 0xc9) openat$incfs(r2, &(0x7f0000000200)='.pending_reads\x00', 0x400000, 0x0) execveat(r1, &(0x7f0000000100)='./file0\x00', &(0x7f0000000180), &(0x7f00000003c0)=[&(0x7f00000001c0)=']^\\!\x00', &(0x7f0000000140)='.log\x00', &(0x7f0000000240)='@^+[]\x00', &(0x7f0000000280)='.log\x00', &(0x7f00000002c0)='{\x00', &(0x7f0000000300)='^,},\x00', &(0x7f0000000340)='.log\x00', &(0x7f0000000380)='\x00'], 0x1000) openat$incfs(r1, &(0x7f00000000c0)='.log\x00', 0x585200, 0x123) faccessat2(r0, &(0x7f0000000480)='./file0/file0\x00', 0x2, 0x200) accept4$packet(r1, &(0x7f0000000400)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000000440)=0x14, 0x100000) renameat2(r0, &(0x7f0000000040)='\x00', r1, &(0x7f0000000080)='./file0\x00', 0x4) 10:10:28 executing program 5: r0 = syz_genetlink_get_family_id$team(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$TEAM_CMD_OPTIONS_SET(0xffffffffffffffff, &(0x7f0000000340)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x2000}, 0xc, &(0x7f0000000300)={&(0x7f00000000c0)={0x23c, r0, 0xb04, 0x70bd2c, 0x25dfdbfb, {}, [{{0x8}, {0x158, 0x2, 0x0, 0x1, [{0x4c, 0x1, @lb_tx_method={{0x24}, {0x5}, {0x19, 0x4, 'hash_to_port_mapping\x00'}}}, {0x54, 0x1, @bpf_hash_func={{0x24}, {0x5}, {0x24, 0x4, [{0x5, 0x6, 0x3}, {0x6, 0x0, 0x20, 0xfb}, {0x4, 0x2, 0x4, 0x5}, {0x401, 0x1, 0xc5, 0xf9d}]}}}, {0x40, 0x1, @lb_port_stats={{{0x24}, {0x5}, {0x8, 0x4, 0x7}}, {0x8}}}, {0x3c, 0x1, @user_linkup={{{0x24}, {0x5}, {0x4}}, {0x8}}}, {0x38, 0x1, @notify_peers_count={{0x24}, {0x5}, {0x8, 0x4, 0x1ff}}}]}}, {{0x8}, {0xc0, 0x2, 0x0, 0x1, [{0x3c, 0x1, @lb_tx_method={{0x24}, {0x5}, {0x9, 0x4, 'hash\x00'}}}, {0x40, 0x1, @lb_port_stats={{{0x24}, {0x5}, {0x8, 0x4, 0x2}}, {0x8}}}, {0x40, 0x1, @lb_tx_hash_to_port_mapping={{{0x24}, {0x5}, {0x8}}, {0x8}}}]}}]}, 0x23c}, 0x1, 0x0, 0x0, 0x4800}, 0x20004000) syz_genetlink_get_family_id$team(&(0x7f0000000380), 0xffffffffffffffff) clock_nanosleep(0x54fb6926d29f01ef, 0x0, &(0x7f0000000080)={0x0, 0x989680}, 0x0) 10:10:28 executing program 4: prctl$PR_SET_SECCOMP(0x1b, 0x2, &(0x7f0000000040)={0x2, &(0x7f0000000000)=[{0x25}, {}]}) 10:10:28 executing program 1: syz_mount_image$ext4(&(0x7f0000000480)='ext3\x00', &(0x7f00000004c0)='./file0\x00', 0x0, 0x0, 0x0, 0x2010, &(0x7f00000007c0)={[], [{@fscontext={'fscontext', 0x3d, 'sysadm_u'}}, {@defcontext={'defcontext', 0x3d, 'staff_u'}}]}) [ 1849.837732][T18955] FAULT_INJECTION: forcing a failure. [ 1849.837732][T18955] name failslab, interval 1, probability 0, space 0, times 0 [ 1849.850453][T18955] CPU: 1 PID: 18955 Comm: syz-executor.3 Not tainted 5.15.0-rc3-syzkaller #0 [ 1849.859311][T18955] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1849.869445][T18955] Call Trace: [ 1849.872724][T18955] dump_stack_lvl+0xd6/0x122 [ 1849.877479][T18955] dump_stack+0x11/0x1b [ 1849.881739][T18955] should_fail+0x23c/0x250 10:10:28 executing program 4: prctl$PR_SET_SECCOMP(0x1c, 0x2, &(0x7f0000000040)={0x2, &(0x7f0000000000)=[{0x25}, {}]}) [ 1849.886157][T18955] ? __se_sys_mount+0x4e/0x2f0 [ 1849.891055][T18955] __should_failslab+0x81/0x90 [ 1849.895865][T18955] should_failslab+0x5/0x20 [ 1849.900459][T18955] __kmalloc_track_caller+0x6d/0x350 [ 1849.905753][T18955] ? strnlen_user+0x137/0x1c0 [ 1849.910855][T18955] strndup_user+0x73/0x120 [ 1849.915295][T18955] __se_sys_mount+0x4e/0x2f0 [ 1849.920246][T18955] ? do_user_addr_fault+0x74e/0xbe0 [ 1849.926450][T18955] __x64_sys_mount+0x63/0x70 [ 1849.931360][T18955] do_syscall_64+0x44/0xa0 [ 1849.935803][T18955] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 1849.941776][T18955] RIP: 0033:0x7f51e7936dfa [ 1849.946293][T18955] Code: 48 c7 c2 bc ff ff ff f7 d8 64 89 02 b8 ff ff ff ff eb d2 e8 b8 04 00 00 0f 1f 84 00 00 00 00 00 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1849.966846][T18955] RSP: 002b:00007f51e56acfa8 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 1849.975589][T18955] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 00007f51e7936dfa [ 1849.984071][T18955] RDX: 0000000020000000 RSI: 0000000020000040 RDI: 0000000000000000 [ 1849.992105][T18955] RBP: 00007f51e56ad040 R08: 00007f51e56ad040 R09: 0000000020000000 [ 1850.000376][T18955] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000020000000 [ 1850.008357][T18955] R13: 0000000020000040 R14: 00007f51e56ad000 R15: 0000000020000480 10:10:29 executing program 2: syz_mount_image$ext4(0x0, &(0x7f0000000440)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r0 = openat$vcsu(0xffffffffffffff9c, &(0x7f0000000000), 0x5200, 0x0) fchmodat(r0, &(0x7f0000000040)='./file0\x00', 0x1b0) openat$incfs(r0, &(0x7f00000002c0)='.log\x00', 0x581200, 0x123) accept4$packet(r0, &(0x7f0000000400)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000000440)=0x14, 0x100000) sendmsg$TIPC_CMD_SHOW_STATS(r0, &(0x7f0000000100)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x4}, 0xc, &(0x7f00000000c0)={&(0x7f0000000080)={0x1c, 0x0, 0x100, 0x70bd27, 0x25dfdbfc, {}, ["", "", ""]}, 0x1c}, 0x1, 0x0, 0x0, 0x800}, 0x4004051) r1 = openat$vcsu(0xffffffffffffff9c, &(0x7f0000000000), 0x5200, 0x0) fchmodat(r1, &(0x7f0000000040)='./file0\x00', 0x1b0) r2 = openat$incfs(r1, &(0x7f00000002c0)='.log\x00', 0x581200, 0x123) syz_genetlink_get_family_id$fou(&(0x7f0000000300), r2) renameat2(r2, &(0x7f0000000380)='./file0\x00', 0xffffffffffffffff, &(0x7f00000003c0)='./file1\x00', 0x0) ioctl$SG_GET_TIMEOUT(r2, 0x2202, 0x0) openat$dir(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0xb0400, 0x0) 10:10:29 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000040)={0x2, &(0x7f0000000000)=[{0x4d}, {}]}) 10:10:29 executing program 1: syz_mount_image$ext4(&(0x7f0000000480)='ext3\x00', &(0x7f00000004c0)='./file0\x00', 0x0, 0x0, 0x0, 0x2200, &(0x7f00000007c0)={[], [{@fscontext={'fscontext', 0x3d, 'sysadm_u'}}, {@defcontext={'defcontext', 0x3d, 'staff_u'}}]}) 10:10:29 executing program 5: socket$inet6_udp(0xa, 0x2, 0x0) clock_nanosleep(0x54fb6926d29f01ef, 0x0, &(0x7f0000000080)={0x0, 0x989680}, 0x0) clock_gettime(0x4, &(0x7f0000000000)) 10:10:29 executing program 4: prctl$PR_SET_SECCOMP(0x1d, 0x2, &(0x7f0000000040)={0x2, &(0x7f0000000000)=[{0x25}, {}]}) 10:10:29 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext3\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000480)=ANY=[@ANYBLOB='lazytime,test_dummy_encryption,max_dir_size_kb=0x000000000200,grpjquota=,min_batch_time=0x00000000000003ff,rootcontext\a']) (fail_nth: 14) 10:10:29 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000040)={0x2, &(0x7f0000000000)=[{0x60}, {}]}) 10:10:29 executing program 4: prctl$PR_SET_SECCOMP(0x1e, 0x2, &(0x7f0000000040)={0x2, &(0x7f0000000000)=[{0x25}, {}]}) 10:10:29 executing program 5: clock_settime(0x7, &(0x7f0000000000)) clock_gettime(0x0, &(0x7f00000000c0)={0x0, 0x0}) clock_settime(0x5, &(0x7f0000000100)={r0, r1+60000000}) clock_settime(0x1, &(0x7f0000000040)) clock_nanosleep(0x6, 0x0, &(0x7f0000000140)={0x0, 0x989680}, 0x0) 10:10:29 executing program 1: syz_mount_image$ext4(&(0x7f0000000480)='ext3\x00', &(0x7f00000004c0)='./file0\x00', 0x0, 0x0, 0x0, 0xedc0, &(0x7f00000007c0)={[], [{@fscontext={'fscontext', 0x3d, 'sysadm_u'}}, {@defcontext={'defcontext', 0x3d, 'staff_u'}}]}) 10:10:29 executing program 2: r0 = syz_mount_image$ext4(0x0, &(0x7f0000000440)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) openat$dir(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0xb0000, 0x0) r1 = openat$vcsu(0xffffffffffffff9c, &(0x7f0000000080), 0x4200, 0x0) unlinkat(r1, &(0x7f00000000c0)='./file0\x00', 0x200) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY_ALL_USERS(r0, 0xc0406619, &(0x7f0000000040)={@desc={0x1, 0x0, @desc3}}) [ 1850.208315][T19000] FAULT_INJECTION: forcing a failure. [ 1850.208315][T19000] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 1850.221633][T19000] CPU: 0 PID: 19000 Comm: syz-executor.3 Not tainted 5.15.0-rc3-syzkaller #0 [ 1850.230548][T19000] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1850.240712][T19000] Call Trace: [ 1850.244082][T19000] dump_stack_lvl+0xd6/0x122 [ 1850.248780][T19000] dump_stack+0x11/0x1b [ 1850.253135][T19000] should_fail+0x23c/0x250 10:10:29 executing program 4: prctl$PR_SET_SECCOMP(0x21, 0x2, &(0x7f0000000040)={0x2, &(0x7f0000000000)=[{0x25}, {}]}) [ 1850.257561][T19000] should_fail_usercopy+0x16/0x20 [ 1850.262853][T19000] _copy_from_user+0x1c/0xd0 [ 1850.267540][T19000] strndup_user+0xb0/0x120 [ 1850.271972][T19000] __se_sys_mount+0x4e/0x2f0 [ 1850.276606][T19000] ? do_user_addr_fault+0x74e/0xbe0 [ 1850.281916][T19000] __x64_sys_mount+0x63/0x70 [ 1850.286605][T19000] do_syscall_64+0x44/0xa0 [ 1850.291063][T19000] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 1850.296978][T19000] RIP: 0033:0x7f51e7936dfa [ 1850.301506][T19000] Code: 48 c7 c2 bc ff ff ff f7 d8 64 89 02 b8 ff ff ff ff eb d2 e8 b8 04 00 00 0f 1f 84 00 00 00 00 00 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1850.321610][T19000] RSP: 002b:00007f51e56acfa8 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 1850.330022][T19000] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 00007f51e7936dfa [ 1850.338069][T19000] RDX: 0000000020000000 RSI: 0000000020000040 RDI: 0000000000000000 [ 1850.346052][T19000] RBP: 00007f51e56ad040 R08: 00007f51e56ad040 R09: 0000000020000000 10:10:29 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000040)={0x2, &(0x7f0000000000)=[{0x61}, {}]}) [ 1850.354104][T19000] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000020000000 [ 1850.362072][T19000] R13: 0000000020000040 R14: 00007f51e56ad000 R15: 0000000020000480 10:10:29 executing program 4: prctl$PR_SET_SECCOMP(0x22, 0x2, &(0x7f0000000040)={0x2, &(0x7f0000000000)=[{0x25}, {}]}) 10:10:29 executing program 1: syz_mount_image$ext4(&(0x7f0000000480)='ext3\x00', &(0x7f00000004c0)='./file0\x00', 0x0, 0x0, 0x0, 0x1000000, &(0x7f00000007c0)={[], [{@fscontext={'fscontext', 0x3d, 'sysadm_u'}}, {@defcontext={'defcontext', 0x3d, 'staff_u'}}]}) 10:10:29 executing program 5: clock_nanosleep(0x4, 0x0, &(0x7f0000000080), 0x0) accept$packet(0xffffffffffffffff, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000040)=0x14) 10:10:29 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000040)={0x2, &(0x7f0000000000)=[{0x64}, {}]}) 10:10:29 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext3\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000480)=ANY=[@ANYBLOB='lazytime,test_dummy_encryption,max_dir_size_kb=0x000000000200,grpjquota=,min_batch_time=0x00000000000003ff,rootcontext\a']) (fail_nth: 15) 10:10:29 executing program 4: prctl$PR_SET_SECCOMP(0x23, 0x2, &(0x7f0000000040)={0x2, &(0x7f0000000000)=[{0x25}, {}]}) 10:10:29 executing program 2: syz_mount_image$ext4(0x0, &(0x7f0000000440)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) openat$dir(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0xb0000, 0x4) 10:10:29 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000040)={0x2, &(0x7f0000000000)=[{0x74}, {}]}) 10:10:29 executing program 5: clock_nanosleep(0x54fb6926d29f01ef, 0x0, &(0x7f0000000080)={0x0, 0x989680}, 0x0) sendmsg$TIPC_CMD_ENABLE_BEARER(0xffffffffffffffff, &(0x7f0000000100)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f00000000c0)={&(0x7f0000000040)={0x34, 0x0, 0x10, 0x70bd25, 0x25dfdbfd, {{}, {}, {0x18, 0x17, {0x0, 0x6, @udp='udp:syz0\x00'}}}, ["", "", "", "", ""]}, 0x34}, 0x1, 0x0, 0x0, 0x4000000}, 0x4) 10:10:29 executing program 1: syz_mount_image$ext4(&(0x7f0000000480)='ext3\x00', &(0x7f00000004c0)='./file0\x00', 0x0, 0x0, 0x0, 0x2000000, &(0x7f00000007c0)={[], [{@fscontext={'fscontext', 0x3d, 'sysadm_u'}}, {@defcontext={'defcontext', 0x3d, 'staff_u'}}]}) [ 1850.612710][T19063] FAULT_INJECTION: forcing a failure. [ 1850.612710][T19063] name failslab, interval 1, probability 0, space 0, times 0 [ 1850.625883][T19063] CPU: 0 PID: 19063 Comm: syz-executor.3 Not tainted 5.15.0-rc3-syzkaller #0 [ 1850.634744][T19063] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1850.644900][T19063] Call Trace: [ 1850.648173][T19063] dump_stack_lvl+0xd6/0x122 [ 1850.652802][T19063] dump_stack+0x11/0x1b [ 1850.656962][T19063] should_fail+0x23c/0x250 [ 1850.661517][T19063] __should_failslab+0x81/0x90 [ 1850.666402][T19063] ? __se_sys_mount+0xf7/0x2f0 [ 1850.671167][T19063] should_failslab+0x5/0x20 [ 1850.675667][T19063] kmem_cache_alloc_trace+0x52/0x320 [ 1850.680964][T19063] ? _copy_from_user+0x94/0xd0 [ 1850.685784][T19063] __se_sys_mount+0xf7/0x2f0 [ 1850.690516][T19063] __x64_sys_mount+0x63/0x70 [ 1850.695309][T19063] do_syscall_64+0x44/0xa0 [ 1850.699803][T19063] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 1850.705775][T19063] RIP: 0033:0x7f51e7936dfa [ 1850.710203][T19063] Code: 48 c7 c2 bc ff ff ff f7 d8 64 89 02 b8 ff ff ff ff eb d2 e8 b8 04 00 00 0f 1f 84 00 00 00 00 00 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1850.730086][T19063] RSP: 002b:00007f51e56acfa8 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 1850.738705][T19063] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 00007f51e7936dfa [ 1850.746848][T19063] RDX: 0000000020000000 RSI: 0000000020000040 RDI: 0000000000000000 [ 1850.754989][T19063] RBP: 00007f51e56ad040 R08: 00007f51e56ad040 R09: 0000000020000000 10:10:29 executing program 1: syz_mount_image$ext4(&(0x7f0000000480)='ext3\x00', &(0x7f00000004c0)='./file0\x00', 0x0, 0x0, 0x0, 0x7000000, &(0x7f00000007c0)={[], [{@fscontext={'fscontext', 0x3d, 'sysadm_u'}}, {@defcontext={'defcontext', 0x3d, 'staff_u'}}]}) 10:10:29 executing program 4: prctl$PR_SET_SECCOMP(0x24, 0x2, &(0x7f0000000040)={0x2, &(0x7f0000000000)=[{0x25}, {}]}) 10:10:29 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000040)={0x2, &(0x7f0000000000)=[{0x94}, {}]}) 10:10:29 executing program 5: clock_gettime(0x0, &(0x7f0000000000)={0x0, 0x0}) clock_gettime(0x5, &(0x7f0000000040)) clock_nanosleep(0x5, 0x0, &(0x7f0000000080)={r0, r1+60000000}, 0x0) 10:10:29 executing program 2: syz_mount_image$ext4(0x0, &(0x7f0000000440)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NBD_CMD_CONNECT(r0, &(0x7f00000013c0)={&(0x7f00000012c0), 0xc, &(0x7f0000001380)={0x0}}, 0xc6c3dbe86af1a089) sendmsg$NL802154_CMD_NEW_SEC_LEVEL(r0, &(0x7f0000000140)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x20000000}, 0xc, &(0x7f0000000100)={&(0x7f0000000040)={0x84, 0x0, 0x100, 0x70bd26, 0x25dfdbff, {}, [@NL802154_ATTR_SEC_LEVEL={0x2c, 0x22, 0x0, 0x1, [@NL802154_SECLEVEL_ATTR_CMD_FRAME={0x8, 0x3, 0x4}, @NL802154_SECLEVEL_ATTR_LEVELS={0x5, 0x1, 0x5}, @NL802154_SECLEVEL_ATTR_DEV_OVERRIDE={0x5}, @NL802154_SECLEVEL_ATTR_DEV_OVERRIDE={0x5, 0x4, 0x1}, @NL802154_SECLEVEL_ATTR_LEVELS={0x5, 0x1, 0x1f}]}, @NL802154_ATTR_SEC_LEVEL={0x44, 0x22, 0x0, 0x1, [@NL802154_SECLEVEL_ATTR_LEVELS={0x5, 0x1, 0x20}, @NL802154_SECLEVEL_ATTR_LEVELS={0x5, 0x1, 0xcb}, @NL802154_SECLEVEL_ATTR_LEVELS={0x5, 0x1, 0xf8}, @NL802154_SECLEVEL_ATTR_FRAME={0x8, 0x2, 0x2}, @NL802154_SECLEVEL_ATTR_LEVELS={0x5}, @NL802154_SECLEVEL_ATTR_LEVELS={0x5, 0x1, 0x9}, @NL802154_SECLEVEL_ATTR_LEVELS={0x5, 0x1, 0x1}, @NL802154_SECLEVEL_ATTR_LEVELS={0x5}]}]}, 0x84}, 0x1, 0x0, 0x0, 0x1}, 0x8) r1 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NBD_CMD_RECONFIGURE(r1, &(0x7f0000000280)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x40}, 0xc, &(0x7f0000000240)={&(0x7f00000001c0)={0x44, 0x0, 0x1, 0x70bd2c, 0x25dfdbff, {}, [@NBD_ATTR_SERVER_FLAGS={0xc, 0x5, 0x102}, @NBD_ATTR_SIZE_BYTES={0xc, 0x2, 0xfffffffffffffff7}, @NBD_ATTR_DEAD_CONN_TIMEOUT={0xc}, @NBD_ATTR_CLIENT_FLAGS={0xc, 0x6, 0x3}]}, 0x44}, 0x1, 0x0, 0x0, 0x8881}, 0x1) [ 1850.763390][T19063] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000020000000 [ 1850.771531][T19063] R13: 0000000020000040 R14: 00007f51e56ad000 R15: 0000000020000480 10:10:29 executing program 4: prctl$PR_SET_SECCOMP(0x25, 0x2, &(0x7f0000000040)={0x2, &(0x7f0000000000)=[{0x25}, {}]}) 10:10:29 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext3\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000480)=ANY=[@ANYBLOB='lazytime,test_dummy_encryption,max_dir_size_kb=0x000000000200,grpjquota=,min_batch_time=0x00000000000003ff,rootcontext\a']) (fail_nth: 16) 10:10:29 executing program 5: r0 = openat$vcsu(0xffffffffffffff9c, &(0x7f0000000000), 0x5200, 0x0) fchmodat(r0, &(0x7f0000000040)='./file0\x00', 0x1b0) r1 = openat$incfs(r0, &(0x7f00000002c0)='.log\x00', 0x581200, 0x123) syz_genetlink_get_family_id$fou(&(0x7f0000000300), r1) renameat2(r1, &(0x7f0000000380)='./file0\x00', 0xffffffffffffffff, &(0x7f00000003c0)='./file1\x00', 0x0) getpeername$packet(r1, &(0x7f0000000040)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @multicast}, &(0x7f00000000c0)=0x14) clock_nanosleep(0x54fb6926d29f01ef, 0x1, &(0x7f0000000080), 0x0) r2 = gettid() sched_setparam(r2, &(0x7f0000000000)=0x1f) 10:10:29 executing program 4: prctl$PR_SET_SECCOMP(0x26, 0x2, &(0x7f0000000040)={0x2, &(0x7f0000000000)=[{0x25}, {}]}) 10:10:29 executing program 2: r0 = add_key$fscrypt_v1(&(0x7f00000002c0), &(0x7f0000000300)={'fscrypt:', @desc2}, &(0x7f0000000340)={0x0, "c90ae60c1161888e0a0de3eae0e257496aa5e5c6ad92398f7fffdfd17a736281c604da793c5e76959dce96259a802c38465a87f17a642cca5caf945ef112723d", 0x1a}, 0x48, 0xfffffffffffffffa) r1 = syz_mount_image$ext4(0x0, &(0x7f0000000440)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r2 = add_key$keyring(&(0x7f0000000180), &(0x7f0000000540)={'syz', 0x3}, 0x0, 0x0, r0) keyctl$unlink(0x9, r0, r2) openat$dir(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0xb0000, 0x0) socket$nl_generic(0x10, 0x3, 0x10) ioctl$FS_IOC_GET_ENCRYPTION_KEY_STATUS(r1, 0xc080661a, &(0x7f0000000480)={@id={0x2, 0x0, @c}}) r3 = syz_genetlink_get_family_id$tipc(&(0x7f0000000080), 0xffffffffffffffff) r4 = openat$vcsu(0xffffffffffffff9c, &(0x7f0000000000), 0x5200, 0x0) fchmodat(r4, &(0x7f0000000040)='./file0\x00', 0x1b0) r5 = openat$incfs(r4, &(0x7f00000002c0)='.log\x00', 0x581200, 0x123) syz_genetlink_get_family_id$fou(&(0x7f0000000300), r5) r6 = socket(0x2b, 0x80808, 0x9) sendmsg$TIPC_CMD_GET_REMOTE_MNG(r6, &(0x7f0000000640)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x800000}, 0xc, &(0x7f0000000600)={&(0x7f0000000200)={0x1c, r3, 0x100, 0x70bd2d, 0x25dfdbfb, {}, ["", ""]}, 0x1c}, 0x1, 0x0, 0x0, 0x8000}, 0x80) renameat2(r5, &(0x7f0000000380)='./file0\x00', 0xffffffffffffffff, &(0x7f00000003c0)='./file1\x00', 0x0) symlinkat(&(0x7f00000003c0)='./file0/file0\x00', r5, &(0x7f0000000400)='./file0\x00') sendmsg$TIPC_CMD_GET_NETID(0xffffffffffffffff, &(0x7f0000000140)={&(0x7f0000000500)={0x10, 0x0, 0x0, 0x4}, 0xc, &(0x7f0000000100)={&(0x7f00000000c0)={0x1c, r3, 0x8, 0x70bd2a, 0x25dfdbfd, {}, ["", "", "", "", ""]}, 0x1c}, 0x1, 0x0, 0x0, 0x4048000}, 0x40040) sendmsg$NBD_CMD_STATUS(0xffffffffffffffff, &(0x7f0000000280)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x800200}, 0xc, &(0x7f0000000240)={&(0x7f0000000580)={0x50, 0x0, 0x200, 0x70bd25, 0x25dfdbff, {}, [@NBD_ATTR_CLIENT_FLAGS={0xc, 0x6, 0x3}, @NBD_ATTR_SIZE_BYTES={0xc, 0x2, 0x100000000}, @NBD_ATTR_SIZE_BYTES={0xc, 0x2, 0x6}, @NBD_ATTR_SERVER_FLAGS={0xc, 0x5, 0x21}, @NBD_ATTR_TIMEOUT={0xc, 0x4, 0x8001}]}, 0x50}, 0x1, 0x0, 0x0, 0x440c0}, 0x0) 10:10:29 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000040)={0x2, &(0x7f0000000000)=[{0xb1}, {}]}) 10:10:29 executing program 1: syz_mount_image$ext4(&(0x7f0000000480)='ext3\x00', &(0x7f00000004c0)='./file0\x00', 0x0, 0x0, 0x0, 0x20100000, &(0x7f00000007c0)={[], [{@fscontext={'fscontext', 0x3d, 'sysadm_u'}}, {@defcontext={'defcontext', 0x3d, 'staff_u'}}]}) 10:10:29 executing program 1: syz_mount_image$ext4(&(0x7f0000000480)='ext3\x00', &(0x7f00000004c0)='./file0\x00', 0x0, 0x0, 0x0, 0x22000000, &(0x7f00000007c0)={[], [{@fscontext={'fscontext', 0x3d, 'sysadm_u'}}, {@defcontext={'defcontext', 0x3d, 'staff_u'}}]}) [ 1850.962655][T19118] FAULT_INJECTION: forcing a failure. [ 1850.962655][T19118] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 1850.975812][T19118] CPU: 0 PID: 19118 Comm: syz-executor.3 Not tainted 5.15.0-rc3-syzkaller #0 [ 1850.984604][T19118] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1850.994744][T19118] Call Trace: [ 1850.998082][T19118] dump_stack_lvl+0xd6/0x122 [ 1851.002728][T19118] dump_stack+0x11/0x1b [ 1851.006970][T19118] should_fail+0x23c/0x250 10:10:30 executing program 4: prctl$PR_SET_SECCOMP(0x27, 0x2, &(0x7f0000000040)={0x2, &(0x7f0000000000)=[{0x25}, {}]}) 10:10:30 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000040)={0x2, &(0x7f0000000000)=[{0x15}, {}]}) 10:10:30 executing program 5: clock_nanosleep(0x54fb6926d29f01ef, 0x0, &(0x7f0000000080)={0x0, 0x989680}, 0x0) ioctl$PTP_PEROUT_REQUEST2(0xffffffffffffffff, 0x40383d0c, &(0x7f0000000140)={{0x8, 0x6}, {0x2, 0x5}, 0x1}) clock_gettime(0x4, &(0x7f0000000000)) r0 = fork() sched_rr_get_interval(r0, &(0x7f0000000100)) sched_rr_get_interval(r0, &(0x7f0000000280)) ioprio_get$pid(0x3, r0) openat$ptp0(0xffffffffffffff9c, &(0x7f0000000240), 0x80180, 0x0) sched_rr_get_interval(r0, &(0x7f0000000040)) r1 = openat$vcsu(0xffffffffffffff9c, &(0x7f0000000000), 0x5200, 0x0) fchmodat(r1, &(0x7f0000000040)='./file0\x00', 0x1b8) openat$incfs(r1, &(0x7f0000000180)='.pending_reads\x00', 0x581200, 0x123) accept4$packet(r1, &(0x7f0000000200)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f00000001c0)=0x45, 0x100000) getdents64(r1, &(0x7f00000000c0)=""/128, 0x80) [ 1851.011389][T19118] should_fail_usercopy+0x16/0x20 [ 1851.016499][T19118] _copy_from_user+0x1c/0xd0 [ 1851.016578][T19118] __se_sys_mount+0x119/0x2f0 [ 1851.016599][T19118] __x64_sys_mount+0x63/0x70 10:10:30 executing program 1: syz_mount_image$ext4(&(0x7f0000000480)='ext3\x00', &(0x7f00000004c0)='./file0\x00', 0x0, 0x0, 0x0, 0x8cffffff, &(0x7f00000007c0)={[], [{@fscontext={'fscontext', 0x3d, 'sysadm_u'}}, {@defcontext={'defcontext', 0x3d, 'staff_u'}}]}) 10:10:30 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000040)={0x2, &(0x7f0000000000)=[{0x15, 0x2}, {}]}) [ 1851.016619][T19118] do_syscall_64+0x44/0xa0 [ 1851.016640][T19118] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 1851.016742][T19118] RIP: 0033:0x7f51e7936dfa 10:10:30 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext3\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000480)=ANY=[@ANYBLOB='lazytime,test_dummy_encryption,max_dir_size_kb=0x000000000200,grpjquota=,min_batch_time=0x00000000000003ff,rootcontext\a']) (fail_nth: 17) 10:10:30 executing program 4: prctl$PR_SET_SECCOMP(0x29, 0x2, &(0x7f0000000040)={0x2, &(0x7f0000000000)=[{0x25}, {}]}) 10:10:30 executing program 1: syz_mount_image$ext4(&(0x7f0000000480)='ext3\x00', &(0x7f00000004c0)='./file0\x00', 0x0, 0x0, 0x0, 0xc0ed0000, &(0x7f00000007c0)={[], [{@fscontext={'fscontext', 0x3d, 'sysadm_u'}}, {@defcontext={'defcontext', 0x3d, 'staff_u'}}]}) [ 1851.016754][T19118] Code: 48 c7 c2 bc ff ff ff f7 d8 64 89 02 b8 ff ff ff ff eb d2 e8 b8 04 00 00 0f 1f 84 00 00 00 00 00 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1851.016769][T19118] RSP: 002b:00007f51e56acfa8 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 1851.016786][T19118] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 00007f51e7936dfa [ 1851.016799][T19118] RDX: 0000000020000000 RSI: 0000000020000040 RDI: 0000000000000000 [ 1851.016811][T19118] RBP: 00007f51e56ad040 R08: 00007f51e56ad040 R09: 0000000020000000 [ 1851.016890][T19118] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000020000000 [ 1851.016903][T19118] R13: 0000000020000040 R14: 00007f51e56ad000 R15: 0000000020000480 [ 1851.249899][T19169] FAULT_INJECTION: forcing a failure. [ 1851.249899][T19169] name failslab, interval 1, probability 0, space 0, times 0 [ 1851.249924][T19169] CPU: 1 PID: 19169 Comm: syz-executor.3 Not tainted 5.15.0-rc3-syzkaller #0 [ 1851.249946][T19169] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1851.249956][T19169] Call Trace: [ 1851.249963][T19169] dump_stack_lvl+0xd6/0x122 [ 1851.249988][T19169] dump_stack+0x11/0x1b [ 1851.250024][T19169] should_fail+0x23c/0x250 [ 1851.250089][T19169] ? getname_flags+0x84/0x3f0 [ 1851.250112][T19169] __should_failslab+0x81/0x90 [ 1851.250132][T19169] should_failslab+0x5/0x20 [ 1851.250154][T19169] kmem_cache_alloc+0x4f/0x300 [ 1851.250172][T19169] ? should_fail+0xd6/0x250 [ 1851.250190][T19169] getname_flags+0x84/0x3f0 [ 1851.250289][T19169] ? should_fail+0xd6/0x250 [ 1851.250307][T19169] user_path_at_empty+0x28/0x110 [ 1851.250332][T19169] __se_sys_mount+0x217/0x2f0 [ 1851.250354][T19169] __x64_sys_mount+0x63/0x70 [ 1851.250435][T19169] do_syscall_64+0x44/0xa0 [ 1851.250460][T19169] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 1851.250487][T19169] RIP: 0033:0x7f51e7936dfa [ 1851.250502][T19169] Code: 48 c7 c2 bc ff ff ff f7 d8 64 89 02 b8 ff ff ff ff eb d2 e8 b8 04 00 00 0f 1f 84 00 00 00 00 00 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1851.250518][T19169] RSP: 002b:00007f51e56acfa8 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 1851.250537][T19169] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 00007f51e7936dfa [ 1851.250549][T19169] RDX: 0000000020000000 RSI: 0000000020000040 RDI: 0000000000000000 [ 1851.250561][T19169] RBP: 00007f51e56ad040 R08: 00007f51e56ad040 R09: 0000000020000000 [ 1851.250596][T19169] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000020000000 10:10:30 executing program 2: r0 = syz_mount_image$ext4(0x0, &(0x7f0000000440)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) faccessat(r0, &(0x7f0000000040)='./file0\x00', 0x19a) openat$dir(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0xb0000, 0x0) 10:10:30 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000040)={0x2, &(0x7f0000000000)=[{0x15, 0x3}, {}]}) 10:10:30 executing program 1: syz_mount_image$ext4(&(0x7f0000000480)='ext3\x00', &(0x7f00000004c0)='./file0\x00', 0x0, 0x0, 0x0, 0xf6ffffff, &(0x7f00000007c0)={[], [{@fscontext={'fscontext', 0x3d, 'sysadm_u'}}, {@defcontext={'defcontext', 0x3d, 'staff_u'}}]}) 10:10:30 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext3\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000480)=ANY=[@ANYBLOB='lazytime,test_dummy_encryption,max_dir_size_kb=0x000000000200,grpjquota=,min_batch_time=0x00000000000003ff,rootcontext\a']) (fail_nth: 18) 10:10:30 executing program 4: prctl$PR_SET_SECCOMP(0x2a, 0x2, &(0x7f0000000040)={0x2, &(0x7f0000000000)=[{0x25}, {}]}) 10:10:30 executing program 5: modify_ldt$read(0x0, &(0x7f0000000000)=""/6, 0x6) clock_nanosleep(0x3, 0x0, &(0x7f0000000040)={0x0, 0x989680}, 0x0) [ 1851.250608][T19169] R13: 0000000020000040 R14: 00007f51e56ad000 R15: 0000000020000480 [ 1851.565616][T19201] FAULT_INJECTION: forcing a failure. [ 1851.565616][T19201] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 1851.578964][T19201] CPU: 1 PID: 19201 Comm: syz-executor.3 Not tainted 5.15.0-rc3-syzkaller #0 [ 1851.587724][T19201] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1851.597935][T19201] Call Trace: [ 1851.601452][T19201] dump_stack_lvl+0xd6/0x122 [ 1851.606046][T19201] dump_stack+0x11/0x1b [ 1851.610276][T19201] should_fail+0x23c/0x250 10:10:30 executing program 1: syz_mount_image$ext4(&(0x7f0000000480)='ext3\x00', &(0x7f00000004c0)='./file0\x00', 0x0, 0x0, 0x0, 0xfeffffff, &(0x7f00000007c0)={[], [{@fscontext={'fscontext', 0x3d, 'sysadm_u'}}, {@defcontext={'defcontext', 0x3d, 'staff_u'}}]}) 10:10:30 executing program 2: syz_mount_image$ext4(0x0, &(0x7f0000000440)='./file0\x00', 0x0, 0x0, 0x0, 0x861000, 0x0) openat$dir(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0xb0000, 0x0) [ 1851.614790][T19201] should_fail_usercopy+0x16/0x20 [ 1851.619809][T19201] strncpy_from_user+0x21/0x250 [ 1851.624711][T19201] getname_flags+0xb8/0x3f0 [ 1851.629473][T19201] ? should_fail+0xd6/0x250 [ 1851.633980][T19201] user_path_at_empty+0x28/0x110 [ 1851.639132][T19201] __se_sys_mount+0x217/0x2f0 [ 1851.643867][T19201] __x64_sys_mount+0x63/0x70 [ 1851.648659][T19201] do_syscall_64+0x44/0xa0 [ 1851.653177][T19201] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 1851.659109][T19201] RIP: 0033:0x7f51e7936dfa 10:10:30 executing program 5: r0 = openat$vcsu(0xffffffffffffff9c, &(0x7f0000000340), 0x301, 0x0) r1 = openat$vcsu(0xffffffffffffff9c, &(0x7f0000000040), 0x200, 0x0) ioctl$PTP_ENABLE_PPS(r1, 0x40043d04, 0x1) faccessat(r0, &(0x7f0000000000)='./file0\x00', 0x18) clock_nanosleep(0x4, 0x0, &(0x7f0000000080)={0x0, 0x989680}, 0x0) [ 1851.663709][T19201] Code: 48 c7 c2 bc ff ff ff f7 d8 64 89 02 b8 ff ff ff ff eb d2 e8 b8 04 00 00 0f 1f 84 00 00 00 00 00 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1851.683714][T19201] RSP: 002b:00007f51e56acfa8 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 1851.692163][T19201] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 00007f51e7936dfa [ 1851.700513][T19201] RDX: 0000000020000000 RSI: 0000000020000040 RDI: 0000000000000000 [ 1851.708572][T19201] RBP: 00007f51e56ad040 R08: 00007f51e56ad040 R09: 0000000020000000 10:10:30 executing program 4: prctl$PR_SET_SECCOMP(0x2b, 0x2, &(0x7f0000000040)={0x2, &(0x7f0000000000)=[{0x25}, {}]}) 10:10:30 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000040)={0x2, &(0x7f0000000000)=[{0x15, 0x5}, {}]}) 10:10:30 executing program 1: syz_mount_image$ext4(&(0x7f0000000480)='ext3\x00', &(0x7f00000004c0)='./file0\x00', 0x0, 0x0, 0x0, 0xffffff8c, &(0x7f00000007c0)={[], [{@fscontext={'fscontext', 0x3d, 'sysadm_u'}}, {@defcontext={'defcontext', 0x3d, 'staff_u'}}]}) 10:10:30 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000040)={0x2, &(0x7f0000000000)=[{0x15, 0x6}, {}]}) [ 1851.716546][T19201] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000020000000 [ 1851.724522][T19201] R13: 0000000020000040 R14: 00007f51e56ad000 R15: 0000000020000480 10:10:30 executing program 2: syz_mount_image$ext4(0x0, &(0x7f0000000440)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) openat$dir(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0, 0x0) 10:10:30 executing program 4: prctl$PR_SET_SECCOMP(0x2c, 0x2, &(0x7f0000000040)={0x2, &(0x7f0000000000)=[{0x25}, {}]}) 10:10:30 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext3\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000480)=ANY=[@ANYBLOB='lazytime,test_dummy_encryption,max_dir_size_kb=0x000000000200,grpjquota=,min_batch_time=0x00000000000003ff,rootcontext\a']) (fail_nth: 19) 10:10:30 executing program 5: ioctl$sock_SIOCGIFINDEX_802154(0xffffffffffffffff, 0x8933, &(0x7f0000000040)={'wpan0\x00'}) clock_gettime(0x0, &(0x7f0000000000)) clock_gettime(0x1, &(0x7f00000000c0)={0x0, 0x0}) clock_nanosleep(0x3, 0x0, &(0x7f0000000080)={r0, r1+10000000}, 0x0) 10:10:30 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000040)={0x2, &(0x7f0000000000)=[{0x15, 0x7}, {}]}) 10:10:30 executing program 2: getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000080)={{{@in6=@ipv4={""/10, ""/2, @empty}, @in=@initdev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@local}, 0x0, @in=@initdev}}, &(0x7f0000000180)=0xe8) sendmsg$TEAM_CMD_OPTIONS_SET(0xffffffffffffffff, &(0x7f00000004c0)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x80}, 0xc, &(0x7f0000000480)={&(0x7f00000001c0)=ANY=[@ANYBLOB="6c020000", @ANYRES16=0x0, @ANYBLOB="00032abd7000fcdbdf250100000008000100", @ANYRES32=0x0, @ANYBLOB="7c00028038000100240001006e6f746966795f70656572735f696e74657276616c00000000000000000000000500030003000000080004000000000040000100240001006d6f64650000000000000000000000000000000000000000000000000000000005000300050000000f000400726f756e64726f62696e000008000100", @ANYRES32=0x0, @ANYBLOB="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", @ANYRES32=r0, @ANYBLOB], 0x26c}, 0x1, 0x0, 0x0, 0x10}, 0x4001) syz_mount_image$ext4(0x0, &(0x7f0000000440)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) openat$dir(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0xb0000, 0x0) [ 1851.869312][T19242] FAULT_INJECTION: forcing a failure. [ 1851.869312][T19242] name failslab, interval 1, probability 0, space 0, times 0 [ 1851.881979][T19242] CPU: 1 PID: 19242 Comm: syz-executor.3 Not tainted 5.15.0-rc3-syzkaller #0 [ 1851.891073][T19242] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1851.901414][T19242] Call Trace: [ 1851.904689][T19242] dump_stack_lvl+0xd6/0x122 [ 1851.909466][T19242] dump_stack+0x11/0x1b [ 1851.913627][T19242] should_fail+0x23c/0x250 [ 1851.918047][T19242] __should_failslab+0x81/0x90 [ 1851.922921][T19242] ? alloc_fs_context+0x46/0x500 [ 1851.928021][T19242] should_failslab+0x5/0x20 [ 1851.932537][T19242] kmem_cache_alloc_trace+0x52/0x320 [ 1851.938082][T19242] alloc_fs_context+0x46/0x500 [ 1851.943508][T19242] ? strncmp+0x34/0x70 [ 1851.947636][T19242] fs_context_for_mount+0x1d/0x20 [ 1851.952845][T19242] path_mount+0xe0d/0x1d20 [ 1851.957347][T19242] __se_sys_mount+0x24b/0x2f0 [ 1851.962206][T19242] __x64_sys_mount+0x63/0x70 10:10:31 executing program 2: r0 = syz_mount_image$ext4(0x0, &(0x7f0000000440)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) openat$dir(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0xb0000, 0x0) r1 = openat$incfs(r0, &(0x7f00000001c0)='.log\x00', 0x200000, 0x180) ioctl$FS_IOC_GET_ENCRYPTION_KEY_STATUS(r1, 0xc080661a, &(0x7f0000000200)={@id={0x2, 0x0, @auto="3d4dd9513475593057bcc7f76adaeafc"}}) sendmsg$TIPC_CMD_SET_LINK_PRI(r1, &(0x7f0000000340)={&(0x7f0000000280), 0xc, &(0x7f0000000300)={&(0x7f00000002c0)={0x30, 0x0, 0x200, 0x70bd25, 0x25dfdbfd, {{}, {}, {0x14, 0x18, {0x1, @bearer=@udp='udp:syz0\x00'}}}, [""]}, 0x30}, 0x1, 0x0, 0x0, 0x10}, 0x0) pselect6(0x40, &(0x7f0000000040)={0xffff000000000, 0x61, 0x1, 0x37c, 0x3, 0x80000001, 0x9, 0x8c}, &(0x7f0000000080)={0xbb, 0x8, 0xde5, 0x3, 0x5, 0x1ff, 0x0, 0x1}, &(0x7f00000000c0)={0x41d, 0x6, 0x14000000000, 0x2, 0x0, 0x1, 0x8, 0x1}, &(0x7f0000000100), &(0x7f0000000180)={&(0x7f0000000140)={[0x10000]}, 0x8}) [ 1851.966887][T19242] do_syscall_64+0x44/0xa0 [ 1851.971636][T19242] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 1851.978150][T19242] RIP: 0033:0x7f51e7936dfa [ 1851.982563][T19242] Code: 48 c7 c2 bc ff ff ff f7 d8 64 89 02 b8 ff ff ff ff eb d2 e8 b8 04 00 00 0f 1f 84 00 00 00 00 00 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1852.003014][T19242] RSP: 002b:00007f51e56acfa8 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 1852.011556][T19242] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 00007f51e7936dfa 10:10:31 executing program 1: syz_mount_image$ext4(&(0x7f0000000480)='ext3\x00', &(0x7f00000004c0)='./file0\x00', 0x0, 0x0, 0x0, 0xfffffff6, &(0x7f00000007c0)={[], [{@fscontext={'fscontext', 0x3d, 'sysadm_u'}}, {@defcontext={'defcontext', 0x3d, 'staff_u'}}]}) 10:10:31 executing program 4: prctl$PR_SET_SECCOMP(0x2f, 0x2, &(0x7f0000000040)={0x2, &(0x7f0000000000)=[{0x25}, {}]}) 10:10:31 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000040)={0x2, &(0x7f0000000000)=[{0x15, 0x9}, {}]}) [ 1852.019635][T19242] RDX: 0000000020000000 RSI: 0000000020000040 RDI: 0000000000000000 [ 1852.027697][T19242] RBP: 00007f51e56ad040 R08: 00007f51e56ad040 R09: 0000000020000000 [ 1852.035785][T19242] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000020000000 [ 1852.043840][T19242] R13: 0000000020000040 R14: 00007f51e56ad000 R15: 0000000020000480 10:10:31 executing program 5: clock_nanosleep(0x54fb6926d29f01ef, 0x0, &(0x7f0000000080)={0x0, 0x989680}, 0x0) clock_nanosleep(0x3, 0x0, &(0x7f0000000000), 0x0) 10:10:31 executing program 1: syz_mount_image$ext4(&(0x7f0000000480)='ext3\x00', &(0x7f00000004c0)='./file0\x00', 0x0, 0x0, 0x0, 0xfffffffe, &(0x7f00000007c0)={[], [{@fscontext={'fscontext', 0x3d, 'sysadm_u'}}, {@defcontext={'defcontext', 0x3d, 'staff_u'}}]}) 10:10:31 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext3\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000480)=ANY=[@ANYBLOB='lazytime,test_dummy_encryption,max_dir_size_kb=0x000000000200,grpjquota=,min_batch_time=0x00000000000003ff,rootcontext\a']) (fail_nth: 20) 10:10:31 executing program 4: prctl$PR_SET_SECCOMP(0x34, 0x2, &(0x7f0000000040)={0x2, &(0x7f0000000000)=[{0x25}, {}]}) 10:10:31 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000040)={0x2, &(0x7f0000000000)=[{0x15, 0x15}, {}]}) 10:10:31 executing program 5: clock_nanosleep(0x54fb6926d29f01ef, 0x0, &(0x7f0000000080)={0x0, 0x989680}, 0x0) r0 = getpid() sched_rr_get_interval(r0, &(0x7f0000000000)) 10:10:31 executing program 1: syz_mount_image$ext4(&(0x7f0000000480)='ext3\x00', &(0x7f00000004c0)='./file0\x00', 0x0, 0x0, 0x0, 0x8000000000, &(0x7f00000007c0)={[], [{@fscontext={'fscontext', 0x3d, 'sysadm_u'}}, {@defcontext={'defcontext', 0x3d, 'staff_u'}}]}) [ 1852.204722][T19283] FAULT_INJECTION: forcing a failure. [ 1852.204722][T19283] name failslab, interval 1, probability 0, space 0, times 0 [ 1852.217480][T19283] CPU: 1 PID: 19283 Comm: syz-executor.3 Not tainted 5.15.0-rc3-syzkaller #0 [ 1852.226345][T19283] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1852.236395][T19283] Call Trace: [ 1852.239671][T19283] dump_stack_lvl+0xd6/0x122 [ 1852.244299][T19283] dump_stack+0x11/0x1b [ 1852.248466][T19283] should_fail+0x23c/0x250 [ 1852.252889][T19283] __should_failslab+0x81/0x90 [ 1852.257731][T19283] ? legacy_init_fs_context+0x2d/0x70 [ 1852.263108][T19283] should_failslab+0x5/0x20 [ 1852.267624][T19283] kmem_cache_alloc_trace+0x52/0x320 [ 1852.272908][T19283] ? alloc_fs_context+0x46/0x500 [ 1852.277869][T19283] legacy_init_fs_context+0x2d/0x70 [ 1852.283065][T19283] alloc_fs_context+0x419/0x500 [ 1852.287917][T19283] fs_context_for_mount+0x1d/0x20 [ 1852.292938][T19283] path_mount+0xe0d/0x1d20 [ 1852.297360][T19283] __se_sys_mount+0x24b/0x2f0 [ 1852.302043][T19283] __x64_sys_mount+0x63/0x70 [ 1852.306713][T19283] do_syscall_64+0x44/0xa0 [ 1852.311163][T19283] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 1852.317060][T19283] RIP: 0033:0x7f51e7936dfa [ 1852.321467][T19283] Code: 48 c7 c2 bc ff ff ff f7 d8 64 89 02 b8 ff ff ff ff eb d2 e8 b8 04 00 00 0f 1f 84 00 00 00 00 00 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1852.341176][T19283] RSP: 002b:00007f51e56acfa8 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 10:10:31 executing program 2: r0 = openat$incfs(0xffffffffffffffff, &(0x7f0000001b00)='.log\x00', 0x101000, 0xd) faccessat(r0, &(0x7f0000001b40)='./file0\x00', 0x10) syz_mount_image$ext4(0x0, &(0x7f0000000440)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) sendmsg$NL802154_CMD_SET_MAX_CSMA_BACKOFFS(0xffffffffffffffff, &(0x7f0000001ac0)={&(0x7f0000001a00)={0x10, 0x0, 0x0, 0x200}, 0xc, &(0x7f0000001a80)={&(0x7f0000001a40)=ANY=[@ANYBLOB=' \x00\x00\x00', @ANYRES16=0x0, @ANYBLOB="00082abd7000fcdbdb25110000000c0006000200000002000000"], 0x20}, 0x1, 0x0, 0x0, 0x4000000}, 0x40) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000017c0)={{{@in=@loopback, @in6=@ipv4={""/10, ""/2, @loopback}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@initdev}, 0x0, @in=@dev}}, &(0x7f0000000400)=0xe8) syz_mount_image$ext4(&(0x7f0000000040)='ext4\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x8, &(0x7f0000001700)=[{&(0x7f00000000c0)="a50c8eed01218583e60e2ababf3981a55778cb08c4eb5f418ca71b6853dbf6615879997114e5fb7ae8822243611893bb224f8ef47c21dc258ef343ae1a45a703c19c617ff840cb23ce9b4ad9fd2f9b0c61eb91d3166f60959b6342b892eab3906d683050397b414f2c73cc7398759faa1ee151fbe40d90981ad1454923c00f3b71c8eece5357509e4d845dcd5c9e517cac4ab2ae34f3292220f7a736e66d63d674a700dffc9ff8bbb4ea587a369c7d95ade5976aed8c67c3531a7c9966afbbaf04bcf2d4ab95c9fec8bddf136895b94426f1aaff4e62", 0xd6, 0x252e747c}, {&(0x7f00000001c0)="8ca1ba5223028becbb0e2a3e494b97c4b91ded47ce7ab2a61cd171da4b1545a4dfa875f65bf1767bcc5d80504ef857ad6f01440e609d31270a835d15d6333256ff70d83bc92750ccb90ec378cd3afbd904250dbe87b2243f749d03665f8f7c971abcd2145f91ca6c7323e89743855d98b47d9a5e4a1ea5df4ed0a0ddab1642ac4e9895ca9ed2cd20181220485e8ea55cb5af2d48de25c60233afb8915e196d9cbe2e545230c1cdc18078b9303171d66dd2cfab46e436ad", 0xb7, 0x3ff}, {&(0x7f0000000280)="4d5331aba9faee577ea83004ad087c7dd7187674cbb4d04de8c8e8092feefedd078db006d9ee2137d25f0de20b754063e4b1c07dbbf02f00e83d86f764f3e808176ac8bb3cc362fc3cdae0f073fc55ae3b6e1069fecc5a530ff81d180712eb550bdea0cb10393788a0f0ef65feb36ad80f8cdeff49d25bfb7e3aabf97cc6ed1d92d735e4fbba86316f8bc552e172ffd01bbd5a1cc8b8a8cf08849ca009a7fb0eecb64fd7724eb27124193d481ab3c6fdefebcf71c9197de5b27d804c401a2a6a26a17ebbe4cd04b4090890da5f516eba77565d81", 0xd4, 0x9}, {&(0x7f0000000380)="fc3fbfe61ff626c31344580d48247610d0241a3bbd2bb3aa752f5650c0052f93fed8343273ce52c7eb1207044876a9a5233e85bd0a66216aa10b3e96519a373a1bb73e76e5ae2852f2b61ae043195b605ea9d90ce02f0272bd967108f27d1c83cef146e609", 0x65, 0x1ff}, {&(0x7f0000000480)="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", 0x1000, 0x1}, {&(0x7f0000001480)="28b130069d7aebd3f5ec26258c84bf36fb670312aebf71d0193423d275d12ffe8600eb60b9aa71d282db8bf7625336ed26ee1c37ecf841e7da92ac7679c1398500f8bf87d713e05bd5b012ec755676ecef8f30bd5e93718f0fc2eb541e658d64897bd5fd5b7814fea817d43e59955da6f3aeef8f639210e513e7faf7cefdf96887f435ba988e67eeaf19fb0310275fc147175d62", 0x94, 0x30e}, {&(0x7f0000001540)="04dbe7f577fd9d1ec8e53ef063ff72f95f75ce42cd6521913f754659d34153f416aa560a92cd80b88a86ad625f85d403e0d802c90de18853645119fbcd49da4222ae1574c4939001ef47461aeeb998253f6a5c37cba34042c681c5b5e2fab2876efb09b7eb7aa40d3a40eac2292f6b0efb6dd3b79465c8cc6d735ac28739322ff47e870a236e87fde54e55d293a8f46e1a6f923de4e48fe01031a773caeeb50f466d484d5c2e31b49dd0e7496e98e6c4d08e76f466d4d8c724f05a2fe1decd53d3", 0xc1, 0xfffffffffffffff8}, {&(0x7f0000001640)="6bc1129f084718d2742e012a4194650fe75dede2ed249c4451826498dbbed9026b878e14fd23536d3d0de1c4751a3e496fa318a5ce2a033421fde9928844b03e8b15df77006a983b6fa4dd1cc59bbe96405a20f9e11a5186a4365ec4924ec508e1f7af50efcc10fe75dfb32adc1550d831cdd0e4103628a0628b6ac58ddf3c66fa5b2462d85e36c8aeb14eccd8250688298d06", 0x93, 0x1}], 0x80008, &(0x7f00000018c0)=ANY=[@ANYBLOB='journal_path=./file0,grpquota,barrier,acl,bsdgroups,noblock_validity,inode_readahead_blks=0x0000000000400000,smackfsroot=}^$}+^-:,euid>', @ANYRESDEC, @ANYBLOB="2c736d61636b66737472616e736d7574653d215d2c7375626a5f757365723d23242c736d61636b66737472616e736d7574653d2cc42c9a2a2f2e3a28232c7569643d", @ANYRESDEC=r1, @ANYBLOB=',euid<', @ANYRESDEC=0xee00, @ANYBLOB="2c73fb6d61636b66736465663d2c61707072616973655f747970653d696d6186cc2a0e"]) prctl$PR_CAP_AMBIENT(0x2f, 0x4, 0x0) openat$dir(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0xb0000, 0x0) 10:10:31 executing program 5: clock_gettime(0x0, &(0x7f0000000000)) clock_gettime(0x0, &(0x7f0000000040)) clock_nanosleep(0x2, 0x0, &(0x7f00000000c0)={0x0, 0x3938700}, &(0x7f0000000100)) clock_nanosleep(0x54fb6926d29f01ef, 0x0, &(0x7f0000000080)={0x77359400}, 0x0) 10:10:31 executing program 1: syz_mount_image$ext4(&(0x7f0000000480)='ext3\x00', &(0x7f00000004c0)='./file0\x00', 0x0, 0x0, 0x0, 0xedc000000000, &(0x7f00000007c0)={[], [{@fscontext={'fscontext', 0x3d, 'sysadm_u'}}, {@defcontext={'defcontext', 0x3d, 'staff_u'}}]}) 10:10:31 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000040)={0x2, &(0x7f0000000000)=[{0x15, 0x16}, {}]}) [ 1852.349588][T19283] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 00007f51e7936dfa [ 1852.357551][T19283] RDX: 0000000020000000 RSI: 0000000020000040 RDI: 0000000000000000 [ 1852.365577][T19283] RBP: 00007f51e56ad040 R08: 00007f51e56ad040 R09: 0000000020000000 [ 1852.373632][T19283] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000020000000 [ 1852.381606][T19283] R13: 0000000020000040 R14: 00007f51e56ad000 R15: 0000000020000480 10:10:31 executing program 4: prctl$PR_SET_SECCOMP(0x35, 0x2, &(0x7f0000000040)={0x2, &(0x7f0000000000)=[{0x25}, {}]}) 10:10:31 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext3\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000480)=ANY=[@ANYBLOB='lazytime,test_dummy_encryption,max_dir_size_kb=0x000000000200,grpjquota=,min_batch_time=0x00000000000003ff,rootcontext\a']) (fail_nth: 21) 10:10:31 executing program 1: syz_mount_image$ext4(&(0x7f0000000480)='ext3\x00', &(0x7f00000004c0)='./file0\x00', 0x0, 0x0, 0x0, 0x100000000000000, &(0x7f00000007c0)={[], [{@fscontext={'fscontext', 0x3d, 'sysadm_u'}}, {@defcontext={'defcontext', 0x3d, 'staff_u'}}]}) [ 1852.431780][T19306] loop2: detected capacity change from 0 to 264192 [ 1852.489933][T19306] loop2: detected capacity change from 0 to 264192 [ 1852.517016][T19326] FAULT_INJECTION: forcing a failure. [ 1852.517016][T19326] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 1852.530114][T19326] CPU: 0 PID: 19326 Comm: syz-executor.3 Not tainted 5.15.0-rc3-syzkaller #0 [ 1852.538962][T19326] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1852.549119][T19326] Call Trace: [ 1852.552395][T19326] dump_stack_lvl+0xd6/0x122 [ 1852.556994][T19326] dump_stack+0x11/0x1b [ 1852.561274][T19326] should_fail+0x23c/0x250 [ 1852.565687][T19326] should_fail_usercopy+0x16/0x20 [ 1852.571120][T19326] _copy_to_user+0x1c/0x90 [ 1852.575544][T19326] simple_read_from_buffer+0xab/0x120 [ 1852.581047][T19326] proc_fail_nth_read+0x10d/0x150 [ 1852.586112][T19326] ? proc_fault_inject_write+0x230/0x230 [ 1852.591758][T19326] vfs_read+0x1e6/0x750 [ 1852.595960][T19326] ? __fget_light+0x21b/0x260 [ 1852.600639][T19326] ? __cond_resched+0x11/0x40 [ 1852.605326][T19326] ksys_read+0xd9/0x190 [ 1852.609552][T19326] __x64_sys_read+0x3e/0x50 [ 1852.614230][T19326] do_syscall_64+0x44/0xa0 [ 1852.618693][T19326] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 1852.625019][T19326] RIP: 0033:0x7f51e78e848c [ 1852.629536][T19326] Code: ec 28 48 89 54 24 18 48 89 74 24 10 89 7c 24 08 e8 f9 fc ff ff 48 8b 54 24 18 48 8b 74 24 10 41 89 c0 8b 7c 24 08 31 c0 0f 05 <48> 3d 00 f0 ff ff 77 34 44 89 c7 48 89 44 24 08 e8 2f fd ff ff 48 [ 1852.649421][T19326] RSP: 002b:00007f51e56ad170 EFLAGS: 00000246 ORIG_RAX: 0000000000000000 [ 1852.657836][T19326] RAX: ffffffffffffffda RBX: ffffffffffffffff RCX: 00007f51e78e848c [ 1852.665812][T19326] RDX: 000000000000000f RSI: 00007f51e56ad1e0 RDI: 0000000000000003 [ 1852.673862][T19326] RBP: 00007f51e56ad1d0 R08: 0000000000000000 R09: 0000000020000000 [ 1852.681828][T19326] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 10:10:31 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000040)={0x2, &(0x7f0000000000)=[{0x15, 0x1d}, {}]}) 10:10:31 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000040)={0x2, &(0x7f0000000000)=[{0x15, 0x25}, {}]}) 10:10:31 executing program 4: prctl$PR_SET_SECCOMP(0x36, 0x2, &(0x7f0000000040)={0x2, &(0x7f0000000000)=[{0x25}, {}]}) 10:10:31 executing program 1: syz_mount_image$ext4(&(0x7f0000000480)='ext3\x00', &(0x7f00000004c0)='./file0\x00', 0x0, 0x0, 0x0, 0x200000000000000, &(0x7f00000007c0)={[], [{@fscontext={'fscontext', 0x3d, 'sysadm_u'}}, {@defcontext={'defcontext', 0x3d, 'staff_u'}}]}) 10:10:31 executing program 4: prctl$PR_SET_SECCOMP(0x37, 0x2, &(0x7f0000000040)={0x2, &(0x7f0000000000)=[{0x25}, {}]}) 10:10:31 executing program 2: r0 = syz_mount_image$ext4(0x0, &(0x7f0000000440)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) faccessat(r0, &(0x7f0000000040)='./file0\x00', 0x101) openat$dir(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0xb0000, 0x0) [ 1852.689804][T19326] R13: 00007ffd0d1caa8f R14: 00007f51e56ad300 R15: 0000000000022000 10:10:32 executing program 5: clock_nanosleep(0x54fb6926d29f01ef, 0x0, &(0x7f0000000080)={0x0, 0x989680}, 0x0) sched_rr_get_interval(0x0, &(0x7f0000000000)) 10:10:32 executing program 1: syz_mount_image$ext4(&(0x7f0000000480)='ext3\x00', &(0x7f00000004c0)='./file0\x00', 0x0, 0x0, 0x0, 0x700000000000000, &(0x7f00000007c0)={[], [{@fscontext={'fscontext', 0x3d, 'sysadm_u'}}, {@defcontext={'defcontext', 0x3d, 'staff_u'}}]}) 10:10:32 executing program 4: prctl$PR_SET_SECCOMP(0x38, 0x2, &(0x7f0000000040)={0x2, &(0x7f0000000000)=[{0x25}, {}]}) 10:10:32 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000040)={0x2, &(0x7f0000000000)=[{0x15, 0x28}, {}]}) 10:10:32 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext3\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000480)=ANY=[@ANYBLOB='lazytime,test_dummy_encryption,max_dir_size_kb=0x000000000200,grpjquota=,min_batch_time=0x00000000000003ff,rootcontext\a']) 10:10:32 executing program 2: ioctl$PTP_SYS_OFFSET(0xffffffffffffffff, 0x43403d05, &(0x7f0000000040)={0x1a}) sched_getaffinity(0x0, 0x8, &(0x7f0000000380)) openat$dir(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0xb0000, 0x0) 10:10:32 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000040)={0x2, &(0x7f0000000000)=[{0x15, 0x2d}, {}]}) 10:10:32 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext3\x00', &(0x7f0000000040)='./file0\x00', 0x2, 0x0, 0x0, 0x0, &(0x7f0000000480)=ANY=[@ANYBLOB='lazytime,test_dummy_encryption,max_dir_size_kb=0x000000000200,grpjquota=,min_batch_time=0x00000000000003ff,rootcontext\a']) 10:10:32 executing program 5: clock_nanosleep(0x54fb6926d29f01ef, 0x0, &(0x7f0000000080)={0x0, 0x989680}, 0x0) clock_nanosleep(0x0, 0x1, &(0x7f0000000000)={0x77359400}, &(0x7f0000000040)) 10:10:32 executing program 1: syz_mount_image$ext4(&(0x7f0000000480)='ext3\x00', &(0x7f00000004c0)='./file0\x00', 0x0, 0x0, 0x0, 0x2010000000000000, &(0x7f00000007c0)={[], [{@fscontext={'fscontext', 0x3d, 'sysadm_u'}}, {@defcontext={'defcontext', 0x3d, 'staff_u'}}]}) 10:10:32 executing program 4: prctl$PR_SET_SECCOMP(0x39, 0x2, &(0x7f0000000040)={0x2, &(0x7f0000000000)=[{0x25}, {}]}) 10:10:32 executing program 2: ioctl$sock_ipv6_tunnel_SIOCDELPRL(0xffffffffffffffff, 0x89f6, &(0x7f00000000c0)={'ip6tnl0\x00', &(0x7f0000000040)={'ip6_vti0\x00', 0x0, 0x4, 0x7f, 0x1, 0x6, 0x1a, @rand_addr=' \x01\x00', @dev={0xfe, 0x80, '\x00', 0x3b}, 0x40, 0x7, 0x6, 0x1}}) getpeername$packet(0xffffffffffffffff, &(0x7f0000000140)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000180)=0x14) sendmsg$TEAM_CMD_PORT_LIST_GET(0xffffffffffffffff, &(0x7f0000000280)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x80}, 0xc, &(0x7f0000000240)={&(0x7f00000001c0)={0x60, 0x0, 0x2, 0x70bd27, 0x25dfdbff, {}, [{{0x8, 0x1, r1}, {0x44, 0x2, 0x0, 0x1, [{0x40, 0x1, @queue_id={{{0x24}, {0x5}, {0x8, 0x4, 0x4f4a}}, {0x8, 0x6, r0}}}]}}]}, 0x60}}, 0x40000000) syz_mount_image$ext4(0x0, &(0x7f0000000440)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$SG_GET_REQUEST_TABLE(0xffffffffffffffff, 0x2286, &(0x7f00000002c0)) openat$dir(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0xb0000, 0x40) 10:10:32 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000040)={0x2, &(0x7f0000000000)=[{0x15, 0x30}, {}]}) 10:10:32 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext3\x00', &(0x7f0000000040)='./file0\x00', 0x22, 0x0, 0x0, 0x0, &(0x7f0000000480)=ANY=[@ANYBLOB='lazytime,test_dummy_encryption,max_dir_size_kb=0x000000000200,grpjquota=,min_batch_time=0x00000000000003ff,rootcontext\a']) 10:10:32 executing program 4: prctl$PR_SET_SECCOMP(0x3a, 0x2, &(0x7f0000000040)={0x2, &(0x7f0000000000)=[{0x25}, {}]}) 10:10:32 executing program 1: syz_mount_image$ext4(&(0x7f0000000480)='ext3\x00', &(0x7f00000004c0)='./file0\x00', 0x0, 0x0, 0x0, 0x2200000000000000, &(0x7f00000007c0)={[], [{@fscontext={'fscontext', 0x3d, 'sysadm_u'}}, {@defcontext={'defcontext', 0x3d, 'staff_u'}}]}) 10:10:32 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext3\x00', &(0x7f0000000040)='./file0\x00', 0x1020, 0x0, 0x0, 0x0, &(0x7f0000000480)=ANY=[@ANYBLOB='lazytime,test_dummy_encryption,max_dir_size_kb=0x000000000200,grpjquota=,min_batch_time=0x00000000000003ff,rootcontext\a']) 10:10:32 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000040)={0x2, &(0x7f0000000000)=[{0x15, 0x34}, {}]}) 10:10:32 executing program 4: prctl$PR_SET_SECCOMP(0x3b, 0x2, &(0x7f0000000040)={0x2, &(0x7f0000000000)=[{0x25}, {}]}) 10:10:32 executing program 2: r0 = syz_mount_image$ext4(0x0, &(0x7f0000000440)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) openat$dir(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0xb0000, 0x0) r1 = syz_genetlink_get_family_id$nbd(&(0x7f0000000080), 0xffffffffffffffff) sendmsg$NBD_CMD_CONNECT(0xffffffffffffffff, &(0x7f0000000180)={&(0x7f0000000040), 0xc, &(0x7f0000000140)={&(0x7f00000000c0)={0x54, r1, 0x2, 0x70bd2c, 0x25dfdbfe, {}, [@NBD_ATTR_CLIENT_FLAGS={0xc}, @NBD_ATTR_INDEX={0x8, 0x1, 0x0}, @NBD_ATTR_BLOCK_SIZE_BYTES={0xc}, @NBD_ATTR_SIZE_BYTES={0xc, 0x2, 0x2e91}, @NBD_ATTR_INDEX={0x8, 0x1, 0x0}, @NBD_ATTR_SIZE_BYTES={0xc, 0x2, 0x1f}]}, 0x54}, 0x1, 0x0, 0x0, 0x1}, 0x40) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY_ALL_USERS(r0, 0xc0406619, &(0x7f00000001c0)={@desc={0x1, 0x0, @desc2}}) 10:10:33 executing program 5: set_robust_list(&(0x7f0000000000)={0x0, 0x81}, 0x18) 10:10:33 executing program 1: syz_mount_image$ext4(&(0x7f0000000480)='ext3\x00', &(0x7f00000004c0)='./file0\x00', 0x0, 0x0, 0x0, 0x8cffffff00000000, &(0x7f00000007c0)={[], [{@fscontext={'fscontext', 0x3d, 'sysadm_u'}}, {@defcontext={'defcontext', 0x3d, 'staff_u'}}]}) 10:10:33 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext3\x00', &(0x7f0000000040)='./file0\x00', 0x2010, 0x0, 0x0, 0x0, &(0x7f0000000480)=ANY=[@ANYBLOB='lazytime,test_dummy_encryption,max_dir_size_kb=0x000000000200,grpjquota=,min_batch_time=0x00000000000003ff,rootcontext\a']) 10:10:33 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000040)={0x2, &(0x7f0000000000)=[{0x15, 0x35}, {}]}) 10:10:33 executing program 4: prctl$PR_SET_SECCOMP(0x3c, 0x2, &(0x7f0000000040)={0x2, &(0x7f0000000000)=[{0x25}, {}]}) 10:10:33 executing program 2: syz_mount_image$ext4(0x0, &(0x7f0000000440)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) openat$dir(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0xb0000, 0x0) r0 = openat$vcsu(0xffffffffffffff9c, &(0x7f0000000000), 0x5200, 0x0) fchmodat(r0, &(0x7f0000000040)='./file0\x00', 0x1b0) openat$incfs(r0, &(0x7f00000002c0)='.log\x00', 0x581200, 0x123) accept4$packet(r0, &(0x7f0000000400)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000000440)=0x14, 0x100000) unlinkat(r0, &(0x7f0000000080)='./file0/file0\x00', 0x200) ptrace$peeksig(0x4209, 0x0, &(0x7f0000000040), &(0x7f0000000080)) 10:10:33 executing program 5: clock_nanosleep(0x54fb6926d29f01ef, 0x0, &(0x7f0000000080)={0x0, 0x989680}, 0x0) clock_nanosleep(0x7, 0x0, &(0x7f0000000000)={0x77359400}, &(0x7f0000000040)) 10:10:33 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext3\x00', &(0x7f0000000040)='./file0\x00', 0x2200, 0x0, 0x0, 0x0, &(0x7f0000000480)=ANY=[@ANYBLOB='lazytime,test_dummy_encryption,max_dir_size_kb=0x000000000200,grpjquota=,min_batch_time=0x00000000000003ff,rootcontext\a']) 10:10:33 executing program 4: prctl$PR_SET_SECCOMP(0x3d, 0x2, &(0x7f0000000040)={0x2, &(0x7f0000000000)=[{0x25}, {}]}) 10:10:33 executing program 1: syz_mount_image$ext4(&(0x7f0000000480)='ext3\x00', &(0x7f00000004c0)='./file0\x00', 0x0, 0x0, 0x0, 0xf6ffffff00000000, &(0x7f00000007c0)={[], [{@fscontext={'fscontext', 0x3d, 'sysadm_u'}}, {@defcontext={'defcontext', 0x3d, 'staff_u'}}]}) 10:10:33 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000040)={0x2, &(0x7f0000000000)=[{0x15, 0x3d}, {}]}) 10:10:33 executing program 2: syz_mount_image$ext4(0x0, &(0x7f0000000440)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) openat$dir(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0xb0000, 0x0) set_robust_list(&(0x7f00000000c0)={0x0, 0x5, &(0x7f0000000080)={&(0x7f0000000040)}}, 0x18) 10:10:33 executing program 4: prctl$PR_SET_SECCOMP(0x16, 0x3, &(0x7f0000000040)={0x2, &(0x7f0000000000)=[{0x25}, {}]}) 10:10:33 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext3\x00', &(0x7f0000000040)='./file0\x00', 0xedc0, 0x0, 0x0, 0x0, &(0x7f0000000480)=ANY=[@ANYBLOB='lazytime,test_dummy_encryption,max_dir_size_kb=0x000000000200,grpjquota=,min_batch_time=0x00000000000003ff,rootcontext\a']) 10:10:33 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000040)={0x2, &(0x7f0000000000)=[{0x15, 0x45}, {}]}) 10:10:33 executing program 1: syz_mount_image$ext4(&(0x7f0000000480)='ext3\x00', &(0x7f00000004c0)='./file0\x00', 0x0, 0x0, 0x0, 0xfeffffff00000000, &(0x7f00000007c0)={[], [{@fscontext={'fscontext', 0x3d, 'sysadm_u'}}, {@defcontext={'defcontext', 0x3d, 'staff_u'}}]}) 10:10:33 executing program 2: r0 = getpid() sched_getscheduler(r0) syz_mount_image$ext4(0x0, &(0x7f0000000440)='./file0\x00', 0x0, 0x0, 0x0, 0x400, 0x0) openat$dir(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x38402, 0x8) 10:10:33 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000040)={0x2, &(0x7f0000000000)=[{0x15, 0x4d}, {}]}) 10:10:34 executing program 5: r0 = openat$vcsu(0xffffffffffffff9c, &(0x7f0000000000), 0x5200, 0x0) fchmodat(r0, &(0x7f0000000040)='./file0\x00', 0x1b0) openat$incfs(r0, &(0x7f00000002c0)='.log\x00', 0x581200, 0x123) accept4$packet(r0, &(0x7f0000000400)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000000440)=0x14, 0x100000) openat$vcsu(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) ioctl$SCSI_IOCTL_SYNC(r0, 0x4) clock_nanosleep(0x54fb6926d29f01ef, 0x0, &(0x7f0000000080)={0x0, 0x989680}, 0x0) clock_gettime(0x0, &(0x7f0000000140)={0x0, 0x0}) futimesat(r0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000180)={{0x77359400}, {r1, r2/1000+10000}}) futimesat(0xffffffffffffff9c, &(0x7f00000001c0)='./file0\x00', &(0x7f0000000200)={{0x0, 0x2710}, {0x77359400}}) clock_nanosleep(0x1, 0x1, &(0x7f0000000000), 0x0) 10:10:34 executing program 4: prctl$PR_SET_SECCOMP(0x16, 0x4, &(0x7f0000000040)={0x2, &(0x7f0000000000)=[{0x25}, {}]}) 10:10:34 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext3\x00', &(0x7f0000000040)='./file0\x00', 0x1000000, 0x0, 0x0, 0x0, &(0x7f0000000480)=ANY=[@ANYBLOB='lazytime,test_dummy_encryption,max_dir_size_kb=0x000000000200,grpjquota=,min_batch_time=0x00000000000003ff,rootcontext\a']) 10:10:34 executing program 1: syz_mount_image$ext4(&(0x7f0000000480)='ext3\x00', &(0x7f00000004c0)='./file0\x00', 0x0, 0x0, 0x0, 0xffffffff00000000, &(0x7f00000007c0)={[], [{@fscontext={'fscontext', 0x3d, 'sysadm_u'}}, {@defcontext={'defcontext', 0x3d, 'staff_u'}}]}) 10:10:34 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000040)={0x2, &(0x7f0000000000)=[{0x15, 0x60}, {}]}) 10:10:34 executing program 2: r0 = add_key$fscrypt_v1(&(0x7f00000005c0), &(0x7f0000000180)={'fscrypt:', @desc3}, &(0x7f00000001c0)={0x0, "8a1cd41b41f438d3cf38ba5192ddf382e4f66b50b19696b3b6385e06c42a03f9589e59292f72da27de4450efc9695253e5720fc4d1d4edaf02e3a8b240c5bd3f", 0x3f}, 0x48, 0xfffffffffffffffa) keyctl$KEYCTL_MOVE(0x1e, 0x0, r0, r0, 0x1) r1 = syz_mount_image$ext4(0x0, &(0x7f0000000440)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) openat$dir(0xffffffffffffff9c, &(0x7f0000000300)='./file0\x00', 0x92100, 0x0) unlinkat(0xffffffffffffff9c, &(0x7f0000000100)='./file0\x00', 0x200) openat$dir(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x2001, 0x103) add_key$keyring(&(0x7f0000000240), &(0x7f0000000280)={'syz', 0x0}, 0x0, 0x0, 0x0) clock_gettime(0x0, &(0x7f0000000080)={0x0, 0x0}) delete_module(&(0x7f00000002c0)='\x00', 0x800) r4 = openat$vcsu(0xffffffffffffff9c, &(0x7f0000000340), 0x301, 0x0) ioctl$PTP_ENABLE_PPS(r4, 0x40043d04, 0x1) sendmsg$TIPC_CMD_SET_NETID(r4, &(0x7f0000000400)={&(0x7f0000000340)={0x10, 0x0, 0x0, 0x2000}, 0xc, &(0x7f00000003c0)={&(0x7f0000000380)={0x24, 0x0, 0x4, 0x70bd28, 0x25dfdbff, {{}, {}, {0x8, 0x2, 0x8000}}, ["", "", "", "", "", "", "", "", ""]}, 0x24}, 0x1, 0x0, 0x0, 0x20000000}, 0x10000080) syslog(0x3, 0x0, 0x0) r5 = syz_genetlink_get_family_id$tipc(&(0x7f00000004c0), r4) sendmsg$TIPC_CMD_RESET_LINK_STATS(r4, &(0x7f0000000580)={&(0x7f0000000480)={0x10, 0x0, 0x0, 0x1}, 0xc, &(0x7f0000000540)={&(0x7f0000000500)={0x28, r5, 0x4, 0x70bd26, 0x25dfdbff, {{}, {}, {0xc, 0x14, 'syz0\x00'}}, ["", "", "", "", "", "", "", "", ""]}, 0x28}, 0x1, 0x0, 0x0, 0x4000000}, 0x4048091) futimesat(r1, &(0x7f0000000040)='./file0\x00', &(0x7f00000000c0)={{r2, r3/1000+60000}, {0x0, 0xea60}}) 10:10:34 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext3\x00', &(0x7f0000000040)='./file0\x00', 0x2000000, 0x0, 0x0, 0x0, &(0x7f0000000480)=ANY=[@ANYBLOB='lazytime,test_dummy_encryption,max_dir_size_kb=0x000000000200,grpjquota=,min_batch_time=0x00000000000003ff,rootcontext\a']) 10:10:34 executing program 4: prctl$PR_SET_SECCOMP(0x16, 0x7, &(0x7f0000000040)={0x2, &(0x7f0000000000)=[{0x25}, {}]}) 10:10:34 executing program 2: syz_mount_image$ext4(0x0, &(0x7f0000000440)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) openat$dir(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0xb0000, 0x0) openat$dir(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x7450c2, 0x8) r0 = openat$vcsu(0xffffffffffffff9c, &(0x7f0000000080), 0x202842, 0x0) r1 = syz_genetlink_get_family_id$tipc(&(0x7f0000000100), 0xffffffffffffffff) sendmsg$TIPC_CMD_GET_NODES(r0, &(0x7f00000001c0)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x2000}, 0xc, &(0x7f0000000180)={&(0x7f0000000140)={0x1c, r1, 0x400, 0x70bd28, 0x25dfdbfc, {}, [""]}, 0x1c}, 0x1, 0x0, 0x0, 0x20000000}, 0x0) arch_prctl$ARCH_SET_CPUID(0x1012, 0x0) 10:10:34 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000040)={0x2, &(0x7f0000000000)=[{0x15, 0x61}, {}]}) 10:10:34 executing program 1: syz_mount_image$ext4(&(0x7f0000000480)='ext3\x00', &(0x7f00000004c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000007c0)={[], [{@fscontext={'fscontext', 0x22, 'sysadm_u'}}, {@defcontext={'defcontext', 0x3d, 'staff_u'}}]}) 10:10:34 executing program 4: prctl$PR_SET_SECCOMP(0x16, 0x3ac, &(0x7f0000000040)={0x2, &(0x7f0000000000)=[{0x25}, {}]}) 10:10:34 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext3\x00', &(0x7f0000000040)='./file0\x00', 0x20100000, 0x0, 0x0, 0x0, &(0x7f0000000480)=ANY=[@ANYBLOB='lazytime,test_dummy_encryption,max_dir_size_kb=0x000000000200,grpjquota=,min_batch_time=0x00000000000003ff,rootcontext\a']) 10:10:34 executing program 5: r0 = syz_genetlink_get_family_id$tipc(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$TIPC_CMD_SHOW_PORTS(0xffffffffffffffff, &(0x7f0000000140)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x20}, 0xc, &(0x7f0000000100)={&(0x7f00000000c0)={0x1c, r0, 0x100, 0x70bd28, 0x25dfdbff, {}, [""]}, 0x1c}, 0x1, 0x0, 0x0, 0x8000}, 0x8000) r1 = openat$vcsu(0xffffffffffffff9c, &(0x7f0000000980), 0x58840, 0x0) ioctl$SG_GET_TIMEOUT(r1, 0x2202, 0x0) r2 = syz_genetlink_get_family_id$tipc(&(0x7f0000000300), 0xffffffffffffffff) sendmsg$TIPC_CMD_SET_LINK_PRI(0xffffffffffffffff, &(0x7f0000000400)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x1000000}, 0xc, &(0x7f00000003c0)={&(0x7f0000000340)={0x68, r2, 0x2, 0x70bd2a, 0x25dfdbfb, {{}, {}, {0x4c, 0x18, {0x81f, @media='eth\x00'}}}, [""]}, 0x68}, 0x1, 0x0, 0x0, 0x4005}, 0x80) r3 = syz_mount_image$ext4(&(0x7f0000000440)='ext3\x00', &(0x7f0000000480)='./file0\x00', 0x7, 0x3, &(0x7f0000000780)=[{&(0x7f00000004c0)="96b277e525db1645a80d9d57c7dfa1526d7037c3c1450cfcafaac6fedac3dc37051d5f4c44f88da319f70bfba8e2c9006e5a11fa276580681f09b254f292ea5ecae65dc8cf822f8551966dae3fd8f4e7ad15c6c5dfb52320e044b3b4c9234e252fc2016682208881ba6847c818c7187000d0d3e9b2b7ccad5f51830cf1d87e5f38f53712abe1a86f0dc77e1ace9f8d139a05da13dc112128f45b208661aced895857fdbb808df662fbc75a9bc1c802c28c97d973caebd629ef1c2657e4d7178f178a01893cd1b8960354a34723a643fff56fbf3fb7ea7b12c33bc5d5ef01942ef8319789528e947188b944085e4c4aa6577c7bf0ce2f6c3ca17a79", 0xfb, 0x1}, {&(0x7f00000005c0)="2dbfe74e84287f8e75713d3447162921ba4eb1a6ac8c972b7ff56a79606284fd938d944003de42e675a6db9403a772b1a59298c53b29c5ef45003542eee3a899f74ad49bfb0268f33af05c050c6a2c176e2a13f716649d1a1aa6c697a51cc0c273895c10352a9ab8c9638bb7b5d64033b8439fb2946940a25f2b2d094cfe5a97f8a92364aba079ec1a335b56e7423f0f381f417e4ac80476499215abeb6839d8d85b4114d1b54a2dc8a20f4a7c99e83d56be1598684d529775184e91e21bdf", 0xbf, 0x8}, {&(0x7f0000000680)="52b0295d2a20bea251d812eb5d57201307b086e57b65bceccf6a7a5802a7f0d083ff42e10af5a94b0dfc7b4a30c4c8b50f026b2d6e2f3db7dfff7fe5ce6135685733f17aeab8022d260f13711844c74964f19640290ff77099de7c28eae3f3bd6a0c484aa1ad0204f7a42efe84c797845bf09e0c290b31da151d2d1fe5e84f7862f310c715c3a5cb55b4f5bd6658e03117f9a16a2bc400a31da4fc9305293dbf713b71e28667e9138df88635ce690de4d460b6a42768eebbf4a080fc3b2d55ae604c9e080df70aba596c92200fa4cccba92c410dc546b5b2299cd807a271039c5e7124896a", 0xe5, 0x4}], 0x1000000, &(0x7f0000000800)=ANY=[@ANYBLOB='debug_want_extrO_isize=0x0000000000000001,nodiscard,fowner=', @ANYRESDEC, @ANYBLOB=',\x00']) r4 = openat$incfs(r3, &(0x7f0000000180)='.pending_reads\x00', 0x1, 0x50) sendmsg$TIPC_CMD_SHOW_PORTS(r4, &(0x7f0000000280)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x44000}, 0xc, &(0x7f0000000240)={&(0x7f0000000200)={0x1c, r0, 0x1, 0x70bd28, 0x25dfdbfc, {}, ["", "", "", "", "", ""]}, 0x1c}, 0x1, 0x0, 0x0, 0x8000}, 0x1) sendmsg$FOU_CMD_ADD(r4, &(0x7f0000000940)={&(0x7f0000000880)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f0000000900)={&(0x7f00000008c0)={0x2c, 0x0, 0x100, 0x70bd26, 0x25dfdbfb, {}, [@FOU_ATTR_LOCAL_V4={0x8, 0x6, @rand_addr=0x64010102}, @FOU_ATTR_REMCSUM_NOPARTIAL={0x4}, @FOU_ATTR_LOCAL_V4={0x8, 0x6, @multicast1}, @FOU_ATTR_REMCSUM_NOPARTIAL={0x4}]}, 0x2c}, 0x1, 0x0, 0x0, 0x400c840}, 0x4000000) clock_nanosleep(0x54fb6926d29f01ef, 0x0, &(0x7f0000000080)={0x0, 0x989680}, 0x0) 10:10:34 executing program 4: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000040)={0x3, &(0x7f0000000000)=[{0x25}, {}]}) 10:10:34 executing program 1: syz_mount_image$ext4(&(0x7f0000000480)='ext3\x00', &(0x7f00000004c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000007c0)={[], [{@fscontext={'fscontext', 0x2c, 'sysadm_u'}}, {@defcontext={'defcontext', 0x3d, 'staff_u'}}]}) 10:10:34 executing program 2: syz_mount_image$ext4(0x0, &(0x7f0000000440)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) openat$dir(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0xb0000, 0x0) 10:10:34 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000040)={0x2, &(0x7f0000000000)=[{0x15, 0x64}, {}]}) 10:10:34 executing program 4: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000040)={0x4, &(0x7f0000000000)=[{0x25}, {}]}) 10:10:34 executing program 1: syz_mount_image$ext4(&(0x7f0000000480)='ext3\x00', &(0x7f00000004c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000007c0)={[], [{@fscontext={'fscontext', 0x3d, 'sysadm_u'}, 0x22}, {@defcontext={'defcontext', 0x3d, 'staff_u'}}]}) 10:10:34 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext3\x00', &(0x7f0000000040)='./file0\x00', 0x22000000, 0x0, 0x0, 0x0, &(0x7f0000000480)=ANY=[@ANYBLOB='lazytime,test_dummy_encryption,max_dir_size_kb=0x000000000200,grpjquota=,min_batch_time=0x00000000000003ff,rootcontext\a']) 10:10:34 executing program 2: r0 = syz_mount_image$ext4(0x0, &(0x7f0000000440)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) openat$dir(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x2b8a00, 0xcd) openat$dir(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x80000, 0x0) unlinkat(r0, &(0x7f0000000040)='./file0\x00', 0x0) 10:10:34 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000040)={0x2, &(0x7f0000000000)=[{0x15, 0x74}, {}]}) 10:10:34 executing program 4: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000040)={0x7, &(0x7f0000000000)=[{0x25}, {}]}) [ 1855.611708][T19553] EXT4-fs (loop5): VFS: Can't find ext4 filesystem 10:10:34 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext3\x00', &(0x7f0000000040)='./file0\x00', 0x8cffffff, 0x0, 0x0, 0x0, &(0x7f0000000480)=ANY=[@ANYBLOB='lazytime,test_dummy_encryption,max_dir_size_kb=0x000000000200,grpjquota=,min_batch_time=0x00000000000003ff,rootcontext\a']) [ 1855.703054][T19581] EXT4-fs (loop5): VFS: Can't find ext4 filesystem 10:10:34 executing program 1: syz_mount_image$ext4(&(0x7f0000000480)='ext3\x00', &(0x7f00000004c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000007c0)={[], [{@fscontext={'fscontext', 0x3d, 'sysadm_u'}}, {@defcontext={'defcontext', 0x22, 'staff_u'}}]}) 10:10:34 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000040)={0x2, &(0x7f0000000000)=[{0x15, 0x94}, {}]}) 10:10:34 executing program 2: sendmsg$NL802154_CMD_DEL_SEC_DEVKEY(0xffffffffffffffff, &(0x7f0000000100)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x400}, 0xc, &(0x7f00000000c0)={&(0x7f0000000040)={0x48, 0x0, 0x100, 0x70bd28, 0x25dfdbfb, {}, [@NL802154_ATTR_IFINDEX={0x8}, @NL802154_ATTR_WPAN_DEV={0xc, 0x6, 0x100000001}, @NL802154_ATTR_IFINDEX={0x8}, @NL802154_ATTR_WPAN_DEV={0xc}, @NL802154_ATTR_WPAN_DEV={0xc, 0x6, 0x3}]}, 0x48}, 0x1, 0x0, 0x0, 0x48014}, 0x24000000) syz_mount_image$ext4(0x0, &(0x7f0000000440)='./file0\x00', 0x1, 0x0, 0x0, 0x1836a10, 0x0) 10:10:34 executing program 4: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000040)={0x3ac, &(0x7f0000000000)=[{0x25}, {}]}) 10:10:34 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext3\x00', &(0x7f0000000040)='./file0\x00', 0xc0ed0000, 0x0, 0x0, 0x0, &(0x7f0000000480)=ANY=[@ANYBLOB='lazytime,test_dummy_encryption,max_dir_size_kb=0x000000000200,grpjquota=,min_batch_time=0x00000000000003ff,rootcontext\a']) 10:10:34 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000040)={0x2, &(0x7f0000000000)=[{0x15, 0xb1}, {}]}) 10:10:34 executing program 2: syz_mount_image$ext4(0x0, &(0x7f0000000440)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r0 = openat$dir(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0xb0000, 0x0) ioctl$FS_IOC_GET_ENCRYPTION_KEY_STATUS(r0, 0xc080661a, &(0x7f0000000040)={@desc={0x1, 0x0, @desc2}}) 10:10:34 executing program 4: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000040)={0x2, &(0x7f0000000000)=[{0x2}, {}]}) 10:10:34 executing program 1: syz_mount_image$ext4(&(0x7f0000000480)='ext3\x00', &(0x7f00000004c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000007c0)={[], [{@fscontext={'fscontext', 0x3d, 'sysadm_u'}}, {@defcontext={'defcontext', 0x2c, 'staff_u'}}]}) 10:10:34 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext3\x00', &(0x7f0000000040)='./file0\x00', 0xf6ffffff, 0x0, 0x0, 0x0, &(0x7f0000000480)=ANY=[@ANYBLOB='lazytime,test_dummy_encryption,max_dir_size_kb=0x000000000200,grpjquota=,min_batch_time=0x00000000000003ff,rootcontext\a']) 10:10:34 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000040)={0x2, &(0x7f0000000000)=[{0x15}, {}]}) 10:10:35 executing program 4: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000040)={0x2, &(0x7f0000000000)=[{0x3}, {}]}) 10:10:35 executing program 2: syz_mount_image$ext4(0x0, &(0x7f0000000440)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r0 = openat$dir(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0xb0000, 0x0) r1 = openat$incfs(r0, &(0x7f0000000040)='.pending_reads\x00', 0x8002, 0x0) faccessat(r1, &(0x7f0000000080)='./file0/file0\x00', 0x100) prctl$PR_SET_TSC(0x1a, 0x0) 10:10:35 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext3\x00', &(0x7f0000000040)='./file0\x00', 0xfeffffff, 0x0, 0x0, 0x0, &(0x7f0000000480)=ANY=[@ANYBLOB='lazytime,test_dummy_encryption,max_dir_size_kb=0x000000000200,grpjquota=,min_batch_time=0x00000000000003ff,rootcontext\a']) 10:10:35 executing program 1: syz_mount_image$ext4(&(0x7f0000000480)='ext3\x00', &(0x7f00000004c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000007c0)={[], [{@fscontext={'fscontext', 0x3d, 'sysadm_u'}}, {@defcontext={'defcontext', 0x3d, 'staff_u'}, 0x22}]}) 10:10:35 executing program 4: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000040)={0x2, &(0x7f0000000000)=[{0x5}, {}]}) 10:10:35 executing program 5: mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu/syz0\x00', 0x1ff) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup.cpu/syz1\x00', 0x1ff) socketpair(0x11, 0xa, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) syz_genetlink_get_family_id$team(&(0x7f0000000040), r0) r2 = syz_genetlink_get_family_id$team(&(0x7f0000000140), r1) ioctl$sock_ipv6_tunnel_SIOCDELPRL(r1, 0x89f6, &(0x7f0000000200)={'ip6_vti0\x00', &(0x7f0000000180)={'ip6tnl0\x00', 0x0, 0x4, 0x6, 0x3f, 0xff, 0x50, @remote, @loopback, 0x700, 0x10, 0xe4a7, 0x7}}) r4 = socket(0xa, 0x2, 0x0) sendmsg$TIPC_CMD_SHOW_LINK_STATS(r4, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={0x0}}, 0x0) getpeername$packet(r0, &(0x7f0000000240)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000280)=0x14) ioctl$sock_ipv6_tunnel_SIOCDELTUNNEL(r0, 0x89f2, &(0x7f0000000340)={'ip6tnl0\x00', &(0x7f00000002c0)={'ip6_vti0\x00', 0x0, 0x29, 0x2, 0x8, 0x433, 0x21, @private2, @remote, 0x20, 0x7800, 0x8}}) ioctl$sock_ipv6_tunnel_SIOCDELTUNNEL(r0, 0x89f2, &(0x7f0000000400)={'syztnl2\x00', &(0x7f0000000380)={'syztnl2\x00', 0x0, 0x4, 0x3, 0x9, 0x8, 0x0, @ipv4={'\x00', '\xff\xff', @dev={0xac, 0x14, 0x14, 0xe}}, @local, 0x10, 0x7f00, 0x6, 0xffff1899}}) sendmsg$TEAM_CMD_PORT_LIST_GET(r0, &(0x7f00000009c0)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f0000000980)={&(0x7f0000000a00)=ANY=[@ANYBLOB="08050000", @ANYRES16=r2, @ANYBLOB="00022abd7000ffdbdf250300000008000100", @ANYRES32=0x0, @ANYBLOB="4400028040000100240001006c625f74785f686173685f746f5f706f72745f6d617070696e67000000000000050003000300000008000400", @ANYRES32=r3, @ANYBLOB="080007000000000008000100", @ANYRES32=0x0, @ANYBLOB="6c01028038000100240001006d636173745f72656a6f696e5f636f756e7400000000000000000000000000000500030003000000080004000800000038000100240001006e6f746966795f70656572735f696e74657276616c0000000000000000000000050003000300000008000400ff0000003c000100240001006c625f74785f6d6574686f6400000000000000000000000000000000000000000500030005000000090004006861736800000000400001002400010071756575655f69640000000000000000000000000000000000000000000000000500030003000000080004000700000008000600", @ANYRES32=r5, @ANYBLOB="40000100240001006c625f686173685f737461747300000000000000000000000000000000000000050003000b000000080004000800000008000700000000003c00010024000100656e61626c65640000000000000000000000000000000000000000000000000005000300060000000400040008000600", @ANYRES32=r6, @ANYBLOB="08000100", @ANYRES32=r7, @ANYBLOB="f00002803c00010024000100656e61626c65640000000000000000000000000000000000000000000000000005000300060000000400040008000600", @ANYRES32=0x0, @ANYBLOB="38000100240001006d636173745f72656a6f696e5f696e74657276616c00000000000000000000000500030003000000080004000100000040000100240001006d6f64650000000000000000000000000000000000000000000000000000000005000300050000000f000400726f756e64726f62696e000038000100240001006c625f73746174735f726566726573685f696e74657276616c000000000000000500030003000000080004002000000008000100", @ANYRES32=0x0, @ANYBLOB="3001028038000100240001006d636173745f72656a6f696e5f696e74657276616c0000000000000000000000050003000300000008000400040000004c000100240001006270665f686173685f66756e6300000000000000000000000000000000000000050003000b0000001c0004001f003f01ff000000000008b00500000004001df8030000003800010024000100616374697665706f727400000000000000000000000000000000000000000000050003000300000008000400", @ANYRES32=0x0, @ANYBLOB="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", @ANYRES32=0x0, @ANYBLOB="fc000280400001002400010071756575655f69640000000000000000000000000000000000000000000000000500030003000000080004009900000008000600", @ANYRES32=0x0, @ANYBLOB="40000100240001006c625f706f72745f737461747300000000000000000000000000000000000000050003000b0000000800040000fc020008000600", @ANYRES32=0x0, @ANYBLOB="3c00010024000100757365725f6c696e6b75705f656e61626c65640000000000000000000000000005000300060000000400040008000600", @ANYRES32=0x0, @ANYBLOB="3c00010024000100757365725f6c696e6b757000000000000000000000000000000000000000000005000300060000000400040008000600", @ANYRES32=0x0, @ANYBLOB], 0x508}, 0x1, 0x0, 0x0, 0x20008080}, 0x4041) 10:10:35 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000040)={0x2, &(0x7f0000000000)=[{0x15, 0x0, 0x2}, {}]}) 10:10:35 executing program 2: r0 = syz_mount_image$ext4(0x0, &(0x7f0000000440)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r1 = openat$dir(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0xb0000, 0x0) r2 = openat$vcsu(0xffffffffffffff9c, &(0x7f0000000000), 0x405200, 0x0) r3 = openat$dir(0xffffffffffffff9c, &(0x7f00000004c0)='./file0\x00', 0x480000, 0xc4) faccessat(r3, &(0x7f0000000500)='./file0/file0\x00', 0x0) fchmodat(r2, &(0x7f0000000040)='./file0\x00', 0x1b0) openat$incfs(r2, &(0x7f00000002c0)='.log\x00', 0x581200, 0x123) accept4$packet(r2, &(0x7f0000000400)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000000440)=0x14, 0x100000) faccessat(r1, &(0x7f0000000480)='./file0\x00', 0x20) ioctl$FS_IOC_GET_ENCRYPTION_KEY_STATUS(r2, 0xc080661a, &(0x7f0000000040)={@desc={0x1, 0x0, @desc1}}) execveat(r0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000240)=[&(0x7f0000000100)='\x00\x00\x11\x11\"\"33', &(0x7f0000000140)='\x00\x00\x11\x11\"\"33', &(0x7f0000000180)='.log\x00', &(0x7f00000001c0)='\x00', &(0x7f0000000200)='\x00\x00\x11\x11\"\"33'], &(0x7f00000003c0)=[&(0x7f0000000280)='\'F(\x00', &(0x7f0000000300)='%\x00', &(0x7f0000000340)='.&*%\x00', &(0x7f0000000380)='#\xbd#[!\x00'], 0x400) prctl$PR_SET_CHILD_SUBREAPER(0x24, 0x1) 10:10:35 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext3\x00', &(0x7f0000000040)='./file0\x00', 0xffffff8c, 0x0, 0x0, 0x0, &(0x7f0000000480)=ANY=[@ANYBLOB='lazytime,test_dummy_encryption,max_dir_size_kb=0x000000000200,grpjquota=,min_batch_time=0x00000000000003ff,rootcontext\a']) 10:10:35 executing program 1: syz_mount_image$ext4(&(0x7f0000000480)='ext3\x00', &(0x7f00000004c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000007c0)={[], [{@fscontext={'fscontext', 0x3d, 'sysadm_u'}}, {@defcontext={'defcontext', 0x3d, 'staff_u'}}]}) 10:10:35 executing program 4: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000040)={0x2, &(0x7f0000000000)=[{0x15}, {}]}) 10:10:35 executing program 2: syz_mount_image$ext4(0x0, &(0x7f0000000140)='./file0\x00', 0x1, 0x0, 0x0, 0x1180002, 0x0) openat$dir(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0xb0000, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = openat$vcsu(0xffffffffffffff9c, &(0x7f0000000340), 0x301, 0x0) ioctl$PTP_ENABLE_PPS(r1, 0x40043d04, 0x1) unlinkat(r1, &(0x7f0000000080)='./file0\x00', 0x200) r2 = openat$vcsu(0xffffffffffffff9c, &(0x7f0000000000), 0x5200, 0x0) fchmodat(r2, &(0x7f0000000040)='./file0\x00', 0x1b0) openat$incfs(r2, &(0x7f00000002c0)='.log\x00', 0x581200, 0x123) accept4$packet(r2, &(0x7f0000000400)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000000440)=0x14, 0x100000) r3 = openat$vcsu(0xffffffffffffff9c, &(0x7f0000000380), 0x42643, 0x0) renameat2(r2, &(0x7f0000000300)='./file0\x00', r3, &(0x7f00000003c0)='./file0\x00', 0x2) prctl$PR_GET_TSC(0x19, &(0x7f0000000280)) sendmsg$TIPC_CMD_GET_REMOTE_MNG(r0, &(0x7f0000000100)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x80}, 0xc, &(0x7f00000000c0)={&(0x7f00000002c0)={0x61, 0x0, 0x4, 0x70bd24, 0x25dfdbff, {}, ["", ""]}, 0x1c}, 0x1, 0x0, 0x0, 0x90}, 0x48090) sendmsg$TIPC_CMD_SET_NETID(0xffffffffffffffff, &(0x7f0000000240)={&(0x7f0000000180), 0xc, &(0x7f0000000200)={&(0x7f00000001c0)={0x24, 0x0, 0x0, 0x70bd27, 0x25dfdbfd, {{}, {}, {0x8, 0x2, 0x7f}}, ["", ""]}, 0x24}, 0x1, 0x0, 0x0, 0x8801}, 0x20000800) 10:10:35 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000040)={0x2, &(0x7f0000000000)=[{0x15, 0x0, 0x3}, {}]}) 10:10:35 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext3\x00', &(0x7f0000000040)='./file0\x00', 0xfffffff6, 0x0, 0x0, 0x0, &(0x7f0000000480)=ANY=[@ANYBLOB='lazytime,test_dummy_encryption,max_dir_size_kb=0x000000000200,grpjquota=,min_batch_time=0x00000000000003ff,rootcontext\a']) 10:10:35 executing program 4: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000040)={0x2, &(0x7f0000000000)=[{0x1d}, {}]}) 10:10:35 executing program 1: syz_mount_image$ext4(&(0x7f0000000480)='ext3\x00', &(0x7f00000004c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000007c0)={[], [{@fscontext={'fscontext', 0x3d, 'sysadm_u'}}, {@defcontext={'defcontext', 0x3d, 'staff_u'}}], 0x2}) 10:10:35 executing program 5: ioctl$sock_SIOCGIFINDEX_802154(0xffffffffffffffff, 0x8933, &(0x7f00000000c0)={'wpan0\x00', 0x0}) sendmsg$NL802154_CMD_SET_MAX_FRAME_RETRIES(0xffffffffffffffff, &(0x7f0000000180)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x20800000}, 0xc, &(0x7f0000000140)={&(0x7f0000000100)={0x40, 0x0, 0x10, 0x70bd27, 0x25dfdbfe, {}, [@NL802154_ATTR_WPAN_DEV={0xc, 0x6, 0x200000002}, @NL802154_ATTR_IFINDEX={0x8}, @NL802154_ATTR_IFINDEX={0x8, 0x3, r0}, @NL802154_ATTR_IFINDEX={0x8}, @NL802154_ATTR_MAX_FRAME_RETRIES={0x5, 0xf, 0x5}]}, 0x40}, 0x1, 0x0, 0x0, 0x4004}, 0x44) ioctl$PTP_PEROUT_REQUEST2(0xffffffffffffffff, 0x40383d0c, &(0x7f0000000000)={{0xffffffffffffff69, 0x80000004}, {0xa2f, 0xfffffe01}, 0x8, 0x1}) clock_nanosleep(0x54fb6926d29f01ef, 0x0, &(0x7f0000000080)={0x0, 0x989680}, 0x0) 10:10:35 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000040)={0x2, &(0x7f0000000000)=[{0x15, 0x0, 0x5}, {}]}) 10:10:35 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext3\x00', &(0x7f0000000040)='./file0\x00', 0xfffffffe, 0x0, 0x0, 0x0, &(0x7f0000000480)=ANY=[@ANYBLOB='lazytime,test_dummy_encryption,max_dir_size_kb=0x000000000200,grpjquota=,min_batch_time=0x00000000000003ff,rootcontext\a']) 10:10:35 executing program 2: sendmsg$NLBL_CALIPSO_C_ADD(0xffffffffffffffff, &(0x7f0000000240)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x10}, 0xc, &(0x7f0000000200)={&(0x7f0000000180)={0x5c, 0x0, 0x400, 0x70bd26, 0x25dfdbfc, {}, [@NLBL_CALIPSO_A_MTYPE={0x8}, @NLBL_CALIPSO_A_DOI={0x8, 0x1, 0x1}, @NLBL_CALIPSO_A_MTYPE={0x8}, @NLBL_CALIPSO_A_DOI={0x8, 0x1, 0x3}, @NLBL_CALIPSO_A_MTYPE={0x8}, @NLBL_CALIPSO_A_DOI={0x8, 0x1, 0x1}, @NLBL_CALIPSO_A_MTYPE={0x8}, @NLBL_CALIPSO_A_DOI={0x8}, @NLBL_CALIPSO_A_DOI={0x8, 0x1, 0x1}]}, 0x5c}, 0x1, 0x0, 0x0, 0x84}, 0x8000) syz_mount_image$ext4(0x0, &(0x7f0000000440)='./file0\x00', 0x8, 0x0, 0x0, 0x0, 0x0) syslog(0x9, &(0x7f0000000040)=""/237, 0xed) openat$dir(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0xb0000, 0x0) 10:10:35 executing program 4: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000040)={0x2, &(0x7f0000000000)=[{0x28}, {}]}) 10:10:35 executing program 1: syz_mount_image$ext4(&(0x7f0000000480)='ext3\x00', &(0x7f00000004c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000007c0)={[], [{@fscontext={'fscontext', 0x3d, 'sysadm_u'}}, {@defcontext={'defcontext', 0x3d, 'staff_u'}}], 0x7}) 10:10:35 executing program 5: clock_nanosleep(0x54fb6926d29f01ef, 0x0, &(0x7f0000000080)={0x0, 0x989680}, 0x0) 10:10:35 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000040)={0x2, &(0x7f0000000000)=[{0x15, 0x0, 0x6}, {}]}) 10:10:35 executing program 4: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000040)={0x2, &(0x7f0000000000)=[{0x2d}, {}]}) 10:10:35 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext3\x00', &(0x7f0000000040)='./file0\x00', 0x8000000000, 0x0, 0x0, 0x0, &(0x7f0000000480)=ANY=[@ANYBLOB='lazytime,test_dummy_encryption,max_dir_size_kb=0x000000000200,grpjquota=,min_batch_time=0x00000000000003ff,rootcontext\a']) 10:10:35 executing program 5: syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX_802154(r0, 0x8933, &(0x7f0000000040)={'wpan0\x00'}) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) 10:10:35 executing program 2: syz_mount_image$ext4(0x0, &(0x7f0000000440)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000040)='ext2\x00', &(0x7f0000000080)='./file0\x00', 0x5, 0x8, &(0x7f0000000600)=[{&(0x7f00000000c0)="7d07deabce3720dbb62772e7ed356396", 0x10, 0x3}, {&(0x7f0000000100)="66c1167f514ac528ca60cff3bc74d7062eb34f575e14e5490ee0fa9fdef98fbe633b246ab83fdfabfde118e43d0f19feb84d0b8abf1bb4b23b22f7f4a66b1f8cb81cb0c9eb392ac97d85a437c655dd4546e7ac56a8ab11993fbff328fd2d744399daf9b3788d0afe0f31c2b171d5", 0x6e, 0x4}, {&(0x7f0000000180)="3ce523cbf24a85447845c9a368e18f67bf4f9fb8e98addb6ff0b73a966dcd0d18a6ab6eed5e28da965908569a3d758995596bc139b3682f0fa3a66a785f87f231507b087ec3c3eb81a5758eafa348d8bfeb3f9ac0d909782d9d72fdff241f88dfc521b65a6296a1f30b23ad090b32ca95b01d21eb253088e6e6704ba6e95ecf526bc55015b7d5a33aac097a2e8cb6e13176893ecbcedbdcc5ffeb09746c9a73cb1f50e4af84dc3514f5460160e800faee5cf540d71a282c3c99c7f973a5178abb105a32520125b87b480a5f0abf4c3bfc58ca74d13b20a56897fe941baca64e7e09ab6baa2aadf5b4334c8c92d9d632d52ff94183b54b1479f", 0xf9, 0x9f0}, {&(0x7f0000000280)="86d81ec83f098c47b93a0a539186b606e2536825be543966a199a9417cb9c66a1c4ac9b78346dd0c1173b1418ef2d71f46db5d37838809664f6ba55cf0fa69fe4ee8b0359a7b1c7829067a09e6423245b32501fb6026337dd2ef69d666cf9b576ae7176dcd00d4fc8db26dfb701cc64d2c11e02e3a63b14afd1495fc6612093db4ee0a063c7d163c85eddfc7cf7a2ad4736a14e6f7187960b4631026ec7d549ec4dcc595e335c14b2e44900cc7fa5d552cb349bf2fc767fff664e5396c7c433216d909", 0xc3, 0x4e7}, {&(0x7f0000000480)="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", 0xfc, 0x4}, {&(0x7f0000000380)="e46ae297117de64e860d252318b82fac719e873368e9567744278631f3198814e0396c499e1ad28f2b740075cda3bb545d634de8b7a9946071fc2834e14667a98016959dfc4757f57e040fb146d7d4afb2b6f9441058fef9f08988838ffbed8605", 0x61, 0x6}, {&(0x7f0000000400)="ac4db64975165d3de69aa0ddd2422954519121f7acec34a35133eb4bfa456f3d3f1d", 0x22, 0x3}, {&(0x7f0000000580)="4ed8d92b9762c69d8f8066fafbd24851a023689aac0c91708ff6fa8a5c208b9d0aac48144ae585f013ab11315efa1a90804622129e30388693305d29bbfb1d0589200b771cf00ec43c8753450f1cded7c3", 0x51, 0x73a}], 0x20002, &(0x7f00000006c0)={[{@discard}], [{@dont_measure}, {@uid_lt}, {@appraise}, {@context={'context', 0x3d, 'user_u'}}]}) openat$dir(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0xb0000, 0x0) 10:10:35 executing program 1: syz_mount_image$ext4(&(0x7f0000000480)='ext3\x00', &(0x7f00000004c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000007c0)={[], [{@fscontext={'fscontext', 0x3d, 'sysadm_u'}}, {@defcontext={'defcontext', 0x3d, 'staff_u'}}], 0x22}) 10:10:35 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000040)={0x2, &(0x7f0000000000)=[{0x15, 0x0, 0x7}, {}]}) 10:10:35 executing program 4: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000040)={0x2, &(0x7f0000000000)=[{0x30}, {}]}) 10:10:35 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext3\x00', &(0x7f0000000040)='./file0\x00', 0xedc000000000, 0x0, 0x0, 0x0, &(0x7f0000000480)=ANY=[@ANYBLOB='lazytime,test_dummy_encryption,max_dir_size_kb=0x000000000200,grpjquota=,min_batch_time=0x00000000000003ff,rootcontext\a']) 10:10:35 executing program 1: syz_mount_image$ext4(&(0x7f0000000480)='ext3\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x800080, &(0x7f0000000100)=ANY=[@ANYBLOB="9ac68701282178c97a1f518466d70d415d3f920f12be0edf463b1ad703c84935d100693cf95909eaf43e0cb499d2094f3d45e639195226ed5d538fb76986f14e322ea0ad98d2dd8b0fc50c3ee659f7d2ab15503fc92d4b5669e485e3f1ff34150b64da7fc380bbab6e5fa3e5600b8d44dd47cdd1f39d415dc7101889033b46b8314ccbd64d8419cf646fc59e88a5b59a750e8f97cbb14a25a06fc2b5746c7e4b34e36b5e264c5062e9a6a0a6d63d702e67267acec3abe47a95ed58a81bf689e697fde2b341235bb6438bef28b162341a9d0d594446ca2a6677"]) r0 = fork() sched_rr_get_interval(r0, &(0x7f0000000100)) prctl$PR_GET_NO_NEW_PRIVS(0x27) sched_getscheduler(r0) [ 1856.586589][T19721] loop2: detected capacity change from 0 to 9 10:10:35 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000040)={0x2, &(0x7f0000000000)=[{0x15, 0x0, 0x9}, {}]}) 10:10:35 executing program 4: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000040)={0x2, &(0x7f0000000000)=[{0x34}, {}]}) 10:10:35 executing program 5: clock_nanosleep(0x54fb6926d29f01ef, 0x0, &(0x7f0000000080)={0x0, 0x989680}, 0x0) r0 = fork() clock_settime(0x4, &(0x7f0000000240)) sched_rr_get_interval(r0, &(0x7f0000000100)) pselect6(0x40, &(0x7f0000000040)={0x9, 0x87fb, 0x100000000, 0x101, 0x47e, 0xd60, 0x800, 0x1}, &(0x7f00000000c0)={0x400, 0xffffffff, 0x9, 0x1, 0x401, 0x1, 0x4, 0x9}, &(0x7f0000000140)={0xdf, 0x10000, 0x7f, 0x7, 0x2, 0x40, 0x8000, 0x3}, &(0x7f0000000180)={0x77359400}, &(0x7f0000000200)={&(0x7f00000001c0)={[0x8]}, 0x8}) sched_rr_get_interval(r0, &(0x7f0000000000)) 10:10:35 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext3\x00', &(0x7f0000000040)='./file0\x00', 0x100000000000000, 0x0, 0x0, 0x0, &(0x7f0000000480)=ANY=[@ANYBLOB='lazytime,test_dummy_encryption,max_dir_size_kb=0x000000000200,grpjquota=,min_batch_time=0x00000000000003ff,rootcontext\a']) 10:10:35 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000040)={0x2, &(0x7f0000000000)=[{0x15, 0x0, 0x15}, {}]}) [ 1856.685663][T19721] loop2: detected capacity change from 0 to 9 10:10:35 executing program 2: syz_mount_image$ext4(0x0, &(0x7f0000000440)='./file0\x00', 0x0, 0x0, 0x0, 0x2, 0x0) openat$dir(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x95ac2, 0x0) syz_mount_image$ext4(&(0x7f0000000040)='ext2\x00', &(0x7f0000000080)='./file0\x00', 0x7fff, 0x3, &(0x7f0000000300)=[{&(0x7f00000000c0)="742303e4b55a110f643a78b71f3835821a01c090f5727ae66964f67f7c73c77c02f5101ca5a66dd78d980a48faa8b62c669522598921d345b2aea28510611d0eaab03234dcf68c6159efab33eefb2299afb4467b9f90e3d22472a20d9f104c1f9abaa99f6fda43ba6d98b1bc75d95494dbab1add427181a5b01a5721342b2d9fab2b26847f753a9aafcd1faa0d54db82091eafe30bb1f7d195550eda1339d6ad912f1abcc11a5dd5ecf1880e838a4f7266", 0xb1, 0x2}, {&(0x7f0000000180)="54f8f470ba85efc1ea7095fae67beaa968b1cbc9f64d52bf5385ccbb46a4f4ccf07214264864a065ed3e0ce401a57010da89e185edf53d260f135fb257383356e6ca0300865de86420cb2966dfe6dd53d00ec3ba9e5e9363e4dd0c5a5cf9819840575401cc0071a2ccb91b921f21e67a5c3608b1d3dad71565ba9fa47d17a3960b6fdf71f17bbf4bca62dd7a4e0825e2f7f9857734c2181752bb09312dcd7f14e5e8eb99b9f3d6083847c40d9e4bdd9a1c9a88ff4b86abedfc6d", 0xba, 0x80000001}, {&(0x7f0000000240)="e660c60d3fdfd5f18a1a818f5d16ac99149f85790678d7c3884b1d05ba00a9c9f2f25ff5ffeba3cbbb747c40edcc20b12e66b04383f5a57a0041b12d09e71e508328130a959578b653eb42ad05177db4f08dc00f10cd618d8508abb771fdadc0e8a7ce11fec947ba97fe9a69b4245c320c07302762a63582c3d75551dcbe155949c7c1d1", 0x84, 0x9}], 0x8000, &(0x7f0000000380)={[{@test_dummy_encryption}, {@abort}, {@sysvgroups}, {@i_version}, {@minixdf}, {@journal_path={'journal_path', 0x3d, './file0'}}, {@errors_continue}], [{@smackfshat}, {@subj_type}, {@seclabel}, {@audit}, {@smackfsroot}, {@obj_user}, {@pcr={'pcr', 0x3d, 0x2a}}]}) 10:10:35 executing program 1: keyctl$join(0x1, &(0x7f0000000000)={'syz', 0x0}) syz_mount_image$ext4(&(0x7f0000000480)='ext3\x00', &(0x7f00000004c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000007c0)={[], [{@fscontext={'fscontext', 0x3d, 'sysadm_u'}}, {@defcontext={'defcontext', 0x3d, 'staff_u'}}]}) r0 = fork() sched_rr_get_interval(r0, &(0x7f0000000100)) sched_setparam(r0, &(0x7f0000000040)=0x1f) 10:10:35 executing program 4: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000040)={0x2, &(0x7f0000000000)=[{0x35}, {}]}) 10:10:35 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext3\x00', &(0x7f0000000040)='./file0\x00', 0x200000000000000, 0x0, 0x0, 0x0, &(0x7f0000000480)=ANY=[@ANYBLOB='lazytime,test_dummy_encryption,max_dir_size_kb=0x000000000200,grpjquota=,min_batch_time=0x00000000000003ff,rootcontext\a']) 10:10:35 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000040)={0x2, &(0x7f0000000000)=[{0x15, 0x0, 0x16}, {}]}) 10:10:35 executing program 5: clock_gettime(0x0, &(0x7f0000000000)) clock_gettime(0x0, &(0x7f0000000040)) clock_gettime(0x0, &(0x7f00000000c0)) clock_nanosleep(0x0, 0x0, &(0x7f0000000080), 0x0) 10:10:35 executing program 4: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000040)={0x2, &(0x7f0000000000)=[{0x3d}, {}]}) 10:10:35 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext3\x00', &(0x7f0000000040)='./file0\x00', 0x2010000000000000, 0x0, 0x0, 0x0, &(0x7f0000000480)=ANY=[@ANYBLOB='lazytime,test_dummy_encryption,max_dir_size_kb=0x000000000200,grpjquota=,min_batch_time=0x00000000000003ff,rootcontext\a']) 10:10:35 executing program 1: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$IEEE802154_ASSOCIATE_RESP(r0, &(0x7f0000000100)={&(0x7f0000000000), 0xc, &(0x7f00000000c0)={&(0x7f0000000040)={0x48, 0x0, 0x100, 0x70bd2c, 0x25dfdbfe, {}, [@IEEE802154_ATTR_STATUS={0x5, 0x3, 0x80}, @IEEE802154_ATTR_STATUS={0x5, 0x3, 0x9}, @IEEE802154_ATTR_STATUS={0x5, 0x3, 0x9}, @IEEE802154_ATTR_COORD_HW_ADDR={0xc, 0x9, {0xaaaaaaaaaaaa0002}}, @IEEE802154_ATTR_STATUS={0x5, 0x3, 0x1f}, @IEEE802154_ATTR_STATUS={0x5, 0x3, 0xff}]}, 0x48}, 0x1, 0x0, 0x0, 0x24004841}, 0x8800) exit(0x401) syz_mount_image$ext4(&(0x7f0000000480)='ext3\x00', &(0x7f00000004c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000007c0)={[], [{@fscontext={'fscontext', 0x3d, 'sysadm_u'}}, {@defcontext={'defcontext', 0x3d, 'staff_u'}}]}) 10:10:35 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000040)={0x2, &(0x7f0000000000)=[{0x15, 0x0, 0x1d}, {}]}) [ 1856.938914][T19792] loop2: detected capacity change from 0 to 264192 10:10:36 executing program 4: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000040)={0x2, &(0x7f0000000000)=[{0x45}, {}]}) 10:10:36 executing program 5: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$TIPC_CMD_SET_LINK_PRI(r0, &(0x7f0000000140)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x800}, 0xc, &(0x7f0000000040)={&(0x7f0000000280)=ANY=[@ANYBLOB="f8a0e58deb45aa660300000072f24af768100006f01bb40c4f3333cafcc2b4a4656c8fde6fb237730616c9ed39eca3d69968b75ced7cda737bfe708a3f161e6ef14935f3a9efa385c8602b204894da8639f290aa", @ANYRES16=0x0, @ANYBLOB="040026bd7000fcdbdf25010000000000000008410000004c001800000008696200"/98], 0x68}, 0x1, 0x0, 0x0, 0x4000000}, 0x8000) sendmsg$TIPC_CMD_GET_LINKS(r0, &(0x7f0000000240)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f0000000200)={&(0x7f00000001c0)={0x24, 0x0, 0x10, 0x70bd2c, 0x25dfdbfb, {{}, {}, {0x8, 0x11, 0x2}}, ["", "", "", "", "", "", "", "", ""]}, 0x24}, 0x1, 0x0, 0x0, 0x80}, 0x4800) socket$nl_generic(0x10, 0x3, 0x10) sendmsg$TIPC_CMD_SHOW_LINK_STATS(r0, &(0x7f0000000380)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x20}, 0xc, &(0x7f0000000340)={&(0x7f0000000100)={0x28, 0x0, 0x400, 0x70bd2a, 0x25dfdbfd, {{}, {}, {0xc, 0x14, 'syz0\x00'}}, ["", ""]}, 0x28}, 0x1, 0x0, 0x0, 0x4000000}, 0x4040040) clock_nanosleep(0x54fb6926d29f01ef, 0x0, &(0x7f0000000080)={0x0, 0x989680}, 0x0) 10:10:36 executing program 2: syz_mount_image$ext4(0x0, &(0x7f0000000440)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r0 = openat$vcsu(0xffffffffffffff9c, &(0x7f0000000040), 0x80001, 0x0) execveat(r0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000240)=[&(0x7f00000000c0)='&^,\x00', &(0x7f0000000100)='-{%\x00', &(0x7f0000000140)='a)\x00', &(0x7f0000000180)='\x00', &(0x7f00000001c0)='&)*\x00', &(0x7f0000000200)='&\x00'], &(0x7f00000003c0)=[&(0x7f0000000280)='\x00', &(0x7f00000002c0)='\x00', &(0x7f0000000300)='{$\\\x00', &(0x7f0000000340)='!-\')\x00', &(0x7f0000000380)='-\x00'], 0x1000) getpgrp(0x0) openat$dir(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0xb0000, 0x0) 10:10:36 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext3\x00', &(0x7f0000000040)='./file0\x00', 0x2200000000000000, 0x0, 0x0, 0x0, &(0x7f0000000480)=ANY=[@ANYBLOB='lazytime,test_dummy_encryption,max_dir_size_kb=0x000000000200,grpjquota=,min_batch_time=0x00000000000003ff,rootcontext\a']) 10:10:36 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000040)={0x2, &(0x7f0000000000)=[{0x15, 0x0, 0x25}, {}]}) 10:10:36 executing program 4: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000040)={0x2, &(0x7f0000000000)=[{0x4d}, {}]}) 10:10:36 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext3\x00', &(0x7f0000000040)='./file0\x00', 0x8cffffff00000000, 0x0, 0x0, 0x0, &(0x7f0000000480)=ANY=[@ANYBLOB='lazytime,test_dummy_encryption,max_dir_size_kb=0x000000000200,grpjquota=,min_batch_time=0x00000000000003ff,rootcontext\a']) 10:10:36 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000040)={0x2, &(0x7f0000000000)=[{0x15, 0x0, 0x28}, {}]}) 10:10:36 executing program 5: ioctl$PTP_PEROUT_REQUEST(0xffffffffffffffff, 0x40383d03, &(0x7f0000000000)={{0xfd53, 0xbab}, {0x20, 0x1ff}}) r0 = openat$ptp0(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) ioctl$PTP_EXTTS_REQUEST(r0, 0x40103d02, &(0x7f00000000c0)) ioctl$PTP_PIN_SETFUNC2(r0, 0x40603d10, &(0x7f00000000c0)={'\x00', 0xfff, 0x1, 0x1}) clock_nanosleep(0x54fb6926d29f01ef, 0x0, &(0x7f0000000080)={0x0, 0x989680}, 0x0) 10:10:36 executing program 4: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000040)={0x2, &(0x7f0000000000)=[{0x60}, {}]}) 10:10:36 executing program 1: getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000080)={{{@in=@empty, @in=@multicast1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@private1}, 0x0, @in=@empty}}, &(0x7f0000000180)=0x106) getresuid(&(0x7f00000001c0)=0x0, &(0x7f0000000200)=0x0, &(0x7f0000000240)) syz_mount_image$ext4(&(0x7f0000000480)='ext2\x00', &(0x7f00000004c0)='./file0\x00', 0x800, 0x0, 0x0, 0xc9b5ca01f00a8343, &(0x7f0000000380)=ANY=[@ANYRES64=r0, @ANYRESDEC=r0, @ANYBLOB="2c6d6561737572652c7375626a5f726f6c653d726f6f74636f6e746578742c7375626a5f757365723d6e6f6a6f75726e616c5f636865636b73756d2c726f6f74636f6e746578743d726f6f742c7569643c65d66d359f81d46482ca636a64112ac4238e2f3430a5e073f15a0a52", @ANYRESDEC=r2, @ANYBLOB=',measure,fowner=', @ANYRESDEC=0xee01, @ANYBLOB=',fowner>', @ANYRESDEC=r1, @ANYBLOB="03ec7edd375cc62b2bb4ca32f994151ce5aa"]) sched_rr_get_interval(0xffffffffffffffff, &(0x7f0000000000)) 10:10:36 executing program 2: ioctl$sock_SIOCGIFINDEX_802154(0xffffffffffffffff, 0x8933, &(0x7f0000000080)={'wpan1\x00', 0x0}) sendmsg$NL802154_CMD_SET_ACKREQ_DEFAULT(0xffffffffffffffff, &(0x7f0000000180)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000000140)={&(0x7f00000000c0)={0x44, 0x0, 0x20, 0x70bd2b, 0x25dfdbfd, {}, [@NL802154_ATTR_WPAN_DEV={0xc, 0x6, 0x80000003}, @NL802154_ATTR_IFINDEX={0x8}, @NL802154_ATTR_WPAN_DEV={0xc, 0x6, 0x100000001}, @NL802154_ATTR_IFINDEX={0x8, 0x3, r0}, @NL802154_ATTR_IFINDEX={0x8}]}, 0x44}, 0x1, 0x0, 0x0, 0x4000}, 0x804) r1 = syz_mount_image$ext4(0x0, &(0x7f0000000440)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) faccessat2(r1, &(0x7f00000001c0)='./file0\x00', 0x41, 0x1100) openat$dir(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x4b2080, 0x49) r2 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NBD_CMD_CONNECT(r2, &(0x7f00000013c0)={&(0x7f00000012c0), 0xc, &(0x7f0000001380)={0x0}}, 0xc6c3dbe86af1a089) r3 = syz_genetlink_get_family_id$nl802154(&(0x7f0000000240), 0xffffffffffffffff) ioctl$sock_SIOCGIFINDEX_802154(0xffffffffffffffff, 0x8933, &(0x7f0000000280)={'wpan3\x00', 0x0}) sendmsg$NL802154_CMD_GET_WPAN_PHY(r2, &(0x7f0000000380)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x20200000}, 0xc, &(0x7f0000000340)={&(0x7f00000002c0)={0x68, r3, 0x200, 0x70bd2d, 0x25dfdbfc, {}, [@NL802154_ATTR_WPAN_PHY={0x8, 0x1, 0x3}, @NL802154_ATTR_WPAN_PHY={0x8, 0x1, 0x1}, @NL802154_ATTR_WPAN_PHY={0x8, 0x1, 0x2}, @NL802154_ATTR_WPAN_DEV={0xc}, @NL802154_ATTR_IFINDEX={0x8, 0x3, r4}, @NL802154_ATTR_WPAN_DEV={0xc, 0x6, 0x200000002}, @NL802154_ATTR_WPAN_PHY={0x8}, @NL802154_ATTR_IFINDEX={0x8, 0x3, r0}, @NL802154_ATTR_WPAN_DEV={0xc, 0x6, 0x3}]}, 0x68}, 0x1, 0x0, 0x0, 0x4000}, 0x40000c0) 10:10:36 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext3\x00', &(0x7f0000000040)='./file0\x00', 0xf6ffffff00000000, 0x0, 0x0, 0x0, &(0x7f0000000480)=ANY=[@ANYBLOB='lazytime,test_dummy_encryption,max_dir_size_kb=0x000000000200,grpjquota=,min_batch_time=0x00000000000003ff,rootcontext\a']) 10:10:36 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000040)={0x2, &(0x7f0000000000)=[{0x15, 0x0, 0x2d}, {}]}) 10:10:36 executing program 4: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000040)={0x2, &(0x7f0000000000)=[{0x61}, {}]}) 10:10:36 executing program 5: clock_nanosleep(0x54fb6926d29f01ef, 0x0, &(0x7f0000000080)={0x0, 0x989680}, 0x0) clock_gettime(0x0, &(0x7f0000000000)={0x0, 0x0}) clock_settime(0x7, &(0x7f0000000040)={r0, r1+60000000}) 10:10:37 executing program 5: prctl$PR_SVE_SET_VL(0x32, 0x1d17b) 10:10:37 executing program 1: syz_mount_image$ext4(&(0x7f0000000480)='ext3\x00', &(0x7f00000004c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000007c0)={[], [{@fscontext={'fscontext', 0x3d, 'sysadm_u'}}, {@defcontext={'defcontext', 0x3d, 'staff_u'}}]}) syz_mount_image$ext4(&(0x7f0000000000)='ext3\x00', &(0x7f0000000040)='./file0\x00', 0x7ff, 0x2, &(0x7f00000001c0)=[{&(0x7f0000000080)="b95d5c9c9e348cb60be51e24a013679a5f9df3b1b42dadd9df15c82fecdd24c12826d62753119a6d6dfb125d0422f624503237387468a35951f5e876f4319e32f1e1eb40aa7212424003b5bec46a88f5b072a96eadacbd3df66f90d976b20bfb787b80d09d576c7a5882dfcde26fe796f9e4239e905e56cc08e096f6ceb3bc2f7b1317b77ef0f6030ba90550e7aaf67f3fdbf012dddb9ebce2cc810dc42899b76a8ea9c8ae82335fcdadc63c1aac0b2419d0223aefc46b488731ab3b5b973ff5dab7f9db01c59b9362446b5fcda59002a80d2e96d61cdaaa065073b101b44d58", 0xe0, 0x1ff}, {&(0x7f0000000180), 0x0, 0x9}], 0x100004, &(0x7f0000000200)={[{@dax}, {@quota}, {@init_itable_val={'init_itable', 0x3d, 0x400}}, {@journal_dev={'journal_dev', 0x3d, 0x6}}, {@orlov}, {@journal_dev={'journal_dev', 0x3d, 0x2}}, {@acl}], [{@euid_eq}]}) 10:10:37 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext3\x00', &(0x7f0000000040)='./file0\x00', 0xfeffffff00000000, 0x0, 0x0, 0x0, &(0x7f0000000480)=ANY=[@ANYBLOB='lazytime,test_dummy_encryption,max_dir_size_kb=0x000000000200,grpjquota=,min_batch_time=0x00000000000003ff,rootcontext\a']) 10:10:37 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000040)={0x2, &(0x7f0000000000)=[{0x15, 0x0, 0x30}, {}]}) 10:10:37 executing program 4: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000040)={0x2, &(0x7f0000000000)=[{0x64}, {}]}) 10:10:37 executing program 2: r0 = syz_mount_image$ext4(0x0, &(0x7f0000000440)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) futimesat(r0, &(0x7f0000000100)='./file0/file0\x00', &(0x7f0000000140)={{}, {0x0, 0x2710}}) modify_ldt$write(0x1, &(0x7f00000000c0)={0x1, 0x0, 0xffffffffffffffff, 0x1, 0x3, 0x1, 0x0, 0x1, 0x1, 0x1}, 0x10) r1 = openat$dir(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0xb0801, 0x0) r2 = openat$vcsu(0xffffffffffffff9c, &(0x7f0000000000), 0x5200, 0x0) fchmodat(r2, &(0x7f0000000040)='./file0\x00', 0x1b0) openat$incfs(r2, &(0x7f00000002c0)='.log\x00', 0x581200, 0x123) accept4$packet(r2, &(0x7f0000000400)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000000440)=0x14, 0x100000) ioctl$FS_IOC_GET_ENCRYPTION_KEY_STATUS(r2, 0xc080661a, &(0x7f0000000180)={@id={0x2, 0x0, @d}}) symlinkat(&(0x7f0000000040)='./file0\x00', r1, &(0x7f0000000080)='./file0\x00') 10:10:37 executing program 5: r0 = fork() sched_rr_get_interval(r0, &(0x7f0000000100)) sched_setaffinity(r0, 0x8, &(0x7f0000000000)=0xfffffffffffff800) clock_nanosleep(0x4, 0x0, &(0x7f0000000080)={0x0, 0x989680}, 0x0) ioprio_get$pid(0x2, r0) 10:10:37 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000040)={0x2, &(0x7f0000000000)=[{0x15, 0x0, 0x34}, {}]}) 10:10:37 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext3\x00', &(0x7f0000000040)='./file0\x00', 0xffffffff00000000, 0x0, 0x0, 0x0, &(0x7f0000000480)=ANY=[@ANYBLOB='lazytime,test_dummy_encryption,max_dir_size_kb=0x000000000200,grpjquota=,min_batch_time=0x00000000000003ff,rootcontext\a']) [ 1858.100442][T19884] loop1: detected capacity change from 0 to 3 10:10:37 executing program 4: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000040)={0x2, &(0x7f0000000000)=[{0x74}, {}]}) 10:10:37 executing program 2: syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0x1ff, 0x0, 0x0, 0x2fb5a15eb2eedac0, 0x0) openat$dir(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0xb0000, 0x0) 10:10:37 executing program 1: syz_mount_image$ext4(&(0x7f0000000480)='ext3\x00', &(0x7f00000004c0)='./file0\x00', 0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f00000007c0)={[], [{@fscontext={'fscontext', 0x3d, 'sysadm_u'}}, {@permit_directio}]}) 10:10:37 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000040)={0x2, &(0x7f0000000000)=[{0x15, 0x0, 0x35}, {}]}) 10:10:37 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext3\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x2, 0x0, 0x0, &(0x7f0000000480)=ANY=[@ANYBLOB='lazytime,test_dummy_encryption,max_dir_size_kb=0x000000000200,grpjquota=,min_batch_time=0x00000000000003ff,rootcontext\a']) 10:10:37 executing program 4: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000040)={0x2, &(0x7f0000000000)=[{0x94}, {}]}) 10:10:37 executing program 5: clock_nanosleep(0x54fb6926d29f01ef, 0x0, &(0x7f0000000080)={0x0, 0x989680}, 0x0) ioctl$PTP_SYS_OFFSET(0xffffffffffffffff, 0x43403d05, &(0x7f00000000c0)={0x12}) socket$inet(0x2, 0xa, 0x7ff) r0 = openat$ptp0(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) ioctl$PTP_EXTTS_REQUEST(r0, 0x40103d02, &(0x7f00000000c0)) ioctl$PTP_SYS_OFFSET(r0, 0x43403d05, &(0x7f0000000400)={0xa}) 10:10:37 executing program 1: sendmsg$NL802154_CMD_NEW_SEC_KEY(0xffffffffffffffff, &(0x7f00000002c0)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x20}, 0xc, &(0x7f0000000280)={&(0x7f0000000200)={0x5c, 0x0, 0x200, 0x70bd26, 0x25dfdbfd, {}, [@NL802154_ATTR_WPAN_DEV={0xc}, @NL802154_ATTR_SEC_KEY={0x28, 0x25, 0x0, 0x1, [@NL802154_KEY_ATTR_USAGE_CMDS={0x24, 0x3, "e69a24b5282736dce8189a8b4be4a6596a5870dc123313cb304fb606ddc28923"}]}, @NL802154_ATTR_IFINDEX={0x8}, @NL802154_ATTR_WPAN_DEV={0xc, 0x6, 0x300000000}]}, 0x5c}, 0x1, 0x0, 0x0, 0x200080c1}, 0x4) r0 = syz_genetlink_get_family_id$ieee802154(&(0x7f0000000340), 0xffffffffffffffff) ioctl$sock_SIOCGIFINDEX_802154(0xffffffffffffffff, 0x8933, &(0x7f0000000380)={'wpan0\x00', 0x0}) sendmsg$IEEE802154_LIST_IFACE(0xffffffffffffffff, &(0x7f0000000440)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f0000000400)={&(0x7f00000003c0)={0x1c, r0, 0x8, 0x70bd27, 0x25dfdbfc, {}, [@IEEE802154_ATTR_DEV_INDEX={0x8, 0x2, r1}]}, 0x1c}, 0x1, 0x0, 0x0, 0x40900}, 0x24000018) syz_mount_image$ext4(&(0x7f0000000480)='ext3\x00', &(0x7f00000004c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000180)=ANY=[@ANYRESDEC]) ioctl$SG_GET_REQUEST_TABLE(0xffffffffffffffff, 0x2286, &(0x7f0000000000)) 10:10:37 executing program 2: syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x800000, 0x0) openat$dir(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0xb0000, 0x0) 10:10:37 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000040)={0x2, &(0x7f0000000000)=[{0x15, 0x0, 0x3d}, {}]}) 10:10:37 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext3\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x22, 0x0, 0x0, &(0x7f0000000480)=ANY=[@ANYBLOB='lazytime,test_dummy_encryption,max_dir_size_kb=0x000000000200,grpjquota=,min_batch_time=0x00000000000003ff,rootcontext\a']) 10:10:37 executing program 4: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000040)={0x2, &(0x7f0000000000)=[{0xb1}, {}]}) 10:10:37 executing program 5: r0 = openat$ptp0(0xffffffffffffff9c, &(0x7f0000000040), 0x438541, 0x0) ioctl$PTP_SYS_OFFSET(r0, 0x43403d05, &(0x7f00000000c0)={0x18}) r1 = openat$ptp0(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) ioctl$PTP_EXTTS_REQUEST(r1, 0x40103d02, &(0x7f00000000c0)) ioctl$PTP_PEROUT_REQUEST2(r1, 0x40383d0c, &(0x7f0000000580)={{0x3f66f120, 0x3ff}, {0x6}}) r2 = openat$ptp0(0xffffffffffffff9c, &(0x7f0000000640), 0x80000, 0x0) ioctl$PTP_PEROUT_REQUEST(r2, 0x40383d03, &(0x7f0000000680)={{0x5, 0xf73}, {0x7, 0x3}, 0x8, 0x1}) sendmsg$TIPC_CMD_ENABLE_BEARER(0xffffffffffffffff, &(0x7f0000000540)={&(0x7f0000000480)={0x10, 0x0, 0x0, 0x400}, 0xc, &(0x7f0000000500)={&(0x7f00000004c0)={0x34, 0x0, 0xf32, 0x70bd25, 0x25dfdbfc, {{}, {}, {0x18, 0x17, {0x19, 0x2, @udp='udp:syz2\x00'}}}, ["", "", "", ""]}, 0x34}, 0x1, 0x0, 0x0, 0x880}, 0x1) clock_nanosleep(0x54fb6926d29f01ef, 0x0, &(0x7f0000000080)={0x0, 0x989680}, 0x0) clock_gettime(0x7, &(0x7f0000000000)) clock_nanosleep(0x1, 0x1, &(0x7f0000000400)={0x77359400}, &(0x7f0000000440)) r3 = openat$vcsu(0xffffffffffffff9c, &(0x7f00000005c0), 0x8a000, 0x0) ioctl$PTP_PEROUT_REQUEST2(r3, 0x40383d0c, &(0x7f0000000600)={{0x100000000, 0x9}, {0x3, 0x9}, 0x401, 0x1}) clock_gettime(0x7, &(0x7f00000006c0)) 10:10:37 executing program 2: r0 = syz_mount_image$ext4(0x0, &(0x7f0000000440)='./file0\x00', 0x0, 0x0, 0x0, 0x2000, 0x0) symlinkat(&(0x7f0000000040)='./file0\x00', r0, &(0x7f0000000080)='./file0\x00') openat$dir(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0xb0000, 0x0) r1 = openat$vcsu(0xffffffffffffff9c, &(0x7f0000000000), 0x5200, 0x0) fchmodat(r1, &(0x7f0000000040)='./file0\x00', 0x1b0) r2 = openat$dir(0xffffffffffffff9c, &(0x7f0000000100)='./file0\x00', 0x40, 0xb) r3 = openat$incfs(r2, &(0x7f00000002c0)='.log\x00', 0x581200, 0x2) syz_genetlink_get_family_id$fou(&(0x7f0000000300), r3) renameat2(r3, &(0x7f0000000380)='./file0\x00', 0xffffffffffffffff, &(0x7f00000003c0)='./file1\x00', 0x0) unlinkat(r3, &(0x7f00000000c0)='./file1\x00', 0x0) 10:10:37 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000040)={0x2, &(0x7f0000000000)=[{0x15, 0x0, 0x45}, {}]}) 10:10:37 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext3\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1020, 0x0, 0x0, &(0x7f0000000480)=ANY=[@ANYBLOB='lazytime,test_dummy_encryption,max_dir_size_kb=0x000000000200,grpjquota=,min_batch_time=0x00000000000003ff,rootcontext\a']) 10:10:37 executing program 4: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000040)={0x2, &(0x7f0000000000)=[{0x25}, {}]}) 10:10:37 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext3\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x2010, 0x0, 0x0, &(0x7f0000000480)=ANY=[@ANYBLOB='lazytime,test_dummy_encryption,max_dir_size_kb=0x000000000200,grpjquota=,min_batch_time=0x00000000000003ff,rootcontext\a']) 10:10:37 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000040)={0x2, &(0x7f0000000000)=[{0x15, 0x0, 0x4d}, {}]}) 10:10:37 executing program 4: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000040)={0x2, &(0x7f0000000000)=[{0x25, 0x2}, {}]}) 10:10:37 executing program 1: getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000001d00)={{{@in6=@private1, @in6=@local, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@private1}, 0x0, @in=@dev}}, &(0x7f00000001c0)=0xfffffe5e) sendto$packet(0xffffffffffffffff, &(0x7f0000000b40)="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", 0x1000, 0x8040, &(0x7f0000001b40)={0x11, 0x1, r0, 0x1, 0x1, 0x6, @remote}, 0x14) r1 = accept$packet(0xffffffffffffffff, &(0x7f0000000080)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000200)=0x14) ioctl$sock_ipv6_tunnel_SIOCDELTUNNEL(0xffffffffffffffff, 0x89f2, &(0x7f0000000300)={'syztnl0\x00', &(0x7f0000000280)={'syztnl1\x00', r2, 0x29, 0x4, 0x0, 0x1, 0x42, @private2={0xfc, 0x2, '\x00', 0x1}, @dev={0xfe, 0x80, '\x00', 0x24}, 0x7, 0x8000, 0xfffffff8, 0xfffffff8}}) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000001b80)={{{@in6=@mcast2, @in=@empty, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@private}, 0x0, @in=@local}}, &(0x7f0000001c80)=0xe8) r4 = syz_mount_image$ext4(&(0x7f0000000480)='ext3\x00', &(0x7f00000004c0)='./file1\x00', 0xffffffffffff6fdc, 0x0, 0x0, 0x2010080, &(0x7f0000001cc0)={[{@nobarrier}], [{@uid_eq={'uid', 0x3d, r3}}, {@defcontext={'defcontext', 0x3d, 'sysadm_u'}}]}) r5 = syz_mount_image$ext4(&(0x7f00000003c0)='ext2\x00', &(0x7f0000000400)='./file0\x00', 0x80000000, 0x9, &(0x7f0000000980)=[{&(0x7f0000000500)="19d0913c6fd8846c3e6bf59ba89c067df95097a8e793a8f475619c2927375c6316ee42c7687acd542111f822724126fba9a2d9e82b14f575d7189b07eceb294af441bbf58fc02e6c31f072354dde2501f7942168c05e6b4dc78a184ecc83252edab6ad9190ff1faae5a875df607bec069d5538bb20ac925b60cd7b97b845b38f715b1818d369f95bf6b2ab22896481dea48c07f6fd149c3653a54c235dff29", 0x9f, 0x4}, {&(0x7f0000000440)="e2e34246c7bc135926886359e623254b4ee9cc63daf8ba201f076d14441a6b4c4841076520998fa09d88930bea4c97518d8bc5ccf8d0fa39154a27896e", 0x3d, 0xbdf5}, {&(0x7f00000005c0)="32c1c6ded471d3cb1e019b62fccb38bed9b6828f8dd689108706efe00928727b19b1d322c8749c69f67f70ca5fb6dad265ae9621adad7122", 0x38, 0x400}, {&(0x7f0000000600)="dff56befa8ff959e86d00c97ed9998c53dd79a696a3e1ffd5c9ee6ef10f38f816bbcdd287ea8719992d29f2abc55850b8051b420db170d390a79c7fb35b12dab255e1df7f1818d920f979eb875a756bed99ee925203fa3052a", 0x59, 0x2}, {&(0x7f0000000680)="70783fbd7848cbb26af0c08f58285bfc08f3bfb3a5d58bd3dc997345c0304ba22ba29101ded80b0b6084d8800b33e9e35010c8aa79cbc6dad6c762c4779a42ec3f6d55348b01edd4f55f1ff610", 0x4d, 0xfffffffffffffff8}, {&(0x7f0000000700)="10b43f7e6e8c8e837302395863a7c37d4d6cf95d36aa7b792f7a18b0b2ed9badff37bb83d451e599ce10fc846be748cec8dbad64e6b810f8d46f694ac49e7164446ea6438dfcea9246ed0c7cde7578bcd63b6345dd", 0x55, 0x4}, {&(0x7f0000000780)="098158822fd59eef59d881fdda5b73984a530965c3cf597eca3bc5264a3f2e9a3c4d1a98572d", 0x26, 0x400000000}, {&(0x7f00000007c0)="e85d076ebf02ae6c16f0226c0d90c214a0e4606c4ee1b3218fc02bb6cd52687c77d250343418dd42adf31931645442b233354d387638e45a63f6dd364e5cf39d1528730441d89a67b2c2114356797ce1502292ddf7b5f008fab7e0861ff080a54884ca265d223aa343fa7dbd4dd15d9b856d07f4fb49caa70b428075284e7653eab90269adea9324bbb0eb839cdf2f2fddbd5dba304f3ca4fe678ed255037b0a9811c1f84e2188e7ae49a0baed176998b002b31b101cb4c907529f9871f8fd56aeeb09b6d1f96b0f85cde5cb5c373406", 0xd0, 0x1}, {&(0x7f00000008c0)="178a61202964e85404def22c4e4dd6395256a4babbb312f527d82a93754bd5495fd46437a263f101bd04c1b6014dac4fa25d7e15a5be0a99267e96ce2a6b56e24e450583bcc5ed862d0448e4f60bd5b2c0b87d59c37c0b2902e6e111703291b7c332bde6a9b2d0101fdab2ddbfd1090a83841f4c6242ceaea8bdf03f813d4b526262e7733fee7cd79ad941a4206f074d8ec16f5e3745f98e6aca69c36d2b", 0x9e, 0xff}], 0x41, &(0x7f0000000a80)={[{@nojournal_checksum}, {@nobarrier}, {@nomblk_io_submit}, {@lazytime}], [{@smackfsdef={'smackfsdef', 0x3d, 'syztnl0\x00'}}]}) faccessat(r5, &(0x7f0000000b00)='./file0\x00', 0x208) symlinkat(&(0x7f0000000000)='./file0\x00', r4, &(0x7f0000000040)='./file0\x00') r6 = openat$vcsu(0xffffffffffffff9c, &(0x7f0000000000), 0x5200, 0x0) fchmodat(r6, &(0x7f0000000040)='./file0\x00', 0x1b0) openat$incfs(r6, &(0x7f00000002c0)='.log\x00', 0x581200, 0x123) accept4$packet(r6, &(0x7f0000000400)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000000440)=0x14, 0x100000) fchmodat(r6, &(0x7f0000000240)='./file1\x00', 0x4) getsockname$packet(r1, &(0x7f0000000340)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @multicast}, &(0x7f0000000380)=0x14) prctl$PR_MPX_DISABLE_MANAGEMENT(0x2c) 10:10:37 executing program 2: prctl$PR_SET_TSC(0x1a, 0x1) syz_mount_image$ext4(0x0, &(0x7f0000000440)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) openat$dir(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0xb0000, 0x0) setfsgid(0x0) syz_mount_image$ext4(&(0x7f0000000040)='ext4\x00', &(0x7f0000000080)='./file0\x00', 0x3, 0x7, &(0x7f0000000500)=[{&(0x7f00000000c0)="7214dbe9cbff9d7d55c9316d983a127f79a5120ca7d0d1fa88649942d7b16197b7383a311a591a104fb899012f86af67d62e12b5", 0x34, 0x7f}, {&(0x7f0000000100)="87330e50c25acc28030f2f9353b5dfd78e4d72ebfc6c41dfeae3f086bcc85e700979a473ecbffd48d2ac3bb96bc54697536e0e462482a26f21aad3f092d53c13d7926c7e50afe9627b338d64954a4f65c8acdd5c75e7ae6ef21c7a1fab6c2b262a7dd1b88adc02efde97b9a21cca904069b0f528df49225f889db92f926edcd3347f392a3b298b9b5b47a8125924364089369127b7", 0x95, 0xfd}, {&(0x7f00000001c0)="0d31cacbcbf15349a84c1ede970a0ad33868ba54780cbc7c50189412e2d237af56627e53dcce0781f244d81e6758c8e6f03a6b590f016497665b9bd4210c4f5896ffb43a5c7383fbf5c2caae5ef7f0b02e952f1e290f68d410e0143e024b17af18c605efc99dcc", 0x67, 0x2}, {&(0x7f0000000240)="5c8d4a955e2e1be09401fa266408993484e7a8f3e63e7bcf83436b6ea883d39ede480ed485817f5f0eb5a83cacc57e551f8a7446201652a712b557e6c4a282bd380fa23153a36288675359680dd5da99ca66f9f1be15f7485f111314ddd0a3e925276782045dbbd2f2f8b296b35913d157500d9ad8b1f91b55517886bb359b73f38a5d6e69ed47b0ac41ea60e4d9c990a2abbc6295c57ed8cc8cfbbbfd76cd9ff6fc523346ade97ca00fd0f0170129dbcd81b4ee0b623e6f30522a8ac70998a373bd3d6abb51401a90fc7f06e0f071bbf3a9f0483d9ca408fdd559a38ec96201ad8c3bdeacb836b7f5", 0xe9, 0x1}, {&(0x7f0000000340)="3e7ac81e799a8a1545f33aa8fdc5c2108df747cc9cf5e2e56b70a9deb751e92c41307edf0c93a02fbb7dcdfac4e15d6266f280e30665b721e290ea3c3fa30b37382120c0361d38b89a40d00257bd1436ee21bafbf688ed80bac8f8b42f489a96be6ca4296562f325e3347c5d783d", 0x6e, 0x9}, {&(0x7f00000003c0)="3100f3b4a0f0fef7cd575fb1849870fca9d0a891ef418443ee137e979ee76109e6f71d9ef8c09a308f262e492f9e3500d56b976095a46693723e5fdaf210", 0x3e, 0x2}, {&(0x7f0000000480)="fbeed87895780c21227cb117657458a2feaf87d1a346a55ec21e9e008b1eb952b1b32880382b12509071e9f47b7b441b97db4e8902cbdf2aea797fcfc35bf6e8afbeca06eb2269babd05aa77a989019e7dcd91e782314277e38372f2a74791950bcebae098f9bfe459c51f78c4ea665db481fc1fa9b213316aea38", 0x7b, 0x8}], 0x20380a8, &(0x7f00000005c0)={[{@commit={'commit', 0x3d, 0x83}}, {@nouser_xattr}], [{@appraise_type}, {@subj_role={'subj_role', 0x3d, '/\xf6-'}}, {@dont_hash}, {@subj_type={'subj_type', 0x3d, '{.-!$'}}, {@smackfshat={'smackfshat', 0x3d, '^&.'}}, {@smackfshat={'smackfshat', 0x3d, ',-'}}]}) 10:10:37 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000040)={0x2, &(0x7f0000000000)=[{0x15, 0x0, 0x60}, {}]}) 10:10:37 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext3\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x2200, 0x0, 0x0, &(0x7f0000000480)=ANY=[@ANYBLOB='lazytime,test_dummy_encryption,max_dir_size_kb=0x000000000200,grpjquota=,min_batch_time=0x00000000000003ff,rootcontext\a']) [ 1858.709988][T19981] loop1: detected capacity change from 0 to 264192 [ 1858.770071][T19981] EXT4-fs (loop1): VFS: Can't find ext4 filesystem [ 1858.851395][T20004] loop1: detected capacity change from 0 to 264192 [ 1858.870065][T20004] EXT4-fs (loop1): VFS: Can't find ext4 filesystem 10:10:38 executing program 5: clock_nanosleep(0x54fb6926d29f01ef, 0x0, &(0x7f0000000080)={0x0, 0x989680}, 0x0) 10:10:38 executing program 4: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000040)={0x2, &(0x7f0000000000)=[{0x25, 0x3}, {}]}) 10:10:38 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext3\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0xedc0, 0x0, 0x0, &(0x7f0000000480)=ANY=[@ANYBLOB='lazytime,test_dummy_encryption,max_dir_size_kb=0x000000000200,grpjquota=,min_batch_time=0x00000000000003ff,rootcontext\a']) 10:10:38 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000040)={0x2, &(0x7f0000000000)=[{0x15, 0x0, 0x61}, {}]}) 10:10:38 executing program 2: sendmsg$NL802154_CMD_DEL_SEC_DEV(0xffffffffffffffff, &(0x7f00000001c0)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x1000000}, 0xc, &(0x7f0000000180)={&(0x7f0000000140)={0x30, 0x0, 0x200, 0x70bd28, 0x25dfdbfd, {}, [@NL802154_ATTR_IFINDEX={0x8}, @NL802154_ATTR_WPAN_DEV={0xc}, @NL802154_ATTR_IFINDEX={0x8}]}, 0x30}, 0x1, 0x0, 0x0, 0x40000}, 0x4000) syz_mount_image$ext4(0x0, &(0x7f0000000440)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r0 = openat$dir(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x141200, 0x80) r1 = openat$vcsu(0xffffffffffffff9c, &(0x7f0000000000), 0x5200, 0x0) fchmodat(r1, &(0x7f0000000040)='./file0\x00', 0x1b0) r2 = openat$incfs(r1, &(0x7f00000002c0)='.log\x00', 0x581200, 0x123) syz_genetlink_get_family_id$fou(&(0x7f0000000300), r2) renameat2(r2, &(0x7f0000000380)='./file0\x00', 0xffffffffffffffff, &(0x7f00000003c0)='./file1\x00', 0x0) syz_genetlink_get_family_id$tipc(&(0x7f0000000240), r2) symlinkat(&(0x7f0000000040)='./file0\x00', r0, &(0x7f00000000c0)='./file0\x00') openat$dir(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0xb0000, 0x0) unlinkat(r0, &(0x7f0000000200)='./file0\x00', 0x0) 10:10:38 executing program 1: ioctl$sock_SIOCGIFINDEX_802154(0xffffffffffffffff, 0x8933, &(0x7f00000000c0)={'wpan4\x00', 0x0}) sendmsg$NL802154_CMD_DEL_SEC_DEV(0xffffffffffffffff, &(0x7f0000000180)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x200}, 0xc, &(0x7f0000000140)={&(0x7f00000001c0)=ANY=[@ANYBLOB="1c000000", @ANYRES16=0x0, @ANYBLOB="00012bbd7000ffdbdf251b00000008000300", @ANYRES32=r0, @ANYBLOB="8539e61d912a78e96d3160853bc805ada96ae1"], 0x1c}, 0x1, 0x0, 0x0, 0x40}, 0x240080a4) syz_genetlink_get_family_id$ieee802154(&(0x7f0000000100), 0xffffffffffffffff) syz_mount_image$ext4(&(0x7f0000000040)='ext3\x00', &(0x7f00000004c0)='./file0\x00', 0xbcfd, 0x0, 0x0, 0x0, &(0x7f0000000000)={[], [{@fscontext={'fscontext', 0x3d, 'sysadm_u'}}, {@defcontext={'defcontext', 0x3d, 'sysadm_u'}}]}) 10:10:38 executing program 4: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000040)={0x2, &(0x7f0000000000)=[{0x25, 0x5}, {}]}) 10:10:38 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000040)={0x2, &(0x7f0000000000)=[{0x15, 0x0, 0x64}, {}]}) 10:10:38 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext3\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1000000, 0x0, 0x0, &(0x7f0000000480)=ANY=[@ANYBLOB='lazytime,test_dummy_encryption,max_dir_size_kb=0x000000000200,grpjquota=,min_batch_time=0x00000000000003ff,rootcontext\a']) 10:10:38 executing program 1: syz_mount_image$ext4(&(0x7f0000000480)='ext3\x00', &(0x7f00000004c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000007c0)={[], [{@fscontext={'fscontext', 0x3d, 'sysadm_u'}}, {@defcontext={'defcontext', 0x3d, 'staff_u'}}]}) r0 = openat$vcsu(0xffffffffffffff9c, &(0x7f0000000000), 0x5200, 0x0) fchmodat(r0, &(0x7f0000000040)='./file0\x00', 0x1b0) openat$incfs(r0, &(0x7f00000002c0)='.log\x00', 0x581200, 0x123) accept4$packet(r0, &(0x7f0000000400)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000000440)=0x14, 0x100000) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY_ALL_USERS(r0, 0xc0406619, &(0x7f0000000000)={@desc={0x1, 0x0, @desc2}}) r1 = openat$vcsu(0xffffffffffffff9c, &(0x7f0000000080), 0x111000, 0x0) sendmsg$TIPC_CMD_SHOW_NAME_TABLE(r1, &(0x7f0000000180)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x800}, 0xc, &(0x7f0000000140)={&(0x7f0000000100)={0x30, 0x0, 0x400, 0x70bd29, 0x25dfdbfb, {{}, {}, {0x14, 0x19, {0xaf8e, 0xffffffff, 0x412, 0x1}}}, ["", ""]}, 0x30}, 0x1, 0x0, 0x0, 0x4000000}, 0x20008000) r2 = openat$vcsu(0xffffffffffffff9c, &(0x7f0000000000), 0x5200, 0x0) fchmodat(r2, &(0x7f0000000040)='./file0\x00', 0x1b0) r3 = openat$incfs(r2, &(0x7f00000002c0)='.log\x00', 0x581200, 0x123) syz_genetlink_get_family_id$fou(&(0x7f0000000300), r3) renameat2(r3, &(0x7f0000000380)='./file0\x00', 0xffffffffffffffff, &(0x7f00000003c0)='./file1\x00', 0x0) ioctl$SCSI_IOCTL_SYNC(r3, 0x4) 10:10:38 executing program 5: clock_nanosleep(0x54fb6926d29f01ef, 0x0, &(0x7f0000000080)={0x0, 0x989680}, 0x0) pselect6(0x40, &(0x7f00000001c0)={0x9, 0x65d, 0xfff, 0xffffffff80000001, 0x40, 0x80, 0x2, 0xfffffffffffffff8}, &(0x7f0000000200)={0x3, 0x5, 0x8100000000000, 0x5, 0x5, 0x0, 0x393fc0, 0x5}, &(0x7f0000000240)={0x3, 0xb4c1, 0xb1, 0x1, 0x4, 0x36b0, 0xc713}, &(0x7f0000000280), &(0x7f0000000300)={&(0x7f00000002c0)={[0x7bd]}, 0x8}) pselect6(0x40, &(0x7f0000000000)={0xefa, 0x9, 0x1, 0x4, 0x8, 0x1f, 0x0, 0x8}, &(0x7f0000000040)={0x0, 0x6, 0x7ff, 0x7fff, 0x9, 0x1, 0x40, 0x70000000}, &(0x7f00000000c0)={0x35b, 0x4, 0x9, 0x20, 0x0, 0x0, 0x4, 0x3}, &(0x7f0000000100), &(0x7f0000000180)={&(0x7f0000000140)={[0xff]}, 0x8}) 10:10:38 executing program 2: r0 = syz_genetlink_get_family_id$tipc(&(0x7f0000000080), 0xffffffffffffffff) sendmsg$TIPC_CMD_GET_NETID(0xffffffffffffffff, &(0x7f0000000140)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f0000000100)={&(0x7f00000000c0)={0x1c, r0, 0x8, 0x70bd26, 0x25dfdbfb, {}, ["", "", "", "", ""]}, 0x1c}, 0x1, 0x0, 0x0, 0x20000000}, 0x884) openat$dir(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x1b3804, 0x8) 10:10:38 executing program 4: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000040)={0x2, &(0x7f0000000000)=[{0x25, 0x6}, {}]}) 10:10:38 executing program 5: clock_nanosleep(0x54fb6926d29f01ef, 0x0, &(0x7f0000000080)={0x0, 0x989680}, 0x0) add_key$keyring(0x0, &(0x7f00000000c0)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffd) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000003c0)) clock_settime(0x6, &(0x7f0000000000)) 10:10:38 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000040)={0x2, &(0x7f0000000000)=[{0x15, 0x0, 0x74}, {}]}) 10:10:38 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext3\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x2000000, 0x0, 0x0, &(0x7f0000000480)=ANY=[@ANYBLOB='lazytime,test_dummy_encryption,max_dir_size_kb=0x000000000200,grpjquota=,min_batch_time=0x00000000000003ff,rootcontext\a']) 10:10:38 executing program 4: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000040)={0x2, &(0x7f0000000000)=[{0x25, 0x7}, {}]}) 10:10:38 executing program 1: syz_mount_image$ext4(&(0x7f0000000480)='ext3\x00', &(0x7f00000004c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000007c0)={[], [{@fscontext={'fscontext', 0x3d, 'sysadm_u'}}, {@defcontext={'defcontext', 0x3d, 'staff_u'}}]}) r0 = openat$dir(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x400, 0x12) faccessat(r0, &(0x7f0000000040)='./file0\x00', 0x35) 10:10:38 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000040)={0x2, &(0x7f0000000000)=[{0x15, 0x0, 0x94}, {}]}) 10:10:38 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext3\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x20100000, 0x0, 0x0, &(0x7f0000000480)=ANY=[@ANYBLOB='lazytime,test_dummy_encryption,max_dir_size_kb=0x000000000200,grpjquota=,min_batch_time=0x00000000000003ff,rootcontext\a']) 10:10:38 executing program 5: clock_nanosleep(0x54fb6926d29f01ef, 0x0, &(0x7f0000000080)={0x0, 0x989680}, 0x0) clock_gettime(0x5, &(0x7f0000000000)) 10:10:38 executing program 2: syz_mount_image$ext4(0x0, &(0x7f0000000440)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) openat$dir(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0xb0000, 0x0) r0 = openat$vcsu(0xffffffffffffff9c, &(0x7f0000000000), 0x5200, 0x0) fchmodat(r0, &(0x7f0000000040)='./file0\x00', 0x1b0) r1 = openat$incfs(r0, &(0x7f00000002c0)='.log\x00', 0x25a201, 0x81) r2 = openat$vcsu(0xffffffffffffff9c, &(0x7f0000000340), 0x301, 0x0) ioctl$PTP_ENABLE_PPS(r2, 0x40043d04, 0x1) syz_genetlink_get_family_id$fou(&(0x7f0000000300), r2) renameat2(r1, &(0x7f0000000380)='./file0\x00', 0xffffffffffffffff, &(0x7f00000003c0)='./file1\x00', 0x0) r3 = openat$ptp0(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) ioctl$PTP_EXTTS_REQUEST(r3, 0x40103d02, &(0x7f00000000c0)) ioctl$PTP_PIN_SETFUNC2(r3, 0x40603d10, &(0x7f0000000080)={'\x00', 0x6, 0x2, 0x3ff}) setsockopt$packet_int(r1, 0x107, 0x1f, &(0x7f0000000040)=0x43, 0x4) 10:10:38 executing program 4: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000040)={0x2, &(0x7f0000000000)=[{0x25, 0x9}, {}]}) 10:10:38 executing program 1: r0 = add_key$fscrypt_v1(&(0x7f0000000140), &(0x7f0000000180)={'fscrypt:', @desc3}, &(0x7f00000001c0)={0x0, "0833d49913c0c433bc01a956e91c9c98baab4829cbce55d5263d203e60eac0ee7dd14def262b9a66ad0c1b9c814e3f0457ec9b71a49d8803b201994f3fec991f", 0x15}, 0x48, 0xfffffffffffffffc) r1 = add_key$keyring(&(0x7f0000000080), &(0x7f00000000c0)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$KEYCTL_MOVE(0x1e, r1, 0x0, 0x0, 0x0) add_key$keyring(&(0x7f0000000240), &(0x7f0000000280)={'syz', 0x1}, 0x0, 0x0, r0) keyctl$KEYCTL_MOVE(0x1e, 0x0, r0, r1, 0x0) getresuid(&(0x7f0000000000), &(0x7f0000000040), &(0x7f0000000080)=0x0) syz_mount_image$ext4(&(0x7f0000000100)='ext3\x00', &(0x7f00000004c0)='./file0\x00', 0x20, 0x0, 0x0, 0x0, &(0x7f00000000c0)={[], [{@uid_eq={'uid', 0x3d, r2}}, {@defcontext={'defcontext', 0x3d, 'user_u'}}]}) 10:10:38 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000040)={0x2, &(0x7f0000000000)=[{0x15, 0x0, 0xb1}, {}]}) 10:10:38 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext3\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x22000000, 0x0, 0x0, &(0x7f0000000480)=ANY=[@ANYBLOB='lazytime,test_dummy_encryption,max_dir_size_kb=0x000000000200,grpjquota=,min_batch_time=0x00000000000003ff,rootcontext\a']) 10:10:38 executing program 5: clock_nanosleep(0x54fb6926d29f01ef, 0x0, &(0x7f0000000080)={0x0, 0x989680}, 0x0) clock_gettime(0x0, &(0x7f0000000000)={0x0, 0x0}) clock_nanosleep(0x4, 0x0, &(0x7f0000000040)={r0, r1+60000000}, 0x0) 10:10:38 executing program 4: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000040)={0x2, &(0x7f0000000000)=[{0x25, 0x15}, {}]}) 10:10:38 executing program 2: r0 = openat$vcsu(0xffffffffffffff9c, &(0x7f0000000340), 0x301, 0x0) ioctl$PTP_ENABLE_PPS(r0, 0x40043d04, 0x1) sendmsg$TIPC_CMD_SET_LINK_PRI(r0, &(0x7f0000000140)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f0000000100)={&(0x7f0000000080)={0x68, 0x0, 0x400, 0x70bd2c, 0x25dfdbfc, {{}, {}, {0x4c, 0x18, {0x2, @link='syz1\x00'}}}, ["", "", ""]}, 0x68}, 0x1, 0x0, 0x0, 0x4040814}, 0x10) syz_mount_image$ext4(0x0, &(0x7f0000000440)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) openat$dir(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0xb0000, 0x0) 10:10:38 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000040)={0x2, &(0x7f0000000000)=[{0x15}, {}]}) 10:10:38 executing program 1: syz_mount_image$ext4(&(0x7f0000000480)='ext3\x00', &(0x7f00000004c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000180)=ANY=[@ANYBLOB="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"]) 10:10:38 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext3\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x8cffffff, 0x0, 0x0, &(0x7f0000000480)=ANY=[@ANYBLOB='lazytime,test_dummy_encryption,max_dir_size_kb=0x000000000200,grpjquota=,min_batch_time=0x00000000000003ff,rootcontext\a']) 10:10:39 executing program 4: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000040)={0x2, &(0x7f0000000000)=[{0x25, 0x16}, {}]}) 10:10:39 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext3\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0xc0ed0000, 0x0, 0x0, &(0x7f0000000480)=ANY=[@ANYBLOB='lazytime,test_dummy_encryption,max_dir_size_kb=0x000000000200,grpjquota=,min_batch_time=0x00000000000003ff,rootcontext\a']) 10:10:39 executing program 1: syz_mount_image$ext4(&(0x7f0000000480)='ext3\x00', &(0x7f00000004c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000007c0)={[], [{@fscontext={'fscontext', 0x3d, 'sysadm_u'}}, {@defcontext={'defcontext', 0x3d, 'staff_u'}}]}) r0 = openat$vcsu(0xffffffffffffff9c, &(0x7f0000000000), 0x5200, 0x0) fchmodat(r0, &(0x7f0000000040)='./file0\x00', 0x1b0) openat$incfs(r0, &(0x7f00000002c0)='.log\x00', 0x581200, 0x123) accept4$packet(r0, &(0x7f0000000400)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000000440)=0x14, 0x100000) unlinkat(r0, &(0x7f0000000000)='./file0\x00', 0x0) 10:10:39 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000040)={0x2, &(0x7f0000000000)=[{0x15, 0x0, 0x0, 0x2}, {}]}) 10:10:39 executing program 2: syz_mount_image$ext4(0x0, &(0x7f0000000440)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r0 = openat$vcsu(0xffffffffffffff9c, &(0x7f0000000000), 0x5200, 0x0) fchmodat(r0, &(0x7f0000000040)='./file0\x00', 0x1b0) openat$incfs(r0, &(0x7f00000002c0)='.log\x00', 0x581200, 0x123) accept4$packet(r0, &(0x7f0000000400)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000000440)=0x14, 0x100000) execveat(r0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000100)=[&(0x7f0000000080)='\\;\x00', &(0x7f00000000c0)='/*\x96\x00'], &(0x7f0000000200)=[&(0x7f0000000140)='-\xaf@\x00', &(0x7f0000000180)='-}\x00', &(0x7f00000001c0)='\x00'], 0x1000) openat$dir(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0xb0000, 0x0) 10:10:39 executing program 4: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000040)={0x2, &(0x7f0000000000)=[{0x25, 0x1d}, {}]}) 10:10:39 executing program 5: clock_nanosleep(0x54fb6926d29f01ef, 0x0, &(0x7f0000000080)={0x0, 0x989680}, 0x0) pselect6(0x40, &(0x7f00000001c0)={0xfbe, 0xb896, 0x8001, 0x0, 0x21ba, 0x2, 0x8001, 0x9}, &(0x7f0000000200)={0x3, 0x90b, 0x2, 0x7, 0x9, 0x1, 0x45, 0x200}, &(0x7f0000000240)={0x9, 0x0, 0x1f, 0xfffffffffffffffd, 0x2, 0x10000, 0x2}, &(0x7f0000000280), &(0x7f0000000300)={&(0x7f00000002c0)={[0x9]}, 0x8}) r0 = getpid() sched_rr_get_interval(r0, &(0x7f0000000000)) r1 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NL802154_CMD_SET_ACKREQ_DEFAULT(r1, &(0x7f0000000180)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f0000000140)={&(0x7f00000000c0)={0x54, 0x0, 0x200, 0x70bd2c, 0x25dfdbfd, {}, [@NL802154_ATTR_WPAN_DEV={0xc, 0x6, 0x3}, @NL802154_ATTR_ACKREQ_DEFAULT={0x5, 0x1a, 0x3}, @NL802154_ATTR_WPAN_DEV={0xc, 0x6, 0x3}, @NL802154_ATTR_ACKREQ_DEFAULT={0x5, 0x1a, 0x1}, @NL802154_ATTR_WPAN_DEV={0xc, 0x6, 0x100000001}, @NL802154_ATTR_WPAN_DEV={0xc, 0x6, 0x300000003}]}, 0x54}}, 0xc881) 10:10:39 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext3\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0xf6ffffff, 0x0, 0x0, &(0x7f0000000480)=ANY=[@ANYBLOB='lazytime,test_dummy_encryption,max_dir_size_kb=0x000000000200,grpjquota=,min_batch_time=0x00000000000003ff,rootcontext\a']) 10:10:39 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext3\x00', &(0x7f00000004c0)='./file0\x00', 0x20000000000000, 0x0, 0x0, 0x8001, &(0x7f0000000500)=ANY=[@ANYBLOB='dax,min_batch_time=0x0000000000000001,noblock_validity,jqfmt=vfsv0,debug,grpid,dioread_nolock,uid<', @ANYRESDEC=0xee00, @ANYBLOB="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"]) r0 = openat$dir(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x220900, 0x80) openat$incfs(r0, &(0x7f00000000c0)='.pending_reads\x00', 0x400400, 0x1) ioctl$FS_IOC_GET_ENCRYPTION_KEY_STATUS(0xffffffffffffffff, 0xc080661a, &(0x7f0000000100)={@desc={0x1, 0x0, @desc1}}) r1 = openat$vcsu(0xffffffffffffff9c, &(0x7f00000001c0), 0x400, 0x0) ioctl$FS_IOC_GET_ENCRYPTION_KEY_STATUS(r1, 0xc080661a, &(0x7f0000000200)={@desc={0x1, 0x0, @auto="2cb31ff3adde82ae"}}) symlinkat(&(0x7f0000000080)='./file0\x00', r0, &(0x7f0000000180)='./file0\x00') 10:10:39 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000040)={0x2, &(0x7f0000000000)=[{0x15, 0x0, 0x0, 0x3}, {}]}) 10:10:39 executing program 2: r0 = syz_genetlink_get_family_id$tipc(&(0x7f0000000080), 0xffffffffffffffff) sendmsg$TIPC_CMD_GET_BEARER_NAMES(0xffffffffffffffff, &(0x7f0000000140)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x1}, 0xc, &(0x7f0000000180)={&(0x7f00000000c0)={0x1c, r0, 0x300, 0x70bd26, 0x25dfdbff, {}, ["", "", "", ""]}, 0x1c}, 0x1, 0x0, 0x0, 0x40}, 0x4895) syz_mount_image$ext4(0x0, &(0x7f0000000440)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) openat$dir(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0xb0000, 0x0) 10:10:39 executing program 4: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000040)={0x2, &(0x7f0000000000)=[{0x25, 0x25}, {}]}) 10:10:39 executing program 5: r0 = openat$ptp0(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) ioctl$PTP_PEROUT_REQUEST2(r0, 0x40383d0c, &(0x7f0000000000)={{0x9, 0x9}, {0x7f, 0x4}, 0x7f, 0x1}) ioctl$PTP_EXTTS_REQUEST(r0, 0x40103d02, &(0x7f00000000c0)) ioctl$PTP_SYS_OFFSET_EXTENDED(r0, 0xc4c03d09, &(0x7f00000000c0)={0x3}) clock_nanosleep(0x54fb6926d29f01ef, 0x0, &(0x7f0000000080)={0x0, 0x989680}, 0x0) 10:10:39 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext3\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0xfeffffff, 0x0, 0x0, &(0x7f0000000480)=ANY=[@ANYBLOB='lazytime,test_dummy_encryption,max_dir_size_kb=0x000000000200,grpjquota=,min_batch_time=0x00000000000003ff,rootcontext\a']) 10:10:39 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000040)={0x2, &(0x7f0000000000)=[{0x15, 0x0, 0x0, 0x5}, {}]}) 10:10:39 executing program 1: r0 = syz_mount_image$ext4(&(0x7f0000000480)='ext3\x00', &(0x7f00000004c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000007c0)={[], [{@fscontext={'fscontext', 0x3d, 'sysadm_u'}}, {@defcontext={'defcontext', 0x3d, 'staff_u'}}]}) getdents(r0, &(0x7f0000000000)=""/52, 0x34) r1 = syz_genetlink_get_family_id$nbd(&(0x7f0000000140), 0xffffffffffffffff) r2 = openat$vcsu(0xffffffffffffff9c, &(0x7f0000000340), 0x301, 0x0) ioctl$PTP_ENABLE_PPS(r2, 0x40043d04, 0x1) r3 = openat$vcsu(0xffffffffffffff9c, &(0x7f0000000000), 0x5200, 0x0) fchmodat(r3, &(0x7f0000000040)='./file0\x00', 0x1b0) r4 = openat$incfs(r3, &(0x7f00000002c0)='.log\x00', 0x581200, 0x123) syz_genetlink_get_family_id$fou(&(0x7f0000000300), r4) renameat2(r4, &(0x7f0000000380)='./file0\x00', 0xffffffffffffffff, &(0x7f00000003c0)='./file1\x00', 0x0) sendmsg$NBD_CMD_CONNECT(0xffffffffffffffff, &(0x7f0000000200)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x40}, 0xc, &(0x7f00000001c0)={&(0x7f0000000180)={0x38, r1, 0x20, 0x70bd26, 0x25dfdbff, {}, [@NBD_ATTR_SOCKETS={0x24, 0x7, 0x0, 0x1, [{0x8, 0x1, r2}, {0x8}, {0x8}, {0x8, 0x1, r4}]}]}, 0x38}, 0x1, 0x0, 0x0, 0x4000004}, 0x0) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY_ALL_USERS(r0, 0xc0406619, &(0x7f0000000040)={@id={0x2, 0x0, @auto="9c286da67ac9d94992727bbf82f04258"}}) r5 = openat$vcsu(0xffffffffffffff9c, &(0x7f0000000340), 0x301, 0x0) ioctl$PTP_ENABLE_PPS(r5, 0x40043d04, 0x1) symlinkat(&(0x7f0000000080)='./file0\x00', r5, &(0x7f00000000c0)='./file0\x00') 10:10:39 executing program 2: syz_mount_image$ext4(0x0, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 10:10:39 executing program 4: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000040)={0x2, &(0x7f0000000000)=[{0x25, 0x28}, {}]}) 10:10:39 executing program 5: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl802154(&(0x7f0000000040), 0xffffffffffffffff) r2 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX_802154(r0, 0x8933, &(0x7f0000000380)={'wpan1\x00', 0x0}) sendmsg$NL802154_CMD_SET_MAX_CSMA_BACKOFFS(r2, &(0x7f0000000480)={&(0x7f0000000340)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f0000000440)={&(0x7f00000003c0)={0x58, r1, 0x100, 0x70bd28, 0x25dfdbfc, {}, [@NL802154_ATTR_IFINDEX={0x8}, @NL802154_ATTR_WPAN_DEV={0xc}, @NL802154_ATTR_WPAN_DEV={0xc, 0x6, 0x100000001}, @NL802154_ATTR_WPAN_DEV={0xc, 0x6, 0x200000002}, @NL802154_ATTR_IFINDEX={0x8}, @NL802154_ATTR_MAX_CSMA_BACKOFFS={0x5, 0x12, 0xd9}, @NL802154_ATTR_IFINDEX={0x8, 0x3, r3}]}, 0x58}, 0x1, 0x0, 0x0, 0x9043430fbed00cd1}, 0x4) ioctl$sock_SIOCGIFINDEX_802154(0xffffffffffffffff, 0x8933, &(0x7f00000000c0)={'wpan4\x00', 0x0}) sendmsg$NL802154_CMD_NEW_SEC_LEVEL(r2, &(0x7f0000000580)={&(0x7f00000004c0)={0x10, 0x0, 0x0, 0x4000000}, 0xc, &(0x7f0000000540)={&(0x7f0000000500)={0x28, r1, 0x200, 0x70bd26, 0x25dfdbfc, {}, [@NL802154_ATTR_IFINDEX={0x8, 0x3, r3}, @NL802154_ATTR_SEC_LEVEL={0xc, 0x22, 0x0, 0x1, [@NL802154_SECLEVEL_ATTR_DEV_OVERRIDE={0x5, 0x4, 0x1}]}]}, 0x28}, 0x1, 0x0, 0x0, 0x14404}, 0x40) sendmsg$NL802154_CMD_DEL_SEC_DEVKEY(r0, &(0x7f0000000300)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x400}, 0xc, &(0x7f00000002c0)={&(0x7f0000000100)={0x1a0, r1, 0x200, 0x70bd28, 0x25dfdbfb, {}, [@NL802154_ATTR_SEC_DEVKEY={0xa8, 0x24, 0x0, 0x1, [@NL802154_DEVKEY_ATTR_EXTENDED_ADDR={0xc, 0x2, {0xaaaaaaaaaaaa0202}}, @NL802154_DEVKEY_ATTR_ID={0x24, 0x3, 0x0, 0x1, [@NL802154_KEY_ID_ATTR_SOURCE_EXTENDED={0xc, 0x5, 0xffffffffffff9291}, @NL802154_KEY_ID_ATTR_SOURCE_SHORT={0x8, 0x4, 0xffff}, @NL802154_KEY_ID_ATTR_SOURCE_EXTENDED={0xc, 0x5, 0x7e7}]}, @NL802154_DEVKEY_ATTR_EXTENDED_ADDR={0xc, 0x2, {0xaaaaaaaaaaaa0202}}, @NL802154_DEVKEY_ATTR_EXTENDED_ADDR={0xc}, @NL802154_DEVKEY_ATTR_ID={0x48, 0x3, 0x0, 0x1, [@NL802154_KEY_ID_ATTR_SOURCE_EXTENDED={0xc, 0x5, 0x6}, @NL802154_KEY_ID_ATTR_SOURCE_EXTENDED={0xc}, @NL802154_KEY_ID_ATTR_INDEX={0x5, 0x2, 0x3}, @NL802154_KEY_ID_ATTR_INDEX={0x5}, @NL802154_KEY_ID_ATTR_SOURCE_EXTENDED={0xc}, @NL802154_KEY_ID_ATTR_INDEX={0x5}, @NL802154_KEY_ID_ATTR_INDEX={0x5, 0x2, 0x3}]}, @NL802154_DEVKEY_ATTR_FRAME_COUNTER={0x8, 0x1, 0x8}, @NL802154_DEVKEY_ATTR_EXTENDED_ADDR={0xc, 0x2, {0xaaaaaaaaaaaa0002}}]}, @NL802154_ATTR_IFINDEX={0x8}, @NL802154_ATTR_SEC_DEVKEY={0x9c, 0x24, 0x0, 0x1, [@NL802154_DEVKEY_ATTR_FRAME_COUNTER={0x8, 0x1, 0x8000}, @NL802154_DEVKEY_ATTR_EXTENDED_ADDR={0xc, 0x2, {0xaaaaaaaaaaaa0102}}, @NL802154_DEVKEY_ATTR_ID={0x14, 0x3, 0x0, 0x1, [@NL802154_KEY_ID_ATTR_MODE={0x8, 0x1, 0x3}, @NL802154_KEY_ID_ATTR_SOURCE_SHORT={0x8, 0x4, 0x8b9c}]}, @NL802154_DEVKEY_ATTR_ID={0xc, 0x3, 0x0, 0x1, [@NL802154_KEY_ID_ATTR_SOURCE_SHORT={0x8, 0x4, 0x200}]}, @NL802154_DEVKEY_ATTR_ID={0x18, 0x3, 0x0, 0x1, [@NL802154_KEY_ID_ATTR_MODE={0x8}, @NL802154_KEY_ID_ATTR_SOURCE_EXTENDED={0xc, 0x5, 0x1}]}, @NL802154_DEVKEY_ATTR_FRAME_COUNTER={0x8, 0x1, 0x8}, @NL802154_DEVKEY_ATTR_EXTENDED_ADDR={0xc, 0x2, {0x5555555555550101}}, @NL802154_DEVKEY_ATTR_ID={0x38, 0x3, 0x0, 0x1, [@NL802154_KEY_ID_ATTR_IMPLICIT={0x14, 0x3, 0x0, 0x1, [@NL802154_DEV_ADDR_ATTR_PAN_ID={0x6, 0x1, 0x1}, @NL802154_DEV_ADDR_ATTR_PAN_ID={0x6, 0x1, 0x3}]}, @NL802154_KEY_ID_ATTR_SOURCE_SHORT={0x8}, @NL802154_KEY_ID_ATTR_SOURCE_SHORT={0x8, 0x4, 0x3ad}, @NL802154_KEY_ID_ATTR_MODE={0x8, 0x1, 0x3}, @NL802154_KEY_ID_ATTR_INDEX={0x5, 0x2, 0x3}]}]}, @NL802154_ATTR_WPAN_DEV={0xc}, @NL802154_ATTR_IFINDEX={0x8}, @NL802154_ATTR_IFINDEX={0x8, 0x3, r4}, @NL802154_ATTR_WPAN_DEV={0xc, 0x6, 0x200000002}, @NL802154_ATTR_WPAN_DEV={0xc, 0x6, 0x200000002}, @NL802154_ATTR_WPAN_DEV={0xc, 0x6, 0x2}]}, 0x1a0}}, 0x40004) clock_nanosleep(0x54fb6926d29f01ef, 0x0, &(0x7f0000000080)={0x0, 0x989680}, 0x0) 10:10:39 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000040)={0x2, &(0x7f0000000000)=[{0x15, 0x0, 0x0, 0x6}, {}]}) 10:10:39 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext3\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0xffffff8c, 0x0, 0x0, &(0x7f0000000480)=ANY=[@ANYBLOB='lazytime,test_dummy_encryption,max_dir_size_kb=0x000000000200,grpjquota=,min_batch_time=0x00000000000003ff,rootcontext\a']) 10:10:39 executing program 2: r0 = syz_mount_image$ext4(0x0, &(0x7f0000000440)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) openat$dir(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0xb0000, 0x0) fchmodat(r0, &(0x7f0000000040)='./file0\x00', 0x40) 10:10:39 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext3\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0xfffffff6, 0x0, 0x0, &(0x7f0000000480)=ANY=[@ANYBLOB='lazytime,test_dummy_encryption,max_dir_size_kb=0x000000000200,grpjquota=,min_batch_time=0x00000000000003ff,rootcontext\a']) 10:10:39 executing program 4: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000040)={0x2, &(0x7f0000000000)=[{0x25, 0x29}, {}]}) 10:10:39 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000040)={0x2, &(0x7f0000000000)=[{0x15, 0x0, 0x0, 0x7}, {}]}) 10:10:39 executing program 2: r0 = syz_mount_image$ext4(0x0, &(0x7f0000000440)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) execveat(r0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000180)=[&(0x7f0000000080)='N\x00', &(0x7f00000000c0)='.):-A\\(&\x00', &(0x7f0000000100)='\x00', &(0x7f0000000140)='#-^\x00'], &(0x7f0000000380)=[&(0x7f00000001c0)=':+!{.u,--(\x00', &(0x7f0000000200)='(\x84]-\x00', &(0x7f0000000240)='(]*\x00', &(0x7f0000000280)='\x9b$\x00', &(0x7f00000002c0)='&\x00', &(0x7f0000000300)='\x00', &(0x7f0000000340)='&)\x00'], 0x400) openat$dir(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0xb0000, 0x0) 10:10:39 executing program 1: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = openat$vcsu(0xffffffffffffff9c, &(0x7f0000000000), 0x5200, 0x0) fchmodat(r1, &(0x7f0000000040)='./file0\x00', 0x1b0) r2 = openat$incfs(r1, &(0x7f00000002c0)='.log\x00', 0x581200, 0x123) syz_genetlink_get_family_id$fou(&(0x7f0000000300), r2) renameat2(r2, &(0x7f0000000380)='./file0\x00', 0xffffffffffffffff, &(0x7f00000003c0)='./file1\x00', 0x0) r3 = openat$vcsu(0xffffffffffffff9c, &(0x7f0000000000), 0x5200, 0x0) fchmodat(r3, &(0x7f0000000040)='./file0\x00', 0x1b0) openat$incfs(r3, &(0x7f00000002c0)='.log\x00', 0x581200, 0x123) accept4$packet(r3, &(0x7f0000000400)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000000440)=0x14, 0x100000) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000500)={0xffffffffffffffff}) sendmsg$NBD_CMD_DISCONNECT(0xffffffffffffffff, &(0x7f0000000600)={&(0x7f00000003c0)={0x10, 0x0, 0x0, 0x4}, 0xc, &(0x7f00000005c0)={&(0x7f0000000540)={0x60, 0x0, 0x8, 0x70bd26, 0x25dfdbfb, {}, [@NBD_ATTR_SOCKETS={0x4c, 0x7, 0x0, 0x1, [{0x8}, {0x8}, {0x8}, {0x8, 0x1, r2}, {0x8, 0x1, r3}, {0x8}, {0x8}, {0x8, 0x1, r4}, {0x8}]}]}, 0x60}, 0x1, 0x0, 0x0, 0x20040810}, 0x8040) r5 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NBD_CMD_CONNECT(r5, &(0x7f00000013c0)={&(0x7f00000012c0), 0xc, &(0x7f0000001380)={0x0}}, 0xc6c3dbe86af1a089) r6 = syz_genetlink_get_family_id$nl802154(&(0x7f0000000280), r0) sendmsg$NL802154_CMD_NEW_SEC_KEY(r5, &(0x7f0000000380)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x1}, 0xc, &(0x7f0000000340)={&(0x7f00000002c0)={0x74, r6, 0x4, 0x70bd2b, 0x25dfdbfe, {}, [@NL802154_ATTR_WPAN_DEV={0xc}, @NL802154_ATTR_IFINDEX={0x8}, @NL802154_ATTR_SEC_KEY={0x4c, 0x25, 0x0, 0x1, [@NL802154_KEY_ATTR_USAGE_CMDS={0x24, 0x3, "fc2197a8466d0b9037d492d9b267912891ec868c583832d098c0a932564f03bf"}, @NL802154_KEY_ATTR_BYTES={0x14, 0x4, "06484a442f0108c25a11d729d903c834"}, @NL802154_KEY_ATTR_USAGE_FRAMES={0x5, 0x2, 0x40}, @NL802154_KEY_ATTR_USAGE_FRAMES={0x5, 0x2, 0x7f}]}]}, 0x74}, 0x1, 0x0, 0x0, 0x40004}, 0x800) sendmsg$NBD_CMD_CONNECT(r0, &(0x7f00000013c0)={&(0x7f00000012c0), 0xc, &(0x7f0000001380)={0x0}}, 0xc6c3dbe86af1a089) sendmsg$NL802154_CMD_SET_CHANNEL(r0, &(0x7f0000000100)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f00000000c0)={&(0x7f0000000080)={0x1c, 0x0, 0x4, 0x70bd2c, 0x25dfdbfe, {}, [@NL802154_ATTR_WPAN_PHY={0x8}]}, 0x1c}, 0x1, 0x0, 0x0, 0x44001}, 0x4048080) r7 = syz_mount_image$ext4(&(0x7f0000000480)='ext3\x00', &(0x7f00000004c0)='./file0\x00', 0x0, 0x0, 0x0, 0x200004, &(0x7f0000000140)=ANY=[@ANYBLOB="6673636f6e746578743d7300c5000005000000000018b23926e03415570c9a2377fa9e4edbfbdbf59553d9d54d0bfa871ebbeb2378e09cf5f19c39ece3b9e0ebf780f8ddd2eb2ebe5e341b52e105a8e8c938559ede5258f9ee9135710f11edc4497fc6b560b7ad79247b7110a5366681b7208081703415299e3b65c0de9264d02927aa3a6a3c1fb79d24f2ea87f7a1caaf1d1b3318301c0b3581f06667b58ff233000a4e5ed80ad59e0fafb33b897c760200000000000000005365baaac88fbf85f169434b3b511cfd98a7d75ea51c9fd315f2a30b19fa530999fdd0b1614673073a0c0000000000"]) fchmodat(r7, &(0x7f0000000000)='./file0\x00', 0x20) 10:10:39 executing program 5: r0 = getpid() sched_rr_get_interval(r0, &(0x7f0000000080)) ptrace$setregset(0x4205, r0, 0x1, &(0x7f0000000040)={&(0x7f0000000000)="a8fa03d47ce62cc1d69028179f8e59b237170a9d64f767b9dd0d6e8c22ae1094758a", 0x22}) sendmsg$TIPC_CMD_GET_NODES(0xffffffffffffffff, &(0x7f00000001c0)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f0000000180)={&(0x7f0000000140)={0x1c, 0x0, 0x400, 0x70bd2d, 0x25dfdbfe, {}, ["", "", "", "", "", "", "", ""]}, 0x1c}, 0x1, 0x0, 0x0, 0x4000844}, 0x44011) openat$incfs(0xffffffffffffff9c, &(0x7f00000000c0)='.pending_reads\x00', 0x20100, 0x21) wait4(0x0, &(0x7f0000000200), 0x40000000, 0x0) r1 = getpgrp(r0) sched_getscheduler(r1) 10:10:39 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000040)={0x2, &(0x7f0000000000)=[{0x15, 0x0, 0x0, 0x9}, {}]}) 10:10:39 executing program 2: r0 = shmat(0x0, &(0x7f0000ffc000/0x4000)=nil, 0x5000) shmdt(r0) shmdt(r0) r1 = syz_mount_image$ext4(0x0, &(0x7f0000000440)='./file0\x00', 0x1f, 0x0, 0x0, 0xa65c5e, 0x0) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY_ALL_USERS(r1, 0xc0406619, &(0x7f0000000040)={@desc={0x1, 0x0, @desc3}}) openat$dir(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0xb0000, 0x0) 10:10:39 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext3\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0xfffffffe, 0x0, 0x0, &(0x7f0000000480)=ANY=[@ANYBLOB='lazytime,test_dummy_encryption,max_dir_size_kb=0x000000000200,grpjquota=,min_batch_time=0x00000000000003ff,rootcontext\a']) 10:10:39 executing program 4: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000040)={0x2, &(0x7f0000000000)=[{0x25, 0x2d}, {}]}) 10:10:39 executing program 5: clock_gettime(0x0, &(0x7f0000000040)) clock_nanosleep(0x0, 0x0, &(0x7f0000000000)={0x0, 0x989680}, 0x0) clock_gettime(0x0, &(0x7f0000000080)={0x0, 0x0}) clock_nanosleep(0x1, 0x0, &(0x7f00000000c0)={r0, r1+60000000}, &(0x7f0000000100)) 10:10:39 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000040)={0x2, &(0x7f0000000000)=[{0x15, 0x0, 0x0, 0x15}, {}]}) 10:10:39 executing program 1: syz_mount_image$ext4(&(0x7f0000000480)='ext4\x00', &(0x7f00000004c0)='./file0\x00', 0x0, 0x0, 0x0, 0x2080009, &(0x7f0000000040)={[{@journal_async_commit}], [{@smackfsfloor={'smackfsfloor', 0x3d, 'ext4\x00'}}, {@euid_eq={'euid', 0x3d, 0xee01}}]}) 10:10:39 executing program 2: r0 = syz_mount_image$ext4(0x0, &(0x7f0000000440)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) execveat(r0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000140)=[&(0x7f0000000080)='\x18\x00', &(0x7f00000000c0)='\x00', &(0x7f0000000100)='\x00'], &(0x7f0000000300)=[&(0x7f0000000180)='/}\x00', &(0x7f00000001c0)='-)*}.\':\x00', &(0x7f0000000200)='-)).\x00', &(0x7f0000000240)=':%:{-!\'\x00', &(0x7f0000000280)='--@:\x00', &(0x7f00000002c0)=':/<]\xb8^\x00'], 0x800) openat$dir(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0xb0000, 0x2) 10:10:39 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext3\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x8000000000, 0x0, 0x0, &(0x7f0000000480)=ANY=[@ANYBLOB='lazytime,test_dummy_encryption,max_dir_size_kb=0x000000000200,grpjquota=,min_batch_time=0x00000000000003ff,rootcontext\a']) 10:10:39 executing program 4: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000040)={0x2, &(0x7f0000000000)=[{0x25, 0x30}, {}]}) 10:10:39 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000040)={0x2, &(0x7f0000000000)=[{0x15, 0x0, 0x0, 0x16}, {}]}) 10:10:39 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext3\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0xedc000000000, 0x0, 0x0, &(0x7f0000000480)=ANY=[@ANYBLOB='lazytime,test_dummy_encryption,max_dir_size_kb=0x000000000200,grpjquota=,min_batch_time=0x00000000000003ff,rootcontext\a']) 10:10:39 executing program 1: syz_mount_image$ext4(&(0x7f0000000480)='ext3\x00', &(0x7f00000004c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000007c0)=ANY=[@ANYBLOB="6653c0743d63040040006d5f752c643d73746166c5000000000054b600"/39]) rt_sigprocmask(0x73714a8099c70e95, &(0x7f0000000040)={[0xdd]}, &(0x7f0000000080), 0x8) openat$dir(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x107000, 0x212) 10:10:39 executing program 4: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000040)={0x2, &(0x7f0000000000)=[{0x25, 0x34}, {}]}) 10:10:39 executing program 2: syz_mount_image$ext4(0x0, &(0x7f00000000c0)='./file0\x00', 0x10005, 0x0, 0x0, 0x2100010, 0x0) openat$dir(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0xb0000, 0x0) r0 = openat$incfs(0xffffffffffffffff, &(0x7f0000000080)='.log\x00', 0x801, 0x0) r1 = openat$vcsu(0xffffffffffffff9c, &(0x7f0000000000), 0x5200, 0x0) fchmodat(r1, &(0x7f0000000040)='./file0\x00', 0x1b0) r2 = openat$incfs(r1, &(0x7f00000002c0)='.log\x00', 0x581200, 0x123) syz_genetlink_get_family_id$fou(&(0x7f0000000300), r2) renameat2(r2, &(0x7f0000000380)='./file0\x00', 0xffffffffffffffff, &(0x7f00000003c0)='./file1\x00', 0x0) ioctl$SG_GET_REQUEST_TABLE(r2, 0x2286, &(0x7f0000000100)) ioctl$PTP_ENABLE_PPS(r0, 0x40043d04, 0x0) openat$incfs(0xffffffffffffffff, &(0x7f0000000040)='.pending_reads\x00', 0x20000, 0x1) 10:10:39 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000040)={0x2, &(0x7f0000000000)=[{0x15, 0x0, 0x0, 0x1d}, {}]}) 10:10:40 executing program 5: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NL802154_CMD_DEL_SEC_DEVKEY(r0, &(0x7f0000000100)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x10000000}, 0xc, &(0x7f00000000c0)={&(0x7f0000000140)=ANY=[@ANYBLOB='@\x00\x00\x00', @ANYRES16=0x0, @ANYBLOB="00022cbd7000fedbdf251e0000000c00248008000100ffffffff08000300", @ANYRES32=0x0, @ANYBLOB="0c0006090000000000001000000000000000000000000000c722cb28f646d8b1a9a05281ae55fba2816dc4bcd919ef558dce69b44880c7eb32aa1947987bb7bf09ceb65ae3080acab2025685bff5133d174802e081807e8af919c1894d1bb4b1e1297676a5d6a8d08dfe3d9342550e3cae982e40045dc9cac5fc482622e3eaa311a48bc26c2c10be157782b5f1453714b22cac38e0788e054cd4a3ee5b1df77d3f0be0"], 0x40}, 0x1, 0x0, 0x0, 0x400c094}, 0x84) clock_nanosleep(0x54fb6926d29f01ef, 0x0, &(0x7f0000000080)={0x0, 0x989680}, 0x0) 10:10:40 executing program 1: syz_mount_image$ext4(&(0x7f0000000480)='ext3\x00', &(0x7f00000004c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000007c0)={[], [{@fscontext={'fscontext', 0x3d, 'sysadm_u'}}, {@defcontext={'defcontext', 0x3d, 'staff_u'}}]}) r0 = syz_open_dev$sg(&(0x7f0000000000), 0xc2b3, 0x20100) ioctl$SG_GET_TIMEOUT(r0, 0x2202, 0x0) 10:10:40 executing program 4: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000040)={0x2, &(0x7f0000000000)=[{0x25, 0x35}, {}]}) 10:10:40 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext3\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x100000000000000, 0x0, 0x0, &(0x7f0000000480)=ANY=[@ANYBLOB='lazytime,test_dummy_encryption,max_dir_size_kb=0x000000000200,grpjquota=,min_batch_time=0x00000000000003ff,rootcontext\a']) 10:10:40 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000040)={0x2, &(0x7f0000000000)=[{0x15, 0x0, 0x0, 0x25}, {}]}) 10:10:40 executing program 2: syz_mount_image$ext4(0x0, &(0x7f0000000440)='./file0\x00', 0x0, 0x0, 0x0, 0x10020, 0x0) openat$dir(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0xb0000, 0x0) r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NBD_CMD_DISCONNECT(r0, &(0x7f0000000100)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x800}, 0xc, &(0x7f00000000c0)={&(0x7f0000000080)={0x34, 0x0, 0x2, 0x70bd25, 0x25dfdbff, {}, [@NBD_ATTR_INDEX={0x8, 0x1, 0x0}, @NBD_ATTR_BLOCK_SIZE_BYTES={0xc, 0x3, 0xe6db}, @NBD_ATTR_TIMEOUT={0xc, 0x4, 0x1}]}, 0x34}, 0x1, 0x0, 0x0, 0x20000004}, 0x20048085) 10:10:40 executing program 4: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000040)={0x2, &(0x7f0000000000)=[{0x25, 0x3d}, {}]}) 10:10:40 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext3\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x200000000000000, 0x0, 0x0, &(0x7f0000000480)=ANY=[@ANYBLOB='lazytime,test_dummy_encryption,max_dir_size_kb=0x000000000200,grpjquota=,min_batch_time=0x00000000000003ff,rootcontext\a']) 10:10:40 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000040)={0x2, &(0x7f0000000000)=[{0x15, 0x0, 0x0, 0x28}, {}]}) 10:10:40 executing program 4: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000040)={0x2, &(0x7f0000000000)=[{0x25, 0x45}, {}]}) 10:10:40 executing program 2: syz_mount_image$ext4(0x0, &(0x7f0000000440)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) openat$dir(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0xb0000, 0x0) syz_mount_image$ext4(&(0x7f0000000040)='ext2\x00', &(0x7f0000000080)='./file0\x00', 0x1, 0x2, &(0x7f00000000c0)=[{&(0x7f0000000480)="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", 0x1000, 0x7}, {&(0x7f0000001480)="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", 0x1000, 0x2}], 0xa0000, &(0x7f0000000100)={[{@sb={'sb', 0x3d, 0x7fff}}, {@i_version}, {@delalloc}], [{@euid_gt={'euid>', 0xee01}}, {@dont_measure}, {@uid_lt={'uid<', 0xee01}}, {@pcr={'pcr', 0x3d, 0x35}}]}) 10:10:40 executing program 1: getitimer(0x2, &(0x7f0000000000)) syz_mount_image$ext4(&(0x7f0000000480)='ext3\x00', &(0x7f00000004c0)='./file0\x00', 0x0, 0x0, 0x0, 0x1800000, &(0x7f00000007c0)) 10:10:40 executing program 5: clock_nanosleep(0x54fb6926d29f01ef, 0x0, &(0x7f0000000080)={0x0, 0x989680}, 0x0) r0 = fork() sched_rr_get_interval(r0, &(0x7f0000000100)) r1 = fork() sched_rr_get_interval(r1, &(0x7f0000000100)) r2 = getpid() getpid() sched_rr_get_interval(r2, &(0x7f0000000000)) 10:10:40 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000040)={0x2, &(0x7f0000000000)=[{0x15, 0x0, 0x0, 0x2d}, {}]}) 10:10:40 executing program 4: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000040)={0x2, &(0x7f0000000000)=[{0x25, 0x4d}, {}]}) 10:10:40 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext3\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x2010000000000000, 0x0, 0x0, &(0x7f0000000480)=ANY=[@ANYBLOB='lazytime,test_dummy_encryption,max_dir_size_kb=0x000000000200,grpjquota=,min_batch_time=0x00000000000003ff,rootcontext\a']) 10:10:40 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000040)={0x2, &(0x7f0000000000)=[{0x15, 0x0, 0x0, 0x30}, {}]}) [ 1861.827271][T20334] loop2: detected capacity change from 0 to 8 10:10:40 executing program 1: syz_mount_image$ext4(&(0x7f0000000480)='ext3\x00', &(0x7f00000004c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000007c0)={[], [{@fscontext={'fscontext', 0x3d, 'sysadm_u'}}, {@hash}]}) 10:10:40 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext3\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x2200000000000000, 0x0, 0x0, &(0x7f0000000480)=ANY=[@ANYBLOB='lazytime,test_dummy_encryption,max_dir_size_kb=0x000000000200,grpjquota=,min_batch_time=0x00000000000003ff,rootcontext\a']) 10:10:40 executing program 5: r0 = openat$vcsu(0xffffffffffffff9c, &(0x7f0000000000), 0x5200, 0x0) fchmodat(r0, &(0x7f0000000040)='./file0\x00', 0x1b0) openat$incfs(r0, &(0x7f00000002c0)='.log\x00', 0x581200, 0x123) accept4$packet(r0, &(0x7f0000000400)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000000440)=0x14, 0x100000) r1 = syz_genetlink_get_family_id$tipc(&(0x7f0000000100), 0xffffffffffffffff) sendmsg$TIPC_CMD_SET_LINK_PRI(r0, &(0x7f0000000200)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x2}, 0xc, &(0x7f00000001c0)={&(0x7f0000000140)=ANY=[@ANYBLOB="68001100", @ANYRES16=r1, @ANYBLOB="000125bd7000ffdbdf25010000000000000008410000004c00180000000162726f6164636173742d6c696e6b00"/98], 0x68}, 0x1, 0x0, 0x0, 0x44810}, 0x0) clock_gettime(0x0, &(0x7f0000000000)) clock_gettime(0x0, &(0x7f0000000040)) clock_nanosleep(0x1, 0x0, &(0x7f00000000c0), 0x0) 10:10:41 executing program 4: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000040)={0x2, &(0x7f0000000000)=[{0x25, 0x60}, {}]}) [ 1861.923861][T20357] loop2: detected capacity change from 0 to 8 10:10:41 executing program 2: ptrace$peeksig(0x4209, 0x0, &(0x7f0000000040)={0x4, 0x1}, &(0x7f0000000080)) clock_gettime(0x0, &(0x7f0000000080)={0x0, 0x0}) clock_settime(0x0, &(0x7f00000000c0)={r0, r1+60000000}) syz_mount_image$ext4(0x0, &(0x7f0000000440)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) seccomp$SECCOMP_GET_NOTIF_SIZES(0x3, 0x0, &(0x7f0000000100)) openat$dir(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0xb0000, 0x0) 10:10:41 executing program 1: syz_mount_image$ext4(&(0x7f0000000480)='ext3\x00', &(0x7f00000004c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000007c0)=ANY=[@ANYBLOB="6673636f6e746578743d73797361646d5f752c000000000000010078743d737461666e5f752c00"]) 10:10:41 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000040)={0x2, &(0x7f0000000000)=[{0x15, 0x0, 0x0, 0x34}, {}]}) 10:10:41 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext3\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x8cffffff00000000, 0x0, 0x0, &(0x7f0000000480)=ANY=[@ANYBLOB='lazytime,test_dummy_encryption,max_dir_size_kb=0x000000000200,grpjquota=,min_batch_time=0x00000000000003ff,rootcontext\a']) 10:10:41 executing program 4: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000040)={0x2, &(0x7f0000000000)=[{0x25, 0x61}, {}]}) 10:10:41 executing program 5: clock_gettime(0x0, &(0x7f0000000040)) clock_nanosleep(0x5, 0x0, &(0x7f0000000080)={0x0, 0x989680}, 0x0) clock_settime(0x6, &(0x7f0000000000)) 10:10:41 executing program 1: syz_mount_image$ext4(&(0x7f0000000480)='ext3\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x54, 0x0, 0x2a0000, &(0x7f0000000000)) 10:10:41 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000040)={0x2, &(0x7f0000000000)=[{0x15, 0x0, 0x0, 0x35}, {}]}) 10:10:41 executing program 2: ioctl$sock_ipv6_tunnel_SIOCDELTUNNEL(0xffffffffffffffff, 0x89f2, &(0x7f00000003c0)={'ip6_vti0\x00', &(0x7f0000000240)={'ip6_vti0\x00', 0x0, 0x29, 0x80, 0x1, 0x834a, 0x64, @loopback, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x700, 0x40, 0x3}}) r0 = syz_mount_image$ext4(0x0, &(0x7f0000000440)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r1 = syz_mount_image$ext4(&(0x7f0000000080)='ext3\x00', &(0x7f00000000c0)='./file0\x00', 0x5, 0x3, &(0x7f0000000340)=[{&(0x7f0000000100)="85ae54c8af55a5027721bfb7f32e8959967a1a071c83a9b38a59645c52e37f2b39ffc4b8cf1e24eba0c3830c03e1f608cd6053ea4b8ce91b64b88d56ccc081498f0f360e92161d53efd252576932fd142694c6", 0x53, 0x40005}, {&(0x7f0000000180)="cc67e817ecba7a983c503475c88c7f9baf33a04ff0df284919b77ca804bd7583c1370f11", 0x24, 0x2}, {&(0x7f00000001c0)="c9b8e1d95746963ae64313506c1c134258142da8134ef4e85ae37066efa600680e94ca339cf82a399d34e2dcdc583188b4cbb816e0f28f1155187fb7ec8d7dae791162", 0x43, 0x6}], 0x201060, &(0x7f00000002c0)={[{@dioread_nolock}]}) renameat2(r0, &(0x7f0000000040)='./file0\x00', r1, &(0x7f0000000300)='./file0\x00', 0x1) openat$dir(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0xb0000, 0x0) unlinkat(r0, &(0x7f0000000400)='./file0\x00', 0x200) 10:10:41 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext3\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0xf6ffffff00000000, 0x0, 0x0, &(0x7f0000000480)=ANY=[@ANYBLOB='lazytime,test_dummy_encryption,max_dir_size_kb=0x000000000200,grpjquota=,min_batch_time=0x00000000000003ff,rootcontext\a']) 10:10:41 executing program 4: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000040)={0x2, &(0x7f0000000000)=[{0x25, 0x64}, {}]}) 10:10:41 executing program 1: syz_mount_image$ext4(&(0x7f0000000480)='ext3\x00', &(0x7f00000004c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)=ANY=[@ANYBLOB="6673636f6e746578743d73797361646d5f754bbdb3deff62ca3d24dc4342f84c1d66636f6e746578743d73746166ad23e850dacefde4ccf2074b57665f752c00"]) 10:10:41 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000040)={0x2, &(0x7f0000000000)=[{0x15, 0x0, 0x0, 0x3d}, {}]}) [ 1862.254080][T20408] loop2: detected capacity change from 0 to 1024 10:10:41 executing program 4: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000040)={0x2, &(0x7f0000000000)=[{0x25, 0x74}, {}]}) 10:10:41 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext3\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0xfeffffff00000000, 0x0, 0x0, &(0x7f0000000480)=ANY=[@ANYBLOB='lazytime,test_dummy_encryption,max_dir_size_kb=0x000000000200,grpjquota=,min_batch_time=0x00000000000003ff,rootcontext\a']) 10:10:41 executing program 5: getresuid(&(0x7f0000000080)=0x0, &(0x7f00000000c0), &(0x7f0000000100)) setuid(r0) syz_mount_image$ext4(&(0x7f0000000140)='ext3\x00', &(0x7f0000000180)='./file0\x00', 0x3, 0x8, &(0x7f0000000680)=[{&(0x7f00000001c0)="6b6af18f99463dd4ba0d9319c956de9d20bffc7cdb0301b0e6ec0bba1f5afd139cf662d68bc5273038204da9a42cdab3ad3a24e2056bda6ef528", 0x3a, 0x2}, {&(0x7f0000000200)="f5dacaa3e53a8c64f85b29049eeff101167c5ce67dbe774c2e7a4fd9e735a60fca4327ec4a4a532f2301bd60b3a65ffeb975e0db37769681d89672d3a798f6526d1f4c169c0b7ff03cc18930fc3dd9586ba8394f4c02703df97e4809c8cd69efa8fc50707283d794b3cbd5b6bdbdfaafd8b54777b696b447e97fccccd41f0bc154e6534668afdbf1104fa4ded4f794ca1d5b815172ff177827a5aa3e4d3a39919bfd6bb13113da459211b756002a086774f8dbd3663b990b69ca064020858db5ba433049b730853ac4495a85b9ec6ad13dfd3d649db9276d208f", 0xda}, {&(0x7f0000000300)="564c950e451839469e5f9b39d93e1f510b97ceb41a43c2a0881d25e58b110372631a434605d3d30dd6a445408a8243e72d4a5fd4cb4787c8ebb6f18d99d949f92e7059d65b07ecfaec96eaffedce79da2ed7c68179ab7e0a1ff0c0ec19fa45953a418d67bb5e8c3ff2b437d9e9e68a2b224fe160aa3647f1d94bda9ca330edd6e17f8b6c59a28d", 0x87}, {&(0x7f00000003c0)="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", 0xfb, 0x8}, {&(0x7f00000004c0)="e4a6d108f371e05a0a4b692c23893d4ede456b01b0684a2d227770ec7ec15cd23404fec5309499ca30f8105f10ff0b89db865d67a8d0dbb659235a99a412db47504796daac103099241c", 0x4a, 0x2}, {&(0x7f0000000540)="b369e7fbd5e07e479f895aecaf340200758177cb9b60338f571197cd67b9a18079c9f6db2cab0891fe36", 0x2a, 0x1}, {&(0x7f0000000580)="d859acbd08664b27854cf1181ad01724a4bc1df6d15c6f41ae4ed2ba9d1edcaf5134cae09e8309cfb7d4e2413c653e2f3e716dfa7567b54d33e972db634ac416a7e4b6b1b7827ec4", 0x48, 0x7}, {&(0x7f0000000600)="bf8992585045ca2632dbd0737f6db831735253e9daa9a8aca3399884bb86b13baabe5d58ea35c1bf81ab09af559a006374d71a5a0c6c83a4d79e75da8c9e5851d0a0bd9fde71cd2883269703ea0ab6fa5c508af171546327670caa2d0b281831c143f179676e83b0bb2433aef260b6bf237836b3", 0x74, 0x1}], 0x2800, &(0x7f0000000740)={[{@nouser_xattr}], [{@uid_eq={'uid', 0x3d, r0}}, {@permit_directio}, {@appraise_type}, {@subj_user={'subj_user', 0x3d, '+'}}]}) r1 = openat$vcsu(0xffffffffffffff9c, &(0x7f0000000000), 0x5200, 0x0) fchmodat(r1, &(0x7f0000000040)='./file0\x00', 0x1b0) r2 = openat$incfs(r1, &(0x7f00000002c0)='.log\x00', 0x581200, 0x123) syz_genetlink_get_family_id$fou(&(0x7f0000000300), r2) renameat2(r2, &(0x7f0000000380)='./file0\x00', 0xffffffffffffffff, &(0x7f00000003c0)='./file1\x00', 0x0) fchmodat(r2, &(0x7f00000007c0)='./file0/../file0\x00', 0x10) clock_nanosleep(0x7, 0x1, &(0x7f0000000000), 0x0) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY_ALL_USERS(0xffffffffffffff9c, 0xc0406619, &(0x7f0000000040)={@desc={0x1, 0x0, @desc1}}) 10:10:41 executing program 1: syz_mount_image$ext4(&(0x7f0000000480)='ext3\x00', &(0x7f0000000000)='./file0\x00', 0xfffffffffffffffc, 0x0, 0x0, 0x0, &(0x7f0000000100)={[{@debug_want_extra_isize={'debug_want_extra_isize', 0x3d, 0x4}}, {@barrier_val={'barrier', 0x3d, 0x4}}], [{@fscontext={'fscontext', 0x3d, 'user_u'}}, {@defcontext={'defcontext', 0x3d, 'staff_u'}}, {@euid_gt={'euid>', 0xee01}}]}) 10:10:41 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000040)={0x2, &(0x7f0000000000)=[{0x15, 0x0, 0x0, 0x45}, {}]}) [ 1862.361790][T20428] loop2: detected capacity change from 0 to 1024 10:10:41 executing program 4: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000040)={0x2, &(0x7f0000000000)=[{0x25, 0x94}, {}]}) 10:10:41 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext3\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0xffffffff00000000, 0x0, 0x0, &(0x7f0000000480)=ANY=[@ANYBLOB='lazytime,test_dummy_encryption,max_dir_size_kb=0x000000000200,grpjquota=,min_batch_time=0x00000000000003ff,rootcontext\a']) 10:10:41 executing program 2: syz_mount_image$ext4(0x0, &(0x7f0000000440)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r0 = openat$dir(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0xb0000, 0x0) execveat(r0, &(0x7f0000000040)='./file1\x00', &(0x7f0000000200)=[&(0x7f0000000080)='\x00', &(0x7f00000000c0)='#\xd1\x00', &(0x7f0000000100)='-:+\x19\x00', &(0x7f0000000140)='\x00', &(0x7f0000000180)='][-\x00', &(0x7f00000001c0)='*,,#&\x00'], &(0x7f0000000400)=[&(0x7f0000000240)='}!\x00', &(0x7f0000000280)='%{%\\)\xb9$\x00', &(0x7f00000002c0)='\':z\x00', &(0x7f0000000300)='\x00', &(0x7f0000000340)='\x00', &(0x7f0000000380)='&\x00', &(0x7f00000003c0)='[##\x00'], 0x100) 10:10:41 executing program 1: syz_mount_image$ext4(&(0x7f0000000480)='ext3\x00', &(0x7f00000004c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000007c0)=ANY=[@ANYBLOB='fscontext=sysadm_b,defcontext=staff_u,\x00']) 10:10:41 executing program 5: clock_nanosleep(0x54fb6926d29f01ef, 0x0, &(0x7f0000000080)={0x0, 0x989680}, 0x0) clock_nanosleep(0x4, 0x1, &(0x7f0000000000), &(0x7f0000000040)) 10:10:41 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000040)={0x2, &(0x7f0000000000)=[{0x15, 0x0, 0x0, 0x4d}, {}]}) 10:10:41 executing program 4: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000040)={0x2, &(0x7f0000000000)=[{0x25, 0xb1}, {}]}) 10:10:41 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext3\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x2, &(0x7f0000000480)=ANY=[@ANYBLOB='lazytime,test_dummy_encryption,max_dir_size_kb=0x000000000200,grpjquota=,min_batch_time=0x00000000000003ff,rootcontext\a']) 10:10:41 executing program 1: r0 = syz_mount_image$ext4(&(0x7f0000000480)='ext3\x00', &(0x7f00000004c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000007c0)={[], [{@fscontext={'fscontext', 0x3d, 'sysadm_u'}}, {@defcontext={'defcontext', 0x3d, 'staff_u'}}]}) r1 = openat$dir(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x220000, 0x4) faccessat(r1, &(0x7f0000000040)='./file0\x00', 0x58) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY_ALL_USERS(r0, 0xc0406619, &(0x7f0000000080)={@desc={0x1, 0x0, @desc2}}) 10:10:41 executing program 5: clock_nanosleep(0x54fb6926d29f01ef, 0x0, &(0x7f0000000080)={0x0, 0x989680}, 0x0) r0 = fork() sched_rr_get_interval(r0, &(0x7f0000000100)) sched_rr_get_interval(r0, &(0x7f0000000000)) 10:10:41 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000040)={0x2, &(0x7f0000000000)=[{0x15, 0x0, 0x0, 0x60}, {}]}) 10:10:41 executing program 2: r0 = openat$vcsu(0xffffffffffffff9c, &(0x7f0000000400), 0xc01, 0x0) ioctl$PTP_SYS_OFFSET(r0, 0x43403d05, &(0x7f0000000080)={0x8}) syz_mount_image$ext4(0x0, &(0x7f0000000440)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) openat$ptp0(0xffffffffffffff9c, &(0x7f00000003c0), 0x2040, 0x0) openat$dir(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0xb0000, 0x0) 10:10:41 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext3\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x22, &(0x7f0000000480)=ANY=[@ANYBLOB='lazytime,test_dummy_encryption,max_dir_size_kb=0x000000000200,grpjquota=,min_batch_time=0x00000000000003ff,rootcontext\a']) 10:10:41 executing program 4: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000040)={0x2, &(0x7f0000000000)=[{0x25}, {}]}) 10:10:41 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000040)={0x2, &(0x7f0000000000)=[{0x15, 0x0, 0x0, 0x61}, {}]}) 10:10:41 executing program 1: r0 = syz_mount_image$ext4(&(0x7f0000000480)='ext3\x00', &(0x7f00000004c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000007c0)={[], [{@fscontext={'fscontext', 0x3d, 'sysadm_u'}}, {@defcontext={'defcontext', 0x3d, 'staff_u'}}]}) r1 = openat$dir(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x810a81, 0x2) futimesat(r1, &(0x7f0000000040)='./file0\x00', &(0x7f0000000080)={{0x77359400}, {0x0, 0xea60}}) r2 = openat$incfs(r0, &(0x7f0000000140)='.log\x00', 0x204242, 0x80) symlinkat(&(0x7f0000000100)='./file0\x00', r2, &(0x7f0000000180)='./file0\x00') faccessat2(r1, &(0x7f00000000c0)='./file0\x00', 0xf0, 0x0) 10:10:41 executing program 5: clock_nanosleep(0x54fb6926d29f01ef, 0x0, &(0x7f0000000140)={0x0, 0x3938700}, 0x0) clock_gettime(0x0, &(0x7f0000000000)={0x0, 0x0}) clock_gettime(0x7, &(0x7f0000000080)) clock_nanosleep(0x4, 0x1, &(0x7f0000000040)={r0, r1+10000000}, &(0x7f00000000c0)) set_mempolicy(0x4003, &(0x7f0000000100)=0x7ff, 0x5) 10:10:41 executing program 2: syz_mount_image$ext4(0x0, &(0x7f0000000440)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r0 = syz_mount_image$ext4(&(0x7f0000000040)='ext4\x00', &(0x7f0000000080)='./file0\x00', 0x88d7, 0x4, &(0x7f00000003c0)=[{&(0x7f00000000c0)="d54d91b6991ce7f8fe7b26a2144462bc6525c1de16c5d75aff0bc8241a5b1846fcdf038e758b47eb07d7efd49c61fee0249c87c494a86ce0fd0ca81b529e9981598b76121e30abda2b6058c1b651d81d270227c36478a77baf38a795f98ea616891faeb2f9e7ad3009cea76c62e05221ca488ce19b84891b8abc27361cbc7e189b5ebfd0c77c1365c789fdd16a4037c0a54f8f27553dee76c4c64b5a518e1a9df9c42b0d743c971201729e1511ba84187bd200c2dcc16b232be69a7c0fc075a8af48c0a4869e959df58577fb1a3637efd90c6ab43fe55c0120ae9f945f4dab2fc1aac8", 0xe3}, {&(0x7f00000001c0)="24c95359e30c5acb7eac64b99e92223f30f6dd6ead3e3b99f2320efba139c5b0a308e7514b7e954a3c5351ac73699f005fcc933c48539a2f847a156049bdf37b3b4fccbba949fedd2b3b0d20cf72e1454d084681e21b563b8bcfe795985f7f4d0e9884b63a7bf96f8ab442bb139e3afac4f92bfa5b59eff58a97a8fefeb9d8b891df35ba6d10cd225ed85a689449c75988f3154a34efd99aff718de704c342ce88f636b2c6128fa09043aa0d396e5f47b75b294aa34556c7405fa3962a8ea7528a5c537ebe5be482491f29ba8e863aa9726376f9057f6d6e20aa045899fc8c7281af", 0xe2, 0x4}, {&(0x7f00000002c0)="717e9cf233970f0f6580e3b7ef49f33970fc070212aa8804f11269dc0ec9acb2c06a4baffde1d51366c425a62386a0eca36b57a7bf5bc6f3e4a5b750a872eba1161d879761f023c32d24419118128fcdf7da23f9b02b3ea1712d201fd97249598c3f1eb67ca0c2ddc751f4e5b5886988297adf6ae96c612a3acaf2c66114b7009e", 0x81, 0xb726}, {&(0x7f0000000380)="cc31938b", 0x4, 0x1f}], 0x0, &(0x7f0000000480)={[{@nogrpid}, {@nodiscard}, {@abort}, {@noinit_itable}, {@auto_da_alloc_val={'auto_da_alloc', 0x3d, 0x2}}, {@init_itable_val={'init_itable', 0x3d, 0x10001}}, {@max_batch_time={'max_batch_time', 0x3d, 0x7}}, {@init_itable_val}, {@init_itable_val={'init_itable', 0x3d, 0x7}}], [{@smackfshat={'smackfshat', 0x3d, ']'}}, {@fsuuid={'fsuuid', 0x3d, {[0x36, 0x36, 0x30, 0x61, 0x33, 0x0, 0x30, 0x63], 0x2d, [0x66, 0x33, 0x35, 0x30], 0x2d, [0x66, 0x39, 0x35, 0x38], 0x2d, [0x35, 0x0, 0x35, 0x38], 0x2d, [0x63, 0x65, 0x62, 0x32, 0x33, 0x65, 0x36, 0x37]}}}]}) fchmodat(r0, &(0x7f0000000580)='./file0\x00', 0x50) openat$dir(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x3a1c00, 0x43) socket(0x4, 0x6, 0x1) 10:10:41 executing program 4: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000040)={0x2, &(0x7f0000000000)=[{0x25, 0x0, 0x2}, {}]}) 10:10:41 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext3\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x1020, &(0x7f0000000480)=ANY=[@ANYBLOB='lazytime,test_dummy_encryption,max_dir_size_kb=0x000000000200,grpjquota=,min_batch_time=0x00000000000003ff,rootcontext\a']) 10:10:41 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000040)={0x2, &(0x7f0000000000)=[{0x15, 0x0, 0x0, 0x64}, {}]}) 10:10:41 executing program 5: clock_nanosleep(0x5, 0x0, &(0x7f0000000080)={0x0, 0x989680}, 0x0) [ 1862.880099][T20516] loop2: detected capacity change from 0 to 183 10:10:42 executing program 4: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000040)={0x2, &(0x7f0000000000)=[{0x25, 0x0, 0x3}, {}]}) 10:10:42 executing program 5: clock_nanosleep(0x54fb6926d29f01ef, 0x0, &(0x7f0000000080)={0x0, 0x989680}, 0x0) sysfs$1(0x1, &(0x7f00000001c0)='\x00') r0 = syz_genetlink_get_family_id$tipc(&(0x7f0000000240), 0xffffffffffffffff) sendmsg$TIPC_CMD_SHOW_NAME_TABLE(0xffffffffffffffff, &(0x7f0000000300)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f00000002c0)={&(0x7f0000000280)={0x30, r0, 0x400, 0x70bd28, 0x25dfdbfb, {{}, {}, {0x14, 0x19, {0x1, 0x4, 0x1, 0x34e}}}, ["", ""]}, 0x30}, 0x1, 0x0, 0x0, 0x4090}, 0x400c884) r1 = syz_genetlink_get_family_id$netlbl_calipso(&(0x7f0000000400), 0xffffffffffffffff) sendmsg$NLBL_CALIPSO_C_ADD(0xffffffffffffffff, &(0x7f00000004c0)={&(0x7f00000003c0), 0xc, &(0x7f0000000480)={&(0x7f0000000440)={0x24, r1, 0x8, 0x70bd2d, 0x25dfdbfe, {}, [@NLBL_CALIPSO_A_MTYPE={0x8}, @NLBL_CALIPSO_A_MTYPE={0x8}]}, 0x24}, 0x1, 0x0, 0x0, 0x4044040}, 0x20004) clock_gettime(0x0, &(0x7f0000000340)={0x0, 0x0}) clock_gettime(0x4, &(0x7f0000000380)) pselect6(0x40, &(0x7f0000000000)={0x80000001, 0x7, 0x2, 0x6, 0x6, 0x7ff, 0x20, 0x6}, &(0x7f0000000040)={0xe65, 0x53, 0x2, 0x10001, 0x3, 0xfffffffffffffff7, 0x3, 0x7}, &(0x7f00000000c0)={0x59004aac, 0x1bb, 0x8ba, 0x28, 0x1, 0x7, 0x5, 0x3d}, &(0x7f0000000100)={r2, r3+60000000}, &(0x7f0000000180)={&(0x7f0000000140)={[0x6]}, 0x8}) 10:10:42 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext3\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x2010, &(0x7f0000000480)=ANY=[@ANYBLOB='lazytime,test_dummy_encryption,max_dir_size_kb=0x000000000200,grpjquota=,min_batch_time=0x00000000000003ff,rootcontext\a']) 10:10:42 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000040)={0x2, &(0x7f0000000000)=[{0x15, 0x0, 0x0, 0x74}, {}]}) [ 1862.930970][T20516] EXT4-fs (loop2): VFS: Can't find ext4 filesystem 10:10:42 executing program 4: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000040)={0x2, &(0x7f0000000000)=[{0x25, 0x0, 0x5}, {}]}) [ 1863.027263][T20516] loop2: detected capacity change from 0 to 183 [ 1863.036365][T20516] EXT4-fs (loop2): VFS: Can't find ext4 filesystem 10:10:42 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000040)={0x2, &(0x7f0000000000)=[{0x15, 0x0, 0x0, 0x94}, {}]}) 10:10:42 executing program 2: syz_mount_image$ext4(0x0, &(0x7f0000000440)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) openat$dir(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x8b2040, 0x1) 10:10:42 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext3\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x2200, &(0x7f0000000480)=ANY=[@ANYBLOB='lazytime,test_dummy_encryption,max_dir_size_kb=0x000000000200,grpjquota=,min_batch_time=0x00000000000003ff,rootcontext\a']) 10:10:42 executing program 5: clock_nanosleep(0x54fb6926d29f01ef, 0x0, &(0x7f0000000080), 0x0) 10:10:42 executing program 4: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000040)={0x2, &(0x7f0000000000)=[{0x25, 0x0, 0x6}, {}]}) 10:10:42 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000040)={0x2, &(0x7f0000000000)=[{0x15, 0x0, 0x0, 0xb1}, {}]}) 10:10:42 executing program 5: clock_nanosleep(0x54fb6926d29f01ef, 0x0, &(0x7f0000000040)={0x0, 0x989680}, 0x0) 10:10:42 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext3\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0xedc0, &(0x7f0000000480)=ANY=[@ANYBLOB='lazytime,test_dummy_encryption,max_dir_size_kb=0x000000000200,grpjquota=,min_batch_time=0x00000000000003ff,rootcontext\a']) 10:10:42 executing program 4: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000040)={0x2, &(0x7f0000000000)=[{0x25, 0x0, 0x7}, {}]}) 10:10:42 executing program 2: r0 = syz_mount_image$ext4(0x0, &(0x7f0000000440)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) openat$dir(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0xb0000, 0x40) fchmodat(r0, &(0x7f0000000040)='./file0\x00', 0x2b) 10:10:42 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000040)={0x2, &(0x7f0000000000)=[{0x15, 0x0, 0x0, 0x300}, {}]}) 10:10:42 executing program 4: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000040)={0x2, &(0x7f0000000000)=[{0x25, 0x0, 0x9}, {}]}) 10:10:42 executing program 1: r0 = syz_mount_image$ext4(&(0x7f0000000480)='ext3\x00', &(0x7f00000004c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000007c0)={[], [{@fscontext={'fscontext', 0x3d, 'sysadm_u'}}, {@defcontext={'defcontext', 0x3d, 'staff_u'}}]}) renameat2(r0, &(0x7f0000001080)='./file0/file0\x00', r0, &(0x7f00000010c0)='./file0\x00', 0x1) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000000080)={'team0\x00', 0x0}) r2 = accept$packet(0xffffffffffffffff, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000100)=0x14) r4 = accept4$packet(r2, &(0x7f0000001100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @multicast}, &(0x7f0000001140)=0x14, 0xc00) sendto$packet(r4, &(0x7f0000001180)="684929287e3206d27120f9ac0c52e43b42af6e55ac3b534e5e31ba5cfb2711cf9e65e22fad1b99a17cecca7f486b828643d3d25a7a9be838952834df932a3c0f33706ab408ba7dc17ed50c87afbb35fae37442ec0bf9fc9ef511ede4debec8094ba401905df9577ee8c5e38ba45cfa91c479a1489e464f473a2f25122dde87a758902ce56ecd6e42a9c9f962ff7616d98c9643cb27fc", 0x96, 0x4080, &(0x7f0000001240)={0x11, 0xd, r3, 0x1, 0x1, 0x6, @multicast}, 0x14) r5 = openat$dir(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x408040, 0x0) r6 = syz_genetlink_get_family_id$team(&(0x7f0000000500), 0xffffffffffffffff) getpeername$packet(0xffffffffffffffff, &(0x7f0000000540)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000580)=0x14) getpeername$packet(0xffffffffffffffff, &(0x7f00000005c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000600)=0x14) execveat(0xffffffffffffff9c, &(0x7f0000000fc0)='./file0\x00', &(0x7f00000012c0)=[&(0x7f0000001280)='lb_tx_method\x00'], &(0x7f0000001500)=[&(0x7f0000001300)='\xbb\xbb\xbb\xbb\xbb\xbb', &(0x7f0000001340)='\x00', &(0x7f0000001380)='#*--:\x00', &(0x7f00000013c0)='defcontext', &(0x7f0000001400)='\x00', &(0x7f0000001440)='+\x00', &(0x7f0000001480)='[@\x98\x02\x91-(\\{&\x00', &(0x7f00000014c0)='\xbb\xbb\xbb\xbb\xbb\xbb'], 0x800) ioctl$ifreq_SIOCGIFINDEX_team(r2, 0x8933, &(0x7f0000000640)={'team0\x00', 0x0}) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000680)={{{@in=@multicast2, @in6=@loopback}}, {{@in6=@dev}, 0x0, @in6=@initdev}}, &(0x7f0000000780)=0xe8) ioctl$ifreq_SIOCGIFINDEX_team(r2, 0x8933, &(0x7f0000000800)={'team0\x00', 0x0}) sendmsg$TEAM_CMD_PORT_LIST_GET(0xffffffffffffffff, &(0x7f0000001040)={&(0x7f0000000440)={0x10, 0x0, 0x0, 0x20000}, 0x9, &(0x7f0000001000)={&(0x7f0000002080)=ANY=[@ANYBLOB='X\a\x00\x00', @ANYRES16=r6, @ANYBLOB="01002dbd7000ffdbdf250300000008000100", @ANYRES32=r3, @ANYBLOB="a40102803800010024000100616374697665706f727400000000000000000000000000000000000000000000050003000300000008000400", @ANYRES32=r7, @ANYBLOB="3800010024000100616374697665706f72740000f2fc3223ad250e8c000000000004000000000000050003000300000008000400", @ANYRES32=r7, @ANYBLOB="3800010024000100616374697665706f727400000000000000000000000000000000000000000000050003000300000008000400", @ANYRES32=r8, @ANYBLOB="40000100240001006c625f686173685f737461747300000000000000000000000000000000000000050003000b0000000800040050000000080007000000000040000100240001006d6f64650000000000000000000000000000000000000000000000000000000005000300050000000f000400726f756e64726f62696e000038000100240001006e6f746966795f70656572735f696e74657276616c00000000000000000000000500030003000000080004000200000040000100240001007072696f72697479000000000000000000000000000000000000000000000000050003000e000000080004000900000008000600", @ANYRES32=r1, @ANYBLOB="08000100", @ANYRES32=r3, @ANYBLOB="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", @ANYRES16, @ANYBLOB="400002803c00010024000100656e61626c65640000000000000000000000000000000000000000000000000005000300060000000400040008000600", @ANYRES32=r3, @ANYRESOCT, @ANYRES32=r9, @ANYBLOB="f800028038000100240001006d636173745f72656a6f696e5f636f756e740000000000000000000000000000050003000300000008000400000800003c000100240001006270665f686173685f66756e6300000000000000000000000000000000000000050003000b0000000c000400000008000600000040000100240001007072696f72697479000000000000000000000000000000000000000000000000050003000e000000080004000900000008000600", @ANYRES32=r3, @ANYBLOB="40000100240001006c625f74785f686173685f746f5f706f72745f6d617070696e67000000000000050003000300000008000400", @ANYRES32, @ANYBLOB="080007000000000008000100", @ANYRES16, @ANYBLOB="bc02028038000100240001006e6f746966795f70656572735f696e74657276616c00000000000000000000000500030003000000080004007174000038000100240001006c625f73746174735f726566726573685f696e74657276616c000000000000000500030003000000080004000500000040000100240001006d6f64650000000000000000000000000000000000000000000000000000000005000300050000000e00040062726f6164636173740000007c000100240001006270665f686173685f66756e6300000000000000000000000000000000000000050003000b0000004c00040007001f400500000000000000ff7f00007f000609faffffff07000305040000000900ff01f60e00007c82fb00faffffff0008000504000000070009ff03000000010004050800000038000100240001006e6f746966795f70656572735f696e74657276616c0000000000000000000000050003000300000008000400040000003c00010024000100757365725f6c696e6b757000000000000000000000000000000000000000000005000300060000000400040008000600", @ANYRES32=r3, @ANYBLOB="54000100240001006270665f686173685f66756e6300000000000000000000000000000000000000050003000b00000024000400030020204000000042ff3f0101000000030081080600000003000480841a000040000100240001007072696f72697479000000000000000000000000000000000000000000000000050003000e00000008000400fdffffff08000600", @ANYRES32=r3, @ANYRESOCT=0x0, @ANYRES32=0x0, @ANYBLOB="f800028040000100240001006c625f686173685f737461747300000000000000000000000000000000000000050003000b00000008000400f1ffffff080007000000000044000100240001006270665f686173685f66756e6300000000000000000000000000000000000000050003000b00000014000400030002060700000000023fff010000003800010024000100616374697665706f727400000000000000000000000000000000000000000000050003000300000008000400", @ANYRES32=r10, @ANYBLOB="38000100240001006d636173745f72656a6f696e5f696e74657276616c000000000000000000000005000300030000000800040008000000"], 0x758}, 0x1, 0x0, 0x0, 0x200000c0}, 0x1) fchmodat(r5, &(0x7f0000000400)='./file0\x00', 0x0) r11 = accept4$packet(0xffffffffffffffff, &(0x7f0000001540), &(0x7f0000001580)=0x14, 0x80800) getsockname$packet(r11, &(0x7f00000015c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @multicast}, &(0x7f0000001600)=0x14) accept$packet(0xffffffffffffffff, &(0x7f0000000140)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000180)=0x14) sendmsg$TEAM_CMD_OPTIONS_SET(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x20}, 0xc, &(0x7f0000000380)={&(0x7f0000001640)=ANY=[@ANYBLOB="a0010000", @ANYRES16=0x0, @ANYBLOB="020027bd7000fedbdf250100000008000100", @ANYRES32=0x0, @ANYBLOB="3c00028038000100240001006e6f746966795f70656572735f636f756e7400000000000000000000000000000500030003000000080004009100000008000100", @ANYRES32=r9, @ANYBLOB="400002803c00010024000100656e61626c65640000000000000000000000000000000000000000000000000005000300060000000400040008000600", @ANYRES32=0x0, @ANYBLOB="08000100", @ANYRES32=r3, @ANYBLOB="f80002803c00010024000100656e61626c65640000000000000000000000000000000000000000000000000005000300060000000400040008000600", @ANYRES32=0x0, @ANYBLOB="3800010024000100656374697665706f727400000000000000000000000000000000050003002b863f9517cfb2bd1f4a71eda95a19511f973eca98a9c1bdac96c2307c62ae842dc6db179bdb6924c2a43bcc868fb18f3288b66b2087aa757db676507021afec2efcbb1e7db12f9961591e5e45927e19f0908263d0c5102ecf7d060534cfb8dc683c6509902c2d8fdde60f0e90f2f06ea1f30b6aef408ad19cdee91e2a2082ac57d3fdceb02219e630df2f", @ANYRES32=r12, @ANYBLOB="400001002400010071756575655f6964000000000000000000000000000000000000000000000000050003000300000008000400bcbc000008000600", @ANYRES32=0x0, @ANYBLOB="40000100240001006d6f64650000000000000000000000000000000000000000000000000000000005000300050000000e00040062726f616463617374000000"], 0x1a0}, 0x1, 0x0, 0x0, 0x20008001}, 0x10) 10:10:42 executing program 5: getgid() clock_nanosleep(0x54fb6926d29f01ef, 0x0, &(0x7f0000000080)={0x0, 0x989680}, 0x0) 10:10:42 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext3\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x1000000, &(0x7f0000000480)=ANY=[@ANYBLOB='lazytime,test_dummy_encryption,max_dir_size_kb=0x000000000200,grpjquota=,min_batch_time=0x00000000000003ff,rootcontext\a']) 10:10:42 executing program 4: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000040)={0x2, &(0x7f0000000000)=[{0x25, 0x0, 0x15}, {}]}) 10:10:42 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000040)={0x2, &(0x7f0000000000)=[{0x15, 0x0, 0x0, 0x500}, {}]}) 10:10:42 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext3\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x2000000, &(0x7f0000000480)=ANY=[@ANYBLOB='lazytime,test_dummy_encryption,max_dir_size_kb=0x000000000200,grpjquota=,min_batch_time=0x00000000000003ff,rootcontext\a']) 10:10:42 executing program 4: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000040)={0x2, &(0x7f0000000000)=[{0x25, 0x0, 0x16}, {}]}) 10:10:42 executing program 5: ioctl$sock_SIOCGIFINDEX_802154(0xffffffffffffffff, 0x8933, &(0x7f00000001c0)={'wpan0\x00', 0x0}) sendmsg$NL802154_CMD_DEL_SEC_DEVKEY(0xffffffffffffffff, &(0x7f0000000280)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x4000000}, 0xc, &(0x7f0000000240)={&(0x7f0000000200)={0x1c, 0x0, 0x8, 0x70bd2c, 0x25dfdbfd, {}, [@NL802154_ATTR_IFINDEX={0x8, 0x3, r0}]}, 0x1c}, 0x1, 0x0, 0x0, 0x40012}, 0x80) r1 = syz_genetlink_get_family_id$nbd(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$NBD_CMD_CONNECT(0xffffffffffffffff, &(0x7f0000000140)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x2000}, 0xc, &(0x7f0000000100)={&(0x7f00000000c0)={0x40, r1, 0x800, 0x70bd2c, 0x25dfdbfe, {}, [@NBD_ATTR_BLOCK_SIZE_BYTES={0xc, 0x3, 0x20}, @NBD_ATTR_INDEX={0x8, 0x1, 0x0}, @NBD_ATTR_BLOCK_SIZE_BYTES={0xc, 0x3, 0x9}, @NBD_ATTR_SIZE_BYTES={0xc, 0x2, 0x1}]}, 0x40}, 0x1, 0x0, 0x0, 0x8000}, 0x2404c044) clock_nanosleep(0x54fb6926d29f01ef, 0x0, &(0x7f0000000080)={0x0, 0x989680}, 0x0) 10:10:42 executing program 2: modify_ldt$read(0x0, &(0x7f0000000480)=""/4096, 0x1000) syz_mount_image$ext4(0x0, &(0x7f0000000440)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) getresuid(&(0x7f00000000c0)=0x0, &(0x7f0000000100), &(0x7f0000000140)) keyctl$get_persistent(0x16, r0, 0xfffffffffffffffc) openat$dir(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0xb0000, 0x0) rt_sigprocmask(0x2, &(0x7f0000000040)={[0x7fff]}, &(0x7f0000000080), 0x8) 10:10:42 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000040)={0x2, &(0x7f0000000000)=[{0x15, 0x0, 0x0, 0x600}, {}]}) 10:10:42 executing program 1: syz_mount_image$ext4(&(0x7f0000000480)='ext3\x00', &(0x7f00000004c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000007c0)=ANY=[@ANYBLOB='fscoxt=sysadm_u,Lefcontext=staff_u,\x00\x00\x00\x00']) 10:10:42 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext3\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x20100000, &(0x7f0000000480)=ANY=[@ANYBLOB='lazytime,test_dummy_encryption,max_dir_size_kb=0x000000000200,grpjquota=,min_batch_time=0x00000000000003ff,rootcontext\a']) 10:10:42 executing program 4: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000040)={0x2, &(0x7f0000000000)=[{0x25, 0x0, 0x1d}, {}]}) 10:10:42 executing program 2: r0 = syz_mount_image$ext4(0x0, &(0x7f0000000440)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) openat$incfs(0xffffffffffffff9c, &(0x7f0000000080)='.log\x00', 0x109800, 0x6) faccessat2(r0, &(0x7f0000000040)='./file0\x00', 0x1, 0x0) r1 = openat$vcsu(0xffffffffffffff9c, &(0x7f0000000000), 0x5200, 0x0) fchmodat(r1, &(0x7f0000000040)='./file0\x00', 0x1b0) r2 = openat$incfs(r1, &(0x7f00000002c0)='.log\x00', 0x581200, 0x123) syz_genetlink_get_family_id$fou(&(0x7f0000000300), r2) renameat2(r2, &(0x7f0000000380)='./file0\x00', 0xffffffffffffffff, &(0x7f00000003c0)='./file1\x00', 0x0) execveat(r2, &(0x7f00000000c0)='./file0\x00', &(0x7f00000001c0)=[&(0x7f0000000100)='.log\x00', &(0x7f0000000140)='\x00', &(0x7f0000000180)='*,%:*\\@-[5[^#^:]([.:[%^^\'^@[#!,\'[.@\x00'], &(0x7f0000000340)=[&(0x7f0000000200)='%%\x9c-\x00', &(0x7f0000000240)='.log\x00', &(0x7f0000000280)='.log\x00', &(0x7f00000002c0)='.log\x00', &(0x7f0000000300)='.log\x00'], 0x400) openat$dir(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x2f0000, 0x2) 10:10:42 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext3\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x22000000, &(0x7f0000000480)=ANY=[@ANYBLOB='lazytime,test_dummy_encryption,max_dir_size_kb=0x000000000200,grpjquota=,min_batch_time=0x00000000000003ff,rootcontext\a']) 10:10:42 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000040)={0x2, &(0x7f0000000000)=[{0x15, 0x0, 0x0, 0x700}, {}]}) 10:10:42 executing program 1: r0 = add_key$fscrypt_v1(&(0x7f0000000040), &(0x7f0000000080)={'fscrypt:', @desc4}, &(0x7f00000000c0)={0x0, "1304a7300c0abbef98ed81ef86f602d79b4d3dda3ddf5eaa5b1a932b8261b82e672618ccb801eda3f909a6f6e422081bd5411d73a313de90e5aa0d7782dd3aef", 0x2f}, 0x48, 0xfffffffffffffffd) keyctl$search(0xa, r0, &(0x7f0000000140)='asymmetric\x00', &(0x7f0000000180)={'syz', 0x2}, 0xfffffffffffffffc) prctl$PR_SET_DUMPABLE(0x4, 0x0) prctl$PR_SET_DUMPABLE(0x4, 0x0) r1 = add_key$keyring(&(0x7f00000001c0), &(0x7f0000000200)={'syz', 0x2}, 0x0, 0x0, 0x0) keyctl$restrict_keyring(0x1d, r1, &(0x7f0000000240)='user\x00', 0x0) r2 = syz_mount_image$ext4(&(0x7f0000000480)='ext3\x00', &(0x7f00000004c0)='./file0\x00', 0x3ff, 0x0, 0x0, 0x2010008, &(0x7f0000000340)={[{@bh}, {@auto_da_alloc_val={'auto_da_alloc', 0x3d, 0xb5a7}}, {@max_batch_time}], [{@fscontext={'fscontext', 0x3d, 'system_u'}}, {@context={'context', 0x3d, 'root'}}, {@smackfsdef={'smackfsdef', 0x3d, '%\\*'}}]}) unlinkat(r2, &(0x7f0000000000)='./file1\x00', 0x0) r3 = add_key$keyring(&(0x7f0000000080), &(0x7f00000000c0)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$KEYCTL_MOVE(0x1e, r3, 0x0, 0x0, 0x0) keyctl$reject(0x13, r0, 0x9, 0xcd2, r3) 10:10:42 executing program 5: clock_nanosleep(0x54fb6926d29f01ef, 0x0, &(0x7f0000000080)={0x0, 0x989680}, 0x0) clock_nanosleep(0x1, 0x1, &(0x7f0000000000), &(0x7f0000000040)) 10:10:42 executing program 4: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000040)={0x2, &(0x7f0000000000)=[{0x25, 0x0, 0x25}, {}]}) 10:10:42 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext3\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x8cffffff, &(0x7f0000000480)=ANY=[@ANYBLOB='lazytime,test_dummy_encryption,max_dir_size_kb=0x000000000200,grpjquota=,min_batch_time=0x00000000000003ff,rootcontext\a']) 10:10:42 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000040)={0x2, &(0x7f0000000000)=[{0x15, 0x0, 0x0, 0x900}, {}]}) 10:10:42 executing program 5: clock_nanosleep(0x54fb6926d29f01ef, 0x0, &(0x7f0000000080)={0x0, 0x989680}, 0x0) clock_nanosleep(0x2, 0x0, &(0x7f0000000000)={0x0, 0x3938700}, &(0x7f0000000040)) 10:10:42 executing program 4: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000040)={0x2, &(0x7f0000000000)=[{0x25, 0x0, 0x28}, {}]}) 10:10:42 executing program 2: syz_mount_image$ext4(0x0, &(0x7f0000000440)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r0 = openat$vcsu(0xffffffffffffff9c, &(0x7f0000000000), 0x5200, 0x0) fchmodat(r0, &(0x7f0000000040)='./file0\x00', 0x1b0) r1 = openat$incfs(r0, &(0x7f00000002c0)='.log\x00', 0x581200, 0x123) syz_genetlink_get_family_id$fou(&(0x7f0000000300), r1) renameat2(r1, &(0x7f0000000380)='./file0\x00', 0xffffffffffffffff, &(0x7f00000003c0)='./file1\x00', 0x0) getdents64(r1, &(0x7f0000000040)=""/76, 0x4c) openat$dir(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0xb0000, 0x0) 10:10:42 executing program 1: sendmsg$TIPC_CMD_SET_NODE_ADDR(0xffffffffffffffff, &(0x7f0000000180)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f0000000140)={&(0x7f0000000100)={0x24, 0x0, 0x100, 0x70bd2c, 0x25dfdbfe, {{}, {}, {0x8, 0x11, 0x21738a8a}}, ["", "", "", "", "", "", "", "", ""]}, 0x24}, 0x1, 0x0, 0x0, 0x20000801}, 0xc810) syz_mount_image$ext4(&(0x7f0000000480)='ext3\x00', &(0x7f00000004c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000007c0)=ANY=[@ANYBLOB="6673636f05aec5b10c0b1bd419616488a1d060d6dc7aa9000000"]) r0 = openat$vcsu(0xffffffffffffff9c, &(0x7f0000000000), 0x5200, 0x0) fchmodat(r0, &(0x7f0000000040)='./file0\x00', 0x1b0) openat$incfs(r0, &(0x7f00000002c0)='.log\x00', 0x581200, 0x123) accept4$packet(r0, &(0x7f0000000400)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000000440)=0x14, 0x100000) fchmodat(r0, &(0x7f0000000000)='./file0\x00', 0x30) openat$dir(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x88001, 0x2c) r1 = openat$vcsu(0xffffffffffffff9c, &(0x7f0000000340), 0x301, 0x0) r2 = openat$vcsu(0xffffffffffffff9c, &(0x7f0000000340), 0x301, 0x0) ioctl$PTP_ENABLE_PPS(r2, 0x40043d04, 0x1) faccessat2(r2, &(0x7f0000000200)='./file0\x00', 0x1d, 0x280) ioctl$PTP_ENABLE_PPS(r1, 0x40043d04, 0x1) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY_ALL_USERS(r1, 0xc0406619, &(0x7f00000001c0)={@id={0x2, 0x0, @b}}) 10:10:42 executing program 4: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000040)={0x2, &(0x7f0000000000)=[{0x25, 0x0, 0x29}, {}]}) 10:10:42 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext3\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0xc0ed0000, &(0x7f0000000480)=ANY=[@ANYBLOB='lazytime,test_dummy_encryption,max_dir_size_kb=0x000000000200,grpjquota=,min_batch_time=0x00000000000003ff,rootcontext\a']) 10:10:42 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000040)={0x2, &(0x7f0000000000)=[{0x15, 0x0, 0x0, 0x1500}, {}]}) 10:10:43 executing program 4: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000040)={0x2, &(0x7f0000000000)=[{0x25, 0x0, 0x2d}, {}]}) 10:10:43 executing program 2: syz_mount_image$ext4(0x0, &(0x7f0000000440)='./file1\x00', 0x0, 0x0, 0x0, 0x800, 0x0) openat$dir(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0xb0000, 0x0) 10:10:43 executing program 1: unshare(0x2000400) syz_mount_image$ext4(&(0x7f0000000480)='ext3\x00', &(0x7f00000004c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000007c0)={[], [{@fscontext={'fscontext', 0x3d, 'sysadm_u'}}, {@defcontext={'defcontext', 0x3d, 'staff_u'}}]}) 10:10:43 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000040)={0x2, &(0x7f0000000000)=[{0x15, 0x0, 0x0, 0x1600}, {}]}) 10:10:43 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext3\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0xf6ffffff, &(0x7f0000000480)=ANY=[@ANYBLOB='lazytime,test_dummy_encryption,max_dir_size_kb=0x000000000200,grpjquota=,min_batch_time=0x00000000000003ff,rootcontext\a']) 10:10:43 executing program 5: clock_nanosleep(0x54fb6926d29f01ef, 0x0, &(0x7f0000000080)={0x0, 0x989680}, 0x0) sendmsg$TIPC_CMD_DISABLE_BEARER(0xffffffffffffffff, &(0x7f0000000180)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x800}, 0xc, &(0x7f0000000140)={&(0x7f00000001c0)={0x44, 0x0, 0x100, 0x70bd27, 0x25dfdbff, {{}, {}, {0x10, 0x13, @l2={'ib', 0x3a, 'hsr0\x00'}}}, ["", "", "", ""]}, 0x2c}, 0x1, 0x0, 0x0, 0x24000050}, 0x480c1) clock_gettime(0x0, &(0x7f0000000040)={0x0, 0x0}) clock_nanosleep(0x4, 0x0, &(0x7f0000000000)={r0, r1+60000000}, 0x0) 10:10:43 executing program 4: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000040)={0x2, &(0x7f0000000000)=[{0x25, 0x0, 0x30}, {}]}) 10:10:43 executing program 1: r0 = syz_mount_image$ext4(&(0x7f0000000480)='ext3\x00', &(0x7f00000004c0)='./file0\x00', 0x0, 0x0, 0x0, 0x1200c, &(0x7f0000000080)=ANY=[@ANYRESDEC]) faccessat2(r0, &(0x7f0000000000)='./file0\x00', 0x100, 0x0) 10:10:43 executing program 2: syz_mount_image$ext4(0x0, &(0x7f0000000440)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) openat$dir(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0xb0000, 0x0) r0 = openat$vcsu(0xffffffffffffff9c, &(0x7f0000000000), 0x5200, 0x0) fchmodat(r0, &(0x7f0000000040)='./file0\x00', 0x1b0) r1 = openat$incfs(r0, &(0x7f00000002c0)='.log\x00', 0x581200, 0x123) syz_genetlink_get_family_id$fou(&(0x7f0000000300), r1) renameat2(r1, &(0x7f0000000380)='./file0\x00', 0xffffffffffffffff, &(0x7f00000003c0)='./file1\x00', 0x0) futimesat(r1, &(0x7f0000000040)='./file0\x00', &(0x7f0000000080)={{0x0, 0x2710}, {0x77359400}}) 10:10:43 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000040)={0x2, &(0x7f0000000000)=[{0x15, 0x0, 0x0, 0x1d00}, {}]}) 10:10:43 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext3\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0xfeffffff, &(0x7f0000000480)=ANY=[@ANYBLOB='lazytime,test_dummy_encryption,max_dir_size_kb=0x000000000200,grpjquota=,min_batch_time=0x00000000000003ff,rootcontext\a']) 10:10:43 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext3\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0xffffff8c, &(0x7f0000000480)=ANY=[@ANYBLOB='lazytime,test_dummy_encryption,max_dir_size_kb=0x000000000200,grpjquota=,min_batch_time=0x00000000000003ff,rootcontext\a']) 10:10:43 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000040)={0x2, &(0x7f0000000000)=[{0x15, 0x0, 0x0, 0x2000}, {}]}) 10:10:43 executing program 4: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000040)={0x2, &(0x7f0000000000)=[{0x25, 0x0, 0x34}, {}]}) 10:10:43 executing program 1: prctl$PR_SET_SECCOMP(0x35, 0x2, 0x0) syz_mount_image$ext4(&(0x7f0000000480)='ext3\x00', &(0x7f00000004c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000007c0)={[], [{@fscontext={'fscontext', 0x3d, 'sysadm_u'}}, {@defcontext={'defcontext', 0x3d, 'staff_u'}}]}) 10:10:43 executing program 5: clock_nanosleep(0x54fb6926d29f01ef, 0x0, &(0x7f0000000080)={0x0, 0x989680}, 0x0) pselect6(0x40, &(0x7f0000000000)={0xfff, 0x5e81, 0xffff, 0xb08, 0x6, 0x1, 0x100000000, 0x1}, &(0x7f0000000040)={0xfff, 0x3, 0x80, 0x0, 0x20, 0x1f, 0x7, 0x1}, &(0x7f00000000c0)={0x8, 0xabb7, 0x8001, 0x100, 0x0, 0xf6, 0xee0, 0xffffffffffffff80}, &(0x7f0000000100), &(0x7f0000000180)={&(0x7f0000000140)={[0xfffffffffffffffb]}, 0x8}) 10:10:43 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext3\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0xfffffff6, &(0x7f0000000480)=ANY=[@ANYBLOB='lazytime,test_dummy_encryption,max_dir_size_kb=0x000000000200,grpjquota=,min_batch_time=0x00000000000003ff,rootcontext\a']) 10:10:43 executing program 4: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000040)={0x2, &(0x7f0000000000)=[{0x25, 0x0, 0x35}, {}]}) 10:10:43 executing program 2: syz_mount_image$ext4(0x0, &(0x7f0000000440)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) openat$dir(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0xb0000, 0x0) sendmsg$TIPC_CMD_GET_REMOTE_MNG(0xffffffffffffffff, &(0x7f0000000100)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x20}, 0xc, &(0x7f00000000c0)={&(0x7f0000000080)={0x1c, 0x0, 0x200, 0x70bd27, 0x25dfdbfe, {}, ["", "", "", ""]}, 0x1c}, 0x1, 0x0, 0x0, 0x240008d1}, 0x200008c0) 10:10:43 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000040)={0x2, &(0x7f0000000000)=[{0x15, 0x0, 0x0, 0x2500}, {}]}) 10:10:43 executing program 1: syz_mount_image$ext4(&(0x7f0000000480)='ext3\x00', &(0x7f00000004c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000007c0)=ANY=[@ANYBLOB='fscoaff_u,\x00']) 10:10:43 executing program 5: r0 = openat$incfs(0xffffffffffffffff, &(0x7f0000000000)='.pending_reads\x00', 0x10081, 0x169) ioctl$PTP_PIN_SETFUNC2(r0, 0x40603d10, &(0x7f00000000c0)={'\x00', 0x6, 0x0, 0x7}) clock_nanosleep(0x54fb6926d29f01ef, 0x0, &(0x7f0000000080)={0x0, 0x989680}, 0x0) r1 = syz_genetlink_get_family_id$tipc(&(0x7f0000000380), r0) sendmsg$TIPC_CMD_RESET_LINK_STATS(r0, &(0x7f0000000440)={&(0x7f0000000340)={0x10, 0x0, 0x0, 0x40}, 0xc, &(0x7f0000000400)={&(0x7f00000003c0)={0x28, r1, 0x20, 0x70bd29, 0x25dfdbff, {{}, {}, {0xc, 0x14, 'syz0\x00'}}, ["", "", "", "", "", "", "", ""]}, 0x28}, 0x1, 0x0, 0x0, 0x4008001}, 0x4040000) r2 = socket(0x15, 0x5, 0x2473) ioctl$sock_ipv6_tunnel_SIOCDELTUNNEL(r0, 0x89f2, &(0x7f00000001c0)={'ip6_vti0\x00', &(0x7f0000000140)={'ip6_vti0\x00', 0x0, 0x4, 0x7f, 0x80, 0x66, 0x60, @empty, @ipv4={'\x00', '\xff\xff', @private=0xa010102}, 0x1, 0x8, 0x5, 0x7}}) ioctl$sock_ipv6_tunnel_SIOCDELPRL(r2, 0x89f6, &(0x7f0000000280)={'sit0\x00', &(0x7f0000000200)={'sit0\x00', r3, 0x0, 0x7, 0x2b, 0x5, 0x29, @initdev={0xfe, 0x88, '\x00', 0x1, 0x0}, @ipv4={'\x00', '\xff\xff', @rand_addr=0x64010100}, 0x1, 0x80, 0x890b, 0x1}}) ioctl$PTP_PIN_GETFUNC2(r0, 0xc0603d0f, &(0x7f00000002c0)={'\x00', 0x47d, 0x1, 0xffff}) ioctl$PTP_PEROUT_REQUEST2(r0, 0x40383d0c, &(0x7f0000000040)={{0x2, 0x7fffffff}, {0x53e3a92c, 0x3}, 0x6, 0x1}) 10:10:44 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000040)={0x2, &(0x7f0000000000)=[{0x15, 0x0, 0x0, 0x2800}, {}]}) 10:10:44 executing program 4: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000040)={0x2, &(0x7f0000000000)=[{0x25, 0x0, 0x3d}, {}]}) 10:10:44 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext3\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0xfffffffe, &(0x7f0000000480)=ANY=[@ANYBLOB='lazytime,test_dummy_encryption,max_dir_size_kb=0x000000000200,grpjquota=,min_batch_time=0x00000000000003ff,rootcontext\a']) 10:10:44 executing program 2: syz_mount_image$ext4(0x0, &(0x7f0000000440)='./file0\x00', 0x4, 0x0, 0x0, 0x0, 0x0) ioctl$PTP_PIN_GETFUNC2(0xffffffffffffffff, 0xc0603d0f, &(0x7f0000000000)={'\x00', 0x9, 0x0, 0xba}) 10:10:44 executing program 1: syz_mount_image$ext4(&(0x7f0000000480)='ext3\x00', &(0x7f00000004c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB='dont_measure,defcontext=staff_u,func=MODULE_CHECK,euid>', @ANYRESDEC=0xee00, @ANYBLOB="2cac4435dfd9230274d23eb8bd224fe97ce6874234a92ddab12cdd4e9cc56c21720e2e9c3318656946372329d964abcae69fdfdad3d167462012d5adf7076e5545652a3ad7b346054b1a979c432f004727a09b7499f402dbadd59ddd7677230d4bff5a3d234c3bb6b369597d83e8706a0689da7073e477794ef2"]) openat$incfs(0xffffffffffffff9c, &(0x7f0000000000)='.log\x00', 0x1, 0x59) r0 = fork() prlimit64(r0, 0xa, &(0x7f0000000080)={0x9, 0x7}, &(0x7f00000000c0)) 10:10:44 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000040)={0x2, &(0x7f0000000000)=[{0x15, 0x0, 0x0, 0x2d00}, {}]}) 10:10:44 executing program 2: syz_mount_image$ext4(0x0, &(0x7f0000000440)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) openat$dir(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0xa200, 0x100) openat$dir(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0xb0000, 0x0) r0 = openat$vcsu(0xffffffffffffff9c, &(0x7f0000000000), 0x5200, 0x0) fchmodat(r0, &(0x7f0000000040)='./file0\x00', 0x1b0) r1 = openat$incfs(r0, &(0x7f00000002c0)='.log\x00', 0x581200, 0x123) syz_genetlink_get_family_id$fou(&(0x7f0000000300), r1) renameat2(r1, &(0x7f0000000380)='./file0\x00', 0xffffffffffffffff, &(0x7f00000003c0)='./file1\x00', 0x0) execveat(r1, &(0x7f0000000080)='./file0\x00', &(0x7f0000000280)=[&(0x7f00000000c0)='/]#^#-\'{\x00', &(0x7f0000000100)='^\x00', &(0x7f0000000140)='#\x00', &(0x7f0000000180)='\x00', &(0x7f00000001c0)='!\x00', &(0x7f0000000200)='\x00', &(0x7f0000000240)='\x00'], &(0x7f00000003c0)=[&(0x7f00000002c0)='\x00', &(0x7f0000000300)='}\'\x00', &(0x7f0000000340)=',$@\x00', &(0x7f0000000380)='/.%%\xcc\x00'], 0x1000) 10:10:44 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext3\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x8000000000, &(0x7f0000000480)=ANY=[@ANYBLOB='lazytime,test_dummy_encryption,max_dir_size_kb=0x000000000200,grpjquota=,min_batch_time=0x00000000000003ff,rootcontext\a']) 10:10:44 executing program 4: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000040)={0x2, &(0x7f0000000000)=[{0x25, 0x0, 0x45}, {}]}) 10:10:44 executing program 5: clock_nanosleep(0x54fb6926d29f01ef, 0x0, &(0x7f0000000080)={0x0, 0x989680}, 0x0) prctl$PR_GET_FPEXC(0xb, &(0x7f0000000000)) prctl$PR_GET_FPEXC(0xb, &(0x7f0000000040)) 10:10:44 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000040)={0x2, &(0x7f0000000000)=[{0x15, 0x0, 0x0, 0x3000}, {}]}) 10:10:44 executing program 1: getresuid(&(0x7f0000000040), &(0x7f0000000080), &(0x7f00000000c0)) syz_mount_image$ext4(&(0x7f0000000480)='ext3\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000140)={[{@user_xattr}], [{@fscontext={'fscontext', 0x3d, 'sysadm_u'}}, {@smackfsdef={'smackfsdef', 0x3d, 'uid<'}}]}) 10:10:44 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext3\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0xedc000000000, &(0x7f0000000480)=ANY=[@ANYBLOB='lazytime,test_dummy_encryption,max_dir_size_kb=0x000000000200,grpjquota=,min_batch_time=0x00000000000003ff,rootcontext\a']) 10:10:44 executing program 4: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000040)={0x2, &(0x7f0000000000)=[{0x25, 0x0, 0x4d}, {}]}) 10:10:44 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000040)={0x2, &(0x7f0000000000)=[{0x15, 0x0, 0x0, 0x3400}, {}]}) 10:10:44 executing program 5: clock_gettime(0x0, &(0x7f0000000040)) pselect6(0x40, &(0x7f0000000000)={0x4, 0x4, 0x801, 0x0, 0xa0, 0x401, 0xa15, 0x1}, &(0x7f00000000c0)={0xfffc, 0x2, 0x6, 0x43, 0xfff, 0x200, 0x7fff7fff, 0x1}, &(0x7f0000000100)={0x9, 0x6, 0x64, 0x80000001, 0x81, 0x0, 0x1, 0x1}, &(0x7f0000000140)={0x0, 0x3938700}, &(0x7f00000001c0)={&(0x7f0000000180)={[0x7]}, 0x8}) pselect6(0x40, &(0x7f0000000240)={0x0, 0xfffffffffffffffe, 0x20000000006a, 0x100000001, 0x10000000, 0xff, 0x3b, 0xa}, &(0x7f0000000280)={0x4, 0x8000000000003a, 0xa7b, 0x40, 0x3, 0x101, 0x6, 0x1f00}, &(0x7f00000002c0)={0x80000001, 0x9, 0x7fffffff, 0x1, 0x2, 0x8, 0xfffffffffffff28e, 0x1ff}, &(0x7f0000000300), &(0x7f0000000380)={&(0x7f0000000340), 0x8}) clock_nanosleep(0x54fb6926d29f01ef, 0x0, &(0x7f0000000080), 0x0) getitimer(0x0, &(0x7f0000000200)) 10:10:44 executing program 2: syz_mount_image$ext4(0x0, &(0x7f0000000440)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r0 = openat$vcsu(0xffffffffffffff9c, &(0x7f0000000340), 0x301, 0x0) ioctl$PTP_ENABLE_PPS(r0, 0x40043d04, 0x1) symlinkat(&(0x7f0000000040)='./file0\x00', r0, &(0x7f0000000080)='./file0\x00') openat$dir(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0xb0000, 0x0) 10:10:44 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext3\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x100000000000000, &(0x7f0000000480)=ANY=[@ANYBLOB='lazytime,test_dummy_encryption,max_dir_size_kb=0x000000000200,grpjquota=,min_batch_time=0x00000000000003ff,rootcontext\a']) 10:10:44 executing program 4: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000040)={0x2, &(0x7f0000000000)=[{0x25, 0x0, 0x60}, {}]}) 10:10:44 executing program 1: syz_mount_image$ext4(&(0x7f0000000480)='ext3\x00', &(0x7f00000004c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000007c0)=ANY=[@ANYBLOB="6673636f6e646578743dbca8994377cbf373027361646d5f75746578743d73746166665f742c00"]) 10:10:44 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000040)={0x2, &(0x7f0000000000)=[{0x15, 0x0, 0x0, 0x3500}, {}]}) 10:10:44 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext3\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x200000000000000, &(0x7f0000000480)=ANY=[@ANYBLOB='lazytime,test_dummy_encryption,max_dir_size_kb=0x000000000200,grpjquota=,min_batch_time=0x00000000000003ff,rootcontext\a']) 10:10:44 executing program 4: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000040)={0x2, &(0x7f0000000000)=[{0x25, 0x0, 0x61}, {}]}) 10:10:44 executing program 5: clock_nanosleep(0x3, 0x0, &(0x7f0000000080)={0x77359400}, 0x0) pselect6(0x40, &(0x7f0000000000)={0x2, 0x3, 0x73100000000, 0x3, 0x9, 0x9, 0x81, 0x9}, &(0x7f0000000040)={0x0, 0xc71, 0x800, 0x4, 0xfffffffffffffffb, 0x6, 0x101, 0x9}, &(0x7f00000000c0)={0x0, 0x200, 0x676, 0x8, 0x3, 0xfffffffffffffe00, 0x3, 0x4}, &(0x7f0000000100)={0x77359400}, &(0x7f0000000180)={&(0x7f0000000140)={[0x7fffffff]}, 0x8}) clock_gettime(0x4, 0x0) 10:10:44 executing program 1: r0 = syz_mount_image$ext4(&(0x7f0000000480)='ext3\x00', &(0x7f00000004c0)='./file0\x00', 0x0, 0x0, 0x0, 0x8000, &(0x7f0000000000)={[{@noquota}, {@data_err_ignore}], [{@fscontext={'fscontext', 0x3d, 'sysadm_u'}}, {@defcontext={'defcontext', 0x3d, 'staff_u'}}]}) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY_ALL_USERS(r0, 0xc0406619, &(0x7f0000000040)={@id={0x2, 0x0, @d}}) openat$dir(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x400100, 0x100) 10:10:44 executing program 2: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NBD_CMD_CONNECT(r0, &(0x7f00000013c0)={&(0x7f00000012c0), 0xc, &(0x7f0000001380)={0x0}}, 0xc6c3dbe86af1a089) sendmsg$IEEE802154_LLSEC_ADD_KEY(r0, &(0x7f0000000140)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f0000000100)={&(0x7f0000000080)={0x44, 0x0, 0x20, 0x70bd2c, 0x25dfdbfd, {}, [@IEEE802154_ATTR_HW_ADDR={0xc, 0x5, {0xaaaaaaaaaaaa0202}}, @IEEE802154_ATTR_LLSEC_KEY_SOURCE_SHORT={0x8, 0x2c, 0xc8}, @IEEE802154_ATTR_HW_ADDR={0xc, 0x5, {0xaaaaaaaaaaaa0302}}, @IEEE802154_ATTR_LLSEC_KEY_MODE={0x5}, @IEEE802154_ATTR_DEV_INDEX={0x8}]}, 0x44}}, 0x20000000) syz_mount_image$ext4(0x0, &(0x7f0000000440)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) openat$dir(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0xb0000, 0x0) 10:10:44 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000040)={0x2, &(0x7f0000000000)=[{0x15, 0x0, 0x0, 0x3d00}, {}]}) 10:10:44 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext3\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x2010000000000000, &(0x7f0000000480)=ANY=[@ANYBLOB='lazytime,test_dummy_encryption,max_dir_size_kb=0x000000000200,grpjquota=,min_batch_time=0x00000000000003ff,rootcontext\a']) 10:10:44 executing program 4: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000040)={0x2, &(0x7f0000000000)=[{0x25, 0x0, 0x64}, {}]}) 10:10:44 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000040)={0x2, &(0x7f0000000000)=[{0x15, 0x0, 0x0, 0x4500}, {}]}) 10:10:44 executing program 2: syz_mount_image$ext4(0x0, &(0x7f00000000c0)='./file1\x00', 0x9, 0x0, 0x0, 0x20801, 0x0) r0 = openat$dir(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x2b0000, 0x0) symlinkat(&(0x7f0000000040)='./file0\x00', r0, &(0x7f0000000080)='./file0\x00') 10:10:44 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000040)={0x2, &(0x7f0000000000)=[{0x15, 0x0, 0x0, 0x4d00}, {}]}) 10:10:44 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext3\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x2200000000000000, &(0x7f0000000480)=ANY=[@ANYBLOB='lazytime,test_dummy_encryption,max_dir_size_kb=0x000000000200,grpjquota=,min_batch_time=0x00000000000003ff,rootcontext\a']) 10:10:44 executing program 1: syz_mount_image$ext4(&(0x7f0000000480)='ext3\x00', &(0x7f00000004c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000007c0)={[], [{@fscontext={'fscontext', 0x3d, 'sysadm_u'}}, {@defcontext={'defcontext', 0x3d, 'staff_u'}}]}) r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext3\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000140)=[{&(0x7f0000000080)="2ba05b5b0e942849f6639f289862262502e3afac0ab161a7eb852c7e3e47c1d411218e686384d366f6d5f2c379cffa482b8ec2418d956f59b4681f6575b7d544fd4e5657a3eea821fa359fdfc4ff660aa521fb54ed0c7d6a7d59c30736fbf378f11d524dfe2f046d279d554aff18d83a9b61daac83a9b0a6f0a9f6949f6a4f1623652042", 0x84, 0x3}], 0x1040de, &(0x7f0000000180)={[{@stripe={'stripe', 0x3d, 0x8}}, {@jqfmt_vfsold}, {@nobh}, {@abort}, {@jqfmt_vfsv1}, {@nombcache}, {@data_journal}, {@journal_path={'journal_path', 0x3d, './file0'}}, {@discard}], [{@euid_lt}, {@dont_hash}, {@smackfsfloor={'smackfsfloor', 0x3d, 'staff_u'}}, {@smackfshat={'smackfshat', 0x3d, '\''}}, {@uid_gt={'uid>', 0xee00}}, {@subj_role={'subj_role', 0x3d, 'sysadm_u'}}]}) getdents64(r0, &(0x7f0000000280)=""/79, 0x4f) 10:10:44 executing program 4: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000040)={0x2, &(0x7f0000000000)=[{0x25, 0x0, 0x74}, {}]}) 10:10:45 executing program 5: clone(0x1d101200, &(0x7f0000000000)="03249d46a3e4872afaea9772f3b646b9f473fb6c1566058e92edd437163eca68f00b1dd9d4c9080147cdf03dfd6c21f474", &(0x7f00000000c0), &(0x7f0000000080), &(0x7f00000001c0)="2bb186ddffd3af2596fc6a3d7b14d62098f5b6f5e2f01294d3cb53ad58afbdd939532f367c44d5d0707e67a6c8ab09150c390b5b4e85070036299b362fbe27a0ec3c831807006433bf6de4c8e4cf01ee3c04b285c3351ad4a7e0695a91e19b3f53f61ca44ce2e56a2bd55b1f9c003e992da4a3fecaf6c96b85a124b1d479888b7b52f352459bd39a19f62efd13f77d220a069b3dd6e42a2b90974438d600c89046783717cc0933d150d7fd8d1939b57d2e778dd42c4c0fd1baad32eae46c2f3c390c5bfe8c2441040364c2e4e73b291934df5e98b3f592d5b84c33") 10:10:45 executing program 2: syz_mount_image$ext4(0x0, &(0x7f0000000440)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) openat$dir(0xffffffffffffff9c, &(0x7f0000000000)='./file0/file0\x00', 0x4bab02, 0x4) r0 = fork() sched_rr_get_interval(r0, &(0x7f0000000100)) ptrace$setregset(0x4205, r0, 0x201, &(0x7f0000000040)={&(0x7f00000000c0)="e63bc50a98a49052aefa8e9282b6f0887a5f3f644b71470944757e3a0ed0ed197c5a65a250363ba5ef2171ee1403fa8fc935c14fc8c1ca601fdba5a1e44e5963a28c953a15e81f8b432258ef3cfbb2472ec2215ec5b855d0d43c5bd41b1145bb8bff5b4bfdb4b7faf02db23beb1358e3ddcf55128bf61b4aea7cc3e7fd0ec2c7430cafa836f9312a277f89ed56933a5eadefbfd9ce371864e036fd674777c980ff6e145639f1a619", 0xa8}) openat$dir(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0xb0000, 0x2) 10:10:45 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000040)={0x2, &(0x7f0000000000)=[{0x15, 0x0, 0x0, 0x6000}, {}]}) 10:10:45 executing program 4: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000040)={0x2, &(0x7f0000000000)=[{0x25, 0x0, 0x94}, {}]}) 10:10:45 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext3\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x8cffffff00000000, &(0x7f0000000480)=ANY=[@ANYBLOB='lazytime,test_dummy_encryption,max_dir_size_kb=0x000000000200,grpjquota=,min_batch_time=0x00000000000003ff,rootcontext\a']) 10:10:45 executing program 1: syz_mount_image$ext4(&(0x7f0000000480)='ext3\x00', &(0x7f00000004c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000007c0)={[], [{@fscontext={'fscontext', 0x3d, 'sysadm_u'}}, {@defcontext={'defcontext', 0x3d, 'staff_u'}}]}) fchmodat(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0xa) 10:10:45 executing program 4: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000040)={0x2, &(0x7f0000000000)=[{0x25, 0x0, 0xb1}, {}]}) 10:10:45 executing program 1: syz_mount_image$ext4(&(0x7f0000000480)='ext3\x00', &(0x7f0000000040)='./file1\x00', 0x0, 0x43, 0x0, 0x0, &(0x7f0000000000)={[], [{@uid_gt}, {@appraise_type}]}) 10:10:45 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000040)={0x2, &(0x7f0000000000)=[{0x15, 0x0, 0x0, 0x6100}, {}]}) 10:10:45 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext3\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0xf6ffffff00000000, &(0x7f0000000480)=ANY=[@ANYBLOB='lazytime,test_dummy_encryption,max_dir_size_kb=0x000000000200,grpjquota=,min_batch_time=0x00000000000003ff,rootcontext\a']) 10:10:45 executing program 5: clone(0x1d101200, &(0x7f0000000000)="03249d46a3e4872afaea9772f3b646b9f473fb6c1566058e92edd437163eca68f00b1dd9d4c9080147cdf03dfd6c21f474", &(0x7f00000000c0), &(0x7f0000000080), &(0x7f00000001c0)="2bb186ddffd3af2596fc6a3d7b14d62098f5b6f5e2f01294d3cb53ad58afbdd939532f367c44d5d0707e67a6c8ab09150c390b5b4e85070036299b362fbe27a0ec3c831807006433bf6de4c8e4cf01ee3c04b285c3351ad4a7e0695a91e19b3f53f61ca44ce2e56a2bd55b1f9c003e992da4a3fecaf6c96b85a124b1d479888b7b52f352459bd39a19f62efd13f77d220a069b3dd6e42a2b90974438d600c89046783717cc0933d150d7fd8d1939b57d2e778dd42c4c0fd1baad32eae46c2f3c390c5bfe8c2441040364c2e4e73b291934df5e98b3f592d5b84c33") 10:10:45 executing program 2: syz_mount_image$ext4(0x0, &(0x7f0000000440)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) openat$dir(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0xb0000, 0x0) r0 = openat$vcsu(0xffffffffffffff9c, &(0x7f0000000000), 0x5200, 0x0) fchmodat(r0, &(0x7f0000000040)='./file0\x00', 0x1b0) r1 = openat$incfs(r0, &(0x7f00000002c0)='.log\x00', 0x581200, 0x123) syz_genetlink_get_family_id$fou(&(0x7f0000000300), r1) renameat2(r1, &(0x7f0000000380)='./file0\x00', 0xffffffffffffffff, &(0x7f00000003c0)='./file1\x00', 0x0) getdents64(r1, &(0x7f0000000040)=""/143, 0x8f) 10:10:45 executing program 5: clone(0x1d101200, &(0x7f0000000000)="03249d46a3e4872afaea9772f3b646b9f473fb6c1566058e92edd437163eca68f00b1dd9d4c9080147cdf03dfd6c21f474", &(0x7f00000000c0), &(0x7f0000000080), &(0x7f00000001c0)="2bb186ddffd3af2596fc6a3d7b14d62098f5b6f5e2f01294d3cb53ad58afbdd939532f367c44d5d0707e67a6c8ab09150c390b5b4e85070036299b362fbe27a0ec3c831807006433bf6de4c8e4cf01ee3c04b285c3351ad4a7e0695a91e19b3f53f61ca44ce2e56a2bd55b1f9c003e992da4a3fecaf6c96b85a124b1d479888b7b52f352459bd39a19f62efd13f77d220a069b3dd6e42a2b90974438d600c89046783717cc0933d150d7fd8d1939b57d2e778dd42c4c0fd1baad32eae46c2f3c390c5bfe8c2441040364c2e4e73b291934df5e98b3f592d5b84c33") 10:10:45 executing program 4: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000040)={0x2, &(0x7f0000000000)=[{0x25}, {}]}) 10:10:45 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000040)={0x2, &(0x7f0000000000)=[{0x15, 0x0, 0x0, 0x6400}, {}]}) 10:10:45 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext3\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0xfeffffff00000000, &(0x7f0000000480)=ANY=[@ANYBLOB='lazytime,test_dummy_encryption,max_dir_size_kb=0x000000000200,grpjquota=,min_batch_time=0x00000000000003ff,rootcontext\a']) 10:10:45 executing program 1: sendmsg$NL802154_CMD_DEL_SEC_DEV(0xffffffffffffffff, &(0x7f0000000100)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x10000}, 0xc, &(0x7f00000000c0)={&(0x7f0000000040)={0x70, 0x0, 0x10, 0x70bd28, 0x25dfdbff, {}, [@NL802154_ATTR_WPAN_DEV={0xc, 0x6, 0x300000003}, @NL802154_ATTR_WPAN_DEV={0xc, 0x6, 0x200000002}, @NL802154_ATTR_WPAN_DEV={0xc, 0x6, 0x300000003}, @NL802154_ATTR_WPAN_DEV={0xc}, @NL802154_ATTR_SEC_DEVICE={0x10, 0x23, 0x0, 0x1, {0xc}}, @NL802154_ATTR_WPAN_DEV={0xc, 0x6, 0x2}, @NL802154_ATTR_SEC_DEVICE={0x10, 0x23, 0x0, 0x1, {0xc, 0x4, {0xaaaaaaaaaaaa0302}}}]}, 0x70}, 0x1, 0x0, 0x0, 0x8040}, 0xc080) syz_mount_image$ext4(&(0x7f0000000480)='ext3\x00', &(0x7f00000004c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000007c0)={[], [{@fscontext={'fscontext', 0x3d, 'sysadm_u'}}, {@defcontext={'defcontext', 0x3d, 'root'}}]}) 10:10:45 executing program 5: clone(0x1d101200, &(0x7f0000000000)="03249d46a3e4872afaea9772f3b646b9f473fb6c1566058e92edd437163eca68f00b1dd9d4c9080147cdf03dfd6c21f474", &(0x7f00000000c0), &(0x7f0000000080), &(0x7f00000001c0)="2bb186ddffd3af2596fc6a3d7b14d62098f5b6f5e2f01294d3cb53ad58afbdd939532f367c44d5d0707e67a6c8ab09150c390b5b4e85070036299b362fbe27a0ec3c831807006433bf6de4c8e4cf01ee3c04b285c3351ad4a7e0695a91e19b3f53f61ca44ce2e56a2bd55b1f9c003e992da4a3fecaf6c96b85a124b1d479888b7b52f352459bd39a19f62efd13f77d220a069b3dd6e42a2b90974438d600c89046783717cc0933d150d7fd8d1939b57d2e778dd42c4c0fd1baad32eae46c2f3c390c5bfe8c2441040364c2e4e73b291934df5e98b3f592d5b84c33") 10:10:45 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext3\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0xffffffff00000000, &(0x7f0000000480)=ANY=[@ANYBLOB='lazytime,test_dummy_encryption,max_dir_size_kb=0x000000000200,grpjquota=,min_batch_time=0x00000000000003ff,rootcontext\a']) 10:10:45 executing program 1: syz_mount_image$ext4(&(0x7f0000000480)='ext3\x00', &(0x7f00000004c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000007c0)=ANY=[@ANYBLOB="6673636f6e746590743d73797361646d5f752c641905636f5f752c00"]) 10:10:45 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000040)={0x2, &(0x7f0000000000)=[{0x15, 0x0, 0x0, 0x7400}, {}]}) 10:10:45 executing program 2: syz_mount_image$ext4(0x0, &(0x7f0000000200)='./file0\x00', 0xfefffffffffffffe, 0x0, 0x0, 0x211304f, 0x0) openat$dir(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0xb0000, 0x0) r0 = openat$vcsu(0xffffffffffffff9c, &(0x7f0000000340), 0x301, 0x0) ioctl$PTP_ENABLE_PPS(r0, 0x40043d04, 0x1) getdents(r0, &(0x7f0000000080)=""/251, 0xfb) r1 = openat$vcsu(0xffffffffffffff9c, &(0x7f0000000000), 0x5200, 0x0) fchmodat(r1, &(0x7f0000000040)='./file0\x00', 0x1b0) r2 = openat$incfs(r1, &(0x7f0000000240)='.log\x00', 0x28000, 0x33) syz_genetlink_get_family_id$fou(&(0x7f0000000300), r2) r3 = openat$vcsu(0xffffffffffffff9c, &(0x7f0000000000), 0x5200, 0x0) fchmodat(r3, &(0x7f0000000040)='./file0\x00', 0x1b0) r4 = openat$incfs(r3, &(0x7f00000002c0)='.log\x00', 0x581200, 0x123) syz_genetlink_get_family_id$fou(&(0x7f0000000300), r4) renameat2(r4, &(0x7f0000000380)='./file0\x00', 0xffffffffffffffff, &(0x7f00000003c0)='./file1\x00', 0x0) ioctl$FS_IOC_GET_ENCRYPTION_KEY_STATUS(r4, 0xc080661a, &(0x7f0000000180)={@id={0x2, 0x0, @b}}) renameat2(r2, &(0x7f0000000380)='./file0\x00', 0xffffffffffffffff, &(0x7f00000003c0)='./file1\x00', 0x0) faccessat2(r2, &(0x7f0000000040)='./file0\x00', 0xc0, 0x0) 10:10:45 executing program 4: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000040)={0x2, &(0x7f0000000000)=[{0x25, 0x0, 0x0, 0x2}, {}]}) 10:10:45 executing program 5: clone(0x0, &(0x7f0000000000)="03249d46a3e4872afaea9772f3b646b9f473fb6c1566058e92edd437163eca68f00b1dd9d4c9080147cdf03dfd6c21f474", &(0x7f00000000c0), &(0x7f0000000080), &(0x7f00000001c0)="2bb186ddffd3af2596fc6a3d7b14d62098f5b6f5e2f01294d3cb53ad58afbdd939532f367c44d5d0707e67a6c8ab09150c390b5b4e85070036299b362fbe27a0ec3c831807006433bf6de4c8e4cf01ee3c04b285c3351ad4a7e0695a91e19b3f53f61ca44ce2e56a2bd55b1f9c003e992da4a3fecaf6c96b85a124b1d479888b7b52f352459bd39a19f62efd13f77d220a069b3dd6e42a2b90974438d600c89046783717cc0933d150d7fd8d1939b57d2e778dd42c4c0fd1baad32eae46c2f3c390c5bfe8c2441040364c2e4e73b291934df5e98b3f592d5b84c33") 10:10:45 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000040)={0x2, &(0x7f0000000000)=[{0x15, 0x0, 0x0, 0x9400}, {}]}) 10:10:45 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext3\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000480)=ANY=[@ANYBLOB='\"azytime,test_dummy_encryption,max_dir_size_kb=0x000000000200,grpjquota=,min_batch_time=0x00000000000003ff,rootcontext\a']) 10:10:45 executing program 4: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000040)={0x2, &(0x7f0000000000)=[{0x25, 0x0, 0x0, 0x3}, {}]}) 10:10:45 executing program 5: clone(0x0, &(0x7f0000000000)="03249d46a3e4872afaea9772f3b646b9f473fb6c1566058e92edd437163eca68f00b1dd9d4c9080147cdf03dfd6c21f474", &(0x7f00000000c0), &(0x7f0000000080), &(0x7f00000001c0)="2bb186ddffd3af2596fc6a3d7b14d62098f5b6f5e2f01294d3cb53ad58afbdd939532f367c44d5d0707e67a6c8ab09150c390b5b4e85070036299b362fbe27a0ec3c831807006433bf6de4c8e4cf01ee3c04b285c3351ad4a7e0695a91e19b3f53f61ca44ce2e56a2bd55b1f9c003e992da4a3fecaf6c96b85a124b1d479888b7b52f352459bd39a19f62efd13f77d220a069b3dd6e42a2b90974438d600c89046783717cc0933d150d7fd8d1939b57d2e778dd42c4c0fd1baad32eae46c2f3c390c5bfe8c2441040364c2e4e73b291934df5e98b3f592d5b84c33") 10:10:45 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext3\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000480)=ANY=[@ANYBLOB=',azytime,test_dummy_encryption,max_dir_size_kb=0x000000000200,grpjquota=,min_batch_time=0x00000000000003ff,rootcontext\a']) 10:10:45 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000040)={0x2, &(0x7f0000000000)=[{0x15, 0x0, 0x0, 0xb100}, {}]}) 10:10:46 executing program 2: r0 = syz_mount_image$ext4(0x0, &(0x7f0000000440)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) openat$dir(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0xb0000, 0x0) faccessat2(r0, &(0x7f0000000040)='./file0\x00', 0x170, 0x100) r1 = openat$dir(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x505042, 0xc599162ec744a96b) unlinkat(r1, &(0x7f00000000c0)='./file0\x00', 0x0) 10:10:46 executing program 4: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000040)={0x2, &(0x7f0000000000)=[{0x25, 0x0, 0x0, 0x5}, {}]}) 10:10:46 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000040)={0x2, &(0x7f0000000000)=[{0x15, 0x0, 0x0, 0x200000}, {}]}) 10:10:46 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext3\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000480)=ANY=[@ANYBLOB='l\"zytime,test_dummy_encryption,max_dir_size_kb=0x000000000200,grpjquota=,min_batch_time=0x00000000000003ff,rootcontext\a']) 10:10:46 executing program 4: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000040)={0x2, &(0x7f0000000000)=[{0x25, 0x0, 0x0, 0x6}, {}]}) 10:10:46 executing program 5: clone(0x0, &(0x7f0000000000)="03249d46a3e4872afaea9772f3b646b9f473fb6c1566058e92edd437163eca68f00b1dd9d4c9080147cdf03dfd6c21f474", &(0x7f00000000c0), &(0x7f0000000080), &(0x7f00000001c0)="2bb186ddffd3af2596fc6a3d7b14d62098f5b6f5e2f01294d3cb53ad58afbdd939532f367c44d5d0707e67a6c8ab09150c390b5b4e85070036299b362fbe27a0ec3c831807006433bf6de4c8e4cf01ee3c04b285c3351ad4a7e0695a91e19b3f53f61ca44ce2e56a2bd55b1f9c003e992da4a3fecaf6c96b85a124b1d479888b7b52f352459bd39a19f62efd13f77d220a069b3dd6e42a2b90974438d600c89046783717cc0933d150d7fd8d1939b57d2e778dd42c4c0fd1baad32eae46c2f3c390c5bfe8c2441040364c2e4e73b291934df5e98b3f592d5b84c33") 10:10:46 executing program 2: r0 = syz_mount_image$ext4(0x0, &(0x7f0000000440)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) renameat2(r0, &(0x7f0000000000)='./file0/file0\x00', r0, &(0x7f0000000080)='./file0\x00', 0x2) r1 = openat$vcsu(0xffffffffffffff9c, &(0x7f0000000000), 0x5200, 0x0) fchmodat(r1, &(0x7f0000000040)='./file0\x00', 0x1b0) r2 = openat$incfs(r1, &(0x7f00000002c0)='.log\x00', 0x581200, 0x123) syz_genetlink_get_family_id$fou(&(0x7f0000000300), r2) renameat2(r2, &(0x7f0000000380)='./file0\x00', 0xffffffffffffffff, &(0x7f00000003c0)='./file1\x00', 0x0) fchmodat(r2, &(0x7f00000000c0)='./file0/file0\x00', 0x6b) openat$dir(0xffffffffffffff9c, &(0x7f0000000040)='./file0/file0\x00', 0x0, 0x20) 10:10:46 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000040)={0x2, &(0x7f0000000000)=[{0x15, 0x0, 0x0, 0x1000000}, {}]}) 10:10:46 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext3\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000480)=ANY=[@ANYBLOB='l,zytime,test_dummy_encryption,max_dir_size_kb=0x000000000200,grpjquota=,min_batch_time=0x00000000000003ff,rootcontext\a']) 10:10:46 executing program 4: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000040)={0x2, &(0x7f0000000000)=[{0x25, 0x0, 0x0, 0x7}, {}]}) 10:10:46 executing program 1: syz_mount_image$ext4(&(0x7f0000000480)='ext3\x00', &(0x7f00000004c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000007c0)=ANY=[@ANYRES32]) r0 = openat$vcsu(0xffffffffffffff9c, &(0x7f0000000000), 0x5200, 0x0) fchmodat(r0, &(0x7f0000000040)='./file0\x00', 0x1b0) r1 = openat$incfs(r0, &(0x7f00000002c0)='.log\x00', 0x581200, 0x123) r2 = accept4$packet(r0, &(0x7f0000000400)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000000440)=0x14, 0x100000) getsockname$packet(r1, &(0x7f0000000280)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000300)=0x14) accept$packet(r1, &(0x7f0000000340)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000380)=0x14) ioctl$sock_ipv6_tunnel_SIOCDELTUNNEL(r1, 0x89f2, &(0x7f00000003c0)={'ip6_vti0\x00', &(0x7f0000000500)={'syztnl0\x00', r3, 0x0, 0x6, 0x81, 0x5, 0x1, @mcast1, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02', 0x8, 0x7, 0x1, 0x7fff}}) getsockname$packet(r0, &(0x7f0000000580)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f00000005c0)=0x14) ioctl$ifreq_SIOCGIFINDEX_team(r0, 0x8933, &(0x7f0000000600)={'team0\x00', 0x0}) getsockname$packet(r1, &(0x7f0000000640)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000680)=0x14) accept4$packet(r2, &(0x7f00000006c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000700)=0x14, 0x0) ioctl$sock_ipv6_tunnel_SIOCDELPRL(r1, 0x89f6, &(0x7f0000000800)={'ip6gre0\x00', &(0x7f0000000740)={'sit0\x00', r3, 0x29, 0x3, 0x1f, 0x401, 0x7b, @mcast1, @local, 0x700, 0x1, 0x1}}) ioctl$sock_ipv6_tunnel_SIOCDELTUNNEL(r1, 0x89f2, &(0x7f00000008c0)={'syztnl1\x00', &(0x7f0000000840)={'syztnl1\x00', r3, 0x4, 0x25, 0x40, 0x9, 0x21, @local, @private1, 0x1, 0x8, 0xe0, 0x7}}) getsockname$packet(r2, &(0x7f0000000900)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000940)=0x14) accept4$packet(r0, &(0x7f0000000980)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @multicast}, &(0x7f00000009c0)=0x14, 0x800) getpeername$packet(r0, &(0x7f0000000a00)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000a40)=0x14) accept$packet(r1, &(0x7f0000000a80)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000ac0)=0x14) sendmsg$TEAM_CMD_NOOP(r0, &(0x7f0000001780)={&(0x7f0000000080), 0xc, &(0x7f0000001740)={&(0x7f00000017c0)={0xc48, 0x0, 0x100, 0x70bd28, 0x25dfdbff, {}, [{{0x8, 0x1, r3}, {0x230, 0x2, 0x0, 0x1, [{0x3c, 0x1, @user_linkup={{{0x24}, {0x5}, {0x4}}, {0x8}}}, {0x38, 0x1, @notify_peers_count={{0x24}, {0x5}, {0x8, 0x4, 0x8}}}, {0x3c, 0x1, @user_linkup={{{0x24}, {0x5}, {0x4}}, {0x8}}}, {0x40, 0x1, @lb_port_stats={{{0x24}, {0x5}, {0x8, 0x4, 0x5}}, {0x8}}}, {0x3c, 0x1, @enabled={{{0x24}, {0x5}, {0x4}}, {0x8, 0x6, r3}}}, {0x40, 0x1, @lb_port_stats={{{0x24}, {0x5}, {0x8, 0x4, 0x3}}, {0x8, 0x6, r3}}}, {0x84, 0x1, @bpf_hash_func={{0x24}, {0x5}, {0x54, 0x4, [{0x8, 0x42, 0x3f, 0x1}, {0x1, 0xec, 0x6, 0x5}, {0x7, 0x8, 0x34, 0x4}, {0x401, 0x5, 0x3f, 0x5}, {0x44, 0x0, 0x80, 0x7}, {0x5, 0x0, 0x7f, 0x5e}, {0xffff, 0x4, 0x19, 0x8}, {0x8, 0xad, 0x0, 0x2}, {0x2, 0x0, 0x1, 0xac0}, {0x100, 0x7f, 0xde, 0x2}]}}}, {0x3c, 0x1, @enabled={{{0x24}, {0x5}, {0x4}}, {0x8, 0x6, r3}}}]}}, {{0x8, 0x1, r4}, {0x118, 0x2, 0x0, 0x1, [{0x38, 0x1, @mcast_rejoin_interval={{0x24}, {0x5}, {0x8, 0x4, 0xae3}}}, {0x38, 0x1, @mcast_rejoin_interval={{0x24}, {0x5}, {0x8, 0x4, 0xffffffff}}}, {0x40, 0x1, @lb_tx_hash_to_port_mapping={{{0x24}, {0x5}, {0x8, 0x4, r5}}, {0x8}}}, {0x64, 0x1, @bpf_hash_func={{0x24}, {0x5}, {0x34, 0x4, [{0x6, 0x8, 0xb8, 0x2}, {0x5, 0xff, 0x7, 0x7ff}, {0x9, 0x1f, 0x2, 0x1000}, {0x85, 0xe6, 0x3, 0x100}, {0x9, 0x5, 0x40, 0x8}, {0x8000, 0xa, 0x37, 0x81}]}}}]}}, {{0x8, 0x1, r3}, {0x84, 0x2, 0x0, 0x1, [{0x40, 0x1, @priority={{{0x24}, {0x5}, {0x8, 0x4, 0x5cf}}, {0x8, 0x6, r6}}}, {0x40, 0x1, @lb_hash_stats={{{0x24}, {0x5}, {0x8, 0x4, 0x7}}, {0x8}}}]}}, {{0x8, 0x1, r7}, {0x164, 0x2, 0x0, 0x1, [{0x38, 0x1, @lb_stats_refresh_interval={{0x24}, {0x5}, {0x8, 0x4, 0x5}}}, {0x38, 0x1, @notify_peers_count={{0x24}, {0x5}, {0x8, 0x4, 0x6}}}, {0x38, 0x1, @lb_stats_refresh_interval={{0x24}, {0x5}, {0x8, 0x4, 0x50f0}}}, {0x3c, 0x1, @user_linkup_enabled={{{0x24}, {0x5}, {0x4}}, {0x8, 0x6, r8}}}, {0x40, 0x1, @queue_id={{{0x24}, {0x5}, {0x8, 0x4, 0x892}}, {0x8, 0x6, r3}}}, {0x3c, 0x1, @enabled={{{0x24}, {0x5}, {0x4}}, {0x8, 0x6, r3}}}]}}, {{0x8, 0x1, r9}, {0x3c, 0x2, 0x0, 0x1, [{0x38, 0x1, @notify_peers_interval={{0x24}, {0x5}, {0x8, 0x4, 0x7}}}]}}, {{0x8, 0x1, r3}, {0x1ec, 0x2, 0x0, 0x1, [{0x40, 0x1, @lb_hash_stats={{{0x24}, {0x5}, {0x8, 0x4, 0x7befdea4}}, {0x8}}}, {0x40, 0x1, @lb_hash_stats={{{0x24}, {0x5}, {0x8, 0x4, 0x1}}, {0x8}}}, {0x40, 0x1, @priority={{{0x24}, {0x5}, {0x8, 0x4, 0x8}}, {0x8, 0x6, r3}}}, {0x40, 0x1, @name={{0x24}, {0x5}, {0xf, 0x4, 'roundrobin\x00'}}}, {0x38, 0x1, @notify_peers_count={{0x24}, {0x5}, {0x8, 0x4, 0x6}}}, {0x3c, 0x1, @enabled={{{0x24}, {0x5}, {0x4}}, {0x8, 0x6, r10}}}, {0x38, 0x1, @notify_peers_interval={{0x24}, {0x5}, {0x8, 0x4, 0x6d}}}, {0x3c, 0x1, @user_linkup={{{0x24}, {0x5}, {0x4}}, {0x8, 0x6, r3}}}]}}, {{0x8, 0x1, r3}, {0xb4, 0x2, 0x0, 0x1, [{0x38, 0x1, @notify_peers_count={{0x24}, {0x5}, {0x8, 0x4, 0x101}}}, {0x40, 0x1, @lb_port_stats={{{0x24}, {0x5}, {0x8, 0x4, 0x5}}, {0x8, 0x6, r11}}}, {0x38, 0x1, @lb_stats_refresh_interval={{0x24}, {0x5}, {0x8, 0x4, 0x7ff}}}]}}, {{0x8, 0x1, r12}, {0x80, 0x2, 0x0, 0x1, [{0x3c, 0x1, @lb_tx_method={{0x24}, {0x5}, {0x9, 0x4, 'hash\x00'}}}, {0x40, 0x1, @lb_tx_hash_to_port_mapping={{{0x24}, {0x5}, {0x8, 0x4, r3}}, {0x8}}}]}}, {{0x8, 0x1, r13}, {0x12c, 0x2, 0x0, 0x1, [{0x40, 0x1, @lb_port_stats={{{0x24}, {0x5}, {0x8, 0x4, 0x65f}}, {0x8, 0x6, r3}}}, {0x38, 0x1, @activeport={{0x24}, {0x5}, {0x8, 0x4, r3}}}, {0x40, 0x1, @lb_hash_stats={{{0x24}, {0x5}, {0x8, 0x4, 0x1}}, {0x8}}}, {0x38, 0x1, @lb_stats_refresh_interval={{0x24}, {0x5}, {0x8, 0x4, 0x1}}}, {0x38, 0x1, @lb_stats_refresh_interval={{0x24}, {0x5}, {0x8, 0x4, 0x4}}}]}}, {{0x8, 0x1, r3}, {0x22c, 0x2, 0x0, 0x1, [{0x38, 0x1, @notify_peers_count={{0x24}, {0x5}, {0x8, 0x4, 0xffff8000}}}, {0x40, 0x1, @lb_port_stats={{{0x24}, {0x5}, {0x8, 0x4, 0xffffffff}}, {0x8, 0x6, r3}}}, {0x3c, 0x1, @enabled={{{0x24}, {0x5}, {0x4}}, {0x8, 0x6, r3}}}, {0x3c, 0x1, @name={{0x24}, {0x5}, {0xb, 0x4, 'random\x00'}}}, {0x40, 0x1, @queue_id={{{0x24}, {0x5}, {0x8, 0x4, 0x3}}, {0x8, 0x6, r14}}}, {0x3c, 0x1, @enabled={{{0x24}, {0x5}, {0x4}}, {0x8, 0x6, r15}}}, {0x38, 0x1, @activeport={{0x24}, {0x5}, {0x8, 0x4, r16}}}, {0x40, 0x1, @queue_id={{{0x24}, {0x5}, {0x8}}, {0x8, 0x6, r3}}}, {0x44, 0x1, @name={{0x24}, {0x5}, {0x11, 0x4, 'activebackup\x00'}}}]}}]}, 0xc48}, 0x1, 0x0, 0x0, 0x800}, 0x8010) openat$incfs(r0, &(0x7f0000000000)='.pending_reads\x00', 0x20000, 0x0) 10:10:46 executing program 5: clone(0x1d101200, 0x0, &(0x7f00000000c0), &(0x7f0000000080), &(0x7f00000001c0)="2bb186ddffd3af2596fc6a3d7b14d62098f5b6f5e2f01294d3cb53ad58afbdd939532f367c44d5d0707e67a6c8ab09150c390b5b4e85070036299b362fbe27a0ec3c831807006433bf6de4c8e4cf01ee3c04b285c3351ad4a7e0695a91e19b3f53f61ca44ce2e56a2bd55b1f9c003e992da4a3fecaf6c96b85a124b1d479888b7b52f352459bd39a19f62efd13f77d220a069b3dd6e42a2b90974438d600c89046783717cc0933d150d7fd8d1939b57d2e778dd42c4c0fd1baad32eae46c2f3c390c5bfe8c2441040364c2e4e73b291934df5e98b3f592d5b84c33") 10:10:46 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000040)={0x2, &(0x7f0000000000)=[{0x15, 0x0, 0x0, 0x2000000}, {}]}) 10:10:46 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext3\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000480)=ANY=[@ANYBLOB='la\"ytime,test_dummy_encryption,max_dir_size_kb=0x000000000200,grpjquota=,min_batch_time=0x00000000000003ff,rootcontext\a']) 10:10:46 executing program 4: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000040)={0x2, &(0x7f0000000000)=[{0x25, 0x0, 0x0, 0x9}, {}]}) 10:10:46 executing program 2: prctl$PR_SET_TIMERSLACK(0x1d, 0x1) r0 = syz_mount_image$ext4(0x0, &(0x7f0000000440)='./file0\x00', 0x10000, 0x0, 0x0, 0x0, 0x0) openat$dir(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0xb0000, 0x0) r1 = openat$incfs(r0, &(0x7f0000000040)='.log\x00', 0x0, 0x40) faccessat(r1, &(0x7f0000000080)='./file0\x00', 0x4) 10:10:46 executing program 5: clone(0x1d101200, 0x0, 0x0, &(0x7f0000000080), &(0x7f00000001c0)="2bb186ddffd3af2596fc6a3d7b14d62098f5b6f5e2f01294d3cb53ad58afbdd939532f367c44d5d0707e67a6c8ab09150c390b5b4e85070036299b362fbe27a0ec3c831807006433bf6de4c8e4cf01ee3c04b285c3351ad4a7e0695a91e19b3f53f61ca44ce2e56a2bd55b1f9c003e992da4a3fecaf6c96b85a124b1d479888b7b52f352459bd39a19f62efd13f77d220a069b3dd6e42a2b90974438d600c89046783717cc0933d150d7fd8d1939b57d2e778dd42c4c0fd1baad32eae46c2f3c390c5bfe8c2441040364c2e4e73b291934df5e98b3f592d5b84c33") 10:10:46 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000040)={0x2, &(0x7f0000000000)=[{0x15, 0x0, 0x0, 0x3000000}, {}]}) 10:10:46 executing program 1: syz_mount_image$ext4(&(0x7f0000000480)='ext3\x00', &(0x7f00000004c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000007c0)=ANY=[@ANYBLOB="6673636f6e746578000004007361646d59752c646566636f6e746578743d73740500665f752c00"]) 10:10:46 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext3\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000480)=ANY=[@ANYBLOB='la,ytime,test_dummy_encryption,max_dir_size_kb=0x000000000200,grpjquota=,min_batch_time=0x00000000000003ff,rootcontext\a']) 10:10:46 executing program 4: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000040)={0x2, &(0x7f0000000000)=[{0x25, 0x0, 0x0, 0x15}, {}]}) 10:10:46 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000040)={0x2, &(0x7f0000000000)=[{0x15, 0x0, 0x0, 0x5000000}, {}]}) 10:10:46 executing program 2: ioctl$FS_IOC_GET_ENCRYPTION_KEY_STATUS(0xffffffffffffffff, 0xc080661a, &(0x7f00000005c0)={@desc={0x1, 0x0, @desc3}}) syz_mount_image$ext4(0x0, &(0x7f0000000440)='./file1\x00', 0x0, 0x0, 0x0, 0x100000, 0x0) r0 = openat$vcsu(0xffffffffffffff9c, &(0x7f0000000080), 0x4000, 0x0) execveat(r0, &(0x7f00000000c0)='./file1\x00', &(0x7f0000000380)=[&(0x7f0000000100)='\'', &(0x7f0000000140)='g\x00', &(0x7f0000000180)='-#&$\x00', &(0x7f00000001c0)='}`$\x00', &(0x7f0000000200)='}\x00', &(0x7f0000000240)=':-\x00', &(0x7f0000000280)=')-^\x00', &(0x7f00000002c0)='+-@-,\xf6#-\xc3,$\x00', &(0x7f0000000300)='\xb2\x00', &(0x7f0000000340)='\x00'], &(0x7f0000000580)=[&(0x7f0000000400)='[\'{)\x00', &(0x7f0000000480)='*(!-\x00', &(0x7f00000004c0)='\x00', &(0x7f0000000500)='\x00', &(0x7f0000000540)=']\x00'], 0x1000) openat$dir(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x8000, 0x21) openat$dir(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0xb0000, 0x0) 10:10:46 executing program 1: sendmsg$TIPC_CMD_GET_MEDIA_NAMES(0xffffffffffffffff, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x2000}, 0xc, &(0x7f0000000080)={&(0x7f0000000040)={0x1c, 0x0, 0x20, 0x70bd2c, 0x25dfdbfd, {}, [""]}, 0x1c}, 0x1, 0x0, 0x0, 0x804}, 0x40014) syz_mount_image$ext4(&(0x7f0000000480)='ext3\x00', &(0x7f00000004c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="6673636f6e746578743d73797361646d5f752c646566636f6e746578743d73740400665f752c00c07ba813070a7735df1d3f2ec37ad9434c45e76200c5ecec7dcbcf898b0fc098d081e47d821859472c718f5efa7a15e29886b4f8d7d43e29d0e0259bcf3f9e159220d125c502b0131f6613137c12ae64fbb00eaa813e3cdc2f92cd2645cb3095393f4a573dd0fd76075f253b82d9b4e4940221cf0d52fda7cd96cf94871a547eac2886"]) 10:10:46 executing program 4: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000040)={0x2, &(0x7f0000000000)=[{0x25, 0x0, 0x0, 0x16}, {}]}) 10:10:46 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext3\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000480)=ANY=[@ANYBLOB='laz\"time,test_dummy_encryption,max_dir_size_kb=0x000000000200,grpjquota=,min_batch_time=0x00000000000003ff,rootcontext\a']) 10:10:46 executing program 5: clone(0x1d101200, 0x0, 0x0, 0x0, &(0x7f00000001c0)="2bb186ddffd3af2596fc6a3d7b14d62098f5b6f5e2f01294d3cb53ad58afbdd939532f367c44d5d0707e67a6c8ab09150c390b5b4e85070036299b362fbe27a0ec3c831807006433bf6de4c8e4cf01ee3c04b285c3351ad4a7e0695a91e19b3f53f61ca44ce2e56a2bd55b1f9c003e992da4a3fecaf6c96b85a124b1d479888b7b52f352459bd39a19f62efd13f77d220a069b3dd6e42a2b90974438d600c89046783717cc0933d150d7fd8d1939b57d2e778dd42c4c0fd1baad32eae46c2f3c390c5bfe8c2441040364c2e4e73b291934df5e98b3f592d5b84c33") 10:10:46 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000040)={0x2, &(0x7f0000000000)=[{0x15, 0x0, 0x0, 0x6000000}, {}]}) 10:10:46 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext3\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000480)=ANY=[@ANYBLOB='laz,time,test_dummy_encryption,max_dir_size_kb=0x000000000200,grpjquota=,min_batch_time=0x00000000000003ff,rootcontext\a']) 10:10:46 executing program 1: r0 = syz_mount_image$ext4(&(0x7f0000000480)='ext3\x00', &(0x7f00000004c0)='./file0\x00', 0x0, 0x0, 0x0, 0x1000004, &(0x7f0000000000)={[], [{@fsname={'fsname', 0x3d, '@@]}\\'}}, {@fsuuid={'fsuuid', 0x3d, {[0xc41f963fcf53700, 0x31, 0x61, 0x62, 0x62, 0x63, 0x32, 0x61], 0x2d, [0x37, 0x30, 0x37, 0x33], 0x2d, [0x36, 0x37, 0x64, 0x66], 0x2d, [0x36, 0x66, 0x33, 0x38], 0x2d, [0x61, 0x31, 0x36, 0x35, 0x31, 0x2, 0x51, 0x37]}}}]}) renameat2(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', r0, &(0x7f0000000080)='./file0\x00', 0x5) 10:10:46 executing program 4: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000040)={0x2, &(0x7f0000000000)=[{0x25, 0x0, 0x0, 0x1d}, {}]}) 10:10:46 executing program 5: clone(0x1d101200, 0x0, 0x0, 0x0, 0x0) 10:10:46 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000040)={0x2, &(0x7f0000000000)=[{0x15, 0x0, 0x0, 0x7000000}, {}]}) 10:10:46 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext3\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000480)=ANY=[@ANYBLOB='lazy\"ime,test_dummy_encryption,max_dir_size_kb=0x000000000200,grpjquota=,min_batch_time=0x00000000000003ff,rootcontext\a']) 10:10:46 executing program 4: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000040)={0x2, &(0x7f0000000000)=[{0x25, 0x0, 0x0, 0x25}, {}]}) 10:10:46 executing program 1: syz_mount_image$ext4(&(0x7f0000000480)='ext3\x00', &(0x7f00000004c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000007c0)=ANY=[@ANYBLOB="6673636f6e746578743d73797361646d5f7505000000000000006578743d73746166665f752c00"]) 10:10:46 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext3\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000480)=ANY=[@ANYBLOB='\"azytime,test_dummy_encryption,max_dir_size_kb=0x000000000200,grpjquota=,min_batch_time=0x00000000000003ff,rootcontext\a']) 10:10:46 executing program 2: r0 = syz_mount_image$ext4(0x0, &(0x7f0000000440)='./file0\x00', 0xfffffffffffffffe, 0x4a, 0x0, 0x0, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000080)={{{@in6=@remote, @in6=@local, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@multicast2}, 0x0, @in=@loopback}}, &(0x7f0000000180)=0xe8) r2 = syz_genetlink_get_family_id$team(&(0x7f0000000200), 0xffffffffffffffff) ioctl$sock_ipv6_tunnel_SIOCDELPRL(0xffffffffffffffff, 0x89f6, &(0x7f00000002c0)={'ip6_vti0\x00', &(0x7f0000000240)={'sit0\x00', r1, 0x56, 0x9, 0x52, 0x1ff, 0x1d, @mcast2, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x8, 0x40, 0x5, 0x2}}) sendmsg$TEAM_CMD_NOOP(0xffffffffffffffff, &(0x7f00000004c0)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x80}, 0xc, &(0x7f0000000480)={&(0x7f0000000500)={0x12c, r2, 0x0, 0x70bd25, 0x25dfdbfe, {}, [{{0x8, 0x1, r1}, {0x7c, 0x2, 0x0, 0x1, [{0x40, 0x1, @lb_hash_stats={{{0x24}, {0x5}, {0x8, 0x4, 0xfffffffa}}, {0x8}}}, {0x38, 0x1, @mcast_rejoin_interval={{0x24}, {0x5}, {0x8, 0x4, 0x8}}}]}}, {{0x8, 0x1, r1}, {0x8c, 0x2, 0x0, 0x1, [{0x3c, 0x1, @user_linkup_enabled={{{0x24}, {0x5}, {0x4}}, {0x8, 0x6, r3}}}, {0x4c, 0x1, @bpf_hash_func={{0x24}, {0x5}, {0x1c, 0x4, [{0x5000, 0x40, 0x80, 0x3}, {0xe1, 0x3, 0x6, 0x3f}, {0x7, 0x80, 0xb8, 0xffff}]}}}]}}]}, 0x12c}, 0x1, 0x0, 0x0, 0x20000000}, 0x8000) faccessat(r0, &(0x7f0000000040)='./file0/file0\x00', 0x40) openat$dir(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0xb0000, 0x0) 10:10:46 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000040)={0x2, &(0x7f0000000000)=[{0x15, 0x0, 0x0, 0x9000000}, {}]}) 10:10:46 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext3\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000480)=ANY=[@ANYBLOB='lazy,ime,test_dummy_encryption,max_dir_size_kb=0x000000000200,grpjquota=,min_batch_time=0x00000000000003ff,rootcontext\a']) 10:10:46 executing program 1: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NBD_CMD_CONNECT(r0, &(0x7f00000013c0)={&(0x7f00000012c0), 0xc, &(0x7f0000001380)={0x0}}, 0xc6c3dbe86af1a089) r1 = openat$vcsu(0xffffffffffffff9c, &(0x7f0000000080), 0xca4464b378d1c6cf, 0x0) r2 = syz_genetlink_get_family_id$tipc(&(0x7f0000000100), 0xffffffffffffffff) sendmsg$TIPC_CMD_SET_LINK_TOL(r1, &(0x7f0000000200)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x20000000}, 0xc, &(0x7f00000001c0)={&(0x7f0000000140)={0x68, r2, 0x800, 0x70bd2d, 0x25dfdbff, {{}, {}, {0x4c, 0x18, {0x8, @media='udp\x00'}}}, ["", "", "", ""]}, 0x68}, 0x1, 0x0, 0x0, 0x28044000}, 0x4) syz_mount_image$ext4(&(0x7f0000000000)='ext3\x00', &(0x7f00000004c0)='./file0\x00', 0x4, 0x0, 0x0, 0x48008, &(0x7f0000000040)=ANY=[@ANYRES64=r0, @ANYRESDEC, @ANYRES64]) 10:10:46 executing program 4: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000040)={0x2, &(0x7f0000000000)=[{0x25, 0x0, 0x0, 0x28}, {}]}) 10:10:46 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000040)={0x2, &(0x7f0000000000)=[{0x15, 0x0, 0x0, 0x15000000}, {}]}) 10:10:46 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext3\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000480)=ANY=[@ANYBLOB='\"azytime,test_dummy_encryption,max_dir_size_kb=0x000000000200,grpjquota=,min_batch_time=0x00000000000003ff,rootcontext\a']) 10:10:46 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext3\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000480)=ANY=[@ANYBLOB='lazyt\"me,test_dummy_encryption,max_dir_size_kb=0x000000000200,grpjquota=,min_batch_time=0x00000000000003ff,rootcontext\a']) 10:10:46 executing program 2: syz_mount_image$ext4(0x0, &(0x7f0000000440)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) openat$dir(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x200000, 0x81) 10:10:46 executing program 4: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000040)={0x2, &(0x7f0000000000)=[{0x25, 0x0, 0x0, 0x29}, {}]}) 10:10:46 executing program 1: syz_mount_image$ext4(&(0x7f0000000480)='ext3\x00', &(0x7f00000004c0)='./file0\x00', 0x8000000000, 0x0, 0x0, 0x0, &(0x7f00000007c0)={[], [{@fscontext={'fscontext', 0x3d, 'sysadm_u'}}, {@defcontext={'defcontext', 0x3d, 'staff_u'}}]}) 10:10:46 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000040)={0x2, &(0x7f0000000000)=[{0x15, 0x0, 0x0, 0x16000000}, {}]}) 10:10:47 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext3\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000480)=ANY=[@ANYBLOB='\"azytime,test_dummy_encryption,max_dir_size_kb=0x000000000200,grpjquota=,min_batch_time=0x00000000000003ff,rootcontext\a']) 10:10:47 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext3\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000480)=ANY=[@ANYBLOB='lazyt,me,test_dummy_encryption,max_dir_size_kb=0x000000000200,grpjquota=,min_batch_time=0x00000000000003ff,rootcontext\a']) 10:10:47 executing program 1: syz_mount_image$ext4(&(0x7f0000000480)='ext3\x00', &(0x7f00000004c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)=ANY=[@ANYBLOB="6673636f2e59f7590f638d37ac61646d5f752c646566636f6e74e578743d7374613c415f752c004973f9ef06b7c351b6d9cec4f79ab6"]) 10:10:47 executing program 4: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000040)={0x2, &(0x7f0000000000)=[{0x25, 0x0, 0x0, 0x2d}, {}]}) 10:10:47 executing program 2: syz_mount_image$ext4(0x0, &(0x7f0000000440)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r0 = openat$vcsu(0xffffffffffffff9c, &(0x7f0000000340), 0x301, 0x0) ioctl$PTP_ENABLE_PPS(r0, 0x40043d04, 0x1) openat$incfs(r0, &(0x7f0000000040)='.pending_reads\x00', 0x20000, 0x48) prctl$PR_SET_THP_DISABLE(0x29, 0x0) openat$dir(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0xb0000, 0x0) 10:10:47 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000040)={0x2, &(0x7f0000000000)=[{0x15, 0x0, 0x0, 0x1d000000}, {}]}) 10:10:47 executing program 5: syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000480)=ANY=[@ANYBLOB='\"azytime,test_dummy_encryption,max_dir_size_kb=0x000000000200,grpjquota=,min_batch_time=0x00000000000003ff,rootcontext\a']) 10:10:47 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext3\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000480)=ANY=[@ANYBLOB='lazyti\"e,test_dummy_encryption,max_dir_size_kb=0x000000000200,grpjquota=,min_batch_time=0x00000000000003ff,rootcontext\a']) 10:10:47 executing program 1: syz_mount_image$ext4(&(0x7f0000000480)='ext3\x00', &(0x7f00000004c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000007c0)={[], [{@fscontext={'fscontext', 0x3d, 'sysadm_u'}}, {@defcontext={'defcontext', 0x3d, 'staff_u'}}]}) execveat(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', &(0x7f0000000100)=[&(0x7f0000000040)='defcontext', &(0x7f0000000080)='staff_u', &(0x7f00000000c0)=':+\\&:*()+\x00'], &(0x7f0000000240)=[&(0x7f0000000140)='sysadm_u', &(0x7f0000000180)='ext3\x00', &(0x7f00000001c0)='-\xbe##(^-{,%*(\x00', &(0x7f0000000200)='sysadm_u'], 0x800) 10:10:47 executing program 4: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000040)={0x2, &(0x7f0000000000)=[{0x25, 0x0, 0x0, 0x30}, {}]}) 10:10:47 executing program 2: syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file1\x00', 0x4000000008001, 0x0, 0x0, 0x281410, 0x0) r0 = openat$dir(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x6c8500, 0x5) getdents64(r0, &(0x7f00000000c0)=""/190, 0xbe) 10:10:47 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000040)={0x2, &(0x7f0000000000)=[{0x15, 0x0, 0x0, 0x20000000}, {}]}) 10:10:47 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext3\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000480)=ANY=[@ANYBLOB='lazyti,e,test_dummy_encryption,max_dir_size_kb=0x000000000200,grpjquota=,min_batch_time=0x00000000000003ff,rootcontext\a']) 10:10:47 executing program 5: syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000480)=ANY=[@ANYBLOB='\"azytime,test_dummy_encryption,max_dir_size_kb=0x000000000200,grpjquota=,min_batch_time=0x00000000000003ff,rootcontext\a']) 10:10:47 executing program 4: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000040)={0x2, &(0x7f0000000000)=[{0x25, 0x0, 0x0, 0x34}, {}]}) 10:10:47 executing program 1: add_key$keyring(&(0x7f0000000000), &(0x7f0000000040)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffff9) syz_mount_image$ext4(&(0x7f0000000480)='ext3\x00', &(0x7f00000004c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000007c0)={[], [{@fscontext={'fscontext', 0x3d, 'sysadm_u'}}, {@defcontext={'defcontext', 0x3d, 'staff_u'}}]}) 10:10:47 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000040)={0x2, &(0x7f0000000000)=[{0x15, 0x0, 0x0, 0x25000000}, {}]}) 10:10:47 executing program 4: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000040)={0x2, &(0x7f0000000000)=[{0x25, 0x0, 0x0, 0x35}, {}]}) 10:10:47 executing program 1: syz_mount_image$ext4(&(0x7f0000000480)='ext3\x00', &(0x7f00000004c0)='./file0\x00', 0x400000000000000, 0x0, 0x0, 0x0, &(0x7f00000007c0)={[], [{@fscontext={'fscontext', 0x3d, 'sysadm_u'}}, {@defcontext={'defcontext', 0x3d, 'staff_u'}}]}) 10:10:47 executing program 2: syz_mount_image$ext4(0x0, &(0x7f0000000440)='./file0\x00', 0x0, 0x0, 0x0, 0x2830010, 0x0) openat$dir(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0xb0000, 0x0) openat$dir(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x200280, 0x10) 10:10:47 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext3\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000480)=ANY=[@ANYBLOB='lazytim\",test_dummy_encryption,max_dir_size_kb=0x000000000200,grpjquota=,min_batch_time=0x00000000000003ff,rootcontext\a']) 10:10:47 executing program 5: syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000480)=ANY=[@ANYBLOB='\"azytime,test_dummy_encryption,max_dir_size_kb=0x000000000200,grpjquota=,min_batch_time=0x00000000000003ff,rootcontext\a']) 10:10:47 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000040)={0x2, &(0x7f0000000000)=[{0x15, 0x0, 0x0, 0x28000000}, {}]}) 10:10:47 executing program 4: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000040)={0x2, &(0x7f0000000000)=[{0x25, 0x0, 0x0, 0x3d}, {}]}) 10:10:47 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext3\x00', 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000480)=ANY=[@ANYBLOB='\"azytime,test_dummy_encryption,max_dir_size_kb=0x000000000200,grpjquota=,min_batch_time=0x00000000000003ff,rootcontext\a']) 10:10:47 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext3\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000480)=ANY=[@ANYBLOB='lazytim,,test_dummy_encryption,max_dir_size_kb=0x000000000200,grpjquota=,min_batch_time=0x00000000000003ff,rootcontext\a']) 10:10:47 executing program 2: syz_mount_image$ext4(0x0, &(0x7f0000000440)='./file0\x00', 0x0, 0x0, 0x0, 0x800000, 0x0) r0 = openat$vcsu(0xffffffffffffff9c, &(0x7f0000000000), 0x5200, 0x0) fchmodat(r0, &(0x7f0000000040)='./file0\x00', 0x1b0) openat$incfs(r0, &(0x7f00000002c0)='.log\x00', 0x581200, 0x123) accept4$packet(r0, &(0x7f0000000400)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000000440)=0x14, 0x100000) symlinkat(&(0x7f0000000040)='./file0\x00', r0, &(0x7f0000000080)='./file0\x00') openat$dir(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0xb0000, 0x0) 10:10:47 executing program 1: r0 = syz_mount_image$ext4(&(0x7f0000000040)='ext3\x00', &(0x7f0000000080)='./file0\x00', 0x1000, 0x9, &(0x7f0000000640)=[{&(0x7f00000000c0)="3ba0d1d6dee8f818466d291d23d3e05d7cdcce09be79f6ad4409bbd6b15a2ac443660c80a648827fa9649830ebe0761b1252594787785fdf185455d6ec7f8d7338264c62beeb22e9f1f3e88eee747ccb8da9c005e4900b45d207930fea7a16cc99c50a57ca1170d5a771b59a0e8ce4f7bdcda82b8f1493cd", 0x78, 0xff}, {&(0x7f0000000140)="48a45c0171c15981d4e9294553424fda5d3ccb12147384981d697ce72c1635b1502e07764c1760211f5fc5c76a6e020442fff61822c44570e75d7da75389309b3df50281e5e51b5cbd857d2e249953bd939556aa8e62b489b59dcdf71a3b", 0x5e, 0x8}, {&(0x7f00000001c0)="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", 0xfd}, {&(0x7f00000002c0)="afc81bbe51e510afe00d0e9cc8806aaeae6dd3804260b55f6c0eeff2ae60fca0d5a8d8f41c35c21477e50d3ce517d69e700ef51e4d945f954be5482142506b8e2cf18a461c04f67f", 0x48, 0x4}, {&(0x7f0000000340)="eef2ccca4520fe642141d6ecfb646b24ca6c8b5faba86dde2edf1199f10de031f8daf313d6a723bc84a89b1776c87d388039a120d12fa6677f747f29e075bd0cf8cf5a7cf91a043cc760159476a26e1de1d14c9cc8ecf0ee2ad31917242624b4de41cbd54d8120204e4570101b1e38c7ef2cdb01465484598f81d67be551030f996327a5bef8319fe09963e538b5b697f68e94982318caec23f52e42f94fa2693e8715e1a5f6f1345c997e94d86c1f83c8be919e7b9d30cf82a3ec96a5216e2969c497f431f402363eb7575a25fce9a0ca7476d8428246a2b5568430b3381e475a1d7dfb6225b772b717f9caf35842d4", 0xf0, 0x8}, {&(0x7f0000000440)="27f4ecf674aad6cc05085b", 0xb, 0x100000001}, {&(0x7f0000000480)="4c9adcc6dbe689c0b8611028401441f6abc6958bc55272373c3ad03047c24e86e6be1df11b71620551d7e85463f310d761aecc5dbcc8ebc946159c842ff0f57afaab6adebd643008e7b2f07ec68e9280fe9c9f7f24c0d00484ad5f5ffeb80927a62abe9549645ab9fabc6934f2de7cc42147e6745446", 0x76, 0x9}, {&(0x7f0000000500)="1a406b9ef4e88dfcb7bb337d6694b2110f2b8d86aaf1fe57f8b2df6676beea567ec2ba744e59d80d48944723c99ef7d4e78192b3dbad73bc6f55881a952b6cadc06d7df7c7ad27c266956dc28d0bc945ce137f38684c3ddc25d6b397e561fe1041e3bb063fa125653024b9718e4eddf5f0da2e0c68a236d61fa854ed8901b8e301761d9349b6d614b5d076e35daaa07d26c22813141b46758a545c40fbc1c688ac2330e95927922b9bfb4b2b59709245bfa85bc3cbd6f48f8b7f58249f6b47eaaed958f9a4fe37ebe9ba7510631a92032c3faa4d6a055accb030fb4e08b1549f08647f7c6307c44a904c2faf2c1b3d", 0xef, 0x467}, {&(0x7f0000000600)="586e90a1df25b99a7a943aeac51ef58ee75deddbd2378664996a4c13b1f586cc11372c97", 0x24, 0x3}], 0x804, &(0x7f00000008c0)=ANY=[@ANYBLOB="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"]) socket$nl_generic(0x10, 0x3, 0x10) unlinkat(r0, &(0x7f0000000000)='./file0\x00', 0x0) 10:10:47 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000040)={0x2, &(0x7f0000000000)=[{0x15, 0x0, 0x0, 0x2d000000}, {}]}) 10:10:47 executing program 4: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000040)={0x2, &(0x7f0000000000)=[{0x25, 0x0, 0x0, 0x45}, {}]}) 10:10:47 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000040)={0x2, &(0x7f0000000000)=[{0x15, 0x0, 0x0, 0x30000000}, {}]}) 10:10:47 executing program 2: openat$incfs(0xffffffffffffffff, &(0x7f0000000040)='.pending_reads\x00', 0x101000, 0x4f) syz_mount_image$ext4(0x0, &(0x7f0000000440)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) openat$dir(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0xf0000, 0x0) [ 1868.514865][T21231] loop1: detected capacity change from 0 to 264192 10:10:47 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext3\x00', 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000480)=ANY=[@ANYBLOB='\"azytime,test_dummy_encryption,max_dir_size_kb=0x000000000200,grpjquota=,min_batch_time=0x00000000000003ff,rootcontext\a']) 10:10:47 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext3\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000480)=ANY=[@ANYBLOB='lazytime\"test_dummy_encryption,max_dir_size_kb=0x000000000200,grpjquota=,min_batch_time=0x00000000000003ff,rootcontext\a']) 10:10:47 executing program 4: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000040)={0x2, &(0x7f0000000000)=[{0x25, 0x0, 0x0, 0x4d}, {}]}) [ 1868.591051][T21231] EXT4-fs (loop1): VFS: Can't find ext4 filesystem 10:10:47 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext3\x00', 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000480)=ANY=[@ANYBLOB='\"azytime,test_dummy_encryption,max_dir_size_kb=0x000000000200,grpjquota=,min_batch_time=0x00000000000003ff,rootcontext\a']) 10:10:47 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000040)={0x2, &(0x7f0000000000)=[{0x15, 0x0, 0x0, 0x34000000}, {}]}) 10:10:47 executing program 2: syz_mount_image$ext4(0x0, &(0x7f0000000440)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) openat$dir(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0xb0000, 0x0) 10:10:47 executing program 4: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000040)={0x2, &(0x7f0000000000)=[{0x25, 0x0, 0x0, 0x60}, {}]}) [ 1868.673034][T21231] loop1: detected capacity change from 0 to 264192 [ 1868.701638][T21231] EXT4-fs (loop1): VFS: Can't find ext4 filesystem 10:10:47 executing program 1: r0 = syz_mount_image$ext4(&(0x7f0000000480)='ext3\x00', &(0x7f00000004c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000007c0)={[], [{@fscontext={'fscontext', 0x3d, 'sysadm_u'}}, {@defcontext={'defcontext', 0x3d, 'staff_u'}}]}) renameat2(r0, &(0x7f0000000000)='./file0\x00', r0, &(0x7f0000000040)='./file0\x00', 0x1) 10:10:47 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext3\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000480)=ANY=[@ANYBLOB='lazytime,\"est_dummy_encryption,max_dir_size_kb=0x000000000200,grpjquota=,min_batch_time=0x00000000000003ff,rootcontext\a']) 10:10:47 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext3\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 10:10:47 executing program 2: r0 = openat$vcsu(0xffffffffffffff9c, &(0x7f0000000000), 0x5200, 0x0) fchmodat(r0, &(0x7f0000000040)='./file0\x00', 0x1b0) r1 = openat$incfs(r0, &(0x7f0000000800)='.pending_reads\x00', 0x581200, 0x123) accept4$packet(r0, &(0x7f0000000400)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000000440)=0x14, 0x100000) execveat(r0, &(0x7f0000000240)='./file0\x00', &(0x7f0000000480)=[&(0x7f0000000280)='@:(\x00', &(0x7f00000002c0)='-%\x00', &(0x7f0000000300)='!-(&:\x00', &(0x7f0000000340)='.log\x00', &(0x7f0000000380)='.log\x00', &(0x7f00000003c0)='])}\x00', &(0x7f0000000400)='*\'\x00', &(0x7f0000000440)='-:}![_.!-!&@\x00'], &(0x7f0000000540)=[&(0x7f00000004c0)='\x00', &(0x7f0000000500)='\x91*\xe5\x10\xa4Xr:\x83\x9a\x9f\xadp\x158\xac'], 0x1000) r2 = openat$dir(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0xb0000, 0x0) r3 = openat$incfs(r2, &(0x7f0000000080)='.log\x00', 0x241, 0x2) symlinkat(&(0x7f0000000040)='./file0\x00', r3, &(0x7f00000000c0)='./file0\x00') r4 = socket(0x4, 0x4, 0x1) r5 = syz_genetlink_get_family_id$tipc(&(0x7f00000005c0), r1) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY_ALL_USERS(r1, 0xc0406619, &(0x7f00000006c0)={@desc={0x1, 0x0, @desc4}}) fchmodat(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', 0x1b0) r6 = openat$incfs(0xffffffffffffffff, &(0x7f00000002c0)='.log\x00', 0x581200, 0x123) syz_genetlink_get_family_id$fou(&(0x7f0000000300), r6) renameat2(r6, &(0x7f0000000380)='./file0\x00', 0xffffffffffffffff, &(0x7f00000003c0)='./file1\x00', 0x0) sendmsg$TIPC_CMD_SHOW_STATS(r6, &(0x7f00000007c0)={&(0x7f0000000700)={0x10, 0x0, 0x0, 0x100}, 0xc, &(0x7f0000000780)={&(0x7f0000000740)={0x1c, 0x0, 0x0, 0x70bd2d, 0x25dfdbfc, {}, ["", ""]}, 0x1c}}, 0x20000000) sendmsg$TIPC_CMD_GET_NETID(r4, &(0x7f0000000680)={&(0x7f0000000580)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000000640)={&(0x7f0000000600)={0x1c, r5, 0x20, 0x70bd29, 0x25dfdbfb, {}, ["", "", "", "", "", ""]}, 0x1c}, 0x1, 0x0, 0x0, 0xc800}, 0x80) symlinkat(&(0x7f0000000100)='./file0\x00', r2, &(0x7f0000000140)='./file0\x00') ioctl$FS_IOC_GET_ENCRYPTION_KEY_STATUS(r3, 0xc080661a, &(0x7f0000000180)={@id={0x2, 0x0, @b}}) faccessat2(r3, &(0x7f0000000200)='./file0\x00', 0x22, 0x100) 10:10:47 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000040)={0x2, &(0x7f0000000000)=[{0x15, 0x0, 0x0, 0x35000000}, {}]}) 10:10:47 executing program 4: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000040)={0x2, &(0x7f0000000000)=[{0x25, 0x0, 0x0, 0x61}, {}]}) 10:10:47 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext3\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 10:10:47 executing program 1: syz_mount_image$ext4(&(0x7f0000000480)='ext3\x00', &(0x7f00000004c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)=ANY=[@ANYBLOB="6673636f6e746578743d73797361646d5f752c646566636f6e746578743d73746166665f752c00a1a6aff2b3b6849a4ddae1e7"]) 10:10:47 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext3\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000480)=ANY=[@ANYBLOB='lazytime,,est_dummy_encryption,max_dir_size_kb=0x000000000200,grpjquota=,min_batch_time=0x00000000000003ff,rootcontext\a']) 10:10:48 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000040)={0x2, &(0x7f0000000000)=[{0x15, 0x0, 0x0, 0x3d000000}, {}]}) 10:10:48 executing program 4: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000040)={0x2, &(0x7f0000000000)=[{0x25, 0x0, 0x0, 0x64}, {}]}) 10:10:48 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext3\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000480)=ANY=[@ANYBLOB='lazytime,t\"st_dummy_encryption,max_dir_size_kb=0x000000000200,grpjquota=,min_batch_time=0x00000000000003ff,rootcontext\a']) 10:10:48 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext3\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 10:10:48 executing program 2: syz_mount_image$ext4(0x0, &(0x7f0000000440)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) openat$dir(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0xb4a00, 0x0) 10:10:48 executing program 1: syz_mount_image$ext4(&(0x7f0000000480)='ext3\x00', &(0x7f00000004c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)={[], [{@fscontext={'fscontext', 0x3d, 'sysadm_u'}}, {@fowner_eq={'fowner', 0x3d, 0xffffffffffffffff}}]}) r0 = openat$incfs(0xffffffffffffffff, &(0x7f0000000040)='.log\x00', 0x80100, 0x103) r1 = syz_mount_image$ext4(&(0x7f00000000c0)='ext2\x00', &(0x7f0000000100)='./file0\x00', 0x5, 0x1, &(0x7f0000000180)=[{&(0x7f0000000140)="08f4e2db13a322a938277c382935b1e1484e", 0x12, 0x9}], 0x2c00, &(0x7f00000001c0)={[{@orlov}, {@quota}, {@min_batch_time={'min_batch_time', 0x3d, 0x5}}, {@delalloc}], [{@obj_role={'obj_role', 0x3d, 'fscontext'}}, {@subj_user={'subj_user', 0x3d, 'sysadm_u'}}, {@pcr={'pcr', 0x3d, 0x2e}}, {@appraise_type}]}) renameat2(r0, &(0x7f0000000080)='./file0\x00', r1, &(0x7f0000000280)='./file0\x00', 0x7) 10:10:48 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000040)={0x2, &(0x7f0000000000)=[{0x15, 0x0, 0x0, 0x45000000}, {}]}) 10:10:48 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext3\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000480)=ANY=[@ANYBLOB='lazytime,t,st_dummy_encryption,max_dir_size_kb=0x000000000200,grpjquota=,min_batch_time=0x00000000000003ff,rootcontext\a']) 10:10:48 executing program 4: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000040)={0x2, &(0x7f0000000000)=[{0x25, 0x0, 0x0, 0x74}, {}]}) 10:10:48 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext3\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000480)=ANY=[]) 10:10:48 executing program 2: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000040)={0x2, &(0x7f0000000000)=[{0x25, 0x0, 0x2}, {}]}) 10:10:48 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000040)={0x2, &(0x7f0000000000)=[{0x15, 0x0, 0x0, 0x4d000000}, {}]}) 10:10:48 executing program 4: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000040)={0x2, &(0x7f0000000000)=[{0x25, 0x0, 0x0, 0x94}, {}]}) 10:10:48 executing program 1: accept$packet(0xffffffffffffffff, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @multicast}, &(0x7f0000000100)=0x14) sendto$packet(0xffffffffffffffff, &(0x7f0000000000)="85b485a20b90e642df9671e1bcb8cca02233f2734b42af3165bea07fe71be43d6761c70fb8bca46dc24dcef45d28502de0abeb3af780f2962992662e9f2c9d9fd30f73c9115f4b85e1eb6ba4a37e80459b557348c14ee2591483508d7591abc9e51761f1057f68954393923f6216507a7b41d0a2f5ba891582c0b8ed4f98e65f06d566c985c721e3042494c69e1c81916dc250", 0x93, 0x20048042, &(0x7f0000000140)={0x11, 0x17, r0, 0x1, 0x9, 0x6, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x3}}, 0x14) syz_mount_image$ext4(&(0x7f0000000480)='ext3\x00', &(0x7f00000004c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000007c0)={[], [{@fscontext={'fscontext', 0x3d, 'sysadm_u'}}, {@defcontext={'defcontext', 0x3d, 'staff_u'}}]}) 10:10:48 executing program 2: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000040)={0x2, &(0x7f0000000000)=[{0x25, 0x0, 0x2}, {}]}) 10:10:48 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext3\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000480)=ANY=[@ANYBLOB='lazytime,te\"t_dummy_encryption,max_dir_size_kb=0x000000000200,grpjquota=,min_batch_time=0x00000000000003ff,rootcontext\a']) 10:10:48 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext3\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000480)=ANY=[]) 10:10:48 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000040)={0x2, &(0x7f0000000000)=[{0x15, 0x0, 0x0, 0x60000000}, {}]}) 10:10:48 executing program 2: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000040)={0x2, &(0x7f0000000000)=[{0x25, 0x0, 0x2}, {}]}) 10:10:48 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext3\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000480)=ANY=[@ANYBLOB='lazytime,te,t_dummy_encryption,max_dir_size_kb=0x000000000200,grpjquota=,min_batch_time=0x00000000000003ff,rootcontext\a']) 10:10:48 executing program 4: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000040)={0x2, &(0x7f0000000000)=[{0x25, 0x0, 0x0, 0xb1}, {}]}) 10:10:48 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext3\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000480)=ANY=[]) 10:10:48 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000040)={0x2, &(0x7f0000000000)=[{0x15, 0x0, 0x0, 0x61000000}, {}]}) 10:10:48 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext3\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000480)=ANY=[@ANYBLOB='lazytime,tes\"_dummy_encryption,max_dir_size_kb=0x000000000200,grpjquota=,min_batch_time=0x00000000000003ff,rootcontext\a']) 10:10:48 executing program 2: prctl$PR_SET_SECCOMP(0x16, 0x0, &(0x7f0000000040)={0x2, &(0x7f0000000000)=[{0x25, 0x0, 0x2}, {}]}) 10:10:48 executing program 1: syz_mount_image$ext4(&(0x7f0000000480)='ext3\x00', &(0x7f00000004c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000007c0)={[], [{@fscontext={'fscontext', 0x3d, 'sysadm_u'}}, {@defcontext={'defcontext', 0x3d, 'staff_u'}}]}) r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$tipc(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$TIPC_CMD_SET_NETID(r0, &(0x7f0000000100)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x800}, 0xc, &(0x7f00000000c0)={&(0x7f0000000080)={0x24, r1, 0x200, 0x70bd2a, 0x25dfdbfb, {{}, {}, {0x8, 0x2, 0x7}}, ["", ""]}, 0x24}, 0x1, 0x0, 0x0, 0x40002}, 0x800) r2 = syz_genetlink_get_family_id$team(&(0x7f0000000180), r0) ioctl$sock_ipv6_tunnel_SIOCDELPRL(0xffffffffffffffff, 0x89f6, &(0x7f0000000240)={'sit0\x00', &(0x7f00000001c0)={'ip6gre0\x00', 0x0, 0x29, 0xff, 0x3, 0x20, 0x10, @ipv4={'\x00', '\xff\xff', @local}, @private0, 0x700, 0x80, 0x8001, 0x8}}) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000280)={{{@in6=@remote, @in=@local, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@remote}, 0x0, @in6=@mcast2}}, &(0x7f0000000380)=0xe8) accept$packet(r0, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000400)=0x14) accept$packet(0xffffffffffffffff, &(0x7f0000000440)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000500)=0x14) sendmsg$TEAM_CMD_NOOP(r0, &(0x7f0000000580)={&(0x7f0000000140), 0xc, &(0x7f0000000540)={&(0x7f0000000800)={0x32c, r2, 0x1, 0x70bd2b, 0x25dfdbfc, {}, [{{0x8, 0x1, r3}, {0xfc, 0x2, 0x0, 0x1, [{0x40, 0x1, @priority={{{0x24}, {0x5}, {0x8}}, {0x8, 0x6, r4}}}, {0x40, 0x1, @priority={{{0x24}, {0x5}, {0x8, 0x4, 0x1000}}, {0x8}}}, {0x3c, 0x1, @enabled={{{0x24}, {0x5}, {0x4}}, {0x8}}}, {0x3c, 0x1, @name={{0x24}, {0x5}, {0xb, 0x4, 'random\x00'}}}]}}, {{0x8, 0x1, r5}, {0x184, 0x2, 0x0, 0x1, [{0x40, 0x1, @lb_tx_hash_to_port_mapping={{{0x24}, {0x5}, {0x8}}, {0x8}}}, {0x3c, 0x1, @user_linkup={{{0x24}, {0x5}, {0x4}}, {0x8, 0x6, r6}}}, {0x3c, 0x1, @bpf_hash_func={{0x24}, {0x5}, {0xc, 0x4, [{0x401, 0x4, 0x3, 0x4}]}}}, {0x4c, 0x1, @lb_tx_method={{0x24}, {0x5}, {0x19, 0x4, 'hash_to_port_mapping\x00'}}}, {0x40, 0x1, @name={{0x24}, {0x5}, {0x10, 0x4, 'loadbalance\x00'}}}, {0x3c, 0x1, @user_linkup={{{0x24}, {0x5}, {0x4}}, {0x8}}}]}}, {{0x8}, {0x3c, 0x2, 0x0, 0x1, [{0x38, 0x1, @activeport={{0x24}, {0x5}, {0x8}}}]}}, {{0x8}, {0x3c, 0x2, 0x0, 0x1, [{0x38, 0x1, @notify_peers_count={{0x24}, {0x5}, {0x8, 0x4, 0xfffffffb}}}]}}]}, 0x32c}, 0x1, 0x0, 0x0, 0x8000}, 0x814) 10:10:48 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext3\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000480)=ANY=[@ANYBLOB]) 10:10:48 executing program 4: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000040)={0x2, &(0x7f0000000000)=[{0x25, 0x0, 0x0, 0x300}, {}]}) 10:10:48 executing program 2: prctl$PR_SET_SECCOMP(0x16, 0x0, &(0x7f0000000040)={0x2, &(0x7f0000000000)=[{0x25, 0x0, 0x2}, {}]}) 10:10:48 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000040)={0x2, &(0x7f0000000000)=[{0x15, 0x0, 0x0, 0x64000000}, {}]}) 10:10:48 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext3\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000480)=ANY=[@ANYBLOB='lazytime,tes,_dummy_encryption,max_dir_size_kb=0x000000000200,grpjquota=,min_batch_time=0x00000000000003ff,rootcontext\a']) 10:10:48 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext3\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000480)=ANY=[@ANYBLOB]) 10:10:48 executing program 4: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000040)={0x2, &(0x7f0000000000)=[{0x25, 0x0, 0x0, 0x500}, {}]}) 10:10:48 executing program 2: prctl$PR_SET_SECCOMP(0x16, 0x0, &(0x7f0000000040)={0x2, &(0x7f0000000000)=[{0x25, 0x0, 0x2}, {}]}) 10:10:48 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000040)={0x2, &(0x7f0000000000)=[{0x15, 0x0, 0x0, 0x74000000}, {}]}) 10:10:48 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext3\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000480)=ANY=[@ANYBLOB='lazytime,test\"dummy_encryption,max_dir_size_kb=0x000000000200,grpjquota=,min_batch_time=0x00000000000003ff,rootcontext\a']) 10:10:48 executing program 1: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NBD_CMD_CONNECT(r0, &(0x7f00000013c0)={&(0x7f00000012c0), 0xc, &(0x7f0000001380)={0x0}}, 0xc6c3dbe86af1a089) r1 = syz_mount_image$ext4(&(0x7f0000000480)='ext3\x00', &(0x7f00000004c0)='./file0\x00', 0x0, 0x0, 0x0, 0x208003, &(0x7f0000000080)=ANY=[@ANYRESOCT=r0]) futimesat(r1, &(0x7f0000000000)='./file0\x00', &(0x7f0000000040)={{0x0, 0x2710}, {0x0, 0xea60}}) 10:10:48 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext3\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000480)=ANY=[@ANYBLOB]) 10:10:48 executing program 4: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000040)={0x2, &(0x7f0000000000)=[{0x25, 0x0, 0x0, 0x600}, {}]}) 10:10:48 executing program 2: prctl$PR_SET_SECCOMP(0x16, 0x2, 0x0) 10:10:48 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000040)={0x2, &(0x7f0000000000)=[{0x15, 0x0, 0x0, 0x94000000}, {}]}) 10:10:48 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext3\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000480)=ANY=[@ANYBLOB='lazytime,test,dummy_encryption,max_dir_size_kb=0x000000000200,grpjquota=,min_batch_time=0x00000000000003ff,rootcontext\a']) 10:10:48 executing program 1: syz_mount_image$ext4(&(0x7f0000000480)='ext3\x00', &(0x7f00000004c0)='./file0\x00', 0x0, 0x0, 0x0, 0x4, &(0x7f00000001c0)=ANY=[@ANYBLOB="00003d5c7973612c6465b60b19c35d5c92215c5155168fce5273746166665f75ac001b00", @ANYBLOB="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", @ANYRES16, @ANYRES32=0x0]) 10:10:48 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext3\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000480)=ANY=[@ANYBLOB='\"azytime,test_dummy_encryption,max_dir_size_kb=0x00000000020']) 10:10:48 executing program 4: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000040)={0x2, &(0x7f0000000000)=[{0x25, 0x0, 0x0, 0x700}, {}]}) 10:10:48 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000040)={0x2, &(0x7f0000000000)=[{0x15, 0x0, 0x0, 0xb1000000}, {}]}) 10:10:48 executing program 2: prctl$PR_SET_SECCOMP(0x16, 0x2, 0x0) 10:10:49 executing program 1: syz_mount_image$ext4(&(0x7f0000000480)='ext3\x00', &(0x7f00000004c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000007c0)={[], [{@fscontext={'fscontext', 0x3d, 'sysadm_u'}}, {@defcontext={'defcontext', 0x3d, 'staff_u'}}]}) r0 = openat$vcsu(0xffffffffffffff9c, &(0x7f0000000000), 0x5200, 0x0) fchmodat(r0, &(0x7f0000000040)='./file0\x00', 0x1b0) r1 = openat$incfs(r0, &(0x7f00000002c0)='.log\x00', 0x581200, 0x123) syz_genetlink_get_family_id$fou(&(0x7f0000000300), r1) renameat2(r1, &(0x7f0000000380)='./file0\x00', 0xffffffffffffffff, &(0x7f00000003c0)='./file1\x00', 0x0) r2 = syz_genetlink_get_family_id$tipc(&(0x7f0000000540), r1) sendmsg$TIPC_CMD_SET_LINK_PRI(r1, &(0x7f0000000600)={&(0x7f0000000500)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f00000005c0)={&(0x7f0000000580)={0x30, r2, 0x800, 0x70bd28, 0x25dfdbfc, {{}, {}, {0x14, 0x18, {0x5, @bearer=@udp='udp:syz2\x00'}}}, [""]}, 0x30}, 0x1, 0x0, 0x0, 0x4010}, 0x4001) execveat(r1, &(0x7f0000000000)='./file0\x00', &(0x7f0000000180)=[&(0x7f0000000040)='sysadm_u', &(0x7f0000000080)='staff_u', &(0x7f00000000c0)='sysadm_u', &(0x7f0000000100)='@\f$$\x00', &(0x7f0000000140)='staff_u'], &(0x7f0000000400)=[&(0x7f00000001c0)='&\x00', &(0x7f0000000200)='ext3\x00', &(0x7f0000000240)='staff_u', &(0x7f0000000280)='ext3\x00', &(0x7f00000002c0)='fscontext', &(0x7f0000000300)='@--,)\\^!&(\x00', &(0x7f0000000340)='staff_u', &(0x7f0000000380)='(/[}^^)*\x00', &(0x7f00000003c0)=',@-]\x00'], 0x1000) 10:10:49 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext3\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000480)=ANY=[@ANYBLOB='lazytime,test_\"ummy_encryption,max_dir_size_kb=0x000000000200,grpjquota=,min_batch_time=0x00000000000003ff,rootcontext\a']) 10:10:49 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext3\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000480)=ANY=[@ANYBLOB='\"']) 10:10:49 executing program 4: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000040)={0x2, &(0x7f0000000000)=[{0x25, 0x0, 0x0, 0x900}, {}]}) 10:10:49 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000040)={0x2, &(0x7f0000000000)=[{0x15}, {}]}) 10:10:49 executing program 2: prctl$PR_SET_SECCOMP(0x16, 0x2, 0x0) 10:10:49 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext3\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000480)=ANY=[@ANYBLOB='lazytime,test_,ummy_encryption,max_dir_size_kb=0x000000000200,grpjquota=,min_batch_time=0x00000000000003ff,rootcontext\a']) 10:10:49 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000040)={0x2, &(0x7f0000000000)=[{0x15}, {0x2}]}) 10:10:49 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext3\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000480)=ANY=[@ANYBLOB]) 10:10:49 executing program 4: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000040)={0x2, &(0x7f0000000000)=[{0x25, 0x0, 0x0, 0x1500}, {}]}) 10:10:49 executing program 1: socketpair(0x15, 0x80000, 0x0, &(0x7f0000000540)={0xffffffffffffffff, 0xffffffffffffffff}) getsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f0000000040)={{{@in=@private, @in, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast1}, 0x0, @in=@broadcast}}, &(0x7f0000000140)=0xe8) getsockname$packet(0xffffffffffffffff, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @multicast}, &(0x7f0000000400)=0x14) syz_mount_image$ext4(&(0x7f0000000480)='ext3\x00', &(0x7f00000004c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000180)=ANY=[@ANYBLOB="666f771217f5d5", @ANYRESDEC=r1, @ANYBLOB="2c646566636f6e746578743d73746166665f752c736d616347784a9aa8475c1465787433002c00"]) accept$packet(0xffffffffffffffff, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000380)=0x14) ioctl$SG_GET_REQUEST_TABLE(0xffffffffffffffff, 0x2286, &(0x7f0000000200)) r2 = openat$vcsu(0xffffffffffffff9c, &(0x7f0000000340), 0x301, 0x0) shmdt(0x0) r3 = syz_open_dev$sg(&(0x7f0000000440), 0x8, 0x84e980) getresuid(&(0x7f0000000740)=0x0, &(0x7f0000000780), &(0x7f00000007c0)) syz_mount_image$ext4(&(0x7f0000000580)='ext4\x00', &(0x7f00000005c0)='./file0\x00', 0x1000, 0x1, &(0x7f0000000700)=[{&(0x7f0000000600)="b79461e4adc8dedd0c30fac31721ed530a92ec4f32258f862a95db432b4517a6dccd05e4ba96abc4881bb8112b63826837c08f116973bc06faee217da4e049e77fe112f67a40950138da8b4859dfc85122e25c5be9aba8a69490e1e3cff55bb28affb843fdf43f9c41fda42fdd05acd4d3f8c7e46f774f15612dbe07ad25f8cb632ace93a23c2615f45e332797e738ea9ecc25d6995ee1bdad514f3e528e689234d15c6f5620346f7e88325d15102a0c53ad8ffaefd77aa7a9cef2201a2ad0c3b97afd7b176085ce4f7faf037062", 0xce}], 0x41004, &(0x7f0000000800)={[{@usrjquota_path={'usrjquota', 0x3d, './file0'}}, {@delalloc}, {@max_batch_time={'max_batch_time', 0x3d, 0x7}}], [{@fowner_gt={'fowner>', r1}}, {@subj_role}, {@smackfsfloor={'smackfsfloor', 0x3d, '.pending_reads\x00'}}, {@mask={'mask', 0x3d, 'MAY_WRITE'}}, {@smackfsroot={'smackfsroot', 0x3d, ')%!'}}, {@uid_lt={'uid<', r4}}]}) ioctl$SCSI_IOCTL_SYNC(r3, 0x4) ioctl$PTP_ENABLE_PPS(r2, 0x40043d04, 0x1) openat$incfs(r2, &(0x7f0000000500)='.pending_reads\x00', 0x80000, 0x4) 10:10:49 executing program 2: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000040)={0x0, 0x0}) 10:10:49 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext3\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000480)=ANY=[@ANYBLOB='lazytime,test_d\"mmy_encryption,max_dir_size_kb=0x000000000200,grpjquota=,min_batch_time=0x00000000000003ff,rootcontext\a']) 10:10:49 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000040)={0x2, &(0x7f0000000000)=[{0x15}, {0x3}]}) 10:10:49 executing program 4: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000040)={0x2, &(0x7f0000000000)=[{0x25, 0x0, 0x0, 0x1600}, {}]}) 10:10:49 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext3\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000480)=ANY=[@ANYBLOB]) [ 1870.234069][T21534] loop1: detected capacity change from 0 to 8 10:10:49 executing program 2: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000040)={0x0, 0x0}) 10:10:49 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext3\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000480)=ANY=[@ANYBLOB='lazytime,test_d,mmy_encryption,max_dir_size_kb=0x000000000200,grpjquota=,min_batch_time=0x00000000000003ff,rootcontext\a']) 10:10:49 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000040)={0x2, &(0x7f0000000000)=[{0x15}, {0x5}]}) 10:10:49 executing program 4: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000040)={0x2, &(0x7f0000000000)=[{0x25, 0x0, 0x0, 0x1d00}, {}]}) 10:10:49 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext3\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000480)=ANY=[@ANYBLOB]) [ 1870.359700][T21557] loop1: detected capacity change from 0 to 8 10:10:49 executing program 2: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000040)={0x0, 0x0}) 10:10:49 executing program 1: r0 = syz_mount_image$ext4(&(0x7f0000000480)='ext3\x00', &(0x7f00000004c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000007c0)={[], [{@fscontext={'fscontext', 0x3d, 'sysadm_u'}}, {@defcontext={'defcontext', 0x3d, 'staff_u'}}]}) r1 = syz_genetlink_get_family_id$tipc(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$TIPC_CMD_GET_MAX_PORTS(0xffffffffffffffff, &(0x7f0000000100)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x1000000}, 0xc, &(0x7f00000000c0)={&(0x7f0000000080)={0x1c, r1, 0x800, 0x70bd26, 0x25dfdbfb, {}, ["", "", "", ""]}, 0x1c}, 0x1, 0x0, 0x0, 0x20000000}, 0x1) r2 = openat$vcsu(0xffffffffffffff9c, &(0x7f0000000240), 0x200800, 0x0) renameat2(r2, &(0x7f0000000280)='./file0\x00', r0, &(0x7f00000002c0)='\x00', 0x4) sendmsg$TIPC_CMD_SHOW_STATS(0xffffffffffffffff, &(0x7f0000000200)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x10}, 0xc, &(0x7f00000001c0)={&(0x7f0000000180)={0x1c, r1, 0x100, 0x70bd27, 0x25dfdbfe, {}, ["", ""]}, 0x1c}}, 0x0) 10:10:49 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext3\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000480)=ANY=[@ANYBLOB='lazytime,test_du\"my_encryption,max_dir_size_kb=0x000000000200,grpjquota=,min_batch_time=0x00000000000003ff,rootcontext\a']) 10:10:49 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000040)={0x2, &(0x7f0000000000)=[{0x15}, {0x6}]}) 10:10:49 executing program 5: syz_mount_image$ext4(&(0x7f0000000480)='ext3\x00', &(0x7f00000004c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000007c0)=ANY=[@ANYBLOB="6653c0743d63040040006d5f752c643d73746166c5000000000054b600"/39]) rt_sigprocmask(0x73714a8099c70e95, &(0x7f0000000040)={[0xdd]}, &(0x7f0000000080), 0x8) openat$dir(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x107000, 0x212) 10:10:49 executing program 4: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000040)={0x2, &(0x7f0000000000)=[{0x25, 0x0, 0x0, 0x2000}, {}]}) [ 1870.503198][ T22] audit: type=1326 audit(1633169449.540:623): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=21578 comm="syz-executor.0" exe="/root/syz-executor.0" sig=31 arch=c000003e syscall=202 compat=0 ip=0x7fa8c05ce8d9 code=0x0 10:10:49 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext3\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000480)=ANY=[@ANYBLOB='lazytime,test_du,my_encryption,max_dir_size_kb=0x000000000200,grpjquota=,min_batch_time=0x00000000000003ff,rootcontext\a']) 10:10:49 executing program 2: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000040)={0x1, &(0x7f0000000000)=[{0x25, 0x0, 0x2}]}) 10:10:49 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000040)={0x2, &(0x7f0000000000)=[{0x15}, {0x7}]}) 10:10:49 executing program 4: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000040)={0x2, &(0x7f0000000000)=[{0x25, 0x0, 0x0, 0x2500}, {}]}) 10:10:49 executing program 5: syz_mount_image$ext4(&(0x7f0000000480)='ext3\x00', &(0x7f00000004c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000007c0)=ANY=[@ANYBLOB="6653c0743d63040040006d5f752c643d73746166c5000000000054b600"/39]) rt_sigprocmask(0x73714a8099c70e95, &(0x7f0000000040)={[0xdd]}, &(0x7f0000000080), 0x8) openat$dir(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x107000, 0x212) 10:10:49 executing program 1: syz_mount_image$ext4(&(0x7f0000000480)='ext3\x00', &(0x7f00000004c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000007c0)={[], [{@fscontext={'fscontext', 0x3d, 'sysadm_u'}}, {@defcontext={'defcontext', 0x3d, 'staff_u'}}]}) syz_mount_image$ext4(&(0x7f0000000000)='ext2\x00', &(0x7f0000000040)='./file0\x00', 0xfffffffffffffffb, 0x2, &(0x7f00000001c0)=[{&(0x7f0000000080)="dc6bca8a261b1e63013254d665273ace0900bc9847a90291f9798294c0dec445b0d8b6ee2ea0424449017e5cedb087cd93ec2d8732ea5e5f80f6062ea67a667928365a849c6bb80cdde58f897b07e29b274c4e2dbfc7a80fcb20570bf2ef9179deae960e5a612fda66018708136a7ebad880875716a66648e18788610763925a65aa922ec73ecc643fe33e55a1787c0c78273f124e902c7253830e2e56d505c58485c5e007120605d3e40067fd85648fb3c9c3064c5fea2a2901c87fd6d78e5bb23ed8e7cc9a9999794d", 0xca, 0x1}, {&(0x7f0000000180)="76ee10", 0x3, 0x7}], 0x200808, &(0x7f0000000200)={[{@init_itable_val={'init_itable', 0x3d, 0xf9}}, {@journal_checksum}], [{@appraise_type}, {@fowner_eq={'fowner', 0x3d, 0xee01}}]}) 10:10:49 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext3\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000480)=ANY=[@ANYBLOB='lazytime,test_dum\"y_encryption,max_dir_size_kb=0x000000000200,grpjquota=,min_batch_time=0x00000000000003ff,rootcontext\a']) 10:10:49 executing program 4: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000040)={0x2, &(0x7f0000000000)=[{0x25, 0x0, 0x0, 0x2800}, {}]}) 10:10:49 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000040)={0x2, &(0x7f0000000000)=[{0x15}, {0x9}]}) 10:10:49 executing program 2: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000040)={0x1, &(0x7f0000000000)=[{0x25, 0x0, 0x2}]}) 10:10:49 executing program 4: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000040)={0x2, &(0x7f0000000000)=[{0x25, 0x0, 0x0, 0x2900}, {}]}) [ 1870.759311][T21614] loop1: detected capacity change from 0 to 264192 [ 1870.794662][T21614] EXT4-fs (loop1): VFS: Can't find ext4 filesystem 10:10:49 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext3\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000480)=ANY=[@ANYBLOB='lazytime,test_dum,y_encryption,max_dir_size_kb=0x000000000200,grpjquota=,min_batch_time=0x00000000000003ff,rootcontext\a']) 10:10:49 executing program 5: syz_mount_image$ext4(&(0x7f0000000480)='ext3\x00', &(0x7f00000004c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000007c0)=ANY=[@ANYBLOB="6653c0743d63040040006d5f752c643d73746166c5000000000054b600"/39]) rt_sigprocmask(0x73714a8099c70e95, &(0x7f0000000040)={[0xdd]}, &(0x7f0000000080), 0x8) openat$dir(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x107000, 0x212) 10:10:49 executing program 2: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000040)={0x1, &(0x7f0000000000)=[{0x25, 0x0, 0x2}]}) 10:10:49 executing program 4: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000040)={0x2, &(0x7f0000000000)=[{0x25, 0x0, 0x0, 0x2d00}, {}]}) 10:10:49 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000040)={0x2, &(0x7f0000000000)=[{0x15}, {0x15}]}) 10:10:49 executing program 1: syz_mount_image$ext4(&(0x7f0000000480)='ext3\x00', &(0x7f00000004c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)=ANY=[@ANYBLOB='fscontext=sysadm_u,defcontext=staff_u,apprai=staff_u,\x00']) 10:10:49 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext3\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000480)=ANY=[@ANYBLOB='lazytime,test_dumm\"_encryption,max_dir_size_kb=0x000000000200,grpjquota=,min_batch_time=0x00000000000003ff,rootcontext\a']) 10:10:50 executing program 2: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000040)={0x1, &(0x7f0000000000)=[{}]}) 10:10:50 executing program 5: syz_mount_image$ext4(&(0x7f0000000480)='ext3\x00', &(0x7f00000004c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000007c0)=ANY=[@ANYBLOB="6653c0743d63040040006d5f752c643d73746166c5000000000054b600"/39]) rt_sigprocmask(0x73714a8099c70e95, &(0x7f0000000040)={[0xdd]}, &(0x7f0000000080), 0x8) 10:10:50 executing program 4: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000040)={0x2, &(0x7f0000000000)=[{0x25, 0x0, 0x0, 0x3000}, {}]}) 10:10:50 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000040)={0x2, &(0x7f0000000000)=[{0x15}, {0x16}]}) 10:10:50 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext3\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000480)=ANY=[@ANYBLOB='lazytime,test_dumm,_encryption,max_dir_size_kb=0x000000000200,grpjquota=,min_batch_time=0x00000000000003ff,rootcontext\a']) 10:10:50 executing program 1: r0 = openat$dir(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x200000, 0x80) ioctl$FS_IOC_GET_ENCRYPTION_KEY_STATUS(r0, 0xc080661a, &(0x7f0000000040)={@id={0x2, 0x0, @a}}) syz_mount_image$ext4(&(0x7f0000000480)='ext3\x00', &(0x7f00000004c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000007c0)=ANY=[@ANYBLOB="6673636f6e746578743d737973618e7437646d5f752c6566636f6e746578743d73746166665f"]) 10:10:50 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext3\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000480)=ANY=[@ANYBLOB='lazytime,test_dummy\"encryption,max_dir_size_kb=0x000000000200,grpjquota=,min_batch_time=0x00000000000003ff,rootcontext\a']) 10:10:50 executing program 4: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000040)={0x2, &(0x7f0000000000)=[{0x25, 0x0, 0x0, 0x3400}, {}]}) 10:10:50 executing program 5: rt_sigprocmask(0x73714a8099c70e95, &(0x7f0000000040)={[0xdd]}, &(0x7f0000000080), 0x8) [ 1871.072156][ T22] audit: type=1326 audit(1633169450.109:624): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=21657 comm="syz-executor.0" exe="/root/syz-executor.0" sig=31 arch=c000003e syscall=202 compat=0 ip=0x7fa8c05ce8d9 code=0x0 10:10:50 executing program 2: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000040)={0x1, &(0x7f0000000000)=[{}]}) 10:10:50 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000040)={0x2, &(0x7f0000000000)=[{0x15}, {0x1d}]}) 10:10:50 executing program 5: rt_sigprocmask(0x0, &(0x7f0000000040)={[0xdd]}, &(0x7f0000000080), 0x8) 10:10:50 executing program 1: syz_mount_image$ext4(&(0x7f0000000480)='ext3\x00', &(0x7f00000004c0)='./file0\x00', 0x0, 0x0, 0x0, 0x60401, &(0x7f00000007c0)) 10:10:50 executing program 2: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000040)={0x1, &(0x7f0000000000)=[{}]}) 10:10:50 executing program 4: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000040)={0x2, &(0x7f0000000000)=[{0x25, 0x0, 0x0, 0x3500}, {}]}) 10:10:50 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext3\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000480)=ANY=[@ANYBLOB='lazytime,test_dummy,encryption,max_dir_size_kb=0x000000000200,grpjquota=,min_batch_time=0x00000000000003ff,rootcontext\a']) 10:10:50 executing program 2: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000040)={0x2, &(0x7f0000000000)=[{0x0, 0x0, 0x2}, {}]}) 10:10:50 executing program 5: rt_sigprocmask(0x0, &(0x7f0000000040)={[0xdd]}, &(0x7f0000000080), 0x8) 10:10:50 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000040)={0x2, &(0x7f0000000000)=[{0x15}, {0x25}]}) 10:10:50 executing program 1: getdents64(0xffffffffffffffff, &(0x7f0000000100)=""/82, 0x52) sendmsg$TIPC_CMD_GET_NETID(0xffffffffffffffff, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f0000000080)={&(0x7f0000000040)={0x1c, 0x0, 0x2, 0x70bd28, 0x25dfdbfb, {}, ["", "", "", "", ""]}, 0x1c}, 0x1, 0x0, 0x0, 0x40}, 0x40000) syz_mount_image$ext4(&(0x7f0000000480)='ext3\x00', &(0x7f00000004c0)='./file0\x00', 0x40, 0x0, 0x0, 0x0, &(0x7f00000007c0)={[], [{@fscontext={'fscontext', 0x3d, 'sysadm_u'}}, {@defcontext={'defcontext', 0x3d, 'staff_u'}}]}) 10:10:50 executing program 4: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000040)={0x2, &(0x7f0000000000)=[{0x25, 0x0, 0x0, 0x3d00}, {}]}) 10:10:50 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext3\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000480)=ANY=[@ANYBLOB='lazytime,test_dummy_\"ncryption,max_dir_size_kb=0x000000000200,grpjquota=,min_batch_time=0x00000000000003ff,rootcontext\a']) 10:10:50 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000040)={0x2, &(0x7f0000000000)=[{0x15}, {0x28}]}) 10:10:50 executing program 2: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000040)={0x2, &(0x7f0000000000)=[{0x0, 0x0, 0x2}, {}]}) 10:10:50 executing program 5: rt_sigprocmask(0x0, &(0x7f0000000040)={[0xdd]}, &(0x7f0000000080), 0x8) 10:10:50 executing program 4: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000040)={0x2, &(0x7f0000000000)=[{0x25, 0x0, 0x0, 0x4500}, {}]}) 10:10:50 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext3\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000480)=ANY=[@ANYBLOB='lazytime,test_dummy_,ncryption,max_dir_size_kb=0x000000000200,grpjquota=,min_batch_time=0x00000000000003ff,rootcontext\a']) 10:10:50 executing program 5: rt_sigprocmask(0x73714a8099c70e95, 0x0, &(0x7f0000000080), 0x0) 10:10:50 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000040)={0x2, &(0x7f0000000000)=[{0x15}, {0x2d}]}) 10:10:50 executing program 2: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000040)={0x2, &(0x7f0000000000)=[{0x0, 0x0, 0x2}, {}]}) 10:10:50 executing program 1: syz_mount_image$ext4(&(0x7f0000000480)='ext2\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000180)=ANY=[@ANYBLOB="6461782c6461782c61636c2c646174613d6a6f75726e616c2c6c617a7974696d652c746573745f64756d6d795f656e6372797074696f6e2c67727069642c66736d616769633d3078303030303030303030303030303030312c646566636f6ea194675065b4638066665f752c00"]) r0 = openat$vcsu(0xffffffffffffff9c, &(0x7f0000000000), 0x5200, 0x0) fchmodat(r0, &(0x7f0000000040)='./file0\x00', 0x1b0) openat$incfs(r0, &(0x7f00000002c0)='.log\x00', 0x581200, 0x123) accept4$packet(r0, &(0x7f0000000400)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000000440)=0x14, 0x100000) sendmsg$TIPC_CMD_GET_NODES(r0, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x200}, 0xc, &(0x7f0000000080)={&(0x7f0000000040)={0x1c, 0x0, 0x100, 0x70bd25, 0x25dfdbfe, {}, ["", "", "", "", "", "", ""]}, 0x1c}, 0x1, 0x0, 0x0, 0x4000090}, 0x8005) 10:10:50 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext3\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000480)=ANY=[@ANYBLOB='lazytime,test_dummy_e\"cryption,max_dir_size_kb=0x000000000200,grpjquota=,min_batch_time=0x00000000000003ff,rootcontext\a']) 10:10:50 executing program 2: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000040)={0x2, &(0x7f0000000000)=[{0x25}, {}]}) 10:10:50 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000040)={0x2, &(0x7f0000000000)=[{0x15}, {0x30}]}) 10:10:50 executing program 4: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000040)={0x2, &(0x7f0000000000)=[{0x25, 0x0, 0x0, 0x4d00}, {}]}) 10:10:50 executing program 5: rt_sigprocmask(0x73714a8099c70e95, 0x0, &(0x7f0000000080), 0x0) 10:10:50 executing program 2: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000040)={0x2, &(0x7f0000000000)=[{0x25}, {}]}) 10:10:50 executing program 1: r0 = openat$ptp0(0xffffffffffffff9c, &(0x7f0000000000), 0x80000, 0x0) ioctl$PTP_SYS_OFFSET(r0, 0x43403d05, &(0x7f0000000040)={0xa}) syz_mount_image$ext4(&(0x7f0000000480)='ext3\x00', &(0x7f00000004c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000007c0)={[], [{@fscontext={'fscontext', 0x3d, 'sysadm_u'}}, {@defcontext={'defcontext', 0x3d, 'staff_u'}}]}) 10:10:50 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext3\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000480)=ANY=[@ANYBLOB='lazytime,test_dummy_e,cryption,max_dir_size_kb=0x000000000200,grpjquota=,min_batch_time=0x00000000000003ff,rootcontext\a']) 10:10:50 executing program 4: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000040)={0x2, &(0x7f0000000000)=[{0x25, 0x0, 0x0, 0x6000}, {}]}) 10:10:50 executing program 5: rt_sigprocmask(0x73714a8099c70e95, 0x0, &(0x7f0000000080), 0x0) 10:10:50 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000040)={0x2, &(0x7f0000000000)=[{0x15}, {0x34}]}) 10:10:50 executing program 4: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000040)={0x2, &(0x7f0000000000)=[{0x25, 0x0, 0x0, 0x6100}, {}]}) 10:10:50 executing program 2: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000040)={0x2, &(0x7f0000000000)=[{0x25}, {}]}) 10:10:50 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext3\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000480)=ANY=[@ANYBLOB='lazytime,test_dummy_en\"ryption,max_dir_size_kb=0x000000000200,grpjquota=,min_batch_time=0x00000000000003ff,rootcontext\a']) 10:10:50 executing program 5: rt_sigprocmask(0x73714a8099c70e95, &(0x7f0000000040), &(0x7f0000000080), 0x8) 10:10:50 executing program 4: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000040)={0x2, &(0x7f0000000000)=[{0x25, 0x0, 0x0, 0x6400}, {}]}) 10:10:50 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000040)={0x2, &(0x7f0000000000)=[{0x15}, {0x35}]}) 10:10:50 executing program 5: rt_sigprocmask(0x73714a8099c70e95, &(0x7f0000000040), 0x0, 0x8) 10:10:51 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext3\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000480)=ANY=[@ANYBLOB='lazytime,test_dummy_en,ryption,max_dir_size_kb=0x000000000200,grpjquota=,min_batch_time=0x00000000000003ff,rootcontext\a']) 10:10:51 executing program 2: r0 = syz_mount_image$ext4(&(0x7f0000000480)='ext3\x00', &(0x7f00000004c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000007c0)={[], [{@fscontext={'fscontext', 0x3d, 'sysadm_u'}}, {@defcontext={'defcontext', 0x3d, 'staff_u'}}]}) r1 = syz_genetlink_get_family_id$tipc(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$TIPC_CMD_GET_MAX_PORTS(0xffffffffffffffff, &(0x7f0000000100)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x1000000}, 0xc, &(0x7f00000000c0)={&(0x7f0000000080)={0x1c, r1, 0x800, 0x70bd26, 0x25dfdbfb, {}, ["", "", "", ""]}, 0x1c}, 0x1, 0x0, 0x0, 0x20000000}, 0x1) r2 = openat$vcsu(0xffffffffffffff9c, &(0x7f0000000240), 0x200800, 0x0) renameat2(r2, &(0x7f0000000280)='./file0\x00', r0, &(0x7f00000002c0)='\x00', 0x4) sendmsg$TIPC_CMD_SHOW_STATS(0xffffffffffffffff, &(0x7f0000000200)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x10}, 0xc, &(0x7f00000001c0)={&(0x7f0000000180)={0x1c, r1, 0x100, 0x70bd27, 0x25dfdbfe, {}, ["", ""]}, 0x1c}}, 0x0) 10:10:51 executing program 1: r0 = openat$vcsu(0xffffffffffffff9c, &(0x7f0000000340), 0x301, 0x0) ioctl$PTP_ENABLE_PPS(r0, 0x40043d04, 0x1) r1 = openat$vcsu(0xffffffffffffff9c, &(0x7f0000000000), 0x5200, 0x0) ioctl$PTP_PIN_GETFUNC2(r0, 0xc0603d0f, &(0x7f0000000500)={'\x00', 0x3}) fchmodat(r1, &(0x7f0000000040)='./file0\x00', 0x1b0) openat$incfs(r1, &(0x7f00000002c0)='.log\x00', 0x581200, 0x123) accept4$packet(r1, &(0x7f0000000400)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000000440)=0x14, 0x100000) getsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f0000000080)={{{@in6=@private1, @in=@dev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@private}, 0x0, @in=@loopback}}, &(0x7f0000000180)=0xe8) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f00000001c0)={'team0\x00', 0x0}) ioctl$ifreq_SIOCGIFINDEX_team(r0, 0x8933, &(0x7f0000000200)={'team0\x00', 0x0}) ioctl$sock_ipv6_tunnel_SIOCDELTUNNEL(0xffffffffffffffff, 0x89f2, &(0x7f00000002c0)={'syztnl2\x00', &(0x7f0000000240)={'syztnl0\x00', 0x0, 0x2f68bd6ad2ac9f4e, 0x0, 0xbc, 0x9, 0x20, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01', @private0={0xfc, 0x0, '\x00', 0x1}, 0x40, 0x8, 0x5, 0x2}}) sendmsg$TEAM_CMD_OPTIONS_GET(r1, &(0x7f0000000380)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f0000000300)={&(0x7f0000000800)={0x39c, 0x0, 0x2, 0x70bd2a, 0x25dfdbff, {}, [{{0x8}, {0xb4, 0x2, 0x0, 0x1, [{0x38, 0x1, @mcast_rejoin_interval={{0x24}, {0x5}, {0x8, 0x4, 0x9}}}, {0x3c, 0x1, @name={{0x24}, {0x5}, {0xb, 0x4, 'random\x00'}}}, {0x3c, 0x1, @user_linkup_enabled={{{0x24}, {0x5}, {0x4}}, {0x8}}}]}}, {{0x8}, {0xf8, 0x2, 0x0, 0x1, [{0x38, 0x1, @mcast_rejoin_count={{0x24}, {0x5}, {0x8}}}, {0x40, 0x1, @queue_id={{{0x24}, {0x5}, {0x8, 0x4, 0x14000}}, {0x8}}}, {0x3c, 0x1, @user_linkup_enabled={{{0x24}, {0x5}, {0x4}}, {0x8, 0x6, r2}}}, {0x40, 0x1, @lb_tx_hash_to_port_mapping={{{0x24}, {0x5}, {0x8, 0x4, r3}}, {0x8}}}]}}, {{0x8}, {0x134, 0x2, 0x0, 0x1, [{0x3c, 0x1, @user_linkup_enabled={{{0x24}, {0x5}, {0x4}}, {0x8, 0x6, r4}}}, {0x84, 0x1, @bpf_hash_func={{0x24}, {0x5}, {0x54, 0x4, [{0x9, 0x9b, 0x7, 0xfff}, {0x800, 0x1, 0x2, 0xfffffe30}, {0x119f, 0x1f, 0x1, 0x9}, {0x507, 0x9d, 0x40, 0xf81}, {0x8, 0x61, 0x9, 0x4}, {0x7, 0x8, 0x2, 0x4}, {0x1, 0x1f, 0x4, 0xfbf6}, {0x6, 0x7, 0x10, 0x5}, {0x5, 0x3f, 0x4, 0x2}, {0x6, 0x5, 0xff, 0x401}]}}}, {0x38, 0x1, @notify_peers_count={{0x24}, {0x5}, {0x8, 0x4, 0x8}}}, {0x38, 0x1, @activeport={{0x24}, {0x5}, {0x8, 0x4, r5}}}]}}, {{0x8}, {0x88, 0x2, 0x0, 0x1, [{0x38, 0x1, @notify_peers_count={{0x24}, {0x5}, {0x8}}}, {0x4c, 0x1, @bpf_hash_func={{0x24}, {0x5}, {0x1c, 0x4, [{0x400, 0x5, 0x8, 0x7}, {0x2, 0x80, 0xcc, 0x7ff}, {0x3, 0x80, 0x2, 0xff}]}}}]}}]}, 0x39c}, 0x1, 0x0, 0x0, 0x20008008}, 0x20000000) syz_genetlink_get_family_id$tipc(&(0x7f0000000000), r0) syz_mount_image$ext4(&(0x7f0000000480)='ext3\x00', &(0x7f00000004c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000007c0)={[], [{@fscontext={'fscontext', 0x3d, 'sysadm_u'}}, {@defcontext={'defcontext', 0x3d, 'staff_u'}}]}) 10:10:51 executing program 4: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000040)={0x2, &(0x7f0000000000)=[{0x25, 0x0, 0x0, 0x7400}, {}]}) 10:10:51 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000040)={0x2, &(0x7f0000000000)=[{0x15}, {0x3d}]}) 10:10:51 executing program 5: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000040)={0x2, &(0x7f0000000000)=[{0x15}, {0x6}]}) 10:10:51 executing program 2: r0 = syz_mount_image$ext4(&(0x7f0000000480)='ext3\x00', &(0x7f00000004c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000007c0)={[], [{@fscontext={'fscontext', 0x3d, 'sysadm_u'}}, {@defcontext={'defcontext', 0x3d, 'staff_u'}}]}) r1 = syz_genetlink_get_family_id$tipc(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$TIPC_CMD_GET_MAX_PORTS(0xffffffffffffffff, &(0x7f0000000100)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x1000000}, 0xc, &(0x7f00000000c0)={&(0x7f0000000080)={0x1c, r1, 0x800, 0x70bd26, 0x25dfdbfb, {}, ["", "", "", ""]}, 0x1c}, 0x1, 0x0, 0x0, 0x20000000}, 0x1) r2 = openat$vcsu(0xffffffffffffff9c, &(0x7f0000000240), 0x200800, 0x0) renameat2(r2, &(0x7f0000000280)='./file0\x00', r0, &(0x7f00000002c0)='\x00', 0x4) sendmsg$TIPC_CMD_SHOW_STATS(0xffffffffffffffff, &(0x7f0000000200)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x10}, 0xc, &(0x7f00000001c0)={&(0x7f0000000180)={0x1c, r1, 0x100, 0x70bd27, 0x25dfdbfe, {}, ["", ""]}, 0x1c}}, 0x0) 10:10:51 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext3\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000480)=ANY=[@ANYBLOB='lazytime,test_dummy_enc\"yption,max_dir_size_kb=0x000000000200,grpjquota=,min_batch_time=0x00000000000003ff,rootcontext\a']) 10:10:51 executing program 1: prctl$PR_CAPBSET_READ(0x17, 0x1a) 10:10:51 executing program 4: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000040)={0x2, &(0x7f0000000000)=[{0x25, 0x0, 0x0, 0x9400}, {}]}) 10:10:51 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000040)={0x2, &(0x7f0000000000)=[{0x15}, {0x45}]}) [ 1872.111750][ T22] audit: type=1326 audit(1633169451.148:625): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=21815 comm="syz-executor.5" exe="/root/syz-executor.5" sig=31 arch=c000003e syscall=202 compat=0 ip=0x7ff750d258d9 code=0x0 10:10:51 executing program 5: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000040)={0x2, &(0x7f0000000000)=[{0x15}, {0x6}]}) 10:10:51 executing program 1: r0 = syz_mount_image$ext4(&(0x7f0000000480)='ext3\x00', &(0x7f00000004c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000007c0)=ANY=[@ANYBLOB="6673636f6e746578743d7379736164025f752c66636f6e746578743d73746166665f752c000000"]) faccessat2(r0, &(0x7f0000000000)='./file1\x00', 0x0, 0x0) 10:10:51 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000040)={0x2, &(0x7f0000000000)=[{0x15}, {0x4d}]}) 10:10:51 executing program 2: r0 = syz_mount_image$ext4(&(0x7f0000000480)='ext3\x00', &(0x7f00000004c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000007c0)={[], [{@fscontext={'fscontext', 0x3d, 'sysadm_u'}}, {@defcontext={'defcontext', 0x3d, 'staff_u'}}]}) r1 = syz_genetlink_get_family_id$tipc(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$TIPC_CMD_GET_MAX_PORTS(0xffffffffffffffff, &(0x7f0000000100)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x1000000}, 0xc, &(0x7f00000000c0)={&(0x7f0000000080)={0x1c, r1, 0x800, 0x70bd26, 0x25dfdbfb, {}, ["", "", "", ""]}, 0x1c}, 0x1, 0x0, 0x0, 0x20000000}, 0x1) r2 = openat$vcsu(0xffffffffffffff9c, &(0x7f0000000240), 0x200800, 0x0) renameat2(r2, &(0x7f0000000280)='./file0\x00', r0, &(0x7f00000002c0)='\x00', 0x4) sendmsg$TIPC_CMD_SHOW_STATS(0xffffffffffffffff, &(0x7f0000000200)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x10}, 0xc, &(0x7f00000001c0)={&(0x7f0000000180)={0x1c, r1, 0x100, 0x70bd27, 0x25dfdbfe, {}, ["", ""]}, 0x1c}}, 0x0) 10:10:51 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext3\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000480)=ANY=[@ANYBLOB='lazytime,test_dummy_enc,yption,max_dir_size_kb=0x000000000200,grpjquota=,min_batch_time=0x00000000000003ff,rootcontext\a']) 10:10:51 executing program 4: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000040)={0x2, &(0x7f0000000000)=[{0x25, 0x0, 0x0, 0xb100}, {}]}) 10:10:51 executing program 5: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000040)={0x2, &(0x7f0000000000)=[{0x15}, {0x6}]}) [ 1872.285267][ T22] audit: type=1326 audit(1633169451.318:626): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=21833 comm="syz-executor.5" exe="/root/syz-executor.5" sig=31 arch=c000003e syscall=202 compat=0 ip=0x7ff750d258d9 code=0x0 10:10:51 executing program 4: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000040)={0x2, &(0x7f0000000000)=[{0x25, 0x0, 0x0, 0x200000}, {}]}) 10:10:51 executing program 2: r0 = syz_mount_image$ext4(&(0x7f0000000480)='ext3\x00', &(0x7f00000004c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000007c0)={[], [{@fscontext={'fscontext', 0x3d, 'sysadm_u'}}, {@defcontext={'defcontext', 0x3d, 'staff_u'}}]}) r1 = syz_genetlink_get_family_id$tipc(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$TIPC_CMD_GET_MAX_PORTS(0xffffffffffffffff, &(0x7f0000000100)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x1000000}, 0xc, &(0x7f00000000c0)={&(0x7f0000000080)={0x1c, r1, 0x800, 0x70bd26, 0x25dfdbfb, {}, ["", "", "", ""]}, 0x1c}, 0x1, 0x0, 0x0, 0x20000000}, 0x1) r2 = openat$vcsu(0xffffffffffffff9c, &(0x7f0000000240), 0x200800, 0x0) renameat2(r2, &(0x7f0000000280)='./file0\x00', r0, &(0x7f00000002c0)='\x00', 0x4) 10:10:51 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext3\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000480)=ANY=[@ANYBLOB='lazytime,test_dummy_encr\"ption,max_dir_size_kb=0x000000000200,grpjquota=,min_batch_time=0x00000000000003ff,rootcontext\a']) 10:10:51 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000040)={0x2, &(0x7f0000000000)=[{0x15}, {0x60}]}) 10:10:51 executing program 1: prctl$PR_SET_DUMPABLE(0x4, 0x1) 10:10:51 executing program 4: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000040)={0x2, &(0x7f0000000000)=[{0x25, 0x0, 0x0, 0x1000000}, {}]}) 10:10:51 executing program 5: prctl$PR_SET_SECCOMP(0x16, 0x0, &(0x7f0000000040)={0x2, &(0x7f0000000000)=[{0x15}, {0x6}]}) 10:10:51 executing program 2: r0 = syz_mount_image$ext4(&(0x7f0000000480)='ext3\x00', &(0x7f00000004c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000007c0)={[], [{@fscontext={'fscontext', 0x3d, 'sysadm_u'}}, {@defcontext={'defcontext', 0x3d, 'staff_u'}}]}) r1 = syz_genetlink_get_family_id$tipc(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$TIPC_CMD_GET_MAX_PORTS(0xffffffffffffffff, &(0x7f0000000100)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x1000000}, 0xc, &(0x7f00000000c0)={&(0x7f0000000080)={0x1c, r1, 0x800, 0x70bd26, 0x25dfdbfb, {}, ["", "", "", ""]}, 0x1c}, 0x1, 0x0, 0x0, 0x20000000}, 0x1) renameat2(0xffffffffffffffff, &(0x7f0000000280)='./file0\x00', r0, &(0x7f00000002c0)='\x00', 0x4) [ 1872.428071][ T22] audit: type=1326 audit(1633169451.437:627): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=21853 comm="syz-executor.5" exe="/root/syz-executor.5" sig=31 arch=c000003e syscall=202 compat=0 ip=0x7ff750d258d9 code=0x0 10:10:51 executing program 1: r0 = syz_mount_image$ext4(&(0x7f0000000480)='ext3\x00', &(0x7f00000004c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000040)={[{@nolazytime}], [{@fscontext={'fscontext', 0x3d, 'sysadm_u'}}, {@rootcontext={'rootcontext', 0x3d, 'root'}}]}) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY_ALL_USERS(r0, 0xc0406619, &(0x7f0000000000)={@id={0x2, 0x0, @auto="48ab675c8f832baee2661160d61ffd39"}}) r1 = openat$vcsu(0xffffffffffffff9c, &(0x7f0000000000), 0x5200, 0x0) fchmodat(r1, &(0x7f0000000040)='./file0\x00', 0x1b0) openat$incfs(r1, &(0x7f00000002c0)='.log\x00', 0x581200, 0x123) accept4$packet(r1, &(0x7f0000000400)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000000440)=0x14, 0x100000) ioctl$FS_IOC_GET_ENCRYPTION_KEY_STATUS(r1, 0xc080661a, &(0x7f0000000080)={@id={0x2, 0x0, @a}}) 10:10:51 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext3\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000480)=ANY=[@ANYBLOB='lazytime,test_dummy_encr,ption,max_dir_size_kb=0x000000000200,grpjquota=,min_batch_time=0x00000000000003ff,rootcontext\a']) 10:10:51 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000040)={0x2, &(0x7f0000000000)=[{0x15}, {0x61}]}) 10:10:51 executing program 4: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000040)={0x2, &(0x7f0000000000)=[{0x25, 0x0, 0x0, 0x2000000}, {}]}) 10:10:51 executing program 5: prctl$PR_SET_SECCOMP(0x16, 0x0, &(0x7f0000000040)={0x2, &(0x7f0000000000)=[{0x15}, {0x6}]}) 10:10:51 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext3\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000480)=ANY=[@ANYBLOB='lazytime,test_dummy_encry\"tion,max_dir_size_kb=0x000000000200,grpjquota=,min_batch_time=0x00000000000003ff,rootcontext\a']) 10:10:51 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000040)={0x2, &(0x7f0000000000)=[{0x15}, {0x64}]}) 10:10:51 executing program 2: r0 = syz_mount_image$ext4(&(0x7f0000000480)='ext3\x00', &(0x7f00000004c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000007c0)={[], [{@fscontext={'fscontext', 0x3d, 'sysadm_u'}}, {@defcontext={'defcontext', 0x3d, 'staff_u'}}]}) syz_genetlink_get_family_id$tipc(&(0x7f0000000040), 0xffffffffffffffff) renameat2(0xffffffffffffffff, &(0x7f0000000280)='./file0\x00', r0, &(0x7f00000002c0)='\x00', 0x4) 10:10:51 executing program 1: syz_mount_image$ext4(&(0x7f0000000480)='ext3\x00', &(0x7f00000004c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)=ANY=[@ANYBLOB="6673636f6e746578743d73797361646d5f75a4536566636f6e746578743d7374616652c5104d3bfe31da4b4fc60ed4665f752c00"]) 10:10:51 executing program 4: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000040)={0x2, &(0x7f0000000000)=[{0x25, 0x0, 0x0, 0x3000000}, {}]}) 10:10:51 executing program 5: prctl$PR_SET_SECCOMP(0x16, 0x0, &(0x7f0000000040)={0x2, &(0x7f0000000000)=[{0x15}, {0x6}]}) 10:10:51 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext3\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000480)=ANY=[@ANYBLOB='lazytime,test_dummy_encry,tion,max_dir_size_kb=0x000000000200,grpjquota=,min_batch_time=0x00000000000003ff,rootcontext\a']) 10:10:51 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000040)={0x2, &(0x7f0000000000)=[{0x15}, {0x74}]}) 10:10:51 executing program 4: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000040)={0x2, &(0x7f0000000000)=[{0x25, 0x0, 0x0, 0x5000000}, {}]}) 10:10:51 executing program 1: syz_mount_image$ext4(&(0x7f0000000480)='ext3\x00', &(0x7f00000004c0)='./file0\x00', 0x4, 0x0, 0x0, 0x0, &(0x7f00000007c0)=ANY=[@ANYBLOB="a373636f6e746578743d73797361646d5f752c646566636f6e746578740373746166665f752c00"]) getresuid(&(0x7f0000000380), &(0x7f00000003c0)=0x0, &(0x7f0000000400)) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x9, 0x5, &(0x7f0000000300)=[{&(0x7f0000000080)="647353cc8ccf57d9a9817a80898088eb2e10efa34bed3783fee315800129f2034448c998b120a7f4f2e01142997022545ae1097fc30942fbd65b504dcb783af0b39c0d8f3ac24c8484add0e7df70b572cb121de65887", 0x56, 0x6a837b1d}, {&(0x7f0000000100)="abbfff3b1abfdc666852c2f795879d0b52acb5ae6a775306308e13df11918f2cdb8c77919e89b07b43a1f1c63e86b4e7da2eed074aa7600163a385aad2e76ffaf587bb25efe344ecd9039944838dabf458172ae31d5495461a85a14ad1e7ca2f91c88e3a56addd156cc4b71337faaa7de6a4da6adb308e", 0x77, 0x6}, {&(0x7f0000000180)="962e37ed822b9cb94b69bab03b978f0d83098083104a5931c8f876ec37115dd371221a7bde489f2c618d3caa2b6ffde5f63376100c04c1e68c5d929ed4d9ce248e44b16102762ba0b7d9b26853782ac840c2d2d0ec47482fab6a6ff4ecec98c8037c909429fd092f61b747e28253515e753895ba2ca1", 0x76, 0x100000000}, {&(0x7f0000000200)="45731d6f2d9c841d0eaa86d1dfa0d916b42e46f97f00932740d1309393bdf3d2325081a9372a44cad7f8bc6bd8377de44b902f7a4a7a478dedda05799c5342a8ccc913887dcd61ca2480adfdb5b87953521669d3f9e1a1b6078f60ad6e233c3b944ae95d2668a2ead974efbe3d87bdbc645e8377f8c655622b506cd63b28b24ae1ccbd9461e67648abc3c756514379154dd95b5f7a7c54ca39af43", 0x9b, 0x9}, {&(0x7f00000002c0)="6b34b32f851bcc73dfe76b01be397b1cf51a8c42a2a3", 0x16, 0x3}], 0x300000, &(0x7f0000000500)={[{@sysvgroups}, {@norecovery}, {@data_writeback}, {@jqfmt_vfsv1}, {@nomblk_io_submit}], [{@euid_gt={'euid>', r0}}, {@permit_directio}, {@fowner_lt={'fowner<', 0xee01}}, {@defcontext={'defcontext', 0x3d, 'sysadm_u'}}]}) 10:10:51 executing program 2: r0 = syz_mount_image$ext4(&(0x7f0000000480)='ext3\x00', &(0x7f00000004c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000007c0)={[], [{@fscontext={'fscontext', 0x3d, 'sysadm_u'}}, {@defcontext={'defcontext', 0x3d, 'staff_u'}}]}) renameat2(0xffffffffffffffff, &(0x7f0000000280)='./file0\x00', r0, &(0x7f00000002c0)='\x00', 0x4) 10:10:51 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext3\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000480)=ANY=[@ANYBLOB='lazytime,test_dummy_encryp\"ion,max_dir_size_kb=0x000000000200,grpjquota=,min_batch_time=0x00000000000003ff,rootcontext\a']) 10:10:51 executing program 5: prctl$PR_SET_SECCOMP(0x16, 0x2, 0x0) 10:10:51 executing program 4: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000040)={0x2, &(0x7f0000000000)=[{0x25, 0x0, 0x0, 0x6000000}, {}]}) 10:10:51 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000040)={0x2, &(0x7f0000000000)=[{0x15}, {0x94}]}) [ 1872.864296][T21922] loop1: detected capacity change from 0 to 264192 10:10:51 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext3\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000480)=ANY=[@ANYBLOB='lazytime,test_dummy_encryp,ion,max_dir_size_kb=0x000000000200,grpjquota=,min_batch_time=0x00000000000003ff,rootcontext\a']) 10:10:51 executing program 2: renameat2(0xffffffffffffffff, &(0x7f0000000280)='./file0\x00', 0xffffffffffffffff, &(0x7f00000002c0)='\x00', 0x4) 10:10:51 executing program 5: prctl$PR_SET_SECCOMP(0x16, 0x2, 0x0) 10:10:52 executing program 1: syz_mount_image$ext4(&(0x7f0000000480)='ext3\x00', &(0x7f00000004c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)=ANY=[@ANYBLOB="6673636f6e746578743d73797361646d5f752c646566636f6e746578743d73746166665f752c00c1c2b5d2eb3fa449294031ad0e8fe33b0bdf51e3ef36772993e0cad309c3e01e6f93a0c152df90abe666dcfed1cf462ba9cd070cf8d653d3abbdde09b8a857b53851edcb4d19c786982b624863064131847ce16f0bb7a8b8e6b4419f5836adb95b84507aafab815914ec1053242f525ab0ce59ce933291403dc49801b4c84d32998e93ee8392184e8b09"]) 10:10:52 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000040)={0x2, &(0x7f0000000000)=[{0x15}, {0xb1}]}) 10:10:52 executing program 4: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000040)={0x2, &(0x7f0000000000)=[{0x25, 0x0, 0x0, 0x7000000}, {}]}) 10:10:52 executing program 2: renameat2(0xffffffffffffffff, 0x0, 0xffffffffffffffff, &(0x7f00000002c0)='\x00', 0x4) 10:10:52 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext3\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000480)=ANY=[@ANYBLOB='lazytime,test_dummy_encrypt\"on,max_dir_size_kb=0x000000000200,grpjquota=,min_batch_time=0x00000000000003ff,rootcontext\a']) 10:10:52 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000040)={0x2, &(0x7f0000000000)=[{0x15}, {0x300}]}) 10:10:52 executing program 4: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000040)={0x2, &(0x7f0000000000)=[{0x25, 0x0, 0x0, 0x9000000}, {}]}) 10:10:52 executing program 5: prctl$PR_SET_SECCOMP(0x16, 0x2, 0x0) 10:10:52 executing program 1: syz_mount_image$ext4(&(0x7f0000000480)='ext3\x00', &(0x7f00000004c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000007c0)=ANY=[@ANYBLOB="47734e6f6e7473797361646d5b752c5bc16566636f6e746578743d73746166665f752c00"]) 10:10:52 executing program 2: renameat2(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0x4) 10:10:52 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000040)={0x2, &(0x7f0000000000)=[{0x15}, {0x500}]}) 10:10:52 executing program 5: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000040)={0x0, 0x0}) 10:10:52 executing program 4: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000040)={0x2, &(0x7f0000000000)=[{0x25, 0x0, 0x0, 0x15000000}, {}]}) 10:10:52 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext3\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000480)=ANY=[@ANYBLOB='lazytime,test_dummy_encrypt,on,max_dir_size_kb=0x000000000200,grpjquota=,min_batch_time=0x00000000000003ff,rootcontext\a']) 10:10:52 executing program 1: syz_mount_image$ext4(&(0x7f0000000480)='ext3\x00', &(0x7f00000004c0)='./file0\x00', 0x0, 0x0, 0x0, 0x3008c0, &(0x7f0000000100)=ANY=[@ANYBLOB="000090000065723e", @ANYRESDEC=0x0, @ANYBLOB=',defcontext=staff_u,\x00']) r0 = openat$dir(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x0, 0x22) r1 = openat$vcsu(0xffffffffffffff9c, &(0x7f0000000000), 0x5200, 0x0) fchmodat(r1, &(0x7f0000000040)='./file0\x00', 0x1b0) openat$incfs(r1, &(0x7f00000002c0)='.log\x00', 0x581200, 0x123) accept4$packet(r1, &(0x7f0000000400)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000000440)=0x14, 0x100000) futimesat(r1, &(0x7f0000000000)='./file0\x00', &(0x7f0000000140)={{0x0, 0xea60}, {0x77359400}}) futimesat(r0, &(0x7f0000000080)='./file0/../file0\x00', &(0x7f00000000c0)={{0x0, 0x2710}, {0x0, 0x2710}}) 10:10:52 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000040)={0x2, &(0x7f0000000000)=[{0x15}, {0x600}]}) 10:10:52 executing program 2: renameat2(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0x4) 10:10:52 executing program 5: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000040)={0x0, 0x0}) 10:10:52 executing program 1: futimesat(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', &(0x7f0000000040)={{0x0, 0x2710}, {0x77359400}}) syz_mount_image$ext4(&(0x7f0000000480)='ext3\x00', &(0x7f00000004c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000007c0)={[], [{@fscontext={'fscontext', 0x3d, 'sysadm_u'}}, {@defcontext={'defcontext', 0x3d, 'staff_u'}}]}) 10:10:52 executing program 4: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000040)={0x2, &(0x7f0000000000)=[{0x25, 0x0, 0x0, 0x16000000}, {}]}) 10:10:52 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext3\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000480)=ANY=[@ANYBLOB='lazytime,test_dummy_encrypti\"n,max_dir_size_kb=0x000000000200,grpjquota=,min_batch_time=0x00000000000003ff,rootcontext\a']) 10:10:52 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000040)={0x2, &(0x7f0000000000)=[{0x15}, {0x700}]}) 10:10:52 executing program 5: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000040)={0x0, 0x0}) 10:10:52 executing program 2: renameat2(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0x4) 10:10:52 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000040)={0x2, &(0x7f0000000000)=[{0x15}, {0x900}]}) 10:10:52 executing program 4: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000040)={0x2, &(0x7f0000000000)=[{0x25, 0x0, 0x0, 0x1d000000}, {}]}) 10:10:52 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext3\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000480)=ANY=[@ANYBLOB='lazytime,test_dummy_encrypti,n,max_dir_size_kb=0x000000000200,grpjquota=,min_batch_time=0x00000000000003ff,rootcontext\a']) 10:10:52 executing program 1: r0 = syz_mount_image$ext4(&(0x7f0000000480)='ext3\x00', &(0x7f00000004c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000007c0)={[], [{@fscontext={'fscontext', 0x3d, 'sysadm_u'}}, {@defcontext={'defcontext', 0x3d, 'staff_u'}}]}) renameat2(r0, &(0x7f0000000000)='./file1\x00', r0, &(0x7f0000000040)='./file0\x00', 0x4) r1 = openat$vcsu(0xffffffffffffff9c, &(0x7f0000000340), 0x301, 0x0) ioctl$PTP_ENABLE_PPS(r1, 0x40043d04, 0x1) getdents(r1, &(0x7f0000000080)=""/246, 0xf6) 10:10:52 executing program 5: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000040)={0x1, &(0x7f0000000000)=[{0x15}]}) 10:10:52 executing program 2: renameat2(0xffffffffffffffff, 0x0, 0xffffffffffffffff, &(0x7f00000002c0)='\x00', 0x0) 10:10:52 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000040)={0x2, &(0x7f0000000000)=[{0x15}, {0x1500}]}) 10:10:52 executing program 2: r0 = syz_mount_image$ext4(&(0x7f0000000480)='ext3\x00', &(0x7f00000004c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000040)={[{@nolazytime}], [{@fscontext={'fscontext', 0x3d, 'sysadm_u'}}, {@rootcontext={'rootcontext', 0x3d, 'root'}}]}) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY_ALL_USERS(r0, 0xc0406619, &(0x7f0000000000)={@id={0x2, 0x0, @auto="48ab675c8f832baee2661160d61ffd39"}}) r1 = openat$vcsu(0xffffffffffffff9c, &(0x7f0000000000), 0x5200, 0x0) fchmodat(r1, &(0x7f0000000040)='./file0\x00', 0x1b0) openat$incfs(r1, &(0x7f00000002c0)='.log\x00', 0x581200, 0x123) accept4$packet(r1, &(0x7f0000000400)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000000440)=0x14, 0x100000) ioctl$FS_IOC_GET_ENCRYPTION_KEY_STATUS(r1, 0xc080661a, &(0x7f0000000080)={@id={0x2, 0x0, @a}}) 10:10:52 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext3\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000480)=ANY=[@ANYBLOB='lazytime,test_dummy_encryptio\",max_dir_size_kb=0x000000000200,grpjquota=,min_batch_time=0x00000000000003ff,rootcontext\a']) 10:10:52 executing program 4: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000040)={0x2, &(0x7f0000000000)=[{0x25, 0x0, 0x0, 0x20000000}, {}]}) 10:10:52 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000040)={0x2, &(0x7f0000000000)=[{0x15}, {0x1600}]}) 10:10:52 executing program 5: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000040)={0x1, &(0x7f0000000000)=[{0x15}]}) 10:10:52 executing program 1: syz_mount_image$ext4(&(0x7f0000000480)='ext3\x00', &(0x7f00000004c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000007c0)={[], [{@fscontext={'fscontext', 0x3d, 'root'}}, {@defcontext={'defcontext', 0x3d, 'user_u'}}]}) 10:10:52 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext3\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000480)=ANY=[@ANYBLOB='lazytime,test_dummy_encryptio,,max_dir_size_kb=0x000000000200,grpjquota=,min_batch_time=0x00000000000003ff,rootcontext\a']) 10:10:52 executing program 2: r0 = syz_mount_image$ext4(&(0x7f0000000480)='ext3\x00', &(0x7f00000004c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000040)={[{@nolazytime}], [{@fscontext={'fscontext', 0x3d, 'sysadm_u'}}, {@rootcontext={'rootcontext', 0x3d, 'root'}}]}) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY_ALL_USERS(r0, 0xc0406619, &(0x7f0000000000)={@id={0x2, 0x0, @auto="48ab675c8f832baee2661160d61ffd39"}}) r1 = openat$vcsu(0xffffffffffffff9c, &(0x7f0000000000), 0x5200, 0x0) fchmodat(r1, &(0x7f0000000040)='./file0\x00', 0x1b0) openat$incfs(r1, &(0x7f00000002c0)='.log\x00', 0x581200, 0x123) accept4$packet(r1, &(0x7f0000000400)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000000440)=0x14, 0x100000) ioctl$FS_IOC_GET_ENCRYPTION_KEY_STATUS(r1, 0xc080661a, &(0x7f0000000080)={@id={0x2, 0x0, @a}}) 10:10:52 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000040)={0x2, &(0x7f0000000000)=[{0x15}, {0x1d00}]}) 10:10:52 executing program 4: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000040)={0x2, &(0x7f0000000000)=[{0x25, 0x0, 0x0, 0x25000000}, {}]}) 10:10:52 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext3\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000480)=ANY=[@ANYBLOB='lazytime,test_dummy_encryption\"max_dir_size_kb=0x000000000200,grpjquota=,min_batch_time=0x00000000000003ff,rootcontext\a']) 10:10:52 executing program 2: r0 = syz_mount_image$ext4(&(0x7f0000000480)='ext3\x00', &(0x7f00000004c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000040)={[{@nolazytime}], [{@fscontext={'fscontext', 0x3d, 'sysadm_u'}}, {@rootcontext={'rootcontext', 0x3d, 'root'}}]}) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY_ALL_USERS(r0, 0xc0406619, &(0x7f0000000000)={@id={0x2, 0x0, @auto="48ab675c8f832baee2661160d61ffd39"}}) r1 = openat$vcsu(0xffffffffffffff9c, &(0x7f0000000000), 0x5200, 0x0) fchmodat(r1, &(0x7f0000000040)='./file0\x00', 0x1b0) openat$incfs(r1, &(0x7f00000002c0)='.log\x00', 0x581200, 0x123) accept4$packet(r1, &(0x7f0000000400)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000000440)=0x14, 0x100000) ioctl$FS_IOC_GET_ENCRYPTION_KEY_STATUS(r1, 0xc080661a, &(0x7f0000000080)={@id={0x2, 0x0, @a}}) 10:10:52 executing program 5: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000040)={0x1, &(0x7f0000000000)=[{0x15}]}) 10:10:52 executing program 1: syz_mount_image$ext4(&(0x7f0000000480)='ext3\x00', &(0x7f00000004c0)='./file0\x00', 0x3, 0x0, 0x0, 0x0, &(0x7f0000000400)={[{@abort}], [{@fscontext={'fscontext', 0x3d, 'sysadm_u'}}, {@defcontext={'defcontext', 0x3d, 'staff_u'}}, {@smackfsroot={'smackfsroot', 0x3d, 'fscontext'}}]}) r0 = openat$vcsu(0xffffffffffffff9c, &(0x7f0000000000), 0x5200, 0x0) fchmodat(r0, &(0x7f0000000040)='./file0\x00', 0x1b0) r1 = openat$incfs(r0, &(0x7f00000002c0)='.log\x00', 0x581200, 0x123) syz_genetlink_get_family_id$fou(&(0x7f0000000300), r1) renameat2(r1, &(0x7f0000000380)='./file0\x00', 0xffffffffffffffff, &(0x7f00000003c0)='./file1\x00', 0x0) unlinkat(r1, 0xfffffffffffffffe, 0x0) syz_mount_image$ext4(&(0x7f0000000040)='ext3\x00', &(0x7f0000000080)='./file0/file0\x00', 0x100000001, 0x4, &(0x7f00000002c0)=[{&(0x7f00000000c0)="f7a43162c788f66385e1f63d770e7375753f4994ee441616384d2aebb45a16abc09aad327096ec8e7880243f367227f886faf927f7c95ab7e9e3", 0x3a, 0x80}, {&(0x7f0000000100)="a5289e09cd4865a1186c2d329adde94773d952dc85c43675520956037af3f5406331a0ba30eaeb0ec8e0baa476a2c43d2d7b4f2e526ed86d097052e5fd3e22a97448d8e1f53df13b0a02587e3ad4eeda054d6c25ef390eac96747cdbea25e675b0c553c1e1ff1bb7b04a5851b1f2fd374ec8549c0b418903ac2a777ae38501ebe6a3f69edd71b87a7018efac16a712d1fafb0b864796ab8a7738c9c57267631469781463ab9a883e8a4842ecc196487f7ac3c94583e1acf056dc881d57d32fecea4a00c2ddd874c5805edd", 0xcb, 0x5}, {&(0x7f0000000200)="53916e7cd700054df407441bf2a90166b51a6345b16de822af867786635e719cfd1945d7fa18cb8314022386d6e289929e235af9432cb23b8f2517cc211df0cda4180031252b", 0x46, 0x6}, {&(0x7f0000000280), 0x0, 0x7b70}], 0x2100000, &(0x7f0000000340)={[{@jqfmt_vfsv0}, {@noinit_itable}], [{@euid_eq={'euid', 0x3d, 0xee00}}, {@fscontext={'fscontext', 0x3d, 'user_u'}}, {@fsname={'fsname', 0x3d, 'fscontext'}}, {@obj_user={'obj_user', 0x3d, 'ext3\x00'}}, {@euid_gt={'euid>', 0xee01}}, {@uid_gt={'uid>', 0xee01}}]}) 10:10:52 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000040)={0x2, &(0x7f0000000000)=[{0x15}, {0x2000}]}) 10:10:52 executing program 4: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000040)={0x2, &(0x7f0000000000)=[{0x25, 0x0, 0x0, 0x28000000}, {}]}) 10:10:52 executing program 2: r0 = syz_mount_image$ext4(&(0x7f0000000480)='ext3\x00', &(0x7f00000004c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000040)={[{@nolazytime}], [{@fscontext={'fscontext', 0x3d, 'sysadm_u'}}, {@rootcontext={'rootcontext', 0x3d, 'root'}}]}) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY_ALL_USERS(r0, 0xc0406619, &(0x7f0000000000)={@id={0x2, 0x0, @auto="48ab675c8f832baee2661160d61ffd39"}}) r1 = openat$vcsu(0xffffffffffffff9c, &(0x7f0000000000), 0x5200, 0x0) fchmodat(r1, &(0x7f0000000040)='./file0\x00', 0x1b0) openat$incfs(r1, &(0x7f00000002c0)='.log\x00', 0x581200, 0x123) accept4$packet(r1, &(0x7f0000000400)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000000440)=0x14, 0x100000) 10:10:52 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext3\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000480)=ANY=[@ANYBLOB='lazytime,test_dummy_encryption,\"ax_dir_size_kb=0x000000000200,grpjquota=,min_batch_time=0x00000000000003ff,rootcontext\a']) 10:10:52 executing program 5: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000040)={0x2, &(0x7f0000000000)=[{0x15}, {}]}) 10:10:52 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000040)={0x2, &(0x7f0000000000)=[{0x15}, {0x2500}]}) [ 1873.839078][T22081] loop1: detected capacity change from 0 to 264192 10:10:52 executing program 4: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000040)={0x2, &(0x7f0000000000)=[{0x25, 0x0, 0x0, 0x29000000}, {}]}) 10:10:53 executing program 2: r0 = syz_mount_image$ext4(&(0x7f0000000480)='ext3\x00', &(0x7f00000004c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000040)={[{@nolazytime}], [{@fscontext={'fscontext', 0x3d, 'sysadm_u'}}, {@rootcontext={'rootcontext', 0x3d, 'root'}}]}) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY_ALL_USERS(r0, 0xc0406619, &(0x7f0000000000)={@id={0x2, 0x0, @auto="48ab675c8f832baee2661160d61ffd39"}}) r1 = openat$vcsu(0xffffffffffffff9c, &(0x7f0000000000), 0x5200, 0x0) fchmodat(r1, &(0x7f0000000040)='./file0\x00', 0x1b0) openat$incfs(r1, &(0x7f00000002c0)='.log\x00', 0x581200, 0x123) 10:10:53 executing program 5: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000040)={0x2, &(0x7f0000000000)=[{0x15}, {}]}) 10:10:53 executing program 1: syz_mount_image$ext4(&(0x7f0000000480)='ext3\x00', &(0x7f00000004c0)='./file0\x00', 0x1, 0x0, 0x0, 0x0, &(0x7f0000000000)={[{@usrjquota}, {@noacl}, {@i_version}], [{@fscontext={'fscontext', 0x3d, 'sysadm_u'}}, {@defcontext={'defcontext', 0x3d, 'staff_u'}}]}) r0 = openat$vcsu(0xffffffffffffff9c, &(0x7f0000000340), 0x301, 0x0) ioctl$PTP_ENABLE_PPS(r0, 0x40043d04, 0x1) r1 = openat$vcsu(0xffffffffffffff9c, &(0x7f0000000000), 0x5200, 0x0) fchmodat(r1, &(0x7f0000000040)='./file0\x00', 0x1b0) openat$incfs(r1, &(0x7f00000002c0)='.log\x00', 0x581200, 0x123) accept4$packet(r1, &(0x7f0000000400)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000000440)=0x14, 0x100000) symlinkat(&(0x7f0000000080)='./file0\x00', r1, &(0x7f00000000c0)='./file0\x00') 10:10:53 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext3\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000480)=ANY=[@ANYBLOB='lazytime,test_dummy_encryption,,ax_dir_size_kb=0x000000000200,grpjquota=,min_batch_time=0x00000000000003ff,rootcontext\a']) 10:10:53 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000040)={0x2, &(0x7f0000000000)=[{0x15}, {0x2800}]}) 10:10:53 executing program 4: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000040)={0x2, &(0x7f0000000000)=[{0x25, 0x0, 0x0, 0x2d000000}, {}]}) 10:10:53 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext3\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000480)=ANY=[@ANYBLOB='lazytime,test_dummy_encryption,m\"x_dir_size_kb=0x000000000200,grpjquota=,min_batch_time=0x00000000000003ff,rootcontext\a']) 10:10:53 executing program 5: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000040)={0x2, &(0x7f0000000000)=[{0x15}, {}]}) 10:10:53 executing program 1: syz_mount_image$ext4(&(0x7f0000000480)='ext4\x00', &(0x7f00000004c0)='./file0\x00', 0x0, 0x0, 0x0, 0x80, &(0x7f0000000000)={[{@nouid32}]}) 10:10:53 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000040)={0x2, &(0x7f0000000000)=[{0x15}, {0x2d00}]}) 10:10:53 executing program 2: r0 = syz_mount_image$ext4(&(0x7f0000000480)='ext3\x00', &(0x7f00000004c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000040)={[{@nolazytime}], [{@fscontext={'fscontext', 0x3d, 'sysadm_u'}}, {@rootcontext={'rootcontext', 0x3d, 'root'}}]}) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY_ALL_USERS(r0, 0xc0406619, &(0x7f0000000000)={@id={0x2, 0x0, @auto="48ab675c8f832baee2661160d61ffd39"}}) r1 = openat$vcsu(0xffffffffffffff9c, &(0x7f0000000000), 0x5200, 0x0) fchmodat(r1, &(0x7f0000000040)='./file0\x00', 0x1b0) 10:10:53 executing program 4: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000040)={0x2, &(0x7f0000000000)=[{0x25, 0x0, 0x0, 0x30000000}, {}]}) 10:10:53 executing program 5: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000040)={0x1, &(0x7f0000000000)=[{0x6}]}) 10:10:53 executing program 1: r0 = syz_mount_image$ext4(&(0x7f0000000480)='ext3\x00', &(0x7f00000004c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000080)=ANY=[@ANYBLOB="6673636f6e746578743d73797361646d5f752c646566636f6e746578743d73746166665f752c00283f7a0b1b2ca52e72026aa0c9f83165c03dea7277d6df961cec6271af0ced8487def54f80428f903063e19870beb65019705e6583d4c84ec77d4a521dc9f9a3b38587f29d24b59df20000000000"]) openat$incfs(0xffffffffffffff9c, &(0x7f0000000140)='.log\x00', 0x2000, 0x4b) renameat2(r0, &(0x7f0000000000)='./file0\x00', r0, &(0x7f0000000040)='./file0\x00', 0x4) faccessat2(r0, &(0x7f0000000100)='./file0\x00', 0x1, 0x1000) r1 = syz_mount_image$ext4(&(0x7f0000000180)='ext3\x00', &(0x7f00000001c0)='./file0\x00', 0x8, 0x7, &(0x7f0000001600)=[{&(0x7f0000000200)="5d1b6ad8c2c5c3adf31aee61c9e509a092c00caf7aaacba4c6623de49be1da826cee9de20ee47e955dc5bb5769dc8ee2faaf6019295e6db038026c9ae1", 0x3d, 0x8}, {&(0x7f0000000240)="de90f4660493248c0c715e78a4ffc49e327259d817463859ff2260ac6b1b2db78b024c2a7c381a322e337f7fda89", 0x2e}, {&(0x7f0000000280)="e2bf9cc978a19e648ff2be9006718eff151388ade1338fd172232910d04c17288cd081322abb0ca9fe147440ed337a5fb54b5e8e1957aa4ae5c07f453e00b288", 0x40, 0x6}, {&(0x7f00000002c0)="81ee7d1dd2", 0x5, 0xb9}, {&(0x7f0000000300)="28f625ec19ef09cfc542a300c02513952e6e307cc9367c496560cef86544349fcd313a902171032e288c5245d4bc3c3df30a11d082ef9cc697526bb017a274b86d40c790935d3b8b0a8d889117ff4f89692029e3ff70e98f863f89984a49ca9b6c35d8a23b1ecd9f710775225660bab158f5fa199a5c1c230e77e4ae65a9da976c4b42805977f54592f30f1245a1cdbfdd6ad3451b6d401530ed7372baa9c0daaa2cd6c5df061e9cf6369c03e86a3c59e3212693f5923aeccbbde2779dbc8d8308cadede9a0eea3635e4916a9bdd81de47f4cdbbe59a00ef6668048bfe7f8e1faf43eb9e4d95b7d07d63dd404ebc1c4569", 0xf1, 0xdb}, {&(0x7f0000000500)="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", 0x1000, 0x91}, {&(0x7f0000001500)="05daa14ce1fa9cc379444b6df83f62cd94dce1449d79a3789d970315e80911feb9b1b1356c5d1e83d2f2b8dace9ad15e471e747e1981faa1f49cc95352bec85b690af8ea6e946261f4717b46179ec7e682dbb17d032b2b5bdde8a2609c33e215f8a70b88cec2927fe967624497b9f2b81a5de2ba8dc84f480a48b702f59c62e0781f8f1e996e67eeced4f0bdfac93e8e13b254648856253d6cc5ddbde8683cb0304f9587ab63ff770e9eedbe91d0547c7c5807d6184e5ec86fd587e254d1b5d304f5e03e84ec229c767c4ba123b2bc", 0xcf}], 0x0, &(0x7f00000016c0)={[{@nobarrier}, {@noauto_da_alloc}, {@grpjquota_path={'grpjquota', 0x3d, './file0'}}, {@max_dir_size_kb={'max_dir_size_kb', 0x3d, 0xffff}}], [{@uid_gt={'uid>', 0xee00}}, {@rootcontext={'rootcontext', 0x3d, 'user_u'}}, {@euid_gt={'euid>', 0xffffffffffffffff}}, {@defcontext={'defcontext', 0x3d, 'unconfined_u'}}, {@subj_user={'subj_user', 0x3d, '\''}}, {@hash}, {@subj_user}]}) r2 = openat$vcsu(0xffffffffffffff9c, &(0x7f0000000000), 0x5200, 0x0) fchmodat(r2, &(0x7f0000000040)='./file0\x00', 0x1b0) r3 = openat$incfs(r2, &(0x7f00000002c0)='.log\x00', 0x581200, 0x123) r4 = add_key$keyring(&(0x7f00000017c0), &(0x7f0000001800)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$clear(0x7, r4) syz_genetlink_get_family_id$fou(&(0x7f0000000300), r3) renameat2(r3, &(0x7f0000000380)='./file0\x00', 0xffffffffffffffff, &(0x7f00000003c0)='./file1\x00', 0x0) renameat2(r1, &(0x7f0000000400)='./file0\x00', r3, &(0x7f0000000440)='./file0\x00', 0x1) 10:10:53 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000040)={0x2, &(0x7f0000000000)=[{0x15}, {0x3000}]}) 10:10:53 executing program 4: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000040)={0x2, &(0x7f0000000000)=[{0x25, 0x0, 0x0, 0x34000000}, {}]}) 10:10:53 executing program 2: r0 = syz_mount_image$ext4(&(0x7f0000000480)='ext3\x00', &(0x7f00000004c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000040)={[{@nolazytime}], [{@fscontext={'fscontext', 0x3d, 'sysadm_u'}}, {@rootcontext={'rootcontext', 0x3d, 'root'}}]}) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY_ALL_USERS(r0, 0xc0406619, &(0x7f0000000000)={@id={0x2, 0x0, @auto="48ab675c8f832baee2661160d61ffd39"}}) openat$vcsu(0xffffffffffffff9c, &(0x7f0000000000), 0x5200, 0x0) 10:10:53 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext3\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000480)=ANY=[@ANYBLOB='lazytime,test_dummy_encryption,m,x_dir_size_kb=0x000000000200,grpjquota=,min_batch_time=0x00000000000003ff,rootcontext\a']) 10:10:53 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000040)={0x2, &(0x7f0000000000)=[{0x15}, {0x3400}]}) 10:10:53 executing program 4: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000040)={0x2, &(0x7f0000000000)=[{0x25, 0x0, 0x0, 0x35000000}, {}]}) 10:10:53 executing program 5: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000040)={0x1, &(0x7f0000000000)=[{0x6}]}) [ 1874.290974][T22157] loop1: detected capacity change from 0 to 8 [ 1874.301660][ T22] audit: type=1326 audit(1633169453.326:628): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=22149 comm="syz-executor.5" exe="/root/syz-executor.5" sig=31 arch=c000003e syscall=202 compat=0 ip=0x7ff750d258d9 code=0x0 10:10:53 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext3\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000480)=ANY=[@ANYBLOB='lazytime,test_dummy_encryption,ma\"_dir_size_kb=0x000000000200,grpjquota=,min_batch_time=0x00000000000003ff,rootcontext\a']) 10:10:53 executing program 2: r0 = syz_mount_image$ext4(&(0x7f0000000480)='ext3\x00', &(0x7f00000004c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000040)={[{@nolazytime}], [{@fscontext={'fscontext', 0x3d, 'sysadm_u'}}, {@rootcontext={'rootcontext', 0x3d, 'root'}}]}) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY_ALL_USERS(r0, 0xc0406619, &(0x7f0000000000)={@id={0x2, 0x0, @auto="48ab675c8f832baee2661160d61ffd39"}}) 10:10:53 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000040)={0x2, &(0x7f0000000000)=[{0x15}, {0x3500}]}) [ 1874.374591][T22157] EXT4-fs (loop1): VFS: Can't find ext4 filesystem 10:10:53 executing program 2: syz_mount_image$ext4(&(0x7f0000000480)='ext3\x00', &(0x7f00000004c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000040)={[{@nolazytime}], [{@fscontext={'fscontext', 0x3d, 'sysadm_u'}}, {@rootcontext={'rootcontext', 0x3d, 'root'}}]}) [ 1874.446185][T22174] loop1: detected capacity change from 0 to 8 [ 1874.451744][ T22] audit: type=1326 audit(1633169453.446:629): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=22172 comm="syz-executor.5" exe="/root/syz-executor.5" sig=31 arch=c000003e syscall=202 compat=0 ip=0x7ff750d258d9 code=0x0 [ 1874.458266][T22174] EXT4-fs (loop1): VFS: Can't find ext4 filesystem 10:10:53 executing program 1: r0 = syz_mount_image$ext4(&(0x7f00000000c0)='ext2\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x8, &(0x7f00000005c0)=[{&(0x7f0000001400)="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", 0x1000, 0x9}, {&(0x7f0000000140)="02816c0842e846edad0e2f6cff5a57bfbdc0f328b9e0f5e92828389a55b5", 0x1e, 0x80}, {&(0x7f0000000180)="5f60ae5cc5ccbe39ed54d71f537c866356094609a857581e27f48c19d96854a6810250f7197d5fcf2f9b19c8dbf6460e287ecfc368af9c7c1fdc00afbfd6c2708e1260e64b65d26f8f8e868b3987639d5db18d380edf3299fdf8cf9b2cb84841d4c2821c60551113bd53e74bbfac9ea6b7a5511d722ed513719a919e91a87c5083c2867bc37d206a2a5f78a70962abe1290ad613f2b145957105a56c1c32d04f55da50", 0xa3, 0x100}, {&(0x7f0000000240)="ee5df5d2aec02728cbd7e74128a169668e21b1fee21d007e72be275d32b4fb72bdecddb31d336ba7f8c91f4acec9b405707bf14a03b9e0e700d01e8347339eaf0a5cb3e3b153a7f0e465df6ba9b4876a76e5525dfd1d31cd78c2d7f2a6196a89aa9bf87d7880e80b298d4a08e189f07bf68500bdf8fe978b000e8283a70bc94b6b660ab6bbfb194750d016b0b938978a13c2cf7ca56d5fc3ce7aab9082e06aad69a4bbb17b608b52b0e6", 0xaa}, {&(0x7f0000000300)="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", 0xfe, 0x6f40bda8}, {&(0x7f0000000400)="20921cb37f8d55855aac4fe91bd44383e24b8e0282d630e9b7da5261980ea01b7edab7e075d4d94d42b3cc56c4336d17c1115f23184f70267940848bd22158a4eaed860e75464b54aafa57b7c33c1443f7f912058ae234c7bc8a26656b71c247ab6eb2d9148781c5596338e2ad1d", 0x6e, 0x6}, {&(0x7f0000000500)="6022b372647c87ce558b78ea531b99dbd4c97a2e1a02a0ecd6b24c3e90d84171db32f16a8e929478a069cb175abe47cb8dd233e9a38ed2941ad7513b9f9a86daf7ba4d735c1fba6b346525f6e15550c148553c889d93fcd17a1f862cdfe824f5a539882a6415ff932826d2a8fdd423d8822f40375e4b0bba0feb2615d18af5", 0x7f, 0xc6d}, {&(0x7f0000000580)="bcf07638d5739a6af7839cc09bfa35e5df6977011c0c2f7612564253ab", 0x1d}], 0x2080c2, &(0x7f0000000680)={[{@block_validity}, {@nodiscard}, {@bsdgroups}, {@noinit_itable}, {@sysvgroups}, {@nomblk_io_submit}, {@data_writeback}], [{@mask={'mask', 0x3d, '^MAY_EXEC'}}, {@fsname={'fsname', 0x3d, ']/(}[@\x00]:'}}, {@euid_lt={'euid<', 0xee01}}, {@uid_lt}]}) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY_ALL_USERS(r0, 0xc0406619, &(0x7f0000000740)={@id={0x2, 0x0, @auto="bb0c13e16502a028627f6ba5ac5190e3"}}) unlinkat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x200) r1 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NBD_CMD_CONNECT(r1, &(0x7f00000013c0)={&(0x7f00000012c0), 0xc, &(0x7f0000001380)={0x0}}, 0xc6c3dbe86af1a089) syz_mount_image$ext4(&(0x7f0000000480)='ext3\x00', &(0x7f00000004c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000040)=ANY=[@ANYBLOB="667b636f6e7465587452b650a561646d743d7374e166665f752c00"/39, @ANYRESDEC=r1, @ANYRESOCT]) 10:10:53 executing program 4: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000040)={0x2, &(0x7f0000000000)=[{0x25, 0x0, 0x0, 0x3d000000}, {}]}) 10:10:53 executing program 5: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000040)={0x1, &(0x7f0000000000)=[{0x6}]}) 10:10:53 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext3\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000480)=ANY=[@ANYBLOB='lazytime,test_dummy_encryption,ma,_dir_size_kb=0x000000000200,grpjquota=,min_batch_time=0x00000000000003ff,rootcontext\a']) 10:10:53 executing program 2: syz_mount_image$ext4(0x0, &(0x7f00000004c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000040)={[{@nolazytime}], [{@fscontext={'fscontext', 0x3d, 'sysadm_u'}}, {@rootcontext={'rootcontext', 0x3d, 'root'}}]}) 10:10:53 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000040)={0x2, &(0x7f0000000000)=[{0x15}, {0x3d00}]}) 10:10:53 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000040)={0x2, &(0x7f0000000000)=[{0x15}, {0x4500}]}) 10:10:53 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext3\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000480)=ANY=[@ANYBLOB='lazytime,test_dummy_encryption,max\"dir_size_kb=0x000000000200,grpjquota=,min_batch_time=0x00000000000003ff,rootcontext\a']) [ 1874.661801][T22214] loop1: detected capacity change from 0 to 264192 [ 1874.672856][ T22] audit: type=1326 audit(1633169453.706:630): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=22210 comm="syz-executor.5" exe="/root/syz-executor.5" sig=31 arch=c000003e syscall=202 compat=0 ip=0x7ff750d258d9 code=0x0 10:10:53 executing program 2: syz_mount_image$ext4(0x0, &(0x7f00000004c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000040)={[{@nolazytime}], [{@fscontext={'fscontext', 0x3d, 'sysadm_u'}}, {@rootcontext={'rootcontext', 0x3d, 'root'}}]}) 10:10:53 executing program 5: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000040)={0x2, &(0x7f0000000000)=[{}, {0x6}]}) 10:10:53 executing program 4: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000040)={0x2, &(0x7f0000000000)=[{0x25, 0x0, 0x0, 0x45000000}, {}]}) 10:10:53 executing program 1: r0 = syz_mount_image$ext4(&(0x7f0000000480)='ext4\x00', &(0x7f00000004c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)={[], [{@fscontext={'fscontext', 0x3d, 'sysadm_u'}}, {@func={'func', 0x3d, 'FILE_CHECK'}}]}) clock_gettime(0x0, &(0x7f0000000040)={0x0, 0x0}) futimesat(r0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000080)={{0x0, 0x2710}, {r1, r2/1000+10000}}) 10:10:53 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext3\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000480)=ANY=[@ANYBLOB='lazytime,test_dummy_encryption,max,dir_size_kb=0x000000000200,grpjquota=,min_batch_time=0x00000000000003ff,rootcontext\a']) 10:10:53 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000040)={0x2, &(0x7f0000000000)=[{0x15}, {0x4d00}]}) 10:10:53 executing program 4: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000040)={0x2, &(0x7f0000000000)=[{0x25, 0x0, 0x0, 0x4d000000}, {}]}) [ 1874.846969][ T22] audit: type=1326 audit(1633169453.875:631): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=22239 comm="syz-executor.5" exe="/root/syz-executor.5" sig=31 arch=c000003e syscall=202 compat=0 ip=0x7ff750d258d9 code=0x0 10:10:53 executing program 5: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000040)={0x2, &(0x7f0000000000)=[{}, {0x6}]}) 10:10:53 executing program 2: syz_mount_image$ext4(0x0, &(0x7f00000004c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000040)={[{@nolazytime}], [{@fscontext={'fscontext', 0x3d, 'sysadm_u'}}, {@rootcontext={'rootcontext', 0x3d, 'root'}}]}) 10:10:53 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext3\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000480)=ANY=[@ANYBLOB='lazytime,test_dummy_encryption,max_\"ir_size_kb=0x000000000200,grpjquota=,min_batch_time=0x00000000000003ff,rootcontext\a']) 10:10:54 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000040)={0x2, &(0x7f0000000000)=[{0x15}, {0x6000}]}) 10:10:54 executing program 1: r0 = syz_mount_image$ext4(&(0x7f0000000480)='ext3\x00', &(0x7f00000004c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000007c0)={[], [{@fscontext={'fscontext', 0x3d, 'sysadm_u'}}, {@defcontext={'defcontext', 0x3d, 'staff_u'}}]}) symlinkat(&(0x7f0000000000)='./file0\x00', r0, &(0x7f0000000040)='./file0\x00') 10:10:54 executing program 4: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000040)={0x2, &(0x7f0000000000)=[{0x25, 0x0, 0x0, 0x60000000}, {}]}) [ 1874.970543][ T22] audit: type=1326 audit(1633169453.995:632): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=22262 comm="syz-executor.5" exe="/root/syz-executor.5" sig=31 arch=c000003e syscall=202 compat=0 ip=0x7ff750d258d9 code=0x0 10:10:54 executing program 2: syz_mount_image$ext4(&(0x7f0000000480)='ext3\x00', 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000040)={[{@nolazytime}], [{@fscontext={'fscontext', 0x3d, 'sysadm_u'}}, {@rootcontext={'rootcontext', 0x3d, 'root'}}]}) 10:10:54 executing program 5: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000040)={0x2, &(0x7f0000000000)=[{}, {0x6}]}) 10:10:54 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext3\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000480)=ANY=[@ANYBLOB='lazytime,test_dummy_encryption,max_,ir_size_kb=0x000000000200,grpjquota=,min_batch_time=0x00000000000003ff,rootcontext\a']) 10:10:54 executing program 4: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000040)={0x2, &(0x7f0000000000)=[{0x25, 0x0, 0x0, 0x61000000}, {}]}) 10:10:54 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000040)={0x2, &(0x7f0000000000)=[{0x15}, {0x6100}]}) 10:10:54 executing program 1: syz_mount_image$ext4(&(0x7f0000000480)='ext3\x00', &(0x7f00000004c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000007c0)={[], [{@fscontext={'fscontext', 0x3d, 'sysadm_u'}}, {@defcontext={'defcontext', 0x3d, 'staff_u'}}]}) r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext3\x00', &(0x7f0000000040)='./file0\x00', 0xff, 0x8, &(0x7f0000000500)=[{&(0x7f0000000080)="4ca2c77a1f74991699230fe1c99a0b2509621f3345f38e80171f980ca3977e99b66b91cb8760dcf83e78e32deb1d509dc7ef88e7f150cac55573b261ffd33c294199688cb2ce2bda41ea33023d01f2ef93078d3ab23e0eb07d4e6070b6c62632173fd5b154b1275ca13c46e91f5d61fdf12790887acc4d3dfa994de9362958e872e2836b6ee4e5fd08ab676a2ec32a28439e481b53917f9469fdc0e03729350e402390cbc8c5a10109e213a9272373d444bad5f780b36fa8218b5f77106a6dea422ca7777a0a71f1b812737bb14a15c3f6e389dce3370c9eb79ae1fe5ce057bf8d0dec399800ca23c38b0084fd", 0xed, 0x8a7}, {&(0x7f0000000180)="0ac46036f1634eaf2462cf3208558257082900d3016b9d9bb863fd86c1ea016b4983c79eb45db5e2764402b9ba1fea49ce8b7bb7c70ecce4bead4ce61c48a93234c6167629bc987024f3ce710ce7f6034e80d8c86193fc63fbea973db08a505a1b78487e0ef710de16a9d9173097e0b446cf04364751e4e3228e78ab24ee1c", 0x7f, 0x3}, {&(0x7f0000000200)="4340666928ad95aa4260933cecf8cfab463baf796bdac3bcd12239a71e3cd6d6ac09df0fd65b6abf1a163c33e6e10c51bde327e76782969a46952ce1d7b4ba06a67ad2b18123b86828ae49bbd86cfbb5596d221f", 0x54, 0x6}, {&(0x7f0000000280)="d0df9e963a7235305a56a5889e53c8aacb7b4600fd09b93ef9b2998b29e433f6e82751d7781fd63dae1120260fbcd5e52a1d0767c761825d8ad84fc1c546d93f5d76de77021ad5b6e26d200bdedd42ea0ffdfad8e6033f8cefe68322bb3003e5d6002b688fd38173a0c56106d2d83f7868188ced2694bcaf7dbbb31831fd", 0x7e, 0xfffffffffffffffc}, {&(0x7f0000000300)="4805c364b6b14aa0ea7e2a5a1219191c194135dc1e0bbe18f7d3dfdba7cec6ea9b4eb35aff0b01e75a97c36be8ff35f20a30ef5019fe5f7098d4469eeccc0bd488d417061da8ef97130d6caa5c3dc9c63f116c498899796f98659da49ca83384d422fd98bc34bdf6e8d173cbf7121c0397a26339fcef05a6224797a40e95539d", 0x80, 0x4}, {&(0x7f0000000800)="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", 0x1000, 0x3fbe76bb}, {&(0x7f0000000380)="dc45f2d62ffd79571a08de8c37a8f800bba563df16107550e067c69d025c4951ea81b73e1947767722dc57402f8da619caf6b01054348d530ec9a992c208891c9276857056297e6366cf32567899b6efc4fded4b5380fed5ef044dca6a6ed5ddbf6d5b57ef357975244b6f19750ebd9bc566f2f8cad3fb3679cfc202c80e", 0x7e, 0x9}, {&(0x7f0000000400)="e5ffe82477810f4360072643186a6e3c95dba2b36fa77fc425823f624719c02fb7119553d63c0c22708444f087757a82e615c8c11c51aaeacaca881f6cc830adc44593519222ff37c6aa41bbc556e1287602989da3f3643f74133def3e36", 0x5e, 0x10000}], 0x20, &(0x7f00000005c0)={[{@norecovery}, {@data_err_abort}], [{@obj_role}, {@appraise}]}) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY_ALL_USERS(r0, 0xc0406619, &(0x7f0000000600)={@id={0x2, 0x0, @c}}) 10:10:54 executing program 2: syz_mount_image$ext4(&(0x7f0000000480)='ext3\x00', 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000040)={[{@nolazytime}], [{@fscontext={'fscontext', 0x3d, 'sysadm_u'}}, {@rootcontext={'rootcontext', 0x3d, 'root'}}]}) 10:10:54 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext3\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000480)=ANY=[@ANYBLOB='lazytime,test_dummy_encryption,max_d\"r_size_kb=0x000000000200,grpjquota=,min_batch_time=0x00000000000003ff,rootcontext\a']) 10:10:54 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000040)={0x2, &(0x7f0000000000)=[{0x15}, {0x6400}]}) 10:10:54 executing program 5: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000040)={0x2, &(0x7f0000000000)=[{}, {0x6}]}) 10:10:54 executing program 4: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000040)={0x2, &(0x7f0000000000)=[{0x25, 0x0, 0x0, 0x64000000}, {}]}) 10:10:54 executing program 2: syz_mount_image$ext4(&(0x7f0000000480)='ext3\x00', 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000040)={[{@nolazytime}], [{@fscontext={'fscontext', 0x3d, 'sysadm_u'}}, {@rootcontext={'rootcontext', 0x3d, 'root'}}]}) [ 1875.204847][T22302] loop1: detected capacity change from 0 to 264192 10:10:54 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext3\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000480)=ANY=[@ANYBLOB='lazytime,test_dummy_encryption,max_d,r_size_kb=0x000000000200,grpjquota=,min_batch_time=0x00000000000003ff,rootcontext\a']) 10:10:54 executing program 4: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000040)={0x2, &(0x7f0000000000)=[{0x25, 0x0, 0x0, 0x74000000}, {}]}) 10:10:54 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000040)={0x2, &(0x7f0000000000)=[{0x15}, {0x7400}]}) 10:10:54 executing program 5: r0 = syz_mount_image$ext4(&(0x7f00000000c0)='ext2\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x8, &(0x7f00000005c0)=[{&(0x7f0000001400)="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", 0x1000, 0x9}, {&(0x7f0000000140)="02816c0842e846edad0e2f6cff5a57bfbdc0f328b9e0f5e92828389a55b5", 0x1e, 0x80}, {&(0x7f0000000180)="5f60ae5cc5ccbe39ed54d71f537c866356094609a857581e27f48c19d96854a6810250f7197d5fcf2f9b19c8dbf6460e287ecfc368af9c7c1fdc00afbfd6c2708e1260e64b65d26f8f8e868b3987639d5db18d380edf3299fdf8cf9b2cb84841d4c2821c60551113bd53e74bbfac9ea6b7a5511d722ed513719a919e91a87c5083c2867bc37d206a2a5f78a70962abe1290ad613f2b145957105a56c1c32d04f55da50", 0xa3, 0x100}, {&(0x7f0000000240)="ee5df5d2aec02728cbd7e74128a169668e21b1fee21d007e72be275d32b4fb72bdecddb31d336ba7f8c91f4acec9b405707bf14a03b9e0e700d01e8347339eaf0a5cb3e3b153a7f0e465df6ba9b4876a76e5525dfd1d31cd78c2d7f2a6196a89aa9bf87d7880e80b298d4a08e189f07bf68500bdf8fe978b000e8283a70bc94b6b660ab6bbfb194750d016b0b938978a13c2cf7ca56d5fc3ce7aab9082e06aad69a4bbb17b608b52b0e6", 0xaa}, {&(0x7f0000000300)="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", 0xfe, 0x6f40bda8}, {&(0x7f0000000400)="20921cb37f8d55855aac4fe91bd44383e24b8e0282d630e9b7da5261980ea01b7edab7e075d4d94d42b3cc56c4336d17c1115f23184f70267940848bd22158a4eaed860e75464b54aafa57b7c33c1443f7f912058ae234c7bc8a26656b71c247ab6eb2d9148781c5596338e2ad1d", 0x6e, 0x6}, {&(0x7f0000000500)="6022b372647c87ce558b78ea531b99dbd4c97a2e1a02a0ecd6b24c3e90d84171db32f16a8e929478a069cb175abe47cb8dd233e9a38ed2941ad7513b9f9a86daf7ba4d735c1fba6b346525f6e15550c148553c889d93fcd17a1f862cdfe824f5a539882a6415ff932826d2a8fdd423d8822f40375e4b0bba0feb2615d18af5", 0x7f, 0xc6d}, {&(0x7f0000000580)="bcf07638d5739a6af7839cc09bfa35e5df6977011c0c2f7612564253ab", 0x1d}], 0x2080c2, &(0x7f0000000680)={[{@block_validity}, {@nodiscard}, {@bsdgroups}, {@noinit_itable}, {@sysvgroups}, {@nomblk_io_submit}, {@data_writeback}], [{@mask={'mask', 0x3d, '^MAY_EXEC'}}, {@fsname={'fsname', 0x3d, ']/(}[@\x00]:'}}, {@euid_lt={'euid<', 0xee01}}, {@uid_lt}]}) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY_ALL_USERS(r0, 0xc0406619, &(0x7f0000000740)={@id={0x2, 0x0, @auto="bb0c13e16502a028627f6ba5ac5190e3"}}) unlinkat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x200) r1 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NBD_CMD_CONNECT(r1, &(0x7f00000013c0)={&(0x7f00000012c0), 0xc, &(0x7f0000001380)={0x0}}, 0xc6c3dbe86af1a089) syz_mount_image$ext4(&(0x7f0000000480)='ext3\x00', &(0x7f00000004c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000040)=ANY=[@ANYBLOB="667b636f6e7465587452b650a561646d743d7374e166665f752c00"/39, @ANYRESDEC=r1, @ANYRESOCT]) 10:10:54 executing program 1: arch_prctl$ARCH_SET_CPUID(0x1012, 0x0) syz_mount_image$ext4(&(0x7f0000000480)='ext3\x00', &(0x7f00000004c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000007c0)=ANY=[@ANYBLOB='fscontext=sys\tdm_u,defcontext=staff_u,\x00']) 10:10:54 executing program 2: syz_mount_image$ext4(&(0x7f0000000480)='ext3\x00', &(0x7f00000004c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 10:10:54 executing program 1: syz_mount_image$ext4(&(0x7f0000000480)='ext3\x00', &(0x7f00000004c0)='./file0\x00', 0x1, 0x0, 0x0, 0x0, &(0x7f00000007c0)=ANY=[@ANYBLOB="6673636f6e746578743d73697361f86d5f752c646566636f6e746578743d7342a55e746066665f"]) faccessat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0xb8) 10:10:54 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext3\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000480)=ANY=[@ANYBLOB='lazytime,test_dummy_encryption,max_di\"_size_kb=0x000000000200,grpjquota=,min_batch_time=0x00000000000003ff,rootcontext\a']) [ 1875.359277][T22335] loop5: detected capacity change from 0 to 264192 10:10:54 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000040)={0x2, &(0x7f0000000000)=[{0x15}, {0x9400}]}) 10:10:54 executing program 2: syz_mount_image$ext4(&(0x7f0000000480)='ext3\x00', &(0x7f00000004c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 10:10:54 executing program 4: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000040)={0x2, &(0x7f0000000000)=[{0x25, 0x0, 0x0, 0x94000000}, {}]}) 10:10:54 executing program 5: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000040)={0x2, &(0x7f0000000000)=[{0x25, 0x0, 0x0, 0x28000000}, {}]}) 10:10:54 executing program 1: r0 = syz_mount_image$ext4(&(0x7f0000000480)='ext3\x00', &(0x7f00000004c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000007c0)={[], [{@fscontext={'fscontext', 0x3d, 'sysadm_u'}}, {@defcontext={'defcontext', 0x3d, 'staff_u'}}]}) openat$incfs(r0, &(0x7f0000000000)='.pending_reads\x00', 0x1, 0x3) 10:10:54 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext3\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000480)=ANY=[@ANYBLOB='lazytime,test_dummy_encryption,max_di,_size_kb=0x000000000200,grpjquota=,min_batch_time=0x00000000000003ff,rootcontext\a']) 10:10:54 executing program 4: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000040)={0x2, &(0x7f0000000000)=[{0x25, 0x0, 0x0, 0xb1000000}, {}]}) 10:10:54 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000040)={0x2, &(0x7f0000000000)=[{0x15}, {0xb100}]}) 10:10:54 executing program 2: syz_mount_image$ext4(&(0x7f0000000480)='ext3\x00', &(0x7f00000004c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 10:10:54 executing program 4: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000040)={0x2, &(0x7f0000000000)=[{0x25}, {}]}) 10:10:54 executing program 5: syz_mount_image$ext4(&(0x7f0000000480)='ext3\x00', &(0x7f00000004c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000007c0)={[], [{@fscontext={'fscontext', 0x3d, 'sysadm_u'}}, {@defcontext={'defcontext', 0x3d, 'staff_u'}}], 0x22}) 10:10:54 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext3\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000480)=ANY=[@ANYBLOB='lazytime,test_dummy_encryption,max_dir\"size_kb=0x000000000200,grpjquota=,min_batch_time=0x00000000000003ff,rootcontext\a']) 10:10:54 executing program 2: syz_mount_image$ext4(&(0x7f0000000480)='ext3\x00', &(0x7f00000004c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000040)={[], [{@fscontext={'fscontext', 0x3d, 'sysadm_u'}}, {@rootcontext={'rootcontext', 0x3d, 'root'}}]}) 10:10:54 executing program 1: syz_mount_image$ext4(&(0x7f0000000480)='ext3\x00', &(0x7f00000004c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)=ANY=[@ANYBLOB="6673636f6e746578743d73797361646d5f752c646566636f6e746578743d73746166665f752c00c55a236e37ee92ba16dba44a20f30d17f82723a244830697ad147ad3b39fa32fa6922c538c315dd922b9ca3b62fce9517c69c06d0264cf402aa26da91364f5b173e9c213643e0b05897274058fe2f9cc87683243f3455c7a88c2fbdf25c5608ad5bfebc1a1d1b5a49016ec81ed2894c5d55d0eb200a42e5e19757d3e267d92db4af9eda77bc229519e0ab1622719b4ad29676d35906d840f077e5549e0b6ab1c929084b1ecace35b874d635bf29a2ee081b4dfa06d03d56b4b7a0948687df7c05b5ebc9a993fd74f3adf35094a06c36a3e74d67b3d73123850b7d78fb3891d1d5dc5f8dc13473dd613a2d08b71de537e4659c230e3885f541543e6f8d37128c9b701730e7ada4a753368967ed075512c2a55c4b08748a9dad9929674730bede72c706daef2dc756c82d52aa3d41ca5cade9c6d023f1b74e720bc332dcfe488f6388270ca72933b47614323a89f132ccd8bdf74cb78d46e3bd8d9c3b76adfb9ea09159f547d7120299527cec44239e8819e61fb6f0faa8e967a605deb6ff8e739e1e583d8bc4db614471e7c75ed28d397104fced0f2c4c2ef42fe16a29c2df19c689d01156ce16323a07e1cd93c5324681d86021e5e9771ec7716871d53ef6007cb2b1a50c5d5a175084d8c6cc1443b96588f4319247873470668f27c8f1ef7d656903c11b192f3"]) 10:10:54 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000040)={0x2, &(0x7f0000000000)=[{0x15}, {}]}) 10:10:54 executing program 1: mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu/syz0\x00', 0x1ff) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup.cpu/syz1\x00', 0x1ff) socketpair(0x11, 0xa, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) syz_genetlink_get_family_id$team(&(0x7f0000000040), r0) r2 = syz_genetlink_get_family_id$team(&(0x7f0000000140), r1) ioctl$sock_ipv6_tunnel_SIOCDELPRL(r1, 0x89f6, &(0x7f0000000200)={'ip6_vti0\x00', &(0x7f0000000180)={'ip6tnl0\x00', 0x0, 0x4, 0x6, 0x3f, 0xff, 0x50, @remote, @loopback, 0x700, 0x10, 0xe4a7, 0x7}}) r4 = socket(0xa, 0x2, 0x0) sendmsg$TIPC_CMD_SHOW_LINK_STATS(r4, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={0x0}}, 0x0) getpeername$packet(r0, &(0x7f0000000240)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000280)=0x14) ioctl$sock_ipv6_tunnel_SIOCDELTUNNEL(r0, 0x89f2, &(0x7f0000000340)={'ip6tnl0\x00', &(0x7f00000002c0)={'ip6_vti0\x00', 0x0, 0x29, 0x2, 0x8, 0x433, 0x21, @private2, @remote, 0x20, 0x7800, 0x8}}) ioctl$sock_ipv6_tunnel_SIOCDELTUNNEL(r0, 0x89f2, &(0x7f0000000400)={'syztnl2\x00', &(0x7f0000000380)={'syztnl2\x00', 0x0, 0x4, 0x3, 0x9, 0x8, 0x0, @ipv4={'\x00', '\xff\xff', @dev={0xac, 0x14, 0x14, 0xe}}, @local, 0x10, 0x7f00, 0x6, 0xffff1899}}) sendmsg$TEAM_CMD_PORT_LIST_GET(r0, &(0x7f00000009c0)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f0000000980)={&(0x7f0000000a00)=ANY=[@ANYBLOB="08050000", @ANYRES16=r2, @ANYBLOB="00022abd7000ffdbdf250300000008000100", @ANYRES32=0x0, @ANYBLOB="4400028040000100240001006c625f74785f686173685f746f5f706f72745f6d617070696e67000000000000050003000300000008000400", @ANYRES32=r3, @ANYBLOB="080007000000000008000100", @ANYRES32=0x0, @ANYBLOB="6c01028038000100240001006d636173745f72656a6f696e5f636f756e7400000000000000000000000000000500030003000000080004000800000038000100240001006e6f746966795f70656572735f696e74657276616c0000000000000000000000050003000300000008000400ff0000003c000100240001006c625f74785f6d6574686f6400000000000000000000000000000000000000000500030005000000090004006861736800000000400001002400010071756575655f69640000000000000000000000000000000000000000000000000500030003000000080004000700000008000600", @ANYRES32=r5, @ANYBLOB="40000100240001006c625f686173685f737461747300000000000000000000000000000000000000050003000b000000080004000800000008000700000000003c00010024000100656e61626c65640000000000000000000000000000000000000000000000000005000300060000000400040008000600", @ANYRES32=r6, @ANYBLOB="08000100", @ANYRES32=r7, @ANYBLOB="f00002803c00010024000100656e61626c65640000000000000000000000000000000000000000000000000005000300060000000400040008000600", @ANYRES32=0x0, @ANYBLOB="38000100240001006d636173745f72656a6f696e5f696e74657276616c00000000000000000000000500030003000000080004000100000040000100240001006d6f64650000000000000000000000000000000000000000000000000000000005000300050000000f000400726f756e64726f62696e000038000100240001006c625f73746174735f726566726573685f696e74657276616c000000000000000500030003000000080004002000000008000100", @ANYRES32=0x0, @ANYBLOB="3001028038000100240001006d636173745f72656a6f696e5f696e74657276616c0000000000000000000000050003000300000008000400040000004c000100240001006270665f686173685f66756e6300000000000000000000000000000000000000050003000b0000001c0004001f003f01ff000000000008b00500000004001df8030000003800010024000100616374697665706f727400000000000000000000000000000000000000000000050003000300000008000400", @ANYRES32=0x0, @ANYBLOB="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", @ANYRES32=0x0, @ANYBLOB="fc000280400001002400010071756575655f69640000000000000000000000000000000000000000000000000500030003000000080004009900000008000600", @ANYRES32=0x0, @ANYBLOB="40000100240001006c625f706f72745f737461747300000000000000000000000000000000000000050003000b0000000800040000fc020008000600", @ANYRES32=0x0, @ANYBLOB="3c00010024000100757365725f6c696e6b75705f656e61626c65640000000000000000000000000005000300060000000400040008000600", @ANYRES32=0x0, @ANYBLOB="3c00010024000100757365725f6c696e6b757000000000000000000000000000000000000000000005000300060000000400040008000600", @ANYRES32=0x0, @ANYBLOB], 0x508}, 0x1, 0x0, 0x0, 0x20008080}, 0x4041) 10:10:54 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext3\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000480)=ANY=[@ANYBLOB='lazytime,test_dummy_encryption,max_dir,size_kb=0x000000000200,grpjquota=,min_batch_time=0x00000000000003ff,rootcontext\a']) 10:10:54 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000040)={0x2, &(0x7f0000000000)=[{0x15}, {0x0, 0x2}]}) 10:10:54 executing program 2: syz_mount_image$ext4(&(0x7f0000000480)='ext3\x00', &(0x7f00000004c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000040)={[], [{@fscontext={'fscontext', 0x3d, 'sysadm_u'}}]}) 10:10:54 executing program 5: syz_mount_image$ext4(&(0x7f0000000480)='ext3\x00', &(0x7f00000004c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000007c0)={[], [{@fscontext={'fscontext', 0x3d, 'sysadm_u'}}, {@defcontext={'defcontext', 0x3d, 'staff_u'}}], 0x22}) 10:10:54 executing program 4: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000040)={0x2, &(0x7f0000000000)=[{0x25}, {0x2}]}) 10:10:54 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000040)={0x2, &(0x7f0000000000)=[{0x15}, {0x0, 0x3}]}) 10:10:54 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext3\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000480)=ANY=[@ANYBLOB='lazytime,test_dummy_encryption,max_dir_\"ize_kb=0x000000000200,grpjquota=,min_batch_time=0x00000000000003ff,rootcontext\a']) 10:10:54 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000040)={0x2, &(0x7f0000000000)=[{0x15, 0x0, 0x2}, {}]}) 10:10:54 executing program 2: syz_mount_image$ext4(&(0x7f0000000480)='ext3\x00', &(0x7f00000004c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000040)={[], [{@fscontext={'fscontext', 0x3d, 'sysadm_u'}}]}) 10:10:54 executing program 5: syz_mount_image$ext4(&(0x7f0000000480)='ext3\x00', &(0x7f00000004c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000007c0)={[], [{@fscontext={'fscontext', 0x3d, 'sysadm_u'}}, {@defcontext={'defcontext', 0x3d, 'staff_u'}}], 0x22}) 10:10:54 executing program 4: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000040)={0x2, &(0x7f0000000000)=[{0x25}, {0x3}]}) 10:10:55 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000040)={0x2, &(0x7f0000000000)=[{0x15}, {0x0, 0x5}]}) 10:10:55 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext3\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000480)=ANY=[@ANYBLOB='lazytime,test_dummy_encryption,max_dir_,ize_kb=0x000000000200,grpjquota=,min_batch_time=0x00000000000003ff,rootcontext\a']) 10:10:55 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000040)={0x2, &(0x7f0000000000)=[{0x15, 0x0, 0x2}, {}]}) 10:10:55 executing program 4: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000040)={0x2, &(0x7f0000000000)=[{0x25}, {0x5}]}) 10:10:55 executing program 5: syz_mount_image$ext4(0x0, &(0x7f00000004c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000007c0)={[], [{@fscontext={'fscontext', 0x3d, 'sysadm_u'}}, {@defcontext={'defcontext', 0x3d, 'staff_u'}}], 0x22}) 10:10:55 executing program 2: syz_mount_image$ext4(&(0x7f0000000480)='ext3\x00', &(0x7f00000004c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000040)={[], [{@fscontext={'fscontext', 0x3d, 'sysadm_u'}}]}) 10:10:55 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000040)={0x2, &(0x7f0000000000)=[{0x15}, {0x0, 0x6}]}) 10:10:55 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000040)={0x2, &(0x7f0000000000)=[{0x15, 0x0, 0x2}, {}]}) 10:10:55 executing program 5: syz_mount_image$ext4(0x0, &(0x7f00000004c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000007c0)={[], [{@fscontext={'fscontext', 0x3d, 'sysadm_u'}}, {@defcontext={'defcontext', 0x3d, 'staff_u'}}], 0x22}) 10:10:55 executing program 4: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000040)={0x2, &(0x7f0000000000)=[{0x25}, {0x6}]}) 10:10:55 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext3\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000480)=ANY=[@ANYBLOB='lazytime,test_dummy_encryption,max_dir_s\"ze_kb=0x000000000200,grpjquota=,min_batch_time=0x00000000000003ff,rootcontext\a']) 10:10:55 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000040)={0x2, &(0x7f0000000000)=[{0x15}, {0x0, 0x7}]}) 10:10:55 executing program 2: syz_mount_image$ext4(&(0x7f0000000480)='ext3\x00', &(0x7f00000004c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000040)={[], [{@rootcontext={'rootcontext', 0x3d, 'root'}}]}) 10:10:55 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x0, &(0x7f0000000040)={0x2, &(0x7f0000000000)=[{0x15, 0x0, 0x2}, {}]}) 10:10:55 executing program 5: syz_mount_image$ext4(0x0, &(0x7f00000004c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000007c0)={[], [{@fscontext={'fscontext', 0x3d, 'sysadm_u'}}, {@defcontext={'defcontext', 0x3d, 'staff_u'}}], 0x22}) 10:10:55 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext3\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000480)=ANY=[@ANYBLOB='lazytime,test_dummy_encryption,max_dir_s,ze_kb=0x000000000200,grpjquota=,min_batch_time=0x00000000000003ff,rootcontext\a']) [ 1876.234770][ T22] kauditd_printk_skb: 2 callbacks suppressed [ 1876.234782][ T22] audit: type=1326 audit(1633169455.265:635): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=22491 comm="syz-executor.4" exe="/root/syz-executor.4" sig=31 arch=c000003e syscall=202 compat=0 ip=0x7f9dee22a8d9 code=0x0 10:10:55 executing program 2: syz_mount_image$ext4(&(0x7f0000000480)='ext3\x00', &(0x7f00000004c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000040)={[], [{@rootcontext={'rootcontext', 0x3d, 'root'}}]}) 10:10:55 executing program 4: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000040)={0x2, &(0x7f0000000000)=[{0x25}, {0x7}]}) 10:10:55 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext3\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000480)=ANY=[@ANYBLOB='lazytime,test_dummy_encryption,max_dir_si\"e_kb=0x000000000200,grpjquota=,min_batch_time=0x00000000000003ff,rootcontext\a']) 10:10:55 executing program 5: syz_mount_image$ext4(&(0x7f0000000480)='ext3\x00', 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f00000007c0)={[], [{@fscontext={'fscontext', 0x3d, 'sysadm_u'}}, {@defcontext={'defcontext', 0x3d, 'staff_u'}}], 0x22}) 10:10:55 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000040)={0x2, &(0x7f0000000000)=[{0x15}, {0x0, 0x9}]}) 10:10:55 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x0, &(0x7f0000000040)={0x2, &(0x7f0000000000)=[{0x15, 0x0, 0x2}, {}]}) 10:10:55 executing program 4: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000040)={0x2, &(0x7f0000000000)=[{0x25}, {0x9}]}) 10:10:55 executing program 5: syz_mount_image$ext4(&(0x7f0000000480)='ext3\x00', 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f00000007c0)={[], [{@fscontext={'fscontext', 0x3d, 'sysadm_u'}}, {@defcontext={'defcontext', 0x3d, 'staff_u'}}], 0x22}) 10:10:55 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000040)={0x2, &(0x7f0000000000)=[{0x15}, {0x0, 0x15}]}) 10:10:55 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext3\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000480)=ANY=[@ANYBLOB='lazytime,test_dummy_encryption,max_dir_si,e_kb=0x000000000200,grpjquota=,min_batch_time=0x00000000000003ff,rootcontext\a']) 10:10:55 executing program 2: syz_mount_image$ext4(&(0x7f0000000480)='ext3\x00', &(0x7f00000004c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000040)={[], [{@rootcontext={'rootcontext', 0x3d, 'root'}}]}) 10:10:55 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x0, &(0x7f0000000040)={0x2, &(0x7f0000000000)=[{0x15, 0x0, 0x2}, {}]}) 10:10:55 executing program 4: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000040)={0x2, &(0x7f0000000000)=[{0x25}, {0x15}]}) 10:10:55 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000040)={0x2, &(0x7f0000000000)=[{0x15}, {0x0, 0x16}]}) 10:10:55 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext3\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000480)=ANY=[@ANYBLOB='lazytime,test_dummy_encryption,max_dir_siz\"_kb=0x000000000200,grpjquota=,min_batch_time=0x00000000000003ff,rootcontext\a']) 10:10:55 executing program 5: syz_mount_image$ext4(&(0x7f0000000480)='ext3\x00', 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f00000007c0)={[], [{@fscontext={'fscontext', 0x3d, 'sysadm_u'}}, {@defcontext={'defcontext', 0x3d, 'staff_u'}}], 0x22}) 10:10:55 executing program 2: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000040)={0x2, &(0x7f0000000000)=[{0x25}, {0x6}]}) 10:10:55 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, 0x0) 10:10:55 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000040)={0x2, &(0x7f0000000000)=[{0x15}, {0x0, 0x1d}]}) 10:10:55 executing program 5: syz_mount_image$ext4(&(0x7f0000000480)='ext3\x00', &(0x7f00000004c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 10:10:55 executing program 4: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000040)={0x2, &(0x7f0000000000)=[{0x25}, {0x16}]}) 10:10:55 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext3\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000480)=ANY=[@ANYBLOB='lazytime,test_dummy_encryption,max_dir_siz,_kb=0x000000000200,grpjquota=,min_batch_time=0x00000000000003ff,rootcontext\a']) [ 1876.694192][ T22] audit: type=1326 audit(1633169455.724:636): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=22579 comm="syz-executor.2" exe="/root/syz-executor.2" sig=31 arch=c000003e syscall=202 compat=0 ip=0x7f1b9d2cd8d9 code=0x0 10:10:55 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000040)={0x2, &(0x7f0000000000)=[{0x15}, {0x0, 0x25}]}) 10:10:55 executing program 2: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000040)={0x2, &(0x7f0000000000)=[{0x25}, {0x6}]}) 10:10:55 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, 0x0) 10:10:55 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext3\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000480)=ANY=[@ANYBLOB='lazytime,test_dummy_encryption,max_dir_size\"kb=0x000000000200,grpjquota=,min_batch_time=0x00000000000003ff,rootcontext\a']) 10:10:55 executing program 5: syz_mount_image$ext4(&(0x7f0000000480)='ext3\x00', &(0x7f00000004c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) [ 1876.780149][ T22] audit: type=1326 audit(1633169455.784:637): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=22590 comm="syz-executor.4" exe="/root/syz-executor.4" sig=31 arch=c000003e syscall=202 compat=0 ip=0x7f9dee22a8d9 code=0x0 10:10:55 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000040)={0x2, &(0x7f0000000000)=[{0x15}, {0x0, 0x28}]}) 10:10:55 executing program 2: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000040)={0x2, &(0x7f0000000000)=[{0x25}, {0x6}]}) 10:10:55 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext3\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000480)=ANY=[@ANYBLOB='lazytime,test_dummy_encryption,max_dir_size,kb=0x000000000200,grpjquota=,min_batch_time=0x00000000000003ff,rootcontext\a']) 10:10:55 executing program 4: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000040)={0x2, &(0x7f0000000000)=[{0x25}, {0x1d}]}) 10:10:55 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, 0x0) 10:10:55 executing program 5: syz_mount_image$ext4(&(0x7f0000000480)='ext3\x00', &(0x7f00000004c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) [ 1876.897911][ T22] audit: type=1326 audit(1633169455.874:638): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=22601 comm="syz-executor.2" exe="/root/syz-executor.2" sig=31 arch=c000003e syscall=202 compat=0 ip=0x7f1b9d2cd8d9 code=0x0 10:10:56 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000040)={0x2, &(0x7f0000000000)=[{0x15}, {0x0, 0x2d}]}) 10:10:56 executing program 4: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000040)={0x2, &(0x7f0000000000)=[{0x25}, {0x25}]}) 10:10:56 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext3\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000480)=ANY=[@ANYBLOB='lazytime,test_dummy_encryption,max_dir_size_\"b=0x000000000200,grpjquota=,min_batch_time=0x00000000000003ff,rootcontext\a']) 10:10:56 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000040)={0x0, 0x0}) 10:10:56 executing program 2: prctl$PR_SET_SECCOMP(0x16, 0x0, &(0x7f0000000040)={0x2, &(0x7f0000000000)=[{0x25}, {0x6}]}) [ 1877.029462][ T22] audit: type=1326 audit(1633169456.024:639): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=22620 comm="syz-executor.2" exe="/root/syz-executor.2" sig=31 arch=c000003e syscall=202 compat=0 ip=0x7f1b9d2cd8d9 code=0x0 10:10:56 executing program 4: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000040)={0x2, &(0x7f0000000000)=[{0x25}, {0x28}]}) 10:10:56 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext3\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000480)=ANY=[@ANYBLOB='lazytime,test_dummy_encryption,max_dir_size_,b=0x000000000200,grpjquota=,min_batch_time=0x00000000000003ff,rootcontext\a']) 10:10:56 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000040)={0x2, &(0x7f0000000000)=[{0x15}, {0x0, 0x30}]}) 10:10:56 executing program 5: syz_mount_image$ext4(&(0x7f0000000480)='ext3\x00', &(0x7f00000004c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000007c0)={[], [{@fscontext={'fscontext', 0x3d, 'sysadm_u'}}], 0x22}) 10:10:56 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000040)={0x0, 0x0}) 10:10:56 executing program 2: prctl$PR_SET_SECCOMP(0x16, 0x0, &(0x7f0000000040)={0x2, &(0x7f0000000000)=[{0x25}, {0x6}]}) 10:10:56 executing program 4: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000040)={0x2, &(0x7f0000000000)=[{0x25}, {0x29}]}) 10:10:56 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000040)={0x2, &(0x7f0000000000)=[{0x15}, {0x0, 0x34}]}) 10:10:56 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext3\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000480)=ANY=[@ANYBLOB='lazytime,test_dummy_encryption,max_dir_size_k\"=0x000000000200,grpjquota=,min_batch_time=0x00000000000003ff,rootcontext\a']) 10:10:56 executing program 5: syz_mount_image$ext4(&(0x7f0000000480)='ext3\x00', &(0x7f00000004c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000007c0)={[], [], 0x22}) 10:10:56 executing program 2: prctl$PR_SET_SECCOMP(0x16, 0x0, &(0x7f0000000040)={0x2, &(0x7f0000000000)=[{0x25}, {0x6}]}) 10:10:56 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext3\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000480)=ANY=[@ANYBLOB='lazytime,test_dummy_encryption,max_dir_size_k,=0x000000000200,grpjquota=,min_batch_time=0x00000000000003ff,rootcontext\a']) 10:10:56 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000040)={0x2, &(0x7f0000000000)=[{0x15}, {0x0, 0x35}]}) 10:10:56 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000040)={0x0, 0x0}) 10:10:56 executing program 4: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000040)={0x2, &(0x7f0000000000)=[{0x25}, {0x2d}]}) 10:10:56 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext3\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000480)=ANY=[@ANYBLOB='lazytime,test_dummy_encryption,max_dir_size_kb\"0x000000000200,grpjquota=,min_batch_time=0x00000000000003ff,rootcontext\a']) 10:10:56 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000040)={0x1, &(0x7f0000000000)=[{0x15, 0x0, 0x2}]}) 10:10:56 executing program 5: syz_mount_image$ext4(&(0x7f0000000480)='ext3\x00', &(0x7f00000004c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000007c0)={[], [], 0x22}) 10:10:56 executing program 2: prctl$PR_SET_SECCOMP(0x16, 0x2, 0x0) 10:10:56 executing program 4: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000040)={0x2, &(0x7f0000000000)=[{0x25}, {0x30}]}) 10:10:56 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000040)={0x2, &(0x7f0000000000)=[{0x15}, {0x0, 0x3d}]}) 10:10:56 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000040)={0x1, &(0x7f0000000000)=[{0x15, 0x0, 0x2}]}) 10:10:56 executing program 4: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000040)={0x2, &(0x7f0000000000)=[{0x25}, {0x34}]}) 10:10:56 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext3\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000480)=ANY=[@ANYBLOB='lazytime,test_dummy_encryption,max_dir_size_kb,0x000000000200,grpjquota=,min_batch_time=0x00000000000003ff,rootcontext\a']) 10:10:56 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000040)={0x2, &(0x7f0000000000)=[{0x15}, {0x0, 0x45}]}) 10:10:56 executing program 5: syz_mount_image$ext4(&(0x7f0000000480)='ext3\x00', &(0x7f00000004c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000007c0)={[], [], 0x22}) 10:10:56 executing program 2: prctl$PR_SET_SECCOMP(0x16, 0x2, 0x0) 10:10:56 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000040)={0x1, &(0x7f0000000000)=[{0x15, 0x0, 0x2}]}) 10:10:56 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext3\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000480)=ANY=[@ANYBLOB='lazytime,test_dummy_encryption,max_dir_size_kb=\"x000000000200,grpjquota=,min_batch_time=0x00000000000003ff,rootcontext\a']) 10:10:56 executing program 4: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000040)={0x2, &(0x7f0000000000)=[{0x25}, {0x35}]}) 10:10:56 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000040)={0x2, &(0x7f0000000000)=[{0x15}, {0x0, 0x4d}]}) 10:10:56 executing program 2: prctl$PR_SET_SECCOMP(0x16, 0x2, 0x0) 10:10:56 executing program 5: syz_mount_image$ext4(&(0x7f0000000480)='ext3\x00', &(0x7f00000004c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000007c0)={[], [], 0x22}) 10:10:56 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000040)={0x1, &(0x7f0000000000)=[{}]}) 10:10:56 executing program 4: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000040)={0x2, &(0x7f0000000000)=[{0x25}, {0x3d}]}) 10:10:56 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext3\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000480)=ANY=[@ANYBLOB='lazytime,test_dummy_encryption,max_dir_size_kb=,x000000000200,grpjquota=,min_batch_time=0x00000000000003ff,rootcontext\a']) 10:10:56 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000040)={0x2, &(0x7f0000000000)=[{0x15}, {0x0, 0x60}]}) 10:10:56 executing program 2: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000040)={0x0, 0x0}) 10:10:56 executing program 4: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000040)={0x2, &(0x7f0000000000)=[{0x25}, {0x45}]}) 10:10:56 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext3\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000480)=ANY=[@ANYBLOB='lazytime,test_dummy_encryption,max_dir_size_kb=0\"000000000200,grpjquota=,min_batch_time=0x00000000000003ff,rootcontext\a']) 10:10:56 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000040)={0x2, &(0x7f0000000000)=[{0x15}, {0x0, 0x61}]}) 10:10:56 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000040)={0x1, &(0x7f0000000000)=[{}]}) 10:10:56 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000040)={0x2, &(0x7f0000000000)=[{0x15}, {0x0, 0x64}]}) 10:10:56 executing program 5: syz_mount_image$ext4(&(0x7f0000000480)='ext3\x00', &(0x7f00000004c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000007c0)={[], [], 0x22}) 10:10:56 executing program 2: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000040)={0x0, 0x0}) 10:10:56 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext3\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000480)=ANY=[@ANYBLOB='lazytime,test_dummy_encryption,max_dir_size_kb=0,000000000200,grpjquota=,min_batch_time=0x00000000000003ff,rootcontext\a']) 10:10:56 executing program 4: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000040)={0x2, &(0x7f0000000000)=[{0x25}, {0x4d}]}) 10:10:57 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000040)={0x1, &(0x7f0000000000)=[{}]}) 10:10:57 executing program 4: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000040)={0x2, &(0x7f0000000000)=[{0x25}, {0x60}]}) 10:10:57 executing program 2: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000040)={0x0, 0x0}) 10:10:57 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext3\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000480)=ANY=[@ANYBLOB='lazytime,test_dummy_encryption,max_dir_size_kb=0x\"00000000200,grpjquota=,min_batch_time=0x00000000000003ff,rootcontext\a']) 10:10:57 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000040)={0x2, &(0x7f0000000000)=[{0x15}, {0x0, 0x74}]}) 10:10:57 executing program 5: syz_mount_image$ext4(&(0x7f0000000480)='ext3\x00', &(0x7f00000004c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000007c0)={[], [], 0x22}) 10:10:57 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000040)={0x2, &(0x7f0000000000)=[{0x0, 0x0, 0x2}, {}]}) 10:10:57 executing program 2: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000040)={0x1, &(0x7f0000000000)=[{0x25}]}) 10:10:57 executing program 4: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000040)={0x2, &(0x7f0000000000)=[{0x25}, {0x61}]}) 10:10:57 executing program 5: syz_mount_image$ext4(0x0, &(0x7f00000004c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000007c0)={[], [], 0x22}) 10:10:57 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000040)={0x2, &(0x7f0000000000)=[{0x0, 0x0, 0x2}, {}]}) 10:10:57 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext3\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000480)=ANY=[@ANYBLOB='lazytime,test_dummy_encryption,max_dir_size_kb=0x,00000000200,grpjquota=,min_batch_time=0x00000000000003ff,rootcontext\a']) 10:10:57 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000040)={0x2, &(0x7f0000000000)=[{0x15}, {0x0, 0x94}]}) 10:10:57 executing program 2: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000040)={0x1, &(0x7f0000000000)=[{0x25}]}) 10:10:57 executing program 4: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000040)={0x2, &(0x7f0000000000)=[{0x25}, {0x64}]}) 10:10:57 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000040)={0x2, &(0x7f0000000000)=[{0x0, 0x0, 0x2}, {}]}) 10:10:57 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext3\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000480)=ANY=[@ANYBLOB='lazytime,test_dummy_encryption,max_dir_size_kb=0x0\"0000000200,grpjquota=,min_batch_time=0x00000000000003ff,rootcontext\a']) 10:10:57 executing program 5: syz_mount_image$ext4(0x0, &(0x7f00000004c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000007c0)={[], [], 0x22}) 10:10:57 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000040)={0x2, &(0x7f0000000000)=[{0x15}, {0x0, 0xb1}]}) 10:10:57 executing program 2: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000040)={0x1, &(0x7f0000000000)=[{0x25}]}) 10:10:57 executing program 4: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000040)={0x2, &(0x7f0000000000)=[{0x25}, {0x74}]}) 10:10:57 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000040)={0x2, &(0x7f0000000000)=[{0x15}, {}]}) 10:10:57 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000040)={0x2, &(0x7f0000000000)=[{0x15}, {}]}) 10:10:57 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext3\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000480)=ANY=[@ANYBLOB='lazytime,test_dummy_encryption,max_dir_size_kb=0x0,0000000200,grpjquota=,min_batch_time=0x00000000000003ff,rootcontext\a']) 10:10:57 executing program 5: syz_mount_image$ext4(0x0, &(0x7f00000004c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000007c0)={[], [], 0x22}) 10:10:57 executing program 4: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000040)={0x2, &(0x7f0000000000)=[{0x25}, {0x94}]}) 10:10:57 executing program 2: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000040)={0x2, &(0x7f0000000000)=[{0x25}, {}]}) 10:10:57 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext3\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000480)=ANY=[@ANYBLOB='lazytime,test_dummy_encryption,max_dir_size_kb=0x00\"000000200,grpjquota=,min_batch_time=0x00000000000003ff,rootcontext\a']) 10:10:57 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000040)={0x2, &(0x7f0000000000)=[{0x15}, {}]}) 10:10:57 executing program 5: syz_mount_image$ext4(&(0x7f0000000480)='ext3\x00', 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f00000007c0)={[], [], 0x22}) 10:10:57 executing program 4: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000040)={0x2, &(0x7f0000000000)=[{0x25}, {0xb1}]}) 10:10:57 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000040)={0x2, &(0x7f0000000000)=[{0x15}, {0x0, 0x0, 0x2}]}) 10:10:57 executing program 2: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000040)={0x2, &(0x7f0000000000)=[{0x25}, {}]}) 10:10:57 executing program 5: syz_mount_image$ext4(&(0x7f0000000480)='ext3\x00', 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f00000007c0)={[], [], 0x22}) 10:10:57 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000040)={0x2, &(0x7f0000000000)=[{0x15}, {}]}) 10:10:57 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext3\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000480)=ANY=[@ANYBLOB='lazytime,test_dummy_encryption,max_dir_size_kb=0x00,000000200,grpjquota=,min_batch_time=0x00000000000003ff,rootcontext\a']) 10:10:57 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000040)={0x2, &(0x7f0000000000)=[{0x15}, {0x0, 0x0, 0x3}]}) 10:10:57 executing program 4: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000040)={0x2, &(0x7f0000000000)=[{0x25}, {0x300}]}) 10:10:57 executing program 2: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000040)={0x2, &(0x7f0000000000)=[{0x25}, {}]}) 10:10:57 executing program 1: syz_mount_image$ext4(&(0x7f0000000480)='ext3\x00', &(0x7f00000004c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000007c0)={[], [{@fscontext={'fscontext', 0x3d, 'sysadm_u'}}, {@defcontext={'defcontext', 0x3d, 'staff_u'}, 0x22}]}) 10:10:57 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000040)={0x2, &(0x7f0000000000)=[{0x15}, {0x0, 0x0, 0x5}]}) 10:10:57 executing program 4: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000040)={0x2, &(0x7f0000000000)=[{0x25}, {0x500}]}) 10:10:57 executing program 5: syz_mount_image$ext4(&(0x7f0000000480)='ext3\x00', 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f00000007c0)={[], [], 0x22}) 10:10:57 executing program 1: syz_mount_image$ext4(&(0x7f0000000480)='ext3\x00', &(0x7f00000004c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000007c0)={[], [{@fscontext={'fscontext', 0x3d, 'sysadm_u'}}, {@defcontext={'defcontext', 0x3d, 'staff_u'}, 0x22}]}) 10:10:57 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext3\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000480)=ANY=[@ANYBLOB='lazytime,test_dummy_encryption,max_dir_size_kb=0x000\"00000200,grpjquota=,min_batch_time=0x00000000000003ff,rootcontext\a']) 10:10:57 executing program 2: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000040)={0x1, &(0x7f0000000000)=[{0x6}]}) 10:10:57 executing program 5: syz_mount_image$ext4(&(0x7f0000000480)='ext3\x00', &(0x7f00000004c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 10:10:57 executing program 4: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000040)={0x2, &(0x7f0000000000)=[{0x25}, {0x600}]}) 10:10:57 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000040)={0x2, &(0x7f0000000000)=[{0x15}, {0x0, 0x0, 0x6}]}) 10:10:57 executing program 2: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000040)={0x1, &(0x7f0000000000)=[{0x6}]}) 10:10:57 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext3\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000480)=ANY=[@ANYBLOB='lazytime,test_dummy_encryption,max_dir_size_kb=0x000,00000200,grpjquota=,min_batch_time=0x00000000000003ff,rootcontext\a']) [ 1878.682008][ T22] audit: type=1326 audit(1633169457.704:640): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=22903 comm="syz-executor.2" exe="/root/syz-executor.2" sig=31 arch=c000003e syscall=202 compat=0 ip=0x7f1b9d2cd8d9 code=0x0 10:10:57 executing program 1: syz_mount_image$ext4(&(0x7f0000000480)='ext3\x00', &(0x7f00000004c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000007c0)={[], [{@fscontext={'fscontext', 0x3d, 'sysadm_u'}}, {@defcontext={'defcontext', 0x3d, 'staff_u'}, 0x22}]}) 10:10:57 executing program 4: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000040)={0x2, &(0x7f0000000000)=[{0x25}, {0x700}]}) 10:10:57 executing program 5: syz_mount_image$ext4(&(0x7f0000000480)='ext3\x00', &(0x7f00000004c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 10:10:57 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000040)={0x2, &(0x7f0000000000)=[{0x15}, {0x0, 0x0, 0x7}]}) 10:10:57 executing program 2: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000040)={0x1, &(0x7f0000000000)=[{0x6}]}) 10:10:57 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext3\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000480)=ANY=[@ANYBLOB='lazytime,test_dummy_encryption,max_dir_size_kb=0x0000\"0000200,grpjquota=,min_batch_time=0x00000000000003ff,rootcontext\a']) [ 1878.784128][ T22] audit: type=1326 audit(1633169457.794:641): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=22913 comm="syz-executor.2" exe="/root/syz-executor.2" sig=31 arch=c000003e syscall=202 compat=0 ip=0x7f1b9d2cd8d9 code=0x0 10:10:57 executing program 1: syz_mount_image$ext4(0x0, &(0x7f00000004c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000007c0)={[], [{@fscontext={'fscontext', 0x3d, 'sysadm_u'}}, {@defcontext={'defcontext', 0x3d, 'staff_u'}, 0x22}]}) 10:10:57 executing program 4: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000040)={0x2, &(0x7f0000000000)=[{0x25}, {0x900}]}) 10:10:57 executing program 5: syz_mount_image$ext4(&(0x7f0000000480)='ext3\x00', &(0x7f00000004c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 10:10:57 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000040)={0x2, &(0x7f0000000000)=[{0x15}, {0x0, 0x0, 0x9}]}) 10:10:57 executing program 1: syz_mount_image$ext4(0x0, &(0x7f00000004c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000007c0)={[], [{@fscontext={'fscontext', 0x3d, 'sysadm_u'}}, {@defcontext={'defcontext', 0x3d, 'staff_u'}, 0x22}]}) 10:10:57 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext3\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000480)=ANY=[@ANYBLOB='lazytime,test_dummy_encryption,max_dir_size_kb=0x0000,0000200,grpjquota=,min_batch_time=0x00000000000003ff,rootcontext\a']) [ 1878.913339][ T22] audit: type=1326 audit(1633169457.924:642): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=22932 comm="syz-executor.2" exe="/root/syz-executor.2" sig=31 arch=c000003e syscall=202 compat=0 ip=0x7f1b9d2cd8d9 code=0x0 10:10:58 executing program 4: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000040)={0x2, &(0x7f0000000000)=[{0x25}, {0x1500}]}) 10:10:58 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000040)={0x2, &(0x7f0000000000)=[{0x15}, {0x0, 0x0, 0x15}]}) 10:10:58 executing program 1: syz_mount_image$ext4(0x0, &(0x7f00000004c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000007c0)={[], [{@fscontext={'fscontext', 0x3d, 'sysadm_u'}}, {@defcontext={'defcontext', 0x3d, 'staff_u'}, 0x22}]}) 10:10:58 executing program 2: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000040)={0x2, &(0x7f0000000000)=[{}, {0x6}]}) 10:10:58 executing program 5: syz_mount_image$ext4(&(0x7f0000000480)='ext3\x00', &(0x7f00000004c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000007c0)={[], [{@fscontext={'fscontext', 0x3d, 'sysadm_u'}}, {@defcontext={'defcontext', 0x2c, 'staff_u'}}]}) 10:10:58 executing program 4: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000040)={0x2, &(0x7f0000000000)=[{0x25}, {0x1600}]}) 10:10:58 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000040)={0x2, &(0x7f0000000000)=[{0x15}, {0x0, 0x0, 0x16}]}) 10:10:58 executing program 2: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000040)={0x2, &(0x7f0000000000)=[{}, {0x6}]}) 10:10:58 executing program 1: syz_mount_image$ext4(&(0x7f0000000480)='ext3\x00', 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f00000007c0)={[], [{@fscontext={'fscontext', 0x3d, 'sysadm_u'}}, {@defcontext={'defcontext', 0x3d, 'staff_u'}, 0x22}]}) [ 1879.025171][ T22] audit: type=1326 audit(1633169458.043:643): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=22956 comm="syz-executor.2" exe="/root/syz-executor.2" sig=31 arch=c000003e syscall=202 compat=0 ip=0x7f1b9d2cd8d9 code=0x0 10:10:58 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext3\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000480)=ANY=[@ANYBLOB='lazytime,test_dummy_encryption,max_dir_size_kb=0x00000\"000200,grpjquota=,min_batch_time=0x00000000000003ff,rootcontext\a']) 10:10:58 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000040)={0x2, &(0x7f0000000000)=[{0x15}, {0x0, 0x0, 0x1d}]}) 10:10:58 executing program 4: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000040)={0x2, &(0x7f0000000000)=[{0x25}, {0x1d00}]}) 10:10:58 executing program 1: syz_mount_image$ext4(&(0x7f0000000480)='ext3\x00', 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f00000007c0)={[], [{@fscontext={'fscontext', 0x3d, 'sysadm_u'}}, {@defcontext={'defcontext', 0x3d, 'staff_u'}, 0x22}]}) 10:10:58 executing program 5: syz_mount_image$ext4(&(0x7f0000000480)='ext3\x00', &(0x7f00000004c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000007c0)={[], [{@fscontext={'fscontext', 0x3d, 'sysadm_u'}}, {@defcontext={'defcontext', 0x2c, 'staff_u'}}]}) 10:10:58 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext3\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000480)=ANY=[@ANYBLOB='lazytime,test_dummy_encryption,max_dir_size_kb=0x00000,000200,grpjquota=,min_batch_time=0x00000000000003ff,rootcontext\a']) 10:10:58 executing program 2: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000040)={0x2, &(0x7f0000000000)=[{}, {0x6}]}) [ 1879.152803][ T22] audit: type=1326 audit(1633169458.153:644): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=22969 comm="syz-executor.2" exe="/root/syz-executor.2" sig=31 arch=c000003e syscall=202 compat=0 ip=0x7f1b9d2cd8d9 code=0x0 10:10:58 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000040)={0x2, &(0x7f0000000000)=[{0x15}, {0x0, 0x0, 0x25}]}) 10:10:58 executing program 1: syz_mount_image$ext4(&(0x7f0000000480)='ext3\x00', 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f00000007c0)={[], [{@fscontext={'fscontext', 0x3d, 'sysadm_u'}}, {@defcontext={'defcontext', 0x3d, 'staff_u'}, 0x22}]}) 10:10:58 executing program 4: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000040)={0x2, &(0x7f0000000000)=[{0x25}, {0x2000}]}) 10:10:58 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext3\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000480)=ANY=[@ANYBLOB='lazytime,test_dummy_encryption,max_dir_size_kb=0x000000\"00200,grpjquota=,min_batch_time=0x00000000000003ff,rootcontext\a']) 10:10:58 executing program 5: syz_mount_image$ext4(&(0x7f0000000480)='ext3\x00', &(0x7f00000004c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000007c0)={[], [{@fscontext={'fscontext', 0x3d, 'sysadm_u'}}, {@defcontext={'defcontext', 0x2c, 'staff_u'}}]}) 10:10:58 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000040)={0x2, &(0x7f0000000000)=[{0x15}, {0x0, 0x0, 0x28}]}) 10:10:58 executing program 2: syz_mount_image$ext4(&(0x7f0000000480)='ext3\x00', &(0x7f00000004c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000007c0)={[], [{@fscontext={'fscontext', 0x3d, 'sysadm_u'}}, {@defcontext={'defcontext', 0x22, 'staff_u'}}]}) 10:10:58 executing program 4: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000040)={0x2, &(0x7f0000000000)=[{0x25}, {0x2500}]}) 10:10:58 executing program 1: syz_mount_image$ext4(&(0x7f0000000480)='ext3\x00', &(0x7f00000004c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 10:10:58 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000040)={0x2, &(0x7f0000000000)=[{0x15}, {0x0, 0x0, 0x2d}]}) 10:10:58 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext3\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000480)=ANY=[@ANYBLOB='lazytime,test_dummy_encryption,max_dir_size_kb=0x000000,00200,grpjquota=,min_batch_time=0x00000000000003ff,rootcontext\a']) 10:10:58 executing program 5: syz_mount_image$ext4(0x0, &(0x7f00000004c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000007c0)={[], [{@fscontext={'fscontext', 0x3d, 'sysadm_u'}}, {@defcontext={'defcontext', 0x2c, 'staff_u'}}]}) 10:10:58 executing program 2: syz_mount_image$ext4(&(0x7f0000000480)='ext3\x00', &(0x7f00000004c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000007c0)={[], [{@fscontext={'fscontext', 0x3d, 'sysadm_u'}}, {@defcontext={'defcontext', 0x22, 'staff_u'}}]}) 10:10:58 executing program 1: syz_mount_image$ext4(&(0x7f0000000480)='ext3\x00', &(0x7f00000004c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 10:10:58 executing program 4: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000040)={0x2, &(0x7f0000000000)=[{0x25}, {0x2800}]}) 10:10:58 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000040)={0x2, &(0x7f0000000000)=[{0x15}, {0x0, 0x0, 0x30}]}) 10:10:58 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext3\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000480)=ANY=[@ANYBLOB='lazytime,test_dummy_encryption,max_dir_size_kb=0x0000000\"0200,grpjquota=,min_batch_time=0x00000000000003ff,rootcontext\a']) 10:10:58 executing program 5: syz_mount_image$ext4(0x0, &(0x7f00000004c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000007c0)={[], [{@fscontext={'fscontext', 0x3d, 'sysadm_u'}}, {@defcontext={'defcontext', 0x2c, 'staff_u'}}]}) 10:10:58 executing program 2: syz_mount_image$ext4(&(0x7f0000000480)='ext3\x00', &(0x7f00000004c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000007c0)={[], [{@fscontext={'fscontext', 0x3d, 'sysadm_u'}}, {@defcontext={'defcontext', 0x22, 'staff_u'}}]}) 10:10:58 executing program 4: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000040)={0x2, &(0x7f0000000000)=[{0x25}, {0x2900}]}) 10:10:58 executing program 1: syz_mount_image$ext4(&(0x7f0000000480)='ext3\x00', &(0x7f00000004c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 10:10:58 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000040)={0x2, &(0x7f0000000000)=[{0x15}, {0x0, 0x0, 0x34}]}) 10:10:58 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext3\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000480)=ANY=[@ANYBLOB='lazytime,test_dummy_encryption,max_dir_size_kb=0x0000000,0200,grpjquota=,min_batch_time=0x00000000000003ff,rootcontext\a']) 10:10:58 executing program 5: syz_mount_image$ext4(0x0, &(0x7f00000004c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000007c0)={[], [{@fscontext={'fscontext', 0x3d, 'sysadm_u'}}, {@defcontext={'defcontext', 0x2c, 'staff_u'}}]}) 10:10:58 executing program 2: syz_mount_image$ext4(0x0, &(0x7f00000004c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000007c0)={[], [{@fscontext={'fscontext', 0x3d, 'sysadm_u'}}, {@defcontext={'defcontext', 0x22, 'staff_u'}}]}) 10:10:58 executing program 4: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000040)={0x2, &(0x7f0000000000)=[{0x25}, {0x2d00}]}) 10:10:58 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000040)={0x2, &(0x7f0000000000)=[{0x15}, {0x0, 0x0, 0x35}]}) 10:10:58 executing program 1: syz_mount_image$ext4(&(0x7f0000000480)='ext3\x00', &(0x7f00000004c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000007c0)={[], [{@fscontext={'fscontext', 0x3d, 'sysadm_u'}}]}) 10:10:58 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext3\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000480)=ANY=[@ANYBLOB='lazytime,test_dummy_encryption,max_dir_size_kb=0x00000000\"200,grpjquota=,min_batch_time=0x00000000000003ff,rootcontext\a']) 10:10:58 executing program 5: syz_mount_image$ext4(&(0x7f0000000480)='ext3\x00', 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f00000007c0)={[], [{@fscontext={'fscontext', 0x3d, 'sysadm_u'}}, {@defcontext={'defcontext', 0x2c, 'staff_u'}}]}) 10:10:58 executing program 2: syz_mount_image$ext4(0x0, &(0x7f00000004c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000007c0)={[], [{@fscontext={'fscontext', 0x3d, 'sysadm_u'}}, {@defcontext={'defcontext', 0x22, 'staff_u'}}]}) 10:10:58 executing program 4: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000040)={0x2, &(0x7f0000000000)=[{0x25}, {0x3000}]}) 10:10:58 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000040)={0x2, &(0x7f0000000000)=[{0x15}, {0x0, 0x0, 0x3d}]}) 10:10:58 executing program 1: syz_mount_image$ext4(&(0x7f0000000480)='ext3\x00', &(0x7f00000004c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000007c0)={[], [{@fscontext={'fscontext', 0x3d, 'sysadm_u'}}]}) 10:10:58 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext3\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000480)=ANY=[@ANYBLOB='lazytime,test_dummy_encryption,max_dir_size_kb=0x00000000,200,grpjquota=,min_batch_time=0x00000000000003ff,rootcontext\a']) 10:10:58 executing program 5: syz_mount_image$ext4(&(0x7f0000000480)='ext3\x00', 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f00000007c0)={[], [{@fscontext={'fscontext', 0x3d, 'sysadm_u'}}, {@defcontext={'defcontext', 0x2c, 'staff_u'}}]}) 10:10:58 executing program 4: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000040)={0x2, &(0x7f0000000000)=[{0x25}, {0x3400}]}) 10:10:58 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000040)={0x2, &(0x7f0000000000)=[{0x15}, {0x0, 0x0, 0x45}]}) 10:10:58 executing program 2: syz_mount_image$ext4(0x0, &(0x7f00000004c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000007c0)={[], [{@fscontext={'fscontext', 0x3d, 'sysadm_u'}}, {@defcontext={'defcontext', 0x22, 'staff_u'}}]}) 10:10:58 executing program 1: syz_mount_image$ext4(&(0x7f0000000480)='ext3\x00', &(0x7f00000004c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000007c0)={[], [{@fscontext={'fscontext', 0x3d, 'sysadm_u'}}]}) 10:10:58 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext3\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000480)=ANY=[@ANYBLOB='lazytime,test_dummy_encryption,max_dir_size_kb=0x000000000\"00,grpjquota=,min_batch_time=0x00000000000003ff,rootcontext\a']) 10:10:58 executing program 5: syz_mount_image$ext4(&(0x7f0000000480)='ext3\x00', 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f00000007c0)={[], [{@fscontext={'fscontext', 0x3d, 'sysadm_u'}}, {@defcontext={'defcontext', 0x2c, 'staff_u'}}]}) 10:10:58 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000040)={0x2, &(0x7f0000000000)=[{0x15}, {0x0, 0x0, 0x4d}]}) 10:10:58 executing program 4: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000040)={0x2, &(0x7f0000000000)=[{0x25}, {0x3500}]}) 10:10:58 executing program 1: syz_mount_image$ext4(&(0x7f0000000480)='ext3\x00', &(0x7f00000004c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000007c0)={[], [{@defcontext={'defcontext', 0x3d, 'staff_u'}, 0x22}]}) 10:10:58 executing program 5: syz_mount_image$ext4(&(0x7f0000000480)='ext3\x00', &(0x7f00000004c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 10:10:58 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext3\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000480)=ANY=[@ANYBLOB='lazytime,test_dummy_encryption,max_dir_size_kb=0x000000000,00,grpjquota=,min_batch_time=0x00000000000003ff,rootcontext\a']) 10:10:59 executing program 2: syz_mount_image$ext4(&(0x7f0000000480)='ext3\x00', 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f00000007c0)={[], [{@fscontext={'fscontext', 0x3d, 'sysadm_u'}}, {@defcontext={'defcontext', 0x22, 'staff_u'}}]}) 10:10:59 executing program 1: r0 = syz_mount_image$ext4(0x0, &(0x7f0000000440)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) openat$dir(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x2b8a00, 0xcd) openat$dir(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x80000, 0x0) unlinkat(r0, &(0x7f0000000040)='./file0\x00', 0x0) 10:10:59 executing program 5: syz_mount_image$ext4(&(0x7f0000000480)='ext3\x00', &(0x7f00000004c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 10:10:59 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000040)={0x2, &(0x7f0000000000)=[{0x15}, {0x0, 0x0, 0x60}]}) 10:10:59 executing program 4: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000040)={0x2, &(0x7f0000000000)=[{0x25}, {0x3d00}]}) 10:10:59 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext3\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000480)=ANY=[@ANYBLOB='lazytime,test_dummy_encryption,max_dir_size_kb=0x0000000002\"0,grpjquota=,min_batch_time=0x00000000000003ff,rootcontext\a']) 10:10:59 executing program 2: syz_mount_image$ext4(&(0x7f0000000480)='ext3\x00', 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f00000007c0)={[], [{@fscontext={'fscontext', 0x3d, 'sysadm_u'}}, {@defcontext={'defcontext', 0x22, 'staff_u'}}]}) 10:10:59 executing program 5: syz_mount_image$ext4(&(0x7f0000000480)='ext3\x00', &(0x7f00000004c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 10:10:59 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000040)={0x2, &(0x7f0000000000)=[{0x15}, {0x0, 0x0, 0x61}]}) 10:10:59 executing program 1: r0 = syz_mount_image$ext4(0x0, &(0x7f0000000440)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) openat$dir(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x2b8a00, 0xcd) openat$dir(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x80000, 0x0) unlinkat(r0, &(0x7f0000000040)='./file0\x00', 0x0) 10:10:59 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext3\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000480)=ANY=[@ANYBLOB='lazytime,test_dummy_encryption,max_dir_size_kb=0x0000000002,0,grpjquota=,min_batch_time=0x00000000000003ff,rootcontext\a']) 10:10:59 executing program 4: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000040)={0x2, &(0x7f0000000000)=[{0x25}, {0x4500}]}) 10:10:59 executing program 5: syz_mount_image$ext4(&(0x7f0000000480)='ext3\x00', &(0x7f00000004c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000007c0)={[], [{@fscontext={'fscontext', 0x3d, 'sysadm_u'}}]}) 10:10:59 executing program 2: syz_mount_image$ext4(&(0x7f0000000480)='ext3\x00', 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f00000007c0)={[], [{@fscontext={'fscontext', 0x3d, 'sysadm_u'}}, {@defcontext={'defcontext', 0x22, 'staff_u'}}]}) 10:10:59 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext3\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000480)=ANY=[@ANYBLOB='lazytime,test_dummy_encryption,max_dir_size_kb=0x00000000020\",grpjquota=,min_batch_time=0x00000000000003ff,rootcontext\a']) 10:10:59 executing program 1: r0 = syz_mount_image$ext4(0x0, &(0x7f0000000440)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) openat$dir(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x2b8a00, 0xcd) openat$dir(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x80000, 0x0) unlinkat(r0, &(0x7f0000000040)='./file0\x00', 0x0) 10:10:59 executing program 4: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000040)={0x2, &(0x7f0000000000)=[{0x25}, {0x4d00}]}) 10:10:59 executing program 5: syz_mount_image$ext4(&(0x7f0000000480)='ext3\x00', &(0x7f00000004c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000007c0)={[], [{@fscontext={'fscontext', 0x3d, 'sysadm_u'}}]}) 10:10:59 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000040)={0x2, &(0x7f0000000000)=[{0x15}, {0x0, 0x0, 0x64}]}) 10:10:59 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext3\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000480)=ANY=[@ANYBLOB='lazytime,test_dummy_encryption,max_dir_size_kb=0x00000000020,,grpjquota=,min_batch_time=0x00000000000003ff,rootcontext\a']) 10:10:59 executing program 4: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000040)={0x2, &(0x7f0000000000)=[{0x25}, {0x6000}]}) 10:10:59 executing program 1: syz_mount_image$ext4(0x0, &(0x7f0000000440)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) openat$dir(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x2b8a00, 0xcd) openat$dir(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x80000, 0x0) 10:10:59 executing program 2: syz_mount_image$ext4(&(0x7f0000000480)='ext3\x00', &(0x7f00000004c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 10:10:59 executing program 5: syz_mount_image$ext4(&(0x7f0000000480)='ext3\x00', &(0x7f00000004c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000007c0)={[], [{@fscontext={'fscontext', 0x3d, 'sysadm_u'}}]}) 10:10:59 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000040)={0x2, &(0x7f0000000000)=[{0x15}, {0x0, 0x0, 0x74}]}) 10:10:59 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext3\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000480)=ANY=[@ANYBLOB='lazytime,test_dummy_encryption,max_dir_size_kb=0x000000000200\"grpjquota=,min_batch_time=0x00000000000003ff,rootcontext\a']) 10:10:59 executing program 4: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000040)={0x2, &(0x7f0000000000)=[{0x25}, {0x6100}]}) 10:10:59 executing program 2: syz_mount_image$ext4(&(0x7f0000000480)='ext3\x00', &(0x7f00000004c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 10:10:59 executing program 5: syz_mount_image$ext4(&(0x7f0000000480)='ext3\x00', &(0x7f00000004c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000007c0)={[], [{@defcontext={'defcontext', 0x2c, 'staff_u'}}]}) 10:10:59 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000040)={0x2, &(0x7f0000000000)=[{0x15}, {0x0, 0x0, 0x94}]}) 10:10:59 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext3\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000480)=ANY=[@ANYBLOB='lazytime,test_dummy_encryption,max_dir_size_kb=0x000000000200,\"rpjquota=,min_batch_time=0x00000000000003ff,rootcontext\a']) 10:10:59 executing program 1: syz_mount_image$ext4(0x0, &(0x7f0000000440)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) openat$dir(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x2b8a00, 0xcd) 10:10:59 executing program 4: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000040)={0x2, &(0x7f0000000000)=[{0x25}, {0x6400}]}) 10:10:59 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext3\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000480)=ANY=[@ANYBLOB='lazytime,test_dummy_encryption,max_dir_size_kb=0x000000000200,,rpjquota=,min_batch_time=0x00000000000003ff,rootcontext\a']) 10:10:59 executing program 1: openat$dir(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x2b8a00, 0xcd) 10:10:59 executing program 2: syz_mount_image$ext4(&(0x7f0000000480)='ext3\x00', &(0x7f00000004c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 10:10:59 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000040)={0x2, &(0x7f0000000000)=[{0x15}, {0x0, 0x0, 0xb1}]}) 10:10:59 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext3\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000480)=ANY=[@ANYBLOB='lazytime,test_dummy_encryption,max_dir_size_kb=0x000000000200,g\"pjquota=,min_batch_time=0x00000000000003ff,rootcontext\a']) 10:10:59 executing program 5: syz_mount_image$ext4(&(0x7f0000000480)='ext3\x00', &(0x7f00000004c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000007c0)={[], [{@defcontext={'defcontext', 0x2c, 'staff_u'}}]}) 10:10:59 executing program 4: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000040)={0x2, &(0x7f0000000000)=[{0x25}, {0x7400}]}) 10:10:59 executing program 1: openat$dir(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x2b8a00, 0xcd) 10:10:59 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000040)={0x2, &(0x7f0000000000)=[{0x15}, {}]}) 10:10:59 executing program 2: syz_mount_image$ext4(&(0x7f0000000480)='ext3\x00', &(0x7f00000004c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000007c0)={[], [{@fscontext={'fscontext', 0x3d, 'sysadm_u'}}]}) 10:10:59 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext3\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000480)=ANY=[@ANYBLOB='lazytime,test_dummy_encryption,max_dir_size_kb=0x000000000200,g,pjquota=,min_batch_time=0x00000000000003ff,rootcontext\a']) 10:10:59 executing program 5: syz_mount_image$ext4(&(0x7f0000000480)='ext3\x00', &(0x7f00000004c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000007c0)={[], [{@defcontext={'defcontext', 0x2c, 'staff_u'}}]}) 10:10:59 executing program 4: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000040)={0x2, &(0x7f0000000000)=[{0x25}, {0x9400}]}) 10:10:59 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000040)={0x2, &(0x7f0000000000)=[{0x15}, {0x0, 0x0, 0x0, 0x2}]}) 10:10:59 executing program 1: openat$dir(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x2b8a00, 0xcd) 10:10:59 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext3\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000480)=ANY=[@ANYBLOB='lazytime,test_dummy_encryption,max_dir_size_kb=0x000000000200,gr\"jquota=,min_batch_time=0x00000000000003ff,rootcontext\a']) 10:10:59 executing program 2: syz_mount_image$ext4(&(0x7f0000000480)='ext3\x00', &(0x7f00000004c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000007c0)={[], [{@fscontext={'fscontext', 0x3d, 'sysadm_u'}}]}) 10:10:59 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000040)={0x2, &(0x7f0000000000)=[{0x15}, {0x0, 0x0, 0x0, 0x3}]}) 10:10:59 executing program 5: syz_mount_image$ext4(&(0x7f0000000480)='ext3\x00', &(0x7f00000004c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000007c0)={[], [{@defcontext={'defcontext', 0x2c, 'staff_u'}}]}) 10:10:59 executing program 4: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000040)={0x2, &(0x7f0000000000)=[{0x25}, {0xb100}]}) 10:10:59 executing program 1: syz_mount_image$ext4(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) openat$dir(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x2b8a00, 0xcd) 10:10:59 executing program 2: syz_mount_image$ext4(&(0x7f0000000480)='ext3\x00', &(0x7f00000004c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000007c0)={[], [{@fscontext={'fscontext', 0x3d, 'sysadm_u'}}]}) 10:10:59 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000040)={0x2, &(0x7f0000000000)=[{0x15}, {0x0, 0x0, 0x0, 0x5}]}) 10:10:59 executing program 5: syz_mount_image$ext4(&(0x7f0000000480)='ext3\x00', &(0x7f00000004c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000007c0)={[], [{@defcontext={'defcontext', 0x2c, 'staff_u'}}]}) 10:10:59 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext3\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000480)=ANY=[@ANYBLOB='lazytime,test_dummy_encryption,max_dir_size_kb=0x000000000200,gr,jquota=,min_batch_time=0x00000000000003ff,rootcontext\a']) 10:10:59 executing program 4: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000040)={0x2, &(0x7f0000000000)=[{0x25}, {}]}) 10:10:59 executing program 1: syz_mount_image$ext4(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) openat$dir(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x2b8a00, 0xcd) 10:10:59 executing program 2: syz_mount_image$ext4(&(0x7f0000000480)='ext3\x00', &(0x7f00000004c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000007c0)={[], [{@defcontext={'defcontext', 0x22, 'staff_u'}}]}) 10:10:59 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000040)={0x2, &(0x7f0000000000)=[{0x15}, {0x0, 0x0, 0x0, 0x6}]}) 10:10:59 executing program 4: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000040)={0x2, &(0x7f0000000000)=[{0x25}, {0x0, 0x2}]}) 10:10:59 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext3\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000480)=ANY=[@ANYBLOB='lazytime,test_dummy_encryption,max_dir_size_kb=0x000000000200,grp\"quota=,min_batch_time=0x00000000000003ff,rootcontext\a']) 10:10:59 executing program 1: syz_mount_image$ext4(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) openat$dir(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x2b8a00, 0xcd) 10:11:00 executing program 5: syz_mount_image$ext4(&(0x7f0000000480)='ext3\x00', &(0x7f00000004c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000007c0)={[], [{@defcontext={'defcontext', 0x2c, 'staff_u'}}]}) 10:11:00 executing program 2: syz_mount_image$ext4(&(0x7f0000000480)='ext3\x00', &(0x7f00000004c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000007c0)={[], [{@fscontext={'fscontext', 0x3d, 'sysadm_u'}, 0x22}, {@defcontext={'defcontext', 0x3d, 'staff_u'}}]}) 10:11:00 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000040)={0x2, &(0x7f0000000000)=[{0x15}, {0x0, 0x0, 0x0, 0x7}]}) 10:11:00 executing program 4: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000040)={0x2, &(0x7f0000000000)=[{0x25}, {0x0, 0x3}]}) 10:11:00 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext3\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000480)=ANY=[@ANYBLOB='lazytime,test_dummy_encryption,max_dir_size_kb=0x000000000200,grp,quota=,min_batch_time=0x00000000000003ff,rootcontext\a']) 10:11:00 executing program 1: syz_mount_image$ext4(0x0, &(0x7f0000000440)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) openat$dir(0xffffffffffffff9c, 0x0, 0x2b8a00, 0xcd) 10:11:00 executing program 4: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000040)={0x2, &(0x7f0000000000)=[{0x25}, {0x0, 0x5}]}) 10:11:00 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000040)={0x2, &(0x7f0000000000)=[{0x15}, {0x0, 0x0, 0x0, 0x9}]}) 10:11:00 executing program 2: syz_mount_image$ext4(&(0x7f0000000480)='ext3\x00', &(0x7f00000004c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000007c0)={[], [{@fscontext={'fscontext', 0x3d, 'sysadm_u'}, 0x22}, {@defcontext={'defcontext', 0x3d, 'staff_u'}}]}) 10:11:00 executing program 5: syz_mount_image$ext4(0x0, &(0x7f00000004c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000007c0)={[], [{@defcontext={'defcontext', 0x2c, 'staff_u'}}]}) 10:11:00 executing program 4: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000040)={0x2, &(0x7f0000000000)=[{0x25}, {0x0, 0x6}]}) 10:11:00 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext3\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000480)=ANY=[@ANYBLOB='lazytime,test_dummy_encryption,max_dir_size_kb=0x000000000200,grpj\"uota=,min_batch_time=0x00000000000003ff,rootcontext\a']) 10:11:00 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000040)={0x2, &(0x7f0000000000)=[{0x15}, {0x0, 0x0, 0x0, 0x15}]}) 10:11:00 executing program 1: syz_mount_image$ext4(0x0, &(0x7f0000000440)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) openat$dir(0xffffffffffffff9c, 0x0, 0x2b8a00, 0xcd) 10:11:00 executing program 2: syz_mount_image$ext4(&(0x7f0000000480)='ext3\x00', &(0x7f00000004c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000007c0)={[], [{@fscontext={'fscontext', 0x3d, 'sysadm_u'}, 0x22}, {@defcontext={'defcontext', 0x3d, 'staff_u'}}]}) 10:11:00 executing program 5: syz_mount_image$ext4(0x0, &(0x7f00000004c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000007c0)={[], [{@defcontext={'defcontext', 0x2c, 'staff_u'}}]}) 10:11:00 executing program 4: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000040)={0x2, &(0x7f0000000000)=[{0x25}, {0x0, 0x7}]}) 10:11:00 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000040)={0x2, &(0x7f0000000000)=[{0x15}, {0x0, 0x0, 0x0, 0x16}]}) 10:11:00 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext3\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000480)=ANY=[@ANYBLOB='lazytime,test_dummy_encryption,max_dir_size_kb=0x000000000200,grpj,uota=,min_batch_time=0x00000000000003ff,rootcontext\a']) 10:11:00 executing program 1: syz_mount_image$ext4(0x0, &(0x7f0000000440)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) openat$dir(0xffffffffffffff9c, 0x0, 0x2b8a00, 0xcd) 10:11:00 executing program 2: syz_mount_image$ext4(0x0, &(0x7f00000004c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000007c0)={[], [{@fscontext={'fscontext', 0x3d, 'sysadm_u'}, 0x22}, {@defcontext={'defcontext', 0x3d, 'staff_u'}}]}) 10:11:00 executing program 4: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000040)={0x2, &(0x7f0000000000)=[{0x25}, {0x0, 0x9}]}) 10:11:00 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000040)={0x2, &(0x7f0000000000)=[{0x15}, {0x0, 0x0, 0x0, 0x1d}]}) 10:11:00 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext3\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000480)=ANY=[@ANYBLOB='lazytime,test_dummy_encryption,max_dir_size_kb=0x000000000200,grpjq\"ota=,min_batch_time=0x00000000000003ff,rootcontext\a']) 10:11:00 executing program 5: syz_mount_image$ext4(0x0, &(0x7f00000004c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000007c0)={[], [{@defcontext={'defcontext', 0x2c, 'staff_u'}}]}) 10:11:00 executing program 1: syz_mount_image$ext4(0x0, &(0x7f0000000440)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) openat$dir(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x0, 0xcd) 10:11:00 executing program 2: syz_mount_image$ext4(0x0, &(0x7f00000004c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000007c0)={[], [{@fscontext={'fscontext', 0x3d, 'sysadm_u'}, 0x22}, {@defcontext={'defcontext', 0x3d, 'staff_u'}}]}) 10:11:00 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000040)={0x2, &(0x7f0000000000)=[{0x15}, {0x0, 0x0, 0x0, 0x25}]}) 10:11:00 executing program 4: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000040)={0x2, &(0x7f0000000000)=[{0x25}, {0x0, 0x15}]}) 10:11:00 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext3\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000480)=ANY=[@ANYBLOB='lazytime,test_dummy_encryption,max_dir_size_kb=0x000000000200,grpjq,ota=,min_batch_time=0x00000000000003ff,rootcontext\a']) 10:11:00 executing program 5: syz_mount_image$ext4(&(0x7f0000000480)='ext3\x00', 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f00000007c0)={[], [{@defcontext={'defcontext', 0x2c, 'staff_u'}}]}) 10:11:00 executing program 1: syz_mount_image$ext4(0x0, &(0x7f0000000440)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) openat$dir(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x0, 0xcd) 10:11:00 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000040)={0x2, &(0x7f0000000000)=[{0x15}, {0x0, 0x0, 0x0, 0x28}]}) 10:11:00 executing program 4: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000040)={0x2, &(0x7f0000000000)=[{0x25}, {0x0, 0x16}]}) 10:11:00 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext3\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000480)=ANY=[@ANYBLOB='lazytime,test_dummy_encryption,max_dir_size_kb=0x000000000200,grpjqu\"ta=,min_batch_time=0x00000000000003ff,rootcontext\a']) 10:11:00 executing program 2: syz_mount_image$ext4(0x0, &(0x7f00000004c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000007c0)={[], [{@fscontext={'fscontext', 0x3d, 'sysadm_u'}, 0x22}, {@defcontext={'defcontext', 0x3d, 'staff_u'}}]}) 10:11:00 executing program 5: syz_mount_image$ext4(&(0x7f0000000480)='ext3\x00', 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f00000007c0)={[], [{@defcontext={'defcontext', 0x2c, 'staff_u'}}]}) 10:11:00 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000040)={0x2, &(0x7f0000000000)=[{0x15}, {0x0, 0x0, 0x0, 0x2d}]}) 10:11:00 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext3\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000480)=ANY=[@ANYBLOB='lazytime,test_dummy_encryption,max_dir_size_kb=0x000000000200,grpjqu,ta=,min_batch_time=0x00000000000003ff,rootcontext\a']) 10:11:00 executing program 4: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000040)={0x2, &(0x7f0000000000)=[{0x25}, {0x0, 0x1d}]}) 10:11:00 executing program 5: syz_mount_image$ext4(&(0x7f0000000480)='ext3\x00', 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f00000007c0)={[], [{@defcontext={'defcontext', 0x2c, 'staff_u'}}]}) 10:11:00 executing program 1: syz_mount_image$ext4(0x0, &(0x7f0000000440)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) openat$dir(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x0, 0xcd) 10:11:00 executing program 2: syz_mount_image$ext4(&(0x7f0000000480)='ext3\x00', 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f00000007c0)={[], [{@fscontext={'fscontext', 0x3d, 'sysadm_u'}, 0x22}, {@defcontext={'defcontext', 0x3d, 'staff_u'}}]}) 10:11:00 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext3\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000480)=ANY=[@ANYBLOB='lazytime,test_dummy_encryption,max_dir_size_kb=0x000000000200,grpjquo\"a=,min_batch_time=0x00000000000003ff,rootcontext\a']) 10:11:00 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000040)={0x2, &(0x7f0000000000)=[{0x15}, {0x0, 0x0, 0x0, 0x30}]}) 10:11:00 executing program 4: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000040)={0x2, &(0x7f0000000000)=[{0x25}, {0x0, 0x25}]}) 10:11:00 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext3\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000480)=ANY=[@ANYBLOB='lazytime,test_dummy_encryption,max_dir_size_kb=0x000000000200,grpjquo,a=,min_batch_time=0x00000000000003ff,rootcontext\a']) 10:11:00 executing program 5: syz_mount_image$ext4(&(0x7f0000000480)='ext3\x00', &(0x7f00000004c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 10:11:00 executing program 4: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000040)={0x2, &(0x7f0000000000)=[{0x25}, {0x0, 0x28}]}) 10:11:00 executing program 1: syz_mount_image$ext4(0x0, &(0x7f0000000440)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) openat$dir(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x2b8a00, 0x0) 10:11:00 executing program 2: syz_mount_image$ext4(&(0x7f0000000480)='ext3\x00', 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f00000007c0)={[], [{@fscontext={'fscontext', 0x3d, 'sysadm_u'}, 0x22}, {@defcontext={'defcontext', 0x3d, 'staff_u'}}]}) 10:11:00 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000040)={0x2, &(0x7f0000000000)=[{0x15}, {0x0, 0x0, 0x0, 0x34}]}) 10:11:00 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext3\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000480)=ANY=[@ANYBLOB='lazytime,test_dummy_encryption,max_dir_size_kb=0x000000000200,grpjquot\"=,min_batch_time=0x00000000000003ff,rootcontext\a']) 10:11:00 executing program 4: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000040)={0x2, &(0x7f0000000000)=[{0x25}, {0x0, 0x29}]}) 10:11:00 executing program 5: syz_mount_image$ext4(&(0x7f0000000480)='ext3\x00', &(0x7f00000004c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 10:11:00 executing program 2: syz_mount_image$ext4(&(0x7f0000000480)='ext3\x00', 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f00000007c0)={[], [{@fscontext={'fscontext', 0x3d, 'sysadm_u'}, 0x22}, {@defcontext={'defcontext', 0x3d, 'staff_u'}}]}) 10:11:00 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext3\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000480)=ANY=[@ANYBLOB='lazytime,test_dummy_encryption,max_dir_size_kb=0x000000000200,grpjquo\"a=,min_batch_time=0x00000000000003ff,rootcontext\a']) 10:11:00 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000040)={0x2, &(0x7f0000000000)=[{0x15}, {0x0, 0x0, 0x0, 0x35}]}) 10:11:00 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext3\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000480)=ANY=[@ANYBLOB='lazytime,test_dummy_encryption,max_dir_size_kb=0x000000000200,grpjquot,=,min_batch_time=0x00000000000003ff,rootcontext\a']) 10:11:00 executing program 4: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000040)={0x2, &(0x7f0000000000)=[{0x25}, {0x0, 0x2d}]}) 10:11:00 executing program 2: syz_mount_image$ext4(&(0x7f0000000480)='ext3\x00', &(0x7f00000004c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 10:11:00 executing program 5: syz_mount_image$ext4(&(0x7f0000000480)='ext3\x00', &(0x7f00000004c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 10:11:00 executing program 1: syz_mount_image$ext4(&(0x7f0000000480)='ext3\x00', &(0x7f00000004c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000007c0)={[], [{@fscontext={'fscontext', 0x2c, 'sysadm_u'}}, {@defcontext={'defcontext', 0x3d, 'staff_u'}}]}) 10:11:01 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000040)={0x2, &(0x7f0000000000)=[{0x15}, {0x0, 0x0, 0x0, 0x3d}]}) 10:11:01 executing program 4: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000040)={0x2, &(0x7f0000000000)=[{0x25}, {0x0, 0x30}]}) 10:11:01 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext3\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000480)=ANY=[@ANYBLOB='lazytime,test_dummy_encryption,max_dir_size_kb=0x000000000200,grpjquota\",min_batch_time=0x00000000000003ff,rootcontext\a']) 10:11:01 executing program 5: syz_mount_image$ext4(&(0x7f0000000480)='ext3\x00', &(0x7f00000004c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000007c0)) 10:11:01 executing program 4: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000040)={0x2, &(0x7f0000000000)=[{0x25}, {0x0, 0x34}]}) 10:11:01 executing program 2: syz_mount_image$ext4(&(0x7f0000000480)='ext3\x00', &(0x7f00000004c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 10:11:01 executing program 1: syz_mount_image$ext4(&(0x7f0000000480)='ext3\x00', &(0x7f00000004c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000007c0)={[], [{@fscontext={'fscontext', 0x2c, 'sysadm_u'}}, {@defcontext={'defcontext', 0x3d, 'staff_u'}}]}) 10:11:01 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000040)={0x2, &(0x7f0000000000)=[{0x15}, {0x0, 0x0, 0x0, 0x45}]}) 10:11:01 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext3\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000480)=ANY=[@ANYBLOB='lazytime,test_dummy_encryption,max_dir_size_kb=0x000000000200,grpjquota,,min_batch_time=0x00000000000003ff,rootcontext\a']) 10:11:01 executing program 5: syz_mount_image$ext4(&(0x7f0000000480)='ext3\x00', &(0x7f00000004c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000007c0)) 10:11:01 executing program 4: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000040)={0x2, &(0x7f0000000000)=[{0x25}, {0x0, 0x35}]}) 10:11:01 executing program 1: syz_mount_image$ext4(&(0x7f0000000480)='ext3\x00', &(0x7f00000004c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000007c0)={[], [{@fscontext={'fscontext', 0x2c, 'sysadm_u'}}, {@defcontext={'defcontext', 0x3d, 'staff_u'}}]}) 10:11:01 executing program 2: syz_mount_image$ext4(&(0x7f0000000480)='ext3\x00', &(0x7f00000004c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 10:11:01 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000040)={0x2, &(0x7f0000000000)=[{0x15}, {0x0, 0x0, 0x0, 0x4d}]}) 10:11:01 executing program 5: syz_mount_image$ext4(&(0x7f0000000480)='ext3\x00', &(0x7f00000004c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000007c0)) 10:11:01 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext3\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000480)=ANY=[@ANYBLOB='lazytime,test_dummy_encryption,max_dir_size_kb=0x000000000200,grpjquota=\"min_batch_time=0x00000000000003ff,rootcontext\a']) 10:11:01 executing program 1: syz_mount_image$ext4(0x0, &(0x7f00000004c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000007c0)={[], [{@fscontext={'fscontext', 0x2c, 'sysadm_u'}}, {@defcontext={'defcontext', 0x3d, 'staff_u'}}]}) 10:11:01 executing program 4: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000040)={0x2, &(0x7f0000000000)=[{0x25}, {0x0, 0x3d}]}) 10:11:01 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000040)={0x2, &(0x7f0000000000)=[{0x15}, {0x0, 0x0, 0x0, 0x60}]}) 10:11:01 executing program 5: syz_mount_image$ext4(&(0x7f0000000480)='ext3\x00', &(0x7f00000004c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000007c0)={[], [{@fscontext={'fscontext', 0x22, 'sysadm_u'}}, {@defcontext={'defcontext', 0x3d, 'staff_u'}}]}) 10:11:01 executing program 2: syz_mount_image$ext4(&(0x7f0000000480)='ext3\x00', &(0x7f00000004c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000007c0)={[], [{@fscontext={'fscontext', 0x3d, 'sysadm_u'}, 0x22}]}) 10:11:01 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext3\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000480)=ANY=[@ANYBLOB='lazytime,test_dummy_encryption,max_dir_size_kb=0x000000000200,grpjquota=,\"in_batch_time=0x00000000000003ff,rootcontext\a']) 10:11:01 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000040)={0x2, &(0x7f0000000000)=[{0x15}, {0x0, 0x0, 0x0, 0x61}]}) 10:11:01 executing program 4: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000040)={0x2, &(0x7f0000000000)=[{0x25}, {0x0, 0x45}]}) 10:11:01 executing program 1: syz_mount_image$ext4(0x0, &(0x7f00000004c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000007c0)={[], [{@fscontext={'fscontext', 0x2c, 'sysadm_u'}}, {@defcontext={'defcontext', 0x3d, 'staff_u'}}]}) 10:11:01 executing program 5: syz_mount_image$ext4(&(0x7f0000000480)='ext3\x00', &(0x7f00000004c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000007c0)={[], [{@fscontext={'fscontext', 0x22, 'sysadm_u'}}, {@defcontext={'defcontext', 0x3d, 'staff_u'}}]}) 10:11:01 executing program 2: syz_mount_image$ext4(&(0x7f0000000480)='ext3\x00', &(0x7f00000004c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000007c0)={[], [{@fscontext={'fscontext', 0x3d, 'sysadm_u'}, 0x22}]}) 10:11:01 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000040)={0x2, &(0x7f0000000000)=[{0x15}, {0x0, 0x0, 0x0, 0x64}]}) 10:11:01 executing program 4: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000040)={0x2, &(0x7f0000000000)=[{0x25}, {0x0, 0x4d}]}) 10:11:01 executing program 1: syz_mount_image$ext4(0x0, &(0x7f00000004c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000007c0)={[], [{@fscontext={'fscontext', 0x2c, 'sysadm_u'}}, {@defcontext={'defcontext', 0x3d, 'staff_u'}}]}) 10:11:01 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext3\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000480)=ANY=[@ANYBLOB='lazytime,test_dummy_encryption,max_dir_size_kb=0x000000000200,grpjquota=,,in_batch_time=0x00000000000003ff,rootcontext\a']) 10:11:01 executing program 5: syz_mount_image$ext4(&(0x7f0000000480)='ext3\x00', &(0x7f00000004c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000007c0)={[], [{@fscontext={'fscontext', 0x22, 'sysadm_u'}}, {@defcontext={'defcontext', 0x3d, 'staff_u'}}]}) 10:11:01 executing program 2: syz_mount_image$ext4(&(0x7f0000000480)='ext3\x00', &(0x7f00000004c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000007c0)={[], [{@fscontext={'fscontext', 0x3d, 'sysadm_u'}, 0x22}]}) 10:11:01 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000040)={0x2, &(0x7f0000000000)=[{0x15}, {0x0, 0x0, 0x0, 0x74}]}) 10:11:01 executing program 4: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000040)={0x2, &(0x7f0000000000)=[{0x25}, {0x0, 0x60}]}) 10:11:01 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext3\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000480)=ANY=[@ANYBLOB='lazytime,test_dummy_encryption,max_dir_size_kb=0x000000000200,grpjquota=,m\"n_batch_time=0x00000000000003ff,rootcontext\a']) 10:11:01 executing program 1: syz_mount_image$ext4(&(0x7f0000000480)='ext3\x00', 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f00000007c0)={[], [{@fscontext={'fscontext', 0x2c, 'sysadm_u'}}, {@defcontext={'defcontext', 0x3d, 'staff_u'}}]}) 10:11:01 executing program 4: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000040)={0x2, &(0x7f0000000000)=[{0x25}, {0x0, 0x61}]}) 10:11:01 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000040)={0x2, &(0x7f0000000000)=[{0x15}, {0x0, 0x0, 0x0, 0x94}]}) 10:11:01 executing program 5: syz_mount_image$ext4(0x0, &(0x7f00000004c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000007c0)={[], [{@fscontext={'fscontext', 0x22, 'sysadm_u'}}, {@defcontext={'defcontext', 0x3d, 'staff_u'}}]}) 10:11:01 executing program 2: syz_mount_image$ext4(&(0x7f0000000480)='ext3\x00', &(0x7f00000004c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000007c0)={[], [{@defcontext={'defcontext', 0x3d, 'staff_u'}}]}) 10:11:01 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext3\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000480)=ANY=[@ANYBLOB='lazytime,test_dummy_encryption,max_dir_size_kb=0x000000000200,grpjquota=,m,n_batch_time=0x00000000000003ff,rootcontext\a']) 10:11:01 executing program 1: syz_mount_image$ext4(&(0x7f0000000480)='ext3\x00', 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f00000007c0)={[], [{@fscontext={'fscontext', 0x2c, 'sysadm_u'}}, {@defcontext={'defcontext', 0x3d, 'staff_u'}}]}) 10:11:01 executing program 4: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000040)={0x2, &(0x7f0000000000)=[{0x25}, {0x0, 0x64}]}) 10:11:01 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000040)={0x2, &(0x7f0000000000)=[{0x15}, {0x0, 0x0, 0x0, 0xb1}]}) 10:11:01 executing program 2: syz_mount_image$ext4(&(0x7f0000000480)='ext3\x00', &(0x7f00000004c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000007c0)={[], [{@defcontext={'defcontext', 0x3d, 'staff_u'}}]}) 10:11:01 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext3\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000480)=ANY=[@ANYBLOB='lazytime,test_dummy_encryption,max_dir_size_kb=0x000000000200,grpjquota=,mi\"_batch_time=0x00000000000003ff,rootcontext\a']) 10:11:01 executing program 1: syz_mount_image$ext4(&(0x7f0000000480)='ext3\x00', 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f00000007c0)={[], [{@fscontext={'fscontext', 0x2c, 'sysadm_u'}}, {@defcontext={'defcontext', 0x3d, 'staff_u'}}]}) 10:11:01 executing program 5: syz_mount_image$ext4(0x0, &(0x7f00000004c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000007c0)={[], [{@fscontext={'fscontext', 0x22, 'sysadm_u'}}, {@defcontext={'defcontext', 0x3d, 'staff_u'}}]}) 10:11:01 executing program 4: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000040)={0x2, &(0x7f0000000000)=[{0x25}, {0x0, 0x74}]}) 10:11:01 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000040)={0x2, &(0x7f0000000000)=[{0x15}, {0x0, 0x0, 0x0, 0x300}]}) 10:11:01 executing program 4: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000040)={0x2, &(0x7f0000000000)=[{0x25}, {0x0, 0x94}]}) 10:11:01 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000040)={0x2, &(0x7f0000000000)=[{0x15}, {0x0, 0x0, 0x0, 0x500}]}) 10:11:01 executing program 2: syz_mount_image$ext4(&(0x7f0000000480)='ext3\x00', &(0x7f00000004c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000007c0)={[], [{@defcontext={'defcontext', 0x3d, 'staff_u'}}]}) 10:11:01 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext3\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000480)=ANY=[@ANYBLOB='lazytime,test_dummy_encryption,max_dir_size_kb=0x000000000200,grpjquota=,mi,_batch_time=0x00000000000003ff,rootcontext\a']) 10:11:01 executing program 1: syz_mount_image$ext4(&(0x7f0000000480)='ext3\x00', &(0x7f00000004c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 10:11:01 executing program 4: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000040)={0x2, &(0x7f0000000000)=[{0x25}, {0x0, 0xb1}]}) 10:11:01 executing program 5: syz_mount_image$ext4(0x0, &(0x7f00000004c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000007c0)={[], [{@fscontext={'fscontext', 0x22, 'sysadm_u'}}, {@defcontext={'defcontext', 0x3d, 'staff_u'}}]}) 10:11:01 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000040)={0x2, &(0x7f0000000000)=[{0x15}, {0x0, 0x0, 0x0, 0x600}]}) 10:11:01 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext3\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000480)=ANY=[@ANYBLOB='lazytime,test_dummy_encryption,max_dir_size_kb=0x000000000200,grpjquota=,min\"batch_time=0x00000000000003ff,rootcontext\a']) 10:11:02 executing program 2: r0 = add_key$fscrypt_v1(&(0x7f00000005c0), &(0x7f0000000180)={'fscrypt:', @desc3}, &(0x7f00000001c0)={0x0, "8a1cd41b41f438d3cf38ba5192ddf382e4f66b50b19696b3b6385e06c42a03f9589e59292f72da27de4450efc9695253e5720fc4d1d4edaf02e3a8b240c5bd3f", 0x3f}, 0x48, 0xfffffffffffffffa) keyctl$KEYCTL_MOVE(0x1e, 0x0, r0, r0, 0x1) r1 = syz_mount_image$ext4(0x0, &(0x7f0000000440)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) openat$dir(0xffffffffffffff9c, &(0x7f0000000300)='./file0\x00', 0x92100, 0x0) unlinkat(0xffffffffffffff9c, &(0x7f0000000100)='./file0\x00', 0x200) openat$dir(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x2001, 0x103) add_key$keyring(&(0x7f0000000240), &(0x7f0000000280)={'syz', 0x0}, 0x0, 0x0, 0x0) clock_gettime(0x0, &(0x7f0000000080)={0x0, 0x0}) delete_module(&(0x7f00000002c0)='\x00', 0x800) r4 = openat$vcsu(0xffffffffffffff9c, &(0x7f0000000340), 0x301, 0x0) ioctl$PTP_ENABLE_PPS(r4, 0x40043d04, 0x1) sendmsg$TIPC_CMD_SET_NETID(r4, &(0x7f0000000400)={&(0x7f0000000340)={0x10, 0x0, 0x0, 0x2000}, 0xc, &(0x7f00000003c0)={&(0x7f0000000380)={0x24, 0x0, 0x4, 0x70bd28, 0x25dfdbff, {{}, {}, {0x8, 0x2, 0x8000}}, ["", "", "", "", "", "", "", "", ""]}, 0x24}, 0x1, 0x0, 0x0, 0x20000000}, 0x10000080) syslog(0x3, 0x0, 0x0) r5 = syz_genetlink_get_family_id$tipc(&(0x7f00000004c0), r4) sendmsg$TIPC_CMD_RESET_LINK_STATS(r4, &(0x7f0000000580)={&(0x7f0000000480)={0x10, 0x0, 0x0, 0x1}, 0xc, &(0x7f0000000540)={&(0x7f0000000500)={0x28, r5, 0x4, 0x70bd26, 0x25dfdbff, {{}, {}, {0xc, 0x14, 'syz0\x00'}}, ["", "", "", "", "", "", "", "", ""]}, 0x28}, 0x1, 0x0, 0x0, 0x4000000}, 0x4048091) futimesat(r1, &(0x7f0000000040)='./file0\x00', &(0x7f00000000c0)={{r2, r3/1000+60000}, {0x0, 0xea60}}) 10:11:02 executing program 1: syz_mount_image$ext4(&(0x7f0000000480)='ext3\x00', &(0x7f00000004c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 10:11:02 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000040)={0x2, &(0x7f0000000000)=[{0x15}, {0x0, 0x0, 0x0, 0x700}]}) 10:11:02 executing program 4: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000040)={0x2, &(0x7f0000000000)=[{0x25}, {}]}) 10:11:02 executing program 5: syz_mount_image$ext4(&(0x7f0000000480)='ext3\x00', 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f00000007c0)={[], [{@fscontext={'fscontext', 0x22, 'sysadm_u'}}, {@defcontext={'defcontext', 0x3d, 'staff_u'}}]}) 10:11:02 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext3\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000480)=ANY=[@ANYBLOB='lazytime,test_dummy_encryption,max_dir_size_kb=0x000000000200,grpjquota=,min,batch_time=0x00000000000003ff,rootcontext\a']) 10:11:02 executing program 5: syz_mount_image$ext4(&(0x7f0000000480)='ext3\x00', 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f00000007c0)={[], [{@fscontext={'fscontext', 0x22, 'sysadm_u'}}, {@defcontext={'defcontext', 0x3d, 'staff_u'}}]}) 10:11:02 executing program 2: r0 = add_key$fscrypt_v1(&(0x7f00000005c0), &(0x7f0000000180)={'fscrypt:', @desc3}, &(0x7f00000001c0)={0x0, "8a1cd41b41f438d3cf38ba5192ddf382e4f66b50b19696b3b6385e06c42a03f9589e59292f72da27de4450efc9695253e5720fc4d1d4edaf02e3a8b240c5bd3f", 0x3f}, 0x48, 0xfffffffffffffffa) keyctl$KEYCTL_MOVE(0x1e, 0x0, r0, r0, 0x1) r1 = syz_mount_image$ext4(0x0, &(0x7f0000000440)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) openat$dir(0xffffffffffffff9c, &(0x7f0000000300)='./file0\x00', 0x92100, 0x0) unlinkat(0xffffffffffffff9c, &(0x7f0000000100)='./file0\x00', 0x200) openat$dir(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x2001, 0x103) add_key$keyring(&(0x7f0000000240), &(0x7f0000000280)={'syz', 0x0}, 0x0, 0x0, 0x0) clock_gettime(0x0, &(0x7f0000000080)={0x0, 0x0}) delete_module(&(0x7f00000002c0)='\x00', 0x800) r4 = openat$vcsu(0xffffffffffffff9c, &(0x7f0000000340), 0x301, 0x0) ioctl$PTP_ENABLE_PPS(r4, 0x40043d04, 0x1) sendmsg$TIPC_CMD_SET_NETID(r4, &(0x7f0000000400)={&(0x7f0000000340)={0x10, 0x0, 0x0, 0x2000}, 0xc, &(0x7f00000003c0)={&(0x7f0000000380)={0x24, 0x0, 0x4, 0x70bd28, 0x25dfdbff, {{}, {}, {0x8, 0x2, 0x8000}}, ["", "", "", "", "", "", "", "", ""]}, 0x24}, 0x1, 0x0, 0x0, 0x20000000}, 0x10000080) syslog(0x3, 0x0, 0x0) r5 = syz_genetlink_get_family_id$tipc(&(0x7f00000004c0), r4) sendmsg$TIPC_CMD_RESET_LINK_STATS(r4, &(0x7f0000000580)={&(0x7f0000000480)={0x10, 0x0, 0x0, 0x1}, 0xc, &(0x7f0000000540)={&(0x7f0000000500)={0x28, r5, 0x4, 0x70bd26, 0x25dfdbff, {{}, {}, {0xc, 0x14, 'syz0\x00'}}, ["", "", "", "", "", "", "", "", ""]}, 0x28}, 0x1, 0x0, 0x0, 0x4000000}, 0x4048091) futimesat(r1, &(0x7f0000000040)='./file0\x00', &(0x7f00000000c0)={{r2, r3/1000+60000}, {0x0, 0xea60}}) 10:11:02 executing program 1: syz_mount_image$ext4(&(0x7f0000000480)='ext3\x00', &(0x7f00000004c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 10:11:02 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000040)={0x2, &(0x7f0000000000)=[{0x15}, {0x0, 0x0, 0x0, 0x900}]}) 10:11:02 executing program 4: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000040)={0x2, &(0x7f0000000000)=[{0x25}, {0x0, 0x0, 0x2}]}) 10:11:02 executing program 5: syz_mount_image$ext4(&(0x7f0000000480)='ext3\x00', 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f00000007c0)={[], [{@fscontext={'fscontext', 0x22, 'sysadm_u'}}, {@defcontext={'defcontext', 0x3d, 'staff_u'}}]}) 10:11:02 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext3\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000480)=ANY=[@ANYBLOB='lazytime,test_dummy_encryption,max_dir_size_kb=0x000000000200,grpjquota=,min_\"atch_time=0x00000000000003ff,rootcontext\a']) 10:11:02 executing program 1: syz_mount_image$ext4(&(0x7f0000000480)='ext3\x00', &(0x7f00000004c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000007c0)={[], [{@fscontext={'fscontext', 0x2c, 'sysadm_u'}}]}) 10:11:02 executing program 5: syz_mount_image$ext4(&(0x7f0000000480)='ext3\x00', &(0x7f00000004c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 10:11:02 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000040)={0x2, &(0x7f0000000000)=[{0x15}, {0x0, 0x0, 0x0, 0x1500}]}) 10:11:02 executing program 4: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000040)={0x2, &(0x7f0000000000)=[{0x25}, {0x0, 0x0, 0x3}]}) 10:11:02 executing program 2: r0 = add_key$fscrypt_v1(&(0x7f00000005c0), &(0x7f0000000180)={'fscrypt:', @desc3}, &(0x7f00000001c0)={0x0, "8a1cd41b41f438d3cf38ba5192ddf382e4f66b50b19696b3b6385e06c42a03f9589e59292f72da27de4450efc9695253e5720fc4d1d4edaf02e3a8b240c5bd3f", 0x3f}, 0x48, 0xfffffffffffffffa) keyctl$KEYCTL_MOVE(0x1e, 0x0, r0, r0, 0x1) r1 = syz_mount_image$ext4(0x0, &(0x7f0000000440)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) openat$dir(0xffffffffffffff9c, &(0x7f0000000300)='./file0\x00', 0x92100, 0x0) unlinkat(0xffffffffffffff9c, &(0x7f0000000100)='./file0\x00', 0x200) openat$dir(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x2001, 0x103) add_key$keyring(&(0x7f0000000240), &(0x7f0000000280)={'syz', 0x0}, 0x0, 0x0, 0x0) clock_gettime(0x0, &(0x7f0000000080)={0x0, 0x0}) delete_module(&(0x7f00000002c0)='\x00', 0x800) r4 = openat$vcsu(0xffffffffffffff9c, &(0x7f0000000340), 0x301, 0x0) ioctl$PTP_ENABLE_PPS(r4, 0x40043d04, 0x1) sendmsg$TIPC_CMD_SET_NETID(r4, &(0x7f0000000400)={&(0x7f0000000340)={0x10, 0x0, 0x0, 0x2000}, 0xc, &(0x7f00000003c0)={&(0x7f0000000380)={0x24, 0x0, 0x4, 0x70bd28, 0x25dfdbff, {{}, {}, {0x8, 0x2, 0x8000}}, ["", "", "", "", "", "", "", "", ""]}, 0x24}, 0x1, 0x0, 0x0, 0x20000000}, 0x10000080) syslog(0x3, 0x0, 0x0) r5 = syz_genetlink_get_family_id$tipc(&(0x7f00000004c0), r4) sendmsg$TIPC_CMD_RESET_LINK_STATS(r4, &(0x7f0000000580)={&(0x7f0000000480)={0x10, 0x0, 0x0, 0x1}, 0xc, &(0x7f0000000540)={&(0x7f0000000500)={0x28, r5, 0x4, 0x70bd26, 0x25dfdbff, {{}, {}, {0xc, 0x14, 'syz0\x00'}}, ["", "", "", "", "", "", "", "", ""]}, 0x28}, 0x1, 0x0, 0x0, 0x4000000}, 0x4048091) futimesat(r1, &(0x7f0000000040)='./file0\x00', &(0x7f00000000c0)={{r2, r3/1000+60000}, {0x0, 0xea60}}) 10:11:02 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext3\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000480)=ANY=[@ANYBLOB='lazytime,test_dummy_encryption,max_dir_size_kb=0x000000000200,grpjquota=,min_,atch_time=0x00000000000003ff,rootcontext\a']) 10:11:02 executing program 1: syz_mount_image$ext4(&(0x7f0000000480)='ext3\x00', &(0x7f00000004c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000007c0)) 10:11:02 executing program 5: syz_mount_image$ext4(&(0x7f0000000480)='ext3\x00', &(0x7f00000004c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 10:11:02 executing program 4: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000040)={0x2, &(0x7f0000000000)=[{0x25}, {0x0, 0x0, 0x5}]}) 10:11:02 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000040)={0x2, &(0x7f0000000000)=[{0x15}, {0x0, 0x0, 0x0, 0x1600}]}) 10:11:02 executing program 2: r0 = add_key$fscrypt_v1(&(0x7f00000005c0), &(0x7f0000000180)={'fscrypt:', @desc3}, &(0x7f00000001c0)={0x0, "8a1cd41b41f438d3cf38ba5192ddf382e4f66b50b19696b3b6385e06c42a03f9589e59292f72da27de4450efc9695253e5720fc4d1d4edaf02e3a8b240c5bd3f", 0x3f}, 0x48, 0xfffffffffffffffa) keyctl$KEYCTL_MOVE(0x1e, 0x0, r0, r0, 0x1) syz_mount_image$ext4(0x0, &(0x7f0000000440)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) openat$dir(0xffffffffffffff9c, &(0x7f0000000300)='./file0\x00', 0x92100, 0x0) unlinkat(0xffffffffffffff9c, &(0x7f0000000100)='./file0\x00', 0x200) openat$dir(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x2001, 0x103) add_key$keyring(&(0x7f0000000240), &(0x7f0000000280)={'syz', 0x0}, 0x0, 0x0, 0x0) clock_gettime(0x0, &(0x7f0000000080)) delete_module(&(0x7f00000002c0)='\x00', 0x800) r1 = openat$vcsu(0xffffffffffffff9c, &(0x7f0000000340), 0x301, 0x0) ioctl$PTP_ENABLE_PPS(r1, 0x40043d04, 0x1) sendmsg$TIPC_CMD_SET_NETID(r1, &(0x7f0000000400)={&(0x7f0000000340)={0x10, 0x0, 0x0, 0x2000}, 0xc, &(0x7f00000003c0)={&(0x7f0000000380)={0x24, 0x0, 0x4, 0x70bd28, 0x25dfdbff, {{}, {}, {0x8, 0x2, 0x8000}}, ["", "", "", "", "", "", "", "", ""]}, 0x24}, 0x1, 0x0, 0x0, 0x20000000}, 0x10000080) syslog(0x3, 0x0, 0x0) r2 = syz_genetlink_get_family_id$tipc(&(0x7f00000004c0), r1) sendmsg$TIPC_CMD_RESET_LINK_STATS(r1, &(0x7f0000000580)={&(0x7f0000000480)={0x10, 0x0, 0x0, 0x1}, 0xc, &(0x7f0000000540)={&(0x7f0000000500)={0x28, r2, 0x4, 0x70bd26, 0x25dfdbff, {{}, {}, {0xc, 0x14, 'syz0\x00'}}, ["", "", "", "", "", "", "", "", ""]}, 0x28}, 0x1, 0x0, 0x0, 0x4000000}, 0x4048091) 10:11:02 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext3\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000480)=ANY=[@ANYBLOB='lazytime,test_dummy_encryption,max_dir_size_kb=0x000000000200,grpjquota=,min_b\"tch_time=0x00000000000003ff,rootcontext\a']) 10:11:02 executing program 1: syz_mount_image$ext4(&(0x7f0000000480)='ext3\x00', &(0x7f00000004c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000007c0)) 10:11:02 executing program 4: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000040)={0x2, &(0x7f0000000000)=[{0x25}, {0x0, 0x0, 0x6}]}) 10:11:02 executing program 5: syz_mount_image$ext4(&(0x7f0000000480)='ext3\x00', &(0x7f00000004c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 10:11:02 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000040)={0x2, &(0x7f0000000000)=[{0x15}, {0x0, 0x0, 0x0, 0x1d00}]}) 10:11:02 executing program 2: r0 = add_key$fscrypt_v1(&(0x7f00000005c0), &(0x7f0000000180)={'fscrypt:', @desc3}, &(0x7f00000001c0)={0x0, "8a1cd41b41f438d3cf38ba5192ddf382e4f66b50b19696b3b6385e06c42a03f9589e59292f72da27de4450efc9695253e5720fc4d1d4edaf02e3a8b240c5bd3f", 0x3f}, 0x48, 0xfffffffffffffffa) keyctl$KEYCTL_MOVE(0x1e, 0x0, r0, r0, 0x1) syz_mount_image$ext4(0x0, &(0x7f0000000440)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) openat$dir(0xffffffffffffff9c, &(0x7f0000000300)='./file0\x00', 0x92100, 0x0) unlinkat(0xffffffffffffff9c, &(0x7f0000000100)='./file0\x00', 0x200) openat$dir(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x2001, 0x103) add_key$keyring(&(0x7f0000000240), &(0x7f0000000280)={'syz', 0x0}, 0x0, 0x0, 0x0) clock_gettime(0x0, &(0x7f0000000080)) delete_module(&(0x7f00000002c0)='\x00', 0x800) r1 = openat$vcsu(0xffffffffffffff9c, &(0x7f0000000340), 0x301, 0x0) ioctl$PTP_ENABLE_PPS(r1, 0x40043d04, 0x1) sendmsg$TIPC_CMD_SET_NETID(r1, &(0x7f0000000400)={&(0x7f0000000340)={0x10, 0x0, 0x0, 0x2000}, 0xc, &(0x7f00000003c0)={&(0x7f0000000380)={0x24, 0x0, 0x4, 0x70bd28, 0x25dfdbff, {{}, {}, {0x8, 0x2, 0x8000}}, ["", "", "", "", "", "", "", "", ""]}, 0x24}, 0x1, 0x0, 0x0, 0x20000000}, 0x10000080) syslog(0x3, 0x0, 0x0) syz_genetlink_get_family_id$tipc(&(0x7f00000004c0), r1) 10:11:02 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext3\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000480)=ANY=[@ANYBLOB='lazytime,test_dummy_encryption,max_dir_size_kb=0x000000000200,grpjquota=,min_b,tch_time=0x00000000000003ff,rootcontext\a']) 10:11:02 executing program 1: syz_mount_image$ext4(&(0x7f0000000480)='ext3\x00', &(0x7f00000004c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000007c0)) 10:11:02 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000040)={0x2, &(0x7f0000000000)=[{0x15}, {0x0, 0x0, 0x0, 0x2000}]}) 10:11:02 executing program 5: syz_mount_image$ext4(&(0x7f0000000480)='ext3\x00', &(0x7f00000004c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000007c0)={[], [{@fscontext={'fscontext', 0x22, 'sysadm_u'}}]}) 10:11:02 executing program 4: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000040)={0x2, &(0x7f0000000000)=[{0x25}, {0x0, 0x0, 0x7}]}) 10:11:02 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext3\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000480)=ANY=[@ANYBLOB='lazytime,test_dummy_encryption,max_dir_size_kb=0x000000000200,grpjquota=,min_ba\"ch_time=0x00000000000003ff,rootcontext\a']) 10:11:02 executing program 2: r0 = add_key$fscrypt_v1(&(0x7f00000005c0), &(0x7f0000000180)={'fscrypt:', @desc3}, &(0x7f00000001c0)={0x0, "8a1cd41b41f438d3cf38ba5192ddf382e4f66b50b19696b3b6385e06c42a03f9589e59292f72da27de4450efc9695253e5720fc4d1d4edaf02e3a8b240c5bd3f", 0x3f}, 0x48, 0xfffffffffffffffa) keyctl$KEYCTL_MOVE(0x1e, 0x0, r0, r0, 0x1) syz_mount_image$ext4(0x0, &(0x7f0000000440)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) openat$dir(0xffffffffffffff9c, &(0x7f0000000300)='./file0\x00', 0x92100, 0x0) unlinkat(0xffffffffffffff9c, &(0x7f0000000100)='./file0\x00', 0x200) openat$dir(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x2001, 0x103) add_key$keyring(&(0x7f0000000240), &(0x7f0000000280)={'syz', 0x0}, 0x0, 0x0, 0x0) clock_gettime(0x0, &(0x7f0000000080)) delete_module(&(0x7f00000002c0)='\x00', 0x800) r1 = openat$vcsu(0xffffffffffffff9c, &(0x7f0000000340), 0x301, 0x0) ioctl$PTP_ENABLE_PPS(r1, 0x40043d04, 0x1) sendmsg$TIPC_CMD_SET_NETID(r1, &(0x7f0000000400)={&(0x7f0000000340)={0x10, 0x0, 0x0, 0x2000}, 0xc, &(0x7f00000003c0)={&(0x7f0000000380)={0x24, 0x0, 0x4, 0x70bd28, 0x25dfdbff, {{}, {}, {0x8, 0x2, 0x8000}}, ["", "", "", "", "", "", "", "", ""]}, 0x24}, 0x1, 0x0, 0x0, 0x20000000}, 0x10000080) syslog(0x3, 0x0, 0x0) 10:11:02 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000040)={0x2, &(0x7f0000000000)=[{0x15}, {0x0, 0x0, 0x0, 0x2500}]}) 10:11:02 executing program 1: r0 = add_key$fscrypt_v1(&(0x7f00000005c0), &(0x7f0000000180)={'fscrypt:', @desc3}, &(0x7f00000001c0)={0x0, "8a1cd41b41f438d3cf38ba5192ddf382e4f66b50b19696b3b6385e06c42a03f9589e59292f72da27de4450efc9695253e5720fc4d1d4edaf02e3a8b240c5bd3f", 0x3f}, 0x48, 0xfffffffffffffffa) keyctl$KEYCTL_MOVE(0x1e, 0x0, r0, r0, 0x1) syz_mount_image$ext4(0x0, &(0x7f0000000440)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) openat$dir(0xffffffffffffff9c, &(0x7f0000000300)='./file0\x00', 0x92100, 0x0) unlinkat(0xffffffffffffff9c, &(0x7f0000000100)='./file0\x00', 0x200) openat$dir(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x2001, 0x103) add_key$keyring(&(0x7f0000000240), &(0x7f0000000280)={'syz', 0x0}, 0x0, 0x0, 0x0) clock_gettime(0x0, &(0x7f0000000080)) delete_module(&(0x7f00000002c0)='\x00', 0x800) r1 = openat$vcsu(0xffffffffffffff9c, &(0x7f0000000340), 0x301, 0x0) ioctl$PTP_ENABLE_PPS(r1, 0x40043d04, 0x1) sendmsg$TIPC_CMD_SET_NETID(r1, &(0x7f0000000400)={&(0x7f0000000340)={0x10, 0x0, 0x0, 0x2000}, 0xc, &(0x7f00000003c0)={&(0x7f0000000380)={0x24, 0x0, 0x4, 0x70bd28, 0x25dfdbff, {{}, {}, {0x8, 0x2, 0x8000}}, ["", "", "", "", "", "", "", "", ""]}, 0x24}, 0x1, 0x0, 0x0, 0x20000000}, 0x10000080) syslog(0x3, 0x0, 0x0) r2 = syz_genetlink_get_family_id$tipc(&(0x7f00000004c0), r1) sendmsg$TIPC_CMD_RESET_LINK_STATS(r1, &(0x7f0000000580)={&(0x7f0000000480)={0x10, 0x0, 0x0, 0x1}, 0xc, &(0x7f0000000540)={&(0x7f0000000500)={0x28, r2, 0x4, 0x70bd26, 0x25dfdbff, {{}, {}, {0xc, 0x14, 'syz0\x00'}}, ["", "", "", "", "", "", "", "", ""]}, 0x28}, 0x1, 0x0, 0x0, 0x4000000}, 0x4048091) 10:11:02 executing program 4: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000040)={0x2, &(0x7f0000000000)=[{0x25}, {0x0, 0x0, 0x9}]}) 10:11:02 executing program 5: syz_mount_image$ext4(&(0x7f0000000480)='ext3\x00', &(0x7f00000004c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000007c0)) 10:11:02 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext3\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000480)=ANY=[@ANYBLOB='lazytime,test_dummy_encryption,max_dir_size_kb=0x000000000200,grpjquota=,min_ba,ch_time=0x00000000000003ff,rootcontext\a']) 10:11:02 executing program 2: r0 = add_key$fscrypt_v1(&(0x7f00000005c0), &(0x7f0000000180)={'fscrypt:', @desc3}, &(0x7f00000001c0)={0x0, "8a1cd41b41f438d3cf38ba5192ddf382e4f66b50b19696b3b6385e06c42a03f9589e59292f72da27de4450efc9695253e5720fc4d1d4edaf02e3a8b240c5bd3f", 0x3f}, 0x48, 0xfffffffffffffffa) keyctl$KEYCTL_MOVE(0x1e, 0x0, r0, r0, 0x1) syz_mount_image$ext4(0x0, &(0x7f0000000440)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) openat$dir(0xffffffffffffff9c, &(0x7f0000000300)='./file0\x00', 0x92100, 0x0) unlinkat(0xffffffffffffff9c, &(0x7f0000000100)='./file0\x00', 0x200) openat$dir(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x2001, 0x103) add_key$keyring(&(0x7f0000000240), &(0x7f0000000280)={'syz', 0x0}, 0x0, 0x0, 0x0) clock_gettime(0x0, &(0x7f0000000080)) delete_module(&(0x7f00000002c0)='\x00', 0x800) r1 = openat$vcsu(0xffffffffffffff9c, &(0x7f0000000340), 0x301, 0x0) ioctl$PTP_ENABLE_PPS(r1, 0x40043d04, 0x1) sendmsg$TIPC_CMD_SET_NETID(r1, &(0x7f0000000400)={&(0x7f0000000340)={0x10, 0x0, 0x0, 0x2000}, 0xc, &(0x7f00000003c0)={&(0x7f0000000380)={0x24, 0x0, 0x4, 0x70bd28, 0x25dfdbff, {{}, {}, {0x8, 0x2, 0x8000}}, ["", "", "", "", "", "", "", "", ""]}, 0x24}, 0x1, 0x0, 0x0, 0x20000000}, 0x10000080) 10:11:02 executing program 1: r0 = add_key$fscrypt_v1(&(0x7f00000005c0), &(0x7f0000000180)={'fscrypt:', @desc3}, &(0x7f00000001c0)={0x0, "8a1cd41b41f438d3cf38ba5192ddf382e4f66b50b19696b3b6385e06c42a03f9589e59292f72da27de4450efc9695253e5720fc4d1d4edaf02e3a8b240c5bd3f", 0x3f}, 0x48, 0xfffffffffffffffa) keyctl$KEYCTL_MOVE(0x1e, 0x0, r0, r0, 0x1) syz_mount_image$ext4(0x0, &(0x7f0000000440)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) openat$dir(0xffffffffffffff9c, &(0x7f0000000300)='./file0\x00', 0x92100, 0x0) unlinkat(0xffffffffffffff9c, &(0x7f0000000100)='./file0\x00', 0x200) openat$dir(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x2001, 0x103) add_key$keyring(&(0x7f0000000240), &(0x7f0000000280)={'syz', 0x0}, 0x0, 0x0, 0x0) clock_gettime(0x0, &(0x7f0000000080)) delete_module(&(0x7f00000002c0)='\x00', 0x800) r1 = openat$vcsu(0xffffffffffffff9c, &(0x7f0000000340), 0x301, 0x0) ioctl$PTP_ENABLE_PPS(r1, 0x40043d04, 0x1) sendmsg$TIPC_CMD_SET_NETID(r1, &(0x7f0000000400)={&(0x7f0000000340)={0x10, 0x0, 0x0, 0x2000}, 0xc, &(0x7f00000003c0)={&(0x7f0000000380)={0x24, 0x0, 0x4, 0x70bd28, 0x25dfdbff, {{}, {}, {0x8, 0x2, 0x8000}}, ["", "", "", "", "", "", "", "", ""]}, 0x24}, 0x1, 0x0, 0x0, 0x20000000}, 0x10000080) syslog(0x3, 0x0, 0x0) r2 = syz_genetlink_get_family_id$tipc(&(0x7f00000004c0), r1) sendmsg$TIPC_CMD_RESET_LINK_STATS(r1, &(0x7f0000000580)={&(0x7f0000000480)={0x10, 0x0, 0x0, 0x1}, 0xc, &(0x7f0000000540)={&(0x7f0000000500)={0x28, r2, 0x4, 0x70bd26, 0x25dfdbff, {{}, {}, {0xc, 0x14, 'syz0\x00'}}, ["", "", "", "", "", "", "", "", ""]}, 0x28}, 0x1, 0x0, 0x0, 0x4000000}, 0x4048091) 10:11:02 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000040)={0x2, &(0x7f0000000000)=[{0x15}, {0x0, 0x0, 0x0, 0x2800}]}) 10:11:02 executing program 4: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000040)={0x2, &(0x7f0000000000)=[{0x25}, {0x0, 0x0, 0x15}]}) 10:11:02 executing program 5: syz_mount_image$ext4(&(0x7f0000000480)='ext3\x00', &(0x7f00000004c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000007c0)) 10:11:02 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext3\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000480)=ANY=[@ANYBLOB='lazytime,test_dummy_encryption,max_dir_size_kb=0x000000000200,grpjquota=,min_bat\"h_time=0x00000000000003ff,rootcontext\a']) 10:11:02 executing program 1: r0 = add_key$fscrypt_v1(&(0x7f00000005c0), &(0x7f0000000180)={'fscrypt:', @desc3}, &(0x7f00000001c0)={0x0, "8a1cd41b41f438d3cf38ba5192ddf382e4f66b50b19696b3b6385e06c42a03f9589e59292f72da27de4450efc9695253e5720fc4d1d4edaf02e3a8b240c5bd3f", 0x3f}, 0x48, 0xfffffffffffffffa) keyctl$KEYCTL_MOVE(0x1e, 0x0, r0, r0, 0x1) syz_mount_image$ext4(0x0, &(0x7f0000000440)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) openat$dir(0xffffffffffffff9c, &(0x7f0000000300)='./file0\x00', 0x92100, 0x0) unlinkat(0xffffffffffffff9c, &(0x7f0000000100)='./file0\x00', 0x200) openat$dir(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x2001, 0x103) add_key$keyring(&(0x7f0000000240), &(0x7f0000000280)={'syz', 0x0}, 0x0, 0x0, 0x0) clock_gettime(0x0, &(0x7f0000000080)) delete_module(&(0x7f00000002c0)='\x00', 0x800) r1 = openat$vcsu(0xffffffffffffff9c, &(0x7f0000000340), 0x301, 0x0) ioctl$PTP_ENABLE_PPS(r1, 0x40043d04, 0x1) sendmsg$TIPC_CMD_SET_NETID(r1, &(0x7f0000000400)={&(0x7f0000000340)={0x10, 0x0, 0x0, 0x2000}, 0xc, &(0x7f00000003c0)={&(0x7f0000000380)={0x24, 0x0, 0x4, 0x70bd28, 0x25dfdbff, {{}, {}, {0x8, 0x2, 0x8000}}, ["", "", "", "", "", "", "", "", ""]}, 0x24}, 0x1, 0x0, 0x0, 0x20000000}, 0x10000080) syslog(0x3, 0x0, 0x0) r2 = syz_genetlink_get_family_id$tipc(&(0x7f00000004c0), r1) sendmsg$TIPC_CMD_RESET_LINK_STATS(r1, &(0x7f0000000580)={&(0x7f0000000480)={0x10, 0x0, 0x0, 0x1}, 0xc, &(0x7f0000000540)={&(0x7f0000000500)={0x28, r2, 0x4, 0x70bd26, 0x25dfdbff, {{}, {}, {0xc, 0x14, 'syz0\x00'}}, ["", "", "", "", "", "", "", "", ""]}, 0x28}, 0x1, 0x0, 0x0, 0x4000000}, 0x4048091) 10:11:02 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000040)={0x2, &(0x7f0000000000)=[{0x15}, {0x0, 0x0, 0x0, 0x2d00}]}) 10:11:02 executing program 4: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000040)={0x2, &(0x7f0000000000)=[{0x25}, {0x0, 0x0, 0x16}]}) 10:11:02 executing program 2: r0 = add_key$fscrypt_v1(&(0x7f00000005c0), &(0x7f0000000180)={'fscrypt:', @desc3}, &(0x7f00000001c0)={0x0, "8a1cd41b41f438d3cf38ba5192ddf382e4f66b50b19696b3b6385e06c42a03f9589e59292f72da27de4450efc9695253e5720fc4d1d4edaf02e3a8b240c5bd3f", 0x3f}, 0x48, 0xfffffffffffffffa) keyctl$KEYCTL_MOVE(0x1e, 0x0, r0, r0, 0x1) syz_mount_image$ext4(0x0, &(0x7f0000000440)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) openat$dir(0xffffffffffffff9c, &(0x7f0000000300)='./file0\x00', 0x92100, 0x0) unlinkat(0xffffffffffffff9c, &(0x7f0000000100)='./file0\x00', 0x200) openat$dir(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x2001, 0x103) add_key$keyring(&(0x7f0000000240), &(0x7f0000000280)={'syz', 0x0}, 0x0, 0x0, 0x0) clock_gettime(0x0, &(0x7f0000000080)) delete_module(&(0x7f00000002c0)='\x00', 0x800) r1 = openat$vcsu(0xffffffffffffff9c, &(0x7f0000000340), 0x301, 0x0) ioctl$PTP_ENABLE_PPS(r1, 0x40043d04, 0x1) 10:11:02 executing program 5: syz_mount_image$ext4(&(0x7f0000000480)='ext3\x00', &(0x7f00000004c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000007c0)) 10:11:02 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext3\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000480)=ANY=[@ANYBLOB='lazytime,test_dummy_encryption,max_dir_size_kb=0x000000000200,grpjquota=,min_bat,h_time=0x00000000000003ff,rootcontext\a']) 10:11:02 executing program 1: r0 = add_key$fscrypt_v1(&(0x7f00000005c0), &(0x7f0000000180)={'fscrypt:', @desc3}, &(0x7f00000001c0)={0x0, "8a1cd41b41f438d3cf38ba5192ddf382e4f66b50b19696b3b6385e06c42a03f9589e59292f72da27de4450efc9695253e5720fc4d1d4edaf02e3a8b240c5bd3f", 0x3f}, 0x48, 0xfffffffffffffffa) keyctl$KEYCTL_MOVE(0x1e, 0x0, r0, r0, 0x1) syz_mount_image$ext4(0x0, &(0x7f0000000440)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) openat$dir(0xffffffffffffff9c, &(0x7f0000000300)='./file0\x00', 0x92100, 0x0) unlinkat(0xffffffffffffff9c, &(0x7f0000000100)='./file0\x00', 0x200) openat$dir(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x2001, 0x103) add_key$keyring(&(0x7f0000000240), &(0x7f0000000280)={'syz', 0x0}, 0x0, 0x0, 0x0) clock_gettime(0x0, &(0x7f0000000080)) delete_module(&(0x7f00000002c0)='\x00', 0x800) r1 = openat$vcsu(0xffffffffffffff9c, &(0x7f0000000340), 0x301, 0x0) ioctl$PTP_ENABLE_PPS(r1, 0x40043d04, 0x1) sendmsg$TIPC_CMD_SET_NETID(r1, &(0x7f0000000400)={&(0x7f0000000340)={0x10, 0x0, 0x0, 0x2000}, 0xc, &(0x7f00000003c0)={&(0x7f0000000380)={0x24, 0x0, 0x4, 0x70bd28, 0x25dfdbff, {{}, {}, {0x8, 0x2, 0x8000}}, ["", "", "", "", "", "", "", "", ""]}, 0x24}, 0x1, 0x0, 0x0, 0x20000000}, 0x10000080) syslog(0x3, 0x0, 0x0) syz_genetlink_get_family_id$tipc(&(0x7f00000004c0), r1) 10:11:02 executing program 4: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000040)={0x2, &(0x7f0000000000)=[{0x25}, {0x0, 0x0, 0x1d}]}) 10:11:02 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000040)={0x2, &(0x7f0000000000)=[{0x15}, {0x0, 0x0, 0x0, 0x3000}]}) 10:11:02 executing program 5: syz_mount_image$ext4(&(0x7f0000000480)='ext3\x00', &(0x7f00000004c0)='./file0\x00', 0x0, 0x0, 0x0, 0x1020, &(0x7f00000007c0)={[], [{@fscontext={'fscontext', 0x3d, 'sysadm_u'}}, {@defcontext={'defcontext', 0x3d, 'staff_u'}}]}) 10:11:02 executing program 2: r0 = add_key$fscrypt_v1(&(0x7f00000005c0), &(0x7f0000000180)={'fscrypt:', @desc3}, &(0x7f00000001c0)={0x0, "8a1cd41b41f438d3cf38ba5192ddf382e4f66b50b19696b3b6385e06c42a03f9589e59292f72da27de4450efc9695253e5720fc4d1d4edaf02e3a8b240c5bd3f", 0x3f}, 0x48, 0xfffffffffffffffa) keyctl$KEYCTL_MOVE(0x1e, 0x0, r0, r0, 0x1) syz_mount_image$ext4(0x0, &(0x7f0000000440)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) openat$dir(0xffffffffffffff9c, &(0x7f0000000300)='./file0\x00', 0x92100, 0x0) unlinkat(0xffffffffffffff9c, &(0x7f0000000100)='./file0\x00', 0x200) openat$dir(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x2001, 0x103) add_key$keyring(&(0x7f0000000240), &(0x7f0000000280)={'syz', 0x0}, 0x0, 0x0, 0x0) clock_gettime(0x0, &(0x7f0000000080)) delete_module(&(0x7f00000002c0)='\x00', 0x800) openat$vcsu(0xffffffffffffff9c, &(0x7f0000000340), 0x301, 0x0) 10:11:02 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext3\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000480)=ANY=[@ANYBLOB='lazytime,test_dummy_encryption,max_dir_size_kb=0x000000000200,grpjquota=,min_batc\"_time=0x00000000000003ff,rootcontext\a']) 10:11:03 executing program 4: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000040)={0x2, &(0x7f0000000000)=[{0x25}, {0x0, 0x0, 0x25}]}) 10:11:03 executing program 1: r0 = add_key$fscrypt_v1(&(0x7f00000005c0), &(0x7f0000000180)={'fscrypt:', @desc3}, &(0x7f00000001c0)={0x0, "8a1cd41b41f438d3cf38ba5192ddf382e4f66b50b19696b3b6385e06c42a03f9589e59292f72da27de4450efc9695253e5720fc4d1d4edaf02e3a8b240c5bd3f", 0x3f}, 0x48, 0xfffffffffffffffa) keyctl$KEYCTL_MOVE(0x1e, 0x0, r0, r0, 0x1) syz_mount_image$ext4(0x0, &(0x7f0000000440)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) openat$dir(0xffffffffffffff9c, &(0x7f0000000300)='./file0\x00', 0x92100, 0x0) unlinkat(0xffffffffffffff9c, &(0x7f0000000100)='./file0\x00', 0x200) openat$dir(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x2001, 0x103) add_key$keyring(&(0x7f0000000240), &(0x7f0000000280)={'syz', 0x0}, 0x0, 0x0, 0x0) clock_gettime(0x0, &(0x7f0000000080)) delete_module(&(0x7f00000002c0)='\x00', 0x800) r1 = openat$vcsu(0xffffffffffffff9c, &(0x7f0000000340), 0x301, 0x0) ioctl$PTP_ENABLE_PPS(r1, 0x40043d04, 0x1) sendmsg$TIPC_CMD_SET_NETID(r1, &(0x7f0000000400)={&(0x7f0000000340)={0x10, 0x0, 0x0, 0x2000}, 0xc, &(0x7f00000003c0)={&(0x7f0000000380)={0x24, 0x0, 0x4, 0x70bd28, 0x25dfdbff, {{}, {}, {0x8, 0x2, 0x8000}}, ["", "", "", "", "", "", "", "", ""]}, 0x24}, 0x1, 0x0, 0x0, 0x20000000}, 0x10000080) syslog(0x3, 0x0, 0x0) 10:11:03 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000040)={0x2, &(0x7f0000000000)=[{0x15}, {0x0, 0x0, 0x0, 0x3400}]}) 10:11:03 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext3\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000480)=ANY=[@ANYBLOB='lazytime,test_dummy_encryption,max_dir_size_kb=0x000000000200,grpjquota=,min_batc,_time=0x00000000000003ff,rootcontext\a']) 10:11:03 executing program 2: r0 = add_key$fscrypt_v1(&(0x7f00000005c0), &(0x7f0000000180)={'fscrypt:', @desc3}, &(0x7f00000001c0)={0x0, "8a1cd41b41f438d3cf38ba5192ddf382e4f66b50b19696b3b6385e06c42a03f9589e59292f72da27de4450efc9695253e5720fc4d1d4edaf02e3a8b240c5bd3f", 0x3f}, 0x48, 0xfffffffffffffffa) keyctl$KEYCTL_MOVE(0x1e, 0x0, r0, r0, 0x1) syz_mount_image$ext4(0x0, &(0x7f0000000440)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) openat$dir(0xffffffffffffff9c, &(0x7f0000000300)='./file0\x00', 0x92100, 0x0) unlinkat(0xffffffffffffff9c, &(0x7f0000000100)='./file0\x00', 0x200) openat$dir(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x2001, 0x103) add_key$keyring(&(0x7f0000000240), &(0x7f0000000280)={'syz', 0x0}, 0x0, 0x0, 0x0) clock_gettime(0x0, &(0x7f0000000080)) delete_module(&(0x7f00000002c0)='\x00', 0x800) 10:11:03 executing program 5: syz_mount_image$ext4(&(0x7f0000000480)='ext3\x00', &(0x7f00000004c0)='./file0\x00', 0x0, 0x0, 0x0, 0x1020, &(0x7f00000007c0)={[], [{@fscontext={'fscontext', 0x3d, 'sysadm_u'}}, {@defcontext={'defcontext', 0x3d, 'staff_u'}}]}) 10:11:03 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000040)={0x2, &(0x7f0000000000)=[{0x15}, {0x0, 0x0, 0x0, 0x3500}]}) 10:11:03 executing program 4: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000040)={0x2, &(0x7f0000000000)=[{0x25}, {0x0, 0x0, 0x28}]}) 10:11:03 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext3\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000480)=ANY=[@ANYBLOB='lazytime,test_dummy_encryption,max_dir_size_kb=0x000000000200,grpjquota=,min_batch\"time=0x00000000000003ff,rootcontext\a']) 10:11:03 executing program 1: r0 = add_key$fscrypt_v1(&(0x7f00000005c0), &(0x7f0000000180)={'fscrypt:', @desc3}, &(0x7f00000001c0)={0x0, "8a1cd41b41f438d3cf38ba5192ddf382e4f66b50b19696b3b6385e06c42a03f9589e59292f72da27de4450efc9695253e5720fc4d1d4edaf02e3a8b240c5bd3f", 0x3f}, 0x48, 0xfffffffffffffffa) keyctl$KEYCTL_MOVE(0x1e, 0x0, r0, r0, 0x1) syz_mount_image$ext4(0x0, &(0x7f0000000440)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) openat$dir(0xffffffffffffff9c, &(0x7f0000000300)='./file0\x00', 0x92100, 0x0) unlinkat(0xffffffffffffff9c, &(0x7f0000000100)='./file0\x00', 0x200) openat$dir(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x2001, 0x103) add_key$keyring(&(0x7f0000000240), &(0x7f0000000280)={'syz', 0x0}, 0x0, 0x0, 0x0) clock_gettime(0x0, &(0x7f0000000080)) delete_module(&(0x7f00000002c0)='\x00', 0x800) r1 = openat$vcsu(0xffffffffffffff9c, &(0x7f0000000340), 0x301, 0x0) ioctl$PTP_ENABLE_PPS(r1, 0x40043d04, 0x1) sendmsg$TIPC_CMD_SET_NETID(r1, &(0x7f0000000400)={&(0x7f0000000340)={0x10, 0x0, 0x0, 0x2000}, 0xc, &(0x7f00000003c0)={&(0x7f0000000380)={0x24, 0x0, 0x4, 0x70bd28, 0x25dfdbff, {{}, {}, {0x8, 0x2, 0x8000}}, ["", "", "", "", "", "", "", "", ""]}, 0x24}, 0x1, 0x0, 0x0, 0x20000000}, 0x10000080) 10:11:03 executing program 2: r0 = add_key$fscrypt_v1(&(0x7f00000005c0), &(0x7f0000000180)={'fscrypt:', @desc3}, &(0x7f00000001c0)={0x0, "8a1cd41b41f438d3cf38ba5192ddf382e4f66b50b19696b3b6385e06c42a03f9589e59292f72da27de4450efc9695253e5720fc4d1d4edaf02e3a8b240c5bd3f", 0x3f}, 0x48, 0xfffffffffffffffa) keyctl$KEYCTL_MOVE(0x1e, 0x0, r0, r0, 0x1) syz_mount_image$ext4(0x0, &(0x7f0000000440)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) openat$dir(0xffffffffffffff9c, &(0x7f0000000300)='./file0\x00', 0x92100, 0x0) unlinkat(0xffffffffffffff9c, &(0x7f0000000100)='./file0\x00', 0x200) openat$dir(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x2001, 0x103) add_key$keyring(&(0x7f0000000240), &(0x7f0000000280)={'syz', 0x0}, 0x0, 0x0, 0x0) clock_gettime(0x0, &(0x7f0000000080)) 10:11:03 executing program 5: syz_mount_image$ext4(&(0x7f0000000480)='ext3\x00', &(0x7f00000004c0)='./file0\x00', 0x0, 0x0, 0x0, 0x1020, &(0x7f00000007c0)={[], [{@fscontext={'fscontext', 0x3d, 'sysadm_u'}}, {@defcontext={'defcontext', 0x3d, 'staff_u'}}]}) 10:11:03 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000040)={0x2, &(0x7f0000000000)=[{0x15}, {0x0, 0x0, 0x0, 0x3d00}]}) 10:11:03 executing program 4: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000040)={0x2, &(0x7f0000000000)=[{0x25}, {0x0, 0x0, 0x29}]}) 10:11:03 executing program 5: syz_mount_image$ext4(0x0, &(0x7f00000004c0)='./file0\x00', 0x0, 0x0, 0x0, 0x1020, &(0x7f00000007c0)={[], [{@fscontext={'fscontext', 0x3d, 'sysadm_u'}}, {@defcontext={'defcontext', 0x3d, 'staff_u'}}]}) 10:11:03 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext3\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000480)=ANY=[@ANYBLOB='lazytime,test_dummy_encryption,max_dir_size_kb=0x000000000200,grpjquota=,min_batch,time=0x00000000000003ff,rootcontext\a']) 10:11:03 executing program 2: r0 = add_key$fscrypt_v1(&(0x7f00000005c0), &(0x7f0000000180)={'fscrypt:', @desc3}, &(0x7f00000001c0)={0x0, "8a1cd41b41f438d3cf38ba5192ddf382e4f66b50b19696b3b6385e06c42a03f9589e59292f72da27de4450efc9695253e5720fc4d1d4edaf02e3a8b240c5bd3f", 0x3f}, 0x48, 0xfffffffffffffffa) keyctl$KEYCTL_MOVE(0x1e, 0x0, r0, r0, 0x1) syz_mount_image$ext4(0x0, &(0x7f0000000440)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) openat$dir(0xffffffffffffff9c, &(0x7f0000000300)='./file0\x00', 0x92100, 0x0) unlinkat(0xffffffffffffff9c, &(0x7f0000000100)='./file0\x00', 0x200) openat$dir(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x2001, 0x103) add_key$keyring(&(0x7f0000000240), &(0x7f0000000280)={'syz', 0x0}, 0x0, 0x0, 0x0) 10:11:03 executing program 1: r0 = add_key$fscrypt_v1(&(0x7f00000005c0), &(0x7f0000000180)={'fscrypt:', @desc3}, &(0x7f00000001c0)={0x0, "8a1cd41b41f438d3cf38ba5192ddf382e4f66b50b19696b3b6385e06c42a03f9589e59292f72da27de4450efc9695253e5720fc4d1d4edaf02e3a8b240c5bd3f", 0x3f}, 0x48, 0xfffffffffffffffa) keyctl$KEYCTL_MOVE(0x1e, 0x0, r0, r0, 0x1) syz_mount_image$ext4(0x0, &(0x7f0000000440)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) openat$dir(0xffffffffffffff9c, &(0x7f0000000300)='./file0\x00', 0x92100, 0x0) unlinkat(0xffffffffffffff9c, &(0x7f0000000100)='./file0\x00', 0x200) openat$dir(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x2001, 0x103) add_key$keyring(&(0x7f0000000240), &(0x7f0000000280)={'syz', 0x0}, 0x0, 0x0, 0x0) clock_gettime(0x0, &(0x7f0000000080)) delete_module(&(0x7f00000002c0)='\x00', 0x800) r1 = openat$vcsu(0xffffffffffffff9c, &(0x7f0000000340), 0x301, 0x0) ioctl$PTP_ENABLE_PPS(r1, 0x40043d04, 0x1) 10:11:03 executing program 4: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000040)={0x2, &(0x7f0000000000)=[{0x25}, {0x0, 0x0, 0x2d}]}) 10:11:03 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000040)={0x2, &(0x7f0000000000)=[{0x15}, {0x0, 0x0, 0x0, 0x4500}]}) 10:11:03 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext3\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000480)=ANY=[@ANYBLOB='lazytime,test_dummy_encryption,max_dir_size_kb=0x000000000200,grpjquota=,min_batch_\"ime=0x00000000000003ff,rootcontext\a']) 10:11:03 executing program 5: syz_mount_image$ext4(0x0, &(0x7f00000004c0)='./file0\x00', 0x0, 0x0, 0x0, 0x1020, &(0x7f00000007c0)={[], [{@fscontext={'fscontext', 0x3d, 'sysadm_u'}}, {@defcontext={'defcontext', 0x3d, 'staff_u'}}]}) 10:11:03 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000040)={0x2, &(0x7f0000000000)=[{0x15}, {0x0, 0x0, 0x0, 0x4d00}]}) 10:11:03 executing program 1: r0 = add_key$fscrypt_v1(&(0x7f00000005c0), &(0x7f0000000180)={'fscrypt:', @desc3}, &(0x7f00000001c0)={0x0, "8a1cd41b41f438d3cf38ba5192ddf382e4f66b50b19696b3b6385e06c42a03f9589e59292f72da27de4450efc9695253e5720fc4d1d4edaf02e3a8b240c5bd3f", 0x3f}, 0x48, 0xfffffffffffffffa) keyctl$KEYCTL_MOVE(0x1e, 0x0, r0, r0, 0x1) syz_mount_image$ext4(0x0, &(0x7f0000000440)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) openat$dir(0xffffffffffffff9c, &(0x7f0000000300)='./file0\x00', 0x92100, 0x0) unlinkat(0xffffffffffffff9c, &(0x7f0000000100)='./file0\x00', 0x200) openat$dir(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x2001, 0x103) add_key$keyring(&(0x7f0000000240), &(0x7f0000000280)={'syz', 0x0}, 0x0, 0x0, 0x0) clock_gettime(0x0, &(0x7f0000000080)) delete_module(&(0x7f00000002c0)='\x00', 0x800) openat$vcsu(0xffffffffffffff9c, &(0x7f0000000340), 0x301, 0x0) 10:11:03 executing program 2: r0 = add_key$fscrypt_v1(&(0x7f00000005c0), &(0x7f0000000180)={'fscrypt:', @desc3}, &(0x7f00000001c0)={0x0, "8a1cd41b41f438d3cf38ba5192ddf382e4f66b50b19696b3b6385e06c42a03f9589e59292f72da27de4450efc9695253e5720fc4d1d4edaf02e3a8b240c5bd3f", 0x3f}, 0x48, 0xfffffffffffffffa) keyctl$KEYCTL_MOVE(0x1e, 0x0, r0, r0, 0x1) syz_mount_image$ext4(0x0, &(0x7f0000000440)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) openat$dir(0xffffffffffffff9c, &(0x7f0000000300)='./file0\x00', 0x92100, 0x0) unlinkat(0xffffffffffffff9c, &(0x7f0000000100)='./file0\x00', 0x200) openat$dir(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x2001, 0x103) 10:11:03 executing program 4: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000040)={0x2, &(0x7f0000000000)=[{0x25}, {0x0, 0x0, 0x30}]}) 10:11:03 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext3\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000480)=ANY=[@ANYBLOB='lazytime,test_dummy_encryption,max_dir_size_kb=0x000000000200,grpjquota=,min_batch_,ime=0x00000000000003ff,rootcontext\a']) 10:11:03 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000040)={0x2, &(0x7f0000000000)=[{0x15}, {0x0, 0x0, 0x0, 0x6000}]}) 10:11:03 executing program 5: syz_mount_image$ext4(0x0, &(0x7f00000004c0)='./file0\x00', 0x0, 0x0, 0x0, 0x1020, &(0x7f00000007c0)={[], [{@fscontext={'fscontext', 0x3d, 'sysadm_u'}}, {@defcontext={'defcontext', 0x3d, 'staff_u'}}]}) 10:11:03 executing program 1: r0 = add_key$fscrypt_v1(&(0x7f00000005c0), &(0x7f0000000180)={'fscrypt:', @desc3}, &(0x7f00000001c0)={0x0, "8a1cd41b41f438d3cf38ba5192ddf382e4f66b50b19696b3b6385e06c42a03f9589e59292f72da27de4450efc9695253e5720fc4d1d4edaf02e3a8b240c5bd3f", 0x3f}, 0x48, 0xfffffffffffffffa) keyctl$KEYCTL_MOVE(0x1e, 0x0, r0, r0, 0x1) syz_mount_image$ext4(0x0, &(0x7f0000000440)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) openat$dir(0xffffffffffffff9c, &(0x7f0000000300)='./file0\x00', 0x92100, 0x0) unlinkat(0xffffffffffffff9c, &(0x7f0000000100)='./file0\x00', 0x200) openat$dir(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x2001, 0x103) add_key$keyring(&(0x7f0000000240), &(0x7f0000000280)={'syz', 0x0}, 0x0, 0x0, 0x0) clock_gettime(0x0, &(0x7f0000000080)) delete_module(&(0x7f00000002c0)='\x00', 0x800) 10:11:03 executing program 2: r0 = add_key$fscrypt_v1(&(0x7f00000005c0), &(0x7f0000000180)={'fscrypt:', @desc3}, &(0x7f00000001c0)={0x0, "8a1cd41b41f438d3cf38ba5192ddf382e4f66b50b19696b3b6385e06c42a03f9589e59292f72da27de4450efc9695253e5720fc4d1d4edaf02e3a8b240c5bd3f", 0x3f}, 0x48, 0xfffffffffffffffa) keyctl$KEYCTL_MOVE(0x1e, 0x0, r0, r0, 0x1) syz_mount_image$ext4(0x0, &(0x7f0000000440)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) openat$dir(0xffffffffffffff9c, &(0x7f0000000300)='./file0\x00', 0x92100, 0x0) unlinkat(0xffffffffffffff9c, &(0x7f0000000100)='./file0\x00', 0x200) 10:11:03 executing program 4: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000040)={0x2, &(0x7f0000000000)=[{0x25}, {0x0, 0x0, 0x34}]}) 10:11:03 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext3\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000480)=ANY=[@ANYBLOB='lazytime,test_dummy_encryption,max_dir_size_kb=0x000000000200,grpjquota=,min_batch_t\"me=0x00000000000003ff,rootcontext\a']) 10:11:03 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000040)={0x2, &(0x7f0000000000)=[{0x15}, {0x0, 0x0, 0x0, 0x6100}]}) 10:11:03 executing program 1: r0 = add_key$fscrypt_v1(&(0x7f00000005c0), &(0x7f0000000180)={'fscrypt:', @desc3}, &(0x7f00000001c0)={0x0, "8a1cd41b41f438d3cf38ba5192ddf382e4f66b50b19696b3b6385e06c42a03f9589e59292f72da27de4450efc9695253e5720fc4d1d4edaf02e3a8b240c5bd3f", 0x3f}, 0x48, 0xfffffffffffffffa) keyctl$KEYCTL_MOVE(0x1e, 0x0, r0, r0, 0x1) syz_mount_image$ext4(0x0, &(0x7f0000000440)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) openat$dir(0xffffffffffffff9c, &(0x7f0000000300)='./file0\x00', 0x92100, 0x0) unlinkat(0xffffffffffffff9c, &(0x7f0000000100)='./file0\x00', 0x200) openat$dir(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x2001, 0x103) add_key$keyring(&(0x7f0000000240), &(0x7f0000000280)={'syz', 0x0}, 0x0, 0x0, 0x0) clock_gettime(0x0, &(0x7f0000000080)) 10:11:03 executing program 4: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000040)={0x2, &(0x7f0000000000)=[{0x25}, {0x0, 0x0, 0x35}]}) 10:11:03 executing program 5: syz_mount_image$ext4(&(0x7f0000000480)='ext3\x00', 0x0, 0x0, 0x0, 0x0, 0x1020, &(0x7f00000007c0)={[], [{@fscontext={'fscontext', 0x3d, 'sysadm_u'}}, {@defcontext={'defcontext', 0x3d, 'staff_u'}}]}) 10:11:03 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000040)={0x2, &(0x7f0000000000)=[{0x15}, {0x0, 0x0, 0x0, 0x6400}]}) 10:11:03 executing program 2: r0 = add_key$fscrypt_v1(&(0x7f00000005c0), &(0x7f0000000180)={'fscrypt:', @desc3}, &(0x7f00000001c0)={0x0, "8a1cd41b41f438d3cf38ba5192ddf382e4f66b50b19696b3b6385e06c42a03f9589e59292f72da27de4450efc9695253e5720fc4d1d4edaf02e3a8b240c5bd3f", 0x3f}, 0x48, 0xfffffffffffffffa) keyctl$KEYCTL_MOVE(0x1e, 0x0, r0, r0, 0x1) syz_mount_image$ext4(0x0, &(0x7f0000000440)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) unlinkat(0xffffffffffffff9c, &(0x7f0000000100)='./file0\x00', 0x200) 10:11:03 executing program 1: r0 = add_key$fscrypt_v1(&(0x7f00000005c0), &(0x7f0000000180)={'fscrypt:', @desc3}, &(0x7f00000001c0)={0x0, "8a1cd41b41f438d3cf38ba5192ddf382e4f66b50b19696b3b6385e06c42a03f9589e59292f72da27de4450efc9695253e5720fc4d1d4edaf02e3a8b240c5bd3f", 0x3f}, 0x48, 0xfffffffffffffffa) keyctl$KEYCTL_MOVE(0x1e, 0x0, r0, r0, 0x1) syz_mount_image$ext4(0x0, &(0x7f0000000440)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) openat$dir(0xffffffffffffff9c, &(0x7f0000000300)='./file0\x00', 0x92100, 0x0) unlinkat(0xffffffffffffff9c, &(0x7f0000000100)='./file0\x00', 0x200) openat$dir(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x2001, 0x103) add_key$keyring(&(0x7f0000000240), &(0x7f0000000280)={'syz', 0x0}, 0x0, 0x0, 0x0) 10:11:03 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext3\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000480)=ANY=[@ANYBLOB='lazytime,test_dummy_encryption,max_dir_size_kb=0x000000000200,grpjquota=,min_batch_t,me=0x00000000000003ff,rootcontext\a']) 10:11:03 executing program 4: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000040)={0x2, &(0x7f0000000000)=[{0x25}, {0x0, 0x0, 0x3d}]}) 10:11:03 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000040)={0x2, &(0x7f0000000000)=[{0x15}, {0x0, 0x0, 0x0, 0x7400}]}) 10:11:03 executing program 5: syz_mount_image$ext4(&(0x7f0000000480)='ext3\x00', 0x0, 0x0, 0x0, 0x0, 0x1020, &(0x7f00000007c0)={[], [{@fscontext={'fscontext', 0x3d, 'sysadm_u'}}, {@defcontext={'defcontext', 0x3d, 'staff_u'}}]}) 10:11:03 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext3\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000480)=ANY=[@ANYBLOB='lazytime,test_dummy_encryption,max_dir_size_kb=0x000000000200,grpjquota=,min_batch_ti\"e=0x00000000000003ff,rootcontext\a']) 10:11:03 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000040)={0x2, &(0x7f0000000000)=[{0x15}, {0x0, 0x0, 0x0, 0x9400}]}) 10:11:03 executing program 1: r0 = add_key$fscrypt_v1(&(0x7f00000005c0), &(0x7f0000000180)={'fscrypt:', @desc3}, &(0x7f00000001c0)={0x0, "8a1cd41b41f438d3cf38ba5192ddf382e4f66b50b19696b3b6385e06c42a03f9589e59292f72da27de4450efc9695253e5720fc4d1d4edaf02e3a8b240c5bd3f", 0x3f}, 0x48, 0xfffffffffffffffa) keyctl$KEYCTL_MOVE(0x1e, 0x0, r0, r0, 0x1) syz_mount_image$ext4(0x0, &(0x7f0000000440)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) openat$dir(0xffffffffffffff9c, &(0x7f0000000300)='./file0\x00', 0x92100, 0x0) unlinkat(0xffffffffffffff9c, &(0x7f0000000100)='./file0\x00', 0x200) openat$dir(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x2001, 0x103) 10:11:03 executing program 4: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000040)={0x2, &(0x7f0000000000)=[{0x25}, {0x0, 0x0, 0x45}]}) 10:11:03 executing program 2: r0 = add_key$fscrypt_v1(&(0x7f00000005c0), &(0x7f0000000180)={'fscrypt:', @desc3}, &(0x7f00000001c0)={0x0, "8a1cd41b41f438d3cf38ba5192ddf382e4f66b50b19696b3b6385e06c42a03f9589e59292f72da27de4450efc9695253e5720fc4d1d4edaf02e3a8b240c5bd3f", 0x3f}, 0x48, 0xfffffffffffffffa) keyctl$KEYCTL_MOVE(0x1e, 0x0, r0, r0, 0x1) syz_mount_image$ext4(0x0, &(0x7f0000000440)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) unlinkat(0xffffffffffffff9c, &(0x7f0000000100)='./file0\x00', 0x200) 10:11:03 executing program 5: syz_mount_image$ext4(&(0x7f0000000480)='ext3\x00', 0x0, 0x0, 0x0, 0x0, 0x1020, &(0x7f00000007c0)={[], [{@fscontext={'fscontext', 0x3d, 'sysadm_u'}}, {@defcontext={'defcontext', 0x3d, 'staff_u'}}]}) 10:11:03 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext3\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000480)=ANY=[@ANYBLOB='lazytime,test_dummy_encryption,max_dir_size_kb=0x000000000200,grpjquota=,min_batch_ti,e=0x00000000000003ff,rootcontext\a']) 10:11:03 executing program 4: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000040)={0x2, &(0x7f0000000000)=[{0x25}, {0x0, 0x0, 0x4d}]}) 10:11:03 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000040)={0x2, &(0x7f0000000000)=[{0x15}, {0x0, 0x0, 0x0, 0xb100}]}) 10:11:03 executing program 1: r0 = add_key$fscrypt_v1(&(0x7f00000005c0), &(0x7f0000000180)={'fscrypt:', @desc3}, &(0x7f00000001c0)={0x0, "8a1cd41b41f438d3cf38ba5192ddf382e4f66b50b19696b3b6385e06c42a03f9589e59292f72da27de4450efc9695253e5720fc4d1d4edaf02e3a8b240c5bd3f", 0x3f}, 0x48, 0xfffffffffffffffa) keyctl$KEYCTL_MOVE(0x1e, 0x0, r0, r0, 0x1) syz_mount_image$ext4(0x0, &(0x7f0000000440)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) openat$dir(0xffffffffffffff9c, &(0x7f0000000300)='./file0\x00', 0x92100, 0x0) unlinkat(0xffffffffffffff9c, &(0x7f0000000100)='./file0\x00', 0x200) 10:11:03 executing program 2: r0 = add_key$fscrypt_v1(&(0x7f00000005c0), &(0x7f0000000180)={'fscrypt:', @desc3}, &(0x7f00000001c0)={0x0, "8a1cd41b41f438d3cf38ba5192ddf382e4f66b50b19696b3b6385e06c42a03f9589e59292f72da27de4450efc9695253e5720fc4d1d4edaf02e3a8b240c5bd3f", 0x3f}, 0x48, 0xfffffffffffffffa) keyctl$KEYCTL_MOVE(0x1e, 0x0, r0, r0, 0x1) syz_mount_image$ext4(0x0, &(0x7f0000000440)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) unlinkat(0xffffffffffffff9c, &(0x7f0000000100)='./file0\x00', 0x200) 10:11:03 executing program 5: syz_mount_image$ext4(&(0x7f0000000480)='ext3\x00', &(0x7f00000004c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000007c0)={[], [{@fscontext={'fscontext', 0x3d, 'sysadm_u'}}, {@defcontext={'defcontext', 0x3d, 'staff_u'}}]}) 10:11:03 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000040)={0x2, &(0x7f0000000000)=[{0x15}, {0x0, 0x0, 0x0, 0x200000}]}) 10:11:03 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext3\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000480)=ANY=[@ANYBLOB='lazytime,test_dummy_encryption,max_dir_size_kb=0x000000000200,grpjquota=,min_batch_tim\"=0x00000000000003ff,rootcontext\a']) 10:11:03 executing program 4: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000040)={0x2, &(0x7f0000000000)=[{0x25}, {0x0, 0x0, 0x60}]}) 10:11:03 executing program 1: r0 = add_key$fscrypt_v1(&(0x7f00000005c0), &(0x7f0000000180)={'fscrypt:', @desc3}, &(0x7f00000001c0)={0x0, "8a1cd41b41f438d3cf38ba5192ddf382e4f66b50b19696b3b6385e06c42a03f9589e59292f72da27de4450efc9695253e5720fc4d1d4edaf02e3a8b240c5bd3f", 0x3f}, 0x48, 0xfffffffffffffffa) keyctl$KEYCTL_MOVE(0x1e, 0x0, r0, r0, 0x1) syz_mount_image$ext4(0x0, &(0x7f0000000440)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) unlinkat(0xffffffffffffff9c, &(0x7f0000000100)='./file0\x00', 0x200) 10:11:03 executing program 5: syz_mount_image$ext4(&(0x7f0000000480)='ext3\x00', &(0x7f00000004c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000007c0)={[], [{@fscontext={'fscontext', 0x3d, 'sysadm_u'}}, {@defcontext={'defcontext', 0x3d, 'staff_u'}}]}) 10:11:03 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000040)={0x2, &(0x7f0000000000)=[{0x15}, {0x0, 0x0, 0x0, 0x1000000}]}) 10:11:03 executing program 2: r0 = add_key$fscrypt_v1(&(0x7f00000005c0), &(0x7f0000000180)={'fscrypt:', @desc3}, &(0x7f00000001c0)={0x0, "8a1cd41b41f438d3cf38ba5192ddf382e4f66b50b19696b3b6385e06c42a03f9589e59292f72da27de4450efc9695253e5720fc4d1d4edaf02e3a8b240c5bd3f", 0x3f}, 0x48, 0xfffffffffffffffa) keyctl$KEYCTL_MOVE(0x1e, 0x0, r0, r0, 0x1) openat$dir(0xffffffffffffff9c, &(0x7f0000000300)='./file0\x00', 0x92100, 0x0) unlinkat(0xffffffffffffff9c, &(0x7f0000000100)='./file0\x00', 0x200) 10:11:04 executing program 4: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000040)={0x2, &(0x7f0000000000)=[{0x25}, {0x0, 0x0, 0x61}]}) 10:11:04 executing program 1: r0 = add_key$fscrypt_v1(&(0x7f00000005c0), &(0x7f0000000180)={'fscrypt:', @desc3}, &(0x7f00000001c0)={0x0, "8a1cd41b41f438d3cf38ba5192ddf382e4f66b50b19696b3b6385e06c42a03f9589e59292f72da27de4450efc9695253e5720fc4d1d4edaf02e3a8b240c5bd3f", 0x3f}, 0x48, 0xfffffffffffffffa) keyctl$KEYCTL_MOVE(0x1e, 0x0, r0, r0, 0x1) syz_mount_image$ext4(0x0, &(0x7f0000000440)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) unlinkat(0xffffffffffffff9c, &(0x7f0000000100)='./file0\x00', 0x200) 10:11:04 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext3\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000480)=ANY=[@ANYBLOB='lazytime,test_dummy_encryption,max_dir_size_kb=0x000000000200,grpjquota=,min_batch_tim,=0x00000000000003ff,rootcontext\a']) 10:11:04 executing program 5: syz_mount_image$ext4(&(0x7f0000000480)='ext3\x00', &(0x7f00000004c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000007c0)={[], [{@fscontext={'fscontext', 0x3d, 'sysadm_u'}}, {@defcontext={'defcontext', 0x3d, 'staff_u'}}]}) 10:11:04 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000040)={0x2, &(0x7f0000000000)=[{0x15}, {0x0, 0x0, 0x0, 0x2000000}]}) 10:11:04 executing program 2: r0 = add_key$fscrypt_v1(&(0x7f00000005c0), &(0x7f0000000180)={'fscrypt:', @desc3}, &(0x7f00000001c0)={0x0, "8a1cd41b41f438d3cf38ba5192ddf382e4f66b50b19696b3b6385e06c42a03f9589e59292f72da27de4450efc9695253e5720fc4d1d4edaf02e3a8b240c5bd3f", 0x3f}, 0x48, 0xfffffffffffffffa) keyctl$KEYCTL_MOVE(0x1e, 0x0, r0, r0, 0x1) openat$dir(0xffffffffffffff9c, &(0x7f0000000300)='./file0\x00', 0x92100, 0x0) unlinkat(0xffffffffffffff9c, &(0x7f0000000100)='./file0\x00', 0x200) 10:11:04 executing program 4: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000040)={0x2, &(0x7f0000000000)=[{0x25}, {0x0, 0x0, 0x64}]}) 10:11:04 executing program 5: syz_mount_image$ext4(&(0x7f0000000480)='ext3\x00', &(0x7f00000004c0)='./file0\x00', 0x0, 0x0, 0x0, 0x1020, 0x0) 10:11:04 executing program 1: r0 = add_key$fscrypt_v1(&(0x7f00000005c0), &(0x7f0000000180)={'fscrypt:', @desc3}, &(0x7f00000001c0)={0x0, "8a1cd41b41f438d3cf38ba5192ddf382e4f66b50b19696b3b6385e06c42a03f9589e59292f72da27de4450efc9695253e5720fc4d1d4edaf02e3a8b240c5bd3f", 0x3f}, 0x48, 0xfffffffffffffffa) keyctl$KEYCTL_MOVE(0x1e, 0x0, r0, r0, 0x1) syz_mount_image$ext4(0x0, &(0x7f0000000440)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) unlinkat(0xffffffffffffff9c, &(0x7f0000000100)='./file0\x00', 0x200) 10:11:04 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext3\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000480)=ANY=[@ANYBLOB='lazytime,test_dummy_encryption,max_dir_size_kb=0x000000000200,grpjquota=,min_batch_time\"0x00000000000003ff,rootcontext\a']) 10:11:04 executing program 2: r0 = add_key$fscrypt_v1(&(0x7f00000005c0), &(0x7f0000000180)={'fscrypt:', @desc3}, &(0x7f00000001c0)={0x0, "8a1cd41b41f438d3cf38ba5192ddf382e4f66b50b19696b3b6385e06c42a03f9589e59292f72da27de4450efc9695253e5720fc4d1d4edaf02e3a8b240c5bd3f", 0x3f}, 0x48, 0xfffffffffffffffa) keyctl$KEYCTL_MOVE(0x1e, 0x0, r0, r0, 0x1) openat$dir(0xffffffffffffff9c, &(0x7f0000000300)='./file0\x00', 0x92100, 0x0) unlinkat(0xffffffffffffff9c, &(0x7f0000000100)='./file0\x00', 0x200) 10:11:04 executing program 4: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000040)={0x2, &(0x7f0000000000)=[{0x25}, {0x0, 0x0, 0x74}]}) 10:11:04 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000040)={0x2, &(0x7f0000000000)=[{0x15}, {0x0, 0x0, 0x0, 0x3000000}]}) 10:11:04 executing program 5: syz_mount_image$ext4(&(0x7f0000000480)='ext3\x00', &(0x7f00000004c0)='./file0\x00', 0x0, 0x0, 0x0, 0x1020, 0x0) 10:11:04 executing program 1: r0 = add_key$fscrypt_v1(&(0x7f00000005c0), &(0x7f0000000180)={'fscrypt:', @desc3}, &(0x7f00000001c0)={0x0, "8a1cd41b41f438d3cf38ba5192ddf382e4f66b50b19696b3b6385e06c42a03f9589e59292f72da27de4450efc9695253e5720fc4d1d4edaf02e3a8b240c5bd3f", 0x3f}, 0x48, 0xfffffffffffffffa) keyctl$KEYCTL_MOVE(0x1e, 0x0, r0, r0, 0x1) openat$dir(0xffffffffffffff9c, &(0x7f0000000300)='./file0\x00', 0x92100, 0x0) unlinkat(0xffffffffffffff9c, &(0x7f0000000100)='./file0\x00', 0x200) 10:11:04 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext3\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000480)=ANY=[@ANYBLOB='lazytime,test_dummy_encryption,max_dir_size_kb=0x000000000200,grpjquota=,min_batch_time,0x00000000000003ff,rootcontext\a']) 10:11:04 executing program 4: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000040)={0x2, &(0x7f0000000000)=[{0x25}, {0x0, 0x0, 0x94}]}) 10:11:04 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000040)={0x2, &(0x7f0000000000)=[{0x15}, {0x0, 0x0, 0x0, 0x5000000}]}) 10:11:04 executing program 2: add_key$fscrypt_v1(&(0x7f00000005c0), &(0x7f0000000180)={'fscrypt:', @desc3}, &(0x7f00000001c0)={0x0, "8a1cd41b41f438d3cf38ba5192ddf382e4f66b50b19696b3b6385e06c42a03f9589e59292f72da27de4450efc9695253e5720fc4d1d4edaf02e3a8b240c5bd3f", 0x3f}, 0x48, 0xfffffffffffffffa) syz_mount_image$ext4(0x0, &(0x7f0000000440)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) openat$dir(0xffffffffffffff9c, &(0x7f0000000300)='./file0\x00', 0x92100, 0x0) unlinkat(0xffffffffffffff9c, &(0x7f0000000100)='./file0\x00', 0x200) 10:11:04 executing program 1: r0 = add_key$fscrypt_v1(&(0x7f00000005c0), &(0x7f0000000180)={'fscrypt:', @desc3}, &(0x7f00000001c0)={0x0, "8a1cd41b41f438d3cf38ba5192ddf382e4f66b50b19696b3b6385e06c42a03f9589e59292f72da27de4450efc9695253e5720fc4d1d4edaf02e3a8b240c5bd3f", 0x3f}, 0x48, 0xfffffffffffffffa) keyctl$KEYCTL_MOVE(0x1e, 0x0, r0, r0, 0x1) openat$dir(0xffffffffffffff9c, &(0x7f0000000300)='./file0\x00', 0x92100, 0x0) unlinkat(0xffffffffffffff9c, &(0x7f0000000100)='./file0\x00', 0x200) 10:11:04 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext3\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000480)=ANY=[@ANYBLOB='lazytime,test_dummy_encryption,max_dir_size_kb=0x000000000200,grpjquota=,min_batch_time=\"x00000000000003ff,rootcontext\a']) 10:11:04 executing program 5: syz_mount_image$ext4(&(0x7f0000000480)='ext3\x00', &(0x7f00000004c0)='./file0\x00', 0x0, 0x0, 0x0, 0x1020, 0x0) 10:11:04 executing program 4: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000040)={0x2, &(0x7f0000000000)=[{0x25}, {0x0, 0x0, 0xb1}]}) 10:11:04 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000040)={0x2, &(0x7f0000000000)=[{0x15}, {0x0, 0x0, 0x0, 0x6000000}]}) 10:11:04 executing program 1: r0 = add_key$fscrypt_v1(&(0x7f00000005c0), &(0x7f0000000180)={'fscrypt:', @desc3}, &(0x7f00000001c0)={0x0, "8a1cd41b41f438d3cf38ba5192ddf382e4f66b50b19696b3b6385e06c42a03f9589e59292f72da27de4450efc9695253e5720fc4d1d4edaf02e3a8b240c5bd3f", 0x3f}, 0x48, 0xfffffffffffffffa) keyctl$KEYCTL_MOVE(0x1e, 0x0, r0, r0, 0x1) openat$dir(0xffffffffffffff9c, &(0x7f0000000300)='./file0\x00', 0x92100, 0x0) unlinkat(0xffffffffffffff9c, &(0x7f0000000100)='./file0\x00', 0x200) 10:11:04 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext3\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000480)=ANY=[@ANYBLOB='lazytime,test_dummy_encryption,max_dir_size_kb=0x000000000200,grpjquota=,min_batch_time=,x00000000000003ff,rootcontext\a']) 10:11:04 executing program 2: syz_mount_image$ext4(0x0, &(0x7f0000000440)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) openat$dir(0xffffffffffffff9c, &(0x7f0000000300)='./file0\x00', 0x92100, 0x0) unlinkat(0xffffffffffffff9c, &(0x7f0000000100)='./file0\x00', 0x200) 10:11:04 executing program 5: syz_mount_image$ext4(&(0x7f0000000480)='ext3\x00', &(0x7f00000004c0)='./file0\x00', 0x0, 0x0, 0x0, 0x1020, &(0x7f00000007c0)={[], [{@fscontext={'fscontext', 0x3d, 'sysadm_u'}}]}) 10:11:04 executing program 4: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000040)={0x2, &(0x7f0000000000)=[{0x25}, {}]}) 10:11:04 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000040)={0x2, &(0x7f0000000000)=[{0x15}, {0x0, 0x0, 0x0, 0x7000000}]}) 10:11:04 executing program 1: add_key$fscrypt_v1(&(0x7f00000005c0), &(0x7f0000000180)={'fscrypt:', @desc3}, &(0x7f00000001c0)={0x0, "8a1cd41b41f438d3cf38ba5192ddf382e4f66b50b19696b3b6385e06c42a03f9589e59292f72da27de4450efc9695253e5720fc4d1d4edaf02e3a8b240c5bd3f", 0x3f}, 0x48, 0xfffffffffffffffa) syz_mount_image$ext4(0x0, &(0x7f0000000440)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) openat$dir(0xffffffffffffff9c, &(0x7f0000000300)='./file0\x00', 0x92100, 0x0) unlinkat(0xffffffffffffff9c, &(0x7f0000000100)='./file0\x00', 0x200) 10:11:04 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext3\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000480)=ANY=[@ANYBLOB='lazytime,test_dummy_encryption,max_dir_size_kb=0x000000000200,grpjquota=,min_batch_time=0\"00000000000003ff,rootcontext\a']) 10:11:04 executing program 2: syz_mount_image$ext4(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) openat$dir(0xffffffffffffff9c, &(0x7f0000000300)='./file0\x00', 0x92100, 0x0) unlinkat(0xffffffffffffff9c, &(0x7f0000000100)='./file0\x00', 0x200) 10:11:04 executing program 4: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000040)={0x2, &(0x7f0000000000)=[{0x25}, {0x0, 0x0, 0x0, 0x2}]}) 10:11:04 executing program 5: syz_mount_image$ext4(&(0x7f0000000480)='ext3\x00', &(0x7f00000004c0)='./file0\x00', 0x0, 0x0, 0x0, 0x1020, &(0x7f00000007c0)) 10:11:04 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000040)={0x2, &(0x7f0000000000)=[{0x15}, {0x0, 0x0, 0x0, 0x9000000}]}) 10:11:04 executing program 2: syz_mount_image$ext4(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) openat$dir(0xffffffffffffff9c, &(0x7f0000000300)='./file0\x00', 0x92100, 0x0) unlinkat(0xffffffffffffff9c, &(0x7f0000000100)='./file0\x00', 0x200) 10:11:04 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext3\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000480)=ANY=[@ANYBLOB='lazytime,test_dummy_encryption,max_dir_size_kb=0x000000000200,grpjquota=,min_batch_time=0,00000000000003ff,rootcontext\a']) 10:11:04 executing program 1: syz_mount_image$ext4(0x0, &(0x7f0000000440)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) openat$dir(0xffffffffffffff9c, &(0x7f0000000300)='./file0\x00', 0x92100, 0x0) unlinkat(0xffffffffffffff9c, &(0x7f0000000100)='./file0\x00', 0x200) 10:11:04 executing program 4: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000040)={0x2, &(0x7f0000000000)=[{0x25}, {0x0, 0x0, 0x0, 0x3}]}) 10:11:04 executing program 5: r0 = syz_mount_image$ext4(0x0, &(0x7f0000000400)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) openat$dir(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0xb0000, 0x0) clock_gettime(0x0, &(0x7f0000000440)={0x0, 0x0}) futimesat(r0, &(0x7f00000003c0)='./file0/file0\x00', &(0x7f0000000a40)={{0x0, 0x2710}, {r1, r2/1000+10000}}) getresuid(&(0x7f0000000080)=0x0, &(0x7f0000000480), &(0x7f00000004c0)) r4 = syz_mount_image$ext4(&(0x7f0000000040)='ext4\x00', &(0x7f0000000100)='./file0/file0\x00', 0x4, 0x8, &(0x7f0000000980)=[{&(0x7f0000000140)="704565ddcfe997ab342b6a0470ff8226393462be3a000611b2c6d06c2f899497d2252c2f03dabfa75265502541e3acebd2dca5621cf0a2f739bed4bc4533cab0c013fa0601892fff4579663da712681a5ac24712d1c50fe5813d274dc00ed32ff63cd29104e95802891715d156053cd5a87f83c849f99fee0c549f6d7d", 0x7d, 0x528b}, {&(0x7f00000001c0)="5e1df9e321478cf47ed6fc81936357a60a0e1367c2f1e70e0ab5cb4d1ff23b1993", 0x21, 0x3f}, {&(0x7f0000000200)="68b191e4bf726d4d8d3d1ce4bd105de1d1ec7f68cc48a6c4c47434575b2e385cbf50632515c0353da4a8677c4d477eaa4d775380424f3d7f9631fdae8da24343268d91b88db5923793546796725edb3d07bf988f25b3ecc5693f9f5e24e9d3d554f3828f4d9ff2838db5a97fdd403ac1975fbceea2b5a7af98c2d203324258f2305ccd853b1b4069caf19e8041a414ea7a2151fb0833dfda7f35d8aead7004ab394e61a0e3c8c9a1850602e91fe63e8f82c59df14a205f95f49b45e621e58b78541363bba131d3008dbb6e65c3cea2d4dc188eeb073d0a41f043006be563170856d9f5037cdba4c792cd805a8f33", 0xee, 0x7f}, {&(0x7f0000000300)="d1099c588c4bd8030077087333c036c9eb01e3e70debe04d12aa45cfa6d8f825271933b8a3eef70e3bbd6be7084f5ae92561f2a4f0fbfa7158944e68d94123b351ea79c180630480e28c1a0972ca7a67b432956045b1185256655add514ad32c25cbda78d01e6d5e3cd0108fa1e5120382be5a60064681c02bb76136ccbd3e8a51607fe6939cb26d16bc4f9a731dfb2b9e0829fc83b1ea8ef14630f0db303060e48ffc12667de505c056341668", 0xad, 0x8000}, {&(0x7f0000000540)="62e8bf35e07b4e302850795bea8bd6c7f6f3b2bc347fdd807b1a864c8cf27c2ff9c8fc33da1a5cbb8e10cfddc35a7ac2d006d88926f42eb47fd8e97d91c267f438f69284c558230c7feec43c1c4ebe1e7c73651d7400f40a5d0c9885983e9b82e94f75e4c54b1ab3000aac685aaaac7ff3d427571dd6e53a1476dd283ea35d6115c34fe0bf6480256988f41165c21c7b14d7e3253b2051af606ff845edcc63da110723ffd0b378789f35b0797e02a7b47063b0cc1148ba68e9f5", 0xba, 0x400}, {&(0x7f0000000700)="abf185683ce96adf46ac9f263d0795020f25cec7cc3c80d36929ce750ab089ddc86477febdd727e442412d1c3b63113ab680936e3055a3dfce7a554a6f68aad9422a608eb100d79d1795e9df3aee1a8bad2defb60c9b1059c8b6d3b038ba9be4aeb6a5d872cee3f4c86f3f4467a8ba4960375bfde8d597829a572b0fad57304b89a1784b930e5d293350bde833cfb1c6b0f22494f41d0f90a94e1fd17d79dc79ab9f352bab6c93d856c3238ffc01cfe211963361d6029b7ec9638649b4", 0xbd, 0x9}, {&(0x7f00000007c0)="2c6b04510e599f88ec5d272accc6c425d6597ff1560a1afff0820e620f43f18adab89768435ee1ff09d0188c3458eb54c53665dab3766532a9d8953e2ec01bff63c0d7189b87932c70ab38470d419ccca036f29cc288a87f25727e611fb49ce0d5249fa5d62b7ed97a44907252b15a51967c0585875401023b050d3df6f9956900ad486f1518c83307c751cdbcd78b3169a43f4632fce2ad74d117dd426da45342dc895e83762db7b9baf3ccc9278812b29a80a37513a106fd141363d8cef0a82d94e2dc0ef8c5b0", 0xc8, 0x1}, {&(0x7f00000008c0)="33538a4df9edec72784a1b8ee7a72c4154bd45966b7a3524e7c8712b98ae2a7cb5a6c6f2e064493f5289c4fe02bd2cf2eef0e6d2784224de4819ba82797ecd706047045481e3d1c093c0e3f0acef24e9d1a5c41dbb0ea5c9387b64e72cd70f37fce8e6511d0082f963e95846fc527f729f55d0e2ce345d22e4267d00ec5b05a65614da9d00573fe4f44134fa180672c1c135282b040184a42493fc56a49c3f054c40451ce592a28f", 0xa8, 0xffffffffffff7fff}], 0x200c05, &(0x7f0000000600)={[{@resuid={'resuid', 0x3d, r3}}, {@nouid32}, {@data_journal}, {@data_err_abort}, {@auto_da_alloc}], [{@obj_type={'obj_type', 0x3d, '(+'}}, {@pcr={'pcr', 0x3d, 0x3d}}, {@appraise_type}, {@fscontext={'fscontext', 0x3d, 'system_u'}}, {@smackfsdef={'smackfsdef', 0x3d, ':-#]-]::+/%'}}, {@smackfsfloor={'smackfsfloor', 0x3d, 'auto_da_alloc'}}]}) symlinkat(&(0x7f00000000c0)='./file0/file0\x00', r4, &(0x7f0000000500)='./file0/file0\x00') 10:11:04 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000040)={0x2, &(0x7f0000000000)=[{0x15}, {0x0, 0x0, 0x0, 0x15000000}]}) 10:11:04 executing program 1: syz_mount_image$ext4(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) openat$dir(0xffffffffffffff9c, &(0x7f0000000300)='./file0\x00', 0x92100, 0x0) unlinkat(0xffffffffffffff9c, &(0x7f0000000100)='./file0\x00', 0x200) 10:11:04 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext3\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000480)=ANY=[@ANYBLOB='lazytime,test_dummy_encryption,max_dir_size_kb=0x000000000200,grpjquota=,min_batch_time=0x\"0000000000003ff,rootcontext\a']) 10:11:04 executing program 2: syz_mount_image$ext4(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) openat$dir(0xffffffffffffff9c, &(0x7f0000000300)='./file0\x00', 0x92100, 0x0) unlinkat(0xffffffffffffff9c, &(0x7f0000000100)='./file0\x00', 0x200) 10:11:04 executing program 4: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000040)={0x2, &(0x7f0000000000)=[{0x25}, {0x0, 0x0, 0x0, 0x5}]}) 10:11:04 executing program 1: syz_mount_image$ext4(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) openat$dir(0xffffffffffffff9c, &(0x7f0000000300)='./file0\x00', 0x92100, 0x0) unlinkat(0xffffffffffffff9c, &(0x7f0000000100)='./file0\x00', 0x200) 10:11:04 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000040)={0x2, &(0x7f0000000000)=[{0x15}, {0x0, 0x0, 0x0, 0x16000000}]}) 10:11:04 executing program 2: syz_mount_image$ext4(0x0, &(0x7f0000000440)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) openat$dir(0xffffffffffffff9c, 0x0, 0x92100, 0x0) unlinkat(0xffffffffffffff9c, &(0x7f0000000100)='./file0\x00', 0x200) [ 1885.673867][T24288] loop5: detected capacity change from 0 to 16255 10:11:04 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext3\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000480)=ANY=[@ANYBLOB='lazytime,test_dummy_encryption,max_dir_size_kb=0x000000000200,grpjquota=,min_batch_time=0x,0000000000003ff,rootcontext\a']) 10:11:04 executing program 4: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000040)={0x2, &(0x7f0000000000)=[{0x25}, {0x0, 0x0, 0x0, 0x6}]}) 10:11:04 executing program 1: syz_mount_image$ext4(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) openat$dir(0xffffffffffffff9c, &(0x7f0000000300)='./file0\x00', 0x92100, 0x0) unlinkat(0xffffffffffffff9c, &(0x7f0000000100)='./file0\x00', 0x200) [ 1885.723539][T24288] EXT4-fs (loop5): VFS: Can't find ext4 filesystem 10:11:04 executing program 1: syz_mount_image$ext4(0x0, &(0x7f0000000440)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) openat$dir(0xffffffffffffff9c, 0x0, 0x92100, 0x0) unlinkat(0xffffffffffffff9c, &(0x7f0000000100)='./file0\x00', 0x200) 10:11:04 executing program 2: syz_mount_image$ext4(0x0, &(0x7f0000000440)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) openat$dir(0xffffffffffffff9c, 0x0, 0x92100, 0x0) unlinkat(0xffffffffffffff9c, &(0x7f0000000100)='./file0\x00', 0x200) 10:11:04 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext3\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000480)=ANY=[@ANYBLOB='lazytime,test_dummy_encryption,max_dir_size_kb=0x000000000200,grpjquota=,min_batch_time=0x0\"000000000003ff,rootcontext\a']) 10:11:04 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000040)={0x2, &(0x7f0000000000)=[{0x15}, {0x0, 0x0, 0x0, 0x1d000000}]}) 10:11:04 executing program 4: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000040)={0x2, &(0x7f0000000000)=[{0x25}, {0x0, 0x0, 0x0, 0x7}]}) 10:11:04 executing program 5: clock_nanosleep(0x54fb6926d29f01ef, 0x0, &(0x7f0000000080)={0x0, 0x989680}, 0x0) clock_settime(0x0, &(0x7f0000000000)={0x77359400}) 10:11:04 executing program 1: syz_mount_image$ext4(0x0, &(0x7f0000000440)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) openat$dir(0xffffffffffffff9c, 0x0, 0x92100, 0x0) unlinkat(0xffffffffffffff9c, &(0x7f0000000100)='./file0\x00', 0x200) 10:11:04 executing program 2: syz_mount_image$ext4(0x0, &(0x7f0000000440)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) openat$dir(0xffffffffffffff9c, 0x0, 0x92100, 0x0) unlinkat(0xffffffffffffff9c, &(0x7f0000000100)='./file0\x00', 0x200) 10:11:04 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000040)={0x2, &(0x7f0000000000)=[{0x15}, {0x0, 0x0, 0x0, 0x20000000}]}) 10:11:04 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext3\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000480)=ANY=[@ANYBLOB='lazytime,test_dummy_encryption,max_dir_size_kb=0x000000000200,grpjquota=,min_batch_time=0x0,000000000003ff,rootcontext\a']) 10:11:04 executing program 5: clock_nanosleep(0x54fb6926d29f01ef, 0x0, &(0x7f0000000080)={0x0, 0x989680}, 0x0) clock_settime(0x0, &(0x7f0000000000)={0x77359400}) 10:11:05 executing program 4: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000040)={0x2, &(0x7f0000000000)=[{0x25}, {0x0, 0x0, 0x0, 0x9}]}) 10:11:05 executing program 1: syz_mount_image$ext4(0x0, &(0x7f0000000440)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) openat$dir(0xffffffffffffff9c, 0x0, 0x92100, 0x0) unlinkat(0xffffffffffffff9c, &(0x7f0000000100)='./file0\x00', 0x200) 10:11:05 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000040)={0x2, &(0x7f0000000000)=[{0x15}, {0x0, 0x0, 0x0, 0x25000000}]}) 10:11:05 executing program 2: syz_mount_image$ext4(0x0, &(0x7f0000000440)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) openat$dir(0xffffffffffffff9c, &(0x7f0000000300)='./file0\x00', 0x0, 0x0) unlinkat(0xffffffffffffff9c, &(0x7f0000000100)='./file0\x00', 0x200) 10:11:05 executing program 5: clock_nanosleep(0x54fb6926d29f01ef, 0x0, &(0x7f0000000080)={0x0, 0x989680}, 0x0) clock_settime(0x0, &(0x7f0000000000)={0x77359400}) 10:11:05 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext3\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000480)=ANY=[@ANYBLOB='lazytime,test_dummy_encryption,max_dir_size_kb=0x000000000200,grpjquota=,min_batch_time=0x00\"00000000003ff,rootcontext\a']) 10:11:05 executing program 1: syz_mount_image$ext4(0x0, &(0x7f0000000440)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) openat$dir(0xffffffffffffff9c, &(0x7f0000000300)='./file0\x00', 0x0, 0x0) unlinkat(0xffffffffffffff9c, &(0x7f0000000100)='./file0\x00', 0x200) 10:11:05 executing program 4: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000040)={0x2, &(0x7f0000000000)=[{0x25}, {0x0, 0x0, 0x0, 0x15}]}) 10:11:05 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000040)={0x2, &(0x7f0000000000)=[{0x15}, {0x0, 0x0, 0x0, 0x28000000}]}) 10:11:05 executing program 2: syz_mount_image$ext4(0x0, &(0x7f0000000440)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) openat$dir(0xffffffffffffff9c, &(0x7f0000000300)='./file0\x00', 0x0, 0x0) unlinkat(0xffffffffffffff9c, 0x0, 0x200) 10:11:05 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext3\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000480)=ANY=[@ANYBLOB='lazytime,test_dummy_encryption,max_dir_size_kb=0x000000000200,grpjquota=,min_batch_time=0x00,00000000003ff,rootcontext\a']) 10:11:05 executing program 1: syz_mount_image$ext4(0x0, &(0x7f0000000440)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) openat$dir(0xffffffffffffff9c, &(0x7f0000000300)='./file0\x00', 0x0, 0x0) unlinkat(0xffffffffffffff9c, 0x0, 0x200) 10:11:05 executing program 4: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000040)={0x2, &(0x7f0000000000)=[{0x25}, {0x0, 0x0, 0x0, 0x16}]}) 10:11:05 executing program 5: clock_settime(0x0, &(0x7f0000000000)={0x77359400}) 10:11:05 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000040)={0x2, &(0x7f0000000000)=[{0x15}, {0x0, 0x0, 0x0, 0x2d000000}]}) 10:11:05 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext3\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000480)=ANY=[@ANYBLOB='lazytime,test_dummy_encryption,max_dir_size_kb=0x000000000200,grpjquota=,min_batch_time=0x000\"0000000003ff,rootcontext\a']) 10:11:05 executing program 4: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000040)={0x2, &(0x7f0000000000)=[{0x25}, {0x0, 0x0, 0x0, 0x1d}]}) 10:11:05 executing program 5: clock_settime(0x0, 0x0) 10:11:05 executing program 2: syz_mount_image$ext4(0x0, &(0x7f0000000440)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) openat$dir(0xffffffffffffff9c, &(0x7f0000000300)='./file0\x00', 0x0, 0x0) unlinkat(0xffffffffffffff9c, 0x0, 0x200) 10:11:05 executing program 1: syz_mount_image$ext4(0x0, &(0x7f0000000440)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) openat$dir(0xffffffffffffff9c, &(0x7f0000000300)='./file0\x00', 0x0, 0x0) unlinkat(0xffffffffffffff9c, 0x0, 0x200) 10:11:05 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000040)={0x2, &(0x7f0000000000)=[{0x15}, {0x0, 0x0, 0x0, 0x30000000}]}) 10:11:05 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext3\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000480)=ANY=[@ANYBLOB='lazytime,test_dummy_encryption,max_dir_size_kb=0x000000000200,grpjquota=,min_batch_time=0x000,0000000003ff,rootcontext\a']) 10:11:05 executing program 4: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000040)={0x2, &(0x7f0000000000)=[{0x25}, {0x0, 0x0, 0x0, 0x25}]}) 10:11:05 executing program 1: syz_mount_image$ext4(0x0, &(0x7f0000000440)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) openat$dir(0xffffffffffffff9c, &(0x7f0000000300)='./file0\x00', 0x0, 0x0) unlinkat(0xffffffffffffff9c, 0x0, 0x200) 10:11:05 executing program 5: clock_settime(0x0, 0x0) 10:11:05 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000040)={0x2, &(0x7f0000000000)=[{0x15}, {0x0, 0x0, 0x0, 0x34000000}]}) 10:11:05 executing program 2: syz_mount_image$ext4(0x0, &(0x7f0000000440)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) openat$dir(0xffffffffffffff9c, &(0x7f0000000300)='./file0\x00', 0x0, 0x0) unlinkat(0xffffffffffffff9c, 0x0, 0x200) 10:11:05 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext3\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000480)=ANY=[@ANYBLOB='lazytime,test_dummy_encryption,max_dir_size_kb=0x000000000200,grpjquota=,min_batch_time=0x0000\"000000003ff,rootcontext\a']) 10:11:05 executing program 4: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000040)={0x2, &(0x7f0000000000)=[{0x25}, {0x0, 0x0, 0x0, 0x28}]}) 10:11:05 executing program 1: syz_mount_image$ext4(0x0, &(0x7f0000000440)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) openat$dir(0xffffffffffffff9c, &(0x7f0000000300)='./file0\x00', 0x0, 0x0) unlinkat(0xffffffffffffff9c, &(0x7f0000000100)='./file0\x00', 0x0) 10:11:05 executing program 2: syz_mount_image$ext4(0x0, &(0x7f0000000440)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) openat$dir(0xffffffffffffff9c, &(0x7f0000000300)='./file0\x00', 0x0, 0x0) unlinkat(0xffffffffffffff9c, &(0x7f0000000100)='./file0\x00', 0x0) 10:11:05 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000040)={0x2, &(0x7f0000000000)=[{0x15}, {0x0, 0x0, 0x0, 0x35000000}]}) 10:11:05 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext3\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000480)=ANY=[@ANYBLOB='lazytime,test_dummy_encryption,max_dir_size_kb=0x000000000200,grpjquota=,min_batch_time=0x0000,000000003ff,rootcontext\a']) 10:11:05 executing program 4: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000040)={0x2, &(0x7f0000000000)=[{0x25}, {0x0, 0x0, 0x0, 0x29}]}) 10:11:05 executing program 1: syz_mount_image$ext4(0x0, &(0x7f0000000440)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) openat$dir(0xffffffffffffff9c, &(0x7f0000000300)='./file0\x00', 0x0, 0x0) unlinkat(0xffffffffffffff9c, &(0x7f0000000100)='./file0\x00', 0x0) 10:11:05 executing program 5: clock_settime(0x0, 0x0) 10:11:05 executing program 2: syz_mount_image$ext4(0x0, &(0x7f0000000440)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) openat$dir(0xffffffffffffff9c, &(0x7f0000000300)='./file0\x00', 0x0, 0x0) unlinkat(0xffffffffffffff9c, &(0x7f0000000100)='./file0\x00', 0x0) 10:11:05 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000040)={0x2, &(0x7f0000000000)=[{0x15}, {0x0, 0x0, 0x0, 0x3d000000}]}) 10:11:05 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext3\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000480)=ANY=[@ANYBLOB='lazytime,test_dummy_encryption,max_dir_size_kb=0x000000000200,grpjquota=,min_batch_time=0x00000\"00000003ff,rootcontext\a']) 10:11:05 executing program 4: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000040)={0x2, &(0x7f0000000000)=[{0x25}, {0x0, 0x0, 0x0, 0x2d}]}) 10:11:05 executing program 5: clock_settime(0x0, &(0x7f0000000000)={0x77359400}) 10:11:05 executing program 1: syz_mount_image$ext4(0x0, &(0x7f0000000440)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) openat$dir(0xffffffffffffff9c, &(0x7f0000000300)='./file0\x00', 0x0, 0x0) unlinkat(0xffffffffffffff9c, &(0x7f0000000100)='./file0\x00', 0x0) 10:11:05 executing program 2: syz_mount_image$ext4(0x0, &(0x7f0000000440)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) openat$dir(0xffffffffffffff9c, &(0x7f0000000300)='./file0\x00', 0x0, 0x0) unlinkat(0xffffffffffffff9c, &(0x7f0000000100)='./file0\x00', 0x0) 10:11:05 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000040)={0x2, &(0x7f0000000000)=[{0x15}, {0x0, 0x0, 0x0, 0x45000000}]}) 10:11:05 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext3\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000480)=ANY=[@ANYBLOB='lazytime,test_dummy_encryption,max_dir_size_kb=0x000000000200,grpjquota=,min_batch_time=0x00000,00000003ff,rootcontext\a']) 10:11:05 executing program 1: syz_mount_image$ext4(0x0, &(0x7f0000000440)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) openat$dir(0xffffffffffffff9c, &(0x7f0000000300)='./file0\x00', 0x0, 0x0) unlinkat(0xffffffffffffff9c, &(0x7f0000000100)='./file0\x00', 0x0) 10:11:05 executing program 4: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000040)={0x2, &(0x7f0000000000)=[{0x25}, {0x0, 0x0, 0x0, 0x30}]}) 10:11:05 executing program 5: syz_mount_image$ext4(0x0, &(0x7f0000000440)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) openat$dir(0xffffffffffffff9c, 0x0, 0x92100, 0x0) unlinkat(0xffffffffffffff9c, &(0x7f0000000100)='./file0\x00', 0x200) 10:11:05 executing program 4: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000040)={0x2, &(0x7f0000000000)=[{0x25}, {0x0, 0x0, 0x0, 0x34}]}) 10:11:05 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000040)={0x2, &(0x7f0000000000)=[{0x15}, {0x0, 0x0, 0x0, 0x4d000000}]}) 10:11:05 executing program 2: syz_mount_image$ext4(0x0, &(0x7f0000000440)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) openat$dir(0xffffffffffffff9c, &(0x7f0000000300)='./file0\x00', 0x0, 0x0) unlinkat(0xffffffffffffff9c, &(0x7f0000000100)='./file0\x00', 0x200) (fail_nth: 1) 10:11:05 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext3\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000480)=ANY=[@ANYBLOB='lazytime,test_dummy_encryption,max_dir_size_kb=0x000000000200,grpjquota=,min_batch_time=0x000000\"0000003ff,rootcontext\a']) 10:11:05 executing program 5: syz_mount_image$ext4(0x0, &(0x7f0000000440)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) openat$dir(0xffffffffffffff9c, &(0x7f0000000300)='./file0\x00', 0x0, 0x0) unlinkat(0xffffffffffffff9c, &(0x7f0000000100)='./file0\x00', 0x200) (fail_nth: 1) 10:11:05 executing program 1: clock_settime(0x0, &(0x7f0000000000)={0x77359400}) (fail_nth: 1) 10:11:05 executing program 4: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000040)={0x2, &(0x7f0000000000)=[{0x25}, {0x0, 0x0, 0x0, 0x35}]}) [ 1886.890278][T24518] FAULT_INJECTION: forcing a failure. [ 1886.890278][T24518] name failslab, interval 1, probability 0, space 0, times 0 [ 1886.903189][T24518] CPU: 1 PID: 24518 Comm: syz-executor.2 Not tainted 5.15.0-rc3-syzkaller #0 [ 1886.911959][T24518] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1886.922093][T24518] Call Trace: [ 1886.925361][T24518] dump_stack_lvl+0xd6/0x122 [ 1886.930263][T24518] dump_stack+0x11/0x1b [ 1886.934498][T24518] should_fail+0x23c/0x250 [ 1886.939029][T24518] ? getname_flags+0x84/0x3f0 [ 1886.944107][T24518] __should_failslab+0x81/0x90 [ 1886.948958][T24518] should_failslab+0x5/0x20 [ 1886.953693][T24518] kmem_cache_alloc+0x4f/0x300 [ 1886.958602][T24518] getname_flags+0x84/0x3f0 [ 1886.963195][T24518] __x64_sys_unlinkat+0x73/0xb0 [ 1886.968077][T24518] do_syscall_64+0x44/0xa0 [ 1886.972590][T24518] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 1886.978650][T24518] RIP: 0033:0x7f1b9d2cd8d9 [ 1886.983059][T24518] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1887.002726][T24518] RSP: 002b:00007f1b9b045188 EFLAGS: 00000246 ORIG_RAX: 0000000000000107 [ 1887.011314][T24518] RAX: ffffffffffffffda RBX: 00007f1b9d3d1f60 RCX: 00007f1b9d2cd8d9 [ 1887.019280][T24518] RDX: 0000000000000200 RSI: 0000000020000100 RDI: ffffffffffffff9c [ 1887.027246][T24518] RBP: 00007f1b9b0451d0 R08: 0000000000000000 R09: 0000000000000000 10:11:05 executing program 4: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000040)={0x2, &(0x7f0000000000)=[{0x25}, {0x0, 0x0, 0x0, 0x3d}]}) 10:11:06 executing program 4: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000040)={0x2, &(0x7f0000000000)=[{0x25}, {0x0, 0x0, 0x0, 0x45}]}) [ 1887.035222][T24518] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 1887.043189][T24518] R13: 00007ffefb88f5df R14: 00007f1b9b045300 R15: 0000000000022000 [ 1887.056352][T24524] FAULT_INJECTION: forcing a failure. [ 1887.056352][T24524] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 1887.069494][T24524] CPU: 1 PID: 24524 Comm: syz-executor.1 Not tainted 5.15.0-rc3-syzkaller #0 [ 1887.078368][T24524] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1887.088525][T24524] Call Trace: [ 1887.091812][T24524] dump_stack_lvl+0xd6/0x122 [ 1887.096431][T24524] dump_stack+0x11/0x1b [ 1887.100712][T24524] should_fail+0x23c/0x250 [ 1887.103056][T24538] FAULT_INJECTION: forcing a failure. [ 1887.103056][T24538] name failslab, interval 1, probability 0, space 0, times 0 [ 1887.105269][T24524] should_fail_usercopy+0x16/0x20 [ 1887.105290][T24524] _copy_from_user+0x1c/0xd0 [ 1887.105312][T24524] get_timespec64+0x45/0xe0 [ 1887.132019][T24524] __x64_sys_clock_settime+0x122/0x190 [ 1887.137493][T24524] do_syscall_64+0x44/0xa0 [ 1887.141950][T24524] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 1887.147989][T24524] RIP: 0033:0x7fd79365e8d9 [ 1887.152393][T24524] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1887.172793][T24524] RSP: 002b:00007fd7913d6188 EFLAGS: 00000246 ORIG_RAX: 00000000000000e3 [ 1887.181276][T24524] RAX: ffffffffffffffda RBX: 00007fd793762f60 RCX: 00007fd79365e8d9 [ 1887.189342][T24524] RDX: 0000000000000000 RSI: 0000000020000000 RDI: 0000000000000000 [ 1887.197294][T24524] RBP: 00007fd7913d61d0 R08: 0000000000000000 R09: 0000000000000000 [ 1887.205787][T24524] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 1887.213760][T24524] R13: 00007ffe1102b5af R14: 00007fd7913d6300 R15: 0000000000022000 [ 1887.221716][T24538] CPU: 0 PID: 24538 Comm: syz-executor.5 Not tainted 5.15.0-rc3-syzkaller #0 [ 1887.230476][T24538] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 10:11:06 executing program 2: syz_mount_image$ext4(0x0, &(0x7f0000000440)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) openat$dir(0xffffffffffffff9c, &(0x7f0000000300)='./file0\x00', 0x0, 0x0) unlinkat(0xffffffffffffff9c, &(0x7f0000000100)='./file0\x00', 0x200) (fail_nth: 2) 10:11:06 executing program 4: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000040)={0x2, &(0x7f0000000000)=[{0x25}, {0x0, 0x0, 0x0, 0x4d}]}) 10:11:06 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000040)={0x2, &(0x7f0000000000)=[{0x15}, {0x0, 0x0, 0x0, 0x60000000}]}) 10:11:06 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext3\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000480)=ANY=[@ANYBLOB='lazytime,test_dummy_encryption,max_dir_size_kb=0x000000000200,grpjquota=,min_batch_time=0x000000,0000003ff,rootcontext\a']) [ 1887.240516][T24538] Call Trace: [ 1887.243825][T24538] dump_stack_lvl+0xd6/0x122 [ 1887.248469][T24538] dump_stack+0x11/0x1b [ 1887.252627][T24538] should_fail+0x23c/0x250 [ 1887.257041][T24538] ? getname_flags+0x84/0x3f0 [ 1887.261714][T24538] __should_failslab+0x81/0x90 [ 1887.266478][T24538] should_failslab+0x5/0x20 [ 1887.271049][T24538] kmem_cache_alloc+0x4f/0x300 [ 1887.275811][T24538] getname_flags+0x84/0x3f0 [ 1887.280391][T24538] __x64_sys_unlinkat+0x73/0xb0 [ 1887.285229][T24538] do_syscall_64+0x44/0xa0 10:11:06 executing program 1: clock_settime(0x0, &(0x7f0000000000)={0x77359400}) (fail_nth: 2) [ 1887.289646][T24538] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 1887.295538][T24538] RIP: 0033:0x7ff750d258d9 [ 1887.299940][T24538] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1887.319534][T24538] RSP: 002b:00007ff74ea9d188 EFLAGS: 00000246 ORIG_RAX: 0000000000000107 [ 1887.328009][T24538] RAX: ffffffffffffffda RBX: 00007ff750e29f60 RCX: 00007ff750d258d9 [ 1887.335994][T24538] RDX: 0000000000000200 RSI: 0000000020000100 RDI: ffffffffffffff9c [ 1887.343954][T24538] RBP: 00007ff74ea9d1d0 R08: 0000000000000000 R09: 0000000000000000 [ 1887.351914][T24538] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 1887.359868][T24538] R13: 00007fff89efe73f R14: 00007ff74ea9d300 R15: 0000000000022000 [ 1887.402396][T24551] FAULT_INJECTION: forcing a failure. [ 1887.402396][T24551] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 1887.415661][T24551] CPU: 1 PID: 24551 Comm: syz-executor.2 Not tainted 5.15.0-rc3-syzkaller #0 [ 1887.424442][T24551] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1887.434624][T24551] Call Trace: [ 1887.437968][T24551] dump_stack_lvl+0xd6/0x122 [ 1887.438959][T24546] FAULT_INJECTION: forcing a failure. [ 1887.438959][T24546] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 1887.442549][T24551] dump_stack+0x11/0x1b [ 1887.459761][T24551] should_fail+0x23c/0x250 [ 1887.464163][T24551] should_fail_usercopy+0x16/0x20 [ 1887.469169][T24551] strncpy_from_user+0x21/0x250 [ 1887.474060][T24551] getname_flags+0xb8/0x3f0 [ 1887.478563][T24551] __x64_sys_unlinkat+0x73/0xb0 [ 1887.483390][T24551] do_syscall_64+0x44/0xa0 [ 1887.487794][T24551] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 1887.493673][T24551] RIP: 0033:0x7f1b9d2cd8d9 [ 1887.498068][T24551] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1887.517714][T24551] RSP: 002b:00007f1b9b045188 EFLAGS: 00000246 ORIG_RAX: 0000000000000107 [ 1887.526105][T24551] RAX: ffffffffffffffda RBX: 00007f1b9d3d1f60 RCX: 00007f1b9d2cd8d9 [ 1887.534100][T24551] RDX: 0000000000000200 RSI: 0000000020000100 RDI: ffffffffffffff9c [ 1887.542050][T24551] RBP: 00007f1b9b0451d0 R08: 0000000000000000 R09: 0000000000000000 [ 1887.550028][T24551] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 1887.558065][T24551] R13: 00007ffefb88f5df R14: 00007f1b9b045300 R15: 0000000000022000 [ 1887.566030][T24546] CPU: 0 PID: 24546 Comm: syz-executor.1 Not tainted 5.15.0-rc3-syzkaller #0 [ 1887.574784][T24546] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1887.584907][T24546] Call Trace: [ 1887.588171][T24546] dump_stack_lvl+0xd6/0x122 [ 1887.592832][T24546] dump_stack+0x11/0x1b [ 1887.596966][T24546] should_fail+0x23c/0x250 [ 1887.601364][T24546] should_fail_usercopy+0x16/0x20 [ 1887.606371][T24546] _copy_to_user+0x1c/0x90 [ 1887.610778][T24546] simple_read_from_buffer+0xab/0x120 [ 1887.616152][T24546] proc_fail_nth_read+0x10d/0x150 [ 1887.621358][T24546] ? proc_fault_inject_write+0x230/0x230 [ 1887.627011][T24546] vfs_read+0x1e6/0x750 [ 1887.631227][T24546] ? __switch_to+0x145/0x4c0 [ 1887.635800][T24546] ? finish_task_switch+0xce/0x290 [ 1887.640976][T24546] ? __fget_light+0x21b/0x260 [ 1887.645708][T24546] ? __cond_resched+0x11/0x40 [ 1887.650388][T24546] ksys_read+0xd9/0x190 [ 1887.654526][T24546] __x64_sys_read+0x3e/0x50 [ 1887.659323][T24546] do_syscall_64+0x44/0xa0 [ 1887.663723][T24546] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 1887.669923][T24546] RIP: 0033:0x7fd79361148c [ 1887.674332][T24546] Code: ec 28 48 89 54 24 18 48 89 74 24 10 89 7c 24 08 e8 f9 fc ff ff 48 8b 54 24 18 48 8b 74 24 10 41 89 c0 8b 7c 24 08 31 c0 0f 05 <48> 3d 00 f0 ff ff 77 34 44 89 c7 48 89 44 24 08 e8 2f fd ff ff 48 [ 1887.693927][T24546] RSP: 002b:00007fd7913d6170 EFLAGS: 00000246 ORIG_RAX: 0000000000000000 10:11:06 executing program 5: syz_mount_image$ext4(0x0, &(0x7f0000000440)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) openat$dir(0xffffffffffffff9c, &(0x7f0000000300)='./file0\x00', 0x0, 0x0) unlinkat(0xffffffffffffff9c, &(0x7f0000000100)='./file0\x00', 0x200) (fail_nth: 2) 10:11:06 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000040)={0x2, &(0x7f0000000000)=[{0x15}, {0x0, 0x0, 0x0, 0x61000000}]}) [ 1887.702319][T24546] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 00007fd79361148c [ 1887.710308][T24546] RDX: 000000000000000f RSI: 00007fd7913d61e0 RDI: 0000000000000003 [ 1887.718433][T24546] RBP: 00007fd7913d61d0 R08: 0000000000000000 R09: 0000000000000000 [ 1887.726386][T24546] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 1887.734340][T24546] R13: 00007ffe1102b5af R14: 00007fd7913d6300 R15: 0000000000022000 10:11:06 executing program 4: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000040)={0x2, &(0x7f0000000000)=[{0x25}, {0x0, 0x0, 0x0, 0x60}]}) 10:11:06 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext3\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000480)=ANY=[@ANYBLOB='lazytime,test_dummy_encryption,max_dir_size_kb=0x000000000200,grpjquota=,min_batch_time=0x0000000\"000003ff,rootcontext\a']) 10:11:06 executing program 2: syz_mount_image$ext4(0x0, &(0x7f0000000440)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) openat$dir(0xffffffffffffff9c, &(0x7f0000000300)='./file0\x00', 0x0, 0x0) unlinkat(0xffffffffffffff9c, &(0x7f0000000100)='./file0\x00', 0x200) (fail_nth: 3) [ 1887.820593][T24564] FAULT_INJECTION: forcing a failure. [ 1887.820593][T24564] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 1887.833673][T24564] CPU: 1 PID: 24564 Comm: syz-executor.5 Not tainted 5.15.0-rc3-syzkaller #0 [ 1887.842437][T24564] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1887.852483][T24564] Call Trace: [ 1887.855826][T24564] dump_stack_lvl+0xd6/0x122 [ 1887.860415][T24564] dump_stack+0x11/0x1b [ 1887.864673][T24564] should_fail+0x23c/0x250 [ 1887.869176][T24564] should_fail_usercopy+0x16/0x20 [ 1887.874279][T24564] strncpy_from_user+0x21/0x250 [ 1887.879135][T24564] getname_flags+0xb8/0x3f0 [ 1887.883640][T24564] __x64_sys_unlinkat+0x73/0xb0 [ 1887.888497][T24564] do_syscall_64+0x44/0xa0 [ 1887.892942][T24564] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 1887.898840][T24564] RIP: 0033:0x7ff750d258d9 10:11:06 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000040)={0x2, &(0x7f0000000000)=[{0x15}, {0x0, 0x0, 0x0, 0x64000000}]}) 10:11:06 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext3\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000480)=ANY=[@ANYBLOB='lazytime,test_dummy_encryption,max_dir_size_kb=0x000000000200,grpjquota=,min_batch_time=0x0000000,000003ff,rootcontext\a']) 10:11:06 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000040)={0x2, &(0x7f0000000000)=[{0x15}, {0x0, 0x0, 0x0, 0x74000000}]}) [ 1887.903354][T24564] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1887.922961][T24564] RSP: 002b:00007ff74ea9d188 EFLAGS: 00000246 ORIG_RAX: 0000000000000107 [ 1887.931379][T24564] RAX: ffffffffffffffda RBX: 00007ff750e29f60 RCX: 00007ff750d258d9 [ 1887.939346][T24564] RDX: 0000000000000200 RSI: 0000000020000100 RDI: ffffffffffffff9c [ 1887.947326][T24564] RBP: 00007ff74ea9d1d0 R08: 0000000000000000 R09: 0000000000000000 [ 1887.955307][T24564] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 1887.963374][T24564] R13: 00007fff89efe73f R14: 00007ff74ea9d300 R15: 0000000000022000 10:11:07 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext3\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000480)=ANY=[@ANYBLOB='lazytime,test_dummy_encryption,max_dir_size_kb=0x000000000200,grpjquota=,min_batch_time=0x00000000\"00003ff,rootcontext\a']) 10:11:07 executing program 4: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000040)={0x2, &(0x7f0000000000)=[{0x25}, {0x0, 0x0, 0x0, 0x61}]}) 10:11:07 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000040)={0x2, &(0x7f0000000000)=[{0x15}, {0x0, 0x0, 0x0, 0x94000000}]}) [ 1888.054321][T24586] FAULT_INJECTION: forcing a failure. [ 1888.054321][T24586] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 1888.067380][T24586] CPU: 0 PID: 24586 Comm: syz-executor.2 Not tainted 5.15.0-rc3-syzkaller #0 [ 1888.076139][T24586] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1888.086274][T24586] Call Trace: [ 1888.089539][T24586] dump_stack_lvl+0xd6/0x122 [ 1888.094129][T24586] dump_stack+0x11/0x1b [ 1888.098286][T24586] should_fail+0x23c/0x250 10:11:07 executing program 1: clock_settime(0x0, &(0x7f0000000000)={0x77359400}) 10:11:07 executing program 5: syz_mount_image$ext4(0x0, &(0x7f0000000440)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) openat$dir(0xffffffffffffff9c, &(0x7f0000000300)='./file0\x00', 0x0, 0x0) unlinkat(0xffffffffffffff9c, &(0x7f0000000100)='./file0\x00', 0x200) (fail_nth: 3) 10:11:07 executing program 4: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000040)={0x2, &(0x7f0000000000)=[{0x25}, {0x0, 0x0, 0x0, 0x64}]}) [ 1888.102775][T24586] should_fail_usercopy+0x16/0x20 [ 1888.107850][T24586] _copy_to_user+0x1c/0x90 [ 1888.112267][T24586] simple_read_from_buffer+0xab/0x120 [ 1888.117632][T24586] proc_fail_nth_read+0x10d/0x150 [ 1888.122744][T24586] ? proc_fault_inject_write+0x230/0x230 [ 1888.128378][T24586] vfs_read+0x1e6/0x750 [ 1888.132533][T24586] ? ___cache_free+0x3c/0x300 [ 1888.137201][T24586] ? __fget_light+0x21b/0x260 [ 1888.141872][T24586] ? __cond_resched+0x11/0x40 [ 1888.146579][T24586] ksys_read+0xd9/0x190 [ 1888.150738][T24586] __x64_sys_read+0x3e/0x50 [ 1888.155326][T24586] do_syscall_64+0x44/0xa0 [ 1888.159841][T24586] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 1888.165841][T24586] RIP: 0033:0x7f1b9d28048c [ 1888.170338][T24586] Code: ec 28 48 89 54 24 18 48 89 74 24 10 89 7c 24 08 e8 f9 fc ff ff 48 8b 54 24 18 48 8b 74 24 10 41 89 c0 8b 7c 24 08 31 c0 0f 05 <48> 3d 00 f0 ff ff 77 34 44 89 c7 48 89 44 24 08 e8 2f fd ff ff 48 [ 1888.190043][T24586] RSP: 002b:00007f1b9b045170 EFLAGS: 00000246 ORIG_RAX: 0000000000000000 10:11:07 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext3\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000480)=ANY=[@ANYBLOB='lazytime,test_dummy_encryption,max_dir_size_kb=0x000000000200,grpjquota=,min_batch_time=0x00000000,00003ff,rootcontext\a']) [ 1888.198590][T24586] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 00007f1b9d28048c [ 1888.206565][T24586] RDX: 000000000000000f RSI: 00007f1b9b0451e0 RDI: 0000000000000004 [ 1888.214529][T24586] RBP: 00007f1b9b0451d0 R08: 0000000000000000 R09: 0000000000000000 [ 1888.222548][T24586] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 1888.230498][T24586] R13: 00007ffefb88f5df R14: 00007f1b9b045300 R15: 0000000000022000 [ 1888.248893][T24605] FAULT_INJECTION: forcing a failure. [ 1888.248893][T24605] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 1888.262080][T24605] CPU: 1 PID: 24605 Comm: syz-executor.5 Not tainted 5.15.0-rc3-syzkaller #0 [ 1888.270963][T24605] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1888.281031][T24605] Call Trace: [ 1888.284363][T24605] dump_stack_lvl+0xd6/0x122 [ 1888.288950][T24605] dump_stack+0x11/0x1b [ 1888.293102][T24605] should_fail+0x23c/0x250 [ 1888.297617][T24605] should_fail_usercopy+0x16/0x20 [ 1888.302716][T24605] _copy_to_user+0x1c/0x90 [ 1888.307124][T24605] simple_read_from_buffer+0xab/0x120 [ 1888.312490][T24605] proc_fail_nth_read+0x10d/0x150 [ 1888.317583][T24605] ? proc_fault_inject_write+0x230/0x230 [ 1888.323209][T24605] vfs_read+0x1e6/0x750 [ 1888.327367][T24605] ? ___cache_free+0x3c/0x300 [ 1888.332041][T24605] ? __fget_light+0x21b/0x260 [ 1888.336720][T24605] ? __cond_resched+0x11/0x40 [ 1888.341393][T24605] ksys_read+0xd9/0x190 [ 1888.345651][T24605] __x64_sys_read+0x3e/0x50 [ 1888.350152][T24605] do_syscall_64+0x44/0xa0 [ 1888.354564][T24605] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 1888.360487][T24605] RIP: 0033:0x7ff750cd848c [ 1888.364912][T24605] Code: ec 28 48 89 54 24 18 48 89 74 24 10 89 7c 24 08 e8 f9 fc ff ff 48 8b 54 24 18 48 8b 74 24 10 41 89 c0 8b 7c 24 08 31 c0 0f 05 <48> 3d 00 f0 ff ff 77 34 44 89 c7 48 89 44 24 08 e8 2f fd ff ff 48 [ 1888.384600][T24605] RSP: 002b:00007ff74ea9d170 EFLAGS: 00000246 ORIG_RAX: 0000000000000000 [ 1888.393078][T24605] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 00007ff750cd848c 10:11:07 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000040)={0x2, &(0x7f0000000000)=[{0x15}, {0x0, 0x0, 0x0, 0xb1000000}]}) 10:11:07 executing program 2: syz_mount_image$ext4(0x0, &(0x7f0000000440)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) openat$dir(0xffffffffffffff9c, &(0x7f0000000300)='./file0\x00', 0x0, 0x0) unlinkat(0xffffffffffffff9c, &(0x7f0000000100)='./file0\x00', 0x200) 10:11:07 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000040)) 10:11:07 executing program 0: socket$inet(0x2, 0x80000, 0x80000000) r0 = openat$vcsu(0xffffffffffffff9c, &(0x7f0000000000), 0x5200, 0x0) fchmodat(r0, &(0x7f0000000040)='./file0\x00', 0x1b0) r1 = openat$incfs(r0, &(0x7f00000002c0)='.log\x00', 0x581200, 0x123) syz_genetlink_get_family_id$fou(&(0x7f0000000300), r1) renameat2(r1, &(0x7f0000000380)='./file0\x00', 0xffffffffffffffff, &(0x7f00000003c0)='./file1\x00', 0x0) fchmodat(r1, &(0x7f0000000000)='./file0\x00', 0x5) getdents(r0, &(0x7f0000000080)=""/60, 0x3c) 10:11:07 executing program 5: syz_mount_image$ext4(0x0, &(0x7f0000000440)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) openat$dir(0xffffffffffffff9c, &(0x7f0000000300)='./file0\x00', 0x0, 0x0) unlinkat(0xffffffffffffff9c, &(0x7f0000000100)='./file0\x00', 0x200) 10:11:07 executing program 1: clock_settime(0x2, &(0x7f0000000000)={0x77359400}) [ 1888.401040][T24605] RDX: 000000000000000f RSI: 00007ff74ea9d1e0 RDI: 0000000000000004 [ 1888.409006][T24605] RBP: 00007ff74ea9d1d0 R08: 0000000000000000 R09: 0000000000000000 [ 1888.416968][T24605] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 1888.425087][T24605] R13: 00007fff89efe73f R14: 00007ff74ea9d300 R15: 0000000000022000 10:11:07 executing program 2: syz_mount_image$ext4(0x0, &(0x7f0000000440)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) openat$dir(0xffffffffffffff9c, &(0x7f0000000300)='./file0\x00', 0x0, 0x0) unlinkat(0xffffffffffffff9c, &(0x7f0000000100)='./file0\x00', 0x202) 10:11:07 executing program 4: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000040)={0x2, &(0x7f0000000000)=[{0x25}, {0x0, 0x0, 0x0, 0x74}]}) 10:11:07 executing program 1: clock_settime(0x7, &(0x7f0000000000)={0x77359400}) 10:11:07 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext3\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000480)=ANY=[@ANYBLOB='lazytime,test_dummy_encryption,max_dir_size_kb=0x000000000200,grpjquota=,min_batch_time=0x000000000\"0003ff,rootcontext\a']) 10:11:07 executing program 4: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000040)={0x2, &(0x7f0000000000)=[{0x25}, {0x0, 0x0, 0x0, 0x94}]}) 10:11:07 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000040)={0x2, &(0x7f0000000000)=[{0x15, 0x0, 0x2}, {0x3, 0x3, 0x0, 0x8001}]}) prctl$PR_SET_SECCOMP(0x16, 0x0, &(0x7f00000000c0)={0x5, &(0x7f0000000080)=[{0x5, 0x80, 0x55, 0x934c}, {0x2, 0x8, 0x40, 0x6}, {0x46, 0x3f, 0x81, 0x10001}, {0x8001, 0x3, 0x4, 0x300}, {0x4, 0x14, 0x3, 0x40}]}) prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000180)={0x9, &(0x7f0000000100)=[{0x3, 0x40, 0x9, 0x81}, {0x345a, 0x20, 0x80, 0x3}, {0x3bf, 0x3f, 0x81, 0x698}, {0x3f, 0x7, 0x24, 0x4}, {0x7, 0x0, 0x2, 0x3}, {0x81f, 0x3f, 0x7, 0x8}, {0x0, 0xfb, 0x0, 0xfffffffb}, {0xf4db, 0x3, 0x1f, 0x3}, {0x101, 0x3, 0xff, 0x4}]}) 10:11:07 executing program 1: clock_settime(0xa, &(0x7f0000000000)={0x77359400}) 10:11:07 executing program 2: syz_mount_image$ext4(0x0, &(0x7f0000000440)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) openat$dir(0xffffffffffffff9c, &(0x7f0000000300)='./file0\x00', 0x0, 0x0) unlinkat(0xffffffffffffff9c, &(0x7f0000000100)='./file0\x00', 0x203) 10:11:07 executing program 4: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000040)={0x2, &(0x7f0000000000)=[{0x25}, {0x0, 0x0, 0x0, 0xb1}]}) 10:11:07 executing program 5: syz_mount_image$ext4(0x0, &(0x7f0000000440)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) openat$dir(0xffffffffffffff9c, &(0x7f0000000300)='./file0\x00', 0x0, 0x0) unlinkat(0xffffffffffffff9c, &(0x7f0000000100)='./file0\x00', 0x202) 10:11:07 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext3\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000480)=ANY=[@ANYBLOB='lazytime,test_dummy_encryption,max_dir_size_kb=0x000000000200,grpjquota=,min_batch_time=0x000000000,0003ff,rootcontext\a']) 10:11:07 executing program 1: clock_settime(0xb, &(0x7f0000000000)={0x77359400}) 10:11:07 executing program 2: syz_mount_image$ext4(0x0, &(0x7f0000000440)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) openat$dir(0xffffffffffffff9c, &(0x7f0000000300)='./file0\x00', 0x0, 0x0) unlinkat(0xffffffffffffff9c, &(0x7f0000000100)='./file0\x00', 0x204) 10:11:07 executing program 4: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000040)={0x2, &(0x7f0000000000)=[{0x25}, {0x0, 0x0, 0x0, 0x300}]}) 10:11:07 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f00000000c0)={0x6, &(0x7f0000000080)=[{0x7a, 0x6, 0x0, 0x1}, {0x2, 0x1f, 0x0, 0xfe}, {0x4, 0x3f, 0xba, 0x5}, {0x7e0, 0x32, 0x53, 0x6}, {0x8, 0x0, 0x7, 0xffffff80}, {0x1, 0x8, 0x81, 0x5}]}) prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000100)={0x2, &(0x7f0000000000)=[{0x15}, {}]}) 10:11:07 executing program 5: syz_mount_image$ext4(0x0, &(0x7f0000000440)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) openat$dir(0xffffffffffffff9c, &(0x7f0000000300)='./file0\x00', 0x0, 0x0) unlinkat(0xffffffffffffff9c, &(0x7f0000000100)='./file0\x00', 0x203) 10:11:07 executing program 1: clock_settime(0x700, &(0x7f0000000000)={0x77359400}) 10:11:07 executing program 4: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000040)={0x2, &(0x7f0000000000)=[{0x25}, {0x0, 0x0, 0x0, 0x500}]}) 10:11:07 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext3\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000480)=ANY=[@ANYBLOB='lazytime,test_dummy_encryption,max_dir_size_kb=0x000000000200,grpjquota=,min_batch_time=0x00000000000003ff,rootcontext\a']) 10:11:07 executing program 2: syz_mount_image$ext4(0x0, &(0x7f0000000440)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) openat$dir(0xffffffffffffff9c, &(0x7f0000000300)='./file0\x00', 0x0, 0x0) unlinkat(0xffffffffffffff9c, &(0x7f0000000100)='./file0\x00', 0x22e) 10:11:07 executing program 5: syz_mount_image$ext4(0x0, &(0x7f0000000440)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) openat$dir(0xffffffffffffff9c, &(0x7f0000000300)='./file0\x00', 0x0, 0x0) unlinkat(0xffffffffffffff9c, &(0x7f0000000100)='./file0\x00', 0x204) 10:11:07 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000040)={0x2, &(0x7f0000000000)=[{0x15}, {}]}) r0 = openat$vcsu(0xffffffffffffff9c, &(0x7f00000000c0), 0x10200, 0x0) syz_genetlink_get_family_id$team(&(0x7f0000000080), r0) 10:11:07 executing program 1: clock_settime(0xa00, &(0x7f0000000000)={0x77359400}) 10:11:07 executing program 4: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000040)={0x2, &(0x7f0000000000)=[{0x25}, {0x0, 0x0, 0x0, 0x600}]}) 10:11:07 executing program 3: r0 = shmget(0x3, 0x1000, 0x100, &(0x7f0000ffe000/0x1000)=nil) shmat(r0, &(0x7f0000ff9000/0x4000)=nil, 0x3000) syz_mount_image$ext4(&(0x7f0000000000)='ext3\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000480)=ANY=[@ANYBLOB='lazytime,test_dummy_encryption,max_dir_size_kb=0x000000000200,grpjquota=,min_batch_time=0x00000000000003ff,rootcontext\a']) 10:11:07 executing program 5: syz_mount_image$ext4(0x0, &(0x7f0000000440)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) openat$dir(0xffffffffffffff9c, &(0x7f0000000300)='./file0\x00', 0x0, 0x0) unlinkat(0xffffffffffffff9c, &(0x7f0000000100)='./file0\x00', 0x206) 10:11:07 executing program 2: syz_mount_image$ext4(0x0, &(0x7f0000000440)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) openat$dir(0xffffffffffffff9c, &(0x7f0000000300)='./file0\x00', 0x0, 0x0) unlinkat(0xffffffffffffff9c, &(0x7f0000000100)='./file0\x00', 0x300) 10:11:07 executing program 1: clock_settime(0xb00, &(0x7f0000000000)={0x77359400}) 10:11:08 executing program 5: syz_mount_image$ext4(0x0, &(0x7f0000000440)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) openat$dir(0xffffffffffffff9c, &(0x7f0000000300)='./file0\x00', 0x0, 0x0) unlinkat(0xffffffffffffff9c, &(0x7f0000000100)='./file0\x00', 0x20c) 10:11:08 executing program 4: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000040)={0x2, &(0x7f0000000000)=[{0x25}, {0x0, 0x0, 0x0, 0x700}]}) 10:11:08 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000100)={0x2, &(0x7f0000000000)=[{0x3, 0x2, 0x2}, {0x9}]}) prctl$PR_SET_SECCOMP(0x16, 0x0, &(0x7f00000000c0)={0x2, &(0x7f0000000080)=[{0xc, 0x0, 0x7, 0x401}, {0x160, 0x9, 0x1f, 0xf0}]}) 10:11:08 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext3\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000480)=ANY=[@ANYBLOB='lazytime,test_dummy_encryption,max_dir_size_kb=0x000000000200,grpjquota=,min_batch_time=0x00000000000003ff,rootcontext\a']) r0 = syz_mount_image$ext4(&(0x7f00000000c0)='ext2\x00', &(0x7f0000000100)='./file0\x00', 0x1, 0x3, &(0x7f0000000300)=[{&(0x7f0000000140)="a9e5efefd94612acca6c5710f3cd3e0e", 0x10, 0x8001}, {&(0x7f0000000180)="996acffe3bdc068714c6a7ab91870c8bae4deffb7d5fbfd1801ceb866b340c35ff9382438d6563c97adbfb295125e71570ac023a842f29bc8b309bf30661268e3d7c01288b4c11a069ab2435130b0915dfcf260b2605a2ba2791dda2bcbdd3529b17f419627951dd912e634aee00a86ccb07795342ab1eaef6fbde7f5c0e3d1f44d1dbe76a0f2e33e7917055ed62efaf117e8b76cf170f29913bb2808212999e9715e4326ff31e5a26eaca5823f4af00618c4bcdab83df55f471d95f7238c558", 0xc0, 0x4}, {&(0x7f0000000240)="f16b7fbebcd354f685751d6abf5bdb9893afe352b9d53987ec9125a8e0196c2bfb07a2dc40d9e58f9a52565bcf45a314996c9cc4a320bdc3153fb052d6f18f325c1b752c3de558bf380d16915032c0893db15fb68c74323620331f8be8d8e3fe6dad20e92c06646c3ee9accd33bcf10e5fb95572bd3d545d3f43562a5302f4473c18628649d76f2cf53514d6e01dcd150e77436263461e4a88cc35984076c046753c86", 0xa3, 0x8001}], 0x40007, &(0x7f0000000380)={[{@grpjquota_path={'grpjquota', 0x3d, './file0'}}, {@resuid={'resuid', 0x3d, 0xffffffffffffffff}}, {@usrjquota_path={'usrjquota', 0x3d, './file0'}}, {@grpid}], [{@fsname}, {@smackfshat={'smackfshat', 0x3d, 'ext3\x00'}}]}) r1 = openat$vcsu(0xffffffffffffff9c, &(0x7f0000000000), 0x5200, 0x0) fchmodat(r1, &(0x7f0000000040)='./file0\x00', 0x1b0) r2 = openat$incfs(r1, &(0x7f00000002c0)='.log\x00', 0x581200, 0x123) syz_genetlink_get_family_id$fou(&(0x7f0000000300), r2) renameat2(r2, &(0x7f0000000380)='./file0\x00', 0xffffffffffffffff, &(0x7f00000003c0)='./file1\x00', 0x0) clock_gettime(0x0, &(0x7f0000000540)={0x0, 0x0}) futimesat(r2, &(0x7f0000000500)='./file0/file0\x00', &(0x7f0000000580)={{0x0, 0xea60}, {r3, r4/1000+10000}}) symlinkat(&(0x7f0000000080)='./file0/file0\x00', r0, &(0x7f0000000400)='./file0\x00') socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000440)) 10:11:08 executing program 2: syz_mount_image$ext4(0x0, &(0x7f0000000440)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) openat$dir(0xffffffffffffff9c, &(0x7f0000000300)='./file0\x00', 0x0, 0x0) unlinkat(0xffffffffffffff9c, &(0x7f0000000100)='./file0\x00', 0x500) 10:11:08 executing program 1: clock_settime(0xca9a3b, &(0x7f0000000000)={0x77359400}) 10:11:08 executing program 5: syz_mount_image$ext4(0x0, &(0x7f0000000440)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) openat$dir(0xffffffffffffff9c, &(0x7f0000000300)='./file0\x00', 0x0, 0x0) unlinkat(0xffffffffffffff9c, &(0x7f0000000100)='./file0\x00', 0x212) 10:11:08 executing program 0: socketpair(0x8, 0xa, 0x40, &(0x7f0000000000)={0xffffffffffffffff}) ioctl$sock_ipv6_tunnel_SIOCDELPRL(r0, 0x89f6, &(0x7f0000000140)={'syztnl2\x00', &(0x7f00000000c0)={'ip6gre0\x00', 0x0, 0x2, 0x2, 0x6, 0x0, 0x10, @remote, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x7847, 0x700, 0x5, 0x7}}) prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000040)={0x5, &(0x7f0000000080)=[{0x15}, {0x4}, {0x400, 0x1, 0x2, 0x1}, {0x401, 0x4, 0x81, 0x2}, {0x3, 0x9, 0x5a, 0x7}]}) shmget(0x0, 0x1000, 0x2, &(0x7f0000ffd000/0x1000)=nil) r1 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NBD_CMD_RECONFIGURE(r1, &(0x7f0000000280)={&(0x7f0000000180), 0xc, &(0x7f0000000240)={&(0x7f0000000300)=ANY=[@ANYBLOB='|\x00\x00\x00', @ANYRES16=0x0, @ANYBLOB="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"], 0x7c}, 0x1, 0x0, 0x0, 0x5}, 0x8004) gettid() 10:11:08 executing program 4: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000040)={0x2, &(0x7f0000000000)=[{0x25}, {0x0, 0x0, 0x0, 0x900}]}) [ 1889.062604][T24745] loop3: detected capacity change from 0 to 128 10:11:08 executing program 1: clock_settime(0x1000000, &(0x7f0000000000)={0x77359400}) 10:11:08 executing program 4: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000040)={0x2, &(0x7f0000000000)=[{0x25}, {0x0, 0x0, 0x0, 0x1500}]}) 10:11:08 executing program 2: syz_mount_image$ext4(0x0, &(0x7f0000000440)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) openat$dir(0xffffffffffffff9c, &(0x7f0000000300)='./file0\x00', 0x0, 0x0) unlinkat(0xffffffffffffff9c, &(0x7f0000000100)='./file0\x00', 0x4a28) 10:11:08 executing program 0: syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f00000000c0)='./file0\x00', 0x20, 0x3, &(0x7f0000001200)=[{&(0x7f0000000100)="2c2516cec6812dfd35278f3791ad1625cc7364e5a539ce5d73aea8c267c53981b7f4101642e98e0b01260ef0a39095c8eb151c97d2a656f18394f6c7251d4aa4d4f562c712d8cbc6a892afb92e8616a7763744544539e8abf80999efe346e42da825149fd460", 0x66, 0x7}, {&(0x7f0000000180)="7d0be28dca22deebc4057db0001365a4cfd05a0a1a6a7f007f45bc9cf2b1e79c4cae52214041e8de97326713b4f446fd12c49165ec76e6e3822bb9ac3e7896483d9b1c1bfae574b1e9cd5a0307099a80aa23439d923cdec9315057d698d844a61c9aaa6c978de6bc4e3ef256fbadf8c392d88352186a664a8d1d19a5b4130ed1d9be3f0ede81127e9e981b852a821c104b79b64dc0b7407eca5d9eb0d781bdaa1283ecd2c6b922532e8e51faaaa99a22fb8bab43aa9153118c4beb1b12d6b93551db4c4620b8a152220fcf0162b26468d2891ccefddf6e5f14e8debb3f8ea9ce343f72fe0a5d4c71fb02baf7227a518d5f8f1e2b43d2d924f874b5387347a40720771a3625d972b0aa19cc8ed19c83d7ea7d2ef1b615334510a0f69615a22d245a93876047bd8f3eb4688640cced2e695a5ccd0ab1ceb65b070e18e4056ad9ff9cb6c7075374e041fae47668d03112c872bf277f8746747564afdf117a7008e5354e76038a41324420a768d4ae0dc9128bbb5089c91508732c701063602c3772bf0e4a59571a9e88e9769a6211c56ad5837ae4c5130cb1cb24bb9563a0614c31b3b17f62a88720bd3d666bba2a4a92bc9673498dbe83418d5329d3e648dba845a918e651cba39eef72e1a29a93d4b902dc67ffbe70ded9a53bffdbec6d02d614a55a2ed9b2e6c05ec952fe9b6838be16b99a6b9715d824cd9ff837e1865a0bfea4845c918f287712f256e864e136ae6a41a12f0f463c1b5b3eb61af39dc240146db368430e4ee8d99c01248a8dddc84a6ffe677dc30fcf68097b1019f0861bb57f02d3044e0613f044b206217ef54d1fe3ca5eec1bf34941797037860356308fd4554df2a26532387be25fe025df15d8b58f59916e0941b289dd445b8596aa16c0dedd91cbb2f49fa69384c557a7294a37517336d03dfe20b4a322d8daa70ea8719f95dfaa88be9a987fbe9d6c3be1f655f74f119f8750510d953c03926ef0ae5641dfe01ba43f8fcc4580cf94409e3a1d2d6afebc32ee2c0c8c8656ada1a593c01b76de3f825c783e5685056e8a12228d5ba7ee90f2648abc6703d51c25e2d09aa66d3251372c525cf0f3e28b217c068a4fc80722e33a045edd71fa3a9a6b00468ee84fc7e88f3e6a0eb77da6012b139d8a8165237dadfdc27abd631936abfc89e1fd71da1081cb6ac473339441137a459e2d16d7282a0c64faeb7a6923fd6e97fe0183c68da4f45a46fe0922862e1a0d02470407d5ab42d97178758252046f6b3cf0a14efe47f61b101d1148b4ff04738ee88f5f810efcaebe788a2f31a6c600ff58c7abb07ff8052b0bf20aed708167991e1d261efd224a7890380e75201645cbfbd952d1cb71f97669ea115c817c6aa7caa9f624186c00dda9e0fbcbb35e486886c2195bbbd7a3a6ee981c1777280da5e189ebf04e8133d3ba2666bbbcc6d30dbe4f76b0afa2f027222d20aee27844e4342bb593c57f7b30d73bbd3366251f70a193abc1d2ace5007705cef49d4867464c592da08eca3d46fa257f7c15d06dcb63334be3dc774fc015259cd74d6596f578124afede20c3a2a5f98d9f3fb8ffa22fbc3f4f3b1c624c5eccb0188e3f0fc60d48c0e2e9e3aa75399bcb639b9bcd75465552f0af4843fdfc05524a9d736ed3bab4b01d6651722b2a0d9764697f0746923795737152afb5e0f77f7d5189915eeb74bbf5f2f8683db10f493a7d44d6b58bc08258577904aa58b518234ed6a69e5c69e39484554e3dd2ee81bb73425a4838955bebc4be0084a201872515eaafbc9f5700177c707bc57fc9402bbfe8c8a3858b11a98be700f170276248b112be221e5dd6c702bd372c2bb49b105c38b923c450cff52292c5fcff6b7b5c6d84528a6e5ec699eddf386c5725a674875e63de248cdb8a19cc21c34c69af929ea22b14baf426b06e98df5296324b7ea7e70c0327ca4a76513b11b784301b0aa6c907c7a952a0795399fad44798671c18d4cdf816d4304f2054f161f2df9cf77638254edb69d3ffed71c20061153bfe4726556b4595c531e8d115e55fbe4fabdeae1d355d6960c07fd64c9a304a1a7debe98792e2b2025fe94c3f6746d49677548a471db993962d9b30eb7d1fdb081c93b912973fab672b8a9f666c4e1aa380c0e6d042d798166ae7737d780ed2322dec15e908834b077f10819b86b889b6b0ac2782e6c0abaa0fcbd55f912a7e9d835ff7ddb9fc702ea238fc34a1173d101d8dc7e083cdbb74e762236f6edcfb372fbab6edd94c88ba827090862604743d1e9d940344670f7d2a0b4ca0dce9b3246c5872b0e96330a5d5535ec0017fb6e02df7eccb402fdd5d0ff6cd6be8f24264822fc53aa95b54147326389972d9158d0564801b1a514474bf195e9aec86725cb2c7e3048982274daf763c31d826fdec8964dd1cce7d8f94a352ac73bbdfec5d8e63dd504df29cb99bdde123aa67e163a9bcfbb094dba294eb4293c278021237311322008d730b834675de2ee7837225a590018dcd4cf0c8ce7cfdcb917ae57e0c00c72d627a6d0b88bc97285e6f8e5084b77d74d57c3f40fa7878be4d9601c333f582dd0ea742030188d07fb74642a2eb5905953a23df05b3f88739068f98f8835fe70f181929a738a662a8127064204c196a738c304da037f2ec5606ef449ffc07653888d079b808110c3e11034cfbd67e1695ce473af8a7938b8bebb51bc73d65b1109090fed380a1bbc96b546e9ed206814fa80721ed02535ea5f1977f8a1563c85e3fa62dce8d8c3a22e6563604fb55f3f7bf7da8d8bb48568fc80a717c947070e14498c706e5de6363f7ecfaf604586ba5faa092160c34d7b66a43cffd7b7e8af4c6690cf1b53f34f5b5589f09ad6a3871dbf7460b71b838df8ffdbf706dcce66cd3631122b19f92e22a4fc9905dbb1dfc8accda2e8a5e083158a98a0c3c6d3f1057877f9e2947b7df05222c7818bd3da096a23d709f32744e9f924f5f35a56c9dd5e58a0a90525ef487203219b96a2f2ae7b12f938eab24dbb7e4a2920c620372f7d838cdb0b98d720f8fa6f54b24894cf8347b8884de719d6890a1cf5acd5cd0913f76dd30a4c72ca328c63854044635dd4c04e636a3112aa5668b9d5889f35b9c31c1a35e93da85a965d49d27aa670dc64f2457dada2c160b997ba25d6e05dd5bf0227e2c1a08570f7eea9e73803cb01021f5d7fcb24a4c5639507c26c99214004eb4053c44ce4a8f80d0d462fc99a4460adecb0b13d9217b27b551d0906ec2f30345f682adea10068de948d44ae8b4ea62f7b5745d134ec217ad58f43b0b6bee2785750b6c81b399390c33c8371dd4ebfa1c6ae0bd0930e218595e8b3abdca13a22584e67e605cd111b8f4f0373339e9c5ae59878d1def6e6d9f3f19819792a455bcb74f25d4824b4634274989d7d8ef361832462978db091152d9ebce0197f33b387c11555d28e4ab328d28606397f3714429d5b8ddcebc3c214a973b145e4e06f33d8d984c239a0a86d8b7c2fc808bead1f9964ae9e075ee04d1a48de2f0de3f082c69e6193e1a589551217403d32496e8ca11b7a6f40d2a4528042490cd400ff57579b77cb5a1c4d82383a8193b1c223bb6589aeabfe20f0ae6372a5ad84b73d86b584635c077b22cb0a6c4882e3f9bdb003ed83cb21b77097eb9452c2c4cb269dd93d7c10a3abc0db1b15fe0050b813d92aae222ebf6683787b2532ce33df7ecd1a915b2be89822107c8c4ab99c25aad973c1e5df059908125c0d6a4069dfbe75ff91a6f483f37fefcfa377e225e7f83471658572c2cd6527194889a2f606ed44279fd087dfd368a6b97286e973931abd7af86a3fdbb330a683394fd387d7e7bd47c33ac65efef56dbb4c765fb107e9a82e9b17404083d9c933bba35f359c3b782b224bdf96f1be450f52ed9da2459c88c0bda8481cebc27f01f7d4495129a73196ed9e44a1cd3639a2c4a5a6e1a45f62b198ae2211b2d6131ac7703b66dddc69a4932209324b7ac32909e3821286fcbb346845c415af255891eaba1e41e611a071b462f4b3006167cfff5f53d4e42896590dd2417448b39347b4373e054bf8679d7782db16bc73c99844bf772ed1bc3f7e583362ee63ed3f29837879e9c07502f44262f647d43d85670a88b8e6994b05bbd0c68325fec8ff23706a26d49e4f58eb4980bf066380a1ba8b15d85297cd9b500822eeb95579416a555f382395fb591550fe2750e7428faa066cee7fd2bd703619a231bd38e2e705d4c590a50cc36eaa8be34bf4a3d64e51d1393252a71f5fdab2affc60ac2f5cf1ef6c6cc155cd5dae26903682c01494f508214380657c348d14ca8a0873e1efbd640a9a8750d8384c465ad7d2ca20618f4a8f88ea03ed65ce433129682288851bf728e1661309b35995fc27799ef4476fd227fc57a072c2bbfc13a3d76762e1aa190c3364d43b7021c0c93c5db1daebcdc957f8f039076df14c1370fc076ad74c4de2442e5c6871b3d1b44aee012ef7ab62165c63a78088f0881d84bdb87c1929b9dd5d841d27244337f17a3ee6d9e4151180caeee86769f71d78302599dbfbc6ed5959a7d154e82cbb241b86db75e5dda51efb5dde7f7f1b0b3003b05909ae8d1446d6be2e58bd11dd1e26253d18b29a7db6eb88ad3144c4200eb60959caef96eb742f394ffb46ffbb4a7fcfc942d8df88d8e00fec13384618566be9b37697ce44ebb91b6822c3f7c7eb1978fdd1ad3c23c3cb9270f906d353869b6bac83541d3299c515258c18980a12c82b167787e80984db36f2abda70f1de19133c0df63f442b7925fed209a05a30c5710da105b65fcfedd7c436fd08dff2eaef23d4e5a33df4bec6dc92abf1135545bc66da83d13fc004cb1b179cda09a5c9ea0359b0e2657058428547f23d538cd0851f203c18891db231aca37022258965b2e27a11984c5f9606d75004d189e89efc996374307664783b5400d330601e127f641aaf79462f08cbd2d173b17e0177d7fdee60b915dd3d600934148dd8503414fe2c4c32f4a49b89c8062c8e44ef151989fb856aacb3d6c706db4b5f22a9f3d5391aad3e3eb10c860b353889443fa7433c3320ae3b336b9bd8e858ed99f998526be4d771f1c468c865df9382b6af7b4f31fae5255664fc6c348566cb380683745a73797754665620f45049f1012860e927c1030e6097abee92336f2e6ad4393962fd6e69b0fa573eb00c733363b7c5a51f85642032b6eec2b44260ef224cbd7844fbf67afa213617d4de6132d6211f68ee5ac9930a51c7f8c54803fe51075447f800da5514bc82867d2cd540eb51d7278dde47daf0455fcf0e354140e4fae4a66770afb222ba82d493c5b4a4e4aafc239e6bc6018fa282a04c6bc1fbdf02bf304417082a8673514a973d774c8f428f2aeed2416db3cf8373e1320d39f68504aef585b262c4066ba82bef07f6733e20df4b2ee8524d3a1edaf57a5033b947f0004cdac044e501e199e485fa25fbc02ec57b1e7f5528ed4d1609ba93c3816cb8d51a1181d0a9859e4c577b752215a7c65cc72352f250446632442ca652576d12245fbf9f57ea19b31401562b2719845d370b0029822d7c9cc837b6dfd6ca0f13722863a296ca07cc145edcda6b01fa67d3ffdce3f00fc55838b3af4f5310ef445b76d49a0dbe8377c6cacef86e2f168861e90db72a25029446cd7a25a533c6410b0c737175dfaf1c2c61aa3654a63aa75b70eb41ef823785adec30afbe5aae850f8d5f5e2b81d7f517f84e992578af97de50802f814838a4fdfe175f9cd5e50571a5007a8dbd49d", 0x1000, 0xfffffffffffffff9}, {&(0x7f0000001180)="1ae0269c638d73c31bfa8ff1f781495bd94f9ea983e7145f5f1bc792bce35212fedfebd93e6122271facdf913c2863fd51cf1b7417409b467051c2648e8a2968642c09f8c3e94704c9527a2ca97cc198d0f67646191b36cc", 0x58, 0x101}], 0x2900802, &(0x7f0000001280)={[{@nouid32}], [{@appraise}, {@fsuuid={'fsuuid', 0x3d, {[0x38, 0x57, 0x39, 0x37, 0x34, 0x66, 0x39, 0xfc], 0x2d, [0x66, 0x34, 0x36, 0x33], 0x2d, [0x39, 0x39, 0x37, 0x39], 0x2d, [0x66, 0x34, 0x35, 0x37], 0x2d, [0x6e, 0x63, 0x32, 0x63, 0x63, 0x62, 0x65, 0x31]}}}, {@func={'func', 0x3d, 'KEXEC_KERNEL_CHECK'}}, {@fscontext={'fscontext', 0x3d, 'sysadm_u'}}, {@pcr={'pcr', 0x3d, 0x3a}}, {@appraise_type}, {@dont_hash}]}) prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000040)={0x2, &(0x7f0000000000)=[{0x15, 0x0, 0xfe}, {0x0, 0x0, 0xfe}]}) 10:11:08 executing program 1: clock_settime(0x2000000, &(0x7f0000000000)={0x77359400}) 10:11:08 executing program 4: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000040)={0x2, &(0x7f0000000000)=[{0x25}, {0x0, 0x0, 0x0, 0x1600}]}) [ 1889.172371][T24745] loop3: detected capacity change from 0 to 128 [ 1889.206438][T24799] loop0: detected capacity change from 0 to 16383 10:11:08 executing program 5: syz_mount_image$ext4(0x0, &(0x7f0000000440)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) openat$dir(0xffffffffffffff9c, &(0x7f0000000300)='./file0\x00', 0x0, 0x0) unlinkat(0xffffffffffffff9c, &(0x7f0000000100)='./file0\x00', 0x22e) 10:11:08 executing program 4: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000040)={0x2, &(0x7f0000000000)=[{0x25}, {0x0, 0x0, 0x0, 0x1d00}]}) [ 1889.259910][T24799] loop0: detected capacity change from 0 to 16383 10:11:08 executing program 2: syz_mount_image$ext4(0x0, &(0x7f0000000440)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) openat$dir(0xffffffffffffff9c, &(0x7f0000000300)='./file0\x00', 0x0, 0x0) unlinkat(0xffffffffffffff9c, &(0x7f0000000100)='./file0\x00', 0x9303) 10:11:08 executing program 1: clock_settime(0x7000000, &(0x7f0000000000)={0x77359400}) 10:11:08 executing program 3: r0 = openat$incfs(0xffffffffffffffff, &(0x7f0000000080)='.pending_reads\x00', 0x40, 0x120) r1 = syz_genetlink_get_family_id$tipc(&(0x7f0000000100), 0xffffffffffffffff) sendmsg$TIPC_CMD_GET_BEARER_NAMES(r0, &(0x7f00000001c0)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f0000000180)={&(0x7f0000000140)={0x1c, r1, 0x300, 0x70bd2d, 0x25dfdbfc, {}, ["", ""]}, 0x1c}, 0x1, 0x0, 0x0, 0x40000}, 0x4004085) syz_mount_image$ext4(&(0x7f0000000000)='ext3\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000200)=ANY=[@ANYBLOB="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"]) 10:11:08 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000040)={0x2, &(0x7f0000000000)=[{0x15}, {0x7}]}) 10:11:08 executing program 5: syz_mount_image$ext4(0x0, &(0x7f0000000440)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) openat$dir(0xffffffffffffff9c, &(0x7f0000000300)='./file0\x00', 0x0, 0x0) unlinkat(0xffffffffffffff9c, &(0x7f0000000100)='./file0\x00', 0x300) 10:11:08 executing program 4: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000040)={0x2, &(0x7f0000000000)=[{0x25}, {0x0, 0x0, 0x0, 0x2000}]}) 10:11:08 executing program 2: syz_mount_image$ext4(0x0, &(0x7f0000000440)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) openat$dir(0xffffffffffffff9c, &(0x7f0000000300)='./file0\x00', 0x0, 0x0) unlinkat(0xffffffffffffff9c, &(0x7f0000000100)='./file0\x00', 0xc503) 10:11:08 executing program 1: clock_settime(0xa000000, &(0x7f0000000000)={0x77359400}) 10:11:08 executing program 0: add_key$keyring(&(0x7f0000000080), &(0x7f00000000c0)={'syz', 0x2}, 0x0, 0x0, 0x0) prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000040)={0x2, &(0x7f0000000000)=[{0x15}, {}]}) 10:11:08 executing program 5: syz_mount_image$ext4(0x0, &(0x7f0000000440)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) openat$dir(0xffffffffffffff9c, &(0x7f0000000300)='./file0\x00', 0x0, 0x0) unlinkat(0xffffffffffffff9c, &(0x7f0000000100)='./file0\x00', 0x500) 10:11:08 executing program 4: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000040)={0x2, &(0x7f0000000000)=[{0x25}, {0x0, 0x0, 0x0, 0x2500}]}) 10:11:08 executing program 3: r0 = add_key$fscrypt_v1(&(0x7f00000004c0), &(0x7f0000000500)={'fscrypt:', @desc4}, &(0x7f0000000540)={0x0, "1986f65398bfcb3384dc0cdc96f17a4856233d888ddfcee258f0431f435ed5cea91a095a002158ef1395cfb35ecdbac29ae8d2092d297bc5a0144294998fa259", 0x2b}, 0x48, 0xfffffffffffffffd) keyctl$unlink(0x9, r0, 0xfffffffffffffff9) syz_mount_image$ext4(&(0x7f0000000000)='ext3\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x850460, &(0x7f0000000080)=ANY=[@ANYBLOB="6c617a7974696d652c746573745f64756d6d795f656e6372797074696f6e2c6d61785f6469725f73697a665f6b623d30783030303030303030303230302c6772db229ce3f7706a71756f74613d2c6d696e5f62616de3685f74696d653d30783030301936f5179330303030493366662c727e6f74636f6e0bfcb80607"]) getresuid(&(0x7f0000000300), &(0x7f0000000340)=0x0, &(0x7f0000000380)) syz_mount_image$ext4(&(0x7f0000000100)='ext3\x00', &(0x7f0000000140)='./file0\x00', 0x4, 0x2, &(0x7f00000002c0)=[{&(0x7f0000000180)="6da7b13bd0410304e9573beac6d8ec61a19d59d707c0a7", 0x17, 0x7fffffff}, {&(0x7f00000001c0)="806f8aa01eb5b5ba3a9d07f7ee129879d57f7cb569f150e000654eff9da721470b4012a4f6f8d8bfbd3abd030013f2fd42aa2a8d4b47838e216584d9200c125d92f05d7a2011470a7dcacac50a73bebf148d79ca393c90b93b37194ccc6fad63db9a45481fb9443d5372b5ec9ad52ad73ac6874941a9ed3724094aa4ab98a09676b319ef66830197a1dcdcb3314e366237d97469bd834738bc52ff54bb43f0c5f8df45d00890c32232cfafa3fb2f5bce0840e980d022040c8db87a11c7d64d55bdd029ea1312e669a78853095075d5f6ba1b0174d535510e6e8478b556f34c7a", 0xe0}], 0x40000, &(0x7f00000003c0)={[{@data_journal}, {@commit={'commit', 0x3d, 0xfffffffffffff801}}, {@nojournal_checksum}], [{@uid_lt={'uid<', r1}}, {@obj_user={'obj_user', 0x3d, 'ext3\x00'}}, {@subj_role={'subj_role', 0x3d, '['}}, {@rootcontext={'rootcontext', 0x3d, 'system_u'}}, {@permit_directio}, {@defcontext={'defcontext', 0x3d, 'sysadm_u'}}, {@dont_hash}, {@fsuuid={'fsuuid', 0x3d, {[0x36, 0x36, 0x66, 0x66, 0x31, 0x63, 0x66, 0x63], 0x2d, [0x33, 0x33, 0x39, 0x39], 0x2d, [0x36, 0x58, 0x34, 0x68], 0x2d, [0x61, 0x65, 0x30, 0x38], 0x2d, [0x30, 0x56, 0x30, 0x62, 0x30, 0x32, 0x62, 0x38]}}}]}) r2 = openat$vcsu(0xffffffffffffff9c, &(0x7f0000000340), 0x301, 0x0) ioctl$PTP_ENABLE_PPS(r2, 0x40043d04, 0x1) fchmodat(r2, &(0x7f00000005c0)='./file0\x00', 0x44) 10:11:08 executing program 5: syz_mount_image$ext4(0x0, &(0x7f0000000440)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) openat$dir(0xffffffffffffff9c, &(0x7f0000000300)='./file0\x00', 0x0, 0x0) unlinkat(0xffffffffffffff9c, &(0x7f0000000100)='./file0\x00', 0x2000) 10:11:08 executing program 0: r0 = openat$vcsu(0xffffffffffffff9c, &(0x7f0000000340), 0x301, 0x0) ioctl$PTP_ENABLE_PPS(r0, 0x40043d04, 0x1) r1 = syz_genetlink_get_family_id$team(&(0x7f00000000c0), 0xffffffffffffffff) getpeername$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000140)=0x14) accept$packet(0xffffffffffffffff, &(0x7f0000000180)={0x11, 0x0, 0x0}, &(0x7f00000001c0)=0x14) r4 = openat$ptp0(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) ioctl$PTP_EXTTS_REQUEST(r4, 0x40103d02, &(0x7f00000000c0)) ioctl$PTP_EXTTS_REQUEST(r4, 0x40103d02, &(0x7f0000000540)={0x0, 0x8}) r5 = socket(0x3, 0x1, 0x3) r6 = openat$ptp0(0xffffffffffffff9c, &(0x7f0000000680), 0x101b00, 0x0) ioctl$PTP_SYS_OFFSET(r6, 0x43403d05, &(0x7f00000006c0)={0x13}) sendmsg$TEAM_CMD_OPTIONS_GET(r5, &(0x7f0000000640)={&(0x7f0000000580), 0xc, &(0x7f0000000600)={&(0x7f00000005c0)=ANY=[@ANYBLOB="14000000", @ANYRES16=r1, @ANYBLOB="fbff29bd7000fedbdf2502000080"], 0x14}, 0x1, 0x0, 0x0, 0x80c0}, 0x68d0) sendmsg$TEAM_CMD_OPTIONS_SET(r0, &(0x7f0000000500)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f00000004c0)={&(0x7f0000000200)=ANY=[@ANYBLOB="84020000", @ANYRES16=r1, @ANYBLOB="00022bbd7000fdcbdf250100000008000100", @ANYRES32=0x0, @ANYBLOB="f400028040000100240001006c625f686173685f737461747300000000000000000000000000000000000000050003000b00000008000400180f00000800070000000000400001002400010071756575655f69640000000000000000000000000000000000000000000000000500030003000000080004007400000008000600", @ANYRES32=0x0, @ANYBLOB="38000100240001006e6f746966795f70656572735f696e74657276616c00000000000000000000000500030003000000080004000100000038000100240001006e6f746966799e47656572735f636f756e7400000000000000000000000000000500030003000000080004000300000008000100", @ANYRES32=r2, @ANYBLOB="6c01028040000100240001006c625f706f72745f737461747300000000000000000000000000000000000000050003000b000000080004000300000008000600", @ANYRES32=0x0, @ANYBLOB="40000100240001006c625f686173685f737461747300000000000000000000000000000000000000050003000b00000008000400ff01000008000700000000003800010024000100616374697665706f727400000000000000000000000000000000000000000000050003000300000008000400", @ANYRES32=r3, @ANYBLOB="40000100240001006c625f686173685f737461747300000000000000000000000000000000000000050003000b0000000800040003000000080007000000000038000100240001006d636173745f72656a6f696e5f696e74657276616c00000000000000000000000500030003000000080004000180000038000100240001006d636173745f72656a6f696e5f696e74657276616c0000000000000000000000050003000300000008000400dd550000"], 0x284}, 0x1, 0x0, 0x0, 0x4}, 0x8010) prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000040)={0x2, &(0x7f0000000000)=[{0x15}, {}]}) 10:11:08 executing program 1: clock_settime(0xb000000, &(0x7f0000000000)={0x77359400}) 10:11:08 executing program 2: syz_mount_image$ext4(0x0, &(0x7f0000000440)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) openat$dir(0xffffffffffffff9c, &(0x7f0000000300)='./file0\x00', 0x0, 0x0) unlinkat(0xffffffffffffff9c, &(0x7f0000000100)='./file0\x00', 0xc629) [ 1889.543859][T24886] loop3: detected capacity change from 0 to 264192 10:11:08 executing program 5: syz_mount_image$ext4(0x0, &(0x7f0000000440)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) openat$dir(0xffffffffffffff9c, &(0x7f0000000300)='./file0\x00', 0x0, 0x0) unlinkat(0xffffffffffffff9c, &(0x7f0000000100)='./file0\x00', 0x7370000) 10:11:08 executing program 4: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000040)={0x2, &(0x7f0000000000)=[{0x25}, {0x0, 0x0, 0x0, 0x2800}]}) 10:11:08 executing program 1: clock_settime(0x3b9aca00, &(0x7f0000000000)={0x77359400}) [ 1889.625282][T24918] loop3: detected capacity change from 0 to 264192 10:11:08 executing program 5: syz_mount_image$ext4(0x0, &(0x7f0000000440)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) openat$dir(0xffffffffffffff9c, &(0x7f0000000300)='./file0\x00', 0x0, 0x0) unlinkat(0xffffffffffffff9c, &(0x7f0000000100)='./file0\x00', 0x35360000) 10:11:08 executing program 2: syz_mount_image$ext4(0x0, &(0x7f0000000440)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) openat$dir(0xffffffffffffff9c, &(0x7f0000000300)='./file0\x00', 0x0, 0x0) unlinkat(0xffffffffffffff9c, &(0x7f0000000100)='./file0\x00', 0x14370000) 10:11:08 executing program 1: clock_settime(0xca9a3b00000000, &(0x7f0000000000)={0x77359400}) 10:11:08 executing program 4: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000040)={0x2, &(0x7f0000000000)=[{0x25}, {0x0, 0x0, 0x0, 0x2900}]}) 10:11:08 executing program 3: syz_mount_image$ext4(&(0x7f00000000c0)='ext3\x00', &(0x7f0000000040)='./file0\x00', 0x1000000000000, 0x0, 0x0, 0x0, &(0x7f0000000080)=ANY=[@ANYRESDEC, @ANYRES64, @ANYRESDEC]) 10:11:08 executing program 0: ioctl$sock_SIOCGIFINDEX_802154(0xffffffffffffffff, 0x8933, &(0x7f0000000140)={'wpan3\x00'}) prctl$PR_SET_SECCOMP(0x16, 0x0, &(0x7f0000000040)={0x1fc6, &(0x7f0000000080)}) syz_genetlink_get_family_id$ieee802154(&(0x7f00000002c0), 0xffffffffffffffff) prctl$PR_SET_SECCOMP(0x16, 0x0, &(0x7f0000000080)={0x5, &(0x7f0000000000)=[{0x8, 0x2, 0x1f, 0x7fff}, {0x6, 0xa, 0xba, 0x8}, {0x6, 0x3f, 0x1, 0x5}, {0x4, 0x7f, 0x1, 0x1}, {0x7, 0x0, 0x3, 0x8}]}) prctl$PR_SET_SECCOMP(0x16, 0x0, &(0x7f0000000100)={0x6, &(0x7f00000000c0)=[{0x7, 0x1f, 0xfc, 0x8}, {0x5, 0xf4, 0x3, 0x6}, {0x6e4, 0x0, 0x9, 0x2}, {0x8, 0x2, 0x1, 0x92a9}, {0x5, 0x5, 0x1, 0xfffffff8}, {0x1, 0x0, 0x20, 0x5}]}) r0 = syz_genetlink_get_family_id$nl802154(&(0x7f00000001c0), 0xffffffffffffffff) sendmsg$NL802154_CMD_DEL_SEC_DEV(0xffffffffffffffff, &(0x7f0000000280)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x8000000}, 0xc, &(0x7f0000000240)={&(0x7f0000000200)={0x30, r0, 0x2, 0x70bd29, 0x25dfdbfb, {}, [@NL802154_ATTR_WPAN_DEV={0xc, 0x6, 0x300000003}, @NL802154_ATTR_SEC_DEVICE={0x10, 0x23, 0x0, 0x1, {0xc, 0x4, {0xaaaaaaaaaaaa0002}}}]}, 0x30}, 0x1, 0x0, 0x0, 0x10}, 0x94) 10:11:08 executing program 5: syz_mount_image$ext4(0x0, &(0x7f0000000440)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) openat$dir(0xffffffffffffff9c, &(0x7f0000000300)='./file0\x00', 0x0, 0x0) unlinkat(0xffffffffffffff9c, &(0x7f0000000100)='./file0\x00', 0x36370000) 10:11:08 executing program 1: clock_settime(0x100000000000000, &(0x7f0000000000)={0x77359400}) 10:11:08 executing program 4: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000040)={0x2, &(0x7f0000000000)=[{0x25}, {0x0, 0x0, 0x0, 0x2d00}]}) 10:11:08 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext2\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000080)=ANY=[@ANYRESDEC]) 10:11:08 executing program 2: syz_mount_image$ext4(0x0, &(0x7f0000000440)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) openat$dir(0xffffffffffffff9c, &(0x7f0000000300)='./file0\x00', 0x0, 0x0) unlinkat(0xffffffffffffff9c, &(0x7f0000000100)='./file0\x00', 0x2d360000) 10:11:08 executing program 5: syz_mount_image$ext4(0x0, &(0x7f0000000440)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) openat$dir(0xffffffffffffff9c, &(0x7f0000000300)='./file0\x00', 0x0, 0x0) unlinkat(0xffffffffffffff9c, &(0x7f0000000100)='./file0\x00', 0x42370000) 10:11:08 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x2005, &(0x7f0000000080)=ANY=[@ANYBLOB="220a66ef38fe411c16952c30a6aec38a8c51a3de3d31fe0ecf5521b4019efc0726a46739b1856bb4724092fcd502880aa86985406b730369d01ed90df606f32f755b3a41b120f7fc8987768dba3951c630b86f9c7fa2d34f61721729362d2275fd5f80a8193813cb35cab32b70c8d3af36cce65bc3f917bbe931d046fe123e4365d1a25da4522a2ec118278fe5b067fd4edcf34966f4180c9224ccc4ebe3ddfbecda0c8b7085cc484e6aed3725ac4a6012d8efdc0c0fbb08f0cadc6b09a095349c187351ce5da568666cc8865fd3e8a5b997fde7f101165dd14fd67f0a3973bdfcf05cbd24eb"]) r0 = openat$vcsu(0xffffffffffffff9c, &(0x7f00000001c0), 0x20000, 0x0) symlinkat(&(0x7f0000000180)='./file0\x00', r0, &(0x7f0000000200)='./file0\x00') 10:11:09 executing program 4: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000040)={0x2, &(0x7f0000000000)=[{0x25}, {0x0, 0x0, 0x0, 0x3000}]}) 10:11:09 executing program 1: clock_settime(0x200000000000000, &(0x7f0000000000)={0x77359400}) 10:11:09 executing program 2: syz_mount_image$ext4(0x0, &(0x7f0000000440)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) openat$dir(0xffffffffffffff9c, &(0x7f0000000300)='./file0\x00', 0x0, 0x0) unlinkat(0xffffffffffffff9c, &(0x7f0000000100)='./file0\x00', 0x3e3a0000) 10:11:09 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000040)={0x2, &(0x7f0000000000)=[{0x15}, {}]}) kexec_load(0x6, 0x4, &(0x7f0000000200)=[{&(0x7f0000000080)="eb6a94c9b6b47783c362cbdaed73af830fd9cc5037dd6170be18810e287f17bc43c820", 0x23, 0x5, 0x7}, {&(0x7f00000000c0)="f37a02c6e1f901404d650dcfa879e12dc5715a9c761de5e0c985790368622a793e1a329f70c033fd587df423490efc30ca92c8d29505d4a85a1ddd9669ebe92e1b4f99", 0x43, 0xcb0e, 0x65c8cc1b}, {&(0x7f0000000140)="a5152435f0e7aa9ae5aeeb119715", 0xe, 0x8000, 0xffffffffffffff61}, {&(0x7f0000000180)="f3ff03be6504ed4475bf436d82b4c9687a6afea7ca11cca8094bea8ea7f65a4c0cfe195e3f9f7e9584a0a43ca902434c6bee074dc9252be465aa7cb10ba8bb2fff47abb321e61380dcb400a30d63de43af1ae5400b0b6d4935211dc92ebcfa8dd8353a3b", 0x64, 0x2, 0x10000}], 0x2) prctl$PR_GET_IO_FLUSHER(0x3a) 10:11:09 executing program 4: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000040)={0x2, &(0x7f0000000000)=[{0x25}, {0x0, 0x0, 0x0, 0x3400}]}) 10:11:09 executing program 5: syz_mount_image$ext4(0x0, &(0x7f0000000440)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) openat$dir(0xffffffffffffff9c, &(0x7f0000000300)='./file0\x00', 0x0, 0x0) unlinkat(0xffffffffffffff9c, &(0x7f0000000100)='./file0\x00', 0x5c370000) 10:11:09 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext3\x00', &(0x7f0000000080)='./file0\x00', 0x100, 0x0, 0x0, 0x0, &(0x7f0000000480)=ANY=[]) r0 = syz_mount_image$ext4(&(0x7f0000000040)='ext2\x00', &(0x7f00000000c0)='./file0\x00', 0x5ff, 0x9, &(0x7f0000003540)=[{&(0x7f0000000100)="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", 0x1000, 0x9cf}, {&(0x7f0000001100)="4344068fe14085ae6fa9d496a3ec0c80eb58ecde994021c773d36db23be688f4b46f439cd5388cb14368a3aa6d1e25f1281db6ea95f1ea69489cb6d9ef5b25caf54ab15a6f7f7c34a8a7a1067fda18ec90da90a05feb58c5b20b757a8d9a3f870e2dd1bf6bd6e152e369db1fdc21b7754fe3606985d2a40cd3e06f02e09ea831efff33d4a6930d74138077470c8c13c279a7cb35b1c09fad0384a24b5dc8508be91f2bea5fb5c29290ed9412ace82a9dde43a1081d8d3420a7fcfd9d64e64cbf6a0cd1a496f334f0b8bff7005ca139ac", 0xd0, 0x1}, {&(0x7f0000001200)="88b32ee8947829b28d8fd3d7325d774a0967fd17325bf116b35b7e72bdd9a2fb29eaa8c1db129823c4e6", 0x2a, 0x5102}, {&(0x7f0000001240)="544c97918580dc1c3869cfb8eaeddffbfc008c9d73e98e59a581186c3b943adb238f7f3729aeffcac39d84f224b18447fd1301454068e53b2c20aaa8a38aa49128d9b4d88fbd092991a6b1a841ccaf36f6e9", 0x52, 0x1fb}, {&(0x7f00000012c0)="f443e5f20af13fcd56abfaf7a8adb809e02796018f18b90636d1e8908a098aee6b589e0eea66c646da6531809e9333f68341607262a247b3367abb4c573712b9a1cfd75680a85c47898020b52fa7380bbc4d0ced097b75a2606482e240c0b10bcb1cc01273f074cdbac336b1176187beac9eadb7b82a897f1990c6a692648c428eecdcf7c8972c4e8a2b033e60dc135248b6d20b52be405bdfd991ae3a73c892fdbac5b4eba64b59a37444bc480bea05b0d53a6ec0e141b78026c5253acd9ce6ea70bcfb2490c9457385ba436ef777dd6e94d184aa011c2c22fcaf78", 0xdc, 0x7}, {&(0x7f00000013c0)="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", 0x1000, 0x2}, {&(0x7f00000023c0)="5b9f601bc1574d54e9ccb21516e4b81e4c0fb56861c81b318f9616b567a4710fbe69b197b0e3c7c0cd9f5c1d7592f48aa89c37fb625b28e2d2487c75fdd9306fd811898532202e8d9d107e6f1159aeaf0f12e9655af12a2cd5035af3782a7b54a89dfda937dee4b7c45873a6aa7feec32f4c00313cb78743a38269d0e1878ddf0dbabb6c4f6d513d", 0x88, 0x8}, {&(0x7f0000002480)="beeeb80ebb6702b853753da92a48d9597851df838ff9cbba612b4792d3e527ab454fe32165ab1a072a8499042dae41cd055744382747b1656fa1604cc2e74aa503fc4e83da16762d5bae80bc6923b025c861dcf202d6d7725919a6283847c0659d5b8a84c6ec3fcfa6257dcda4fef79c3a1dc2d373d91dfa7bf679214e8be9e0cfdf38b7b0f28e4d1bf48c3a87e445170aee9a89b232a32b6b3326cc28e60b2414beda5943453221d5dc8da90950388675b2112e80a1c480f70dd474", 0xbc, 0x6}, {&(0x7f0000002540)="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", 0x1000, 0x1ff}], 0x2080c01, &(0x7f0000003640)={[{@nouid32}, {@noauto_da_alloc}, {@init_itable}, {@journal_path={'journal_path', 0x3d, './file0'}}, {@errors_remount}, {@noacl}, {@noinit_itable}, {@max_dir_size_kb={'max_dir_size_kb', 0x3d, 0x9}}, {@min_batch_time={'min_batch_time', 0x3d, 0x7fff}}], [{@subj_type={'subj_type', 0x3d, '+'}}, {@rootcontext={'rootcontext', 0x3d, 'root'}}, {@fowner_eq={'fowner', 0x3d, 0xffffffffffffffff}}, {@rootcontext={'rootcontext', 0x3d, 'unconfined_u'}}, {@subj_type={'subj_type', 0x3d, 'ext3\x00'}}, {@appraise_type}]}) execveat(r0, &(0x7f0000003780)='./file0\x00', &(0x7f0000003900)=[&(0x7f00000037c0)='ext3\x00', &(0x7f0000003800)='ext3\x00', &(0x7f0000003840)='ext3\x00', &(0x7f0000003880)='-&#&!${&\\\x00', &(0x7f00000038c0)='+\x00'], &(0x7f0000003980)=[&(0x7f0000003940)='}.*-\x01(\xd4\x18\'}],\x00'], 0x1000) 10:11:09 executing program 1: clock_settime(0x700000000000000, &(0x7f0000000000)={0x77359400}) 10:11:09 executing program 4: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000040)={0x2, &(0x7f0000000000)=[{0x25}, {0x0, 0x0, 0x0, 0x3500}]}) 10:11:09 executing program 2: syz_mount_image$ext4(0x0, &(0x7f0000000440)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) openat$dir(0xffffffffffffff9c, &(0x7f0000000300)='./file0\x00', 0x0, 0x0) unlinkat(0xffffffffffffff9c, &(0x7f0000000100)='./file0\x00', 0xb7390000) 10:11:09 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000040)={0x2, &(0x7f0000000000)=[{0x15}, {}]}) prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f00000000c0)={0x7, &(0x7f0000000080)=[{0x0, 0x4, 0x2, 0x2}, {0x800, 0x1, 0x7, 0x2}, {0xfff, 0x8, 0xc, 0x1f}, {0xf5e, 0x0, 0xff, 0x1}, {0x7fff, 0x6, 0x2, 0x20}, {0x5, 0x0, 0x2, 0x7f}, {0x3, 0x4, 0x9c, 0x200}]}) 10:11:09 executing program 5: syz_mount_image$ext4(0x0, &(0x7f0000000440)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) openat$dir(0xffffffffffffff9c, &(0x7f0000000300)='./file0\x00', 0x0, 0x0) unlinkat(0xffffffffffffff9c, &(0x7f0000000100)='./file0\x00', 0xf63b0000) [ 1890.154042][T25054] loop3: detected capacity change from 0 to 81 10:11:09 executing program 1: clock_settime(0xa00000000000000, &(0x7f0000000000)={0x77359400}) 10:11:09 executing program 4: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000040)={0x2, &(0x7f0000000000)=[{0x25}, {0x0, 0x0, 0x0, 0x3d00}]}) 10:11:09 executing program 3: r0 = socket(0x2c, 0x1, 0x0) sendmsg$TIPC_CMD_DISABLE_BEARER(r0, &(0x7f0000000140)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f0000000100)={&(0x7f00000000c0)={0x30, 0x0, 0x4, 0x70bd27, 0x25dfdbfc, {{}, {}, {0x14, 0x13, @l2={'eth', 0x3a, 'veth1_vlan\x00'}}}, ["", "", "", "", "", "", "", "", ""]}, 0x30}, 0x1, 0x0, 0x0, 0xc000}, 0x8000) syz_mount_image$ext4(&(0x7f0000000000)='ext3\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000480)=ANY=[@ANYBLOB='lazytime,test_dummy_encryption,max_dir_size_kb=0x000000000200,grpjquota=,min_batch_time=0x00000000000003ff,rootcontext\a']) 10:11:09 executing program 2: syz_mount_image$ext4(0x0, &(0x7f0000000440)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) openat$dir(0xffffffffffffff9c, &(0x7f0000000300)='./file0\x00', 0x0, 0x0) unlinkat(0xffffffffffffff9c, &(0x7f0000000100)='./file0\x00', 0xe4370000) 10:11:09 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000040)={0x2, &(0x7f0000000000)=[{0x15}, {}]}) prctl$PR_SET_TIMERSLACK(0x1d, 0x80000000) r0 = openat$vcsu(0xffffffffffffff9c, &(0x7f0000000080), 0x16082, 0x0) r1 = openat$vcsu(0xffffffffffffff9c, &(0x7f0000000000), 0x5200, 0x0) fchmodat(r1, &(0x7f0000000040)='./file0\x00', 0x1b0) openat$incfs(r1, &(0x7f00000002c0)='.log\x00', 0x581200, 0x123) accept4$packet(r1, &(0x7f0000000400)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000000440)=0x14, 0x100000) unlinkat(r1, &(0x7f0000000100)='./file0\x00', 0x0) ioctl$SG_SET_DEBUG(r0, 0x227e, &(0x7f00000000c0)=0x1) 10:11:09 executing program 5: r0 = syz_mount_image$ext4(0x0, &(0x7f0000000440)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) fchmodat(r0, &(0x7f0000000000)='./file0\x00', 0x0) r1 = openat$vcsu(0xffffffffffffff9c, &(0x7f0000000000), 0x5200, 0x0) fchmodat(r1, &(0x7f0000000040)='./file0\x00', 0x1b0) openat$incfs(r1, &(0x7f00000002c0)='.log\x00', 0x581200, 0x123) accept4$packet(r1, &(0x7f0000000400)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000000440)=0x14, 0x100000) renameat2(r1, &(0x7f0000000040)='./file0\x00', r0, &(0x7f0000000080)='./file0\x00', 0x0) openat$dir(0xffffffffffffff9c, &(0x7f0000000300)='./file0\x00', 0x0, 0x0) unlinkat(0xffffffffffffff9c, &(0x7f0000000100)='./file0\x00', 0x200) r2 = openat$ptp0(0xffffffffffffff9c, &(0x7f00000000c0), 0x6400, 0x0) ioctl$PTP_SYS_OFFSET(r2, 0x43403d05, &(0x7f0000000480)={0xd}) 10:11:09 executing program 4: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000040)={0x2, &(0x7f0000000000)=[{0x25}, {0x0, 0x0, 0x0, 0x4500}]}) 10:11:09 executing program 1: clock_settime(0xb00000000000000, &(0x7f0000000000)={0x77359400}) 10:11:09 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000040)={0x2, &(0x7f0000000000)=[{0x80}, {}]}) prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000080)={0x0, 0xffffffffffffffff}) 10:11:09 executing program 4: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000040)={0x2, &(0x7f0000000000)=[{0x25}, {0x0, 0x0, 0x0, 0x4d00}]}) 10:11:09 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext3\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000480)=ANY=[@ANYBLOB='lazytime,test_dummy_encryption,max_dir_size_kb=0x000000000200,grpjquota=,min_batch_time=0x00000000000003ff,rootcontext\a']) r0 = openat$vcsu(0xffffffffffffff9c, &(0x7f0000000000), 0x5200, 0x0) fchmodat(r0, &(0x7f0000000040)='./file0\x00', 0x1b0) r1 = openat$incfs(r0, &(0x7f00000002c0)='.log\x00', 0x581200, 0x123) r2 = openat$vcsu(0xffffffffffffff9c, &(0x7f0000000340), 0x301, 0x0) ioctl$PTP_ENABLE_PPS(r2, 0x40043d04, 0x1) fchmodat(r2, &(0x7f00000000c0)='./file0\x00', 0x40) syz_genetlink_get_family_id$fou(&(0x7f0000000300), r1) renameat2(r1, &(0x7f0000000380)='./file0\x00', 0xffffffffffffffff, &(0x7f00000003c0)='./file1\x00', 0x0) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY_ALL_USERS(r1, 0xc0406619, &(0x7f0000000080)={@id={0x2, 0x0, @a}}) 10:11:09 executing program 2: syz_mount_image$ext4(0x0, &(0x7f0000000440)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) openat$dir(0xffffffffffffff9c, &(0x7f0000000300)='./file0\x00', 0x0, 0x0) unlinkat(0xffffffffffffff9c, &(0x7f0000000100)='./file0\x00', 0xe93b0000) 10:11:09 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000000)=[{0x800, 0x1d, 0x1f, 0x1000}]}) openat$dir(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0xc000, 0x9) r0 = openat$vcsu(0xffffffffffffff9c, &(0x7f0000000340), 0x301, 0x0) ioctl$PTP_ENABLE_PPS(r0, 0x40043d04, 0x1) execveat(r0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000240)=[&(0x7f0000000100)='\x00', &(0x7f0000000140)='\x00', &(0x7f0000000180)='}--(!\xff\x00', &(0x7f00000001c0)=']}]&:,\x00', &(0x7f0000000200)='\\-{^\x00'], &(0x7f0000000400)=[&(0x7f0000000280)='!\x00', &(0x7f00000002c0)='}\xde)}\x00', &(0x7f0000000300)='{\x00', &(0x7f0000000340)=':\\\x00', &(0x7f0000000380)='-\xd2-\x00', &(0x7f00000003c0)='\'.&(\'\xd8&(\x90\'&@\x00'], 0x800) 10:11:09 executing program 4: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000040)={0x2, &(0x7f0000000000)=[{0x25}, {0x0, 0x0, 0x0, 0x6000}]}) 10:11:09 executing program 5: syz_mount_image$ext4(0x0, &(0x7f0000000440)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) openat$dir(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x422040, 0x0) unlinkat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x200) 10:11:09 executing program 1: clock_settime(0x0, &(0x7f00000000c0)) clock_gettime(0x3, &(0x7f0000000080)) clock_nanosleep(0x0, 0x0, &(0x7f0000000040), 0x0) 10:11:09 executing program 3: ioctl$sock_ipv6_tunnel_SIOCDELPRL(0xffffffffffffffff, 0x89f6, &(0x7f0000000100)={'ip6gre0\x00', &(0x7f0000000080)={'syztnl2\x00', 0x0, 0x4, 0x0, 0x6, 0x3e8a, 0x10, @empty, @local, 0x7800, 0x8, 0x6, 0x3}}) personality(0x400000a) syz_mount_image$ext4(&(0x7f0000000000)='ext3\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000480)=ANY=[@ANYBLOB='lazytime,test_dummy_encryption,max_dir_size_kb=0x000000000200,grpjquota=,min_batch_time=0x00000000000003ff,rootcontext\a']) 10:11:09 executing program 4: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000040)={0x2, &(0x7f0000000000)=[{0x25}, {0x0, 0x0, 0x0, 0x6100}]}) 10:11:09 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000040)) 10:11:09 executing program 1: clock_settime(0x0, &(0x7f0000000000)={0x77359400}) prctl$PR_CAPBSET_READ(0x17, 0xf) clock_gettime(0x0, &(0x7f0000000080)) prctl$PR_CAPBSET_READ(0x17, 0x20) syz_genetlink_get_family_id$fou(&(0x7f0000000040), 0xffffffffffffffff) 10:11:09 executing program 5: syz_mount_image$ext4(0x0, &(0x7f0000000440)='./file0\x00', 0x0, 0x0, 0x0, 0x29b0418, 0x0) r0 = openat$dir(0xffffffffffffff9c, &(0x7f0000000300)='./file0\x00', 0x0, 0x0) r1 = getpgrp(0xffffffffffffffff) ptrace$getregs(0xe, r1, 0x2, &(0x7f0000000480)=""/4096) unlinkat(0xffffffffffffff9c, &(0x7f0000000100)='./file0\x00', 0x200) futimesat(r0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000040)={{0x0, 0x2710}, {0x77359400}}) 03:33:20 executing program 2: r0 = openat$vcsu(0xffffffffffffff9c, &(0x7f0000000000), 0x5200, 0x0) fchmodat(r0, &(0x7f0000000040)='./file0\x00', 0x1b0) openat$incfs(r0, &(0x7f00000002c0)='.log\x00', 0x581200, 0x123) accept4$packet(r0, &(0x7f0000000400)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000000440)=0x14, 0x100000) sendmsg$TIPC_CMD_SET_NETID(r0, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f0000000080)={&(0x7f0000000040)={0x24, 0x0, 0x8, 0x70bd29, 0x25dfdbff, {{}, {}, {0x8, 0x2, 0x7}}, ["", ""]}, 0x24}, 0x1, 0x0, 0x0, 0x84}, 0x14) syz_mount_image$ext4(0x0, &(0x7f0000000440)='./file0\x00', 0x0, 0xffffffffffffff0a, 0x0, 0x0, 0x0) openat$dir(0xffffffffffffff9c, &(0x7f0000000300)='./file0\x00', 0x0, 0x0) unlinkat(0xffffffffffffff9c, &(0x7f0000000100)='./file0\x00', 0x200) 10:11:09 executing program 4: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000040)={0x2, &(0x7f0000000000)=[{0x25}, {0x0, 0x0, 0x0, 0x6400}]}) 10:11:09 executing program 3: syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x10000, 0x0, 0x0, 0x0, &(0x7f0000000480)=ANY=[@ANYBLOB="f4aed3b77ae6ac82d039266c617a7974696d652c746573745f64756d6d795f656e6372797074696f6e2c6d61785f6469725f73697a655f6b623d30783030303130303030303230302c6772706a71756f74613d2c6d696d7b8ba09f17cc416e5f62617463685f74696d653d307830303030303030303056"]) 10:11:09 executing program 1: clock_gettime(0x0, &(0x7f0000000040)) clock_gettime(0x0, &(0x7f0000000080)) clock_settime(0x3, &(0x7f0000000000)={0x77359400}) r0 = openat$vcsu(0xffffffffffffff9c, &(0x7f0000000340), 0x301, 0x0) ioctl$PTP_ENABLE_PPS(r0, 0x40043d04, 0x1) getdents64(r0, &(0x7f00000000c0)=""/69, 0x45) 10:11:09 executing program 5: ptrace$setregset(0x4205, 0x0, 0x3, &(0x7f0000000340)={&(0x7f0000000480)="440a741948551f104c67ab03c756c3daa745fd7b8981ac70edc727c24893628d2a677af9028ea5828d187a5321f64f2d1dd2d25e597141617f94616da97f8759ae326942c3310343feba61157740608c16a5d4adfd040013b8140f0ca9eb5dd8cd8486d642f3a6deaa8f17aac2414029ac04d0b4d979b5123d1d750dbdb9f3a7cefe689a722fe3789e5a8feacbb87d6db0af1cfc85b934c610d5aa75a4911629d122e440a57dea66", 0xa8}) syz_mount_image$ext4(0x0, &(0x7f0000000440)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r0 = openat$vcsu(0xffffffffffffff9c, &(0x7f0000000000), 0x5200, 0x0) fchmodat(r0, &(0x7f0000000040)='./file0\x00', 0x1b0) r1 = openat$incfs(r0, &(0x7f00000002c0)='.log\x00', 0x581200, 0x123) syz_genetlink_get_family_id$fou(&(0x7f0000000300), r1) renameat2(r1, &(0x7f0000000380)='./file0\x00', 0xffffffffffffffff, &(0x7f00000003c0)='./file1\x00', 0x0) execveat(r1, &(0x7f0000000000)='./file0\x00', &(0x7f0000000180)=[&(0x7f0000000040)='w(\xf0P}\x00', &(0x7f0000000080)='%@\x00', &(0x7f00000000c0)='\'\xc8,}:*.\x00', &(0x7f0000000140)='\x06)%#^\'$\\\x00'], &(0x7f00000002c0)=[&(0x7f00000001c0)='\x00', &(0x7f0000000200)='/\x04-!.@/%\x00', &(0x7f0000000240)='@\x00', &(0x7f0000000280)='\x00'], 0x1000) openat$dir(0xffffffffffffff9c, &(0x7f0000000300)='./file0\x00', 0x2, 0x0) unlinkat(0xffffffffffffff9c, &(0x7f0000000100)='./file0\x00', 0x200) 10:11:09 executing program 2: syz_mount_image$ext4(0x0, &(0x7f0000000440)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r0 = openat$vcsu(0xffffffffffffff9c, &(0x7f0000000000), 0x5200, 0x0) fchmodat(r0, &(0x7f0000000040)='./file0\x00', 0x1b0) r1 = openat$incfs(r0, &(0x7f00000002c0)='.log\x00', 0x581200, 0x123) syz_genetlink_get_family_id$fou(&(0x7f0000000300), r1) renameat2(r1, &(0x7f0000000380)='./file0\x00', 0xffffffffffffffff, &(0x7f00000003c0)='./file1\x00', 0x1) execveat(r1, &(0x7f0000000000)='./file0\x00', &(0x7f0000000040), &(0x7f00000002c0)=[&(0x7f0000000080)='!\x00', &(0x7f00000000c0)='\x00', &(0x7f0000000140)='^}\x00', &(0x7f0000000180)='+[/\\%*\x00', &(0x7f00000001c0)='^(-\x00', &(0x7f0000000200)='\x00', &(0x7f0000000240)='*\x00', &(0x7f0000000280)='\x00'], 0x100) r2 = openat$dir(0xffffffffffffff9c, &(0x7f0000000400)='./file1\x00', 0x0, 0x1d3) renameat2(r0, &(0x7f0000000340)='./file1\x00', r2, &(0x7f0000000480)='./file1\x00', 0x0) openat$dir(0xffffffffffffff9c, &(0x7f0000000300)='./file0\x00', 0x24000, 0x0) unlinkat(0xffffffffffffff9c, &(0x7f0000000100)='./file0\x00', 0x200) 10:11:09 executing program 4: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000040)={0x2, &(0x7f0000000000)=[{0x25}, {0x0, 0x0, 0x0, 0x7400}]}) 10:11:09 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext3\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x4, &(0x7f0000000080)=ANY=[@ANYRES32]) r0 = openat$vcsu(0xffffffffffffff9c, &(0x7f0000000000), 0x5200, 0x0) fchmodat(r0, &(0x7f0000000040)='./file0\x00', 0x1b0) openat$incfs(r0, &(0x7f00000002c0)='.log\x00', 0x581200, 0x123) accept4$packet(r0, &(0x7f0000000400)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000000440)=0x14, 0x100000) getdents(r0, &(0x7f00000000c0)=""/31, 0x1f) 10:11:09 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000040)={0x2, &(0x7f0000000000)=[{0x15}, {}]}) socket$inet6_udplite(0xa, 0x2, 0x88) socketpair(0x27, 0x4, 0xaa6d, &(0x7f0000000080)={0xffffffffffffffff}) socket$packet(0x11, 0x3, 0x300) r1 = openat$vcsu(0xffffffffffffff9c, &(0x7f0000000000), 0x5200, 0x0) fchmodat(r1, &(0x7f0000000040)='./file0\x00', 0x1b0) iopl(0x9) r2 = openat$incfs(r1, &(0x7f00000002c0)='.log\x00', 0x581200, 0x123) syz_genetlink_get_family_id$tipc(&(0x7f00000000c0), r0) syz_genetlink_get_family_id$fou(&(0x7f0000000300), r2) renameat2(r2, &(0x7f0000000380)='./file0\x00', 0xffffffffffffffff, &(0x7f00000003c0)='./file1\x00', 0x0) openat$dir(0xffffffffffffff9c, &(0x7f0000000180)='./file1\x00', 0x402201, 0x35) getsockname$packet(r2, &(0x7f0000000140)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000100)=0xa) 10:11:09 executing program 1: clock_settime(0x0, &(0x7f0000000000)={0x77359400}) modify_ldt$write(0x1, &(0x7f00000000c0)={0x8, 0x0, 0x2000, 0x0, 0x2, 0x0, 0x0, 0x1, 0x0, 0x1}, 0x10) clock_gettime(0x0, &(0x7f0000000040)={0x0, 0x0}) clock_settime(0x6, &(0x7f0000000100)={r0, r1+10000000}) clock_gettime(0x7, &(0x7f0000000140)) clock_settime(0x4, &(0x7f0000000080)={0x0, 0x3938700}) 10:11:09 executing program 4: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000040)={0x2, &(0x7f0000000000)=[{0x25}, {0x0, 0x0, 0x0, 0x9400}]}) 10:11:09 executing program 3: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext3\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000480)=ANY=[@ANYBLOB='lazytime,test_dummy_encryption,max_dir_size_kb=0x000000000200,grpjquota=,min_batch_time=0x00000000000003ff,rootcontext\a']) unlinkat(r0, &(0x7f0000000080)='./file1\x00', 0x200) ioctl$SG_GET_VERSION_NUM(0xffffffffffffffff, 0x2282, &(0x7f00000000c0)) 10:11:09 executing program 5: syz_mount_image$ext4(0x0, &(0x7f0000000440)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) rt_sigprocmask(0x0, &(0x7f0000000180)={[0x80000001]}, 0x0, 0x8) r0 = openat$vcsu(0xffffffffffffff9c, &(0x7f0000000000), 0x5200, 0x0) rt_sigprocmask(0x0, &(0x7f00000000c0)={[0x10000]}, &(0x7f0000000200), 0x8) fchmodat(r0, &(0x7f0000000040)='./file0\x00', 0x1b0) r1 = openat$incfs(r0, &(0x7f00000002c0)='.log\x00', 0x581200, 0x123) syz_genetlink_get_family_id$fou(&(0x7f0000000300), r1) r2 = openat$vcsu(0xffffffffffffff9c, &(0x7f00000001c0), 0x288d40, 0x0) ioctl$PTP_ENABLE_PPS(r2, 0x40043d04, 0x1) r3 = openat$vcsu(0xffffffffffffff9c, &(0x7f0000000280), 0x48d640, 0x0) fchmodat(r3, &(0x7f0000000040)='./file0\x00', 0x1b0) r4 = openat$incfs(r3, &(0x7f00000002c0)='.log\x00', 0x581200, 0x123) syz_genetlink_get_family_id$fou(&(0x7f0000000300), r4) renameat2(r4, &(0x7f0000000380)='./file0\x00', 0xffffffffffffffff, &(0x7f00000003c0)='./file1\x00', 0x0) renameat2(r4, &(0x7f0000000380)='./file0\x00', r0, &(0x7f00000003c0)='./file1\x00', 0x0) renameat2(r1, &(0x7f0000000040)='./file0\x00', 0xffffffffffffffff, &(0x7f0000000080)='./file0\x00', 0x0) openat$dir(0xffffffffffffff9c, &(0x7f0000000240)='./file0\x00', 0x127101, 0x4c) unlinkat(0xffffffffffffff9c, &(0x7f0000000100)='./file0\x00', 0x200) 10:11:09 executing program 1: clock_gettime(0x0, &(0x7f0000000000)) clock_settime(0x7, &(0x7f0000000040)={0x77359400}) 10:11:10 executing program 2: syz_mount_image$ext4(0x0, &(0x7f0000000440)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) openat$dir(0xffffffffffffff9c, &(0x7f0000000300)='./file0\x00', 0x0, 0x0) r0 = openat$vcsu(0xffffffffffffff9c, &(0x7f0000000000), 0x5200, 0x0) fchmodat(r0, &(0x7f0000000040)='./file0\x00', 0x1b0) openat$incfs(r0, &(0x7f00000002c0)='.log\x00', 0x581200, 0x123) accept4$packet(r0, &(0x7f0000000400)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000000440)=0x14, 0x180000) r1 = openat$vcsu(0xffffffffffffff9c, &(0x7f0000000000), 0x5200, 0x0) fchmodat(r1, &(0x7f0000000040)='./file0\x00', 0x1b0) r2 = openat$incfs(r1, &(0x7f00000002c0)='.log\x00', 0x581200, 0x123) accept4$packet(r2, &(0x7f0000000400)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000000440)=0x14, 0x100000) fchmodat(r1, &(0x7f0000000080)='./file0\x00', 0x4) fchmodat(r0, &(0x7f0000000000)='./file0\x00', 0x13) unlinkat(0xffffffffffffff9c, &(0x7f0000000100)='./file0\x00', 0x200) socket$packet(0x11, 0x2, 0x300) 10:11:10 executing program 4: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000040)={0x2, &(0x7f0000000000)=[{0x25}, {0x0, 0x0, 0x0, 0xb100}]}) 10:11:10 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000040)={0x2, &(0x7f0000000000)=[{0x15}, {}]}) prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f00000000c0)={0x1, &(0x7f0000000080)=[{0x8000, 0x20, 0x9, 0x5}]}) prctl$PR_PAC_RESET_KEYS(0x36, 0x10) prctl$PR_PAC_RESET_KEYS(0x36, 0x4) 10:11:10 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext3\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000480)=ANY=[@ANYBLOB="6c617a7974696d652c746573745f64756d6d795f656e6372797074e96f6e2c6d61785f6469725f73697a655f6b623d30783030303030303030303230302c6772706a71756f74613d2c6d696e5f62617463685f74696d653d3078303030303030303030303030303346662c726f6f74636f6e7465787407"]) 10:11:10 executing program 5: socket$inet6_udplite(0xa, 0x2, 0x88) syz_mount_image$ext4(0x0, &(0x7f0000000440)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) openat$dir(0xffffffffffffff9c, &(0x7f0000000300)='./file0\x00', 0x0, 0x0) r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext3\x00', &(0x7f0000000040)='./file0\x00', 0x40, 0x4, &(0x7f0000002980)=[{&(0x7f0000000480)="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", 0x1000, 0x7f}, {&(0x7f0000000080), 0x0, 0x4}, {&(0x7f0000000140)="791aa5440dd7da3a8e59afa835edaea2c9788cafd9b939e110c7b20e56699d0b6cfbc80ed577df053cb2eb7e53d30bfe726794275e61b2fa31c8ade493d9fa7d96622986d8ea79e7c84dc42042d20ce7e4a48e7726edcf5be10c1a5712f0d54685595f40a61cdee75aa25b879e8bb70951f782080402fc34c8b280e3558906f9d3c761b918c165de710e46ff173164c02702264c", 0x94, 0x7f}, {&(0x7f00000016c0)="102fffe559aff1cfcc4d3f97bd8f0c72f1b7bd138911664f82a43c4847223f7675056e64b7928f2c6b79bcb6b6911c1cdb5abc7cc4cf32279d16ece51a43273d247fda8064c39503cf80536cb074071c343a12e298e4d5367236d48395a60796e303a0d3ffbfea9f8bb9f5954a048ca31c6667691a4afde65112a296fb946c67d303bcc549396a39a69253f450793a4e8982c9a0b8e6a276d305ea52747307f308a422ed34565962be35619dcee059da0fd01e742cf8dddd666e82abf340", 0xbe, 0x100000000}], 0x200000, &(0x7f0000002840)=ANY=[@ANYBLOB="73623d3078303030303030303030303030303030372c6e6f64656c616c6c6f632c757365725f78617474722c62617272696d722c612c7265737567643d00000000000000000000000000000000c4a4b08cce38ad1307000f235d276defb3bf", @ANYRESHEX, @ANYBLOB="2c6d626c7572652c66756e633d4649524d574152455f434845434b2c0000000000000000002c00001a00000000"]) faccessat2(r0, &(0x7f00000000c0)='./file0\x00', 0x10, 0x1200) r1 = syz_mount_image$ext4(&(0x7f0000001780)='ext2\x00', &(0x7f00000017c0)='./file0\x00', 0x5, 0x1, &(0x7f0000002800)=[{&(0x7f0000001800)="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", 0x1000, 0x80}], 0x2880802, &(0x7f0000002a00)=ANY=[@ANYBLOB='mblk_io_submit,jqfmt=vfsv0,commit=0x000000000000003a,jqfmt=vfsv1,resgid=', @ANYRESHEX=0x0, @ANYBLOB="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"]) symlinkat(&(0x7f0000000400)='./file0\x00', r1, &(0x7f0000002940)='./file0/file0\x00') unlinkat(0xffffffffffffff9c, &(0x7f0000000100)='./file0\x00', 0x200) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000280)='./file0\x00', 0x4, 0x4, &(0x7f0000001640)=[{&(0x7f0000001480)="72c85b8345533dd45e56cadb72433587d1437e80491453004b34661da28037fdc1596e250e2639fee7d8bac9a0915bd5a0546644fa7b942a7d01d4795100d87fcfb10ab635f8cc5dd2d89ccb867443d839794f3599b43a753b462e1b2bd6c4f12f672d8a4651", 0x66, 0x1}, {&(0x7f0000001500)="a92a007067f372825a0a514973e346d4452f9325cbb74e67340bb5016b24e2787000847ef26c53043e168e30c2787720f7f575977ec92a65199aa8db4e991a581233f076447c39e85e2f2dd244", 0x4d}, {&(0x7f0000001580)="be04ac520117b2d17e4a19d33ddd692a2847a723f89a20b9196da30cb35d1f0e978ddbae1decbe32ea3a96c4fed1fcc94cb67b851ada07e428aed84f19993edb45bb17f8d29f82f0556c5c781a35f841f68dc2b689d2ef6adb50e2f583df61a1d9535804ba04c09d3561476cc4c1a273ffc16ffc5d8852cddda270ed5aa6591721343bd729d81e15396b63d74af268fe8d1521db85986f489537acde96d255d5546c8435bc004f75b29d33b275580585a882d2cf5328bb91563517", 0xbb, 0x8e}, {&(0x7f00000002c0)="5b1343325a3a95542bafcc9e92c7805c3dabebbb3e1e1061cc430b83f15a017b629f", 0x22, 0x4}], 0x2461, &(0x7f0000000340)=ANY=[@ANYBLOB='data=journal,journal_async_commit,debug_want_extra_isize=0x0000000100000000,init_itable=0x00000000ffffffff,journal_checksum,uid=', @ANYRESDEC, @ANYBLOB="2c646f6e745f686173682c636f6e746578743d756e636f4bd50f132302e38dd46e66696e65645f752c00"]) 10:11:10 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000040)={0x2f, &(0x7f0000000000)=[{0x2, 0xfc, 0x9, 0x2484}, {0x1ff, 0x40, 0xf2, 0xef}, {0x7ff, 0x7, 0xc0}]}) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) 10:11:10 executing program 1: clock_settime(0x0, &(0x7f0000000000)={0x77359400}) clock_settime(0x6, &(0x7f0000000040)) 10:11:10 executing program 4: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000040)={0x2, &(0x7f0000000000)=[{0x25}, {0x0, 0x0, 0x0, 0x200000}]}) 10:11:10 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext3\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x800000, &(0x7f0000000480)=ANY=[@ANYBLOB='lazytime,test_dummy_encryption,max_dir_size_kb=0x000000000200,grpjquota=,min_batch_time=0x00000000000003ff,rootcontext\a']) [ 1891.067732][T25300] loop5: detected capacity change from 0 to 264192 [ 1891.092625][T25300] EXT4-fs (loop5): VFS: Can't find ext4 filesystem 10:11:10 executing program 2: r0 = openat$vcsu(0xffffffffffffff9c, &(0x7f0000000340), 0x301, 0x0) ioctl$PTP_ENABLE_PPS(r0, 0x40043d04, 0x1) sendmsg$TIPC_CMD_SHOW_LINK_STATS(r0, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x3000}, 0xc, &(0x7f0000000080)={&(0x7f0000000040)={0x28, 0x0, 0x300, 0x70bd29, 0x25dfdbfe, {{}, {}, {0xc, 0x14, 'syz1\x00'}}, ["", "", "", "", "", "", "", ""]}, 0x28}, 0x1, 0x0, 0x0, 0x40}, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000440)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) openat$dir(0xffffffffffffff9c, &(0x7f0000000300)='./file0\x00', 0x0, 0x0) unlinkat(0xffffffffffffff9c, &(0x7f0000000100)='./file0\x00', 0x200) 10:11:10 executing program 1: r0 = syz_genetlink_get_family_id$nbd(&(0x7f00000003c0), 0xffffffffffffffff) r1 = openat$incfs(0xffffffffffffff9c, &(0x7f0000000400)='.log\x00', 0x105400, 0xa0) r2 = openat$incfs(0xffffffffffffffff, &(0x7f0000000440)='.log\x00', 0x201, 0x60) sendmsg$NBD_CMD_STATUS(0xffffffffffffffff, &(0x7f0000000580)={&(0x7f0000000380)={0x10, 0x0, 0x0, 0x200000}, 0xc, &(0x7f0000000540)={&(0x7f0000000480)=ANY=[@ANYBLOB='\a\x00\x00\x00', @ANYRES16=r0, @ANYBLOB="00042cbd7000fbdbdf25050000000c00020005000000000000002c00078008000100", @ANYRES32, @ANYBLOB="08000100", @ANYRES32, @ANYBLOB="08000100", @ANYRES32, @ANYBLOB="08000100", @ANYRES32, @ANYBLOB="08000100", @ANYRES32=r1, @ANYBLOB="3c00078008000100", @ANYRES32, @ANYBLOB="08000100", @ANYRES32, @ANYBLOB="08000100", @ANYRES32=r2, @ANYBLOB="08000100", @ANYRES32, @ANYBLOB="08000100", @ANYRES32, @ANYBLOB="08000100", @ANYRES32, @ANYBLOB="08000100", @ANYRES32, @ANYBLOB="0c0006000300000000000000"], 0x94}, 0x1, 0x0, 0x0, 0x20008040}, 0x890) clock_settime(0x0, &(0x7f0000000000)={0x0, 0x989680}) pselect6(0x40, &(0x7f0000000080)={0x7fffffff, 0x101, 0x2, 0x3ff, 0x0, 0x6, 0x86d, 0x74}, &(0x7f00000000c0)={0x5, 0x9, 0xd71d, 0x8, 0x5, 0x9, 0x2387, 0x60}, &(0x7f0000000100)={0x2, 0x5, 0x0, 0x9, 0x346, 0x2, 0x1, 0xdbdf}, &(0x7f0000000140)={0x0, 0x3938700}, &(0x7f00000001c0)={&(0x7f0000000180)={[0xc]}, 0x8}) clock_gettime(0x6, &(0x7f0000000040)) r3 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NL802154_CMD_DEL_SEC_DEV(r3, &(0x7f00000006c0)={&(0x7f00000005c0)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f0000000680)={&(0x7f0000000600)={0x50, 0x0, 0x200, 0x70bd25, 0x25dfdbfe, {}, [@NL802154_ATTR_WPAN_DEV={0xc}, @NL802154_ATTR_IFINDEX={0x8}, @NL802154_ATTR_WPAN_DEV={0xc, 0x6, 0x300000003}, @NL802154_ATTR_WPAN_DEV={0xc, 0x6, 0x100000001}, @NL802154_ATTR_SEC_DEVICE={0x10, 0x23, 0x0, 0x1, {0xc}}]}, 0x50}, 0x1, 0x0, 0x0, 0x4021}, 0x400c4) pselect6(0x40, &(0x7f0000000200)={0x1, 0x7, 0x80, 0x3, 0xf739ea9, 0x8, 0xd5, 0x9}, &(0x7f0000000240)={0x2, 0x8, 0xf1b6, 0xc98, 0x8, 0x9, 0x7f, 0x8a1}, &(0x7f0000000280)={0xd1, 0x10001, 0x8, 0x8, 0x7ff, 0xbb7, 0x7, 0x5}, &(0x7f00000002c0)={0x0, 0x3938700}, &(0x7f0000000340)={&(0x7f0000000300)={[0x7f]}, 0x8}) 10:11:10 executing program 4: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000040)={0x2, &(0x7f0000000000)=[{0x25}, {0x0, 0x0, 0x0, 0x1000000}]}) 10:11:10 executing program 3: r0 = syz_mount_image$ext4(&(0x7f0000000080)='ext3\x00', &(0x7f0000000040)='./file1\x00', 0x9, 0x0, 0x0, 0xac, &(0x7f0000000080)=ANY=[]) faccessat2(r0, &(0x7f0000000000)='./file0\x00', 0x3, 0x100) [ 1891.200739][T25332] loop5: detected capacity change from 0 to 8 10:11:10 executing program 2: syz_mount_image$ext4(0x0, &(0x7f0000000440)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) openat$dir(0xffffffffffffff9c, &(0x7f0000000300)='./file0\x00', 0x0, 0x0) unlinkat(0xffffffffffffff9c, &(0x7f0000000100)='./file0\x00', 0x200) r0 = openat$vcsu(0xffffffffffffff9c, &(0x7f0000000340), 0x301, 0x0) ioctl$PTP_ENABLE_PPS(r0, 0x40043d04, 0x1) r1 = syz_genetlink_get_family_id$tipc(0xfffffffffffffffd, 0xffffffffffffffff) sendmsg$TIPC_CMD_SET_LINK_TOL(r0, &(0x7f0000000140)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x8000000}, 0xc, &(0x7f00000000c0)={&(0x7f0000000040)={0x68, r1, 0x20, 0x70bd2c, 0x25dfdbfd, {{}, {}, {0x4c, 0x18, {0x8, @link='syz0\x00'}}}, ["", "", "", ""]}, 0x68}, 0x1, 0x0, 0x0, 0x4008000}, 0x800) 10:11:10 executing program 4: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000040)={0x2, &(0x7f0000000000)=[{0x25}, {0x0, 0x0, 0x0, 0x2000000}]}) [ 1891.278384][T25332] loop5: detected capacity change from 0 to 264192 [ 1891.296125][T25332] EXT4-fs (loop5): VFS: Can't find ext4 filesystem 10:11:10 executing program 0: r0 = syz_genetlink_get_family_id$nl802154(&(0x7f00000000c0), 0xffffffffffffffff) r1 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f0000000540)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x100}, 0xc, &(0x7f0000000500)={&(0x7f00000003c0)={0x5c, 0x0, 0x1, 0x70bd2b, 0x25dfdbfb, {}, [@NBD_ATTR_CLIENT_FLAGS={0xc, 0x6, 0x1}, @NBD_ATTR_SIZE_BYTES={0xc, 0x2, 0x5}, @NBD_ATTR_DEAD_CONN_TIMEOUT={0xc}, @NBD_ATTR_TIMEOUT={0xc, 0x4, 0x9}, @NBD_ATTR_SERVER_FLAGS={0xc, 0x5, 0x20}, @NBD_ATTR_SIZE_BYTES={0xc, 0x2, 0x8000}]}, 0x5c}, 0x1, 0x0, 0x0, 0x8000}, 0x40000) ioctl$sock_SIOCGIFINDEX_802154(0xffffffffffffffff, 0x8933, &(0x7f0000000100)={'wpan1\x00'}) sendmsg$NL802154_CMD_DEL_SEC_DEV(0xffffffffffffffff, &(0x7f0000000240)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f0000000200)={&(0x7f0000000140)=ANY=[@ANYBLOB="14df0000", @ANYRES16=r0, @ANYBLOB="200029bd7000fddbdf251b000000"], 0x14}, 0x1, 0x0, 0x0, 0x800}, 0x4000800) r2 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NBD_CMD_RECONFIGURE(r2, &(0x7f00000004c0)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f0000000480)={&(0x7f0000000440)={0x34, 0x0, 0x8, 0x70bd2d, 0x25dfdbfc, {}, [@NBD_ATTR_SIZE_BYTES={0xc, 0x2, 0x7}, @NBD_ATTR_INDEX={0x8, 0x1, 0x0}, @NBD_ATTR_SERVER_FLAGS={0xc, 0x5, 0x1}]}, 0x34}, 0x1, 0x0, 0x0, 0x20000040}, 0x4000) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) ioctl$PTP_ENABLE_PPS(0xffffffffffffffff, 0x40043d04, 0x0) r3 = socket(0x10, 0x1, 0x10001) r4 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NBD_CMD_STATUS(r4, &(0x7f0000000380)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x4000000}, 0xc, &(0x7f0000000340)={&(0x7f0000000040)=ANY=[], 0x68}, 0x1, 0x0, 0x0, 0x20000001}, 0x10) ioctl$ifreq_SIOCGIFINDEX_team(r3, 0x8933, &(0x7f0000000000)) ioctl$SCSI_IOCTL_GET_PCI(0xffffffffffffffff, 0x5387, &(0x7f00000002c0)) 10:11:10 executing program 5: syz_mount_image$ext4(0x0, &(0x7f0000000440)='./file0\x00', 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) openat$dir(0xffffffffffffff9c, &(0x7f0000000300)='./file0\x00', 0x0, 0x0) unlinkat(0xffffffffffffff9c, &(0x7f0000000100)='./file0\x00', 0x200) 10:11:10 executing program 3: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NBD_CMD_CONNECT(r0, &(0x7f00000013c0)={&(0x7f00000012c0)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f0000000500)={0x0}}, 0xc6c3dbe86af1a089) r1 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$nl802154(&(0x7f0000000380), r0) ioctl$sock_SIOCGIFINDEX_802154(r0, 0x8933, &(0x7f00000003c0)={'wpan1\x00', 0x0}) sendmsg$NL802154_CMD_SET_MAX_CSMA_BACKOFFS(r1, &(0x7f00000004c0)={&(0x7f0000000340)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f0000000480)={&(0x7f0000000400)={0x44, r2, 0x8, 0x70bd26, 0x25dfdbfb, {}, [@NL802154_ATTR_MAX_CSMA_BACKOFFS={0x5, 0x12, 0x8}, @NL802154_ATTR_IFINDEX={0x8}, @NL802154_ATTR_IFINDEX={0x8, 0x3, r3}, @NL802154_ATTR_WPAN_DEV={0xc, 0x6, 0x100000001}, @NL802154_ATTR_WPAN_DEV={0xc, 0x6, 0x300000003}]}, 0x44}, 0x1, 0x0, 0x0, 0x800}, 0x0) ioctl$sock_SIOCGIFINDEX_802154(0xffffffffffffffff, 0x8933, &(0x7f0000000200)={'wpan4\x00', 0x0}) sendmsg$IEEE802154_LIST_IFACE(r0, &(0x7f0000000300)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x200000}, 0xc, &(0x7f00000002c0)={&(0x7f0000000240)={0x74, 0x0, 0x100, 0x70bd25, 0x25dfdbfc, {}, [@IEEE802154_ATTR_DEV_NAME={0xa, 0x1, 'wpan0\x00'}, @IEEE802154_ATTR_DEV_INDEX={0x8}, @IEEE802154_ATTR_DEV_INDEX={0x8}, @IEEE802154_ATTR_DEV_NAME={0xa, 0x1, 'wpan0\x00'}, @IEEE802154_ATTR_DEV_NAME={0xa, 0x1, 'wpan1\x00'}, @IEEE802154_ATTR_DEV_NAME={0xa, 0x1, 'wpan4\x00'}, @IEEE802154_ATTR_DEV_NAME={0xa, 0x1, 'wpan3\x00'}, @IEEE802154_ATTR_DEV_NAME={0xa, 0x1, 'wpan1\x00'}, @IEEE802154_ATTR_DEV_INDEX={0x8, 0x2, r4}]}, 0x74}, 0x1, 0x0, 0x0, 0x4000}, 0x1) syz_mount_image$ext4(&(0x7f0000000000)='ext3\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000080)=ANY=[@ANYBLOB='lazytime,test_dummy_encryption,max_dir_size_kb=0x000000000200,grpjquota=,min_batch_time=0x00000000000003ff,rootcontext\a', @ANYBLOB="41868663a35334aea366a3940b4516130e5d36e73cfdefff87374ac158a0dfa197a09ca08802a4139230061439722d7247e5cbebe28bdd2be91efa6ce8175ab5cf3bbf7ee0e722688c5e7334e1af1d29cc8fb488a0607ce9b02c9fa2a51f1031a9a3dd02cc74db60c91f926cdab33b837f610dbae20c919e7e0d4add57906c9b"]) 10:11:10 executing program 1: clock_settime(0x0, &(0x7f0000000000)) 10:11:10 executing program 4: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000040)={0x2, &(0x7f0000000000)=[{0x25}, {0x0, 0x0, 0x0, 0x3000000}]}) 10:11:10 executing program 2: r0 = syz_mount_image$ext4(0x0, &(0x7f0000000440)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) openat$dir(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x40, 0x0) unlinkat(0xffffffffffffff9c, &(0x7f0000000100)='./file0\x00', 0x200) r1 = openat$vcsu(0xffffffffffffff9c, &(0x7f0000000340), 0x301, 0x0) ioctl$PTP_ENABLE_PPS(r1, 0x40043d04, 0x1) renameat2(r1, &(0x7f0000000000)='./file0\x00', r0, &(0x7f0000000080)='./file0/file0\x00', 0x1) 10:11:10 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x0, &(0x7f0000000000)={0x0, &(0x7f0000000040)}) prctl$PR_SET_TIMERSLACK(0x1d, 0x9) prctl$PR_SET_SECCOMP(0x16, 0x0, &(0x7f0000000080)={0x5, &(0x7f0000000040)=[{0x0, 0x58, 0x4, 0x1}, {0x5, 0x3, 0xa9, 0x8a08}, {0x8, 0x7, 0x53, 0x2}, {0xfffe, 0x6, 0x3, 0x3e18}, {0x7, 0x9, 0x3f, 0x8b39}]}) 10:11:10 executing program 1: r0 = openat$vcsu(0xffffffffffffff9c, &(0x7f0000000340), 0x301, 0x0) ioctl$PTP_ENABLE_PPS(r0, 0x40043d04, 0x1) r1 = openat$vcsu(0xffffffffffffff9c, &(0x7f0000000080), 0x319200, 0x0) renameat2(r0, &(0x7f0000000040)='./file0\x00', r1, &(0x7f00000000c0)='./file0\x00', 0x1) clock_settime(0x0, &(0x7f0000000000)={0x77359400}) 10:11:10 executing program 4: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000040)={0x2, &(0x7f0000000000)=[{0x25}, {0x0, 0x0, 0x0, 0x5000000}]}) 10:11:10 executing program 2: prctl$PR_GET_NO_NEW_PRIVS(0x27) r0 = syz_mount_image$ext4(0x0, &(0x7f0000000440)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) openat$dir(0xffffffffffffff9c, &(0x7f0000000300)='./file0\x00', 0x0, 0x0) ioctl$SG_SET_TIMEOUT(r0, 0x2201, &(0x7f0000000000)=0x8) unlinkat(0xffffffffffffff9c, &(0x7f0000000100)='./file0\x00', 0x200) 10:11:10 executing program 5: r0 = syz_genetlink_get_family_id$tipc(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$TIPC_CMD_SHOW_LINK_STATS(0xffffffffffffffff, &(0x7f0000000140)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x20}, 0xc, &(0x7f00000000c0)={&(0x7f0000000080)={0x28, r0, 0x400, 0x70bd29, 0x25dfdbfe, {{}, {}, {0xc, 0x14, 'syz1\x00'}}, ["", "", ""]}, 0x28}}, 0x8800) syz_mount_image$ext4(0x0, &(0x7f0000000440)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r1 = socket(0x26, 0x5, 0x5) sendmsg$TIPC_CMD_SET_LINK_TOL(r1, &(0x7f0000000280)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000000240)={&(0x7f00000001c0)={0x68, r0, 0x300, 0x70bd2c, 0x25dfdbfe, {{}, {}, {0x4c, 0x18, {0x1, @media='eth\x00'}}}, ["", "", ""]}, 0x68}, 0x1, 0x0, 0x0, 0x2}, 0x0) openat$dir(0xffffffffffffff9c, &(0x7f00000002c0)='./file0\x00', 0x2042, 0x0) unlinkat(0xffffffffffffff9c, &(0x7f0000000100)='./file0\x00', 0x200) 10:11:10 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000040)={0x59, &(0x7f0000000000)=[{0x15, 0x0, 0x0, 0x1}, {0x0, 0x0, 0x0, 0xfffffffc}]}) prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f00000000c0)={0x3, &(0x7f0000000080)=[{0x8, 0x1, 0x20, 0x8}, {0x2, 0x5, 0x1f, 0x9}, {0x9, 0xff, 0xff, 0xf1e9}]}) 10:11:10 executing program 4: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000040)={0x2, &(0x7f0000000000)=[{0x25}, {0x0, 0x0, 0x0, 0x6000000}]}) 10:11:10 executing program 1: sendmsg$TIPC_CMD_DISABLE_BEARER(0xffffffffffffffff, &(0x7f00000005c0)={&(0x7f0000000500)={0x10, 0x0, 0x0, 0x10}, 0xc, &(0x7f0000000580)={&(0x7f0000000540)={0x2c, 0x0, 0x100, 0x70bd2b, 0x25dfdbfe, {{}, {}, {0x10, 0x13, @udp='udp:syz0\x00'}}, ["", "", ""]}, 0x2c}, 0x1, 0x0, 0x0, 0x40000}, 0x20044850) r0 = openat$ptp0(0xffffffffffffff9c, &(0x7f0000000040), 0x256080, 0x0) r1 = openat$ptp0(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) ioctl$PTP_EXTTS_REQUEST(r1, 0x40103d02, &(0x7f00000000c0)) ioctl$PTP_PIN_GETFUNC2(r1, 0xc0603d0f, &(0x7f0000000100)={'\x00', 0x8, 0x3, 0x3}) ioctl$PTP_PIN_SETFUNC2(r0, 0x40603d10, &(0x7f0000000080)={'\x00', 0x8, 0x3, 0x100}) r2 = openat$incfs(0xffffffffffffff9c, &(0x7f0000000000)='.log\x00', 0x800, 0xc0) ioctl$SG_SET_DEBUG(r2, 0x227e, &(0x7f00000004c0)) ioctl$PTP_SYS_OFFSET(r2, 0x43403d05, &(0x7f0000000180)={0x13}) 10:11:10 executing program 3: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NBD_CMD_CONNECT(r0, &(0x7f00000013c0)={&(0x7f00000012c0), 0xc, &(0x7f0000001380)={0x0}}, 0xc6c3dbe86af1a089) r1 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r3 = syz_genetlink_get_family_id$netlbl_calipso(&(0x7f0000000140), r2) sendmsg$NLBL_CALIPSO_C_ADD(r1, &(0x7f00000003c0)={&(0x7f0000000000), 0xc, &(0x7f0000000100)={&(0x7f0000000480)=ANY=[@ANYBLOB="e0d958a9647f126f16", @ANYRES16=r3, @ANYRES64], 0x24}}, 0x0) sendmsg$NLBL_CALIPSO_C_ADD(r0, &(0x7f0000000280)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x800}, 0xc, &(0x7f0000000240)={&(0x7f0000000200)={0x24, r3, 0x0, 0x70bd26, 0x25dfdbfb, {}, [@NLBL_CALIPSO_A_MTYPE={0x8}, @NLBL_CALIPSO_A_DOI={0x8, 0x1, 0x1}]}, 0x24}, 0x1, 0x0, 0x0, 0x81}, 0x20000011) r4 = syz_mount_image$ext4(&(0x7f00000000c0)='ext3\x00', &(0x7f0000000000)='./file0\x00', 0x6d57afe0, 0x0, 0x0, 0x809000, &(0x7f0000000100)=ANY=[@ANYRESDEC, @ANYBLOB="478c6db21b6d033415ccc1e465fe5c72895b1d282f1b2c5b7bbe8abe5c59cec8ed346db09e9d368a58821ab5da7ca31e98985732db0d56e6b369be6ffb81542eb8941eb09b0598762b2f32bb1550d1da811561fb88f79b4b85e89a4ff1c4445b150ac8fc069c179031428992e5d3c7a693701dfeb654ed3f500314ccf540d6aacc489834fcffe9efb708da4c6bb3956fe8923e323e10d6d5fa7a3b0679fe5e5d86a1eae2154c7b792fe7fe81a7ad264a03f5924c24b79274af6e9b5956c5c6a93e7ba22c72f60557e43934b6ce043e17a3"]) openat$dir(0xffffffffffffff9c, &(0x7f00000002c0)='./file0\x00', 0xc2, 0x50) r5 = openat$vcsu(0xffffffffffffff9c, &(0x7f0000000000), 0x5200, 0x0) fchmodat(r5, &(0x7f0000000040)='./file0\x00', 0x1b0) r6 = openat$incfs(r5, &(0x7f00000002c0)='.log\x00', 0x581200, 0x123) syz_genetlink_get_family_id$fou(&(0x7f0000000300), r6) renameat2(r6, &(0x7f0000000380)='./file0\x00', 0xffffffffffffffff, &(0x7f00000003c0)='./file1\x00', 0x0) faccessat2(r6, &(0x7f0000000340)='./file0\x00', 0x9d, 0x3000) rt_sigprocmask(0x2, &(0x7f0000000400)={[0x3]}, &(0x7f0000000440), 0x8) openat$incfs(r6, &(0x7f0000000640)='.log\x00', 0x480100, 0x254) unlinkat(r4, &(0x7f0000000080)='./file0\x00', 0x0) r7 = openat$vcsu(0xffffffffffffff9c, &(0x7f00000004c0), 0xd0000, 0x0) sendmsg$TIPC_CMD_SET_LINK_WINDOW(r7, &(0x7f0000000600)={&(0x7f0000000500)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f00000005c0)={&(0x7f0000000680)=ANY=[@ANYBLOB='h\x00\x00\x00', @ANYRES16=0x0, @ANYBLOB="020026bd7000fedbdf25010000000000000009410001004c00180000002d75647000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000008fb137129b169fab67a282a1e2ae21d74396dd9afa5ce8b3950fa7293b72736f59000000000000"], 0x68}}, 0x0) 10:11:10 executing program 4: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000040)={0x2, &(0x7f0000000000)=[{0x25}, {0x0, 0x0, 0x0, 0x7000000}]}) 10:11:10 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000040)={0x2, &(0x7f0000000000)=[{0x15}, {}]}) prctl$PR_GET_NO_NEW_PRIVS(0x27) prctl$PR_CAP_AMBIENT(0x2f, 0x4, 0x5) 10:11:10 executing program 2: syz_mount_image$ext4(0x0, &(0x7f0000000440)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) openat$dir(0xffffffffffffff9c, &(0x7f0000000300)='./file0\x00', 0x0, 0x0) arch_prctl$ARCH_SET_CPUID(0x1012, 0x0) prctl$PR_SET_CHILD_SUBREAPER(0x24, 0x1) unlinkat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x200) 10:11:10 executing program 5: r0 = syz_mount_image$ext4(0x0, &(0x7f0000000440)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) openat$dir(0xffffffffffffff9c, &(0x7f0000000300)='./file0\x00', 0x0, 0x0) r1 = socket$packet(0x11, 0xc421361b592988ea, 0x300) setsockopt$packet_buf(r1, 0x107, 0x5, &(0x7f0000000140)="d5812ec8d8a99e0acf9ee0e06bfbf239bdbbc12a733af35792112911c96900b2a4094b85c00b51a20fc3d2ff2246cf1e6281624bc23288e351744ed12466ecd895e330da0aafc9ab71271ddaf007049cc303c0afa14656c00f187eeb1392b819bb14d7201599456dcac03bb708eca6d8b860b901b9546c971bd47b462cb385ac0a653585217dbb88eaee7864f3d27305acef9cc6ac7803047c2fa357d0dea56eb2cfee24d66a1f43c1eb88c3e527481d6ed77dd31cccc6db6555e9", 0xbb) symlinkat(&(0x7f0000000000)='./file0\x00', r0, &(0x7f0000000040)='./file0\x00') unlinkat(0xffffffffffffff9c, &(0x7f0000000100)='./file0\x00', 0x200) 10:11:10 executing program 1: r0 = fork() sched_setparam(r0, &(0x7f0000000080)=0x9) prctl$PR_GET_FPEXC(0xb, &(0x7f0000000040)) sched_rr_get_interval(r0, &(0x7f0000000100)) r1 = fork() sched_rr_get_interval(r0, &(0x7f00000000c0)) prctl$PR_GET_TSC(0x19, &(0x7f0000000140)) getpgrp(r1) r2 = gettid() ptrace$peek(0x3, r2, &(0x7f0000000000)) 10:11:10 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000040)={0x2, &(0x7f0000000000)=[{0x15, 0x3}, {0xfffd}]}) r0 = openat$vcsu(0xffffffffffffff9c, &(0x7f0000000000), 0x5200, 0x0) fchmodat(r0, &(0x7f0000000040)='./file0\x00', 0x1b0) r1 = openat$dir(0xffffffffffffff9c, &(0x7f0000000180)='./file0\x00', 0x101600, 0xa8) fchmodat(r1, &(0x7f00000001c0)='./file0\x00', 0x3a) openat$incfs(r0, &(0x7f00000002c0)='.log\x00', 0x581200, 0x123) accept4$packet(r0, &(0x7f0000000400)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000000440)=0x14, 0x100000) ioctl$SG_SET_DEBUG(r0, 0x227e, &(0x7f00000000c0)) r2 = openat$dir(0xffffffffffffff9c, &(0x7f0000000100)='./file0\x00', 0x80000, 0x44) fchmodat(r2, &(0x7f0000000140)='./file0\x00', 0x0) syz_genetlink_get_family_id$tipc(&(0x7f0000000080), r0) 10:11:10 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext2\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000480)=ANY=[]) r0 = openat$vcsu(0xffffffffffffff9c, &(0x7f0000000000), 0x5200, 0x0) fchmodat(r0, &(0x7f0000000040)='./file0\x00', 0x1b0) r1 = openat$incfs(r0, &(0x7f00000002c0)='.log\x00', 0x581200, 0x123) syz_genetlink_get_family_id$fou(&(0x7f0000000300), r1) renameat2(r1, &(0x7f0000000380)='./file0\x00', 0xffffffffffffffff, &(0x7f00000003c0)='./file1\x00', 0x0) r2 = syz_genetlink_get_family_id$fou(&(0x7f00000000c0), 0xffffffffffffffff) sendmsg$FOU_CMD_ADD(r1, &(0x7f0000000180)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x40}, 0xc, &(0x7f0000000140)={&(0x7f0000000100)={0x34, r2, 0x0, 0x70bd2b, 0x25dfdbfb, {}, [@FOU_ATTR_PEER_V6={0x14, 0x9, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02'}, @FOU_ATTR_LOCAL_V4={0x8, 0x6, @multicast1}, @FOU_ATTR_REMCSUM_NOPARTIAL={0x4}]}, 0x34}}, 0x41) 10:11:10 executing program 4: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000040)={0x2, &(0x7f0000000000)=[{0x25}, {0x0, 0x0, 0x0, 0x9000000}]}) 10:11:10 executing program 5: syz_mount_image$ext4(0x0, &(0x7f0000000440)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) openat$dir(0xffffffffffffff9c, &(0x7f0000000300)='./file0\x00', 0x0, 0x0) unlinkat(0xffffffffffffff9c, &(0x7f0000000100)='./file0\x00', 0x200) r0 = openat$vcsu(0xffffffffffffff9c, &(0x7f0000000000), 0x400001, 0x0) unlinkat(r0, &(0x7f0000000040)='./file0\x00', 0x200) socketpair(0x2c, 0x7, 0xc12, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = syz_genetlink_get_family_id$tipc(&(0x7f0000000140), r0) sendmsg$TIPC_CMD_GET_MEDIA_NAMES(r1, &(0x7f0000000200)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x800000}, 0xc, &(0x7f00000001c0)={&(0x7f0000000180)={0x1c, r2, 0x200, 0x70bd2b, 0x25dfdbfc, {}, ["", "", "", "", "", "", "", ""]}, 0x1c}, 0x1, 0x0, 0x0, 0x4890}, 0x40) 10:11:10 executing program 2: syz_mount_image$ext4(0x0, &(0x7f0000000440)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) openat$dir(0xffffffffffffff9c, &(0x7f0000000300)='./file0\x00', 0x0, 0x0) r0 = getgid() r1 = openat$vcsu(0xffffffffffffff9c, &(0x7f0000000000), 0x5200, 0x0) fchmodat(r1, &(0x7f0000000040)='./file0\x00', 0x1b0) openat$incfs(r1, &(0x7f00000002c0)='.log\x00', 0x581200, 0x123) accept4$packet(r1, &(0x7f0000000400)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000000440)=0x14, 0x100000) fchmodat(r1, &(0x7f0000000340)='./file0\x00', 0x9) setfsgid(r0) syz_mount_image$ext4(&(0x7f0000000080)='ext3\x00', &(0x7f00000000c0)='./file0\x00', 0x8, 0x1, &(0x7f00000001c0)=[{&(0x7f0000000140)="3a4bf6cfcf616c632df41026f1d260fcb7e7246df52850065fe04157f81461f4ea8c3e11fc15c3f483b4f36059cde233e20abc9a4e331f21280f230c8fc37056733866a7c2494105d1d699", 0x4b, 0xa001}], 0x2124000, &(0x7f0000000200)=ANY=[@ANYBLOB='noquota,inode_readahead_blks=0x0000000000000080,jqfmt=vfsv1,bh,min_batch_time=0x0000000100000001,resgid=', @ANYRESHEX=r0, @ANYBLOB=',euid=', @ANYRESDEC=0x0, @ANYBLOB=',5id=', @ANYRESDEC=0xee01, @ANYBLOB=',subj_role=/dev/vcsu\x00,measure,\x00']) r2 = openat$vcsu(0xffffffffffffff9c, &(0x7f0000000000), 0x12001, 0x0) faccessat2(r2, &(0x7f0000000040)='./file0\x00', 0x100, 0x200) unlinkat(0xffffffffffffff9c, &(0x7f0000000100)='./file0\x00', 0x200) 10:11:11 executing program 4: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000040)={0x2, &(0x7f0000000000)=[{0x25}, {0x0, 0x0, 0x0, 0x15000000}]}) [ 1891.963721][T25552] loop2: detected capacity change from 0 to 160 10:11:11 executing program 1: clock_settime(0x7, &(0x7f0000000000)={0x77359400}) 10:11:11 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext3\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000280)=ANY=[@ANYBLOB="6c617a7974696d652c746573745f64756d6d795f2e7931f6be339e6100bd5e8b656e6372797074696f6e2c6d61785f6469725f73697a655f6b623d30783030303030303030303230302c6772706a05000000613d2c6d696e5f62617463685f74696d653d3078303030303030303030303030303366662c726f6f74636f6e7465787407"]) syz_mount_image$ext4(&(0x7f0000000080)='ext2\x00', &(0x7f00000000c0)='./file0\x00', 0x1, 0x1, &(0x7f00000001c0)=[{&(0x7f0000000100)="ffd996ffd4253de16c816820459ebc1ceee35c57b86b50e86338ba14289ff293c1cd52e78f5430c725fe7e5e195d294b6aef931ce7e4d3619070f45fd530d92d4089fa3bf710551d23803fbc05064653ee469c0b3200273374fcd3187d366c6abe22a6de15ccbade259cdf7585c92f31d808a8491ce33b8383ef28a9d9ba90554dec52807839f797af9c9a41d0d6570642a6319ebb078f9d18dde3f3c226143fb3a309307150316153aaebaead91d16c767760c3c1", 0xb5, 0x401}], 0x2000, &(0x7f0000000200)=ANY=[@ANYBLOB='prjquota,discard,euid<', @ANYRESDEC=0xee01, @ANYBLOB="d3dd61736b3d5e4d41595f573a4900e9b4016d61636b6673726f6f743d65787433002c00"]) socket$inet6_udp(0xa, 0x2, 0x0) 10:11:11 executing program 4: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000040)={0x2, &(0x7f0000000000)=[{0x25}, {0x0, 0x0, 0x0, 0x16000000}]}) 10:11:11 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000040)={0x2, &(0x7f0000000000)=[{0x15}, {}]}) r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NBD_CMD_CONNECT(r0, &(0x7f00000013c0)={&(0x7f00000012c0), 0xc, &(0x7f0000001380)={0x0}}, 0xc6c3dbe86af1a089) sendmsg$NL802154_CMD_SET_CCA_MODE(r0, &(0x7f0000000140)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f0000000100)={&(0x7f00000000c0)={0x20, 0x0, 0x20, 0x70bd2c, 0x25dfdbfd, {}, [@NL802154_ATTR_WPAN_DEV={0xc, 0x6, 0x300000003}]}, 0x20}, 0x1, 0x0, 0x0, 0x11}, 0x20000000) 10:11:11 executing program 5: syz_mount_image$ext4(0x0, &(0x7f0000000440)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) openat$dir(0xffffffffffffff9c, &(0x7f0000000300)='./file0\x00', 0x0, 0x0) r0 = openat$vcsu(0xffffffffffffff9c, &(0x7f0000000340), 0x301, 0x0) ioctl$PTP_ENABLE_PPS(r0, 0x40043d04, 0x1) symlinkat(&(0x7f0000000000)='./file0\x00', r0, &(0x7f0000000040)='./file0\x00') unlinkat(0xffffffffffffff9c, &(0x7f0000000100)='./file0\x00', 0x200) [ 1892.082288][T25580] loop3: detected capacity change from 0 to 4 10:11:11 executing program 1: clock_gettime(0x6, &(0x7f0000000040)={0x0, 0x0}) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) clock_settime(0x3, &(0x7f0000000000)={r0, r1+10000000}) fchmodat(0xffffffffffffffff, &(0x7f00000000c0)='./file0\x00', 0x12) execveat(0xffffffffffffff9c, &(0x7f0000000100)='./file0\x00', &(0x7f0000000380)=[&(0x7f0000000140)='\x00', &(0x7f0000000180)='+*,\x00', &(0x7f00000001c0)='-*.\\2!/^*\x00', &(0x7f0000000540)='&+&wK\x01\xb4\xb2-\x17-\x00', &(0x7f0000000240)='\x00', &(0x7f0000000280)='^\x00', &(0x7f00000002c0)=']c\x13,\xb0\x00', &(0x7f0000000300)=')\x00', &(0x7f0000000340)=')}@\\\x00'], &(0x7f0000000500)=[&(0x7f0000000400)='&@!\\%**$\\^@-$\xce$@!$+%%}[\x00', &(0x7f0000000440)='\xa4\x00', &(0x7f0000000480)='\x00', &(0x7f00000004c0)='-\x00'], 0x400) getitimer(0x2, &(0x7f0000000080)) 10:11:11 executing program 4: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000040)={0x2, &(0x7f0000000000)=[{0x25}, {0x0, 0x0, 0x0, 0x1d000000}]}) 10:11:11 executing program 2: syz_mount_image$ext4(0x0, &(0x7f0000000440)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) openat$dir(0xffffffffffffff9c, &(0x7f0000000300)='./file0\x00', 0x0, 0x0) unlinkat(0xffffffffffffff9c, &(0x7f0000000100)='./file0\x00', 0x200) r0 = openat$vcsu(0xffffffffffffff9c, &(0x7f0000000000), 0x5200, 0x0) fchmodat(r0, &(0x7f0000000040)='./file0\x00', 0x1b0) r1 = openat$incfs(r0, &(0x7f00000002c0)='.log\x00', 0x581200, 0x123) accept4$packet(r0, &(0x7f0000000400)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000000440)=0x14, 0x100000) unlinkat(r0, &(0x7f0000000000)='./file0\x00', 0x0) accept$packet(r1, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000140)=0x14) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000000180)={'team0\x00', 0x0}) sendmsg$TEAM_CMD_PORT_LIST_GET(r1, &(0x7f0000000200)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f00000001c0)={&(0x7f0000000480)={0x560, 0x0, 0x1, 0x101, 0x25dfdbfd, {}, [{{0x8, 0x1, r2}, {0x16c, 0x2, 0x0, 0x1, [{0x40, 0x1, @lb_tx_hash_to_port_mapping={{{0x24}, {0x5}, {0x8, 0x4, r2}}, {0x8}}}, {0x74, 0x1, @bpf_hash_func={{0x24}, {0x5}, {0x44, 0x4, [{0x2b, 0x7f, 0x62, 0x80000000}, {0x8, 0x3, 0x1, 0x1000}, {0x7, 0x6, 0xff, 0x8}, {0x3, 0x8, 0x4, 0xffff}, {0x9, 0x6, 0x0, 0xec9}, {0x3, 0x24, 0x40, 0x40}, {0x972, 0xe3, 0x1f}, {0xae06, 0x1, 0x8, 0x5}]}}}, {0x40, 0x1, @priority={{{0x24}, {0x5}, {0x8, 0x4, 0x800}}, {0x8, 0x6, r2}}}, {0x38, 0x1, @notify_peers_interval={{0x24}, {0x5}, {0x8, 0x4, 0x9}}}, {0x3c, 0x1, @user_linkup={{{0x24}, {0x5}, {0x4}}, {0x8, 0x6, r2}}}]}}, {{0x8, 0x1, r2}, {0x25c, 0x2, 0x0, 0x1, [{0x40, 0x1, @queue_id={{{0x24}, {0x5}, {0x8, 0x4, 0x7}}, {0x8, 0x6, r3}}}, {0x38, 0x1, @lb_stats_refresh_interval={{0x24}, {0x5}, {0x8, 0x4, 0xfffffffc}}}, {0x4c, 0x1, @lb_tx_method={{0x24}, {0x5}, {0x19, 0x4, 'hash_to_port_mapping\x00'}}}, {0x38, 0x1, @mcast_rejoin_count={{0x24}, {0x5}, {0x8, 0x4, 0x5}}}, {0x38, 0x1, @mcast_rejoin_count={{0x24}, {0x5}, {0x8, 0x4, 0x8001}}}, {0x38, 0x1, @notify_peers_interval={{0x24}, {0x5}, {0x8, 0x4, 0x3}}}, {0x38, 0x1, @notify_peers_count={{0x24}, {0x5}, {0x8, 0x4, 0x7}}}, {0x3c, 0x1, @bpf_hash_func={{0x24}, {0x5}, {0xc, 0x4, [{0x6, 0x80, 0x1, 0x4}]}}}, {0x38, 0x1, @mcast_rejoin_interval={{0x24}, {0x5}, {0x8, 0x4, 0x3}}}, {0x40, 0x1, @lb_tx_hash_to_port_mapping={{{0x24}, {0x5}, {0x8, 0x4, r2}}, {0x8}}}]}}, {{0x8, 0x1, r2}, {0x128, 0x2, 0x0, 0x1, [{0x3c, 0x1, @user_linkup_enabled={{{0x24}, {0x5}, {0x4}}, {0x8}}}, {0x38, 0x1, @activeport={{0x24}, {0x5}, {0x8, 0x4, r2}}}, {0x38, 0x1, @mcast_rejoin_interval={{0x24}, {0x5}, {0x8, 0x4, 0x400}}}, {0x38, 0x1, @mcast_rejoin_interval={{0x24}, {0x5}, {0x8, 0x4, 0x3}}}, {0x40, 0x1, @lb_port_stats={{{0x24}, {0x5}, {0x8, 0x4, 0xe2}}, {0x8, 0x6, r4}}}]}}, {{0x8, 0x1, r2}, {0x3c, 0x2, 0x0, 0x1, [{0x38, 0x1, @lb_stats_refresh_interval={{0x24}, {0x5}, {0x8, 0x4, 0xffff}}}]}}]}, 0x560}, 0x1, 0x0, 0x0, 0x10}, 0x4000000) [ 1892.156151][T25580] loop3: detected capacity change from 0 to 4 10:11:11 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000080)={0x3, &(0x7f0000000000)=[{0x8, 0x0, 0x25, 0xfffffff7}, {0x7f, 0x7, 0x0, 0x80000002}, {0x2, 0x3f, 0x7f, 0x8}]}) ioctl$PTP_PEROUT_REQUEST2(0xffffffffffffffff, 0x40383d0c, &(0x7f0000000040)={{0x5, 0x9}, {0x3, 0x5}, 0xdb}) 10:11:11 executing program 1: clock_settime(0x0, &(0x7f0000000000)={0x77359400}) clock_gettime(0x5, &(0x7f0000000040)) 10:11:11 executing program 5: syz_mount_image$ext4(0x0, &(0x7f0000000440)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) openat$dir(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x2200, 0x0) openat$dir(0xffffffffffffff9c, &(0x7f0000000300)='./file0\x00', 0x0, 0x0) unlinkat(0xffffffffffffff9c, &(0x7f0000000100)='./file0\x00', 0x200) r0 = openat$vcsu(0xffffffffffffff9c, &(0x7f0000000000), 0x5200, 0x0) fchmodat(r0, &(0x7f0000000040)='./file0\x00', 0x1b0) r1 = syz_mount_image$ext4(&(0x7f0000000200)='ext3\x00', &(0x7f0000000280)='./file1\x00', 0x6, 0x5, &(0x7f0000000740)=[{&(0x7f00000002c0)="7192b7bce0", 0x5, 0x6417}, {&(0x7f0000000480)="7461216a08492ae264feb5284e473c39bb070ee52f31eed2c1fc07eb7f833f3b1697b5e2c515d0333d5f9b9ab4987086543db1bb57a01b36e852b1eceaebd0e9b4ec275f996383f94749d8e36eab2044dafcb2226eb0b24d51cd96f98ede39c1733f36e670659f82e7de944071892e3d631b7ebf9199b421", 0x78, 0x5}, {&(0x7f0000000500)="658fb773414da71faa57cb36e1f49e9e69f6859d8ae3a61c2a38415c95a8e6949cfb749c97569d3ee5019fc58a4cec29c9103ac7eaae0bd12a7ccc9c6bf78df05de3c58580ebfbd55577e674dd863bbe418e0f81f177307ad7b438da9670bfd5a4f45ab9c67c5653675b3c95592e4bd0d34f16a8774c9ea8422fcf368d0063411b903c1b2f98dfc868ba165a84", 0x8d, 0x93b}, {&(0x7f00000005c0)="16989a5b5383bbd1bd391f0c7e1062f3082cbfa72c41c8c832902e968585779311bd53c95cb08a7079c904e8093e093e9552a4ed24d05bd0d9bc7b17f4728c03bfccaf6ec266d67db6c8de1a3762df8d585717f881b7cfeaf6af2c413dc04be108f1bf142386634b22a092a53e4a1c79ae0dbffcd8d9b075b72ea63f6d5f178bcd14ee04e5a25c760f75bad8bba270470d30a312aac3affd2adfc5a308a08ae4b95375e705a872768681b7a313841ba7f21724481b5411fdce620e699d1ea1b155cd6d800eb64d1d6a61d977f46cd711a8de08db124fbdb93aabbe28f2d45a05f095d1a371e1569b585d779ef032de1a", 0xf0, 0x3ff}, {&(0x7f00000006c0)="d694929abfa028abcafedd30fcc807ee81a19cf8a3ede13530677d5cb2e4b98d87c121b7e517c58cb16f3e14841c13957f0b7a24d8f8b6139f8945c463900975eb5cbca4ea79c08d4346af809f6139484d1d9d82fcbbb7e523ca659610ae12b671cfedff6793ce5f1a531fe3013b0e260d47e1", 0x73, 0x5}], 0x40010, &(0x7f00000007c0)={[{@data_err_abort}, {@noquota}, {}], [{@func={'func', 0x3d, 'MMAP_CHECK'}}, {@measure}, {@euid_gt={'euid>', 0xee00}}, {@subj_role={'subj_role', 0x3d, '/dev/vcsu\x00'}}]}) r2 = openat$incfs(r1, &(0x7f0000000240)='.pending_reads\x00', 0x581200, 0x123) syz_genetlink_get_family_id$fou(&(0x7f0000000300), r2) renameat2(r2, &(0x7f0000000380)='./file0\x00', 0xffffffffffffffff, &(0x7f00000003c0)='./file1\x00', 0x0) sendmsg$TIPC_CMD_SHOW_STATS(0xffffffffffffffff, &(0x7f00000001c0)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f0000000180)={&(0x7f0000000140)={0x1c, 0x0, 0x2, 0x70bd29, 0x25dfdbfb, {}, ["", "", "", "", "", ""]}, 0x1c}}, 0x42050) symlinkat(&(0x7f0000000040)='./file0\x00', r2, &(0x7f0000000080)='./file0\x00') 10:11:11 executing program 3: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext3\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000080)=ANY=[@ANYBLOB="6c617a79969e507dc28957b33e8eae74696d652c746573745f64756d6d000000006372797074696f6e2c6d61785f6469725f73697a655f6b623d30783030303018303030303230304ee972706a71756f685f74696d652c3078303030303030303030303030303366662c726f6f74636f6e74657874077ede10e18deb88e3ca459d149f16ec0f60489b10872d"]) r1 = syz_mount_image$ext4(&(0x7f0000000140)='ext4\x00', &(0x7f0000000180)='./file0\x00', 0x6, 0x4, &(0x7f0000000500)=[{&(0x7f00000001c0)="d48f8c613a0fb1f2014806f8a8fb24c4edec90375acad836b12c5d46a0da6e9734d7eede50f111401592e6a58f20e4b12f46d160ca61611f96d462770c4e9a47bbef0be6eeb2095fa170e5206908a3bcdaad8dd04e535206496a698e81d4fe9b153d44663a27d756b66fb5409416657c5e2117da8b2f9c1433603b79740d3c78a6c73eb70c4c07a5de22ba817624e7", 0x8f, 0x8000}, {&(0x7f0000000280)="48aefcf024d3b7cb8bf224a1ac6a3e5a7df534af95e04e389d605011780c3d8d2c77e2a1b0515985c6de98fe912781e284d6266064c775f3d089ff57a874ced83ef4a36b24f3c736031fb99e082814cf2c710a6599c3d00ce81ea29fdd7068a58584cafd6018ab550a49738512e13e370f33fc18d45b6f161f4483ec376be8de338b4342efb95141e86e2c4d3d61102b25f8c86878a101a20c30ab065c875e7bfe3739c5ba5cdbc3d6cc2646e6939092f79e7dab93ef8a1dca", 0xb9, 0x40}, {&(0x7f0000000340)="c26598a3003a6b7647cfa024aa5948ef9c074989639bb4f2203729613c170a5a78e5b2e547c7cf090dc6871c00088aabc1ff3a40d34b3c21993cc062c69a3fab39b3b3017a3c353ad4dfa1524e937bc55722cef897ee94653a41812a707d07c9b084dd0e1144f7d1ffb211356bc979da39606f003c9f7a21a8030b9d4e8f18fb3fef648b5b136845d786d372efe2", 0x8e, 0x3d5266bc}, {&(0x7f0000000400)="3dfe0c688be2d6179727aabe178bc65ea2e89d327f9baf794ea270fa3841922d3ecbaff5de4dfb425d616f6cf7442af72afc5aaa03eba0db10cc4350ef916631b6a4f09f9eda32d920e99d26e78996e57c7c6e4b15f31407fd3f494026b8fdc5a95cd238d5fbf48bf448487f5eac560d53c4719b44a8b4866b60bd68ed27fcaea299795b5c85a5353ce2b8209873a2d071293aa151a9f1ff08069797770ea169d727e83b96dded23cd4dd4878e3b470887efc9c2670b25cba3bb57bd55e9c30b2232f35897fee453d8f7cd94ac2bd9cc7469588026ecbc0a459a438a6f660eac8a", 0xe1, 0xfffffffffffffffa}], 0x88000, &(0x7f0000000580)={[], [{@rootcontext={'rootcontext', 0x3d, 'unconfined_u'}}, {@rootcontext={'rootcontext', 0x3d, 'staff_u'}}, {@appraise_type}, {@fsuuid={'fsuuid', 0x3d, {[0x35, 0x37, 0x65, 0x32, 0x1, 0x36, 0x63, 0x35], 0x2d, [0x30, 0x36, 0x30, 0x31], 0x2d, [0x37, 0x63, 0x30, 0x37], 0x2d, [0x33, 0x65, 0x38, 0x61], 0x2d, [0x32, 0x31, 0x37, 0x61, 0x37, 0x38, 0x66, 0x65]}}}, {@fsname={'fsname', 0x3d, 'ext3\x00'}}, {@appraise_type}, {@uid_gt={'uid>', 0xee00}}]}) keyctl$KEYCTL_CAPABILITIES(0x1f, &(0x7f0000000780)=""/111, 0x6f) faccessat(r1, &(0x7f0000000640)='./file0\x00', 0xe0) openat$dir(0xffffffffffffff9c, &(0x7f0000000800)='./file0\x00', 0x400, 0x32) getdents64(r0, &(0x7f0000000680)=""/227, 0xe3) 10:11:11 executing program 4: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000040)={0x2, &(0x7f0000000000)=[{0x25}, {0x0, 0x0, 0x0, 0x20000000}]}) 10:11:11 executing program 4: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000040)={0x2, &(0x7f0000000000)=[{0x25}, {0x0, 0x0, 0x0, 0x25000000}]}) 10:11:11 executing program 0: socketpair(0x18, 0x1, 0x97, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$TIPC_CMD_SHOW_PORTS(r0, &(0x7f0000000100)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f00000000c0)={&(0x7f0000000080)={0x1c, 0x0, 0x200, 0x70bd29, 0x25dfdbfe, {}, ["", "", "", ""]}, 0x1c}, 0x1, 0x0, 0x0, 0x40051}, 0x4008014) [ 1892.275925][T25635] loop3: detected capacity change from 0 to 264192 [ 1892.288457][T25641] loop5: detected capacity change from 0 to 100 10:11:11 executing program 2: syz_mount_image$ext4(0x0, &(0x7f0000000440)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) openat$dir(0xffffffffffffff9c, &(0x7f0000000300)='./file0\x00', 0x505040, 0x0) unshare(0x200) unlinkat(0xffffffffffffff9c, &(0x7f0000000100)='./file0\x00', 0x200) socket$inet(0x2, 0x2, 0x6) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000000000)={'team0\x00', 0x0}) ioctl$sock_ipv6_tunnel_SIOCDELTUNNEL(0xffffffffffffffff, 0x89f2, &(0x7f00000000c0)={'syztnl0\x00', &(0x7f0000000040)={'ip6_vti0\x00', r0, 0x4, 0x20, 0x80, 0x6d54, 0x1, @ipv4={'\x00', '\xff\xff', @loopback}, @mcast2, 0x80, 0x80, 0x8, 0xff}}) 10:11:11 executing program 1: clock_settime(0x0, &(0x7f0000000000)={0x77359400}) pselect6(0x40, &(0x7f0000000040)={0x7ff, 0x73d, 0x7, 0x401, 0x5, 0x1, 0x3, 0x100000000}, &(0x7f0000000080)={0x3, 0x6, 0x4, 0x81, 0x6, 0x2, 0x1, 0x9390}, &(0x7f00000000c0)={0x120000, 0xfffffffffffeffff, 0x9, 0x1f, 0x8001, 0x3, 0x100}, &(0x7f0000000100), &(0x7f0000000180)={&(0x7f0000000140)={[0x1]}, 0x8}) [ 1892.366677][T25635] loop3: detected capacity change from 0 to 264192 10:11:11 executing program 4: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000040)={0x2, &(0x7f0000000000)=[{0x25}, {0x0, 0x0, 0x0, 0x28000000}]}) 10:11:11 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x1, &(0x7f0000000040)={0x0, &(0x7f0000000080)}) prctl$PR_SET_SECCOMP(0x16, 0x0, &(0x7f0000000080)={0x2, &(0x7f0000000000)=[{0x6a1, 0x7f, 0x8, 0x7ff}, {0x401, 0x1, 0x6, 0xcd21}]}) prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000140)={0x6, &(0x7f00000000c0)=[{0x6, 0xee, 0x91, 0xc82}, {0x7, 0x7, 0x0, 0x7ee}, {0xd496, 0x3, 0x3, 0x7}, {0x9, 0x8, 0x0, 0x80000000}, {0x0, 0x2, 0x20, 0x3ffffffd}, {0x0, 0x8, 0x8, 0x1003}]}) 10:11:11 executing program 1: ioctl$SCSI_IOCTL_TEST_UNIT_READY(0xffffffffffffffff, 0x2) clock_settime(0x0, &(0x7f0000000000)={0x77359400}) clock_gettime(0x1, &(0x7f0000000040)) [ 1892.448252][T25688] loop5: detected capacity change from 0 to 100 [ 1892.504301][ T22] kauditd_printk_skb: 1 callbacks suppressed [ 1892.504313][ T22] audit: type=1326 audit(1633169471.528:646): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=25696 comm="syz-executor.0" exe="/root/syz-executor.0" sig=9 arch=c000003e syscall=231 compat=0 ip=0x7fa8c05ce8d9 code=0x0 10:11:11 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext3\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000480)=ANY=[@ANYBLOB='lazytime,test_dummy_encryption,max_dir_size_kb=0x000000000200,grpjquota=,min_batch_time=0x00000000000003ff,rootcontext\a']) syz_mount_image$ext4(&(0x7f00000000c0)='ext3\x00', &(0x7f0000000100)='./file0\x00', 0x6, 0x2, &(0x7f00000002c0)=[{&(0x7f0000000140)="bbda2d788fe90c1aeea43930debf2bdc9b71e2c0dd9b5bb3dcaa75f462c03380eacb8258c955138dad88b22109e01c8ab9d0ecf08802464744a2a2287cbf1ea2d235d465ce1d602064af80130cb4d81023e0dd9d6a4e86807956434b556ecebcafa3c99b5b3f9e69b13c6eabfcc3b974a190b68d0beedba2487fb32d6ff74c03cbe4c3af9b259c439d", 0x89}, {&(0x7f0000000200)="08126b09dd4421a38d7627c04fe1003c369ea847a6c13bcb77d0247c39ea21afa9ba2679d32c26a339d246bcd6ce5682f3dceb6fbd3a3077f71a7c7f6ea753c15a19fce24bfc1de27993c26eb8026276d032fd0d87e462d97eb8a7a38f418875e3716e7581ff99af76a68c50c16c55db92a55544c62514393da62aba7635a746f921e9d902719756b918598cdf4d6ca3c00229bb752eae9de08f7df2ab750ca8ae74b9865d", 0xa5, 0x3ff}], 0x40000, &(0x7f0000000300)={[{@orlov}, {@errors_remount}, {@journal_async_commit}, {@user_xattr}, {@journal_checksum}], [{@subj_role={'subj_role', 0x3d, 'ext3\x00'}}, {@euid_gt={'euid>', 0xee00}}, {@obj_user={'obj_user', 0x3d, 'ext3\x00'}}]}) faccessat2(0xffffffffffffffff, &(0x7f0000000080)='./file0\x00', 0x75, 0x100) getresuid(&(0x7f0000000440)=0x0, &(0x7f00000027c0), &(0x7f0000002800)) syz_mount_image$ext4(&(0x7f00000003c0)='ext2\x00', &(0x7f0000000400)='./file0\x00', 0x1, 0x5, &(0x7f0000002740)=[{&(0x7f0000000500)="bfa7a511f57ddbc836aac09de9a0340dff84e8bd0308040d00c2fd4f82a82988e9065e25fbd2495afa35bca275f2e7f76bb7d26a9dd45871006037b15b478875b5bf1ff5b0b094c17486b417ba5e9c09b70ebdad59a9aa6485d0cce54ddd7776de013991c2ab919eb7d62cbc66f84cb2b6721758ab0e404a993a31b7f761bde3812e551757ad428f68fb2382caa7437365a03e83c20549890e966fc6d229d47f0a1a361367817cad746e5ca1c3cc9965c757ee0836bd513289ac37148c2dde1142a2125cd27d9e3b8e1e238f730a6d5f1948df", 0xd3, 0x1}, {&(0x7f0000000600)="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", 0x1000, 0xb29}, {&(0x7f0000001600)="a582e4e909c1d75ec9e439f56f20bfaeda55ff764a1793cd6e12df17fc274378bf3e68aae635cd641095144103507ae9203c132f0c58ebfe0ce6861761c56131528449ac0efdd21b3648b61176c1832097dff0709b59383bb816d9e8df9301fa2b2b5fb16de8030940a15473c57a7787973b6dbeee770a295a8083fb1dd53e1841b9e8a9c9f8f43bd9083621e3f029743d6b47d063cf69dd0e429982a468c422", 0xa0, 0x539}, {&(0x7f00000016c0)="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", 0x1000, 0x200}, {&(0x7f00000026c0)="80f4b90b3ec900c7199e592041b0bf663d4310aa3027066af325262b5d75d599827e5c4a47cf21ae8c1ed861a734a13641e0046583eca55bd8f4b6f58eb1b50d2e243b5c14085429d18cd595c2a6ae8f35303880d1f2e83fc7309ab7eb70e96a813aaa7890af1ec947324081c8829febf0b1c0426a05b86ab45928e447c1", 0x7e, 0x8}], 0x2000, &(0x7f0000002940)=ANY=[@ANYBLOB='journal_dev=0x0000000000000006,noauto_da_alloc,jqfmt=vfsv0,delalloc,dont_hash,fsmagic=0x00000000000001ff,fowner=', @ANYRESDEC=r0, @ANYBLOB="2c6f626a5f747970653d6f726c6f762c7365636c6162656d2c6673636f6e746578743d756e636f6e66696e65645f752c636f6e746578743d73746166665f752c0082602b0478ca557f5159db949e8dd72d2af6541bf4f8cc3f63d2e200ed423ed22c7bb2b826ac32a9"]) 10:11:11 executing program 5: syz_mount_image$ext4(0x0, &(0x7f0000000440)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) openat$dir(0xffffffffffffff9c, &(0x7f0000000300)='./file0\x00', 0x0, 0x0) unlinkat(0xffffffffffffff9c, &(0x7f0000000100)='./file0\x00', 0x200) 10:11:11 executing program 4: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000040)={0x2, &(0x7f0000000000)=[{0x25}, {0x0, 0x0, 0x0, 0x29000000}]}) 10:11:11 executing program 2: syz_mount_image$ext4(0x0, &(0x7f0000000440)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) unlinkat(0xffffffffffffff9c, &(0x7f0000000100)='./file0\x00', 0x200) 10:11:11 executing program 1: ioctl$SG_GET_TIMEOUT(0xffffffffffffffff, 0x2202, 0x0) clock_settime(0x0, &(0x7f0000000000)={0x77359400}) [ 1892.678969][T25723] loop3: detected capacity change from 0 to 3 10:11:11 executing program 4: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000040)={0x2, &(0x7f0000000000)=[{0x25}, {0x0, 0x0, 0x0, 0x2d000000}]}) 10:11:11 executing program 2: syz_mount_image$ext4(0x0, &(0x7f0000000440)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) openat$dir(0xffffffffffffff9c, &(0x7f0000000300)='./file0\x00', 0x0, 0x0) r0 = openat$vcsu(0xffffffffffffff9c, &(0x7f0000000340), 0x301, 0x0) ioctl$PTP_ENABLE_PPS(r0, 0x40043d04, 0x1) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY_ALL_USERS(r0, 0xc0406619, &(0x7f0000000000)={@id={0x2, 0x0, @auto="5e107009ffbafc15ac064bc2848eb436"}}) unlinkat(0xffffffffffffff9c, &(0x7f0000000100)='./file0\x00', 0x200) sendmsg$FOU_CMD_ADD(r0, &(0x7f0000000140)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f00000000c0)={&(0x7f0000000080)={0x1c, 0x0, 0x8, 0x70bd26, 0x25dfdbfc, {}, [@FOU_ATTR_TYPE={0x5, 0x4, 0x1}]}, 0x1c}, 0x1, 0x0, 0x0, 0xa090}, 0x0) 10:11:11 executing program 1: syslog(0x1, &(0x7f0000000000)=""/18, 0x12) [ 1892.739147][T25723] loop3: detected capacity change from 0 to 13 10:11:11 executing program 5: prlimit64(0xffffffffffffffff, 0xb, &(0x7f0000000000)={0x4, 0x23c1}, &(0x7f0000000040)) syz_mount_image$ext4(0x0, &(0x7f0000000440)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) openat$dir(0xffffffffffffff9c, &(0x7f0000000300)='./file0\x00', 0x0, 0x0) unlinkat(0xffffffffffffff9c, &(0x7f0000000100)='./file0\x00', 0x200) [ 1892.799936][T25723] loop3: detected capacity change from 0 to 3 10:11:11 executing program 4: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000040)={0x2, &(0x7f0000000000)=[{0x25}, {0x0, 0x0, 0x0, 0x30000000}]}) [ 1892.845389][T25759] loop3: detected capacity change from 0 to 13 [ 1893.323467][ T22] audit: type=1326 audit(1633169472.347:647): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=25696 comm="syz-executor.0" exe="/root/syz-executor.0" sig=9 arch=c000003e syscall=231 compat=0 ip=0x7fa8c05ce8d9 code=0x0 10:11:12 executing program 2: syz_mount_image$ext4(0x0, &(0x7f0000000440)='./file0\x00', 0x8001, 0x0, 0x0, 0x4000, 0x0) r0 = openat$dir(0xffffffffffffff9c, &(0x7f0000000300)='./file0\x00', 0x0, 0x0) unlinkat(0xffffffffffffff9c, &(0x7f0000000100)='./file0\x00', 0x200) faccessat(r0, &(0x7f0000000000)='./file0\x00', 0x80) r1 = openat$vcsu(0xffffffffffffff9c, &(0x7f0000000000), 0x5200, 0x0) fchmodat(r1, &(0x7f0000000040)='./file0\x00', 0x1b0) r2 = openat$incfs(r1, &(0x7f00000002c0)='.log\x00', 0x581200, 0x123) syz_genetlink_get_family_id$fou(&(0x7f0000000300), r2) renameat2(r2, &(0x7f0000000380)='./file0\x00', 0xffffffffffffffff, &(0x7f00000003c0)='./file1\x00', 0x0) faccessat2(r2, &(0x7f0000000040)='./file0\x00', 0xe, 0x300) shmget$private(0x0, 0x2000, 0x80, &(0x7f0000ffd000/0x2000)=nil) 10:11:12 executing program 1: keyctl$KEYCTL_CAPABILITIES(0x1f, &(0x7f0000000040)=""/158, 0x9e) 10:11:12 executing program 4: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000040)={0x2, &(0x7f0000000000)=[{0x25}, {0x0, 0x0, 0x0, 0x34000000}]}) 10:11:12 executing program 5: syz_mount_image$ext4(0x0, &(0x7f0000000440)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) openat$dir(0xffffffffffffff9c, &(0x7f0000000300)='./file0\x00', 0x0, 0x0) faccessat2(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0xd0, 0x1100) r0 = openat$vcsu(0xffffffffffffff9c, &(0x7f0000000000), 0x5200, 0x0) fchmodat(r0, &(0x7f0000000040)='./file0\x00', 0x1b0) openat$incfs(r0, &(0x7f00000002c0)='.log\x00', 0x581200, 0x123) accept4$packet(r0, &(0x7f0000000400)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000000440)=0x14, 0x100000) r1 = syz_genetlink_get_family_id$tipc(&(0x7f0000000080), 0xffffffffffffffff) sendmsg$TIPC_CMD_ENABLE_BEARER(r0, &(0x7f0000000180)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x800}, 0xc, &(0x7f0000000140)={&(0x7f00000000c0)=ANY=[@ANYBLOB='\x00\x00\x00\x00', @ANYRES16=r1, @ANYBLOB="10002abd7000fbdbdf250100000000000000014100000018001700f15e74756e0000004002000000000000000000"], 0x34}, 0x1, 0x0, 0x0, 0x24000084}, 0x20008001) unlinkat(0xffffffffffffff9c, &(0x7f0000000100)='./file0\x00', 0x200) 10:11:12 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext3\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x4, &(0x7f0000000480)=ANY=[@ANYRES32]) r0 = openat$vcsu(0xffffffffffffff9c, &(0x7f0000000340), 0x301, 0x0) ioctl$PTP_ENABLE_PPS(r0, 0x40043d04, 0x1) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY_ALL_USERS(r0, 0xc0406619, &(0x7f0000000080)={@desc={0x1, 0x0, @auto="5635e8d189cb3604"}}) 10:11:12 executing program 3: socket$inet6_udp(0xa, 0x2, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext3\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000480)=ANY=[@ANYBLOB="6c617a7974696d652c746573745f64756d6d797b256e6372797074696f6e2c6d61785f6469725f73697a655f6b623d30783030303030303030303230302c6772706a71756f74613d2c6d694e3d39fa2d3f88ca74696d653d3078303030303030303030303030303366662c726f6f74636f6e7465787407"]) 10:11:12 executing program 1: unshare(0x40200) socketpair(0x1d, 0x0, 0x5, &(0x7f0000000040)) clock_settime(0x0, &(0x7f0000000000)={0x77359400}) 10:11:12 executing program 4: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000040)={0x2, &(0x7f0000000000)=[{0x25}, {0x0, 0x0, 0x0, 0x35000000}]}) 10:11:12 executing program 0: ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f00000000c0)={'team0\x00', 0x0}) r1 = accept$packet(0xffffffffffffffff, &(0x7f0000000140)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @multicast}, &(0x7f0000000180)=0x14) r3 = syz_genetlink_get_family_id$team(&(0x7f0000000480), 0xffffffffffffffff) ioctl$ifreq_SIOCGIFINDEX_team(r1, 0x8933, &(0x7f00000004c0)={'team0\x00', 0x0}) accept4$packet(r1, &(0x7f0000000500)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000000540)=0x14, 0x800) getpeername$packet(r1, &(0x7f0000000580)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f00000005c0)=0x14) getsockname$packet(r1, &(0x7f0000000600)={0x11, 0x0, 0x0}, &(0x7f0000000640)=0x14) ioctl$ifreq_SIOCGIFINDEX_team(r1, 0x8933, &(0x7f0000000680)={'team0\x00', 0x0}) getpeername$packet(r1, &(0x7f0000000b00)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000b40)=0x14) sendmsg$TEAM_CMD_OPTIONS_GET(r1, &(0x7f0000000ac0)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x1}, 0xc, &(0x7f0000000a80)={&(0x7f00000006c0)={0x3b8, r3, 0xe99fe6f33b3366cc, 0x70bd29, 0x25dfdbfd, {}, [{{0x8, 0x1, r2}, {0x74, 0x2, 0x0, 0x1, [{0x38, 0x1, @activeport={{0x24}, {0x5}, {0x8, 0x4, r2}}}, {0x38, 0x1, @mcast_rejoin_interval={{0x24}, {0x5}, {0x8, 0x4, 0x1}}}]}}, {{0x8, 0x1, r2}, {0xf8, 0x2, 0x0, 0x1, [{0x38, 0x1, @mcast_rejoin_count={{0x24}, {0x5}, {0x8, 0x4, 0x2}}}, {0x4c, 0x1, @lb_tx_method={{0x24}, {0x5}, {0x19, 0x4, 'hash_to_port_mapping\x00'}}}, {0x38, 0x1, @notify_peers_count={{0x24}, {0x5}, {0x8, 0x4, 0x3e39484a}}}, {0x38, 0x1, @mcast_rejoin_interval={{0x24}, {0x5}, {0x8, 0x4, 0x358}}}]}}, {{0x8, 0x1, r4}, {0xfc, 0x2, 0x0, 0x1, [{0x3c, 0x1, @enabled={{{0x24}, {0x5}, {0x4}}, {0x8, 0x6, r0}}}, {0x40, 0x1, @lb_port_stats={{{0x24}, {0x5}, {0x8, 0x4, 0x548}}, {0x8, 0x6, r0}}}, {0x3c, 0x1, @enabled={{{0x24}, {0x5}, {0x4}}, {0x8, 0x6, r2}}}, {0x40, 0x1, @lb_port_stats={{{0x24}, {0x5}, {0x8, 0x4, 0x101}}, {0x8, 0x6, r2}}}]}}, {{0x8, 0x1, r5}, {0x84, 0x2, 0x0, 0x1, [{0x40, 0x1, @queue_id={{{0x24}, {0x5}, {0x8, 0x4, 0x1f}}, {0x8, 0x6, r6}}}, {0x40, 0x1, @lb_tx_hash_to_port_mapping={{{0x24}, {0x5}, {0x8, 0x4, r7}}, {0x8}}}]}}, {{0x8, 0x1, r8}, {0x90, 0x2, 0x0, 0x1, [{0x38, 0x1, @notify_peers_count={{0x24}, {0x5}, {0x8, 0x4, 0xffffffff}}}, {0x54, 0x1, @bpf_hash_func={{0x24}, {0x5}, {0x24, 0x4, [{0xf256, 0x7f, 0x7, 0x2}, {0x1, 0xde, 0x8}, {0x6e, 0x0, 0x35, 0xde5c}, {0x5, 0x0, 0x1, 0x3a}]}}}]}}]}, 0x3b8}, 0x1, 0x0, 0x0, 0x20000}, 0x8011) sendmsg$TEAM_CMD_NOOP(0xffffffffffffffff, &(0x7f0000000440)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x40}, 0xc, &(0x7f0000000400)={&(0x7f00000001c0)={0x220, 0x0, 0x100, 0x70bd25, 0x25dfdbfd, {}, [{{0x8}, {0x134, 0x2, 0x0, 0x1, [{0x3c, 0x1, @enabled={{{0x24}, {0x5}, {0x4}}, {0x8}}}, {0x40, 0x1, @lb_hash_stats={{{0x24}, {0x5}, {0x8, 0x4, 0x5}}, {0x8}}}, {0x3c, 0x1, @name={{0x24}, {0x5}, {0xb, 0x4, 'random\x00'}}}, {0x40, 0x1, @lb_tx_hash_to_port_mapping={{{0x24}, {0x5}, {0x8, 0x4, r0}}, {0x8}}}, {0x38, 0x1, @mcast_rejoin_interval={{0x24}, {0x5}, {0x8, 0x4, 0xe8e2}}}]}}, {{0x8}, {0xc8, 0x2, 0x0, 0x1, [{0x40, 0x1, @queue_id={{{0x24}, {0x5}, {0x8, 0x4, 0x2}}, {0x8, 0x6, r2}}}, {0x4c, 0x1, @bpf_hash_func={{0x24}, {0x5}, {0x1c, 0x4, [{0x7fff, 0x0, 0x1, 0xffff37e5}, {0x1, 0x80, 0x9}, {0x1, 0x3, 0x0, 0x800}]}}}, {0x38, 0x1, @mcast_rejoin_count={{0x24}, {0x5}, {0x8, 0x4, 0x934d}}}]}}]}, 0x220}, 0x1, 0x0, 0x0, 0x40000}, 0x40000) prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000040)={0x2, &(0x7f0000000000)=[{0x15}, {}]}) 10:11:12 executing program 5: syz_mount_image$ext4(0x0, &(0x7f0000000440)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) getegid() openat$dir(0xffffffffffffff9c, &(0x7f0000000300)='./file0\x00', 0x0, 0x0) unlinkat(0xffffffffffffff9c, &(0x7f0000000100)='./file0\x00', 0x200) 10:11:12 executing program 2: r0 = syz_mount_image$ext4(0x0, &(0x7f0000000440)='./file0\x00', 0x0, 0x0, 0x0, 0x1000000, 0x0) r1 = openat$dir(0xffffffffffffff9c, &(0x7f0000000300)='./file0\x00', 0x0, 0x0) unlinkat(0xffffffffffffff9c, &(0x7f0000000100)='./file0\x00', 0x200) r2 = openat$incfs(r1, &(0x7f00000002c0)='.log\x00', 0x2, 0x22) unlinkat(r2, &(0x7f0000001800)='./file0\x00', 0x0) getdents64(r0, &(0x7f0000000000)=""/127, 0x7f) r3 = openat$vcsu(0xffffffffffffff9c, &(0x7f0000000340), 0x301, 0x0) ioctl$PTP_ENABLE_PPS(r3, 0x40043d04, 0x1) renameat2(r1, &(0x7f0000000080)='./file0\x00', r3, &(0x7f00000000c0)='./file0\x00', 0x1) syz_mount_image$ext4(&(0x7f0000000140)='ext3\x00', &(0x7f0000000180)='./file0\x00', 0x5b5, 0x6, &(0x7f0000001680)=[{&(0x7f0000000480)="423e0643f8b3d2676d10ba8441160952dc45dc12d3b96013bb463c26a7461d843244bf2ea6a341e48c697af26defc6fad34ca60e89ff6e8b0c9b9037f3a6b5e5a8d8d6ffd0c4e0517ae826189cf6f0c393cd2df348b0181c66085d67438e5393669b6f0f83e2863b05083bd02540c896067481f749ae742bb761ae3918c0f96f5c4caa0a0e8ace5bfb2cbcde74124270bb19b5518d4350105b1b2997cdf46de518af38f8649a7d871b6b086433b389e9732001f5430199c208134ba57d843b3e354d251804aff5a4754138aaa1472d7b739dd2fc07afd3b9a08f5ab7ca37ed851ff0783979a253953bb72c78dc5c35366db34386b7ce64997fbaeb26b3e4cb2cc4a3b67599464671184675580808c7aa3e6a4f6a19f4510e357b95eea4ddcdda4e0af9845e46973577e1977ceefd17ff2e5b78ca8e5fca4f155a913937b4fdd74ab52f57b9d565a50f797c8542a0754acd9455e35a0de0139e6858532afef4484dcf2d81ad5d3756cb201b46c8ac0b2892bc284e1aec9a03e3fa6684f5af6c7e3736ca2b7d76a3f21fe90828528533cd120c27c3913e280a04c6faab7ce298484077d363c4f2eb87a0a2576a1882cbeb4bfbea34530cc7e85e26e8381203e996eb2aeccbb666a61d27d2266b682110ec36c1244c66ffa85309e569defab52ea42f313e9b1cbad0b9722230319e9c4ef5e918b09d2adb8f72a0cd129b265e59fff97d1a158b26ec6d416f95d05c56ea5fc03256961c7b1024338c64f7706b75c3830b4f246d4ca8add161ac67bcd36f0f3a978084ed66e3b3d02283e3b365dcbddf611814aa73cdb2703399ab906a0f861276c62fadd6c05e1caa6a8f68e915b789d3d84e962d744d2458ec9a6a3351d08e2ae2013b0e71f39c0747c38de6313d6d51ebcff25cd0276c5eecd474bca940cadd44532bec02b08daf21fbcf076adca5e80cf7877190a2f32bde96a26da52c156d6b1c14dd0f528ffe0a9bf96b153187ba0a6e17da47ccf09af70d78da99f00b6c2235792b915d7fd50c3e2b61916d38e1cc32d6355ba480c5c3def03c25eabee483cbde6dca2bd59cbafe250c8166a421111438a762abdea931464eaf47cc1ffb735d1624e9f5808d151254979420ace64a5a45112085666b37053f9de6e960560856d34005483c2c18769faa598effb2d1f92740fb1e6afc9a5f40e99b4a7122e8d0e30e0d4d6d5c594d905b97d32ac9ec6076f448d9a5910273982f945321d83df142e83ca9c9b9479177380da0db87ae4047d343e9d4348336c0a5e55f99e51c792ebdabe681fe9823897193f4f5fa35fe28909111290a35649c44523770facb660568852f0b4b7e099596b6f3fb43ef18794b33da72ab44d3470594a8eeb009255ab1dd2bc6571eecbde558d026d5989fab1d1db14787fd5ec35e2fa37a5fa45d71ff405f6b7b7140c089846561914748becaf46ace2d07d280f1f8cd618f5565200090c0d1c6e24349384633f70cc62ac4bc4210c7a7f87d336583cae1d032b159ee65296ad04a31ba6e42161a9ff12410a4fa786b6c5db713eda042a7b04ffbd4b6b39ceb7d97c1be99e895c78c3773f7cf7c4ebd022cb5a37abb5806805f08dc86197b66098972de0ef2185f71fcab3eeb950e0b75200364e64747375b0c9ca72a86140b5717379b9d63c4c0b2fac6edfc6f1c191aaa298e98f8a66bbc2ae2d4e9efadbb939a9d4eb1fcdb0b4948629479b5a987f7e5e93de667441dde442b26eb3ed0e1ba6ed2b9784301fada7ffb822ad84a8ab32b93a8672523ae6a29c48badcdab616983cd652e3ad48b86572ccf02a1338a4a1113ae66b599d3ccad5b25cd1c8468d8c8013d96237f876cfd6d3f68cd815ac8d45a1ee228529f19413f55551ac1e5d3e623dfc4d2bcacae0309e6b492e5ef2eae3b6de05800fa9e6acf91dbcfd014256a83c395534463b8c488a3366291461cc3e671056608903bea4e98e0c4fcdcd215804d379b673e50daa41afd0c7fe79d0fc810c5f7536e67c7d0ec4333d13a23ecbfaebd7547fa085433dca248f110a6b7582037e7d4e7a982ddd4fa49dc7873673a85256b236f571da0d71dc3943fbd0632cde2041db3493b8b4bd0237e63ce885d224b8642cccc1e8cfe6ad4120465f02f779ed8dce61653aeb82d115a4922d6b4043b5b1b1ee36851551dbff7b697cd2011b766aace57ed5c945431ac7f0953a7aa645ab1ddc2e527a758a78f2fadab0f06d13e112f9191581e1d9493d879b5924077b34e2738b9ed5d73076249e331aa810e684d1c500b75092614fe60616f6fc5f145ba9142e6299985469efd1cf7eb74bb62b5d4b91de58833f7345828600c1eb8385d145665ae0bdaf08ca4d45049e5d1027d38710134937f27775032ceca3752db12f25f8bd874e7bc9e3e98daffac4e001cf74a0429ea903f346ea86775f109ccaf601f1d79ac514907dea4290bb5407d71a3cf60fa27f098299dc830e440c0fa648fb0f57976e0de2ef483d2ed436a93be9ed868c5b7847edf6a1c9c8bccda62998ee0dc41aa274a2a75f44c654cfce2c7d848c63d3b44ca7a8b50351bd10d9272f417ba81d549feb9a464f3908e11a9788f21ed0b12e62888499e80648849d338ebaf8c1382f7681e47040c5df9669b62b950fc459b2a1f69cbccb097d8bce2f3d3737cdb78aa5a9f4872741dd67a8b18873f9e0bf6b50aaf77c51d3582983bea21d1265c4d55b452fd2d837eef460ad8775596bb04259bd6608af82f0db88daf2b3c7be8e9256517a5ff6d3caa8f53d5b15d2f1cb444b7d1c4a91b9e95009263d5bcd2a75f4c228551318fd97b57115cea4a6db559714e26d9f325774250a8bcc27e747af7337080c6ad9141aa381369cb5681e1bdaab21952e04380abb9b18dc7f20b456800768f852174bdc2b3af4a4210bdb13cf404c29edd2ed18bb81f521ef6e99d5afed80a38918202fdd62b46bc2fa20552f9c861872dc115db15537644aeadec76e7f92ded39cdf7036026b94f3f5d45419352b1411eb811995582b94522a252625a22d50098ecc24f3f67b14ac1d01130a957d9a99b1a1f81302b68db6c6645649d453a5c23d52307c0a96b7cb329457ae1e98dccb2bfc4f6a39532113143f32f0b88e4b992347a3e7505a9ff37b2840efd23c678156e332eef49e4179786c8a2fae3b4edbb95905af8b5661df3a15adb57807aaeb13ead92b4b525b350f9788f4afef2fa293c0b4845cde02dc3b307f91eabc0b29577c894854b06c8562ff6c87a49f1b12ce0f0ceabd5a9d7cb1cf5d6a834e438ed9666c68f6310695f8a6a0286fbe267c8e8e411092ac3217ef0118ef32776d26976c3c2f83abaf6b1a919e53027bde55a1b057f6fd3f14ead746571f4c663498ac599d266f9b4992b81076d8bbec7a58d83050e7b1c5a020b60dd962dd5ad2535b3becfe2b15bc90442a65a2e62fc3e9c2ca8302ba8bb8ac978792c8c268ed8dc885d6ddaf9951a08c6ac3de2ff3091d90fb82a91054f830e76de1e4e7453b169290d362169d91d7c122a2f699d6c39ed3245adba08d124b6a37d7eada95a7a0af1172895e3d738434feeb08fa97da732302ef49d8c2d7b4a0bfd9e2b205e7cf3594ac3d6f4f91da9ab9c2d5f3651bf20d22157e75afc64f873e33b7f4b0d9acccb76f0610fab65aa727b42f82e8516c7c711bdd7ec4e5bd714e3dc50acd5d68d3f2b35b9c5ec4296f8e845fe73ee2363aa20fcd6610511789266c3984a799d28dac6be31fc9be45af3dd65e7844c84bd47884d81b03cc557dcbdfc714e5da4d45e0ebe2ecd3a51eba9bbdc6f370d3fa838b194fb286d8b6c0a949f238fea2a00b208be84a1ed6938b5ee6025b914c8a6d48bbe939448d5774e08408f93414e49eaa80dac4a4b712660d938412374ec9e2b794c9dd3b49aed8d42d487424607530cb475d822e43d8bfc071bc3e7067e4f2ef8d8d1015f8a6289cad0991d752f66f626d189cf9e5ebe3e3a082610d9f0b06d97c0c980f430cf2dba9a5025ae662e530011a1cc7294ebc016dd1e3439c92f5c256ea6c82c9e07044ed2c273dc37557559c573fd9f9e5450a42eda43a7ff13988770039af3b0f59df207f0bf25849b2c3ea547dd2a5c416e5ae00c89fba67e19a97294dbd4660050c98599ccbc3a1b230d17b091199c50c2df43f854b6258cb87017e8f1efb941fc37ae04e60a76b66cfba9cfb61f1e3485efc5c6e07444450531779276f09bdd9d26e32788039e8e3fa6f1b8482e74567fbb94ff5739ced24ff8232a074c57d104f7070eee49aa9f5dfb5bfef99cb9dd93e871378381e234fc3ddf1e93adadb60428944152c0e306ad9bd3d1671b68510fc6acd0caae4e3e1f20b8d7d853acd59c5c887d7ac1431abea4b82aa29d7143f95c2437bc5f9b987300ba1a72f02837683fc38779af43ba4784bb517d0170eef5b5de7c401a0e678369f652a079eaa951eecf4e38bf9a585e5b5e64fcb79c5c91ca523d417f4556bc842600444222d024a9da2c1a24c871f40a0a823f407ed97c93c2b31fe284012de1e503ffecf0b1349e30f0cd2b4364b7ee29ddd53385b22a423622f20a6e21d768d20bd5c798b19a498810407e9d1f0cc463732d5b4b8eba020e68730dc0e5168d28a1f40e8551147b2ce35cfb0d2de00d27f1655838008ce0663f1b2df2e250f2f6846c8408c372320b0021ad81943cbbc1800cfde563a4644d4d551b66b7916c2e671a3d93b6594f55401118f838e72dcd02234a790dafd59dacf266606f930a418bde3d8bff85cee3677dc4b3a84ce9d9ddfeb07b243e8302aa8df7ff72b31f56bdb10763f9b8c64efbf17081048e55f3c6f1ff3728e45a15df27287008f01f25de592c86c9172b1b77eba7ad9957ce26f272d82de3e602c70f65e353259763b0d3aede4783274f5535905638f95af255e2a39d41405562797397cd3fdbec28f1c3d0862923a53132f54777a59a607db0af363109060b7b56110be7fcb6c87e583e47935b9c58409cda24ad28e4f32d3ebabb915e4830587480998288c69df8f618e01e9a35383be54c4a92e35edefac1ada48bb88eb337f9ec7566f386c6b44d3771a7db828a888cd650f4a9a65e832476958e931271ed4fac79e0ea47310a57d54f7a1c7e04b6e38cf69c06bd6bef093a27971a1ee7f60567e85ff9afe52b076d8bac667f4cd2c5556b70fdac0d86f0bed9195872bf649618a93faea125462dcc199ed4d4856dd790a16b422eaca849c87cca7080263b62d8d6873f219912e898e29b0f9622a98a41bfa99d9ba953b42ed41fcc3d3805cb96509ebdbc625145f55c8d47922f25b0b13332259d374a8ded7b6ce2baeef76f73748dcd611e867df4f259012eb0e6a77035d359f0c0d300987fc66dd82f1bf4bbbda9ae55c6d8303da6ac4292e7614842acdde740b5c7d5cc4c66d0c5776e5dd856b8b4bac6b00696743c3c53d73b483a6a1385ff4b2a277a92bc36968598f0ffe311dabf33862519851bdfa88e9ed0aca8870dcb5558fcbc2d887ba85f6af6ffb9e87f57af617375bf305a8c51f3f7261569f4356aa6ac136a70100be49a201b70d1278f183cee0afb6cd0b2c215a4a731a17896cef349501693ab83aa2219c9f602dad639ed34280507c9f64f0aa2df9d8a2f8b0a73f0e7495dc04e1a25541738be1b51ba00106636381884038600bc06d2a34c11561736f593b52bed4505d8daa33a15bd5c29e61a0236fae60a6e5b1a222625304479f0cc203de83178f60d5489f8f05471a7af76c749942785508411f5a209481bbbd4dbe8", 0x1000, 0x80}, {&(0x7f00000001c0)="d368a68ba552758975f6a963a44ffb53143776603dc87e4348ce2e4c532166ca4e7da3686f0eee588ed6217215ad0bf6ceec7140e0aae3630f00031e6a2e314eabc34c71dcdbc8bdb3e344b740919d465d51710e180077be0dc44be06d8d08f0bbe9b8de1dbb46f39a9370707110197786123db384998f7f41a012c21e871ce9aaa025c899ca3212af3a8eaf0f66fdbf45c542285bbf1f26b1ec54728b3f963914b712e07b94afdd0d21e07abf88356b28d8abbfe9808fab", 0xb8, 0x800}, {&(0x7f0000001480)="923f2231d4c9683a98c4d5a6431dd2e6be0725a6b08a835d3648e345e25a43c03719dd5b8cdbb75f91bbb9b5b6f224a24409a07bcf4204819af21ba123cfb2055a8e111761227a1cbda51208123588f01ef59406123530786d661dd8321d5d729bb56b5297caacf42e769e82277a578b227e3ce8357bc687aacadc30be5c61bca71dafe78dec754b714945cb47157103729918be42ab8d3521411c0ef946580d0e580883553cca95490c854a8013073be5113270daf1dc793384705383ead8ab0c385638a078370edf", 0xc9, 0x13c}, {&(0x7f0000001580)="f62146db711a318d68f8e6546fa739b7e88c1aac78a5e47b87f434cca4bb63264beba5bbc2a741fcea91b0c58364c6b6ba5650416eee8e41d04b754b42bcdc8f39c4804d135db28ecca91ef40bd3f22f2aad7a80d267d82881cf12e64e33280027b94c2ad285e6d3f173d143dfa3546fd6b4e7c708079aaf2273c61bc35b71c507ab174e6862c27dedac4c4a464d48dcaf08482f1682dbc138fa59428eb714a53773d4b2dd6c2583f20c1f6babfcc92eb3af7f10ee0cfb4eee266065a9d862f18acf7a846aab462954b600e8daa9fd3f6b34cc2184df85e66b0a4c5a8f846f96d102", 0xe2, 0x3}, {&(0x7f0000000380)="b14b6285df4e81405f3380b29aa6991d5f79b8c51c4c18011b04883811fedbec9cf440ab8b7579bdbedff9bfb5d2721f063e44a5e1b652b85f4a2871c385520890e5efb65d9981e191df404e3317b30c030836d8c1184b4f4ad691e180b0acc9ec341fec6885755a6bd73088a10cc2f4c96963b94dfc4eef4ad42c6d26da64681709279d6014a395d697594bb2ffa55b27defa1b8a623eef655fc0b0a2a744acd7e790ae027da2", 0xa7, 0x6}, {&(0x7f0000000280)="69c00b7e32094d72ee8c398ba6655f6521a3923d197aa7947031132a34449826da39e430c2afb49c45fdf5b400aae1289c72bdd866c037", 0x37, 0xd1a}], 0x2, &(0x7f0000001740)={[{@init_itable_val={'init_itable', 0x3d, 0xffffffffffffff38}}, {@usrjquota_path={'usrjquota', 0x3d, './file0'}}, {@dax}, {@journal_dev={'journal_dev', 0x3d, 0x7}}], [{@obj_type={'obj_type', 0x3d, '/dev/vcsu\x00'}}, {@pcr={'pcr', 0x3d, 0x3f}}]}) 10:11:12 executing program 3: r0 = add_key$keyring(&(0x7f0000000100), &(0x7f0000000140)={'syz', 0x3}, 0x0, 0x0, 0x0) keyctl$search(0xa, 0x0, &(0x7f0000000080)='syzkaller\x00', &(0x7f00000000c0)={'syz', 0x3}, r0) syz_mount_image$ext4(&(0x7f0000000000)='ext2\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000480)=ANY=[@ANYBLOB='lazytime,test_dummy_encryption,max_dir_size_kb=0x000000000200,grpjquota=,min_batch_time=0x00000000000003ff,rootcontext\a']) 10:11:12 executing program 4: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000040)={0x2, &(0x7f0000000000)=[{0x25}, {0x0, 0x0, 0x0, 0x3d000000}]}) [ 1893.566416][T25830] loop2: detected capacity change from 0 to 13 10:11:12 executing program 0: shmget$private(0x0, 0x4000, 0x80, &(0x7f0000ffa000/0x4000)=nil) prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000040)={0x2, &(0x7f0000000000)=[{0x12}, {}]}) r0 = shmget$private(0x0, 0x1000, 0x0, &(0x7f0000ffc000/0x1000)=nil) shmat(r0, &(0x7f0000400000/0xc00000)=nil, 0x4000) shmat(r0, &(0x7f0000ffc000/0x4000)=nil, 0x1000) [ 1893.609454][T25830] EXT4-fs (loop2): VFS: Can't find ext4 filesystem 10:11:12 executing program 3: accept4$packet(0xffffffffffffffff, &(0x7f00000001c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000000200)=0x14, 0x800) shmget(0x3, 0x1000, 0x10, &(0x7f0000ffd000/0x1000)=nil) r0 = openat$dir(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x140, 0x10) faccessat(r0, &(0x7f0000000000)='./file0\x00', 0x80) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY_ALL_USERS(0xffffffffffffffff, 0xc0406619, &(0x7f0000000280)={@id={0x2, 0x0, @c}}) seccomp$SECCOMP_GET_NOTIF_SIZES(0x3, 0x0, &(0x7f0000000100)) r1 = openat$vcsu(0xffffffffffffff9c, &(0x7f0000000040), 0x1, 0x0) r2 = openat$vcsu(0xffffffffffffff9c, &(0x7f0000000180), 0x80003, 0x0) unlinkat(r1, &(0x7f00000000c0)='./file0\x00', 0x200) sendmsg$TIPC_CMD_GET_LINKS(r2, &(0x7f0000000440)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x200}, 0xc, &(0x7f0000000400)={&(0x7f0000000340)={0x24, 0x0, 0x400, 0x70bd25, 0x25dfdbfb, {{}, {}, {0x8, 0x11, 0x3ff}}, ["", "", "", "", "", "", "", ""]}, 0x24}, 0x1, 0x0, 0x0, 0xc880}, 0x0) faccessat(0xffffffffffffffff, &(0x7f0000000140)='./file0\x00', 0x7a) sendmsg$NL802154_CMD_SET_MAX_FRAME_RETRIES(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x200000}, 0xc, &(0x7f0000000380)={&(0x7f0000000300)=ANY=[@ANYBLOB='\x00\x00\x00\x00', @ANYRES16=0x0, @ANYBLOB="0001299d7000fc000f00ff0000000ce00500a568000001000004000f003a0000000c0006000000000300"/54], 0x44}, 0x1, 0x0, 0x0, 0x800}, 0x4044080) 10:11:12 executing program 5: syz_mount_image$ext4(0x0, &(0x7f0000000440)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r0 = openat$dir(0xffffffffffffff9c, &(0x7f0000000300)='./file0\x00', 0x0, 0x0) unlinkat(0xffffffffffffff9c, &(0x7f0000000100)='./file0\x00', 0x200) faccessat(r0, &(0x7f0000000000)='./file0\x00', 0x166) 10:11:12 executing program 4: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000040)={0x2, &(0x7f0000000000)=[{0x25}, {0x0, 0x0, 0x0, 0x45000000}]}) 10:11:12 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000040)={0x2, &(0x7f0000000000)=[{0x15}, {}]}) r0 = openat$vcsu(0xffffffffffffff9c, &(0x7f0000000000), 0x5200, 0x0) fchmodat(r0, &(0x7f0000000040)='./file0\x00', 0x1b0) r1 = openat$incfs(r0, &(0x7f00000002c0)='.log\x00', 0x581200, 0x123) syz_genetlink_get_family_id$fou(&(0x7f0000000300), r1) renameat2(r1, &(0x7f0000000380)='./file0\x00', 0xffffffffffffffff, &(0x7f00000003c0)='./file1\x00', 0x0) ioctl$sock_ipv6_tunnel_SIOCDELTUNNEL(r1, 0x89f2, &(0x7f0000000100)={'ip6_vti0\x00', &(0x7f0000000080)={'syztnl1\x00', 0x0, 0x29, 0xd4, 0x3, 0x2, 0x76, @private1, @private2, 0x20, 0xe, 0x7, 0x46291db}}) 10:11:12 executing program 3: r0 = fork() sched_rr_get_interval(r0, &(0x7f0000000100)) r1 = openat$ptp0(0xffffffffffffff9c, &(0x7f0000000140), 0x80840, 0x0) ioctl$PTP_SYS_OFFSET(r1, 0x43403d05, &(0x7f0000000500)={0x12}) sched_rr_get_interval(r0, &(0x7f0000000080)) ioctl$PTP_PIN_SETFUNC2(r1, 0x40603d10, &(0x7f0000000180)={'\x00', 0x6, 0x3, 0x1}) clock_settime(0x1, &(0x7f00000000c0)={0x0, 0x3938700}) syz_mount_image$ext4(&(0x7f0000000000)='ext3\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000480)=ANY=[@ANYBLOB='lazytime,test_dummy_encryption,max_dir_size_kb=0x000000000200,grpjquota=,min_batch_time=0x00000000000003ff,rootcontext\a']) 10:11:12 executing program 2: syz_mount_image$ext4(0x0, &(0x7f0000000440)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r0 = openat$dir(0xffffffffffffff9c, &(0x7f0000000300)='./file0\x00', 0x0, 0x0) unlinkat(0xffffffffffffff9c, &(0x7f0000000100)='./file0\x00', 0x200) fchmodat(r0, &(0x7f0000000000)='./file0\x00', 0x1a1) 10:11:12 executing program 4: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000040)={0x2, &(0x7f0000000000)=[{0x25}, {0x0, 0x0, 0x0, 0x4d000000}]}) 10:11:12 executing program 5: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NBD_CMD_CONNECT(r0, &(0x7f00000013c0)={&(0x7f00000012c0), 0xc, &(0x7f0000001380)={0x0}}, 0xc6c3dbe86af1a089) ioctl$sock_SIOCGIFINDEX_802154(0xffffffffffffffff, 0x8933, &(0x7f00000000c0)={'wpan3\x00', 0x0}) sendmsg$NL802154_CMD_SET_CHANNEL(r0, &(0x7f00000001c0)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f0000000180)={&(0x7f0000000100)=ANY=[@ANYBLOB='H\x00\x00\x00', @ANYRES16=0x0, @ANYBLOB="000826bd7000fbdbdf2509000000050008000100000008000300", @ANYRES32=0x0, @ANYBLOB="055172733cfd9e8dc80008000f00000008000300", @ANYRES32=r1, @ANYBLOB="0c000700030000000300552e"], 0x48}, 0x1, 0x0, 0x0, 0x840}, 0x14) syz_mount_image$ext4(0x0, &(0x7f0000000440)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r2 = openat$dir(0xffffffffffffff9c, &(0x7f0000000300)='./file0\x00', 0x0, 0x0) unlinkat(r2, &(0x7f0000000000)='./file0\x00', 0x200) unlinkat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x200) 10:11:12 executing program 2: r0 = openat$vcsu(0xffffffffffffff9c, &(0x7f0000000340), 0x301, 0x0) ioctl$PTP_ENABLE_PPS(r0, 0x40043d04, 0x1) sendmsg$TIPC_CMD_SHOW_PORTS(r0, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x200}, 0xc, &(0x7f0000000080)={&(0x7f0000000040)={0x1c, 0x0, 0x1, 0x70bd26, 0x25dfdbfc, {}, ["", "", "", "", ""]}, 0x1c}, 0x1, 0x0, 0x0, 0x11}, 0x800) syz_mount_image$ext4(0x0, &(0x7f0000000440)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) openat$dir(0xffffffffffffff9c, &(0x7f0000000300)='./file0\x00', 0x0, 0x0) unlinkat(0xffffffffffffff9c, &(0x7f0000000100)='./file0\x00', 0x200) 10:11:12 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000040)) prctl$PR_SET_CHILD_SUBREAPER(0x24, 0x0) prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000080)={0x5, &(0x7f0000000000)=[{0x80, 0x4, 0xc0, 0x405}, {0x8, 0x1, 0xf9, 0x3}, {0x0, 0x7, 0x86, 0x7}, {0x0, 0x19, 0x7, 0x1}, {0x5, 0x3, 0x2, 0x3}]}) r0 = openat$vcsu(0xffffffffffffff9c, &(0x7f0000000000), 0x5200, 0x0) fchmodat(r0, &(0x7f0000000040)='./file0\x00', 0x1b0) openat$incfs(r0, &(0x7f00000002c0)='.log\x00', 0x581200, 0x123) accept4$packet(r0, &(0x7f0000000400)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000000440)=0x14, 0x100000) sendmsg$FOU_CMD_ADD(r0, &(0x7f0000000180)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f0000000140)={&(0x7f0000000100)={0x2c, 0x0, 0x200, 0x70bd28, 0x25dfdbfb, {}, [@FOU_ATTR_LOCAL_V4={0x8, 0x6, @empty}, @FOU_ATTR_LOCAL_V4={0x8, 0x6, @private=0xa010101}, @FOU_ATTR_PEER_PORT={0x6, 0xa, 0x4e22}]}, 0x2c}, 0x1, 0x0, 0x0, 0x8004000}, 0x4000) 10:11:12 executing program 4: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000040)={0x2, &(0x7f0000000000)=[{0x25}, {0x0, 0x0, 0x0, 0x60000000}]}) 10:11:12 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext3\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000080)=ANY=[@ANYBLOB="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"]) 10:11:13 executing program 1: clock_settime(0x0, &(0x7f0000000000)={0x77359400}) r0 = openat$vcsu(0xffffffffffffff9c, &(0x7f0000000000), 0x5200, 0x0) fchmodat(r0, &(0x7f0000000040)='./file0\x00', 0x1b0) r1 = openat$incfs(r0, &(0x7f00000002c0)='.log\x00', 0x581200, 0x123) accept4$packet(r0, &(0x7f0000000400)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000000440)=0x14, 0x100000) setsockopt$packet_buf(r0, 0x107, 0x6, &(0x7f0000000140)="fbfb66d941bd1d3a5753c9776f60bd9d8e3e9add985e9e55e9f1f654fca4f2373477e6aa66c1d4bfe87d4d56445a546df13f2562a611437b9e21757648f7bcc818c286a1e4bff6d2deda8fe2c7f93825424b286e785af0beb4f37c0b44d1891fa4726da576107c779be79b3301e86f44315c454729b260d343f9dc80caea176a90a62625c62599da0cf406a6206f4b2c2537cfee2321eff2dbe9cd5c944a9ff1597f450fcbd22c7f86453263173a3395dc3d7a69c8527f0f10187564afc2313dca21dafadcd02eb87d54b8ee3d7bf3a83dbd9b26ca79937480b05e", 0xdb) clock_gettime(0x0, &(0x7f0000000080)) ioctl$ifreq_SIOCGIFINDEX_team(r0, 0x8933, &(0x7f0000000340)={'team0\x00', 0x0}) ioctl$sock_ipv6_tunnel_SIOCDELTUNNEL(r0, 0x89f2, &(0x7f0000000480)={'ip6tnl0\x00', &(0x7f0000000380)={'sit0\x00', r2, 0x4, 0x8, 0x6, 0x2, 0x11, @rand_addr=' \x01\x00', @private1={0xfc, 0x1, '\x00', 0x1}, 0x7800, 0x8000, 0x0, 0x1f}}) ioctl$sock_ipv6_tunnel_SIOCDELPRL(r0, 0x89f6, &(0x7f0000000540)={'ip6gre0\x00', &(0x7f00000004c0)={'syztnl2\x00', r2, 0x4, 0x1, 0x58, 0x10000, 0x69, @mcast2, @local, 0x7, 0x700, 0x9, 0x2}}) getpeername$packet(r1, &(0x7f0000000580)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000005c0)=0x14) getsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f0000000600)={{{@in6=@mcast2, @in6=@dev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@private}, 0x0, @in6=@empty}}, &(0x7f0000000700)=0xe8) sendmsg$TEAM_CMD_OPTIONS_SET(0xffffffffffffffff, &(0x7f0000000dc0)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f0000000d80)={&(0x7f0000000740)={0x638, 0x0, 0x2, 0x70bd27, 0x25dfdbff, {}, [{{0x8, 0x1, r2}, {0x22c, 0x2, 0x0, 0x1, [{0x3c, 0x1, @user_linkup={{{0x24}, {0x5}, {0x4}}, {0x8, 0x6, r3}}}, {0x40, 0x1, @lb_port_stats={{{0x24}, {0x5}, {0x8, 0x4, 0x20}}, {0x8, 0x6, r2}}}, {0x38, 0x1, @notify_peers_interval={{0x24}, {0x5}, {0x8}}}, {0x38, 0x1, @notify_peers_interval={{0x24}, {0x5}, {0x8, 0x4, 0x4}}}, {0x40, 0x1, @priority={{{0x24}, {0x5}, {0x8, 0x4, 0x3f}}, {0x8, 0x6, r4}}}, {0x40, 0x1, @lb_hash_stats={{{0x24}, {0x5}, {0x8, 0x4, 0x5}}, {0x8}}}, {0x40, 0x1, @lb_tx_hash_to_port_mapping={{{0x24}, {0x5}, {0x8}}, {0x8}}}, {0x3c, 0x1, @user_linkup_enabled={{{0x24}, {0x5}, {0x4}}, {0x8, 0x6, r2}}}, {0x40, 0x1, @lb_hash_stats={{{0x24}, {0x5}, {0x8}}, {0x8}}}]}}, {{0x8, 0x1, r2}, {0xf4, 0x2, 0x0, 0x1, [{0x3c, 0x1, @lb_tx_method={{0x24}, {0x5}, {0x9, 0x4, 'hash\x00'}}}, {0x3c, 0x1, @user_linkup_enabled={{{0x24}, {0x5}, {0x4}}, {0x8, 0x6, r2}}}, {0x40, 0x1, @lb_port_stats={{{0x24}, {0x5}, {0x8, 0x4, 0x1000}}, {0x8, 0x6, r2}}}, {0x38, 0x1, @notify_peers_interval={{0x24}, {0x5}, {0x8, 0x4, 0xaa0}}}]}}, {{0x8, 0x1, r2}, {0x7c, 0x2, 0x0, 0x1, [{0x38, 0x1, @lb_stats_refresh_interval={{0x24}, {0x5}, {0x8, 0x4, 0x7}}}, {0x40, 0x1, @name={{0x24}, {0x5}, {0x10, 0x4, 'loadbalance\x00'}}}]}}, {{0x8, 0x1, r2}, {0x268, 0x2, 0x0, 0x1, [{0x3c, 0x1, @user_linkup={{{0x24}, {0x5}, {0x4}}, {0x8, 0x6, r2}}}, {0x4c, 0x1, @bpf_hash_func={{0x24}, {0x5}, {0x1c, 0x4, [{0xffff, 0x7, 0x8, 0x800}, {0x1d26, 0x2, 0xe1}, {0x1, 0x4, 0x16, 0x4f}]}}}, {0x38, 0x1, @notify_peers_interval={{0x24}, {0x5}, {0x8, 0x4, 0x5}}}, {0x40, 0x1, @priority={{{0x24}, {0x5}, {0x8, 0x4, 0x1}}, {0x8, 0x6, r2}}}, {0x3c, 0x1, @user_linkup={{{0x24}, {0x5}, {0x4}}, {0x8, 0x6, r5}}}, {0x38, 0x1, @mcast_rejoin_interval={{0x24}, {0x5}, {0x8, 0x4, 0x7fffffff}}}, {0x3c, 0x1, @user_linkup_enabled={{{0x24}, {0x5}, {0x4}}, {0x8, 0x6, r6}}}, {0x40, 0x1, @lb_port_stats={{{0x24}, {0x5}, {0x8, 0x4, 0x9}}, {0x8, 0x6, r7}}}, {0x3c, 0x1, @enabled={{{0x24}, {0x5}, {0x4}}, {0x8, 0x6, r2}}}, {0x38, 0x1, @mcast_rejoin_count={{0x24}, {0x5}, {0x8, 0x4, 0xffff}}}]}}]}, 0x638}, 0x1, 0x0, 0x0, 0x24000000}, 0x8050) r8 = openat$vcsu(0xffffffffffffff9c, &(0x7f0000000000), 0x5200, 0x0) fchmodat(r8, &(0x7f0000000040)='./file0\x00', 0x1b0) openat$incfs(r8, &(0x7f00000002c0)='.log\x00', 0x581200, 0x123) accept4$packet(r8, &(0x7f0000000400)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000000440)=0x14, 0x100000) syz_genetlink_get_family_id$team(&(0x7f0000000240), r8) rseq(&(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={0x0, 0x5, 0x401, 0x2, 0x9}, 0x2}, 0x20, 0x0, 0x0) clock_nanosleep(0x6, 0x0, &(0x7f0000000040)={0x0, 0x989680}, 0x0) 10:11:13 executing program 5: syz_mount_image$ext4(0x0, &(0x7f0000000440)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) openat$dir(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x88180, 0x100) openat$dir(0xffffffffffffff9c, &(0x7f0000000300)='./file0\x00', 0x0, 0x0) unlinkat(0xffffffffffffff9c, &(0x7f0000000100)='./file0\x00', 0x200) r0 = openat$vcsu(0xffffffffffffff9c, &(0x7f0000000000), 0x5200, 0x0) fchmodat(r0, &(0x7f0000000040)='./file0\x00', 0x1b0) r1 = openat$vcsu(0xffffffffffffff9c, &(0x7f0000000000), 0x5200, 0x0) fchmodat(r1, &(0x7f0000000040)='./file0\x00', 0x1b0) r2 = openat$incfs(r1, &(0x7f00000002c0)='.log\x00', 0x581200, 0x123) syz_genetlink_get_family_id$fou(&(0x7f0000000300), r2) faccessat(r2, &(0x7f00000004c0)='./file0\x00', 0xa) renameat2(r2, &(0x7f0000000380)='./file0\x00', 0xffffffffffffffff, &(0x7f00000003c0)='./file1\x00', 0x0) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY_ALL_USERS(r2, 0xc0406619, &(0x7f0000000480)={@id={0x2, 0x0, @a}}) r3 = openat$incfs(r0, &(0x7f00000002c0)='.log\x00', 0x581200, 0x123) syz_genetlink_get_family_id$fou(&(0x7f0000000300), r3) renameat2(r3, &(0x7f0000000380)='./file0\x00', 0xffffffffffffffff, &(0x7f00000003c0)='./file1\x00', 0x0) execveat(r3, &(0x7f0000000040)='./file0\x00', &(0x7f0000000340)=[&(0x7f0000000080)='\x00', &(0x7f00000000c0)='\x00', &(0x7f0000000140)=')}&@$\x00', &(0x7f0000000180)=',@*+*^:&+\x00', &(0x7f00000001c0)='}{.&&\'\x00', &(0x7f0000000200)='].^{%\\^-#\\},$\x00', &(0x7f0000000240)='\x00', &(0x7f0000000280)='$%:\x00', &(0x7f00000002c0)='\xa6@[+\x96\x00'], &(0x7f0000000400)=[&(0x7f00000003c0)='(H)]\xde$\x04{\x00'], 0x1000) 10:11:13 executing program 4: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000040)={0x2, &(0x7f0000000000)=[{0x25}, {0x0, 0x0, 0x0, 0x61000000}]}) 10:11:13 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000040)={0x2, &(0x7f0000000000)=[{0x15}, {}]}) rt_sigprocmask(0x0, &(0x7f0000000080)={[0x5]}, 0x0, 0x8) get_thread_area(&(0x7f00000000c0)={0xc7, 0x0, 0x1000, 0x0, 0x3, 0x0, 0x0, 0x1, 0x1, 0x1}) 10:11:13 executing program 2: r0 = getpgrp(0xffffffffffffffff) sched_getscheduler(r0) r1 = syz_mount_image$ext4(0x0, &(0x7f0000000440)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r2 = openat$vcsu(0xffffffffffffff9c, &(0x7f0000000000), 0x5200, 0x0) fchmodat(r2, &(0x7f0000000040)='./file0\x00', 0x1b0) openat$incfs(r2, &(0x7f00000002c0)='.log\x00', 0x581200, 0x123) r3 = openat$incfs(r1, &(0x7f0000000080)='.pending_reads\x00', 0x80000, 0x40) sendmsg$TIPC_CMD_SET_NETID(r3, &(0x7f00000001c0)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x200000}, 0xc, &(0x7f0000000180)={&(0x7f0000000140)={0x24, 0x0, 0x800, 0x70bd2d, 0x25dfdbfc, {{}, {}, {0x8, 0x2, 0x1}}, ["", "", "", ""]}, 0x24}, 0x1, 0x0, 0x0, 0x1}, 0x8000) accept4$packet(r2, &(0x7f0000000400)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000000440)=0x14, 0x100000) getdents(r2, &(0x7f0000000000)=""/6, 0x6) openat$dir(0xffffffffffffff9c, &(0x7f0000000300)='./file0\x00', 0x0, 0x0) unlinkat(0xffffffffffffff9c, &(0x7f0000000100)='./file0\x00', 0x200) 10:11:13 executing program 3: ioctl$PTP_PEROUT_REQUEST(0xffffffffffffffff, 0x40383d03, &(0x7f0000000080)={{0x80000001, 0x8}, {0x5, 0xaba9}, 0x0, 0x1}) syz_mount_image$ext4(&(0x7f0000000000)='ext3\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000480)=ANY=[@ANYBLOB='lazytime,test_dummy_encryption,max_dir_size_kb=0x000000000200,grpjquota=,min_batch_time=0x00000000000003ff,rootcontext\a']) 10:11:13 executing program 1: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$TIPC_CMD_SHOW_PORTS(r0, &(0x7f0000000140)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x200000}, 0xc, &(0x7f00000000c0)={&(0x7f0000000080)={0x1c, 0x0, 0x408, 0x70bd26, 0x25dfdbfb, {}, ["", "", "", "", "", ""]}, 0x1c}}, 0x8815) clock_settime(0x0, &(0x7f0000000000)={0x77359400}) 10:11:13 executing program 4: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000040)={0x2, &(0x7f0000000000)=[{0x25}, {0x0, 0x0, 0x0, 0x64000000}]}) 10:11:13 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000040)={0x0, &(0x7f00000001c0)}) futimesat(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)={{0x77359400}, {0x77359400}}) prctl$PR_SVE_SET_VL(0x32, 0x3ad8a) r0 = openat$dir(0xffffffffffffff9c, &(0x7f0000000100)='./file0\x00', 0x8000, 0x40) unlinkat(r0, &(0x7f0000000240)='./file0\x00', 0x0) ioctl$FS_IOC_GET_ENCRYPTION_KEY_STATUS(r0, 0xc080661a, &(0x7f0000000140)={@id={0x2, 0x0, @a}}) symlinkat(&(0x7f0000000000)='./file0\x00', r0, &(0x7f0000000200)='./file0\x00') 10:11:13 executing program 3: r0 = syz_genetlink_get_family_id$tipc(&(0x7f00000026c0), 0xffffffffffffffff) sendmsg$TIPC_CMD_SHOW_NAME_TABLE(0xffffffffffffffff, &(0x7f0000002780)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x40000200}, 0xc, &(0x7f0000002740)={&(0x7f0000002700)={0x30, r0, 0x800, 0x70bd27, 0x25dfdbfe, {{}, {}, {0x14, 0x19, {0x9, 0x9, 0x5f, 0x6}}}, ["", ""]}, 0x30}, 0x1, 0x0, 0x0, 0x90}, 0x80) syz_mount_image$ext4(&(0x7f0000000000)='ext3\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000480)=ANY=[@ANYBLOB='lazytime,test_dummy_encryption,max_dir_size_kb=0x000000000200,grpjq=,min_batch_time=0x000003ff,rootcontext\a\x00\x00\x00\x00']) sendmsg$TIPC_CMD_GET_REMOTE_MNG(0xffffffffffffffff, &(0x7f0000002880)={&(0x7f00000027c0)={0x10, 0x0, 0x0, 0x80}, 0xc, &(0x7f0000002840)={&(0x7f0000002800)={0x1c, r0, 0x20, 0x70bd25, 0x25dfdbff}, 0x1c}, 0x1, 0x0, 0x0, 0x40000}, 0x40000) r1 = syz_mount_image$ext4(&(0x7f0000000080)='ext3\x00', &(0x7f00000000c0)='./file0\x00', 0x8, 0x8, &(0x7f00000025c0)=[{&(0x7f0000000100)="f7ca61ef99f091719598e70b8dcf243f1acc0b266bf10fe2eeeb2adf56efdb945ae0b1c1ccb474a36c9ef687034f9b12fe4938f7267863c53c36f0278a3bade584962c9edb1726392d051184e7f9f2b411016981ae5daedf1d7ee76d72d67d8f8dc8b7470d3731e282c05ece59d4e2d4d3bce08620e2db962f0080c18db24263fa665ee048cdaabc6329b92a1ab78056edca337de2a34bf338e2132d7214fc5f7b6a110a69581b963c45286d2182a9a9283918ee6721389847506e9c4fc0502d3d1cfbf63c", 0xc5, 0x7fffffff}, {&(0x7f0000000500)="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", 0x1000, 0x400}, {&(0x7f0000001500)="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", 0x1000, 0x9}, {&(0x7f0000000200), 0x0, 0x8}, {&(0x7f0000000240)="cf43f970b02c92b3676532c9a6fb6436450df0f8dd2fef62411f412e23f6baef6932947d0f7d4cdb0d242ef2225bde9a0978559488e286db16945f42eb665ea12c0024f22d856ae2bc08acee7871c2af2f935a28633db754ce6a465777b8bca48f9c459d95a11ce626026bedde37ec72ed3f8162cf13039070f2941654", 0x7d, 0x5}, {&(0x7f00000002c0)="0af115da5fffaf3dab5d292aae582db2f44a932809c83a77cae9adb215c65eea55fd7351c1dc6420ced7d826745fd804779d7b7890364f6bc46845adba4c04b2242718c6e937", 0x46, 0x6}, {&(0x7f0000000340)="99507b12483693c5c8bfc7ccea6891c003fd94739698e3caab1d72a6e45a9585cd8c53150aad1c6c4b06d39d66cccbaa9c8f5b157af598cb94405273a7caa1e6f0684bbd8298fcf35324a3eacfaae00e64b3c02564b1c56297f7cfbdad118a1e4d9cd793315953f226716686ce43b78e27aaabb9d0fc68150af08fb89bb0ce926263c9a1d412b963a8ce2b137b25ecd4bb5cb00acc1b9d00cbf31dd1a77795e069520011748a3889618f4db037e5b4a05b7b20f11b96f15ac89815c5418007ee196cd52f0777", 0xc6, 0x100000001}, {&(0x7f0000002500)="4c0c2e2c658accbeaa54d328c7f3c579532502958a045909ac19a65ba21bf423b65ac2393f0d7cda220b9c5a51c33a94add0c815dc7a369747448ab8960ab14ae775174c9a25ebf4b9812ea93e040f9afe5c338241832392dae2d141fe5a93066784d6c1c0a7feb5fa0fd7b554c8b919c173bcb5d510cdf1bfd647ab788ed83de5c9e95b357c3c81b7215fa4f4448d965601099fe42e7404e3a9c64fd7f64837c4f736075d0a35b58b160638828deae4d9026274cea3ae54e77dc65c5c", 0xbd, 0xfff}], 0x2, &(0x7f00000028c0)=ANY=[@ANYBLOB="465f764fb8ffb50ab0f0659a7589ba4752421d00000020052c005dbedc754e831d7b43a4ec217cbe96561132c7f4492c53d857c06bdcfe77d6b898fdfd45da3780149fd841c5295d07f5036b47fda1be3a626a2522a96685280f4569ec2401b91bb834163fabda055ac55230855b8037ff87a0e67db0d547c6004f53e46df864cd1700aac56d5fc2548bdd"]) r2 = openat$vcsu(0xffffffffffffff9c, &(0x7f0000000000), 0x5200, 0x0) fchmodat(r2, &(0x7f0000000040)='./file0\x00', 0x1b0) openat$incfs(r2, &(0x7f00000002c0)='.log\x00', 0x581200, 0x123) fchmodat(r2, &(0x7f0000002a40)='./file0\x00', 0x2) accept4$packet(r2, &(0x7f0000000400)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000000440)=0x14, 0x100000) sendmsg$TIPC_CMD_SET_LINK_TOL(r2, &(0x7f0000002a00)={&(0x7f0000000440)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f00000029c0)={&(0x7f0000002980)={0x30, r0, 0x8, 0x70bd28, 0x25dfdbfc, {{}, {}, {0x14, 0x18, {0x0, @bearer=@udp='udp:syz2\x00'}}}, ["", "", "", "", "", ""]}, 0x30}, 0x1, 0x0, 0x0, 0x2044044}, 0x80) fchmodat(r1, &(0x7f0000002680)='./file0\x00', 0x80) 10:11:13 executing program 1: clock_settime(0x0, &(0x7f0000000000)={0x0, 0x3938700}) 10:11:13 executing program 2: syz_mount_image$ext4(0x0, &(0x7f0000000440)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) openat$dir(0xffffffffffffff9c, &(0x7f0000000300)='./file0\x00', 0x0, 0x0) unlinkat(0xffffffffffffff9c, &(0x7f0000000100)='./file0\x00', 0x200) getdents64(0xffffffffffffff9c, &(0x7f0000000000)=""/45, 0x2d) 10:11:13 executing program 4: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000040)={0x2, &(0x7f0000000000)=[{0x25}, {0x0, 0x0, 0x0, 0x74000000}]}) 10:11:13 executing program 5: syz_mount_image$ext4(0x0, &(0x7f0000000440)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) openat$dir(0xffffffffffffff9c, &(0x7f0000000300)='./file0\x00', 0x0, 0x0) unlinkat(0xffffffffffffff9c, &(0x7f0000000100)='./file0\x00', 0x200) arch_prctl$ARCH_SET_CPUID(0x1012, 0x1) [ 1894.322524][T25958] loop3: detected capacity change from 0 to 264192 [ 1894.340996][T25958] EXT4-fs (loop3): VFS: Can't find ext4 filesystem 10:11:13 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000040)) openat$ptp0(0xffffffffffffff9c, &(0x7f0000000080), 0x80040, 0x0) 10:11:13 executing program 5: syz_mount_image$ext4(0x0, &(0x7f0000000440)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r0 = openat$vcsu(0xffffffffffffff9c, &(0x7f0000000340), 0x301, 0x0) ioctl$PTP_ENABLE_PPS(r0, 0x40043d04, 0x1) faccessat(r0, &(0x7f0000000000)='./file1\x00', 0x122) openat$dir(0xffffffffffffff9c, &(0x7f0000000300)='./file0\x00', 0x0, 0x0) unlinkat(0xffffffffffffff9c, &(0x7f0000000100)='./file0\x00', 0x200) 10:11:13 executing program 2: r0 = syz_mount_image$ext4(0x0, &(0x7f0000000440)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) openat$dir(0xffffffffffffff9c, &(0x7f0000000300)='./file0\x00', 0x0, 0x0) openat$dir(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x101000, 0x8) prctl$PR_GET_THP_DISABLE(0x2a) unlinkat(r0, &(0x7f0000000040)='./file0\x00', 0x200) 10:11:13 executing program 1: clock_settime(0x3, &(0x7f0000000000)={0x77359400}) 10:11:13 executing program 4: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000040)={0x2, &(0x7f0000000000)=[{0x25}, {0x0, 0x0, 0x0, 0x94000000}]}) 10:11:13 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000040)={0x2, &(0x7f0000000000)=[{0x15}, {}]}) r0 = fork() sched_rr_get_interval(r0, &(0x7f0000000100)) ptrace$setregset(0x4205, r0, 0x3, &(0x7f00000000c0)={&(0x7f0000000080)="2c038f7b6e6633cee0d358fd933c52a0969674", 0x13}) [ 1894.465059][T25990] loop3: detected capacity change from 0 to 264192 [ 1894.479713][T25990] EXT4-fs (loop3): VFS: Can't find ext4 filesystem 10:11:13 executing program 1: clock_settime(0x0, &(0x7f0000000000)={0x77359400}) clock_gettime(0x1, &(0x7f0000000040)) pselect6(0x40, &(0x7f00000000c0)={0x81, 0x9, 0x7, 0x80000001, 0x20, 0x100000001, 0x7fffffff, 0x3}, &(0x7f0000000100)={0x5, 0x8, 0x9, 0x7, 0x6, 0xffff, 0xae90ef3, 0x100000}, &(0x7f0000000140)={0x20, 0xff, 0x8d, 0x8001, 0x8000, 0x6, 0x51, 0x2}, &(0x7f0000000180)={0x77359400}, &(0x7f0000000200)={&(0x7f00000001c0)={[0x8]}, 0x8}) clock_gettime(0x7, &(0x7f0000000080)) 10:11:13 executing program 4: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000040)={0x2, &(0x7f0000000000)=[{0x25}, {0x0, 0x0, 0x0, 0xb1000000}]}) 10:11:13 executing program 3: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext3\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000480)=ANY=[@ANYBLOB='lazytime,test_dummy_encryption,max_dir_size_kb=0x000000000200,grpjquota=,min_batch_time=0x00000000000003ff,rootcontext\a']) renameat2(r0, &(0x7f0000000080)='./file0\x00', r0, &(0x7f00000000c0)='./file0\x00', 0x4) 10:11:13 executing program 5: syz_mount_image$ext4(0x0, &(0x7f0000000440)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) openat$dir(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x8000, 0xc2) unlinkat(0xffffffffffffff9c, &(0x7f0000000100)='./file0\x00', 0x200) 10:11:13 executing program 0: r0 = add_key$keyring(&(0x7f0000000080), &(0x7f00000000c0)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$KEYCTL_MOVE(0x1e, r0, 0x0, 0x0, 0x0) r1 = add_key$fscrypt_v1(&(0x7f0000000000), &(0x7f0000000100)={'fscrypt:', @desc2}, &(0x7f0000000140)={0x0, "31ffa68a1eb68bec3313f2b7d65709ae4025980236f1f06975e5c48ecc1bddf2f3033f3ea5740f500d83398d7493e8b6cd47dca20fc1fea049059c32519519d9", 0x1b}, 0x48, r0) keyctl$link(0x8, r0, r1) r2 = add_key$keyring(&(0x7f0000000080), &(0x7f00000000c0)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffa) keyctl$unlink(0x9, r0, r2) r3 = add_key$fscrypt_v1(&(0x7f00000001c0), &(0x7f0000000200)={'fscrypt:', @desc4}, &(0x7f0000000240)={0x0, "bcffdd661c7655f5dc23f0ceb061e5fb3e8c5b1ae2ef9717e973f88c6a219c6f102b5f6b424fa137a797aeb795d0c9d1c3c616ebaf3442ad71ed3c6bf7d14cf8", 0x3a}, 0x48, r2) r4 = add_key$fscrypt_v1(&(0x7f00000002c0), &(0x7f0000000300)={'fscrypt:', @desc4}, &(0x7f0000000340)={0x0, "1b4dd75b5d345359fb58ed23b5b22af8bff27f8d6c17d7fd468c40f9d616cd85b1743a86d422e8ac18e42f5c8640e1a3fac12bf3a81f8cc74e3c01dd34b77030", 0x25}, 0x48, 0xfffffffffffffffc) keyctl$negate(0xd, r3, 0x100000000, r4) prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000040)) 10:11:13 executing program 1: unshare(0x40000) r0 = openat$vcsu(0xffffffffffffff9c, &(0x7f0000000000), 0x5200, 0x0) syz_mount_image$ext4(&(0x7f0000000080)='ext3\x00', &(0x7f00000000c0)='.\x00', 0x2908, 0x4, &(0x7f0000000500)=[{&(0x7f0000000100)="21d700a3fc3759223cbaa964205eb78116f399e46c496454fcaf3ffb287b761745683cbb48db0a1c6c9a03468e8a1fee18bc46cc19a254db981028db1fc7deb0013aacaa74faa8d06261175dda09ece0308bdae5575339f5ea5a44868b78d784621382261fad0f1fa00d00fad97237226e67911c978d3ff6101a249e0ddfba9be6a2dc7e0d6ee265debe439a66c634010c31c52dc53b131485a5d28ece292791b11e1156b305a2357699bd712b7b1039929f572af74663e888d42eabf90506433f9d7eb7a59c4a9ad76951", 0xcb, 0x4}, {&(0x7f0000000400)="e01067737c92eefc95117335861a0c9cbe39cd71b70b90af276b0eefb79e2aaa8188bc1c492acf35d29eced8fecf9a386ee62326c60b198eadd395f91dc9ab135ebe3f597ad621f2d6338bdd19213bcfb18908633d955252afdd4f957d8b0e897af04c7f6d6899576ec852ec115730d2ea11128f6290bc1414a41373c122862fe4a9f9c7647ae9720d6fdbe8a3ab0e3d57f72d50d3e15e1aa64542dabfd507443657d1768b1838c48cbe3a8f9f5c666b7fa22520183104326302575dbd878f470f35e64f9b378269e3c7", 0xca, 0x2}, {&(0x7f0000000200)="212f2db54671eb0ec65632ad", 0xc, 0x5}, {&(0x7f0000000240)="9e5ab50a040cec083780f3387f9b3277b0f6e6d2855d175f2d7f096a73493e6b65f0f02e226d5ec34b9ff175616d43f435d9d9fdd4045f13d9f2101938e98f37d94a3b", 0x43, 0xfff}], 0x4000, &(0x7f0000000340)=ANY=[@ANYBLOB='data_err=ignore,acl,nise,user\x00'/53]) r1 = openat$vcsu(0xffffffffffffff9c, &(0x7f0000000000), 0x5200, 0x0) fchmodat(r1, &(0x7f0000000040)='./file0\x00', 0x1b0) r2 = openat$incfs(r1, &(0x7f00000002c0)='.log\x00', 0x581200, 0x123) syz_genetlink_get_family_id$fou(&(0x7f0000000300), r2) renameat2(r2, &(0x7f0000000380)='./file0\x00', 0xffffffffffffffff, &(0x7f00000003c0)='./file1\x00', 0x0) fchmodat(r2, &(0x7f0000000040)='./file0\x00', 0xa8) ioctl$PTP_PEROUT_REQUEST(r0, 0x40383d03, &(0x7f0000000580)={{0xfffffffffffffffd, 0xffff8001}, {0x0, 0x3}, 0xef9}) r3 = openat$incfs(r0, &(0x7f00000002c0)='.log\x00', 0x581200, 0x123) syz_genetlink_get_family_id$fou(&(0x7f0000000300), r3) renameat2(r3, &(0x7f0000000380)='./file0\x00', 0xffffffffffffffff, &(0x7f00000003c0)='./file1\x00', 0x0) ioctl$SG_SET_DEBUG(r3, 0x227e, &(0x7f0000000040)=0x1) clock_settime(0x0, &(0x7f0000000000)={0x77359400}) keyctl$negate(0xd, 0x0, 0x8, 0xfffffffffffffffb) 10:11:13 executing program 2: syz_mount_image$ext4(0x0, &(0x7f0000000440)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NL802154_CMD_SET_ACKREQ_DEFAULT(r0, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f0000000080)={&(0x7f0000000040)={0x34, 0x0, 0x8, 0x70bd2a, 0x25dfdbff, {}, [@NL802154_ATTR_WPAN_DEV={0xc}, @NL802154_ATTR_IFINDEX={0x8}, @NL802154_ATTR_WPAN_DEV={0xc, 0x6, 0x100000001}]}, 0x34}, 0x1, 0x0, 0x0, 0x5}, 0x40084) openat$dir(0xffffffffffffff9c, &(0x7f0000000300)='./file0\x00', 0x0, 0x0) r1 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NBD_CMD_CONNECT(r1, &(0x7f00000013c0)={&(0x7f00000012c0), 0xc, &(0x7f0000001380)={0x0}}, 0xc6c3dbe86af1a089) r2 = syz_genetlink_get_family_id$nl802154(&(0x7f0000000180), r0) sendmsg$NL802154_CMD_SET_CCA_MODE(r1, &(0x7f0000000240)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x10000000}, 0xc, &(0x7f0000000200)={&(0x7f00000001c0)={0x14, r2, 0x400, 0x70bd29, 0x25dfdbff}, 0x14}}, 0x20040090) unlinkat(0xffffffffffffff9c, &(0x7f0000000100)='./file0\x00', 0x200) r3 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r4 = syz_genetlink_get_family_id$nl802154(&(0x7f00000002c0), r1) ioctl$sock_SIOCGIFINDEX_802154(r0, 0x8933, &(0x7f0000000340)={'wpan4\x00', 0x0}) sendmsg$NL802154_CMD_DEL_SEC_DEV(r3, &(0x7f00000004c0)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x40000}, 0xc, &(0x7f0000000480)={&(0x7f0000000380)={0x88, r4, 0x309, 0x70bd26, 0x25dfdbfb, {}, [@NL802154_ATTR_IFINDEX={0x8}, @NL802154_ATTR_SEC_DEVICE={0x10, 0x23, 0x0, 0x1, {0xc, 0x4, {0xaaaaaaaaaaaa0002}}}, @NL802154_ATTR_IFINDEX={0x8}, @NL802154_ATTR_SEC_DEVICE={0x10, 0x23, 0x0, 0x1, {0xc, 0x4, {0xaaaaaaaaaaaa0102}}}, @NL802154_ATTR_SEC_DEVICE={0x10, 0x23, 0x0, 0x1, {0xc, 0x4, {0xaaaaaaaaaaaa0102}}}, @NL802154_ATTR_WPAN_DEV={0xc, 0x6, 0x300000003}, @NL802154_ATTR_WPAN_DEV={0xc, 0x6, 0x300000003}, @NL802154_ATTR_IFINDEX={0x8}, @NL802154_ATTR_IFINDEX={0x8, 0x3, r5}, @NL802154_ATTR_WPAN_DEV={0xc, 0x6, 0x2}]}, 0x88}, 0x1, 0x0, 0x0, 0xc67da413f90b6106}, 0x44001) 10:11:13 executing program 4: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000040)={0x2, &(0x7f0000000000)=[{0x25}, {}]}) keyctl$join(0x1, 0x0) socket$inet6_udp(0xa, 0x2, 0x0) 10:11:13 executing program 3: r0 = openat$vcsu(0xffffffffffffff9c, &(0x7f0000000000), 0x5200, 0x0) fchmodat(r0, &(0x7f0000000040)='./file0\x00', 0x1b0) r1 = openat$incfs(r0, &(0x7f00000002c0)='.log\x00', 0x581200, 0x123) accept4$packet(r0, &(0x7f0000000400)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000000440)=0x14, 0x100000) r2 = accept4$packet(0xffffffffffffffff, &(0x7f0000000180)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000001c0)=0x14, 0x0) setsockopt$packet_int(r2, 0x107, 0x12, &(0x7f0000000200)=0x344, 0x4) sendmsg$TIPC_CMD_GET_MAX_PORTS(r0, &(0x7f0000000140)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x2000}, 0xc, &(0x7f0000000100)={&(0x7f00000000c0)={0x1c, 0x0, 0x8, 0x70bd27, 0x25dfdbfd, {}, ["", "", "", "", "", "", "", "", ""]}, 0x1c}, 0x1, 0x0, 0x0, 0x20008080}, 0x20000804) syz_mount_image$ext4(&(0x7f0000000000)='ext3\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000480)=ANY=[@ANYBLOB='lazytime,test_tummy_encryption,max_dir_size_kb=0x000000000200,grpjquota=,min_batch_time=0x00000000000003ff,rootcontext\a']) ioctl$SCSI_IOCTL_TEST_UNIT_READY(r1, 0x2) 10:11:13 executing program 5: syz_mount_image$ext4(0x0, &(0x7f0000000440)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r0 = openat$dir(0xffffffffffffff9c, &(0x7f0000000300)='./file0\x00', 0x2000, 0x1a) unlinkat(0xffffffffffffff9c, &(0x7f0000000100)='./file0\x00', 0x200) faccessat2(r0, &(0x7f0000000140)='./file0\x00', 0x84, 0x1300) r1 = openat$dir(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x200000, 0x100) r2 = openat$vcsu(0xffffffffffffff9c, &(0x7f0000000080), 0x200000, 0x0) renameat2(r1, &(0x7f0000000040)='./file0\x00', r2, &(0x7f00000000c0)='./file0\x00', 0x0) 10:11:13 executing program 0: ptrace$setregset(0x4205, 0xffffffffffffffff, 0x4, &(0x7f00000000c0)={&(0x7f0000000080)="c155a5381507ce22cc133ff4", 0xc}) prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000040)={0x2, &(0x7f0000000000)=[{0x15, 0x0, 0x3}, {0x0, 0x4}]}) [ 1894.715477][T26048] loop1: detected capacity change from 0 to 20 [ 1894.749453][T26048] EXT4-fs (loop1): VFS: Can't find ext4 filesystem 10:11:13 executing program 5: syz_mount_image$ext4(0x0, &(0x7f0000000440)='./file0\x00', 0x4, 0xffffffffffffffc6, 0x0, 0x3800028, 0x0) openat$dir(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x6c0101, 0x60) unlinkat(0xffffffffffffff9c, &(0x7f0000000100)='./file0\x00', 0x200) 10:11:13 executing program 0: ioctl$PTP_PEROUT_REQUEST(0xffffffffffffffff, 0x40383d03, &(0x7f0000000080)={{0x2b89, 0x6}, {0x4, 0x1}, 0x1}) prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000040)={0x2, &(0x7f0000000000)=[{0x15}, {}]}) [ 1894.880847][T26082] loop1: detected capacity change from 0 to 20 10:11:13 executing program 2: syz_mount_image$ext4(0x0, &(0x7f0000000440)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) openat$dir(0xffffffffffffff9c, &(0x7f0000000300)='./file0\x00', 0x0, 0x0) unlinkat(0xffffffffffffff9c, &(0x7f0000000100)='./file0\x00', 0x200) sched_getaffinity(0x0, 0x8, &(0x7f0000000000)) 10:11:13 executing program 4: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000040)={0x2, &(0x7f0000000000)=[{0x25}, {}]}) r0 = fork() prctl$PR_SET_SECCOMP(0x16, 0x0, &(0x7f0000000140)={0x3, &(0x7f00000000c0)=[{0x57, 0x8, 0x7, 0x2}, {0x7, 0x80, 0x9, 0xffff}, {0x8, 0x7a, 0x5, 0x1}]}) r1 = fork() sched_rr_get_interval(r1, &(0x7f0000000100)) sched_setaffinity(r1, 0x8, &(0x7f0000000340)=0x100000000) sched_rr_get_interval(r0, &(0x7f0000000100)) sched_setaffinity(r0, 0x8, &(0x7f0000000080)=0x3) r2 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NBD_CMD_CONNECT(r2, &(0x7f00000013c0)={&(0x7f00000012c0), 0xc, &(0x7f0000001380)={0x0}}, 0xc6c3dbe86af1a089) r3 = syz_genetlink_get_family_id$nl802154(&(0x7f00000001c0), 0xffffffffffffffff) ioctl$sock_SIOCGIFINDEX_802154(0xffffffffffffffff, 0x8933, &(0x7f0000000200)={'wpan4\x00', 0x0}) getpgrp(r0) sendmsg$NL802154_CMD_SET_CHANNEL(r2, &(0x7f0000000300)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x800}, 0xc, &(0x7f00000002c0)={&(0x7f0000000240)={0x44, r3, 0x1, 0x70bd26, 0x25dfdbfe, {}, [@NL802154_ATTR_CHANNEL={0x5, 0x8, 0x8}, @NL802154_ATTR_IFINDEX={0x8}, @NL802154_ATTR_IFINDEX={0x8, 0x3, r4}, @NL802154_ATTR_WPAN_PHY={0x8}, @NL802154_ATTR_IFINDEX={0x8}, @NL802154_ATTR_WPAN_PHY={0x8, 0x1, 0x1}]}, 0x44}, 0x1, 0x0, 0x0, 0x4}, 0x0) 10:11:13 executing program 3: faccessat(0xffffffffffffff9c, &(0x7f0000000100)='./file0\x00', 0x11) syz_mount_image$ext4(&(0x7f0000000000)='ext3\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000080)=ANY=[]) [ 1894.935154][T26082] EXT4-fs (loop1): VFS: Can't find ext4 filesystem 10:11:14 executing program 0: sched_rr_get_interval(0x0, &(0x7f0000000080)) pselect6(0x40, &(0x7f00000000c0)={0x3, 0x246, 0x8, 0x8, 0x100, 0x3, 0x1, 0x1}, &(0x7f0000000100)={0x7ff, 0x4, 0x8000, 0x80, 0x8, 0x16a, 0xb75c, 0x4}, &(0x7f0000000140)={0x100, 0x5, 0xc25, 0x2, 0x7, 0x8, 0x6, 0x4}, &(0x7f0000000180), &(0x7f0000000200)={&(0x7f00000001c0)={[0x32e]}, 0x8}) prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000040)={0x2, &(0x7f0000000000)=[{0x15}, {}]}) clock_settime(0x6, &(0x7f00000002c0)) clock_gettime(0x3, &(0x7f0000000240)) clock_settime(0x6, &(0x7f0000000280)={0x0, 0x989680}) socket$packet(0x11, 0x3, 0x300) 10:11:14 executing program 1: clock_gettime(0x0, &(0x7f0000000000)) clock_gettime(0x0, &(0x7f0000000100)) sendmsg$TIPC_CMD_SET_LINK_WINDOW(0xffffffffffffffff, &(0x7f0000000240)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000000200)={&(0x7f0000000280)=ANY=[@ANYBLOB="680000009d3e4056d0ad110f5002c0cab2719382536eeace4f743fd8f7b784a2bdec0f46e8f6ecda576db690396e0b55ce6bf1b45e17d0c5e743a4450c1ec3544dd66c85369b53fa95833b1d03d2c929287eb54dcb7d5129aea6e6a59ebe4e3582c214b905f75f72047bf5711841cdbef33a374ae3ae3c67ea053bc5c6081d0b05471534afb9d9f1241c803fd281fbe3872c7312", @ANYRES16=0x0, @ANYBLOB="080027094100e8d74c00180000000073797a310000000000000000efffffffffffffff000000000000000000000000000000000000000200003c1800"/70], 0x68}, 0x1, 0x0, 0x0, 0x20000885}, 0x4891) clock_settime(0x1, &(0x7f00000000c0)) clock_nanosleep(0x2, 0x0, &(0x7f0000000040)={0x0, 0x3938700}, &(0x7f0000000080)) 10:11:14 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext3\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000480)=ANY=[@ANYBLOB='lazytime,test_dummy_encryption,max_dir_size_kb=0x000000000200,grpjquota=,min_batch_time=0x00000000000003ff,rootcontext\a']) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f00000000c0)='./file0\x00', 0xffffffff, 0x8, &(0x7f0000001500)=[{&(0x7f0000000100)="ee4d8e5c5789076c01de8d710073cbfdd5f7a78ea07f6dc209a66237b495e6da2b57b6580374f24343af975b", 0x2c, 0x6}, {&(0x7f0000000140)="5dfbc069c7bde649dec3f2971bc5523429bab1f784f575c121ea041dcfd3616998962de4", 0x24, 0x7ff}, {&(0x7f0000000180)="87a3a04973c7629407cfa21ef71d1c0b56cd12497e0913ab8292114e65162c32648e180e51b27fb9b61ddeaf439036472fba10fcce50f54ed0bffd900f4517af9f1844c46936c5af8c3f97316aebe20bb7f8330724da4244447775ad8f20dcc2531c58cb88d3d48a3f2e53d791a3d0199c", 0x71, 0x20}, {&(0x7f0000000200)="d5d6994860db373547ed9b9f075dbfc24d18924884cb71f18ef5eed4c56157fafb281129b33c0a4e199b2150fbcb81d5a81036fa18fada", 0x37}, {&(0x7f0000000240)="4aecacc14a01a07b6a1d00e5ce36301a9c8c21cb9a3e0a5ba1a122d968173c690979ae5a319b09269f2f26590c9b6f45c9d0452e120fcc2a71a4e7fccf3679b27ed1629582a09fcf15f7b4f704c3239100d0c378228072dc9e2b05a5bf54ab038e70b3c0db5726a7555fd24bef411dfc1a698e941ae9477af306d2cb0ccb2c46959ed05406b49d59423b4bf378b3ae9e328aee63bfab57e5dd85c1fc80806341c62fa0e1710d7bde542ad38fd2a40bde018fabe5c5b7a4e5f1d602c1876831dbf09ceb0eb48b0ee602c7df95058912da2da68ac4391cb0a7fe11182d646a05a667ab4974523bf5565cbefd29", 0xec, 0x5}, {&(0x7f0000000340)="0122cd8d1da8919b28704f6173041579a4c2067606f42429726f7c0e9e32973e4b4ffe42ae74c9f9f15daeb937", 0x2d, 0x100}, {&(0x7f0000000500)="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", 0x1000, 0xd9da}, {&(0x7f0000000380)="79c309f80df74e58dcf4d3963ebf6b9dce02d18835691f0ba2284672ecb9d7ffeb3419a9ed1951f70bef814b9a9f1a318067d4c76a05f32db6cee13fae5bf5745b0f6b9c411b6371a0ab675957dfa609ca200eb2fb64c4a87023", 0x5a, 0x38}], 0x10000, &(0x7f00000015c0)=ANY=[@ANYBLOB='usrquota,debug_want_extra_isize=0x0000000000000008,block_validity,measure,measure,uid=', @ANYRESDEC=0xee00, @ANYBLOB=',dont_hash,seclabel,appraise,subj_type=ext3\x00,fowner<', @ANYRESDEC, @ANYBLOB='\t\\']) socket$packet(0x11, 0x2, 0x300) 10:11:14 executing program 2: syz_mount_image$ext4(0x0, &(0x7f0000000440)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r0 = openat$dir(0xffffffffffffff9c, &(0x7f0000000300)='./file0\x00', 0x0, 0x0) r1 = openat$dir(0xffffffffffffff9c, &(0x7f0000000480)='./file0/file0\x00', 0xe0200, 0x2) renameat2(r0, &(0x7f0000000400)='./file1\x00', r1, &(0x7f00000004c0)='./file0\x00', 0x2) r2 = openat$vcsu(0xffffffffffffff9c, &(0x7f0000000000), 0x5200, 0x0) fchmodat(r2, &(0x7f0000000040)='./file0\x00', 0x1b0) r3 = openat$incfs(r2, &(0x7f00000002c0)='.log\x00', 0x581200, 0x123) syz_genetlink_get_family_id$fou(&(0x7f0000000300), r3) renameat2(r3, &(0x7f0000000380)='./file0\x00', 0xffffffffffffffff, &(0x7f00000003c0)='./file1\x00', 0x0) accept$packet(r3, &(0x7f0000000500)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000540)=0x14) unlinkat(0xffffffffffffff9c, &(0x7f0000000100)='./file0\x00', 0x200) r4 = openat$vcsu(0xffffffffffffff9c, &(0x7f0000000000), 0x5200, 0x0) fchmodat(r4, &(0x7f0000000040)='./file0\x00', 0x1b0) r5 = openat$incfs(r4, &(0x7f00000002c0)='.log\x00', 0x581200, 0x123) syz_genetlink_get_family_id$fou(&(0x7f0000000300), r5) renameat2(r5, &(0x7f0000000380)='./file0\x00', 0xffffffffffffffff, &(0x7f00000003c0)='./file1\x00', 0x0) execveat(r5, &(0x7f0000000000)='./file0\x00', &(0x7f0000000200)=[&(0x7f0000000040)='\x00', &(0x7f0000000080)='(-^$\\&\x00', &(0x7f00000000c0)='!)&%-[(\\+$\x00', &(0x7f0000000140)='\x00', &(0x7f0000000180)='\xcb\x00', &(0x7f00000001c0)='\x00'], &(0x7f00000003c0)=[&(0x7f0000000240)='&\x00', &(0x7f0000000280)='!\x00', &(0x7f00000002c0)='\x00', &(0x7f0000000340)='{{\x00', &(0x7f0000000380)='/\x00'], 0x800) 10:11:14 executing program 5: syz_mount_image$ext4(0x0, &(0x7f0000000440)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) openat$dir(0xffffffffffffff9c, &(0x7f0000000300)='./file0\x00', 0x0, 0x0) r0 = openat$vcsu(0xffffffffffffff9c, &(0x7f0000000000), 0x5200, 0x0) r1 = openat$dir(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x6041, 0x2) faccessat2(r1, &(0x7f0000000100)='./file0\x00', 0x80, 0x300) fchmodat(r0, &(0x7f0000000040)='./file0\x00', 0x1b0) openat$incfs(r0, &(0x7f00000002c0)='.log\x00', 0x581200, 0x123) accept4$packet(r0, &(0x7f0000000400)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000000440)=0x14, 0x100000) unlinkat(r0, &(0x7f0000000080)='./file0\x00', 0x200) [ 1895.168586][T26146] loop3: detected capacity change from 0 to 264192 10:11:14 executing program 5: syz_mount_image$ext4(0x0, &(0x7f0000000440)='./file0\x00', 0x9, 0x0, 0x0, 0x0, 0x0) r0 = openat$dir(0xffffffffffffff9c, &(0x7f0000000300)='./file0\x00', 0x0, 0x0) r1 = syz_mount_image$ext4(&(0x7f0000000000)='ext3\x00', &(0x7f0000000040)='\x00', 0x1000, 0x6, &(0x7f0000001500)=[{&(0x7f0000000140)="6b65cf6d492403eed06dc50b3b49aee3cff8ece4b5ce8cf7fee993caaef218a3d4623566af06c615029928561b5cc4b5cfe51ca8f107bae9656a0c28131b299ddef5d99f81af750aabd46f8cceba0f382218f9743c1651992b8a26ea8cedf606d89d535ea0a77a95d05378b43ad6c494bb1ed427c251d5b1e6d7ffbb426e6264cbcdd4a490215d797cf20bc6cd20", 0x8e}, {&(0x7f0000000200)="c56b014ffb4485925f0e4b280f32225f18ade6d8dd6cb5ad872aba9355dc0f968949d883a9ae6096caadbb49fd11cef62cf9392b1ef7a38936ec5e0ac945aaee9ed765c93e462ce8c60e5caaa7103fd64792213a2b429e0d3dfc67aeee2da1fdb3f6388f6e8535906de75ddbf9a80cd89b5392170f8d97df336a89f1a18b22c96f8c580a90c37fad34526c0f9b037e48be3237cde078b6304969145b91cf15832da92b726927e84a6997071b6033d00ede4597d41d826810ae8b4da03a4eb77e71e2ae699570551f70932574a7abaf56fa610507b80f7929a1861f16119d2c713ecd0f15d95d9b1925b4a64f46b5833af630", 0xf2, 0x2}, {&(0x7f0000000080)="0bd408cb060b7128244f06fbb83213c9f31a2431c51d255f71c5257ff32b2de2aecfe7ebf2bf112c65829de2f64c3b443e6a0564938b86a966be6e2823ce670570fe00862fee6b20cc8dbe1d8f226d1035709d7981f750e0d4be5f739f7c4d615569090da5e49668a4", 0x69, 0x6}, {&(0x7f0000000340)="6f9e4132c09d8cc1a379624ad6bb226149a930d4b0c12907b45d51c11412722c3835a1b4c42ea782a2733a8d88995131a5c7915c31a940ef2e333ee0f2dce5fe50ed3355d31b5a18690764056c34e1db8714fddff9bbaf42cdc6bab0213df9f03df6b26fa897dc8160b21b2fa0ac9fcd53621d608c617ee3f260ee9b82bd6b42445a824b784c333754d0a83d3079f7deda838b6ceea68bf5df9682ef6190264706eac9e16b88bbe633d024768787ed220215331da5023476f89d4f4c69801824e9876d3b4992678cc136d51696302200d9fa89d98b56dd5b5a4c956de3653dc9693cccd42ac00fc9", 0xe8, 0x81}, {&(0x7f0000000480)="1a1505a073bdbbe123b9a3f832dc5cad7d783b2f05fc444f7cb028ee7aa7bba302f31d425727d59a262210aa6c85cf1d92a642a3a7ee2341e07b49659d485f8a42ffe75eb2cd7fe76bb181ba705f5f8e4f6fa29c08f1d210695e807f001ae166ffdc60f6d0cf5051f876e93afca1c839630da5ecd15603d5e5d54848017063792e973d92710769d96b42dfae4ee0f13a62fe20dfd51fb01ac0416652b307d5569feb5261fb7add62c639cf257ae28fe6f6e4bf3dfc85d08cb4b30458723eb194a7241899e9f99d959d6594cca6f7804876bddfcdfbfd967b00555fc693219e43ff990b68bad1349bd61033b2b055d7a629413e5dc64c0d733d85137801cf489e7207d3df9ce93419a04338fcf7263698754bda23c5d22e8106a2adce26148b2c95696bfb413162c6ec5fa6742abfe626a86686a9c8008e94084f46df1172f6cd1d19d6310fc7bbb000fd0b6cd3ad7ed028bc81dfaf92a13d46de51fe08d2b5c9985c1486327195a5cca22ca10fe9897fa7319cfe829172c9b3424ca45d5deb726a37bd6716d90b6026a6e95aba2ea9991be35b6c39f4a9dc14f9cb78008085b9cbbf2fca1fc44ee358a0344237b157c289f5be6dbc14e3e5c7cba50406566aa3e3d5dd7aec3f53974765d54251627ba74617ccb0756b5a50b1cc06416b744be365d649404bdeeff7699bd81c31d565f9c64b11579bf12505441440acaa8f305a32952fe5e9bb2ca4f52de7a39e49d5336753735b9a821c043d16cbbfe91a294ccb92f0dd573bcbccd0530c2de74afe1299d0b2fd63cdf3989c03f5d6972b98e0af82f2dd87245bda2a7633ab1cdbdb329af1449740d8610330cae168af51fe98e52d5df49c6b74c5f6ead783da647f3342d48c1a8277c01255f591a648ca8c8b73c574f325582c99ecc4edb92a2c7a7e19addb6556391aecdc700c86a31ab8ec9902420e3ab8db158e96b33bd8600fd5286d5b37bbf2d5b742d91f345d1818569eeaeb8e3c0c65dc5bb006a1a6cf90cdb189c2aed1ef14386c8fadd7b3b5dcaa3f84a93eb8de45c593907b55225dafaee186b51f60fcf9b038cfed8b24072c05e518ad0dd17954eb3e143abb8f3a75263ff1d32c6bb948e057fa8559e250de7d5880ed5c543818ba6ad2e372b669629f09aa60ecdaeeb7cb213019a04e868efeaba4386ccf9868c9a8cfb6a62c6ed1c222eee0b829949799603def357a657a4d3a6dd0e08175f2014769c6d98fe6e973e4bf5023c7cbec7a68a4b9fd986590149cadd0cd4be43ead71fc69bc662ff135f2fa6e3df4b3ec35e832a3fe2b21fa9797f0deea2c11ea1aeae7dcdf3421eae0a81ae1f1a0dbf622f4df94bb0e8d29a7323df48ea85197a15a6e7a2f1de698bf883be86e20afd6181fa75563ff9141fb046ff1d887dc503bde56ea68055c4ff78d9af0e33262ba5abe5e097cd5a8167a6d1051d5e3afdf52506c12253d7bc9b5faa4866921b55e1bb7e3184011f9de59fc1c6bbf6cbe518f462d3dd7bc5ef72494253162c8af89ca8770134ee7024cc87653ebabcbcae62066f94c4b76b4805449bdfcd45ef59daddee87c60355cc8035852d4c97455388dc647e18d7e5098e1a1adc86b639e7a2f181328aff3b832b406d59da85f9397bdce75d1a04897782ae44eab339b3e7ddab067d200e7fe10a0b7e4d7f561508e16ab1bddc0da06539489db871fc38d141ae5cc508c3032bacf0e060f7e5c14a1ec0ccb636f1f8dc06b7cbe5776066863ed97eb15c3faa9720b84fd2e0ec74d48c3dc0c608090790f5aa8dfd44711a2c92cacebdd8e83bd48e8f9cfa82a9c0e7848f0719ae1dce57d3fe8c9480dc7b866222b70a16f3d55d2689fe633c3768691baccbd85be0fa2c68fe2beca3daf81f6be1ff304f08c980936a93e63e9400d741c5a03c536ab96b02e4f2c724ba7c57a1ef054857152a2ba656df6cbce4eb3e1dbc118a30c9aaa8308f42b7e3f83bc3690884ca0c3de5ccdf0628e0a1da47b58e401fb86df1855583b5f66c27797165eb8ede7152027d79523cf1dbb7bcb040826aa660dff6fb8c1328f979d008af9e9ee539a50582554548e0259bb0894b58f5c83aba5e0721aa69f8f5f29d749488f0991c5c9fcd5b0a25d194c8ca35b4415d5ea01a87bf2ebde6505f33a23c1b38230f5800b8ca18a11a64a87ca0158fbbdb31489ca11af6d9ef102dbc1490692316c28852da86f058caf7cdc58f15e5f5ac191a69fbe56d6155ba3885554724c9fb1622221844f519ecbfed397521affbcd514095c094cdc8f97d19a21954bfb67337a647f9bdec2111e3ea00156fb8717cb8b0279c2ec1b58b409f360ec83accf98bfd959b50678037f2460ebebfed44c7cbec5245d22d581621593f1d2cc2d45df55154a6ee1651ece8f4b118e427d36c5b23a328bd5a72cdee0cbf21a7068b1e70e27c7425c37bc198463601156c387b0353428cfa8be36f63ccac51fa60ee4a76fac5a9898a4ceac742c08886ae0055d7e636612934ddb86abc57f27e1d81fc63cbc028f7a028c9649dce89c7350ca2e4cd340e592f51f9a82d2a68d8f6d16a27f6515fb446a3cadf711591d5ea87f3e388cf44d353071096ed3535e5ac24df1ada6699a68c9e19958d2961ca1ba0f7cbdc3a2b1fd5fab47abd31aa8f5e32c68c0f197dfc795c489677ac5bda4c34358a415455b805b01fae787adc90e62a9423b2c72b718bf84f89b3db6d67315679b5544976958cd08e63eef9d9a6cf4926b70c2b5b1f52c0c2aa0797c31df4149a0e21a4bf50491936dfa0297b953bc9c261a37ab842d8f0c99d5ac9940cd514472ffb23462eddf40b14403a3e3ce8d5410fdd6f8062b76ae998546e86a9afff3e6a3f68b73eef1e02e1236a4a09ec999f24594838de92871aaa467404b2ceafeca2d4abc71483b351b2de7dd73965d3e1ec99c2b663ae78421f43edb3b421eca9a4d24458815eb09cc0d20e9a366eeb210030188cafdd78d8b55fb76aea3709737f255215b85472ee78c93f558d024ea05fcc84f443b0f06f6ce76d473a4b29641f28b03474c6586c66428c3cb4fd5306cddd2bdb5610d0b7dd740780c2969233ae8dbeac98d2d1b2780f191292313c6c9bd76c8e7baf69907b9d642b79a28c9a675cdcb028d85c3ddc5c10fc82c4774c40462b62ab816b0d20efc5892416a88272993fa98a08644168d36981ded9ce9034c59683adbf05f641130eea1b81a0a12d521331bdcadd8c42c7718b497e0df48fced646dd80cbf707924c5e61ed58e4b2d77205934150752769681b0b3ddd10df1f48c18a90455b97f8ef934361d0d7453f26cd42471dec0ecb95d814926c63946a8bdde2ce4977ef915a853836c4c31736a131c17d95e3950d5235887c236d4f4f4e49c5e12dd78c4752f68a89b5236d83caee2395aa988c8750363e1ba5415a6078648b289137dd8be462274ce1368f8d21ff3e6d2167a512a9fd2ce775ad0e1527653926fc673f9160d33e3338f848c5f27c646663d44dad47e379bc7918a980dac9397510e2a588a7eb38c709f19da4abd3685b9119759bbc667f4eaadc4539c4b1257247edf53440d0c3354383f47e4c2c107e3d79e53afca5a964a857bd48bd22947e9d8783da9a8f8f5e181c16248e269ff6c7aba7211de18a3bafca883d8fc4ee841afddfe10d74f02f850d1c0265779f7e9b59abd2372c7c28a2d0b4a4bf9974ad30a6406d423f8813c0d6930d21baccf0d12aab59db6461c1c5f91c5f7f7fd45898303a091204f43858c641eb0662cd8942e0b60a2e9c5c6e6b91cd304a3e9c9bd7c9dc7a4b04581ab54a23aeb8f9c33bc56209dc161ac1026de176a819c1dcb735e6c75c7d9424266ae4d2503aefb9ac1565306ef6ede57ce398b4ddba463d54d5d0cbaae4823e9310883169c55f9f81d1873521c56ce89bddd7ceb98001e449136e8d8d2c7efd1172596a03e65d83f724cfed0e56d311ffa1ef5b610cb7db7a0ea91749667658360f1fb48a08e5fae0ac69d3a4d72d5406aa6862319729b7faf3f88b6cba31f832be1253c7d709cd42c583c14972dc4ecebfb9c2a2860326a564dc7caabc42ae2cc9c032d7e66d545239836db1f89bbd860850956943ff4b88e7d8cce7a84d41bab688c08e5502c124ddbf99a2241d32d14937e59abc80f312d4dae9a59d61fe2d45a0c0e3fd8c75aa87e68572425fa6c47e59b4af7c9bc80cb3a4f364615e5185c5752817d9db4f62aadae4199206005793aa342099f0c0e783a1ac93657177aaa0512c8fbbdddbe7fd52581be1229de3e47ae8b9de507830c9bf132993eca9c9c25d54e0a8be6f15a0b881377a596662ce707e81691f84806e64615de185065ae7eaa55ded712e3f5e5c465f3cd022c15ea8a08f53325b1bc351f27b900ff46df8380d1e150f854914799447d33970a30f035c2888fc8c1520cab8021a36118242b4380ece9681541f5a17695065b746847718fffa7aebe1d9bd5e084187f9d5a22e85239fd3f613349f09dad93288e1854eb640433396dc12bd90a717144cc7de653a4b025c0f8e6c70bd10c2098aa10dfa55807d7229a640c843c7b1ca7377ab1156d65a399ca9375efedec8d310277ed1c49797ae33d792d4d3f61e963e591dd5953a83678a13c849abcb2fb1efd34c6d8166be5879b3a1c9cca320393d533e1819a1b3918c3da2c39b293454ff07bb48f57eb28575a4fc6814fecbae7fc15790d0a96122cba9e5aed3584bd6f1e9e3acc86f941ac5f4001a073ae16b733349900265def2c43c92f883b7e8789bc235c6e18d1ff94898b7a1f6b0c6c04af30c690742861cf3a0e51dc90ed52c35b3719e1544c6aa109ffd26937defa8abb666390121d5f55b885bad623525a58e943e04601c4d47deea0bcffbc41cc1653703d9068d4a10766c6fe3f7038355d30c71a117c05e28f1746ae92b69636036547140c23bfdd1d45329be8a4c536f507bc8407aaad5a5c284820446971c0a9dc6a04f6029aa68d301873c87081351678791037051cb767a5efea1ff393d2def25840d518ee333f3019a274c1f02c70dbbace2b7964d8bae4fd29637fc8795eab47cd360df59f1e8107fd081b704dbf6136b9bc16aaa320a5f5b923238d9b371a23b002c844d7ff2c3566835f85d8f4f67be3259e0b647338deba61217a482426e1f9ab79a4b7f1ef95138d9710a2d3309737afa60621a9d5215466bba93eb872dae16fbf2b5f4d97efc4385c05e0269fa5f06b8545421112eda4e2902351a1386cc4b12751bc280e3639007df0d8d74644a60019f89c635a72717e6014994e825b0b9bfd666df7d10ce72527bdf1ab6badb9a30ccb6d9c3ae1087c6cbd44d34f29a4d641a7ecbb907139bef1fc994fc1305568fb35d4144f5bf27d39e2c501945fccb4e72adcb04e6dfabb2b142c7defd1fd99dcf011cea43d9edeefdd9764ea8cd03c911dfda24d59ed174f0cf97bd6996417b088d8dd98af553d6904d333513f900d644d22445c2a8f76d61eab996be0fcc66eadcb733948d230b56219ad27d7fc7d40d724284d65176df567c9399fdb715096a1fc1140b617637a52f89ee9aaa44245b832db472f0e89eb79185d56aca6686800d8be8e998f38e773bd145b39a616c8757286da4175e06118ad0dc494dadd8227e546b48856a50deaf487070dd41a287ac7d771ab4f026cb3d7f5859c3c5fe8670776f7a4751f032147ac11ce3dcbc06c212621f5b82bcec7152d172f6fa59b1524db5b4c71f5ffbe13edbfffc1be3d9c3d3ada4d9a62b66e3ff5c9af7048b9cab9f3f6fcffb0", 0x1000, 0x7ff}, {&(0x7f0000001480)="ba0d5600402543a426d39e206e947ae9eb7a25ea6e9e56880fb5d6e6da9066b2561509f50c78c5bf9e1a4cac617695291cb4c8334649830aa8fd9df1acb515b5a1ecfb8cdcbc9320e1d3f568f60376e11891082677c89735", 0x58, 0x5}], 0x4001, &(0x7f00000015c0)={[{@usrquota}, {@orlov}, {@stripe={'stripe', 0x3d, 0x98d}}], [{@dont_measure}, {@pcr={'pcr', 0x3d, 0x3f}}, {@fsuuid={'fsuuid', 0x3d, {[0x65, 0x65, 0x5f, 0x64, 0x35, 0x61, 0x16379649ab0faa79, 0x31], 0x2d, [0x39, 0x63, 0x66, 0x32], 0x2d, [0x32, 0x30, 0x34, 0x66], 0x2d, [0x63, 0x37, 0x34, 0x38], 0x2d, [0x66, 0x30, 0x63, 0x64, 0x33, 0x33, 0x62, 0x38]}}}, {@dont_hash}, {@obj_type={'obj_type', 0x3d, ']\xc5.,}'}}]}) r2 = openat$incfs(r0, &(0x7f00000016c0)='.pending_reads\x00', 0x101001, 0x2) renameat2(r1, &(0x7f0000001680)='./file0\x00', r2, &(0x7f0000001700)='./file0\x00', 0x4) [ 1895.234272][T26146] EXT4-fs (loop3): VFS: Can't find ext4 filesystem [ 1895.304160][T26173] loop5: detected capacity change from 0 to 11 10:11:14 executing program 4: getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000000c0)={{{@in6=@private0, @in=@empty, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@initdev}, 0x0, @in=@dev}}, &(0x7f00000001c0)=0xe8) getsockname$packet(0xffffffffffffffff, &(0x7f0000000200)={0x11, 0x0, 0x0}, &(0x7f0000000240)=0x14) ioctl$sock_ipv6_tunnel_SIOCDELPRL(0xffffffffffffffff, 0x89f6, &(0x7f0000000300)={'syztnl2\x00', &(0x7f0000000280)={'syztnl1\x00', 0x0, 0x2f, 0x81, 0x1, 0x8, 0x8, @private1={0xfc, 0x1, '\x00', 0x7f}, @remote, 0x8, 0x0, 0xffffffff, 0x9}}) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000340)={{{@in6=@empty, @in=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@ipv4={""/10, ""/2, @empty}}, 0x0, @in=@loopback}}, &(0x7f0000000440)=0xe8) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000480)={{{@in=@multicast2, @in=@multicast1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@initdev}, 0x0, @in=@multicast2}}, &(0x7f0000000580)=0xe8) rseq(&(0x7f0000000c40)={0x0, 0x0, &(0x7f0000000c00)={0x0, 0x4, 0x8, 0xfff, 0x7}, 0x3}, 0x20, 0x0, 0x0) sendmsg$TEAM_CMD_NOOP(0xffffffffffffffff, &(0x7f0000000bc0)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x10}, 0xc, &(0x7f0000000b80)={&(0x7f00000005c0)={0x5c0, 0x0, 0x1, 0x70bd26, 0x25dfdbfb, {}, [{{0x8}, {0x58, 0x2, 0x0, 0x1, [{0x54, 0x1, @bpf_hash_func={{0x24}, {0x5}, {0x24, 0x4, [{0x5e, 0x2, 0x1, 0x5}, {0x4, 0x28, 0x93, 0x9}, {0x1, 0x20, 0x5, 0xfffffffe}, {0x7f, 0x1, 0x8, 0x3}]}}}]}}, {{0x8, 0x1, r0}, {0x224, 0x2, 0x0, 0x1, [{0x38, 0x1, @mcast_rejoin_count={{0x24}, {0x5}, {0x8, 0x4, 0x4}}}, {0x40, 0x1, @queue_id={{{0x24}, {0x5}, {0x8, 0x4, 0x2}}, {0x8, 0x6, r1}}}, {0x40, 0x1, @queue_id={{{0x24}, {0x5}, {0x8, 0x4, 0xfffffffe}}, {0x8, 0x6, r2}}}, {0x38, 0x1, @activeport={{0x24}, {0x5}, {0x8}}}, {0x40, 0x1, @lb_port_stats={{{0x24}, {0x5}, {0x8, 0x4, 0x7}}, {0x8}}}, {0x38, 0x1, @notify_peers_count={{0x24}, {0x5}, {0x8, 0x4, 0xdbd8}}}, {0x38, 0x1, @activeport={{0x24}, {0x5}, {0x8}}}, {0x3c, 0x1, @enabled={{{0x24}, {0x5}, {0x4}}, {0x8, 0x6, r3}}}, {0x44, 0x1, @name={{0x24}, {0x5}, {0x11, 0x4, 'activebackup\x00'}}}]}}, {{0x8}, {0x3c, 0x2, 0x0, 0x1, [{0x38, 0x1, @mcast_rejoin_interval={{0x24}, {0x5}, {0x8, 0x4, 0x7fffffff}}}]}}, {{0x8, 0x1, r4}, {0x1c0, 0x2, 0x0, 0x1, [{0x3c, 0x1, @enabled={{{0x24}, {0x5}, {0x4}}, {0x8}}}, {0x4c, 0x1, @lb_tx_method={{0x24}, {0x5}, {0x19, 0x4, 'hash_to_port_mapping\x00'}}}, {0x38, 0x1, @notify_peers_count={{0x24}, {0x5}, {0x8, 0x4, 0x694}}}, {0x38, 0x1, @activeport={{0x24}, {0x5}, {0x8}}}, {0x4c, 0x1, @lb_tx_method={{0x24}, {0x5}, {0x19, 0x4, 'hash_to_port_mapping\x00'}}}, {0x38, 0x1, @notify_peers_count={{0x24}, {0x5}, {0x8, 0x4, 0x2}}}, {0x40, 0x1, @lb_port_stats={{{0x24}, {0x5}, {0x8, 0x4, 0x400}}, {0x8}}}]}}, {{0x8}, {0x10c, 0x2, 0x0, 0x1, [{0x7c, 0x1, @bpf_hash_func={{0x24}, {0x5}, {0x4c, 0x4, [{0x7, 0x4, 0x80, 0x3}, {0x1000, 0xcd, 0x2, 0x200}, {0x8, 0x4, 0x8, 0x9}, {0x3f, 0xe0, 0xc1, 0x8007}, {0x80, 0x20, 0x0, 0x8000}, {0x5, 0x0, 0x9, 0x3}, {0x4, 0x33, 0x0, 0x3ce}, {0x1f, 0x1, 0x9, 0xfff}, {0x0, 0xb7, 0x2}]}}}, {0x38, 0x1, @notify_peers_count={{0x24}, {0x5}, {0x8, 0x4, 0x81}}}, {0x54, 0x1, @bpf_hash_func={{0x24}, {0x5}, {0x24, 0x4, [{0x6, 0xff, 0xf9}, {0x8000, 0xff, 0x13, 0x5}, {0x7, 0x5a, 0x6, 0x6}, {0x8, 0x1f, 0x0, 0x800}]}}}]}}]}, 0x5c0}, 0x1, 0x0, 0x0, 0x4000}, 0x20008000) prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000040)={0x2, &(0x7f0000000000)=[{0x25}, {}]}) 10:11:14 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext3\x00', &(0x7f0000000040)='./file0\x00', 0xfffffffffffffffb, 0x0, 0x0, 0x848440, &(0x7f0000000480)=ANY=[@ANYRES64]) 10:11:14 executing program 2: syz_mount_image$ext4(0x0, &(0x7f0000000440)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) openat$dir(0xffffffffffffff9c, &(0x7f0000000300)='./file0\x00', 0x0, 0x0) unlinkat(0xffffffffffffff9c, &(0x7f0000000100)='./file0\x00', 0x200) keyctl$unlink(0x9, 0x0, 0xfffffffffffffff8) [ 1895.396513][T26183] loop5: detected capacity change from 0 to 11 10:11:14 executing program 4: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000040)={0x2, &(0x7f0000000000)=[{0x25}, {}]}) prctl$PR_SET_SECCOMP(0x16, 0x0, &(0x7f0000000100)={0xa, &(0x7f0000000080)=[{0x2, 0x8b, 0x5, 0xff}, {0x1, 0xff, 0x4, 0x2}, {0x1c, 0x3, 0xff, 0x3}, {0x8000, 0x1, 0x4, 0x1}, {0x3, 0x2, 0x1, 0x9}, {0xe084, 0x69, 0x20, 0x7}, {0xfff, 0x3, 0x0, 0x9}, {0x94, 0x1, 0x89}, {0xd9, 0x3a, 0x3c, 0x2008000}, {0x9, 0x1f, 0x5, 0x3}]}) 10:11:14 executing program 3: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl802154(&(0x7f00000000c0), 0xffffffffffffffff) ioctl$sock_SIOCGIFINDEX_802154(0xffffffffffffffff, 0x8933, &(0x7f0000000100)={'wpan3\x00', 0x0}) sendmsg$NL802154_CMD_SET_LBT_MODE(r0, &(0x7f0000000200)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x20}, 0xc, &(0x7f00000001c0)={&(0x7f0000000140)={0x68, r1, 0x200, 0x70bd2d, 0x25dfdbff, {}, [@NL802154_ATTR_LBT_MODE={0x5}, @NL802154_ATTR_LBT_MODE={0x5}, @NL802154_ATTR_WPAN_DEV={0xc, 0x6, 0x200000002}, @NL802154_ATTR_LBT_MODE={0x5}, @NL802154_ATTR_LBT_MODE={0x5, 0x13, 0x1}, @NL802154_ATTR_LBT_MODE={0x5, 0x13, 0x1}, @NL802154_ATTR_IFINDEX={0x8, 0x3, r2}, @NL802154_ATTR_IFINDEX={0x8}, @NL802154_ATTR_LBT_MODE={0x5}, @NL802154_ATTR_LBT_MODE={0x5, 0x13, 0x1}]}, 0x68}, 0x1, 0x0, 0x0, 0x4000}, 0xc8c0) syz_mount_image$ext4(&(0x7f0000000000)='ext3\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000480)=ANY=[@ANYBLOB='lazytime,test_dummy_encryption,max_dir_size_kb=0x000000000200,grpjquota=,min_batch_time=0x00000000000003ff,rootcontext\a']) 10:11:14 executing program 5: syz_mount_image$ext4(0x0, &(0x7f0000000440)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) openat$dir(0xffffffffffffff9c, &(0x7f0000000300)='./file0\x00', 0x0, 0x0) unlinkat(0xffffffffffffff9c, &(0x7f0000000100)='./file0\x00', 0x200) r0 = syz_open_dev$sg(&(0x7f0000000000), 0xffff, 0x4000) ioctl$SG_SET_DEBUG(r0, 0x227e, &(0x7f0000000040)) 10:11:14 executing program 2: syz_mount_image$ext4(0x0, &(0x7f0000000440)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) openat$dir(0xffffffffffffff9c, &(0x7f0000000300)='./file0\x00', 0x0, 0x0) unlinkat(0xffffffffffffff9c, &(0x7f0000000100)='./file0\x00', 0x200) r0 = openat$vcsu(0xffffffffffffff9c, &(0x7f0000000340), 0x301, 0x0) ioctl$PTP_ENABLE_PPS(r0, 0x40043d04, 0x1) unlinkat(r0, &(0x7f0000000000)='./file0\x00', 0x0) 10:11:14 executing program 1: fork() sched_rr_get_interval(0x0, &(0x7f00000004c0)) clock_gettime(0x1, &(0x7f0000000680)) clock_settime(0x0, &(0x7f0000000000)={0x77359400}) arch_prctl$ARCH_SET_CPUID(0x1012, 0x0) 10:11:14 executing program 5: r0 = syz_mount_image$ext4(0x0, &(0x7f0000000440)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) getdents(r0, &(0x7f0000000000)=""/41, 0x29) openat$dir(0xffffffffffffff9c, &(0x7f0000000300)='./file2\x00', 0x20000, 0x113) unlinkat(0xffffffffffffff9c, &(0x7f0000000100)='./file0\x00', 0x200) 10:11:14 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext3\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x14, 0x0, 0x0, &(0x7f0000000480)=ANY=[@ANYBLOB='lazytime,test_dummy_encryption,max_dir_size_kb=0x00000G=00200,grpjquota=,min_batch_time=0x00000000000003ff,rootcontext\a']) r0 = openat$ptp0(0xffffffffffffff9c, &(0x7f0000000080), 0x4000, 0x0) ioctl$PTP_SYS_OFFSET_PRECISE(r0, 0xc0403d08, &(0x7f00000000c0)) 10:11:14 executing program 2: syz_mount_image$ext4(0x0, &(0x7f0000000440)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) openat$dir(0xffffffffffffff9c, &(0x7f0000000300)='./file0\x00', 0x0, 0x0) unlinkat(0xffffffffffffff9c, &(0x7f0000000100)='./file0\x00', 0x200) unlinkat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x200) syz_mount_image$ext4(&(0x7f0000000040)='ext2\x00', &(0x7f0000000080)='./file1\x00', 0x6ea, 0x2, &(0x7f0000000140)=[{&(0x7f00000000c0), 0x0, 0x7}, {&(0x7f0000000480)="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", 0x1000, 0x6}], 0x40, &(0x7f00000001c0)={[], [{@fsmagic={'fsmagic', 0x3d, 0x1}}, {@dont_appraise}, {@euid_gt}, {@fsname={'fsname', 0x3d, '{'}}, {@fsname={'fsname', 0x3d, 'ext2\x00'}}, {@permit_directio}, {@smackfsroot={'smackfsroot', 0x3d, '{%'}}]}) 10:11:14 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000040)={0x2, &(0x7f0000000000)=[{0x15}, {}]}) r0 = openat$vcsu(0xffffffffffffff9c, &(0x7f0000000000), 0x5200, 0x0) fchmodat(r0, &(0x7f0000000040)='./file0\x00', 0x1b0) r1 = openat$incfs(r0, &(0x7f00000002c0)='.log\x00', 0x581200, 0x123) prctl$PR_GET_TSC(0x19, &(0x7f0000000c00)) syz_genetlink_get_family_id$fou(&(0x7f0000000300), r1) renameat2(r1, &(0x7f0000000380)='./file0\x00', 0xffffffffffffffff, &(0x7f00000003c0)='./file1\x00', 0x0) r2 = syz_genetlink_get_family_id$team(&(0x7f00000000c0), 0xffffffffffffffff) getpeername$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000140)=0x14) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000180)={{{@in6=@mcast2, @in=@remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@private0}, 0x0, @in6=@empty}}, &(0x7f0000000600)=0xe8) getpeername$packet(r1, &(0x7f0000000cc0)={0x11, 0x0, 0x0}, &(0x7f0000000d00)=0x14) getsockname$packet(0xffffffffffffffff, &(0x7f00000002c0)={0x11, 0x0, 0x0}, &(0x7f0000000300)=0x14) r7 = accept$packet(0xffffffffffffffff, &(0x7f0000000340)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @multicast}, &(0x7f0000000380)=0x14) accept$packet(0xffffffffffffffff, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @multicast}, &(0x7f0000000400)=0x14) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000440)={{{@in6=@initdev, @in6=@private1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@initdev}, 0x0, @in6=@ipv4={""/10, ""/2, @multicast1}}}, &(0x7f0000000540)=0xe8) accept4$packet(0xffffffffffffffff, &(0x7f0000000580)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f00000005c0)=0x14, 0x80000) accept$packet(r7, &(0x7f0000000c40)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000c80)=0x14) getsockname$packet(r1, &(0x7f0000000a40)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000a80)=0x14) sendmsg$TEAM_CMD_OPTIONS_GET(r0, &(0x7f0000000b00)={&(0x7f0000000280), 0xc, &(0x7f0000000ac0)={&(0x7f0000001300)={0x6f0, 0x0, 0x400, 0x70bd27, 0x25dfdbfc, {}, [{{0x8}, {0x3c, 0x2, 0x0, 0x1, [{0x38, 0x1, @notify_peers_count={{0x24}, {0x5}, {0x8, 0x4, 0x5}}}]}}, {{0x8, 0x1, r9}, {0x134, 0x2, 0x0, 0x1, [{0x38, 0x1, @notify_peers_interval={{0x24}, {0x5}, {0x8, 0x4, 0x4}}}, {0x40, 0x1, @lb_tx_hash_to_port_mapping={{{0x24}, {0x5}, {0x8, 0x4, r5}}, {0x8}}}, {0x38, 0x1, @mcast_rejoin_interval={{0x24}, {0x5}, {0x8, 0x4, 0xfffffffd}}}, {0x40, 0x1, @lb_tx_hash_to_port_mapping={{{0x24}, {0x5}, {0x8}}, {0x8}}}, {0x40, 0x1, @lb_tx_hash_to_port_mapping={{{0x24}, {0x5}, {0x8}}, {0x8}}}]}}, {{0x8, 0x1, r3}, {0x254, 0x2, 0x0, 0x1, [{0xfffffffffffffef4, 0x1, @bpf_hash_func={{0x24}, {0x5}, {0x34, 0x4, [{0x3ff, 0x80, 0x7, 0x401}, {0x720, 0x2a, 0x3, 0x200}, {0x4, 0x97, 0x2}, {0x101, 0x8, 0x0, 0xc5}, {0x3, 0x2, 0x9, 0x5}, {0x8001, 0x8, 0x6e, 0x3}]}}}, {0x38, 0x1, @lb_stats_refresh_interval={{0x24}, {0x5}, {0x8, 0x4, 0x401}}}, {0x40, 0x1, @lb_hash_stats={{{0x24}, {0x5}, {0x8, 0x4, 0x2697af23}}, {0x8}}}, {0x38, 0x1, @activeport={{0x24}, {0x5}, {0x8}}}, {0x3c, 0x1, @bpf_hash_func={{0x24}, {0x5}, {0xc, 0x4, [{0x0, 0x8, 0x9, 0x4}]}}}, {0x44, 0x1, @name={{0x24}, {0x5}, {0x11, 0x4, 'activebackup\x00'}}}, {0x40, 0x1, @lb_hash_stats={{{0x24}, {0x5}, {0x8, 0x4, 0x1}}, {0x8}}}, {0x3c, 0x1, @user_linkup={{{0x24}, {0x5}, {0x4}}, {0x8, 0x6, r10}}}, {0x40, 0x1, @lb_tx_hash_to_port_mapping={{{0x24}, {0x5}, {0x8}}, {0x8}}}]}}, {{0x8}, {0x12c, 0x2, 0x0, 0x1, [{0x38, 0x1, @mcast_rejoin_count={{0x24}, {0x5}, {0x8, 0x4, 0x1}}}, {0x3c, 0x1, @user_linkup={{{0x24}, {0x5}, {0x4}}, {0x8, 0x6, r8}}}, {0x3c, 0x1, @lb_tx_method={{0x24}, {0x5}, {0x9, 0x4, 'hash\x00'}}}, {0x40, 0x1, @queue_id={{{0x24}, {0x5}, {0x8, 0x4, 0x200030}}, {0x8, 0x6, r11}}}, {0x38, 0x1, @notify_peers_count={{0x24}, {0x5}, {0x8}}}]}}, {{0x8, 0x1, r12}, {0x3c, 0x2, 0x0, 0x1, [{0x38, 0x1, @lb_stats_refresh_interval={{0x24}, {0x5}, {0x8, 0x4, 0x4}}}]}}, {{0x8}, {0x44, 0x2, 0x0, 0x1, [{0x40, 0x1, @lb_port_stats={{{0x24}, {0x5}, {0x8, 0x4, 0x8564}}, {0x8}}}]}}, {{0x8, 0x1, r10}, {0xac, 0x2, 0x0, 0x1, [{0x38, 0x1, @mcast_rejoin_interval={{0x24}, {0x5}, {0x8, 0x4, 0x8}}}, {0x38, 0x1, @notify_peers_interval={{0x24}, {0x5}, {0x8, 0x4, 0x7ff}}}, {0x38, 0x1, @mcast_rejoin_interval={{0x24}, {0x5}, {0x8}}}]}}, {{0x8, 0x1, r6}, {0x80, 0x2, 0x0, 0x1, [{0x40, 0x1, @lb_hash_stats={{{0x24}, {0x5}, {0x8}}, {0x8}}}, {0x3c, 0x1, @user_linkup={{{0x24}, {0x5}, {0x4}}, {0x8, 0x6, r13}}}]}}]}, 0x6f0}, 0x1, 0x0, 0x0, 0x44000}, 0x48001) sendmsg$TEAM_CMD_PORT_LIST_GET(r1, &(0x7f0000000bc0)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x200}, 0xc, &(0x7f0000000b80)={&(0x7f0000000d40)=ANY=[@ANYBLOB="74050000", @ANYRES16=r2, @ANYBLOB="020027bd7000fbdbdf250300000008000100", @ANYRES32=r3, @ANYBLOB="6801028040000100240001006c625f706f72745f737461747300000000000000000000000000000000000000050003000b000000080004000900000008000600", @ANYRES32=0x0, @ANYBLOB="3c00010024000100757365725f6c696e6b757000000000000000000000000000000000000000000005000300060000000400040008000600", @ANYRES32=0x0, @ANYBLOB="38000100240001006d636173745f72656a6f696e5f636f756e7400000000000000000000000000000500030003000000080004002000000040000100240001006c625f686173685f737461747300000000000000000000000000000000000000050003000b0000000800040081000000080007000000000038000100240001006e6f746966795f70656572735f636f756e740000000000000000000000000000050003000300000008000400070000003800010024000100616374697665706f727400000000000000000000000000000000000000000000050003000300000008000400", @ANYRES32=r4, @ANYBLOB="0800010011cff2eee651186b3ce2ba696395f8c3c039616317fcc789fd2dfffffffe9fbc9400", @ANYRES32=r6, @ANYBLOB="f400028040000100240001006c625f686173685f737461747300000000000000000000000000000000000000050003000b000000080004000100000008000700000000003c000100240001006c625f74785f6d6574686f64000000000000000000000000000000000000000005000300050000000900040068617368000000003c00010024000100757365725f6c696e6b757000000000000000000000000000000000000000000005000300060000000400040008000600", @ANYRES32=r8, @ANYBLOB="3800010024000100616374697665706f727400000000000000000000000000000000000000000000050003000300000008000400", @ANYRES32=0x0, @ANYBLOB="08000100", @ANYRES32=0x0, @ANYBLOB="f40002803c00010024000100757365725f6c696e6b75705f656e61626c65640000000000000000000000000005000300060000000400040008000600", @ANYRES32=r9, @ANYBLOB="3c00010024000100757365725f6c696e6b75705f656e61626c65640000000000000000000000000005000300060000000400040008000600", @ANYRES32=0x0, @ANYBLOB="38000100240001006e6f746966795f70656572735f696e74657276616c00000000000000000000000500030003000000080004000000000040000100240001006c625f686173685f737461747300000000000000000000000000000000000000050003000b0000000800040001040000080007000000000008000100", @ANYRES32=0x0, @ANYBLOB="f001028040000100240001006c625f706f72745f737461747300000000000000000000000000000000000000050003000b000000080004000600000008000600", @ANYRES32=r10, @ANYBLOB="38000100240001006d636173745f72656a6f696e5f636f756e74000000000000000000000000000005000300030000000800040087ffffff40000100240001007072696f72697479000000000000000000000000000000000000000000000000050003000e000000080004009100000008000600", @ANYRES32=r12, @ANYBLOB="40000100240001007072696f72697479000000000000000000000000000000000000000000000000050003000e00000008000400ff00000008000600", @ANYRES32=0x0, @ANYBLOB="3800010024000100616374697665706f727400000000000000000000000000000000000000000000050003000300000008000400", @ANYRES32=0x0, @ANYBLOB="38000100240001006c625f73746174735f726566726573685f696e74657276616c000000000000000500030003000000080004008300000040000100240001006d6f64650000000000000000000000000000000000000000000000000000000005000300050000000e00040062726f61646361737400000044000100240001006270665f686173685f66756e6300000000000000000000000000000000000000050003000b00000014000400f30040090600000009000056b7770000"], 0x574}, 0x1, 0x0, 0x0, 0x24004000}, 0x8000) 10:11:14 executing program 4: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000040)={0x2, &(0x7f0000000000)=[{0x25}, {}]}) unshare(0x0) prctl$PR_GET_TSC(0x19, &(0x7f0000000080)) 10:11:15 executing program 5: keyctl$link(0x8, 0x0, 0xfffffffffffffff9) r0 = syz_mount_image$ext4(0x0, &(0x7f0000000440)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) openat$dir(0xffffffffffffff9c, &(0x7f0000000300)='./file0\x00', 0x0, 0x0) execveat(r0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000140)=[&(0x7f0000000040)='*\x00', &(0x7f0000000080)='\x00', &(0x7f00000000c0)=':\x00'], &(0x7f0000000340)=[&(0x7f0000000180)='\\*]\\\x00', &(0x7f00000001c0)=':^-]\x00', &(0x7f0000000200)='}@/\'^\x00', &(0x7f0000000240)='/\x00', &(0x7f0000000280)='\x00', &(0x7f00000002c0)='\xc1!{+$M*%{\x00'], 0x800) unlinkat(0xffffffffffffff9c, &(0x7f0000000100)='./file0\x00', 0x200) 10:11:15 executing program 3: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext3\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000480)=ANY=[@ANYBLOB='lazytime,test_dummy_encryption,max_dir_size_kb=0x000000000200,grpjquota=,min_batch_time=0x00000000000003ff,rootcontext\a']) getsockname$packet(0xffffffffffffffff, &(0x7f00000001c0), &(0x7f0000000200)=0x14) r1 = openat$vcsu(0xffffffffffffff9c, &(0x7f0000000000), 0x5200, 0x0) fchmodat(r1, &(0x7f0000000040)='./file0\x00', 0x1b0) r2 = openat$incfs(r1, &(0x7f00000002c0)='.log\x00', 0x581200, 0x123) syz_genetlink_get_family_id$fou(&(0x7f0000000300), r2) renameat2(r2, &(0x7f0000000380)='./file0\x00', 0xffffffffffffffff, &(0x7f00000003c0)='./file1\x00', 0x0) getdents64(r2, &(0x7f00000000c0)=""/242, 0xf2) fchmodat(r0, &(0x7f0000000080)='./file0\x00', 0x148) [ 1895.989096][T26249] loop2: detected capacity change from 0 to 8 [ 1896.025597][T26249] EXT4-fs (loop2): VFS: Can't find ext4 filesystem 10:11:15 executing program 4: r0 = openat$vcsu(0xffffffffffffff9c, &(0x7f0000000340), 0x301, 0x0) openat$vcsu(0xffffffffffffff9c, &(0x7f0000000180), 0xe2000, 0x0) r1 = openat$ptp0(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) ioctl$PTP_EXTTS_REQUEST(r1, 0x40103d02, &(0x7f00000000c0)) openat$ptp0(0xffffffffffffff9c, &(0x7f0000000100), 0x80800, 0x0) r2 = openat$incfs(0xffffffffffffffff, &(0x7f0000000140)='.pending_reads\x00', 0x2040, 0x20) ioctl$PTP_ENABLE_PPS(r2, 0x40043d04, 0x0) syz_genetlink_get_family_id$tipc(&(0x7f0000000080), r0) prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000040)={0x2, &(0x7f0000000000)=[{0x25}, {}]}) 10:11:15 executing program 0: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NBD_CMD_CONNECT(r0, &(0x7f00000013c0)={&(0x7f00000012c0), 0xc, &(0x7f0000001380)={0x0}}, 0xc6c3dbe86af1a089) syz_genetlink_get_family_id$nbd(&(0x7f0000000080), r0) prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000040)={0x20000000000001b2, &(0x7f0000000000)=[{0x15}, {0x0, 0x7}]}) [ 1896.095670][T26287] loop2: detected capacity change from 0 to 8 [ 1896.127173][T26287] EXT4-fs (loop2): VFS: Can't find ext4 filesystem 10:11:15 executing program 5: syz_mount_image$ext4(0x0, &(0x7f0000000440)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) openat$dir(0xffffffffffffff9c, &(0x7f0000000300)='./file0\x00', 0x0, 0x0) unlinkat(0xffffffffffffff9c, &(0x7f0000000100)='./file0\x00', 0x0) 10:11:15 executing program 2: syz_mount_image$ext4(0x0, &(0x7f0000000000)='./file0\x00', 0xfffffffffffffffc, 0x0, 0x0, 0x800000, 0x0) r0 = openat$dir(0xffffffffffffff9c, &(0x7f0000000040)='./file0/file0\x00', 0x101000, 0xa) execveat(r0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000140)=[&(0x7f00000000c0)='(),]}\x00'], &(0x7f0000000240)=[&(0x7f0000000180)='-.@#\x00', &(0x7f00000001c0)='$:$\x1f},\x00', &(0x7f0000000200)='&-\x00'], 0x1000) openat$dir(0xffffffffffffff9c, &(0x7f0000000300)='./file0\x00', 0x0, 0x0) unlinkat(0xffffffffffffff9c, &(0x7f0000000100)='./file0\x00', 0x200) 10:11:15 executing program 1: rseq(&(0x7f0000000000), 0x20, 0x1, 0x0) 10:11:15 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext3\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000480)=ANY=[@ANYBLOB='lazytime,test_dummy_encryption,max_dir_size_kb=0x000000000200,grpjquota=,min_batch_time=0x00000000000003ff,rootcontext\a']) 10:11:15 executing program 5: syz_mount_image$ext4(0x0, &(0x7f0000000440)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) openat$dir(0xffffffffffffff9c, &(0x7f0000000300)='./file0\x00', 0x0, 0x0) prctl$PR_GET_IO_FLUSHER(0x3a) unlinkat(0xffffffffffffff9c, &(0x7f0000000100)='./file0\x00', 0x200) 10:11:15 executing program 4: prctl$PR_GET_SECCOMP(0x15) prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000040)={0x2, &(0x7f0000000000)=[{0x25}, {}]}) prctl$PR_SET_SECCOMP(0x16, 0x1, &(0x7f00000000c0)={0x2, &(0x7f0000000080)=[{0x4, 0x2, 0x3}, {0x7ff, 0xa9, 0x1, 0x1}]}) 10:11:15 executing program 0: sendmsg$NL802154_CMD_DEL_SEC_DEVKEY(0xffffffffffffffff, &(0x7f0000000180)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f0000000140)={&(0x7f00000000c0)={0x68, 0x0, 0x100, 0x70bd26, 0x25dfdbfc, {}, [@NL802154_ATTR_SEC_DEVKEY={0x10, 0x24, 0x0, 0x1, [@NL802154_DEVKEY_ATTR_EXTENDED_ADDR={0xc, 0x2, {0xaaaaaaaaaaaa0102}}]}, @NL802154_ATTR_SEC_DEVKEY={0x44, 0x24, 0x0, 0x1, [@NL802154_DEVKEY_ATTR_EXTENDED_ADDR={0xc}, @NL802154_DEVKEY_ATTR_FRAME_COUNTER={0x8, 0x1, 0x1f}, @NL802154_DEVKEY_ATTR_EXTENDED_ADDR={0xc}, @NL802154_DEVKEY_ATTR_ID={0x20, 0x3, 0x0, 0x1, [@NL802154_KEY_ID_ATTR_MODE={0x8, 0x1, 0x2}, @NL802154_KEY_ID_ATTR_SOURCE_SHORT={0x8, 0x4, 0x40}, @NL802154_KEY_ID_ATTR_SOURCE_EXTENDED={0xc, 0x5, 0x10001}]}]}]}, 0x68}, 0x1, 0x0, 0x0, 0x4a051}, 0x4001) prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000040)={0x2, &(0x7f0000000000)=[{0x15}, {}]}) 10:11:15 executing program 2: sendmsg$NL802154_CMD_DEL_SEC_DEV(0xffffffffffffffff, &(0x7f00000005c0)={&(0x7f0000000500)={0x10, 0x0, 0x0, 0x800000}, 0xc, &(0x7f0000000580)={&(0x7f0000000540)={0x1c, 0x0, 0x4, 0x70bd29, 0x25dfdbfb, {}, [@NL802154_ATTR_IFINDEX={0x8}]}, 0x1c}, 0x1, 0x0, 0x0, 0x4}, 0x40080) syz_mount_image$ext4(0x0, &(0x7f0000000000)='./file0\x00', 0x1, 0x0, 0x0, 0x12000, 0x0) r0 = openat$dir(0xffffffffffffff9c, &(0x7f0000000300)='./file0\x00', 0x1, 0x0) unlinkat(0xffffffffffffff9c, &(0x7f0000000100)='./file0\x00', 0x200) fchmodat(r0, &(0x7f0000000040)='./file0\x00', 0x40) r1 = openat$vcsu(0xffffffffffffff9c, &(0x7f00000002c0), 0x250080, 0x0) r2 = openat$dir(0xffffffffffffff9c, &(0x7f0000000440)='./file0\x00', 0x200c00, 0x44) ioctl$FS_IOC_GET_ENCRYPTION_KEY_STATUS(r2, 0xc080661a, &(0x7f0000000480)={@desc={0x1, 0x0, @desc2}}) getdents(r1, &(0x7f0000000340)=""/251, 0xfb) execveat(r0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000140)=[&(0x7f00000000c0)='\'-,\\[\\\x00'], &(0x7f0000000280)=[&(0x7f0000000180)='\x00', &(0x7f00000001c0)='\x00', &(0x7f0000000200)='&*\x00', &(0x7f0000000240)='\x00'], 0x400) 10:11:15 executing program 1: clock_settime(0x5, &(0x7f0000000000)={0x77359400}) r0 = openat$vcsu(0xffffffffffffff9c, &(0x7f0000000340), 0x301, 0x0) clock_gettime(0x0, &(0x7f00000001c0)={0x0, 0x0}) pselect6(0x40, &(0x7f0000000100)={0x7e30, 0x9f3, 0x8, 0x81, 0x100000000000000, 0x3, 0x8, 0x2}, &(0x7f0000000140)={0x7, 0x800, 0xff, 0x8, 0x6, 0x200, 0x2, 0xae}, &(0x7f0000000180)={0x10001, 0x2491, 0x8, 0x5, 0x4, 0x5, 0x6, 0x3}, &(0x7f0000000200)={r1, r2+60000000}, &(0x7f0000000280)={&(0x7f0000000240)={[0x2]}, 0x8}) ioctl$PTP_ENABLE_PPS(r0, 0x40043d04, 0x1) ioctl$sock_ipv6_tunnel_SIOCDELPRL(r0, 0x89f6, &(0x7f00000000c0)={'syztnl0\x00', &(0x7f0000000040)={'ip6gre0\x00', 0x0, 0x29, 0x20, 0xef, 0x3ff, 0x48, @private2, @ipv4={'\x00', '\xff\xff', @loopback}, 0x700, 0x700, 0x4, 0x9}}) 10:11:15 executing program 5: syz_mount_image$ext4(0x0, &(0x7f0000000440)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) openat$dir(0xffffffffffffff9c, &(0x7f0000000300)='./file0\x00', 0x4e181, 0x0) unlinkat(0xffffffffffffff9c, &(0x7f0000000100)='./file0\x00', 0x200) [ 1896.325137][ T22] audit: type=1326 audit(1633169475.349:648): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=26336 comm="syz-executor.4" exe="/root/syz-executor.4" sig=9 arch=c000003e syscall=231 compat=0 ip=0x7f9dee22a8d9 code=0x0 10:11:15 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext3\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x102c00, &(0x7f0000000480)=ANY=[@ANYBLOB='lazytime,test_dummy_encryption,max_dir_size_kb=0x000000000200,grpjquota=,min_batch_time=0x00000000000003ff,rootcontext\a']) 10:11:15 executing program 2: syz_mount_image$ext4(0x0, &(0x7f0000000440)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) openat$dir(0xffffffffffffff9c, &(0x7f0000000300)='./file0\x00', 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext2\x00', &(0x7f0000000040)='./file0\x00', 0x3, 0x3, &(0x7f00000001c0)=[{&(0x7f0000000080)="fe0c46db8a6391885b76b3547f1d61a5b01548cfca7a14c9bea260af2ae8cc6b8299ccacf70eca840ef568bc94e05e550ed904fabd009eef3aec0d9fada13ba3f2", 0x41, 0x5}, {&(0x7f0000000140)="3a0b724274b8ccb68ecc9121ebdfb9af7c300a562f8c7564f13b5e738c1d20d3df38f33944a25bf10cee403476f5ec9205", 0x31}, {&(0x7f0000000180)="d621c9a2d75ebc2b", 0x8, 0x6}], 0xa04008, &(0x7f0000000340)={[{@max_dir_size_kb={'max_dir_size_kb', 0x3d, 0x1}}, {@data_err_abort}, {@bh}, {@dax}, {@data_journal}, {@mblk_io_submit}, {@journal_path={'journal_path', 0x3d, './file0'}}], [{@dont_appraise}, {@hash}, {@fsmagic={'fsmagic', 0x3d, 0x7}}, {@obj_type={'obj_type', 0x3d, '3$!}:.\']-+%'}}, {@fsmagic={'fsmagic', 0x3d, 0x5}}, {@rootcontext={'rootcontext', 0x3d, 'system_u'}}]}) unlinkat(0xffffffffffffff9c, &(0x7f0000000100)='./file0\x00', 0x200) 10:11:15 executing program 1: clock_settime(0x6, &(0x7f0000000040)={0x77359400}) 10:11:15 executing program 5: syz_mount_image$ext4(0x0, &(0x7f0000000440)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) openat$dir(0xffffffffffffff9c, &(0x7f0000000300)='./file0\x00', 0x0, 0x0) r0 = syz_mount_image$ext4(&(0x7f0000000080)='ext2\x00', &(0x7f00000000c0)='./file0/file0\x00', 0x4, 0x1, &(0x7f0000000240)=[{&(0x7f0000000140)="41003e163985aac264b0ee33ce62372a7ac296a3f6fe04e3c0428475a4b15b28716c917ffbc290dda9cc3da9896ff7ea04faa0215d4c97e53208689638fe65a25c557a8df06f48cc661e2b71ecd6f226189cc87a90bd3a86d00d0cb92ae7bd83828cf1ef57dbc167009f20da6ebadfb5bf0d8e7dc27bb8f83ace01105c99492f99ac6bd1b6cafdf9e34f0fb922967d738db18e3bf0b768f35fa849cf83e773200d29d213715ba654b4a389fa03867c18402f56e44a8a29a4510b0697c201f46737b5c15d26368af13e20139d1e5a8285573e6bf1b1", 0xd5, 0x5}], 0x10000, &(0x7f0000000280)={[{@acl}, {@nouid32}], [{@euid_eq={'euid', 0x3d, 0xee00}}]}) faccessat(r0, &(0x7f00000002c0)='./file0\x00', 0x42) r1 = openat$dir(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x408000, 0x4) faccessat2(r1, &(0x7f0000000040)='./file0\x00', 0x127, 0x100) unlinkat(0xffffffffffffff9c, &(0x7f0000000100)='./file0\x00', 0x200) 10:11:15 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000080)={0x2, &(0x7f0000000000)=[{0x15, 0x4}, {0x0, 0x0, 0x3}]}) [ 1896.474299][T26360] EXT4-fs (loop2): VFS: Can't find ext4 filesystem 10:11:15 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext3\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x4008c, &(0x7f0000000080)=ANY=[@ANYBLOB="6c617a7974696d652c746573745f64756d6d795f656e6372797074696f6e2c6d61785f6469725f73697a655f6b623d30783030303030303030303230302c6772706a71756f74613d2c6d696e5f62617463685f74696d653d3078303230303030303030303030303366662c726f6f74636f6e746578740769478ee5b98c4cc093d7edb4f1e5e91f2ae0183f1fdc91dc7a92c01988dc376104f3879e986db07231a2457e544eeebc860087e3bc8b35744b66cf58a7909d18176d2c853c4d0b38429733fcf5bccc7a31f0e49bc88061ded9c7fc9f975263b03b8a76e379276d42b4189c3e0c"]) r0 = openat$vcsu(0xffffffffffffff9c, &(0x7f0000000000), 0x5200, 0x0) fchmodat(r0, &(0x7f0000000040)='./file0\x00', 0x1b0) openat$incfs(r0, &(0x7f00000002c0)='.log\x00', 0x581200, 0x123) accept4$packet(r0, &(0x7f0000000400)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000000440)=0x14, 0x100000) getdents64(r0, &(0x7f0000000180)=""/251, 0xfb) 10:11:15 executing program 1: clock_settime(0x0, &(0x7f0000000000)={0x77359400}) r0 = gettid() sched_rr_get_interval(r0, &(0x7f0000000040)) [ 1896.539606][T26369] EXT4-fs (loop5): VFS: Can't find ext4 filesystem [ 1896.570817][T26380] EXT4-fs (loop2): VFS: Can't find ext4 filesystem [ 1896.648304][T26391] EXT4-fs (loop5): VFS: Can't find ext4 filesystem 10:11:16 executing program 4: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000040)={0x2, &(0x7f0000000000)=[{0x25}, {}]}) prctl$PR_SET_SECCOMP(0x16, 0x1, &(0x7f00000000c0)={0x8, &(0x7f0000000080)=[{0x1, 0x6, 0x7, 0x3}, {0x7, 0x2, 0x80, 0x3}, {0x4, 0x0, 0x3, 0x4}, {0x2, 0xff, 0x62, 0x100}, {0x4, 0x7a, 0xff, 0x4}, {0xea1, 0x0, 0xfb, 0x8}, {0x7c00, 0x84, 0x48}, {0x5, 0x2, 0x0, 0x2000000}]}) 10:11:16 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000040)={0x2, &(0x7f0000000000)=[{0x15}, {}]}) socketpair(0x29, 0x800, 0x10001, &(0x7f0000000080)={0xffffffffffffffff}) sendmsg$TIPC_CMD_SET_LINK_PRI(r0, &(0x7f00000001c0)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x8000000}, 0xc, &(0x7f0000000180)={&(0x7f0000000100)={0x68, 0x0, 0x8, 0x70bd27, 0x25dfdbfe, {{}, {}, {0x4c, 0x18, {0x4, @link='syz1\x00'}}}, [""]}, 0x68}, 0x1, 0x0, 0x0, 0x4000000}, 0x40) 10:11:16 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext3\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000480)=ANY=[@ANYBLOB='lazytime,test_dummy_encryption,max_dir_size_kb=0x000000000200,grpjquota=,min_batch_time=0x00000000000003ff,rootcontext\a']) prctl$PR_GET_FPEXC(0xb, &(0x7f0000000080)) r0 = openat$vcsu(0xffffffffffffff9c, &(0x7f0000000000), 0x5200, 0x0) fchmodat(r0, &(0x7f0000000040)='./file0\x00', 0x1b0) r1 = openat$incfs(r0, &(0x7f00000002c0)='.log\x00', 0x581200, 0x123) syz_genetlink_get_family_id$fou(&(0x7f0000000300), r1) renameat2(r1, &(0x7f0000000380)='./file0\x00', 0xffffffffffffffff, &(0x7f00000003c0)='./file1\x00', 0x0) futimesat(r1, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)={{0x77359400}}) 10:11:16 executing program 1: clock_settime(0x0, &(0x7f0000000040)={0x77359400}) prctl$PR_CAPBSET_READ(0x17, 0x20) [ 1897.124497][ T22] audit: type=1326 audit(1633169476.156:649): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=26336 comm="syz-executor.4" exe="/root/syz-executor.4" sig=9 arch=c000003e syscall=231 compat=0 ip=0x7f9dee22a8d9 code=0x0 10:11:16 executing program 2: syz_mount_image$ext4(0x0, &(0x7f0000000440)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) openat$dir(0xffffffffffffff9c, &(0x7f0000000300)='./file0\x00', 0x0, 0x0) unlinkat(0xffffffffffffff9c, &(0x7f0000000100)='./file0\x00', 0x200) openat$dir(0xffffffffffffff9c, &(0x7f0000000580)='./file0\x00', 0x80, 0x8) r0 = socket(0x7, 0x2, 0x3) r1 = openat$vcsu(0xffffffffffffff9c, &(0x7f0000000340), 0x301, 0x0) ioctl$PTP_ENABLE_PPS(r1, 0x40043d04, 0x1) sendmsg$TIPC_CMD_SHOW_STATS(r1, &(0x7f0000000680)={&(0x7f00000005c0)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f0000000640)={&(0x7f0000000600)={0x1c, 0x0, 0x400, 0x70bd2a, 0x25dfdbfe, {}, ["", ""]}, 0x1c}, 0x1, 0x0, 0x0, 0x4000001}, 0x4040050) getsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f0000000480)={{{@in=@initdev, @in6=@empty, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@remote}, 0x0, @in6=@local}}, &(0x7f0000000400)=0xfe48) syz_mount_image$ext4(&(0x7f0000000000)='ext2\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x4, &(0x7f0000000280)=[{&(0x7f0000000080)="982018e6e9e6eeec370e1e3b96819dbffdfdc364c0aa0e19acf19fc9519f1d9e86012732dacfdbdefd019ed41b0afb50316071b8faacb7de1f0cb2f9556e016883443a04208098352a284d5bdbe59030b206e18808b695742ee702dd692b7600702f67d4f2a86b1515d2c1bfaf93e64c63f74bcfbc5c3281d4d3c9", 0x7b, 0x6}, {&(0x7f0000000140)="0ddd4ff479da8bf0ba7418a9c7", 0xd, 0x8}, {&(0x7f0000000180)="eda34511038d03f7bf5dd3bdc7d53b2f5c3e5c3e2e75da47aa934ac5186166284d7c959468a38e6ed9decdec8f81c34c4b1d14e8395430c6e87bc256fb4af0794be394ade36b9f4f3e7f29f026e5504c28139c6634fc6c4414681bc7b9c38601073ba96bdf70e36573fd0b9539b06a68117db46e570b9f45c9113c6c76f4fbf504d88b13f7f788a7b0dfe1c3ce8e35181ea41123a623add83df022fdfc0845b00fb9e796584a24800e542cc9ff33073321976faeebae33966c0dae5fce9d96a9db", 0xc1, 0x1bee}, {&(0x7f0000000340)="d05c9cd27538d4dd11eaaad4ae10cc1c27769f76b6617ed166a21d05a1bf505db54c6dac971f8e73816b088619f0360a7828c7802e854dcd647340ce3794d23b54db3ab13e1eae9c41900268e8fbbc4649e5f50e0f94329582d1d0cb5498d37e3b0e4ef92de3775dd7e9a09744fba86fc4ed3deede397f01d2414e2a1fe88ef4568d", 0x82, 0x4}], 0x118008, &(0x7f00000008c0)=ANY=[@ANYBLOB="646174613d77726974656261636b2c6d696e5f62617463685f74696d65052dc745b88384963d307830034e5891683ecb4a303030301ca682ad3032302c66756e633d4b455845435f4b45524e454c5f434845434b2c736d61636b66737472616e736d7574653d265e2c646f6e745f686173682c61707072616973655f740600653d696d617369673fec5b4094a33ce79006aaeb212a74a6638ac8733511", @ANYRESDEC=r2, @ANYBLOB=',seclabel,fowner=', @ANYRESDEC=0xee01, @ANYBLOB="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"]) 10:11:16 executing program 5: syz_mount_image$ext4(0x0, &(0x7f0000000440)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r0 = openat$dir(0xffffffffffffff9c, &(0x7f0000000300)='./file0\x00', 0x0, 0x0) r1 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x5, 0xa, &(0x7f0000002600)=[{&(0x7f0000000140)="e64f9982d9ef4624a7978c40d51d362ad0feced964805348039dfa300d9ab468e0b8ab10d41f085a71dc5f2696a434709e46a60187058485b2fd900c521b9a46b0174a865edeb9559651d81ca4286fa4e1a6de244aa546d7063a52c17ec8358c3c3077c23cd05ebbe1aa9634d977be426cd19a2aad66a06a0bda30890e53600f66c3d5", 0x83}, {&(0x7f0000000200)="5318106ec3d64895069b059a2a72cf064e38ac9afc78b384d4eb425479bb7c3a661dd889b61bd5991a820968a74ec01aa3da5b57c7c4ae163cd608d10004177f2abae3c02ac3425f4f0571b54ec68791e4bde6a87b8808c0c912be1f8d520aecf0d6bfb775a73270f592858a7b07e3df1e553c9b89163c7a75be9a0be31ccface8333754f7da68ece23563f24fd7097fc10765dae35c4dc8a30f734cb8d3096fdb9cc6a8e9c971e52f56eb7c9a1b41b8c150379ec9260fc60c68654e535ab17f35c20cea0fccec24f989029766bf139ae0aac2e58d29bb7bb8957a32eb59b487ffc0556c090e074551a28138d418dfa0b969805d8a4bc054", 0xf8, 0x8}, {&(0x7f0000000340)="fc4a785575728c805399c7c9bd1fe15542b68d9fd51375a0c178251f88271c6227e10fa0ad3a1c53223fb4a0016107393fb51e151258b72b313263b1a315131f77e5a0d43ea7d67dd1acb94a95838f40073692ad43687392c647c2257fde21daf9ec8a129b4b04830c47462bff4ee33655761a7a11c37b3ff571eaf9bd3f3c640a15a9467abc9cb45bd4f743f2494e0e81cb0ef9b0d576d561a99c1f9330bcbd6d145f5fa3ab25b8747c97a659366b5c5bfa9b89a43674434f6d51d7ba0a94871247c7526c5b05609e3fea5d9305de400119b79cfb31337384b1395e20cd91901169ba0e430dd52d5976e8a315e653396d320f94757464", 0xf7, 0x1}, {&(0x7f0000000080), 0x0, 0x20}, {&(0x7f00000000c0)="febee41e6866a502cb0f46d0d7342ec7", 0x10, 0x4}, {&(0x7f0000000480)="c3c3fb20dbd8442752d7cac43d42e6bdb359929fa44c700bf5fefeb8738e18c0a4740bdae0a0f83c74cadbda", 0x2c, 0x8}, {&(0x7f00000004c0)="00f4f4354e0e995273513c6270358793204701711ab10899614d5d50f2ae28293299250e14fe8857f7899ba5bacb1d9c724ea4302c98155a777b52a10bff5707e471010d3f6bb2f031ddc943f660cd", 0x4f, 0x90000000000000}, {&(0x7f0000000540)="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", 0x1000, 0x6}, {&(0x7f0000001540)="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", 0x1000, 0xffffffffffffffff}, {&(0x7f0000002540)="465e21cbe524a5881186a2564c91ba99efab2f4233aea71d964b596d9c83170a22ad9ede9fc212de864579603bde9a77d558d1b16e9fd68490c1fc17ad6f78679195f68497509c2ee8d8212dc435216bcdd7b87f95b4cb55ae933edf5db4a6ccf93433b4232e18d4f42aa83077b798d43765fd11963c8a999968e114199fc3d2eda17239e7fcd1ce34bbeec3efe7abba220f4b9ba1591da3cf613e2d", 0x9c, 0x3f}], 0x1008d2, &(0x7f0000002700)={[{@barrier}, {@errors_remount}, {@min_batch_time={'min_batch_time', 0x3d, 0x1ff8}}, {@data_err_ignore}, {@oldalloc}, {@data_err_abort}, {@inode_readahead_blks={'inode_readahead_blks', 0x3d, 0x1000000}}], [{@fscontext={'fscontext', 0x3d, 'system_u'}}]}) unlinkat(r1, &(0x7f0000000100)='./file0\x00', 0x200) faccessat2(0xffffffffffffffff, &(0x7f00000027c0)='./file0\x00', 0x0, 0x100) fchmodat(r0, &(0x7f0000000080)='./file0\x00', 0x159) 10:11:16 executing program 0: setgid(0x0) prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000040)={0x2, &(0x7f0000000000)=[{0x15}, {}]}) [ 1897.227661][ T22] audit: type=1326 audit(1633169476.256:650): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=26419 comm="syz-executor.4" exe="/root/syz-executor.4" sig=9 arch=c000003e syscall=231 compat=0 ip=0x7f9dee22a8d9 code=0x0 [ 1897.254002][T26429] loop5: detected capacity change from 0 to 61440 10:11:16 executing program 5: syz_mount_image$ext4(0x0, &(0x7f0000000440)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r0 = openat$dir(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x1ab082, 0xe1) unlinkat(0xffffffffffffff9c, &(0x7f0000000100)='./file0\x00', 0x200) faccessat2(r0, &(0x7f0000000000)='./file0\x00', 0x20, 0x1300) openat$incfs(0xffffffffffffff9c, &(0x7f0000000080)='.pending_reads\x00', 0x20000, 0x20) [ 1897.330254][T26437] loop2: detected capacity change from 0 to 27 10:11:16 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000040)={0x2, &(0x7f0000000000)=[{0x15}, {}]}) prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f00000000c0)={0x1, &(0x7f0000000080)=[{0xff, 0xb9, 0x1, 0x2}]}) 10:11:16 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext3\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x800000, &(0x7f0000000100)=ANY=[@ANYBLOB="6ce167617a7974696d652c746573745f64b26d6d7970656e637279709c7dd49cf0d532be5f6469725f736901000000623d307830300165791c6a59da2bef6dfa085407800030303030303230302c6772706a71756f7404002c6d685f74696d653d307830303030303030303030880174636f6e7465797407000000000000008a775aeec214e077ed777fc95100"]) ioctl$PTP_ENABLE_PPS(0xffffffffffffffff, 0x40043d04, 0x1) ioctl$PTP_SYS_OFFSET_PRECISE(0xffffffffffffffff, 0xc0403d08, &(0x7f0000000080)) 10:11:16 executing program 2: syz_mount_image$ext4(0x0, &(0x7f0000000440)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) openat$dir(0xffffffffffffff9c, &(0x7f0000000300)='./file0\x00', 0x0, 0x0) prctl$PR_CAPBSET_READ(0x17, 0x8) unlinkat(0xffffffffffffff9c, &(0x7f0000000100)='./file0\x00', 0x200) r0 = syz_genetlink_get_family_id$tipc(&(0x7f0000000040), 0xffffffffffffffff) r1 = syz_mount_image$ext4(&(0x7f00000002c0)='ext2\x00', &(0x7f0000000340)='./file0\x00', 0x1, 0x3, &(0x7f0000000640)=[{&(0x7f0000000380)="7014c438fdec303b82b69222954df9de78ff54d300e113a9240f0776f9aae8f2b3f39babb87fec6a45b1c18f3aa07f76a6299bc779d96f451068909e837f2e6f285292a7f012367a2420b5980b253d469dc12180be284307ac6602a270a0505c3c", 0x61, 0x7ff}, {&(0x7f0000000480)="d78356c38a0aa43765419a6e194c12677a5a14b71a48129cc3e86ba55257590b7517fdeca78ab165735b7e5257684e0cda122998554de6ec26cfdd07b01e6193828d2fc6fa9dc30e768f8f7609ef48620c35371bf4f46e574a573b0744731cb5338c0571fcd381a36c7fdc86f340ff7a334f3e4a616c4e434bd033fc5747d87c64593510022cef09e3d1c7681217c768624c18aa48ef09d628b315ae8ba8b951e1b43d17fdcb76507c226d043dff1ba930ad525c7fbb1790f52b9c4bde9bf1d5cb21fd5a50cb72", 0xc7, 0x7}, {&(0x7f0000000580)="ae916ecc34e163216e94dd1227271ee4ab7cecf17c67ff1ce3aa28d6c19e75276ff0e71d74cebd3bc23d64438fa3e633718c35ef3e8ca276938594077e8e5a81394d1ebc57a9242e0830fcdc383d44452c86c8a507abcff9e1adb4c30c2d667a26aadf176fddca61820ff504af75a8f7f791e2e51d5541e19efb131576de449bc9e7d888f0609584a77a50b42160a90a11f2df1803f486ace2db4a9278fcf53da3f2876fd74ff8e9e1eb03e01e83", 0xae, 0x3}], 0x3200002, &(0x7f00000006c0)={[{@dioread_nolock}, {@stripe={'stripe', 0x3d, 0x800}}, {@auto_da_alloc}], [{@func={'func', 0x3d, 'MODULE_CHECK'}}, {@obj_role={'obj_role', 0x3d, 'TIPC\x00'}}, {@subj_type={'subj_type', 0x3d, 'TIPC\x00'}}, {@smackfshat={'smackfshat', 0x3d, '-:'}}, {@uid_gt={'uid>', 0xee00}}]}) getdents(r1, &(0x7f0000000780)=""/160, 0xa0) sendmsg$TIPC_CMD_GET_MEDIA_NAMES(0xffffffffffffffff, &(0x7f0000000140)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x10000}, 0xc, &(0x7f00000000c0)={&(0x7f0000000080)={0x1c, r0, 0x800, 0x70bd2d, 0x25dfdbfe, {}, ["", ""]}, 0x1c}, 0x1, 0x0, 0x0, 0x4}, 0x0) r2 = syz_genetlink_get_family_id$tipc(&(0x7f00000001c0), 0xffffffffffffffff) sendmsg$TIPC_CMD_GET_BEARER_NAMES(0xffffffffffffffff, &(0x7f0000000280)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x100}, 0xc, &(0x7f0000000240)={&(0x7f0000000200)={0x1c, r2, 0x0, 0x70bd26, 0x10000, {}, ["", "", ""]}, 0x1c}, 0x1, 0x0, 0x0, 0x2004c020}, 0x40) 10:11:16 executing program 5: syz_mount_image$ext4(0x0, &(0x7f0000000440)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r0 = openat$dir(0xffffffffffffff9c, &(0x7f0000000300)='./file0\x00', 0x2c100, 0x1b3) r1 = openat$dir(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x20000, 0x72) execveat(r1, &(0x7f0000000040)='./file0\x00', &(0x7f00000000c0)=[&(0x7f0000000080)='[\x00'], &(0x7f00000001c0)=[&(0x7f0000000140)='\x00', &(0x7f0000000180)='\x1f](\\!*![)/\\/-\x00'], 0x1000) getdents64(r0, &(0x7f0000000200)=""/193, 0xc1) unlinkat(0xffffffffffffff9c, &(0x7f0000000100)='./file0\x00', 0x200) [ 1897.505517][T26479] loop2: detected capacity change from 0 to 7 [ 1897.519294][T26479] EXT4-fs (loop2): VFS: Can't find ext4 filesystem [ 1897.582964][T26479] loop2: detected capacity change from 0 to 7 [ 1897.595893][T26479] EXT4-fs (loop2): VFS: Can't find ext4 filesystem 10:11:17 executing program 4: prctl$PR_SET_SECCOMP(0x16, 0x0, &(0x7f0000000040)={0x3, &(0x7f0000000080)=[{0x6, 0x0, 0x9, 0x1000000}, {0x2}, {0x1, 0x8, 0x8}]}) 10:11:17 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000040)={0x2, &(0x7f0000000080)=[{0x15}, {}]}) 10:11:17 executing program 3: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext2\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000480)=ANY=[@ANYBLOB='lazytime,test_dummy_encryption,max_dir_size_kb=0x000000000200,grpjquota=,min_batch_time=0x00000000000003ff,rootcontext\a']) symlinkat(&(0x7f0000000080)='./file0\x00', r0, &(0x7f00000000c0)='./file0\x00') 10:11:17 executing program 1: r0 = openat$vcsu(0xffffffffffffff9c, &(0x7f0000000000), 0x5200, 0x0) fchmodat(r0, &(0x7f0000000040)='./file0\x00', 0x1b0) r1 = openat$incfs(r0, &(0x7f00000002c0)='.log\x00', 0x581200, 0x123) accept4$packet(r0, &(0x7f0000000400)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000000440)=0x14, 0x100000) sendmsg$TIPC_CMD_GET_LINKS(r0, &(0x7f0000000140)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f0000000100)={&(0x7f00000000c0)={0x24, 0x0, 0x100, 0x70bd25, 0x25dfdbfc, {{}, {}, {0x8}}, [""]}, 0x24}, 0x1, 0x0, 0x0, 0x80}, 0x4000810) clock_settime(0x0, &(0x7f0000000000)={0x77359400}) clock_settime(0x3, &(0x7f0000000040)={0x0, 0x3938700}) socketpair(0x10, 0x2, 0x10001, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$packet_int(r3, 0x107, 0x14, &(0x7f00000001c0)=0x80, 0x4) r4 = openat$vcsu(0xffffffffffffff9c, &(0x7f0000000340), 0x301, 0x0) ioctl$PTP_ENABLE_PPS(r4, 0x40043d04, 0x1) r5 = syz_genetlink_get_family_id$team(&(0x7f0000000240), 0xffffffffffffffff) getsockname$packet(r0, &(0x7f0000000280)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000300)=0x14) getsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f0000000480)={{{@in6=@local, @in6=@mcast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@remote}, 0x0, @in6=@dev}}, &(0x7f0000000340)=0xe8) ioctl$sock_ipv6_tunnel_SIOCDELPRL(r1, 0x89f6, &(0x7f0000000580)={'sit0\x00', &(0x7f0000000380)={'syztnl1\x00', r2, 0x2f, 0x80, 0x0, 0xac, 0xd2, @mcast1, @remote, 0x20, 0x20, 0x4, 0x80000001}}) sendmsg$TEAM_CMD_NOOP(r4, &(0x7f00000009c0)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x2000}, 0xc, &(0x7f0000000980)={&(0x7f00000005c0)={0x3b8, r5, 0x400, 0x70bd2b, 0x25dfdbfb, {}, [{{0x8, 0x1, r2}, {0x7c, 0x2, 0x0, 0x1, [{0x38, 0x1, @lb_stats_refresh_interval={{0x24}, {0x5}, {0x8, 0x4, 0x4}}}, {0x40, 0x1, @name={{0x24}, {0x5}, {0x10, 0x4, 'loadbalance\x00'}}}]}}, {{0x8, 0x1, r2}, {0xc8, 0x2, 0x0, 0x1, [{0x4c, 0x1, @lb_tx_method={{0x24}, {0x5}, {0x19, 0x4, 'hash_to_port_mapping\x00'}}}, {0x38, 0x1, @mcast_rejoin_count={{0x24}, {0x5}, {0x8, 0x4, 0xff}}}, {0x40, 0x1, @queue_id={{{0x24}, {0x5}, {0x8, 0x4, 0x2}}, {0x8, 0x6, r2}}}]}}, {{0x8, 0x1, r2}, {0xf8, 0x2, 0x0, 0x1, [{0x3c, 0x1, @enabled={{{0x24}, {0x5}, {0x4}}, {0x8, 0x6, r6}}}, {0x40, 0x1, @priority={{{0x24}, {0x5}, {0x8, 0x4, 0x9}}, {0x8}}}, {0x38, 0x1, @mcast_rejoin_interval={{0x24}, {0x5}, {0x8, 0x4, 0xfffff001}}}, {0x40, 0x1, @priority={{{0x24}, {0x5}, {0x8, 0x4, 0x4}}, {0x8, 0x6, r2}}}]}}, {{0x8, 0x1, r7}, {0x7c, 0x2, 0x0, 0x1, [{0x40, 0x1, @lb_hash_stats={{{0x24}, {0x5}, {0x8, 0x4, 0x1}}, {0x8}}}, {0x38, 0x1, @notify_peers_interval={{0x24}, {0x5}, {0x8, 0x4, 0x6}}}]}}, {{0x8, 0x1, r8}, {0x80, 0x2, 0x0, 0x1, [{0x3c, 0x1, @user_linkup_enabled={{{0x24}, {0x5}, {0x4}}, {0x8, 0x6, r2}}}, {0x40, 0x1, @lb_hash_stats={{{0x24}, {0x5}, {0x8, 0x4, 0x15d9}}, {0x8}}}]}}, {{0x8}, {0x3c, 0x2, 0x0, 0x1, [{0x38, 0x1, @mcast_rejoin_interval={{0x24}, {0x5}, {0x8, 0x4, 0x9}}}]}}]}, 0x3b8}}, 0x14004011) 10:11:17 executing program 5: syz_mount_image$ext4(0x0, &(0x7f0000000440)='./file0\x00', 0xfffffffffffffffc, 0x0, 0x0, 0x3000880, 0x0) r0 = openat$dir(0xffffffffffffff9c, &(0x7f0000000300)='./file0\x00', 0x0, 0x0) unlinkat(0xffffffffffffff9c, &(0x7f0000000100)='./file0\x00', 0x200) r1 = openat$incfs(r0, &(0x7f0000000080)='.log\x00', 0x41c080, 0xe8) execveat(r1, &(0x7f00000000c0)='./file1\x00', &(0x7f0000000240)=[&(0x7f0000000140)='\x00', &(0x7f0000000180)='\x00', &(0x7f00000001c0)='#\x00', &(0x7f0000000200)='^#\x00'], &(0x7f0000000540)=[&(0x7f0000000280)='*N\\&)\\@($/&\x00', &(0x7f00000002c0)='{\x00', &(0x7f0000000340)='(\x00', &(0x7f0000000380)='!\x00', &(0x7f00000003c0), &(0x7f0000000400)='\x00', &(0x7f0000000480)='#\x00', &(0x7f00000004c0)='\'\\\x00', &(0x7f0000000500)='^).$}\xa2\x00'], 0x0) getdents64(0xffffffffffffffff, &(0x7f0000000000)=""/74, 0x4a) keyctl$KEYCTL_CAPABILITIES(0x1f, &(0x7f00000003c0)=""/33, 0x21) getresuid(&(0x7f0000001a80), &(0x7f0000001ac0)=0x0, &(0x7f0000001b00)) getsockopt$inet_IP_XFRM_POLICY(r1, 0x0, 0x11, &(0x7f0000001e40)={{{@in6=@private2, @in6=@private0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@private0}, 0x0, @in=@broadcast}}, &(0x7f0000001f40)=0xe8) syz_mount_image$ext4(&(0x7f0000001c80)='ext2\x00', &(0x7f0000001cc0)='\x00', 0x9d60, 0x2, &(0x7f0000001e00)=[{&(0x7f0000001d00)="ab1a8ac940fc8c4df56241bc182b05f4682bfafd89b6e621ab280e5fe6425d31faa5a51d99347d05f904cbb74d8851b4cd2ff9efcd9fea5cb66a4567cba56c5d17fc703ac1f8ef559f4703191f75080d56c9d9b89fbdf7a91ec33bddee9ea522c152b4c28660f693d8ed120c8f00284fa70d319a55544b3314153fc66402df11a6f2be6b09d40f67d190448cd668acf9a2c5fda26b8795", 0x97, 0x81}, {&(0x7f0000001dc0), 0x0, 0x5}], 0x40000, &(0x7f0000001f80)={[], [{@fowner_eq={'fowner', 0x3d, r3}}]}) syz_mount_image$ext4(&(0x7f00000005c0)='ext2\x00', &(0x7f0000000600)='./file1\x00', 0xfffffffffffffffe, 0x8, &(0x7f00000019c0)=[{&(0x7f0000000640)="eb0d0f828971569e103a80ccf718c22873ad3189963425aa0ef462ed27dcddc23cbdef8b5b3acc34c36135f887cc745febb03e32", 0x34, 0x9}, {&(0x7f0000000680)="779602c6d0ce06a30de467c8d3586fbee60569927cdd43d7e916f290d76ec274f567b0c60faf4a", 0x27, 0x1f}, {&(0x7f00000006c0)="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", 0x1000, 0xfffffffffffffff7}, {&(0x7f00000016c0)="c3a918f133dada246f40fe2fadef0cd938eaeb70e01401093d820fc3f88339a160699aa339568a46d9b1e98689909d49962adf3eb0d550bf07d39f61104506127fcd79fc089c16ad965399c72ecbb3cb62912ea700dc91df881ce221135cb88f042248df49fd51c14d7f9dc965e74b94c0119681c274aa588a1f78d7b2dfc5ab293a3f99f0cc2764349a60c6842894b63ed8010320ec90ffe3d98a6bff742e1ce31be87b943cfc8e", 0xa8, 0x3ff}, {&(0x7f0000001780)="69ab8fb23b42838037be12442d32af9eb00fb85852855ec94c35be8a9e55089d7ae512e76612b221cb90c9123f69c6a9", 0x30, 0x4d9c}, {&(0x7f00000017c0)="952ff3a898c6b502807ec892732edcbabb140f5e8310d832b585da3a9923f4c441760d8e3464500fba2d8c67337da362eb9ebb6be777565f59f3b1186daa3391ba7804b9e334fe411fdbb20cb575a2a0edbc1c9d6c4b3cf26d4a071ff00446027c89dde4f739ffe6081b43f31b2600fabc77f505f17e273ff378d6a557613182baa6da482fe2d9ff11", 0x89, 0x3}, {&(0x7f0000001880)="35833b573f03eea7115dc1eb28f715bfd2a1baaac4119d01bb62e7f179b6b3b867182743bb09c135d3c7bb9fa1ddc718fe8955828b263cecf4f36b309e5a155810dcb2ae005312a27711c89fa6e677dc8e499f868abd042bd1251b2f2bf37a06977c500d46f913108ea6fbd8637e2a442a453c15e85d108381891cd9e03b027bf578f618931a7860dfb8aa7598ac76ad310293be0d7f97bf4ec46cc7116782015cc583fbb97babab0a2ba2e9edcd0902e480a4f83e47f6", 0xb7}, {&(0x7f0000001940)="efed2d7277727c7893e3a054182ddabeabda0f2a48a17abba12c8d75f79a3d59450de9d832a08e102b33c0e340b3341a56ade9c8502eefddee0854f581132867252906f3473bb1c98513559c3f06e4ddc3ee47d3", 0x54, 0x5}], 0x200000, &(0x7f0000001b40)={[{@noload}, {@nouid32}, {@usrjquota_path={'usrjquota', 0x3d, './file0'}}, {@auto_da_alloc_val={'auto_da_alloc', 0x3d, 0x400}}, {@dax}, {@auto_da_alloc_val={'auto_da_alloc', 0x3d, 0xfffffffffffffffd}}], [{@appraise}, {@uid_lt}, {@hash}, {@func={'func', 0x3d, 'FILE_CHECK'}}, {@appraise}, {@smackfstransmute={'smackfstransmute', 0x3d, '{\x00'}}, {@dont_appraise}, {@euid_gt={'euid>', r2}}, {@fsuuid={'fsuuid', 0x3d, {[0x30, 0x35, 0x65, 0x64, 0x62, 0x36, 0x1, 0x64], 0x2d, [0x62, 0x65, 0x62, 0x63], 0x2d, [0x32, 0x3, 0x62, 0x38], 0x2d, [0x61, 0x39, 0x38, 0x35], 0x2d, [0x32, 0x65, 0x41bc9a3ccbe90e57, 0x34, 0x65, 0x66, 0x63, 0x39]}}}]}) 10:11:17 executing program 2: syz_mount_image$ext4(0x0, &(0x7f0000000440)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) openat$dir(0xffffffffffffff9c, &(0x7f0000000300)='./file0\x00', 0x0, 0x0) exit(0x81) unlinkat(0xffffffffffffff9c, &(0x7f0000000100)='./file0\x00', 0x200) 10:11:17 executing program 4: clone(0x4000000, &(0x7f0000000080)="1ab7e47820c3b2fd7492a7bfe3b938c782607731f7a472e6e6f0395ebd3339069d6d342038d897a412a46b23bb283aadc2ee64", &(0x7f00000000c0), &(0x7f0000000100), &(0x7f0000000140)="98f903d6341fa747fdd8362e7fd204eada444017971901ed0a721de16f125eb4604d6e2422231c41d699099b9192f1ab146be23e60dfa4d43c844227d9dd7cdea3c7c82521f048b0ed2da0d2beb150b96421d5d8867b44e4bb198cb3b006318ce53e1c14d31d3a5a74af7939ddfde7e2a8f7e73c999a3c26347574c30e41e5ff7141ebbf8724152b83cc1b25ed5d66abb53d780cab400b90df4a3954d4094236d38365b0ac7b57319abfe540f42632cc8d6ada943feb4e82dda233980a2f1a8771fd2922991cea0fb9335a6d4bde63bb86534eadc06a2bb6c2ae29c05a50c4d85741ef") prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000040)={0x2, &(0x7f0000000000)=[{0x25}, {}]}) 10:11:17 executing program 1: clock_settime(0x0, &(0x7f0000000000)={0x77359400}) r0 = fork() ptrace$getregs(0xe, r0, 0x19800000, &(0x7f0000000080)=""/33) clock_settime(0x5, &(0x7f0000000040)) 10:11:17 executing program 3: ptrace$peek(0x3, 0x0, &(0x7f0000000080)) syz_mount_image$ext4(&(0x7f0000000000)='ext3\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)=ANY=[]) [ 1898.162051][T26533] loop5: detected capacity change from 0 to 78 10:11:17 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000040)={0x2, &(0x7f0000000000)=[{0x15, 0x4}, {0x0, 0x0, 0x3}]}) accept4$packet(0xffffffffffffffff, 0x0, &(0x7f0000000080), 0x0) [ 1898.244422][T26533] loop5: detected capacity change from 0 to 264192 10:11:17 executing program 4: r0 = openat$vcsu(0xffffffffffffff9c, &(0x7f0000000340), 0x301, 0x0) ioctl$PTP_ENABLE_PPS(r0, 0x40043d04, 0x1) r1 = openat$vcsu(0xffffffffffffff9c, &(0x7f0000000040), 0x4000, 0x0) openat$incfs(r1, &(0x7f0000000000)='.log\x00', 0x14600, 0x10) prctl$PR_SET_SECCOMP(0x16, 0x0, &(0x7f00000000c0)) [ 1898.295597][T26533] EXT4-fs (loop5): VFS: Can't find ext4 filesystem 10:11:17 executing program 0: prctl$PR_SET_TSC(0x1a, 0x1) prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000040)) 10:11:17 executing program 3: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext3\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000480)=ANY=[@ANYBLOB="6c617a7974696d652c746573745f64756d6d795f656e6372797074696f6e827d8f531f6f042c6d61785f6469725f73697a010000003d30783030303030303230302c6772706a71756f74613d2cff036e5f62617463685f74696d653d3078303030303030303030303030303366662c726f6f7463000000"]) r1 = openat$dir(0xffffffffffffff9c, &(0x7f00000007c0)='./file1\x00', 0x4000, 0x5) unlinkat(r1, &(0x7f0000000800)='./file0\x00', 0x0) r2 = openat$vcsu(0xffffffffffffff9c, &(0x7f0000000000), 0x5200, 0x0) fchmodat(r2, &(0x7f0000000040)='./file0\x00', 0x1b0) r3 = openat$dir(0xffffffffffffff9c, &(0x7f0000000780)='./file1\x00', 0x8400, 0x11) openat$incfs(r3, &(0x7f00000002c0)='.log\x00', 0x581200, 0x123) r4 = syz_mount_image$ext4(&(0x7f0000000100)='ext4\x00', &(0x7f0000000140)='./file0\x00', 0x1, 0x3, &(0x7f0000000580)=[{&(0x7f0000000180)="9f780e8c6474e908dc5109a2712decc26b4b036ea53a5b67eb2368ed7c64de23bd88ff798433114e95781d69eff1f6e240a62df58341e1ee06c3b0ef3ea0cc3f66b1d7479c037713d16e92898c2c79c5bef14726e1843429c295b40675647c9bf53abfd25b463da6d05390987e27f61af04a10c7ce380927b50db4e1447dfa4551e4f5ee53241c01a1de22e9d75e27df39c684716cd9bad131aeee70257f8638c5521f9a9c1d6051fdf765ba5098ad437906ee86d74c6d7a3d88302cf988793fabd59e1cdf21cd9c80683c309f34536a4c59849d6603207251a361", 0xdb, 0x5}, {&(0x7f0000000300)="42fb84ebd3d73e7fdbd7b1813fd26af8d993817743ef47aea7b8ad7bdda93ae550f7d7eaffcf02465d2f3946cda77d6d9884702185192125422f75551112ebb36e5e5901a8abf924128ecb84c71756720cdceee81dc09d0b674012a7096e54c9240a35c91854ace00cd51da2f8604c60f645cd7f9b5149939a46eb0eff4c46eb9f64a65d32888329cd417760cb0b88", 0x8f, 0x3}, {&(0x7f0000000500)="87579ea34384236838baab97fff0af395e8d51281bde55d81ba5d7f194313cb161f48becc943c594186ece2c4e80baddf4b8ca218516bd3547fb1c2d07561f0fbc905fa50bff151c4553abec8af4", 0x4e, 0x9c7}], 0x200000, &(0x7f0000000600)={[{@debug_want_extra_isize={'debug_want_extra_isize', 0x3d, 0x100000001}}, {@bsdgroups}, {@errors_continue}, {@noinit_itable}, {@acl}, {@grpjquota}, {@nouser_xattr}], [{@mask={'mask', 0x3d, '^MAY_APPEND'}}, {@hash}, {@appraise_type}]}) socket$inet6_udplite(0xa, 0x2, 0x88) add_key$keyring(&(0x7f0000000700), &(0x7f0000000740)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffe) getdents(r0, &(0x7f00000006c0)=""/2, 0x2) renameat2(r4, &(0x7f0000000280)='./file0\x00', r2, &(0x7f00000003c0)='./file1\x00', 0x4) accept4$packet(r2, &(0x7f0000000400)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000000440)=0x14, 0x100000) futimesat(r2, &(0x7f0000000080)='./file1\x00', &(0x7f00000000c0)={{0x0, 0xea60}, {0x77359400}}) 10:11:17 executing program 1: ptrace$getregs(0xe, 0xffffffffffffffff, 0x1, &(0x7f0000000080)=""/164) shmget$private(0x0, 0x3000, 0x400, &(0x7f0000ffc000/0x3000)=nil) r0 = shmget$private(0x0, 0x1000, 0x0, &(0x7f0000ffc000/0x1000)=nil) shmat(r0, &(0x7f0000400000/0xc00000)=nil, 0x4000) shmat(r0, &(0x7f0000ffd000/0x1000)=nil, 0x6000) sendmsg$NBD_CMD_RECONFIGURE(0xffffffffffffffff, &(0x7f0000000240)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f0000000200)={&(0x7f0000000280)=ANY=[@ANYBLOB='\\\x00\x00\x00', @ANYRES16=0x0, @ANYBLOB="120825bd7000ffdb44412a19bd775331be0aa2d068df1cba5357f7c9ec896c25030000000c0006006b96c3081f6542a90c0003fcfeffffff0c00050004000000000000000c00060002000000000000000c00020004000000000000"], 0x5c}, 0x1, 0x0, 0x0, 0x80c4}, 0x4018084) modify_ldt$write(0x1, &(0x7f0000000040)={0x0, 0xffffffffffffffff, 0x400, 0x1, 0x3, 0x0, 0x1, 0x1, 0x1, 0x1}, 0x10) clock_settime(0x0, &(0x7f0000000000)={0x77359400}) 10:11:17 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000040)={0x2, &(0x7f0000000000)=[{0x15}, {}]}) sendmsg$IEEE802154_LLSEC_LIST_SECLEVEL(0xffffffffffffffff, &(0x7f0000000140)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x20000000}, 0xc, &(0x7f0000000100)={&(0x7f00000000c0)={0x14, 0x0, 0x200, 0x70bd2d, 0x25dfdbfb, {}, ["", "", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x40840}, 0x8040) [ 1898.404801][T26533] loop5: detected capacity change from 0 to 78 10:11:17 executing program 4: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000040)={0x3, &(0x7f0000000000)=[{0x1, 0x40, 0x1}, {0x0, 0x2, 0x50, 0x6}, {0x4001, 0x2, 0x0, 0xffffffff}]}) [ 1898.455037][T26579] loop3: detected capacity change from 0 to 9 10:11:17 executing program 5: r0 = shmget(0x1, 0x2000, 0x780000c0, &(0x7f0000ffc000/0x2000)=nil) shmget(0x0, 0x4000, 0x200, &(0x7f0000ff9000/0x4000)=nil) shmat(r0, &(0x7f0000ffd000/0x1000)=nil, 0x4000) syz_mount_image$ext4(0x0, &(0x7f0000000440)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) openat$dir(0xffffffffffffff9c, &(0x7f0000000300)='./file0\x00', 0x0, 0x0) unlinkat(0xffffffffffffff9c, &(0x7f0000000100)='./file0\x00', 0x200) [ 1898.495327][T26579] EXT4-fs (loop3): VFS: Can't find ext4 filesystem [ 1898.561306][T26579] loop3: detected capacity change from 0 to 9 [ 1898.574044][T26579] EXT4-fs (loop3): VFS: Can't find ext4 filesystem 10:11:18 executing program 2: syz_mount_image$ext4(0x0, &(0x7f0000000440)='./file0\x00', 0x2000000, 0x0, 0x0, 0x0, 0x0) openat$dir(0xffffffffffffff9c, &(0x7f0000000300)='./file0\x00', 0x400040, 0x0) unlinkat(0xffffffffffffff9c, &(0x7f0000000100)='./file0\x00', 0x200) r0 = openat$vcsu(0xffffffffffffff9c, &(0x7f0000000340), 0x301, 0x0) ioctl$PTP_ENABLE_PPS(r0, 0x40043d04, 0x1) futimesat(r0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000040)={{0x0, 0xea60}}) 10:11:18 executing program 4: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000100)={0x2, &(0x7f0000000000)=[{0x25}, {}]}) prctl$PR_SET_SECCOMP(0x16, 0x1, &(0x7f00000000c0)={0x3, &(0x7f0000000080)=[{0x6, 0x2, 0x20, 0x20}, {0x7, 0x40, 0x0, 0x405}, {0x3, 0x40, 0x0, 0x8}]}) prctl$PR_SET_CHILD_SUBREAPER(0x24, 0x1) 10:11:18 executing program 1: clock_settime(0x2, &(0x7f0000000000)={0x0, 0x989680}) pselect6(0x40, &(0x7f0000000040)={0x40, 0x17, 0xfffffffffffffffb, 0x100000001, 0x7, 0x6, 0x200, 0xff}, &(0x7f0000000080)={0x200, 0x1, 0x6, 0x2, 0xffffffffffffffff, 0x3eb, 0x96, 0x7ff}, &(0x7f00000000c0)={0x7, 0xf7, 0x1afc, 0x7f, 0x8, 0x6, 0x93, 0x3}, &(0x7f0000000100), &(0x7f0000000180)={&(0x7f0000000140)={[0xfffffffffffffff8]}, 0x8}) 10:11:18 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000040)={0x2, &(0x7f0000000000)=[{0x15}, {}]}) prctl$PR_SET_SECCOMP(0x16, 0x0, &(0x7f00000001c0)={0x3, &(0x7f0000000240)=[{0x5, 0x6, 0x7, 0x1}, {0x2, 0x8, 0x7d}, {0x1f, 0x0, 0x40, 0xa7}]}) prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000100)={0x9, &(0x7f0000000080)=[{0x8, 0x20, 0x4, 0xfa9}, {0x1, 0xd6, 0x1, 0x1}, {0xd81b, 0x8, 0xd, 0x2b18}, {0x0, 0x6, 0x2, 0x3}, {0x3ff, 0x1, 0x1b, 0xcc3}, {0x0, 0x7, 0x1}, {0x1000, 0xff, 0x8, 0x1000}, {0x4, 0xd7, 0x0, 0x6}, {0x3, 0x1, 0x6}]}) rseq(&(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={0x0, 0x2, 0x9, 0x7, 0xffffffff}, 0x7}, 0x20, 0x1, 0x0) prctl$PR_CAPBSET_DROP(0x18, 0x17) 10:11:18 executing program 5: syz_mount_image$ext4(0x0, &(0x7f0000000440)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) openat$dir(0xffffffffffffff9c, &(0x7f0000000300)='./file0\x00', 0x0, 0x0) unlinkat(0xffffffffffffff9c, &(0x7f0000000100)='./file0\x00', 0x200) syz_open_dev$sg(&(0x7f0000000000), 0xdd3, 0x20242) 10:11:18 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext3\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000480)=ANY=[@ANYBLOB='lazytime,test_dummy_encryption,max_dir_size_kb=0x000000000200,grpjquota=,min_batch_time=0x00000000000003ff,rootcontext\a']) ioctl$SCSI_IOCTL_TEST_UNIT_READY(0xffffffffffffffff, 0x2) r0 = openat$vcsu(0xffffffffffffff9c, &(0x7f0000000000), 0x5200, 0x0) fchmodat(r0, &(0x7f0000000040)='./file0\x00', 0x1b0) openat$incfs(r0, &(0x7f00000002c0)='.log\x00', 0x581200, 0x123) accept4$packet(r0, &(0x7f0000000400)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000000440)=0x14, 0x100000) fchmodat(r0, &(0x7f0000000080)='./file0\x00', 0x2) 10:11:18 executing program 1: clock_settime(0x5, &(0x7f0000000000)={0x77359400}) [ 1899.041544][ T22] audit: type=1326 audit(1633169478.067:651): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=26621 comm="syz-executor.4" exe="/root/syz-executor.4" sig=9 arch=c000003e syscall=231 compat=0 ip=0x7f9dee22a8d9 code=0x0 10:11:18 executing program 3: r0 = openat$ptp0(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) ioctl$PTP_EXTTS_REQUEST(r0, 0x40103d02, &(0x7f0000000100)) ioctl$PTP_SYS_OFFSET_PRECISE(r0, 0xc0403d08, &(0x7f0000000080)) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000240)=ANY=[@ANYBLOB="6c617a7974696d652c746573745f64756d6d795f656e6372797074696f6e697a655f6b623d30003030303030303030303230302c6772706a71756f74613d2c6d696e5f62617463685f74696d9cd5dfeeac7aaf5e8749720db890653d3078303030103030303030303030303366662c726f6f74636f6e74657874073d36d2f057dd5e40077e194f20e709b37b8815e15d3cf6cc3b88cc442287772946bc454fac7720ae82650072467ec435c2ca6f1ef7adb96c9e309b09ae249b77c3bae3fa216ae07cf51b5dd76f28d470355165f6975d111636c5c9e2ed525ab294dc0faec87ce99514d4f5b11aac3aa4a7ae3a154470cc6e2a0000", @ANYRES64=r0]) 10:11:18 executing program 2: r0 = syz_mount_image$ext4(&(0x7f0000000180)='ext3\x00', &(0x7f00000001c0)='./file0\x00', 0x5, 0x3, &(0x7f0000000240)=[{&(0x7f0000000200)="dc082686653a9ddfba85beac874edb8b731c29dd5297c6844e6072", 0x1b, 0x10001}, {&(0x7f0000000480)="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", 0x1000, 0x81}, {&(0x7f0000001480)="19f4f303513dd66efa251c3c2cc79b5cea10c22418298d65b0da9c89b8f4ffe21ba79b67af42cbbd2fffead2aa1cd160338c96891b0287cad6c54334d8166ff6c6720861b9e13ce6377fa30da49e09996e40483d48fac160554e20b58abe40dbb0574ea17082d6e3b50858d037f8df9d359d726d391661df1f14c6028e84094fd5064fc553cd69df29356d7e83a3f9bd701b3064e6658f62f58b6020fa96617e11ca3969367182b44058151a14fe5f9c06974a9dae74bef4127f3c0013b3aadccd56f6c01318502a4ab5fdf8720abdd8132ada26c1cf469f9b129d6ab5c063540f576b", 0xe3, 0x5}], 0x910400, &(0x7f0000001580)=ANY=[@ANYBLOB="61e122dbdd9f25226673775deb6baadea046072ddddf078eb494b8f77fc62b00"/58, @ANYRESDEC=0xee00, @ANYBLOB=',context=system_u,func=PATH_CHECK,dont_hash,\x00']) renameat2(0xffffffffffffffff, &(0x7f0000000140)='./file0\x00', r0, &(0x7f00000002c0)='./file0\x00', 0x2) syz_mount_image$ext4(0x0, &(0x7f0000000440)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) openat$dir(0xffffffffffffff9c, &(0x7f0000000300)='./file0\x00', 0x0, 0x0) unlinkat(0xffffffffffffff9c, &(0x7f0000000100)='./file0\x00', 0x200) r1 = openat$vcsu(0xffffffffffffff9c, &(0x7f0000000380), 0x8301, 0x0) ioctl$PTP_ENABLE_PPS(r1, 0x40043d04, 0x1) getdents64(r1, &(0x7f0000000000)=""/219, 0xdb) 10:11:18 executing program 5: syz_mount_image$ext4(0x0, &(0x7f0000000800)='./file0\x00', 0x40000000000004, 0x0, 0x0, 0x90701e, 0x0) openat$dir(0xffffffffffffff9c, &(0x7f0000000300)='./file0\x00', 0x0, 0x0) unlinkat(0xffffffffffffff9c, &(0x7f0000000100)='./file0\x00', 0x200) r0 = openat$vcsu(0xffffffffffffff9c, &(0x7f0000000000), 0x5200, 0x0) fchmodat(r0, &(0x7f0000000040)='./file0\x00', 0x1b0) r1 = openat$incfs(r0, &(0x7f00000002c0)='.log\x00', 0x581200, 0x123) syz_genetlink_get_family_id$fou(&(0x7f0000000300), r1) renameat2(r1, &(0x7f0000000380)='./file0\x00', 0xffffffffffffffff, &(0x7f00000003c0)='./file1\x00', 0x0) r2 = openat$vcsu(0xffffffffffffff9c, &(0x7f0000000340), 0x301, 0x0) r3 = openat$dir(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x20082, 0x51) r4 = syz_mount_image$ext4(&(0x7f0000000140)='ext3\x00', &(0x7f0000000180)='./file1\x00', 0x80000000, 0x5, &(0x7f00000006c0)=[{&(0x7f00000001c0)="e0e3a1870a08be0fc73c5532301feb4bfefd7b3b13442e1af8380d761f05a650ddac591d96e247852d9e3ffc35487b0a807835bc73600336f16b6aad87d47e087d2808b573f8fa31b322d3615cdd0bd4051d1da400e75526bae214066a34f6dccd7fd03c9b86336f88382c0884c8c6f1626950f57421bd1f08218c062f4ace83b66ec2279152b6b1aa6c5f070d82eb6bf47baa24020c2dc60ce29a6a6ecc4dbe77133086e1bf30711d495786602208b94a7b10ae8c1251d62287c4721b28148b55cea72d1fcd1cbf66320c52bc5b7dbcc5550c5a806b82c9bc31b13ffaceac8b16e23e5a9283a9871dfa3436f87645f9", 0xf0, 0x20}, {&(0x7f0000000480)="e71d702f0e89f2507906a6adbd0df73794d07b960e1a60db4201ab90f70650309d8f25b9599366a987a6e656601f29bf9c6018c331a5c2107d4fc53c3e31d6a987b82eafbc5b5420045d5b0fdd9bcb7b72e53259e264660f55f9b93543e45e33ee886c7f7e8b87503c813934b1286db30681c45ba7ce20986bef9ec73163d0841270c33034e389da1299d1676575b122e208fb146c86300c120974c179f8eb66f4911befcab2fb2e814a3dd57956f0d9ff35e0d157c7d8e17f981d112117f288daa88c600b55255e", 0xc8, 0xc1}, {&(0x7f0000000580)="ba2a093ed5ba7cb234e3e74a9713c35076e5dd356ab4d07384c159875c0c3be8ad527781b92b8bcb6e095f0fad6b4a8eb19061d4c0afe10e3f2e5e2a1dbefd4b790f1e910174c5a902e5f2dd722be9365df3dd5efdd034c8dc468698e488214e46f8a0494d0056de5d4b268e800dbd8b5bd6476b950cf716a7f57dd3526cff544916265c2b8b", 0x86, 0x100000001}, {&(0x7f0000000640)="fb26abebf0d3444ab1dc03c1f352ac9b8921b98b6ac98985cb77957e63cb21a5c07ca0ca02f8abcdf18886810fb6906fc30fa50bac3f630210ce0d316a9c671c8d8f90cf9374045915", 0x49}, {&(0x7f0000000400)="3a56eef8fa9fb7194c254b252b", 0xd, 0x7}], 0x802000, &(0x7f0000000740)={[{@usrjquota}], [{@measure}, {@obj_user={'obj_user', 0x3d, 'fou\x00'}}, {@obj_type}, {@permit_directio}, {@obj_type={'obj_type', 0x3d, '-\xd8@@],&_:\x87^!'}}, {@uid_gt={'uid>', 0xffffffffffffffff}}, {@smackfsroot={'smackfsroot', 0x3d, ')$$\\-./\\'}}]}) renameat2(r3, &(0x7f00000000c0)='./file0/file0\x00', r4, &(0x7f00000007c0)='./file0\x00', 0x4) ioctl$PTP_ENABLE_PPS(r2, 0x40043d04, 0x1) renameat2(r1, &(0x7f0000000000)='./file0\x00', r2, &(0x7f0000000040)='./file0\x00', 0x2) 10:11:18 executing program 1: clock_settime(0x0, &(0x7f0000000000)={0x77359400}) clock_gettime(0x6, &(0x7f0000000040)) 10:11:18 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext3\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000480)=ANY=[@ANYBLOB='lazytime,test_dummy_encryption,max_dir_size_kb=0x000000000200,grpjquota=,min_batch_time=0x00000000000003ff,rootcontext\a']) getegid() [ 1899.179118][T26653] loop2: detected capacity change from 0 to 256 [ 1899.210921][T26654] loop5: detected capacity change from 0 to 264192 10:11:18 executing program 1: clock_settime(0x5, &(0x7f0000000040)={0x77359400}) [ 1899.275621][T26653] loop2: detected capacity change from 0 to 256 [ 1899.334901][T26671] loop5: detected capacity change from 0 to 264192 10:11:18 executing program 4: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000040)={0x2, &(0x7f0000000000)=[{0x25}, {}]}) sched_getaffinity(0xffffffffffffffff, 0x8, &(0x7f0000000080)) 10:11:18 executing program 0: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$team(&(0x7f0000000040), 0xffffffffffffffff) accept$packet(0xffffffffffffffff, &(0x7f0000000080)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f00000000c0)=0x14) ioctl$sock_ipv6_tunnel_SIOCDELTUNNEL(0xffffffffffffffff, 0x89f2, &(0x7f0000000180)={'ip6tnl0\x00', &(0x7f0000000100)={'syztnl0\x00', 0x0, 0x4, 0x9, 0x2, 0x200, 0x0, @loopback, @remote, 0x700, 0x10, 0x20, 0x88}}) getsockname$packet(0xffffffffffffffff, &(0x7f00000001c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000200)=0x14) accept$packet(0xffffffffffffffff, &(0x7f0000000240)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000280)=0x14) r6 = openat$vcsu(0xffffffffffffff9c, &(0x7f0000000400), 0x1, 0x0) sendmsg$TIPC_CMD_GET_REMOTE_MNG(r6, &(0x7f0000000500)={&(0x7f0000000440)={0x10, 0x0, 0x0, 0x4000000}, 0xc, &(0x7f00000004c0)={&(0x7f0000000480)={0x1c, 0x0, 0x4, 0x70bd26, 0x25dfdbfc, {}, ["", ""]}, 0x1c}, 0x1, 0x0, 0x0, 0x20004800}, 0x4044000) accept$packet(0xffffffffffffffff, &(0x7f00000002c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000300)=0x14) ioctl$sock_ipv6_tunnel_SIOCDELPRL(0xffffffffffffffff, 0x89f6, &(0x7f00000003c0)={'ip6tnl0\x00', &(0x7f0000000340)={'syztnl2\x00', 0x0, 0x4, 0x3, 0x90, 0x527, 0x78, @empty, @ipv4={'\x00', '\xff\xff', @remote}, 0x10, 0x1, 0x0, 0x7fff}}) sendmsg$TEAM_CMD_NOOP(r0, &(0x7f0000000940)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x10000}, 0xc, &(0x7f0000000900)={&(0x7f0000000980)=ANY=[@ANYBLOB="c8040000", @ANYRES16=r1, @ANYBLOB="00012cbd7000ffdbdf250000000008000100", @ANYRES32=0x0, @ANYBLOB="3801028040000100240001007072696f72697479000000000000000000000000000000000000000000000000050003000e000000080004000600000008000600", @ANYRES32=0x0, @ANYBLOB="4c000100240001006c625f74785f6d6574686f640000000000000000000000000000000000000000050003000500000019000400686173685f746f5f706f72745f6d617070696e670000000038000100240001006e6f746966795f70656572735f696e74657276616c0000000000000000000000050003000300000008000400ff07000038000100240001006d636173745f72656a6f696e5f636f756e740000000000000000000000000000050003000300000008000400ff03000038000100240001006e6f746966795f70656572735f636f756e7400000000000000000000000000000500030003000000080004008000000008000100", @ANYRES32=0x0, @ANYBLOB="0401028040000100240001007072696f72697479000000000000000000000000000000000000000000000000050003000e000000080004000600000008000600", @ANYRES32=r2, @ANYBLOB="40000100240001006c625f686173685f737461747300000000000000000000000000000000000000050003000b000000080004000100000008000700000000003c00010024000100757365725f6c696e6b75705f656e61626c65640000000000000000000000000005000300060000000400040008000600", @ANYRES32=r3, @ANYBLOB="44000100240001006d6f6465000000000000000000000000000000000000000000000000000000000500030005000000110004006163746976656261636b75700000000008000100", @ANYRES32=0x0, @ANYBLOB="b80002803c00010024000100757365725f6c696e6b75705f656e61626c65640000000000000000000000000005000300060000000400040008000600", @ANYRES32=0x0, @ANYBLOB="40000100240001007072696f7269747900000000000000000000000000000000000000000c000000050003000e000000080004000000004008000600", @ANYRES32=r4, @ANYBLOB="38000100240001006d636173745f72656a6f696e5f696e74657276616c00000000000000000000000500030003000000080004000500000008000100", @ANYRES32=0x0, @ANYBLOB="400002803c00810024000100757365725f6c696e6b75705f656e61090000000000000000deff000000000010050003000600000004000400080006000a2593f46d159f92ff69bc0359b6b772e91c3c038949a8620491d8087e3b6806d839b13f2bf343f1000ac4925c3df0bfb46e0cc69b23029e08483236e77953a775c0131a8b249482a259d6e9977f9c76f8651183a9001d0ce23c650b47865578766b13ea37df32a4456d064f904fb77aa081268905", @ANYRES32=0x0, @ANYBLOB="08000100", @ANYRES32=r5, @ANYBLOB="3c00028038000100240001006c625f73746174735f726566726573685f696e74657276616c00000000000000050003000300000008000400ed04000008000100", @ANYRES32=0x0, @ANYBLOB="4400028040000100240001007072696f72697479000000000000000000000000000000000000000000000000050003000e000000080004000700000008000600", @ANYRES32=0x0, @ANYBLOB="08000100", @ANYRES32=r7, @ANYBLOB="800002803c00010024000100656e61626c65640000000000000000000000000000000000000000000000000005000300060000000400040008000600", @ANYRES32=0x0, @ANYBLOB="40000100240001006c625f74785f686173685f746f5f706f72745f6d617070696e67000000000000050003000300000008000400", @ANYRES32=r8, @ANYBLOB="080007000000000008000100", @ANYRES32=0x0, @ANYBLOB="400002803c000100240001006c625f74785f6d6574686f6400000000000000000000000000000000000000000500030005000000090004006861736800000000"], 0x4c8}}, 0x4800) 10:11:18 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext3\x00', &(0x7f0000000040)='\x00', 0x0, 0x0, 0x0, 0x10000, &(0x7f0000000180)=ANY=[@ANYBLOB="cf7e314fd898624f8a4ebe29033d5104a34bb6ad517af6dc52b1a5e1912aaa156122ea2407c3960ddcb2f19d50de419c6c824e4098ce2009f26b8613fe199f358f495c59b519c4310b4899a83ef484f800b70f35b9abe124a946193a6152d978c758c38d5138fd71ec63fd1a5d11f210f0cf7547679100585fc003cff5affa8891b3a5b14f97cacd56326bd87eb950a8f7ee5b"]) r0 = syz_genetlink_get_family_id$tipc(&(0x7f00000000c0), 0xffffffffffffffff) sendmsg$TIPC_CMD_SET_LINK_PRI(0xffffffffffffffff, &(0x7f0000000240)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f0000000140)={&(0x7f0000000100)={0x30, r0, 0x8, 0x70bd2c, 0x25dfdbff, {{}, {}, {0x14, 0x18, {0x7fffffff, @bearer=@udp='udp:syz2\x00'}}}, ["", "", "", "", "", "", ""]}, 0x30}, 0x1, 0x0, 0x0, 0x800}, 0x4) 10:11:18 executing program 1: clock_settime(0x3, &(0x7f0000000000)={0x77359400}) clock_gettime(0x4, &(0x7f0000000040)) 10:11:18 executing program 2: r0 = syz_mount_image$ext4(0x0, &(0x7f0000000440)='./file0\x00', 0x0, 0x0, 0x0, 0x4880, 0x0) setsockopt$packet_buf(0xffffffffffffffff, 0x107, 0x16, &(0x7f0000000000)="adb46696919d58f726a32b65c800f8712045f02848c71985a105c7f6d53ddba61b9d14fffd8d5ec44c41c9a3aa864e3f13ac5d2dae6baece1bc6591aeb7500ef3ac10148ffab6682fad4f630c1b3532c47e9a91f1fac383729a003a354d8b31b8ba6afb1c86409845d7a776c5a32", 0x6e) r1 = openat$dir(0xffffffffffffff9c, &(0x7f0000000300)='./file0\x00', 0x0, 0x0) renameat2(r1, &(0x7f0000000080)='./file0\x00', r1, &(0x7f00000000c0)='./file0\x00', 0x4) unlinkat(r0, &(0x7f0000000100)='./file0\x00', 0x200) 10:11:18 executing program 5: syz_mount_image$ext4(0x0, &(0x7f0000000440)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) openat$dir(0xffffffffffffff9c, &(0x7f0000000300)='./file0\x00', 0x0, 0x0) unlinkat(0xffffffffffffff9c, &(0x7f0000000100)='./file0\x00', 0x200) r0 = openat$ptp0(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) ioctl$PTP_EXTTS_REQUEST(r0, 0x40103d02, &(0x7f00000000c0)) ioctl$PTP_SYS_OFFSET(r0, 0x43403d05, &(0x7f0000000480)={0x7}) r1 = openat$vcsu(0xffffffffffffff9c, &(0x7f0000000240), 0x105000, 0x0) ioctl$PTP_PEROUT_REQUEST2(r1, 0x40383d0c, &(0x7f0000000280)={{0x0, 0x401}, {0x401, 0x9}, 0x9, 0x1}) fchmodat(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', 0x1b0) r2 = openat$incfs(0xffffffffffffffff, &(0x7f00000002c0)='.log\x00', 0x581200, 0x123) accept4$packet(0xffffffffffffffff, &(0x7f0000000400)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000000440)=0x14, 0x0) r4 = openat$vcsu(0xffffffffffffff9c, &(0x7f0000000340), 0x200000, 0x0) sendmsg$TEAM_CMD_OPTIONS_SET(r4, &(0x7f0000000840)={&(0x7f0000000380)={0x10, 0x0, 0x0, 0x200000}, 0xc, &(0x7f00000003c0)={&(0x7f00000007c0)={0x58, 0x0, 0x4, 0x70bd2c, 0x25dfdbfb, {}, [{{0x8, 0x1, r3}, {0x3c, 0x2, 0x0, 0x1, [{0x38, 0x1, @notify_peers_count={{0x24}, {0x5}, {0x8, 0x4, 0x3}}}]}}]}, 0x58}}, 0x0) fchmodat(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0x2c) r5 = accept$packet(r2, &(0x7f0000000140), &(0x7f0000000180)=0x14) accept4$packet(r5, &(0x7f00000001c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @multicast}, &(0x7f0000000200)=0x14, 0x80000) r6 = openat$ptp0(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) ioctl$PTP_EXTTS_REQUEST(r6, 0x40103d02, &(0x7f00000000c0)) ioctl$PTP_SYS_OFFSET_PRECISE(r6, 0xc0403d08, &(0x7f0000000880)) [ 1899.852270][ T22] audit: type=1326 audit(1633169478.878:652): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=26621 comm="syz-executor.4" exe="/root/syz-executor.4" sig=9 arch=c000003e syscall=231 compat=0 ip=0x7f9dee22a8d9 code=0x0 10:11:18 executing program 1: clock_settime(0x0, &(0x7f0000000000)={0x77359400}) clock_nanosleep(0x4, 0x0, &(0x7f0000000040)={0x77359400}, &(0x7f0000000080)) clock_settime(0x0, &(0x7f00000000c0)) 10:11:19 executing program 2: getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000001c0)={{{@in=@broadcast, @in6=@empty}}, {{@in6=@private2}, 0x0, @in=@local}}, &(0x7f0000000000)=0xe8) r0 = syz_mount_image$ext4(0x0, &(0x7f0000000440)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) openat$dir(0xffffffffffffff9c, &(0x7f0000000300)='./file0\x00', 0x0, 0x0) unlinkat(0xffffffffffffff9c, &(0x7f0000000100)='./file0\x00', 0x200) unlinkat(r0, &(0x7f0000000180)='./file0\x00', 0x200) 10:11:19 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x0, &(0x7f0000000040)) 10:11:19 executing program 4: shmget(0x0, 0x4000, 0x400, &(0x7f0000ff9000/0x4000)=nil) prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000040)={0x2, &(0x7f0000000000)=[{0x25}, {}]}) 10:11:19 executing program 5: r0 = syz_mount_image$ext4(0x0, &(0x7f0000000440)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) openat$dir(0xffffffffffffff9c, &(0x7f0000000300)='./file0\x00', 0x24100, 0x0) r1 = openat$incfs(r0, &(0x7f0000000040)='.log\x00', 0x0, 0x36) symlinkat(&(0x7f0000000000)='./file0\x00', r1, &(0x7f0000000080)='./file0\x00') unlinkat(0xffffffffffffff9c, &(0x7f0000000100)='./file0\x00', 0x200) [ 1900.043747][T26730] ================================================================== [ 1900.051835][T26730] BUG: KCSAN: data-race in do_settimeofday64 / ktime_get_real_seconds [ 1900.059987][T26730] [ 1900.062297][T26730] write to 0xffffffff841669b8 of 8 bytes by task 26729 on cpu 0: [ 1900.069995][T26730] do_settimeofday64+0x404/0x5a0 [ 1900.074922][T26730] do_sys_settimeofday64+0x17b/0x1a0 [ 1900.080210][T26730] posix_clock_realtime_set+0x13/0x20 [ 1900.085572][T26730] __x64_sys_clock_settime+0x163/0x190 [ 1900.091019][T26730] do_syscall_64+0x44/0xa0 [ 1900.095425][T26730] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 1900.101398][T26730] [ 1900.103787][T26730] read to 0xffffffff841669b8 of 8 bytes by task 26730 on cpu 1: [ 1900.111502][T26730] ktime_get_real_seconds+0x11/0x20 [ 1900.116693][T26730] find_inode_bit+0x1f9/0x330 [ 1900.121355][T26730] __ext4_new_inode+0xc9a/0x2fd0 [ 1900.126282][T26730] ext4_mkdir+0x28a/0x760 [ 1900.130602][T26730] vfs_mkdir+0x2c3/0x3e0 [ 1900.134834][T26730] do_mkdirat+0x12e/0x2c0 [ 1900.139157][T26730] __x64_sys_mkdir+0x40/0x50 [ 1900.143761][T26730] do_syscall_64+0x44/0xa0 [ 1900.148203][T26730] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 1900.154103][T26730] [ 1900.156500][T26730] value changed: 0x0000000061583047 -> 0x0000000077359400 [ 1900.163764][T26730] [ 1900.166157][T26730] Reported by Kernel Concurrency Sanitizer on: [ 1900.172287][T26730] CPU: 1 PID: 26730 Comm: syz-executor.2 Not tainted 5.15.0-rc3-syzkaller #0 [ 1900.181043][T26730] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 10:11:19 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext3\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000080)=ANY=[@ANYBLOB="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"]) r0 = openat$vcsu(0xffffffffffffff9c, &(0x7f0000000000), 0x5200, 0x0) fchmodat(r0, &(0x7f0000000040)='./file0\x00', 0x1b0) r1 = openat$incfs(r0, &(0x7f00000002c0)='.log\x00', 0x581200, 0x123) r2 = openat$vcsu(0xffffffffffffff9c, &(0x7f00000004c0), 0x208300, 0x0) sendmsg$TIPC_CMD_ENABLE_BEARER(r2, &(0x7f00000005c0)={&(0x7f0000000500)={0x10, 0x0, 0x0, 0x800}, 0xc, &(0x7f0000000580)={&(0x7f0000000540)={0x34, 0x0, 0x100, 0x70bd26, 0x25dfdbfe, {{}, {}, {0x18, 0x17, {0x1e, 0x0, @l2={'eth', 0x3a, 'vxcan1\x00'}}}}, ["", "", "", "", "", ""]}, 0x34}}, 0x4) syz_genetlink_get_family_id$fou(&(0x7f0000000300), r1) r3 = syz_mount_image$ext4(&(0x7f0000000240)='ext4\x00', &(0x7f0000000280)='./file0\x00', 0x0, 0x0, &(0x7f0000000340), 0x4c8, &(0x7f0000000400)={[{@stripe}, {@noblock_validity}, {@barrier}, {@nodelalloc}, {@nogrpid}, {@noload}, {@noblock_validity}], [{@pcr={'pcr', 0x3d, 0x39}}, {@fscontext={'fscontext', 0x3d, 'user_u'}}, {@defcontext={'defcontext', 0x3d, 'unconfined_u'}}, {@seclabel}]}) renameat2(r3, &(0x7f0000000380)='./file0\x00', 0xffffffffffffffff, &(0x7f00000003c0)='./file1\x00', 0x2) openat$dir(0xffffffffffffff9c, &(0x7f0000000340)='./file0\x00', 0x10900, 0x2c) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY_ALL_USERS(r1, 0xc0406619, &(0x7f0000000200)={@id={0x2, 0x0, @d}}) prctl$PR_MPX_ENABLE_MANAGEMENT(0x2b) [ 1900.191081][T26730] ================================================================== 10:11:19 executing program 5: r0 = syz_mount_image$ext4(0x0, &(0x7f0000000440)='./file0\x00', 0x0, 0x0, 0x0, 0x289c000, 0x0) openat$dir(0xffffffffffffff9c, &(0x7f0000000100)='./file0\x00', 0x10001, 0x8) futimesat(r0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000040)={{0x0, 0xea60}, {0x77359400}}) getdents(r0, &(0x7f0000000140)=""/190, 0xbe) unlinkat(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x200) 10:11:19 executing program 4: r0 = add_key$keyring(&(0x7f0000000100), &(0x7f00000000c0)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffff8) keyctl$KEYCTL_MOVE(0x1e, r0, 0x0, 0x0, 0x0) r1 = add_key$keyring(&(0x7f0000000080), &(0x7f00000000c0)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$KEYCTL_MOVE(0x1e, r1, 0x0, 0x0, 0x0) r2 = add_key$keyring(&(0x7f0000000080), &(0x7f00000000c0)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$KEYCTL_MOVE(0x1e, r2, 0x0, 0x0, 0x0) keyctl$search(0xa, r1, &(0x7f0000000080)='cifs.idmap\x00', &(0x7f0000000140)={'syz', 0x3}, r2) keyctl$clear(0x7, r0) socket$nl_generic(0x10, 0x3, 0x10) prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000040)={0x2, &(0x7f0000000000)=[{0x25}, {0x0, 0x0, 0xfd}]}) 10:11:19 executing program 0: accept4$packet(0xffffffffffffffff, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000040)=0x14, 0x80800) [ 1900.340819][T26761] EXT4-fs (loop3): VFS: Can't find ext4 filesystem 10:11:19 executing program 0: r0 = fork() sched_rr_get_interval(r0, &(0x7f0000000100)) r1 = fork() sched_rr_get_interval(r1, &(0x7f0000000100)) clock_settime(0x6, &(0x7f0000000280)) sched_setparam(r1, &(0x7f0000000240)=0x3) fork() ptrace$peeksig(0x4209, r0, &(0x7f0000000080)={0xfffffffffffffffa, 0x1, 0x3}, &(0x7f00000000c0)=[{}, {}, {}]) prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000040)={0x2, &(0x7f0000000000)=[{0x15}, {}]}) 10:11:19 executing program 5: syz_mount_image$ext4(0x0, &(0x7f0000000440)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) openat$dir(0xffffffffffffff9c, &(0x7f0000000300)='./file0\x00', 0x0, 0x0) unlinkat(0xffffffffffffff9c, &(0x7f0000000000)='./file0/file0\x00', 0x200) 10:11:19 executing program 4: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000040)={0x2, &(0x7f0000000000)=[{0x25}, {}]}) prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f00000000c0)={0x5, &(0x7f0000000080)=[{0xba, 0x0, 0x5, 0x4eb3}, {0x5, 0x8, 0x40, 0x8}, {0x4, 0x1, 0xa5, 0x7f}, {0x20, 0x80, 0x3, 0x4}, {0x6, 0x1, 0x0, 0xff}]}) 10:11:19 executing program 3: sendmsg$NL802154_CMD_SET_CCA_MODE(0xffffffffffffffff, &(0x7f00000007c0)={&(0x7f0000000440)={0x10, 0x0, 0x0, 0x40}, 0xc, &(0x7f00000004c0)={&(0x7f0000000480)={0x34, 0x0, 0x400, 0x70bd28, 0x25dfdbfd, {}, [@NL802154_ATTR_WPAN_DEV={0xc}, @NL802154_ATTR_WPAN_DEV={0xc, 0x6, 0x200000002}, @NL802154_ATTR_WPAN_PHY={0x8, 0x1, 0x1}]}, 0x34}, 0x1, 0x0, 0x0, 0x10}, 0x4000000) sendmsg$TIPC_CMD_DISABLE_BEARER(0xffffffffffffffff, &(0x7f00000008c0)={&(0x7f0000000800)={0x10, 0x0, 0x0, 0x400}, 0xc, &(0x7f0000000880)={&(0x7f0000000840)={0x2c, 0x0, 0x100, 0x70bd2c, 0x25dfdbfe, {{}, {}, {0x10, 0x13, @udp='udp:syz2\x00'}}, ["", "", ""]}, 0x2c}, 0x1, 0x0, 0x0, 0x8000}, 0x40004) prctl$PR_SET_TIMERSLACK(0x1d, 0x0) kexec_load(0x1, 0x8, &(0x7f0000000600)=[{&(0x7f0000000080)="1ad8fd99f442d521f49acf08ff3d8efaef4bd2760f5f24b7afdce0e3681bbaec520bee29823acb247303e66ddda4e1627c27c875728d5ccec56c701f8440c7b7dc3c05a59826855d7f1c239e68d4d6e0b4b793b87a41a2410f08797dd9caa517beaa87574043ff9ced9cb6a7709978d88b998596a56127bf67da8dc187d01022d82121e976ad91b541dc702102a15a67d1790ae41491b357683a0f", 0x9b, 0x4, 0x2}, {&(0x7f0000000140)="4b49521f330993c4229743624c01846bd2d556b1c4aa3824dac1f908856878d49bd5d3d603afcd5742aebcc15cd7cb5c8c0ea19c41fdb75e9f3f9bed0acba87efaeea5065e93c8d773d5d3108c399a0b5270207be0d0724d50a6cd49e4fffe2791f34a7339208441f04b26ab0f88ad40a15cc60199723ce1b2f5d5c8a1e198339b5e3a54bc477f343f2760d719ce2384ab578c7d015b0b3abf6c295ad002df135ab0ee204446a678bcba2b378ee1", 0xae, 0x92a, 0x4a82}, {&(0x7f0000000200)="72e29ba68f3d158cda1a85094434837b0237b2441b118ff400b9e94906ee490c64b45dd8cb5cfcdbb29d6a46f630c1f999c564c9d2f70f9fed42d535277b001c683d6a95a80d4e87e913d9c2d42c37a8af2e2be4ad1c20489efc006d7ca7e2c1e3773cbedfb5fb3cac1b5967cb592ea5e2edafac5490039a92ed142494c2352a0f8fe228fd21995b7cb8a0ced4d1ee2d3336f54ea88b6db49af2a0268369a6f2c607889fd2d1dd319d7066d6a9f1ddcac0", 0xb1, 0x800, 0xc5}, {&(0x7f00000002c0)="a2cb0a696b8a0ec12703700c804c445d5389ffced82daa5a27a3bffa", 0x1c, 0x9, 0x5}, {&(0x7f0000000300)="f8407e3a3e63b37a65f50aa3985d289c2313d69328d0822342fc7f5204f1fc62fcec35d9241b7b51056821be7b89f859cf792d267332c76e4f9f753a99b2f9b671567de0b2be787ba6da2a21cef84f9cc3938ed970ec8e57465718e18868", 0x5e, 0x1ff, 0xfffffffffffffff2}, {&(0x7f0000000380)="82d8f39ea8be601a146f37449ccbe28c1eb6", 0x12, 0x7, 0x39}, {&(0x7f0000000500)="8066860c5f853d7b514107bf5b23ca1fcd56315d0164661f08a953e98278c9f1fb7602114b6ccc27b5fe803976865628573c4f8f4cdd54ed2707d479c81db84d490bf5b7f39678ec3e21c679a0939246d2c646aa5bf61e88018d7d5f2a43684b6723e9ad01c2f07bd829ca3e4bf88f5e62a1051d2ffbb34b3424970219c81bfd39a084af9f0ec71f3e61da0b58407dddb8e1698c6e3a81a2b07dc3c49fc281ec772ddd14f1c2fd7b05b3aeec64a2767bc3092c99f7d9044042564b1aa72cf33bf4bd3475dd7fd8b1b49d", 0xca, 0x3, 0x5}, {&(0x7f00000003c0)="bec66851596ae1ff8d01deadd52c1174d146665bcf533085f91ed522270fb30e23b102959d90716ef7e1e6f41c12b7520a739c744d2e6cbede231c267c4239a9c9cb33ac133ba084c0ed9c16ddf61ea0d6998e9b09c5bc26ed0d72fe49fdeb24242fa054eca62f68a26a03457884ee8c4c4bd1940ac8b7f005db97024547", 0x7e, 0x9}], 0x30000) syz_mount_image$ext4(&(0x7f0000000000)='ext3\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000700)=ANY=[@ANYBLOB='lazytime,test_dummy_encryption,max_dir_size_kb=0x000000000200,grpjquota=,min_batch_time=0x00000000000003ff,rootcontext\a', @ANYRESDEC, @ANYRESDEC, @ANYRES32]) 10:11:19 executing program 2: syz_mount_image$ext4(0x0, &(0x7f0000000440)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r0 = openat$dir(0xffffffffffffff9c, &(0x7f0000000300)='./file0\x00', 0x0, 0x0) unlinkat(0xffffffffffffff9c, &(0x7f0000000100)='./file0\x00', 0x200) faccessat2(r0, &(0x7f0000000000)='./file0\x00', 0x20, 0x1000) 10:11:19 executing program 4: prctl$PR_SET_SECCOMP(0x16, 0x1, &(0x7f0000000040)={0x2, &(0x7f0000000000)=[{0x25}, {}]}) sysfs$3(0x3) 10:11:19 executing program 1: symlinkat(&(0x7f0000000040)='./file0\x00', 0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00') r0 = openat$vcsu(0xffffffffffffff9c, &(0x7f0000000000), 0x5200, 0x0) fchmodat(r0, &(0x7f0000000040)='./file0\x00', 0x1b0) openat$incfs(r0, &(0x7f00000002c0)='.log\x00', 0x581200, 0x123) accept4$packet(r0, &(0x7f0000000400)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000000440)=0x14, 0x100000) r2 = socket(0x1f, 0x4, 0x40) ioctl$sock_ipv6_tunnel_SIOCDELPRL(r0, 0x89f6, &(0x7f00000001c0)={'ip6gre0\x00', &(0x7f0000000140)={'syztnl1\x00', r1, 0x4, 0x80, 0xfa, 0x80000001, 0xf765d400b4436666, @remote, @private1, 0x40, 0x1, 0x6, 0x5}}) getpeername$packet(r0, &(0x7f0000000200)={0x11, 0x0, 0x0}, &(0x7f0000000240)=0x14) sendmsg$TEAM_CMD_OPTIONS_GET(r2, &(0x7f0000000300)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x400}, 0xc, &(0x7f0000000280)={&(0x7f0000000480)={0x5ec, 0x0, 0x8, 0x70bd27, 0x25dfdbfe, {}, [{{0x8, 0x1, r1}, {0x80, 0x2, 0x0, 0x1, [{0x3c, 0x1, @enabled={{{0x24}, {0x5}, {0x4}}, {0x8, 0x6, r1}}}, {0x40, 0x1, @lb_tx_hash_to_port_mapping={{{0x24}, {0x5}, {0x8, 0x4, r1}}, {0x8}}}]}}, {{0x8, 0x1, r3}, {0x290, 0x2, 0x0, 0x1, [{0x74, 0x1, @bpf_hash_func={{0x24}, {0x5}, {0x44, 0x4, [{0x3, 0x6, 0x2, 0x9}, {0x7, 0x40, 0xc4, 0x1ff}, {0x3ba0, 0x5, 0x6, 0x101}, {0x815, 0x4, 0x1, 0x6}, {0x6, 0x2, 0x1, 0x1}, {0x3ff, 0x4c, 0x2, 0x7}, {0x1, 0x9, 0x0, 0xfffff001}, {0x2, 0x81, 0x0, 0x6}]}}}, {0x3c, 0x1, @lb_tx_method={{0x24}, {0x5}, {0x9, 0x4, 'hash\x00'}}}, {0x38, 0x1, @activeport={{0x24}, {0x5}, {0x8, 0x4, r4}}}, {0x38, 0x1, @activeport={{0x24}, {0x5}, {0x8, 0x4, r1}}}, {0x38, 0x1, @activeport={{0x24}, {0x5}, {0x8, 0x4, r1}}}, {0x4c, 0x1, @bpf_hash_func={{0x24}, {0x5}, {0x1c, 0x4, [{0x40, 0x0, 0x2c, 0x7}, {0xfffc, 0x6, 0x20, 0x1e16}, {0x4c, 0xe6, 0x0, 0x66b}]}}}, {0x3c, 0x1, @user_linkup_enabled={{{0x24}, {0x5}, {0x4}}, {0x8}}}, {0x38, 0x1, @mcast_rejoin_count={{0x24}, {0x5}, {0x8, 0x4, 0x76}}}, {0x38, 0x1, @mcast_rejoin_count={{0x24}, {0x5}, {0x8, 0x4, 0x6}}}, {0x3c, 0x1, @bpf_hash_func={{0x24}, {0x5}, {0xc, 0x4, [{0x800, 0x3f, 0x1, 0x200}]}}}]}}, {{0x8, 0x1, r1}, {0xbc, 0x2, 0x0, 0x1, [{0x38, 0x1, @mcast_rejoin_interval={{0x24}, {0x5}, {0x8, 0x4, 0x2}}}, {0x40, 0x1, @name={{0x24}, {0x5}, {0x10, 0x4, 'loadbalance\x00'}}}, {0x40, 0x1, @queue_id={{{0x24}, {0x5}, {0x8, 0x4, 0x8}}, {0x8, 0x6, r1}}}]}}, {{0x8, 0x1, r1}, {0x1a8, 0x2, 0x0, 0x1, [{0x3c, 0x1, @user_linkup={{{0x24}, {0x5}, {0x4}}, {0x8, 0x6, r1}}}, {0x38, 0x1, @notify_peers_interval={{0x24}, {0x5}, {0x8, 0x4, 0x7f}}}, {0x38, 0x1, @notify_peers_count={{0x24}, {0x5}, {0x8, 0x4, 0x6}}}, {0x38, 0x1, @mcast_rejoin_count={{0x24}, {0x5}, {0x8, 0x4, 0x800}}}, {0x40, 0x1, @lb_port_stats={{{0x24}, {0x5}, {0x8, 0x4, 0x7}}, {0x8, 0x6, r1}}}, {0x40, 0x1, @priority={{{0x24}, {0x5}, {0x8}}, {0x8, 0x6, r1}}}, {0x40, 0x1, @name={{0x24}, {0x5}, {0xf, 0x4, 'roundrobin\x00'}}}]}}, {{0x8}, {0x3c, 0x2, 0x0, 0x1, [{0x38, 0x1, @mcast_rejoin_count={{0x24}, {0x5}, {0x8, 0x4, 0x4}}}]}}]}, 0x5ec}, 0x1, 0x0, 0x0, 0x8080}, 0x0) fchmodat(r0, &(0x7f00000000c0)='./file0/file0\x00', 0x5) clock_settime(0x0, &(0x7f0000000000)={0x77359400}) 10:11:19 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext3\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000080)=ANY=[@ANYBLOB="6c617a7974696d652c746573745f64756d6d795f656e6372797074696f6e2c6d61785f6469725f73697a655f6b623d30783030303030303030303230302c6772706a71756f74613d2c6d696e5f62617463685f74696d653d3078303030303030303030303030303366662c726f6f74636f6e7465787407741ce2e1a7b03b7b5de3313de52f243cf07ae1b0544adaf74fb6f4c511eea5e9e6d5afcf93f8fe56be513047e9b0bfa69815cda260ae5caf3832e5f5d50d5a5e45c10094fa1f7e43f6f4"]) 10:11:19 executing program 5: syz_mount_image$ext4(0x0, &(0x7f0000000440)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) openat$dir(0xffffffffffffff9c, &(0x7f0000000300)='./file1\x00', 0x0, 0x0) r0 = openat$vcsu(0xffffffffffffff9c, &(0x7f0000000340), 0x301, 0x0) ioctl$PTP_ENABLE_PPS(r0, 0x40043d04, 0x1) faccessat(0xffffffffffffffff, &(0x7f0000000080)='./file0\x00', 0xa3) ioctl$FS_IOC_GET_ENCRYPTION_KEY_STATUS(r0, 0xc080661a, &(0x7f0000000000)={@id={0x2, 0x0, @auto="c6de92a4be869d1d30ad238c5797f659"}}) unlinkat(0xffffffffffffff9c, &(0x7f0000000100)='./file0\x00', 0x200) r1 = openat$vcsu(0xffffffffffffff9c, &(0x7f00000000c0), 0x60100, 0x0) unlinkat(r1, &(0x7f0000000140)='./file0\x00', 0x200) 10:11:19 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000040)={0x2, &(0x7f0000000000)=[{0x15}, {}]}) r0 = accept4$packet(0xffffffffffffffff, &(0x7f0000000080)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000001180)=0x14, 0x80000) setsockopt$packet_buf(r0, 0x107, 0x1, &(0x7f0000000100)="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", 0x1000) prctl$PR_SET_SECCOMP(0x16, 0x0, &(0x7f0000001140)={0x2, &(0x7f0000001100)=[{0x6, 0x0, 0x63, 0x1}, {0x8, 0xfe, 0x7f, 0xffff}]}) 10:11:19 executing program 2: syz_mount_image$ext4(0x0, &(0x7f0000000440)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) openat$dir(0xffffffffffffff9c, &(0x7f0000000300)='./file0\x00', 0x0, 0x0) r0 = openat$vcsu(0xffffffffffffff9c, &(0x7f0000000000), 0x20040, 0x0) futimesat(r0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000080)={{0x0, 0xea60}, {0x77359400}}) unlinkat(0xffffffffffffff9c, &(0x7f0000000100)='./file0\x00', 0x200) 10:11:19 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext3\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000480)=ANY=[@ANYBLOB='lazytime,test_dummy_encryption,max_dir_size_kb=0x000000000200,grpjquota=,min_batch_time=0x00000000000003ff,rootcontext\a']) r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NBD_CMD_CONNECT(r0, &(0x7f00000013c0)={&(0x7f00000012c0), 0xc, &(0x7f0000001380)={0x0}}, 0xc6c3dbe86af1a089) sendmsg$NLBL_CALIPSO_C_ADD(r0, &(0x7f0000000140)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f0000000100)={&(0x7f00000000c0)={0x34, 0x0, 0x200, 0x70bd2a, 0x25dfdbfb, {}, [@NLBL_CALIPSO_A_MTYPE={0x8}, @NLBL_CALIPSO_A_DOI={0x8, 0x1, 0x1}, @NLBL_CALIPSO_A_DOI={0x8, 0x1, 0x1}, @NLBL_CALIPSO_A_DOI={0x8, 0x1, 0x3}]}, 0x34}, 0x1, 0x0, 0x0, 0x4000}, 0x40000) [ 1900.673791][ T22] audit: type=1326 audit(1633169479.705:653): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=26828 comm="syz-executor.4" exe="/root/syz-executor.4" sig=9 arch=c000003e syscall=231 compat=0 ip=0x7f9dee22a8d9 code=0x0 10:11:19 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000040)={0x2, &(0x7f0000000000)=[{0x15}, {}]}) r0 = openat$vcsu(0xffffffffffffff9c, &(0x7f0000000000), 0x5200, 0x0) fchmodat(r0, &(0x7f0000000040)='./file0\x00', 0x1b0) r1 = openat$incfs(r0, &(0x7f00000002c0)='.log\x00', 0x581200, 0x123) syz_genetlink_get_family_id$fou(&(0x7f0000000300), r1) renameat2(r1, &(0x7f0000000380)='./file0\x00', 0xffffffffffffffff, &(0x7f00000003c0)='./file1\x00', 0x0) r2 = openat$vcsu(0xffffffffffffff9c, &(0x7f0000000000), 0x5200, 0x0) fchmodat(r2, &(0x7f0000000040)='./file0\x00', 0x1b0) openat$incfs(r2, &(0x7f00000002c0)='.log\x00', 0x581200, 0x123) accept4$packet(r2, &(0x7f0000000400)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000000440)=0x14, 0x100000) openat$incfs(r2, &(0x7f0000000340)='.pending_reads\x00', 0x218240, 0x101) socketpair(0x11, 0x6, 0x8001, &(0x7f0000000480)) execveat(r1, &(0x7f0000000080)='./file0\x00', &(0x7f0000000140)=[&(0x7f00000000c0)='/\'\x00', &(0x7f0000000100)='\x00'], &(0x7f0000000280)=[&(0x7f0000000180)='\x00', &(0x7f00000001c0)='#M:\x00', &(0x7f0000000200)='-\t*(\x02+*{)&(\xb6\x00', &(0x7f0000000240)='c+#.%((\x00'], 0x1000) 10:11:19 executing program 3: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NBD_CMD_CONNECT(r0, &(0x7f00000013c0)={&(0x7f00000012c0), 0xc, &(0x7f0000001380)={0x0}}, 0xc6c3dbe86af1a089) r1 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NBD_CMD_CONNECT(r1, &(0x7f00000013c0)={&(0x7f00000012c0), 0xc, &(0x7f0000001380)={0x0}}, 0xc6c3dbe86af1a089) r2 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NBD_CMD_CONNECT(r2, &(0x7f00000013c0)={&(0x7f00000012c0), 0xc, &(0x7f0000001380)={0x0}}, 0xc6c3dbe86af1a089) syz_mount_image$ext4(&(0x7f0000000000)='ext3\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)=ANY=[@ANYRESHEX=r0, @ANYRESHEX, @ANYRESOCT=r1, @ANYRES32=r0, @ANYRESHEX=r2]) 10:11:19 executing program 5: syz_mount_image$ext4(0x0, &(0x7f0000000440)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) openat$dir(0xffffffffffffff9c, &(0x7f0000000300)='./file0\x00', 0x0, 0x0) unlinkat(0xffffffffffffff9c, &(0x7f0000000100)='./file0\x00', 0x200) sendmsg$NL802154_CMD_DEL_SEC_DEV(0xffffffffffffffff, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x10000000}, 0xc, &(0x7f0000000040)={&(0x7f0000000140)={0x40, 0x0, 0x100, 0x70bd29, 0x25dfdbfb, {}, [@NL802154_ATTR_WPAN_DEV={0xc, 0x6, 0x300000003}, @NL802154_ATTR_SEC_DEVICE={0x10, 0x23, 0x0, 0x1, {0xc, 0x4, {0xaaaaaaaaaaaa0302}}}, @NL802154_ATTR_SEC_DEVICE={0x10, 0x23, 0x0, 0x1, {0xc, 0x4, {0xaaaaaaaaaaaa0302}}}]}, 0x40}, 0x1, 0x0, 0x0, 0x20048000}, 0x8811) 10:11:19 executing program 1: clock_settime(0x0, &(0x7f0000000080)={0x77359400}) r0 = openat$vcsu(0xffffffffffffff9c, &(0x7f0000000000), 0x5200, 0x0) fchmodat(r0, &(0x7f0000000040)='./file0\x00', 0x1b0) openat$incfs(r0, &(0x7f00000002c0)='.log\x00', 0x581200, 0x123) accept4$packet(r0, &(0x7f0000000400)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000000440)=0x14, 0x100000) setsockopt$packet_buf(r0, 0x107, 0x2, &(0x7f0000000040)="8e85b1782c5f47395a864cabe690aa0b2892c6d188630a94299e0df914ef2e8ea789e4", 0x23) 10:11:19 executing program 2: r0 = syz_mount_image$ext4(0x0, &(0x7f0000000440)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) getdents64(r0, &(0x7f0000000040)=""/47, 0x2f) faccessat2(r0, &(0x7f0000000000)='./file1\x00', 0x110, 0x600) openat$dir(0xffffffffffffff9c, &(0x7f0000000300)='./file0\x00', 0x0, 0x0) unlinkat(0xffffffffffffff9c, &(0x7f0000000100)='./file0\x00', 0x200) [ 1901.504669][ T22] audit: type=1326 audit(1633169480.538:654): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=26828 comm="syz-executor.4" exe="/root/syz-executor.4" sig=9 arch=c000003e syscall=231 compat=0 ip=0x7f9dee22a8d9 code=0x0 10:11:20 executing program 4: prctl$PR_SET_SECCOMP(0x16, 0x1, &(0x7f0000000040)={0x20000000000000f2, &(0x7f0000000000)=[{0x3, 0x7, 0x80, 0xffff}, {0x7e1, 0x3f, 0x3f, 0x81}]}) 10:11:20 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext3\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000480)=ANY=[@ANYBLOB='lazytime,test_dummy_encryption,max_dir_size_kb=0x000000000200,grpjquota=,min_batch_time=0x00000000000003ff,rootcontext\a']) r0 = openat$dir(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x180, 0x9a) r1 = syz_mount_image$ext4(&(0x7f0000000100)='ext2\x00', &(0x7f0000000140)='./file1\x00', 0x80, 0x8, &(0x7f0000002700)=[{&(0x7f0000000500)="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", 0x1000, 0x7}, {&(0x7f0000000180)="e7e1c3ca552732362aef3af8476887ddb398a8fc9712e8f2361e2fc73bd1926a6f1005bdc57b7e05db58e15991916a2da21fb16a18b1f0eb5afa6f099386a7ff1e1b26243b02886198e2925913", 0x4d, 0x6}, {&(0x7f0000000200)="4687c3c5fdf0a626a6cda5902b7a748e744a09ebd238e12afd9818e3eafe4a8aaa651390020fa5a94fc75992505903622391aec0047acdafa95b982bb4d4", 0x3e, 0xfffffffffffffff8}, {&(0x7f0000000240)="3610f748d4e0d0a044533f739574d9476b4eed465cb90a7e2bf3a2c329e9123ef7087eb0541c477ddc0b2b517daba67a4543fc979537d72b44e62bf0601a51171f2de9d3f1fc25a5da67ba342371eb074fc0579e4492ecbd600d7ec2c9927f9611fdbde4b7898f9ce7319484878a0ce95a65b5bc0f4c60047ac3b769f2c7282d06a4828f857327b5380306014deda509d2db99a55b", 0x95, 0x3f}, {&(0x7f0000000300)="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", 0xfb, 0x8000}, {&(0x7f0000001500)="df3ddbbd22442c5451262ea24a3c3f8195c61db9d40a35352ce95efa2c0ad779f488954e791fa1e1ec79c5de25ea345c28a4a905f84122526c262a1e0e4aedb8967089af414e1a26baf8ba0558f2a516ffcc63868c4d7d920890418bc22dc39b0f3ec65e61a7e338a59d93729bcf1e0c10af92dcf4ca177c9cead62fc88dfbd0b854d66f4337208f57c5f02094032fee4398d2c1dcff4b6bfb2483fd52b53b7dd58266bf4346d6bdf651decaac202d406e324056f9215380848c2a76557c881d3dd77aba88566798d04e610ef66b09f30291d29e17adf37e3fe55fe4a08af940cd0beee881a42edc92b1f1b6215f5b1bef", 0xf1, 0x100000000}, {&(0x7f0000001600)="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", 0x1000, 0xfffffffffffffff8}, {&(0x7f0000002600)="891b5e90ce94938eae23d4018f96031e2b96e1f79e8ee630a68d1ee306677dd9e4ac81f077f1ff69569a831df2ebaadcc625cbd18ae048edca054177edd3bc91efe3eb0261e61ff1714ef6b7eed989d17d12793ef264e307544d89d35ca51bfcd373bedfd2bb989c817629e289a2aea3f3f31116368330f11389906b92843d6ac28aa1594323e9357954792f3b022f7f06de6a785e7954173a980b0cb3da1c0bc21ee60d4645b822d0d4f61cccbd25383cf6bbab224af4a66e105cf0a04a6c06b3ef680b24abd0f903258dc95c044b42060e7991e965accb2f8d1b7717ae18a68cb31d", 0xe3, 0x6}], 0x4000, &(0x7f0000002880)=ANY=[@ANYBLOB='resgid=', @ANYRESHEX=0xee00, @ANYBLOB="8a2244ac2c67727071356f74612c7265737569643d", @ANYRESHEX=0xee00, @ANYBLOB=',prjquota,noload,sysvgroups,nodiscard,fowner<', @ANYRESDEC=0xee01, @ANYBLOB=',dont_measure,subj_type=ext3\x00,\x00']) faccessat(r1, &(0x7f0000000400)='./file0\x00', 0x10) faccessat(r0, &(0x7f00000000c0)='./file0\x00', 0x100) 10:11:20 executing program 1: clock_settime(0x0, &(0x7f0000000040)={0x77359400}) 10:11:20 executing program 5: r0 = syz_mount_image$ext4(0x0, &(0x7f0000000440)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) faccessat2(r0, &(0x7f0000000080)='./file0\x00', 0x108, 0x0) r1 = openat$dir(0xffffffffffffff9c, &(0x7f0000000300)='./file0\x00', 0x0, 0x0) futimesat(r1, &(0x7f0000000000)='./file0\x00', &(0x7f0000000040)) unlinkat(0xffffffffffffff9c, &(0x7f0000000100)='./file0\x00', 0x200) 10:11:20 executing program 2: r0 = syz_mount_image$ext4(0x0, &(0x7f0000000440)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) futimesat(r0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000040)={{0x0, 0x2710}, {0x77359400}}) r1 = openat$dir(0xffffffffffffff9c, &(0x7f0000000300)='./file0\x00', 0x0, 0x0) unlinkat(r1, &(0x7f0000000080)='./file0\x00', 0x200) unlinkat(0xffffffffffffff9c, &(0x7f0000000100)='./file0\x00', 0x200) 10:11:20 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000040)={0x2, &(0x7f0000000000)=[{0x15}, {}]}) r0 = syz_genetlink_get_family_id$tipc(&(0x7f00000000c0), 0xffffffffffffffff) sendmsg$TIPC_CMD_SET_LINK_WINDOW(0xffffffffffffffff, &(0x7f00000001c0)={&(0x7f0000000080), 0xc, &(0x7f0000000180)={&(0x7f0000000100)={0x68, r0, 0x400, 0x70bd27, 0x25dfdbfc, {{}, {}, {0x4c, 0x18, {0x6, @media='ib\x00'}}}}, 0x68}, 0x1, 0x0, 0x0, 0x40015}, 0x0) [ 1901.612488][T26906] loop3: detected capacity change from 0 to 264192 [ 1901.619922][ T22] audit: type=1326 audit(2000000000.000:655): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=26905 comm="syz-executor.4" exe="/root/syz-executor.4" sig=9 arch=c000003e syscall=231 compat=0 ip=0x7f9dee22a8d9 code=0x0 10:11:20 executing program 1: clock_settime(0x0, &(0x7f0000000000)={0x77359400}) clock_gettime(0x0, &(0x7f0000000040)={0x0, 0x0}) clock_nanosleep(0x4, 0x1, &(0x7f0000000080)={r0, r1+60000000}, &(0x7f00000000c0)) 10:11:20 executing program 2: syz_mount_image$ext4(0x0, &(0x7f0000000440)='./file0\x00', 0x2, 0x0, 0x0, 0x2004001, 0x0) r0 = openat$dir(0xffffffffffffff9c, &(0x7f0000000300)='./file0\x00', 0x0, 0x0) openat$incfs(r0, &(0x7f0000000000)='.log\x00', 0x10000, 0x80) unlinkat(0xffffffffffffff9c, &(0x7f0000000100)='./file0\x00', 0x200) 10:11:20 executing program 5: syz_mount_image$ext4(0x0, &(0x7f0000000440)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r0 = openat$vcsu(0xffffffffffffff9c, &(0x7f0000000000), 0x5200, 0x0) ioctl$PTP_SYS_OFFSET(r0, 0x43403d05, &(0x7f0000000480)={0x9}) fchmodat(r0, &(0x7f0000000040)='./file0\x00', 0x1b0) r1 = openat$vcsu(0xffffffffffffff9c, &(0x7f0000000000), 0x5200, 0x0) fchmodat(r1, &(0x7f0000000040)='./file0\x00', 0x1b0) openat$incfs(r1, &(0x7f00000002c0)='.log\x00', 0x181280, 0x123) accept4$packet(r1, &(0x7f0000000400)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000000440)=0x14, 0x100000) ioctl$SG_SET_DEBUG(r1, 0x227e, &(0x7f0000000080)=0x1) openat$incfs(r0, &(0x7f00000000c0)='.pending_reads\x00', 0x40, 0x1b3) accept4$packet(r0, &(0x7f0000000400)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000000440)=0x14, 0x100000) faccessat(r0, &(0x7f0000000040)='./file0/file0\x00', 0xa8) openat$dir(0xffffffffffffff9c, &(0x7f0000000340)='./file0\x00', 0x0, 0x0) r2 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NBD_CMD_CONNECT(r2, &(0x7f00000013c0)={&(0x7f00000012c0), 0xc, &(0x7f0000001380)={0x0}}, 0xc6c3dbe86af1a089) sendmsg$NLBL_CALIPSO_C_ADD(r2, &(0x7f0000000240)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x4000000}, 0xc, &(0x7f0000000200)={&(0x7f00000007c0)=ANY=[@ANYBLOB="440000008f514fb59b5adc2f6b1433c0c0169fabc693c8aae0ee184f8189eac1fdb4b0cffab2103f75489e039a968485cc3b74de8bec145658d50b9b32538996c7907979301c6ed7d33f7d34f38d5d546aa603724b806ce201d3baa9544bf122146520887f324b337041676638cb67da95cfde2f17514628480a680dc99e828f9c31f455d4621f3cdace0536f608ae0467df9e155b35801e86d9ef22ca7aa9f46c39ca568d6eef8c288fe37d81210c075d113a9bd3ce1c068c0f779256717ce0876e4ba5a97314ca5883f84a9ae818576765d1cdc09e129b0000008f441e99d2fa149e37ae6765f92f3cfff89dedb1b46b28b127", @ANYRES16=0x0, @ANYBLOB="000327bd7000fedbdf2501000000080002000200000008000200020000000800020002000000080002000200000008000200020000000800020002000000"], 0x44}, 0x1, 0x0, 0x0, 0x8081}, 0x4) unlinkat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x200) accept4$packet(0xffffffffffffffff, &(0x7f0000000400)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000000440)=0x14, 0x100000) openat$incfs(0xffffffffffffffff, &(0x7f0000000280)='.pending_reads\x00', 0x400002, 0x4) modify_ldt$read(0x0, &(0x7f0000000100)=""/26, 0x1a) [ 1901.687444][T26906] EXT4-fs (loop3): VFS: Can't find ext4 filesystem 10:11:20 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000040)={0x2, &(0x7f0000000000)=[{0x15}, {}]}) r0 = add_key$fscrypt_v1(&(0x7f0000000100), &(0x7f0000000140)={'fscrypt:', @desc2}, &(0x7f0000000180)={0x0, "0e66665f396c2a040ff70406cd696cdf9c3a467c39f6fb4d073b5cba4bca02fa5f2d6dfd0355f191c76b3309dbffb14c4b60953518856a105b33842bc6211cbb", 0x39}, 0x48, 0xfffffffffffffffc) keyctl$reject(0x13, r0, 0x4000000000007, 0xfd20, r0) r1 = add_key$keyring(&(0x7f0000000080), &(0x7f00000000c0)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffd) r2 = openat$incfs(0xffffffffffffffff, &(0x7f0000000200)='.log\x00', 0x101000, 0x22) getdents(r2, &(0x7f0000000240)=""/251, 0xfb) keyctl$KEYCTL_MOVE(0x1e, r1, 0x0, 0x0, 0x0) keyctl$unlink(0x9, 0x0, r1) 10:11:20 executing program 1: clock_settime(0x2, &(0x7f0000000040)={0x77359400}) [ 1901.794194][T26922] loop3: detected capacity change from 0 to 264192 [ 1901.801566][T26922] EXT4-fs (loop3): VFS: Can't find ext4 filesystem 10:11:20 executing program 5: prctl$PR_SET_CHILD_SUBREAPER(0x24, 0x1) r0 = syz_mount_image$ext4(0x0, &(0x7f0000000440)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) prctl$PR_SET_SECCOMP(0x16, 0x0, &(0x7f00000000c0)={0x3, &(0x7f0000000080)=[{0x2, 0x26, 0x2, 0x3f}, {0x6, 0x20, 0x9}, {0x7fff, 0x2, 0x7f, 0x1}]}) symlinkat(&(0x7f0000000000)='./file0\x00', r0, &(0x7f0000000040)='./file0\x00') openat$dir(0xffffffffffffff9c, &(0x7f0000000300)='./file0\x00', 0x0, 0x0) unlinkat(0xffffffffffffff9c, &(0x7f0000000100)='./file0\x00', 0x200) [ 1902.440308][ T22] audit: type=1326 audit(1633169481.466:656): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=26905 comm="syz-executor.4" exe="/root/syz-executor.4" sig=9 arch=c000003e syscall=231 compat=0 ip=0x7f9dee22a8d9 code=0x0 10:11:21 executing program 4: prctl$PR_SET_SECCOMP(0x16, 0x0, &(0x7f0000000080)={0x20000324, &(0x7f0000000000)=[{0x2, 0x2, 0x40, 0x8}, {0x1785, 0x80, 0xde, 0x6}, {0x9, 0x8, 0x9, 0x8}, {0x7, 0x20, 0x8, 0x66}, {0xffe0, 0x80, 0x0, 0x1000}, {0x0, 0xf8, 0x5, 0xffffffff}, {0x6, 0x22, 0x6, 0x1000}, {0x7ff, 0x5, 0x4, 0xfff}, {0xfeff, 0xff, 0x70, 0xfffffff7}, {0x9, 0x4, 0x5, 0xffff}]}) prctl$PR_SET_SECCOMP(0x16, 0x1, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x8, 0xd, 0x98, 0x4}]}) 10:11:21 executing program 2: syz_mount_image$ext4(0x0, &(0x7f0000000440)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r0 = openat$dir(0xffffffffffffff9c, &(0x7f0000000300)='./file0\x00', 0x0, 0x0) r1 = syz_mount_image$ext4(&(0x7f0000000000)='ext2\x00', &(0x7f0000000040)='./file0\x00', 0x3, 0x8, &(0x7f0000002580)=[{&(0x7f0000000140)="46779b6ec30e08c3d7f06901931a4b9ab8e7b63e442669070ddfe7a34bc8cc8dc95634bd38bfc4f175b086a77154b916d4e21dd90a2d448d62a0f50c4346d2f8b976c8bbd653c1fcf331f57d7f0da7fb0b58fa32d1a0c99b784ad9fbb30b5026e136ba87fa86a2c0752d9c4db31551b4ece06af796575c44f91ca69222b24829458d058a10e7eecace3cc88a3c1ea7de780c0b748e3cab61446b0317649e16081eabfdd8c8574ebd88ead67ca2c0a3c3462b5673626b710d41eb6bdfee995e3293999a02929819e6f99666eabc80e2c346ceee00f56d", 0xd6, 0x401}, {&(0x7f0000000480)="9c3777a83748bc4a119c9690063e3ae219797fec16af0833b1556cc0cd8839147414d07a23424253c1471025cfcd1fed906013226f7d796509d18c53908a9dc89bc2833f83faffe2afc51b56fcad7efddc14de66eae79f4a0df4d9054453e99e1622891a20f938082139e7d7f6061a5528db1c0b4a9950b88216812a5a3f6403989f6f1d4b8d99443f11b06c0726fb08d4ed6fc84f5838b7b3133067835915849d402892a0147f8d977105667b44d57b96aa384ad3aa07122aea0ee130169b15ffdc1d7ee7f1e8eb5291b9d1d054de221f133bf8b55fc273616e609dfc9395ab3a2e925a2bd4d26e5df220bbf0e02e35cc1871714ac7bc64b35bab1f6a06f3493d055554a64edc39571820e46c9930b7f6a3588b830d6709ec77c2a9bb22eea1a78ba803ff08ea51b5bab1082c8693725bc03334865ddc128a9ade045e0811eaa7bb11bf9b836adf348573e9db6b1144e096c9eedd58e3997dfc11dc62c9c94c7649562b2bacfd10784d00d5cd3c55db5e4ee264f26cd2f48839a102193cb1f19b9f768bcf59a2138f737f82bd758affbb8056ad6172f6a0521ff953b7d0f289d22a222d000e1c2a2c649ad8d9d8122c58805d019dce590cf0376712a9c217cd350c73f420276c03065cdf8b603dbe962158d7504f88bb83649d6bb585dca4040456cec2f33b0183e98e0aae5012e549971a9989f1833016687999b3dea228587a5a1efb8131b68632f024355c89add2c14910cae2e2fa3e7ec31c38480ab038d6a1a03154da5b2592d74d3f4b7cc5b1e8d2e21b666a7af793a12590f7c5e5c606f55a35c61f77c30c2101c9c0dfead53076aa12b408dcd81b71feebf3b5ddad7b573e013699a2f436138d181b9dabe3c6f5356ddb33e0ae65e40dce5d0650c9ef2ec905a734c0943b995e71d038294151afc2e60949beabe51cc7100d5a3d26c23ebfdaa86154a5656d76f50036cdcf9db0910d15a0592a1e0669df2bc276294ee29b7efad5d67a46d80f5d18c41840a85118be8d71dfef1a87863acac5405636907523dde9ccfa95140972db80e479f2741f1d1a2bf3b59719f58d0766968389bfad3a9e7011c7886de015f8b31ebe03b3a4f1a68844e17140d1544cf79eadaedfc8f8bbcace4ccf3795ec8c272dd04c12995591164dbc93f27549d2e027ffdf7a2c0eef38d9d7eab45c157025fab1df7866a5fd83842a1eb7416bd0b42827da86ca5060914234f13c566a84246dd350d4e3c10e9ea38f6bf8bc483a093e526f6ef93475c585956816ed3a55f179ac8a2362506283464b2e1a9dbd79e223d0fd636e5d697328f3305805a27c1e9f1dbc8c2d9d328bfad1a2764ad8beca824418f4dcbcba12b0d1771edb361c819dd57730478deaccc95fb3e7da2899c9b5b3e01fdde8172f846e629a0a44af55c5fbd78d3ed795d4891e1a8e68c142cd09b7a415a1202b37551f1931f1cf651a92ef03e7c14a08f77d01ffef7f8ad8108053cb77a7c519138c4a3d51cc31920a8ec005852f1780764e32e93aec1ac8312c31261ad48c90939a364b9ea0c65cb72abe1a79041d92204e415184673ab8997e750bfd73e8d6b409b61a43ed9ef47d86e970eb50ac325acfc0f80d749f75355d4474f106379c6ac33667b93708c400ba262552895f9fefbd18368da7e4003ab77fa1e559296fd947526c30e35e9d63b75346a7762365464b43652f44f85859cb1a75fb8d6437d58030e52f8f65756aae48394d62b7f09ac115b585ec383d6c4a8c034136efc1ab6005f81159ab60c30b0763a205e631d6db698b29ab179eec7b873a9668e738e979ee8c908468f7109ca7673522b7c08561742683101c91dc43e1d29e65bb20df71c3d90e4d974ef05029a5e3353437f802a7d1c48b96f7d261c5517ba80c004d71e346f3acc79aadab1ea64537efb883483150412ca82cf23bb37ec7b3a38ea3e7d6af31995fedd6578228b0ee1a711a967bf7eb973995932b35c939e40c7701a79ff78df901c6a205a9560e47984ee9275628dc020ae9eb009aa15261799778c7a8cc92a3180afaeb96f7088a57acf404650aad9bb313c58b92da11f8d6b4a87a3d80bb9ac91dc62d1cef58bc9c02da65ec29a277ca6eb3bd1eb73282d87d75302a2ca3bf4129b619d5af6691987308f68f1f96cfd28d8394086bd2ff6f595aca0bc290cc27353d0a381467339a7233bb1b65d66843337a54b49b44f2ddca7056d89201ba2d9e2eb2bb11192c5088ea3e25abb436e66104a4304882cb4d64bc676541dc083aebbcce385390523ee08a6c8b71aeb4ef95a4644f34486663270da36263411092c2bfe23e9a3f11bc9b0ca4e7c62ebb716f6e2922f9cf76082efe65d4ccc31d2944245430bbf8506483c53391d9e4a7c232f3d42cc42b9ad82be92072f5c9a25fc213aa1a14a56ff399e6ba182c34cd5bb18970f6946bf0600bb6aa1ea8f74b90319aaffb7e2abe2a318468734af45b0ffe7a0aa10ef6905806c611cca561ab3cca29dae270409222c83a8e66b8d387bf7be136baba088f0072ba5b62bf03f56c3645d7dbb0e1f565b5a59e303b0689248101587f33a1cb6b70f363a14af43bddade2c28d02fefce2788b860c5e7f3af899e8bbb5fc4808eefbe9ef3736055f97aa6c0c07d34e68fd243f25f28fecf3a726674409cfbb778b285a78f81bf617acff314bcc8557ff26e88881c9e6745ea16f06a0b4dd00fb329c0dd07ef513c60a62c097cf062e04ad0031a53698575a14fca5eaa5ac640551b1f4a87a8486ac4270de127a71fc1a525c741a70b32172cf52fdc629e2c849fe9680bd694ac693bb31090b98a78386627ba231a20a4031e1245ccf78346236352cd923600044f521b2032461b0558edf422e1c39a9a86b9428cac47b34d2b92a9a8fe35bf95cec92ba67782ec2445f3bf5762065105bb70832c1d7b2eca8b8aa0e30e21eecd6cfa6ebae1e48d8f03ece46d6df8d43c2beaa916b007ac085d67958a8b6b3af1dc164afb3be6b1c8de07cf6f1790fcd06d8ed1b3e7577d9d2bdc257ef4be8835b1429e531a058710356eabee376dece84394b2653e6e7117834c9973f6114cba0a1fcd021c1b2cd0a50831cdb327c332cfa280e06f0e051d17c69696796e713a19246d1cbde3d35fea2e6dc1e801a29397641e6d52e46c2d75f4260ffd77db2c4b3358f343c6168f384e40b3b688498053803295b2c04681d8bb460e076fd66276a7606788d8b7085c6b9fb5f6afd45a8072815872fe88c4a2db9c863a011034c072ea7d2e4d821a4c5531155a80f8fc6b79d1b2a5d0c9ab3a56bf1a095c95d5cece9a2e1bd56dcaad3e92f76a32d1347e5cd20f5502c3e6849459457a385eeeefe89d36c4d71ba53a79eb4e60f6f8737dd3d45e56d7874ab8e533651543813c2730e32f3192559cf387367f51f87ef0c7f952b3eb0d3fa3d6ec7dd2284c1d30962e72de9e1e8e50d5aac551d4bbf9305983be58bd7bdfad6f84b6d0b12688193c4a4951a0dc42ebacea0a88f5a25d40649b9ae15d4adf9ac8aca4155169c1040e5757231a2b39dc2fe48cbe2c9bdf11065223b2fe81a61632621f1dcb95e975f109ac3c12a32336ccb8be505170f55c03c671cf11d39ef76d778aea3daee84f1ea77062701a1e4a79d892ee2d35433761c592c6efbc7a06aa35cd3cebff2d62381e9a626c3048f2015200e2342a0098f3e10467259f2b813e0ffc252d7a471086998d144570082cc478b73b1914c2d5a83265397e78244747d422d974208cb73c997a4be1430bdd4e783ca56b76494cacba5d00aa505ce117a46a449130b5dbeb36b44498688c4380bb49dbdb0c88491b4f3522e63a26dbb87b3550bd1fadd556947eea3f6f34adb52ee3de61bdf6f5980e0e30a92e797ec7c268ff477dd80e8302eea4e6d46b14f9649aeb733e4204a8c0cc95918b32bd28c95882df6945e920c3543fce2b624b2e742fc2358ed8a91871ea0b4a17c04afd634f37bed2ab1e7070d32fa2f5338915cb4962fbe0328fb32d04d346dc47944e9fe8905608518e6abab8e68cf64bb254fae973c5257f80e26ab44d32b2b221bd476018421a9c874054488d3fdca787fcddb5f2d501c4c78317e1f002de34bb0860fee14c3949935882af93870092709c78e97d6a7d1cf8210e5c202caaee4623fd923601f14c180b36e868e6082b0a1fba9bd48772652428cd4609576c4f10d7da00b40429eb7821b875fa0a01ef514593b99647b5832ba92af2d5c1c6a9fd92f8840921f2ea2e368b3d4fc30ecb7cf60e31baf7b66ea007e5b6c9b2268831f17746c327906ee8331baf5ab41fdc1867ee1b3d3ed8a9af6cef2c11abadc8d1cfd544e0e8cda804f361c39ae78d036d3507fc44ea1c131faa0b52307a828ffc35b9e09adcbcf440e71a502efe80b87778db4e053c252967e08e6db768331c8e146408b519aeab708a8e96c6f055e98eda7b97c1894766a04db2135a60dec4150f87c7f391cd50e37f038a521a1118ae939b4f2c269f60bb68fb599f5ff1074ca669b5d56c87df5516cb70c85075acffa834efc660029a4ff90fae0e080199690a1befc95ece82fbbdb5d18b795f9903898f1519c8d70f93aa96e1f4722e492725687d2dc6c46cbfc52366d428dd93e865cf9dff7f6b3f86e8839be7a02fefe3116042d2ebad8259d6bc3a5f323e6a08fd3b4311cfbfd98a27783e8594dafb94839d4ed84cecadf033ebc95b80e05b8df0b3b3b69eefb3401301927cc950fbdb2f9e0733c2c22a961288b03914d5a78960c09553c91ec19d01a3afe1aa314dd130c15e1d6e820e5a2b44be3bd2da7e3b0234263e43e257c3f26499e0eeb0a0e6e219a356943455e71120d1c64f9467e9e048fab3d3d44d041073d6d13e61b5674e7c3ba534882dcb6611d1d695aba35c379fed7b0aec08b1bfcb18b37b02975a37084d31d0fc89da94319cddeabf999636b00ec4cb139616139fb5e469be1a917488705143126a58265a3a78f5049ee5a01ee5d7aad3cc8dce1143938f1713b7e607f5aff0cb834acdc0fc71ffcb2a0f9dbd44da4550c1bb171cc581cb715f31e2fdff474bbb380b329d723897742c31284d33868dc008572b26c18b123addee7684bcd5a9891de9db5041557b84cdf1d96148feea3162328bc952625f9d1798f0a793ccf437f6f4a8b10e64018659b5cf5bfe9ce608217b39575669d99bac4e1057250f0bebf74b25c60f716de22dd5eede6e9d72a7440fe273515c58df909da3c0e3c770d815241e60a2d551e6d92e329c7167da5de00e59d3c93a19a229b7c03044f719a66c934056920909648171d5dec9d679479cd78cb79bfdbcbec4a91e0ea3a0822c0705299de1c005726cae3cc3b496e0b3cdc3437fe99a7a0c41454f55e4526f7a28d3594ed994092c06bbecc5ce65a28b0b7c5a6bdef4838924241b8d7693a8d85c8f60f8a84ed15484e8c0f807c82e5b5ed2a22491e466d09b41a9a57afa5aea8fdd7a820aea58a61333ae14843c40d91ff67d6737e1856b67ef522c44349c6c8b48eeb62884a0c9a604d433c9538ccdb22e7ce736933efd2add430e344b7994086566f2a2e74a25199cf1c40db3fecf3c0a5cb832c8c269bd5d73e602215f9d4d5688a2ac6631f059016e4924acd6426526d7ce525d16afb809ff90b9eff9d8b81b43180fac0487ed2bfbe67e88e9717a5ef7da3770c9ba4b739b79355e0adf2ebe086e8deb921498a4f208b28774cf201789006f2021bae9ab2a7868f92f0e7f33e525567f361d5888d52cd0ef3e683be8ae61f254a6a08", 0x1000, 0x2}, {&(0x7f0000000080)="c65afbde749b9b42d2f6ae42a4241b73efe601f16dd01fcfbe6097131595ada88b3753", 0x23, 0x9}, {&(0x7f0000000240)="b508f7d15de17784deebe2589f17c6e094ba3b474f7c413edb769d927bcaf7b059c96f699956e27a255b437e405fffb88f2d38b151eb4d8e4cbef2fce176b3e532a8684b20b81eb239c288dc51218039021bea9a74d0cb9075a9e1dbe4d905b96beccd", 0x63, 0x3}, {&(0x7f0000000340)="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", 0xfe, 0x2}, {&(0x7f0000001480)="fbdb302f17168edfabe8f487fa5c5a94e7d9d725592e696fbb4051e796150fe4da8859a399733f070bae41580cbfe614dd7c180d4e449a0eb195857c02e1f20450400541b664542b567b3ddcfece7142410858a72b675c4b", 0x58, 0x9}, {&(0x7f0000001500)="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", 0x1000, 0x3ad}, {&(0x7f0000002500)="cb2d7ed7a57ae913f20ebbe2fd4c291efdcfd5b3fd9b9e9d644440043044a44730ac5fe4c2423bdfe5c52d736f490e1c1af6f51dc53859df40568cb4bfbb1785dc927dd7e0ff3ea85b366d480772dc7c0d5b", 0x52, 0x4}], 0x0, &(0x7f0000002640)={[{@test_dummy_encryption}, {@sb={'sb', 0x3d, 0x7f}}, {@grpjquota_path={'grpjquota', 0x3d, './file0'}}, {@mblk_io_submit}, {@abort}, {@data_writeback}, {@journal_path={'journal_path', 0x3d, './file0'}}, {@init_itable}, {@errors_remount}, {}], [{@smackfsfloor={'smackfsfloor', 0x3d, '/\\!#}$\x00'}}, {@dont_measure}, {@appraise_type}, {@fsname={'fsname', 0x3d, '\\(.'}}, {@rootcontext={'rootcontext', 0x3d, 'staff_u'}}, {@mask={'mask', 0x3d, '^MAY_EXEC'}}]}) openat$incfs(r1, &(0x7f00000000c0)='.pending_reads\x00', 0x48000, 0x1ac) unlinkat(0xffffffffffffff9c, &(0x7f0000000100)='./file0\x00', 0x200) futimesat(r0, &(0x7f00000002c0)='./file0\x00', &(0x7f0000002780)={{0x0, 0x2710}, {0x77359400}}) r2 = syz_mount_image$ext4(&(0x7f0000002800)='ext2\x00', &(0x7f0000002840)='./file0\x00', 0x7, 0x1, &(0x7f00000028c0)=[{&(0x7f0000002880)="9f345c5f902ef05753", 0x9, 0x4}], 0xc0800, &(0x7f0000002900)={[{@journal_dev={'journal_dev', 0x3d, 0x7}}, {@nojournal_checksum}, {@jqfmt_vfsv0}, {@inode_readahead_blks={'inode_readahead_blks', 0x3d, 0x10000}}, {@jqfmt_vfsold}], [{@subj_user={'subj_user', 0x3d, 'init_itable'}}, {@appraise}, {@obj_role}, {@fscontext={'fscontext', 0x3d, 'sysadm_u'}}, {@subj_type}, {@defcontext={'defcontext', 0x3d, 'system_u'}}, {@dont_hash}]}) symlinkat(&(0x7f00000027c0)='./file0\x00', r2, &(0x7f0000002a00)='./file0\x00') r3 = openat$vcsu(0xffffffffffffff9c, &(0x7f0000000340), 0x301, 0x0) ioctl$PTP_ENABLE_PPS(r3, 0x40043d04, 0x1) futimesat(r3, &(0x7f0000002a40)='./file0\x00', &(0x7f0000002a80)={{0x0, 0x2710}, {0x77359400}}) 10:11:21 executing program 3: prctl$PR_CAP_AMBIENT(0x2f, 0x1, 0xa) prctl$PR_CAP_AMBIENT(0x2f, 0x4, 0x17) syz_mount_image$ext4(&(0x7f00000000c0)='ext2\x00', &(0x7f0000000040)='./file0/file0\x00', 0x800000000, 0x0, 0x0, 0x0, &(0x7f0000000480)=ANY=[]) openat$vcsu(0xffffffffffffff9c, &(0x7f0000000080), 0x100, 0x0) 10:11:21 executing program 1: clock_settime(0x2, &(0x7f0000000040)={0x77359400}) clock_settime(0x1, &(0x7f0000000000)={0x77359400}) 10:11:21 executing program 5: syz_mount_image$ext4(0x0, &(0x7f0000000440)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r0 = openat$dir(0xffffffffffffff9c, &(0x7f0000000300)='./file0\x00', 0x0, 0x0) unlinkat(0xffffffffffffff9c, &(0x7f0000000100)='./file0\x00', 0x200) fchmodat(r0, &(0x7f0000000000)='./file0/file0\x00', 0x40) 10:11:21 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000040)={0x2, &(0x7f0000000000)=[{0x15}, {0x0, 0x0, 0x40}]}) prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f00000000c0)={0x1, &(0x7f0000000080)=[{0x101, 0x1f, 0x7f, 0x1}]}) prctl$PR_SET_SECCOMP(0x16, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000100)=[{0x0, 0x1f, 0x6, 0x4}]}) r0 = openat$incfs(0xffffffffffffffff, &(0x7f0000000400)='.pending_reads\x00', 0x402, 0x100) sendmsg$TIPC_CMD_GET_MAX_PORTS(r0, &(0x7f0000000500)={&(0x7f0000000440)={0x10, 0x0, 0x0, 0x6000}, 0xc, &(0x7f00000004c0)={&(0x7f0000000480)={0x1c, 0x0, 0x20, 0x70bd2a, 0x25dfdbff, {}, ["", ""]}, 0x1c}, 0x1, 0x0, 0x0, 0x800}, 0x4008850) prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f00000003c0)={0x2, &(0x7f0000000380)=[{0x6, 0x5, 0x40, 0xf4a9}, {0x8, 0x3, 0x8, 0xfffffffd}]}) wait4(0x0, &(0x7f0000000180), 0x40000000, &(0x7f00000001c0)) r1 = getpid() setuid(0xee00) wait4(r1, &(0x7f0000000280), 0x8, &(0x7f00000002c0)) r2 = add_key$keyring(&(0x7f0000000080), &(0x7f00000000c0)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$KEYCTL_MOVE(0x1e, r2, 0x0, 0x0, 0x0) r3 = add_key$keyring(&(0x7f0000000080), &(0x7f00000000c0)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$KEYCTL_MOVE(0x1e, r3, 0x0, 0x0, 0x0) keyctl$reject(0x13, r2, 0x1, 0x40, r3) 10:11:21 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext3\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000480)=ANY=[@ANYBLOB='lazytime,teqt_dummy_encryption,max_dir_size_kb=0x000000000200,grpjquota=,min_batch_time=0x00000000000003ff,rootcontext\a']) 10:11:21 executing program 0: prctl$PR_SVE_GET_VL(0x33, 0x6254) prctl$PR_SET_SECCOMP(0x16, 0x0, &(0x7f0000000040)={0x2, &(0x7f0000000000)=[{0x15, 0x0, 0xfc}, {0xfffe, 0x0, 0xfd, 0x8000}]}) prctl$PR_MPX_ENABLE_MANAGEMENT(0x2b) [ 1902.571656][ T22] audit: type=1326 audit(1633169481.596:657): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=26980 comm="syz-executor.4" exe="/root/syz-executor.4" sig=9 arch=c000003e syscall=231 compat=0 ip=0x7f9dee22a8d9 code=0x0 [ 1902.603092][T26984] loop2: detected capacity change from 0 to 9 10:11:21 executing program 1: clock_settime(0x0, &(0x7f0000000000)={0x77359400}) ioctl$PTP_PIN_SETFUNC2(0xffffffffffffffff, 0x40603d10, &(0x7f0000000040)={'\x00', 0x2, 0x1, 0x40}) r0 = fork() sched_rr_get_interval(r0, &(0x7f0000000100)) ptrace$setregset(0x4205, r0, 0x1, &(0x7f0000001240)={&(0x7f00000012c0)="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", 0x296}) sched_rr_get_interval(r0, &(0x7f0000001280)) keyctl$session_to_parent(0x12) clock_gettime(0x0, &(0x7f0000000240)={0x0, 0x0}) clock_nanosleep(0x1, 0x1, &(0x7f0000000280)={r1, r2+60000000}, 0x0) 10:11:21 executing program 5: r0 = syz_mount_image$ext4(0x0, &(0x7f0000000240)='./file0\x00', 0x573, 0xfffffe5a, 0x0, 0x10140a3, 0x0) r1 = openat$dir(0xffffffffffffff9c, &(0x7f0000000200)='./file0\x00', 0x0, 0x0) getdents(r1, &(0x7f0000000140)=""/105, 0x69) r2 = openat$vcsu(0xffffffffffffff9c, &(0x7f0000000340), 0x301, 0x0) ioctl$PTP_ENABLE_PPS(r2, 0x40043d04, 0x1) symlinkat(&(0x7f0000000080)='./file0\x00', r2, &(0x7f00000000c0)='./file0\x00') openat$dir(0xffffffffffffff9c, &(0x7f0000000300)='./file0\x00', 0x0, 0x0) r3 = openat$vcsu(0xffffffffffffff9c, &(0x7f0000000340), 0x301, 0x0) ioctl$PTP_ENABLE_PPS(r3, 0x40043d04, 0x1) unlinkat(r3, &(0x7f0000000100)='./file0\x00', 0x200) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000000)) r4 = openat$ptp0(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) keyctl$join(0x1, &(0x7f00000001c0)={'syz', 0x2}) ioctl$PTP_EXTTS_REQUEST(r4, 0x40103d02, &(0x7f00000000c0)) ioctl$PTP_SYS_OFFSET(r4, 0x43403d05, &(0x7f0000000480)={0x12}) fchmodat(r0, &(0x7f0000000040)='./file0\x00', 0x24) 10:11:21 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext3\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="6c617a7bbb696d652c746573745f64756d6d795f656e6372797074696f6e2c6d6178066469725f7330303030000000003230302c6772706a71756f74613d2c6d696e5f62617463685f74696d653d30783030303029a54ba43030303130303030303366662c726f6f74636f6e7478613f58ef277e4d183f877e7d0bcf25ff8f34cae0967b4befcb23683e2c3533171604d642231592b03fd3cfa88240f72ce4e45270e752abbe3681f4298059f07bf2c16910729c0a29"]) openat$dir(0xffffffffffffff9c, &(0x7f00000000c0)='./file1\x00', 0x22f080, 0x30) seccomp$SECCOMP_GET_NOTIF_SIZES(0x3, 0x0, &(0x7f0000000080)) [ 1902.631348][T26984] EXT4-fs (loop2): VFS: Can't find ext4 filesystem 10:11:21 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000040)={0x3, &(0x7f0000000000)=[{0x7f, 0xc0, 0xbc, 0x318}, {0x8, 0x1, 0x6, 0xfffffff8}, {0xf7a, 0x9, 0x7f, 0x6a}]}) [ 1902.717424][T27013] loop2: detected capacity change from 0 to 9 [ 1902.740991][T27013] EXT4-fs (loop2): VFS: Can't find ext4 filesystem 10:11:22 executing program 4: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000040)={0x2, &(0x7f0000000000)=[{0x0, 0xfd}, {0xfffc, 0x0, 0x9}]}) prctl$PR_SET_SECCOMP(0x16, 0x1, &(0x7f00000000c0)={0x4, &(0x7f0000000080)=[{0x7e, 0x2, 0x5, 0x62a}, {0xa3, 0x9, 0x8, 0x2}, {0x3f, 0x80, 0x0, 0x2000}, {0x5, 0x1, 0x48, 0x3}]}) 10:11:22 executing program 5: syz_mount_image$ext4(0x0, &(0x7f0000000440)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r0 = openat$dir(0xffffffffffffff9c, &(0x7f0000000300)='./file0\x00', 0x0, 0x0) ioctl$PTP_PIN_GETFUNC2(r0, 0xc0603d0f, &(0x7f0000000000)={'\x00', 0x8, 0x0, 0xffffffff}) r1 = syz_mount_image$ext4(&(0x7f0000000080)='ext2\x00', &(0x7f0000000240)='./file1/file0\x00', 0x4, 0x1, &(0x7f00000001c0)=[{&(0x7f0000000140)="53184a991963c5939d8c584b83a7d18df747fd938208c4f107e9221cb87982c694684a576405f651c2b2bd0fcc38f9a3c3064a6a949b464296bb6edc6045f6cbf429504b401e693dc1", 0x49, 0x1000}], 0x20, &(0x7f0000000200)={[], [{@fsuuid={'fsuuid', 0x3d, {[0x31, 0x37, 0x37, 0x64, 0x66, 0x62, 0x37, 0x37], 0x2d, [0x0, 0x4, 0x33, 0x31], 0x2d, [0x66, 0x62, 0x62, 0x35], 0x2d, [0x31, 0x37, 0x33, 0x30], 0x2d, [0x63, 0x35, 0x38, 0x2, 0x37, 0x64, 0x33, 0x35]}}}]}) r2 = openat$vcsu(0xffffffffffffff9c, &(0x7f0000000000), 0x5200, 0x0) fchmodat(r2, &(0x7f0000000040)='./file0\x00', 0x1b0) r3 = openat$incfs(r2, &(0x7f00000002c0)='.log\x00', 0x581200, 0x123) syz_genetlink_get_family_id$fou(&(0x7f0000000300), r3) renameat2(r3, &(0x7f0000000380)='./file0\x00', 0xffffffffffffffff, &(0x7f00000003c0)='./file1\x00', 0x0) ioctl$SG_GET_REQUEST_TABLE(r3, 0x2286, &(0x7f0000000480)) unlinkat(r1, &(0x7f0000000100)='./file0\x00', 0x200) 10:11:22 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext3\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000480)=ANY=[@ANYBLOB="6c617a7974696d652c746573745f64756d6d785f656e6372797074696f6e2c6d61785f6469725f73697a655f6b623d30783030303030303030303230302c6772706a71756f74613d2c6d696e5f62617474c59c63685f74696d653d3078303030303030303030303030303366662c726f6f74636f6e7465"]) 10:11:22 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000040)) r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nbd(&(0x7f0000000080), 0xffffffffffffffff) sendmsg$NBD_CMD_DISCONNECT(r0, &(0x7f0000000140)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f0000000100)={&(0x7f00000000c0)={0x34, r1, 0x1, 0x70bd2d, 0x25dfdbfd, {}, [@NBD_ATTR_INDEX={0x8, 0x1, 0x0}, @NBD_ATTR_BLOCK_SIZE_BYTES={0xc, 0x3, 0x8000000005}, @NBD_ATTR_SIZE_BYTES={0xc, 0x2, 0x9}]}, 0x34}}, 0x20008000) r2 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NBD_CMD_CONNECT(r2, &(0x7f00000013c0)={&(0x7f00000012c0), 0xc, &(0x7f0000001380)={0x0}, 0x1, 0x0, 0x0, 0x44000}, 0xc6c3dbe86af1a089) syz_genetlink_get_family_id$tipc(&(0x7f00000001c0), 0xffffffffffffffff) syz_genetlink_get_family_id$nbd(&(0x7f0000000180), r2) 10:11:22 executing program 2: openat$vcsu(0xffffffffffffff9c, &(0x7f0000000b80), 0x2, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000440)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) openat$dir(0xffffffffffffff9c, &(0x7f0000000300)='./file0\x00', 0x0, 0x0) r0 = openat$vcsu(0xffffffffffffff9c, &(0x7f0000000000), 0x5200, 0x0) fchmodat(r0, &(0x7f0000000040)='./file0\x00', 0x1b0) r1 = openat$incfs(r0, &(0x7f00000002c0)='.log\x00', 0x581200, 0x123) ioctl$SG_SET_DEBUG(r0, 0x227e, &(0x7f0000000b40)) r2 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NBD_CMD_CONNECT(r2, &(0x7f00000013c0)={&(0x7f00000012c0), 0xc, &(0x7f0000001380)={0x0}}, 0xc6c3dbe86af1a089) r3 = syz_genetlink_get_family_id$nl802154(&(0x7f0000000780), 0xffffffffffffffff) sendmsg$IEEE802154_LLSEC_LIST_SECLEVEL(r2, &(0x7f0000000b00)={&(0x7f0000000a40), 0xc, &(0x7f0000000ac0)={&(0x7f0000000a80)={0x14, 0x0, 0x2, 0x70bd2c, 0x25dfdbff, {}, ["", "", "", "", ""]}, 0x14}, 0x1, 0x0, 0x0, 0xc000}, 0x1) r4 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NBD_CMD_CONNECT(r4, &(0x7f00000013c0)={&(0x7f00000012c0), 0xc, &(0x7f0000001380)={0x0}}, 0xc6c3dbe86af1a089) r5 = syz_genetlink_get_family_id$nbd(&(0x7f0000000800), 0xffffffffffffffff) sendmsg$NBD_CMD_RECONFIGURE(r4, &(0x7f0000000a00)={&(0x7f0000000900)={0x10, 0x0, 0x0, 0x1000000}, 0xc, &(0x7f00000009c0)={&(0x7f0000000980)={0x2c, r5, 0x4, 0x70bd28, 0x25dfdbfe, {}, [@NBD_ATTR_TIMEOUT={0xc, 0x4, 0x3}, @NBD_ATTR_TIMEOUT={0xc, 0x4, 0x9}]}, 0x2c}, 0x1, 0x0, 0x0, 0xe3873a1af04fe1be}, 0x20000000) sendmsg$NL802154_CMD_NEW_SEC_LEVEL(r2, &(0x7f00000008c0)={&(0x7f0000000740)={0x10, 0x0, 0x0, 0x8000000}, 0xc, &(0x7f0000000880)={&(0x7f0000000bc0)=ANY=[@ANYBLOB="88000000", @ANYRES16=r3, @ANYBLOB="100029bd7000ffdbdf25200000000c00060002000000020000000c000600000000000000000024002280080003000600000008000200030000a945d700080003009000000005000400010000000c00060003000000000000000c000600020000000200000008ec4c3349c99682af7ecb142e2b1bf6806b27a0e8249f7033ea870456675e92f9dec0975cf25fa6b66301bb8d395575d7371413116dd82740ade7cbf03bff35e83e878d2bf883bcc8422992929754011695c39184a8b2a4553b6690854f8b693f9261a7b4e2693395ad91d468cc61813a8ffad0f44edf8e78383e8e486452d4f178ec1bac4b6b066fa4b9a077dc8fe51e5f5fd336f4254bfcaa8f128676ee8b8fcdd80f6cf861bb402204c644", @ANYRES32=0x0, @ANYBLOB="0c00060003000000030000000c0006000300000000000000"], 0x88}}, 0x80) syz_mount_image$ext4(&(0x7f0000000100)='ext4\x00', &(0x7f0000000140)='./file0\x00', 0x1, 0x6, &(0x7f0000000600)=[{&(0x7f0000000180)="679a4081b4d58e7e28679adf62d83f992722fffdbe2869c78b9d83f3611a8d5e77c9ec363759c2e394db515d95e59f4a9dc412d309c39ecccdeea93be8def5acae80bac14683b5b887974880559420ec04c1c16e4578080965b005747cf543422a49227f044c96e0d0749d8f5d94760cc17ebe0642cccd129a08f50fb78f3f30478bf369163685f13cd27558ed1eece245da4a125f1e653126633f9f001c63e357c1b7ec3b039f5b2d9e820b9a848b9c4830ed3c533efdda422e7bb3ebd61a66c3826e95ed18e88d7419e845a44cf43767b4bfba80c5ebb8685adc8887649baf4939ff33df083b1b3c9d668c0b14", 0xee}, {&(0x7f0000000340)="6b8d191a481933afb0dbe94b3e1afcff4a300499be963dcc5335e24da074499abe26ad88f2d56fc30e19bf72f4e154d3c384743e81d2180a33b8f382aed4f4fef58c810db33505945bdfcbb4f2aeb2a156b04d6a2ea1708053b7eebfc70ecca5b9", 0xaf, 0x8}, {&(0x7f0000000280)="5c80d044dc56d9bf4d13cd75c00cb22d4bb2f6b0629acafb69a2c6d24c3748", 0x1f, 0x2}, {&(0x7f0000000480)="41d716496c1fb6e4400781549e2b868de4118717b8e626aeac5c656643508af712ebbf8e2520bf15dc9d16b750b0309579b499d7aede49b1f934083bdf43231291f66d6f9afb36b3cd89cf2d92754c3cc595e7cafccffbbfaa3ec3bc86a67991bfab75f4e614982acbf31fa12f9ee4e50cf94215a59e00b62822ff6dc4329e2368b548939012710ccfed19d8fccc6367ec6e414fee9f0a22aa3799ec82eff89aeb7e6a720c34d342110bad9d5d7a357b68a988a293b8d9c74ecef0cd1bba47666ecbd13f308e49d10b", 0xc9, 0x4}, {&(0x7f0000000580)="e46604855183a7127ffcd0421e890049c3a23437079e1348937b5ff6a8f343d9150128149e6af8b36dcdbba92ac09d98d223be4d36a124a9cc2d8660b9a70c39d30576e3165bc9f2cd1ffc2d031fe547d368c7409f502fa703417c516b0511f83d8bf3c9f3d5253391d1e158e299d3af9ac6", 0x72, 0x1}, {&(0x7f0000000d00)="8eab14fc5d0129545dc3800aa3f142bfdb45ef88fd9219d0ff01ff0249b230e6740feadaa7bfe0bbef69454a5f2c1d9280b5c88703a08ea62d0a8d37c351f827d2a953c5154e0975759c0ca2131e39847d", 0x51, 0x7ff}], 0x0, &(0x7f00000006c0)={[], [{@context={'context', 0x3d, 'staff_u'}}, {@dont_appraise}]}) renameat2(r0, &(0x7f00000000c0)='./file2\x00', r1, &(0x7f0000000700)='./file0\x00', 0x0) unlinkat(r0, &(0x7f0000000080)='./file0\x00', 0x200) [ 1903.439108][ T22] audit: type=1326 audit(1633169482.459:658): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=27061 comm="syz-executor.4" exe="/root/syz-executor.4" sig=9 arch=c000003e syscall=231 compat=0 ip=0x7f9dee22a8d9 code=0x0 [ 1903.441977][T27065] loop5: detected capacity change from 0 to 16 10:11:22 executing program 3: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NBD_CMD_CONNECT(r0, &(0x7f00000013c0)={&(0x7f00000012c0), 0xc, &(0x7f0000001380)={0x0}}, 0xc6c3dbe86af1a089) ioctl$sock_SIOCGIFINDEX_802154(0xffffffffffffffff, 0x8933, &(0x7f00000000c0)={'wpan3\x00', 0x0}) sendmsg$NL802154_CMD_GET_WPAN_PHY(r0, &(0x7f00000001c0)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x100}, 0xc, &(0x7f0000000180)={&(0x7f0000000100)={0x54, 0x0, 0x200, 0x70bd26, 0x25dfdc01, {}, [@NL802154_ATTR_IFINDEX={0x8}, @NL802154_ATTR_WPAN_DEV={0xc, 0x6, 0x300000003}, @NL802154_ATTR_IFINDEX={0x8, 0x3, r1}, @NL802154_ATTR_IFINDEX={0x8}, @NL802154_ATTR_WPAN_PHY={0x8}, @NL802154_ATTR_WPAN_DEV={0xc}, @NL802154_ATTR_IFINDEX={0x8}]}, 0x54}, 0x1, 0x0, 0x0, 0x40}, 0x4010) syz_mount_image$ext4(&(0x7f0000000000)='ext3\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000480)=ANY=[@ANYBLOB='lazytime,test_dummy_encryption,max_dir_size_kb=0x000000000200,grpjquota=,min_batch_time=0x00000000000003ff,rootcontedt\a']) [ 1903.498688][T27066] loop2: detected capacity change from 0 to 7 [ 1903.508922][T27066] EXT4-fs (loop2): VFS: Can't find ext4 filesystem [ 1903.534036][T27065] loop5: detected capacity change from 0 to 16 10:11:22 executing program 5: r0 = openat$dir(0xffffffffffffff9c, &(0x7f0000000300)='./file0\x00', 0x0, 0x0) openat$dir(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x22000, 0x108) unlinkat(0xffffffffffffff9c, &(0x7f0000000100)='./file0\x00', 0x200) prctl$PR_GET_NAME(0x10, &(0x7f0000000000)=""/12) faccessat(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', 0x80) r1 = openat$incfs(r0, &(0x7f0000000080)='.pending_reads\x00', 0x501080, 0x0) faccessat2(r1, &(0x7f00000000c0)='./file0\x00', 0x152, 0x1000) r2 = openat$dir(0xffffffffffffff9c, &(0x7f0000000180)='./file0\x00', 0x0, 0x98) getdents(r2, &(0x7f00000001c0)=""/112, 0x70) 10:11:22 executing program 3: r0 = socket(0x10, 0x3, 0x0) getsockopt$inet_IP_XFRM_POLICY(r0, 0x10e, 0x11, 0x0, 0x0) ioctl$PTP_SYS_OFFSET_EXTENDED(0xffffffffffffffff, 0xc4c03d09, &(0x7f0000000000)) r1 = add_key$fscrypt_v1(&(0x7f0000000500), &(0x7f0000000540)={'fscrypt:', @desc1}, &(0x7f0000000580)={0x0, "d1f16700772d603233b798eb9d84c8ffd3d9d1ddb5639206d838accc6e8cd06e9ada703d8684d1e1ad4b340978dfe1ed27744425e15fa9ae7f876576dad236b2", 0x3d}, 0x48, 0xfffffffffffffffb) keyctl$reject(0x13, r1, 0x9629, 0x6, 0xfffffffffffffffe) ioctl$PTP_SYS_OFFSET_PRECISE(0xffffffffffffffff, 0xc0403d08, &(0x7f00000004c0)) 10:11:22 executing program 1: clock_settime(0x3, &(0x7f0000000000)) 10:11:22 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f00000000c0)={0x2, &(0x7f0000000000)=[{0x15, 0x0, 0x8}, {}]}) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup.cpu/syz1\x00', 0x1ff) prctl$PR_SET_SECCOMP(0x16, 0x0, &(0x7f0000000100)={0x7, &(0x7f0000000040)=[{0x1ff, 0x9, 0x8, 0x101}, {0x0, 0x80, 0x20}, {0xffff, 0x4, 0x8f, 0x4}, {0xfff8, 0x9, 0x7, 0x8}, {0x80, 0x6, 0x70, 0x10001}, {0x0, 0x0, 0x3f, 0x1}, {0xf2a1, 0x3f, 0x1f, 0xffff}]}) 10:11:22 executing program 5: syz_mount_image$ext4(0x0, &(0x7f0000000440)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) openat$dir(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x80, 0x12) r0 = openat$vcsu(0xffffffffffffff9c, &(0x7f0000000000), 0x5200, 0x0) fchmodat(r0, &(0x7f0000000040)='./file0\x00', 0x1b0) openat$incfs(r0, &(0x7f00000002c0)='.log\x00', 0x581200, 0x123) accept4$packet(r0, &(0x7f0000000400)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000000440)=0x14, 0x100000) execveat(r0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000140)=[&(0x7f00000000c0)='\x00'], &(0x7f0000000380)=[&(0x7f0000000180)='\x00', &(0x7f00000001c0)='\x00', &(0x7f0000000200)='\\/@{\\$([&*\x00', &(0x7f0000000240)=',{\xd9\x00', &(0x7f0000000280)='!,^/\x00', &(0x7f00000002c0)='{/-!(\\]&#\x00', &(0x7f0000000300)='\x00', &(0x7f0000000340)='\x00'], 0x100) sendmsg$NBD_CMD_RECONFIGURE(0xffffffffffffffff, &(0x7f0000000540)={&(0x7f00000003c0)={0x10, 0x0, 0x0, 0x800000}, 0xc, &(0x7f0000000500)={&(0x7f0000000480)={0x64, 0x0, 0x2, 0x70bd2d, 0x25dfdbfc, {}, [@NBD_ATTR_INDEX={0x8, 0x1, 0x0}, @NBD_ATTR_INDEX={0x8, 0x1, 0x0}, @NBD_ATTR_CLIENT_FLAGS={0xc, 0x6, 0x91b5e450b5b639cb}, @NBD_ATTR_BLOCK_SIZE_BYTES={0xc, 0x3, 0xfff}, @NBD_ATTR_BLOCK_SIZE_BYTES={0xc, 0x3, 0x9}, @NBD_ATTR_SERVER_FLAGS={0xc, 0x5, 0x103}, @NBD_ATTR_INDEX={0x8, 0x1, 0x0}, @NBD_ATTR_INDEX={0x8, 0x1, 0x0}]}, 0x64}, 0x1, 0x0, 0x0, 0x20044884}, 0x810) prctl$PR_CAPBSET_DROP(0x18, 0x19) unlinkat(0xffffffffffffff9c, &(0x7f0000000100)='./file0\x00', 0x200) ioctl$PTP_PEROUT_REQUEST(0xffffffffffffffff, 0x40383d03, &(0x7f0000000080)={{0x7, 0x80}, {0x9, 0x7}, 0x6}) faccessat2(r0, &(0x7f0000000580)='./file0\x00', 0x40, 0x1100) prctl$PR_SET_TSC(0x1a, 0x1) [ 1903.645409][T27124] loop2: detected capacity change from 0 to 7 [ 1903.681029][T27124] EXT4-fs (loop2): VFS: Can't find ext4 filesystem 10:11:22 executing program 2: syz_mount_image$ext4(0x0, &(0x7f0000000440)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r0 = openat$dir(0xffffffffffffff9c, &(0x7f0000000300)='./file0\x00', 0x2400, 0x0) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY_ALL_USERS(r0, 0xc0406619, &(0x7f0000000000)={@desc={0x1, 0x0, @desc2}}) r1 = openat$vcsu(0xffffffffffffff9c, &(0x7f0000000340), 0x301, 0x0) ioctl$PTP_ENABLE_PPS(r1, 0x40043d04, 0x1) r2 = openat$ptp0(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) ioctl$PTP_EXTTS_REQUEST(r2, 0x40103d02, &(0x7f00000000c0)) ioctl$PTP_SYS_OFFSET_EXTENDED(r2, 0xc4c03d09, &(0x7f0000000780)={0xa}) syz_mount_image$ext4(&(0x7f0000000500)='ext3\x00', &(0x7f0000000680)='./file0\x00', 0x5, 0x1, &(0x7f0000000c40)=[{&(0x7f00000006c0)="f9d25e842d67755665a6ba374e4589e6cc675032caf1746d", 0x18, 0x8}], 0x80000, &(0x7f0000000c80)={[{@dioread_nolock}, {@usrjquota_path={'usrjquota', 0x3d, './file0/../file0'}}, {@noauto_da_alloc}, {@dax}, {@nodelalloc}], [{@dont_hash}, {@smackfsfloor={'smackfsfloor', 0x3d, '-^#/'}}]}) execveat(r1, &(0x7f0000000040)='./file0\x00', &(0x7f0000000580)=[&(0x7f0000000080)='\x00', &(0x7f00000000c0)='(/^)-\x00', &(0x7f0000000140)='\x00', &(0x7f00000001c0)='#\x00', &(0x7f0000000540)='@/-]#)}%\x00'], &(0x7f0000000480)=[&(0x7f0000000180)='\x00\x00\x11\x11\"\"33', &(0x7f0000000200)='\x00\x00\x11\x11\"\"33', &(0x7f0000000240)='@/-]#)}%\x00', &(0x7f0000000280)='@\x00', &(0x7f00000002c0)='-({&-\x00', &(0x7f0000000700)='\xedK-\r\xf9\xb7\x90N\x9b\x8c\x19}r^\xa7\x04;\x96\x9e\xec\xf8*\xd9\xa6\x9c\x87A\x03\xac\fW\xe3\x8dG\xed\xaf{\xc3h?\xd6\x02\a\xa7I\xf9\xb7Pk\xfb\xdf\x81\xa9\xf68\x19\x91T\xc1\xca\"\xfbHoG\x18H\xda\xe7\xe4T\xe2\x14\x15\xcd\xf6\xa7\xd0F8\xf9I\xb59_Y\xe71\x8e\x13\xbc\xdb@\xe2\xd2!\xdb\xd7\xdb\xd1Leb\x11\xe1\xf4},0?\x03\xdc\x7fK\x90\xe0\x12KL\xae\x96\xa3g', &(0x7f0000000380)='-\xf0\x00\x00', &(0x7f00000003c0)='#\x00', &(0x7f00000005c0)='\x00O\xf6:\xd3\xeb&\xb4\x99Y\xb0\xc5C\b\xe72\xf2\xbec\xb38\xfa\x8b$Y\xcc\x1f\xf0\xd7\xfdl\x88\xcfi}\x8a\xb4\xee\xa6\xa8\xa0\xb1\x11{^\xa4\xb7\xc9\xc1\xe0\xe0\xbe\x05$4(\n\v\xcd^\x99\x902Q\n\x87\fy\"\xdb\xd9\xe2\x15\xd1R\t96i#\x94fD\x04\x99\xaa\xaeV]\x1cp\xc0\x1c\xb8P\xc5\x11\xc1\xa8`\xac\xa6\xc4\xe8\x8bD\xedH\x04\xc5\x87\xbb\xc2c\xbd_6\x9a%\x83\x94\xdbY\xba\x91+\xffc[\"\r\x96\x1c'], 0x1400) unlinkat(0xffffffffffffff9c, &(0x7f0000000100)='./file0\x00', 0x200) r3 = openat$vcsu(0xffffffffffffff9c, &(0x7f0000000340), 0x301, 0x0) ioctl$PTP_ENABLE_PPS(r3, 0x40043d04, 0x1) r4 = openat$vcsu(0xffffffffffffff9c, &(0x7f0000000000), 0x5200, 0x0) fchmodat(r4, &(0x7f0000000040)='./file0\x00', 0x1b0) r5 = openat$incfs(r4, &(0x7f0000000d80)='.log\x00', 0x581200, 0x123) syz_genetlink_get_family_id$fou(&(0x7f0000000300), r5) renameat2(r5, &(0x7f0000000380)='./file0\x00', 0xffffffffffffffff, &(0x7f00000003c0)='./file1\x00', 0x0) accept$packet(r5, &(0x7f0000000d00)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000d40)=0x14) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY_ALL_USERS(r5, 0xc0406619, &(0x7f0000000400)={@desc={0x1, 0x0, @auto="edaf8c26040e5f3f"}}) 10:11:23 executing program 4: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000180)={0x2, &(0x7f0000000000)=[{0x25, 0x3, 0x4}, {0x0, 0xce, 0x0, 0x1}]}) r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$IEEE802154_LIST_IFACE(r0, &(0x7f0000000240)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000000200)={&(0x7f00000001c0)={0x3c, 0x0, 0x400, 0x70bd28, 0x25dfdbfc, {}, [@IEEE802154_ATTR_DEV_NAME={0xa, 0x1, 'wpan1\x00'}, @IEEE802154_ATTR_DEV_NAME={0xa, 0x1, 'wpan1\x00'}, @IEEE802154_ATTR_DEV_INDEX={0x8}, @IEEE802154_ATTR_DEV_INDEX={0x8}]}, 0x3c}, 0x1, 0x0, 0x0, 0x4000800}, 0x4040) sendmsg$NL802154_CMD_GET_WPAN_PHY(r0, &(0x7f0000000140)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f0000000100)={&(0x7f00000000c0)={0x1c, 0x0, 0x10, 0x70bd2a, 0x25dfdbfd, {}, [@NL802154_ATTR_WPAN_PHY={0x8, 0x1, 0x3}]}, 0x1c}, 0x1, 0x0, 0x0, 0x20040001}, 0x4810) 10:11:23 executing program 0: setsockopt$packet_int(0xffffffffffffffff, 0x107, 0xc, &(0x7f0000000080)=0x80000000, 0x4) prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000040)={0x2, &(0x7f0000000000)=[{0x15}, {}]}) 10:11:23 executing program 1: clock_settime(0x0, &(0x7f0000000000)={0x77359400}) r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NL802154_CMD_SET_MAX_CSMA_BACKOFFS(r0, &(0x7f0000000100)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x10}, 0xc, &(0x7f00000000c0)={&(0x7f0000000140)=ANY=[@ANYBLOB="282e80b9", @ANYRES16=0x0, @ANYBLOB="04002bbd7000ffdbdf25110000000c00060003000000030000000500120003000000cb6852e0b7aa19beebe997637fa91392372474b8193d4834b48dbf52fa0d7dc2d7d6fa9e4c410acc4c15600dbc6e1a1149b0953f90a7ba5bff3fbe09aed982744a1b059b083c8fee2107663cfead43bbb92d2df5dcecc69b78136f"], 0x28}, 0x1, 0x0, 0x0, 0x48000}, 0x40) 10:11:23 executing program 5: kexec_load(0x100, 0x6, &(0x7f0000001700)=[{&(0x7f0000000280)="00f059e2aceebc49ec255e3a8f372f87750d143eea0222bfd949dd87e5bc86df7d19c342062f5c84aadba410f3a1bac4f727c8fab4555e156e247686dc43a508651d94c7cf9ffb9d41f1e4a6c2d1236676204d6b184124ce4d94", 0x5a, 0x5, 0x80000000}, {&(0x7f0000000480)="93eb7d8e007d256680f0e33bbfc35d4c8af0e1261e36b2db3d790904b47de879de9ad914fba8abbdd2f35a16567d0d83208fd9b575befff09b054bbea2c080927470f582c766abb7bfa0ed8cecb59eb53d6581e42b0d49cc80f8a6a477159c2c8b0e69296c99f32c9fa604f20ca1c59ee73e1e4fa5e8d47cbb2973614fe37b370a42ea0285b2a847951ceba4a951311a30af2bdf89af61680f6b4e181b5f31cbf17d7b4934ada7edb4aa9b18f566cc45b246daecd49b57f0ffabc6d347e4ac0f3ff24dd3031dc53cfa750814e7b245a3f793ee0d1a6f0126c867782985374936af3e2cda60ecc25db543aa17d4", 0xed, 0xfe, 0xf8}, {&(0x7f0000000580)="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", 0x1000, 0xb7c, 0x100000000}, {&(0x7f0000001580)="cad5d076ee5918120f09897f602a7480c0abafceffb7af3e4bc8bffe16f331a00ff07c6ee4a38b09eb66df25933055d43235fcde6660b3a16c88293128aca7f84c6ebbb5fdc64456e984e0b4debde43a3b5921db06e0ff8c3eaee147c70420fe1d27e0833a23fd4764e4cf334986c7a2e4c9eba37428282426759de361", 0x7d, 0x81, 0x3}, {&(0x7f0000001600)="dc57b8524e126a362ceae34a49b7c3ac346ebd7510ec079511a35325be7951ba3604fbf613f1ee661afd9a8ccd8879fef18c904ac24f80ca06ea057b82b07bc8360945c9d2fbbf2365b5f88cef520972a905955ac8e7e6535c3cabb7ebd4e3ae0cad9c3993b452904b95a13194862428585bb11ace527c11b498dab37d33da3f49bd319bb401a04192fca4e49b83d191c55e7adf4b52d9ec65d05fe894b3097e39329bdc", 0xa4, 0x3, 0x7f}, {&(0x7f00000016c0)="b208429a595c", 0x6, 0x100, 0x80000001}], 0x280000) r0 = syz_mount_image$ext4(0x0, &(0x7f0000000440)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) openat$dir(0xffffffffffffff9c, &(0x7f0000000300)='./file0\x00', 0x0, 0x0) r1 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x8, 0x1, &(0x7f0000000080)=[{&(0x7f0000000140)="713330db38a811a2737f175d7a9f2083b0ee6618b0cb88facce0b7adca6c47d0453718eae37b27d83c64c3583a73e6df1e9db2ae15e96f0cf486b0151d0585d87307b78f36931104bd49252876f3e3c420bfdd3ed92ebf52c12baea41e6ca085151ae47ae08e9fa7c2610b941f2275dac903e95a5dc1a578f08a3631d6f332d99937c4013a378c55796ef2846f6276fd68ed0517ec984ab6904bd8ef61f8cd8f482519452edb08d9a4e3a027bf64fdcaef24e67f69953a57a34c8d6b7d1fe30f34da2b1fee790e40cb4113990d39479e01604396eb7cbe7ec5e9d047f143dc8a1da67203a518aa5f1e6de048964136e2f5033aa43967c21489", 0xf9}], 0x1012008, &(0x7f0000000340)={[{@user_xattr}, {@dax}, {@grpjquota}, {@auto_da_alloc}, {@grpjquota_path={'grpjquota', 0x3d, './file0'}}, {@lazytime}, {@noinit_itable}, {@nouser_xattr}, {@lazytime}], [{@rootcontext={'rootcontext', 0x3d, 'sysadm_u'}}, {@seclabel}, {@fsuuid={'fsuuid', 0x3d, {[0x63, 0x38, 0x37, 0x6e, 0x30, 0x0, 0x33, 0x61], 0x2d, [0x66, 0x33, 0x63, 0x38], 0x2d, [0x36, 0x35, 0x30, 0x34], 0x2d, [0x0, 0x0, 0x63, 0x30], 0x2d, [0x62, 0x33, 0x36, 0x34, 0x38, 0x30, 0x37, 0x34]}}}, {@smackfstransmute={'smackfstransmute', 0x3d, '{'}}, {@fsuuid={'fsuuid', 0x3d, {[0x63, 0x36, 0x30, 0x64, 0x64, 0x61, 0x34, 0x38], 0x2d, [0x61, 0x37, 0x36, 0x62], 0x2d, [0x38, 0x31, 0x0, 0x33], 0x2d, [0x64, 0x33, 0x0, 0x63], 0x2d, [0x8, 0x64, 0x32, 0x62, 0x63, 0x54, 0x38, 0x840864039ddad252]}}}, {@mask={'mask', 0x3d, 'MAY_EXEC'}}]}) renameat2(r1, &(0x7f00000000c0)='./file0\x00', r0, &(0x7f0000000240)='./file0\x00', 0x3) unlinkat(0xffffffffffffff9c, &(0x7f0000000100)='./file0\x00', 0x200) 10:11:23 executing program 3: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NBD_CMD_CONNECT(r0, &(0x7f00000013c0)={&(0x7f00000012c0), 0xc, &(0x7f0000001380)={0x0}}, 0xc6c3dbe86af1a089) r1 = syz_genetlink_get_family_id$nl802154(&(0x7f00000000c0), 0xffffffffffffffff) ioctl$sock_SIOCGIFINDEX_802154(0xffffffffffffffff, 0x8933, &(0x7f0000000100)={'wpan1\x00', 0x0}) sendmsg$NL802154_CMD_SET_MAX_CSMA_BACKOFFS(r0, &(0x7f0000000200)={&(0x7f0000000700)={0x10, 0x0, 0x0, 0x4}, 0xc, &(0x7f00000001c0)={&(0x7f0000000140)={0x60, r1, 0x0, 0x70bd29, 0x25dfdbfe, {}, [@NL802154_ATTR_IFINDEX={0x8}, @NL802154_ATTR_WPAN_DEV={0xc, 0x6, 0x3}, @NL802154_ATTR_WPAN_DEV={0xc, 0x6, 0x300000003}, @NL802154_ATTR_MAX_CSMA_BACKOFFS={0x5}, @NL802154_ATTR_WPAN_DEV={0xc, 0x6, 0x200000002}, @NL802154_ATTR_IFINDEX={0x8, 0x3, r2}, @NL802154_ATTR_MAX_CSMA_BACKOFFS={0x5, 0x12, 0x5}, @NL802154_ATTR_MAX_CSMA_BACKOFFS={0x5}]}, 0x38}, 0x1, 0x0, 0x0, 0x40010}, 0x0) r3 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$IEEE802154_ASSOCIATE_RESP(r3, &(0x7f0000000400)={&(0x7f0000000340)={0x10, 0x0, 0x0, 0x200040}, 0xc, &(0x7f00000003c0)={&(0x7f0000000380)={0x28, 0x0, 0x400, 0x70bd28, 0x25dfdbfb, {}, [@IEEE802154_ATTR_COORD_SHORT_ADDR={0x6}, @IEEE802154_ATTR_COORD_HW_ADDR={0xc, 0x9, {0xaaaaaaaaaaaa0202}}]}, 0x28}, 0x1, 0x0, 0x0, 0x4000840}, 0x4048004) sendmsg$NL802154_CMD_SET_CHANNEL(r0, &(0x7f0000000300)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x2000}, 0xc, &(0x7f00000002c0)={&(0x7f0000000280)={0x2c, r1, 0x100, 0x70bd26, 0x25dfdbff, {}, [@NL802154_ATTR_WPAN_PHY={0x8, 0x1, 0x1}, @NL802154_ATTR_CHANNEL={0x5, 0x8, 0x4}, @NL802154_ATTR_CHANNEL={0x5, 0x8, 0x3}]}, 0x2c}, 0x1, 0x0, 0x0, 0x4080}, 0x840) syz_mount_image$ext4(&(0x7f0000000000)='ext3\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000480)=ANY=[@ANYBLOB="6c617a7974696d652c746573745f0b20f389e8aac3225ad04b53babe64756d6d795f656e6352797074696f02000000785f6469725f73697a655f6b1fc5e2e5f3bddbe29847b4ed623d30783030303030303030303230302c6772706a71756f74613d2c6d696e4c62617463685f74696d083d3078303030"]) r4 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$TIPC_CMD_GET_BEARER_NAMES(r4, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000180)={0x1c}, 0x33fe0}}, 0x0) r5 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$nl802154(&(0x7f0000000080), r5) r6 = syz_genetlink_get_family_id$nl802154(&(0x7f0000000500), r3) ioctl$sock_SIOCGIFINDEX_802154(r0, 0x8933, &(0x7f0000000540)={'wpan0\x00', 0x0}) ioctl$sock_SIOCGIFINDEX_802154(r0, 0x8933, &(0x7f0000000580)={'wpan4\x00', 0x0}) ioctl$sock_SIOCGIFINDEX_802154(r0, 0x8933, &(0x7f00000005c0)={'wpan0\x00', 0x0}) sendmsg$NL802154_CMD_SET_MAX_CSMA_BACKOFFS(r0, &(0x7f00000006c0)={&(0x7f0000000440)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000000680)={&(0x7f0000000600)={0x64, r6, 0x800, 0x70bd2c, 0x25dfdbfe, {}, [@NL802154_ATTR_WPAN_DEV={0xc, 0x6, 0x2}, @NL802154_ATTR_IFINDEX={0x8, 0x3, r7}, @NL802154_ATTR_WPAN_DEV={0xc, 0x6, 0x300000003}, @NL802154_ATTR_MAX_CSMA_BACKOFFS={0x5, 0x12, 0x96}, @NL802154_ATTR_IFINDEX={0x8, 0x3, r2}, @NL802154_ATTR_IFINDEX={0x8, 0x3, r8}, @NL802154_ATTR_IFINDEX={0x8, 0x3, r9}, @NL802154_ATTR_MAX_CSMA_BACKOFFS={0x5, 0x12, 0x4}, @NL802154_ATTR_MAX_CSMA_BACKOFFS={0x5, 0x12, 0x81}]}, 0x64}, 0x1, 0x0, 0x0, 0x4040010}, 0x800) r10 = syz_genetlink_get_family_id$tipc(&(0x7f0000000780), r4) sendmsg$TIPC_CMD_SET_NODE_ADDR(r4, &(0x7f0000000840)={&(0x7f0000000740)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000000800)={&(0x7f00000007c0)={0x24, r10, 0x100, 0x70bd2a, 0x25dfdbfb, {{}, {}, {0x8, 0x11, 0x56}}, ["", "", "", "", "", "", "", "", ""]}, 0x24}, 0x1, 0x0, 0x0, 0x2404c085}, 0x4008000) 10:11:23 executing program 2: r0 = syz_mount_image$ext4(0x0, &(0x7f0000000440)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) openat$dir(0xffffffffffffff9c, &(0x7f0000000300)='./file0\x00', 0x0, 0x0) r1 = openat$vcsu(0xffffffffffffff9c, &(0x7f0000000000), 0x5200, 0x0) fchmodat(r1, &(0x7f0000000040)='./file0\x00', 0x1b0) openat$incfs(r1, &(0x7f00000002c0)='.log\x00', 0x581200, 0x123) accept4$packet(r1, &(0x7f0000000400)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000000440)=0x14, 0x100000) sendmsg$TIPC_CMD_SHOW_LINK_STATS(r1, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x40}, 0xc, &(0x7f0000000080)={&(0x7f0000000040)={0x30, 0x0, 0x100, 0x70bd26, 0x25dfdbff, {{}, {}, {0x14, 0x14, 'broadcast-link\x00'}}, ["", "", "", "", "", "", "", ""]}, 0x30}, 0x1, 0x0, 0x0, 0x9f77357198c723f7}, 0x0) exit(0x7) unlinkat(r0, &(0x7f0000000100)='./file0\x00', 0x200) 10:11:23 executing program 4: prctl$PR_PAC_RESET_KEYS(0x36, 0x4) prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000040)={0x2, &(0x7f0000000000)=[{0x25}, {}]}) r0 = getpgrp(0xffffffffffffffff) sched_setaffinity(r0, 0x8, &(0x7f00000000c0)=0xffffffff) faccessat(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x2e) 10:11:23 executing program 5: syz_mount_image$ext4(0x0, &(0x7f0000000440)='./file0\x00', 0x0, 0x0, 0x0, 0xa800, 0x0) openat$dir(0xffffffffffffff9c, &(0x7f0000000300)='./file0\x00', 0x0, 0x0) unlinkat(0xffffffffffffff9c, &(0x7f0000000100)='./file0\x00', 0x200) 10:11:23 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000040)={0x4, &(0x7f0000000080)=[{0x4, 0x0, 0x0, 0xfffffffc}, {}, {0x87, 0x11, 0xd, 0x4}, {0xded, 0x0, 0x1, 0x9}]}) 10:11:23 executing program 1: clock_gettime(0x0, &(0x7f0000000000)={0x0, 0x0}) clock_settime(0x0, &(0x7f0000000040)={r0, r1+60000000}) 10:11:23 executing program 4: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000040)={0x2, &(0x7f0000000000)=[{0x25}, {}]}) prctl$PR_SET_SECCOMP(0x16, 0x0, &(0x7f00000000c0)={0x4, &(0x7f0000000080)=[{0x7, 0x3, 0x9, 0x7}, {0x6, 0x3, 0xc5, 0x2}, {0xff80, 0x4, 0x6, 0x7}, {0x1, 0x0, 0x2, 0x2}]}) prctl$PR_SET_SECCOMP(0x16, 0x0, &(0x7f0000000140)={0x2, &(0x7f0000000100)=[{0x1, 0x4, 0x12, 0x1}, {0xf356, 0x80, 0x20}]}) 10:11:23 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000040)={0x2, &(0x7f0000000000)=[{0x15, 0x8}, {}]}) 10:11:23 executing program 1: clock_settime(0x0, &(0x7f0000000000)={0x77359400}) r0 = fork() sched_rr_get_interval(r0, &(0x7f0000000100)) sched_rr_get_interval(r0, &(0x7f0000000040)) ptrace$peeksig(0x4209, r0, &(0x7f0000000080)={0x1, 0x1, 0xfe4d}, &(0x7f00000000c0)) 10:11:23 executing program 5: r0 = syz_mount_image$ext4(0x0, &(0x7f0000000440)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000140)='./file0\x00', 0x8, 0x1, &(0x7f00000001c0)=[{&(0x7f0000000180)="fda9f446d4e56c84", 0x8, 0x2ede}], 0x400c8, &(0x7f0000000200)={[{@sysvgroups}], [{@mask={'mask', 0x3d, 'MAY_READ'}}]}) symlinkat(&(0x7f0000000000)='./file0\x00', r0, &(0x7f0000000040)='./file0\x00') openat$dir(0xffffffffffffff9c, &(0x7f0000000300)='./file0\x00', 0x0, 0x0) unlinkat(0xffffffffffffff9c, &(0x7f0000000100)='./file0\x00', 0x200) ioctl$SG_SET_DEBUG(0xffffffffffffffff, 0x227e, &(0x7f0000000080)) 10:11:23 executing program 0: r0 = openat$vcsu(0xffffffffffffff9c, &(0x7f0000000000), 0x5200, 0x0) fchmodat(r0, &(0x7f0000000040)='./file0\x00', 0x1b0) accept4$packet(r0, &(0x7f0000000400)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000000440)=0x14, 0x100000) sendmsg$TIPC_CMD_SHOW_LINK_STATS(r0, &(0x7f0000000140)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f0000000100)={&(0x7f00000001c0)=ANY=[@ANYBLOB="1e570c", @ANYRES16=0x0, @ANYBLOB="000128bd70a36dee512501000000000000000b000000001400146272006164636173742d6c696e6b000062ce3876b0554e3b22b9117a669fb5f2154dd61d686da447b6e90c4d413bc9db82f4e9f452ba1d3c5611b18c95892d16ea467bf6c5a869bde24911a53aee204f625d3e26fdeadd0f39becebbd3043b69bc84849437836b685574f786dda1490dd75316fffe1759925c3837d5caad7478425cf20db566fef73b3240b14b20b6875217dc0bdbc7e65d1076d46f080ad018bc4acab721733144d2bf83e4dfd1e9591118a5133bc61a6dc8949abcbc2cc1fd67518e7c5199788ba6ce26"], 0x30}, 0x1, 0x0, 0x0, 0x40}, 0x808c) prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000040)={0x2, &(0x7f0000000000)=[{0x15, 0x14, 0x0, 0x200}, {0x9}]}) 10:11:23 executing program 4: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000040)={0x2, &(0x7f0000000000)=[{0x25}, {}]}) r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$ieee802154(&(0x7f0000000140), 0xffffffffffffffff) sendmsg$IEEE802154_LIST_IFACE(r0, &(0x7f0000000200)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x1}, 0xc, &(0x7f00000001c0)={&(0x7f0000000180)={0x38, r1, 0x20, 0x70bd28, 0x25dfdbfb, {}, [@IEEE802154_ATTR_DEV_NAME={0xa, 0x1, 'wpan4\x00'}, @IEEE802154_ATTR_DEV_NAME={0xa, 0x1, 'wpan0\x00'}, @IEEE802154_ATTR_DEV_NAME={0xa, 0x1, 'wpan0\x00'}]}, 0x38}, 0x1, 0x0, 0x0, 0x40000}, 0x40000) prctl$PR_SET_SECCOMP(0x16, 0x0, &(0x7f00000000c0)={0x7, &(0x7f0000000080)=[{0x1, 0x8, 0x8, 0xdf9}, {0x400, 0x5, 0x7, 0x9}, {0x6, 0x1, 0x1}, {0x3, 0x0, 0x28}, {0x1ff, 0x3, 0xff, 0xd788}, {0x6, 0x3, 0x9}, {0x20, 0x8, 0x8}]}) prctl$PR_SET_PDEATHSIG(0x1, 0xc) prctl$PR_SET_PDEATHSIG(0x1, 0x23) sendmsg$NBD_CMD_DISCONNECT(0xffffffffffffffff, &(0x7f0000000300)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x10000000}, 0xc, &(0x7f00000002c0)={&(0x7f0000000280)={0x2c, 0x0, 0x2, 0x70bd2d, 0x25dfdbfc, {}, [@NBD_ATTR_BLOCK_SIZE_BYTES={0xc}, @NBD_ATTR_SERVER_FLAGS={0xc, 0x5, 0x23}]}, 0x2c}, 0x1, 0x0, 0x0, 0x20000080}, 0x40000) 10:11:23 executing program 1: get_thread_area(&(0x7f0000000040)={0x9, 0x1000, 0x1000, 0x1, 0x1, 0x0, 0x1, 0x1}) clock_settime(0x0, &(0x7f0000000000)={0x77359400}) [ 1904.660395][T27270] loop5: detected capacity change from 0 to 46 10:11:24 executing program 2: futimesat(0xffffffffffffffff, &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)) r0 = syz_mount_image$ext4(0x0, &(0x7f0000000440)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r1 = openat$dir(0xffffffffffffff9c, &(0x7f0000000300)='./file0\x00', 0x0, 0x0) r2 = openat$vcsu(0xffffffffffffff9c, &(0x7f0000000000), 0x5200, 0x0) fchmodat(r2, &(0x7f0000000040)='./file0\x00', 0x1b0) r3 = openat$incfs(r2, &(0x7f00000002c0)='.log\x00', 0x581200, 0x123) syz_genetlink_get_family_id$fou(&(0x7f0000000300), r3) renameat2(r3, &(0x7f0000000380)='./file0\x00', 0xffffffffffffffff, &(0x7f00000003c0)='./file1\x00', 0x0) execveat(r3, &(0x7f0000000240)='./file1\x00', &(0x7f0000000480)=[&(0x7f0000000280)='/dev/vcsu\x00', &(0x7f0000000340)='\x00', &(0x7f0000000400)='/dev/vcsu\x00'], &(0x7f00000006c0)=[&(0x7f00000004c0)=':,+#\x00', &(0x7f0000000500)=',{\x84)\x00', &(0x7f0000000540)='\x00', &(0x7f0000000580)='/dev/vcsu\x00', &(0x7f00000005c0)='/@\x00', &(0x7f0000000600)=']@$j,-\']-\x00', &(0x7f0000000640)='fou\x00', &(0x7f0000000680)='.log\x00'], 0x800) r4 = openat$dir(0xffffffffffffff9c, &(0x7f0000000740)='./file1\x00', 0x30b000, 0x100) openat$incfs(r4, &(0x7f0000000780)='.pending_reads\x00', 0x40, 0x1a) sendmsg$TIPC_CMD_SET_NETID(r3, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x8000000}, 0xc, &(0x7f0000000080)={&(0x7f0000000040)={0x24, 0x0, 0x800, 0x70bd2d, 0x25dfdbfc, {{}, {}, {0x8, 0x2, 0x4}}, ["", "", "", "", "", ""]}, 0x24}, 0x1, 0x0, 0x0, 0x4}, 0x8000) renameat2(r1, &(0x7f00000001c0)='./file0\x00', r0, &(0x7f0000000200)='./file0\x00', 0x6) r5 = openat$vcsu(0xffffffffffffff9c, &(0x7f0000000000), 0x5200, 0x0) fchmodat(r5, &(0x7f0000000040)='./file0\x00', 0x1b0) openat$incfs(r5, &(0x7f00000002c0)='.log\x00', 0x581200, 0x123) sendmsg$TIPC_CMD_RESET_LINK_STATS(0xffffffffffffffff, &(0x7f00000008c0)={&(0x7f00000007c0), 0xc, &(0x7f0000000880)={&(0x7f0000000840)={0x28, 0x0, 0x2, 0x70bd2a, 0x25dfdbfc, {{}, {}, {0xc, 0x14, 'syz1\x00'}}, ["", "", "", "", "", "", ""]}, 0x28}, 0x1, 0x0, 0x0, 0x200000c0}, 0x4000) accept4$packet(r5, &(0x7f0000000400)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000000440)=0x14, 0x100000) openat$incfs(r5, &(0x7f0000000700)='.pending_reads\x00', 0x200400, 0x188) unlinkat(0xffffffffffffff9c, &(0x7f0000000100)='./file0\x00', 0x200) 10:11:24 executing program 3: r0 = getgid() setfsgid(r0) setgid(r0) prctl$PR_MCE_KILL_GET(0x22) sendmsg$NL802154_CMD_SET_MAX_FRAME_RETRIES(0xffffffffffffffff, &(0x7f0000000140)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f0000000100)={&(0x7f0000000180)=ANY=[@ANYBLOB="bd440000", @ANYRES16=0x0, @ANYBLOB="00032abd7000fcdbdf250f00000005000f00050000000c00060003000000010000000c000600010000000000000005000f000700000005000f00c0000000"], 0x44}, 0x1, 0x0, 0x0, 0x24008024}, 0x4004) syz_mount_image$ext4(&(0x7f0000000000)='ext3\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000480)=ANY=[@ANYBLOB='lazytime,test_dummy_encryption,max_dir_size_kb=0x000000000200,grpjquota=,min_batch_time=0x00000000000003ff,rootcontext\a']) 10:11:24 executing program 5: r0 = syz_mount_image$ext4(0x0, &(0x7f0000000440)='./file0\x00', 0x0, 0x0, 0x0, 0x840000, 0x0) openat$dir(0xffffffffffffff9c, &(0x7f0000000300)='./file0\x00', 0x0, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$TIPC_CMD_GET_REMOTE_MNG(r1, &(0x7f0000000180)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x1}, 0xc, &(0x7f00000000c0)={&(0x7f0000000140)={0x1c, 0x0, 0x10, 0x70bd29, 0x25dfdbff, {}, ["", ""]}, 0x1c}, 0x1, 0x0, 0x0, 0x48c0}, 0x4c001) unlinkat(0xffffffffffffff9c, &(0x7f0000000100)='./file0\x00', 0x200) fchmodat(r0, &(0x7f0000000000)='./file1